From: Stephen Hemminger <stephen@networkplumber.org>
To: dev@dpdk.org
Cc: Stephen Hemminger <stephen@networkplumber.org>
Subject: [RFC v2 12/14] eal: limit maximum runtime directory and socket paths
Date: Thu, 4 Dec 2025 18:28:21 -0800 [thread overview]
Message-ID: <20251205022948.327743-13-stephen@networkplumber.org> (raw)
In-Reply-To: <20251205022948.327743-1-stephen@networkplumber.org>
Linux (and FreeBSD) has a limitation of 108 characters for
any unix domain socket path. Therefore DPDK would not work
if a really large runtime directory was used.
Signed-off-by: Stephen Hemminger <stephen@networkplumber.org>
---
lib/eal/common/eal_common_config.c | 6 ++-
lib/eal/common/eal_common_proc.c | 83 +++++++++++++++++++-----------
lib/eal/common/eal_filesystem.h | 6 ++-
3 files changed, 63 insertions(+), 32 deletions(-)
diff --git a/lib/eal/common/eal_common_config.c b/lib/eal/common/eal_common_config.c
index 7fc7611a07..e2e69a75fb 100644
--- a/lib/eal/common/eal_common_config.c
+++ b/lib/eal/common/eal_common_config.c
@@ -6,6 +6,7 @@
#include <eal_export.h>
#include "eal_private.h"
+#include "eal_filesystem.h"
#include "eal_memcfg.h"
/* early configuration structure, when memory config is not mmapped */
@@ -24,7 +25,7 @@ static struct rte_config rte_config = {
};
/* platform-specific runtime dir */
-static char runtime_dir[PATH_MAX];
+static char runtime_dir[UNIX_PATH_MAX];
/* internal configuration */
static struct internal_config internal_config;
@@ -39,7 +40,8 @@ rte_eal_get_runtime_dir(void)
int
eal_set_runtime_dir(const char *run_dir)
{
- if (strlcpy(runtime_dir, run_dir, PATH_MAX) >= PATH_MAX) {
+ /* runtime directory limited by maximum allowable unix domain socket */
+ if (strlcpy(runtime_dir, run_dir, UNIX_PATH_MAX) >= UNIX_PATH_MAX) {
EAL_LOG(ERR, "Runtime directory string too long");
return -1;
}
diff --git a/lib/eal/common/eal_common_proc.c b/lib/eal/common/eal_common_proc.c
index 62fd4ba88f..dbf749c5b8 100644
--- a/lib/eal/common/eal_common_proc.c
+++ b/lib/eal/common/eal_common_proc.c
@@ -36,10 +36,10 @@
static RTE_ATOMIC(int) mp_fd = -1;
static rte_thread_t mp_handle_tid;
-static char mp_filter[PATH_MAX]; /* Filter for secondary process sockets */
-static char mp_dir_path[PATH_MAX]; /* The directory path for all mp sockets */
+static char mp_filter[UNIX_PATH_MAX]; /* Filter for secondary process sockets */
+static char mp_dir_path[UNIX_PATH_MAX]; /* The directory path for all mp sockets */
static pthread_mutex_t mp_mutex_action = PTHREAD_MUTEX_INITIALIZER;
-static char peer_name[PATH_MAX];
+static char peer_name[UNIX_PATH_MAX];
struct action_entry {
TAILQ_ENTRY(action_entry) next;
@@ -78,7 +78,7 @@ struct pending_request {
REQUEST_TYPE_SYNC,
REQUEST_TYPE_ASYNC
} type;
- char dst[PATH_MAX];
+ char dst[UNIX_PATH_MAX];
struct rte_mp_msg *request;
struct rte_mp_msg *reply;
int reply_received;
@@ -132,15 +132,19 @@ find_pending_request(const char *dst, const char *act_name)
return r;
}
-static void
-create_socket_path(const char *name, char *buf, int len)
+static int
+create_socket_path(const char *name, char *buf, size_t len)
{
const char *prefix = eal_mp_socket_path();
- if (strlen(name) > 0)
- snprintf(buf, len, "%s_%s", prefix, name);
- else
- strlcpy(buf, prefix, len);
+ if (strlen(name) > 0) {
+ if (snprintf(buf, len, "%s_%s", prefix, name) >= (int)len)
+ return -1;
+ } else {
+ if (strlcpy(buf, prefix, len) >= len)
+ return -1;
+ }
+ return 0;
}
RTE_EXPORT_SYMBOL(rte_eal_primary_proc_alive)
@@ -572,6 +576,11 @@ open_socket_fd(void)
snprintf(peer_name, sizeof(peer_name),
"%d_%"PRIx64, getpid(), rte_rdtsc());
+ if (create_socket_path(peer_name, un.sun_path, sizeof(un.sun_path)) < 0) {
+ EAL_LOG(ERR, "peer '%s' socket path too long", peer_name);
+ return -1;
+ }
+
mp_fd = socket(AF_UNIX, SOCK_DGRAM, 0);
if (mp_fd < 0) {
EAL_LOG(ERR, "failed to create unix socket");
@@ -581,8 +590,6 @@ open_socket_fd(void)
memset(&un, 0, sizeof(un));
un.sun_family = AF_UNIX;
- create_socket_path(peer_name, un.sun_path, sizeof(un.sun_path));
-
unlink(un.sun_path); /* May still exist since last run */
if (bind(mp_fd, (struct sockaddr *)&un, sizeof(un)) < 0) {
@@ -599,17 +606,20 @@ open_socket_fd(void)
static void
close_socket_fd(int fd)
{
- char path[PATH_MAX];
+ char path[UNIX_PATH_MAX];
close(fd);
- create_socket_path(peer_name, path, sizeof(path));
- unlink(path);
+
+ if (create_socket_path(peer_name, path, sizeof(path)) < 0)
+ EAL_LOG(ERR, "file prefix path for peerr '%s' too long", peer_name);
+ else
+ unlink(path);
}
int
rte_mp_channel_init(void)
{
- char path[PATH_MAX];
+ char path[UNIX_PATH_MAX];
int dir_fd;
const struct internal_config *internal_conf =
eal_get_internal_configuration();
@@ -624,7 +634,12 @@ rte_mp_channel_init(void)
}
/* create filter path */
- create_socket_path("*", path, sizeof(path));
+ if (create_socket_path("*", path, sizeof(path)) < 0) {
+ EAL_LOG(ERR, "file prefix path too long");
+ rte_errno = ENAMETOOLONG;
+ return -1;
+ }
+
rte_basename(path, mp_filter, sizeof(mp_filter));
strlcpy(mp_dir_path, dirname(path), sizeof(mp_dir_path));
@@ -779,14 +794,17 @@ mp_send(struct rte_mp_msg *msg, const char *peer, int type)
}
while ((ent = readdir(mp_dir))) {
- char path[PATH_MAX];
+ char path[UNIX_PATH_MAX];
if (fnmatch(mp_filter, ent->d_name, 0) != 0)
continue;
- snprintf(path, sizeof(path), "%s/%s", mp_dir_path,
- ent->d_name);
- if (send_msg(path, msg, type) < 0)
+ if (snprintf(path, sizeof(path), "%s/%s",
+ mp_dir_path, ent->d_name) >= (int)sizeof(path)) {
+ EAL_LOG(ERR, "Unix domain path %s/%s too long",
+ mp_dir_path, ent->d_name);
+ ret = -1;
+ } else if (send_msg(path, msg, type) < 0)
ret = -1;
}
/* unlock the dir */
@@ -1055,13 +1073,18 @@ rte_mp_request_sync(struct rte_mp_msg *req, struct rte_mp_reply *reply,
pthread_mutex_lock(&pending_requests.lock);
while ((ent = readdir(mp_dir))) {
- char path[PATH_MAX];
+ char path[UNIX_PATH_MAX];
if (fnmatch(mp_filter, ent->d_name, 0) != 0)
continue;
- snprintf(path, sizeof(path), "%s/%s", mp_dir_path,
- ent->d_name);
+ if (snprintf(path, sizeof(path), "%s/%s",
+ mp_dir_path, ent->d_name) >= (int)sizeof(path)) {
+ EAL_LOG(ERR, "Unix domain socket path '%s/%s' too long",
+ mp_dir_path, ent->d_name);
+ rte_errno = ENAMETOOLONG;
+ goto unlock_end;
+ }
/* unlocks the mutex while waiting for response,
* locks on receive
@@ -1200,15 +1223,17 @@ rte_mp_request_async(struct rte_mp_msg *req, const struct timespec *ts,
}
while ((ent = readdir(mp_dir))) {
- char path[PATH_MAX];
+ char path[UNIX_PATH_MAX];
if (fnmatch(mp_filter, ent->d_name, 0) != 0)
continue;
- snprintf(path, sizeof(path), "%s/%s", mp_dir_path,
- ent->d_name);
-
- if (mp_request_async(path, copy, param, ts))
+ if (snprintf(path, sizeof(path), "%s/%s",
+ mp_dir_path, ent->d_name) >= (int)sizeof(path)) {
+ EAL_LOG(ERR, "Unix domain path %s/%s too long",
+ mp_dir_path, ent->d_name);
+ ret = -1;
+ } else if (mp_request_async(path, copy, param, ts))
ret = -1;
}
/* if we didn't send anything, put dummy request on the queue */
diff --git a/lib/eal/common/eal_filesystem.h b/lib/eal/common/eal_filesystem.h
index 5d21f07c20..5371d9f1d6 100644
--- a/lib/eal/common/eal_filesystem.h
+++ b/lib/eal/common/eal_filesystem.h
@@ -45,10 +45,14 @@ eal_runtime_config_path(void)
/** Path of primary/secondary communication unix socket file. */
#define MP_SOCKET_FNAME "mp_socket"
+
+/** Maximum length of unix domain socket path as defined in sys/un.h */
+#define UNIX_PATH_MAX 108
+
static inline const char *
eal_mp_socket_path(void)
{
- static char buffer[PATH_MAX]; /* static so auto-zeroed */
+ static char buffer[UNIX_PATH_MAX]; /* static so auto-zeroed */
snprintf(buffer, sizeof(buffer), "%s/%s", rte_eal_get_runtime_dir(),
MP_SOCKET_FNAME);
--
2.51.0
next prev parent reply other threads:[~2025-12-05 2:31 UTC|newest]
Thread overview: 29+ messages / expand[flat|nested] mbox.gz Atom feed top
2025-12-02 17:24 [RFC 0/8] first steps in fixing buffer overflow Stephen Hemminger
2025-12-02 17:24 ` [RFC 1/8] eal: use C library to parse filesystem table Stephen Hemminger
2025-12-02 17:24 ` [RFC 2/8] hash: fix possible ring name overflow Stephen Hemminger
2025-12-02 17:24 ` [RFC 3/8] eal: warn if thread name is truncated Stephen Hemminger
2025-12-02 17:24 ` [RFC 4/8] eal: avoid format overflow when handling addresses Stephen Hemminger
2025-12-02 17:24 ` [RFC 5/8] ethdev: avoid possible overflow in xstat names Stephen Hemminger
2025-12-02 17:24 ` [RFC 6/8] efd: avoid overflowing ring name Stephen Hemminger
2025-12-02 17:24 ` [RFC 7/8] eal: add check for sysfs path overflow Stephen Hemminger
2025-12-02 17:24 ` [RFC 8/8] eal: limit maximum runtime directory and socket paths Stephen Hemminger
2025-12-05 2:28 ` [RFC v2 00/14] lib: check for string overflow Stephen Hemminger
2025-12-05 2:28 ` [RFC v2 01/14] eal: use C library to parse filesystem table Stephen Hemminger
2025-12-05 2:28 ` [RFC v2 02/14] test: avoid long hash names Stephen Hemminger
2025-12-05 8:29 ` Bruce Richardson
2025-12-05 2:28 ` [RFC v2 03/14] lpm: restrict name size Stephen Hemminger
2025-12-05 2:28 ` [RFC v2 04/14] hash: avoid possible ring name overflow Stephen Hemminger
2025-12-05 2:28 ` [RFC v2 05/14] graph: avoid overflowing comment buffer Stephen Hemminger
2025-12-05 2:28 ` [RFC v2 06/14] eal: warn if thread name is truncated Stephen Hemminger
2025-12-05 8:32 ` Bruce Richardson
2025-12-05 2:28 ` [RFC v2 07/14] eal: avoid format overflow when handling addresses Stephen Hemminger
2025-12-05 2:28 ` [RFC v2 08/14] ethdev: avoid possible overflow in xstat names Stephen Hemminger
2025-12-05 8:34 ` Bruce Richardson
2025-12-05 2:28 ` [RFC v2 09/14] vhost: check for overflow in xstat name Stephen Hemminger
2025-12-05 2:28 ` [RFC v2 10/14] efd: avoid overflowing ring name Stephen Hemminger
2025-12-05 8:37 ` Bruce Richardson
2025-12-05 2:28 ` [RFC v2 11/14] eal: add check for sysfs path overflow Stephen Hemminger
2025-12-05 2:28 ` Stephen Hemminger [this message]
2025-12-05 8:46 ` [RFC v2 12/14] eal: limit maximum runtime directory and socket paths Bruce Richardson
2025-12-05 2:28 ` [RFC v2 13/14] eal: check for hugefile path overflow Stephen Hemminger
2025-12-05 2:28 ` [RFC v2 14/14] lib: enable format overflow warnings Stephen Hemminger
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20251205022948.327743-13-stephen@networkplumber.org \
--to=stephen@networkplumber.org \
--cc=dev@dpdk.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).