From: Stephen Hemminger <stephen@networkplumber.org>
To: dev@dpdk.org
Cc: Stephen Hemminger <stephen@networkplumber.org>,
Bruce Richardson <bruce.richardson@intel.com>
Subject: [PATCH v6 11/18] eal: limit maximum runtime directory and socket paths
Date: Tue, 23 Dec 2025 10:13:09 -0800 [thread overview]
Message-ID: <20251223181418.40834-12-stephen@networkplumber.org> (raw)
In-Reply-To: <20251223181418.40834-1-stephen@networkplumber.org>
Linux has a limitation of 108 characters (including null character)
for AF_UNIX socket path. FreeBSD limit is smaller 104 characters
and Windows has same definition (108) in afunix.h header.
In current code, EAL will fail in telemetry, so this should
not break existing users.
EAL: Multi-process socket /var/run/dpdk/x7Q9mP2a...
EAL: Selected IOVA mode 'VA'
TELEMETRY: Error with socket binding, path too long
Now long string fails on command line parsing:
EAL: Runtime directory string too long
EAL: Cannot create runtime directory
EAL: Error parsing command line arguments.
Signed-off-by: Stephen Hemminger <stephen@networkplumber.org>
Acked-by: Bruce Richardson <bruce.richardson@intel.com>
---
lib/eal/common/eal_common_config.c | 6 ++-
lib/eal/common/eal_common_proc.c | 83 +++++++++++++++++++-----------
lib/eal/common/eal_filesystem.h | 13 ++++-
3 files changed, 70 insertions(+), 32 deletions(-)
diff --git a/lib/eal/common/eal_common_config.c b/lib/eal/common/eal_common_config.c
index 7fc7611a07..e2e69a75fb 100644
--- a/lib/eal/common/eal_common_config.c
+++ b/lib/eal/common/eal_common_config.c
@@ -6,6 +6,7 @@
#include <eal_export.h>
#include "eal_private.h"
+#include "eal_filesystem.h"
#include "eal_memcfg.h"
/* early configuration structure, when memory config is not mmapped */
@@ -24,7 +25,7 @@ static struct rte_config rte_config = {
};
/* platform-specific runtime dir */
-static char runtime_dir[PATH_MAX];
+static char runtime_dir[UNIX_PATH_MAX];
/* internal configuration */
static struct internal_config internal_config;
@@ -39,7 +40,8 @@ rte_eal_get_runtime_dir(void)
int
eal_set_runtime_dir(const char *run_dir)
{
- if (strlcpy(runtime_dir, run_dir, PATH_MAX) >= PATH_MAX) {
+ /* runtime directory limited by maximum allowable unix domain socket */
+ if (strlcpy(runtime_dir, run_dir, UNIX_PATH_MAX) >= UNIX_PATH_MAX) {
EAL_LOG(ERR, "Runtime directory string too long");
return -1;
}
diff --git a/lib/eal/common/eal_common_proc.c b/lib/eal/common/eal_common_proc.c
index 62fd4ba88f..dbf749c5b8 100644
--- a/lib/eal/common/eal_common_proc.c
+++ b/lib/eal/common/eal_common_proc.c
@@ -36,10 +36,10 @@
static RTE_ATOMIC(int) mp_fd = -1;
static rte_thread_t mp_handle_tid;
-static char mp_filter[PATH_MAX]; /* Filter for secondary process sockets */
-static char mp_dir_path[PATH_MAX]; /* The directory path for all mp sockets */
+static char mp_filter[UNIX_PATH_MAX]; /* Filter for secondary process sockets */
+static char mp_dir_path[UNIX_PATH_MAX]; /* The directory path for all mp sockets */
static pthread_mutex_t mp_mutex_action = PTHREAD_MUTEX_INITIALIZER;
-static char peer_name[PATH_MAX];
+static char peer_name[UNIX_PATH_MAX];
struct action_entry {
TAILQ_ENTRY(action_entry) next;
@@ -78,7 +78,7 @@ struct pending_request {
REQUEST_TYPE_SYNC,
REQUEST_TYPE_ASYNC
} type;
- char dst[PATH_MAX];
+ char dst[UNIX_PATH_MAX];
struct rte_mp_msg *request;
struct rte_mp_msg *reply;
int reply_received;
@@ -132,15 +132,19 @@ find_pending_request(const char *dst, const char *act_name)
return r;
}
-static void
-create_socket_path(const char *name, char *buf, int len)
+static int
+create_socket_path(const char *name, char *buf, size_t len)
{
const char *prefix = eal_mp_socket_path();
- if (strlen(name) > 0)
- snprintf(buf, len, "%s_%s", prefix, name);
- else
- strlcpy(buf, prefix, len);
+ if (strlen(name) > 0) {
+ if (snprintf(buf, len, "%s_%s", prefix, name) >= (int)len)
+ return -1;
+ } else {
+ if (strlcpy(buf, prefix, len) >= len)
+ return -1;
+ }
+ return 0;
}
RTE_EXPORT_SYMBOL(rte_eal_primary_proc_alive)
@@ -572,6 +576,11 @@ open_socket_fd(void)
snprintf(peer_name, sizeof(peer_name),
"%d_%"PRIx64, getpid(), rte_rdtsc());
+ if (create_socket_path(peer_name, un.sun_path, sizeof(un.sun_path)) < 0) {
+ EAL_LOG(ERR, "peer '%s' socket path too long", peer_name);
+ return -1;
+ }
+
mp_fd = socket(AF_UNIX, SOCK_DGRAM, 0);
if (mp_fd < 0) {
EAL_LOG(ERR, "failed to create unix socket");
@@ -581,8 +590,6 @@ open_socket_fd(void)
memset(&un, 0, sizeof(un));
un.sun_family = AF_UNIX;
- create_socket_path(peer_name, un.sun_path, sizeof(un.sun_path));
-
unlink(un.sun_path); /* May still exist since last run */
if (bind(mp_fd, (struct sockaddr *)&un, sizeof(un)) < 0) {
@@ -599,17 +606,20 @@ open_socket_fd(void)
static void
close_socket_fd(int fd)
{
- char path[PATH_MAX];
+ char path[UNIX_PATH_MAX];
close(fd);
- create_socket_path(peer_name, path, sizeof(path));
- unlink(path);
+
+ if (create_socket_path(peer_name, path, sizeof(path)) < 0)
+ EAL_LOG(ERR, "file prefix path for peerr '%s' too long", peer_name);
+ else
+ unlink(path);
}
int
rte_mp_channel_init(void)
{
- char path[PATH_MAX];
+ char path[UNIX_PATH_MAX];
int dir_fd;
const struct internal_config *internal_conf =
eal_get_internal_configuration();
@@ -624,7 +634,12 @@ rte_mp_channel_init(void)
}
/* create filter path */
- create_socket_path("*", path, sizeof(path));
+ if (create_socket_path("*", path, sizeof(path)) < 0) {
+ EAL_LOG(ERR, "file prefix path too long");
+ rte_errno = ENAMETOOLONG;
+ return -1;
+ }
+
rte_basename(path, mp_filter, sizeof(mp_filter));
strlcpy(mp_dir_path, dirname(path), sizeof(mp_dir_path));
@@ -779,14 +794,17 @@ mp_send(struct rte_mp_msg *msg, const char *peer, int type)
}
while ((ent = readdir(mp_dir))) {
- char path[PATH_MAX];
+ char path[UNIX_PATH_MAX];
if (fnmatch(mp_filter, ent->d_name, 0) != 0)
continue;
- snprintf(path, sizeof(path), "%s/%s", mp_dir_path,
- ent->d_name);
- if (send_msg(path, msg, type) < 0)
+ if (snprintf(path, sizeof(path), "%s/%s",
+ mp_dir_path, ent->d_name) >= (int)sizeof(path)) {
+ EAL_LOG(ERR, "Unix domain path %s/%s too long",
+ mp_dir_path, ent->d_name);
+ ret = -1;
+ } else if (send_msg(path, msg, type) < 0)
ret = -1;
}
/* unlock the dir */
@@ -1055,13 +1073,18 @@ rte_mp_request_sync(struct rte_mp_msg *req, struct rte_mp_reply *reply,
pthread_mutex_lock(&pending_requests.lock);
while ((ent = readdir(mp_dir))) {
- char path[PATH_MAX];
+ char path[UNIX_PATH_MAX];
if (fnmatch(mp_filter, ent->d_name, 0) != 0)
continue;
- snprintf(path, sizeof(path), "%s/%s", mp_dir_path,
- ent->d_name);
+ if (snprintf(path, sizeof(path), "%s/%s",
+ mp_dir_path, ent->d_name) >= (int)sizeof(path)) {
+ EAL_LOG(ERR, "Unix domain socket path '%s/%s' too long",
+ mp_dir_path, ent->d_name);
+ rte_errno = ENAMETOOLONG;
+ goto unlock_end;
+ }
/* unlocks the mutex while waiting for response,
* locks on receive
@@ -1200,15 +1223,17 @@ rte_mp_request_async(struct rte_mp_msg *req, const struct timespec *ts,
}
while ((ent = readdir(mp_dir))) {
- char path[PATH_MAX];
+ char path[UNIX_PATH_MAX];
if (fnmatch(mp_filter, ent->d_name, 0) != 0)
continue;
- snprintf(path, sizeof(path), "%s/%s", mp_dir_path,
- ent->d_name);
-
- if (mp_request_async(path, copy, param, ts))
+ if (snprintf(path, sizeof(path), "%s/%s",
+ mp_dir_path, ent->d_name) >= (int)sizeof(path)) {
+ EAL_LOG(ERR, "Unix domain path %s/%s too long",
+ mp_dir_path, ent->d_name);
+ ret = -1;
+ } else if (mp_request_async(path, copy, param, ts))
ret = -1;
}
/* if we didn't send anything, put dummy request on the queue */
diff --git a/lib/eal/common/eal_filesystem.h b/lib/eal/common/eal_filesystem.h
index 5d21f07c20..2de88d7cc2 100644
--- a/lib/eal/common/eal_filesystem.h
+++ b/lib/eal/common/eal_filesystem.h
@@ -45,10 +45,21 @@ eal_runtime_config_path(void)
/** Path of primary/secondary communication unix socket file. */
#define MP_SOCKET_FNAME "mp_socket"
+
+#ifdef RTE_EXEC_ENV_WINDOWS
+#include <winsock2.h>
+#include <afunix.h>
+#else
+#include <sys/un.h>
+
+/** Maximum length of unix domain socket path. */
+#define UNIX_PATH_MAX (sizeof(((struct sockaddr_un *)0)->sun_path))
+#endif
+
static inline const char *
eal_mp_socket_path(void)
{
- static char buffer[PATH_MAX]; /* static so auto-zeroed */
+ static char buffer[UNIX_PATH_MAX]; /* static so auto-zeroed */
snprintf(buffer, sizeof(buffer), "%s/%s", rte_eal_get_runtime_dir(),
MP_SOCKET_FNAME);
--
2.51.0
next prev parent reply other threads:[~2025-12-23 18:15 UTC|newest]
Thread overview: 107+ messages / expand[flat|nested] mbox.gz Atom feed top
2025-12-02 17:24 [RFC 0/8] first steps in fixing buffer overflow Stephen Hemminger
2025-12-02 17:24 ` [RFC 1/8] eal: use C library to parse filesystem table Stephen Hemminger
2025-12-02 17:24 ` [RFC 2/8] hash: fix possible ring name overflow Stephen Hemminger
2025-12-02 17:24 ` [RFC 3/8] eal: warn if thread name is truncated Stephen Hemminger
2025-12-02 17:24 ` [RFC 4/8] eal: avoid format overflow when handling addresses Stephen Hemminger
2025-12-02 17:24 ` [RFC 5/8] ethdev: avoid possible overflow in xstat names Stephen Hemminger
2025-12-02 17:24 ` [RFC 6/8] efd: avoid overflowing ring name Stephen Hemminger
2025-12-02 17:24 ` [RFC 7/8] eal: add check for sysfs path overflow Stephen Hemminger
2025-12-02 17:24 ` [RFC 8/8] eal: limit maximum runtime directory and socket paths Stephen Hemminger
2025-12-05 2:28 ` [RFC v2 00/14] lib: check for string overflow Stephen Hemminger
2025-12-05 2:28 ` [RFC v2 01/14] eal: use C library to parse filesystem table Stephen Hemminger
2025-12-05 2:28 ` [RFC v2 02/14] test: avoid long hash names Stephen Hemminger
2025-12-05 8:29 ` Bruce Richardson
2025-12-05 17:00 ` Stephen Hemminger
2025-12-05 18:19 ` Bruce Richardson
2025-12-05 2:28 ` [RFC v2 03/14] lpm: restrict name size Stephen Hemminger
2025-12-05 2:28 ` [RFC v2 04/14] hash: avoid possible ring name overflow Stephen Hemminger
2025-12-05 2:28 ` [RFC v2 05/14] graph: avoid overflowing comment buffer Stephen Hemminger
2025-12-05 2:28 ` [RFC v2 06/14] eal: warn if thread name is truncated Stephen Hemminger
2025-12-05 8:32 ` Bruce Richardson
2025-12-05 2:28 ` [RFC v2 07/14] eal: avoid format overflow when handling addresses Stephen Hemminger
2025-12-05 2:28 ` [RFC v2 08/14] ethdev: avoid possible overflow in xstat names Stephen Hemminger
2025-12-05 8:34 ` Bruce Richardson
2025-12-05 2:28 ` [RFC v2 09/14] vhost: check for overflow in xstat name Stephen Hemminger
2025-12-05 2:28 ` [RFC v2 10/14] efd: avoid overflowing ring name Stephen Hemminger
2025-12-05 8:37 ` Bruce Richardson
2025-12-05 2:28 ` [RFC v2 11/14] eal: add check for sysfs path overflow Stephen Hemminger
2025-12-05 2:28 ` [RFC v2 12/14] eal: limit maximum runtime directory and socket paths Stephen Hemminger
2025-12-05 8:46 ` Bruce Richardson
2025-12-05 2:28 ` [RFC v2 13/14] eal: check for hugefile path overflow Stephen Hemminger
2025-12-05 2:28 ` [RFC v2 14/14] lib: enable format overflow warnings Stephen Hemminger
2025-12-05 20:11 ` [PATCH v3 00/16] lib: find and fix possible string overflows Stephen Hemminger
2025-12-05 20:11 ` [PATCH v3 01/16] eal: use C library to parse filesystem table Stephen Hemminger
2025-12-05 20:11 ` [PATCH v3 02/16] lpm: restrict name size Stephen Hemminger
2025-12-05 20:11 ` [PATCH v3 03/16] hash: add checks for hash name length Stephen Hemminger
2025-12-05 20:11 ` [PATCH v3 04/16] graph: avoid overflowing comment buffer Stephen Hemminger
2025-12-05 20:11 ` [PATCH v3 05/16] latencystats: add check for string overflow Stephen Hemminger
2025-12-05 20:11 ` [PATCH v3 06/16] efd: handle possible name truncation Stephen Hemminger
2025-12-05 20:11 ` [PATCH v3 07/16] eal: warn if thread name is truncated Stephen Hemminger
2025-12-05 20:11 ` [PATCH v3 08/16] eal: avoid format overflow when handling addresses Stephen Hemminger
2025-12-05 20:11 ` [PATCH v3 09/16] eal: add check for sysfs path overflow Stephen Hemminger
2025-12-05 20:11 ` [PATCH v3 10/16] eal: limit maximum runtime directory and socket paths Stephen Hemminger
2025-12-08 8:58 ` Bruce Richardson
2025-12-08 19:14 ` Stephen Hemminger
2025-12-05 20:11 ` [PATCH v3 11/16] eal: check for hugefile path overflow Stephen Hemminger
2025-12-05 20:11 ` [PATCH v3 12/16] eal: check tailq length Stephen Hemminger
2025-12-08 8:58 ` Bruce Richardson
2025-12-05 20:11 ` [PATCH v3 13/16] eal: handle long shared library path Stephen Hemminger
2025-12-05 20:11 ` [PATCH v3 14/16] ethdev: avoid possible overflow in xstat names Stephen Hemminger
2025-12-05 20:11 ` [PATCH v3 15/16] vhost: check for overflow in xstat name Stephen Hemminger
2025-12-05 20:11 ` [PATCH v3 16/16] lib: enable format overflow warnings Stephen Hemminger
2025-12-06 18:43 ` [PATCH v4 00/16] lib: find and fix possible string overflows Stephen Hemminger
2025-12-06 18:43 ` [PATCH v4 01/16] eal: use C library to parse filesystem table Stephen Hemminger
2025-12-06 18:43 ` [PATCH v4 02/16] lpm: restrict name size Stephen Hemminger
2025-12-06 18:43 ` [PATCH v4 03/16] hash: add checks for hash name length Stephen Hemminger
2025-12-06 18:43 ` [PATCH v4 04/16] graph: avoid overflowing comment buffer Stephen Hemminger
2025-12-06 18:43 ` [PATCH v4 05/16] latencystats: add check for string overflow Stephen Hemminger
2025-12-06 18:43 ` [PATCH v4 06/16] efd: handle possible name truncation Stephen Hemminger
2025-12-06 18:43 ` [PATCH v4 07/16] eal: warn if thread name is truncated Stephen Hemminger
2025-12-06 18:43 ` [PATCH v4 08/16] eal: avoid format overflow when handling addresses Stephen Hemminger
2025-12-06 18:43 ` [PATCH v4 09/16] eal: add check for sysfs path overflow Stephen Hemminger
2025-12-06 18:43 ` [PATCH v4 10/16] eal: limit maximum runtime directory and socket paths Stephen Hemminger
2025-12-06 18:43 ` [PATCH v4 11/16] eal: check for hugefile path overflow Stephen Hemminger
2025-12-06 18:43 ` [PATCH v4 12/16] eal: check tailq length Stephen Hemminger
2025-12-06 18:43 ` [PATCH v4 13/16] eal: handle long shared library path Stephen Hemminger
2025-12-06 18:43 ` [PATCH v4 14/16] ethdev: avoid possible overflow in xstat names Stephen Hemminger
2025-12-06 18:43 ` [PATCH v4 15/16] vhost: check for overflow in xstat name Stephen Hemminger
2025-12-06 18:43 ` [PATCH v4 16/16] lib: enable format overflow warnings Stephen Hemminger
2025-12-07 19:11 ` [PATCH v5 00/17] lib: fix format overflows Stephen Hemminger
2025-12-07 19:11 ` [PATCH v5 01/17] eal: use C library to parse filesystem table Stephen Hemminger
2025-12-07 19:11 ` [PATCH v5 02/17] lpm: restrict name size Stephen Hemminger
2025-12-07 19:11 ` [PATCH v5 03/17] hash: add checks for hash name length Stephen Hemminger
2025-12-07 19:11 ` [PATCH v5 04/17] graph: avoid overflowing comment buffer Stephen Hemminger
2025-12-07 19:11 ` [PATCH v5 05/17] latencystats: add check for string overflow Stephen Hemminger
2025-12-07 19:11 ` [PATCH v5 06/17] telemetry: avoid possible " Stephen Hemminger
2025-12-07 19:11 ` [PATCH v5 07/17] efd: handle possible name truncation Stephen Hemminger
2025-12-07 19:11 ` [PATCH v5 08/17] eal: warn if thread name is truncated Stephen Hemminger
2025-12-07 19:12 ` [PATCH v5 09/17] eal: avoid format overflow when handling addresses Stephen Hemminger
2025-12-07 19:12 ` [PATCH v5 10/17] eal: add check for sysfs path overflow Stephen Hemminger
2025-12-07 19:12 ` [PATCH v5 11/17] eal: limit maximum runtime directory and socket paths Stephen Hemminger
2025-12-07 19:12 ` [PATCH v5 12/17] eal: check for hugefile path overflow Stephen Hemminger
2025-12-07 19:12 ` [PATCH v5 13/17] eal: check tailq length Stephen Hemminger
2025-12-07 19:12 ` [PATCH v5 14/17] eal: handle long shared library path Stephen Hemminger
2025-12-07 19:12 ` [PATCH v5 15/17] ethdev: avoid possible overflow in xstat names Stephen Hemminger
2025-12-07 19:12 ` [PATCH v5 16/17] vhost: check for overflow in xstat name Stephen Hemminger
2025-12-07 19:12 ` [PATCH v5 17/17] lib: enable format overflow warnings Stephen Hemminger
2025-12-16 23:20 ` [PATCH v5 00/17] lib: fix format overflows Patrick Robb
2025-12-17 6:57 ` Stephen Hemminger
2025-12-23 18:12 ` [PATCH v6 00/18] " Stephen Hemminger
2025-12-23 18:12 ` [PATCH v6 01/18] lpm: restrict name size Stephen Hemminger
2025-12-23 18:13 ` [PATCH v6 02/18] hash: add checks for hash name length Stephen Hemminger
2025-12-23 18:13 ` [PATCH v6 03/18] graph: avoid overflowing comment buffer Stephen Hemminger
2025-12-23 18:13 ` [PATCH v6 04/18] latencystats: add check for string overflow Stephen Hemminger
2025-12-23 18:13 ` [PATCH v6 05/18] telemetry: avoid possible " Stephen Hemminger
2025-12-23 18:13 ` [PATCH v6 06/18] efd: handle possible name truncation Stephen Hemminger
2025-12-23 18:13 ` [PATCH v6 07/18] eal: use C library to parse filesystem table Stephen Hemminger
2025-12-23 18:13 ` [PATCH v6 08/18] eal: warn if thread name is truncated Stephen Hemminger
2025-12-23 18:13 ` [PATCH v6 09/18] eal: avoid format overflow when handling addresses Stephen Hemminger
2025-12-23 18:13 ` [PATCH v6 10/18] eal: add check for sysfs path overflow Stephen Hemminger
2025-12-23 18:13 ` Stephen Hemminger [this message]
2025-12-23 18:13 ` [PATCH v6 12/18] eal: check for hugefile " Stephen Hemminger
2025-12-23 18:13 ` [PATCH v6 13/18] eal: check tailq length Stephen Hemminger
2025-12-23 18:13 ` [PATCH v6 14/18] eal: handle long shared library path Stephen Hemminger
2025-12-23 18:13 ` [PATCH v6 15/18] ethdev: avoid possible overflow in xstat names Stephen Hemminger
2025-12-23 18:13 ` [PATCH v6 16/18] vhost: check for overflow in xstat name Stephen Hemminger
2025-12-23 18:13 ` [PATCH v6 17/18] cfgfile: add length checks and increase line buffer Stephen Hemminger
2025-12-23 18:13 ` [PATCH v6 18/18] lib: enable format overflow warnings Stephen Hemminger
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20251223181418.40834-12-stephen@networkplumber.org \
--to=stephen@networkplumber.org \
--cc=bruce.richardson@intel.com \
--cc=dev@dpdk.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).