[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [PATCH] tools/xenstored: Fix off-by-one in dump_state_nodes()
From: Julien Grall <jgrall@xxxxxxxxxx> The maximum path length supported by Xenstored protocol is XENSTORE_ABS_PATH_MAX (i.e 3072). This doesn't take into account the NUL at the end of the path. However, the code to dump the nodes will allocate a buffer of XENSTORE_ABS_PATH. As a result it may not be possible to live-update if there is a node name of XENSTORE_ABS_PATH. Fix it by allocating a buffer of XENSTORE_ABS_PATH_MAX + 1 characters. Take the opportunity to pass the max length of the buffer as a parameter of dump_state_node_tree(). This will be clearer that the check in the function is linked to the allocation in dump_state_nodes(). Signed-off-by: Julien Grall <jgrall@xxxxxxxxxx> --- This was spotted when backporting Live-Update to 4.11 because the commit 924bf8c793 "tools/xenstore: rework path length check" is not present. On the latest upstream, this is looks more a latent bug because I didn't manage to create such large node. (4.11) 42sh# xenstore-write $(python -c "print('/' + 'A' * 3071)") "" 42sh# xenstore-control live-update /usr/local/sbin/xenstored Starting live update failed: Dump node path length error --- tools/xenstore/xenstored_core.c | 11 ++++++----- 1 file changed, 6 insertions(+), 5 deletions(-) diff --git a/tools/xenstore/xenstored_core.c b/tools/xenstore/xenstored_core.c index 16c856730c55..0d4c73d6e20c 100644 --- a/tools/xenstore/xenstored_core.c +++ b/tools/xenstore/xenstored_core.c @@ -2574,7 +2574,8 @@ const char *dump_state_node_perms(FILE *fp, const struct xs_permissions *perms, return NULL; } -static const char *dump_state_node_tree(FILE *fp, char *path) +static const char *dump_state_node_tree(FILE *fp, char *path, + unsigned int path_max_len) { unsigned int pathlen, childlen, p = 0; struct xs_state_record_header head; @@ -2642,10 +2643,10 @@ static const char *dump_state_node_tree(FILE *fp, char *path) } while (p < hdr->childlen) { childlen = strlen(child) + 1; - if (pathlen + childlen > XENSTORE_ABS_PATH_MAX) + if (pathlen + childlen > path_max_len) return "Dump node path length error"; strcpy(path + pathlen, child); - ret = dump_state_node_tree(fp, path); + ret = dump_state_node_tree(fp, path, path_max_len); if (ret) return ret; p += childlen; @@ -2661,13 +2662,13 @@ const char *dump_state_nodes(FILE *fp, const void *ctx) { char *path; - path = talloc_size(ctx, XENSTORE_ABS_PATH_MAX); + path = talloc_size(ctx, XENSTORE_ABS_PATH_MAX + 1); if (!path) return "Path buffer allocation error"; strcpy(path, "/"); - return dump_state_node_tree(fp, path); + return dump_state_node_tree(fp, path, XENSTORE_ABS_PATH_MAX + 1); } void read_state_global(const void *ctx, const void *state) -- 2.17.1
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |