[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [PATCH 2/4] tools: allow vchan XenStore paths more then 64 bytes long
Hello Juergen, пн, 11 июл. 2022 г. в 10:24, Juergen Gross <jgross@xxxxxxxx>: > > On 09.07.22 12:10, dmitry.semenets@xxxxxxxxx wrote: > > From: Oleksandr Andrushchenko <oleksandr_andrushchenko@xxxxxxxx> > > > > Current vchan implementation, while dealing with XenStore paths, > > allocates 64 bytes buffer on the stack which may not be enough for > > some use-cases. Make the buffer longer to respect maximum allowed > > XenStore path of XENSTORE_ABS_PATH_MAX. > > > > Signed-off-by: Oleksandr Andrushchenko <oleksandr_andrushchenko@xxxxxxxx> > > --- > > tools/libs/vchan/init.c | 28 ++++++++++++++++++++++------ > > 1 file changed, 22 insertions(+), 6 deletions(-) > > > > diff --git a/tools/libs/vchan/init.c b/tools/libs/vchan/init.c > > index c6b8674ef5..17945c24a1 100644 > > --- a/tools/libs/vchan/init.c > > +++ b/tools/libs/vchan/init.c > > @@ -249,7 +249,7 @@ static int init_xs_srv(struct libxenvchan *ctrl, int > > domain, const char* xs_base > > int ret = -1; > > struct xs_handle *xs; > > struct xs_permissions perms[2]; > > - char buf[64]; > > + char *buf; > > char ref[16]; > > char* domid_str = NULL; > > xs_transaction_t xs_trans = XBT_NULL; > > @@ -257,6 +257,12 @@ static int init_xs_srv(struct libxenvchan *ctrl, int > > domain, const char* xs_base > > // store the base path so we can clean up on server closure > > ctrl->xs_path = strdup(xs_base); > > > > + buf = malloc(XENSTORE_ABS_PATH_MAX); > > + if (!buf) { > > + free(ctrl); > > + return 0; > > + } > > + > > xs = xs_open(0); > > if (!xs) > > goto fail; > > @@ -278,14 +284,14 @@ retry_transaction: > > goto fail_xs_open; > > > > snprintf(ref, sizeof ref, "%d", ring_ref); > > - snprintf(buf, sizeof buf, "%s/ring-ref", xs_base); > > + snprintf(buf, XENSTORE_ABS_PATH_MAX, "%s/ring-ref", xs_base); > > if (!xs_write(xs, xs_trans, buf, ref, strlen(ref))) > > goto fail_xs_open; > > if (!xs_set_permissions(xs, xs_trans, buf, perms, 2)) > > goto fail_xs_open; > > > > snprintf(ref, sizeof ref, "%d", ctrl->event_port); > > - snprintf(buf, sizeof buf, "%s/event-channel", xs_base); > > + snprintf(buf, XENSTORE_ABS_PATH_MAX, "%s/event-channel", xs_base); > > if (!xs_write(xs, xs_trans, buf, ref, strlen(ref))) > > goto fail_xs_open; > > if (!xs_set_permissions(xs, xs_trans, buf, perms, 2)) > > @@ -301,6 +307,7 @@ retry_transaction: > > free(domid_str); > > xs_close(xs); > > fail: > > + free(buf); > > return ret; > > } > > > > @@ -418,13 +425,20 @@ struct libxenvchan *libxenvchan_client_init(struct > > xentoollog_logger *logger, > > { > > struct libxenvchan *ctrl = malloc(sizeof(struct libxenvchan)); > > struct xs_handle *xs = NULL; > > - char buf[64]; > > + char *buf; > > char *ref; > > int ring_ref; > > unsigned int len; > > > > if (!ctrl) > > return 0; > > + > > + buf = malloc(XENSTORE_ABS_PATH_MAX); > > + if (!buf) { > > + free(ctrl); > > + return 0; > > + } > > + > > ctrl->ring = NULL; > > ctrl->event = NULL; > > ctrl->gnttab = NULL; > > @@ -435,8 +449,9 @@ struct libxenvchan *libxenvchan_client_init(struct > > xentoollog_logger *logger, > > if (!xs) > > goto fail; > > You are leaking buf in this case. No. buf released in line 474. ctrl leaks in fail case > > > > > + > > // find xenstore entry > > - snprintf(buf, sizeof buf, "%s/ring-ref", xs_path); > > + snprintf(buf, XENSTORE_ABS_PATH_MAX, "%s/ring-ref", xs_path); > > ref = xs_read(xs, 0, buf, &len); > > if (!ref) > > goto fail; > > @@ -444,7 +459,7 @@ struct libxenvchan *libxenvchan_client_init(struct > > xentoollog_logger *logger, > > free(ref); > > if (!ring_ref) > > goto fail; > > - snprintf(buf, sizeof buf, "%s/event-channel", xs_path); > > + snprintf(buf, XENSTORE_ABS_PATH_MAX, "%s/event-channel", xs_path); > > ref = xs_read(xs, 0, buf, &len); > > if (!ref) > > goto fail; > > @@ -474,6 +489,7 @@ struct libxenvchan *libxenvchan_client_init(struct > > xentoollog_logger *logger, > > out: > > if (xs) > > xs_close(xs); > > + free(buf); > > return ctrl; > > fail: > > libxenvchan_close(ctrl); > > Juergen
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |