[RFC 0/8] first steps in fixing buffer overflow
Stephen Hemminger
stephen at networkplumber.org
Tue Dec 2 18:24:26 CET 2025
This is preliminary work to fix the format overflow issues
in EAL and related libraries. The biggest problem area
still needing work is all the cases where the created
path for <runtime_dir>/XXX could overflow the maximum limit
which is only 108 characters due to Unix Domain socket
restrictions.
Stephen Hemminger (8):
eal: use C library to parse filesystem table
hash: fix possible ring name overflow
eal: warn if thread name is truncated
eal: avoid format overflow when handling addresses
ethdev: avoid possible overflow in xstat names
efd: avoid overflowing ring name
eal: add check for sysfs path overflow
eal: limit maximum runtime directory and socket paths
lib/eal/common/eal_common_config.c | 6 ++-
lib/eal/common/eal_common_memory.c | 2 +-
lib/eal/common/eal_common_proc.c | 18 ++++-----
lib/eal/common/eal_filesystem.h | 6 ++-
lib/eal/linux/eal.c | 6 ++-
lib/eal/linux/eal_hugepage_info.c | 64 +++++++++++-------------------
lib/efd/rte_efd.c | 20 +++++++++-
lib/ethdev/rte_ethdev.c | 27 +++++++++----
lib/hash/rte_cuckoo_hash.c | 33 +++++++++++----
9 files changed, 110 insertions(+), 72 deletions(-)
--
2.51.0
More information about the dev
mailing list