Skip to content

Commit

Permalink
DM: using 'strncpy' coding style cleanup
Browse files Browse the repository at this point in the history
- check buffer boundaries to avoid buffer overflow

Signed-off-by: Yonghua Huang <yonghua.huang@intel.com>
  • Loading branch information
yonghuah authored and lijinxia committed May 25, 2018
1 parent 2f3953a commit 71975d6
Show file tree
Hide file tree
Showing 5 changed files with 16 additions and 16 deletions.
13 changes: 9 additions & 4 deletions devicemodel/core/hugetlb.c
Expand Up @@ -108,6 +108,7 @@ static int open_hugetlbfs(struct vmctx *ctx, int level)
char uuid_str[48];
uint8_t UUID[16];
char *path;
size_t len;
struct statfs fs;

if (level >= HUGETLB_LV_MAX) {
Expand All @@ -116,10 +117,12 @@ static int open_hugetlbfs(struct vmctx *ctx, int level)
}

path = hugetlb_priv[level].node_path;
memset(path, '\0', MAX_PATH_LEN);
strncpy(path, hugetlb_priv[level].mount_path, MAX_PATH_LEN);

len = strnlen(path, MAX_PATH_LEN);
/* UUID will use 32 bytes */
if (strnlen(path, MAX_PATH_LEN) + 32 > MAX_PATH_LEN) {
if (len + 32 > MAX_PATH_LEN) {
perror("PATH overflow");
return -ENOMEM;
}
Expand All @@ -132,6 +135,7 @@ static int open_hugetlbfs(struct vmctx *ctx, int level)
UUID[8], UUID[9], UUID[10], UUID[11],
UUID[12], UUID[13], UUID[14], UUID[15]);

*(path + len) = '\0';
strncat(path, uuid_str, strlen(uuid_str));

printf("open hugetlbfs file %s\n", path);
Expand Down Expand Up @@ -284,7 +288,8 @@ static int mmap_hugetlbfs_highmem(struct vmctx *ctx)
static int create_hugetlb_dirs(int level)
{
char tmp_path[MAX_PATH_LEN], *path;
int i, len;
int i;
size_t len;

if (level >= HUGETLB_LV_MAX) {
perror("exceed max hugetlb level");
Expand All @@ -293,8 +298,8 @@ static int create_hugetlb_dirs(int level)

path = hugetlb_priv[level].mount_path;
len = strlen(path);
if (len >= MAX_PATH_LEN) {
perror("exceed max path len");
if (len >= MAX_PATH_LEN || len == 0) {
perror("invalid path len");
return -EINVAL;
}

Expand Down
6 changes: 2 additions & 4 deletions devicemodel/core/sw_load_bzimage.c
Expand Up @@ -131,8 +131,7 @@ acrn_parse_kernel(char *arg)
size_t len = strlen(arg);

if (len < STR_LEN) {
strncpy(kernel_path, arg, len);
kernel_path[len] = '\0';
strncpy(kernel_path, arg, len + 1);
if (check_image(kernel_path) != 0){
fprintf(stderr, "SW_LOAD: check_image failed for '%s'\n",
kernel_path);
Expand All @@ -151,8 +150,7 @@ acrn_parse_ramdisk(char *arg)
size_t len = strlen(arg);

if (len < STR_LEN) {
strncpy(ramdisk_path, arg, len);
ramdisk_path[len] = '\0';
strncpy(ramdisk_path, arg, len + 1);
if (check_image(ramdisk_path) != 0){
fprintf(stderr, "SW_LOAD: check_image failed for '%s'\n",
ramdisk_path);
Expand Down
3 changes: 1 addition & 2 deletions devicemodel/core/sw_load_common.c
Expand Up @@ -104,8 +104,7 @@ acrn_parse_bootargs(char *arg)
size_t len = strlen(arg);

if (len < STR_LEN) {
strncpy(bootargs, arg, len);
bootargs[len] = '\0';
strncpy(bootargs, arg, len + 1);
with_bootargs = 1;
printf("SW_LOAD: get bootargs %s\n", bootargs);
return 0;
Expand Down
6 changes: 2 additions & 4 deletions devicemodel/core/sw_load_vsbl.c
Expand Up @@ -111,8 +111,7 @@ acrn_parse_guest_part_info(char *arg)
size_t len = strlen(arg);

if (len < STR_LEN) {
strncpy(guest_part_info_path, arg, len);
guest_part_info_path[len] = '\0';
strncpy(guest_part_info_path, arg, len + 1);
assert(check_image(guest_part_info_path) == 0);

with_guest_part_info = true;
Expand Down Expand Up @@ -172,8 +171,7 @@ acrn_parse_vsbl(char *arg)
size_t len = strlen(arg);

if (len < STR_LEN) {
strncpy(vsbl_path, arg, len);
vsbl_path[len] = '\0';
strncpy(vsbl_path, arg, len + 1);
assert(check_image(vsbl_path) == 0);

vsbl_file_name = vsbl_path;
Expand Down
4 changes: 2 additions & 2 deletions devicemodel/hw/platform/acpi/acpi.c
Expand Up @@ -922,7 +922,7 @@ basl_make_templates(void)
len = strlen(tmpdir);

if ((len + sizeof(ASL_TEMPLATE) + 1) < MAXPATHLEN) {
strncpy(basl_template, tmpdir, len);
strncpy(basl_template, tmpdir, len + 1);
while (len > 0 && basl_template[len - 1] == '/')
len--;
basl_template[len] = '/';
Expand All @@ -937,7 +937,7 @@ basl_make_templates(void)
*/
if ((len + sizeof(ASL_TEMPLATE) + 1 +
sizeof(ASL_SUFFIX)) < MAXPATHLEN) {
strncpy(basl_stemplate, tmpdir, len);
strncpy(basl_stemplate, tmpdir, len + 1);
basl_stemplate[len] = '/';
strncpy(&basl_stemplate[len + 1], ASL_TEMPLATE,
MAXPATHLEN - len - 1);
Expand Down

0 comments on commit 71975d6

Please sign in to comment.