> -----Original Message----- > From: Peter Maydell [mailto:peter.mayd...@linaro.org] > Sent: Wednesday, July 3, 2019 6:31 PM > To: Zhang, Chen <chen.zh...@intel.com> > Cc: Li Zhijian <lizhij...@cn.fujitsu.com>; Jason Wang <jasow...@redhat.com>; > qemu-dev <qemu-devel@nongnu.org>; Zhang Chen <zhangc...@gmail.com> > Subject: Re: [PATCH] net/colo-compare.c: Fix memory leak and code style issue. > > On Wed, 3 Jul 2019 at 02:42, Zhang Chen <chen.zh...@intel.com> wrote: > > > > From: Zhang Chen <chen.zh...@intel.com> > > > > Address Peter's comments in patch "COLO-compare:Add colo-compare > > remote notify support". > > > > Signed-off-by: Zhang Chen <chen.zh...@intel.com> > > --- > > net/colo-compare.c | 13 ++++++------- > > 1 file changed, 6 insertions(+), 7 deletions(-) > > > > diff --git a/net/colo-compare.c b/net/colo-compare.c index > > 909dd6c6eb..363b1edd11 100644 > > --- a/net/colo-compare.c > > +++ b/net/colo-compare.c > > @@ -1008,21 +1008,20 @@ static void > > compare_notify_rs_finalize(SocketReadState *notify_rs) { > > CompareState *s = container_of(notify_rs, CompareState, > > notify_rs); > > > > - /* Get Xen colo-frame's notify and handle the message */ > > - char *data = g_memdup(notify_rs->buf, notify_rs->packet_len); > > - char msg[] = "COLO_COMPARE_GET_XEN_INIT"; > > + const char msg[] = "COLO_COMPARE_GET_XEN_INIT"; > > int ret; > > > > - if (!strcmp(data, "COLO_USERSPACE_PROXY_INIT")) { > > + if (!strcmp((char *)notify_rs->buf, "COLO_USERSPACE_PROXY_INIT")) > > + { > > This is (still) assuming that the buffer you're passed in has a NUL-terminated > string: if not, it could run off the end of it. What you want to check is: > (1) is the packet_len long enough for the string we're looking for (including > the > terminating NUL) and > (2) if so, does a simple "compare these N bytes" check match? > > Something like > > static bool packet_matches_str(const char *str, uint8_t *buf, uint32_t > packet_len) > { > if (packet_len <= strlen(str)) { > return false; > } > return !memcmp(str, buf, strlen(str) + 1); } > > might be a useful utility function. (notice that we are including the NUL > byte in > our comparison check). > > In general this code doesn't seem to have been written with an eye to the > packet contents being possibly-malicious. For instance > colo_compare_packet_payload() doesn't seem to check that the packets > actually are both long enough for the length being compared. This could > perhaps do with some review/audit by somebody.
OK, I will fix it in next version. About the issues of colo_compare_packet_payload(), I will send another patch to fix. Thanks Zhang Chen > > thanks > -- PMM