From: Matthias Gerstner <matthias.gerstner@suse.de>
To: connman@lists.linux.dev
Subject: [PATCH 14/16] dnsproxy: harmonize use of sizeof() for message size calculations
Date: Fri, 10 Jun 2022 14:33:21 +0200 [thread overview]
Message-ID: <20220610123323.8974-15-matthias.gerstner@suse.de> (raw)
In-Reply-To: <20220610123323.8974-1-matthias.gerstner@suse.de>
---
src/dnsproxy.c | 31 +++++++++++++++++--------------
1 file changed, 17 insertions(+), 14 deletions(-)
diff --git a/src/dnsproxy.c b/src/dnsproxy.c
index 1371cbe36..e3f768da8 100644
--- a/src/dnsproxy.c
+++ b/src/dnsproxy.c
@@ -229,6 +229,9 @@ struct domain_rr {
#define DNS_HEADER_SIZE sizeof(struct domain_hdr)
#define DNS_HEADER_TCP_EXTRA_BYTES 2
#define DNS_TCP_HEADER_SIZE DNS_HEADER_SIZE + DNS_HEADER_TCP_EXTRA_BYTES
+#define DNS_QUESTION_SIZE sizeof(struct domain_question)
+#define DNS_RR_SIZE sizeof(struct domain_rr)
+#define DNS_QTYPE_QCLASS_SIZE sizeof(struct qtype_qclass)
enum dns_type {
/* IPv4 address 32-bit */
@@ -429,14 +432,14 @@ static void update_cached_ttl(unsigned char *ptr, int len, int new_ttl)
ptr += DNS_HEADER_SIZE;
len -= DNS_HEADER_SIZE;
- if (len < sizeof(struct domain_question) + 1)
+ if (len < DNS_QUESTION_SIZE + 1)
return;
/* skip the query, which is a name and a struct domain_question */
size_t name_len = dns_name_length(ptr);
- ptr += name_len + sizeof(struct domain_question);
- len -= name_len + sizeof(struct domain_question);;
+ ptr += name_len + DNS_QUESTION_SIZE;
+ len -= name_len + DNS_QUESTION_SIZE;
const uint32_t raw_ttl = ntohl((uint32_t)new_ttl);
struct domain_rr *rr = NULL;
@@ -962,10 +965,10 @@ static int parse_rr(const unsigned char *buf, const unsigned char *start,
if (*ttl < 0)
return -EINVAL;
- memcpy(response + offset, *end, sizeof(struct domain_rr));
+ memcpy(response + offset, *end, DNS_RR_SIZE);
- offset += sizeof(struct domain_rr);
- *end += sizeof(struct domain_rr);
+ offset += DNS_RR_SIZE;
+ *end += DNS_RR_SIZE;
if ((offset + *rdlen) > *response_size)
return -ENOBUFS;
@@ -1035,7 +1038,7 @@ static int parse_response(const unsigned char *buf, size_t buflen,
qlen = strlen(question);
ptr += qlen + 1; /* skip \0 */
- if ((eptr - ptr) < sizeof(struct domain_question))
+ if ((eptr - ptr) < DNS_QUESTION_SIZE)
return -EINVAL;
const struct domain_question *q = (void *) ptr;
@@ -1045,7 +1048,7 @@ static int parse_response(const unsigned char *buf, size_t buflen,
if (qtype != DNS_TYPE_A && qtype != DNS_TYPE_AAAA)
return -ENOMSG;
- ptr += sizeof(struct domain_question); /* advance to answers section */
+ ptr += DNS_QUESTION_SIZE; /* advance to answers section */
int err = -ENOMSG;
const uint16_t ancount = ntohs(hdr->ancount);
@@ -1567,7 +1570,7 @@ static int cache_update(struct server_data *srv, const char *msg, size_t msg_len
struct domain_question *q = (void *)ptr;
q->type = htons(type);
q->class = htons(class);
- ptr += sizeof(struct domain_question);
+ ptr += DNS_QUESTION_SIZE;
memcpy(ptr, response, rsplen);
@@ -2125,7 +2128,7 @@ static struct request_data* lookup_request(
debug("Received %zd bytes (id 0x%04x)", len, hdr->id);
- if (len < sizeof(struct domain_hdr) + offset)
+ if (len < DNS_HEADER_SIZE + offset)
return NULL;
struct request_data *req = find_request(hdr->id);
@@ -3025,7 +3028,7 @@ static int parse_request(unsigned char *buf, size_t len,
{
static const unsigned char opt_edns0_type[2] = { 0x00, 0x29 };
struct domain_hdr *hdr = (void *) buf;
- if (len < sizeof(*hdr) + sizeof(struct qtype_qclass)) {
+ if (len < DNS_HEADER_SIZE + DNS_QTYPE_QCLASS_SIZE) {
DBG("Dropped DNS request with short length %zd", len);
return -EINVAL;
}
@@ -3052,8 +3055,8 @@ static int parse_request(unsigned char *buf, size_t len,
name[0] = '\0';
- unsigned char *ptr = buf + sizeof(struct domain_hdr);
- size_t remain = len - sizeof(struct domain_hdr);
+ unsigned char *ptr = buf + DNS_HEADER_SIZE;
+ size_t remain = len - DNS_HEADER_SIZE;
size_t used = 0;
/* parse DNS query string into `name' out parameter */
@@ -3091,7 +3094,7 @@ static int parse_request(unsigned char *buf, size_t len,
remain -= label_len + 1;
}
- if (arcount && remain >= sizeof(struct domain_rr) + 1 && !ptr[0] &&
+ if (arcount && remain >= DNS_RR_SIZE + 1 && !ptr[0] &&
ptr[1] == opt_edns0_type[0] && ptr[2] == opt_edns0_type[1]) {
struct domain_rr *edns0 = (struct domain_rr *)(ptr + 1);
--
2.35.1
next prev parent reply other threads:[~2022-06-10 12:33 UTC|newest]
Thread overview: 19+ messages / expand[flat|nested] mbox.gz Atom feed top
2022-06-10 12:33 dnsproxy: first round of refactoring, TCP bugfix Matthias Gerstner
2022-06-10 12:33 ` [PATCH 01/16] dnsproxy-simple-test: improve test coverage and test flexibility Matthias Gerstner
2022-06-10 12:33 ` [PATCH 02/16] autoconf: require C99 compiler and set C99 mode Matthias Gerstner
2022-06-10 12:33 ` [PATCH 03/16] dnsproxy: first bits of refactoring data types, global variables, simpler functions Matthias Gerstner
2022-08-28 16:21 ` Daniel Wagner
2022-06-10 12:33 ` [PATCH 04/16] dnsproxy: refactoring of update_cached_ttl() and append_data() Matthias Gerstner
2022-06-10 12:33 ` [PATCH 05/16] dnsproxy: refactor parse_response() Matthias Gerstner
2022-06-10 12:33 ` [PATCH 06/16] dnsproxy: refactoring of cache_update() Matthias Gerstner
2022-06-10 12:33 ` [PATCH 07/16] dnsproxy: strip_domains(): fix out of bounds read access Matthias Gerstner
2022-06-10 12:33 ` [PATCH 08/16] dnsproxy: refactor and document strip_domains() to make it less confusing Matthias Gerstner
2022-06-10 12:33 ` [PATCH 09/16] dnsproxy: refactor ns_resolv() and forwards_dns_reply() Matthias Gerstner
2022-06-10 12:33 ` [PATCH 10/16] dnsproxy: uncompress: replace unnecessary goto with return statements Matthias Gerstner
2022-06-10 12:33 ` [PATCH 11/16] dnsproxy: forward_dns_reply: pull out separate dns_reply_fixup_domains() Matthias Gerstner
2022-06-10 12:33 ` [PATCH 12/16] dnsproxy: finish first pass of refactoring the compilation unit Matthias Gerstner
2022-06-10 12:33 ` [PATCH 13/16] dnsproxy: fix TCP server reply handling if domain name is appended Matthias Gerstner
2022-06-10 12:33 ` Matthias Gerstner [this message]
2022-06-10 12:33 ` [PATCH 15/16] dnsproxy: add my copyright statement covering the larger refactoring changes Matthias Gerstner
2022-06-10 12:33 ` [PATCH 16/16] dnsproxy: fix compiler warnings (differing signedness, empty format string) Matthias Gerstner
2022-10-18 8:47 dnsproxy: first round of refactoring, TCP bugfix Matthias Gerstner
2022-10-18 8:47 ` [PATCH 14/16] dnsproxy: harmonize use of sizeof() for message size calculations Matthias Gerstner
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20220610123323.8974-15-matthias.gerstner@suse.de \
--to=matthias.gerstner@suse.de \
--cc=connman@lists.linux.dev \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).