From: Lennart Poettering Date: Sat, 30 Dec 2017 14:15:44 +0000 (+0100) Subject: socket-util: slight rework of getpeersec() X-Git-Tag: v237~146^2~7 X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=217d89678269334f461e9abeeffed57077b21454;p=thirdparty%2Fsystemd.git socket-util: slight rework of getpeersec() Let's call getsockopt() in a loop, so that we can deal correctly with the label changing while we are trying to read it. (also, while we are at it, let's make sure that there's always one trailing NUL byte at the end of the buffer, after all SO_PEERSEC has zero documentation, and multiple implementing backends, hence let's better be safe than sorry) --- diff --git a/src/basic/socket-util.c b/src/basic/socket-util.c index d67fbd21372..cb10a1dd07a 100644 --- a/src/basic/socket-util.c +++ b/src/basic/socket-util.c @@ -979,41 +979,32 @@ int getpeercred(int fd, struct ucred *ucred) { } int getpeersec(int fd, char **ret) { + _cleanup_free_ char *s = NULL; socklen_t n = 64; - char *s; - int r; assert(fd >= 0); assert(ret); - s = new0(char, n); - if (!s) - return -ENOMEM; + for (;;) { + s = new0(char, n+1); + if (!s) + return -ENOMEM; - r = getsockopt(fd, SOL_SOCKET, SO_PEERSEC, s, &n); - if (r < 0) { - free(s); + if (getsockopt(fd, SOL_SOCKET, SO_PEERSEC, s, &n) >= 0) + break; if (errno != ERANGE) return -errno; - s = new0(char, n); - if (!s) - return -ENOMEM; - - r = getsockopt(fd, SOL_SOCKET, SO_PEERSEC, s, &n); - if (r < 0) { - free(s); - return -errno; - } + s = mfree(s); } - if (isempty(s)) { - free(s); + if (isempty(s)) return -EOPNOTSUPP; - } *ret = s; + s = NULL; + return 0; }