coredump: validate that path doesn't exceed UNIX_PATH_MAX

so we don't pointlessly accepts things that go over the limit.

Link: https://lore.kernel.org/20250612-work-coredump-massage-v1-4-315c0c34ba94@kernel.org
Signed-off-by: Christian Brauner <brauner@kernel.org>
This commit is contained in:
Christian Brauner 2025-06-12 15:25:18 +02:00
parent 67c3a0b0ad
commit 3a2c977c46
No known key found for this signature in database
GPG Key ID: 91C61BC06578DCA2
1 changed files with 9 additions and 2 deletions

View File

@ -1388,6 +1388,8 @@ void validate_coredump_safety(void)
static inline bool check_coredump_socket(void)
{
const char *p;
if (core_pattern[0] != '@')
return true;
@ -1407,10 +1409,15 @@ static inline bool check_coredump_socket(void)
/* ... and if so must be an absolute path. */
if (core_pattern[2] != '/')
return false;
/* Anything else is unsupported. */
return false;
p = &core_pattern[2];
} else {
p = &core_pattern[1];
}
/* The path obviously cannot exceed UNIX_PATH_MAX. */
if (strlen(p) >= UNIX_PATH_MAX)
return false;
return true;
}