Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 24 Mar 2015 22:37:09 +0800
From:      Tiwei Bie <btw@mail.ustc.edu.cn>
To:        Mateusz Guzik <mjguzik@gmail.com>
Cc:        Konstantin Belousov <kostikbel@gmail.com>, freebsd-hackers@freebsd.org
Subject:   Re: [PATCH] Finish the task 'Validate coredump format string'
Message-ID:  <20150324143709.GA54065@freebsd>
In-Reply-To: <20150324123517.GA25678@dft-labs.eu>
References:  <20150321200500.GC14650@dft-labs.eu> <20150322091853.GA89976@freebsd> <20150322101401.GH14650@dft-labs.eu> <20150322112555.GA44277@freebsd> <20150322113822.GB2379@kib.kiev.ua> <20150322120655.GA59757@freebsd> <20150322131524.GA95795@freebsd> <20150323005852.GB6798@dft-labs.eu> <20150323020314.GA30143@freebsd> <20150324123517.GA25678@dft-labs.eu>

next in thread | previous in thread | raw e-mail | index | archive | help
On Tue, Mar 24, 2015 at 01:35:17PM +0100, Mateusz Guzik wrote:
> On Mon, Mar 23, 2015 at 10:03:14AM +0800, Tiwei Bie wrote:
> > On Mon, Mar 23, 2015 at 01:58:52AM +0100, Mateusz Guzik wrote:
> > > On Sun, Mar 22, 2015 at 09:15:24PM +0800, Tiwei Bie wrote:
> > > > On Sun, Mar 22, 2015 at 08:06:55PM +0800, Tiwei Bie wrote:
> > > > > On Sun, Mar 22, 2015 at 01:38:22PM +0200, Konstantin Belousov wrote:
> > > > > > On Sun, Mar 22, 2015 at 07:25:55PM +0800, Tiwei Bie wrote:
> > > > > > > On Sun, Mar 22, 2015 at 11:14:01AM +0100, Mateusz Guzik wrote:
> > > > > > > > On Sun, Mar 22, 2015 at 05:19:40PM +0800, Tiwei Bie wrote:
> > 
[..]
> > I don't know how to do this. We need to update the man-pages?
> > 
> > And sorry again, maybe I was too tired yesterday. I just find a new bug in
> > the codes above when reading your comments. Though it won't affect anything
> > cause dynamic_kenv hasn't been enabled at this time, it is really a bug.
> > 
> > `format' needs to be freed, sorry... What a terrible day. ;-(
> > 
> 
> core(5). yeah, would be nice to mention all this stuff.

Yeah, I will update the man page!

> > I wrote these codes after consulting the codes in kern/kern_clocksource.c
> > 
> [..]
> > It also needs to validate the user's inputs. And it uses a strcasecmp()
> > to check whether a different timer has been specified by the user.
> > 
> > If the user is going to replace the pattern with identical one, we won't
> > need to do any update, we just `goto out'.
> > 
> 
> Well, I presume original author did not want to play with timers when
> changing to the same timer.
> 
> Corefile is safe to change, so I suggest just dropping that strcmp.
> 
> Also see below.
> 

Yeah, I will remove the strcmp!

> > My new patch:
> > 
> > ---
> >  sys/kern/kern_sig.c | 77 ++++++++++++++++++++++++++++++++++++++++++++++++-----
> >  1 file changed, 70 insertions(+), 7 deletions(-)
> > 
> > diff --git a/sys/kern/kern_sig.c b/sys/kern/kern_sig.c
> > index 8410d9d..0254517 100644
> > --- a/sys/kern/kern_sig.c
> > +++ b/sys/kern/kern_sig.c
> > @@ -3094,21 +3094,85 @@ static int compress_user_cores = 0;
> >   */
> >  #define	corefilename_lock	allproc_lock
> >  
> > -static char corefilename[MAXPATHLEN] = {"%N.core"};
> > +static char corefilename[MAXPATHLEN] = "%N.core";
> > +
> > +static bool
> > +corefilename_check(const char *format)
> > +{
> > +	int i, counti;
> > +
> > +	counti = 0;
> > +	for (i = 0; i < MAXPATHLEN && format[i] != '\0'; i++) {
> > +		if (format[i] == '%') {
> > +			i++;
> > +			switch (format[i]) {
> > +			case 'I':
> > +				counti++;
> > +				if (counti > 1)
> > +					return (false);
> 
> countI?
> 

I thought `countI' seems to be CamelCase, so I named it as counti. I will
update it.

> > +			case '%':
> > +}
[..]
> > +static void
> > +corefilename_init(void *arg)
> > +{
> > +	char *format;
> > +
> > +	format = kern_getenv("kern.corefile");
> > +
> > +	if (format != NULL) {
> > +		if (corefilename_check(format))
> > +			strcpy(corefilename, format);
> > +		freeenv(format);
> > +	}
> > +}
> 
> printf something. "invalid format specified" or the like.
> 
> Also the code may be nicer if you
> if (format == NULL)
> 	return;
> 
> instead
> 
> > +SYSINIT(corefilename, SI_SUB_KMEM, SI_ORDER_FIRST, corefilename_init, 0);
> >  
> >  static int
> >  sysctl_kern_corefile(SYSCTL_HANDLER_ARGS)
> >  {
> > +	char *format;
> >  	int error;
> >  
> > +	format = malloc(MAXPATHLEN, M_TEMP, M_WAITOK);
> > +
> > +	sx_slock(&corefilename_lock);
> > +	strcpy(format, corefilename);
> > +	sx_sunlock(&corefilename_lock);
> > +
> > +	error = sysctl_handle_string(oidp, format, MAXPATHLEN, req);
> > +	if (error || !req->newptr || strcmp(format, corefilename) == 0)
> > +		goto out;
> > +
> 
> this should be if (error != 0 || req->newptr == NULL).
> 
> strmcp was covered earlier in the mail
> 

Thank you so much for your great patience! ^_^

This is my new patch:

---
 share/man/man5/core.5 |  4 +++
 sys/kern/kern_sig.c   | 81 ++++++++++++++++++++++++++++++++++++++++++++++-----
 2 files changed, 78 insertions(+), 7 deletions(-)

diff --git a/share/man/man5/core.5 b/share/man/man5/core.5
index 3f54f89..17b1ef7 100644
--- a/share/man/man5/core.5
+++ b/share/man/man5/core.5
@@ -91,6 +91,10 @@ The name defaults to
 yielding the traditional
 .Fx
 behaviour.
+When changing the name via the
+.Va kern.corefile
+sysctl, it will fail if the new name contains
+unknown format specifiers, or its length is too long.
 .Pp
 By default, a process that changes user or group credentials whether
 real or effective will not create a corefile.
diff --git a/sys/kern/kern_sig.c b/sys/kern/kern_sig.c
index 154c250..8cd3638 100644
--- a/sys/kern/kern_sig.c
+++ b/sys/kern/kern_sig.c
@@ -3094,21 +3094,89 @@ static int compress_user_cores = 0;
  */
 #define	corefilename_lock	allproc_lock
 
-static char corefilename[MAXPATHLEN] = {"%N.core"};
+static char corefilename[MAXPATHLEN] = "%N.core";
+
+static bool
+corefilename_check(const char *format)
+{
+	int i, countI;
+
+	countI = 0;
+	for (i = 0; i < MAXPATHLEN && format[i] != '\0'; i++) {
+		if (format[i] == '%') {
+			i++;
+			switch (format[i]) {
+			case 'I':
+				countI++;
+				if (countI > 1)
+					return (false);
+			case '%':
+			case 'H':
+			case 'N':
+			case 'P':
+			case 'U':
+				break;
+			default:
+				return (false);
+			}
+		}
+	}
+
+	if (i == MAXPATHLEN)
+		return (false);
+
+	return (true);
+}
+
+static void
+corefilename_init(void *arg)
+{
+	char *format;
+
+	format = kern_getenv("kern.corefile");
+	if (format == NULL)
+		return;
+
+	if (corefilename_check(format))
+		strcpy(corefilename, format);
+	else
+		printf("Invalid format character specified in "
+		    "corename `%s'\n", format);
+
+	freeenv(format);
+}
+SYSINIT(corefilename, SI_SUB_KMEM, SI_ORDER_FIRST, corefilename_init, 0);
 
 static int
 sysctl_kern_corefile(SYSCTL_HANDLER_ARGS)
 {
+	char *format;
 	int error;
 
+	format = malloc(MAXPATHLEN, M_TEMP, M_WAITOK);
+
+	sx_slock(&corefilename_lock);
+	strcpy(format, corefilename);
+	sx_sunlock(&corefilename_lock);
+
+	error = sysctl_handle_string(oidp, format, MAXPATHLEN, req);
+	if (error != 0 || req->newptr == NULL)
+		goto out;
+
+	if (!corefilename_check(format)) {
+		error = EINVAL;
+		goto out;
+	}
+
 	sx_xlock(&corefilename_lock);
-	error = sysctl_handle_string(oidp, corefilename, sizeof(corefilename),
-	    req);
+	strcpy(corefilename, format);
 	sx_xunlock(&corefilename_lock);
 
+out:
+	free(format, M_TEMP);
 	return (error);
 }
-SYSCTL_PROC(_kern, OID_AUTO, corefile, CTLTYPE_STRING | CTLFLAG_RWTUN |
+SYSCTL_PROC(_kern, OID_AUTO, corefile, CTLTYPE_STRING | CTLFLAG_RW |
     CTLFLAG_MPSAFE, 0, 0, sysctl_kern_corefile, "A",
     "Process corefile name format string");
 
@@ -3171,9 +3239,8 @@ corefile_open(const char *comm, uid_t uid, pid_t pid, struct thread *td,
 				sbuf_printf(&sb, "%u", uid);
 				break;
 			default:
-				log(LOG_ERR,
-				    "Unknown format character %c in "
-				    "corename `%s'\n", format[i], format);
+				KASSERT(0, ("Unknown format character %c in "
+				    "corename `%s'\n", format[i], format));
 				break;
 			}
 			break;
-- 
2.1.2

Best regards,
Tiwei Bie




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20150324143709.GA54065>