Date: Thu, 31 Oct 2013 01:29:25 +0100 From: dt71@gmx.com To: Colin Percival <cperciva@freebsd.org>, freebsd-hackers@freebsd.org Subject: Re: Automated submission of kernel panic reports Message-ID: <5271A465.2030206@gmx.com> In-Reply-To: <526F8EB3.1040205@freebsd.org> References: <526F8EB3.1040205@freebsd.org>
next in thread | previous in thread | raw e-mail | index | archive | help
Notes/advice/recommendations/proposals/questions/whatever: This smells of having a potential to make an admin accidentally transmit undesired information, as well as adding some attack surface. Without testing, I bet that a reguler user will be able to read the panicmail.N file (which will contain the textdump) -- the umask/permissions are not set up properly. I very much dislike the non-use of double quotes around variable expansions and things like that in the shell code. The return code of /usr/local/bin/pkesh should be handled. Place a comment to the location in the code where an admin could put an add-on script that can automatically modify the text to be submitted (both automatic and confirmed mode). What if the /var/crash/{info,vmcore}.last symlinks were used as a basis for selecting the last dump, instead of the current "$((`cat bounds` - 1))"/"$1" method? What's wrong with "our" /bin/sh? If a temporary file is used for kgdb commands anyway, would it not be cleaner to use ``-x ${tmpfile}'' instead of input-piping? How about: ${panicmail_sendto} could be "Full Name <e-mail@address>"? "# Remove temporary file" is a bit superfluous. Choose a consistent commenting style: either use periods/fullstops, or don't. I'd personally use ``>'' instead of ``>>'' first in panicmail_gather().
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?5271A465.2030206>