Correct a number of problems that were previously commented on:
- Correct audit_arg_socketaddr() argument name from so to sa. - Assert arguments are non-NULL to many argument capture functions rather than testing them. This may trip some bugs. - Assert the process lock is held when auditing process information. - Test currecord in several more places. - Test validity of more arguments with kasserts, such as flag values when auditing vnode information. Perforce change: 98825 Obtained from: TrustedBSD Project
This commit is contained in:
parent
0ba9449007
commit
981c1cc4c8
@ -151,7 +151,7 @@ void audit_arg_pid(pid_t pid);
|
|||||||
void audit_arg_process(struct proc *p);
|
void audit_arg_process(struct proc *p);
|
||||||
void audit_arg_signum(u_int signum);
|
void audit_arg_signum(u_int signum);
|
||||||
void audit_arg_socket(int sodomain, int sotype, int soprotocol);
|
void audit_arg_socket(int sodomain, int sotype, int soprotocol);
|
||||||
void audit_arg_sockaddr(struct thread *td, struct sockaddr *so);
|
void audit_arg_sockaddr(struct thread *td, struct sockaddr *sa);
|
||||||
void audit_arg_auid(uid_t auid);
|
void audit_arg_auid(uid_t auid);
|
||||||
void audit_arg_auditinfo(struct auditinfo *au_info);
|
void audit_arg_auditinfo(struct auditinfo *au_info);
|
||||||
void audit_arg_upath(struct thread *td, char *upath, u_int64_t flags);
|
void audit_arg_upath(struct thread *td, char *upath, u_int64_t flags);
|
||||||
|
@ -357,13 +357,14 @@ audit_arg_process(struct proc *p)
|
|||||||
{
|
{
|
||||||
struct kaudit_record *ar;
|
struct kaudit_record *ar;
|
||||||
|
|
||||||
|
KASSERT(p != NULL, ("audit_arg_process: p == NULL"));
|
||||||
|
|
||||||
|
PROC_LOCK_ASSERT(p, MA_OWNED);
|
||||||
|
|
||||||
ar = currecord();
|
ar = currecord();
|
||||||
if ((ar == NULL) || (p == NULL))
|
if (ar == NULL)
|
||||||
return;
|
return;
|
||||||
|
|
||||||
/*
|
|
||||||
* XXXAUDIT: PROC_LOCK_ASSERT(p);
|
|
||||||
*/
|
|
||||||
ar->k_ar.ar_arg_auid = p->p_au->ai_auid;
|
ar->k_ar.ar_arg_auid = p->p_au->ai_auid;
|
||||||
ar->k_ar.ar_arg_euid = p->p_ucred->cr_uid;
|
ar->k_ar.ar_arg_euid = p->p_ucred->cr_uid;
|
||||||
ar->k_ar.ar_arg_egid = p->p_ucred->cr_groups[0];
|
ar->k_ar.ar_arg_egid = p->p_ucred->cr_groups[0];
|
||||||
@ -404,21 +405,21 @@ audit_arg_socket(int sodomain, int sotype, int soprotocol)
|
|||||||
ARG_SET_VALID(ar, ARG_SOCKINFO);
|
ARG_SET_VALID(ar, ARG_SOCKINFO);
|
||||||
}
|
}
|
||||||
|
|
||||||
/*
|
|
||||||
* XXXAUDIT: Argument here should be 'sa' not 'so'. Caller is responsible
|
|
||||||
* for synchronizing access to the source of the address.
|
|
||||||
*/
|
|
||||||
void
|
void
|
||||||
audit_arg_sockaddr(struct thread *td, struct sockaddr *so)
|
audit_arg_sockaddr(struct thread *td, struct sockaddr *sa)
|
||||||
{
|
{
|
||||||
struct kaudit_record *ar;
|
struct kaudit_record *ar;
|
||||||
|
|
||||||
|
KASSERT(td != NULL, ("audit_arg_sockaddr: td == NULL"));
|
||||||
|
KASSERT(sa != NULL, ("audit_arg_sockaddr: sa == NULL"));
|
||||||
|
|
||||||
ar = currecord();
|
ar = currecord();
|
||||||
if (ar == NULL || td == NULL || so == NULL)
|
if (ar == NULL)
|
||||||
return;
|
return;
|
||||||
|
|
||||||
bcopy(so, &ar->k_ar.ar_arg_sockaddr, sizeof(ar->k_ar.ar_arg_sockaddr));
|
bcopy(sa, &ar->k_ar.ar_arg_sockaddr,
|
||||||
switch (so->sa_family) {
|
sizeof(ar->k_ar.ar_arg_sockaddr));
|
||||||
|
switch (sa->sa_family) {
|
||||||
case AF_INET:
|
case AF_INET:
|
||||||
ARG_SET_VALID(ar, ARG_SADDRINET);
|
ARG_SET_VALID(ar, ARG_SADDRINET);
|
||||||
break;
|
break;
|
||||||
@ -428,7 +429,7 @@ audit_arg_sockaddr(struct thread *td, struct sockaddr *so)
|
|||||||
break;
|
break;
|
||||||
|
|
||||||
case AF_UNIX:
|
case AF_UNIX:
|
||||||
audit_arg_upath(td, ((struct sockaddr_un *)so)->sun_path,
|
audit_arg_upath(td, ((struct sockaddr_un *)sa)->sun_path,
|
||||||
ARG_UPATH1);
|
ARG_UPATH1);
|
||||||
ARG_SET_VALID(ar, ARG_SADDRUNIX);
|
ARG_SET_VALID(ar, ARG_SADDRUNIX);
|
||||||
break;
|
break;
|
||||||
@ -472,17 +473,14 @@ audit_arg_text(char *text)
|
|||||||
{
|
{
|
||||||
struct kaudit_record *ar;
|
struct kaudit_record *ar;
|
||||||
|
|
||||||
|
KASSERT(text != NULL, ("audit_arg_text: text == NULL"));
|
||||||
|
|
||||||
ar = currecord();
|
ar = currecord();
|
||||||
if (ar == NULL)
|
if (ar == NULL)
|
||||||
return;
|
return;
|
||||||
|
|
||||||
/*
|
|
||||||
* XXXAUDIT: Why do we accept a possibly NULL string here?
|
|
||||||
*/
|
|
||||||
/* Invalidate the text string */
|
/* Invalidate the text string */
|
||||||
ar->k_ar.ar_valid_arg &= (ARG_ALL ^ ARG_TEXT);
|
ar->k_ar.ar_valid_arg &= (ARG_ALL ^ ARG_TEXT);
|
||||||
if (text == NULL)
|
|
||||||
return;
|
|
||||||
|
|
||||||
if (ar->k_ar.ar_arg_text == NULL)
|
if (ar->k_ar.ar_arg_text == NULL)
|
||||||
ar->k_ar.ar_arg_text = malloc(MAXPATHLEN, M_AUDITTEXT,
|
ar->k_ar.ar_arg_text = malloc(MAXPATHLEN, M_AUDITTEXT,
|
||||||
@ -600,9 +598,10 @@ audit_arg_file(struct proc *p, struct file *fp)
|
|||||||
struct vnode *vp;
|
struct vnode *vp;
|
||||||
int vfslocked;
|
int vfslocked;
|
||||||
|
|
||||||
/*
|
ar = currecord();
|
||||||
* XXXAUDIT: Why is the (ar == NULL) test only in the socket case?
|
if (ar == NULL)
|
||||||
*/
|
return;
|
||||||
|
|
||||||
switch (fp->f_type) {
|
switch (fp->f_type) {
|
||||||
case DTYPE_VNODE:
|
case DTYPE_VNODE:
|
||||||
case DTYPE_FIFO:
|
case DTYPE_FIFO:
|
||||||
@ -618,14 +617,8 @@ audit_arg_file(struct proc *p, struct file *fp)
|
|||||||
break;
|
break;
|
||||||
|
|
||||||
case DTYPE_SOCKET:
|
case DTYPE_SOCKET:
|
||||||
ar = currecord();
|
|
||||||
if (ar == NULL)
|
|
||||||
return;
|
|
||||||
|
|
||||||
/*
|
|
||||||
* XXXAUDIT: Socket locking? Inpcb locking?
|
|
||||||
*/
|
|
||||||
so = (struct socket *)fp->f_data;
|
so = (struct socket *)fp->f_data;
|
||||||
|
SOCK_LOCK(so);
|
||||||
if (INP_CHECK_SOCKAF(so, PF_INET)) {
|
if (INP_CHECK_SOCKAF(so, PF_INET)) {
|
||||||
if (so->so_pcb == NULL)
|
if (so->so_pcb == NULL)
|
||||||
return;
|
return;
|
||||||
@ -646,6 +639,7 @@ audit_arg_file(struct proc *p, struct file *fp)
|
|||||||
pcb->inp_lport;
|
pcb->inp_lport;
|
||||||
ARG_SET_VALID(ar, ARG_SOCKINFO);
|
ARG_SET_VALID(ar, ARG_SOCKINFO);
|
||||||
}
|
}
|
||||||
|
SOCK_UNLOCK(so);
|
||||||
break;
|
break;
|
||||||
|
|
||||||
default:
|
default:
|
||||||
@ -669,8 +663,12 @@ audit_arg_upath(struct thread *td, char *upath, u_int64_t flag)
|
|||||||
struct kaudit_record *ar;
|
struct kaudit_record *ar;
|
||||||
char **pathp;
|
char **pathp;
|
||||||
|
|
||||||
if (td == NULL || upath == NULL)
|
KASSERT(td != NULL, ("audit_arg_upath: td == NULL"));
|
||||||
return; /* nothing to do! */
|
KASSERT(upath != NULL, ("audit_arg_upath: upath == NULL"));
|
||||||
|
|
||||||
|
ar = currecord();
|
||||||
|
if (ar == NULL)
|
||||||
|
return;
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* XXXAUDIT: Witness warning for possible sleep here?
|
* XXXAUDIT: Witness warning for possible sleep here?
|
||||||
@ -680,10 +678,6 @@ audit_arg_upath(struct thread *td, char *upath, u_int64_t flag)
|
|||||||
KASSERT((flag != ARG_UPATH1) || (flag != ARG_UPATH2),
|
KASSERT((flag != ARG_UPATH1) || (flag != ARG_UPATH2),
|
||||||
("audit_arg_upath: flag %llu", (unsigned long long)flag));
|
("audit_arg_upath: flag %llu", (unsigned long long)flag));
|
||||||
|
|
||||||
ar = currecord();
|
|
||||||
if (ar == NULL)
|
|
||||||
return;
|
|
||||||
|
|
||||||
if (flag == ARG_UPATH1)
|
if (flag == ARG_UPATH1)
|
||||||
pathp = &ar->k_ar.ar_arg_upath1;
|
pathp = &ar->k_ar.ar_arg_upath1;
|
||||||
else
|
else
|
||||||
@ -720,13 +714,10 @@ audit_arg_vnode(struct vnode *vp, u_int64_t flags)
|
|||||||
struct vattr vattr;
|
struct vattr vattr;
|
||||||
int error;
|
int error;
|
||||||
struct vnode_au_info *vnp;
|
struct vnode_au_info *vnp;
|
||||||
struct thread *td;
|
|
||||||
|
|
||||||
/*
|
KASSERT(vp != NULL, ("audit_arg_vnode: vp == NULL"));
|
||||||
* XXXAUDIT: Why is vp possibly NULL here?
|
KASSERT((flags == ARG_VNODE1) || (flags == ARG_VNODE2),
|
||||||
*/
|
("audit_arg_vnode: flags %jd", (intmax_t)flags));
|
||||||
if (vp == NULL)
|
|
||||||
return;
|
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* Assume that if the caller is calling audit_arg_vnode() on a
|
* Assume that if the caller is calling audit_arg_vnode() on a
|
||||||
@ -740,17 +731,10 @@ audit_arg_vnode(struct vnode *vp, u_int64_t flags)
|
|||||||
return;
|
return;
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* XXXAUDIT: KASSERT argument validity instead?
|
|
||||||
*
|
|
||||||
* XXXAUDIT: The below clears, and then resets the flags for valid
|
* XXXAUDIT: The below clears, and then resets the flags for valid
|
||||||
* arguments. Ideally, either the new vnode is used, or the old one
|
* arguments. Ideally, either the new vnode is used, or the old one
|
||||||
* would be.
|
* would be.
|
||||||
*/
|
*/
|
||||||
if ((flags & (ARG_VNODE1 | ARG_VNODE2)) == 0)
|
|
||||||
return;
|
|
||||||
|
|
||||||
td = curthread;
|
|
||||||
|
|
||||||
if (flags & ARG_VNODE1) {
|
if (flags & ARG_VNODE1) {
|
||||||
ar->k_ar.ar_valid_arg &= (ARG_ALL ^ ARG_VNODE1);
|
ar->k_ar.ar_valid_arg &= (ARG_ALL ^ ARG_VNODE1);
|
||||||
vnp = &ar->k_ar.ar_arg_vnode1;
|
vnp = &ar->k_ar.ar_arg_vnode1;
|
||||||
@ -759,7 +743,7 @@ audit_arg_vnode(struct vnode *vp, u_int64_t flags)
|
|||||||
vnp = &ar->k_ar.ar_arg_vnode2;
|
vnp = &ar->k_ar.ar_arg_vnode2;
|
||||||
}
|
}
|
||||||
|
|
||||||
error = VOP_GETATTR(vp, &vattr, td->td_ucred, td);
|
error = VOP_GETATTR(vp, &vattr, curthread->td_ucred, curthread);
|
||||||
if (error) {
|
if (error) {
|
||||||
/* XXX: How to handle this case? */
|
/* XXX: How to handle this case? */
|
||||||
return;
|
return;
|
||||||
@ -786,10 +770,17 @@ audit_arg_vnode(struct vnode *vp, u_int64_t flags)
|
|||||||
void
|
void
|
||||||
audit_sysclose(struct thread *td, int fd)
|
audit_sysclose(struct thread *td, int fd)
|
||||||
{
|
{
|
||||||
|
struct kaudit_record *ar;
|
||||||
struct vnode *vp;
|
struct vnode *vp;
|
||||||
struct file *fp;
|
struct file *fp;
|
||||||
int vfslocked;
|
int vfslocked;
|
||||||
|
|
||||||
|
KASSERT(td != NULL, ("audit_sysclose: td == NULL"));
|
||||||
|
|
||||||
|
ar = currecord();
|
||||||
|
if (ar == NULL)
|
||||||
|
return;
|
||||||
|
|
||||||
audit_arg_fd(fd);
|
audit_arg_fd(fd);
|
||||||
|
|
||||||
if (getvnode(td->td_proc->p_fd, fd, &fp) != 0)
|
if (getvnode(td->td_proc->p_fd, fd, &fp) != 0)
|
||||||
|
Loading…
Reference in New Issue
Block a user