On Fri, 2014-01-10 at 16:08 -0500, Eric Paris wrote:
If you know the buf len, you can just use
audit_log_n_untrusted_string()
I think....
admittedly audit_log_n_untrusted_string() will log ALL of n. So you
could use strnlen() as the argument to audit_log_n_untrusted_string()
(or create another helper, I don't care)
-Eric
On Tue, 2014-01-07 at 12:44 -0800, William Roberts wrote:
> Signed-off-by: William Roberts <wroberts(a)tresys.com>
> ---
> kernel/auditsc.c | 19 +++++++++++++++----
> 1 file changed, 15 insertions(+), 4 deletions(-)
>
> diff --git a/kernel/auditsc.c b/kernel/auditsc.c
> index a4c2003..9ba1f2a 100644
> --- a/kernel/auditsc.c
> +++ b/kernel/auditsc.c
> @@ -1292,9 +1292,20 @@ static void audit_log_cmdline(struct audit_buffer *ab, struct
task_struct *tsk,
> if (!buf)
> goto out;
> res = get_cmdline(tsk, buf, PATH_MAX);
> - /* Ensure NULL terminated */
> - if (buf[res-1] != '\0')
> - buf[res-1] = '\0';
> + if (res == 0) {
> + kfree(buf);
> + goto out;
> + }
> + /*
> + * Ensure NULL terminated but don't clobber the end
> + * unless the buffer is full. Worst case you end up
> + * with 2 null bytes ending it. By doing it this way
> + * one avoids additional branching. One checking if the
> + * end is null and another to check if their should be
> + * an increment before setting the null byte.
> + */
> + res += res < PATH_MAX;
> + buf[res-1] = '\0';
> context->cmdline = buf;
> }
> msg = context->cmdline;
> @@ -1333,8 +1344,8 @@ static void audit_log_exit(struct audit_context *context,
struct task_struct *ts
> context->name_count);
>
> audit_log_task_info(ab, tsk);
> - audit_log_cmdline(ab, tsk, context);
> audit_log_key(ab, context->filterkey);
> + audit_log_cmdline(ab, tsk, context);
> audit_log_end(ab);
>
> for (aux = context->aux; aux; aux = aux->next) {