2019-05-27 14:55:05 +08:00
|
|
|
// SPDX-License-Identifier: GPL-2.0-or-later
|
2005-09-12 10:15:07 +08:00
|
|
|
/*
|
2012-07-14 21:08:29 +08:00
|
|
|
* connector.c
|
connector: create connector workqueue only while needed once
The netlink connector uses its own workqueue to relay the datas sent
from userspace to the appropriate callback. If you launch the test
from Documentation/connector and change it a bit to send a high flow
of data, you will see thousands of events coming to the "cqueue"
workqueue by looking at the workqueue tracer.
This flow of events can be sent very quickly. So, to not encumber the
kevent workqueue and delay other jobs, the "cqueue" workqueue should
remain.
But this workqueue is pointless most of the time, it will always be
created (assuming you have built it of course) although only
developpers with specific needs will use it.
So avoid this "most of the time useless task", this patch proposes to
create this workqueue only when needed once. The first jobs to be
sent to connector callbacks will be sent to kevent while the "cqueue"
thread creation will be scheduled to kevent too.
The following jobs will continue to be scheduled to keventd until the
cqueue workqueue is created, and then the rest of the jobs will
continue to perform as usual, through this dedicated workqueue.
Each time I tested this patch, only the first event was sent to
keventd, the rest has been sent to cqueue which have been created
quickly.
Also, this patch fixes some trailing whitespaces on the connector files.
Signed-off-by: Frederic Weisbecker <fweisbec@gmail.com>
Acked-by: Evgeniy Polyakov <zbr@ioremap.net>
Signed-off-by: David S. Miller <davem@davemloft.net>
2009-02-03 15:22:04 +08:00
|
|
|
*
|
2009-07-22 03:43:51 +08:00
|
|
|
* 2004+ Copyright (c) Evgeniy Polyakov <zbr@ioremap.net>
|
2005-09-12 10:15:07 +08:00
|
|
|
* All rights reserved.
|
|
|
|
*/
|
|
|
|
|
2018-07-07 23:27:53 +08:00
|
|
|
#include <linux/compiler.h>
|
2005-09-12 10:15:07 +08:00
|
|
|
#include <linux/kernel.h>
|
|
|
|
#include <linux/module.h>
|
|
|
|
#include <linux/list.h>
|
|
|
|
#include <linux/skbuff.h>
|
2013-03-27 14:54:56 +08:00
|
|
|
#include <net/netlink.h>
|
2005-09-12 10:15:07 +08:00
|
|
|
#include <linux/moduleparam.h>
|
|
|
|
#include <linux/connector.h>
|
include cleanup: Update gfp.h and slab.h includes to prepare for breaking implicit slab.h inclusion from percpu.h
percpu.h is included by sched.h and module.h and thus ends up being
included when building most .c files. percpu.h includes slab.h which
in turn includes gfp.h making everything defined by the two files
universally available and complicating inclusion dependencies.
percpu.h -> slab.h dependency is about to be removed. Prepare for
this change by updating users of gfp and slab facilities include those
headers directly instead of assuming availability. As this conversion
needs to touch large number of source files, the following script is
used as the basis of conversion.
http://userweb.kernel.org/~tj/misc/slabh-sweep.py
The script does the followings.
* Scan files for gfp and slab usages and update includes such that
only the necessary includes are there. ie. if only gfp is used,
gfp.h, if slab is used, slab.h.
* When the script inserts a new include, it looks at the include
blocks and try to put the new include such that its order conforms
to its surrounding. It's put in the include block which contains
core kernel includes, in the same order that the rest are ordered -
alphabetical, Christmas tree, rev-Xmas-tree or at the end if there
doesn't seem to be any matching order.
* If the script can't find a place to put a new include (mostly
because the file doesn't have fitting include block), it prints out
an error message indicating which .h file needs to be added to the
file.
The conversion was done in the following steps.
1. The initial automatic conversion of all .c files updated slightly
over 4000 files, deleting around 700 includes and adding ~480 gfp.h
and ~3000 slab.h inclusions. The script emitted errors for ~400
files.
2. Each error was manually checked. Some didn't need the inclusion,
some needed manual addition while adding it to implementation .h or
embedding .c file was more appropriate for others. This step added
inclusions to around 150 files.
3. The script was run again and the output was compared to the edits
from #2 to make sure no file was left behind.
4. Several build tests were done and a couple of problems were fixed.
e.g. lib/decompress_*.c used malloc/free() wrappers around slab
APIs requiring slab.h to be added manually.
5. The script was run on all .h files but without automatically
editing them as sprinkling gfp.h and slab.h inclusions around .h
files could easily lead to inclusion dependency hell. Most gfp.h
inclusion directives were ignored as stuff from gfp.h was usually
wildly available and often used in preprocessor macros. Each
slab.h inclusion directive was examined and added manually as
necessary.
6. percpu.h was updated not to include slab.h.
7. Build test were done on the following configurations and failures
were fixed. CONFIG_GCOV_KERNEL was turned off for all tests (as my
distributed build env didn't work with gcov compiles) and a few
more options had to be turned off depending on archs to make things
build (like ipr on powerpc/64 which failed due to missing writeq).
* x86 and x86_64 UP and SMP allmodconfig and a custom test config.
* powerpc and powerpc64 SMP allmodconfig
* sparc and sparc64 SMP allmodconfig
* ia64 SMP allmodconfig
* s390 SMP allmodconfig
* alpha SMP allmodconfig
* um on x86_64 SMP allmodconfig
8. percpu.h modifications were reverted so that it could be applied as
a separate patch and serve as bisection point.
Given the fact that I had only a couple of failures from tests on step
6, I'm fairly confident about the coverage of this conversion patch.
If there is a breakage, it's likely to be something in one of the arch
headers which should be easily discoverable easily on most builds of
the specific arch.
Signed-off-by: Tejun Heo <tj@kernel.org>
Guess-its-ok-by: Christoph Lameter <cl@linux-foundation.org>
Cc: Ingo Molnar <mingo@redhat.com>
Cc: Lee Schermerhorn <Lee.Schermerhorn@hp.com>
2010-03-24 16:04:11 +08:00
|
|
|
#include <linux/slab.h>
|
2006-03-23 19:00:21 +08:00
|
|
|
#include <linux/mutex.h>
|
2008-06-28 11:03:24 +08:00
|
|
|
#include <linux/proc_fs.h>
|
|
|
|
#include <linux/spinlock.h>
|
2005-09-12 10:15:07 +08:00
|
|
|
|
|
|
|
#include <net/sock.h>
|
|
|
|
|
|
|
|
MODULE_LICENSE("GPL");
|
2009-07-22 03:43:51 +08:00
|
|
|
MODULE_AUTHOR("Evgeniy Polyakov <zbr@ioremap.net>");
|
2005-09-12 10:15:07 +08:00
|
|
|
MODULE_DESCRIPTION("Generic userspace <-> kernelspace connector.");
|
2010-12-11 04:27:49 +08:00
|
|
|
MODULE_ALIAS_NET_PF_PROTO(PF_NETLINK, NETLINK_CONNECTOR);
|
2005-09-12 10:15:07 +08:00
|
|
|
|
|
|
|
static struct cn_dev cdev;
|
|
|
|
|
2008-02-27 10:25:53 +08:00
|
|
|
static int cn_already_initialized;
|
2005-09-12 10:15:07 +08:00
|
|
|
|
|
|
|
/*
|
2014-04-09 11:37:08 +08:00
|
|
|
* Sends mult (multiple) cn_msg at a time.
|
|
|
|
*
|
2005-09-12 10:15:07 +08:00
|
|
|
* msg->seq and msg->ack are used to determine message genealogy.
|
|
|
|
* When someone sends message it puts there locally unique sequence
|
|
|
|
* and random acknowledge numbers. Sequence number may be copied into
|
|
|
|
* nlmsghdr->nlmsg_seq too.
|
|
|
|
*
|
|
|
|
* Sequence number is incremented with each message to be sent.
|
|
|
|
*
|
2014-01-16 12:29:19 +08:00
|
|
|
* If we expect a reply to our message then the sequence number in
|
2005-09-12 10:15:07 +08:00
|
|
|
* received message MUST be the same as in original message, and
|
|
|
|
* acknowledge number MUST be the same + 1.
|
|
|
|
*
|
|
|
|
* If we receive a message and its sequence number is not equal to the
|
|
|
|
* one we are expecting then it is a new message.
|
|
|
|
*
|
|
|
|
* If we receive a message and its sequence number is the same as one
|
|
|
|
* we are expecting but it's acknowledgement number is not equal to
|
|
|
|
* the acknowledgement number in the original message + 1, then it is
|
|
|
|
* a new message.
|
|
|
|
*
|
2014-04-09 11:37:08 +08:00
|
|
|
* If msg->len != len, then additional cn_msg messages are expected following
|
|
|
|
* the first msg.
|
|
|
|
*
|
2014-01-16 12:29:19 +08:00
|
|
|
* The message is sent to, the portid if given, the group if given, both if
|
|
|
|
* both, or if both are zero then the group is looked up and sent there.
|
2005-09-12 10:15:07 +08:00
|
|
|
*/
|
2014-04-09 11:37:08 +08:00
|
|
|
int cn_netlink_send_mult(struct cn_msg *msg, u16 len, u32 portid, u32 __group,
|
2023-12-16 20:29:58 +08:00
|
|
|
gfp_t gfp_mask, netlink_filter_fn filter,
|
|
|
|
void *filter_data)
|
2005-09-12 10:15:07 +08:00
|
|
|
{
|
|
|
|
struct cn_callback_entry *__cbq;
|
|
|
|
unsigned int size;
|
|
|
|
struct sk_buff *skb;
|
|
|
|
struct nlmsghdr *nlh;
|
|
|
|
struct cn_msg *data;
|
|
|
|
struct cn_dev *dev = &cdev;
|
|
|
|
u32 group = 0;
|
|
|
|
int found = 0;
|
|
|
|
|
2014-01-16 12:29:19 +08:00
|
|
|
if (portid || __group) {
|
|
|
|
group = __group;
|
|
|
|
} else {
|
2005-09-12 10:15:07 +08:00
|
|
|
spin_lock_bh(&dev->cbdev->queue_lock);
|
|
|
|
list_for_each_entry(__cbq, &dev->cbdev->queue_list,
|
|
|
|
callback_entry) {
|
2005-09-27 06:06:50 +08:00
|
|
|
if (cn_cb_equal(&__cbq->id.id, &msg->id)) {
|
2005-09-12 10:15:07 +08:00
|
|
|
found = 1;
|
|
|
|
group = __cbq->group;
|
2008-01-04 17:54:38 +08:00
|
|
|
break;
|
2005-09-12 10:15:07 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
spin_unlock_bh(&dev->cbdev->queue_lock);
|
|
|
|
|
|
|
|
if (!found)
|
|
|
|
return -ENODEV;
|
|
|
|
}
|
|
|
|
|
2014-01-16 12:29:19 +08:00
|
|
|
if (!portid && !netlink_has_listeners(dev->nls, group))
|
2006-03-21 14:21:40 +08:00
|
|
|
return -ESRCH;
|
|
|
|
|
2014-04-09 11:37:08 +08:00
|
|
|
size = sizeof(*msg) + len;
|
2005-09-12 10:15:07 +08:00
|
|
|
|
2013-03-27 14:54:56 +08:00
|
|
|
skb = nlmsg_new(size, gfp_mask);
|
2005-09-12 10:15:07 +08:00
|
|
|
if (!skb)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
2013-03-27 14:54:56 +08:00
|
|
|
nlh = nlmsg_put(skb, 0, msg->seq, NLMSG_DONE, size, 0);
|
2012-06-26 13:41:24 +08:00
|
|
|
if (!nlh) {
|
|
|
|
kfree_skb(skb);
|
|
|
|
return -EMSGSIZE;
|
|
|
|
}
|
2005-09-12 10:15:07 +08:00
|
|
|
|
2012-06-26 13:41:24 +08:00
|
|
|
data = nlmsg_data(nlh);
|
2005-09-12 10:15:07 +08:00
|
|
|
|
2013-10-01 04:03:08 +08:00
|
|
|
memcpy(data, msg, size);
|
2005-09-12 10:15:07 +08:00
|
|
|
|
|
|
|
NETLINK_CB(skb).dst_group = group;
|
|
|
|
|
2014-01-16 12:29:19 +08:00
|
|
|
if (group)
|
2023-07-20 04:18:18 +08:00
|
|
|
return netlink_broadcast_filtered(dev->nls, skb, portid, group,
|
|
|
|
gfp_mask, filter,
|
|
|
|
(void *)filter_data);
|
2015-11-07 08:28:21 +08:00
|
|
|
return netlink_unicast(dev->nls, skb, portid,
|
|
|
|
!gfpflags_allow_blocking(gfp_mask));
|
2005-09-12 10:15:07 +08:00
|
|
|
}
|
2014-04-09 11:37:08 +08:00
|
|
|
EXPORT_SYMBOL_GPL(cn_netlink_send_mult);
|
|
|
|
|
|
|
|
/* same as cn_netlink_send_mult except msg->len is used for len */
|
|
|
|
int cn_netlink_send(struct cn_msg *msg, u32 portid, u32 __group,
|
|
|
|
gfp_t gfp_mask)
|
|
|
|
{
|
2023-07-20 04:18:18 +08:00
|
|
|
return cn_netlink_send_mult(msg, msg->len, portid, __group, gfp_mask,
|
|
|
|
NULL, NULL);
|
2014-04-09 11:37:08 +08:00
|
|
|
}
|
2006-06-23 17:05:46 +08:00
|
|
|
EXPORT_SYMBOL_GPL(cn_netlink_send);
|
2005-09-12 10:15:07 +08:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Callback helper - queues work and setup destructor for given data.
|
|
|
|
*/
|
2009-10-02 10:40:07 +08:00
|
|
|
static int cn_call_callback(struct sk_buff *skb)
|
2005-09-12 10:15:07 +08:00
|
|
|
{
|
2014-11-11 10:19:36 +08:00
|
|
|
struct nlmsghdr *nlh;
|
2011-03-28 16:39:36 +08:00
|
|
|
struct cn_callback_entry *i, *cbq = NULL;
|
2005-09-12 10:15:07 +08:00
|
|
|
struct cn_dev *dev = &cdev;
|
2013-03-27 14:54:56 +08:00
|
|
|
struct cn_msg *msg = nlmsg_data(nlmsg_hdr(skb));
|
2011-03-28 16:39:36 +08:00
|
|
|
struct netlink_skb_parms *nsp = &NETLINK_CB(skb);
|
2005-09-27 06:06:50 +08:00
|
|
|
int err = -ENODEV;
|
2005-09-12 10:15:07 +08:00
|
|
|
|
2014-11-11 10:19:36 +08:00
|
|
|
/* verify msg->len is within skb */
|
|
|
|
nlh = nlmsg_hdr(skb);
|
|
|
|
if (nlh->nlmsg_len < NLMSG_HDRLEN + sizeof(struct cn_msg) + msg->len)
|
|
|
|
return -EINVAL;
|
|
|
|
|
2005-09-12 10:15:07 +08:00
|
|
|
spin_lock_bh(&dev->cbdev->queue_lock);
|
2011-03-28 16:39:36 +08:00
|
|
|
list_for_each_entry(i, &dev->cbdev->queue_list, callback_entry) {
|
|
|
|
if (cn_cb_equal(&i->id.id, &msg->id)) {
|
2017-10-20 15:23:49 +08:00
|
|
|
refcount_inc(&i->refcnt);
|
2011-03-28 16:39:36 +08:00
|
|
|
cbq = i;
|
2005-09-12 10:15:07 +08:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
spin_unlock_bh(&dev->cbdev->queue_lock);
|
|
|
|
|
2011-03-28 16:39:36 +08:00
|
|
|
if (cbq != NULL) {
|
|
|
|
cbq->callback(msg, nsp);
|
|
|
|
kfree_skb(skb);
|
|
|
|
cn_queue_release_callback(cbq);
|
2011-04-12 13:39:51 +08:00
|
|
|
err = 0;
|
2011-03-28 16:39:36 +08:00
|
|
|
}
|
|
|
|
|
2005-09-27 06:06:50 +08:00
|
|
|
return err;
|
2005-09-12 10:15:07 +08:00
|
|
|
}
|
|
|
|
|
connector/cn_proc: Allow non-root users access
There were a couple of reasons for not allowing non-root users access
initially - one is there was some point no proper receive buffer
management in place for netlink multicast. But that should be long
fixed. See link below for more context.
Second is that some of the messages may contain data that is root only. But
this should be handled with a finer granularity, which is being done at the
protocol layer. The only problematic protocols are nf_queue and the
firewall netlink. Hence, this restriction for non-root access was relaxed
for NETLINK_ROUTE initially:
https://lore.kernel.org/all/20020612013101.A22399@wotan.suse.de/
This restriction has also been removed for following protocols:
NETLINK_KOBJECT_UEVENT, NETLINK_AUDIT, NETLINK_SOCK_DIAG,
NETLINK_GENERIC, NETLINK_SELINUX.
Since process connector messages are not sensitive (process fork, exit
notifications etc.), and anyone can read /proc data, we can allow non-root
access here. However, since process event notification is not the only
consumer of NETLINK_CONNECTOR, we can make this change even more
fine grained than the protocol level, by checking for multicast group
within the protocol.
Allow non-root access for NETLINK_CONNECTOR via NL_CFG_F_NONROOT_RECV
but add new bind function cn_bind(), which allows non-root access only
for CN_IDX_PROC multicast group.
Signed-off-by: Anjali Kulkarni <anjali.k.kulkarni@oracle.com>
Reviewed-by: Liam R. Howlett <Liam.Howlett@oracle.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2023-07-20 04:18:20 +08:00
|
|
|
/*
|
|
|
|
* Allow non-root access for NETLINK_CONNECTOR family having CN_IDX_PROC
|
|
|
|
* multicast group.
|
|
|
|
*/
|
|
|
|
static int cn_bind(struct net *net, int group)
|
|
|
|
{
|
|
|
|
unsigned long groups = (unsigned long) group;
|
|
|
|
|
|
|
|
if (ns_capable(net->user_ns, CAP_NET_ADMIN))
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
if (test_bit(CN_IDX_PROC - 1, &groups))
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
return -EPERM;
|
|
|
|
}
|
|
|
|
|
2023-07-20 04:18:18 +08:00
|
|
|
static void cn_release(struct sock *sk, unsigned long *groups)
|
|
|
|
{
|
|
|
|
if (groups && test_bit(CN_IDX_PROC - 1, groups)) {
|
|
|
|
kfree(sk->sk_user_data);
|
|
|
|
sk->sk_user_data = NULL;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2005-09-12 10:15:07 +08:00
|
|
|
/*
|
|
|
|
* Main netlink receiving function.
|
|
|
|
*
|
2008-01-04 17:55:01 +08:00
|
|
|
* It checks skb, netlink header and msg sizes, and calls callback helper.
|
2005-09-12 10:15:07 +08:00
|
|
|
*/
|
2015-12-31 21:26:33 +08:00
|
|
|
static void cn_rx_skb(struct sk_buff *skb)
|
2005-09-12 10:15:07 +08:00
|
|
|
{
|
|
|
|
struct nlmsghdr *nlh;
|
2013-10-01 04:03:07 +08:00
|
|
|
int len, err;
|
2005-09-12 10:15:07 +08:00
|
|
|
|
2013-03-27 14:54:56 +08:00
|
|
|
if (skb->len >= NLMSG_HDRLEN) {
|
2007-04-26 10:08:35 +08:00
|
|
|
nlh = nlmsg_hdr(skb);
|
2013-10-01 04:03:07 +08:00
|
|
|
len = nlmsg_len(nlh);
|
2005-09-12 10:15:07 +08:00
|
|
|
|
2013-10-01 04:03:07 +08:00
|
|
|
if (len < (int)sizeof(struct cn_msg) ||
|
2005-09-12 10:15:07 +08:00
|
|
|
skb->len < nlh->nlmsg_len ||
|
2015-12-31 21:26:33 +08:00
|
|
|
len > CONNECTOR_MAX_MSG_SIZE)
|
2007-10-31 11:41:49 +08:00
|
|
|
return;
|
2005-09-12 10:15:07 +08:00
|
|
|
|
2015-12-31 21:26:33 +08:00
|
|
|
err = cn_call_callback(skb_get(skb));
|
2005-09-12 10:15:07 +08:00
|
|
|
if (err < 0)
|
|
|
|
kfree_skb(skb);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Callback add routing - adds callback with given ID and name.
|
|
|
|
* If there is registered callback with the same ID it will not be added.
|
|
|
|
*
|
|
|
|
* May sleep.
|
|
|
|
*/
|
2020-12-15 13:15:47 +08:00
|
|
|
int cn_add_callback(const struct cb_id *id, const char *name,
|
2012-07-14 21:08:29 +08:00
|
|
|
void (*callback)(struct cn_msg *,
|
|
|
|
struct netlink_skb_parms *))
|
2005-09-12 10:15:07 +08:00
|
|
|
{
|
|
|
|
struct cn_dev *dev = &cdev;
|
|
|
|
|
2006-06-20 14:42:53 +08:00
|
|
|
if (!cn_already_initialized)
|
|
|
|
return -EAGAIN;
|
|
|
|
|
2020-09-21 21:10:06 +08:00
|
|
|
return cn_queue_add_callback(dev->cbdev, name, id, callback);
|
2005-09-12 10:15:07 +08:00
|
|
|
}
|
2006-06-23 17:05:46 +08:00
|
|
|
EXPORT_SYMBOL_GPL(cn_add_callback);
|
2005-09-12 10:15:07 +08:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Callback remove routing - removes callback
|
|
|
|
* with given ID.
|
|
|
|
* If there is no registered callback with given
|
|
|
|
* ID nothing happens.
|
|
|
|
*
|
|
|
|
* May sleep while waiting for reference counter to become zero.
|
|
|
|
*/
|
2020-12-15 13:15:47 +08:00
|
|
|
void cn_del_callback(const struct cb_id *id)
|
2005-09-12 10:15:07 +08:00
|
|
|
{
|
|
|
|
struct cn_dev *dev = &cdev;
|
|
|
|
|
|
|
|
cn_queue_del_callback(dev->cbdev, id);
|
|
|
|
}
|
2006-06-23 17:05:46 +08:00
|
|
|
EXPORT_SYMBOL_GPL(cn_del_callback);
|
2005-09-12 10:15:07 +08:00
|
|
|
|
2018-07-07 23:27:53 +08:00
|
|
|
static int __maybe_unused cn_proc_show(struct seq_file *m, void *v)
|
2008-06-28 11:03:24 +08:00
|
|
|
{
|
|
|
|
struct cn_queue_dev *dev = cdev.cbdev;
|
|
|
|
struct cn_callback_entry *cbq;
|
|
|
|
|
|
|
|
seq_printf(m, "Name ID\n");
|
|
|
|
|
|
|
|
spin_lock_bh(&dev->queue_lock);
|
|
|
|
|
|
|
|
list_for_each_entry(cbq, &dev->queue_list, callback_entry) {
|
|
|
|
seq_printf(m, "%-15s %u:%u\n",
|
|
|
|
cbq->id.name,
|
|
|
|
cbq->id.id.idx,
|
|
|
|
cbq->id.id.val);
|
|
|
|
}
|
|
|
|
|
|
|
|
spin_unlock_bh(&dev->queue_lock);
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2012-12-22 07:14:44 +08:00
|
|
|
static int cn_init(void)
|
2005-09-12 10:15:07 +08:00
|
|
|
{
|
|
|
|
struct cn_dev *dev = &cdev;
|
2012-06-29 14:15:21 +08:00
|
|
|
struct netlink_kernel_cfg cfg = {
|
|
|
|
.groups = CN_NETLINK_USERS + 0xf,
|
2019-07-18 12:26:46 +08:00
|
|
|
.input = cn_rx_skb,
|
connector/cn_proc: Allow non-root users access
There were a couple of reasons for not allowing non-root users access
initially - one is there was some point no proper receive buffer
management in place for netlink multicast. But that should be long
fixed. See link below for more context.
Second is that some of the messages may contain data that is root only. But
this should be handled with a finer granularity, which is being done at the
protocol layer. The only problematic protocols are nf_queue and the
firewall netlink. Hence, this restriction for non-root access was relaxed
for NETLINK_ROUTE initially:
https://lore.kernel.org/all/20020612013101.A22399@wotan.suse.de/
This restriction has also been removed for following protocols:
NETLINK_KOBJECT_UEVENT, NETLINK_AUDIT, NETLINK_SOCK_DIAG,
NETLINK_GENERIC, NETLINK_SELINUX.
Since process connector messages are not sensitive (process fork, exit
notifications etc.), and anyone can read /proc data, we can allow non-root
access here. However, since process event notification is not the only
consumer of NETLINK_CONNECTOR, we can make this change even more
fine grained than the protocol level, by checking for multicast group
within the protocol.
Allow non-root access for NETLINK_CONNECTOR via NL_CFG_F_NONROOT_RECV
but add new bind function cn_bind(), which allows non-root access only
for CN_IDX_PROC multicast group.
Signed-off-by: Anjali Kulkarni <anjali.k.kulkarni@oracle.com>
Reviewed-by: Liam R. Howlett <Liam.Howlett@oracle.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2023-07-20 04:18:20 +08:00
|
|
|
.flags = NL_CFG_F_NONROOT_RECV,
|
|
|
|
.bind = cn_bind,
|
2023-07-20 04:18:18 +08:00
|
|
|
.release = cn_release,
|
2012-06-29 14:15:21 +08:00
|
|
|
};
|
2005-09-12 10:15:07 +08:00
|
|
|
|
2012-09-08 10:53:54 +08:00
|
|
|
dev->nls = netlink_kernel_create(&init_net, NETLINK_CONNECTOR, &cfg);
|
2005-09-12 10:15:07 +08:00
|
|
|
if (!dev->nls)
|
|
|
|
return -EIO;
|
|
|
|
|
|
|
|
dev->cbdev = cn_queue_alloc_dev("cqueue", dev->nls);
|
|
|
|
if (!dev->cbdev) {
|
2008-01-29 06:41:19 +08:00
|
|
|
netlink_kernel_release(dev->nls);
|
2005-09-12 10:15:07 +08:00
|
|
|
return -EINVAL;
|
|
|
|
}
|
connector: create connector workqueue only while needed once
The netlink connector uses its own workqueue to relay the datas sent
from userspace to the appropriate callback. If you launch the test
from Documentation/connector and change it a bit to send a high flow
of data, you will see thousands of events coming to the "cqueue"
workqueue by looking at the workqueue tracer.
This flow of events can be sent very quickly. So, to not encumber the
kevent workqueue and delay other jobs, the "cqueue" workqueue should
remain.
But this workqueue is pointless most of the time, it will always be
created (assuming you have built it of course) although only
developpers with specific needs will use it.
So avoid this "most of the time useless task", this patch proposes to
create this workqueue only when needed once. The first jobs to be
sent to connector callbacks will be sent to kevent while the "cqueue"
thread creation will be scheduled to kevent too.
The following jobs will continue to be scheduled to keventd until the
cqueue workqueue is created, and then the rest of the jobs will
continue to perform as usual, through this dedicated workqueue.
Each time I tested this patch, only the first event was sent to
keventd, the rest has been sent to cqueue which have been created
quickly.
Also, this patch fixes some trailing whitespaces on the connector files.
Signed-off-by: Frederic Weisbecker <fweisbec@gmail.com>
Acked-by: Evgeniy Polyakov <zbr@ioremap.net>
Signed-off-by: David S. Miller <davem@davemloft.net>
2009-02-03 15:22:04 +08:00
|
|
|
|
2006-06-20 14:42:53 +08:00
|
|
|
cn_already_initialized = 1;
|
2005-09-12 10:15:07 +08:00
|
|
|
|
2018-05-15 21:57:23 +08:00
|
|
|
proc_create_single("connector", S_IRUGO, init_net.proc_net, cn_proc_show);
|
2008-06-28 11:03:24 +08:00
|
|
|
|
2005-09-12 10:15:07 +08:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2012-12-22 07:14:44 +08:00
|
|
|
static void cn_fini(void)
|
2005-09-12 10:15:07 +08:00
|
|
|
{
|
|
|
|
struct cn_dev *dev = &cdev;
|
|
|
|
|
|
|
|
cn_already_initialized = 0;
|
|
|
|
|
2013-02-18 09:34:56 +08:00
|
|
|
remove_proc_entry("connector", init_net.proc_net);
|
2008-06-28 11:03:24 +08:00
|
|
|
|
2005-09-12 10:15:07 +08:00
|
|
|
cn_queue_free_dev(dev->cbdev);
|
2008-01-29 06:41:19 +08:00
|
|
|
netlink_kernel_release(dev->nls);
|
2005-09-12 10:15:07 +08:00
|
|
|
}
|
|
|
|
|
2006-06-20 14:42:53 +08:00
|
|
|
subsys_initcall(cn_init);
|
2005-09-12 10:15:07 +08:00
|
|
|
module_exit(cn_fini);
|