pkt_sched: fq: change classification of control packets
[linux-2.6-block.git] / drivers / connector / cn_proc.c
CommitLineData
9f46080c
MH
1/*
2 * cn_proc.c - process events connector
3 *
4 * Copyright (C) Matt Helsley, IBM Corp. 2005
5 * Based on cn_fork.c by Guillaume Thouvenin <guillaume.thouvenin@bull.net>
6 * Original copyright notice follows:
7 * Copyright (C) 2005 BULL SA.
8 *
9 *
10 * This program is free software; you can redistribute it and/or modify
11 * it under the terms of the GNU General Public License as published by
12 * the Free Software Foundation; either version 2 of the License, or
13 * (at your option) any later version.
14 *
15 * This program is distributed in the hope that it will be useful,
16 * but WITHOUT ANY WARRANTY; without even the implied warranty of
17 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
18 * GNU General Public License for more details.
19 *
20 * You should have received a copy of the GNU General Public License
21 * along with this program; if not, write to the Free Software
22 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
23 */
24
25#include <linux/module.h>
26#include <linux/kernel.h>
caf3c9dc 27#include <linux/ktime.h>
9f46080c 28#include <linux/init.h>
1d31a4ea 29#include <linux/connector.h>
5a0e3ad6 30#include <linux/gfp.h>
f701e5b7 31#include <linux/ptrace.h>
60063497 32#include <linux/atomic.h>
9582d901 33#include <linux/pid_namespace.h>
60063497 34
af3e095a 35#include <asm/unaligned.h>
9f46080c
MH
36
37#include <linux/cn_proc.h>
38
39#define CN_PROC_MSG_SIZE (sizeof(struct cn_msg) + sizeof(struct proc_event))
40
41static atomic_t proc_event_num_listeners = ATOMIC_INIT(0);
42static struct cb_id cn_proc_event_id = { CN_IDX_PROC, CN_VAL_PROC };
43
cc398c2e 44/* proc_event_counts is used as the sequence number of the netlink message */
9f46080c
MH
45static DEFINE_PER_CPU(__u32, proc_event_counts) = { 0 };
46
47static inline void get_seq(__u32 *ts, int *cpu)
48{
3ea9f683 49 preempt_disable();
f3c48ecc 50 *ts = __this_cpu_inc_return(proc_event_counts) - 1;
9f46080c 51 *cpu = smp_processor_id();
3ea9f683 52 preempt_enable();
9f46080c
MH
53}
54
55void proc_fork_connector(struct task_struct *task)
56{
57 struct cn_msg *msg;
58 struct proc_event *ev;
59 __u8 buffer[CN_PROC_MSG_SIZE];
822cfbff 60 struct timespec ts;
9e8f90df 61 struct task_struct *parent;
9f46080c
MH
62
63 if (atomic_read(&proc_event_num_listeners) < 1)
64 return;
65
f3c48ecc
VI
66 msg = (struct cn_msg *)buffer;
67 ev = (struct proc_event *)msg->data;
e727ca82 68 memset(&ev->event_data, 0, sizeof(ev->event_data));
9f46080c 69 get_seq(&msg->seq, &ev->cpu);
822cfbff 70 ktime_get_ts(&ts); /* get high res monotonic timestamp */
af3e095a 71 put_unaligned(timespec_to_ns(&ts), (__u64 *)&ev->timestamp_ns);
9f46080c 72 ev->what = PROC_EVENT_FORK;
9e8f90df
ON
73 rcu_read_lock();
74 parent = rcu_dereference(task->real_parent);
75 ev->event_data.fork.parent_pid = parent->pid;
76 ev->event_data.fork.parent_tgid = parent->tgid;
77 rcu_read_unlock();
9f46080c
MH
78 ev->event_data.fork.child_pid = task->pid;
79 ev->event_data.fork.child_tgid = task->tgid;
80
81 memcpy(&msg->id, &cn_proc_event_id, sizeof(msg->id));
82 msg->ack = 0; /* not used */
83 msg->len = sizeof(*ev);
e727ca82 84 msg->flags = 0; /* not used */
9f46080c
MH
85 /* If cn_netlink_send() failed, the data is not sent */
86 cn_netlink_send(msg, CN_IDX_PROC, GFP_KERNEL);
87}
88
89void proc_exec_connector(struct task_struct *task)
90{
91 struct cn_msg *msg;
92 struct proc_event *ev;
822cfbff 93 struct timespec ts;
9f46080c
MH
94 __u8 buffer[CN_PROC_MSG_SIZE];
95
96 if (atomic_read(&proc_event_num_listeners) < 1)
97 return;
98
f3c48ecc
VI
99 msg = (struct cn_msg *)buffer;
100 ev = (struct proc_event *)msg->data;
e727ca82 101 memset(&ev->event_data, 0, sizeof(ev->event_data));
9f46080c 102 get_seq(&msg->seq, &ev->cpu);
822cfbff 103 ktime_get_ts(&ts); /* get high res monotonic timestamp */
af3e095a 104 put_unaligned(timespec_to_ns(&ts), (__u64 *)&ev->timestamp_ns);
9f46080c
MH
105 ev->what = PROC_EVENT_EXEC;
106 ev->event_data.exec.process_pid = task->pid;
107 ev->event_data.exec.process_tgid = task->tgid;
108
109 memcpy(&msg->id, &cn_proc_event_id, sizeof(msg->id));
110 msg->ack = 0; /* not used */
111 msg->len = sizeof(*ev);
e727ca82 112 msg->flags = 0; /* not used */
9f46080c
MH
113 cn_netlink_send(msg, CN_IDX_PROC, GFP_KERNEL);
114}
115
116void proc_id_connector(struct task_struct *task, int which_id)
117{
118 struct cn_msg *msg;
119 struct proc_event *ev;
120 __u8 buffer[CN_PROC_MSG_SIZE];
822cfbff 121 struct timespec ts;
c69e8d9c 122 const struct cred *cred;
9f46080c
MH
123
124 if (atomic_read(&proc_event_num_listeners) < 1)
125 return;
126
f3c48ecc
VI
127 msg = (struct cn_msg *)buffer;
128 ev = (struct proc_event *)msg->data;
e727ca82 129 memset(&ev->event_data, 0, sizeof(ev->event_data));
9f46080c
MH
130 ev->what = which_id;
131 ev->event_data.id.process_pid = task->pid;
132 ev->event_data.id.process_tgid = task->tgid;
c69e8d9c
DH
133 rcu_read_lock();
134 cred = __task_cred(task);
9f46080c 135 if (which_id == PROC_EVENT_UID) {
9582d901
EB
136 ev->event_data.id.r.ruid = from_kuid_munged(&init_user_ns, cred->uid);
137 ev->event_data.id.e.euid = from_kuid_munged(&init_user_ns, cred->euid);
9f46080c 138 } else if (which_id == PROC_EVENT_GID) {
9582d901
EB
139 ev->event_data.id.r.rgid = from_kgid_munged(&init_user_ns, cred->gid);
140 ev->event_data.id.e.egid = from_kgid_munged(&init_user_ns, cred->egid);
c69e8d9c
DH
141 } else {
142 rcu_read_unlock();
f3c48ecc 143 return;
c69e8d9c
DH
144 }
145 rcu_read_unlock();
9f46080c 146 get_seq(&msg->seq, &ev->cpu);
822cfbff 147 ktime_get_ts(&ts); /* get high res monotonic timestamp */
af3e095a 148 put_unaligned(timespec_to_ns(&ts), (__u64 *)&ev->timestamp_ns);
9f46080c
MH
149
150 memcpy(&msg->id, &cn_proc_event_id, sizeof(msg->id));
151 msg->ack = 0; /* not used */
152 msg->len = sizeof(*ev);
e727ca82 153 msg->flags = 0; /* not used */
9f46080c
MH
154 cn_netlink_send(msg, CN_IDX_PROC, GFP_KERNEL);
155}
156
02b51df1
SJR
157void proc_sid_connector(struct task_struct *task)
158{
159 struct cn_msg *msg;
160 struct proc_event *ev;
161 struct timespec ts;
162 __u8 buffer[CN_PROC_MSG_SIZE];
163
164 if (atomic_read(&proc_event_num_listeners) < 1)
165 return;
166
167 msg = (struct cn_msg *)buffer;
168 ev = (struct proc_event *)msg->data;
e727ca82 169 memset(&ev->event_data, 0, sizeof(ev->event_data));
02b51df1
SJR
170 get_seq(&msg->seq, &ev->cpu);
171 ktime_get_ts(&ts); /* get high res monotonic timestamp */
172 put_unaligned(timespec_to_ns(&ts), (__u64 *)&ev->timestamp_ns);
173 ev->what = PROC_EVENT_SID;
174 ev->event_data.sid.process_pid = task->pid;
175 ev->event_data.sid.process_tgid = task->tgid;
176
177 memcpy(&msg->id, &cn_proc_event_id, sizeof(msg->id));
178 msg->ack = 0; /* not used */
179 msg->len = sizeof(*ev);
e727ca82 180 msg->flags = 0; /* not used */
02b51df1
SJR
181 cn_netlink_send(msg, CN_IDX_PROC, GFP_KERNEL);
182}
183
f701e5b7
VZ
184void proc_ptrace_connector(struct task_struct *task, int ptrace_id)
185{
186 struct cn_msg *msg;
187 struct proc_event *ev;
188 struct timespec ts;
189 __u8 buffer[CN_PROC_MSG_SIZE];
f701e5b7
VZ
190
191 if (atomic_read(&proc_event_num_listeners) < 1)
192 return;
193
194 msg = (struct cn_msg *)buffer;
195 ev = (struct proc_event *)msg->data;
e727ca82 196 memset(&ev->event_data, 0, sizeof(ev->event_data));
f701e5b7
VZ
197 get_seq(&msg->seq, &ev->cpu);
198 ktime_get_ts(&ts); /* get high res monotonic timestamp */
199 put_unaligned(timespec_to_ns(&ts), (__u64 *)&ev->timestamp_ns);
200 ev->what = PROC_EVENT_PTRACE;
201 ev->event_data.ptrace.process_pid = task->pid;
202 ev->event_data.ptrace.process_tgid = task->tgid;
203 if (ptrace_id == PTRACE_ATTACH) {
204 ev->event_data.ptrace.tracer_pid = current->pid;
205 ev->event_data.ptrace.tracer_tgid = current->tgid;
206 } else if (ptrace_id == PTRACE_DETACH) {
207 ev->event_data.ptrace.tracer_pid = 0;
208 ev->event_data.ptrace.tracer_tgid = 0;
209 } else
210 return;
211
212 memcpy(&msg->id, &cn_proc_event_id, sizeof(msg->id));
213 msg->ack = 0; /* not used */
214 msg->len = sizeof(*ev);
e727ca82 215 msg->flags = 0; /* not used */
f701e5b7
VZ
216 cn_netlink_send(msg, CN_IDX_PROC, GFP_KERNEL);
217}
218
f786ecba
VZ
219void proc_comm_connector(struct task_struct *task)
220{
221 struct cn_msg *msg;
222 struct proc_event *ev;
223 struct timespec ts;
224 __u8 buffer[CN_PROC_MSG_SIZE];
225
226 if (atomic_read(&proc_event_num_listeners) < 1)
227 return;
228
229 msg = (struct cn_msg *)buffer;
230 ev = (struct proc_event *)msg->data;
e727ca82 231 memset(&ev->event_data, 0, sizeof(ev->event_data));
f786ecba
VZ
232 get_seq(&msg->seq, &ev->cpu);
233 ktime_get_ts(&ts); /* get high res monotonic timestamp */
234 put_unaligned(timespec_to_ns(&ts), (__u64 *)&ev->timestamp_ns);
235 ev->what = PROC_EVENT_COMM;
236 ev->event_data.comm.process_pid = task->pid;
237 ev->event_data.comm.process_tgid = task->tgid;
238 get_task_comm(ev->event_data.comm.comm, task);
239
240 memcpy(&msg->id, &cn_proc_event_id, sizeof(msg->id));
241 msg->ack = 0; /* not used */
242 msg->len = sizeof(*ev);
e727ca82 243 msg->flags = 0; /* not used */
2b5faa4c
JD
244 cn_netlink_send(msg, CN_IDX_PROC, GFP_KERNEL);
245}
246
247void proc_coredump_connector(struct task_struct *task)
248{
249 struct cn_msg *msg;
250 struct proc_event *ev;
251 __u8 buffer[CN_PROC_MSG_SIZE];
252 struct timespec ts;
253
254 if (atomic_read(&proc_event_num_listeners) < 1)
255 return;
256
257 msg = (struct cn_msg *)buffer;
258 ev = (struct proc_event *)msg->data;
e727ca82 259 memset(&ev->event_data, 0, sizeof(ev->event_data));
2b5faa4c
JD
260 get_seq(&msg->seq, &ev->cpu);
261 ktime_get_ts(&ts); /* get high res monotonic timestamp */
262 put_unaligned(timespec_to_ns(&ts), (__u64 *)&ev->timestamp_ns);
263 ev->what = PROC_EVENT_COREDUMP;
264 ev->event_data.coredump.process_pid = task->pid;
265 ev->event_data.coredump.process_tgid = task->tgid;
266
267 memcpy(&msg->id, &cn_proc_event_id, sizeof(msg->id));
268 msg->ack = 0; /* not used */
269 msg->len = sizeof(*ev);
e727ca82 270 msg->flags = 0; /* not used */
f786ecba
VZ
271 cn_netlink_send(msg, CN_IDX_PROC, GFP_KERNEL);
272}
273
9f46080c
MH
274void proc_exit_connector(struct task_struct *task)
275{
276 struct cn_msg *msg;
277 struct proc_event *ev;
278 __u8 buffer[CN_PROC_MSG_SIZE];
822cfbff 279 struct timespec ts;
9f46080c
MH
280
281 if (atomic_read(&proc_event_num_listeners) < 1)
282 return;
283
f3c48ecc
VI
284 msg = (struct cn_msg *)buffer;
285 ev = (struct proc_event *)msg->data;
e727ca82 286 memset(&ev->event_data, 0, sizeof(ev->event_data));
9f46080c 287 get_seq(&msg->seq, &ev->cpu);
822cfbff 288 ktime_get_ts(&ts); /* get high res monotonic timestamp */
af3e095a 289 put_unaligned(timespec_to_ns(&ts), (__u64 *)&ev->timestamp_ns);
9f46080c
MH
290 ev->what = PROC_EVENT_EXIT;
291 ev->event_data.exit.process_pid = task->pid;
292 ev->event_data.exit.process_tgid = task->tgid;
293 ev->event_data.exit.exit_code = task->exit_code;
294 ev->event_data.exit.exit_signal = task->exit_signal;
295
296 memcpy(&msg->id, &cn_proc_event_id, sizeof(msg->id));
297 msg->ack = 0; /* not used */
298 msg->len = sizeof(*ev);
e727ca82 299 msg->flags = 0; /* not used */
9f46080c
MH
300 cn_netlink_send(msg, CN_IDX_PROC, GFP_KERNEL);
301}
302
303/*
304 * Send an acknowledgement message to userspace
305 *
306 * Use 0 for success, EFOO otherwise.
307 * Note: this is the negative of conventional kernel error
308 * values because it's not being returned via syscall return
309 * mechanisms.
310 */
311static void cn_proc_ack(int err, int rcvd_seq, int rcvd_ack)
312{
313 struct cn_msg *msg;
314 struct proc_event *ev;
315 __u8 buffer[CN_PROC_MSG_SIZE];
822cfbff 316 struct timespec ts;
9f46080c
MH
317
318 if (atomic_read(&proc_event_num_listeners) < 1)
319 return;
320
f3c48ecc
VI
321 msg = (struct cn_msg *)buffer;
322 ev = (struct proc_event *)msg->data;
e727ca82 323 memset(&ev->event_data, 0, sizeof(ev->event_data));
9f46080c 324 msg->seq = rcvd_seq;
822cfbff 325 ktime_get_ts(&ts); /* get high res monotonic timestamp */
af3e095a 326 put_unaligned(timespec_to_ns(&ts), (__u64 *)&ev->timestamp_ns);
9f46080c
MH
327 ev->cpu = -1;
328 ev->what = PROC_EVENT_NONE;
329 ev->event_data.ack.err = err;
330 memcpy(&msg->id, &cn_proc_event_id, sizeof(msg->id));
331 msg->ack = rcvd_ack + 1;
332 msg->len = sizeof(*ev);
e727ca82 333 msg->flags = 0; /* not used */
9f46080c
MH
334 cn_netlink_send(msg, CN_IDX_PROC, GFP_KERNEL);
335}
336
337/**
338 * cn_proc_mcast_ctl
339 * @data: message sent from userspace via the connector
340 */
f0b25932
SB
341static void cn_proc_mcast_ctl(struct cn_msg *msg,
342 struct netlink_skb_parms *nsp)
9f46080c 343{
9f46080c
MH
344 enum proc_cn_mcast_op *mc_op = NULL;
345 int err = 0;
346
347 if (msg->len != sizeof(*mc_op))
348 return;
349
9582d901
EB
350 /*
351 * Events are reported with respect to the initial pid
352 * and user namespaces so ignore requestors from
353 * other namespaces.
354 */
355 if ((current_user_ns() != &init_user_ns) ||
356 (task_active_pid_ns(current) != &init_pid_ns))
357 return;
358
e70ab977
KC
359 /* Can only change if privileged. */
360 if (!capable(CAP_NET_ADMIN)) {
361 err = EPERM;
362 goto out;
363 }
364
f3c48ecc 365 mc_op = (enum proc_cn_mcast_op *)msg->data;
9f46080c
MH
366 switch (*mc_op) {
367 case PROC_CN_MCAST_LISTEN:
368 atomic_inc(&proc_event_num_listeners);
369 break;
370 case PROC_CN_MCAST_IGNORE:
371 atomic_dec(&proc_event_num_listeners);
372 break;
373 default:
374 err = EINVAL;
375 break;
376 }
e70ab977
KC
377
378out:
9f46080c
MH
379 cn_proc_ack(err, msg->seq, msg->ack);
380}
381
382/*
383 * cn_proc_init - initialization entry point
384 *
385 * Adds the connector callback to the connector driver.
386 */
387static int __init cn_proc_init(void)
388{
f3c48ecc
VI
389 int err = cn_add_callback(&cn_proc_event_id,
390 "cn_proc",
391 &cn_proc_mcast_ctl);
392 if (err) {
393 pr_warn("cn_proc failed to register\n");
9f46080c
MH
394 return err;
395 }
396 return 0;
397}
398
399module_init(cn_proc_init);