Thomas Gleixner | 1a59d1b8 | 2019-05-27 08:55:05 +0200 | [diff] [blame] | 1 | // SPDX-License-Identifier: GPL-2.0-or-later |
Matt Helsley | 9f46080 | 2005-11-07 00:59:16 -0800 | [diff] [blame] | 2 | /* |
| 3 | * cn_proc.c - process events connector |
| 4 | * |
| 5 | * Copyright (C) Matt Helsley, IBM Corp. 2005 |
| 6 | * Based on cn_fork.c by Guillaume Thouvenin <guillaume.thouvenin@bull.net> |
| 7 | * Original copyright notice follows: |
| 8 | * Copyright (C) 2005 BULL SA. |
Matt Helsley | 9f46080 | 2005-11-07 00:59:16 -0800 | [diff] [blame] | 9 | */ |
| 10 | |
Matt Helsley | 9f46080 | 2005-11-07 00:59:16 -0800 | [diff] [blame] | 11 | #include <linux/kernel.h> |
Matt Helsley | caf3c9d | 2006-01-09 20:52:40 -0800 | [diff] [blame] | 12 | #include <linux/ktime.h> |
Matt Helsley | 9f46080 | 2005-11-07 00:59:16 -0800 | [diff] [blame] | 13 | #include <linux/init.h> |
Matt Helsley | 1d31a4e | 2006-06-23 02:05:42 -0700 | [diff] [blame] | 14 | #include <linux/connector.h> |
Tejun Heo | 5a0e3ad | 2010-03-24 17:04:11 +0900 | [diff] [blame] | 15 | #include <linux/gfp.h> |
Vladimir Zapolskiy | f701e5b | 2011-07-15 20:45:18 +0300 | [diff] [blame] | 16 | #include <linux/ptrace.h> |
Arun Sharma | 60063497 | 2011-07-26 16:09:06 -0700 | [diff] [blame] | 17 | #include <linux/atomic.h> |
Eric W. Biederman | 9582d90 | 2012-02-07 16:48:16 -0800 | [diff] [blame] | 18 | #include <linux/pid_namespace.h> |
Arun Sharma | 60063497 | 2011-07-26 16:09:06 -0700 | [diff] [blame] | 19 | |
Matt Helsley | 9f46080 | 2005-11-07 00:59:16 -0800 | [diff] [blame] | 20 | #include <linux/cn_proc.h> |
Mike Galbraith | 3e92fd7 | 2020-05-27 22:11:17 +0200 | [diff] [blame] | 21 | #include <linux/local_lock.h> |
Matt Helsley | 9f46080 | 2005-11-07 00:59:16 -0800 | [diff] [blame] | 22 | |
Chris Metcalf | 1ca1a4c | 2013-11-14 12:09:21 -0500 | [diff] [blame] | 23 | /* |
| 24 | * Size of a cn_msg followed by a proc_event structure. Since the |
| 25 | * sizeof struct cn_msg is a multiple of 4 bytes, but not 8 bytes, we |
| 26 | * add one 4-byte word to the size here, and then start the actual |
| 27 | * cn_msg structure 4 bytes into the stack buffer. The result is that |
| 28 | * the immediately following proc_event structure is aligned to 8 bytes. |
| 29 | */ |
| 30 | #define CN_PROC_MSG_SIZE (sizeof(struct cn_msg) + sizeof(struct proc_event) + 4) |
| 31 | |
| 32 | /* See comment above; we test our assumption about sizeof struct cn_msg here. */ |
| 33 | static inline struct cn_msg *buffer_to_cn_msg(__u8 *buffer) |
| 34 | { |
| 35 | BUILD_BUG_ON(sizeof(struct cn_msg) != 20); |
| 36 | return (struct cn_msg *)(buffer + 4); |
| 37 | } |
Matt Helsley | 9f46080 | 2005-11-07 00:59:16 -0800 | [diff] [blame] | 38 | |
| 39 | static atomic_t proc_event_num_listeners = ATOMIC_INIT(0); |
| 40 | static struct cb_id cn_proc_event_id = { CN_IDX_PROC, CN_VAL_PROC }; |
| 41 | |
Mike Galbraith | 3e92fd7 | 2020-05-27 22:11:17 +0200 | [diff] [blame] | 42 | /* local_event.count is used as the sequence number of the netlink message */ |
| 43 | struct local_event { |
| 44 | local_lock_t lock; |
| 45 | __u32 count; |
| 46 | }; |
| 47 | static DEFINE_PER_CPU(struct local_event, local_event) = { |
| 48 | .lock = INIT_LOCAL_LOCK(lock), |
| 49 | }; |
Matt Helsley | 9f46080 | 2005-11-07 00:59:16 -0800 | [diff] [blame] | 50 | |
Anjali Kulkarni | 2aa1f7a | 2023-07-19 13:18:18 -0700 | [diff] [blame] | 51 | static int cn_filter(struct sock *dsk, struct sk_buff *skb, void *data) |
| 52 | { |
Anjali Kulkarni | 743acf3 | 2023-07-19 13:18:19 -0700 | [diff] [blame] | 53 | __u32 what, exit_code, *ptr; |
Anjali Kulkarni | 2aa1f7a | 2023-07-19 13:18:18 -0700 | [diff] [blame] | 54 | enum proc_cn_mcast_op mc_op; |
Anjali Kulkarni | 743acf3 | 2023-07-19 13:18:19 -0700 | [diff] [blame] | 55 | uintptr_t val; |
Anjali Kulkarni | 2aa1f7a | 2023-07-19 13:18:18 -0700 | [diff] [blame] | 56 | |
Anjali Kulkarni | 9644bc4 | 2023-10-20 16:40:58 -0700 | [diff] [blame] | 57 | if (!dsk || !dsk->sk_user_data || !data) |
Anjali Kulkarni | 2aa1f7a | 2023-07-19 13:18:18 -0700 | [diff] [blame] | 58 | return 0; |
| 59 | |
Anjali Kulkarni | 743acf3 | 2023-07-19 13:18:19 -0700 | [diff] [blame] | 60 | ptr = (__u32 *)data; |
| 61 | what = *ptr++; |
| 62 | exit_code = *ptr; |
| 63 | val = ((struct proc_input *)(dsk->sk_user_data))->event_type; |
Anjali Kulkarni | 2aa1f7a | 2023-07-19 13:18:18 -0700 | [diff] [blame] | 64 | mc_op = ((struct proc_input *)(dsk->sk_user_data))->mcast_op; |
| 65 | |
| 66 | if (mc_op == PROC_CN_MCAST_IGNORE) |
| 67 | return 1; |
| 68 | |
Anjali Kulkarni | 743acf3 | 2023-07-19 13:18:19 -0700 | [diff] [blame] | 69 | if ((__u32)val == PROC_EVENT_ALL) |
| 70 | return 0; |
| 71 | |
| 72 | /* |
| 73 | * Drop packet if we have to report only non-zero exit status |
| 74 | * (PROC_EVENT_NONZERO_EXIT) and exit status is 0 |
| 75 | */ |
| 76 | if (((__u32)val & PROC_EVENT_NONZERO_EXIT) && |
| 77 | (what == PROC_EVENT_EXIT)) { |
| 78 | if (exit_code) |
| 79 | return 0; |
| 80 | } |
| 81 | |
| 82 | if ((__u32)val & what) |
| 83 | return 0; |
| 84 | |
| 85 | return 1; |
Anjali Kulkarni | 2aa1f7a | 2023-07-19 13:18:18 -0700 | [diff] [blame] | 86 | } |
| 87 | |
Aaron Campbell | ab8ed95 | 2016-06-24 10:05:32 -0300 | [diff] [blame] | 88 | static inline void send_msg(struct cn_msg *msg) |
Matt Helsley | 9f46080 | 2005-11-07 00:59:16 -0800 | [diff] [blame] | 89 | { |
Anjali Kulkarni | 743acf3 | 2023-07-19 13:18:19 -0700 | [diff] [blame] | 90 | __u32 filter_data[2]; |
| 91 | |
Mike Galbraith | 3e92fd7 | 2020-05-27 22:11:17 +0200 | [diff] [blame] | 92 | local_lock(&local_event.lock); |
Aaron Campbell | ab8ed95 | 2016-06-24 10:05:32 -0300 | [diff] [blame] | 93 | |
Mike Galbraith | 3e92fd7 | 2020-05-27 22:11:17 +0200 | [diff] [blame] | 94 | msg->seq = __this_cpu_inc_return(local_event.count) - 1; |
Aaron Campbell | ab8ed95 | 2016-06-24 10:05:32 -0300 | [diff] [blame] | 95 | ((struct proc_event *)msg->data)->cpu = smp_processor_id(); |
| 96 | |
| 97 | /* |
Mike Galbraith | 3e92fd7 | 2020-05-27 22:11:17 +0200 | [diff] [blame] | 98 | * local_lock() disables preemption during send to ensure the messages |
| 99 | * are ordered according to their sequence numbers. |
Aaron Campbell | ab8ed95 | 2016-06-24 10:05:32 -0300 | [diff] [blame] | 100 | * |
| 101 | * If cn_netlink_send() fails, the data is not sent. |
| 102 | */ |
Anjali Kulkarni | 743acf3 | 2023-07-19 13:18:19 -0700 | [diff] [blame] | 103 | filter_data[0] = ((struct proc_event *)msg->data)->what; |
| 104 | if (filter_data[0] == PROC_EVENT_EXIT) { |
| 105 | filter_data[1] = |
| 106 | ((struct proc_event *)msg->data)->event_data.exit.exit_code; |
| 107 | } else { |
| 108 | filter_data[1] = 0; |
| 109 | } |
| 110 | |
Keqi Wang | 8929f95 | 2024-02-09 17:16:59 +0800 | [diff] [blame] | 111 | cn_netlink_send_mult(msg, msg->len, 0, CN_IDX_PROC, GFP_NOWAIT, |
| 112 | cn_filter, (void *)filter_data); |
Aaron Campbell | ab8ed95 | 2016-06-24 10:05:32 -0300 | [diff] [blame] | 113 | |
Mike Galbraith | 3e92fd7 | 2020-05-27 22:11:17 +0200 | [diff] [blame] | 114 | local_unlock(&local_event.lock); |
Matt Helsley | 9f46080 | 2005-11-07 00:59:16 -0800 | [diff] [blame] | 115 | } |
| 116 | |
| 117 | void proc_fork_connector(struct task_struct *task) |
| 118 | { |
| 119 | struct cn_msg *msg; |
| 120 | struct proc_event *ev; |
Chris Metcalf | 1ca1a4c | 2013-11-14 12:09:21 -0500 | [diff] [blame] | 121 | __u8 buffer[CN_PROC_MSG_SIZE] __aligned(8); |
Oleg Nesterov | 9e8f90d | 2011-07-28 18:26:32 -0700 | [diff] [blame] | 122 | struct task_struct *parent; |
Matt Helsley | 9f46080 | 2005-11-07 00:59:16 -0800 | [diff] [blame] | 123 | |
| 124 | if (atomic_read(&proc_event_num_listeners) < 1) |
| 125 | return; |
| 126 | |
Chris Metcalf | 1ca1a4c | 2013-11-14 12:09:21 -0500 | [diff] [blame] | 127 | msg = buffer_to_cn_msg(buffer); |
Valentin Ilie | f3c48ec | 2012-07-14 13:08:29 +0000 | [diff] [blame] | 128 | ev = (struct proc_event *)msg->data; |
Mathias Krause | e727ca82 | 2013-09-30 22:03:06 +0200 | [diff] [blame] | 129 | memset(&ev->event_data, 0, sizeof(ev->event_data)); |
Thomas Gleixner | 9e93f21 | 2014-07-16 21:04:40 +0000 | [diff] [blame] | 130 | ev->timestamp_ns = ktime_get_ns(); |
Matt Helsley | 9f46080 | 2005-11-07 00:59:16 -0800 | [diff] [blame] | 131 | ev->what = PROC_EVENT_FORK; |
Oleg Nesterov | 9e8f90d | 2011-07-28 18:26:32 -0700 | [diff] [blame] | 132 | rcu_read_lock(); |
| 133 | parent = rcu_dereference(task->real_parent); |
| 134 | ev->event_data.fork.parent_pid = parent->pid; |
| 135 | ev->event_data.fork.parent_tgid = parent->tgid; |
| 136 | rcu_read_unlock(); |
Matt Helsley | 9f46080 | 2005-11-07 00:59:16 -0800 | [diff] [blame] | 137 | ev->event_data.fork.child_pid = task->pid; |
| 138 | ev->event_data.fork.child_tgid = task->tgid; |
| 139 | |
| 140 | memcpy(&msg->id, &cn_proc_event_id, sizeof(msg->id)); |
| 141 | msg->ack = 0; /* not used */ |
| 142 | msg->len = sizeof(*ev); |
Mathias Krause | e727ca82 | 2013-09-30 22:03:06 +0200 | [diff] [blame] | 143 | msg->flags = 0; /* not used */ |
Aaron Campbell | ab8ed95 | 2016-06-24 10:05:32 -0300 | [diff] [blame] | 144 | send_msg(msg); |
Matt Helsley | 9f46080 | 2005-11-07 00:59:16 -0800 | [diff] [blame] | 145 | } |
| 146 | |
| 147 | void proc_exec_connector(struct task_struct *task) |
| 148 | { |
| 149 | struct cn_msg *msg; |
| 150 | struct proc_event *ev; |
Chris Metcalf | 1ca1a4c | 2013-11-14 12:09:21 -0500 | [diff] [blame] | 151 | __u8 buffer[CN_PROC_MSG_SIZE] __aligned(8); |
Matt Helsley | 9f46080 | 2005-11-07 00:59:16 -0800 | [diff] [blame] | 152 | |
| 153 | if (atomic_read(&proc_event_num_listeners) < 1) |
| 154 | return; |
| 155 | |
Chris Metcalf | 1ca1a4c | 2013-11-14 12:09:21 -0500 | [diff] [blame] | 156 | msg = buffer_to_cn_msg(buffer); |
Valentin Ilie | f3c48ec | 2012-07-14 13:08:29 +0000 | [diff] [blame] | 157 | ev = (struct proc_event *)msg->data; |
Mathias Krause | e727ca82 | 2013-09-30 22:03:06 +0200 | [diff] [blame] | 158 | memset(&ev->event_data, 0, sizeof(ev->event_data)); |
Thomas Gleixner | 9e93f21 | 2014-07-16 21:04:40 +0000 | [diff] [blame] | 159 | ev->timestamp_ns = ktime_get_ns(); |
Matt Helsley | 9f46080 | 2005-11-07 00:59:16 -0800 | [diff] [blame] | 160 | ev->what = PROC_EVENT_EXEC; |
| 161 | ev->event_data.exec.process_pid = task->pid; |
| 162 | ev->event_data.exec.process_tgid = task->tgid; |
| 163 | |
| 164 | memcpy(&msg->id, &cn_proc_event_id, sizeof(msg->id)); |
| 165 | msg->ack = 0; /* not used */ |
| 166 | msg->len = sizeof(*ev); |
Mathias Krause | e727ca82 | 2013-09-30 22:03:06 +0200 | [diff] [blame] | 167 | msg->flags = 0; /* not used */ |
Aaron Campbell | ab8ed95 | 2016-06-24 10:05:32 -0300 | [diff] [blame] | 168 | send_msg(msg); |
Matt Helsley | 9f46080 | 2005-11-07 00:59:16 -0800 | [diff] [blame] | 169 | } |
| 170 | |
| 171 | void proc_id_connector(struct task_struct *task, int which_id) |
| 172 | { |
| 173 | struct cn_msg *msg; |
| 174 | struct proc_event *ev; |
Chris Metcalf | 1ca1a4c | 2013-11-14 12:09:21 -0500 | [diff] [blame] | 175 | __u8 buffer[CN_PROC_MSG_SIZE] __aligned(8); |
David Howells | c69e8d9 | 2008-11-14 10:39:19 +1100 | [diff] [blame] | 176 | const struct cred *cred; |
Matt Helsley | 9f46080 | 2005-11-07 00:59:16 -0800 | [diff] [blame] | 177 | |
| 178 | if (atomic_read(&proc_event_num_listeners) < 1) |
| 179 | return; |
| 180 | |
Chris Metcalf | 1ca1a4c | 2013-11-14 12:09:21 -0500 | [diff] [blame] | 181 | msg = buffer_to_cn_msg(buffer); |
Valentin Ilie | f3c48ec | 2012-07-14 13:08:29 +0000 | [diff] [blame] | 182 | ev = (struct proc_event *)msg->data; |
Mathias Krause | e727ca82 | 2013-09-30 22:03:06 +0200 | [diff] [blame] | 183 | memset(&ev->event_data, 0, sizeof(ev->event_data)); |
Matt Helsley | 9f46080 | 2005-11-07 00:59:16 -0800 | [diff] [blame] | 184 | ev->what = which_id; |
| 185 | ev->event_data.id.process_pid = task->pid; |
| 186 | ev->event_data.id.process_tgid = task->tgid; |
David Howells | c69e8d9 | 2008-11-14 10:39:19 +1100 | [diff] [blame] | 187 | rcu_read_lock(); |
| 188 | cred = __task_cred(task); |
Matt Helsley | 9f46080 | 2005-11-07 00:59:16 -0800 | [diff] [blame] | 189 | if (which_id == PROC_EVENT_UID) { |
Eric W. Biederman | 9582d90 | 2012-02-07 16:48:16 -0800 | [diff] [blame] | 190 | ev->event_data.id.r.ruid = from_kuid_munged(&init_user_ns, cred->uid); |
| 191 | ev->event_data.id.e.euid = from_kuid_munged(&init_user_ns, cred->euid); |
Matt Helsley | 9f46080 | 2005-11-07 00:59:16 -0800 | [diff] [blame] | 192 | } else if (which_id == PROC_EVENT_GID) { |
Eric W. Biederman | 9582d90 | 2012-02-07 16:48:16 -0800 | [diff] [blame] | 193 | ev->event_data.id.r.rgid = from_kgid_munged(&init_user_ns, cred->gid); |
| 194 | ev->event_data.id.e.egid = from_kgid_munged(&init_user_ns, cred->egid); |
David Howells | c69e8d9 | 2008-11-14 10:39:19 +1100 | [diff] [blame] | 195 | } else { |
| 196 | rcu_read_unlock(); |
Valentin Ilie | f3c48ec | 2012-07-14 13:08:29 +0000 | [diff] [blame] | 197 | return; |
David Howells | c69e8d9 | 2008-11-14 10:39:19 +1100 | [diff] [blame] | 198 | } |
| 199 | rcu_read_unlock(); |
Thomas Gleixner | 9e93f21 | 2014-07-16 21:04:40 +0000 | [diff] [blame] | 200 | ev->timestamp_ns = ktime_get_ns(); |
Matt Helsley | 9f46080 | 2005-11-07 00:59:16 -0800 | [diff] [blame] | 201 | |
| 202 | memcpy(&msg->id, &cn_proc_event_id, sizeof(msg->id)); |
| 203 | msg->ack = 0; /* not used */ |
| 204 | msg->len = sizeof(*ev); |
Mathias Krause | e727ca82 | 2013-09-30 22:03:06 +0200 | [diff] [blame] | 205 | msg->flags = 0; /* not used */ |
Aaron Campbell | ab8ed95 | 2016-06-24 10:05:32 -0300 | [diff] [blame] | 206 | send_msg(msg); |
Matt Helsley | 9f46080 | 2005-11-07 00:59:16 -0800 | [diff] [blame] | 207 | } |
| 208 | |
Scott James Remnant | 02b51df | 2009-09-22 16:43:44 -0700 | [diff] [blame] | 209 | void proc_sid_connector(struct task_struct *task) |
| 210 | { |
| 211 | struct cn_msg *msg; |
| 212 | struct proc_event *ev; |
Chris Metcalf | 1ca1a4c | 2013-11-14 12:09:21 -0500 | [diff] [blame] | 213 | __u8 buffer[CN_PROC_MSG_SIZE] __aligned(8); |
Scott James Remnant | 02b51df | 2009-09-22 16:43:44 -0700 | [diff] [blame] | 214 | |
| 215 | if (atomic_read(&proc_event_num_listeners) < 1) |
| 216 | return; |
| 217 | |
Chris Metcalf | 1ca1a4c | 2013-11-14 12:09:21 -0500 | [diff] [blame] | 218 | msg = buffer_to_cn_msg(buffer); |
Scott James Remnant | 02b51df | 2009-09-22 16:43:44 -0700 | [diff] [blame] | 219 | ev = (struct proc_event *)msg->data; |
Mathias Krause | e727ca82 | 2013-09-30 22:03:06 +0200 | [diff] [blame] | 220 | memset(&ev->event_data, 0, sizeof(ev->event_data)); |
Thomas Gleixner | 9e93f21 | 2014-07-16 21:04:40 +0000 | [diff] [blame] | 221 | ev->timestamp_ns = ktime_get_ns(); |
Scott James Remnant | 02b51df | 2009-09-22 16:43:44 -0700 | [diff] [blame] | 222 | ev->what = PROC_EVENT_SID; |
| 223 | ev->event_data.sid.process_pid = task->pid; |
| 224 | ev->event_data.sid.process_tgid = task->tgid; |
| 225 | |
| 226 | memcpy(&msg->id, &cn_proc_event_id, sizeof(msg->id)); |
| 227 | msg->ack = 0; /* not used */ |
| 228 | msg->len = sizeof(*ev); |
Mathias Krause | e727ca82 | 2013-09-30 22:03:06 +0200 | [diff] [blame] | 229 | msg->flags = 0; /* not used */ |
Aaron Campbell | ab8ed95 | 2016-06-24 10:05:32 -0300 | [diff] [blame] | 230 | send_msg(msg); |
Scott James Remnant | 02b51df | 2009-09-22 16:43:44 -0700 | [diff] [blame] | 231 | } |
| 232 | |
Vladimir Zapolskiy | f701e5b | 2011-07-15 20:45:18 +0300 | [diff] [blame] | 233 | void proc_ptrace_connector(struct task_struct *task, int ptrace_id) |
| 234 | { |
| 235 | struct cn_msg *msg; |
| 236 | struct proc_event *ev; |
Chris Metcalf | 1ca1a4c | 2013-11-14 12:09:21 -0500 | [diff] [blame] | 237 | __u8 buffer[CN_PROC_MSG_SIZE] __aligned(8); |
Vladimir Zapolskiy | f701e5b | 2011-07-15 20:45:18 +0300 | [diff] [blame] | 238 | |
| 239 | if (atomic_read(&proc_event_num_listeners) < 1) |
| 240 | return; |
| 241 | |
Chris Metcalf | 1ca1a4c | 2013-11-14 12:09:21 -0500 | [diff] [blame] | 242 | msg = buffer_to_cn_msg(buffer); |
Vladimir Zapolskiy | f701e5b | 2011-07-15 20:45:18 +0300 | [diff] [blame] | 243 | ev = (struct proc_event *)msg->data; |
Mathias Krause | e727ca82 | 2013-09-30 22:03:06 +0200 | [diff] [blame] | 244 | memset(&ev->event_data, 0, sizeof(ev->event_data)); |
Thomas Gleixner | 9e93f21 | 2014-07-16 21:04:40 +0000 | [diff] [blame] | 245 | ev->timestamp_ns = ktime_get_ns(); |
Vladimir Zapolskiy | f701e5b | 2011-07-15 20:45:18 +0300 | [diff] [blame] | 246 | ev->what = PROC_EVENT_PTRACE; |
| 247 | ev->event_data.ptrace.process_pid = task->pid; |
| 248 | ev->event_data.ptrace.process_tgid = task->tgid; |
| 249 | if (ptrace_id == PTRACE_ATTACH) { |
| 250 | ev->event_data.ptrace.tracer_pid = current->pid; |
| 251 | ev->event_data.ptrace.tracer_tgid = current->tgid; |
| 252 | } else if (ptrace_id == PTRACE_DETACH) { |
| 253 | ev->event_data.ptrace.tracer_pid = 0; |
| 254 | ev->event_data.ptrace.tracer_tgid = 0; |
| 255 | } else |
| 256 | return; |
| 257 | |
| 258 | memcpy(&msg->id, &cn_proc_event_id, sizeof(msg->id)); |
| 259 | msg->ack = 0; /* not used */ |
| 260 | msg->len = sizeof(*ev); |
Mathias Krause | e727ca82 | 2013-09-30 22:03:06 +0200 | [diff] [blame] | 261 | msg->flags = 0; /* not used */ |
Aaron Campbell | ab8ed95 | 2016-06-24 10:05:32 -0300 | [diff] [blame] | 262 | send_msg(msg); |
Vladimir Zapolskiy | f701e5b | 2011-07-15 20:45:18 +0300 | [diff] [blame] | 263 | } |
| 264 | |
Vladimir Zapolskiy | f786ecb | 2011-09-21 09:26:44 +0000 | [diff] [blame] | 265 | void proc_comm_connector(struct task_struct *task) |
| 266 | { |
| 267 | struct cn_msg *msg; |
| 268 | struct proc_event *ev; |
Chris Metcalf | 1ca1a4c | 2013-11-14 12:09:21 -0500 | [diff] [blame] | 269 | __u8 buffer[CN_PROC_MSG_SIZE] __aligned(8); |
Vladimir Zapolskiy | f786ecb | 2011-09-21 09:26:44 +0000 | [diff] [blame] | 270 | |
| 271 | if (atomic_read(&proc_event_num_listeners) < 1) |
| 272 | return; |
| 273 | |
Chris Metcalf | 1ca1a4c | 2013-11-14 12:09:21 -0500 | [diff] [blame] | 274 | msg = buffer_to_cn_msg(buffer); |
Vladimir Zapolskiy | f786ecb | 2011-09-21 09:26:44 +0000 | [diff] [blame] | 275 | ev = (struct proc_event *)msg->data; |
Mathias Krause | e727ca82 | 2013-09-30 22:03:06 +0200 | [diff] [blame] | 276 | memset(&ev->event_data, 0, sizeof(ev->event_data)); |
Thomas Gleixner | 9e93f21 | 2014-07-16 21:04:40 +0000 | [diff] [blame] | 277 | ev->timestamp_ns = ktime_get_ns(); |
Vladimir Zapolskiy | f786ecb | 2011-09-21 09:26:44 +0000 | [diff] [blame] | 278 | ev->what = PROC_EVENT_COMM; |
| 279 | ev->event_data.comm.process_pid = task->pid; |
| 280 | ev->event_data.comm.process_tgid = task->tgid; |
| 281 | get_task_comm(ev->event_data.comm.comm, task); |
| 282 | |
| 283 | memcpy(&msg->id, &cn_proc_event_id, sizeof(msg->id)); |
| 284 | msg->ack = 0; /* not used */ |
| 285 | msg->len = sizeof(*ev); |
Mathias Krause | e727ca82 | 2013-09-30 22:03:06 +0200 | [diff] [blame] | 286 | msg->flags = 0; /* not used */ |
Aaron Campbell | ab8ed95 | 2016-06-24 10:05:32 -0300 | [diff] [blame] | 287 | send_msg(msg); |
Vladimir Zapolskiy | f786ecb | 2011-09-21 09:26:44 +0000 | [diff] [blame] | 288 | } |
| 289 | |
Jesper Derehag | 2b5faa4 | 2013-03-19 20:50:05 +0000 | [diff] [blame] | 290 | void proc_coredump_connector(struct task_struct *task) |
| 291 | { |
| 292 | struct cn_msg *msg; |
| 293 | struct proc_event *ev; |
Li RongQing | 6d2b0f0 | 2019-03-06 14:46:27 +0800 | [diff] [blame] | 294 | struct task_struct *parent; |
Chris Metcalf | 1ca1a4c | 2013-11-14 12:09:21 -0500 | [diff] [blame] | 295 | __u8 buffer[CN_PROC_MSG_SIZE] __aligned(8); |
Jesper Derehag | 2b5faa4 | 2013-03-19 20:50:05 +0000 | [diff] [blame] | 296 | |
| 297 | if (atomic_read(&proc_event_num_listeners) < 1) |
| 298 | return; |
| 299 | |
Chris Metcalf | 1ca1a4c | 2013-11-14 12:09:21 -0500 | [diff] [blame] | 300 | msg = buffer_to_cn_msg(buffer); |
Jesper Derehag | 2b5faa4 | 2013-03-19 20:50:05 +0000 | [diff] [blame] | 301 | ev = (struct proc_event *)msg->data; |
Mathias Krause | e727ca82 | 2013-09-30 22:03:06 +0200 | [diff] [blame] | 302 | memset(&ev->event_data, 0, sizeof(ev->event_data)); |
Thomas Gleixner | 9e93f21 | 2014-07-16 21:04:40 +0000 | [diff] [blame] | 303 | ev->timestamp_ns = ktime_get_ns(); |
Jesper Derehag | 2b5faa4 | 2013-03-19 20:50:05 +0000 | [diff] [blame] | 304 | ev->what = PROC_EVENT_COREDUMP; |
| 305 | ev->event_data.coredump.process_pid = task->pid; |
| 306 | ev->event_data.coredump.process_tgid = task->tgid; |
Li RongQing | 6d2b0f0 | 2019-03-06 14:46:27 +0800 | [diff] [blame] | 307 | |
| 308 | rcu_read_lock(); |
| 309 | if (pid_alive(task)) { |
| 310 | parent = rcu_dereference(task->real_parent); |
| 311 | ev->event_data.coredump.parent_pid = parent->pid; |
| 312 | ev->event_data.coredump.parent_tgid = parent->tgid; |
| 313 | } |
| 314 | rcu_read_unlock(); |
Jesper Derehag | 2b5faa4 | 2013-03-19 20:50:05 +0000 | [diff] [blame] | 315 | |
| 316 | memcpy(&msg->id, &cn_proc_event_id, sizeof(msg->id)); |
| 317 | msg->ack = 0; /* not used */ |
| 318 | msg->len = sizeof(*ev); |
Mathias Krause | e727ca82 | 2013-09-30 22:03:06 +0200 | [diff] [blame] | 319 | msg->flags = 0; /* not used */ |
Aaron Campbell | ab8ed95 | 2016-06-24 10:05:32 -0300 | [diff] [blame] | 320 | send_msg(msg); |
Jesper Derehag | 2b5faa4 | 2013-03-19 20:50:05 +0000 | [diff] [blame] | 321 | } |
| 322 | |
Matt Helsley | 9f46080 | 2005-11-07 00:59:16 -0800 | [diff] [blame] | 323 | void proc_exit_connector(struct task_struct *task) |
| 324 | { |
| 325 | struct cn_msg *msg; |
| 326 | struct proc_event *ev; |
Li RongQing | 6d2b0f0 | 2019-03-06 14:46:27 +0800 | [diff] [blame] | 327 | struct task_struct *parent; |
Chris Metcalf | 1ca1a4c | 2013-11-14 12:09:21 -0500 | [diff] [blame] | 328 | __u8 buffer[CN_PROC_MSG_SIZE] __aligned(8); |
Matt Helsley | 9f46080 | 2005-11-07 00:59:16 -0800 | [diff] [blame] | 329 | |
| 330 | if (atomic_read(&proc_event_num_listeners) < 1) |
| 331 | return; |
| 332 | |
Chris Metcalf | 1ca1a4c | 2013-11-14 12:09:21 -0500 | [diff] [blame] | 333 | msg = buffer_to_cn_msg(buffer); |
Valentin Ilie | f3c48ec | 2012-07-14 13:08:29 +0000 | [diff] [blame] | 334 | ev = (struct proc_event *)msg->data; |
Mathias Krause | e727ca82 | 2013-09-30 22:03:06 +0200 | [diff] [blame] | 335 | memset(&ev->event_data, 0, sizeof(ev->event_data)); |
Thomas Gleixner | 9e93f21 | 2014-07-16 21:04:40 +0000 | [diff] [blame] | 336 | ev->timestamp_ns = ktime_get_ns(); |
Matt Helsley | 9f46080 | 2005-11-07 00:59:16 -0800 | [diff] [blame] | 337 | ev->what = PROC_EVENT_EXIT; |
| 338 | ev->event_data.exit.process_pid = task->pid; |
| 339 | ev->event_data.exit.process_tgid = task->tgid; |
| 340 | ev->event_data.exit.exit_code = task->exit_code; |
| 341 | ev->event_data.exit.exit_signal = task->exit_signal; |
Li RongQing | 6d2b0f0 | 2019-03-06 14:46:27 +0800 | [diff] [blame] | 342 | |
| 343 | rcu_read_lock(); |
| 344 | if (pid_alive(task)) { |
| 345 | parent = rcu_dereference(task->real_parent); |
| 346 | ev->event_data.exit.parent_pid = parent->pid; |
| 347 | ev->event_data.exit.parent_tgid = parent->tgid; |
| 348 | } |
| 349 | rcu_read_unlock(); |
Matt Helsley | 9f46080 | 2005-11-07 00:59:16 -0800 | [diff] [blame] | 350 | |
| 351 | memcpy(&msg->id, &cn_proc_event_id, sizeof(msg->id)); |
| 352 | msg->ack = 0; /* not used */ |
| 353 | msg->len = sizeof(*ev); |
Mathias Krause | e727ca82 | 2013-09-30 22:03:06 +0200 | [diff] [blame] | 354 | msg->flags = 0; /* not used */ |
Aaron Campbell | ab8ed95 | 2016-06-24 10:05:32 -0300 | [diff] [blame] | 355 | send_msg(msg); |
Matt Helsley | 9f46080 | 2005-11-07 00:59:16 -0800 | [diff] [blame] | 356 | } |
| 357 | |
| 358 | /* |
| 359 | * Send an acknowledgement message to userspace |
| 360 | * |
| 361 | * Use 0 for success, EFOO otherwise. |
| 362 | * Note: this is the negative of conventional kernel error |
| 363 | * values because it's not being returned via syscall return |
| 364 | * mechanisms. |
| 365 | */ |
| 366 | static void cn_proc_ack(int err, int rcvd_seq, int rcvd_ack) |
| 367 | { |
| 368 | struct cn_msg *msg; |
| 369 | struct proc_event *ev; |
Chris Metcalf | 1ca1a4c | 2013-11-14 12:09:21 -0500 | [diff] [blame] | 370 | __u8 buffer[CN_PROC_MSG_SIZE] __aligned(8); |
Matt Helsley | 9f46080 | 2005-11-07 00:59:16 -0800 | [diff] [blame] | 371 | |
| 372 | if (atomic_read(&proc_event_num_listeners) < 1) |
| 373 | return; |
| 374 | |
Chris Metcalf | 1ca1a4c | 2013-11-14 12:09:21 -0500 | [diff] [blame] | 375 | msg = buffer_to_cn_msg(buffer); |
Valentin Ilie | f3c48ec | 2012-07-14 13:08:29 +0000 | [diff] [blame] | 376 | ev = (struct proc_event *)msg->data; |
Mathias Krause | e727ca82 | 2013-09-30 22:03:06 +0200 | [diff] [blame] | 377 | memset(&ev->event_data, 0, sizeof(ev->event_data)); |
Matt Helsley | 9f46080 | 2005-11-07 00:59:16 -0800 | [diff] [blame] | 378 | msg->seq = rcvd_seq; |
Thomas Gleixner | 9e93f21 | 2014-07-16 21:04:40 +0000 | [diff] [blame] | 379 | ev->timestamp_ns = ktime_get_ns(); |
Matt Helsley | 9f46080 | 2005-11-07 00:59:16 -0800 | [diff] [blame] | 380 | ev->cpu = -1; |
| 381 | ev->what = PROC_EVENT_NONE; |
| 382 | ev->event_data.ack.err = err; |
| 383 | memcpy(&msg->id, &cn_proc_event_id, sizeof(msg->id)); |
| 384 | msg->ack = rcvd_ack + 1; |
| 385 | msg->len = sizeof(*ev); |
Mathias Krause | e727ca82 | 2013-09-30 22:03:06 +0200 | [diff] [blame] | 386 | msg->flags = 0; /* not used */ |
Aaron Campbell | ab8ed95 | 2016-06-24 10:05:32 -0300 | [diff] [blame] | 387 | send_msg(msg); |
Matt Helsley | 9f46080 | 2005-11-07 00:59:16 -0800 | [diff] [blame] | 388 | } |
| 389 | |
| 390 | /** |
| 391 | * cn_proc_mcast_ctl |
Anjali Kulkarni | 743acf3 | 2023-07-19 13:18:19 -0700 | [diff] [blame] | 392 | * @msg: message sent from userspace via the connector |
| 393 | * @nsp: NETLINK_CB of the client's socket buffer |
Matt Helsley | 9f46080 | 2005-11-07 00:59:16 -0800 | [diff] [blame] | 394 | */ |
Stephen Boyd | f0b2593 | 2009-10-06 01:39:51 -0700 | [diff] [blame] | 395 | static void cn_proc_mcast_ctl(struct cn_msg *msg, |
| 396 | struct netlink_skb_parms *nsp) |
Matt Helsley | 9f46080 | 2005-11-07 00:59:16 -0800 | [diff] [blame] | 397 | { |
Anjali Kulkarni | 2aa1f7a | 2023-07-19 13:18:18 -0700 | [diff] [blame] | 398 | enum proc_cn_mcast_op mc_op = 0, prev_mc_op = 0; |
Anjali Kulkarni | 743acf3 | 2023-07-19 13:18:19 -0700 | [diff] [blame] | 399 | struct proc_input *pinput = NULL; |
| 400 | enum proc_cn_event ev_type = 0; |
Anjali Kulkarni | 2aa1f7a | 2023-07-19 13:18:18 -0700 | [diff] [blame] | 401 | int err = 0, initial = 0; |
| 402 | struct sock *sk = NULL; |
Matt Helsley | 9f46080 | 2005-11-07 00:59:16 -0800 | [diff] [blame] | 403 | |
Eric W. Biederman | 9582d90 | 2012-02-07 16:48:16 -0800 | [diff] [blame] | 404 | /* |
| 405 | * Events are reported with respect to the initial pid |
| 406 | * and user namespaces so ignore requestors from |
| 407 | * other namespaces. |
| 408 | */ |
| 409 | if ((current_user_ns() != &init_user_ns) || |
Leo Yan | 42c66d1 | 2022-01-26 13:04:27 +0800 | [diff] [blame] | 410 | !task_is_in_init_pid_ns(current)) |
Eric W. Biederman | 9582d90 | 2012-02-07 16:48:16 -0800 | [diff] [blame] | 411 | return; |
| 412 | |
Anjali Kulkarni | 743acf3 | 2023-07-19 13:18:19 -0700 | [diff] [blame] | 413 | if (msg->len == sizeof(*pinput)) { |
| 414 | pinput = (struct proc_input *)msg->data; |
| 415 | mc_op = pinput->mcast_op; |
| 416 | ev_type = pinput->event_type; |
| 417 | } else if (msg->len == sizeof(mc_op)) { |
Anjali Kulkarni | 2aa1f7a | 2023-07-19 13:18:18 -0700 | [diff] [blame] | 418 | mc_op = *((enum proc_cn_mcast_op *)msg->data); |
Anjali Kulkarni | 743acf3 | 2023-07-19 13:18:19 -0700 | [diff] [blame] | 419 | ev_type = PROC_EVENT_ALL; |
| 420 | } else { |
Anjali Kulkarni | 2aa1f7a | 2023-07-19 13:18:18 -0700 | [diff] [blame] | 421 | return; |
Anjali Kulkarni | 743acf3 | 2023-07-19 13:18:19 -0700 | [diff] [blame] | 422 | } |
| 423 | |
| 424 | ev_type = valid_event((enum proc_cn_event)ev_type); |
| 425 | |
| 426 | if (ev_type == PROC_EVENT_NONE) |
| 427 | ev_type = PROC_EVENT_ALL; |
Anjali Kulkarni | 2aa1f7a | 2023-07-19 13:18:18 -0700 | [diff] [blame] | 428 | |
| 429 | if (nsp->sk) { |
| 430 | sk = nsp->sk; |
| 431 | if (sk->sk_user_data == NULL) { |
| 432 | sk->sk_user_data = kzalloc(sizeof(struct proc_input), |
| 433 | GFP_KERNEL); |
| 434 | if (sk->sk_user_data == NULL) { |
| 435 | err = ENOMEM; |
| 436 | goto out; |
| 437 | } |
| 438 | initial = 1; |
| 439 | } else { |
| 440 | prev_mc_op = |
| 441 | ((struct proc_input *)(sk->sk_user_data))->mcast_op; |
| 442 | } |
Anjali Kulkarni | 743acf3 | 2023-07-19 13:18:19 -0700 | [diff] [blame] | 443 | ((struct proc_input *)(sk->sk_user_data))->event_type = |
| 444 | ev_type; |
Anjali Kulkarni | 2aa1f7a | 2023-07-19 13:18:18 -0700 | [diff] [blame] | 445 | ((struct proc_input *)(sk->sk_user_data))->mcast_op = mc_op; |
| 446 | } |
| 447 | |
| 448 | switch (mc_op) { |
Matt Helsley | 9f46080 | 2005-11-07 00:59:16 -0800 | [diff] [blame] | 449 | case PROC_CN_MCAST_LISTEN: |
Anjali Kulkarni | 2aa1f7a | 2023-07-19 13:18:18 -0700 | [diff] [blame] | 450 | if (initial || (prev_mc_op != PROC_CN_MCAST_LISTEN)) |
| 451 | atomic_inc(&proc_event_num_listeners); |
Matt Helsley | 9f46080 | 2005-11-07 00:59:16 -0800 | [diff] [blame] | 452 | break; |
| 453 | case PROC_CN_MCAST_IGNORE: |
Anjali Kulkarni | 2aa1f7a | 2023-07-19 13:18:18 -0700 | [diff] [blame] | 454 | if (!initial && (prev_mc_op != PROC_CN_MCAST_IGNORE)) |
| 455 | atomic_dec(&proc_event_num_listeners); |
Anjali Kulkarni | 743acf3 | 2023-07-19 13:18:19 -0700 | [diff] [blame] | 456 | ((struct proc_input *)(sk->sk_user_data))->event_type = |
| 457 | PROC_EVENT_NONE; |
Matt Helsley | 9f46080 | 2005-11-07 00:59:16 -0800 | [diff] [blame] | 458 | break; |
| 459 | default: |
| 460 | err = EINVAL; |
| 461 | break; |
| 462 | } |
Kees Cook | e70ab977 | 2013-02-25 21:32:25 +0000 | [diff] [blame] | 463 | |
| 464 | out: |
Matt Helsley | 9f46080 | 2005-11-07 00:59:16 -0800 | [diff] [blame] | 465 | cn_proc_ack(err, msg->seq, msg->ack); |
| 466 | } |
| 467 | |
| 468 | /* |
| 469 | * cn_proc_init - initialization entry point |
| 470 | * |
| 471 | * Adds the connector callback to the connector driver. |
| 472 | */ |
| 473 | static int __init cn_proc_init(void) |
| 474 | { |
Valentin Ilie | f3c48ec | 2012-07-14 13:08:29 +0000 | [diff] [blame] | 475 | int err = cn_add_callback(&cn_proc_event_id, |
| 476 | "cn_proc", |
| 477 | &cn_proc_mcast_ctl); |
| 478 | if (err) { |
| 479 | pr_warn("cn_proc failed to register\n"); |
Matt Helsley | 9f46080 | 2005-11-07 00:59:16 -0800 | [diff] [blame] | 480 | return err; |
| 481 | } |
| 482 | return 0; |
| 483 | } |
Paul Gortmaker | 8297f2d | 2016-07-04 17:50:58 -0400 | [diff] [blame] | 484 | device_initcall(cn_proc_init); |