// SPDX-License-Identifier: GPL-2.0 /* * kernel userspace event delivery * * Copyright (C) 2004 Red Hat, Inc. All rights reserved. * Copyright (C) 2004 Novell, Inc. All rights reserved. * Copyright (C) 2004 IBM, Inc. All rights reserved. * * Authors: * Robert Love <rml@novell.com> * Kay Sievers <kay.sievers@vrfy.org> * Arjan van de Ven <arjanv@redhat.com> * Greg Kroah-Hartman <greg@kroah.com>
*/
env = kzalloc(sizeof(*env), GFP_KERNEL); if (!env) return -ENOMEM;
/* first arg is UUID */ if (count < UUID_STRING_LEN || !uuid_is_valid(buf) ||
add_uevent_var(env, "SYNTH_UUID=%.*s", UUID_STRING_LEN, buf)) goto out;
/* * the rest are custom environment variables in KEY=VALUE * format with ' ' delimiter between each KEY=VALUE pair
*/
next = buf + UUID_STRING_LEN;
buf_end = buf + count - 1;
while (next <= buf_end) { if (*next != ' ') goto out;
/* skip the ' ', key must follow */
key = ++next; if (key > buf_end) goto out;
buf = next;
next = action_arg_word_end(buf, buf_end, '='); if (!next || next > buf_end || *next != '=') goto out;
key_len = next - buf;
/* skip the '=', value must follow */ if (++next > buf_end) goto out;
buf = next;
next = action_arg_word_end(buf, buf_end, ' '); if (!next) goto out;
r = 0;
out: if (r)
kfree(env); else
*ret_env = env; return r;
}
/** * kobject_synth_uevent - send synthetic uevent with arguments * * @kobj: struct kobject for which synthetic uevent is to be generated * @buf: buffer containing action type and action args, newline is ignored * @count: length of buffer * * Returns 0 if kobject_synthetic_uevent() is completed with success or the * corresponding error when it fails.
*/ int kobject_synth_uevent(struct kobject *kobj, constchar *buf, size_t count)
{ char *no_uuid_envp[] = { "SYNTH_UUID=0", NULL }; enum kobject_action action; constchar *action_args; struct kobj_uevent_env *env; constchar *msg = NULL, *devpath; int r;
r = kobject_action_type(buf, count, &action, &action_args); if (r) {
msg = "unknown uevent action string"; goto out;
}
if (!action_args) {
r = kobject_uevent_env(kobj, action, no_uuid_envp); goto out;
}
/* allocate message with maximum possible size */
len = strlen(action_string) + strlen(devpath) + 2;
skb = alloc_skb(len + env->buflen, GFP_KERNEL); if (!skb) return NULL;
if (ksobj->parent != NULL)
ops = kobj_ns_ops(ksobj->parent);
}
/* kobjects currently only carry network namespace tags and they * are the only tag relevant here since we want to decide which * network namespaces to broadcast the uevent into.
*/ if (ops && ops->netlink_ns && kobj->ktype->namespace) if (ops->type == KOBJ_NS_TYPE_NET)
net = kobj->ktype->namespace(kobj);
if (!net)
ret = uevent_net_broadcast_untagged(env, action_string,
devpath); else
ret = uevent_net_broadcast_tagged(net->uevent_sock->sk, env,
action_string, devpath); #endif
return ret;
}
staticvoid zap_modalias_env(struct kobj_uevent_env *env)
{ staticconstchar modalias_prefix[] = "MODALIAS=";
size_t len; int i, j;
for (i = 0; i < env->envp_idx;) { if (strncmp(env->envp[i], modalias_prefix, sizeof(modalias_prefix) - 1)) {
i++; continue;
}
len = strlen(env->envp[i]) + 1;
if (i != env->envp_idx - 1) { /* @env->envp[] contains pointers to @env->buf[] * with @env->buflen chars, and we are removing * variable MODALIAS here pointed by @env->envp[i] * with length @len as shown below: * * 0 @env->buf[] @env->buflen * --------------------------------------------- * ^ ^ ^ ^ * | |-> @len <-| target block | * @env->envp[0] @env->envp[i] @env->envp[i + 1] * * so the "target block" indicated above is moved * backward by @len, and its right size is * @env->buflen - (@env->envp[i + 1] - @env->envp[0]).
*/
memmove(env->envp[i], env->envp[i + 1],
env->buflen - (env->envp[i + 1] - env->envp[0]));
/** * kobject_uevent_env - send an uevent with environmental data * * @kobj: struct kobject that the action is happening to * @action: action that is happening * @envp_ext: pointer to environmental data * * Returns 0 if kobject_uevent_env() is completed with success or the * corresponding error when it fails.
*/ int kobject_uevent_env(struct kobject *kobj, enum kobject_action action, char *envp_ext[])
{ struct kobj_uevent_env *env; constchar *action_string = kobject_actions[action]; constchar *devpath = NULL; constchar *subsystem; struct kobject *top_kobj; struct kset *kset; conststruct kset_uevent_ops *uevent_ops; int i = 0; int retval = 0;
/* * Mark "remove" event done regardless of result, for some subsystems * do not want to re-trigger "remove" event via automatic cleanup.
*/ if (action == KOBJ_REMOVE)
kobj->state_remove_uevent_sent = 1;
/* skip the event, if uevent_suppress is set*/ if (kobj->uevent_suppress) {
pr_debug("kobject: '%s' (%p): %s: uevent_suppress " "caused the event to drop!\n",
kobject_name(kobj), kobj, __func__); return 0;
} /* skip the event, if the filter returns zero. */ if (uevent_ops && uevent_ops->filter) if (!uevent_ops->filter(kobj)) {
pr_debug("kobject: '%s' (%p): %s: filter function " "caused the event to drop!\n",
kobject_name(kobj), kobj, __func__); return 0;
}
/* originating subsystem */ if (uevent_ops && uevent_ops->name)
subsystem = uevent_ops->name(kobj); else
subsystem = kobject_name(&kset->kobj); if (!subsystem) {
pr_debug("kobject: '%s' (%p): %s: unset subsystem caused the " "event to drop!\n", kobject_name(kobj), kobj,
__func__); return 0;
}
/* default keys */
retval = add_uevent_var(env, "ACTION=%s", action_string); if (retval) gotoexit;
retval = add_uevent_var(env, "DEVPATH=%s", devpath); if (retval) gotoexit;
retval = add_uevent_var(env, "SUBSYSTEM=%s", subsystem); if (retval) gotoexit;
/* keys passed in from the caller */ if (envp_ext) { for (i = 0; envp_ext[i]; i++) {
retval = add_uevent_var(env, "%s", envp_ext[i]); if (retval) gotoexit;
}
}
/* let the kset specific function add its stuff */ if (uevent_ops && uevent_ops->uevent) {
retval = uevent_ops->uevent(kobj, env); if (retval) {
pr_debug("kobject: '%s' (%p): %s: uevent() returned " "%d\n", kobject_name(kobj), kobj,
__func__, retval); gotoexit;
}
}
switch (action) { case KOBJ_ADD: /* * Mark "add" event so we can make sure we deliver "remove" * event to userspace during automatic cleanup. If * the object did send an "add" event, "remove" will * automatically generated by the core, if not already done * by the caller.
*/
kobj->state_add_uevent_sent = 1; break;
case KOBJ_UNBIND:
zap_modalias_env(env); break;
default: break;
}
/* we will send an event, so request a new sequence number */
retval = add_uevent_var(env, "SEQNUM=%llu",
atomic64_inc_return(&uevent_seqnum)); if (retval) gotoexit;
#ifdef CONFIG_UEVENT_HELPER /* call uevent_helper, usually only enabled during early boot */ if (uevent_helper[0] && !kobj_usermode_filter(kobj)) { struct subprocess_info *info;
retval = add_uevent_var(env, "HOME=/"); if (retval) gotoexit;
retval = add_uevent_var(env, "PATH=/sbin:/bin:/usr/sbin:/usr/bin"); if (retval) gotoexit;
retval = init_uevent_argv(env, subsystem); if (retval) gotoexit;
retval = -ENOMEM;
info = call_usermodehelper_setup(env->argv[0], env->argv,
env->envp, GFP_KERNEL,
NULL, cleanup_uevent_env, env); if (info) {
retval = call_usermodehelper_exec(info, UMH_NO_WAIT);
env = NULL; /* freed by cleanup_uevent_env */
}
} #endif
/** * kobject_uevent - notify userspace by sending an uevent * * @kobj: struct kobject that the action is happening to * @action: action that is happening * * Returns 0 if kobject_uevent() is completed with success or the * corresponding error when it fails.
*/ int kobject_uevent(struct kobject *kobj, enum kobject_action action)
{ return kobject_uevent_env(kobj, action, NULL);
}
EXPORT_SYMBOL_GPL(kobject_uevent);
/** * add_uevent_var - add key value string to the environment buffer * @env: environment buffer structure * @format: printf format for the key=value pair * * Returns 0 if environment variable was added successfully or -ENOMEM * if no space was available.
*/ int add_uevent_var(struct kobj_uevent_env *env, constchar *format, ...)
{
va_list args; int len;
if (env->envp_idx >= ARRAY_SIZE(env->envp)) {
WARN(1, KERN_ERR "add_uevent_var: too many keys\n"); return -ENOMEM;
}
va_start(args, format);
len = vsnprintf(&env->buf[env->buflen], sizeof(env->buf) - env->buflen,
format, args);
va_end(args);
if (len >= (sizeof(env->buf) - env->buflen)) {
WARN(1, KERN_ERR "add_uevent_var: buffer size too small\n"); return -ENOMEM;
}
/* set portid 0 to inform userspace message comes from kernel */
NETLINK_CB(skbc).portid = 0;
NETLINK_CB(skbc).dst_group = 1;
ret = netlink_broadcast(usk, skbc, 0, 1, GFP_KERNEL); /* ENOBUFS should be handled in userspace */ if (ret == -ENOBUFS || ret == -ESRCH)
ret = 0;
return ret;
}
staticint uevent_net_rcv_skb(struct sk_buff *skb, struct nlmsghdr *nlh, struct netlink_ext_ack *extack)
{ struct net *net; int ret;
if (!nlmsg_data(nlh)) return -EINVAL;
/* * Verify that we are allowed to send messages to the target * network namespace. The caller must have CAP_SYS_ADMIN in the * owning user namespace of the target network namespace.
*/
net = sock_net(NETLINK_CB(skb).sk); if (!netlink_ns_capable(skb, net->user_ns, CAP_SYS_ADMIN)) {
NL_SET_ERR_MSG(extack, "missing CAP_SYS_ADMIN capability"); return -EPERM;
}
ret = uevent_net_broadcast(net->uevent_sock->sk, skb, extack);
Die Informationen auf dieser Webseite wurden
nach bestem Wissen sorgfältig zusammengestellt. Es wird jedoch weder Vollständigkeit, noch Richtigkeit,
noch Qualität der bereit gestellten Informationen zugesichert.
Bemerkung:
Die farbliche Syntaxdarstellung und die Messung sind noch experimentell.