Received: by 10.192.165.148 with SMTP id m20csp927384imm; Fri, 27 Apr 2018 09:41:16 -0700 (PDT) X-Google-Smtp-Source: AB8JxZq7L+LZtWeFTyWDhdGp1PHFD2Lv1zDSABNub3TaSaC+CS4JY48w2kp52304wchMbMet8ptO X-Received: by 2002:a63:af44:: with SMTP id s4-v6mr2632947pgo.295.1524847276752; Fri, 27 Apr 2018 09:41:16 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1524847276; cv=none; d=google.com; s=arc-20160816; b=jN725DEl7ng/BezjyPfxghErzjkthRY2EwrnIHGYXwijB2YcWNkuzq4m4+rYP7HXDW NeUs1LUuK3jSfXpEAB0znp4eLOo+GQS38pfcwmWWbCpBB3njqzenRohtBlPN2ziaBjRj ZDHhyefxzU27aQ1b+irXpkDOixlCdkJFNvEPC4CnGToLiWv44yP+uvYAwzELNeVe0wvz WBNgwM+OUolTk9bWzGlUoZqfUODjTx4bSq/WIy2WZo2MlTf4W9F5zC/+I9ZCUUieP/// lzihiekYJPrNoZ+Ml2Yondc2j2NBwAZcoGwXc+HnEN4/TgUZRHomK9LHfbk9ektVOkvj QUnA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:subject:mime-version:user-agent :message-id:in-reply-to:date:references:cc:to:from :arc-authentication-results; bh=keb6te214IJKr2JkRITF6KlT5jjkjohbCirvoSbiXrw=; b=oBkB9dmtfxaB0WjPQAYm+uGMT4bprBiJwCDYwC8Oxt4wniF3d61OhybWrEEk9E3zfI T1/oAV4qjXhQJjChX4HvnUWyjk1vopByvJhBVD0vrw2Rk8PTEjRbiA6OVWnqgcHq+J5K 4LrcWQUadTm4voyU5aSDtantyLjb8q5rWdKAS3BH6GUNeZGvBaCkrzU12LFLKKscw1Zs kKHriu2CvhFO79EjtFgNhHhmMLgQ1rbxGjMtIlxZI458ny2mbtKAtnKHQMPmHeoE4EQ8 qBCy2OFoKrZYmFFTotdALdpuMhd1YnQchxEydS/LgVVjB3xsZmgFV9aizwuOl8vjlpaj eN3w== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id g4-v6si1551309plb.522.2018.04.27.09.41.02; Fri, 27 Apr 2018 09:41:16 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1758774AbeD0Qjz (ORCPT + 99 others); Fri, 27 Apr 2018 12:39:55 -0400 Received: from out03.mta.xmission.com ([166.70.13.233]:56140 "EHLO out03.mta.xmission.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1758550AbeD0Qjx (ORCPT ); Fri, 27 Apr 2018 12:39:53 -0400 Received: from in01.mta.xmission.com ([166.70.13.51]) by out03.mta.xmission.com with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.87) (envelope-from ) id 1fC6PV-0006uv-Ri; Fri, 27 Apr 2018 10:39:49 -0600 Received: from [97.119.174.25] (helo=x220.xmission.com) by in01.mta.xmission.com with esmtpsa (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.87) (envelope-from ) id 1fC6PV-0006QA-6f; Fri, 27 Apr 2018 10:39:49 -0600 From: ebiederm@xmission.com (Eric W. Biederman) To: Christian Brauner Cc: davem@davemloft.net, netdev@vger.kernel.org, linux-kernel@vger.kernel.org, avagin@virtuozzo.com, ktkhai@virtuozzo.com, serge@hallyn.com, gregkh@linuxfoundation.org References: <20180427102306.8617-1-christian.brauner@ubuntu.com> <20180427102306.8617-2-christian.brauner@ubuntu.com> Date: Fri, 27 Apr 2018 11:39:44 -0500 In-Reply-To: <20180427102306.8617-2-christian.brauner@ubuntu.com> (Christian Brauner's message of "Fri, 27 Apr 2018 12:23:05 +0200") Message-ID: <878t987gdr.fsf@xmission.com> User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/25.1 (gnu/linux) MIME-Version: 1.0 Content-Type: text/plain X-XM-SPF: eid=1fC6PV-0006QA-6f;;;mid=<878t987gdr.fsf@xmission.com>;;;hst=in01.mta.xmission.com;;;ip=97.119.174.25;;;frm=ebiederm@xmission.com;;;spf=neutral X-XM-AID: U2FsdGVkX18itCaU2AX94q+VoRn5EOd9fCgnL7/NYJ8= X-SA-Exim-Connect-IP: 97.119.174.25 X-SA-Exim-Mail-From: ebiederm@xmission.com X-Spam-Checker-Version: SpamAssassin 3.4.1 (2015-04-28) on sa08.xmission.com X-Spam-Level: X-Spam-Status: No, score=-0.3 required=8.0 tests=ALL_TRUSTED,BAYES_40, DCC_CHECK_NEGATIVE,T_TM2_M_HEADER_IN_MSG,T_TooManySym_01,T_TooManySym_02, T_TooManySym_03,T_TooManySym_04,XMSubLong autolearn=disabled version=3.4.1 X-Spam-Report: * -1.0 ALL_TRUSTED Passed through trusted hosts only via SMTP * 0.7 XMSubLong Long Subject * 0.0 T_TM2_M_HEADER_IN_MSG BODY: No description available. * -0.0 BAYES_40 BODY: Bayes spam probability is 20 to 40% * [score: 0.3739] * -0.0 DCC_CHECK_NEGATIVE Not listed in DCC * [sa08 1397; Body=1 Fuz1=1 Fuz2=1] * 0.0 T_TooManySym_01 4+ unique symbols in subject * 0.0 T_TooManySym_02 5+ unique symbols in subject * 0.0 T_TooManySym_04 7+ unique symbols in subject * 0.0 T_TooManySym_03 6+ unique symbols in subject X-Spam-DCC: XMission; sa08 1397; Body=1 Fuz1=1 Fuz2=1 X-Spam-Combo: ;Christian Brauner X-Spam-Relay-Country: X-Spam-Timing: total 165 ms - load_scoreonly_sql: 0.04 (0.0%), signal_user_changed: 6 (3.5%), b_tie_ro: 4.7 (2.9%), parse: 0.76 (0.5%), extract_message_metadata: 10 (6.1%), get_uri_detail_list: 1.16 (0.7%), tests_pri_-1000: 3.9 (2.4%), tests_pri_-950: 1.20 (0.7%), tests_pri_-900: 1.02 (0.6%), tests_pri_-400: 18 (10.9%), check_bayes: 17 (10.2%), b_tokenize: 4.3 (2.6%), b_tok_get_all: 6 (3.6%), b_comp_prob: 1.29 (0.8%), b_tok_touch_all: 3.2 (2.0%), b_finish: 0.71 (0.4%), tests_pri_0: 117 (70.9%), check_dkim_signature: 0.37 (0.2%), check_dkim_adsp: 3.4 (2.1%), tests_pri_500: 4.6 (2.8%), rewrite_mail: 0.00 (0.0%) Subject: Re: [PATCH net-next 1/2 v3] uevent: add alloc_uevent_skb() helper X-Spam-Flag: No X-SA-Exim-Version: 4.2.1 (built Thu, 05 May 2016 13:38:54 -0600) X-SA-Exim-Scanned: Yes (on in01.mta.xmission.com) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Christian Brauner writes: > This patch adds alloc_uevent_skb() in preparation for follow up patches. > > Signed-off-by: Christian Brauner > --- > lib/kobject_uevent.c | 39 ++++++++++++++++++++++++++------------- > 1 file changed, 26 insertions(+), 13 deletions(-) > > diff --git a/lib/kobject_uevent.c b/lib/kobject_uevent.c > index 15ea216a67ce..c3cb110f663b 100644 > --- a/lib/kobject_uevent.c > +++ b/lib/kobject_uevent.c > @@ -296,6 +296,31 @@ static void cleanup_uevent_env(struct subprocess_info *info) > } > #endif > > +static struct sk_buff *alloc_uevent_skb(struct kobj_uevent_env *env, > + const char *action_string, > + const char *devpath) > +{ > + struct sk_buff *skb = NULL; > + char *scratch; > + size_t len; > + > + /* allocate message with maximum possible size */ > + len = strlen(action_string) + strlen(devpath) + 2; > + skb = alloc_skb(len + env->buflen, GFP_KERNEL); > + if (!skb) > + return NULL; > + > + /* add header */ > + scratch = skb_put(skb, len); > + sprintf(scratch, "%s@%s", action_string, devpath); > + > + skb_put_data(skb, env->buf, env->buflen); > + > + NETLINK_CB(skb).dst_group = 1; nit: We might want to explicitly set NETLINK_CB(skb).portid to 0 and NETLINK_CB(skb).creds.uid to GLOBAL_ROOT_UID and NETLINK_CB(skb).creds.gid to GLOBAL_ROOT_GID here just to make it clear this is happening. It is not a problem because they __alloc_skb memsets to 0 the fields of struct sk_buff that it does not initialize. And these are the zero values. Still it would be nice to be able to look at the code and quickly see these are the values being set. Eric