blob: 28d6105e908e4c3f47803b519e9e68d6a8f3c7da [file] [log] [blame]
Greg Kroah-Hartmanb2441312017-11-01 15:07:57 +01001// SPDX-License-Identifier: GPL-2.0
Linus Torvalds1da177e2005-04-16 15:20:36 -07002/*
3 * linux/fs/proc/inode.c
4 *
5 * Copyright (C) 1991, 1992 Linus Torvalds
6 */
7
Alexey Dobriyanefb1a572018-02-06 15:37:24 -08008#include <linux/cache.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -07009#include <linux/time.h>
10#include <linux/proc_fs.h>
11#include <linux/kernel.h>
Vasiliy Kulikov97412952012-01-10 15:11:27 -080012#include <linux/pid_namespace.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070013#include <linux/mm.h>
14#include <linux/string.h>
15#include <linux/stat.h>
Alexey Dobriyan786d7e12007-07-15 23:39:00 -070016#include <linux/completion.h>
Alexey Dobriyandd23aae2007-09-11 15:23:55 -070017#include <linux/poll.h>
Andrew Morton87ebdc02013-02-27 17:03:16 -080018#include <linux/printk.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070019#include <linux/file.h>
20#include <linux/limits.h>
21#include <linux/init.h>
22#include <linux/module.h>
Al Viro9043476f2008-07-15 08:54:06 -040023#include <linux/sysctl.h>
Vasiliy Kulikov97412952012-01-10 15:11:27 -080024#include <linux/seq_file.h>
Tejun Heo5a0e3ad2010-03-24 17:04:11 +090025#include <linux/slab.h>
Vasiliy Kulikov97412952012-01-10 15:11:27 -080026#include <linux/mount.h>
Alexey Gladkov1c6c4d12020-04-19 16:10:56 +020027#include <linux/bug.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070028
Linus Torvalds7c0f6ba2016-12-24 11:46:01 -080029#include <linux/uaccess.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070030
Adrian Bunkfee781e2006-01-08 01:04:16 -080031#include "internal.h"
Linus Torvalds1da177e2005-04-16 15:20:36 -070032
Al Viro82679522010-06-04 22:17:56 -040033static void proc_evict_inode(struct inode *inode)
Linus Torvalds1da177e2005-04-16 15:20:36 -070034{
35 struct proc_dir_entry *de;
Al Virodfef6dcd32011-03-08 01:25:28 -050036 struct ctl_table_header *head;
Eric W. Biederman71448012020-02-20 11:17:28 -060037 struct proc_inode *ei = PROC_I(inode);
Linus Torvalds1da177e2005-04-16 15:20:36 -070038
Johannes Weiner91b0abe2014-04-03 14:47:49 -070039 truncate_inode_pages_final(&inode->i_data);
Jan Karadbd57682012-05-03 14:48:02 +020040 clear_inode(inode);
Mark Fashehfef26652005-09-09 13:01:31 -070041
Eric W. Biederman99f89552006-06-26 00:25:55 -070042 /* Stop tracking associated processes */
Eric W. Biederman71448012020-02-20 11:17:28 -060043 if (ei->pid) {
Eric W. Biederman7bc3e6e2020-02-19 18:22:26 -060044 proc_pid_evict_inode(ei);
Eric W. Biederman71448012020-02-20 11:17:28 -060045 ei->pid = NULL;
46 }
Linus Torvalds1da177e2005-04-16 15:20:36 -070047
48 /* Let go of any associated proc directory entry */
Eric W. Biederman71448012020-02-20 11:17:28 -060049 de = ei->pde;
50 if (de) {
Alexey Dobriyan135d5652009-12-15 16:45:39 -080051 pde_put(de);
Eric W. Biederman71448012020-02-20 11:17:28 -060052 ei->pde = NULL;
53 }
Konstantin Khlebnikovd6cffbb2017-02-10 10:35:02 +030054
Eric W. Biederman71448012020-02-20 11:17:28 -060055 head = ei->sysctl;
Al Virodfef6dcd32011-03-08 01:25:28 -050056 if (head) {
Eric W. Biederman71448012020-02-20 11:17:28 -060057 RCU_INIT_POINTER(ei->sysctl, NULL);
Konstantin Khlebnikovd6cffbb2017-02-10 10:35:02 +030058 proc_sys_evict_inode(inode, head);
Al Virodfef6dcd32011-03-08 01:25:28 -050059 }
Linus Torvalds1da177e2005-04-16 15:20:36 -070060}
61
Alexey Dobriyanefb1a572018-02-06 15:37:24 -080062static struct kmem_cache *proc_inode_cachep __ro_after_init;
Alexey Dobriyan195b8cf2018-04-10 16:31:09 -070063static struct kmem_cache *pde_opener_cache __ro_after_init;
Linus Torvalds1da177e2005-04-16 15:20:36 -070064
65static struct inode *proc_alloc_inode(struct super_block *sb)
66{
67 struct proc_inode *ei;
Linus Torvalds1da177e2005-04-16 15:20:36 -070068
Tobin C. Hardingf245e1c172017-05-08 15:54:55 -070069 ei = kmem_cache_alloc(proc_inode_cachep, GFP_KERNEL);
Linus Torvalds1da177e2005-04-16 15:20:36 -070070 if (!ei)
71 return NULL;
Eric W. Biederman13b41b02006-06-26 00:25:56 -070072 ei->pid = NULL;
Eric W. Biedermanaed7a6c2006-06-26 00:25:44 -070073 ei->fd = 0;
Linus Torvalds1da177e2005-04-16 15:20:36 -070074 ei->op.proc_get_link = NULL;
75 ei->pde = NULL;
Al Viro9043476f2008-07-15 08:54:06 -040076 ei->sysctl = NULL;
77 ei->sysctl_entry = NULL;
Eric W. Biederman0afa5ca2020-02-19 17:17:34 -060078 INIT_HLIST_NODE(&ei->sibling_inodes);
Al Viro3d3d35b2014-11-01 11:10:28 -040079 ei->ns_ops = NULL;
Alexey Dobriyan230f72e2019-01-03 15:26:05 -080080 return &ei->vfs_inode;
Linus Torvalds1da177e2005-04-16 15:20:36 -070081}
82
Al Viro4aa6b552019-04-15 20:28:38 -040083static void proc_free_inode(struct inode *inode)
Nick Pigginfa0d7e3d2011-01-07 17:49:49 +110084{
Nick Pigginfa0d7e3d2011-01-07 17:49:49 +110085 kmem_cache_free(proc_inode_cachep, PROC_I(inode));
86}
87
Alexey Dobriyan51cc5062008-07-25 19:45:34 -070088static void init_once(void *foo)
Linus Torvalds1da177e2005-04-16 15:20:36 -070089{
90 struct proc_inode *ei = (struct proc_inode *) foo;
91
Christoph Lametera35afb82007-05-16 22:10:57 -070092 inode_init_once(&ei->vfs_inode);
Linus Torvalds1da177e2005-04-16 15:20:36 -070093}
Paul Mundt20c2df82007-07-20 10:11:58 +090094
Alexey Dobriyan195b8cf2018-04-10 16:31:09 -070095void __init proc_init_kmemcache(void)
Linus Torvalds1da177e2005-04-16 15:20:36 -070096{
97 proc_inode_cachep = kmem_cache_create("proc_inode_cache",
98 sizeof(struct proc_inode),
Paul Jacksonfffb60f2006-03-24 03:16:06 -080099 0, (SLAB_RECLAIM_ACCOUNT|
Vladimir Davydov5d097052016-01-14 15:18:21 -0800100 SLAB_MEM_SPREAD|SLAB_ACCOUNT|
101 SLAB_PANIC),
Paul Mundt20c2df82007-07-20 10:11:58 +0900102 init_once);
Alexey Dobriyan195b8cf2018-04-10 16:31:09 -0700103 pde_opener_cache =
104 kmem_cache_create("pde_opener", sizeof(struct pde_opener), 0,
Alexey Dobriyan2acddbe2018-04-10 16:31:12 -0700105 SLAB_ACCOUNT|SLAB_PANIC, NULL);
Alexey Dobriyanb4884f22018-04-10 16:31:52 -0700106 proc_dir_entry_cache = kmem_cache_create_usercopy(
Alexey Dobriyan2d6e4e82018-08-21 21:54:09 -0700107 "proc_dir_entry", SIZEOF_PDE, 0, SLAB_PANIC,
108 offsetof(struct proc_dir_entry, inline_name),
109 SIZEOF_PDE_INLINE_NAME, NULL);
110 BUILD_BUG_ON(sizeof(struct proc_dir_entry) >= SIZEOF_PDE);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700111}
112
Eric W. Biedermanf90f3ca2020-02-21 08:43:23 -0600113void proc_invalidate_siblings_dcache(struct hlist_head *inodes, spinlock_t *lock)
Eric W. Biederman26dbc602020-02-20 08:34:44 -0600114{
115 struct inode *inode;
116 struct proc_inode *ei;
117 struct hlist_node *node;
Eric W. Biederman080f6272020-02-21 08:33:57 -0600118 struct super_block *old_sb = NULL;
Eric W. Biederman26dbc602020-02-20 08:34:44 -0600119
120 rcu_read_lock();
121 for (;;) {
Eric W. Biederman080f6272020-02-21 08:33:57 -0600122 struct super_block *sb;
Eric W. Biederman26dbc602020-02-20 08:34:44 -0600123 node = hlist_first_rcu(inodes);
124 if (!node)
125 break;
126 ei = hlist_entry(node, struct proc_inode, sibling_inodes);
127 spin_lock(lock);
128 hlist_del_init_rcu(&ei->sibling_inodes);
129 spin_unlock(lock);
130
131 inode = &ei->vfs_inode;
132 sb = inode->i_sb;
Eric W. Biederman080f6272020-02-21 08:33:57 -0600133 if ((sb != old_sb) && !atomic_inc_not_zero(&sb->s_active))
Eric W. Biederman26dbc602020-02-20 08:34:44 -0600134 continue;
135 inode = igrab(inode);
136 rcu_read_unlock();
Eric W. Biederman080f6272020-02-21 08:33:57 -0600137 if (sb != old_sb) {
138 if (old_sb)
139 deactivate_super(old_sb);
140 old_sb = sb;
141 }
Eric W. Biederman26dbc602020-02-20 08:34:44 -0600142 if (unlikely(!inode)) {
Eric W. Biederman26dbc602020-02-20 08:34:44 -0600143 rcu_read_lock();
144 continue;
145 }
146
Eric W. Biedermanf90f3ca2020-02-21 08:43:23 -0600147 if (S_ISDIR(inode->i_mode)) {
148 struct dentry *dir = d_find_any_alias(inode);
149 if (dir) {
150 d_invalidate(dir);
151 dput(dir);
152 }
153 } else {
154 struct dentry *dentry;
155 while ((dentry = d_find_alias(inode))) {
156 d_invalidate(dentry);
157 dput(dentry);
158 }
159 }
Eric W. Biederman26dbc602020-02-20 08:34:44 -0600160 iput(inode);
Eric W. Biederman26dbc602020-02-20 08:34:44 -0600161
162 rcu_read_lock();
163 }
164 rcu_read_unlock();
Eric W. Biederman080f6272020-02-21 08:33:57 -0600165 if (old_sb)
166 deactivate_super(old_sb);
Eric W. Biederman26dbc602020-02-20 08:34:44 -0600167}
168
Alexey Gladkove61bb8b2020-04-19 16:10:57 +0200169static inline const char *hidepid2str(enum proc_hidepid v)
Alexey Gladkov1c6c4d12020-04-19 16:10:56 +0200170{
171 switch (v) {
172 case HIDEPID_OFF: return "off";
173 case HIDEPID_NO_ACCESS: return "noaccess";
174 case HIDEPID_INVISIBLE: return "invisible";
175 case HIDEPID_NOT_PTRACEABLE: return "ptraceable";
176 }
177 WARN_ONCE(1, "bad hide_pid value: %d\n", v);
178 return "unknown";
179}
180
Vasiliy Kulikov97412952012-01-10 15:11:27 -0800181static int proc_show_options(struct seq_file *seq, struct dentry *root)
182{
Alexey Gladkovfa10fed2020-04-19 16:10:52 +0200183 struct proc_fs_info *fs_info = proc_sb_info(root->d_sb);
Vasiliy Kulikov04996802012-01-10 15:11:31 -0800184
Alexey Gladkovfa10fed2020-04-19 16:10:52 +0200185 if (!gid_eq(fs_info->pid_gid, GLOBAL_ROOT_GID))
186 seq_printf(seq, ",gid=%u", from_kgid_munged(&init_user_ns, fs_info->pid_gid));
187 if (fs_info->hide_pid != HIDEPID_OFF)
Alexey Gladkov1c6c4d12020-04-19 16:10:56 +0200188 seq_printf(seq, ",hidepid=%s", hidepid2str(fs_info->hide_pid));
Alexey Gladkov6814ef22020-04-19 16:10:54 +0200189 if (fs_info->pidonly != PROC_PIDONLY_OFF)
190 seq_printf(seq, ",subset=pid");
Vasiliy Kulikov04996802012-01-10 15:11:31 -0800191
Vasiliy Kulikov97412952012-01-10 15:11:27 -0800192 return 0;
193}
194
David Howells60a3c3a2018-11-01 23:07:25 +0000195const struct super_operations proc_sops = {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700196 .alloc_inode = proc_alloc_inode,
Al Viro4aa6b552019-04-15 20:28:38 -0400197 .free_inode = proc_free_inode,
Linus Torvalds1da177e2005-04-16 15:20:36 -0700198 .drop_inode = generic_delete_inode,
Al Viro82679522010-06-04 22:17:56 -0400199 .evict_inode = proc_evict_inode,
Linus Torvalds1da177e2005-04-16 15:20:36 -0700200 .statfs = simple_statfs,
Vasiliy Kulikov97412952012-01-10 15:11:27 -0800201 .show_options = proc_show_options,
Linus Torvalds1da177e2005-04-16 15:20:36 -0700202};
203
Al Viro866ad9a72013-04-03 19:07:30 -0400204enum {BIAS = -1U<<31};
205
206static inline int use_pde(struct proc_dir_entry *pde)
207{
Alexey Dobriyan15b158b2018-02-06 15:37:28 -0800208 return likely(atomic_inc_unless_negative(&pde->in_use));
Alexey Dobriyan881adb82008-07-25 01:48:29 -0700209}
210
Al Viro866ad9a72013-04-03 19:07:30 -0400211static void unuse_pde(struct proc_dir_entry *pde)
Alexey Dobriyan881adb82008-07-25 01:48:29 -0700212{
Alexey Dobriyan15b158b2018-02-06 15:37:28 -0800213 if (unlikely(atomic_dec_return(&pde->in_use) == BIAS))
Al Viro05c0ae22013-04-04 16:28:47 -0400214 complete(pde->pde_unload_completion);
Alexey Dobriyan786d7e12007-07-15 23:39:00 -0700215}
216
Alexey Dobriyan2f897422018-04-10 16:30:54 -0700217/* pde is locked on entry, unlocked on exit */
Al Viroca469f32013-04-03 19:57:00 -0400218static void close_pdeo(struct proc_dir_entry *pde, struct pde_opener *pdeo)
Jules Irenge904f3942020-04-06 20:08:55 -0700219 __releases(&pde->pde_unload_lock)
Al Viroca469f32013-04-03 19:57:00 -0400220{
Alexey Dobriyan492b2da2016-12-12 16:45:22 -0800221 /*
222 * close() (proc_reg_release()) can't delete an entry and proceed:
223 * ->release hook needs to be available at the right moment.
224 *
225 * rmmod (remove_proc_entry() et al) can't delete an entry and proceed:
226 * "struct file" needs to be available at the right moment.
227 *
228 * Therefore, first process to enter this function does ->release() and
229 * signals its completion to the other process which does nothing.
230 */
Al Viro05c0ae22013-04-04 16:28:47 -0400231 if (pdeo->closing) {
Al Viroca469f32013-04-03 19:57:00 -0400232 /* somebody else is doing that, just wait */
Al Viro05c0ae22013-04-04 16:28:47 -0400233 DECLARE_COMPLETION_ONSTACK(c);
234 pdeo->c = &c;
Al Viroca469f32013-04-03 19:57:00 -0400235 spin_unlock(&pde->pde_unload_lock);
Al Viro05c0ae22013-04-04 16:28:47 -0400236 wait_for_completion(&c);
Al Viroca469f32013-04-03 19:57:00 -0400237 } else {
238 struct file *file;
Alexey Dobriyan2f897422018-04-10 16:30:54 -0700239 struct completion *c;
240
Alexey Dobriyanf5887c712016-12-12 16:45:17 -0800241 pdeo->closing = true;
Al Viroca469f32013-04-03 19:57:00 -0400242 spin_unlock(&pde->pde_unload_lock);
243 file = pdeo->file;
Alexey Dobriyand56c0d42020-02-03 17:37:14 -0800244 pde->proc_ops->proc_release(file_inode(file), file);
Al Viroca469f32013-04-03 19:57:00 -0400245 spin_lock(&pde->pde_unload_lock);
Alexey Dobriyan492b2da2016-12-12 16:45:22 -0800246 /* After ->release. */
Alexey Dobriyan06a0c412016-12-12 16:45:14 -0800247 list_del(&pdeo->lh);
Alexey Dobriyan2f897422018-04-10 16:30:54 -0700248 c = pdeo->c;
249 spin_unlock(&pde->pde_unload_lock);
250 if (unlikely(c))
251 complete(c);
Alexey Dobriyan195b8cf2018-04-10 16:31:09 -0700252 kmem_cache_free(pde_opener_cache, pdeo);
Al Viro05c0ae22013-04-04 16:28:47 -0400253 }
Al Viroca469f32013-04-03 19:57:00 -0400254}
255
Al Viro866ad9a72013-04-03 19:07:30 -0400256void proc_entry_rundown(struct proc_dir_entry *de)
257{
Al Viro05c0ae22013-04-04 16:28:47 -0400258 DECLARE_COMPLETION_ONSTACK(c);
Al Viro866ad9a72013-04-03 19:07:30 -0400259 /* Wait until all existing callers into module are done. */
Al Viro05c0ae22013-04-04 16:28:47 -0400260 de->pde_unload_completion = &c;
261 if (atomic_add_return(BIAS, &de->in_use) != BIAS)
262 wait_for_completion(&c);
Al Viro866ad9a72013-04-03 19:07:30 -0400263
Alexey Dobriyan492b2da2016-12-12 16:45:22 -0800264 /* ->pde_openers list can't grow from now on. */
265
Al Viro05c0ae22013-04-04 16:28:47 -0400266 spin_lock(&de->pde_unload_lock);
Al Viro866ad9a72013-04-03 19:07:30 -0400267 while (!list_empty(&de->pde_openers)) {
268 struct pde_opener *pdeo;
Al Viro866ad9a72013-04-03 19:07:30 -0400269 pdeo = list_first_entry(&de->pde_openers, struct pde_opener, lh);
Al Viroca469f32013-04-03 19:57:00 -0400270 close_pdeo(de, pdeo);
Alexey Dobriyan2f897422018-04-10 16:30:54 -0700271 spin_lock(&de->pde_unload_lock);
Al Viro866ad9a72013-04-03 19:07:30 -0400272 }
273 spin_unlock(&de->pde_unload_lock);
274}
275
Alexey Dobriyand919b332020-04-06 20:09:01 -0700276static loff_t pde_lseek(struct proc_dir_entry *pde, struct file *file, loff_t offset, int whence)
277{
278 typeof_member(struct proc_ops, proc_lseek) lseek;
279
280 lseek = pde->proc_ops->proc_lseek;
281 if (!lseek)
282 lseek = default_llseek;
283 return lseek(file, offset, whence);
284}
285
Alexey Dobriyan786d7e12007-07-15 23:39:00 -0700286static loff_t proc_reg_llseek(struct file *file, loff_t offset, int whence)
287{
Al Viro496ad9a2013-01-23 17:07:38 -0500288 struct proc_dir_entry *pde = PDE(file_inode(file));
Alexey Dobriyan786d7e12007-07-15 23:39:00 -0700289 loff_t rv = -EINVAL;
Alexey Dobriyan9af27b22019-07-16 16:26:45 -0700290
Alexey Dobriyand919b332020-04-06 20:09:01 -0700291 if (pde_is_permanent(pde)) {
292 return pde_lseek(pde, file, offset, whence);
293 } else if (use_pde(pde)) {
294 rv = pde_lseek(pde, file, offset, whence);
Al Viro866ad9a72013-04-03 19:07:30 -0400295 unuse_pde(pde);
Alexey Dobriyan786d7e12007-07-15 23:39:00 -0700296 }
Alexey Dobriyan786d7e12007-07-15 23:39:00 -0700297 return rv;
298}
299
Alexey Dobriyand919b332020-04-06 20:09:01 -0700300static ssize_t pde_read(struct proc_dir_entry *pde, struct file *file, char __user *buf, size_t count, loff_t *ppos)
301{
302 typeof_member(struct proc_ops, proc_read) read;
303
304 read = pde->proc_ops->proc_read;
305 if (read)
306 return read(file, buf, count, ppos);
307 return -EIO;
308}
309
Alexey Dobriyan786d7e12007-07-15 23:39:00 -0700310static ssize_t proc_reg_read(struct file *file, char __user *buf, size_t count, loff_t *ppos)
311{
Al Viro496ad9a2013-01-23 17:07:38 -0500312 struct proc_dir_entry *pde = PDE(file_inode(file));
Alexey Dobriyan786d7e12007-07-15 23:39:00 -0700313 ssize_t rv = -EIO;
Alexey Dobriyan9af27b22019-07-16 16:26:45 -0700314
Alexey Dobriyand919b332020-04-06 20:09:01 -0700315 if (pde_is_permanent(pde)) {
316 return pde_read(pde, file, buf, count, ppos);
317 } else if (use_pde(pde)) {
318 rv = pde_read(pde, file, buf, count, ppos);
Al Viro866ad9a72013-04-03 19:07:30 -0400319 unuse_pde(pde);
Alexey Dobriyan786d7e12007-07-15 23:39:00 -0700320 }
Alexey Dobriyan786d7e12007-07-15 23:39:00 -0700321 return rv;
322}
323
Alexey Dobriyand919b332020-04-06 20:09:01 -0700324static ssize_t pde_write(struct proc_dir_entry *pde, struct file *file, const char __user *buf, size_t count, loff_t *ppos)
325{
326 typeof_member(struct proc_ops, proc_write) write;
327
328 write = pde->proc_ops->proc_write;
329 if (write)
330 return write(file, buf, count, ppos);
331 return -EIO;
332}
333
Alexey Dobriyan786d7e12007-07-15 23:39:00 -0700334static ssize_t proc_reg_write(struct file *file, const char __user *buf, size_t count, loff_t *ppos)
335{
Al Viro496ad9a2013-01-23 17:07:38 -0500336 struct proc_dir_entry *pde = PDE(file_inode(file));
Alexey Dobriyan786d7e12007-07-15 23:39:00 -0700337 ssize_t rv = -EIO;
Alexey Dobriyan9af27b22019-07-16 16:26:45 -0700338
Alexey Dobriyand919b332020-04-06 20:09:01 -0700339 if (pde_is_permanent(pde)) {
340 return pde_write(pde, file, buf, count, ppos);
341 } else if (use_pde(pde)) {
342 rv = pde_write(pde, file, buf, count, ppos);
Al Viro866ad9a72013-04-03 19:07:30 -0400343 unuse_pde(pde);
Alexey Dobriyan786d7e12007-07-15 23:39:00 -0700344 }
Alexey Dobriyan786d7e12007-07-15 23:39:00 -0700345 return rv;
346}
347
Alexey Dobriyand919b332020-04-06 20:09:01 -0700348static __poll_t pde_poll(struct proc_dir_entry *pde, struct file *file, struct poll_table_struct *pts)
349{
350 typeof_member(struct proc_ops, proc_poll) poll;
351
352 poll = pde->proc_ops->proc_poll;
353 if (poll)
354 return poll(file, pts);
355 return DEFAULT_POLLMASK;
356}
357
Al Viro076ccb72017-07-03 01:02:18 -0400358static __poll_t proc_reg_poll(struct file *file, struct poll_table_struct *pts)
Alexey Dobriyan786d7e12007-07-15 23:39:00 -0700359{
Al Viro496ad9a2013-01-23 17:07:38 -0500360 struct proc_dir_entry *pde = PDE(file_inode(file));
Al Viroe6c8adc2017-07-03 22:25:56 -0400361 __poll_t rv = DEFAULT_POLLMASK;
Alexey Dobriyan9af27b22019-07-16 16:26:45 -0700362
Alexey Dobriyand919b332020-04-06 20:09:01 -0700363 if (pde_is_permanent(pde)) {
364 return pde_poll(pde, file, pts);
365 } else if (use_pde(pde)) {
366 rv = pde_poll(pde, file, pts);
Al Viro866ad9a72013-04-03 19:07:30 -0400367 unuse_pde(pde);
Alexey Dobriyan786d7e12007-07-15 23:39:00 -0700368 }
Alexey Dobriyan786d7e12007-07-15 23:39:00 -0700369 return rv;
370}
371
Alexey Dobriyand919b332020-04-06 20:09:01 -0700372static long pde_ioctl(struct proc_dir_entry *pde, struct file *file, unsigned int cmd, unsigned long arg)
373{
374 typeof_member(struct proc_ops, proc_ioctl) ioctl;
375
376 ioctl = pde->proc_ops->proc_ioctl;
377 if (ioctl)
378 return ioctl(file, cmd, arg);
379 return -ENOTTY;
380}
381
Alexey Dobriyan786d7e12007-07-15 23:39:00 -0700382static long proc_reg_unlocked_ioctl(struct file *file, unsigned int cmd, unsigned long arg)
383{
Al Viro496ad9a2013-01-23 17:07:38 -0500384 struct proc_dir_entry *pde = PDE(file_inode(file));
Alexey Dobriyan786d7e12007-07-15 23:39:00 -0700385 long rv = -ENOTTY;
Alexey Dobriyan9af27b22019-07-16 16:26:45 -0700386
Alexey Dobriyand919b332020-04-06 20:09:01 -0700387 if (pde_is_permanent(pde)) {
388 return pde_ioctl(pde, file, cmd, arg);
389 } else if (use_pde(pde)) {
390 rv = pde_ioctl(pde, file, cmd, arg);
Al Viro866ad9a72013-04-03 19:07:30 -0400391 unuse_pde(pde);
Alexey Dobriyan786d7e12007-07-15 23:39:00 -0700392 }
Alexey Dobriyan786d7e12007-07-15 23:39:00 -0700393 return rv;
394}
395
396#ifdef CONFIG_COMPAT
Alexey Dobriyand919b332020-04-06 20:09:01 -0700397static long pde_compat_ioctl(struct proc_dir_entry *pde, struct file *file, unsigned int cmd, unsigned long arg)
398{
399 typeof_member(struct proc_ops, proc_compat_ioctl) compat_ioctl;
400
401 compat_ioctl = pde->proc_ops->proc_compat_ioctl;
402 if (compat_ioctl)
403 return compat_ioctl(file, cmd, arg);
404 return -ENOTTY;
405}
406
Alexey Dobriyan786d7e12007-07-15 23:39:00 -0700407static long proc_reg_compat_ioctl(struct file *file, unsigned int cmd, unsigned long arg)
408{
Al Viro496ad9a2013-01-23 17:07:38 -0500409 struct proc_dir_entry *pde = PDE(file_inode(file));
Alexey Dobriyan786d7e12007-07-15 23:39:00 -0700410 long rv = -ENOTTY;
Alexey Dobriyand919b332020-04-06 20:09:01 -0700411 if (pde_is_permanent(pde)) {
412 return pde_compat_ioctl(pde, file, cmd, arg);
413 } else if (use_pde(pde)) {
414 rv = pde_compat_ioctl(pde, file, cmd, arg);
Al Viro866ad9a72013-04-03 19:07:30 -0400415 unuse_pde(pde);
Alexey Dobriyan786d7e12007-07-15 23:39:00 -0700416 }
Alexey Dobriyan786d7e12007-07-15 23:39:00 -0700417 return rv;
418}
419#endif
420
Alexey Dobriyand919b332020-04-06 20:09:01 -0700421static int pde_mmap(struct proc_dir_entry *pde, struct file *file, struct vm_area_struct *vma)
422{
423 typeof_member(struct proc_ops, proc_mmap) mmap;
424
425 mmap = pde->proc_ops->proc_mmap;
426 if (mmap)
427 return mmap(file, vma);
428 return -EIO;
429}
430
Alexey Dobriyan786d7e12007-07-15 23:39:00 -0700431static int proc_reg_mmap(struct file *file, struct vm_area_struct *vma)
432{
Al Viro496ad9a2013-01-23 17:07:38 -0500433 struct proc_dir_entry *pde = PDE(file_inode(file));
Alexey Dobriyan786d7e12007-07-15 23:39:00 -0700434 int rv = -EIO;
Alexey Dobriyan9af27b22019-07-16 16:26:45 -0700435
Alexey Dobriyand919b332020-04-06 20:09:01 -0700436 if (pde_is_permanent(pde)) {
437 return pde_mmap(pde, file, vma);
438 } else if (use_pde(pde)) {
439 rv = pde_mmap(pde, file, vma);
Al Viro866ad9a72013-04-03 19:07:30 -0400440 unuse_pde(pde);
Alexey Dobriyan786d7e12007-07-15 23:39:00 -0700441 }
Alexey Dobriyan786d7e12007-07-15 23:39:00 -0700442 return rv;
443}
444
HATAYAMA Daisuke5721cf82013-11-12 15:11:15 -0800445static unsigned long
Alexey Dobriyand919b332020-04-06 20:09:01 -0700446pde_get_unmapped_area(struct proc_dir_entry *pde, struct file *file, unsigned long orig_addr,
447 unsigned long len, unsigned long pgoff,
448 unsigned long flags)
449{
450 typeof_member(struct proc_ops, proc_get_unmapped_area) get_area;
451
452 get_area = pde->proc_ops->proc_get_unmapped_area;
453#ifdef CONFIG_MMU
454 if (!get_area)
455 get_area = current->mm->get_unmapped_area;
456#endif
457 if (get_area)
458 return get_area(file, orig_addr, len, pgoff, flags);
459 return orig_addr;
460}
461
462static unsigned long
HATAYAMA Daisuke5721cf82013-11-12 15:11:15 -0800463proc_reg_get_unmapped_area(struct file *file, unsigned long orig_addr,
464 unsigned long len, unsigned long pgoff,
465 unsigned long flags)
Alexey Dobriyanc4fe2442013-08-20 22:17:24 +0300466{
467 struct proc_dir_entry *pde = PDE(file_inode(file));
HATAYAMA Daisuke2cbe3b02013-10-16 13:47:04 -0700468 unsigned long rv = -EIO;
Jan Beulichae5758a2013-12-12 17:12:22 -0800469
Alexey Dobriyand919b332020-04-06 20:09:01 -0700470 if (pde_is_permanent(pde)) {
471 return pde_get_unmapped_area(pde, file, orig_addr, len, pgoff, flags);
472 } else if (use_pde(pde)) {
473 rv = pde_get_unmapped_area(pde, file, orig_addr, len, pgoff, flags);
Alexey Dobriyanc4fe2442013-08-20 22:17:24 +0300474 unuse_pde(pde);
475 }
476 return rv;
477}
478
Alexey Dobriyan786d7e12007-07-15 23:39:00 -0700479static int proc_reg_open(struct inode *inode, struct file *file)
480{
Alexey Gladkov6814ef22020-04-19 16:10:54 +0200481 struct proc_fs_info *fs_info = proc_sb_info(inode->i_sb);
Alexey Dobriyan786d7e12007-07-15 23:39:00 -0700482 struct proc_dir_entry *pde = PDE(inode);
483 int rv = 0;
Alexey Dobriyand56c0d42020-02-03 17:37:14 -0800484 typeof_member(struct proc_ops, proc_open) open;
485 typeof_member(struct proc_ops, proc_release) release;
Alexey Dobriyan881adb82008-07-25 01:48:29 -0700486 struct pde_opener *pdeo;
487
Alexey Dobriyand919b332020-04-06 20:09:01 -0700488 if (pde_is_permanent(pde)) {
489 open = pde->proc_ops->proc_open;
490 if (open)
491 rv = open(inode, file);
492 return rv;
493 }
494
Alexey Gladkov6814ef22020-04-19 16:10:54 +0200495 if (fs_info->pidonly == PROC_PIDONLY_ON)
496 return -ENOENT;
497
Alexey Dobriyan881adb82008-07-25 01:48:29 -0700498 /*
Alexey Dobriyan492b2da2016-12-12 16:45:22 -0800499 * Ensure that
500 * 1) PDE's ->release hook will be called no matter what
501 * either normally by close()/->release, or forcefully by
502 * rmmod/remove_proc_entry.
Alexey Dobriyan881adb82008-07-25 01:48:29 -0700503 *
Alexey Dobriyan492b2da2016-12-12 16:45:22 -0800504 * 2) rmmod isn't blocked by opening file in /proc and sitting on
505 * the descriptor (including "rmmod foo </proc/foo" scenario).
506 *
507 * Save every "struct file" with custom ->release hook.
Alexey Dobriyan881adb82008-07-25 01:48:29 -0700508 */
Alexey Dobriyane7a6e292018-04-10 16:31:01 -0700509 if (!use_pde(pde))
Daisuke Oginod2857e72011-07-26 16:08:37 -0700510 return -ENOENT;
Alexey Dobriyan786d7e12007-07-15 23:39:00 -0700511
Alexey Dobriyand56c0d42020-02-03 17:37:14 -0800512 release = pde->proc_ops->proc_release;
Alexey Dobriyane7a6e292018-04-10 16:31:01 -0700513 if (release) {
Alexey Dobriyan195b8cf2018-04-10 16:31:09 -0700514 pdeo = kmem_cache_alloc(pde_opener_cache, GFP_KERNEL);
Alexey Dobriyane7a6e292018-04-10 16:31:01 -0700515 if (!pdeo) {
516 rv = -ENOMEM;
517 goto out_unuse;
518 }
519 }
520
Alexey Dobriyand56c0d42020-02-03 17:37:14 -0800521 open = pde->proc_ops->proc_open;
Alexey Dobriyan786d7e12007-07-15 23:39:00 -0700522 if (open)
523 rv = open(inode, file);
524
Alexey Dobriyane7a6e292018-04-10 16:31:01 -0700525 if (release) {
526 if (rv == 0) {
527 /* To know what to release. */
528 pdeo->file = file;
529 pdeo->closing = false;
530 pdeo->c = NULL;
531 spin_lock(&pde->pde_unload_lock);
532 list_add(&pdeo->lh, &pde->pde_openers);
533 spin_unlock(&pde->pde_unload_lock);
534 } else
Alexey Dobriyan195b8cf2018-04-10 16:31:09 -0700535 kmem_cache_free(pde_opener_cache, pdeo);
Alexey Dobriyane7a6e292018-04-10 16:31:01 -0700536 }
Al Viro05c0ae22013-04-04 16:28:47 -0400537
Alexey Dobriyane7a6e292018-04-10 16:31:01 -0700538out_unuse:
Al Viro05c0ae22013-04-04 16:28:47 -0400539 unuse_pde(pde);
Alexey Dobriyan786d7e12007-07-15 23:39:00 -0700540 return rv;
541}
542
543static int proc_reg_release(struct inode *inode, struct file *file)
544{
545 struct proc_dir_entry *pde = PDE(inode);
Alexey Dobriyan881adb82008-07-25 01:48:29 -0700546 struct pde_opener *pdeo;
Alexey Dobriyand919b332020-04-06 20:09:01 -0700547
548 if (pde_is_permanent(pde)) {
549 typeof_member(struct proc_ops, proc_release) release;
550
551 release = pde->proc_ops->proc_release;
552 if (release) {
553 return release(inode, file);
554 }
555 return 0;
556 }
557
Alexey Dobriyan786d7e12007-07-15 23:39:00 -0700558 spin_lock(&pde->pde_unload_lock);
Al Viroca469f32013-04-03 19:57:00 -0400559 list_for_each_entry(pdeo, &pde->pde_openers, lh) {
560 if (pdeo->file == file) {
561 close_pdeo(pde, pdeo);
Alexey Dobriyan2f897422018-04-10 16:30:54 -0700562 return 0;
Al Viroca469f32013-04-03 19:57:00 -0400563 }
Alexey Dobriyan881adb82008-07-25 01:48:29 -0700564 }
Alexey Dobriyan786d7e12007-07-15 23:39:00 -0700565 spin_unlock(&pde->pde_unload_lock);
Al Viroca469f32013-04-03 19:57:00 -0400566 return 0;
Alexey Dobriyan786d7e12007-07-15 23:39:00 -0700567}
568
569static const struct file_operations proc_reg_file_ops = {
570 .llseek = proc_reg_llseek,
571 .read = proc_reg_read,
572 .write = proc_reg_write,
573 .poll = proc_reg_poll,
574 .unlocked_ioctl = proc_reg_unlocked_ioctl,
575#ifdef CONFIG_COMPAT
576 .compat_ioctl = proc_reg_compat_ioctl,
577#endif
578 .mmap = proc_reg_mmap,
Alexey Dobriyanc4fe2442013-08-20 22:17:24 +0300579 .get_unmapped_area = proc_reg_get_unmapped_area,
Alexey Dobriyan786d7e12007-07-15 23:39:00 -0700580 .open = proc_reg_open,
581 .release = proc_reg_release,
582};
583
David Miller778f3dd2007-07-27 22:58:37 -0700584#ifdef CONFIG_COMPAT
585static const struct file_operations proc_reg_file_ops_no_compat = {
586 .llseek = proc_reg_llseek,
587 .read = proc_reg_read,
588 .write = proc_reg_write,
589 .poll = proc_reg_poll,
590 .unlocked_ioctl = proc_reg_unlocked_ioctl,
591 .mmap = proc_reg_mmap,
Alexey Dobriyanc4fe2442013-08-20 22:17:24 +0300592 .get_unmapped_area = proc_reg_get_unmapped_area,
David Miller778f3dd2007-07-27 22:58:37 -0700593 .open = proc_reg_open,
594 .release = proc_reg_release,
595};
596#endif
597
Al Virofceef392015-12-29 15:58:39 -0500598static void proc_put_link(void *p)
599{
600 unuse_pde(p);
601}
602
Al Viro6b255392015-11-17 10:20:54 -0500603static const char *proc_get_link(struct dentry *dentry,
Al Virofceef392015-12-29 15:58:39 -0500604 struct inode *inode,
605 struct delayed_call *done)
Al Viro7e0e9532015-02-21 22:16:11 -0500606{
Al Viro6b255392015-11-17 10:20:54 -0500607 struct proc_dir_entry *pde = PDE(inode);
Alexey Dobriyan15b158b2018-02-06 15:37:28 -0800608 if (!use_pde(pde))
Al Viro7e0e9532015-02-21 22:16:11 -0500609 return ERR_PTR(-EINVAL);
Al Virofceef392015-12-29 15:58:39 -0500610 set_delayed_call(done, proc_put_link, pde);
Al Viro680baac2015-05-02 13:32:22 -0400611 return pde->data;
Al Viro7e0e9532015-02-21 22:16:11 -0500612}
613
Al Viro7e0e9532015-02-21 22:16:11 -0500614const struct inode_operations proc_link_inode_operations = {
Al Viro6b255392015-11-17 10:20:54 -0500615 .get_link = proc_get_link,
Al Viro7e0e9532015-02-21 22:16:11 -0500616};
617
Alexey Dobriyan6d1b6e42011-01-12 17:00:33 -0800618struct inode *proc_get_inode(struct super_block *sb, struct proc_dir_entry *de)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700619{
Eric W. Biedermanef1548a2020-06-12 09:42:03 -0500620 struct inode *inode = new_inode(sb);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700621
Linus Torvalds51f08852013-03-22 11:44:04 -0700622 if (inode) {
623 inode->i_ino = de->low_ino;
Deepa Dinamani078cd822016-09-14 07:48:04 -0700624 inode->i_mtime = inode->i_atime = inode->i_ctime = current_time(inode);
David Howellsa1d4aeb2008-02-07 00:15:45 -0800625 PROC_I(inode)->pde = de;
Alexey Dobriyan5e971dc2008-04-29 01:01:41 -0700626
Eric W. Biedermaneb6d38d2015-05-11 16:44:25 -0500627 if (is_empty_pde(de)) {
628 make_empty_dir_inode(inode);
629 return inode;
630 }
Alexey Dobriyan5e971dc2008-04-29 01:01:41 -0700631 if (de->mode) {
632 inode->i_mode = de->mode;
633 inode->i_uid = de->uid;
634 inode->i_gid = de->gid;
635 }
636 if (de->size)
637 inode->i_size = de->size;
638 if (de->nlink)
Miklos Szeredibfe86842011-10-28 14:13:29 +0200639 set_nlink(inode, de->nlink);
Alexey Dobriyand56c0d42020-02-03 17:37:14 -0800640
641 if (S_ISREG(inode->i_mode)) {
642 inode->i_op = de->proc_iops;
643 inode->i_fop = &proc_reg_file_ops;
David Howellsa1d4aeb2008-02-07 00:15:45 -0800644#ifdef CONFIG_COMPAT
Alexey Dobriyand56c0d42020-02-03 17:37:14 -0800645 if (!de->proc_ops->proc_compat_ioctl) {
646 inode->i_fop = &proc_reg_file_ops_no_compat;
David Howellsa1d4aeb2008-02-07 00:15:45 -0800647 }
Alexey Dobriyand56c0d42020-02-03 17:37:14 -0800648#endif
649 } else if (S_ISDIR(inode->i_mode)) {
650 inode->i_op = de->proc_iops;
651 inode->i_fop = de->proc_dir_ops;
652 } else if (S_ISLNK(inode->i_mode)) {
653 inode->i_op = de->proc_iops;
654 inode->i_fop = NULL;
655 } else
656 BUG();
Alexey Dobriyan99b76232009-03-25 22:48:06 +0300657 } else
Alexey Dobriyan135d5652009-12-15 16:45:39 -0800658 pde_put(de);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700659 return inode;
Al Virod3d009c2013-01-25 20:11:22 -0500660}