blob: f2132407e1335755bfe85fec2a41995bd36d2620 [file] [log] [blame]
Thomas Gleixner457c8992019-05-19 13:08:55 +01001// SPDX-License-Identifier: GPL-2.0-only
Linus Torvalds1da177e2005-04-16 15:20:36 -07002/*
3 * proc/fs/generic.c --- generic routines for the proc-fs
4 *
5 * This file contains generic proc-fs routines for handling
6 * directories and files.
7 *
8 * Copyright (C) 1991, 1992 Linus Torvalds.
9 * Copyright (C) 1997 Theodore Ts'o
10 */
11
Alexey Dobriyanb4884f22018-04-10 16:31:52 -070012#include <linux/cache.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070013#include <linux/errno.h>
14#include <linux/time.h>
15#include <linux/proc_fs.h>
16#include <linux/stat.h>
Christoph Hellwig10257742010-06-04 11:30:02 +020017#include <linux/mm.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070018#include <linux/module.h>
Alexey Dobriyan1da4d372018-04-13 15:35:42 -070019#include <linux/namei.h>
Tejun Heo5a0e3ad2010-03-24 17:04:11 +090020#include <linux/slab.h>
Andrew Morton87ebdc02013-02-27 17:03:16 -080021#include <linux/printk.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070022#include <linux/mount.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070023#include <linux/init.h>
24#include <linux/idr.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070025#include <linux/bitops.h>
Steven Rostedt64a07bd2006-03-26 01:36:55 -080026#include <linux/spinlock.h>
Alexey Dobriyan786d7e12007-07-15 23:39:00 -070027#include <linux/completion.h>
Linus Torvalds7c0f6ba2016-12-24 11:46:01 -080028#include <linux/uaccess.h>
Christoph Hellwigfddda2b2018-04-13 19:44:18 +020029#include <linux/seq_file.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070030
Adrian Bunkfee781e2006-01-08 01:04:16 -080031#include "internal.h"
32
Waiman Longecf1a3d2015-09-09 15:35:57 -070033static DEFINE_RWLOCK(proc_subdir_lock);
Steven Rostedt64a07bd2006-03-26 01:36:55 -080034
Alexey Dobriyanb4884f22018-04-10 16:31:52 -070035struct kmem_cache *proc_dir_entry_cache __ro_after_init;
36
37void pde_free(struct proc_dir_entry *pde)
38{
39 if (S_ISLNK(pde->mode))
40 kfree(pde->data);
41 if (pde->name != pde->inline_name)
42 kfree(pde->name);
43 kmem_cache_free(proc_dir_entry_cache, pde);
44}
45
Alexey Dobriyan93ad5bc2018-02-06 15:37:31 -080046static int proc_match(const char *name, struct proc_dir_entry *de, unsigned int len)
Linus Torvalds1da177e2005-04-16 15:20:36 -070047{
Nicolas Dichtel710585d2014-12-10 15:45:01 -080048 if (len < de->namelen)
49 return -1;
50 if (len > de->namelen)
51 return 1;
52
53 return memcmp(name, de->name, len);
54}
55
56static struct proc_dir_entry *pde_subdir_first(struct proc_dir_entry *dir)
57{
Alexey Dobriyan4f113432018-04-10 16:32:20 -070058 return rb_entry_safe(rb_first(&dir->subdir), struct proc_dir_entry,
59 subdir_node);
Nicolas Dichtel710585d2014-12-10 15:45:01 -080060}
61
62static struct proc_dir_entry *pde_subdir_next(struct proc_dir_entry *dir)
63{
Nicolas Dichtel2fc1e942014-12-10 15:45:07 -080064 return rb_entry_safe(rb_next(&dir->subdir_node), struct proc_dir_entry,
65 subdir_node);
Nicolas Dichtel710585d2014-12-10 15:45:01 -080066}
67
68static struct proc_dir_entry *pde_subdir_find(struct proc_dir_entry *dir,
69 const char *name,
70 unsigned int len)
71{
Alexey Dobriyan4f113432018-04-10 16:32:20 -070072 struct rb_node *node = dir->subdir.rb_node;
Nicolas Dichtel710585d2014-12-10 15:45:01 -080073
74 while (node) {
Geliang Tang4e4a7fb2017-02-24 15:00:17 -080075 struct proc_dir_entry *de = rb_entry(node,
76 struct proc_dir_entry,
77 subdir_node);
Alexey Dobriyan93ad5bc2018-02-06 15:37:31 -080078 int result = proc_match(name, de, len);
Nicolas Dichtel710585d2014-12-10 15:45:01 -080079
80 if (result < 0)
81 node = node->rb_left;
82 else if (result > 0)
83 node = node->rb_right;
84 else
85 return de;
86 }
87 return NULL;
88}
89
90static bool pde_subdir_insert(struct proc_dir_entry *dir,
91 struct proc_dir_entry *de)
92{
Alexey Dobriyan4f113432018-04-10 16:32:20 -070093 struct rb_root *root = &dir->subdir;
94 struct rb_node **new = &root->rb_node, *parent = NULL;
Nicolas Dichtel710585d2014-12-10 15:45:01 -080095
96 /* Figure out where to put new node */
97 while (*new) {
Geliang Tang4e4a7fb2017-02-24 15:00:17 -080098 struct proc_dir_entry *this = rb_entry(*new,
99 struct proc_dir_entry,
100 subdir_node);
Alexey Dobriyan93ad5bc2018-02-06 15:37:31 -0800101 int result = proc_match(de->name, this, de->namelen);
Nicolas Dichtel710585d2014-12-10 15:45:01 -0800102
103 parent = *new;
104 if (result < 0)
105 new = &(*new)->rb_left;
Alexey Dobriyan4f113432018-04-10 16:32:20 -0700106 else if (result > 0)
Nicolas Dichtel710585d2014-12-10 15:45:01 -0800107 new = &(*new)->rb_right;
Alexey Dobriyan4f113432018-04-10 16:32:20 -0700108 else
Nicolas Dichtel710585d2014-12-10 15:45:01 -0800109 return false;
110 }
111
112 /* Add new node and rebalance tree. */
113 rb_link_node(&de->subdir_node, parent, new);
Alexey Dobriyan4f113432018-04-10 16:32:20 -0700114 rb_insert_color(&de->subdir_node, root);
Nicolas Dichtel710585d2014-12-10 15:45:01 -0800115 return true;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700116}
117
Christian Brauner549c7292021-01-21 14:19:43 +0100118static int proc_notify_change(struct user_namespace *mnt_userns,
119 struct dentry *dentry, struct iattr *iattr)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700120{
David Howells2b0143b2015-03-17 22:25:59 +0000121 struct inode *inode = d_inode(dentry);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700122 struct proc_dir_entry *de = PDE(inode);
123 int error;
124
Christian Brauner2f221d62021-01-21 14:19:26 +0100125 error = setattr_prepare(&init_user_ns, dentry, iattr);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700126 if (error)
Christoph Hellwig10257742010-06-04 11:30:02 +0200127 return error;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700128
Christian Brauner2f221d62021-01-21 14:19:26 +0100129 setattr_copy(&init_user_ns, inode, iattr);
Christoph Hellwig10257742010-06-04 11:30:02 +0200130 mark_inode_dirty(inode);
Marco Stornelli46f69552012-12-15 11:48:48 +0100131
Rui Xiangcdf7e8d2014-01-23 15:55:41 -0800132 proc_set_user(de, inode->i_uid, inode->i_gid);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700133 de->mode = inode->i_mode;
Christoph Hellwig10257742010-06-04 11:30:02 +0200134 return 0;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700135}
136
Christian Brauner549c7292021-01-21 14:19:43 +0100137static int proc_getattr(struct user_namespace *mnt_userns,
138 const struct path *path, struct kstat *stat,
David Howellsa528d352017-01-31 16:46:22 +0000139 u32 request_mask, unsigned int query_flags)
Miklos Szeredi2b579be2005-09-06 15:17:18 -0700140{
David Howellsa528d352017-01-31 16:46:22 +0000141 struct inode *inode = d_inode(path->dentry);
Alexander Kuleshov6bee55f2015-02-12 15:01:03 -0800142 struct proc_dir_entry *de = PDE(inode);
Alexey Dobriyane06689b2019-12-04 16:49:59 -0800143 if (de) {
144 nlink_t nlink = READ_ONCE(de->nlink);
145 if (nlink > 0) {
146 set_nlink(inode, nlink);
147 }
148 }
Miklos Szeredi2b579be2005-09-06 15:17:18 -0700149
Christian Brauner0d56a452021-01-21 14:19:30 +0100150 generic_fillattr(&init_user_ns, inode, stat);
Miklos Szeredi2b579be2005-09-06 15:17:18 -0700151 return 0;
152}
153
Arjan van de Venc5ef1c42007-02-12 00:55:40 -0800154static const struct inode_operations proc_file_inode_operations = {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700155 .setattr = proc_notify_change,
156};
157
158/*
159 * This function parses a name such as "tty/driver/serial", and
160 * returns the struct proc_dir_entry for "/proc/tty/driver", and
161 * returns "serial" in residual.
162 */
Alexey Dobriyane17a5762010-03-05 13:43:59 -0800163static int __xlate_proc_name(const char *name, struct proc_dir_entry **ret,
164 const char **residual)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700165{
166 const char *cp = name, *next;
167 struct proc_dir_entry *de;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700168
Alexey Dobriyanb793cd92021-05-06 18:02:13 -0700169 de = *ret ?: &proc_root;
170 while ((next = strchr(cp, '/')) != NULL) {
Alexey Dobriyan5f6354e2019-12-04 16:50:02 -0800171 de = pde_subdir_find(de, cp, next - cp);
Alexey Dobriyan12bac0d2010-03-05 13:44:00 -0800172 if (!de) {
173 WARN(1, "name '%s'\n", name);
Alexey Dobriyane17a5762010-03-05 13:43:59 -0800174 return -ENOENT;
Alexey Dobriyan12bac0d2010-03-05 13:44:00 -0800175 }
Alexey Dobriyan5f6354e2019-12-04 16:50:02 -0800176 cp = next + 1;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700177 }
178 *residual = cp;
179 *ret = de;
Alexey Dobriyane17a5762010-03-05 13:43:59 -0800180 return 0;
181}
182
183static int xlate_proc_name(const char *name, struct proc_dir_entry **ret,
184 const char **residual)
185{
186 int rv;
187
Waiman Longecf1a3d2015-09-09 15:35:57 -0700188 read_lock(&proc_subdir_lock);
Alexey Dobriyane17a5762010-03-05 13:43:59 -0800189 rv = __xlate_proc_name(name, ret, residual);
Waiman Longecf1a3d2015-09-09 15:35:57 -0700190 read_unlock(&proc_subdir_lock);
Alexey Dobriyane17a5762010-03-05 13:43:59 -0800191 return rv;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700192}
193
Alexey Dobriyan9a185402008-07-26 11:21:37 +0400194static DEFINE_IDA(proc_inum_ida);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700195
Alexey Dobriyan67935df2008-07-26 11:18:28 +0400196#define PROC_DYNAMIC_FIRST 0xF0000000U
Linus Torvalds1da177e2005-04-16 15:20:36 -0700197
198/*
199 * Return an inode number between PROC_DYNAMIC_FIRST and
200 * 0xffffffff, or zero on failure.
201 */
Eric W. Biederman33d6dce2011-06-17 13:33:20 -0700202int proc_alloc_inum(unsigned int *inum)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700203{
Heiner Kallweitcde1b692017-07-10 15:50:52 -0700204 int i;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700205
Heiner Kallweitcde1b692017-07-10 15:50:52 -0700206 i = ida_simple_get(&proc_inum_ida, 0, UINT_MAX - PROC_DYNAMIC_FIRST + 1,
207 GFP_KERNEL);
208 if (i < 0)
209 return i;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700210
Heiner Kallweitcde1b692017-07-10 15:50:52 -0700211 *inum = PROC_DYNAMIC_FIRST + (unsigned int)i;
Eric W. Biederman33d6dce2011-06-17 13:33:20 -0700212 return 0;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700213}
214
Eric W. Biederman33d6dce2011-06-17 13:33:20 -0700215void proc_free_inum(unsigned int inum)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700216{
Heiner Kallweitcde1b692017-07-10 15:50:52 -0700217 ida_simple_remove(&proc_inum_ida, inum - PROC_DYNAMIC_FIRST);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700218}
219
Alexey Dobriyan1da4d372018-04-13 15:35:42 -0700220static int proc_misc_d_revalidate(struct dentry *dentry, unsigned int flags)
221{
222 if (flags & LOOKUP_RCU)
223 return -ECHILD;
224
225 if (atomic_read(&PDE(d_inode(dentry))->in_use) < 0)
226 return 0; /* revalidate */
227 return 1;
228}
229
230static int proc_misc_d_delete(const struct dentry *dentry)
231{
232 return atomic_read(&PDE(d_inode(dentry))->in_use) < 0;
233}
234
235static const struct dentry_operations proc_misc_dentry_ops = {
236 .d_revalidate = proc_misc_d_revalidate,
237 .d_delete = proc_misc_d_delete,
238};
239
Linus Torvalds1da177e2005-04-16 15:20:36 -0700240/*
Linus Torvalds1da177e2005-04-16 15:20:36 -0700241 * Don't create negative dentries here, return -ENOENT by hand
242 * instead.
243 */
Alexey Dobriyan93ad5bc2018-02-06 15:37:31 -0800244struct dentry *proc_lookup_de(struct inode *dir, struct dentry *dentry,
245 struct proc_dir_entry *de)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700246{
Al Virod3d009c2013-01-25 20:11:22 -0500247 struct inode *inode;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700248
Waiman Longecf1a3d2015-09-09 15:35:57 -0700249 read_lock(&proc_subdir_lock);
Nicolas Dichtel710585d2014-12-10 15:45:01 -0800250 de = pde_subdir_find(de, dentry->d_name.name, dentry->d_name.len);
251 if (de) {
252 pde_get(de);
Waiman Longecf1a3d2015-09-09 15:35:57 -0700253 read_unlock(&proc_subdir_lock);
Nicolas Dichtel710585d2014-12-10 15:45:01 -0800254 inode = proc_get_inode(dir->i_sb, de);
255 if (!inode)
256 return ERR_PTR(-ENOMEM);
Alexey Dobriyan1fde6f22019-02-01 14:20:01 -0800257 d_set_d_op(dentry, de->proc_dops);
Al Viro888e2b02018-05-03 09:45:06 -0400258 return d_splice_alias(inode, dentry);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700259 }
Waiman Longecf1a3d2015-09-09 15:35:57 -0700260 read_unlock(&proc_subdir_lock);
Al Virod3d009c2013-01-25 20:11:22 -0500261 return ERR_PTR(-ENOENT);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700262}
263
Pavel Emelyanove9720ac2008-03-07 11:08:40 -0800264struct dentry *proc_lookup(struct inode *dir, struct dentry *dentry,
Al Viro00cd8dd2012-06-10 17:13:09 -0400265 unsigned int flags)
Pavel Emelyanove9720ac2008-03-07 11:08:40 -0800266{
Alexey Gladkov6814ef22020-04-19 16:10:54 +0200267 struct proc_fs_info *fs_info = proc_sb_info(dir->i_sb);
268
269 if (fs_info->pidonly == PROC_PIDONLY_ON)
270 return ERR_PTR(-ENOENT);
271
Alexey Dobriyan93ad5bc2018-02-06 15:37:31 -0800272 return proc_lookup_de(dir, dentry, PDE(dir));
Pavel Emelyanove9720ac2008-03-07 11:08:40 -0800273}
274
Linus Torvalds1da177e2005-04-16 15:20:36 -0700275/*
276 * This returns non-zero if at EOF, so that the /proc
277 * root directory can use this and check if it should
278 * continue with the <pid> entries..
279 *
280 * Note that the VFS-layer doesn't care about the return
281 * value of the readdir() call, as long as it's non-negative
282 * for success..
283 */
Alexey Dobriyan93ad5bc2018-02-06 15:37:31 -0800284int proc_readdir_de(struct file *file, struct dir_context *ctx,
285 struct proc_dir_entry *de)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700286{
Linus Torvalds1da177e2005-04-16 15:20:36 -0700287 int i;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700288
Al Virof0c3b502013-05-16 12:07:31 -0400289 if (!dir_emit_dots(file, ctx))
290 return 0;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700291
Alexey Dobriyan8d48b2e2018-08-21 21:54:23 -0700292 i = ctx->pos - 2;
Waiman Longecf1a3d2015-09-09 15:35:57 -0700293 read_lock(&proc_subdir_lock);
Nicolas Dichtel710585d2014-12-10 15:45:01 -0800294 de = pde_subdir_first(de);
Al Virof0c3b502013-05-16 12:07:31 -0400295 for (;;) {
296 if (!de) {
Waiman Longecf1a3d2015-09-09 15:35:57 -0700297 read_unlock(&proc_subdir_lock);
Al Virof0c3b502013-05-16 12:07:31 -0400298 return 0;
299 }
300 if (!i)
301 break;
Nicolas Dichtel710585d2014-12-10 15:45:01 -0800302 de = pde_subdir_next(de);
Al Virof0c3b502013-05-16 12:07:31 -0400303 i--;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700304 }
Al Virof0c3b502013-05-16 12:07:31 -0400305
306 do {
307 struct proc_dir_entry *next;
308 pde_get(de);
Waiman Longecf1a3d2015-09-09 15:35:57 -0700309 read_unlock(&proc_subdir_lock);
Al Virof0c3b502013-05-16 12:07:31 -0400310 if (!dir_emit(ctx, de->name, de->namelen,
311 de->low_ino, de->mode >> 12)) {
312 pde_put(de);
313 return 0;
314 }
Al Virof0c3b502013-05-16 12:07:31 -0400315 ctx->pos++;
Alexey Dobriyan8d48b2e2018-08-21 21:54:23 -0700316 read_lock(&proc_subdir_lock);
Nicolas Dichtel710585d2014-12-10 15:45:01 -0800317 next = pde_subdir_next(de);
Al Virof0c3b502013-05-16 12:07:31 -0400318 pde_put(de);
319 de = next;
320 } while (de);
Waiman Longecf1a3d2015-09-09 15:35:57 -0700321 read_unlock(&proc_subdir_lock);
Linus Torvaldsfd3930f2013-08-19 16:26:12 -0700322 return 1;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700323}
324
Al Virof0c3b502013-05-16 12:07:31 -0400325int proc_readdir(struct file *file, struct dir_context *ctx)
Pavel Emelyanove9720ac2008-03-07 11:08:40 -0800326{
Al Virof0c3b502013-05-16 12:07:31 -0400327 struct inode *inode = file_inode(file);
Alexey Gladkov6814ef22020-04-19 16:10:54 +0200328 struct proc_fs_info *fs_info = proc_sb_info(inode->i_sb);
329
330 if (fs_info->pidonly == PROC_PIDONLY_ON)
331 return 1;
Pavel Emelyanove9720ac2008-03-07 11:08:40 -0800332
Alexey Dobriyan93ad5bc2018-02-06 15:37:31 -0800333 return proc_readdir_de(file, ctx, PDE(inode));
Pavel Emelyanove9720ac2008-03-07 11:08:40 -0800334}
335
Linus Torvalds1da177e2005-04-16 15:20:36 -0700336/*
337 * These are the generic /proc directory operations. They
338 * use the in-memory "struct proc_dir_entry" tree to parse
339 * the /proc directory.
340 */
Arjan van de Ven00977a52007-02-12 00:55:34 -0800341static const struct file_operations proc_dir_operations = {
Alexey Dobriyanb4df2b92008-10-27 22:48:36 +0300342 .llseek = generic_file_llseek,
Linus Torvalds1da177e2005-04-16 15:20:36 -0700343 .read = generic_read_dir,
Al Virof50752e2016-04-20 17:13:54 -0400344 .iterate_shared = proc_readdir,
Linus Torvalds1da177e2005-04-16 15:20:36 -0700345};
346
Alexey Dobriyanc6c75de2020-12-15 20:42:39 -0800347static int proc_net_d_revalidate(struct dentry *dentry, unsigned int flags)
348{
349 return 0;
350}
351
352const struct dentry_operations proc_net_dentry_ops = {
353 .d_revalidate = proc_net_d_revalidate,
354 .d_delete = always_delete_dentry,
355};
356
Linus Torvalds1da177e2005-04-16 15:20:36 -0700357/*
358 * proc directories can do almost nothing..
359 */
Arjan van de Venc5ef1c42007-02-12 00:55:40 -0800360static const struct inode_operations proc_dir_inode_operations = {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700361 .lookup = proc_lookup,
Miklos Szeredi2b579be2005-09-06 15:17:18 -0700362 .getattr = proc_getattr,
Linus Torvalds1da177e2005-04-16 15:20:36 -0700363 .setattr = proc_notify_change,
364};
365
Christoph Hellwig61172ea2018-04-24 17:00:52 +0200366/* returns the registered entry, or frees dp and returns NULL on failure */
367struct proc_dir_entry *proc_register(struct proc_dir_entry *dir,
368 struct proc_dir_entry *dp)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700369{
Christoph Hellwig61172ea2018-04-24 17:00:52 +0200370 if (proc_alloc_inum(&dp->low_ino))
371 goto out_free_entry;
Steven Rostedt64a07bd2006-03-26 01:36:55 -0800372
Waiman Longecf1a3d2015-09-09 15:35:57 -0700373 write_lock(&proc_subdir_lock);
Changli Gao99fc06d2007-07-15 23:40:09 -0700374 dp->parent = dir;
Debabrata Banerjeeb208d542014-12-10 15:45:04 -0800375 if (pde_subdir_insert(dir, dp) == false) {
Nicolas Dichtel710585d2014-12-10 15:45:01 -0800376 WARN(1, "proc_dir_entry '%s/%s' already registered\n",
377 dir->name, dp->name);
Waiman Longecf1a3d2015-09-09 15:35:57 -0700378 write_unlock(&proc_subdir_lock);
Christoph Hellwig61172ea2018-04-24 17:00:52 +0200379 goto out_free_inum;
Debabrata Banerjeeb208d542014-12-10 15:45:04 -0800380 }
Alexey Dobriyane06689b2019-12-04 16:49:59 -0800381 dir->nlink++;
Waiman Longecf1a3d2015-09-09 15:35:57 -0700382 write_unlock(&proc_subdir_lock);
Changli Gao99fc06d2007-07-15 23:40:09 -0700383
Christoph Hellwig61172ea2018-04-24 17:00:52 +0200384 return dp;
385out_free_inum:
386 proc_free_inum(dp->low_ino);
387out_free_entry:
388 pde_free(dp);
389 return NULL;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700390}
391
Alexey Dobriyan2d3a4e32008-02-08 04:18:37 -0800392static struct proc_dir_entry *__proc_create(struct proc_dir_entry **parent,
Linus Torvalds1da177e2005-04-16 15:20:36 -0700393 const char *name,
Al Virod161a132011-07-24 03:36:29 -0400394 umode_t mode,
Linus Torvalds1da177e2005-04-16 15:20:36 -0700395 nlink_t nlink)
396{
397 struct proc_dir_entry *ent = NULL;
Alexey Dobriyandbcdb502014-08-08 14:21:25 -0700398 const char *fn;
399 struct qstr qstr;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700400
Alexey Dobriyan7cee4e02008-04-29 01:01:40 -0700401 if (xlate_proc_name(name, parent, &fn) != 0)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700402 goto out;
Alexey Dobriyandbcdb502014-08-08 14:21:25 -0700403 qstr.name = fn;
404 qstr.len = strlen(fn);
405 if (qstr.len == 0 || qstr.len >= 256) {
406 WARN(1, "name len %u\n", qstr.len);
407 return NULL;
408 }
Alexey Dobriyanb77d70d2018-04-10 16:32:11 -0700409 if (qstr.len == 1 && fn[0] == '.') {
410 WARN(1, "name '.'\n");
411 return NULL;
412 }
413 if (qstr.len == 2 && fn[0] == '.' && fn[1] == '.') {
414 WARN(1, "name '..'\n");
415 return NULL;
416 }
Alexey Dobriyandbcdb502014-08-08 14:21:25 -0700417 if (*parent == &proc_root && name_to_int(&qstr) != ~0U) {
418 WARN(1, "create '/proc/%s' by hand\n", qstr.name);
419 return NULL;
420 }
Eric W. Biedermaneb6d38d2015-05-11 16:44:25 -0500421 if (is_empty_pde(*parent)) {
422 WARN(1, "attempt to add to permanently empty directory");
423 return NULL;
424 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700425
Alexey Dobriyanb4884f22018-04-10 16:31:52 -0700426 ent = kmem_cache_zalloc(proc_dir_entry_cache, GFP_KERNEL);
yan17baa2a2012-10-04 17:15:43 -0700427 if (!ent)
428 goto out;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700429
David Howells24074a32018-06-13 19:43:19 +0100430 if (qstr.len + 1 <= SIZEOF_PDE_INLINE_NAME) {
Alexey Dobriyanb4884f22018-04-10 16:31:52 -0700431 ent->name = ent->inline_name;
432 } else {
433 ent->name = kmalloc(qstr.len + 1, GFP_KERNEL);
434 if (!ent->name) {
435 pde_free(ent);
436 return NULL;
437 }
438 }
439
Alexey Dobriyandbcdb502014-08-08 14:21:25 -0700440 memcpy(ent->name, fn, qstr.len + 1);
441 ent->namelen = qstr.len;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700442 ent->mode = mode;
443 ent->nlink = nlink;
Alexey Dobriyan4f113432018-04-10 16:32:20 -0700444 ent->subdir = RB_ROOT;
Alexey Dobriyan9cdd83e2018-04-10 16:32:14 -0700445 refcount_set(&ent->refcnt, 1);
Alexey Dobriyan786d7e12007-07-15 23:39:00 -0700446 spin_lock_init(&ent->pde_unload_lock);
Alexey Dobriyan881adb82008-07-25 01:48:29 -0700447 INIT_LIST_HEAD(&ent->pde_openers);
Dmitry Torokhovc1104862016-08-10 14:36:01 -0700448 proc_set_user(ent, (*parent)->uid, (*parent)->gid);
449
Alexey Dobriyan1fde6f22019-02-01 14:20:01 -0800450 ent->proc_dops = &proc_misc_dentry_ops;
451
yan17baa2a2012-10-04 17:15:43 -0700452out:
Linus Torvalds1da177e2005-04-16 15:20:36 -0700453 return ent;
454}
455
456struct proc_dir_entry *proc_symlink(const char *name,
457 struct proc_dir_entry *parent, const char *dest)
458{
459 struct proc_dir_entry *ent;
460
Alexey Dobriyan2d3a4e32008-02-08 04:18:37 -0800461 ent = __proc_create(&parent, name,
Linus Torvalds1da177e2005-04-16 15:20:36 -0700462 (S_IFLNK | S_IRUGO | S_IWUGO | S_IXUGO),1);
463
464 if (ent) {
465 ent->data = kmalloc((ent->size=strlen(dest))+1, GFP_KERNEL);
466 if (ent->data) {
467 strcpy((char*)ent->data,dest);
Al Virod443b9f2014-12-25 16:47:49 -0500468 ent->proc_iops = &proc_link_inode_operations;
Christoph Hellwig61172ea2018-04-24 17:00:52 +0200469 ent = proc_register(parent, ent);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700470 } else {
Alexey Dobriyanb4884f22018-04-10 16:31:52 -0700471 pde_free(ent);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700472 ent = NULL;
473 }
474 }
475 return ent;
476}
Helight.Xu587d4a12009-12-30 13:24:41 +0800477EXPORT_SYMBOL(proc_symlink);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700478
Alexey Dobriyanc6c75de2020-12-15 20:42:39 -0800479struct proc_dir_entry *_proc_mkdir(const char *name, umode_t mode,
480 struct proc_dir_entry *parent, void *data, bool force_lookup)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700481{
482 struct proc_dir_entry *ent;
483
David Howells270b5ac2013-04-12 02:48:30 +0100484 if (mode == 0)
485 mode = S_IRUGO | S_IXUGO;
486
Alexey Dobriyan2d3a4e32008-02-08 04:18:37 -0800487 ent = __proc_create(&parent, name, S_IFDIR | mode, 2);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700488 if (ent) {
David Howells270b5ac2013-04-12 02:48:30 +0100489 ent->data = data;
Alexey Dobriyand56c0d42020-02-03 17:37:14 -0800490 ent->proc_dir_ops = &proc_dir_operations;
Al Virod443b9f2014-12-25 16:47:49 -0500491 ent->proc_iops = &proc_dir_inode_operations;
Alexey Dobriyanc6c75de2020-12-15 20:42:39 -0800492 if (force_lookup) {
493 pde_force_lookup(ent);
494 }
Christoph Hellwig61172ea2018-04-24 17:00:52 +0200495 ent = proc_register(parent, ent);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700496 }
497 return ent;
498}
Alexey Dobriyanc6c75de2020-12-15 20:42:39 -0800499EXPORT_SYMBOL_GPL(_proc_mkdir);
500
501struct proc_dir_entry *proc_mkdir_data(const char *name, umode_t mode,
502 struct proc_dir_entry *parent, void *data)
503{
504 return _proc_mkdir(name, mode, parent, data, false);
505}
David Howells270b5ac2013-04-12 02:48:30 +0100506EXPORT_SYMBOL_GPL(proc_mkdir_data);
507
508struct proc_dir_entry *proc_mkdir_mode(const char *name, umode_t mode,
509 struct proc_dir_entry *parent)
510{
511 return proc_mkdir_data(name, mode, parent, NULL);
512}
Alexey Dobriyan011159a2011-05-14 00:12:48 +0300513EXPORT_SYMBOL(proc_mkdir_mode);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700514
515struct proc_dir_entry *proc_mkdir(const char *name,
516 struct proc_dir_entry *parent)
517{
David Howells270b5ac2013-04-12 02:48:30 +0100518 return proc_mkdir_data(name, 0, parent, NULL);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700519}
Helight.Xu587d4a12009-12-30 13:24:41 +0800520EXPORT_SYMBOL(proc_mkdir);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700521
Eric W. Biedermaneb6d38d2015-05-11 16:44:25 -0500522struct proc_dir_entry *proc_create_mount_point(const char *name)
523{
524 umode_t mode = S_IFDIR | S_IRUGO | S_IXUGO;
525 struct proc_dir_entry *ent, *parent = NULL;
526
527 ent = __proc_create(&parent, name, mode, 2);
528 if (ent) {
529 ent->data = NULL;
Alexey Dobriyand56c0d42020-02-03 17:37:14 -0800530 ent->proc_dir_ops = NULL;
Eric W. Biedermaneb6d38d2015-05-11 16:44:25 -0500531 ent->proc_iops = NULL;
Christoph Hellwig61172ea2018-04-24 17:00:52 +0200532 ent = proc_register(parent, ent);
Eric W. Biedermaneb6d38d2015-05-11 16:44:25 -0500533 }
534 return ent;
535}
Seth Forsheef97df702016-11-14 11:12:56 +0000536EXPORT_SYMBOL(proc_create_mount_point);
Eric W. Biedermaneb6d38d2015-05-11 16:44:25 -0500537
Christoph Hellwig7aed53d2018-04-24 17:08:36 +0200538struct proc_dir_entry *proc_create_reg(const char *name, umode_t mode,
539 struct proc_dir_entry **parent, void *data)
Alexey Dobriyan2d3a4e32008-02-08 04:18:37 -0800540{
Christoph Hellwig7aed53d2018-04-24 17:08:36 +0200541 struct proc_dir_entry *p;
542
Al Virob6cdc732013-03-30 21:20:14 -0400543 if ((mode & S_IFMT) == 0)
544 mode |= S_IFREG;
Christoph Hellwig7aed53d2018-04-24 17:08:36 +0200545 if ((mode & S_IALLUGO) == 0)
546 mode |= S_IRUGO;
547 if (WARN_ON_ONCE(!S_ISREG(mode)))
Al Virob6cdc732013-03-30 21:20:14 -0400548 return NULL;
Christoph Hellwig7aed53d2018-04-24 17:08:36 +0200549
550 p = __proc_create(parent, name, mode, 1);
551 if (p) {
552 p->proc_iops = &proc_file_inode_operations;
553 p->data = data;
Alexey Dobriyan2d3a4e32008-02-08 04:18:37 -0800554 }
Christoph Hellwig7aed53d2018-04-24 17:08:36 +0200555 return p;
556}
557
Alexey Dobriyand919b332020-04-06 20:09:01 -0700558static inline void pde_set_flags(struct proc_dir_entry *pde)
559{
560 if (pde->proc_ops->proc_flags & PROC_ENTRY_PERMANENT)
561 pde->flags |= PROC_ENTRY_PERMANENT;
562}
563
Christoph Hellwig7aed53d2018-04-24 17:08:36 +0200564struct proc_dir_entry *proc_create_data(const char *name, umode_t mode,
565 struct proc_dir_entry *parent,
Alexey Dobriyand56c0d42020-02-03 17:37:14 -0800566 const struct proc_ops *proc_ops, void *data)
Christoph Hellwig7aed53d2018-04-24 17:08:36 +0200567{
568 struct proc_dir_entry *p;
Alexey Dobriyan2d3a4e32008-02-08 04:18:37 -0800569
Christoph Hellwig7aed53d2018-04-24 17:08:36 +0200570 p = proc_create_reg(name, mode, &parent, data);
571 if (!p)
572 return NULL;
Alexey Dobriyand56c0d42020-02-03 17:37:14 -0800573 p->proc_ops = proc_ops;
Alexey Dobriyand919b332020-04-06 20:09:01 -0700574 pde_set_flags(p);
Christoph Hellwig7aed53d2018-04-24 17:08:36 +0200575 return proc_register(parent, p);
Alexey Dobriyan2d3a4e32008-02-08 04:18:37 -0800576}
Helight.Xu587d4a12009-12-30 13:24:41 +0800577EXPORT_SYMBOL(proc_create_data);
David Howells271a15e2013-04-12 00:38:51 +0100578
Alexey Dobriyan855d9762017-09-08 16:13:38 -0700579struct proc_dir_entry *proc_create(const char *name, umode_t mode,
580 struct proc_dir_entry *parent,
Alexey Dobriyand56c0d42020-02-03 17:37:14 -0800581 const struct proc_ops *proc_ops)
Alexey Dobriyan855d9762017-09-08 16:13:38 -0700582{
Alexey Dobriyand56c0d42020-02-03 17:37:14 -0800583 return proc_create_data(name, mode, parent, proc_ops, NULL);
Alexey Dobriyan855d9762017-09-08 16:13:38 -0700584}
585EXPORT_SYMBOL(proc_create);
586
Christoph Hellwigfddda2b2018-04-13 19:44:18 +0200587static int proc_seq_open(struct inode *inode, struct file *file)
588{
589 struct proc_dir_entry *de = PDE(inode);
590
Christoph Hellwig44414d82018-04-24 17:05:17 +0200591 if (de->state_size)
592 return seq_open_private(file, de->seq_ops, de->state_size);
Christoph Hellwigfddda2b2018-04-13 19:44:18 +0200593 return seq_open(file, de->seq_ops);
594}
595
Chunyu Hu877f9192018-06-10 03:51:24 +0800596static int proc_seq_release(struct inode *inode, struct file *file)
597{
598 struct proc_dir_entry *de = PDE(inode);
599
600 if (de->state_size)
601 return seq_release_private(inode, file);
602 return seq_release(inode, file);
603}
604
Alexey Dobriyand56c0d42020-02-03 17:37:14 -0800605static const struct proc_ops proc_seq_ops = {
Alexey Dobriyand919b332020-04-06 20:09:01 -0700606 /* not permanent -- can call into arbitrary seq_operations */
Alexey Dobriyand56c0d42020-02-03 17:37:14 -0800607 .proc_open = proc_seq_open,
Christoph Hellwigb24c30c2020-11-04 09:27:38 +0100608 .proc_read_iter = seq_read_iter,
Alexey Dobriyand56c0d42020-02-03 17:37:14 -0800609 .proc_lseek = seq_lseek,
610 .proc_release = proc_seq_release,
Christoph Hellwigfddda2b2018-04-13 19:44:18 +0200611};
612
Christoph Hellwig44414d82018-04-24 17:05:17 +0200613struct proc_dir_entry *proc_create_seq_private(const char *name, umode_t mode,
Christoph Hellwigfddda2b2018-04-13 19:44:18 +0200614 struct proc_dir_entry *parent, const struct seq_operations *ops,
Christoph Hellwig44414d82018-04-24 17:05:17 +0200615 unsigned int state_size, void *data)
Christoph Hellwigfddda2b2018-04-13 19:44:18 +0200616{
617 struct proc_dir_entry *p;
618
619 p = proc_create_reg(name, mode, &parent, data);
620 if (!p)
621 return NULL;
Alexey Dobriyand56c0d42020-02-03 17:37:14 -0800622 p->proc_ops = &proc_seq_ops;
Christoph Hellwigfddda2b2018-04-13 19:44:18 +0200623 p->seq_ops = ops;
Christoph Hellwig44414d82018-04-24 17:05:17 +0200624 p->state_size = state_size;
Christoph Hellwigfddda2b2018-04-13 19:44:18 +0200625 return proc_register(parent, p);
626}
Christoph Hellwig44414d82018-04-24 17:05:17 +0200627EXPORT_SYMBOL(proc_create_seq_private);
Christoph Hellwigfddda2b2018-04-13 19:44:18 +0200628
Christoph Hellwig3f3942a2018-05-15 15:57:23 +0200629static int proc_single_open(struct inode *inode, struct file *file)
630{
631 struct proc_dir_entry *de = PDE(inode);
632
633 return single_open(file, de->single_show, de->data);
634}
635
Alexey Dobriyand56c0d42020-02-03 17:37:14 -0800636static const struct proc_ops proc_single_ops = {
Alexey Dobriyand919b332020-04-06 20:09:01 -0700637 /* not permanent -- can call into arbitrary ->single_show */
Alexey Dobriyand56c0d42020-02-03 17:37:14 -0800638 .proc_open = proc_single_open,
Greg Kroah-Hartman7cfc6302020-11-04 09:27:37 +0100639 .proc_read_iter = seq_read_iter,
Alexey Dobriyand56c0d42020-02-03 17:37:14 -0800640 .proc_lseek = seq_lseek,
641 .proc_release = single_release,
Christoph Hellwig3f3942a2018-05-15 15:57:23 +0200642};
643
644struct proc_dir_entry *proc_create_single_data(const char *name, umode_t mode,
645 struct proc_dir_entry *parent,
646 int (*show)(struct seq_file *, void *), void *data)
647{
648 struct proc_dir_entry *p;
649
650 p = proc_create_reg(name, mode, &parent, data);
651 if (!p)
652 return NULL;
Alexey Dobriyand56c0d42020-02-03 17:37:14 -0800653 p->proc_ops = &proc_single_ops;
Christoph Hellwig3f3942a2018-05-15 15:57:23 +0200654 p->single_show = show;
655 return proc_register(parent, p);
656}
657EXPORT_SYMBOL(proc_create_single_data);
658
David Howells271a15e2013-04-12 00:38:51 +0100659void proc_set_size(struct proc_dir_entry *de, loff_t size)
660{
661 de->size = size;
662}
663EXPORT_SYMBOL(proc_set_size);
664
665void proc_set_user(struct proc_dir_entry *de, kuid_t uid, kgid_t gid)
666{
667 de->uid = uid;
668 de->gid = gid;
669}
670EXPORT_SYMBOL(proc_set_user);
Alexey Dobriyan2d3a4e32008-02-08 04:18:37 -0800671
Alexey Dobriyan135d5652009-12-15 16:45:39 -0800672void pde_put(struct proc_dir_entry *pde)
673{
Alexey Dobriyan9cdd83e2018-04-10 16:32:14 -0700674 if (refcount_dec_and_test(&pde->refcnt)) {
Alexey Dobriyanb4884f22018-04-10 16:31:52 -0700675 proc_free_inum(pde->low_ino);
676 pde_free(pde);
677 }
Alexey Dobriyan135d5652009-12-15 16:45:39 -0800678}
679
Al Viro8ce584c2013-03-30 20:13:46 -0400680/*
681 * Remove a /proc entry and free it if it's not currently in use.
682 */
683void remove_proc_entry(const char *name, struct proc_dir_entry *parent)
684{
Al Viro8ce584c2013-03-30 20:13:46 -0400685 struct proc_dir_entry *de = NULL;
686 const char *fn = name;
687 unsigned int len;
688
Waiman Longecf1a3d2015-09-09 15:35:57 -0700689 write_lock(&proc_subdir_lock);
Al Viro8ce584c2013-03-30 20:13:46 -0400690 if (__xlate_proc_name(name, &parent, &fn) != 0) {
Waiman Longecf1a3d2015-09-09 15:35:57 -0700691 write_unlock(&proc_subdir_lock);
Al Viro8ce584c2013-03-30 20:13:46 -0400692 return;
693 }
694 len = strlen(fn);
695
Nicolas Dichtel710585d2014-12-10 15:45:01 -0800696 de = pde_subdir_find(parent, fn, len);
Alexey Dobriyane06689b2019-12-04 16:49:59 -0800697 if (de) {
Alexey Dobriyand919b332020-04-06 20:09:01 -0700698 if (unlikely(pde_is_permanent(de))) {
699 WARN(1, "removing permanent /proc entry '%s'", de->name);
700 de = NULL;
701 } else {
702 rb_erase(&de->subdir_node, &parent->subdir);
703 if (S_ISDIR(de->mode))
704 parent->nlink--;
Alexey Dobriyane06689b2019-12-04 16:49:59 -0800705 }
706 }
Waiman Longecf1a3d2015-09-09 15:35:57 -0700707 write_unlock(&proc_subdir_lock);
Al Viro8ce584c2013-03-30 20:13:46 -0400708 if (!de) {
709 WARN(1, "name '%s'\n", name);
710 return;
711 }
712
Al Viro866ad9a72013-04-03 19:07:30 -0400713 proc_entry_rundown(de);
Alexey Dobriyan881adb82008-07-25 01:48:29 -0700714
Nicolas Dichtel710585d2014-12-10 15:45:01 -0800715 WARN(pde_subdir_first(de),
716 "%s: removing non-empty directory '%s/%s', leaking at least '%s'\n",
717 __func__, de->parent->name, de->name, pde_subdir_first(de)->name);
Alexey Dobriyan135d5652009-12-15 16:45:39 -0800718 pde_put(de);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700719}
Helight.Xu587d4a12009-12-30 13:24:41 +0800720EXPORT_SYMBOL(remove_proc_entry);
Al Viro8ce584c2013-03-30 20:13:46 -0400721
722int remove_proc_subtree(const char *name, struct proc_dir_entry *parent)
723{
Al Viro8ce584c2013-03-30 20:13:46 -0400724 struct proc_dir_entry *root = NULL, *de, *next;
725 const char *fn = name;
726 unsigned int len;
727
Waiman Longecf1a3d2015-09-09 15:35:57 -0700728 write_lock(&proc_subdir_lock);
Al Viro8ce584c2013-03-30 20:13:46 -0400729 if (__xlate_proc_name(name, &parent, &fn) != 0) {
Waiman Longecf1a3d2015-09-09 15:35:57 -0700730 write_unlock(&proc_subdir_lock);
Al Viro8ce584c2013-03-30 20:13:46 -0400731 return -ENOENT;
732 }
733 len = strlen(fn);
734
Nicolas Dichtel710585d2014-12-10 15:45:01 -0800735 root = pde_subdir_find(parent, fn, len);
Al Viro8ce584c2013-03-30 20:13:46 -0400736 if (!root) {
Waiman Longecf1a3d2015-09-09 15:35:57 -0700737 write_unlock(&proc_subdir_lock);
Al Viro8ce584c2013-03-30 20:13:46 -0400738 return -ENOENT;
739 }
Alexey Dobriyand919b332020-04-06 20:09:01 -0700740 if (unlikely(pde_is_permanent(root))) {
741 write_unlock(&proc_subdir_lock);
742 WARN(1, "removing permanent /proc entry '%s/%s'",
743 root->parent->name, root->name);
744 return -EINVAL;
745 }
Alexey Dobriyan4f113432018-04-10 16:32:20 -0700746 rb_erase(&root->subdir_node, &parent->subdir);
Nicolas Dichtel710585d2014-12-10 15:45:01 -0800747
Al Viro8ce584c2013-03-30 20:13:46 -0400748 de = root;
749 while (1) {
Nicolas Dichtel710585d2014-12-10 15:45:01 -0800750 next = pde_subdir_first(de);
Al Viro8ce584c2013-03-30 20:13:46 -0400751 if (next) {
Colin Ian Kingf4bf74d2021-05-06 18:02:10 -0700752 if (unlikely(pde_is_permanent(next))) {
Alexey Dobriyand919b332020-04-06 20:09:01 -0700753 write_unlock(&proc_subdir_lock);
754 WARN(1, "removing permanent /proc entry '%s/%s'",
755 next->parent->name, next->name);
756 return -EINVAL;
757 }
Alexey Dobriyan4f113432018-04-10 16:32:20 -0700758 rb_erase(&next->subdir_node, &de->subdir);
Al Viro8ce584c2013-03-30 20:13:46 -0400759 de = next;
760 continue;
761 }
Al Viro8ce584c2013-03-30 20:13:46 -0400762 next = de->parent;
763 if (S_ISDIR(de->mode))
764 next->nlink--;
Alexey Dobriyane06689b2019-12-04 16:49:59 -0800765 write_unlock(&proc_subdir_lock);
766
767 proc_entry_rundown(de);
Al Viro8ce584c2013-03-30 20:13:46 -0400768 if (de == root)
769 break;
770 pde_put(de);
771
Waiman Longecf1a3d2015-09-09 15:35:57 -0700772 write_lock(&proc_subdir_lock);
Al Viro8ce584c2013-03-30 20:13:46 -0400773 de = next;
774 }
775 pde_put(root);
776 return 0;
777}
778EXPORT_SYMBOL(remove_proc_subtree);
David Howells4a520d22013-04-12 14:06:01 +0100779
780void *proc_get_parent_data(const struct inode *inode)
781{
782 struct proc_dir_entry *de = PDE(inode);
783 return de->parent->data;
784}
785EXPORT_SYMBOL_GPL(proc_get_parent_data);
David Howellsa8ca16e2013-04-12 17:27:28 +0100786
787void proc_remove(struct proc_dir_entry *de)
788{
789 if (de)
790 remove_proc_subtree(de->name, de->parent);
791}
792EXPORT_SYMBOL(proc_remove);
David Howellsc30480b2013-04-12 18:03:36 +0100793
David Howells564def72018-05-18 11:46:15 +0100794/*
795 * Pull a user buffer into memory and pass it to the file's write handler if
796 * one is supplied. The ->write() method is permitted to modify the
797 * kernel-side buffer.
798 */
799ssize_t proc_simple_write(struct file *f, const char __user *ubuf, size_t size,
800 loff_t *_pos)
801{
802 struct proc_dir_entry *pde = PDE(file_inode(f));
803 char *buf;
804 int ret;
805
806 if (!pde->write)
807 return -EACCES;
808 if (size == 0 || size > PAGE_SIZE - 1)
809 return -EINVAL;
810 buf = memdup_user_nul(ubuf, size);
811 if (IS_ERR(buf))
812 return PTR_ERR(buf);
813 ret = pde->write(f, buf, size);
814 kfree(buf);
815 return ret == 0 ? size : ret;
816}