blob: bde6b6f69852d2206dbd6703b8f033ff9c6591b2 [file] [log] [blame]
Greg Kroah-Hartmanb2441312017-11-01 15:07:57 +01001// SPDX-License-Identifier: GPL-2.0
Linus Torvalds1da177e2005-04-16 15:20:36 -07002/*
3 * linux/fs/proc/inode.c
4 *
5 * Copyright (C) 1991, 1992 Linus Torvalds
6 */
7
Alexey Dobriyanefb1a572018-02-06 15:37:24 -08008#include <linux/cache.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -07009#include <linux/time.h>
10#include <linux/proc_fs.h>
11#include <linux/kernel.h>
Vasiliy Kulikov97412952012-01-10 15:11:27 -080012#include <linux/pid_namespace.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070013#include <linux/mm.h>
14#include <linux/string.h>
15#include <linux/stat.h>
Alexey Dobriyan786d7e12007-07-15 23:39:00 -070016#include <linux/completion.h>
Alexey Dobriyandd23aae2007-09-11 15:23:55 -070017#include <linux/poll.h>
Andrew Morton87ebdc02013-02-27 17:03:16 -080018#include <linux/printk.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070019#include <linux/file.h>
20#include <linux/limits.h>
21#include <linux/init.h>
22#include <linux/module.h>
Al Viro9043476f2008-07-15 08:54:06 -040023#include <linux/sysctl.h>
Vasiliy Kulikov97412952012-01-10 15:11:27 -080024#include <linux/seq_file.h>
Tejun Heo5a0e3ad2010-03-24 17:04:11 +090025#include <linux/slab.h>
Vasiliy Kulikov97412952012-01-10 15:11:27 -080026#include <linux/mount.h>
Alexey Gladkov1c6c4d12020-04-19 16:10:56 +020027#include <linux/bug.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070028
Linus Torvalds7c0f6ba2016-12-24 11:46:01 -080029#include <linux/uaccess.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070030
Adrian Bunkfee781e2006-01-08 01:04:16 -080031#include "internal.h"
Linus Torvalds1da177e2005-04-16 15:20:36 -070032
Al Viro82679522010-06-04 22:17:56 -040033static void proc_evict_inode(struct inode *inode)
Linus Torvalds1da177e2005-04-16 15:20:36 -070034{
35 struct proc_dir_entry *de;
Al Virodfef6dcd32011-03-08 01:25:28 -050036 struct ctl_table_header *head;
Eric W. Biederman71448012020-02-20 11:17:28 -060037 struct proc_inode *ei = PROC_I(inode);
Linus Torvalds1da177e2005-04-16 15:20:36 -070038
Johannes Weiner91b0abe2014-04-03 14:47:49 -070039 truncate_inode_pages_final(&inode->i_data);
Jan Karadbd57682012-05-03 14:48:02 +020040 clear_inode(inode);
Mark Fashehfef26652005-09-09 13:01:31 -070041
Eric W. Biederman99f89552006-06-26 00:25:55 -070042 /* Stop tracking associated processes */
Eric W. Biederman71448012020-02-20 11:17:28 -060043 if (ei->pid) {
Eric W. Biederman7bc3e6e2020-02-19 18:22:26 -060044 proc_pid_evict_inode(ei);
Eric W. Biederman71448012020-02-20 11:17:28 -060045 ei->pid = NULL;
46 }
Linus Torvalds1da177e2005-04-16 15:20:36 -070047
48 /* Let go of any associated proc directory entry */
Eric W. Biederman71448012020-02-20 11:17:28 -060049 de = ei->pde;
50 if (de) {
Alexey Dobriyan135d5652009-12-15 16:45:39 -080051 pde_put(de);
Eric W. Biederman71448012020-02-20 11:17:28 -060052 ei->pde = NULL;
53 }
Konstantin Khlebnikovd6cffbb2017-02-10 10:35:02 +030054
Eric W. Biederman71448012020-02-20 11:17:28 -060055 head = ei->sysctl;
Al Virodfef6dcd32011-03-08 01:25:28 -050056 if (head) {
Eric W. Biederman71448012020-02-20 11:17:28 -060057 RCU_INIT_POINTER(ei->sysctl, NULL);
Konstantin Khlebnikovd6cffbb2017-02-10 10:35:02 +030058 proc_sys_evict_inode(inode, head);
Al Virodfef6dcd32011-03-08 01:25:28 -050059 }
Linus Torvalds1da177e2005-04-16 15:20:36 -070060}
61
Alexey Dobriyanefb1a572018-02-06 15:37:24 -080062static struct kmem_cache *proc_inode_cachep __ro_after_init;
Alexey Dobriyan195b8cf2018-04-10 16:31:09 -070063static struct kmem_cache *pde_opener_cache __ro_after_init;
Linus Torvalds1da177e2005-04-16 15:20:36 -070064
65static struct inode *proc_alloc_inode(struct super_block *sb)
66{
67 struct proc_inode *ei;
Linus Torvalds1da177e2005-04-16 15:20:36 -070068
Tobin C. Hardingf245e1c172017-05-08 15:54:55 -070069 ei = kmem_cache_alloc(proc_inode_cachep, GFP_KERNEL);
Linus Torvalds1da177e2005-04-16 15:20:36 -070070 if (!ei)
71 return NULL;
Eric W. Biederman13b41b02006-06-26 00:25:56 -070072 ei->pid = NULL;
Eric W. Biedermanaed7a6c2006-06-26 00:25:44 -070073 ei->fd = 0;
Linus Torvalds1da177e2005-04-16 15:20:36 -070074 ei->op.proc_get_link = NULL;
75 ei->pde = NULL;
Al Viro9043476f2008-07-15 08:54:06 -040076 ei->sysctl = NULL;
77 ei->sysctl_entry = NULL;
Eric W. Biederman0afa5ca2020-02-19 17:17:34 -060078 INIT_HLIST_NODE(&ei->sibling_inodes);
Al Viro3d3d35b2014-11-01 11:10:28 -040079 ei->ns_ops = NULL;
Alexey Dobriyan230f72e2019-01-03 15:26:05 -080080 return &ei->vfs_inode;
Linus Torvalds1da177e2005-04-16 15:20:36 -070081}
82
Al Viro4aa6b552019-04-15 20:28:38 -040083static void proc_free_inode(struct inode *inode)
Nick Pigginfa0d7e3d2011-01-07 17:49:49 +110084{
Nick Pigginfa0d7e3d2011-01-07 17:49:49 +110085 kmem_cache_free(proc_inode_cachep, PROC_I(inode));
86}
87
Alexey Dobriyan51cc5062008-07-25 19:45:34 -070088static void init_once(void *foo)
Linus Torvalds1da177e2005-04-16 15:20:36 -070089{
90 struct proc_inode *ei = (struct proc_inode *) foo;
91
Christoph Lametera35afb82007-05-16 22:10:57 -070092 inode_init_once(&ei->vfs_inode);
Linus Torvalds1da177e2005-04-16 15:20:36 -070093}
Paul Mundt20c2df82007-07-20 10:11:58 +090094
Alexey Dobriyan195b8cf2018-04-10 16:31:09 -070095void __init proc_init_kmemcache(void)
Linus Torvalds1da177e2005-04-16 15:20:36 -070096{
97 proc_inode_cachep = kmem_cache_create("proc_inode_cache",
98 sizeof(struct proc_inode),
Paul Jacksonfffb60f2006-03-24 03:16:06 -080099 0, (SLAB_RECLAIM_ACCOUNT|
Vladimir Davydov5d097052016-01-14 15:18:21 -0800100 SLAB_MEM_SPREAD|SLAB_ACCOUNT|
101 SLAB_PANIC),
Paul Mundt20c2df82007-07-20 10:11:58 +0900102 init_once);
Alexey Dobriyan195b8cf2018-04-10 16:31:09 -0700103 pde_opener_cache =
104 kmem_cache_create("pde_opener", sizeof(struct pde_opener), 0,
Alexey Dobriyan2acddbe2018-04-10 16:31:12 -0700105 SLAB_ACCOUNT|SLAB_PANIC, NULL);
Alexey Dobriyanb4884f22018-04-10 16:31:52 -0700106 proc_dir_entry_cache = kmem_cache_create_usercopy(
Alexey Dobriyan2d6e4e82018-08-21 21:54:09 -0700107 "proc_dir_entry", SIZEOF_PDE, 0, SLAB_PANIC,
108 offsetof(struct proc_dir_entry, inline_name),
109 SIZEOF_PDE_INLINE_NAME, NULL);
110 BUILD_BUG_ON(sizeof(struct proc_dir_entry) >= SIZEOF_PDE);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700111}
112
Eric W. Biedermanf90f3ca2020-02-21 08:43:23 -0600113void proc_invalidate_siblings_dcache(struct hlist_head *inodes, spinlock_t *lock)
Eric W. Biederman26dbc602020-02-20 08:34:44 -0600114{
115 struct inode *inode;
116 struct proc_inode *ei;
117 struct hlist_node *node;
Eric W. Biederman080f6272020-02-21 08:33:57 -0600118 struct super_block *old_sb = NULL;
Eric W. Biederman26dbc602020-02-20 08:34:44 -0600119
120 rcu_read_lock();
121 for (;;) {
Eric W. Biederman080f6272020-02-21 08:33:57 -0600122 struct super_block *sb;
Eric W. Biederman26dbc602020-02-20 08:34:44 -0600123 node = hlist_first_rcu(inodes);
124 if (!node)
125 break;
126 ei = hlist_entry(node, struct proc_inode, sibling_inodes);
127 spin_lock(lock);
128 hlist_del_init_rcu(&ei->sibling_inodes);
129 spin_unlock(lock);
130
131 inode = &ei->vfs_inode;
132 sb = inode->i_sb;
Eric W. Biederman080f6272020-02-21 08:33:57 -0600133 if ((sb != old_sb) && !atomic_inc_not_zero(&sb->s_active))
Eric W. Biederman26dbc602020-02-20 08:34:44 -0600134 continue;
135 inode = igrab(inode);
136 rcu_read_unlock();
Eric W. Biederman080f6272020-02-21 08:33:57 -0600137 if (sb != old_sb) {
138 if (old_sb)
139 deactivate_super(old_sb);
140 old_sb = sb;
141 }
Eric W. Biederman26dbc602020-02-20 08:34:44 -0600142 if (unlikely(!inode)) {
Eric W. Biederman26dbc602020-02-20 08:34:44 -0600143 rcu_read_lock();
144 continue;
145 }
146
Eric W. Biedermanf90f3ca2020-02-21 08:43:23 -0600147 if (S_ISDIR(inode->i_mode)) {
148 struct dentry *dir = d_find_any_alias(inode);
149 if (dir) {
150 d_invalidate(dir);
151 dput(dir);
152 }
153 } else {
154 struct dentry *dentry;
155 while ((dentry = d_find_alias(inode))) {
156 d_invalidate(dentry);
157 dput(dentry);
158 }
159 }
Eric W. Biederman26dbc602020-02-20 08:34:44 -0600160 iput(inode);
Eric W. Biederman26dbc602020-02-20 08:34:44 -0600161
162 rcu_read_lock();
163 }
164 rcu_read_unlock();
Eric W. Biederman080f6272020-02-21 08:33:57 -0600165 if (old_sb)
166 deactivate_super(old_sb);
Eric W. Biederman26dbc602020-02-20 08:34:44 -0600167}
168
Alexey Gladkove61bb8b2020-04-19 16:10:57 +0200169static inline const char *hidepid2str(enum proc_hidepid v)
Alexey Gladkov1c6c4d12020-04-19 16:10:56 +0200170{
171 switch (v) {
172 case HIDEPID_OFF: return "off";
173 case HIDEPID_NO_ACCESS: return "noaccess";
174 case HIDEPID_INVISIBLE: return "invisible";
175 case HIDEPID_NOT_PTRACEABLE: return "ptraceable";
176 }
177 WARN_ONCE(1, "bad hide_pid value: %d\n", v);
178 return "unknown";
179}
180
Vasiliy Kulikov97412952012-01-10 15:11:27 -0800181static int proc_show_options(struct seq_file *seq, struct dentry *root)
182{
Alexey Gladkovfa10fed2020-04-19 16:10:52 +0200183 struct proc_fs_info *fs_info = proc_sb_info(root->d_sb);
Vasiliy Kulikov04996802012-01-10 15:11:31 -0800184
Alexey Gladkovfa10fed2020-04-19 16:10:52 +0200185 if (!gid_eq(fs_info->pid_gid, GLOBAL_ROOT_GID))
186 seq_printf(seq, ",gid=%u", from_kgid_munged(&init_user_ns, fs_info->pid_gid));
187 if (fs_info->hide_pid != HIDEPID_OFF)
Alexey Gladkov1c6c4d12020-04-19 16:10:56 +0200188 seq_printf(seq, ",hidepid=%s", hidepid2str(fs_info->hide_pid));
Alexey Gladkov6814ef22020-04-19 16:10:54 +0200189 if (fs_info->pidonly != PROC_PIDONLY_OFF)
190 seq_printf(seq, ",subset=pid");
Vasiliy Kulikov04996802012-01-10 15:11:31 -0800191
Vasiliy Kulikov97412952012-01-10 15:11:27 -0800192 return 0;
193}
194
David Howells60a3c3a2018-11-01 23:07:25 +0000195const struct super_operations proc_sops = {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700196 .alloc_inode = proc_alloc_inode,
Al Viro4aa6b552019-04-15 20:28:38 -0400197 .free_inode = proc_free_inode,
Linus Torvalds1da177e2005-04-16 15:20:36 -0700198 .drop_inode = generic_delete_inode,
Al Viro82679522010-06-04 22:17:56 -0400199 .evict_inode = proc_evict_inode,
Linus Torvalds1da177e2005-04-16 15:20:36 -0700200 .statfs = simple_statfs,
Vasiliy Kulikov97412952012-01-10 15:11:27 -0800201 .show_options = proc_show_options,
Linus Torvalds1da177e2005-04-16 15:20:36 -0700202};
203
Al Viro866ad9a72013-04-03 19:07:30 -0400204enum {BIAS = -1U<<31};
205
206static inline int use_pde(struct proc_dir_entry *pde)
207{
Alexey Dobriyan15b158b2018-02-06 15:37:28 -0800208 return likely(atomic_inc_unless_negative(&pde->in_use));
Alexey Dobriyan881adb82008-07-25 01:48:29 -0700209}
210
Al Viro866ad9a72013-04-03 19:07:30 -0400211static void unuse_pde(struct proc_dir_entry *pde)
Alexey Dobriyan881adb82008-07-25 01:48:29 -0700212{
Alexey Dobriyan15b158b2018-02-06 15:37:28 -0800213 if (unlikely(atomic_dec_return(&pde->in_use) == BIAS))
Al Viro05c0ae22013-04-04 16:28:47 -0400214 complete(pde->pde_unload_completion);
Alexey Dobriyan786d7e12007-07-15 23:39:00 -0700215}
216
Alexey Dobriyan2f897422018-04-10 16:30:54 -0700217/* pde is locked on entry, unlocked on exit */
Al Viroca469f32013-04-03 19:57:00 -0400218static void close_pdeo(struct proc_dir_entry *pde, struct pde_opener *pdeo)
Jules Irenge904f3942020-04-06 20:08:55 -0700219 __releases(&pde->pde_unload_lock)
Al Viroca469f32013-04-03 19:57:00 -0400220{
Alexey Dobriyan492b2da2016-12-12 16:45:22 -0800221 /*
222 * close() (proc_reg_release()) can't delete an entry and proceed:
223 * ->release hook needs to be available at the right moment.
224 *
225 * rmmod (remove_proc_entry() et al) can't delete an entry and proceed:
226 * "struct file" needs to be available at the right moment.
227 *
228 * Therefore, first process to enter this function does ->release() and
229 * signals its completion to the other process which does nothing.
230 */
Al Viro05c0ae22013-04-04 16:28:47 -0400231 if (pdeo->closing) {
Al Viroca469f32013-04-03 19:57:00 -0400232 /* somebody else is doing that, just wait */
Al Viro05c0ae22013-04-04 16:28:47 -0400233 DECLARE_COMPLETION_ONSTACK(c);
234 pdeo->c = &c;
Al Viroca469f32013-04-03 19:57:00 -0400235 spin_unlock(&pde->pde_unload_lock);
Al Viro05c0ae22013-04-04 16:28:47 -0400236 wait_for_completion(&c);
Al Viroca469f32013-04-03 19:57:00 -0400237 } else {
238 struct file *file;
Alexey Dobriyan2f897422018-04-10 16:30:54 -0700239 struct completion *c;
240
Alexey Dobriyanf5887c712016-12-12 16:45:17 -0800241 pdeo->closing = true;
Al Viroca469f32013-04-03 19:57:00 -0400242 spin_unlock(&pde->pde_unload_lock);
243 file = pdeo->file;
Alexey Dobriyand56c0d42020-02-03 17:37:14 -0800244 pde->proc_ops->proc_release(file_inode(file), file);
Al Viroca469f32013-04-03 19:57:00 -0400245 spin_lock(&pde->pde_unload_lock);
Alexey Dobriyan492b2da2016-12-12 16:45:22 -0800246 /* After ->release. */
Alexey Dobriyan06a0c412016-12-12 16:45:14 -0800247 list_del(&pdeo->lh);
Alexey Dobriyan2f897422018-04-10 16:30:54 -0700248 c = pdeo->c;
249 spin_unlock(&pde->pde_unload_lock);
250 if (unlikely(c))
251 complete(c);
Alexey Dobriyan195b8cf2018-04-10 16:31:09 -0700252 kmem_cache_free(pde_opener_cache, pdeo);
Al Viro05c0ae22013-04-04 16:28:47 -0400253 }
Al Viroca469f32013-04-03 19:57:00 -0400254}
255
Al Viro866ad9a72013-04-03 19:07:30 -0400256void proc_entry_rundown(struct proc_dir_entry *de)
257{
Al Viro05c0ae22013-04-04 16:28:47 -0400258 DECLARE_COMPLETION_ONSTACK(c);
Al Viro866ad9a72013-04-03 19:07:30 -0400259 /* Wait until all existing callers into module are done. */
Al Viro05c0ae22013-04-04 16:28:47 -0400260 de->pde_unload_completion = &c;
261 if (atomic_add_return(BIAS, &de->in_use) != BIAS)
262 wait_for_completion(&c);
Al Viro866ad9a72013-04-03 19:07:30 -0400263
Alexey Dobriyan492b2da2016-12-12 16:45:22 -0800264 /* ->pde_openers list can't grow from now on. */
265
Al Viro05c0ae22013-04-04 16:28:47 -0400266 spin_lock(&de->pde_unload_lock);
Al Viro866ad9a72013-04-03 19:07:30 -0400267 while (!list_empty(&de->pde_openers)) {
268 struct pde_opener *pdeo;
Al Viro866ad9a72013-04-03 19:07:30 -0400269 pdeo = list_first_entry(&de->pde_openers, struct pde_opener, lh);
Al Viroca469f32013-04-03 19:57:00 -0400270 close_pdeo(de, pdeo);
Alexey Dobriyan2f897422018-04-10 16:30:54 -0700271 spin_lock(&de->pde_unload_lock);
Al Viro866ad9a72013-04-03 19:07:30 -0400272 }
273 spin_unlock(&de->pde_unload_lock);
274}
275
Alexey Dobriyand919b332020-04-06 20:09:01 -0700276static loff_t pde_lseek(struct proc_dir_entry *pde, struct file *file, loff_t offset, int whence)
277{
278 typeof_member(struct proc_ops, proc_lseek) lseek;
279
280 lseek = pde->proc_ops->proc_lseek;
281 if (!lseek)
282 lseek = default_llseek;
283 return lseek(file, offset, whence);
284}
285
Alexey Dobriyan786d7e12007-07-15 23:39:00 -0700286static loff_t proc_reg_llseek(struct file *file, loff_t offset, int whence)
287{
Al Viro496ad9a2013-01-23 17:07:38 -0500288 struct proc_dir_entry *pde = PDE(file_inode(file));
Alexey Dobriyan786d7e12007-07-15 23:39:00 -0700289 loff_t rv = -EINVAL;
Alexey Dobriyan9af27b22019-07-16 16:26:45 -0700290
Alexey Dobriyand919b332020-04-06 20:09:01 -0700291 if (pde_is_permanent(pde)) {
292 return pde_lseek(pde, file, offset, whence);
293 } else if (use_pde(pde)) {
294 rv = pde_lseek(pde, file, offset, whence);
Al Viro866ad9a72013-04-03 19:07:30 -0400295 unuse_pde(pde);
Alexey Dobriyan786d7e12007-07-15 23:39:00 -0700296 }
Alexey Dobriyan786d7e12007-07-15 23:39:00 -0700297 return rv;
298}
299
Christoph Hellwigfd5a13f2020-09-03 16:22:31 +0200300static ssize_t proc_reg_read_iter(struct kiocb *iocb, struct iov_iter *iter)
301{
302 struct proc_dir_entry *pde = PDE(file_inode(iocb->ki_filp));
303 ssize_t ret;
304
305 if (pde_is_permanent(pde))
306 return pde->proc_ops->proc_read_iter(iocb, iter);
307
308 if (!use_pde(pde))
309 return -EIO;
310 ret = pde->proc_ops->proc_read_iter(iocb, iter);
311 unuse_pde(pde);
312 return ret;
313}
314
Alexey Dobriyand919b332020-04-06 20:09:01 -0700315static ssize_t pde_read(struct proc_dir_entry *pde, struct file *file, char __user *buf, size_t count, loff_t *ppos)
316{
317 typeof_member(struct proc_ops, proc_read) read;
318
319 read = pde->proc_ops->proc_read;
320 if (read)
321 return read(file, buf, count, ppos);
322 return -EIO;
323}
324
Alexey Dobriyan786d7e12007-07-15 23:39:00 -0700325static ssize_t proc_reg_read(struct file *file, char __user *buf, size_t count, loff_t *ppos)
326{
Al Viro496ad9a2013-01-23 17:07:38 -0500327 struct proc_dir_entry *pde = PDE(file_inode(file));
Alexey Dobriyan786d7e12007-07-15 23:39:00 -0700328 ssize_t rv = -EIO;
Alexey Dobriyan9af27b22019-07-16 16:26:45 -0700329
Alexey Dobriyand919b332020-04-06 20:09:01 -0700330 if (pde_is_permanent(pde)) {
331 return pde_read(pde, file, buf, count, ppos);
332 } else if (use_pde(pde)) {
333 rv = pde_read(pde, file, buf, count, ppos);
Al Viro866ad9a72013-04-03 19:07:30 -0400334 unuse_pde(pde);
Alexey Dobriyan786d7e12007-07-15 23:39:00 -0700335 }
Alexey Dobriyan786d7e12007-07-15 23:39:00 -0700336 return rv;
337}
338
Alexey Dobriyand919b332020-04-06 20:09:01 -0700339static ssize_t pde_write(struct proc_dir_entry *pde, struct file *file, const char __user *buf, size_t count, loff_t *ppos)
340{
341 typeof_member(struct proc_ops, proc_write) write;
342
343 write = pde->proc_ops->proc_write;
344 if (write)
345 return write(file, buf, count, ppos);
346 return -EIO;
347}
348
Alexey Dobriyan786d7e12007-07-15 23:39:00 -0700349static ssize_t proc_reg_write(struct file *file, const char __user *buf, size_t count, loff_t *ppos)
350{
Al Viro496ad9a2013-01-23 17:07:38 -0500351 struct proc_dir_entry *pde = PDE(file_inode(file));
Alexey Dobriyan786d7e12007-07-15 23:39:00 -0700352 ssize_t rv = -EIO;
Alexey Dobriyan9af27b22019-07-16 16:26:45 -0700353
Alexey Dobriyand919b332020-04-06 20:09:01 -0700354 if (pde_is_permanent(pde)) {
355 return pde_write(pde, file, buf, count, ppos);
356 } else if (use_pde(pde)) {
357 rv = pde_write(pde, file, buf, count, ppos);
Al Viro866ad9a72013-04-03 19:07:30 -0400358 unuse_pde(pde);
Alexey Dobriyan786d7e12007-07-15 23:39:00 -0700359 }
Alexey Dobriyan786d7e12007-07-15 23:39:00 -0700360 return rv;
361}
362
Alexey Dobriyand919b332020-04-06 20:09:01 -0700363static __poll_t pde_poll(struct proc_dir_entry *pde, struct file *file, struct poll_table_struct *pts)
364{
365 typeof_member(struct proc_ops, proc_poll) poll;
366
367 poll = pde->proc_ops->proc_poll;
368 if (poll)
369 return poll(file, pts);
370 return DEFAULT_POLLMASK;
371}
372
Al Viro076ccb72017-07-03 01:02:18 -0400373static __poll_t proc_reg_poll(struct file *file, struct poll_table_struct *pts)
Alexey Dobriyan786d7e12007-07-15 23:39:00 -0700374{
Al Viro496ad9a2013-01-23 17:07:38 -0500375 struct proc_dir_entry *pde = PDE(file_inode(file));
Al Viroe6c8adc2017-07-03 22:25:56 -0400376 __poll_t rv = DEFAULT_POLLMASK;
Alexey Dobriyan9af27b22019-07-16 16:26:45 -0700377
Alexey Dobriyand919b332020-04-06 20:09:01 -0700378 if (pde_is_permanent(pde)) {
379 return pde_poll(pde, file, pts);
380 } else if (use_pde(pde)) {
381 rv = pde_poll(pde, file, pts);
Al Viro866ad9a72013-04-03 19:07:30 -0400382 unuse_pde(pde);
Alexey Dobriyan786d7e12007-07-15 23:39:00 -0700383 }
Alexey Dobriyan786d7e12007-07-15 23:39:00 -0700384 return rv;
385}
386
Alexey Dobriyand919b332020-04-06 20:09:01 -0700387static long pde_ioctl(struct proc_dir_entry *pde, struct file *file, unsigned int cmd, unsigned long arg)
388{
389 typeof_member(struct proc_ops, proc_ioctl) ioctl;
390
391 ioctl = pde->proc_ops->proc_ioctl;
392 if (ioctl)
393 return ioctl(file, cmd, arg);
394 return -ENOTTY;
395}
396
Alexey Dobriyan786d7e12007-07-15 23:39:00 -0700397static long proc_reg_unlocked_ioctl(struct file *file, unsigned int cmd, unsigned long arg)
398{
Al Viro496ad9a2013-01-23 17:07:38 -0500399 struct proc_dir_entry *pde = PDE(file_inode(file));
Alexey Dobriyan786d7e12007-07-15 23:39:00 -0700400 long rv = -ENOTTY;
Alexey Dobriyan9af27b22019-07-16 16:26:45 -0700401
Alexey Dobriyand919b332020-04-06 20:09:01 -0700402 if (pde_is_permanent(pde)) {
403 return pde_ioctl(pde, file, cmd, arg);
404 } else if (use_pde(pde)) {
405 rv = pde_ioctl(pde, file, cmd, arg);
Al Viro866ad9a72013-04-03 19:07:30 -0400406 unuse_pde(pde);
Alexey Dobriyan786d7e12007-07-15 23:39:00 -0700407 }
Alexey Dobriyan786d7e12007-07-15 23:39:00 -0700408 return rv;
409}
410
411#ifdef CONFIG_COMPAT
Alexey Dobriyand919b332020-04-06 20:09:01 -0700412static long pde_compat_ioctl(struct proc_dir_entry *pde, struct file *file, unsigned int cmd, unsigned long arg)
413{
414 typeof_member(struct proc_ops, proc_compat_ioctl) compat_ioctl;
415
416 compat_ioctl = pde->proc_ops->proc_compat_ioctl;
417 if (compat_ioctl)
418 return compat_ioctl(file, cmd, arg);
419 return -ENOTTY;
420}
421
Alexey Dobriyan786d7e12007-07-15 23:39:00 -0700422static long proc_reg_compat_ioctl(struct file *file, unsigned int cmd, unsigned long arg)
423{
Al Viro496ad9a2013-01-23 17:07:38 -0500424 struct proc_dir_entry *pde = PDE(file_inode(file));
Alexey Dobriyan786d7e12007-07-15 23:39:00 -0700425 long rv = -ENOTTY;
Alexey Dobriyand919b332020-04-06 20:09:01 -0700426 if (pde_is_permanent(pde)) {
427 return pde_compat_ioctl(pde, file, cmd, arg);
428 } else if (use_pde(pde)) {
429 rv = pde_compat_ioctl(pde, file, cmd, arg);
Al Viro866ad9a72013-04-03 19:07:30 -0400430 unuse_pde(pde);
Alexey Dobriyan786d7e12007-07-15 23:39:00 -0700431 }
Alexey Dobriyan786d7e12007-07-15 23:39:00 -0700432 return rv;
433}
434#endif
435
Alexey Dobriyand919b332020-04-06 20:09:01 -0700436static int pde_mmap(struct proc_dir_entry *pde, struct file *file, struct vm_area_struct *vma)
437{
438 typeof_member(struct proc_ops, proc_mmap) mmap;
439
440 mmap = pde->proc_ops->proc_mmap;
441 if (mmap)
442 return mmap(file, vma);
443 return -EIO;
444}
445
Alexey Dobriyan786d7e12007-07-15 23:39:00 -0700446static int proc_reg_mmap(struct file *file, struct vm_area_struct *vma)
447{
Al Viro496ad9a2013-01-23 17:07:38 -0500448 struct proc_dir_entry *pde = PDE(file_inode(file));
Alexey Dobriyan786d7e12007-07-15 23:39:00 -0700449 int rv = -EIO;
Alexey Dobriyan9af27b22019-07-16 16:26:45 -0700450
Alexey Dobriyand919b332020-04-06 20:09:01 -0700451 if (pde_is_permanent(pde)) {
452 return pde_mmap(pde, file, vma);
453 } else if (use_pde(pde)) {
454 rv = pde_mmap(pde, file, vma);
Al Viro866ad9a72013-04-03 19:07:30 -0400455 unuse_pde(pde);
Alexey Dobriyan786d7e12007-07-15 23:39:00 -0700456 }
Alexey Dobriyan786d7e12007-07-15 23:39:00 -0700457 return rv;
458}
459
HATAYAMA Daisuke5721cf82013-11-12 15:11:15 -0800460static unsigned long
Alexey Dobriyand919b332020-04-06 20:09:01 -0700461pde_get_unmapped_area(struct proc_dir_entry *pde, struct file *file, unsigned long orig_addr,
462 unsigned long len, unsigned long pgoff,
463 unsigned long flags)
464{
465 typeof_member(struct proc_ops, proc_get_unmapped_area) get_area;
466
467 get_area = pde->proc_ops->proc_get_unmapped_area;
468#ifdef CONFIG_MMU
469 if (!get_area)
470 get_area = current->mm->get_unmapped_area;
471#endif
472 if (get_area)
473 return get_area(file, orig_addr, len, pgoff, flags);
474 return orig_addr;
475}
476
477static unsigned long
HATAYAMA Daisuke5721cf82013-11-12 15:11:15 -0800478proc_reg_get_unmapped_area(struct file *file, unsigned long orig_addr,
479 unsigned long len, unsigned long pgoff,
480 unsigned long flags)
Alexey Dobriyanc4fe2442013-08-20 22:17:24 +0300481{
482 struct proc_dir_entry *pde = PDE(file_inode(file));
HATAYAMA Daisuke2cbe3b02013-10-16 13:47:04 -0700483 unsigned long rv = -EIO;
Jan Beulichae5758a2013-12-12 17:12:22 -0800484
Alexey Dobriyand919b332020-04-06 20:09:01 -0700485 if (pde_is_permanent(pde)) {
486 return pde_get_unmapped_area(pde, file, orig_addr, len, pgoff, flags);
487 } else if (use_pde(pde)) {
488 rv = pde_get_unmapped_area(pde, file, orig_addr, len, pgoff, flags);
Alexey Dobriyanc4fe2442013-08-20 22:17:24 +0300489 unuse_pde(pde);
490 }
491 return rv;
492}
493
Alexey Dobriyan786d7e12007-07-15 23:39:00 -0700494static int proc_reg_open(struct inode *inode, struct file *file)
495{
Alexey Gladkov6814ef22020-04-19 16:10:54 +0200496 struct proc_fs_info *fs_info = proc_sb_info(inode->i_sb);
Alexey Dobriyan786d7e12007-07-15 23:39:00 -0700497 struct proc_dir_entry *pde = PDE(inode);
498 int rv = 0;
Alexey Dobriyand56c0d42020-02-03 17:37:14 -0800499 typeof_member(struct proc_ops, proc_open) open;
500 typeof_member(struct proc_ops, proc_release) release;
Alexey Dobriyan881adb82008-07-25 01:48:29 -0700501 struct pde_opener *pdeo;
502
Alexey Dobriyand919b332020-04-06 20:09:01 -0700503 if (pde_is_permanent(pde)) {
504 open = pde->proc_ops->proc_open;
505 if (open)
506 rv = open(inode, file);
507 return rv;
508 }
509
Alexey Gladkov6814ef22020-04-19 16:10:54 +0200510 if (fs_info->pidonly == PROC_PIDONLY_ON)
511 return -ENOENT;
512
Alexey Dobriyan881adb82008-07-25 01:48:29 -0700513 /*
Alexey Dobriyan492b2da2016-12-12 16:45:22 -0800514 * Ensure that
515 * 1) PDE's ->release hook will be called no matter what
516 * either normally by close()/->release, or forcefully by
517 * rmmod/remove_proc_entry.
Alexey Dobriyan881adb82008-07-25 01:48:29 -0700518 *
Alexey Dobriyan492b2da2016-12-12 16:45:22 -0800519 * 2) rmmod isn't blocked by opening file in /proc and sitting on
520 * the descriptor (including "rmmod foo </proc/foo" scenario).
521 *
522 * Save every "struct file" with custom ->release hook.
Alexey Dobriyan881adb82008-07-25 01:48:29 -0700523 */
Alexey Dobriyane7a6e292018-04-10 16:31:01 -0700524 if (!use_pde(pde))
Daisuke Oginod2857e72011-07-26 16:08:37 -0700525 return -ENOENT;
Alexey Dobriyan786d7e12007-07-15 23:39:00 -0700526
Alexey Dobriyand56c0d42020-02-03 17:37:14 -0800527 release = pde->proc_ops->proc_release;
Alexey Dobriyane7a6e292018-04-10 16:31:01 -0700528 if (release) {
Alexey Dobriyan195b8cf2018-04-10 16:31:09 -0700529 pdeo = kmem_cache_alloc(pde_opener_cache, GFP_KERNEL);
Alexey Dobriyane7a6e292018-04-10 16:31:01 -0700530 if (!pdeo) {
531 rv = -ENOMEM;
532 goto out_unuse;
533 }
534 }
535
Alexey Dobriyand56c0d42020-02-03 17:37:14 -0800536 open = pde->proc_ops->proc_open;
Alexey Dobriyan786d7e12007-07-15 23:39:00 -0700537 if (open)
538 rv = open(inode, file);
539
Alexey Dobriyane7a6e292018-04-10 16:31:01 -0700540 if (release) {
541 if (rv == 0) {
542 /* To know what to release. */
543 pdeo->file = file;
544 pdeo->closing = false;
545 pdeo->c = NULL;
546 spin_lock(&pde->pde_unload_lock);
547 list_add(&pdeo->lh, &pde->pde_openers);
548 spin_unlock(&pde->pde_unload_lock);
549 } else
Alexey Dobriyan195b8cf2018-04-10 16:31:09 -0700550 kmem_cache_free(pde_opener_cache, pdeo);
Alexey Dobriyane7a6e292018-04-10 16:31:01 -0700551 }
Al Viro05c0ae22013-04-04 16:28:47 -0400552
Alexey Dobriyane7a6e292018-04-10 16:31:01 -0700553out_unuse:
Al Viro05c0ae22013-04-04 16:28:47 -0400554 unuse_pde(pde);
Alexey Dobriyan786d7e12007-07-15 23:39:00 -0700555 return rv;
556}
557
558static int proc_reg_release(struct inode *inode, struct file *file)
559{
560 struct proc_dir_entry *pde = PDE(inode);
Alexey Dobriyan881adb82008-07-25 01:48:29 -0700561 struct pde_opener *pdeo;
Alexey Dobriyand919b332020-04-06 20:09:01 -0700562
563 if (pde_is_permanent(pde)) {
564 typeof_member(struct proc_ops, proc_release) release;
565
566 release = pde->proc_ops->proc_release;
567 if (release) {
568 return release(inode, file);
569 }
570 return 0;
571 }
572
Alexey Dobriyan786d7e12007-07-15 23:39:00 -0700573 spin_lock(&pde->pde_unload_lock);
Al Viroca469f32013-04-03 19:57:00 -0400574 list_for_each_entry(pdeo, &pde->pde_openers, lh) {
575 if (pdeo->file == file) {
576 close_pdeo(pde, pdeo);
Alexey Dobriyan2f897422018-04-10 16:30:54 -0700577 return 0;
Al Viroca469f32013-04-03 19:57:00 -0400578 }
Alexey Dobriyan881adb82008-07-25 01:48:29 -0700579 }
Alexey Dobriyan786d7e12007-07-15 23:39:00 -0700580 spin_unlock(&pde->pde_unload_lock);
Al Viroca469f32013-04-03 19:57:00 -0400581 return 0;
Alexey Dobriyan786d7e12007-07-15 23:39:00 -0700582}
583
584static const struct file_operations proc_reg_file_ops = {
585 .llseek = proc_reg_llseek,
586 .read = proc_reg_read,
587 .write = proc_reg_write,
588 .poll = proc_reg_poll,
589 .unlocked_ioctl = proc_reg_unlocked_ioctl,
Alexey Dobriyan786d7e12007-07-15 23:39:00 -0700590 .mmap = proc_reg_mmap,
Alexey Dobriyanc4fe2442013-08-20 22:17:24 +0300591 .get_unmapped_area = proc_reg_get_unmapped_area,
Alexey Dobriyan786d7e12007-07-15 23:39:00 -0700592 .open = proc_reg_open,
593 .release = proc_reg_release,
594};
595
Christoph Hellwigfd5a13f2020-09-03 16:22:31 +0200596static const struct file_operations proc_iter_file_ops = {
597 .llseek = proc_reg_llseek,
598 .read_iter = proc_reg_read_iter,
599 .write = proc_reg_write,
Christoph Hellwigfe338502020-11-04 09:27:34 +0100600 .splice_read = generic_file_splice_read,
Christoph Hellwigfd5a13f2020-09-03 16:22:31 +0200601 .poll = proc_reg_poll,
602 .unlocked_ioctl = proc_reg_unlocked_ioctl,
603 .mmap = proc_reg_mmap,
604 .get_unmapped_area = proc_reg_get_unmapped_area,
605 .open = proc_reg_open,
606 .release = proc_reg_release,
607};
608
David Miller778f3dd2007-07-27 22:58:37 -0700609#ifdef CONFIG_COMPAT
Christoph Hellwig906146f2020-09-03 16:22:30 +0200610static const struct file_operations proc_reg_file_ops_compat = {
David Miller778f3dd2007-07-27 22:58:37 -0700611 .llseek = proc_reg_llseek,
612 .read = proc_reg_read,
613 .write = proc_reg_write,
614 .poll = proc_reg_poll,
615 .unlocked_ioctl = proc_reg_unlocked_ioctl,
Christoph Hellwig906146f2020-09-03 16:22:30 +0200616 .compat_ioctl = proc_reg_compat_ioctl,
David Miller778f3dd2007-07-27 22:58:37 -0700617 .mmap = proc_reg_mmap,
Alexey Dobriyanc4fe2442013-08-20 22:17:24 +0300618 .get_unmapped_area = proc_reg_get_unmapped_area,
David Miller778f3dd2007-07-27 22:58:37 -0700619 .open = proc_reg_open,
620 .release = proc_reg_release,
621};
Christoph Hellwigfd5a13f2020-09-03 16:22:31 +0200622
623static const struct file_operations proc_iter_file_ops_compat = {
624 .llseek = proc_reg_llseek,
625 .read_iter = proc_reg_read_iter,
Christoph Hellwigfe338502020-11-04 09:27:34 +0100626 .splice_read = generic_file_splice_read,
Christoph Hellwigfd5a13f2020-09-03 16:22:31 +0200627 .write = proc_reg_write,
628 .poll = proc_reg_poll,
629 .unlocked_ioctl = proc_reg_unlocked_ioctl,
630 .compat_ioctl = proc_reg_compat_ioctl,
631 .mmap = proc_reg_mmap,
632 .get_unmapped_area = proc_reg_get_unmapped_area,
633 .open = proc_reg_open,
634 .release = proc_reg_release,
635};
David Miller778f3dd2007-07-27 22:58:37 -0700636#endif
637
Al Virofceef392015-12-29 15:58:39 -0500638static void proc_put_link(void *p)
639{
640 unuse_pde(p);
641}
642
Al Viro6b255392015-11-17 10:20:54 -0500643static const char *proc_get_link(struct dentry *dentry,
Al Virofceef392015-12-29 15:58:39 -0500644 struct inode *inode,
645 struct delayed_call *done)
Al Viro7e0e9532015-02-21 22:16:11 -0500646{
Al Viro6b255392015-11-17 10:20:54 -0500647 struct proc_dir_entry *pde = PDE(inode);
Alexey Dobriyan15b158b2018-02-06 15:37:28 -0800648 if (!use_pde(pde))
Al Viro7e0e9532015-02-21 22:16:11 -0500649 return ERR_PTR(-EINVAL);
Al Virofceef392015-12-29 15:58:39 -0500650 set_delayed_call(done, proc_put_link, pde);
Al Viro680baac2015-05-02 13:32:22 -0400651 return pde->data;
Al Viro7e0e9532015-02-21 22:16:11 -0500652}
653
Al Viro7e0e9532015-02-21 22:16:11 -0500654const struct inode_operations proc_link_inode_operations = {
Al Viro6b255392015-11-17 10:20:54 -0500655 .get_link = proc_get_link,
Al Viro7e0e9532015-02-21 22:16:11 -0500656};
657
Alexey Dobriyan6d1b6e42011-01-12 17:00:33 -0800658struct inode *proc_get_inode(struct super_block *sb, struct proc_dir_entry *de)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700659{
Eric W. Biedermanef1548a2020-06-12 09:42:03 -0500660 struct inode *inode = new_inode(sb);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700661
Christoph Hellwigf6ef7b72020-09-03 16:22:29 +0200662 if (!inode) {
663 pde_put(de);
664 return NULL;
665 }
Alexey Dobriyan5e971dc2008-04-29 01:01:41 -0700666
Christoph Hellwigf6ef7b72020-09-03 16:22:29 +0200667 inode->i_ino = de->low_ino;
668 inode->i_mtime = inode->i_atime = inode->i_ctime = current_time(inode);
669 PROC_I(inode)->pde = de;
670 if (is_empty_pde(de)) {
671 make_empty_dir_inode(inode);
672 return inode;
673 }
Alexey Dobriyand56c0d42020-02-03 17:37:14 -0800674
Christoph Hellwigf6ef7b72020-09-03 16:22:29 +0200675 if (de->mode) {
676 inode->i_mode = de->mode;
677 inode->i_uid = de->uid;
678 inode->i_gid = de->gid;
679 }
680 if (de->size)
681 inode->i_size = de->size;
682 if (de->nlink)
683 set_nlink(inode, de->nlink);
684
685 if (S_ISREG(inode->i_mode)) {
686 inode->i_op = de->proc_iops;
Christoph Hellwigfd5a13f2020-09-03 16:22:31 +0200687 if (de->proc_ops->proc_read_iter)
688 inode->i_fop = &proc_iter_file_ops;
689 else
690 inode->i_fop = &proc_reg_file_ops;
David Howellsa1d4aeb2008-02-07 00:15:45 -0800691#ifdef CONFIG_COMPAT
Christoph Hellwigfd5a13f2020-09-03 16:22:31 +0200692 if (de->proc_ops->proc_compat_ioctl) {
693 if (de->proc_ops->proc_read_iter)
694 inode->i_fop = &proc_iter_file_ops_compat;
695 else
696 inode->i_fop = &proc_reg_file_ops_compat;
697 }
Alexey Dobriyand56c0d42020-02-03 17:37:14 -0800698#endif
Christoph Hellwigf6ef7b72020-09-03 16:22:29 +0200699 } else if (S_ISDIR(inode->i_mode)) {
700 inode->i_op = de->proc_iops;
701 inode->i_fop = de->proc_dir_ops;
702 } else if (S_ISLNK(inode->i_mode)) {
703 inode->i_op = de->proc_iops;
704 inode->i_fop = NULL;
705 } else {
706 BUG();
707 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700708 return inode;
Al Virod3d009c2013-01-25 20:11:22 -0500709}