]> git.proxmox.com Git - mirror_ubuntu-bionic-kernel.git/blame - fs/proc/generic.c
pidns: Stop pid allocation when init dies
[mirror_ubuntu-bionic-kernel.git] / fs / proc / generic.c
CommitLineData
1da177e4
LT
1/*
2 * proc/fs/generic.c --- generic routines for the proc-fs
3 *
4 * This file contains generic proc-fs routines for handling
5 * directories and files.
6 *
7 * Copyright (C) 1991, 1992 Linus Torvalds.
8 * Copyright (C) 1997 Theodore Ts'o
9 */
10
11#include <linux/errno.h>
12#include <linux/time.h>
13#include <linux/proc_fs.h>
14#include <linux/stat.h>
1025774c 15#include <linux/mm.h>
1da177e4 16#include <linux/module.h>
5a0e3ad6 17#include <linux/slab.h>
1da177e4 18#include <linux/mount.h>
1da177e4
LT
19#include <linux/init.h>
20#include <linux/idr.h>
21#include <linux/namei.h>
22#include <linux/bitops.h>
64a07bd8 23#include <linux/spinlock.h>
786d7e16 24#include <linux/completion.h>
1da177e4
LT
25#include <asm/uaccess.h>
26
fee781e6
AB
27#include "internal.h"
28
64a07bd8
SR
29DEFINE_SPINLOCK(proc_subdir_lock);
30
312ec7e5 31static int proc_match(unsigned int len, const char *name, struct proc_dir_entry *de)
1da177e4
LT
32{
33 if (de->namelen != len)
34 return 0;
35 return !memcmp(name, de->name, len);
36}
37
1da177e4
LT
38/* buffer size is one page but our output routines use some slack for overruns */
39#define PROC_BLOCK_SIZE (PAGE_SIZE - 1024)
40
41static ssize_t
3dec7f59 42__proc_file_read(struct file *file, char __user *buf, size_t nbytes,
1da177e4
LT
43 loff_t *ppos)
44{
2fddfeef 45 struct inode * inode = file->f_path.dentry->d_inode;
1da177e4
LT
46 char *page;
47 ssize_t retval=0;
48 int eof=0;
49 ssize_t n, count;
50 char *start;
51 struct proc_dir_entry * dp;
8b90db0d
LT
52 unsigned long long pos;
53
54 /*
55 * Gaah, please just use "seq_file" instead. The legacy /proc
56 * interfaces cut loff_t down to off_t for reads, and ignore
57 * the offset entirely for writes..
58 */
59 pos = *ppos;
60 if (pos > MAX_NON_LFS)
61 return 0;
62 if (nbytes > MAX_NON_LFS - pos)
63 nbytes = MAX_NON_LFS - pos;
1da177e4
LT
64
65 dp = PDE(inode);
e12ba74d 66 if (!(page = (char*) __get_free_page(GFP_TEMPORARY)))
1da177e4
LT
67 return -ENOMEM;
68
69 while ((nbytes > 0) && !eof) {
70 count = min_t(size_t, PROC_BLOCK_SIZE, nbytes);
71
72 start = NULL;
8731f14d 73 if (dp->read_proc) {
1da177e4
LT
74 /*
75 * How to be a proc read function
76 * ------------------------------
77 * Prototype:
78 * int f(char *buffer, char **start, off_t offset,
79 * int count, int *peof, void *dat)
80 *
81 * Assume that the buffer is "count" bytes in size.
82 *
83 * If you know you have supplied all the data you
84 * have, set *peof.
85 *
86 * You have three ways to return data:
87 * 0) Leave *start = NULL. (This is the default.)
88 * Put the data of the requested offset at that
89 * offset within the buffer. Return the number (n)
90 * of bytes there are from the beginning of the
91 * buffer up to the last byte of data. If the
92 * number of supplied bytes (= n - offset) is
93 * greater than zero and you didn't signal eof
94 * and the reader is prepared to take more data
95 * you will be called again with the requested
96 * offset advanced by the number of bytes
97 * absorbed. This interface is useful for files
98 * no larger than the buffer.
99 * 1) Set *start = an unsigned long value less than
100 * the buffer address but greater than zero.
101 * Put the data of the requested offset at the
102 * beginning of the buffer. Return the number of
103 * bytes of data placed there. If this number is
104 * greater than zero and you didn't signal eof
105 * and the reader is prepared to take more data
106 * you will be called again with the requested
107 * offset advanced by *start. This interface is
108 * useful when you have a large file consisting
109 * of a series of blocks which you want to count
110 * and return as wholes.
111 * (Hack by Paul.Russell@rustcorp.com.au)
112 * 2) Set *start = an address within the buffer.
113 * Put the data of the requested offset at *start.
114 * Return the number of bytes of data placed there.
115 * If this number is greater than zero and you
116 * didn't signal eof and the reader is prepared to
117 * take more data you will be called again with the
118 * requested offset advanced by the number of bytes
119 * absorbed.
120 */
121 n = dp->read_proc(page, &start, *ppos,
122 count, &eof, dp->data);
123 } else
124 break;
125
126 if (n == 0) /* end of file */
127 break;
128 if (n < 0) { /* error */
129 if (retval == 0)
130 retval = n;
131 break;
132 }
133
134 if (start == NULL) {
135 if (n > PAGE_SIZE) {
136 printk(KERN_ERR
137 "proc_file_read: Apparent buffer overflow!\n");
138 n = PAGE_SIZE;
139 }
140 n -= *ppos;
141 if (n <= 0)
142 break;
143 if (n > count)
144 n = count;
145 start = page + *ppos;
146 } else if (start < page) {
147 if (n > PAGE_SIZE) {
148 printk(KERN_ERR
149 "proc_file_read: Apparent buffer overflow!\n");
150 n = PAGE_SIZE;
151 }
152 if (n > count) {
153 /*
154 * Don't reduce n because doing so might
155 * cut off part of a data block.
156 */
157 printk(KERN_WARNING
158 "proc_file_read: Read count exceeded\n");
159 }
160 } else /* start >= page */ {
161 unsigned long startoff = (unsigned long)(start - page);
162 if (n > (PAGE_SIZE - startoff)) {
163 printk(KERN_ERR
164 "proc_file_read: Apparent buffer overflow!\n");
165 n = PAGE_SIZE - startoff;
166 }
167 if (n > count)
168 n = count;
169 }
170
171 n -= copy_to_user(buf, start < page ? page : start, n);
172 if (n == 0) {
173 if (retval == 0)
174 retval = -EFAULT;
175 break;
176 }
177
178 *ppos += start < page ? (unsigned long)start : n;
179 nbytes -= n;
180 buf += n;
181 retval += n;
182 }
183 free_page((unsigned long) page);
184 return retval;
185}
186
3dec7f59
AD
187static ssize_t
188proc_file_read(struct file *file, char __user *buf, size_t nbytes,
189 loff_t *ppos)
190{
191 struct proc_dir_entry *pde = PDE(file->f_path.dentry->d_inode);
192 ssize_t rv = -EIO;
193
194 spin_lock(&pde->pde_unload_lock);
195 if (!pde->proc_fops) {
196 spin_unlock(&pde->pde_unload_lock);
197 return rv;
198 }
199 pde->pde_users++;
200 spin_unlock(&pde->pde_unload_lock);
201
202 rv = __proc_file_read(file, buf, nbytes, ppos);
203
204 pde_users_dec(pde);
205 return rv;
206}
207
1da177e4
LT
208static ssize_t
209proc_file_write(struct file *file, const char __user *buffer,
210 size_t count, loff_t *ppos)
211{
3dec7f59
AD
212 struct proc_dir_entry *pde = PDE(file->f_path.dentry->d_inode);
213 ssize_t rv = -EIO;
214
215 if (pde->write_proc) {
216 spin_lock(&pde->pde_unload_lock);
217 if (!pde->proc_fops) {
218 spin_unlock(&pde->pde_unload_lock);
219 return rv;
220 }
221 pde->pde_users++;
222 spin_unlock(&pde->pde_unload_lock);
1da177e4 223
3dec7f59
AD
224 /* FIXME: does this routine need ppos? probably... */
225 rv = pde->write_proc(file, buffer, count, pde->data);
226 pde_users_dec(pde);
227 }
228 return rv;
1da177e4
LT
229}
230
231
232static loff_t
233proc_file_lseek(struct file *file, loff_t offset, int orig)
234{
8b90db0d
LT
235 loff_t retval = -EINVAL;
236 switch (orig) {
237 case 1:
238 offset += file->f_pos;
239 /* fallthrough */
240 case 0:
241 if (offset < 0 || offset > MAX_NON_LFS)
242 break;
243 file->f_pos = retval = offset;
244 }
245 return retval;
1da177e4
LT
246}
247
76df0c25
AD
248static const struct file_operations proc_file_operations = {
249 .llseek = proc_file_lseek,
250 .read = proc_file_read,
251 .write = proc_file_write,
252};
253
1da177e4
LT
254static int proc_notify_change(struct dentry *dentry, struct iattr *iattr)
255{
256 struct inode *inode = dentry->d_inode;
257 struct proc_dir_entry *de = PDE(inode);
258 int error;
259
260 error = inode_change_ok(inode, iattr);
261 if (error)
1025774c 262 return error;
1da177e4 263
1025774c
CH
264 setattr_copy(inode, iattr);
265 mark_inode_dirty(inode);
46f69557 266
1da177e4
LT
267 de->uid = inode->i_uid;
268 de->gid = inode->i_gid;
269 de->mode = inode->i_mode;
1025774c 270 return 0;
1da177e4
LT
271}
272
2b579bee
MS
273static int proc_getattr(struct vfsmount *mnt, struct dentry *dentry,
274 struct kstat *stat)
275{
276 struct inode *inode = dentry->d_inode;
277 struct proc_dir_entry *de = PROC_I(inode)->pde;
278 if (de && de->nlink)
bfe86848 279 set_nlink(inode, de->nlink);
2b579bee
MS
280
281 generic_fillattr(inode, stat);
282 return 0;
283}
284
c5ef1c42 285static const struct inode_operations proc_file_inode_operations = {
1da177e4
LT
286 .setattr = proc_notify_change,
287};
288
289/*
290 * This function parses a name such as "tty/driver/serial", and
291 * returns the struct proc_dir_entry for "/proc/tty/driver", and
292 * returns "serial" in residual.
293 */
e17a5765
AD
294static int __xlate_proc_name(const char *name, struct proc_dir_entry **ret,
295 const char **residual)
1da177e4
LT
296{
297 const char *cp = name, *next;
298 struct proc_dir_entry *de;
312ec7e5 299 unsigned int len;
1da177e4 300
7cee4e00
AD
301 de = *ret;
302 if (!de)
303 de = &proc_root;
304
1da177e4
LT
305 while (1) {
306 next = strchr(cp, '/');
307 if (!next)
308 break;
309
310 len = next - cp;
311 for (de = de->subdir; de ; de = de->next) {
312 if (proc_match(len, cp, de))
313 break;
314 }
12bac0d9
AD
315 if (!de) {
316 WARN(1, "name '%s'\n", name);
e17a5765 317 return -ENOENT;
12bac0d9 318 }
1da177e4
LT
319 cp += len + 1;
320 }
321 *residual = cp;
322 *ret = de;
e17a5765
AD
323 return 0;
324}
325
326static int xlate_proc_name(const char *name, struct proc_dir_entry **ret,
327 const char **residual)
328{
329 int rv;
330
331 spin_lock(&proc_subdir_lock);
332 rv = __xlate_proc_name(name, ret, residual);
64a07bd8 333 spin_unlock(&proc_subdir_lock);
e17a5765 334 return rv;
1da177e4
LT
335}
336
9a185409 337static DEFINE_IDA(proc_inum_ida);
1da177e4
LT
338static DEFINE_SPINLOCK(proc_inum_lock); /* protects the above */
339
67935df4 340#define PROC_DYNAMIC_FIRST 0xF0000000U
1da177e4
LT
341
342/*
343 * Return an inode number between PROC_DYNAMIC_FIRST and
344 * 0xffffffff, or zero on failure.
345 */
33d6dce6 346int proc_alloc_inum(unsigned int *inum)
1da177e4 347{
67935df4 348 unsigned int i;
1da177e4
LT
349 int error;
350
351retry:
33d6dce6
EB
352 if (!ida_pre_get(&proc_inum_ida, GFP_KERNEL))
353 return -ENOMEM;
1da177e4 354
ee297209 355 spin_lock_bh(&proc_inum_lock);
9a185409 356 error = ida_get_new(&proc_inum_ida, &i);
ee297209 357 spin_unlock_bh(&proc_inum_lock);
1da177e4
LT
358 if (error == -EAGAIN)
359 goto retry;
360 else if (error)
33d6dce6 361 return error;
1da177e4 362
67935df4 363 if (i > UINT_MAX - PROC_DYNAMIC_FIRST) {
ee297209 364 spin_lock_bh(&proc_inum_lock);
9a185409 365 ida_remove(&proc_inum_ida, i);
ee297209 366 spin_unlock_bh(&proc_inum_lock);
33d6dce6 367 return -ENOSPC;
67935df4 368 }
33d6dce6
EB
369 *inum = PROC_DYNAMIC_FIRST + i;
370 return 0;
1da177e4
LT
371}
372
33d6dce6 373void proc_free_inum(unsigned int inum)
1da177e4 374{
ee297209 375 spin_lock_bh(&proc_inum_lock);
9a185409 376 ida_remove(&proc_inum_ida, inum - PROC_DYNAMIC_FIRST);
ee297209 377 spin_unlock_bh(&proc_inum_lock);
1da177e4
LT
378}
379
008b150a 380static void *proc_follow_link(struct dentry *dentry, struct nameidata *nd)
1da177e4
LT
381{
382 nd_set_link(nd, PDE(dentry->d_inode)->data);
008b150a 383 return NULL;
1da177e4
LT
384}
385
c5ef1c42 386static const struct inode_operations proc_link_inode_operations = {
1da177e4
LT
387 .readlink = generic_readlink,
388 .follow_link = proc_follow_link,
389};
390
391/*
392 * As some entries in /proc are volatile, we want to
393 * get rid of unused dentries. This could be made
394 * smarter: we could keep a "volatile" flag in the
395 * inode to indicate which ones to keep.
396 */
fe15ce44 397static int proc_delete_dentry(const struct dentry * dentry)
1da177e4
LT
398{
399 return 1;
400}
401
d72f71eb 402static const struct dentry_operations proc_dentry_operations =
1da177e4
LT
403{
404 .d_delete = proc_delete_dentry,
405};
406
407/*
408 * Don't create negative dentries here, return -ENOENT by hand
409 * instead.
410 */
e9720acd
PE
411struct dentry *proc_lookup_de(struct proc_dir_entry *de, struct inode *dir,
412 struct dentry *dentry)
1da177e4
LT
413{
414 struct inode *inode = NULL;
1da177e4
LT
415 int error = -ENOENT;
416
64a07bd8 417 spin_lock(&proc_subdir_lock);
5e971dce
AD
418 for (de = de->subdir; de ; de = de->next) {
419 if (de->namelen != dentry->d_name.len)
420 continue;
421 if (!memcmp(dentry->d_name.name, de->name, de->namelen)) {
135d5655 422 pde_get(de);
5e971dce 423 spin_unlock(&proc_subdir_lock);
62072750 424 error = -ENOMEM;
6d1b6e4e 425 inode = proc_get_inode(dir->i_sb, de);
5e971dce 426 goto out_unlock;
1da177e4
LT
427 }
428 }
64a07bd8 429 spin_unlock(&proc_subdir_lock);
4237e0d3 430out_unlock:
1da177e4
LT
431
432 if (inode) {
fb045adb 433 d_set_d_op(dentry, &proc_dentry_operations);
1da177e4
LT
434 d_add(dentry, inode);
435 return NULL;
436 }
5e971dce 437 if (de)
135d5655 438 pde_put(de);
1da177e4
LT
439 return ERR_PTR(error);
440}
441
e9720acd 442struct dentry *proc_lookup(struct inode *dir, struct dentry *dentry,
00cd8dd3 443 unsigned int flags)
e9720acd
PE
444{
445 return proc_lookup_de(PDE(dir), dir, dentry);
446}
447
1da177e4
LT
448/*
449 * This returns non-zero if at EOF, so that the /proc
450 * root directory can use this and check if it should
451 * continue with the <pid> entries..
452 *
453 * Note that the VFS-layer doesn't care about the return
454 * value of the readdir() call, as long as it's non-negative
455 * for success..
456 */
e9720acd
PE
457int proc_readdir_de(struct proc_dir_entry *de, struct file *filp, void *dirent,
458 filldir_t filldir)
1da177e4 459{
1da177e4
LT
460 unsigned int ino;
461 int i;
2fddfeef 462 struct inode *inode = filp->f_path.dentry->d_inode;
1da177e4
LT
463 int ret = 0;
464
1da177e4 465 ino = inode->i_ino;
1da177e4
LT
466 i = filp->f_pos;
467 switch (i) {
468 case 0:
469 if (filldir(dirent, ".", 1, i, ino, DT_DIR) < 0)
470 goto out;
471 i++;
472 filp->f_pos++;
473 /* fall through */
474 case 1:
475 if (filldir(dirent, "..", 2, i,
2fddfeef 476 parent_ino(filp->f_path.dentry),
1da177e4
LT
477 DT_DIR) < 0)
478 goto out;
479 i++;
480 filp->f_pos++;
481 /* fall through */
482 default:
64a07bd8 483 spin_lock(&proc_subdir_lock);
1da177e4
LT
484 de = de->subdir;
485 i -= 2;
486 for (;;) {
487 if (!de) {
488 ret = 1;
64a07bd8 489 spin_unlock(&proc_subdir_lock);
1da177e4
LT
490 goto out;
491 }
492 if (!i)
493 break;
494 de = de->next;
495 i--;
496 }
497
498 do {
59cd0cbc
DW
499 struct proc_dir_entry *next;
500
64a07bd8 501 /* filldir passes info to user space */
135d5655 502 pde_get(de);
64a07bd8 503 spin_unlock(&proc_subdir_lock);
1da177e4 504 if (filldir(dirent, de->name, de->namelen, filp->f_pos,
59cd0cbc 505 de->low_ino, de->mode >> 12) < 0) {
135d5655 506 pde_put(de);
1da177e4 507 goto out;
59cd0cbc 508 }
64a07bd8 509 spin_lock(&proc_subdir_lock);
1da177e4 510 filp->f_pos++;
59cd0cbc 511 next = de->next;
135d5655 512 pde_put(de);
59cd0cbc 513 de = next;
1da177e4 514 } while (de);
64a07bd8 515 spin_unlock(&proc_subdir_lock);
1da177e4
LT
516 }
517 ret = 1;
b4df2b92 518out:
1da177e4
LT
519 return ret;
520}
521
e9720acd
PE
522int proc_readdir(struct file *filp, void *dirent, filldir_t filldir)
523{
524 struct inode *inode = filp->f_path.dentry->d_inode;
525
526 return proc_readdir_de(PDE(inode), filp, dirent, filldir);
527}
528
1da177e4
LT
529/*
530 * These are the generic /proc directory operations. They
531 * use the in-memory "struct proc_dir_entry" tree to parse
532 * the /proc directory.
533 */
00977a59 534static const struct file_operations proc_dir_operations = {
b4df2b92 535 .llseek = generic_file_llseek,
1da177e4
LT
536 .read = generic_read_dir,
537 .readdir = proc_readdir,
538};
539
540/*
541 * proc directories can do almost nothing..
542 */
c5ef1c42 543static const struct inode_operations proc_dir_inode_operations = {
1da177e4 544 .lookup = proc_lookup,
2b579bee 545 .getattr = proc_getattr,
1da177e4
LT
546 .setattr = proc_notify_change,
547};
548
549static int proc_register(struct proc_dir_entry * dir, struct proc_dir_entry * dp)
550{
94413d88 551 struct proc_dir_entry *tmp;
33d6dce6 552 int ret;
1da177e4 553
33d6dce6
EB
554 ret = proc_alloc_inum(&dp->low_ino);
555 if (ret)
556 return ret;
64a07bd8 557
1da177e4
LT
558 if (S_ISDIR(dp->mode)) {
559 if (dp->proc_iops == NULL) {
560 dp->proc_fops = &proc_dir_operations;
561 dp->proc_iops = &proc_dir_inode_operations;
562 }
563 dir->nlink++;
564 } else if (S_ISLNK(dp->mode)) {
565 if (dp->proc_iops == NULL)
566 dp->proc_iops = &proc_link_inode_operations;
567 } else if (S_ISREG(dp->mode)) {
568 if (dp->proc_fops == NULL)
569 dp->proc_fops = &proc_file_operations;
570 if (dp->proc_iops == NULL)
571 dp->proc_iops = &proc_file_inode_operations;
572 }
99fc06df
CG
573
574 spin_lock(&proc_subdir_lock);
94413d88
ZR
575
576 for (tmp = dir->subdir; tmp; tmp = tmp->next)
577 if (strcmp(tmp->name, dp->name) == 0) {
6c2f91e0 578 WARN(1, KERN_WARNING "proc_dir_entry '%s/%s' already registered\n",
665020c3 579 dir->name, dp->name);
94413d88
ZR
580 break;
581 }
582
99fc06df
CG
583 dp->next = dir->subdir;
584 dp->parent = dir;
585 dir->subdir = dp;
586 spin_unlock(&proc_subdir_lock);
587
1da177e4
LT
588 return 0;
589}
590
2d3a4e36 591static struct proc_dir_entry *__proc_create(struct proc_dir_entry **parent,
1da177e4 592 const char *name,
d161a13f 593 umode_t mode,
1da177e4
LT
594 nlink_t nlink)
595{
596 struct proc_dir_entry *ent = NULL;
597 const char *fn = name;
312ec7e5 598 unsigned int len;
1da177e4
LT
599
600 /* make sure name is valid */
17baa2a2 601 if (!name || !strlen(name))
602 goto out;
1da177e4 603
7cee4e00 604 if (xlate_proc_name(name, parent, &fn) != 0)
1da177e4
LT
605 goto out;
606
607 /* At this point there must not be any '/' characters beyond *fn */
608 if (strchr(fn, '/'))
609 goto out;
610
611 len = strlen(fn);
612
17baa2a2 613 ent = kzalloc(sizeof(struct proc_dir_entry) + len + 1, GFP_KERNEL);
614 if (!ent)
615 goto out;
1da177e4 616
09570f91 617 memcpy(ent->name, fn, len + 1);
1da177e4
LT
618 ent->namelen = len;
619 ent->mode = mode;
620 ent->nlink = nlink;
5a622f2d 621 atomic_set(&ent->count, 1);
786d7e16 622 spin_lock_init(&ent->pde_unload_lock);
881adb85 623 INIT_LIST_HEAD(&ent->pde_openers);
17baa2a2 624out:
1da177e4
LT
625 return ent;
626}
627
628struct proc_dir_entry *proc_symlink(const char *name,
629 struct proc_dir_entry *parent, const char *dest)
630{
631 struct proc_dir_entry *ent;
632
2d3a4e36 633 ent = __proc_create(&parent, name,
1da177e4
LT
634 (S_IFLNK | S_IRUGO | S_IWUGO | S_IXUGO),1);
635
636 if (ent) {
637 ent->data = kmalloc((ent->size=strlen(dest))+1, GFP_KERNEL);
638 if (ent->data) {
639 strcpy((char*)ent->data,dest);
640 if (proc_register(parent, ent) < 0) {
641 kfree(ent->data);
642 kfree(ent);
643 ent = NULL;
644 }
645 } else {
646 kfree(ent);
647 ent = NULL;
648 }
649 }
650 return ent;
651}
587d4a17 652EXPORT_SYMBOL(proc_symlink);
1da177e4 653
d161a13f 654struct proc_dir_entry *proc_mkdir_mode(const char *name, umode_t mode,
1da177e4
LT
655 struct proc_dir_entry *parent)
656{
657 struct proc_dir_entry *ent;
658
2d3a4e36 659 ent = __proc_create(&parent, name, S_IFDIR | mode, 2);
1da177e4 660 if (ent) {
1da177e4
LT
661 if (proc_register(parent, ent) < 0) {
662 kfree(ent);
663 ent = NULL;
664 }
665 }
666 return ent;
667}
011159a0 668EXPORT_SYMBOL(proc_mkdir_mode);
1da177e4 669
78e92b99
DL
670struct proc_dir_entry *proc_net_mkdir(struct net *net, const char *name,
671 struct proc_dir_entry *parent)
672{
673 struct proc_dir_entry *ent;
674
675 ent = __proc_create(&parent, name, S_IFDIR | S_IRUGO | S_IXUGO, 2);
676 if (ent) {
677 ent->data = net;
678 if (proc_register(parent, ent) < 0) {
679 kfree(ent);
680 ent = NULL;
681 }
682 }
683 return ent;
684}
685EXPORT_SYMBOL_GPL(proc_net_mkdir);
686
1da177e4
LT
687struct proc_dir_entry *proc_mkdir(const char *name,
688 struct proc_dir_entry *parent)
689{
690 return proc_mkdir_mode(name, S_IRUGO | S_IXUGO, parent);
691}
587d4a17 692EXPORT_SYMBOL(proc_mkdir);
1da177e4 693
d161a13f 694struct proc_dir_entry *create_proc_entry(const char *name, umode_t mode,
1da177e4
LT
695 struct proc_dir_entry *parent)
696{
697 struct proc_dir_entry *ent;
698 nlink_t nlink;
699
700 if (S_ISDIR(mode)) {
701 if ((mode & S_IALLUGO) == 0)
702 mode |= S_IRUGO | S_IXUGO;
703 nlink = 2;
704 } else {
705 if ((mode & S_IFMT) == 0)
706 mode |= S_IFREG;
707 if ((mode & S_IALLUGO) == 0)
708 mode |= S_IRUGO;
709 nlink = 1;
710 }
711
2d3a4e36 712 ent = __proc_create(&parent, name, mode, nlink);
1da177e4 713 if (ent) {
1da177e4
LT
714 if (proc_register(parent, ent) < 0) {
715 kfree(ent);
716 ent = NULL;
717 }
718 }
719 return ent;
720}
587d4a17 721EXPORT_SYMBOL(create_proc_entry);
1da177e4 722
d161a13f 723struct proc_dir_entry *proc_create_data(const char *name, umode_t mode,
59b74351
DL
724 struct proc_dir_entry *parent,
725 const struct file_operations *proc_fops,
726 void *data)
2d3a4e36
AD
727{
728 struct proc_dir_entry *pde;
729 nlink_t nlink;
730
731 if (S_ISDIR(mode)) {
732 if ((mode & S_IALLUGO) == 0)
733 mode |= S_IRUGO | S_IXUGO;
734 nlink = 2;
735 } else {
736 if ((mode & S_IFMT) == 0)
737 mode |= S_IFREG;
738 if ((mode & S_IALLUGO) == 0)
739 mode |= S_IRUGO;
740 nlink = 1;
741 }
742
743 pde = __proc_create(&parent, name, mode, nlink);
744 if (!pde)
745 goto out;
746 pde->proc_fops = proc_fops;
59b74351 747 pde->data = data;
2d3a4e36
AD
748 if (proc_register(parent, pde) < 0)
749 goto out_free;
750 return pde;
751out_free:
752 kfree(pde);
753out:
754 return NULL;
755}
587d4a17 756EXPORT_SYMBOL(proc_create_data);
2d3a4e36 757
135d5655 758static void free_proc_entry(struct proc_dir_entry *de)
1da177e4 759{
33d6dce6 760 proc_free_inum(de->low_ino);
1da177e4 761
fd2cbe48 762 if (S_ISLNK(de->mode))
1da177e4
LT
763 kfree(de->data);
764 kfree(de);
765}
766
135d5655
AD
767void pde_put(struct proc_dir_entry *pde)
768{
769 if (atomic_dec_and_test(&pde->count))
770 free_proc_entry(pde);
771}
772
1da177e4
LT
773/*
774 * Remove a /proc entry and free it if it's not currently in use.
1da177e4
LT
775 */
776void remove_proc_entry(const char *name, struct proc_dir_entry *parent)
777{
778 struct proc_dir_entry **p;
f649d6d3 779 struct proc_dir_entry *de = NULL;
1da177e4 780 const char *fn = name;
312ec7e5 781 unsigned int len;
1da177e4 782
e17a5765
AD
783 spin_lock(&proc_subdir_lock);
784 if (__xlate_proc_name(name, &parent, &fn) != 0) {
785 spin_unlock(&proc_subdir_lock);
f649d6d3 786 return;
e17a5765 787 }
1da177e4 788 len = strlen(fn);
64a07bd8 789
1da177e4 790 for (p = &parent->subdir; *p; p=&(*p)->next ) {
f649d6d3
AD
791 if (proc_match(len, fn, *p)) {
792 de = *p;
793 *p = de->next;
794 de->next = NULL;
795 break;
796 }
797 }
798 spin_unlock(&proc_subdir_lock);
12bac0d9
AD
799 if (!de) {
800 WARN(1, "name '%s'\n", name);
f649d6d3 801 return;
12bac0d9 802 }
786d7e16 803
f649d6d3
AD
804 spin_lock(&de->pde_unload_lock);
805 /*
806 * Stop accepting new callers into module. If you're
807 * dynamically allocating ->proc_fops, save a pointer somewhere.
808 */
809 de->proc_fops = NULL;
810 /* Wait until all existing callers into module are done. */
811 if (de->pde_users > 0) {
812 DECLARE_COMPLETION_ONSTACK(c);
813
814 if (!de->pde_unload_completion)
815 de->pde_unload_completion = &c;
786d7e16 816
786d7e16
AD
817 spin_unlock(&de->pde_unload_lock);
818
f649d6d3
AD
819 wait_for_completion(de->pde_unload_completion);
820
3740a20c 821 spin_lock(&de->pde_unload_lock);
f649d6d3 822 }
f649d6d3 823
881adb85
AD
824 while (!list_empty(&de->pde_openers)) {
825 struct pde_opener *pdeo;
826
827 pdeo = list_first_entry(&de->pde_openers, struct pde_opener, lh);
828 list_del(&pdeo->lh);
829 spin_unlock(&de->pde_unload_lock);
830 pdeo->release(pdeo->inode, pdeo->file);
831 kfree(pdeo);
832 spin_lock(&de->pde_unload_lock);
833 }
834 spin_unlock(&de->pde_unload_lock);
835
f649d6d3
AD
836 if (S_ISDIR(de->mode))
837 parent->nlink--;
838 de->nlink = 0;
267e2a9c 839 WARN(de->subdir, KERN_WARNING "%s: removing non-empty directory "
f649d6d3
AD
840 "'%s/%s', leaking at least '%s'\n", __func__,
841 de->parent->name, de->name, de->subdir->name);
135d5655 842 pde_put(de);
1da177e4 843}
587d4a17 844EXPORT_SYMBOL(remove_proc_entry);