]> git.proxmox.com Git - mirror_ubuntu-artful-kernel.git/blame - fs/proc/inode.c
prctl: Add force disable speculation
[mirror_ubuntu-artful-kernel.git] / fs / proc / inode.c
CommitLineData
1da177e4
LT
1/*
2 * linux/fs/proc/inode.c
3 *
4 * Copyright (C) 1991, 1992 Linus Torvalds
5 */
6
7#include <linux/time.h>
8#include <linux/proc_fs.h>
9#include <linux/kernel.h>
97412950 10#include <linux/pid_namespace.h>
1da177e4
LT
11#include <linux/mm.h>
12#include <linux/string.h>
13#include <linux/stat.h>
786d7e16 14#include <linux/completion.h>
dd23aae4 15#include <linux/poll.h>
87ebdc00 16#include <linux/printk.h>
1da177e4
LT
17#include <linux/file.h>
18#include <linux/limits.h>
19#include <linux/init.h>
20#include <linux/module.h>
9043476f 21#include <linux/sysctl.h>
97412950 22#include <linux/seq_file.h>
5a0e3ad6 23#include <linux/slab.h>
97412950 24#include <linux/mount.h>
303eb7e2 25#include <linux/magic.h>
1da177e4 26
7c0f6ba6 27#include <linux/uaccess.h>
1da177e4 28
fee781e6 29#include "internal.h"
1da177e4 30
8267952b 31static void proc_evict_inode(struct inode *inode)
1da177e4
LT
32{
33 struct proc_dir_entry *de;
dfef6dcd 34 struct ctl_table_header *head;
1da177e4 35
91b0abe3 36 truncate_inode_pages_final(&inode->i_data);
dbd5768f 37 clear_inode(inode);
fef26658 38
99f89551 39 /* Stop tracking associated processes */
13b41b09 40 put_pid(PROC_I(inode)->pid);
1da177e4
LT
41
42 /* Let go of any associated proc directory entry */
6bee55f9 43 de = PDE(inode);
99b76233 44 if (de)
135d5655 45 pde_put(de);
d6cffbbe 46
dfef6dcd
AV
47 head = PROC_I(inode)->sysctl;
48 if (head) {
1c44dbc8 49 RCU_INIT_POINTER(PROC_I(inode)->sysctl, NULL);
d6cffbbe 50 proc_sys_evict_inode(inode, head);
dfef6dcd 51 }
1da177e4
LT
52}
53
e18b890b 54static struct kmem_cache * proc_inode_cachep;
1da177e4
LT
55
56static struct inode *proc_alloc_inode(struct super_block *sb)
57{
58 struct proc_inode *ei;
59 struct inode *inode;
60
f245e1c1 61 ei = kmem_cache_alloc(proc_inode_cachep, GFP_KERNEL);
1da177e4
LT
62 if (!ei)
63 return NULL;
13b41b09 64 ei->pid = NULL;
aed7a6c4 65 ei->fd = 0;
1da177e4
LT
66 ei->op.proc_get_link = NULL;
67 ei->pde = NULL;
9043476f
AV
68 ei->sysctl = NULL;
69 ei->sysctl_entry = NULL;
3d3d35b1 70 ei->ns_ops = NULL;
1da177e4 71 inode = &ei->vfs_inode;
1da177e4
LT
72 return inode;
73}
74
fa0d7e3d 75static void proc_i_callback(struct rcu_head *head)
1da177e4 76{
fa0d7e3d 77 struct inode *inode = container_of(head, struct inode, i_rcu);
1da177e4
LT
78 kmem_cache_free(proc_inode_cachep, PROC_I(inode));
79}
80
fa0d7e3d
NP
81static void proc_destroy_inode(struct inode *inode)
82{
83 call_rcu(&inode->i_rcu, proc_i_callback);
84}
85
51cc5068 86static void init_once(void *foo)
1da177e4
LT
87{
88 struct proc_inode *ei = (struct proc_inode *) foo;
89
a35afb83 90 inode_init_once(&ei->vfs_inode);
1da177e4 91}
20c2df83 92
5bcd7ff9 93void __init proc_init_inodecache(void)
1da177e4
LT
94{
95 proc_inode_cachep = kmem_cache_create("proc_inode_cache",
96 sizeof(struct proc_inode),
fffb60f9 97 0, (SLAB_RECLAIM_ACCOUNT|
5d097056
VD
98 SLAB_MEM_SPREAD|SLAB_ACCOUNT|
99 SLAB_PANIC),
20c2df83 100 init_once);
1da177e4
LT
101}
102
97412950
VK
103static int proc_show_options(struct seq_file *seq, struct dentry *root)
104{
0499680a
VK
105 struct super_block *sb = root->d_sb;
106 struct pid_namespace *pid = sb->s_fs_info;
107
dcb0f222
EB
108 if (!gid_eq(pid->pid_gid, GLOBAL_ROOT_GID))
109 seq_printf(seq, ",gid=%u", from_kgid_munged(&init_user_ns, pid->pid_gid));
796f571b 110 if (pid->hide_pid != HIDEPID_OFF)
0499680a
VK
111 seq_printf(seq, ",hidepid=%u", pid->hide_pid);
112
97412950
VK
113 return 0;
114}
115
ee9b6d61 116static const struct super_operations proc_sops = {
1da177e4
LT
117 .alloc_inode = proc_alloc_inode,
118 .destroy_inode = proc_destroy_inode,
1da177e4 119 .drop_inode = generic_delete_inode,
8267952b 120 .evict_inode = proc_evict_inode,
1da177e4 121 .statfs = simple_statfs,
97412950
VK
122 .remount_fs = proc_remount,
123 .show_options = proc_show_options,
1da177e4
LT
124};
125
866ad9a7
AV
126enum {BIAS = -1U<<31};
127
128static inline int use_pde(struct proc_dir_entry *pde)
129{
05c0ae21 130 return atomic_inc_unless_negative(&pde->in_use);
881adb85
AD
131}
132
866ad9a7 133static void unuse_pde(struct proc_dir_entry *pde)
881adb85 134{
05c0ae21
AV
135 if (atomic_dec_return(&pde->in_use) == BIAS)
136 complete(pde->pde_unload_completion);
786d7e16
AD
137}
138
ca469f35
AV
139/* pde is locked */
140static void close_pdeo(struct proc_dir_entry *pde, struct pde_opener *pdeo)
141{
492b2da6
AD
142 /*
143 * close() (proc_reg_release()) can't delete an entry and proceed:
144 * ->release hook needs to be available at the right moment.
145 *
146 * rmmod (remove_proc_entry() et al) can't delete an entry and proceed:
147 * "struct file" needs to be available at the right moment.
148 *
149 * Therefore, first process to enter this function does ->release() and
150 * signals its completion to the other process which does nothing.
151 */
05c0ae21 152 if (pdeo->closing) {
ca469f35 153 /* somebody else is doing that, just wait */
05c0ae21
AV
154 DECLARE_COMPLETION_ONSTACK(c);
155 pdeo->c = &c;
ca469f35 156 spin_unlock(&pde->pde_unload_lock);
05c0ae21 157 wait_for_completion(&c);
ca469f35 158 spin_lock(&pde->pde_unload_lock);
ca469f35
AV
159 } else {
160 struct file *file;
f5887c71 161 pdeo->closing = true;
ca469f35
AV
162 spin_unlock(&pde->pde_unload_lock);
163 file = pdeo->file;
164 pde->proc_fops->release(file_inode(file), file);
165 spin_lock(&pde->pde_unload_lock);
492b2da6 166 /* After ->release. */
06a0c417 167 list_del(&pdeo->lh);
05c0ae21
AV
168 if (pdeo->c)
169 complete(pdeo->c);
ca469f35 170 kfree(pdeo);
05c0ae21 171 }
ca469f35
AV
172}
173
866ad9a7 174void proc_entry_rundown(struct proc_dir_entry *de)
786d7e16 175{
05c0ae21 176 DECLARE_COMPLETION_ONSTACK(c);
866ad9a7 177 /* Wait until all existing callers into module are done. */
05c0ae21
AV
178 de->pde_unload_completion = &c;
179 if (atomic_add_return(BIAS, &de->in_use) != BIAS)
180 wait_for_completion(&c);
786d7e16 181
492b2da6
AD
182 /* ->pde_openers list can't grow from now on. */
183
05c0ae21 184 spin_lock(&de->pde_unload_lock);
866ad9a7
AV
185 while (!list_empty(&de->pde_openers)) {
186 struct pde_opener *pdeo;
866ad9a7 187 pdeo = list_first_entry(&de->pde_openers, struct pde_opener, lh);
ca469f35 188 close_pdeo(de, pdeo);
866ad9a7
AV
189 }
190 spin_unlock(&de->pde_unload_lock);
786d7e16
AD
191}
192
866ad9a7
AV
193static loff_t proc_reg_llseek(struct file *file, loff_t offset, int whence)
194{
195 struct proc_dir_entry *pde = PDE(file_inode(file));
196 loff_t rv = -EINVAL;
197 if (use_pde(pde)) {
198 loff_t (*llseek)(struct file *, loff_t, int);
199 llseek = pde->proc_fops->llseek;
200 if (!llseek)
201 llseek = default_llseek;
202 rv = llseek(file, offset, whence);
203 unuse_pde(pde);
204 }
786d7e16
AD
205 return rv;
206}
207
866ad9a7 208static ssize_t proc_reg_read(struct file *file, char __user *buf, size_t count, loff_t *ppos)
786d7e16 209{
866ad9a7 210 ssize_t (*read)(struct file *, char __user *, size_t, loff_t *);
496ad9aa 211 struct proc_dir_entry *pde = PDE(file_inode(file));
786d7e16 212 ssize_t rv = -EIO;
866ad9a7
AV
213 if (use_pde(pde)) {
214 read = pde->proc_fops->read;
215 if (read)
216 rv = read(file, buf, count, ppos);
217 unuse_pde(pde);
786d7e16 218 }
866ad9a7
AV
219 return rv;
220}
786d7e16 221
866ad9a7
AV
222static ssize_t proc_reg_write(struct file *file, const char __user *buf, size_t count, loff_t *ppos)
223{
224 ssize_t (*write)(struct file *, const char __user *, size_t, loff_t *);
225 struct proc_dir_entry *pde = PDE(file_inode(file));
226 ssize_t rv = -EIO;
227 if (use_pde(pde)) {
228 write = pde->proc_fops->write;
229 if (write)
230 rv = write(file, buf, count, ppos);
231 unuse_pde(pde);
232 }
786d7e16
AD
233 return rv;
234}
235
236static unsigned int proc_reg_poll(struct file *file, struct poll_table_struct *pts)
237{
496ad9aa 238 struct proc_dir_entry *pde = PDE(file_inode(file));
dd23aae4 239 unsigned int rv = DEFAULT_POLLMASK;
786d7e16 240 unsigned int (*poll)(struct file *, struct poll_table_struct *);
866ad9a7
AV
241 if (use_pde(pde)) {
242 poll = pde->proc_fops->poll;
243 if (poll)
244 rv = poll(file, pts);
245 unuse_pde(pde);
786d7e16 246 }
786d7e16
AD
247 return rv;
248}
249
250static long proc_reg_unlocked_ioctl(struct file *file, unsigned int cmd, unsigned long arg)
251{
496ad9aa 252 struct proc_dir_entry *pde = PDE(file_inode(file));
786d7e16 253 long rv = -ENOTTY;
b19dd42f 254 long (*ioctl)(struct file *, unsigned int, unsigned long);
866ad9a7
AV
255 if (use_pde(pde)) {
256 ioctl = pde->proc_fops->unlocked_ioctl;
257 if (ioctl)
258 rv = ioctl(file, cmd, arg);
259 unuse_pde(pde);
786d7e16 260 }
786d7e16
AD
261 return rv;
262}
263
264#ifdef CONFIG_COMPAT
265static long proc_reg_compat_ioctl(struct file *file, unsigned int cmd, unsigned long arg)
266{
496ad9aa 267 struct proc_dir_entry *pde = PDE(file_inode(file));
786d7e16
AD
268 long rv = -ENOTTY;
269 long (*compat_ioctl)(struct file *, unsigned int, unsigned long);
866ad9a7
AV
270 if (use_pde(pde)) {
271 compat_ioctl = pde->proc_fops->compat_ioctl;
272 if (compat_ioctl)
273 rv = compat_ioctl(file, cmd, arg);
274 unuse_pde(pde);
786d7e16 275 }
786d7e16
AD
276 return rv;
277}
278#endif
279
280static int proc_reg_mmap(struct file *file, struct vm_area_struct *vma)
281{
496ad9aa 282 struct proc_dir_entry *pde = PDE(file_inode(file));
786d7e16
AD
283 int rv = -EIO;
284 int (*mmap)(struct file *, struct vm_area_struct *);
866ad9a7
AV
285 if (use_pde(pde)) {
286 mmap = pde->proc_fops->mmap;
287 if (mmap)
288 rv = mmap(file, vma);
289 unuse_pde(pde);
786d7e16 290 }
786d7e16
AD
291 return rv;
292}
293
5721cf84
HD
294static unsigned long
295proc_reg_get_unmapped_area(struct file *file, unsigned long orig_addr,
296 unsigned long len, unsigned long pgoff,
297 unsigned long flags)
c4fe2448
AD
298{
299 struct proc_dir_entry *pde = PDE(file_inode(file));
2cbe3b0a 300 unsigned long rv = -EIO;
ae5758a1 301
c4fe2448 302 if (use_pde(pde)) {
ae5758a1
JB
303 typeof(proc_reg_get_unmapped_area) *get_area;
304
305 get_area = pde->proc_fops->get_unmapped_area;
fad1a86e 306#ifdef CONFIG_MMU
ae5758a1
JB
307 if (!get_area)
308 get_area = current->mm->get_unmapped_area;
fad1a86e 309#endif
ae5758a1 310
5721cf84
HD
311 if (get_area)
312 rv = get_area(file, orig_addr, len, pgoff, flags);
ae5758a1
JB
313 else
314 rv = orig_addr;
c4fe2448
AD
315 unuse_pde(pde);
316 }
317 return rv;
318}
319
786d7e16
AD
320static int proc_reg_open(struct inode *inode, struct file *file)
321{
322 struct proc_dir_entry *pde = PDE(inode);
323 int rv = 0;
324 int (*open)(struct inode *, struct file *);
881adb85
AD
325 int (*release)(struct inode *, struct file *);
326 struct pde_opener *pdeo;
327
328 /*
492b2da6
AD
329 * Ensure that
330 * 1) PDE's ->release hook will be called no matter what
331 * either normally by close()/->release, or forcefully by
332 * rmmod/remove_proc_entry.
333 *
334 * 2) rmmod isn't blocked by opening file in /proc and sitting on
335 * the descriptor (including "rmmod foo </proc/foo" scenario).
881adb85 336 *
492b2da6 337 * Save every "struct file" with custom ->release hook.
881adb85 338 */
39a10ac2 339 pdeo = kmalloc(sizeof(struct pde_opener), GFP_KERNEL);
881adb85
AD
340 if (!pdeo)
341 return -ENOMEM;
786d7e16 342
866ad9a7 343 if (!use_pde(pde)) {
881adb85 344 kfree(pdeo);
d2857e79 345 return -ENOENT;
786d7e16 346 }
786d7e16 347 open = pde->proc_fops->open;
881adb85 348 release = pde->proc_fops->release;
786d7e16
AD
349
350 if (open)
351 rv = open(inode, file);
352
881adb85
AD
353 if (rv == 0 && release) {
354 /* To know what to release. */
881adb85 355 pdeo->file = file;
39a10ac2
AD
356 pdeo->closing = false;
357 pdeo->c = NULL;
05c0ae21 358 spin_lock(&pde->pde_unload_lock);
881adb85 359 list_add(&pdeo->lh, &pde->pde_openers);
05c0ae21 360 spin_unlock(&pde->pde_unload_lock);
881adb85
AD
361 } else
362 kfree(pdeo);
05c0ae21
AV
363
364 unuse_pde(pde);
786d7e16
AD
365 return rv;
366}
367
368static int proc_reg_release(struct inode *inode, struct file *file)
369{
370 struct proc_dir_entry *pde = PDE(inode);
881adb85 371 struct pde_opener *pdeo;
786d7e16 372 spin_lock(&pde->pde_unload_lock);
ca469f35
AV
373 list_for_each_entry(pdeo, &pde->pde_openers, lh) {
374 if (pdeo->file == file) {
375 close_pdeo(pde, pdeo);
376 break;
377 }
881adb85 378 }
786d7e16 379 spin_unlock(&pde->pde_unload_lock);
ca469f35 380 return 0;
786d7e16
AD
381}
382
383static const struct file_operations proc_reg_file_ops = {
384 .llseek = proc_reg_llseek,
385 .read = proc_reg_read,
386 .write = proc_reg_write,
387 .poll = proc_reg_poll,
388 .unlocked_ioctl = proc_reg_unlocked_ioctl,
389#ifdef CONFIG_COMPAT
390 .compat_ioctl = proc_reg_compat_ioctl,
391#endif
392 .mmap = proc_reg_mmap,
c4fe2448 393 .get_unmapped_area = proc_reg_get_unmapped_area,
786d7e16
AD
394 .open = proc_reg_open,
395 .release = proc_reg_release,
396};
397
778f3dd5
DM
398#ifdef CONFIG_COMPAT
399static const struct file_operations proc_reg_file_ops_no_compat = {
400 .llseek = proc_reg_llseek,
401 .read = proc_reg_read,
402 .write = proc_reg_write,
403 .poll = proc_reg_poll,
404 .unlocked_ioctl = proc_reg_unlocked_ioctl,
405 .mmap = proc_reg_mmap,
c4fe2448 406 .get_unmapped_area = proc_reg_get_unmapped_area,
778f3dd5
DM
407 .open = proc_reg_open,
408 .release = proc_reg_release,
409};
410#endif
411
fceef393
AV
412static void proc_put_link(void *p)
413{
414 unuse_pde(p);
415}
416
6b255391 417static const char *proc_get_link(struct dentry *dentry,
fceef393
AV
418 struct inode *inode,
419 struct delayed_call *done)
7e0e953b 420{
6b255391 421 struct proc_dir_entry *pde = PDE(inode);
7e0e953b
AV
422 if (unlikely(!use_pde(pde)))
423 return ERR_PTR(-EINVAL);
fceef393 424 set_delayed_call(done, proc_put_link, pde);
680baacb 425 return pde->data;
7e0e953b
AV
426}
427
7e0e953b 428const struct inode_operations proc_link_inode_operations = {
6b255391 429 .get_link = proc_get_link,
7e0e953b
AV
430};
431
6d1b6e4e 432struct inode *proc_get_inode(struct super_block *sb, struct proc_dir_entry *de)
1da177e4 433{
51f0885e 434 struct inode *inode = new_inode_pseudo(sb);
1da177e4 435
51f0885e
LT
436 if (inode) {
437 inode->i_ino = de->low_ino;
078cd827 438 inode->i_mtime = inode->i_atime = inode->i_ctime = current_time(inode);
a1d4aebb 439 PROC_I(inode)->pde = de;
5e971dce 440
eb6d38d5
EB
441 if (is_empty_pde(de)) {
442 make_empty_dir_inode(inode);
443 return inode;
444 }
5e971dce
AD
445 if (de->mode) {
446 inode->i_mode = de->mode;
447 inode->i_uid = de->uid;
448 inode->i_gid = de->gid;
449 }
450 if (de->size)
451 inode->i_size = de->size;
452 if (de->nlink)
bfe86848 453 set_nlink(inode, de->nlink);
b6cdc731
AV
454 WARN_ON(!de->proc_iops);
455 inode->i_op = de->proc_iops;
5e971dce
AD
456 if (de->proc_fops) {
457 if (S_ISREG(inode->i_mode)) {
778f3dd5 458#ifdef CONFIG_COMPAT
5e971dce
AD
459 if (!de->proc_fops->compat_ioctl)
460 inode->i_fop =
461 &proc_reg_file_ops_no_compat;
462 else
778f3dd5 463#endif
5e971dce
AD
464 inode->i_fop = &proc_reg_file_ops;
465 } else {
466 inode->i_fop = de->proc_fops;
778f3dd5 467 }
786d7e16 468 }
99b76233 469 } else
135d5655 470 pde_put(de);
1da177e4 471 return inode;
d3d009cb 472}
1da177e4 473
e94591d0 474int proc_fill_super(struct super_block *s, void *data, int silent)
1da177e4 475{
e94591d0 476 struct pid_namespace *ns = get_pid_ns(s->s_fs_info);
87e0aab3 477 struct inode *root_inode;
0097875b 478 int ret;
87e0aab3 479
e94591d0
EB
480 if (!proc_parse_options(data, ns))
481 return -EINVAL;
482
a2982cc9
EB
483 /* User space would break if executables or devices appear on proc */
484 s->s_iflags |= SB_I_USERNS_VISIBLE | SB_I_NOEXEC | SB_I_NODEV;
92d03285 485 s->s_flags |= MS_NODIRATIME | MS_NOSUID | MS_NOEXEC;
1da177e4
LT
486 s->s_blocksize = 1024;
487 s->s_blocksize_bits = 10;
488 s->s_magic = PROC_SUPER_MAGIC;
489 s->s_op = &proc_sops;
490 s->s_time_gran = 1;
a867d734
LT
491
492 /*
493 * procfs isn't actually a stacking filesystem; however, there is
494 * too much magic going on inside it to permit stacking things on
495 * top of it
496 */
497 s->s_stack_depth = FILESYSTEM_MAX_STACK_DEPTH;
1da177e4 498
135d5655 499 pde_get(&proc_root);
87e0aab3
MP
500 root_inode = proc_get_inode(s, &proc_root);
501 if (!root_inode) {
87ebdc00 502 pr_err("proc_fill_super: get root inode failed\n");
87e0aab3
MP
503 return -ENOMEM;
504 }
1da177e4 505
87e0aab3
MP
506 s->s_root = d_make_root(root_inode);
507 if (!s->s_root) {
87ebdc00 508 pr_err("proc_fill_super: allocate dentry failed\n");
87e0aab3
MP
509 return -ENOMEM;
510 }
511
0097875b
EB
512 ret = proc_setup_self(s);
513 if (ret) {
514 return ret;
515 }
516 return proc_setup_thread_self(s);
1da177e4 517}