]> Git Repo - linux.git/blame - fs/proc/fd.c
modpost: inform compilers that fatal() never returns
[linux.git] / fs / proc / fd.c
CommitLineData
b2441318 1// SPDX-License-Identifier: GPL-2.0
3f07c014 2#include <linux/sched/signal.h>
faf60af1
CG
3#include <linux/errno.h>
4#include <linux/dcache.h>
5#include <linux/path.h>
6#include <linux/fdtable.h>
7#include <linux/namei.h>
8#include <linux/pid.h>
7bc3fa01 9#include <linux/ptrace.h>
f1f1f256 10#include <linux/bitmap.h>
faf60af1 11#include <linux/security.h>
ddd3e077
CG
12#include <linux/file.h>
13#include <linux/seq_file.h>
6c8c9031 14#include <linux/fs.h>
5970e15d 15#include <linux/filelock.h>
faf60af1
CG
16
17#include <linux/proc_fs.h>
18
49d063cb 19#include "../mount.h"
faf60af1
CG
20#include "internal.h"
21#include "fd.h"
22
ddd3e077 23static int seq_show(struct seq_file *m, void *v)
faf60af1 24{
faf60af1 25 struct files_struct *files = NULL;
ddd3e077
CG
26 int f_flags = 0, ret = -ENOENT;
27 struct file *file = NULL;
28 struct task_struct *task;
29
30 task = get_proc_task(m->private);
31 if (!task)
32 return -ENOENT;
33
775e0656
EB
34 task_lock(task);
35 files = task->files;
faf60af1 36 if (files) {
771187d6 37 unsigned int fd = proc_fd(m->private);
ddd3e077 38
faf60af1 39 spin_lock(&files->file_lock);
120ce2b0 40 file = files_lookup_fd_locked(files, fd);
faf60af1 41 if (file) {
ddd3e077 42 struct fdtable *fdt = files_fdtable(files);
faf60af1 43
c6f3d811 44 f_flags = file->f_flags;
faf60af1
CG
45 if (close_on_exec(fd, fdt))
46 f_flags |= O_CLOEXEC;
47
ddd3e077
CG
48 get_file(file);
49 ret = 0;
faf60af1
CG
50 }
51 spin_unlock(&files->file_lock);
faf60af1 52 }
775e0656
EB
53 task_unlock(task);
54 put_task_struct(task);
ddd3e077 55
6c8c9031
AV
56 if (ret)
57 return ret;
58
3845f256 59 seq_printf(m, "pos:\t%lli\nflags:\t0%o\nmnt_id:\t%i\nino:\t%lu\n",
6c8c9031 60 (long long)file->f_pos, f_flags,
3845f256
KS
61 real_mount(file->f_path.mnt)->mnt_id,
62 file_inode(file)->i_ino);
6c8c9031 63
775e0656 64 /* show_fd_locks() never deferences files so a stale value is safe */
6c8c9031
AV
65 show_fd_locks(m, file, files);
66 if (seq_has_overflowed(m))
67 goto out;
68
69 if (file->f_op->show_fdinfo)
70 file->f_op->show_fdinfo(m, file);
ddd3e077 71
6c8c9031
AV
72out:
73 fput(file);
74 return 0;
faf60af1
CG
75}
76
1927e498 77static int proc_fdinfo_access_allowed(struct inode *inode)
ddd3e077 78{
7bc3fa01
KS
79 bool allowed = false;
80 struct task_struct *task = get_proc_task(inode);
81
82 if (!task)
83 return -ESRCH;
84
85 allowed = ptrace_may_access(task, PTRACE_MODE_READ_FSCREDS);
86 put_task_struct(task);
87
88 if (!allowed)
89 return -EACCES;
90
1927e498
KS
91 return 0;
92}
93
94static int seq_fdinfo_open(struct inode *inode, struct file *file)
95{
96 int ret = proc_fdinfo_access_allowed(inode);
97
98 if (ret)
99 return ret;
100
ddd3e077
CG
101 return single_open(file, seq_show, inode);
102}
103
104static const struct file_operations proc_fdinfo_file_operations = {
105 .open = seq_fdinfo_open,
106 .read = seq_read,
107 .llseek = seq_lseek,
108 .release = single_release,
109};
110
1ae9bd8b
AV
111static bool tid_fd_mode(struct task_struct *task, unsigned fd, fmode_t *mode)
112{
1ae9bd8b
AV
113 struct file *file;
114
1ae9bd8b 115 rcu_read_lock();
0ede61d8 116 file = task_lookup_fdget_rcu(task, fd);
1ae9bd8b 117 rcu_read_unlock();
0ede61d8
CB
118 if (file) {
119 *mode = file->f_mode;
120 fput(file);
121 }
1ae9bd8b
AV
122 return !!file;
123}
124
98836386
AV
125static void tid_fd_update_inode(struct task_struct *task, struct inode *inode,
126 fmode_t f_mode)
127{
128 task_dump_owner(task, 0, &inode->i_uid, &inode->i_gid);
129
130 if (S_ISLNK(inode->i_mode)) {
131 unsigned i_mode = S_IFLNK;
132 if (f_mode & FMODE_READ)
133 i_mode |= S_IRUSR | S_IXUSR;
134 if (f_mode & FMODE_WRITE)
135 i_mode |= S_IWUSR | S_IXUSR;
136 inode->i_mode = i_mode;
137 }
138 security_task_to_inode(task, inode);
139}
140
faf60af1
CG
141static int tid_fd_revalidate(struct dentry *dentry, unsigned int flags)
142{
faf60af1 143 struct task_struct *task;
faf60af1 144 struct inode *inode;
771187d6 145 unsigned int fd;
faf60af1
CG
146
147 if (flags & LOOKUP_RCU)
148 return -ECHILD;
149
2b0143b5 150 inode = d_inode(dentry);
faf60af1
CG
151 task = get_proc_task(inode);
152 fd = proc_fd(inode);
153
154 if (task) {
98836386 155 fmode_t f_mode;
1ae9bd8b 156 if (tid_fd_mode(task, fd, &f_mode)) {
98836386 157 tid_fd_update_inode(task, inode, f_mode);
1ae9bd8b
AV
158 put_task_struct(task);
159 return 1;
faf60af1
CG
160 }
161 put_task_struct(task);
162 }
faf60af1
CG
163 return 0;
164}
165
166static const struct dentry_operations tid_fd_dentry_operations = {
167 .d_revalidate = tid_fd_revalidate,
168 .d_delete = pid_delete_dentry,
169};
170
171static int proc_fd_link(struct dentry *dentry, struct path *path)
172{
ddd3e077
CG
173 struct task_struct *task;
174 int ret = -ENOENT;
175
2b0143b5 176 task = get_proc_task(d_inode(dentry));
ddd3e077 177 if (task) {
771187d6 178 unsigned int fd = proc_fd(d_inode(dentry));
ddd3e077
CG
179 struct file *fd_file;
180
439be326 181 fd_file = fget_task(task, fd);
ddd3e077
CG
182 if (fd_file) {
183 *path = fd_file->f_path;
184 path_get(&fd_file->f_path);
185 ret = 0;
439be326 186 fput(fd_file);
ddd3e077 187 }
439be326 188 put_task_struct(task);
ddd3e077
CG
189 }
190
191 return ret;
faf60af1
CG
192}
193
98836386
AV
194struct fd_data {
195 fmode_t mode;
196 unsigned fd;
197};
198
0168b9e3
AV
199static struct dentry *proc_fd_instantiate(struct dentry *dentry,
200 struct task_struct *task, const void *ptr)
faf60af1 201{
98836386 202 const struct fd_data *data = ptr;
faf60af1
CG
203 struct proc_inode *ei;
204 struct inode *inode;
205
0168b9e3 206 inode = proc_pid_make_inode(dentry->d_sb, task, S_IFLNK);
faf60af1 207 if (!inode)
0168b9e3 208 return ERR_PTR(-ENOENT);
faf60af1
CG
209
210 ei = PROC_I(inode);
98836386 211 ei->fd = data->fd;
faf60af1 212
faf60af1
CG
213 inode->i_op = &proc_pid_link_inode_operations;
214 inode->i_size = 64;
215
216 ei->op.proc_get_link = proc_fd_link;
98836386 217 tid_fd_update_inode(task, inode, data->mode);
faf60af1
CG
218
219 d_set_d_op(dentry, &tid_fd_dentry_operations);
0168b9e3 220 return d_splice_alias(inode, dentry);
faf60af1
CG
221}
222
223static struct dentry *proc_lookupfd_common(struct inode *dir,
224 struct dentry *dentry,
225 instantiate_t instantiate)
226{
227 struct task_struct *task = get_proc_task(dir);
98836386 228 struct fd_data data = {.fd = name_to_int(&dentry->d_name)};
0168b9e3 229 struct dentry *result = ERR_PTR(-ENOENT);
faf60af1
CG
230
231 if (!task)
232 goto out_no_task;
98836386 233 if (data.fd == ~0U)
faf60af1 234 goto out;
98836386 235 if (!tid_fd_mode(task, data.fd, &data.mode))
1ae9bd8b 236 goto out;
faf60af1 237
0168b9e3 238 result = instantiate(dentry, task, &data);
faf60af1
CG
239out:
240 put_task_struct(task);
241out_no_task:
0168b9e3 242 return result;
faf60af1
CG
243}
244
f0c3b509
AV
245static int proc_readfd_common(struct file *file, struct dir_context *ctx,
246 instantiate_t instantiate)
faf60af1 247{
f0c3b509 248 struct task_struct *p = get_proc_task(file_inode(file));
f0c3b509 249 unsigned int fd;
faf60af1 250
faf60af1 251 if (!p)
f0c3b509 252 return -ENOENT;
faf60af1 253
f0c3b509
AV
254 if (!dir_emit_dots(file, ctx))
255 goto out;
f0c3b509
AV
256
257 rcu_read_lock();
5b17b618 258 for (fd = ctx->pos - 2;; fd++) {
98836386
AV
259 struct file *f;
260 struct fd_data data;
e3912ac3 261 char name[10 + 1];
a4ef3895 262 unsigned int len;
f0c3b509 263
0ede61d8 264 f = task_lookup_next_fdget_rcu(p, &fd);
5b17b618 265 ctx->pos = fd + 2LL;
98836386 266 if (!f)
5b17b618 267 break;
98836386 268 data.mode = f->f_mode;
f0c3b509 269 rcu_read_unlock();
0ede61d8 270 fput(f);
98836386 271 data.fd = fd;
f0c3b509 272
771187d6 273 len = snprintf(name, sizeof(name), "%u", fd);
f0c3b509
AV
274 if (!proc_fill_cache(file, ctx,
275 name, len, instantiate, p,
98836386 276 &data))
5b17b618 277 goto out;
3cc4a84e 278 cond_resched();
f0c3b509 279 rcu_read_lock();
faf60af1 280 }
f0c3b509 281 rcu_read_unlock();
faf60af1
CG
282out:
283 put_task_struct(p);
f0c3b509 284 return 0;
faf60af1
CG
285}
286
f1f1f256
IB
287static int proc_readfd_count(struct inode *inode, loff_t *count)
288{
289 struct task_struct *p = get_proc_task(inode);
290 struct fdtable *fdt;
291
292 if (!p)
293 return -ENOENT;
294
295 task_lock(p);
296 if (p->files) {
297 rcu_read_lock();
298
299 fdt = files_fdtable(p->files);
300 *count = bitmap_weight(fdt->open_fds, fdt->max_fds);
301
302 rcu_read_unlock();
303 }
304 task_unlock(p);
305
306 put_task_struct(p);
307
308 return 0;
309}
310
f0c3b509 311static int proc_readfd(struct file *file, struct dir_context *ctx)
faf60af1 312{
f0c3b509 313 return proc_readfd_common(file, ctx, proc_fd_instantiate);
faf60af1
CG
314}
315
316const struct file_operations proc_fd_operations = {
317 .read = generic_read_dir,
f50752ea
AV
318 .iterate_shared = proc_readfd,
319 .llseek = generic_file_llseek,
faf60af1
CG
320};
321
322static struct dentry *proc_lookupfd(struct inode *dir, struct dentry *dentry,
323 unsigned int flags)
324{
325 return proc_lookupfd_common(dir, dentry, proc_fd_instantiate);
326}
327
328/*
329 * /proc/pid/fd needs a special permission handler so that a process can still
330 * access /proc/self/fd after it has executed a setuid().
331 */
4609e1f1 332int proc_fd_permission(struct mnt_idmap *idmap,
549c7297 333 struct inode *inode, int mask)
faf60af1 334{
54708d28
ON
335 struct task_struct *p;
336 int rv;
337
4609e1f1 338 rv = generic_permission(&nop_mnt_idmap, inode, mask);
faf60af1 339 if (rv == 0)
54708d28
ON
340 return rv;
341
342 rcu_read_lock();
343 p = pid_task(proc_pid(inode), PIDTYPE_PID);
344 if (p && same_thread_group(p, current))
faf60af1 345 rv = 0;
54708d28
ON
346 rcu_read_unlock();
347
faf60af1
CG
348 return rv;
349}
350
b74d24f7 351static int proc_fd_getattr(struct mnt_idmap *idmap,
f1f1f256
IB
352 const struct path *path, struct kstat *stat,
353 u32 request_mask, unsigned int query_flags)
354{
355 struct inode *inode = d_inode(path->dentry);
356 int rv = 0;
357
0d72b928 358 generic_fillattr(&nop_mnt_idmap, request_mask, inode, stat);
f1f1f256
IB
359
360 /* If it's a directory, put the number of open fds there */
361 if (S_ISDIR(inode->i_mode)) {
362 rv = proc_readfd_count(inode, &stat->size);
363 if (rv < 0)
364 return rv;
365 }
366
367 return rv;
368}
369
faf60af1
CG
370const struct inode_operations proc_fd_inode_operations = {
371 .lookup = proc_lookupfd,
372 .permission = proc_fd_permission,
f1f1f256 373 .getattr = proc_fd_getattr,
faf60af1
CG
374 .setattr = proc_setattr,
375};
376
0168b9e3
AV
377static struct dentry *proc_fdinfo_instantiate(struct dentry *dentry,
378 struct task_struct *task, const void *ptr)
faf60af1 379{
98836386 380 const struct fd_data *data = ptr;
faf60af1
CG
381 struct proc_inode *ei;
382 struct inode *inode;
383
7bc3fa01 384 inode = proc_pid_make_inode(dentry->d_sb, task, S_IFREG | S_IRUGO);
faf60af1 385 if (!inode)
0168b9e3 386 return ERR_PTR(-ENOENT);
faf60af1
CG
387
388 ei = PROC_I(inode);
98836386 389 ei->fd = data->fd;
faf60af1 390
faf60af1 391 inode->i_fop = &proc_fdinfo_file_operations;
98836386 392 tid_fd_update_inode(task, inode, 0);
faf60af1
CG
393
394 d_set_d_op(dentry, &tid_fd_dentry_operations);
0168b9e3 395 return d_splice_alias(inode, dentry);
faf60af1
CG
396}
397
398static struct dentry *
399proc_lookupfdinfo(struct inode *dir, struct dentry *dentry, unsigned int flags)
400{
401 return proc_lookupfd_common(dir, dentry, proc_fdinfo_instantiate);
402}
403
f0c3b509 404static int proc_readfdinfo(struct file *file, struct dir_context *ctx)
faf60af1 405{
f0c3b509 406 return proc_readfd_common(file, ctx,
faf60af1
CG
407 proc_fdinfo_instantiate);
408}
409
1927e498
KS
410static int proc_open_fdinfo(struct inode *inode, struct file *file)
411{
412 int ret = proc_fdinfo_access_allowed(inode);
413
414 if (ret)
415 return ret;
416
417 return 0;
418}
419
faf60af1
CG
420const struct inode_operations proc_fdinfo_inode_operations = {
421 .lookup = proc_lookupfdinfo,
422 .setattr = proc_setattr,
423};
424
425const struct file_operations proc_fdinfo_operations = {
1927e498 426 .open = proc_open_fdinfo,
faf60af1 427 .read = generic_read_dir,
f50752ea
AV
428 .iterate_shared = proc_readfdinfo,
429 .llseek = generic_file_llseek,
faf60af1 430};
This page took 0.641479 seconds and 4 git commands to generate.