]> Git Repo - linux.git/blame - fs/proc/fd.c
filelock: Remove locks reliably when fcntl/close race is detected
[linux.git] / fs / proc / fd.c
CommitLineData
b2441318 1// SPDX-License-Identifier: GPL-2.0
3f07c014 2#include <linux/sched/signal.h>
faf60af1
CG
3#include <linux/errno.h>
4#include <linux/dcache.h>
5#include <linux/path.h>
6#include <linux/fdtable.h>
7#include <linux/namei.h>
8#include <linux/pid.h>
7bc3fa01 9#include <linux/ptrace.h>
f1f1f256 10#include <linux/bitmap.h>
faf60af1 11#include <linux/security.h>
ddd3e077
CG
12#include <linux/file.h>
13#include <linux/seq_file.h>
6c8c9031 14#include <linux/fs.h>
5970e15d 15#include <linux/filelock.h>
faf60af1
CG
16
17#include <linux/proc_fs.h>
18
49d063cb 19#include "../mount.h"
faf60af1
CG
20#include "internal.h"
21#include "fd.h"
22
ddd3e077 23static int seq_show(struct seq_file *m, void *v)
faf60af1 24{
faf60af1 25 struct files_struct *files = NULL;
ddd3e077
CG
26 int f_flags = 0, ret = -ENOENT;
27 struct file *file = NULL;
28 struct task_struct *task;
29
30 task = get_proc_task(m->private);
31 if (!task)
32 return -ENOENT;
33
775e0656
EB
34 task_lock(task);
35 files = task->files;
faf60af1 36 if (files) {
771187d6 37 unsigned int fd = proc_fd(m->private);
ddd3e077 38
faf60af1 39 spin_lock(&files->file_lock);
120ce2b0 40 file = files_lookup_fd_locked(files, fd);
faf60af1 41 if (file) {
c6f3d811 42 f_flags = file->f_flags;
f60d374d 43 if (close_on_exec(fd, files))
faf60af1
CG
44 f_flags |= O_CLOEXEC;
45
ddd3e077
CG
46 get_file(file);
47 ret = 0;
faf60af1
CG
48 }
49 spin_unlock(&files->file_lock);
faf60af1 50 }
775e0656
EB
51 task_unlock(task);
52 put_task_struct(task);
ddd3e077 53
6c8c9031
AV
54 if (ret)
55 return ret;
56
3845f256 57 seq_printf(m, "pos:\t%lli\nflags:\t0%o\nmnt_id:\t%i\nino:\t%lu\n",
6c8c9031 58 (long long)file->f_pos, f_flags,
3845f256
KS
59 real_mount(file->f_path.mnt)->mnt_id,
60 file_inode(file)->i_ino);
6c8c9031 61
775e0656 62 /* show_fd_locks() never deferences files so a stale value is safe */
6c8c9031
AV
63 show_fd_locks(m, file, files);
64 if (seq_has_overflowed(m))
65 goto out;
66
67 if (file->f_op->show_fdinfo)
68 file->f_op->show_fdinfo(m, file);
ddd3e077 69
6c8c9031
AV
70out:
71 fput(file);
72 return 0;
faf60af1
CG
73}
74
0a960ba4
THM
75static int seq_fdinfo_open(struct inode *inode, struct file *file)
76{
77 return single_open(file, seq_show, inode);
78}
79
80/**
81 * Shared /proc/pid/fdinfo and /proc/pid/fdinfo/fd permission helper to ensure
82 * that the current task has PTRACE_MODE_READ in addition to the normal
83 * POSIX-like checks.
84 */
85static int proc_fdinfo_permission(struct mnt_idmap *idmap, struct inode *inode,
86 int mask)
ddd3e077 87{
7bc3fa01
KS
88 bool allowed = false;
89 struct task_struct *task = get_proc_task(inode);
90
91 if (!task)
92 return -ESRCH;
93
94 allowed = ptrace_may_access(task, PTRACE_MODE_READ_FSCREDS);
95 put_task_struct(task);
96
97 if (!allowed)
98 return -EACCES;
99
0a960ba4 100 return generic_permission(idmap, inode, mask);
1927e498
KS
101}
102
0a960ba4
THM
103static const struct inode_operations proc_fdinfo_file_inode_operations = {
104 .permission = proc_fdinfo_permission,
105 .setattr = proc_setattr,
106};
ddd3e077
CG
107
108static const struct file_operations proc_fdinfo_file_operations = {
109 .open = seq_fdinfo_open,
110 .read = seq_read,
111 .llseek = seq_lseek,
112 .release = single_release,
113};
114
1ae9bd8b
AV
115static bool tid_fd_mode(struct task_struct *task, unsigned fd, fmode_t *mode)
116{
1ae9bd8b
AV
117 struct file *file;
118
1ae9bd8b 119 rcu_read_lock();
0ede61d8 120 file = task_lookup_fdget_rcu(task, fd);
1ae9bd8b 121 rcu_read_unlock();
0ede61d8
CB
122 if (file) {
123 *mode = file->f_mode;
124 fput(file);
125 }
1ae9bd8b
AV
126 return !!file;
127}
128
98836386
AV
129static void tid_fd_update_inode(struct task_struct *task, struct inode *inode,
130 fmode_t f_mode)
131{
132 task_dump_owner(task, 0, &inode->i_uid, &inode->i_gid);
133
134 if (S_ISLNK(inode->i_mode)) {
135 unsigned i_mode = S_IFLNK;
136 if (f_mode & FMODE_READ)
137 i_mode |= S_IRUSR | S_IXUSR;
138 if (f_mode & FMODE_WRITE)
139 i_mode |= S_IWUSR | S_IXUSR;
140 inode->i_mode = i_mode;
141 }
142 security_task_to_inode(task, inode);
143}
144
faf60af1
CG
145static int tid_fd_revalidate(struct dentry *dentry, unsigned int flags)
146{
faf60af1 147 struct task_struct *task;
faf60af1 148 struct inode *inode;
771187d6 149 unsigned int fd;
faf60af1
CG
150
151 if (flags & LOOKUP_RCU)
152 return -ECHILD;
153
2b0143b5 154 inode = d_inode(dentry);
faf60af1
CG
155 task = get_proc_task(inode);
156 fd = proc_fd(inode);
157
158 if (task) {
98836386 159 fmode_t f_mode;
1ae9bd8b 160 if (tid_fd_mode(task, fd, &f_mode)) {
98836386 161 tid_fd_update_inode(task, inode, f_mode);
1ae9bd8b
AV
162 put_task_struct(task);
163 return 1;
faf60af1
CG
164 }
165 put_task_struct(task);
166 }
faf60af1
CG
167 return 0;
168}
169
170static const struct dentry_operations tid_fd_dentry_operations = {
171 .d_revalidate = tid_fd_revalidate,
172 .d_delete = pid_delete_dentry,
173};
174
175static int proc_fd_link(struct dentry *dentry, struct path *path)
176{
ddd3e077
CG
177 struct task_struct *task;
178 int ret = -ENOENT;
179
2b0143b5 180 task = get_proc_task(d_inode(dentry));
ddd3e077 181 if (task) {
771187d6 182 unsigned int fd = proc_fd(d_inode(dentry));
ddd3e077
CG
183 struct file *fd_file;
184
439be326 185 fd_file = fget_task(task, fd);
ddd3e077
CG
186 if (fd_file) {
187 *path = fd_file->f_path;
188 path_get(&fd_file->f_path);
189 ret = 0;
439be326 190 fput(fd_file);
ddd3e077 191 }
439be326 192 put_task_struct(task);
ddd3e077
CG
193 }
194
195 return ret;
faf60af1
CG
196}
197
98836386
AV
198struct fd_data {
199 fmode_t mode;
200 unsigned fd;
201};
202
0168b9e3
AV
203static struct dentry *proc_fd_instantiate(struct dentry *dentry,
204 struct task_struct *task, const void *ptr)
faf60af1 205{
98836386 206 const struct fd_data *data = ptr;
faf60af1
CG
207 struct proc_inode *ei;
208 struct inode *inode;
209
0168b9e3 210 inode = proc_pid_make_inode(dentry->d_sb, task, S_IFLNK);
faf60af1 211 if (!inode)
0168b9e3 212 return ERR_PTR(-ENOENT);
faf60af1
CG
213
214 ei = PROC_I(inode);
98836386 215 ei->fd = data->fd;
faf60af1 216
faf60af1
CG
217 inode->i_op = &proc_pid_link_inode_operations;
218 inode->i_size = 64;
219
220 ei->op.proc_get_link = proc_fd_link;
98836386 221 tid_fd_update_inode(task, inode, data->mode);
faf60af1
CG
222
223 d_set_d_op(dentry, &tid_fd_dentry_operations);
0168b9e3 224 return d_splice_alias(inode, dentry);
faf60af1
CG
225}
226
227static struct dentry *proc_lookupfd_common(struct inode *dir,
228 struct dentry *dentry,
229 instantiate_t instantiate)
230{
231 struct task_struct *task = get_proc_task(dir);
98836386 232 struct fd_data data = {.fd = name_to_int(&dentry->d_name)};
0168b9e3 233 struct dentry *result = ERR_PTR(-ENOENT);
faf60af1
CG
234
235 if (!task)
236 goto out_no_task;
98836386 237 if (data.fd == ~0U)
faf60af1 238 goto out;
98836386 239 if (!tid_fd_mode(task, data.fd, &data.mode))
1ae9bd8b 240 goto out;
faf60af1 241
0168b9e3 242 result = instantiate(dentry, task, &data);
faf60af1
CG
243out:
244 put_task_struct(task);
245out_no_task:
0168b9e3 246 return result;
faf60af1
CG
247}
248
f0c3b509
AV
249static int proc_readfd_common(struct file *file, struct dir_context *ctx,
250 instantiate_t instantiate)
faf60af1 251{
f0c3b509 252 struct task_struct *p = get_proc_task(file_inode(file));
f0c3b509 253 unsigned int fd;
faf60af1 254
faf60af1 255 if (!p)
f0c3b509 256 return -ENOENT;
faf60af1 257
f0c3b509
AV
258 if (!dir_emit_dots(file, ctx))
259 goto out;
f0c3b509
AV
260
261 rcu_read_lock();
5b17b618 262 for (fd = ctx->pos - 2;; fd++) {
98836386
AV
263 struct file *f;
264 struct fd_data data;
e3912ac3 265 char name[10 + 1];
a4ef3895 266 unsigned int len;
f0c3b509 267
0ede61d8 268 f = task_lookup_next_fdget_rcu(p, &fd);
5b17b618 269 ctx->pos = fd + 2LL;
98836386 270 if (!f)
5b17b618 271 break;
98836386 272 data.mode = f->f_mode;
f0c3b509 273 rcu_read_unlock();
0ede61d8 274 fput(f);
98836386 275 data.fd = fd;
f0c3b509 276
771187d6 277 len = snprintf(name, sizeof(name), "%u", fd);
f0c3b509
AV
278 if (!proc_fill_cache(file, ctx,
279 name, len, instantiate, p,
98836386 280 &data))
5b17b618 281 goto out;
3cc4a84e 282 cond_resched();
f0c3b509 283 rcu_read_lock();
faf60af1 284 }
f0c3b509 285 rcu_read_unlock();
faf60af1
CG
286out:
287 put_task_struct(p);
f0c3b509 288 return 0;
faf60af1
CG
289}
290
f1f1f256
IB
291static int proc_readfd_count(struct inode *inode, loff_t *count)
292{
293 struct task_struct *p = get_proc_task(inode);
294 struct fdtable *fdt;
295
296 if (!p)
297 return -ENOENT;
298
299 task_lock(p);
300 if (p->files) {
301 rcu_read_lock();
302
303 fdt = files_fdtable(p->files);
304 *count = bitmap_weight(fdt->open_fds, fdt->max_fds);
305
306 rcu_read_unlock();
307 }
308 task_unlock(p);
309
310 put_task_struct(p);
311
312 return 0;
313}
314
f0c3b509 315static int proc_readfd(struct file *file, struct dir_context *ctx)
faf60af1 316{
f0c3b509 317 return proc_readfd_common(file, ctx, proc_fd_instantiate);
faf60af1
CG
318}
319
320const struct file_operations proc_fd_operations = {
321 .read = generic_read_dir,
f50752ea
AV
322 .iterate_shared = proc_readfd,
323 .llseek = generic_file_llseek,
faf60af1
CG
324};
325
326static struct dentry *proc_lookupfd(struct inode *dir, struct dentry *dentry,
327 unsigned int flags)
328{
329 return proc_lookupfd_common(dir, dentry, proc_fd_instantiate);
330}
331
332/*
333 * /proc/pid/fd needs a special permission handler so that a process can still
334 * access /proc/self/fd after it has executed a setuid().
335 */
4609e1f1 336int proc_fd_permission(struct mnt_idmap *idmap,
549c7297 337 struct inode *inode, int mask)
faf60af1 338{
54708d28
ON
339 struct task_struct *p;
340 int rv;
341
4609e1f1 342 rv = generic_permission(&nop_mnt_idmap, inode, mask);
faf60af1 343 if (rv == 0)
54708d28
ON
344 return rv;
345
346 rcu_read_lock();
347 p = pid_task(proc_pid(inode), PIDTYPE_PID);
348 if (p && same_thread_group(p, current))
faf60af1 349 rv = 0;
54708d28
ON
350 rcu_read_unlock();
351
faf60af1
CG
352 return rv;
353}
354
b74d24f7 355static int proc_fd_getattr(struct mnt_idmap *idmap,
f1f1f256
IB
356 const struct path *path, struct kstat *stat,
357 u32 request_mask, unsigned int query_flags)
358{
359 struct inode *inode = d_inode(path->dentry);
360 int rv = 0;
361
0d72b928 362 generic_fillattr(&nop_mnt_idmap, request_mask, inode, stat);
f1f1f256
IB
363
364 /* If it's a directory, put the number of open fds there */
365 if (S_ISDIR(inode->i_mode)) {
366 rv = proc_readfd_count(inode, &stat->size);
367 if (rv < 0)
368 return rv;
369 }
370
371 return rv;
372}
373
faf60af1
CG
374const struct inode_operations proc_fd_inode_operations = {
375 .lookup = proc_lookupfd,
376 .permission = proc_fd_permission,
f1f1f256 377 .getattr = proc_fd_getattr,
faf60af1
CG
378 .setattr = proc_setattr,
379};
380
0168b9e3
AV
381static struct dentry *proc_fdinfo_instantiate(struct dentry *dentry,
382 struct task_struct *task, const void *ptr)
faf60af1 383{
98836386 384 const struct fd_data *data = ptr;
faf60af1
CG
385 struct proc_inode *ei;
386 struct inode *inode;
387
7bc3fa01 388 inode = proc_pid_make_inode(dentry->d_sb, task, S_IFREG | S_IRUGO);
faf60af1 389 if (!inode)
0168b9e3 390 return ERR_PTR(-ENOENT);
faf60af1
CG
391
392 ei = PROC_I(inode);
98836386 393 ei->fd = data->fd;
faf60af1 394
0a960ba4
THM
395 inode->i_op = &proc_fdinfo_file_inode_operations;
396
faf60af1 397 inode->i_fop = &proc_fdinfo_file_operations;
98836386 398 tid_fd_update_inode(task, inode, 0);
faf60af1
CG
399
400 d_set_d_op(dentry, &tid_fd_dentry_operations);
0168b9e3 401 return d_splice_alias(inode, dentry);
faf60af1
CG
402}
403
404static struct dentry *
405proc_lookupfdinfo(struct inode *dir, struct dentry *dentry, unsigned int flags)
406{
407 return proc_lookupfd_common(dir, dentry, proc_fdinfo_instantiate);
408}
409
f0c3b509 410static int proc_readfdinfo(struct file *file, struct dir_context *ctx)
faf60af1 411{
f0c3b509 412 return proc_readfd_common(file, ctx,
faf60af1
CG
413 proc_fdinfo_instantiate);
414}
415
416const struct inode_operations proc_fdinfo_inode_operations = {
417 .lookup = proc_lookupfdinfo,
0a960ba4 418 .permission = proc_fdinfo_permission,
faf60af1
CG
419 .setattr = proc_setattr,
420};
421
422const struct file_operations proc_fdinfo_operations = {
423 .read = generic_read_dir,
f50752ea
AV
424 .iterate_shared = proc_readfdinfo,
425 .llseek = generic_file_llseek,
faf60af1 426};
This page took 0.649123 seconds and 4 git commands to generate.