]>
Commit | Line | Data |
---|---|---|
b2441318 | 1 | // SPDX-License-Identifier: GPL-2.0 |
3f07c014 | 2 | #include <linux/sched/signal.h> |
faf60af1 CG |
3 | #include <linux/errno.h> |
4 | #include <linux/dcache.h> | |
5 | #include <linux/path.h> | |
6 | #include <linux/fdtable.h> | |
7 | #include <linux/namei.h> | |
8 | #include <linux/pid.h> | |
7bc3fa01 | 9 | #include <linux/ptrace.h> |
f1f1f256 | 10 | #include <linux/bitmap.h> |
faf60af1 | 11 | #include <linux/security.h> |
ddd3e077 CG |
12 | #include <linux/file.h> |
13 | #include <linux/seq_file.h> | |
6c8c9031 | 14 | #include <linux/fs.h> |
5970e15d | 15 | #include <linux/filelock.h> |
faf60af1 CG |
16 | |
17 | #include <linux/proc_fs.h> | |
18 | ||
49d063cb | 19 | #include "../mount.h" |
faf60af1 CG |
20 | #include "internal.h" |
21 | #include "fd.h" | |
22 | ||
ddd3e077 | 23 | static int seq_show(struct seq_file *m, void *v) |
faf60af1 | 24 | { |
faf60af1 | 25 | struct files_struct *files = NULL; |
ddd3e077 CG |
26 | int f_flags = 0, ret = -ENOENT; |
27 | struct file *file = NULL; | |
28 | struct task_struct *task; | |
29 | ||
30 | task = get_proc_task(m->private); | |
31 | if (!task) | |
32 | return -ENOENT; | |
33 | ||
775e0656 EB |
34 | task_lock(task); |
35 | files = task->files; | |
faf60af1 | 36 | if (files) { |
771187d6 | 37 | unsigned int fd = proc_fd(m->private); |
ddd3e077 | 38 | |
faf60af1 | 39 | spin_lock(&files->file_lock); |
120ce2b0 | 40 | file = files_lookup_fd_locked(files, fd); |
faf60af1 | 41 | if (file) { |
c6f3d811 | 42 | f_flags = file->f_flags; |
f60d374d | 43 | if (close_on_exec(fd, files)) |
faf60af1 CG |
44 | f_flags |= O_CLOEXEC; |
45 | ||
ddd3e077 CG |
46 | get_file(file); |
47 | ret = 0; | |
faf60af1 CG |
48 | } |
49 | spin_unlock(&files->file_lock); | |
faf60af1 | 50 | } |
775e0656 EB |
51 | task_unlock(task); |
52 | put_task_struct(task); | |
ddd3e077 | 53 | |
6c8c9031 AV |
54 | if (ret) |
55 | return ret; | |
56 | ||
3845f256 | 57 | seq_printf(m, "pos:\t%lli\nflags:\t0%o\nmnt_id:\t%i\nino:\t%lu\n", |
6c8c9031 | 58 | (long long)file->f_pos, f_flags, |
3845f256 KS |
59 | real_mount(file->f_path.mnt)->mnt_id, |
60 | file_inode(file)->i_ino); | |
6c8c9031 | 61 | |
775e0656 | 62 | /* show_fd_locks() never deferences files so a stale value is safe */ |
6c8c9031 AV |
63 | show_fd_locks(m, file, files); |
64 | if (seq_has_overflowed(m)) | |
65 | goto out; | |
66 | ||
67 | if (file->f_op->show_fdinfo) | |
68 | file->f_op->show_fdinfo(m, file); | |
ddd3e077 | 69 | |
6c8c9031 AV |
70 | out: |
71 | fput(file); | |
72 | return 0; | |
faf60af1 CG |
73 | } |
74 | ||
0a960ba4 THM |
75 | static int seq_fdinfo_open(struct inode *inode, struct file *file) |
76 | { | |
77 | return single_open(file, seq_show, inode); | |
78 | } | |
79 | ||
80 | /** | |
81 | * Shared /proc/pid/fdinfo and /proc/pid/fdinfo/fd permission helper to ensure | |
82 | * that the current task has PTRACE_MODE_READ in addition to the normal | |
83 | * POSIX-like checks. | |
84 | */ | |
85 | static int proc_fdinfo_permission(struct mnt_idmap *idmap, struct inode *inode, | |
86 | int mask) | |
ddd3e077 | 87 | { |
7bc3fa01 KS |
88 | bool allowed = false; |
89 | struct task_struct *task = get_proc_task(inode); | |
90 | ||
91 | if (!task) | |
92 | return -ESRCH; | |
93 | ||
94 | allowed = ptrace_may_access(task, PTRACE_MODE_READ_FSCREDS); | |
95 | put_task_struct(task); | |
96 | ||
97 | if (!allowed) | |
98 | return -EACCES; | |
99 | ||
0a960ba4 | 100 | return generic_permission(idmap, inode, mask); |
1927e498 KS |
101 | } |
102 | ||
0a960ba4 THM |
103 | static const struct inode_operations proc_fdinfo_file_inode_operations = { |
104 | .permission = proc_fdinfo_permission, | |
105 | .setattr = proc_setattr, | |
106 | }; | |
ddd3e077 CG |
107 | |
108 | static const struct file_operations proc_fdinfo_file_operations = { | |
109 | .open = seq_fdinfo_open, | |
110 | .read = seq_read, | |
111 | .llseek = seq_lseek, | |
112 | .release = single_release, | |
113 | }; | |
114 | ||
1ae9bd8b AV |
115 | static bool tid_fd_mode(struct task_struct *task, unsigned fd, fmode_t *mode) |
116 | { | |
1ae9bd8b AV |
117 | struct file *file; |
118 | ||
1ae9bd8b | 119 | rcu_read_lock(); |
0ede61d8 | 120 | file = task_lookup_fdget_rcu(task, fd); |
1ae9bd8b | 121 | rcu_read_unlock(); |
0ede61d8 CB |
122 | if (file) { |
123 | *mode = file->f_mode; | |
124 | fput(file); | |
125 | } | |
1ae9bd8b AV |
126 | return !!file; |
127 | } | |
128 | ||
98836386 AV |
129 | static void tid_fd_update_inode(struct task_struct *task, struct inode *inode, |
130 | fmode_t f_mode) | |
131 | { | |
132 | task_dump_owner(task, 0, &inode->i_uid, &inode->i_gid); | |
133 | ||
134 | if (S_ISLNK(inode->i_mode)) { | |
135 | unsigned i_mode = S_IFLNK; | |
136 | if (f_mode & FMODE_READ) | |
137 | i_mode |= S_IRUSR | S_IXUSR; | |
138 | if (f_mode & FMODE_WRITE) | |
139 | i_mode |= S_IWUSR | S_IXUSR; | |
140 | inode->i_mode = i_mode; | |
141 | } | |
142 | security_task_to_inode(task, inode); | |
143 | } | |
144 | ||
faf60af1 CG |
145 | static int tid_fd_revalidate(struct dentry *dentry, unsigned int flags) |
146 | { | |
faf60af1 | 147 | struct task_struct *task; |
faf60af1 | 148 | struct inode *inode; |
771187d6 | 149 | unsigned int fd; |
faf60af1 CG |
150 | |
151 | if (flags & LOOKUP_RCU) | |
152 | return -ECHILD; | |
153 | ||
2b0143b5 | 154 | inode = d_inode(dentry); |
faf60af1 CG |
155 | task = get_proc_task(inode); |
156 | fd = proc_fd(inode); | |
157 | ||
158 | if (task) { | |
98836386 | 159 | fmode_t f_mode; |
1ae9bd8b | 160 | if (tid_fd_mode(task, fd, &f_mode)) { |
98836386 | 161 | tid_fd_update_inode(task, inode, f_mode); |
1ae9bd8b AV |
162 | put_task_struct(task); |
163 | return 1; | |
faf60af1 CG |
164 | } |
165 | put_task_struct(task); | |
166 | } | |
faf60af1 CG |
167 | return 0; |
168 | } | |
169 | ||
170 | static const struct dentry_operations tid_fd_dentry_operations = { | |
171 | .d_revalidate = tid_fd_revalidate, | |
172 | .d_delete = pid_delete_dentry, | |
173 | }; | |
174 | ||
175 | static int proc_fd_link(struct dentry *dentry, struct path *path) | |
176 | { | |
ddd3e077 CG |
177 | struct task_struct *task; |
178 | int ret = -ENOENT; | |
179 | ||
2b0143b5 | 180 | task = get_proc_task(d_inode(dentry)); |
ddd3e077 | 181 | if (task) { |
771187d6 | 182 | unsigned int fd = proc_fd(d_inode(dentry)); |
ddd3e077 CG |
183 | struct file *fd_file; |
184 | ||
439be326 | 185 | fd_file = fget_task(task, fd); |
ddd3e077 CG |
186 | if (fd_file) { |
187 | *path = fd_file->f_path; | |
188 | path_get(&fd_file->f_path); | |
189 | ret = 0; | |
439be326 | 190 | fput(fd_file); |
ddd3e077 | 191 | } |
439be326 | 192 | put_task_struct(task); |
ddd3e077 CG |
193 | } |
194 | ||
195 | return ret; | |
faf60af1 CG |
196 | } |
197 | ||
98836386 AV |
198 | struct fd_data { |
199 | fmode_t mode; | |
200 | unsigned fd; | |
201 | }; | |
202 | ||
0168b9e3 AV |
203 | static struct dentry *proc_fd_instantiate(struct dentry *dentry, |
204 | struct task_struct *task, const void *ptr) | |
faf60af1 | 205 | { |
98836386 | 206 | const struct fd_data *data = ptr; |
faf60af1 CG |
207 | struct proc_inode *ei; |
208 | struct inode *inode; | |
209 | ||
0168b9e3 | 210 | inode = proc_pid_make_inode(dentry->d_sb, task, S_IFLNK); |
faf60af1 | 211 | if (!inode) |
0168b9e3 | 212 | return ERR_PTR(-ENOENT); |
faf60af1 CG |
213 | |
214 | ei = PROC_I(inode); | |
98836386 | 215 | ei->fd = data->fd; |
faf60af1 | 216 | |
faf60af1 CG |
217 | inode->i_op = &proc_pid_link_inode_operations; |
218 | inode->i_size = 64; | |
219 | ||
220 | ei->op.proc_get_link = proc_fd_link; | |
98836386 | 221 | tid_fd_update_inode(task, inode, data->mode); |
faf60af1 CG |
222 | |
223 | d_set_d_op(dentry, &tid_fd_dentry_operations); | |
0168b9e3 | 224 | return d_splice_alias(inode, dentry); |
faf60af1 CG |
225 | } |
226 | ||
227 | static struct dentry *proc_lookupfd_common(struct inode *dir, | |
228 | struct dentry *dentry, | |
229 | instantiate_t instantiate) | |
230 | { | |
231 | struct task_struct *task = get_proc_task(dir); | |
98836386 | 232 | struct fd_data data = {.fd = name_to_int(&dentry->d_name)}; |
0168b9e3 | 233 | struct dentry *result = ERR_PTR(-ENOENT); |
faf60af1 CG |
234 | |
235 | if (!task) | |
236 | goto out_no_task; | |
98836386 | 237 | if (data.fd == ~0U) |
faf60af1 | 238 | goto out; |
98836386 | 239 | if (!tid_fd_mode(task, data.fd, &data.mode)) |
1ae9bd8b | 240 | goto out; |
faf60af1 | 241 | |
0168b9e3 | 242 | result = instantiate(dentry, task, &data); |
faf60af1 CG |
243 | out: |
244 | put_task_struct(task); | |
245 | out_no_task: | |
0168b9e3 | 246 | return result; |
faf60af1 CG |
247 | } |
248 | ||
f0c3b509 AV |
249 | static int proc_readfd_common(struct file *file, struct dir_context *ctx, |
250 | instantiate_t instantiate) | |
faf60af1 | 251 | { |
f0c3b509 | 252 | struct task_struct *p = get_proc_task(file_inode(file)); |
f0c3b509 | 253 | unsigned int fd; |
faf60af1 | 254 | |
faf60af1 | 255 | if (!p) |
f0c3b509 | 256 | return -ENOENT; |
faf60af1 | 257 | |
f0c3b509 AV |
258 | if (!dir_emit_dots(file, ctx)) |
259 | goto out; | |
f0c3b509 AV |
260 | |
261 | rcu_read_lock(); | |
5b17b618 | 262 | for (fd = ctx->pos - 2;; fd++) { |
98836386 AV |
263 | struct file *f; |
264 | struct fd_data data; | |
e3912ac3 | 265 | char name[10 + 1]; |
a4ef3895 | 266 | unsigned int len; |
f0c3b509 | 267 | |
0ede61d8 | 268 | f = task_lookup_next_fdget_rcu(p, &fd); |
5b17b618 | 269 | ctx->pos = fd + 2LL; |
98836386 | 270 | if (!f) |
5b17b618 | 271 | break; |
98836386 | 272 | data.mode = f->f_mode; |
f0c3b509 | 273 | rcu_read_unlock(); |
0ede61d8 | 274 | fput(f); |
98836386 | 275 | data.fd = fd; |
f0c3b509 | 276 | |
771187d6 | 277 | len = snprintf(name, sizeof(name), "%u", fd); |
f0c3b509 AV |
278 | if (!proc_fill_cache(file, ctx, |
279 | name, len, instantiate, p, | |
98836386 | 280 | &data)) |
5b17b618 | 281 | goto out; |
3cc4a84e | 282 | cond_resched(); |
f0c3b509 | 283 | rcu_read_lock(); |
faf60af1 | 284 | } |
f0c3b509 | 285 | rcu_read_unlock(); |
faf60af1 CG |
286 | out: |
287 | put_task_struct(p); | |
f0c3b509 | 288 | return 0; |
faf60af1 CG |
289 | } |
290 | ||
f1f1f256 IB |
291 | static int proc_readfd_count(struct inode *inode, loff_t *count) |
292 | { | |
293 | struct task_struct *p = get_proc_task(inode); | |
294 | struct fdtable *fdt; | |
295 | ||
296 | if (!p) | |
297 | return -ENOENT; | |
298 | ||
299 | task_lock(p); | |
300 | if (p->files) { | |
301 | rcu_read_lock(); | |
302 | ||
303 | fdt = files_fdtable(p->files); | |
304 | *count = bitmap_weight(fdt->open_fds, fdt->max_fds); | |
305 | ||
306 | rcu_read_unlock(); | |
307 | } | |
308 | task_unlock(p); | |
309 | ||
310 | put_task_struct(p); | |
311 | ||
312 | return 0; | |
313 | } | |
314 | ||
f0c3b509 | 315 | static int proc_readfd(struct file *file, struct dir_context *ctx) |
faf60af1 | 316 | { |
f0c3b509 | 317 | return proc_readfd_common(file, ctx, proc_fd_instantiate); |
faf60af1 CG |
318 | } |
319 | ||
320 | const struct file_operations proc_fd_operations = { | |
321 | .read = generic_read_dir, | |
f50752ea AV |
322 | .iterate_shared = proc_readfd, |
323 | .llseek = generic_file_llseek, | |
faf60af1 CG |
324 | }; |
325 | ||
326 | static struct dentry *proc_lookupfd(struct inode *dir, struct dentry *dentry, | |
327 | unsigned int flags) | |
328 | { | |
329 | return proc_lookupfd_common(dir, dentry, proc_fd_instantiate); | |
330 | } | |
331 | ||
332 | /* | |
333 | * /proc/pid/fd needs a special permission handler so that a process can still | |
334 | * access /proc/self/fd after it has executed a setuid(). | |
335 | */ | |
4609e1f1 | 336 | int proc_fd_permission(struct mnt_idmap *idmap, |
549c7297 | 337 | struct inode *inode, int mask) |
faf60af1 | 338 | { |
54708d28 ON |
339 | struct task_struct *p; |
340 | int rv; | |
341 | ||
4609e1f1 | 342 | rv = generic_permission(&nop_mnt_idmap, inode, mask); |
faf60af1 | 343 | if (rv == 0) |
54708d28 ON |
344 | return rv; |
345 | ||
346 | rcu_read_lock(); | |
347 | p = pid_task(proc_pid(inode), PIDTYPE_PID); | |
348 | if (p && same_thread_group(p, current)) | |
faf60af1 | 349 | rv = 0; |
54708d28 ON |
350 | rcu_read_unlock(); |
351 | ||
faf60af1 CG |
352 | return rv; |
353 | } | |
354 | ||
b74d24f7 | 355 | static int proc_fd_getattr(struct mnt_idmap *idmap, |
f1f1f256 IB |
356 | const struct path *path, struct kstat *stat, |
357 | u32 request_mask, unsigned int query_flags) | |
358 | { | |
359 | struct inode *inode = d_inode(path->dentry); | |
360 | int rv = 0; | |
361 | ||
0d72b928 | 362 | generic_fillattr(&nop_mnt_idmap, request_mask, inode, stat); |
f1f1f256 IB |
363 | |
364 | /* If it's a directory, put the number of open fds there */ | |
365 | if (S_ISDIR(inode->i_mode)) { | |
366 | rv = proc_readfd_count(inode, &stat->size); | |
367 | if (rv < 0) | |
368 | return rv; | |
369 | } | |
370 | ||
371 | return rv; | |
372 | } | |
373 | ||
faf60af1 CG |
374 | const struct inode_operations proc_fd_inode_operations = { |
375 | .lookup = proc_lookupfd, | |
376 | .permission = proc_fd_permission, | |
f1f1f256 | 377 | .getattr = proc_fd_getattr, |
faf60af1 CG |
378 | .setattr = proc_setattr, |
379 | }; | |
380 | ||
0168b9e3 AV |
381 | static struct dentry *proc_fdinfo_instantiate(struct dentry *dentry, |
382 | struct task_struct *task, const void *ptr) | |
faf60af1 | 383 | { |
98836386 | 384 | const struct fd_data *data = ptr; |
faf60af1 CG |
385 | struct proc_inode *ei; |
386 | struct inode *inode; | |
387 | ||
7bc3fa01 | 388 | inode = proc_pid_make_inode(dentry->d_sb, task, S_IFREG | S_IRUGO); |
faf60af1 | 389 | if (!inode) |
0168b9e3 | 390 | return ERR_PTR(-ENOENT); |
faf60af1 CG |
391 | |
392 | ei = PROC_I(inode); | |
98836386 | 393 | ei->fd = data->fd; |
faf60af1 | 394 | |
0a960ba4 THM |
395 | inode->i_op = &proc_fdinfo_file_inode_operations; |
396 | ||
faf60af1 | 397 | inode->i_fop = &proc_fdinfo_file_operations; |
98836386 | 398 | tid_fd_update_inode(task, inode, 0); |
faf60af1 CG |
399 | |
400 | d_set_d_op(dentry, &tid_fd_dentry_operations); | |
0168b9e3 | 401 | return d_splice_alias(inode, dentry); |
faf60af1 CG |
402 | } |
403 | ||
404 | static struct dentry * | |
405 | proc_lookupfdinfo(struct inode *dir, struct dentry *dentry, unsigned int flags) | |
406 | { | |
407 | return proc_lookupfd_common(dir, dentry, proc_fdinfo_instantiate); | |
408 | } | |
409 | ||
f0c3b509 | 410 | static int proc_readfdinfo(struct file *file, struct dir_context *ctx) |
faf60af1 | 411 | { |
f0c3b509 | 412 | return proc_readfd_common(file, ctx, |
faf60af1 CG |
413 | proc_fdinfo_instantiate); |
414 | } | |
415 | ||
416 | const struct inode_operations proc_fdinfo_inode_operations = { | |
417 | .lookup = proc_lookupfdinfo, | |
0a960ba4 | 418 | .permission = proc_fdinfo_permission, |
faf60af1 CG |
419 | .setattr = proc_setattr, |
420 | }; | |
421 | ||
422 | const struct file_operations proc_fdinfo_operations = { | |
423 | .read = generic_read_dir, | |
f50752ea AV |
424 | .iterate_shared = proc_readfdinfo, |
425 | .llseek = generic_file_llseek, | |
faf60af1 | 426 | }; |