]> git.ipfire.org Git - people/ms/linux.git/blame - fs/proc/fd.c
proc_lookupfd_common(): don't bother with instantiate unless the file is open
[people/ms/linux.git] / fs / proc / fd.c
CommitLineData
b2441318 1// SPDX-License-Identifier: GPL-2.0
3f07c014 2#include <linux/sched/signal.h>
faf60af1
CG
3#include <linux/errno.h>
4#include <linux/dcache.h>
5#include <linux/path.h>
6#include <linux/fdtable.h>
7#include <linux/namei.h>
8#include <linux/pid.h>
9#include <linux/security.h>
ddd3e077
CG
10#include <linux/file.h>
11#include <linux/seq_file.h>
6c8c9031 12#include <linux/fs.h>
faf60af1
CG
13
14#include <linux/proc_fs.h>
15
49d063cb 16#include "../mount.h"
faf60af1
CG
17#include "internal.h"
18#include "fd.h"
19
ddd3e077 20static int seq_show(struct seq_file *m, void *v)
faf60af1 21{
faf60af1 22 struct files_struct *files = NULL;
ddd3e077
CG
23 int f_flags = 0, ret = -ENOENT;
24 struct file *file = NULL;
25 struct task_struct *task;
26
27 task = get_proc_task(m->private);
28 if (!task)
29 return -ENOENT;
30
31 files = get_files_struct(task);
32 put_task_struct(task);
faf60af1 33
faf60af1 34 if (files) {
771187d6 35 unsigned int fd = proc_fd(m->private);
ddd3e077 36
faf60af1
CG
37 spin_lock(&files->file_lock);
38 file = fcheck_files(files, fd);
39 if (file) {
ddd3e077 40 struct fdtable *fdt = files_fdtable(files);
faf60af1 41
c6f3d811 42 f_flags = file->f_flags;
faf60af1
CG
43 if (close_on_exec(fd, fdt))
44 f_flags |= O_CLOEXEC;
45
ddd3e077
CG
46 get_file(file);
47 ret = 0;
faf60af1
CG
48 }
49 spin_unlock(&files->file_lock);
50 put_files_struct(files);
51 }
ddd3e077 52
6c8c9031
AV
53 if (ret)
54 return ret;
55
56 seq_printf(m, "pos:\t%lli\nflags:\t0%o\nmnt_id:\t%i\n",
57 (long long)file->f_pos, f_flags,
58 real_mount(file->f_path.mnt)->mnt_id);
59
60 show_fd_locks(m, file, files);
61 if (seq_has_overflowed(m))
62 goto out;
63
64 if (file->f_op->show_fdinfo)
65 file->f_op->show_fdinfo(m, file);
ddd3e077 66
6c8c9031
AV
67out:
68 fput(file);
69 return 0;
faf60af1
CG
70}
71
ddd3e077
CG
72static int seq_fdinfo_open(struct inode *inode, struct file *file)
73{
74 return single_open(file, seq_show, inode);
75}
76
77static const struct file_operations proc_fdinfo_file_operations = {
78 .open = seq_fdinfo_open,
79 .read = seq_read,
80 .llseek = seq_lseek,
81 .release = single_release,
82};
83
1ae9bd8b
AV
84static bool tid_fd_mode(struct task_struct *task, unsigned fd, fmode_t *mode)
85{
86 struct files_struct *files = get_files_struct(task);
87 struct file *file;
88
89 if (!files)
90 return false;
91
92 rcu_read_lock();
93 file = fcheck_files(files, fd);
94 if (file)
95 *mode = file->f_mode;
96 rcu_read_unlock();
97 put_files_struct(files);
98 return !!file;
99}
100
faf60af1
CG
101static int tid_fd_revalidate(struct dentry *dentry, unsigned int flags)
102{
faf60af1 103 struct task_struct *task;
faf60af1 104 struct inode *inode;
771187d6 105 unsigned int fd;
1ae9bd8b 106 fmode_t f_mode;
faf60af1
CG
107
108 if (flags & LOOKUP_RCU)
109 return -ECHILD;
110
2b0143b5 111 inode = d_inode(dentry);
faf60af1
CG
112 task = get_proc_task(inode);
113 fd = proc_fd(inode);
114
115 if (task) {
1ae9bd8b
AV
116 if (tid_fd_mode(task, fd, &f_mode)) {
117 task_dump_owner(task, 0, &inode->i_uid, &inode->i_gid);
118
119 if (S_ISLNK(inode->i_mode)) {
120 unsigned i_mode = S_IFLNK;
121 if (f_mode & FMODE_READ)
122 i_mode |= S_IRUSR | S_IXUSR;
123 if (f_mode & FMODE_WRITE)
124 i_mode |= S_IWUSR | S_IXUSR;
125 inode->i_mode = i_mode;
faf60af1 126 }
1ae9bd8b
AV
127 security_task_to_inode(task, inode);
128 put_task_struct(task);
129 return 1;
faf60af1
CG
130 }
131 put_task_struct(task);
132 }
faf60af1
CG
133 return 0;
134}
135
136static const struct dentry_operations tid_fd_dentry_operations = {
137 .d_revalidate = tid_fd_revalidate,
138 .d_delete = pid_delete_dentry,
139};
140
141static int proc_fd_link(struct dentry *dentry, struct path *path)
142{
ddd3e077
CG
143 struct files_struct *files = NULL;
144 struct task_struct *task;
145 int ret = -ENOENT;
146
2b0143b5 147 task = get_proc_task(d_inode(dentry));
ddd3e077
CG
148 if (task) {
149 files = get_files_struct(task);
150 put_task_struct(task);
151 }
152
153 if (files) {
771187d6 154 unsigned int fd = proc_fd(d_inode(dentry));
ddd3e077
CG
155 struct file *fd_file;
156
157 spin_lock(&files->file_lock);
158 fd_file = fcheck_files(files, fd);
159 if (fd_file) {
160 *path = fd_file->f_path;
161 path_get(&fd_file->f_path);
162 ret = 0;
163 }
164 spin_unlock(&files->file_lock);
165 put_files_struct(files);
166 }
167
168 return ret;
faf60af1
CG
169}
170
c52a47ac 171static int
faf60af1
CG
172proc_fd_instantiate(struct inode *dir, struct dentry *dentry,
173 struct task_struct *task, const void *ptr)
174{
faf60af1
CG
175 unsigned fd = (unsigned long)ptr;
176 struct proc_inode *ei;
177 struct inode *inode;
178
db978da8 179 inode = proc_pid_make_inode(dir->i_sb, task, S_IFLNK);
faf60af1
CG
180 if (!inode)
181 goto out;
182
183 ei = PROC_I(inode);
184 ei->fd = fd;
185
faf60af1
CG
186 inode->i_op = &proc_pid_link_inode_operations;
187 inode->i_size = 64;
188
189 ei->op.proc_get_link = proc_fd_link;
190
191 d_set_d_op(dentry, &tid_fd_dentry_operations);
192 d_add(dentry, inode);
193
194 /* Close the race of the process dying before we return the dentry */
195 if (tid_fd_revalidate(dentry, 0))
c52a47ac 196 return 0;
faf60af1 197 out:
c52a47ac 198 return -ENOENT;
faf60af1
CG
199}
200
201static struct dentry *proc_lookupfd_common(struct inode *dir,
202 struct dentry *dentry,
203 instantiate_t instantiate)
204{
205 struct task_struct *task = get_proc_task(dir);
c52a47ac 206 int result = -ENOENT;
dbcdb504 207 unsigned fd = name_to_int(&dentry->d_name);
1ae9bd8b 208 fmode_t f_mode;
faf60af1
CG
209
210 if (!task)
211 goto out_no_task;
212 if (fd == ~0U)
213 goto out;
1ae9bd8b
AV
214 if (!tid_fd_mode(task, fd, &f_mode))
215 goto out;
faf60af1
CG
216
217 result = instantiate(dir, dentry, task, (void *)(unsigned long)fd);
218out:
219 put_task_struct(task);
220out_no_task:
c52a47ac 221 return ERR_PTR(result);
faf60af1
CG
222}
223
f0c3b509
AV
224static int proc_readfd_common(struct file *file, struct dir_context *ctx,
225 instantiate_t instantiate)
faf60af1 226{
f0c3b509 227 struct task_struct *p = get_proc_task(file_inode(file));
faf60af1 228 struct files_struct *files;
f0c3b509 229 unsigned int fd;
faf60af1 230
faf60af1 231 if (!p)
f0c3b509 232 return -ENOENT;
faf60af1 233
f0c3b509
AV
234 if (!dir_emit_dots(file, ctx))
235 goto out;
236 files = get_files_struct(p);
237 if (!files)
238 goto out;
239
240 rcu_read_lock();
241 for (fd = ctx->pos - 2;
242 fd < files_fdtable(files)->max_fds;
243 fd++, ctx->pos++) {
e3912ac3 244 char name[10 + 1];
f0c3b509
AV
245 int len;
246
247 if (!fcheck_files(files, fd))
248 continue;
249 rcu_read_unlock();
250
771187d6 251 len = snprintf(name, sizeof(name), "%u", fd);
f0c3b509
AV
252 if (!proc_fill_cache(file, ctx,
253 name, len, instantiate, p,
254 (void *)(unsigned long)fd))
255 goto out_fd_loop;
3cc4a84e 256 cond_resched();
f0c3b509 257 rcu_read_lock();
faf60af1 258 }
f0c3b509
AV
259 rcu_read_unlock();
260out_fd_loop:
261 put_files_struct(files);
faf60af1
CG
262out:
263 put_task_struct(p);
f0c3b509 264 return 0;
faf60af1
CG
265}
266
f0c3b509 267static int proc_readfd(struct file *file, struct dir_context *ctx)
faf60af1 268{
f0c3b509 269 return proc_readfd_common(file, ctx, proc_fd_instantiate);
faf60af1
CG
270}
271
272const struct file_operations proc_fd_operations = {
273 .read = generic_read_dir,
f50752ea
AV
274 .iterate_shared = proc_readfd,
275 .llseek = generic_file_llseek,
faf60af1
CG
276};
277
278static struct dentry *proc_lookupfd(struct inode *dir, struct dentry *dentry,
279 unsigned int flags)
280{
281 return proc_lookupfd_common(dir, dentry, proc_fd_instantiate);
282}
283
284/*
285 * /proc/pid/fd needs a special permission handler so that a process can still
286 * access /proc/self/fd after it has executed a setuid().
287 */
288int proc_fd_permission(struct inode *inode, int mask)
289{
54708d28
ON
290 struct task_struct *p;
291 int rv;
292
293 rv = generic_permission(inode, mask);
faf60af1 294 if (rv == 0)
54708d28
ON
295 return rv;
296
297 rcu_read_lock();
298 p = pid_task(proc_pid(inode), PIDTYPE_PID);
299 if (p && same_thread_group(p, current))
faf60af1 300 rv = 0;
54708d28
ON
301 rcu_read_unlock();
302
faf60af1
CG
303 return rv;
304}
305
306const struct inode_operations proc_fd_inode_operations = {
307 .lookup = proc_lookupfd,
308 .permission = proc_fd_permission,
309 .setattr = proc_setattr,
310};
311
c52a47ac 312static int
faf60af1
CG
313proc_fdinfo_instantiate(struct inode *dir, struct dentry *dentry,
314 struct task_struct *task, const void *ptr)
315{
faf60af1
CG
316 unsigned fd = (unsigned long)ptr;
317 struct proc_inode *ei;
318 struct inode *inode;
319
db978da8 320 inode = proc_pid_make_inode(dir->i_sb, task, S_IFREG | S_IRUSR);
faf60af1
CG
321 if (!inode)
322 goto out;
323
324 ei = PROC_I(inode);
325 ei->fd = fd;
326
faf60af1
CG
327 inode->i_fop = &proc_fdinfo_file_operations;
328
329 d_set_d_op(dentry, &tid_fd_dentry_operations);
330 d_add(dentry, inode);
331
332 /* Close the race of the process dying before we return the dentry */
333 if (tid_fd_revalidate(dentry, 0))
c52a47ac 334 return 0;
faf60af1 335 out:
c52a47ac 336 return -ENOENT;
faf60af1
CG
337}
338
339static struct dentry *
340proc_lookupfdinfo(struct inode *dir, struct dentry *dentry, unsigned int flags)
341{
342 return proc_lookupfd_common(dir, dentry, proc_fdinfo_instantiate);
343}
344
f0c3b509 345static int proc_readfdinfo(struct file *file, struct dir_context *ctx)
faf60af1 346{
f0c3b509 347 return proc_readfd_common(file, ctx,
faf60af1
CG
348 proc_fdinfo_instantiate);
349}
350
351const struct inode_operations proc_fdinfo_inode_operations = {
352 .lookup = proc_lookupfdinfo,
353 .setattr = proc_setattr,
354};
355
356const struct file_operations proc_fdinfo_operations = {
357 .read = generic_read_dir,
f50752ea
AV
358 .iterate_shared = proc_readfdinfo,
359 .llseek = generic_file_llseek,
faf60af1 360};