base.c 74.6 KB
Newer Older
Linus Torvalds's avatar
Linus Torvalds committed
1
2
3
4
5
6
7
8
9
10
11
12
13
/*
 *  linux/fs/proc/base.c
 *
 *  Copyright (C) 1991, 1992 Linus Torvalds
 *
 *  proc base directory handling functions
 *
 *  1999, Al Viro. Rewritten. Now it covers the whole per-process part.
 *  Instead of using magical inumbers to determine the kind of object
 *  we allocate and fill in-core inodes upon lookup. They don't even
 *  go into icache. We cache the reference to task_struct upon lookup too.
 *  Eventually it should become a filesystem in its own. We don't use the
 *  rest of procfs anymore.
Mauricio Lin's avatar
Mauricio Lin committed
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
 *
 *
 *  Changelog:
 *  17-Jan-2005
 *  Allan Bezerra
 *  Bruna Moreira <bruna.moreira@indt.org.br>
 *  Edjard Mota <edjard.mota@indt.org.br>
 *  Ilias Biris <ilias.biris@indt.org.br>
 *  Mauricio Lin <mauricio.lin@indt.org.br>
 *
 *  Embedded Linux Lab - 10LE Instituto Nokia de Tecnologia - INdT
 *
 *  A new process specific entry (smaps) included in /proc. It shows the
 *  size of rss for each memory area. The maps entry lacks information
 *  about physical memory size (rss) for each mapped file, i.e.,
 *  rss information for executables and library files.
 *  This additional information is useful for any tools that need to know
 *  about physical memory consumption for a process specific library.
 *
 *  Changelog:
 *  21-Feb-2005
 *  Embedded Linux Lab - 10LE Instituto Nokia de Tecnologia - INdT
 *  Pud inclusion in the page table walking.
 *
 *  ChangeLog:
 *  10-Mar-2005
 *  10LE Instituto Nokia de Tecnologia - INdT:
 *  A better way to walks through the page table as suggested by Hugh Dickins.
 *
 *  Simo Piiroinen <simo.piiroinen@nokia.com>:
 *  Smaps information related to shared, private, clean and dirty pages.
 *
 *  Paul Mundt <paul.mundt@nokia.com>:
 *  Overall revision about smaps.
Linus Torvalds's avatar
Linus Torvalds committed
48
49
50
51
52
53
54
55
 */

#include <asm/uaccess.h>

#include <linux/errno.h>
#include <linux/time.h>
#include <linux/proc_fs.h>
#include <linux/stat.h>
56
#include <linux/task_io_accounting_ops.h>
Linus Torvalds's avatar
Linus Torvalds committed
57
#include <linux/init.h>
58
#include <linux/capability.h>
Linus Torvalds's avatar
Linus Torvalds committed
59
#include <linux/file.h>
Al Viro's avatar
Al Viro committed
60
#include <linux/fdtable.h>
Linus Torvalds's avatar
Linus Torvalds committed
61
62
63
#include <linux/string.h>
#include <linux/seq_file.h>
#include <linux/namei.h>
64
#include <linux/mnt_namespace.h>
Linus Torvalds's avatar
Linus Torvalds committed
65
#include <linux/mm.h>
66
#include <linux/rcupdate.h>
Linus Torvalds's avatar
Linus Torvalds committed
67
#include <linux/kallsyms.h>
Ken Chen's avatar
Ken Chen committed
68
#include <linux/stacktrace.h>
69
#include <linux/resource.h>
Kees Cook's avatar
Kees Cook committed
70
#include <linux/module.h>
Linus Torvalds's avatar
Linus Torvalds committed
71
72
73
#include <linux/mount.h>
#include <linux/security.h>
#include <linux/ptrace.h>
74
#include <linux/tracehook.h>
75
#include <linux/cgroup.h>
Linus Torvalds's avatar
Linus Torvalds committed
76
77
#include <linux/cpuset.h>
#include <linux/audit.h>
Al Viro's avatar
Al Viro committed
78
#include <linux/poll.h>
79
#include <linux/nsproxy.h>
80
#include <linux/oom.h>
81
#include <linux/elf.h>
82
#include <linux/pid_namespace.h>
83
#include <linux/fs_struct.h>
Linus Torvalds's avatar
Linus Torvalds committed
84
85
#include "internal.h"

86
87
88
89
90
91
92
93
94
95
/* NOTE:
 *	Implementing inode permission operations in /proc is almost
 *	certainly an error.  Permission checks need to happen during
 *	each system call not at open time.  The reason is that most of
 *	what we wish to check for permissions in /proc varies at runtime.
 *
 *	The classic example of a problem is opening file descriptors
 *	in /proc for a task before it execs a suid executable.
 */

Linus Torvalds's avatar
Linus Torvalds committed
96
97
struct pid_entry {
	char *name;
98
	int len;
Linus Torvalds's avatar
Linus Torvalds committed
99
	mode_t mode;
100
	const struct inode_operations *iop;
101
	const struct file_operations *fop;
102
	union proc_op op;
Linus Torvalds's avatar
Linus Torvalds committed
103
104
};

105
#define NOD(NAME, MODE, IOP, FOP, OP) {			\
106
	.name = (NAME),					\
107
	.len  = sizeof(NAME) - 1,			\
108
109
110
111
112
113
	.mode = MODE,					\
	.iop  = IOP,					\
	.fop  = FOP,					\
	.op   = OP,					\
}

Alexey Dobriyan's avatar
Alexey Dobriyan committed
114
115
116
#define DIR(NAME, MODE, iops, fops)	\
	NOD(NAME, (S_IFDIR|(MODE)), &iops, &fops, {} )
#define LNK(NAME, get_link)					\
117
	NOD(NAME, (S_IFLNK|S_IRWXUGO),				\
118
		&proc_pid_link_inode_operations, NULL,		\
Alexey Dobriyan's avatar
Alexey Dobriyan committed
119
120
121
122
		{ .proc_get_link = get_link } )
#define REG(NAME, MODE, fops)				\
	NOD(NAME, (S_IFREG|(MODE)), NULL, &fops, {})
#define INF(NAME, MODE, read)				\
123
	NOD(NAME, (S_IFREG|(MODE)), 			\
124
		NULL, &proc_info_file_operations,	\
Alexey Dobriyan's avatar
Alexey Dobriyan committed
125
126
		{ .proc_read = read } )
#define ONE(NAME, MODE, show)				\
127
128
	NOD(NAME, (S_IFREG|(MODE)), 			\
		NULL, &proc_single_file_operations,	\
Alexey Dobriyan's avatar
Alexey Dobriyan committed
129
		{ .proc_show = show } )
Linus Torvalds's avatar
Linus Torvalds committed
130

131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
/*
 * Count the number of hardlinks for the pid_entry table, excluding the .
 * and .. links.
 */
static unsigned int pid_entry_count_dirs(const struct pid_entry *entries,
	unsigned int n)
{
	unsigned int i;
	unsigned int count;

	count = 0;
	for (i = 0; i < n; ++i) {
		if (S_ISDIR(entries[i].mode))
			++count;
	}

	return count;
}

Hugh Dickins's avatar
Hugh Dickins committed
150
static int get_fs_path(struct task_struct *task, struct path *path, bool root)
Linus Torvalds's avatar
Linus Torvalds committed
151
152
{
	struct fs_struct *fs;
Hugh Dickins's avatar
Hugh Dickins committed
153
154
	int result = -ENOENT;

155
156
	task_lock(task);
	fs = task->fs;
Hugh Dickins's avatar
Hugh Dickins committed
157
158
159
160
161
162
163
	if (fs) {
		read_lock(&fs->lock);
		*path = root ? fs->root : fs->pwd;
		path_get(path);
		read_unlock(&fs->lock);
		result = 0;
	}
164
	task_unlock(task);
Hugh Dickins's avatar
Hugh Dickins committed
165
	return result;
166
167
}

168
169
170
171
172
173
174
175
176
177
178
179
static int get_nr_threads(struct task_struct *tsk)
{
	unsigned long flags;
	int count = 0;

	if (lock_task_sighand(tsk, &flags)) {
		count = atomic_read(&tsk->signal->count);
		unlock_task_sighand(tsk, &flags);
	}
	return count;
}

180
static int proc_cwd_link(struct inode *inode, struct path *path)
181
{
182
	struct task_struct *task = get_proc_task(inode);
183
	int result = -ENOENT;
184
185

	if (task) {
Hugh Dickins's avatar
Hugh Dickins committed
186
		result = get_fs_path(task, path, 0);
187
188
		put_task_struct(task);
	}
Linus Torvalds's avatar
Linus Torvalds committed
189
190
191
	return result;
}

192
static int proc_root_link(struct inode *inode, struct path *path)
Linus Torvalds's avatar
Linus Torvalds committed
193
{
194
	struct task_struct *task = get_proc_task(inode);
Linus Torvalds's avatar
Linus Torvalds committed
195
	int result = -ENOENT;
196
197

	if (task) {
Hugh Dickins's avatar
Hugh Dickins committed
198
		result = get_fs_path(task, path, 1);
199
200
		put_task_struct(task);
	}
Linus Torvalds's avatar
Linus Torvalds committed
201
202
203
	return result;
}

204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
/*
 * Return zero if current may access user memory in @task, -error if not.
 */
static int check_mem_permission(struct task_struct *task)
{
	/*
	 * A task can always look at itself, in case it chooses
	 * to use system calls instead of load instructions.
	 */
	if (task == current)
		return 0;

	/*
	 * If current is actively ptrace'ing, and would also be
	 * permitted to freshly attach with ptrace now, permit it.
	 */
220
221
222
223
224
225
226
227
	if (task_is_stopped_or_traced(task)) {
		int match;
		rcu_read_lock();
		match = (tracehook_tracer_task(task) == current);
		rcu_read_unlock();
		if (match && ptrace_may_access(task, PTRACE_MODE_ATTACH))
			return 0;
	}
228
229
230
231
232
233

	/*
	 * Noone else is allowed.
	 */
	return -EPERM;
}
Linus Torvalds's avatar
Linus Torvalds committed
234

235
236
struct mm_struct *mm_for_maps(struct task_struct *task)
{
237
238
239
240
	struct mm_struct *mm;

	if (mutex_lock_killable(&task->cred_guard_mutex))
		return NULL;
241

242
243
244
245
246
	mm = get_task_mm(task);
	if (mm && mm != current->mm &&
			!ptrace_may_access(task, PTRACE_MODE_READ)) {
		mmput(mm);
		mm = NULL;
247
	}
248
249
	mutex_unlock(&task->cred_guard_mutex);

250
251
252
	return mm;
}

Linus Torvalds's avatar
Linus Torvalds committed
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
static int proc_pid_cmdline(struct task_struct *task, char * buffer)
{
	int res = 0;
	unsigned int len;
	struct mm_struct *mm = get_task_mm(task);
	if (!mm)
		goto out;
	if (!mm->arg_end)
		goto out_mm;	/* Shh! No looking before we're done */

 	len = mm->arg_end - mm->arg_start;
 
	if (len > PAGE_SIZE)
		len = PAGE_SIZE;
 
	res = access_process_vm(task, mm->arg_start, buffer, len, 0);

	// If the nul at the end of args has been overwritten, then
	// assume application is using setproctitle(3).
	if (res > 0 && buffer[res-1] != '\0' && len < PAGE_SIZE) {
		len = strnlen(buffer, res);
		if (len < res) {
		    res = len;
		} else {
			len = mm->env_end - mm->env_start;
			if (len > PAGE_SIZE - res)
				len = PAGE_SIZE - res;
			res += access_process_vm(task, mm->env_start, buffer+res, len, 0);
			res = strnlen(buffer, res);
		}
	}
out_mm:
	mmput(mm);
out:
	return res;
}

static int proc_pid_auxv(struct task_struct *task, char *buffer)
{
	int res = 0;
	struct mm_struct *mm = get_task_mm(task);
	if (mm) {
		unsigned int nwords = 0;
Hannes Eder's avatar
Hannes Eder committed
296
		do {
Linus Torvalds's avatar
Linus Torvalds committed
297
			nwords += 2;
Hannes Eder's avatar
Hannes Eder committed
298
		} while (mm->saved_auxv[nwords - 2] != 0); /* AT_NULL */
Linus Torvalds's avatar
Linus Torvalds committed
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
		res = nwords * sizeof(mm->saved_auxv[0]);
		if (res > PAGE_SIZE)
			res = PAGE_SIZE;
		memcpy(buffer, mm->saved_auxv, res);
		mmput(mm);
	}
	return res;
}


#ifdef CONFIG_KALLSYMS
/*
 * Provides a wchan file via kallsyms in a proper one-value-per-file format.
 * Returns the resolved symbol.  If that fails, simply return the address.
 */
static int proc_pid_wchan(struct task_struct *task, char *buffer)
{
Alexey Dobriyan's avatar
Alexey Dobriyan committed
316
	unsigned long wchan;
317
	char symname[KSYM_NAME_LEN];
Linus Torvalds's avatar
Linus Torvalds committed
318
319
320

	wchan = get_wchan(task);

321
	if (lookup_symbol_name(wchan, symname) < 0)
322
323
324
325
		if (!ptrace_may_access(task, PTRACE_MODE_READ))
			return 0;
		else
			return sprintf(buffer, "%lu", wchan);
326
327
	else
		return sprintf(buffer, "%s", symname);
Linus Torvalds's avatar
Linus Torvalds committed
328
329
330
}
#endif /* CONFIG_KALLSYMS */

Ken Chen's avatar
Ken Chen committed
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
#ifdef CONFIG_STACKTRACE

#define MAX_STACK_TRACE_DEPTH	64

static int proc_pid_stack(struct seq_file *m, struct pid_namespace *ns,
			  struct pid *pid, struct task_struct *task)
{
	struct stack_trace trace;
	unsigned long *entries;
	int i;

	entries = kmalloc(MAX_STACK_TRACE_DEPTH * sizeof(*entries), GFP_KERNEL);
	if (!entries)
		return -ENOMEM;

	trace.nr_entries	= 0;
	trace.max_entries	= MAX_STACK_TRACE_DEPTH;
	trace.entries		= entries;
	trace.skip		= 0;
	save_stack_trace_tsk(task, &trace);

	for (i = 0; i < trace.nr_entries; i++) {
		seq_printf(m, "[<%p>] %pS\n",
			   (void *)entries[i], (void *)entries[i]);
	}
	kfree(entries);

	return 0;
}
#endif

Linus Torvalds's avatar
Linus Torvalds committed
362
363
364
365
366
367
#ifdef CONFIG_SCHEDSTATS
/*
 * Provides /proc/PID/schedstat
 */
static int proc_pid_schedstat(struct task_struct *task, char *buffer)
{
368
	return sprintf(buffer, "%llu %llu %lu\n",
369
370
			(unsigned long long)task->se.sum_exec_runtime,
			(unsigned long long)task->sched_info.run_delay,
371
			task->sched_info.pcount);
Linus Torvalds's avatar
Linus Torvalds committed
372
373
374
}
#endif

Arjan van de Ven's avatar
Arjan van de Ven committed
375
376
377
378
#ifdef CONFIG_LATENCYTOP
static int lstats_show_proc(struct seq_file *m, void *v)
{
	int i;
379
380
	struct inode *inode = m->private;
	struct task_struct *task = get_proc_task(inode);
Arjan van de Ven's avatar
Arjan van de Ven committed
381

382
383
384
	if (!task)
		return -ESRCH;
	seq_puts(m, "Latency Top version : v0.1\n");
Arjan van de Ven's avatar
Arjan van de Ven committed
385
386
387
388
389
390
391
392
	for (i = 0; i < 32; i++) {
		if (task->latency_record[i].backtrace[0]) {
			int q;
			seq_printf(m, "%i %li %li ",
				task->latency_record[i].count,
				task->latency_record[i].time,
				task->latency_record[i].max);
			for (q = 0; q < LT_BACKTRACEDEPTH; q++) {
Hugh Dickins's avatar
Hugh Dickins committed
393
				char sym[KSYM_SYMBOL_LEN];
Arjan van de Ven's avatar
Arjan van de Ven committed
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
				char *c;
				if (!task->latency_record[i].backtrace[q])
					break;
				if (task->latency_record[i].backtrace[q] == ULONG_MAX)
					break;
				sprint_symbol(sym, task->latency_record[i].backtrace[q]);
				c = strchr(sym, '+');
				if (c)
					*c = 0;
				seq_printf(m, "%s ", sym);
			}
			seq_printf(m, "\n");
		}

	}
409
	put_task_struct(task);
Arjan van de Ven's avatar
Arjan van de Ven committed
410
411
412
413
414
	return 0;
}

static int lstats_open(struct inode *inode, struct file *file)
{
415
	return single_open(file, lstats_show_proc, inode);
416
417
}

Arjan van de Ven's avatar
Arjan van de Ven committed
418
419
420
static ssize_t lstats_write(struct file *file, const char __user *buf,
			    size_t count, loff_t *offs)
{
421
	struct task_struct *task = get_proc_task(file->f_dentry->d_inode);
Arjan van de Ven's avatar
Arjan van de Ven committed
422

423
424
	if (!task)
		return -ESRCH;
Arjan van de Ven's avatar
Arjan van de Ven committed
425
	clear_all_latency_tracing(task);
426
	put_task_struct(task);
Arjan van de Ven's avatar
Arjan van de Ven committed
427
428
429
430
431
432
433
434
435

	return count;
}

static const struct file_operations proc_lstats_operations = {
	.open		= lstats_open,
	.read		= seq_read,
	.write		= lstats_write,
	.llseek		= seq_lseek,
436
	.release	= single_release,
Arjan van de Ven's avatar
Arjan van de Ven committed
437
438
439
440
};

#endif

Linus Torvalds's avatar
Linus Torvalds committed
441
442
443
444
445
446
447
448
/* The badness from the OOM killer */
unsigned long badness(struct task_struct *p, unsigned long uptime);
static int proc_oom_score(struct task_struct *task, char *buffer)
{
	unsigned long points;
	struct timespec uptime;

	do_posix_clock_monotonic_gettime(&uptime);
449
	read_lock(&tasklist_lock);
Linus Torvalds's avatar
Linus Torvalds committed
450
	points = badness(task, uptime.tv_sec);
451
	read_unlock(&tasklist_lock);
Linus Torvalds's avatar
Linus Torvalds committed
452
453
454
	return sprintf(buffer, "%lu\n", points);
}

455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
struct limit_names {
	char *name;
	char *unit;
};

static const struct limit_names lnames[RLIM_NLIMITS] = {
	[RLIMIT_CPU] = {"Max cpu time", "ms"},
	[RLIMIT_FSIZE] = {"Max file size", "bytes"},
	[RLIMIT_DATA] = {"Max data size", "bytes"},
	[RLIMIT_STACK] = {"Max stack size", "bytes"},
	[RLIMIT_CORE] = {"Max core file size", "bytes"},
	[RLIMIT_RSS] = {"Max resident set", "bytes"},
	[RLIMIT_NPROC] = {"Max processes", "processes"},
	[RLIMIT_NOFILE] = {"Max open files", "files"},
	[RLIMIT_MEMLOCK] = {"Max locked memory", "bytes"},
	[RLIMIT_AS] = {"Max address space", "bytes"},
	[RLIMIT_LOCKS] = {"Max file locks", "locks"},
	[RLIMIT_SIGPENDING] = {"Max pending signals", "signals"},
	[RLIMIT_MSGQUEUE] = {"Max msgqueue size", "bytes"},
	[RLIMIT_NICE] = {"Max nice priority", NULL},
	[RLIMIT_RTPRIO] = {"Max realtime priority", NULL},
476
	[RLIMIT_RTTIME] = {"Max realtime timeout", "us"},
477
478
479
480
481
482
483
484
485
486
487
488
};

/* Display limits for a process */
static int proc_pid_limits(struct task_struct *task, char *buffer)
{
	unsigned int i;
	int count = 0;
	unsigned long flags;
	char *bufptr = buffer;

	struct rlimit rlim[RLIM_NLIMITS];

489
	if (!lock_task_sighand(task, &flags))
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
		return 0;
	memcpy(rlim, task->signal->rlim, sizeof(struct rlimit) * RLIM_NLIMITS);
	unlock_task_sighand(task, &flags);

	/*
	 * print the file header
	 */
	count += sprintf(&bufptr[count], "%-25s %-20s %-20s %-10s\n",
			"Limit", "Soft Limit", "Hard Limit", "Units");

	for (i = 0; i < RLIM_NLIMITS; i++) {
		if (rlim[i].rlim_cur == RLIM_INFINITY)
			count += sprintf(&bufptr[count], "%-25s %-20s ",
					 lnames[i].name, "unlimited");
		else
			count += sprintf(&bufptr[count], "%-25s %-20lu ",
					 lnames[i].name, rlim[i].rlim_cur);

		if (rlim[i].rlim_max == RLIM_INFINITY)
			count += sprintf(&bufptr[count], "%-20s ", "unlimited");
		else
			count += sprintf(&bufptr[count], "%-20lu ",
					 rlim[i].rlim_max);

		if (lnames[i].unit)
			count += sprintf(&bufptr[count], "%-10s\n",
					 lnames[i].unit);
		else
			count += sprintf(&bufptr[count], "\n");
	}

	return count;
}

Roland McGrath's avatar
Roland McGrath committed
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
#ifdef CONFIG_HAVE_ARCH_TRACEHOOK
static int proc_pid_syscall(struct task_struct *task, char *buffer)
{
	long nr;
	unsigned long args[6], sp, pc;

	if (task_current_syscall(task, &nr, args, 6, &sp, &pc))
		return sprintf(buffer, "running\n");

	if (nr < 0)
		return sprintf(buffer, "%ld 0x%lx 0x%lx\n", nr, sp, pc);

	return sprintf(buffer,
		       "%ld 0x%lx 0x%lx 0x%lx 0x%lx 0x%lx 0x%lx 0x%lx 0x%lx\n",
		       nr,
		       args[0], args[1], args[2], args[3], args[4], args[5],
		       sp, pc);
}
#endif /* CONFIG_HAVE_ARCH_TRACEHOOK */

Linus Torvalds's avatar
Linus Torvalds committed
544
545
546
547
548
/************************************************************************/
/*                       Here the fs part begins                        */
/************************************************************************/

/* permission checks */
549
static int proc_fd_access_allowed(struct inode *inode)
Linus Torvalds's avatar
Linus Torvalds committed
550
{
551
552
	struct task_struct *task;
	int allowed = 0;
553
554
555
	/* Allow access to a task's file descriptors if it is us or we
	 * may use ptrace attach to the process and find out that
	 * information.
556
557
	 */
	task = get_proc_task(inode);
558
	if (task) {
559
		allowed = ptrace_may_access(task, PTRACE_MODE_READ);
560
		put_task_struct(task);
561
	}
562
	return allowed;
Linus Torvalds's avatar
Linus Torvalds committed
563
564
}

565
566
567
568
569
570
571
572
573
static int proc_setattr(struct dentry *dentry, struct iattr *attr)
{
	int error;
	struct inode *inode = dentry->d_inode;

	if (attr->ia_valid & ATTR_MODE)
		return -EPERM;

	error = inode_change_ok(inode, attr);
574
575
	if (!error)
		error = inode_setattr(inode, attr);
576
577
578
	return error;
}

579
static const struct inode_operations proc_def_inode_operations = {
580
581
582
	.setattr	= proc_setattr,
};

583
584
static int mounts_open_common(struct inode *inode, struct file *file,
			      const struct seq_operations *op)
Linus Torvalds's avatar
Linus Torvalds committed
585
{
586
	struct task_struct *task = get_proc_task(inode);
587
	struct nsproxy *nsp;
588
	struct mnt_namespace *ns = NULL;
589
	struct path root;
Al Viro's avatar
Al Viro committed
590
591
	struct proc_mounts *p;
	int ret = -EINVAL;
Linus Torvalds's avatar
Linus Torvalds committed
592

593
	if (task) {
594
595
596
597
		rcu_read_lock();
		nsp = task_nsproxy(task);
		if (nsp) {
			ns = nsp->mnt_ns;
598
599
600
			if (ns)
				get_mnt_ns(ns);
		}
601
		rcu_read_unlock();
Hugh Dickins's avatar
Hugh Dickins committed
602
603
		if (ns && get_fs_path(task, &root, 1) == 0)
			ret = 0;
604
605
		put_task_struct(task);
	}
Al Viro's avatar
Al Viro committed
606

607
608
	if (!ns)
		goto err;
Hugh Dickins's avatar
Hugh Dickins committed
609
	if (ret)
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
		goto err_put_ns;

	ret = -ENOMEM;
	p = kmalloc(sizeof(struct proc_mounts), GFP_KERNEL);
	if (!p)
		goto err_put_path;

	file->private_data = &p->m;
	ret = seq_open(file, op);
	if (ret)
		goto err_free;

	p->m.private = p;
	p->ns = ns;
	p->root = root;
	p->event = ns->event;

	return 0;

 err_free:
	kfree(p);
 err_put_path:
	path_put(&root);
 err_put_ns:
	put_mnt_ns(ns);
 err:
Linus Torvalds's avatar
Linus Torvalds committed
636
637
638
639
640
	return ret;
}

static int mounts_release(struct inode *inode, struct file *file)
{
641
642
643
	struct proc_mounts *p = file->private_data;
	path_put(&p->root);
	put_mnt_ns(p->ns);
Linus Torvalds's avatar
Linus Torvalds committed
644
645
646
	return seq_release(inode, file);
}

Al Viro's avatar
Al Viro committed
647
648
649
static unsigned mounts_poll(struct file *file, poll_table *wait)
{
	struct proc_mounts *p = file->private_data;
650
	struct mnt_namespace *ns = p->ns;
651
	unsigned res = POLLIN | POLLRDNORM;
Al Viro's avatar
Al Viro committed
652
653
654
655
656
657

	poll_wait(file, &ns->poll, wait);

	spin_lock(&vfsmount_lock);
	if (p->event != ns->event) {
		p->event = ns->event;
658
		res |= POLLERR | POLLPRI;
Al Viro's avatar
Al Viro committed
659
660
661
662
663
664
	}
	spin_unlock(&vfsmount_lock);

	return res;
}

665
666
667
668
669
static int mounts_open(struct inode *inode, struct file *file)
{
	return mounts_open_common(inode, file, &mounts_op);
}

670
static const struct file_operations proc_mounts_operations = {
Linus Torvalds's avatar
Linus Torvalds committed
671
672
673
674
	.open		= mounts_open,
	.read		= seq_read,
	.llseek		= seq_lseek,
	.release	= mounts_release,
Al Viro's avatar
Al Viro committed
675
	.poll		= mounts_poll,
Linus Torvalds's avatar
Linus Torvalds committed
676
677
};

678
679
680
681
682
683
684
685
686
687
688
689
690
static int mountinfo_open(struct inode *inode, struct file *file)
{
	return mounts_open_common(inode, file, &mountinfo_op);
}

static const struct file_operations proc_mountinfo_operations = {
	.open		= mountinfo_open,
	.read		= seq_read,
	.llseek		= seq_lseek,
	.release	= mounts_release,
	.poll		= mounts_poll,
};

691
692
static int mountstats_open(struct inode *inode, struct file *file)
{
693
	return mounts_open_common(inode, file, &mountstats_op);
694
695
}

696
static const struct file_operations proc_mountstats_operations = {
697
698
699
700
701
702
	.open		= mountstats_open,
	.read		= seq_read,
	.llseek		= seq_lseek,
	.release	= mounts_release,
};

Linus Torvalds's avatar
Linus Torvalds committed
703
704
705
706
707
#define PROC_BLOCK_SIZE	(3*1024)		/* 4K page size but our output routines use some slack for overruns */

static ssize_t proc_info_read(struct file * file, char __user * buf,
			  size_t count, loff_t *ppos)
{
708
	struct inode * inode = file->f_path.dentry->d_inode;
Linus Torvalds's avatar
Linus Torvalds committed
709
710
	unsigned long page;
	ssize_t length;
711
712
713
714
715
	struct task_struct *task = get_proc_task(inode);

	length = -ESRCH;
	if (!task)
		goto out_no_task;
Linus Torvalds's avatar
Linus Torvalds committed
716
717
718

	if (count > PROC_BLOCK_SIZE)
		count = PROC_BLOCK_SIZE;
719
720

	length = -ENOMEM;
721
	if (!(page = __get_free_page(GFP_TEMPORARY)))
722
		goto out;
Linus Torvalds's avatar
Linus Torvalds committed
723
724
725
726
727
728

	length = PROC_I(inode)->op.proc_read(task, (char*)page);

	if (length >= 0)
		length = simple_read_from_buffer(buf, count, ppos, (char *)page, length);
	free_page(page);
729
730
731
out:
	put_task_struct(task);
out_no_task:
Linus Torvalds's avatar
Linus Torvalds committed
732
733
734
	return length;
}

735
static const struct file_operations proc_info_file_operations = {
Linus Torvalds's avatar
Linus Torvalds committed
736
737
738
	.read		= proc_info_read,
};

739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
static int proc_single_show(struct seq_file *m, void *v)
{
	struct inode *inode = m->private;
	struct pid_namespace *ns;
	struct pid *pid;
	struct task_struct *task;
	int ret;

	ns = inode->i_sb->s_fs_info;
	pid = proc_pid(inode);
	task = get_pid_task(pid, PIDTYPE_PID);
	if (!task)
		return -ESRCH;

	ret = PROC_I(inode)->op.proc_show(m, ns, pid, task);

	put_task_struct(task);
	return ret;
}

static int proc_single_open(struct inode *inode, struct file *filp)
{
	int ret;
	ret = single_open(filp, proc_single_show, NULL);
	if (!ret) {
		struct seq_file *m = filp->private_data;

		m->private = inode;
	}
	return ret;
}

static const struct file_operations proc_single_file_operations = {
	.open		= proc_single_open,
	.read		= seq_read,
	.llseek		= seq_lseek,
	.release	= single_release,
};

Linus Torvalds's avatar
Linus Torvalds committed
778
779
780
781
782
783
784
785
786
static int mem_open(struct inode* inode, struct file* file)
{
	file->private_data = (void*)((long)current->self_exec_id);
	return 0;
}

static ssize_t mem_read(struct file * file, char __user * buf,
			size_t count, loff_t *ppos)
{
787
	struct task_struct *task = get_proc_task(file->f_path.dentry->d_inode);
Linus Torvalds's avatar
Linus Torvalds committed
788
789
790
791
792
	char *page;
	unsigned long src = *ppos;
	int ret = -ESRCH;
	struct mm_struct *mm;

793
794
795
	if (!task)
		goto out_no_task;

796
	if (check_mem_permission(task))
Linus Torvalds's avatar
Linus Torvalds committed
797
798
799
		goto out;

	ret = -ENOMEM;
800
	page = (char *)__get_free_page(GFP_TEMPORARY);
Linus Torvalds's avatar
Linus Torvalds committed
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
	if (!page)
		goto out;

	ret = 0;
 
	mm = get_task_mm(task);
	if (!mm)
		goto out_free;

	ret = -EIO;
 
	if (file->private_data != (void*)((long)current->self_exec_id))
		goto out_put;

	ret = 0;
 
	while (count > 0) {
		int this_len, retval;

		this_len = (count > PAGE_SIZE) ? PAGE_SIZE : count;
		retval = access_process_vm(task, src, page, this_len, 0);
822
		if (!retval || check_mem_permission(task)) {
Linus Torvalds's avatar
Linus Torvalds committed
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
			if (!ret)
				ret = -EIO;
			break;
		}

		if (copy_to_user(buf, page, retval)) {
			ret = -EFAULT;
			break;
		}
 
		ret += retval;
		src += retval;
		buf += retval;
		count -= retval;
	}
	*ppos = src;

out_put:
	mmput(mm);
out_free:
	free_page((unsigned long) page);
out:
845
846
	put_task_struct(task);
out_no_task:
Linus Torvalds's avatar
Linus Torvalds committed
847
848
849
850
851
852
853
	return ret;
}

#define mem_write NULL

#ifndef mem_write
/* This is a security hazard */
854
static ssize_t mem_write(struct file * file, const char __user *buf,
Linus Torvalds's avatar
Linus Torvalds committed
855
856
			 size_t count, loff_t *ppos)
{
857
	int copied;
Linus Torvalds's avatar
Linus Torvalds committed
858
	char *page;
859
	struct task_struct *task = get_proc_task(file->f_path.dentry->d_inode);
Linus Torvalds's avatar
Linus Torvalds committed
860
861
	unsigned long dst = *ppos;

862
863
864
865
	copied = -ESRCH;
	if (!task)
		goto out_no_task;

866
	if (check_mem_permission(task))
867
		goto out;
Linus Torvalds's avatar
Linus Torvalds committed
868

869
	copied = -ENOMEM;
870
	page = (char *)__get_free_page(GFP_TEMPORARY);
Linus Torvalds's avatar
Linus Torvalds committed
871
	if (!page)
872
		goto out;
Linus Torvalds's avatar
Linus Torvalds committed
873

874
	copied = 0;
Linus Torvalds's avatar
Linus Torvalds committed
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
	while (count > 0) {
		int this_len, retval;

		this_len = (count > PAGE_SIZE) ? PAGE_SIZE : count;
		if (copy_from_user(page, buf, this_len)) {
			copied = -EFAULT;
			break;
		}
		retval = access_process_vm(task, dst, page, this_len, 1);
		if (!retval) {
			if (!copied)
				copied = -EIO;
			break;
		}
		copied += retval;
		buf += retval;
		dst += retval;
		count -= retval;			
	}
	*ppos = dst;
	free_page((unsigned long) page);
896
897
898
out:
	put_task_struct(task);
out_no_task:
Linus Torvalds's avatar
Linus Torvalds committed
899
900
901
902
	return copied;
}
#endif

903
loff_t mem_lseek(struct file *file, loff_t offset, int orig)
Linus Torvalds's avatar
Linus Torvalds committed
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
{
	switch (orig) {
	case 0:
		file->f_pos = offset;
		break;
	case 1:
		file->f_pos += offset;
		break;
	default:
		return -EINVAL;
	}
	force_successful_syscall_return();
	return file->f_pos;
}

919
static const struct file_operations proc_mem_operations = {
Linus Torvalds's avatar
Linus Torvalds committed
920
921
922
923
924
925
	.llseek		= mem_lseek,
	.read		= mem_read,
	.write		= mem_write,
	.open		= mem_open,
};

926
927
928
929
930
931
932
933
934
935
936
937
static ssize_t environ_read(struct file *file, char __user *buf,
			size_t count, loff_t *ppos)
{
	struct task_struct *task = get_proc_task(file->f_dentry->d_inode);
	char *page;
	unsigned long src = *ppos;
	int ret = -ESRCH;
	struct mm_struct *mm;

	if (!task)
		goto out_no_task;

938
	if (!ptrace_may_access(task, PTRACE_MODE_READ))
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
		goto out;

	ret = -ENOMEM;
	page = (char *)__get_free_page(GFP_TEMPORARY);
	if (!page)
		goto out;

	ret = 0;

	mm = get_task_mm(task);
	if (!mm)
		goto out_free;

	while (count > 0) {
		int this_len, retval, max_len;

		this_len = mm->env_end - (mm->env_start + src);

		if (this_len <= 0)
			break;

		max_len = (count > PAGE_SIZE) ? PAGE_SIZE : count;
		this_len = (this_len > max_len) ? max_len : this_len;

		retval = access_process_vm(task, (mm->env_start + src),
			page, this_len, 0);

		if (retval <= 0) {
			ret = retval;
			break;
		}

		if (copy_to_user(buf, page, retval)) {
			ret = -EFAULT;
			break;
		}

		ret += retval;
		src += retval;
		buf += retval;
		count -= retval;
	}
	*ppos = src;

	mmput(mm);
out_free:
	free_page((unsigned long) page);
out:
	put_task_struct(task);
out_no_task:
	return ret;
}

static const struct file_operations proc_environ_operations = {
	.read		= environ_read,
};

Linus Torvalds's avatar
Linus Torvalds committed
996
997
998
static ssize_t oom_adjust_read(struct file *file, char __user *buf,
				size_t count, loff_t *ppos)
{
999
	struct task_struct *task = get_proc_task(file->f_path.dentry->d_inode);
1000
	char buffer[PROC_NUMBUF];
Linus Torvalds's avatar
Linus Torvalds committed
1001
	size_t len;
1002
	int oom_adjust;
Linus Torvalds's avatar
Linus Torvalds committed
1003

1004
1005
	if (!task)
		return -ESRCH;
1006
1007
1008
1009
1010
1011
	task_lock(task);
	if (task->mm)
		oom_adjust = task->mm->oom_adj;
	else
		oom_adjust = OOM_DISABLE;
	task_unlock(task);
1012
1013
	put_task_struct(task);

1014
	len = snprintf(buffer, sizeof(buffer), "%i\n", oom_adjust);
1015
1016

	return simple_read_from_buffer(buf, count, ppos, buffer, len);
Linus Torvalds's avatar
Linus Torvalds committed
1017
1018
1019
1020
1021
}

static ssize_t oom_adjust_write(struct file *file, const char __user *buf,
				size_t count, loff_t *ppos)
{
1022
	struct task_struct *task;
1023
	char buffer[PROC_NUMBUF], *end;
Linus Torvalds's avatar
Linus Torvalds committed
1024
1025
	int oom_adjust;

1026
1027
1028
	memset(buffer, 0, sizeof(buffer));
	if (count > sizeof(buffer) - 1)
		count = sizeof(buffer) - 1;
Linus Torvalds's avatar
Linus Torvalds committed
1029
1030
1031
	if (copy_from_user(buffer, buf, count))
		return -EFAULT;
	oom_adjust = simple_strtol(buffer, &end, 0);
1032
1033
	if ((oom_adjust < OOM_ADJUST_MIN || oom_adjust > OOM_ADJUST_MAX) &&
	     oom_adjust != OOM_DISABLE)
Linus Torvalds's avatar
Linus Torvalds committed
1034
1035
1036
		return -EINVAL;
	if (*end == '\n')
		end++;
1037
	task = get_proc_task(file->f_path.dentry->d_inode);
1038
1039
	if (!task)
		return -ESRCH;
1040
1041
1042
1043
1044
1045
1046
1047
	task_lock(task);
	if (!task->mm) {
		task_unlock(task);
		put_task_struct(task);
		return -EINVAL;
	}
	if (oom_adjust < task->mm->oom_adj && !capable(CAP_SYS_RESOURCE)) {
		task_unlock(task);
1048
1049
1050
		put_task_struct(task);
		return -EACCES;
	}
1051
1052
	task->mm->oom_adj = oom_adjust;
	task_unlock(task);
1053
	put_task_struct(task);
Linus Torvalds's avatar
Linus Torvalds committed
1054
1055
1056
1057
1058
	if (end - buffer == 0)
		return -EIO;
	return end - buffer;
}

1059
static const struct file_operations proc_oom_adjust_operations = {
Linus Torvalds's avatar
Linus Torvalds committed
1060
1061
1062
1063
1064
1065
1066
1067
1068
	.read		= oom_adjust_read,
	.write		= oom_adjust_write,
};

#ifdef CONFIG_AUDITSYSCALL
#define TMPBUFLEN 21
static ssize_t proc_loginuid_read(struct file * file, char __user * buf,
				  size_t count, loff_t *ppos)
{
1069
	struct inode * inode = file->f_path.dentry->d_inode;
1070
	struct task_struct *task = get_proc_task(inode);
Linus Torvalds's avatar
Linus Torvalds committed
1071
1072
1073
	ssize_t length;
	char tmpbuf[TMPBUFLEN];

1074
1075
	if (!task)
		return -ESRCH;
Linus Torvalds's avatar
Linus Torvalds committed
1076
	length = scnprintf(tmpbuf, TMPBUFLEN, "%u",
1077
				audit_get_loginuid(task));
1078
	put_task_struct(task);
Linus Torvalds's avatar
Linus Torvalds committed
1079
1080
1081
1082
1083
1084
	return simple_read_from_buffer(buf, count, ppos, tmpbuf, length);
}

static ssize_t proc_loginuid_write(struct file * file, const char __user * buf,
				   size_t count, loff_t *ppos)
{
1085
	struct inode * inode = file->f_path.dentry->d_inode;
Linus Torvalds's avatar
Linus Torvalds committed
1086
1087
1088
1089
1090
1091
1092
	char *page, *tmp;
	ssize_t length;
	uid_t loginuid;

	if (!capable(CAP_AUDIT_CONTROL))
		return -EPERM;

1093
	if (current != pid_task(proc_pid(inode), PIDTYPE_PID))
Linus Torvalds's avatar
Linus Torvalds committed
1094
1095
		return -EPERM;

1096
1097
	if (count >= PAGE_SIZE)
		count = PAGE_SIZE - 1;
Linus Torvalds's avatar
Linus Torvalds committed
1098
1099
1100
1101
1102

	if (*ppos != 0) {
		/* No partial writes. */
		return -EINVAL;
	}
1103
	page = (char*)__get_free_page(GFP_TEMPORARY);
Linus Torvalds's avatar
Linus Torvalds committed
1104
1105
1106
1107
1108
1109
	if (!page)
		return -ENOMEM;
	length = -EFAULT;
	if (copy_from_user(page, buf, count))
		goto out_free_page;

1110
	page[count] = '\0';
Linus Torvalds's avatar
Linus Torvalds committed
1111
1112
1113
1114
1115
1116
	loginuid = simple_strtoul(page, &tmp, 10);
	if (tmp == page) {
		length = -EINVAL;
		goto out_free_page;

	}
1117
	length = audit_set_loginuid(current, loginuid);
Linus Torvalds's avatar
Linus Torvalds committed
1118
1119
1120
1121
1122
1123
1124
1125
	if (likely(length == 0))
		length = count;

out_free_page:
	free_page((unsigned long) page);
	return length;
}

1126
static const struct file_operations proc_loginuid_operations = {
Linus Torvalds's avatar
Linus Torvalds committed
1127
1128
1129
	.read		= proc_loginuid_read,
	.write		= proc_loginuid_write,
};
1130
1131
1132
1133
1134
1135
1136
1137
1138
1139
1140
1141
1142
1143
1144
1145
1146
1147
1148
1149

static ssize_t proc_sessionid_read(struct file * file, char __user * buf,
				  size_t count, loff_t *ppos)
{
	struct inode * inode = file->f_path.dentry->d_inode;
	struct task_struct *task = get_proc_task(inode);
	ssize_t length;
	char tmpbuf[TMPBUFLEN];

	if (!task)
		return -ESRCH;
	length = scnprintf(tmpbuf, TMPBUFLEN, "%u",
				audit_get_sessionid(task));
	put_task_struct(task);
	return simple_read_from_buffer(buf, count, ppos, tmpbuf, length);
}

static const struct file_operations proc_sessionid_operations = {
	.read		= proc_sessionid_read,
};
Linus Torvalds's avatar
Linus Torvalds committed
1150
1151
#endif

1152
1153
1154
1155
1156
1157
1158
1159
1160
1161
1162
1163
1164
1165
1166
#ifdef CONFIG_FAULT_INJECTION
static ssize_t proc_fault_inject_read(struct file * file, char __user * buf,
				      size_t count, loff_t *ppos)
{
	struct task_struct *task = get_proc_task(file->f_dentry->d_inode);
	char buffer[PROC_NUMBUF];
	size_t len;
	int make_it_fail;

	if (!task)
		return -ESRCH;
	make_it_fail = task->make_it_fail;
	put_task_struct(task);

	len = snprintf(buffer, sizeof(buffer), "%i\n", make_it_fail);
1167
1168

	return simple_read_from_buffer(buf, count, ppos, buffer, len);
1169
1170
1171
1172
1173
1174
1175
1176
1177
1178
1179
1180
1181
1182
1183
1184
1185
1186
1187
1188
1189
1190
1191
1192
1193
1194
1195
1196
1197
}

static ssize_t proc_fault_inject_write(struct file * file,
			const char __user * buf, size_t count, loff_t *ppos)
{
	struct task_struct *task;
	char buffer[PROC_NUMBUF], *end;
	int make_it_fail;

	if (!capable(CAP_SYS_RESOURCE))
		return -EPERM;
	memset(buffer, 0, sizeof(buffer));
	if (count > sizeof(buffer) - 1)
		count = sizeof(buffer) - 1;
	if (copy_from_user(buffer, buf, count))
		return -EFAULT;
	make_it_fail = simple_strtol(buffer, &end, 0);
	if (*end == '\n')
		end++;
	task = get_proc_task(file->f_dentry->d_inode);
	if (!task)
		return -ESRCH;
	task->make_it_fail = make_it_fail;
	put_task_struct(task);
	if (end - buffer == 0)
		return -EIO;
	return end - buffer;
}

1198
static const struct file_operations proc_fault_inject_operations = {
1199
1200
1201
1202
1203
	.read		= proc_fault_inject_read,
	.write		= proc_fault_inject_write,
};
#endif

Arjan van de Ven's avatar
Arjan van de Ven committed
1204

Ingo Molnar's avatar
Ingo Molnar committed
1205
1206
1207
1208
1209
1210
1211
1212
1213
1214
1215
1216
1217
1218
1219
1220
1221
1222
1223
1224
1225
1226
1227
1228
1229
1230
1231
1232
1233
1234
1235
1236
1237
1238
1239
1240
1241
1242
1243
1244
1245
1246
1247
1248
1249
1250
1251
1252
1253
1254
1255
1256
1257
1258
#ifdef CONFIG_SCHED_DEBUG
/*
 * Print out various scheduling related per-task fields:
 */
static int sched_show(struct seq_file *m, void *v)
{
	struct inode *inode = m->private;
	struct task_struct *p;

	p = get_proc_task(inode);
	if (!p)
		return -ESRCH;
	proc_sched_show_task(p, m);

	put_task_struct(p);

	return 0;
}

static ssize_t
sched_write(struct file *file, const char __user *buf,
	    size_t count, loff_t *offset)
{
	struct inode *inode = file->f_path.dentry->d_inode;
	struct task_struct *p;

	p = get_proc_task(inode);
	if (!p)
		return -ESRCH;
	proc_sched_set_task(p);

	put_task_struct(p);

	return count;
}

static int sched_open(struct inode *inode, struct file *filp)
{
	int ret;

	ret = single_open(filp, sched_show, NULL);
	if (!ret) {
		struct seq_file *m = filp->private_data;

		m->private = inode;
	}
	return ret;
}

static const struct file_operations proc_pid_sched_operations = {
	.open		= sched_open,
	.read		= seq_read,
	.write		= sched_write,
	.llseek		= seq_lseek,
1259
	.release	= single_release,
Ingo Molnar's avatar
Ingo Molnar committed
1260
1261
1262
1263
};

#endif

Matt Helsley's avatar
Matt Helsley committed
1264
1265
1266
1267
1268
1269
1270
1271
1272
1273
1274
1275
1276
1277
1278
1279
1280
1281
1282
1283
1284
1285
1286
1287
1288
1289
1290
1291
1292
1293
1294
1295
1296
1297
1298
1299
1300
1301
1302
1303
1304
1305
1306
1307
1308
1309
1310
1311
1312
1313
1314
1315
1316
1317
1318
1319
1320
1321
1322
1323
1324
1325
1326
1327
1328
1329
1330
1331
1332
1333
1334
1335
1336
1337
1338
/*
 * We added or removed a vma mapping the executable. The vmas are only mapped
 * during exec and are not mapped with the mmap system call.
 * Callers must hold down_write() on the mm's mmap_sem for these
 */
void added_exe_file_vma(struct mm_struct *mm)
{
	mm->num_exe_file_vmas++;
}

void removed_exe_file_vma(struct mm_struct *mm)
{
	mm->num_exe_file_vmas--;
	if ((mm->num_exe_file_vmas == 0) && mm->exe_file){
		fput(mm->exe_file);
		mm->exe_file = NULL;
	}

}

void set_mm_exe_file(struct mm_struct *mm, struct file *new_exe_file)
{
	if (new_exe_file)
		get_file(new_exe_file);
	if (mm->exe_file)
		fput(mm->exe_file);
	mm->exe_file = new_exe_file;
	mm->num_exe_file_vmas = 0;
}

struct file *get_mm_exe_file(struct mm_struct *mm)
{
	struct file *exe_file;

	/* We need mmap_sem to protect against races with removal of
	 * VM_EXECUTABLE vmas */
	down_read(&mm->mmap_sem);
	exe_file = mm->exe_file;
	if (exe_file)
		get_file(exe_file);
	up_read(&mm->mmap_sem);
	return exe_file;
}

void dup_mm_exe_file(struct mm_struct *oldmm, struct mm_struct *newmm)
{
	/* It's safe to write the exe_file pointer without exe_file_lock because
	 * this is called during fork when the task is not yet in /proc */
	newmm->exe_file = get_mm_exe_file(oldmm);
}

static int proc_exe_link(struct inode *inode, struct path *exe_path)
{
	struct task_struct *task;
	struct mm_struct *mm;
	struct file *exe_file;

	task = get_proc_task(inode);
	if (!task)
		return -ENOENT;
	mm = get_task_mm(task);
	put_task_struct(task);
	if (!mm)
		return -ENOENT;
	exe_file = get_mm_exe_file(mm);
	mmput(mm);
	if (exe_file) {
		*exe_path = exe_file->f_path;
		path_get(&exe_file->f_path);
		fput(exe_file);
		return 0;
	} else
		return -ENOENT;
}

1339
static void *proc_pid_follow_link(struct dentry *dentry, struct nameidata *nd)
Linus Torvalds's avatar
Linus Torvalds committed
1340
1341
1342
1343
1344
{
	struct inode *inode = dentry->d_inode;
	int error = -EACCES;

	/* We don't need a base pointer in the /proc filesystem */
Jan Blunck's avatar
Jan Blunck committed
1345
	path_put(&nd->path);
Linus Torvalds's avatar
Linus Torvalds committed
1346

1347
1348
	/* Are we allowed to snoop on the tasks file descriptors? */
	if (!proc_fd_access_allowed(inode))
Linus Torvalds's avatar
Linus Torvalds committed
1349
1350
		goto out;

1351
	error = PROC_I(inode)->op.proc_get_link(inode, &nd->path);
Linus Torvalds's avatar
Linus Torvalds committed
1352
1353
	nd->last_type = LAST_BIND;
out:
1354
	return ERR_PTR(error);
Linus Torvalds's avatar
Linus Torvalds committed
1355
1356
}

1357
static int do_proc_readlink(struct path *path, char __user *buffer, int buflen)
Linus Torvalds's avatar
Linus Torvalds committed
1358
{
1359
	char *tmp = (char*)__get_free_page(GFP_TEMPORARY);
1360
	char *pathname;
Linus Torvalds's avatar
Linus Torvalds committed
1361
1362
1363
1364
	int len;

	if (!tmp)
		return -ENOMEM;
1365

1366
	pathname = d_path(path, tmp, PAGE_SIZE);
1367
1368
	len = PTR_ERR(pathname);
	if (IS_ERR(pathname))
Linus Torvalds's avatar
Linus Torvalds committed
1369
		goto out;
1370
	len = tmp + PAGE_SIZE - 1 - pathname;
Linus Torvalds's avatar
Linus Torvalds committed
1371
1372
1373

	if (len > buflen)
		len = buflen;
1374
	if (copy_to_user(buffer, pathname, len))
Linus Torvalds's avatar
Linus Torvalds committed
1375
1376
1377
1378
1379
1380
1381
1382
1383
1384
		len = -EFAULT;
 out:
	free_page((unsigned long)tmp);
	return len;
}

static int proc_pid_readlink(struct dentry * dentry, char __user * buffer, int buflen)
{
	int error = -EACCES;
	struct inode *inode = dentry->d_inode;
1385
	struct path path;
Linus Torvalds's avatar
Linus Torvalds committed
1386

1387
1388
	/* Are we allowed to snoop on the tasks file descriptors? */
	if (!proc_fd_access_allowed(inode))
Linus Torvalds's avatar
Linus Torvalds committed
1389
1390
		goto out;

1391
	error = PROC_I(inode)->op.proc_get_link(inode, &path);
Linus Torvalds's avatar
Linus Torvalds committed
1392
1393
1394
	if (error)
		goto out;

1395
1396
	error = do_proc_readlink(&path, buffer, buflen);
	path_put(&path);
Linus Torvalds's avatar
Linus Torvalds committed
1397
1398
1399
1400
out:
	return error;
}

1401
static const struct inode_operations proc_pid_link_inode_operations = {
Linus Torvalds's avatar
Linus Torvalds committed
1402
	.readlink	= proc_pid_readlink,
1403
1404
	.follow_link	= proc_pid_follow_link,
	.setattr	= proc_setattr,
Linus Torvalds's avatar
Linus Torvalds committed
1405
1406
};

1407
1408
1409
1410

/* building an inode */

static int task_dumpable(struct task_struct *task)
Linus Torvalds's avatar
Linus Torvalds committed
1411
{
1412
1413
	int dumpable = 0;
	struct mm_struct *mm;
Linus Torvalds's avatar
Linus Torvalds committed
1414

1415
1416
1417
	task_lock(task);
	mm = task->mm;
	if (mm)
1418
		dumpable = get_dumpable(mm);
1419
1420
1421
1422
1423
	task_unlock(task);
	if(dumpable == 1)
		return 1;
	return 0;
}
Linus Torvalds's avatar
Linus Torvalds committed
1424
1425


1426
static struct inode *proc_pid_make_inode(struct super_block * sb, struct task_struct *task)
1427
1428
1429
{
	struct inode * inode;
	struct proc_inode *ei;
1430
	const struct cred *cred;
Linus Torvalds's avatar
Linus Torvalds committed
1431

1432
	/* We need a new inode */
Linus Torvalds's avatar
Linus Torvalds committed
1433

1434
1435
1436
1437
1438
1439
1440
1441
1442
1443
1444
1445
	inode = new_inode(sb);
	if (!inode)
		goto out;

	/* Common stuff */
	ei = PROC_I(inode);
	inode->i_mtime = inode->i_atime = inode->i_ctime = CURRENT_TIME;
	inode->i_op = &proc_def_inode_operations;

	/*
	 * grab the reference to task.
	 */
1446
	ei->pid = get_task_pid(task, PIDTYPE_PID);
1447
1448
1449
1450
	if (!ei->pid)
		goto out_unlock;

	if (task_dumpable(task)) {
1451
1452
1453
1454
1455
		rcu_read_lock();
		cred = __task_cred(task);
		inode->i_uid = cred->euid;
		inode->i_gid = cred->egid;
		rcu_read_unlock();
Linus Torvalds's avatar
Linus Torvalds committed
1456
	}
1457
1458
	security_task_to_inode(task, inode);

Linus Torvalds's avatar
Linus Torvalds committed
1459
out:
1460
1461
1462
1463
1464
	return inode;

out_unlock:
	iput(inode);
	return NULL;
Linus Torvalds's avatar
Linus Torvalds committed
1465
1466
}