1 // SPDX-License-Identifier: GPL-2.0
2 #include <linux/sched/signal.h>
3 #include <linux/errno.h>
4 #include <linux/dcache.h>
5 #include <linux/path.h>
6 #include <linux/fdtable.h>
7 #include <linux/namei.h>
9 #include <linux/ptrace.h>
10 #include <linux/bitmap.h>
11 #include <linux/security.h>
12 #include <linux/file.h>
13 #include <linux/seq_file.h>
15 #include <linux/filelock.h>
17 #include <linux/proc_fs.h>
23 static int seq_show(struct seq_file *m, void *v)
25 struct files_struct *files = NULL;
26 int f_flags = 0, ret = -ENOENT;
27 struct file *file = NULL;
28 struct task_struct *task;
30 task = get_proc_task(m->private);
37 unsigned int fd = proc_fd(m->private);
39 spin_lock(&files->file_lock);
40 file = files_lookup_fd_locked(files, fd);
42 struct fdtable *fdt = files_fdtable(files);
44 f_flags = file->f_flags;
45 if (close_on_exec(fd, fdt))
51 spin_unlock(&files->file_lock);
54 put_task_struct(task);
59 seq_printf(m, "pos:\t%lli\nflags:\t0%o\nmnt_id:\t%i\nino:\t%lu\n",
60 (long long)file->f_pos, f_flags,
61 real_mount(file->f_path.mnt)->mnt_id,
62 file_inode(file)->i_ino);
64 /* show_fd_locks() never deferences files so a stale value is safe */
65 show_fd_locks(m, file, files);
66 if (seq_has_overflowed(m))
69 if (file->f_op->show_fdinfo)
70 file->f_op->show_fdinfo(m, file);
77 static int proc_fdinfo_access_allowed(struct inode *inode)
80 struct task_struct *task = get_proc_task(inode);
85 allowed = ptrace_may_access(task, PTRACE_MODE_READ_FSCREDS);
86 put_task_struct(task);
94 static int seq_fdinfo_open(struct inode *inode, struct file *file)
96 int ret = proc_fdinfo_access_allowed(inode);
101 return single_open(file, seq_show, inode);
104 static const struct file_operations proc_fdinfo_file_operations = {
105 .open = seq_fdinfo_open,
108 .release = single_release,
111 static bool tid_fd_mode(struct task_struct *task, unsigned fd, fmode_t *mode)
116 file = task_lookup_fdget_rcu(task, fd);
119 *mode = file->f_mode;
125 static void tid_fd_update_inode(struct task_struct *task, struct inode *inode,
128 task_dump_owner(task, 0, &inode->i_uid, &inode->i_gid);
130 if (S_ISLNK(inode->i_mode)) {
131 unsigned i_mode = S_IFLNK;
132 if (f_mode & FMODE_READ)
133 i_mode |= S_IRUSR | S_IXUSR;
134 if (f_mode & FMODE_WRITE)
135 i_mode |= S_IWUSR | S_IXUSR;
136 inode->i_mode = i_mode;
138 security_task_to_inode(task, inode);
141 static int tid_fd_revalidate(struct dentry *dentry, unsigned int flags)
143 struct task_struct *task;
147 if (flags & LOOKUP_RCU)
150 inode = d_inode(dentry);
151 task = get_proc_task(inode);
156 if (tid_fd_mode(task, fd, &f_mode)) {
157 tid_fd_update_inode(task, inode, f_mode);
158 put_task_struct(task);
161 put_task_struct(task);
166 static const struct dentry_operations tid_fd_dentry_operations = {
167 .d_revalidate = tid_fd_revalidate,
168 .d_delete = pid_delete_dentry,
171 static int proc_fd_link(struct dentry *dentry, struct path *path)
173 struct task_struct *task;
176 task = get_proc_task(d_inode(dentry));
178 unsigned int fd = proc_fd(d_inode(dentry));
179 struct file *fd_file;
181 fd_file = fget_task(task, fd);
183 *path = fd_file->f_path;
184 path_get(&fd_file->f_path);
188 put_task_struct(task);
199 static struct dentry *proc_fd_instantiate(struct dentry *dentry,
200 struct task_struct *task, const void *ptr)
202 const struct fd_data *data = ptr;
203 struct proc_inode *ei;
206 inode = proc_pid_make_inode(dentry->d_sb, task, S_IFLNK);
208 return ERR_PTR(-ENOENT);
213 inode->i_op = &proc_pid_link_inode_operations;
216 ei->op.proc_get_link = proc_fd_link;
217 tid_fd_update_inode(task, inode, data->mode);
219 d_set_d_op(dentry, &tid_fd_dentry_operations);
220 return d_splice_alias(inode, dentry);
223 static struct dentry *proc_lookupfd_common(struct inode *dir,
224 struct dentry *dentry,
225 instantiate_t instantiate)
227 struct task_struct *task = get_proc_task(dir);
228 struct fd_data data = {.fd = name_to_int(&dentry->d_name)};
229 struct dentry *result = ERR_PTR(-ENOENT);
235 if (!tid_fd_mode(task, data.fd, &data.mode))
238 result = instantiate(dentry, task, &data);
240 put_task_struct(task);
245 static int proc_readfd_common(struct file *file, struct dir_context *ctx,
246 instantiate_t instantiate)
248 struct task_struct *p = get_proc_task(file_inode(file));
254 if (!dir_emit_dots(file, ctx))
258 for (fd = ctx->pos - 2;; fd++) {
264 f = task_lookup_next_fdget_rcu(p, &fd);
268 data.mode = f->f_mode;
273 len = snprintf(name, sizeof(name), "%u", fd);
274 if (!proc_fill_cache(file, ctx,
275 name, len, instantiate, p,
287 static int proc_readfd_count(struct inode *inode, loff_t *count)
289 struct task_struct *p = get_proc_task(inode);
299 fdt = files_fdtable(p->files);
300 *count = bitmap_weight(fdt->open_fds, fdt->max_fds);
311 static int proc_readfd(struct file *file, struct dir_context *ctx)
313 return proc_readfd_common(file, ctx, proc_fd_instantiate);
316 const struct file_operations proc_fd_operations = {
317 .read = generic_read_dir,
318 .iterate_shared = proc_readfd,
319 .llseek = generic_file_llseek,
322 static struct dentry *proc_lookupfd(struct inode *dir, struct dentry *dentry,
325 return proc_lookupfd_common(dir, dentry, proc_fd_instantiate);
329 * /proc/pid/fd needs a special permission handler so that a process can still
330 * access /proc/self/fd after it has executed a setuid().
332 int proc_fd_permission(struct mnt_idmap *idmap,
333 struct inode *inode, int mask)
335 struct task_struct *p;
338 rv = generic_permission(&nop_mnt_idmap, inode, mask);
343 p = pid_task(proc_pid(inode), PIDTYPE_PID);
344 if (p && same_thread_group(p, current))
351 static int proc_fd_getattr(struct mnt_idmap *idmap,
352 const struct path *path, struct kstat *stat,
353 u32 request_mask, unsigned int query_flags)
355 struct inode *inode = d_inode(path->dentry);
358 generic_fillattr(&nop_mnt_idmap, request_mask, inode, stat);
360 /* If it's a directory, put the number of open fds there */
361 if (S_ISDIR(inode->i_mode)) {
362 rv = proc_readfd_count(inode, &stat->size);
370 const struct inode_operations proc_fd_inode_operations = {
371 .lookup = proc_lookupfd,
372 .permission = proc_fd_permission,
373 .getattr = proc_fd_getattr,
374 .setattr = proc_setattr,
377 static struct dentry *proc_fdinfo_instantiate(struct dentry *dentry,
378 struct task_struct *task, const void *ptr)
380 const struct fd_data *data = ptr;
381 struct proc_inode *ei;
384 inode = proc_pid_make_inode(dentry->d_sb, task, S_IFREG | S_IRUGO);
386 return ERR_PTR(-ENOENT);
391 inode->i_fop = &proc_fdinfo_file_operations;
392 tid_fd_update_inode(task, inode, 0);
394 d_set_d_op(dentry, &tid_fd_dentry_operations);
395 return d_splice_alias(inode, dentry);
398 static struct dentry *
399 proc_lookupfdinfo(struct inode *dir, struct dentry *dentry, unsigned int flags)
401 return proc_lookupfd_common(dir, dentry, proc_fdinfo_instantiate);
404 static int proc_readfdinfo(struct file *file, struct dir_context *ctx)
406 return proc_readfd_common(file, ctx,
407 proc_fdinfo_instantiate);
410 static int proc_open_fdinfo(struct inode *inode, struct file *file)
412 int ret = proc_fdinfo_access_allowed(inode);
420 const struct inode_operations proc_fdinfo_inode_operations = {
421 .lookup = proc_lookupfdinfo,
422 .setattr = proc_setattr,
425 const struct file_operations proc_fdinfo_operations = {
426 .open = proc_open_fdinfo,
427 .read = generic_read_dir,
428 .iterate_shared = proc_readfdinfo,
429 .llseek = generic_file_llseek,