import PULS_20160108
[GitHub/mt8127/android_kernel_alcatel_ttab.git] / fs / proc / generic.c
CommitLineData
1da177e4
LT
1/*
2 * proc/fs/generic.c --- generic routines for the proc-fs
3 *
4 * This file contains generic proc-fs routines for handling
5 * directories and files.
6 *
7 * Copyright (C) 1991, 1992 Linus Torvalds.
8 * Copyright (C) 1997 Theodore Ts'o
9 */
10
11#include <linux/errno.h>
12#include <linux/time.h>
13#include <linux/proc_fs.h>
14#include <linux/stat.h>
1025774c 15#include <linux/mm.h>
1da177e4 16#include <linux/module.h>
5a0e3ad6 17#include <linux/slab.h>
87ebdc00 18#include <linux/printk.h>
1da177e4 19#include <linux/mount.h>
1da177e4
LT
20#include <linux/init.h>
21#include <linux/idr.h>
22#include <linux/namei.h>
23#include <linux/bitops.h>
64a07bd8 24#include <linux/spinlock.h>
786d7e16 25#include <linux/completion.h>
1da177e4
LT
26#include <asm/uaccess.h>
27
fee781e6
AB
28#include "internal.h"
29
64a07bd8
SR
30DEFINE_SPINLOCK(proc_subdir_lock);
31
312ec7e5 32static int proc_match(unsigned int len, const char *name, struct proc_dir_entry *de)
1da177e4
LT
33{
34 if (de->namelen != len)
35 return 0;
36 return !memcmp(name, de->name, len);
37}
38
1da177e4
LT
39static int proc_notify_change(struct dentry *dentry, struct iattr *iattr)
40{
41 struct inode *inode = dentry->d_inode;
42 struct proc_dir_entry *de = PDE(inode);
43 int error;
44
45 error = inode_change_ok(inode, iattr);
46 if (error)
1025774c 47 return error;
1da177e4 48
1025774c
CH
49 setattr_copy(inode, iattr);
50 mark_inode_dirty(inode);
46f69557 51
1da177e4
LT
52 de->uid = inode->i_uid;
53 de->gid = inode->i_gid;
54 de->mode = inode->i_mode;
1025774c 55 return 0;
1da177e4
LT
56}
57
2b579bee
MS
58static int proc_getattr(struct vfsmount *mnt, struct dentry *dentry,
59 struct kstat *stat)
60{
61 struct inode *inode = dentry->d_inode;
62 struct proc_dir_entry *de = PROC_I(inode)->pde;
63 if (de && de->nlink)
bfe86848 64 set_nlink(inode, de->nlink);
2b579bee
MS
65
66 generic_fillattr(inode, stat);
67 return 0;
68}
69
c5ef1c42 70static const struct inode_operations proc_file_inode_operations = {
1da177e4
LT
71 .setattr = proc_notify_change,
72};
73
74/*
75 * This function parses a name such as "tty/driver/serial", and
76 * returns the struct proc_dir_entry for "/proc/tty/driver", and
77 * returns "serial" in residual.
78 */
e17a5765
AD
79static int __xlate_proc_name(const char *name, struct proc_dir_entry **ret,
80 const char **residual)
1da177e4
LT
81{
82 const char *cp = name, *next;
83 struct proc_dir_entry *de;
312ec7e5 84 unsigned int len;
1da177e4 85
7cee4e00
AD
86 de = *ret;
87 if (!de)
88 de = &proc_root;
89
1da177e4
LT
90 while (1) {
91 next = strchr(cp, '/');
92 if (!next)
93 break;
94
95 len = next - cp;
96 for (de = de->subdir; de ; de = de->next) {
97 if (proc_match(len, cp, de))
98 break;
99 }
12bac0d9
AD
100 if (!de) {
101 WARN(1, "name '%s'\n", name);
e17a5765 102 return -ENOENT;
12bac0d9 103 }
1da177e4
LT
104 cp += len + 1;
105 }
106 *residual = cp;
107 *ret = de;
e17a5765
AD
108 return 0;
109}
110
111static int xlate_proc_name(const char *name, struct proc_dir_entry **ret,
112 const char **residual)
113{
114 int rv;
115
116 spin_lock(&proc_subdir_lock);
117 rv = __xlate_proc_name(name, ret, residual);
64a07bd8 118 spin_unlock(&proc_subdir_lock);
e17a5765 119 return rv;
1da177e4
LT
120}
121
9a185409 122static DEFINE_IDA(proc_inum_ida);
1da177e4
LT
123static DEFINE_SPINLOCK(proc_inum_lock); /* protects the above */
124
67935df4 125#define PROC_DYNAMIC_FIRST 0xF0000000U
1da177e4
LT
126
127/*
128 * Return an inode number between PROC_DYNAMIC_FIRST and
129 * 0xffffffff, or zero on failure.
130 */
33d6dce6 131int proc_alloc_inum(unsigned int *inum)
1da177e4 132{
67935df4 133 unsigned int i;
1da177e4
LT
134 int error;
135
136retry:
33d6dce6
EB
137 if (!ida_pre_get(&proc_inum_ida, GFP_KERNEL))
138 return -ENOMEM;
1da177e4 139
dfb2ea45 140 spin_lock_irq(&proc_inum_lock);
9a185409 141 error = ida_get_new(&proc_inum_ida, &i);
dfb2ea45 142 spin_unlock_irq(&proc_inum_lock);
1da177e4
LT
143 if (error == -EAGAIN)
144 goto retry;
145 else if (error)
33d6dce6 146 return error;
1da177e4 147
67935df4 148 if (i > UINT_MAX - PROC_DYNAMIC_FIRST) {
dfb2ea45 149 spin_lock_irq(&proc_inum_lock);
9a185409 150 ida_remove(&proc_inum_ida, i);
dfb2ea45 151 spin_unlock_irq(&proc_inum_lock);
33d6dce6 152 return -ENOSPC;
67935df4 153 }
33d6dce6
EB
154 *inum = PROC_DYNAMIC_FIRST + i;
155 return 0;
1da177e4
LT
156}
157
33d6dce6 158void proc_free_inum(unsigned int inum)
1da177e4 159{
dfb2ea45
EB
160 unsigned long flags;
161 spin_lock_irqsave(&proc_inum_lock, flags);
9a185409 162 ida_remove(&proc_inum_ida, inum - PROC_DYNAMIC_FIRST);
dfb2ea45 163 spin_unlock_irqrestore(&proc_inum_lock, flags);
1da177e4
LT
164}
165
008b150a 166static void *proc_follow_link(struct dentry *dentry, struct nameidata *nd)
1da177e4 167{
c30480b9 168 nd_set_link(nd, __PDE_DATA(dentry->d_inode));
008b150a 169 return NULL;
1da177e4
LT
170}
171
c5ef1c42 172static const struct inode_operations proc_link_inode_operations = {
1da177e4
LT
173 .readlink = generic_readlink,
174 .follow_link = proc_follow_link,
175};
176
177/*
178 * As some entries in /proc are volatile, we want to
179 * get rid of unused dentries. This could be made
180 * smarter: we could keep a "volatile" flag in the
181 * inode to indicate which ones to keep.
182 */
fe15ce44 183static int proc_delete_dentry(const struct dentry * dentry)
1da177e4
LT
184{
185 return 1;
186}
187
d72f71eb 188static const struct dentry_operations proc_dentry_operations =
1da177e4
LT
189{
190 .d_delete = proc_delete_dentry,
191};
192
193/*
194 * Don't create negative dentries here, return -ENOENT by hand
195 * instead.
196 */
e9720acd
PE
197struct dentry *proc_lookup_de(struct proc_dir_entry *de, struct inode *dir,
198 struct dentry *dentry)
1da177e4 199{
d3d009cb 200 struct inode *inode;
1da177e4 201
64a07bd8 202 spin_lock(&proc_subdir_lock);
5e971dce
AD
203 for (de = de->subdir; de ; de = de->next) {
204 if (de->namelen != dentry->d_name.len)
205 continue;
206 if (!memcmp(dentry->d_name.name, de->name, de->namelen)) {
135d5655 207 pde_get(de);
5e971dce 208 spin_unlock(&proc_subdir_lock);
6d1b6e4e 209 inode = proc_get_inode(dir->i_sb, de);
d3d009cb
AV
210 if (!inode)
211 return ERR_PTR(-ENOMEM);
212 d_set_d_op(dentry, &proc_dentry_operations);
213 d_add(dentry, inode);
214 return NULL;
1da177e4
LT
215 }
216 }
64a07bd8 217 spin_unlock(&proc_subdir_lock);
d3d009cb 218 return ERR_PTR(-ENOENT);
1da177e4
LT
219}
220
e9720acd 221struct dentry *proc_lookup(struct inode *dir, struct dentry *dentry,
00cd8dd3 222 unsigned int flags)
e9720acd
PE
223{
224 return proc_lookup_de(PDE(dir), dir, dentry);
225}
226
1da177e4
LT
227/*
228 * This returns non-zero if at EOF, so that the /proc
229 * root directory can use this and check if it should
230 * continue with the <pid> entries..
231 *
232 * Note that the VFS-layer doesn't care about the return
233 * value of the readdir() call, as long as it's non-negative
234 * for success..
235 */
e9720acd
PE
236int proc_readdir_de(struct proc_dir_entry *de, struct file *filp, void *dirent,
237 filldir_t filldir)
1da177e4 238{
1da177e4
LT
239 unsigned int ino;
240 int i;
496ad9aa 241 struct inode *inode = file_inode(filp);
1da177e4
LT
242 int ret = 0;
243
1da177e4 244 ino = inode->i_ino;
1da177e4
LT
245 i = filp->f_pos;
246 switch (i) {
247 case 0:
248 if (filldir(dirent, ".", 1, i, ino, DT_DIR) < 0)
249 goto out;
250 i++;
251 filp->f_pos++;
252 /* fall through */
253 case 1:
254 if (filldir(dirent, "..", 2, i,
2fddfeef 255 parent_ino(filp->f_path.dentry),
1da177e4
LT
256 DT_DIR) < 0)
257 goto out;
258 i++;
259 filp->f_pos++;
260 /* fall through */
261 default:
64a07bd8 262 spin_lock(&proc_subdir_lock);
1da177e4
LT
263 de = de->subdir;
264 i -= 2;
265 for (;;) {
266 if (!de) {
267 ret = 1;
64a07bd8 268 spin_unlock(&proc_subdir_lock);
1da177e4
LT
269 goto out;
270 }
271 if (!i)
272 break;
273 de = de->next;
274 i--;
275 }
276
277 do {
59cd0cbc
DW
278 struct proc_dir_entry *next;
279
64a07bd8 280 /* filldir passes info to user space */
135d5655 281 pde_get(de);
64a07bd8 282 spin_unlock(&proc_subdir_lock);
1da177e4 283 if (filldir(dirent, de->name, de->namelen, filp->f_pos,
59cd0cbc 284 de->low_ino, de->mode >> 12) < 0) {
135d5655 285 pde_put(de);
1da177e4 286 goto out;
59cd0cbc 287 }
64a07bd8 288 spin_lock(&proc_subdir_lock);
1da177e4 289 filp->f_pos++;
59cd0cbc 290 next = de->next;
135d5655 291 pde_put(de);
59cd0cbc 292 de = next;
1da177e4 293 } while (de);
64a07bd8 294 spin_unlock(&proc_subdir_lock);
1da177e4
LT
295 }
296 ret = 1;
b4df2b92 297out:
1da177e4
LT
298 return ret;
299}
300
e9720acd
PE
301int proc_readdir(struct file *filp, void *dirent, filldir_t filldir)
302{
496ad9aa 303 struct inode *inode = file_inode(filp);
e9720acd
PE
304
305 return proc_readdir_de(PDE(inode), filp, dirent, filldir);
306}
307
1da177e4
LT
308/*
309 * These are the generic /proc directory operations. They
310 * use the in-memory "struct proc_dir_entry" tree to parse
311 * the /proc directory.
312 */
00977a59 313static const struct file_operations proc_dir_operations = {
b4df2b92 314 .llseek = generic_file_llseek,
1da177e4
LT
315 .read = generic_read_dir,
316 .readdir = proc_readdir,
317};
318
319/*
320 * proc directories can do almost nothing..
321 */
c5ef1c42 322static const struct inode_operations proc_dir_inode_operations = {
1da177e4 323 .lookup = proc_lookup,
2b579bee 324 .getattr = proc_getattr,
1da177e4
LT
325 .setattr = proc_notify_change,
326};
327
328static int proc_register(struct proc_dir_entry * dir, struct proc_dir_entry * dp)
329{
94413d88 330 struct proc_dir_entry *tmp;
33d6dce6 331 int ret;
1da177e4 332
33d6dce6
EB
333 ret = proc_alloc_inum(&dp->low_ino);
334 if (ret)
335 return ret;
64a07bd8 336
1da177e4 337 if (S_ISDIR(dp->mode)) {
b6cdc731
AV
338 dp->proc_fops = &proc_dir_operations;
339 dp->proc_iops = &proc_dir_inode_operations;
1da177e4
LT
340 dir->nlink++;
341 } else if (S_ISLNK(dp->mode)) {
b6cdc731 342 dp->proc_iops = &proc_link_inode_operations;
1da177e4 343 } else if (S_ISREG(dp->mode)) {
3cb5bf1b 344 BUG_ON(dp->proc_fops == NULL);
b6cdc731
AV
345 dp->proc_iops = &proc_file_inode_operations;
346 } else {
347 WARN_ON(1);
348 return -EINVAL;
1da177e4 349 }
99fc06df
CG
350
351 spin_lock(&proc_subdir_lock);
94413d88
ZR
352
353 for (tmp = dir->subdir; tmp; tmp = tmp->next)
354 if (strcmp(tmp->name, dp->name) == 0) {
87ebdc00 355 WARN(1, "proc_dir_entry '%s/%s' already registered\n",
665020c3 356 dir->name, dp->name);
94413d88
ZR
357 break;
358 }
359
99fc06df
CG
360 dp->next = dir->subdir;
361 dp->parent = dir;
362 dir->subdir = dp;
363 spin_unlock(&proc_subdir_lock);
364
1da177e4
LT
365 return 0;
366}
367
2d3a4e36 368static struct proc_dir_entry *__proc_create(struct proc_dir_entry **parent,
1da177e4 369 const char *name,
d161a13f 370 umode_t mode,
1da177e4
LT
371 nlink_t nlink)
372{
373 struct proc_dir_entry *ent = NULL;
374 const char *fn = name;
312ec7e5 375 unsigned int len;
1da177e4
LT
376
377 /* make sure name is valid */
17baa2a2 378 if (!name || !strlen(name))
379 goto out;
1da177e4 380
7cee4e00 381 if (xlate_proc_name(name, parent, &fn) != 0)
1da177e4
LT
382 goto out;
383
384 /* At this point there must not be any '/' characters beyond *fn */
385 if (strchr(fn, '/'))
386 goto out;
387
388 len = strlen(fn);
389
17baa2a2 390 ent = kzalloc(sizeof(struct proc_dir_entry) + len + 1, GFP_KERNEL);
391 if (!ent)
392 goto out;
1da177e4 393
09570f91 394 memcpy(ent->name, fn, len + 1);
1da177e4
LT
395 ent->namelen = len;
396 ent->mode = mode;
397 ent->nlink = nlink;
5a622f2d 398 atomic_set(&ent->count, 1);
786d7e16 399 spin_lock_init(&ent->pde_unload_lock);
881adb85 400 INIT_LIST_HEAD(&ent->pde_openers);
17baa2a2 401out:
1da177e4
LT
402 return ent;
403}
404
405struct proc_dir_entry *proc_symlink(const char *name,
406 struct proc_dir_entry *parent, const char *dest)
407{
408 struct proc_dir_entry *ent;
409
2d3a4e36 410 ent = __proc_create(&parent, name,
1da177e4
LT
411 (S_IFLNK | S_IRUGO | S_IWUGO | S_IXUGO),1);
412
413 if (ent) {
414 ent->data = kmalloc((ent->size=strlen(dest))+1, GFP_KERNEL);
415 if (ent->data) {
416 strcpy((char*)ent->data,dest);
417 if (proc_register(parent, ent) < 0) {
418 kfree(ent->data);
419 kfree(ent);
420 ent = NULL;
421 }
422 } else {
423 kfree(ent);
424 ent = NULL;
425 }
426 }
427 return ent;
428}
587d4a17 429EXPORT_SYMBOL(proc_symlink);
1da177e4 430
270b5ac2
DH
431struct proc_dir_entry *proc_mkdir_data(const char *name, umode_t mode,
432 struct proc_dir_entry *parent, void *data)
1da177e4
LT
433{
434 struct proc_dir_entry *ent;
435
270b5ac2
DH
436 if (mode == 0)
437 mode = S_IRUGO | S_IXUGO;
438
2d3a4e36 439 ent = __proc_create(&parent, name, S_IFDIR | mode, 2);
1da177e4 440 if (ent) {
270b5ac2 441 ent->data = data;
1da177e4
LT
442 if (proc_register(parent, ent) < 0) {
443 kfree(ent);
444 ent = NULL;
445 }
446 }
447 return ent;
448}
270b5ac2 449EXPORT_SYMBOL_GPL(proc_mkdir_data);
1da177e4 450
270b5ac2
DH
451struct proc_dir_entry *proc_mkdir_mode(const char *name, umode_t mode,
452 struct proc_dir_entry *parent)
78e92b99 453{
270b5ac2 454 return proc_mkdir_data(name, mode, parent, NULL);
78e92b99 455}
270b5ac2 456EXPORT_SYMBOL(proc_mkdir_mode);
78e92b99 457
1da177e4
LT
458struct proc_dir_entry *proc_mkdir(const char *name,
459 struct proc_dir_entry *parent)
460{
270b5ac2 461 return proc_mkdir_data(name, 0, parent, NULL);
1da177e4 462}
587d4a17 463EXPORT_SYMBOL(proc_mkdir);
1da177e4 464
d161a13f 465struct proc_dir_entry *proc_create_data(const char *name, umode_t mode,
59b74351
DL
466 struct proc_dir_entry *parent,
467 const struct file_operations *proc_fops,
468 void *data)
2d3a4e36
AD
469{
470 struct proc_dir_entry *pde;
b6cdc731
AV
471 if ((mode & S_IFMT) == 0)
472 mode |= S_IFREG;
2d3a4e36 473
b6cdc731
AV
474 if (!S_ISREG(mode)) {
475 WARN_ON(1); /* use proc_mkdir() */
476 return NULL;
2d3a4e36
AD
477 }
478
b6cdc731
AV
479 if ((mode & S_IALLUGO) == 0)
480 mode |= S_IRUGO;
481 pde = __proc_create(&parent, name, mode, 1);
2d3a4e36
AD
482 if (!pde)
483 goto out;
484 pde->proc_fops = proc_fops;
59b74351 485 pde->data = data;
2d3a4e36
AD
486 if (proc_register(parent, pde) < 0)
487 goto out_free;
488 return pde;
489out_free:
490 kfree(pde);
491out:
492 return NULL;
493}
587d4a17 494EXPORT_SYMBOL(proc_create_data);
271a15ea
DH
495
496void proc_set_size(struct proc_dir_entry *de, loff_t size)
497{
498 de->size = size;
499}
500EXPORT_SYMBOL(proc_set_size);
501
502void proc_set_user(struct proc_dir_entry *de, kuid_t uid, kgid_t gid)
503{
504 de->uid = uid;
505 de->gid = gid;
506}
507EXPORT_SYMBOL(proc_set_user);
2d3a4e36 508
135d5655 509static void free_proc_entry(struct proc_dir_entry *de)
1da177e4 510{
33d6dce6 511 proc_free_inum(de->low_ino);
1da177e4 512
fd2cbe48 513 if (S_ISLNK(de->mode))
1da177e4
LT
514 kfree(de->data);
515 kfree(de);
516}
517
135d5655
AD
518void pde_put(struct proc_dir_entry *pde)
519{
520 if (atomic_dec_and_test(&pde->count))
521 free_proc_entry(pde);
522}
523
8ce584c7
AV
524/*
525 * Remove a /proc entry and free it if it's not currently in use.
526 */
527void remove_proc_entry(const char *name, struct proc_dir_entry *parent)
528{
529 struct proc_dir_entry **p;
530 struct proc_dir_entry *de = NULL;
531 const char *fn = name;
532 unsigned int len;
533
534 spin_lock(&proc_subdir_lock);
535 if (__xlate_proc_name(name, &parent, &fn) != 0) {
536 spin_unlock(&proc_subdir_lock);
537 return;
538 }
539 len = strlen(fn);
540
541 for (p = &parent->subdir; *p; p=&(*p)->next ) {
542 if (proc_match(len, fn, *p)) {
543 de = *p;
544 *p = de->next;
545 de->next = NULL;
546 break;
547 }
548 }
549 spin_unlock(&proc_subdir_lock);
550 if (!de) {
551 WARN(1, "name '%s'\n", name);
552 return;
553 }
554
866ad9a7 555 proc_entry_rundown(de);
881adb85 556
f649d6d3
AD
557 if (S_ISDIR(de->mode))
558 parent->nlink--;
559 de->nlink = 0;
87ebdc00
AM
560 WARN(de->subdir, "%s: removing non-empty directory "
561 "'%s/%s', leaking at least '%s'\n", __func__,
562 de->parent->name, de->name, de->subdir->name);
135d5655 563 pde_put(de);
1da177e4 564}
587d4a17 565EXPORT_SYMBOL(remove_proc_entry);
8ce584c7
AV
566
567int remove_proc_subtree(const char *name, struct proc_dir_entry *parent)
568{
569 struct proc_dir_entry **p;
570 struct proc_dir_entry *root = NULL, *de, *next;
571 const char *fn = name;
572 unsigned int len;
573
574 spin_lock(&proc_subdir_lock);
575 if (__xlate_proc_name(name, &parent, &fn) != 0) {
576 spin_unlock(&proc_subdir_lock);
577 return -ENOENT;
578 }
579 len = strlen(fn);
580
581 for (p = &parent->subdir; *p; p=&(*p)->next ) {
582 if (proc_match(len, fn, *p)) {
583 root = *p;
584 *p = root->next;
585 root->next = NULL;
586 break;
587 }
588 }
589 if (!root) {
590 spin_unlock(&proc_subdir_lock);
591 return -ENOENT;
592 }
593 de = root;
594 while (1) {
595 next = de->subdir;
596 if (next) {
597 de->subdir = next->next;
598 next->next = NULL;
599 de = next;
600 continue;
601 }
602 spin_unlock(&proc_subdir_lock);
603
866ad9a7 604 proc_entry_rundown(de);
8ce584c7
AV
605 next = de->parent;
606 if (S_ISDIR(de->mode))
607 next->nlink--;
608 de->nlink = 0;
609 if (de == root)
610 break;
611 pde_put(de);
612
613 spin_lock(&proc_subdir_lock);
614 de = next;
615 }
616 pde_put(root);
617 return 0;
618}
619EXPORT_SYMBOL(remove_proc_subtree);
4a520d27
DH
620
621void *proc_get_parent_data(const struct inode *inode)
622{
623 struct proc_dir_entry *de = PDE(inode);
624 return de->parent->data;
625}
626EXPORT_SYMBOL_GPL(proc_get_parent_data);
a8ca16ea
DH
627
628void proc_remove(struct proc_dir_entry *de)
629{
630 if (de)
631 remove_proc_subtree(de->name, de->parent);
632}
633EXPORT_SYMBOL(proc_remove);
c30480b9
DH
634
635void *PDE_DATA(const struct inode *inode)
636{
637 return __PDE_DATA(inode);
638}
639EXPORT_SYMBOL(PDE_DATA);