Home | History | Annotate | Line # | Download | only in procfs
procfs_subr.c revision 1.36
      1 /*	$NetBSD: procfs_subr.c,v 1.36 2001/01/18 20:28:21 jdolecek Exp $	*/
      2 
      3 /*
      4  * Copyright (c) 1994 Christopher G. Demetriou.  All rights reserved.
      5  * Copyright (c) 1993 Jan-Simon Pendry
      6  * Copyright (c) 1993
      7  *	The Regents of the University of California.  All rights reserved.
      8  *
      9  * This code is derived from software contributed to Berkeley by
     10  * Jan-Simon Pendry.
     11  *
     12  * Redistribution and use in source and binary forms, with or without
     13  * modification, are permitted provided that the following conditions
     14  * are met:
     15  * 1. Redistributions of source code must retain the above copyright
     16  *    notice, this list of conditions and the following disclaimer.
     17  * 2. Redistributions in binary form must reproduce the above copyright
     18  *    notice, this list of conditions and the following disclaimer in the
     19  *    documentation and/or other materials provided with the distribution.
     20  * 3. All advertising materials mentioning features or use of this software
     21  *    must display the following acknowledgement:
     22  *	This product includes software developed by the University of
     23  *	California, Berkeley and its contributors.
     24  * 4. Neither the name of the University nor the names of its contributors
     25  *    may be used to endorse or promote products derived from this software
     26  *    without specific prior written permission.
     27  *
     28  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
     29  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
     30  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
     31  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
     32  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
     33  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
     34  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
     35  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
     36  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
     37  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
     38  * SUCH DAMAGE.
     39  *
     40  *	@(#)procfs_subr.c	8.6 (Berkeley) 5/14/95
     41  */
     42 
     43 #include <sys/param.h>
     44 #include <sys/systm.h>
     45 #include <sys/time.h>
     46 #include <sys/kernel.h>
     47 #include <sys/proc.h>
     48 #include <sys/vnode.h>
     49 #include <sys/malloc.h>
     50 #include <sys/stat.h>
     51 
     52 #include <miscfs/procfs/procfs.h>
     53 
     54 void procfs_hashins __P((struct pfsnode *));
     55 void procfs_hashrem __P((struct pfsnode *));
     56 struct vnode *procfs_hashget __P((pid_t, pfstype, struct mount *));
     57 
     58 LIST_HEAD(pfs_hashhead, pfsnode) *pfs_hashtbl;
     59 u_long	pfs_ihash;	/* size of hash table - 1 */
     60 #define PFSPIDHASH(pid)	(&pfs_hashtbl[(pid) & pfs_ihash])
     61 
     62 struct lock pfs_hashlock;
     63 struct simplelock pfs_hash_slock;
     64 
     65 #define	ISSET(t, f)	((t) & (f))
     66 
     67 /*
     68  * allocate a pfsnode/vnode pair.  the vnode is
     69  * referenced, and locked.
     70  *
     71  * the pid, pfs_type, and mount point uniquely
     72  * identify a pfsnode.  the mount point is needed
     73  * because someone might mount this filesystem
     74  * twice.
     75  *
     76  * all pfsnodes are maintained on a singly-linked
     77  * list.  new nodes are only allocated when they cannot
     78  * be found on this list.  entries on the list are
     79  * removed when the vfs reclaim entry is called.
     80  *
     81  * a single lock is kept for the entire list.  this is
     82  * needed because the getnewvnode() function can block
     83  * waiting for a vnode to become free, in which case there
     84  * may be more than one process trying to get the same
     85  * vnode.  this lock is only taken if we are going to
     86  * call getnewvnode, since the kernel itself is single-threaded.
     87  *
     88  * if an entry is found on the list, then call vget() to
     89  * take a reference.  this is done because there may be
     90  * zero references to it and so it needs to removed from
     91  * the vnode free list.
     92  */
     93 int
     94 procfs_allocvp(mp, vpp, pid, pfs_type)
     95 	struct mount *mp;
     96 	struct vnode **vpp;
     97 	long pid;
     98 	pfstype pfs_type;
     99 {
    100 	struct pfsnode *pfs;
    101 	struct vnode *vp;
    102 	int error;
    103 
    104 	do {
    105 		if ((*vpp = procfs_hashget(pid, pfs_type, mp)) != NULL)
    106 			return (0);
    107 	} while (lockmgr(&pfs_hashlock, LK_EXCLUSIVE|LK_SLEEPFAIL, 0));
    108 
    109 	if ((error = getnewvnode(VT_PROCFS, mp, procfs_vnodeop_p, vpp)) != 0) {
    110 		*vpp = NULL;
    111 		lockmgr(&pfs_hashlock, LK_RELEASE, NULL);
    112 		return (error);
    113 	}
    114 	vp = *vpp;
    115 
    116 	MALLOC(pfs, void *, sizeof(struct pfsnode), M_TEMP, M_WAITOK);
    117 	vp->v_data = pfs;
    118 
    119 	pfs->pfs_pid = (pid_t) pid;
    120 	pfs->pfs_type = pfs_type;
    121 	pfs->pfs_vnode = vp;
    122 	pfs->pfs_flags = 0;
    123 	pfs->pfs_fileno = PROCFS_FILENO(pid, pfs_type);
    124 
    125 	switch (pfs_type) {
    126 	case Proot:	/* /proc = dr-xr-xr-x */
    127 		pfs->pfs_mode = S_IRUSR|S_IXUSR|S_IRGRP|S_IXGRP|S_IROTH|S_IXOTH;
    128 		vp->v_type = VDIR;
    129 		vp->v_flag = VROOT;
    130 		break;
    131 
    132 	case Pcurproc:	/* /proc/curproc = lr-xr-xr-x */
    133 	case Pself:	/* /proc/self    = lr-xr-xr-x */
    134 		pfs->pfs_mode = S_IRUSR|S_IXUSR|S_IRGRP|S_IXGRP|S_IROTH|S_IXOTH;
    135 		vp->v_type = VLNK;
    136 		break;
    137 
    138 	case Pproc:	/* /proc/N = dr-xr-xr-x */
    139 		pfs->pfs_mode = S_IRUSR|S_IXUSR|S_IRGRP|S_IXGRP|S_IROTH|S_IXOTH;
    140 		vp->v_type = VDIR;
    141 		break;
    142 
    143 	case Pfile:	/* /proc/N/file = -rw------- */
    144 	case Pmem:	/* /proc/N/mem = -rw------- */
    145 	case Pregs:	/* /proc/N/regs = -rw------- */
    146 	case Pfpregs:	/* /proc/N/fpregs = -rw------- */
    147 		pfs->pfs_mode = S_IRUSR|S_IWUSR;
    148 		vp->v_type = VREG;
    149 		break;
    150 
    151 	case Pctl:	/* /proc/N/ctl = --w------ */
    152 	case Pnote:	/* /proc/N/note = --w------ */
    153 	case Pnotepg:	/* /proc/N/notepg = --w------ */
    154 		pfs->pfs_mode = S_IWUSR;
    155 		vp->v_type = VREG;
    156 		break;
    157 
    158 	case Pmap:	/* /proc/N/map = -r--r--r-- */
    159 	case Pstatus:	/* /proc/N/status = -r--r--r-- */
    160 	case Pcmdline:	/* /proc/N/cmdline = -r--r--r-- */
    161 	case Pmeminfo:	/* /proc/meminfo = -r--r--r-- */
    162 	case Pcpuinfo:	/* /proc/cpuinfo = -r--r--r-- */
    163 		pfs->pfs_mode = S_IRUSR|S_IRGRP|S_IROTH;
    164 		vp->v_type = VREG;
    165 		break;
    166 
    167 	default:
    168 		panic("procfs_allocvp");
    169 	}
    170 
    171 	procfs_hashins(pfs);
    172 	uvm_vnp_setsize(vp, 0);
    173 	lockmgr(&pfs_hashlock, LK_RELEASE, NULL);
    174 
    175 	return (error);
    176 }
    177 
    178 int
    179 procfs_freevp(vp)
    180 	struct vnode *vp;
    181 {
    182 	struct pfsnode *pfs = VTOPFS(vp);
    183 
    184 	procfs_hashrem(pfs);
    185 
    186 	FREE(vp->v_data, M_TEMP);
    187 	vp->v_data = 0;
    188 	return (0);
    189 }
    190 
    191 int
    192 procfs_rw(v)
    193 	void *v;
    194 {
    195 	struct vop_read_args *ap = v;
    196 	struct vnode *vp = ap->a_vp;
    197 	struct uio *uio = ap->a_uio;
    198 	struct proc *curp = uio->uio_procp;
    199 	struct pfsnode *pfs = VTOPFS(vp);
    200 	struct proc *p;
    201 
    202 	p = PFIND(pfs->pfs_pid);
    203 	if (p == 0)
    204 		return (EINVAL);
    205 
    206 	switch (pfs->pfs_type) {
    207 	case Pregs:
    208 	case Pfpregs:
    209 	case Pmem:
    210 		/*
    211 		 * Do not allow init to be modified while in secure mode; it
    212 		 * could be duped into changing the security level.
    213 		 */
    214 		if (uio->uio_rw == UIO_WRITE &&
    215 		    p == initproc && securelevel > -1)
    216 			return (EPERM);
    217 		break;
    218 
    219 	default:
    220 		break;
    221 	}
    222 
    223 	switch (pfs->pfs_type) {
    224 	case Pnote:
    225 	case Pnotepg:
    226 		return (procfs_donote(curp, p, pfs, uio));
    227 
    228 	case Pregs:
    229 		return (procfs_doregs(curp, p, pfs, uio));
    230 
    231 	case Pfpregs:
    232 		return (procfs_dofpregs(curp, p, pfs, uio));
    233 
    234 	case Pctl:
    235 		return (procfs_doctl(curp, p, pfs, uio));
    236 
    237 	case Pstatus:
    238 		return (procfs_dostatus(curp, p, pfs, uio));
    239 
    240 	case Pmap:
    241 		return (procfs_domap(curp, p, pfs, uio));
    242 
    243 	case Pmem:
    244 		return (procfs_domem(curp, p, pfs, uio));
    245 
    246 	case Pcmdline:
    247 		return (procfs_docmdline(curp, p, pfs, uio));
    248 
    249 	case Pmeminfo:
    250 		return (procfs_domeminfo(curp, p, pfs, uio));
    251 	case Pcpuinfo:
    252 		return (procfs_docpuinfo(curp, p, pfs, uio));
    253 
    254 	default:
    255 		return (EOPNOTSUPP);
    256 	}
    257 }
    258 
    259 /*
    260  * Get a string from userland into (buf).  Strip a trailing
    261  * nl character (to allow easy access from the shell).
    262  * The buffer should be *buflenp + 1 chars long.  vfs_getuserstr
    263  * will automatically add a nul char at the end.
    264  *
    265  * Returns 0 on success or the following errors
    266  *
    267  * EINVAL:    file offset is non-zero.
    268  * EMSGSIZE:  message is longer than kernel buffer
    269  * EFAULT:    user i/o buffer is not addressable
    270  */
    271 int
    272 vfs_getuserstr(uio, buf, buflenp)
    273 	struct uio *uio;
    274 	char *buf;
    275 	int *buflenp;
    276 {
    277 	int xlen;
    278 	int error;
    279 
    280 	if (uio->uio_offset != 0)
    281 		return (EINVAL);
    282 
    283 	xlen = *buflenp;
    284 
    285 	/* must be able to read the whole string in one go */
    286 	if (xlen < uio->uio_resid)
    287 		return (EMSGSIZE);
    288 	xlen = uio->uio_resid;
    289 
    290 	if ((error = uiomove(buf, xlen, uio)) != 0)
    291 		return (error);
    292 
    293 	/* allow multiple writes without seeks */
    294 	uio->uio_offset = 0;
    295 
    296 	/* cleanup string and remove trailing newline */
    297 	buf[xlen] = '\0';
    298 	xlen = strlen(buf);
    299 	if (xlen > 0 && buf[xlen-1] == '\n')
    300 		buf[--xlen] = '\0';
    301 	*buflenp = xlen;
    302 
    303 	return (0);
    304 }
    305 
    306 const vfs_namemap_t *
    307 vfs_findname(nm, buf, buflen)
    308 	const vfs_namemap_t *nm;
    309 	const char *buf;
    310 	int buflen;
    311 {
    312 
    313 	for (; nm->nm_name; nm++)
    314 		if (memcmp(buf, nm->nm_name, buflen+1) == 0)
    315 			return (nm);
    316 
    317 	return (0);
    318 }
    319 
    320 /*
    321  * Initialize pfsnode hash table.
    322  */
    323 void
    324 procfs_hashinit()
    325 {
    326 	lockinit(&pfs_hashlock, PINOD, "pfs_hashlock", 0, 0);
    327 	pfs_hashtbl = hashinit(desiredvnodes / 4, HASH_LIST, M_UFSMNT,
    328 	    M_WAITOK, &pfs_ihash);
    329 	simple_lock_init(&pfs_hash_slock);
    330 }
    331 
    332 /*
    333  * Free pfsnode hash table.
    334  */
    335 void
    336 procfs_hashdone()
    337 {
    338 	hashdone(pfs_hashtbl, M_UFSMNT);
    339 }
    340 
    341 struct vnode *
    342 procfs_hashget(pid, type, mp)
    343 	pid_t pid;
    344 	pfstype type;
    345 	struct mount *mp;
    346 {
    347 	struct pfsnode *pp;
    348 	struct vnode *vp;
    349 
    350 loop:
    351 	simple_lock(&pfs_hash_slock);
    352 	for (pp = PFSPIDHASH(pid)->lh_first; pp; pp = pp->pfs_hash.le_next) {
    353 		vp = PFSTOV(pp);
    354 		if (pid == pp->pfs_pid && pp->pfs_type == type &&
    355 		    vp->v_mount == mp) {
    356 			simple_lock(&vp->v_interlock);
    357 			simple_unlock(&pfs_hash_slock);
    358 			if (vget(vp, LK_EXCLUSIVE | LK_INTERLOCK))
    359 				goto loop;
    360 			return (vp);
    361 		}
    362 	}
    363 	simple_unlock(&pfs_hash_slock);
    364 	return (NULL);
    365 }
    366 
    367 /*
    368  * Insert the pfsnode into the hash table and lock it.
    369  */
    370 void
    371 procfs_hashins(pp)
    372 	struct pfsnode *pp;
    373 {
    374 	struct pfs_hashhead *ppp;
    375 
    376 	/* lock the pfsnode, then put it on the appropriate hash list */
    377 	lockmgr(&pp->pfs_vnode->v_lock, LK_EXCLUSIVE, (struct simplelock *)0);
    378 
    379 	simple_lock(&pfs_hash_slock);
    380 	ppp = PFSPIDHASH(pp->pfs_pid);
    381 	LIST_INSERT_HEAD(ppp, pp, pfs_hash);
    382 	simple_unlock(&pfs_hash_slock);
    383 }
    384 
    385 /*
    386  * Remove the pfsnode from the hash table.
    387  */
    388 void
    389 procfs_hashrem(pp)
    390 	struct pfsnode *pp;
    391 {
    392 	simple_lock(&pfs_hash_slock);
    393 	LIST_REMOVE(pp, pfs_hash);
    394 	simple_unlock(&pfs_hash_slock);
    395 }
    396 
    397 void
    398 procfs_revoke_vnodes(p, arg)
    399 	struct proc *p;
    400 	void *arg;
    401 {
    402 	struct pfsnode *pfs, *pnext;
    403 	struct vnode *vp;
    404 	struct mount *mp = (struct mount *)arg;
    405 
    406 	if (!(p->p_flag & P_SUGID))
    407 		return;
    408 
    409 	for (pfs = PFSPIDHASH(p->p_pid)->lh_first; pfs; pfs = pnext) {
    410 		vp = PFSTOV(pfs);
    411 		pnext = pfs->pfs_hash.le_next;
    412 		if (vp->v_usecount > 0 && pfs->pfs_pid == p->p_pid &&
    413 		    vp->v_mount == mp)
    414 			VOP_REVOKE(vp, REVOKEALL);
    415 	}
    416 }
    417