4 #include <linux/init.h>
5 #include <linux/sysctl.h>
6 #include <linux/proc_fs.h>
7 #include <linux/security.h>
8 #include <linux/namei.h>
11 static const struct dentry_operations proc_sys_dentry_operations
;
12 static const struct file_operations proc_sys_file_operations
;
13 static const struct inode_operations proc_sys_inode_operations
;
14 static const struct file_operations proc_sys_dir_file_operations
;
15 static const struct inode_operations proc_sys_dir_operations
;
17 static struct inode
*proc_sys_make_inode(struct super_block
*sb
,
18 struct ctl_table_header
*head
, struct ctl_table
*table
)
21 struct proc_inode
*ei
;
23 inode
= new_inode(sb
);
27 inode
->i_ino
= get_next_ino();
29 sysctl_head_get(head
);
32 ei
->sysctl_entry
= table
;
34 inode
->i_mtime
= inode
->i_atime
= inode
->i_ctime
= CURRENT_TIME
;
35 inode
->i_mode
= table
->mode
;
37 inode
->i_mode
|= S_IFREG
;
38 inode
->i_op
= &proc_sys_inode_operations
;
39 inode
->i_fop
= &proc_sys_file_operations
;
41 inode
->i_mode
|= S_IFDIR
;
43 inode
->i_op
= &proc_sys_dir_operations
;
44 inode
->i_fop
= &proc_sys_dir_file_operations
;
50 static struct ctl_table
*find_in_table(struct ctl_table
*p
, struct qstr
*name
)
53 for ( ; p
->procname
; p
++) {
58 len
= strlen(p
->procname
);
62 if (memcmp(p
->procname
, name
->name
, len
) != 0)
71 static struct ctl_table_header
*grab_header(struct inode
*inode
)
73 if (PROC_I(inode
)->sysctl
)
74 return sysctl_head_grab(PROC_I(inode
)->sysctl
);
76 return sysctl_head_next(NULL
);
79 static struct dentry
*proc_sys_lookup(struct inode
*dir
, struct dentry
*dentry
,
82 struct ctl_table_header
*head
= grab_header(dir
);
83 struct ctl_table
*table
= PROC_I(dir
)->sysctl_entry
;
84 struct ctl_table_header
*h
= NULL
;
85 struct qstr
*name
= &dentry
->d_name
;
88 struct dentry
*err
= ERR_PTR(-ENOENT
);
91 return ERR_CAST(head
);
93 if (table
&& !table
->child
) {
98 table
= table
? table
->child
: head
->ctl_table
;
100 p
= find_in_table(table
, name
);
102 for (h
= sysctl_head_next(NULL
); h
; h
= sysctl_head_next(h
)) {
103 if (h
->attached_to
!= table
)
105 p
= find_in_table(h
->attached_by
, name
);
114 err
= ERR_PTR(-ENOMEM
);
115 inode
= proc_sys_make_inode(dir
->i_sb
, h
? h
: head
, p
);
117 sysctl_head_finish(h
);
123 d_set_d_op(dentry
, &proc_sys_dentry_operations
);
124 d_add(dentry
, inode
);
127 sysctl_head_finish(head
);
131 static ssize_t
proc_sys_call_handler(struct file
*filp
, void __user
*buf
,
132 size_t count
, loff_t
*ppos
, int write
)
134 struct inode
*inode
= filp
->f_path
.dentry
->d_inode
;
135 struct ctl_table_header
*head
= grab_header(inode
);
136 struct ctl_table
*table
= PROC_I(inode
)->sysctl_entry
;
141 return PTR_ERR(head
);
144 * At this point we know that the sysctl was not unregistered
145 * and won't be until we finish.
148 if (sysctl_perm(head
->root
, table
, write
? MAY_WRITE
: MAY_READ
))
151 /* if that can happen at all, it should be -EINVAL, not -EISDIR */
153 if (!table
->proc_handler
)
156 /* careful: calling conventions are nasty here */
158 error
= table
->proc_handler(table
, write
, buf
, &res
, ppos
);
162 sysctl_head_finish(head
);
167 static ssize_t
proc_sys_read(struct file
*filp
, char __user
*buf
,
168 size_t count
, loff_t
*ppos
)
170 return proc_sys_call_handler(filp
, (void __user
*)buf
, count
, ppos
, 0);
173 static ssize_t
proc_sys_write(struct file
*filp
, const char __user
*buf
,
174 size_t count
, loff_t
*ppos
)
176 return proc_sys_call_handler(filp
, (void __user
*)buf
, count
, ppos
, 1);
180 static int proc_sys_fill_cache(struct file
*filp
, void *dirent
,
182 struct ctl_table_header
*head
,
183 struct ctl_table
*table
)
185 struct dentry
*child
, *dir
= filp
->f_path
.dentry
;
189 unsigned type
= DT_UNKNOWN
;
191 qname
.name
= table
->procname
;
192 qname
.len
= strlen(table
->procname
);
193 qname
.hash
= full_name_hash(qname
.name
, qname
.len
);
195 child
= d_lookup(dir
, &qname
);
197 child
= d_alloc(dir
, &qname
);
199 inode
= proc_sys_make_inode(dir
->d_sb
, head
, table
);
204 d_set_d_op(child
, &proc_sys_dentry_operations
);
211 inode
= child
->d_inode
;
213 type
= inode
->i_mode
>> 12;
215 return !!filldir(dirent
, qname
.name
, qname
.len
, filp
->f_pos
, ino
, type
);
218 static int scan(struct ctl_table_header
*head
, ctl_table
*table
,
219 unsigned long *pos
, struct file
*file
,
220 void *dirent
, filldir_t filldir
)
223 for (; table
->procname
; table
++, (*pos
)++) {
226 /* Can't do anything without a proc name */
227 if (!table
->procname
)
230 if (*pos
< file
->f_pos
)
233 res
= proc_sys_fill_cache(file
, dirent
, filldir
, head
, table
);
237 file
->f_pos
= *pos
+ 1;
242 static int proc_sys_readdir(struct file
*filp
, void *dirent
, filldir_t filldir
)
244 struct dentry
*dentry
= filp
->f_path
.dentry
;
245 struct inode
*inode
= dentry
->d_inode
;
246 struct ctl_table_header
*head
= grab_header(inode
);
247 struct ctl_table
*table
= PROC_I(inode
)->sysctl_entry
;
248 struct ctl_table_header
*h
= NULL
;
253 return PTR_ERR(head
);
255 if (table
&& !table
->child
) {
260 table
= table
? table
->child
: head
->ctl_table
;
263 /* Avoid a switch here: arm builds fail with missing __cmpdi2 */
264 if (filp
->f_pos
== 0) {
265 if (filldir(dirent
, ".", 1, filp
->f_pos
,
266 inode
->i_ino
, DT_DIR
) < 0)
270 if (filp
->f_pos
== 1) {
271 if (filldir(dirent
, "..", 2, filp
->f_pos
,
272 parent_ino(dentry
), DT_DIR
) < 0)
278 ret
= scan(head
, table
, &pos
, filp
, dirent
, filldir
);
282 for (h
= sysctl_head_next(NULL
); h
; h
= sysctl_head_next(h
)) {
283 if (h
->attached_to
!= table
)
285 ret
= scan(h
, h
->attached_by
, &pos
, filp
, dirent
, filldir
);
287 sysctl_head_finish(h
);
293 sysctl_head_finish(head
);
297 static int proc_sys_permission(struct inode
*inode
, int mask
,unsigned int flags
)
300 * sysctl entries that are not writeable,
301 * are _NOT_ writeable, capabilities or not.
303 struct ctl_table_header
*head
;
304 struct ctl_table
*table
;
307 if (flags
& IPERM_FLAG_RCU
)
310 /* Executable files are not allowed under /proc/sys/ */
311 if ((mask
& MAY_EXEC
) && S_ISREG(inode
->i_mode
))
314 head
= grab_header(inode
);
316 return PTR_ERR(head
);
318 table
= PROC_I(inode
)->sysctl_entry
;
319 if (!table
) /* global root - r-xr-xr-x */
320 error
= mask
& MAY_WRITE
? -EACCES
: 0;
321 else /* Use the permissions on the sysctl table entry */
322 error
= sysctl_perm(head
->root
, table
, mask
);
324 sysctl_head_finish(head
);
328 static int proc_sys_setattr(struct dentry
*dentry
, struct iattr
*attr
)
330 struct inode
*inode
= dentry
->d_inode
;
333 if (attr
->ia_valid
& (ATTR_MODE
| ATTR_UID
| ATTR_GID
))
336 error
= inode_change_ok(inode
, attr
);
340 if ((attr
->ia_valid
& ATTR_SIZE
) &&
341 attr
->ia_size
!= i_size_read(inode
)) {
342 error
= vmtruncate(inode
, attr
->ia_size
);
347 setattr_copy(inode
, attr
);
348 mark_inode_dirty(inode
);
352 static int proc_sys_getattr(struct vfsmount
*mnt
, struct dentry
*dentry
, struct kstat
*stat
)
354 struct inode
*inode
= dentry
->d_inode
;
355 struct ctl_table_header
*head
= grab_header(inode
);
356 struct ctl_table
*table
= PROC_I(inode
)->sysctl_entry
;
359 return PTR_ERR(head
);
361 generic_fillattr(inode
, stat
);
363 stat
->mode
= (stat
->mode
& S_IFMT
) | table
->mode
;
365 sysctl_head_finish(head
);
369 static const struct file_operations proc_sys_file_operations
= {
370 .read
= proc_sys_read
,
371 .write
= proc_sys_write
,
372 .llseek
= default_llseek
,
375 static const struct file_operations proc_sys_dir_file_operations
= {
376 .readdir
= proc_sys_readdir
,
377 .llseek
= generic_file_llseek
,
380 static const struct inode_operations proc_sys_inode_operations
= {
381 .permission
= proc_sys_permission
,
382 .setattr
= proc_sys_setattr
,
383 .getattr
= proc_sys_getattr
,
386 static const struct inode_operations proc_sys_dir_operations
= {
387 .lookup
= proc_sys_lookup
,
388 .permission
= proc_sys_permission
,
389 .setattr
= proc_sys_setattr
,
390 .getattr
= proc_sys_getattr
,
393 static int proc_sys_revalidate(struct dentry
*dentry
, struct nameidata
*nd
)
395 if (nd
->flags
& LOOKUP_RCU
)
397 return !PROC_I(dentry
->d_inode
)->sysctl
->unregistering
;
400 static int proc_sys_delete(const struct dentry
*dentry
)
402 return !!PROC_I(dentry
->d_inode
)->sysctl
->unregistering
;
405 static int proc_sys_compare(const struct dentry
*parent
,
406 const struct inode
*pinode
,
407 const struct dentry
*dentry
, const struct inode
*inode
,
408 unsigned int len
, const char *str
, const struct qstr
*name
)
410 struct ctl_table_header
*head
;
411 /* Although proc doesn't have negative dentries, rcu-walk means
412 * that inode here can be NULL */
413 /* AV: can it, indeed? */
416 if (name
->len
!= len
)
418 if (memcmp(name
->name
, str
, len
))
420 head
= rcu_dereference(PROC_I(inode
)->sysctl
);
421 return !head
|| !sysctl_is_seen(head
);
424 static const struct dentry_operations proc_sys_dentry_operations
= {
425 .d_revalidate
= proc_sys_revalidate
,
426 .d_delete
= proc_sys_delete
,
427 .d_compare
= proc_sys_compare
,
430 int __init
proc_sys_init(void)
432 struct proc_dir_entry
*proc_sys_root
;
434 proc_sys_root
= proc_mkdir("sys", NULL
);
435 proc_sys_root
->proc_iops
= &proc_sys_dir_operations
;
436 proc_sys_root
->proc_fops
= &proc_sys_dir_file_operations
;
437 proc_sys_root
->nlink
= 0;