xref: /linux/fs/proc/fd.c (revision 55f1b540d893da740a81200450014c45a8103f54)
1 // SPDX-License-Identifier: GPL-2.0
2 #include <linux/sched/signal.h>
3 #include <linux/errno.h>
4 #include <linux/dcache.h>
5 #include <linux/path.h>
6 #include <linux/fdtable.h>
7 #include <linux/namei.h>
8 #include <linux/pid.h>
9 #include <linux/ptrace.h>
10 #include <linux/bitmap.h>
11 #include <linux/security.h>
12 #include <linux/file.h>
13 #include <linux/seq_file.h>
14 #include <linux/fs.h>
15 #include <linux/filelock.h>
16 
17 #include <linux/proc_fs.h>
18 
19 #include "../mount.h"
20 #include "internal.h"
21 #include "fd.h"
22 
23 static int seq_show(struct seq_file *m, void *v)
24 {
25 	struct files_struct *files = NULL;
26 	int f_flags = 0, ret = -ENOENT;
27 	struct file *file = NULL;
28 	struct task_struct *task;
29 
30 	task = get_proc_task(m->private);
31 	if (!task)
32 		return -ENOENT;
33 
34 	task_lock(task);
35 	files = task->files;
36 	if (files) {
37 		unsigned int fd = proc_fd(m->private);
38 
39 		spin_lock(&files->file_lock);
40 		file = files_lookup_fd_locked(files, fd);
41 		if (file) {
42 			f_flags = file->f_flags;
43 			if (close_on_exec(fd, files))
44 				f_flags |= O_CLOEXEC;
45 
46 			get_file(file);
47 			ret = 0;
48 		}
49 		spin_unlock(&files->file_lock);
50 	}
51 	task_unlock(task);
52 	put_task_struct(task);
53 
54 	if (ret)
55 		return ret;
56 
57 	seq_printf(m, "pos:\t%lli\nflags:\t0%o\nmnt_id:\t%i\nino:\t%lu\n",
58 		   (long long)file->f_pos, f_flags,
59 		   real_mount(file->f_path.mnt)->mnt_id,
60 		   file_inode(file)->i_ino);
61 
62 	/* show_fd_locks() never dereferences files, so a stale value is safe */
63 	show_fd_locks(m, file, files);
64 	if (seq_has_overflowed(m))
65 		goto out;
66 
67 	if (file->f_op->show_fdinfo)
68 		file->f_op->show_fdinfo(m, file);
69 
70 out:
71 	fput(file);
72 	return 0;
73 }
74 
75 static int seq_fdinfo_open(struct inode *inode, struct file *file)
76 {
77 	return single_open(file, seq_show, inode);
78 }
79 
80 /**
81  * Shared /proc/pid/fdinfo and /proc/pid/fdinfo/fd permission helper to ensure
82  * that the current task has PTRACE_MODE_READ in addition to the normal
83  * POSIX-like checks.
84  */
85 static int proc_fdinfo_permission(struct mnt_idmap *idmap, struct inode *inode,
86 				  int mask)
87 {
88 	bool allowed = false;
89 	struct task_struct *task = get_proc_task(inode);
90 
91 	if (!task)
92 		return -ESRCH;
93 
94 	allowed = ptrace_may_access(task, PTRACE_MODE_READ_FSCREDS);
95 	put_task_struct(task);
96 
97 	if (!allowed)
98 		return -EACCES;
99 
100 	return generic_permission(idmap, inode, mask);
101 }
102 
103 static const struct inode_operations proc_fdinfo_file_inode_operations = {
104 	.permission	= proc_fdinfo_permission,
105 	.setattr	= proc_setattr,
106 };
107 
108 static const struct file_operations proc_fdinfo_file_operations = {
109 	.open		= seq_fdinfo_open,
110 	.read		= seq_read,
111 	.llseek		= seq_lseek,
112 	.release	= single_release,
113 };
114 
115 static bool tid_fd_mode(struct task_struct *task, unsigned fd, fmode_t *mode)
116 {
117 	struct file *file;
118 
119 	rcu_read_lock();
120 	file = task_lookup_fdget_rcu(task, fd);
121 	rcu_read_unlock();
122 	if (file) {
123 		*mode = file->f_mode;
124 		fput(file);
125 	}
126 	return !!file;
127 }
128 
129 static void tid_fd_update_inode(struct task_struct *task, struct inode *inode,
130 				fmode_t f_mode)
131 {
132 	task_dump_owner(task, 0, &inode->i_uid, &inode->i_gid);
133 
134 	if (S_ISLNK(inode->i_mode)) {
135 		unsigned i_mode = S_IFLNK;
136 		if (f_mode & FMODE_READ)
137 			i_mode |= S_IRUSR | S_IXUSR;
138 		if (f_mode & FMODE_WRITE)
139 			i_mode |= S_IWUSR | S_IXUSR;
140 		inode->i_mode = i_mode;
141 	}
142 	security_task_to_inode(task, inode);
143 }
144 
145 static int tid_fd_revalidate(struct dentry *dentry, unsigned int flags)
146 {
147 	struct task_struct *task;
148 	struct inode *inode;
149 	unsigned int fd;
150 
151 	if (flags & LOOKUP_RCU)
152 		return -ECHILD;
153 
154 	inode = d_inode(dentry);
155 	task = get_proc_task(inode);
156 	fd = proc_fd(inode);
157 
158 	if (task) {
159 		fmode_t f_mode;
160 		if (tid_fd_mode(task, fd, &f_mode)) {
161 			tid_fd_update_inode(task, inode, f_mode);
162 			put_task_struct(task);
163 			return 1;
164 		}
165 		put_task_struct(task);
166 	}
167 	return 0;
168 }
169 
170 static const struct dentry_operations tid_fd_dentry_operations = {
171 	.d_revalidate	= tid_fd_revalidate,
172 	.d_delete	= pid_delete_dentry,
173 };
174 
175 static int proc_fd_link(struct dentry *dentry, struct path *path)
176 {
177 	struct task_struct *task;
178 	int ret = -ENOENT;
179 
180 	task = get_proc_task(d_inode(dentry));
181 	if (task) {
182 		unsigned int fd = proc_fd(d_inode(dentry));
183 		struct file *fd_file;
184 
185 		fd_file = fget_task(task, fd);
186 		if (fd_file) {
187 			*path = fd_file->f_path;
188 			path_get(&fd_file->f_path);
189 			ret = 0;
190 			fput(fd_file);
191 		}
192 		put_task_struct(task);
193 	}
194 
195 	return ret;
196 }
197 
198 struct fd_data {
199 	fmode_t mode;
200 	unsigned fd;
201 };
202 
203 static struct dentry *proc_fd_instantiate(struct dentry *dentry,
204 	struct task_struct *task, const void *ptr)
205 {
206 	const struct fd_data *data = ptr;
207 	struct proc_inode *ei;
208 	struct inode *inode;
209 
210 	inode = proc_pid_make_inode(dentry->d_sb, task, S_IFLNK);
211 	if (!inode)
212 		return ERR_PTR(-ENOENT);
213 
214 	ei = PROC_I(inode);
215 	ei->fd = data->fd;
216 
217 	inode->i_op = &proc_pid_link_inode_operations;
218 	inode->i_size = 64;
219 
220 	ei->op.proc_get_link = proc_fd_link;
221 	tid_fd_update_inode(task, inode, data->mode);
222 
223 	return proc_splice_unmountable(inode, dentry,
224 				       &tid_fd_dentry_operations);
225 }
226 
227 static struct dentry *proc_lookupfd_common(struct inode *dir,
228 					   struct dentry *dentry,
229 					   instantiate_t instantiate)
230 {
231 	struct task_struct *task = get_proc_task(dir);
232 	struct fd_data data = {.fd = name_to_int(&dentry->d_name)};
233 	struct dentry *result = ERR_PTR(-ENOENT);
234 
235 	if (!task)
236 		goto out_no_task;
237 	if (data.fd == ~0U)
238 		goto out;
239 	if (!tid_fd_mode(task, data.fd, &data.mode))
240 		goto out;
241 
242 	result = instantiate(dentry, task, &data);
243 out:
244 	put_task_struct(task);
245 out_no_task:
246 	return result;
247 }
248 
249 static int proc_readfd_common(struct file *file, struct dir_context *ctx,
250 			      instantiate_t instantiate)
251 {
252 	struct task_struct *p = get_proc_task(file_inode(file));
253 	unsigned int fd;
254 
255 	if (!p)
256 		return -ENOENT;
257 
258 	if (!dir_emit_dots(file, ctx))
259 		goto out;
260 
261 	rcu_read_lock();
262 	for (fd = ctx->pos - 2;; fd++) {
263 		struct file *f;
264 		struct fd_data data;
265 		char name[10 + 1];
266 		unsigned int len;
267 
268 		f = task_lookup_next_fdget_rcu(p, &fd);
269 		ctx->pos = fd + 2LL;
270 		if (!f)
271 			break;
272 		data.mode = f->f_mode;
273 		rcu_read_unlock();
274 		fput(f);
275 		data.fd = fd;
276 
277 		len = snprintf(name, sizeof(name), "%u", fd);
278 		if (!proc_fill_cache(file, ctx,
279 				     name, len, instantiate, p,
280 				     &data))
281 			goto out;
282 		cond_resched();
283 		rcu_read_lock();
284 	}
285 	rcu_read_unlock();
286 out:
287 	put_task_struct(p);
288 	return 0;
289 }
290 
291 static int proc_readfd_count(struct inode *inode, loff_t *count)
292 {
293 	struct task_struct *p = get_proc_task(inode);
294 	struct fdtable *fdt;
295 
296 	if (!p)
297 		return -ENOENT;
298 
299 	task_lock(p);
300 	if (p->files) {
301 		rcu_read_lock();
302 
303 		fdt = files_fdtable(p->files);
304 		*count = bitmap_weight(fdt->open_fds, fdt->max_fds);
305 
306 		rcu_read_unlock();
307 	}
308 	task_unlock(p);
309 
310 	put_task_struct(p);
311 
312 	return 0;
313 }
314 
315 static int proc_fd_iterate(struct file *file, struct dir_context *ctx)
316 {
317 	return proc_readfd_common(file, ctx, proc_fd_instantiate);
318 }
319 
320 const struct file_operations proc_fd_operations = {
321 	.read		= generic_read_dir,
322 	.iterate_shared	= proc_fd_iterate,
323 	.llseek		= generic_file_llseek,
324 };
325 
326 static struct dentry *proc_lookupfd(struct inode *dir, struct dentry *dentry,
327 				    unsigned int flags)
328 {
329 	return proc_lookupfd_common(dir, dentry, proc_fd_instantiate);
330 }
331 
332 /*
333  * /proc/pid/fd needs a special permission handler so that a process can still
334  * access /proc/self/fd after it has executed a setuid().
335  */
336 int proc_fd_permission(struct mnt_idmap *idmap,
337 		       struct inode *inode, int mask)
338 {
339 	struct task_struct *p;
340 	int rv;
341 
342 	rv = generic_permission(&nop_mnt_idmap, inode, mask);
343 	if (rv == 0)
344 		return rv;
345 
346 	rcu_read_lock();
347 	p = pid_task(proc_pid(inode), PIDTYPE_PID);
348 	if (p && same_thread_group(p, current))
349 		rv = 0;
350 	rcu_read_unlock();
351 
352 	return rv;
353 }
354 
355 static int proc_fd_getattr(struct mnt_idmap *idmap,
356 			const struct path *path, struct kstat *stat,
357 			u32 request_mask, unsigned int query_flags)
358 {
359 	struct inode *inode = d_inode(path->dentry);
360 	int rv = 0;
361 
362 	generic_fillattr(&nop_mnt_idmap, request_mask, inode, stat);
363 
364 	/* If it's a directory, put the number of open fds there */
365 	if (S_ISDIR(inode->i_mode)) {
366 		rv = proc_readfd_count(inode, &stat->size);
367 		if (rv < 0)
368 			return rv;
369 	}
370 
371 	return rv;
372 }
373 
374 const struct inode_operations proc_fd_inode_operations = {
375 	.lookup		= proc_lookupfd,
376 	.permission	= proc_fd_permission,
377 	.getattr	= proc_fd_getattr,
378 	.setattr	= proc_setattr,
379 };
380 
381 static struct dentry *proc_fdinfo_instantiate(struct dentry *dentry,
382 	struct task_struct *task, const void *ptr)
383 {
384 	const struct fd_data *data = ptr;
385 	struct proc_inode *ei;
386 	struct inode *inode;
387 
388 	inode = proc_pid_make_inode(dentry->d_sb, task, S_IFREG | S_IRUGO);
389 	if (!inode)
390 		return ERR_PTR(-ENOENT);
391 
392 	ei = PROC_I(inode);
393 	ei->fd = data->fd;
394 
395 	inode->i_op = &proc_fdinfo_file_inode_operations;
396 
397 	inode->i_fop = &proc_fdinfo_file_operations;
398 	tid_fd_update_inode(task, inode, 0);
399 
400 	return proc_splice_unmountable(inode, dentry,
401 				       &tid_fd_dentry_operations);
402 }
403 
404 static struct dentry *
405 proc_lookupfdinfo(struct inode *dir, struct dentry *dentry, unsigned int flags)
406 {
407 	return proc_lookupfd_common(dir, dentry, proc_fdinfo_instantiate);
408 }
409 
410 static int proc_fdinfo_iterate(struct file *file, struct dir_context *ctx)
411 {
412 	return proc_readfd_common(file, ctx,
413 				  proc_fdinfo_instantiate);
414 }
415 
416 const struct inode_operations proc_fdinfo_inode_operations = {
417 	.lookup		= proc_lookupfdinfo,
418 	.permission	= proc_fdinfo_permission,
419 	.setattr	= proc_setattr,
420 };
421 
422 const struct file_operations proc_fdinfo_operations = {
423 	.read		= generic_read_dir,
424 	.iterate_shared	= proc_fdinfo_iterate,
425 	.llseek		= generic_file_llseek,
426 };
427