xref: /linux/fs/proc/generic.c (revision 0dd9ac63ce26ec87b080ca9c3e6efed33c23ace6)
1 /*
2  * proc/fs/generic.c --- generic routines for the proc-fs
3  *
4  * This file contains generic proc-fs routines for handling
5  * directories and files.
6  *
7  * Copyright (C) 1991, 1992 Linus Torvalds.
8  * Copyright (C) 1997 Theodore Ts'o
9  */
10 
11 #include <linux/errno.h>
12 #include <linux/time.h>
13 #include <linux/proc_fs.h>
14 #include <linux/stat.h>
15 #include <linux/module.h>
16 #include <linux/slab.h>
17 #include <linux/mount.h>
18 #include <linux/init.h>
19 #include <linux/idr.h>
20 #include <linux/namei.h>
21 #include <linux/bitops.h>
22 #include <linux/spinlock.h>
23 #include <linux/completion.h>
24 #include <asm/uaccess.h>
25 
26 #include "internal.h"
27 
28 DEFINE_SPINLOCK(proc_subdir_lock);
29 
30 static int proc_match(int len, const char *name, struct proc_dir_entry *de)
31 {
32 	if (de->namelen != len)
33 		return 0;
34 	return !memcmp(name, de->name, len);
35 }
36 
37 /* buffer size is one page but our output routines use some slack for overruns */
38 #define PROC_BLOCK_SIZE	(PAGE_SIZE - 1024)
39 
40 static ssize_t
41 __proc_file_read(struct file *file, char __user *buf, size_t nbytes,
42 	       loff_t *ppos)
43 {
44 	struct inode * inode = file->f_path.dentry->d_inode;
45 	char 	*page;
46 	ssize_t	retval=0;
47 	int	eof=0;
48 	ssize_t	n, count;
49 	char	*start;
50 	struct proc_dir_entry * dp;
51 	unsigned long long pos;
52 
53 	/*
54 	 * Gaah, please just use "seq_file" instead. The legacy /proc
55 	 * interfaces cut loff_t down to off_t for reads, and ignore
56 	 * the offset entirely for writes..
57 	 */
58 	pos = *ppos;
59 	if (pos > MAX_NON_LFS)
60 		return 0;
61 	if (nbytes > MAX_NON_LFS - pos)
62 		nbytes = MAX_NON_LFS - pos;
63 
64 	dp = PDE(inode);
65 	if (!(page = (char*) __get_free_page(GFP_TEMPORARY)))
66 		return -ENOMEM;
67 
68 	while ((nbytes > 0) && !eof) {
69 		count = min_t(size_t, PROC_BLOCK_SIZE, nbytes);
70 
71 		start = NULL;
72 		if (dp->read_proc) {
73 			/*
74 			 * How to be a proc read function
75 			 * ------------------------------
76 			 * Prototype:
77 			 *    int f(char *buffer, char **start, off_t offset,
78 			 *          int count, int *peof, void *dat)
79 			 *
80 			 * Assume that the buffer is "count" bytes in size.
81 			 *
82 			 * If you know you have supplied all the data you
83 			 * have, set *peof.
84 			 *
85 			 * You have three ways to return data:
86 			 * 0) Leave *start = NULL.  (This is the default.)
87 			 *    Put the data of the requested offset at that
88 			 *    offset within the buffer.  Return the number (n)
89 			 *    of bytes there are from the beginning of the
90 			 *    buffer up to the last byte of data.  If the
91 			 *    number of supplied bytes (= n - offset) is
92 			 *    greater than zero and you didn't signal eof
93 			 *    and the reader is prepared to take more data
94 			 *    you will be called again with the requested
95 			 *    offset advanced by the number of bytes
96 			 *    absorbed.  This interface is useful for files
97 			 *    no larger than the buffer.
98 			 * 1) Set *start = an unsigned long value less than
99 			 *    the buffer address but greater than zero.
100 			 *    Put the data of the requested offset at the
101 			 *    beginning of the buffer.  Return the number of
102 			 *    bytes of data placed there.  If this number is
103 			 *    greater than zero and you didn't signal eof
104 			 *    and the reader is prepared to take more data
105 			 *    you will be called again with the requested
106 			 *    offset advanced by *start.  This interface is
107 			 *    useful when you have a large file consisting
108 			 *    of a series of blocks which you want to count
109 			 *    and return as wholes.
110 			 *    (Hack by Paul.Russell@rustcorp.com.au)
111 			 * 2) Set *start = an address within the buffer.
112 			 *    Put the data of the requested offset at *start.
113 			 *    Return the number of bytes of data placed there.
114 			 *    If this number is greater than zero and you
115 			 *    didn't signal eof and the reader is prepared to
116 			 *    take more data you will be called again with the
117 			 *    requested offset advanced by the number of bytes
118 			 *    absorbed.
119 			 */
120 			n = dp->read_proc(page, &start, *ppos,
121 					  count, &eof, dp->data);
122 		} else
123 			break;
124 
125 		if (n == 0)   /* end of file */
126 			break;
127 		if (n < 0) {  /* error */
128 			if (retval == 0)
129 				retval = n;
130 			break;
131 		}
132 
133 		if (start == NULL) {
134 			if (n > PAGE_SIZE) {
135 				printk(KERN_ERR
136 				       "proc_file_read: Apparent buffer overflow!\n");
137 				n = PAGE_SIZE;
138 			}
139 			n -= *ppos;
140 			if (n <= 0)
141 				break;
142 			if (n > count)
143 				n = count;
144 			start = page + *ppos;
145 		} else if (start < page) {
146 			if (n > PAGE_SIZE) {
147 				printk(KERN_ERR
148 				       "proc_file_read: Apparent buffer overflow!\n");
149 				n = PAGE_SIZE;
150 			}
151 			if (n > count) {
152 				/*
153 				 * Don't reduce n because doing so might
154 				 * cut off part of a data block.
155 				 */
156 				printk(KERN_WARNING
157 				       "proc_file_read: Read count exceeded\n");
158 			}
159 		} else /* start >= page */ {
160 			unsigned long startoff = (unsigned long)(start - page);
161 			if (n > (PAGE_SIZE - startoff)) {
162 				printk(KERN_ERR
163 				       "proc_file_read: Apparent buffer overflow!\n");
164 				n = PAGE_SIZE - startoff;
165 			}
166 			if (n > count)
167 				n = count;
168 		}
169 
170  		n -= copy_to_user(buf, start < page ? page : start, n);
171 		if (n == 0) {
172 			if (retval == 0)
173 				retval = -EFAULT;
174 			break;
175 		}
176 
177 		*ppos += start < page ? (unsigned long)start : n;
178 		nbytes -= n;
179 		buf += n;
180 		retval += n;
181 	}
182 	free_page((unsigned long) page);
183 	return retval;
184 }
185 
186 static ssize_t
187 proc_file_read(struct file *file, char __user *buf, size_t nbytes,
188 	       loff_t *ppos)
189 {
190 	struct proc_dir_entry *pde = PDE(file->f_path.dentry->d_inode);
191 	ssize_t rv = -EIO;
192 
193 	spin_lock(&pde->pde_unload_lock);
194 	if (!pde->proc_fops) {
195 		spin_unlock(&pde->pde_unload_lock);
196 		return rv;
197 	}
198 	pde->pde_users++;
199 	spin_unlock(&pde->pde_unload_lock);
200 
201 	rv = __proc_file_read(file, buf, nbytes, ppos);
202 
203 	pde_users_dec(pde);
204 	return rv;
205 }
206 
207 static ssize_t
208 proc_file_write(struct file *file, const char __user *buffer,
209 		size_t count, loff_t *ppos)
210 {
211 	struct proc_dir_entry *pde = PDE(file->f_path.dentry->d_inode);
212 	ssize_t rv = -EIO;
213 
214 	if (pde->write_proc) {
215 		spin_lock(&pde->pde_unload_lock);
216 		if (!pde->proc_fops) {
217 			spin_unlock(&pde->pde_unload_lock);
218 			return rv;
219 		}
220 		pde->pde_users++;
221 		spin_unlock(&pde->pde_unload_lock);
222 
223 		/* FIXME: does this routine need ppos?  probably... */
224 		rv = pde->write_proc(file, buffer, count, pde->data);
225 		pde_users_dec(pde);
226 	}
227 	return rv;
228 }
229 
230 
231 static loff_t
232 proc_file_lseek(struct file *file, loff_t offset, int orig)
233 {
234 	loff_t retval = -EINVAL;
235 	switch (orig) {
236 	case 1:
237 		offset += file->f_pos;
238 	/* fallthrough */
239 	case 0:
240 		if (offset < 0 || offset > MAX_NON_LFS)
241 			break;
242 		file->f_pos = retval = offset;
243 	}
244 	return retval;
245 }
246 
247 static const struct file_operations proc_file_operations = {
248 	.llseek		= proc_file_lseek,
249 	.read		= proc_file_read,
250 	.write		= proc_file_write,
251 };
252 
253 static int proc_notify_change(struct dentry *dentry, struct iattr *iattr)
254 {
255 	struct inode *inode = dentry->d_inode;
256 	struct proc_dir_entry *de = PDE(inode);
257 	int error;
258 
259 	error = inode_change_ok(inode, iattr);
260 	if (error)
261 		goto out;
262 
263 	error = inode_setattr(inode, iattr);
264 	if (error)
265 		goto out;
266 
267 	de->uid = inode->i_uid;
268 	de->gid = inode->i_gid;
269 	de->mode = inode->i_mode;
270 out:
271 	return error;
272 }
273 
274 static int proc_getattr(struct vfsmount *mnt, struct dentry *dentry,
275 			struct kstat *stat)
276 {
277 	struct inode *inode = dentry->d_inode;
278 	struct proc_dir_entry *de = PROC_I(inode)->pde;
279 	if (de && de->nlink)
280 		inode->i_nlink = de->nlink;
281 
282 	generic_fillattr(inode, stat);
283 	return 0;
284 }
285 
286 static const struct inode_operations proc_file_inode_operations = {
287 	.setattr	= proc_notify_change,
288 };
289 
290 /*
291  * This function parses a name such as "tty/driver/serial", and
292  * returns the struct proc_dir_entry for "/proc/tty/driver", and
293  * returns "serial" in residual.
294  */
295 static int __xlate_proc_name(const char *name, struct proc_dir_entry **ret,
296 			     const char **residual)
297 {
298 	const char     		*cp = name, *next;
299 	struct proc_dir_entry	*de;
300 	int			len;
301 
302 	de = *ret;
303 	if (!de)
304 		de = &proc_root;
305 
306 	while (1) {
307 		next = strchr(cp, '/');
308 		if (!next)
309 			break;
310 
311 		len = next - cp;
312 		for (de = de->subdir; de ; de = de->next) {
313 			if (proc_match(len, cp, de))
314 				break;
315 		}
316 		if (!de) {
317 			WARN(1, "name '%s'\n", name);
318 			return -ENOENT;
319 		}
320 		cp += len + 1;
321 	}
322 	*residual = cp;
323 	*ret = de;
324 	return 0;
325 }
326 
327 static int xlate_proc_name(const char *name, struct proc_dir_entry **ret,
328 			   const char **residual)
329 {
330 	int rv;
331 
332 	spin_lock(&proc_subdir_lock);
333 	rv = __xlate_proc_name(name, ret, residual);
334 	spin_unlock(&proc_subdir_lock);
335 	return rv;
336 }
337 
338 static DEFINE_IDA(proc_inum_ida);
339 static DEFINE_SPINLOCK(proc_inum_lock); /* protects the above */
340 
341 #define PROC_DYNAMIC_FIRST 0xF0000000U
342 
343 /*
344  * Return an inode number between PROC_DYNAMIC_FIRST and
345  * 0xffffffff, or zero on failure.
346  */
347 static unsigned int get_inode_number(void)
348 {
349 	unsigned int i;
350 	int error;
351 
352 retry:
353 	if (ida_pre_get(&proc_inum_ida, GFP_KERNEL) == 0)
354 		return 0;
355 
356 	spin_lock(&proc_inum_lock);
357 	error = ida_get_new(&proc_inum_ida, &i);
358 	spin_unlock(&proc_inum_lock);
359 	if (error == -EAGAIN)
360 		goto retry;
361 	else if (error)
362 		return 0;
363 
364 	if (i > UINT_MAX - PROC_DYNAMIC_FIRST) {
365 		spin_lock(&proc_inum_lock);
366 		ida_remove(&proc_inum_ida, i);
367 		spin_unlock(&proc_inum_lock);
368 		return 0;
369 	}
370 	return PROC_DYNAMIC_FIRST + i;
371 }
372 
373 static void release_inode_number(unsigned int inum)
374 {
375 	spin_lock(&proc_inum_lock);
376 	ida_remove(&proc_inum_ida, inum - PROC_DYNAMIC_FIRST);
377 	spin_unlock(&proc_inum_lock);
378 }
379 
380 static void *proc_follow_link(struct dentry *dentry, struct nameidata *nd)
381 {
382 	nd_set_link(nd, PDE(dentry->d_inode)->data);
383 	return NULL;
384 }
385 
386 static const struct inode_operations proc_link_inode_operations = {
387 	.readlink	= generic_readlink,
388 	.follow_link	= proc_follow_link,
389 };
390 
391 /*
392  * As some entries in /proc are volatile, we want to
393  * get rid of unused dentries.  This could be made
394  * smarter: we could keep a "volatile" flag in the
395  * inode to indicate which ones to keep.
396  */
397 static int proc_delete_dentry(struct dentry * dentry)
398 {
399 	return 1;
400 }
401 
402 static const struct dentry_operations proc_dentry_operations =
403 {
404 	.d_delete	= proc_delete_dentry,
405 };
406 
407 /*
408  * Don't create negative dentries here, return -ENOENT by hand
409  * instead.
410  */
411 struct dentry *proc_lookup_de(struct proc_dir_entry *de, struct inode *dir,
412 		struct dentry *dentry)
413 {
414 	struct inode *inode = NULL;
415 	int error = -ENOENT;
416 
417 	spin_lock(&proc_subdir_lock);
418 	for (de = de->subdir; de ; de = de->next) {
419 		if (de->namelen != dentry->d_name.len)
420 			continue;
421 		if (!memcmp(dentry->d_name.name, de->name, de->namelen)) {
422 			unsigned int ino;
423 
424 			ino = de->low_ino;
425 			pde_get(de);
426 			spin_unlock(&proc_subdir_lock);
427 			error = -EINVAL;
428 			inode = proc_get_inode(dir->i_sb, ino, de);
429 			goto out_unlock;
430 		}
431 	}
432 	spin_unlock(&proc_subdir_lock);
433 out_unlock:
434 
435 	if (inode) {
436 		dentry->d_op = &proc_dentry_operations;
437 		d_add(dentry, inode);
438 		return NULL;
439 	}
440 	if (de)
441 		pde_put(de);
442 	return ERR_PTR(error);
443 }
444 
445 struct dentry *proc_lookup(struct inode *dir, struct dentry *dentry,
446 		struct nameidata *nd)
447 {
448 	return proc_lookup_de(PDE(dir), dir, dentry);
449 }
450 
451 /*
452  * This returns non-zero if at EOF, so that the /proc
453  * root directory can use this and check if it should
454  * continue with the <pid> entries..
455  *
456  * Note that the VFS-layer doesn't care about the return
457  * value of the readdir() call, as long as it's non-negative
458  * for success..
459  */
460 int proc_readdir_de(struct proc_dir_entry *de, struct file *filp, void *dirent,
461 		filldir_t filldir)
462 {
463 	unsigned int ino;
464 	int i;
465 	struct inode *inode = filp->f_path.dentry->d_inode;
466 	int ret = 0;
467 
468 	ino = inode->i_ino;
469 	i = filp->f_pos;
470 	switch (i) {
471 		case 0:
472 			if (filldir(dirent, ".", 1, i, ino, DT_DIR) < 0)
473 				goto out;
474 			i++;
475 			filp->f_pos++;
476 			/* fall through */
477 		case 1:
478 			if (filldir(dirent, "..", 2, i,
479 				    parent_ino(filp->f_path.dentry),
480 				    DT_DIR) < 0)
481 				goto out;
482 			i++;
483 			filp->f_pos++;
484 			/* fall through */
485 		default:
486 			spin_lock(&proc_subdir_lock);
487 			de = de->subdir;
488 			i -= 2;
489 			for (;;) {
490 				if (!de) {
491 					ret = 1;
492 					spin_unlock(&proc_subdir_lock);
493 					goto out;
494 				}
495 				if (!i)
496 					break;
497 				de = de->next;
498 				i--;
499 			}
500 
501 			do {
502 				struct proc_dir_entry *next;
503 
504 				/* filldir passes info to user space */
505 				pde_get(de);
506 				spin_unlock(&proc_subdir_lock);
507 				if (filldir(dirent, de->name, de->namelen, filp->f_pos,
508 					    de->low_ino, de->mode >> 12) < 0) {
509 					pde_put(de);
510 					goto out;
511 				}
512 				spin_lock(&proc_subdir_lock);
513 				filp->f_pos++;
514 				next = de->next;
515 				pde_put(de);
516 				de = next;
517 			} while (de);
518 			spin_unlock(&proc_subdir_lock);
519 	}
520 	ret = 1;
521 out:
522 	return ret;
523 }
524 
525 int proc_readdir(struct file *filp, void *dirent, filldir_t filldir)
526 {
527 	struct inode *inode = filp->f_path.dentry->d_inode;
528 
529 	return proc_readdir_de(PDE(inode), filp, dirent, filldir);
530 }
531 
532 /*
533  * These are the generic /proc directory operations. They
534  * use the in-memory "struct proc_dir_entry" tree to parse
535  * the /proc directory.
536  */
537 static const struct file_operations proc_dir_operations = {
538 	.llseek			= generic_file_llseek,
539 	.read			= generic_read_dir,
540 	.readdir		= proc_readdir,
541 };
542 
543 /*
544  * proc directories can do almost nothing..
545  */
546 static const struct inode_operations proc_dir_inode_operations = {
547 	.lookup		= proc_lookup,
548 	.getattr	= proc_getattr,
549 	.setattr	= proc_notify_change,
550 };
551 
552 static int proc_register(struct proc_dir_entry * dir, struct proc_dir_entry * dp)
553 {
554 	unsigned int i;
555 	struct proc_dir_entry *tmp;
556 
557 	i = get_inode_number();
558 	if (i == 0)
559 		return -EAGAIN;
560 	dp->low_ino = i;
561 
562 	if (S_ISDIR(dp->mode)) {
563 		if (dp->proc_iops == NULL) {
564 			dp->proc_fops = &proc_dir_operations;
565 			dp->proc_iops = &proc_dir_inode_operations;
566 		}
567 		dir->nlink++;
568 	} else if (S_ISLNK(dp->mode)) {
569 		if (dp->proc_iops == NULL)
570 			dp->proc_iops = &proc_link_inode_operations;
571 	} else if (S_ISREG(dp->mode)) {
572 		if (dp->proc_fops == NULL)
573 			dp->proc_fops = &proc_file_operations;
574 		if (dp->proc_iops == NULL)
575 			dp->proc_iops = &proc_file_inode_operations;
576 	}
577 
578 	spin_lock(&proc_subdir_lock);
579 
580 	for (tmp = dir->subdir; tmp; tmp = tmp->next)
581 		if (strcmp(tmp->name, dp->name) == 0) {
582 			WARN(1, KERN_WARNING "proc_dir_entry '%s/%s' already registered\n",
583 				dir->name, dp->name);
584 			break;
585 		}
586 
587 	dp->next = dir->subdir;
588 	dp->parent = dir;
589 	dir->subdir = dp;
590 	spin_unlock(&proc_subdir_lock);
591 
592 	return 0;
593 }
594 
595 static struct proc_dir_entry *__proc_create(struct proc_dir_entry **parent,
596 					  const char *name,
597 					  mode_t mode,
598 					  nlink_t nlink)
599 {
600 	struct proc_dir_entry *ent = NULL;
601 	const char *fn = name;
602 	int len;
603 
604 	/* make sure name is valid */
605 	if (!name || !strlen(name)) goto out;
606 
607 	if (xlate_proc_name(name, parent, &fn) != 0)
608 		goto out;
609 
610 	/* At this point there must not be any '/' characters beyond *fn */
611 	if (strchr(fn, '/'))
612 		goto out;
613 
614 	len = strlen(fn);
615 
616 	ent = kmalloc(sizeof(struct proc_dir_entry) + len + 1, GFP_KERNEL);
617 	if (!ent) goto out;
618 
619 	memset(ent, 0, sizeof(struct proc_dir_entry));
620 	memcpy(((char *) ent) + sizeof(struct proc_dir_entry), fn, len + 1);
621 	ent->name = ((char *) ent) + sizeof(*ent);
622 	ent->namelen = len;
623 	ent->mode = mode;
624 	ent->nlink = nlink;
625 	atomic_set(&ent->count, 1);
626 	ent->pde_users = 0;
627 	spin_lock_init(&ent->pde_unload_lock);
628 	ent->pde_unload_completion = NULL;
629 	INIT_LIST_HEAD(&ent->pde_openers);
630  out:
631 	return ent;
632 }
633 
634 struct proc_dir_entry *proc_symlink(const char *name,
635 		struct proc_dir_entry *parent, const char *dest)
636 {
637 	struct proc_dir_entry *ent;
638 
639 	ent = __proc_create(&parent, name,
640 			  (S_IFLNK | S_IRUGO | S_IWUGO | S_IXUGO),1);
641 
642 	if (ent) {
643 		ent->data = kmalloc((ent->size=strlen(dest))+1, GFP_KERNEL);
644 		if (ent->data) {
645 			strcpy((char*)ent->data,dest);
646 			if (proc_register(parent, ent) < 0) {
647 				kfree(ent->data);
648 				kfree(ent);
649 				ent = NULL;
650 			}
651 		} else {
652 			kfree(ent);
653 			ent = NULL;
654 		}
655 	}
656 	return ent;
657 }
658 EXPORT_SYMBOL(proc_symlink);
659 
660 struct proc_dir_entry *proc_mkdir_mode(const char *name, mode_t mode,
661 		struct proc_dir_entry *parent)
662 {
663 	struct proc_dir_entry *ent;
664 
665 	ent = __proc_create(&parent, name, S_IFDIR | mode, 2);
666 	if (ent) {
667 		if (proc_register(parent, ent) < 0) {
668 			kfree(ent);
669 			ent = NULL;
670 		}
671 	}
672 	return ent;
673 }
674 
675 struct proc_dir_entry *proc_net_mkdir(struct net *net, const char *name,
676 		struct proc_dir_entry *parent)
677 {
678 	struct proc_dir_entry *ent;
679 
680 	ent = __proc_create(&parent, name, S_IFDIR | S_IRUGO | S_IXUGO, 2);
681 	if (ent) {
682 		ent->data = net;
683 		if (proc_register(parent, ent) < 0) {
684 			kfree(ent);
685 			ent = NULL;
686 		}
687 	}
688 	return ent;
689 }
690 EXPORT_SYMBOL_GPL(proc_net_mkdir);
691 
692 struct proc_dir_entry *proc_mkdir(const char *name,
693 		struct proc_dir_entry *parent)
694 {
695 	return proc_mkdir_mode(name, S_IRUGO | S_IXUGO, parent);
696 }
697 EXPORT_SYMBOL(proc_mkdir);
698 
699 struct proc_dir_entry *create_proc_entry(const char *name, mode_t mode,
700 					 struct proc_dir_entry *parent)
701 {
702 	struct proc_dir_entry *ent;
703 	nlink_t nlink;
704 
705 	if (S_ISDIR(mode)) {
706 		if ((mode & S_IALLUGO) == 0)
707 			mode |= S_IRUGO | S_IXUGO;
708 		nlink = 2;
709 	} else {
710 		if ((mode & S_IFMT) == 0)
711 			mode |= S_IFREG;
712 		if ((mode & S_IALLUGO) == 0)
713 			mode |= S_IRUGO;
714 		nlink = 1;
715 	}
716 
717 	ent = __proc_create(&parent, name, mode, nlink);
718 	if (ent) {
719 		if (proc_register(parent, ent) < 0) {
720 			kfree(ent);
721 			ent = NULL;
722 		}
723 	}
724 	return ent;
725 }
726 EXPORT_SYMBOL(create_proc_entry);
727 
728 struct proc_dir_entry *proc_create_data(const char *name, mode_t mode,
729 					struct proc_dir_entry *parent,
730 					const struct file_operations *proc_fops,
731 					void *data)
732 {
733 	struct proc_dir_entry *pde;
734 	nlink_t nlink;
735 
736 	if (S_ISDIR(mode)) {
737 		if ((mode & S_IALLUGO) == 0)
738 			mode |= S_IRUGO | S_IXUGO;
739 		nlink = 2;
740 	} else {
741 		if ((mode & S_IFMT) == 0)
742 			mode |= S_IFREG;
743 		if ((mode & S_IALLUGO) == 0)
744 			mode |= S_IRUGO;
745 		nlink = 1;
746 	}
747 
748 	pde = __proc_create(&parent, name, mode, nlink);
749 	if (!pde)
750 		goto out;
751 	pde->proc_fops = proc_fops;
752 	pde->data = data;
753 	if (proc_register(parent, pde) < 0)
754 		goto out_free;
755 	return pde;
756 out_free:
757 	kfree(pde);
758 out:
759 	return NULL;
760 }
761 EXPORT_SYMBOL(proc_create_data);
762 
763 static void free_proc_entry(struct proc_dir_entry *de)
764 {
765 	unsigned int ino = de->low_ino;
766 
767 	if (ino < PROC_DYNAMIC_FIRST)
768 		return;
769 
770 	release_inode_number(ino);
771 
772 	if (S_ISLNK(de->mode))
773 		kfree(de->data);
774 	kfree(de);
775 }
776 
777 void pde_put(struct proc_dir_entry *pde)
778 {
779 	if (atomic_dec_and_test(&pde->count))
780 		free_proc_entry(pde);
781 }
782 
783 /*
784  * Remove a /proc entry and free it if it's not currently in use.
785  */
786 void remove_proc_entry(const char *name, struct proc_dir_entry *parent)
787 {
788 	struct proc_dir_entry **p;
789 	struct proc_dir_entry *de = NULL;
790 	const char *fn = name;
791 	int len;
792 
793 	spin_lock(&proc_subdir_lock);
794 	if (__xlate_proc_name(name, &parent, &fn) != 0) {
795 		spin_unlock(&proc_subdir_lock);
796 		return;
797 	}
798 	len = strlen(fn);
799 
800 	for (p = &parent->subdir; *p; p=&(*p)->next ) {
801 		if (proc_match(len, fn, *p)) {
802 			de = *p;
803 			*p = de->next;
804 			de->next = NULL;
805 			break;
806 		}
807 	}
808 	spin_unlock(&proc_subdir_lock);
809 	if (!de) {
810 		WARN(1, "name '%s'\n", name);
811 		return;
812 	}
813 
814 	spin_lock(&de->pde_unload_lock);
815 	/*
816 	 * Stop accepting new callers into module. If you're
817 	 * dynamically allocating ->proc_fops, save a pointer somewhere.
818 	 */
819 	de->proc_fops = NULL;
820 	/* Wait until all existing callers into module are done. */
821 	if (de->pde_users > 0) {
822 		DECLARE_COMPLETION_ONSTACK(c);
823 
824 		if (!de->pde_unload_completion)
825 			de->pde_unload_completion = &c;
826 
827 		spin_unlock(&de->pde_unload_lock);
828 
829 		wait_for_completion(de->pde_unload_completion);
830 
831 		goto continue_removing;
832 	}
833 	spin_unlock(&de->pde_unload_lock);
834 
835 continue_removing:
836 	spin_lock(&de->pde_unload_lock);
837 	while (!list_empty(&de->pde_openers)) {
838 		struct pde_opener *pdeo;
839 
840 		pdeo = list_first_entry(&de->pde_openers, struct pde_opener, lh);
841 		list_del(&pdeo->lh);
842 		spin_unlock(&de->pde_unload_lock);
843 		pdeo->release(pdeo->inode, pdeo->file);
844 		kfree(pdeo);
845 		spin_lock(&de->pde_unload_lock);
846 	}
847 	spin_unlock(&de->pde_unload_lock);
848 
849 	if (S_ISDIR(de->mode))
850 		parent->nlink--;
851 	de->nlink = 0;
852 	WARN(de->subdir, KERN_WARNING "%s: removing non-empty directory "
853 			"'%s/%s', leaking at least '%s'\n", __func__,
854 			de->parent->name, de->name, de->subdir->name);
855 	pde_put(de);
856 }
857 EXPORT_SYMBOL(remove_proc_entry);
858