blob: 8b406e21a258c62d64cf6db199465cb7f2b87c2f [file] [log] [blame]
Linus Torvalds1da177e2005-04-16 15:20:36 -07001/*
2 * proc/fs/generic.c --- generic routines for the proc-fs
3 *
4 * This file contains generic proc-fs routines for handling
5 * directories and files.
6 *
7 * Copyright (C) 1991, 1992 Linus Torvalds.
8 * Copyright (C) 1997 Theodore Ts'o
9 */
10
11#include <linux/errno.h>
12#include <linux/time.h>
13#include <linux/proc_fs.h>
14#include <linux/stat.h>
15#include <linux/module.h>
16#include <linux/mount.h>
17#include <linux/smp_lock.h>
18#include <linux/init.h>
19#include <linux/idr.h>
20#include <linux/namei.h>
21#include <linux/bitops.h>
Steven Rostedt64a07bd2006-03-26 01:36:55 -080022#include <linux/spinlock.h>
Alexey Dobriyan786d7e12007-07-15 23:39:00 -070023#include <linux/completion.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070024#include <asm/uaccess.h>
25
Adrian Bunkfee781e2006-01-08 01:04:16 -080026#include "internal.h"
27
Steven Rostedt64a07bd2006-03-26 01:36:55 -080028DEFINE_SPINLOCK(proc_subdir_lock);
29
Eric W. Biederman77b14db2007-02-14 00:34:12 -080030static int proc_match(int len, const char *name, struct proc_dir_entry *de)
Linus Torvalds1da177e2005-04-16 15:20:36 -070031{
32 if (de->namelen != len)
33 return 0;
34 return !memcmp(name, de->name, len);
35}
36
Linus Torvalds1da177e2005-04-16 15:20:36 -070037/* buffer size is one page but our output routines use some slack for overruns */
38#define PROC_BLOCK_SIZE (PAGE_SIZE - 1024)
39
40static ssize_t
41proc_file_read(struct file *file, char __user *buf, size_t nbytes,
42 loff_t *ppos)
43{
Josef "Jeff" Sipek2fddfee2006-12-08 02:36:36 -080044 struct inode * inode = file->f_path.dentry->d_inode;
Linus Torvalds1da177e2005-04-16 15:20:36 -070045 char *page;
46 ssize_t retval=0;
47 int eof=0;
48 ssize_t n, count;
49 char *start;
50 struct proc_dir_entry * dp;
Linus Torvalds8b90db02005-12-30 08:39:10 -080051 unsigned long long pos;
52
53 /*
54 * Gaah, please just use "seq_file" instead. The legacy /proc
55 * interfaces cut loff_t down to off_t for reads, and ignore
56 * the offset entirely for writes..
57 */
58 pos = *ppos;
59 if (pos > MAX_NON_LFS)
60 return 0;
61 if (nbytes > MAX_NON_LFS - pos)
62 nbytes = MAX_NON_LFS - pos;
Linus Torvalds1da177e2005-04-16 15:20:36 -070063
64 dp = PDE(inode);
Mel Gormane12ba742007-10-16 01:25:52 -070065 if (!(page = (char*) __get_free_page(GFP_TEMPORARY)))
Linus Torvalds1da177e2005-04-16 15:20:36 -070066 return -ENOMEM;
67
68 while ((nbytes > 0) && !eof) {
69 count = min_t(size_t, PROC_BLOCK_SIZE, nbytes);
70
71 start = NULL;
72 if (dp->get_info) {
73 /* Handle old net routines */
74 n = dp->get_info(page, &start, *ppos, count);
75 if (n < count)
76 eof = 1;
77 } else if (dp->read_proc) {
78 /*
79 * How to be a proc read function
80 * ------------------------------
81 * Prototype:
82 * int f(char *buffer, char **start, off_t offset,
83 * int count, int *peof, void *dat)
84 *
85 * Assume that the buffer is "count" bytes in size.
86 *
87 * If you know you have supplied all the data you
88 * have, set *peof.
89 *
90 * You have three ways to return data:
91 * 0) Leave *start = NULL. (This is the default.)
92 * Put the data of the requested offset at that
93 * offset within the buffer. Return the number (n)
94 * of bytes there are from the beginning of the
95 * buffer up to the last byte of data. If the
96 * number of supplied bytes (= n - offset) is
97 * greater than zero and you didn't signal eof
98 * and the reader is prepared to take more data
99 * you will be called again with the requested
100 * offset advanced by the number of bytes
101 * absorbed. This interface is useful for files
102 * no larger than the buffer.
103 * 1) Set *start = an unsigned long value less than
104 * the buffer address but greater than zero.
105 * Put the data of the requested offset at the
106 * beginning of the buffer. Return the number of
107 * bytes of data placed there. If this number is
108 * greater than zero and you didn't signal eof
109 * and the reader is prepared to take more data
110 * you will be called again with the requested
111 * offset advanced by *start. This interface is
112 * useful when you have a large file consisting
113 * of a series of blocks which you want to count
114 * and return as wholes.
115 * (Hack by Paul.Russell@rustcorp.com.au)
116 * 2) Set *start = an address within the buffer.
117 * Put the data of the requested offset at *start.
118 * Return the number of bytes of data placed there.
119 * If this number is greater than zero and you
120 * didn't signal eof and the reader is prepared to
121 * take more data you will be called again with the
122 * requested offset advanced by the number of bytes
123 * absorbed.
124 */
125 n = dp->read_proc(page, &start, *ppos,
126 count, &eof, dp->data);
127 } else
128 break;
129
130 if (n == 0) /* end of file */
131 break;
132 if (n < 0) { /* error */
133 if (retval == 0)
134 retval = n;
135 break;
136 }
137
138 if (start == NULL) {
139 if (n > PAGE_SIZE) {
140 printk(KERN_ERR
141 "proc_file_read: Apparent buffer overflow!\n");
142 n = PAGE_SIZE;
143 }
144 n -= *ppos;
145 if (n <= 0)
146 break;
147 if (n > count)
148 n = count;
149 start = page + *ppos;
150 } else if (start < page) {
151 if (n > PAGE_SIZE) {
152 printk(KERN_ERR
153 "proc_file_read: Apparent buffer overflow!\n");
154 n = PAGE_SIZE;
155 }
156 if (n > count) {
157 /*
158 * Don't reduce n because doing so might
159 * cut off part of a data block.
160 */
161 printk(KERN_WARNING
162 "proc_file_read: Read count exceeded\n");
163 }
164 } else /* start >= page */ {
165 unsigned long startoff = (unsigned long)(start - page);
166 if (n > (PAGE_SIZE - startoff)) {
167 printk(KERN_ERR
168 "proc_file_read: Apparent buffer overflow!\n");
169 n = PAGE_SIZE - startoff;
170 }
171 if (n > count)
172 n = count;
173 }
174
175 n -= copy_to_user(buf, start < page ? page : start, n);
176 if (n == 0) {
177 if (retval == 0)
178 retval = -EFAULT;
179 break;
180 }
181
182 *ppos += start < page ? (unsigned long)start : n;
183 nbytes -= n;
184 buf += n;
185 retval += n;
186 }
187 free_page((unsigned long) page);
188 return retval;
189}
190
191static ssize_t
192proc_file_write(struct file *file, const char __user *buffer,
193 size_t count, loff_t *ppos)
194{
Josef "Jeff" Sipek2fddfee2006-12-08 02:36:36 -0800195 struct inode *inode = file->f_path.dentry->d_inode;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700196 struct proc_dir_entry * dp;
197
198 dp = PDE(inode);
199
200 if (!dp->write_proc)
201 return -EIO;
202
203 /* FIXME: does this routine need ppos? probably... */
204 return dp->write_proc(file, buffer, count, dp->data);
205}
206
207
208static loff_t
209proc_file_lseek(struct file *file, loff_t offset, int orig)
210{
Linus Torvalds8b90db02005-12-30 08:39:10 -0800211 loff_t retval = -EINVAL;
212 switch (orig) {
213 case 1:
214 offset += file->f_pos;
215 /* fallthrough */
216 case 0:
217 if (offset < 0 || offset > MAX_NON_LFS)
218 break;
219 file->f_pos = retval = offset;
220 }
221 return retval;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700222}
223
Alexey Dobriyan76df0c22008-02-08 04:18:27 -0800224static const struct file_operations proc_file_operations = {
225 .llseek = proc_file_lseek,
226 .read = proc_file_read,
227 .write = proc_file_write,
228};
229
Linus Torvalds1da177e2005-04-16 15:20:36 -0700230static int proc_notify_change(struct dentry *dentry, struct iattr *iattr)
231{
232 struct inode *inode = dentry->d_inode;
233 struct proc_dir_entry *de = PDE(inode);
234 int error;
235
236 error = inode_change_ok(inode, iattr);
237 if (error)
238 goto out;
239
240 error = inode_setattr(inode, iattr);
241 if (error)
242 goto out;
243
244 de->uid = inode->i_uid;
245 de->gid = inode->i_gid;
246 de->mode = inode->i_mode;
247out:
248 return error;
249}
250
Miklos Szeredi2b579be2005-09-06 15:17:18 -0700251static int proc_getattr(struct vfsmount *mnt, struct dentry *dentry,
252 struct kstat *stat)
253{
254 struct inode *inode = dentry->d_inode;
255 struct proc_dir_entry *de = PROC_I(inode)->pde;
256 if (de && de->nlink)
257 inode->i_nlink = de->nlink;
258
259 generic_fillattr(inode, stat);
260 return 0;
261}
262
Arjan van de Venc5ef1c42007-02-12 00:55:40 -0800263static const struct inode_operations proc_file_inode_operations = {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700264 .setattr = proc_notify_change,
265};
266
267/*
268 * This function parses a name such as "tty/driver/serial", and
269 * returns the struct proc_dir_entry for "/proc/tty/driver", and
270 * returns "serial" in residual.
271 */
272static int xlate_proc_name(const char *name,
273 struct proc_dir_entry **ret, const char **residual)
274{
275 const char *cp = name, *next;
276 struct proc_dir_entry *de;
277 int len;
Steven Rostedt64a07bd2006-03-26 01:36:55 -0800278 int rtn = 0;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700279
Alexey Dobriyan7cee4e02008-04-29 01:01:40 -0700280 de = *ret;
281 if (!de)
282 de = &proc_root;
283
Steven Rostedt64a07bd2006-03-26 01:36:55 -0800284 spin_lock(&proc_subdir_lock);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700285 while (1) {
286 next = strchr(cp, '/');
287 if (!next)
288 break;
289
290 len = next - cp;
291 for (de = de->subdir; de ; de = de->next) {
292 if (proc_match(len, cp, de))
293 break;
294 }
Steven Rostedt64a07bd2006-03-26 01:36:55 -0800295 if (!de) {
296 rtn = -ENOENT;
297 goto out;
298 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700299 cp += len + 1;
300 }
301 *residual = cp;
302 *ret = de;
Steven Rostedt64a07bd2006-03-26 01:36:55 -0800303out:
304 spin_unlock(&proc_subdir_lock);
305 return rtn;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700306}
307
308static DEFINE_IDR(proc_inum_idr);
309static DEFINE_SPINLOCK(proc_inum_lock); /* protects the above */
310
311#define PROC_DYNAMIC_FIRST 0xF0000000UL
312
313/*
314 * Return an inode number between PROC_DYNAMIC_FIRST and
315 * 0xffffffff, or zero on failure.
316 */
317static unsigned int get_inode_number(void)
318{
319 int i, inum = 0;
320 int error;
321
322retry:
323 if (idr_pre_get(&proc_inum_idr, GFP_KERNEL) == 0)
324 return 0;
325
326 spin_lock(&proc_inum_lock);
327 error = idr_get_new(&proc_inum_idr, NULL, &i);
328 spin_unlock(&proc_inum_lock);
329 if (error == -EAGAIN)
330 goto retry;
331 else if (error)
332 return 0;
333
334 inum = (i & MAX_ID_MASK) + PROC_DYNAMIC_FIRST;
335
336 /* inum will never be more than 0xf0ffffff, so no check
337 * for overflow.
338 */
339
340 return inum;
341}
342
343static void release_inode_number(unsigned int inum)
344{
345 int id = (inum - PROC_DYNAMIC_FIRST) | ~MAX_ID_MASK;
346
347 spin_lock(&proc_inum_lock);
348 idr_remove(&proc_inum_idr, id);
349 spin_unlock(&proc_inum_lock);
350}
351
Al Viro008b1502005-08-20 00:17:39 +0100352static void *proc_follow_link(struct dentry *dentry, struct nameidata *nd)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700353{
354 nd_set_link(nd, PDE(dentry->d_inode)->data);
Al Viro008b1502005-08-20 00:17:39 +0100355 return NULL;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700356}
357
Arjan van de Venc5ef1c42007-02-12 00:55:40 -0800358static const struct inode_operations proc_link_inode_operations = {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700359 .readlink = generic_readlink,
360 .follow_link = proc_follow_link,
361};
362
363/*
364 * As some entries in /proc are volatile, we want to
365 * get rid of unused dentries. This could be made
366 * smarter: we could keep a "volatile" flag in the
367 * inode to indicate which ones to keep.
368 */
369static int proc_delete_dentry(struct dentry * dentry)
370{
371 return 1;
372}
373
374static struct dentry_operations proc_dentry_operations =
375{
376 .d_delete = proc_delete_dentry,
377};
378
379/*
380 * Don't create negative dentries here, return -ENOENT by hand
381 * instead.
382 */
Pavel Emelyanove9720ac2008-03-07 11:08:40 -0800383struct dentry *proc_lookup_de(struct proc_dir_entry *de, struct inode *dir,
384 struct dentry *dentry)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700385{
386 struct inode *inode = NULL;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700387 int error = -ENOENT;
388
389 lock_kernel();
Steven Rostedt64a07bd2006-03-26 01:36:55 -0800390 spin_lock(&proc_subdir_lock);
Alexey Dobriyan5e971dc2008-04-29 01:01:41 -0700391 for (de = de->subdir; de ; de = de->next) {
392 if (de->namelen != dentry->d_name.len)
393 continue;
394 if (!memcmp(dentry->d_name.name, de->name, de->namelen)) {
395 unsigned int ino;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700396
Alexey Dobriyan5e971dc2008-04-29 01:01:41 -0700397 ino = de->low_ino;
398 de_get(de);
399 spin_unlock(&proc_subdir_lock);
400 error = -EINVAL;
401 inode = proc_get_inode(dir->i_sb, ino, de);
402 goto out_unlock;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700403 }
404 }
Steven Rostedt64a07bd2006-03-26 01:36:55 -0800405 spin_unlock(&proc_subdir_lock);
Alexey Dobriyan4237e0d2008-02-08 04:18:27 -0800406out_unlock:
Linus Torvalds1da177e2005-04-16 15:20:36 -0700407 unlock_kernel();
408
409 if (inode) {
410 dentry->d_op = &proc_dentry_operations;
411 d_add(dentry, inode);
412 return NULL;
413 }
Alexey Dobriyan5e971dc2008-04-29 01:01:41 -0700414 if (de)
415 de_put(de);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700416 return ERR_PTR(error);
417}
418
Pavel Emelyanove9720ac2008-03-07 11:08:40 -0800419struct dentry *proc_lookup(struct inode *dir, struct dentry *dentry,
420 struct nameidata *nd)
421{
422 return proc_lookup_de(PDE(dir), dir, dentry);
423}
424
Linus Torvalds1da177e2005-04-16 15:20:36 -0700425/*
426 * This returns non-zero if at EOF, so that the /proc
427 * root directory can use this and check if it should
428 * continue with the <pid> entries..
429 *
430 * Note that the VFS-layer doesn't care about the return
431 * value of the readdir() call, as long as it's non-negative
432 * for success..
433 */
Pavel Emelyanove9720ac2008-03-07 11:08:40 -0800434int proc_readdir_de(struct proc_dir_entry *de, struct file *filp, void *dirent,
435 filldir_t filldir)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700436{
Linus Torvalds1da177e2005-04-16 15:20:36 -0700437 unsigned int ino;
438 int i;
Josef "Jeff" Sipek2fddfee2006-12-08 02:36:36 -0800439 struct inode *inode = filp->f_path.dentry->d_inode;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700440 int ret = 0;
441
442 lock_kernel();
443
444 ino = inode->i_ino;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700445 i = filp->f_pos;
446 switch (i) {
447 case 0:
448 if (filldir(dirent, ".", 1, i, ino, DT_DIR) < 0)
449 goto out;
450 i++;
451 filp->f_pos++;
452 /* fall through */
453 case 1:
454 if (filldir(dirent, "..", 2, i,
Josef "Jeff" Sipek2fddfee2006-12-08 02:36:36 -0800455 parent_ino(filp->f_path.dentry),
Linus Torvalds1da177e2005-04-16 15:20:36 -0700456 DT_DIR) < 0)
457 goto out;
458 i++;
459 filp->f_pos++;
460 /* fall through */
461 default:
Steven Rostedt64a07bd2006-03-26 01:36:55 -0800462 spin_lock(&proc_subdir_lock);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700463 de = de->subdir;
464 i -= 2;
465 for (;;) {
466 if (!de) {
467 ret = 1;
Steven Rostedt64a07bd2006-03-26 01:36:55 -0800468 spin_unlock(&proc_subdir_lock);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700469 goto out;
470 }
471 if (!i)
472 break;
473 de = de->next;
474 i--;
475 }
476
477 do {
Darrick J. Wong59cd0cb2007-05-08 00:25:47 -0700478 struct proc_dir_entry *next;
479
Steven Rostedt64a07bd2006-03-26 01:36:55 -0800480 /* filldir passes info to user space */
Darrick J. Wong59cd0cb2007-05-08 00:25:47 -0700481 de_get(de);
Steven Rostedt64a07bd2006-03-26 01:36:55 -0800482 spin_unlock(&proc_subdir_lock);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700483 if (filldir(dirent, de->name, de->namelen, filp->f_pos,
Darrick J. Wong59cd0cb2007-05-08 00:25:47 -0700484 de->low_ino, de->mode >> 12) < 0) {
485 de_put(de);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700486 goto out;
Darrick J. Wong59cd0cb2007-05-08 00:25:47 -0700487 }
Steven Rostedt64a07bd2006-03-26 01:36:55 -0800488 spin_lock(&proc_subdir_lock);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700489 filp->f_pos++;
Darrick J. Wong59cd0cb2007-05-08 00:25:47 -0700490 next = de->next;
491 de_put(de);
492 de = next;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700493 } while (de);
Steven Rostedt64a07bd2006-03-26 01:36:55 -0800494 spin_unlock(&proc_subdir_lock);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700495 }
496 ret = 1;
497out: unlock_kernel();
498 return ret;
499}
500
Pavel Emelyanove9720ac2008-03-07 11:08:40 -0800501int proc_readdir(struct file *filp, void *dirent, filldir_t filldir)
502{
503 struct inode *inode = filp->f_path.dentry->d_inode;
504
505 return proc_readdir_de(PDE(inode), filp, dirent, filldir);
506}
507
Linus Torvalds1da177e2005-04-16 15:20:36 -0700508/*
509 * These are the generic /proc directory operations. They
510 * use the in-memory "struct proc_dir_entry" tree to parse
511 * the /proc directory.
512 */
Arjan van de Ven00977a52007-02-12 00:55:34 -0800513static const struct file_operations proc_dir_operations = {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700514 .read = generic_read_dir,
515 .readdir = proc_readdir,
516};
517
518/*
519 * proc directories can do almost nothing..
520 */
Arjan van de Venc5ef1c42007-02-12 00:55:40 -0800521static const struct inode_operations proc_dir_inode_operations = {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700522 .lookup = proc_lookup,
Miklos Szeredi2b579be2005-09-06 15:17:18 -0700523 .getattr = proc_getattr,
Linus Torvalds1da177e2005-04-16 15:20:36 -0700524 .setattr = proc_notify_change,
525};
526
527static int proc_register(struct proc_dir_entry * dir, struct proc_dir_entry * dp)
528{
529 unsigned int i;
Zhang Rui94413d82008-02-08 04:18:29 -0800530 struct proc_dir_entry *tmp;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700531
532 i = get_inode_number();
533 if (i == 0)
534 return -EAGAIN;
535 dp->low_ino = i;
Steven Rostedt64a07bd2006-03-26 01:36:55 -0800536
Linus Torvalds1da177e2005-04-16 15:20:36 -0700537 if (S_ISDIR(dp->mode)) {
538 if (dp->proc_iops == NULL) {
539 dp->proc_fops = &proc_dir_operations;
540 dp->proc_iops = &proc_dir_inode_operations;
541 }
542 dir->nlink++;
543 } else if (S_ISLNK(dp->mode)) {
544 if (dp->proc_iops == NULL)
545 dp->proc_iops = &proc_link_inode_operations;
546 } else if (S_ISREG(dp->mode)) {
547 if (dp->proc_fops == NULL)
548 dp->proc_fops = &proc_file_operations;
549 if (dp->proc_iops == NULL)
550 dp->proc_iops = &proc_file_inode_operations;
551 }
Changli Gao99fc06d2007-07-15 23:40:09 -0700552
553 spin_lock(&proc_subdir_lock);
Zhang Rui94413d82008-02-08 04:18:29 -0800554
555 for (tmp = dir->subdir; tmp; tmp = tmp->next)
556 if (strcmp(tmp->name, dp->name) == 0) {
557 printk(KERN_WARNING "proc_dir_entry '%s' already "
558 "registered\n", dp->name);
559 dump_stack();
560 break;
561 }
562
Changli Gao99fc06d2007-07-15 23:40:09 -0700563 dp->next = dir->subdir;
564 dp->parent = dir;
565 dir->subdir = dp;
566 spin_unlock(&proc_subdir_lock);
567
Linus Torvalds1da177e2005-04-16 15:20:36 -0700568 return 0;
569}
570
Alexey Dobriyan2d3a4e32008-02-08 04:18:37 -0800571static struct proc_dir_entry *__proc_create(struct proc_dir_entry **parent,
Linus Torvalds1da177e2005-04-16 15:20:36 -0700572 const char *name,
573 mode_t mode,
574 nlink_t nlink)
575{
576 struct proc_dir_entry *ent = NULL;
577 const char *fn = name;
578 int len;
579
580 /* make sure name is valid */
581 if (!name || !strlen(name)) goto out;
582
Alexey Dobriyan7cee4e02008-04-29 01:01:40 -0700583 if (xlate_proc_name(name, parent, &fn) != 0)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700584 goto out;
585
586 /* At this point there must not be any '/' characters beyond *fn */
587 if (strchr(fn, '/'))
588 goto out;
589
590 len = strlen(fn);
591
592 ent = kmalloc(sizeof(struct proc_dir_entry) + len + 1, GFP_KERNEL);
593 if (!ent) goto out;
594
595 memset(ent, 0, sizeof(struct proc_dir_entry));
596 memcpy(((char *) ent) + sizeof(struct proc_dir_entry), fn, len + 1);
597 ent->name = ((char *) ent) + sizeof(*ent);
598 ent->namelen = len;
599 ent->mode = mode;
600 ent->nlink = nlink;
Alexey Dobriyan5a622f22007-12-04 23:45:28 -0800601 atomic_set(&ent->count, 1);
Alexey Dobriyan786d7e12007-07-15 23:39:00 -0700602 ent->pde_users = 0;
603 spin_lock_init(&ent->pde_unload_lock);
604 ent->pde_unload_completion = NULL;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700605 out:
606 return ent;
607}
608
609struct proc_dir_entry *proc_symlink(const char *name,
610 struct proc_dir_entry *parent, const char *dest)
611{
612 struct proc_dir_entry *ent;
613
Alexey Dobriyan2d3a4e32008-02-08 04:18:37 -0800614 ent = __proc_create(&parent, name,
Linus Torvalds1da177e2005-04-16 15:20:36 -0700615 (S_IFLNK | S_IRUGO | S_IWUGO | S_IXUGO),1);
616
617 if (ent) {
618 ent->data = kmalloc((ent->size=strlen(dest))+1, GFP_KERNEL);
619 if (ent->data) {
620 strcpy((char*)ent->data,dest);
621 if (proc_register(parent, ent) < 0) {
622 kfree(ent->data);
623 kfree(ent);
624 ent = NULL;
625 }
626 } else {
627 kfree(ent);
628 ent = NULL;
629 }
630 }
631 return ent;
632}
633
634struct proc_dir_entry *proc_mkdir_mode(const char *name, mode_t mode,
635 struct proc_dir_entry *parent)
636{
637 struct proc_dir_entry *ent;
638
Alexey Dobriyan2d3a4e32008-02-08 04:18:37 -0800639 ent = __proc_create(&parent, name, S_IFDIR | mode, 2);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700640 if (ent) {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700641 if (proc_register(parent, ent) < 0) {
642 kfree(ent);
643 ent = NULL;
644 }
645 }
646 return ent;
647}
648
649struct proc_dir_entry *proc_mkdir(const char *name,
650 struct proc_dir_entry *parent)
651{
652 return proc_mkdir_mode(name, S_IRUGO | S_IXUGO, parent);
653}
654
655struct proc_dir_entry *create_proc_entry(const char *name, mode_t mode,
656 struct proc_dir_entry *parent)
657{
658 struct proc_dir_entry *ent;
659 nlink_t nlink;
660
661 if (S_ISDIR(mode)) {
662 if ((mode & S_IALLUGO) == 0)
663 mode |= S_IRUGO | S_IXUGO;
664 nlink = 2;
665 } else {
666 if ((mode & S_IFMT) == 0)
667 mode |= S_IFREG;
668 if ((mode & S_IALLUGO) == 0)
669 mode |= S_IRUGO;
670 nlink = 1;
671 }
672
Alexey Dobriyan2d3a4e32008-02-08 04:18:37 -0800673 ent = __proc_create(&parent, name, mode, nlink);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700674 if (ent) {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700675 if (proc_register(parent, ent) < 0) {
676 kfree(ent);
677 ent = NULL;
678 }
679 }
680 return ent;
681}
682
Alexey Dobriyan2d3a4e32008-02-08 04:18:37 -0800683struct proc_dir_entry *proc_create(const char *name, mode_t mode,
684 struct proc_dir_entry *parent,
685 const struct file_operations *proc_fops)
686{
687 struct proc_dir_entry *pde;
688 nlink_t nlink;
689
690 if (S_ISDIR(mode)) {
691 if ((mode & S_IALLUGO) == 0)
692 mode |= S_IRUGO | S_IXUGO;
693 nlink = 2;
694 } else {
695 if ((mode & S_IFMT) == 0)
696 mode |= S_IFREG;
697 if ((mode & S_IALLUGO) == 0)
698 mode |= S_IRUGO;
699 nlink = 1;
700 }
701
702 pde = __proc_create(&parent, name, mode, nlink);
703 if (!pde)
704 goto out;
705 pde->proc_fops = proc_fops;
706 if (proc_register(parent, pde) < 0)
707 goto out_free;
708 return pde;
709out_free:
710 kfree(pde);
711out:
712 return NULL;
713}
714
Linus Torvalds1da177e2005-04-16 15:20:36 -0700715void free_proc_entry(struct proc_dir_entry *de)
716{
717 unsigned int ino = de->low_ino;
718
719 if (ino < PROC_DYNAMIC_FIRST)
720 return;
721
722 release_inode_number(ino);
723
Alexey Dobriyanfd2cbe42008-02-08 04:18:28 -0800724 if (S_ISLNK(de->mode))
Linus Torvalds1da177e2005-04-16 15:20:36 -0700725 kfree(de->data);
726 kfree(de);
727}
728
729/*
730 * Remove a /proc entry and free it if it's not currently in use.
Linus Torvalds1da177e2005-04-16 15:20:36 -0700731 */
732void remove_proc_entry(const char *name, struct proc_dir_entry *parent)
733{
734 struct proc_dir_entry **p;
Alexey Dobriyanf649d6d2008-04-29 01:01:39 -0700735 struct proc_dir_entry *de = NULL;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700736 const char *fn = name;
737 int len;
738
Alexey Dobriyan7cee4e02008-04-29 01:01:40 -0700739 if (xlate_proc_name(name, &parent, &fn) != 0)
Alexey Dobriyanf649d6d2008-04-29 01:01:39 -0700740 return;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700741 len = strlen(fn);
Steven Rostedt64a07bd2006-03-26 01:36:55 -0800742
743 spin_lock(&proc_subdir_lock);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700744 for (p = &parent->subdir; *p; p=&(*p)->next ) {
Alexey Dobriyanf649d6d2008-04-29 01:01:39 -0700745 if (proc_match(len, fn, *p)) {
746 de = *p;
747 *p = de->next;
748 de->next = NULL;
749 break;
Alexey Dobriyan786d7e12007-07-15 23:39:00 -0700750 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700751 }
Steven Rostedt64a07bd2006-03-26 01:36:55 -0800752 spin_unlock(&proc_subdir_lock);
Alexey Dobriyanf649d6d2008-04-29 01:01:39 -0700753 if (!de)
754 return;
755
756 spin_lock(&de->pde_unload_lock);
757 /*
758 * Stop accepting new callers into module. If you're
759 * dynamically allocating ->proc_fops, save a pointer somewhere.
760 */
761 de->proc_fops = NULL;
762 /* Wait until all existing callers into module are done. */
763 if (de->pde_users > 0) {
764 DECLARE_COMPLETION_ONSTACK(c);
765
766 if (!de->pde_unload_completion)
767 de->pde_unload_completion = &c;
768
769 spin_unlock(&de->pde_unload_lock);
770
771 wait_for_completion(de->pde_unload_completion);
772
773 goto continue_removing;
774 }
775 spin_unlock(&de->pde_unload_lock);
776
777continue_removing:
778 if (S_ISDIR(de->mode))
779 parent->nlink--;
780 de->nlink = 0;
781 if (de->subdir) {
782 printk(KERN_WARNING "%s: removing non-empty directory "
783 "'%s/%s', leaking at least '%s'\n", __func__,
784 de->parent->name, de->name, de->subdir->name);
785 WARN_ON(1);
786 }
787 if (atomic_dec_and_test(&de->count))
788 free_proc_entry(de);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700789}