ProcFS.cpp 59 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360136113621363136413651366136713681369137013711372137313741375137613771378137913801381138213831384138513861387138813891390139113921393139413951396139713981399140014011402140314041405140614071408140914101411141214131414141514161417141814191420142114221423142414251426142714281429143014311432143314341435143614371438143914401441144214431444144514461447144814491450145114521453145414551456145714581459146014611462146314641465146614671468146914701471147214731474147514761477147814791480148114821483148414851486148714881489149014911492149314941495149614971498149915001501150215031504150515061507150815091510151115121513151415151516151715181519152015211522152315241525152615271528152915301531153215331534153515361537153815391540154115421543154415451546154715481549155015511552155315541555155615571558155915601561156215631564156515661567156815691570157115721573157415751576157715781579158015811582158315841585158615871588158915901591159215931594159515961597159815991600160116021603160416051606160716081609161016111612161316141615161616171618161916201621162216231624162516261627162816291630163116321633163416351636163716381639164016411642164316441645164616471648164916501651165216531654165516561657165816591660166116621663166416651666166716681669167016711672167316741675167616771678167916801681168216831684168516861687168816891690169116921693169416951696169716981699170017011702170317041705170617071708170917101711171217131714171517161717171817191720172117221723172417251726172717281729173017311732173317341735173617371738
  1. /*
  2. * Copyright (c) 2018-2021, Andreas Kling <kling@serenityos.org>
  3. * Copyright (c) 2021, Spencer Dixon <spencercdixon@gmail.com>
  4. *
  5. * SPDX-License-Identifier: BSD-2-Clause
  6. */
  7. #include <AK/JsonObject.h>
  8. #include <AK/JsonObjectSerializer.h>
  9. #include <AK/JsonValue.h>
  10. #include <AK/ScopeGuard.h>
  11. #include <Kernel/Arch/x86/CPU.h>
  12. #include <Kernel/Arch/x86/ProcessorInfo.h>
  13. #include <Kernel/CommandLine.h>
  14. #include <Kernel/Console.h>
  15. #include <Kernel/DMI.h>
  16. #include <Kernel/Debug.h>
  17. #include <Kernel/Devices/BlockDevice.h>
  18. #include <Kernel/Devices/HID/HIDManagement.h>
  19. #include <Kernel/FileSystem/Custody.h>
  20. #include <Kernel/FileSystem/FileBackedFileSystem.h>
  21. #include <Kernel/FileSystem/FileDescription.h>
  22. #include <Kernel/FileSystem/ProcFS.h>
  23. #include <Kernel/FileSystem/VirtualFileSystem.h>
  24. #include <Kernel/Heap/kmalloc.h>
  25. #include <Kernel/Interrupts/GenericInterruptHandler.h>
  26. #include <Kernel/Interrupts/InterruptManagement.h>
  27. #include <Kernel/KBufferBuilder.h>
  28. #include <Kernel/Module.h>
  29. #include <Kernel/Net/LocalSocket.h>
  30. #include <Kernel/Net/NetworkAdapter.h>
  31. #include <Kernel/Net/Routing.h>
  32. #include <Kernel/Net/TCPSocket.h>
  33. #include <Kernel/Net/UDPSocket.h>
  34. #include <Kernel/PCI/Access.h>
  35. #include <Kernel/PerformanceEventBuffer.h>
  36. #include <Kernel/Process.h>
  37. #include <Kernel/Scheduler.h>
  38. #include <Kernel/StdLib.h>
  39. #include <Kernel/TTY/TTY.h>
  40. #include <Kernel/UBSanitizer.h>
  41. #include <Kernel/VM/AnonymousVMObject.h>
  42. #include <Kernel/VM/MemoryManager.h>
  43. #include <LibC/errno_numbers.h>
  44. namespace Kernel {
  45. enum ProcParentDirectory {
  46. PDI_AbstractRoot = 0,
  47. PDI_Root,
  48. PDI_Root_sys,
  49. PDI_Root_net,
  50. PDI_PID,
  51. PDI_PID_fd,
  52. PDI_PID_stacks,
  53. };
  54. static_assert(PDI_PID_stacks < 16, "Too many directories for identifier scheme");
  55. enum ProcFileType {
  56. FI_Invalid = 0,
  57. FI_Root = 1, // directory
  58. __FI_Root_Start,
  59. FI_Root_df,
  60. FI_Root_all,
  61. FI_Root_memstat,
  62. FI_Root_cpuinfo,
  63. FI_Root_dmesg,
  64. FI_Root_interrupts,
  65. FI_Root_dmi,
  66. FI_Root_smbios_entry_point,
  67. FI_Root_keymap,
  68. FI_Root_pci,
  69. FI_Root_devices,
  70. FI_Root_uptime,
  71. FI_Root_cmdline,
  72. FI_Root_modules,
  73. FI_Root_profile,
  74. FI_Root_self, // symlink
  75. FI_Root_sys, // directory
  76. FI_Root_net, // directory
  77. __FI_Root_End,
  78. FI_Root_sys_variable,
  79. FI_Root_net_adapters,
  80. FI_Root_net_arp,
  81. FI_Root_net_tcp,
  82. FI_Root_net_udp,
  83. FI_Root_net_local,
  84. FI_PID,
  85. __FI_PID_Start,
  86. FI_PID_perf_events,
  87. FI_PID_vm,
  88. FI_PID_stacks, // directory
  89. FI_PID_fds,
  90. FI_PID_unveil,
  91. FI_PID_exe, // symlink
  92. FI_PID_cwd, // symlink
  93. FI_PID_root, // symlink
  94. FI_PID_fd, // directory
  95. __FI_PID_End,
  96. FI_MaxStaticFileIndex,
  97. };
  98. static inline ProcessID to_pid(const InodeIdentifier& identifier)
  99. {
  100. return identifier.index().value() >> 16u;
  101. }
  102. static inline ThreadID to_tid(const InodeIdentifier& identifier)
  103. {
  104. // Sneakily, use the exact same mechanism.
  105. return to_pid(identifier).value();
  106. }
  107. static inline ProcParentDirectory to_proc_parent_directory(const InodeIdentifier& identifier)
  108. {
  109. return (ProcParentDirectory)((identifier.index().value() >> 12) & 0xf);
  110. }
  111. static inline ProcFileType to_proc_file_type(const InodeIdentifier& identifier)
  112. {
  113. return (ProcFileType)(identifier.index().value() & 0xff);
  114. }
  115. static inline int to_fd(const InodeIdentifier& identifier)
  116. {
  117. VERIFY(to_proc_parent_directory(identifier) == PDI_PID_fd);
  118. return (identifier.index().value() & 0xff) - FI_MaxStaticFileIndex;
  119. }
  120. static inline size_t to_sys_index(const InodeIdentifier& identifier)
  121. {
  122. VERIFY(to_proc_parent_directory(identifier) == PDI_Root_sys);
  123. VERIFY(to_proc_file_type(identifier) == FI_Root_sys_variable);
  124. return identifier.index().value() >> 16u;
  125. }
  126. static inline InodeIdentifier to_identifier(unsigned fsid, ProcParentDirectory parent, ProcessID pid, ProcFileType proc_file_type)
  127. {
  128. return { fsid, ((unsigned)parent << 12u) | ((unsigned)pid.value() << 16u) | (unsigned)proc_file_type };
  129. }
  130. static inline InodeIdentifier to_identifier_with_fd(unsigned fsid, ProcessID pid, int fd)
  131. {
  132. return { fsid, (PDI_PID_fd << 12u) | ((unsigned)pid.value() << 16u) | (FI_MaxStaticFileIndex + fd) };
  133. }
  134. static inline InodeIdentifier to_identifier_with_stack(unsigned fsid, ThreadID tid)
  135. {
  136. return { fsid, (PDI_PID_stacks << 12u) | ((unsigned)tid.value() << 16u) | FI_MaxStaticFileIndex };
  137. }
  138. static inline InodeIdentifier sys_var_to_identifier(unsigned fsid, unsigned index)
  139. {
  140. VERIFY(index < 256);
  141. return { fsid, (PDI_Root_sys << 12u) | (index << 16u) | FI_Root_sys_variable };
  142. }
  143. static inline InodeIdentifier to_parent_id(const InodeIdentifier& identifier)
  144. {
  145. switch (to_proc_parent_directory(identifier)) {
  146. case PDI_AbstractRoot:
  147. case PDI_Root:
  148. return { identifier.fsid(), FI_Root };
  149. case PDI_Root_sys:
  150. return { identifier.fsid(), FI_Root_sys };
  151. case PDI_Root_net:
  152. return { identifier.fsid(), FI_Root_net };
  153. case PDI_PID:
  154. return to_identifier(identifier.fsid(), PDI_Root, to_pid(identifier), FI_PID);
  155. case PDI_PID_fd:
  156. return to_identifier(identifier.fsid(), PDI_PID, to_pid(identifier), FI_PID_fd);
  157. case PDI_PID_stacks:
  158. return to_identifier(identifier.fsid(), PDI_PID, to_pid(identifier), FI_PID_stacks);
  159. }
  160. VERIFY_NOT_REACHED();
  161. }
  162. #if 0
  163. static inline u8 to_unused_metadata(const InodeIdentifier& identifier)
  164. {
  165. return (identifier.index() >> 8) & 0xf;
  166. }
  167. #endif
  168. static inline bool is_process_related_file(const InodeIdentifier& identifier)
  169. {
  170. if (to_proc_file_type(identifier) == FI_PID)
  171. return true;
  172. auto proc_parent_directory = to_proc_parent_directory(identifier);
  173. switch (proc_parent_directory) {
  174. case PDI_PID:
  175. case PDI_PID_fd:
  176. return true;
  177. default:
  178. return false;
  179. }
  180. }
  181. static inline bool is_thread_related_file(const InodeIdentifier& identifier)
  182. {
  183. auto proc_parent_directory = to_proc_parent_directory(identifier);
  184. return proc_parent_directory == PDI_PID_stacks;
  185. }
  186. static inline bool is_directory(const InodeIdentifier& identifier)
  187. {
  188. auto proc_file_type = to_proc_file_type(identifier);
  189. switch (proc_file_type) {
  190. case FI_Root:
  191. case FI_Root_sys:
  192. case FI_Root_net:
  193. case FI_PID:
  194. case FI_PID_fd:
  195. case FI_PID_stacks:
  196. return true;
  197. default:
  198. return false;
  199. }
  200. }
  201. static inline bool is_persistent_inode(const InodeIdentifier& identifier)
  202. {
  203. return to_proc_parent_directory(identifier) == PDI_Root_sys;
  204. }
  205. struct ProcFSInodeData : public FileDescriptionData {
  206. RefPtr<KBufferImpl> buffer;
  207. };
  208. NonnullRefPtr<ProcFS> ProcFS::create()
  209. {
  210. return adopt_ref(*new ProcFS);
  211. }
  212. ProcFS::~ProcFS()
  213. {
  214. }
  215. static bool procfs$pid_fds(InodeIdentifier identifier, KBufferBuilder& builder)
  216. {
  217. JsonArraySerializer array { builder };
  218. auto process = Process::from_pid(to_pid(identifier));
  219. if (!process) {
  220. array.finish();
  221. return true;
  222. }
  223. if (process->number_of_open_file_descriptors() == 0) {
  224. array.finish();
  225. return true;
  226. }
  227. for (int i = 0; i < process->max_open_file_descriptors(); ++i) {
  228. auto description = process->file_description(i);
  229. if (!description)
  230. continue;
  231. bool cloexec = process->fd_flags(i) & FD_CLOEXEC;
  232. auto description_object = array.add_object();
  233. description_object.add("fd", i);
  234. description_object.add("absolute_path", description->absolute_path());
  235. description_object.add("seekable", description->file().is_seekable());
  236. description_object.add("class", description->file().class_name());
  237. description_object.add("offset", description->offset());
  238. description_object.add("cloexec", cloexec);
  239. description_object.add("blocking", description->is_blocking());
  240. description_object.add("can_read", description->can_read());
  241. description_object.add("can_write", description->can_write());
  242. }
  243. array.finish();
  244. return true;
  245. }
  246. static bool procfs$pid_fd_entry(InodeIdentifier identifier, KBufferBuilder& builder)
  247. {
  248. auto process = Process::from_pid(to_pid(identifier));
  249. if (!process)
  250. return false;
  251. int fd = to_fd(identifier);
  252. auto description = process->file_description(fd);
  253. if (!description)
  254. return false;
  255. builder.append_bytes(description->absolute_path().bytes());
  256. return true;
  257. }
  258. static bool procfs$pid_vm(InodeIdentifier identifier, KBufferBuilder& builder)
  259. {
  260. auto process = Process::from_pid(to_pid(identifier));
  261. if (!process)
  262. return false;
  263. JsonArraySerializer array { builder };
  264. {
  265. ScopedSpinLock lock(process->space().get_lock());
  266. for (auto& region : process->space().regions()) {
  267. if (!region->is_user() && !Process::current()->is_superuser())
  268. continue;
  269. auto region_object = array.add_object();
  270. region_object.add("readable", region->is_readable());
  271. region_object.add("writable", region->is_writable());
  272. region_object.add("executable", region->is_executable());
  273. region_object.add("stack", region->is_stack());
  274. region_object.add("shared", region->is_shared());
  275. region_object.add("syscall", region->is_syscall_region());
  276. region_object.add("purgeable", region->vmobject().is_anonymous());
  277. if (region->vmobject().is_anonymous()) {
  278. region_object.add("volatile", static_cast<const AnonymousVMObject&>(region->vmobject()).is_any_volatile());
  279. }
  280. region_object.add("cacheable", region->is_cacheable());
  281. region_object.add("address", region->vaddr().get());
  282. region_object.add("size", region->size());
  283. region_object.add("amount_resident", region->amount_resident());
  284. region_object.add("amount_dirty", region->amount_dirty());
  285. region_object.add("cow_pages", region->cow_pages());
  286. region_object.add("name", region->name());
  287. region_object.add("vmobject", region->vmobject().class_name());
  288. StringBuilder pagemap_builder;
  289. for (size_t i = 0; i < region->page_count(); ++i) {
  290. auto* page = region->physical_page(i);
  291. if (!page)
  292. pagemap_builder.append('N');
  293. else if (page->is_shared_zero_page() || page->is_lazy_committed_page())
  294. pagemap_builder.append('Z');
  295. else
  296. pagemap_builder.append('P');
  297. }
  298. region_object.add("pagemap", pagemap_builder.to_string());
  299. }
  300. }
  301. array.finish();
  302. return true;
  303. }
  304. static bool procfs$pci(InodeIdentifier, KBufferBuilder& builder)
  305. {
  306. JsonArraySerializer array { builder };
  307. PCI::enumerate([&array](PCI::Address address, PCI::ID id) {
  308. auto obj = array.add_object();
  309. obj.add("seg", address.seg());
  310. obj.add("bus", address.bus());
  311. obj.add("device", address.device());
  312. obj.add("function", address.function());
  313. obj.add("vendor_id", id.vendor_id);
  314. obj.add("device_id", id.device_id);
  315. obj.add("revision_id", PCI::get_revision_id(address));
  316. obj.add("subclass", PCI::get_subclass(address));
  317. obj.add("class", PCI::get_class(address));
  318. obj.add("subsystem_id", PCI::get_subsystem_id(address));
  319. obj.add("subsystem_vendor_id", PCI::get_subsystem_vendor_id(address));
  320. });
  321. array.finish();
  322. return true;
  323. }
  324. static bool procfs$dmi(InodeIdentifier, KBufferBuilder& builder)
  325. {
  326. if (!DMIExpose::the().is_available())
  327. return false;
  328. auto structures_ptr = DMIExpose::the().structure_table();
  329. builder.append_bytes(ReadonlyBytes { structures_ptr->data(), structures_ptr->size() });
  330. return true;
  331. }
  332. static bool procfs$smbios_entry_point(InodeIdentifier, KBufferBuilder& builder)
  333. {
  334. if (!DMIExpose::the().is_available())
  335. return false;
  336. auto structures_ptr = DMIExpose::the().entry_point();
  337. builder.append_bytes(ReadonlyBytes { structures_ptr->data(), structures_ptr->size() });
  338. return true;
  339. }
  340. static bool procfs$interrupts(InodeIdentifier, KBufferBuilder& builder)
  341. {
  342. JsonArraySerializer array { builder };
  343. InterruptManagement::the().enumerate_interrupt_handlers([&array](GenericInterruptHandler& handler) {
  344. auto obj = array.add_object();
  345. obj.add("purpose", handler.purpose());
  346. obj.add("interrupt_line", handler.interrupt_number());
  347. obj.add("controller", handler.controller());
  348. obj.add("cpu_handler", 0); // FIXME: Determine the responsible CPU for each interrupt handler.
  349. obj.add("device_sharing", (unsigned)handler.sharing_devices_count());
  350. obj.add("call_count", (unsigned)handler.get_invoking_count());
  351. });
  352. array.finish();
  353. return true;
  354. }
  355. static bool procfs$keymap(InodeIdentifier, KBufferBuilder& builder)
  356. {
  357. JsonObjectSerializer<KBufferBuilder> json { builder };
  358. json.add("keymap", HIDManagement::the().keymap_name());
  359. json.finish();
  360. return true;
  361. }
  362. static bool procfs$devices(InodeIdentifier, KBufferBuilder& builder)
  363. {
  364. JsonArraySerializer array { builder };
  365. Device::for_each([&array](auto& device) {
  366. auto obj = array.add_object();
  367. obj.add("major", device.major());
  368. obj.add("minor", device.minor());
  369. obj.add("class_name", device.class_name());
  370. if (device.is_block_device())
  371. obj.add("type", "block");
  372. else if (device.is_character_device())
  373. obj.add("type", "character");
  374. else
  375. VERIFY_NOT_REACHED();
  376. });
  377. array.finish();
  378. return true;
  379. }
  380. static bool procfs$uptime(InodeIdentifier, KBufferBuilder& builder)
  381. {
  382. builder.appendff("{}\n", TimeManagement::the().uptime_ms() / 1000);
  383. return true;
  384. }
  385. static bool procfs$cmdline(InodeIdentifier, KBufferBuilder& builder)
  386. {
  387. builder.append(kernel_command_line().string());
  388. builder.append('\n');
  389. return true;
  390. }
  391. static bool procfs$modules(InodeIdentifier, KBufferBuilder& builder)
  392. {
  393. extern HashMap<String, OwnPtr<Module>>* g_modules;
  394. JsonArraySerializer array { builder };
  395. for (auto& it : *g_modules) {
  396. auto obj = array.add_object();
  397. obj.add("name", it.value->name);
  398. obj.add("module_init", it.value->module_init);
  399. obj.add("module_fini", it.value->module_fini);
  400. u32 size = 0;
  401. for (auto& section : it.value->sections) {
  402. size += section.capacity();
  403. }
  404. obj.add("size", size);
  405. }
  406. array.finish();
  407. return true;
  408. }
  409. static bool procfs$profile(InodeIdentifier, KBufferBuilder& builder)
  410. {
  411. extern PerformanceEventBuffer* g_global_perf_events;
  412. if (!g_global_perf_events)
  413. return false;
  414. return g_global_perf_events->to_json(builder);
  415. }
  416. static bool procfs$pid_perf_events(InodeIdentifier identifier, KBufferBuilder& builder)
  417. {
  418. auto process = Process::from_pid(to_pid(identifier));
  419. if (!process)
  420. return false;
  421. InterruptDisabler disabler;
  422. if (!process->perf_events())
  423. return false;
  424. return process->perf_events()->to_json(builder);
  425. }
  426. static bool procfs$net_adapters(InodeIdentifier, KBufferBuilder& builder)
  427. {
  428. JsonArraySerializer array { builder };
  429. NetworkAdapter::for_each([&array](auto& adapter) {
  430. auto obj = array.add_object();
  431. obj.add("name", adapter.name());
  432. obj.add("class_name", adapter.class_name());
  433. obj.add("mac_address", adapter.mac_address().to_string());
  434. if (!adapter.ipv4_address().is_zero()) {
  435. obj.add("ipv4_address", adapter.ipv4_address().to_string());
  436. obj.add("ipv4_netmask", adapter.ipv4_netmask().to_string());
  437. }
  438. if (!adapter.ipv4_gateway().is_zero())
  439. obj.add("ipv4_gateway", adapter.ipv4_gateway().to_string());
  440. obj.add("packets_in", adapter.packets_in());
  441. obj.add("bytes_in", adapter.bytes_in());
  442. obj.add("packets_out", adapter.packets_out());
  443. obj.add("bytes_out", adapter.bytes_out());
  444. obj.add("link_up", adapter.link_up());
  445. obj.add("mtu", adapter.mtu());
  446. });
  447. array.finish();
  448. return true;
  449. }
  450. static bool procfs$net_arp(InodeIdentifier, KBufferBuilder& builder)
  451. {
  452. JsonArraySerializer array { builder };
  453. Locker locker(arp_table().lock(), Lock::Mode::Shared);
  454. for (auto& it : arp_table().resource()) {
  455. auto obj = array.add_object();
  456. obj.add("mac_address", it.value.to_string());
  457. obj.add("ip_address", it.key.to_string());
  458. }
  459. array.finish();
  460. return true;
  461. }
  462. static bool procfs$net_tcp(InodeIdentifier, KBufferBuilder& builder)
  463. {
  464. JsonArraySerializer array { builder };
  465. TCPSocket::for_each([&array](auto& socket) {
  466. auto obj = array.add_object();
  467. obj.add("local_address", socket.local_address().to_string());
  468. obj.add("local_port", socket.local_port());
  469. obj.add("peer_address", socket.peer_address().to_string());
  470. obj.add("peer_port", socket.peer_port());
  471. obj.add("state", TCPSocket::to_string(socket.state()));
  472. obj.add("ack_number", socket.ack_number());
  473. obj.add("sequence_number", socket.sequence_number());
  474. obj.add("packets_in", socket.packets_in());
  475. obj.add("bytes_in", socket.bytes_in());
  476. obj.add("packets_out", socket.packets_out());
  477. obj.add("bytes_out", socket.bytes_out());
  478. });
  479. array.finish();
  480. return true;
  481. }
  482. static bool procfs$net_udp(InodeIdentifier, KBufferBuilder& builder)
  483. {
  484. JsonArraySerializer array { builder };
  485. UDPSocket::for_each([&array](auto& socket) {
  486. auto obj = array.add_object();
  487. obj.add("local_address", socket.local_address().to_string());
  488. obj.add("local_port", socket.local_port());
  489. obj.add("peer_address", socket.peer_address().to_string());
  490. obj.add("peer_port", socket.peer_port());
  491. });
  492. array.finish();
  493. return true;
  494. }
  495. static bool procfs$net_local(InodeIdentifier, KBufferBuilder& builder)
  496. {
  497. JsonArraySerializer array { builder };
  498. LocalSocket::for_each([&array](auto& socket) {
  499. auto obj = array.add_object();
  500. obj.add("path", String(socket.socket_path()));
  501. obj.add("origin_pid", socket.origin_pid());
  502. obj.add("origin_uid", socket.origin_uid());
  503. obj.add("origin_gid", socket.origin_gid());
  504. obj.add("acceptor_pid", socket.acceptor_pid());
  505. obj.add("acceptor_uid", socket.acceptor_uid());
  506. obj.add("acceptor_gid", socket.acceptor_gid());
  507. });
  508. array.finish();
  509. return true;
  510. }
  511. static bool procfs$pid_unveil(InodeIdentifier identifier, KBufferBuilder& builder)
  512. {
  513. auto process = Process::from_pid(to_pid(identifier));
  514. if (!process)
  515. return false;
  516. JsonArraySerializer array { builder };
  517. for (auto& unveiled_path : process->unveiled_paths()) {
  518. if (!unveiled_path.was_explicitly_unveiled())
  519. continue;
  520. auto obj = array.add_object();
  521. obj.add("path", unveiled_path.path());
  522. StringBuilder permissions_builder;
  523. if (unveiled_path.permissions() & UnveilAccess::Read)
  524. permissions_builder.append('r');
  525. if (unveiled_path.permissions() & UnveilAccess::Write)
  526. permissions_builder.append('w');
  527. if (unveiled_path.permissions() & UnveilAccess::Execute)
  528. permissions_builder.append('x');
  529. if (unveiled_path.permissions() & UnveilAccess::CreateOrRemove)
  530. permissions_builder.append('c');
  531. if (unveiled_path.permissions() & UnveilAccess::Browse)
  532. permissions_builder.append('b');
  533. obj.add("permissions", permissions_builder.to_string());
  534. }
  535. array.finish();
  536. return true;
  537. }
  538. static bool procfs$tid_stack(InodeIdentifier identifier, KBufferBuilder& builder)
  539. {
  540. auto thread = Thread::from_tid(to_tid(identifier));
  541. if (!thread)
  542. return false;
  543. JsonArraySerializer array { builder };
  544. bool show_kernel_addresses = Process::current()->is_superuser();
  545. bool kernel_address_added = false;
  546. for (auto address : Processor::capture_stack_trace(*thread, 1024)) {
  547. if (!show_kernel_addresses && !is_user_address(VirtualAddress { address })) {
  548. if (kernel_address_added)
  549. continue;
  550. address = 0xdeadc0de;
  551. kernel_address_added = true;
  552. }
  553. array.add(JsonValue(address));
  554. }
  555. array.finish();
  556. return true;
  557. }
  558. static bool procfs$pid_exe(InodeIdentifier identifier, KBufferBuilder& builder)
  559. {
  560. auto process = Process::from_pid(to_pid(identifier));
  561. if (!process)
  562. return false;
  563. auto* custody = process->executable();
  564. VERIFY(custody);
  565. builder.append(custody->absolute_path().bytes());
  566. return true;
  567. }
  568. static bool procfs$pid_cwd(InodeIdentifier identifier, KBufferBuilder& builder)
  569. {
  570. auto process = Process::from_pid(to_pid(identifier));
  571. if (!process)
  572. return false;
  573. builder.append_bytes(process->current_directory().absolute_path().bytes());
  574. return true;
  575. }
  576. static bool procfs$pid_root(InodeIdentifier identifier, KBufferBuilder& builder)
  577. {
  578. auto process = Process::from_pid(to_pid(identifier));
  579. if (!process)
  580. return false;
  581. builder.append_bytes(process->root_directory_relative_to_global_root().absolute_path().to_byte_buffer());
  582. return true;
  583. }
  584. static bool procfs$self(InodeIdentifier, KBufferBuilder& builder)
  585. {
  586. builder.appendff("{}", Process::current()->pid().value());
  587. return true;
  588. }
  589. static bool procfs$dmesg(InodeIdentifier, KBufferBuilder& builder)
  590. {
  591. InterruptDisabler disabler;
  592. for (char ch : Console::the().logbuffer())
  593. builder.append(ch);
  594. return true;
  595. }
  596. static bool procfs$df(InodeIdentifier, KBufferBuilder& builder)
  597. {
  598. // FIXME: This is obviously racy against the VFS mounts changing.
  599. JsonArraySerializer array { builder };
  600. VFS::the().for_each_mount([&array](auto& mount) {
  601. auto& fs = mount.guest_fs();
  602. auto fs_object = array.add_object();
  603. fs_object.add("class_name", fs.class_name());
  604. fs_object.add("total_block_count", fs.total_block_count());
  605. fs_object.add("free_block_count", fs.free_block_count());
  606. fs_object.add("total_inode_count", fs.total_inode_count());
  607. fs_object.add("free_inode_count", fs.free_inode_count());
  608. fs_object.add("mount_point", mount.absolute_path());
  609. fs_object.add("block_size", static_cast<u64>(fs.block_size()));
  610. fs_object.add("readonly", fs.is_readonly());
  611. fs_object.add("mount_flags", mount.flags());
  612. if (fs.is_file_backed())
  613. fs_object.add("source", static_cast<const FileBackedFS&>(fs).file_description().absolute_path());
  614. else
  615. fs_object.add("source", "none");
  616. });
  617. array.finish();
  618. return true;
  619. }
  620. static bool procfs$cpuinfo(InodeIdentifier, KBufferBuilder& builder)
  621. {
  622. JsonArraySerializer array { builder };
  623. Processor::for_each(
  624. [&](Processor& proc) -> IterationDecision {
  625. auto& info = proc.info();
  626. auto obj = array.add_object();
  627. JsonArray features;
  628. for (auto& feature : info.features().split(' '))
  629. features.append(feature);
  630. obj.add("processor", proc.get_id());
  631. obj.add("cpuid", info.cpuid());
  632. obj.add("family", info.display_family());
  633. obj.add("features", features);
  634. obj.add("model", info.display_model());
  635. obj.add("stepping", info.stepping());
  636. obj.add("type", info.type());
  637. obj.add("brandstr", info.brandstr());
  638. return IterationDecision::Continue;
  639. });
  640. array.finish();
  641. return true;
  642. }
  643. static bool procfs$memstat(InodeIdentifier, KBufferBuilder& builder)
  644. {
  645. InterruptDisabler disabler;
  646. kmalloc_stats stats;
  647. get_kmalloc_stats(stats);
  648. ScopedSpinLock mm_lock(s_mm_lock);
  649. auto user_physical_pages_total = MM.user_physical_pages();
  650. auto user_physical_pages_used = MM.user_physical_pages_used();
  651. auto user_physical_pages_committed = MM.user_physical_pages_committed();
  652. auto user_physical_pages_uncommitted = MM.user_physical_pages_uncommitted();
  653. auto super_physical_total = MM.super_physical_pages();
  654. auto super_physical_used = MM.super_physical_pages_used();
  655. mm_lock.unlock();
  656. JsonObjectSerializer<KBufferBuilder> json { builder };
  657. json.add("kmalloc_allocated", stats.bytes_allocated);
  658. json.add("kmalloc_available", stats.bytes_free);
  659. json.add("kmalloc_eternal_allocated", stats.bytes_eternal);
  660. json.add("user_physical_allocated", user_physical_pages_used);
  661. json.add("user_physical_available", user_physical_pages_total - user_physical_pages_used);
  662. json.add("user_physical_committed", user_physical_pages_committed);
  663. json.add("user_physical_uncommitted", user_physical_pages_uncommitted);
  664. json.add("super_physical_allocated", super_physical_used);
  665. json.add("super_physical_available", super_physical_total - super_physical_used);
  666. json.add("kmalloc_call_count", stats.kmalloc_call_count);
  667. json.add("kfree_call_count", stats.kfree_call_count);
  668. slab_alloc_stats([&json](size_t slab_size, size_t num_allocated, size_t num_free) {
  669. auto prefix = String::formatted("slab_{}", slab_size);
  670. json.add(String::formatted("{}_num_allocated", prefix), num_allocated);
  671. json.add(String::formatted("{}_num_free", prefix), num_free);
  672. });
  673. json.finish();
  674. return true;
  675. }
  676. static bool procfs$all(InodeIdentifier, KBufferBuilder& builder)
  677. {
  678. JsonArraySerializer array { builder };
  679. // Keep this in sync with CProcessStatistics.
  680. auto build_process = [&](const Process& process) {
  681. auto process_object = array.add_object();
  682. if (process.is_user_process()) {
  683. StringBuilder pledge_builder;
  684. #define __ENUMERATE_PLEDGE_PROMISE(promise) \
  685. if (process.has_promised(Pledge::promise)) { \
  686. pledge_builder.append(#promise " "); \
  687. }
  688. ENUMERATE_PLEDGE_PROMISES
  689. #undef __ENUMERATE_PLEDGE_PROMISE
  690. process_object.add("pledge", pledge_builder.to_string());
  691. switch (process.veil_state()) {
  692. case VeilState::None:
  693. process_object.add("veil", "None");
  694. break;
  695. case VeilState::Dropped:
  696. process_object.add("veil", "Dropped");
  697. break;
  698. case VeilState::Locked:
  699. process_object.add("veil", "Locked");
  700. break;
  701. }
  702. } else {
  703. process_object.add("pledge", String());
  704. process_object.add("veil", String());
  705. }
  706. process_object.add("pid", process.pid().value());
  707. process_object.add("pgid", process.tty() ? process.tty()->pgid().value() : 0);
  708. process_object.add("pgp", process.pgid().value());
  709. process_object.add("sid", process.sid().value());
  710. process_object.add("uid", process.uid());
  711. process_object.add("gid", process.gid());
  712. process_object.add("ppid", process.ppid().value());
  713. process_object.add("nfds", process.number_of_open_file_descriptors());
  714. process_object.add("name", process.name());
  715. process_object.add("executable", process.executable() ? process.executable()->absolute_path() : "");
  716. process_object.add("tty", process.tty() ? process.tty()->tty_name() : "notty");
  717. process_object.add("amount_virtual", process.space().amount_virtual());
  718. process_object.add("amount_resident", process.space().amount_resident());
  719. process_object.add("amount_dirty_private", process.space().amount_dirty_private());
  720. process_object.add("amount_clean_inode", process.space().amount_clean_inode());
  721. process_object.add("amount_shared", process.space().amount_shared());
  722. process_object.add("amount_purgeable_volatile", process.space().amount_purgeable_volatile());
  723. process_object.add("amount_purgeable_nonvolatile", process.space().amount_purgeable_nonvolatile());
  724. process_object.add("dumpable", process.is_dumpable());
  725. process_object.add("kernel", process.is_kernel_process());
  726. auto thread_array = process_object.add_array("threads");
  727. process.for_each_thread([&](const Thread& thread) {
  728. auto thread_object = thread_array.add_object();
  729. #if LOCK_DEBUG
  730. thread_object.add("lock_count", thread.lock_count());
  731. #endif
  732. thread_object.add("tid", thread.tid().value());
  733. thread_object.add("name", thread.name());
  734. thread_object.add("times_scheduled", thread.times_scheduled());
  735. thread_object.add("ticks_user", thread.ticks_in_user());
  736. thread_object.add("ticks_kernel", thread.ticks_in_kernel());
  737. thread_object.add("state", thread.state_string());
  738. thread_object.add("cpu", thread.cpu());
  739. thread_object.add("priority", thread.priority());
  740. thread_object.add("syscall_count", thread.syscall_count());
  741. thread_object.add("inode_faults", thread.inode_faults());
  742. thread_object.add("zero_faults", thread.zero_faults());
  743. thread_object.add("cow_faults", thread.cow_faults());
  744. thread_object.add("file_read_bytes", thread.file_read_bytes());
  745. thread_object.add("file_write_bytes", thread.file_write_bytes());
  746. thread_object.add("unix_socket_read_bytes", thread.unix_socket_read_bytes());
  747. thread_object.add("unix_socket_write_bytes", thread.unix_socket_write_bytes());
  748. thread_object.add("ipv4_socket_read_bytes", thread.ipv4_socket_read_bytes());
  749. thread_object.add("ipv4_socket_write_bytes", thread.ipv4_socket_write_bytes());
  750. return IterationDecision::Continue;
  751. });
  752. };
  753. ScopedSpinLock lock(g_scheduler_lock);
  754. auto processes = Process::all_processes();
  755. build_process(*Scheduler::colonel());
  756. for (auto& process : processes)
  757. build_process(process);
  758. array.finish();
  759. return true;
  760. }
  761. struct SysVariable {
  762. String name;
  763. enum class Type : u8 {
  764. Invalid,
  765. Boolean,
  766. String,
  767. };
  768. Type type { Type::Invalid };
  769. Function<void()> notify_callback;
  770. void* address { nullptr };
  771. static SysVariable& for_inode(InodeIdentifier);
  772. void notify()
  773. {
  774. if (notify_callback)
  775. notify_callback();
  776. }
  777. };
  778. static Vector<SysVariable, 16>* s_sys_variables;
  779. static inline Vector<SysVariable, 16>& sys_variables()
  780. {
  781. if (s_sys_variables == nullptr) {
  782. s_sys_variables = new Vector<SysVariable, 16>;
  783. s_sys_variables->append({ "", SysVariable::Type::Invalid, nullptr, nullptr });
  784. }
  785. return *s_sys_variables;
  786. }
  787. SysVariable& SysVariable::for_inode(InodeIdentifier id)
  788. {
  789. auto index = to_sys_index(id);
  790. if (index >= sys_variables().size())
  791. return sys_variables()[0];
  792. auto& variable = sys_variables()[index];
  793. VERIFY(variable.address);
  794. return variable;
  795. }
  796. static bool read_sys_bool(InodeIdentifier inode_id, KBufferBuilder& builder)
  797. {
  798. auto& variable = SysVariable::for_inode(inode_id);
  799. VERIFY(variable.type == SysVariable::Type::Boolean);
  800. u8 buffer[2];
  801. auto* lockable_bool = reinterpret_cast<Lockable<bool>*>(variable.address);
  802. {
  803. Locker locker(lockable_bool->lock(), Lock::Mode::Shared);
  804. buffer[0] = lockable_bool->resource() ? '1' : '0';
  805. }
  806. buffer[1] = '\n';
  807. builder.append_bytes(ReadonlyBytes { buffer, sizeof(buffer) });
  808. return true;
  809. }
  810. static ssize_t write_sys_bool(InodeIdentifier inode_id, const UserOrKernelBuffer& buffer, size_t size)
  811. {
  812. auto& variable = SysVariable::for_inode(inode_id);
  813. VERIFY(variable.type == SysVariable::Type::Boolean);
  814. char value = 0;
  815. bool did_read = false;
  816. ssize_t nread = buffer.read_buffered<1>(1, [&](const u8* data, size_t) {
  817. if (did_read)
  818. return 0;
  819. value = (char)data[0];
  820. did_read = true;
  821. return 1;
  822. });
  823. if (nread < 0)
  824. return nread;
  825. VERIFY(nread == 0 || (nread == 1 && did_read));
  826. if (nread == 0 || !(value == '0' || value == '1'))
  827. return (ssize_t)size;
  828. auto* lockable_bool = reinterpret_cast<Lockable<bool>*>(variable.address);
  829. {
  830. Locker locker(lockable_bool->lock());
  831. lockable_bool->resource() = value == '1';
  832. }
  833. variable.notify();
  834. return (ssize_t)size;
  835. }
  836. static bool read_sys_string(InodeIdentifier inode_id, KBufferBuilder& builder)
  837. {
  838. auto& variable = SysVariable::for_inode(inode_id);
  839. VERIFY(variable.type == SysVariable::Type::String);
  840. auto* lockable_string = reinterpret_cast<Lockable<String>*>(variable.address);
  841. Locker locker(lockable_string->lock(), Lock::Mode::Shared);
  842. builder.append_bytes(lockable_string->resource().bytes());
  843. return true;
  844. }
  845. static ssize_t write_sys_string(InodeIdentifier inode_id, const UserOrKernelBuffer& buffer, size_t size)
  846. {
  847. auto& variable = SysVariable::for_inode(inode_id);
  848. VERIFY(variable.type == SysVariable::Type::String);
  849. auto string_copy = buffer.copy_into_string(size);
  850. if (string_copy.is_null())
  851. return -EFAULT;
  852. {
  853. auto* lockable_string = reinterpret_cast<Lockable<String>*>(variable.address);
  854. Locker locker(lockable_string->lock());
  855. lockable_string->resource() = move(string_copy);
  856. }
  857. variable.notify();
  858. return (ssize_t)size;
  859. }
  860. void ProcFS::add_sys_bool(String&& name, Lockable<bool>& var, Function<void()>&& notify_callback)
  861. {
  862. InterruptDisabler disabler;
  863. SysVariable variable;
  864. variable.name = move(name);
  865. variable.type = SysVariable::Type::Boolean;
  866. variable.notify_callback = move(notify_callback);
  867. variable.address = &var;
  868. sys_variables().append(move(variable));
  869. }
  870. bool ProcFS::initialize()
  871. {
  872. static Lockable<bool>* kmalloc_stack_helper;
  873. static Lockable<bool>* ubsan_deadly_helper;
  874. static Lockable<bool>* caps_lock_to_ctrl_helper;
  875. if (kmalloc_stack_helper == nullptr) {
  876. kmalloc_stack_helper = new Lockable<bool>();
  877. kmalloc_stack_helper->resource() = g_dump_kmalloc_stacks;
  878. ProcFS::add_sys_bool("kmalloc_stacks", *kmalloc_stack_helper, [] {
  879. g_dump_kmalloc_stacks = kmalloc_stack_helper->resource();
  880. });
  881. ubsan_deadly_helper = new Lockable<bool>();
  882. ubsan_deadly_helper->resource() = UBSanitizer::g_ubsan_is_deadly;
  883. ProcFS::add_sys_bool("ubsan_is_deadly", *ubsan_deadly_helper, [] {
  884. UBSanitizer::g_ubsan_is_deadly = ubsan_deadly_helper->resource();
  885. });
  886. caps_lock_to_ctrl_helper = new Lockable<bool>();
  887. ProcFS::add_sys_bool("caps_lock_to_ctrl", *caps_lock_to_ctrl_helper, [] {
  888. Kernel::g_caps_lock_remapped_to_ctrl.exchange(caps_lock_to_ctrl_helper->resource());
  889. });
  890. }
  891. return true;
  892. }
  893. const char* ProcFS::class_name() const
  894. {
  895. return "ProcFS";
  896. }
  897. NonnullRefPtr<Inode> ProcFS::root_inode() const
  898. {
  899. return *m_root_inode;
  900. }
  901. RefPtr<Inode> ProcFS::get_inode(InodeIdentifier inode_id) const
  902. {
  903. dbgln_if(PROCFS_DEBUG, "ProcFS::get_inode({})", inode_id.index());
  904. if (inode_id == root_inode()->identifier())
  905. return m_root_inode;
  906. Locker locker(m_inodes_lock);
  907. auto it = m_inodes.find(inode_id.index().value());
  908. if (it != m_inodes.end()) {
  909. // It's possible that the ProcFSInode ref count was dropped to 0 or
  910. // the ~ProcFSInode destructor is even running already, but blocked
  911. // from removing it from this map. So we need to *try* to ref it,
  912. // and if that fails we cannot return this instance anymore and just
  913. // create a new one.
  914. if (it->value->try_ref())
  915. return adopt_ref(*it->value);
  916. // We couldn't ref it, so just create a new one and replace the entry
  917. }
  918. auto inode = adopt_ref(*new ProcFSInode(const_cast<ProcFS&>(*this), inode_id.index()));
  919. auto result = m_inodes.set(inode_id.index().value(), inode.ptr());
  920. VERIFY(result == ((it == m_inodes.end()) ? AK::HashSetResult::InsertedNewEntry : AK::HashSetResult::ReplacedExistingEntry));
  921. return inode;
  922. }
  923. ProcFSInode::ProcFSInode(ProcFS& fs, InodeIndex index)
  924. : Inode(fs, index)
  925. {
  926. }
  927. ProcFSInode::~ProcFSInode()
  928. {
  929. Locker locker(fs().m_inodes_lock);
  930. auto it = fs().m_inodes.find(index().value());
  931. if (it != fs().m_inodes.end() && it->value == this)
  932. fs().m_inodes.remove(it);
  933. }
  934. RefPtr<Process> ProcFSInode::process() const
  935. {
  936. auto parent = to_proc_parent_directory(identifier());
  937. if (parent == PDI_PID || parent == PDI_PID_fd || parent == PDI_PID_stacks)
  938. return Process::from_pid(to_pid(identifier()));
  939. return nullptr;
  940. }
  941. KResult ProcFSInode::refresh_data(FileDescription& description) const
  942. {
  943. if (Kernel::is_directory(identifier()))
  944. return KSuccess;
  945. // For process-specific inodes, hold the process's ptrace lock across refresh
  946. // and refuse to load data if the process is not dumpable.
  947. // Without this, files opened before a process went non-dumpable could still be used for dumping.
  948. auto process = this->process();
  949. if (process) {
  950. process->ptrace_lock().lock();
  951. if (!process->is_dumpable()) {
  952. process->ptrace_lock().unlock();
  953. return EPERM;
  954. }
  955. }
  956. ScopeGuard guard = [&] {
  957. if (process)
  958. process->ptrace_lock().unlock();
  959. };
  960. auto& cached_data = description.data();
  961. auto* directory_entry = fs().get_directory_entry(identifier());
  962. bool (*read_callback)(InodeIdentifier, KBufferBuilder&) = nullptr;
  963. if (directory_entry) {
  964. read_callback = directory_entry->read_callback;
  965. VERIFY(read_callback);
  966. } else {
  967. switch (to_proc_parent_directory(identifier())) {
  968. case PDI_PID_fd:
  969. read_callback = procfs$pid_fd_entry;
  970. break;
  971. case PDI_PID_stacks:
  972. read_callback = procfs$tid_stack;
  973. break;
  974. case PDI_Root_sys:
  975. switch (SysVariable::for_inode(identifier()).type) {
  976. case SysVariable::Type::Invalid:
  977. VERIFY_NOT_REACHED();
  978. case SysVariable::Type::Boolean:
  979. read_callback = read_sys_bool;
  980. break;
  981. case SysVariable::Type::String:
  982. read_callback = read_sys_string;
  983. break;
  984. }
  985. break;
  986. default:
  987. VERIFY_NOT_REACHED();
  988. }
  989. VERIFY(read_callback);
  990. }
  991. if (!cached_data)
  992. cached_data = new ProcFSInodeData;
  993. auto& buffer = static_cast<ProcFSInodeData&>(*cached_data).buffer;
  994. if (buffer) {
  995. // If we're reusing the buffer, reset the size to 0 first. This
  996. // ensures we don't accidentally leak previously written data.
  997. buffer->set_size(0);
  998. }
  999. KBufferBuilder builder(buffer, true);
  1000. if (!read_callback(identifier(), builder))
  1001. return ENOENT;
  1002. // We don't use builder.build() here, which would steal our buffer
  1003. // and turn it into an OwnPtr. Instead, just flush to the buffer so
  1004. // that we can read all the data that was written.
  1005. if (!builder.flush())
  1006. return ENOMEM;
  1007. if (!buffer)
  1008. return ENOMEM;
  1009. return KSuccess;
  1010. }
  1011. KResult ProcFSInode::attach(FileDescription& description)
  1012. {
  1013. return refresh_data(description);
  1014. }
  1015. void ProcFSInode::did_seek(FileDescription& description, off_t new_offset)
  1016. {
  1017. if (new_offset != 0)
  1018. return;
  1019. auto result = refresh_data(description);
  1020. if (result.is_error()) {
  1021. // Subsequent calls to read will return EIO!
  1022. dbgln("ProcFS: Could not refresh contents: {}", result.error());
  1023. }
  1024. }
  1025. InodeMetadata ProcFSInode::metadata() const
  1026. {
  1027. dbgln_if(PROCFS_DEBUG, "ProcFSInode::metadata({})", index());
  1028. InodeMetadata metadata;
  1029. metadata.inode = identifier();
  1030. metadata.ctime = mepoch;
  1031. metadata.atime = mepoch;
  1032. metadata.mtime = mepoch;
  1033. auto proc_parent_directory = to_proc_parent_directory(identifier());
  1034. auto proc_file_type = to_proc_file_type(identifier());
  1035. dbgln_if(PROCFS_DEBUG, " -> pid={}, fi={}, pdi={}", to_pid(identifier()).value(), (int)proc_file_type, (int)proc_parent_directory);
  1036. if (is_process_related_file(identifier())) {
  1037. ProcessID pid = to_pid(identifier());
  1038. auto process = Process::from_pid(pid);
  1039. if (process && process->is_dumpable()) {
  1040. metadata.uid = process->euid();
  1041. metadata.gid = process->egid();
  1042. } else {
  1043. metadata.uid = 0;
  1044. metadata.gid = 0;
  1045. }
  1046. } else if (is_thread_related_file(identifier())) {
  1047. ThreadID tid = to_tid(identifier());
  1048. auto thread = Thread::from_tid(tid);
  1049. if (thread && thread->process().is_dumpable()) {
  1050. metadata.uid = thread->process().euid();
  1051. metadata.gid = thread->process().egid();
  1052. } else {
  1053. metadata.uid = 0;
  1054. metadata.gid = 0;
  1055. }
  1056. }
  1057. if (proc_parent_directory == PDI_PID_fd) {
  1058. metadata.mode = S_IFLNK | S_IRUSR | S_IWUSR | S_IXUSR;
  1059. return metadata;
  1060. }
  1061. switch (proc_file_type) {
  1062. case FI_Root_self:
  1063. metadata.mode = S_IFLNK | S_IRUSR | S_IRGRP | S_IROTH;
  1064. break;
  1065. case FI_PID_cwd:
  1066. case FI_PID_exe:
  1067. case FI_PID_root:
  1068. metadata.mode = S_IFLNK | S_IRUSR;
  1069. break;
  1070. case FI_Root:
  1071. case FI_Root_sys:
  1072. case FI_Root_net:
  1073. metadata.mode = S_IFDIR | S_IRUSR | S_IXUSR | S_IRGRP | S_IXGRP | S_IROTH | S_IXOTH;
  1074. break;
  1075. case FI_PID:
  1076. case FI_PID_fd:
  1077. case FI_PID_stacks:
  1078. metadata.mode = S_IFDIR | S_IRUSR | S_IXUSR;
  1079. break;
  1080. case FI_Root_smbios_entry_point:
  1081. metadata.mode = S_IFREG | S_IRUSR | S_IRGRP | S_IROTH;
  1082. metadata.size = DMIExpose::the().entry_point_length();
  1083. break;
  1084. case FI_Root_dmi:
  1085. metadata.mode = S_IFREG | S_IRUSR | S_IRGRP | S_IROTH;
  1086. metadata.size = DMIExpose::the().structure_table_length();
  1087. break;
  1088. default:
  1089. metadata.mode = S_IFREG | S_IRUSR | S_IRGRP | S_IROTH;
  1090. break;
  1091. }
  1092. if (proc_file_type > FI_Invalid && proc_file_type < FI_MaxStaticFileIndex) {
  1093. if (fs().m_entries[proc_file_type].supervisor_only) {
  1094. metadata.uid = 0;
  1095. metadata.gid = 0;
  1096. metadata.mode &= ~077;
  1097. }
  1098. }
  1099. return metadata;
  1100. }
  1101. KResultOr<ssize_t> ProcFSInode::read_bytes(off_t offset, ssize_t count, UserOrKernelBuffer& buffer, FileDescription* description) const
  1102. {
  1103. dbgln_if(PROCFS_DEBUG, "ProcFS: read_bytes offset: {} count: {}", offset, count);
  1104. VERIFY(offset >= 0);
  1105. VERIFY(buffer.user_or_kernel_ptr());
  1106. if (!description)
  1107. return EIO;
  1108. if (!description->data()) {
  1109. dbgln_if(PROCFS_DEBUG, "ProcFS: Do not have cached data!");
  1110. return EIO;
  1111. }
  1112. // Be sure to keep a reference to data_buffer while we use it!
  1113. RefPtr<KBufferImpl> data_buffer = static_cast<ProcFSInodeData&>(*description->data()).buffer;
  1114. if (!data_buffer || (size_t)offset >= data_buffer->size())
  1115. return 0;
  1116. ssize_t nread = min(static_cast<off_t>(data_buffer->size() - offset), static_cast<off_t>(count));
  1117. if (!buffer.write(data_buffer->data() + offset, nread))
  1118. return EFAULT;
  1119. return nread;
  1120. }
  1121. InodeIdentifier ProcFS::ProcFSDirectoryEntry::identifier(unsigned fsid) const
  1122. {
  1123. return to_identifier(fsid, PDI_Root, 0, (ProcFileType)proc_file_type);
  1124. }
  1125. KResult ProcFSInode::traverse_as_directory(Function<bool(const FS::DirectoryEntryView&)> callback) const
  1126. {
  1127. dbgln_if(PROCFS_DEBUG, "ProcFS: traverse_as_directory {}", index());
  1128. if (!Kernel::is_directory(identifier()))
  1129. return ENOTDIR;
  1130. auto proc_file_type = to_proc_file_type(identifier());
  1131. auto parent_id = to_parent_id(identifier());
  1132. callback({ ".", identifier(), 2 });
  1133. callback({ "..", parent_id, 2 });
  1134. switch (proc_file_type) {
  1135. case FI_Root:
  1136. for (auto& entry : fs().m_entries) {
  1137. // FIXME: strlen() here is sad.
  1138. if (!entry.name)
  1139. continue;
  1140. if (entry.proc_file_type > __FI_Root_Start && entry.proc_file_type < __FI_Root_End)
  1141. callback({ { entry.name, strlen(entry.name) }, to_identifier(fsid(), PDI_Root, 0, (ProcFileType)entry.proc_file_type), 0 });
  1142. }
  1143. for (auto pid_child : Process::all_pids()) {
  1144. callback({ String::number(pid_child.value()), to_identifier(fsid(), PDI_Root, pid_child, FI_PID), 0 });
  1145. }
  1146. break;
  1147. case FI_Root_sys:
  1148. for (size_t i = 1; i < sys_variables().size(); ++i) {
  1149. auto& variable = sys_variables()[i];
  1150. callback({ variable.name, sys_var_to_identifier(fsid(), i), 0 });
  1151. }
  1152. break;
  1153. case FI_Root_net:
  1154. callback({ "adapters", to_identifier(fsid(), PDI_Root_net, 0, FI_Root_net_adapters), 0 });
  1155. callback({ "arp", to_identifier(fsid(), PDI_Root_net, 0, FI_Root_net_arp), 0 });
  1156. callback({ "tcp", to_identifier(fsid(), PDI_Root_net, 0, FI_Root_net_tcp), 0 });
  1157. callback({ "udp", to_identifier(fsid(), PDI_Root_net, 0, FI_Root_net_udp), 0 });
  1158. callback({ "local", to_identifier(fsid(), PDI_Root_net, 0, FI_Root_net_local), 0 });
  1159. break;
  1160. case FI_PID: {
  1161. auto pid = to_pid(identifier());
  1162. auto process = Process::from_pid(pid);
  1163. if (!process)
  1164. return ENOENT;
  1165. for (auto& entry : fs().m_entries) {
  1166. if (entry.proc_file_type > __FI_PID_Start && entry.proc_file_type < __FI_PID_End) {
  1167. if (entry.proc_file_type == FI_PID_exe && !process->executable())
  1168. continue;
  1169. // FIXME: strlen() here is sad.
  1170. callback({ { entry.name, strlen(entry.name) }, to_identifier(fsid(), PDI_PID, pid, (ProcFileType)entry.proc_file_type), 0 });
  1171. }
  1172. }
  1173. } break;
  1174. case FI_PID_fd: {
  1175. auto pid = to_pid(identifier());
  1176. auto process = Process::from_pid(pid);
  1177. if (!process)
  1178. return ENOENT;
  1179. for (int i = 0; i < process->max_open_file_descriptors(); ++i) {
  1180. auto description = process->file_description(i);
  1181. if (!description)
  1182. continue;
  1183. callback({ String::number(i), to_identifier_with_fd(fsid(), pid, i), 0 });
  1184. }
  1185. } break;
  1186. case FI_PID_stacks: {
  1187. auto pid = to_pid(identifier());
  1188. auto process = Process::from_pid(pid);
  1189. if (!process)
  1190. return ENOENT;
  1191. process->for_each_thread([&](const Thread& thread) -> IterationDecision {
  1192. int tid = thread.tid().value();
  1193. callback({ String::number(tid), to_identifier_with_stack(fsid(), tid), 0 });
  1194. return IterationDecision::Continue;
  1195. });
  1196. } break;
  1197. default:
  1198. return KSuccess;
  1199. }
  1200. return KSuccess;
  1201. }
  1202. RefPtr<Inode> ProcFSInode::lookup(StringView name)
  1203. {
  1204. VERIFY(is_directory());
  1205. if (name == ".")
  1206. return this;
  1207. if (name == "..")
  1208. return fs().get_inode(to_parent_id(identifier()));
  1209. auto proc_file_type = to_proc_file_type(identifier());
  1210. if (proc_file_type == FI_Root) {
  1211. for (auto& entry : fs().m_entries) {
  1212. if (entry.name == nullptr)
  1213. continue;
  1214. if (entry.proc_file_type > __FI_Root_Start && entry.proc_file_type < __FI_Root_End) {
  1215. if (name == entry.name) {
  1216. return fs().get_inode(to_identifier(fsid(), PDI_Root, 0, (ProcFileType)entry.proc_file_type));
  1217. }
  1218. }
  1219. }
  1220. auto name_as_number = name.to_uint();
  1221. if (!name_as_number.has_value())
  1222. return {};
  1223. bool process_exists = false;
  1224. {
  1225. InterruptDisabler disabler;
  1226. process_exists = Process::from_pid(name_as_number.value());
  1227. }
  1228. if (process_exists)
  1229. return fs().get_inode(to_identifier(fsid(), PDI_Root, name_as_number.value(), FI_PID));
  1230. return {};
  1231. }
  1232. if (proc_file_type == FI_Root_sys) {
  1233. for (size_t i = 1; i < sys_variables().size(); ++i) {
  1234. auto& variable = sys_variables()[i];
  1235. if (name == variable.name)
  1236. return fs().get_inode(sys_var_to_identifier(fsid(), i));
  1237. }
  1238. return {};
  1239. }
  1240. if (proc_file_type == FI_Root_net) {
  1241. if (name == "adapters")
  1242. return fs().get_inode(to_identifier(fsid(), PDI_Root, 0, FI_Root_net_adapters));
  1243. if (name == "arp")
  1244. return fs().get_inode(to_identifier(fsid(), PDI_Root, 0, FI_Root_net_arp));
  1245. if (name == "tcp")
  1246. return fs().get_inode(to_identifier(fsid(), PDI_Root, 0, FI_Root_net_tcp));
  1247. if (name == "udp")
  1248. return fs().get_inode(to_identifier(fsid(), PDI_Root, 0, FI_Root_net_udp));
  1249. if (name == "local")
  1250. return fs().get_inode(to_identifier(fsid(), PDI_Root, 0, FI_Root_net_local));
  1251. return {};
  1252. }
  1253. if (proc_file_type == FI_PID) {
  1254. auto process = Process::from_pid(to_pid(identifier()));
  1255. if (!process)
  1256. return {};
  1257. for (auto& entry : fs().m_entries) {
  1258. if (entry.proc_file_type > __FI_PID_Start && entry.proc_file_type < __FI_PID_End) {
  1259. if (entry.proc_file_type == FI_PID_exe && !process->executable())
  1260. continue;
  1261. if (entry.name == nullptr)
  1262. continue;
  1263. if (name == entry.name) {
  1264. return fs().get_inode(to_identifier(fsid(), PDI_PID, to_pid(identifier()), (ProcFileType)entry.proc_file_type));
  1265. }
  1266. }
  1267. }
  1268. return {};
  1269. }
  1270. if (proc_file_type == FI_PID_fd) {
  1271. auto name_as_number = name.to_uint();
  1272. if (!name_as_number.has_value())
  1273. return {};
  1274. bool fd_exists = false;
  1275. {
  1276. if (auto process = Process::from_pid(to_pid(identifier())))
  1277. fd_exists = process->file_description(name_as_number.value());
  1278. }
  1279. if (fd_exists)
  1280. return fs().get_inode(to_identifier_with_fd(fsid(), to_pid(identifier()), name_as_number.value()));
  1281. }
  1282. if (proc_file_type == FI_PID_stacks) {
  1283. auto name_as_number = name.to_int();
  1284. if (!name_as_number.has_value())
  1285. return {};
  1286. int tid = name_as_number.value();
  1287. if (tid <= 0) {
  1288. return {};
  1289. }
  1290. bool thread_exists = false;
  1291. {
  1292. auto process = Process::from_pid(to_pid(identifier()));
  1293. auto thread = Thread::from_tid(tid);
  1294. thread_exists = process && thread && process->pid() == thread->pid();
  1295. }
  1296. if (thread_exists)
  1297. return fs().get_inode(to_identifier_with_stack(fsid(), tid));
  1298. }
  1299. return {};
  1300. }
  1301. void ProcFSInode::flush_metadata()
  1302. {
  1303. }
  1304. KResultOr<ssize_t> ProcFSInode::write_bytes(off_t offset, ssize_t size, const UserOrKernelBuffer& buffer, FileDescription*)
  1305. {
  1306. // For process-specific inodes, hold the process's ptrace lock across the write
  1307. // and refuse to write at all data if the process is not dumpable.
  1308. // Without this, files opened before a process went non-dumpable could still be used for dumping.
  1309. auto process = this->process();
  1310. if (process) {
  1311. process->ptrace_lock().lock();
  1312. if (!process->is_dumpable()) {
  1313. process->ptrace_lock().unlock();
  1314. return EPERM;
  1315. }
  1316. }
  1317. ScopeGuard guard = [&] {
  1318. if (process)
  1319. process->ptrace_lock().unlock();
  1320. };
  1321. auto result = prepare_to_write_data();
  1322. if (result.is_error())
  1323. return result;
  1324. auto* directory_entry = fs().get_directory_entry(identifier());
  1325. ssize_t (*write_callback)(InodeIdentifier, const UserOrKernelBuffer&, size_t) = nullptr;
  1326. if (directory_entry == nullptr) {
  1327. if (to_proc_parent_directory(identifier()) == PDI_Root_sys) {
  1328. switch (SysVariable::for_inode(identifier()).type) {
  1329. case SysVariable::Type::Invalid:
  1330. VERIFY_NOT_REACHED();
  1331. case SysVariable::Type::Boolean:
  1332. write_callback = write_sys_bool;
  1333. break;
  1334. case SysVariable::Type::String:
  1335. write_callback = write_sys_string;
  1336. break;
  1337. }
  1338. } else
  1339. return EPERM;
  1340. } else {
  1341. if (!directory_entry->write_callback)
  1342. return EPERM;
  1343. write_callback = directory_entry->write_callback;
  1344. }
  1345. VERIFY(is_persistent_inode(identifier()));
  1346. // FIXME: Being able to write into ProcFS at a non-zero offset seems like something we should maybe support..
  1347. VERIFY(offset == 0);
  1348. ssize_t nwritten = write_callback(identifier(), buffer, (size_t)size);
  1349. if (nwritten < 0)
  1350. dbgln("ProcFS: Writing {} bytes failed: {}", size, nwritten);
  1351. return nwritten;
  1352. }
  1353. KResultOr<NonnullRefPtr<Custody>> ProcFSInode::resolve_as_link(Custody& base, RefPtr<Custody>* out_parent, int options, int symlink_recursion_level) const
  1354. {
  1355. if (FI_Root_self == to_proc_file_type(identifier())) {
  1356. return VFS::the().resolve_path(String::number(Process::current()->pid().value()), base, out_parent, options, symlink_recursion_level);
  1357. }
  1358. // The only other links are in pid directories, so it's safe to ignore
  1359. // unrelated files and the thread-specific stacks/ directory.
  1360. if (!is_process_related_file(identifier()))
  1361. return Inode::resolve_as_link(base, out_parent, options, symlink_recursion_level);
  1362. // FIXME: We should return a custody for FI_PID or FI_PID_fd here
  1363. // for correctness. It's impossible to create files in ProcFS,
  1364. // so returning null shouldn't break much.
  1365. if (out_parent)
  1366. *out_parent = nullptr;
  1367. auto pid = to_pid(identifier());
  1368. auto proc_file_type = to_proc_file_type(identifier());
  1369. auto process = Process::from_pid(pid);
  1370. if (!process)
  1371. return ENOENT;
  1372. if (to_proc_parent_directory(identifier()) == PDI_PID_fd) {
  1373. if (out_parent)
  1374. *out_parent = base;
  1375. int fd = to_fd(identifier());
  1376. auto description = process->file_description(fd);
  1377. if (!description)
  1378. return ENOENT;
  1379. auto proxy_inode = ProcFSProxyInode::create(const_cast<ProcFS&>(fs()), *description);
  1380. return Custody::create(&base, "", proxy_inode, base.mount_flags());
  1381. }
  1382. Custody* res = nullptr;
  1383. switch (proc_file_type) {
  1384. case FI_PID_cwd:
  1385. res = &process->current_directory();
  1386. break;
  1387. case FI_PID_exe:
  1388. res = process->executable();
  1389. break;
  1390. case FI_PID_root:
  1391. // Note: we open root_directory() here, not
  1392. // root_directory_relative_to_global_root().
  1393. // This seems more useful.
  1394. res = &process->root_directory();
  1395. break;
  1396. default:
  1397. VERIFY_NOT_REACHED();
  1398. }
  1399. if (!res)
  1400. return ENOENT;
  1401. return *res;
  1402. }
  1403. KResult ProcFSInode::set_mtime(time_t)
  1404. {
  1405. return KSuccess;
  1406. }
  1407. ProcFSProxyInode::ProcFSProxyInode(ProcFS& fs, FileDescription& fd)
  1408. : Inode(fs, 0)
  1409. , m_fd(fd)
  1410. {
  1411. }
  1412. ProcFSProxyInode::~ProcFSProxyInode()
  1413. {
  1414. }
  1415. KResult ProcFSProxyInode::attach(FileDescription& fd)
  1416. {
  1417. return m_fd->inode()->attach(fd);
  1418. }
  1419. void ProcFSProxyInode::did_seek(FileDescription& fd, off_t new_offset)
  1420. {
  1421. return m_fd->inode()->did_seek(fd, new_offset);
  1422. }
  1423. InodeMetadata ProcFSProxyInode::metadata() const
  1424. {
  1425. InodeMetadata metadata = m_fd->metadata();
  1426. if (m_fd->is_readable())
  1427. metadata.mode |= 0444;
  1428. else
  1429. metadata.mode &= ~0444;
  1430. if (m_fd->is_writable())
  1431. metadata.mode |= 0222;
  1432. else
  1433. metadata.mode &= ~0222;
  1434. if (!metadata.is_directory())
  1435. metadata.mode &= ~0111;
  1436. return metadata;
  1437. }
  1438. KResultOr<NonnullRefPtr<Inode>> ProcFSProxyInode::create_child(const String& name, mode_t mode, dev_t dev, uid_t uid, gid_t gid)
  1439. {
  1440. if (!m_fd->inode())
  1441. return EINVAL;
  1442. return m_fd->inode()->create_child(name, mode, dev, uid, gid);
  1443. }
  1444. KResult ProcFSProxyInode::add_child(Inode& child, const StringView& name, mode_t mode)
  1445. {
  1446. if (!m_fd->inode())
  1447. return EINVAL;
  1448. return m_fd->inode()->add_child(child, name, mode);
  1449. }
  1450. KResult ProcFSProxyInode::remove_child(const StringView& name)
  1451. {
  1452. if (!m_fd->inode())
  1453. return EINVAL;
  1454. return m_fd->inode()->remove_child(name);
  1455. }
  1456. RefPtr<Inode> ProcFSProxyInode::lookup(StringView name)
  1457. {
  1458. if (!m_fd->inode())
  1459. return {};
  1460. return m_fd->inode()->lookup(name);
  1461. }
  1462. KResultOr<size_t> ProcFSProxyInode::directory_entry_count() const
  1463. {
  1464. if (!m_fd->inode())
  1465. return EINVAL;
  1466. return m_fd->inode()->directory_entry_count();
  1467. }
  1468. KResultOr<NonnullRefPtr<Inode>> ProcFSInode::create_child(const String&, mode_t, dev_t, uid_t, gid_t)
  1469. {
  1470. return EPERM;
  1471. }
  1472. KResult ProcFSInode::add_child(Inode&, const StringView&, mode_t)
  1473. {
  1474. return EPERM;
  1475. }
  1476. KResult ProcFSInode::remove_child([[maybe_unused]] const StringView& name)
  1477. {
  1478. return EPERM;
  1479. }
  1480. KResultOr<size_t> ProcFSInode::directory_entry_count() const
  1481. {
  1482. VERIFY(is_directory());
  1483. size_t count = 0;
  1484. KResult result = traverse_as_directory([&count](auto&) {
  1485. ++count;
  1486. return true;
  1487. });
  1488. if (result.is_error())
  1489. return result;
  1490. return count;
  1491. }
  1492. KResult ProcFSInode::chmod(mode_t)
  1493. {
  1494. return EPERM;
  1495. }
  1496. ProcFS::ProcFS()
  1497. {
  1498. m_root_inode = adopt_ref(*new ProcFSInode(*this, 1));
  1499. m_entries.resize(FI_MaxStaticFileIndex);
  1500. m_entries[FI_Root_df] = { "df", FI_Root_df, false, procfs$df };
  1501. m_entries[FI_Root_all] = { "all", FI_Root_all, false, procfs$all };
  1502. m_entries[FI_Root_memstat] = { "memstat", FI_Root_memstat, false, procfs$memstat };
  1503. m_entries[FI_Root_cpuinfo] = { "cpuinfo", FI_Root_cpuinfo, false, procfs$cpuinfo };
  1504. m_entries[FI_Root_dmesg] = { "dmesg", FI_Root_dmesg, true, procfs$dmesg };
  1505. m_entries[FI_Root_self] = { "self", FI_Root_self, false, procfs$self };
  1506. m_entries[FI_Root_pci] = { "pci", FI_Root_pci, false, procfs$pci };
  1507. m_entries[FI_Root_interrupts] = { "interrupts", FI_Root_interrupts, false, procfs$interrupts };
  1508. m_entries[FI_Root_dmi] = { "DMI", FI_Root_dmi, false, procfs$dmi };
  1509. m_entries[FI_Root_smbios_entry_point] = { "smbios_entry_point", FI_Root_smbios_entry_point, false, procfs$smbios_entry_point };
  1510. m_entries[FI_Root_keymap] = { "keymap", FI_Root_keymap, false, procfs$keymap };
  1511. m_entries[FI_Root_devices] = { "devices", FI_Root_devices, false, procfs$devices };
  1512. m_entries[FI_Root_uptime] = { "uptime", FI_Root_uptime, false, procfs$uptime };
  1513. m_entries[FI_Root_cmdline] = { "cmdline", FI_Root_cmdline, true, procfs$cmdline };
  1514. m_entries[FI_Root_modules] = { "modules", FI_Root_modules, true, procfs$modules };
  1515. m_entries[FI_Root_profile] = { "profile", FI_Root_profile, true, procfs$profile };
  1516. m_entries[FI_Root_sys] = { "sys", FI_Root_sys, true };
  1517. m_entries[FI_Root_net] = { "net", FI_Root_net, false };
  1518. m_entries[FI_Root_net_adapters] = { "adapters", FI_Root_net_adapters, false, procfs$net_adapters };
  1519. m_entries[FI_Root_net_arp] = { "arp", FI_Root_net_arp, true, procfs$net_arp };
  1520. m_entries[FI_Root_net_tcp] = { "tcp", FI_Root_net_tcp, false, procfs$net_tcp };
  1521. m_entries[FI_Root_net_udp] = { "udp", FI_Root_net_udp, false, procfs$net_udp };
  1522. m_entries[FI_Root_net_local] = { "local", FI_Root_net_local, false, procfs$net_local };
  1523. m_entries[FI_PID_vm] = { "vm", FI_PID_vm, false, procfs$pid_vm };
  1524. m_entries[FI_PID_stacks] = { "stacks", FI_PID_stacks, false };
  1525. m_entries[FI_PID_fds] = { "fds", FI_PID_fds, false, procfs$pid_fds };
  1526. m_entries[FI_PID_exe] = { "exe", FI_PID_exe, false, procfs$pid_exe };
  1527. m_entries[FI_PID_cwd] = { "cwd", FI_PID_cwd, false, procfs$pid_cwd };
  1528. m_entries[FI_PID_unveil] = { "unveil", FI_PID_unveil, false, procfs$pid_unveil };
  1529. m_entries[FI_PID_root] = { "root", FI_PID_root, false, procfs$pid_root };
  1530. m_entries[FI_PID_perf_events] = { "perf_events", FI_PID_perf_events, false, procfs$pid_perf_events };
  1531. m_entries[FI_PID_fd] = { "fd", FI_PID_fd, false };
  1532. }
  1533. ProcFS::ProcFSDirectoryEntry* ProcFS::get_directory_entry(InodeIdentifier identifier) const
  1534. {
  1535. auto proc_file_type = to_proc_file_type(identifier);
  1536. if (proc_file_type != FI_Invalid && proc_file_type != FI_Root_sys_variable && proc_file_type < FI_MaxStaticFileIndex)
  1537. return const_cast<ProcFSDirectoryEntry*>(&m_entries[proc_file_type]);
  1538. return nullptr;
  1539. }
  1540. KResult ProcFSInode::chown(uid_t, gid_t)
  1541. {
  1542. return EPERM;
  1543. }
  1544. }