Inode.cpp 16 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441
  1. /*
  2. * Copyright (c) 2018-2021, Andreas Kling <kling@serenityos.org>
  3. * Copyright (c) 2021, Spencer Dixon <spencercdixon@gmail.com>
  4. * Copyright (c) 2021-2023, Liav A. <liavalb@hotmail.co.il>
  5. *
  6. * SPDX-License-Identifier: BSD-2-Clause
  7. */
  8. #include <Kernel/FileSystem/ProcFS/Inode.h>
  9. #include <Kernel/Tasks/Process.h>
  10. #include <Kernel/Time/TimeManagement.h>
  11. namespace Kernel {
  12. ProcFSInode::~ProcFSInode() = default;
  13. static mode_t determine_procfs_process_inode_mode(u32 subdirectory, u32 property)
  14. {
  15. if (subdirectory == process_fd_subdirectory_root_entry.subdirectory)
  16. return S_IFLNK | 0400;
  17. if (subdirectory == process_stacks_subdirectory_root_entry.subdirectory)
  18. return S_IFREG | 0400;
  19. if (subdirectory == process_children_subdirectory_root_entry.subdirectory)
  20. return S_IFLNK | 0400;
  21. VERIFY(subdirectory == main_process_directory_root_entry.subdirectory);
  22. if (property == process_exe_symlink_entry.property)
  23. return S_IFLNK | 0777;
  24. if (property == process_cwd_symlink_entry.property)
  25. return S_IFLNK | 0777;
  26. return S_IFREG | 0400;
  27. }
  28. static u16 extract_subdirectory_index_from_inode_index(InodeIndex inode_index)
  29. {
  30. return (inode_index.value() >> 20) & 0xFFFF;
  31. }
  32. static u32 extract_property_index_from_inode_index(InodeIndex inode_index)
  33. {
  34. return inode_index.value() & 0xFFFFF;
  35. }
  36. InodeIndex ProcFSInode::create_index_from_global_directory_entry(segmented_global_inode_index entry)
  37. {
  38. u64 inode_index = 0;
  39. VERIFY(entry.primary < 0x10000000);
  40. u64 tmp = entry.primary;
  41. inode_index |= tmp << 36;
  42. // NOTE: The sub-directory part is already limited to 0xFFFF, so no need to VERIFY it.
  43. tmp = entry.subdirectory;
  44. inode_index |= tmp << 20;
  45. VERIFY(entry.property < 0x100000);
  46. inode_index |= entry.property;
  47. return inode_index;
  48. }
  49. InodeIndex ProcFSInode::create_index_from_process_directory_entry(ProcessID pid, segmented_process_directory_entry entry)
  50. {
  51. u64 inode_index = 0;
  52. // NOTE: We use 0xFFFFFFF because PID part (bits 64-36) as 0 is reserved for global inodes.
  53. VERIFY(pid.value() < 0xFFFFFFF);
  54. u64 tmp = (pid.value() + 1);
  55. inode_index |= tmp << 36;
  56. // NOTE: The sub-directory part is already limited to 0xFFFF, so no need to VERIFY it.
  57. tmp = entry.subdirectory;
  58. inode_index |= tmp << 20;
  59. VERIFY(entry.property < 0x100000);
  60. inode_index |= entry.property;
  61. return inode_index;
  62. }
  63. static Optional<ProcessID> extract_possible_pid_from_inode_index(InodeIndex inode_index)
  64. {
  65. auto pid_part = inode_index.value() >> 36;
  66. // NOTE: pid_part is set to 0 for global inodes.
  67. if (pid_part == 0)
  68. return {};
  69. return pid_part - 1;
  70. }
  71. ProcFSInode::ProcFSInode(ProcFS const& procfs_instance, InodeIndex inode_index)
  72. : Inode(const_cast<ProcFS&>(procfs_instance), inode_index)
  73. , m_associated_pid(extract_possible_pid_from_inode_index(inode_index))
  74. , m_subdirectory(extract_subdirectory_index_from_inode_index(inode_index))
  75. , m_property(extract_property_index_from_inode_index(inode_index))
  76. {
  77. if (inode_index == 1) {
  78. m_type = Type::RootDirectory;
  79. return;
  80. }
  81. if (inode_index == 2) {
  82. m_type = Type::SelfProcessLink;
  83. return;
  84. }
  85. if (m_property == 0) {
  86. if (m_subdirectory > 0)
  87. m_type = Type::ProcessSubdirectory;
  88. else
  89. m_type = Type::ProcessDirectory;
  90. return;
  91. }
  92. m_type = Type::ProcessProperty;
  93. }
  94. ErrorOr<void> ProcFSInode::traverse_as_root_directory(Function<ErrorOr<void>(FileSystem::DirectoryEntryView const&)> callback) const
  95. {
  96. TRY(callback({ "."sv, { fsid(), 1 }, 0 }));
  97. TRY(callback({ ".."sv, { fsid(), 0 }, 0 }));
  98. TRY(callback({ "self"sv, { fsid(), 2 }, 0 }));
  99. return Process::for_each_in_same_jail([&](Process& process) -> ErrorOr<void> {
  100. VERIFY(!(process.pid() < 0));
  101. u64 process_id = (u64)process.pid().value();
  102. InodeIdentifier identifier = { fsid(), static_cast<InodeIndex>(process_id << 36) };
  103. auto process_id_string = TRY(KString::formatted("{:d}", process_id));
  104. TRY(callback({ process_id_string->view(), identifier, 0 }));
  105. return {};
  106. });
  107. }
  108. ErrorOr<void> ProcFSInode::traverse_as_directory(Function<ErrorOr<void>(FileSystem::DirectoryEntryView const&)> callback) const
  109. {
  110. if (m_type == Type::ProcessSubdirectory) {
  111. VERIFY(m_associated_pid.has_value());
  112. auto process = Process::from_pid_in_same_jail(m_associated_pid.value());
  113. if (!process)
  114. return EINVAL;
  115. switch (m_subdirectory) {
  116. case process_fd_subdirectory_root_entry.subdirectory:
  117. return process->traverse_file_descriptions_directory(procfs().fsid(), move(callback));
  118. case process_stacks_subdirectory_root_entry.subdirectory:
  119. return process->traverse_stacks_directory(procfs().fsid(), move(callback));
  120. case process_children_subdirectory_root_entry.subdirectory:
  121. return process->traverse_children_directory(procfs().fsid(), move(callback));
  122. default:
  123. VERIFY_NOT_REACHED();
  124. }
  125. VERIFY_NOT_REACHED();
  126. }
  127. if (m_type == Type::RootDirectory) {
  128. return traverse_as_root_directory(move(callback));
  129. }
  130. VERIFY(m_type == Type::ProcessDirectory);
  131. VERIFY(m_associated_pid.has_value());
  132. auto process = Process::from_pid_in_same_jail(m_associated_pid.value());
  133. if (!process)
  134. return EINVAL;
  135. return process->traverse_as_directory(procfs().fsid(), move(callback));
  136. }
  137. ErrorOr<NonnullRefPtr<Inode>> ProcFSInode::lookup_as_root_directory(StringView name)
  138. {
  139. if (name == "self"sv)
  140. return procfs().get_inode({ fsid(), 2 });
  141. auto pid = name.to_number<unsigned>();
  142. if (!pid.has_value())
  143. return ESRCH;
  144. auto actual_pid = pid.value();
  145. if (auto maybe_process = Process::from_pid_in_same_jail(actual_pid)) {
  146. InodeIndex id = (static_cast<u64>(maybe_process->pid().value()) + 1) << 36;
  147. return procfs().get_inode({ fsid(), id });
  148. }
  149. return ENOENT;
  150. }
  151. ErrorOr<NonnullRefPtr<Inode>> ProcFSInode::lookup(StringView name)
  152. {
  153. if (m_type == Type::ProcessSubdirectory) {
  154. VERIFY(m_associated_pid.has_value());
  155. auto process = Process::from_pid_in_same_jail(m_associated_pid.value());
  156. if (!process)
  157. return ESRCH;
  158. switch (m_subdirectory) {
  159. case process_fd_subdirectory_root_entry.subdirectory:
  160. return process->lookup_file_descriptions_directory(procfs(), name);
  161. case process_stacks_subdirectory_root_entry.subdirectory:
  162. return process->lookup_stacks_directory(procfs(), name);
  163. case process_children_subdirectory_root_entry.subdirectory:
  164. return process->lookup_children_directory(procfs(), name);
  165. default:
  166. VERIFY_NOT_REACHED();
  167. }
  168. VERIFY_NOT_REACHED();
  169. }
  170. if (m_type == Type::RootDirectory) {
  171. return lookup_as_root_directory(name);
  172. }
  173. VERIFY(m_type == Type::ProcessDirectory);
  174. VERIFY(m_associated_pid.has_value());
  175. auto process = Process::from_pid_in_same_jail(m_associated_pid.value());
  176. if (!process)
  177. return ESRCH;
  178. return process->lookup_as_directory(procfs(), name);
  179. }
  180. ErrorOr<void> ProcFSInode::attach(OpenFileDescription& description)
  181. {
  182. if (m_type == Type::RootDirectory || m_type == Type::SelfProcessLink || m_type == Type::ProcessDirectory || m_type == Type::ProcessSubdirectory)
  183. return {};
  184. VERIFY(m_type == Type::ProcessProperty);
  185. return refresh_process_property_data(description);
  186. }
  187. void ProcFSInode::did_seek(OpenFileDescription& description, off_t offset)
  188. {
  189. if (m_type == Type::SelfProcessLink) {
  190. return;
  191. }
  192. VERIFY(m_type == Type::ProcessProperty);
  193. if (offset != 0)
  194. return;
  195. (void)refresh_process_property_data(description);
  196. }
  197. ErrorOr<size_t> ProcFSInode::read_bytes_locked(off_t offset, size_t count, UserOrKernelBuffer& buffer, OpenFileDescription* description) const
  198. {
  199. dbgln_if(PROCFS_DEBUG, "ProcFSInode: read_bytes_locked offset: {} count: {}", offset, count);
  200. VERIFY(offset >= 0);
  201. VERIFY(buffer.user_or_kernel_ptr());
  202. if (m_type == Type::SelfProcessLink) {
  203. auto builder = TRY(KBufferBuilder::try_create());
  204. TRY(builder.appendff("{}", Process::current().pid().value()));
  205. auto data_buffer = builder.build();
  206. if (!data_buffer)
  207. return Error::from_errno(EFAULT);
  208. if ((size_t)offset >= data_buffer->size())
  209. return 0;
  210. ssize_t nread = min(static_cast<off_t>(data_buffer->size() - offset), static_cast<off_t>(count));
  211. TRY(buffer.write(data_buffer->data() + offset, nread));
  212. return nread;
  213. }
  214. VERIFY(m_type == Type::ProcessProperty);
  215. if (!description) {
  216. auto builder = TRY(KBufferBuilder::try_create());
  217. VERIFY(m_associated_pid.has_value());
  218. auto process = Process::from_pid_in_same_jail(m_associated_pid.value());
  219. if (!process)
  220. return Error::from_errno(ESRCH);
  221. TRY(try_fetch_process_property_data(*process, builder));
  222. auto data_buffer = builder.build();
  223. if (!data_buffer)
  224. return Error::from_errno(EFAULT);
  225. if ((size_t)offset >= data_buffer->size())
  226. return 0;
  227. ssize_t nread = min(static_cast<off_t>(data_buffer->size() - offset), static_cast<off_t>(count));
  228. TRY(buffer.write(data_buffer->data() + offset, nread));
  229. return nread;
  230. }
  231. if (!description->data()) {
  232. dbgln("ProcFS Process Information: Do not have cached data!");
  233. return Error::from_errno(EIO);
  234. }
  235. MutexLocker locker(m_refresh_lock);
  236. auto& typed_cached_data = static_cast<ProcFSInodeData&>(*description->data());
  237. auto& data_buffer = typed_cached_data.buffer;
  238. if (!data_buffer || (size_t)offset >= data_buffer->size())
  239. return 0;
  240. ssize_t nread = min(static_cast<off_t>(data_buffer->size() - offset), static_cast<off_t>(count));
  241. TRY(buffer.write(data_buffer->data() + offset, nread));
  242. return nread;
  243. }
  244. static ErrorOr<void> build_from_cached_data(KBufferBuilder& builder, ProcFSInodeData& cached_data)
  245. {
  246. cached_data.buffer = builder.build();
  247. if (!cached_data.buffer)
  248. return ENOMEM;
  249. return {};
  250. }
  251. ErrorOr<void> ProcFSInode::try_fetch_process_property_data(NonnullRefPtr<Process> process, KBufferBuilder& builder) const
  252. {
  253. VERIFY(m_type == Type::ProcessProperty);
  254. if (m_subdirectory == process_fd_subdirectory_root_entry.subdirectory) {
  255. // NOTE: All property numbers should start from 1 as 0 is reserved for the directory itself.
  256. // Therefore subtract 1 to get the actual correct fd number.
  257. TRY(process->procfs_get_file_description_link(m_property - 1, builder));
  258. return {};
  259. }
  260. if (m_subdirectory == process_stacks_subdirectory_root_entry.subdirectory) {
  261. // NOTE: All property numbers should start from 1 as 0 is reserved for the directory itself.
  262. // Therefore subtract 1 to get the actual correct thread stack number.
  263. TRY(process->procfs_get_thread_stack(m_property - 1, builder));
  264. return {};
  265. }
  266. if (m_subdirectory == process_children_subdirectory_root_entry.subdirectory) {
  267. // NOTE: All property numbers should start from 1 as 0 is reserved for the directory itself.
  268. // Therefore subtract 1 to get the actual correct child process index number for a correct symlink.
  269. TRY(process->procfs_get_child_process_link(m_property - 1, builder));
  270. return {};
  271. }
  272. VERIFY(m_subdirectory == main_process_directory_root_entry.subdirectory);
  273. switch (m_property) {
  274. case process_unveil_list_entry.property:
  275. return process->procfs_get_unveil_stats(builder);
  276. case process_pledge_list_entry.property:
  277. return process->procfs_get_pledge_stats(builder);
  278. case process_fds_list_entry.property:
  279. return process->procfs_get_fds_stats(builder);
  280. case process_exe_symlink_entry.property:
  281. return process->procfs_get_binary_link(builder);
  282. case process_cwd_symlink_entry.property:
  283. return process->procfs_get_current_work_directory_link(builder);
  284. case process_perf_events_entry.property:
  285. return process->procfs_get_perf_events(builder);
  286. case process_vm_entry.property:
  287. return process->procfs_get_virtual_memory_stats(builder);
  288. case process_cmdline_entry.property:
  289. return process->procfs_get_command_line(builder);
  290. default:
  291. VERIFY_NOT_REACHED();
  292. }
  293. }
  294. ErrorOr<void> ProcFSInode::refresh_process_property_data(OpenFileDescription& description)
  295. {
  296. // For process-specific inodes, hold the process's ptrace lock across refresh
  297. // and refuse to load data if the process is not dumpable.
  298. // Without this, files opened before a process went non-dumpable could still be used for dumping.
  299. VERIFY(m_type == Type::ProcessProperty);
  300. VERIFY(m_associated_pid.has_value());
  301. auto process = Process::from_pid_in_same_jail(m_associated_pid.value());
  302. if (!process)
  303. return Error::from_errno(ESRCH);
  304. process->ptrace_lock().lock();
  305. if (!process->is_dumpable()) {
  306. process->ptrace_lock().unlock();
  307. return EPERM;
  308. }
  309. ScopeGuard guard = [&] {
  310. process->ptrace_lock().unlock();
  311. };
  312. MutexLocker locker(m_refresh_lock);
  313. auto& cached_data = description.data();
  314. if (!cached_data) {
  315. cached_data = adopt_own_if_nonnull(new (nothrow) ProcFSInodeData);
  316. if (!cached_data)
  317. return ENOMEM;
  318. }
  319. auto builder = TRY(KBufferBuilder::try_create());
  320. TRY(try_fetch_process_property_data(*process, builder));
  321. return build_from_cached_data(builder, static_cast<ProcFSInodeData&>(*cached_data));
  322. }
  323. InodeMetadata ProcFSInode::metadata() const
  324. {
  325. InodeMetadata metadata;
  326. switch (m_type) {
  327. case Type::SelfProcessLink: {
  328. metadata.inode = { fsid(), 2 };
  329. metadata.mode = S_IFLNK | 0777;
  330. metadata.uid = 0;
  331. metadata.gid = 0;
  332. metadata.size = 0;
  333. metadata.mtime = TimeManagement::boot_time();
  334. break;
  335. }
  336. case Type::RootDirectory: {
  337. metadata.inode = { fsid(), 1 };
  338. metadata.mode = S_IFDIR | 0555;
  339. metadata.uid = 0;
  340. metadata.gid = 0;
  341. metadata.size = 0;
  342. metadata.mtime = TimeManagement::boot_time();
  343. break;
  344. }
  345. case Type::ProcessProperty: {
  346. VERIFY(m_associated_pid.has_value());
  347. auto process = Process::from_pid_in_same_jail(m_associated_pid.value());
  348. if (!process)
  349. return {};
  350. metadata.inode = identifier();
  351. metadata.mode = determine_procfs_process_inode_mode(m_subdirectory, m_property);
  352. auto credentials = process->credentials();
  353. metadata.uid = credentials->uid();
  354. metadata.gid = credentials->gid();
  355. metadata.size = 0;
  356. auto creation_time = process->creation_time();
  357. metadata.atime = creation_time;
  358. metadata.ctime = creation_time;
  359. metadata.mtime = creation_time;
  360. break;
  361. }
  362. case Type::ProcessDirectory: {
  363. VERIFY(m_associated_pid.has_value());
  364. auto process = Process::from_pid_in_same_jail(m_associated_pid.value());
  365. if (!process)
  366. return {};
  367. metadata.inode = identifier();
  368. metadata.mode = S_IFDIR | 0555;
  369. auto credentials = process->credentials();
  370. metadata.uid = credentials->uid();
  371. metadata.gid = credentials->gid();
  372. metadata.size = 0;
  373. auto creation_time = process->creation_time();
  374. metadata.atime = creation_time;
  375. metadata.ctime = creation_time;
  376. metadata.mtime = creation_time;
  377. break;
  378. }
  379. case Type::ProcessSubdirectory: {
  380. VERIFY(m_associated_pid.has_value());
  381. auto process = Process::from_pid_in_same_jail(m_associated_pid.value());
  382. if (!process)
  383. return {};
  384. metadata.inode = identifier();
  385. metadata.mode = S_IFDIR | 0555;
  386. auto credentials = process->credentials();
  387. metadata.uid = credentials->uid();
  388. metadata.gid = credentials->gid();
  389. metadata.size = 0;
  390. auto creation_time = process->creation_time();
  391. metadata.atime = creation_time;
  392. metadata.ctime = creation_time;
  393. metadata.mtime = creation_time;
  394. break;
  395. }
  396. }
  397. return metadata;
  398. }
  399. }