2 * Copyright (c) 2000 Dag-Erling Coïdan Smørgrav
3 * Copyright (c) 1999 Pierre Beyssac
4 * Copyright (c) 1993 Jan-Simon Pendry
6 * The Regents of the University of California. All rights reserved.
8 * This code is derived from software contributed to Berkeley by
11 * Redistribution and use in source and binary forms, with or without
12 * modification, are permitted provided that the following conditions
14 * 1. Redistributions of source code must retain the above copyright
15 * notice, this list of conditions and the following disclaimer.
16 * 2. Redistributions in binary form must reproduce the above copyright
17 * notice, this list of conditions and the following disclaimer in the
18 * documentation and/or other materials provided with the distribution.
19 * 3. All advertising materials mentioning features or use of this software
20 * must display the following acknowledgement:
21 * This product includes software developed by the University of
22 * California, Berkeley and its contributors.
23 * 4. Neither the name of the University nor the names of its contributors
24 * may be used to endorse or promote products derived from this software
25 * without specific prior written permission.
27 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
28 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
29 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
30 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
31 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
32 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
33 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
34 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
35 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
36 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
39 * @(#)procfs_subr.c 8.6 (Berkeley) 5/14/95
41 * $FreeBSD: src/sys/i386/linux/linprocfs/linprocfs_subr.c,v 1.3.2.4 2001/06/25 19:46:47 pirzyk Exp $
44 #include <sys/param.h>
45 #include <sys/systm.h>
47 #include <sys/vnode.h>
48 #include <sys/malloc.h>
49 #include <sys/mount.h>
50 #include "linprocfs.h"
53 #define PFSHMASK (PFSHSIZE - 1)
55 static struct pfsnode *pfshead[PFSHSIZE];
56 static struct lwkt_token pfs_token;
59 extern int procfs_domem (struct proc *, struct lwp *, struct pfsnode *pfsp, struct uio *uio);
62 * allocate a pfsnode/vnode pair. the vnode is
63 * referenced, but not locked.
65 * the pid, pfs_type, and mount point uniquely
66 * identify a pfsnode. the mount point is needed
67 * because someone might mount this filesystem
70 * all pfsnodes are maintained on a singly-linked
71 * list. new nodes are only allocated when they cannot
72 * be found on this list. entries on the list are
73 * removed when the vfs reclaim entry is called.
75 * a single lock is kept for the entire list. this is
76 * needed because the getnewvnode() function can block
77 * waiting for a vnode to become free, in which case there
78 * may be more than one process trying to get the same
79 * vnode. this lock is only taken if we are going to
80 * call getnewvnode, since the kernel itself is single-threaded.
82 * if an entry is found on the list, then call vget() to
83 * take a reference. this is done because there may be
84 * zero references to it and so it needs to removed from
85 * the vnode free list.
88 linprocfs_allocvp(struct mount *mp, struct vnode **vpp, long pid,
96 lwkt_gettoken(&pfs_token);
98 for (pfs = pfshead[pid & PFSHMASK]; pfs; pfs = pfs->pfs_next) {
100 if (pfs->pfs_pid == pid &&
101 pfs->pfs_type == pfs_type &&
103 if (vget(vp, LK_EXCLUSIVE|LK_SLEEPFAIL))
106 lwkt_reltoken(&pfs_token);
112 * otherwise lock the vp list while we call getnewvnode
113 * since that can block.
115 if (pfsvplock & PROCFS_LOCKED) {
116 pfsvplock |= PROCFS_WANT;
117 (void) tsleep((caddr_t) &pfsvplock, 0, "pfsavp", 0);
120 pfsvplock |= PROCFS_LOCKED;
123 * Do the MALLOC before the getnewvnode since doing so afterward
124 * might cause a bogus v_data pointer to get dereferenced
125 * elsewhere if MALLOC should block.
127 pfs = kmalloc(sizeof(struct pfsnode), M_TEMP, M_WAITOK);
129 error = getnewvnode(VT_PROCFS, mp, vpp, 0, 0);
139 pfs->pfs_pid = (pid_t) pid;
140 pfs->pfs_type = pfs_type;
143 pfs->pfs_lockowner = NULL;
144 pfs->pfs_fileno = PROCFS_FILENO(pid, pfs_type);
147 case Proot: /* /proc = dr-xr-xr-x */
148 vsetflags(vp, VROOT);
153 pfs->pfs_mode = (VREAD|VEXEC) |
159 case Pself: /* /proc/self = lr--r--r-- */
160 pfs->pfs_mode = (VREAD) |
167 pfs->pfs_mode = (VREAD|VEXEC) |
177 pfs->pfs_mode = (VREAD|VEXEC) |
184 pfs->pfs_mode = (VREAD|VWRITE) |
208 pfs->pfs_mode = (VREAD) |
215 panic("linprocfs_allocvp");
218 /* add to procfs vnode list */
219 for (pp = &pfshead[pid & PFSHMASK]; *pp; pp = &(*pp)->pfs_next)
223 vx_unlock(vp); /* vnode ready to roll! */
226 pfsvplock &= ~PROCFS_LOCKED;
228 if (pfsvplock & PROCFS_WANT) {
229 pfsvplock &= ~PROCFS_WANT;
230 wakeup((caddr_t) &pfsvplock);
232 lwkt_reltoken(&pfs_token);
238 linprocfs_freevp(struct vnode *vp)
240 struct pfsnode **pfspp;
241 struct pfsnode *pfs = VTOPFS(vp);
243 lwkt_gettoken(&pfs_token);
244 pfspp = &pfshead[pfs->pfs_pid & PFSHMASK];
245 while (*pfspp != pfs) {
246 KKASSERT(*pfspp != NULL);
247 pfspp = &(*pfspp)->pfs_next;
249 *pfspp = pfs->pfs_next;
250 lwkt_reltoken(&pfs_token);
251 kfree(vp->v_data, M_TEMP);
257 linprocfs_rw(struct vop_read_args *ap)
259 struct vnode *vp = ap->a_vp;
260 struct uio *uio = ap->a_uio;
261 struct thread *td = uio->uio_td;
262 struct pfsnode *pfs = VTOPFS(vp);
271 p = pfind(pfs->pfs_pid);
274 if (p->p_pid == 1 && securelevel > 0 && uio->uio_rw == UIO_WRITE) {
278 lp = FIRST_LWP_IN_PROC(p);
281 lwkt_gettoken(&pfs_token);
282 while (pfs->pfs_lockowner) {
283 tsleep(&pfs->pfs_lockowner, 0, "pfslck", 0);
285 pfs->pfs_lockowner = curthread;
286 lwkt_reltoken(&pfs_token);
288 switch (pfs->pfs_type) {
290 rtval = procfs_domem(curp, lp, pfs, uio);
293 rtval = linprocfs_doprocstat(curp, p, pfs, uio);
296 rtval = linprocfs_doprocstatus(curp, p, pfs, uio);
299 rtval = linprocfs_domeminfo(curp, p, pfs, uio);
302 rtval = linprocfs_docpuinfo(curp, p, pfs, uio);
305 rtval = linprocfs_domounts(curp, p, pfs, uio);
308 rtval = linprocfs_dostat(curp, p, pfs, uio);
311 rtval = linprocfs_douptime(curp, p, pfs, uio);
314 rtval = linprocfs_doversion(curp, p, pfs, uio);
317 rtval = linprocfs_doloadavg(curp, p, pfs, uio);
320 rtval = linprocfs_donetdev(curp, p, pfs, uio);
323 rtval = linprocfs_dodevices(curp, p, pfs, uio);
326 rtval = linprocfs_doosrelease(curp, p, pfs, uio);
329 rtval = linprocfs_doostype(curp, p, pfs, uio);
332 rtval = linprocfs_dopidmax(curp, p, pfs, uio);
335 rtval = linprocfs_domaps(curp, p, pfs, uio);
338 rtval = linprocfs_dostatm(curp, p, pfs, uio);
347 lwkt_gettoken(&pfs_token);
348 pfs->pfs_lockowner = NULL;
349 wakeup(&pfs->pfs_lockowner);
350 lwkt_reltoken(&pfs_token);
357 * Get a string from userland into (buf). Strip a trailing
358 * nl character (to allow easy access from the shell).
359 * The buffer should be *buflenp + 1 chars long. vfs_getuserstr
360 * will automatically add a nul char at the end.
362 * Returns 0 on success or the following errors
364 * EINVAL: file offset is non-zero.
365 * EMSGSIZE: message is longer than kernel buffer
366 * EFAULT: user i/o buffer is not addressable
369 vfs_getuserstr(struct uio *uio, char *buf, int *buflenp)
374 if (uio->uio_offset != 0)
379 /* must be able to read the whole string in one go */
380 if (xlen < uio->uio_resid)
382 xlen = uio->uio_resid;
384 if ((error = uiomove(buf, xlen, uio)) != 0)
387 /* allow multiple writes without seeks */
390 /* cleanup string and remove trailing newline */
393 if (xlen > 0 && buf[xlen-1] == '\n')
401 vfs_findname(vfs_namemap_t *nm, char *buf, int buflen)
404 for (; nm->nm_name; nm++)
405 if (bcmp(buf, nm->nm_name, buflen+1) == 0)
415 lwkt_token_init(&pfs_token, "linprocfs");
419 linprocfs_exit(struct thread *td)
425 KKASSERT(td->td_proc);
426 pid = td->td_proc->p_pid;
429 * Remove all the procfs vnodes associated with an exiting process.
431 lwkt_gettoken(&pfs_token);
433 for (pfs = pfshead[pid & PFSHMASK]; pfs; pfs = pfs->pfs_next) {
434 if (pfs->pfs_pid == pid) {
442 lwkt_reltoken(&pfs_token);
443 lwkt_token_uninit(&pfs_token);