2021-07-22 06:35:24 +08:00
|
|
|
/*
|
2021-08-08 01:24:59 +08:00
|
|
|
* sleep.c - create a /proc file, and if several processes try to open it
|
|
|
|
* at the same time, put all but one to sleep.
|
2021-07-22 06:35:24 +08:00
|
|
|
*/
|
|
|
|
|
2021-09-02 15:15:07 +08:00
|
|
|
#include <linux/kernel.h> /* We're doing kernel work */
|
|
|
|
#include <linux/module.h> /* Specifically, a module */
|
2021-07-22 06:58:13 +08:00
|
|
|
#include <linux/proc_fs.h> /* Necessary because we use proc fs */
|
2021-09-02 15:15:07 +08:00
|
|
|
#include <linux/sched.h> /* For putting processes to sleep and
|
2021-07-22 06:35:24 +08:00
|
|
|
waking them up */
|
2021-07-22 06:58:13 +08:00
|
|
|
#include <linux/uaccess.h> /* for get_user and put_user */
|
2021-07-22 07:17:31 +08:00
|
|
|
#include <linux/version.h>
|
|
|
|
|
|
|
|
#if LINUX_VERSION_CODE >= KERNEL_VERSION(5, 6, 0)
|
|
|
|
#define HAVE_PROC_OPS
|
|
|
|
#endif
|
2021-07-22 06:35:24 +08:00
|
|
|
|
2021-08-08 01:24:59 +08:00
|
|
|
/* Here we keep the last message received, to prove that we can process our
|
|
|
|
* input.
|
2021-07-22 06:35:24 +08:00
|
|
|
*/
|
|
|
|
#define MESSAGE_LENGTH 80
|
2021-09-02 15:15:07 +08:00
|
|
|
static char message[MESSAGE_LENGTH];
|
2021-07-22 06:35:24 +08:00
|
|
|
|
2021-09-02 15:15:07 +08:00
|
|
|
static struct proc_dir_entry *our_proc_file;
|
2021-07-22 06:35:24 +08:00
|
|
|
#define PROC_ENTRY_FILENAME "sleep"
|
|
|
|
|
2021-08-08 01:24:59 +08:00
|
|
|
/* Since we use the file operations struct, we can't use the special proc
|
2021-07-22 06:35:24 +08:00
|
|
|
* output provisions - we have to use a standard read function, which is this
|
2021-08-08 01:24:59 +08:00
|
|
|
* function.
|
2021-07-22 06:35:24 +08:00
|
|
|
*/
|
|
|
|
static ssize_t module_output(struct file *file, /* see include/linux/fs.h */
|
2021-09-04 17:53:29 +08:00
|
|
|
char __user *buf, /* The buffer to put data to
|
2021-07-22 06:58:13 +08:00
|
|
|
(in the user segment) */
|
2021-09-02 15:15:07 +08:00
|
|
|
size_t len, /* The length of the buffer */
|
2021-07-22 06:58:13 +08:00
|
|
|
loff_t *offset)
|
2021-07-22 06:35:24 +08:00
|
|
|
{
|
|
|
|
static int finished = 0;
|
|
|
|
int i;
|
2021-09-02 15:15:07 +08:00
|
|
|
char output_msg[MESSAGE_LENGTH + 30];
|
2021-07-22 06:35:24 +08:00
|
|
|
|
2021-08-08 01:24:59 +08:00
|
|
|
/* Return 0 to signify end of file - that we have nothing more to say
|
|
|
|
* at this point.
|
2021-07-22 06:35:24 +08:00
|
|
|
*/
|
|
|
|
if (finished) {
|
|
|
|
finished = 0;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2021-09-02 15:15:07 +08:00
|
|
|
sprintf(output_msg, "Last input:%s\n", message);
|
|
|
|
for (i = 0; i < len && output_msg[i]; i++)
|
|
|
|
put_user(output_msg[i], buf + i);
|
2021-07-22 06:35:24 +08:00
|
|
|
|
|
|
|
finished = 1;
|
2021-07-22 06:58:13 +08:00
|
|
|
return i; /* Return the number of bytes "read" */
|
2021-07-22 06:35:24 +08:00
|
|
|
}
|
|
|
|
|
2021-08-08 01:24:59 +08:00
|
|
|
/* This function receives input from the user when the user writes to the
|
|
|
|
* /proc file.
|
2021-07-22 06:35:24 +08:00
|
|
|
*/
|
2021-07-22 06:58:13 +08:00
|
|
|
static ssize_t module_input(struct file *file, /* The file itself */
|
2021-09-04 17:53:29 +08:00
|
|
|
const char __user *buf, /* The buffer with input */
|
2021-09-02 15:15:07 +08:00
|
|
|
size_t length, /* The buffer's length */
|
|
|
|
loff_t *offset) /* offset to file - ignore */
|
2021-07-22 06:35:24 +08:00
|
|
|
{
|
|
|
|
int i;
|
|
|
|
|
2021-08-08 01:24:59 +08:00
|
|
|
/* Put the input into Message, where module_output will later be able
|
|
|
|
* to use it.
|
2021-07-22 06:35:24 +08:00
|
|
|
*/
|
|
|
|
for (i = 0; i < MESSAGE_LENGTH - 1 && i < length; i++)
|
2021-09-02 15:15:07 +08:00
|
|
|
get_user(message[i], buf + i);
|
2021-08-08 01:24:59 +08:00
|
|
|
/* we want a standard, zero terminated string */
|
2021-09-02 15:15:07 +08:00
|
|
|
message[i] = '\0';
|
2021-07-22 06:35:24 +08:00
|
|
|
|
2021-08-08 01:24:59 +08:00
|
|
|
/* We need to return the number of input characters used */
|
2021-07-22 06:35:24 +08:00
|
|
|
return i;
|
|
|
|
}
|
|
|
|
|
2021-08-08 01:24:59 +08:00
|
|
|
/* 1 if the file is currently open by somebody */
|
2021-09-07 23:42:06 +08:00
|
|
|
static atomic_t already_open = ATOMIC_INIT(0);
|
2021-07-22 06:35:24 +08:00
|
|
|
|
2021-08-08 01:24:59 +08:00
|
|
|
/* Queue of processes who want our file */
|
2021-09-04 17:53:29 +08:00
|
|
|
static DECLARE_WAIT_QUEUE_HEAD(waitq);
|
2021-08-08 01:50:42 +08:00
|
|
|
|
2021-08-08 01:24:59 +08:00
|
|
|
/* Called when the /proc file is opened */
|
2021-07-22 06:35:24 +08:00
|
|
|
static int module_open(struct inode *inode, struct file *file)
|
|
|
|
{
|
2021-08-08 01:24:59 +08:00
|
|
|
/* If the file's flags include O_NONBLOCK, it means the process does not
|
|
|
|
* want to wait for the file. In this case, if the file is already open,
|
|
|
|
* we should fail with -EAGAIN, meaning "you will have to try again",
|
|
|
|
* instead of blocking a process which would rather stay awake.
|
2021-07-22 06:35:24 +08:00
|
|
|
*/
|
2021-09-07 23:42:06 +08:00
|
|
|
if ((file->f_flags & O_NONBLOCK) && atomic_read(&already_open))
|
2021-07-22 06:35:24 +08:00
|
|
|
return -EAGAIN;
|
|
|
|
|
2021-08-08 01:24:59 +08:00
|
|
|
/* This is the correct place for try_module_get(THIS_MODULE) because if
|
|
|
|
* a process is in the loop, which is within the kernel module,
|
2021-07-22 06:35:24 +08:00
|
|
|
* the kernel module must not be removed.
|
|
|
|
*/
|
|
|
|
try_module_get(THIS_MODULE);
|
|
|
|
|
2021-09-07 23:42:06 +08:00
|
|
|
while (atomic_cmpxchg(&already_open, 0, 1)) {
|
2021-07-22 06:35:24 +08:00
|
|
|
int i, is_sig = 0;
|
|
|
|
|
2021-08-08 01:24:59 +08:00
|
|
|
/* This function puts the current process, including any system
|
2021-08-08 01:50:42 +08:00
|
|
|
* calls, such as us, to sleep. Execution will be resumed right
|
2021-07-22 06:35:24 +08:00
|
|
|
* after the function call, either because somebody called
|
2021-09-02 15:15:07 +08:00
|
|
|
* wake_up(&waitq) (only module_close does that, when the file
|
2021-07-22 06:35:24 +08:00
|
|
|
* is closed) or when a signal, such as Ctrl-C, is sent
|
|
|
|
* to the process
|
|
|
|
*/
|
2021-09-07 23:42:06 +08:00
|
|
|
wait_event_interruptible(waitq, !atomic_read(&already_open));
|
2021-07-22 06:35:24 +08:00
|
|
|
|
2021-08-08 01:24:59 +08:00
|
|
|
/* If we woke up because we got a signal we're not blocking,
|
2021-07-22 06:35:24 +08:00
|
|
|
* return -EINTR (fail the system call). This allows processes
|
|
|
|
* to be killed or stopped.
|
|
|
|
*/
|
|
|
|
for (i = 0; i < _NSIG_WORDS && !is_sig; i++)
|
2021-07-22 06:58:13 +08:00
|
|
|
is_sig = current->pending.signal.sig[i] & ~current->blocked.sig[i];
|
2021-07-22 06:35:24 +08:00
|
|
|
|
|
|
|
if (is_sig) {
|
2021-08-08 01:24:59 +08:00
|
|
|
/* It is important to put module_put(THIS_MODULE) here, because
|
2021-08-08 01:50:42 +08:00
|
|
|
* for processes where the open is interrupted there will never
|
|
|
|
* be a corresponding close. If we do not decrement the usage
|
|
|
|
* count here, we will be left with a positive usage count
|
|
|
|
* which we will have no way to bring down to zero, giving us
|
|
|
|
* an immortal module, which can only be killed by rebooting
|
2021-07-22 06:35:24 +08:00
|
|
|
* the machine.
|
|
|
|
*/
|
|
|
|
module_put(THIS_MODULE);
|
|
|
|
return -EINTR;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-07-22 06:58:13 +08:00
|
|
|
return 0; /* Allow the access */
|
2021-07-22 06:35:24 +08:00
|
|
|
}
|
|
|
|
|
2021-08-08 01:24:59 +08:00
|
|
|
/* Called when the /proc file is closed */
|
2021-09-04 17:53:29 +08:00
|
|
|
static int module_close(struct inode *inode, struct file *file)
|
2021-07-22 06:35:24 +08:00
|
|
|
{
|
2021-09-02 15:15:07 +08:00
|
|
|
/* Set already_open to zero, so one of the processes in the waitq will
|
|
|
|
* be able to set already_open back to one and to open the file. All
|
|
|
|
* the other processes will be called when already_open is back to one,
|
2021-07-22 06:35:24 +08:00
|
|
|
* so they'll go back to sleep.
|
|
|
|
*/
|
2021-09-07 23:42:06 +08:00
|
|
|
atomic_set(&already_open, 0);
|
2021-07-22 06:35:24 +08:00
|
|
|
|
2021-09-02 15:15:07 +08:00
|
|
|
/* Wake up all the processes in waitq, so if anybody is waiting for the
|
2021-07-22 06:35:24 +08:00
|
|
|
* file, they can have it.
|
|
|
|
*/
|
2021-09-02 15:15:07 +08:00
|
|
|
wake_up(&waitq);
|
2021-07-22 06:35:24 +08:00
|
|
|
|
|
|
|
module_put(THIS_MODULE);
|
|
|
|
|
2021-07-22 06:58:13 +08:00
|
|
|
return 0; /* success */
|
2021-07-22 06:35:24 +08:00
|
|
|
}
|
|
|
|
|
2021-08-08 01:24:59 +08:00
|
|
|
/* Structures to register as the /proc file, with pointers to all the relevant
|
2021-07-22 06:35:24 +08:00
|
|
|
* functions.
|
|
|
|
*/
|
|
|
|
|
2021-08-08 01:24:59 +08:00
|
|
|
/* File operations for our proc file. This is where we place pointers to all
|
2021-07-22 06:35:24 +08:00
|
|
|
* the functions called when somebody tries to do something to our file. NULL
|
|
|
|
* means we don't want to deal with something.
|
|
|
|
*/
|
2021-07-22 07:17:31 +08:00
|
|
|
#ifdef HAVE_PROC_OPS
|
2021-09-02 15:15:07 +08:00
|
|
|
static const struct proc_ops file_ops_4_our_proc_file = {
|
|
|
|
.proc_read = module_output, /* "read" from the file */
|
|
|
|
.proc_write = module_input, /* "write" to the file */
|
|
|
|
.proc_open = module_open, /* called when the /proc file is opened */
|
2021-07-22 06:58:13 +08:00
|
|
|
.proc_release = module_close, /* called when it's closed */
|
2021-07-22 06:35:24 +08:00
|
|
|
};
|
2021-07-22 07:17:31 +08:00
|
|
|
#else
|
2021-09-02 15:15:07 +08:00
|
|
|
static const struct file_operations file_ops_4_our_proc_file = {
|
2021-07-22 07:17:31 +08:00
|
|
|
.read = module_output,
|
|
|
|
.write = module_input,
|
|
|
|
.open = module_open,
|
|
|
|
.release = module_close,
|
|
|
|
};
|
|
|
|
#endif
|
2021-07-22 06:35:24 +08:00
|
|
|
|
2021-08-08 00:29:24 +08:00
|
|
|
/* Initialize the module - register the proc file */
|
|
|
|
static int __init sleep_init(void)
|
2021-07-22 06:35:24 +08:00
|
|
|
{
|
2021-09-02 15:15:07 +08:00
|
|
|
our_proc_file =
|
|
|
|
proc_create(PROC_ENTRY_FILENAME, 0644, NULL, &file_ops_4_our_proc_file);
|
|
|
|
if (our_proc_file == NULL) {
|
2021-07-22 06:35:24 +08:00
|
|
|
remove_proc_entry(PROC_ENTRY_FILENAME, NULL);
|
|
|
|
pr_debug("Error: Could not initialize /proc/%s\n", PROC_ENTRY_FILENAME);
|
|
|
|
return -ENOMEM;
|
|
|
|
}
|
2021-09-02 15:15:07 +08:00
|
|
|
proc_set_size(our_proc_file, 80);
|
|
|
|
proc_set_user(our_proc_file, GLOBAL_ROOT_UID, GLOBAL_ROOT_GID);
|
2021-07-22 06:35:24 +08:00
|
|
|
|
2021-08-10 00:48:19 +08:00
|
|
|
pr_info("/proc/%s created\n", PROC_ENTRY_FILENAME);
|
2021-07-22 06:35:24 +08:00
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2021-08-08 00:29:24 +08:00
|
|
|
/* Cleanup - unregister our file from /proc. This could get dangerous if
|
2021-09-02 15:15:07 +08:00
|
|
|
* there are still processes waiting in waitq, because they are inside our
|
2021-07-22 06:35:24 +08:00
|
|
|
* open function, which will get unloaded. I'll explain how to avoid removal
|
|
|
|
* of a kernel module in such a case in chapter 10.
|
|
|
|
*/
|
2021-08-08 00:29:24 +08:00
|
|
|
static void __exit sleep_exit(void)
|
2021-07-22 06:35:24 +08:00
|
|
|
{
|
|
|
|
remove_proc_entry(PROC_ENTRY_FILENAME, NULL);
|
|
|
|
pr_debug("/proc/%s removed\n", PROC_ENTRY_FILENAME);
|
|
|
|
}
|
|
|
|
|
2021-08-08 00:29:24 +08:00
|
|
|
module_init(sleep_init);
|
|
|
|
module_exit(sleep_exit);
|
|
|
|
|
2021-07-22 06:35:24 +08:00
|
|
|
MODULE_LICENSE("GPL");
|