base.c 83.7 KB
Newer Older
Linus Torvalds's avatar
Linus Torvalds committed
1 2 3 4 5 6 7 8 9 10 11 12 13
/*
 *  linux/fs/proc/base.c
 *
 *  Copyright (C) 1991, 1992 Linus Torvalds
 *
 *  proc base directory handling functions
 *
 *  1999, Al Viro. Rewritten. Now it covers the whole per-process part.
 *  Instead of using magical inumbers to determine the kind of object
 *  we allocate and fill in-core inodes upon lookup. They don't even
 *  go into icache. We cache the reference to task_struct upon lookup too.
 *  Eventually it should become a filesystem in its own. We don't use the
 *  rest of procfs anymore.
Mauricio Lin's avatar
Mauricio Lin committed
14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47
 *
 *
 *  Changelog:
 *  17-Jan-2005
 *  Allan Bezerra
 *  Bruna Moreira <bruna.moreira@indt.org.br>
 *  Edjard Mota <edjard.mota@indt.org.br>
 *  Ilias Biris <ilias.biris@indt.org.br>
 *  Mauricio Lin <mauricio.lin@indt.org.br>
 *
 *  Embedded Linux Lab - 10LE Instituto Nokia de Tecnologia - INdT
 *
 *  A new process specific entry (smaps) included in /proc. It shows the
 *  size of rss for each memory area. The maps entry lacks information
 *  about physical memory size (rss) for each mapped file, i.e.,
 *  rss information for executables and library files.
 *  This additional information is useful for any tools that need to know
 *  about physical memory consumption for a process specific library.
 *
 *  Changelog:
 *  21-Feb-2005
 *  Embedded Linux Lab - 10LE Instituto Nokia de Tecnologia - INdT
 *  Pud inclusion in the page table walking.
 *
 *  ChangeLog:
 *  10-Mar-2005
 *  10LE Instituto Nokia de Tecnologia - INdT:
 *  A better way to walks through the page table as suggested by Hugh Dickins.
 *
 *  Simo Piiroinen <simo.piiroinen@nokia.com>:
 *  Smaps information related to shared, private, clean and dirty pages.
 *
 *  Paul Mundt <paul.mundt@nokia.com>:
 *  Overall revision about smaps.
Linus Torvalds's avatar
Linus Torvalds committed
48 49
 */

50
#include <linux/uaccess.h>
Linus Torvalds's avatar
Linus Torvalds committed
51 52 53 54 55

#include <linux/errno.h>
#include <linux/time.h>
#include <linux/proc_fs.h>
#include <linux/stat.h>
56
#include <linux/task_io_accounting_ops.h>
Linus Torvalds's avatar
Linus Torvalds committed
57
#include <linux/init.h>
58
#include <linux/capability.h>
Linus Torvalds's avatar
Linus Torvalds committed
59
#include <linux/file.h>
Al Viro's avatar
Al Viro committed
60
#include <linux/fdtable.h>
Linus Torvalds's avatar
Linus Torvalds committed
61 62 63
#include <linux/string.h>
#include <linux/seq_file.h>
#include <linux/namei.h>
64
#include <linux/mnt_namespace.h>
Linus Torvalds's avatar
Linus Torvalds committed
65
#include <linux/mm.h>
66
#include <linux/swap.h>
67
#include <linux/rcupdate.h>
Linus Torvalds's avatar
Linus Torvalds committed
68
#include <linux/kallsyms.h>
Ken Chen's avatar
Ken Chen committed
69
#include <linux/stacktrace.h>
70
#include <linux/resource.h>
Kees Cook's avatar
Kees Cook committed
71
#include <linux/module.h>
Linus Torvalds's avatar
Linus Torvalds committed
72 73 74
#include <linux/mount.h>
#include <linux/security.h>
#include <linux/ptrace.h>
75
#include <linux/tracehook.h>
Andrew Morton's avatar
Andrew Morton committed
76
#include <linux/printk.h>
77
#include <linux/cgroup.h>
Linus Torvalds's avatar
Linus Torvalds committed
78 79
#include <linux/cpuset.h>
#include <linux/audit.h>
Al Viro's avatar
Al Viro committed
80
#include <linux/poll.h>
81
#include <linux/nsproxy.h>
82
#include <linux/oom.h>
83
#include <linux/elf.h>
84
#include <linux/pid_namespace.h>
85
#include <linux/user_namespace.h>
86
#include <linux/fs_struct.h>
87
#include <linux/slab.h>
88
#include <linux/flex_array.h>
89
#include <linux/posix-timers.h>
90 91 92
#ifdef CONFIG_HARDWALL
#include <asm/hardwall.h>
#endif
93
#include <trace/events/oom.h>
Linus Torvalds's avatar
Linus Torvalds committed
94
#include "internal.h"
95
#include "fd.h"
Linus Torvalds's avatar
Linus Torvalds committed
96

97 98 99 100 101 102 103 104 105 106
/* NOTE:
 *	Implementing inode permission operations in /proc is almost
 *	certainly an error.  Permission checks need to happen during
 *	each system call not at open time.  The reason is that most of
 *	what we wish to check for permissions in /proc varies at runtime.
 *
 *	The classic example of a problem is opening file descriptors
 *	in /proc for a task before it execs a suid executable.
 */

107 108 109
static u8 nlink_tid;
static u8 nlink_tgid;

Linus Torvalds's avatar
Linus Torvalds committed
110
struct pid_entry {
111
	const char *name;
112
	unsigned int len;
Al Viro's avatar
Al Viro committed
113
	umode_t mode;
114
	const struct inode_operations *iop;
115
	const struct file_operations *fop;
116
	union proc_op op;
Linus Torvalds's avatar
Linus Torvalds committed
117 118
};

119
#define NOD(NAME, MODE, IOP, FOP, OP) {			\
120
	.name = (NAME),					\
121
	.len  = sizeof(NAME) - 1,			\
122 123 124 125 126 127
	.mode = MODE,					\
	.iop  = IOP,					\
	.fop  = FOP,					\
	.op   = OP,					\
}

Alexey Dobriyan's avatar
Alexey Dobriyan committed
128 129 130
#define DIR(NAME, MODE, iops, fops)	\
	NOD(NAME, (S_IFDIR|(MODE)), &iops, &fops, {} )
#define LNK(NAME, get_link)					\
131
	NOD(NAME, (S_IFLNK|S_IRWXUGO),				\
132
		&proc_pid_link_inode_operations, NULL,		\
Alexey Dobriyan's avatar
Alexey Dobriyan committed
133 134 135 136
		{ .proc_get_link = get_link } )
#define REG(NAME, MODE, fops)				\
	NOD(NAME, (S_IFREG|(MODE)), NULL, &fops, {})
#define ONE(NAME, MODE, show)				\
137 138
	NOD(NAME, (S_IFREG|(MODE)), 			\
		NULL, &proc_single_file_operations,	\
Alexey Dobriyan's avatar
Alexey Dobriyan committed
139
		{ .proc_show = show } )
Linus Torvalds's avatar
Linus Torvalds committed
140

141 142 143 144
/*
 * Count the number of hardlinks for the pid_entry table, excluding the .
 * and .. links.
 */
145
static unsigned int __init pid_entry_nlink(const struct pid_entry *entries,
146 147 148 149 150
	unsigned int n)
{
	unsigned int i;
	unsigned int count;

151
	count = 2;
152 153 154 155 156 157 158 159
	for (i = 0; i < n; ++i) {
		if (S_ISDIR(entries[i].mode))
			++count;
	}

	return count;
}

160
static int get_task_root(struct task_struct *task, struct path *root)
Linus Torvalds's avatar
Linus Torvalds committed
161
{
Hugh Dickins's avatar
Hugh Dickins committed
162 163
	int result = -ENOENT;

164
	task_lock(task);
165 166
	if (task->fs) {
		get_fs_root(task->fs, root);
Hugh Dickins's avatar
Hugh Dickins committed
167 168
		result = 0;
	}
169
	task_unlock(task);
Hugh Dickins's avatar
Hugh Dickins committed
170
	return result;
171 172
}

173
static int proc_cwd_link(struct dentry *dentry, struct path *path)
174
{
175
	struct task_struct *task = get_proc_task(d_inode(dentry));
176
	int result = -ENOENT;
177 178

	if (task) {
179 180 181 182 183 184
		task_lock(task);
		if (task->fs) {
			get_fs_pwd(task->fs, path);
			result = 0;
		}
		task_unlock(task);
185 186
		put_task_struct(task);
	}
Linus Torvalds's avatar
Linus Torvalds committed
187 188 189
	return result;
}

190
static int proc_root_link(struct dentry *dentry, struct path *path)
Linus Torvalds's avatar
Linus Torvalds committed
191
{
192
	struct task_struct *task = get_proc_task(d_inode(dentry));
Linus Torvalds's avatar
Linus Torvalds committed
193
	int result = -ENOENT;
194 195

	if (task) {
196
		result = get_task_root(task, path);
197 198
		put_task_struct(task);
	}
Linus Torvalds's avatar
Linus Torvalds committed
199 200 201
	return result;
}

202 203
static ssize_t proc_pid_cmdline_read(struct file *file, char __user *buf,
				     size_t _count, loff_t *pos)
Linus Torvalds's avatar
Linus Torvalds committed
204
{
205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248
	struct task_struct *tsk;
	struct mm_struct *mm;
	char *page;
	unsigned long count = _count;
	unsigned long arg_start, arg_end, env_start, env_end;
	unsigned long len1, len2, len;
	unsigned long p;
	char c;
	ssize_t rv;

	BUG_ON(*pos < 0);

	tsk = get_proc_task(file_inode(file));
	if (!tsk)
		return -ESRCH;
	mm = get_task_mm(tsk);
	put_task_struct(tsk);
	if (!mm)
		return 0;
	/* Check if process spawned far enough to have cmdline. */
	if (!mm->env_end) {
		rv = 0;
		goto out_mmput;
	}

	page = (char *)__get_free_page(GFP_TEMPORARY);
	if (!page) {
		rv = -ENOMEM;
		goto out_mmput;
	}

	down_read(&mm->mmap_sem);
	arg_start = mm->arg_start;
	arg_end = mm->arg_end;
	env_start = mm->env_start;
	env_end = mm->env_end;
	up_read(&mm->mmap_sem);

	BUG_ON(arg_start > arg_end);
	BUG_ON(env_start > env_end);

	len1 = arg_end - arg_start;
	len2 = env_end - env_start;

249 250 251 252 253
	/* Empty ARGV. */
	if (len1 == 0) {
		rv = 0;
		goto out_free_page;
	}
254
	/*
255 256
	 * Inherently racy -- command line shares address space
	 * with code and data.
257
	 */
258
	rv = access_remote_vm(mm, arg_end - 1, &c, 1, 0);
259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275
	if (rv <= 0)
		goto out_free_page;

	rv = 0;

	if (c == '\0') {
		/* Command line (set of strings) occupies whole ARGV. */
		if (len1 <= *pos)
			goto out_free_page;

		p = arg_start + *pos;
		len = len1 - *pos;
		while (count > 0 && len > 0) {
			unsigned int _count;
			int nr_read;

			_count = min3(count, len, PAGE_SIZE);
276
			nr_read = access_remote_vm(mm, p, page, _count, 0);
277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310
			if (nr_read < 0)
				rv = nr_read;
			if (nr_read <= 0)
				goto out_free_page;

			if (copy_to_user(buf, page, nr_read)) {
				rv = -EFAULT;
				goto out_free_page;
			}

			p	+= nr_read;
			len	-= nr_read;
			buf	+= nr_read;
			count	-= nr_read;
			rv	+= nr_read;
		}
	} else {
		/*
		 * Command line (1 string) occupies ARGV and maybe
		 * extends into ENVP.
		 */
		if (len1 + len2 <= *pos)
			goto skip_argv_envp;
		if (len1 <= *pos)
			goto skip_argv;

		p = arg_start + *pos;
		len = len1 - *pos;
		while (count > 0 && len > 0) {
			unsigned int _count, l;
			int nr_read;
			bool final;

			_count = min3(count, len, PAGE_SIZE);
311
			nr_read = access_remote_vm(mm, p, page, _count, 0);
312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359
			if (nr_read < 0)
				rv = nr_read;
			if (nr_read <= 0)
				goto out_free_page;

			/*
			 * Command line can be shorter than whole ARGV
			 * even if last "marker" byte says it is not.
			 */
			final = false;
			l = strnlen(page, nr_read);
			if (l < nr_read) {
				nr_read = l;
				final = true;
			}

			if (copy_to_user(buf, page, nr_read)) {
				rv = -EFAULT;
				goto out_free_page;
			}

			p	+= nr_read;
			len	-= nr_read;
			buf	+= nr_read;
			count	-= nr_read;
			rv	+= nr_read;

			if (final)
				goto out_free_page;
		}
skip_argv:
		/*
		 * Command line (1 string) occupies ARGV and
		 * extends into ENVP.
		 */
		if (len1 <= *pos) {
			p = env_start + *pos - len1;
			len = len1 + len2 - *pos;
		} else {
			p = env_start;
			len = len2;
		}
		while (count > 0 && len > 0) {
			unsigned int _count, l;
			int nr_read;
			bool final;

			_count = min3(count, len, PAGE_SIZE);
360
			nr_read = access_remote_vm(mm, p, page, _count, 0);
361 362 363 364 365 366 367 368 369 370 371 372 373 374 375 376 377 378 379 380 381 382 383 384 385 386 387 388 389 390 391 392 393 394 395 396 397 398
			if (nr_read < 0)
				rv = nr_read;
			if (nr_read <= 0)
				goto out_free_page;

			/* Find EOS. */
			final = false;
			l = strnlen(page, nr_read);
			if (l < nr_read) {
				nr_read = l;
				final = true;
			}

			if (copy_to_user(buf, page, nr_read)) {
				rv = -EFAULT;
				goto out_free_page;
			}

			p	+= nr_read;
			len	-= nr_read;
			buf	+= nr_read;
			count	-= nr_read;
			rv	+= nr_read;

			if (final)
				goto out_free_page;
		}
skip_argv_envp:
		;
	}

out_free_page:
	free_page((unsigned long)page);
out_mmput:
	mmput(mm);
	if (rv > 0)
		*pos += rv;
	return rv;
Linus Torvalds's avatar
Linus Torvalds committed
399 400
}

401 402 403 404 405
static const struct file_operations proc_pid_cmdline_ops = {
	.read	= proc_pid_cmdline_read,
	.llseek	= generic_file_llseek,
};

Linus Torvalds's avatar
Linus Torvalds committed
406 407 408 409 410
#ifdef CONFIG_KALLSYMS
/*
 * Provides a wchan file via kallsyms in a proper one-value-per-file format.
 * Returns the resolved symbol.  If that fails, simply return the address.
 */
411 412
static int proc_pid_wchan(struct seq_file *m, struct pid_namespace *ns,
			  struct pid *pid, struct task_struct *task)
Linus Torvalds's avatar
Linus Torvalds committed
413
{
Alexey Dobriyan's avatar
Alexey Dobriyan committed
414
	unsigned long wchan;
415
	char symname[KSYM_NAME_LEN];
Linus Torvalds's avatar
Linus Torvalds committed
416 417 418

	wchan = get_wchan(task);

419 420
	if (wchan && ptrace_may_access(task, PTRACE_MODE_READ_FSCREDS)
			&& !lookup_symbol_name(wchan, symname))
421
		seq_printf(m, "%s", symname);
422
	else
423
		seq_putc(m, '0');
424 425

	return 0;
Linus Torvalds's avatar
Linus Torvalds committed
426 427 428
}
#endif /* CONFIG_KALLSYMS */

429 430 431 432 433
static int lock_trace(struct task_struct *task)
{
	int err = mutex_lock_killable(&task->signal->cred_guard_mutex);
	if (err)
		return err;
434
	if (!ptrace_may_access(task, PTRACE_MODE_ATTACH_FSCREDS)) {
435 436 437 438 439 440 441 442 443 444 445
		mutex_unlock(&task->signal->cred_guard_mutex);
		return -EPERM;
	}
	return 0;
}

static void unlock_trace(struct task_struct *task)
{
	mutex_unlock(&task->signal->cred_guard_mutex);
}

Ken Chen's avatar
Ken Chen committed
446 447 448 449 450 451 452 453 454
#ifdef CONFIG_STACKTRACE

#define MAX_STACK_TRACE_DEPTH	64

static int proc_pid_stack(struct seq_file *m, struct pid_namespace *ns,
			  struct pid *pid, struct task_struct *task)
{
	struct stack_trace trace;
	unsigned long *entries;
455
	int err;
Ken Chen's avatar
Ken Chen committed
456 457 458 459 460 461 462 463 464 465 466
	int i;

	entries = kmalloc(MAX_STACK_TRACE_DEPTH * sizeof(*entries), GFP_KERNEL);
	if (!entries)
		return -ENOMEM;

	trace.nr_entries	= 0;
	trace.max_entries	= MAX_STACK_TRACE_DEPTH;
	trace.entries		= entries;
	trace.skip		= 0;

467 468 469 470 471
	err = lock_trace(task);
	if (!err) {
		save_stack_trace_tsk(task, &trace);

		for (i = 0; i < trace.nr_entries; i++) {
472
			seq_printf(m, "[<%pK>] %pB\n",
473 474 475
				   (void *)entries[i], (void *)entries[i]);
		}
		unlock_trace(task);
Ken Chen's avatar
Ken Chen committed
476 477 478
	}
	kfree(entries);

479
	return err;
Ken Chen's avatar
Ken Chen committed
480 481 482
}
#endif

483
#ifdef CONFIG_SCHED_INFO
Linus Torvalds's avatar
Linus Torvalds committed
484 485 486
/*
 * Provides /proc/PID/schedstat
 */
487 488
static int proc_pid_schedstat(struct seq_file *m, struct pid_namespace *ns,
			      struct pid *pid, struct task_struct *task)
Linus Torvalds's avatar
Linus Torvalds committed
489
{
490 491 492 493
	if (unlikely(!sched_info_on()))
		seq_printf(m, "0 0 0\n");
	else
		seq_printf(m, "%llu %llu %lu\n",
494 495 496 497 498
		   (unsigned long long)task->se.sum_exec_runtime,
		   (unsigned long long)task->sched_info.run_delay,
		   task->sched_info.pcount);

	return 0;
Linus Torvalds's avatar
Linus Torvalds committed
499 500 501
}
#endif

Arjan van de Ven's avatar
Arjan van de Ven committed
502 503 504 505
#ifdef CONFIG_LATENCYTOP
static int lstats_show_proc(struct seq_file *m, void *v)
{
	int i;
506 507
	struct inode *inode = m->private;
	struct task_struct *task = get_proc_task(inode);
Arjan van de Ven's avatar
Arjan van de Ven committed
508

509 510 511
	if (!task)
		return -ESRCH;
	seq_puts(m, "Latency Top version : v0.1\n");
Arjan van de Ven's avatar
Arjan van de Ven committed
512
	for (i = 0; i < 32; i++) {
513 514
		struct latency_record *lr = &task->latency_record[i];
		if (lr->backtrace[0]) {
Arjan van de Ven's avatar
Arjan van de Ven committed
515
			int q;
516 517
			seq_printf(m, "%i %li %li",
				   lr->count, lr->time, lr->max);
Arjan van de Ven's avatar
Arjan van de Ven committed
518
			for (q = 0; q < LT_BACKTRACEDEPTH; q++) {
519 520
				unsigned long bt = lr->backtrace[q];
				if (!bt)
Arjan van de Ven's avatar
Arjan van de Ven committed
521
					break;
522
				if (bt == ULONG_MAX)
Arjan van de Ven's avatar
Arjan van de Ven committed
523
					break;
524
				seq_printf(m, " %ps", (void *)bt);
Arjan van de Ven's avatar
Arjan van de Ven committed
525
			}
526
			seq_putc(m, '\n');
Arjan van de Ven's avatar
Arjan van de Ven committed
527 528 529
		}

	}
530
	put_task_struct(task);
Arjan van de Ven's avatar
Arjan van de Ven committed
531 532 533 534 535
	return 0;
}

static int lstats_open(struct inode *inode, struct file *file)
{
536
	return single_open(file, lstats_show_proc, inode);
537 538
}

Arjan van de Ven's avatar
Arjan van de Ven committed
539 540 541
static ssize_t lstats_write(struct file *file, const char __user *buf,
			    size_t count, loff_t *offs)
{
Al Viro's avatar
Al Viro committed
542
	struct task_struct *task = get_proc_task(file_inode(file));
Arjan van de Ven's avatar
Arjan van de Ven committed
543

544 545
	if (!task)
		return -ESRCH;
Arjan van de Ven's avatar
Arjan van de Ven committed
546
	clear_all_latency_tracing(task);
547
	put_task_struct(task);
Arjan van de Ven's avatar
Arjan van de Ven committed
548 549 550 551 552 553 554 555 556

	return count;
}

static const struct file_operations proc_lstats_operations = {
	.open		= lstats_open,
	.read		= seq_read,
	.write		= lstats_write,
	.llseek		= seq_lseek,
557
	.release	= single_release,
Arjan van de Ven's avatar
Arjan van de Ven committed
558 559 560 561
};

#endif

562 563
static int proc_oom_score(struct seq_file *m, struct pid_namespace *ns,
			  struct pid *pid, struct task_struct *task)
Linus Torvalds's avatar
Linus Torvalds committed
564
{
565
	unsigned long totalpages = totalram_pages + total_swap_pages;
566
	unsigned long points = 0;
Linus Torvalds's avatar
Linus Torvalds committed
567

568 569
	points = oom_badness(task, NULL, NULL, totalpages) *
					1000 / totalpages;
570 571 572
	seq_printf(m, "%lu\n", points);

	return 0;
Linus Torvalds's avatar
Linus Torvalds committed
573 574
}

575
struct limit_names {
576 577
	const char *name;
	const char *unit;
578 579 580
};

static const struct limit_names lnames[RLIM_NLIMITS] = {
581
	[RLIMIT_CPU] = {"Max cpu time", "seconds"},
582 583 584 585 586 587 588 589 590 591 592 593 594 595
	[RLIMIT_FSIZE] = {"Max file size", "bytes"},
	[RLIMIT_DATA] = {"Max data size", "bytes"},
	[RLIMIT_STACK] = {"Max stack size", "bytes"},
	[RLIMIT_CORE] = {"Max core file size", "bytes"},
	[RLIMIT_RSS] = {"Max resident set", "bytes"},
	[RLIMIT_NPROC] = {"Max processes", "processes"},
	[RLIMIT_NOFILE] = {"Max open files", "files"},
	[RLIMIT_MEMLOCK] = {"Max locked memory", "bytes"},
	[RLIMIT_AS] = {"Max address space", "bytes"},
	[RLIMIT_LOCKS] = {"Max file locks", "locks"},
	[RLIMIT_SIGPENDING] = {"Max pending signals", "signals"},
	[RLIMIT_MSGQUEUE] = {"Max msgqueue size", "bytes"},
	[RLIMIT_NICE] = {"Max nice priority", NULL},
	[RLIMIT_RTPRIO] = {"Max realtime priority", NULL},
596
	[RLIMIT_RTTIME] = {"Max realtime timeout", "us"},
597 598 599
};

/* Display limits for a process */
600 601
static int proc_pid_limits(struct seq_file *m, struct pid_namespace *ns,
			   struct pid *pid, struct task_struct *task)
602 603 604 605 606 607
{
	unsigned int i;
	unsigned long flags;

	struct rlimit rlim[RLIM_NLIMITS];

608
	if (!lock_task_sighand(task, &flags))
609 610 611 612 613 614 615
		return 0;
	memcpy(rlim, task->signal->rlim, sizeof(struct rlimit) * RLIM_NLIMITS);
	unlock_task_sighand(task, &flags);

	/*
	 * print the file header
	 */
616
       seq_printf(m, "%-25s %-20s %-20s %-10s\n",
617
		  "Limit", "Soft Limit", "Hard Limit", "Units");
618 619 620

	for (i = 0; i < RLIM_NLIMITS; i++) {
		if (rlim[i].rlim_cur == RLIM_INFINITY)
621
			seq_printf(m, "%-25s %-20s ",
622
				   lnames[i].name, "unlimited");
623
		else
624
			seq_printf(m, "%-25s %-20lu ",
625
				   lnames[i].name, rlim[i].rlim_cur);
626 627

		if (rlim[i].rlim_max == RLIM_INFINITY)
628
			seq_printf(m, "%-20s ", "unlimited");
629
		else
630
			seq_printf(m, "%-20lu ", rlim[i].rlim_max);
631 632

		if (lnames[i].unit)
633
			seq_printf(m, "%-10s\n", lnames[i].unit);
634
		else
635
			seq_putc(m, '\n');
636 637
	}

638
	return 0;
639 640
}

Roland McGrath's avatar
Roland McGrath committed
641
#ifdef CONFIG_HAVE_ARCH_TRACEHOOK
642 643
static int proc_pid_syscall(struct seq_file *m, struct pid_namespace *ns,
			    struct pid *pid, struct task_struct *task)
Roland McGrath's avatar
Roland McGrath committed
644 645 646
{
	long nr;
	unsigned long args[6], sp, pc;
647 648 649
	int res;

	res = lock_trace(task);
650 651
	if (res)
		return res;
Roland McGrath's avatar
Roland McGrath committed
652 653

	if (task_current_syscall(task, &nr, args, 6, &sp, &pc))
654
		seq_puts(m, "running\n");
655
	else if (nr < 0)
656
		seq_printf(m, "%ld 0x%lx 0x%lx\n", nr, sp, pc);
657
	else
658
		seq_printf(m,
Roland McGrath's avatar
Roland McGrath committed
659 660 661 662
		       "%ld 0x%lx 0x%lx 0x%lx 0x%lx 0x%lx 0x%lx 0x%lx 0x%lx\n",
		       nr,
		       args[0], args[1], args[2], args[3], args[4], args[5],
		       sp, pc);
663
	unlock_trace(task);
664 665

	return 0;
Roland McGrath's avatar
Roland McGrath committed
666 667 668
}
#endif /* CONFIG_HAVE_ARCH_TRACEHOOK */

Linus Torvalds's avatar
Linus Torvalds committed
669 670 671 672 673
/************************************************************************/
/*                       Here the fs part begins                        */
/************************************************************************/

/* permission checks */
674
static int proc_fd_access_allowed(struct inode *inode)
Linus Torvalds's avatar
Linus Torvalds committed
675
{
676 677
	struct task_struct *task;
	int allowed = 0;
678 679 680
	/* Allow access to a task's file descriptors if it is us or we
	 * may use ptrace attach to the process and find out that
	 * information.
681 682
	 */
	task = get_proc_task(inode);
683
	if (task) {
684
		allowed = ptrace_may_access(task, PTRACE_MODE_READ_FSCREDS);
685
		put_task_struct(task);
686
	}
687
	return allowed;
Linus Torvalds's avatar
Linus Torvalds committed
688 689
}

690
int proc_setattr(struct dentry *dentry, struct iattr *attr)
691 692
{
	int error;
693
	struct inode *inode = d_inode(dentry);
694 695 696 697

	if (attr->ia_valid & ATTR_MODE)
		return -EPERM;

698
	error = setattr_prepare(dentry, attr);
Christoph Hellwig's avatar
Christoph Hellwig committed
699 700 701 702 703 704
	if (error)
		return error;

	setattr_copy(inode, attr);
	mark_inode_dirty(inode);
	return 0;
705 706
}

707 708 709 710 711 712 713 714 715 716 717 718
/*
 * May current process learn task's sched/cmdline info (for hide_pid_min=1)
 * or euid/egid (for hide_pid_min=2)?
 */
static bool has_pid_permissions(struct pid_namespace *pid,
				 struct task_struct *task,
				 int hide_pid_min)
{
	if (pid->hide_pid < hide_pid_min)
		return true;
	if (in_group_p(pid->pid_gid))
		return true;
719
	return ptrace_may_access(task, PTRACE_MODE_READ_FSCREDS);
720 721 722 723 724 725 726 727 728 729
}


static int proc_pid_permission(struct inode *inode, int mask)
{
	struct pid_namespace *pid = inode->i_sb->s_fs_info;
	struct task_struct *task;
	bool has_perms;

	task = get_proc_task(inode);
730 731
	if (!task)
		return -ESRCH;
732 733 734 735 736 737 738 739 740 741 742 743 744 745 746 747 748 749 750 751 752
	has_perms = has_pid_permissions(pid, task, 1);
	put_task_struct(task);

	if (!has_perms) {
		if (pid->hide_pid == 2) {
			/*
			 * Let's make getdents(), stat(), and open()
			 * consistent with each other.  If a process
			 * may not stat() a file, it shouldn't be seen
			 * in procfs at all.
			 */
			return -ENOENT;
		}

		return -EPERM;
	}
	return generic_permission(inode, mask);
}



753
static const struct inode_operations proc_def_inode_operations = {
754 755 756
	.setattr	= proc_setattr,
};

757 758 759 760 761 762 763 764 765 766 767 768 769 770 771 772 773 774 775 776 777 778
static int proc_single_show(struct seq_file *m, void *v)
{
	struct inode *inode = m->private;
	struct pid_namespace *ns;
	struct pid *pid;
	struct task_struct *task;
	int ret;

	ns = inode->i_sb->s_fs_info;
	pid = proc_pid(inode);
	task = get_pid_task(pid, PIDTYPE_PID);
	if (!task)
		return -ESRCH;

	ret = PROC_I(inode)->op.proc_show(m, ns, pid, task);

	put_task_struct(task);
	return ret;
}

static int proc_single_open(struct inode *inode, struct file *filp)
{
779
	return single_open(filp, proc_single_show, inode);
780 781 782 783 784 785 786 787 788
}

static const struct file_operations proc_single_file_operations = {
	.open		= proc_single_open,
	.read		= seq_read,
	.llseek		= seq_lseek,
	.release	= single_release,
};

789 790

struct mm_struct *proc_mem_open(struct inode *inode, unsigned int mode)
Linus Torvalds's avatar
Linus Torvalds committed
791
{
792 793
	struct task_struct *task = get_proc_task(inode);
	struct mm_struct *mm = ERR_PTR(-ESRCH);
794

795
	if (task) {
796
		mm = mm_access(task, mode | PTRACE_MODE_FSCREDS);
797
		put_task_struct(task);
798

799 800 801 802 803 804 805 806 807 808 809 810 811 812
		if (!IS_ERR_OR_NULL(mm)) {
			/* ensure this mm_struct can't be freed */
			atomic_inc(&mm->mm_count);
			/* but do not pin its memory */
			mmput(mm);
		}
	}

	return mm;
}

static int __mem_open(struct inode *inode, struct file *file, unsigned int mode)
{
	struct mm_struct *mm = proc_mem_open(inode, mode);
813 814 815 816 817

	if (IS_ERR(mm))
		return PTR_ERR(mm);

	file->private_data = mm;
Linus Torvalds's avatar
Linus Torvalds committed
818 819 820
	return 0;
}

821 822
static int mem_open(struct inode *inode, struct file *file)
{
823 824 825 826 827 828
	int ret = __mem_open(inode, file, PTRACE_MODE_ATTACH);

	/* OK to pass negative loff_t, we can catch out-of-range */
	file->f_mode |= FMODE_UNSIGNED_OFFSET;

	return ret;
829 830
}

831 832
static ssize_t mem_rw(struct file *file, char __user *buf,
			size_t count, loff_t *ppos, int write)
Linus Torvalds's avatar
Linus Torvalds committed
833
{
834
	struct mm_struct *mm = file->private_data;
835 836
	unsigned long addr = *ppos;
	ssize_t copied;
Linus Torvalds's avatar
Linus Torvalds committed
837
	char *page;
838
	unsigned int flags;
Linus Torvalds's avatar
Linus Torvalds committed
839

840 841
	if (!mm)
		return 0;
842

843 844
	page = (char *)__get_free_page(GFP_TEMPORARY);
	if (!page)
845
		return -ENOMEM;
Linus Torvalds's avatar
Linus Torvalds committed
846

847
	copied = 0;
848 849 850
	if (!atomic_inc_not_zero(&mm->mm_users))
		goto free;

851 852
	/* Maybe we should limit FOLL_FORCE to actual ptrace users? */
	flags = FOLL_FORCE;
853 854 855
	if (write)
		flags |= FOLL_WRITE;

Linus Torvalds's avatar
Linus Torvalds committed
856
	while (count > 0) {
857
		int this_len = min_t(int, count, PAGE_SIZE);
Linus Torvalds's avatar
Linus Torvalds committed
858

859
		if (write && copy_from_user(page, buf, this_len)) {
Linus Torvalds's avatar
Linus Torvalds committed
860 861 862
			copied = -EFAULT;
			break;
		}
863

864
		this_len = access_remote_vm(mm, addr, page, this_len, flags);
865
		if (!this_len) {
Linus Torvalds's avatar
Linus Torvalds committed
866 867 868 869
			if (!copied)
				copied = -EIO;
			break;
		}
870 871 872 873 874 875 876 877 878 879

		if (!write && copy_to_user(buf, page, this_len)) {
			copied = -EFAULT;
			break;
		}

		buf += this_len;
		addr += this_len;
		copied += this_len;
		count -= this_len;
Linus Torvalds's avatar
Linus Torvalds committed
880
	}
881
	*ppos = addr;
882

883 884
	mmput(mm);
free:
885
	free_page((unsigned long) page);
Linus Torvalds's avatar
Linus Torvalds committed
886 887 888
	return copied;
}

889 890 891 892 893 894 895 896 897 898 899 900
static ssize_t mem_read(struct file *file, char __user *buf,
			size_t count, loff_t *ppos)
{
	return mem_rw(file, buf, count, ppos, 0);
}

static ssize_t mem_write(struct file *file, const char __user *buf,
			 size_t count, loff_t *ppos)
{
	return mem_rw(file, (char __user*)buf, count, ppos, 1);
}

901
loff_t mem_lseek(struct file *file, loff_t offset, int orig)
Linus Torvalds's avatar
Linus Torvalds committed
902 903 904 905 906 907 908 909 910 911 912 913 914 915 916
{
	switch (orig) {
	case 0:
		file->f_pos = offset;
		break;
	case 1:
		file->f_pos += offset;
		break;
	default:
		return -EINVAL;
	}
	force_successful_syscall_return();
	return file->f_pos;
}

917 918 919
static int mem_release(struct inode *inode, struct file *file)
{
	struct mm_struct *mm = file->private_data;
920
	if (mm)
921
		mmdrop(mm);
922 923 924
	return 0;
}

925
static const struct file_operations proc_mem_operations = {
Linus Torvalds's avatar
Linus Torvalds committed
926 927 928 929
	.llseek		= mem_lseek,
	.read		= mem_read,
	.write		= mem_write,
	.open		= mem_open,
930
	.release	= mem_release,
Linus Torvalds's avatar
Linus Torvalds committed
931 932
};

933 934 935 936 937
static int environ_open(struct inode *inode, struct file *file)
{
	return __mem_open(inode, file, PTRACE_MODE_READ);
}

938 939 940 941 942
static ssize_t environ_read(struct file *file, char __user *buf,
			size_t count, loff_t *ppos)
{
	char *page;
	unsigned long src = *ppos;
943 944
	int ret = 0;
	struct mm_struct *mm = file->private_data;
945
	unsigned long env_start, env_end;
946

947 948
	/* Ensure the process spawned far enough to have an environment. */
	if (!mm || !mm->env_end)
949
		return 0;
950 951 952

	page = (char *)__get_free_page(GFP_TEMPORARY);
	if (!page)
953
		return -ENOMEM;
954

Al Viro's avatar
Al Viro committed
955
	ret = 0;
956 957
	if (!atomic_inc_not_zero(&mm->mm_users))
		goto free;
958 959 960 961 962 963

	down_read(&mm->mmap_sem);
	env_start = mm->env_start;
	env_end = mm->env_end;
	up_read(&mm->mmap_sem);

964
	while (count > 0) {
965 966
		size_t this_len, max_len;
		int retval;
967

968
		if (src >= (env_end - env_start))
969 970
			break;

971
		this_len = env_end - (env_start + src);
972 973 974

		max_len = min_t(size_t, PAGE_SIZE, count);
		this_len = min(max_len, this_len);
975

976
		retval = access_remote_vm(mm, (env_start + src), page, this_len, 0);
977 978 979 980 981 982 983 984 985 986 987 988 989 990 991 992 993 994

		if (retval <= 0) {
			ret = retval;
			break;
		}

		if (copy_to_user(buf, page, retval)) {
			ret = -EFAULT;
			break;
		}

		ret += retval;
		src += retval;
		buf += retval;
		count -= retval;
	}
	*ppos = src;
	mmput(mm);
995 996

free:
997 998 999 1000 1001
	free_page((unsigned long) page);
	return ret;
}

static const struct file_operations proc_environ_operations = {
1002
	.open		= environ_open,
1003
	.read		= environ_read,
1004
	.llseek		= generic_file_llseek,
1005
	.release	= mem_release,
1006 1007
};

1008 1009 1010 1011 1012 1013 1014 1015 1016 1017
static int auxv_open(struct inode *inode, struct file *file)
{
	return __mem_open(inode, file, PTRACE_MODE_READ_FSCREDS);
}

static ssize_t auxv_read(struct file *file, char __user *buf,
			size_t count, loff_t *ppos)
{
	struct mm_struct *mm = file->private_data;
	unsigned int nwords = 0;
1018 1019 1020

	if (!mm)
		return 0;
1021 1022 1023 1024 1025 1026 1027 1028 1029 1030 1031 1032 1033 1034
	do {
		nwords += 2;
	} while (mm->saved_auxv[nwords - 2] != 0); /* AT_NULL */
	return simple_read_from_buffer(buf, count, ppos, mm->saved_auxv,
				       nwords * sizeof(mm->saved_auxv[0]));
}

static const struct file_operations proc_auxv_operations = {
	.open		= auxv_open,
	.read		= auxv_read,
	.llseek		= generic_file_llseek,
	.release	= mem_release,
};

1035 1036 1037
static ssize_t oom_adj_read(struct file *file, char __user *buf, size_t count,
			    loff_t *ppos)
{
Al Viro's avatar
Al Viro committed
1038
	struct task_struct *task = get_proc_task(file_inode(file));
1039 1040 1041 1042 1043 1044
	char buffer[PROC_NUMBUF];
	int oom_adj = OOM_ADJUST_MIN;
	size_t len;

	if (!task)
		return -ESRCH;
1045 1046 1047 1048 1049
	if (task->signal->oom_score_adj == OOM_SCORE_ADJ_MAX)
		oom_adj = OOM_ADJUST_MAX;
	else
		oom_adj = (task->signal->oom_score_adj * -OOM_DISABLE) /
			  OOM_SCORE_ADJ_MAX;
1050 1051 1052 1053 1054
	put_task_struct(task);
	len = snprintf(buffer, sizeof(buffer), "%d\n", oom_adj);
	return simple_read_from_buffer(buf, count, ppos, buffer, len);
}

1055 1056 1057
static int __set_oom_adj(struct file *file, int oom_adj, bool legacy)
{
	static DEFINE_MUTEX(oom_adj_mutex);
1058
	struct mm_struct *mm = NULL;
1059 1060 1061 1062 1063 1064 1065 1066 1067 1068 1069 1070 1071 1072 1073 1074 1075 1076 1077 1078 1079 1080 1081 1082 1083 1084 1085 1086 1087
	struct task_struct *task;
	int err = 0;

	task = get_proc_task(file_inode(file));
	if (!task)
		return -ESRCH;

	mutex_lock(&oom_adj_mutex);
	if (legacy) {
		if (oom_adj < task->signal->oom_score_adj &&
				!capable(CAP_SYS_RESOURCE)) {
			err = -EACCES;
			goto err_unlock;
		}
		/*
		 * /proc/pid/oom_adj is provided for legacy purposes, ask users to use
		 * /proc/pid/oom_score_adj instead.
		 */
		pr_warn_once("%s (%d): /proc/%d/oom_adj is deprecated, please use /proc/%d/oom_score_adj instead.\n",
			  current->comm, task_pid_nr(current), task_pid_nr(task),
			  task_pid_nr(task));
	} else {
		if ((short)oom_adj < task->signal->oom_score_adj_min &&
				!capable(CAP_SYS_RESOURCE)) {
			err = -EACCES;
			goto err_unlock;
		}
	}

1088 1089 1090 1091 1092 1093 1094 1095 1096 1097 1098 1099 1100 1101 1102 1103 1104
	/*
	 * Make sure we will check other processes sharing the mm if this is
	 * not vfrok which wants its own oom_score_adj.
	 * pin the mm so it doesn't go away and get reused after task_unlock
	 */
	if (!task->vfork_done) {
		struct task_struct *p = find_lock_task_mm(task);

		if (p) {
			if (atomic_read(&p->mm->mm_users) > 1) {
				mm = p->mm;
				atomic_inc(&mm->mm_count);
			}
			task_unlock(p);
		}
	}

1105 1106 1107 1108
	task->signal->oom_score_adj = oom_adj;
	if (!legacy && has_capability_noaudit(current, CAP_SYS_RESOURCE))
		task->signal->oom_score_adj_min = (short)oom_adj;
	trace_oom_score_adj_update(task);
1109 1110 1111 1112 1113 1114 1115 1116 1117 1118 1119 1120 1121 1122 1123 1124 1125 1126 1127 1128 1129 1130 1131 1132 1133 1134 1135 1136

	if (mm) {
		struct task_struct *p;

		rcu_read_lock();
		for_each_process(p) {
			if (same_thread_group(task, p))
				continue;

			/* do not touch kernel threads or the global init */
			if (p->flags & PF_KTHREAD || is_global_init(p))
				continue;

			task_lock(p);
			if (!p->vfork_done && process_shares_mm(p, mm)) {
				pr_info("updating oom_score_adj for %d (%s) from %d to %d because it shares mm with %d (%s). Report if this is unexpected.\n",
						task_pid_nr(p), p->comm,
						p->signal->oom_score_adj, oom_adj,
						task_pid_nr(task), task->comm);
				p->signal->oom_score_adj = oom_adj;
				if (!legacy && has_capability_noaudit(current, CAP_SYS_RESOURCE))
					p->signal->oom_score_adj_min = (short)oom_adj;
			}
			task_unlock(p);
		}
		rcu_read_unlock();
		mmdrop(mm);
	}
1137 1138 1139 1140 1141
err_unlock:
	mutex_unlock(&oom_adj_mutex);
	put_task_struct(task);
	return err;
}
1142

1143 1144 1145 1146 1147 1148 1149 1150 1151 1152
/*
 * /proc/pid/oom_adj exists solely for backwards compatibility with previous
 * kernels.  The effective policy is defined by oom_score_adj, which has a
 * different scale: oom_adj grew exponentially and oom_score_adj grows linearly.
 * Values written to oom_adj are simply mapped linearly to oom_score_adj.
 * Processes that become oom disabled via oom_adj will still be oom disabled
 * with this implementation.
 *
 * oom_adj cannot be removed since existing userspace binaries use it.
 */
1153 1154 1155 1156 1157 1158 1159 1160 1161 1162 1163 1164 1165 1166 1167 1168 1169 1170 1171 1172 1173 1174 1175 1176 1177 1178 1179 1180 1181 1182 1183 1184 1185
static ssize_t oom_adj_write(struct file *file, const char __user *buf,
			     size_t count, loff_t *ppos)
{
	char buffer[PROC_NUMBUF];
	int oom_adj;
	int err;

	memset(buffer, 0, sizeof(buffer));
	if (count > sizeof(buffer) - 1)
		count = sizeof(buffer) - 1;
	if (copy_from_user(buffer, buf, count)) {
		err = -EFAULT;
		goto out;
	}

	err = kstrtoint(strstrip(buffer), 0, &oom_adj);
	if (err)
		goto out;
	if ((oom_adj < OOM_ADJUST_MIN || oom_adj > OOM_ADJUST_MAX) &&
	     oom_adj != OOM_DISABLE) {
		err = -EINVAL;
		goto out;
	}

	/*
	 * Scale /proc/pid/oom_score_adj appropriately ensuring that a maximum
	 * value is always attainable.
	 */
	if (oom_adj == OOM_ADJUST_MAX)
		oom_adj = OOM_SCORE_ADJ_MAX;
	else
		oom_adj = (oom_adj * OOM_SCORE_ADJ_MAX) / -OOM_DISABLE;

1186
	err = __set_oom_adj(file, oom_adj, true);
1187 1188 1189 1190 1191 1192 1193 1194 1195 1196
out:
	return err < 0 ? err : count;
}

static const struct file_operations proc_oom_adj_operations = {
	.read		= oom_adj_read,
	.write		= oom_adj_write,
	.llseek		= generic_file_llseek,
};

1197 1198 1199
static ssize_t oom_score_adj_read(struct file *file, char __user *buf,
					size_t count, loff_t *ppos)
{
Al Viro's avatar
Al Viro committed
1200
	struct task_struct *task = get_proc_task(file_inode(file));
1201
	char buffer[PROC_NUMBUF];
1202
	short oom_score_adj = OOM_SCORE_ADJ_MIN;
1203 1204 1205 1206
	size_t len;

	if (!task)
		return -ESRCH;
1207
	oom_score_adj = task->signal->oom_score_adj;
1208
	put_task_struct(task);
1209
	len = snprintf(buffer, sizeof(buffer), "%hd\n", oom_score_adj);
1210 1211 1212 1213 1214 1215 1216
	return simple_read_from_buffer(buf, count, ppos, buffer, len);
}

static ssize_t oom_score_adj_write(struct file *file, const char __user *buf,
					size_t count, loff_t *ppos)
{
	char buffer[PROC_NUMBUF];
1217
	int oom_score_adj;
1218 1219 1220 1221 1222
	int err;

	memset(buffer, 0, sizeof(buffer));
	if (count > sizeof(buffer) - 1)
		count = sizeof(buffer) - 1;
1223 1224 1225 1226
	if (copy_from_user(buffer, buf, count)) {
		err = -EFAULT;
		goto out;
	}
1227

1228
	err = kstrtoint(strstrip(buffer), 0, &oom_score_adj);
1229
	if (err)
1230
		goto out;
1231
	if (oom_score_adj < OOM_SCORE_ADJ_MIN ||
1232 1233 1234 1235
			oom_score_adj > OOM_SCORE_ADJ_MAX) {
		err = -EINVAL;
		goto out;
	}
1236

1237
	err = __set_oom_adj(file, oom_score_adj, false);
1238 1239
out:
	return err < 0 ? err : count;
1240 1241 1242 1243 1244
}

static const struct file_operations proc_oom_score_adj_operations = {
	.read		= oom_score_adj_read,
	.write		= oom_score_adj_write,
1245
	.llseek		= default_llseek,
1246 1247
};

Linus Torvalds's avatar
Linus Torvalds committed
1248
#ifdef CONFIG_AUDITSYSCALL
1249
#define TMPBUFLEN 11
Linus Torvalds's avatar
Linus Torvalds committed
1250 1251 1252
static ssize_t proc_loginuid_read(struct file * file, char __user * buf,
				  size_t count, loff_t *ppos)
{
Al Viro's avatar
Al Viro committed
1253
	struct inode * inode = file_inode(file);
1254
	struct task_struct *task = get_proc_task(inode);
Linus Torvalds's avatar
Linus Torvalds committed
1255 1256 1257
	ssize_t length;
	char tmpbuf[TMPBUFLEN];

1258 1259
	if (!task)
		return -ESRCH;
Linus Torvalds's avatar
Linus Torvalds committed
1260
	length = scnprintf(tmpbuf, TMPBUFLEN, "%u",
1261 1262
			   from_kuid(file->f_cred->user_ns,
				     audit_get_loginuid(task)));
1263
	put_task_struct(task);
Linus Torvalds's avatar
Linus Torvalds committed
1264 1265 1266 1267 1268 1269
	return simple_read_from_buffer(buf, count, ppos, tmpbuf, length);
}

static ssize_t proc_loginuid_write(struct file * file, const char __user * buf,
				   size_t count, loff_t *ppos)
{
Al Viro's avatar
Al Viro committed
1270
	struct inode * inode = file_inode(file);
Linus Torvalds's avatar
Linus Torvalds committed
1271
	uid_t loginuid;
1272
	kuid_t kloginuid;
1273
	int rv;
Linus Torvalds's avatar
Linus Torvalds committed
1274

1275 1276 1277
	rcu_read_lock();
	if (current != pid_task(proc_pid(inode), PIDTYPE_PID)) {
		rcu_read_unlock();
Linus Torvalds's avatar
Linus Torvalds committed
1278
		return -EPERM;
1279 1280
	}
	rcu_read_unlock();
Linus Torvalds's avatar
Linus Torvalds committed
1281 1282 1283 1284 1285 1286

	if (*ppos != 0) {
		/* No partial writes. */
		return -EINVAL;
	}

1287 1288 1289
	rv = kstrtou32_from_user(buf, count, 10, &loginuid);
	if (rv < 0)
		return rv;
1290 1291 1292 1293 1294 1295

	/* is userspace tring to explicitly UNSET the loginuid? */
	if (loginuid == AUDIT_UID_UNSET) {
		kloginuid = INVALID_UID;
	} else {
		kloginuid = make_kuid(file->f_cred->user_ns, loginuid);
1296 1297
		if (!uid_valid(kloginuid))
			return -EINVAL;
1298 1299
	}

1300 1301 1302 1303
	rv = audit_set_loginuid(kloginuid);
	if (rv < 0)
		return rv;
	return count;
Linus Torvalds's avatar
Linus Torvalds committed
1304 1305
}

1306
static const struct file_operations proc_loginuid_operations = {
Linus Torvalds's avatar
Linus Torvalds committed
1307 1308
	.read		= proc_loginuid_read,
	.write		= proc_loginuid_write,
1309
	.llseek		= generic_file_llseek,
Linus Torvalds's avatar
Linus Torvalds committed
1310
};
1311 1312 1313 1314

static ssize_t proc_sessionid_read(struct file * file, char __user * buf,
				  size_t count, loff_t *ppos)
{
Al Viro's avatar
Al Viro committed
1315
	struct inode * inode = file_inode(file);
1316 1317 1318 1319 1320 1321 1322 1323 1324 1325 1326 1327 1328 1329
	struct task_struct *task = get_proc_task(inode);
	ssize_t length;
	char tmpbuf[TMPBUFLEN];

	if (!task)
		return -ESRCH;
	length = scnprintf(tmpbuf, TMPBUFLEN, "%u",
				audit_get_sessionid(task));
	put_task_struct(task);
	return simple_read_from_buffer(buf, count, ppos, tmpbuf, length);
}

static const struct file_operations proc_sessionid_operations = {
	.read		= proc_sessionid_read,
1330
	.llseek		= generic_file_llseek,
1331
};
Linus Torvalds's avatar
Linus Torvalds committed
1332 1333
#endif

1334 1335 1336 1337
#ifdef CONFIG_FAULT_INJECTION
static ssize_t proc_fault_inject_read(struct file * file, char __user * buf,
				      size_t count, loff_t *ppos)
{
Al Viro's avatar
Al Viro committed
1338
	struct task_struct *task = get_proc_task(file_inode(file));
1339 1340 1341 1342 1343 1344 1345 1346 1347 1348
	char buffer[PROC_NUMBUF];
	size_t len;
	int make_it_fail;

	if (!task)
		return -ESRCH;
	make_it_fail = task->make_it_fail;
	put_task_struct(task);

	len = snprintf(buffer, sizeof(buffer), "%i\n", make_it_fail);
1349 1350

	return simple_read_from_buffer(buf, count, ppos, buffer, len);
1351 1352 1353 1354 1355 1356
}

static ssize_t proc_fault_inject_write(struct file * file,
			const char __user * buf, size_t count, loff_t *ppos)
{
	struct task_struct *task;
1357
	char buffer[PROC_NUMBUF];
1358
	int make_it_fail;
1359
	int rv;
1360 1361 1362 1363 1364 1365 1366 1367

	if (!capable(CAP_SYS_RESOURCE))
		return -EPERM;
	memset(buffer, 0, sizeof(buffer));
	if (count > sizeof(buffer) - 1)
		count = sizeof(buffer) - 1;
	if (copy_from_user(buffer, buf, count))
		return -EFAULT;
1368 1369 1370
	rv = kstrtoint(strstrip(buffer), 0, &make_it_fail);
	if (rv < 0)
		return rv;
1371 1372 1373
	if (make_it_fail < 0 || make_it_fail > 1)
		return -EINVAL;

Al Viro's avatar
Al Viro committed
1374
	task = get_proc_task(file_inode(file));
1375 1376 1377 1378
	if (!task)
		return -ESRCH;
	task->make_it_fail = make_it_fail;
	put_task_struct(task);
1379 1380

	return count;
1381 1382
}

1383
static const struct file_operations proc_fault_inject_operations = {
1384 1385
	.read		= proc_fault_inject_read,
	.write		= proc_fault_inject_write,
1386
	.llseek		= generic_file_llseek,
1387 1388 1389
};
#endif

Arjan van de Ven's avatar
Arjan van de Ven committed
1390

1391 1392 1393 1394 1395 1396 1397 1398 1399 1400 1401 1402 1403 1404 1405 1406 1407 1408 1409 1410 1411 1412 1413
#ifdef CONFIG_SCHED_DEBUG
/*
 * Print out various scheduling related per-task fields:
 */
static int sched_show(struct seq_file *m, void *v)
{
	struct inode *inode = m->private;
	struct task_struct *p;

	p = get_proc_task(inode);
	if (!p)
		return -ESRCH;
	proc_sched_show_task(p, m);

	put_task_struct(p);

	return 0;
}

static ssize_t
sched_write(struct file *file, const char __user *buf,
	    size_t count, loff_t *offset)
{
Al Viro's avatar
Al Viro committed
1414
	struct inode *inode = file_inode(file);
1415 1416 1417 1418 1419 1420 1421 1422 1423 1424 1425 1426 1427 1428
	struct task_struct *p;

	p = get_proc_task(inode);
	if (!p)
		return -ESRCH;
	proc_sched_set_task(p);

	put_task_struct(p);

	return count;
}

static int sched_open(struct inode *inode, struct file *filp)
{
1429
	return single_open(filp, sched_show, inode);
1430 1431 1432 1433 1434 1435 1436
}

static const struct file_operations proc_pid_sched_operations = {
	.open		= sched_open,
	.read		= seq_read,
	.write		= sched_write,
	.llseek		= seq_lseek,
1437
	.release	= single_release,
1438 1439 1440 1441
};

#endif

1442 1443 1444 1445 1446 1447 1448 1449 1450 1451 1452 1453 1454 1455 1456 1457 1458 1459 1460 1461 1462 1463 1464
#ifdef CONFIG_SCHED_AUTOGROUP
/*
 * Print out autogroup related information:
 */
static int sched_autogroup_show(struct seq_file *m, void *v)
{
	struct inode *inode = m->private;
	struct task_struct *p;

	p = get_proc_task(inode);
	if (!p)
		return -ESRCH;
	proc_sched_autogroup_show_task(p, m);

	put_task_struct(p);

	return 0;
}

static ssize_t
sched_autogroup_write(struct file *file, const char __user *buf,
	    size_t count, loff_t *offset)
{
Al Viro's avatar
Al Viro committed
1465
	struct inode *inode = file_inode(file);
1466 1467
	struct task_struct *p;
	char buffer[PROC_NUMBUF];
1468
	int nice;
1469 1470 1471 1472 1473 1474 1475 1476
	int err;

	memset(buffer, 0, sizeof(buffer));
	if (count > sizeof(buffer) - 1)
		count = sizeof(buffer) - 1;
	if (copy_from_user(buffer, buf, count))
		return -EFAULT;

1477 1478 1479
	err = kstrtoint(strstrip(buffer), 0, &nice);
	if (err < 0)
		return err;
1480 1481 1482 1483 1484

	p = get_proc_task(inode);
	if (!p)
		return -ESRCH;

1485
	err = proc_sched_autogroup_set_nice(p, nice);
1486 1487 1488 1489 1490 1491 1492 1493 1494 1495 1496 1497 1498 1499 1500 1501 1502 1503 1504 1505 1506 1507 1508 1509 1510 1511 1512 1513 1514 1515 1516
	if (err)
		count = err;

	put_task_struct(p);

	return count;
}

static int sched_autogroup_open(struct inode *inode, struct file *filp)
{
	int ret;

	ret = single_open(filp, sched_autogroup_show, NULL);
	if (!ret) {
		struct seq_file *m = filp->private_data;

		m->private = inode;
	}
	return ret;
}

static const struct file_operations proc_pid_sched_autogroup_operations = {
	.open		= sched_autogroup_open,
	.read		= seq_read,
	.write		= sched_autogroup_write,
	.llseek		= seq_lseek,
	.release	= single_release,
};

#endif /* CONFIG_SCHED_AUTOGROUP */

1517 1518 1519
static ssize_t comm_write(struct file *file, const char __user *buf,
				size_t count, loff_t *offset)
{
Al Viro's avatar
Al Viro committed
1520
	struct inode *inode = file_inode(file);
1521 1522
	struct task_struct *p;
	char buffer[TASK_COMM_LEN];
1523
	const size_t maxlen = sizeof(buffer) - 1;
1524 1525

	memset(buffer, 0, sizeof(buffer));
1526
	if (copy_from_user(buffer, buf, count > maxlen ? maxlen : count))
1527 1528 1529 1530 1531 1532 1533 1534 1535 1536 1537 1538 1539 1540 1541 1542 1543 1544 1545 1546 1547 1548 1549 1550 1551 1552 1553 1554 1555 1556 1557 1558 1559 1560 1561 1562
		return -EFAULT;

	p = get_proc_task(inode);
	if (!p)
		return -ESRCH;

	if (same_thread_group(current, p))
		set_task_comm(p, buffer);
	else
		count = -EINVAL;

	put_task_struct(p);

	return count;
}

static int comm_show(struct seq_file *m, void *v)
{
	struct inode *inode = m->private;
	struct task_struct *p;

	p = get_proc_task(inode);
	if (!p)
		return -ESRCH;

	task_lock(p);
	seq_printf(m, "%s\n", p->comm);
	task_unlock(p);

	put_task_struct(p);

	return 0;
}

static int comm_open(struct inode *inode, struct file *filp)
{
1563
	return single_open(filp, comm_show, inode);
1564 1565 1566 1567 1568 1569 1570 1571 1572 1573
}

static const struct file_operations proc_pid_set_comm_operations = {
	.open		= comm_open,
	.read		= seq_read,
	.write		= comm_write,
	.llseek		= seq_lseek,
	.release	= single_release,
};

1574
static int proc_exe_link(struct dentry *dentry, struct path *exe_path)
Matt Helsley's avatar
Matt Helsley committed
1575 1576 1577 1578
{
	struct task_struct *task;
	struct file *exe_file;

1579
	task = get_proc_task(d_inode(dentry));
Matt Helsley's avatar
Matt Helsley committed
1580 1581
	if (!task)
		return -ENOENT;
1582
	exe_file = get_task_exe_file(task);
Matt Helsley's avatar
Matt Helsley committed
1583 1584 1585 1586 1587 1588 1589 1590 1591 1592
	put_task_struct(task);
	if (exe_file) {
		*exe_path = exe_file->f_path;
		path_get(&exe_file->f_path);
		fput(exe_file);
		return 0;
	} else
		return -ENOENT;
}

1593
static const char *proc_pid_get_link(struct dentry *dentry,
1594 1595
				     struct inode *inode,
				     struct delayed_call *done)
Linus Torvalds's avatar
Linus Torvalds committed
1596
{
1597
	struct path path;
Linus Torvalds's avatar
Linus Torvalds committed
1598 1599
	int error = -EACCES;

1600 1601 1602
	if (!dentry)
		return ERR_PTR(-ECHILD);

1603 1604
	/* Are we allowed to snoop on the tasks file descriptors? */
	if (!proc_fd_access_allowed(inode))
Linus Torvalds's avatar
Linus Torvalds committed
1605 1606
		goto out;

1607 1608 1609 1610
	error = PROC_I(inode)->op.proc_get_link(dentry, &path);
	if (error)
		goto out;

1611
	nd_jump_link(&path);
1612
	return NULL;
Linus Torvalds's avatar
Linus Torvalds committed
1613
out:
1614
	return ERR_PTR(error);
Linus Torvalds's avatar
Linus Torvalds committed
1615 1616
}

1617
static int do_proc_readlink(struct path *path, char __user *buffer, int buflen)
Linus Torvalds's avatar
Linus Torvalds committed
1618
{
1619
	char *tmp = (char*)__get_free_page(GFP_TEMPORARY);
1620
	char *pathname;
Linus Torvalds's avatar
Linus Torvalds committed
1621 1622 1623 1624
	int len;

	if (!tmp)
		return -ENOMEM;
1625

1626
	pathname = d_path(path, tmp, PAGE_SIZE);
1627 1628
	len = PTR_ERR(pathname);
	if (IS_ERR(pathname))
Linus Torvalds's avatar
Linus Torvalds committed
1629
		goto out;
1630
	len = tmp + PAGE_SIZE - 1 - pathname;
Linus Torvalds's avatar
Linus Torvalds committed
1631 1632 1633

	if (len > buflen)
		len = buflen;
1634
	if (copy_to_user(buffer, pathname, len))
Linus Torvalds's avatar
Linus Torvalds committed
1635 1636 1637 1638 1639 1640 1641 1642 1643
		len = -EFAULT;
 out:
	free_page((unsigned long)tmp);
	return len;
}

static int proc_pid_readlink(struct dentry * dentry, char __user * buffer, int buflen)
{
	int error = -EACCES;
1644
	struct inode *inode = d_inode(dentry);
1645
	struct path path;
Linus Torvalds's avatar
Linus Torvalds committed
1646

1647 1648
	/* Are we allowed to snoop on the tasks file descriptors? */
	if (!proc_fd_access_allowed(inode))
Linus Torvalds's avatar
Linus Torvalds committed
1649 1650
		goto out;

1651
	error = PROC_I(inode)->op.proc_get_link(dentry, &path);
Linus Torvalds's avatar
Linus Torvalds committed
1652 1653 1654
	if (error)
		goto out;

1655 1656
	error = do_proc_readlink(&path, buffer, buflen);
	path_put(&path);
Linus Torvalds's avatar
Linus Torvalds committed
1657 1658 1659 1660
out:
	return error;
}

1661
const struct inode_operations proc_pid_link_inode_operations = {
Linus Torvalds's avatar
Linus Torvalds committed
1662
	.readlink	= proc_pid_readlink,
1663
	.get_link	= proc_pid_get_link,
1664
	.setattr	= proc_setattr,
Linus Torvalds's avatar
Linus Torvalds committed
1665 1666
};

1667 1668 1669

/* building an inode */

1670 1671
struct inode *proc_pid_make_inode(struct super_block * sb,
				  struct task_struct *task, umode_t mode)
1672 1673 1674
{
	struct inode * inode;
	struct proc_inode *ei;
1675
	const struct cred *cred;
Linus Torvalds's avatar
Linus Torvalds committed
1676

1677
	/* We need a new inode */
Linus Torvalds's avatar
Linus Torvalds committed
1678

1679 1680 1681 1682 1683 1684
	inode = new_inode(sb);
	if (!inode)
		goto out;

	/* Common stuff */
	ei = PROC_I(inode);
1685
	inode->i_mode = mode;
1686
	inode->i_ino = get_next_ino();
1687
	inode->i_mtime = inode->i_atime = inode->i_ctime = current_time(inode);
1688 1689 1690 1691 1692
	inode->i_op = &proc_def_inode_operations;

	/*
	 * grab the reference to task.
	 */
1693
	ei->pid = get_task_pid(task, PIDTYPE_PID);
1694 1695 1696 1697
	if (!ei->pid)
		goto out_unlock;

	if (task_dumpable(task)) {
1698 1699 1700 1701 1702
		rcu_read_lock();
		cred = __task_cred(task);
		inode->i_uid = cred->euid;
		inode->i_gid = cred->egid;
		rcu_read_unlock();
Linus Torvalds's avatar
Linus Torvalds committed
1703
	}
1704 1705
	security_task_to_inode(task, inode);

Linus Torvalds's avatar
Linus Torvalds committed
1706
out:
1707 1708 1709 1710 1711
	return inode;

out_unlock:
	iput(inode);
	return NULL;
Linus Torvalds's avatar
Linus Torvalds committed
1712 1713
}

1714
int pid_getattr(struct vfsmount *mnt, struct dentry *dentry, struct kstat *stat)
Linus Torvalds's avatar
Linus Torvalds committed
1715
{
1716
	struct inode *inode = d_inode(dentry);
1717
	struct task_struct *task;
1718
	const struct cred *cred;
1719
	struct pid_namespace *pid = dentry->d_sb->s_fs_info;
1720

1721
	generic_fillattr(inode, stat);
Linus Torvalds's avatar
Linus Torvalds committed
1722

1723
	rcu_read_lock();
1724 1725
	stat->uid = GLOBAL_ROOT_UID;
	stat->gid = GLOBAL_ROOT_GID;
1726 1727
	task = pid_task(proc_pid(inode), PIDTYPE_PID);
	if (task) {
1728 1729 1730 1731 1732 1733 1734 1735
		if (!has_pid_permissions(pid, task, 2)) {
			rcu_read_unlock();
			/*
			 * This doesn't prevent learning whether PID exists,
			 * it only makes getattr() consistent with readdir().
			 */
			return -ENOENT;
		}
1736 1737
		if ((inode->i_mode == (S_IFDIR|S_IRUGO|S_IXUGO)) ||
		    task_dumpable(task)) {
1738 1739 1740
			cred = __task_cred(task);
			stat->uid = cred->euid;
			stat->gid = cred->egid;
Linus Torvalds's avatar
Linus Torvalds committed
1741 1742
		}
	}
1743
	rcu_read_unlock();
Alan Cox's avatar
Alan Cox committed
1744
	return 0;
Linus Torvalds's avatar
Linus Torvalds committed
1745 1746 1747 1748 1749 1750 1751 1752 1753 1754 1755
}

/* dentry stuff */

/*
 *	Exceptional case: normally we are not allowed to unhash a busy
 * directory. In this case, however, we can do it - no aliasing problems
 * due to the way we treat inodes.
 *
 * Rewrite the inode's ownerships here because the owning task may have
 * performed a setuid(), etc.
1756 1757 1758 1759 1760 1761 1762
 *
 * Before the /proc/pid/status file was created the only way to read
 * the effective uid of a /process was to stat /proc/pid.  Reading
 * /proc/pid/status is slow enough that procps and other packages
 * kept stating /proc/pid.  To keep the rules in /proc simple I have
 * made this apply to all per process world readable and executable
 * directories.
Linus Torvalds's avatar
Linus Torvalds committed
1763
 */
1764
int pid_revalidate(struct dentry *dentry, unsigned int flags)
Linus Torvalds's avatar
Linus Torvalds committed
1765
{
1766 1767
	struct inode *inode;
	struct task_struct *task;
1768 1769
	const struct cred *cred;

1770
	if (flags & LOOKUP_RCU)
1771 1772
		return -ECHILD;

1773
	inode = d_inode(dentry);
1774 1775
	task = get_proc_task(inode);

1776 1777 1778
	if (task) {
		if ((inode->i_mode == (S_IFDIR|S_IRUGO|S_IXUGO)) ||
		    task_dumpable(task)) {
1779 1780 1781 1782 1783
			rcu_read_lock();
			cred = __task_cred(task);
			inode->i_uid = cred->euid;
			inode->i_gid = cred->egid;
			rcu_read_unlock();
Linus Torvalds's avatar
Linus Torvalds committed
1784
		} else {
1785 1786
			inode->i_uid = GLOBAL_ROOT_UID;
			inode->i_gid = GLOBAL_ROOT_GID;
Linus Torvalds's avatar
Linus Torvalds committed
1787
		}
Linus Torvalds's avatar
Linus Torvalds committed
1788
		inode->i_mode &= ~(S_ISUID | S_ISGID);
Linus Torvalds's avatar
Linus Torvalds committed
1789
		security_task_to_inode(task, inode);
1790
		put_task_struct(task);
Linus Torvalds's avatar
Linus Torvalds committed
1791 1792 1793 1794 1795
		return 1;
	}
	return 0;
}

1796 1797 1798 1799 1800
static inline bool proc_inode_is_dead(struct inode *inode)
{
	return !proc_pid(inode)->tasks[PIDTYPE_PID].first;
}

1801 1802 1803 1804 1805 1806
int pid_delete_dentry(const struct dentry *dentry)
{
	/* Is the task we represent dead?
	 * If so, then don't put the dentry on the lru list,
	 * kill it immediately.
	 */
1807
	return proc_inode_is_dead(d_inode(dentry));
1808 1809
}

1810
const struct dentry_operations pid_dentry_operations =
1811 1812 1813 1814 1815 1816 1817
{
	.d_revalidate	= pid_revalidate,
	.d_delete	= pid_delete_dentry,
};

/* Lookups */

1818 1819 1820 1821 1822 1823 1824 1825 1826 1827 1828 1829
/*
 * Fill a directory entry.
 *
 * If possible create the dcache entry and derive our inode number and
 * file type from dcache entry.
 *
 * Since all of the proc inode numbers are dynamically generated, the inode
 * numbers do not exist until the inode is cache.  This means creating the
 * the dcache entry in readdir is necessary to keep the inode numbers
 * reported by readdir in sync with the inode numbers reported
 * by stat.
 */
Al Viro's avatar
Al Viro committed
1830
bool proc_fill_cache(struct file *file, struct dir_context *ctx,
1831
	const char *name, int len,
1832
	instantiate_t instantiate, struct task_struct *task, const void *ptr)
1833
{
Al Viro's avatar
Al Viro committed
1834
	struct dentry *child, *dir = file->f_path.dentry;
1835
	struct qstr qname = QSTR_INIT(name, len);
1836
	struct inode *inode;
1837 1838
	unsigned type;
	ino_t ino;
1839

1840
	child = d_hash_and_lookup(dir, &qname);
1841
	if (!child) {
1842 1843 1844
		DECLARE_WAIT_QUEUE_HEAD_ONSTACK(wq);
		child = d_alloc_parallel(dir, &qname, &wq);
		if (IS_ERR(child))
1845
			goto end_instantiate;
1846 1847 1848 1849 1850 1851 1852
		if (d_in_lookup(child)) {
			int err = instantiate(d_inode(dir), child, task, ptr);
			d_lookup_done(child);
			if (err < 0) {
				dput(child);
				goto end_instantiate;
			}
1853 1854
		}
	}
1855
	inode = d_inode(child);
1856 1857
	ino = inode->i_ino;
	type = inode->i_mode >> 12;
1858
	dput(child);
Al Viro's avatar
Al Viro committed
1859
	return dir_emit(ctx, name, len, ino, type);
1860 1861 1862

end_instantiate:
	return dir_emit(ctx, name, len, 1, DT_UNKNOWN);
1863 1864
}

1865 1866 1867 1868 1869 1870 1871 1872 1873 1874 1875 1876 1877
/*
 * dname_to_vma_addr - maps a dentry name into two unsigned longs
 * which represent vma start and end addresses.
 */
static int dname_to_vma_addr(struct dentry *dentry,
			     unsigned long *start, unsigned long *end)
{
	if (sscanf(dentry->d_name.name, "%lx-%lx", start, end) != 2)
		return -EINVAL;

	return 0;
}

1878
static int map_files_d_revalidate(struct dentry *dentry, unsigned int flags)
1879 1880 1881 1882 1883 1884 1885 1886 1887
{
	unsigned long vm_start, vm_end;
	bool exact_vma_exists = false;
	struct mm_struct *mm = NULL;
	struct task_struct *task;
	const struct cred *cred;
	struct inode *inode;
	int status = 0;

1888
	if (flags & LOOKUP_RCU)
1889 1890
		return -ECHILD;

1891
	inode = d_inode(dentry);
1892 1893 1894 1895
	task = get_proc_task(inode);
	if (!task)
		goto out_notask;

1896
	mm = mm_access(task, PTRACE_MODE_READ_FSCREDS);
1897
	if (IS_ERR_OR_NULL(mm))
1898 1899 1900 1901 1902 1903 1904 1905 1906 1907 1908 1909 1910 1911 1912 1913 1914 1915
		goto out;

	if (!dname_to_vma_addr(dentry, &vm_start, &vm_end)) {
		down_read(&mm->mmap_sem);
		exact_vma_exists = !!find_exact_vma(mm, vm_start, vm_end);
		up_read(&mm->mmap_sem);
	}

	mmput(mm);

	if (exact_vma_exists) {
		if (task_dumpable(task)) {
			rcu_read_lock();
			cred = __task_cred(task);
			inode->i_uid = cred->euid;
			inode->i_gid = cred->egid;
			rcu_read_unlock();
		} else {
1916 1917
			inode->i_uid = GLOBAL_ROOT_UID;
			inode->i_gid = GLOBAL_ROOT_GID;
1918 1919 1920 1921 1922 1923 1924 1925 1926 1927 1928 1929 1930 1931 1932 1933 1934
		}
		security_task_to_inode(task, inode);
		status = 1;
	}

out:
	put_task_struct(task);

out_notask:
	return status;
}

static const struct dentry_operations tid_map_files_dentry_operations = {
	.d_revalidate	= map_files_d_revalidate,
	.d_delete	= pid_delete_dentry,
};

1935
static int map_files_get_link(struct dentry *dentry, struct path *path)
1936 1937 1938 1939 1940 1941 1942 1943
{
	unsigned long vm_start, vm_end;
	struct vm_area_struct *vma;
	struct task_struct *task;
	struct mm_struct *mm;
	int rc;

	rc = -ENOENT;
1944
	task = get_proc_task(d_inode(dentry));
1945 1946 1947 1948 1949 1950 1951 1952 1953 1954 1955 1956
	if (!task)
		goto out;

	mm = get_task_mm(task);
	put_task_struct(task);
	if (!mm)
		goto out;

	rc = dname_to_vma_addr(dentry, &vm_start, &vm_end);
	if (rc)
		goto out_mmput;

1957
	rc = -ENOENT;
1958 1959 1960 1961 1962 1963 1964 1965 1966 1967 1968 1969 1970 1971 1972 1973
	down_read(&mm->mmap_sem);
	vma = find_exact_vma(mm, vm_start, vm_end);
	if (vma && vma->vm_file) {
		*path = vma->vm_file->f_path;
		path_get(path);
		rc = 0;
	}
	up_read(&mm->mmap_sem);

out_mmput:
	mmput(mm);
out:
	return rc;
}

struct map_files_info {
1974
	fmode_t		mode;
1975
	unsigned int	len;
1976 1977 1978
	unsigned char	name[4*sizeof(long)+2]; /* max: %lx-%lx\0 */
};

1979 1980 1981 1982 1983 1984
/*
 * Only allow CAP_SYS_ADMIN to follow the links, due to concerns about how the
 * symlinks may be used to bypass permissions on ancestor directories in the
 * path to the file in question.
 */
static const char *
1985
proc_map_files_get_link(struct dentry *dentry,
1986 1987
			struct inode *inode,
		        struct delayed_call *done)
1988 1989 1990 1991
{
	if (!capable(CAP_SYS_ADMIN))
		return ERR_PTR(-EPERM);

1992
	return proc_pid_get_link(dentry, inode, done);
1993 1994 1995
}

/*
1996
 * Identical to proc_pid_link_inode_operations except for get_link()
1997 1998 1999
 */
static const struct inode_operations proc_map_files_link_inode_operations = {
	.readlink	= proc_pid_readlink,
2000
	.get_link	= proc_map_files_get_link,
2001 2002 2003
	.setattr	= proc_setattr,
};

2004
static int
2005 2006 2007
proc_map_files_instantiate(struct inode *dir, struct dentry *dentry,
			   struct task_struct *task, const void *ptr)
{
2008
	fmode_t mode = (fmode_t)(unsigned long)ptr;
2009 2010 2011
	struct proc_inode *ei;
	struct inode *inode;

2012 2013 2014
	inode = proc_pid_make_inode(dir->i_sb, task, S_IFLNK |
				    ((mode & FMODE_READ ) ? S_IRUSR : 0) |
				    ((mode & FMODE_WRITE) ? S_IWUSR : 0));
2015
	if (!inode)
2016
		return -ENOENT;
2017 2018

	ei = PROC_I(inode);
2019
	ei->op.proc_get_link = map_files_get_link;
2020

2021
	inode->i_op = &proc_map_files_link_inode_operations;
2022 2023 2024 2025 2026
	inode->i_size = 64;

	d_set_d_op(dentry, &tid_map_files_dentry_operations);
	d_add(dentry, inode);

2027
	return 0;
2028 2029 2030
}

static struct dentry *proc_map_files_lookup(struct inode *dir,
2031
		struct dentry *dentry, unsigned int flags)
2032 2033 2034 2035
{
	unsigned long vm_start, vm_end;
	struct vm_area_struct *vma;
	struct task_struct *task;
2036
	int result;
2037 2038
	struct mm_struct *mm;

2039
	result = -ENOENT;
2040 2041 2042 2043
	task = get_proc_task(dir);
	if (!task)
		goto out;

2044
	result = -EACCES;
2045
	if (!ptrace_may_access(task, PTRACE_MODE_READ_FSCREDS))
2046 2047
		goto out_put_task;

2048
	result = -ENOENT;
2049
	if (dname_to_vma_addr(dentry, &vm_start, &vm_end))
2050
		goto out_put_task;
2051 2052 2053

	mm = get_task_mm(task);
	if (!mm)
2054
		goto out_put_task;
2055 2056 2057 2058 2059 2060

	down_read(&mm->mmap_sem);
	vma = find_exact_vma(mm, vm_start, vm_end);
	if (!vma)
		goto out_no_vma;

2061 2062 2063
	if (vma->vm_file)
		result = proc_map_files_instantiate(dir, dentry, task,
				(void *)(unsigned long)vma->vm_file->f_mode);
2064 2065 2066 2067 2068 2069 2070

out_no_vma:
	up_read(&mm->mmap_sem);
	mmput(mm);
out_put_task:
	put_task_struct(task);
out:
2071
	return ERR_PTR(result);
2072 2073 2074 2075 2076 2077 2078 2079 2080
}

static const struct inode_operations proc_map_files_inode_operations = {
	.lookup		= proc_map_files_lookup,
	.permission	= proc_fd_permission,
	.setattr	= proc_setattr,
};

static int
Al Viro's avatar
Al Viro committed
2081
proc_map_files_readdir(struct file *file, struct dir_context *ctx)
2082 2083 2084 2085
{
	struct vm_area_struct *vma;
	struct task_struct *task;
	struct mm_struct *mm;
Al Viro's avatar
Al Viro committed
2086 2087 2088 2089
	unsigned long nr_files, pos, i;
	struct flex_array *fa = NULL;
	struct map_files_info info;
	struct map_files_info *p;
2090 2091 2092
	int ret;

	ret = -ENOENT;
Al Viro's avatar
Al Viro committed
2093
	task = get_proc_task(file_inode(file));
2094 2095 2096 2097
	if (!task)
		goto out;

	ret = -EACCES;
2098
	if (!ptrace_may_access(task, PTRACE_MODE_READ_FSCREDS))
2099 2100 2101
		goto out_put_task;

	ret = 0;
Al Viro's avatar
Al Viro committed
2102 2103
	if (!dir_emit_dots(file, ctx))
		goto out_put_task;
2104

Al Viro's avatar
Al Viro committed
2105 2106 2107 2108
	mm = get_task_mm(task);
	if (!mm)
		goto out_put_task;
	down_read(&mm->mmap_sem);
2109

Al Viro's avatar
Al Viro committed
2110
	nr_files = 0;
2111

Al Viro's avatar
Al Viro committed
2112 2113 2114 2115 2116 2117 2118 2119 2120
	/*
	 * We need two passes here:
	 *
	 *  1) Collect vmas of mapped files with mmap_sem taken
	 *  2) Release mmap_sem and instantiate entries
	 *
	 * otherwise we get lockdep complained, since filldir()
	 * routine might require mmap_sem taken in might_fault().
	 */
2121

Al Viro's avatar
Al Viro committed
2122 2123 2124 2125 2126 2127 2128 2129 2130 2131 2132 2133 2134 2135 2136 2137
	for (vma = mm->mmap, pos = 2; vma; vma = vma->vm_next) {
		if (vma->vm_file && ++pos > ctx->pos)
			nr_files++;
	}

	if (nr_files) {
		fa = flex_array_alloc(sizeof(info), nr_files,
					GFP_KERNEL);
		if (!fa || flex_array_prealloc(fa, 0, nr_files,
						GFP_KERNEL)) {
			ret = -ENOMEM;
			if (fa)
				flex_array_free(fa);
			up_read(&mm->mmap_sem);
			mmput(mm);
			goto out_put_task;
2138
		}
Al Viro's avatar
Al Viro committed
2139 2140 2141 2142 2143 2144 2145 2146 2147 2148 2149 2150 2151
		for (i = 0, vma = mm->mmap, pos = 2; vma;
				vma = vma->vm_next) {
			if (!vma->vm_file)
				continue;
			if (++pos <= ctx->pos)
				continue;

			info.mode = vma->vm_file->f_mode;
			info.len = snprintf(info.name,
					sizeof(info.name), "%lx-%lx",
					vma->vm_start, vma->vm_end);
			if (flex_array_put(fa, i++, &info, GFP_KERNEL))
				BUG();
2152 2153
		}
	}
Al Viro's avatar
Al Viro committed
2154 2155 2156 2157 2158 2159 2160 2161 2162 2163 2164
	up_read(&mm->mmap_sem);

	for (i = 0; i < nr_files; i++) {
		p = flex_array_get(fa, i);
		if (!proc_fill_cache(file, ctx,
				      p->name, p->len,
				      proc_map_files_instantiate,
				      task,
				      (void *)(unsigned long)p->mode))
			break;
		ctx->pos++;
2165
	}
Al Viro's avatar
Al Viro committed
2166 2167 2168
	if (fa)
		flex_array_free(fa);
	mmput(mm);
2169 2170 2171 2172 2173 2174 2175 2176 2177

out_put_task:
	put_task_struct(task);
out:
	return ret;
}

static const struct file_operations proc_map_files_operations = {
	.read		= generic_read_dir,
2178 2179
	.iterate_shared	= proc_map_files_readdir,
	.llseek		= generic_file_llseek,
2180 2181
};

2182
#ifdef CONFIG_CHECKPOINT_RESTORE
2183 2184 2185 2186
struct timers_private {
	struct pid *pid;
	struct task_struct *task;
	struct sighand_struct *sighand;
2187
	struct pid_namespace *ns;
2188 2189 2190 2191 2192 2193 2194 2195 2196 2197 2198 2199 2200 2201 2202 2203 2204 2205 2206 2207 2208 2209 2210 2211 2212 2213 2214 2215 2216 2217 2218 2219 2220 2221 2222 2223 2224 2225 2226 2227 2228 2229
	unsigned long flags;
};

static void *timers_start(struct seq_file *m, loff_t *pos)
{
	struct timers_private *tp = m->private;

	tp->task = get_pid_task(tp->pid, PIDTYPE_PID);
	if (!tp->task)
		return ERR_PTR(-ESRCH);

	tp->sighand = lock_task_sighand(tp->task, &tp->flags);
	if (!tp->sighand)
		return ERR_PTR(-ESRCH);

	return seq_list_start(&tp->task->signal->posix_timers, *pos);
}

static void *timers_next(struct seq_file *m, void *v, loff_t *pos)
{
	struct timers_private *tp = m->private;
	return seq_list_next(v, &tp->task->signal->posix_timers, pos);
}

static void timers_stop(struct seq_file *m, void *v)
{
	struct timers_private *tp = m->private;

	if (tp->sighand) {
		unlock_task_sighand(tp->task, &tp->flags);
		tp->sighand = NULL;
	}

	if (tp->task) {
		put_task_struct(tp->task);
		tp->task = NULL;
	}
}

static int show_timer(struct seq_file *m, void *v)
{
	struct k_itimer *timer;
2230 2231
	struct timers_private *tp = m->private;
	int notify;
2232
	static const char * const nstr[] = {
2233 2234 2235 2236
		[SIGEV_SIGNAL] = "signal",
		[SIGEV_NONE] = "none",
		[SIGEV_THREAD] = "thread",
	};
2237 2238

	timer = list_entry((struct list_head *)v, struct k_itimer, list);
2239 2240
	notify = timer->it_sigev_notify;

2241
	seq_printf(m, "ID: %d\n", timer->it_id);
2242 2243 2244
	seq_printf(m, "signal: %d/%p\n",
		   timer->sigq->info.si_signo,
		   timer->sigq->info.si_value.sival_ptr);
2245
	seq_printf(m, "notify: %s/%s.%d\n",
2246 2247 2248
		   nstr[notify & ~SIGEV_THREAD_ID],
		   (notify & SIGEV_THREAD_ID) ? "tid" : "pid",
		   pid_nr_ns(timer->it_pid, tp->ns));
2249
	seq_printf(m, "ClockID: %d\n", timer->it_clock);
2250 2251 2252 2253 2254 2255 2256 2257 2258 2259 2260 2261 2262 2263 2264 2265 2266 2267 2268 2269 2270

	return 0;
}

static const struct seq_operations proc_timers_seq_ops = {
	.start	= timers_start,
	.next	= timers_next,
	.stop	= timers_stop,
	.show	= show_timer,
};

static int proc_timers_open(struct inode *inode, struct file *file)
{
	struct timers_private *tp;

	tp = __seq_open_private(file, &proc_timers_seq_ops,
			sizeof(struct timers_private));
	if (!tp)
		return -ENOMEM;

	tp->pid = proc_pid(inode);
2271
	tp->ns = inode->i_sb->s_fs_info;
2272 2273 2274 2275 2276 2277 2278 2279 2280
	return 0;
}

static const struct file_operations proc_timers_operations = {
	.open		= proc_timers_open,
	.read		= seq_read,
	.llseek		= seq_lseek,
	.release	= seq_release_private,
};
2281
#endif
2282

2283 2284 2285 2286 2287 2288 2289 2290 2291 2292 2293 2294 2295 2296 2297 2298
static ssize_t timerslack_ns_write(struct file *file, const char __user *buf,
					size_t count, loff_t *offset)
{
	struct inode *inode = file_inode(file);
	struct task_struct *p;
	u64 slack_ns;
	int err;

	err = kstrtoull_from_user(buf, count, 10, &slack_ns);
	if (err < 0)
		return err;

	p = get_proc_task(inode);
	if (!p)
		return -ESRCH;

2299 2300 2301 2302 2303
	if (p != current) {
		if (!capable(CAP_SYS_NICE)) {
			count = -EPERM;
			goto out;
		}
2304

2305 2306 2307 2308 2309
		err = security_task_setscheduler(p);
		if (err) {
			count = err;
			goto out;
		}
2310 2311
	}

2312 2313 2314 2315 2316 2317 2318 2319
	task_lock(p);
	if (slack_ns == 0)
		p->timer_slack_ns = p->default_timer_slack_ns;
	else
		p->timer_slack_ns = slack_ns;
	task_unlock(p);

out:
2320 2321 2322 2323 2324 2325 2326 2327 2328
	put_task_struct(p);

	return count;
}

static int timerslack_ns_show(struct seq_file *m, void *v)
{
	struct inode *inode = m->private;
	struct task_struct *p;
2329
	int err = 0;
2330 2331 2332 2333 2334

	p = get_proc_task(inode);
	if (!p)
		return -ESRCH;

2335
	if (p != current) {
2336

2337 2338 2339 2340 2341 2342 2343 2344
		if (!capable(CAP_SYS_NICE)) {
			err = -EPERM;
			goto out;
		}
		err = security_task_getscheduler(p);
		if (err)
			goto out;
	}
2345

2346 2347 2348 2349 2350
	task_lock(p);
	seq_printf(m, "%llu\n", p->timer_slack_ns);
	task_unlock(p);

out:
2351 2352 2353 2354 2355 2356 2357 2358 2359 2360 2361 2362 2363 2364 2365 2366 2367 2368
	put_task_struct(p);

	return err;
}

static int timerslack_ns_open(struct inode *inode, struct file *filp)
{
	return single_open(filp, timerslack_ns_show, inode);
}

static const struct file_operations proc_pid_set_timerslack_ns_operations = {
	.open		= timerslack_ns_open,
	.read		= seq_read,
	.write		= timerslack_ns_write,
	.llseek		= seq_lseek,
	.release	= single_release,
};

2369
static int proc_pident_instantiate(struct inode *dir,
2370
	struct dentry *dentry, struct task_struct *task, const void *ptr)
2371
{
2372
	const struct pid_entry *p = ptr;
2373 2374 2375
	struct inode *inode;
	struct proc_inode *ei;

2376
	inode = proc_pid_make_inode(dir->i_sb, task, p->mode);
2377 2378 2379 2380 2381
	if (!inode)
		goto out;

	ei = PROC_I(inode);
	if (S_ISDIR(inode->i_mode))
2382
		set_nlink(inode, 2);	/* Use getattr to fix if necessary */
2383 2384 2385 2386 2387
	if (p->iop)
		inode->i_op = p->iop;
	if (p->fop)
		inode->i_fop = p->fop;
	ei->op = p->op;
2388
	d_set_d_op(dentry, &pid_dentry_operations);
2389 2390
	d_add(dentry, inode);
	/* Close the race of the process dying before we return the dentry */
2391
	if (pid_revalidate(dentry, 0))
2392
		return 0;
2393
out:
2394
	return -ENOENT;
2395 2396
}

Linus Torvalds's avatar
Linus Torvalds committed
2397 2398
static struct dentry *proc_pident_lookup(struct inode *dir, 
					 struct dentry *dentry,
2399
					 const struct pid_entry *ents,
2400
					 unsigned int nents)
Linus Torvalds's avatar
Linus Torvalds committed
2401
{
2402
	int error;
2403
	struct task_struct *task = get_proc_task(dir);
2404
	const struct pid_entry *p, *last;
Linus Torvalds's avatar
Linus Torvalds committed
2405

2406
	error = -ENOENT;
Linus Torvalds's avatar
Linus Torvalds committed
2407

2408 2409
	if (!task)
		goto out_no_task;
Linus Torvalds's avatar
Linus Torvalds committed
2410

2411 2412 2413 2414
	/*
	 * Yes, it does not scale. And it should not. Don't add
	 * new entries into /proc/<tgid>/ without very good reasons.
	 */
2415 2416
	last = &ents[nents];
	for (p = ents; p < last; p++) {
Linus Torvalds's avatar
Linus Torvalds committed
2417 2418 2419 2420 2421
		if (p->len != dentry->d_name.len)
			continue;
		if (!memcmp(dentry->d_name.name, p->name, p->len))
			break;
	}
2422
	if (p >= last)
Linus Torvalds's avatar
Linus Torvalds committed
2423 2424
		goto out;

2425
	error = proc_pident_instantiate(dir, dentry, task, p);
Linus Torvalds's avatar
Linus Torvalds committed
2426
out:
2427 2428
	put_task_struct(task);
out_no_task:
2429
	return ERR_PTR(error);
Linus Torvalds's avatar
Linus Torvalds committed
2430 2431
}

Al Viro's avatar
Al Viro committed
2432
static int proc_pident_readdir(struct file *file, struct dir_context *ctx,
2433
		const struct pid_entry *ents, unsigned int nents)
2434
{
Al Viro's avatar
Al Viro committed
2435 2436
	struct task_struct *task = get_proc_task(file_inode(file));
	const struct pid_entry *p;
2437 2438

	if (!task)
Al Viro's avatar
Al Viro committed
2439
		return -ENOENT;
2440

Al Viro's avatar
Al Viro committed
2441 2442 2443 2444 2445
	if (!dir_emit_dots(file, ctx))
		goto out;

	if (ctx->pos >= nents + 2)
		goto out;
2446

2447
	for (p = ents + (ctx->pos - 2); p < ents + nents; p++) {
Al Viro's avatar
Al Viro committed
2448 2449 2450 2451 2452
		if (!proc_fill_cache(file, ctx, p->name, p->len,
				proc_pident_instantiate, task, p))
			break;
		ctx->pos++;
	}
2453
out:
2454
	put_task_struct(task);
Al Viro's avatar
Al Viro committed
2455
	return 0;
Linus Torvalds's avatar
Linus Torvalds committed
2456 2457
}

2458 2459 2460 2461
#ifdef CONFIG_SECURITY
static ssize_t proc_pid_attr_read(struct file * file, char __user * buf,
				  size_t count, loff_t *ppos)
{
Al Viro's avatar
Al Viro committed
2462
	struct inode * inode = file_inode(file);
2463
	char *p = NULL;
2464 2465 2466 2467
	ssize_t length;
	struct task_struct *task = get_proc_task(inode);

	if (!task)
2468
		return -ESRCH;
2469 2470

	length = security_getprocattr(task,
2471
				      (char*)file->f_path.dentry->d_name.name,
2472
				      &p);
2473
	put_task_struct(task);
2474 2475 2476
	if (length > 0)
		length = simple_read_from_buffer(buf, count, ppos, p, length);
	kfree(p);
2477
	return length;
Linus Torvalds's avatar
Linus Torvalds committed
2478 2479
}

2480 2481 2482
static ssize_t proc_pid_attr_write(struct file * file, const char __user * buf,
				   size_t count, loff_t *ppos)
{
Al Viro's avatar
Al Viro committed
2483
	struct inode * inode = file_inode(file);
2484
	void *page;
2485 2486 2487 2488 2489 2490
	ssize_t length;
	struct task_struct *task = get_proc_task(inode);

	length = -ESRCH;
	if (!task)
		goto out_no_task;
2491 2492 2493 2494 2495 2496

	/* A task may only write its own attributes. */
	length = -EACCES;
	if (current != task)
		goto out;

2497 2498 2499 2500 2501 2502 2503 2504
	if (count > PAGE_SIZE)
		count = PAGE_SIZE;

	/* No partial writes. */
	length = -EINVAL;
	if (*ppos != 0)
		goto out;

2505 2506 2507
	page = memdup_user(buf, count);
	if (IS_ERR(page)) {
		length = PTR_ERR(page);
2508
		goto out;
2509
	}
2510

2511
	/* Guard against adverse ptrace interaction */
2512
	length = mutex_lock_interruptible(&current->signal->cred_guard_mutex);
2513 2514 2515
	if (length < 0)
		goto out_free;

2516
	length = security_setprocattr(file->f_path.dentry->d_name.name,
2517
				      page, count);
2518
	mutex_unlock(&current->signal->cred_guard_mutex);
2519
out_free:
2520
	kfree(page);
2521 2522 2523 2524 2525 2526
out:
	put_task_struct(task);
out_no_task:
	return length;
}

2527
static const struct file_operations proc_pid_attr_operations = {
2528 2529
	.read		= proc_pid_attr_read,
	.write		= proc_pid_attr_write,
2530
	.llseek		= generic_file_llseek,
2531 2532
};

2533
static const struct pid_entry attr_dir_stuff[] = {
Alexey Dobriyan's avatar
Alexey Dobriyan committed
2534 2535 2536 2537 2538 2539
	REG("current",    S_IRUGO|S_IWUGO, proc_pid_attr_operations),
	REG("prev",       S_IRUGO,	   proc_pid_attr_operations),
	REG("exec",       S_IRUGO|S_IWUGO, proc_pid_attr_operations),
	REG("fscreate",   S_IRUGO|S_IWUGO, proc_pid_attr_operations),
	REG("keycreate",  S_IRUGO|S_IWUGO, proc_pid_attr_operations),
	REG("sockcreate", S_IRUGO|S_IWUGO, proc_pid_attr_operations),
2540 2541
};

Al Viro's avatar
Al Viro committed
2542
static int proc_attr_dir_readdir(struct file *file, struct dir_context *ctx)
2543
{
Al Viro's avatar
Al Viro committed
2544 2545
	return proc_pident_readdir(file, ctx, 
				   attr_dir_stuff, ARRAY_SIZE(attr_dir_stuff));
2546 2547
}

2548
static const struct file_operations proc_attr_dir_operations = {
Linus Torvalds's avatar
Linus Torvalds committed
2549
	.read		= generic_read_dir,
2550 2551
	.iterate_shared	= proc_attr_dir_readdir,
	.llseek		= generic_file_llseek,
Linus Torvalds's avatar
Linus Torvalds committed
2552 2553
};

2554
static struct dentry *proc_attr_dir_lookup(struct inode *dir,
2555
				struct dentry *dentry, unsigned int flags)
2556
{
2557 2558
	return proc_pident_lookup(dir, dentry,
				  attr_dir_stuff, ARRAY_SIZE(attr_dir_stuff));
2559 2560
}

2561
static const struct inode_operations proc_attr_dir_inode_operations = {
2562
	.lookup		= proc_attr_dir_lookup,
2563
	.getattr	= pid_getattr,
2564
	.setattr	= proc_setattr,
Linus Torvalds's avatar
Linus Torvalds committed
2565 2566
};

2567 2568
#endif

2569
#ifdef CONFIG_ELF_CORE
2570 2571 2572
static ssize_t proc_coredump_filter_read(struct file *file, char __user *buf,
					 size_t count, loff_t *ppos)
{
Al Viro's avatar
Al Viro committed
2573
	struct task_struct *task = get_proc_task(file_inode(file));
2574 2575 2576 2577 2578 2579 2580 2581 2582 2583 2584 2585 2586 2587 2588 2589 2590 2591 2592 2593 2594 2595 2596 2597 2598 2599 2600 2601 2602 2603 2604 2605 2606 2607 2608
	struct mm_struct *mm;
	char buffer[PROC_NUMBUF];
	size_t len;
	int ret;

	if (!task)
		return -ESRCH;

	ret = 0;
	mm = get_task_mm(task);
	if (mm) {
		len = snprintf(buffer, sizeof(buffer), "%08lx\n",
			       ((mm->flags & MMF_DUMP_FILTER_MASK) >>
				MMF_DUMP_FILTER_SHIFT));
		mmput(mm);
		ret = simple_read_from_buffer(buf, count, ppos, buffer, len);
	}

	put_task_struct(task);

	return ret;
}

static ssize_t proc_coredump_filter_write(struct file *file,
					  const char __user *buf,
					  size_t count,
					  loff_t *ppos)
{
	struct task_struct *task;
	struct mm_struct *mm;
	unsigned int val;
	int ret;
	int i;
	unsigned long mask;

2609 2610 2611
	ret = kstrtouint_from_user(buf, count, 0, &val);
	if (ret < 0)
		return ret;
2612 2613

	ret = -ESRCH;
Al Viro's avatar
Al Viro committed
2614
	task = get_proc_task(file_inode(file));
2615 2616 2617 2618 2619 2620
	if (!task)
		goto out_no_task;

	mm = get_task_mm(task);
	if (!mm)
		goto out_no_mm;
2621
	ret = 0;
2622 2623 2624 2625 2626 2627 2628 2629 2630 2631 2632 2633

	for (i = 0, mask = 1; i < MMF_DUMP_FILTER_BITS; i++, mask <<= 1) {
		if (val & mask)
			set_bit(i + MMF_DUMP_FILTER_SHIFT, &mm->flags);
		else
			clear_bit(i + MMF_DUMP_FILTER_SHIFT, &mm->flags);
	}

	mmput(mm);
 out_no_mm:
	put_task_struct(task);
 out_no_task:
2634 2635 2636
	if (ret < 0)
		return ret;
	return count;
2637 2638 2639 2640 2641
}

static const struct file_operations proc_coredump_filter_operations = {
	.read		= proc_coredump_filter_read,
	.write		= proc_coredump_filter_write,
2642
	.llseek		= generic_file_llseek,
2643 2644 2645
};
#endif

2646
#ifdef CONFIG_TASK_IO_ACCOUNTING
2647
static int do_io_accounting(struct task_struct *task, struct seq_file *m, int whole)
2648
{
2649
	struct task_io_accounting acct = task->ioac;
2650
	unsigned long flags;
2651
	int result;
2652

2653 2654 2655 2656
	result = mutex_lock_killable(&task->signal->cred_guard_mutex);
	if (result)
		return result;

2657
	if (!ptrace_may_access(task, PTRACE_MODE_READ_FSCREDS)) {
2658 2659 2660
		result = -EACCES;
		goto out_unlock;
	}
2661

2662 2663 2664 2665 2666 2667 2668 2669
	if (whole && lock_task_sighand(task, &flags)) {
		struct task_struct *t = task;

		task_io_accounting_add(&acct, &task->signal->ioac);
		while_each_thread(task, t)
			task_io_accounting_add(&acct, &t->ioac);

		unlock_task_sighand(task, &flags);
2670
	}
2671 2672 2673 2674 2675 2676 2677 2678 2679 2680 2681 2682 2683 2684 2685 2686 2687
	seq_printf(m,
		   "rchar: %llu\n"
		   "wchar: %llu\n"
		   "syscr: %llu\n"
		   "syscw: %llu\n"
		   "read_bytes: %llu\n"
		   "write_bytes: %llu\n"
		   "cancelled_write_bytes: %llu\n",
		   (unsigned long long)acct.rchar,
		   (unsigned long long)acct.wchar,
		   (unsigned long long)acct.syscr,
		   (unsigned long long)acct.syscw,
		   (unsigned long long)acct.read_bytes,
		   (unsigned long long)acct.write_bytes,
		   (unsigned long long)acct.cancelled_write_bytes);
	result = 0;

2688 2689 2690
out_unlock:
	mutex_unlock(&task->signal->cred_guard_mutex);
	return result;
2691 2692
}

2693 2694
static int proc_tid_io_accounting(struct seq_file *m, struct pid_namespace *ns,
				  struct pid *pid, struct task_struct *task)
2695
{
2696
	return do_io_accounting(task, m, 0);
2697
}
2698

2699 2700
static int proc_tgid_io_accounting(struct seq_file *m, struct pid_namespace *ns,
				   struct pid *pid, struct task_struct *task)
2701
{
2702
	return do_io_accounting(task, m, 1);
2703 2704
}
#endif /* CONFIG_TASK_IO_ACCOUNTING */
2705

2706 2707
#ifdef CONFIG_USER_NS
static int proc_id_map_open(struct inode *inode, struct file *file,
2708
	const struct seq_operations *seq_ops)
2709 2710 2711 2712 2713 2714 2715 2716 2717 2718 2719 2720 2721 2722 2723 2724 2725 2726 2727 2728 2729 2730 2731 2732 2733 2734 2735 2736 2737 2738 2739 2740 2741 2742 2743 2744 2745 2746 2747 2748 2749 2750 2751 2752 2753 2754 2755 2756
{
	struct user_namespace *ns = NULL;
	struct task_struct *task;
	struct seq_file *seq;
	int ret = -EINVAL;

	task = get_proc_task(inode);
	if (task) {
		rcu_read_lock();
		ns = get_user_ns(task_cred_xxx(task, user_ns));
		rcu_read_unlock();
		put_task_struct(task);
	}
	if (!ns)
		goto err;

	ret = seq_open(file, seq_ops);
	if (ret)
		goto err_put_ns;

	seq = file->private_data;
	seq->private = ns;

	return 0;
err_put_ns:
	put_user_ns(ns);
err:
	return ret;
}

static int proc_id_map_release(struct inode *inode, struct file *file)
{
	struct seq_file *seq = file->private_data;
	struct user_namespace *ns = seq->private;
	put_user_ns(ns);
	return seq_release(inode, file);
}

static int proc_uid_map_open(struct inode *inode, struct file *file)
{
	return proc_id_map_open(inode, file, &proc_uid_seq_operations);
}

static int proc_gid_map_open(struct inode *inode, struct file *file)
{
	return proc_id_map_open(inode, file, &proc_gid_seq_operations);
}

2757 2758 2759 2760 2761
static int proc_projid_map_open(struct inode *inode, struct file *file)
{
	return proc_id_map_open(inode, file, &proc_projid_seq_operations);
}

2762 2763 2764 2765 2766 2767 2768 2769 2770 2771 2772 2773 2774 2775 2776
static const struct file_operations proc_uid_map_operations = {
	.open		= proc_uid_map_open,
	.write		= proc_uid_map_write,
	.read		= seq_read,
	.llseek		= seq_lseek,
	.release	= proc_id_map_release,
};

static const struct file_operations proc_gid_map_operations = {
	.open		= proc_gid_map_open,
	.write		= proc_gid_map_write,
	.read		= seq_read,
	.llseek		= seq_lseek,
	.release	= proc_id_map_release,
};
2777 2778 2779 2780 2781 2782 2783 2784

static const struct file_operations proc_projid_map_operations = {
	.open		= proc_projid_map_open,
	.write		= proc_projid_map_write,
	.read		= seq_read,
	.llseek		= seq_lseek,
	.release	= proc_id_map_release,
};
2785 2786 2787 2788 2789 2790 2791 2792 2793 2794 2795 2796 2797 2798 2799 2800 2801 2802 2803 2804 2805 2806 2807 2808 2809 2810 2811 2812 2813 2814 2815 2816 2817 2818 2819 2820 2821 2822 2823 2824 2825 2826 2827 2828 2829 2830 2831 2832 2833 2834 2835

static int proc_setgroups_open(struct inode *inode, struct file *file)
{
	struct user_namespace *ns = NULL;
	struct task_struct *task;
	int ret;

	ret = -ESRCH;
	task = get_proc_task(inode);
	if (task) {
		rcu_read_lock();
		ns = get_user_ns(task_cred_xxx(task, user_ns));
		rcu_read_unlock();
		put_task_struct(task);
	}
	if (!ns)
		goto err;

	if (file->f_mode & FMODE_WRITE) {
		ret = -EACCES;
		if (!ns_capable(ns, CAP_SYS_ADMIN))
			goto err_put_ns;
	}

	ret = single_open(file, &proc_setgroups_show, ns);
	if (ret)
		goto err_put_ns;

	return 0;
err_put_ns:
	put_user_ns(ns);
err:
	return ret;
}

static int proc_setgroups_release(struct inode *inode, struct file *file)
{
	struct seq_file *seq = file->private_data;
	struct user_namespace *ns = seq->private;
	int ret = single_release(inode, file);
	put_user_ns(ns);
	return ret;
}

static const struct file_operations proc_setgroups_operations = {
	.open		= proc_setgroups_open,
	.write		= proc_setgroups_write,
	.read		= seq_read,
	.llseek		= seq_lseek,
	.release	= proc_setgroups_release,
};
2836 2837
#endif /* CONFIG_USER_NS */

2838 2839 2840
static int proc_pid_personality(struct seq_file *m, struct pid_namespace *ns,
				struct pid *pid, struct task_struct *task)
{
2841 2842 2843 2844 2845 2846
	int err = lock_trace(task);
	if (!err) {
		seq_printf(m, "%08x\n", task->personality);
		unlock_trace(task);
	}
	return err;
2847 2848
}

2849 2850 2851
/*
 * Thread groups
 */
2852
static const struct file_operations proc_task_operations;
2853
static const struct inode_operations proc_task_inode_operations;
2854

2855
static const struct pid_entry tgid_base_stuff[] = {
Alexey Dobriyan's avatar
Alexey Dobriyan committed
2856 2857
	DIR("task",       S_IRUGO|S_IXUGO, proc_task_inode_operations, proc_task_operations),
	DIR("fd",         S_IRUSR|S_IXUSR, proc_fd_inode_operations, proc_fd_operations),
2858
	DIR("map_files",  S_IRUSR|S_IXUSR, proc_map_files_inode_operations, proc_map_files_operations),
Alexey Dobriyan's avatar
Alexey Dobriyan committed
2859
	DIR("fdinfo",     S_IRUSR|S_IXUSR, proc_fdinfo_inode_operations, proc_fdinfo_operations),
2860
	DIR("ns",	  S_IRUSR|S_IXUGO, proc_ns_dir_inode_operations, proc_ns_dir_operations),
2861
#ifdef CONFIG_NET
Alexey Dobriyan's avatar
Alexey Dobriyan committed
2862
	DIR("net",        S_IRUGO|S_IXUGO, proc_net_inode_operations, proc_net_operations),
2863
#endif
Alexey Dobriyan's avatar
Alexey Dobriyan committed
2864
	REG("environ",    S_IRUSR, proc_environ_operations),
2865
	REG("auxv",       S_IRUSR, proc_auxv_operations),
Alexey Dobriyan's avatar
Alexey Dobriyan committed
2866
	ONE("status",     S_IRUGO, proc_pid_status),
2867
	ONE("personality", S_IRUSR, proc_pid_personality),
2868
	ONE("limits",	  S_IRUGO, proc_pid_limits),
2869
#ifdef CONFIG_SCHED_DEBUG
Alexey Dobriyan's avatar
Alexey Dobriyan committed
2870
	REG("sched",      S_IRUGO|S_IWUSR, proc_pid_sched_operations),
2871 2872 2873
#endif
#ifdef CONFIG_SCHED_AUTOGROUP
	REG("autogroup",  S_IRUGO|S_IWUSR, proc_pid_sched_autogroup_operations),
Roland McGrath's avatar
Roland McGrath committed
2874
#endif
2875
	REG("comm",      S_IRUGO|S_IWUSR, proc_pid_set_comm_operations),
Roland McGrath's avatar
Roland McGrath committed
2876
#ifdef CONFIG_HAVE_ARCH_TRACEHOOK
2877
	ONE("syscall",    S_IRUSR, proc_pid_syscall),
2878
#endif
2879
	REG("cmdline",    S_IRUGO, proc_pid_cmdline_ops),
Alexey Dobriyan's avatar
Alexey Dobriyan committed
2880 2881
	ONE("stat",       S_IRUGO, proc_tgid_stat),
	ONE("statm",      S_IRUGO, proc_pid_statm),
2882
	REG("maps",       S_IRUGO, proc_pid_maps_operations),
2883
#ifdef CONFIG_NUMA
2884
	REG("numa_maps",  S_IRUGO, proc_pid_numa_maps_operations),
2885
#endif
Alexey Dobriyan's avatar
Alexey Dobriyan committed
2886 2887 2888 2889 2890 2891 2892
	REG("mem",        S_IRUSR|S_IWUSR, proc_mem_operations),
	LNK("cwd",        proc_cwd_link),
	LNK("root",       proc_root_link),
	LNK("exe",        proc_exe_link),
	REG("mounts",     S_IRUGO, proc_mounts_operations),
	REG("mountinfo",  S_IRUGO, proc_mountinfo_operations),
	REG("mountstats", S_IRUSR, proc_mountstats_operations),
2893
#ifdef CONFIG_PROC_PAGE_MONITOR
Alexey Dobriyan's avatar
Alexey Dobriyan committed
2894
	REG("clear_refs", S_IWUSR, proc_clear_refs_operations),
2895
	REG("smaps",      S_IRUGO, proc_pid_smaps_operations),
2896
	REG("pagemap",    S_IRUSR, proc_pagemap_operations),
2897 2898
#endif
#ifdef CONFIG_SECURITY
Alexey Dobriyan's avatar
Alexey Dobriyan committed
2899
	DIR("attr",       S_IRUGO|S_IXUGO, proc_attr_dir_inode_operations, proc_attr_dir_operations),
2900 2901
#endif
#ifdef CONFIG_KALLSYMS
2902
	ONE("wchan",      S_IRUGO, proc_pid_wchan),
2903
#endif
Ken Chen's avatar
Ken Chen committed
2904
#ifdef CONFIG_STACKTRACE
2905
	ONE("stack",      S_IRUSR, proc_pid_stack),
2906
#endif
2907
#ifdef CONFIG_SCHED_INFO
2908
	ONE("schedstat",  S_IRUGO, proc_pid_schedstat),
2909
#endif
Arjan van de Ven's avatar
Arjan van de Ven committed
2910
#ifdef CONFIG_LATENCYTOP
Alexey Dobriyan's avatar
Alexey Dobriyan committed
2911
	REG("latency",  S_IRUGO, proc_lstats_operations),
Arjan van de Ven's avatar
Arjan van de Ven committed
2912
#endif
2913
#ifdef CONFIG_PROC_PID_CPUSET
2914
	ONE("cpuset",     S_IRUGO, proc_cpuset_show),
2915 2916
#endif
#ifdef CONFIG_CGROUPS
2917
	ONE("cgroup",  S_IRUGO, proc_cgroup_show),
2918
#endif
2919
	ONE("oom_score",  S_IRUGO, proc_oom_score),
2920
	REG("oom_adj",    S_IRUGO|S_IWUSR, proc_oom_adj_operations),
2921
	REG("oom_score_adj", S_IRUGO|S_IWUSR, proc_oom_score_adj_operations),
2922
#ifdef CONFIG_AUDITSYSCALL
Alexey Dobriyan's avatar
Alexey Dobriyan committed
2923 2924
	REG("loginuid",   S_IWUSR|S_IRUGO, proc_loginuid_operations),
	REG("sessionid",  S_IRUGO, proc_sessionid_operations),
2925
#endif
2926
#ifdef CONFIG_FAULT_INJECTION
Alexey Dobriyan's avatar
Alexey Dobriyan committed
2927
	REG("make-it-fail", S_IRUGO|S_IWUSR, proc_fault_inject_operations),
2928
#endif
2929
#ifdef CONFIG_ELF_CORE
Alexey Dobriyan's avatar
Alexey Dobriyan committed
2930
	REG("coredump_filter", S_IRUGO|S_IWUSR, proc_coredump_filter_operations),
2931
#endif
2932
#ifdef CONFIG_TASK_IO_ACCOUNTING
2933
	ONE("io",	S_IRUSR, proc_tgid_io_accounting),
2934
#endif
2935
#ifdef CONFIG_HARDWALL
2936
	ONE("hardwall",   S_IRUGO, proc_pid_hardwall),
2937
#endif
2938 2939 2940
#ifdef CONFIG_USER_NS
	REG("uid_map",    S_IRUGO|S_IWUSR, proc_uid_map_operations),
	REG("gid_map",    S_IRUGO|S_IWUSR, proc_gid_map_operations),
2941
	REG("projid_map", S_IRUGO|S_IWUSR, proc_projid_map_operations),
2942
	REG("setgroups",  S_IRUGO|S_IWUSR, proc_setgroups_operations),
2943
#endif
2944 2945 2946
#ifdef CONFIG_CHECKPOINT_RESTORE
	REG("timers",	  S_IRUGO, proc_timers_operations),
#endif
2947
	REG("timerslack_ns", S_IRUGO|S_IWUGO, proc_pid_set_timerslack_ns_operations),
2948
};
Linus Torvalds's avatar
Linus Torvalds committed
2949

Al Viro's avatar
Al Viro committed
2950
static int proc_tgid_base_readdir(struct file *file, struct dir_context *ctx)
Linus Torvalds's avatar
Linus Torvalds committed
2951
{
Al Viro's avatar
Al Viro committed
2952 2953
	return proc_pident_readdir(file, ctx,
				   tgid_base_stuff, ARRAY_SIZE(tgid_base_stuff));
Linus Torvalds's avatar
Linus Torvalds committed
2954 2955
}

2956
static const struct file_operations proc_tgid_base_operations = {
Linus Torvalds's avatar
Linus Torvalds committed
2957
	.read		= generic_read_dir,
2958 2959
	.iterate_shared	= proc_tgid_base_readdir,
	.llseek		= generic_file_llseek,
Linus Torvalds's avatar
Linus Torvalds committed
2960 2961
};

2962 2963
static struct dentry *proc_tgid_base_lookup(struct inode *dir, struct dentry *dentry, unsigned int flags)
{
2964 2965
	return proc_pident_lookup(dir, dentry,
				  tgid_base_stuff, ARRAY_SIZE(tgid_base_stuff));
Linus Torvalds's avatar
Linus Torvalds committed
2966 2967
}

2968
static const struct inode_operations proc_tgid_base_inode_operations = {
2969
	.lookup		= proc_tgid_base_lookup,
2970
	.getattr	= pid_getattr,
2971
	.setattr	= proc_setattr,
2972
	.permission	= proc_pid_permission,
Linus Torvalds's avatar
Linus Torvalds committed
2973 2974
};

2975
static void proc_flush_task_mnt(struct vfsmount *mnt, pid_t pid, pid_t tgid)
Linus Torvalds's avatar
Linus Torvalds committed
2976
{
2977
	struct dentry *dentry, *leader, *dir;
2978
	char buf[PROC_NUMBUF];
2979 2980 2981
	struct qstr name;

	name.name = buf;
2982
	name.len = snprintf(buf, sizeof(buf), "%d", pid);
2983
	/* no ->d_hash() rejects on procfs */
2984
	dentry = d_hash_and_lookup(mnt->mnt_root, &name);
2985
	if (dentry) {
2986
		d_invalidate(dentry);
2987 2988
		dput(dentry);
	}
Linus Torvalds's avatar
Linus Torvalds committed
2989

2990 2991 2992
	if (pid == tgid)
		return;

2993
	name.name = buf;
2994 2995
	name.len = snprintf(buf, sizeof(buf), "%d", tgid);
	leader = d_hash_and_lookup(mnt->mnt_root, &name);
2996 2997
	if (!leader)
		goto out;
Linus Torvalds's avatar
Linus Torvalds committed
2998

2999 3000 3001 3002 3003 3004 3005
	name.name = "task";
	name.len = strlen(name.name);
	dir = d_hash_and_lookup(leader, &name);
	if (!dir)
		goto out_put_leader;

	name.name = buf;
3006
	name.len = snprintf(buf, sizeof(buf), "%d", pid);
3007 3008
	dentry = d_hash_and_lookup(dir, &name);
	if (dentry) {
3009
		d_invalidate(dentry);
3010
		dput(dentry);
Linus Torvalds's avatar
Linus Torvalds committed
3011
	}
3012 3013 3014 3015 3016 3017

	dput(dir);
out_put_leader:
	dput(leader);
out:
	return;
Linus Torvalds's avatar
Linus Torvalds committed
3018 3019
}

3020 3021 3022 3023 3024
/**
 * proc_flush_task -  Remove dcache entries for @task from the /proc dcache.
 * @task: task that should be flushed.
 *
 * When flushing dentries from proc, one needs to flush them from global
3025
 * proc (proc_mnt) and from all the namespaces' procs this task was seen
3026 3027 3028 3029 3030 3031 3032 3033 3034 3035 3036 3037 3038 3039 3040 3041 3042
 * in. This call is supposed to do all of this job.
 *
 * Looks in the dcache for
 * /proc/@pid
 * /proc/@tgid/task/@pid
 * if either directory is present flushes it and all of it'ts children
 * from the dcache.
 *
 * It is safe and reasonable to cache /proc entries for a task until
 * that task exits.  After that they just clog up the dcache with
 * useless entries, possibly causing useful dcache entries to be
 * flushed instead.  This routine is proved to flush those useless
 * dcache entries at process exit time.
 *
 * NOTE: This routine is just an optimization so it does not guarantee
 *       that no dcache entries will exist at process exit time it
 *       just makes it very unlikely that any will persist.
3043 3044 3045 3046
 */

void proc_flush_task(struct task_struct *task)
{
3047
	int i;
3048
	struct pid *pid, *tgid;
3049 3050 3051
	struct upid *upid;

	pid = task_pid(task);
3052
	tgid = task_tgid(task);
3053

3054
	for (i = 0; i <= pid->level; i++) {
3055 3056
		upid = &pid->numbers[i];
		proc_flush_task_mnt(upid->ns->proc_mnt, upid->nr,
3057
					tgid->numbers[i].nr);
3058
	}
3059 3060
}

3061 3062 3063
static int proc_pid_instantiate(struct inode *dir,
				   struct dentry * dentry,
				   struct task_struct *task, const void *ptr)
3064 3065 3066
{
	struct inode *inode;

3067
	inode = proc_pid_make_inode(dir->i_sb, task, S_IFDIR | S_IRUGO | S_IXUGO);
3068 3069 3070 3071 3072 3073
	if (!inode)
		goto out;

	inode->i_op = &proc_tgid_base_inode_operations;
	inode->i_fop = &proc_tgid_base_operations;
	inode->i_flags|=S_IMMUTABLE;
3074

3075
	set_nlink(inode, nlink_tgid);
3076

3077
	d_set_d_op(dentry, &pid_dentry_operations);
3078 3079 3080

	d_add(dentry, inode);
	/* Close the race of the process dying before we return the dentry */
3081
	if (pid_revalidate(dentry, 0))
3082
		return 0;
3083
out:
3084
	return -ENOENT;
3085 3086
}

3087
struct dentry *proc_pid_lookup(struct inode *dir, struct dentry * dentry, unsigned int flags)
Linus Torvalds's avatar
Linus Torvalds committed
3088
{
3089
	int result = -ENOENT;
Linus Torvalds's avatar
Linus Torvalds committed
3090 3091
	struct task_struct *task;
	unsigned tgid;
3092
	struct pid_namespace *ns;
Linus Torvalds's avatar
Linus Torvalds committed
3093

3094
	tgid = name_to_int(&dentry->d_name);
Linus Torvalds's avatar
Linus Torvalds committed
3095 3096 3097
	if (tgid == ~0U)
		goto out;

3098
	ns = dentry->d_sb->s_fs_info;
3099
	rcu_read_lock();
3100
	task = find_task_by_pid_ns(tgid, ns);
Linus Torvalds's avatar
Linus Torvalds committed
3101 3102
	if (task)
		get_task_struct(task);
3103
	rcu_read_unlock();
Linus Torvalds's avatar
Linus Torvalds committed
3104 3105 3106
	if (!task)
		goto out;

3107
	result = proc_pid_instantiate(dir, dentry, task, NULL);
Linus Torvalds's avatar
Linus Torvalds committed
3108 3109
	put_task_struct(task);
out:
3110
	return ERR_PTR(result);
Linus Torvalds's avatar
Linus Torvalds committed
3111 3112 3113
}

/*
3114
 * Find the first task with tgid >= tgid
3115
 *
Linus Torvalds's avatar
Linus Torvalds committed
3116
 */
3117 3118
struct tgid_iter {
	unsigned int tgid;
3119
	struct task_struct *task;
3120 3121 3122
};
static struct tgid_iter next_tgid(struct pid_namespace *ns, struct tgid_iter iter)
{
3123
	struct pid *pid;
Linus Torvalds's avatar
Linus Torvalds committed
3124

3125 3126
	if (iter.task)
		put_task_struct(iter.task);
3127
	rcu_read_lock();
3128
retry:
3129 3130
	iter.task = NULL;
	pid = find_ge_pid(iter.tgid, ns);
3131
	if (pid) {
3132 3133
		iter.tgid = pid_nr_ns(pid, ns);
		iter.task = pid_task(pid, PIDTYPE_PID);
3134 3135 3136 3137 3138 3139 3140 3141 3142 3143 3144 3145
		/* What we to know is if the pid we have find is the
		 * pid of a thread_group_leader.  Testing for task
		 * being a thread_group_leader is the obvious thing
		 * todo but there is a window when it fails, due to
		 * the pid transfer logic in de_thread.
		 *
		 * So we perform the straight forward test of seeing
		 * if the pid we have found is the pid of a thread
		 * group leader, and don't worry if the task we have
		 * found doesn't happen to be a thread group leader.
		 * As we don't care in the case of readdir.
		 */
3146 3147
		if (!iter.task || !has_group_leader_pid(iter.task)) {
			iter.tgid += 1;
3148
			goto retry;
3149 3150
		}
		get_task_struct(iter.task);
3151
	}
3152
	rcu_read_unlock();
3153
	return iter;
Linus Torvalds's avatar
Linus Torvalds committed
3154 3155
}

3156
#define TGID_OFFSET (FIRST_PROCESS_ENTRY + 2)
3157

Linus Torvalds's avatar
Linus Torvalds committed
3158
/* for the /proc/ directory itself, after non-process stuff has been done */
Al Viro's avatar
Al Viro committed
3159
int proc_pid_readdir(struct file *file, struct dir_context *ctx)
Linus Torvalds's avatar
Linus Torvalds committed
3160
{
3161
	struct tgid_iter iter;
Al Viro's avatar
Al Viro committed
3162
	struct pid_namespace *ns = file_inode(file)->i_sb->s_fs_info;
Al Viro's avatar
Al Viro committed
3163
	loff_t pos = ctx->pos;
Linus Torvalds's avatar
Linus Torvalds committed
3164

3165
	if (pos >= PID_MAX_LIMIT + TGID_OFFSET)
Al Viro's avatar
Al Viro committed
3166
		return 0;
Linus Torvalds's avatar
Linus Torvalds committed
3167

3168
	if (pos == TGID_OFFSET - 2) {
3169
		struct inode *inode = d_inode(ns->proc_self);
3170
		if (!dir_emit(ctx, "self", 4, inode->i_ino, DT_LNK))
Al Viro's avatar
Al Viro committed
3171
			return 0;
3172 3173 3174
		ctx->pos = pos = pos + 1;
	}
	if (pos == TGID_OFFSET - 1) {
3175
		struct inode *inode = d_inode(ns->proc_thread_self);
3176 3177 3178
		if (!dir_emit(ctx, "thread-self", 11, inode->i_ino, DT_LNK))
			return 0;
		ctx->pos = pos = pos + 1;
3179
	}
3180
	iter.tgid = pos - TGID_OFFSET;
3181 3182 3183 3184
	iter.task = NULL;
	for (iter = next_tgid(ns, iter);
	     iter.task;
	     iter.tgid += 1, iter = next_tgid(ns, iter)) {
Al Viro's avatar
Al Viro committed
3185 3186 3187 3188
		char name[PROC_NUMBUF];
		int len;
		if (!has_pid_permissions(ns, iter.task, 2))
			continue;
3189

Al Viro's avatar
Al Viro committed
3190 3191 3192 3193
		len = snprintf(name, sizeof(name), "%d", iter.tgid);
		ctx->pos = iter.tgid + TGID_OFFSET;
		if (!proc_fill_cache(file, ctx, name, len,
				     proc_pid_instantiate, iter.task, NULL)) {
3194
			put_task_struct(iter.task);
Al Viro's avatar
Al Viro committed
3195
			return 0;
Linus Torvalds's avatar
Linus Torvalds committed
3196
		}
3197
	}
Al Viro's avatar
Al Viro committed
3198
	ctx->pos = PID_MAX_LIMIT + TGID_OFFSET;
3199 3200
	return 0;
}
Linus Torvalds's avatar
Linus Torvalds committed
3201

3202 3203 3204 3205 3206 3207 3208 3209 3210 3211 3212 3213 3214 3215 3216 3217 3218 3219 3220 3221 3222 3223 3224 3225 3226 3227 3228 3229 3230 3231 3232 3233 3234 3235 3236 3237 3238 3239
/*
 * proc_tid_comm_permission is a special permission function exclusively
 * used for the node /proc/<pid>/task/<tid>/comm.
 * It bypasses generic permission checks in the case where a task of the same
 * task group attempts to access the node.
 * The rationale behind this is that glibc and bionic access this node for
 * cross thread naming (pthread_set/getname_np(!self)). However, if
 * PR_SET_DUMPABLE gets set to 0 this node among others becomes uid=0 gid=0,
 * which locks out the cross thread naming implementation.
 * This function makes sure that the node is always accessible for members of
 * same thread group.
 */
static int proc_tid_comm_permission(struct inode *inode, int mask)
{
	bool is_same_tgroup;
	struct task_struct *task;

	task = get_proc_task(inode);
	if (!task)
		return -ESRCH;
	is_same_tgroup = same_thread_group(current, task);
	put_task_struct(task);

	if (likely(is_same_tgroup && !(mask & MAY_EXEC))) {
		/* This file (/proc/<pid>/task/<tid>/comm) can always be
		 * read or written by the members of the corresponding
		 * thread group.
		 */
		return 0;
	}

	return generic_permission(inode, mask);
}

static const struct inode_operations proc_tid_comm_inode_operations = {
		.permission = proc_tid_comm_permission,
};

3240 3241 3242
/*
 * Tasks
 */
3243
static const struct pid_entry tid_base_stuff[] = {
Alexey Dobriyan's avatar
Alexey Dobriyan committed
3244
	DIR("fd",        S_IRUSR|S_IXUSR, proc_fd_inode_operations, proc_fd_operations),
Jerome Marchand's avatar
Jerome Marchand committed
3245
	DIR("fdinfo",    S_IRUSR|S_IXUSR, proc_fdinfo_inode_operations, proc_fdinfo_operations),
3246
	DIR("ns",	 S_IRUSR|S_IXUGO, proc_ns_dir_inode_operations, proc_ns_dir_operations),
3247 3248 3249
#ifdef CONFIG_NET
	DIR("net",        S_IRUGO|S_IXUGO, proc_net_inode_operations, proc_net_operations),
#endif
Alexey Dobriyan's avatar
Alexey Dobriyan committed
3250
	REG("environ",   S_IRUSR, proc_environ_operations),
3251
	REG("auxv",      S_IRUSR, proc_auxv_operations),
Alexey Dobriyan's avatar
Alexey Dobriyan committed
3252
	ONE("status",    S_IRUGO, proc_pid_status),
3253
	ONE("personality", S_IRUSR, proc_pid_personality),
3254
	ONE("limits",	 S_IRUGO, proc_pid_limits),
3255
#ifdef CONFIG_SCHED_DEBUG
Alexey Dobriyan's avatar
Alexey Dobriyan committed
3256
	REG("sched",     S_IRUGO|S_IWUSR, proc_pid_sched_operations),
Roland McGrath's avatar
Roland McGrath committed
3257
#endif
3258 3259 3260
	NOD("comm",      S_IFREG|S_IRUGO|S_IWUSR,
			 &proc_tid_comm_inode_operations,
			 &proc_pid_set_comm_operations, {}),
Roland McGrath's avatar
Roland McGrath committed
3261
#ifdef CONFIG_HAVE_ARCH_TRACEHOOK
3262
	ONE("syscall",   S_IRUSR, proc_pid_syscall),
3263
#endif
3264
	REG("cmdline",   S_IRUGO, proc_pid_cmdline_ops),
Alexey Dobriyan's avatar
Alexey Dobriyan committed
3265 3266
	ONE("stat",      S_IRUGO, proc_tid_stat),
	ONE("statm",     S_IRUGO, proc_pid_statm),
3267
	REG("maps",      S_IRUGO, proc_tid_maps_operations),
3268
#ifdef CONFIG_PROC_CHILDREN
3269 3270
	REG("children",  S_IRUGO, proc_tid_children_operations),
#endif
3271
#ifdef CONFIG_NUMA
3272
	REG("numa_maps", S_IRUGO, proc_tid_numa_maps_operations),
3273
#endif
Alexey Dobriyan's avatar
Alexey Dobriyan committed
3274 3275 3276 3277 3278 3279
	REG("mem",       S_IRUSR|S_IWUSR, proc_mem_operations),
	LNK("cwd",       proc_cwd_link),
	LNK("root",      proc_root_link),
	LNK("exe",       proc_exe_link),
	REG("mounts",    S_IRUGO, proc_mounts_operations),
	REG("mountinfo",  S_IRUGO, proc_mountinfo_operations),
3280
#ifdef CONFIG_PROC_PAGE_MONITOR
Alexey Dobriyan's avatar
Alexey Dobriyan committed
3281
	REG("clear_refs", S_IWUSR, proc_clear_refs_operations),
3282
	REG("smaps",     S_IRUGO, proc_tid_smaps_operations),
3283
	REG("pagemap",    S_IRUSR, proc_pagemap_operations),
3284 3285
#endif
#ifdef CONFIG_SECURITY
Alexey Dobriyan's avatar
Alexey Dobriyan committed
3286
	DIR("attr",      S_IRUGO|S_IXUGO, proc_attr_dir_inode_operations, proc_attr_dir_operations),
3287 3288
#endif
#ifdef CONFIG_KALLSYMS
3289
	ONE("wchan",     S_IRUGO, proc_pid_wchan),
3290
#endif
Ken Chen's avatar
Ken Chen committed
3291
#ifdef CONFIG_STACKTRACE
3292
	ONE("stack",      S_IRUSR, proc_pid_stack),
3293
#endif
3294
#ifdef CONFIG_SCHED_INFO
3295
	ONE("schedstat", S_IRUGO, proc_pid_schedstat),
3296
#endif
Arjan van de Ven's avatar
Arjan van de Ven committed
3297
#ifdef CONFIG_LATENCYTOP
Alexey Dobriyan's avatar
Alexey Dobriyan committed
3298
	REG("latency",  S_IRUGO, proc_lstats_operations),
Arjan van de Ven's avatar
Arjan van de Ven committed
3299
#endif
3300
#ifdef CONFIG_PROC_PID_CPUSET
3301
	ONE("cpuset",    S_IRUGO, proc_cpuset_show),
3302 3303
#endif
#ifdef CONFIG_CGROUPS
3304
	ONE("cgroup",  S_IRUGO, proc_cgroup_show),
3305
#endif
3306
	ONE("oom_score", S_IRUGO, proc_oom_score),
3307
	REG("oom_adj",   S_IRUGO|S_IWUSR, proc_oom_adj_operations),
3308
	REG("oom_score_adj", S_IRUGO|S_IWUSR, proc_oom_score_adj_operations),
3309
#ifdef CONFIG_AUDITSYSCALL
Alexey Dobriyan's avatar
Alexey Dobriyan committed
3310
	REG("loginuid",  S_IWUSR|S_IRUGO, proc_loginuid_operations),
3311
	REG("sessionid",  S_IRUGO, proc_sessionid_operations),
3312
#endif
3313
#ifdef CONFIG_FAULT_INJECTION
Alexey Dobriyan's avatar
Alexey Dobriyan committed
3314
	REG("make-it-fail", S_IRUGO|S_IWUSR, proc_fault_inject_operations),
3315
#endif
3316
#ifdef CONFIG_TASK_IO_ACCOUNTING
3317
	ONE("io",	S_IRUSR, proc_tid_io_accounting),
3318
#endif
3319
#ifdef CONFIG_HARDWALL
3320
	ONE("hardwall",   S_IRUGO, proc_pid_hardwall),
3321
#endif
3322 3323 3324
#ifdef CONFIG_USER_NS
	REG("uid_map",    S_IRUGO|S_IWUSR, proc_uid_map_operations),
	REG("gid_map",    S_IRUGO|S_IWUSR, proc_gid_map_operations),
3325
	REG("projid_map", S_IRUGO|S_IWUSR, proc_projid_map_operations),
3326
	REG("setgroups",  S_IRUGO|S_IWUSR, proc_setgroups_operations),
3327
#endif
3328 3329
};

Al Viro's avatar
Al Viro committed
3330
static int proc_tid_base_readdir(struct file *file, struct dir_context *ctx)
3331
{
Al Viro's avatar
Al Viro committed
3332 3333
	return proc_pident_readdir(file, ctx,
				   tid_base_stuff, ARRAY_SIZE(tid_base_stuff));
3334 3335
}

3336 3337
static struct dentry *proc_tid_base_lookup(struct inode *dir, struct dentry *dentry, unsigned int flags)
{
3338 3339
	return proc_pident_lookup(dir, dentry,
				  tid_base_stuff, ARRAY_SIZE(tid_base_stuff));
3340 3341
}

3342
static const struct file_operations proc_tid_base_operations = {
3343
	.read		= generic_read_dir,
3344 3345
	.iterate_shared	= proc_tid_base_readdir,
	.llseek		= generic_file_llseek,
3346 3347
};

3348
static const struct inode_operations proc_tid_base_inode_operations = {
3349 3350 3351 3352 3353
	.lookup		= proc_tid_base_lookup,
	.getattr	= pid_getattr,
	.setattr	= proc_setattr,
};

3354
static int proc_task_instantiate(struct inode *dir,
3355
	struct dentry *dentry, struct task_struct *task, const void *ptr)
3356 3357
{
	struct inode *inode;
3358
	inode = proc_pid_make_inode(dir->i_sb, task, S_IFDIR | S_IRUGO | S_IXUGO);
3359 3360 3361 3362 3363 3364

	if (!inode)
		goto out;
	inode->i_op = &proc_tid_base_inode_operations;
	inode->i_fop = &proc_tid_base_operations;
	inode->i_flags|=S_IMMUTABLE;
3365

3366
	set_nlink(inode, nlink_tid);
3367

3368
	d_set_d_op(dentry, &pid_dentry_operations);
3369 3370 3371

	d_add(dentry, inode);
	/* Close the race of the process dying before we return the dentry */
3372
	if (pid_revalidate(dentry, 0))
3373
		return 0;
3374
out:
3375
	return -ENOENT;
3376 3377
}

3378
static struct dentry *proc_task_lookup(struct inode *dir, struct dentry * dentry, unsigned int flags)
3379
{
3380
	int result = -ENOENT;
3381 3382 3383
	struct task_struct *task;
	struct task_struct *leader = get_proc_task(dir);
	unsigned tid;
3384
	struct pid_namespace *ns;
3385 3386 3387 3388

	if (!leader)
		goto out_no_task;

3389
	tid = name_to_int(&dentry->d_name);
3390 3391 3392
	if (tid == ~0U)
		goto out;

3393
	ns = dentry->d_sb->s_fs_info;
3394
	rcu_read_lock();
3395
	task = find_task_by_pid_ns(tid, ns);
3396 3397 3398 3399 3400
	if (task)
		get_task_struct(task);
	rcu_read_unlock();
	if (!task)
		goto out;
3401
	if (!same_thread_group(leader, task))
3402 3403
		goto out_drop_task;

3404
	result = proc_task_instantiate(dir, dentry, task, NULL);
3405 3406 3407 3408 3409
out_drop_task:
	put_task_struct(task);
out:
	put_task_struct(leader);
out_no_task:
3410
	return ERR_PTR(result);
3411 3412
}

3413 3414 3415 3416 3417 3418 3419 3420 3421 3422 3423 3424
/*
 * Find the first tid of a thread group to return to user space.
 *
 * Usually this is just the thread group leader, but if the users
 * buffer was too small or there was a seek into the middle of the
 * directory we have more work todo.
 *
 * In the case of a short read we start with find_task_by_pid.
 *
 * In the case of a seek we start with the leader and walk nr
 * threads past it.
 */
3425 3426
static struct task_struct *first_tid(struct pid *pid, int tid, loff_t f_pos,
					struct pid_namespace *ns)
3427
{
3428
	struct task_struct *pos, *task;
3429 3430 3431 3432
	unsigned long nr = f_pos;

	if (nr != f_pos)	/* 32bit overflow? */
		return NULL;
Linus Torvalds's avatar
Linus Torvalds committed
3433

3434
	rcu_read_lock();
3435 3436 3437 3438 3439
	task = pid_task(pid, PIDTYPE_PID);
	if (!task)
		goto fail;

	/* Attempt to start with the tid of a thread */
3440
	if (tid && nr) {
3441
		pos = find_task_by_pid_ns(tid, ns);
3442
		if (pos && same_thread_group(pos, task))
3443
			goto found;
3444
	}
Linus Torvalds's avatar
Linus Torvalds committed
3445

3446
	/* If nr exceeds the number of threads there is nothing todo */
3447
	if (nr >= get_nr_threads(task))
3448
		goto fail;
Linus Torvalds's avatar
Linus Torvalds committed
3449

3450 3451
	/* If we haven't found our starting place yet start
	 * with the leader and walk nr threads forward.
3452
	 */
3453
	pos = task = task->group_leader;
3454
	do {
3455
		if (!nr--)
3456
			goto found;
3457
	} while_each_thread(task, pos);
3458 3459 3460
fail:
	pos = NULL;
	goto out;
3461 3462 3463
found:
	get_task_struct(pos);
out:
3464
	rcu_read_unlock();
3465 3466 3467 3468 3469 3470 3471 3472 3473 3474 3475
	return pos;
}

/*
 * Find the next thread in the thread list.
 * Return NULL if there is an error or no next thread.
 *
 * The reference to the input task_struct is released.
 */
static struct task_struct *next_tid(struct task_struct *start)
{
Oleg Nesterov's avatar
Oleg Nesterov committed
3476
	struct task_struct *pos = NULL;
3477
	rcu_read_lock();
Oleg Nesterov's avatar
Oleg Nesterov committed
3478
	if (pid_alive(start)) {
3479
		pos = next_thread(start);
Oleg Nesterov's avatar
Oleg Nesterov committed
3480 3481 3482 3483 3484
		if (thread_group_leader(pos))
			pos = NULL;
		else
			get_task_struct(pos);
	}
3485
	rcu_read_unlock();
3486 3487
	put_task_struct(start);
	return pos;
Linus Torvalds's avatar
Linus Torvalds committed
3488 3489 3490
}

/* for the /proc/TGID/task/ directories */
Al Viro's avatar
Al Viro committed
3491
static int proc_task_readdir(struct file *file, struct dir_context *ctx)
Linus Torvalds's avatar
Linus Torvalds committed
3492
{
3493 3494
	struct inode *inode = file_inode(file);
	struct task_struct *task;
3495
	struct pid_namespace *ns;
Al Viro's avatar
Al Viro committed
3496
	int tid;
Linus Torvalds's avatar
Linus Torvalds committed
3497

3498
	if (proc_inode_is_dead(inode))
Al Viro's avatar
Al Viro committed
3499
		return -ENOENT;
Linus Torvalds's avatar
Linus Torvalds committed
3500

Al Viro's avatar
Al Viro committed
3501
	if (!dir_emit_dots(file, ctx))
3502
		return 0;
Linus Torvalds's avatar
Linus Torvalds committed
3503

3504 3505 3506
	/* f_version caches the tgid value that the last readdir call couldn't
	 * return. lseek aka telldir automagically resets f_version to 0.
	 */
Al Viro's avatar
Al Viro committed
3507
	ns = inode->i_sb->s_fs_info;
Al Viro's avatar
Al Viro committed
3508 3509
	tid = (int)file->f_version;
	file->f_version = 0;
3510
	for (task = first_tid(proc_pid(inode), tid, ctx->pos - 2, ns);
3511
	     task;
Al Viro's avatar
Al Viro committed
3512 3513 3514
	     task = next_tid(task), ctx->pos++) {
		char name[PROC_NUMBUF];
		int len;
3515
		tid = task_pid_nr_ns(task, ns);
Al Viro's avatar
Al Viro committed
3516 3517 3518
		len = snprintf(name, sizeof(name), "%d", tid);
		if (!proc_fill_cache(file, ctx, name, len,
				proc_task_instantiate, task, NULL)) {
3519 3520
			/* returning this tgid failed, save it as the first
			 * pid for the next readir call */
Al Viro's avatar
Al Viro committed
3521
			file->f_version = (u64)tid;
3522
			put_task_struct(task);
Linus Torvalds's avatar
Linus Torvalds committed
3523
			break;
3524
		}
Linus Torvalds's avatar
Linus Torvalds committed
3525
	}
3526

Al Viro's avatar
Al Viro committed
3527
	return 0;
Linus Torvalds's avatar
Linus Torvalds committed
3528
}
3529 3530 3531

static int proc_task_getattr(struct vfsmount *mnt, struct dentry *dentry, struct kstat *stat)
{
3532
	struct inode *inode = d_inode(dentry);
3533
	struct task_struct *p = get_proc_task(inode);
3534 3535
	generic_fillattr(inode, stat);

3536 3537 3538
	if (p) {
		stat->nlink += get_nr_threads(p);
		put_task_struct(p);
3539 3540 3541 3542
	}

	return 0;
}
3543

3544
static const struct inode_operations proc_task_inode_operations = {
3545 3546 3547
	.lookup		= proc_task_lookup,
	.getattr	= proc_task_getattr,
	.setattr	= proc_setattr,
3548
	.permission	= proc_pid_permission,
3549 3550
};

3551
static const struct file_operations proc_task_operations = {
3552
	.read		= generic_read_dir,
3553 3554
	.iterate_shared	= proc_task_readdir,
	.llseek		= generic_file_llseek,
3555
};
3556 3557 3558 3559 3560 3561

void __init set_proc_pid_nlink(void)
{
	nlink_tid = pid_entry_nlink(tid_base_stuff, ARRAY_SIZE(tid_base_stuff));
	nlink_tgid = pid_entry_nlink(tgid_base_stuff, ARRAY_SIZE(tgid_base_stuff));
}