Lines Matching full:task

114  *	in /proc for a task before it execs a suid executable.
174 static int get_task_root(struct task_struct *task, struct path *root) in get_task_root() argument
178 task_lock(task); in get_task_root()
179 if (task->fs) { in get_task_root()
180 get_fs_root(task->fs, root); in get_task_root()
183 task_unlock(task); in get_task_root()
189 struct task_struct *task = get_proc_task(d_inode(dentry)); in proc_cwd_link() local
192 if (task) { in proc_cwd_link()
193 task_lock(task); in proc_cwd_link()
194 if (task->fs) { in proc_cwd_link()
195 get_fs_pwd(task->fs, path); in proc_cwd_link()
198 task_unlock(task); in proc_cwd_link()
199 put_task_struct(task); in proc_cwd_link()
206 struct task_struct *task = get_proc_task(d_inode(dentry)); in proc_root_link() local
209 if (task) { in proc_root_link()
210 result = get_task_root(task, path); in proc_root_link()
211 put_task_struct(task); in proc_root_link()
388 struct pid *pid, struct task_struct *task) in proc_pid_wchan() argument
393 if (!ptrace_may_access(task, PTRACE_MODE_READ_FSCREDS)) in proc_pid_wchan()
396 wchan = get_wchan(task); in proc_pid_wchan()
408 static int lock_trace(struct task_struct *task) in lock_trace() argument
410 int err = down_read_killable(&task->signal->exec_update_lock); in lock_trace()
413 if (!ptrace_may_access(task, PTRACE_MODE_ATTACH_FSCREDS)) { in lock_trace()
414 up_read(&task->signal->exec_update_lock); in lock_trace()
420 static void unlock_trace(struct task_struct *task) in unlock_trace() argument
422 up_read(&task->signal->exec_update_lock); in unlock_trace()
430 struct pid *pid, struct task_struct *task) in proc_pid_stack() argument
436 * The ability to racily run the kernel stack unwinder on a running task in proc_pid_stack()
441 * some work to ensure that the remote task can not be scheduled; and in proc_pid_stack()
454 err = lock_trace(task); in proc_pid_stack()
458 nr_entries = stack_trace_save_tsk(task, entries, in proc_pid_stack()
465 unlock_trace(task); in proc_pid_stack()
478 struct pid *pid, struct task_struct *task) in proc_pid_schedstat() argument
484 (unsigned long long)task->se.sum_exec_runtime, in proc_pid_schedstat()
485 (unsigned long long)task->sched_info.run_delay, in proc_pid_schedstat()
486 task->sched_info.pcount); in proc_pid_schedstat()
497 struct task_struct *task = get_proc_task(inode); in lstats_show_proc() local
499 if (!task) in lstats_show_proc()
503 struct latency_record *lr = &task->latency_record[i]; in lstats_show_proc()
519 put_task_struct(task); in lstats_show_proc()
531 struct task_struct *task = get_proc_task(file_inode(file)); in lstats_write() local
533 if (!task) in lstats_write()
535 clear_tsk_latency_tracing(task); in lstats_write()
536 put_task_struct(task); in lstats_write()
552 struct pid *pid, struct task_struct *task) in proc_oom_score() argument
558 badness = oom_badness(task, totalpages); in proc_oom_score()
598 struct pid *pid, struct task_struct *task) in proc_pid_limits() argument
605 if (!lock_task_sighand(task, &flags)) in proc_pid_limits()
607 memcpy(rlim, task->signal->rlim, sizeof(struct rlimit) * RLIM_NLIMITS); in proc_pid_limits()
608 unlock_task_sighand(task, &flags); in proc_pid_limits()
642 struct pid *pid, struct task_struct *task) in proc_pid_syscall() argument
648 res = lock_trace(task); in proc_pid_syscall()
652 if (task_current_syscall(task, &info)) in proc_pid_syscall()
663 unlock_trace(task); in proc_pid_syscall()
676 struct task_struct *task; in proc_fd_access_allowed() local
678 /* Allow access to a task's file descriptors if it is us or we in proc_fd_access_allowed()
682 task = get_proc_task(inode); in proc_fd_access_allowed()
683 if (task) { in proc_fd_access_allowed()
684 allowed = ptrace_may_access(task, PTRACE_MODE_READ_FSCREDS); in proc_fd_access_allowed()
685 put_task_struct(task); in proc_fd_access_allowed()
708 * May current process learn task's sched/cmdline info (for hide_pid_min=1)
712 struct task_struct *task, in has_pid_permissions() argument
721 return ptrace_may_access(task, PTRACE_MODE_READ_FSCREDS); in has_pid_permissions()
727 return ptrace_may_access(task, PTRACE_MODE_READ_FSCREDS); in has_pid_permissions()
735 struct task_struct *task; in proc_pid_permission() local
738 task = get_proc_task(inode); in proc_pid_permission()
739 if (!task) in proc_pid_permission()
741 has_perms = has_pid_permissions(fs_info, task, HIDEPID_NO_ACCESS); in proc_pid_permission()
742 put_task_struct(task); in proc_pid_permission()
771 struct task_struct *task; in proc_single_show() local
774 task = get_pid_task(pid, PIDTYPE_PID); in proc_single_show()
775 if (!task) in proc_single_show()
778 ret = PROC_I(inode)->op.proc_show(m, ns, pid, task); in proc_single_show()
780 put_task_struct(task); in proc_single_show()
799 struct task_struct *task = get_proc_task(inode); in proc_mem_open() local
802 if (task) { in proc_mem_open()
803 mm = mm_access(task, mode | PTRACE_MODE_FSCREDS); in proc_mem_open()
804 put_task_struct(task); in proc_mem_open()
1042 struct task_struct *task = get_proc_task(file_inode(file)); in oom_adj_read() local
1047 if (!task) in oom_adj_read()
1049 if (task->signal->oom_score_adj == OOM_SCORE_ADJ_MAX) in oom_adj_read()
1052 oom_adj = (task->signal->oom_score_adj * -OOM_DISABLE) / in oom_adj_read()
1054 put_task_struct(task); in oom_adj_read()
1064 struct task_struct *task; in __set_oom_adj() local
1067 task = get_proc_task(file_inode(file)); in __set_oom_adj()
1068 if (!task) in __set_oom_adj()
1073 if (oom_adj < task->signal->oom_score_adj && in __set_oom_adj()
1083 current->comm, task_pid_nr(current), task_pid_nr(task), in __set_oom_adj()
1084 task_pid_nr(task)); in __set_oom_adj()
1086 if ((short)oom_adj < task->signal->oom_score_adj_min && in __set_oom_adj()
1098 if (!task->vfork_done) { in __set_oom_adj()
1099 struct task_struct *p = find_lock_task_mm(task); in __set_oom_adj()
1110 task->signal->oom_score_adj = oom_adj; in __set_oom_adj()
1112 task->signal->oom_score_adj_min = (short)oom_adj; in __set_oom_adj()
1113 trace_oom_score_adj_update(task); in __set_oom_adj()
1120 if (same_thread_group(task, p)) in __set_oom_adj()
1140 put_task_struct(task); in __set_oom_adj()
1200 struct task_struct *task = get_proc_task(file_inode(file)); in oom_score_adj_read() local
1205 if (!task) in oom_score_adj_read()
1207 oom_score_adj = task->signal->oom_score_adj; in oom_score_adj_read()
1208 put_task_struct(task); in oom_score_adj_read()
1253 struct task_struct *task = get_proc_task(inode); in proc_loginuid_read() local
1257 if (!task) in proc_loginuid_read()
1261 audit_get_loginuid(task))); in proc_loginuid_read()
1262 put_task_struct(task); in proc_loginuid_read()
1319 struct task_struct *task = get_proc_task(inode); in proc_sessionid_read() local
1323 if (!task) in proc_sessionid_read()
1326 audit_get_sessionid(task)); in proc_sessionid_read()
1327 put_task_struct(task); in proc_sessionid_read()
1341 struct task_struct *task = get_proc_task(file_inode(file)); in proc_fault_inject_read() local
1346 if (!task) in proc_fault_inject_read()
1348 make_it_fail = task->make_it_fail; in proc_fault_inject_read()
1349 put_task_struct(task); in proc_fault_inject_read()
1359 struct task_struct *task; in proc_fault_inject_write() local
1377 task = get_proc_task(file_inode(file)); in proc_fault_inject_write()
1378 if (!task) in proc_fault_inject_write()
1380 task->make_it_fail = make_it_fail; in proc_fault_inject_write()
1381 put_task_struct(task); in proc_fault_inject_write()
1395 struct task_struct *task; in proc_fail_nth_write() local
1403 task = get_proc_task(file_inode(file)); in proc_fail_nth_write()
1404 if (!task) in proc_fail_nth_write()
1406 task->fail_nth = n; in proc_fail_nth_write()
1407 put_task_struct(task); in proc_fail_nth_write()
1415 struct task_struct *task; in proc_fail_nth_read() local
1419 task = get_proc_task(file_inode(file)); in proc_fail_nth_read()
1420 if (!task) in proc_fail_nth_read()
1422 len = snprintf(numbuf, sizeof(numbuf), "%u\n", task->fail_nth); in proc_fail_nth_read()
1423 put_task_struct(task); in proc_fail_nth_read()
1436 * Print out various scheduling related per-task fields:
1721 struct task_struct *task; in proc_exe_link() local
1724 task = get_proc_task(d_inode(dentry)); in proc_exe_link()
1725 if (!task) in proc_exe_link()
1727 exe_file = get_task_exe_file(task); in proc_exe_link()
1728 put_task_struct(task); in proc_exe_link()
1814 void task_dump_owner(struct task_struct *task, umode_t mode, in task_dump_owner() argument
1818 * proc file for a task. in task_dump_owner()
1824 if (unlikely(task->flags & PF_KTHREAD)) { in task_dump_owner()
1832 cred = __task_cred(task); in task_dump_owner()
1847 task_lock(task); in task_dump_owner()
1848 mm = task->mm; in task_dump_owner()
1866 task_unlock(task); in task_dump_owner()
1884 struct task_struct *task, umode_t mode) in proc_pid_make_inode() argument
1904 * grab the reference to task. in proc_pid_make_inode()
1906 pid = get_task_pid(task, PIDTYPE_PID); in proc_pid_make_inode()
1913 task_dump_owner(task, 0, &inode->i_uid, &inode->i_gid); in proc_pid_make_inode()
1914 security_task_to_inode(task, inode); in proc_pid_make_inode()
1925 * Generating an inode and adding it into @pid->inodes, so that task will
1929 * '/proc/<tgid>/task'. Other entries(eg. fd, stat) under '/proc/<tgid>'
1931 * In theory, dentries under '/proc/<tgid>/task' can also be released by
1934 * '/proc/<tgid>/task/<pid>' dentry before released.
1937 struct task_struct *task, umode_t mode) in proc_pid_make_base_inode() argument
1943 inode = proc_pid_make_inode(sb, task, mode); in proc_pid_make_base_inode()
1962 struct task_struct *task; in pid_getattr() local
1969 task = pid_task(proc_pid(inode), PIDTYPE_PID); in pid_getattr()
1970 if (task) { in pid_getattr()
1971 if (!has_pid_permissions(fs_info, task, HIDEPID_INVISIBLE)) { in pid_getattr()
1979 task_dump_owner(task, inode->i_mode, &stat->uid, &stat->gid); in pid_getattr()
1990 void pid_update_inode(struct task_struct *task, struct inode *inode) in pid_update_inode() argument
1992 task_dump_owner(task, inode->i_mode, &inode->i_uid, &inode->i_gid); in pid_update_inode()
1995 security_task_to_inode(task, inode); in pid_update_inode()
1999 * Rewrite the inode's ownerships here because the owning task may have
2006 struct task_struct *task; in pid_revalidate() local
2013 task = pid_task(proc_pid(inode), PIDTYPE_PID); in pid_revalidate()
2015 if (task) { in pid_revalidate()
2016 pid_update_inode(task, inode); in pid_revalidate()
2031 /* Is the task we represent dead? in pid_delete_dentry()
2060 instantiate_t instantiate, struct task_struct *task, const void *ptr) in proc_fill_cache() argument
2076 res = instantiate(child, task, ptr); in proc_fill_cache()
2141 struct task_struct *task; in map_files_d_revalidate() local
2149 task = get_proc_task(inode); in map_files_d_revalidate()
2150 if (!task) in map_files_d_revalidate()
2153 mm = mm_access(task, PTRACE_MODE_READ_FSCREDS); in map_files_d_revalidate()
2169 task_dump_owner(task, 0, &inode->i_uid, &inode->i_gid); in map_files_d_revalidate()
2171 security_task_to_inode(task, inode); in map_files_d_revalidate()
2176 put_task_struct(task); in map_files_d_revalidate()
2191 struct task_struct *task; in map_files_get_link() local
2196 task = get_proc_task(d_inode(dentry)); in map_files_get_link()
2197 if (!task) in map_files_get_link()
2200 mm = get_task_mm(task); in map_files_get_link()
2201 put_task_struct(task); in map_files_get_link()
2261 struct task_struct *task, const void *ptr) in proc_map_files_instantiate() argument
2267 inode = proc_pid_make_inode(dentry->d_sb, task, S_IFLNK | in proc_map_files_instantiate()
2288 struct task_struct *task; in proc_map_files_lookup() local
2293 task = get_proc_task(dir); in proc_map_files_lookup()
2294 if (!task) in proc_map_files_lookup()
2298 if (!ptrace_may_access(task, PTRACE_MODE_READ_FSCREDS)) in proc_map_files_lookup()
2305 mm = get_task_mm(task); in proc_map_files_lookup()
2319 result = proc_map_files_instantiate(dentry, task, in proc_map_files_lookup()
2327 put_task_struct(task); in proc_map_files_lookup()
2342 struct task_struct *task; in proc_map_files_readdir() local
2353 task = get_proc_task(file_inode(file)); in proc_map_files_readdir()
2354 if (!task) in proc_map_files_readdir()
2358 if (!ptrace_may_access(task, PTRACE_MODE_READ_FSCREDS)) in proc_map_files_readdir()
2365 mm = get_task_mm(task); in proc_map_files_readdir()
2419 task, in proc_map_files_readdir()
2426 put_task_struct(task); in proc_map_files_readdir()
2441 struct task_struct *task; member
2451 tp->task = get_pid_task(tp->pid, PIDTYPE_PID); in timers_start()
2452 if (!tp->task) in timers_start()
2455 tp->sighand = lock_task_sighand(tp->task, &tp->flags); in timers_start()
2459 return seq_list_start(&tp->task->signal->posix_timers, *pos); in timers_start()
2465 return seq_list_next(v, &tp->task->signal->posix_timers, pos); in timers_next()
2473 unlock_task_sighand(tp->task, &tp->flags); in timers_stop()
2477 if (tp->task) { in timers_stop()
2478 put_task_struct(tp->task); in timers_stop()
2479 tp->task = NULL; in timers_stop()
2632 struct task_struct *task, const void *ptr) in proc_pident_instantiate() argument
2638 inode = proc_pid_make_inode(dentry->d_sb, task, p->mode); in proc_pident_instantiate()
2650 pid_update_inode(task, inode); in proc_pident_instantiate()
2660 struct task_struct *task = get_proc_task(dir); in proc_pident_lookup() local
2663 if (!task) in proc_pident_lookup()
2674 res = proc_pident_instantiate(dentry, task, p); in proc_pident_lookup()
2678 put_task_struct(task); in proc_pident_lookup()
2686 struct task_struct *task = get_proc_task(file_inode(file)); in proc_pident_readdir() local
2689 if (!task) in proc_pident_readdir()
2700 proc_pident_instantiate, task, p)) in proc_pident_readdir()
2705 put_task_struct(task); in proc_pident_readdir()
2723 struct task_struct *task = get_proc_task(inode); in proc_pid_attr_read() local
2725 if (!task) in proc_pid_attr_read()
2728 length = security_getprocattr(task, PROC_I(inode)->op.lsmid, in proc_pid_attr_read()
2731 put_task_struct(task); in proc_pid_attr_read()
2742 struct task_struct *task; in proc_pid_attr_write() local
2746 /* A task may only write when it was the opener. */ in proc_pid_attr_write()
2751 task = pid_task(proc_pid(inode), PIDTYPE_PID); in proc_pid_attr_write()
2752 if (!task) { in proc_pid_attr_write()
2756 /* A task may only write its own attributes. */ in proc_pid_attr_write()
2757 if (current != task) { in proc_pid_attr_write()
2898 struct task_struct *task = get_proc_task(file_inode(file)); in proc_coredump_filter_read() local
2904 if (!task) in proc_coredump_filter_read()
2908 mm = get_task_mm(task); in proc_coredump_filter_read()
2917 put_task_struct(task); in proc_coredump_filter_read()
2927 struct task_struct *task; in proc_coredump_filter_write() local
2939 task = get_proc_task(file_inode(file)); in proc_coredump_filter_write()
2940 if (!task) in proc_coredump_filter_write()
2943 mm = get_task_mm(task); in proc_coredump_filter_write()
2957 put_task_struct(task); in proc_coredump_filter_write()
2972 static int do_io_accounting(struct task_struct *task, struct seq_file *m, int whole) in do_io_accounting() argument
2977 result = down_read_killable(&task->signal->exec_update_lock); in do_io_accounting()
2981 if (!ptrace_may_access(task, PTRACE_MODE_READ_FSCREDS)) { in do_io_accounting()
2987 struct signal_struct *sig = task->signal; in do_io_accounting()
3005 acct = task->ioac; in do_io_accounting()
3026 up_read(&task->signal->exec_update_lock); in do_io_accounting()
3031 struct pid *pid, struct task_struct *task) in proc_tid_io_accounting() argument
3033 return do_io_accounting(task, m, 0); in proc_tid_io_accounting()
3037 struct pid *pid, struct task_struct *task) in proc_tgid_io_accounting() argument
3039 return do_io_accounting(task, m, 1); in proc_tgid_io_accounting()
3048 struct task_struct *task; in proc_id_map_open() local
3052 task = get_proc_task(inode); in proc_id_map_open()
3053 if (task) { in proc_id_map_open()
3055 ns = get_user_ns(task_cred_xxx(task, user_ns)); in proc_id_map_open()
3057 put_task_struct(task); in proc_id_map_open()
3126 struct task_struct *task; in proc_setgroups_open() local
3130 task = get_proc_task(inode); in proc_setgroups_open()
3131 if (task) { in proc_setgroups_open()
3133 ns = get_user_ns(task_cred_xxx(task, user_ns)); in proc_setgroups_open()
3135 put_task_struct(task); in proc_setgroups_open()
3176 struct pid *pid, struct task_struct *task) in proc_pid_personality() argument
3178 int err = lock_trace(task); in proc_pid_personality()
3180 seq_printf(m, "%08x\n", task->personality); in proc_pid_personality()
3181 unlock_trace(task); in proc_pid_personality()
3188 struct pid *pid, struct task_struct *task) in proc_pid_patch_state() argument
3190 seq_printf(m, "%d\n", task->patch_state); in proc_pid_patch_state()
3197 struct pid *pid, struct task_struct *task) in proc_pid_ksm_merging_pages() argument
3201 mm = get_task_mm(task); in proc_pid_ksm_merging_pages()
3210 struct pid *pid, struct task_struct *task) in proc_pid_ksm_stat() argument
3214 mm = get_task_mm(task); in proc_pid_ksm_stat()
3229 struct pid *pid, struct task_struct *task) in proc_stack_depth() argument
3232 (task->prev_lowest_stack & (THREAD_SIZE - 1)); in proc_stack_depth()
3234 (task->lowest_stack & (THREAD_SIZE - 1)); in proc_stack_depth()
3249 DIR("task", S_IRUGO|S_IXUGO, proc_task_inode_operations, proc_task_operations),
3406 * It is safe and reasonable to cache /proc entries for a task until
3407 * that task exits. After that they just clog up the dcache with
3423 struct task_struct *task, const void *ptr) in proc_pid_instantiate() argument
3427 inode = proc_pid_make_base_inode(dentry->d_sb, task, in proc_pid_instantiate()
3437 pid_update_inode(task, inode); in proc_pid_instantiate()
3445 struct task_struct *task; in proc_pid_lookup() local
3458 task = find_task_by_pid_ns(tgid, ns); in proc_pid_lookup()
3459 if (task) in proc_pid_lookup()
3460 get_task_struct(task); in proc_pid_lookup()
3462 if (!task) in proc_pid_lookup()
3467 if (!has_pid_permissions(fs_info, task, HIDEPID_NO_ACCESS)) in proc_pid_lookup()
3471 result = proc_pid_instantiate(dentry, task, NULL); in proc_pid_lookup()
3473 put_task_struct(task); in proc_pid_lookup()
3479 * Find the first task with tgid >= tgid
3484 struct task_struct *task; member
3490 if (iter.task) in next_tgid()
3491 put_task_struct(iter.task); in next_tgid()
3494 iter.task = NULL; in next_tgid()
3498 iter.task = pid_task(pid, PIDTYPE_TGID); in next_tgid()
3499 if (!iter.task) { in next_tgid()
3503 get_task_struct(iter.task); in next_tgid()
3535 iter.task = NULL; in proc_pid_readdir()
3537 iter.task; in proc_pid_readdir()
3543 if (!has_pid_permissions(fs_info, iter.task, HIDEPID_INVISIBLE)) in proc_pid_readdir()
3549 proc_pid_instantiate, iter.task, NULL)) { in proc_pid_readdir()
3550 put_task_struct(iter.task); in proc_pid_readdir()
3560 * used for the node /proc/<pid>/task/<tid>/comm.
3561 * It bypasses generic permission checks in the case where a task of the same
3562 * task group attempts to access the node.
3574 struct task_struct *task; in proc_tid_comm_permission() local
3576 task = get_proc_task(inode); in proc_tid_comm_permission()
3577 if (!task) in proc_tid_comm_permission()
3579 is_same_tgroup = same_thread_group(current, task); in proc_tid_comm_permission()
3580 put_task_struct(task); in proc_tid_comm_permission()
3583 /* This file (/proc/<pid>/task/<tid>/comm) can always be in proc_tid_comm_permission()
3729 struct task_struct *task, const void *ptr) in proc_task_instantiate() argument
3732 inode = proc_pid_make_base_inode(dentry->d_sb, task, in proc_task_instantiate()
3742 pid_update_inode(task, inode); in proc_task_instantiate()
3750 struct task_struct *task; in proc_task_lookup() local
3767 task = find_task_by_pid_ns(tid, ns); in proc_task_lookup()
3768 if (task) in proc_task_lookup()
3769 get_task_struct(task); in proc_task_lookup()
3771 if (!task) in proc_task_lookup()
3773 if (!same_thread_group(leader, task)) in proc_task_lookup()
3776 result = proc_task_instantiate(dentry, task, NULL); in proc_task_lookup()
3778 put_task_struct(task); in proc_task_lookup()
3800 struct task_struct *pos, *task; in first_tid() local
3807 task = pid_task(pid, PIDTYPE_PID); in first_tid()
3808 if (!task) in first_tid()
3814 if (pos && same_thread_group(pos, task)) in first_tid()
3819 if (nr >= get_nr_threads(task)) in first_tid()
3825 for_each_thread(task, pos) { in first_tid()
3859 /* for the /proc/TGID/task/ directories */
3863 struct task_struct *task; in proc_task_readdir() local
3879 for (task = first_tid(proc_pid(inode), tid, ctx->pos - 2, ns); in proc_task_readdir()
3880 task; in proc_task_readdir()
3881 task = next_tid(task), ctx->pos++) { in proc_task_readdir()
3885 tid = task_pid_nr_ns(task, ns); in proc_task_readdir()
3887 continue; /* The task has just exited. */ in proc_task_readdir()
3890 proc_task_instantiate, task, NULL)) { in proc_task_readdir()
3894 put_task_struct(task); in proc_task_readdir()