Commit Graph

744 Commits

Author SHA1 Message Date
Michael Kerrisk ebbbcd36d6 proc.5: srcfix: remove doubled .IP line
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2018-10-26 20:25:53 +02:00
Michael Kerrisk f0d6cc5ff2 proc.5: NOTES: improve text that suggests use of "tr '\000' '\n'"
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2018-10-26 20:25:53 +02:00
Michael Kerrisk 295fe9e0aa proc.5: Minor wording fix
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2018-10-26 20:25:53 +02:00
Michael Kerrisk 91433f3e5f proc.5: Remove bogus suggestion to use cat(1) to read files containing '\0'
Reported-by: Jakub Wilk <jwilk@jwilk.net>
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2018-10-26 20:25:53 +02:00
Michael Kerrisk d1081b23e1 proc.5: Use 'tr '\000' '\n' to display contents of /proc/PID/environ
This is in effect a revert of
commit 1391278030

Reported-by: Alexander E. Patrakov <patrakov@gmail.com>
Reported-by: Jakub Wilk <jwilk@jwilk.net>
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2018-10-26 20:25:53 +02:00
Michael Kerrisk 9b7956cfd8 proc.5: tfix
Reported-by: Jakub Wilk <jwilk@jwilk.net>
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2018-10-26 19:41:47 +02:00
Jakub Wilk cb5a67a477 proc.5: tfix
Remove duplicated word.

Signed-off-by: Jakub Wilk <jwilk@jwilk.net>
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2018-08-20 14:45:21 +02:00
Lucas Werkmeister a6425049fa proc.5: ffix
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2018-08-19 21:33:55 +02:00
Michael Kerrisk 1cdbc3a60c proc.5: Reword /proc/PID/fdinfo timerfd field descriptions as a hanging list
And a few other minor tweaks to the text.

Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2018-08-18 10:03:45 +02:00
Michael Kerrisk 734ec506eb proc.5: Add a few details on /rpoc/PID/fdinfo timerfd
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2018-08-18 09:57:47 +02:00
Michael Kerrisk cd595f623f proc.5: Minor tweaks to Lukas Wermeister's patch
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2018-08-18 09:52:05 +02:00
Lucas Werkmeister 340a16a6ba proc.5: Document fdinfo format for timerfd
Extended information for timerfd file descriptors in
/proc/[pid]/fdinfo was added in commit af9c4957cf21 ("timerfd:
Implement show_fdinfo method", 2014-07-16), to support
checkpoint/restore for such file descriptors (see also the
TFD_IOC_SET_TICKS ioctl which is documented in timerfd_create.2).

Signed-off-by: Lucas Werkmeister <mail@lucaswerkmeister.de>
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2018-08-18 09:47:48 +02:00
Michael Kerrisk d512e7b49a proc.5: srcfix: rewrap source lines
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2018-08-13 16:51:30 +02:00
Elvira Khabirova b654747951 proc.5: Describe ambiguities in /proc/<pid>/maps
Pathname escaping is not done properly in /proc/<pid>/maps;
because of this, different pathnames may appear the same
(verified by experiment and reading the source code).

Further details from Elvira about the relevant location in
the kernel code:

    show_map_vma() from fs/proc/task_mmu.c uses seq_file_path()
    from fs/seq_file.c to print the dentry name, which in turn
    calls seq_path() from the same file.  seq_path() uses
    d_path() from fs/d_path.c to get the path name; this is
    where the " (deleted)" part comes from. This is followed by
    mangling the string with mangle_path() (fs/seq_file.c); this
    function only replaces those characters that were supplied
    in the "esc" argument and does not bother with escaping
    anything else ('\\', for example).  The value of this
    argument comes without modifications from the initial call
    of seq_file_path() by show_map_vma(), and that is "\n".

Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2018-08-13 16:46:07 +02:00
Michael Kerrisk d1fa8ae9ff proc.5: tfix
Reported-by: Stan Schwertly <stan@schwertly.com>
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2018-08-09 08:26:29 +02:00
Nikola Forró bf8fc2759b proc.5: Document /proc/[pid]/status Speculation_Store_Bypass field
Signed-off-by: Nikola Forró <nforro@redhat.com>
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2018-08-04 10:19:30 +02:00
Michael Kerrisk b84a64f4c8 proc.5: ffix
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2018-08-04 09:23:36 +02:00
Keno Fischer 0aae409212 proc.5: Correct description of NStgid
The left-most pid namespace in a given procfs' `NStgid` does not
change based on the pid namespace of the reading process. Rather,
each procfs has an associated outer-most namespace, which gets
set when the procfs is mounted:

```
static struct dentry *proc_mount(struct file_system_type *fs_type,
	int flags, const char *dev_name, void *data)
{
	struct pid_namespace *ns;

	if (flags & MS_KERNMOUNT) {
		ns = data;
		data = NULL;
	} else {
		ns = task_active_pid_ns(current);
	}

	return mount_ns(fs_type, flags, data, ns, ns->user_ns, proc_fill_super);
}
```

i.e. either the root namespace for kernel mounts or the namespace
of the mounting process. This ns then gets saved in the fs' super
block and is the basis for most operations. It is this ns that the
left-most value of `NStgid` is relative to, not the reading process.

Reported-by: Robert O'Callahan <robert@ocallahan.org>
Signed-off-by: Keno Fischer <keno@juliacomputing.com>
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2018-08-04 09:15:56 +02:00
Michael Kerrisk 8c420ed87d proc.5: Explain how to determine top-most mount in /proc/PID/mountinfo
Explain how to determine the top-most mount at a particular
location by inspecting /proc/PID/mountinfo.

Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2018-07-19 00:13:47 +02:00
Michael Kerrisk ae636827e6 proc.5: Fix description of /proc/PID/* ownership to account for user namespaces
Starting in Linux 4.11, if the process dumpable attribute is
not 1 and the process resides in a noninitial namespaces that
has valid mappings for UID 0 and GID 0, then the ownership of
/proc/PID/* is made the same as the root IDs of the namespace.

Determined by inspection of fs/proc/base.c
See also the following kernel commit:

    commit 68eb94f16227336a5773b83ecfa8290f1d6b78ce
    Author: Eric W. Biederman <ebiederm@xmission.com>
    Date:   Tue Jan 3 10:23:11 2017 +1300

Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2018-07-05 18:38:14 +02:00
Michael Kerrisk e96ad1fd45 proc.5: Minor rewording
In preparation for next change

Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2018-07-05 18:38:14 +02:00
Michael Kerrisk eada5570b0 proc.5: Setting dumpable to 1 reverts ownership of /proc/PID/* to effective IDs
The statement that resetting the dumpable attribute of a process
to 1 causes the ownership of files to revert the process's real
IDs looked suspect. And indeed it is at odds with the code in
fs/proc/base.c::task_dump_owner() (Linux 4.16 sources).
Further verified with a quick test that resetting dumpable to 1
causes the ownership of /proc/PID/* files to revert to the
process's effective IDs. Mea culpa for the original mistake.

Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2018-07-05 18:37:54 +02:00
Michael Kerrisk fb49322d22 proc.5: Minor rewording
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2018-07-05 11:35:48 +02:00
Michael Kerrisk 590ba7e5d0 open_by_handle_at.2, ctermid.3, getcwd.3, proc.5: Wording fix: prefer "pathname" over "path" 2018-06-26 06:47:26 +02:00
Lucas Werkmeister f8bfb68e68 proc.5: tfix
mlock() is a system call and documented in section 2, not 3.

Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2018-06-10 13:38:51 +02:00
Michael Kerrisk 6f75225113 proc.5: Mention choom(1) in discussion of /proc/[pid]/oom_score_adj
This command was added to util-linux on 16 April 2019.

Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2018-05-01 11:07:11 +02:00
Michael Kerrisk 29c0586f51 bpf.2, sched_setattr.2, crypt.3, elf.5, proc.5, fanotify.7, feature_test_macros.7, sched.7: spfix
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2018-04-27 14:48:33 +02:00
Jakub Wilk 1dbe854bc5 proc.5: tfix
Remove duplicated word.

Signed-off-by: Jakub Wilk <jwilk@jwilk.net>
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2017-11-22 17:40:58 +01:00
Michael Kerrisk 979a439b41 proc.5: wfix
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2017-11-20 14:37:12 +01:00
Michael Kerrisk 2927055043 proc.5: Rework the description of /proc/PID/mountinfo parent-ID field
After comments from Miklos, and further digging in the kernel
source that showed that chroot() can also result in "hidden"
parent-IDs in mountinfo, I've revised the description of
mountinfo.

In fs/proc_namespace.cs::how_mountinfo() there is:

        /* mountpoints outside of chroot jail will give SEQ_SKIP on this */
        err = seq_path_root(m, &mnt_path, &p->root, " \t\n\\");
        if (err)
                goto out;

I instrumented the 'if (err)' code path with printk()
to show that there is indeed a record corresponding to the
parent-ID for the process root that is being skipped.

Reported-by: Miklos Szeredi <mszeredi@redhat.com>
Reviewed-by: Miklos Szeredi <mszeredi@redhat.com>
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2017-11-20 10:37:33 +01:00
Michael Kerrisk 35cf1b9397 proc.5: Correct the description of the parent mount ID for /proc/PID/mountinfo
I do not have an exact handle on the details, but I can see
roughly what is going on.  Internally, there seems to be one
("hidden") mount ID reserved to each mount namespace, and that ID
is the parent of the root mount point.

Looking through the (4.14) kernel source, mount IDs are allocated
by a kernel function called mnt_alloc_id() (in fs/namespace.c),
which is in turn called by alloc_vfsmnt() which is in turn called
by clone_mnt().

A new mount namespace is created by the kernel function
copy_mnt_ns() (in fs/namespace.c, called by
create_new_namespaces() in kernel/nsproxy.c). The copy_mnt_ns()
function calls copy_tree() (in fs/namespace.c), and copy_tree()
calls clone_mnt() in *two* places.  The first of these is the call
that creates the "hidden" mount ID that becomes the parent of the
root mount point. (I verified this by instrumenting the kernel
with a few printk() calls to display the IDs.)  The second place
where copy_tree() calls clone_mnt() is in a loop that replicates
each of the mount points (including the root mount point) in the
source mount namespace.

Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2017-11-20 10:13:00 +01:00
Michael Kerrisk 9b0e3937a9 proc.5: tfix
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2017-11-19 20:27:37 +01:00
Marcus Folkesson 5753354a3a proc.5: Update description of /proc/<pid>/oom_score
After Linux 2.6.36, the heuristic calculation of oom_score
has changed to only consider used memory and CAP_SYS_ADMIN.

See kernel commit a63d83f427fbce97a6cea0db2e64b0eb8435cd10.

Signed-off-by: Marcus Folkesson <marcus.folkesson@gmail.com>
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2017-11-19 19:52:55 +01:00
Michael Kerrisk 52f842a571 proc.5: srcfix
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2017-11-15 08:22:43 +01:00
Michael Kerrisk 8fb9b45adc proc.5: Since Linux 4.9, /proc/locks is filtered according to the PID namespace
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2017-11-15 08:10:53 +01:00
Michael Kerrisk f352b560f8 proc.5: Document /proc/locks
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2017-11-14 23:22:33 +01:00
Michael Kerrisk b0bd99827c proc.5: srcfix
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2017-11-09 15:22:07 +01:00
Tyler Hicks 2577dbba2b proc.5, seccomp.2: Document the seccomp /proc interfaces added in Linux 4.14
Document the seccomp /proc interfaces in Linux 4.14:
/proc/sys/kernel/seccomp/actions_avail and
/proc/sys/kernel/seccomp/actions_logged.

Signed-off-by: Tyler Hicks <tyhicks@canonical.com>
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2017-11-09 15:22:07 +01:00
Lucas Werkmeister 81c8aeb649 proc.5: Clarify permissions in /proc/[pid]/fd/
Since the symbolic links for pipes and sockets do not refer to real
files in the file system tree, it can be hard to discover that they
still have mode and ownership information (revealed e.g. by `stat -L`),
so let's point this out in the manpage.

Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2017-11-06 22:25:13 +01:00
Lucas Werkmeister d6bd89f3e5 proc.5: ffix
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2017-11-06 22:23:01 +01:00
Michael Kerrisk 8eb13afb83 proc.5: Add reference to pid_namespaces(7) for /proc/sys/kernel/ns_last_pid
Add reference to pid_namespaces(7) for the description of
/proc/sys/kernel/ns_last_pid.

Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2017-10-23 17:30:12 +02:00
Michael Kerrisk b5b0d21ef5 proc.5: wfix
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2017-10-18 09:26:12 +02:00
Michael Kerrisk 9ea5bc667b clone.2, getcpu.2, shmget.2, syscall.2, dladdr.3, proc.5, vdso.7: Consistently use "x86-64", not "x86_64"
When referring to the architecture, consistently use "x86-64",
not "x86_64". Hitherto, there was a mixture of usages, with
"x86-64" predominant.

Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2017-10-18 09:26:12 +02:00
Jakub Wilk 86be2c9292 proc.5: tfix
Remove duplicated word.

Signed-off-by: Jakub Wilk <jwilk@jwilk.net>
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2017-10-09 15:24:20 +02:00
Michael Kerrisk 0e462d71de proc.5: srcfix
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2017-09-25 09:19:18 +02:00
Oliver Ebert 55d68a947b proc.5: Document /proc/kpagecgroup
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2017-09-25 09:19:18 +02:00
Michael Kerrisk abfbcb56d8 proc.5: srcfix
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2017-09-25 09:19:18 +02:00
Oliver Ebert 2e84528d50 proc.5: Add mmap-exclusive bit for /proc/[pid]/pagemap
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2017-09-25 09:19:18 +02:00
Michael Kerrisk c6f182bc5e proc.5: srcfix
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2017-09-25 09:19:18 +02:00
Michael Kerrisk 5487da4c66 proc.5: Fix kernel version for KPF_BALLOON (amendment to Oliver Ebert's patch)
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
2017-09-25 09:19:17 +02:00