This patch against 2.6.11-rc1-bk6 adds /proc/<pid>/rlimit to export
per-process resource limit settings.  It was written to help analyze
daemon core dump size settings, but may be more generally useful.
Tested on 2.6.10. Sample output:

        [EMAIL PROTECTED] ~ # cat /proc/$$/rlimit
        cpu unlimited unlimited
        fsize unlimited unlimited
        data unlimited unlimited
        stack 8388608 unlimited
        core 0 unlimited
        rss unlimited unlimited
        nproc 111 111
        nofile 1024 1024
        memlock 32768 32768
        as unlimited unlimited
        locks unlimited unlimited
        sigpending 1024 1024
        msgqueue 819200 819200

Feedback welcome.

Signed-off-by: Bill Rugolsky <[EMAIL PROTECTED]>

--- linux-2.6.11-rc1-bk6/fs/proc/base.c.rlimit  2005-01-18 15:01:10.120960254 
-0500
+++ linux-2.6.11-rc1-bk6/fs/proc/base.c 2005-01-18 15:07:28.102661832 -0500
@@ -32,6 +32,7 @@
 #include <linux/mount.h>
 #include <linux/security.h>
 #include <linux/ptrace.h>
+#include <linux/resource.h>
 #include "internal.h"
 
 /*
@@ -61,6 +62,7 @@
        PROC_TGID_MAPS,
        PROC_TGID_MOUNTS,
        PROC_TGID_WCHAN,
+       PROC_TGID_RLIMIT,
 #ifdef CONFIG_SCHEDSTATS
        PROC_TGID_SCHEDSTAT,
 #endif
@@ -87,6 +89,7 @@
        PROC_TID_MAPS,
        PROC_TID_MOUNTS,
        PROC_TID_WCHAN,
+       PROC_TID_RLIMIT,
 #ifdef CONFIG_SCHEDSTATS
        PROC_TID_SCHEDSTAT,
 #endif
@@ -124,6 +127,7 @@
        E(PROC_TGID_ROOT,      "root",    S_IFLNK|S_IRWXUGO),
        E(PROC_TGID_EXE,       "exe",     S_IFLNK|S_IRWXUGO),
        E(PROC_TGID_MOUNTS,    "mounts",  S_IFREG|S_IRUGO),
+       E(PROC_TGID_RLIMIT,    "rlimit",  S_IFREG|S_IRUGO),
 #ifdef CONFIG_SECURITY
        E(PROC_TGID_ATTR,      "attr",    S_IFDIR|S_IRUGO|S_IXUGO),
 #endif
@@ -149,6 +153,7 @@
        E(PROC_TID_ROOT,       "root",    S_IFLNK|S_IRWXUGO),
        E(PROC_TID_EXE,        "exe",     S_IFLNK|S_IRWXUGO),
        E(PROC_TID_MOUNTS,     "mounts",  S_IFREG|S_IRUGO),
+       E(PROC_TID_RLIMIT,     "rlimit",  S_IFREG|S_IRUGO),
 #ifdef CONFIG_SECURITY
        E(PROC_TID_ATTR,       "attr",    S_IFDIR|S_IRUGO|S_IXUGO),
 #endif
@@ -496,6 +501,107 @@
        .release        = mounts_release,
 };
 
+const char * const rlim_name[RLIM_NLIMITS] = {
+#ifdef RLIMIT_CPU
+       [RLIMIT_CPU] = "cpu",
+#endif
+#ifdef RLIMIT_FSIZE
+       [RLIMIT_FSIZE] = "fsize",
+#endif
+#ifdef RLIMIT_DATA
+       [RLIMIT_DATA] =  "data",
+#endif
+#ifdef RLIMIT_STACK
+       [RLIMIT_STACK] = "stack",
+#endif
+#ifdef RLIMIT_CORE
+       [RLIMIT_CORE] = "core",
+#endif
+#ifdef RLIMIT_RSS
+       [RLIMIT_RSS] = "rss",
+#endif
+#ifdef RLIMIT_NPROC
+       [RLIMIT_NPROC] = "nproc",
+#endif
+#ifdef RLIMIT_NOFILE
+       [RLIMIT_NOFILE] = "nofile",
+#endif
+#ifdef RLIMIT_MEMLOCK
+       [RLIMIT_MEMLOCK] = "memlock",
+#endif
+#ifdef RLIMIT_AS
+       [RLIMIT_AS] = "as",
+#endif
+#ifdef RLIMIT_LOCKS
+       [RLIMIT_LOCKS] = "locks",
+#endif
+#ifdef RLIMIT_SIGPENDING
+       [RLIMIT_SIGPENDING] = "sigpending",
+#endif
+#ifdef RLIMIT_MSGQUEUE
+       [RLIMIT_MSGQUEUE] = "msgqueue",
+#endif
+};
+
+static int rlimit_show(struct seq_file *s, void *v)
+{
+       struct rlimit *rlim = (struct rlimit *) s->private;
+       int i;
+
+       for (i = 0 ; i < RLIM_NLIMITS ; i++) {
+               if (rlim_name[i] != NULL)
+                       seq_puts(s, rlim_name[i]);
+               else
+                       seq_printf(s, "rlimit-%d", i);
+
+               if (rlim[i].rlim_cur == RLIM_INFINITY)
+                       seq_puts(s, " unlimited");
+               else
+                       seq_printf(s, " %lu", (unsigned long)rlim[i].rlim_cur);
+
+               if (rlim[i].rlim_max == RLIM_INFINITY)
+                       seq_puts(s, " unlimited\n");
+               else
+                       seq_printf(s, " %lu\n", (unsigned 
long)rlim[i].rlim_max);
+       }
+               return 0;
+}
+
+static int rlimit_open(struct inode *inode, struct file *file)
+{
+       struct task_struct *task = proc_task(inode);
+       struct rlimit *rlim = kmalloc(RLIM_NLIMITS * sizeof (struct rlimit), 
GFP_KERNEL);
+       int ret;
+
+       if (!rlim)
+               return -ENOMEM;
+
+       task_lock(task->group_leader);
+       memcpy(rlim, task->signal->rlim, RLIM_NLIMITS * sizeof (struct rlimit));
+       task_unlock(task->group_leader);
+
+       ret = single_open(file, rlimit_show, rlim);
+
+       if (ret)
+               kfree(rlim);
+
+       return ret;
+}
+
+static int rlimit_release(struct inode *inode, struct file *file)
+{
+       struct seq_file *s = file->private_data;
+       kfree(s->private);
+       return single_release(inode, file);
+}
+
+static struct file_operations proc_rlimit_operations = {
+       .open           = rlimit_open,
+       .read           = seq_read,
+       .llseek         = seq_lseek,
+       .release        = rlimit_release,
+};
+
 #define PROC_BLOCK_SIZE        (3*1024)                /* 4K page size but our 
output routines use some slack for overruns */
 
 static ssize_t proc_info_read(struct file * file, char __user * buf,
@@ -1300,6 +1406,10 @@
                case PROC_TGID_MOUNTS:
                        inode->i_fop = &proc_mounts_operations;
                        break;
+               case PROC_TID_RLIMIT:
+               case PROC_TGID_RLIMIT:
+                       inode->i_fop = &proc_rlimit_operations;
+                       break;
 #ifdef CONFIG_SECURITY
                case PROC_TID_ATTR:
                        inode->i_nlink = 2;
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Reply via email to