Commit | Line | Data |
---|---|---|
b2441318 | 1 | // SPDX-License-Identifier: GPL-2.0 |
1da177e4 LT |
2 | /* |
3 | * linux/fs/proc/array.c | |
4 | * | |
5 | * Copyright (C) 1992 by Linus Torvalds | |
6 | * based on ideas by Darren Senn | |
7 | * | |
8 | * Fixes: | |
9 | * Michael. K. Johnson: stat,statm extensions. | |
10 | * <johnsonm@stolaf.edu> | |
11 | * | |
12 | * Pauline Middelink : Made cmdline,envline only break at '\0's, to | |
13 | * make sure SET_PROCTITLE works. Also removed | |
14 | * bad '!' which forced address recalculation for | |
15 | * EVERY character on the current page. | |
16 | * <middelin@polyware.iaf.nl> | |
17 | * | |
18 | * Danny ter Haar : added cpuinfo | |
19 | * <dth@cistron.nl> | |
20 | * | |
21 | * Alessandro Rubini : profile extension. | |
22 | * <rubini@ipvvis.unipv.it> | |
23 | * | |
24 | * Jeff Tranter : added BogoMips field to cpuinfo | |
25 | * <Jeff_Tranter@Mitel.COM> | |
26 | * | |
27 | * Bruno Haible : remove 4K limit for the maps file | |
28 | * <haible@ma2s2.mathematik.uni-karlsruhe.de> | |
29 | * | |
30 | * Yves Arrouye : remove removal of trailing spaces in get_array. | |
31 | * <Yves.Arrouye@marin.fdn.fr> | |
32 | * | |
33 | * Jerome Forissier : added per-CPU time information to /proc/stat | |
34 | * and /proc/<pid>/cpu extension | |
35 | * <forissier@isia.cma.fr> | |
36 | * - Incorporation and non-SMP safe operation | |
37 | * of forissier patch in 2.1.78 by | |
38 | * Hans Marcus <crowbar@concepts.nl> | |
39 | * | |
40 | * aeb@cwi.nl : /proc/partitions | |
41 | * | |
42 | * | |
43 | * Alan Cox : security fixes. | |
526719ba | 44 | * <alan@lxorguk.ukuu.org.uk> |
1da177e4 LT |
45 | * |
46 | * Al Viro : safe handling of mm_struct | |
47 | * | |
48 | * Gerhard Wichert : added BIGMEM support | |
49 | * Siemens AG <Gerhard.Wichert@pdb.siemens.de> | |
50 | * | |
51 | * Al Viro & Jeff Garzik : moved most of the thing into base.c and | |
52 | * : proc_misc.c. The rest may eventually go into | |
53 | * : base.c too. | |
54 | */ | |
55 | ||
1da177e4 LT |
56 | #include <linux/types.h> |
57 | #include <linux/errno.h> | |
58 | #include <linux/time.h> | |
59 | #include <linux/kernel.h> | |
60 | #include <linux/kernel_stat.h> | |
61 | #include <linux/tty.h> | |
62 | #include <linux/string.h> | |
63 | #include <linux/mman.h> | |
6e84f315 | 64 | #include <linux/sched/mm.h> |
6a3827d7 | 65 | #include <linux/sched/numa_balancing.h> |
fd7d5627 | 66 | #include <linux/sched/task_stack.h> |
29930025 | 67 | #include <linux/sched/task.h> |
32ef5517 | 68 | #include <linux/sched/cputime.h> |
1da177e4 LT |
69 | #include <linux/proc_fs.h> |
70 | #include <linux/ioport.h> | |
8ea02606 IM |
71 | #include <linux/uaccess.h> |
72 | #include <linux/io.h> | |
1da177e4 LT |
73 | #include <linux/mm.h> |
74 | #include <linux/hugetlb.h> | |
75 | #include <linux/pagemap.h> | |
76 | #include <linux/swap.h> | |
1da177e4 LT |
77 | #include <linux/smp.h> |
78 | #include <linux/signal.h> | |
79 | #include <linux/highmem.h> | |
80 | #include <linux/file.h> | |
9f3acc31 | 81 | #include <linux/fdtable.h> |
1da177e4 LT |
82 | #include <linux/times.h> |
83 | #include <linux/cpuset.h> | |
4fb3a538 | 84 | #include <linux/rcupdate.h> |
25890454 | 85 | #include <linux/delayacct.h> |
ee992744 | 86 | #include <linux/seq_file.h> |
b488893a | 87 | #include <linux/pid_namespace.h> |
fae1fa0f | 88 | #include <linux/prctl.h> |
f83ce3e6 | 89 | #include <linux/ptrace.h> |
0d094efe | 90 | #include <linux/tracehook.h> |
edc924e0 | 91 | #include <linux/string_helpers.h> |
ae2975bc | 92 | #include <linux/user_namespace.h> |
3e42979e | 93 | #include <linux/fs_struct.h> |
1da177e4 | 94 | |
1da177e4 LT |
95 | #include <asm/processor.h> |
96 | #include "internal.h" | |
97 | ||
88b72b31 | 98 | void proc_task_name(struct seq_file *m, struct task_struct *p, bool escape) |
1da177e4 | 99 | { |
edc924e0 | 100 | char *buf; |
3a49f3d2 | 101 | size_t size; |
6b59808b | 102 | char tcomm[64]; |
3a49f3d2 | 103 | int ret; |
1da177e4 | 104 | |
6b59808b TH |
105 | if (p->flags & PF_WQ_WORKER) |
106 | wq_worker_comm(tcomm, sizeof(tcomm), p); | |
107 | else | |
108 | __get_task_comm(tcomm, sizeof(tcomm), p); | |
edc924e0 | 109 | |
3a49f3d2 | 110 | size = seq_get_buf(m, &buf); |
88b72b31 TH |
111 | if (escape) { |
112 | ret = string_escape_str(tcomm, buf, size, | |
113 | ESCAPE_SPACE | ESCAPE_SPECIAL, "\n\\"); | |
114 | if (ret >= size) | |
115 | ret = -1; | |
116 | } else { | |
117 | ret = strscpy(buf, tcomm, size); | |
118 | } | |
edc924e0 | 119 | |
88b72b31 | 120 | seq_commit(m, ret); |
1da177e4 LT |
121 | } |
122 | ||
123 | /* | |
124 | * The task state array is a strange "bitmap" of | |
125 | * reasons to sleep. Thus "running" is zero, and | |
126 | * you can test for combinations of others with | |
127 | * simple bit tests. | |
128 | */ | |
e130aa70 | 129 | static const char * const task_state_array[] = { |
06eb6184 PZ |
130 | |
131 | /* states in TASK_REPORT: */ | |
132 | "R (running)", /* 0x00 */ | |
133 | "S (sleeping)", /* 0x01 */ | |
134 | "D (disk sleep)", /* 0x02 */ | |
135 | "T (stopped)", /* 0x04 */ | |
136 | "t (tracing stop)", /* 0x08 */ | |
137 | "X (dead)", /* 0x10 */ | |
138 | "Z (zombie)", /* 0x20 */ | |
8ef9925b | 139 | "P (parked)", /* 0x40 */ |
06eb6184 PZ |
140 | |
141 | /* states beyond TASK_REPORT: */ | |
8ef9925b | 142 | "I (idle)", /* 0x80 */ |
1da177e4 LT |
143 | }; |
144 | ||
8ea02606 | 145 | static inline const char *get_task_state(struct task_struct *tsk) |
1da177e4 | 146 | { |
06eb6184 | 147 | BUILD_BUG_ON(1 + ilog2(TASK_REPORT_MAX) != ARRAY_SIZE(task_state_array)); |
1d48b080 | 148 | return task_state_array[task_state_index(tsk)]; |
1da177e4 LT |
149 | } |
150 | ||
df5f8314 EB |
151 | static inline void task_state(struct seq_file *m, struct pid_namespace *ns, |
152 | struct pid *pid, struct task_struct *p) | |
1da177e4 | 153 | { |
e9f238c3 | 154 | struct user_namespace *user_ns = seq_user_ns(m); |
1da177e4 | 155 | struct group_info *group_info; |
68c3411f | 156 | int g, umask = -1; |
abdba6e9 | 157 | struct task_struct *tracer; |
c69e8d9c | 158 | const struct cred *cred; |
abdba6e9 | 159 | pid_t ppid, tpid = 0, tgid, ngid; |
0f4a0d53 | 160 | unsigned int max_fds = 0; |
1da177e4 | 161 | |
b0fa9db6 | 162 | rcu_read_lock(); |
b488893a PE |
163 | ppid = pid_alive(p) ? |
164 | task_tgid_nr_ns(rcu_dereference(p->real_parent), ns) : 0; | |
abdba6e9 ON |
165 | |
166 | tracer = ptrace_parent(p); | |
167 | if (tracer) | |
168 | tpid = task_pid_nr_ns(tracer, ns); | |
b0fafc11 ON |
169 | |
170 | tgid = task_tgid_nr_ns(p, ns); | |
171 | ngid = task_numa_group_id(p); | |
de09a977 | 172 | cred = get_task_cred(p); |
0f4a0d53 ON |
173 | |
174 | task_lock(p); | |
68c3411f MG |
175 | if (p->fs) |
176 | umask = p->fs->umask; | |
0f4a0d53 ON |
177 | if (p->files) |
178 | max_fds = files_fdtable(p->files)->max_fds; | |
179 | task_unlock(p); | |
b0fafc11 | 180 | rcu_read_unlock(); |
0f4a0d53 | 181 | |
68c3411f MG |
182 | if (umask >= 0) |
183 | seq_printf(m, "Umask:\t%#04o\n", umask); | |
d0f02231 AV |
184 | seq_puts(m, "State:\t"); |
185 | seq_puts(m, get_task_state(p)); | |
f7a5f132 | 186 | |
75ba1d07 JP |
187 | seq_put_decimal_ull(m, "\nTgid:\t", tgid); |
188 | seq_put_decimal_ull(m, "\nNgid:\t", ngid); | |
189 | seq_put_decimal_ull(m, "\nPid:\t", pid_nr_ns(pid, ns)); | |
190 | seq_put_decimal_ull(m, "\nPPid:\t", ppid); | |
191 | seq_put_decimal_ull(m, "\nTracerPid:\t", tpid); | |
192 | seq_put_decimal_ull(m, "\nUid:\t", from_kuid_munged(user_ns, cred->uid)); | |
193 | seq_put_decimal_ull(m, "\t", from_kuid_munged(user_ns, cred->euid)); | |
194 | seq_put_decimal_ull(m, "\t", from_kuid_munged(user_ns, cred->suid)); | |
195 | seq_put_decimal_ull(m, "\t", from_kuid_munged(user_ns, cred->fsuid)); | |
196 | seq_put_decimal_ull(m, "\nGid:\t", from_kgid_munged(user_ns, cred->gid)); | |
197 | seq_put_decimal_ull(m, "\t", from_kgid_munged(user_ns, cred->egid)); | |
198 | seq_put_decimal_ull(m, "\t", from_kgid_munged(user_ns, cred->sgid)); | |
199 | seq_put_decimal_ull(m, "\t", from_kgid_munged(user_ns, cred->fsgid)); | |
200 | seq_put_decimal_ull(m, "\nFDSize:\t", max_fds); | |
f7a5f132 AD |
201 | |
202 | seq_puts(m, "\nGroups:\t"); | |
c69e8d9c | 203 | group_info = cred->group_info; |
8d238027 | 204 | for (g = 0; g < group_info->ngroups; g++) |
75ba1d07 | 205 | seq_put_decimal_ull(m, g ? " " : "", |
81243eac | 206 | from_kgid_munged(user_ns, group_info->gid[g])); |
c69e8d9c | 207 | put_cred(cred); |
f7a5f132 AD |
208 | /* Trailing space shouldn't have been added in the first place. */ |
209 | seq_putc(m, ' '); | |
1da177e4 | 210 | |
e4bc3324 CH |
211 | #ifdef CONFIG_PID_NS |
212 | seq_puts(m, "\nNStgid:"); | |
213 | for (g = ns->level; g <= pid->level; g++) | |
75ba1d07 | 214 | seq_put_decimal_ull(m, "\t", task_tgid_nr_ns(p, pid->numbers[g].ns)); |
e4bc3324 CH |
215 | seq_puts(m, "\nNSpid:"); |
216 | for (g = ns->level; g <= pid->level; g++) | |
75ba1d07 | 217 | seq_put_decimal_ull(m, "\t", task_pid_nr_ns(p, pid->numbers[g].ns)); |
e4bc3324 CH |
218 | seq_puts(m, "\nNSpgid:"); |
219 | for (g = ns->level; g <= pid->level; g++) | |
75ba1d07 | 220 | seq_put_decimal_ull(m, "\t", task_pgrp_nr_ns(p, pid->numbers[g].ns)); |
e4bc3324 CH |
221 | seq_puts(m, "\nNSsid:"); |
222 | for (g = ns->level; g <= pid->level; g++) | |
75ba1d07 | 223 | seq_put_decimal_ull(m, "\t", task_session_nr_ns(p, pid->numbers[g].ns)); |
e4bc3324 | 224 | #endif |
9d6de12f | 225 | seq_putc(m, '\n'); |
1da177e4 LT |
226 | } |
227 | ||
138d22b5 | 228 | void render_sigset_t(struct seq_file *m, const char *header, |
df5f8314 | 229 | sigset_t *set) |
1da177e4 | 230 | { |
df5f8314 | 231 | int i; |
1da177e4 | 232 | |
9d6de12f | 233 | seq_puts(m, header); |
1da177e4 LT |
234 | |
235 | i = _NSIG; | |
236 | do { | |
237 | int x = 0; | |
238 | ||
239 | i -= 4; | |
240 | if (sigismember(set, i+1)) x |= 1; | |
241 | if (sigismember(set, i+2)) x |= 2; | |
242 | if (sigismember(set, i+3)) x |= 4; | |
243 | if (sigismember(set, i+4)) x |= 8; | |
209b14dc | 244 | seq_putc(m, hex_asc[x]); |
1da177e4 LT |
245 | } while (i >= 4); |
246 | ||
9d6de12f | 247 | seq_putc(m, '\n'); |
1da177e4 LT |
248 | } |
249 | ||
8977a27b AD |
250 | static void collect_sigign_sigcatch(struct task_struct *p, sigset_t *sigign, |
251 | sigset_t *sigcatch) | |
1da177e4 LT |
252 | { |
253 | struct k_sigaction *k; | |
254 | int i; | |
255 | ||
256 | k = p->sighand->action; | |
257 | for (i = 1; i <= _NSIG; ++i, ++k) { | |
258 | if (k->sa.sa_handler == SIG_IGN) | |
8977a27b | 259 | sigaddset(sigign, i); |
1da177e4 | 260 | else if (k->sa.sa_handler != SIG_DFL) |
8977a27b | 261 | sigaddset(sigcatch, i); |
1da177e4 LT |
262 | } |
263 | } | |
264 | ||
df5f8314 | 265 | static inline void task_sig(struct seq_file *m, struct task_struct *p) |
1da177e4 | 266 | { |
5e6b3f42 | 267 | unsigned long flags; |
1da177e4 LT |
268 | sigset_t pending, shpending, blocked, ignored, caught; |
269 | int num_threads = 0; | |
197850a1 | 270 | unsigned int qsize = 0; |
1da177e4 LT |
271 | unsigned long qlim = 0; |
272 | ||
273 | sigemptyset(&pending); | |
274 | sigemptyset(&shpending); | |
275 | sigemptyset(&blocked); | |
276 | sigemptyset(&ignored); | |
277 | sigemptyset(&caught); | |
278 | ||
5e6b3f42 | 279 | if (lock_task_sighand(p, &flags)) { |
1da177e4 LT |
280 | pending = p->pending.signal; |
281 | shpending = p->signal->shared_pending.signal; | |
282 | blocked = p->blocked; | |
283 | collect_sigign_sigcatch(p, &ignored, &caught); | |
7e49827c | 284 | num_threads = get_nr_threads(p); |
7dc52157 | 285 | rcu_read_lock(); /* FIXME: is this correct? */ |
c69e8d9c | 286 | qsize = atomic_read(&__task_cred(p)->user->sigpending); |
7dc52157 | 287 | rcu_read_unlock(); |
d554ed89 | 288 | qlim = task_rlimit(p, RLIMIT_SIGPENDING); |
5e6b3f42 | 289 | unlock_task_sighand(p, &flags); |
1da177e4 | 290 | } |
1da177e4 | 291 | |
75ba1d07 JP |
292 | seq_put_decimal_ull(m, "Threads:\t", num_threads); |
293 | seq_put_decimal_ull(m, "\nSigQ:\t", qsize); | |
294 | seq_put_decimal_ull(m, "/", qlim); | |
1da177e4 LT |
295 | |
296 | /* render them all */ | |
f7a5f132 | 297 | render_sigset_t(m, "\nSigPnd:\t", &pending); |
df5f8314 EB |
298 | render_sigset_t(m, "ShdPnd:\t", &shpending); |
299 | render_sigset_t(m, "SigBlk:\t", &blocked); | |
300 | render_sigset_t(m, "SigIgn:\t", &ignored); | |
301 | render_sigset_t(m, "SigCgt:\t", &caught); | |
1da177e4 LT |
302 | } |
303 | ||
df5f8314 EB |
304 | static void render_cap_t(struct seq_file *m, const char *header, |
305 | kernel_cap_t *a) | |
e338d263 AM |
306 | { |
307 | unsigned __capi; | |
308 | ||
9d6de12f | 309 | seq_puts(m, header); |
e338d263 | 310 | CAP_FOR_EACH_U32(__capi) { |
d0f02231 AV |
311 | seq_put_hex_ll(m, NULL, |
312 | a->cap[CAP_LAST_U32 - __capi], 8); | |
e338d263 | 313 | } |
9d6de12f | 314 | seq_putc(m, '\n'); |
e338d263 AM |
315 | } |
316 | ||
df5f8314 | 317 | static inline void task_cap(struct seq_file *m, struct task_struct *p) |
1da177e4 | 318 | { |
c69e8d9c | 319 | const struct cred *cred; |
58319057 AL |
320 | kernel_cap_t cap_inheritable, cap_permitted, cap_effective, |
321 | cap_bset, cap_ambient; | |
b6dff3ec | 322 | |
c69e8d9c DH |
323 | rcu_read_lock(); |
324 | cred = __task_cred(p); | |
325 | cap_inheritable = cred->cap_inheritable; | |
326 | cap_permitted = cred->cap_permitted; | |
327 | cap_effective = cred->cap_effective; | |
328 | cap_bset = cred->cap_bset; | |
58319057 | 329 | cap_ambient = cred->cap_ambient; |
c69e8d9c DH |
330 | rcu_read_unlock(); |
331 | ||
332 | render_cap_t(m, "CapInh:\t", &cap_inheritable); | |
333 | render_cap_t(m, "CapPrm:\t", &cap_permitted); | |
334 | render_cap_t(m, "CapEff:\t", &cap_effective); | |
335 | render_cap_t(m, "CapBnd:\t", &cap_bset); | |
58319057 | 336 | render_cap_t(m, "CapAmb:\t", &cap_ambient); |
1da177e4 LT |
337 | } |
338 | ||
2f4b3bf6 KC |
339 | static inline void task_seccomp(struct seq_file *m, struct task_struct *p) |
340 | { | |
af884cd4 | 341 | seq_put_decimal_ull(m, "NoNewPrivs:\t", task_no_new_privs(p)); |
2f4b3bf6 | 342 | #ifdef CONFIG_SECCOMP |
af884cd4 | 343 | seq_put_decimal_ull(m, "\nSeccomp:\t", p->seccomp.mode); |
2f4b3bf6 | 344 | #endif |
08b55775 | 345 | seq_puts(m, "\nSpeculation_Store_Bypass:\t"); |
fae1fa0f KC |
346 | switch (arch_prctl_spec_ctrl_get(p, PR_SPEC_STORE_BYPASS)) { |
347 | case -EINVAL: | |
08b55775 | 348 | seq_puts(m, "unknown"); |
fae1fa0f KC |
349 | break; |
350 | case PR_SPEC_NOT_AFFECTED: | |
08b55775 | 351 | seq_puts(m, "not vulnerable"); |
fae1fa0f | 352 | break; |
356e4bff | 353 | case PR_SPEC_PRCTL | PR_SPEC_FORCE_DISABLE: |
08b55775 | 354 | seq_puts(m, "thread force mitigated"); |
356e4bff | 355 | break; |
fae1fa0f | 356 | case PR_SPEC_PRCTL | PR_SPEC_DISABLE: |
08b55775 | 357 | seq_puts(m, "thread mitigated"); |
fae1fa0f KC |
358 | break; |
359 | case PR_SPEC_PRCTL | PR_SPEC_ENABLE: | |
08b55775 | 360 | seq_puts(m, "thread vulnerable"); |
fae1fa0f KC |
361 | break; |
362 | case PR_SPEC_DISABLE: | |
08b55775 | 363 | seq_puts(m, "globally mitigated"); |
fae1fa0f KC |
364 | break; |
365 | default: | |
08b55775 | 366 | seq_puts(m, "vulnerable"); |
fae1fa0f KC |
367 | break; |
368 | } | |
af884cd4 | 369 | seq_putc(m, '\n'); |
2f4b3bf6 KC |
370 | } |
371 | ||
df5f8314 EB |
372 | static inline void task_context_switch_counts(struct seq_file *m, |
373 | struct task_struct *p) | |
b663a79c | 374 | { |
75ba1d07 JP |
375 | seq_put_decimal_ull(m, "voluntary_ctxt_switches:\t", p->nvcsw); |
376 | seq_put_decimal_ull(m, "\nnonvoluntary_ctxt_switches:\t", p->nivcsw); | |
f7a5f132 | 377 | seq_putc(m, '\n'); |
b663a79c MU |
378 | } |
379 | ||
d01d4827 HC |
380 | static void task_cpus_allowed(struct seq_file *m, struct task_struct *task) |
381 | { | |
a0c2e07d | 382 | seq_printf(m, "Cpus_allowed:\t%*pb\n", |
3bd37062 | 383 | cpumask_pr_args(task->cpus_ptr)); |
a0c2e07d | 384 | seq_printf(m, "Cpus_allowed_list:\t%*pbl\n", |
3bd37062 | 385 | cpumask_pr_args(task->cpus_ptr)); |
d01d4827 HC |
386 | } |
387 | ||
c6434012 RG |
388 | static inline void task_core_dumping(struct seq_file *m, struct mm_struct *mm) |
389 | { | |
d0f02231 AV |
390 | seq_put_decimal_ull(m, "CoreDumping:\t", !!mm->core_state); |
391 | seq_putc(m, '\n'); | |
c6434012 RG |
392 | } |
393 | ||
a1400af7 MH |
394 | static inline void task_thp_status(struct seq_file *m, struct mm_struct *mm) |
395 | { | |
396 | bool thp_enabled = IS_ENABLED(CONFIG_TRANSPARENT_HUGEPAGE); | |
397 | ||
398 | if (thp_enabled) | |
399 | thp_enabled = !test_bit(MMF_DISABLE_THP, &mm->flags); | |
400 | seq_printf(m, "THP_enabled:\t%d\n", thp_enabled); | |
401 | } | |
402 | ||
df5f8314 EB |
403 | int proc_pid_status(struct seq_file *m, struct pid_namespace *ns, |
404 | struct pid *pid, struct task_struct *task) | |
1da177e4 | 405 | { |
1da177e4 LT |
406 | struct mm_struct *mm = get_task_mm(task); |
407 | ||
88b72b31 TH |
408 | seq_puts(m, "Name:\t"); |
409 | proc_task_name(m, task, true); | |
410 | seq_putc(m, '\n'); | |
411 | ||
df5f8314 | 412 | task_state(m, ns, pid, task); |
8ea02606 | 413 | |
1da177e4 | 414 | if (mm) { |
df5f8314 | 415 | task_mem(m, mm); |
c6434012 | 416 | task_core_dumping(m, mm); |
a1400af7 | 417 | task_thp_status(m, mm); |
1da177e4 LT |
418 | mmput(mm); |
419 | } | |
df5f8314 EB |
420 | task_sig(m, task); |
421 | task_cap(m, task); | |
2f4b3bf6 | 422 | task_seccomp(m, task); |
d01d4827 | 423 | task_cpus_allowed(m, task); |
df5f8314 | 424 | cpuset_task_status_allowed(m, task); |
df5f8314 EB |
425 | task_context_switch_counts(m, task); |
426 | return 0; | |
1da177e4 LT |
427 | } |
428 | ||
ee992744 EB |
429 | static int do_task_stat(struct seq_file *m, struct pid_namespace *ns, |
430 | struct pid *pid, struct task_struct *task, int whole) | |
1da177e4 | 431 | { |
b2f73922 | 432 | unsigned long vsize, eip, esp, wchan = 0; |
715be1fc | 433 | int priority, nice; |
1da177e4 LT |
434 | int tty_pgrp = -1, tty_nr = 0; |
435 | sigset_t sigign, sigcatch; | |
436 | char state; | |
8ea02606 | 437 | pid_t ppid = 0, pgid = -1, sid = -1; |
1da177e4 | 438 | int num_threads = 0; |
f83ce3e6 | 439 | int permitted; |
1da177e4 LT |
440 | struct mm_struct *mm; |
441 | unsigned long long start_time; | |
442 | unsigned long cmin_flt = 0, cmaj_flt = 0; | |
443 | unsigned long min_flt = 0, maj_flt = 0; | |
5613fda9 | 444 | u64 cutime, cstime, utime, stime; |
16a6d9be | 445 | u64 cgtime, gtime; |
1da177e4 | 446 | unsigned long rsslim = 0; |
a593d6ed | 447 | unsigned long flags; |
1da177e4 LT |
448 | |
449 | state = *get_task_state(task); | |
450 | vsize = eip = esp = 0; | |
caaee623 | 451 | permitted = ptrace_may_access(task, PTRACE_MODE_READ_FSCREDS | PTRACE_MODE_NOAUDIT); |
1da177e4 LT |
452 | mm = get_task_mm(task); |
453 | if (mm) { | |
454 | vsize = task_vsize(mm); | |
0a1eb2d4 AL |
455 | /* |
456 | * esp and eip are intentionally zeroed out. There is no | |
457 | * non-racy way to read them without freezing the task. | |
458 | * Programs that need reliable values can use ptrace(2). | |
fd7d5627 JO |
459 | * |
460 | * The only exception is if the task is core dumping because | |
461 | * a program is not able to use ptrace(2) in that case. It is | |
462 | * safe because the task has stopped executing permanently. | |
0a1eb2d4 | 463 | */ |
cb8f381f | 464 | if (permitted && (task->flags & (PF_EXITING|PF_DUMPCORE))) { |
8bb2ee19 AD |
465 | if (try_get_task_stack(task)) { |
466 | eip = KSTK_EIP(task); | |
467 | esp = KSTK_ESP(task); | |
468 | put_task_stack(task); | |
469 | } | |
fd7d5627 | 470 | } |
1da177e4 LT |
471 | } |
472 | ||
1da177e4 LT |
473 | sigemptyset(&sigign); |
474 | sigemptyset(&sigcatch); | |
64861634 MS |
475 | cutime = cstime = utime = stime = 0; |
476 | cgtime = gtime = 0; | |
3cfd0885 | 477 | |
a593d6ed ON |
478 | if (lock_task_sighand(task, &flags)) { |
479 | struct signal_struct *sig = task->signal; | |
91593504 ON |
480 | |
481 | if (sig->tty) { | |
5d0fdf1e AC |
482 | struct pid *pgrp = tty_get_pgrp(sig->tty); |
483 | tty_pgrp = pid_nr_ns(pgrp, ns); | |
484 | put_pid(pgrp); | |
91593504 | 485 | tty_nr = new_encode_dev(tty_devnum(sig->tty)); |
a593d6ed ON |
486 | } |
487 | ||
7e49827c | 488 | num_threads = get_nr_threads(task); |
1da177e4 LT |
489 | collect_sigign_sigcatch(task, &sigign, &sigcatch); |
490 | ||
a593d6ed ON |
491 | cmin_flt = sig->cmin_flt; |
492 | cmaj_flt = sig->cmaj_flt; | |
493 | cutime = sig->cutime; | |
494 | cstime = sig->cstime; | |
9ac52315 | 495 | cgtime = sig->cgtime; |
6aa7de05 | 496 | rsslim = READ_ONCE(sig->rlim[RLIMIT_RSS].rlim_cur); |
a593d6ed | 497 | |
1da177e4 LT |
498 | /* add up live thread stats at the group level */ |
499 | if (whole) { | |
a593d6ed | 500 | struct task_struct *t = task; |
1da177e4 LT |
501 | do { |
502 | min_flt += t->min_flt; | |
503 | maj_flt += t->maj_flt; | |
6fac4829 | 504 | gtime += task_gtime(t); |
185ee40e | 505 | } while_each_thread(task, t); |
1da177e4 | 506 | |
a593d6ed ON |
507 | min_flt += sig->min_flt; |
508 | maj_flt += sig->maj_flt; | |
e80d0a1a | 509 | thread_group_cputime_adjusted(task, &utime, &stime); |
64861634 | 510 | gtime += sig->gtime; |
1da177e4 | 511 | } |
a593d6ed | 512 | |
b488893a | 513 | sid = task_session_nr_ns(task, ns); |
a98fdcef | 514 | ppid = task_tgid_nr_ns(task->real_parent, ns); |
b488893a | 515 | pgid = task_pgrp_nr_ns(task, ns); |
a593d6ed ON |
516 | |
517 | unlock_task_sighand(task, &flags); | |
1da177e4 | 518 | } |
1da177e4 | 519 | |
f83ce3e6 | 520 | if (permitted && (!whole || num_threads < 2)) |
1da177e4 LT |
521 | wchan = get_wchan(task); |
522 | if (!whole) { | |
523 | min_flt = task->min_flt; | |
524 | maj_flt = task->maj_flt; | |
e80d0a1a | 525 | task_cputime_adjusted(task, &utime, &stime); |
6fac4829 | 526 | gtime = task_gtime(task); |
1da177e4 LT |
527 | } |
528 | ||
529 | /* scale priority and nice values from timeslices to -20..20 */ | |
530 | /* to make it look like a "normal" Unix priority/nice value */ | |
531 | priority = task_prio(task); | |
532 | nice = task_nice(task); | |
533 | ||
1da177e4 | 534 | /* convert nsec -> ticks */ |
cf25e24d | 535 | start_time = nsec_to_clock_t(task->start_boottime); |
1da177e4 | 536 | |
d0f02231 AV |
537 | seq_put_decimal_ull(m, "", pid_nr_ns(pid, ns)); |
538 | seq_puts(m, " ("); | |
88b72b31 | 539 | proc_task_name(m, task, false); |
d0f02231 AV |
540 | seq_puts(m, ") "); |
541 | seq_putc(m, state); | |
75ba1d07 JP |
542 | seq_put_decimal_ll(m, " ", ppid); |
543 | seq_put_decimal_ll(m, " ", pgid); | |
544 | seq_put_decimal_ll(m, " ", sid); | |
545 | seq_put_decimal_ll(m, " ", tty_nr); | |
546 | seq_put_decimal_ll(m, " ", tty_pgrp); | |
547 | seq_put_decimal_ull(m, " ", task->flags); | |
548 | seq_put_decimal_ull(m, " ", min_flt); | |
549 | seq_put_decimal_ull(m, " ", cmin_flt); | |
550 | seq_put_decimal_ull(m, " ", maj_flt); | |
551 | seq_put_decimal_ull(m, " ", cmaj_flt); | |
5613fda9 FW |
552 | seq_put_decimal_ull(m, " ", nsec_to_clock_t(utime)); |
553 | seq_put_decimal_ull(m, " ", nsec_to_clock_t(stime)); | |
554 | seq_put_decimal_ll(m, " ", nsec_to_clock_t(cutime)); | |
555 | seq_put_decimal_ll(m, " ", nsec_to_clock_t(cstime)); | |
75ba1d07 JP |
556 | seq_put_decimal_ll(m, " ", priority); |
557 | seq_put_decimal_ll(m, " ", nice); | |
558 | seq_put_decimal_ll(m, " ", num_threads); | |
559 | seq_put_decimal_ull(m, " ", 0); | |
560 | seq_put_decimal_ull(m, " ", start_time); | |
561 | seq_put_decimal_ull(m, " ", vsize); | |
562 | seq_put_decimal_ull(m, " ", mm ? get_mm_rss(mm) : 0); | |
563 | seq_put_decimal_ull(m, " ", rsslim); | |
564 | seq_put_decimal_ull(m, " ", mm ? (permitted ? mm->start_code : 1) : 0); | |
565 | seq_put_decimal_ull(m, " ", mm ? (permitted ? mm->end_code : 1) : 0); | |
566 | seq_put_decimal_ull(m, " ", (permitted && mm) ? mm->start_stack : 0); | |
567 | seq_put_decimal_ull(m, " ", esp); | |
568 | seq_put_decimal_ull(m, " ", eip); | |
bda7bad6 KH |
569 | /* The signal information here is obsolete. |
570 | * It must be decimal for Linux 2.0 compatibility. | |
571 | * Use /proc/#/status for real-time signals. | |
572 | */ | |
75ba1d07 JP |
573 | seq_put_decimal_ull(m, " ", task->pending.signal.sig[0] & 0x7fffffffUL); |
574 | seq_put_decimal_ull(m, " ", task->blocked.sig[0] & 0x7fffffffUL); | |
575 | seq_put_decimal_ull(m, " ", sigign.sig[0] & 0x7fffffffUL); | |
576 | seq_put_decimal_ull(m, " ", sigcatch.sig[0] & 0x7fffffffUL); | |
b2f73922 IM |
577 | |
578 | /* | |
579 | * We used to output the absolute kernel address, but that's an | |
580 | * information leak - so instead we show a 0/1 flag here, to signal | |
581 | * to user-space whether there's a wchan field in /proc/PID/wchan. | |
582 | * | |
583 | * This works with older implementations of procps as well. | |
584 | */ | |
585 | if (wchan) | |
586 | seq_puts(m, " 1"); | |
587 | else | |
588 | seq_puts(m, " 0"); | |
589 | ||
75ba1d07 JP |
590 | seq_put_decimal_ull(m, " ", 0); |
591 | seq_put_decimal_ull(m, " ", 0); | |
592 | seq_put_decimal_ll(m, " ", task->exit_signal); | |
593 | seq_put_decimal_ll(m, " ", task_cpu(task)); | |
594 | seq_put_decimal_ull(m, " ", task->rt_priority); | |
595 | seq_put_decimal_ull(m, " ", task->policy); | |
596 | seq_put_decimal_ull(m, " ", delayacct_blkio_ticks(task)); | |
16a6d9be FW |
597 | seq_put_decimal_ull(m, " ", nsec_to_clock_t(gtime)); |
598 | seq_put_decimal_ll(m, " ", nsec_to_clock_t(cgtime)); | |
5b172087 CG |
599 | |
600 | if (mm && permitted) { | |
75ba1d07 JP |
601 | seq_put_decimal_ull(m, " ", mm->start_data); |
602 | seq_put_decimal_ull(m, " ", mm->end_data); | |
603 | seq_put_decimal_ull(m, " ", mm->start_brk); | |
604 | seq_put_decimal_ull(m, " ", mm->arg_start); | |
605 | seq_put_decimal_ull(m, " ", mm->arg_end); | |
606 | seq_put_decimal_ull(m, " ", mm->env_start); | |
607 | seq_put_decimal_ull(m, " ", mm->env_end); | |
5b172087 | 608 | } else |
75ba1d07 | 609 | seq_puts(m, " 0 0 0 0 0 0 0"); |
5b172087 CG |
610 | |
611 | if (permitted) | |
75ba1d07 | 612 | seq_put_decimal_ll(m, " ", task->exit_code); |
5b172087 | 613 | else |
75ba1d07 | 614 | seq_puts(m, " 0"); |
5b172087 | 615 | |
bda7bad6 | 616 | seq_putc(m, '\n'); |
8ea02606 | 617 | if (mm) |
1da177e4 | 618 | mmput(mm); |
ee992744 | 619 | return 0; |
1da177e4 LT |
620 | } |
621 | ||
ee992744 EB |
622 | int proc_tid_stat(struct seq_file *m, struct pid_namespace *ns, |
623 | struct pid *pid, struct task_struct *task) | |
1da177e4 | 624 | { |
ee992744 | 625 | return do_task_stat(m, ns, pid, task, 0); |
1da177e4 LT |
626 | } |
627 | ||
ee992744 EB |
628 | int proc_tgid_stat(struct seq_file *m, struct pid_namespace *ns, |
629 | struct pid *pid, struct task_struct *task) | |
1da177e4 | 630 | { |
ee992744 | 631 | return do_task_stat(m, ns, pid, task, 1); |
1da177e4 LT |
632 | } |
633 | ||
a56d3fc7 EB |
634 | int proc_pid_statm(struct seq_file *m, struct pid_namespace *ns, |
635 | struct pid *pid, struct task_struct *task) | |
1da177e4 | 636 | { |
1da177e4 | 637 | struct mm_struct *mm = get_task_mm(task); |
8ea02606 | 638 | |
1da177e4 | 639 | if (mm) { |
5c5ab971 AD |
640 | unsigned long size; |
641 | unsigned long resident = 0; | |
642 | unsigned long shared = 0; | |
643 | unsigned long text = 0; | |
644 | unsigned long data = 0; | |
645 | ||
1da177e4 LT |
646 | size = task_statm(mm, &shared, &text, &data, &resident); |
647 | mmput(mm); | |
1da177e4 | 648 | |
5c5ab971 AD |
649 | /* |
650 | * For quick read, open code by putting numbers directly | |
651 | * expected format is | |
652 | * seq_printf(m, "%lu %lu %lu %lu 0 %lu 0\n", | |
653 | * size, resident, shared, text, data); | |
654 | */ | |
655 | seq_put_decimal_ull(m, "", size); | |
656 | seq_put_decimal_ull(m, " ", resident); | |
657 | seq_put_decimal_ull(m, " ", shared); | |
658 | seq_put_decimal_ull(m, " ", text); | |
659 | seq_put_decimal_ull(m, " ", 0); | |
660 | seq_put_decimal_ull(m, " ", data); | |
661 | seq_put_decimal_ull(m, " ", 0); | |
662 | seq_putc(m, '\n'); | |
663 | } else { | |
664 | seq_write(m, "0 0 0 0 0 0 0\n", 14); | |
665 | } | |
a56d3fc7 | 666 | return 0; |
1da177e4 | 667 | } |
81841161 | 668 | |
2e13ba54 | 669 | #ifdef CONFIG_PROC_CHILDREN |
81841161 CG |
670 | static struct pid * |
671 | get_children_pid(struct inode *inode, struct pid *pid_prev, loff_t pos) | |
672 | { | |
673 | struct task_struct *start, *task; | |
674 | struct pid *pid = NULL; | |
675 | ||
676 | read_lock(&tasklist_lock); | |
677 | ||
678 | start = pid_task(proc_pid(inode), PIDTYPE_PID); | |
679 | if (!start) | |
680 | goto out; | |
681 | ||
682 | /* | |
683 | * Lets try to continue searching first, this gives | |
684 | * us significant speedup on children-rich processes. | |
685 | */ | |
686 | if (pid_prev) { | |
687 | task = pid_task(pid_prev, PIDTYPE_PID); | |
688 | if (task && task->real_parent == start && | |
689 | !(list_empty(&task->sibling))) { | |
690 | if (list_is_last(&task->sibling, &start->children)) | |
691 | goto out; | |
692 | task = list_first_entry(&task->sibling, | |
693 | struct task_struct, sibling); | |
694 | pid = get_pid(task_pid(task)); | |
695 | goto out; | |
696 | } | |
697 | } | |
698 | ||
699 | /* | |
700 | * Slow search case. | |
701 | * | |
702 | * We might miss some children here if children | |
703 | * are exited while we were not holding the lock, | |
704 | * but it was never promised to be accurate that | |
705 | * much. | |
706 | * | |
707 | * "Just suppose that the parent sleeps, but N children | |
708 | * exit after we printed their tids. Now the slow paths | |
709 | * skips N extra children, we miss N tasks." (c) | |
710 | * | |
711 | * So one need to stop or freeze the leader and all | |
712 | * its children to get a precise result. | |
713 | */ | |
714 | list_for_each_entry(task, &start->children, sibling) { | |
715 | if (pos-- == 0) { | |
716 | pid = get_pid(task_pid(task)); | |
717 | break; | |
718 | } | |
719 | } | |
720 | ||
721 | out: | |
722 | read_unlock(&tasklist_lock); | |
723 | return pid; | |
724 | } | |
725 | ||
726 | static int children_seq_show(struct seq_file *seq, void *v) | |
727 | { | |
04015e3f | 728 | struct inode *inode = file_inode(seq->file); |
25ce3191 | 729 | |
9d78edea | 730 | seq_printf(seq, "%d ", pid_nr_ns(v, proc_pid_ns(inode->i_sb))); |
25ce3191 | 731 | return 0; |
81841161 CG |
732 | } |
733 | ||
734 | static void *children_seq_start(struct seq_file *seq, loff_t *pos) | |
735 | { | |
04015e3f | 736 | return get_children_pid(file_inode(seq->file), NULL, *pos); |
81841161 CG |
737 | } |
738 | ||
739 | static void *children_seq_next(struct seq_file *seq, void *v, loff_t *pos) | |
740 | { | |
741 | struct pid *pid; | |
742 | ||
04015e3f | 743 | pid = get_children_pid(file_inode(seq->file), v, *pos + 1); |
81841161 CG |
744 | put_pid(v); |
745 | ||
746 | ++*pos; | |
747 | return pid; | |
748 | } | |
749 | ||
750 | static void children_seq_stop(struct seq_file *seq, void *v) | |
751 | { | |
752 | put_pid(v); | |
753 | } | |
754 | ||
755 | static const struct seq_operations children_seq_ops = { | |
756 | .start = children_seq_start, | |
757 | .next = children_seq_next, | |
758 | .stop = children_seq_stop, | |
759 | .show = children_seq_show, | |
760 | }; | |
761 | ||
762 | static int children_seq_open(struct inode *inode, struct file *file) | |
763 | { | |
04015e3f | 764 | return seq_open(file, &children_seq_ops); |
81841161 CG |
765 | } |
766 | ||
81841161 CG |
767 | const struct file_operations proc_tid_children_operations = { |
768 | .open = children_seq_open, | |
769 | .read = seq_read, | |
770 | .llseek = seq_lseek, | |
171ef917 | 771 | .release = seq_release, |
81841161 | 772 | }; |
2e13ba54 | 773 | #endif /* CONFIG_PROC_CHILDREN */ |