Merge tag 'locking-core-2023-05-05' of git://git.kernel.org/pub/scm/linux/kernel...
[linux-block.git] / fs / proc / array.c
CommitLineData
b2441318 1// SPDX-License-Identifier: GPL-2.0
1da177e4
LT
2/*
3 * linux/fs/proc/array.c
4 *
5 * Copyright (C) 1992 by Linus Torvalds
6 * based on ideas by Darren Senn
7 *
8 * Fixes:
9 * Michael. K. Johnson: stat,statm extensions.
10 * <johnsonm@stolaf.edu>
11 *
12 * Pauline Middelink : Made cmdline,envline only break at '\0's, to
13 * make sure SET_PROCTITLE works. Also removed
14 * bad '!' which forced address recalculation for
15 * EVERY character on the current page.
16 * <middelin@polyware.iaf.nl>
17 *
18 * Danny ter Haar : added cpuinfo
19 * <dth@cistron.nl>
20 *
21 * Alessandro Rubini : profile extension.
22 * <rubini@ipvvis.unipv.it>
23 *
24 * Jeff Tranter : added BogoMips field to cpuinfo
25 * <Jeff_Tranter@Mitel.COM>
26 *
27 * Bruno Haible : remove 4K limit for the maps file
28 * <haible@ma2s2.mathematik.uni-karlsruhe.de>
29 *
30 * Yves Arrouye : remove removal of trailing spaces in get_array.
31 * <Yves.Arrouye@marin.fdn.fr>
32 *
33 * Jerome Forissier : added per-CPU time information to /proc/stat
34 * and /proc/<pid>/cpu extension
35 * <forissier@isia.cma.fr>
36 * - Incorporation and non-SMP safe operation
37 * of forissier patch in 2.1.78 by
38 * Hans Marcus <crowbar@concepts.nl>
39 *
40 * aeb@cwi.nl : /proc/partitions
41 *
42 *
43 * Alan Cox : security fixes.
526719ba 44 * <alan@lxorguk.ukuu.org.uk>
1da177e4
LT
45 *
46 * Al Viro : safe handling of mm_struct
47 *
48 * Gerhard Wichert : added BIGMEM support
49 * Siemens AG <Gerhard.Wichert@pdb.siemens.de>
50 *
51 * Al Viro & Jeff Garzik : moved most of the thing into base.c and
52 * : proc_misc.c. The rest may eventually go into
53 * : base.c too.
54 */
55
1da177e4
LT
56#include <linux/types.h>
57#include <linux/errno.h>
58#include <linux/time.h>
3ae700ec 59#include <linux/time_namespace.h>
1da177e4
LT
60#include <linux/kernel.h>
61#include <linux/kernel_stat.h>
62#include <linux/tty.h>
63#include <linux/string.h>
64#include <linux/mman.h>
6e84f315 65#include <linux/sched/mm.h>
6a3827d7 66#include <linux/sched/numa_balancing.h>
fd7d5627 67#include <linux/sched/task_stack.h>
29930025 68#include <linux/sched/task.h>
32ef5517 69#include <linux/sched/cputime.h>
1da177e4
LT
70#include <linux/proc_fs.h>
71#include <linux/ioport.h>
8ea02606 72#include <linux/io.h>
1da177e4
LT
73#include <linux/mm.h>
74#include <linux/hugetlb.h>
75#include <linux/pagemap.h>
76#include <linux/swap.h>
1da177e4
LT
77#include <linux/smp.h>
78#include <linux/signal.h>
79#include <linux/highmem.h>
80#include <linux/file.h>
9f3acc31 81#include <linux/fdtable.h>
1da177e4
LT
82#include <linux/times.h>
83#include <linux/cpuset.h>
4fb3a538 84#include <linux/rcupdate.h>
25890454 85#include <linux/delayacct.h>
ee992744 86#include <linux/seq_file.h>
b488893a 87#include <linux/pid_namespace.h>
fae1fa0f 88#include <linux/prctl.h>
f83ce3e6 89#include <linux/ptrace.h>
edc924e0 90#include <linux/string_helpers.h>
ae2975bc 91#include <linux/user_namespace.h>
3e42979e 92#include <linux/fs_struct.h>
d6986ce2 93#include <linux/kthread.h>
f7d30434 94#include <linux/mmu_context.h>
1da177e4 95
1da177e4
LT
96#include <asm/processor.h>
97#include "internal.h"
98
88b72b31 99void proc_task_name(struct seq_file *m, struct task_struct *p, bool escape)
1da177e4 100{
6b59808b 101 char tcomm[64];
1da177e4 102
ed8fb78d
AD
103 /*
104 * Test before PF_KTHREAD because all workqueue worker threads are
105 * kernel threads.
106 */
6b59808b
TH
107 if (p->flags & PF_WQ_WORKER)
108 wq_worker_comm(tcomm, sizeof(tcomm), p);
d6986ce2
YS
109 else if (p->flags & PF_KTHREAD)
110 get_kthread_comm(tcomm, sizeof(tcomm), p);
6b59808b
TH
111 else
112 __get_task_comm(tcomm, sizeof(tcomm), p);
edc924e0 113
8d23b208
CH
114 if (escape)
115 seq_escape_str(m, tcomm, ESCAPE_SPACE | ESCAPE_SPECIAL, "\n\\");
116 else
117 seq_printf(m, "%.64s", tcomm);
1da177e4
LT
118}
119
120/*
121 * The task state array is a strange "bitmap" of
122 * reasons to sleep. Thus "running" is zero, and
123 * you can test for combinations of others with
124 * simple bit tests.
125 */
e130aa70 126static const char * const task_state_array[] = {
06eb6184
PZ
127
128 /* states in TASK_REPORT: */
129 "R (running)", /* 0x00 */
130 "S (sleeping)", /* 0x01 */
131 "D (disk sleep)", /* 0x02 */
132 "T (stopped)", /* 0x04 */
133 "t (tracing stop)", /* 0x08 */
134 "X (dead)", /* 0x10 */
135 "Z (zombie)", /* 0x20 */
8ef9925b 136 "P (parked)", /* 0x40 */
06eb6184
PZ
137
138 /* states beyond TASK_REPORT: */
8ef9925b 139 "I (idle)", /* 0x80 */
1da177e4
LT
140};
141
8ea02606 142static inline const char *get_task_state(struct task_struct *tsk)
1da177e4 143{
06eb6184 144 BUILD_BUG_ON(1 + ilog2(TASK_REPORT_MAX) != ARRAY_SIZE(task_state_array));
1d48b080 145 return task_state_array[task_state_index(tsk)];
1da177e4
LT
146}
147
df5f8314
EB
148static inline void task_state(struct seq_file *m, struct pid_namespace *ns,
149 struct pid *pid, struct task_struct *p)
1da177e4 150{
e9f238c3 151 struct user_namespace *user_ns = seq_user_ns(m);
1da177e4 152 struct group_info *group_info;
68c3411f 153 int g, umask = -1;
abdba6e9 154 struct task_struct *tracer;
c69e8d9c 155 const struct cred *cred;
abdba6e9 156 pid_t ppid, tpid = 0, tgid, ngid;
0f4a0d53 157 unsigned int max_fds = 0;
1da177e4 158
b0fa9db6 159 rcu_read_lock();
b488893a
PE
160 ppid = pid_alive(p) ?
161 task_tgid_nr_ns(rcu_dereference(p->real_parent), ns) : 0;
abdba6e9
ON
162
163 tracer = ptrace_parent(p);
164 if (tracer)
165 tpid = task_pid_nr_ns(tracer, ns);
b0fafc11
ON
166
167 tgid = task_tgid_nr_ns(p, ns);
168 ngid = task_numa_group_id(p);
de09a977 169 cred = get_task_cred(p);
0f4a0d53
ON
170
171 task_lock(p);
68c3411f
MG
172 if (p->fs)
173 umask = p->fs->umask;
0f4a0d53
ON
174 if (p->files)
175 max_fds = files_fdtable(p->files)->max_fds;
176 task_unlock(p);
b0fafc11 177 rcu_read_unlock();
0f4a0d53 178
68c3411f
MG
179 if (umask >= 0)
180 seq_printf(m, "Umask:\t%#04o\n", umask);
d0f02231
AV
181 seq_puts(m, "State:\t");
182 seq_puts(m, get_task_state(p));
f7a5f132 183
75ba1d07
JP
184 seq_put_decimal_ull(m, "\nTgid:\t", tgid);
185 seq_put_decimal_ull(m, "\nNgid:\t", ngid);
186 seq_put_decimal_ull(m, "\nPid:\t", pid_nr_ns(pid, ns));
187 seq_put_decimal_ull(m, "\nPPid:\t", ppid);
188 seq_put_decimal_ull(m, "\nTracerPid:\t", tpid);
189 seq_put_decimal_ull(m, "\nUid:\t", from_kuid_munged(user_ns, cred->uid));
190 seq_put_decimal_ull(m, "\t", from_kuid_munged(user_ns, cred->euid));
191 seq_put_decimal_ull(m, "\t", from_kuid_munged(user_ns, cred->suid));
192 seq_put_decimal_ull(m, "\t", from_kuid_munged(user_ns, cred->fsuid));
193 seq_put_decimal_ull(m, "\nGid:\t", from_kgid_munged(user_ns, cred->gid));
194 seq_put_decimal_ull(m, "\t", from_kgid_munged(user_ns, cred->egid));
195 seq_put_decimal_ull(m, "\t", from_kgid_munged(user_ns, cred->sgid));
196 seq_put_decimal_ull(m, "\t", from_kgid_munged(user_ns, cred->fsgid));
197 seq_put_decimal_ull(m, "\nFDSize:\t", max_fds);
f7a5f132
AD
198
199 seq_puts(m, "\nGroups:\t");
c69e8d9c 200 group_info = cred->group_info;
8d238027 201 for (g = 0; g < group_info->ngroups; g++)
75ba1d07 202 seq_put_decimal_ull(m, g ? " " : "",
81243eac 203 from_kgid_munged(user_ns, group_info->gid[g]));
c69e8d9c 204 put_cred(cred);
f7a5f132
AD
205 /* Trailing space shouldn't have been added in the first place. */
206 seq_putc(m, ' ');
1da177e4 207
e4bc3324
CH
208#ifdef CONFIG_PID_NS
209 seq_puts(m, "\nNStgid:");
210 for (g = ns->level; g <= pid->level; g++)
75ba1d07 211 seq_put_decimal_ull(m, "\t", task_tgid_nr_ns(p, pid->numbers[g].ns));
e4bc3324
CH
212 seq_puts(m, "\nNSpid:");
213 for (g = ns->level; g <= pid->level; g++)
75ba1d07 214 seq_put_decimal_ull(m, "\t", task_pid_nr_ns(p, pid->numbers[g].ns));
e4bc3324
CH
215 seq_puts(m, "\nNSpgid:");
216 for (g = ns->level; g <= pid->level; g++)
75ba1d07 217 seq_put_decimal_ull(m, "\t", task_pgrp_nr_ns(p, pid->numbers[g].ns));
e4bc3324
CH
218 seq_puts(m, "\nNSsid:");
219 for (g = ns->level; g <= pid->level; g++)
75ba1d07 220 seq_put_decimal_ull(m, "\t", task_session_nr_ns(p, pid->numbers[g].ns));
e4bc3324 221#endif
9d6de12f 222 seq_putc(m, '\n');
522dc4e5
CW
223
224 seq_printf(m, "Kthread:\t%c\n", p->flags & PF_KTHREAD ? '1' : '0');
1da177e4
LT
225}
226
138d22b5 227void render_sigset_t(struct seq_file *m, const char *header,
df5f8314 228 sigset_t *set)
1da177e4 229{
df5f8314 230 int i;
1da177e4 231
9d6de12f 232 seq_puts(m, header);
1da177e4
LT
233
234 i = _NSIG;
235 do {
236 int x = 0;
237
238 i -= 4;
239 if (sigismember(set, i+1)) x |= 1;
240 if (sigismember(set, i+2)) x |= 2;
241 if (sigismember(set, i+3)) x |= 4;
242 if (sigismember(set, i+4)) x |= 8;
209b14dc 243 seq_putc(m, hex_asc[x]);
1da177e4
LT
244 } while (i >= 4);
245
9d6de12f 246 seq_putc(m, '\n');
1da177e4
LT
247}
248
8977a27b
AD
249static void collect_sigign_sigcatch(struct task_struct *p, sigset_t *sigign,
250 sigset_t *sigcatch)
1da177e4
LT
251{
252 struct k_sigaction *k;
253 int i;
254
255 k = p->sighand->action;
256 for (i = 1; i <= _NSIG; ++i, ++k) {
257 if (k->sa.sa_handler == SIG_IGN)
8977a27b 258 sigaddset(sigign, i);
1da177e4 259 else if (k->sa.sa_handler != SIG_DFL)
8977a27b 260 sigaddset(sigcatch, i);
1da177e4
LT
261 }
262}
263
df5f8314 264static inline void task_sig(struct seq_file *m, struct task_struct *p)
1da177e4 265{
5e6b3f42 266 unsigned long flags;
1da177e4
LT
267 sigset_t pending, shpending, blocked, ignored, caught;
268 int num_threads = 0;
197850a1 269 unsigned int qsize = 0;
1da177e4
LT
270 unsigned long qlim = 0;
271
272 sigemptyset(&pending);
273 sigemptyset(&shpending);
274 sigemptyset(&blocked);
275 sigemptyset(&ignored);
276 sigemptyset(&caught);
277
5e6b3f42 278 if (lock_task_sighand(p, &flags)) {
1da177e4
LT
279 pending = p->pending.signal;
280 shpending = p->signal->shared_pending.signal;
281 blocked = p->blocked;
282 collect_sigign_sigcatch(p, &ignored, &caught);
7e49827c 283 num_threads = get_nr_threads(p);
7dc52157 284 rcu_read_lock(); /* FIXME: is this correct? */
de399236 285 qsize = get_rlimit_value(task_ucounts(p), UCOUNT_RLIMIT_SIGPENDING);
7dc52157 286 rcu_read_unlock();
d554ed89 287 qlim = task_rlimit(p, RLIMIT_SIGPENDING);
5e6b3f42 288 unlock_task_sighand(p, &flags);
1da177e4 289 }
1da177e4 290
75ba1d07
JP
291 seq_put_decimal_ull(m, "Threads:\t", num_threads);
292 seq_put_decimal_ull(m, "\nSigQ:\t", qsize);
293 seq_put_decimal_ull(m, "/", qlim);
1da177e4
LT
294
295 /* render them all */
f7a5f132 296 render_sigset_t(m, "\nSigPnd:\t", &pending);
df5f8314
EB
297 render_sigset_t(m, "ShdPnd:\t", &shpending);
298 render_sigset_t(m, "SigBlk:\t", &blocked);
299 render_sigset_t(m, "SigIgn:\t", &ignored);
300 render_sigset_t(m, "SigCgt:\t", &caught);
1da177e4
LT
301}
302
df5f8314
EB
303static void render_cap_t(struct seq_file *m, const char *header,
304 kernel_cap_t *a)
e338d263 305{
9d6de12f 306 seq_puts(m, header);
f122a08b 307 seq_put_hex_ll(m, NULL, a->val, 16);
9d6de12f 308 seq_putc(m, '\n');
e338d263
AM
309}
310
df5f8314 311static inline void task_cap(struct seq_file *m, struct task_struct *p)
1da177e4 312{
c69e8d9c 313 const struct cred *cred;
58319057
AL
314 kernel_cap_t cap_inheritable, cap_permitted, cap_effective,
315 cap_bset, cap_ambient;
b6dff3ec 316
c69e8d9c
DH
317 rcu_read_lock();
318 cred = __task_cred(p);
319 cap_inheritable = cred->cap_inheritable;
320 cap_permitted = cred->cap_permitted;
321 cap_effective = cred->cap_effective;
322 cap_bset = cred->cap_bset;
58319057 323 cap_ambient = cred->cap_ambient;
c69e8d9c
DH
324 rcu_read_unlock();
325
326 render_cap_t(m, "CapInh:\t", &cap_inheritable);
327 render_cap_t(m, "CapPrm:\t", &cap_permitted);
328 render_cap_t(m, "CapEff:\t", &cap_effective);
329 render_cap_t(m, "CapBnd:\t", &cap_bset);
58319057 330 render_cap_t(m, "CapAmb:\t", &cap_ambient);
1da177e4
LT
331}
332
2f4b3bf6
KC
333static inline void task_seccomp(struct seq_file *m, struct task_struct *p)
334{
af884cd4 335 seq_put_decimal_ull(m, "NoNewPrivs:\t", task_no_new_privs(p));
2f4b3bf6 336#ifdef CONFIG_SECCOMP
af884cd4 337 seq_put_decimal_ull(m, "\nSeccomp:\t", p->seccomp.mode);
64bdc024 338#ifdef CONFIG_SECCOMP_FILTER
c818c03b
KC
339 seq_put_decimal_ull(m, "\nSeccomp_filters:\t",
340 atomic_read(&p->seccomp.filter_count));
64bdc024 341#endif
2f4b3bf6 342#endif
08b55775 343 seq_puts(m, "\nSpeculation_Store_Bypass:\t");
fae1fa0f
KC
344 switch (arch_prctl_spec_ctrl_get(p, PR_SPEC_STORE_BYPASS)) {
345 case -EINVAL:
08b55775 346 seq_puts(m, "unknown");
fae1fa0f
KC
347 break;
348 case PR_SPEC_NOT_AFFECTED:
08b55775 349 seq_puts(m, "not vulnerable");
fae1fa0f 350 break;
356e4bff 351 case PR_SPEC_PRCTL | PR_SPEC_FORCE_DISABLE:
08b55775 352 seq_puts(m, "thread force mitigated");
356e4bff 353 break;
fae1fa0f 354 case PR_SPEC_PRCTL | PR_SPEC_DISABLE:
08b55775 355 seq_puts(m, "thread mitigated");
fae1fa0f
KC
356 break;
357 case PR_SPEC_PRCTL | PR_SPEC_ENABLE:
08b55775 358 seq_puts(m, "thread vulnerable");
fae1fa0f
KC
359 break;
360 case PR_SPEC_DISABLE:
08b55775 361 seq_puts(m, "globally mitigated");
fae1fa0f
KC
362 break;
363 default:
08b55775 364 seq_puts(m, "vulnerable");
fae1fa0f
KC
365 break;
366 }
fe719888
AM
367
368 seq_puts(m, "\nSpeculationIndirectBranch:\t");
369 switch (arch_prctl_spec_ctrl_get(p, PR_SPEC_INDIRECT_BRANCH)) {
370 case -EINVAL:
371 seq_puts(m, "unsupported");
372 break;
373 case PR_SPEC_NOT_AFFECTED:
374 seq_puts(m, "not affected");
375 break;
376 case PR_SPEC_PRCTL | PR_SPEC_FORCE_DISABLE:
377 seq_puts(m, "conditional force disabled");
378 break;
379 case PR_SPEC_PRCTL | PR_SPEC_DISABLE:
380 seq_puts(m, "conditional disabled");
381 break;
382 case PR_SPEC_PRCTL | PR_SPEC_ENABLE:
383 seq_puts(m, "conditional enabled");
384 break;
385 case PR_SPEC_ENABLE:
386 seq_puts(m, "always enabled");
387 break;
388 case PR_SPEC_DISABLE:
389 seq_puts(m, "always disabled");
390 break;
391 default:
392 seq_puts(m, "unknown");
393 break;
394 }
af884cd4 395 seq_putc(m, '\n');
2f4b3bf6
KC
396}
397
df5f8314
EB
398static inline void task_context_switch_counts(struct seq_file *m,
399 struct task_struct *p)
b663a79c 400{
75ba1d07
JP
401 seq_put_decimal_ull(m, "voluntary_ctxt_switches:\t", p->nvcsw);
402 seq_put_decimal_ull(m, "\nnonvoluntary_ctxt_switches:\t", p->nivcsw);
f7a5f132 403 seq_putc(m, '\n');
b663a79c
MU
404}
405
d01d4827
HC
406static void task_cpus_allowed(struct seq_file *m, struct task_struct *task)
407{
a0c2e07d 408 seq_printf(m, "Cpus_allowed:\t%*pb\n",
86fbcd3b 409 cpumask_pr_args(&task->cpus_mask));
a0c2e07d 410 seq_printf(m, "Cpus_allowed_list:\t%*pbl\n",
86fbcd3b 411 cpumask_pr_args(&task->cpus_mask));
d01d4827
HC
412}
413
0258b5fd 414static inline void task_core_dumping(struct seq_file *m, struct task_struct *task)
c6434012 415{
0258b5fd 416 seq_put_decimal_ull(m, "CoreDumping:\t", !!task->signal->core_state);
d0f02231 417 seq_putc(m, '\n');
c6434012
RG
418}
419
a1400af7
MH
420static inline void task_thp_status(struct seq_file *m, struct mm_struct *mm)
421{
422 bool thp_enabled = IS_ENABLED(CONFIG_TRANSPARENT_HUGEPAGE);
423
424 if (thp_enabled)
425 thp_enabled = !test_bit(MMF_DISABLE_THP, &mm->flags);
426 seq_printf(m, "THP_enabled:\t%d\n", thp_enabled);
427}
428
f7d30434
KS
429static inline void task_untag_mask(struct seq_file *m, struct mm_struct *mm)
430{
431 seq_printf(m, "untag_mask:\t%#lx\n", mm_untag_mask(mm));
432}
433
df5f8314
EB
434int proc_pid_status(struct seq_file *m, struct pid_namespace *ns,
435 struct pid *pid, struct task_struct *task)
1da177e4 436{
1da177e4
LT
437 struct mm_struct *mm = get_task_mm(task);
438
88b72b31
TH
439 seq_puts(m, "Name:\t");
440 proc_task_name(m, task, true);
441 seq_putc(m, '\n');
442
df5f8314 443 task_state(m, ns, pid, task);
8ea02606 444
1da177e4 445 if (mm) {
df5f8314 446 task_mem(m, mm);
0258b5fd 447 task_core_dumping(m, task);
a1400af7 448 task_thp_status(m, mm);
f7d30434 449 task_untag_mask(m, mm);
1da177e4
LT
450 mmput(mm);
451 }
df5f8314
EB
452 task_sig(m, task);
453 task_cap(m, task);
2f4b3bf6 454 task_seccomp(m, task);
d01d4827 455 task_cpus_allowed(m, task);
df5f8314 456 cpuset_task_status_allowed(m, task);
df5f8314
EB
457 task_context_switch_counts(m, task);
458 return 0;
1da177e4
LT
459}
460
ee992744
EB
461static int do_task_stat(struct seq_file *m, struct pid_namespace *ns,
462 struct pid *pid, struct task_struct *task, int whole)
1da177e4 463{
b2f73922 464 unsigned long vsize, eip, esp, wchan = 0;
715be1fc 465 int priority, nice;
1da177e4
LT
466 int tty_pgrp = -1, tty_nr = 0;
467 sigset_t sigign, sigcatch;
468 char state;
8ea02606 469 pid_t ppid = 0, pgid = -1, sid = -1;
1da177e4 470 int num_threads = 0;
f83ce3e6 471 int permitted;
1da177e4
LT
472 struct mm_struct *mm;
473 unsigned long long start_time;
474 unsigned long cmin_flt = 0, cmaj_flt = 0;
475 unsigned long min_flt = 0, maj_flt = 0;
5613fda9 476 u64 cutime, cstime, utime, stime;
16a6d9be 477 u64 cgtime, gtime;
1da177e4 478 unsigned long rsslim = 0;
a593d6ed 479 unsigned long flags;
2d18f7f4 480 int exit_code = task->exit_code;
1da177e4
LT
481
482 state = *get_task_state(task);
483 vsize = eip = esp = 0;
caaee623 484 permitted = ptrace_may_access(task, PTRACE_MODE_READ_FSCREDS | PTRACE_MODE_NOAUDIT);
1da177e4
LT
485 mm = get_task_mm(task);
486 if (mm) {
487 vsize = task_vsize(mm);
0a1eb2d4
AL
488 /*
489 * esp and eip are intentionally zeroed out. There is no
490 * non-racy way to read them without freezing the task.
491 * Programs that need reliable values can use ptrace(2).
fd7d5627
JO
492 *
493 * The only exception is if the task is core dumping because
494 * a program is not able to use ptrace(2) in that case. It is
495 * safe because the task has stopped executing permanently.
0a1eb2d4 496 */
cb8f381f 497 if (permitted && (task->flags & (PF_EXITING|PF_DUMPCORE))) {
8bb2ee19
AD
498 if (try_get_task_stack(task)) {
499 eip = KSTK_EIP(task);
500 esp = KSTK_ESP(task);
501 put_task_stack(task);
502 }
fd7d5627 503 }
1da177e4
LT
504 }
505
1da177e4
LT
506 sigemptyset(&sigign);
507 sigemptyset(&sigcatch);
64861634
MS
508 cutime = cstime = utime = stime = 0;
509 cgtime = gtime = 0;
3cfd0885 510
a593d6ed
ON
511 if (lock_task_sighand(task, &flags)) {
512 struct signal_struct *sig = task->signal;
91593504
ON
513
514 if (sig->tty) {
5d0fdf1e
AC
515 struct pid *pgrp = tty_get_pgrp(sig->tty);
516 tty_pgrp = pid_nr_ns(pgrp, ns);
517 put_pid(pgrp);
91593504 518 tty_nr = new_encode_dev(tty_devnum(sig->tty));
a593d6ed
ON
519 }
520
7e49827c 521 num_threads = get_nr_threads(task);
1da177e4
LT
522 collect_sigign_sigcatch(task, &sigign, &sigcatch);
523
a593d6ed
ON
524 cmin_flt = sig->cmin_flt;
525 cmaj_flt = sig->cmaj_flt;
526 cutime = sig->cutime;
527 cstime = sig->cstime;
9ac52315 528 cgtime = sig->cgtime;
6aa7de05 529 rsslim = READ_ONCE(sig->rlim[RLIMIT_RSS].rlim_cur);
a593d6ed 530
1da177e4
LT
531 /* add up live thread stats at the group level */
532 if (whole) {
a593d6ed 533 struct task_struct *t = task;
1da177e4
LT
534 do {
535 min_flt += t->min_flt;
536 maj_flt += t->maj_flt;
6fac4829 537 gtime += task_gtime(t);
185ee40e 538 } while_each_thread(task, t);
1da177e4 539
a593d6ed
ON
540 min_flt += sig->min_flt;
541 maj_flt += sig->maj_flt;
e80d0a1a 542 thread_group_cputime_adjusted(task, &utime, &stime);
64861634 543 gtime += sig->gtime;
2d18f7f4
EB
544
545 if (sig->flags & (SIGNAL_GROUP_EXIT | SIGNAL_STOP_STOPPED))
546 exit_code = sig->group_exit_code;
1da177e4 547 }
a593d6ed 548
b488893a 549 sid = task_session_nr_ns(task, ns);
a98fdcef 550 ppid = task_tgid_nr_ns(task->real_parent, ns);
b488893a 551 pgid = task_pgrp_nr_ns(task, ns);
a593d6ed
ON
552
553 unlock_task_sighand(task, &flags);
1da177e4 554 }
1da177e4 555
f83ce3e6 556 if (permitted && (!whole || num_threads < 2))
4e046156 557 wchan = !task_is_running(task);
1da177e4
LT
558 if (!whole) {
559 min_flt = task->min_flt;
560 maj_flt = task->maj_flt;
e80d0a1a 561 task_cputime_adjusted(task, &utime, &stime);
6fac4829 562 gtime = task_gtime(task);
1da177e4
LT
563 }
564
565 /* scale priority and nice values from timeslices to -20..20 */
566 /* to make it look like a "normal" Unix priority/nice value */
567 priority = task_prio(task);
568 nice = task_nice(task);
569
3ae700ec
MW
570 /* apply timens offset for boottime and convert nsec -> ticks */
571 start_time =
572 nsec_to_clock_t(timens_add_boottime_ns(task->start_boottime));
1da177e4 573
d0f02231
AV
574 seq_put_decimal_ull(m, "", pid_nr_ns(pid, ns));
575 seq_puts(m, " (");
88b72b31 576 proc_task_name(m, task, false);
d0f02231
AV
577 seq_puts(m, ") ");
578 seq_putc(m, state);
75ba1d07
JP
579 seq_put_decimal_ll(m, " ", ppid);
580 seq_put_decimal_ll(m, " ", pgid);
581 seq_put_decimal_ll(m, " ", sid);
582 seq_put_decimal_ll(m, " ", tty_nr);
583 seq_put_decimal_ll(m, " ", tty_pgrp);
584 seq_put_decimal_ull(m, " ", task->flags);
585 seq_put_decimal_ull(m, " ", min_flt);
586 seq_put_decimal_ull(m, " ", cmin_flt);
587 seq_put_decimal_ull(m, " ", maj_flt);
588 seq_put_decimal_ull(m, " ", cmaj_flt);
5613fda9
FW
589 seq_put_decimal_ull(m, " ", nsec_to_clock_t(utime));
590 seq_put_decimal_ull(m, " ", nsec_to_clock_t(stime));
591 seq_put_decimal_ll(m, " ", nsec_to_clock_t(cutime));
592 seq_put_decimal_ll(m, " ", nsec_to_clock_t(cstime));
75ba1d07
JP
593 seq_put_decimal_ll(m, " ", priority);
594 seq_put_decimal_ll(m, " ", nice);
595 seq_put_decimal_ll(m, " ", num_threads);
596 seq_put_decimal_ull(m, " ", 0);
597 seq_put_decimal_ull(m, " ", start_time);
598 seq_put_decimal_ull(m, " ", vsize);
599 seq_put_decimal_ull(m, " ", mm ? get_mm_rss(mm) : 0);
600 seq_put_decimal_ull(m, " ", rsslim);
601 seq_put_decimal_ull(m, " ", mm ? (permitted ? mm->start_code : 1) : 0);
602 seq_put_decimal_ull(m, " ", mm ? (permitted ? mm->end_code : 1) : 0);
603 seq_put_decimal_ull(m, " ", (permitted && mm) ? mm->start_stack : 0);
604 seq_put_decimal_ull(m, " ", esp);
605 seq_put_decimal_ull(m, " ", eip);
bda7bad6
KH
606 /* The signal information here is obsolete.
607 * It must be decimal for Linux 2.0 compatibility.
608 * Use /proc/#/status for real-time signals.
609 */
75ba1d07
JP
610 seq_put_decimal_ull(m, " ", task->pending.signal.sig[0] & 0x7fffffffUL);
611 seq_put_decimal_ull(m, " ", task->blocked.sig[0] & 0x7fffffffUL);
612 seq_put_decimal_ull(m, " ", sigign.sig[0] & 0x7fffffffUL);
613 seq_put_decimal_ull(m, " ", sigcatch.sig[0] & 0x7fffffffUL);
b2f73922
IM
614
615 /*
616 * We used to output the absolute kernel address, but that's an
617 * information leak - so instead we show a 0/1 flag here, to signal
618 * to user-space whether there's a wchan field in /proc/PID/wchan.
619 *
620 * This works with older implementations of procps as well.
621 */
4e046156 622 seq_put_decimal_ull(m, " ", wchan);
b2f73922 623
75ba1d07
JP
624 seq_put_decimal_ull(m, " ", 0);
625 seq_put_decimal_ull(m, " ", 0);
626 seq_put_decimal_ll(m, " ", task->exit_signal);
627 seq_put_decimal_ll(m, " ", task_cpu(task));
628 seq_put_decimal_ull(m, " ", task->rt_priority);
629 seq_put_decimal_ull(m, " ", task->policy);
630 seq_put_decimal_ull(m, " ", delayacct_blkio_ticks(task));
16a6d9be
FW
631 seq_put_decimal_ull(m, " ", nsec_to_clock_t(gtime));
632 seq_put_decimal_ll(m, " ", nsec_to_clock_t(cgtime));
5b172087
CG
633
634 if (mm && permitted) {
75ba1d07
JP
635 seq_put_decimal_ull(m, " ", mm->start_data);
636 seq_put_decimal_ull(m, " ", mm->end_data);
637 seq_put_decimal_ull(m, " ", mm->start_brk);
638 seq_put_decimal_ull(m, " ", mm->arg_start);
639 seq_put_decimal_ull(m, " ", mm->arg_end);
640 seq_put_decimal_ull(m, " ", mm->env_start);
641 seq_put_decimal_ull(m, " ", mm->env_end);
5b172087 642 } else
75ba1d07 643 seq_puts(m, " 0 0 0 0 0 0 0");
5b172087
CG
644
645 if (permitted)
2d18f7f4 646 seq_put_decimal_ll(m, " ", exit_code);
5b172087 647 else
75ba1d07 648 seq_puts(m, " 0");
5b172087 649
bda7bad6 650 seq_putc(m, '\n');
8ea02606 651 if (mm)
1da177e4 652 mmput(mm);
ee992744 653 return 0;
1da177e4
LT
654}
655
ee992744
EB
656int proc_tid_stat(struct seq_file *m, struct pid_namespace *ns,
657 struct pid *pid, struct task_struct *task)
1da177e4 658{
ee992744 659 return do_task_stat(m, ns, pid, task, 0);
1da177e4
LT
660}
661
ee992744
EB
662int proc_tgid_stat(struct seq_file *m, struct pid_namespace *ns,
663 struct pid *pid, struct task_struct *task)
1da177e4 664{
ee992744 665 return do_task_stat(m, ns, pid, task, 1);
1da177e4
LT
666}
667
a56d3fc7
EB
668int proc_pid_statm(struct seq_file *m, struct pid_namespace *ns,
669 struct pid *pid, struct task_struct *task)
1da177e4 670{
1da177e4 671 struct mm_struct *mm = get_task_mm(task);
8ea02606 672
1da177e4 673 if (mm) {
5c5ab971
AD
674 unsigned long size;
675 unsigned long resident = 0;
676 unsigned long shared = 0;
677 unsigned long text = 0;
678 unsigned long data = 0;
679
1da177e4
LT
680 size = task_statm(mm, &shared, &text, &data, &resident);
681 mmput(mm);
1da177e4 682
5c5ab971
AD
683 /*
684 * For quick read, open code by putting numbers directly
685 * expected format is
686 * seq_printf(m, "%lu %lu %lu %lu 0 %lu 0\n",
687 * size, resident, shared, text, data);
688 */
689 seq_put_decimal_ull(m, "", size);
690 seq_put_decimal_ull(m, " ", resident);
691 seq_put_decimal_ull(m, " ", shared);
692 seq_put_decimal_ull(m, " ", text);
693 seq_put_decimal_ull(m, " ", 0);
694 seq_put_decimal_ull(m, " ", data);
695 seq_put_decimal_ull(m, " ", 0);
696 seq_putc(m, '\n');
697 } else {
698 seq_write(m, "0 0 0 0 0 0 0\n", 14);
699 }
a56d3fc7 700 return 0;
1da177e4 701}
81841161 702
2e13ba54 703#ifdef CONFIG_PROC_CHILDREN
81841161
CG
704static struct pid *
705get_children_pid(struct inode *inode, struct pid *pid_prev, loff_t pos)
706{
707 struct task_struct *start, *task;
708 struct pid *pid = NULL;
709
710 read_lock(&tasklist_lock);
711
712 start = pid_task(proc_pid(inode), PIDTYPE_PID);
713 if (!start)
714 goto out;
715
716 /*
717 * Lets try to continue searching first, this gives
718 * us significant speedup on children-rich processes.
719 */
720 if (pid_prev) {
721 task = pid_task(pid_prev, PIDTYPE_PID);
722 if (task && task->real_parent == start &&
723 !(list_empty(&task->sibling))) {
724 if (list_is_last(&task->sibling, &start->children))
725 goto out;
726 task = list_first_entry(&task->sibling,
727 struct task_struct, sibling);
728 pid = get_pid(task_pid(task));
729 goto out;
730 }
731 }
732
733 /*
734 * Slow search case.
735 *
736 * We might miss some children here if children
737 * are exited while we were not holding the lock,
738 * but it was never promised to be accurate that
739 * much.
740 *
741 * "Just suppose that the parent sleeps, but N children
742 * exit after we printed their tids. Now the slow paths
743 * skips N extra children, we miss N tasks." (c)
744 *
745 * So one need to stop or freeze the leader and all
746 * its children to get a precise result.
747 */
748 list_for_each_entry(task, &start->children, sibling) {
749 if (pos-- == 0) {
750 pid = get_pid(task_pid(task));
751 break;
752 }
753 }
754
755out:
756 read_unlock(&tasklist_lock);
757 return pid;
758}
759
760static int children_seq_show(struct seq_file *seq, void *v)
761{
04015e3f 762 struct inode *inode = file_inode(seq->file);
25ce3191 763
9d78edea 764 seq_printf(seq, "%d ", pid_nr_ns(v, proc_pid_ns(inode->i_sb)));
25ce3191 765 return 0;
81841161
CG
766}
767
768static void *children_seq_start(struct seq_file *seq, loff_t *pos)
769{
04015e3f 770 return get_children_pid(file_inode(seq->file), NULL, *pos);
81841161
CG
771}
772
773static void *children_seq_next(struct seq_file *seq, void *v, loff_t *pos)
774{
775 struct pid *pid;
776
04015e3f 777 pid = get_children_pid(file_inode(seq->file), v, *pos + 1);
81841161
CG
778 put_pid(v);
779
780 ++*pos;
781 return pid;
782}
783
784static void children_seq_stop(struct seq_file *seq, void *v)
785{
786 put_pid(v);
787}
788
789static const struct seq_operations children_seq_ops = {
790 .start = children_seq_start,
791 .next = children_seq_next,
792 .stop = children_seq_stop,
793 .show = children_seq_show,
794};
795
796static int children_seq_open(struct inode *inode, struct file *file)
797{
04015e3f 798 return seq_open(file, &children_seq_ops);
81841161
CG
799}
800
81841161
CG
801const struct file_operations proc_tid_children_operations = {
802 .open = children_seq_open,
803 .read = seq_read,
804 .llseek = seq_lseek,
171ef917 805 .release = seq_release,
81841161 806};
2e13ba54 807#endif /* CONFIG_PROC_CHILDREN */