Merge tag 'rtc-6.8' of git://git.kernel.org/pub/scm/linux/kernel/git/abelloni/linux
[linux-block.git] / fs / proc / array.c
CommitLineData
b2441318 1// SPDX-License-Identifier: GPL-2.0
1da177e4
LT
2/*
3 * linux/fs/proc/array.c
4 *
5 * Copyright (C) 1992 by Linus Torvalds
6 * based on ideas by Darren Senn
7 *
8 * Fixes:
9 * Michael. K. Johnson: stat,statm extensions.
10 * <johnsonm@stolaf.edu>
11 *
12 * Pauline Middelink : Made cmdline,envline only break at '\0's, to
13 * make sure SET_PROCTITLE works. Also removed
14 * bad '!' which forced address recalculation for
15 * EVERY character on the current page.
16 * <middelin@polyware.iaf.nl>
17 *
18 * Danny ter Haar : added cpuinfo
19 * <dth@cistron.nl>
20 *
21 * Alessandro Rubini : profile extension.
22 * <rubini@ipvvis.unipv.it>
23 *
24 * Jeff Tranter : added BogoMips field to cpuinfo
25 * <Jeff_Tranter@Mitel.COM>
26 *
27 * Bruno Haible : remove 4K limit for the maps file
28 * <haible@ma2s2.mathematik.uni-karlsruhe.de>
29 *
30 * Yves Arrouye : remove removal of trailing spaces in get_array.
31 * <Yves.Arrouye@marin.fdn.fr>
32 *
33 * Jerome Forissier : added per-CPU time information to /proc/stat
34 * and /proc/<pid>/cpu extension
35 * <forissier@isia.cma.fr>
36 * - Incorporation and non-SMP safe operation
37 * of forissier patch in 2.1.78 by
38 * Hans Marcus <crowbar@concepts.nl>
39 *
40 * aeb@cwi.nl : /proc/partitions
41 *
42 *
43 * Alan Cox : security fixes.
526719ba 44 * <alan@lxorguk.ukuu.org.uk>
1da177e4
LT
45 *
46 * Al Viro : safe handling of mm_struct
47 *
48 * Gerhard Wichert : added BIGMEM support
49 * Siemens AG <Gerhard.Wichert@pdb.siemens.de>
50 *
51 * Al Viro & Jeff Garzik : moved most of the thing into base.c and
52 * : proc_misc.c. The rest may eventually go into
53 * : base.c too.
54 */
55
1da177e4
LT
56#include <linux/types.h>
57#include <linux/errno.h>
58#include <linux/time.h>
3ae700ec 59#include <linux/time_namespace.h>
1da177e4
LT
60#include <linux/kernel.h>
61#include <linux/kernel_stat.h>
62#include <linux/tty.h>
63#include <linux/string.h>
64#include <linux/mman.h>
6e84f315 65#include <linux/sched/mm.h>
6a3827d7 66#include <linux/sched/numa_balancing.h>
fd7d5627 67#include <linux/sched/task_stack.h>
29930025 68#include <linux/sched/task.h>
32ef5517 69#include <linux/sched/cputime.h>
1da177e4
LT
70#include <linux/proc_fs.h>
71#include <linux/ioport.h>
8ea02606 72#include <linux/io.h>
1da177e4
LT
73#include <linux/mm.h>
74#include <linux/hugetlb.h>
75#include <linux/pagemap.h>
76#include <linux/swap.h>
1da177e4
LT
77#include <linux/smp.h>
78#include <linux/signal.h>
79#include <linux/highmem.h>
80#include <linux/file.h>
9f3acc31 81#include <linux/fdtable.h>
1da177e4
LT
82#include <linux/times.h>
83#include <linux/cpuset.h>
4fb3a538 84#include <linux/rcupdate.h>
25890454 85#include <linux/delayacct.h>
ee992744 86#include <linux/seq_file.h>
b488893a 87#include <linux/pid_namespace.h>
fae1fa0f 88#include <linux/prctl.h>
f83ce3e6 89#include <linux/ptrace.h>
edc924e0 90#include <linux/string_helpers.h>
ae2975bc 91#include <linux/user_namespace.h>
3e42979e 92#include <linux/fs_struct.h>
d6986ce2 93#include <linux/kthread.h>
f7d30434 94#include <linux/mmu_context.h>
1da177e4 95
1da177e4
LT
96#include <asm/processor.h>
97#include "internal.h"
98
88b72b31 99void proc_task_name(struct seq_file *m, struct task_struct *p, bool escape)
1da177e4 100{
6b59808b 101 char tcomm[64];
1da177e4 102
ed8fb78d
AD
103 /*
104 * Test before PF_KTHREAD because all workqueue worker threads are
105 * kernel threads.
106 */
6b59808b
TH
107 if (p->flags & PF_WQ_WORKER)
108 wq_worker_comm(tcomm, sizeof(tcomm), p);
d6986ce2
YS
109 else if (p->flags & PF_KTHREAD)
110 get_kthread_comm(tcomm, sizeof(tcomm), p);
6b59808b
TH
111 else
112 __get_task_comm(tcomm, sizeof(tcomm), p);
edc924e0 113
8d23b208
CH
114 if (escape)
115 seq_escape_str(m, tcomm, ESCAPE_SPACE | ESCAPE_SPECIAL, "\n\\");
116 else
117 seq_printf(m, "%.64s", tcomm);
1da177e4
LT
118}
119
120/*
121 * The task state array is a strange "bitmap" of
122 * reasons to sleep. Thus "running" is zero, and
123 * you can test for combinations of others with
124 * simple bit tests.
125 */
e130aa70 126static const char * const task_state_array[] = {
06eb6184
PZ
127
128 /* states in TASK_REPORT: */
129 "R (running)", /* 0x00 */
130 "S (sleeping)", /* 0x01 */
131 "D (disk sleep)", /* 0x02 */
132 "T (stopped)", /* 0x04 */
133 "t (tracing stop)", /* 0x08 */
134 "X (dead)", /* 0x10 */
135 "Z (zombie)", /* 0x20 */
8ef9925b 136 "P (parked)", /* 0x40 */
06eb6184
PZ
137
138 /* states beyond TASK_REPORT: */
8ef9925b 139 "I (idle)", /* 0x80 */
1da177e4
LT
140};
141
8ea02606 142static inline const char *get_task_state(struct task_struct *tsk)
1da177e4 143{
06eb6184 144 BUILD_BUG_ON(1 + ilog2(TASK_REPORT_MAX) != ARRAY_SIZE(task_state_array));
1d48b080 145 return task_state_array[task_state_index(tsk)];
1da177e4
LT
146}
147
df5f8314
EB
148static inline void task_state(struct seq_file *m, struct pid_namespace *ns,
149 struct pid *pid, struct task_struct *p)
1da177e4 150{
e9f238c3 151 struct user_namespace *user_ns = seq_user_ns(m);
1da177e4 152 struct group_info *group_info;
68c3411f 153 int g, umask = -1;
abdba6e9 154 struct task_struct *tracer;
c69e8d9c 155 const struct cred *cred;
abdba6e9 156 pid_t ppid, tpid = 0, tgid, ngid;
0f4a0d53 157 unsigned int max_fds = 0;
1da177e4 158
b0fa9db6 159 rcu_read_lock();
b488893a
PE
160 ppid = pid_alive(p) ?
161 task_tgid_nr_ns(rcu_dereference(p->real_parent), ns) : 0;
abdba6e9
ON
162
163 tracer = ptrace_parent(p);
164 if (tracer)
165 tpid = task_pid_nr_ns(tracer, ns);
b0fafc11
ON
166
167 tgid = task_tgid_nr_ns(p, ns);
168 ngid = task_numa_group_id(p);
de09a977 169 cred = get_task_cred(p);
0f4a0d53
ON
170
171 task_lock(p);
68c3411f
MG
172 if (p->fs)
173 umask = p->fs->umask;
0f4a0d53
ON
174 if (p->files)
175 max_fds = files_fdtable(p->files)->max_fds;
176 task_unlock(p);
b0fafc11 177 rcu_read_unlock();
0f4a0d53 178
68c3411f
MG
179 if (umask >= 0)
180 seq_printf(m, "Umask:\t%#04o\n", umask);
d0f02231
AV
181 seq_puts(m, "State:\t");
182 seq_puts(m, get_task_state(p));
f7a5f132 183
75ba1d07
JP
184 seq_put_decimal_ull(m, "\nTgid:\t", tgid);
185 seq_put_decimal_ull(m, "\nNgid:\t", ngid);
186 seq_put_decimal_ull(m, "\nPid:\t", pid_nr_ns(pid, ns));
187 seq_put_decimal_ull(m, "\nPPid:\t", ppid);
188 seq_put_decimal_ull(m, "\nTracerPid:\t", tpid);
189 seq_put_decimal_ull(m, "\nUid:\t", from_kuid_munged(user_ns, cred->uid));
190 seq_put_decimal_ull(m, "\t", from_kuid_munged(user_ns, cred->euid));
191 seq_put_decimal_ull(m, "\t", from_kuid_munged(user_ns, cred->suid));
192 seq_put_decimal_ull(m, "\t", from_kuid_munged(user_ns, cred->fsuid));
193 seq_put_decimal_ull(m, "\nGid:\t", from_kgid_munged(user_ns, cred->gid));
194 seq_put_decimal_ull(m, "\t", from_kgid_munged(user_ns, cred->egid));
195 seq_put_decimal_ull(m, "\t", from_kgid_munged(user_ns, cred->sgid));
196 seq_put_decimal_ull(m, "\t", from_kgid_munged(user_ns, cred->fsgid));
197 seq_put_decimal_ull(m, "\nFDSize:\t", max_fds);
f7a5f132
AD
198
199 seq_puts(m, "\nGroups:\t");
c69e8d9c 200 group_info = cred->group_info;
8d238027 201 for (g = 0; g < group_info->ngroups; g++)
75ba1d07 202 seq_put_decimal_ull(m, g ? " " : "",
81243eac 203 from_kgid_munged(user_ns, group_info->gid[g]));
c69e8d9c 204 put_cred(cred);
f7a5f132
AD
205 /* Trailing space shouldn't have been added in the first place. */
206 seq_putc(m, ' ');
1da177e4 207
e4bc3324
CH
208#ifdef CONFIG_PID_NS
209 seq_puts(m, "\nNStgid:");
210 for (g = ns->level; g <= pid->level; g++)
75ba1d07 211 seq_put_decimal_ull(m, "\t", task_tgid_nr_ns(p, pid->numbers[g].ns));
e4bc3324
CH
212 seq_puts(m, "\nNSpid:");
213 for (g = ns->level; g <= pid->level; g++)
75ba1d07 214 seq_put_decimal_ull(m, "\t", task_pid_nr_ns(p, pid->numbers[g].ns));
e4bc3324
CH
215 seq_puts(m, "\nNSpgid:");
216 for (g = ns->level; g <= pid->level; g++)
75ba1d07 217 seq_put_decimal_ull(m, "\t", task_pgrp_nr_ns(p, pid->numbers[g].ns));
e4bc3324
CH
218 seq_puts(m, "\nNSsid:");
219 for (g = ns->level; g <= pid->level; g++)
75ba1d07 220 seq_put_decimal_ull(m, "\t", task_session_nr_ns(p, pid->numbers[g].ns));
e4bc3324 221#endif
9d6de12f 222 seq_putc(m, '\n');
522dc4e5
CW
223
224 seq_printf(m, "Kthread:\t%c\n", p->flags & PF_KTHREAD ? '1' : '0');
1da177e4
LT
225}
226
138d22b5 227void render_sigset_t(struct seq_file *m, const char *header,
df5f8314 228 sigset_t *set)
1da177e4 229{
df5f8314 230 int i;
1da177e4 231
9d6de12f 232 seq_puts(m, header);
1da177e4
LT
233
234 i = _NSIG;
235 do {
236 int x = 0;
237
238 i -= 4;
239 if (sigismember(set, i+1)) x |= 1;
240 if (sigismember(set, i+2)) x |= 2;
241 if (sigismember(set, i+3)) x |= 4;
242 if (sigismember(set, i+4)) x |= 8;
209b14dc 243 seq_putc(m, hex_asc[x]);
1da177e4
LT
244 } while (i >= 4);
245
9d6de12f 246 seq_putc(m, '\n');
1da177e4
LT
247}
248
8977a27b
AD
249static void collect_sigign_sigcatch(struct task_struct *p, sigset_t *sigign,
250 sigset_t *sigcatch)
1da177e4
LT
251{
252 struct k_sigaction *k;
253 int i;
254
255 k = p->sighand->action;
256 for (i = 1; i <= _NSIG; ++i, ++k) {
257 if (k->sa.sa_handler == SIG_IGN)
8977a27b 258 sigaddset(sigign, i);
1da177e4 259 else if (k->sa.sa_handler != SIG_DFL)
8977a27b 260 sigaddset(sigcatch, i);
1da177e4
LT
261 }
262}
263
df5f8314 264static inline void task_sig(struct seq_file *m, struct task_struct *p)
1da177e4 265{
5e6b3f42 266 unsigned long flags;
1da177e4
LT
267 sigset_t pending, shpending, blocked, ignored, caught;
268 int num_threads = 0;
197850a1 269 unsigned int qsize = 0;
1da177e4
LT
270 unsigned long qlim = 0;
271
272 sigemptyset(&pending);
273 sigemptyset(&shpending);
274 sigemptyset(&blocked);
275 sigemptyset(&ignored);
276 sigemptyset(&caught);
277
5e6b3f42 278 if (lock_task_sighand(p, &flags)) {
1da177e4
LT
279 pending = p->pending.signal;
280 shpending = p->signal->shared_pending.signal;
281 blocked = p->blocked;
282 collect_sigign_sigcatch(p, &ignored, &caught);
7e49827c 283 num_threads = get_nr_threads(p);
7dc52157 284 rcu_read_lock(); /* FIXME: is this correct? */
de399236 285 qsize = get_rlimit_value(task_ucounts(p), UCOUNT_RLIMIT_SIGPENDING);
7dc52157 286 rcu_read_unlock();
d554ed89 287 qlim = task_rlimit(p, RLIMIT_SIGPENDING);
5e6b3f42 288 unlock_task_sighand(p, &flags);
1da177e4 289 }
1da177e4 290
75ba1d07
JP
291 seq_put_decimal_ull(m, "Threads:\t", num_threads);
292 seq_put_decimal_ull(m, "\nSigQ:\t", qsize);
293 seq_put_decimal_ull(m, "/", qlim);
1da177e4
LT
294
295 /* render them all */
f7a5f132 296 render_sigset_t(m, "\nSigPnd:\t", &pending);
df5f8314
EB
297 render_sigset_t(m, "ShdPnd:\t", &shpending);
298 render_sigset_t(m, "SigBlk:\t", &blocked);
299 render_sigset_t(m, "SigIgn:\t", &ignored);
300 render_sigset_t(m, "SigCgt:\t", &caught);
1da177e4
LT
301}
302
df5f8314
EB
303static void render_cap_t(struct seq_file *m, const char *header,
304 kernel_cap_t *a)
e338d263 305{
9d6de12f 306 seq_puts(m, header);
f122a08b 307 seq_put_hex_ll(m, NULL, a->val, 16);
9d6de12f 308 seq_putc(m, '\n');
e338d263
AM
309}
310
df5f8314 311static inline void task_cap(struct seq_file *m, struct task_struct *p)
1da177e4 312{
c69e8d9c 313 const struct cred *cred;
58319057
AL
314 kernel_cap_t cap_inheritable, cap_permitted, cap_effective,
315 cap_bset, cap_ambient;
b6dff3ec 316
c69e8d9c
DH
317 rcu_read_lock();
318 cred = __task_cred(p);
319 cap_inheritable = cred->cap_inheritable;
320 cap_permitted = cred->cap_permitted;
321 cap_effective = cred->cap_effective;
322 cap_bset = cred->cap_bset;
58319057 323 cap_ambient = cred->cap_ambient;
c69e8d9c
DH
324 rcu_read_unlock();
325
326 render_cap_t(m, "CapInh:\t", &cap_inheritable);
327 render_cap_t(m, "CapPrm:\t", &cap_permitted);
328 render_cap_t(m, "CapEff:\t", &cap_effective);
329 render_cap_t(m, "CapBnd:\t", &cap_bset);
58319057 330 render_cap_t(m, "CapAmb:\t", &cap_ambient);
1da177e4
LT
331}
332
2f4b3bf6
KC
333static inline void task_seccomp(struct seq_file *m, struct task_struct *p)
334{
af884cd4 335 seq_put_decimal_ull(m, "NoNewPrivs:\t", task_no_new_privs(p));
2f4b3bf6 336#ifdef CONFIG_SECCOMP
af884cd4 337 seq_put_decimal_ull(m, "\nSeccomp:\t", p->seccomp.mode);
64bdc024 338#ifdef CONFIG_SECCOMP_FILTER
c818c03b
KC
339 seq_put_decimal_ull(m, "\nSeccomp_filters:\t",
340 atomic_read(&p->seccomp.filter_count));
64bdc024 341#endif
2f4b3bf6 342#endif
08b55775 343 seq_puts(m, "\nSpeculation_Store_Bypass:\t");
fae1fa0f
KC
344 switch (arch_prctl_spec_ctrl_get(p, PR_SPEC_STORE_BYPASS)) {
345 case -EINVAL:
08b55775 346 seq_puts(m, "unknown");
fae1fa0f
KC
347 break;
348 case PR_SPEC_NOT_AFFECTED:
08b55775 349 seq_puts(m, "not vulnerable");
fae1fa0f 350 break;
356e4bff 351 case PR_SPEC_PRCTL | PR_SPEC_FORCE_DISABLE:
08b55775 352 seq_puts(m, "thread force mitigated");
356e4bff 353 break;
fae1fa0f 354 case PR_SPEC_PRCTL | PR_SPEC_DISABLE:
08b55775 355 seq_puts(m, "thread mitigated");
fae1fa0f
KC
356 break;
357 case PR_SPEC_PRCTL | PR_SPEC_ENABLE:
08b55775 358 seq_puts(m, "thread vulnerable");
fae1fa0f
KC
359 break;
360 case PR_SPEC_DISABLE:
08b55775 361 seq_puts(m, "globally mitigated");
fae1fa0f
KC
362 break;
363 default:
08b55775 364 seq_puts(m, "vulnerable");
fae1fa0f
KC
365 break;
366 }
fe719888
AM
367
368 seq_puts(m, "\nSpeculationIndirectBranch:\t");
369 switch (arch_prctl_spec_ctrl_get(p, PR_SPEC_INDIRECT_BRANCH)) {
370 case -EINVAL:
371 seq_puts(m, "unsupported");
372 break;
373 case PR_SPEC_NOT_AFFECTED:
374 seq_puts(m, "not affected");
375 break;
376 case PR_SPEC_PRCTL | PR_SPEC_FORCE_DISABLE:
377 seq_puts(m, "conditional force disabled");
378 break;
379 case PR_SPEC_PRCTL | PR_SPEC_DISABLE:
380 seq_puts(m, "conditional disabled");
381 break;
382 case PR_SPEC_PRCTL | PR_SPEC_ENABLE:
383 seq_puts(m, "conditional enabled");
384 break;
385 case PR_SPEC_ENABLE:
386 seq_puts(m, "always enabled");
387 break;
388 case PR_SPEC_DISABLE:
389 seq_puts(m, "always disabled");
390 break;
391 default:
392 seq_puts(m, "unknown");
393 break;
394 }
af884cd4 395 seq_putc(m, '\n');
2f4b3bf6
KC
396}
397
df5f8314
EB
398static inline void task_context_switch_counts(struct seq_file *m,
399 struct task_struct *p)
b663a79c 400{
75ba1d07
JP
401 seq_put_decimal_ull(m, "voluntary_ctxt_switches:\t", p->nvcsw);
402 seq_put_decimal_ull(m, "\nnonvoluntary_ctxt_switches:\t", p->nivcsw);
f7a5f132 403 seq_putc(m, '\n');
b663a79c
MU
404}
405
d01d4827
HC
406static void task_cpus_allowed(struct seq_file *m, struct task_struct *task)
407{
a0c2e07d 408 seq_printf(m, "Cpus_allowed:\t%*pb\n",
86fbcd3b 409 cpumask_pr_args(&task->cpus_mask));
a0c2e07d 410 seq_printf(m, "Cpus_allowed_list:\t%*pbl\n",
86fbcd3b 411 cpumask_pr_args(&task->cpus_mask));
d01d4827
HC
412}
413
0258b5fd 414static inline void task_core_dumping(struct seq_file *m, struct task_struct *task)
c6434012 415{
0258b5fd 416 seq_put_decimal_ull(m, "CoreDumping:\t", !!task->signal->core_state);
d0f02231 417 seq_putc(m, '\n');
c6434012
RG
418}
419
a1400af7
MH
420static inline void task_thp_status(struct seq_file *m, struct mm_struct *mm)
421{
422 bool thp_enabled = IS_ENABLED(CONFIG_TRANSPARENT_HUGEPAGE);
423
424 if (thp_enabled)
425 thp_enabled = !test_bit(MMF_DISABLE_THP, &mm->flags);
426 seq_printf(m, "THP_enabled:\t%d\n", thp_enabled);
427}
428
f7d30434
KS
429static inline void task_untag_mask(struct seq_file *m, struct mm_struct *mm)
430{
431 seq_printf(m, "untag_mask:\t%#lx\n", mm_untag_mask(mm));
432}
433
0ee44885
RE
434__weak void arch_proc_pid_thread_features(struct seq_file *m,
435 struct task_struct *task)
436{
437}
438
df5f8314
EB
439int proc_pid_status(struct seq_file *m, struct pid_namespace *ns,
440 struct pid *pid, struct task_struct *task)
1da177e4 441{
1da177e4
LT
442 struct mm_struct *mm = get_task_mm(task);
443
88b72b31
TH
444 seq_puts(m, "Name:\t");
445 proc_task_name(m, task, true);
446 seq_putc(m, '\n');
447
df5f8314 448 task_state(m, ns, pid, task);
8ea02606 449
1da177e4 450 if (mm) {
df5f8314 451 task_mem(m, mm);
0258b5fd 452 task_core_dumping(m, task);
a1400af7 453 task_thp_status(m, mm);
f7d30434 454 task_untag_mask(m, mm);
1da177e4
LT
455 mmput(mm);
456 }
df5f8314
EB
457 task_sig(m, task);
458 task_cap(m, task);
2f4b3bf6 459 task_seccomp(m, task);
d01d4827 460 task_cpus_allowed(m, task);
df5f8314 461 cpuset_task_status_allowed(m, task);
df5f8314 462 task_context_switch_counts(m, task);
0ee44885 463 arch_proc_pid_thread_features(m, task);
df5f8314 464 return 0;
1da177e4
LT
465}
466
ee992744
EB
467static int do_task_stat(struct seq_file *m, struct pid_namespace *ns,
468 struct pid *pid, struct task_struct *task, int whole)
1da177e4 469{
b2f73922 470 unsigned long vsize, eip, esp, wchan = 0;
715be1fc 471 int priority, nice;
1da177e4
LT
472 int tty_pgrp = -1, tty_nr = 0;
473 sigset_t sigign, sigcatch;
474 char state;
8ea02606 475 pid_t ppid = 0, pgid = -1, sid = -1;
1da177e4 476 int num_threads = 0;
f83ce3e6 477 int permitted;
1da177e4
LT
478 struct mm_struct *mm;
479 unsigned long long start_time;
480 unsigned long cmin_flt = 0, cmaj_flt = 0;
481 unsigned long min_flt = 0, maj_flt = 0;
5613fda9 482 u64 cutime, cstime, utime, stime;
16a6d9be 483 u64 cgtime, gtime;
1da177e4 484 unsigned long rsslim = 0;
a593d6ed 485 unsigned long flags;
2d18f7f4 486 int exit_code = task->exit_code;
1da177e4
LT
487
488 state = *get_task_state(task);
489 vsize = eip = esp = 0;
caaee623 490 permitted = ptrace_may_access(task, PTRACE_MODE_READ_FSCREDS | PTRACE_MODE_NOAUDIT);
1da177e4
LT
491 mm = get_task_mm(task);
492 if (mm) {
493 vsize = task_vsize(mm);
0a1eb2d4
AL
494 /*
495 * esp and eip are intentionally zeroed out. There is no
496 * non-racy way to read them without freezing the task.
497 * Programs that need reliable values can use ptrace(2).
fd7d5627
JO
498 *
499 * The only exception is if the task is core dumping because
500 * a program is not able to use ptrace(2) in that case. It is
501 * safe because the task has stopped executing permanently.
0a1eb2d4 502 */
cb8f381f 503 if (permitted && (task->flags & (PF_EXITING|PF_DUMPCORE))) {
8bb2ee19
AD
504 if (try_get_task_stack(task)) {
505 eip = KSTK_EIP(task);
506 esp = KSTK_ESP(task);
507 put_task_stack(task);
508 }
fd7d5627 509 }
1da177e4
LT
510 }
511
1da177e4
LT
512 sigemptyset(&sigign);
513 sigemptyset(&sigcatch);
64861634
MS
514 cutime = cstime = utime = stime = 0;
515 cgtime = gtime = 0;
3cfd0885 516
a593d6ed
ON
517 if (lock_task_sighand(task, &flags)) {
518 struct signal_struct *sig = task->signal;
91593504
ON
519
520 if (sig->tty) {
5d0fdf1e
AC
521 struct pid *pgrp = tty_get_pgrp(sig->tty);
522 tty_pgrp = pid_nr_ns(pgrp, ns);
523 put_pid(pgrp);
91593504 524 tty_nr = new_encode_dev(tty_devnum(sig->tty));
a593d6ed
ON
525 }
526
7e49827c 527 num_threads = get_nr_threads(task);
1da177e4
LT
528 collect_sigign_sigcatch(task, &sigign, &sigcatch);
529
a593d6ed
ON
530 cmin_flt = sig->cmin_flt;
531 cmaj_flt = sig->cmaj_flt;
532 cutime = sig->cutime;
533 cstime = sig->cstime;
9ac52315 534 cgtime = sig->cgtime;
6aa7de05 535 rsslim = READ_ONCE(sig->rlim[RLIMIT_RSS].rlim_cur);
a593d6ed 536
1da177e4
LT
537 /* add up live thread stats at the group level */
538 if (whole) {
7904e53e
ON
539 struct task_struct *t;
540
541 __for_each_thread(sig, t) {
1da177e4
LT
542 min_flt += t->min_flt;
543 maj_flt += t->maj_flt;
6fac4829 544 gtime += task_gtime(t);
7904e53e 545 }
1da177e4 546
a593d6ed
ON
547 min_flt += sig->min_flt;
548 maj_flt += sig->maj_flt;
e80d0a1a 549 thread_group_cputime_adjusted(task, &utime, &stime);
64861634 550 gtime += sig->gtime;
2d18f7f4
EB
551
552 if (sig->flags & (SIGNAL_GROUP_EXIT | SIGNAL_STOP_STOPPED))
553 exit_code = sig->group_exit_code;
1da177e4 554 }
a593d6ed 555
b488893a 556 sid = task_session_nr_ns(task, ns);
a98fdcef 557 ppid = task_tgid_nr_ns(task->real_parent, ns);
b488893a 558 pgid = task_pgrp_nr_ns(task, ns);
a593d6ed
ON
559
560 unlock_task_sighand(task, &flags);
1da177e4 561 }
1da177e4 562
f83ce3e6 563 if (permitted && (!whole || num_threads < 2))
4e046156 564 wchan = !task_is_running(task);
1da177e4
LT
565 if (!whole) {
566 min_flt = task->min_flt;
567 maj_flt = task->maj_flt;
e80d0a1a 568 task_cputime_adjusted(task, &utime, &stime);
6fac4829 569 gtime = task_gtime(task);
1da177e4
LT
570 }
571
572 /* scale priority and nice values from timeslices to -20..20 */
573 /* to make it look like a "normal" Unix priority/nice value */
574 priority = task_prio(task);
575 nice = task_nice(task);
576
3ae700ec
MW
577 /* apply timens offset for boottime and convert nsec -> ticks */
578 start_time =
579 nsec_to_clock_t(timens_add_boottime_ns(task->start_boottime));
1da177e4 580
d0f02231
AV
581 seq_put_decimal_ull(m, "", pid_nr_ns(pid, ns));
582 seq_puts(m, " (");
88b72b31 583 proc_task_name(m, task, false);
d0f02231
AV
584 seq_puts(m, ") ");
585 seq_putc(m, state);
75ba1d07
JP
586 seq_put_decimal_ll(m, " ", ppid);
587 seq_put_decimal_ll(m, " ", pgid);
588 seq_put_decimal_ll(m, " ", sid);
589 seq_put_decimal_ll(m, " ", tty_nr);
590 seq_put_decimal_ll(m, " ", tty_pgrp);
591 seq_put_decimal_ull(m, " ", task->flags);
592 seq_put_decimal_ull(m, " ", min_flt);
593 seq_put_decimal_ull(m, " ", cmin_flt);
594 seq_put_decimal_ull(m, " ", maj_flt);
595 seq_put_decimal_ull(m, " ", cmaj_flt);
5613fda9
FW
596 seq_put_decimal_ull(m, " ", nsec_to_clock_t(utime));
597 seq_put_decimal_ull(m, " ", nsec_to_clock_t(stime));
598 seq_put_decimal_ll(m, " ", nsec_to_clock_t(cutime));
599 seq_put_decimal_ll(m, " ", nsec_to_clock_t(cstime));
75ba1d07
JP
600 seq_put_decimal_ll(m, " ", priority);
601 seq_put_decimal_ll(m, " ", nice);
602 seq_put_decimal_ll(m, " ", num_threads);
603 seq_put_decimal_ull(m, " ", 0);
604 seq_put_decimal_ull(m, " ", start_time);
605 seq_put_decimal_ull(m, " ", vsize);
606 seq_put_decimal_ull(m, " ", mm ? get_mm_rss(mm) : 0);
607 seq_put_decimal_ull(m, " ", rsslim);
608 seq_put_decimal_ull(m, " ", mm ? (permitted ? mm->start_code : 1) : 0);
609 seq_put_decimal_ull(m, " ", mm ? (permitted ? mm->end_code : 1) : 0);
610 seq_put_decimal_ull(m, " ", (permitted && mm) ? mm->start_stack : 0);
611 seq_put_decimal_ull(m, " ", esp);
612 seq_put_decimal_ull(m, " ", eip);
bda7bad6
KH
613 /* The signal information here is obsolete.
614 * It must be decimal for Linux 2.0 compatibility.
615 * Use /proc/#/status for real-time signals.
616 */
75ba1d07
JP
617 seq_put_decimal_ull(m, " ", task->pending.signal.sig[0] & 0x7fffffffUL);
618 seq_put_decimal_ull(m, " ", task->blocked.sig[0] & 0x7fffffffUL);
619 seq_put_decimal_ull(m, " ", sigign.sig[0] & 0x7fffffffUL);
620 seq_put_decimal_ull(m, " ", sigcatch.sig[0] & 0x7fffffffUL);
b2f73922
IM
621
622 /*
623 * We used to output the absolute kernel address, but that's an
624 * information leak - so instead we show a 0/1 flag here, to signal
625 * to user-space whether there's a wchan field in /proc/PID/wchan.
626 *
627 * This works with older implementations of procps as well.
628 */
4e046156 629 seq_put_decimal_ull(m, " ", wchan);
b2f73922 630
75ba1d07
JP
631 seq_put_decimal_ull(m, " ", 0);
632 seq_put_decimal_ull(m, " ", 0);
633 seq_put_decimal_ll(m, " ", task->exit_signal);
634 seq_put_decimal_ll(m, " ", task_cpu(task));
635 seq_put_decimal_ull(m, " ", task->rt_priority);
636 seq_put_decimal_ull(m, " ", task->policy);
637 seq_put_decimal_ull(m, " ", delayacct_blkio_ticks(task));
16a6d9be
FW
638 seq_put_decimal_ull(m, " ", nsec_to_clock_t(gtime));
639 seq_put_decimal_ll(m, " ", nsec_to_clock_t(cgtime));
5b172087
CG
640
641 if (mm && permitted) {
75ba1d07
JP
642 seq_put_decimal_ull(m, " ", mm->start_data);
643 seq_put_decimal_ull(m, " ", mm->end_data);
644 seq_put_decimal_ull(m, " ", mm->start_brk);
645 seq_put_decimal_ull(m, " ", mm->arg_start);
646 seq_put_decimal_ull(m, " ", mm->arg_end);
647 seq_put_decimal_ull(m, " ", mm->env_start);
648 seq_put_decimal_ull(m, " ", mm->env_end);
5b172087 649 } else
75ba1d07 650 seq_puts(m, " 0 0 0 0 0 0 0");
5b172087
CG
651
652 if (permitted)
2d18f7f4 653 seq_put_decimal_ll(m, " ", exit_code);
5b172087 654 else
75ba1d07 655 seq_puts(m, " 0");
5b172087 656
bda7bad6 657 seq_putc(m, '\n');
8ea02606 658 if (mm)
1da177e4 659 mmput(mm);
ee992744 660 return 0;
1da177e4
LT
661}
662
ee992744
EB
663int proc_tid_stat(struct seq_file *m, struct pid_namespace *ns,
664 struct pid *pid, struct task_struct *task)
1da177e4 665{
ee992744 666 return do_task_stat(m, ns, pid, task, 0);
1da177e4
LT
667}
668
ee992744
EB
669int proc_tgid_stat(struct seq_file *m, struct pid_namespace *ns,
670 struct pid *pid, struct task_struct *task)
1da177e4 671{
ee992744 672 return do_task_stat(m, ns, pid, task, 1);
1da177e4
LT
673}
674
a56d3fc7
EB
675int proc_pid_statm(struct seq_file *m, struct pid_namespace *ns,
676 struct pid *pid, struct task_struct *task)
1da177e4 677{
1da177e4 678 struct mm_struct *mm = get_task_mm(task);
8ea02606 679
1da177e4 680 if (mm) {
5c5ab971
AD
681 unsigned long size;
682 unsigned long resident = 0;
683 unsigned long shared = 0;
684 unsigned long text = 0;
685 unsigned long data = 0;
686
1da177e4
LT
687 size = task_statm(mm, &shared, &text, &data, &resident);
688 mmput(mm);
1da177e4 689
5c5ab971
AD
690 /*
691 * For quick read, open code by putting numbers directly
692 * expected format is
693 * seq_printf(m, "%lu %lu %lu %lu 0 %lu 0\n",
694 * size, resident, shared, text, data);
695 */
696 seq_put_decimal_ull(m, "", size);
697 seq_put_decimal_ull(m, " ", resident);
698 seq_put_decimal_ull(m, " ", shared);
699 seq_put_decimal_ull(m, " ", text);
700 seq_put_decimal_ull(m, " ", 0);
701 seq_put_decimal_ull(m, " ", data);
702 seq_put_decimal_ull(m, " ", 0);
703 seq_putc(m, '\n');
704 } else {
705 seq_write(m, "0 0 0 0 0 0 0\n", 14);
706 }
a56d3fc7 707 return 0;
1da177e4 708}
81841161 709
2e13ba54 710#ifdef CONFIG_PROC_CHILDREN
81841161
CG
711static struct pid *
712get_children_pid(struct inode *inode, struct pid *pid_prev, loff_t pos)
713{
714 struct task_struct *start, *task;
715 struct pid *pid = NULL;
716
717 read_lock(&tasklist_lock);
718
719 start = pid_task(proc_pid(inode), PIDTYPE_PID);
720 if (!start)
721 goto out;
722
723 /*
724 * Lets try to continue searching first, this gives
725 * us significant speedup on children-rich processes.
726 */
727 if (pid_prev) {
728 task = pid_task(pid_prev, PIDTYPE_PID);
729 if (task && task->real_parent == start &&
730 !(list_empty(&task->sibling))) {
731 if (list_is_last(&task->sibling, &start->children))
732 goto out;
733 task = list_first_entry(&task->sibling,
734 struct task_struct, sibling);
735 pid = get_pid(task_pid(task));
736 goto out;
737 }
738 }
739
740 /*
741 * Slow search case.
742 *
743 * We might miss some children here if children
744 * are exited while we were not holding the lock,
745 * but it was never promised to be accurate that
746 * much.
747 *
748 * "Just suppose that the parent sleeps, but N children
749 * exit after we printed their tids. Now the slow paths
750 * skips N extra children, we miss N tasks." (c)
751 *
752 * So one need to stop or freeze the leader and all
753 * its children to get a precise result.
754 */
755 list_for_each_entry(task, &start->children, sibling) {
756 if (pos-- == 0) {
757 pid = get_pid(task_pid(task));
758 break;
759 }
760 }
761
762out:
763 read_unlock(&tasklist_lock);
764 return pid;
765}
766
767static int children_seq_show(struct seq_file *seq, void *v)
768{
04015e3f 769 struct inode *inode = file_inode(seq->file);
25ce3191 770
9d78edea 771 seq_printf(seq, "%d ", pid_nr_ns(v, proc_pid_ns(inode->i_sb)));
25ce3191 772 return 0;
81841161
CG
773}
774
775static void *children_seq_start(struct seq_file *seq, loff_t *pos)
776{
04015e3f 777 return get_children_pid(file_inode(seq->file), NULL, *pos);
81841161
CG
778}
779
780static void *children_seq_next(struct seq_file *seq, void *v, loff_t *pos)
781{
782 struct pid *pid;
783
04015e3f 784 pid = get_children_pid(file_inode(seq->file), v, *pos + 1);
81841161
CG
785 put_pid(v);
786
787 ++*pos;
788 return pid;
789}
790
791static void children_seq_stop(struct seq_file *seq, void *v)
792{
793 put_pid(v);
794}
795
796static const struct seq_operations children_seq_ops = {
797 .start = children_seq_start,
798 .next = children_seq_next,
799 .stop = children_seq_stop,
800 .show = children_seq_show,
801};
802
803static int children_seq_open(struct inode *inode, struct file *file)
804{
04015e3f 805 return seq_open(file, &children_seq_ops);
81841161
CG
806}
807
81841161
CG
808const struct file_operations proc_tid_children_operations = {
809 .open = children_seq_open,
810 .read = seq_read,
811 .llseek = seq_lseek,
171ef917 812 .release = seq_release,
81841161 813};
2e13ba54 814#endif /* CONFIG_PROC_CHILDREN */