Commit | Line | Data |
---|---|---|
b2441318 | 1 | // SPDX-License-Identifier: GPL-2.0 |
1da177e4 LT |
2 | /* |
3 | * linux/fs/proc/array.c | |
4 | * | |
5 | * Copyright (C) 1992 by Linus Torvalds | |
6 | * based on ideas by Darren Senn | |
7 | * | |
8 | * Fixes: | |
9 | * Michael. K. Johnson: stat,statm extensions. | |
10 | * <johnsonm@stolaf.edu> | |
11 | * | |
12 | * Pauline Middelink : Made cmdline,envline only break at '\0's, to | |
13 | * make sure SET_PROCTITLE works. Also removed | |
14 | * bad '!' which forced address recalculation for | |
15 | * EVERY character on the current page. | |
16 | * <middelin@polyware.iaf.nl> | |
17 | * | |
18 | * Danny ter Haar : added cpuinfo | |
19 | * <dth@cistron.nl> | |
20 | * | |
21 | * Alessandro Rubini : profile extension. | |
22 | * <rubini@ipvvis.unipv.it> | |
23 | * | |
24 | * Jeff Tranter : added BogoMips field to cpuinfo | |
25 | * <Jeff_Tranter@Mitel.COM> | |
26 | * | |
27 | * Bruno Haible : remove 4K limit for the maps file | |
28 | * <haible@ma2s2.mathematik.uni-karlsruhe.de> | |
29 | * | |
30 | * Yves Arrouye : remove removal of trailing spaces in get_array. | |
31 | * <Yves.Arrouye@marin.fdn.fr> | |
32 | * | |
33 | * Jerome Forissier : added per-CPU time information to /proc/stat | |
34 | * and /proc/<pid>/cpu extension | |
35 | * <forissier@isia.cma.fr> | |
36 | * - Incorporation and non-SMP safe operation | |
37 | * of forissier patch in 2.1.78 by | |
38 | * Hans Marcus <crowbar@concepts.nl> | |
39 | * | |
40 | * aeb@cwi.nl : /proc/partitions | |
41 | * | |
42 | * | |
43 | * Alan Cox : security fixes. | |
526719ba | 44 | * <alan@lxorguk.ukuu.org.uk> |
1da177e4 LT |
45 | * |
46 | * Al Viro : safe handling of mm_struct | |
47 | * | |
48 | * Gerhard Wichert : added BIGMEM support | |
49 | * Siemens AG <Gerhard.Wichert@pdb.siemens.de> | |
50 | * | |
51 | * Al Viro & Jeff Garzik : moved most of the thing into base.c and | |
52 | * : proc_misc.c. The rest may eventually go into | |
53 | * : base.c too. | |
54 | */ | |
55 | ||
1da177e4 LT |
56 | #include <linux/types.h> |
57 | #include <linux/errno.h> | |
58 | #include <linux/time.h> | |
3ae700ec | 59 | #include <linux/time_namespace.h> |
1da177e4 LT |
60 | #include <linux/kernel.h> |
61 | #include <linux/kernel_stat.h> | |
62 | #include <linux/tty.h> | |
63 | #include <linux/string.h> | |
64 | #include <linux/mman.h> | |
6e84f315 | 65 | #include <linux/sched/mm.h> |
6a3827d7 | 66 | #include <linux/sched/numa_balancing.h> |
fd7d5627 | 67 | #include <linux/sched/task_stack.h> |
29930025 | 68 | #include <linux/sched/task.h> |
32ef5517 | 69 | #include <linux/sched/cputime.h> |
1da177e4 LT |
70 | #include <linux/proc_fs.h> |
71 | #include <linux/ioport.h> | |
8ea02606 | 72 | #include <linux/io.h> |
1da177e4 LT |
73 | #include <linux/mm.h> |
74 | #include <linux/hugetlb.h> | |
75 | #include <linux/pagemap.h> | |
76 | #include <linux/swap.h> | |
1da177e4 LT |
77 | #include <linux/smp.h> |
78 | #include <linux/signal.h> | |
79 | #include <linux/highmem.h> | |
80 | #include <linux/file.h> | |
9f3acc31 | 81 | #include <linux/fdtable.h> |
1da177e4 LT |
82 | #include <linux/times.h> |
83 | #include <linux/cpuset.h> | |
4fb3a538 | 84 | #include <linux/rcupdate.h> |
25890454 | 85 | #include <linux/delayacct.h> |
ee992744 | 86 | #include <linux/seq_file.h> |
b488893a | 87 | #include <linux/pid_namespace.h> |
fae1fa0f | 88 | #include <linux/prctl.h> |
f83ce3e6 | 89 | #include <linux/ptrace.h> |
edc924e0 | 90 | #include <linux/string_helpers.h> |
ae2975bc | 91 | #include <linux/user_namespace.h> |
3e42979e | 92 | #include <linux/fs_struct.h> |
d6986ce2 | 93 | #include <linux/kthread.h> |
1da177e4 | 94 | |
1da177e4 LT |
95 | #include <asm/processor.h> |
96 | #include "internal.h" | |
97 | ||
88b72b31 | 98 | void proc_task_name(struct seq_file *m, struct task_struct *p, bool escape) |
1da177e4 | 99 | { |
6b59808b | 100 | char tcomm[64]; |
1da177e4 | 101 | |
ed8fb78d AD |
102 | /* |
103 | * Test before PF_KTHREAD because all workqueue worker threads are | |
104 | * kernel threads. | |
105 | */ | |
6b59808b TH |
106 | if (p->flags & PF_WQ_WORKER) |
107 | wq_worker_comm(tcomm, sizeof(tcomm), p); | |
d6986ce2 YS |
108 | else if (p->flags & PF_KTHREAD) |
109 | get_kthread_comm(tcomm, sizeof(tcomm), p); | |
6b59808b TH |
110 | else |
111 | __get_task_comm(tcomm, sizeof(tcomm), p); | |
edc924e0 | 112 | |
8d23b208 CH |
113 | if (escape) |
114 | seq_escape_str(m, tcomm, ESCAPE_SPACE | ESCAPE_SPECIAL, "\n\\"); | |
115 | else | |
116 | seq_printf(m, "%.64s", tcomm); | |
1da177e4 LT |
117 | } |
118 | ||
119 | /* | |
120 | * The task state array is a strange "bitmap" of | |
121 | * reasons to sleep. Thus "running" is zero, and | |
122 | * you can test for combinations of others with | |
123 | * simple bit tests. | |
124 | */ | |
e130aa70 | 125 | static const char * const task_state_array[] = { |
06eb6184 PZ |
126 | |
127 | /* states in TASK_REPORT: */ | |
128 | "R (running)", /* 0x00 */ | |
129 | "S (sleeping)", /* 0x01 */ | |
130 | "D (disk sleep)", /* 0x02 */ | |
131 | "T (stopped)", /* 0x04 */ | |
132 | "t (tracing stop)", /* 0x08 */ | |
133 | "X (dead)", /* 0x10 */ | |
134 | "Z (zombie)", /* 0x20 */ | |
8ef9925b | 135 | "P (parked)", /* 0x40 */ |
06eb6184 PZ |
136 | |
137 | /* states beyond TASK_REPORT: */ | |
8ef9925b | 138 | "I (idle)", /* 0x80 */ |
1da177e4 LT |
139 | }; |
140 | ||
8ea02606 | 141 | static inline const char *get_task_state(struct task_struct *tsk) |
1da177e4 | 142 | { |
06eb6184 | 143 | BUILD_BUG_ON(1 + ilog2(TASK_REPORT_MAX) != ARRAY_SIZE(task_state_array)); |
1d48b080 | 144 | return task_state_array[task_state_index(tsk)]; |
1da177e4 LT |
145 | } |
146 | ||
df5f8314 EB |
147 | static inline void task_state(struct seq_file *m, struct pid_namespace *ns, |
148 | struct pid *pid, struct task_struct *p) | |
1da177e4 | 149 | { |
e9f238c3 | 150 | struct user_namespace *user_ns = seq_user_ns(m); |
1da177e4 | 151 | struct group_info *group_info; |
68c3411f | 152 | int g, umask = -1; |
abdba6e9 | 153 | struct task_struct *tracer; |
c69e8d9c | 154 | const struct cred *cred; |
abdba6e9 | 155 | pid_t ppid, tpid = 0, tgid, ngid; |
0f4a0d53 | 156 | unsigned int max_fds = 0; |
1da177e4 | 157 | |
b0fa9db6 | 158 | rcu_read_lock(); |
b488893a PE |
159 | ppid = pid_alive(p) ? |
160 | task_tgid_nr_ns(rcu_dereference(p->real_parent), ns) : 0; | |
abdba6e9 ON |
161 | |
162 | tracer = ptrace_parent(p); | |
163 | if (tracer) | |
164 | tpid = task_pid_nr_ns(tracer, ns); | |
b0fafc11 ON |
165 | |
166 | tgid = task_tgid_nr_ns(p, ns); | |
167 | ngid = task_numa_group_id(p); | |
de09a977 | 168 | cred = get_task_cred(p); |
0f4a0d53 ON |
169 | |
170 | task_lock(p); | |
68c3411f MG |
171 | if (p->fs) |
172 | umask = p->fs->umask; | |
0f4a0d53 ON |
173 | if (p->files) |
174 | max_fds = files_fdtable(p->files)->max_fds; | |
175 | task_unlock(p); | |
b0fafc11 | 176 | rcu_read_unlock(); |
0f4a0d53 | 177 | |
68c3411f MG |
178 | if (umask >= 0) |
179 | seq_printf(m, "Umask:\t%#04o\n", umask); | |
d0f02231 AV |
180 | seq_puts(m, "State:\t"); |
181 | seq_puts(m, get_task_state(p)); | |
f7a5f132 | 182 | |
75ba1d07 JP |
183 | seq_put_decimal_ull(m, "\nTgid:\t", tgid); |
184 | seq_put_decimal_ull(m, "\nNgid:\t", ngid); | |
185 | seq_put_decimal_ull(m, "\nPid:\t", pid_nr_ns(pid, ns)); | |
186 | seq_put_decimal_ull(m, "\nPPid:\t", ppid); | |
187 | seq_put_decimal_ull(m, "\nTracerPid:\t", tpid); | |
188 | seq_put_decimal_ull(m, "\nUid:\t", from_kuid_munged(user_ns, cred->uid)); | |
189 | seq_put_decimal_ull(m, "\t", from_kuid_munged(user_ns, cred->euid)); | |
190 | seq_put_decimal_ull(m, "\t", from_kuid_munged(user_ns, cred->suid)); | |
191 | seq_put_decimal_ull(m, "\t", from_kuid_munged(user_ns, cred->fsuid)); | |
192 | seq_put_decimal_ull(m, "\nGid:\t", from_kgid_munged(user_ns, cred->gid)); | |
193 | seq_put_decimal_ull(m, "\t", from_kgid_munged(user_ns, cred->egid)); | |
194 | seq_put_decimal_ull(m, "\t", from_kgid_munged(user_ns, cred->sgid)); | |
195 | seq_put_decimal_ull(m, "\t", from_kgid_munged(user_ns, cred->fsgid)); | |
196 | seq_put_decimal_ull(m, "\nFDSize:\t", max_fds); | |
f7a5f132 AD |
197 | |
198 | seq_puts(m, "\nGroups:\t"); | |
c69e8d9c | 199 | group_info = cred->group_info; |
8d238027 | 200 | for (g = 0; g < group_info->ngroups; g++) |
75ba1d07 | 201 | seq_put_decimal_ull(m, g ? " " : "", |
81243eac | 202 | from_kgid_munged(user_ns, group_info->gid[g])); |
c69e8d9c | 203 | put_cred(cred); |
f7a5f132 AD |
204 | /* Trailing space shouldn't have been added in the first place. */ |
205 | seq_putc(m, ' '); | |
1da177e4 | 206 | |
e4bc3324 CH |
207 | #ifdef CONFIG_PID_NS |
208 | seq_puts(m, "\nNStgid:"); | |
209 | for (g = ns->level; g <= pid->level; g++) | |
75ba1d07 | 210 | seq_put_decimal_ull(m, "\t", task_tgid_nr_ns(p, pid->numbers[g].ns)); |
e4bc3324 CH |
211 | seq_puts(m, "\nNSpid:"); |
212 | for (g = ns->level; g <= pid->level; g++) | |
75ba1d07 | 213 | seq_put_decimal_ull(m, "\t", task_pid_nr_ns(p, pid->numbers[g].ns)); |
e4bc3324 CH |
214 | seq_puts(m, "\nNSpgid:"); |
215 | for (g = ns->level; g <= pid->level; g++) | |
75ba1d07 | 216 | seq_put_decimal_ull(m, "\t", task_pgrp_nr_ns(p, pid->numbers[g].ns)); |
e4bc3324 CH |
217 | seq_puts(m, "\nNSsid:"); |
218 | for (g = ns->level; g <= pid->level; g++) | |
75ba1d07 | 219 | seq_put_decimal_ull(m, "\t", task_session_nr_ns(p, pid->numbers[g].ns)); |
e4bc3324 | 220 | #endif |
9d6de12f | 221 | seq_putc(m, '\n'); |
1da177e4 LT |
222 | } |
223 | ||
138d22b5 | 224 | void render_sigset_t(struct seq_file *m, const char *header, |
df5f8314 | 225 | sigset_t *set) |
1da177e4 | 226 | { |
df5f8314 | 227 | int i; |
1da177e4 | 228 | |
9d6de12f | 229 | seq_puts(m, header); |
1da177e4 LT |
230 | |
231 | i = _NSIG; | |
232 | do { | |
233 | int x = 0; | |
234 | ||
235 | i -= 4; | |
236 | if (sigismember(set, i+1)) x |= 1; | |
237 | if (sigismember(set, i+2)) x |= 2; | |
238 | if (sigismember(set, i+3)) x |= 4; | |
239 | if (sigismember(set, i+4)) x |= 8; | |
209b14dc | 240 | seq_putc(m, hex_asc[x]); |
1da177e4 LT |
241 | } while (i >= 4); |
242 | ||
9d6de12f | 243 | seq_putc(m, '\n'); |
1da177e4 LT |
244 | } |
245 | ||
8977a27b AD |
246 | static void collect_sigign_sigcatch(struct task_struct *p, sigset_t *sigign, |
247 | sigset_t *sigcatch) | |
1da177e4 LT |
248 | { |
249 | struct k_sigaction *k; | |
250 | int i; | |
251 | ||
252 | k = p->sighand->action; | |
253 | for (i = 1; i <= _NSIG; ++i, ++k) { | |
254 | if (k->sa.sa_handler == SIG_IGN) | |
8977a27b | 255 | sigaddset(sigign, i); |
1da177e4 | 256 | else if (k->sa.sa_handler != SIG_DFL) |
8977a27b | 257 | sigaddset(sigcatch, i); |
1da177e4 LT |
258 | } |
259 | } | |
260 | ||
df5f8314 | 261 | static inline void task_sig(struct seq_file *m, struct task_struct *p) |
1da177e4 | 262 | { |
5e6b3f42 | 263 | unsigned long flags; |
1da177e4 LT |
264 | sigset_t pending, shpending, blocked, ignored, caught; |
265 | int num_threads = 0; | |
197850a1 | 266 | unsigned int qsize = 0; |
1da177e4 LT |
267 | unsigned long qlim = 0; |
268 | ||
269 | sigemptyset(&pending); | |
270 | sigemptyset(&shpending); | |
271 | sigemptyset(&blocked); | |
272 | sigemptyset(&ignored); | |
273 | sigemptyset(&caught); | |
274 | ||
5e6b3f42 | 275 | if (lock_task_sighand(p, &flags)) { |
1da177e4 LT |
276 | pending = p->pending.signal; |
277 | shpending = p->signal->shared_pending.signal; | |
278 | blocked = p->blocked; | |
279 | collect_sigign_sigcatch(p, &ignored, &caught); | |
7e49827c | 280 | num_threads = get_nr_threads(p); |
7dc52157 | 281 | rcu_read_lock(); /* FIXME: is this correct? */ |
de399236 | 282 | qsize = get_rlimit_value(task_ucounts(p), UCOUNT_RLIMIT_SIGPENDING); |
7dc52157 | 283 | rcu_read_unlock(); |
d554ed89 | 284 | qlim = task_rlimit(p, RLIMIT_SIGPENDING); |
5e6b3f42 | 285 | unlock_task_sighand(p, &flags); |
1da177e4 | 286 | } |
1da177e4 | 287 | |
75ba1d07 JP |
288 | seq_put_decimal_ull(m, "Threads:\t", num_threads); |
289 | seq_put_decimal_ull(m, "\nSigQ:\t", qsize); | |
290 | seq_put_decimal_ull(m, "/", qlim); | |
1da177e4 LT |
291 | |
292 | /* render them all */ | |
f7a5f132 | 293 | render_sigset_t(m, "\nSigPnd:\t", &pending); |
df5f8314 EB |
294 | render_sigset_t(m, "ShdPnd:\t", &shpending); |
295 | render_sigset_t(m, "SigBlk:\t", &blocked); | |
296 | render_sigset_t(m, "SigIgn:\t", &ignored); | |
297 | render_sigset_t(m, "SigCgt:\t", &caught); | |
1da177e4 LT |
298 | } |
299 | ||
df5f8314 EB |
300 | static void render_cap_t(struct seq_file *m, const char *header, |
301 | kernel_cap_t *a) | |
e338d263 | 302 | { |
9d6de12f | 303 | seq_puts(m, header); |
f122a08b | 304 | seq_put_hex_ll(m, NULL, a->val, 16); |
9d6de12f | 305 | seq_putc(m, '\n'); |
e338d263 AM |
306 | } |
307 | ||
df5f8314 | 308 | static inline void task_cap(struct seq_file *m, struct task_struct *p) |
1da177e4 | 309 | { |
c69e8d9c | 310 | const struct cred *cred; |
58319057 AL |
311 | kernel_cap_t cap_inheritable, cap_permitted, cap_effective, |
312 | cap_bset, cap_ambient; | |
b6dff3ec | 313 | |
c69e8d9c DH |
314 | rcu_read_lock(); |
315 | cred = __task_cred(p); | |
316 | cap_inheritable = cred->cap_inheritable; | |
317 | cap_permitted = cred->cap_permitted; | |
318 | cap_effective = cred->cap_effective; | |
319 | cap_bset = cred->cap_bset; | |
58319057 | 320 | cap_ambient = cred->cap_ambient; |
c69e8d9c DH |
321 | rcu_read_unlock(); |
322 | ||
323 | render_cap_t(m, "CapInh:\t", &cap_inheritable); | |
324 | render_cap_t(m, "CapPrm:\t", &cap_permitted); | |
325 | render_cap_t(m, "CapEff:\t", &cap_effective); | |
326 | render_cap_t(m, "CapBnd:\t", &cap_bset); | |
58319057 | 327 | render_cap_t(m, "CapAmb:\t", &cap_ambient); |
1da177e4 LT |
328 | } |
329 | ||
2f4b3bf6 KC |
330 | static inline void task_seccomp(struct seq_file *m, struct task_struct *p) |
331 | { | |
af884cd4 | 332 | seq_put_decimal_ull(m, "NoNewPrivs:\t", task_no_new_privs(p)); |
2f4b3bf6 | 333 | #ifdef CONFIG_SECCOMP |
af884cd4 | 334 | seq_put_decimal_ull(m, "\nSeccomp:\t", p->seccomp.mode); |
64bdc024 | 335 | #ifdef CONFIG_SECCOMP_FILTER |
c818c03b KC |
336 | seq_put_decimal_ull(m, "\nSeccomp_filters:\t", |
337 | atomic_read(&p->seccomp.filter_count)); | |
64bdc024 | 338 | #endif |
2f4b3bf6 | 339 | #endif |
08b55775 | 340 | seq_puts(m, "\nSpeculation_Store_Bypass:\t"); |
fae1fa0f KC |
341 | switch (arch_prctl_spec_ctrl_get(p, PR_SPEC_STORE_BYPASS)) { |
342 | case -EINVAL: | |
08b55775 | 343 | seq_puts(m, "unknown"); |
fae1fa0f KC |
344 | break; |
345 | case PR_SPEC_NOT_AFFECTED: | |
08b55775 | 346 | seq_puts(m, "not vulnerable"); |
fae1fa0f | 347 | break; |
356e4bff | 348 | case PR_SPEC_PRCTL | PR_SPEC_FORCE_DISABLE: |
08b55775 | 349 | seq_puts(m, "thread force mitigated"); |
356e4bff | 350 | break; |
fae1fa0f | 351 | case PR_SPEC_PRCTL | PR_SPEC_DISABLE: |
08b55775 | 352 | seq_puts(m, "thread mitigated"); |
fae1fa0f KC |
353 | break; |
354 | case PR_SPEC_PRCTL | PR_SPEC_ENABLE: | |
08b55775 | 355 | seq_puts(m, "thread vulnerable"); |
fae1fa0f KC |
356 | break; |
357 | case PR_SPEC_DISABLE: | |
08b55775 | 358 | seq_puts(m, "globally mitigated"); |
fae1fa0f KC |
359 | break; |
360 | default: | |
08b55775 | 361 | seq_puts(m, "vulnerable"); |
fae1fa0f KC |
362 | break; |
363 | } | |
fe719888 AM |
364 | |
365 | seq_puts(m, "\nSpeculationIndirectBranch:\t"); | |
366 | switch (arch_prctl_spec_ctrl_get(p, PR_SPEC_INDIRECT_BRANCH)) { | |
367 | case -EINVAL: | |
368 | seq_puts(m, "unsupported"); | |
369 | break; | |
370 | case PR_SPEC_NOT_AFFECTED: | |
371 | seq_puts(m, "not affected"); | |
372 | break; | |
373 | case PR_SPEC_PRCTL | PR_SPEC_FORCE_DISABLE: | |
374 | seq_puts(m, "conditional force disabled"); | |
375 | break; | |
376 | case PR_SPEC_PRCTL | PR_SPEC_DISABLE: | |
377 | seq_puts(m, "conditional disabled"); | |
378 | break; | |
379 | case PR_SPEC_PRCTL | PR_SPEC_ENABLE: | |
380 | seq_puts(m, "conditional enabled"); | |
381 | break; | |
382 | case PR_SPEC_ENABLE: | |
383 | seq_puts(m, "always enabled"); | |
384 | break; | |
385 | case PR_SPEC_DISABLE: | |
386 | seq_puts(m, "always disabled"); | |
387 | break; | |
388 | default: | |
389 | seq_puts(m, "unknown"); | |
390 | break; | |
391 | } | |
af884cd4 | 392 | seq_putc(m, '\n'); |
2f4b3bf6 KC |
393 | } |
394 | ||
df5f8314 EB |
395 | static inline void task_context_switch_counts(struct seq_file *m, |
396 | struct task_struct *p) | |
b663a79c | 397 | { |
75ba1d07 JP |
398 | seq_put_decimal_ull(m, "voluntary_ctxt_switches:\t", p->nvcsw); |
399 | seq_put_decimal_ull(m, "\nnonvoluntary_ctxt_switches:\t", p->nivcsw); | |
f7a5f132 | 400 | seq_putc(m, '\n'); |
b663a79c MU |
401 | } |
402 | ||
d01d4827 HC |
403 | static void task_cpus_allowed(struct seq_file *m, struct task_struct *task) |
404 | { | |
a0c2e07d | 405 | seq_printf(m, "Cpus_allowed:\t%*pb\n", |
86fbcd3b | 406 | cpumask_pr_args(&task->cpus_mask)); |
a0c2e07d | 407 | seq_printf(m, "Cpus_allowed_list:\t%*pbl\n", |
86fbcd3b | 408 | cpumask_pr_args(&task->cpus_mask)); |
d01d4827 HC |
409 | } |
410 | ||
0258b5fd | 411 | static inline void task_core_dumping(struct seq_file *m, struct task_struct *task) |
c6434012 | 412 | { |
0258b5fd | 413 | seq_put_decimal_ull(m, "CoreDumping:\t", !!task->signal->core_state); |
d0f02231 | 414 | seq_putc(m, '\n'); |
c6434012 RG |
415 | } |
416 | ||
a1400af7 MH |
417 | static inline void task_thp_status(struct seq_file *m, struct mm_struct *mm) |
418 | { | |
419 | bool thp_enabled = IS_ENABLED(CONFIG_TRANSPARENT_HUGEPAGE); | |
420 | ||
421 | if (thp_enabled) | |
422 | thp_enabled = !test_bit(MMF_DISABLE_THP, &mm->flags); | |
423 | seq_printf(m, "THP_enabled:\t%d\n", thp_enabled); | |
424 | } | |
425 | ||
df5f8314 EB |
426 | int proc_pid_status(struct seq_file *m, struct pid_namespace *ns, |
427 | struct pid *pid, struct task_struct *task) | |
1da177e4 | 428 | { |
1da177e4 LT |
429 | struct mm_struct *mm = get_task_mm(task); |
430 | ||
88b72b31 TH |
431 | seq_puts(m, "Name:\t"); |
432 | proc_task_name(m, task, true); | |
433 | seq_putc(m, '\n'); | |
434 | ||
df5f8314 | 435 | task_state(m, ns, pid, task); |
8ea02606 | 436 | |
1da177e4 | 437 | if (mm) { |
df5f8314 | 438 | task_mem(m, mm); |
0258b5fd | 439 | task_core_dumping(m, task); |
a1400af7 | 440 | task_thp_status(m, mm); |
1da177e4 LT |
441 | mmput(mm); |
442 | } | |
df5f8314 EB |
443 | task_sig(m, task); |
444 | task_cap(m, task); | |
2f4b3bf6 | 445 | task_seccomp(m, task); |
d01d4827 | 446 | task_cpus_allowed(m, task); |
df5f8314 | 447 | cpuset_task_status_allowed(m, task); |
df5f8314 EB |
448 | task_context_switch_counts(m, task); |
449 | return 0; | |
1da177e4 LT |
450 | } |
451 | ||
ee992744 EB |
452 | static int do_task_stat(struct seq_file *m, struct pid_namespace *ns, |
453 | struct pid *pid, struct task_struct *task, int whole) | |
1da177e4 | 454 | { |
b2f73922 | 455 | unsigned long vsize, eip, esp, wchan = 0; |
715be1fc | 456 | int priority, nice; |
1da177e4 LT |
457 | int tty_pgrp = -1, tty_nr = 0; |
458 | sigset_t sigign, sigcatch; | |
459 | char state; | |
8ea02606 | 460 | pid_t ppid = 0, pgid = -1, sid = -1; |
1da177e4 | 461 | int num_threads = 0; |
f83ce3e6 | 462 | int permitted; |
1da177e4 LT |
463 | struct mm_struct *mm; |
464 | unsigned long long start_time; | |
465 | unsigned long cmin_flt = 0, cmaj_flt = 0; | |
466 | unsigned long min_flt = 0, maj_flt = 0; | |
5613fda9 | 467 | u64 cutime, cstime, utime, stime; |
16a6d9be | 468 | u64 cgtime, gtime; |
1da177e4 | 469 | unsigned long rsslim = 0; |
a593d6ed | 470 | unsigned long flags; |
2d18f7f4 | 471 | int exit_code = task->exit_code; |
1da177e4 LT |
472 | |
473 | state = *get_task_state(task); | |
474 | vsize = eip = esp = 0; | |
caaee623 | 475 | permitted = ptrace_may_access(task, PTRACE_MODE_READ_FSCREDS | PTRACE_MODE_NOAUDIT); |
1da177e4 LT |
476 | mm = get_task_mm(task); |
477 | if (mm) { | |
478 | vsize = task_vsize(mm); | |
0a1eb2d4 AL |
479 | /* |
480 | * esp and eip are intentionally zeroed out. There is no | |
481 | * non-racy way to read them without freezing the task. | |
482 | * Programs that need reliable values can use ptrace(2). | |
fd7d5627 JO |
483 | * |
484 | * The only exception is if the task is core dumping because | |
485 | * a program is not able to use ptrace(2) in that case. It is | |
486 | * safe because the task has stopped executing permanently. | |
0a1eb2d4 | 487 | */ |
cb8f381f | 488 | if (permitted && (task->flags & (PF_EXITING|PF_DUMPCORE))) { |
8bb2ee19 AD |
489 | if (try_get_task_stack(task)) { |
490 | eip = KSTK_EIP(task); | |
491 | esp = KSTK_ESP(task); | |
492 | put_task_stack(task); | |
493 | } | |
fd7d5627 | 494 | } |
1da177e4 LT |
495 | } |
496 | ||
1da177e4 LT |
497 | sigemptyset(&sigign); |
498 | sigemptyset(&sigcatch); | |
64861634 MS |
499 | cutime = cstime = utime = stime = 0; |
500 | cgtime = gtime = 0; | |
3cfd0885 | 501 | |
a593d6ed ON |
502 | if (lock_task_sighand(task, &flags)) { |
503 | struct signal_struct *sig = task->signal; | |
91593504 ON |
504 | |
505 | if (sig->tty) { | |
5d0fdf1e AC |
506 | struct pid *pgrp = tty_get_pgrp(sig->tty); |
507 | tty_pgrp = pid_nr_ns(pgrp, ns); | |
508 | put_pid(pgrp); | |
91593504 | 509 | tty_nr = new_encode_dev(tty_devnum(sig->tty)); |
a593d6ed ON |
510 | } |
511 | ||
7e49827c | 512 | num_threads = get_nr_threads(task); |
1da177e4 LT |
513 | collect_sigign_sigcatch(task, &sigign, &sigcatch); |
514 | ||
a593d6ed ON |
515 | cmin_flt = sig->cmin_flt; |
516 | cmaj_flt = sig->cmaj_flt; | |
517 | cutime = sig->cutime; | |
518 | cstime = sig->cstime; | |
9ac52315 | 519 | cgtime = sig->cgtime; |
6aa7de05 | 520 | rsslim = READ_ONCE(sig->rlim[RLIMIT_RSS].rlim_cur); |
a593d6ed | 521 | |
1da177e4 LT |
522 | /* add up live thread stats at the group level */ |
523 | if (whole) { | |
a593d6ed | 524 | struct task_struct *t = task; |
1da177e4 LT |
525 | do { |
526 | min_flt += t->min_flt; | |
527 | maj_flt += t->maj_flt; | |
6fac4829 | 528 | gtime += task_gtime(t); |
185ee40e | 529 | } while_each_thread(task, t); |
1da177e4 | 530 | |
a593d6ed ON |
531 | min_flt += sig->min_flt; |
532 | maj_flt += sig->maj_flt; | |
e80d0a1a | 533 | thread_group_cputime_adjusted(task, &utime, &stime); |
64861634 | 534 | gtime += sig->gtime; |
2d18f7f4 EB |
535 | |
536 | if (sig->flags & (SIGNAL_GROUP_EXIT | SIGNAL_STOP_STOPPED)) | |
537 | exit_code = sig->group_exit_code; | |
1da177e4 | 538 | } |
a593d6ed | 539 | |
b488893a | 540 | sid = task_session_nr_ns(task, ns); |
a98fdcef | 541 | ppid = task_tgid_nr_ns(task->real_parent, ns); |
b488893a | 542 | pgid = task_pgrp_nr_ns(task, ns); |
a593d6ed ON |
543 | |
544 | unlock_task_sighand(task, &flags); | |
1da177e4 | 545 | } |
1da177e4 | 546 | |
f83ce3e6 | 547 | if (permitted && (!whole || num_threads < 2)) |
4e046156 | 548 | wchan = !task_is_running(task); |
1da177e4 LT |
549 | if (!whole) { |
550 | min_flt = task->min_flt; | |
551 | maj_flt = task->maj_flt; | |
e80d0a1a | 552 | task_cputime_adjusted(task, &utime, &stime); |
6fac4829 | 553 | gtime = task_gtime(task); |
1da177e4 LT |
554 | } |
555 | ||
556 | /* scale priority and nice values from timeslices to -20..20 */ | |
557 | /* to make it look like a "normal" Unix priority/nice value */ | |
558 | priority = task_prio(task); | |
559 | nice = task_nice(task); | |
560 | ||
3ae700ec MW |
561 | /* apply timens offset for boottime and convert nsec -> ticks */ |
562 | start_time = | |
563 | nsec_to_clock_t(timens_add_boottime_ns(task->start_boottime)); | |
1da177e4 | 564 | |
d0f02231 AV |
565 | seq_put_decimal_ull(m, "", pid_nr_ns(pid, ns)); |
566 | seq_puts(m, " ("); | |
88b72b31 | 567 | proc_task_name(m, task, false); |
d0f02231 AV |
568 | seq_puts(m, ") "); |
569 | seq_putc(m, state); | |
75ba1d07 JP |
570 | seq_put_decimal_ll(m, " ", ppid); |
571 | seq_put_decimal_ll(m, " ", pgid); | |
572 | seq_put_decimal_ll(m, " ", sid); | |
573 | seq_put_decimal_ll(m, " ", tty_nr); | |
574 | seq_put_decimal_ll(m, " ", tty_pgrp); | |
575 | seq_put_decimal_ull(m, " ", task->flags); | |
576 | seq_put_decimal_ull(m, " ", min_flt); | |
577 | seq_put_decimal_ull(m, " ", cmin_flt); | |
578 | seq_put_decimal_ull(m, " ", maj_flt); | |
579 | seq_put_decimal_ull(m, " ", cmaj_flt); | |
5613fda9 FW |
580 | seq_put_decimal_ull(m, " ", nsec_to_clock_t(utime)); |
581 | seq_put_decimal_ull(m, " ", nsec_to_clock_t(stime)); | |
582 | seq_put_decimal_ll(m, " ", nsec_to_clock_t(cutime)); | |
583 | seq_put_decimal_ll(m, " ", nsec_to_clock_t(cstime)); | |
75ba1d07 JP |
584 | seq_put_decimal_ll(m, " ", priority); |
585 | seq_put_decimal_ll(m, " ", nice); | |
586 | seq_put_decimal_ll(m, " ", num_threads); | |
587 | seq_put_decimal_ull(m, " ", 0); | |
588 | seq_put_decimal_ull(m, " ", start_time); | |
589 | seq_put_decimal_ull(m, " ", vsize); | |
590 | seq_put_decimal_ull(m, " ", mm ? get_mm_rss(mm) : 0); | |
591 | seq_put_decimal_ull(m, " ", rsslim); | |
592 | seq_put_decimal_ull(m, " ", mm ? (permitted ? mm->start_code : 1) : 0); | |
593 | seq_put_decimal_ull(m, " ", mm ? (permitted ? mm->end_code : 1) : 0); | |
594 | seq_put_decimal_ull(m, " ", (permitted && mm) ? mm->start_stack : 0); | |
595 | seq_put_decimal_ull(m, " ", esp); | |
596 | seq_put_decimal_ull(m, " ", eip); | |
bda7bad6 KH |
597 | /* The signal information here is obsolete. |
598 | * It must be decimal for Linux 2.0 compatibility. | |
599 | * Use /proc/#/status for real-time signals. | |
600 | */ | |
75ba1d07 JP |
601 | seq_put_decimal_ull(m, " ", task->pending.signal.sig[0] & 0x7fffffffUL); |
602 | seq_put_decimal_ull(m, " ", task->blocked.sig[0] & 0x7fffffffUL); | |
603 | seq_put_decimal_ull(m, " ", sigign.sig[0] & 0x7fffffffUL); | |
604 | seq_put_decimal_ull(m, " ", sigcatch.sig[0] & 0x7fffffffUL); | |
b2f73922 IM |
605 | |
606 | /* | |
607 | * We used to output the absolute kernel address, but that's an | |
608 | * information leak - so instead we show a 0/1 flag here, to signal | |
609 | * to user-space whether there's a wchan field in /proc/PID/wchan. | |
610 | * | |
611 | * This works with older implementations of procps as well. | |
612 | */ | |
4e046156 | 613 | seq_put_decimal_ull(m, " ", wchan); |
b2f73922 | 614 | |
75ba1d07 JP |
615 | seq_put_decimal_ull(m, " ", 0); |
616 | seq_put_decimal_ull(m, " ", 0); | |
617 | seq_put_decimal_ll(m, " ", task->exit_signal); | |
618 | seq_put_decimal_ll(m, " ", task_cpu(task)); | |
619 | seq_put_decimal_ull(m, " ", task->rt_priority); | |
620 | seq_put_decimal_ull(m, " ", task->policy); | |
621 | seq_put_decimal_ull(m, " ", delayacct_blkio_ticks(task)); | |
16a6d9be FW |
622 | seq_put_decimal_ull(m, " ", nsec_to_clock_t(gtime)); |
623 | seq_put_decimal_ll(m, " ", nsec_to_clock_t(cgtime)); | |
5b172087 CG |
624 | |
625 | if (mm && permitted) { | |
75ba1d07 JP |
626 | seq_put_decimal_ull(m, " ", mm->start_data); |
627 | seq_put_decimal_ull(m, " ", mm->end_data); | |
628 | seq_put_decimal_ull(m, " ", mm->start_brk); | |
629 | seq_put_decimal_ull(m, " ", mm->arg_start); | |
630 | seq_put_decimal_ull(m, " ", mm->arg_end); | |
631 | seq_put_decimal_ull(m, " ", mm->env_start); | |
632 | seq_put_decimal_ull(m, " ", mm->env_end); | |
5b172087 | 633 | } else |
75ba1d07 | 634 | seq_puts(m, " 0 0 0 0 0 0 0"); |
5b172087 CG |
635 | |
636 | if (permitted) | |
2d18f7f4 | 637 | seq_put_decimal_ll(m, " ", exit_code); |
5b172087 | 638 | else |
75ba1d07 | 639 | seq_puts(m, " 0"); |
5b172087 | 640 | |
bda7bad6 | 641 | seq_putc(m, '\n'); |
8ea02606 | 642 | if (mm) |
1da177e4 | 643 | mmput(mm); |
ee992744 | 644 | return 0; |
1da177e4 LT |
645 | } |
646 | ||
ee992744 EB |
647 | int proc_tid_stat(struct seq_file *m, struct pid_namespace *ns, |
648 | struct pid *pid, struct task_struct *task) | |
1da177e4 | 649 | { |
ee992744 | 650 | return do_task_stat(m, ns, pid, task, 0); |
1da177e4 LT |
651 | } |
652 | ||
ee992744 EB |
653 | int proc_tgid_stat(struct seq_file *m, struct pid_namespace *ns, |
654 | struct pid *pid, struct task_struct *task) | |
1da177e4 | 655 | { |
ee992744 | 656 | return do_task_stat(m, ns, pid, task, 1); |
1da177e4 LT |
657 | } |
658 | ||
a56d3fc7 EB |
659 | int proc_pid_statm(struct seq_file *m, struct pid_namespace *ns, |
660 | struct pid *pid, struct task_struct *task) | |
1da177e4 | 661 | { |
1da177e4 | 662 | struct mm_struct *mm = get_task_mm(task); |
8ea02606 | 663 | |
1da177e4 | 664 | if (mm) { |
5c5ab971 AD |
665 | unsigned long size; |
666 | unsigned long resident = 0; | |
667 | unsigned long shared = 0; | |
668 | unsigned long text = 0; | |
669 | unsigned long data = 0; | |
670 | ||
1da177e4 LT |
671 | size = task_statm(mm, &shared, &text, &data, &resident); |
672 | mmput(mm); | |
1da177e4 | 673 | |
5c5ab971 AD |
674 | /* |
675 | * For quick read, open code by putting numbers directly | |
676 | * expected format is | |
677 | * seq_printf(m, "%lu %lu %lu %lu 0 %lu 0\n", | |
678 | * size, resident, shared, text, data); | |
679 | */ | |
680 | seq_put_decimal_ull(m, "", size); | |
681 | seq_put_decimal_ull(m, " ", resident); | |
682 | seq_put_decimal_ull(m, " ", shared); | |
683 | seq_put_decimal_ull(m, " ", text); | |
684 | seq_put_decimal_ull(m, " ", 0); | |
685 | seq_put_decimal_ull(m, " ", data); | |
686 | seq_put_decimal_ull(m, " ", 0); | |
687 | seq_putc(m, '\n'); | |
688 | } else { | |
689 | seq_write(m, "0 0 0 0 0 0 0\n", 14); | |
690 | } | |
a56d3fc7 | 691 | return 0; |
1da177e4 | 692 | } |
81841161 | 693 | |
2e13ba54 | 694 | #ifdef CONFIG_PROC_CHILDREN |
81841161 CG |
695 | static struct pid * |
696 | get_children_pid(struct inode *inode, struct pid *pid_prev, loff_t pos) | |
697 | { | |
698 | struct task_struct *start, *task; | |
699 | struct pid *pid = NULL; | |
700 | ||
701 | read_lock(&tasklist_lock); | |
702 | ||
703 | start = pid_task(proc_pid(inode), PIDTYPE_PID); | |
704 | if (!start) | |
705 | goto out; | |
706 | ||
707 | /* | |
708 | * Lets try to continue searching first, this gives | |
709 | * us significant speedup on children-rich processes. | |
710 | */ | |
711 | if (pid_prev) { | |
712 | task = pid_task(pid_prev, PIDTYPE_PID); | |
713 | if (task && task->real_parent == start && | |
714 | !(list_empty(&task->sibling))) { | |
715 | if (list_is_last(&task->sibling, &start->children)) | |
716 | goto out; | |
717 | task = list_first_entry(&task->sibling, | |
718 | struct task_struct, sibling); | |
719 | pid = get_pid(task_pid(task)); | |
720 | goto out; | |
721 | } | |
722 | } | |
723 | ||
724 | /* | |
725 | * Slow search case. | |
726 | * | |
727 | * We might miss some children here if children | |
728 | * are exited while we were not holding the lock, | |
729 | * but it was never promised to be accurate that | |
730 | * much. | |
731 | * | |
732 | * "Just suppose that the parent sleeps, but N children | |
733 | * exit after we printed their tids. Now the slow paths | |
734 | * skips N extra children, we miss N tasks." (c) | |
735 | * | |
736 | * So one need to stop or freeze the leader and all | |
737 | * its children to get a precise result. | |
738 | */ | |
739 | list_for_each_entry(task, &start->children, sibling) { | |
740 | if (pos-- == 0) { | |
741 | pid = get_pid(task_pid(task)); | |
742 | break; | |
743 | } | |
744 | } | |
745 | ||
746 | out: | |
747 | read_unlock(&tasklist_lock); | |
748 | return pid; | |
749 | } | |
750 | ||
751 | static int children_seq_show(struct seq_file *seq, void *v) | |
752 | { | |
04015e3f | 753 | struct inode *inode = file_inode(seq->file); |
25ce3191 | 754 | |
9d78edea | 755 | seq_printf(seq, "%d ", pid_nr_ns(v, proc_pid_ns(inode->i_sb))); |
25ce3191 | 756 | return 0; |
81841161 CG |
757 | } |
758 | ||
759 | static void *children_seq_start(struct seq_file *seq, loff_t *pos) | |
760 | { | |
04015e3f | 761 | return get_children_pid(file_inode(seq->file), NULL, *pos); |
81841161 CG |
762 | } |
763 | ||
764 | static void *children_seq_next(struct seq_file *seq, void *v, loff_t *pos) | |
765 | { | |
766 | struct pid *pid; | |
767 | ||
04015e3f | 768 | pid = get_children_pid(file_inode(seq->file), v, *pos + 1); |
81841161 CG |
769 | put_pid(v); |
770 | ||
771 | ++*pos; | |
772 | return pid; | |
773 | } | |
774 | ||
775 | static void children_seq_stop(struct seq_file *seq, void *v) | |
776 | { | |
777 | put_pid(v); | |
778 | } | |
779 | ||
780 | static const struct seq_operations children_seq_ops = { | |
781 | .start = children_seq_start, | |
782 | .next = children_seq_next, | |
783 | .stop = children_seq_stop, | |
784 | .show = children_seq_show, | |
785 | }; | |
786 | ||
787 | static int children_seq_open(struct inode *inode, struct file *file) | |
788 | { | |
04015e3f | 789 | return seq_open(file, &children_seq_ops); |
81841161 CG |
790 | } |
791 | ||
81841161 CG |
792 | const struct file_operations proc_tid_children_operations = { |
793 | .open = children_seq_open, | |
794 | .read = seq_read, | |
795 | .llseek = seq_lseek, | |
171ef917 | 796 | .release = seq_release, |
81841161 | 797 | }; |
2e13ba54 | 798 | #endif /* CONFIG_PROC_CHILDREN */ |