]>
Commit | Line | Data |
---|---|---|
b2441318 | 1 | // SPDX-License-Identifier: GPL-2.0 |
1da177e4 LT |
2 | /* |
3 | * linux/fs/proc/array.c | |
4 | * | |
5 | * Copyright (C) 1992 by Linus Torvalds | |
6 | * based on ideas by Darren Senn | |
7 | * | |
8 | * Fixes: | |
9 | * Michael. K. Johnson: stat,statm extensions. | |
10 | * <[email protected]> | |
11 | * | |
12 | * Pauline Middelink : Made cmdline,envline only break at '\0's, to | |
13 | * make sure SET_PROCTITLE works. Also removed | |
14 | * bad '!' which forced address recalculation for | |
15 | * EVERY character on the current page. | |
16 | * <[email protected]> | |
17 | * | |
18 | * Danny ter Haar : added cpuinfo | |
19 | * <[email protected]> | |
20 | * | |
21 | * Alessandro Rubini : profile extension. | |
22 | * <[email protected]> | |
23 | * | |
24 | * Jeff Tranter : added BogoMips field to cpuinfo | |
25 | * <[email protected]> | |
26 | * | |
27 | * Bruno Haible : remove 4K limit for the maps file | |
28 | * <[email protected]> | |
29 | * | |
30 | * Yves Arrouye : remove removal of trailing spaces in get_array. | |
31 | * <[email protected]> | |
32 | * | |
33 | * Jerome Forissier : added per-CPU time information to /proc/stat | |
34 | * and /proc/<pid>/cpu extension | |
35 | * <[email protected]> | |
36 | * - Incorporation and non-SMP safe operation | |
37 | * of forissier patch in 2.1.78 by | |
38 | * Hans Marcus <[email protected]> | |
39 | * | |
40 | * [email protected] : /proc/partitions | |
41 | * | |
42 | * | |
43 | * Alan Cox : security fixes. | |
526719ba | 44 | * <[email protected]> |
1da177e4 LT |
45 | * |
46 | * Al Viro : safe handling of mm_struct | |
47 | * | |
48 | * Gerhard Wichert : added BIGMEM support | |
49 | * Siemens AG <[email protected]> | |
50 | * | |
51 | * Al Viro & Jeff Garzik : moved most of the thing into base.c and | |
52 | * : proc_misc.c. The rest may eventually go into | |
53 | * : base.c too. | |
54 | */ | |
55 | ||
1da177e4 LT |
56 | #include <linux/types.h> |
57 | #include <linux/errno.h> | |
58 | #include <linux/time.h> | |
3ae700ec | 59 | #include <linux/time_namespace.h> |
1da177e4 LT |
60 | #include <linux/kernel.h> |
61 | #include <linux/kernel_stat.h> | |
62 | #include <linux/tty.h> | |
63 | #include <linux/string.h> | |
64 | #include <linux/mman.h> | |
6e84f315 | 65 | #include <linux/sched/mm.h> |
6a3827d7 | 66 | #include <linux/sched/numa_balancing.h> |
fd7d5627 | 67 | #include <linux/sched/task_stack.h> |
29930025 | 68 | #include <linux/sched/task.h> |
32ef5517 | 69 | #include <linux/sched/cputime.h> |
1da177e4 LT |
70 | #include <linux/proc_fs.h> |
71 | #include <linux/ioport.h> | |
8ea02606 | 72 | #include <linux/io.h> |
1da177e4 LT |
73 | #include <linux/mm.h> |
74 | #include <linux/hugetlb.h> | |
75 | #include <linux/pagemap.h> | |
76 | #include <linux/swap.h> | |
1da177e4 LT |
77 | #include <linux/smp.h> |
78 | #include <linux/signal.h> | |
79 | #include <linux/highmem.h> | |
80 | #include <linux/file.h> | |
9f3acc31 | 81 | #include <linux/fdtable.h> |
1da177e4 LT |
82 | #include <linux/times.h> |
83 | #include <linux/cpuset.h> | |
4fb3a538 | 84 | #include <linux/rcupdate.h> |
25890454 | 85 | #include <linux/delayacct.h> |
ee992744 | 86 | #include <linux/seq_file.h> |
b488893a | 87 | #include <linux/pid_namespace.h> |
fae1fa0f | 88 | #include <linux/prctl.h> |
f83ce3e6 | 89 | #include <linux/ptrace.h> |
edc924e0 | 90 | #include <linux/string_helpers.h> |
ae2975bc | 91 | #include <linux/user_namespace.h> |
3e42979e | 92 | #include <linux/fs_struct.h> |
d6986ce2 | 93 | #include <linux/kthread.h> |
f7d30434 | 94 | #include <linux/mmu_context.h> |
1da177e4 | 95 | |
1da177e4 LT |
96 | #include <asm/processor.h> |
97 | #include "internal.h" | |
98 | ||
88b72b31 | 99 | void proc_task_name(struct seq_file *m, struct task_struct *p, bool escape) |
1da177e4 | 100 | { |
6b59808b | 101 | char tcomm[64]; |
1da177e4 | 102 | |
ed8fb78d AD |
103 | /* |
104 | * Test before PF_KTHREAD because all workqueue worker threads are | |
105 | * kernel threads. | |
106 | */ | |
6b59808b TH |
107 | if (p->flags & PF_WQ_WORKER) |
108 | wq_worker_comm(tcomm, sizeof(tcomm), p); | |
d6986ce2 YS |
109 | else if (p->flags & PF_KTHREAD) |
110 | get_kthread_comm(tcomm, sizeof(tcomm), p); | |
6b59808b TH |
111 | else |
112 | __get_task_comm(tcomm, sizeof(tcomm), p); | |
edc924e0 | 113 | |
8d23b208 CH |
114 | if (escape) |
115 | seq_escape_str(m, tcomm, ESCAPE_SPACE | ESCAPE_SPECIAL, "\n\\"); | |
116 | else | |
117 | seq_printf(m, "%.64s", tcomm); | |
1da177e4 LT |
118 | } |
119 | ||
120 | /* | |
121 | * The task state array is a strange "bitmap" of | |
122 | * reasons to sleep. Thus "running" is zero, and | |
123 | * you can test for combinations of others with | |
124 | * simple bit tests. | |
125 | */ | |
e130aa70 | 126 | static const char * const task_state_array[] = { |
06eb6184 PZ |
127 | |
128 | /* states in TASK_REPORT: */ | |
129 | "R (running)", /* 0x00 */ | |
130 | "S (sleeping)", /* 0x01 */ | |
131 | "D (disk sleep)", /* 0x02 */ | |
132 | "T (stopped)", /* 0x04 */ | |
133 | "t (tracing stop)", /* 0x08 */ | |
134 | "X (dead)", /* 0x10 */ | |
135 | "Z (zombie)", /* 0x20 */ | |
8ef9925b | 136 | "P (parked)", /* 0x40 */ |
06eb6184 PZ |
137 | |
138 | /* states beyond TASK_REPORT: */ | |
8ef9925b | 139 | "I (idle)", /* 0x80 */ |
1da177e4 LT |
140 | }; |
141 | ||
8ea02606 | 142 | static inline const char *get_task_state(struct task_struct *tsk) |
1da177e4 | 143 | { |
06eb6184 | 144 | BUILD_BUG_ON(1 + ilog2(TASK_REPORT_MAX) != ARRAY_SIZE(task_state_array)); |
1d48b080 | 145 | return task_state_array[task_state_index(tsk)]; |
1da177e4 LT |
146 | } |
147 | ||
df5f8314 EB |
148 | static inline void task_state(struct seq_file *m, struct pid_namespace *ns, |
149 | struct pid *pid, struct task_struct *p) | |
1da177e4 | 150 | { |
e9f238c3 | 151 | struct user_namespace *user_ns = seq_user_ns(m); |
1da177e4 | 152 | struct group_info *group_info; |
68c3411f | 153 | int g, umask = -1; |
abdba6e9 | 154 | struct task_struct *tracer; |
c69e8d9c | 155 | const struct cred *cred; |
abdba6e9 | 156 | pid_t ppid, tpid = 0, tgid, ngid; |
0f4a0d53 | 157 | unsigned int max_fds = 0; |
1da177e4 | 158 | |
b0fa9db6 | 159 | rcu_read_lock(); |
b488893a PE |
160 | ppid = pid_alive(p) ? |
161 | task_tgid_nr_ns(rcu_dereference(p->real_parent), ns) : 0; | |
abdba6e9 ON |
162 | |
163 | tracer = ptrace_parent(p); | |
164 | if (tracer) | |
165 | tpid = task_pid_nr_ns(tracer, ns); | |
b0fafc11 ON |
166 | |
167 | tgid = task_tgid_nr_ns(p, ns); | |
168 | ngid = task_numa_group_id(p); | |
de09a977 | 169 | cred = get_task_cred(p); |
0f4a0d53 ON |
170 | |
171 | task_lock(p); | |
68c3411f MG |
172 | if (p->fs) |
173 | umask = p->fs->umask; | |
0f4a0d53 ON |
174 | if (p->files) |
175 | max_fds = files_fdtable(p->files)->max_fds; | |
176 | task_unlock(p); | |
b0fafc11 | 177 | rcu_read_unlock(); |
0f4a0d53 | 178 | |
68c3411f MG |
179 | if (umask >= 0) |
180 | seq_printf(m, "Umask:\t%#04o\n", umask); | |
d0f02231 AV |
181 | seq_puts(m, "State:\t"); |
182 | seq_puts(m, get_task_state(p)); | |
f7a5f132 | 183 | |
75ba1d07 JP |
184 | seq_put_decimal_ull(m, "\nTgid:\t", tgid); |
185 | seq_put_decimal_ull(m, "\nNgid:\t", ngid); | |
186 | seq_put_decimal_ull(m, "\nPid:\t", pid_nr_ns(pid, ns)); | |
187 | seq_put_decimal_ull(m, "\nPPid:\t", ppid); | |
188 | seq_put_decimal_ull(m, "\nTracerPid:\t", tpid); | |
189 | seq_put_decimal_ull(m, "\nUid:\t", from_kuid_munged(user_ns, cred->uid)); | |
190 | seq_put_decimal_ull(m, "\t", from_kuid_munged(user_ns, cred->euid)); | |
191 | seq_put_decimal_ull(m, "\t", from_kuid_munged(user_ns, cred->suid)); | |
192 | seq_put_decimal_ull(m, "\t", from_kuid_munged(user_ns, cred->fsuid)); | |
193 | seq_put_decimal_ull(m, "\nGid:\t", from_kgid_munged(user_ns, cred->gid)); | |
194 | seq_put_decimal_ull(m, "\t", from_kgid_munged(user_ns, cred->egid)); | |
195 | seq_put_decimal_ull(m, "\t", from_kgid_munged(user_ns, cred->sgid)); | |
196 | seq_put_decimal_ull(m, "\t", from_kgid_munged(user_ns, cred->fsgid)); | |
197 | seq_put_decimal_ull(m, "\nFDSize:\t", max_fds); | |
f7a5f132 AD |
198 | |
199 | seq_puts(m, "\nGroups:\t"); | |
c69e8d9c | 200 | group_info = cred->group_info; |
8d238027 | 201 | for (g = 0; g < group_info->ngroups; g++) |
75ba1d07 | 202 | seq_put_decimal_ull(m, g ? " " : "", |
81243eac | 203 | from_kgid_munged(user_ns, group_info->gid[g])); |
c69e8d9c | 204 | put_cred(cred); |
f7a5f132 AD |
205 | /* Trailing space shouldn't have been added in the first place. */ |
206 | seq_putc(m, ' '); | |
1da177e4 | 207 | |
e4bc3324 CH |
208 | #ifdef CONFIG_PID_NS |
209 | seq_puts(m, "\nNStgid:"); | |
210 | for (g = ns->level; g <= pid->level; g++) | |
75ba1d07 | 211 | seq_put_decimal_ull(m, "\t", task_tgid_nr_ns(p, pid->numbers[g].ns)); |
e4bc3324 CH |
212 | seq_puts(m, "\nNSpid:"); |
213 | for (g = ns->level; g <= pid->level; g++) | |
75ba1d07 | 214 | seq_put_decimal_ull(m, "\t", task_pid_nr_ns(p, pid->numbers[g].ns)); |
e4bc3324 CH |
215 | seq_puts(m, "\nNSpgid:"); |
216 | for (g = ns->level; g <= pid->level; g++) | |
75ba1d07 | 217 | seq_put_decimal_ull(m, "\t", task_pgrp_nr_ns(p, pid->numbers[g].ns)); |
e4bc3324 CH |
218 | seq_puts(m, "\nNSsid:"); |
219 | for (g = ns->level; g <= pid->level; g++) | |
75ba1d07 | 220 | seq_put_decimal_ull(m, "\t", task_session_nr_ns(p, pid->numbers[g].ns)); |
e4bc3324 | 221 | #endif |
9d6de12f | 222 | seq_putc(m, '\n'); |
522dc4e5 CW |
223 | |
224 | seq_printf(m, "Kthread:\t%c\n", p->flags & PF_KTHREAD ? '1' : '0'); | |
1da177e4 LT |
225 | } |
226 | ||
138d22b5 | 227 | void render_sigset_t(struct seq_file *m, const char *header, |
df5f8314 | 228 | sigset_t *set) |
1da177e4 | 229 | { |
df5f8314 | 230 | int i; |
1da177e4 | 231 | |
9d6de12f | 232 | seq_puts(m, header); |
1da177e4 LT |
233 | |
234 | i = _NSIG; | |
235 | do { | |
236 | int x = 0; | |
237 | ||
238 | i -= 4; | |
239 | if (sigismember(set, i+1)) x |= 1; | |
240 | if (sigismember(set, i+2)) x |= 2; | |
241 | if (sigismember(set, i+3)) x |= 4; | |
242 | if (sigismember(set, i+4)) x |= 8; | |
209b14dc | 243 | seq_putc(m, hex_asc[x]); |
1da177e4 LT |
244 | } while (i >= 4); |
245 | ||
9d6de12f | 246 | seq_putc(m, '\n'); |
1da177e4 LT |
247 | } |
248 | ||
8977a27b AD |
249 | static void collect_sigign_sigcatch(struct task_struct *p, sigset_t *sigign, |
250 | sigset_t *sigcatch) | |
1da177e4 LT |
251 | { |
252 | struct k_sigaction *k; | |
253 | int i; | |
254 | ||
255 | k = p->sighand->action; | |
256 | for (i = 1; i <= _NSIG; ++i, ++k) { | |
257 | if (k->sa.sa_handler == SIG_IGN) | |
8977a27b | 258 | sigaddset(sigign, i); |
1da177e4 | 259 | else if (k->sa.sa_handler != SIG_DFL) |
8977a27b | 260 | sigaddset(sigcatch, i); |
1da177e4 LT |
261 | } |
262 | } | |
263 | ||
df5f8314 | 264 | static inline void task_sig(struct seq_file *m, struct task_struct *p) |
1da177e4 | 265 | { |
5e6b3f42 | 266 | unsigned long flags; |
1da177e4 LT |
267 | sigset_t pending, shpending, blocked, ignored, caught; |
268 | int num_threads = 0; | |
197850a1 | 269 | unsigned int qsize = 0; |
1da177e4 LT |
270 | unsigned long qlim = 0; |
271 | ||
272 | sigemptyset(&pending); | |
273 | sigemptyset(&shpending); | |
274 | sigemptyset(&blocked); | |
275 | sigemptyset(&ignored); | |
276 | sigemptyset(&caught); | |
277 | ||
5e6b3f42 | 278 | if (lock_task_sighand(p, &flags)) { |
1da177e4 LT |
279 | pending = p->pending.signal; |
280 | shpending = p->signal->shared_pending.signal; | |
281 | blocked = p->blocked; | |
282 | collect_sigign_sigcatch(p, &ignored, &caught); | |
7e49827c | 283 | num_threads = get_nr_threads(p); |
7dc52157 | 284 | rcu_read_lock(); /* FIXME: is this correct? */ |
de399236 | 285 | qsize = get_rlimit_value(task_ucounts(p), UCOUNT_RLIMIT_SIGPENDING); |
7dc52157 | 286 | rcu_read_unlock(); |
d554ed89 | 287 | qlim = task_rlimit(p, RLIMIT_SIGPENDING); |
5e6b3f42 | 288 | unlock_task_sighand(p, &flags); |
1da177e4 | 289 | } |
1da177e4 | 290 | |
75ba1d07 JP |
291 | seq_put_decimal_ull(m, "Threads:\t", num_threads); |
292 | seq_put_decimal_ull(m, "\nSigQ:\t", qsize); | |
293 | seq_put_decimal_ull(m, "/", qlim); | |
1da177e4 LT |
294 | |
295 | /* render them all */ | |
f7a5f132 | 296 | render_sigset_t(m, "\nSigPnd:\t", &pending); |
df5f8314 EB |
297 | render_sigset_t(m, "ShdPnd:\t", &shpending); |
298 | render_sigset_t(m, "SigBlk:\t", &blocked); | |
299 | render_sigset_t(m, "SigIgn:\t", &ignored); | |
300 | render_sigset_t(m, "SigCgt:\t", &caught); | |
1da177e4 LT |
301 | } |
302 | ||
df5f8314 EB |
303 | static void render_cap_t(struct seq_file *m, const char *header, |
304 | kernel_cap_t *a) | |
e338d263 | 305 | { |
9d6de12f | 306 | seq_puts(m, header); |
f122a08b | 307 | seq_put_hex_ll(m, NULL, a->val, 16); |
9d6de12f | 308 | seq_putc(m, '\n'); |
e338d263 AM |
309 | } |
310 | ||
df5f8314 | 311 | static inline void task_cap(struct seq_file *m, struct task_struct *p) |
1da177e4 | 312 | { |
c69e8d9c | 313 | const struct cred *cred; |
58319057 AL |
314 | kernel_cap_t cap_inheritable, cap_permitted, cap_effective, |
315 | cap_bset, cap_ambient; | |
b6dff3ec | 316 | |
c69e8d9c DH |
317 | rcu_read_lock(); |
318 | cred = __task_cred(p); | |
319 | cap_inheritable = cred->cap_inheritable; | |
320 | cap_permitted = cred->cap_permitted; | |
321 | cap_effective = cred->cap_effective; | |
322 | cap_bset = cred->cap_bset; | |
58319057 | 323 | cap_ambient = cred->cap_ambient; |
c69e8d9c DH |
324 | rcu_read_unlock(); |
325 | ||
326 | render_cap_t(m, "CapInh:\t", &cap_inheritable); | |
327 | render_cap_t(m, "CapPrm:\t", &cap_permitted); | |
328 | render_cap_t(m, "CapEff:\t", &cap_effective); | |
329 | render_cap_t(m, "CapBnd:\t", &cap_bset); | |
58319057 | 330 | render_cap_t(m, "CapAmb:\t", &cap_ambient); |
1da177e4 LT |
331 | } |
332 | ||
2f4b3bf6 KC |
333 | static inline void task_seccomp(struct seq_file *m, struct task_struct *p) |
334 | { | |
af884cd4 | 335 | seq_put_decimal_ull(m, "NoNewPrivs:\t", task_no_new_privs(p)); |
2f4b3bf6 | 336 | #ifdef CONFIG_SECCOMP |
af884cd4 | 337 | seq_put_decimal_ull(m, "\nSeccomp:\t", p->seccomp.mode); |
64bdc024 | 338 | #ifdef CONFIG_SECCOMP_FILTER |
c818c03b KC |
339 | seq_put_decimal_ull(m, "\nSeccomp_filters:\t", |
340 | atomic_read(&p->seccomp.filter_count)); | |
64bdc024 | 341 | #endif |
2f4b3bf6 | 342 | #endif |
08b55775 | 343 | seq_puts(m, "\nSpeculation_Store_Bypass:\t"); |
fae1fa0f KC |
344 | switch (arch_prctl_spec_ctrl_get(p, PR_SPEC_STORE_BYPASS)) { |
345 | case -EINVAL: | |
08b55775 | 346 | seq_puts(m, "unknown"); |
fae1fa0f KC |
347 | break; |
348 | case PR_SPEC_NOT_AFFECTED: | |
08b55775 | 349 | seq_puts(m, "not vulnerable"); |
fae1fa0f | 350 | break; |
356e4bff | 351 | case PR_SPEC_PRCTL | PR_SPEC_FORCE_DISABLE: |
08b55775 | 352 | seq_puts(m, "thread force mitigated"); |
356e4bff | 353 | break; |
fae1fa0f | 354 | case PR_SPEC_PRCTL | PR_SPEC_DISABLE: |
08b55775 | 355 | seq_puts(m, "thread mitigated"); |
fae1fa0f KC |
356 | break; |
357 | case PR_SPEC_PRCTL | PR_SPEC_ENABLE: | |
08b55775 | 358 | seq_puts(m, "thread vulnerable"); |
fae1fa0f KC |
359 | break; |
360 | case PR_SPEC_DISABLE: | |
08b55775 | 361 | seq_puts(m, "globally mitigated"); |
fae1fa0f KC |
362 | break; |
363 | default: | |
08b55775 | 364 | seq_puts(m, "vulnerable"); |
fae1fa0f KC |
365 | break; |
366 | } | |
fe719888 AM |
367 | |
368 | seq_puts(m, "\nSpeculationIndirectBranch:\t"); | |
369 | switch (arch_prctl_spec_ctrl_get(p, PR_SPEC_INDIRECT_BRANCH)) { | |
370 | case -EINVAL: | |
371 | seq_puts(m, "unsupported"); | |
372 | break; | |
373 | case PR_SPEC_NOT_AFFECTED: | |
374 | seq_puts(m, "not affected"); | |
375 | break; | |
376 | case PR_SPEC_PRCTL | PR_SPEC_FORCE_DISABLE: | |
377 | seq_puts(m, "conditional force disabled"); | |
378 | break; | |
379 | case PR_SPEC_PRCTL | PR_SPEC_DISABLE: | |
380 | seq_puts(m, "conditional disabled"); | |
381 | break; | |
382 | case PR_SPEC_PRCTL | PR_SPEC_ENABLE: | |
383 | seq_puts(m, "conditional enabled"); | |
384 | break; | |
385 | case PR_SPEC_ENABLE: | |
386 | seq_puts(m, "always enabled"); | |
387 | break; | |
388 | case PR_SPEC_DISABLE: | |
389 | seq_puts(m, "always disabled"); | |
390 | break; | |
391 | default: | |
392 | seq_puts(m, "unknown"); | |
393 | break; | |
394 | } | |
af884cd4 | 395 | seq_putc(m, '\n'); |
2f4b3bf6 KC |
396 | } |
397 | ||
df5f8314 EB |
398 | static inline void task_context_switch_counts(struct seq_file *m, |
399 | struct task_struct *p) | |
b663a79c | 400 | { |
75ba1d07 JP |
401 | seq_put_decimal_ull(m, "voluntary_ctxt_switches:\t", p->nvcsw); |
402 | seq_put_decimal_ull(m, "\nnonvoluntary_ctxt_switches:\t", p->nivcsw); | |
f7a5f132 | 403 | seq_putc(m, '\n'); |
b663a79c MU |
404 | } |
405 | ||
d01d4827 HC |
406 | static void task_cpus_allowed(struct seq_file *m, struct task_struct *task) |
407 | { | |
a0c2e07d | 408 | seq_printf(m, "Cpus_allowed:\t%*pb\n", |
86fbcd3b | 409 | cpumask_pr_args(&task->cpus_mask)); |
a0c2e07d | 410 | seq_printf(m, "Cpus_allowed_list:\t%*pbl\n", |
86fbcd3b | 411 | cpumask_pr_args(&task->cpus_mask)); |
d01d4827 HC |
412 | } |
413 | ||
0258b5fd | 414 | static inline void task_core_dumping(struct seq_file *m, struct task_struct *task) |
c6434012 | 415 | { |
0258b5fd | 416 | seq_put_decimal_ull(m, "CoreDumping:\t", !!task->signal->core_state); |
d0f02231 | 417 | seq_putc(m, '\n'); |
c6434012 RG |
418 | } |
419 | ||
a1400af7 MH |
420 | static inline void task_thp_status(struct seq_file *m, struct mm_struct *mm) |
421 | { | |
422 | bool thp_enabled = IS_ENABLED(CONFIG_TRANSPARENT_HUGEPAGE); | |
423 | ||
424 | if (thp_enabled) | |
425 | thp_enabled = !test_bit(MMF_DISABLE_THP, &mm->flags); | |
426 | seq_printf(m, "THP_enabled:\t%d\n", thp_enabled); | |
427 | } | |
428 | ||
f7d30434 KS |
429 | static inline void task_untag_mask(struct seq_file *m, struct mm_struct *mm) |
430 | { | |
431 | seq_printf(m, "untag_mask:\t%#lx\n", mm_untag_mask(mm)); | |
432 | } | |
433 | ||
0ee44885 RE |
434 | __weak void arch_proc_pid_thread_features(struct seq_file *m, |
435 | struct task_struct *task) | |
436 | { | |
437 | } | |
438 | ||
df5f8314 EB |
439 | int proc_pid_status(struct seq_file *m, struct pid_namespace *ns, |
440 | struct pid *pid, struct task_struct *task) | |
1da177e4 | 441 | { |
1da177e4 LT |
442 | struct mm_struct *mm = get_task_mm(task); |
443 | ||
88b72b31 TH |
444 | seq_puts(m, "Name:\t"); |
445 | proc_task_name(m, task, true); | |
446 | seq_putc(m, '\n'); | |
447 | ||
df5f8314 | 448 | task_state(m, ns, pid, task); |
8ea02606 | 449 | |
1da177e4 | 450 | if (mm) { |
df5f8314 | 451 | task_mem(m, mm); |
0258b5fd | 452 | task_core_dumping(m, task); |
a1400af7 | 453 | task_thp_status(m, mm); |
f7d30434 | 454 | task_untag_mask(m, mm); |
1da177e4 LT |
455 | mmput(mm); |
456 | } | |
df5f8314 EB |
457 | task_sig(m, task); |
458 | task_cap(m, task); | |
2f4b3bf6 | 459 | task_seccomp(m, task); |
d01d4827 | 460 | task_cpus_allowed(m, task); |
df5f8314 | 461 | cpuset_task_status_allowed(m, task); |
df5f8314 | 462 | task_context_switch_counts(m, task); |
0ee44885 | 463 | arch_proc_pid_thread_features(m, task); |
df5f8314 | 464 | return 0; |
1da177e4 LT |
465 | } |
466 | ||
ee992744 EB |
467 | static int do_task_stat(struct seq_file *m, struct pid_namespace *ns, |
468 | struct pid *pid, struct task_struct *task, int whole) | |
1da177e4 | 469 | { |
b2f73922 | 470 | unsigned long vsize, eip, esp, wchan = 0; |
715be1fc | 471 | int priority, nice; |
1da177e4 LT |
472 | int tty_pgrp = -1, tty_nr = 0; |
473 | sigset_t sigign, sigcatch; | |
474 | char state; | |
8ea02606 | 475 | pid_t ppid = 0, pgid = -1, sid = -1; |
1da177e4 | 476 | int num_threads = 0; |
f83ce3e6 | 477 | int permitted; |
1da177e4 LT |
478 | struct mm_struct *mm; |
479 | unsigned long long start_time; | |
480 | unsigned long cmin_flt = 0, cmaj_flt = 0; | |
481 | unsigned long min_flt = 0, maj_flt = 0; | |
5613fda9 | 482 | u64 cutime, cstime, utime, stime; |
16a6d9be | 483 | u64 cgtime, gtime; |
1da177e4 | 484 | unsigned long rsslim = 0; |
a593d6ed | 485 | unsigned long flags; |
2d18f7f4 | 486 | int exit_code = task->exit_code; |
1da177e4 LT |
487 | |
488 | state = *get_task_state(task); | |
489 | vsize = eip = esp = 0; | |
caaee623 | 490 | permitted = ptrace_may_access(task, PTRACE_MODE_READ_FSCREDS | PTRACE_MODE_NOAUDIT); |
1da177e4 LT |
491 | mm = get_task_mm(task); |
492 | if (mm) { | |
493 | vsize = task_vsize(mm); | |
0a1eb2d4 AL |
494 | /* |
495 | * esp and eip are intentionally zeroed out. There is no | |
496 | * non-racy way to read them without freezing the task. | |
497 | * Programs that need reliable values can use ptrace(2). | |
fd7d5627 JO |
498 | * |
499 | * The only exception is if the task is core dumping because | |
500 | * a program is not able to use ptrace(2) in that case. It is | |
501 | * safe because the task has stopped executing permanently. | |
0a1eb2d4 | 502 | */ |
cb8f381f | 503 | if (permitted && (task->flags & (PF_EXITING|PF_DUMPCORE))) { |
8bb2ee19 AD |
504 | if (try_get_task_stack(task)) { |
505 | eip = KSTK_EIP(task); | |
506 | esp = KSTK_ESP(task); | |
507 | put_task_stack(task); | |
508 | } | |
fd7d5627 | 509 | } |
1da177e4 LT |
510 | } |
511 | ||
1da177e4 LT |
512 | sigemptyset(&sigign); |
513 | sigemptyset(&sigcatch); | |
64861634 MS |
514 | cutime = cstime = utime = stime = 0; |
515 | cgtime = gtime = 0; | |
3cfd0885 | 516 | |
a593d6ed ON |
517 | if (lock_task_sighand(task, &flags)) { |
518 | struct signal_struct *sig = task->signal; | |
91593504 ON |
519 | |
520 | if (sig->tty) { | |
5d0fdf1e AC |
521 | struct pid *pgrp = tty_get_pgrp(sig->tty); |
522 | tty_pgrp = pid_nr_ns(pgrp, ns); | |
523 | put_pid(pgrp); | |
91593504 | 524 | tty_nr = new_encode_dev(tty_devnum(sig->tty)); |
a593d6ed ON |
525 | } |
526 | ||
7e49827c | 527 | num_threads = get_nr_threads(task); |
1da177e4 LT |
528 | collect_sigign_sigcatch(task, &sigign, &sigcatch); |
529 | ||
a593d6ed ON |
530 | cmin_flt = sig->cmin_flt; |
531 | cmaj_flt = sig->cmaj_flt; | |
532 | cutime = sig->cutime; | |
533 | cstime = sig->cstime; | |
9ac52315 | 534 | cgtime = sig->cgtime; |
6aa7de05 | 535 | rsslim = READ_ONCE(sig->rlim[RLIMIT_RSS].rlim_cur); |
a593d6ed | 536 | |
1da177e4 LT |
537 | /* add up live thread stats at the group level */ |
538 | if (whole) { | |
7904e53e ON |
539 | struct task_struct *t; |
540 | ||
541 | __for_each_thread(sig, t) { | |
1da177e4 LT |
542 | min_flt += t->min_flt; |
543 | maj_flt += t->maj_flt; | |
6fac4829 | 544 | gtime += task_gtime(t); |
7904e53e | 545 | } |
1da177e4 | 546 | |
a593d6ed ON |
547 | min_flt += sig->min_flt; |
548 | maj_flt += sig->maj_flt; | |
e80d0a1a | 549 | thread_group_cputime_adjusted(task, &utime, &stime); |
64861634 | 550 | gtime += sig->gtime; |
2d18f7f4 EB |
551 | |
552 | if (sig->flags & (SIGNAL_GROUP_EXIT | SIGNAL_STOP_STOPPED)) | |
553 | exit_code = sig->group_exit_code; | |
1da177e4 | 554 | } |
a593d6ed | 555 | |
b488893a | 556 | sid = task_session_nr_ns(task, ns); |
a98fdcef | 557 | ppid = task_tgid_nr_ns(task->real_parent, ns); |
b488893a | 558 | pgid = task_pgrp_nr_ns(task, ns); |
a593d6ed ON |
559 | |
560 | unlock_task_sighand(task, &flags); | |
1da177e4 | 561 | } |
1da177e4 | 562 | |
f83ce3e6 | 563 | if (permitted && (!whole || num_threads < 2)) |
4e046156 | 564 | wchan = !task_is_running(task); |
1da177e4 LT |
565 | if (!whole) { |
566 | min_flt = task->min_flt; | |
567 | maj_flt = task->maj_flt; | |
e80d0a1a | 568 | task_cputime_adjusted(task, &utime, &stime); |
6fac4829 | 569 | gtime = task_gtime(task); |
1da177e4 LT |
570 | } |
571 | ||
572 | /* scale priority and nice values from timeslices to -20..20 */ | |
573 | /* to make it look like a "normal" Unix priority/nice value */ | |
574 | priority = task_prio(task); | |
575 | nice = task_nice(task); | |
576 | ||
3ae700ec MW |
577 | /* apply timens offset for boottime and convert nsec -> ticks */ |
578 | start_time = | |
579 | nsec_to_clock_t(timens_add_boottime_ns(task->start_boottime)); | |
1da177e4 | 580 | |
d0f02231 AV |
581 | seq_put_decimal_ull(m, "", pid_nr_ns(pid, ns)); |
582 | seq_puts(m, " ("); | |
88b72b31 | 583 | proc_task_name(m, task, false); |
d0f02231 AV |
584 | seq_puts(m, ") "); |
585 | seq_putc(m, state); | |
75ba1d07 JP |
586 | seq_put_decimal_ll(m, " ", ppid); |
587 | seq_put_decimal_ll(m, " ", pgid); | |
588 | seq_put_decimal_ll(m, " ", sid); | |
589 | seq_put_decimal_ll(m, " ", tty_nr); | |
590 | seq_put_decimal_ll(m, " ", tty_pgrp); | |
591 | seq_put_decimal_ull(m, " ", task->flags); | |
592 | seq_put_decimal_ull(m, " ", min_flt); | |
593 | seq_put_decimal_ull(m, " ", cmin_flt); | |
594 | seq_put_decimal_ull(m, " ", maj_flt); | |
595 | seq_put_decimal_ull(m, " ", cmaj_flt); | |
5613fda9 FW |
596 | seq_put_decimal_ull(m, " ", nsec_to_clock_t(utime)); |
597 | seq_put_decimal_ull(m, " ", nsec_to_clock_t(stime)); | |
598 | seq_put_decimal_ll(m, " ", nsec_to_clock_t(cutime)); | |
599 | seq_put_decimal_ll(m, " ", nsec_to_clock_t(cstime)); | |
75ba1d07 JP |
600 | seq_put_decimal_ll(m, " ", priority); |
601 | seq_put_decimal_ll(m, " ", nice); | |
602 | seq_put_decimal_ll(m, " ", num_threads); | |
603 | seq_put_decimal_ull(m, " ", 0); | |
604 | seq_put_decimal_ull(m, " ", start_time); | |
605 | seq_put_decimal_ull(m, " ", vsize); | |
606 | seq_put_decimal_ull(m, " ", mm ? get_mm_rss(mm) : 0); | |
607 | seq_put_decimal_ull(m, " ", rsslim); | |
608 | seq_put_decimal_ull(m, " ", mm ? (permitted ? mm->start_code : 1) : 0); | |
609 | seq_put_decimal_ull(m, " ", mm ? (permitted ? mm->end_code : 1) : 0); | |
610 | seq_put_decimal_ull(m, " ", (permitted && mm) ? mm->start_stack : 0); | |
611 | seq_put_decimal_ull(m, " ", esp); | |
612 | seq_put_decimal_ull(m, " ", eip); | |
bda7bad6 KH |
613 | /* The signal information here is obsolete. |
614 | * It must be decimal for Linux 2.0 compatibility. | |
615 | * Use /proc/#/status for real-time signals. | |
616 | */ | |
75ba1d07 JP |
617 | seq_put_decimal_ull(m, " ", task->pending.signal.sig[0] & 0x7fffffffUL); |
618 | seq_put_decimal_ull(m, " ", task->blocked.sig[0] & 0x7fffffffUL); | |
619 | seq_put_decimal_ull(m, " ", sigign.sig[0] & 0x7fffffffUL); | |
620 | seq_put_decimal_ull(m, " ", sigcatch.sig[0] & 0x7fffffffUL); | |
b2f73922 IM |
621 | |
622 | /* | |
623 | * We used to output the absolute kernel address, but that's an | |
624 | * information leak - so instead we show a 0/1 flag here, to signal | |
625 | * to user-space whether there's a wchan field in /proc/PID/wchan. | |
626 | * | |
627 | * This works with older implementations of procps as well. | |
628 | */ | |
4e046156 | 629 | seq_put_decimal_ull(m, " ", wchan); |
b2f73922 | 630 | |
75ba1d07 JP |
631 | seq_put_decimal_ull(m, " ", 0); |
632 | seq_put_decimal_ull(m, " ", 0); | |
633 | seq_put_decimal_ll(m, " ", task->exit_signal); | |
634 | seq_put_decimal_ll(m, " ", task_cpu(task)); | |
635 | seq_put_decimal_ull(m, " ", task->rt_priority); | |
636 | seq_put_decimal_ull(m, " ", task->policy); | |
637 | seq_put_decimal_ull(m, " ", delayacct_blkio_ticks(task)); | |
16a6d9be FW |
638 | seq_put_decimal_ull(m, " ", nsec_to_clock_t(gtime)); |
639 | seq_put_decimal_ll(m, " ", nsec_to_clock_t(cgtime)); | |
5b172087 CG |
640 | |
641 | if (mm && permitted) { | |
75ba1d07 JP |
642 | seq_put_decimal_ull(m, " ", mm->start_data); |
643 | seq_put_decimal_ull(m, " ", mm->end_data); | |
644 | seq_put_decimal_ull(m, " ", mm->start_brk); | |
645 | seq_put_decimal_ull(m, " ", mm->arg_start); | |
646 | seq_put_decimal_ull(m, " ", mm->arg_end); | |
647 | seq_put_decimal_ull(m, " ", mm->env_start); | |
648 | seq_put_decimal_ull(m, " ", mm->env_end); | |
5b172087 | 649 | } else |
75ba1d07 | 650 | seq_puts(m, " 0 0 0 0 0 0 0"); |
5b172087 CG |
651 | |
652 | if (permitted) | |
2d18f7f4 | 653 | seq_put_decimal_ll(m, " ", exit_code); |
5b172087 | 654 | else |
75ba1d07 | 655 | seq_puts(m, " 0"); |
5b172087 | 656 | |
bda7bad6 | 657 | seq_putc(m, '\n'); |
8ea02606 | 658 | if (mm) |
1da177e4 | 659 | mmput(mm); |
ee992744 | 660 | return 0; |
1da177e4 LT |
661 | } |
662 | ||
ee992744 EB |
663 | int proc_tid_stat(struct seq_file *m, struct pid_namespace *ns, |
664 | struct pid *pid, struct task_struct *task) | |
1da177e4 | 665 | { |
ee992744 | 666 | return do_task_stat(m, ns, pid, task, 0); |
1da177e4 LT |
667 | } |
668 | ||
ee992744 EB |
669 | int proc_tgid_stat(struct seq_file *m, struct pid_namespace *ns, |
670 | struct pid *pid, struct task_struct *task) | |
1da177e4 | 671 | { |
ee992744 | 672 | return do_task_stat(m, ns, pid, task, 1); |
1da177e4 LT |
673 | } |
674 | ||
a56d3fc7 EB |
675 | int proc_pid_statm(struct seq_file *m, struct pid_namespace *ns, |
676 | struct pid *pid, struct task_struct *task) | |
1da177e4 | 677 | { |
1da177e4 | 678 | struct mm_struct *mm = get_task_mm(task); |
8ea02606 | 679 | |
1da177e4 | 680 | if (mm) { |
5c5ab971 AD |
681 | unsigned long size; |
682 | unsigned long resident = 0; | |
683 | unsigned long shared = 0; | |
684 | unsigned long text = 0; | |
685 | unsigned long data = 0; | |
686 | ||
1da177e4 LT |
687 | size = task_statm(mm, &shared, &text, &data, &resident); |
688 | mmput(mm); | |
1da177e4 | 689 | |
5c5ab971 AD |
690 | /* |
691 | * For quick read, open code by putting numbers directly | |
692 | * expected format is | |
693 | * seq_printf(m, "%lu %lu %lu %lu 0 %lu 0\n", | |
694 | * size, resident, shared, text, data); | |
695 | */ | |
696 | seq_put_decimal_ull(m, "", size); | |
697 | seq_put_decimal_ull(m, " ", resident); | |
698 | seq_put_decimal_ull(m, " ", shared); | |
699 | seq_put_decimal_ull(m, " ", text); | |
700 | seq_put_decimal_ull(m, " ", 0); | |
701 | seq_put_decimal_ull(m, " ", data); | |
702 | seq_put_decimal_ull(m, " ", 0); | |
703 | seq_putc(m, '\n'); | |
704 | } else { | |
705 | seq_write(m, "0 0 0 0 0 0 0\n", 14); | |
706 | } | |
a56d3fc7 | 707 | return 0; |
1da177e4 | 708 | } |
81841161 | 709 | |
2e13ba54 | 710 | #ifdef CONFIG_PROC_CHILDREN |
81841161 CG |
711 | static struct pid * |
712 | get_children_pid(struct inode *inode, struct pid *pid_prev, loff_t pos) | |
713 | { | |
714 | struct task_struct *start, *task; | |
715 | struct pid *pid = NULL; | |
716 | ||
717 | read_lock(&tasklist_lock); | |
718 | ||
719 | start = pid_task(proc_pid(inode), PIDTYPE_PID); | |
720 | if (!start) | |
721 | goto out; | |
722 | ||
723 | /* | |
724 | * Lets try to continue searching first, this gives | |
725 | * us significant speedup on children-rich processes. | |
726 | */ | |
727 | if (pid_prev) { | |
728 | task = pid_task(pid_prev, PIDTYPE_PID); | |
729 | if (task && task->real_parent == start && | |
730 | !(list_empty(&task->sibling))) { | |
731 | if (list_is_last(&task->sibling, &start->children)) | |
732 | goto out; | |
733 | task = list_first_entry(&task->sibling, | |
734 | struct task_struct, sibling); | |
735 | pid = get_pid(task_pid(task)); | |
736 | goto out; | |
737 | } | |
738 | } | |
739 | ||
740 | /* | |
741 | * Slow search case. | |
742 | * | |
743 | * We might miss some children here if children | |
744 | * are exited while we were not holding the lock, | |
745 | * but it was never promised to be accurate that | |
746 | * much. | |
747 | * | |
748 | * "Just suppose that the parent sleeps, but N children | |
749 | * exit after we printed their tids. Now the slow paths | |
750 | * skips N extra children, we miss N tasks." (c) | |
751 | * | |
752 | * So one need to stop or freeze the leader and all | |
753 | * its children to get a precise result. | |
754 | */ | |
755 | list_for_each_entry(task, &start->children, sibling) { | |
756 | if (pos-- == 0) { | |
757 | pid = get_pid(task_pid(task)); | |
758 | break; | |
759 | } | |
760 | } | |
761 | ||
762 | out: | |
763 | read_unlock(&tasklist_lock); | |
764 | return pid; | |
765 | } | |
766 | ||
767 | static int children_seq_show(struct seq_file *seq, void *v) | |
768 | { | |
04015e3f | 769 | struct inode *inode = file_inode(seq->file); |
25ce3191 | 770 | |
9d78edea | 771 | seq_printf(seq, "%d ", pid_nr_ns(v, proc_pid_ns(inode->i_sb))); |
25ce3191 | 772 | return 0; |
81841161 CG |
773 | } |
774 | ||
775 | static void *children_seq_start(struct seq_file *seq, loff_t *pos) | |
776 | { | |
04015e3f | 777 | return get_children_pid(file_inode(seq->file), NULL, *pos); |
81841161 CG |
778 | } |
779 | ||
780 | static void *children_seq_next(struct seq_file *seq, void *v, loff_t *pos) | |
781 | { | |
782 | struct pid *pid; | |
783 | ||
04015e3f | 784 | pid = get_children_pid(file_inode(seq->file), v, *pos + 1); |
81841161 CG |
785 | put_pid(v); |
786 | ||
787 | ++*pos; | |
788 | return pid; | |
789 | } | |
790 | ||
791 | static void children_seq_stop(struct seq_file *seq, void *v) | |
792 | { | |
793 | put_pid(v); | |
794 | } | |
795 | ||
796 | static const struct seq_operations children_seq_ops = { | |
797 | .start = children_seq_start, | |
798 | .next = children_seq_next, | |
799 | .stop = children_seq_stop, | |
800 | .show = children_seq_show, | |
801 | }; | |
802 | ||
803 | static int children_seq_open(struct inode *inode, struct file *file) | |
804 | { | |
04015e3f | 805 | return seq_open(file, &children_seq_ops); |
81841161 CG |
806 | } |
807 | ||
81841161 CG |
808 | const struct file_operations proc_tid_children_operations = { |
809 | .open = children_seq_open, | |
810 | .read = seq_read, | |
811 | .llseek = seq_lseek, | |
171ef917 | 812 | .release = seq_release, |
81841161 | 813 | }; |
2e13ba54 | 814 | #endif /* CONFIG_PROC_CHILDREN */ |