blob: fd8b0c12b2cbefc68988e9bcb6c0a0dd61848d2f [file] [log] [blame]
Greg Kroah-Hartmanb2441312017-11-01 15:07:57 +01001// SPDX-License-Identifier: GPL-2.0
Linus Torvalds1da177e2005-04-16 15:20:36 -07002/*
3 * linux/fs/proc/array.c
4 *
5 * Copyright (C) 1992 by Linus Torvalds
6 * based on ideas by Darren Senn
7 *
8 * Fixes:
9 * Michael. K. Johnson: stat,statm extensions.
10 * <johnsonm@stolaf.edu>
11 *
12 * Pauline Middelink : Made cmdline,envline only break at '\0's, to
13 * make sure SET_PROCTITLE works. Also removed
14 * bad '!' which forced address recalculation for
15 * EVERY character on the current page.
16 * <middelin@polyware.iaf.nl>
17 *
18 * Danny ter Haar : added cpuinfo
19 * <dth@cistron.nl>
20 *
21 * Alessandro Rubini : profile extension.
22 * <rubini@ipvvis.unipv.it>
23 *
24 * Jeff Tranter : added BogoMips field to cpuinfo
25 * <Jeff_Tranter@Mitel.COM>
26 *
27 * Bruno Haible : remove 4K limit for the maps file
28 * <haible@ma2s2.mathematik.uni-karlsruhe.de>
29 *
30 * Yves Arrouye : remove removal of trailing spaces in get_array.
31 * <Yves.Arrouye@marin.fdn.fr>
32 *
33 * Jerome Forissier : added per-CPU time information to /proc/stat
34 * and /proc/<pid>/cpu extension
35 * <forissier@isia.cma.fr>
36 * - Incorporation and non-SMP safe operation
37 * of forissier patch in 2.1.78 by
38 * Hans Marcus <crowbar@concepts.nl>
39 *
40 * aeb@cwi.nl : /proc/partitions
41 *
42 *
43 * Alan Cox : security fixes.
Alan Cox526719b2008-10-27 15:19:48 +000044 * <alan@lxorguk.ukuu.org.uk>
Linus Torvalds1da177e2005-04-16 15:20:36 -070045 *
46 * Al Viro : safe handling of mm_struct
47 *
48 * Gerhard Wichert : added BIGMEM support
49 * Siemens AG <Gerhard.Wichert@pdb.siemens.de>
50 *
51 * Al Viro & Jeff Garzik : moved most of the thing into base.c and
52 * : proc_misc.c. The rest may eventually go into
53 * : base.c too.
54 */
55
Linus Torvalds1da177e2005-04-16 15:20:36 -070056#include <linux/types.h>
57#include <linux/errno.h>
58#include <linux/time.h>
Michael Weiß3ae700e2020-10-27 21:42:57 +010059#include <linux/time_namespace.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070060#include <linux/kernel.h>
61#include <linux/kernel_stat.h>
62#include <linux/tty.h>
63#include <linux/string.h>
64#include <linux/mman.h>
Ingo Molnar6e84f312017-02-08 18:51:29 +010065#include <linux/sched/mm.h>
Ingo Molnar6a3827d2017-02-08 18:51:31 +010066#include <linux/sched/numa_balancing.h>
John Ognessfd7d5622017-09-14 11:42:17 +020067#include <linux/sched/task_stack.h>
Ingo Molnar29930022017-02-08 18:51:36 +010068#include <linux/sched/task.h>
Ingo Molnar32ef5512017-02-05 11:48:36 +010069#include <linux/sched/cputime.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070070#include <linux/proc_fs.h>
71#include <linux/ioport.h>
Ingo Molnar8ea02602007-07-16 09:46:31 +020072#include <linux/uaccess.h>
73#include <linux/io.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070074#include <linux/mm.h>
75#include <linux/hugetlb.h>
76#include <linux/pagemap.h>
77#include <linux/swap.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070078#include <linux/smp.h>
79#include <linux/signal.h>
80#include <linux/highmem.h>
81#include <linux/file.h>
Al Viro9f3acc32008-04-24 07:44:08 -040082#include <linux/fdtable.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070083#include <linux/times.h>
84#include <linux/cpuset.h>
Dipankar Sarma4fb3a532005-09-16 19:28:13 -070085#include <linux/rcupdate.h>
Shailabh Nagar25890452006-07-14 00:24:43 -070086#include <linux/delayacct.h>
Eric W. Biedermanee992742008-02-08 04:18:31 -080087#include <linux/seq_file.h>
Pavel Emelyanovb4888932007-10-18 23:40:14 -070088#include <linux/pid_namespace.h>
Kees Cookfae1fa02018-05-01 15:31:45 -070089#include <linux/prctl.h>
Jake Edgef83ce3e2009-05-04 12:51:14 -060090#include <linux/ptrace.h>
Roland McGrath0d094ef2008-07-25 19:45:49 -070091#include <linux/tracehook.h>
Andy Shevchenkoedc924e2015-02-12 15:01:11 -080092#include <linux/string_helpers.h>
Eric W. Biedermanae2975b2011-11-14 15:56:38 -080093#include <linux/user_namespace.h>
Richard W.M. Jones3e429792016-05-20 17:00:05 -070094#include <linux/fs_struct.h>
Yafang Shaod6986ce2022-01-19 18:08:43 -080095#include <linux/kthread.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070096
Linus Torvalds1da177e2005-04-16 15:20:36 -070097#include <asm/processor.h>
98#include "internal.h"
99
Tejun Heo88b72b32018-05-18 08:47:13 -0700100void proc_task_name(struct seq_file *m, struct task_struct *p, bool escape)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700101{
Tejun Heo6b598082018-05-18 08:47:13 -0700102 char tcomm[64];
Linus Torvalds1da177e2005-04-16 15:20:36 -0700103
Tejun Heo6b598082018-05-18 08:47:13 -0700104 if (p->flags & PF_WQ_WORKER)
105 wq_worker_comm(tcomm, sizeof(tcomm), p);
Yafang Shaod6986ce2022-01-19 18:08:43 -0800106 else if (p->flags & PF_KTHREAD)
107 get_kthread_comm(tcomm, sizeof(tcomm), p);
Tejun Heo6b598082018-05-18 08:47:13 -0700108 else
109 __get_task_comm(tcomm, sizeof(tcomm), p);
Andy Shevchenkoedc924e2015-02-12 15:01:11 -0800110
Christoph Hellwig8d23b202021-09-07 19:57:33 -0700111 if (escape)
112 seq_escape_str(m, tcomm, ESCAPE_SPACE | ESCAPE_SPECIAL, "\n\\");
113 else
114 seq_printf(m, "%.64s", tcomm);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700115}
116
117/*
118 * The task state array is a strange "bitmap" of
119 * reasons to sleep. Thus "running" is zero, and
120 * you can test for combinations of others with
121 * simple bit tests.
122 */
Mike Frysingere130aa72011-05-26 16:25:51 -0700123static const char * const task_state_array[] = {
Peter Zijlstra06eb6182017-09-22 18:30:40 +0200124
125 /* states in TASK_REPORT: */
126 "R (running)", /* 0x00 */
127 "S (sleeping)", /* 0x01 */
128 "D (disk sleep)", /* 0x02 */
129 "T (stopped)", /* 0x04 */
130 "t (tracing stop)", /* 0x08 */
131 "X (dead)", /* 0x10 */
132 "Z (zombie)", /* 0x20 */
Peter Zijlstra8ef99252017-09-22 18:37:28 +0200133 "P (parked)", /* 0x40 */
Peter Zijlstra06eb6182017-09-22 18:30:40 +0200134
135 /* states beyond TASK_REPORT: */
Peter Zijlstra8ef99252017-09-22 18:37:28 +0200136 "I (idle)", /* 0x80 */
Linus Torvalds1da177e2005-04-16 15:20:36 -0700137};
138
Ingo Molnar8ea02602007-07-16 09:46:31 +0200139static inline const char *get_task_state(struct task_struct *tsk)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700140{
Peter Zijlstra06eb6182017-09-22 18:30:40 +0200141 BUILD_BUG_ON(1 + ilog2(TASK_REPORT_MAX) != ARRAY_SIZE(task_state_array));
Peter Zijlstra1d48b082017-09-29 13:50:16 +0200142 return task_state_array[task_state_index(tsk)];
Linus Torvalds1da177e2005-04-16 15:20:36 -0700143}
144
Eric W. Biedermandf5f8312008-02-08 04:18:33 -0800145static inline void task_state(struct seq_file *m, struct pid_namespace *ns,
146 struct pid *pid, struct task_struct *p)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700147{
Eric W. Biedermane9f238c2012-08-11 12:38:26 -0700148 struct user_namespace *user_ns = seq_user_ns(m);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700149 struct group_info *group_info;
Mateusz Guzik68c34112018-04-10 16:30:51 -0700150 int g, umask = -1;
Oleg Nesterovabdba6e2014-12-10 15:45:18 -0800151 struct task_struct *tracer;
David Howellsc69e8d92008-11-14 10:39:19 +1100152 const struct cred *cred;
Oleg Nesterovabdba6e2014-12-10 15:45:18 -0800153 pid_t ppid, tpid = 0, tgid, ngid;
Oleg Nesterov0f4a0d52014-12-10 15:45:12 -0800154 unsigned int max_fds = 0;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700155
Oleg Nesterovb0fa9db2006-10-02 02:18:54 -0700156 rcu_read_lock();
Pavel Emelyanovb4888932007-10-18 23:40:14 -0700157 ppid = pid_alive(p) ?
158 task_tgid_nr_ns(rcu_dereference(p->real_parent), ns) : 0;
Oleg Nesterovabdba6e2014-12-10 15:45:18 -0800159
160 tracer = ptrace_parent(p);
161 if (tracer)
162 tpid = task_pid_nr_ns(tracer, ns);
Oleg Nesterovb0fafc12014-12-10 15:45:15 -0800163
164 tgid = task_tgid_nr_ns(p, ns);
165 ngid = task_numa_group_id(p);
David Howellsde09a972010-07-29 12:45:49 +0100166 cred = get_task_cred(p);
Oleg Nesterov0f4a0d52014-12-10 15:45:12 -0800167
168 task_lock(p);
Mateusz Guzik68c34112018-04-10 16:30:51 -0700169 if (p->fs)
170 umask = p->fs->umask;
Oleg Nesterov0f4a0d52014-12-10 15:45:12 -0800171 if (p->files)
172 max_fds = files_fdtable(p->files)->max_fds;
173 task_unlock(p);
Oleg Nesterovb0fafc12014-12-10 15:45:15 -0800174 rcu_read_unlock();
Oleg Nesterov0f4a0d52014-12-10 15:45:12 -0800175
Mateusz Guzik68c34112018-04-10 16:30:51 -0700176 if (umask >= 0)
177 seq_printf(m, "Umask:\t%#04o\n", umask);
Andrei Vagind0f02232018-04-10 16:31:26 -0700178 seq_puts(m, "State:\t");
179 seq_puts(m, get_task_state(p));
Linus Torvalds1da177e2005-04-16 15:20:36 -0700180
Joe Perches75ba1d02016-10-07 17:02:20 -0700181 seq_put_decimal_ull(m, "\nTgid:\t", tgid);
182 seq_put_decimal_ull(m, "\nNgid:\t", ngid);
183 seq_put_decimal_ull(m, "\nPid:\t", pid_nr_ns(pid, ns));
184 seq_put_decimal_ull(m, "\nPPid:\t", ppid);
185 seq_put_decimal_ull(m, "\nTracerPid:\t", tpid);
186 seq_put_decimal_ull(m, "\nUid:\t", from_kuid_munged(user_ns, cred->uid));
187 seq_put_decimal_ull(m, "\t", from_kuid_munged(user_ns, cred->euid));
188 seq_put_decimal_ull(m, "\t", from_kuid_munged(user_ns, cred->suid));
189 seq_put_decimal_ull(m, "\t", from_kuid_munged(user_ns, cred->fsuid));
190 seq_put_decimal_ull(m, "\nGid:\t", from_kgid_munged(user_ns, cred->gid));
191 seq_put_decimal_ull(m, "\t", from_kgid_munged(user_ns, cred->egid));
192 seq_put_decimal_ull(m, "\t", from_kgid_munged(user_ns, cred->sgid));
193 seq_put_decimal_ull(m, "\t", from_kgid_munged(user_ns, cred->fsgid));
194 seq_put_decimal_ull(m, "\nFDSize:\t", max_fds);
Alexey Dobriyanf7a5f132016-10-07 17:02:17 -0700195
196 seq_puts(m, "\nGroups:\t");
David Howellsc69e8d92008-11-14 10:39:19 +1100197 group_info = cred->group_info;
Artem Bityutskiy8d238022012-12-17 16:03:17 -0800198 for (g = 0; g < group_info->ngroups; g++)
Joe Perches75ba1d02016-10-07 17:02:20 -0700199 seq_put_decimal_ull(m, g ? " " : "",
Alexey Dobriyan81243ea2016-10-07 17:03:12 -0700200 from_kgid_munged(user_ns, group_info->gid[g]));
David Howellsc69e8d92008-11-14 10:39:19 +1100201 put_cred(cred);
Alexey Dobriyanf7a5f132016-10-07 17:02:17 -0700202 /* Trailing space shouldn't have been added in the first place. */
203 seq_putc(m, ' ');
Linus Torvalds1da177e2005-04-16 15:20:36 -0700204
Chen Hanxiaoe4bc3322015-04-15 16:16:30 -0700205#ifdef CONFIG_PID_NS
206 seq_puts(m, "\nNStgid:");
207 for (g = ns->level; g <= pid->level; g++)
Joe Perches75ba1d02016-10-07 17:02:20 -0700208 seq_put_decimal_ull(m, "\t", task_tgid_nr_ns(p, pid->numbers[g].ns));
Chen Hanxiaoe4bc3322015-04-15 16:16:30 -0700209 seq_puts(m, "\nNSpid:");
210 for (g = ns->level; g <= pid->level; g++)
Joe Perches75ba1d02016-10-07 17:02:20 -0700211 seq_put_decimal_ull(m, "\t", task_pid_nr_ns(p, pid->numbers[g].ns));
Chen Hanxiaoe4bc3322015-04-15 16:16:30 -0700212 seq_puts(m, "\nNSpgid:");
213 for (g = ns->level; g <= pid->level; g++)
Joe Perches75ba1d02016-10-07 17:02:20 -0700214 seq_put_decimal_ull(m, "\t", task_pgrp_nr_ns(p, pid->numbers[g].ns));
Chen Hanxiaoe4bc3322015-04-15 16:16:30 -0700215 seq_puts(m, "\nNSsid:");
216 for (g = ns->level; g <= pid->level; g++)
Joe Perches75ba1d02016-10-07 17:02:20 -0700217 seq_put_decimal_ull(m, "\t", task_session_nr_ns(p, pid->numbers[g].ns));
Chen Hanxiaoe4bc3322015-04-15 16:16:30 -0700218#endif
Alexey Dobriyan9d6de122011-01-12 17:00:32 -0800219 seq_putc(m, '\n');
Linus Torvalds1da177e2005-04-16 15:20:36 -0700220}
221
Cyrill Gorcunov138d22b2012-12-17 16:05:02 -0800222void render_sigset_t(struct seq_file *m, const char *header,
Eric W. Biedermandf5f8312008-02-08 04:18:33 -0800223 sigset_t *set)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700224{
Eric W. Biedermandf5f8312008-02-08 04:18:33 -0800225 int i;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700226
Alexey Dobriyan9d6de122011-01-12 17:00:32 -0800227 seq_puts(m, header);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700228
229 i = _NSIG;
230 do {
231 int x = 0;
232
233 i -= 4;
234 if (sigismember(set, i+1)) x |= 1;
235 if (sigismember(set, i+2)) x |= 2;
236 if (sigismember(set, i+3)) x |= 4;
237 if (sigismember(set, i+4)) x |= 8;
Rasmus Villemoes209b14d2016-12-12 16:45:25 -0800238 seq_putc(m, hex_asc[x]);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700239 } while (i >= 4);
240
Alexey Dobriyan9d6de122011-01-12 17:00:32 -0800241 seq_putc(m, '\n');
Linus Torvalds1da177e2005-04-16 15:20:36 -0700242}
243
Alexey Dobriyan8977a272020-06-04 16:49:55 -0700244static void collect_sigign_sigcatch(struct task_struct *p, sigset_t *sigign,
245 sigset_t *sigcatch)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700246{
247 struct k_sigaction *k;
248 int i;
249
250 k = p->sighand->action;
251 for (i = 1; i <= _NSIG; ++i, ++k) {
252 if (k->sa.sa_handler == SIG_IGN)
Alexey Dobriyan8977a272020-06-04 16:49:55 -0700253 sigaddset(sigign, i);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700254 else if (k->sa.sa_handler != SIG_DFL)
Alexey Dobriyan8977a272020-06-04 16:49:55 -0700255 sigaddset(sigcatch, i);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700256 }
257}
258
Eric W. Biedermandf5f8312008-02-08 04:18:33 -0800259static inline void task_sig(struct seq_file *m, struct task_struct *p)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700260{
Oleg Nesterov5e6b3f42006-10-02 02:18:52 -0700261 unsigned long flags;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700262 sigset_t pending, shpending, blocked, ignored, caught;
263 int num_threads = 0;
Alexey Dobriyan197850a12018-06-07 17:10:13 -0700264 unsigned int qsize = 0;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700265 unsigned long qlim = 0;
266
267 sigemptyset(&pending);
268 sigemptyset(&shpending);
269 sigemptyset(&blocked);
270 sigemptyset(&ignored);
271 sigemptyset(&caught);
272
Oleg Nesterov5e6b3f42006-10-02 02:18:52 -0700273 if (lock_task_sighand(p, &flags)) {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700274 pending = p->pending.signal;
275 shpending = p->signal->shared_pending.signal;
276 blocked = p->blocked;
277 collect_sigign_sigcatch(p, &ignored, &caught);
Oleg Nesterov7e498272010-05-26 14:43:22 -0700278 num_threads = get_nr_threads(p);
Paul E. McKenney7dc52152010-02-22 17:04:52 -0800279 rcu_read_lock(); /* FIXME: is this correct? */
Alexey Gladkovd6469692021-04-22 14:27:13 +0200280 qsize = get_ucounts_value(task_ucounts(p), UCOUNT_RLIMIT_SIGPENDING);
Paul E. McKenney7dc52152010-02-22 17:04:52 -0800281 rcu_read_unlock();
Jiri Slabyd554ed892010-03-05 13:42:42 -0800282 qlim = task_rlimit(p, RLIMIT_SIGPENDING);
Oleg Nesterov5e6b3f42006-10-02 02:18:52 -0700283 unlock_task_sighand(p, &flags);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700284 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700285
Joe Perches75ba1d02016-10-07 17:02:20 -0700286 seq_put_decimal_ull(m, "Threads:\t", num_threads);
287 seq_put_decimal_ull(m, "\nSigQ:\t", qsize);
288 seq_put_decimal_ull(m, "/", qlim);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700289
290 /* render them all */
Alexey Dobriyanf7a5f132016-10-07 17:02:17 -0700291 render_sigset_t(m, "\nSigPnd:\t", &pending);
Eric W. Biedermandf5f8312008-02-08 04:18:33 -0800292 render_sigset_t(m, "ShdPnd:\t", &shpending);
293 render_sigset_t(m, "SigBlk:\t", &blocked);
294 render_sigset_t(m, "SigIgn:\t", &ignored);
295 render_sigset_t(m, "SigCgt:\t", &caught);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700296}
297
Eric W. Biedermandf5f8312008-02-08 04:18:33 -0800298static void render_cap_t(struct seq_file *m, const char *header,
299 kernel_cap_t *a)
Andrew Morgane338d262008-02-04 22:29:42 -0800300{
301 unsigned __capi;
302
Alexey Dobriyan9d6de122011-01-12 17:00:32 -0800303 seq_puts(m, header);
Andrew Morgane338d262008-02-04 22:29:42 -0800304 CAP_FOR_EACH_U32(__capi) {
Andrei Vagind0f02232018-04-10 16:31:26 -0700305 seq_put_hex_ll(m, NULL,
306 a->cap[CAP_LAST_U32 - __capi], 8);
Andrew Morgane338d262008-02-04 22:29:42 -0800307 }
Alexey Dobriyan9d6de122011-01-12 17:00:32 -0800308 seq_putc(m, '\n');
Andrew Morgane338d262008-02-04 22:29:42 -0800309}
310
Eric W. Biedermandf5f8312008-02-08 04:18:33 -0800311static inline void task_cap(struct seq_file *m, struct task_struct *p)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700312{
David Howellsc69e8d92008-11-14 10:39:19 +1100313 const struct cred *cred;
Andy Lutomirski58319052015-09-04 15:42:45 -0700314 kernel_cap_t cap_inheritable, cap_permitted, cap_effective,
315 cap_bset, cap_ambient;
David Howellsb6dff3e2008-11-14 10:39:16 +1100316
David Howellsc69e8d92008-11-14 10:39:19 +1100317 rcu_read_lock();
318 cred = __task_cred(p);
319 cap_inheritable = cred->cap_inheritable;
320 cap_permitted = cred->cap_permitted;
321 cap_effective = cred->cap_effective;
322 cap_bset = cred->cap_bset;
Andy Lutomirski58319052015-09-04 15:42:45 -0700323 cap_ambient = cred->cap_ambient;
David Howellsc69e8d92008-11-14 10:39:19 +1100324 rcu_read_unlock();
325
326 render_cap_t(m, "CapInh:\t", &cap_inheritable);
327 render_cap_t(m, "CapPrm:\t", &cap_permitted);
328 render_cap_t(m, "CapEff:\t", &cap_effective);
329 render_cap_t(m, "CapBnd:\t", &cap_bset);
Andy Lutomirski58319052015-09-04 15:42:45 -0700330 render_cap_t(m, "CapAmb:\t", &cap_ambient);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700331}
332
Kees Cook2f4b3bf2012-12-17 16:03:14 -0800333static inline void task_seccomp(struct seq_file *m, struct task_struct *p)
334{
Kees Cookaf884cd2016-12-12 16:45:05 -0800335 seq_put_decimal_ull(m, "NoNewPrivs:\t", task_no_new_privs(p));
Kees Cook2f4b3bf2012-12-17 16:03:14 -0800336#ifdef CONFIG_SECCOMP
Kees Cookaf884cd2016-12-12 16:45:05 -0800337 seq_put_decimal_ull(m, "\nSeccomp:\t", p->seccomp.mode);
Kenta.Tada@sony.com64bdc022021-03-21 15:52:19 +0000338#ifdef CONFIG_SECCOMP_FILTER
Kees Cookc818c032020-05-13 14:11:26 -0700339 seq_put_decimal_ull(m, "\nSeccomp_filters:\t",
340 atomic_read(&p->seccomp.filter_count));
Kees Cook2f4b3bf2012-12-17 16:03:14 -0800341#endif
Kenta.Tada@sony.com64bdc022021-03-21 15:52:19 +0000342#endif
Alexey Dobriyan08b55772019-03-05 15:50:35 -0800343 seq_puts(m, "\nSpeculation_Store_Bypass:\t");
Kees Cookfae1fa02018-05-01 15:31:45 -0700344 switch (arch_prctl_spec_ctrl_get(p, PR_SPEC_STORE_BYPASS)) {
345 case -EINVAL:
Alexey Dobriyan08b55772019-03-05 15:50:35 -0800346 seq_puts(m, "unknown");
Kees Cookfae1fa02018-05-01 15:31:45 -0700347 break;
348 case PR_SPEC_NOT_AFFECTED:
Alexey Dobriyan08b55772019-03-05 15:50:35 -0800349 seq_puts(m, "not vulnerable");
Kees Cookfae1fa02018-05-01 15:31:45 -0700350 break;
Thomas Gleixner356e4bf2018-05-03 22:09:15 +0200351 case PR_SPEC_PRCTL | PR_SPEC_FORCE_DISABLE:
Alexey Dobriyan08b55772019-03-05 15:50:35 -0800352 seq_puts(m, "thread force mitigated");
Thomas Gleixner356e4bf2018-05-03 22:09:15 +0200353 break;
Kees Cookfae1fa02018-05-01 15:31:45 -0700354 case PR_SPEC_PRCTL | PR_SPEC_DISABLE:
Alexey Dobriyan08b55772019-03-05 15:50:35 -0800355 seq_puts(m, "thread mitigated");
Kees Cookfae1fa02018-05-01 15:31:45 -0700356 break;
357 case PR_SPEC_PRCTL | PR_SPEC_ENABLE:
Alexey Dobriyan08b55772019-03-05 15:50:35 -0800358 seq_puts(m, "thread vulnerable");
Kees Cookfae1fa02018-05-01 15:31:45 -0700359 break;
360 case PR_SPEC_DISABLE:
Alexey Dobriyan08b55772019-03-05 15:50:35 -0800361 seq_puts(m, "globally mitigated");
Kees Cookfae1fa02018-05-01 15:31:45 -0700362 break;
363 default:
Alexey Dobriyan08b55772019-03-05 15:50:35 -0800364 seq_puts(m, "vulnerable");
Kees Cookfae1fa02018-05-01 15:31:45 -0700365 break;
366 }
Anand K Mistryfe719882020-12-15 20:42:36 -0800367
368 seq_puts(m, "\nSpeculationIndirectBranch:\t");
369 switch (arch_prctl_spec_ctrl_get(p, PR_SPEC_INDIRECT_BRANCH)) {
370 case -EINVAL:
371 seq_puts(m, "unsupported");
372 break;
373 case PR_SPEC_NOT_AFFECTED:
374 seq_puts(m, "not affected");
375 break;
376 case PR_SPEC_PRCTL | PR_SPEC_FORCE_DISABLE:
377 seq_puts(m, "conditional force disabled");
378 break;
379 case PR_SPEC_PRCTL | PR_SPEC_DISABLE:
380 seq_puts(m, "conditional disabled");
381 break;
382 case PR_SPEC_PRCTL | PR_SPEC_ENABLE:
383 seq_puts(m, "conditional enabled");
384 break;
385 case PR_SPEC_ENABLE:
386 seq_puts(m, "always enabled");
387 break;
388 case PR_SPEC_DISABLE:
389 seq_puts(m, "always disabled");
390 break;
391 default:
392 seq_puts(m, "unknown");
393 break;
394 }
Kees Cookaf884cd2016-12-12 16:45:05 -0800395 seq_putc(m, '\n');
Kees Cook2f4b3bf2012-12-17 16:03:14 -0800396}
397
Eric W. Biedermandf5f8312008-02-08 04:18:33 -0800398static inline void task_context_switch_counts(struct seq_file *m,
399 struct task_struct *p)
Maxim Uvarovb663a792007-07-15 23:40:48 -0700400{
Joe Perches75ba1d02016-10-07 17:02:20 -0700401 seq_put_decimal_ull(m, "voluntary_ctxt_switches:\t", p->nvcsw);
402 seq_put_decimal_ull(m, "\nnonvoluntary_ctxt_switches:\t", p->nivcsw);
Alexey Dobriyanf7a5f132016-10-07 17:02:17 -0700403 seq_putc(m, '\n');
Maxim Uvarovb663a792007-07-15 23:40:48 -0700404}
405
Heiko Carstensd01d4822009-09-21 11:06:27 +0200406static void task_cpus_allowed(struct seq_file *m, struct task_struct *task)
407{
Tejun Heoa0c2e072015-02-13 14:38:07 -0800408 seq_printf(m, "Cpus_allowed:\t%*pb\n",
Peter Zijlstra86fbcd32020-10-05 12:49:16 +0200409 cpumask_pr_args(&task->cpus_mask));
Tejun Heoa0c2e072015-02-13 14:38:07 -0800410 seq_printf(m, "Cpus_allowed_list:\t%*pbl\n",
Peter Zijlstra86fbcd32020-10-05 12:49:16 +0200411 cpumask_pr_args(&task->cpus_mask));
Heiko Carstensd01d4822009-09-21 11:06:27 +0200412}
413
Eric W. Biederman0258b5f2021-09-22 11:24:02 -0500414static inline void task_core_dumping(struct seq_file *m, struct task_struct *task)
Roman Gushchinc6434012017-11-17 15:26:45 -0800415{
Eric W. Biederman0258b5f2021-09-22 11:24:02 -0500416 seq_put_decimal_ull(m, "CoreDumping:\t", !!task->signal->core_state);
Andrei Vagind0f02232018-04-10 16:31:26 -0700417 seq_putc(m, '\n');
Roman Gushchinc6434012017-11-17 15:26:45 -0800418}
419
Michal Hockoa1400af2018-12-28 00:38:25 -0800420static inline void task_thp_status(struct seq_file *m, struct mm_struct *mm)
421{
422 bool thp_enabled = IS_ENABLED(CONFIG_TRANSPARENT_HUGEPAGE);
423
424 if (thp_enabled)
425 thp_enabled = !test_bit(MMF_DISABLE_THP, &mm->flags);
426 seq_printf(m, "THP_enabled:\t%d\n", thp_enabled);
427}
428
Eric W. Biedermandf5f8312008-02-08 04:18:33 -0800429int proc_pid_status(struct seq_file *m, struct pid_namespace *ns,
430 struct pid *pid, struct task_struct *task)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700431{
Linus Torvalds1da177e2005-04-16 15:20:36 -0700432 struct mm_struct *mm = get_task_mm(task);
433
Tejun Heo88b72b32018-05-18 08:47:13 -0700434 seq_puts(m, "Name:\t");
435 proc_task_name(m, task, true);
436 seq_putc(m, '\n');
437
Eric W. Biedermandf5f8312008-02-08 04:18:33 -0800438 task_state(m, ns, pid, task);
Ingo Molnar8ea02602007-07-16 09:46:31 +0200439
Linus Torvalds1da177e2005-04-16 15:20:36 -0700440 if (mm) {
Eric W. Biedermandf5f8312008-02-08 04:18:33 -0800441 task_mem(m, mm);
Eric W. Biederman0258b5f2021-09-22 11:24:02 -0500442 task_core_dumping(m, task);
Michal Hockoa1400af2018-12-28 00:38:25 -0800443 task_thp_status(m, mm);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700444 mmput(mm);
445 }
Eric W. Biedermandf5f8312008-02-08 04:18:33 -0800446 task_sig(m, task);
447 task_cap(m, task);
Kees Cook2f4b3bf2012-12-17 16:03:14 -0800448 task_seccomp(m, task);
Heiko Carstensd01d4822009-09-21 11:06:27 +0200449 task_cpus_allowed(m, task);
Eric W. Biedermandf5f8312008-02-08 04:18:33 -0800450 cpuset_task_status_allowed(m, task);
Eric W. Biedermandf5f8312008-02-08 04:18:33 -0800451 task_context_switch_counts(m, task);
452 return 0;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700453}
454
Eric W. Biedermanee992742008-02-08 04:18:31 -0800455static int do_task_stat(struct seq_file *m, struct pid_namespace *ns,
456 struct pid *pid, struct task_struct *task, int whole)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700457{
Ingo Molnarb2f73922015-09-30 15:59:17 +0200458 unsigned long vsize, eip, esp, wchan = 0;
Jan Engelhardt715be1f2012-05-31 16:26:19 -0700459 int priority, nice;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700460 int tty_pgrp = -1, tty_nr = 0;
461 sigset_t sigign, sigcatch;
462 char state;
Ingo Molnar8ea02602007-07-16 09:46:31 +0200463 pid_t ppid = 0, pgid = -1, sid = -1;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700464 int num_threads = 0;
Jake Edgef83ce3e2009-05-04 12:51:14 -0600465 int permitted;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700466 struct mm_struct *mm;
467 unsigned long long start_time;
468 unsigned long cmin_flt = 0, cmaj_flt = 0;
469 unsigned long min_flt = 0, maj_flt = 0;
Frederic Weisbecker5613fda2017-01-31 04:09:23 +0100470 u64 cutime, cstime, utime, stime;
Frederic Weisbecker16a6d9b2017-01-31 04:09:21 +0100471 u64 cgtime, gtime;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700472 unsigned long rsslim = 0;
Oleg Nesterova593d6e2006-10-02 02:18:53 -0700473 unsigned long flags;
Eric W. Biederman2d18f7f2021-12-20 19:16:34 -0600474 int exit_code = task->exit_code;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700475
476 state = *get_task_state(task);
477 vsize = eip = esp = 0;
Jann Horncaaee622016-01-20 15:00:04 -0800478 permitted = ptrace_may_access(task, PTRACE_MODE_READ_FSCREDS | PTRACE_MODE_NOAUDIT);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700479 mm = get_task_mm(task);
480 if (mm) {
481 vsize = task_vsize(mm);
Andy Lutomirski0a1eb2d2016-09-30 10:58:56 -0700482 /*
483 * esp and eip are intentionally zeroed out. There is no
484 * non-racy way to read them without freezing the task.
485 * Programs that need reliable values can use ptrace(2).
John Ognessfd7d5622017-09-14 11:42:17 +0200486 *
487 * The only exception is if the task is core dumping because
488 * a program is not able to use ptrace(2) in that case. It is
489 * safe because the task has stopped executing permanently.
Andy Lutomirski0a1eb2d2016-09-30 10:58:56 -0700490 */
John Ognesscb8f3812019-06-28 12:06:40 -0700491 if (permitted && (task->flags & (PF_EXITING|PF_DUMPCORE))) {
Alexey Dobriyan8bb2ee12018-01-18 16:34:05 -0800492 if (try_get_task_stack(task)) {
493 eip = KSTK_EIP(task);
494 esp = KSTK_ESP(task);
495 put_task_stack(task);
496 }
John Ognessfd7d5622017-09-14 11:42:17 +0200497 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700498 }
499
Linus Torvalds1da177e2005-04-16 15:20:36 -0700500 sigemptyset(&sigign);
501 sigemptyset(&sigcatch);
Martin Schwidefsky64861632011-12-15 14:56:09 +0100502 cutime = cstime = utime = stime = 0;
503 cgtime = gtime = 0;
Alan Cox3cfd0882006-09-29 02:00:41 -0700504
Oleg Nesterova593d6e2006-10-02 02:18:53 -0700505 if (lock_task_sighand(task, &flags)) {
506 struct signal_struct *sig = task->signal;
Oleg Nesterova593d6e2006-10-02 02:18:53 -0700507
Oleg Nesterov91593502006-12-08 02:36:07 -0800508 if (sig->tty) {
Alan Cox5d0fdf12008-04-30 00:53:31 -0700509 struct pid *pgrp = tty_get_pgrp(sig->tty);
510 tty_pgrp = pid_nr_ns(pgrp, ns);
511 put_pid(pgrp);
Oleg Nesterov91593502006-12-08 02:36:07 -0800512 tty_nr = new_encode_dev(tty_devnum(sig->tty));
Oleg Nesterova593d6e2006-10-02 02:18:53 -0700513 }
514
Oleg Nesterov7e498272010-05-26 14:43:22 -0700515 num_threads = get_nr_threads(task);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700516 collect_sigign_sigcatch(task, &sigign, &sigcatch);
517
Oleg Nesterova593d6e2006-10-02 02:18:53 -0700518 cmin_flt = sig->cmin_flt;
519 cmaj_flt = sig->cmaj_flt;
520 cutime = sig->cutime;
521 cstime = sig->cstime;
Laurent Vivier9ac52312007-10-15 17:00:19 +0200522 cgtime = sig->cgtime;
Mark Rutland6aa7de02017-10-23 14:07:29 -0700523 rsslim = READ_ONCE(sig->rlim[RLIMIT_RSS].rlim_cur);
Oleg Nesterova593d6e2006-10-02 02:18:53 -0700524
Linus Torvalds1da177e2005-04-16 15:20:36 -0700525 /* add up live thread stats at the group level */
526 if (whole) {
Oleg Nesterova593d6e2006-10-02 02:18:53 -0700527 struct task_struct *t = task;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700528 do {
529 min_flt += t->min_flt;
530 maj_flt += t->maj_flt;
Frederic Weisbecker6fac4822012-11-13 14:20:55 +0100531 gtime += task_gtime(t);
Oleg Nesterov185ee402014-01-23 15:55:53 -0800532 } while_each_thread(task, t);
Oleg Nesterova593d6e2006-10-02 02:18:53 -0700533
534 min_flt += sig->min_flt;
535 maj_flt += sig->maj_flt;
Frederic Weisbeckere80d0a1a2012-11-21 16:26:44 +0100536 thread_group_cputime_adjusted(task, &utime, &stime);
Martin Schwidefsky64861632011-12-15 14:56:09 +0100537 gtime += sig->gtime;
Eric W. Biederman2d18f7f2021-12-20 19:16:34 -0600538
539 if (sig->flags & (SIGNAL_GROUP_EXIT | SIGNAL_STOP_STOPPED))
540 exit_code = sig->group_exit_code;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700541 }
542
Pavel Emelyanovb4888932007-10-18 23:40:14 -0700543 sid = task_session_nr_ns(task, ns);
Oleg Nesterova98fdce2008-01-15 00:02:37 +0300544 ppid = task_tgid_nr_ns(task->real_parent, ns);
Pavel Emelyanovb4888932007-10-18 23:40:14 -0700545 pgid = task_pgrp_nr_ns(task, ns);
Oleg Nesterova593d6e2006-10-02 02:18:53 -0700546
547 unlock_task_sighand(task, &flags);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700548 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700549
Jake Edgef83ce3e2009-05-04 12:51:14 -0600550 if (permitted && (!whole || num_threads < 2))
Kees Cook4e046152021-09-29 15:02:15 -0700551 wchan = !task_is_running(task);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700552 if (!whole) {
553 min_flt = task->min_flt;
554 maj_flt = task->maj_flt;
Frederic Weisbeckere80d0a1a2012-11-21 16:26:44 +0100555 task_cputime_adjusted(task, &utime, &stime);
Frederic Weisbecker6fac4822012-11-13 14:20:55 +0100556 gtime = task_gtime(task);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700557 }
558
559 /* scale priority and nice values from timeslices to -20..20 */
560 /* to make it look like a "normal" Unix priority/nice value */
561 priority = task_prio(task);
562 nice = task_nice(task);
563
Michael Weiß3ae700e2020-10-27 21:42:57 +0100564 /* apply timens offset for boottime and convert nsec -> ticks */
565 start_time =
566 nsec_to_clock_t(timens_add_boottime_ns(task->start_boottime));
Linus Torvalds1da177e2005-04-16 15:20:36 -0700567
Andrei Vagind0f02232018-04-10 16:31:26 -0700568 seq_put_decimal_ull(m, "", pid_nr_ns(pid, ns));
569 seq_puts(m, " (");
Tejun Heo88b72b32018-05-18 08:47:13 -0700570 proc_task_name(m, task, false);
Andrei Vagind0f02232018-04-10 16:31:26 -0700571 seq_puts(m, ") ");
572 seq_putc(m, state);
Joe Perches75ba1d02016-10-07 17:02:20 -0700573 seq_put_decimal_ll(m, " ", ppid);
574 seq_put_decimal_ll(m, " ", pgid);
575 seq_put_decimal_ll(m, " ", sid);
576 seq_put_decimal_ll(m, " ", tty_nr);
577 seq_put_decimal_ll(m, " ", tty_pgrp);
578 seq_put_decimal_ull(m, " ", task->flags);
579 seq_put_decimal_ull(m, " ", min_flt);
580 seq_put_decimal_ull(m, " ", cmin_flt);
581 seq_put_decimal_ull(m, " ", maj_flt);
582 seq_put_decimal_ull(m, " ", cmaj_flt);
Frederic Weisbecker5613fda2017-01-31 04:09:23 +0100583 seq_put_decimal_ull(m, " ", nsec_to_clock_t(utime));
584 seq_put_decimal_ull(m, " ", nsec_to_clock_t(stime));
585 seq_put_decimal_ll(m, " ", nsec_to_clock_t(cutime));
586 seq_put_decimal_ll(m, " ", nsec_to_clock_t(cstime));
Joe Perches75ba1d02016-10-07 17:02:20 -0700587 seq_put_decimal_ll(m, " ", priority);
588 seq_put_decimal_ll(m, " ", nice);
589 seq_put_decimal_ll(m, " ", num_threads);
590 seq_put_decimal_ull(m, " ", 0);
591 seq_put_decimal_ull(m, " ", start_time);
592 seq_put_decimal_ull(m, " ", vsize);
593 seq_put_decimal_ull(m, " ", mm ? get_mm_rss(mm) : 0);
594 seq_put_decimal_ull(m, " ", rsslim);
595 seq_put_decimal_ull(m, " ", mm ? (permitted ? mm->start_code : 1) : 0);
596 seq_put_decimal_ull(m, " ", mm ? (permitted ? mm->end_code : 1) : 0);
597 seq_put_decimal_ull(m, " ", (permitted && mm) ? mm->start_stack : 0);
598 seq_put_decimal_ull(m, " ", esp);
599 seq_put_decimal_ull(m, " ", eip);
KAMEZAWA Hiroyukibda7bad2012-03-23 15:02:54 -0700600 /* The signal information here is obsolete.
601 * It must be decimal for Linux 2.0 compatibility.
602 * Use /proc/#/status for real-time signals.
603 */
Joe Perches75ba1d02016-10-07 17:02:20 -0700604 seq_put_decimal_ull(m, " ", task->pending.signal.sig[0] & 0x7fffffffUL);
605 seq_put_decimal_ull(m, " ", task->blocked.sig[0] & 0x7fffffffUL);
606 seq_put_decimal_ull(m, " ", sigign.sig[0] & 0x7fffffffUL);
607 seq_put_decimal_ull(m, " ", sigcatch.sig[0] & 0x7fffffffUL);
Ingo Molnarb2f73922015-09-30 15:59:17 +0200608
609 /*
610 * We used to output the absolute kernel address, but that's an
611 * information leak - so instead we show a 0/1 flag here, to signal
612 * to user-space whether there's a wchan field in /proc/PID/wchan.
613 *
614 * This works with older implementations of procps as well.
615 */
Kees Cook4e046152021-09-29 15:02:15 -0700616 seq_put_decimal_ull(m, " ", wchan);
Ingo Molnarb2f73922015-09-30 15:59:17 +0200617
Joe Perches75ba1d02016-10-07 17:02:20 -0700618 seq_put_decimal_ull(m, " ", 0);
619 seq_put_decimal_ull(m, " ", 0);
620 seq_put_decimal_ll(m, " ", task->exit_signal);
621 seq_put_decimal_ll(m, " ", task_cpu(task));
622 seq_put_decimal_ull(m, " ", task->rt_priority);
623 seq_put_decimal_ull(m, " ", task->policy);
624 seq_put_decimal_ull(m, " ", delayacct_blkio_ticks(task));
Frederic Weisbecker16a6d9b2017-01-31 04:09:21 +0100625 seq_put_decimal_ull(m, " ", nsec_to_clock_t(gtime));
626 seq_put_decimal_ll(m, " ", nsec_to_clock_t(cgtime));
Cyrill Gorcunov5b172082012-05-31 16:26:44 -0700627
628 if (mm && permitted) {
Joe Perches75ba1d02016-10-07 17:02:20 -0700629 seq_put_decimal_ull(m, " ", mm->start_data);
630 seq_put_decimal_ull(m, " ", mm->end_data);
631 seq_put_decimal_ull(m, " ", mm->start_brk);
632 seq_put_decimal_ull(m, " ", mm->arg_start);
633 seq_put_decimal_ull(m, " ", mm->arg_end);
634 seq_put_decimal_ull(m, " ", mm->env_start);
635 seq_put_decimal_ull(m, " ", mm->env_end);
Cyrill Gorcunov5b172082012-05-31 16:26:44 -0700636 } else
Joe Perches75ba1d02016-10-07 17:02:20 -0700637 seq_puts(m, " 0 0 0 0 0 0 0");
Cyrill Gorcunov5b172082012-05-31 16:26:44 -0700638
639 if (permitted)
Eric W. Biederman2d18f7f2021-12-20 19:16:34 -0600640 seq_put_decimal_ll(m, " ", exit_code);
Cyrill Gorcunov5b172082012-05-31 16:26:44 -0700641 else
Joe Perches75ba1d02016-10-07 17:02:20 -0700642 seq_puts(m, " 0");
Cyrill Gorcunov5b172082012-05-31 16:26:44 -0700643
KAMEZAWA Hiroyukibda7bad2012-03-23 15:02:54 -0700644 seq_putc(m, '\n');
Ingo Molnar8ea02602007-07-16 09:46:31 +0200645 if (mm)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700646 mmput(mm);
Eric W. Biedermanee992742008-02-08 04:18:31 -0800647 return 0;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700648}
649
Eric W. Biedermanee992742008-02-08 04:18:31 -0800650int proc_tid_stat(struct seq_file *m, struct pid_namespace *ns,
651 struct pid *pid, struct task_struct *task)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700652{
Eric W. Biedermanee992742008-02-08 04:18:31 -0800653 return do_task_stat(m, ns, pid, task, 0);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700654}
655
Eric W. Biedermanee992742008-02-08 04:18:31 -0800656int proc_tgid_stat(struct seq_file *m, struct pid_namespace *ns,
657 struct pid *pid, struct task_struct *task)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700658{
Eric W. Biedermanee992742008-02-08 04:18:31 -0800659 return do_task_stat(m, ns, pid, task, 1);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700660}
661
Eric W. Biedermana56d3fc2008-02-08 04:18:32 -0800662int proc_pid_statm(struct seq_file *m, struct pid_namespace *ns,
663 struct pid *pid, struct task_struct *task)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700664{
Linus Torvalds1da177e2005-04-16 15:20:36 -0700665 struct mm_struct *mm = get_task_mm(task);
Ingo Molnar8ea02602007-07-16 09:46:31 +0200666
Linus Torvalds1da177e2005-04-16 15:20:36 -0700667 if (mm) {
Alexey Dobriyan5c5ab972020-04-06 20:09:05 -0700668 unsigned long size;
669 unsigned long resident = 0;
670 unsigned long shared = 0;
671 unsigned long text = 0;
672 unsigned long data = 0;
673
Linus Torvalds1da177e2005-04-16 15:20:36 -0700674 size = task_statm(mm, &shared, &text, &data, &resident);
675 mmput(mm);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700676
Alexey Dobriyan5c5ab972020-04-06 20:09:05 -0700677 /*
678 * For quick read, open code by putting numbers directly
679 * expected format is
680 * seq_printf(m, "%lu %lu %lu %lu 0 %lu 0\n",
681 * size, resident, shared, text, data);
682 */
683 seq_put_decimal_ull(m, "", size);
684 seq_put_decimal_ull(m, " ", resident);
685 seq_put_decimal_ull(m, " ", shared);
686 seq_put_decimal_ull(m, " ", text);
687 seq_put_decimal_ull(m, " ", 0);
688 seq_put_decimal_ull(m, " ", data);
689 seq_put_decimal_ull(m, " ", 0);
690 seq_putc(m, '\n');
691 } else {
692 seq_write(m, "0 0 0 0 0 0 0\n", 14);
693 }
Eric W. Biedermana56d3fc2008-02-08 04:18:32 -0800694 return 0;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700695}
Cyrill Gorcunov818411612012-05-31 16:26:43 -0700696
Iago López Galeiras2e13ba52015-06-25 15:00:57 -0700697#ifdef CONFIG_PROC_CHILDREN
Cyrill Gorcunov818411612012-05-31 16:26:43 -0700698static struct pid *
699get_children_pid(struct inode *inode, struct pid *pid_prev, loff_t pos)
700{
701 struct task_struct *start, *task;
702 struct pid *pid = NULL;
703
704 read_lock(&tasklist_lock);
705
706 start = pid_task(proc_pid(inode), PIDTYPE_PID);
707 if (!start)
708 goto out;
709
710 /*
711 * Lets try to continue searching first, this gives
712 * us significant speedup on children-rich processes.
713 */
714 if (pid_prev) {
715 task = pid_task(pid_prev, PIDTYPE_PID);
716 if (task && task->real_parent == start &&
717 !(list_empty(&task->sibling))) {
718 if (list_is_last(&task->sibling, &start->children))
719 goto out;
720 task = list_first_entry(&task->sibling,
721 struct task_struct, sibling);
722 pid = get_pid(task_pid(task));
723 goto out;
724 }
725 }
726
727 /*
728 * Slow search case.
729 *
730 * We might miss some children here if children
731 * are exited while we were not holding the lock,
732 * but it was never promised to be accurate that
733 * much.
734 *
735 * "Just suppose that the parent sleeps, but N children
736 * exit after we printed their tids. Now the slow paths
737 * skips N extra children, we miss N tasks." (c)
738 *
739 * So one need to stop or freeze the leader and all
740 * its children to get a precise result.
741 */
742 list_for_each_entry(task, &start->children, sibling) {
743 if (pos-- == 0) {
744 pid = get_pid(task_pid(task));
745 break;
746 }
747 }
748
749out:
750 read_unlock(&tasklist_lock);
751 return pid;
752}
753
754static int children_seq_show(struct seq_file *seq, void *v)
755{
Christoph Hellwig04015e32018-05-16 07:21:53 +0200756 struct inode *inode = file_inode(seq->file);
Cyrill Gorcunov818411612012-05-31 16:26:43 -0700757
Alexey Gladkov9d78ede2020-05-18 20:07:38 +0200758 seq_printf(seq, "%d ", pid_nr_ns(v, proc_pid_ns(inode->i_sb)));
Joe Perches25ce3192015-04-15 16:18:17 -0700759 return 0;
Cyrill Gorcunov818411612012-05-31 16:26:43 -0700760}
761
762static void *children_seq_start(struct seq_file *seq, loff_t *pos)
763{
Christoph Hellwig04015e32018-05-16 07:21:53 +0200764 return get_children_pid(file_inode(seq->file), NULL, *pos);
Cyrill Gorcunov818411612012-05-31 16:26:43 -0700765}
766
767static void *children_seq_next(struct seq_file *seq, void *v, loff_t *pos)
768{
769 struct pid *pid;
770
Christoph Hellwig04015e32018-05-16 07:21:53 +0200771 pid = get_children_pid(file_inode(seq->file), v, *pos + 1);
Cyrill Gorcunov818411612012-05-31 16:26:43 -0700772 put_pid(v);
773
774 ++*pos;
775 return pid;
776}
777
778static void children_seq_stop(struct seq_file *seq, void *v)
779{
780 put_pid(v);
781}
782
783static const struct seq_operations children_seq_ops = {
784 .start = children_seq_start,
785 .next = children_seq_next,
786 .stop = children_seq_stop,
787 .show = children_seq_show,
788};
789
790static int children_seq_open(struct inode *inode, struct file *file)
791{
Christoph Hellwig04015e32018-05-16 07:21:53 +0200792 return seq_open(file, &children_seq_ops);
Cyrill Gorcunov818411612012-05-31 16:26:43 -0700793}
794
Cyrill Gorcunov818411612012-05-31 16:26:43 -0700795const struct file_operations proc_tid_children_operations = {
796 .open = children_seq_open,
797 .read = seq_read,
798 .llseek = seq_lseek,
Alexey Dobriyan171ef912018-02-06 15:37:10 -0800799 .release = seq_release,
Cyrill Gorcunov818411612012-05-31 16:26:43 -0700800};
Iago López Galeiras2e13ba52015-06-25 15:00:57 -0700801#endif /* CONFIG_PROC_CHILDREN */