Received: by 2002:a05:6a10:16a7:0:0:0:0 with SMTP id gp39csp859686pxb; Thu, 5 Nov 2020 15:14:22 -0800 (PST) X-Google-Smtp-Source: ABdhPJw5P6GTKenbH+xHNn8kvXq5F533n9bassV4cHHCK2iYDo8QO0K1HDNIkUPJqXD6a+o2dXdw X-Received: by 2002:a17:906:5f89:: with SMTP id a9mr4666406eju.262.1604618062410; Thu, 05 Nov 2020 15:14:22 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1604618062; cv=none; d=google.com; s=arc-20160816; b=PBLk78UPHe6jXiFXWYi8clbt2lu9SLjXCEPaQcl5CUf4p4q04N5TJcm0Ams6jlebmX jehqttJYwm4JQOwpEIxz+KYVzOCmz/0T7MLc2NEtJirh5LHhTmFzonP94c4zqdPy968y y5yGAlwkRTRoV00SE8kGD15HdOviIfVwcKqM7Edg0xek7r/svMRAHb785Z5ILdvTVX8k j8fPTzMKHGWY9bGyjEG38yrF5geOoimNHsmWf9cWnYXiK0mPgfngLbJq5Tt8Ge7iY8gK GIuoZfUdaITd6g4/q47awWHMLTutRaw7yQy4L5TwIiwQHdHnC7zQb0gKH1RAku16qn7R I9rw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=Y57F+Jsnu2csoq/L1bhO7x7bXp37gcpbO3DWHrQ2U/I=; b=W6A9duECKsr5rpTsbMBj4UDbKe2Fv1JgVoBf0oXsgQX2HgMjC/V4RgT/RoP+aXlVMI bGSke+bVCogLD7SSLlzsHmiScpEQA96wrLzMmX9p6nAe5Cia3SWNlyCchdhUliURsJjG j0ksNmqlSzIQ2g5rrgW+SItchN7xRFFkyowGBMDd3VcsleYTC/P/W2dbNRlssIcjGM7f 0aPMlO/1nDmgz2ZOKBH46hQlt3P6pLe4Eax5CojBRSgwSipb1G5dI46MQxDxU7G/zdR1 /nHDZRtoUO/B2AEkmal7r6P9CUmClPDGhV547q7WYqzMTyBkLCdYX1SHLKIz+n3vv3RT lKSg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@synopsys.com header.s=mail header.b=V4cEfPHH; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=synopsys.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id v3si2259877ejq.157.2020.11.05.15.14.00; Thu, 05 Nov 2020 15:14:22 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@synopsys.com header.s=mail header.b=V4cEfPHH; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=synopsys.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1732386AbgKEXLn (ORCPT + 99 others); Thu, 5 Nov 2020 18:11:43 -0500 Received: from smtprelay-out1.synopsys.com ([149.117.73.133]:37880 "EHLO smtprelay-out1.synopsys.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1732046AbgKEXLm (ORCPT ); Thu, 5 Nov 2020 18:11:42 -0500 Received: from mailhost.synopsys.com (sv1-mailhost1.synopsys.com [10.205.2.131]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)) (No client certificate requested) by smtprelay-out1.synopsys.com (Postfix) with ESMTPS id CA14A402A1; Thu, 5 Nov 2020 23:11:40 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=synopsys.com; s=mail; t=1604617902; bh=mjfzQlgSUryYIi0w+/VNAw26FTSsKPnANnJpopYIHFM=; h=From:To:Cc:Subject:Date:From; b=V4cEfPHHohGc3T4AMKXaIT6sexWMwj4S7OJVxAZGNDJeisko3y+HcN6VFfXB3zLaz h8F10SDqv6iS4g57H5Ijq4iMEGKFSpC0dbghVQnAgpegJHBN4IEZcJ2QQnsIYXTVqc RyPLsSOJxcQ143ISet8YgbdZWDE4pIMTBOau4Emq6+y4kdxQe82JA/cuh1ehI7LKdD fUMVTF1Vkwekq+Y/9Z5rL/0KR0iLwHH94Eh6HEHYDjZABpVfArk8tU7CtrTU5ormsn qsPdFMgky+RWC7V6yMsk77UNQCTDd3M3LZzwiNnq3WoxslhfLAHJ4ttWaYwDowNpDc Flyx0BinY3NmQ== Received: from vineetg-Latitude-7400.internal.synopsys.com (unknown [10.13.183.89]) by mailhost.synopsys.com (Postfix) with ESMTP id 5DD60A005E; Thu, 5 Nov 2020 23:11:36 +0000 (UTC) X-SNPS-Relay: synopsys.com From: Vineet Gupta To: Alexey Dobriyan , Andrew Morton , Ingo Molnar , Alexey Gladkov , Peter Zijlstra , Kees Cook , "Eric W . Biederman" , Vlastimil Babka , Michel Lespinasse , Andrei Vagin , Bernd Edlinger , John Johansen , Oleg Nesterov Cc: linux-kernel@vger.kernel.org, linux-fsdevel@vger.kernel.org, linux-arch@vger.kernel.org, linux-snps-arc@lists.infradead.org, Vineet Gupta Subject: [RFC] proc: get_wchan() stack unwind only makes sense for sleeping/non-self tasks Date: Thu, 5 Nov 2020 15:11:32 -0800 Message-Id: <20201105231132.2130132-1-vgupta@synopsys.com> X-Mailer: git-send-email 2.25.1 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Most architectures currently check this in their get_wchan() implementation (ARC doesn't hence this patch). However doing this in core code shows the semantics better so move the check one level up (eventually remove the boiler-plate code from arches) Signed-off-by: Vineet Gupta # tools/perf/arch/arc/util/ --- fs/proc/array.c | 4 +++- fs/proc/base.c | 6 ++++-- 2 files changed, 7 insertions(+), 3 deletions(-) diff --git a/fs/proc/array.c b/fs/proc/array.c index 65ec2029fa80..081fade5a361 100644 --- a/fs/proc/array.c +++ b/fs/proc/array.c @@ -519,8 +519,10 @@ static int do_task_stat(struct seq_file *m, struct pid_namespace *ns, unlock_task_sighand(task, &flags); } - if (permitted && (!whole || num_threads < 2)) + if (task != current && task->state != TASK_RUNNING && + permitted && (!whole || num_threads < 2)) wchan = get_wchan(task); + if (!whole) { min_flt = task->min_flt; maj_flt = task->maj_flt; diff --git a/fs/proc/base.c b/fs/proc/base.c index 0f707003dda5..abd7ec6324c5 100644 --- a/fs/proc/base.c +++ b/fs/proc/base.c @@ -385,13 +385,15 @@ static const struct file_operations proc_pid_cmdline_ops = { static int proc_pid_wchan(struct seq_file *m, struct pid_namespace *ns, struct pid *pid, struct task_struct *task) { - unsigned long wchan; + unsigned long wchan = 0; char symname[KSYM_NAME_LEN]; if (!ptrace_may_access(task, PTRACE_MODE_READ_FSCREDS)) goto print0; - wchan = get_wchan(task); + if (task != current && task->state != TASK_RUNNING) + wchan = get_wchan(task); + if (wchan && !lookup_symbol_name(wchan, symname)) { seq_puts(m, symname); return 0; -- 2.25.1