Blame view
kernel/exit.c
42.6 KB
1da177e4c Linux-2.6.12-rc2 |
1 2 3 4 5 |
/* * linux/kernel/exit.c * * Copyright (C) 1991, 1992 Linus Torvalds */ |
1da177e4c Linux-2.6.12-rc2 |
6 7 8 |
#include <linux/mm.h> #include <linux/slab.h> #include <linux/interrupt.h> |
1da177e4c Linux-2.6.12-rc2 |
9 |
#include <linux/module.h> |
c59ede7b7 [PATCH] move capa... |
10 |
#include <linux/capability.h> |
1da177e4c Linux-2.6.12-rc2 |
11 12 13 |
#include <linux/completion.h> #include <linux/personality.h> #include <linux/tty.h> |
da9cbc873 block: blkdev.h c... |
14 |
#include <linux/iocontext.h> |
1da177e4c Linux-2.6.12-rc2 |
15 16 17 18 |
#include <linux/key.h> #include <linux/security.h> #include <linux/cpu.h> #include <linux/acct.h> |
8f0ab5147 [PATCH] csa: conv... |
19 |
#include <linux/tsacct_kern.h> |
1da177e4c Linux-2.6.12-rc2 |
20 |
#include <linux/file.h> |
9f3acc314 [PATCH] split lin... |
21 |
#include <linux/fdtable.h> |
80d26af89 coredump: use a f... |
22 |
#include <linux/freezer.h> |
1da177e4c Linux-2.6.12-rc2 |
23 |
#include <linux/binfmts.h> |
ab516013a [PATCH] namespace... |
24 |
#include <linux/nsproxy.h> |
84d737866 [PATCH] add child... |
25 |
#include <linux/pid_namespace.h> |
1da177e4c Linux-2.6.12-rc2 |
26 27 28 29 |
#include <linux/ptrace.h> #include <linux/profile.h> #include <linux/mount.h> #include <linux/proc_fs.h> |
49d769d52 Change reparent_t... |
30 |
#include <linux/kthread.h> |
1da177e4c Linux-2.6.12-rc2 |
31 |
#include <linux/mempolicy.h> |
c757249af [PATCH] per-task-... |
32 |
#include <linux/taskstats_kern.h> |
ca74e92b4 [PATCH] per-task-... |
33 |
#include <linux/delayacct.h> |
b4f48b636 Task Control Grou... |
34 |
#include <linux/cgroup.h> |
1da177e4c Linux-2.6.12-rc2 |
35 |
#include <linux/syscalls.h> |
7ed20e1ad [PATCH] convert t... |
36 |
#include <linux/signal.h> |
6a14c5c9d [PATCH] move __ex... |
37 |
#include <linux/posix-timers.h> |
9f46080c4 [PATCH] Process E... |
38 |
#include <linux/cn_proc.h> |
de5097c2e [PATCH] mutex sub... |
39 |
#include <linux/mutex.h> |
0771dfefc [PATCH] lightweig... |
40 |
#include <linux/futex.h> |
b92ce5589 [PATCH] splice: a... |
41 |
#include <linux/pipe_fs_i.h> |
fa84cb935 [PATCH] move call... |
42 |
#include <linux/audit.h> /* for audit_free() */ |
83cc5ed3c [PATCH] kernel/sy... |
43 |
#include <linux/resource.h> |
0d67a46df [PATCH] BLOCK: Re... |
44 |
#include <linux/blkdev.h> |
6eaeeaba3 getrusage(): fill... |
45 |
#include <linux/task_io_accounting_ops.h> |
30199f5a4 tracehook: exit |
46 |
#include <linux/tracehook.h> |
5ad4e53bd Get rid of indire... |
47 |
#include <linux/fs_struct.h> |
d84f4f992 CRED: Inaugurate ... |
48 |
#include <linux/init_task.h> |
cdd6c482c perf: Do the big ... |
49 |
#include <linux/perf_event.h> |
ad8d75fff tracing/events: m... |
50 |
#include <trace/events/sched.h> |
24f1e32c6 hw-breakpoints: R... |
51 |
#include <linux/hw_breakpoint.h> |
3d5992d2a oom: add per-mm o... |
52 |
#include <linux/oom.h> |
54848d73f writeback: charge... |
53 |
#include <linux/writeback.h> |
404015308 security: trim se... |
54 |
#include <linux/shm.h> |
1da177e4c Linux-2.6.12-rc2 |
55 56 57 58 59 |
#include <asm/uaccess.h> #include <asm/unistd.h> #include <asm/pgtable.h> #include <asm/mmu_context.h> |
408b664a7 [PATCH] make lots... |
60 |
static void exit_mm(struct task_struct * tsk); |
d40e48e02 exit: __exit_sign... |
61 |
static void __unhash_process(struct task_struct *p, bool group_dead) |
1da177e4c Linux-2.6.12-rc2 |
62 63 |
{ nr_threads--; |
50d75f8da pidns: find_new_r... |
64 |
detach_pid(p, PIDTYPE_PID); |
d40e48e02 exit: __exit_sign... |
65 |
if (group_dead) { |
1da177e4c Linux-2.6.12-rc2 |
66 67 |
detach_pid(p, PIDTYPE_PGID); detach_pid(p, PIDTYPE_SID); |
c97d98931 [PATCH] kill SET_... |
68 |
|
5e85d4abe [PATCH] task: Mak... |
69 |
list_del_rcu(&p->tasks); |
9cd80bbb0 do_wait() optimiz... |
70 |
list_del_init(&p->sibling); |
909ea9646 core: Replace __g... |
71 |
__this_cpu_dec(process_counts); |
1da177e4c Linux-2.6.12-rc2 |
72 |
} |
47e65328a [PATCH] pids: kil... |
73 |
list_del_rcu(&p->thread_group); |
1da177e4c Linux-2.6.12-rc2 |
74 |
} |
6a14c5c9d [PATCH] move __ex... |
75 76 77 78 79 80 |
/* * This function expects the tasklist_lock write-locked. */ static void __exit_signal(struct task_struct *tsk) { struct signal_struct *sig = tsk->signal; |
d40e48e02 exit: __exit_sign... |
81 |
bool group_dead = thread_group_leader(tsk); |
6a14c5c9d [PATCH] move __ex... |
82 |
struct sighand_struct *sighand; |
4ada856fb signals: clear si... |
83 |
struct tty_struct *uninitialized_var(tty); |
6fac4829c cputime: Use acce... |
84 |
cputime_t utime, stime; |
6a14c5c9d [PATCH] move __ex... |
85 |
|
d11c563dd sched: Use lockde... |
86 |
sighand = rcu_dereference_check(tsk->sighand, |
db1466b3e rcu: Use wrapper ... |
87 |
lockdep_tasklist_lock_is_held()); |
6a14c5c9d [PATCH] move __ex... |
88 89 90 |
spin_lock(&sighand->siglock); posix_cpu_timers_exit(tsk); |
d40e48e02 exit: __exit_sign... |
91 |
if (group_dead) { |
6a14c5c9d [PATCH] move __ex... |
92 |
posix_cpu_timers_exit_group(tsk); |
4ada856fb signals: clear si... |
93 94 |
tty = sig->tty; sig->tty = NULL; |
4a5999429 exit: avoid sig->... |
95 |
} else { |
6a14c5c9d [PATCH] move __ex... |
96 |
/* |
e0a702171 posix-cpu-timers:... |
97 98 99 100 101 102 103 104 |
* This can only happen if the caller is de_thread(). * FIXME: this is the temporary hack, we should teach * posix-cpu-timers to handle this case correctly. */ if (unlikely(has_group_leader_pid(tsk))) posix_cpu_timers_exit_group(tsk); /* |
6a14c5c9d [PATCH] move __ex... |
105 106 107 |
* If there is any task waiting for the group exit * then notify it: */ |
d344193a0 exit: avoid sig->... |
108 |
if (sig->notify_count > 0 && !--sig->notify_count) |
6a14c5c9d [PATCH] move __ex... |
109 |
wake_up_process(sig->group_exit_task); |
6db840fa7 exec: RT sub-thre... |
110 |
|
6a14c5c9d [PATCH] move __ex... |
111 112 113 114 115 116 117 118 119 120 121 122 |
if (tsk == sig->curr_target) sig->curr_target = next_thread(tsk); /* * Accumulate here the counters for all threads but the * group leader as they die, so they can be added into * the process-wide totals when those are taken. * The group leader stays around as a zombie as long * as there are other threads. When it gets reaped, * the exit.c code will add its counts into these totals. * We won't ever get here for the group leader, since it * will have been the last reference on the signal_struct. */ |
6fac4829c cputime: Use acce... |
123 124 125 126 |
task_cputime(tsk, &utime, &stime); sig->utime += utime; sig->stime += stime; sig->gtime += task_gtime(tsk); |
6a14c5c9d [PATCH] move __ex... |
127 128 129 130 |
sig->min_flt += tsk->min_flt; sig->maj_flt += tsk->maj_flt; sig->nvcsw += tsk->nvcsw; sig->nivcsw += tsk->nivcsw; |
6eaeeaba3 getrusage(): fill... |
131 132 |
sig->inblock += task_io_get_inblock(tsk); sig->oublock += task_io_get_oublock(tsk); |
5995477ab task IO accountin... |
133 |
task_io_accounting_add(&sig->ioac, &tsk->ioac); |
32bd671d6 signal: re-add de... |
134 |
sig->sum_sched_runtime += tsk->se.sum_exec_runtime; |
6a14c5c9d [PATCH] move __ex... |
135 |
} |
b3ac022cb proc: turn signal... |
136 |
sig->nr_threads--; |
d40e48e02 exit: __exit_sign... |
137 |
__unhash_process(tsk, group_dead); |
5876700cd [PATCH] do __unha... |
138 |
|
da7978b03 signals: fix sigq... |
139 140 141 142 143 |
/* * Do this under ->siglock, we can race with another thread * doing sigqueue_free() if we have SIGQUEUE_PREALLOC signals. */ flush_sigqueue(&tsk->pending); |
a7e5328a0 [PATCH] cleanup _... |
144 |
tsk->sighand = NULL; |
6a14c5c9d [PATCH] move __ex... |
145 |
spin_unlock(&sighand->siglock); |
6a14c5c9d [PATCH] move __ex... |
146 |
|
a7e5328a0 [PATCH] cleanup _... |
147 |
__cleanup_sighand(sighand); |
6a14c5c9d [PATCH] move __ex... |
148 |
clear_tsk_thread_flag(tsk,TIF_SIGPENDING); |
d40e48e02 exit: __exit_sign... |
149 |
if (group_dead) { |
6a14c5c9d [PATCH] move __ex... |
150 |
flush_sigqueue(&sig->shared_pending); |
4ada856fb signals: clear si... |
151 |
tty_kref_put(tty); |
6a14c5c9d [PATCH] move __ex... |
152 153 |
} } |
8c7904a00 [PATCH] task: RCU... |
154 155 |
static void delayed_put_task_struct(struct rcu_head *rhp) { |
0a16b6075 tracing, sched: L... |
156 |
struct task_struct *tsk = container_of(rhp, struct task_struct, rcu); |
4e231c796 perf: Fix up dela... |
157 |
perf_event_delayed_put(tsk); |
0a16b6075 tracing, sched: L... |
158 159 |
trace_sched_process_free(tsk); put_task_struct(tsk); |
8c7904a00 [PATCH] task: RCU... |
160 |
} |
f470021ad ptrace children r... |
161 |
|
1da177e4c Linux-2.6.12-rc2 |
162 163 |
void release_task(struct task_struct * p) { |
36c8b5868 [PATCH] sched: cl... |
164 |
struct task_struct *leader; |
1da177e4c Linux-2.6.12-rc2 |
165 |
int zap_leader; |
1f09f9749 [PATCH] release_t... |
166 |
repeat: |
c69e8d9c0 CRED: Use RCU to ... |
167 |
/* don't need to get the RCU readlock here - the process is dead and |
d11c563dd sched: Use lockde... |
168 169 |
* can't be modifying its own credentials. But shut RCU-lockdep up */ rcu_read_lock(); |
c69e8d9c0 CRED: Use RCU to ... |
170 |
atomic_dec(&__task_cred(p)->user->processes); |
d11c563dd sched: Use lockde... |
171 |
rcu_read_unlock(); |
c69e8d9c0 CRED: Use RCU to ... |
172 |
|
60347f671 pid namespaces: p... |
173 |
proc_flush_task(p); |
0203026b5 perf_counter: fix... |
174 |
|
1da177e4c Linux-2.6.12-rc2 |
175 |
write_lock_irq(&tasklist_lock); |
a288eecce ptrace: kill triv... |
176 |
ptrace_release_task(p); |
1da177e4c Linux-2.6.12-rc2 |
177 |
__exit_signal(p); |
35f5cad8c [PATCH] revert "O... |
178 |
|
1da177e4c Linux-2.6.12-rc2 |
179 180 181 182 183 184 185 186 |
/* * If we are the last non-leader member of the thread * group, and the leader is zombie, then notify the * group leader's parent process. (if it wants notification.) */ zap_leader = 0; leader = p->group_leader; if (leader != p && thread_group_empty(leader) && leader->exit_state == EXIT_ZOMBIE) { |
1da177e4c Linux-2.6.12-rc2 |
187 188 189 190 |
/* * If we were the last child thread and the leader has * exited already, and the leader's parent ignores SIGCHLD, * then we are the one who should release the leader. |
dae33574d tracehook: releas... |
191 |
*/ |
867734737 make do_notify_pa... |
192 |
zap_leader = do_notify_parent(leader, leader->exit_signal); |
dae33574d tracehook: releas... |
193 194 |
if (zap_leader) leader->exit_state = EXIT_DEAD; |
1da177e4c Linux-2.6.12-rc2 |
195 |
} |
1da177e4c Linux-2.6.12-rc2 |
196 |
write_unlock_irq(&tasklist_lock); |
1da177e4c Linux-2.6.12-rc2 |
197 |
release_thread(p); |
8c7904a00 [PATCH] task: RCU... |
198 |
call_rcu(&p->rcu, delayed_put_task_struct); |
1da177e4c Linux-2.6.12-rc2 |
199 200 201 202 203 |
p = leader; if (unlikely(zap_leader)) goto repeat; } |
1da177e4c Linux-2.6.12-rc2 |
204 205 206 207 |
/* * This checks not only the pgrp, but falls back on the pid if no * satisfactory pgrp is found. I dunno - gdb doesn't work correctly * without this... |
04a2e6a5c [PATCH] pid: make... |
208 209 |
* * The caller must hold rcu lock or the tasklist lock. |
1da177e4c Linux-2.6.12-rc2 |
210 |
*/ |
04a2e6a5c [PATCH] pid: make... |
211 |
struct pid *session_of_pgrp(struct pid *pgrp) |
1da177e4c Linux-2.6.12-rc2 |
212 213 |
{ struct task_struct *p; |
04a2e6a5c [PATCH] pid: make... |
214 |
struct pid *sid = NULL; |
62dfb5541 [PATCH] session_o... |
215 |
|
04a2e6a5c [PATCH] pid: make... |
216 |
p = pid_task(pgrp, PIDTYPE_PGID); |
62dfb5541 [PATCH] session_o... |
217 |
if (p == NULL) |
04a2e6a5c [PATCH] pid: make... |
218 |
p = pid_task(pgrp, PIDTYPE_PID); |
62dfb5541 [PATCH] session_o... |
219 |
if (p != NULL) |
04a2e6a5c [PATCH] pid: make... |
220 |
sid = task_session(p); |
62dfb5541 [PATCH] session_o... |
221 |
|
1da177e4c Linux-2.6.12-rc2 |
222 223 224 225 226 227 228 229 230 231 232 |
return sid; } /* * Determine if a process group is "orphaned", according to the POSIX * definition in 2.2.2.52. Orphaned process groups are not to be affected * by terminal-generated stop signals. Newly orphaned process groups are * to receive a SIGHUP and a SIGCONT. * * "I ask you, have you ever known what it is to be an orphan?" */ |
0475ac084 [PATCH] pid: use ... |
233 |
static int will_become_orphaned_pgrp(struct pid *pgrp, struct task_struct *ignored_task) |
1da177e4c Linux-2.6.12-rc2 |
234 235 |
{ struct task_struct *p; |
1da177e4c Linux-2.6.12-rc2 |
236 |
|
0475ac084 [PATCH] pid: use ... |
237 |
do_each_pid_task(pgrp, PIDTYPE_PGID, p) { |
05e83df62 will_become_orpha... |
238 239 240 |
if ((p == ignored_task) || (p->exit_state && thread_group_empty(p)) || is_global_init(p->real_parent)) |
1da177e4c Linux-2.6.12-rc2 |
241 |
continue; |
05e83df62 will_become_orpha... |
242 |
|
0475ac084 [PATCH] pid: use ... |
243 |
if (task_pgrp(p->real_parent) != pgrp && |
05e83df62 will_become_orpha... |
244 245 |
task_session(p->real_parent) == task_session(p)) return 0; |
0475ac084 [PATCH] pid: use ... |
246 |
} while_each_pid_task(pgrp, PIDTYPE_PGID, p); |
05e83df62 will_become_orpha... |
247 248 |
return 1; |
1da177e4c Linux-2.6.12-rc2 |
249 |
} |
3e7cd6c41 [PATCH] pid: repl... |
250 |
int is_current_pgrp_orphaned(void) |
1da177e4c Linux-2.6.12-rc2 |
251 252 253 254 |
{ int retval; read_lock(&tasklist_lock); |
3e7cd6c41 [PATCH] pid: repl... |
255 |
retval = will_become_orphaned_pgrp(task_pgrp(current), NULL); |
1da177e4c Linux-2.6.12-rc2 |
256 257 258 259 |
read_unlock(&tasklist_lock); return retval; } |
961c4675c has_stopped_jobs:... |
260 |
static bool has_stopped_jobs(struct pid *pgrp) |
1da177e4c Linux-2.6.12-rc2 |
261 |
{ |
1da177e4c Linux-2.6.12-rc2 |
262 |
struct task_struct *p; |
0475ac084 [PATCH] pid: use ... |
263 |
do_each_pid_task(pgrp, PIDTYPE_PGID, p) { |
961c4675c has_stopped_jobs:... |
264 265 |
if (p->signal->flags & SIGNAL_STOP_STOPPED) return true; |
0475ac084 [PATCH] pid: use ... |
266 |
} while_each_pid_task(pgrp, PIDTYPE_PGID, p); |
961c4675c has_stopped_jobs:... |
267 268 |
return false; |
1da177e4c Linux-2.6.12-rc2 |
269 |
} |
f49ee505b introduce kill_or... |
270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 |
/* * Check to see if any process groups have become orphaned as * a result of our exiting, and if they have any stopped jobs, * send them a SIGHUP and then a SIGCONT. (POSIX 3.2.2.2) */ static void kill_orphaned_pgrp(struct task_struct *tsk, struct task_struct *parent) { struct pid *pgrp = task_pgrp(tsk); struct task_struct *ignored_task = tsk; if (!parent) /* exit: our father is in a different pgrp than * we are and we were the only connection outside. */ parent = tsk->real_parent; else /* reparent: our child is in a different pgrp than * we are, and it was the only connection outside. */ ignored_task = NULL; if (task_pgrp(parent) != pgrp && task_session(parent) == task_session(tsk) && will_become_orphaned_pgrp(pgrp, ignored_task) && has_stopped_jobs(pgrp)) { __kill_pgrp_info(SIGHUP, SEND_SIG_PRIV, pgrp); __kill_pgrp_info(SIGCONT, SEND_SIG_PRIV, pgrp); } } |
1da177e4c Linux-2.6.12-rc2 |
300 |
/* |
87245135d allow_signal: kil... |
301 302 |
* Let kernel threads use this to say that they allow a certain signal. * Must not be used if kthread was cloned with CLONE_SIGHAND. |
1da177e4c Linux-2.6.12-rc2 |
303 304 305 |
*/ int allow_signal(int sig) { |
7ed20e1ad [PATCH] convert t... |
306 |
if (!valid_signal(sig) || sig < 1) |
1da177e4c Linux-2.6.12-rc2 |
307 308 309 |
return -EINVAL; spin_lock_irq(¤t->sighand->siglock); |
87245135d allow_signal: kil... |
310 |
/* This is only needed for daemonize()'ed kthreads */ |
1da177e4c Linux-2.6.12-rc2 |
311 |
sigdelset(¤t->blocked, sig); |
87245135d allow_signal: kil... |
312 313 314 315 316 317 |
/* * Kernel threads handle their own signals. Let the signal code * know it'll be handled, so that they don't get converted to * SIGKILL or just silently dropped. */ current->sighand->action[(sig)-1].sa.sa_handler = (void __user *)2; |
1da177e4c Linux-2.6.12-rc2 |
318 319 320 321 322 323 324 325 326 |
recalc_sigpending(); spin_unlock_irq(¤t->sighand->siglock); return 0; } EXPORT_SYMBOL(allow_signal); int disallow_signal(int sig) { |
7ed20e1ad [PATCH] convert t... |
327 |
if (!valid_signal(sig) || sig < 1) |
1da177e4c Linux-2.6.12-rc2 |
328 329 330 |
return -EINVAL; spin_lock_irq(¤t->sighand->siglock); |
10ab825bd change kernel thr... |
331 |
current->sighand->action[(sig)-1].sa.sa_handler = SIG_IGN; |
1da177e4c Linux-2.6.12-rc2 |
332 333 334 335 336 337 |
recalc_sigpending(); spin_unlock_irq(¤t->sighand->siglock); return 0; } EXPORT_SYMBOL(disallow_signal); |
cf475ad28 cgroups: add an o... |
338 339 |
#ifdef CONFIG_MM_OWNER /* |
733eda7ac memcg: clear mm->... |
340 |
* A task is exiting. If it owned this mm, find a new owner for the mm. |
cf475ad28 cgroups: add an o... |
341 |
*/ |
cf475ad28 cgroups: add an o... |
342 343 344 345 346 |
void mm_update_next_owner(struct mm_struct *mm) { struct task_struct *c, *g, *p = current; retry: |
733eda7ac memcg: clear mm->... |
347 348 349 350 351 |
/* * If the exiting or execing task is not the owner, it's * someone else's problem. */ if (mm->owner != p) |
cf475ad28 cgroups: add an o... |
352 |
return; |
733eda7ac memcg: clear mm->... |
353 354 355 356 357 358 359 360 361 |
/* * The current owner is exiting/execing and there are no other * candidates. Do not leave the mm pointing to a possibly * freed task structure. */ if (atomic_read(&mm->mm_users) <= 1) { mm->owner = NULL; return; } |
cf475ad28 cgroups: add an o... |
362 363 364 365 366 367 368 369 370 371 372 373 374 |
read_lock(&tasklist_lock); /* * Search in the children */ list_for_each_entry(c, &p->children, sibling) { if (c->mm == mm) goto assign_new_owner; } /* * Search in the siblings */ |
dea33cfd9 ptrace: mm_need_n... |
375 |
list_for_each_entry(c, &p->real_parent->children, sibling) { |
cf475ad28 cgroups: add an o... |
376 377 378 379 380 381 382 383 384 385 386 387 388 389 |
if (c->mm == mm) goto assign_new_owner; } /* * Search through everything else. We should not get * here often */ do_each_thread(g, c) { if (c->mm == mm) goto assign_new_owner; } while_each_thread(g, c); read_unlock(&tasklist_lock); |
31a78f23b mm owner: fix rac... |
390 391 392 |
/* * We found no owner yet mm_users > 1: this implies that we are * most likely racing with swapoff (try_to_unuse()) or /proc or |
e5991371e mm: remove cgroup... |
393 |
* ptrace or page migration (get_task_mm()). Mark owner as NULL. |
31a78f23b mm owner: fix rac... |
394 |
*/ |
31a78f23b mm owner: fix rac... |
395 |
mm->owner = NULL; |
cf475ad28 cgroups: add an o... |
396 397 398 399 400 401 402 403 404 405 |
return; assign_new_owner: BUG_ON(c == p); get_task_struct(c); /* * The task_lock protects c->mm from changing. * We always want mm->owner->mm == mm */ task_lock(c); |
e5991371e mm: remove cgroup... |
406 407 408 409 410 |
/* * Delay read_unlock() till we have the task_lock() * to ensure that c does not slip away underneath us */ read_unlock(&tasklist_lock); |
cf475ad28 cgroups: add an o... |
411 412 413 414 415 |
if (c->mm != mm) { task_unlock(c); put_task_struct(c); goto retry; } |
cf475ad28 cgroups: add an o... |
416 417 418 419 420 |
mm->owner = c; task_unlock(c); put_task_struct(c); } #endif /* CONFIG_MM_OWNER */ |
1da177e4c Linux-2.6.12-rc2 |
421 422 423 424 |
/* * Turn us into a lazy TLB process if we * aren't already.. */ |
408b664a7 [PATCH] make lots... |
425 |
static void exit_mm(struct task_struct * tsk) |
1da177e4c Linux-2.6.12-rc2 |
426 427 |
{ struct mm_struct *mm = tsk->mm; |
b564daf80 coredump: constru... |
428 |
struct core_state *core_state; |
1da177e4c Linux-2.6.12-rc2 |
429 |
|
48d212a2e Revert "mm: corre... |
430 |
mm_release(tsk, mm); |
1da177e4c Linux-2.6.12-rc2 |
431 432 |
if (!mm) return; |
4fe7efdbd mm: correctly syn... |
433 |
sync_mm_rss(mm); |
1da177e4c Linux-2.6.12-rc2 |
434 435 |
/* * Serialize with any possible pending coredump. |
999d9fc16 coredump: move mm... |
436 |
* We must hold mmap_sem around checking core_state |
1da177e4c Linux-2.6.12-rc2 |
437 |
* and clearing tsk->mm. The core-inducing thread |
999d9fc16 coredump: move mm... |
438 |
* will increment ->nr_threads for each thread in the |
1da177e4c Linux-2.6.12-rc2 |
439 440 441 |
* group with ->mm != NULL. */ down_read(&mm->mmap_sem); |
b564daf80 coredump: constru... |
442 443 444 |
core_state = mm->core_state; if (core_state) { struct core_thread self; |
1da177e4c Linux-2.6.12-rc2 |
445 |
up_read(&mm->mmap_sem); |
1da177e4c Linux-2.6.12-rc2 |
446 |
|
b564daf80 coredump: constru... |
447 448 449 450 451 452 453 454 |
self.task = tsk; self.next = xchg(&core_state->dumper.next, &self); /* * Implies mb(), the result of xchg() must be visible * to core_state->dumper. */ if (atomic_dec_and_test(&core_state->nr_threads)) complete(&core_state->startup); |
1da177e4c Linux-2.6.12-rc2 |
455 |
|
a94e2d408 coredump: kill mm... |
456 457 458 459 |
for (;;) { set_task_state(tsk, TASK_UNINTERRUPTIBLE); if (!self.task) /* see coredump_finish() */ break; |
80d26af89 coredump: use a f... |
460 |
freezable_schedule(); |
a94e2d408 coredump: kill mm... |
461 462 |
} __set_task_state(tsk, TASK_RUNNING); |
1da177e4c Linux-2.6.12-rc2 |
463 464 465 |
down_read(&mm->mmap_sem); } atomic_inc(&mm->mm_count); |
125e18745 [PATCH] More BUG_... |
466 |
BUG_ON(mm != tsk->active_mm); |
1da177e4c Linux-2.6.12-rc2 |
467 468 469 470 471 472 |
/* more a memory barrier than a real lock */ task_lock(tsk); tsk->mm = NULL; up_read(&mm->mmap_sem); enter_lazy_tlb(mm, current); task_unlock(tsk); |
cf475ad28 cgroups: add an o... |
473 |
mm_update_next_owner(mm); |
1da177e4c Linux-2.6.12-rc2 |
474 475 |
mmput(mm); } |
1da177e4c Linux-2.6.12-rc2 |
476 |
/* |
ebec18a6d prctl: add PR_{SE... |
477 478 479 480 481 |
* When we die, we re-parent all our children, and try to: * 1. give them to another thread in our thread group, if such a member exists * 2. give it to the first ancestor process which prctl'd itself as a * child_subreaper for its children (like a service manager) * 3. give it to the init process (PID 1) in our pid namespace |
1da177e4c Linux-2.6.12-rc2 |
482 |
*/ |
950bbabb5 pid_ns: (BUG 1139... |
483 |
static struct task_struct *find_new_reaper(struct task_struct *father) |
d16e15f5b exit: add lock co... |
484 485 |
__releases(&tasklist_lock) __acquires(&tasklist_lock) |
1da177e4c Linux-2.6.12-rc2 |
486 |
{ |
950bbabb5 pid_ns: (BUG 1139... |
487 488 |
struct pid_namespace *pid_ns = task_active_pid_ns(father); struct task_struct *thread; |
1da177e4c Linux-2.6.12-rc2 |
489 |
|
950bbabb5 pid_ns: (BUG 1139... |
490 491 492 493 494 495 496 497 |
thread = father; while_each_thread(father, thread) { if (thread->flags & PF_EXITING) continue; if (unlikely(pid_ns->child_reaper == father)) pid_ns->child_reaper = thread; return thread; } |
1da177e4c Linux-2.6.12-rc2 |
498 |
|
950bbabb5 pid_ns: (BUG 1139... |
499 500 |
if (unlikely(pid_ns->child_reaper == father)) { write_unlock_irq(&tasklist_lock); |
397a21f24 kernel/exit.c: if... |
501 502 503 504 505 506 |
if (unlikely(pid_ns == &init_pid_ns)) { panic("Attempted to kill init! exitcode=0x%08x ", father->signal->group_exit_code ?: father->exit_code); } |
1da177e4c Linux-2.6.12-rc2 |
507 |
|
950bbabb5 pid_ns: (BUG 1139... |
508 509 |
zap_pid_ns_processes(pid_ns); write_lock_irq(&tasklist_lock); |
ebec18a6d prctl: add PR_{SE... |
510 511 512 513 514 515 516 517 518 519 520 521 522 523 524 525 526 527 528 529 530 531 532 |
} else if (father->signal->has_child_subreaper) { struct task_struct *reaper; /* * Find the first ancestor marked as child_subreaper. * Note that the code below checks same_thread_group(reaper, * pid_ns->child_reaper). This is what we need to DTRT in a * PID namespace. However we still need the check above, see * http://marc.info/?l=linux-kernel&m=131385460420380 */ for (reaper = father->real_parent; reaper != &init_task; reaper = reaper->real_parent) { if (same_thread_group(reaper, pid_ns->child_reaper)) break; if (!reaper->signal->is_child_subreaper) continue; thread = reaper; do { if (!(thread->flags & PF_EXITING)) return reaper; } while_each_thread(reaper, thread); } |
1da177e4c Linux-2.6.12-rc2 |
533 |
} |
762a24bee pid namespaces: r... |
534 |
|
950bbabb5 pid_ns: (BUG 1139... |
535 536 |
return pid_ns->child_reaper; } |
5dfc80be7 forget_original_p... |
537 538 539 |
/* * Any that need to be release_task'd are put on the @dead list. */ |
9cd80bbb0 do_wait() optimiz... |
540 |
static void reparent_leader(struct task_struct *father, struct task_struct *p, |
5dfc80be7 forget_original_p... |
541 542 |
struct list_head *dead) { |
5dfc80be7 forget_original_p... |
543 |
list_move_tail(&p->sibling, &p->real_parent->children); |
0976a03e5 reparent_leader: ... |
544 |
if (p->exit_state == EXIT_DEAD) |
5dfc80be7 forget_original_p... |
545 546 547 548 549 550 551 552 553 554 555 556 |
return; /* * If this is a threaded reparent there is no need to * notify anyone anything has happened. */ if (same_thread_group(p->real_parent, father)) return; /* We don't want people slaying init. */ p->exit_signal = SIGCHLD; /* If it has exited notify the new parent about this child's death. */ |
d21142ece ptrace: kill task... |
557 |
if (!p->ptrace && |
5dfc80be7 forget_original_p... |
558 |
p->exit_state == EXIT_ZOMBIE && thread_group_empty(p)) { |
867734737 make do_notify_pa... |
559 |
if (do_notify_parent(p, p->exit_signal)) { |
5dfc80be7 forget_original_p... |
560 561 562 563 564 565 566 |
p->exit_state = EXIT_DEAD; list_move_tail(&p->sibling, dead); } } kill_orphaned_pgrp(p, father); } |
762a24bee pid namespaces: r... |
567 |
static void forget_original_parent(struct task_struct *father) |
1da177e4c Linux-2.6.12-rc2 |
568 |
{ |
950bbabb5 pid_ns: (BUG 1139... |
569 |
struct task_struct *p, *n, *reaper; |
5dfc80be7 forget_original_p... |
570 |
LIST_HEAD(dead_children); |
762a24bee pid namespaces: r... |
571 572 |
write_lock_irq(&tasklist_lock); |
c7e49c148 ptrace: optimize ... |
573 574 575 576 577 |
/* * Note that exit_ptrace() and find_new_reaper() might * drop tasklist_lock and reacquire it. */ exit_ptrace(father); |
950bbabb5 pid_ns: (BUG 1139... |
578 |
reaper = find_new_reaper(father); |
f470021ad ptrace children r... |
579 |
|
03ff17979 kernel/exit.c: Us... |
580 |
list_for_each_entry_safe(p, n, &father->children, sibling) { |
9cd80bbb0 do_wait() optimiz... |
581 582 583 584 |
struct task_struct *t = p; do { t->real_parent = reaper; if (t->parent == father) { |
d21142ece ptrace: kill task... |
585 |
BUG_ON(t->ptrace); |
9cd80bbb0 do_wait() optimiz... |
586 587 588 589 590 591 592 |
t->parent = t->real_parent; } if (t->pdeath_signal) group_send_sig_info(t->pdeath_signal, SEND_SIG_NOINFO, t); } while_each_thread(p, t); reparent_leader(father, p, &dead_children); |
1da177e4c Linux-2.6.12-rc2 |
593 |
} |
762a24bee pid namespaces: r... |
594 |
write_unlock_irq(&tasklist_lock); |
5dfc80be7 forget_original_p... |
595 |
|
762a24bee pid namespaces: r... |
596 |
BUG_ON(!list_empty(&father->children)); |
762a24bee pid namespaces: r... |
597 |
|
5dfc80be7 forget_original_p... |
598 599 |
list_for_each_entry_safe(p, n, &dead_children, sibling) { list_del_init(&p->sibling); |
39c626ae4 forget_original_p... |
600 601 |
release_task(p); } |
1da177e4c Linux-2.6.12-rc2 |
602 603 604 605 606 607 |
} /* * Send signals to all our closest relatives so that they know * to properly mourn us.. */ |
821c7de71 exit_notify: fix ... |
608 |
static void exit_notify(struct task_struct *tsk, int group_dead) |
1da177e4c Linux-2.6.12-rc2 |
609 |
{ |
53c8f9f19 make do_notify_pa... |
610 |
bool autoreap; |
1da177e4c Linux-2.6.12-rc2 |
611 |
|
1da177e4c Linux-2.6.12-rc2 |
612 613 614 615 616 617 618 619 |
/* * This does two things: * * A. Make init inherit all the child processes * B. Check to see if any process groups have become orphaned * as a result of our exiting, and if they have any stopped * jobs, send them a SIGHUP and then a SIGCONT. (POSIX 3.2.2.2) */ |
762a24bee pid namespaces: r... |
620 |
forget_original_parent(tsk); |
1da177e4c Linux-2.6.12-rc2 |
621 |
|
762a24bee pid namespaces: r... |
622 |
write_lock_irq(&tasklist_lock); |
821c7de71 exit_notify: fix ... |
623 624 |
if (group_dead) kill_orphaned_pgrp(tsk->group_leader, NULL); |
1da177e4c Linux-2.6.12-rc2 |
625 |
|
45cdf5cc0 kill tracehook_no... |
626 627 628 629 630 631 632 633 634 635 636 637 |
if (unlikely(tsk->ptrace)) { int sig = thread_group_leader(tsk) && thread_group_empty(tsk) && !ptrace_reparented(tsk) ? tsk->exit_signal : SIGCHLD; autoreap = do_notify_parent(tsk, sig); } else if (thread_group_leader(tsk)) { autoreap = thread_group_empty(tsk) && do_notify_parent(tsk, tsk->exit_signal); } else { autoreap = true; } |
1da177e4c Linux-2.6.12-rc2 |
638 |
|
53c8f9f19 make do_notify_pa... |
639 |
tsk->exit_state = autoreap ? EXIT_DEAD : EXIT_ZOMBIE; |
1da177e4c Linux-2.6.12-rc2 |
640 |
|
9c3391684 exit: exit_notify... |
641 642 |
/* mt-exec, de_thread() is waiting for group leader */ if (unlikely(tsk->signal->notify_count < 0)) |
6db840fa7 exec: RT sub-thre... |
643 |
wake_up_process(tsk->signal->group_exit_task); |
1da177e4c Linux-2.6.12-rc2 |
644 |
write_unlock_irq(&tasklist_lock); |
1da177e4c Linux-2.6.12-rc2 |
645 |
/* If the process is dead, release it - nobody will wait for it */ |
53c8f9f19 make do_notify_pa... |
646 |
if (autoreap) |
1da177e4c Linux-2.6.12-rc2 |
647 |
release_task(tsk); |
1da177e4c Linux-2.6.12-rc2 |
648 |
} |
e18eecb8b Add generic exit-... |
649 650 651 652 653 |
#ifdef CONFIG_DEBUG_STACK_USAGE static void check_stack_usage(void) { static DEFINE_SPINLOCK(low_water_lock); static int lowest_to_date = THREAD_SIZE; |
e18eecb8b Add generic exit-... |
654 |
unsigned long free; |
7c9f8861e stackprotector: u... |
655 |
free = stack_not_used(current); |
e18eecb8b Add generic exit-... |
656 657 658 659 660 661 |
if (free >= lowest_to_date) return; spin_lock(&low_water_lock); if (free < lowest_to_date) { |
168eeccbc stack usage: add ... |
662 663 664 665 |
printk(KERN_WARNING "%s (%d) used greatest stack depth: " "%lu bytes left ", current->comm, task_pid_nr(current), free); |
e18eecb8b Add generic exit-... |
666 667 668 669 670 671 672 |
lowest_to_date = free; } spin_unlock(&low_water_lock); } #else static inline void check_stack_usage(void) {} #endif |
9402c95f3 treewide: remove ... |
673 |
void do_exit(long code) |
1da177e4c Linux-2.6.12-rc2 |
674 675 676 677 678 |
{ struct task_struct *tsk = current; int group_dead; profile_task_exit(tsk); |
73c101011 block: initial pa... |
679 |
WARN_ON(blk_needs_flush_plug(tsk)); |
22e2c507c [PATCH] Update cf... |
680 |
|
1da177e4c Linux-2.6.12-rc2 |
681 682 683 684 |
if (unlikely(in_interrupt())) panic("Aiee, killing interrupt handler!"); if (unlikely(!tsk->pid)) panic("Attempted to kill the idle task!"); |
1da177e4c Linux-2.6.12-rc2 |
685 |
|
33dd94ae1 do_exit(): make s... |
686 687 688 689 690 691 692 693 |
/* * If do_exit is called because this processes oopsed, it's possible * that get_fs() was left as KERNEL_DS, so reset it to USER_DS before * continuing. Amongst other possible reasons, this is to prevent * mm_release()->clear_child_tid() from writing to a user-controlled * kernel address. */ set_fs(USER_DS); |
a288eecce ptrace: kill triv... |
694 |
ptrace_event(PTRACE_EVENT_EXIT, code); |
1da177e4c Linux-2.6.12-rc2 |
695 |
|
e0e817392 CRED: Add some co... |
696 |
validate_creds_for_do_exit(tsk); |
df164db5f [PATCH] avoid res... |
697 698 699 700 701 702 703 704 |
/* * We're taking recursive faults here in do_exit. Safest is to just * leave this task alone and wait for reboot. */ if (unlikely(tsk->flags & PF_EXITING)) { printk(KERN_ALERT "Fixing recursive fault but reboot is needed! "); |
778e9a9c3 pi-futex: fix exi... |
705 706 707 708 709 710 711 712 713 714 |
/* * We can do this unlocked here. The futex code uses * this flag just to verify whether the pi state * cleanup has been done or not. In the worst case it * loops once more. We pretend that the cleanup was * done as there is no way to return. Either the * OWNER_DIED bit is set by now or we push the blocked * task into the wait for ever nirwana as well. */ tsk->flags |= PF_EXITPIDONE; |
df164db5f [PATCH] avoid res... |
715 716 717 |
set_current_state(TASK_UNINTERRUPTIBLE); schedule(); } |
d12619b5f fix group stop wi... |
718 |
exit_signals(tsk); /* sets PF_EXITING */ |
778e9a9c3 pi-futex: fix exi... |
719 720 |
/* * tsk->flags are checked in the futex code to protect against |
ed3e694d7 move exit_task_wo... |
721 |
* an exiting task cleaning up the robust pi futexes. |
778e9a9c3 pi-futex: fix exi... |
722 |
*/ |
d2ee7198c pi-futex: set PF_... |
723 |
smp_mb(); |
1d6154825 sched: Convert pi... |
724 |
raw_spin_unlock_wait(&tsk->pi_lock); |
1da177e4c Linux-2.6.12-rc2 |
725 |
|
1da177e4c Linux-2.6.12-rc2 |
726 727 728 |
if (unlikely(in_atomic())) printk(KERN_INFO "note: %s[%d] exited with preempt_count %d ", |
ba25f9dcc Use helpers to ob... |
729 |
current->comm, task_pid_nr(current), |
1da177e4c Linux-2.6.12-rc2 |
730 731 732 |
preempt_count()); acct_update_integrals(tsk); |
48d212a2e Revert "mm: corre... |
733 734 735 |
/* sync mm's RSS info before statistics gathering */ if (tsk->mm) sync_mm_rss(tsk->mm); |
1da177e4c Linux-2.6.12-rc2 |
736 |
group_dead = atomic_dec_and_test(&tsk->signal->live); |
c30689516 [PATCH] revert "t... |
737 |
if (group_dead) { |
778e9a9c3 pi-futex: fix exi... |
738 |
hrtimer_cancel(&tsk->signal->real_timer); |
25f407f0b [PATCH] Call exit... |
739 |
exit_itimers(tsk->signal); |
1f10206cf getrusage: fill r... |
740 741 |
if (tsk->mm) setmax_mm_hiwater_rss(&tsk->signal->maxrss, tsk->mm); |
c30689516 [PATCH] revert "t... |
742 |
} |
f6ec29a42 [PATCH] pacct: av... |
743 |
acct_collect(code, group_dead); |
522ed7767 Audit: add TTY in... |
744 745 |
if (group_dead) tty_audit_exit(); |
a4ff8dba7 audit: inline aud... |
746 |
audit_free(tsk); |
115085ea0 [PATCH] taskstats... |
747 |
|
48d212a2e Revert "mm: corre... |
748 |
tsk->exit_code = code; |
115085ea0 [PATCH] taskstats... |
749 |
taskstats_exit(tsk, group_dead); |
c757249af [PATCH] per-task-... |
750 |
|
1da177e4c Linux-2.6.12-rc2 |
751 |
exit_mm(tsk); |
0e4648141 [PATCH] pacct: ad... |
752 |
if (group_dead) |
f6ec29a42 [PATCH] pacct: av... |
753 |
acct_process(); |
0a16b6075 tracing, sched: L... |
754 |
trace_sched_process_exit(tsk); |
1da177e4c Linux-2.6.12-rc2 |
755 |
exit_sem(tsk); |
b34a6b1da ipc: introduce sh... |
756 |
exit_shm(tsk); |
1ec7f1ddb [PATCH] get rid o... |
757 758 |
exit_files(tsk); exit_fs(tsk); |
8aac62706 move exit_task_na... |
759 |
exit_task_namespaces(tsk); |
ed3e694d7 move exit_task_wo... |
760 |
exit_task_work(tsk); |
e18eecb8b Add generic exit-... |
761 |
check_stack_usage(); |
1da177e4c Linux-2.6.12-rc2 |
762 |
exit_thread(); |
0b3fcf178 perf_events: Move... |
763 764 765 766 767 768 769 770 |
/* * Flush inherited counters to the parent - before the parent * gets woken up by child-exit notifications. * * because of cgroup mode, must be called before cgroup_exit() */ perf_event_exit_task(tsk); |
b4f48b636 Task Control Grou... |
771 |
cgroup_exit(tsk, 1); |
1da177e4c Linux-2.6.12-rc2 |
772 |
|
5ec93d115 tty: Move the lea... |
773 |
if (group_dead) |
1da177e4c Linux-2.6.12-rc2 |
774 |
disassociate_ctty(1); |
a1261f546 [PATCH] m68k: int... |
775 |
module_put(task_thread_info(tsk)->exec_domain->module); |
1da177e4c Linux-2.6.12-rc2 |
776 |
|
9f46080c4 [PATCH] Process E... |
777 |
proc_exit_connector(tsk); |
33b2fb303 perf_counter: fix... |
778 779 |
/* |
24f1e32c6 hw-breakpoints: R... |
780 781 |
* FIXME: do that only when needed, using sched_exit tracepoint */ |
7c8df2863 ptrace: revert "P... |
782 |
flush_ptrace_hw_breakpoint(tsk); |
33b2fb303 perf_counter: fix... |
783 |
|
821c7de71 exit_notify: fix ... |
784 |
exit_notify(tsk, group_dead); |
1da177e4c Linux-2.6.12-rc2 |
785 |
#ifdef CONFIG_NUMA |
c0ff7453b cpuset,mm: fix no... |
786 |
task_lock(tsk); |
f0be3d32b mempolicy: rename... |
787 |
mpol_put(tsk->mempolicy); |
1da177e4c Linux-2.6.12-rc2 |
788 |
tsk->mempolicy = NULL; |
c0ff7453b cpuset,mm: fix no... |
789 |
task_unlock(tsk); |
1da177e4c Linux-2.6.12-rc2 |
790 |
#endif |
42b2dd0a0 Shrink task_struc... |
791 |
#ifdef CONFIG_FUTEX |
c87e2837b [PATCH] pi-futex:... |
792 793 |
if (unlikely(current->pi_state_cache)) kfree(current->pi_state_cache); |
42b2dd0a0 Shrink task_struc... |
794 |
#endif |
c87e2837b [PATCH] pi-futex:... |
795 |
/* |
9a11b49a8 [PATCH] lockdep: ... |
796 |
* Make sure we are holding no locks: |
de5097c2e [PATCH] mutex sub... |
797 |
*/ |
1b1d2fb44 lockdep: remove t... |
798 |
debug_check_no_locks_held(); |
778e9a9c3 pi-futex: fix exi... |
799 800 801 802 803 804 |
/* * We can do this unlocked here. The futex code uses this flag * just to verify whether the pi state cleanup has been done * or not. In the worst case it loops once more. */ tsk->flags |= PF_EXITPIDONE; |
1da177e4c Linux-2.6.12-rc2 |
805 |
|
afc847b7d [PATCH] don't do ... |
806 |
if (tsk->io_context) |
b69f22920 block: Fix io_con... |
807 |
exit_io_context(tsk); |
afc847b7d [PATCH] don't do ... |
808 |
|
b92ce5589 [PATCH] splice: a... |
809 |
if (tsk->splice_pipe) |
4b8a8f1e4 get rid of the la... |
810 |
free_pipe_info(tsk->splice_pipe); |
b92ce5589 [PATCH] splice: a... |
811 |
|
5640f7685 net: use a per ta... |
812 813 |
if (tsk->task_frag.page) put_page(tsk->task_frag.page); |
e0e817392 CRED: Add some co... |
814 |
validate_creds_for_do_exit(tsk); |
7407251a0 [PATCH] PF_DEAD c... |
815 |
preempt_disable(); |
54848d73f writeback: charge... |
816 817 |
if (tsk->nr_dirtied) __this_cpu_add(dirty_throttle_leaks, tsk->nr_dirtied); |
f41d911f8 rcu: Merge preemp... |
818 |
exit_rcu(); |
b5740f4b2 sched: Fix ancien... |
819 820 821 822 823 824 825 826 827 828 829 830 831 832 833 |
/* * The setting of TASK_RUNNING by try_to_wake_up() may be delayed * when the following two conditions become true. * - There is race condition of mmap_sem (It is acquired by * exit_mm()), and * - SMI occurs before setting TASK_RUNINNG. * (or hypervisor of virtual machine switches to other guest) * As a result, we may become TASK_RUNNING after becoming TASK_DEAD * * To avoid it, we have to wait for releasing tsk->pi_lock which * is held by try_to_wake_up() */ smp_mb(); raw_spin_unlock_wait(&tsk->pi_lock); |
55a101f8f [PATCH] kill PF_D... |
834 |
/* causes final put_task_struct in finish_task_switch(). */ |
c394cc9fb [PATCH] introduce... |
835 |
tsk->state = TASK_DEAD; |
a585042f7 freezer: remove r... |
836 |
tsk->flags |= PF_NOFREEZE; /* tell freezer to ignore us */ |
1da177e4c Linux-2.6.12-rc2 |
837 838 839 |
schedule(); BUG(); /* Avoid "noreturn function does return". */ |
54306cf04 [PATCH] exit: fix... |
840 841 |
for (;;) cpu_relax(); /* For when BUG is null */ |
1da177e4c Linux-2.6.12-rc2 |
842 |
} |
012914dad [patch] MCA recov... |
843 |
EXPORT_SYMBOL_GPL(do_exit); |
9402c95f3 treewide: remove ... |
844 |
void complete_and_exit(struct completion *comp, long code) |
1da177e4c Linux-2.6.12-rc2 |
845 846 847 |
{ if (comp) complete(comp); |
55a101f8f [PATCH] kill PF_D... |
848 |
|
1da177e4c Linux-2.6.12-rc2 |
849 850 851 852 |
do_exit(code); } EXPORT_SYMBOL(complete_and_exit); |
754fe8d29 [CVE-2009-0029] S... |
853 |
SYSCALL_DEFINE1(exit, int, error_code) |
1da177e4c Linux-2.6.12-rc2 |
854 855 856 |
{ do_exit((error_code&0xff)<<8); } |
1da177e4c Linux-2.6.12-rc2 |
857 858 859 860 |
/* * Take down every thread in the group. This is called by fatal signals * as well as by sys_exit_group (below). */ |
9402c95f3 treewide: remove ... |
861 |
void |
1da177e4c Linux-2.6.12-rc2 |
862 863 |
do_group_exit(int exit_code) { |
bfc4b0890 signals: do_group... |
864 |
struct signal_struct *sig = current->signal; |
1da177e4c Linux-2.6.12-rc2 |
865 |
BUG_ON(exit_code & 0x80); /* core dumps don't get here */ |
bfc4b0890 signals: do_group... |
866 867 |
if (signal_group_exit(sig)) exit_code = sig->group_exit_code; |
1da177e4c Linux-2.6.12-rc2 |
868 |
else if (!thread_group_empty(current)) { |
1da177e4c Linux-2.6.12-rc2 |
869 |
struct sighand_struct *const sighand = current->sighand; |
1da177e4c Linux-2.6.12-rc2 |
870 |
spin_lock_irq(&sighand->siglock); |
ed5d2cac1 exec: rework the ... |
871 |
if (signal_group_exit(sig)) |
1da177e4c Linux-2.6.12-rc2 |
872 873 874 |
/* Another thread got here before we took the lock. */ exit_code = sig->group_exit_code; else { |
1da177e4c Linux-2.6.12-rc2 |
875 |
sig->group_exit_code = exit_code; |
ed5d2cac1 exec: rework the ... |
876 |
sig->flags = SIGNAL_GROUP_EXIT; |
1da177e4c Linux-2.6.12-rc2 |
877 878 879 |
zap_other_threads(current); } spin_unlock_irq(&sighand->siglock); |
1da177e4c Linux-2.6.12-rc2 |
880 881 882 883 884 885 886 887 888 889 890 |
} do_exit(exit_code); /* NOTREACHED */ } /* * this kills every thread in the thread group. Note that any externally * wait4()-ing process will get the correct exit code - even if this * thread is not the thread group leader. */ |
754fe8d29 [CVE-2009-0029] S... |
891 |
SYSCALL_DEFINE1(exit_group, int, error_code) |
1da177e4c Linux-2.6.12-rc2 |
892 893 |
{ do_group_exit((error_code & 0xff) << 8); |
2ed7c03ec [CVE-2009-0029] C... |
894 895 |
/* NOTREACHED */ return 0; |
1da177e4c Linux-2.6.12-rc2 |
896 |
} |
9e8ae01d1 introduce "struct... |
897 898 |
struct wait_opts { enum pid_type wo_type; |
9e8ae01d1 introduce "struct... |
899 |
int wo_flags; |
e1eb1ebcc mm: exit.c reorde... |
900 |
struct pid *wo_pid; |
9e8ae01d1 introduce "struct... |
901 902 903 904 |
struct siginfo __user *wo_info; int __user *wo_stat; struct rusage __user *wo_rusage; |
0b7570e77 do_wait() wakeup ... |
905 |
wait_queue_t child_wait; |
9e8ae01d1 introduce "struct... |
906 907 |
int notask_error; }; |
989264f46 do_wait-wakeup-op... |
908 909 |
static inline struct pid *task_pid_type(struct task_struct *task, enum pid_type type) |
161550d74 pid: sys_wait... ... |
910 |
{ |
989264f46 do_wait-wakeup-op... |
911 912 913 |
if (type != PIDTYPE_PID) task = task->group_leader; return task->pids[type].pid; |
161550d74 pid: sys_wait... ... |
914 |
} |
989264f46 do_wait-wakeup-op... |
915 |
static int eligible_pid(struct wait_opts *wo, struct task_struct *p) |
1da177e4c Linux-2.6.12-rc2 |
916 |
{ |
5c01ba49e do_wait-wakeup-op... |
917 918 919 |
return wo->wo_type == PIDTYPE_MAX || task_pid_type(p, wo->wo_type) == wo->wo_pid; } |
1da177e4c Linux-2.6.12-rc2 |
920 |
|
5c01ba49e do_wait-wakeup-op... |
921 922 923 924 |
static int eligible_child(struct wait_opts *wo, struct task_struct *p) { if (!eligible_pid(wo, p)) return 0; |
1da177e4c Linux-2.6.12-rc2 |
925 926 927 928 929 |
/* Wait for all children (clone and not) if __WALL is set; * otherwise, wait for clone children *only* if __WCLONE is * set; otherwise, wait for non-clone children *only*. (Note: * A "clone" child here is one that reports to its parent * using a signal other than SIGCHLD.) */ |
9e8ae01d1 introduce "struct... |
930 931 |
if (((p->exit_signal != SIGCHLD) ^ !!(wo->wo_flags & __WCLONE)) && !(wo->wo_flags & __WALL)) |
1da177e4c Linux-2.6.12-rc2 |
932 |
return 0; |
1da177e4c Linux-2.6.12-rc2 |
933 |
|
14dd0b814 do_wait: return s... |
934 |
return 1; |
1da177e4c Linux-2.6.12-rc2 |
935 |
} |
9e8ae01d1 introduce "struct... |
936 937 |
static int wait_noreap_copyout(struct wait_opts *wo, struct task_struct *p, pid_t pid, uid_t uid, int why, int status) |
1da177e4c Linux-2.6.12-rc2 |
938 |
{ |
9e8ae01d1 introduce "struct... |
939 940 941 |
struct siginfo __user *infop; int retval = wo->wo_rusage ? getrusage(p, RUSAGE_BOTH, wo->wo_rusage) : 0; |
36c8b5868 [PATCH] sched: cl... |
942 |
|
1da177e4c Linux-2.6.12-rc2 |
943 |
put_task_struct(p); |
9e8ae01d1 introduce "struct... |
944 |
infop = wo->wo_info; |
b6fe2d117 wait_noreap_copyo... |
945 946 947 948 949 950 951 952 953 954 955 956 957 958 |
if (infop) { if (!retval) retval = put_user(SIGCHLD, &infop->si_signo); if (!retval) retval = put_user(0, &infop->si_errno); if (!retval) retval = put_user((short)why, &infop->si_code); if (!retval) retval = put_user(pid, &infop->si_pid); if (!retval) retval = put_user(uid, &infop->si_uid); if (!retval) retval = put_user(status, &infop->si_status); } |
1da177e4c Linux-2.6.12-rc2 |
959 960 961 962 963 964 965 966 967 968 969 |
if (!retval) retval = pid; return retval; } /* * Handle sys_wait4 work for one task in state EXIT_ZOMBIE. We hold * read_lock(&tasklist_lock) on entry. If we return zero, we still hold * the lock and this task is uninteresting. If we return nonzero, we have * released the lock and the system call should return. */ |
9e8ae01d1 introduce "struct... |
970 |
static int wait_task_zombie(struct wait_opts *wo, struct task_struct *p) |
1da177e4c Linux-2.6.12-rc2 |
971 972 |
{ unsigned long state; |
2f4e6e2a8 wait_task_zombie:... |
973 |
int retval, status, traced; |
6c5f3e7b4 Pidns: make full ... |
974 |
pid_t pid = task_pid_vnr(p); |
43e13cc10 cred: remove task... |
975 |
uid_t uid = from_kuid_munged(current_user_ns(), task_uid(p)); |
9e8ae01d1 introduce "struct... |
976 |
struct siginfo __user *infop; |
1da177e4c Linux-2.6.12-rc2 |
977 |
|
9e8ae01d1 introduce "struct... |
978 |
if (!likely(wo->wo_flags & WEXITED)) |
98abed020 do_wait reorganiz... |
979 |
return 0; |
9e8ae01d1 introduce "struct... |
980 |
if (unlikely(wo->wo_flags & WNOWAIT)) { |
1da177e4c Linux-2.6.12-rc2 |
981 |
int exit_code = p->exit_code; |
f3abd4f95 kernel/exit.c: fi... |
982 |
int why; |
1da177e4c Linux-2.6.12-rc2 |
983 |
|
1da177e4c Linux-2.6.12-rc2 |
984 985 986 987 988 989 990 991 992 |
get_task_struct(p); read_unlock(&tasklist_lock); if ((exit_code & 0x7f) == 0) { why = CLD_EXITED; status = exit_code >> 8; } else { why = (exit_code & 0x80) ? CLD_DUMPED : CLD_KILLED; status = exit_code & 0x7f; } |
9e8ae01d1 introduce "struct... |
993 |
return wait_noreap_copyout(wo, p, pid, uid, why, status); |
1da177e4c Linux-2.6.12-rc2 |
994 995 996 997 998 999 1000 1001 1002 1003 1004 |
} /* * Try to move the task's state to DEAD * only one thread is allowed to do this: */ state = xchg(&p->exit_state, EXIT_DEAD); if (state != EXIT_ZOMBIE) { BUG_ON(state != EXIT_DEAD); return 0; } |
1da177e4c Linux-2.6.12-rc2 |
1005 |
|
53b6f9fbd ptrace: introduce... |
1006 |
traced = ptrace_reparented(p); |
befca9677 ptrace: wait_task... |
1007 1008 |
/* * It can be ptraced but not reparented, check |
e550f14dc kill task_detached() |
1009 |
* thread_group_leader() to filter out sub-threads. |
befca9677 ptrace: wait_task... |
1010 |
*/ |
e550f14dc kill task_detached() |
1011 |
if (likely(!traced) && thread_group_leader(p)) { |
3795e1616 [PATCH] Decrease ... |
1012 1013 |
struct signal_struct *psig; struct signal_struct *sig; |
1f10206cf getrusage: fill r... |
1014 |
unsigned long maxrss; |
0cf55e1ec sched, cputime: I... |
1015 |
cputime_t tgutime, tgstime; |
3795e1616 [PATCH] Decrease ... |
1016 |
|
1da177e4c Linux-2.6.12-rc2 |
1017 1018 1019 1020 1021 1022 1023 1024 1025 1026 1027 |
/* * The resource counters for the group leader are in its * own task_struct. Those for dead threads in the group * are in its signal_struct, as are those for the child * processes it has previously reaped. All these * accumulate in the parent's signal_struct c* fields. * * We don't bother to take a lock here to protect these * p->signal fields, because they are only touched by * __exit_signal, which runs with tasklist_lock * write-locked anyway, and so is excluded here. We do |
d1e98f429 ptrace: wait_task... |
1028 |
* need to protect the access to parent->signal fields, |
1da177e4c Linux-2.6.12-rc2 |
1029 1030 |
* as other threads in the parent group can be right * here reaping other children at the same time. |
0cf55e1ec sched, cputime: I... |
1031 |
* |
e80d0a1ae cputime: Rename t... |
1032 |
* We use thread_group_cputime_adjusted() to get times for the thread |
0cf55e1ec sched, cputime: I... |
1033 1034 |
* group, which consolidates times for all threads in the * group including the group leader. |
1da177e4c Linux-2.6.12-rc2 |
1035 |
*/ |
e80d0a1ae cputime: Rename t... |
1036 |
thread_group_cputime_adjusted(p, &tgutime, &tgstime); |
d1e98f429 ptrace: wait_task... |
1037 1038 |
spin_lock_irq(&p->real_parent->sighand->siglock); psig = p->real_parent->signal; |
3795e1616 [PATCH] Decrease ... |
1039 |
sig = p->signal; |
648616343 [S390] cputime: a... |
1040 1041 |
psig->cutime += tgutime + sig->cutime; psig->cstime += tgstime + sig->cstime; |
6fac4829c cputime: Use acce... |
1042 |
psig->cgtime += task_gtime(p) + sig->gtime + sig->cgtime; |
3795e1616 [PATCH] Decrease ... |
1043 1044 1045 1046 1047 1048 1049 1050 |
psig->cmin_flt += p->min_flt + sig->min_flt + sig->cmin_flt; psig->cmaj_flt += p->maj_flt + sig->maj_flt + sig->cmaj_flt; psig->cnvcsw += p->nvcsw + sig->nvcsw + sig->cnvcsw; psig->cnivcsw += p->nivcsw + sig->nivcsw + sig->cnivcsw; |
6eaeeaba3 getrusage(): fill... |
1051 1052 1053 1054 1055 1056 |
psig->cinblock += task_io_get_inblock(p) + sig->inblock + sig->cinblock; psig->coublock += task_io_get_oublock(p) + sig->oublock + sig->coublock; |
1f10206cf getrusage: fill r... |
1057 1058 1059 |
maxrss = max(sig->maxrss, sig->cmaxrss); if (psig->cmaxrss < maxrss) psig->cmaxrss = maxrss; |
5995477ab task IO accountin... |
1060 1061 |
task_io_accounting_add(&psig->ioac, &p->ioac); task_io_accounting_add(&psig->ioac, &sig->ioac); |
d1e98f429 ptrace: wait_task... |
1062 |
spin_unlock_irq(&p->real_parent->sighand->siglock); |
1da177e4c Linux-2.6.12-rc2 |
1063 1064 1065 1066 1067 1068 1069 |
} /* * Now we are sure this task is interesting, and no other * thread can reap it because we set its state to EXIT_DEAD. */ read_unlock(&tasklist_lock); |
9e8ae01d1 introduce "struct... |
1070 1071 |
retval = wo->wo_rusage ? getrusage(p, RUSAGE_BOTH, wo->wo_rusage) : 0; |
1da177e4c Linux-2.6.12-rc2 |
1072 1073 |
status = (p->signal->flags & SIGNAL_GROUP_EXIT) ? p->signal->group_exit_code : p->exit_code; |
9e8ae01d1 introduce "struct... |
1074 1075 1076 1077 |
if (!retval && wo->wo_stat) retval = put_user(status, wo->wo_stat); infop = wo->wo_info; |
1da177e4c Linux-2.6.12-rc2 |
1078 1079 1080 1081 1082 1083 1084 1085 1086 1087 1088 1089 1090 1091 1092 1093 1094 1095 1096 |
if (!retval && infop) retval = put_user(SIGCHLD, &infop->si_signo); if (!retval && infop) retval = put_user(0, &infop->si_errno); if (!retval && infop) { int why; if ((status & 0x7f) == 0) { why = CLD_EXITED; status >>= 8; } else { why = (status & 0x80) ? CLD_DUMPED : CLD_KILLED; status &= 0x7f; } retval = put_user((short)why, &infop->si_code); if (!retval) retval = put_user(status, &infop->si_status); } if (!retval && infop) |
3a515e4a6 wait_task_continu... |
1097 |
retval = put_user(pid, &infop->si_pid); |
1da177e4c Linux-2.6.12-rc2 |
1098 |
if (!retval && infop) |
c69e8d9c0 CRED: Use RCU to ... |
1099 |
retval = put_user(uid, &infop->si_uid); |
2f4e6e2a8 wait_task_zombie:... |
1100 |
if (!retval) |
3a515e4a6 wait_task_continu... |
1101 |
retval = pid; |
2f4e6e2a8 wait_task_zombie:... |
1102 1103 |
if (traced) { |
1da177e4c Linux-2.6.12-rc2 |
1104 |
write_lock_irq(&tasklist_lock); |
2f4e6e2a8 wait_task_zombie:... |
1105 1106 1107 |
/* We dropped tasklist, ptracer could die and untrace */ ptrace_unlink(p); /* |
867734737 make do_notify_pa... |
1108 1109 |
* If this is not a sub-thread, notify the parent. * If parent wants a zombie, don't release it now. |
2f4e6e2a8 wait_task_zombie:... |
1110 |
*/ |
867734737 make do_notify_pa... |
1111 1112 1113 1114 |
if (thread_group_leader(p) && !do_notify_parent(p, p->exit_signal)) { p->exit_state = EXIT_ZOMBIE; p = NULL; |
1da177e4c Linux-2.6.12-rc2 |
1115 1116 1117 1118 1119 |
} write_unlock_irq(&tasklist_lock); } if (p != NULL) release_task(p); |
2f4e6e2a8 wait_task_zombie:... |
1120 |
|
1da177e4c Linux-2.6.12-rc2 |
1121 1122 |
return retval; } |
90bc8d8b1 do_wait: fix wait... |
1123 1124 1125 |
static int *task_stopped_code(struct task_struct *p, bool ptrace) { if (ptrace) { |
544b2c91a ptrace: implement... |
1126 1127 |
if (task_is_stopped_or_traced(p) && !(p->jobctl & JOBCTL_LISTENING)) |
90bc8d8b1 do_wait: fix wait... |
1128 1129 1130 1131 1132 1133 1134 |
return &p->exit_code; } else { if (p->signal->flags & SIGNAL_STOP_STOPPED) return &p->signal->group_exit_code; } return NULL; } |
19e274630 job control: reor... |
1135 1136 1137 1138 1139 1140 1141 1142 1143 1144 1145 1146 1147 1148 1149 1150 1151 |
/** * wait_task_stopped - Wait for %TASK_STOPPED or %TASK_TRACED * @wo: wait options * @ptrace: is the wait for ptrace * @p: task to wait for * * Handle sys_wait4() work for %p in state %TASK_STOPPED or %TASK_TRACED. * * CONTEXT: * read_lock(&tasklist_lock), which is released if return value is * non-zero. Also, grabs and releases @p->sighand->siglock. * * RETURNS: * 0 if wait condition didn't exist and search for other wait conditions * should continue. Non-zero return, -errno on failure and @p's pid on * success, implies that tasklist_lock is released and wait condition * search should terminate. |
1da177e4c Linux-2.6.12-rc2 |
1152 |
*/ |
9e8ae01d1 introduce "struct... |
1153 1154 |
static int wait_task_stopped(struct wait_opts *wo, int ptrace, struct task_struct *p) |
1da177e4c Linux-2.6.12-rc2 |
1155 |
{ |
9e8ae01d1 introduce "struct... |
1156 |
struct siginfo __user *infop; |
90bc8d8b1 do_wait: fix wait... |
1157 |
int retval, exit_code, *p_code, why; |
ee7c82da8 wait_task_stopped... |
1158 |
uid_t uid = 0; /* unneeded, required by compiler */ |
c89507835 wait_task_stopped... |
1159 |
pid_t pid; |
1da177e4c Linux-2.6.12-rc2 |
1160 |
|
47918025e shift "ptrace imp... |
1161 1162 1163 |
/* * Traditionally we see ptrace'd stopped tasks regardless of options. */ |
9e8ae01d1 introduce "struct... |
1164 |
if (!ptrace && !(wo->wo_flags & WUNTRACED)) |
98abed020 do_wait reorganiz... |
1165 |
return 0; |
19e274630 job control: reor... |
1166 1167 |
if (!task_stopped_code(p, ptrace)) return 0; |
ee7c82da8 wait_task_stopped... |
1168 1169 |
exit_code = 0; spin_lock_irq(&p->sighand->siglock); |
90bc8d8b1 do_wait: fix wait... |
1170 1171 |
p_code = task_stopped_code(p, ptrace); if (unlikely(!p_code)) |
ee7c82da8 wait_task_stopped... |
1172 |
goto unlock_sig; |
90bc8d8b1 do_wait: fix wait... |
1173 |
exit_code = *p_code; |
ee7c82da8 wait_task_stopped... |
1174 1175 |
if (!exit_code) goto unlock_sig; |
9e8ae01d1 introduce "struct... |
1176 |
if (!unlikely(wo->wo_flags & WNOWAIT)) |
90bc8d8b1 do_wait: fix wait... |
1177 |
*p_code = 0; |
ee7c82da8 wait_task_stopped... |
1178 |
|
8ca937a66 cred: use correct... |
1179 |
uid = from_kuid_munged(current_user_ns(), task_uid(p)); |
ee7c82da8 wait_task_stopped... |
1180 1181 1182 |
unlock_sig: spin_unlock_irq(&p->sighand->siglock); if (!exit_code) |
1da177e4c Linux-2.6.12-rc2 |
1183 1184 1185 1186 1187 1188 1189 1190 1191 1192 |
return 0; /* * Now we are pretty sure this task is interesting. * Make sure it doesn't get reaped out from under us while we * give up the lock and then examine it below. We don't want to * keep holding onto the tasklist_lock while we call getrusage and * possibly take page faults for user memory. */ get_task_struct(p); |
6c5f3e7b4 Pidns: make full ... |
1193 |
pid = task_pid_vnr(p); |
f470021ad ptrace children r... |
1194 |
why = ptrace ? CLD_TRAPPED : CLD_STOPPED; |
1da177e4c Linux-2.6.12-rc2 |
1195 |
read_unlock(&tasklist_lock); |
9e8ae01d1 introduce "struct... |
1196 1197 1198 1199 1200 1201 1202 |
if (unlikely(wo->wo_flags & WNOWAIT)) return wait_noreap_copyout(wo, p, pid, uid, why, exit_code); retval = wo->wo_rusage ? getrusage(p, RUSAGE_BOTH, wo->wo_rusage) : 0; if (!retval && wo->wo_stat) retval = put_user((exit_code << 8) | 0x7f, wo->wo_stat); |
1da177e4c Linux-2.6.12-rc2 |
1203 |
|
9e8ae01d1 introduce "struct... |
1204 |
infop = wo->wo_info; |
1da177e4c Linux-2.6.12-rc2 |
1205 1206 1207 1208 1209 |
if (!retval && infop) retval = put_user(SIGCHLD, &infop->si_signo); if (!retval && infop) retval = put_user(0, &infop->si_errno); if (!retval && infop) |
6efcae460 Fix waitid si_cod... |
1210 |
retval = put_user((short)why, &infop->si_code); |
1da177e4c Linux-2.6.12-rc2 |
1211 1212 1213 |
if (!retval && infop) retval = put_user(exit_code, &infop->si_status); if (!retval && infop) |
c89507835 wait_task_stopped... |
1214 |
retval = put_user(pid, &infop->si_pid); |
1da177e4c Linux-2.6.12-rc2 |
1215 |
if (!retval && infop) |
ee7c82da8 wait_task_stopped... |
1216 |
retval = put_user(uid, &infop->si_uid); |
1da177e4c Linux-2.6.12-rc2 |
1217 |
if (!retval) |
c89507835 wait_task_stopped... |
1218 |
retval = pid; |
1da177e4c Linux-2.6.12-rc2 |
1219 1220 1221 1222 1223 1224 1225 1226 1227 1228 1229 1230 |
put_task_struct(p); BUG_ON(!retval); return retval; } /* * Handle do_wait work for one task in a live, non-stopped state. * read_lock(&tasklist_lock) on entry. If we return zero, we still hold * the lock and this task is uninteresting. If we return nonzero, we have * released the lock and the system call should return. */ |
9e8ae01d1 introduce "struct... |
1231 |
static int wait_task_continued(struct wait_opts *wo, struct task_struct *p) |
1da177e4c Linux-2.6.12-rc2 |
1232 1233 1234 1235 |
{ int retval; pid_t pid; uid_t uid; |
9e8ae01d1 introduce "struct... |
1236 |
if (!unlikely(wo->wo_flags & WCONTINUED)) |
98abed020 do_wait reorganiz... |
1237 |
return 0; |
1da177e4c Linux-2.6.12-rc2 |
1238 1239 1240 1241 1242 1243 1244 1245 1246 |
if (!(p->signal->flags & SIGNAL_STOP_CONTINUED)) return 0; spin_lock_irq(&p->sighand->siglock); /* Re-check with the lock held. */ if (!(p->signal->flags & SIGNAL_STOP_CONTINUED)) { spin_unlock_irq(&p->sighand->siglock); return 0; } |
9e8ae01d1 introduce "struct... |
1247 |
if (!unlikely(wo->wo_flags & WNOWAIT)) |
1da177e4c Linux-2.6.12-rc2 |
1248 |
p->signal->flags &= ~SIGNAL_STOP_CONTINUED; |
8ca937a66 cred: use correct... |
1249 |
uid = from_kuid_munged(current_user_ns(), task_uid(p)); |
1da177e4c Linux-2.6.12-rc2 |
1250 |
spin_unlock_irq(&p->sighand->siglock); |
6c5f3e7b4 Pidns: make full ... |
1251 |
pid = task_pid_vnr(p); |
1da177e4c Linux-2.6.12-rc2 |
1252 1253 |
get_task_struct(p); read_unlock(&tasklist_lock); |
9e8ae01d1 introduce "struct... |
1254 1255 1256 |
if (!wo->wo_info) { retval = wo->wo_rusage ? getrusage(p, RUSAGE_BOTH, wo->wo_rusage) : 0; |
1da177e4c Linux-2.6.12-rc2 |
1257 |
put_task_struct(p); |
9e8ae01d1 introduce "struct... |
1258 1259 |
if (!retval && wo->wo_stat) retval = put_user(0xffff, wo->wo_stat); |
1da177e4c Linux-2.6.12-rc2 |
1260 |
if (!retval) |
3a515e4a6 wait_task_continu... |
1261 |
retval = pid; |
1da177e4c Linux-2.6.12-rc2 |
1262 |
} else { |
9e8ae01d1 introduce "struct... |
1263 1264 |
retval = wait_noreap_copyout(wo, p, pid, uid, CLD_CONTINUED, SIGCONT); |
1da177e4c Linux-2.6.12-rc2 |
1265 1266 1267 1268 1269 |
BUG_ON(retval == 0); } return retval; } |
98abed020 do_wait reorganiz... |
1270 1271 1272 |
/* * Consider @p for a wait by @parent. * |
9e8ae01d1 introduce "struct... |
1273 |
* -ECHILD should be in ->notask_error before the first call. |
98abed020 do_wait reorganiz... |
1274 1275 |
* Returns nonzero for a final return, when we have unlocked tasklist_lock. * Returns zero if the search for a child should continue; |
9e8ae01d1 introduce "struct... |
1276 |
* then ->notask_error is 0 if @p is an eligible child, |
14dd0b814 do_wait: return s... |
1277 |
* or another error from security_task_wait(), or still -ECHILD. |
98abed020 do_wait reorganiz... |
1278 |
*/ |
b6e763f07 wait_consider_tas... |
1279 1280 |
static int wait_consider_task(struct wait_opts *wo, int ptrace, struct task_struct *p) |
98abed020 do_wait reorganiz... |
1281 |
{ |
9e8ae01d1 introduce "struct... |
1282 |
int ret = eligible_child(wo, p); |
14dd0b814 do_wait: return s... |
1283 |
if (!ret) |
98abed020 do_wait reorganiz... |
1284 |
return ret; |
a2322e1d2 do_wait() wakeup ... |
1285 |
ret = security_task_wait(p); |
14dd0b814 do_wait: return s... |
1286 1287 1288 1289 1290 1291 1292 1293 |
if (unlikely(ret < 0)) { /* * If we have not yet seen any eligible child, * then let this error code replace -ECHILD. * A permission error will give the user a clue * to look for security policy problems, rather * than for mysterious wait bugs. */ |
9e8ae01d1 introduce "struct... |
1294 1295 |
if (wo->notask_error) wo->notask_error = ret; |
78a3d9d56 do_wait: do take ... |
1296 |
return 0; |
14dd0b814 do_wait: return s... |
1297 |
} |
823b018e5 job control: Smal... |
1298 |
/* dead body doesn't have much to contribute */ |
50b8d2574 ptrace: partially... |
1299 1300 1301 1302 1303 1304 1305 |
if (unlikely(p->exit_state == EXIT_DEAD)) { /* * But do not ignore this task until the tracer does * wait_task_zombie()->do_notify_parent(). */ if (likely(!ptrace) && unlikely(ptrace_reparented(p))) wo->notask_error = 0; |
823b018e5 job control: Smal... |
1306 |
return 0; |
50b8d2574 ptrace: partially... |
1307 |
} |
823b018e5 job control: Smal... |
1308 |
|
45cb24a1d job control: Allo... |
1309 1310 |
/* slay zombie? */ if (p->exit_state == EXIT_ZOMBIE) { |
f470021ad ptrace children r... |
1311 |
/* |
45cb24a1d job control: Allo... |
1312 1313 1314 |
* A zombie ptracee is only visible to its ptracer. * Notification and reaping will be cascaded to the real * parent when the ptracer detaches. |
f470021ad ptrace children r... |
1315 |
*/ |
d21142ece ptrace: kill task... |
1316 |
if (likely(!ptrace) && unlikely(p->ptrace)) { |
45cb24a1d job control: Allo... |
1317 1318 1319 1320 |
/* it will become visible, clear notask_error */ wo->notask_error = 0; return 0; } |
f470021ad ptrace children r... |
1321 |
|
9b84cca25 job control: Fix ... |
1322 1323 1324 |
/* we don't reap group leaders with subthreads */ if (!delay_group_leader(p)) return wait_task_zombie(wo, p); |
98abed020 do_wait reorganiz... |
1325 |
|
f470021ad ptrace children r... |
1326 |
/* |
9b84cca25 job control: Fix ... |
1327 1328 1329 1330 1331 1332 1333 1334 1335 1336 1337 1338 1339 1340 1341 1342 1343 1344 1345 1346 1347 1348 1349 |
* Allow access to stopped/continued state via zombie by * falling through. Clearing of notask_error is complex. * * When !@ptrace: * * If WEXITED is set, notask_error should naturally be * cleared. If not, subset of WSTOPPED|WCONTINUED is set, * so, if there are live subthreads, there are events to * wait for. If all subthreads are dead, it's still safe * to clear - this function will be called again in finite * amount time once all the subthreads are released and * will then return without clearing. * * When @ptrace: * * Stopped state is per-task and thus can't change once the * target task dies. Only continued and exited can happen. * Clear notask_error if WCONTINUED | WEXITED. */ if (likely(!ptrace) || (wo->wo_flags & (WCONTINUED | WEXITED))) wo->notask_error = 0; } else { /* |
45cb24a1d job control: Allo... |
1350 1351 1352 1353 1354 1355 1356 1357 1358 |
* If @p is ptraced by a task in its real parent's group, * hide group stop/continued state when looking at @p as * the real parent; otherwise, a single stop can be * reported twice as group and ptrace stops. * * If a ptracer wants to distinguish the two events for its * own children, it should create a separate process which * takes the role of real parent. */ |
479bf98c1 ptrace: wait_cons... |
1359 |
if (likely(!ptrace) && p->ptrace && !ptrace_reparented(p)) |
45cb24a1d job control: Allo... |
1360 1361 1362 |
return 0; /* |
9b84cca25 job control: Fix ... |
1363 1364 |
* @p is alive and it's gonna stop, continue or exit, so * there always is something to wait for. |
f470021ad ptrace children r... |
1365 |
*/ |
9e8ae01d1 introduce "struct... |
1366 |
wo->notask_error = 0; |
f470021ad ptrace children r... |
1367 |
} |
98abed020 do_wait reorganiz... |
1368 |
/* |
45cb24a1d job control: Allo... |
1369 1370 |
* Wait for stopped. Depending on @ptrace, different stopped state * is used and the two don't interact with each other. |
98abed020 do_wait reorganiz... |
1371 |
*/ |
19e274630 job control: reor... |
1372 1373 1374 |
ret = wait_task_stopped(wo, ptrace, p); if (ret) return ret; |
98abed020 do_wait reorganiz... |
1375 1376 |
/* |
45cb24a1d job control: Allo... |
1377 1378 1379 |
* Wait for continued. There's only one continued state and the * ptracer can consume it which can confuse the real parent. Don't * use WCONTINUED from ptracer. You don't need or want it. |
98abed020 do_wait reorganiz... |
1380 |
*/ |
9e8ae01d1 introduce "struct... |
1381 |
return wait_task_continued(wo, p); |
98abed020 do_wait reorganiz... |
1382 1383 1384 1385 1386 |
} /* * Do the work of do_wait() for one thread in the group, @tsk. * |
9e8ae01d1 introduce "struct... |
1387 |
* -ECHILD should be in ->notask_error before the first call. |
98abed020 do_wait reorganiz... |
1388 1389 |
* Returns nonzero for a final return, when we have unlocked tasklist_lock. * Returns zero if the search for a child should continue; then |
9e8ae01d1 introduce "struct... |
1390 |
* ->notask_error is 0 if there were any eligible children, |
14dd0b814 do_wait: return s... |
1391 |
* or another error from security_task_wait(), or still -ECHILD. |
98abed020 do_wait reorganiz... |
1392 |
*/ |
9e8ae01d1 introduce "struct... |
1393 |
static int do_wait_thread(struct wait_opts *wo, struct task_struct *tsk) |
98abed020 do_wait reorganiz... |
1394 1395 1396 1397 |
{ struct task_struct *p; list_for_each_entry(p, &tsk->children, sibling) { |
9cd80bbb0 do_wait() optimiz... |
1398 1399 1400 |
int ret = wait_consider_task(wo, 0, p); if (ret) return ret; |
98abed020 do_wait reorganiz... |
1401 1402 1403 1404 |
} return 0; } |
9e8ae01d1 introduce "struct... |
1405 |
static int ptrace_do_wait(struct wait_opts *wo, struct task_struct *tsk) |
98abed020 do_wait reorganiz... |
1406 1407 |
{ struct task_struct *p; |
f470021ad ptrace children r... |
1408 |
list_for_each_entry(p, &tsk->ptraced, ptrace_entry) { |
b6e763f07 wait_consider_tas... |
1409 |
int ret = wait_consider_task(wo, 1, p); |
f470021ad ptrace children r... |
1410 |
if (ret) |
98abed020 do_wait reorganiz... |
1411 |
return ret; |
98abed020 do_wait reorganiz... |
1412 1413 1414 1415 |
} return 0; } |
0b7570e77 do_wait() wakeup ... |
1416 1417 1418 1419 1420 1421 |
static int child_wait_callback(wait_queue_t *wait, unsigned mode, int sync, void *key) { struct wait_opts *wo = container_of(wait, struct wait_opts, child_wait); struct task_struct *p = key; |
5c01ba49e do_wait-wakeup-op... |
1422 |
if (!eligible_pid(wo, p)) |
0b7570e77 do_wait() wakeup ... |
1423 |
return 0; |
b4fe51823 do_wait() wakeup ... |
1424 1425 |
if ((wo->wo_flags & __WNOTHREAD) && wait->private != p->parent) return 0; |
0b7570e77 do_wait() wakeup ... |
1426 1427 |
return default_wake_function(wait, mode, sync, key); } |
a7f0765ed ptrace: __ptrace_... |
1428 1429 |
void __wake_up_parent(struct task_struct *p, struct task_struct *parent) { |
0b7570e77 do_wait() wakeup ... |
1430 1431 |
__wake_up_sync_key(&parent->signal->wait_chldexit, TASK_INTERRUPTIBLE, 1, p); |
a7f0765ed ptrace: __ptrace_... |
1432 |
} |
9e8ae01d1 introduce "struct... |
1433 |
static long do_wait(struct wait_opts *wo) |
1da177e4c Linux-2.6.12-rc2 |
1434 |
{ |
1da177e4c Linux-2.6.12-rc2 |
1435 |
struct task_struct *tsk; |
98abed020 do_wait reorganiz... |
1436 |
int retval; |
1da177e4c Linux-2.6.12-rc2 |
1437 |
|
9e8ae01d1 introduce "struct... |
1438 |
trace_sched_process_wait(wo->wo_pid); |
0a16b6075 tracing, sched: L... |
1439 |
|
0b7570e77 do_wait() wakeup ... |
1440 1441 1442 |
init_waitqueue_func_entry(&wo->child_wait, child_wait_callback); wo->child_wait.private = current; add_wait_queue(¤t->signal->wait_chldexit, &wo->child_wait); |
1da177e4c Linux-2.6.12-rc2 |
1443 |
repeat: |
98abed020 do_wait reorganiz... |
1444 1445 |
/* * If there is nothing that can match our critiera just get out. |
9e8ae01d1 introduce "struct... |
1446 1447 1448 |
* We will clear ->notask_error to zero if we see any child that * might later match our criteria, even if we are not able to reap * it yet. |
98abed020 do_wait reorganiz... |
1449 |
*/ |
64a16caf5 do_wait: simplify... |
1450 |
wo->notask_error = -ECHILD; |
9e8ae01d1 introduce "struct... |
1451 1452 |
if ((wo->wo_type < PIDTYPE_MAX) && (!wo->wo_pid || hlist_empty(&wo->wo_pid->tasks[wo->wo_type]))) |
64a16caf5 do_wait: simplify... |
1453 |
goto notask; |
161550d74 pid: sys_wait... ... |
1454 |
|
f95d39d10 do_wait: fix the ... |
1455 |
set_current_state(TASK_INTERRUPTIBLE); |
1da177e4c Linux-2.6.12-rc2 |
1456 1457 1458 |
read_lock(&tasklist_lock); tsk = current; do { |
64a16caf5 do_wait: simplify... |
1459 1460 1461 |
retval = do_wait_thread(wo, tsk); if (retval) goto end; |
9e8ae01d1 introduce "struct... |
1462 |
|
64a16caf5 do_wait: simplify... |
1463 1464 |
retval = ptrace_do_wait(wo, tsk); if (retval) |
98abed020 do_wait reorganiz... |
1465 |
goto end; |
98abed020 do_wait reorganiz... |
1466 |
|
9e8ae01d1 introduce "struct... |
1467 |
if (wo->wo_flags & __WNOTHREAD) |
1da177e4c Linux-2.6.12-rc2 |
1468 |
break; |
a3f6dfb72 do_wait: kill the... |
1469 |
} while_each_thread(current, tsk); |
1da177e4c Linux-2.6.12-rc2 |
1470 |
read_unlock(&tasklist_lock); |
f2cc3eb13 do_wait: fix secu... |
1471 |
|
64a16caf5 do_wait: simplify... |
1472 |
notask: |
9e8ae01d1 introduce "struct... |
1473 1474 |
retval = wo->notask_error; if (!retval && !(wo->wo_flags & WNOHANG)) { |
1da177e4c Linux-2.6.12-rc2 |
1475 |
retval = -ERESTARTSYS; |
98abed020 do_wait reorganiz... |
1476 1477 1478 1479 |
if (!signal_pending(current)) { schedule(); goto repeat; } |
1da177e4c Linux-2.6.12-rc2 |
1480 |
} |
1da177e4c Linux-2.6.12-rc2 |
1481 |
end: |
f95d39d10 do_wait: fix the ... |
1482 |
__set_current_state(TASK_RUNNING); |
0b7570e77 do_wait() wakeup ... |
1483 |
remove_wait_queue(¤t->signal->wait_chldexit, &wo->child_wait); |
1da177e4c Linux-2.6.12-rc2 |
1484 1485 |
return retval; } |
17da2bd90 [CVE-2009-0029] S... |
1486 1487 |
SYSCALL_DEFINE5(waitid, int, which, pid_t, upid, struct siginfo __user *, infop, int, options, struct rusage __user *, ru) |
1da177e4c Linux-2.6.12-rc2 |
1488 |
{ |
9e8ae01d1 introduce "struct... |
1489 |
struct wait_opts wo; |
161550d74 pid: sys_wait... ... |
1490 1491 |
struct pid *pid = NULL; enum pid_type type; |
1da177e4c Linux-2.6.12-rc2 |
1492 1493 1494 1495 1496 1497 1498 1499 1500 |
long ret; if (options & ~(WNOHANG|WNOWAIT|WEXITED|WSTOPPED|WCONTINUED)) return -EINVAL; if (!(options & (WEXITED|WSTOPPED|WCONTINUED))) return -EINVAL; switch (which) { case P_ALL: |
161550d74 pid: sys_wait... ... |
1501 |
type = PIDTYPE_MAX; |
1da177e4c Linux-2.6.12-rc2 |
1502 1503 |
break; case P_PID: |
161550d74 pid: sys_wait... ... |
1504 1505 |
type = PIDTYPE_PID; if (upid <= 0) |
1da177e4c Linux-2.6.12-rc2 |
1506 1507 1508 |
return -EINVAL; break; case P_PGID: |
161550d74 pid: sys_wait... ... |
1509 1510 |
type = PIDTYPE_PGID; if (upid <= 0) |
1da177e4c Linux-2.6.12-rc2 |
1511 |
return -EINVAL; |
1da177e4c Linux-2.6.12-rc2 |
1512 1513 1514 1515 |
break; default: return -EINVAL; } |
161550d74 pid: sys_wait... ... |
1516 1517 |
if (type < PIDTYPE_MAX) pid = find_get_pid(upid); |
9e8ae01d1 introduce "struct... |
1518 1519 1520 1521 1522 1523 1524 1525 |
wo.wo_type = type; wo.wo_pid = pid; wo.wo_flags = options; wo.wo_info = infop; wo.wo_stat = NULL; wo.wo_rusage = ru; ret = do_wait(&wo); |
dfe16dfa4 do_wait: fix sys_... |
1526 1527 1528 1529 1530 1531 1532 1533 1534 1535 1536 1537 1538 1539 1540 1541 1542 1543 1544 1545 1546 1547 |
if (ret > 0) { ret = 0; } else if (infop) { /* * For a WNOHANG return, clear out all the fields * we would set so the user can easily tell the * difference. */ if (!ret) ret = put_user(0, &infop->si_signo); if (!ret) ret = put_user(0, &infop->si_errno); if (!ret) ret = put_user(0, &infop->si_code); if (!ret) ret = put_user(0, &infop->si_pid); if (!ret) ret = put_user(0, &infop->si_uid); if (!ret) ret = put_user(0, &infop->si_status); } |
161550d74 pid: sys_wait... ... |
1548 |
put_pid(pid); |
1da177e4c Linux-2.6.12-rc2 |
1549 1550 |
return ret; } |
754fe8d29 [CVE-2009-0029] S... |
1551 1552 |
SYSCALL_DEFINE4(wait4, pid_t, upid, int __user *, stat_addr, int, options, struct rusage __user *, ru) |
1da177e4c Linux-2.6.12-rc2 |
1553 |
{ |
9e8ae01d1 introduce "struct... |
1554 |
struct wait_opts wo; |
161550d74 pid: sys_wait... ... |
1555 1556 |
struct pid *pid = NULL; enum pid_type type; |
1da177e4c Linux-2.6.12-rc2 |
1557 1558 1559 1560 1561 |
long ret; if (options & ~(WNOHANG|WUNTRACED|WCONTINUED| __WNOTHREAD|__WCLONE|__WALL)) return -EINVAL; |
161550d74 pid: sys_wait... ... |
1562 1563 1564 1565 1566 1567 1568 1569 |
if (upid == -1) type = PIDTYPE_MAX; else if (upid < 0) { type = PIDTYPE_PGID; pid = find_get_pid(-upid); } else if (upid == 0) { type = PIDTYPE_PGID; |
2ae448efc pids: improve get... |
1570 |
pid = get_task_pid(current, PIDTYPE_PGID); |
161550d74 pid: sys_wait... ... |
1571 1572 1573 1574 |
} else /* upid > 0 */ { type = PIDTYPE_PID; pid = find_get_pid(upid); } |
9e8ae01d1 introduce "struct... |
1575 1576 1577 1578 1579 1580 1581 |
wo.wo_type = type; wo.wo_pid = pid; wo.wo_flags = options | WEXITED; wo.wo_info = NULL; wo.wo_stat = stat_addr; wo.wo_rusage = ru; ret = do_wait(&wo); |
161550d74 pid: sys_wait... ... |
1582 |
put_pid(pid); |
1da177e4c Linux-2.6.12-rc2 |
1583 |
|
1da177e4c Linux-2.6.12-rc2 |
1584 1585 1586 1587 1588 1589 1590 1591 1592 |
return ret; } #ifdef __ARCH_WANT_SYS_WAITPID /* * sys_waitpid() remains for compatibility. waitpid() should be * implemented by calling sys_wait4() from libc.a. */ |
17da2bd90 [CVE-2009-0029] S... |
1593 |
SYSCALL_DEFINE3(waitpid, pid_t, pid, int __user *, stat_addr, int, options) |
1da177e4c Linux-2.6.12-rc2 |
1594 1595 1596 1597 1598 |
{ return sys_wait4(pid, stat_addr, options, NULL); } #endif |