Blame view
kernel/fork.c
42.5 KB
1da177e4c
|
1 2 3 4 5 6 7 8 9 10 11 12 |
/* * linux/kernel/fork.c * * Copyright (C) 1991, 1992 Linus Torvalds */ /* * 'fork.c' contains the help-routines for the 'fork' system call * (see also entry.S and others). * Fork is rather simple, once you get the hang of it, but the memory * management can be a bitch. See 'mm/memory.c': 'copy_page_range()' */ |
1da177e4c
|
13 14 15 |
#include <linux/slab.h> #include <linux/init.h> #include <linux/unistd.h> |
1da177e4c
|
16 17 18 |
#include <linux/module.h> #include <linux/vmalloc.h> #include <linux/completion.h> |
1da177e4c
|
19 20 21 22 |
#include <linux/personality.h> #include <linux/mempolicy.h> #include <linux/sem.h> #include <linux/file.h> |
9f3acc314
|
23 |
#include <linux/fdtable.h> |
da9cbc873
|
24 |
#include <linux/iocontext.h> |
1da177e4c
|
25 26 27 |
#include <linux/key.h> #include <linux/binfmts.h> #include <linux/mman.h> |
cddb8a5c1
|
28 |
#include <linux/mmu_notifier.h> |
1da177e4c
|
29 |
#include <linux/fs.h> |
ab516013a
|
30 |
#include <linux/nsproxy.h> |
c59ede7b7
|
31 |
#include <linux/capability.h> |
1da177e4c
|
32 |
#include <linux/cpu.h> |
b4f48b636
|
33 |
#include <linux/cgroup.h> |
1da177e4c
|
34 |
#include <linux/security.h> |
a1e78772d
|
35 |
#include <linux/hugetlb.h> |
1da177e4c
|
36 37 38 39 |
#include <linux/swap.h> #include <linux/syscalls.h> #include <linux/jiffies.h> #include <linux/futex.h> |
8141c7f3e
|
40 |
#include <linux/compat.h> |
207205a2b
|
41 |
#include <linux/kthread.h> |
7c3ab7381
|
42 |
#include <linux/task_io_accounting_ops.h> |
ab2af1f50
|
43 |
#include <linux/rcupdate.h> |
1da177e4c
|
44 45 46 |
#include <linux/ptrace.h> #include <linux/mount.h> #include <linux/audit.h> |
78fb74669
|
47 |
#include <linux/memcontrol.h> |
f201ae235
|
48 |
#include <linux/ftrace.h> |
1da177e4c
|
49 50 |
#include <linux/profile.h> #include <linux/rmap.h> |
f8af4da3b
|
51 |
#include <linux/ksm.h> |
1da177e4c
|
52 |
#include <linux/acct.h> |
8f0ab5147
|
53 |
#include <linux/tsacct_kern.h> |
9f46080c4
|
54 |
#include <linux/cn_proc.h> |
ba96a0c88
|
55 |
#include <linux/freezer.h> |
ca74e92b4
|
56 |
#include <linux/delayacct.h> |
ad4ecbcba
|
57 |
#include <linux/taskstats_kern.h> |
0a4254058
|
58 |
#include <linux/random.h> |
522ed7767
|
59 |
#include <linux/tty.h> |
fd0928df9
|
60 |
#include <linux/blkdev.h> |
5ad4e53bd
|
61 |
#include <linux/fs_struct.h> |
7c9f8861e
|
62 |
#include <linux/magic.h> |
cdd6c482c
|
63 |
#include <linux/perf_event.h> |
42c4ab41a
|
64 |
#include <linux/posix-timers.h> |
8e7cac798
|
65 |
#include <linux/user-return-notifier.h> |
3d5992d2a
|
66 |
#include <linux/oom.h> |
ba76149f4
|
67 |
#include <linux/khugepaged.h> |
1da177e4c
|
68 69 70 71 72 73 74 |
#include <asm/pgtable.h> #include <asm/pgalloc.h> #include <asm/uaccess.h> #include <asm/mmu_context.h> #include <asm/cacheflush.h> #include <asm/tlbflush.h> |
ad8d75fff
|
75 |
#include <trace/events/sched.h> |
1da177e4c
|
76 77 78 79 |
/* * Protected counters by write_lock_irq(&tasklist_lock) */ unsigned long total_forks; /* Handle normal Linux uptimes. */ |
fb0a685cb
|
80 |
int nr_threads; /* The idle threads do not count.. */ |
1da177e4c
|
81 82 83 84 |
int max_threads; /* tunable limit on nr_threads */ DEFINE_PER_CPU(unsigned long, process_counts) = 0; |
c59923a15
|
85 |
__cacheline_aligned DEFINE_RWLOCK(tasklist_lock); /* outer */ |
db1466b3e
|
86 87 88 89 90 91 92 93 |
#ifdef CONFIG_PROVE_RCU int lockdep_tasklist_lock_is_held(void) { return lockdep_is_held(&tasklist_lock); } EXPORT_SYMBOL_GPL(lockdep_tasklist_lock_is_held); #endif /* #ifdef CONFIG_PROVE_RCU */ |
1da177e4c
|
94 95 96 97 98 |
int nr_processes(void) { int cpu; int total = 0; |
1d5107509
|
99 |
for_each_possible_cpu(cpu) |
1da177e4c
|
100 101 102 103 104 105 |
total += per_cpu(process_counts, cpu); return total; } #ifndef __HAVE_ARCH_TASK_STRUCT_ALLOCATOR |
504f52b54
|
106 107 108 109 |
# define alloc_task_struct_node(node) \ kmem_cache_alloc_node(task_struct_cachep, GFP_KERNEL, node) # define free_task_struct(tsk) \ kmem_cache_free(task_struct_cachep, (tsk)) |
e18b890bb
|
110 |
static struct kmem_cache *task_struct_cachep; |
1da177e4c
|
111 |
#endif |
b69c49b78
|
112 |
#ifndef __HAVE_ARCH_THREAD_INFO_ALLOCATOR |
b6a84016b
|
113 114 |
static struct thread_info *alloc_thread_info_node(struct task_struct *tsk, int node) |
b69c49b78
|
115 116 117 118 119 120 |
{ #ifdef CONFIG_DEBUG_STACK_USAGE gfp_t mask = GFP_KERNEL | __GFP_ZERO; #else gfp_t mask = GFP_KERNEL; #endif |
b6a84016b
|
121 122 123 |
struct page *page = alloc_pages_node(node, mask, THREAD_SIZE_ORDER); return page ? page_address(page) : NULL; |
b69c49b78
|
124 125 126 127 128 129 130 |
} static inline void free_thread_info(struct thread_info *ti) { free_pages((unsigned long)ti, THREAD_SIZE_ORDER); } #endif |
1da177e4c
|
131 |
/* SLAB cache for signal_struct structures (tsk->signal) */ |
e18b890bb
|
132 |
static struct kmem_cache *signal_cachep; |
1da177e4c
|
133 134 |
/* SLAB cache for sighand_struct structures (tsk->sighand) */ |
e18b890bb
|
135 |
struct kmem_cache *sighand_cachep; |
1da177e4c
|
136 137 |
/* SLAB cache for files_struct structures (tsk->files) */ |
e18b890bb
|
138 |
struct kmem_cache *files_cachep; |
1da177e4c
|
139 140 |
/* SLAB cache for fs_struct structures (tsk->fs) */ |
e18b890bb
|
141 |
struct kmem_cache *fs_cachep; |
1da177e4c
|
142 143 |
/* SLAB cache for vm_area_struct structures */ |
e18b890bb
|
144 |
struct kmem_cache *vm_area_cachep; |
1da177e4c
|
145 146 |
/* SLAB cache for mm_struct structures (tsk->mm) */ |
e18b890bb
|
147 |
static struct kmem_cache *mm_cachep; |
1da177e4c
|
148 |
|
c6a7f5728
|
149 150 151 152 153 154 |
static void account_kernel_stack(struct thread_info *ti, int account) { struct zone *zone = page_zone(virt_to_page(ti)); mod_zone_page_state(zone, NR_KERNEL_STACK, account); } |
1da177e4c
|
155 156 |
void free_task(struct task_struct *tsk) { |
3e26c149c
|
157 |
prop_local_destroy_single(&tsk->dirties); |
c6a7f5728
|
158 |
account_kernel_stack(tsk->stack, -1); |
f7e4217b0
|
159 |
free_thread_info(tsk->stack); |
23f78d4a0
|
160 |
rt_mutex_debug_task_free(tsk); |
fb52607af
|
161 |
ftrace_graph_exit_task(tsk); |
1da177e4c
|
162 163 164 |
free_task_struct(tsk); } EXPORT_SYMBOL(free_task); |
ea6d290ca
|
165 166 |
static inline void free_signal_struct(struct signal_struct *sig) { |
97101eb41
|
167 |
taskstats_tgid_free(sig); |
1c5354de9
|
168 |
sched_autogroup_exit(sig); |
ea6d290ca
|
169 170 171 172 173 |
kmem_cache_free(signal_cachep, sig); } static inline void put_signal_struct(struct signal_struct *sig) { |
1c5354de9
|
174 |
if (atomic_dec_and_test(&sig->sigcnt)) |
ea6d290ca
|
175 176 |
free_signal_struct(sig); } |
158d9ebd1
|
177 |
void __put_task_struct(struct task_struct *tsk) |
1da177e4c
|
178 |
{ |
270f722d4
|
179 |
WARN_ON(!tsk->exit_state); |
1da177e4c
|
180 181 |
WARN_ON(atomic_read(&tsk->usage)); WARN_ON(tsk == current); |
e0e817392
|
182 |
exit_creds(tsk); |
35df17c57
|
183 |
delayacct_tsk_free(tsk); |
ea6d290ca
|
184 |
put_signal_struct(tsk->signal); |
1da177e4c
|
185 186 187 188 |
if (!profile_handoff_task(tsk)) free_task(tsk); } |
77c100c83
|
189 |
EXPORT_SYMBOL_GPL(__put_task_struct); |
1da177e4c
|
190 |
|
2adee9b30
|
191 192 193 194 195 196 197 |
/* * macro override instead of weak attribute alias, to workaround * gcc 4.1.0 and 4.1.1 bugs with weak attribute and empty functions. */ #ifndef arch_task_cache_init #define arch_task_cache_init() #endif |
61c4628b5
|
198 |
|
1da177e4c
|
199 200 201 202 203 204 205 206 207 |
void __init fork_init(unsigned long mempages) { #ifndef __HAVE_ARCH_TASK_STRUCT_ALLOCATOR #ifndef ARCH_MIN_TASKALIGN #define ARCH_MIN_TASKALIGN L1_CACHE_BYTES #endif /* create a slab on which task_structs can be allocated */ task_struct_cachep = kmem_cache_create("task_struct", sizeof(struct task_struct), |
2dff44052
|
208 |
ARCH_MIN_TASKALIGN, SLAB_PANIC | SLAB_NOTRACK, NULL); |
1da177e4c
|
209 |
#endif |
61c4628b5
|
210 211 |
/* do the arch specific task caches init */ arch_task_cache_init(); |
1da177e4c
|
212 213 214 215 216 217 218 219 220 221 |
/* * The default maximum number of threads is set to a safe * value: the thread structures can take up at most half * of memory. */ max_threads = mempages / (8 * THREAD_SIZE / PAGE_SIZE); /* * we need to allow at least 20 threads to boot a system */ |
fb0a685cb
|
222 |
if (max_threads < 20) |
1da177e4c
|
223 224 225 226 227 228 229 |
max_threads = 20; init_task.signal->rlim[RLIMIT_NPROC].rlim_cur = max_threads/2; init_task.signal->rlim[RLIMIT_NPROC].rlim_max = max_threads/2; init_task.signal->rlim[RLIMIT_SIGPENDING] = init_task.signal->rlim[RLIMIT_NPROC]; } |
61c4628b5
|
230 231 232 233 234 235 |
int __attribute__((weak)) arch_dup_task_struct(struct task_struct *dst, struct task_struct *src) { *dst = *src; return 0; } |
1da177e4c
|
236 237 238 239 |
static struct task_struct *dup_task_struct(struct task_struct *orig) { struct task_struct *tsk; struct thread_info *ti; |
7c9f8861e
|
240 |
unsigned long *stackend; |
207205a2b
|
241 |
int node = tsk_fork_get_node(orig); |
3e26c149c
|
242 |
int err; |
1da177e4c
|
243 244 |
prepare_to_copy(orig); |
504f52b54
|
245 |
tsk = alloc_task_struct_node(node); |
1da177e4c
|
246 247 |
if (!tsk) return NULL; |
b6a84016b
|
248 |
ti = alloc_thread_info_node(tsk, node); |
1da177e4c
|
249 250 251 252 |
if (!ti) { free_task_struct(tsk); return NULL; } |
fb0a685cb
|
253 |
err = arch_dup_task_struct(tsk, orig); |
61c4628b5
|
254 255 |
if (err) goto out; |
f7e4217b0
|
256 |
tsk->stack = ti; |
3e26c149c
|
257 258 |
err = prop_local_init_single(&tsk->dirties); |
61c4628b5
|
259 260 |
if (err) goto out; |
3e26c149c
|
261 |
|
10ebffde3
|
262 |
setup_thread_stack(tsk, orig); |
8e7cac798
|
263 |
clear_user_return_notifier(tsk); |
f26f9aff6
|
264 |
clear_tsk_need_resched(tsk); |
7c9f8861e
|
265 266 |
stackend = end_of_stack(tsk); *stackend = STACK_END_MAGIC; /* for overflow detection */ |
1da177e4c
|
267 |
|
0a4254058
|
268 269 270 |
#ifdef CONFIG_CC_STACKPROTECTOR tsk->stack_canary = get_random_int(); #endif |
fb0a685cb
|
271 272 273 274 275 |
/* * One for us, one for whoever does the "release_task()" (usually * parent) */ atomic_set(&tsk->usage, 2); |
6c5c93415
|
276 |
#ifdef CONFIG_BLK_DEV_IO_TRACE |
2056a782f
|
277 |
tsk->btrace_seq = 0; |
6c5c93415
|
278 |
#endif |
a0aa7f68a
|
279 |
tsk->splice_pipe = NULL; |
c6a7f5728
|
280 281 |
account_kernel_stack(ti, 1); |
1da177e4c
|
282 |
return tsk; |
61c4628b5
|
283 284 285 286 287 |
out: free_thread_info(ti); free_task_struct(tsk); return NULL; |
1da177e4c
|
288 289 290 |
} #ifdef CONFIG_MMU |
a39bc5169
|
291 |
static int dup_mmap(struct mm_struct *mm, struct mm_struct *oldmm) |
1da177e4c
|
292 |
{ |
297c5eee3
|
293 |
struct vm_area_struct *mpnt, *tmp, *prev, **pprev; |
1da177e4c
|
294 295 296 297 298 299 |
struct rb_node **rb_link, *rb_parent; int retval; unsigned long charge; struct mempolicy *pol; down_write(&oldmm->mmap_sem); |
ec8c0446b
|
300 |
flush_cache_dup_mm(oldmm); |
ad3394517
|
301 302 303 304 |
/* * Not linked in yet - no deadlock potential: */ down_write_nested(&mm->mmap_sem, SINGLE_DEPTH_NESTING); |
7ee782325
|
305 |
|
1da177e4c
|
306 307 308 309 |
mm->locked_vm = 0; mm->mmap = NULL; mm->mmap_cache = NULL; mm->free_area_cache = oldmm->mmap_base; |
1363c3cd8
|
310 |
mm->cached_hole_size = ~0UL; |
1da177e4c
|
311 |
mm->map_count = 0; |
948942445
|
312 |
cpumask_clear(mm_cpumask(mm)); |
1da177e4c
|
313 314 315 316 |
mm->mm_rb = RB_ROOT; rb_link = &mm->mm_rb.rb_node; rb_parent = NULL; pprev = &mm->mmap; |
f8af4da3b
|
317 318 319 |
retval = ksm_fork(mm, oldmm); if (retval) goto out; |
ba76149f4
|
320 321 322 |
retval = khugepaged_fork(mm, oldmm); if (retval) goto out; |
1da177e4c
|
323 |
|
297c5eee3
|
324 |
prev = NULL; |
fd3e42fcc
|
325 |
for (mpnt = oldmm->mmap; mpnt; mpnt = mpnt->vm_next) { |
1da177e4c
|
326 327 328 |
struct file *file; if (mpnt->vm_flags & VM_DONTCOPY) { |
3b6bfcdb1
|
329 330 |
long pages = vma_pages(mpnt); mm->total_vm -= pages; |
ab50b8ed8
|
331 |
vm_stat_account(mm, mpnt->vm_flags, mpnt->vm_file, |
3b6bfcdb1
|
332 |
-pages); |
1da177e4c
|
333 334 335 336 337 338 339 340 341 |
continue; } charge = 0; if (mpnt->vm_flags & VM_ACCOUNT) { unsigned int len = (mpnt->vm_end - mpnt->vm_start) >> PAGE_SHIFT; if (security_vm_enough_memory(len)) goto fail_nomem; charge = len; } |
e94b17660
|
342 |
tmp = kmem_cache_alloc(vm_area_cachep, GFP_KERNEL); |
1da177e4c
|
343 344 345 |
if (!tmp) goto fail_nomem; *tmp = *mpnt; |
5beb49305
|
346 |
INIT_LIST_HEAD(&tmp->anon_vma_chain); |
846a16bf0
|
347 |
pol = mpol_dup(vma_policy(mpnt)); |
1da177e4c
|
348 349 350 351 |
retval = PTR_ERR(pol); if (IS_ERR(pol)) goto fail_nomem_policy; vma_set_policy(tmp, pol); |
a247c3a97
|
352 |
tmp->vm_mm = mm; |
5beb49305
|
353 354 |
if (anon_vma_fork(tmp, mpnt)) goto fail_nomem_anon_vma_fork; |
1da177e4c
|
355 |
tmp->vm_flags &= ~VM_LOCKED; |
297c5eee3
|
356 |
tmp->vm_next = tmp->vm_prev = NULL; |
1da177e4c
|
357 358 |
file = tmp->vm_file; if (file) { |
f3a43f3f6
|
359 |
struct inode *inode = file->f_path.dentry->d_inode; |
b88ed2059
|
360 |
struct address_space *mapping = file->f_mapping; |
1da177e4c
|
361 362 363 |
get_file(file); if (tmp->vm_flags & VM_DENYWRITE) atomic_dec(&inode->i_writecount); |
3d48ae45e
|
364 |
mutex_lock(&mapping->i_mmap_mutex); |
b88ed2059
|
365 366 |
if (tmp->vm_flags & VM_SHARED) mapping->i_mmap_writable++; |
b88ed2059
|
367 368 |
flush_dcache_mmap_lock(mapping); /* insert tmp into the share list, just after mpnt */ |
1da177e4c
|
369 |
vma_prio_tree_add(tmp, mpnt); |
b88ed2059
|
370 |
flush_dcache_mmap_unlock(mapping); |
3d48ae45e
|
371 |
mutex_unlock(&mapping->i_mmap_mutex); |
1da177e4c
|
372 373 374 |
} /* |
a1e78772d
|
375 376 377 378 379 380 381 382 |
* Clear hugetlb-related page reserves for children. This only * affects MAP_PRIVATE mappings. Faults generated by the child * are not guaranteed to succeed, even if read-only */ if (is_vm_hugetlb_page(tmp)) reset_vma_resv_huge_pages(tmp); /* |
7ee782325
|
383 |
* Link in the new vma and copy the page table entries. |
1da177e4c
|
384 |
*/ |
1da177e4c
|
385 386 |
*pprev = tmp; pprev = &tmp->vm_next; |
297c5eee3
|
387 388 |
tmp->vm_prev = prev; prev = tmp; |
1da177e4c
|
389 390 391 392 393 394 |
__vma_link_rb(mm, tmp, rb_link, rb_parent); rb_link = &tmp->vm_rb.rb_right; rb_parent = &tmp->vm_rb; mm->map_count++; |
0b0db14c5
|
395 |
retval = copy_page_range(mm, oldmm, mpnt); |
1da177e4c
|
396 397 398 399 400 401 402 |
if (tmp->vm_ops && tmp->vm_ops->open) tmp->vm_ops->open(tmp); if (retval) goto out; } |
d6dd61c83
|
403 404 |
/* a new mm has just been created */ arch_dup_mmap(oldmm, mm); |
1da177e4c
|
405 |
retval = 0; |
1da177e4c
|
406 |
out: |
7ee782325
|
407 |
up_write(&mm->mmap_sem); |
fd3e42fcc
|
408 |
flush_tlb_mm(oldmm); |
1da177e4c
|
409 410 |
up_write(&oldmm->mmap_sem); return retval; |
5beb49305
|
411 412 |
fail_nomem_anon_vma_fork: mpol_put(pol); |
1da177e4c
|
413 414 415 416 417 418 419 |
fail_nomem_policy: kmem_cache_free(vm_area_cachep, tmp); fail_nomem: retval = -ENOMEM; vm_unacct_memory(charge); goto out; } |
fb0a685cb
|
420 |
static inline int mm_alloc_pgd(struct mm_struct *mm) |
1da177e4c
|
421 422 423 424 425 426 |
{ mm->pgd = pgd_alloc(mm); if (unlikely(!mm->pgd)) return -ENOMEM; return 0; } |
fb0a685cb
|
427 |
static inline void mm_free_pgd(struct mm_struct *mm) |
1da177e4c
|
428 |
{ |
5e5419734
|
429 |
pgd_free(mm, mm->pgd); |
1da177e4c
|
430 431 432 433 434 435 |
} #else #define dup_mmap(mm, oldmm) (0) #define mm_alloc_pgd(mm) (0) #define mm_free_pgd(mm) #endif /* CONFIG_MMU */ |
23ff44402
|
436 |
__cacheline_aligned_in_smp DEFINE_SPINLOCK(mmlist_lock); |
1da177e4c
|
437 |
|
e94b17660
|
438 |
#define allocate_mm() (kmem_cache_alloc(mm_cachep, GFP_KERNEL)) |
1da177e4c
|
439 |
#define free_mm(mm) (kmem_cache_free(mm_cachep, (mm))) |
4cb0e11b1
|
440 441 442 443 444 445 446 447 448 449 450 |
static unsigned long default_dump_filter = MMF_DUMP_FILTER_DEFAULT; static int __init coredump_filter_setup(char *s) { default_dump_filter = (simple_strtoul(s, NULL, 0) << MMF_DUMP_FILTER_SHIFT) & MMF_DUMP_FILTER_MASK; return 1; } __setup("coredump_filter=", coredump_filter_setup); |
1da177e4c
|
451 |
#include <linux/init_task.h> |
858f09930
|
452 453 454 455 456 457 458 |
static void mm_init_aio(struct mm_struct *mm) { #ifdef CONFIG_AIO spin_lock_init(&mm->ioctx_lock); INIT_HLIST_HEAD(&mm->ioctx_list); #endif } |
fb0a685cb
|
459 |
static struct mm_struct *mm_init(struct mm_struct *mm, struct task_struct *p) |
1da177e4c
|
460 461 462 463 464 |
{ atomic_set(&mm->mm_users, 1); atomic_set(&mm->mm_count, 1); init_rwsem(&mm->mmap_sem); INIT_LIST_HEAD(&mm->mmlist); |
f8af4da3b
|
465 466 |
mm->flags = (current->mm) ? (current->mm->flags & MMF_INIT_MASK) : default_dump_filter; |
999d9fc16
|
467 |
mm->core_state = NULL; |
1da177e4c
|
468 |
mm->nr_ptes = 0; |
d559db086
|
469 |
memset(&mm->rss_stat, 0, sizeof(mm->rss_stat)); |
1da177e4c
|
470 |
spin_lock_init(&mm->page_table_lock); |
1da177e4c
|
471 |
mm->free_area_cache = TASK_UNMAPPED_BASE; |
1363c3cd8
|
472 |
mm->cached_hole_size = ~0UL; |
858f09930
|
473 |
mm_init_aio(mm); |
cf475ad28
|
474 |
mm_init_owner(mm, p); |
3d5992d2a
|
475 |
atomic_set(&mm->oom_disable_count, 0); |
1da177e4c
|
476 477 478 |
if (likely(!mm_alloc_pgd(mm))) { mm->def_flags = 0; |
cddb8a5c1
|
479 |
mmu_notifier_mm_init(mm); |
1da177e4c
|
480 481 |
return mm; } |
78fb74669
|
482 |
|
1da177e4c
|
483 484 485 486 487 488 489 |
free_mm(mm); return NULL; } /* * Allocate and initialize an mm_struct. */ |
fb0a685cb
|
490 |
struct mm_struct *mm_alloc(void) |
1da177e4c
|
491 |
{ |
fb0a685cb
|
492 |
struct mm_struct *mm; |
1da177e4c
|
493 494 |
mm = allocate_mm(); |
de03c72cf
|
495 496 497 498 |
if (!mm) return NULL; memset(mm, 0, sizeof(*mm)); |
6345d24da
|
499 500 |
mm_init_cpumask(mm); return mm_init(mm, current); |
1da177e4c
|
501 502 503 504 505 506 507 |
} /* * Called when the last reference to the mm * is dropped: either by a lazy thread or by * mmput. Free the page directory and the mm. */ |
7ad5b3a50
|
508 |
void __mmdrop(struct mm_struct *mm) |
1da177e4c
|
509 510 511 512 |
{ BUG_ON(mm == &init_mm); mm_free_pgd(mm); destroy_context(mm); |
cddb8a5c1
|
513 |
mmu_notifier_mm_destroy(mm); |
e7a00c45f
|
514 515 516 |
#ifdef CONFIG_TRANSPARENT_HUGEPAGE VM_BUG_ON(mm->pmd_huge_pte); #endif |
1da177e4c
|
517 518 |
free_mm(mm); } |
6d4e4c4fc
|
519 |
EXPORT_SYMBOL_GPL(__mmdrop); |
1da177e4c
|
520 521 522 523 524 525 |
/* * Decrement the use count and release all resources for an mm. */ void mmput(struct mm_struct *mm) { |
0ae26f1b3
|
526 |
might_sleep(); |
1da177e4c
|
527 528 |
if (atomic_dec_and_test(&mm->mm_users)) { exit_aio(mm); |
1c2fb7a4c
|
529 |
ksm_exit(mm); |
ba76149f4
|
530 |
khugepaged_exit(mm); /* must run before exit_mmap */ |
1da177e4c
|
531 |
exit_mmap(mm); |
925d1c401
|
532 |
set_mm_exe_file(mm, NULL); |
1da177e4c
|
533 534 535 536 537 538 |
if (!list_empty(&mm->mmlist)) { spin_lock(&mmlist_lock); list_del(&mm->mmlist); spin_unlock(&mmlist_lock); } put_swap_token(mm); |
801460d0c
|
539 540 |
if (mm->binfmt) module_put(mm->binfmt->module); |
1da177e4c
|
541 542 543 544 |
mmdrop(mm); } } EXPORT_SYMBOL_GPL(mmput); |
386460138
|
545 546 547 548 549 550 551 552 553 554 555 556 557 |
/* * We added or removed a vma mapping the executable. The vmas are only mapped * during exec and are not mapped with the mmap system call. * Callers must hold down_write() on the mm's mmap_sem for these */ void added_exe_file_vma(struct mm_struct *mm) { mm->num_exe_file_vmas++; } void removed_exe_file_vma(struct mm_struct *mm) { mm->num_exe_file_vmas--; |
fb0a685cb
|
558 |
if ((mm->num_exe_file_vmas == 0) && mm->exe_file) { |
386460138
|
559 560 561 562 563 564 565 566 567 568 569 570 571 572 573 574 575 576 577 578 579 580 581 582 583 584 585 586 587 588 589 590 591 592 593 594 |
fput(mm->exe_file); mm->exe_file = NULL; } } void set_mm_exe_file(struct mm_struct *mm, struct file *new_exe_file) { if (new_exe_file) get_file(new_exe_file); if (mm->exe_file) fput(mm->exe_file); mm->exe_file = new_exe_file; mm->num_exe_file_vmas = 0; } struct file *get_mm_exe_file(struct mm_struct *mm) { struct file *exe_file; /* We need mmap_sem to protect against races with removal of * VM_EXECUTABLE vmas */ down_read(&mm->mmap_sem); exe_file = mm->exe_file; if (exe_file) get_file(exe_file); up_read(&mm->mmap_sem); return exe_file; } static void dup_mm_exe_file(struct mm_struct *oldmm, struct mm_struct *newmm) { /* It's safe to write the exe_file pointer without exe_file_lock because * this is called during fork when the task is not yet in /proc */ newmm->exe_file = get_mm_exe_file(oldmm); } |
1da177e4c
|
595 596 597 |
/** * get_task_mm - acquire a reference to the task's mm * |
246bb0b1d
|
598 |
* Returns %NULL if the task has no mm. Checks PF_KTHREAD (meaning |
1da177e4c
|
599 600 601 602 603 604 605 606 607 608 609 610 |
* this kernel workthread has transiently adopted a user mm with use_mm, * to do its AIO) is not set and if so returns a reference to it, after * bumping up the use count. User must release the mm via mmput() * after use. Typically used by /proc and ptrace. */ struct mm_struct *get_task_mm(struct task_struct *task) { struct mm_struct *mm; task_lock(task); mm = task->mm; if (mm) { |
246bb0b1d
|
611 |
if (task->flags & PF_KTHREAD) |
1da177e4c
|
612 613 614 615 616 617 618 619 620 621 622 623 624 625 626 627 628 629 630 631 632 633 634 635 636 |
mm = NULL; else atomic_inc(&mm->mm_users); } task_unlock(task); return mm; } EXPORT_SYMBOL_GPL(get_task_mm); /* Please note the differences between mmput and mm_release. * mmput is called whenever we stop holding onto a mm_struct, * error success whatever. * * mm_release is called after a mm_struct has been removed * from the current process. * * This difference is important for error handling, when we * only half set up a mm_struct for a new process and need to restore * the old one. Because we mmput the new mm_struct before * restoring the old one. . . * Eric Biederman 10 January 1998 */ void mm_release(struct task_struct *tsk, struct mm_struct *mm) { struct completion *vfork_done = tsk->vfork_done; |
8141c7f3e
|
637 638 |
/* Get rid of any futexes when releasing the mm */ #ifdef CONFIG_FUTEX |
fc6b177de
|
639 |
if (unlikely(tsk->robust_list)) { |
8141c7f3e
|
640 |
exit_robust_list(tsk); |
fc6b177de
|
641 642 |
tsk->robust_list = NULL; } |
8141c7f3e
|
643 |
#ifdef CONFIG_COMPAT |
fc6b177de
|
644 |
if (unlikely(tsk->compat_robust_list)) { |
8141c7f3e
|
645 |
compat_exit_robust_list(tsk); |
fc6b177de
|
646 647 |
tsk->compat_robust_list = NULL; } |
8141c7f3e
|
648 |
#endif |
322a2c100
|
649 650 |
if (unlikely(!list_empty(&tsk->pi_state_list))) exit_pi_state_list(tsk); |
8141c7f3e
|
651 |
#endif |
1da177e4c
|
652 653 654 655 656 657 658 659 |
/* Get rid of any cached register state */ deactivate_mm(tsk, mm); /* notify parent sleeping on vfork() */ if (vfork_done) { tsk->vfork_done = NULL; complete(vfork_done); } |
fec1d0115
|
660 661 662 663 664 665 666 |
/* * If we're exiting normally, clear a user-space tid field if * requested. We leave this alone when dying by signal, to leave * the value intact in a core dump, and to save the unnecessary * trouble otherwise. Userland only wants this done for a sys_exit. */ |
9c8a8228d
|
667 668 669 670 671 672 673 674 675 676 677 |
if (tsk->clear_child_tid) { if (!(tsk->flags & PF_SIGNALED) && atomic_read(&mm->mm_users) > 1) { /* * We don't check the error code - if userspace has * not set up a proper pointer then tough luck. */ put_user(0, tsk->clear_child_tid); sys_futex(tsk->clear_child_tid, FUTEX_WAKE, 1, NULL, NULL, 0); } |
1da177e4c
|
678 |
tsk->clear_child_tid = NULL; |
1da177e4c
|
679 680 |
} } |
a0a7ec308
|
681 682 683 684 |
/* * Allocate a new mm structure and copy contents from the * mm structure of the passed in task structure. */ |
402b08622
|
685 |
struct mm_struct *dup_mm(struct task_struct *tsk) |
a0a7ec308
|
686 687 688 689 690 691 692 693 694 695 696 697 |
{ struct mm_struct *mm, *oldmm = current->mm; int err; if (!oldmm) return NULL; mm = allocate_mm(); if (!mm) goto fail_nomem; memcpy(mm, oldmm, sizeof(*mm)); |
6345d24da
|
698 |
mm_init_cpumask(mm); |
a0a7ec308
|
699 |
|
7602bdf2f
|
700 701 702 |
/* Initializing for Swap token stuff */ mm->token_priority = 0; mm->last_interval = 0; |
e7a00c45f
|
703 704 705 |
#ifdef CONFIG_TRANSPARENT_HUGEPAGE mm->pmd_huge_pte = NULL; #endif |
78fb74669
|
706 |
if (!mm_init(mm, tsk)) |
a0a7ec308
|
707 708 709 710 |
goto fail_nomem; if (init_new_context(tsk, mm)) goto fail_nocontext; |
925d1c401
|
711 |
dup_mm_exe_file(oldmm, mm); |
a0a7ec308
|
712 713 714 715 716 717 |
err = dup_mmap(mm, oldmm); if (err) goto free_pt; mm->hiwater_rss = get_mm_rss(mm); mm->hiwater_vm = mm->total_vm; |
801460d0c
|
718 719 |
if (mm->binfmt && !try_module_get(mm->binfmt->module)) goto free_pt; |
a0a7ec308
|
720 721 722 |
return mm; free_pt: |
801460d0c
|
723 724 |
/* don't put binfmt in mmput, we haven't got module yet */ mm->binfmt = NULL; |
a0a7ec308
|
725 726 727 728 729 730 731 732 733 734 735 736 737 738 |
mmput(mm); fail_nomem: return NULL; fail_nocontext: /* * If init_new_context() failed, we cannot use mmput() to free the mm * because it calls destroy_context() */ mm_free_pgd(mm); free_mm(mm); return NULL; } |
fb0a685cb
|
739 |
static int copy_mm(unsigned long clone_flags, struct task_struct *tsk) |
1da177e4c
|
740 |
{ |
fb0a685cb
|
741 |
struct mm_struct *mm, *oldmm; |
1da177e4c
|
742 743 744 745 |
int retval; tsk->min_flt = tsk->maj_flt = 0; tsk->nvcsw = tsk->nivcsw = 0; |
17406b82d
|
746 747 748 |
#ifdef CONFIG_DETECT_HUNG_TASK tsk->last_switch_count = tsk->nvcsw + tsk->nivcsw; #endif |
1da177e4c
|
749 750 751 752 753 754 755 756 757 758 759 760 761 762 763 764 |
tsk->mm = NULL; tsk->active_mm = NULL; /* * Are we cloning a kernel thread? * * We need to steal a active VM for that.. */ oldmm = current->mm; if (!oldmm) return 0; if (clone_flags & CLONE_VM) { atomic_inc(&oldmm->mm_users); mm = oldmm; |
1da177e4c
|
765 766 767 768 |
goto good_mm; } retval = -ENOMEM; |
a0a7ec308
|
769 |
mm = dup_mm(tsk); |
1da177e4c
|
770 771 |
if (!mm) goto fail_nomem; |
1da177e4c
|
772 |
good_mm: |
7602bdf2f
|
773 774 775 |
/* Initializing for Swap token stuff */ mm->token_priority = 0; mm->last_interval = 0; |
3d5992d2a
|
776 777 |
if (tsk->signal->oom_score_adj == OOM_SCORE_ADJ_MIN) atomic_inc(&mm->oom_disable_count); |
7602bdf2f
|
778 |
|
1da177e4c
|
779 780 781 |
tsk->mm = mm; tsk->active_mm = mm; return 0; |
1da177e4c
|
782 783 |
fail_nomem: return retval; |
1da177e4c
|
784 |
} |
a39bc5169
|
785 |
static int copy_fs(unsigned long clone_flags, struct task_struct *tsk) |
1da177e4c
|
786 |
{ |
498052bba
|
787 |
struct fs_struct *fs = current->fs; |
1da177e4c
|
788 |
if (clone_flags & CLONE_FS) { |
498052bba
|
789 |
/* tsk->fs is already what we want */ |
2a4419b5b
|
790 |
spin_lock(&fs->lock); |
498052bba
|
791 |
if (fs->in_exec) { |
2a4419b5b
|
792 |
spin_unlock(&fs->lock); |
498052bba
|
793 794 795 |
return -EAGAIN; } fs->users++; |
2a4419b5b
|
796 |
spin_unlock(&fs->lock); |
1da177e4c
|
797 798 |
return 0; } |
498052bba
|
799 |
tsk->fs = copy_fs_struct(fs); |
1da177e4c
|
800 801 802 803 |
if (!tsk->fs) return -ENOMEM; return 0; } |
fb0a685cb
|
804 |
static int copy_files(unsigned long clone_flags, struct task_struct *tsk) |
a016f3389
|
805 806 807 808 809 810 811 812 813 814 815 816 817 818 819 |
{ struct files_struct *oldf, *newf; int error = 0; /* * A background process may not have any files ... */ oldf = current->files; if (!oldf) goto out; if (clone_flags & CLONE_FILES) { atomic_inc(&oldf->count); goto out; } |
a016f3389
|
820 821 822 823 824 825 826 827 828 |
newf = dup_fd(oldf, &error); if (!newf) goto out; tsk->files = newf; error = 0; out: return error; } |
fadad878c
|
829 |
static int copy_io(unsigned long clone_flags, struct task_struct *tsk) |
fd0928df9
|
830 831 832 833 834 835 |
{ #ifdef CONFIG_BLOCK struct io_context *ioc = current->io_context; if (!ioc) return 0; |
fadad878c
|
836 837 838 839 840 841 842 843 |
/* * Share io context with parent, if CLONE_IO is set */ if (clone_flags & CLONE_IO) { tsk->io_context = ioc_task_link(ioc); if (unlikely(!tsk->io_context)) return -ENOMEM; } else if (ioprio_valid(ioc->ioprio)) { |
fd0928df9
|
844 845 846 |
tsk->io_context = alloc_io_context(GFP_KERNEL, -1); if (unlikely(!tsk->io_context)) return -ENOMEM; |
fd0928df9
|
847 848 849 850 851 |
tsk->io_context->ioprio = ioc->ioprio; } #endif return 0; } |
a39bc5169
|
852 |
static int copy_sighand(unsigned long clone_flags, struct task_struct *tsk) |
1da177e4c
|
853 854 |
{ struct sighand_struct *sig; |
60348802e
|
855 |
if (clone_flags & CLONE_SIGHAND) { |
1da177e4c
|
856 857 858 859 |
atomic_inc(¤t->sighand->count); return 0; } sig = kmem_cache_alloc(sighand_cachep, GFP_KERNEL); |
e56d09031
|
860 |
rcu_assign_pointer(tsk->sighand, sig); |
1da177e4c
|
861 862 |
if (!sig) return -ENOMEM; |
1da177e4c
|
863 864 865 866 |
atomic_set(&sig->count, 1); memcpy(sig->action, current->sighand->action, sizeof(sig->action)); return 0; } |
a7e5328a0
|
867 |
void __cleanup_sighand(struct sighand_struct *sighand) |
c81addc9d
|
868 |
{ |
c81addc9d
|
869 870 871 |
if (atomic_dec_and_test(&sighand->count)) kmem_cache_free(sighand_cachep, sighand); } |
f06febc96
|
872 873 874 875 876 877 |
/* * Initialize POSIX timer handling for a thread group. */ static void posix_cpu_timers_init_group(struct signal_struct *sig) { |
78d7d407b
|
878 |
unsigned long cpu_limit; |
f06febc96
|
879 880 |
/* Thread group counters. */ thread_group_cputime_init(sig); |
78d7d407b
|
881 882 883 |
cpu_limit = ACCESS_ONCE(sig->rlim[RLIMIT_CPU].rlim_cur); if (cpu_limit != RLIM_INFINITY) { sig->cputime_expires.prof_exp = secs_to_cputime(cpu_limit); |
6279a751f
|
884 885 |
sig->cputimer.running = 1; } |
f06febc96
|
886 887 888 889 890 |
/* The timer lists. */ INIT_LIST_HEAD(&sig->cpu_timers[0]); INIT_LIST_HEAD(&sig->cpu_timers[1]); INIT_LIST_HEAD(&sig->cpu_timers[2]); } |
a39bc5169
|
891 |
static int copy_signal(unsigned long clone_flags, struct task_struct *tsk) |
1da177e4c
|
892 893 |
{ struct signal_struct *sig; |
1da177e4c
|
894 |
|
4ab6c0833
|
895 |
if (clone_flags & CLONE_THREAD) |
490dea45d
|
896 |
return 0; |
490dea45d
|
897 |
|
a56704ef6
|
898 |
sig = kmem_cache_zalloc(signal_cachep, GFP_KERNEL); |
1da177e4c
|
899 900 901 |
tsk->signal = sig; if (!sig) return -ENOMEM; |
b3ac022cb
|
902 |
sig->nr_threads = 1; |
1da177e4c
|
903 |
atomic_set(&sig->live, 1); |
b3ac022cb
|
904 |
atomic_set(&sig->sigcnt, 1); |
1da177e4c
|
905 |
init_waitqueue_head(&sig->wait_chldexit); |
b3bfa0cba
|
906 907 |
if (clone_flags & CLONE_NEWPID) sig->flags |= SIGNAL_UNKILLABLE; |
db51aeccd
|
908 |
sig->curr_target = tsk; |
1da177e4c
|
909 910 |
init_sigpending(&sig->shared_pending); INIT_LIST_HEAD(&sig->posix_timers); |
c9cb2e3d7
|
911 |
hrtimer_init(&sig->real_timer, CLOCK_MONOTONIC, HRTIMER_MODE_REL); |
1da177e4c
|
912 |
sig->real_timer.function = it_real_fn; |
1da177e4c
|
913 |
|
1da177e4c
|
914 915 916 |
task_lock(current->group_leader); memcpy(sig->rlim, current->signal->rlim, sizeof sig->rlim); task_unlock(current->group_leader); |
6279a751f
|
917 |
posix_cpu_timers_init_group(sig); |
522ed7767
|
918 |
tty_audit_fork(sig); |
5091faa44
|
919 |
sched_autogroup_fork(sig); |
522ed7767
|
920 |
|
4714d1d32
|
921 922 923 |
#ifdef CONFIG_CGROUPS init_rwsem(&sig->threadgroup_fork_lock); #endif |
28b83c519
|
924 |
sig->oom_adj = current->signal->oom_adj; |
a63d83f42
|
925 |
sig->oom_score_adj = current->signal->oom_score_adj; |
dabb16f63
|
926 |
sig->oom_score_adj_min = current->signal->oom_score_adj_min; |
28b83c519
|
927 |
|
9b1bf12d5
|
928 |
mutex_init(&sig->cred_guard_mutex); |
1da177e4c
|
929 930 |
return 0; } |
a39bc5169
|
931 |
static void copy_flags(unsigned long clone_flags, struct task_struct *p) |
1da177e4c
|
932 933 |
{ unsigned long new_flags = p->flags; |
21aa9af03
|
934 |
new_flags &= ~(PF_SUPERPRIV | PF_WQ_WORKER); |
1da177e4c
|
935 |
new_flags |= PF_FORKNOEXEC; |
09a05394f
|
936 |
new_flags |= PF_STARTING; |
1da177e4c
|
937 |
p->flags = new_flags; |
2e1318956
|
938 |
clear_freeze_flag(p); |
1da177e4c
|
939 |
} |
17da2bd90
|
940 |
SYSCALL_DEFINE1(set_tid_address, int __user *, tidptr) |
1da177e4c
|
941 942 |
{ current->clear_child_tid = tidptr; |
b488893a3
|
943 |
return task_pid_vnr(current); |
1da177e4c
|
944 |
} |
a39bc5169
|
945 |
static void rt_mutex_init_task(struct task_struct *p) |
23f78d4a0
|
946 |
{ |
1d6154825
|
947 |
raw_spin_lock_init(&p->pi_lock); |
e29e175b0
|
948 |
#ifdef CONFIG_RT_MUTEXES |
732375c6a
|
949 |
plist_head_init(&p->pi_waiters); |
23f78d4a0
|
950 |
p->pi_blocked_on = NULL; |
23f78d4a0
|
951 952 |
#endif } |
cf475ad28
|
953 954 955 956 957 958 |
#ifdef CONFIG_MM_OWNER void mm_init_owner(struct mm_struct *mm, struct task_struct *p) { mm->owner = p; } #endif /* CONFIG_MM_OWNER */ |
1da177e4c
|
959 |
/* |
f06febc96
|
960 961 962 963 964 965 966 967 968 969 970 971 972 |
* Initialize POSIX timer handling for a single task. */ static void posix_cpu_timers_init(struct task_struct *tsk) { tsk->cputime_expires.prof_exp = cputime_zero; tsk->cputime_expires.virt_exp = cputime_zero; tsk->cputime_expires.sched_exp = 0; INIT_LIST_HEAD(&tsk->cpu_timers[0]); INIT_LIST_HEAD(&tsk->cpu_timers[1]); INIT_LIST_HEAD(&tsk->cpu_timers[2]); } /* |
1da177e4c
|
973 974 975 976 977 978 979 |
* This creates a new process as a copy of the old one, * but does not actually start it yet. * * It copies the registers, and all the appropriate * parts of the process environment (as per the clone * flags). The actual kick-off is left to the caller. */ |
36c8b5868
|
980 981 982 983 |
static struct task_struct *copy_process(unsigned long clone_flags, unsigned long stack_start, struct pt_regs *regs, unsigned long stack_size, |
36c8b5868
|
984 |
int __user *child_tidptr, |
09a05394f
|
985 986 |
struct pid *pid, int trace) |
1da177e4c
|
987 988 |
{ int retval; |
a24efe62d
|
989 |
struct task_struct *p; |
b4f48b636
|
990 |
int cgroup_callbacks_done = 0; |
1da177e4c
|
991 992 993 994 995 996 997 998 999 1000 1001 1002 1003 1004 1005 1006 1007 1008 |
if ((clone_flags & (CLONE_NEWNS|CLONE_FS)) == (CLONE_NEWNS|CLONE_FS)) return ERR_PTR(-EINVAL); /* * Thread groups must share signals as well, and detached threads * can only be started up within the thread group. */ if ((clone_flags & CLONE_THREAD) && !(clone_flags & CLONE_SIGHAND)) return ERR_PTR(-EINVAL); /* * Shared signal handlers imply shared VM. By way of the above, * thread groups also imply shared VM. Blocking this case allows * for various simplifications in other code. */ if ((clone_flags & CLONE_SIGHAND) && !(clone_flags & CLONE_VM)) return ERR_PTR(-EINVAL); |
123be07b0
|
1009 1010 1011 1012 1013 1014 1015 1016 1017 |
/* * Siblings of global init remain as zombies on exit since they are * not reaped by their parent (swapper). To solve this and to avoid * multi-rooted process trees, prevent global and container-inits * from creating siblings. */ if ((clone_flags & CLONE_PARENT) && current->signal->flags & SIGNAL_UNKILLABLE) return ERR_PTR(-EINVAL); |
1da177e4c
|
1018 1019 1020 1021 1022 1023 1024 1025 |
retval = security_task_create(clone_flags); if (retval) goto fork_out; retval = -ENOMEM; p = dup_task_struct(current); if (!p) goto fork_out; |
f7e8b616e
|
1026 |
ftrace_graph_init_task(p); |
bea493a03
|
1027 |
rt_mutex_init_task(p); |
d12c1a379
|
1028 |
#ifdef CONFIG_PROVE_LOCKING |
de30a2b35
|
1029 1030 1031 |
DEBUG_LOCKS_WARN_ON(!p->hardirqs_enabled); DEBUG_LOCKS_WARN_ON(!p->softirqs_enabled); #endif |
1da177e4c
|
1032 |
retval = -EAGAIN; |
3b11a1dec
|
1033 |
if (atomic_read(&p->real_cred->user->processes) >= |
78d7d407b
|
1034 |
task_rlimit(p, RLIMIT_NPROC)) { |
1da177e4c
|
1035 |
if (!capable(CAP_SYS_ADMIN) && !capable(CAP_SYS_RESOURCE) && |
18b6e0414
|
1036 |
p->real_cred->user != INIT_USER) |
1da177e4c
|
1037 1038 |
goto bad_fork_free; } |
72fa59970
|
1039 |
current->flags &= ~PF_NPROC_EXCEEDED; |
1da177e4c
|
1040 |
|
f1752eec6
|
1041 1042 1043 |
retval = copy_creds(p, clone_flags); if (retval < 0) goto bad_fork_free; |
1da177e4c
|
1044 1045 1046 1047 1048 1049 |
/* * If multiple threads are within copy_process(), then this check * triggers too late. This doesn't hurt, the check is only there * to stop root fork bombs. */ |
04ec93fe9
|
1050 |
retval = -EAGAIN; |
1da177e4c
|
1051 1052 |
if (nr_threads >= max_threads) goto bad_fork_cleanup_count; |
a1261f546
|
1053 |
if (!try_module_get(task_thread_info(p)->exec_domain->module)) |
1da177e4c
|
1054 |
goto bad_fork_cleanup_count; |
1da177e4c
|
1055 |
p->did_exec = 0; |
ca74e92b4
|
1056 |
delayacct_tsk_init(p); /* Must remain after dup_task_struct() */ |
1da177e4c
|
1057 |
copy_flags(clone_flags, p); |
1da177e4c
|
1058 1059 |
INIT_LIST_HEAD(&p->children); INIT_LIST_HEAD(&p->sibling); |
f41d911f8
|
1060 |
rcu_copy_process(p); |
1da177e4c
|
1061 1062 |
p->vfork_done = NULL; spin_lock_init(&p->alloc_lock); |
1da177e4c
|
1063 |
|
1da177e4c
|
1064 1065 1066 1067 |
init_sigpending(&p->pending); p->utime = cputime_zero; p->stime = cputime_zero; |
9ac52315d
|
1068 |
p->gtime = cputime_zero; |
c66f08be7
|
1069 1070 |
p->utimescaled = cputime_zero; p->stimescaled = cputime_zero; |
d99ca3b97
|
1071 |
#ifndef CONFIG_VIRT_CPU_ACCOUNTING |
73a2bcb0e
|
1072 |
p->prev_utime = cputime_zero; |
9301899be
|
1073 |
p->prev_stime = cputime_zero; |
d99ca3b97
|
1074 |
#endif |
a3a2e76c7
|
1075 1076 1077 |
#if defined(SPLIT_RSS_COUNTING) memset(&p->rss_stat, 0, sizeof(p->rss_stat)); #endif |
172ba844a
|
1078 |
|
6976675d9
|
1079 |
p->default_timer_slack_ns = current->timer_slack_ns; |
5995477ab
|
1080 |
task_io_accounting_init(&p->ioac); |
1da177e4c
|
1081 |
acct_clear_integrals(p); |
f06febc96
|
1082 |
posix_cpu_timers_init(p); |
1da177e4c
|
1083 |
|
1da177e4c
|
1084 |
do_posix_clock_monotonic_gettime(&p->start_time); |
924b42d5a
|
1085 1086 |
p->real_start_time = p->start_time; monotonic_to_bootbased(&p->real_start_time); |
1da177e4c
|
1087 |
p->io_context = NULL; |
1da177e4c
|
1088 |
p->audit_context = NULL; |
4714d1d32
|
1089 1090 |
if (clone_flags & CLONE_THREAD) threadgroup_fork_read_lock(current); |
b4f48b636
|
1091 |
cgroup_fork(p); |
1da177e4c
|
1092 |
#ifdef CONFIG_NUMA |
846a16bf0
|
1093 |
p->mempolicy = mpol_dup(p->mempolicy); |
fb0a685cb
|
1094 1095 1096 1097 1098 |
if (IS_ERR(p->mempolicy)) { retval = PTR_ERR(p->mempolicy); p->mempolicy = NULL; goto bad_fork_cleanup_cgroup; } |
c61afb181
|
1099 |
mpol_fix_fork_child_flag(p); |
1da177e4c
|
1100 |
#endif |
778d3b0ff
|
1101 1102 1103 1104 |
#ifdef CONFIG_CPUSETS p->cpuset_mem_spread_rotor = NUMA_NO_NODE; p->cpuset_slab_spread_rotor = NUMA_NO_NODE; #endif |
de30a2b35
|
1105 1106 |
#ifdef CONFIG_TRACE_IRQFLAGS p->irq_events = 0; |
b36e4758d
|
1107 1108 1109 |
#ifdef __ARCH_WANT_INTERRUPTS_ON_CTXSW p->hardirqs_enabled = 1; #else |
de30a2b35
|
1110 |
p->hardirqs_enabled = 0; |
b36e4758d
|
1111 |
#endif |
de30a2b35
|
1112 1113 1114 1115 1116 1117 1118 1119 1120 1121 1122 1123 |
p->hardirq_enable_ip = 0; p->hardirq_enable_event = 0; p->hardirq_disable_ip = _THIS_IP_; p->hardirq_disable_event = 0; p->softirqs_enabled = 1; p->softirq_enable_ip = _THIS_IP_; p->softirq_enable_event = 0; p->softirq_disable_ip = 0; p->softirq_disable_event = 0; p->hardirq_context = 0; p->softirq_context = 0; #endif |
fbb9ce953
|
1124 1125 1126 1127 1128 |
#ifdef CONFIG_LOCKDEP p->lockdep_depth = 0; /* no locks held yet */ p->curr_chain_key = 0; p->lockdep_recursion = 0; #endif |
1da177e4c
|
1129 |
|
408894ee4
|
1130 1131 1132 |
#ifdef CONFIG_DEBUG_MUTEXES p->blocked_on = NULL; /* not blocked yet */ #endif |
569b846df
|
1133 1134 1135 1136 |
#ifdef CONFIG_CGROUP_MEM_RES_CTLR p->memcg_batch.do_batch = 0; p->memcg_batch.memcg = NULL; #endif |
0f4814065
|
1137 |
|
3c90e6e99
|
1138 |
/* Perform scheduler related setup. Assign this task to a CPU. */ |
3e51e3edf
|
1139 |
sched_fork(p); |
6ab423e0e
|
1140 |
|
cdd6c482c
|
1141 |
retval = perf_event_init_task(p); |
6ab423e0e
|
1142 1143 |
if (retval) goto bad_fork_cleanup_policy; |
fb0a685cb
|
1144 1145 |
retval = audit_alloc(p); if (retval) |
f1752eec6
|
1146 |
goto bad_fork_cleanup_policy; |
1da177e4c
|
1147 |
/* copy all the process information */ |
fb0a685cb
|
1148 1149 |
retval = copy_semundo(clone_flags, p); if (retval) |
1da177e4c
|
1150 |
goto bad_fork_cleanup_audit; |
fb0a685cb
|
1151 1152 |
retval = copy_files(clone_flags, p); if (retval) |
1da177e4c
|
1153 |
goto bad_fork_cleanup_semundo; |
fb0a685cb
|
1154 1155 |
retval = copy_fs(clone_flags, p); if (retval) |
1da177e4c
|
1156 |
goto bad_fork_cleanup_files; |
fb0a685cb
|
1157 1158 |
retval = copy_sighand(clone_flags, p); if (retval) |
1da177e4c
|
1159 |
goto bad_fork_cleanup_fs; |
fb0a685cb
|
1160 1161 |
retval = copy_signal(clone_flags, p); if (retval) |
1da177e4c
|
1162 |
goto bad_fork_cleanup_sighand; |
fb0a685cb
|
1163 1164 |
retval = copy_mm(clone_flags, p); if (retval) |
1da177e4c
|
1165 |
goto bad_fork_cleanup_signal; |
fb0a685cb
|
1166 1167 |
retval = copy_namespaces(clone_flags, p); if (retval) |
d84f4f992
|
1168 |
goto bad_fork_cleanup_mm; |
fb0a685cb
|
1169 1170 |
retval = copy_io(clone_flags, p); if (retval) |
fd0928df9
|
1171 |
goto bad_fork_cleanup_namespaces; |
6f2c55b84
|
1172 |
retval = copy_thread(clone_flags, stack_start, stack_size, p, regs); |
1da177e4c
|
1173 |
if (retval) |
fd0928df9
|
1174 |
goto bad_fork_cleanup_io; |
1da177e4c
|
1175 |
|
425fb2b4b
|
1176 1177 |
if (pid != &init_struct_pid) { retval = -ENOMEM; |
61bce0f13
|
1178 |
pid = alloc_pid(p->nsproxy->pid_ns); |
425fb2b4b
|
1179 |
if (!pid) |
fd0928df9
|
1180 |
goto bad_fork_cleanup_io; |
425fb2b4b
|
1181 1182 1183 1184 1185 1186 |
} p->pid = pid_nr(pid); p->tgid = p->pid; if (clone_flags & CLONE_THREAD) p->tgid = current->tgid; |
1da177e4c
|
1187 1188 1189 1190 |
p->set_child_tid = (clone_flags & CLONE_CHILD_SETTID) ? child_tidptr : NULL; /* * Clear TID on mm_release()? */ |
fb0a685cb
|
1191 |
p->clear_child_tid = (clone_flags & CLONE_CHILD_CLEARTID) ? child_tidptr : NULL; |
73c101011
|
1192 1193 1194 |
#ifdef CONFIG_BLOCK p->plug = NULL; #endif |
42b2dd0a0
|
1195 |
#ifdef CONFIG_FUTEX |
8f17d3a50
|
1196 1197 1198 1199 |
p->robust_list = NULL; #ifdef CONFIG_COMPAT p->compat_robust_list = NULL; #endif |
c87e2837b
|
1200 1201 |
INIT_LIST_HEAD(&p->pi_state_list); p->pi_state_cache = NULL; |
42b2dd0a0
|
1202 |
#endif |
1da177e4c
|
1203 |
/* |
f9a3879ab
|
1204 1205 1206 1207 1208 1209 |
* sigaltstack should be cleared when sharing the same VM */ if ((clone_flags & (CLONE_VM|CLONE_VFORK)) == CLONE_VM) p->sas_ss_sp = p->sas_ss_size = 0; /* |
6580807da
|
1210 1211 |
* Syscall tracing and stepping should be turned off in the * child regardless of CLONE_PTRACE. |
1da177e4c
|
1212 |
*/ |
6580807da
|
1213 |
user_disable_single_step(p); |
1da177e4c
|
1214 |
clear_tsk_thread_flag(p, TIF_SYSCALL_TRACE); |
ed75e8d58
|
1215 1216 1217 |
#ifdef TIF_SYSCALL_EMU clear_tsk_thread_flag(p, TIF_SYSCALL_EMU); #endif |
9745512ce
|
1218 |
clear_all_latency_tracing(p); |
1da177e4c
|
1219 |
|
1da177e4c
|
1220 1221 1222 1223 |
/* ok, now we should be set up.. */ p->exit_signal = (clone_flags & CLONE_THREAD) ? -1 : (clone_flags & CSIGNAL); p->pdeath_signal = 0; p->exit_state = 0; |
1da177e4c
|
1224 1225 1226 1227 1228 |
/* * Ok, make it visible to the rest of the system. * We dont wake it up yet. */ p->group_leader = p; |
47e65328a
|
1229 |
INIT_LIST_HEAD(&p->thread_group); |
1da177e4c
|
1230 |
|
b4f48b636
|
1231 1232 1233 1234 1235 |
/* Now that the task is set up, run cgroup callbacks if * necessary. We need to run them before the task is visible * on the tasklist. */ cgroup_fork_callbacks(p); cgroup_callbacks_done = 1; |
1da177e4c
|
1236 1237 |
/* Need tasklist lock for parent etc handling! */ write_lock_irq(&tasklist_lock); |
1da177e4c
|
1238 |
/* CLONE_PARENT re-uses the old parent */ |
2d5516cbb
|
1239 |
if (clone_flags & (CLONE_PARENT|CLONE_THREAD)) { |
1da177e4c
|
1240 |
p->real_parent = current->real_parent; |
2d5516cbb
|
1241 1242 |
p->parent_exec_id = current->parent_exec_id; } else { |
1da177e4c
|
1243 |
p->real_parent = current; |
2d5516cbb
|
1244 1245 |
p->parent_exec_id = current->self_exec_id; } |
1da177e4c
|
1246 |
|
3f17da699
|
1247 |
spin_lock(¤t->sighand->siglock); |
4a2c7a783
|
1248 1249 1250 1251 1252 1253 1254 1255 |
/* * Process group and session signals need to be delivered to just the * parent before the fork or both the parent and the child after the * fork. Restart if a signal comes in before we add the new process to * it's process group. * A fatal signal pending means that current will exit, so the new * thread can't slip out of an OOM kill (or normal SIGKILL). |
fb0a685cb
|
1256 |
*/ |
23ff44402
|
1257 |
recalc_sigpending(); |
4a2c7a783
|
1258 1259 1260 1261 |
if (signal_pending(current)) { spin_unlock(¤t->sighand->siglock); write_unlock_irq(&tasklist_lock); retval = -ERESTARTNOINTR; |
f7e8b616e
|
1262 |
goto bad_fork_free_pid; |
4a2c7a783
|
1263 |
} |
1da177e4c
|
1264 |
if (clone_flags & CLONE_THREAD) { |
b3ac022cb
|
1265 |
current->signal->nr_threads++; |
4ab6c0833
|
1266 |
atomic_inc(¤t->signal->live); |
b3ac022cb
|
1267 |
atomic_inc(¤t->signal->sigcnt); |
1da177e4c
|
1268 |
p->group_leader = current->group_leader; |
47e65328a
|
1269 |
list_add_tail_rcu(&p->thread_group, &p->group_leader->thread_group); |
1da177e4c
|
1270 |
} |
73b9ebfe1
|
1271 |
if (likely(p->pid)) { |
4b9d33e6d
|
1272 |
ptrace_init_task(p, (clone_flags & CLONE_PTRACE) || trace); |
73b9ebfe1
|
1273 1274 |
if (thread_group_leader(p)) { |
45a68628d
|
1275 |
if (is_child_reaper(pid)) |
30e49c263
|
1276 |
p->nsproxy->pid_ns->child_reaper = p; |
73b9ebfe1
|
1277 |
|
fea9d1755
|
1278 |
p->signal->leader_pid = pid; |
9c9f4ded9
|
1279 |
p->signal->tty = tty_kref_get(current->signal->tty); |
5cd17569f
|
1280 1281 |
attach_pid(p, PIDTYPE_PGID, task_pgrp(current)); attach_pid(p, PIDTYPE_SID, task_session(current)); |
9cd80bbb0
|
1282 |
list_add_tail(&p->sibling, &p->real_parent->children); |
5e85d4abe
|
1283 |
list_add_tail_rcu(&p->tasks, &init_task.tasks); |
909ea9646
|
1284 |
__this_cpu_inc(process_counts); |
73b9ebfe1
|
1285 |
} |
85868995d
|
1286 |
attach_pid(p, PIDTYPE_PID, pid); |
73b9ebfe1
|
1287 |
nr_threads++; |
1da177e4c
|
1288 |
} |
1da177e4c
|
1289 |
total_forks++; |
3f17da699
|
1290 |
spin_unlock(¤t->sighand->siglock); |
1da177e4c
|
1291 |
write_unlock_irq(&tasklist_lock); |
c13cf856c
|
1292 |
proc_fork_connector(p); |
817929ec2
|
1293 |
cgroup_post_fork(p); |
4714d1d32
|
1294 1295 |
if (clone_flags & CLONE_THREAD) threadgroup_fork_read_unlock(current); |
cdd6c482c
|
1296 |
perf_event_fork(p); |
1da177e4c
|
1297 |
return p; |
425fb2b4b
|
1298 1299 1300 |
bad_fork_free_pid: if (pid != &init_struct_pid) free_pid(pid); |
fd0928df9
|
1301 |
bad_fork_cleanup_io: |
b69f22920
|
1302 1303 |
if (p->io_context) exit_io_context(p); |
ab516013a
|
1304 |
bad_fork_cleanup_namespaces: |
444f378b2
|
1305 |
exit_task_namespaces(p); |
1da177e4c
|
1306 |
bad_fork_cleanup_mm: |
3d5992d2a
|
1307 1308 1309 1310 1311 |
if (p->mm) { task_lock(p); if (p->signal->oom_score_adj == OOM_SCORE_ADJ_MIN) atomic_dec(&p->mm->oom_disable_count); task_unlock(p); |
1da177e4c
|
1312 |
mmput(p->mm); |
3d5992d2a
|
1313 |
} |
1da177e4c
|
1314 |
bad_fork_cleanup_signal: |
4ab6c0833
|
1315 |
if (!(clone_flags & CLONE_THREAD)) |
1c5354de9
|
1316 |
free_signal_struct(p->signal); |
1da177e4c
|
1317 |
bad_fork_cleanup_sighand: |
a7e5328a0
|
1318 |
__cleanup_sighand(p->sighand); |
1da177e4c
|
1319 1320 1321 1322 1323 1324 1325 1326 |
bad_fork_cleanup_fs: exit_fs(p); /* blocking */ bad_fork_cleanup_files: exit_files(p); /* blocking */ bad_fork_cleanup_semundo: exit_sem(p); bad_fork_cleanup_audit: audit_free(p); |
1da177e4c
|
1327 |
bad_fork_cleanup_policy: |
cdd6c482c
|
1328 |
perf_event_free_task(p); |
1da177e4c
|
1329 |
#ifdef CONFIG_NUMA |
f0be3d32b
|
1330 |
mpol_put(p->mempolicy); |
b4f48b636
|
1331 |
bad_fork_cleanup_cgroup: |
1da177e4c
|
1332 |
#endif |
4714d1d32
|
1333 1334 |
if (clone_flags & CLONE_THREAD) threadgroup_fork_read_unlock(current); |
b4f48b636
|
1335 |
cgroup_exit(p, cgroup_callbacks_done); |
35df17c57
|
1336 |
delayacct_tsk_free(p); |
a1261f546
|
1337 |
module_put(task_thread_info(p)->exec_domain->module); |
1da177e4c
|
1338 |
bad_fork_cleanup_count: |
d84f4f992
|
1339 |
atomic_dec(&p->cred->user->processes); |
e0e817392
|
1340 |
exit_creds(p); |
1da177e4c
|
1341 1342 |
bad_fork_free: free_task(p); |
fe7d37d1f
|
1343 1344 |
fork_out: return ERR_PTR(retval); |
1da177e4c
|
1345 |
} |
6b2fb3c65
|
1346 |
noinline struct pt_regs * __cpuinit __attribute__((weak)) idle_regs(struct pt_regs *regs) |
1da177e4c
|
1347 1348 1349 1350 |
{ memset(regs, 0, sizeof(struct pt_regs)); return regs; } |
f106eee10
|
1351 1352 1353 1354 1355 1356 1357 1358 1359 |
static inline void init_idle_pids(struct pid_link *links) { enum pid_type type; for (type = PIDTYPE_PID; type < PIDTYPE_MAX; ++type) { INIT_HLIST_NODE(&links[type].node); /* not really needed */ links[type].pid = &init_struct_pid; } } |
9abcf40b1
|
1360 |
struct task_struct * __cpuinit fork_idle(int cpu) |
1da177e4c
|
1361 |
{ |
36c8b5868
|
1362 |
struct task_struct *task; |
1da177e4c
|
1363 |
struct pt_regs regs; |
30e49c263
|
1364 |
task = copy_process(CLONE_VM, 0, idle_regs(®s), 0, NULL, |
09a05394f
|
1365 |
&init_struct_pid, 0); |
f106eee10
|
1366 1367 |
if (!IS_ERR(task)) { init_idle_pids(task->pids); |
753ca4f31
|
1368 |
init_idle(task, cpu); |
f106eee10
|
1369 |
} |
73b9ebfe1
|
1370 |
|
1da177e4c
|
1371 1372 |
return task; } |
1da177e4c
|
1373 1374 1375 1376 1377 1378 1379 1380 1381 1382 1383 1384 1385 1386 1387 |
/* * Ok, this is the main fork-routine. * * It copies the process, and if successful kick-starts * it and waits for it to finish using the VM if required. */ long do_fork(unsigned long clone_flags, unsigned long stack_start, struct pt_regs *regs, unsigned long stack_size, int __user *parent_tidptr, int __user *child_tidptr) { struct task_struct *p; int trace = 0; |
92476d7fc
|
1388 |
long nr; |
1da177e4c
|
1389 |
|
bdff746a3
|
1390 |
/* |
18b6e0414
|
1391 1392 1393 1394 1395 1396 1397 1398 1399 |
* Do some preliminary argument and permissions checking before we * actually start allocating stuff */ if (clone_flags & CLONE_NEWUSER) { if (clone_flags & CLONE_THREAD) return -EINVAL; /* hopefully this check will go away when userns support is * complete */ |
7657d9049
|
1400 1401 |
if (!capable(CAP_SYS_ADMIN) || !capable(CAP_SETUID) || !capable(CAP_SETGID)) |
18b6e0414
|
1402 1403 1404 1405 |
return -EPERM; } /* |
4b9d33e6d
|
1406 1407 1408 1409 |
* Determine whether and which event to report to ptracer. When * called from kernel_thread or CLONE_UNTRACED is explicitly * requested, no event is reported; otherwise, report if the event * for the type of forking is enabled. |
09a05394f
|
1410 |
*/ |
4b9d33e6d
|
1411 1412 1413 1414 1415 1416 1417 1418 1419 1420 1421 |
if (likely(user_mode(regs)) && !(clone_flags & CLONE_UNTRACED)) { if (clone_flags & CLONE_VFORK) trace = PTRACE_EVENT_VFORK; else if ((clone_flags & CSIGNAL) != SIGCHLD) trace = PTRACE_EVENT_CLONE; else trace = PTRACE_EVENT_FORK; if (likely(!ptrace_event_enabled(current, trace))) trace = 0; } |
1da177e4c
|
1422 |
|
a6f5e0637
|
1423 |
p = copy_process(clone_flags, stack_start, regs, stack_size, |
09a05394f
|
1424 |
child_tidptr, NULL, trace); |
1da177e4c
|
1425 1426 1427 1428 1429 1430 |
/* * Do this prior waking up the new thread - the thread pointer * might get invalid after that point, if the thread exits quickly. */ if (!IS_ERR(p)) { struct completion vfork; |
0a16b6075
|
1431 |
trace_sched_process_fork(current, p); |
6c5f3e7b4
|
1432 |
nr = task_pid_vnr(p); |
30e49c263
|
1433 1434 1435 |
if (clone_flags & CLONE_PARENT_SETTID) put_user(nr, parent_tidptr); |
a6f5e0637
|
1436 |
|
1da177e4c
|
1437 1438 1439 1440 |
if (clone_flags & CLONE_VFORK) { p->vfork_done = &vfork; init_completion(&vfork); } |
a64e64944
|
1441 |
audit_finish_fork(p); |
4b9d33e6d
|
1442 1443 |
/* |
09a05394f
|
1444 1445 |
* We set PF_STARTING at creation in case tracing wants to * use this to distinguish a fully live task from one that |
4b9d33e6d
|
1446 1447 |
* hasn't finished SIGSTOP raising yet. Now we clear it * and set the child going. |
09a05394f
|
1448 1449 |
*/ p->flags &= ~PF_STARTING; |
3e51e3edf
|
1450 |
wake_up_new_task(p); |
1da177e4c
|
1451 |
|
4b9d33e6d
|
1452 1453 1454 |
/* forking complete and child started to run, tell ptracer */ if (unlikely(trace)) ptrace_event(trace, nr); |
09a05394f
|
1455 |
|
1da177e4c
|
1456 |
if (clone_flags & CLONE_VFORK) { |
ba96a0c88
|
1457 |
freezer_do_not_count(); |
1da177e4c
|
1458 |
wait_for_completion(&vfork); |
ba96a0c88
|
1459 |
freezer_count(); |
a288eecce
|
1460 |
ptrace_event(PTRACE_EVENT_VFORK_DONE, nr); |
1da177e4c
|
1461 1462 |
} } else { |
92476d7fc
|
1463 |
nr = PTR_ERR(p); |
1da177e4c
|
1464 |
} |
92476d7fc
|
1465 |
return nr; |
1da177e4c
|
1466 |
} |
5fd63b308
|
1467 1468 1469 |
#ifndef ARCH_MIN_MMSTRUCT_ALIGN #define ARCH_MIN_MMSTRUCT_ALIGN 0 #endif |
51cc50685
|
1470 |
static void sighand_ctor(void *data) |
aa1757f90
|
1471 1472 |
{ struct sighand_struct *sighand = data; |
a35afb830
|
1473 |
spin_lock_init(&sighand->siglock); |
b8fceee17
|
1474 |
init_waitqueue_head(&sighand->signalfd_wqh); |
aa1757f90
|
1475 |
} |
1da177e4c
|
1476 1477 1478 1479 |
void __init proc_caches_init(void) { sighand_cachep = kmem_cache_create("sighand_cache", sizeof(struct sighand_struct), 0, |
2dff44052
|
1480 1481 |
SLAB_HWCACHE_ALIGN|SLAB_PANIC|SLAB_DESTROY_BY_RCU| SLAB_NOTRACK, sighand_ctor); |
1da177e4c
|
1482 1483 |
signal_cachep = kmem_cache_create("signal_cache", sizeof(struct signal_struct), 0, |
2dff44052
|
1484 |
SLAB_HWCACHE_ALIGN|SLAB_PANIC|SLAB_NOTRACK, NULL); |
20c2df83d
|
1485 |
files_cachep = kmem_cache_create("files_cache", |
1da177e4c
|
1486 |
sizeof(struct files_struct), 0, |
2dff44052
|
1487 |
SLAB_HWCACHE_ALIGN|SLAB_PANIC|SLAB_NOTRACK, NULL); |
20c2df83d
|
1488 |
fs_cachep = kmem_cache_create("fs_cache", |
1da177e4c
|
1489 |
sizeof(struct fs_struct), 0, |
2dff44052
|
1490 |
SLAB_HWCACHE_ALIGN|SLAB_PANIC|SLAB_NOTRACK, NULL); |
6345d24da
|
1491 1492 1493 1494 1495 1496 1497 |
/* * FIXME! The "sizeof(struct mm_struct)" currently includes the * whole struct cpumask for the OFFSTACK case. We could change * this to *only* allocate as much of it as required by the * maximum number of CPU's we can ever have. The cpumask_allocation * is at the end of the structure, exactly for that reason. */ |
1da177e4c
|
1498 |
mm_cachep = kmem_cache_create("mm_struct", |
5fd63b308
|
1499 |
sizeof(struct mm_struct), ARCH_MIN_MMSTRUCT_ALIGN, |
2dff44052
|
1500 |
SLAB_HWCACHE_ALIGN|SLAB_PANIC|SLAB_NOTRACK, NULL); |
33e5d7697
|
1501 |
vm_area_cachep = KMEM_CACHE(vm_area_struct, SLAB_PANIC); |
8feae1311
|
1502 |
mmap_init(); |
665771939
|
1503 |
nsproxy_cache_init(); |
1da177e4c
|
1504 |
} |
cf2e340f4
|
1505 |
|
cf2e340f4
|
1506 |
/* |
9bfb23fc4
|
1507 |
* Check constraints on flags passed to the unshare system call. |
cf2e340f4
|
1508 |
*/ |
9bfb23fc4
|
1509 |
static int check_unshare_flags(unsigned long unshare_flags) |
cf2e340f4
|
1510 |
{ |
9bfb23fc4
|
1511 1512 1513 1514 |
if (unshare_flags & ~(CLONE_THREAD|CLONE_FS|CLONE_NEWNS|CLONE_SIGHAND| CLONE_VM|CLONE_FILES|CLONE_SYSVSEM| CLONE_NEWUTS|CLONE_NEWIPC|CLONE_NEWNET)) return -EINVAL; |
cf2e340f4
|
1515 |
/* |
9bfb23fc4
|
1516 1517 1518 |
* Not implemented, but pretend it works if there is nothing to * unshare. Note that unsharing CLONE_THREAD or CLONE_SIGHAND * needs to unshare vm. |
cf2e340f4
|
1519 |
*/ |
9bfb23fc4
|
1520 1521 1522 1523 1524 |
if (unshare_flags & (CLONE_THREAD | CLONE_SIGHAND | CLONE_VM)) { /* FIXME: get_task_mm() increments ->mm_users */ if (atomic_read(¤t->mm->mm_users) > 1) return -EINVAL; } |
cf2e340f4
|
1525 1526 1527 1528 1529 |
return 0; } /* |
99d1419d9
|
1530 |
* Unshare the filesystem structure if it is being shared |
cf2e340f4
|
1531 1532 1533 1534 |
*/ static int unshare_fs(unsigned long unshare_flags, struct fs_struct **new_fsp) { struct fs_struct *fs = current->fs; |
498052bba
|
1535 1536 1537 1538 1539 1540 1541 1542 1543 1544 |
if (!(unshare_flags & CLONE_FS) || !fs) return 0; /* don't need lock here; in the worst case we'll do useless copy */ if (fs->users == 1) return 0; *new_fsp = copy_fs_struct(fs); if (!*new_fsp) return -ENOMEM; |
cf2e340f4
|
1545 1546 1547 1548 1549 |
return 0; } /* |
a016f3389
|
1550 |
* Unshare file descriptor table if it is being shared |
cf2e340f4
|
1551 1552 1553 1554 |
*/ static int unshare_fd(unsigned long unshare_flags, struct files_struct **new_fdp) { struct files_struct *fd = current->files; |
a016f3389
|
1555 |
int error = 0; |
cf2e340f4
|
1556 1557 |
if ((unshare_flags & CLONE_FILES) && |
a016f3389
|
1558 1559 1560 1561 1562 |
(fd && atomic_read(&fd->count) > 1)) { *new_fdp = dup_fd(fd, &error); if (!*new_fdp) return error; } |
cf2e340f4
|
1563 1564 1565 1566 1567 |
return 0; } /* |
cf2e340f4
|
1568 1569 1570 1571 1572 1573 1574 |
* unshare allows a process to 'unshare' part of the process * context which was originally shared using clone. copy_* * functions used by do_fork() cannot be used here directly * because they modify an inactive task_struct that is being * constructed. Here we are modifying the current, active, * task_struct. */ |
6559eed8c
|
1575 |
SYSCALL_DEFINE1(unshare, unsigned long, unshare_flags) |
cf2e340f4
|
1576 |
{ |
cf2e340f4
|
1577 |
struct fs_struct *fs, *new_fs = NULL; |
cf2e340f4
|
1578 |
struct files_struct *fd, *new_fd = NULL; |
cf7b708c8
|
1579 |
struct nsproxy *new_nsproxy = NULL; |
9edff4ab1
|
1580 |
int do_sysvsem = 0; |
9bfb23fc4
|
1581 |
int err; |
cf2e340f4
|
1582 |
|
9bfb23fc4
|
1583 1584 |
err = check_unshare_flags(unshare_flags); if (err) |
06f9d4f94
|
1585 |
goto bad_unshare_out; |
6013f67fc
|
1586 |
/* |
9bfb23fc4
|
1587 1588 1589 1590 1591 |
* If unsharing namespace, must also unshare filesystem information. */ if (unshare_flags & CLONE_NEWNS) unshare_flags |= CLONE_FS; /* |
6013f67fc
|
1592 1593 1594 1595 1596 |
* CLONE_NEWIPC must also detach from the undolist: after switching * to a new ipc namespace, the semaphore arrays from the old * namespace are unreachable. */ if (unshare_flags & (CLONE_NEWIPC|CLONE_SYSVSEM)) |
9edff4ab1
|
1597 |
do_sysvsem = 1; |
fb0a685cb
|
1598 1599 |
err = unshare_fs(unshare_flags, &new_fs); if (err) |
9bfb23fc4
|
1600 |
goto bad_unshare_out; |
fb0a685cb
|
1601 1602 |
err = unshare_fd(unshare_flags, &new_fd); if (err) |
9bfb23fc4
|
1603 |
goto bad_unshare_cleanup_fs; |
fb0a685cb
|
1604 1605 |
err = unshare_nsproxy_namespaces(unshare_flags, &new_nsproxy, new_fs); if (err) |
9edff4ab1
|
1606 |
goto bad_unshare_cleanup_fd; |
c0b2fc316
|
1607 |
|
9bfb23fc4
|
1608 |
if (new_fs || new_fd || do_sysvsem || new_nsproxy) { |
9edff4ab1
|
1609 1610 1611 1612 1613 1614 |
if (do_sysvsem) { /* * CLONE_SYSVSEM is equivalent to sys_exit(). */ exit_sem(current); } |
ab516013a
|
1615 |
|
c0b2fc316
|
1616 |
if (new_nsproxy) { |
cf7b708c8
|
1617 1618 |
switch_task_namespaces(current, new_nsproxy); new_nsproxy = NULL; |
c0b2fc316
|
1619 |
} |
cf2e340f4
|
1620 |
|
cf7b708c8
|
1621 |
task_lock(current); |
cf2e340f4
|
1622 1623 |
if (new_fs) { fs = current->fs; |
2a4419b5b
|
1624 |
spin_lock(&fs->lock); |
cf2e340f4
|
1625 |
current->fs = new_fs; |
498052bba
|
1626 1627 1628 1629 |
if (--fs->users) new_fs = NULL; else new_fs = fs; |
2a4419b5b
|
1630 |
spin_unlock(&fs->lock); |
cf2e340f4
|
1631 |
} |
cf2e340f4
|
1632 1633 1634 1635 1636 1637 1638 1639 |
if (new_fd) { fd = current->files; current->files = new_fd; new_fd = fd; } task_unlock(current); } |
c0b2fc316
|
1640 |
if (new_nsproxy) |
444f378b2
|
1641 |
put_nsproxy(new_nsproxy); |
c0b2fc316
|
1642 |
|
cf2e340f4
|
1643 1644 1645 |
bad_unshare_cleanup_fd: if (new_fd) put_files_struct(new_fd); |
cf2e340f4
|
1646 1647 |
bad_unshare_cleanup_fs: if (new_fs) |
498052bba
|
1648 |
free_fs_struct(new_fs); |
cf2e340f4
|
1649 |
|
cf2e340f4
|
1650 1651 1652 |
bad_unshare_out: return err; } |
3b1253880
|
1653 1654 1655 1656 1657 1658 1659 1660 1661 1662 |
/* * Helper to unshare the files of the current task. * We don't want to expose copy_files internals to * the exec layer of the kernel. */ int unshare_files(struct files_struct **displaced) { struct task_struct *task = current; |
50704516f
|
1663 |
struct files_struct *copy = NULL; |
3b1253880
|
1664 1665 1666 1667 1668 1669 1670 1671 1672 1673 1674 1675 1676 |
int error; error = unshare_fd(CLONE_FILES, ©); if (error || !copy) { *displaced = NULL; return error; } *displaced = task->files; task_lock(task); task->files = copy; task_unlock(task); return 0; } |