Linux 3.10.54
[GitHub/mt8127/android_kernel_alcatel_ttab.git] / kernel / exit.c
CommitLineData
1da177e4
LT
1/*
2 * linux/kernel/exit.c
3 *
4 * Copyright (C) 1991, 1992 Linus Torvalds
5 */
6
1da177e4
LT
7#include <linux/mm.h>
8#include <linux/slab.h>
9#include <linux/interrupt.h>
1da177e4 10#include <linux/module.h>
c59ede7b 11#include <linux/capability.h>
1da177e4
LT
12#include <linux/completion.h>
13#include <linux/personality.h>
14#include <linux/tty.h>
da9cbc87 15#include <linux/iocontext.h>
1da177e4
LT
16#include <linux/key.h>
17#include <linux/security.h>
18#include <linux/cpu.h>
19#include <linux/acct.h>
8f0ab514 20#include <linux/tsacct_kern.h>
1da177e4 21#include <linux/file.h>
9f3acc31 22#include <linux/fdtable.h>
80d26af8 23#include <linux/freezer.h>
1da177e4 24#include <linux/binfmts.h>
ab516013 25#include <linux/nsproxy.h>
84d73786 26#include <linux/pid_namespace.h>
1da177e4
LT
27#include <linux/ptrace.h>
28#include <linux/profile.h>
29#include <linux/mount.h>
30#include <linux/proc_fs.h>
49d769d5 31#include <linux/kthread.h>
1da177e4 32#include <linux/mempolicy.h>
c757249a 33#include <linux/taskstats_kern.h>
ca74e92b 34#include <linux/delayacct.h>
b4f48b63 35#include <linux/cgroup.h>
1da177e4 36#include <linux/syscalls.h>
7ed20e1a 37#include <linux/signal.h>
6a14c5c9 38#include <linux/posix-timers.h>
9f46080c 39#include <linux/cn_proc.h>
de5097c2 40#include <linux/mutex.h>
0771dfef 41#include <linux/futex.h>
b92ce558 42#include <linux/pipe_fs_i.h>
fa84cb93 43#include <linux/audit.h> /* for audit_free() */
83cc5ed3 44#include <linux/resource.h>
0d67a46d 45#include <linux/blkdev.h>
6eaeeaba 46#include <linux/task_io_accounting_ops.h>
30199f5a 47#include <linux/tracehook.h>
5ad4e53b 48#include <linux/fs_struct.h>
d84f4f99 49#include <linux/init_task.h>
cdd6c482 50#include <linux/perf_event.h>
ad8d75ff 51#include <trace/events/sched.h>
24f1e32c 52#include <linux/hw_breakpoint.h>
3d5992d2 53#include <linux/oom.h>
54848d73 54#include <linux/writeback.h>
40401530 55#include <linux/shm.h>
1da177e4
LT
56
57#include <asm/uaccess.h>
58#include <asm/unistd.h>
59#include <asm/pgtable.h>
60#include <asm/mmu_context.h>
61
408b664a
AB
62static void exit_mm(struct task_struct * tsk);
63
d40e48e0 64static void __unhash_process(struct task_struct *p, bool group_dead)
1da177e4
LT
65{
66 nr_threads--;
50d75f8d 67 detach_pid(p, PIDTYPE_PID);
d40e48e0 68 if (group_dead) {
1da177e4
LT
69 detach_pid(p, PIDTYPE_PGID);
70 detach_pid(p, PIDTYPE_SID);
c97d9893 71
5e85d4ab 72 list_del_rcu(&p->tasks);
9cd80bbb 73 list_del_init(&p->sibling);
909ea964 74 __this_cpu_dec(process_counts);
1da177e4 75 }
47e65328 76 list_del_rcu(&p->thread_group);
1da177e4
LT
77}
78
6a14c5c9
ON
79/*
80 * This function expects the tasklist_lock write-locked.
81 */
82static void __exit_signal(struct task_struct *tsk)
83{
84 struct signal_struct *sig = tsk->signal;
d40e48e0 85 bool group_dead = thread_group_leader(tsk);
6a14c5c9 86 struct sighand_struct *sighand;
4ada856f 87 struct tty_struct *uninitialized_var(tty);
6fac4829 88 cputime_t utime, stime;
6a14c5c9 89
d11c563d 90 sighand = rcu_dereference_check(tsk->sighand,
db1466b3 91 lockdep_tasklist_lock_is_held());
6a14c5c9
ON
92 spin_lock(&sighand->siglock);
93
94 posix_cpu_timers_exit(tsk);
d40e48e0 95 if (group_dead) {
6a14c5c9 96 posix_cpu_timers_exit_group(tsk);
4ada856f
ON
97 tty = sig->tty;
98 sig->tty = NULL;
4a599942 99 } else {
e0a70217
ON
100 /*
101 * This can only happen if the caller is de_thread().
102 * FIXME: this is the temporary hack, we should teach
103 * posix-cpu-timers to handle this case correctly.
104 */
105 if (unlikely(has_group_leader_pid(tsk)))
106 posix_cpu_timers_exit_group(tsk);
107
6a14c5c9
ON
108 /*
109 * If there is any task waiting for the group exit
110 * then notify it:
111 */
d344193a 112 if (sig->notify_count > 0 && !--sig->notify_count)
6a14c5c9 113 wake_up_process(sig->group_exit_task);
6db840fa 114
6a14c5c9
ON
115 if (tsk == sig->curr_target)
116 sig->curr_target = next_thread(tsk);
117 /*
118 * Accumulate here the counters for all threads but the
119 * group leader as they die, so they can be added into
120 * the process-wide totals when those are taken.
121 * The group leader stays around as a zombie as long
122 * as there are other threads. When it gets reaped,
123 * the exit.c code will add its counts into these totals.
124 * We won't ever get here for the group leader, since it
125 * will have been the last reference on the signal_struct.
126 */
6fac4829
FW
127 task_cputime(tsk, &utime, &stime);
128 sig->utime += utime;
129 sig->stime += stime;
130 sig->gtime += task_gtime(tsk);
6a14c5c9
ON
131 sig->min_flt += tsk->min_flt;
132 sig->maj_flt += tsk->maj_flt;
133 sig->nvcsw += tsk->nvcsw;
134 sig->nivcsw += tsk->nivcsw;
6eaeeaba
ED
135 sig->inblock += task_io_get_inblock(tsk);
136 sig->oublock += task_io_get_oublock(tsk);
5995477a 137 task_io_accounting_add(&sig->ioac, &tsk->ioac);
32bd671d 138 sig->sum_sched_runtime += tsk->se.sum_exec_runtime;
6a14c5c9
ON
139 }
140
b3ac022c 141 sig->nr_threads--;
d40e48e0 142 __unhash_process(tsk, group_dead);
5876700c 143
da7978b0
ON
144 /*
145 * Do this under ->siglock, we can race with another thread
146 * doing sigqueue_free() if we have SIGQUEUE_PREALLOC signals.
147 */
148 flush_sigqueue(&tsk->pending);
a7e5328a 149 tsk->sighand = NULL;
6a14c5c9 150 spin_unlock(&sighand->siglock);
6a14c5c9 151
a7e5328a 152 __cleanup_sighand(sighand);
6a14c5c9 153 clear_tsk_thread_flag(tsk,TIF_SIGPENDING);
d40e48e0 154 if (group_dead) {
6a14c5c9 155 flush_sigqueue(&sig->shared_pending);
4ada856f 156 tty_kref_put(tty);
6a14c5c9
ON
157 }
158}
159
8c7904a0
EB
160static void delayed_put_task_struct(struct rcu_head *rhp)
161{
0a16b607
MD
162 struct task_struct *tsk = container_of(rhp, struct task_struct, rcu);
163
4e231c79 164 perf_event_delayed_put(tsk);
0a16b607
MD
165 trace_sched_process_free(tsk);
166 put_task_struct(tsk);
8c7904a0
EB
167}
168
f470021a 169
1da177e4
LT
170void release_task(struct task_struct * p)
171{
36c8b586 172 struct task_struct *leader;
1da177e4 173 int zap_leader;
1f09f974 174repeat:
c69e8d9c 175 /* don't need to get the RCU readlock here - the process is dead and
d11c563d
PM
176 * can't be modifying its own credentials. But shut RCU-lockdep up */
177 rcu_read_lock();
c69e8d9c 178 atomic_dec(&__task_cred(p)->user->processes);
d11c563d 179 rcu_read_unlock();
c69e8d9c 180
60347f67 181 proc_flush_task(p);
0203026b 182
1da177e4 183 write_lock_irq(&tasklist_lock);
a288eecc 184 ptrace_release_task(p);
1da177e4 185 __exit_signal(p);
35f5cad8 186
1da177e4
LT
187 /*
188 * If we are the last non-leader member of the thread
189 * group, and the leader is zombie, then notify the
190 * group leader's parent process. (if it wants notification.)
191 */
192 zap_leader = 0;
193 leader = p->group_leader;
194 if (leader != p && thread_group_empty(leader) && leader->exit_state == EXIT_ZOMBIE) {
1da177e4
LT
195 /*
196 * If we were the last child thread and the leader has
197 * exited already, and the leader's parent ignores SIGCHLD,
198 * then we are the one who should release the leader.
dae33574 199 */
86773473 200 zap_leader = do_notify_parent(leader, leader->exit_signal);
dae33574
RM
201 if (zap_leader)
202 leader->exit_state = EXIT_DEAD;
1da177e4
LT
203 }
204
1da177e4 205 write_unlock_irq(&tasklist_lock);
1da177e4 206 release_thread(p);
8c7904a0 207 call_rcu(&p->rcu, delayed_put_task_struct);
1da177e4
LT
208
209 p = leader;
210 if (unlikely(zap_leader))
211 goto repeat;
212}
213
1da177e4
LT
214/*
215 * This checks not only the pgrp, but falls back on the pid if no
216 * satisfactory pgrp is found. I dunno - gdb doesn't work correctly
217 * without this...
04a2e6a5
EB
218 *
219 * The caller must hold rcu lock or the tasklist lock.
1da177e4 220 */
04a2e6a5 221struct pid *session_of_pgrp(struct pid *pgrp)
1da177e4
LT
222{
223 struct task_struct *p;
04a2e6a5 224 struct pid *sid = NULL;
62dfb554 225
04a2e6a5 226 p = pid_task(pgrp, PIDTYPE_PGID);
62dfb554 227 if (p == NULL)
04a2e6a5 228 p = pid_task(pgrp, PIDTYPE_PID);
62dfb554 229 if (p != NULL)
04a2e6a5 230 sid = task_session(p);
62dfb554 231
1da177e4
LT
232 return sid;
233}
234
235/*
236 * Determine if a process group is "orphaned", according to the POSIX
237 * definition in 2.2.2.52. Orphaned process groups are not to be affected
238 * by terminal-generated stop signals. Newly orphaned process groups are
239 * to receive a SIGHUP and a SIGCONT.
240 *
241 * "I ask you, have you ever known what it is to be an orphan?"
242 */
0475ac08 243static int will_become_orphaned_pgrp(struct pid *pgrp, struct task_struct *ignored_task)
1da177e4
LT
244{
245 struct task_struct *p;
1da177e4 246
0475ac08 247 do_each_pid_task(pgrp, PIDTYPE_PGID, p) {
05e83df6
ON
248 if ((p == ignored_task) ||
249 (p->exit_state && thread_group_empty(p)) ||
250 is_global_init(p->real_parent))
1da177e4 251 continue;
05e83df6 252
0475ac08 253 if (task_pgrp(p->real_parent) != pgrp &&
05e83df6
ON
254 task_session(p->real_parent) == task_session(p))
255 return 0;
0475ac08 256 } while_each_pid_task(pgrp, PIDTYPE_PGID, p);
05e83df6
ON
257
258 return 1;
1da177e4
LT
259}
260
3e7cd6c4 261int is_current_pgrp_orphaned(void)
1da177e4
LT
262{
263 int retval;
264
265 read_lock(&tasklist_lock);
3e7cd6c4 266 retval = will_become_orphaned_pgrp(task_pgrp(current), NULL);
1da177e4
LT
267 read_unlock(&tasklist_lock);
268
269 return retval;
270}
271
961c4675 272static bool has_stopped_jobs(struct pid *pgrp)
1da177e4 273{
1da177e4
LT
274 struct task_struct *p;
275
0475ac08 276 do_each_pid_task(pgrp, PIDTYPE_PGID, p) {
961c4675
ON
277 if (p->signal->flags & SIGNAL_STOP_STOPPED)
278 return true;
0475ac08 279 } while_each_pid_task(pgrp, PIDTYPE_PGID, p);
961c4675
ON
280
281 return false;
1da177e4
LT
282}
283
f49ee505
ON
284/*
285 * Check to see if any process groups have become orphaned as
286 * a result of our exiting, and if they have any stopped jobs,
287 * send them a SIGHUP and then a SIGCONT. (POSIX 3.2.2.2)
288 */
289static void
290kill_orphaned_pgrp(struct task_struct *tsk, struct task_struct *parent)
291{
292 struct pid *pgrp = task_pgrp(tsk);
293 struct task_struct *ignored_task = tsk;
294
295 if (!parent)
296 /* exit: our father is in a different pgrp than
297 * we are and we were the only connection outside.
298 */
299 parent = tsk->real_parent;
300 else
301 /* reparent: our child is in a different pgrp than
302 * we are, and it was the only connection outside.
303 */
304 ignored_task = NULL;
305
306 if (task_pgrp(parent) != pgrp &&
307 task_session(parent) == task_session(tsk) &&
308 will_become_orphaned_pgrp(pgrp, ignored_task) &&
309 has_stopped_jobs(pgrp)) {
310 __kill_pgrp_info(SIGHUP, SEND_SIG_PRIV, pgrp);
311 __kill_pgrp_info(SIGCONT, SEND_SIG_PRIV, pgrp);
312 }
313}
314
8520d7c7 315void __set_special_pids(struct pid *pid)
1da177e4 316{
e19f247a 317 struct task_struct *curr = current->group_leader;
1da177e4 318
0d0df599 319 if (task_session(curr) != pid)
7d8da096 320 change_pid(curr, PIDTYPE_SID, pid);
1b0f7ffd
ON
321
322 if (task_pgrp(curr) != pid)
7d8da096 323 change_pid(curr, PIDTYPE_PGID, pid);
1da177e4
LT
324}
325
1da177e4 326/*
87245135
ON
327 * Let kernel threads use this to say that they allow a certain signal.
328 * Must not be used if kthread was cloned with CLONE_SIGHAND.
1da177e4
LT
329 */
330int allow_signal(int sig)
331{
7ed20e1a 332 if (!valid_signal(sig) || sig < 1)
1da177e4
LT
333 return -EINVAL;
334
335 spin_lock_irq(&current->sighand->siglock);
87245135 336 /* This is only needed for daemonize()'ed kthreads */
1da177e4 337 sigdelset(&current->blocked, sig);
87245135
ON
338 /*
339 * Kernel threads handle their own signals. Let the signal code
340 * know it'll be handled, so that they don't get converted to
341 * SIGKILL or just silently dropped.
342 */
343 current->sighand->action[(sig)-1].sa.sa_handler = (void __user *)2;
1da177e4
LT
344 recalc_sigpending();
345 spin_unlock_irq(&current->sighand->siglock);
346 return 0;
347}
348
349EXPORT_SYMBOL(allow_signal);
350
351int disallow_signal(int sig)
352{
7ed20e1a 353 if (!valid_signal(sig) || sig < 1)
1da177e4
LT
354 return -EINVAL;
355
356 spin_lock_irq(&current->sighand->siglock);
10ab825b 357 current->sighand->action[(sig)-1].sa.sa_handler = SIG_IGN;
1da177e4
LT
358 recalc_sigpending();
359 spin_unlock_irq(&current->sighand->siglock);
360 return 0;
361}
362
363EXPORT_SYMBOL(disallow_signal);
364
cf475ad2
BS
365#ifdef CONFIG_MM_OWNER
366/*
733eda7a 367 * A task is exiting. If it owned this mm, find a new owner for the mm.
cf475ad2 368 */
cf475ad2
BS
369void mm_update_next_owner(struct mm_struct *mm)
370{
371 struct task_struct *c, *g, *p = current;
372
373retry:
733eda7a
KH
374 /*
375 * If the exiting or execing task is not the owner, it's
376 * someone else's problem.
377 */
378 if (mm->owner != p)
cf475ad2 379 return;
733eda7a
KH
380 /*
381 * The current owner is exiting/execing and there are no other
382 * candidates. Do not leave the mm pointing to a possibly
383 * freed task structure.
384 */
385 if (atomic_read(&mm->mm_users) <= 1) {
386 mm->owner = NULL;
387 return;
388 }
cf475ad2
BS
389
390 read_lock(&tasklist_lock);
391 /*
392 * Search in the children
393 */
394 list_for_each_entry(c, &p->children, sibling) {
395 if (c->mm == mm)
396 goto assign_new_owner;
397 }
398
399 /*
400 * Search in the siblings
401 */
dea33cfd 402 list_for_each_entry(c, &p->real_parent->children, sibling) {
cf475ad2
BS
403 if (c->mm == mm)
404 goto assign_new_owner;
405 }
406
407 /*
408 * Search through everything else. We should not get
409 * here often
410 */
411 do_each_thread(g, c) {
412 if (c->mm == mm)
413 goto assign_new_owner;
414 } while_each_thread(g, c);
415
416 read_unlock(&tasklist_lock);
31a78f23
BS
417 /*
418 * We found no owner yet mm_users > 1: this implies that we are
419 * most likely racing with swapoff (try_to_unuse()) or /proc or
e5991371 420 * ptrace or page migration (get_task_mm()). Mark owner as NULL.
31a78f23 421 */
31a78f23 422 mm->owner = NULL;
cf475ad2
BS
423 return;
424
425assign_new_owner:
426 BUG_ON(c == p);
427 get_task_struct(c);
428 /*
429 * The task_lock protects c->mm from changing.
430 * We always want mm->owner->mm == mm
431 */
432 task_lock(c);
e5991371
HD
433 /*
434 * Delay read_unlock() till we have the task_lock()
435 * to ensure that c does not slip away underneath us
436 */
437 read_unlock(&tasklist_lock);
cf475ad2
BS
438 if (c->mm != mm) {
439 task_unlock(c);
440 put_task_struct(c);
441 goto retry;
442 }
cf475ad2
BS
443 mm->owner = c;
444 task_unlock(c);
445 put_task_struct(c);
446}
447#endif /* CONFIG_MM_OWNER */
448
1da177e4
LT
449/*
450 * Turn us into a lazy TLB process if we
451 * aren't already..
452 */
408b664a 453static void exit_mm(struct task_struct * tsk)
1da177e4
LT
454{
455 struct mm_struct *mm = tsk->mm;
b564daf8 456 struct core_state *core_state;
1da177e4 457
48d212a2 458 mm_release(tsk, mm);
1da177e4
LT
459 if (!mm)
460 return;
4fe7efdb 461 sync_mm_rss(mm);
1da177e4
LT
462 /*
463 * Serialize with any possible pending coredump.
999d9fc1 464 * We must hold mmap_sem around checking core_state
1da177e4 465 * and clearing tsk->mm. The core-inducing thread
999d9fc1 466 * will increment ->nr_threads for each thread in the
1da177e4
LT
467 * group with ->mm != NULL.
468 */
469 down_read(&mm->mmap_sem);
b564daf8
ON
470 core_state = mm->core_state;
471 if (core_state) {
472 struct core_thread self;
1da177e4 473 up_read(&mm->mmap_sem);
1da177e4 474
b564daf8
ON
475 self.task = tsk;
476 self.next = xchg(&core_state->dumper.next, &self);
477 /*
478 * Implies mb(), the result of xchg() must be visible
479 * to core_state->dumper.
480 */
481 if (atomic_dec_and_test(&core_state->nr_threads))
482 complete(&core_state->startup);
1da177e4 483
a94e2d40
ON
484 for (;;) {
485 set_task_state(tsk, TASK_UNINTERRUPTIBLE);
486 if (!self.task) /* see coredump_finish() */
487 break;
80d26af8 488 freezable_schedule();
a94e2d40
ON
489 }
490 __set_task_state(tsk, TASK_RUNNING);
1da177e4
LT
491 down_read(&mm->mmap_sem);
492 }
493 atomic_inc(&mm->mm_count);
125e1874 494 BUG_ON(mm != tsk->active_mm);
1da177e4
LT
495 /* more a memory barrier than a real lock */
496 task_lock(tsk);
497 tsk->mm = NULL;
498 up_read(&mm->mmap_sem);
499 enter_lazy_tlb(mm, current);
500 task_unlock(tsk);
cf475ad2 501 mm_update_next_owner(mm);
1da177e4
LT
502 mmput(mm);
503}
504
1da177e4 505/*
ebec18a6
LP
506 * When we die, we re-parent all our children, and try to:
507 * 1. give them to another thread in our thread group, if such a member exists
508 * 2. give it to the first ancestor process which prctl'd itself as a
509 * child_subreaper for its children (like a service manager)
510 * 3. give it to the init process (PID 1) in our pid namespace
1da177e4 511 */
950bbabb 512static struct task_struct *find_new_reaper(struct task_struct *father)
d16e15f5
NK
513 __releases(&tasklist_lock)
514 __acquires(&tasklist_lock)
1da177e4 515{
950bbabb
ON
516 struct pid_namespace *pid_ns = task_active_pid_ns(father);
517 struct task_struct *thread;
1da177e4 518
950bbabb
ON
519 thread = father;
520 while_each_thread(father, thread) {
521 if (thread->flags & PF_EXITING)
522 continue;
523 if (unlikely(pid_ns->child_reaper == father))
524 pid_ns->child_reaper = thread;
525 return thread;
526 }
1da177e4 527
950bbabb
ON
528 if (unlikely(pid_ns->child_reaper == father)) {
529 write_unlock_irq(&tasklist_lock);
397a21f2
DV
530 if (unlikely(pid_ns == &init_pid_ns)) {
531 panic("Attempted to kill init! exitcode=0x%08x\n",
532 father->signal->group_exit_code ?:
533 father->exit_code);
534 }
1da177e4 535
950bbabb
ON
536 zap_pid_ns_processes(pid_ns);
537 write_lock_irq(&tasklist_lock);
ebec18a6
LP
538 } else if (father->signal->has_child_subreaper) {
539 struct task_struct *reaper;
540
541 /*
542 * Find the first ancestor marked as child_subreaper.
543 * Note that the code below checks same_thread_group(reaper,
544 * pid_ns->child_reaper). This is what we need to DTRT in a
545 * PID namespace. However we still need the check above, see
546 * http://marc.info/?l=linux-kernel&m=131385460420380
547 */
548 for (reaper = father->real_parent;
549 reaper != &init_task;
550 reaper = reaper->real_parent) {
551 if (same_thread_group(reaper, pid_ns->child_reaper))
552 break;
553 if (!reaper->signal->is_child_subreaper)
554 continue;
555 thread = reaper;
556 do {
557 if (!(thread->flags & PF_EXITING))
558 return reaper;
559 } while_each_thread(reaper, thread);
560 }
1da177e4 561 }
762a24be 562
950bbabb
ON
563 return pid_ns->child_reaper;
564}
565
5dfc80be
ON
566/*
567* Any that need to be release_task'd are put on the @dead list.
568 */
9cd80bbb 569static void reparent_leader(struct task_struct *father, struct task_struct *p,
5dfc80be
ON
570 struct list_head *dead)
571{
5dfc80be 572 list_move_tail(&p->sibling, &p->real_parent->children);
5dfc80be
ON
573 /*
574 * If this is a threaded reparent there is no need to
575 * notify anyone anything has happened.
576 */
577 if (same_thread_group(p->real_parent, father))
578 return;
579
a756e3d4
ON
580 /*
581 * We don't want people slaying init.
582 *
583 * Note: we do this even if it is EXIT_DEAD, wait_task_zombie()
584 * can change ->exit_state to EXIT_ZOMBIE. If this is the final
585 * state, do_notify_parent() was already called and ->exit_signal
586 * doesn't matter.
587 */
5dfc80be
ON
588 p->exit_signal = SIGCHLD;
589
a756e3d4
ON
590 if (p->exit_state == EXIT_DEAD)
591 return;
592
5dfc80be 593 /* If it has exited notify the new parent about this child's death. */
d21142ec 594 if (!p->ptrace &&
5dfc80be 595 p->exit_state == EXIT_ZOMBIE && thread_group_empty(p)) {
86773473 596 if (do_notify_parent(p, p->exit_signal)) {
5dfc80be
ON
597 p->exit_state = EXIT_DEAD;
598 list_move_tail(&p->sibling, dead);
599 }
600 }
601
602 kill_orphaned_pgrp(p, father);
603}
604
762a24be 605static void forget_original_parent(struct task_struct *father)
1da177e4 606{
950bbabb 607 struct task_struct *p, *n, *reaper;
5dfc80be 608 LIST_HEAD(dead_children);
762a24be
ON
609
610 write_lock_irq(&tasklist_lock);
c7e49c14
ON
611 /*
612 * Note that exit_ptrace() and find_new_reaper() might
613 * drop tasklist_lock and reacquire it.
614 */
615 exit_ptrace(father);
950bbabb 616 reaper = find_new_reaper(father);
f470021a 617
03ff1797 618 list_for_each_entry_safe(p, n, &father->children, sibling) {
9cd80bbb
ON
619 struct task_struct *t = p;
620 do {
621 t->real_parent = reaper;
622 if (t->parent == father) {
d21142ec 623 BUG_ON(t->ptrace);
9cd80bbb
ON
624 t->parent = t->real_parent;
625 }
626 if (t->pdeath_signal)
627 group_send_sig_info(t->pdeath_signal,
628 SEND_SIG_NOINFO, t);
629 } while_each_thread(p, t);
630 reparent_leader(father, p, &dead_children);
1da177e4 631 }
762a24be 632 write_unlock_irq(&tasklist_lock);
5dfc80be 633
762a24be 634 BUG_ON(!list_empty(&father->children));
762a24be 635
5dfc80be
ON
636 list_for_each_entry_safe(p, n, &dead_children, sibling) {
637 list_del_init(&p->sibling);
39c626ae
ON
638 release_task(p);
639 }
1da177e4
LT
640}
641
642/*
643 * Send signals to all our closest relatives so that they know
644 * to properly mourn us..
645 */
821c7de7 646static void exit_notify(struct task_struct *tsk, int group_dead)
1da177e4 647{
53c8f9f1 648 bool autoreap;
1da177e4 649
1da177e4
LT
650 /*
651 * This does two things:
652 *
653 * A. Make init inherit all the child processes
654 * B. Check to see if any process groups have become orphaned
655 * as a result of our exiting, and if they have any stopped
656 * jobs, send them a SIGHUP and then a SIGCONT. (POSIX 3.2.2.2)
657 */
762a24be 658 forget_original_parent(tsk);
1da177e4 659
762a24be 660 write_lock_irq(&tasklist_lock);
821c7de7
ON
661 if (group_dead)
662 kill_orphaned_pgrp(tsk->group_leader, NULL);
1da177e4 663
45cdf5cc
ON
664 if (unlikely(tsk->ptrace)) {
665 int sig = thread_group_leader(tsk) &&
666 thread_group_empty(tsk) &&
667 !ptrace_reparented(tsk) ?
668 tsk->exit_signal : SIGCHLD;
669 autoreap = do_notify_parent(tsk, sig);
670 } else if (thread_group_leader(tsk)) {
671 autoreap = thread_group_empty(tsk) &&
672 do_notify_parent(tsk, tsk->exit_signal);
673 } else {
674 autoreap = true;
675 }
1da177e4 676
53c8f9f1 677 tsk->exit_state = autoreap ? EXIT_DEAD : EXIT_ZOMBIE;
1da177e4 678
9c339168
ON
679 /* mt-exec, de_thread() is waiting for group leader */
680 if (unlikely(tsk->signal->notify_count < 0))
6db840fa 681 wake_up_process(tsk->signal->group_exit_task);
1da177e4
LT
682 write_unlock_irq(&tasklist_lock);
683
1da177e4 684 /* If the process is dead, release it - nobody will wait for it */
53c8f9f1 685 if (autoreap)
1da177e4 686 release_task(tsk);
1da177e4
LT
687}
688
e18eecb8
JD
689#ifdef CONFIG_DEBUG_STACK_USAGE
690static void check_stack_usage(void)
691{
692 static DEFINE_SPINLOCK(low_water_lock);
693 static int lowest_to_date = THREAD_SIZE;
e18eecb8
JD
694 unsigned long free;
695
7c9f8861 696 free = stack_not_used(current);
e18eecb8
JD
697
698 if (free >= lowest_to_date)
699 return;
700
701 spin_lock(&low_water_lock);
702 if (free < lowest_to_date) {
168eeccb
TB
703 printk(KERN_WARNING "%s (%d) used greatest stack depth: "
704 "%lu bytes left\n",
705 current->comm, task_pid_nr(current), free);
e18eecb8
JD
706 lowest_to_date = free;
707 }
708 spin_unlock(&low_water_lock);
709}
710#else
711static inline void check_stack_usage(void) {}
712#endif
713
9402c95f 714void do_exit(long code)
1da177e4
LT
715{
716 struct task_struct *tsk = current;
717 int group_dead;
718
719 profile_task_exit(tsk);
720
73c10101 721 WARN_ON(blk_needs_flush_plug(tsk));
22e2c507 722
1da177e4
LT
723 if (unlikely(in_interrupt()))
724 panic("Aiee, killing interrupt handler!");
725 if (unlikely(!tsk->pid))
726 panic("Attempted to kill the idle task!");
1da177e4 727
33dd94ae
NE
728 /*
729 * If do_exit is called because this processes oopsed, it's possible
730 * that get_fs() was left as KERNEL_DS, so reset it to USER_DS before
731 * continuing. Amongst other possible reasons, this is to prevent
732 * mm_release()->clear_child_tid() from writing to a user-controlled
733 * kernel address.
734 */
735 set_fs(USER_DS);
736
a288eecc 737 ptrace_event(PTRACE_EVENT_EXIT, code);
1da177e4 738
e0e81739
DH
739 validate_creds_for_do_exit(tsk);
740
df164db5
AN
741 /*
742 * We're taking recursive faults here in do_exit. Safest is to just
743 * leave this task alone and wait for reboot.
744 */
745 if (unlikely(tsk->flags & PF_EXITING)) {
746 printk(KERN_ALERT
747 "Fixing recursive fault but reboot is needed!\n");
778e9a9c
AK
748 /*
749 * We can do this unlocked here. The futex code uses
750 * this flag just to verify whether the pi state
751 * cleanup has been done or not. In the worst case it
752 * loops once more. We pretend that the cleanup was
753 * done as there is no way to return. Either the
754 * OWNER_DIED bit is set by now or we push the blocked
755 * task into the wait for ever nirwana as well.
756 */
757 tsk->flags |= PF_EXITPIDONE;
df164db5
AN
758 set_current_state(TASK_UNINTERRUPTIBLE);
759 schedule();
760 }
761
d12619b5 762 exit_signals(tsk); /* sets PF_EXITING */
778e9a9c
AK
763 /*
764 * tsk->flags are checked in the futex code to protect against
ed3e694d 765 * an exiting task cleaning up the robust pi futexes.
778e9a9c 766 */
d2ee7198 767 smp_mb();
1d615482 768 raw_spin_unlock_wait(&tsk->pi_lock);
1da177e4 769
1da177e4
LT
770 if (unlikely(in_atomic()))
771 printk(KERN_INFO "note: %s[%d] exited with preempt_count %d\n",
ba25f9dc 772 current->comm, task_pid_nr(current),
1da177e4
LT
773 preempt_count());
774
775 acct_update_integrals(tsk);
48d212a2
LT
776 /* sync mm's RSS info before statistics gathering */
777 if (tsk->mm)
778 sync_mm_rss(tsk->mm);
1da177e4 779 group_dead = atomic_dec_and_test(&tsk->signal->live);
c3068951 780 if (group_dead) {
778e9a9c 781 hrtimer_cancel(&tsk->signal->real_timer);
25f407f0 782 exit_itimers(tsk->signal);
1f10206c
JP
783 if (tsk->mm)
784 setmax_mm_hiwater_rss(&tsk->signal->maxrss, tsk->mm);
c3068951 785 }
f6ec29a4 786 acct_collect(code, group_dead);
522ed776
MT
787 if (group_dead)
788 tty_audit_exit();
a4ff8dba 789 audit_free(tsk);
115085ea 790
48d212a2 791 tsk->exit_code = code;
115085ea 792 taskstats_exit(tsk, group_dead);
c757249a 793
1da177e4
LT
794 exit_mm(tsk);
795
0e464814 796 if (group_dead)
f6ec29a4 797 acct_process();
0a16b607
MD
798 trace_sched_process_exit(tsk);
799
1da177e4 800 exit_sem(tsk);
b34a6b1d 801 exit_shm(tsk);
1ec7f1dd
AV
802 exit_files(tsk);
803 exit_fs(tsk);
16739781
ON
804 if (group_dead)
805 disassociate_ctty(1);
8aac6270 806 exit_task_namespaces(tsk);
ed3e694d 807 exit_task_work(tsk);
e18eecb8 808 check_stack_usage();
1da177e4 809 exit_thread();
0b3fcf17
SE
810
811 /*
812 * Flush inherited counters to the parent - before the parent
813 * gets woken up by child-exit notifications.
814 *
815 * because of cgroup mode, must be called before cgroup_exit()
816 */
817 perf_event_exit_task(tsk);
818
b4f48b63 819 cgroup_exit(tsk, 1);
1da177e4 820
a1261f54 821 module_put(task_thread_info(tsk)->exec_domain->module);
1da177e4 822
9f46080c 823 proc_exit_connector(tsk);
24f1e32c
FW
824 /*
825 * FIXME: do that only when needed, using sched_exit tracepoint
826 */
bf26c018 827 ptrace_put_breakpoints(tsk);
33b2fb30 828
821c7de7 829 exit_notify(tsk, group_dead);
1da177e4 830#ifdef CONFIG_NUMA
c0ff7453 831 task_lock(tsk);
f0be3d32 832 mpol_put(tsk->mempolicy);
1da177e4 833 tsk->mempolicy = NULL;
c0ff7453 834 task_unlock(tsk);
1da177e4 835#endif
42b2dd0a 836#ifdef CONFIG_FUTEX
c87e2837
IM
837 if (unlikely(current->pi_state_cache))
838 kfree(current->pi_state_cache);
42b2dd0a 839#endif
de5097c2 840 /*
9a11b49a 841 * Make sure we are holding no locks:
de5097c2 842 */
dbf520a9 843 debug_check_no_locks_held(tsk);
778e9a9c
AK
844 /*
845 * We can do this unlocked here. The futex code uses this flag
846 * just to verify whether the pi state cleanup has been done
847 * or not. In the worst case it loops once more.
848 */
849 tsk->flags |= PF_EXITPIDONE;
1da177e4 850
afc847b7 851 if (tsk->io_context)
b69f2292 852 exit_io_context(tsk);
afc847b7 853
b92ce558 854 if (tsk->splice_pipe)
4b8a8f1e 855 free_pipe_info(tsk->splice_pipe);
b92ce558 856
5640f768
ED
857 if (tsk->task_frag.page)
858 put_page(tsk->task_frag.page);
859
e0e81739
DH
860 validate_creds_for_do_exit(tsk);
861
7407251a 862 preempt_disable();
54848d73
WF
863 if (tsk->nr_dirtied)
864 __this_cpu_add(dirty_throttle_leaks, tsk->nr_dirtied);
f41d911f 865 exit_rcu();
b5740f4b
YG
866
867 /*
868 * The setting of TASK_RUNNING by try_to_wake_up() may be delayed
869 * when the following two conditions become true.
870 * - There is race condition of mmap_sem (It is acquired by
871 * exit_mm()), and
872 * - SMI occurs before setting TASK_RUNINNG.
873 * (or hypervisor of virtual machine switches to other guest)
874 * As a result, we may become TASK_RUNNING after becoming TASK_DEAD
875 *
876 * To avoid it, we have to wait for releasing tsk->pi_lock which
877 * is held by try_to_wake_up()
878 */
879 smp_mb();
880 raw_spin_unlock_wait(&tsk->pi_lock);
881
55a101f8 882 /* causes final put_task_struct in finish_task_switch(). */
c394cc9f 883 tsk->state = TASK_DEAD;
a585042f 884 tsk->flags |= PF_NOFREEZE; /* tell freezer to ignore us */
1da177e4
LT
885 schedule();
886 BUG();
887 /* Avoid "noreturn function does return". */
54306cf0
AC
888 for (;;)
889 cpu_relax(); /* For when BUG is null */
1da177e4
LT
890}
891
012914da
RA
892EXPORT_SYMBOL_GPL(do_exit);
893
9402c95f 894void complete_and_exit(struct completion *comp, long code)
1da177e4
LT
895{
896 if (comp)
897 complete(comp);
55a101f8 898
1da177e4
LT
899 do_exit(code);
900}
901
902EXPORT_SYMBOL(complete_and_exit);
903
754fe8d2 904SYSCALL_DEFINE1(exit, int, error_code)
1da177e4
LT
905{
906 do_exit((error_code&0xff)<<8);
907}
908
1da177e4
LT
909/*
910 * Take down every thread in the group. This is called by fatal signals
911 * as well as by sys_exit_group (below).
912 */
9402c95f 913void
1da177e4
LT
914do_group_exit(int exit_code)
915{
bfc4b089
ON
916 struct signal_struct *sig = current->signal;
917
1da177e4
LT
918 BUG_ON(exit_code & 0x80); /* core dumps don't get here */
919
bfc4b089
ON
920 if (signal_group_exit(sig))
921 exit_code = sig->group_exit_code;
1da177e4 922 else if (!thread_group_empty(current)) {
1da177e4 923 struct sighand_struct *const sighand = current->sighand;
1da177e4 924 spin_lock_irq(&sighand->siglock);
ed5d2cac 925 if (signal_group_exit(sig))
1da177e4
LT
926 /* Another thread got here before we took the lock. */
927 exit_code = sig->group_exit_code;
928 else {
1da177e4 929 sig->group_exit_code = exit_code;
ed5d2cac 930 sig->flags = SIGNAL_GROUP_EXIT;
1da177e4
LT
931 zap_other_threads(current);
932 }
933 spin_unlock_irq(&sighand->siglock);
1da177e4
LT
934 }
935
936 do_exit(exit_code);
937 /* NOTREACHED */
938}
939
940/*
941 * this kills every thread in the thread group. Note that any externally
942 * wait4()-ing process will get the correct exit code - even if this
943 * thread is not the thread group leader.
944 */
754fe8d2 945SYSCALL_DEFINE1(exit_group, int, error_code)
1da177e4
LT
946{
947 do_group_exit((error_code & 0xff) << 8);
2ed7c03e
HC
948 /* NOTREACHED */
949 return 0;
1da177e4
LT
950}
951
9e8ae01d
ON
952struct wait_opts {
953 enum pid_type wo_type;
9e8ae01d 954 int wo_flags;
e1eb1ebc 955 struct pid *wo_pid;
9e8ae01d
ON
956
957 struct siginfo __user *wo_info;
958 int __user *wo_stat;
959 struct rusage __user *wo_rusage;
960
0b7570e7 961 wait_queue_t child_wait;
9e8ae01d
ON
962 int notask_error;
963};
964
989264f4
ON
965static inline
966struct pid *task_pid_type(struct task_struct *task, enum pid_type type)
161550d7 967{
989264f4
ON
968 if (type != PIDTYPE_PID)
969 task = task->group_leader;
970 return task->pids[type].pid;
161550d7
EB
971}
972
989264f4 973static int eligible_pid(struct wait_opts *wo, struct task_struct *p)
1da177e4 974{
5c01ba49
ON
975 return wo->wo_type == PIDTYPE_MAX ||
976 task_pid_type(p, wo->wo_type) == wo->wo_pid;
977}
1da177e4 978
5c01ba49
ON
979static int eligible_child(struct wait_opts *wo, struct task_struct *p)
980{
981 if (!eligible_pid(wo, p))
982 return 0;
1da177e4
LT
983 /* Wait for all children (clone and not) if __WALL is set;
984 * otherwise, wait for clone children *only* if __WCLONE is
985 * set; otherwise, wait for non-clone children *only*. (Note:
986 * A "clone" child here is one that reports to its parent
987 * using a signal other than SIGCHLD.) */
9e8ae01d
ON
988 if (((p->exit_signal != SIGCHLD) ^ !!(wo->wo_flags & __WCLONE))
989 && !(wo->wo_flags & __WALL))
1da177e4 990 return 0;
1da177e4 991
14dd0b81 992 return 1;
1da177e4
LT
993}
994
9e8ae01d
ON
995static int wait_noreap_copyout(struct wait_opts *wo, struct task_struct *p,
996 pid_t pid, uid_t uid, int why, int status)
1da177e4 997{
9e8ae01d
ON
998 struct siginfo __user *infop;
999 int retval = wo->wo_rusage
1000 ? getrusage(p, RUSAGE_BOTH, wo->wo_rusage) : 0;
36c8b586 1001
1da177e4 1002 put_task_struct(p);
9e8ae01d 1003 infop = wo->wo_info;
b6fe2d11
VM
1004 if (infop) {
1005 if (!retval)
1006 retval = put_user(SIGCHLD, &infop->si_signo);
1007 if (!retval)
1008 retval = put_user(0, &infop->si_errno);
1009 if (!retval)
1010 retval = put_user((short)why, &infop->si_code);
1011 if (!retval)
1012 retval = put_user(pid, &infop->si_pid);
1013 if (!retval)
1014 retval = put_user(uid, &infop->si_uid);
1015 if (!retval)
1016 retval = put_user(status, &infop->si_status);
1017 }
1da177e4
LT
1018 if (!retval)
1019 retval = pid;
1020 return retval;
1021}
1022
1023/*
1024 * Handle sys_wait4 work for one task in state EXIT_ZOMBIE. We hold
1025 * read_lock(&tasklist_lock) on entry. If we return zero, we still hold
1026 * the lock and this task is uninteresting. If we return nonzero, we have
1027 * released the lock and the system call should return.
1028 */
9e8ae01d 1029static int wait_task_zombie(struct wait_opts *wo, struct task_struct *p)
1da177e4
LT
1030{
1031 unsigned long state;
2f4e6e2a 1032 int retval, status, traced;
6c5f3e7b 1033 pid_t pid = task_pid_vnr(p);
43e13cc1 1034 uid_t uid = from_kuid_munged(current_user_ns(), task_uid(p));
9e8ae01d 1035 struct siginfo __user *infop;
1da177e4 1036
9e8ae01d 1037 if (!likely(wo->wo_flags & WEXITED))
98abed02
RM
1038 return 0;
1039
9e8ae01d 1040 if (unlikely(wo->wo_flags & WNOWAIT)) {
1da177e4 1041 int exit_code = p->exit_code;
f3abd4f9 1042 int why;
1da177e4 1043
1da177e4
LT
1044 get_task_struct(p);
1045 read_unlock(&tasklist_lock);
1046 if ((exit_code & 0x7f) == 0) {
1047 why = CLD_EXITED;
1048 status = exit_code >> 8;
1049 } else {
1050 why = (exit_code & 0x80) ? CLD_DUMPED : CLD_KILLED;
1051 status = exit_code & 0x7f;
1052 }
9e8ae01d 1053 return wait_noreap_copyout(wo, p, pid, uid, why, status);
1da177e4
LT
1054 }
1055
1056 /*
1057 * Try to move the task's state to DEAD
1058 * only one thread is allowed to do this:
1059 */
1060 state = xchg(&p->exit_state, EXIT_DEAD);
1061 if (state != EXIT_ZOMBIE) {
1062 BUG_ON(state != EXIT_DEAD);
1063 return 0;
1064 }
1da177e4 1065
53b6f9fb 1066 traced = ptrace_reparented(p);
befca967
ON
1067 /*
1068 * It can be ptraced but not reparented, check
e550f14d 1069 * thread_group_leader() to filter out sub-threads.
befca967 1070 */
e550f14d 1071 if (likely(!traced) && thread_group_leader(p)) {
3795e161
JJ
1072 struct signal_struct *psig;
1073 struct signal_struct *sig;
1f10206c 1074 unsigned long maxrss;
0cf55e1e 1075 cputime_t tgutime, tgstime;
3795e161 1076
1da177e4
LT
1077 /*
1078 * The resource counters for the group leader are in its
1079 * own task_struct. Those for dead threads in the group
1080 * are in its signal_struct, as are those for the child
1081 * processes it has previously reaped. All these
1082 * accumulate in the parent's signal_struct c* fields.
1083 *
1084 * We don't bother to take a lock here to protect these
1085 * p->signal fields, because they are only touched by
1086 * __exit_signal, which runs with tasklist_lock
1087 * write-locked anyway, and so is excluded here. We do
d1e98f42 1088 * need to protect the access to parent->signal fields,
1da177e4
LT
1089 * as other threads in the parent group can be right
1090 * here reaping other children at the same time.
0cf55e1e 1091 *
e80d0a1a 1092 * We use thread_group_cputime_adjusted() to get times for the thread
0cf55e1e
HS
1093 * group, which consolidates times for all threads in the
1094 * group including the group leader.
1da177e4 1095 */
e80d0a1a 1096 thread_group_cputime_adjusted(p, &tgutime, &tgstime);
d1e98f42
ON
1097 spin_lock_irq(&p->real_parent->sighand->siglock);
1098 psig = p->real_parent->signal;
3795e161 1099 sig = p->signal;
64861634
MS
1100 psig->cutime += tgutime + sig->cutime;
1101 psig->cstime += tgstime + sig->cstime;
6fac4829 1102 psig->cgtime += task_gtime(p) + sig->gtime + sig->cgtime;
3795e161
JJ
1103 psig->cmin_flt +=
1104 p->min_flt + sig->min_flt + sig->cmin_flt;
1105 psig->cmaj_flt +=
1106 p->maj_flt + sig->maj_flt + sig->cmaj_flt;
1107 psig->cnvcsw +=
1108 p->nvcsw + sig->nvcsw + sig->cnvcsw;
1109 psig->cnivcsw +=
1110 p->nivcsw + sig->nivcsw + sig->cnivcsw;
6eaeeaba
ED
1111 psig->cinblock +=
1112 task_io_get_inblock(p) +
1113 sig->inblock + sig->cinblock;
1114 psig->coublock +=
1115 task_io_get_oublock(p) +
1116 sig->oublock + sig->coublock;
1f10206c
JP
1117 maxrss = max(sig->maxrss, sig->cmaxrss);
1118 if (psig->cmaxrss < maxrss)
1119 psig->cmaxrss = maxrss;
5995477a
AR
1120 task_io_accounting_add(&psig->ioac, &p->ioac);
1121 task_io_accounting_add(&psig->ioac, &sig->ioac);
d1e98f42 1122 spin_unlock_irq(&p->real_parent->sighand->siglock);
1da177e4
LT
1123 }
1124
1125 /*
1126 * Now we are sure this task is interesting, and no other
1127 * thread can reap it because we set its state to EXIT_DEAD.
1128 */
1129 read_unlock(&tasklist_lock);
1130
9e8ae01d
ON
1131 retval = wo->wo_rusage
1132 ? getrusage(p, RUSAGE_BOTH, wo->wo_rusage) : 0;
1da177e4
LT
1133 status = (p->signal->flags & SIGNAL_GROUP_EXIT)
1134 ? p->signal->group_exit_code : p->exit_code;
9e8ae01d
ON
1135 if (!retval && wo->wo_stat)
1136 retval = put_user(status, wo->wo_stat);
1137
1138 infop = wo->wo_info;
1da177e4
LT
1139 if (!retval && infop)
1140 retval = put_user(SIGCHLD, &infop->si_signo);
1141 if (!retval && infop)
1142 retval = put_user(0, &infop->si_errno);
1143 if (!retval && infop) {
1144 int why;
1145
1146 if ((status & 0x7f) == 0) {
1147 why = CLD_EXITED;
1148 status >>= 8;
1149 } else {
1150 why = (status & 0x80) ? CLD_DUMPED : CLD_KILLED;
1151 status &= 0x7f;
1152 }
1153 retval = put_user((short)why, &infop->si_code);
1154 if (!retval)
1155 retval = put_user(status, &infop->si_status);
1156 }
1157 if (!retval && infop)
3a515e4a 1158 retval = put_user(pid, &infop->si_pid);
1da177e4 1159 if (!retval && infop)
c69e8d9c 1160 retval = put_user(uid, &infop->si_uid);
2f4e6e2a 1161 if (!retval)
3a515e4a 1162 retval = pid;
2f4e6e2a
ON
1163
1164 if (traced) {
1da177e4 1165 write_lock_irq(&tasklist_lock);
2f4e6e2a
ON
1166 /* We dropped tasklist, ptracer could die and untrace */
1167 ptrace_unlink(p);
1168 /*
86773473
ON
1169 * If this is not a sub-thread, notify the parent.
1170 * If parent wants a zombie, don't release it now.
2f4e6e2a 1171 */
86773473
ON
1172 if (thread_group_leader(p) &&
1173 !do_notify_parent(p, p->exit_signal)) {
1174 p->exit_state = EXIT_ZOMBIE;
1175 p = NULL;
1da177e4
LT
1176 }
1177 write_unlock_irq(&tasklist_lock);
1178 }
1179 if (p != NULL)
1180 release_task(p);
2f4e6e2a 1181
1da177e4
LT
1182 return retval;
1183}
1184
90bc8d8b
ON
1185static int *task_stopped_code(struct task_struct *p, bool ptrace)
1186{
1187 if (ptrace) {
544b2c91
TH
1188 if (task_is_stopped_or_traced(p) &&
1189 !(p->jobctl & JOBCTL_LISTENING))
90bc8d8b
ON
1190 return &p->exit_code;
1191 } else {
1192 if (p->signal->flags & SIGNAL_STOP_STOPPED)
1193 return &p->signal->group_exit_code;
1194 }
1195 return NULL;
1196}
1197
19e27463
TH
1198/**
1199 * wait_task_stopped - Wait for %TASK_STOPPED or %TASK_TRACED
1200 * @wo: wait options
1201 * @ptrace: is the wait for ptrace
1202 * @p: task to wait for
1203 *
1204 * Handle sys_wait4() work for %p in state %TASK_STOPPED or %TASK_TRACED.
1205 *
1206 * CONTEXT:
1207 * read_lock(&tasklist_lock), which is released if return value is
1208 * non-zero. Also, grabs and releases @p->sighand->siglock.
1209 *
1210 * RETURNS:
1211 * 0 if wait condition didn't exist and search for other wait conditions
1212 * should continue. Non-zero return, -errno on failure and @p's pid on
1213 * success, implies that tasklist_lock is released and wait condition
1214 * search should terminate.
1da177e4 1215 */
9e8ae01d
ON
1216static int wait_task_stopped(struct wait_opts *wo,
1217 int ptrace, struct task_struct *p)
1da177e4 1218{
9e8ae01d 1219 struct siginfo __user *infop;
90bc8d8b 1220 int retval, exit_code, *p_code, why;
ee7c82da 1221 uid_t uid = 0; /* unneeded, required by compiler */
c8950783 1222 pid_t pid;
1da177e4 1223
47918025
ON
1224 /*
1225 * Traditionally we see ptrace'd stopped tasks regardless of options.
1226 */
9e8ae01d 1227 if (!ptrace && !(wo->wo_flags & WUNTRACED))
98abed02
RM
1228 return 0;
1229
19e27463
TH
1230 if (!task_stopped_code(p, ptrace))
1231 return 0;
1232
ee7c82da
ON
1233 exit_code = 0;
1234 spin_lock_irq(&p->sighand->siglock);
1235
90bc8d8b
ON
1236 p_code = task_stopped_code(p, ptrace);
1237 if (unlikely(!p_code))
ee7c82da
ON
1238 goto unlock_sig;
1239
90bc8d8b 1240 exit_code = *p_code;
ee7c82da
ON
1241 if (!exit_code)
1242 goto unlock_sig;
1243
9e8ae01d 1244 if (!unlikely(wo->wo_flags & WNOWAIT))
90bc8d8b 1245 *p_code = 0;
ee7c82da 1246
8ca937a6 1247 uid = from_kuid_munged(current_user_ns(), task_uid(p));
ee7c82da
ON
1248unlock_sig:
1249 spin_unlock_irq(&p->sighand->siglock);
1250 if (!exit_code)
1da177e4
LT
1251 return 0;
1252
1253 /*
1254 * Now we are pretty sure this task is interesting.
1255 * Make sure it doesn't get reaped out from under us while we
1256 * give up the lock and then examine it below. We don't want to
1257 * keep holding onto the tasklist_lock while we call getrusage and
1258 * possibly take page faults for user memory.
1259 */
1260 get_task_struct(p);
6c5f3e7b 1261 pid = task_pid_vnr(p);
f470021a 1262 why = ptrace ? CLD_TRAPPED : CLD_STOPPED;
1da177e4
LT
1263 read_unlock(&tasklist_lock);
1264
9e8ae01d
ON
1265 if (unlikely(wo->wo_flags & WNOWAIT))
1266 return wait_noreap_copyout(wo, p, pid, uid, why, exit_code);
1267
1268 retval = wo->wo_rusage
1269 ? getrusage(p, RUSAGE_BOTH, wo->wo_rusage) : 0;
1270 if (!retval && wo->wo_stat)
1271 retval = put_user((exit_code << 8) | 0x7f, wo->wo_stat);
1da177e4 1272
9e8ae01d 1273 infop = wo->wo_info;
1da177e4
LT
1274 if (!retval && infop)
1275 retval = put_user(SIGCHLD, &infop->si_signo);
1276 if (!retval && infop)
1277 retval = put_user(0, &infop->si_errno);
1278 if (!retval && infop)
6efcae46 1279 retval = put_user((short)why, &infop->si_code);
1da177e4
LT
1280 if (!retval && infop)
1281 retval = put_user(exit_code, &infop->si_status);
1282 if (!retval && infop)
c8950783 1283 retval = put_user(pid, &infop->si_pid);
1da177e4 1284 if (!retval && infop)
ee7c82da 1285 retval = put_user(uid, &infop->si_uid);
1da177e4 1286 if (!retval)
c8950783 1287 retval = pid;
1da177e4
LT
1288 put_task_struct(p);
1289
1290 BUG_ON(!retval);
1291 return retval;
1292}
1293
1294/*
1295 * Handle do_wait work for one task in a live, non-stopped state.
1296 * read_lock(&tasklist_lock) on entry. If we return zero, we still hold
1297 * the lock and this task is uninteresting. If we return nonzero, we have
1298 * released the lock and the system call should return.
1299 */
9e8ae01d 1300static int wait_task_continued(struct wait_opts *wo, struct task_struct *p)
1da177e4
LT
1301{
1302 int retval;
1303 pid_t pid;
1304 uid_t uid;
1305
9e8ae01d 1306 if (!unlikely(wo->wo_flags & WCONTINUED))
98abed02
RM
1307 return 0;
1308
1da177e4
LT
1309 if (!(p->signal->flags & SIGNAL_STOP_CONTINUED))
1310 return 0;
1311
1312 spin_lock_irq(&p->sighand->siglock);
1313 /* Re-check with the lock held. */
1314 if (!(p->signal->flags & SIGNAL_STOP_CONTINUED)) {
1315 spin_unlock_irq(&p->sighand->siglock);
1316 return 0;
1317 }
9e8ae01d 1318 if (!unlikely(wo->wo_flags & WNOWAIT))
1da177e4 1319 p->signal->flags &= ~SIGNAL_STOP_CONTINUED;
8ca937a6 1320 uid = from_kuid_munged(current_user_ns(), task_uid(p));
1da177e4
LT
1321 spin_unlock_irq(&p->sighand->siglock);
1322
6c5f3e7b 1323 pid = task_pid_vnr(p);
1da177e4
LT
1324 get_task_struct(p);
1325 read_unlock(&tasklist_lock);
1326
9e8ae01d
ON
1327 if (!wo->wo_info) {
1328 retval = wo->wo_rusage
1329 ? getrusage(p, RUSAGE_BOTH, wo->wo_rusage) : 0;
1da177e4 1330 put_task_struct(p);
9e8ae01d
ON
1331 if (!retval && wo->wo_stat)
1332 retval = put_user(0xffff, wo->wo_stat);
1da177e4 1333 if (!retval)
3a515e4a 1334 retval = pid;
1da177e4 1335 } else {
9e8ae01d
ON
1336 retval = wait_noreap_copyout(wo, p, pid, uid,
1337 CLD_CONTINUED, SIGCONT);
1da177e4
LT
1338 BUG_ON(retval == 0);
1339 }
1340
1341 return retval;
1342}
1343
98abed02
RM
1344/*
1345 * Consider @p for a wait by @parent.
1346 *
9e8ae01d 1347 * -ECHILD should be in ->notask_error before the first call.
98abed02
RM
1348 * Returns nonzero for a final return, when we have unlocked tasklist_lock.
1349 * Returns zero if the search for a child should continue;
9e8ae01d 1350 * then ->notask_error is 0 if @p is an eligible child,
14dd0b81 1351 * or another error from security_task_wait(), or still -ECHILD.
98abed02 1352 */
b6e763f0
ON
1353static int wait_consider_task(struct wait_opts *wo, int ptrace,
1354 struct task_struct *p)
98abed02 1355{
9e8ae01d 1356 int ret = eligible_child(wo, p);
14dd0b81 1357 if (!ret)
98abed02
RM
1358 return ret;
1359
a2322e1d 1360 ret = security_task_wait(p);
14dd0b81
RM
1361 if (unlikely(ret < 0)) {
1362 /*
1363 * If we have not yet seen any eligible child,
1364 * then let this error code replace -ECHILD.
1365 * A permission error will give the user a clue
1366 * to look for security policy problems, rather
1367 * than for mysterious wait bugs.
1368 */
9e8ae01d
ON
1369 if (wo->notask_error)
1370 wo->notask_error = ret;
78a3d9d5 1371 return 0;
14dd0b81
RM
1372 }
1373
823b018e 1374 /* dead body doesn't have much to contribute */
50b8d257
ON
1375 if (unlikely(p->exit_state == EXIT_DEAD)) {
1376 /*
1377 * But do not ignore this task until the tracer does
1378 * wait_task_zombie()->do_notify_parent().
1379 */
1380 if (likely(!ptrace) && unlikely(ptrace_reparented(p)))
1381 wo->notask_error = 0;
823b018e 1382 return 0;
50b8d257 1383 }
823b018e 1384
45cb24a1
TH
1385 /* slay zombie? */
1386 if (p->exit_state == EXIT_ZOMBIE) {
f470021a 1387 /*
45cb24a1
TH
1388 * A zombie ptracee is only visible to its ptracer.
1389 * Notification and reaping will be cascaded to the real
1390 * parent when the ptracer detaches.
f470021a 1391 */
d21142ec 1392 if (likely(!ptrace) && unlikely(p->ptrace)) {
45cb24a1
TH
1393 /* it will become visible, clear notask_error */
1394 wo->notask_error = 0;
1395 return 0;
1396 }
f470021a 1397
9b84cca2
TH
1398 /* we don't reap group leaders with subthreads */
1399 if (!delay_group_leader(p))
1400 return wait_task_zombie(wo, p);
98abed02 1401
f470021a 1402 /*
9b84cca2
TH
1403 * Allow access to stopped/continued state via zombie by
1404 * falling through. Clearing of notask_error is complex.
1405 *
1406 * When !@ptrace:
1407 *
1408 * If WEXITED is set, notask_error should naturally be
1409 * cleared. If not, subset of WSTOPPED|WCONTINUED is set,
1410 * so, if there are live subthreads, there are events to
1411 * wait for. If all subthreads are dead, it's still safe
1412 * to clear - this function will be called again in finite
1413 * amount time once all the subthreads are released and
1414 * will then return without clearing.
1415 *
1416 * When @ptrace:
1417 *
1418 * Stopped state is per-task and thus can't change once the
1419 * target task dies. Only continued and exited can happen.
1420 * Clear notask_error if WCONTINUED | WEXITED.
1421 */
1422 if (likely(!ptrace) || (wo->wo_flags & (WCONTINUED | WEXITED)))
1423 wo->notask_error = 0;
1424 } else {
45cb24a1
TH
1425 /*
1426 * If @p is ptraced by a task in its real parent's group,
1427 * hide group stop/continued state when looking at @p as
1428 * the real parent; otherwise, a single stop can be
1429 * reported twice as group and ptrace stops.
1430 *
1431 * If a ptracer wants to distinguish the two events for its
1432 * own children, it should create a separate process which
1433 * takes the role of real parent.
1434 */
479bf98c 1435 if (likely(!ptrace) && p->ptrace && !ptrace_reparented(p))
45cb24a1
TH
1436 return 0;
1437
9b84cca2
TH
1438 /*
1439 * @p is alive and it's gonna stop, continue or exit, so
1440 * there always is something to wait for.
f470021a 1441 */
9e8ae01d 1442 wo->notask_error = 0;
f470021a
RM
1443 }
1444
98abed02 1445 /*
45cb24a1
TH
1446 * Wait for stopped. Depending on @ptrace, different stopped state
1447 * is used and the two don't interact with each other.
98abed02 1448 */
19e27463
TH
1449 ret = wait_task_stopped(wo, ptrace, p);
1450 if (ret)
1451 return ret;
98abed02
RM
1452
1453 /*
45cb24a1
TH
1454 * Wait for continued. There's only one continued state and the
1455 * ptracer can consume it which can confuse the real parent. Don't
1456 * use WCONTINUED from ptracer. You don't need or want it.
98abed02 1457 */
9e8ae01d 1458 return wait_task_continued(wo, p);
98abed02
RM
1459}
1460
1461/*
1462 * Do the work of do_wait() for one thread in the group, @tsk.
1463 *
9e8ae01d 1464 * -ECHILD should be in ->notask_error before the first call.
98abed02
RM
1465 * Returns nonzero for a final return, when we have unlocked tasklist_lock.
1466 * Returns zero if the search for a child should continue; then
9e8ae01d 1467 * ->notask_error is 0 if there were any eligible children,
14dd0b81 1468 * or another error from security_task_wait(), or still -ECHILD.
98abed02 1469 */
9e8ae01d 1470static int do_wait_thread(struct wait_opts *wo, struct task_struct *tsk)
98abed02
RM
1471{
1472 struct task_struct *p;
1473
1474 list_for_each_entry(p, &tsk->children, sibling) {
9cd80bbb
ON
1475 int ret = wait_consider_task(wo, 0, p);
1476 if (ret)
1477 return ret;
98abed02
RM
1478 }
1479
1480 return 0;
1481}
1482
9e8ae01d 1483static int ptrace_do_wait(struct wait_opts *wo, struct task_struct *tsk)
98abed02
RM
1484{
1485 struct task_struct *p;
1486
f470021a 1487 list_for_each_entry(p, &tsk->ptraced, ptrace_entry) {
b6e763f0 1488 int ret = wait_consider_task(wo, 1, p);
f470021a 1489 if (ret)
98abed02 1490 return ret;
98abed02
RM
1491 }
1492
1493 return 0;
1494}
1495
0b7570e7
ON
1496static int child_wait_callback(wait_queue_t *wait, unsigned mode,
1497 int sync, void *key)
1498{
1499 struct wait_opts *wo = container_of(wait, struct wait_opts,
1500 child_wait);
1501 struct task_struct *p = key;
1502
5c01ba49 1503 if (!eligible_pid(wo, p))
0b7570e7
ON
1504 return 0;
1505
b4fe5182
ON
1506 if ((wo->wo_flags & __WNOTHREAD) && wait->private != p->parent)
1507 return 0;
1508
0b7570e7
ON
1509 return default_wake_function(wait, mode, sync, key);
1510}
1511
a7f0765e
ON
1512void __wake_up_parent(struct task_struct *p, struct task_struct *parent)
1513{
0b7570e7
ON
1514 __wake_up_sync_key(&parent->signal->wait_chldexit,
1515 TASK_INTERRUPTIBLE, 1, p);
a7f0765e
ON
1516}
1517
9e8ae01d 1518static long do_wait(struct wait_opts *wo)
1da177e4 1519{
1da177e4 1520 struct task_struct *tsk;
98abed02 1521 int retval;
1da177e4 1522
9e8ae01d 1523 trace_sched_process_wait(wo->wo_pid);
0a16b607 1524
0b7570e7
ON
1525 init_waitqueue_func_entry(&wo->child_wait, child_wait_callback);
1526 wo->child_wait.private = current;
1527 add_wait_queue(&current->signal->wait_chldexit, &wo->child_wait);
1da177e4 1528repeat:
98abed02
RM
1529 /*
1530 * If there is nothing that can match our critiera just get out.
9e8ae01d
ON
1531 * We will clear ->notask_error to zero if we see any child that
1532 * might later match our criteria, even if we are not able to reap
1533 * it yet.
98abed02 1534 */
64a16caf 1535 wo->notask_error = -ECHILD;
9e8ae01d
ON
1536 if ((wo->wo_type < PIDTYPE_MAX) &&
1537 (!wo->wo_pid || hlist_empty(&wo->wo_pid->tasks[wo->wo_type])))
64a16caf 1538 goto notask;
161550d7 1539
f95d39d1 1540 set_current_state(TASK_INTERRUPTIBLE);
1da177e4
LT
1541 read_lock(&tasklist_lock);
1542 tsk = current;
1543 do {
64a16caf
ON
1544 retval = do_wait_thread(wo, tsk);
1545 if (retval)
1546 goto end;
9e8ae01d 1547
64a16caf
ON
1548 retval = ptrace_do_wait(wo, tsk);
1549 if (retval)
98abed02 1550 goto end;
98abed02 1551
9e8ae01d 1552 if (wo->wo_flags & __WNOTHREAD)
1da177e4 1553 break;
a3f6dfb7 1554 } while_each_thread(current, tsk);
1da177e4 1555 read_unlock(&tasklist_lock);
f2cc3eb1 1556
64a16caf 1557notask:
9e8ae01d
ON
1558 retval = wo->notask_error;
1559 if (!retval && !(wo->wo_flags & WNOHANG)) {
1da177e4 1560 retval = -ERESTARTSYS;
98abed02
RM
1561 if (!signal_pending(current)) {
1562 schedule();
1563 goto repeat;
1564 }
1da177e4 1565 }
1da177e4 1566end:
f95d39d1 1567 __set_current_state(TASK_RUNNING);
0b7570e7 1568 remove_wait_queue(&current->signal->wait_chldexit, &wo->child_wait);
1da177e4
LT
1569 return retval;
1570}
1571
17da2bd9
HC
1572SYSCALL_DEFINE5(waitid, int, which, pid_t, upid, struct siginfo __user *,
1573 infop, int, options, struct rusage __user *, ru)
1da177e4 1574{
9e8ae01d 1575 struct wait_opts wo;
161550d7
EB
1576 struct pid *pid = NULL;
1577 enum pid_type type;
1da177e4
LT
1578 long ret;
1579
1580 if (options & ~(WNOHANG|WNOWAIT|WEXITED|WSTOPPED|WCONTINUED))
1581 return -EINVAL;
1582 if (!(options & (WEXITED|WSTOPPED|WCONTINUED)))
1583 return -EINVAL;
1584
1585 switch (which) {
1586 case P_ALL:
161550d7 1587 type = PIDTYPE_MAX;
1da177e4
LT
1588 break;
1589 case P_PID:
161550d7
EB
1590 type = PIDTYPE_PID;
1591 if (upid <= 0)
1da177e4
LT
1592 return -EINVAL;
1593 break;
1594 case P_PGID:
161550d7
EB
1595 type = PIDTYPE_PGID;
1596 if (upid <= 0)
1da177e4 1597 return -EINVAL;
1da177e4
LT
1598 break;
1599 default:
1600 return -EINVAL;
1601 }
1602
161550d7
EB
1603 if (type < PIDTYPE_MAX)
1604 pid = find_get_pid(upid);
9e8ae01d
ON
1605
1606 wo.wo_type = type;
1607 wo.wo_pid = pid;
1608 wo.wo_flags = options;
1609 wo.wo_info = infop;
1610 wo.wo_stat = NULL;
1611 wo.wo_rusage = ru;
1612 ret = do_wait(&wo);
dfe16dfa
VM
1613
1614 if (ret > 0) {
1615 ret = 0;
1616 } else if (infop) {
1617 /*
1618 * For a WNOHANG return, clear out all the fields
1619 * we would set so the user can easily tell the
1620 * difference.
1621 */
1622 if (!ret)
1623 ret = put_user(0, &infop->si_signo);
1624 if (!ret)
1625 ret = put_user(0, &infop->si_errno);
1626 if (!ret)
1627 ret = put_user(0, &infop->si_code);
1628 if (!ret)
1629 ret = put_user(0, &infop->si_pid);
1630 if (!ret)
1631 ret = put_user(0, &infop->si_uid);
1632 if (!ret)
1633 ret = put_user(0, &infop->si_status);
1634 }
1635
161550d7 1636 put_pid(pid);
1da177e4
LT
1637 return ret;
1638}
1639
754fe8d2
HC
1640SYSCALL_DEFINE4(wait4, pid_t, upid, int __user *, stat_addr,
1641 int, options, struct rusage __user *, ru)
1da177e4 1642{
9e8ae01d 1643 struct wait_opts wo;
161550d7
EB
1644 struct pid *pid = NULL;
1645 enum pid_type type;
1da177e4
LT
1646 long ret;
1647
1648 if (options & ~(WNOHANG|WUNTRACED|WCONTINUED|
1649 __WNOTHREAD|__WCLONE|__WALL))
1650 return -EINVAL;
161550d7
EB
1651
1652 if (upid == -1)
1653 type = PIDTYPE_MAX;
1654 else if (upid < 0) {
1655 type = PIDTYPE_PGID;
1656 pid = find_get_pid(-upid);
1657 } else if (upid == 0) {
1658 type = PIDTYPE_PGID;
2ae448ef 1659 pid = get_task_pid(current, PIDTYPE_PGID);
161550d7
EB
1660 } else /* upid > 0 */ {
1661 type = PIDTYPE_PID;
1662 pid = find_get_pid(upid);
1663 }
1664
9e8ae01d
ON
1665 wo.wo_type = type;
1666 wo.wo_pid = pid;
1667 wo.wo_flags = options | WEXITED;
1668 wo.wo_info = NULL;
1669 wo.wo_stat = stat_addr;
1670 wo.wo_rusage = ru;
1671 ret = do_wait(&wo);
161550d7 1672 put_pid(pid);
1da177e4 1673
1da177e4
LT
1674 return ret;
1675}
1676
1677#ifdef __ARCH_WANT_SYS_WAITPID
1678
1679/*
1680 * sys_waitpid() remains for compatibility. waitpid() should be
1681 * implemented by calling sys_wait4() from libc.a.
1682 */
17da2bd9 1683SYSCALL_DEFINE3(waitpid, pid_t, pid, int __user *, stat_addr, int, options)
1da177e4
LT
1684{
1685 return sys_wait4(pid, stat_addr, options, NULL);
1686}
1687
1688#endif