]> git.ipfire.org Git - people/arne_f/kernel.git/blame - kernel/exit.c
Improve behaviour of spurious IRQ detect
[people/arne_f/kernel.git] / kernel / exit.c
CommitLineData
1da177e4
LT
1/*
2 * linux/kernel/exit.c
3 *
4 * Copyright (C) 1991, 1992 Linus Torvalds
5 */
6
1da177e4
LT
7#include <linux/mm.h>
8#include <linux/slab.h>
9#include <linux/interrupt.h>
1da177e4 10#include <linux/module.h>
c59ede7b 11#include <linux/capability.h>
1da177e4
LT
12#include <linux/completion.h>
13#include <linux/personality.h>
14#include <linux/tty.h>
6b3286ed 15#include <linux/mnt_namespace.h>
1da177e4
LT
16#include <linux/key.h>
17#include <linux/security.h>
18#include <linux/cpu.h>
19#include <linux/acct.h>
8f0ab514 20#include <linux/tsacct_kern.h>
1da177e4
LT
21#include <linux/file.h>
22#include <linux/binfmts.h>
ab516013 23#include <linux/nsproxy.h>
84d73786 24#include <linux/pid_namespace.h>
1da177e4
LT
25#include <linux/ptrace.h>
26#include <linux/profile.h>
fba2afaa 27#include <linux/signalfd.h>
1da177e4
LT
28#include <linux/mount.h>
29#include <linux/proc_fs.h>
49d769d5 30#include <linux/kthread.h>
1da177e4 31#include <linux/mempolicy.h>
c757249a 32#include <linux/taskstats_kern.h>
ca74e92b 33#include <linux/delayacct.h>
1da177e4
LT
34#include <linux/cpuset.h>
35#include <linux/syscalls.h>
7ed20e1a 36#include <linux/signal.h>
6a14c5c9 37#include <linux/posix-timers.h>
9f46080c 38#include <linux/cn_proc.h>
de5097c2 39#include <linux/mutex.h>
0771dfef 40#include <linux/futex.h>
34f192c6 41#include <linux/compat.h>
b92ce558 42#include <linux/pipe_fs_i.h>
fa84cb93 43#include <linux/audit.h> /* for audit_free() */
83cc5ed3 44#include <linux/resource.h>
0d67a46d 45#include <linux/blkdev.h>
6eaeeaba 46#include <linux/task_io_accounting_ops.h>
1da177e4
LT
47
48#include <asm/uaccess.h>
49#include <asm/unistd.h>
50#include <asm/pgtable.h>
51#include <asm/mmu_context.h>
52
53extern void sem_exit (void);
1da177e4 54
408b664a
AB
55static void exit_mm(struct task_struct * tsk);
56
1da177e4
LT
57static void __unhash_process(struct task_struct *p)
58{
59 nr_threads--;
60 detach_pid(p, PIDTYPE_PID);
1da177e4
LT
61 if (thread_group_leader(p)) {
62 detach_pid(p, PIDTYPE_PGID);
63 detach_pid(p, PIDTYPE_SID);
c97d9893 64
5e85d4ab 65 list_del_rcu(&p->tasks);
73b9ebfe 66 __get_cpu_var(process_counts)--;
1da177e4 67 }
47e65328 68 list_del_rcu(&p->thread_group);
c97d9893 69 remove_parent(p);
1da177e4
LT
70}
71
6a14c5c9
ON
72/*
73 * This function expects the tasklist_lock write-locked.
74 */
75static void __exit_signal(struct task_struct *tsk)
76{
77 struct signal_struct *sig = tsk->signal;
78 struct sighand_struct *sighand;
79
80 BUG_ON(!sig);
81 BUG_ON(!atomic_read(&sig->count));
82
83 rcu_read_lock();
84 sighand = rcu_dereference(tsk->sighand);
85 spin_lock(&sighand->siglock);
86
fba2afaa
DL
87 /*
88 * Notify that this sighand has been detached. This must
89 * be called with the tsk->sighand lock held. Also, this
90 * access tsk->sighand internally, so it must be called
91 * before tsk->sighand is reset.
92 */
93 signalfd_detach_locked(tsk);
94
6a14c5c9
ON
95 posix_cpu_timers_exit(tsk);
96 if (atomic_dec_and_test(&sig->count))
97 posix_cpu_timers_exit_group(tsk);
98 else {
99 /*
100 * If there is any task waiting for the group exit
101 * then notify it:
102 */
103 if (sig->group_exit_task && atomic_read(&sig->count) == sig->notify_count) {
104 wake_up_process(sig->group_exit_task);
105 sig->group_exit_task = NULL;
106 }
107 if (tsk == sig->curr_target)
108 sig->curr_target = next_thread(tsk);
109 /*
110 * Accumulate here the counters for all threads but the
111 * group leader as they die, so they can be added into
112 * the process-wide totals when those are taken.
113 * The group leader stays around as a zombie as long
114 * as there are other threads. When it gets reaped,
115 * the exit.c code will add its counts into these totals.
116 * We won't ever get here for the group leader, since it
117 * will have been the last reference on the signal_struct.
118 */
119 sig->utime = cputime_add(sig->utime, tsk->utime);
120 sig->stime = cputime_add(sig->stime, tsk->stime);
121 sig->min_flt += tsk->min_flt;
122 sig->maj_flt += tsk->maj_flt;
123 sig->nvcsw += tsk->nvcsw;
124 sig->nivcsw += tsk->nivcsw;
6eaeeaba
ED
125 sig->inblock += task_io_get_inblock(tsk);
126 sig->oublock += task_io_get_oublock(tsk);
172ba844 127 sig->sum_sched_runtime += tsk->se.sum_exec_runtime;
6a14c5c9
ON
128 sig = NULL; /* Marker for below. */
129 }
130
5876700c
ON
131 __unhash_process(tsk);
132
6a14c5c9 133 tsk->signal = NULL;
a7e5328a 134 tsk->sighand = NULL;
6a14c5c9
ON
135 spin_unlock(&sighand->siglock);
136 rcu_read_unlock();
137
a7e5328a 138 __cleanup_sighand(sighand);
6a14c5c9
ON
139 clear_tsk_thread_flag(tsk,TIF_SIGPENDING);
140 flush_sigqueue(&tsk->pending);
141 if (sig) {
142 flush_sigqueue(&sig->shared_pending);
093a8e8a 143 taskstats_tgid_free(sig);
6a14c5c9
ON
144 __cleanup_signal(sig);
145 }
146}
147
8c7904a0
EB
148static void delayed_put_task_struct(struct rcu_head *rhp)
149{
150 put_task_struct(container_of(rhp, struct task_struct, rcu));
151}
152
1da177e4
LT
153void release_task(struct task_struct * p)
154{
36c8b586 155 struct task_struct *leader;
1da177e4 156 int zap_leader;
1f09f974 157repeat:
1da177e4 158 atomic_dec(&p->user->processes);
1da177e4 159 write_lock_irq(&tasklist_lock);
1f09f974 160 ptrace_unlink(p);
1da177e4
LT
161 BUG_ON(!list_empty(&p->ptrace_list) || !list_empty(&p->ptrace_children));
162 __exit_signal(p);
35f5cad8 163
1da177e4
LT
164 /*
165 * If we are the last non-leader member of the thread
166 * group, and the leader is zombie, then notify the
167 * group leader's parent process. (if it wants notification.)
168 */
169 zap_leader = 0;
170 leader = p->group_leader;
171 if (leader != p && thread_group_empty(leader) && leader->exit_state == EXIT_ZOMBIE) {
172 BUG_ON(leader->exit_signal == -1);
173 do_notify_parent(leader, leader->exit_signal);
174 /*
175 * If we were the last child thread and the leader has
176 * exited already, and the leader's parent ignores SIGCHLD,
177 * then we are the one who should release the leader.
178 *
179 * do_notify_parent() will have marked it self-reaping in
180 * that case.
181 */
182 zap_leader = (leader->exit_signal == -1);
183 }
184
1da177e4 185 write_unlock_irq(&tasklist_lock);
48e6484d 186 proc_flush_task(p);
1da177e4 187 release_thread(p);
8c7904a0 188 call_rcu(&p->rcu, delayed_put_task_struct);
1da177e4
LT
189
190 p = leader;
191 if (unlikely(zap_leader))
192 goto repeat;
193}
194
1da177e4
LT
195/*
196 * This checks not only the pgrp, but falls back on the pid if no
197 * satisfactory pgrp is found. I dunno - gdb doesn't work correctly
198 * without this...
04a2e6a5
EB
199 *
200 * The caller must hold rcu lock or the tasklist lock.
1da177e4 201 */
04a2e6a5 202struct pid *session_of_pgrp(struct pid *pgrp)
1da177e4
LT
203{
204 struct task_struct *p;
04a2e6a5 205 struct pid *sid = NULL;
62dfb554 206
04a2e6a5 207 p = pid_task(pgrp, PIDTYPE_PGID);
62dfb554 208 if (p == NULL)
04a2e6a5 209 p = pid_task(pgrp, PIDTYPE_PID);
62dfb554 210 if (p != NULL)
04a2e6a5 211 sid = task_session(p);
62dfb554 212
1da177e4
LT
213 return sid;
214}
215
216/*
217 * Determine if a process group is "orphaned", according to the POSIX
218 * definition in 2.2.2.52. Orphaned process groups are not to be affected
219 * by terminal-generated stop signals. Newly orphaned process groups are
220 * to receive a SIGHUP and a SIGCONT.
221 *
222 * "I ask you, have you ever known what it is to be an orphan?"
223 */
0475ac08 224static int will_become_orphaned_pgrp(struct pid *pgrp, struct task_struct *ignored_task)
1da177e4
LT
225{
226 struct task_struct *p;
227 int ret = 1;
228
0475ac08 229 do_each_pid_task(pgrp, PIDTYPE_PGID, p) {
1da177e4
LT
230 if (p == ignored_task
231 || p->exit_state
f400e198 232 || is_init(p->real_parent))
1da177e4 233 continue;
0475ac08
EB
234 if (task_pgrp(p->real_parent) != pgrp &&
235 task_session(p->real_parent) == task_session(p)) {
1da177e4
LT
236 ret = 0;
237 break;
238 }
0475ac08 239 } while_each_pid_task(pgrp, PIDTYPE_PGID, p);
1da177e4
LT
240 return ret; /* (sighing) "Often!" */
241}
242
3e7cd6c4 243int is_current_pgrp_orphaned(void)
1da177e4
LT
244{
245 int retval;
246
247 read_lock(&tasklist_lock);
3e7cd6c4 248 retval = will_become_orphaned_pgrp(task_pgrp(current), NULL);
1da177e4
LT
249 read_unlock(&tasklist_lock);
250
251 return retval;
252}
253
0475ac08 254static int has_stopped_jobs(struct pid *pgrp)
1da177e4
LT
255{
256 int retval = 0;
257 struct task_struct *p;
258
0475ac08 259 do_each_pid_task(pgrp, PIDTYPE_PGID, p) {
1da177e4
LT
260 if (p->state != TASK_STOPPED)
261 continue;
1da177e4
LT
262 retval = 1;
263 break;
0475ac08 264 } while_each_pid_task(pgrp, PIDTYPE_PGID, p);
1da177e4
LT
265 return retval;
266}
267
268/**
49d769d5 269 * reparent_to_kthreadd - Reparent the calling kernel thread to kthreadd
1da177e4
LT
270 *
271 * If a kernel thread is launched as a result of a system call, or if
49d769d5
EB
272 * it ever exits, it should generally reparent itself to kthreadd so it
273 * isn't in the way of other processes and is correctly cleaned up on exit.
1da177e4
LT
274 *
275 * The various task state such as scheduling policy and priority may have
276 * been inherited from a user process, so we reset them to sane values here.
277 *
49d769d5 278 * NOTE that reparent_to_kthreadd() gives the caller full capabilities.
1da177e4 279 */
49d769d5 280static void reparent_to_kthreadd(void)
1da177e4
LT
281{
282 write_lock_irq(&tasklist_lock);
283
284 ptrace_unlink(current);
285 /* Reparent to init */
9b678ece 286 remove_parent(current);
49d769d5 287 current->real_parent = current->parent = kthreadd_task;
9b678ece 288 add_parent(current);
1da177e4
LT
289
290 /* Set the exit signal to SIGCHLD so we signal init on exit */
291 current->exit_signal = SIGCHLD;
292
e05606d3 293 if (task_nice(current) < 0)
1da177e4
LT
294 set_user_nice(current, 0);
295 /* cpus_allowed? */
296 /* rt_priority? */
297 /* signals? */
298 security_task_reparent_to_init(current);
299 memcpy(current->signal->rlim, init_task.signal->rlim,
300 sizeof(current->signal->rlim));
301 atomic_inc(&(INIT_USER->__count));
302 write_unlock_irq(&tasklist_lock);
303 switch_uid(INIT_USER);
304}
305
306void __set_special_pids(pid_t session, pid_t pgrp)
307{
e19f247a 308 struct task_struct *curr = current->group_leader;
1da177e4 309
937949d9 310 if (process_session(curr) != session) {
1da177e4 311 detach_pid(curr, PIDTYPE_SID);
1ec320af 312 set_signal_session(curr->signal, session);
e713d0da 313 attach_pid(curr, PIDTYPE_SID, find_pid(session));
1da177e4
LT
314 }
315 if (process_group(curr) != pgrp) {
316 detach_pid(curr, PIDTYPE_PGID);
317 curr->signal->pgrp = pgrp;
e713d0da 318 attach_pid(curr, PIDTYPE_PGID, find_pid(pgrp));
1da177e4
LT
319 }
320}
321
ae424ae4 322static void set_special_pids(pid_t session, pid_t pgrp)
1da177e4
LT
323{
324 write_lock_irq(&tasklist_lock);
325 __set_special_pids(session, pgrp);
326 write_unlock_irq(&tasklist_lock);
327}
328
329/*
330 * Let kernel threads use this to say that they
331 * allow a certain signal (since daemonize() will
332 * have disabled all of them by default).
333 */
334int allow_signal(int sig)
335{
7ed20e1a 336 if (!valid_signal(sig) || sig < 1)
1da177e4
LT
337 return -EINVAL;
338
339 spin_lock_irq(&current->sighand->siglock);
340 sigdelset(&current->blocked, sig);
341 if (!current->mm) {
342 /* Kernel threads handle their own signals.
343 Let the signal code know it'll be handled, so
344 that they don't get converted to SIGKILL or
345 just silently dropped */
346 current->sighand->action[(sig)-1].sa.sa_handler = (void __user *)2;
347 }
348 recalc_sigpending();
349 spin_unlock_irq(&current->sighand->siglock);
350 return 0;
351}
352
353EXPORT_SYMBOL(allow_signal);
354
355int disallow_signal(int sig)
356{
7ed20e1a 357 if (!valid_signal(sig) || sig < 1)
1da177e4
LT
358 return -EINVAL;
359
360 spin_lock_irq(&current->sighand->siglock);
10ab825b 361 current->sighand->action[(sig)-1].sa.sa_handler = SIG_IGN;
1da177e4
LT
362 recalc_sigpending();
363 spin_unlock_irq(&current->sighand->siglock);
364 return 0;
365}
366
367EXPORT_SYMBOL(disallow_signal);
368
369/*
370 * Put all the gunge required to become a kernel thread without
371 * attached user resources in one place where it belongs.
372 */
373
374void daemonize(const char *name, ...)
375{
376 va_list args;
377 struct fs_struct *fs;
378 sigset_t blocked;
379
380 va_start(args, name);
381 vsnprintf(current->comm, sizeof(current->comm), name, args);
382 va_end(args);
383
384 /*
385 * If we were started as result of loading a module, close all of the
386 * user space pages. We don't need them, and if we didn't close them
387 * they would be locked into memory.
388 */
389 exit_mm(current);
390
391 set_special_pids(1, 1);
24ec839c 392 proc_clear_tty(current);
1da177e4
LT
393
394 /* Block and flush all signals */
395 sigfillset(&blocked);
396 sigprocmask(SIG_BLOCK, &blocked, NULL);
397 flush_signals(current);
398
399 /* Become as one with the init task */
400
401 exit_fs(current); /* current->fs->count--; */
402 fs = init_task.fs;
403 current->fs = fs;
404 atomic_inc(&fs->count);
ab516013 405
444f378b 406 exit_task_namespaces(current);
ab516013 407 current->nsproxy = init_task.nsproxy;
ab516013
SH
408 get_task_namespaces(current);
409
1da177e4
LT
410 exit_files(current);
411 current->files = init_task.files;
412 atomic_inc(&current->files->count);
413
49d769d5 414 reparent_to_kthreadd();
1da177e4
LT
415}
416
417EXPORT_SYMBOL(daemonize);
418
858119e1 419static void close_files(struct files_struct * files)
1da177e4
LT
420{
421 int i, j;
badf1662 422 struct fdtable *fdt;
1da177e4
LT
423
424 j = 0;
4fb3a538
DS
425
426 /*
427 * It is safe to dereference the fd table without RCU or
428 * ->file_lock because this is the last reference to the
429 * files structure.
430 */
badf1662 431 fdt = files_fdtable(files);
1da177e4
LT
432 for (;;) {
433 unsigned long set;
434 i = j * __NFDBITS;
bbea9f69 435 if (i >= fdt->max_fds)
1da177e4 436 break;
badf1662 437 set = fdt->open_fds->fds_bits[j++];
1da177e4
LT
438 while (set) {
439 if (set & 1) {
badf1662 440 struct file * file = xchg(&fdt->fd[i], NULL);
944be0b2 441 if (file) {
1da177e4 442 filp_close(file, files);
944be0b2
IM
443 cond_resched();
444 }
1da177e4
LT
445 }
446 i++;
447 set >>= 1;
448 }
449 }
450}
451
452struct files_struct *get_files_struct(struct task_struct *task)
453{
454 struct files_struct *files;
455
456 task_lock(task);
457 files = task->files;
458 if (files)
459 atomic_inc(&files->count);
460 task_unlock(task);
461
462 return files;
463}
464
465void fastcall put_files_struct(struct files_struct *files)
466{
badf1662
DS
467 struct fdtable *fdt;
468
1da177e4
LT
469 if (atomic_dec_and_test(&files->count)) {
470 close_files(files);
471 /*
472 * Free the fd and fdset arrays if we expanded them.
ab2af1f5
DS
473 * If the fdtable was embedded, pass files for freeing
474 * at the end of the RCU grace period. Otherwise,
475 * you can free files immediately.
1da177e4 476 */
badf1662 477 fdt = files_fdtable(files);
4fd45812 478 if (fdt != &files->fdtab)
ab2af1f5 479 kmem_cache_free(files_cachep, files);
01b2d93c 480 free_fdtable(fdt);
1da177e4
LT
481 }
482}
483
484EXPORT_SYMBOL(put_files_struct);
485
3b9b8ab6
KK
486void reset_files_struct(struct task_struct *tsk, struct files_struct *files)
487{
488 struct files_struct *old;
489
490 old = tsk->files;
491 task_lock(tsk);
492 tsk->files = files;
493 task_unlock(tsk);
494 put_files_struct(old);
495}
496EXPORT_SYMBOL(reset_files_struct);
497
1da177e4
LT
498static inline void __exit_files(struct task_struct *tsk)
499{
500 struct files_struct * files = tsk->files;
501
502 if (files) {
503 task_lock(tsk);
504 tsk->files = NULL;
505 task_unlock(tsk);
506 put_files_struct(files);
507 }
508}
509
510void exit_files(struct task_struct *tsk)
511{
512 __exit_files(tsk);
513}
514
515static inline void __put_fs_struct(struct fs_struct *fs)
516{
517 /* No need to hold fs->lock if we are killing it */
518 if (atomic_dec_and_test(&fs->count)) {
519 dput(fs->root);
520 mntput(fs->rootmnt);
521 dput(fs->pwd);
522 mntput(fs->pwdmnt);
523 if (fs->altroot) {
524 dput(fs->altroot);
525 mntput(fs->altrootmnt);
526 }
527 kmem_cache_free(fs_cachep, fs);
528 }
529}
530
531void put_fs_struct(struct fs_struct *fs)
532{
533 __put_fs_struct(fs);
534}
535
536static inline void __exit_fs(struct task_struct *tsk)
537{
538 struct fs_struct * fs = tsk->fs;
539
540 if (fs) {
541 task_lock(tsk);
542 tsk->fs = NULL;
543 task_unlock(tsk);
544 __put_fs_struct(fs);
545 }
546}
547
548void exit_fs(struct task_struct *tsk)
549{
550 __exit_fs(tsk);
551}
552
553EXPORT_SYMBOL_GPL(exit_fs);
554
555/*
556 * Turn us into a lazy TLB process if we
557 * aren't already..
558 */
408b664a 559static void exit_mm(struct task_struct * tsk)
1da177e4
LT
560{
561 struct mm_struct *mm = tsk->mm;
562
563 mm_release(tsk, mm);
564 if (!mm)
565 return;
566 /*
567 * Serialize with any possible pending coredump.
568 * We must hold mmap_sem around checking core_waiters
569 * and clearing tsk->mm. The core-inducing thread
570 * will increment core_waiters for each thread in the
571 * group with ->mm != NULL.
572 */
573 down_read(&mm->mmap_sem);
574 if (mm->core_waiters) {
575 up_read(&mm->mmap_sem);
576 down_write(&mm->mmap_sem);
577 if (!--mm->core_waiters)
578 complete(mm->core_startup_done);
579 up_write(&mm->mmap_sem);
580
581 wait_for_completion(&mm->core_done);
582 down_read(&mm->mmap_sem);
583 }
584 atomic_inc(&mm->mm_count);
125e1874 585 BUG_ON(mm != tsk->active_mm);
1da177e4
LT
586 /* more a memory barrier than a real lock */
587 task_lock(tsk);
588 tsk->mm = NULL;
589 up_read(&mm->mmap_sem);
590 enter_lazy_tlb(mm, current);
591 task_unlock(tsk);
592 mmput(mm);
593}
594
36c8b586
IM
595static inline void
596choose_new_parent(struct task_struct *p, struct task_struct *reaper)
1da177e4
LT
597{
598 /*
599 * Make sure we're not reparenting to ourselves and that
600 * the parent is not a zombie.
601 */
d799f035 602 BUG_ON(p == reaper || reaper->exit_state);
1da177e4 603 p->real_parent = reaper;
1da177e4
LT
604}
605
36c8b586
IM
606static void
607reparent_thread(struct task_struct *p, struct task_struct *father, int traced)
1da177e4 608{
241ceee0
ON
609 if (p->pdeath_signal)
610 /* We already hold the tasklist_lock here. */
611 group_send_sig_info(p->pdeath_signal, SEND_SIG_NOINFO, p);
612
1da177e4
LT
613 /* Move the child from its dying parent to the new one. */
614 if (unlikely(traced)) {
615 /* Preserve ptrace links if someone else is tracing this child. */
616 list_del_init(&p->ptrace_list);
617 if (p->parent != p->real_parent)
618 list_add(&p->ptrace_list, &p->real_parent->ptrace_children);
619 } else {
620 /* If this child is being traced, then we're the one tracing it
621 * anyway, so let go of it.
622 */
623 p->ptrace = 0;
6ac781b1 624 remove_parent(p);
1da177e4 625 p->parent = p->real_parent;
6ac781b1 626 add_parent(p);
1da177e4 627
b2b2cbc4 628 if (p->state == TASK_TRACED) {
1da177e4
LT
629 /*
630 * If it was at a trace stop, turn it into
631 * a normal stop since it's no longer being
632 * traced.
633 */
634 ptrace_untrace(p);
635 }
636 }
637
b2b2cbc4
EB
638 /* If this is a threaded reparent there is no need to
639 * notify anyone anything has happened.
640 */
641 if (p->real_parent->group_leader == father->group_leader)
642 return;
643
644 /* We don't want people slaying init. */
645 if (p->exit_signal != -1)
646 p->exit_signal = SIGCHLD;
b2b2cbc4
EB
647
648 /* If we'd notified the old parent about this child's death,
649 * also notify the new parent.
650 */
651 if (!traced && p->exit_state == EXIT_ZOMBIE &&
652 p->exit_signal != -1 && thread_group_empty(p))
653 do_notify_parent(p, p->exit_signal);
654
1da177e4
LT
655 /*
656 * process group orphan check
657 * Case ii: Our child is in a different pgrp
658 * than we are, and it was the only connection
659 * outside, so the child pgrp is now orphaned.
660 */
0475ac08
EB
661 if ((task_pgrp(p) != task_pgrp(father)) &&
662 (task_session(p) == task_session(father))) {
663 struct pid *pgrp = task_pgrp(p);
1da177e4 664
937949d9
CLG
665 if (will_become_orphaned_pgrp(pgrp, NULL) &&
666 has_stopped_jobs(pgrp)) {
0475ac08
EB
667 __kill_pgrp_info(SIGHUP, SEND_SIG_PRIV, pgrp);
668 __kill_pgrp_info(SIGCONT, SEND_SIG_PRIV, pgrp);
1da177e4
LT
669 }
670 }
671}
672
673/*
674 * When we die, we re-parent all our children.
675 * Try to give them to another thread in our thread
676 * group, and if no such member exists, give it to
84d73786
SB
677 * the child reaper process (ie "init") in our pid
678 * space.
1da177e4 679 */
36c8b586
IM
680static void
681forget_original_parent(struct task_struct *father, struct list_head *to_release)
1da177e4
LT
682{
683 struct task_struct *p, *reaper = father;
684 struct list_head *_p, *_n;
685
686 do {
687 reaper = next_thread(reaper);
688 if (reaper == father) {
84d73786 689 reaper = child_reaper(father);
1da177e4
LT
690 break;
691 }
692 } while (reaper->exit_state);
693
694 /*
695 * There are only two places where our children can be:
696 *
697 * - in our child list
698 * - in our ptraced child list
699 *
700 * Search them and reparent children.
701 */
702 list_for_each_safe(_p, _n, &father->children) {
703 int ptrace;
36c8b586 704 p = list_entry(_p, struct task_struct, sibling);
1da177e4
LT
705
706 ptrace = p->ptrace;
707
708 /* if father isn't the real parent, then ptrace must be enabled */
709 BUG_ON(father != p->real_parent && !ptrace);
710
711 if (father == p->real_parent) {
712 /* reparent with a reaper, real father it's us */
d799f035 713 choose_new_parent(p, reaper);
1da177e4
LT
714 reparent_thread(p, father, 0);
715 } else {
716 /* reparent ptraced task to its real parent */
717 __ptrace_unlink (p);
718 if (p->exit_state == EXIT_ZOMBIE && p->exit_signal != -1 &&
719 thread_group_empty(p))
720 do_notify_parent(p, p->exit_signal);
721 }
722
723 /*
724 * if the ptraced child is a zombie with exit_signal == -1
725 * we must collect it before we exit, or it will remain
726 * zombie forever since we prevented it from self-reap itself
727 * while it was being traced by us, to be able to see it in wait4.
728 */
729 if (unlikely(ptrace && p->exit_state == EXIT_ZOMBIE && p->exit_signal == -1))
730 list_add(&p->ptrace_list, to_release);
731 }
732 list_for_each_safe(_p, _n, &father->ptrace_children) {
36c8b586 733 p = list_entry(_p, struct task_struct, ptrace_list);
d799f035 734 choose_new_parent(p, reaper);
1da177e4
LT
735 reparent_thread(p, father, 1);
736 }
737}
738
739/*
740 * Send signals to all our closest relatives so that they know
741 * to properly mourn us..
742 */
743static void exit_notify(struct task_struct *tsk)
744{
745 int state;
746 struct task_struct *t;
747 struct list_head ptrace_dead, *_p, *_n;
0475ac08 748 struct pid *pgrp;
1da177e4
LT
749
750 if (signal_pending(tsk) && !(tsk->signal->flags & SIGNAL_GROUP_EXIT)
751 && !thread_group_empty(tsk)) {
752 /*
753 * This occurs when there was a race between our exit
754 * syscall and a group signal choosing us as the one to
755 * wake up. It could be that we are the only thread
756 * alerted to check for pending signals, but another thread
757 * should be woken now to take the signal since we will not.
758 * Now we'll wake all the threads in the group just to make
759 * sure someone gets all the pending signals.
760 */
761 read_lock(&tasklist_lock);
762 spin_lock_irq(&tsk->sighand->siglock);
763 for (t = next_thread(tsk); t != tsk; t = next_thread(t))
7bb44ade
RM
764 if (!signal_pending(t) && !(t->flags & PF_EXITING))
765 recalc_sigpending_and_wake(t);
1da177e4
LT
766 spin_unlock_irq(&tsk->sighand->siglock);
767 read_unlock(&tasklist_lock);
768 }
769
770 write_lock_irq(&tasklist_lock);
771
772 /*
773 * This does two things:
774 *
775 * A. Make init inherit all the child processes
776 * B. Check to see if any process groups have become orphaned
777 * as a result of our exiting, and if they have any stopped
778 * jobs, send them a SIGHUP and then a SIGCONT. (POSIX 3.2.2.2)
779 */
780
781 INIT_LIST_HEAD(&ptrace_dead);
782 forget_original_parent(tsk, &ptrace_dead);
783 BUG_ON(!list_empty(&tsk->children));
784 BUG_ON(!list_empty(&tsk->ptrace_children));
785
786 /*
787 * Check to see if any process groups have become orphaned
788 * as a result of our exiting, and if they have any stopped
789 * jobs, send them a SIGHUP and then a SIGCONT. (POSIX 3.2.2.2)
790 *
791 * Case i: Our father is in a different pgrp than we are
792 * and we were the only connection outside, so our pgrp
793 * is about to become orphaned.
794 */
795
796 t = tsk->real_parent;
797
0475ac08
EB
798 pgrp = task_pgrp(tsk);
799 if ((task_pgrp(t) != pgrp) &&
14e9d573 800 (task_session(t) == task_session(tsk)) &&
0475ac08
EB
801 will_become_orphaned_pgrp(pgrp, tsk) &&
802 has_stopped_jobs(pgrp)) {
803 __kill_pgrp_info(SIGHUP, SEND_SIG_PRIV, pgrp);
804 __kill_pgrp_info(SIGCONT, SEND_SIG_PRIV, pgrp);
1da177e4
LT
805 }
806
807 /* Let father know we died
808 *
809 * Thread signals are configurable, but you aren't going to use
810 * that to send signals to arbitary processes.
811 * That stops right now.
812 *
813 * If the parent exec id doesn't match the exec id we saved
814 * when we started then we know the parent has changed security
815 * domain.
816 *
817 * If our self_exec id doesn't match our parent_exec_id then
818 * we have changed execution domain as these two values started
819 * the same after a fork.
820 *
821 */
822
823 if (tsk->exit_signal != SIGCHLD && tsk->exit_signal != -1 &&
824 ( tsk->parent_exec_id != t->self_exec_id ||
825 tsk->self_exec_id != tsk->parent_exec_id)
826 && !capable(CAP_KILL))
827 tsk->exit_signal = SIGCHLD;
828
829
830 /* If something other than our normal parent is ptracing us, then
831 * send it a SIGCHLD instead of honoring exit_signal. exit_signal
832 * only has special meaning to our real parent.
833 */
834 if (tsk->exit_signal != -1 && thread_group_empty(tsk)) {
835 int signal = tsk->parent == tsk->real_parent ? tsk->exit_signal : SIGCHLD;
836 do_notify_parent(tsk, signal);
837 } else if (tsk->ptrace) {
838 do_notify_parent(tsk, SIGCHLD);
839 }
840
841 state = EXIT_ZOMBIE;
842 if (tsk->exit_signal == -1 &&
843 (likely(tsk->ptrace == 0) ||
844 unlikely(tsk->parent->signal->flags & SIGNAL_GROUP_EXIT)))
845 state = EXIT_DEAD;
846 tsk->exit_state = state;
847
848 write_unlock_irq(&tasklist_lock);
849
850 list_for_each_safe(_p, _n, &ptrace_dead) {
851 list_del_init(_p);
36c8b586 852 t = list_entry(_p, struct task_struct, ptrace_list);
1da177e4
LT
853 release_task(t);
854 }
855
856 /* If the process is dead, release it - nobody will wait for it */
857 if (state == EXIT_DEAD)
858 release_task(tsk);
1da177e4
LT
859}
860
e18eecb8
JD
861#ifdef CONFIG_DEBUG_STACK_USAGE
862static void check_stack_usage(void)
863{
864 static DEFINE_SPINLOCK(low_water_lock);
865 static int lowest_to_date = THREAD_SIZE;
866 unsigned long *n = end_of_stack(current);
867 unsigned long free;
868
869 while (*n == 0)
870 n++;
871 free = (unsigned long)n - (unsigned long)end_of_stack(current);
872
873 if (free >= lowest_to_date)
874 return;
875
876 spin_lock(&low_water_lock);
877 if (free < lowest_to_date) {
878 printk(KERN_WARNING "%s used greatest stack depth: %lu bytes "
879 "left\n",
880 current->comm, free);
881 lowest_to_date = free;
882 }
883 spin_unlock(&low_water_lock);
884}
885#else
886static inline void check_stack_usage(void) {}
887#endif
888
1da177e4
LT
889fastcall NORET_TYPE void do_exit(long code)
890{
891 struct task_struct *tsk = current;
892 int group_dead;
893
894 profile_task_exit(tsk);
895
22e2c507
JA
896 WARN_ON(atomic_read(&tsk->fs_excl));
897
1da177e4
LT
898 if (unlikely(in_interrupt()))
899 panic("Aiee, killing interrupt handler!");
900 if (unlikely(!tsk->pid))
901 panic("Attempted to kill the idle task!");
84d73786
SB
902 if (unlikely(tsk == child_reaper(tsk))) {
903 if (tsk->nsproxy->pid_ns != &init_pid_ns)
904 tsk->nsproxy->pid_ns->child_reaper = init_pid_ns.child_reaper;
905 else
906 panic("Attempted to kill init!");
907 }
908
1da177e4
LT
909
910 if (unlikely(current->ptrace & PT_TRACE_EXIT)) {
911 current->ptrace_message = code;
912 ptrace_notify((PTRACE_EVENT_EXIT << 8) | SIGTRAP);
913 }
914
df164db5
AN
915 /*
916 * We're taking recursive faults here in do_exit. Safest is to just
917 * leave this task alone and wait for reboot.
918 */
919 if (unlikely(tsk->flags & PF_EXITING)) {
920 printk(KERN_ALERT
921 "Fixing recursive fault but reboot is needed!\n");
778e9a9c
AK
922 /*
923 * We can do this unlocked here. The futex code uses
924 * this flag just to verify whether the pi state
925 * cleanup has been done or not. In the worst case it
926 * loops once more. We pretend that the cleanup was
927 * done as there is no way to return. Either the
928 * OWNER_DIED bit is set by now or we push the blocked
929 * task into the wait for ever nirwana as well.
930 */
931 tsk->flags |= PF_EXITPIDONE;
afc847b7
AV
932 if (tsk->io_context)
933 exit_io_context();
df164db5
AN
934 set_current_state(TASK_UNINTERRUPTIBLE);
935 schedule();
936 }
937
778e9a9c
AK
938 /*
939 * tsk->flags are checked in the futex code to protect against
940 * an exiting task cleaning up the robust pi futexes.
941 */
942 spin_lock_irq(&tsk->pi_lock);
1da177e4 943 tsk->flags |= PF_EXITING;
778e9a9c 944 spin_unlock_irq(&tsk->pi_lock);
1da177e4 945
1da177e4
LT
946 if (unlikely(in_atomic()))
947 printk(KERN_INFO "note: %s[%d] exited with preempt_count %d\n",
948 current->comm, current->pid,
949 preempt_count());
950
951 acct_update_integrals(tsk);
365e9c87
HD
952 if (tsk->mm) {
953 update_hiwater_rss(tsk->mm);
954 update_hiwater_vm(tsk->mm);
955 }
1da177e4 956 group_dead = atomic_dec_and_test(&tsk->signal->live);
c3068951 957 if (group_dead) {
778e9a9c 958 hrtimer_cancel(&tsk->signal->real_timer);
25f407f0 959 exit_itimers(tsk->signal);
c3068951 960 }
f6ec29a4 961 acct_collect(code, group_dead);
0771dfef
IM
962 if (unlikely(tsk->robust_list))
963 exit_robust_list(tsk);
2aa92581 964#if defined(CONFIG_FUTEX) && defined(CONFIG_COMPAT)
34f192c6
IM
965 if (unlikely(tsk->compat_robust_list))
966 compat_exit_robust_list(tsk);
967#endif
fa84cb93
AV
968 if (unlikely(tsk->audit_context))
969 audit_free(tsk);
115085ea
ON
970
971 taskstats_exit(tsk, group_dead);
c757249a 972
1da177e4
LT
973 exit_mm(tsk);
974
0e464814 975 if (group_dead)
f6ec29a4 976 acct_process();
1da177e4
LT
977 exit_sem(tsk);
978 __exit_files(tsk);
979 __exit_fs(tsk);
e18eecb8 980 check_stack_usage();
1da177e4
LT
981 exit_thread();
982 cpuset_exit(tsk);
983 exit_keys(tsk);
984
985 if (group_dead && tsk->signal->leader)
986 disassociate_ctty(1);
987
a1261f54 988 module_put(task_thread_info(tsk)->exec_domain->module);
1da177e4
LT
989 if (tsk->binfmt)
990 module_put(tsk->binfmt->module);
991
992 tsk->exit_code = code;
9f46080c 993 proc_exit_connector(tsk);
444f378b 994 exit_task_namespaces(tsk);
0f245285 995 exit_notify(tsk);
1da177e4
LT
996#ifdef CONFIG_NUMA
997 mpol_free(tsk->mempolicy);
998 tsk->mempolicy = NULL;
999#endif
c87e2837
IM
1000 /*
1001 * This must happen late, after the PID is not
1002 * hashed anymore:
1003 */
1004 if (unlikely(!list_empty(&tsk->pi_state_list)))
1005 exit_pi_state_list(tsk);
1006 if (unlikely(current->pi_state_cache))
1007 kfree(current->pi_state_cache);
de5097c2 1008 /*
9a11b49a 1009 * Make sure we are holding no locks:
de5097c2 1010 */
9a11b49a 1011 debug_check_no_locks_held(tsk);
778e9a9c
AK
1012 /*
1013 * We can do this unlocked here. The futex code uses this flag
1014 * just to verify whether the pi state cleanup has been done
1015 * or not. In the worst case it loops once more.
1016 */
1017 tsk->flags |= PF_EXITPIDONE;
1da177e4 1018
afc847b7
AV
1019 if (tsk->io_context)
1020 exit_io_context();
1021
b92ce558
JA
1022 if (tsk->splice_pipe)
1023 __free_pipe_info(tsk->splice_pipe);
1024
7407251a 1025 preempt_disable();
55a101f8 1026 /* causes final put_task_struct in finish_task_switch(). */
c394cc9f 1027 tsk->state = TASK_DEAD;
7407251a 1028
1da177e4
LT
1029 schedule();
1030 BUG();
1031 /* Avoid "noreturn function does return". */
54306cf0
AC
1032 for (;;)
1033 cpu_relax(); /* For when BUG is null */
1da177e4
LT
1034}
1035
012914da
RA
1036EXPORT_SYMBOL_GPL(do_exit);
1037
1da177e4
LT
1038NORET_TYPE void complete_and_exit(struct completion *comp, long code)
1039{
1040 if (comp)
1041 complete(comp);
55a101f8 1042
1da177e4
LT
1043 do_exit(code);
1044}
1045
1046EXPORT_SYMBOL(complete_and_exit);
1047
1048asmlinkage long sys_exit(int error_code)
1049{
1050 do_exit((error_code&0xff)<<8);
1051}
1052
1da177e4
LT
1053/*
1054 * Take down every thread in the group. This is called by fatal signals
1055 * as well as by sys_exit_group (below).
1056 */
1057NORET_TYPE void
1058do_group_exit(int exit_code)
1059{
1060 BUG_ON(exit_code & 0x80); /* core dumps don't get here */
1061
1062 if (current->signal->flags & SIGNAL_GROUP_EXIT)
1063 exit_code = current->signal->group_exit_code;
1064 else if (!thread_group_empty(current)) {
1065 struct signal_struct *const sig = current->signal;
1066 struct sighand_struct *const sighand = current->sighand;
1da177e4
LT
1067 spin_lock_irq(&sighand->siglock);
1068 if (sig->flags & SIGNAL_GROUP_EXIT)
1069 /* Another thread got here before we took the lock. */
1070 exit_code = sig->group_exit_code;
1071 else {
1da177e4
LT
1072 sig->group_exit_code = exit_code;
1073 zap_other_threads(current);
1074 }
1075 spin_unlock_irq(&sighand->siglock);
1da177e4
LT
1076 }
1077
1078 do_exit(exit_code);
1079 /* NOTREACHED */
1080}
1081
1082/*
1083 * this kills every thread in the thread group. Note that any externally
1084 * wait4()-ing process will get the correct exit code - even if this
1085 * thread is not the thread group leader.
1086 */
1087asmlinkage void sys_exit_group(int error_code)
1088{
1089 do_group_exit((error_code & 0xff) << 8);
1090}
1091
36c8b586 1092static int eligible_child(pid_t pid, int options, struct task_struct *p)
1da177e4 1093{
73243284
RM
1094 int err;
1095
1da177e4
LT
1096 if (pid > 0) {
1097 if (p->pid != pid)
1098 return 0;
1099 } else if (!pid) {
1100 if (process_group(p) != process_group(current))
1101 return 0;
1102 } else if (pid != -1) {
1103 if (process_group(p) != -pid)
1104 return 0;
1105 }
1106
1107 /*
1108 * Do not consider detached threads that are
1109 * not ptraced:
1110 */
1111 if (p->exit_signal == -1 && !p->ptrace)
1112 return 0;
1113
1114 /* Wait for all children (clone and not) if __WALL is set;
1115 * otherwise, wait for clone children *only* if __WCLONE is
1116 * set; otherwise, wait for non-clone children *only*. (Note:
1117 * A "clone" child here is one that reports to its parent
1118 * using a signal other than SIGCHLD.) */
1119 if (((p->exit_signal != SIGCHLD) ^ ((options & __WCLONE) != 0))
1120 && !(options & __WALL))
1121 return 0;
1122 /*
1123 * Do not consider thread group leaders that are
1124 * in a non-empty thread group:
1125 */
3b6362b8 1126 if (delay_group_leader(p))
1da177e4
LT
1127 return 2;
1128
73243284
RM
1129 err = security_task_wait(p);
1130 if (err)
1131 return err;
1da177e4
LT
1132
1133 return 1;
1134}
1135
36c8b586 1136static int wait_noreap_copyout(struct task_struct *p, pid_t pid, uid_t uid,
1da177e4
LT
1137 int why, int status,
1138 struct siginfo __user *infop,
1139 struct rusage __user *rusagep)
1140{
1141 int retval = rusagep ? getrusage(p, RUSAGE_BOTH, rusagep) : 0;
36c8b586 1142
1da177e4
LT
1143 put_task_struct(p);
1144 if (!retval)
1145 retval = put_user(SIGCHLD, &infop->si_signo);
1146 if (!retval)
1147 retval = put_user(0, &infop->si_errno);
1148 if (!retval)
1149 retval = put_user((short)why, &infop->si_code);
1150 if (!retval)
1151 retval = put_user(pid, &infop->si_pid);
1152 if (!retval)
1153 retval = put_user(uid, &infop->si_uid);
1154 if (!retval)
1155 retval = put_user(status, &infop->si_status);
1156 if (!retval)
1157 retval = pid;
1158 return retval;
1159}
1160
1161/*
1162 * Handle sys_wait4 work for one task in state EXIT_ZOMBIE. We hold
1163 * read_lock(&tasklist_lock) on entry. If we return zero, we still hold
1164 * the lock and this task is uninteresting. If we return nonzero, we have
1165 * released the lock and the system call should return.
1166 */
36c8b586 1167static int wait_task_zombie(struct task_struct *p, int noreap,
1da177e4
LT
1168 struct siginfo __user *infop,
1169 int __user *stat_addr, struct rusage __user *ru)
1170{
1171 unsigned long state;
1172 int retval;
1173 int status;
1174
1175 if (unlikely(noreap)) {
1176 pid_t pid = p->pid;
1177 uid_t uid = p->uid;
1178 int exit_code = p->exit_code;
1179 int why, status;
1180
1181 if (unlikely(p->exit_state != EXIT_ZOMBIE))
1182 return 0;
1183 if (unlikely(p->exit_signal == -1 && p->ptrace == 0))
1184 return 0;
1185 get_task_struct(p);
1186 read_unlock(&tasklist_lock);
1187 if ((exit_code & 0x7f) == 0) {
1188 why = CLD_EXITED;
1189 status = exit_code >> 8;
1190 } else {
1191 why = (exit_code & 0x80) ? CLD_DUMPED : CLD_KILLED;
1192 status = exit_code & 0x7f;
1193 }
1194 return wait_noreap_copyout(p, pid, uid, why,
1195 status, infop, ru);
1196 }
1197
1198 /*
1199 * Try to move the task's state to DEAD
1200 * only one thread is allowed to do this:
1201 */
1202 state = xchg(&p->exit_state, EXIT_DEAD);
1203 if (state != EXIT_ZOMBIE) {
1204 BUG_ON(state != EXIT_DEAD);
1205 return 0;
1206 }
1207 if (unlikely(p->exit_signal == -1 && p->ptrace == 0)) {
1208 /*
1209 * This can only happen in a race with a ptraced thread
1210 * dying on another processor.
1211 */
1212 return 0;
1213 }
1214
1215 if (likely(p->real_parent == p->parent) && likely(p->signal)) {
3795e161
JJ
1216 struct signal_struct *psig;
1217 struct signal_struct *sig;
1218
1da177e4
LT
1219 /*
1220 * The resource counters for the group leader are in its
1221 * own task_struct. Those for dead threads in the group
1222 * are in its signal_struct, as are those for the child
1223 * processes it has previously reaped. All these
1224 * accumulate in the parent's signal_struct c* fields.
1225 *
1226 * We don't bother to take a lock here to protect these
1227 * p->signal fields, because they are only touched by
1228 * __exit_signal, which runs with tasklist_lock
1229 * write-locked anyway, and so is excluded here. We do
1230 * need to protect the access to p->parent->signal fields,
1231 * as other threads in the parent group can be right
1232 * here reaping other children at the same time.
1233 */
1234 spin_lock_irq(&p->parent->sighand->siglock);
3795e161
JJ
1235 psig = p->parent->signal;
1236 sig = p->signal;
1237 psig->cutime =
1238 cputime_add(psig->cutime,
1da177e4 1239 cputime_add(p->utime,
3795e161
JJ
1240 cputime_add(sig->utime,
1241 sig->cutime)));
1242 psig->cstime =
1243 cputime_add(psig->cstime,
1da177e4 1244 cputime_add(p->stime,
3795e161
JJ
1245 cputime_add(sig->stime,
1246 sig->cstime)));
1247 psig->cmin_flt +=
1248 p->min_flt + sig->min_flt + sig->cmin_flt;
1249 psig->cmaj_flt +=
1250 p->maj_flt + sig->maj_flt + sig->cmaj_flt;
1251 psig->cnvcsw +=
1252 p->nvcsw + sig->nvcsw + sig->cnvcsw;
1253 psig->cnivcsw +=
1254 p->nivcsw + sig->nivcsw + sig->cnivcsw;
6eaeeaba
ED
1255 psig->cinblock +=
1256 task_io_get_inblock(p) +
1257 sig->inblock + sig->cinblock;
1258 psig->coublock +=
1259 task_io_get_oublock(p) +
1260 sig->oublock + sig->coublock;
1da177e4
LT
1261 spin_unlock_irq(&p->parent->sighand->siglock);
1262 }
1263
1264 /*
1265 * Now we are sure this task is interesting, and no other
1266 * thread can reap it because we set its state to EXIT_DEAD.
1267 */
1268 read_unlock(&tasklist_lock);
1269
1270 retval = ru ? getrusage(p, RUSAGE_BOTH, ru) : 0;
1271 status = (p->signal->flags & SIGNAL_GROUP_EXIT)
1272 ? p->signal->group_exit_code : p->exit_code;
1273 if (!retval && stat_addr)
1274 retval = put_user(status, stat_addr);
1275 if (!retval && infop)
1276 retval = put_user(SIGCHLD, &infop->si_signo);
1277 if (!retval && infop)
1278 retval = put_user(0, &infop->si_errno);
1279 if (!retval && infop) {
1280 int why;
1281
1282 if ((status & 0x7f) == 0) {
1283 why = CLD_EXITED;
1284 status >>= 8;
1285 } else {
1286 why = (status & 0x80) ? CLD_DUMPED : CLD_KILLED;
1287 status &= 0x7f;
1288 }
1289 retval = put_user((short)why, &infop->si_code);
1290 if (!retval)
1291 retval = put_user(status, &infop->si_status);
1292 }
1293 if (!retval && infop)
1294 retval = put_user(p->pid, &infop->si_pid);
1295 if (!retval && infop)
1296 retval = put_user(p->uid, &infop->si_uid);
1297 if (retval) {
1298 // TODO: is this safe?
1299 p->exit_state = EXIT_ZOMBIE;
1300 return retval;
1301 }
1302 retval = p->pid;
1303 if (p->real_parent != p->parent) {
1304 write_lock_irq(&tasklist_lock);
1305 /* Double-check with lock held. */
1306 if (p->real_parent != p->parent) {
1307 __ptrace_unlink(p);
1308 // TODO: is this safe?
1309 p->exit_state = EXIT_ZOMBIE;
1310 /*
1311 * If this is not a detached task, notify the parent.
1312 * If it's still not detached after that, don't release
1313 * it now.
1314 */
1315 if (p->exit_signal != -1) {
1316 do_notify_parent(p, p->exit_signal);
1317 if (p->exit_signal != -1)
1318 p = NULL;
1319 }
1320 }
1321 write_unlock_irq(&tasklist_lock);
1322 }
1323 if (p != NULL)
1324 release_task(p);
1325 BUG_ON(!retval);
1326 return retval;
1327}
1328
1329/*
1330 * Handle sys_wait4 work for one task in state TASK_STOPPED. We hold
1331 * read_lock(&tasklist_lock) on entry. If we return zero, we still hold
1332 * the lock and this task is uninteresting. If we return nonzero, we have
1333 * released the lock and the system call should return.
1334 */
36c8b586
IM
1335static int wait_task_stopped(struct task_struct *p, int delayed_group_leader,
1336 int noreap, struct siginfo __user *infop,
1da177e4
LT
1337 int __user *stat_addr, struct rusage __user *ru)
1338{
1339 int retval, exit_code;
1340
1341 if (!p->exit_code)
1342 return 0;
1343 if (delayed_group_leader && !(p->ptrace & PT_PTRACED) &&
1344 p->signal && p->signal->group_stop_count > 0)
1345 /*
1346 * A group stop is in progress and this is the group leader.
1347 * We won't report until all threads have stopped.
1348 */
1349 return 0;
1350
1351 /*
1352 * Now we are pretty sure this task is interesting.
1353 * Make sure it doesn't get reaped out from under us while we
1354 * give up the lock and then examine it below. We don't want to
1355 * keep holding onto the tasklist_lock while we call getrusage and
1356 * possibly take page faults for user memory.
1357 */
1358 get_task_struct(p);
1359 read_unlock(&tasklist_lock);
1360
1361 if (unlikely(noreap)) {
1362 pid_t pid = p->pid;
1363 uid_t uid = p->uid;
1364 int why = (p->ptrace & PT_PTRACED) ? CLD_TRAPPED : CLD_STOPPED;
1365
1366 exit_code = p->exit_code;
1367 if (unlikely(!exit_code) ||
14bf01bb 1368 unlikely(p->state & TASK_TRACED))
1da177e4
LT
1369 goto bail_ref;
1370 return wait_noreap_copyout(p, pid, uid,
1371 why, (exit_code << 8) | 0x7f,
1372 infop, ru);
1373 }
1374
1375 write_lock_irq(&tasklist_lock);
1376
1377 /*
1378 * This uses xchg to be atomic with the thread resuming and setting
1379 * it. It must also be done with the write lock held to prevent a
1380 * race with the EXIT_ZOMBIE case.
1381 */
1382 exit_code = xchg(&p->exit_code, 0);
1383 if (unlikely(p->exit_state)) {
1384 /*
1385 * The task resumed and then died. Let the next iteration
1386 * catch it in EXIT_ZOMBIE. Note that exit_code might
1387 * already be zero here if it resumed and did _exit(0).
1388 * The task itself is dead and won't touch exit_code again;
1389 * other processors in this function are locked out.
1390 */
1391 p->exit_code = exit_code;
1392 exit_code = 0;
1393 }
1394 if (unlikely(exit_code == 0)) {
1395 /*
1396 * Another thread in this function got to it first, or it
1397 * resumed, or it resumed and then died.
1398 */
1399 write_unlock_irq(&tasklist_lock);
1400bail_ref:
1401 put_task_struct(p);
1402 /*
1403 * We are returning to the wait loop without having successfully
1404 * removed the process and having released the lock. We cannot
1405 * continue, since the "p" task pointer is potentially stale.
1406 *
1407 * Return -EAGAIN, and do_wait() will restart the loop from the
1408 * beginning. Do _not_ re-acquire the lock.
1409 */
1410 return -EAGAIN;
1411 }
1412
1413 /* move to end of parent's list to avoid starvation */
1414 remove_parent(p);
8fafabd8 1415 add_parent(p);
1da177e4
LT
1416
1417 write_unlock_irq(&tasklist_lock);
1418
1419 retval = ru ? getrusage(p, RUSAGE_BOTH, ru) : 0;
1420 if (!retval && stat_addr)
1421 retval = put_user((exit_code << 8) | 0x7f, stat_addr);
1422 if (!retval && infop)
1423 retval = put_user(SIGCHLD, &infop->si_signo);
1424 if (!retval && infop)
1425 retval = put_user(0, &infop->si_errno);
1426 if (!retval && infop)
1427 retval = put_user((short)((p->ptrace & PT_PTRACED)
1428 ? CLD_TRAPPED : CLD_STOPPED),
1429 &infop->si_code);
1430 if (!retval && infop)
1431 retval = put_user(exit_code, &infop->si_status);
1432 if (!retval && infop)
1433 retval = put_user(p->pid, &infop->si_pid);
1434 if (!retval && infop)
1435 retval = put_user(p->uid, &infop->si_uid);
1436 if (!retval)
1437 retval = p->pid;
1438 put_task_struct(p);
1439
1440 BUG_ON(!retval);
1441 return retval;
1442}
1443
1444/*
1445 * Handle do_wait work for one task in a live, non-stopped state.
1446 * read_lock(&tasklist_lock) on entry. If we return zero, we still hold
1447 * the lock and this task is uninteresting. If we return nonzero, we have
1448 * released the lock and the system call should return.
1449 */
36c8b586 1450static int wait_task_continued(struct task_struct *p, int noreap,
1da177e4
LT
1451 struct siginfo __user *infop,
1452 int __user *stat_addr, struct rusage __user *ru)
1453{
1454 int retval;
1455 pid_t pid;
1456 uid_t uid;
1457
1458 if (unlikely(!p->signal))
1459 return 0;
1460
1461 if (!(p->signal->flags & SIGNAL_STOP_CONTINUED))
1462 return 0;
1463
1464 spin_lock_irq(&p->sighand->siglock);
1465 /* Re-check with the lock held. */
1466 if (!(p->signal->flags & SIGNAL_STOP_CONTINUED)) {
1467 spin_unlock_irq(&p->sighand->siglock);
1468 return 0;
1469 }
1470 if (!noreap)
1471 p->signal->flags &= ~SIGNAL_STOP_CONTINUED;
1472 spin_unlock_irq(&p->sighand->siglock);
1473
1474 pid = p->pid;
1475 uid = p->uid;
1476 get_task_struct(p);
1477 read_unlock(&tasklist_lock);
1478
1479 if (!infop) {
1480 retval = ru ? getrusage(p, RUSAGE_BOTH, ru) : 0;
1481 put_task_struct(p);
1482 if (!retval && stat_addr)
1483 retval = put_user(0xffff, stat_addr);
1484 if (!retval)
1485 retval = p->pid;
1486 } else {
1487 retval = wait_noreap_copyout(p, pid, uid,
1488 CLD_CONTINUED, SIGCONT,
1489 infop, ru);
1490 BUG_ON(retval == 0);
1491 }
1492
1493 return retval;
1494}
1495
1496
1497static inline int my_ptrace_child(struct task_struct *p)
1498{
1499 if (!(p->ptrace & PT_PTRACED))
1500 return 0;
1501 if (!(p->ptrace & PT_ATTACHED))
1502 return 1;
1503 /*
1504 * This child was PTRACE_ATTACH'd. We should be seeing it only if
1505 * we are the attacher. If we are the real parent, this is a race
1506 * inside ptrace_attach. It is waiting for the tasklist_lock,
1507 * which we have to switch the parent links, but has already set
1508 * the flags in p->ptrace.
1509 */
1510 return (p->parent != p->real_parent);
1511}
1512
1513static long do_wait(pid_t pid, int options, struct siginfo __user *infop,
1514 int __user *stat_addr, struct rusage __user *ru)
1515{
1516 DECLARE_WAITQUEUE(wait, current);
1517 struct task_struct *tsk;
1518 int flag, retval;
73243284 1519 int allowed, denied;
1da177e4
LT
1520
1521 add_wait_queue(&current->signal->wait_chldexit,&wait);
1522repeat:
1523 /*
1524 * We will set this flag if we see any child that might later
1525 * match our criteria, even if we are not able to reap it yet.
1526 */
1527 flag = 0;
73243284 1528 allowed = denied = 0;
1da177e4
LT
1529 current->state = TASK_INTERRUPTIBLE;
1530 read_lock(&tasklist_lock);
1531 tsk = current;
1532 do {
1533 struct task_struct *p;
1534 struct list_head *_p;
1535 int ret;
1536
1537 list_for_each(_p,&tsk->children) {
36c8b586 1538 p = list_entry(_p, struct task_struct, sibling);
1da177e4
LT
1539
1540 ret = eligible_child(pid, options, p);
1541 if (!ret)
1542 continue;
1543
73243284
RM
1544 if (unlikely(ret < 0)) {
1545 denied = ret;
1546 continue;
1547 }
1548 allowed = 1;
1549
1da177e4
LT
1550 switch (p->state) {
1551 case TASK_TRACED:
7f2a5255
RM
1552 /*
1553 * When we hit the race with PTRACE_ATTACH,
1554 * we will not report this child. But the
1555 * race means it has not yet been moved to
1556 * our ptrace_children list, so we need to
1557 * set the flag here to avoid a spurious ECHILD
1558 * when the race happens with the only child.
1559 */
1560 flag = 1;
1da177e4
LT
1561 if (!my_ptrace_child(p))
1562 continue;
1563 /*FALLTHROUGH*/
1564 case TASK_STOPPED:
1565 /*
1566 * It's stopped now, so it might later
1567 * continue, exit, or stop again.
1568 */
1569 flag = 1;
1570 if (!(options & WUNTRACED) &&
1571 !my_ptrace_child(p))
1572 continue;
1573 retval = wait_task_stopped(p, ret == 2,
1574 (options & WNOWAIT),
1575 infop,
1576 stat_addr, ru);
1577 if (retval == -EAGAIN)
1578 goto repeat;
1579 if (retval != 0) /* He released the lock. */
1580 goto end;
1581 break;
1582 default:
1583 // case EXIT_DEAD:
1584 if (p->exit_state == EXIT_DEAD)
1585 continue;
1586 // case EXIT_ZOMBIE:
1587 if (p->exit_state == EXIT_ZOMBIE) {
1588 /*
1589 * Eligible but we cannot release
1590 * it yet:
1591 */
1592 if (ret == 2)
1593 goto check_continued;
1594 if (!likely(options & WEXITED))
1595 continue;
1596 retval = wait_task_zombie(
1597 p, (options & WNOWAIT),
1598 infop, stat_addr, ru);
1599 /* He released the lock. */
1600 if (retval != 0)
1601 goto end;
1602 break;
1603 }
1604check_continued:
1605 /*
1606 * It's running now, so it might later
1607 * exit, stop, or stop and then continue.
1608 */
1609 flag = 1;
1610 if (!unlikely(options & WCONTINUED))
1611 continue;
1612 retval = wait_task_continued(
1613 p, (options & WNOWAIT),
1614 infop, stat_addr, ru);
1615 if (retval != 0) /* He released the lock. */
1616 goto end;
1617 break;
1618 }
1619 }
1620 if (!flag) {
1621 list_for_each(_p, &tsk->ptrace_children) {
1622 p = list_entry(_p, struct task_struct,
1623 ptrace_list);
1624 if (!eligible_child(pid, options, p))
1625 continue;
1626 flag = 1;
1627 break;
1628 }
1629 }
1630 if (options & __WNOTHREAD)
1631 break;
1632 tsk = next_thread(tsk);
125e1874 1633 BUG_ON(tsk->signal != current->signal);
1da177e4
LT
1634 } while (tsk != current);
1635
1636 read_unlock(&tasklist_lock);
1637 if (flag) {
1638 retval = 0;
1639 if (options & WNOHANG)
1640 goto end;
1641 retval = -ERESTARTSYS;
1642 if (signal_pending(current))
1643 goto end;
1644 schedule();
1645 goto repeat;
1646 }
1647 retval = -ECHILD;
73243284
RM
1648 if (unlikely(denied) && !allowed)
1649 retval = denied;
1da177e4
LT
1650end:
1651 current->state = TASK_RUNNING;
1652 remove_wait_queue(&current->signal->wait_chldexit,&wait);
1653 if (infop) {
1654 if (retval > 0)
1655 retval = 0;
1656 else {
1657 /*
1658 * For a WNOHANG return, clear out all the fields
1659 * we would set so the user can easily tell the
1660 * difference.
1661 */
1662 if (!retval)
1663 retval = put_user(0, &infop->si_signo);
1664 if (!retval)
1665 retval = put_user(0, &infop->si_errno);
1666 if (!retval)
1667 retval = put_user(0, &infop->si_code);
1668 if (!retval)
1669 retval = put_user(0, &infop->si_pid);
1670 if (!retval)
1671 retval = put_user(0, &infop->si_uid);
1672 if (!retval)
1673 retval = put_user(0, &infop->si_status);
1674 }
1675 }
1676 return retval;
1677}
1678
1679asmlinkage long sys_waitid(int which, pid_t pid,
1680 struct siginfo __user *infop, int options,
1681 struct rusage __user *ru)
1682{
1683 long ret;
1684
1685 if (options & ~(WNOHANG|WNOWAIT|WEXITED|WSTOPPED|WCONTINUED))
1686 return -EINVAL;
1687 if (!(options & (WEXITED|WSTOPPED|WCONTINUED)))
1688 return -EINVAL;
1689
1690 switch (which) {
1691 case P_ALL:
1692 pid = -1;
1693 break;
1694 case P_PID:
1695 if (pid <= 0)
1696 return -EINVAL;
1697 break;
1698 case P_PGID:
1699 if (pid <= 0)
1700 return -EINVAL;
1701 pid = -pid;
1702 break;
1703 default:
1704 return -EINVAL;
1705 }
1706
1707 ret = do_wait(pid, options, infop, NULL, ru);
1708
1709 /* avoid REGPARM breakage on x86: */
1710 prevent_tail_call(ret);
1711 return ret;
1712}
1713
1714asmlinkage long sys_wait4(pid_t pid, int __user *stat_addr,
1715 int options, struct rusage __user *ru)
1716{
1717 long ret;
1718
1719 if (options & ~(WNOHANG|WUNTRACED|WCONTINUED|
1720 __WNOTHREAD|__WCLONE|__WALL))
1721 return -EINVAL;
1722 ret = do_wait(pid, options | WEXITED, NULL, stat_addr, ru);
1723
1724 /* avoid REGPARM breakage on x86: */
1725 prevent_tail_call(ret);
1726 return ret;
1727}
1728
1729#ifdef __ARCH_WANT_SYS_WAITPID
1730
1731/*
1732 * sys_waitpid() remains for compatibility. waitpid() should be
1733 * implemented by calling sys_wait4() from libc.a.
1734 */
1735asmlinkage long sys_waitpid(pid_t pid, int __user *stat_addr, int options)
1736{
1737 return sys_wait4(pid, stat_addr, options, NULL);
1738}
1739
1740#endif