blob: 2a06f2441805e268bab54af2246246dbb6084c1a [file] [log] [blame]
Linus Torvalds1da177e2005-04-16 15:20:36 -07001/*
2 * linux/kernel/signal.c
3 *
4 * Copyright (C) 1991, 1992 Linus Torvalds
5 *
6 * 1997-11-02 Modified for POSIX.1b signals by Richard Henderson
7 *
8 * 2003-06-02 Jim Houston - Concurrent Computer Corp.
9 * Changes to use preallocated sigqueue structures
10 * to allow signals to be sent reliably.
11 */
12
Linus Torvalds1da177e2005-04-16 15:20:36 -070013#include <linux/slab.h>
14#include <linux/module.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070015#include <linux/init.h>
16#include <linux/sched.h>
17#include <linux/fs.h>
18#include <linux/tty.h>
19#include <linux/binfmts.h>
20#include <linux/security.h>
21#include <linux/syscalls.h>
22#include <linux/ptrace.h>
Jesper Juhl7ed20e12005-05-01 08:59:14 -070023#include <linux/signal.h>
Davide Libenzifba2afa2007-05-10 22:23:13 -070024#include <linux/signalfd.h>
Randy.Dunlapc59ede72006-01-11 12:17:46 -080025#include <linux/capability.h>
Nigel Cunningham7dfb7102006-12-06 20:34:23 -080026#include <linux/freezer.h>
Sukadev Bhattiprolu84d73782006-12-08 02:38:01 -080027#include <linux/pid_namespace.h>
28#include <linux/nsproxy.h>
29
Linus Torvalds1da177e2005-04-16 15:20:36 -070030#include <asm/param.h>
31#include <asm/uaccess.h>
32#include <asm/unistd.h>
33#include <asm/siginfo.h>
Al Viroe1396062006-05-25 10:19:47 -040034#include "audit.h" /* audit_signal_info() */
Linus Torvalds1da177e2005-04-16 15:20:36 -070035
36/*
37 * SLAB caches for signal bits.
38 */
39
Christoph Lametere18b8902006-12-06 20:33:20 -080040static struct kmem_cache *sigqueue_cachep;
Linus Torvalds1da177e2005-04-16 15:20:36 -070041
Pavel Emelyanov93585ee2008-04-30 00:52:39 -070042static int __sig_ignored(struct task_struct *t, int sig)
43{
44 void __user *handler;
45
46 /* Is it explicitly or implicitly ignored? */
47
48 handler = t->sighand->action[sig - 1].sa.sa_handler;
49 return handler == SIG_IGN ||
50 (handler == SIG_DFL && sig_kernel_ignore(sig));
51}
Linus Torvalds1da177e2005-04-16 15:20:36 -070052
53static int sig_ignored(struct task_struct *t, int sig)
54{
Linus Torvalds1da177e2005-04-16 15:20:36 -070055 /*
56 * Tracers always want to know about signals..
57 */
58 if (t->ptrace & PT_PTRACED)
59 return 0;
60
61 /*
62 * Blocked signals are never ignored, since the
63 * signal handler may change by the time it is
64 * unblocked.
65 */
Roland McGrath325d22d2007-11-12 15:41:55 -080066 if (sigismember(&t->blocked, sig) || sigismember(&t->real_blocked, sig))
Linus Torvalds1da177e2005-04-16 15:20:36 -070067 return 0;
68
Pavel Emelyanov93585ee2008-04-30 00:52:39 -070069 return __sig_ignored(t, sig);
Linus Torvalds1da177e2005-04-16 15:20:36 -070070}
71
72/*
73 * Re-calculate pending state from the set of locally pending
74 * signals, globally pending signals, and blocked signals.
75 */
76static inline int has_pending_signals(sigset_t *signal, sigset_t *blocked)
77{
78 unsigned long ready;
79 long i;
80
81 switch (_NSIG_WORDS) {
82 default:
83 for (i = _NSIG_WORDS, ready = 0; --i >= 0 ;)
84 ready |= signal->sig[i] &~ blocked->sig[i];
85 break;
86
87 case 4: ready = signal->sig[3] &~ blocked->sig[3];
88 ready |= signal->sig[2] &~ blocked->sig[2];
89 ready |= signal->sig[1] &~ blocked->sig[1];
90 ready |= signal->sig[0] &~ blocked->sig[0];
91 break;
92
93 case 2: ready = signal->sig[1] &~ blocked->sig[1];
94 ready |= signal->sig[0] &~ blocked->sig[0];
95 break;
96
97 case 1: ready = signal->sig[0] &~ blocked->sig[0];
98 }
99 return ready != 0;
100}
101
102#define PENDING(p,b) has_pending_signals(&(p)->signal, (b))
103
Roland McGrath7bb44ad2007-05-23 13:57:44 -0700104static int recalc_sigpending_tsk(struct task_struct *t)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700105{
106 if (t->signal->group_stop_count > 0 ||
107 PENDING(&t->pending, &t->blocked) ||
Roland McGrath7bb44ad2007-05-23 13:57:44 -0700108 PENDING(&t->signal->shared_pending, &t->blocked)) {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700109 set_tsk_thread_flag(t, TIF_SIGPENDING);
Roland McGrath7bb44ad2007-05-23 13:57:44 -0700110 return 1;
111 }
Roland McGrathb74d0de2007-06-06 03:59:00 -0700112 /*
113 * We must never clear the flag in another thread, or in current
114 * when it's possible the current syscall is returning -ERESTART*.
115 * So we don't clear it here, and only callers who know they should do.
116 */
Roland McGrath7bb44ad2007-05-23 13:57:44 -0700117 return 0;
118}
119
120/*
121 * After recalculating TIF_SIGPENDING, we need to make sure the task wakes up.
122 * This is superfluous when called on current, the wakeup is a harmless no-op.
123 */
124void recalc_sigpending_and_wake(struct task_struct *t)
125{
126 if (recalc_sigpending_tsk(t))
127 signal_wake_up(t, 0);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700128}
129
130void recalc_sigpending(void)
131{
Rafael J. Wysockicc5f9162007-10-29 14:37:12 -0700132 if (!recalc_sigpending_tsk(current) && !freezing(current))
Roland McGrathb74d0de2007-06-06 03:59:00 -0700133 clear_thread_flag(TIF_SIGPENDING);
134
Linus Torvalds1da177e2005-04-16 15:20:36 -0700135}
136
137/* Given the mask, find the first available signal that should be serviced. */
138
Davide Libenzifba2afa2007-05-10 22:23:13 -0700139int next_signal(struct sigpending *pending, sigset_t *mask)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700140{
141 unsigned long i, *s, *m, x;
142 int sig = 0;
143
144 s = pending->signal.sig;
145 m = mask->sig;
146 switch (_NSIG_WORDS) {
147 default:
148 for (i = 0; i < _NSIG_WORDS; ++i, ++s, ++m)
149 if ((x = *s &~ *m) != 0) {
150 sig = ffz(~x) + i*_NSIG_BPW + 1;
151 break;
152 }
153 break;
154
155 case 2: if ((x = s[0] &~ m[0]) != 0)
156 sig = 1;
157 else if ((x = s[1] &~ m[1]) != 0)
158 sig = _NSIG_BPW + 1;
159 else
160 break;
161 sig += ffz(~x);
162 break;
163
164 case 1: if ((x = *s &~ *m) != 0)
165 sig = ffz(~x) + 1;
166 break;
167 }
168
169 return sig;
170}
171
Al Virodd0fc662005-10-07 07:46:04 +0100172static struct sigqueue *__sigqueue_alloc(struct task_struct *t, gfp_t flags,
Linus Torvalds1da177e2005-04-16 15:20:36 -0700173 int override_rlimit)
174{
175 struct sigqueue *q = NULL;
Linus Torvalds10b1fbd2006-11-04 13:03:00 -0800176 struct user_struct *user;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700177
Linus Torvalds10b1fbd2006-11-04 13:03:00 -0800178 /*
179 * In order to avoid problems with "switch_user()", we want to make
180 * sure that the compiler doesn't re-load "t->user"
181 */
182 user = t->user;
183 barrier();
184 atomic_inc(&user->sigpending);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700185 if (override_rlimit ||
Linus Torvalds10b1fbd2006-11-04 13:03:00 -0800186 atomic_read(&user->sigpending) <=
Linus Torvalds1da177e2005-04-16 15:20:36 -0700187 t->signal->rlim[RLIMIT_SIGPENDING].rlim_cur)
188 q = kmem_cache_alloc(sigqueue_cachep, flags);
189 if (unlikely(q == NULL)) {
Linus Torvalds10b1fbd2006-11-04 13:03:00 -0800190 atomic_dec(&user->sigpending);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700191 } else {
192 INIT_LIST_HEAD(&q->list);
193 q->flags = 0;
Linus Torvalds10b1fbd2006-11-04 13:03:00 -0800194 q->user = get_uid(user);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700195 }
196 return(q);
197}
198
Andrew Morton514a01b2006-02-03 03:04:41 -0800199static void __sigqueue_free(struct sigqueue *q)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700200{
201 if (q->flags & SIGQUEUE_PREALLOC)
202 return;
203 atomic_dec(&q->user->sigpending);
204 free_uid(q->user);
205 kmem_cache_free(sigqueue_cachep, q);
206}
207
Oleg Nesterov6a14c5c2006-03-28 16:11:18 -0800208void flush_sigqueue(struct sigpending *queue)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700209{
210 struct sigqueue *q;
211
212 sigemptyset(&queue->signal);
213 while (!list_empty(&queue->list)) {
214 q = list_entry(queue->list.next, struct sigqueue , list);
215 list_del_init(&q->list);
216 __sigqueue_free(q);
217 }
218}
219
220/*
221 * Flush all pending signals for a task.
222 */
Oleg Nesterovc81addc2006-03-28 16:11:17 -0800223void flush_signals(struct task_struct *t)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700224{
225 unsigned long flags;
226
227 spin_lock_irqsave(&t->sighand->siglock, flags);
Pavel Machekf5264482008-04-21 22:15:06 +0000228 clear_tsk_thread_flag(t, TIF_SIGPENDING);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700229 flush_sigqueue(&t->pending);
230 flush_sigqueue(&t->signal->shared_pending);
231 spin_unlock_irqrestore(&t->sighand->siglock, flags);
232}
233
Oleg Nesterov10ab8252007-05-09 02:34:37 -0700234void ignore_signals(struct task_struct *t)
235{
236 int i;
237
238 for (i = 0; i < _NSIG; ++i)
239 t->sighand->action[i].sa.sa_handler = SIG_IGN;
240
241 flush_signals(t);
242}
243
Linus Torvalds1da177e2005-04-16 15:20:36 -0700244/*
Linus Torvalds1da177e2005-04-16 15:20:36 -0700245 * Flush all handlers for a task.
246 */
247
248void
249flush_signal_handlers(struct task_struct *t, int force_default)
250{
251 int i;
252 struct k_sigaction *ka = &t->sighand->action[0];
253 for (i = _NSIG ; i != 0 ; i--) {
254 if (force_default || ka->sa.sa_handler != SIG_IGN)
255 ka->sa.sa_handler = SIG_DFL;
256 ka->sa.sa_flags = 0;
257 sigemptyset(&ka->sa.sa_mask);
258 ka++;
259 }
260}
261
Masoud Asgharifard Sharbianiabd4f752007-07-22 11:12:28 +0200262int unhandled_signal(struct task_struct *tsk, int sig)
263{
Serge E. Hallynb460cbc2007-10-18 23:39:52 -0700264 if (is_global_init(tsk))
Masoud Asgharifard Sharbianiabd4f752007-07-22 11:12:28 +0200265 return 1;
266 if (tsk->ptrace & PT_PTRACED)
267 return 0;
268 return (tsk->sighand->action[sig-1].sa.sa_handler == SIG_IGN) ||
269 (tsk->sighand->action[sig-1].sa.sa_handler == SIG_DFL);
270}
271
Linus Torvalds1da177e2005-04-16 15:20:36 -0700272
273/* Notify the system that a driver wants to block all signals for this
274 * process, and wants to be notified if any signals at all were to be
275 * sent/acted upon. If the notifier routine returns non-zero, then the
276 * signal will be acted upon after all. If the notifier routine returns 0,
277 * then then signal will be blocked. Only one block per process is
278 * allowed. priv is a pointer to private data that the notifier routine
279 * can use to determine if the signal should be blocked or not. */
280
281void
282block_all_signals(int (*notifier)(void *priv), void *priv, sigset_t *mask)
283{
284 unsigned long flags;
285
286 spin_lock_irqsave(&current->sighand->siglock, flags);
287 current->notifier_mask = mask;
288 current->notifier_data = priv;
289 current->notifier = notifier;
290 spin_unlock_irqrestore(&current->sighand->siglock, flags);
291}
292
293/* Notify the system that blocking has ended. */
294
295void
296unblock_all_signals(void)
297{
298 unsigned long flags;
299
300 spin_lock_irqsave(&current->sighand->siglock, flags);
301 current->notifier = NULL;
302 current->notifier_data = NULL;
303 recalc_sigpending();
304 spin_unlock_irqrestore(&current->sighand->siglock, flags);
305}
306
Arjan van de Ven858119e2006-01-14 13:20:43 -0800307static int collect_signal(int sig, struct sigpending *list, siginfo_t *info)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700308{
309 struct sigqueue *q, *first = NULL;
310 int still_pending = 0;
311
312 if (unlikely(!sigismember(&list->signal, sig)))
313 return 0;
314
315 /*
316 * Collect the siginfo appropriate to this signal. Check if
317 * there is another siginfo for the same signal.
318 */
319 list_for_each_entry(q, &list->list, list) {
320 if (q->info.si_signo == sig) {
321 if (first) {
322 still_pending = 1;
323 break;
324 }
325 first = q;
326 }
327 }
328 if (first) {
329 list_del_init(&first->list);
330 copy_siginfo(info, &first->info);
331 __sigqueue_free(first);
332 if (!still_pending)
333 sigdelset(&list->signal, sig);
334 } else {
335
336 /* Ok, it wasn't in the queue. This must be
337 a fast-pathed signal or we must have been
338 out of queue space. So zero out the info.
339 */
340 sigdelset(&list->signal, sig);
341 info->si_signo = sig;
342 info->si_errno = 0;
343 info->si_code = 0;
344 info->si_pid = 0;
345 info->si_uid = 0;
346 }
347 return 1;
348}
349
350static int __dequeue_signal(struct sigpending *pending, sigset_t *mask,
351 siginfo_t *info)
352{
Roland McGrath27d91e02006-09-29 02:00:31 -0700353 int sig = next_signal(pending, mask);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700354
Linus Torvalds1da177e2005-04-16 15:20:36 -0700355 if (sig) {
356 if (current->notifier) {
357 if (sigismember(current->notifier_mask, sig)) {
358 if (!(current->notifier)(current->notifier_data)) {
359 clear_thread_flag(TIF_SIGPENDING);
360 return 0;
361 }
362 }
363 }
364
365 if (!collect_signal(sig, pending, info))
366 sig = 0;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700367 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700368
369 return sig;
370}
371
372/*
373 * Dequeue a signal and return the element to the caller, which is
374 * expected to free it.
375 *
376 * All callers have to hold the siglock.
377 */
378int dequeue_signal(struct task_struct *tsk, sigset_t *mask, siginfo_t *info)
379{
Pavel Emelyanovc5363d02008-04-30 00:52:40 -0700380 int signr;
Benjamin Herrenschmidtcaec4e82007-06-12 08:16:18 +1000381
382 /* We only dequeue private signals from ourselves, we don't let
383 * signalfd steal them
384 */
Davide Libenzib8fceee2007-09-20 12:40:16 -0700385 signr = __dequeue_signal(&tsk->pending, mask, info);
Thomas Gleixner8bfd9a72007-02-16 01:28:12 -0800386 if (!signr) {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700387 signr = __dequeue_signal(&tsk->signal->shared_pending,
388 mask, info);
Thomas Gleixner8bfd9a72007-02-16 01:28:12 -0800389 /*
390 * itimer signal ?
391 *
392 * itimers are process shared and we restart periodic
393 * itimers in the signal delivery path to prevent DoS
394 * attacks in the high resolution timer case. This is
395 * compliant with the old way of self restarting
396 * itimers, as the SIGALRM is a legacy signal and only
397 * queued once. Changing the restart behaviour to
398 * restart the timer in the signal dequeue path is
399 * reducing the timer noise on heavy loaded !highres
400 * systems too.
401 */
402 if (unlikely(signr == SIGALRM)) {
403 struct hrtimer *tmr = &tsk->signal->real_timer;
404
405 if (!hrtimer_is_queued(tmr) &&
406 tsk->signal->it_real_incr.tv64 != 0) {
407 hrtimer_forward(tmr, tmr->base->get_time(),
408 tsk->signal->it_real_incr);
409 hrtimer_restart(tmr);
410 }
411 }
412 }
Pavel Emelyanovc5363d02008-04-30 00:52:40 -0700413
Davide Libenzib8fceee2007-09-20 12:40:16 -0700414 recalc_sigpending();
Pavel Emelyanovc5363d02008-04-30 00:52:40 -0700415 if (!signr)
416 return 0;
417
418 if (unlikely(sig_kernel_stop(signr))) {
Thomas Gleixner8bfd9a72007-02-16 01:28:12 -0800419 /*
420 * Set a marker that we have dequeued a stop signal. Our
421 * caller might release the siglock and then the pending
422 * stop signal it is about to process is no longer in the
423 * pending bitmasks, but must still be cleared by a SIGCONT
424 * (and overruled by a SIGKILL). So those cases clear this
425 * shared flag after we've set it. Note that this flag may
426 * remain set after the signal we return is ignored or
427 * handled. That doesn't matter because its only purpose
428 * is to alert stop-signal processing code when another
429 * processor has come along and cleared the flag.
430 */
431 if (!(tsk->signal->flags & SIGNAL_GROUP_EXIT))
432 tsk->signal->flags |= SIGNAL_STOP_DEQUEUED;
433 }
Pavel Emelyanovc5363d02008-04-30 00:52:40 -0700434 if ((info->si_code & __SI_MASK) == __SI_TIMER && info->si_sys_private) {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700435 /*
436 * Release the siglock to ensure proper locking order
437 * of timer locks outside of siglocks. Note, we leave
438 * irqs disabled here, since the posix-timers code is
439 * about to disable them again anyway.
440 */
441 spin_unlock(&tsk->sighand->siglock);
442 do_schedule_next_timer(info);
443 spin_lock(&tsk->sighand->siglock);
444 }
445 return signr;
446}
447
448/*
449 * Tell a process that it has a new active signal..
450 *
451 * NOTE! we rely on the previous spin_lock to
452 * lock interrupts for us! We can only be called with
453 * "siglock" held, and the local interrupt must
454 * have been disabled when that got acquired!
455 *
456 * No need to set need_resched since signal event passing
457 * goes through ->blocked
458 */
459void signal_wake_up(struct task_struct *t, int resume)
460{
461 unsigned int mask;
462
463 set_tsk_thread_flag(t, TIF_SIGPENDING);
464
465 /*
Matthew Wilcoxf021a3c2007-12-06 11:13:16 -0500466 * For SIGKILL, we want to wake it up in the stopped/traced/killable
467 * case. We don't check t->state here because there is a race with it
Linus Torvalds1da177e2005-04-16 15:20:36 -0700468 * executing another processor and just now entering stopped state.
469 * By using wake_up_state, we ensure the process will wake up and
470 * handle its death signal.
471 */
472 mask = TASK_INTERRUPTIBLE;
473 if (resume)
Matthew Wilcoxf021a3c2007-12-06 11:13:16 -0500474 mask |= TASK_WAKEKILL;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700475 if (!wake_up_state(t, mask))
476 kick_process(t);
477}
478
479/*
480 * Remove signals in mask from the pending set and queue.
481 * Returns 1 if any signals were found.
482 *
483 * All callers must be holding the siglock.
George Anzinger71fabd52006-01-08 01:02:48 -0800484 *
485 * This version takes a sigset mask and looks at all signals,
486 * not just those in the first mask word.
487 */
488static int rm_from_queue_full(sigset_t *mask, struct sigpending *s)
489{
490 struct sigqueue *q, *n;
491 sigset_t m;
492
493 sigandsets(&m, mask, &s->signal);
494 if (sigisemptyset(&m))
495 return 0;
496
497 signandsets(&s->signal, &s->signal, mask);
498 list_for_each_entry_safe(q, n, &s->list, list) {
499 if (sigismember(mask, q->info.si_signo)) {
500 list_del_init(&q->list);
501 __sigqueue_free(q);
502 }
503 }
504 return 1;
505}
506/*
507 * Remove signals in mask from the pending set and queue.
508 * Returns 1 if any signals were found.
509 *
510 * All callers must be holding the siglock.
Linus Torvalds1da177e2005-04-16 15:20:36 -0700511 */
512static int rm_from_queue(unsigned long mask, struct sigpending *s)
513{
514 struct sigqueue *q, *n;
515
516 if (!sigtestsetmask(&s->signal, mask))
517 return 0;
518
519 sigdelsetmask(&s->signal, mask);
520 list_for_each_entry_safe(q, n, &s->list, list) {
521 if (q->info.si_signo < SIGRTMIN &&
522 (mask & sigmask(q->info.si_signo))) {
523 list_del_init(&q->list);
524 __sigqueue_free(q);
525 }
526 }
527 return 1;
528}
529
530/*
531 * Bad permissions for sending the signal
532 */
533static int check_kill_permission(int sig, struct siginfo *info,
534 struct task_struct *t)
535{
Oleg Nesterov3b5e9e52008-04-30 00:52:42 -0700536 int error;
537
Jesper Juhl7ed20e12005-05-01 08:59:14 -0700538 if (!valid_signal(sig))
Oleg Nesterov3b5e9e52008-04-30 00:52:42 -0700539 return -EINVAL;
540
541 if (info != SEND_SIG_NOINFO && (is_si_special(info) || SI_FROMKERNEL(info)))
542 return 0;
543
544 error = audit_signal_info(sig, t); /* Let audit system see the signal */
545 if (error)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700546 return error;
Amy Griffise54dc242007-03-29 18:01:04 -0400547
Oleg Nesterov3b5e9e52008-04-30 00:52:42 -0700548 if (((sig != SIGCONT) || (task_session_nr(current) != task_session_nr(t)))
549 && (current->euid ^ t->suid) && (current->euid ^ t->uid)
550 && (current->uid ^ t->suid) && (current->uid ^ t->uid)
551 && !capable(CAP_KILL))
552 return -EPERM;
Steve Grubbc2f0c7c2005-05-06 12:38:39 +0100553
Amy Griffise54dc242007-03-29 18:01:04 -0400554 return security_task_kill(t, info, sig, 0);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700555}
556
557/* forward decl */
Oleg Nesterova1d5e212006-03-28 16:11:29 -0800558static void do_notify_parent_cldstop(struct task_struct *tsk, int why);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700559
560/*
561 * Handle magic process-wide effects of stop/continue signals.
562 * Unlike the signal actions, these happen immediately at signal-generation
563 * time regardless of blocking, ignoring, or handling. This does the
564 * actual continuing for SIGCONT, but not the actual stopping for stop
565 * signals. The process stop is done as a signal action for SIG_DFL.
566 */
567static void handle_stop_signal(int sig, struct task_struct *p)
568{
Oleg Nesterovad16a462008-04-30 00:52:46 -0700569 struct signal_struct *signal = p->signal;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700570 struct task_struct *t;
571
Oleg Nesterovad16a462008-04-30 00:52:46 -0700572 if (signal->flags & SIGNAL_GROUP_EXIT)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700573 /*
574 * The process is in the middle of dying already.
575 */
576 return;
577
578 if (sig_kernel_stop(sig)) {
579 /*
580 * This is a stop signal. Remove SIGCONT from all queues.
581 */
Oleg Nesterovad16a462008-04-30 00:52:46 -0700582 rm_from_queue(sigmask(SIGCONT), &signal->shared_pending);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700583 t = p;
584 do {
585 rm_from_queue(sigmask(SIGCONT), &t->pending);
Oleg Nesterovad16a462008-04-30 00:52:46 -0700586 } while_each_thread(p, t);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700587 } else if (sig == SIGCONT) {
Oleg Nesterovfc321d22008-04-30 00:52:46 -0700588 unsigned int why;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700589 /*
590 * Remove all stop signals from all queues,
591 * and wake all threads.
592 */
Oleg Nesterovad16a462008-04-30 00:52:46 -0700593 rm_from_queue(SIG_KERNEL_STOP_MASK, &signal->shared_pending);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700594 t = p;
595 do {
596 unsigned int state;
597 rm_from_queue(SIG_KERNEL_STOP_MASK, &t->pending);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700598 /*
599 * If there is a handler for SIGCONT, we must make
600 * sure that no thread returns to user mode before
601 * we post the signal, in case it was the only
602 * thread eligible to run the signal handler--then
603 * it must not do anything between resuming and
604 * running the handler. With the TIF_SIGPENDING
605 * flag set, the thread will pause and acquire the
606 * siglock that we hold now and until we've queued
Oleg Nesterovfc321d22008-04-30 00:52:46 -0700607 * the pending signal.
Linus Torvalds1da177e2005-04-16 15:20:36 -0700608 *
609 * Wake up the stopped thread _after_ setting
610 * TIF_SIGPENDING
611 */
Matthew Wilcoxf021a3c2007-12-06 11:13:16 -0500612 state = __TASK_STOPPED;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700613 if (sig_user_defined(t, SIGCONT) && !sigismember(&t->blocked, SIGCONT)) {
614 set_tsk_thread_flag(t, TIF_SIGPENDING);
615 state |= TASK_INTERRUPTIBLE;
616 }
617 wake_up_state(t, state);
Oleg Nesterovad16a462008-04-30 00:52:46 -0700618 } while_each_thread(p, t);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700619
Oleg Nesterovfc321d22008-04-30 00:52:46 -0700620 /*
621 * Notify the parent with CLD_CONTINUED if we were stopped.
622 *
623 * If we were in the middle of a group stop, we pretend it
624 * was already finished, and then continued. Since SIGCHLD
625 * doesn't queue we report only CLD_STOPPED, as if the next
626 * CLD_CONTINUED was dropped.
627 */
628 why = 0;
Oleg Nesterovad16a462008-04-30 00:52:46 -0700629 if (signal->flags & SIGNAL_STOP_STOPPED)
Oleg Nesterovfc321d22008-04-30 00:52:46 -0700630 why |= SIGNAL_CLD_CONTINUED;
Oleg Nesterovad16a462008-04-30 00:52:46 -0700631 else if (signal->group_stop_count)
Oleg Nesterovfc321d22008-04-30 00:52:46 -0700632 why |= SIGNAL_CLD_STOPPED;
633
634 if (why) {
Oleg Nesterovad16a462008-04-30 00:52:46 -0700635 signal->flags = why | SIGNAL_STOP_CONTINUED;
636 signal->group_stop_count = 0;
637 signal->group_exit_code = 0;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700638 } else {
639 /*
640 * We are not stopped, but there could be a stop
641 * signal in the middle of being processed after
642 * being removed from the queue. Clear that too.
643 */
Oleg Nesterovad16a462008-04-30 00:52:46 -0700644 signal->flags &= ~SIGNAL_STOP_DEQUEUED;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700645 }
646 } else if (sig == SIGKILL) {
647 /*
648 * Make sure that any pending stop signal already dequeued
649 * is undone by the wakeup for SIGKILL.
650 */
Oleg Nesterovad16a462008-04-30 00:52:46 -0700651 signal->flags &= ~SIGNAL_STOP_DEQUEUED;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700652 }
653}
654
Pavel Emelyanovaf7fff92008-04-30 00:52:34 -0700655static inline int legacy_queue(struct sigpending *signals, int sig)
656{
657 return (sig < SIGRTMIN) && sigismember(&signals->signal, sig);
658}
659
Linus Torvalds1da177e2005-04-16 15:20:36 -0700660static int send_signal(int sig, struct siginfo *info, struct task_struct *t,
661 struct sigpending *signals)
662{
663 struct sigqueue * q = NULL;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700664
665 /*
Pavel Emelyanov2acb0242008-04-30 00:52:35 -0700666 * Short-circuit ignored signals and support queuing
667 * exactly one non-rt signal, so that we can get more
668 * detailed information about the cause of the signal.
669 */
670 if (sig_ignored(t, sig) || legacy_queue(signals, sig))
671 return 0;
672
673 /*
Davide Libenzifba2afa2007-05-10 22:23:13 -0700674 * Deliver the signal to listening signalfds. This must be called
675 * with the sighand lock held.
676 */
677 signalfd_notify(t, sig);
678
679 /*
Linus Torvalds1da177e2005-04-16 15:20:36 -0700680 * fast-pathed signals for kernel-internal things like SIGSTOP
681 * or SIGKILL.
682 */
Oleg Nesterovb67a1b92005-10-30 15:03:44 -0800683 if (info == SEND_SIG_FORCED)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700684 goto out_set;
685
686 /* Real-time signals must be queued if sent by sigqueue, or
687 some other real-time mechanism. It is implementation
688 defined whether kill() does so. We attempt to do so, on
689 the principle of least surprise, but since kill is not
690 allowed to fail with EAGAIN when low on memory we just
691 make sure at least one signal gets delivered and don't
692 pass on the info struct. */
693
694 q = __sigqueue_alloc(t, GFP_ATOMIC, (sig < SIGRTMIN &&
Oleg Nesterov621d3122005-10-30 15:03:45 -0800695 (is_si_special(info) ||
Linus Torvalds1da177e2005-04-16 15:20:36 -0700696 info->si_code >= 0)));
697 if (q) {
698 list_add_tail(&q->list, &signals->list);
699 switch ((unsigned long) info) {
Oleg Nesterovb67a1b92005-10-30 15:03:44 -0800700 case (unsigned long) SEND_SIG_NOINFO:
Linus Torvalds1da177e2005-04-16 15:20:36 -0700701 q->info.si_signo = sig;
702 q->info.si_errno = 0;
703 q->info.si_code = SI_USER;
Pavel Emelyanovb4888932007-10-18 23:40:14 -0700704 q->info.si_pid = task_pid_vnr(current);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700705 q->info.si_uid = current->uid;
706 break;
Oleg Nesterovb67a1b92005-10-30 15:03:44 -0800707 case (unsigned long) SEND_SIG_PRIV:
Linus Torvalds1da177e2005-04-16 15:20:36 -0700708 q->info.si_signo = sig;
709 q->info.si_errno = 0;
710 q->info.si_code = SI_KERNEL;
711 q->info.si_pid = 0;
712 q->info.si_uid = 0;
713 break;
714 default:
715 copy_siginfo(&q->info, info);
716 break;
717 }
Oleg Nesterov621d3122005-10-30 15:03:45 -0800718 } else if (!is_si_special(info)) {
719 if (sig >= SIGRTMIN && info->si_code != SI_USER)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700720 /*
721 * Queue overflow, abort. We may abort if the signal was rt
722 * and sent by user using something other than kill().
723 */
724 return -EAGAIN;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700725 }
726
727out_set:
728 sigaddset(&signals->signal, sig);
Pavel Emelyanov2acb0242008-04-30 00:52:35 -0700729 return 1;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700730}
731
Ingo Molnar45807a12007-07-15 23:40:10 -0700732int print_fatal_signals;
733
734static void print_fatal_signal(struct pt_regs *regs, int signr)
735{
736 printk("%s/%d: potentially unexpected fatal signal %d.\n",
Pavel Emelyanovba25f9d2007-10-18 23:40:40 -0700737 current->comm, task_pid_nr(current), signr);
Ingo Molnar45807a12007-07-15 23:40:10 -0700738
Al Viroca5cd872007-10-29 04:31:16 +0000739#if defined(__i386__) && !defined(__arch_um__)
H. Peter Anvin65ea5b02008-01-30 13:30:56 +0100740 printk("code at %08lx: ", regs->ip);
Ingo Molnar45807a12007-07-15 23:40:10 -0700741 {
742 int i;
743 for (i = 0; i < 16; i++) {
744 unsigned char insn;
745
H. Peter Anvin65ea5b02008-01-30 13:30:56 +0100746 __get_user(insn, (unsigned char *)(regs->ip + i));
Ingo Molnar45807a12007-07-15 23:40:10 -0700747 printk("%02x ", insn);
748 }
749 }
750#endif
751 printk("\n");
752 show_regs(regs);
753}
754
755static int __init setup_print_fatal_signals(char *str)
756{
757 get_option (&str, &print_fatal_signals);
758
759 return 1;
760}
761
762__setup("print-fatal-signals=", setup_print_fatal_signals);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700763
764static int
765specific_send_sig_info(int sig, struct siginfo *info, struct task_struct *t)
766{
Pavel Emelyanov2acb0242008-04-30 00:52:35 -0700767 int ret;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700768
Eric Sesterhennfda8bd72006-04-02 13:44:47 +0200769 BUG_ON(!irqs_disabled());
Linus Torvalds1da177e2005-04-16 15:20:36 -0700770 assert_spin_locked(&t->sighand->siglock);
771
Linus Torvalds1da177e2005-04-16 15:20:36 -0700772 ret = send_signal(sig, info, t, &t->pending);
Pavel Emelyanov2acb0242008-04-30 00:52:35 -0700773 if (ret <= 0)
774 return ret;
775
776 if (!sigismember(&t->blocked, sig))
Linus Torvalds1da177e2005-04-16 15:20:36 -0700777 signal_wake_up(t, sig == SIGKILL);
Pavel Emelyanov2acb0242008-04-30 00:52:35 -0700778 return 0;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700779}
780
781/*
782 * Force a signal that the process can't ignore: if necessary
783 * we unblock the signal and change any SIG_IGN to SIG_DFL.
Linus Torvaldsae74c3b2006-08-02 20:17:49 -0700784 *
785 * Note: If we unblock the signal, we always reset it to SIG_DFL,
786 * since we do not want to have a signal handler that was blocked
787 * be invoked when user space had explicitly blocked it.
788 *
789 * We don't want to have recursive SIGSEGV's etc, for example.
Linus Torvalds1da177e2005-04-16 15:20:36 -0700790 */
Linus Torvalds1da177e2005-04-16 15:20:36 -0700791int
792force_sig_info(int sig, struct siginfo *info, struct task_struct *t)
793{
794 unsigned long int flags;
Linus Torvaldsae74c3b2006-08-02 20:17:49 -0700795 int ret, blocked, ignored;
796 struct k_sigaction *action;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700797
798 spin_lock_irqsave(&t->sighand->siglock, flags);
Linus Torvaldsae74c3b2006-08-02 20:17:49 -0700799 action = &t->sighand->action[sig-1];
800 ignored = action->sa.sa_handler == SIG_IGN;
801 blocked = sigismember(&t->blocked, sig);
802 if (blocked || ignored) {
803 action->sa.sa_handler = SIG_DFL;
804 if (blocked) {
805 sigdelset(&t->blocked, sig);
Roland McGrath7bb44ad2007-05-23 13:57:44 -0700806 recalc_sigpending_and_wake(t);
Linus Torvaldsae74c3b2006-08-02 20:17:49 -0700807 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700808 }
809 ret = specific_send_sig_info(sig, info, t);
810 spin_unlock_irqrestore(&t->sighand->siglock, flags);
811
812 return ret;
813}
814
815void
816force_sig_specific(int sig, struct task_struct *t)
817{
Paul E. McKenneyb0423a02005-10-30 15:03:46 -0800818 force_sig_info(sig, SEND_SIG_FORCED, t);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700819}
820
821/*
822 * Test if P wants to take SIG. After we've checked all threads with this,
823 * it's equivalent to finding no threads not blocking SIG. Any threads not
824 * blocking SIG were ruled out because they are not running and already
825 * have pending signals. Such threads will dequeue from the shared queue
826 * as soon as they're available, so putting the signal on the shared queue
827 * will be equivalent to sending it to one such thread.
828 */
Linus Torvalds188a1ea2005-09-23 13:22:21 -0700829static inline int wants_signal(int sig, struct task_struct *p)
830{
831 if (sigismember(&p->blocked, sig))
832 return 0;
833 if (p->flags & PF_EXITING)
834 return 0;
835 if (sig == SIGKILL)
836 return 1;
Matthew Wilcoxe1abb392007-12-06 11:07:35 -0500837 if (task_is_stopped_or_traced(p))
Linus Torvalds188a1ea2005-09-23 13:22:21 -0700838 return 0;
839 return task_curr(p) || !signal_pending(p);
840}
Linus Torvalds1da177e2005-04-16 15:20:36 -0700841
842static void
843__group_complete_signal(int sig, struct task_struct *p)
844{
Oleg Nesterovf8c5b5c2008-04-30 00:52:49 -0700845 struct signal_struct *signal = p->signal;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700846 struct task_struct *t;
847
848 /*
Linus Torvalds1da177e2005-04-16 15:20:36 -0700849 * Now find a thread we can wake up to take the signal off the queue.
850 *
851 * If the main thread wants the signal, it gets first crack.
852 * Probably the least surprising to the average bear.
853 */
Linus Torvalds188a1ea2005-09-23 13:22:21 -0700854 if (wants_signal(sig, p))
Linus Torvalds1da177e2005-04-16 15:20:36 -0700855 t = p;
856 else if (thread_group_empty(p))
857 /*
858 * There is just one thread and it does not need to be woken.
859 * It will dequeue unblocked signals before it runs again.
860 */
861 return;
862 else {
863 /*
864 * Otherwise try to find a suitable thread.
865 */
Oleg Nesterovf8c5b5c2008-04-30 00:52:49 -0700866 t = signal->curr_target;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700867 if (t == NULL)
868 /* restart balancing at this thread */
Oleg Nesterovf8c5b5c2008-04-30 00:52:49 -0700869 t = signal->curr_target = p;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700870
Linus Torvalds188a1ea2005-09-23 13:22:21 -0700871 while (!wants_signal(sig, t)) {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700872 t = next_thread(t);
Oleg Nesterovf8c5b5c2008-04-30 00:52:49 -0700873 if (t == signal->curr_target)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700874 /*
875 * No thread needs to be woken.
876 * Any eligible threads will see
877 * the signal in the queue soon.
878 */
879 return;
880 }
Oleg Nesterovf8c5b5c2008-04-30 00:52:49 -0700881 signal->curr_target = t;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700882 }
883
884 /*
885 * Found a killable thread. If the signal will be fatal,
886 * then start taking the whole group down immediately.
887 */
Oleg Nesterovf8c5b5c2008-04-30 00:52:49 -0700888 if (sig_fatal(p, sig) && !(signal->flags & SIGNAL_GROUP_EXIT) &&
Linus Torvalds1da177e2005-04-16 15:20:36 -0700889 !sigismember(&t->real_blocked, sig) &&
890 (sig == SIGKILL || !(t->ptrace & PT_PTRACED))) {
891 /*
892 * This signal will be fatal to the whole group.
893 */
894 if (!sig_kernel_coredump(sig)) {
895 /*
896 * Start a group exit and wake everybody up.
897 * This way we don't have other threads
898 * running and doing things after a slower
899 * thread has the fatal signal pending.
900 */
Oleg Nesterovf8c5b5c2008-04-30 00:52:49 -0700901 signal->flags = SIGNAL_GROUP_EXIT;
902 signal->group_exit_code = sig;
903 signal->group_stop_count = 0;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700904 t = p;
905 do {
906 sigaddset(&t->pending.signal, SIGKILL);
907 signal_wake_up(t, 1);
Oleg Nesterov18442cf2007-10-16 23:27:00 -0700908 } while_each_thread(p, t);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700909 return;
910 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700911 }
912
913 /*
914 * The signal is already in the shared-pending queue.
915 * Tell the chosen thread to wake up and dequeue it.
916 */
917 signal_wake_up(t, sig == SIGKILL);
918 return;
919}
920
921int
922__group_send_sig_info(int sig, struct siginfo *info, struct task_struct *p)
923{
Pavel Emelyanov2acb0242008-04-30 00:52:35 -0700924 int ret;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700925
926 assert_spin_locked(&p->sighand->siglock);
927 handle_stop_signal(sig, p);
928
Linus Torvalds1da177e2005-04-16 15:20:36 -0700929 /*
930 * Put this signal on the shared-pending queue, or fail with EAGAIN.
931 * We always use the shared queue for process-wide signals,
932 * to avoid several races.
933 */
934 ret = send_signal(sig, info, p, &p->signal->shared_pending);
Pavel Emelyanov2acb0242008-04-30 00:52:35 -0700935 if (ret <= 0)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700936 return ret;
937
938 __group_complete_signal(sig, p);
939 return 0;
940}
941
942/*
943 * Nuke all other threads in the group.
944 */
945void zap_other_threads(struct task_struct *p)
946{
947 struct task_struct *t;
948
Linus Torvalds1da177e2005-04-16 15:20:36 -0700949 p->signal->group_stop_count = 0;
950
Linus Torvalds1da177e2005-04-16 15:20:36 -0700951 for (t = next_thread(p); t != p; t = next_thread(t)) {
952 /*
953 * Don't bother with already dead threads
954 */
955 if (t->exit_state)
956 continue;
957
Andrea Arcangeli30e0fca2005-10-30 15:02:38 -0800958 /* SIGKILL will be handled before any pending SIGSTOP */
Linus Torvalds1da177e2005-04-16 15:20:36 -0700959 sigaddset(&t->pending.signal, SIGKILL);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700960 signal_wake_up(t, 1);
961 }
962}
963
Harvey Harrisonb5606c22008-02-13 15:03:16 -0800964int __fatal_signal_pending(struct task_struct *tsk)
Matthew Wilcoxf776d122007-12-06 11:15:50 -0500965{
966 return sigismember(&tsk->pending.signal, SIGKILL);
967}
Trond Myklebust13f09b92008-01-31 20:40:29 -0500968EXPORT_SYMBOL(__fatal_signal_pending);
Matthew Wilcoxf776d122007-12-06 11:15:50 -0500969
Oleg Nesterovf63ee722006-03-28 16:11:13 -0800970struct sighand_struct *lock_task_sighand(struct task_struct *tsk, unsigned long *flags)
971{
972 struct sighand_struct *sighand;
973
Oleg Nesterov1406f2d2008-04-30 00:52:37 -0700974 rcu_read_lock();
Oleg Nesterovf63ee722006-03-28 16:11:13 -0800975 for (;;) {
976 sighand = rcu_dereference(tsk->sighand);
977 if (unlikely(sighand == NULL))
978 break;
979
980 spin_lock_irqsave(&sighand->siglock, *flags);
981 if (likely(sighand == tsk->sighand))
982 break;
983 spin_unlock_irqrestore(&sighand->siglock, *flags);
984 }
Oleg Nesterov1406f2d2008-04-30 00:52:37 -0700985 rcu_read_unlock();
Oleg Nesterovf63ee722006-03-28 16:11:13 -0800986
987 return sighand;
988}
989
Linus Torvalds1da177e2005-04-16 15:20:36 -0700990int group_send_sig_info(int sig, struct siginfo *info, struct task_struct *p)
991{
992 unsigned long flags;
993 int ret;
994
995 ret = check_kill_permission(sig, info, p);
Oleg Nesterovf63ee722006-03-28 16:11:13 -0800996
997 if (!ret && sig) {
998 ret = -ESRCH;
999 if (lock_task_sighand(p, &flags)) {
1000 ret = __group_send_sig_info(sig, info, p);
1001 unlock_task_sighand(p, &flags);
Ingo Molnare56d0902006-01-08 01:01:37 -08001002 }
Linus Torvalds1da177e2005-04-16 15:20:36 -07001003 }
1004
1005 return ret;
1006}
1007
1008/*
Pavel Emelyanov146a5052008-02-08 04:19:22 -08001009 * __kill_pgrp_info() sends a signal to a process group: this is what the tty
Linus Torvalds1da177e2005-04-16 15:20:36 -07001010 * control characters do (^C, ^Z etc)
1011 */
1012
Eric W. Biedermanc4b92fc2006-10-02 02:17:10 -07001013int __kill_pgrp_info(int sig, struct siginfo *info, struct pid *pgrp)
Linus Torvalds1da177e2005-04-16 15:20:36 -07001014{
1015 struct task_struct *p = NULL;
1016 int retval, success;
1017
Linus Torvalds1da177e2005-04-16 15:20:36 -07001018 success = 0;
1019 retval = -ESRCH;
Eric W. Biedermanc4b92fc2006-10-02 02:17:10 -07001020 do_each_pid_task(pgrp, PIDTYPE_PGID, p) {
Linus Torvalds1da177e2005-04-16 15:20:36 -07001021 int err = group_send_sig_info(sig, info, p);
1022 success |= !err;
1023 retval = err;
Eric W. Biedermanc4b92fc2006-10-02 02:17:10 -07001024 } while_each_pid_task(pgrp, PIDTYPE_PGID, p);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001025 return success ? 0 : retval;
1026}
1027
Eric W. Biedermanc4b92fc2006-10-02 02:17:10 -07001028int kill_pid_info(int sig, struct siginfo *info, struct pid *pid)
Linus Torvalds1da177e2005-04-16 15:20:36 -07001029{
Oleg Nesterovd36174b2008-02-08 04:19:18 -08001030 int error = -ESRCH;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001031 struct task_struct *p;
1032
Ingo Molnare56d0902006-01-08 01:01:37 -08001033 rcu_read_lock();
Oleg Nesterovd36174b2008-02-08 04:19:18 -08001034retry:
Eric W. Biedermanc4b92fc2006-10-02 02:17:10 -07001035 p = pid_task(pid, PIDTYPE_PID);
Oleg Nesterovd36174b2008-02-08 04:19:18 -08001036 if (p) {
Linus Torvalds1da177e2005-04-16 15:20:36 -07001037 error = group_send_sig_info(sig, info, p);
Oleg Nesterovd36174b2008-02-08 04:19:18 -08001038 if (unlikely(error == -ESRCH))
1039 /*
1040 * The task was unhashed in between, try again.
1041 * If it is dead, pid_task() will return NULL,
1042 * if we race with de_thread() it will find the
1043 * new leader.
1044 */
1045 goto retry;
1046 }
Ingo Molnare56d0902006-01-08 01:01:37 -08001047 rcu_read_unlock();
Oleg Nesterov6ca25b52008-04-30 00:52:45 -07001048
Linus Torvalds1da177e2005-04-16 15:20:36 -07001049 return error;
1050}
1051
Matthew Wilcoxc3de4b32007-02-09 08:11:47 -07001052int
1053kill_proc_info(int sig, struct siginfo *info, pid_t pid)
Eric W. Biedermanc4b92fc2006-10-02 02:17:10 -07001054{
1055 int error;
1056 rcu_read_lock();
Pavel Emelyanovb4888932007-10-18 23:40:14 -07001057 error = kill_pid_info(sig, info, find_vpid(pid));
Eric W. Biedermanc4b92fc2006-10-02 02:17:10 -07001058 rcu_read_unlock();
1059 return error;
1060}
1061
Eric W. Biederman2425c082006-10-02 02:17:28 -07001062/* like kill_pid_info(), but doesn't use uid/euid of "current" */
1063int kill_pid_info_as_uid(int sig, struct siginfo *info, struct pid *pid,
David Quigley8f95dc52006-06-30 01:55:47 -07001064 uid_t uid, uid_t euid, u32 secid)
Harald Welte46113832005-10-10 19:44:29 +02001065{
1066 int ret = -EINVAL;
1067 struct task_struct *p;
1068
1069 if (!valid_signal(sig))
1070 return ret;
1071
1072 read_lock(&tasklist_lock);
Eric W. Biederman2425c082006-10-02 02:17:28 -07001073 p = pid_task(pid, PIDTYPE_PID);
Harald Welte46113832005-10-10 19:44:29 +02001074 if (!p) {
1075 ret = -ESRCH;
1076 goto out_unlock;
1077 }
Oleg Nesterov0811af22006-01-08 01:03:09 -08001078 if ((info == SEND_SIG_NOINFO || (!is_si_special(info) && SI_FROMUSER(info)))
Harald Welte46113832005-10-10 19:44:29 +02001079 && (euid != p->suid) && (euid != p->uid)
1080 && (uid != p->suid) && (uid != p->uid)) {
1081 ret = -EPERM;
1082 goto out_unlock;
1083 }
David Quigley8f95dc52006-06-30 01:55:47 -07001084 ret = security_task_kill(p, info, sig, secid);
1085 if (ret)
1086 goto out_unlock;
Harald Welte46113832005-10-10 19:44:29 +02001087 if (sig && p->sighand) {
1088 unsigned long flags;
1089 spin_lock_irqsave(&p->sighand->siglock, flags);
1090 ret = __group_send_sig_info(sig, info, p);
1091 spin_unlock_irqrestore(&p->sighand->siglock, flags);
1092 }
1093out_unlock:
1094 read_unlock(&tasklist_lock);
1095 return ret;
1096}
Eric W. Biederman2425c082006-10-02 02:17:28 -07001097EXPORT_SYMBOL_GPL(kill_pid_info_as_uid);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001098
1099/*
1100 * kill_something_info() interprets pid in interesting ways just like kill(2).
1101 *
1102 * POSIX specifies that kill(-1,sig) is unspecified, but what we have
1103 * is probably wrong. Should make it like BSD or SYSV.
1104 */
1105
1106static int kill_something_info(int sig, struct siginfo *info, int pid)
1107{
Eric W. Biederman8d42db182007-02-12 00:52:55 -08001108 int ret;
Pavel Emelyanovd5df7632008-02-08 04:19:22 -08001109
1110 if (pid > 0) {
1111 rcu_read_lock();
1112 ret = kill_pid_info(sig, info, find_vpid(pid));
1113 rcu_read_unlock();
1114 return ret;
1115 }
1116
1117 read_lock(&tasklist_lock);
1118 if (pid != -1) {
1119 ret = __kill_pgrp_info(sig, info,
1120 pid ? find_vpid(-pid) : task_pgrp(current));
1121 } else {
Linus Torvalds1da177e2005-04-16 15:20:36 -07001122 int retval = 0, count = 0;
1123 struct task_struct * p;
1124
Linus Torvalds1da177e2005-04-16 15:20:36 -07001125 for_each_process(p) {
Pavel Emelyanovbac0abd2007-10-18 23:40:18 -07001126 if (p->pid > 1 && !same_thread_group(p, current)) {
Linus Torvalds1da177e2005-04-16 15:20:36 -07001127 int err = group_send_sig_info(sig, info, p);
1128 ++count;
1129 if (err != -EPERM)
1130 retval = err;
1131 }
1132 }
Eric W. Biederman8d42db182007-02-12 00:52:55 -08001133 ret = count ? retval : -ESRCH;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001134 }
Pavel Emelyanovd5df7632008-02-08 04:19:22 -08001135 read_unlock(&tasklist_lock);
1136
Eric W. Biederman8d42db182007-02-12 00:52:55 -08001137 return ret;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001138}
1139
1140/*
1141 * These are for backward compatibility with the rest of the kernel source.
1142 */
1143
1144/*
1145 * These two are the most common entry points. They send a signal
1146 * just to the specific thread.
1147 */
1148int
1149send_sig_info(int sig, struct siginfo *info, struct task_struct *p)
1150{
1151 int ret;
1152 unsigned long flags;
1153
1154 /*
1155 * Make sure legacy kernel users don't send in bad values
1156 * (normal paths check this in check_kill_permission).
1157 */
Jesper Juhl7ed20e12005-05-01 08:59:14 -07001158 if (!valid_signal(sig))
Linus Torvalds1da177e2005-04-16 15:20:36 -07001159 return -EINVAL;
1160
1161 /*
1162 * We need the tasklist lock even for the specific
1163 * thread case (when we don't need to follow the group
1164 * lists) in order to avoid races with "p->sighand"
1165 * going away or changing from under us.
1166 */
1167 read_lock(&tasklist_lock);
1168 spin_lock_irqsave(&p->sighand->siglock, flags);
1169 ret = specific_send_sig_info(sig, info, p);
1170 spin_unlock_irqrestore(&p->sighand->siglock, flags);
1171 read_unlock(&tasklist_lock);
1172 return ret;
1173}
1174
Oleg Nesterovb67a1b92005-10-30 15:03:44 -08001175#define __si_special(priv) \
1176 ((priv) ? SEND_SIG_PRIV : SEND_SIG_NOINFO)
1177
Linus Torvalds1da177e2005-04-16 15:20:36 -07001178int
1179send_sig(int sig, struct task_struct *p, int priv)
1180{
Oleg Nesterovb67a1b92005-10-30 15:03:44 -08001181 return send_sig_info(sig, __si_special(priv), p);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001182}
1183
Linus Torvalds1da177e2005-04-16 15:20:36 -07001184void
1185force_sig(int sig, struct task_struct *p)
1186{
Oleg Nesterovb67a1b92005-10-30 15:03:44 -08001187 force_sig_info(sig, SEND_SIG_PRIV, p);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001188}
1189
1190/*
1191 * When things go south during signal handling, we
1192 * will force a SIGSEGV. And if the signal that caused
1193 * the problem was already a SIGSEGV, we'll want to
1194 * make sure we don't even try to deliver the signal..
1195 */
1196int
1197force_sigsegv(int sig, struct task_struct *p)
1198{
1199 if (sig == SIGSEGV) {
1200 unsigned long flags;
1201 spin_lock_irqsave(&p->sighand->siglock, flags);
1202 p->sighand->action[sig - 1].sa.sa_handler = SIG_DFL;
1203 spin_unlock_irqrestore(&p->sighand->siglock, flags);
1204 }
1205 force_sig(SIGSEGV, p);
1206 return 0;
1207}
1208
Eric W. Biedermanc4b92fc2006-10-02 02:17:10 -07001209int kill_pgrp(struct pid *pid, int sig, int priv)
1210{
Pavel Emelyanov146a5052008-02-08 04:19:22 -08001211 int ret;
1212
1213 read_lock(&tasklist_lock);
1214 ret = __kill_pgrp_info(sig, __si_special(priv), pid);
1215 read_unlock(&tasklist_lock);
1216
1217 return ret;
Eric W. Biedermanc4b92fc2006-10-02 02:17:10 -07001218}
1219EXPORT_SYMBOL(kill_pgrp);
1220
1221int kill_pid(struct pid *pid, int sig, int priv)
1222{
1223 return kill_pid_info(sig, __si_special(priv), pid);
1224}
1225EXPORT_SYMBOL(kill_pid);
1226
Linus Torvalds1da177e2005-04-16 15:20:36 -07001227int
Linus Torvalds1da177e2005-04-16 15:20:36 -07001228kill_proc(pid_t pid, int sig, int priv)
1229{
Pavel Emelyanovb4888932007-10-18 23:40:14 -07001230 int ret;
1231
1232 rcu_read_lock();
1233 ret = kill_pid_info(sig, __si_special(priv), find_pid(pid));
1234 rcu_read_unlock();
1235 return ret;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001236}
1237
1238/*
1239 * These functions support sending signals using preallocated sigqueue
1240 * structures. This is needed "because realtime applications cannot
1241 * afford to lose notifications of asynchronous events, like timer
1242 * expirations or I/O completions". In the case of Posix Timers
1243 * we allocate the sigqueue structure from the timer_create. If this
1244 * allocation fails we are able to report the failure to the application
1245 * with an EAGAIN error.
1246 */
1247
1248struct sigqueue *sigqueue_alloc(void)
1249{
1250 struct sigqueue *q;
1251
1252 if ((q = __sigqueue_alloc(current, GFP_KERNEL, 0)))
1253 q->flags |= SIGQUEUE_PREALLOC;
1254 return(q);
1255}
1256
1257void sigqueue_free(struct sigqueue *q)
1258{
1259 unsigned long flags;
Oleg Nesterov60187d22007-08-30 23:56:35 -07001260 spinlock_t *lock = &current->sighand->siglock;
1261
Linus Torvalds1da177e2005-04-16 15:20:36 -07001262 BUG_ON(!(q->flags & SIGQUEUE_PREALLOC));
1263 /*
1264 * If the signal is still pending remove it from the
Oleg Nesterov60187d22007-08-30 23:56:35 -07001265 * pending queue. We must hold ->siglock while testing
1266 * q->list to serialize with collect_signal().
Linus Torvalds1da177e2005-04-16 15:20:36 -07001267 */
Oleg Nesterov60187d22007-08-30 23:56:35 -07001268 spin_lock_irqsave(lock, flags);
1269 if (!list_empty(&q->list))
1270 list_del_init(&q->list);
1271 spin_unlock_irqrestore(lock, flags);
1272
Linus Torvalds1da177e2005-04-16 15:20:36 -07001273 q->flags &= ~SIGQUEUE_PREALLOC;
1274 __sigqueue_free(q);
1275}
1276
Pavel Emelyanov9e3bd6c2008-04-30 00:52:41 -07001277static int do_send_sigqueue(int sig, struct sigqueue *q, struct task_struct *t,
Oleg Nesterov5fc894b2008-04-30 00:52:48 -07001278 struct sigpending *pending)
Pavel Emelyanov9e3bd6c2008-04-30 00:52:41 -07001279{
Oleg Nesterov5fc894b2008-04-30 00:52:48 -07001280 handle_stop_signal(sig, t);
1281
Pavel Emelyanov9e3bd6c2008-04-30 00:52:41 -07001282 if (unlikely(!list_empty(&q->list))) {
1283 /*
1284 * If an SI_TIMER entry is already queue just increment
1285 * the overrun count.
1286 */
1287
1288 BUG_ON(q->info.si_code != SI_TIMER);
1289 q->info.si_overrun++;
1290 return 0;
1291 }
1292
1293 if (sig_ignored(t, sig))
1294 return 1;
1295
1296 signalfd_notify(t, sig);
1297 list_add_tail(&q->list, &pending->list);
1298 sigaddset(&pending->signal, sig);
1299 return 0;
1300}
1301
Oleg Nesterov54767902006-03-28 16:11:30 -08001302int send_sigqueue(int sig, struct sigqueue *q, struct task_struct *p)
Linus Torvalds1da177e2005-04-16 15:20:36 -07001303{
1304 unsigned long flags;
Pavel Emelyanov9e3bd6c2008-04-30 00:52:41 -07001305 int ret = -1;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001306
Linus Torvalds1da177e2005-04-16 15:20:36 -07001307 BUG_ON(!(q->flags & SIGQUEUE_PREALLOC));
Ingo Molnare56d0902006-01-08 01:01:37 -08001308
1309 /*
1310 * The rcu based delayed sighand destroy makes it possible to
1311 * run this without tasklist lock held. The task struct itself
1312 * cannot go away as create_timer did get_task_struct().
1313 *
1314 * We return -1, when the task is marked exiting, so
1315 * posix_timer_event can redirect it to the group leader
1316 */
Pavel Emelyanov9e3bd6c2008-04-30 00:52:41 -07001317 if (!likely(lock_task_sighand(p, &flags)))
Oleg Nesterove752dd62005-09-06 15:17:42 -07001318 goto out_err;
Oleg Nesterove752dd62005-09-06 15:17:42 -07001319
Pavel Emelyanov9e3bd6c2008-04-30 00:52:41 -07001320 ret = do_send_sigqueue(sig, q, p, &p->pending);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001321
Linus Torvalds1da177e2005-04-16 15:20:36 -07001322 if (!sigismember(&p->blocked, sig))
1323 signal_wake_up(p, sig == SIGKILL);
1324
Oleg Nesterov54767902006-03-28 16:11:30 -08001325 unlock_task_sighand(p, &flags);
Oleg Nesterove752dd62005-09-06 15:17:42 -07001326out_err:
Oleg Nesterove752dd62005-09-06 15:17:42 -07001327 return ret;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001328}
1329
1330int
1331send_group_sigqueue(int sig, struct sigqueue *q, struct task_struct *p)
1332{
1333 unsigned long flags;
Pavel Emelyanov9e3bd6c2008-04-30 00:52:41 -07001334 int ret;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001335
1336 BUG_ON(!(q->flags & SIGQUEUE_PREALLOC));
Ingo Molnare56d0902006-01-08 01:01:37 -08001337
Linus Torvalds1da177e2005-04-16 15:20:36 -07001338 read_lock(&tasklist_lock);
Ingo Molnare56d0902006-01-08 01:01:37 -08001339 /* Since it_lock is held, p->sighand cannot be NULL. */
Linus Torvalds1da177e2005-04-16 15:20:36 -07001340 spin_lock_irqsave(&p->sighand->siglock, flags);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001341
Pavel Emelyanov9e3bd6c2008-04-30 00:52:41 -07001342 ret = do_send_sigqueue(sig, q, p, &p->signal->shared_pending);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001343
1344 __group_complete_signal(sig, p);
Pavel Emelyanov9e3bd6c2008-04-30 00:52:41 -07001345
Linus Torvalds1da177e2005-04-16 15:20:36 -07001346 spin_unlock_irqrestore(&p->sighand->siglock, flags);
1347 read_unlock(&tasklist_lock);
Ingo Molnare56d0902006-01-08 01:01:37 -08001348 return ret;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001349}
1350
1351/*
1352 * Wake up any threads in the parent blocked in wait* syscalls.
1353 */
1354static inline void __wake_up_parent(struct task_struct *p,
1355 struct task_struct *parent)
1356{
1357 wake_up_interruptible_sync(&parent->signal->wait_chldexit);
1358}
1359
1360/*
1361 * Let a parent know about the death of a child.
1362 * For a stopped/continued status change, use do_notify_parent_cldstop instead.
1363 */
1364
1365void do_notify_parent(struct task_struct *tsk, int sig)
1366{
1367 struct siginfo info;
1368 unsigned long flags;
1369 struct sighand_struct *psig;
1370
1371 BUG_ON(sig == -1);
1372
1373 /* do_notify_parent_cldstop should have been called instead. */
Matthew Wilcoxe1abb392007-12-06 11:07:35 -05001374 BUG_ON(task_is_stopped_or_traced(tsk));
Linus Torvalds1da177e2005-04-16 15:20:36 -07001375
1376 BUG_ON(!tsk->ptrace &&
1377 (tsk->group_leader != tsk || !thread_group_empty(tsk)));
1378
1379 info.si_signo = sig;
1380 info.si_errno = 0;
Pavel Emelyanovb4888932007-10-18 23:40:14 -07001381 /*
1382 * we are under tasklist_lock here so our parent is tied to
1383 * us and cannot exit and release its namespace.
1384 *
1385 * the only it can is to switch its nsproxy with sys_unshare,
1386 * bu uncharing pid namespaces is not allowed, so we'll always
1387 * see relevant namespace
1388 *
1389 * write_lock() currently calls preempt_disable() which is the
1390 * same as rcu_read_lock(), but according to Oleg, this is not
1391 * correct to rely on this
1392 */
1393 rcu_read_lock();
1394 info.si_pid = task_pid_nr_ns(tsk, tsk->parent->nsproxy->pid_ns);
1395 rcu_read_unlock();
1396
Linus Torvalds1da177e2005-04-16 15:20:36 -07001397 info.si_uid = tsk->uid;
1398
1399 /* FIXME: find out whether or not this is supposed to be c*time. */
1400 info.si_utime = cputime_to_jiffies(cputime_add(tsk->utime,
1401 tsk->signal->utime));
1402 info.si_stime = cputime_to_jiffies(cputime_add(tsk->stime,
1403 tsk->signal->stime));
1404
1405 info.si_status = tsk->exit_code & 0x7f;
1406 if (tsk->exit_code & 0x80)
1407 info.si_code = CLD_DUMPED;
1408 else if (tsk->exit_code & 0x7f)
1409 info.si_code = CLD_KILLED;
1410 else {
1411 info.si_code = CLD_EXITED;
1412 info.si_status = tsk->exit_code >> 8;
1413 }
1414
1415 psig = tsk->parent->sighand;
1416 spin_lock_irqsave(&psig->siglock, flags);
Oleg Nesterov7ed01752005-11-10 17:22:18 +03001417 if (!tsk->ptrace && sig == SIGCHLD &&
Linus Torvalds1da177e2005-04-16 15:20:36 -07001418 (psig->action[SIGCHLD-1].sa.sa_handler == SIG_IGN ||
1419 (psig->action[SIGCHLD-1].sa.sa_flags & SA_NOCLDWAIT))) {
1420 /*
1421 * We are exiting and our parent doesn't care. POSIX.1
1422 * defines special semantics for setting SIGCHLD to SIG_IGN
1423 * or setting the SA_NOCLDWAIT flag: we should be reaped
1424 * automatically and not left for our parent's wait4 call.
1425 * Rather than having the parent do it as a magic kind of
1426 * signal handler, we just set this to tell do_exit that we
1427 * can be cleaned up without becoming a zombie. Note that
1428 * we still call __wake_up_parent in this case, because a
1429 * blocked sys_wait4 might now return -ECHILD.
1430 *
1431 * Whether we send SIGCHLD or not for SA_NOCLDWAIT
1432 * is implementation-defined: we do (if you don't want
1433 * it, just use SIG_IGN instead).
1434 */
1435 tsk->exit_signal = -1;
1436 if (psig->action[SIGCHLD-1].sa.sa_handler == SIG_IGN)
1437 sig = 0;
1438 }
Jesper Juhl7ed20e12005-05-01 08:59:14 -07001439 if (valid_signal(sig) && sig > 0)
Linus Torvalds1da177e2005-04-16 15:20:36 -07001440 __group_send_sig_info(sig, &info, tsk->parent);
1441 __wake_up_parent(tsk, tsk->parent);
1442 spin_unlock_irqrestore(&psig->siglock, flags);
1443}
1444
Oleg Nesterova1d5e212006-03-28 16:11:29 -08001445static void do_notify_parent_cldstop(struct task_struct *tsk, int why)
Linus Torvalds1da177e2005-04-16 15:20:36 -07001446{
1447 struct siginfo info;
1448 unsigned long flags;
Oleg Nesterovbc505a42005-09-06 15:17:32 -07001449 struct task_struct *parent;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001450 struct sighand_struct *sighand;
1451
Oleg Nesterova1d5e212006-03-28 16:11:29 -08001452 if (tsk->ptrace & PT_PTRACED)
Oleg Nesterovbc505a42005-09-06 15:17:32 -07001453 parent = tsk->parent;
1454 else {
1455 tsk = tsk->group_leader;
1456 parent = tsk->real_parent;
1457 }
1458
Linus Torvalds1da177e2005-04-16 15:20:36 -07001459 info.si_signo = SIGCHLD;
1460 info.si_errno = 0;
Pavel Emelyanovb4888932007-10-18 23:40:14 -07001461 /*
1462 * see comment in do_notify_parent() abot the following 3 lines
1463 */
1464 rcu_read_lock();
1465 info.si_pid = task_pid_nr_ns(tsk, tsk->parent->nsproxy->pid_ns);
1466 rcu_read_unlock();
1467
Linus Torvalds1da177e2005-04-16 15:20:36 -07001468 info.si_uid = tsk->uid;
1469
1470 /* FIXME: find out whether or not this is supposed to be c*time. */
1471 info.si_utime = cputime_to_jiffies(tsk->utime);
1472 info.si_stime = cputime_to_jiffies(tsk->stime);
1473
1474 info.si_code = why;
1475 switch (why) {
1476 case CLD_CONTINUED:
1477 info.si_status = SIGCONT;
1478 break;
1479 case CLD_STOPPED:
1480 info.si_status = tsk->signal->group_exit_code & 0x7f;
1481 break;
1482 case CLD_TRAPPED:
1483 info.si_status = tsk->exit_code & 0x7f;
1484 break;
1485 default:
1486 BUG();
1487 }
1488
1489 sighand = parent->sighand;
1490 spin_lock_irqsave(&sighand->siglock, flags);
1491 if (sighand->action[SIGCHLD-1].sa.sa_handler != SIG_IGN &&
1492 !(sighand->action[SIGCHLD-1].sa.sa_flags & SA_NOCLDSTOP))
1493 __group_send_sig_info(SIGCHLD, &info, parent);
1494 /*
1495 * Even if SIGCHLD is not generated, we must wake up wait4 calls.
1496 */
1497 __wake_up_parent(tsk, parent);
1498 spin_unlock_irqrestore(&sighand->siglock, flags);
1499}
1500
Oleg Nesterovd5f70c02006-06-26 00:26:07 -07001501static inline int may_ptrace_stop(void)
1502{
1503 if (!likely(current->ptrace & PT_PTRACED))
1504 return 0;
Oleg Nesterovd5f70c02006-06-26 00:26:07 -07001505 /*
1506 * Are we in the middle of do_coredump?
1507 * If so and our tracer is also part of the coredump stopping
1508 * is a deadlock situation, and pointless because our tracer
1509 * is dead so don't allow us to stop.
1510 * If SIGKILL was already sent before the caller unlocked
1511 * ->siglock we must see ->core_waiters != 0. Otherwise it
1512 * is safe to enter schedule().
1513 */
1514 if (unlikely(current->mm->core_waiters) &&
1515 unlikely(current->mm == current->parent->mm))
1516 return 0;
1517
1518 return 1;
1519}
1520
Linus Torvalds1da177e2005-04-16 15:20:36 -07001521/*
Roland McGrath1a669c22008-02-06 01:37:37 -08001522 * Return nonzero if there is a SIGKILL that should be waking us up.
1523 * Called with the siglock held.
1524 */
1525static int sigkill_pending(struct task_struct *tsk)
1526{
1527 return ((sigismember(&tsk->pending.signal, SIGKILL) ||
1528 sigismember(&tsk->signal->shared_pending.signal, SIGKILL)) &&
1529 !unlikely(sigismember(&tsk->blocked, SIGKILL)));
1530}
1531
1532/*
Linus Torvalds1da177e2005-04-16 15:20:36 -07001533 * This must be called with current->sighand->siglock held.
1534 *
1535 * This should be the path for all ptrace stops.
1536 * We always set current->last_siginfo while stopped here.
1537 * That makes it a way to test a stopped process for
1538 * being ptrace-stopped vs being job-control-stopped.
1539 *
Oleg Nesterov20686a32008-02-08 04:19:03 -08001540 * If we actually decide not to stop at all because the tracer
1541 * is gone, we keep current->exit_code unless clear_code.
Linus Torvalds1da177e2005-04-16 15:20:36 -07001542 */
Oleg Nesterov20686a32008-02-08 04:19:03 -08001543static void ptrace_stop(int exit_code, int clear_code, siginfo_t *info)
Linus Torvalds1da177e2005-04-16 15:20:36 -07001544{
Roland McGrath1a669c22008-02-06 01:37:37 -08001545 int killed = 0;
1546
1547 if (arch_ptrace_stop_needed(exit_code, info)) {
1548 /*
1549 * The arch code has something special to do before a
1550 * ptrace stop. This is allowed to block, e.g. for faults
1551 * on user stack pages. We can't keep the siglock while
1552 * calling arch_ptrace_stop, so we must release it now.
1553 * To preserve proper semantics, we must do this before
1554 * any signal bookkeeping like checking group_stop_count.
1555 * Meanwhile, a SIGKILL could come in before we retake the
1556 * siglock. That must prevent us from sleeping in TASK_TRACED.
1557 * So after regaining the lock, we must check for SIGKILL.
1558 */
1559 spin_unlock_irq(&current->sighand->siglock);
1560 arch_ptrace_stop(exit_code, info);
1561 spin_lock_irq(&current->sighand->siglock);
1562 killed = sigkill_pending(current);
1563 }
1564
Linus Torvalds1da177e2005-04-16 15:20:36 -07001565 /*
1566 * If there is a group stop in progress,
1567 * we must participate in the bookkeeping.
1568 */
1569 if (current->signal->group_stop_count > 0)
1570 --current->signal->group_stop_count;
1571
1572 current->last_siginfo = info;
1573 current->exit_code = exit_code;
1574
1575 /* Let the debugger run. */
Oleg Nesterovd9ae90a2008-02-06 01:36:13 -08001576 __set_current_state(TASK_TRACED);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001577 spin_unlock_irq(&current->sighand->siglock);
1578 read_lock(&tasklist_lock);
Roland McGrath1a669c22008-02-06 01:37:37 -08001579 if (!unlikely(killed) && may_ptrace_stop()) {
Oleg Nesterova1d5e212006-03-28 16:11:29 -08001580 do_notify_parent_cldstop(current, CLD_TRAPPED);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001581 read_unlock(&tasklist_lock);
1582 schedule();
1583 } else {
1584 /*
1585 * By the time we got the lock, our tracer went away.
Oleg Nesterov6405f7f2008-02-08 04:19:00 -08001586 * Don't drop the lock yet, another tracer may come.
Linus Torvalds1da177e2005-04-16 15:20:36 -07001587 */
Oleg Nesterov6405f7f2008-02-08 04:19:00 -08001588 __set_current_state(TASK_RUNNING);
Oleg Nesterov20686a32008-02-08 04:19:03 -08001589 if (clear_code)
1590 current->exit_code = 0;
Oleg Nesterov6405f7f2008-02-08 04:19:00 -08001591 read_unlock(&tasklist_lock);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001592 }
1593
1594 /*
Roland McGrath13b1c3d2008-03-03 20:22:05 -08001595 * While in TASK_TRACED, we were considered "frozen enough".
1596 * Now that we woke up, it's crucial if we're supposed to be
1597 * frozen that we freeze now before running anything substantial.
1598 */
1599 try_to_freeze();
1600
1601 /*
Linus Torvalds1da177e2005-04-16 15:20:36 -07001602 * We are back. Now reacquire the siglock before touching
1603 * last_siginfo, so that we are sure to have synchronized with
1604 * any signal-sending on another CPU that wants to examine it.
1605 */
1606 spin_lock_irq(&current->sighand->siglock);
1607 current->last_siginfo = NULL;
1608
1609 /*
1610 * Queued signals ignored us while we were stopped for tracing.
1611 * So check for any that we should take before resuming user mode.
Roland McGrathb74d0de2007-06-06 03:59:00 -07001612 * This sets TIF_SIGPENDING, but never clears it.
Linus Torvalds1da177e2005-04-16 15:20:36 -07001613 */
Roland McGrathb74d0de2007-06-06 03:59:00 -07001614 recalc_sigpending_tsk(current);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001615}
1616
1617void ptrace_notify(int exit_code)
1618{
1619 siginfo_t info;
1620
1621 BUG_ON((exit_code & (0x7f | ~0xffff)) != SIGTRAP);
1622
1623 memset(&info, 0, sizeof info);
1624 info.si_signo = SIGTRAP;
1625 info.si_code = exit_code;
Pavel Emelyanovb4888932007-10-18 23:40:14 -07001626 info.si_pid = task_pid_vnr(current);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001627 info.si_uid = current->uid;
1628
1629 /* Let the debugger run. */
1630 spin_lock_irq(&current->sighand->siglock);
Oleg Nesterov20686a32008-02-08 04:19:03 -08001631 ptrace_stop(exit_code, 1, &info);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001632 spin_unlock_irq(&current->sighand->siglock);
1633}
1634
Linus Torvalds1da177e2005-04-16 15:20:36 -07001635static void
1636finish_stop(int stop_count)
1637{
1638 /*
1639 * If there are no other threads in the group, or if there is
1640 * a group stop in progress and we are the last to stop,
1641 * report to the parent. When ptraced, every thread reports itself.
1642 */
Oleg Nesterova1d5e212006-03-28 16:11:29 -08001643 if (stop_count == 0 || (current->ptrace & PT_PTRACED)) {
1644 read_lock(&tasklist_lock);
1645 do_notify_parent_cldstop(current, CLD_STOPPED);
1646 read_unlock(&tasklist_lock);
1647 }
Linus Torvalds1da177e2005-04-16 15:20:36 -07001648
Rafael J. Wysocki3df494a2006-12-13 00:34:28 -08001649 do {
1650 schedule();
1651 } while (try_to_freeze());
Linus Torvalds1da177e2005-04-16 15:20:36 -07001652 /*
1653 * Now we don't run again until continued.
1654 */
1655 current->exit_code = 0;
1656}
1657
1658/*
1659 * This performs the stopping for SIGSTOP and other stop signals.
1660 * We have to stop all threads in the thread group.
1661 * Returns nonzero if we've actually stopped and released the siglock.
1662 * Returns zero if we didn't stop and still hold the siglock.
1663 */
Oleg Nesterova122b342006-03-28 16:11:22 -08001664static int do_signal_stop(int signr)
Linus Torvalds1da177e2005-04-16 15:20:36 -07001665{
1666 struct signal_struct *sig = current->signal;
Oleg Nesterovdac27f42006-03-28 16:11:28 -08001667 int stop_count;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001668
Linus Torvalds1da177e2005-04-16 15:20:36 -07001669 if (sig->group_stop_count > 0) {
1670 /*
1671 * There is a group stop in progress. We don't need to
1672 * start another one.
1673 */
Linus Torvalds1da177e2005-04-16 15:20:36 -07001674 stop_count = --sig->group_stop_count;
Oleg Nesterovdac27f42006-03-28 16:11:28 -08001675 } else {
Oleg Nesterovf558b7e2008-02-04 22:27:24 -08001676 struct task_struct *t;
1677
Oleg Nesteroved5d2ca2008-02-04 22:27:24 -08001678 if (!likely(sig->flags & SIGNAL_STOP_DEQUEUED) ||
Oleg Nesterov573cf9a2008-04-30 00:52:36 -07001679 unlikely(signal_group_exit(sig)))
Oleg Nesterovf558b7e2008-02-04 22:27:24 -08001680 return 0;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001681 /*
Linus Torvalds1da177e2005-04-16 15:20:36 -07001682 * There is no group stop already in progress.
Oleg Nesterova122b342006-03-28 16:11:22 -08001683 * We must initiate one now.
Linus Torvalds1da177e2005-04-16 15:20:36 -07001684 */
Oleg Nesterova122b342006-03-28 16:11:22 -08001685 sig->group_exit_code = signr;
1686
1687 stop_count = 0;
1688 for (t = next_thread(current); t != current; t = next_thread(t))
1689 /*
1690 * Setting state to TASK_STOPPED for a group
1691 * stop is always done with the siglock held,
1692 * so this check has no races.
1693 */
Oleg Nesterovd12619b2008-02-08 04:19:12 -08001694 if (!(t->flags & PF_EXITING) &&
Matthew Wilcoxe1abb392007-12-06 11:07:35 -05001695 !task_is_stopped_or_traced(t)) {
Oleg Nesterova122b342006-03-28 16:11:22 -08001696 stop_count++;
1697 signal_wake_up(t, 0);
1698 }
1699 sig->group_stop_count = stop_count;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001700 }
1701
Oleg Nesterovdac27f42006-03-28 16:11:28 -08001702 if (stop_count == 0)
1703 sig->flags = SIGNAL_STOP_STOPPED;
1704 current->exit_code = sig->group_exit_code;
1705 __set_current_state(TASK_STOPPED);
1706
1707 spin_unlock_irq(&current->sighand->siglock);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001708 finish_stop(stop_count);
1709 return 1;
1710}
1711
Roland McGrath18c98b62008-04-17 18:44:38 -07001712static int ptrace_signal(int signr, siginfo_t *info,
1713 struct pt_regs *regs, void *cookie)
1714{
1715 if (!(current->ptrace & PT_PTRACED))
1716 return signr;
1717
1718 ptrace_signal_deliver(regs, cookie);
1719
1720 /* Let the debugger run. */
1721 ptrace_stop(signr, 0, info);
1722
1723 /* We're back. Did the debugger cancel the sig? */
1724 signr = current->exit_code;
1725 if (signr == 0)
1726 return signr;
1727
1728 current->exit_code = 0;
1729
1730 /* Update the siginfo structure if the signal has
1731 changed. If the debugger wanted something
1732 specific in the siginfo structure then it should
1733 have updated *info via PTRACE_SETSIGINFO. */
1734 if (signr != info->si_signo) {
1735 info->si_signo = signr;
1736 info->si_errno = 0;
1737 info->si_code = SI_USER;
1738 info->si_pid = task_pid_vnr(current->parent);
1739 info->si_uid = current->parent->uid;
1740 }
1741
1742 /* If the (new) signal is now blocked, requeue it. */
1743 if (sigismember(&current->blocked, signr)) {
1744 specific_send_sig_info(signr, info, current);
1745 signr = 0;
1746 }
1747
1748 return signr;
1749}
1750
Linus Torvalds1da177e2005-04-16 15:20:36 -07001751int get_signal_to_deliver(siginfo_t *info, struct k_sigaction *return_ka,
1752 struct pt_regs *regs, void *cookie)
1753{
Oleg Nesterovf6b76d42008-04-30 00:52:47 -07001754 struct sighand_struct *sighand = current->sighand;
1755 struct signal_struct *signal = current->signal;
1756 int signr;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001757
Roland McGrath13b1c3d2008-03-03 20:22:05 -08001758relock:
1759 /*
1760 * We'll jump back here after any time we were stopped in TASK_STOPPED.
1761 * While in TASK_STOPPED, we were considered "frozen enough".
1762 * Now that we woke up, it's crucial if we're supposed to be
1763 * frozen that we freeze now before running anything substantial.
1764 */
Rafael J. Wysockifc558a72006-03-23 03:00:05 -08001765 try_to_freeze();
1766
Oleg Nesterovf6b76d42008-04-30 00:52:47 -07001767 spin_lock_irq(&sighand->siglock);
Oleg Nesterove4420552008-04-30 00:52:44 -07001768
Oleg Nesterovf6b76d42008-04-30 00:52:47 -07001769 if (unlikely(signal->flags & SIGNAL_CLD_MASK)) {
1770 int why = (signal->flags & SIGNAL_STOP_CONTINUED)
Oleg Nesterove4420552008-04-30 00:52:44 -07001771 ? CLD_CONTINUED : CLD_STOPPED;
Oleg Nesterovf6b76d42008-04-30 00:52:47 -07001772 signal->flags &= ~SIGNAL_CLD_MASK;
1773 spin_unlock_irq(&sighand->siglock);
Oleg Nesterove4420552008-04-30 00:52:44 -07001774
1775 read_lock(&tasklist_lock);
1776 do_notify_parent_cldstop(current->group_leader, why);
1777 read_unlock(&tasklist_lock);
1778 goto relock;
1779 }
1780
Linus Torvalds1da177e2005-04-16 15:20:36 -07001781 for (;;) {
1782 struct k_sigaction *ka;
1783
Oleg Nesterovf6b76d42008-04-30 00:52:47 -07001784 if (unlikely(signal->group_stop_count > 0) &&
Oleg Nesterovf558b7e2008-02-04 22:27:24 -08001785 do_signal_stop(0))
Linus Torvalds1da177e2005-04-16 15:20:36 -07001786 goto relock;
1787
Oleg Nesterovf6b76d42008-04-30 00:52:47 -07001788 signr = dequeue_signal(current, &current->blocked, info);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001789 if (!signr)
1790 break; /* will return 0 */
1791
Roland McGrath18c98b62008-04-17 18:44:38 -07001792 if (signr != SIGKILL) {
1793 signr = ptrace_signal(signr, info, regs, cookie);
1794 if (!signr)
Linus Torvalds1da177e2005-04-16 15:20:36 -07001795 continue;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001796 }
1797
Oleg Nesterovf6b76d42008-04-30 00:52:47 -07001798 ka = &sighand->action[signr-1];
Linus Torvalds1da177e2005-04-16 15:20:36 -07001799 if (ka->sa.sa_handler == SIG_IGN) /* Do nothing. */
1800 continue;
1801 if (ka->sa.sa_handler != SIG_DFL) {
1802 /* Run the handler. */
1803 *return_ka = *ka;
1804
1805 if (ka->sa.sa_flags & SA_ONESHOT)
1806 ka->sa.sa_handler = SIG_DFL;
1807
1808 break; /* will return non-zero "signr" value */
1809 }
1810
1811 /*
1812 * Now we are doing the default action for this signal.
1813 */
1814 if (sig_kernel_ignore(signr)) /* Default is nothing. */
1815 continue;
1816
Sukadev Bhattiprolu84d73782006-12-08 02:38:01 -08001817 /*
Sukadev Bhattiprolu0fbc26a2007-10-18 23:40:13 -07001818 * Global init gets no signals it doesn't want.
Sukadev Bhattiprolu84d73782006-12-08 02:38:01 -08001819 */
Sukadev Bhattiprolu0fbc26a2007-10-18 23:40:13 -07001820 if (is_global_init(current))
Linus Torvalds1da177e2005-04-16 15:20:36 -07001821 continue;
1822
1823 if (sig_kernel_stop(signr)) {
1824 /*
1825 * The default action is to stop all threads in
1826 * the thread group. The job control signals
1827 * do nothing in an orphaned pgrp, but SIGSTOP
1828 * always works. Note that siglock needs to be
1829 * dropped during the call to is_orphaned_pgrp()
1830 * because of lock ordering with tasklist_lock.
1831 * This allows an intervening SIGCONT to be posted.
1832 * We need to check for that and bail out if necessary.
1833 */
1834 if (signr != SIGSTOP) {
Oleg Nesterovf6b76d42008-04-30 00:52:47 -07001835 spin_unlock_irq(&sighand->siglock);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001836
1837 /* signals can be posted during this window */
1838
Eric W. Biederman3e7cd6c2007-02-12 00:52:58 -08001839 if (is_current_pgrp_orphaned())
Linus Torvalds1da177e2005-04-16 15:20:36 -07001840 goto relock;
1841
Oleg Nesterovf6b76d42008-04-30 00:52:47 -07001842 spin_lock_irq(&sighand->siglock);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001843 }
1844
1845 if (likely(do_signal_stop(signr))) {
1846 /* It released the siglock. */
1847 goto relock;
1848 }
1849
1850 /*
1851 * We didn't actually stop, due to a race
1852 * with SIGCONT or something like that.
1853 */
1854 continue;
1855 }
1856
Oleg Nesterovf6b76d42008-04-30 00:52:47 -07001857 spin_unlock_irq(&sighand->siglock);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001858
1859 /*
1860 * Anything else is fatal, maybe with a core dump.
1861 */
1862 current->flags |= PF_SIGNALED;
Ingo Molnar45807a12007-07-15 23:40:10 -07001863 if ((signr != SIGKILL) && print_fatal_signals)
1864 print_fatal_signal(regs, signr);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001865 if (sig_kernel_coredump(signr)) {
1866 /*
1867 * If it was able to dump core, this kills all
1868 * other threads in the group and synchronizes with
1869 * their demise. If we lost the race with another
1870 * thread getting here, it set group_exit_code
1871 * first and our do_group_exit call below will use
1872 * that value and ignore the one we pass it.
1873 */
1874 do_coredump((long)signr, signr, regs);
1875 }
1876
1877 /*
1878 * Death signals, no core dump.
1879 */
1880 do_group_exit(signr);
1881 /* NOTREACHED */
1882 }
Oleg Nesterovf6b76d42008-04-30 00:52:47 -07001883 spin_unlock_irq(&sighand->siglock);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001884 return signr;
1885}
1886
Oleg Nesterovd12619b2008-02-08 04:19:12 -08001887void exit_signals(struct task_struct *tsk)
1888{
1889 int group_stop = 0;
Oleg Nesterov5dee1702008-02-08 04:19:13 -08001890 struct task_struct *t;
Oleg Nesterovd12619b2008-02-08 04:19:12 -08001891
Oleg Nesterov5dee1702008-02-08 04:19:13 -08001892 if (thread_group_empty(tsk) || signal_group_exit(tsk->signal)) {
1893 tsk->flags |= PF_EXITING;
1894 return;
Oleg Nesterovd12619b2008-02-08 04:19:12 -08001895 }
1896
Oleg Nesterov5dee1702008-02-08 04:19:13 -08001897 spin_lock_irq(&tsk->sighand->siglock);
Oleg Nesterovd12619b2008-02-08 04:19:12 -08001898 /*
1899 * From now this task is not visible for group-wide signals,
1900 * see wants_signal(), do_signal_stop().
1901 */
1902 tsk->flags |= PF_EXITING;
Oleg Nesterov5dee1702008-02-08 04:19:13 -08001903 if (!signal_pending(tsk))
1904 goto out;
1905
1906 /* It could be that __group_complete_signal() choose us to
1907 * notify about group-wide signal. Another thread should be
1908 * woken now to take the signal since we will not.
1909 */
1910 for (t = tsk; (t = next_thread(t)) != tsk; )
1911 if (!signal_pending(t) && !(t->flags & PF_EXITING))
1912 recalc_sigpending_and_wake(t);
1913
1914 if (unlikely(tsk->signal->group_stop_count) &&
1915 !--tsk->signal->group_stop_count) {
1916 tsk->signal->flags = SIGNAL_STOP_STOPPED;
1917 group_stop = 1;
1918 }
1919out:
Oleg Nesterovd12619b2008-02-08 04:19:12 -08001920 spin_unlock_irq(&tsk->sighand->siglock);
1921
1922 if (unlikely(group_stop)) {
1923 read_lock(&tasklist_lock);
1924 do_notify_parent_cldstop(tsk, CLD_STOPPED);
1925 read_unlock(&tasklist_lock);
1926 }
1927}
1928
Linus Torvalds1da177e2005-04-16 15:20:36 -07001929EXPORT_SYMBOL(recalc_sigpending);
1930EXPORT_SYMBOL_GPL(dequeue_signal);
1931EXPORT_SYMBOL(flush_signals);
1932EXPORT_SYMBOL(force_sig);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001933EXPORT_SYMBOL(kill_proc);
1934EXPORT_SYMBOL(ptrace_notify);
1935EXPORT_SYMBOL(send_sig);
1936EXPORT_SYMBOL(send_sig_info);
1937EXPORT_SYMBOL(sigprocmask);
1938EXPORT_SYMBOL(block_all_signals);
1939EXPORT_SYMBOL(unblock_all_signals);
1940
1941
1942/*
1943 * System call entry points.
1944 */
1945
1946asmlinkage long sys_restart_syscall(void)
1947{
1948 struct restart_block *restart = &current_thread_info()->restart_block;
1949 return restart->fn(restart);
1950}
1951
1952long do_no_restart_syscall(struct restart_block *param)
1953{
1954 return -EINTR;
1955}
1956
1957/*
1958 * We don't need to get the kernel lock - this is all local to this
1959 * particular thread.. (and that's good, because this is _heavily_
1960 * used by various programs)
1961 */
1962
1963/*
1964 * This is also useful for kernel threads that want to temporarily
1965 * (or permanently) block certain signals.
1966 *
1967 * NOTE! Unlike the user-mode sys_sigprocmask(), the kernel
1968 * interface happily blocks "unblockable" signals like SIGKILL
1969 * and friends.
1970 */
1971int sigprocmask(int how, sigset_t *set, sigset_t *oldset)
1972{
1973 int error;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001974
1975 spin_lock_irq(&current->sighand->siglock);
Oleg Nesterova26fd332006-03-23 03:00:49 -08001976 if (oldset)
1977 *oldset = current->blocked;
1978
Linus Torvalds1da177e2005-04-16 15:20:36 -07001979 error = 0;
1980 switch (how) {
1981 case SIG_BLOCK:
1982 sigorsets(&current->blocked, &current->blocked, set);
1983 break;
1984 case SIG_UNBLOCK:
1985 signandsets(&current->blocked, &current->blocked, set);
1986 break;
1987 case SIG_SETMASK:
1988 current->blocked = *set;
1989 break;
1990 default:
1991 error = -EINVAL;
1992 }
1993 recalc_sigpending();
1994 spin_unlock_irq(&current->sighand->siglock);
Oleg Nesterova26fd332006-03-23 03:00:49 -08001995
Linus Torvalds1da177e2005-04-16 15:20:36 -07001996 return error;
1997}
1998
1999asmlinkage long
2000sys_rt_sigprocmask(int how, sigset_t __user *set, sigset_t __user *oset, size_t sigsetsize)
2001{
2002 int error = -EINVAL;
2003 sigset_t old_set, new_set;
2004
2005 /* XXX: Don't preclude handling different sized sigset_t's. */
2006 if (sigsetsize != sizeof(sigset_t))
2007 goto out;
2008
2009 if (set) {
2010 error = -EFAULT;
2011 if (copy_from_user(&new_set, set, sizeof(*set)))
2012 goto out;
2013 sigdelsetmask(&new_set, sigmask(SIGKILL)|sigmask(SIGSTOP));
2014
2015 error = sigprocmask(how, &new_set, &old_set);
2016 if (error)
2017 goto out;
2018 if (oset)
2019 goto set_old;
2020 } else if (oset) {
2021 spin_lock_irq(&current->sighand->siglock);
2022 old_set = current->blocked;
2023 spin_unlock_irq(&current->sighand->siglock);
2024
2025 set_old:
2026 error = -EFAULT;
2027 if (copy_to_user(oset, &old_set, sizeof(*oset)))
2028 goto out;
2029 }
2030 error = 0;
2031out:
2032 return error;
2033}
2034
2035long do_sigpending(void __user *set, unsigned long sigsetsize)
2036{
2037 long error = -EINVAL;
2038 sigset_t pending;
2039
2040 if (sigsetsize > sizeof(sigset_t))
2041 goto out;
2042
2043 spin_lock_irq(&current->sighand->siglock);
2044 sigorsets(&pending, &current->pending.signal,
2045 &current->signal->shared_pending.signal);
2046 spin_unlock_irq(&current->sighand->siglock);
2047
2048 /* Outside the lock because only this thread touches it. */
2049 sigandsets(&pending, &current->blocked, &pending);
2050
2051 error = -EFAULT;
2052 if (!copy_to_user(set, &pending, sigsetsize))
2053 error = 0;
2054
2055out:
2056 return error;
2057}
2058
2059asmlinkage long
2060sys_rt_sigpending(sigset_t __user *set, size_t sigsetsize)
2061{
2062 return do_sigpending(set, sigsetsize);
2063}
2064
2065#ifndef HAVE_ARCH_COPY_SIGINFO_TO_USER
2066
2067int copy_siginfo_to_user(siginfo_t __user *to, siginfo_t *from)
2068{
2069 int err;
2070
2071 if (!access_ok (VERIFY_WRITE, to, sizeof(siginfo_t)))
2072 return -EFAULT;
2073 if (from->si_code < 0)
2074 return __copy_to_user(to, from, sizeof(siginfo_t))
2075 ? -EFAULT : 0;
2076 /*
2077 * If you change siginfo_t structure, please be sure
2078 * this code is fixed accordingly.
Davide Libenzifba2afa2007-05-10 22:23:13 -07002079 * Please remember to update the signalfd_copyinfo() function
2080 * inside fs/signalfd.c too, in case siginfo_t changes.
Linus Torvalds1da177e2005-04-16 15:20:36 -07002081 * It should never copy any pad contained in the structure
2082 * to avoid security leaks, but must copy the generic
2083 * 3 ints plus the relevant union member.
2084 */
2085 err = __put_user(from->si_signo, &to->si_signo);
2086 err |= __put_user(from->si_errno, &to->si_errno);
2087 err |= __put_user((short)from->si_code, &to->si_code);
2088 switch (from->si_code & __SI_MASK) {
2089 case __SI_KILL:
2090 err |= __put_user(from->si_pid, &to->si_pid);
2091 err |= __put_user(from->si_uid, &to->si_uid);
2092 break;
2093 case __SI_TIMER:
2094 err |= __put_user(from->si_tid, &to->si_tid);
2095 err |= __put_user(from->si_overrun, &to->si_overrun);
2096 err |= __put_user(from->si_ptr, &to->si_ptr);
2097 break;
2098 case __SI_POLL:
2099 err |= __put_user(from->si_band, &to->si_band);
2100 err |= __put_user(from->si_fd, &to->si_fd);
2101 break;
2102 case __SI_FAULT:
2103 err |= __put_user(from->si_addr, &to->si_addr);
2104#ifdef __ARCH_SI_TRAPNO
2105 err |= __put_user(from->si_trapno, &to->si_trapno);
2106#endif
2107 break;
2108 case __SI_CHLD:
2109 err |= __put_user(from->si_pid, &to->si_pid);
2110 err |= __put_user(from->si_uid, &to->si_uid);
2111 err |= __put_user(from->si_status, &to->si_status);
2112 err |= __put_user(from->si_utime, &to->si_utime);
2113 err |= __put_user(from->si_stime, &to->si_stime);
2114 break;
2115 case __SI_RT: /* This is not generated by the kernel as of now. */
2116 case __SI_MESGQ: /* But this is */
2117 err |= __put_user(from->si_pid, &to->si_pid);
2118 err |= __put_user(from->si_uid, &to->si_uid);
2119 err |= __put_user(from->si_ptr, &to->si_ptr);
2120 break;
2121 default: /* this is just in case for now ... */
2122 err |= __put_user(from->si_pid, &to->si_pid);
2123 err |= __put_user(from->si_uid, &to->si_uid);
2124 break;
2125 }
2126 return err;
2127}
2128
2129#endif
2130
2131asmlinkage long
2132sys_rt_sigtimedwait(const sigset_t __user *uthese,
2133 siginfo_t __user *uinfo,
2134 const struct timespec __user *uts,
2135 size_t sigsetsize)
2136{
2137 int ret, sig;
2138 sigset_t these;
2139 struct timespec ts;
2140 siginfo_t info;
2141 long timeout = 0;
2142
2143 /* XXX: Don't preclude handling different sized sigset_t's. */
2144 if (sigsetsize != sizeof(sigset_t))
2145 return -EINVAL;
2146
2147 if (copy_from_user(&these, uthese, sizeof(these)))
2148 return -EFAULT;
2149
2150 /*
2151 * Invert the set of allowed signals to get those we
2152 * want to block.
2153 */
2154 sigdelsetmask(&these, sigmask(SIGKILL)|sigmask(SIGSTOP));
2155 signotset(&these);
2156
2157 if (uts) {
2158 if (copy_from_user(&ts, uts, sizeof(ts)))
2159 return -EFAULT;
2160 if (ts.tv_nsec >= 1000000000L || ts.tv_nsec < 0
2161 || ts.tv_sec < 0)
2162 return -EINVAL;
2163 }
2164
2165 spin_lock_irq(&current->sighand->siglock);
2166 sig = dequeue_signal(current, &these, &info);
2167 if (!sig) {
2168 timeout = MAX_SCHEDULE_TIMEOUT;
2169 if (uts)
2170 timeout = (timespec_to_jiffies(&ts)
2171 + (ts.tv_sec || ts.tv_nsec));
2172
2173 if (timeout) {
2174 /* None ready -- temporarily unblock those we're
2175 * interested while we are sleeping in so that we'll
2176 * be awakened when they arrive. */
2177 current->real_blocked = current->blocked;
2178 sigandsets(&current->blocked, &current->blocked, &these);
2179 recalc_sigpending();
2180 spin_unlock_irq(&current->sighand->siglock);
2181
Nishanth Aravamudan75bcc8c2005-09-10 00:27:24 -07002182 timeout = schedule_timeout_interruptible(timeout);
Linus Torvalds1da177e2005-04-16 15:20:36 -07002183
Linus Torvalds1da177e2005-04-16 15:20:36 -07002184 spin_lock_irq(&current->sighand->siglock);
2185 sig = dequeue_signal(current, &these, &info);
2186 current->blocked = current->real_blocked;
2187 siginitset(&current->real_blocked, 0);
2188 recalc_sigpending();
2189 }
2190 }
2191 spin_unlock_irq(&current->sighand->siglock);
2192
2193 if (sig) {
2194 ret = sig;
2195 if (uinfo) {
2196 if (copy_siginfo_to_user(uinfo, &info))
2197 ret = -EFAULT;
2198 }
2199 } else {
2200 ret = -EAGAIN;
2201 if (timeout)
2202 ret = -EINTR;
2203 }
2204
2205 return ret;
2206}
2207
2208asmlinkage long
2209sys_kill(int pid, int sig)
2210{
2211 struct siginfo info;
2212
2213 info.si_signo = sig;
2214 info.si_errno = 0;
2215 info.si_code = SI_USER;
Pavel Emelyanovb4888932007-10-18 23:40:14 -07002216 info.si_pid = task_tgid_vnr(current);
Linus Torvalds1da177e2005-04-16 15:20:36 -07002217 info.si_uid = current->uid;
2218
2219 return kill_something_info(sig, &info, pid);
2220}
2221
Vadim Lobanov6dd69f12005-10-30 15:02:18 -08002222static int do_tkill(int tgid, int pid, int sig)
2223{
2224 int error;
2225 struct siginfo info;
2226 struct task_struct *p;
2227
2228 error = -ESRCH;
2229 info.si_signo = sig;
2230 info.si_errno = 0;
2231 info.si_code = SI_TKILL;
Pavel Emelyanovb4888932007-10-18 23:40:14 -07002232 info.si_pid = task_tgid_vnr(current);
Vadim Lobanov6dd69f12005-10-30 15:02:18 -08002233 info.si_uid = current->uid;
2234
2235 read_lock(&tasklist_lock);
Pavel Emelyanov228ebcb2007-10-18 23:40:16 -07002236 p = find_task_by_vpid(pid);
Pavel Emelyanovb4888932007-10-18 23:40:14 -07002237 if (p && (tgid <= 0 || task_tgid_vnr(p) == tgid)) {
Vadim Lobanov6dd69f12005-10-30 15:02:18 -08002238 error = check_kill_permission(sig, &info, p);
2239 /*
2240 * The null signal is a permissions and process existence
2241 * probe. No signal is actually delivered.
2242 */
2243 if (!error && sig && p->sighand) {
2244 spin_lock_irq(&p->sighand->siglock);
2245 handle_stop_signal(sig, p);
2246 error = specific_send_sig_info(sig, &info, p);
2247 spin_unlock_irq(&p->sighand->siglock);
2248 }
2249 }
2250 read_unlock(&tasklist_lock);
2251
2252 return error;
2253}
2254
Linus Torvalds1da177e2005-04-16 15:20:36 -07002255/**
2256 * sys_tgkill - send signal to one specific thread
2257 * @tgid: the thread group ID of the thread
2258 * @pid: the PID of the thread
2259 * @sig: signal to be sent
2260 *
Robert P. J. Day72fd4a32007-02-10 01:45:59 -08002261 * This syscall also checks the @tgid and returns -ESRCH even if the PID
Linus Torvalds1da177e2005-04-16 15:20:36 -07002262 * exists but it's not belonging to the target process anymore. This
2263 * method solves the problem of threads exiting and PIDs getting reused.
2264 */
2265asmlinkage long sys_tgkill(int tgid, int pid, int sig)
2266{
Linus Torvalds1da177e2005-04-16 15:20:36 -07002267 /* This is only valid for single tasks */
2268 if (pid <= 0 || tgid <= 0)
2269 return -EINVAL;
2270
Vadim Lobanov6dd69f12005-10-30 15:02:18 -08002271 return do_tkill(tgid, pid, sig);
Linus Torvalds1da177e2005-04-16 15:20:36 -07002272}
2273
2274/*
2275 * Send a signal to only one task, even if it's a CLONE_THREAD task.
2276 */
2277asmlinkage long
2278sys_tkill(int pid, int sig)
2279{
Linus Torvalds1da177e2005-04-16 15:20:36 -07002280 /* This is only valid for single tasks */
2281 if (pid <= 0)
2282 return -EINVAL;
2283
Vadim Lobanov6dd69f12005-10-30 15:02:18 -08002284 return do_tkill(0, pid, sig);
Linus Torvalds1da177e2005-04-16 15:20:36 -07002285}
2286
2287asmlinkage long
2288sys_rt_sigqueueinfo(int pid, int sig, siginfo_t __user *uinfo)
2289{
2290 siginfo_t info;
2291
2292 if (copy_from_user(&info, uinfo, sizeof(siginfo_t)))
2293 return -EFAULT;
2294
2295 /* Not even root can pretend to send signals from the kernel.
2296 Nor can they impersonate a kill(), which adds source info. */
2297 if (info.si_code >= 0)
2298 return -EPERM;
2299 info.si_signo = sig;
2300
2301 /* POSIX.1b doesn't mention process groups. */
2302 return kill_proc_info(sig, &info, pid);
2303}
2304
Oleg Nesterov88531f72006-03-28 16:11:24 -08002305int do_sigaction(int sig, struct k_sigaction *act, struct k_sigaction *oact)
Linus Torvalds1da177e2005-04-16 15:20:36 -07002306{
Pavel Emelyanov93585ee2008-04-30 00:52:39 -07002307 struct task_struct *t = current;
Linus Torvalds1da177e2005-04-16 15:20:36 -07002308 struct k_sigaction *k;
George Anzinger71fabd52006-01-08 01:02:48 -08002309 sigset_t mask;
Linus Torvalds1da177e2005-04-16 15:20:36 -07002310
Jesper Juhl7ed20e12005-05-01 08:59:14 -07002311 if (!valid_signal(sig) || sig < 1 || (act && sig_kernel_only(sig)))
Linus Torvalds1da177e2005-04-16 15:20:36 -07002312 return -EINVAL;
2313
Pavel Emelyanov93585ee2008-04-30 00:52:39 -07002314 k = &t->sighand->action[sig-1];
Linus Torvalds1da177e2005-04-16 15:20:36 -07002315
2316 spin_lock_irq(&current->sighand->siglock);
Linus Torvalds1da177e2005-04-16 15:20:36 -07002317 if (oact)
2318 *oact = *k;
2319
2320 if (act) {
Oleg Nesterov9ac95f22006-02-09 22:41:50 +03002321 sigdelsetmask(&act->sa.sa_mask,
2322 sigmask(SIGKILL) | sigmask(SIGSTOP));
Oleg Nesterov88531f72006-03-28 16:11:24 -08002323 *k = *act;
Linus Torvalds1da177e2005-04-16 15:20:36 -07002324 /*
2325 * POSIX 3.3.1.3:
2326 * "Setting a signal action to SIG_IGN for a signal that is
2327 * pending shall cause the pending signal to be discarded,
2328 * whether or not it is blocked."
2329 *
2330 * "Setting a signal action to SIG_DFL for a signal that is
2331 * pending and whose default action is to ignore the signal
2332 * (for example, SIGCHLD), shall cause the pending signal to
2333 * be discarded, whether or not it is blocked"
2334 */
Pavel Emelyanov93585ee2008-04-30 00:52:39 -07002335 if (__sig_ignored(t, sig)) {
George Anzinger71fabd52006-01-08 01:02:48 -08002336 sigemptyset(&mask);
2337 sigaddset(&mask, sig);
2338 rm_from_queue_full(&mask, &t->signal->shared_pending);
Linus Torvalds1da177e2005-04-16 15:20:36 -07002339 do {
George Anzinger71fabd52006-01-08 01:02:48 -08002340 rm_from_queue_full(&mask, &t->pending);
Linus Torvalds1da177e2005-04-16 15:20:36 -07002341 t = next_thread(t);
2342 } while (t != current);
Linus Torvalds1da177e2005-04-16 15:20:36 -07002343 }
Linus Torvalds1da177e2005-04-16 15:20:36 -07002344 }
2345
2346 spin_unlock_irq(&current->sighand->siglock);
2347 return 0;
2348}
2349
2350int
2351do_sigaltstack (const stack_t __user *uss, stack_t __user *uoss, unsigned long sp)
2352{
2353 stack_t oss;
2354 int error;
2355
2356 if (uoss) {
2357 oss.ss_sp = (void __user *) current->sas_ss_sp;
2358 oss.ss_size = current->sas_ss_size;
2359 oss.ss_flags = sas_ss_flags(sp);
2360 }
2361
2362 if (uss) {
2363 void __user *ss_sp;
2364 size_t ss_size;
2365 int ss_flags;
2366
2367 error = -EFAULT;
2368 if (!access_ok(VERIFY_READ, uss, sizeof(*uss))
2369 || __get_user(ss_sp, &uss->ss_sp)
2370 || __get_user(ss_flags, &uss->ss_flags)
2371 || __get_user(ss_size, &uss->ss_size))
2372 goto out;
2373
2374 error = -EPERM;
2375 if (on_sig_stack(sp))
2376 goto out;
2377
2378 error = -EINVAL;
2379 /*
2380 *
2381 * Note - this code used to test ss_flags incorrectly
2382 * old code may have been written using ss_flags==0
2383 * to mean ss_flags==SS_ONSTACK (as this was the only
2384 * way that worked) - this fix preserves that older
2385 * mechanism
2386 */
2387 if (ss_flags != SS_DISABLE && ss_flags != SS_ONSTACK && ss_flags != 0)
2388 goto out;
2389
2390 if (ss_flags == SS_DISABLE) {
2391 ss_size = 0;
2392 ss_sp = NULL;
2393 } else {
2394 error = -ENOMEM;
2395 if (ss_size < MINSIGSTKSZ)
2396 goto out;
2397 }
2398
2399 current->sas_ss_sp = (unsigned long) ss_sp;
2400 current->sas_ss_size = ss_size;
2401 }
2402
2403 if (uoss) {
2404 error = -EFAULT;
2405 if (copy_to_user(uoss, &oss, sizeof(oss)))
2406 goto out;
2407 }
2408
2409 error = 0;
2410out:
2411 return error;
2412}
2413
2414#ifdef __ARCH_WANT_SYS_SIGPENDING
2415
2416asmlinkage long
2417sys_sigpending(old_sigset_t __user *set)
2418{
2419 return do_sigpending(set, sizeof(*set));
2420}
2421
2422#endif
2423
2424#ifdef __ARCH_WANT_SYS_SIGPROCMASK
2425/* Some platforms have their own version with special arguments others
2426 support only sys_rt_sigprocmask. */
2427
2428asmlinkage long
2429sys_sigprocmask(int how, old_sigset_t __user *set, old_sigset_t __user *oset)
2430{
2431 int error;
2432 old_sigset_t old_set, new_set;
2433
2434 if (set) {
2435 error = -EFAULT;
2436 if (copy_from_user(&new_set, set, sizeof(*set)))
2437 goto out;
2438 new_set &= ~(sigmask(SIGKILL) | sigmask(SIGSTOP));
2439
2440 spin_lock_irq(&current->sighand->siglock);
2441 old_set = current->blocked.sig[0];
2442
2443 error = 0;
2444 switch (how) {
2445 default:
2446 error = -EINVAL;
2447 break;
2448 case SIG_BLOCK:
2449 sigaddsetmask(&current->blocked, new_set);
2450 break;
2451 case SIG_UNBLOCK:
2452 sigdelsetmask(&current->blocked, new_set);
2453 break;
2454 case SIG_SETMASK:
2455 current->blocked.sig[0] = new_set;
2456 break;
2457 }
2458
2459 recalc_sigpending();
2460 spin_unlock_irq(&current->sighand->siglock);
2461 if (error)
2462 goto out;
2463 if (oset)
2464 goto set_old;
2465 } else if (oset) {
2466 old_set = current->blocked.sig[0];
2467 set_old:
2468 error = -EFAULT;
2469 if (copy_to_user(oset, &old_set, sizeof(*oset)))
2470 goto out;
2471 }
2472 error = 0;
2473out:
2474 return error;
2475}
2476#endif /* __ARCH_WANT_SYS_SIGPROCMASK */
2477
2478#ifdef __ARCH_WANT_SYS_RT_SIGACTION
2479asmlinkage long
2480sys_rt_sigaction(int sig,
2481 const struct sigaction __user *act,
2482 struct sigaction __user *oact,
2483 size_t sigsetsize)
2484{
2485 struct k_sigaction new_sa, old_sa;
2486 int ret = -EINVAL;
2487
2488 /* XXX: Don't preclude handling different sized sigset_t's. */
2489 if (sigsetsize != sizeof(sigset_t))
2490 goto out;
2491
2492 if (act) {
2493 if (copy_from_user(&new_sa.sa, act, sizeof(new_sa.sa)))
2494 return -EFAULT;
2495 }
2496
2497 ret = do_sigaction(sig, act ? &new_sa : NULL, oact ? &old_sa : NULL);
2498
2499 if (!ret && oact) {
2500 if (copy_to_user(oact, &old_sa.sa, sizeof(old_sa.sa)))
2501 return -EFAULT;
2502 }
2503out:
2504 return ret;
2505}
2506#endif /* __ARCH_WANT_SYS_RT_SIGACTION */
2507
2508#ifdef __ARCH_WANT_SYS_SGETMASK
2509
2510/*
2511 * For backwards compatibility. Functionality superseded by sigprocmask.
2512 */
2513asmlinkage long
2514sys_sgetmask(void)
2515{
2516 /* SMP safe */
2517 return current->blocked.sig[0];
2518}
2519
2520asmlinkage long
2521sys_ssetmask(int newmask)
2522{
2523 int old;
2524
2525 spin_lock_irq(&current->sighand->siglock);
2526 old = current->blocked.sig[0];
2527
2528 siginitset(&current->blocked, newmask & ~(sigmask(SIGKILL)|
2529 sigmask(SIGSTOP)));
2530 recalc_sigpending();
2531 spin_unlock_irq(&current->sighand->siglock);
2532
2533 return old;
2534}
2535#endif /* __ARCH_WANT_SGETMASK */
2536
2537#ifdef __ARCH_WANT_SYS_SIGNAL
2538/*
2539 * For backwards compatibility. Functionality superseded by sigaction.
2540 */
2541asmlinkage unsigned long
2542sys_signal(int sig, __sighandler_t handler)
2543{
2544 struct k_sigaction new_sa, old_sa;
2545 int ret;
2546
2547 new_sa.sa.sa_handler = handler;
2548 new_sa.sa.sa_flags = SA_ONESHOT | SA_NOMASK;
Oleg Nesterovc70d3d72006-02-09 22:41:41 +03002549 sigemptyset(&new_sa.sa.sa_mask);
Linus Torvalds1da177e2005-04-16 15:20:36 -07002550
2551 ret = do_sigaction(sig, &new_sa, &old_sa);
2552
2553 return ret ? ret : (unsigned long)old_sa.sa.sa_handler;
2554}
2555#endif /* __ARCH_WANT_SYS_SIGNAL */
2556
2557#ifdef __ARCH_WANT_SYS_PAUSE
2558
2559asmlinkage long
2560sys_pause(void)
2561{
2562 current->state = TASK_INTERRUPTIBLE;
2563 schedule();
2564 return -ERESTARTNOHAND;
2565}
2566
2567#endif
2568
David Woodhouse150256d2006-01-18 17:43:57 -08002569#ifdef __ARCH_WANT_SYS_RT_SIGSUSPEND
2570asmlinkage long sys_rt_sigsuspend(sigset_t __user *unewset, size_t sigsetsize)
2571{
2572 sigset_t newset;
2573
2574 /* XXX: Don't preclude handling different sized sigset_t's. */
2575 if (sigsetsize != sizeof(sigset_t))
2576 return -EINVAL;
2577
2578 if (copy_from_user(&newset, unewset, sizeof(newset)))
2579 return -EFAULT;
2580 sigdelsetmask(&newset, sigmask(SIGKILL)|sigmask(SIGSTOP));
2581
2582 spin_lock_irq(&current->sighand->siglock);
2583 current->saved_sigmask = current->blocked;
2584 current->blocked = newset;
2585 recalc_sigpending();
2586 spin_unlock_irq(&current->sighand->siglock);
2587
2588 current->state = TASK_INTERRUPTIBLE;
2589 schedule();
2590 set_thread_flag(TIF_RESTORE_SIGMASK);
2591 return -ERESTARTNOHAND;
2592}
2593#endif /* __ARCH_WANT_SYS_RT_SIGSUSPEND */
2594
David Howellsf269fdd2006-09-27 01:50:23 -07002595__attribute__((weak)) const char *arch_vma_name(struct vm_area_struct *vma)
2596{
2597 return NULL;
2598}
2599
Linus Torvalds1da177e2005-04-16 15:20:36 -07002600void __init signals_init(void)
2601{
Christoph Lameter0a31bd52007-05-06 14:49:57 -07002602 sigqueue_cachep = KMEM_CACHE(sigqueue, SLAB_PANIC);
Linus Torvalds1da177e2005-04-16 15:20:36 -07002603}