]> bbs.cooldavid.org Git - net-next-2.6.git/blame - kernel/signal.c
signals: send_group_sigqueue: don't take tasklist_lock
[net-next-2.6.git] / kernel / signal.c
CommitLineData
1da177e4
LT
1/*
2 * linux/kernel/signal.c
3 *
4 * Copyright (C) 1991, 1992 Linus Torvalds
5 *
6 * 1997-11-02 Modified for POSIX.1b signals by Richard Henderson
7 *
8 * 2003-06-02 Jim Houston - Concurrent Computer Corp.
9 * Changes to use preallocated sigqueue structures
10 * to allow signals to be sent reliably.
11 */
12
1da177e4
LT
13#include <linux/slab.h>
14#include <linux/module.h>
1da177e4
LT
15#include <linux/init.h>
16#include <linux/sched.h>
17#include <linux/fs.h>
18#include <linux/tty.h>
19#include <linux/binfmts.h>
20#include <linux/security.h>
21#include <linux/syscalls.h>
22#include <linux/ptrace.h>
7ed20e1a 23#include <linux/signal.h>
fba2afaa 24#include <linux/signalfd.h>
c59ede7b 25#include <linux/capability.h>
7dfb7103 26#include <linux/freezer.h>
84d73786
SB
27#include <linux/pid_namespace.h>
28#include <linux/nsproxy.h>
29
1da177e4
LT
30#include <asm/param.h>
31#include <asm/uaccess.h>
32#include <asm/unistd.h>
33#include <asm/siginfo.h>
e1396065 34#include "audit.h" /* audit_signal_info() */
1da177e4
LT
35
36/*
37 * SLAB caches for signal bits.
38 */
39
e18b890b 40static struct kmem_cache *sigqueue_cachep;
1da177e4 41
93585eea
PE
42static int __sig_ignored(struct task_struct *t, int sig)
43{
44 void __user *handler;
45
46 /* Is it explicitly or implicitly ignored? */
47
48 handler = t->sighand->action[sig - 1].sa.sa_handler;
49 return handler == SIG_IGN ||
50 (handler == SIG_DFL && sig_kernel_ignore(sig));
51}
1da177e4
LT
52
53static int sig_ignored(struct task_struct *t, int sig)
54{
1da177e4
LT
55 /*
56 * Tracers always want to know about signals..
57 */
58 if (t->ptrace & PT_PTRACED)
59 return 0;
60
61 /*
62 * Blocked signals are never ignored, since the
63 * signal handler may change by the time it is
64 * unblocked.
65 */
325d22df 66 if (sigismember(&t->blocked, sig) || sigismember(&t->real_blocked, sig))
1da177e4
LT
67 return 0;
68
93585eea 69 return __sig_ignored(t, sig);
1da177e4
LT
70}
71
72/*
73 * Re-calculate pending state from the set of locally pending
74 * signals, globally pending signals, and blocked signals.
75 */
76static inline int has_pending_signals(sigset_t *signal, sigset_t *blocked)
77{
78 unsigned long ready;
79 long i;
80
81 switch (_NSIG_WORDS) {
82 default:
83 for (i = _NSIG_WORDS, ready = 0; --i >= 0 ;)
84 ready |= signal->sig[i] &~ blocked->sig[i];
85 break;
86
87 case 4: ready = signal->sig[3] &~ blocked->sig[3];
88 ready |= signal->sig[2] &~ blocked->sig[2];
89 ready |= signal->sig[1] &~ blocked->sig[1];
90 ready |= signal->sig[0] &~ blocked->sig[0];
91 break;
92
93 case 2: ready = signal->sig[1] &~ blocked->sig[1];
94 ready |= signal->sig[0] &~ blocked->sig[0];
95 break;
96
97 case 1: ready = signal->sig[0] &~ blocked->sig[0];
98 }
99 return ready != 0;
100}
101
102#define PENDING(p,b) has_pending_signals(&(p)->signal, (b))
103
7bb44ade 104static int recalc_sigpending_tsk(struct task_struct *t)
1da177e4
LT
105{
106 if (t->signal->group_stop_count > 0 ||
107 PENDING(&t->pending, &t->blocked) ||
7bb44ade 108 PENDING(&t->signal->shared_pending, &t->blocked)) {
1da177e4 109 set_tsk_thread_flag(t, TIF_SIGPENDING);
7bb44ade
RM
110 return 1;
111 }
b74d0deb
RM
112 /*
113 * We must never clear the flag in another thread, or in current
114 * when it's possible the current syscall is returning -ERESTART*.
115 * So we don't clear it here, and only callers who know they should do.
116 */
7bb44ade
RM
117 return 0;
118}
119
120/*
121 * After recalculating TIF_SIGPENDING, we need to make sure the task wakes up.
122 * This is superfluous when called on current, the wakeup is a harmless no-op.
123 */
124void recalc_sigpending_and_wake(struct task_struct *t)
125{
126 if (recalc_sigpending_tsk(t))
127 signal_wake_up(t, 0);
1da177e4
LT
128}
129
130void recalc_sigpending(void)
131{
cc5f916e 132 if (!recalc_sigpending_tsk(current) && !freezing(current))
b74d0deb
RM
133 clear_thread_flag(TIF_SIGPENDING);
134
1da177e4
LT
135}
136
137/* Given the mask, find the first available signal that should be serviced. */
138
fba2afaa 139int next_signal(struct sigpending *pending, sigset_t *mask)
1da177e4
LT
140{
141 unsigned long i, *s, *m, x;
142 int sig = 0;
143
144 s = pending->signal.sig;
145 m = mask->sig;
146 switch (_NSIG_WORDS) {
147 default:
148 for (i = 0; i < _NSIG_WORDS; ++i, ++s, ++m)
149 if ((x = *s &~ *m) != 0) {
150 sig = ffz(~x) + i*_NSIG_BPW + 1;
151 break;
152 }
153 break;
154
155 case 2: if ((x = s[0] &~ m[0]) != 0)
156 sig = 1;
157 else if ((x = s[1] &~ m[1]) != 0)
158 sig = _NSIG_BPW + 1;
159 else
160 break;
161 sig += ffz(~x);
162 break;
163
164 case 1: if ((x = *s &~ *m) != 0)
165 sig = ffz(~x) + 1;
166 break;
167 }
168
169 return sig;
170}
171
dd0fc66f 172static struct sigqueue *__sigqueue_alloc(struct task_struct *t, gfp_t flags,
1da177e4
LT
173 int override_rlimit)
174{
175 struct sigqueue *q = NULL;
10b1fbdb 176 struct user_struct *user;
1da177e4 177
10b1fbdb
LT
178 /*
179 * In order to avoid problems with "switch_user()", we want to make
180 * sure that the compiler doesn't re-load "t->user"
181 */
182 user = t->user;
183 barrier();
184 atomic_inc(&user->sigpending);
1da177e4 185 if (override_rlimit ||
10b1fbdb 186 atomic_read(&user->sigpending) <=
1da177e4
LT
187 t->signal->rlim[RLIMIT_SIGPENDING].rlim_cur)
188 q = kmem_cache_alloc(sigqueue_cachep, flags);
189 if (unlikely(q == NULL)) {
10b1fbdb 190 atomic_dec(&user->sigpending);
1da177e4
LT
191 } else {
192 INIT_LIST_HEAD(&q->list);
193 q->flags = 0;
10b1fbdb 194 q->user = get_uid(user);
1da177e4
LT
195 }
196 return(q);
197}
198
514a01b8 199static void __sigqueue_free(struct sigqueue *q)
1da177e4
LT
200{
201 if (q->flags & SIGQUEUE_PREALLOC)
202 return;
203 atomic_dec(&q->user->sigpending);
204 free_uid(q->user);
205 kmem_cache_free(sigqueue_cachep, q);
206}
207
6a14c5c9 208void flush_sigqueue(struct sigpending *queue)
1da177e4
LT
209{
210 struct sigqueue *q;
211
212 sigemptyset(&queue->signal);
213 while (!list_empty(&queue->list)) {
214 q = list_entry(queue->list.next, struct sigqueue , list);
215 list_del_init(&q->list);
216 __sigqueue_free(q);
217 }
218}
219
220/*
221 * Flush all pending signals for a task.
222 */
c81addc9 223void flush_signals(struct task_struct *t)
1da177e4
LT
224{
225 unsigned long flags;
226
227 spin_lock_irqsave(&t->sighand->siglock, flags);
f5264481 228 clear_tsk_thread_flag(t, TIF_SIGPENDING);
1da177e4
LT
229 flush_sigqueue(&t->pending);
230 flush_sigqueue(&t->signal->shared_pending);
231 spin_unlock_irqrestore(&t->sighand->siglock, flags);
232}
233
10ab825b
ON
234void ignore_signals(struct task_struct *t)
235{
236 int i;
237
238 for (i = 0; i < _NSIG; ++i)
239 t->sighand->action[i].sa.sa_handler = SIG_IGN;
240
241 flush_signals(t);
242}
243
1da177e4
LT
244/*
245 * Flush all handlers for a task.
246 */
247
248void
249flush_signal_handlers(struct task_struct *t, int force_default)
250{
251 int i;
252 struct k_sigaction *ka = &t->sighand->action[0];
253 for (i = _NSIG ; i != 0 ; i--) {
254 if (force_default || ka->sa.sa_handler != SIG_IGN)
255 ka->sa.sa_handler = SIG_DFL;
256 ka->sa.sa_flags = 0;
257 sigemptyset(&ka->sa.sa_mask);
258 ka++;
259 }
260}
261
abd4f750
MAS
262int unhandled_signal(struct task_struct *tsk, int sig)
263{
b460cbc5 264 if (is_global_init(tsk))
abd4f750
MAS
265 return 1;
266 if (tsk->ptrace & PT_PTRACED)
267 return 0;
268 return (tsk->sighand->action[sig-1].sa.sa_handler == SIG_IGN) ||
269 (tsk->sighand->action[sig-1].sa.sa_handler == SIG_DFL);
270}
271
1da177e4
LT
272
273/* Notify the system that a driver wants to block all signals for this
274 * process, and wants to be notified if any signals at all were to be
275 * sent/acted upon. If the notifier routine returns non-zero, then the
276 * signal will be acted upon after all. If the notifier routine returns 0,
277 * then then signal will be blocked. Only one block per process is
278 * allowed. priv is a pointer to private data that the notifier routine
279 * can use to determine if the signal should be blocked or not. */
280
281void
282block_all_signals(int (*notifier)(void *priv), void *priv, sigset_t *mask)
283{
284 unsigned long flags;
285
286 spin_lock_irqsave(&current->sighand->siglock, flags);
287 current->notifier_mask = mask;
288 current->notifier_data = priv;
289 current->notifier = notifier;
290 spin_unlock_irqrestore(&current->sighand->siglock, flags);
291}
292
293/* Notify the system that blocking has ended. */
294
295void
296unblock_all_signals(void)
297{
298 unsigned long flags;
299
300 spin_lock_irqsave(&current->sighand->siglock, flags);
301 current->notifier = NULL;
302 current->notifier_data = NULL;
303 recalc_sigpending();
304 spin_unlock_irqrestore(&current->sighand->siglock, flags);
305}
306
858119e1 307static int collect_signal(int sig, struct sigpending *list, siginfo_t *info)
1da177e4
LT
308{
309 struct sigqueue *q, *first = NULL;
310 int still_pending = 0;
311
312 if (unlikely(!sigismember(&list->signal, sig)))
313 return 0;
314
315 /*
316 * Collect the siginfo appropriate to this signal. Check if
317 * there is another siginfo for the same signal.
318 */
319 list_for_each_entry(q, &list->list, list) {
320 if (q->info.si_signo == sig) {
321 if (first) {
322 still_pending = 1;
323 break;
324 }
325 first = q;
326 }
327 }
328 if (first) {
329 list_del_init(&first->list);
330 copy_siginfo(info, &first->info);
331 __sigqueue_free(first);
332 if (!still_pending)
333 sigdelset(&list->signal, sig);
334 } else {
335
336 /* Ok, it wasn't in the queue. This must be
337 a fast-pathed signal or we must have been
338 out of queue space. So zero out the info.
339 */
340 sigdelset(&list->signal, sig);
341 info->si_signo = sig;
342 info->si_errno = 0;
343 info->si_code = 0;
344 info->si_pid = 0;
345 info->si_uid = 0;
346 }
347 return 1;
348}
349
350static int __dequeue_signal(struct sigpending *pending, sigset_t *mask,
351 siginfo_t *info)
352{
27d91e07 353 int sig = next_signal(pending, mask);
1da177e4 354
1da177e4
LT
355 if (sig) {
356 if (current->notifier) {
357 if (sigismember(current->notifier_mask, sig)) {
358 if (!(current->notifier)(current->notifier_data)) {
359 clear_thread_flag(TIF_SIGPENDING);
360 return 0;
361 }
362 }
363 }
364
365 if (!collect_signal(sig, pending, info))
366 sig = 0;
1da177e4 367 }
1da177e4
LT
368
369 return sig;
370}
371
372/*
373 * Dequeue a signal and return the element to the caller, which is
374 * expected to free it.
375 *
376 * All callers have to hold the siglock.
377 */
378int dequeue_signal(struct task_struct *tsk, sigset_t *mask, siginfo_t *info)
379{
c5363d03 380 int signr;
caec4e8d
BH
381
382 /* We only dequeue private signals from ourselves, we don't let
383 * signalfd steal them
384 */
b8fceee1 385 signr = __dequeue_signal(&tsk->pending, mask, info);
8bfd9a7a 386 if (!signr) {
1da177e4
LT
387 signr = __dequeue_signal(&tsk->signal->shared_pending,
388 mask, info);
8bfd9a7a
TG
389 /*
390 * itimer signal ?
391 *
392 * itimers are process shared and we restart periodic
393 * itimers in the signal delivery path to prevent DoS
394 * attacks in the high resolution timer case. This is
395 * compliant with the old way of self restarting
396 * itimers, as the SIGALRM is a legacy signal and only
397 * queued once. Changing the restart behaviour to
398 * restart the timer in the signal dequeue path is
399 * reducing the timer noise on heavy loaded !highres
400 * systems too.
401 */
402 if (unlikely(signr == SIGALRM)) {
403 struct hrtimer *tmr = &tsk->signal->real_timer;
404
405 if (!hrtimer_is_queued(tmr) &&
406 tsk->signal->it_real_incr.tv64 != 0) {
407 hrtimer_forward(tmr, tmr->base->get_time(),
408 tsk->signal->it_real_incr);
409 hrtimer_restart(tmr);
410 }
411 }
412 }
c5363d03 413
b8fceee1 414 recalc_sigpending();
c5363d03
PE
415 if (!signr)
416 return 0;
417
418 if (unlikely(sig_kernel_stop(signr))) {
8bfd9a7a
TG
419 /*
420 * Set a marker that we have dequeued a stop signal. Our
421 * caller might release the siglock and then the pending
422 * stop signal it is about to process is no longer in the
423 * pending bitmasks, but must still be cleared by a SIGCONT
424 * (and overruled by a SIGKILL). So those cases clear this
425 * shared flag after we've set it. Note that this flag may
426 * remain set after the signal we return is ignored or
427 * handled. That doesn't matter because its only purpose
428 * is to alert stop-signal processing code when another
429 * processor has come along and cleared the flag.
430 */
431 if (!(tsk->signal->flags & SIGNAL_GROUP_EXIT))
432 tsk->signal->flags |= SIGNAL_STOP_DEQUEUED;
433 }
c5363d03 434 if ((info->si_code & __SI_MASK) == __SI_TIMER && info->si_sys_private) {
1da177e4
LT
435 /*
436 * Release the siglock to ensure proper locking order
437 * of timer locks outside of siglocks. Note, we leave
438 * irqs disabled here, since the posix-timers code is
439 * about to disable them again anyway.
440 */
441 spin_unlock(&tsk->sighand->siglock);
442 do_schedule_next_timer(info);
443 spin_lock(&tsk->sighand->siglock);
444 }
445 return signr;
446}
447
448/*
449 * Tell a process that it has a new active signal..
450 *
451 * NOTE! we rely on the previous spin_lock to
452 * lock interrupts for us! We can only be called with
453 * "siglock" held, and the local interrupt must
454 * have been disabled when that got acquired!
455 *
456 * No need to set need_resched since signal event passing
457 * goes through ->blocked
458 */
459void signal_wake_up(struct task_struct *t, int resume)
460{
461 unsigned int mask;
462
463 set_tsk_thread_flag(t, TIF_SIGPENDING);
464
465 /*
f021a3c2
MW
466 * For SIGKILL, we want to wake it up in the stopped/traced/killable
467 * case. We don't check t->state here because there is a race with it
1da177e4
LT
468 * executing another processor and just now entering stopped state.
469 * By using wake_up_state, we ensure the process will wake up and
470 * handle its death signal.
471 */
472 mask = TASK_INTERRUPTIBLE;
473 if (resume)
f021a3c2 474 mask |= TASK_WAKEKILL;
1da177e4
LT
475 if (!wake_up_state(t, mask))
476 kick_process(t);
477}
478
71fabd5e
GA
479/*
480 * Remove signals in mask from the pending set and queue.
481 * Returns 1 if any signals were found.
482 *
483 * All callers must be holding the siglock.
484 *
485 * This version takes a sigset mask and looks at all signals,
486 * not just those in the first mask word.
487 */
488static int rm_from_queue_full(sigset_t *mask, struct sigpending *s)
489{
490 struct sigqueue *q, *n;
491 sigset_t m;
492
493 sigandsets(&m, mask, &s->signal);
494 if (sigisemptyset(&m))
495 return 0;
496
497 signandsets(&s->signal, &s->signal, mask);
498 list_for_each_entry_safe(q, n, &s->list, list) {
499 if (sigismember(mask, q->info.si_signo)) {
500 list_del_init(&q->list);
501 __sigqueue_free(q);
502 }
503 }
504 return 1;
505}
1da177e4
LT
506/*
507 * Remove signals in mask from the pending set and queue.
508 * Returns 1 if any signals were found.
509 *
510 * All callers must be holding the siglock.
511 */
512static int rm_from_queue(unsigned long mask, struct sigpending *s)
513{
514 struct sigqueue *q, *n;
515
516 if (!sigtestsetmask(&s->signal, mask))
517 return 0;
518
519 sigdelsetmask(&s->signal, mask);
520 list_for_each_entry_safe(q, n, &s->list, list) {
521 if (q->info.si_signo < SIGRTMIN &&
522 (mask & sigmask(q->info.si_signo))) {
523 list_del_init(&q->list);
524 __sigqueue_free(q);
525 }
526 }
527 return 1;
528}
529
530/*
531 * Bad permissions for sending the signal
532 */
533static int check_kill_permission(int sig, struct siginfo *info,
534 struct task_struct *t)
535{
3b5e9e53
ON
536 int error;
537
7ed20e1a 538 if (!valid_signal(sig))
3b5e9e53
ON
539 return -EINVAL;
540
541 if (info != SEND_SIG_NOINFO && (is_si_special(info) || SI_FROMKERNEL(info)))
542 return 0;
e54dc243 543
3b5e9e53
ON
544 error = audit_signal_info(sig, t); /* Let audit system see the signal */
545 if (error)
1da177e4 546 return error;
3b5e9e53
ON
547
548 if (((sig != SIGCONT) || (task_session_nr(current) != task_session_nr(t)))
549 && (current->euid ^ t->suid) && (current->euid ^ t->uid)
550 && (current->uid ^ t->suid) && (current->uid ^ t->uid)
551 && !capable(CAP_KILL))
552 return -EPERM;
c2f0c7c3 553
e54dc243 554 return security_task_kill(t, info, sig, 0);
1da177e4
LT
555}
556
557/* forward decl */
a1d5e21e 558static void do_notify_parent_cldstop(struct task_struct *tsk, int why);
1da177e4
LT
559
560/*
561 * Handle magic process-wide effects of stop/continue signals.
562 * Unlike the signal actions, these happen immediately at signal-generation
563 * time regardless of blocking, ignoring, or handling. This does the
564 * actual continuing for SIGCONT, but not the actual stopping for stop
565 * signals. The process stop is done as a signal action for SIG_DFL.
566 */
567static void handle_stop_signal(int sig, struct task_struct *p)
568{
ad16a460 569 struct signal_struct *signal = p->signal;
1da177e4
LT
570 struct task_struct *t;
571
ad16a460 572 if (signal->flags & SIGNAL_GROUP_EXIT)
1da177e4
LT
573 /*
574 * The process is in the middle of dying already.
575 */
576 return;
577
578 if (sig_kernel_stop(sig)) {
579 /*
580 * This is a stop signal. Remove SIGCONT from all queues.
581 */
ad16a460 582 rm_from_queue(sigmask(SIGCONT), &signal->shared_pending);
1da177e4
LT
583 t = p;
584 do {
585 rm_from_queue(sigmask(SIGCONT), &t->pending);
ad16a460 586 } while_each_thread(p, t);
1da177e4 587 } else if (sig == SIGCONT) {
fc321d2e 588 unsigned int why;
1da177e4
LT
589 /*
590 * Remove all stop signals from all queues,
591 * and wake all threads.
592 */
ad16a460 593 rm_from_queue(SIG_KERNEL_STOP_MASK, &signal->shared_pending);
1da177e4
LT
594 t = p;
595 do {
596 unsigned int state;
597 rm_from_queue(SIG_KERNEL_STOP_MASK, &t->pending);
1da177e4
LT
598 /*
599 * If there is a handler for SIGCONT, we must make
600 * sure that no thread returns to user mode before
601 * we post the signal, in case it was the only
602 * thread eligible to run the signal handler--then
603 * it must not do anything between resuming and
604 * running the handler. With the TIF_SIGPENDING
605 * flag set, the thread will pause and acquire the
606 * siglock that we hold now and until we've queued
fc321d2e 607 * the pending signal.
1da177e4
LT
608 *
609 * Wake up the stopped thread _after_ setting
610 * TIF_SIGPENDING
611 */
f021a3c2 612 state = __TASK_STOPPED;
1da177e4
LT
613 if (sig_user_defined(t, SIGCONT) && !sigismember(&t->blocked, SIGCONT)) {
614 set_tsk_thread_flag(t, TIF_SIGPENDING);
615 state |= TASK_INTERRUPTIBLE;
616 }
617 wake_up_state(t, state);
ad16a460 618 } while_each_thread(p, t);
1da177e4 619
fc321d2e
ON
620 /*
621 * Notify the parent with CLD_CONTINUED if we were stopped.
622 *
623 * If we were in the middle of a group stop, we pretend it
624 * was already finished, and then continued. Since SIGCHLD
625 * doesn't queue we report only CLD_STOPPED, as if the next
626 * CLD_CONTINUED was dropped.
627 */
628 why = 0;
ad16a460 629 if (signal->flags & SIGNAL_STOP_STOPPED)
fc321d2e 630 why |= SIGNAL_CLD_CONTINUED;
ad16a460 631 else if (signal->group_stop_count)
fc321d2e
ON
632 why |= SIGNAL_CLD_STOPPED;
633
634 if (why) {
ad16a460
ON
635 signal->flags = why | SIGNAL_STOP_CONTINUED;
636 signal->group_stop_count = 0;
637 signal->group_exit_code = 0;
1da177e4
LT
638 } else {
639 /*
640 * We are not stopped, but there could be a stop
641 * signal in the middle of being processed after
642 * being removed from the queue. Clear that too.
643 */
ad16a460 644 signal->flags &= ~SIGNAL_STOP_DEQUEUED;
1da177e4
LT
645 }
646 } else if (sig == SIGKILL) {
647 /*
648 * Make sure that any pending stop signal already dequeued
649 * is undone by the wakeup for SIGKILL.
650 */
ad16a460 651 signal->flags &= ~SIGNAL_STOP_DEQUEUED;
1da177e4
LT
652 }
653}
654
af7fff9c
PE
655static inline int legacy_queue(struct sigpending *signals, int sig)
656{
657 return (sig < SIGRTMIN) && sigismember(&signals->signal, sig);
658}
659
1da177e4
LT
660static int send_signal(int sig, struct siginfo *info, struct task_struct *t,
661 struct sigpending *signals)
662{
663 struct sigqueue * q = NULL;
1da177e4 664
2acb024d
PE
665 /*
666 * Short-circuit ignored signals and support queuing
667 * exactly one non-rt signal, so that we can get more
668 * detailed information about the cause of the signal.
669 */
670 if (sig_ignored(t, sig) || legacy_queue(signals, sig))
671 return 0;
672
fba2afaa
DL
673 /*
674 * Deliver the signal to listening signalfds. This must be called
675 * with the sighand lock held.
676 */
677 signalfd_notify(t, sig);
678
1da177e4
LT
679 /*
680 * fast-pathed signals for kernel-internal things like SIGSTOP
681 * or SIGKILL.
682 */
b67a1b9e 683 if (info == SEND_SIG_FORCED)
1da177e4
LT
684 goto out_set;
685
686 /* Real-time signals must be queued if sent by sigqueue, or
687 some other real-time mechanism. It is implementation
688 defined whether kill() does so. We attempt to do so, on
689 the principle of least surprise, but since kill is not
690 allowed to fail with EAGAIN when low on memory we just
691 make sure at least one signal gets delivered and don't
692 pass on the info struct. */
693
694 q = __sigqueue_alloc(t, GFP_ATOMIC, (sig < SIGRTMIN &&
621d3121 695 (is_si_special(info) ||
1da177e4
LT
696 info->si_code >= 0)));
697 if (q) {
698 list_add_tail(&q->list, &signals->list);
699 switch ((unsigned long) info) {
b67a1b9e 700 case (unsigned long) SEND_SIG_NOINFO:
1da177e4
LT
701 q->info.si_signo = sig;
702 q->info.si_errno = 0;
703 q->info.si_code = SI_USER;
b488893a 704 q->info.si_pid = task_pid_vnr(current);
1da177e4
LT
705 q->info.si_uid = current->uid;
706 break;
b67a1b9e 707 case (unsigned long) SEND_SIG_PRIV:
1da177e4
LT
708 q->info.si_signo = sig;
709 q->info.si_errno = 0;
710 q->info.si_code = SI_KERNEL;
711 q->info.si_pid = 0;
712 q->info.si_uid = 0;
713 break;
714 default:
715 copy_siginfo(&q->info, info);
716 break;
717 }
621d3121
ON
718 } else if (!is_si_special(info)) {
719 if (sig >= SIGRTMIN && info->si_code != SI_USER)
1da177e4
LT
720 /*
721 * Queue overflow, abort. We may abort if the signal was rt
722 * and sent by user using something other than kill().
723 */
724 return -EAGAIN;
1da177e4
LT
725 }
726
727out_set:
728 sigaddset(&signals->signal, sig);
2acb024d 729 return 1;
1da177e4
LT
730}
731
45807a1d
IM
732int print_fatal_signals;
733
734static void print_fatal_signal(struct pt_regs *regs, int signr)
735{
736 printk("%s/%d: potentially unexpected fatal signal %d.\n",
ba25f9dc 737 current->comm, task_pid_nr(current), signr);
45807a1d 738
ca5cd877 739#if defined(__i386__) && !defined(__arch_um__)
65ea5b03 740 printk("code at %08lx: ", regs->ip);
45807a1d
IM
741 {
742 int i;
743 for (i = 0; i < 16; i++) {
744 unsigned char insn;
745
65ea5b03 746 __get_user(insn, (unsigned char *)(regs->ip + i));
45807a1d
IM
747 printk("%02x ", insn);
748 }
749 }
750#endif
751 printk("\n");
752 show_regs(regs);
753}
754
755static int __init setup_print_fatal_signals(char *str)
756{
757 get_option (&str, &print_fatal_signals);
758
759 return 1;
760}
761
762__setup("print-fatal-signals=", setup_print_fatal_signals);
1da177e4
LT
763
764static int
765specific_send_sig_info(int sig, struct siginfo *info, struct task_struct *t)
766{
2acb024d 767 int ret;
1da177e4 768
fda8bd78 769 BUG_ON(!irqs_disabled());
1da177e4
LT
770 assert_spin_locked(&t->sighand->siglock);
771
1da177e4 772 ret = send_signal(sig, info, t, &t->pending);
2acb024d
PE
773 if (ret <= 0)
774 return ret;
775
776 if (!sigismember(&t->blocked, sig))
1da177e4 777 signal_wake_up(t, sig == SIGKILL);
2acb024d 778 return 0;
1da177e4
LT
779}
780
781/*
782 * Force a signal that the process can't ignore: if necessary
783 * we unblock the signal and change any SIG_IGN to SIG_DFL.
ae74c3b6
LT
784 *
785 * Note: If we unblock the signal, we always reset it to SIG_DFL,
786 * since we do not want to have a signal handler that was blocked
787 * be invoked when user space had explicitly blocked it.
788 *
789 * We don't want to have recursive SIGSEGV's etc, for example.
1da177e4 790 */
1da177e4
LT
791int
792force_sig_info(int sig, struct siginfo *info, struct task_struct *t)
793{
794 unsigned long int flags;
ae74c3b6
LT
795 int ret, blocked, ignored;
796 struct k_sigaction *action;
1da177e4
LT
797
798 spin_lock_irqsave(&t->sighand->siglock, flags);
ae74c3b6
LT
799 action = &t->sighand->action[sig-1];
800 ignored = action->sa.sa_handler == SIG_IGN;
801 blocked = sigismember(&t->blocked, sig);
802 if (blocked || ignored) {
803 action->sa.sa_handler = SIG_DFL;
804 if (blocked) {
805 sigdelset(&t->blocked, sig);
7bb44ade 806 recalc_sigpending_and_wake(t);
ae74c3b6 807 }
1da177e4
LT
808 }
809 ret = specific_send_sig_info(sig, info, t);
810 spin_unlock_irqrestore(&t->sighand->siglock, flags);
811
812 return ret;
813}
814
815void
816force_sig_specific(int sig, struct task_struct *t)
817{
b0423a0d 818 force_sig_info(sig, SEND_SIG_FORCED, t);
1da177e4
LT
819}
820
821/*
822 * Test if P wants to take SIG. After we've checked all threads with this,
823 * it's equivalent to finding no threads not blocking SIG. Any threads not
824 * blocking SIG were ruled out because they are not running and already
825 * have pending signals. Such threads will dequeue from the shared queue
826 * as soon as they're available, so putting the signal on the shared queue
827 * will be equivalent to sending it to one such thread.
828 */
188a1eaf
LT
829static inline int wants_signal(int sig, struct task_struct *p)
830{
831 if (sigismember(&p->blocked, sig))
832 return 0;
833 if (p->flags & PF_EXITING)
834 return 0;
835 if (sig == SIGKILL)
836 return 1;
e1abb39c 837 if (task_is_stopped_or_traced(p))
188a1eaf
LT
838 return 0;
839 return task_curr(p) || !signal_pending(p);
840}
1da177e4
LT
841
842static void
843__group_complete_signal(int sig, struct task_struct *p)
844{
f8c5b5c0 845 struct signal_struct *signal = p->signal;
1da177e4
LT
846 struct task_struct *t;
847
1da177e4
LT
848 /*
849 * Now find a thread we can wake up to take the signal off the queue.
850 *
851 * If the main thread wants the signal, it gets first crack.
852 * Probably the least surprising to the average bear.
853 */
188a1eaf 854 if (wants_signal(sig, p))
1da177e4
LT
855 t = p;
856 else if (thread_group_empty(p))
857 /*
858 * There is just one thread and it does not need to be woken.
859 * It will dequeue unblocked signals before it runs again.
860 */
861 return;
862 else {
863 /*
864 * Otherwise try to find a suitable thread.
865 */
f8c5b5c0 866 t = signal->curr_target;
1da177e4
LT
867 if (t == NULL)
868 /* restart balancing at this thread */
f8c5b5c0 869 t = signal->curr_target = p;
1da177e4 870
188a1eaf 871 while (!wants_signal(sig, t)) {
1da177e4 872 t = next_thread(t);
f8c5b5c0 873 if (t == signal->curr_target)
1da177e4
LT
874 /*
875 * No thread needs to be woken.
876 * Any eligible threads will see
877 * the signal in the queue soon.
878 */
879 return;
880 }
f8c5b5c0 881 signal->curr_target = t;
1da177e4
LT
882 }
883
884 /*
885 * Found a killable thread. If the signal will be fatal,
886 * then start taking the whole group down immediately.
887 */
f8c5b5c0 888 if (sig_fatal(p, sig) && !(signal->flags & SIGNAL_GROUP_EXIT) &&
1da177e4
LT
889 !sigismember(&t->real_blocked, sig) &&
890 (sig == SIGKILL || !(t->ptrace & PT_PTRACED))) {
891 /*
892 * This signal will be fatal to the whole group.
893 */
894 if (!sig_kernel_coredump(sig)) {
895 /*
896 * Start a group exit and wake everybody up.
897 * This way we don't have other threads
898 * running and doing things after a slower
899 * thread has the fatal signal pending.
900 */
f8c5b5c0
ON
901 signal->flags = SIGNAL_GROUP_EXIT;
902 signal->group_exit_code = sig;
903 signal->group_stop_count = 0;
1da177e4
LT
904 t = p;
905 do {
906 sigaddset(&t->pending.signal, SIGKILL);
907 signal_wake_up(t, 1);
18442cf2 908 } while_each_thread(p, t);
1da177e4
LT
909 return;
910 }
1da177e4
LT
911 }
912
913 /*
914 * The signal is already in the shared-pending queue.
915 * Tell the chosen thread to wake up and dequeue it.
916 */
917 signal_wake_up(t, sig == SIGKILL);
918 return;
919}
920
921int
922__group_send_sig_info(int sig, struct siginfo *info, struct task_struct *p)
923{
2acb024d 924 int ret;
1da177e4
LT
925
926 assert_spin_locked(&p->sighand->siglock);
927 handle_stop_signal(sig, p);
928
1da177e4
LT
929 /*
930 * Put this signal on the shared-pending queue, or fail with EAGAIN.
931 * We always use the shared queue for process-wide signals,
932 * to avoid several races.
933 */
934 ret = send_signal(sig, info, p, &p->signal->shared_pending);
2acb024d 935 if (ret <= 0)
1da177e4
LT
936 return ret;
937
938 __group_complete_signal(sig, p);
939 return 0;
940}
941
942/*
943 * Nuke all other threads in the group.
944 */
945void zap_other_threads(struct task_struct *p)
946{
947 struct task_struct *t;
948
1da177e4
LT
949 p->signal->group_stop_count = 0;
950
1da177e4
LT
951 for (t = next_thread(p); t != p; t = next_thread(t)) {
952 /*
953 * Don't bother with already dead threads
954 */
955 if (t->exit_state)
956 continue;
957
30e0fca6 958 /* SIGKILL will be handled before any pending SIGSTOP */
1da177e4 959 sigaddset(&t->pending.signal, SIGKILL);
1da177e4
LT
960 signal_wake_up(t, 1);
961 }
962}
963
b5606c2d 964int __fatal_signal_pending(struct task_struct *tsk)
f776d12d
MW
965{
966 return sigismember(&tsk->pending.signal, SIGKILL);
967}
13f09b95 968EXPORT_SYMBOL(__fatal_signal_pending);
f776d12d 969
f63ee72e
ON
970struct sighand_struct *lock_task_sighand(struct task_struct *tsk, unsigned long *flags)
971{
972 struct sighand_struct *sighand;
973
1406f2d3 974 rcu_read_lock();
f63ee72e
ON
975 for (;;) {
976 sighand = rcu_dereference(tsk->sighand);
977 if (unlikely(sighand == NULL))
978 break;
979
980 spin_lock_irqsave(&sighand->siglock, *flags);
981 if (likely(sighand == tsk->sighand))
982 break;
983 spin_unlock_irqrestore(&sighand->siglock, *flags);
984 }
1406f2d3 985 rcu_read_unlock();
f63ee72e
ON
986
987 return sighand;
988}
989
1da177e4
LT
990int group_send_sig_info(int sig, struct siginfo *info, struct task_struct *p)
991{
992 unsigned long flags;
993 int ret;
994
995 ret = check_kill_permission(sig, info, p);
f63ee72e
ON
996
997 if (!ret && sig) {
998 ret = -ESRCH;
999 if (lock_task_sighand(p, &flags)) {
1000 ret = __group_send_sig_info(sig, info, p);
1001 unlock_task_sighand(p, &flags);
2d89c929 1002 }
1da177e4
LT
1003 }
1004
1005 return ret;
1006}
1007
1008/*
146a505d 1009 * __kill_pgrp_info() sends a signal to a process group: this is what the tty
1da177e4
LT
1010 * control characters do (^C, ^Z etc)
1011 */
1012
c4b92fc1 1013int __kill_pgrp_info(int sig, struct siginfo *info, struct pid *pgrp)
1da177e4
LT
1014{
1015 struct task_struct *p = NULL;
1016 int retval, success;
1017
1da177e4
LT
1018 success = 0;
1019 retval = -ESRCH;
c4b92fc1 1020 do_each_pid_task(pgrp, PIDTYPE_PGID, p) {
1da177e4
LT
1021 int err = group_send_sig_info(sig, info, p);
1022 success |= !err;
1023 retval = err;
c4b92fc1 1024 } while_each_pid_task(pgrp, PIDTYPE_PGID, p);
1da177e4
LT
1025 return success ? 0 : retval;
1026}
1027
c4b92fc1 1028int kill_pid_info(int sig, struct siginfo *info, struct pid *pid)
1da177e4 1029{
d36174bc 1030 int error = -ESRCH;
1da177e4
LT
1031 struct task_struct *p;
1032
e56d0903 1033 rcu_read_lock();
d36174bc 1034retry:
c4b92fc1 1035 p = pid_task(pid, PIDTYPE_PID);
d36174bc 1036 if (p) {
1da177e4 1037 error = group_send_sig_info(sig, info, p);
d36174bc
ON
1038 if (unlikely(error == -ESRCH))
1039 /*
1040 * The task was unhashed in between, try again.
1041 * If it is dead, pid_task() will return NULL,
1042 * if we race with de_thread() it will find the
1043 * new leader.
1044 */
1045 goto retry;
1046 }
e56d0903 1047 rcu_read_unlock();
6ca25b55 1048
1da177e4
LT
1049 return error;
1050}
1051
c3de4b38
MW
1052int
1053kill_proc_info(int sig, struct siginfo *info, pid_t pid)
c4b92fc1
EB
1054{
1055 int error;
1056 rcu_read_lock();
b488893a 1057 error = kill_pid_info(sig, info, find_vpid(pid));
c4b92fc1
EB
1058 rcu_read_unlock();
1059 return error;
1060}
1061
2425c08b
EB
1062/* like kill_pid_info(), but doesn't use uid/euid of "current" */
1063int kill_pid_info_as_uid(int sig, struct siginfo *info, struct pid *pid,
8f95dc58 1064 uid_t uid, uid_t euid, u32 secid)
46113830
HW
1065{
1066 int ret = -EINVAL;
1067 struct task_struct *p;
1068
1069 if (!valid_signal(sig))
1070 return ret;
1071
1072 read_lock(&tasklist_lock);
2425c08b 1073 p = pid_task(pid, PIDTYPE_PID);
46113830
HW
1074 if (!p) {
1075 ret = -ESRCH;
1076 goto out_unlock;
1077 }
0811af28 1078 if ((info == SEND_SIG_NOINFO || (!is_si_special(info) && SI_FROMUSER(info)))
46113830
HW
1079 && (euid != p->suid) && (euid != p->uid)
1080 && (uid != p->suid) && (uid != p->uid)) {
1081 ret = -EPERM;
1082 goto out_unlock;
1083 }
8f95dc58
DQ
1084 ret = security_task_kill(p, info, sig, secid);
1085 if (ret)
1086 goto out_unlock;
46113830
HW
1087 if (sig && p->sighand) {
1088 unsigned long flags;
1089 spin_lock_irqsave(&p->sighand->siglock, flags);
1090 ret = __group_send_sig_info(sig, info, p);
1091 spin_unlock_irqrestore(&p->sighand->siglock, flags);
1092 }
1093out_unlock:
1094 read_unlock(&tasklist_lock);
1095 return ret;
1096}
2425c08b 1097EXPORT_SYMBOL_GPL(kill_pid_info_as_uid);
1da177e4
LT
1098
1099/*
1100 * kill_something_info() interprets pid in interesting ways just like kill(2).
1101 *
1102 * POSIX specifies that kill(-1,sig) is unspecified, but what we have
1103 * is probably wrong. Should make it like BSD or SYSV.
1104 */
1105
1106static int kill_something_info(int sig, struct siginfo *info, int pid)
1107{
8d42db18 1108 int ret;
d5df763b
PE
1109
1110 if (pid > 0) {
1111 rcu_read_lock();
1112 ret = kill_pid_info(sig, info, find_vpid(pid));
1113 rcu_read_unlock();
1114 return ret;
1115 }
1116
1117 read_lock(&tasklist_lock);
1118 if (pid != -1) {
1119 ret = __kill_pgrp_info(sig, info,
1120 pid ? find_vpid(-pid) : task_pgrp(current));
1121 } else {
1da177e4
LT
1122 int retval = 0, count = 0;
1123 struct task_struct * p;
1124
1da177e4 1125 for_each_process(p) {
bac0abd6 1126 if (p->pid > 1 && !same_thread_group(p, current)) {
1da177e4
LT
1127 int err = group_send_sig_info(sig, info, p);
1128 ++count;
1129 if (err != -EPERM)
1130 retval = err;
1131 }
1132 }
8d42db18 1133 ret = count ? retval : -ESRCH;
1da177e4 1134 }
d5df763b
PE
1135 read_unlock(&tasklist_lock);
1136
8d42db18 1137 return ret;
1da177e4
LT
1138}
1139
1140/*
1141 * These are for backward compatibility with the rest of the kernel source.
1142 */
1143
1144/*
1145 * These two are the most common entry points. They send a signal
1146 * just to the specific thread.
1147 */
1148int
1149send_sig_info(int sig, struct siginfo *info, struct task_struct *p)
1150{
1151 int ret;
1152 unsigned long flags;
1153
1154 /*
1155 * Make sure legacy kernel users don't send in bad values
1156 * (normal paths check this in check_kill_permission).
1157 */
7ed20e1a 1158 if (!valid_signal(sig))
1da177e4
LT
1159 return -EINVAL;
1160
1161 /*
1162 * We need the tasklist lock even for the specific
1163 * thread case (when we don't need to follow the group
1164 * lists) in order to avoid races with "p->sighand"
1165 * going away or changing from under us.
1166 */
1167 read_lock(&tasklist_lock);
1168 spin_lock_irqsave(&p->sighand->siglock, flags);
1169 ret = specific_send_sig_info(sig, info, p);
1170 spin_unlock_irqrestore(&p->sighand->siglock, flags);
1171 read_unlock(&tasklist_lock);
1172 return ret;
1173}
1174
b67a1b9e
ON
1175#define __si_special(priv) \
1176 ((priv) ? SEND_SIG_PRIV : SEND_SIG_NOINFO)
1177
1da177e4
LT
1178int
1179send_sig(int sig, struct task_struct *p, int priv)
1180{
b67a1b9e 1181 return send_sig_info(sig, __si_special(priv), p);
1da177e4
LT
1182}
1183
1da177e4
LT
1184void
1185force_sig(int sig, struct task_struct *p)
1186{
b67a1b9e 1187 force_sig_info(sig, SEND_SIG_PRIV, p);
1da177e4
LT
1188}
1189
1190/*
1191 * When things go south during signal handling, we
1192 * will force a SIGSEGV. And if the signal that caused
1193 * the problem was already a SIGSEGV, we'll want to
1194 * make sure we don't even try to deliver the signal..
1195 */
1196int
1197force_sigsegv(int sig, struct task_struct *p)
1198{
1199 if (sig == SIGSEGV) {
1200 unsigned long flags;
1201 spin_lock_irqsave(&p->sighand->siglock, flags);
1202 p->sighand->action[sig - 1].sa.sa_handler = SIG_DFL;
1203 spin_unlock_irqrestore(&p->sighand->siglock, flags);
1204 }
1205 force_sig(SIGSEGV, p);
1206 return 0;
1207}
1208
c4b92fc1
EB
1209int kill_pgrp(struct pid *pid, int sig, int priv)
1210{
146a505d
PE
1211 int ret;
1212
1213 read_lock(&tasklist_lock);
1214 ret = __kill_pgrp_info(sig, __si_special(priv), pid);
1215 read_unlock(&tasklist_lock);
1216
1217 return ret;
c4b92fc1
EB
1218}
1219EXPORT_SYMBOL(kill_pgrp);
1220
1221int kill_pid(struct pid *pid, int sig, int priv)
1222{
1223 return kill_pid_info(sig, __si_special(priv), pid);
1224}
1225EXPORT_SYMBOL(kill_pid);
1226
1da177e4
LT
1227int
1228kill_proc(pid_t pid, int sig, int priv)
1229{
b488893a
PE
1230 int ret;
1231
1232 rcu_read_lock();
1233 ret = kill_pid_info(sig, __si_special(priv), find_pid(pid));
1234 rcu_read_unlock();
1235 return ret;
1da177e4
LT
1236}
1237
1238/*
1239 * These functions support sending signals using preallocated sigqueue
1240 * structures. This is needed "because realtime applications cannot
1241 * afford to lose notifications of asynchronous events, like timer
1242 * expirations or I/O completions". In the case of Posix Timers
1243 * we allocate the sigqueue structure from the timer_create. If this
1244 * allocation fails we are able to report the failure to the application
1245 * with an EAGAIN error.
1246 */
1247
1248struct sigqueue *sigqueue_alloc(void)
1249{
1250 struct sigqueue *q;
1251
1252 if ((q = __sigqueue_alloc(current, GFP_KERNEL, 0)))
1253 q->flags |= SIGQUEUE_PREALLOC;
1254 return(q);
1255}
1256
1257void sigqueue_free(struct sigqueue *q)
1258{
1259 unsigned long flags;
60187d27
ON
1260 spinlock_t *lock = &current->sighand->siglock;
1261
1da177e4
LT
1262 BUG_ON(!(q->flags & SIGQUEUE_PREALLOC));
1263 /*
1264 * If the signal is still pending remove it from the
60187d27
ON
1265 * pending queue. We must hold ->siglock while testing
1266 * q->list to serialize with collect_signal().
1da177e4 1267 */
60187d27
ON
1268 spin_lock_irqsave(lock, flags);
1269 if (!list_empty(&q->list))
1270 list_del_init(&q->list);
1271 spin_unlock_irqrestore(lock, flags);
1272
1da177e4
LT
1273 q->flags &= ~SIGQUEUE_PREALLOC;
1274 __sigqueue_free(q);
1275}
1276
9e3bd6c3 1277static int do_send_sigqueue(int sig, struct sigqueue *q, struct task_struct *t,
5fc894bb 1278 struct sigpending *pending)
9e3bd6c3 1279{
5fc894bb
ON
1280 handle_stop_signal(sig, t);
1281
9e3bd6c3
PE
1282 if (unlikely(!list_empty(&q->list))) {
1283 /*
1284 * If an SI_TIMER entry is already queue just increment
1285 * the overrun count.
1286 */
1287
1288 BUG_ON(q->info.si_code != SI_TIMER);
1289 q->info.si_overrun++;
1290 return 0;
1291 }
1292
1293 if (sig_ignored(t, sig))
1294 return 1;
1295
1296 signalfd_notify(t, sig);
1297 list_add_tail(&q->list, &pending->list);
1298 sigaddset(&pending->signal, sig);
1299 return 0;
1300}
1301
54767908 1302int send_sigqueue(int sig, struct sigqueue *q, struct task_struct *p)
1da177e4
LT
1303{
1304 unsigned long flags;
9e3bd6c3 1305 int ret = -1;
1da177e4 1306
1da177e4 1307 BUG_ON(!(q->flags & SIGQUEUE_PREALLOC));
e56d0903
IM
1308
1309 /*
1310 * The rcu based delayed sighand destroy makes it possible to
1311 * run this without tasklist lock held. The task struct itself
1312 * cannot go away as create_timer did get_task_struct().
1313 *
1314 * We return -1, when the task is marked exiting, so
1315 * posix_timer_event can redirect it to the group leader
1316 */
9e3bd6c3 1317 if (!likely(lock_task_sighand(p, &flags)))
e752dd6c 1318 goto out_err;
e752dd6c 1319
9e3bd6c3 1320 ret = do_send_sigqueue(sig, q, p, &p->pending);
1da177e4 1321
1da177e4
LT
1322 if (!sigismember(&p->blocked, sig))
1323 signal_wake_up(p, sig == SIGKILL);
1324
54767908 1325 unlock_task_sighand(p, &flags);
e752dd6c 1326out_err:
e752dd6c 1327 return ret;
1da177e4
LT
1328}
1329
1330int
1331send_group_sigqueue(int sig, struct sigqueue *q, struct task_struct *p)
1332{
1333 unsigned long flags;
9e3bd6c3 1334 int ret;
1da177e4
LT
1335
1336 BUG_ON(!(q->flags & SIGQUEUE_PREALLOC));
e56d0903 1337
e56d0903 1338 /* Since it_lock is held, p->sighand cannot be NULL. */
1da177e4 1339 spin_lock_irqsave(&p->sighand->siglock, flags);
1da177e4 1340
9e3bd6c3 1341 ret = do_send_sigqueue(sig, q, p, &p->signal->shared_pending);
1da177e4
LT
1342
1343 __group_complete_signal(sig, p);
9e3bd6c3 1344
1da177e4 1345 spin_unlock_irqrestore(&p->sighand->siglock, flags);
c99fcf28 1346
e56d0903 1347 return ret;
1da177e4
LT
1348}
1349
1350/*
1351 * Wake up any threads in the parent blocked in wait* syscalls.
1352 */
1353static inline void __wake_up_parent(struct task_struct *p,
1354 struct task_struct *parent)
1355{
1356 wake_up_interruptible_sync(&parent->signal->wait_chldexit);
1357}
1358
1359/*
1360 * Let a parent know about the death of a child.
1361 * For a stopped/continued status change, use do_notify_parent_cldstop instead.
1362 */
1363
1364void do_notify_parent(struct task_struct *tsk, int sig)
1365{
1366 struct siginfo info;
1367 unsigned long flags;
1368 struct sighand_struct *psig;
1369
1370 BUG_ON(sig == -1);
1371
1372 /* do_notify_parent_cldstop should have been called instead. */
e1abb39c 1373 BUG_ON(task_is_stopped_or_traced(tsk));
1da177e4
LT
1374
1375 BUG_ON(!tsk->ptrace &&
1376 (tsk->group_leader != tsk || !thread_group_empty(tsk)));
1377
1378 info.si_signo = sig;
1379 info.si_errno = 0;
b488893a
PE
1380 /*
1381 * we are under tasklist_lock here so our parent is tied to
1382 * us and cannot exit and release its namespace.
1383 *
1384 * the only it can is to switch its nsproxy with sys_unshare,
1385 * bu uncharing pid namespaces is not allowed, so we'll always
1386 * see relevant namespace
1387 *
1388 * write_lock() currently calls preempt_disable() which is the
1389 * same as rcu_read_lock(), but according to Oleg, this is not
1390 * correct to rely on this
1391 */
1392 rcu_read_lock();
1393 info.si_pid = task_pid_nr_ns(tsk, tsk->parent->nsproxy->pid_ns);
1394 rcu_read_unlock();
1395
1da177e4
LT
1396 info.si_uid = tsk->uid;
1397
1398 /* FIXME: find out whether or not this is supposed to be c*time. */
1399 info.si_utime = cputime_to_jiffies(cputime_add(tsk->utime,
1400 tsk->signal->utime));
1401 info.si_stime = cputime_to_jiffies(cputime_add(tsk->stime,
1402 tsk->signal->stime));
1403
1404 info.si_status = tsk->exit_code & 0x7f;
1405 if (tsk->exit_code & 0x80)
1406 info.si_code = CLD_DUMPED;
1407 else if (tsk->exit_code & 0x7f)
1408 info.si_code = CLD_KILLED;
1409 else {
1410 info.si_code = CLD_EXITED;
1411 info.si_status = tsk->exit_code >> 8;
1412 }
1413
1414 psig = tsk->parent->sighand;
1415 spin_lock_irqsave(&psig->siglock, flags);
7ed0175a 1416 if (!tsk->ptrace && sig == SIGCHLD &&
1da177e4
LT
1417 (psig->action[SIGCHLD-1].sa.sa_handler == SIG_IGN ||
1418 (psig->action[SIGCHLD-1].sa.sa_flags & SA_NOCLDWAIT))) {
1419 /*
1420 * We are exiting and our parent doesn't care. POSIX.1
1421 * defines special semantics for setting SIGCHLD to SIG_IGN
1422 * or setting the SA_NOCLDWAIT flag: we should be reaped
1423 * automatically and not left for our parent's wait4 call.
1424 * Rather than having the parent do it as a magic kind of
1425 * signal handler, we just set this to tell do_exit that we
1426 * can be cleaned up without becoming a zombie. Note that
1427 * we still call __wake_up_parent in this case, because a
1428 * blocked sys_wait4 might now return -ECHILD.
1429 *
1430 * Whether we send SIGCHLD or not for SA_NOCLDWAIT
1431 * is implementation-defined: we do (if you don't want
1432 * it, just use SIG_IGN instead).
1433 */
1434 tsk->exit_signal = -1;
1435 if (psig->action[SIGCHLD-1].sa.sa_handler == SIG_IGN)
1436 sig = 0;
1437 }
7ed20e1a 1438 if (valid_signal(sig) && sig > 0)
1da177e4
LT
1439 __group_send_sig_info(sig, &info, tsk->parent);
1440 __wake_up_parent(tsk, tsk->parent);
1441 spin_unlock_irqrestore(&psig->siglock, flags);
1442}
1443
a1d5e21e 1444static void do_notify_parent_cldstop(struct task_struct *tsk, int why)
1da177e4
LT
1445{
1446 struct siginfo info;
1447 unsigned long flags;
bc505a47 1448 struct task_struct *parent;
1da177e4
LT
1449 struct sighand_struct *sighand;
1450
a1d5e21e 1451 if (tsk->ptrace & PT_PTRACED)
bc505a47
ON
1452 parent = tsk->parent;
1453 else {
1454 tsk = tsk->group_leader;
1455 parent = tsk->real_parent;
1456 }
1457
1da177e4
LT
1458 info.si_signo = SIGCHLD;
1459 info.si_errno = 0;
b488893a
PE
1460 /*
1461 * see comment in do_notify_parent() abot the following 3 lines
1462 */
1463 rcu_read_lock();
1464 info.si_pid = task_pid_nr_ns(tsk, tsk->parent->nsproxy->pid_ns);
1465 rcu_read_unlock();
1466
1da177e4
LT
1467 info.si_uid = tsk->uid;
1468
1469 /* FIXME: find out whether or not this is supposed to be c*time. */
1470 info.si_utime = cputime_to_jiffies(tsk->utime);
1471 info.si_stime = cputime_to_jiffies(tsk->stime);
1472
1473 info.si_code = why;
1474 switch (why) {
1475 case CLD_CONTINUED:
1476 info.si_status = SIGCONT;
1477 break;
1478 case CLD_STOPPED:
1479 info.si_status = tsk->signal->group_exit_code & 0x7f;
1480 break;
1481 case CLD_TRAPPED:
1482 info.si_status = tsk->exit_code & 0x7f;
1483 break;
1484 default:
1485 BUG();
1486 }
1487
1488 sighand = parent->sighand;
1489 spin_lock_irqsave(&sighand->siglock, flags);
1490 if (sighand->action[SIGCHLD-1].sa.sa_handler != SIG_IGN &&
1491 !(sighand->action[SIGCHLD-1].sa.sa_flags & SA_NOCLDSTOP))
1492 __group_send_sig_info(SIGCHLD, &info, parent);
1493 /*
1494 * Even if SIGCHLD is not generated, we must wake up wait4 calls.
1495 */
1496 __wake_up_parent(tsk, parent);
1497 spin_unlock_irqrestore(&sighand->siglock, flags);
1498}
1499
d5f70c00
ON
1500static inline int may_ptrace_stop(void)
1501{
1502 if (!likely(current->ptrace & PT_PTRACED))
1503 return 0;
d5f70c00
ON
1504 /*
1505 * Are we in the middle of do_coredump?
1506 * If so and our tracer is also part of the coredump stopping
1507 * is a deadlock situation, and pointless because our tracer
1508 * is dead so don't allow us to stop.
1509 * If SIGKILL was already sent before the caller unlocked
1510 * ->siglock we must see ->core_waiters != 0. Otherwise it
1511 * is safe to enter schedule().
1512 */
1513 if (unlikely(current->mm->core_waiters) &&
1514 unlikely(current->mm == current->parent->mm))
1515 return 0;
1516
1517 return 1;
1518}
1519
1a669c2f
RM
1520/*
1521 * Return nonzero if there is a SIGKILL that should be waking us up.
1522 * Called with the siglock held.
1523 */
1524static int sigkill_pending(struct task_struct *tsk)
1525{
1526 return ((sigismember(&tsk->pending.signal, SIGKILL) ||
1527 sigismember(&tsk->signal->shared_pending.signal, SIGKILL)) &&
1528 !unlikely(sigismember(&tsk->blocked, SIGKILL)));
1529}
1530
1da177e4
LT
1531/*
1532 * This must be called with current->sighand->siglock held.
1533 *
1534 * This should be the path for all ptrace stops.
1535 * We always set current->last_siginfo while stopped here.
1536 * That makes it a way to test a stopped process for
1537 * being ptrace-stopped vs being job-control-stopped.
1538 *
20686a30
ON
1539 * If we actually decide not to stop at all because the tracer
1540 * is gone, we keep current->exit_code unless clear_code.
1da177e4 1541 */
20686a30 1542static void ptrace_stop(int exit_code, int clear_code, siginfo_t *info)
1da177e4 1543{
1a669c2f
RM
1544 int killed = 0;
1545
1546 if (arch_ptrace_stop_needed(exit_code, info)) {
1547 /*
1548 * The arch code has something special to do before a
1549 * ptrace stop. This is allowed to block, e.g. for faults
1550 * on user stack pages. We can't keep the siglock while
1551 * calling arch_ptrace_stop, so we must release it now.
1552 * To preserve proper semantics, we must do this before
1553 * any signal bookkeeping like checking group_stop_count.
1554 * Meanwhile, a SIGKILL could come in before we retake the
1555 * siglock. That must prevent us from sleeping in TASK_TRACED.
1556 * So after regaining the lock, we must check for SIGKILL.
1557 */
1558 spin_unlock_irq(&current->sighand->siglock);
1559 arch_ptrace_stop(exit_code, info);
1560 spin_lock_irq(&current->sighand->siglock);
1561 killed = sigkill_pending(current);
1562 }
1563
1da177e4
LT
1564 /*
1565 * If there is a group stop in progress,
1566 * we must participate in the bookkeeping.
1567 */
1568 if (current->signal->group_stop_count > 0)
1569 --current->signal->group_stop_count;
1570
1571 current->last_siginfo = info;
1572 current->exit_code = exit_code;
1573
1574 /* Let the debugger run. */
d9ae90ac 1575 __set_current_state(TASK_TRACED);
1da177e4
LT
1576 spin_unlock_irq(&current->sighand->siglock);
1577 read_lock(&tasklist_lock);
1a669c2f 1578 if (!unlikely(killed) && may_ptrace_stop()) {
a1d5e21e 1579 do_notify_parent_cldstop(current, CLD_TRAPPED);
1da177e4
LT
1580 read_unlock(&tasklist_lock);
1581 schedule();
1582 } else {
1583 /*
1584 * By the time we got the lock, our tracer went away.
6405f7f4 1585 * Don't drop the lock yet, another tracer may come.
1da177e4 1586 */
6405f7f4 1587 __set_current_state(TASK_RUNNING);
20686a30
ON
1588 if (clear_code)
1589 current->exit_code = 0;
6405f7f4 1590 read_unlock(&tasklist_lock);
1da177e4
LT
1591 }
1592
13b1c3d4
RM
1593 /*
1594 * While in TASK_TRACED, we were considered "frozen enough".
1595 * Now that we woke up, it's crucial if we're supposed to be
1596 * frozen that we freeze now before running anything substantial.
1597 */
1598 try_to_freeze();
1599
1da177e4
LT
1600 /*
1601 * We are back. Now reacquire the siglock before touching
1602 * last_siginfo, so that we are sure to have synchronized with
1603 * any signal-sending on another CPU that wants to examine it.
1604 */
1605 spin_lock_irq(&current->sighand->siglock);
1606 current->last_siginfo = NULL;
1607
1608 /*
1609 * Queued signals ignored us while we were stopped for tracing.
1610 * So check for any that we should take before resuming user mode.
b74d0deb 1611 * This sets TIF_SIGPENDING, but never clears it.
1da177e4 1612 */
b74d0deb 1613 recalc_sigpending_tsk(current);
1da177e4
LT
1614}
1615
1616void ptrace_notify(int exit_code)
1617{
1618 siginfo_t info;
1619
1620 BUG_ON((exit_code & (0x7f | ~0xffff)) != SIGTRAP);
1621
1622 memset(&info, 0, sizeof info);
1623 info.si_signo = SIGTRAP;
1624 info.si_code = exit_code;
b488893a 1625 info.si_pid = task_pid_vnr(current);
1da177e4
LT
1626 info.si_uid = current->uid;
1627
1628 /* Let the debugger run. */
1629 spin_lock_irq(&current->sighand->siglock);
20686a30 1630 ptrace_stop(exit_code, 1, &info);
1da177e4
LT
1631 spin_unlock_irq(&current->sighand->siglock);
1632}
1633
1da177e4
LT
1634static void
1635finish_stop(int stop_count)
1636{
1637 /*
1638 * If there are no other threads in the group, or if there is
1639 * a group stop in progress and we are the last to stop,
1640 * report to the parent. When ptraced, every thread reports itself.
1641 */
a1d5e21e
ON
1642 if (stop_count == 0 || (current->ptrace & PT_PTRACED)) {
1643 read_lock(&tasklist_lock);
1644 do_notify_parent_cldstop(current, CLD_STOPPED);
1645 read_unlock(&tasklist_lock);
1646 }
bc505a47 1647
3df494a3
RW
1648 do {
1649 schedule();
1650 } while (try_to_freeze());
1da177e4
LT
1651 /*
1652 * Now we don't run again until continued.
1653 */
1654 current->exit_code = 0;
1655}
1656
1657/*
1658 * This performs the stopping for SIGSTOP and other stop signals.
1659 * We have to stop all threads in the thread group.
1660 * Returns nonzero if we've actually stopped and released the siglock.
1661 * Returns zero if we didn't stop and still hold the siglock.
1662 */
a122b341 1663static int do_signal_stop(int signr)
1da177e4
LT
1664{
1665 struct signal_struct *sig = current->signal;
dac27f4a 1666 int stop_count;
1da177e4 1667
1da177e4
LT
1668 if (sig->group_stop_count > 0) {
1669 /*
1670 * There is a group stop in progress. We don't need to
1671 * start another one.
1672 */
1da177e4 1673 stop_count = --sig->group_stop_count;
dac27f4a 1674 } else {
f558b7e4
ON
1675 struct task_struct *t;
1676
ed5d2cac 1677 if (!likely(sig->flags & SIGNAL_STOP_DEQUEUED) ||
573cf9ad 1678 unlikely(signal_group_exit(sig)))
f558b7e4 1679 return 0;
1da177e4
LT
1680 /*
1681 * There is no group stop already in progress.
a122b341 1682 * We must initiate one now.
1da177e4 1683 */
a122b341 1684 sig->group_exit_code = signr;
1da177e4 1685
a122b341
ON
1686 stop_count = 0;
1687 for (t = next_thread(current); t != current; t = next_thread(t))
1da177e4 1688 /*
a122b341
ON
1689 * Setting state to TASK_STOPPED for a group
1690 * stop is always done with the siglock held,
1691 * so this check has no races.
1da177e4 1692 */
d12619b5 1693 if (!(t->flags & PF_EXITING) &&
e1abb39c 1694 !task_is_stopped_or_traced(t)) {
a122b341
ON
1695 stop_count++;
1696 signal_wake_up(t, 0);
1697 }
1698 sig->group_stop_count = stop_count;
1da177e4
LT
1699 }
1700
dac27f4a
ON
1701 if (stop_count == 0)
1702 sig->flags = SIGNAL_STOP_STOPPED;
1703 current->exit_code = sig->group_exit_code;
1704 __set_current_state(TASK_STOPPED);
1705
1706 spin_unlock_irq(&current->sighand->siglock);
1da177e4
LT
1707 finish_stop(stop_count);
1708 return 1;
1709}
1710
18c98b65
RM
1711static int ptrace_signal(int signr, siginfo_t *info,
1712 struct pt_regs *regs, void *cookie)
1713{
1714 if (!(current->ptrace & PT_PTRACED))
1715 return signr;
1716
1717 ptrace_signal_deliver(regs, cookie);
1718
1719 /* Let the debugger run. */
1720 ptrace_stop(signr, 0, info);
1721
1722 /* We're back. Did the debugger cancel the sig? */
1723 signr = current->exit_code;
1724 if (signr == 0)
1725 return signr;
1726
1727 current->exit_code = 0;
1728
1729 /* Update the siginfo structure if the signal has
1730 changed. If the debugger wanted something
1731 specific in the siginfo structure then it should
1732 have updated *info via PTRACE_SETSIGINFO. */
1733 if (signr != info->si_signo) {
1734 info->si_signo = signr;
1735 info->si_errno = 0;
1736 info->si_code = SI_USER;
1737 info->si_pid = task_pid_vnr(current->parent);
1738 info->si_uid = current->parent->uid;
1739 }
1740
1741 /* If the (new) signal is now blocked, requeue it. */
1742 if (sigismember(&current->blocked, signr)) {
1743 specific_send_sig_info(signr, info, current);
1744 signr = 0;
1745 }
1746
1747 return signr;
1748}
1749
1da177e4
LT
1750int get_signal_to_deliver(siginfo_t *info, struct k_sigaction *return_ka,
1751 struct pt_regs *regs, void *cookie)
1752{
f6b76d4f
ON
1753 struct sighand_struct *sighand = current->sighand;
1754 struct signal_struct *signal = current->signal;
1755 int signr;
1da177e4 1756
13b1c3d4
RM
1757relock:
1758 /*
1759 * We'll jump back here after any time we were stopped in TASK_STOPPED.
1760 * While in TASK_STOPPED, we were considered "frozen enough".
1761 * Now that we woke up, it's crucial if we're supposed to be
1762 * frozen that we freeze now before running anything substantial.
1763 */
fc558a74
RW
1764 try_to_freeze();
1765
f6b76d4f 1766 spin_lock_irq(&sighand->siglock);
e4420551 1767
f6b76d4f
ON
1768 if (unlikely(signal->flags & SIGNAL_CLD_MASK)) {
1769 int why = (signal->flags & SIGNAL_STOP_CONTINUED)
e4420551 1770 ? CLD_CONTINUED : CLD_STOPPED;
f6b76d4f
ON
1771 signal->flags &= ~SIGNAL_CLD_MASK;
1772 spin_unlock_irq(&sighand->siglock);
e4420551
ON
1773
1774 read_lock(&tasklist_lock);
1775 do_notify_parent_cldstop(current->group_leader, why);
1776 read_unlock(&tasklist_lock);
1777 goto relock;
1778 }
1779
1da177e4
LT
1780 for (;;) {
1781 struct k_sigaction *ka;
1782
f6b76d4f 1783 if (unlikely(signal->group_stop_count > 0) &&
f558b7e4 1784 do_signal_stop(0))
1da177e4
LT
1785 goto relock;
1786
f6b76d4f 1787 signr = dequeue_signal(current, &current->blocked, info);
1da177e4
LT
1788 if (!signr)
1789 break; /* will return 0 */
1790
18c98b65
RM
1791 if (signr != SIGKILL) {
1792 signr = ptrace_signal(signr, info, regs, cookie);
1793 if (!signr)
1da177e4 1794 continue;
1da177e4
LT
1795 }
1796
f6b76d4f 1797 ka = &sighand->action[signr-1];
1da177e4
LT
1798 if (ka->sa.sa_handler == SIG_IGN) /* Do nothing. */
1799 continue;
1800 if (ka->sa.sa_handler != SIG_DFL) {
1801 /* Run the handler. */
1802 *return_ka = *ka;
1803
1804 if (ka->sa.sa_flags & SA_ONESHOT)
1805 ka->sa.sa_handler = SIG_DFL;
1806
1807 break; /* will return non-zero "signr" value */
1808 }
1809
1810 /*
1811 * Now we are doing the default action for this signal.
1812 */
1813 if (sig_kernel_ignore(signr)) /* Default is nothing. */
1814 continue;
1815
84d73786 1816 /*
0fbc26a6 1817 * Global init gets no signals it doesn't want.
84d73786 1818 */
0fbc26a6 1819 if (is_global_init(current))
1da177e4
LT
1820 continue;
1821
1822 if (sig_kernel_stop(signr)) {
1823 /*
1824 * The default action is to stop all threads in
1825 * the thread group. The job control signals
1826 * do nothing in an orphaned pgrp, but SIGSTOP
1827 * always works. Note that siglock needs to be
1828 * dropped during the call to is_orphaned_pgrp()
1829 * because of lock ordering with tasklist_lock.
1830 * This allows an intervening SIGCONT to be posted.
1831 * We need to check for that and bail out if necessary.
1832 */
1833 if (signr != SIGSTOP) {
f6b76d4f 1834 spin_unlock_irq(&sighand->siglock);
1da177e4
LT
1835
1836 /* signals can be posted during this window */
1837
3e7cd6c4 1838 if (is_current_pgrp_orphaned())
1da177e4
LT
1839 goto relock;
1840
f6b76d4f 1841 spin_lock_irq(&sighand->siglock);
1da177e4
LT
1842 }
1843
1844 if (likely(do_signal_stop(signr))) {
1845 /* It released the siglock. */
1846 goto relock;
1847 }
1848
1849 /*
1850 * We didn't actually stop, due to a race
1851 * with SIGCONT or something like that.
1852 */
1853 continue;
1854 }
1855
f6b76d4f 1856 spin_unlock_irq(&sighand->siglock);
1da177e4
LT
1857
1858 /*
1859 * Anything else is fatal, maybe with a core dump.
1860 */
1861 current->flags |= PF_SIGNALED;
45807a1d
IM
1862 if ((signr != SIGKILL) && print_fatal_signals)
1863 print_fatal_signal(regs, signr);
1da177e4
LT
1864 if (sig_kernel_coredump(signr)) {
1865 /*
1866 * If it was able to dump core, this kills all
1867 * other threads in the group and synchronizes with
1868 * their demise. If we lost the race with another
1869 * thread getting here, it set group_exit_code
1870 * first and our do_group_exit call below will use
1871 * that value and ignore the one we pass it.
1872 */
1873 do_coredump((long)signr, signr, regs);
1874 }
1875
1876 /*
1877 * Death signals, no core dump.
1878 */
1879 do_group_exit(signr);
1880 /* NOTREACHED */
1881 }
f6b76d4f 1882 spin_unlock_irq(&sighand->siglock);
1da177e4
LT
1883 return signr;
1884}
1885
d12619b5
ON
1886void exit_signals(struct task_struct *tsk)
1887{
1888 int group_stop = 0;
5dee1707 1889 struct task_struct *t;
d12619b5 1890
5dee1707
ON
1891 if (thread_group_empty(tsk) || signal_group_exit(tsk->signal)) {
1892 tsk->flags |= PF_EXITING;
1893 return;
d12619b5
ON
1894 }
1895
5dee1707 1896 spin_lock_irq(&tsk->sighand->siglock);
d12619b5
ON
1897 /*
1898 * From now this task is not visible for group-wide signals,
1899 * see wants_signal(), do_signal_stop().
1900 */
1901 tsk->flags |= PF_EXITING;
5dee1707
ON
1902 if (!signal_pending(tsk))
1903 goto out;
1904
1905 /* It could be that __group_complete_signal() choose us to
1906 * notify about group-wide signal. Another thread should be
1907 * woken now to take the signal since we will not.
1908 */
1909 for (t = tsk; (t = next_thread(t)) != tsk; )
1910 if (!signal_pending(t) && !(t->flags & PF_EXITING))
1911 recalc_sigpending_and_wake(t);
1912
1913 if (unlikely(tsk->signal->group_stop_count) &&
1914 !--tsk->signal->group_stop_count) {
1915 tsk->signal->flags = SIGNAL_STOP_STOPPED;
1916 group_stop = 1;
1917 }
1918out:
d12619b5
ON
1919 spin_unlock_irq(&tsk->sighand->siglock);
1920
1921 if (unlikely(group_stop)) {
1922 read_lock(&tasklist_lock);
1923 do_notify_parent_cldstop(tsk, CLD_STOPPED);
1924 read_unlock(&tasklist_lock);
1925 }
1926}
1927
1da177e4
LT
1928EXPORT_SYMBOL(recalc_sigpending);
1929EXPORT_SYMBOL_GPL(dequeue_signal);
1930EXPORT_SYMBOL(flush_signals);
1931EXPORT_SYMBOL(force_sig);
1da177e4
LT
1932EXPORT_SYMBOL(kill_proc);
1933EXPORT_SYMBOL(ptrace_notify);
1934EXPORT_SYMBOL(send_sig);
1935EXPORT_SYMBOL(send_sig_info);
1936EXPORT_SYMBOL(sigprocmask);
1937EXPORT_SYMBOL(block_all_signals);
1938EXPORT_SYMBOL(unblock_all_signals);
1939
1940
1941/*
1942 * System call entry points.
1943 */
1944
1945asmlinkage long sys_restart_syscall(void)
1946{
1947 struct restart_block *restart = &current_thread_info()->restart_block;
1948 return restart->fn(restart);
1949}
1950
1951long do_no_restart_syscall(struct restart_block *param)
1952{
1953 return -EINTR;
1954}
1955
1956/*
1957 * We don't need to get the kernel lock - this is all local to this
1958 * particular thread.. (and that's good, because this is _heavily_
1959 * used by various programs)
1960 */
1961
1962/*
1963 * This is also useful for kernel threads that want to temporarily
1964 * (or permanently) block certain signals.
1965 *
1966 * NOTE! Unlike the user-mode sys_sigprocmask(), the kernel
1967 * interface happily blocks "unblockable" signals like SIGKILL
1968 * and friends.
1969 */
1970int sigprocmask(int how, sigset_t *set, sigset_t *oldset)
1971{
1972 int error;
1da177e4
LT
1973
1974 spin_lock_irq(&current->sighand->siglock);
a26fd335
ON
1975 if (oldset)
1976 *oldset = current->blocked;
1977
1da177e4
LT
1978 error = 0;
1979 switch (how) {
1980 case SIG_BLOCK:
1981 sigorsets(&current->blocked, &current->blocked, set);
1982 break;
1983 case SIG_UNBLOCK:
1984 signandsets(&current->blocked, &current->blocked, set);
1985 break;
1986 case SIG_SETMASK:
1987 current->blocked = *set;
1988 break;
1989 default:
1990 error = -EINVAL;
1991 }
1992 recalc_sigpending();
1993 spin_unlock_irq(&current->sighand->siglock);
a26fd335 1994
1da177e4
LT
1995 return error;
1996}
1997
1998asmlinkage long
1999sys_rt_sigprocmask(int how, sigset_t __user *set, sigset_t __user *oset, size_t sigsetsize)
2000{
2001 int error = -EINVAL;
2002 sigset_t old_set, new_set;
2003
2004 /* XXX: Don't preclude handling different sized sigset_t's. */
2005 if (sigsetsize != sizeof(sigset_t))
2006 goto out;
2007
2008 if (set) {
2009 error = -EFAULT;
2010 if (copy_from_user(&new_set, set, sizeof(*set)))
2011 goto out;
2012 sigdelsetmask(&new_set, sigmask(SIGKILL)|sigmask(SIGSTOP));
2013
2014 error = sigprocmask(how, &new_set, &old_set);
2015 if (error)
2016 goto out;
2017 if (oset)
2018 goto set_old;
2019 } else if (oset) {
2020 spin_lock_irq(&current->sighand->siglock);
2021 old_set = current->blocked;
2022 spin_unlock_irq(&current->sighand->siglock);
2023
2024 set_old:
2025 error = -EFAULT;
2026 if (copy_to_user(oset, &old_set, sizeof(*oset)))
2027 goto out;
2028 }
2029 error = 0;
2030out:
2031 return error;
2032}
2033
2034long do_sigpending(void __user *set, unsigned long sigsetsize)
2035{
2036 long error = -EINVAL;
2037 sigset_t pending;
2038
2039 if (sigsetsize > sizeof(sigset_t))
2040 goto out;
2041
2042 spin_lock_irq(&current->sighand->siglock);
2043 sigorsets(&pending, &current->pending.signal,
2044 &current->signal->shared_pending.signal);
2045 spin_unlock_irq(&current->sighand->siglock);
2046
2047 /* Outside the lock because only this thread touches it. */
2048 sigandsets(&pending, &current->blocked, &pending);
2049
2050 error = -EFAULT;
2051 if (!copy_to_user(set, &pending, sigsetsize))
2052 error = 0;
2053
2054out:
2055 return error;
2056}
2057
2058asmlinkage long
2059sys_rt_sigpending(sigset_t __user *set, size_t sigsetsize)
2060{
2061 return do_sigpending(set, sigsetsize);
2062}
2063
2064#ifndef HAVE_ARCH_COPY_SIGINFO_TO_USER
2065
2066int copy_siginfo_to_user(siginfo_t __user *to, siginfo_t *from)
2067{
2068 int err;
2069
2070 if (!access_ok (VERIFY_WRITE, to, sizeof(siginfo_t)))
2071 return -EFAULT;
2072 if (from->si_code < 0)
2073 return __copy_to_user(to, from, sizeof(siginfo_t))
2074 ? -EFAULT : 0;
2075 /*
2076 * If you change siginfo_t structure, please be sure
2077 * this code is fixed accordingly.
fba2afaa
DL
2078 * Please remember to update the signalfd_copyinfo() function
2079 * inside fs/signalfd.c too, in case siginfo_t changes.
1da177e4
LT
2080 * It should never copy any pad contained in the structure
2081 * to avoid security leaks, but must copy the generic
2082 * 3 ints plus the relevant union member.
2083 */
2084 err = __put_user(from->si_signo, &to->si_signo);
2085 err |= __put_user(from->si_errno, &to->si_errno);
2086 err |= __put_user((short)from->si_code, &to->si_code);
2087 switch (from->si_code & __SI_MASK) {
2088 case __SI_KILL:
2089 err |= __put_user(from->si_pid, &to->si_pid);
2090 err |= __put_user(from->si_uid, &to->si_uid);
2091 break;
2092 case __SI_TIMER:
2093 err |= __put_user(from->si_tid, &to->si_tid);
2094 err |= __put_user(from->si_overrun, &to->si_overrun);
2095 err |= __put_user(from->si_ptr, &to->si_ptr);
2096 break;
2097 case __SI_POLL:
2098 err |= __put_user(from->si_band, &to->si_band);
2099 err |= __put_user(from->si_fd, &to->si_fd);
2100 break;
2101 case __SI_FAULT:
2102 err |= __put_user(from->si_addr, &to->si_addr);
2103#ifdef __ARCH_SI_TRAPNO
2104 err |= __put_user(from->si_trapno, &to->si_trapno);
2105#endif
2106 break;
2107 case __SI_CHLD:
2108 err |= __put_user(from->si_pid, &to->si_pid);
2109 err |= __put_user(from->si_uid, &to->si_uid);
2110 err |= __put_user(from->si_status, &to->si_status);
2111 err |= __put_user(from->si_utime, &to->si_utime);
2112 err |= __put_user(from->si_stime, &to->si_stime);
2113 break;
2114 case __SI_RT: /* This is not generated by the kernel as of now. */
2115 case __SI_MESGQ: /* But this is */
2116 err |= __put_user(from->si_pid, &to->si_pid);
2117 err |= __put_user(from->si_uid, &to->si_uid);
2118 err |= __put_user(from->si_ptr, &to->si_ptr);
2119 break;
2120 default: /* this is just in case for now ... */
2121 err |= __put_user(from->si_pid, &to->si_pid);
2122 err |= __put_user(from->si_uid, &to->si_uid);
2123 break;
2124 }
2125 return err;
2126}
2127
2128#endif
2129
2130asmlinkage long
2131sys_rt_sigtimedwait(const sigset_t __user *uthese,
2132 siginfo_t __user *uinfo,
2133 const struct timespec __user *uts,
2134 size_t sigsetsize)
2135{
2136 int ret, sig;
2137 sigset_t these;
2138 struct timespec ts;
2139 siginfo_t info;
2140 long timeout = 0;
2141
2142 /* XXX: Don't preclude handling different sized sigset_t's. */
2143 if (sigsetsize != sizeof(sigset_t))
2144 return -EINVAL;
2145
2146 if (copy_from_user(&these, uthese, sizeof(these)))
2147 return -EFAULT;
2148
2149 /*
2150 * Invert the set of allowed signals to get those we
2151 * want to block.
2152 */
2153 sigdelsetmask(&these, sigmask(SIGKILL)|sigmask(SIGSTOP));
2154 signotset(&these);
2155
2156 if (uts) {
2157 if (copy_from_user(&ts, uts, sizeof(ts)))
2158 return -EFAULT;
2159 if (ts.tv_nsec >= 1000000000L || ts.tv_nsec < 0
2160 || ts.tv_sec < 0)
2161 return -EINVAL;
2162 }
2163
2164 spin_lock_irq(&current->sighand->siglock);
2165 sig = dequeue_signal(current, &these, &info);
2166 if (!sig) {
2167 timeout = MAX_SCHEDULE_TIMEOUT;
2168 if (uts)
2169 timeout = (timespec_to_jiffies(&ts)
2170 + (ts.tv_sec || ts.tv_nsec));
2171
2172 if (timeout) {
2173 /* None ready -- temporarily unblock those we're
2174 * interested while we are sleeping in so that we'll
2175 * be awakened when they arrive. */
2176 current->real_blocked = current->blocked;
2177 sigandsets(&current->blocked, &current->blocked, &these);
2178 recalc_sigpending();
2179 spin_unlock_irq(&current->sighand->siglock);
2180
75bcc8c5 2181 timeout = schedule_timeout_interruptible(timeout);
1da177e4 2182
1da177e4
LT
2183 spin_lock_irq(&current->sighand->siglock);
2184 sig = dequeue_signal(current, &these, &info);
2185 current->blocked = current->real_blocked;
2186 siginitset(&current->real_blocked, 0);
2187 recalc_sigpending();
2188 }
2189 }
2190 spin_unlock_irq(&current->sighand->siglock);
2191
2192 if (sig) {
2193 ret = sig;
2194 if (uinfo) {
2195 if (copy_siginfo_to_user(uinfo, &info))
2196 ret = -EFAULT;
2197 }
2198 } else {
2199 ret = -EAGAIN;
2200 if (timeout)
2201 ret = -EINTR;
2202 }
2203
2204 return ret;
2205}
2206
2207asmlinkage long
2208sys_kill(int pid, int sig)
2209{
2210 struct siginfo info;
2211
2212 info.si_signo = sig;
2213 info.si_errno = 0;
2214 info.si_code = SI_USER;
b488893a 2215 info.si_pid = task_tgid_vnr(current);
1da177e4
LT
2216 info.si_uid = current->uid;
2217
2218 return kill_something_info(sig, &info, pid);
2219}
2220
6dd69f10 2221static int do_tkill(int tgid, int pid, int sig)
1da177e4 2222{
1da177e4 2223 int error;
6dd69f10 2224 struct siginfo info;
1da177e4
LT
2225 struct task_struct *p;
2226
6dd69f10 2227 error = -ESRCH;
1da177e4
LT
2228 info.si_signo = sig;
2229 info.si_errno = 0;
2230 info.si_code = SI_TKILL;
b488893a 2231 info.si_pid = task_tgid_vnr(current);
1da177e4
LT
2232 info.si_uid = current->uid;
2233
2234 read_lock(&tasklist_lock);
228ebcbe 2235 p = find_task_by_vpid(pid);
b488893a 2236 if (p && (tgid <= 0 || task_tgid_vnr(p) == tgid)) {
1da177e4
LT
2237 error = check_kill_permission(sig, &info, p);
2238 /*
2239 * The null signal is a permissions and process existence
2240 * probe. No signal is actually delivered.
2241 */
2242 if (!error && sig && p->sighand) {
2243 spin_lock_irq(&p->sighand->siglock);
2244 handle_stop_signal(sig, p);
2245 error = specific_send_sig_info(sig, &info, p);
2246 spin_unlock_irq(&p->sighand->siglock);
2247 }
2248 }
2249 read_unlock(&tasklist_lock);
6dd69f10 2250
1da177e4
LT
2251 return error;
2252}
2253
6dd69f10
VL
2254/**
2255 * sys_tgkill - send signal to one specific thread
2256 * @tgid: the thread group ID of the thread
2257 * @pid: the PID of the thread
2258 * @sig: signal to be sent
2259 *
72fd4a35 2260 * This syscall also checks the @tgid and returns -ESRCH even if the PID
6dd69f10
VL
2261 * exists but it's not belonging to the target process anymore. This
2262 * method solves the problem of threads exiting and PIDs getting reused.
2263 */
2264asmlinkage long sys_tgkill(int tgid, int pid, int sig)
2265{
2266 /* This is only valid for single tasks */
2267 if (pid <= 0 || tgid <= 0)
2268 return -EINVAL;
2269
2270 return do_tkill(tgid, pid, sig);
2271}
2272
1da177e4
LT
2273/*
2274 * Send a signal to only one task, even if it's a CLONE_THREAD task.
2275 */
2276asmlinkage long
2277sys_tkill(int pid, int sig)
2278{
1da177e4
LT
2279 /* This is only valid for single tasks */
2280 if (pid <= 0)
2281 return -EINVAL;
2282
6dd69f10 2283 return do_tkill(0, pid, sig);
1da177e4
LT
2284}
2285
2286asmlinkage long
2287sys_rt_sigqueueinfo(int pid, int sig, siginfo_t __user *uinfo)
2288{
2289 siginfo_t info;
2290
2291 if (copy_from_user(&info, uinfo, sizeof(siginfo_t)))
2292 return -EFAULT;
2293
2294 /* Not even root can pretend to send signals from the kernel.
2295 Nor can they impersonate a kill(), which adds source info. */
2296 if (info.si_code >= 0)
2297 return -EPERM;
2298 info.si_signo = sig;
2299
2300 /* POSIX.1b doesn't mention process groups. */
2301 return kill_proc_info(sig, &info, pid);
2302}
2303
88531f72 2304int do_sigaction(int sig, struct k_sigaction *act, struct k_sigaction *oact)
1da177e4 2305{
93585eea 2306 struct task_struct *t = current;
1da177e4 2307 struct k_sigaction *k;
71fabd5e 2308 sigset_t mask;
1da177e4 2309
7ed20e1a 2310 if (!valid_signal(sig) || sig < 1 || (act && sig_kernel_only(sig)))
1da177e4
LT
2311 return -EINVAL;
2312
93585eea 2313 k = &t->sighand->action[sig-1];
1da177e4
LT
2314
2315 spin_lock_irq(&current->sighand->siglock);
1da177e4
LT
2316 if (oact)
2317 *oact = *k;
2318
2319 if (act) {
9ac95f2f
ON
2320 sigdelsetmask(&act->sa.sa_mask,
2321 sigmask(SIGKILL) | sigmask(SIGSTOP));
88531f72 2322 *k = *act;
1da177e4
LT
2323 /*
2324 * POSIX 3.3.1.3:
2325 * "Setting a signal action to SIG_IGN for a signal that is
2326 * pending shall cause the pending signal to be discarded,
2327 * whether or not it is blocked."
2328 *
2329 * "Setting a signal action to SIG_DFL for a signal that is
2330 * pending and whose default action is to ignore the signal
2331 * (for example, SIGCHLD), shall cause the pending signal to
2332 * be discarded, whether or not it is blocked"
2333 */
93585eea 2334 if (__sig_ignored(t, sig)) {
71fabd5e
GA
2335 sigemptyset(&mask);
2336 sigaddset(&mask, sig);
2337 rm_from_queue_full(&mask, &t->signal->shared_pending);
1da177e4 2338 do {
71fabd5e 2339 rm_from_queue_full(&mask, &t->pending);
1da177e4
LT
2340 t = next_thread(t);
2341 } while (t != current);
1da177e4 2342 }
1da177e4
LT
2343 }
2344
2345 spin_unlock_irq(&current->sighand->siglock);
2346 return 0;
2347}
2348
2349int
2350do_sigaltstack (const stack_t __user *uss, stack_t __user *uoss, unsigned long sp)
2351{
2352 stack_t oss;
2353 int error;
2354
2355 if (uoss) {
2356 oss.ss_sp = (void __user *) current->sas_ss_sp;
2357 oss.ss_size = current->sas_ss_size;
2358 oss.ss_flags = sas_ss_flags(sp);
2359 }
2360
2361 if (uss) {
2362 void __user *ss_sp;
2363 size_t ss_size;
2364 int ss_flags;
2365
2366 error = -EFAULT;
2367 if (!access_ok(VERIFY_READ, uss, sizeof(*uss))
2368 || __get_user(ss_sp, &uss->ss_sp)
2369 || __get_user(ss_flags, &uss->ss_flags)
2370 || __get_user(ss_size, &uss->ss_size))
2371 goto out;
2372
2373 error = -EPERM;
2374 if (on_sig_stack(sp))
2375 goto out;
2376
2377 error = -EINVAL;
2378 /*
2379 *
2380 * Note - this code used to test ss_flags incorrectly
2381 * old code may have been written using ss_flags==0
2382 * to mean ss_flags==SS_ONSTACK (as this was the only
2383 * way that worked) - this fix preserves that older
2384 * mechanism
2385 */
2386 if (ss_flags != SS_DISABLE && ss_flags != SS_ONSTACK && ss_flags != 0)
2387 goto out;
2388
2389 if (ss_flags == SS_DISABLE) {
2390 ss_size = 0;
2391 ss_sp = NULL;
2392 } else {
2393 error = -ENOMEM;
2394 if (ss_size < MINSIGSTKSZ)
2395 goto out;
2396 }
2397
2398 current->sas_ss_sp = (unsigned long) ss_sp;
2399 current->sas_ss_size = ss_size;
2400 }
2401
2402 if (uoss) {
2403 error = -EFAULT;
2404 if (copy_to_user(uoss, &oss, sizeof(oss)))
2405 goto out;
2406 }
2407
2408 error = 0;
2409out:
2410 return error;
2411}
2412
2413#ifdef __ARCH_WANT_SYS_SIGPENDING
2414
2415asmlinkage long
2416sys_sigpending(old_sigset_t __user *set)
2417{
2418 return do_sigpending(set, sizeof(*set));
2419}
2420
2421#endif
2422
2423#ifdef __ARCH_WANT_SYS_SIGPROCMASK
2424/* Some platforms have their own version with special arguments others
2425 support only sys_rt_sigprocmask. */
2426
2427asmlinkage long
2428sys_sigprocmask(int how, old_sigset_t __user *set, old_sigset_t __user *oset)
2429{
2430 int error;
2431 old_sigset_t old_set, new_set;
2432
2433 if (set) {
2434 error = -EFAULT;
2435 if (copy_from_user(&new_set, set, sizeof(*set)))
2436 goto out;
2437 new_set &= ~(sigmask(SIGKILL) | sigmask(SIGSTOP));
2438
2439 spin_lock_irq(&current->sighand->siglock);
2440 old_set = current->blocked.sig[0];
2441
2442 error = 0;
2443 switch (how) {
2444 default:
2445 error = -EINVAL;
2446 break;
2447 case SIG_BLOCK:
2448 sigaddsetmask(&current->blocked, new_set);
2449 break;
2450 case SIG_UNBLOCK:
2451 sigdelsetmask(&current->blocked, new_set);
2452 break;
2453 case SIG_SETMASK:
2454 current->blocked.sig[0] = new_set;
2455 break;
2456 }
2457
2458 recalc_sigpending();
2459 spin_unlock_irq(&current->sighand->siglock);
2460 if (error)
2461 goto out;
2462 if (oset)
2463 goto set_old;
2464 } else if (oset) {
2465 old_set = current->blocked.sig[0];
2466 set_old:
2467 error = -EFAULT;
2468 if (copy_to_user(oset, &old_set, sizeof(*oset)))
2469 goto out;
2470 }
2471 error = 0;
2472out:
2473 return error;
2474}
2475#endif /* __ARCH_WANT_SYS_SIGPROCMASK */
2476
2477#ifdef __ARCH_WANT_SYS_RT_SIGACTION
2478asmlinkage long
2479sys_rt_sigaction(int sig,
2480 const struct sigaction __user *act,
2481 struct sigaction __user *oact,
2482 size_t sigsetsize)
2483{
2484 struct k_sigaction new_sa, old_sa;
2485 int ret = -EINVAL;
2486
2487 /* XXX: Don't preclude handling different sized sigset_t's. */
2488 if (sigsetsize != sizeof(sigset_t))
2489 goto out;
2490
2491 if (act) {
2492 if (copy_from_user(&new_sa.sa, act, sizeof(new_sa.sa)))
2493 return -EFAULT;
2494 }
2495
2496 ret = do_sigaction(sig, act ? &new_sa : NULL, oact ? &old_sa : NULL);
2497
2498 if (!ret && oact) {
2499 if (copy_to_user(oact, &old_sa.sa, sizeof(old_sa.sa)))
2500 return -EFAULT;
2501 }
2502out:
2503 return ret;
2504}
2505#endif /* __ARCH_WANT_SYS_RT_SIGACTION */
2506
2507#ifdef __ARCH_WANT_SYS_SGETMASK
2508
2509/*
2510 * For backwards compatibility. Functionality superseded by sigprocmask.
2511 */
2512asmlinkage long
2513sys_sgetmask(void)
2514{
2515 /* SMP safe */
2516 return current->blocked.sig[0];
2517}
2518
2519asmlinkage long
2520sys_ssetmask(int newmask)
2521{
2522 int old;
2523
2524 spin_lock_irq(&current->sighand->siglock);
2525 old = current->blocked.sig[0];
2526
2527 siginitset(&current->blocked, newmask & ~(sigmask(SIGKILL)|
2528 sigmask(SIGSTOP)));
2529 recalc_sigpending();
2530 spin_unlock_irq(&current->sighand->siglock);
2531
2532 return old;
2533}
2534#endif /* __ARCH_WANT_SGETMASK */
2535
2536#ifdef __ARCH_WANT_SYS_SIGNAL
2537/*
2538 * For backwards compatibility. Functionality superseded by sigaction.
2539 */
2540asmlinkage unsigned long
2541sys_signal(int sig, __sighandler_t handler)
2542{
2543 struct k_sigaction new_sa, old_sa;
2544 int ret;
2545
2546 new_sa.sa.sa_handler = handler;
2547 new_sa.sa.sa_flags = SA_ONESHOT | SA_NOMASK;
c70d3d70 2548 sigemptyset(&new_sa.sa.sa_mask);
1da177e4
LT
2549
2550 ret = do_sigaction(sig, &new_sa, &old_sa);
2551
2552 return ret ? ret : (unsigned long)old_sa.sa.sa_handler;
2553}
2554#endif /* __ARCH_WANT_SYS_SIGNAL */
2555
2556#ifdef __ARCH_WANT_SYS_PAUSE
2557
2558asmlinkage long
2559sys_pause(void)
2560{
2561 current->state = TASK_INTERRUPTIBLE;
2562 schedule();
2563 return -ERESTARTNOHAND;
2564}
2565
2566#endif
2567
150256d8
DW
2568#ifdef __ARCH_WANT_SYS_RT_SIGSUSPEND
2569asmlinkage long sys_rt_sigsuspend(sigset_t __user *unewset, size_t sigsetsize)
2570{
2571 sigset_t newset;
2572
2573 /* XXX: Don't preclude handling different sized sigset_t's. */
2574 if (sigsetsize != sizeof(sigset_t))
2575 return -EINVAL;
2576
2577 if (copy_from_user(&newset, unewset, sizeof(newset)))
2578 return -EFAULT;
2579 sigdelsetmask(&newset, sigmask(SIGKILL)|sigmask(SIGSTOP));
2580
2581 spin_lock_irq(&current->sighand->siglock);
2582 current->saved_sigmask = current->blocked;
2583 current->blocked = newset;
2584 recalc_sigpending();
2585 spin_unlock_irq(&current->sighand->siglock);
2586
2587 current->state = TASK_INTERRUPTIBLE;
2588 schedule();
2589 set_thread_flag(TIF_RESTORE_SIGMASK);
2590 return -ERESTARTNOHAND;
2591}
2592#endif /* __ARCH_WANT_SYS_RT_SIGSUSPEND */
2593
f269fdd1
DH
2594__attribute__((weak)) const char *arch_vma_name(struct vm_area_struct *vma)
2595{
2596 return NULL;
2597}
2598
1da177e4
LT
2599void __init signals_init(void)
2600{
0a31bd5f 2601 sigqueue_cachep = KMEM_CACHE(sigqueue, SLAB_PANIC);
1da177e4 2602}