Merge branch 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/jmorris...
[linux-2.6-block.git] / kernel / signal.c
CommitLineData
1da177e4
LT
1/*
2 * linux/kernel/signal.c
3 *
4 * Copyright (C) 1991, 1992 Linus Torvalds
5 *
6 * 1997-11-02 Modified for POSIX.1b signals by Richard Henderson
7 *
8 * 2003-06-02 Jim Houston - Concurrent Computer Corp.
9 * Changes to use preallocated sigqueue structures
10 * to allow signals to be sent reliably.
11 */
12
1da177e4
LT
13#include <linux/slab.h>
14#include <linux/module.h>
1da177e4
LT
15#include <linux/init.h>
16#include <linux/sched.h>
17#include <linux/fs.h>
18#include <linux/tty.h>
19#include <linux/binfmts.h>
20#include <linux/security.h>
21#include <linux/syscalls.h>
22#include <linux/ptrace.h>
7ed20e1a 23#include <linux/signal.h>
fba2afaa 24#include <linux/signalfd.h>
c59ede7b 25#include <linux/capability.h>
7dfb7103 26#include <linux/freezer.h>
84d73786
SB
27#include <linux/pid_namespace.h>
28#include <linux/nsproxy.h>
29
1da177e4
LT
30#include <asm/param.h>
31#include <asm/uaccess.h>
32#include <asm/unistd.h>
33#include <asm/siginfo.h>
e1396065 34#include "audit.h" /* audit_signal_info() */
1da177e4
LT
35
36/*
37 * SLAB caches for signal bits.
38 */
39
e18b890b 40static struct kmem_cache *sigqueue_cachep;
1da177e4 41
93585eea
PE
42static int __sig_ignored(struct task_struct *t, int sig)
43{
44 void __user *handler;
45
46 /* Is it explicitly or implicitly ignored? */
47
48 handler = t->sighand->action[sig - 1].sa.sa_handler;
49 return handler == SIG_IGN ||
50 (handler == SIG_DFL && sig_kernel_ignore(sig));
51}
1da177e4
LT
52
53static int sig_ignored(struct task_struct *t, int sig)
54{
1da177e4
LT
55 /*
56 * Tracers always want to know about signals..
57 */
58 if (t->ptrace & PT_PTRACED)
59 return 0;
60
61 /*
62 * Blocked signals are never ignored, since the
63 * signal handler may change by the time it is
64 * unblocked.
65 */
325d22df 66 if (sigismember(&t->blocked, sig) || sigismember(&t->real_blocked, sig))
1da177e4
LT
67 return 0;
68
93585eea 69 return __sig_ignored(t, sig);
1da177e4
LT
70}
71
72/*
73 * Re-calculate pending state from the set of locally pending
74 * signals, globally pending signals, and blocked signals.
75 */
76static inline int has_pending_signals(sigset_t *signal, sigset_t *blocked)
77{
78 unsigned long ready;
79 long i;
80
81 switch (_NSIG_WORDS) {
82 default:
83 for (i = _NSIG_WORDS, ready = 0; --i >= 0 ;)
84 ready |= signal->sig[i] &~ blocked->sig[i];
85 break;
86
87 case 4: ready = signal->sig[3] &~ blocked->sig[3];
88 ready |= signal->sig[2] &~ blocked->sig[2];
89 ready |= signal->sig[1] &~ blocked->sig[1];
90 ready |= signal->sig[0] &~ blocked->sig[0];
91 break;
92
93 case 2: ready = signal->sig[1] &~ blocked->sig[1];
94 ready |= signal->sig[0] &~ blocked->sig[0];
95 break;
96
97 case 1: ready = signal->sig[0] &~ blocked->sig[0];
98 }
99 return ready != 0;
100}
101
102#define PENDING(p,b) has_pending_signals(&(p)->signal, (b))
103
7bb44ade 104static int recalc_sigpending_tsk(struct task_struct *t)
1da177e4
LT
105{
106 if (t->signal->group_stop_count > 0 ||
107 PENDING(&t->pending, &t->blocked) ||
7bb44ade 108 PENDING(&t->signal->shared_pending, &t->blocked)) {
1da177e4 109 set_tsk_thread_flag(t, TIF_SIGPENDING);
7bb44ade
RM
110 return 1;
111 }
b74d0deb
RM
112 /*
113 * We must never clear the flag in another thread, or in current
114 * when it's possible the current syscall is returning -ERESTART*.
115 * So we don't clear it here, and only callers who know they should do.
116 */
7bb44ade
RM
117 return 0;
118}
119
120/*
121 * After recalculating TIF_SIGPENDING, we need to make sure the task wakes up.
122 * This is superfluous when called on current, the wakeup is a harmless no-op.
123 */
124void recalc_sigpending_and_wake(struct task_struct *t)
125{
126 if (recalc_sigpending_tsk(t))
127 signal_wake_up(t, 0);
1da177e4
LT
128}
129
130void recalc_sigpending(void)
131{
cc5f916e 132 if (!recalc_sigpending_tsk(current) && !freezing(current))
b74d0deb
RM
133 clear_thread_flag(TIF_SIGPENDING);
134
1da177e4
LT
135}
136
137/* Given the mask, find the first available signal that should be serviced. */
138
fba2afaa 139int next_signal(struct sigpending *pending, sigset_t *mask)
1da177e4
LT
140{
141 unsigned long i, *s, *m, x;
142 int sig = 0;
143
144 s = pending->signal.sig;
145 m = mask->sig;
146 switch (_NSIG_WORDS) {
147 default:
148 for (i = 0; i < _NSIG_WORDS; ++i, ++s, ++m)
149 if ((x = *s &~ *m) != 0) {
150 sig = ffz(~x) + i*_NSIG_BPW + 1;
151 break;
152 }
153 break;
154
155 case 2: if ((x = s[0] &~ m[0]) != 0)
156 sig = 1;
157 else if ((x = s[1] &~ m[1]) != 0)
158 sig = _NSIG_BPW + 1;
159 else
160 break;
161 sig += ffz(~x);
162 break;
163
164 case 1: if ((x = *s &~ *m) != 0)
165 sig = ffz(~x) + 1;
166 break;
167 }
168
169 return sig;
170}
171
dd0fc66f 172static struct sigqueue *__sigqueue_alloc(struct task_struct *t, gfp_t flags,
1da177e4
LT
173 int override_rlimit)
174{
175 struct sigqueue *q = NULL;
10b1fbdb 176 struct user_struct *user;
1da177e4 177
10b1fbdb
LT
178 /*
179 * In order to avoid problems with "switch_user()", we want to make
180 * sure that the compiler doesn't re-load "t->user"
181 */
182 user = t->user;
183 barrier();
184 atomic_inc(&user->sigpending);
1da177e4 185 if (override_rlimit ||
10b1fbdb 186 atomic_read(&user->sigpending) <=
1da177e4
LT
187 t->signal->rlim[RLIMIT_SIGPENDING].rlim_cur)
188 q = kmem_cache_alloc(sigqueue_cachep, flags);
189 if (unlikely(q == NULL)) {
10b1fbdb 190 atomic_dec(&user->sigpending);
1da177e4
LT
191 } else {
192 INIT_LIST_HEAD(&q->list);
193 q->flags = 0;
10b1fbdb 194 q->user = get_uid(user);
1da177e4
LT
195 }
196 return(q);
197}
198
514a01b8 199static void __sigqueue_free(struct sigqueue *q)
1da177e4
LT
200{
201 if (q->flags & SIGQUEUE_PREALLOC)
202 return;
203 atomic_dec(&q->user->sigpending);
204 free_uid(q->user);
205 kmem_cache_free(sigqueue_cachep, q);
206}
207
6a14c5c9 208void flush_sigqueue(struct sigpending *queue)
1da177e4
LT
209{
210 struct sigqueue *q;
211
212 sigemptyset(&queue->signal);
213 while (!list_empty(&queue->list)) {
214 q = list_entry(queue->list.next, struct sigqueue , list);
215 list_del_init(&q->list);
216 __sigqueue_free(q);
217 }
218}
219
220/*
221 * Flush all pending signals for a task.
222 */
c81addc9 223void flush_signals(struct task_struct *t)
1da177e4
LT
224{
225 unsigned long flags;
226
227 spin_lock_irqsave(&t->sighand->siglock, flags);
f5264481 228 clear_tsk_thread_flag(t, TIF_SIGPENDING);
1da177e4
LT
229 flush_sigqueue(&t->pending);
230 flush_sigqueue(&t->signal->shared_pending);
231 spin_unlock_irqrestore(&t->sighand->siglock, flags);
232}
233
cbaffba1
ON
234static void __flush_itimer_signals(struct sigpending *pending)
235{
236 sigset_t signal, retain;
237 struct sigqueue *q, *n;
238
239 signal = pending->signal;
240 sigemptyset(&retain);
241
242 list_for_each_entry_safe(q, n, &pending->list, list) {
243 int sig = q->info.si_signo;
244
245 if (likely(q->info.si_code != SI_TIMER)) {
246 sigaddset(&retain, sig);
247 } else {
248 sigdelset(&signal, sig);
249 list_del_init(&q->list);
250 __sigqueue_free(q);
251 }
252 }
253
254 sigorsets(&pending->signal, &signal, &retain);
255}
256
257void flush_itimer_signals(void)
258{
259 struct task_struct *tsk = current;
260 unsigned long flags;
261
262 spin_lock_irqsave(&tsk->sighand->siglock, flags);
263 __flush_itimer_signals(&tsk->pending);
264 __flush_itimer_signals(&tsk->signal->shared_pending);
265 spin_unlock_irqrestore(&tsk->sighand->siglock, flags);
266}
267
10ab825b
ON
268void ignore_signals(struct task_struct *t)
269{
270 int i;
271
272 for (i = 0; i < _NSIG; ++i)
273 t->sighand->action[i].sa.sa_handler = SIG_IGN;
274
275 flush_signals(t);
276}
277
1da177e4
LT
278/*
279 * Flush all handlers for a task.
280 */
281
282void
283flush_signal_handlers(struct task_struct *t, int force_default)
284{
285 int i;
286 struct k_sigaction *ka = &t->sighand->action[0];
287 for (i = _NSIG ; i != 0 ; i--) {
288 if (force_default || ka->sa.sa_handler != SIG_IGN)
289 ka->sa.sa_handler = SIG_DFL;
290 ka->sa.sa_flags = 0;
291 sigemptyset(&ka->sa.sa_mask);
292 ka++;
293 }
294}
295
abd4f750
MAS
296int unhandled_signal(struct task_struct *tsk, int sig)
297{
b460cbc5 298 if (is_global_init(tsk))
abd4f750
MAS
299 return 1;
300 if (tsk->ptrace & PT_PTRACED)
301 return 0;
302 return (tsk->sighand->action[sig-1].sa.sa_handler == SIG_IGN) ||
303 (tsk->sighand->action[sig-1].sa.sa_handler == SIG_DFL);
304}
305
1da177e4
LT
306
307/* Notify the system that a driver wants to block all signals for this
308 * process, and wants to be notified if any signals at all were to be
309 * sent/acted upon. If the notifier routine returns non-zero, then the
310 * signal will be acted upon after all. If the notifier routine returns 0,
311 * then then signal will be blocked. Only one block per process is
312 * allowed. priv is a pointer to private data that the notifier routine
313 * can use to determine if the signal should be blocked or not. */
314
315void
316block_all_signals(int (*notifier)(void *priv), void *priv, sigset_t *mask)
317{
318 unsigned long flags;
319
320 spin_lock_irqsave(&current->sighand->siglock, flags);
321 current->notifier_mask = mask;
322 current->notifier_data = priv;
323 current->notifier = notifier;
324 spin_unlock_irqrestore(&current->sighand->siglock, flags);
325}
326
327/* Notify the system that blocking has ended. */
328
329void
330unblock_all_signals(void)
331{
332 unsigned long flags;
333
334 spin_lock_irqsave(&current->sighand->siglock, flags);
335 current->notifier = NULL;
336 current->notifier_data = NULL;
337 recalc_sigpending();
338 spin_unlock_irqrestore(&current->sighand->siglock, flags);
339}
340
858119e1 341static int collect_signal(int sig, struct sigpending *list, siginfo_t *info)
1da177e4
LT
342{
343 struct sigqueue *q, *first = NULL;
344 int still_pending = 0;
345
346 if (unlikely(!sigismember(&list->signal, sig)))
347 return 0;
348
349 /*
350 * Collect the siginfo appropriate to this signal. Check if
351 * there is another siginfo for the same signal.
352 */
353 list_for_each_entry(q, &list->list, list) {
354 if (q->info.si_signo == sig) {
355 if (first) {
356 still_pending = 1;
357 break;
358 }
359 first = q;
360 }
361 }
362 if (first) {
363 list_del_init(&first->list);
364 copy_siginfo(info, &first->info);
365 __sigqueue_free(first);
366 if (!still_pending)
367 sigdelset(&list->signal, sig);
368 } else {
369
370 /* Ok, it wasn't in the queue. This must be
371 a fast-pathed signal or we must have been
372 out of queue space. So zero out the info.
373 */
374 sigdelset(&list->signal, sig);
375 info->si_signo = sig;
376 info->si_errno = 0;
377 info->si_code = 0;
378 info->si_pid = 0;
379 info->si_uid = 0;
380 }
381 return 1;
382}
383
384static int __dequeue_signal(struct sigpending *pending, sigset_t *mask,
385 siginfo_t *info)
386{
27d91e07 387 int sig = next_signal(pending, mask);
1da177e4 388
1da177e4
LT
389 if (sig) {
390 if (current->notifier) {
391 if (sigismember(current->notifier_mask, sig)) {
392 if (!(current->notifier)(current->notifier_data)) {
393 clear_thread_flag(TIF_SIGPENDING);
394 return 0;
395 }
396 }
397 }
398
399 if (!collect_signal(sig, pending, info))
400 sig = 0;
1da177e4 401 }
1da177e4
LT
402
403 return sig;
404}
405
406/*
407 * Dequeue a signal and return the element to the caller, which is
408 * expected to free it.
409 *
410 * All callers have to hold the siglock.
411 */
412int dequeue_signal(struct task_struct *tsk, sigset_t *mask, siginfo_t *info)
413{
c5363d03 414 int signr;
caec4e8d
BH
415
416 /* We only dequeue private signals from ourselves, we don't let
417 * signalfd steal them
418 */
b8fceee1 419 signr = __dequeue_signal(&tsk->pending, mask, info);
8bfd9a7a 420 if (!signr) {
1da177e4
LT
421 signr = __dequeue_signal(&tsk->signal->shared_pending,
422 mask, info);
8bfd9a7a
TG
423 /*
424 * itimer signal ?
425 *
426 * itimers are process shared and we restart periodic
427 * itimers in the signal delivery path to prevent DoS
428 * attacks in the high resolution timer case. This is
429 * compliant with the old way of self restarting
430 * itimers, as the SIGALRM is a legacy signal and only
431 * queued once. Changing the restart behaviour to
432 * restart the timer in the signal dequeue path is
433 * reducing the timer noise on heavy loaded !highres
434 * systems too.
435 */
436 if (unlikely(signr == SIGALRM)) {
437 struct hrtimer *tmr = &tsk->signal->real_timer;
438
439 if (!hrtimer_is_queued(tmr) &&
440 tsk->signal->it_real_incr.tv64 != 0) {
441 hrtimer_forward(tmr, tmr->base->get_time(),
442 tsk->signal->it_real_incr);
443 hrtimer_restart(tmr);
444 }
445 }
446 }
c5363d03 447
b8fceee1 448 recalc_sigpending();
c5363d03
PE
449 if (!signr)
450 return 0;
451
452 if (unlikely(sig_kernel_stop(signr))) {
8bfd9a7a
TG
453 /*
454 * Set a marker that we have dequeued a stop signal. Our
455 * caller might release the siglock and then the pending
456 * stop signal it is about to process is no longer in the
457 * pending bitmasks, but must still be cleared by a SIGCONT
458 * (and overruled by a SIGKILL). So those cases clear this
459 * shared flag after we've set it. Note that this flag may
460 * remain set after the signal we return is ignored or
461 * handled. That doesn't matter because its only purpose
462 * is to alert stop-signal processing code when another
463 * processor has come along and cleared the flag.
464 */
465 if (!(tsk->signal->flags & SIGNAL_GROUP_EXIT))
466 tsk->signal->flags |= SIGNAL_STOP_DEQUEUED;
467 }
c5363d03 468 if ((info->si_code & __SI_MASK) == __SI_TIMER && info->si_sys_private) {
1da177e4
LT
469 /*
470 * Release the siglock to ensure proper locking order
471 * of timer locks outside of siglocks. Note, we leave
472 * irqs disabled here, since the posix-timers code is
473 * about to disable them again anyway.
474 */
475 spin_unlock(&tsk->sighand->siglock);
476 do_schedule_next_timer(info);
477 spin_lock(&tsk->sighand->siglock);
478 }
479 return signr;
480}
481
482/*
483 * Tell a process that it has a new active signal..
484 *
485 * NOTE! we rely on the previous spin_lock to
486 * lock interrupts for us! We can only be called with
487 * "siglock" held, and the local interrupt must
488 * have been disabled when that got acquired!
489 *
490 * No need to set need_resched since signal event passing
491 * goes through ->blocked
492 */
493void signal_wake_up(struct task_struct *t, int resume)
494{
495 unsigned int mask;
496
497 set_tsk_thread_flag(t, TIF_SIGPENDING);
498
499 /*
f021a3c2
MW
500 * For SIGKILL, we want to wake it up in the stopped/traced/killable
501 * case. We don't check t->state here because there is a race with it
1da177e4
LT
502 * executing another processor and just now entering stopped state.
503 * By using wake_up_state, we ensure the process will wake up and
504 * handle its death signal.
505 */
506 mask = TASK_INTERRUPTIBLE;
507 if (resume)
f021a3c2 508 mask |= TASK_WAKEKILL;
1da177e4
LT
509 if (!wake_up_state(t, mask))
510 kick_process(t);
511}
512
71fabd5e
GA
513/*
514 * Remove signals in mask from the pending set and queue.
515 * Returns 1 if any signals were found.
516 *
517 * All callers must be holding the siglock.
518 *
519 * This version takes a sigset mask and looks at all signals,
520 * not just those in the first mask word.
521 */
522static int rm_from_queue_full(sigset_t *mask, struct sigpending *s)
523{
524 struct sigqueue *q, *n;
525 sigset_t m;
526
527 sigandsets(&m, mask, &s->signal);
528 if (sigisemptyset(&m))
529 return 0;
530
531 signandsets(&s->signal, &s->signal, mask);
532 list_for_each_entry_safe(q, n, &s->list, list) {
533 if (sigismember(mask, q->info.si_signo)) {
534 list_del_init(&q->list);
535 __sigqueue_free(q);
536 }
537 }
538 return 1;
539}
1da177e4
LT
540/*
541 * Remove signals in mask from the pending set and queue.
542 * Returns 1 if any signals were found.
543 *
544 * All callers must be holding the siglock.
545 */
546static int rm_from_queue(unsigned long mask, struct sigpending *s)
547{
548 struct sigqueue *q, *n;
549
550 if (!sigtestsetmask(&s->signal, mask))
551 return 0;
552
553 sigdelsetmask(&s->signal, mask);
554 list_for_each_entry_safe(q, n, &s->list, list) {
555 if (q->info.si_signo < SIGRTMIN &&
556 (mask & sigmask(q->info.si_signo))) {
557 list_del_init(&q->list);
558 __sigqueue_free(q);
559 }
560 }
561 return 1;
562}
563
564/*
565 * Bad permissions for sending the signal
566 */
567static int check_kill_permission(int sig, struct siginfo *info,
568 struct task_struct *t)
569{
2e2ba22e 570 struct pid *sid;
3b5e9e53
ON
571 int error;
572
7ed20e1a 573 if (!valid_signal(sig))
3b5e9e53
ON
574 return -EINVAL;
575
576 if (info != SEND_SIG_NOINFO && (is_si_special(info) || SI_FROMKERNEL(info)))
577 return 0;
e54dc243 578
3b5e9e53
ON
579 error = audit_signal_info(sig, t); /* Let audit system see the signal */
580 if (error)
1da177e4 581 return error;
3b5e9e53 582
2e2ba22e
ON
583 if ((current->euid ^ t->suid) && (current->euid ^ t->uid) &&
584 (current->uid ^ t->suid) && (current->uid ^ t->uid) &&
585 !capable(CAP_KILL)) {
586 switch (sig) {
587 case SIGCONT:
2e2ba22e 588 sid = task_session(t);
2e2ba22e
ON
589 /*
590 * We don't return the error if sid == NULL. The
591 * task was unhashed, the caller must notice this.
592 */
593 if (!sid || sid == task_session(current))
594 break;
595 default:
596 return -EPERM;
597 }
598 }
c2f0c7c3 599
e54dc243 600 return security_task_kill(t, info, sig, 0);
1da177e4
LT
601}
602
603/* forward decl */
a1d5e21e 604static void do_notify_parent_cldstop(struct task_struct *tsk, int why);
1da177e4
LT
605
606/*
7e695a5e
ON
607 * Handle magic process-wide effects of stop/continue signals. Unlike
608 * the signal actions, these happen immediately at signal-generation
1da177e4
LT
609 * time regardless of blocking, ignoring, or handling. This does the
610 * actual continuing for SIGCONT, but not the actual stopping for stop
7e695a5e
ON
611 * signals. The process stop is done as a signal action for SIG_DFL.
612 *
613 * Returns true if the signal should be actually delivered, otherwise
614 * it should be dropped.
1da177e4 615 */
7e695a5e 616static int prepare_signal(int sig, struct task_struct *p)
1da177e4 617{
ad16a460 618 struct signal_struct *signal = p->signal;
1da177e4
LT
619 struct task_struct *t;
620
7e695a5e 621 if (unlikely(signal->flags & SIGNAL_GROUP_EXIT)) {
1da177e4 622 /*
7e695a5e 623 * The process is in the middle of dying, nothing to do.
1da177e4 624 */
7e695a5e 625 } else if (sig_kernel_stop(sig)) {
1da177e4
LT
626 /*
627 * This is a stop signal. Remove SIGCONT from all queues.
628 */
ad16a460 629 rm_from_queue(sigmask(SIGCONT), &signal->shared_pending);
1da177e4
LT
630 t = p;
631 do {
632 rm_from_queue(sigmask(SIGCONT), &t->pending);
ad16a460 633 } while_each_thread(p, t);
1da177e4 634 } else if (sig == SIGCONT) {
fc321d2e 635 unsigned int why;
1da177e4
LT
636 /*
637 * Remove all stop signals from all queues,
638 * and wake all threads.
639 */
ad16a460 640 rm_from_queue(SIG_KERNEL_STOP_MASK, &signal->shared_pending);
1da177e4
LT
641 t = p;
642 do {
643 unsigned int state;
644 rm_from_queue(SIG_KERNEL_STOP_MASK, &t->pending);
1da177e4
LT
645 /*
646 * If there is a handler for SIGCONT, we must make
647 * sure that no thread returns to user mode before
648 * we post the signal, in case it was the only
649 * thread eligible to run the signal handler--then
650 * it must not do anything between resuming and
651 * running the handler. With the TIF_SIGPENDING
652 * flag set, the thread will pause and acquire the
653 * siglock that we hold now and until we've queued
fc321d2e 654 * the pending signal.
1da177e4
LT
655 *
656 * Wake up the stopped thread _after_ setting
657 * TIF_SIGPENDING
658 */
f021a3c2 659 state = __TASK_STOPPED;
1da177e4
LT
660 if (sig_user_defined(t, SIGCONT) && !sigismember(&t->blocked, SIGCONT)) {
661 set_tsk_thread_flag(t, TIF_SIGPENDING);
662 state |= TASK_INTERRUPTIBLE;
663 }
664 wake_up_state(t, state);
ad16a460 665 } while_each_thread(p, t);
1da177e4 666
fc321d2e
ON
667 /*
668 * Notify the parent with CLD_CONTINUED if we were stopped.
669 *
670 * If we were in the middle of a group stop, we pretend it
671 * was already finished, and then continued. Since SIGCHLD
672 * doesn't queue we report only CLD_STOPPED, as if the next
673 * CLD_CONTINUED was dropped.
674 */
675 why = 0;
ad16a460 676 if (signal->flags & SIGNAL_STOP_STOPPED)
fc321d2e 677 why |= SIGNAL_CLD_CONTINUED;
ad16a460 678 else if (signal->group_stop_count)
fc321d2e
ON
679 why |= SIGNAL_CLD_STOPPED;
680
681 if (why) {
021e1ae3
ON
682 /*
683 * The first thread which returns from finish_stop()
684 * will take ->siglock, notice SIGNAL_CLD_MASK, and
685 * notify its parent. See get_signal_to_deliver().
686 */
ad16a460
ON
687 signal->flags = why | SIGNAL_STOP_CONTINUED;
688 signal->group_stop_count = 0;
689 signal->group_exit_code = 0;
1da177e4
LT
690 } else {
691 /*
692 * We are not stopped, but there could be a stop
693 * signal in the middle of being processed after
694 * being removed from the queue. Clear that too.
695 */
ad16a460 696 signal->flags &= ~SIGNAL_STOP_DEQUEUED;
1da177e4 697 }
1da177e4 698 }
7e695a5e
ON
699
700 return !sig_ignored(p, sig);
1da177e4
LT
701}
702
71f11dc0
ON
703/*
704 * Test if P wants to take SIG. After we've checked all threads with this,
705 * it's equivalent to finding no threads not blocking SIG. Any threads not
706 * blocking SIG were ruled out because they are not running and already
707 * have pending signals. Such threads will dequeue from the shared queue
708 * as soon as they're available, so putting the signal on the shared queue
709 * will be equivalent to sending it to one such thread.
710 */
711static inline int wants_signal(int sig, struct task_struct *p)
712{
713 if (sigismember(&p->blocked, sig))
714 return 0;
715 if (p->flags & PF_EXITING)
716 return 0;
717 if (sig == SIGKILL)
718 return 1;
719 if (task_is_stopped_or_traced(p))
720 return 0;
721 return task_curr(p) || !signal_pending(p);
722}
723
5fcd835b 724static void complete_signal(int sig, struct task_struct *p, int group)
71f11dc0
ON
725{
726 struct signal_struct *signal = p->signal;
727 struct task_struct *t;
728
729 /*
730 * Now find a thread we can wake up to take the signal off the queue.
731 *
732 * If the main thread wants the signal, it gets first crack.
733 * Probably the least surprising to the average bear.
734 */
735 if (wants_signal(sig, p))
736 t = p;
5fcd835b 737 else if (!group || thread_group_empty(p))
71f11dc0
ON
738 /*
739 * There is just one thread and it does not need to be woken.
740 * It will dequeue unblocked signals before it runs again.
741 */
742 return;
743 else {
744 /*
745 * Otherwise try to find a suitable thread.
746 */
747 t = signal->curr_target;
748 while (!wants_signal(sig, t)) {
749 t = next_thread(t);
750 if (t == signal->curr_target)
751 /*
752 * No thread needs to be woken.
753 * Any eligible threads will see
754 * the signal in the queue soon.
755 */
756 return;
757 }
758 signal->curr_target = t;
759 }
760
761 /*
762 * Found a killable thread. If the signal will be fatal,
763 * then start taking the whole group down immediately.
764 */
fae5fa44
ON
765 if (sig_fatal(p, sig) &&
766 !(signal->flags & (SIGNAL_UNKILLABLE | SIGNAL_GROUP_EXIT)) &&
71f11dc0
ON
767 !sigismember(&t->real_blocked, sig) &&
768 (sig == SIGKILL || !(t->ptrace & PT_PTRACED))) {
769 /*
770 * This signal will be fatal to the whole group.
771 */
772 if (!sig_kernel_coredump(sig)) {
773 /*
774 * Start a group exit and wake everybody up.
775 * This way we don't have other threads
776 * running and doing things after a slower
777 * thread has the fatal signal pending.
778 */
779 signal->flags = SIGNAL_GROUP_EXIT;
780 signal->group_exit_code = sig;
781 signal->group_stop_count = 0;
782 t = p;
783 do {
784 sigaddset(&t->pending.signal, SIGKILL);
785 signal_wake_up(t, 1);
786 } while_each_thread(p, t);
787 return;
788 }
789 }
790
791 /*
792 * The signal is already in the shared-pending queue.
793 * Tell the chosen thread to wake up and dequeue it.
794 */
795 signal_wake_up(t, sig == SIGKILL);
796 return;
797}
798
af7fff9c
PE
799static inline int legacy_queue(struct sigpending *signals, int sig)
800{
801 return (sig < SIGRTMIN) && sigismember(&signals->signal, sig);
802}
803
1da177e4 804static int send_signal(int sig, struct siginfo *info, struct task_struct *t,
2ca3515a 805 int group)
1da177e4 806{
2ca3515a 807 struct sigpending *pending;
6e65acba 808 struct sigqueue *q;
1da177e4 809
6e65acba 810 assert_spin_locked(&t->sighand->siglock);
7e695a5e
ON
811 if (!prepare_signal(sig, t))
812 return 0;
2ca3515a
ON
813
814 pending = group ? &t->signal->shared_pending : &t->pending;
2acb024d
PE
815 /*
816 * Short-circuit ignored signals and support queuing
817 * exactly one non-rt signal, so that we can get more
818 * detailed information about the cause of the signal.
819 */
7e695a5e 820 if (legacy_queue(pending, sig))
2acb024d 821 return 0;
1da177e4
LT
822 /*
823 * fast-pathed signals for kernel-internal things like SIGSTOP
824 * or SIGKILL.
825 */
b67a1b9e 826 if (info == SEND_SIG_FORCED)
1da177e4
LT
827 goto out_set;
828
829 /* Real-time signals must be queued if sent by sigqueue, or
830 some other real-time mechanism. It is implementation
831 defined whether kill() does so. We attempt to do so, on
832 the principle of least surprise, but since kill is not
833 allowed to fail with EAGAIN when low on memory we just
834 make sure at least one signal gets delivered and don't
835 pass on the info struct. */
836
837 q = __sigqueue_alloc(t, GFP_ATOMIC, (sig < SIGRTMIN &&
621d3121 838 (is_si_special(info) ||
1da177e4
LT
839 info->si_code >= 0)));
840 if (q) {
2ca3515a 841 list_add_tail(&q->list, &pending->list);
1da177e4 842 switch ((unsigned long) info) {
b67a1b9e 843 case (unsigned long) SEND_SIG_NOINFO:
1da177e4
LT
844 q->info.si_signo = sig;
845 q->info.si_errno = 0;
846 q->info.si_code = SI_USER;
b488893a 847 q->info.si_pid = task_pid_vnr(current);
1da177e4
LT
848 q->info.si_uid = current->uid;
849 break;
b67a1b9e 850 case (unsigned long) SEND_SIG_PRIV:
1da177e4
LT
851 q->info.si_signo = sig;
852 q->info.si_errno = 0;
853 q->info.si_code = SI_KERNEL;
854 q->info.si_pid = 0;
855 q->info.si_uid = 0;
856 break;
857 default:
858 copy_siginfo(&q->info, info);
859 break;
860 }
621d3121
ON
861 } else if (!is_si_special(info)) {
862 if (sig >= SIGRTMIN && info->si_code != SI_USER)
1da177e4
LT
863 /*
864 * Queue overflow, abort. We may abort if the signal was rt
865 * and sent by user using something other than kill().
866 */
867 return -EAGAIN;
1da177e4
LT
868 }
869
870out_set:
53c30337 871 signalfd_notify(t, sig);
2ca3515a 872 sigaddset(&pending->signal, sig);
4cd4b6d4
PE
873 complete_signal(sig, t, group);
874 return 0;
1da177e4
LT
875}
876
45807a1d
IM
877int print_fatal_signals;
878
879static void print_fatal_signal(struct pt_regs *regs, int signr)
880{
881 printk("%s/%d: potentially unexpected fatal signal %d.\n",
ba25f9dc 882 current->comm, task_pid_nr(current), signr);
45807a1d 883
ca5cd877 884#if defined(__i386__) && !defined(__arch_um__)
65ea5b03 885 printk("code at %08lx: ", regs->ip);
45807a1d
IM
886 {
887 int i;
888 for (i = 0; i < 16; i++) {
889 unsigned char insn;
890
65ea5b03 891 __get_user(insn, (unsigned char *)(regs->ip + i));
45807a1d
IM
892 printk("%02x ", insn);
893 }
894 }
895#endif
896 printk("\n");
897 show_regs(regs);
898}
899
900static int __init setup_print_fatal_signals(char *str)
901{
902 get_option (&str, &print_fatal_signals);
903
904 return 1;
905}
906
907__setup("print-fatal-signals=", setup_print_fatal_signals);
1da177e4 908
4cd4b6d4
PE
909int
910__group_send_sig_info(int sig, struct siginfo *info, struct task_struct *p)
911{
912 return send_signal(sig, info, p, 1);
913}
914
1da177e4
LT
915static int
916specific_send_sig_info(int sig, struct siginfo *info, struct task_struct *t)
917{
4cd4b6d4 918 return send_signal(sig, info, t, 0);
1da177e4
LT
919}
920
921/*
922 * Force a signal that the process can't ignore: if necessary
923 * we unblock the signal and change any SIG_IGN to SIG_DFL.
ae74c3b6
LT
924 *
925 * Note: If we unblock the signal, we always reset it to SIG_DFL,
926 * since we do not want to have a signal handler that was blocked
927 * be invoked when user space had explicitly blocked it.
928 *
80fe728d
ON
929 * We don't want to have recursive SIGSEGV's etc, for example,
930 * that is why we also clear SIGNAL_UNKILLABLE.
1da177e4 931 */
1da177e4
LT
932int
933force_sig_info(int sig, struct siginfo *info, struct task_struct *t)
934{
935 unsigned long int flags;
ae74c3b6
LT
936 int ret, blocked, ignored;
937 struct k_sigaction *action;
1da177e4
LT
938
939 spin_lock_irqsave(&t->sighand->siglock, flags);
ae74c3b6
LT
940 action = &t->sighand->action[sig-1];
941 ignored = action->sa.sa_handler == SIG_IGN;
942 blocked = sigismember(&t->blocked, sig);
943 if (blocked || ignored) {
944 action->sa.sa_handler = SIG_DFL;
945 if (blocked) {
946 sigdelset(&t->blocked, sig);
7bb44ade 947 recalc_sigpending_and_wake(t);
ae74c3b6 948 }
1da177e4 949 }
80fe728d
ON
950 if (action->sa.sa_handler == SIG_DFL)
951 t->signal->flags &= ~SIGNAL_UNKILLABLE;
1da177e4
LT
952 ret = specific_send_sig_info(sig, info, t);
953 spin_unlock_irqrestore(&t->sighand->siglock, flags);
954
955 return ret;
956}
957
958void
959force_sig_specific(int sig, struct task_struct *t)
960{
b0423a0d 961 force_sig_info(sig, SEND_SIG_FORCED, t);
1da177e4
LT
962}
963
1da177e4
LT
964/*
965 * Nuke all other threads in the group.
966 */
967void zap_other_threads(struct task_struct *p)
968{
969 struct task_struct *t;
970
1da177e4
LT
971 p->signal->group_stop_count = 0;
972
1da177e4
LT
973 for (t = next_thread(p); t != p; t = next_thread(t)) {
974 /*
975 * Don't bother with already dead threads
976 */
977 if (t->exit_state)
978 continue;
979
30e0fca6 980 /* SIGKILL will be handled before any pending SIGSTOP */
1da177e4 981 sigaddset(&t->pending.signal, SIGKILL);
1da177e4
LT
982 signal_wake_up(t, 1);
983 }
984}
985
b5606c2d 986int __fatal_signal_pending(struct task_struct *tsk)
f776d12d
MW
987{
988 return sigismember(&tsk->pending.signal, SIGKILL);
989}
13f09b95 990EXPORT_SYMBOL(__fatal_signal_pending);
f776d12d 991
f63ee72e
ON
992struct sighand_struct *lock_task_sighand(struct task_struct *tsk, unsigned long *flags)
993{
994 struct sighand_struct *sighand;
995
1406f2d3 996 rcu_read_lock();
f63ee72e
ON
997 for (;;) {
998 sighand = rcu_dereference(tsk->sighand);
999 if (unlikely(sighand == NULL))
1000 break;
1001
1002 spin_lock_irqsave(&sighand->siglock, *flags);
1003 if (likely(sighand == tsk->sighand))
1004 break;
1005 spin_unlock_irqrestore(&sighand->siglock, *flags);
1006 }
1406f2d3 1007 rcu_read_unlock();
f63ee72e
ON
1008
1009 return sighand;
1010}
1011
1da177e4
LT
1012int group_send_sig_info(int sig, struct siginfo *info, struct task_struct *p)
1013{
1014 unsigned long flags;
1015 int ret;
1016
1017 ret = check_kill_permission(sig, info, p);
f63ee72e
ON
1018
1019 if (!ret && sig) {
1020 ret = -ESRCH;
1021 if (lock_task_sighand(p, &flags)) {
1022 ret = __group_send_sig_info(sig, info, p);
1023 unlock_task_sighand(p, &flags);
2d89c929 1024 }
1da177e4
LT
1025 }
1026
1027 return ret;
1028}
1029
1030/*
146a505d 1031 * __kill_pgrp_info() sends a signal to a process group: this is what the tty
1da177e4
LT
1032 * control characters do (^C, ^Z etc)
1033 */
1034
c4b92fc1 1035int __kill_pgrp_info(int sig, struct siginfo *info, struct pid *pgrp)
1da177e4
LT
1036{
1037 struct task_struct *p = NULL;
1038 int retval, success;
1039
1da177e4
LT
1040 success = 0;
1041 retval = -ESRCH;
c4b92fc1 1042 do_each_pid_task(pgrp, PIDTYPE_PGID, p) {
1da177e4
LT
1043 int err = group_send_sig_info(sig, info, p);
1044 success |= !err;
1045 retval = err;
c4b92fc1 1046 } while_each_pid_task(pgrp, PIDTYPE_PGID, p);
1da177e4
LT
1047 return success ? 0 : retval;
1048}
1049
c4b92fc1 1050int kill_pid_info(int sig, struct siginfo *info, struct pid *pid)
1da177e4 1051{
d36174bc 1052 int error = -ESRCH;
1da177e4
LT
1053 struct task_struct *p;
1054
e56d0903 1055 rcu_read_lock();
d36174bc 1056retry:
c4b92fc1 1057 p = pid_task(pid, PIDTYPE_PID);
d36174bc 1058 if (p) {
1da177e4 1059 error = group_send_sig_info(sig, info, p);
d36174bc
ON
1060 if (unlikely(error == -ESRCH))
1061 /*
1062 * The task was unhashed in between, try again.
1063 * If it is dead, pid_task() will return NULL,
1064 * if we race with de_thread() it will find the
1065 * new leader.
1066 */
1067 goto retry;
1068 }
e56d0903 1069 rcu_read_unlock();
6ca25b55 1070
1da177e4
LT
1071 return error;
1072}
1073
c3de4b38
MW
1074int
1075kill_proc_info(int sig, struct siginfo *info, pid_t pid)
c4b92fc1
EB
1076{
1077 int error;
1078 rcu_read_lock();
b488893a 1079 error = kill_pid_info(sig, info, find_vpid(pid));
c4b92fc1
EB
1080 rcu_read_unlock();
1081 return error;
1082}
1083
2425c08b
EB
1084/* like kill_pid_info(), but doesn't use uid/euid of "current" */
1085int kill_pid_info_as_uid(int sig, struct siginfo *info, struct pid *pid,
8f95dc58 1086 uid_t uid, uid_t euid, u32 secid)
46113830
HW
1087{
1088 int ret = -EINVAL;
1089 struct task_struct *p;
1090
1091 if (!valid_signal(sig))
1092 return ret;
1093
1094 read_lock(&tasklist_lock);
2425c08b 1095 p = pid_task(pid, PIDTYPE_PID);
46113830
HW
1096 if (!p) {
1097 ret = -ESRCH;
1098 goto out_unlock;
1099 }
0811af28 1100 if ((info == SEND_SIG_NOINFO || (!is_si_special(info) && SI_FROMUSER(info)))
46113830
HW
1101 && (euid != p->suid) && (euid != p->uid)
1102 && (uid != p->suid) && (uid != p->uid)) {
1103 ret = -EPERM;
1104 goto out_unlock;
1105 }
8f95dc58
DQ
1106 ret = security_task_kill(p, info, sig, secid);
1107 if (ret)
1108 goto out_unlock;
46113830
HW
1109 if (sig && p->sighand) {
1110 unsigned long flags;
1111 spin_lock_irqsave(&p->sighand->siglock, flags);
1112 ret = __group_send_sig_info(sig, info, p);
1113 spin_unlock_irqrestore(&p->sighand->siglock, flags);
1114 }
1115out_unlock:
1116 read_unlock(&tasklist_lock);
1117 return ret;
1118}
2425c08b 1119EXPORT_SYMBOL_GPL(kill_pid_info_as_uid);
1da177e4
LT
1120
1121/*
1122 * kill_something_info() interprets pid in interesting ways just like kill(2).
1123 *
1124 * POSIX specifies that kill(-1,sig) is unspecified, but what we have
1125 * is probably wrong. Should make it like BSD or SYSV.
1126 */
1127
1128static int kill_something_info(int sig, struct siginfo *info, int pid)
1129{
8d42db18 1130 int ret;
d5df763b
PE
1131
1132 if (pid > 0) {
1133 rcu_read_lock();
1134 ret = kill_pid_info(sig, info, find_vpid(pid));
1135 rcu_read_unlock();
1136 return ret;
1137 }
1138
1139 read_lock(&tasklist_lock);
1140 if (pid != -1) {
1141 ret = __kill_pgrp_info(sig, info,
1142 pid ? find_vpid(-pid) : task_pgrp(current));
1143 } else {
1da177e4
LT
1144 int retval = 0, count = 0;
1145 struct task_struct * p;
1146
1da177e4 1147 for_each_process(p) {
bac0abd6 1148 if (p->pid > 1 && !same_thread_group(p, current)) {
1da177e4
LT
1149 int err = group_send_sig_info(sig, info, p);
1150 ++count;
1151 if (err != -EPERM)
1152 retval = err;
1153 }
1154 }
8d42db18 1155 ret = count ? retval : -ESRCH;
1da177e4 1156 }
d5df763b
PE
1157 read_unlock(&tasklist_lock);
1158
8d42db18 1159 return ret;
1da177e4
LT
1160}
1161
1162/*
1163 * These are for backward compatibility with the rest of the kernel source.
1164 */
1165
1166/*
08d2c30c 1167 * The caller must ensure the task can't exit.
1da177e4
LT
1168 */
1169int
1170send_sig_info(int sig, struct siginfo *info, struct task_struct *p)
1171{
1172 int ret;
1173 unsigned long flags;
1174
1175 /*
1176 * Make sure legacy kernel users don't send in bad values
1177 * (normal paths check this in check_kill_permission).
1178 */
7ed20e1a 1179 if (!valid_signal(sig))
1da177e4
LT
1180 return -EINVAL;
1181
1da177e4
LT
1182 spin_lock_irqsave(&p->sighand->siglock, flags);
1183 ret = specific_send_sig_info(sig, info, p);
1184 spin_unlock_irqrestore(&p->sighand->siglock, flags);
1da177e4
LT
1185 return ret;
1186}
1187
b67a1b9e
ON
1188#define __si_special(priv) \
1189 ((priv) ? SEND_SIG_PRIV : SEND_SIG_NOINFO)
1190
1da177e4
LT
1191int
1192send_sig(int sig, struct task_struct *p, int priv)
1193{
b67a1b9e 1194 return send_sig_info(sig, __si_special(priv), p);
1da177e4
LT
1195}
1196
1da177e4
LT
1197void
1198force_sig(int sig, struct task_struct *p)
1199{
b67a1b9e 1200 force_sig_info(sig, SEND_SIG_PRIV, p);
1da177e4
LT
1201}
1202
1203/*
1204 * When things go south during signal handling, we
1205 * will force a SIGSEGV. And if the signal that caused
1206 * the problem was already a SIGSEGV, we'll want to
1207 * make sure we don't even try to deliver the signal..
1208 */
1209int
1210force_sigsegv(int sig, struct task_struct *p)
1211{
1212 if (sig == SIGSEGV) {
1213 unsigned long flags;
1214 spin_lock_irqsave(&p->sighand->siglock, flags);
1215 p->sighand->action[sig - 1].sa.sa_handler = SIG_DFL;
1216 spin_unlock_irqrestore(&p->sighand->siglock, flags);
1217 }
1218 force_sig(SIGSEGV, p);
1219 return 0;
1220}
1221
c4b92fc1
EB
1222int kill_pgrp(struct pid *pid, int sig, int priv)
1223{
146a505d
PE
1224 int ret;
1225
1226 read_lock(&tasklist_lock);
1227 ret = __kill_pgrp_info(sig, __si_special(priv), pid);
1228 read_unlock(&tasklist_lock);
1229
1230 return ret;
c4b92fc1
EB
1231}
1232EXPORT_SYMBOL(kill_pgrp);
1233
1234int kill_pid(struct pid *pid, int sig, int priv)
1235{
1236 return kill_pid_info(sig, __si_special(priv), pid);
1237}
1238EXPORT_SYMBOL(kill_pid);
1239
1da177e4
LT
1240int
1241kill_proc(pid_t pid, int sig, int priv)
1242{
b488893a
PE
1243 int ret;
1244
1245 rcu_read_lock();
1246 ret = kill_pid_info(sig, __si_special(priv), find_pid(pid));
1247 rcu_read_unlock();
1248 return ret;
1da177e4
LT
1249}
1250
1251/*
1252 * These functions support sending signals using preallocated sigqueue
1253 * structures. This is needed "because realtime applications cannot
1254 * afford to lose notifications of asynchronous events, like timer
1255 * expirations or I/O completions". In the case of Posix Timers
1256 * we allocate the sigqueue structure from the timer_create. If this
1257 * allocation fails we are able to report the failure to the application
1258 * with an EAGAIN error.
1259 */
1260
1261struct sigqueue *sigqueue_alloc(void)
1262{
1263 struct sigqueue *q;
1264
1265 if ((q = __sigqueue_alloc(current, GFP_KERNEL, 0)))
1266 q->flags |= SIGQUEUE_PREALLOC;
1267 return(q);
1268}
1269
1270void sigqueue_free(struct sigqueue *q)
1271{
1272 unsigned long flags;
60187d27
ON
1273 spinlock_t *lock = &current->sighand->siglock;
1274
1da177e4
LT
1275 BUG_ON(!(q->flags & SIGQUEUE_PREALLOC));
1276 /*
c8e85b4f
ON
1277 * We must hold ->siglock while testing q->list
1278 * to serialize with collect_signal() or with
da7978b0 1279 * __exit_signal()->flush_sigqueue().
1da177e4 1280 */
60187d27 1281 spin_lock_irqsave(lock, flags);
c8e85b4f
ON
1282 q->flags &= ~SIGQUEUE_PREALLOC;
1283 /*
1284 * If it is queued it will be freed when dequeued,
1285 * like the "regular" sigqueue.
1286 */
60187d27 1287 if (!list_empty(&q->list))
c8e85b4f 1288 q = NULL;
60187d27
ON
1289 spin_unlock_irqrestore(lock, flags);
1290
c8e85b4f
ON
1291 if (q)
1292 __sigqueue_free(q);
1da177e4
LT
1293}
1294
ac5c2153 1295int send_sigqueue(struct sigqueue *q, struct task_struct *t, int group)
9e3bd6c3 1296{
e62e6650 1297 int sig = q->info.si_signo;
2ca3515a 1298 struct sigpending *pending;
e62e6650
ON
1299 unsigned long flags;
1300 int ret;
2ca3515a 1301
4cd4b6d4 1302 BUG_ON(!(q->flags & SIGQUEUE_PREALLOC));
e62e6650
ON
1303
1304 ret = -1;
1305 if (!likely(lock_task_sighand(t, &flags)))
1306 goto ret;
1307
7e695a5e
ON
1308 ret = 1; /* the signal is ignored */
1309 if (!prepare_signal(sig, t))
e62e6650
ON
1310 goto out;
1311
1312 ret = 0;
9e3bd6c3
PE
1313 if (unlikely(!list_empty(&q->list))) {
1314 /*
1315 * If an SI_TIMER entry is already queue just increment
1316 * the overrun count.
1317 */
9e3bd6c3
PE
1318 BUG_ON(q->info.si_code != SI_TIMER);
1319 q->info.si_overrun++;
e62e6650 1320 goto out;
9e3bd6c3
PE
1321 }
1322
9e3bd6c3 1323 signalfd_notify(t, sig);
2ca3515a 1324 pending = group ? &t->signal->shared_pending : &t->pending;
9e3bd6c3
PE
1325 list_add_tail(&q->list, &pending->list);
1326 sigaddset(&pending->signal, sig);
4cd4b6d4 1327 complete_signal(sig, t, group);
e62e6650
ON
1328out:
1329 unlock_task_sighand(t, &flags);
1330ret:
1331 return ret;
9e3bd6c3
PE
1332}
1333
1da177e4
LT
1334/*
1335 * Wake up any threads in the parent blocked in wait* syscalls.
1336 */
1337static inline void __wake_up_parent(struct task_struct *p,
1338 struct task_struct *parent)
1339{
1340 wake_up_interruptible_sync(&parent->signal->wait_chldexit);
1341}
1342
1343/*
1344 * Let a parent know about the death of a child.
1345 * For a stopped/continued status change, use do_notify_parent_cldstop instead.
1346 */
1347
1348void do_notify_parent(struct task_struct *tsk, int sig)
1349{
1350 struct siginfo info;
1351 unsigned long flags;
1352 struct sighand_struct *psig;
1353
1354 BUG_ON(sig == -1);
1355
1356 /* do_notify_parent_cldstop should have been called instead. */
e1abb39c 1357 BUG_ON(task_is_stopped_or_traced(tsk));
1da177e4
LT
1358
1359 BUG_ON(!tsk->ptrace &&
1360 (tsk->group_leader != tsk || !thread_group_empty(tsk)));
1361
1362 info.si_signo = sig;
1363 info.si_errno = 0;
b488893a
PE
1364 /*
1365 * we are under tasklist_lock here so our parent is tied to
1366 * us and cannot exit and release its namespace.
1367 *
1368 * the only it can is to switch its nsproxy with sys_unshare,
1369 * bu uncharing pid namespaces is not allowed, so we'll always
1370 * see relevant namespace
1371 *
1372 * write_lock() currently calls preempt_disable() which is the
1373 * same as rcu_read_lock(), but according to Oleg, this is not
1374 * correct to rely on this
1375 */
1376 rcu_read_lock();
1377 info.si_pid = task_pid_nr_ns(tsk, tsk->parent->nsproxy->pid_ns);
1378 rcu_read_unlock();
1379
1da177e4
LT
1380 info.si_uid = tsk->uid;
1381
1382 /* FIXME: find out whether or not this is supposed to be c*time. */
1383 info.si_utime = cputime_to_jiffies(cputime_add(tsk->utime,
1384 tsk->signal->utime));
1385 info.si_stime = cputime_to_jiffies(cputime_add(tsk->stime,
1386 tsk->signal->stime));
1387
1388 info.si_status = tsk->exit_code & 0x7f;
1389 if (tsk->exit_code & 0x80)
1390 info.si_code = CLD_DUMPED;
1391 else if (tsk->exit_code & 0x7f)
1392 info.si_code = CLD_KILLED;
1393 else {
1394 info.si_code = CLD_EXITED;
1395 info.si_status = tsk->exit_code >> 8;
1396 }
1397
1398 psig = tsk->parent->sighand;
1399 spin_lock_irqsave(&psig->siglock, flags);
7ed0175a 1400 if (!tsk->ptrace && sig == SIGCHLD &&
1da177e4
LT
1401 (psig->action[SIGCHLD-1].sa.sa_handler == SIG_IGN ||
1402 (psig->action[SIGCHLD-1].sa.sa_flags & SA_NOCLDWAIT))) {
1403 /*
1404 * We are exiting and our parent doesn't care. POSIX.1
1405 * defines special semantics for setting SIGCHLD to SIG_IGN
1406 * or setting the SA_NOCLDWAIT flag: we should be reaped
1407 * automatically and not left for our parent's wait4 call.
1408 * Rather than having the parent do it as a magic kind of
1409 * signal handler, we just set this to tell do_exit that we
1410 * can be cleaned up without becoming a zombie. Note that
1411 * we still call __wake_up_parent in this case, because a
1412 * blocked sys_wait4 might now return -ECHILD.
1413 *
1414 * Whether we send SIGCHLD or not for SA_NOCLDWAIT
1415 * is implementation-defined: we do (if you don't want
1416 * it, just use SIG_IGN instead).
1417 */
1418 tsk->exit_signal = -1;
1419 if (psig->action[SIGCHLD-1].sa.sa_handler == SIG_IGN)
1420 sig = 0;
1421 }
7ed20e1a 1422 if (valid_signal(sig) && sig > 0)
1da177e4
LT
1423 __group_send_sig_info(sig, &info, tsk->parent);
1424 __wake_up_parent(tsk, tsk->parent);
1425 spin_unlock_irqrestore(&psig->siglock, flags);
1426}
1427
a1d5e21e 1428static void do_notify_parent_cldstop(struct task_struct *tsk, int why)
1da177e4
LT
1429{
1430 struct siginfo info;
1431 unsigned long flags;
bc505a47 1432 struct task_struct *parent;
1da177e4
LT
1433 struct sighand_struct *sighand;
1434
a1d5e21e 1435 if (tsk->ptrace & PT_PTRACED)
bc505a47
ON
1436 parent = tsk->parent;
1437 else {
1438 tsk = tsk->group_leader;
1439 parent = tsk->real_parent;
1440 }
1441
1da177e4
LT
1442 info.si_signo = SIGCHLD;
1443 info.si_errno = 0;
b488893a
PE
1444 /*
1445 * see comment in do_notify_parent() abot the following 3 lines
1446 */
1447 rcu_read_lock();
1448 info.si_pid = task_pid_nr_ns(tsk, tsk->parent->nsproxy->pid_ns);
1449 rcu_read_unlock();
1450
1da177e4
LT
1451 info.si_uid = tsk->uid;
1452
1453 /* FIXME: find out whether or not this is supposed to be c*time. */
1454 info.si_utime = cputime_to_jiffies(tsk->utime);
1455 info.si_stime = cputime_to_jiffies(tsk->stime);
1456
1457 info.si_code = why;
1458 switch (why) {
1459 case CLD_CONTINUED:
1460 info.si_status = SIGCONT;
1461 break;
1462 case CLD_STOPPED:
1463 info.si_status = tsk->signal->group_exit_code & 0x7f;
1464 break;
1465 case CLD_TRAPPED:
1466 info.si_status = tsk->exit_code & 0x7f;
1467 break;
1468 default:
1469 BUG();
1470 }
1471
1472 sighand = parent->sighand;
1473 spin_lock_irqsave(&sighand->siglock, flags);
1474 if (sighand->action[SIGCHLD-1].sa.sa_handler != SIG_IGN &&
1475 !(sighand->action[SIGCHLD-1].sa.sa_flags & SA_NOCLDSTOP))
1476 __group_send_sig_info(SIGCHLD, &info, parent);
1477 /*
1478 * Even if SIGCHLD is not generated, we must wake up wait4 calls.
1479 */
1480 __wake_up_parent(tsk, parent);
1481 spin_unlock_irqrestore(&sighand->siglock, flags);
1482}
1483
d5f70c00
ON
1484static inline int may_ptrace_stop(void)
1485{
1486 if (!likely(current->ptrace & PT_PTRACED))
1487 return 0;
d5f70c00
ON
1488 /*
1489 * Are we in the middle of do_coredump?
1490 * If so and our tracer is also part of the coredump stopping
1491 * is a deadlock situation, and pointless because our tracer
1492 * is dead so don't allow us to stop.
1493 * If SIGKILL was already sent before the caller unlocked
1494 * ->siglock we must see ->core_waiters != 0. Otherwise it
1495 * is safe to enter schedule().
1496 */
1497 if (unlikely(current->mm->core_waiters) &&
1498 unlikely(current->mm == current->parent->mm))
1499 return 0;
1500
1501 return 1;
1502}
1503
1a669c2f
RM
1504/*
1505 * Return nonzero if there is a SIGKILL that should be waking us up.
1506 * Called with the siglock held.
1507 */
1508static int sigkill_pending(struct task_struct *tsk)
1509{
1510 return ((sigismember(&tsk->pending.signal, SIGKILL) ||
1511 sigismember(&tsk->signal->shared_pending.signal, SIGKILL)) &&
1512 !unlikely(sigismember(&tsk->blocked, SIGKILL)));
1513}
1514
1da177e4
LT
1515/*
1516 * This must be called with current->sighand->siglock held.
1517 *
1518 * This should be the path for all ptrace stops.
1519 * We always set current->last_siginfo while stopped here.
1520 * That makes it a way to test a stopped process for
1521 * being ptrace-stopped vs being job-control-stopped.
1522 *
20686a30
ON
1523 * If we actually decide not to stop at all because the tracer
1524 * is gone, we keep current->exit_code unless clear_code.
1da177e4 1525 */
20686a30 1526static void ptrace_stop(int exit_code, int clear_code, siginfo_t *info)
1da177e4 1527{
1a669c2f
RM
1528 int killed = 0;
1529
1530 if (arch_ptrace_stop_needed(exit_code, info)) {
1531 /*
1532 * The arch code has something special to do before a
1533 * ptrace stop. This is allowed to block, e.g. for faults
1534 * on user stack pages. We can't keep the siglock while
1535 * calling arch_ptrace_stop, so we must release it now.
1536 * To preserve proper semantics, we must do this before
1537 * any signal bookkeeping like checking group_stop_count.
1538 * Meanwhile, a SIGKILL could come in before we retake the
1539 * siglock. That must prevent us from sleeping in TASK_TRACED.
1540 * So after regaining the lock, we must check for SIGKILL.
1541 */
1542 spin_unlock_irq(&current->sighand->siglock);
1543 arch_ptrace_stop(exit_code, info);
1544 spin_lock_irq(&current->sighand->siglock);
1545 killed = sigkill_pending(current);
1546 }
1547
1da177e4
LT
1548 /*
1549 * If there is a group stop in progress,
1550 * we must participate in the bookkeeping.
1551 */
1552 if (current->signal->group_stop_count > 0)
1553 --current->signal->group_stop_count;
1554
1555 current->last_siginfo = info;
1556 current->exit_code = exit_code;
1557
1558 /* Let the debugger run. */
d9ae90ac 1559 __set_current_state(TASK_TRACED);
1da177e4
LT
1560 spin_unlock_irq(&current->sighand->siglock);
1561 read_lock(&tasklist_lock);
1a669c2f 1562 if (!unlikely(killed) && may_ptrace_stop()) {
a1d5e21e 1563 do_notify_parent_cldstop(current, CLD_TRAPPED);
1da177e4
LT
1564 read_unlock(&tasklist_lock);
1565 schedule();
1566 } else {
1567 /*
1568 * By the time we got the lock, our tracer went away.
6405f7f4 1569 * Don't drop the lock yet, another tracer may come.
1da177e4 1570 */
6405f7f4 1571 __set_current_state(TASK_RUNNING);
20686a30
ON
1572 if (clear_code)
1573 current->exit_code = 0;
6405f7f4 1574 read_unlock(&tasklist_lock);
1da177e4
LT
1575 }
1576
13b1c3d4
RM
1577 /*
1578 * While in TASK_TRACED, we were considered "frozen enough".
1579 * Now that we woke up, it's crucial if we're supposed to be
1580 * frozen that we freeze now before running anything substantial.
1581 */
1582 try_to_freeze();
1583
1da177e4
LT
1584 /*
1585 * We are back. Now reacquire the siglock before touching
1586 * last_siginfo, so that we are sure to have synchronized with
1587 * any signal-sending on another CPU that wants to examine it.
1588 */
1589 spin_lock_irq(&current->sighand->siglock);
1590 current->last_siginfo = NULL;
1591
1592 /*
1593 * Queued signals ignored us while we were stopped for tracing.
1594 * So check for any that we should take before resuming user mode.
b74d0deb 1595 * This sets TIF_SIGPENDING, but never clears it.
1da177e4 1596 */
b74d0deb 1597 recalc_sigpending_tsk(current);
1da177e4
LT
1598}
1599
1600void ptrace_notify(int exit_code)
1601{
1602 siginfo_t info;
1603
1604 BUG_ON((exit_code & (0x7f | ~0xffff)) != SIGTRAP);
1605
1606 memset(&info, 0, sizeof info);
1607 info.si_signo = SIGTRAP;
1608 info.si_code = exit_code;
b488893a 1609 info.si_pid = task_pid_vnr(current);
1da177e4
LT
1610 info.si_uid = current->uid;
1611
1612 /* Let the debugger run. */
1613 spin_lock_irq(&current->sighand->siglock);
20686a30 1614 ptrace_stop(exit_code, 1, &info);
1da177e4
LT
1615 spin_unlock_irq(&current->sighand->siglock);
1616}
1617
1da177e4
LT
1618static void
1619finish_stop(int stop_count)
1620{
1621 /*
1622 * If there are no other threads in the group, or if there is
1623 * a group stop in progress and we are the last to stop,
1624 * report to the parent. When ptraced, every thread reports itself.
1625 */
a1d5e21e
ON
1626 if (stop_count == 0 || (current->ptrace & PT_PTRACED)) {
1627 read_lock(&tasklist_lock);
1628 do_notify_parent_cldstop(current, CLD_STOPPED);
1629 read_unlock(&tasklist_lock);
1630 }
bc505a47 1631
3df494a3
RW
1632 do {
1633 schedule();
1634 } while (try_to_freeze());
1da177e4
LT
1635 /*
1636 * Now we don't run again until continued.
1637 */
1638 current->exit_code = 0;
1639}
1640
1641/*
1642 * This performs the stopping for SIGSTOP and other stop signals.
1643 * We have to stop all threads in the thread group.
1644 * Returns nonzero if we've actually stopped and released the siglock.
1645 * Returns zero if we didn't stop and still hold the siglock.
1646 */
a122b341 1647static int do_signal_stop(int signr)
1da177e4
LT
1648{
1649 struct signal_struct *sig = current->signal;
dac27f4a 1650 int stop_count;
1da177e4 1651
1da177e4
LT
1652 if (sig->group_stop_count > 0) {
1653 /*
1654 * There is a group stop in progress. We don't need to
1655 * start another one.
1656 */
1da177e4 1657 stop_count = --sig->group_stop_count;
dac27f4a 1658 } else {
f558b7e4
ON
1659 struct task_struct *t;
1660
fae5fa44
ON
1661 if (unlikely((sig->flags & (SIGNAL_STOP_DEQUEUED | SIGNAL_UNKILLABLE))
1662 != SIGNAL_STOP_DEQUEUED) ||
573cf9ad 1663 unlikely(signal_group_exit(sig)))
f558b7e4 1664 return 0;
1da177e4
LT
1665 /*
1666 * There is no group stop already in progress.
a122b341 1667 * We must initiate one now.
1da177e4 1668 */
a122b341 1669 sig->group_exit_code = signr;
1da177e4 1670
a122b341
ON
1671 stop_count = 0;
1672 for (t = next_thread(current); t != current; t = next_thread(t))
1da177e4 1673 /*
a122b341
ON
1674 * Setting state to TASK_STOPPED for a group
1675 * stop is always done with the siglock held,
1676 * so this check has no races.
1da177e4 1677 */
d12619b5 1678 if (!(t->flags & PF_EXITING) &&
e1abb39c 1679 !task_is_stopped_or_traced(t)) {
a122b341
ON
1680 stop_count++;
1681 signal_wake_up(t, 0);
1682 }
1683 sig->group_stop_count = stop_count;
1da177e4
LT
1684 }
1685
dac27f4a
ON
1686 if (stop_count == 0)
1687 sig->flags = SIGNAL_STOP_STOPPED;
1688 current->exit_code = sig->group_exit_code;
1689 __set_current_state(TASK_STOPPED);
1690
1691 spin_unlock_irq(&current->sighand->siglock);
1da177e4
LT
1692 finish_stop(stop_count);
1693 return 1;
1694}
1695
18c98b65
RM
1696static int ptrace_signal(int signr, siginfo_t *info,
1697 struct pt_regs *regs, void *cookie)
1698{
1699 if (!(current->ptrace & PT_PTRACED))
1700 return signr;
1701
1702 ptrace_signal_deliver(regs, cookie);
1703
1704 /* Let the debugger run. */
1705 ptrace_stop(signr, 0, info);
1706
1707 /* We're back. Did the debugger cancel the sig? */
1708 signr = current->exit_code;
1709 if (signr == 0)
1710 return signr;
1711
1712 current->exit_code = 0;
1713
1714 /* Update the siginfo structure if the signal has
1715 changed. If the debugger wanted something
1716 specific in the siginfo structure then it should
1717 have updated *info via PTRACE_SETSIGINFO. */
1718 if (signr != info->si_signo) {
1719 info->si_signo = signr;
1720 info->si_errno = 0;
1721 info->si_code = SI_USER;
1722 info->si_pid = task_pid_vnr(current->parent);
1723 info->si_uid = current->parent->uid;
1724 }
1725
1726 /* If the (new) signal is now blocked, requeue it. */
1727 if (sigismember(&current->blocked, signr)) {
1728 specific_send_sig_info(signr, info, current);
1729 signr = 0;
1730 }
1731
1732 return signr;
1733}
1734
1da177e4
LT
1735int get_signal_to_deliver(siginfo_t *info, struct k_sigaction *return_ka,
1736 struct pt_regs *regs, void *cookie)
1737{
f6b76d4f
ON
1738 struct sighand_struct *sighand = current->sighand;
1739 struct signal_struct *signal = current->signal;
1740 int signr;
1da177e4 1741
13b1c3d4
RM
1742relock:
1743 /*
1744 * We'll jump back here after any time we were stopped in TASK_STOPPED.
1745 * While in TASK_STOPPED, we were considered "frozen enough".
1746 * Now that we woke up, it's crucial if we're supposed to be
1747 * frozen that we freeze now before running anything substantial.
1748 */
fc558a74
RW
1749 try_to_freeze();
1750
f6b76d4f 1751 spin_lock_irq(&sighand->siglock);
021e1ae3
ON
1752 /*
1753 * Every stopped thread goes here after wakeup. Check to see if
1754 * we should notify the parent, prepare_signal(SIGCONT) encodes
1755 * the CLD_ si_code into SIGNAL_CLD_MASK bits.
1756 */
f6b76d4f
ON
1757 if (unlikely(signal->flags & SIGNAL_CLD_MASK)) {
1758 int why = (signal->flags & SIGNAL_STOP_CONTINUED)
e4420551 1759 ? CLD_CONTINUED : CLD_STOPPED;
f6b76d4f
ON
1760 signal->flags &= ~SIGNAL_CLD_MASK;
1761 spin_unlock_irq(&sighand->siglock);
e4420551
ON
1762
1763 read_lock(&tasklist_lock);
1764 do_notify_parent_cldstop(current->group_leader, why);
1765 read_unlock(&tasklist_lock);
1766 goto relock;
1767 }
1768
1da177e4
LT
1769 for (;;) {
1770 struct k_sigaction *ka;
1771
f6b76d4f 1772 if (unlikely(signal->group_stop_count > 0) &&
f558b7e4 1773 do_signal_stop(0))
1da177e4
LT
1774 goto relock;
1775
f6b76d4f 1776 signr = dequeue_signal(current, &current->blocked, info);
1da177e4
LT
1777 if (!signr)
1778 break; /* will return 0 */
1779
18c98b65
RM
1780 if (signr != SIGKILL) {
1781 signr = ptrace_signal(signr, info, regs, cookie);
1782 if (!signr)
1da177e4 1783 continue;
1da177e4
LT
1784 }
1785
f6b76d4f 1786 ka = &sighand->action[signr-1];
1da177e4
LT
1787 if (ka->sa.sa_handler == SIG_IGN) /* Do nothing. */
1788 continue;
1789 if (ka->sa.sa_handler != SIG_DFL) {
1790 /* Run the handler. */
1791 *return_ka = *ka;
1792
1793 if (ka->sa.sa_flags & SA_ONESHOT)
1794 ka->sa.sa_handler = SIG_DFL;
1795
1796 break; /* will return non-zero "signr" value */
1797 }
1798
1799 /*
1800 * Now we are doing the default action for this signal.
1801 */
1802 if (sig_kernel_ignore(signr)) /* Default is nothing. */
1803 continue;
1804
84d73786 1805 /*
0fbc26a6 1806 * Global init gets no signals it doesn't want.
84d73786 1807 */
fae5fa44
ON
1808 if (unlikely(signal->flags & SIGNAL_UNKILLABLE) &&
1809 !signal_group_exit(signal))
1da177e4
LT
1810 continue;
1811
1812 if (sig_kernel_stop(signr)) {
1813 /*
1814 * The default action is to stop all threads in
1815 * the thread group. The job control signals
1816 * do nothing in an orphaned pgrp, but SIGSTOP
1817 * always works. Note that siglock needs to be
1818 * dropped during the call to is_orphaned_pgrp()
1819 * because of lock ordering with tasklist_lock.
1820 * This allows an intervening SIGCONT to be posted.
1821 * We need to check for that and bail out if necessary.
1822 */
1823 if (signr != SIGSTOP) {
f6b76d4f 1824 spin_unlock_irq(&sighand->siglock);
1da177e4
LT
1825
1826 /* signals can be posted during this window */
1827
3e7cd6c4 1828 if (is_current_pgrp_orphaned())
1da177e4
LT
1829 goto relock;
1830
f6b76d4f 1831 spin_lock_irq(&sighand->siglock);
1da177e4
LT
1832 }
1833
1834 if (likely(do_signal_stop(signr))) {
1835 /* It released the siglock. */
1836 goto relock;
1837 }
1838
1839 /*
1840 * We didn't actually stop, due to a race
1841 * with SIGCONT or something like that.
1842 */
1843 continue;
1844 }
1845
f6b76d4f 1846 spin_unlock_irq(&sighand->siglock);
1da177e4
LT
1847
1848 /*
1849 * Anything else is fatal, maybe with a core dump.
1850 */
1851 current->flags |= PF_SIGNALED;
2dce81bf 1852
1da177e4 1853 if (sig_kernel_coredump(signr)) {
2dce81bf
ON
1854 if (print_fatal_signals)
1855 print_fatal_signal(regs, signr);
1da177e4
LT
1856 /*
1857 * If it was able to dump core, this kills all
1858 * other threads in the group and synchronizes with
1859 * their demise. If we lost the race with another
1860 * thread getting here, it set group_exit_code
1861 * first and our do_group_exit call below will use
1862 * that value and ignore the one we pass it.
1863 */
1864 do_coredump((long)signr, signr, regs);
1865 }
1866
1867 /*
1868 * Death signals, no core dump.
1869 */
1870 do_group_exit(signr);
1871 /* NOTREACHED */
1872 }
f6b76d4f 1873 spin_unlock_irq(&sighand->siglock);
1da177e4
LT
1874 return signr;
1875}
1876
d12619b5
ON
1877void exit_signals(struct task_struct *tsk)
1878{
1879 int group_stop = 0;
5dee1707 1880 struct task_struct *t;
d12619b5 1881
5dee1707
ON
1882 if (thread_group_empty(tsk) || signal_group_exit(tsk->signal)) {
1883 tsk->flags |= PF_EXITING;
1884 return;
d12619b5
ON
1885 }
1886
5dee1707 1887 spin_lock_irq(&tsk->sighand->siglock);
d12619b5
ON
1888 /*
1889 * From now this task is not visible for group-wide signals,
1890 * see wants_signal(), do_signal_stop().
1891 */
1892 tsk->flags |= PF_EXITING;
5dee1707
ON
1893 if (!signal_pending(tsk))
1894 goto out;
1895
1896 /* It could be that __group_complete_signal() choose us to
1897 * notify about group-wide signal. Another thread should be
1898 * woken now to take the signal since we will not.
1899 */
1900 for (t = tsk; (t = next_thread(t)) != tsk; )
1901 if (!signal_pending(t) && !(t->flags & PF_EXITING))
1902 recalc_sigpending_and_wake(t);
1903
1904 if (unlikely(tsk->signal->group_stop_count) &&
1905 !--tsk->signal->group_stop_count) {
1906 tsk->signal->flags = SIGNAL_STOP_STOPPED;
1907 group_stop = 1;
1908 }
1909out:
d12619b5
ON
1910 spin_unlock_irq(&tsk->sighand->siglock);
1911
1912 if (unlikely(group_stop)) {
1913 read_lock(&tasklist_lock);
1914 do_notify_parent_cldstop(tsk, CLD_STOPPED);
1915 read_unlock(&tasklist_lock);
1916 }
1917}
1918
1da177e4
LT
1919EXPORT_SYMBOL(recalc_sigpending);
1920EXPORT_SYMBOL_GPL(dequeue_signal);
1921EXPORT_SYMBOL(flush_signals);
1922EXPORT_SYMBOL(force_sig);
1da177e4
LT
1923EXPORT_SYMBOL(kill_proc);
1924EXPORT_SYMBOL(ptrace_notify);
1925EXPORT_SYMBOL(send_sig);
1926EXPORT_SYMBOL(send_sig_info);
1927EXPORT_SYMBOL(sigprocmask);
1928EXPORT_SYMBOL(block_all_signals);
1929EXPORT_SYMBOL(unblock_all_signals);
1930
1931
1932/*
1933 * System call entry points.
1934 */
1935
1936asmlinkage long sys_restart_syscall(void)
1937{
1938 struct restart_block *restart = &current_thread_info()->restart_block;
1939 return restart->fn(restart);
1940}
1941
1942long do_no_restart_syscall(struct restart_block *param)
1943{
1944 return -EINTR;
1945}
1946
1947/*
1948 * We don't need to get the kernel lock - this is all local to this
1949 * particular thread.. (and that's good, because this is _heavily_
1950 * used by various programs)
1951 */
1952
1953/*
1954 * This is also useful for kernel threads that want to temporarily
1955 * (or permanently) block certain signals.
1956 *
1957 * NOTE! Unlike the user-mode sys_sigprocmask(), the kernel
1958 * interface happily blocks "unblockable" signals like SIGKILL
1959 * and friends.
1960 */
1961int sigprocmask(int how, sigset_t *set, sigset_t *oldset)
1962{
1963 int error;
1da177e4
LT
1964
1965 spin_lock_irq(&current->sighand->siglock);
a26fd335
ON
1966 if (oldset)
1967 *oldset = current->blocked;
1968
1da177e4
LT
1969 error = 0;
1970 switch (how) {
1971 case SIG_BLOCK:
1972 sigorsets(&current->blocked, &current->blocked, set);
1973 break;
1974 case SIG_UNBLOCK:
1975 signandsets(&current->blocked, &current->blocked, set);
1976 break;
1977 case SIG_SETMASK:
1978 current->blocked = *set;
1979 break;
1980 default:
1981 error = -EINVAL;
1982 }
1983 recalc_sigpending();
1984 spin_unlock_irq(&current->sighand->siglock);
a26fd335 1985
1da177e4
LT
1986 return error;
1987}
1988
1989asmlinkage long
1990sys_rt_sigprocmask(int how, sigset_t __user *set, sigset_t __user *oset, size_t sigsetsize)
1991{
1992 int error = -EINVAL;
1993 sigset_t old_set, new_set;
1994
1995 /* XXX: Don't preclude handling different sized sigset_t's. */
1996 if (sigsetsize != sizeof(sigset_t))
1997 goto out;
1998
1999 if (set) {
2000 error = -EFAULT;
2001 if (copy_from_user(&new_set, set, sizeof(*set)))
2002 goto out;
2003 sigdelsetmask(&new_set, sigmask(SIGKILL)|sigmask(SIGSTOP));
2004
2005 error = sigprocmask(how, &new_set, &old_set);
2006 if (error)
2007 goto out;
2008 if (oset)
2009 goto set_old;
2010 } else if (oset) {
2011 spin_lock_irq(&current->sighand->siglock);
2012 old_set = current->blocked;
2013 spin_unlock_irq(&current->sighand->siglock);
2014
2015 set_old:
2016 error = -EFAULT;
2017 if (copy_to_user(oset, &old_set, sizeof(*oset)))
2018 goto out;
2019 }
2020 error = 0;
2021out:
2022 return error;
2023}
2024
2025long do_sigpending(void __user *set, unsigned long sigsetsize)
2026{
2027 long error = -EINVAL;
2028 sigset_t pending;
2029
2030 if (sigsetsize > sizeof(sigset_t))
2031 goto out;
2032
2033 spin_lock_irq(&current->sighand->siglock);
2034 sigorsets(&pending, &current->pending.signal,
2035 &current->signal->shared_pending.signal);
2036 spin_unlock_irq(&current->sighand->siglock);
2037
2038 /* Outside the lock because only this thread touches it. */
2039 sigandsets(&pending, &current->blocked, &pending);
2040
2041 error = -EFAULT;
2042 if (!copy_to_user(set, &pending, sigsetsize))
2043 error = 0;
2044
2045out:
2046 return error;
2047}
2048
2049asmlinkage long
2050sys_rt_sigpending(sigset_t __user *set, size_t sigsetsize)
2051{
2052 return do_sigpending(set, sigsetsize);
2053}
2054
2055#ifndef HAVE_ARCH_COPY_SIGINFO_TO_USER
2056
2057int copy_siginfo_to_user(siginfo_t __user *to, siginfo_t *from)
2058{
2059 int err;
2060
2061 if (!access_ok (VERIFY_WRITE, to, sizeof(siginfo_t)))
2062 return -EFAULT;
2063 if (from->si_code < 0)
2064 return __copy_to_user(to, from, sizeof(siginfo_t))
2065 ? -EFAULT : 0;
2066 /*
2067 * If you change siginfo_t structure, please be sure
2068 * this code is fixed accordingly.
fba2afaa
DL
2069 * Please remember to update the signalfd_copyinfo() function
2070 * inside fs/signalfd.c too, in case siginfo_t changes.
1da177e4
LT
2071 * It should never copy any pad contained in the structure
2072 * to avoid security leaks, but must copy the generic
2073 * 3 ints plus the relevant union member.
2074 */
2075 err = __put_user(from->si_signo, &to->si_signo);
2076 err |= __put_user(from->si_errno, &to->si_errno);
2077 err |= __put_user((short)from->si_code, &to->si_code);
2078 switch (from->si_code & __SI_MASK) {
2079 case __SI_KILL:
2080 err |= __put_user(from->si_pid, &to->si_pid);
2081 err |= __put_user(from->si_uid, &to->si_uid);
2082 break;
2083 case __SI_TIMER:
2084 err |= __put_user(from->si_tid, &to->si_tid);
2085 err |= __put_user(from->si_overrun, &to->si_overrun);
2086 err |= __put_user(from->si_ptr, &to->si_ptr);
2087 break;
2088 case __SI_POLL:
2089 err |= __put_user(from->si_band, &to->si_band);
2090 err |= __put_user(from->si_fd, &to->si_fd);
2091 break;
2092 case __SI_FAULT:
2093 err |= __put_user(from->si_addr, &to->si_addr);
2094#ifdef __ARCH_SI_TRAPNO
2095 err |= __put_user(from->si_trapno, &to->si_trapno);
2096#endif
2097 break;
2098 case __SI_CHLD:
2099 err |= __put_user(from->si_pid, &to->si_pid);
2100 err |= __put_user(from->si_uid, &to->si_uid);
2101 err |= __put_user(from->si_status, &to->si_status);
2102 err |= __put_user(from->si_utime, &to->si_utime);
2103 err |= __put_user(from->si_stime, &to->si_stime);
2104 break;
2105 case __SI_RT: /* This is not generated by the kernel as of now. */
2106 case __SI_MESGQ: /* But this is */
2107 err |= __put_user(from->si_pid, &to->si_pid);
2108 err |= __put_user(from->si_uid, &to->si_uid);
2109 err |= __put_user(from->si_ptr, &to->si_ptr);
2110 break;
2111 default: /* this is just in case for now ... */
2112 err |= __put_user(from->si_pid, &to->si_pid);
2113 err |= __put_user(from->si_uid, &to->si_uid);
2114 break;
2115 }
2116 return err;
2117}
2118
2119#endif
2120
2121asmlinkage long
2122sys_rt_sigtimedwait(const sigset_t __user *uthese,
2123 siginfo_t __user *uinfo,
2124 const struct timespec __user *uts,
2125 size_t sigsetsize)
2126{
2127 int ret, sig;
2128 sigset_t these;
2129 struct timespec ts;
2130 siginfo_t info;
2131 long timeout = 0;
2132
2133 /* XXX: Don't preclude handling different sized sigset_t's. */
2134 if (sigsetsize != sizeof(sigset_t))
2135 return -EINVAL;
2136
2137 if (copy_from_user(&these, uthese, sizeof(these)))
2138 return -EFAULT;
2139
2140 /*
2141 * Invert the set of allowed signals to get those we
2142 * want to block.
2143 */
2144 sigdelsetmask(&these, sigmask(SIGKILL)|sigmask(SIGSTOP));
2145 signotset(&these);
2146
2147 if (uts) {
2148 if (copy_from_user(&ts, uts, sizeof(ts)))
2149 return -EFAULT;
2150 if (ts.tv_nsec >= 1000000000L || ts.tv_nsec < 0
2151 || ts.tv_sec < 0)
2152 return -EINVAL;
2153 }
2154
2155 spin_lock_irq(&current->sighand->siglock);
2156 sig = dequeue_signal(current, &these, &info);
2157 if (!sig) {
2158 timeout = MAX_SCHEDULE_TIMEOUT;
2159 if (uts)
2160 timeout = (timespec_to_jiffies(&ts)
2161 + (ts.tv_sec || ts.tv_nsec));
2162
2163 if (timeout) {
2164 /* None ready -- temporarily unblock those we're
2165 * interested while we are sleeping in so that we'll
2166 * be awakened when they arrive. */
2167 current->real_blocked = current->blocked;
2168 sigandsets(&current->blocked, &current->blocked, &these);
2169 recalc_sigpending();
2170 spin_unlock_irq(&current->sighand->siglock);
2171
75bcc8c5 2172 timeout = schedule_timeout_interruptible(timeout);
1da177e4 2173
1da177e4
LT
2174 spin_lock_irq(&current->sighand->siglock);
2175 sig = dequeue_signal(current, &these, &info);
2176 current->blocked = current->real_blocked;
2177 siginitset(&current->real_blocked, 0);
2178 recalc_sigpending();
2179 }
2180 }
2181 spin_unlock_irq(&current->sighand->siglock);
2182
2183 if (sig) {
2184 ret = sig;
2185 if (uinfo) {
2186 if (copy_siginfo_to_user(uinfo, &info))
2187 ret = -EFAULT;
2188 }
2189 } else {
2190 ret = -EAGAIN;
2191 if (timeout)
2192 ret = -EINTR;
2193 }
2194
2195 return ret;
2196}
2197
2198asmlinkage long
2199sys_kill(int pid, int sig)
2200{
2201 struct siginfo info;
2202
2203 info.si_signo = sig;
2204 info.si_errno = 0;
2205 info.si_code = SI_USER;
b488893a 2206 info.si_pid = task_tgid_vnr(current);
1da177e4
LT
2207 info.si_uid = current->uid;
2208
2209 return kill_something_info(sig, &info, pid);
2210}
2211
6dd69f10 2212static int do_tkill(int tgid, int pid, int sig)
1da177e4 2213{
1da177e4 2214 int error;
6dd69f10 2215 struct siginfo info;
1da177e4 2216 struct task_struct *p;
3547ff3a 2217 unsigned long flags;
1da177e4 2218
6dd69f10 2219 error = -ESRCH;
1da177e4
LT
2220 info.si_signo = sig;
2221 info.si_errno = 0;
2222 info.si_code = SI_TKILL;
b488893a 2223 info.si_pid = task_tgid_vnr(current);
1da177e4
LT
2224 info.si_uid = current->uid;
2225
3547ff3a 2226 rcu_read_lock();
228ebcbe 2227 p = find_task_by_vpid(pid);
b488893a 2228 if (p && (tgid <= 0 || task_tgid_vnr(p) == tgid)) {
1da177e4
LT
2229 error = check_kill_permission(sig, &info, p);
2230 /*
2231 * The null signal is a permissions and process existence
2232 * probe. No signal is actually delivered.
3547ff3a
ON
2233 *
2234 * If lock_task_sighand() fails we pretend the task dies
2235 * after receiving the signal. The window is tiny, and the
2236 * signal is private anyway.
1da177e4 2237 */
3547ff3a 2238 if (!error && sig && lock_task_sighand(p, &flags)) {
1da177e4 2239 error = specific_send_sig_info(sig, &info, p);
3547ff3a 2240 unlock_task_sighand(p, &flags);
1da177e4
LT
2241 }
2242 }
3547ff3a 2243 rcu_read_unlock();
6dd69f10 2244
1da177e4
LT
2245 return error;
2246}
2247
6dd69f10
VL
2248/**
2249 * sys_tgkill - send signal to one specific thread
2250 * @tgid: the thread group ID of the thread
2251 * @pid: the PID of the thread
2252 * @sig: signal to be sent
2253 *
72fd4a35 2254 * This syscall also checks the @tgid and returns -ESRCH even if the PID
6dd69f10
VL
2255 * exists but it's not belonging to the target process anymore. This
2256 * method solves the problem of threads exiting and PIDs getting reused.
2257 */
2258asmlinkage long sys_tgkill(int tgid, int pid, int sig)
2259{
2260 /* This is only valid for single tasks */
2261 if (pid <= 0 || tgid <= 0)
2262 return -EINVAL;
2263
2264 return do_tkill(tgid, pid, sig);
2265}
2266
1da177e4
LT
2267/*
2268 * Send a signal to only one task, even if it's a CLONE_THREAD task.
2269 */
2270asmlinkage long
2271sys_tkill(int pid, int sig)
2272{
1da177e4
LT
2273 /* This is only valid for single tasks */
2274 if (pid <= 0)
2275 return -EINVAL;
2276
6dd69f10 2277 return do_tkill(0, pid, sig);
1da177e4
LT
2278}
2279
2280asmlinkage long
2281sys_rt_sigqueueinfo(int pid, int sig, siginfo_t __user *uinfo)
2282{
2283 siginfo_t info;
2284
2285 if (copy_from_user(&info, uinfo, sizeof(siginfo_t)))
2286 return -EFAULT;
2287
2288 /* Not even root can pretend to send signals from the kernel.
2289 Nor can they impersonate a kill(), which adds source info. */
2290 if (info.si_code >= 0)
2291 return -EPERM;
2292 info.si_signo = sig;
2293
2294 /* POSIX.1b doesn't mention process groups. */
2295 return kill_proc_info(sig, &info, pid);
2296}
2297
88531f72 2298int do_sigaction(int sig, struct k_sigaction *act, struct k_sigaction *oact)
1da177e4 2299{
93585eea 2300 struct task_struct *t = current;
1da177e4 2301 struct k_sigaction *k;
71fabd5e 2302 sigset_t mask;
1da177e4 2303
7ed20e1a 2304 if (!valid_signal(sig) || sig < 1 || (act && sig_kernel_only(sig)))
1da177e4
LT
2305 return -EINVAL;
2306
93585eea 2307 k = &t->sighand->action[sig-1];
1da177e4
LT
2308
2309 spin_lock_irq(&current->sighand->siglock);
1da177e4
LT
2310 if (oact)
2311 *oact = *k;
2312
2313 if (act) {
9ac95f2f
ON
2314 sigdelsetmask(&act->sa.sa_mask,
2315 sigmask(SIGKILL) | sigmask(SIGSTOP));
88531f72 2316 *k = *act;
1da177e4
LT
2317 /*
2318 * POSIX 3.3.1.3:
2319 * "Setting a signal action to SIG_IGN for a signal that is
2320 * pending shall cause the pending signal to be discarded,
2321 * whether or not it is blocked."
2322 *
2323 * "Setting a signal action to SIG_DFL for a signal that is
2324 * pending and whose default action is to ignore the signal
2325 * (for example, SIGCHLD), shall cause the pending signal to
2326 * be discarded, whether or not it is blocked"
2327 */
93585eea 2328 if (__sig_ignored(t, sig)) {
71fabd5e
GA
2329 sigemptyset(&mask);
2330 sigaddset(&mask, sig);
2331 rm_from_queue_full(&mask, &t->signal->shared_pending);
1da177e4 2332 do {
71fabd5e 2333 rm_from_queue_full(&mask, &t->pending);
1da177e4
LT
2334 t = next_thread(t);
2335 } while (t != current);
1da177e4 2336 }
1da177e4
LT
2337 }
2338
2339 spin_unlock_irq(&current->sighand->siglock);
2340 return 0;
2341}
2342
2343int
2344do_sigaltstack (const stack_t __user *uss, stack_t __user *uoss, unsigned long sp)
2345{
2346 stack_t oss;
2347 int error;
2348
2349 if (uoss) {
2350 oss.ss_sp = (void __user *) current->sas_ss_sp;
2351 oss.ss_size = current->sas_ss_size;
2352 oss.ss_flags = sas_ss_flags(sp);
2353 }
2354
2355 if (uss) {
2356 void __user *ss_sp;
2357 size_t ss_size;
2358 int ss_flags;
2359
2360 error = -EFAULT;
2361 if (!access_ok(VERIFY_READ, uss, sizeof(*uss))
2362 || __get_user(ss_sp, &uss->ss_sp)
2363 || __get_user(ss_flags, &uss->ss_flags)
2364 || __get_user(ss_size, &uss->ss_size))
2365 goto out;
2366
2367 error = -EPERM;
2368 if (on_sig_stack(sp))
2369 goto out;
2370
2371 error = -EINVAL;
2372 /*
2373 *
2374 * Note - this code used to test ss_flags incorrectly
2375 * old code may have been written using ss_flags==0
2376 * to mean ss_flags==SS_ONSTACK (as this was the only
2377 * way that worked) - this fix preserves that older
2378 * mechanism
2379 */
2380 if (ss_flags != SS_DISABLE && ss_flags != SS_ONSTACK && ss_flags != 0)
2381 goto out;
2382
2383 if (ss_flags == SS_DISABLE) {
2384 ss_size = 0;
2385 ss_sp = NULL;
2386 } else {
2387 error = -ENOMEM;
2388 if (ss_size < MINSIGSTKSZ)
2389 goto out;
2390 }
2391
2392 current->sas_ss_sp = (unsigned long) ss_sp;
2393 current->sas_ss_size = ss_size;
2394 }
2395
2396 if (uoss) {
2397 error = -EFAULT;
2398 if (copy_to_user(uoss, &oss, sizeof(oss)))
2399 goto out;
2400 }
2401
2402 error = 0;
2403out:
2404 return error;
2405}
2406
2407#ifdef __ARCH_WANT_SYS_SIGPENDING
2408
2409asmlinkage long
2410sys_sigpending(old_sigset_t __user *set)
2411{
2412 return do_sigpending(set, sizeof(*set));
2413}
2414
2415#endif
2416
2417#ifdef __ARCH_WANT_SYS_SIGPROCMASK
2418/* Some platforms have their own version with special arguments others
2419 support only sys_rt_sigprocmask. */
2420
2421asmlinkage long
2422sys_sigprocmask(int how, old_sigset_t __user *set, old_sigset_t __user *oset)
2423{
2424 int error;
2425 old_sigset_t old_set, new_set;
2426
2427 if (set) {
2428 error = -EFAULT;
2429 if (copy_from_user(&new_set, set, sizeof(*set)))
2430 goto out;
2431 new_set &= ~(sigmask(SIGKILL) | sigmask(SIGSTOP));
2432
2433 spin_lock_irq(&current->sighand->siglock);
2434 old_set = current->blocked.sig[0];
2435
2436 error = 0;
2437 switch (how) {
2438 default:
2439 error = -EINVAL;
2440 break;
2441 case SIG_BLOCK:
2442 sigaddsetmask(&current->blocked, new_set);
2443 break;
2444 case SIG_UNBLOCK:
2445 sigdelsetmask(&current->blocked, new_set);
2446 break;
2447 case SIG_SETMASK:
2448 current->blocked.sig[0] = new_set;
2449 break;
2450 }
2451
2452 recalc_sigpending();
2453 spin_unlock_irq(&current->sighand->siglock);
2454 if (error)
2455 goto out;
2456 if (oset)
2457 goto set_old;
2458 } else if (oset) {
2459 old_set = current->blocked.sig[0];
2460 set_old:
2461 error = -EFAULT;
2462 if (copy_to_user(oset, &old_set, sizeof(*oset)))
2463 goto out;
2464 }
2465 error = 0;
2466out:
2467 return error;
2468}
2469#endif /* __ARCH_WANT_SYS_SIGPROCMASK */
2470
2471#ifdef __ARCH_WANT_SYS_RT_SIGACTION
2472asmlinkage long
2473sys_rt_sigaction(int sig,
2474 const struct sigaction __user *act,
2475 struct sigaction __user *oact,
2476 size_t sigsetsize)
2477{
2478 struct k_sigaction new_sa, old_sa;
2479 int ret = -EINVAL;
2480
2481 /* XXX: Don't preclude handling different sized sigset_t's. */
2482 if (sigsetsize != sizeof(sigset_t))
2483 goto out;
2484
2485 if (act) {
2486 if (copy_from_user(&new_sa.sa, act, sizeof(new_sa.sa)))
2487 return -EFAULT;
2488 }
2489
2490 ret = do_sigaction(sig, act ? &new_sa : NULL, oact ? &old_sa : NULL);
2491
2492 if (!ret && oact) {
2493 if (copy_to_user(oact, &old_sa.sa, sizeof(old_sa.sa)))
2494 return -EFAULT;
2495 }
2496out:
2497 return ret;
2498}
2499#endif /* __ARCH_WANT_SYS_RT_SIGACTION */
2500
2501#ifdef __ARCH_WANT_SYS_SGETMASK
2502
2503/*
2504 * For backwards compatibility. Functionality superseded by sigprocmask.
2505 */
2506asmlinkage long
2507sys_sgetmask(void)
2508{
2509 /* SMP safe */
2510 return current->blocked.sig[0];
2511}
2512
2513asmlinkage long
2514sys_ssetmask(int newmask)
2515{
2516 int old;
2517
2518 spin_lock_irq(&current->sighand->siglock);
2519 old = current->blocked.sig[0];
2520
2521 siginitset(&current->blocked, newmask & ~(sigmask(SIGKILL)|
2522 sigmask(SIGSTOP)));
2523 recalc_sigpending();
2524 spin_unlock_irq(&current->sighand->siglock);
2525
2526 return old;
2527}
2528#endif /* __ARCH_WANT_SGETMASK */
2529
2530#ifdef __ARCH_WANT_SYS_SIGNAL
2531/*
2532 * For backwards compatibility. Functionality superseded by sigaction.
2533 */
2534asmlinkage unsigned long
2535sys_signal(int sig, __sighandler_t handler)
2536{
2537 struct k_sigaction new_sa, old_sa;
2538 int ret;
2539
2540 new_sa.sa.sa_handler = handler;
2541 new_sa.sa.sa_flags = SA_ONESHOT | SA_NOMASK;
c70d3d70 2542 sigemptyset(&new_sa.sa.sa_mask);
1da177e4
LT
2543
2544 ret = do_sigaction(sig, &new_sa, &old_sa);
2545
2546 return ret ? ret : (unsigned long)old_sa.sa.sa_handler;
2547}
2548#endif /* __ARCH_WANT_SYS_SIGNAL */
2549
2550#ifdef __ARCH_WANT_SYS_PAUSE
2551
2552asmlinkage long
2553sys_pause(void)
2554{
2555 current->state = TASK_INTERRUPTIBLE;
2556 schedule();
2557 return -ERESTARTNOHAND;
2558}
2559
2560#endif
2561
150256d8
DW
2562#ifdef __ARCH_WANT_SYS_RT_SIGSUSPEND
2563asmlinkage long sys_rt_sigsuspend(sigset_t __user *unewset, size_t sigsetsize)
2564{
2565 sigset_t newset;
2566
2567 /* XXX: Don't preclude handling different sized sigset_t's. */
2568 if (sigsetsize != sizeof(sigset_t))
2569 return -EINVAL;
2570
2571 if (copy_from_user(&newset, unewset, sizeof(newset)))
2572 return -EFAULT;
2573 sigdelsetmask(&newset, sigmask(SIGKILL)|sigmask(SIGSTOP));
2574
2575 spin_lock_irq(&current->sighand->siglock);
2576 current->saved_sigmask = current->blocked;
2577 current->blocked = newset;
2578 recalc_sigpending();
2579 spin_unlock_irq(&current->sighand->siglock);
2580
2581 current->state = TASK_INTERRUPTIBLE;
2582 schedule();
4e4c22c7 2583 set_restore_sigmask();
150256d8
DW
2584 return -ERESTARTNOHAND;
2585}
2586#endif /* __ARCH_WANT_SYS_RT_SIGSUSPEND */
2587
f269fdd1
DH
2588__attribute__((weak)) const char *arch_vma_name(struct vm_area_struct *vma)
2589{
2590 return NULL;
2591}
2592
1da177e4
LT
2593void __init signals_init(void)
2594{
0a31bd5f 2595 sigqueue_cachep = KMEM_CACHE(sigqueue, SLAB_PANIC);
1da177e4 2596}