The patch titled signals: SEND_SIG_NOINFO should be considered as SI_FROMUSER() has been removed from the -mm tree. Its filename was signals-send_sig_noinfo-should-be-considered-as-si_fromuser.patch This patch was dropped because it was merged into mainline or a subsystem tree The current -mm tree may be found at http://userweb.kernel.org/~akpm/mmotm/ ------------------------------------------------------ Subject: signals: SEND_SIG_NOINFO should be considered as SI_FROMUSER() From: Oleg Nesterov <oleg@xxxxxxxxxx> No changes in compiled code. The patch adds the new helper, si_fromuser() and changes check_kill_permission() to use this helper. The real effect of this patch is that from now we "officially" consider SEND_SIG_NOINFO signal as "from user-space" signals. This is already true if we look at the code which uses SEND_SIG_NOINFO, except __send_signal() has another opinion - see the next patch. The naming of these special SEND_SIG_XXX siginfo's is really bad imho. From __send_signal()'s pov they mean SEND_SIG_NOINFO from user SEND_SIG_PRIV from kernel SEND_SIG_FORCED no info Signed-off-by: Oleg Nesterov <oleg@xxxxxxxxxx> Cc: Roland McGrath <roland@xxxxxxxxxx> Reviewed-by: Sukadev Bhattiprolu <sukadev@xxxxxxxxxx> Signed-off-by: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx> --- include/linux/sched.h | 5 ----- kernel/signal.c | 16 +++++++++++++--- 2 files changed, 13 insertions(+), 8 deletions(-) diff -puN include/linux/sched.h~signals-send_sig_noinfo-should-be-considered-as-si_fromuser include/linux/sched.h --- a/include/linux/sched.h~signals-send_sig_noinfo-should-be-considered-as-si_fromuser +++ a/include/linux/sched.h @@ -2102,11 +2102,6 @@ static inline int kill_cad_pid(int sig, #define SEND_SIG_PRIV ((struct siginfo *) 1) #define SEND_SIG_FORCED ((struct siginfo *) 2) -static inline int is_si_special(const struct siginfo *info) -{ - return info <= SEND_SIG_FORCED; -} - /* * True if we are on the alternate signal stack. */ diff -puN kernel/signal.c~signals-send_sig_noinfo-should-be-considered-as-si_fromuser kernel/signal.c --- a/kernel/signal.c~signals-send_sig_noinfo-should-be-considered-as-si_fromuser +++ a/kernel/signal.c @@ -607,6 +607,17 @@ static int rm_from_queue(unsigned long m return 1; } +static inline int is_si_special(const struct siginfo *info) +{ + return info <= SEND_SIG_FORCED; +} + +static inline bool si_fromuser(const struct siginfo *info) +{ + return info == SEND_SIG_NOINFO || + (!is_si_special(info) && SI_FROMUSER(info)); +} + /* * Bad permissions for sending the signal * - the caller must hold at least the RCU read lock @@ -621,7 +632,7 @@ static int check_kill_permission(int sig if (!valid_signal(sig)) return -EINVAL; - if (info != SEND_SIG_NOINFO && (is_si_special(info) || SI_FROMKERNEL(info))) + if (!si_fromuser(info)) return 0; error = audit_signal_info(sig, t); /* Let audit system see the signal */ @@ -1186,8 +1197,7 @@ int kill_pid_info_as_uid(int sig, struct goto out_unlock; } pcred = __task_cred(p); - if ((info == SEND_SIG_NOINFO || - (!is_si_special(info) && SI_FROMUSER(info))) && + if (si_fromuser(info) && euid != pcred->suid && euid != pcred->uid && uid != pcred->suid && uid != pcred->uid) { ret = -EPERM; _ Patches currently in -mm which might be from oleg@xxxxxxxxxx are origin.patch do_wait-optimization-do-not-place-sub-threads-on-task_struct-children-list.patch mm-introduce-coredump-parameter-structure.patch linux-next.patch posix-cpu-timers-reset-expire-cache-when-no-timer-is-running.patch -- To unsubscribe from this list: send the line "unsubscribe mm-commits" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html