SEND_SIG_NOINFO: masquerade si_pid when crossing pid-ns boundary
authorSukadev Bhattiprolu <sukadev@linux.vnet.ibm.com>
Tue, 6 Jan 2009 22:42:45 +0000 (14:42 -0800)
committerLinus Torvalds <torvalds@linux-foundation.org>
Tue, 6 Jan 2009 23:59:28 +0000 (15:59 -0800)
For SEND_SIG_NOINFO, si_pid is currently set to the pid of sender
in sender's active pid namespace. But if the receiver is in a
Eg: when parent sends the 'pdeath_signal' to a child that is in
a descendant pid namespace, we should set si_pid 0.

Signed-off-by: Sukadev Bhattiprolu <sukadev@linux.vnet.ibm.com>
Acked-By: Roland McGrath <roland@redhat.com>
Cc: "Eric W. Biederman" <ebiederm@xmission.com>
Cc: Oleg Nesterov <oleg@tv-sign.ru>
Cc: Pavel Emelyanov <xemul@openvz.org>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
kernel/signal.c

index 8e95855ff3cf8c93fe10540110172fe484b8b01b..31db63b3f88b5f2be231dcdb88b0775fd7a9cefa 100644 (file)
@@ -858,7 +858,8 @@ static int send_signal(int sig, struct siginfo *info, struct task_struct *t,
                        q->info.si_signo = sig;
                        q->info.si_errno = 0;
                        q->info.si_code = SI_USER;
-                       q->info.si_pid = task_pid_vnr(current);
+                       q->info.si_pid = task_pid_nr_ns(current,
+                                                       task_active_pid_ns(t));
                        q->info.si_uid = current_uid();
                        break;
                case (unsigned long) SEND_SIG_PRIV: