From mboxrd@z Thu Jan 1 00:00:00 1970 From: Sukadev Bhattiprolu Subject: [PATCH 6/7][v7] SI_USER: Masquerade si_pid when crossing pid ns boundary Date: Sat, 17 Jan 2009 12:37:21 -0800 Message-ID: <20090117203721.GG11825@us.ibm.com> References: <20090117202638.GA11825@us.ibm.com> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Return-path: Content-Disposition: inline In-Reply-To: <20090117202638.GA11825@us.ibm.com> Sender: linux-kernel-owner@vger.kernel.org To: oleg@redhat.com, ebiederm@xmission.com, roland@redhat.com, bastian@waldi.eu.org Cc: daniel@hozac.com, xemul@openvz.org, containers@lists.osdl.org, linux-kernel@vger.kernel.org List-Id: containers.vger.kernel.org From: Sukadev Bhattiprolu Date: Wed, 24 Dec 2008 14:14:18 -0800 Subject: [PATCH 6/7][v7] SI_USER: Masquerade si_pid when crossing pid ns boundary When sending a signal to a descendant namespace, set ->si_pid to 0 since the sender does not have a pid in the receiver's namespace. Note: - If rt_sigqueueinfo() sets si_code to SI_USER when sending a signal across a pid namespace boundary, the value in ->si_pid will be cleared to 0. Changelog[v5]: - (Oleg Nesterov) Address both sys_kill() and sys_tkill() cases in send_signal() to simplify code (this drops patch 7/7 from earlier version of patchset). Signed-off-by: Sukadev Bhattiprolu --- kernel/signal.c | 2 ++ 1 files changed, 2 insertions(+), 0 deletions(-) diff --git a/kernel/signal.c b/kernel/signal.c index ccc020f..81b8603 100644 --- a/kernel/signal.c +++ b/kernel/signal.c @@ -880,6 +880,8 @@ static int __send_signal(int sig, struct siginfo *info, struct task_struct *t, break; default: copy_siginfo(&q->info, info); + if (from_ancestor_ns) + q->info.si_pid = 0; break; } } else if (!is_si_special(info)) { -- 1.5.2.5