13d0407baSopenharmony_ci/* SPDX-License-Identifier: GPL-2.0 */
23d0407baSopenharmony_ci#ifndef _LINUX_SCHED_SIGNAL_H
33d0407baSopenharmony_ci#define _LINUX_SCHED_SIGNAL_H
43d0407baSopenharmony_ci
53d0407baSopenharmony_ci#include <linux/rculist.h>
63d0407baSopenharmony_ci#include <linux/signal.h>
73d0407baSopenharmony_ci#include <linux/sched.h>
83d0407baSopenharmony_ci#include <linux/sched/jobctl.h>
93d0407baSopenharmony_ci#include <linux/sched/task.h>
103d0407baSopenharmony_ci#include <linux/cred.h>
113d0407baSopenharmony_ci#include <linux/refcount.h>
123d0407baSopenharmony_ci#include <linux/posix-timers.h>
133d0407baSopenharmony_ci#include <linux/mm_types.h>
143d0407baSopenharmony_ci#include <asm/ptrace.h>
153d0407baSopenharmony_ci#include <linux/android_kabi.h>
163d0407baSopenharmony_ci
173d0407baSopenharmony_ci/*
183d0407baSopenharmony_ci * Types defining task->signal and task->sighand and APIs using them:
193d0407baSopenharmony_ci */
203d0407baSopenharmony_ci
213d0407baSopenharmony_cistruct sighand_struct {
223d0407baSopenharmony_ci    spinlock_t siglock;
233d0407baSopenharmony_ci    refcount_t count;
243d0407baSopenharmony_ci    wait_queue_head_t signalfd_wqh;
253d0407baSopenharmony_ci    struct k_sigaction action[_NSIG];
263d0407baSopenharmony_ci};
273d0407baSopenharmony_ci
283d0407baSopenharmony_ci/*
293d0407baSopenharmony_ci * Per-process accounting stats:
303d0407baSopenharmony_ci */
313d0407baSopenharmony_cistruct pacct_struct {
323d0407baSopenharmony_ci    int ac_flag;
333d0407baSopenharmony_ci    long ac_exitcode;
343d0407baSopenharmony_ci    unsigned long ac_mem;
353d0407baSopenharmony_ci    u64 ac_utime, ac_stime;
363d0407baSopenharmony_ci    unsigned long ac_minflt, ac_majflt;
373d0407baSopenharmony_ci};
383d0407baSopenharmony_ci
393d0407baSopenharmony_cistruct cpu_itimer {
403d0407baSopenharmony_ci    u64 expires;
413d0407baSopenharmony_ci    u64 incr;
423d0407baSopenharmony_ci};
433d0407baSopenharmony_ci
443d0407baSopenharmony_ci/*
453d0407baSopenharmony_ci * This is the atomic variant of task_cputime, which can be used for
463d0407baSopenharmony_ci * storing and updating task_cputime statistics without locking.
473d0407baSopenharmony_ci */
483d0407baSopenharmony_cistruct task_cputime_atomic {
493d0407baSopenharmony_ci    atomic64_t utime;
503d0407baSopenharmony_ci    atomic64_t stime;
513d0407baSopenharmony_ci    atomic64_t sum_exec_runtime;
523d0407baSopenharmony_ci};
533d0407baSopenharmony_ci
543d0407baSopenharmony_ci#define INIT_CPUTIME_ATOMIC                                                                                            \
553d0407baSopenharmony_ci    (struct task_cputime_atomic)                                                                                       \
563d0407baSopenharmony_ci    {                                                                                                                  \
573d0407baSopenharmony_ci        .utime = ATOMIC64_INIT(0), .stime = ATOMIC64_INIT(0), .sum_exec_runtime = ATOMIC64_INIT(0),                    \
583d0407baSopenharmony_ci    }
593d0407baSopenharmony_ci/**
603d0407baSopenharmony_ci * struct thread_group_cputimer - thread group interval timer counts
613d0407baSopenharmony_ci * @cputime_atomic:    atomic thread group interval timers.
623d0407baSopenharmony_ci *
633d0407baSopenharmony_ci * This structure contains the version of task_cputime, above, that is
643d0407baSopenharmony_ci * used for thread group CPU timer calculations.
653d0407baSopenharmony_ci */
663d0407baSopenharmony_cistruct thread_group_cputimer {
673d0407baSopenharmony_ci    struct task_cputime_atomic cputime_atomic;
683d0407baSopenharmony_ci};
693d0407baSopenharmony_ci
703d0407baSopenharmony_cistruct multiprocess_signals {
713d0407baSopenharmony_ci    sigset_t signal;
723d0407baSopenharmony_ci    struct hlist_node node;
733d0407baSopenharmony_ci};
743d0407baSopenharmony_ci
753d0407baSopenharmony_ci/*
763d0407baSopenharmony_ci * NOTE! "signal_struct" does not have its own
773d0407baSopenharmony_ci * locking, because a shared signal_struct always
783d0407baSopenharmony_ci * implies a shared sighand_struct, so locking
793d0407baSopenharmony_ci * sighand_struct is always a proper superset of
803d0407baSopenharmony_ci * the locking of signal_struct.
813d0407baSopenharmony_ci */
823d0407baSopenharmony_cistruct signal_struct {
833d0407baSopenharmony_ci    refcount_t sigcnt;
843d0407baSopenharmony_ci    atomic_t live;
853d0407baSopenharmony_ci    int nr_threads;
863d0407baSopenharmony_ci    struct list_head thread_head;
873d0407baSopenharmony_ci
883d0407baSopenharmony_ci    wait_queue_head_t wait_chldexit; /* for wait4() */
893d0407baSopenharmony_ci
903d0407baSopenharmony_ci    /* current thread group signal load-balancing target: */
913d0407baSopenharmony_ci    struct task_struct *curr_target;
923d0407baSopenharmony_ci
933d0407baSopenharmony_ci    /* shared signal handling: */
943d0407baSopenharmony_ci    struct sigpending shared_pending;
953d0407baSopenharmony_ci
963d0407baSopenharmony_ci    /* For collecting multiprocess signals during fork */
973d0407baSopenharmony_ci    struct hlist_head multiprocess;
983d0407baSopenharmony_ci
993d0407baSopenharmony_ci    /* thread group exit support */
1003d0407baSopenharmony_ci    int group_exit_code;
1013d0407baSopenharmony_ci    /* overloaded:
1023d0407baSopenharmony_ci     * - notify group_exit_task when ->count is equal to notify_count
1033d0407baSopenharmony_ci     * - everyone except group_exit_task is stopped during signal delivery
1043d0407baSopenharmony_ci     *   of fatal signals, group_exit_task processes the signal.
1053d0407baSopenharmony_ci     */
1063d0407baSopenharmony_ci    int notify_count;
1073d0407baSopenharmony_ci    struct task_struct *group_exit_task;
1083d0407baSopenharmony_ci
1093d0407baSopenharmony_ci    /* thread group stop support, overloads group_exit_code too */
1103d0407baSopenharmony_ci    int group_stop_count;
1113d0407baSopenharmony_ci    unsigned int flags; /* see SIGNAL_* flags below */
1123d0407baSopenharmony_ci
1133d0407baSopenharmony_ci    /*
1143d0407baSopenharmony_ci     * PR_SET_CHILD_SUBREAPER marks a process, like a service
1153d0407baSopenharmony_ci     * manager, to re-parent orphan (double-forking) child processes
1163d0407baSopenharmony_ci     * to this process instead of 'init'. The service manager is
1173d0407baSopenharmony_ci     * able to receive SIGCHLD signals and is able to investigate
1183d0407baSopenharmony_ci     * the process until it calls wait(). All children of this
1193d0407baSopenharmony_ci     * process will inherit a flag if they should look for a
1203d0407baSopenharmony_ci     * child_subreaper process at exit.
1213d0407baSopenharmony_ci     */
1223d0407baSopenharmony_ci    unsigned int is_child_subreaper : 1;
1233d0407baSopenharmony_ci    unsigned int has_child_subreaper : 1;
1243d0407baSopenharmony_ci
1253d0407baSopenharmony_ci#ifdef CONFIG_POSIX_TIMERS
1263d0407baSopenharmony_ci
1273d0407baSopenharmony_ci    /* POSIX.1b Interval Timers */
1283d0407baSopenharmony_ci    int posix_timer_id;
1293d0407baSopenharmony_ci    struct list_head posix_timers;
1303d0407baSopenharmony_ci
1313d0407baSopenharmony_ci    /* ITIMER_REAL timer for the process */
1323d0407baSopenharmony_ci    struct hrtimer real_timer;
1333d0407baSopenharmony_ci    ktime_t it_real_incr;
1343d0407baSopenharmony_ci
1353d0407baSopenharmony_ci    /*
1363d0407baSopenharmony_ci     * ITIMER_PROF and ITIMER_VIRTUAL timers for the process, we use
1373d0407baSopenharmony_ci     * CPUCLOCK_PROF and CPUCLOCK_VIRT for indexing array as these
1383d0407baSopenharmony_ci     * values are defined to 0 and 1 respectively
1393d0407baSopenharmony_ci     */
1403d0407baSopenharmony_ci    struct cpu_itimer it[2];
1413d0407baSopenharmony_ci
1423d0407baSopenharmony_ci    /*
1433d0407baSopenharmony_ci     * Thread group totals for process CPU timers.
1443d0407baSopenharmony_ci     * See thread_group_cputimer(), et al, for details.
1453d0407baSopenharmony_ci     */
1463d0407baSopenharmony_ci    struct thread_group_cputimer cputimer;
1473d0407baSopenharmony_ci
1483d0407baSopenharmony_ci#endif
1493d0407baSopenharmony_ci    /* Empty if CONFIG_POSIX_TIMERS=n */
1503d0407baSopenharmony_ci    struct posix_cputimers posix_cputimers;
1513d0407baSopenharmony_ci
1523d0407baSopenharmony_ci    /* PID/PID hash table linkage. */
1533d0407baSopenharmony_ci    struct pid *pids[PIDTYPE_MAX];
1543d0407baSopenharmony_ci
1553d0407baSopenharmony_ci#ifdef CONFIG_NO_HZ_FULL
1563d0407baSopenharmony_ci    atomic_t tick_dep_mask;
1573d0407baSopenharmony_ci#endif
1583d0407baSopenharmony_ci
1593d0407baSopenharmony_ci    struct pid *tty_old_pgrp;
1603d0407baSopenharmony_ci
1613d0407baSopenharmony_ci    /* boolean value for session group leader */
1623d0407baSopenharmony_ci    int leader;
1633d0407baSopenharmony_ci
1643d0407baSopenharmony_ci    struct tty_struct *tty; /* NULL if no tty */
1653d0407baSopenharmony_ci
1663d0407baSopenharmony_ci#ifdef CONFIG_SCHED_AUTOGROUP
1673d0407baSopenharmony_ci    struct autogroup *autogroup;
1683d0407baSopenharmony_ci#endif
1693d0407baSopenharmony_ci    /*
1703d0407baSopenharmony_ci     * Cumulative resource counters for dead threads in the group,
1713d0407baSopenharmony_ci     * and for reaped dead child processes forked by this group.
1723d0407baSopenharmony_ci     * Live threads maintain their own counters and add to these
1733d0407baSopenharmony_ci     * in __exit_signal, except for the group leader.
1743d0407baSopenharmony_ci     */
1753d0407baSopenharmony_ci    seqlock_t stats_lock;
1763d0407baSopenharmony_ci    u64 utime, stime, cutime, cstime;
1773d0407baSopenharmony_ci    u64 gtime;
1783d0407baSopenharmony_ci    u64 cgtime;
1793d0407baSopenharmony_ci    struct prev_cputime prev_cputime;
1803d0407baSopenharmony_ci    unsigned long nvcsw, nivcsw, cnvcsw, cnivcsw;
1813d0407baSopenharmony_ci    unsigned long min_flt, maj_flt, cmin_flt, cmaj_flt;
1823d0407baSopenharmony_ci    unsigned long inblock, oublock, cinblock, coublock;
1833d0407baSopenharmony_ci    unsigned long maxrss, cmaxrss;
1843d0407baSopenharmony_ci    struct task_io_accounting ioac;
1853d0407baSopenharmony_ci
1863d0407baSopenharmony_ci    /*
1873d0407baSopenharmony_ci     * Cumulative ns of schedule CPU time fo dead threads in the
1883d0407baSopenharmony_ci     * group, not including a zombie group leader, (This only differs
1893d0407baSopenharmony_ci     * from jiffies_to_ns(utime + stime) if sched_clock uses something
1903d0407baSopenharmony_ci     * other than jiffies.)
1913d0407baSopenharmony_ci     */
1923d0407baSopenharmony_ci    unsigned long long sum_sched_runtime;
1933d0407baSopenharmony_ci
1943d0407baSopenharmony_ci    /*
1953d0407baSopenharmony_ci     * We don't bother to synchronize most readers of this at all,
1963d0407baSopenharmony_ci     * because there is no reader checking a limit that actually needs
1973d0407baSopenharmony_ci     * to get both rlim_cur and rlim_max atomically, and either one
1983d0407baSopenharmony_ci     * alone is a single word that can safely be read normally.
1993d0407baSopenharmony_ci     * getrlimit/setrlimit use task_lock(current->group_leader) to
2003d0407baSopenharmony_ci     * protect this instead of the siglock, because they really
2013d0407baSopenharmony_ci     * have no need to disable irqs.
2023d0407baSopenharmony_ci     */
2033d0407baSopenharmony_ci    struct rlimit rlim[RLIM_NLIMITS];
2043d0407baSopenharmony_ci
2053d0407baSopenharmony_ci#ifdef CONFIG_BSD_PROCESS_ACCT
2063d0407baSopenharmony_ci    struct pacct_struct pacct; /* per-process accounting information */
2073d0407baSopenharmony_ci#endif
2083d0407baSopenharmony_ci#ifdef CONFIG_TASKSTATS
2093d0407baSopenharmony_ci    struct taskstats *stats;
2103d0407baSopenharmony_ci#endif
2113d0407baSopenharmony_ci#ifdef CONFIG_AUDIT
2123d0407baSopenharmony_ci    unsigned audit_tty;
2133d0407baSopenharmony_ci    struct tty_audit_buf *tty_audit_buf;
2143d0407baSopenharmony_ci#endif
2153d0407baSopenharmony_ci
2163d0407baSopenharmony_ci    /*
2173d0407baSopenharmony_ci     * Thread is the potential origin of an oom condition; kill first on
2183d0407baSopenharmony_ci     * oom
2193d0407baSopenharmony_ci     */
2203d0407baSopenharmony_ci    bool oom_flag_origin;
2213d0407baSopenharmony_ci    short oom_score_adj;      /* OOM kill score adjustment */
2223d0407baSopenharmony_ci    short oom_score_adj_min;  /* OOM kill score adjustment min value.
2233d0407baSopenharmony_ci                               * Only settable by CAP_SYS_RESOURCE. */
2243d0407baSopenharmony_ci    struct mm_struct *oom_mm; /* recorded mm when the thread group got
2253d0407baSopenharmony_ci                               * killed by the oom killer */
2263d0407baSopenharmony_ci
2273d0407baSopenharmony_ci    struct mutex cred_guard_mutex;        /* guard against foreign influences on
2283d0407baSopenharmony_ci                                           * credential calculations
2293d0407baSopenharmony_ci                                           * (notably. ptrace)
2303d0407baSopenharmony_ci                                           * Deprecated do not use in new code.
2313d0407baSopenharmony_ci                                           * Use exec_update_lock instead.
2323d0407baSopenharmony_ci                                           */
2333d0407baSopenharmony_ci    struct rw_semaphore exec_update_lock; /* Held while task_struct is
2343d0407baSopenharmony_ci                                           * being updated during exec,
2353d0407baSopenharmony_ci                                           * and may have inconsistent
2363d0407baSopenharmony_ci                                           * permissions.
2373d0407baSopenharmony_ci                                           */
2383d0407baSopenharmony_ci} __randomize_layout;
2393d0407baSopenharmony_ci
2403d0407baSopenharmony_ci/*
2413d0407baSopenharmony_ci * Bits in flags field of signal_struct.
2423d0407baSopenharmony_ci */
2433d0407baSopenharmony_ci#define SIGNAL_STOP_STOPPED 0x00000001   /* job control stop in effect */
2443d0407baSopenharmony_ci#define SIGNAL_STOP_CONTINUED 0x00000002 /* SIGCONT since WCONTINUED reap */
2453d0407baSopenharmony_ci#define SIGNAL_GROUP_EXIT 0x00000004     /* group exit in progress */
2463d0407baSopenharmony_ci#define SIGNAL_GROUP_COREDUMP 0x00000008 /* coredump in progress */
2473d0407baSopenharmony_ci/*
2483d0407baSopenharmony_ci * Pending notifications to parent.
2493d0407baSopenharmony_ci */
2503d0407baSopenharmony_ci#define SIGNAL_CLD_STOPPED 0x00000010
2513d0407baSopenharmony_ci#define SIGNAL_CLD_CONTINUED 0x00000020
2523d0407baSopenharmony_ci#define SIGNAL_CLD_MASK (SIGNAL_CLD_STOPPED | SIGNAL_CLD_CONTINUED)
2533d0407baSopenharmony_ci
2543d0407baSopenharmony_ci#define SIGNAL_UNKILLABLE 0x00000040 /* for init: ignore fatal signals */
2553d0407baSopenharmony_ci
2563d0407baSopenharmony_ci#define SIGNAL_STOP_MASK (SIGNAL_CLD_MASK | SIGNAL_STOP_STOPPED | SIGNAL_STOP_CONTINUED)
2573d0407baSopenharmony_ci
2583d0407baSopenharmony_cistatic inline void signal_set_stop_flags(struct signal_struct *sig, unsigned int flags)
2593d0407baSopenharmony_ci{
2603d0407baSopenharmony_ci    WARN_ON(sig->flags & (SIGNAL_GROUP_EXIT | SIGNAL_GROUP_COREDUMP));
2613d0407baSopenharmony_ci    sig->flags = (sig->flags & ~SIGNAL_STOP_MASK) | flags;
2623d0407baSopenharmony_ci}
2633d0407baSopenharmony_ci
2643d0407baSopenharmony_ci/* If true, all threads except ->group_exit_task have pending SIGKILL */
2653d0407baSopenharmony_cistatic inline int signal_group_exit(const struct signal_struct *sig)
2663d0407baSopenharmony_ci{
2673d0407baSopenharmony_ci    return (sig->flags & SIGNAL_GROUP_EXIT) || (sig->group_exit_task != NULL);
2683d0407baSopenharmony_ci}
2693d0407baSopenharmony_ci
2703d0407baSopenharmony_ciextern void flush_signals(struct task_struct *);
2713d0407baSopenharmony_ciextern void ignore_signals(struct task_struct *);
2723d0407baSopenharmony_ciextern void flush_signal_handlers(struct task_struct *, int force_default);
2733d0407baSopenharmony_ciextern int dequeue_signal(struct task_struct *task, sigset_t *mask, kernel_siginfo_t *info);
2743d0407baSopenharmony_ci
2753d0407baSopenharmony_cistatic inline int kernel_dequeue_signal(void)
2763d0407baSopenharmony_ci{
2773d0407baSopenharmony_ci    struct task_struct *task = current;
2783d0407baSopenharmony_ci    kernel_siginfo_t _info;
2793d0407baSopenharmony_ci    int ret;
2803d0407baSopenharmony_ci
2813d0407baSopenharmony_ci    spin_lock_irq(&task->sighand->siglock);
2823d0407baSopenharmony_ci    ret = dequeue_signal(task, &task->blocked, &_info);
2833d0407baSopenharmony_ci    spin_unlock_irq(&task->sighand->siglock);
2843d0407baSopenharmony_ci
2853d0407baSopenharmony_ci    return ret;
2863d0407baSopenharmony_ci}
2873d0407baSopenharmony_ci
2883d0407baSopenharmony_cistatic inline void kernel_signal_stop(void)
2893d0407baSopenharmony_ci{
2903d0407baSopenharmony_ci    spin_lock_irq(&current->sighand->siglock);
2913d0407baSopenharmony_ci    if (current->jobctl & JOBCTL_STOP_DEQUEUED) {
2923d0407baSopenharmony_ci        set_special_state(TASK_STOPPED);
2933d0407baSopenharmony_ci    }
2943d0407baSopenharmony_ci    spin_unlock_irq(&current->sighand->siglock);
2953d0407baSopenharmony_ci
2963d0407baSopenharmony_ci    schedule();
2973d0407baSopenharmony_ci}
2983d0407baSopenharmony_ci#ifdef __ARCH_SI_TRAPNO
2993d0407baSopenharmony_ci#define ___ARCH_SI_TRAPNO(_a1) (, _a1)
3003d0407baSopenharmony_ci#else
3013d0407baSopenharmony_ci#define ___ARCH_SI_TRAPNO(_a1)
3023d0407baSopenharmony_ci#endif
3033d0407baSopenharmony_ci#ifdef __ia64__
3043d0407baSopenharmony_ci#define ___ARCH_SI_IA64(_a1, _a2, _a3) (, _a1, _a2, _a3)
3053d0407baSopenharmony_ci#else
3063d0407baSopenharmony_ci#define ___ARCH_SI_IA64(_a1, _a2, _a3)
3073d0407baSopenharmony_ci#endif
3083d0407baSopenharmony_ci
3093d0407baSopenharmony_ciint force_sig_fault_to_task(int sig, int code,
3103d0407baSopenharmony_ci                            void __user *addr ___ARCH_SI_TRAPNO(int trapno)
3113d0407baSopenharmony_ci                                ___ARCH_SI_IA64(int imm, unsigned int flags, unsigned long isr),
3123d0407baSopenharmony_ci                            struct task_struct *t);
3133d0407baSopenharmony_ciint force_sig_fault(int sig, int code,
3143d0407baSopenharmony_ci                    void __user *addr ___ARCH_SI_TRAPNO(int trapno)
3153d0407baSopenharmony_ci                        ___ARCH_SI_IA64(int imm, unsigned int flags, unsigned long isr));
3163d0407baSopenharmony_ciint send_sig_fault(int sig, int code,
3173d0407baSopenharmony_ci                   void __user *addr ___ARCH_SI_TRAPNO(int trapno)
3183d0407baSopenharmony_ci                        ___ARCH_SI_IA64(int imm, unsigned int flags, unsigned long isr),
3193d0407baSopenharmony_ci                   struct task_struct *t);
3203d0407baSopenharmony_ci
3213d0407baSopenharmony_ciint force_sig_mceerr(int code, void __user *, short);
3223d0407baSopenharmony_ciint send_sig_mceerr(int code, void __user *, short, struct task_struct *);
3233d0407baSopenharmony_ci
3243d0407baSopenharmony_ciint force_sig_bnderr(void __user *addr, void __user *lower, void __user *upper);
3253d0407baSopenharmony_ciint force_sig_pkuerr(void __user *addr, u32 pkey);
3263d0407baSopenharmony_ci
3273d0407baSopenharmony_ciint force_sig_ptrace_errno_trap(int errno, void __user *addr);
3283d0407baSopenharmony_ci
3293d0407baSopenharmony_ciextern int send_sig_info(int, struct kernel_siginfo *, struct task_struct *);
3303d0407baSopenharmony_ciextern void force_sigsegv(int sig);
3313d0407baSopenharmony_ciextern int force_sig_info(struct kernel_siginfo *);
3323d0407baSopenharmony_ciextern int __kill_pgrp_info(int sig, struct kernel_siginfo *info, struct pid *pgrp);
3333d0407baSopenharmony_ciextern int kill_pid_info(int sig, struct kernel_siginfo *info, struct pid *pid);
3343d0407baSopenharmony_ciextern int kill_pid_usb_asyncio(int sig, int errno, sigval_t addr, struct pid *, const struct cred *);
3353d0407baSopenharmony_ciextern int kill_pgrp(struct pid *pid, int sig, int priv);
3363d0407baSopenharmony_ciextern int kill_pid(struct pid *pid, int sig, int priv);
3373d0407baSopenharmony_ciextern __must_check bool do_notify_parent(struct task_struct *, int);
3383d0407baSopenharmony_ciextern void __wake_up_parent(struct task_struct *p, struct task_struct *parent);
3393d0407baSopenharmony_ciextern void force_sig(int);
3403d0407baSopenharmony_ciextern int send_sig(int, struct task_struct *, int);
3413d0407baSopenharmony_ciextern int zap_other_threads(struct task_struct *p);
3423d0407baSopenharmony_ciextern struct sigqueue *sigqueue_alloc(void);
3433d0407baSopenharmony_ciextern void sigqueue_free(struct sigqueue *);
3443d0407baSopenharmony_ciextern int send_sigqueue(struct sigqueue *, struct pid *, enum pid_type);
3453d0407baSopenharmony_ciextern int do_sigaction(int, struct k_sigaction *, struct k_sigaction *);
3463d0407baSopenharmony_ci
3473d0407baSopenharmony_cistatic inline int restart_syscall(void)
3483d0407baSopenharmony_ci{
3493d0407baSopenharmony_ci    set_tsk_thread_flag(current, TIF_SIGPENDING);
3503d0407baSopenharmony_ci    return -ERESTARTNOINTR;
3513d0407baSopenharmony_ci}
3523d0407baSopenharmony_ci
3533d0407baSopenharmony_cistatic inline int task_sigpending(struct task_struct *p)
3543d0407baSopenharmony_ci{
3553d0407baSopenharmony_ci    return unlikely(test_tsk_thread_flag(p,TIF_SIGPENDING));
3563d0407baSopenharmony_ci}
3573d0407baSopenharmony_ci
3583d0407baSopenharmony_cistatic inline int signal_pending(struct task_struct *p)
3593d0407baSopenharmony_ci{
3603d0407baSopenharmony_ci    /*
3613d0407baSopenharmony_ci     * TIF_NOTIFY_SIGNAL isn't really a signal, but it requires the same
3623d0407baSopenharmony_ci     * behavior in terms of ensuring that we break out of wait loops
3633d0407baSopenharmony_ci     * so that notify signal callbacks can be processed.
3643d0407baSopenharmony_ci     */
3653d0407baSopenharmony_ci    if (unlikely(test_tsk_thread_flag(p, TIF_NOTIFY_SIGNAL))) {
3663d0407baSopenharmony_ci        return 1;
3673d0407baSopenharmony_ci    }
3683d0407baSopenharmony_ci
3693d0407baSopenharmony_ci    return task_sigpending(p);
3703d0407baSopenharmony_ci}
3713d0407baSopenharmony_ci
3723d0407baSopenharmony_cistatic inline int __fatal_signal_pending(struct task_struct *p)
3733d0407baSopenharmony_ci{
3743d0407baSopenharmony_ci    return unlikely(sigismember(&p->pending.signal, SIGKILL));
3753d0407baSopenharmony_ci}
3763d0407baSopenharmony_ci
3773d0407baSopenharmony_cistatic inline int fatal_signal_pending(struct task_struct *p)
3783d0407baSopenharmony_ci{
3793d0407baSopenharmony_ci    return task_sigpending(p) && __fatal_signal_pending(p);
3803d0407baSopenharmony_ci}
3813d0407baSopenharmony_ci
3823d0407baSopenharmony_cistatic inline int signal_pending_state(long state, struct task_struct *p)
3833d0407baSopenharmony_ci{
3843d0407baSopenharmony_ci    if (!(state & (TASK_INTERRUPTIBLE | TASK_WAKEKILL))) {
3853d0407baSopenharmony_ci        return 0;
3863d0407baSopenharmony_ci    }
3873d0407baSopenharmony_ci    if (!signal_pending(p)) {
3883d0407baSopenharmony_ci        return 0;
3893d0407baSopenharmony_ci    }
3903d0407baSopenharmony_ci
3913d0407baSopenharmony_ci    return (state & TASK_INTERRUPTIBLE) || __fatal_signal_pending(p);
3923d0407baSopenharmony_ci}
3933d0407baSopenharmony_ci
3943d0407baSopenharmony_ci/*
3953d0407baSopenharmony_ci * This should only be used in fault handlers to decide whether we
3963d0407baSopenharmony_ci * should stop the current fault routine to handle the signals
3973d0407baSopenharmony_ci * instead, especially with the case where we've got interrupted with
3983d0407baSopenharmony_ci * a VM_FAULT_RETRY.
3993d0407baSopenharmony_ci */
4003d0407baSopenharmony_cistatic inline bool fault_signal_pending(vm_fault_t fault_flags, struct pt_regs *regs)
4013d0407baSopenharmony_ci{
4023d0407baSopenharmony_ci    return unlikely((fault_flags & VM_FAULT_RETRY) &&
4033d0407baSopenharmony_ci                    (fatal_signal_pending(current) || (user_mode(regs) && signal_pending(current))));
4043d0407baSopenharmony_ci}
4053d0407baSopenharmony_ci
4063d0407baSopenharmony_ci/*
4073d0407baSopenharmony_ci * Reevaluate whether the task has signals pending delivery.
4083d0407baSopenharmony_ci * Wake the task if so.
4093d0407baSopenharmony_ci * This is required every time the blocked sigset_t changes.
4103d0407baSopenharmony_ci * callers must hold sighand->siglock.
4113d0407baSopenharmony_ci */
4123d0407baSopenharmony_ciextern void recalc_sigpending_and_wake(struct task_struct *t);
4133d0407baSopenharmony_ciextern void recalc_sigpending(void);
4143d0407baSopenharmony_ciextern void calculate_sigpending(void);
4153d0407baSopenharmony_ci
4163d0407baSopenharmony_ciextern void signal_wake_up_state(struct task_struct *t, unsigned int state);
4173d0407baSopenharmony_ci
4183d0407baSopenharmony_cistatic inline void signal_wake_up(struct task_struct *t, bool resume)
4193d0407baSopenharmony_ci{
4203d0407baSopenharmony_ci    signal_wake_up_state(t, resume ? TASK_WAKEKILL : 0);
4213d0407baSopenharmony_ci}
4223d0407baSopenharmony_cistatic inline void ptrace_signal_wake_up(struct task_struct *t, bool resume)
4233d0407baSopenharmony_ci{
4243d0407baSopenharmony_ci    signal_wake_up_state(t, resume ? __TASK_TRACED : 0);
4253d0407baSopenharmony_ci}
4263d0407baSopenharmony_ci
4273d0407baSopenharmony_civoid task_join_group_stop(struct task_struct *task);
4283d0407baSopenharmony_ci
4293d0407baSopenharmony_ci#ifdef TIF_RESTORE_SIGMASK
4303d0407baSopenharmony_ci/*
4313d0407baSopenharmony_ci * Legacy restore_sigmask accessors.  These are inefficient on
4323d0407baSopenharmony_ci * SMP architectures because they require atomic operations.
4333d0407baSopenharmony_ci */
4343d0407baSopenharmony_ci
4353d0407baSopenharmony_ci/**
4363d0407baSopenharmony_ci * set_restore_sigmask() - make sure saved_sigmask processing gets done
4373d0407baSopenharmony_ci *
4383d0407baSopenharmony_ci * This sets TIF_RESTORE_SIGMASK and ensures that the arch signal code
4393d0407baSopenharmony_ci * will run before returning to user mode, to process the flag.  For
4403d0407baSopenharmony_ci * all callers, TIF_SIGPENDING is already set or it's no harm to set
4413d0407baSopenharmony_ci * it.  TIF_RESTORE_SIGMASK need not be in the set of bits that the
4423d0407baSopenharmony_ci * arch code will notice on return to user mode, in case those bits
4433d0407baSopenharmony_ci * are scarce.  We set TIF_SIGPENDING here to ensure that the arch
4443d0407baSopenharmony_ci * signal code always gets run when TIF_RESTORE_SIGMASK is set.
4453d0407baSopenharmony_ci */
4463d0407baSopenharmony_cistatic inline void set_restore_sigmask(void)
4473d0407baSopenharmony_ci{
4483d0407baSopenharmony_ci    set_thread_flag(TIF_RESTORE_SIGMASK);
4493d0407baSopenharmony_ci}
4503d0407baSopenharmony_ci
4513d0407baSopenharmony_cistatic inline void clear_tsk_restore_sigmask(struct task_struct *task)
4523d0407baSopenharmony_ci{
4533d0407baSopenharmony_ci    clear_tsk_thread_flag(task, TIF_RESTORE_SIGMASK);
4543d0407baSopenharmony_ci}
4553d0407baSopenharmony_ci
4563d0407baSopenharmony_cistatic inline void clear_restore_sigmask(void)
4573d0407baSopenharmony_ci{
4583d0407baSopenharmony_ci    clear_thread_flag(TIF_RESTORE_SIGMASK);
4593d0407baSopenharmony_ci}
4603d0407baSopenharmony_cistatic inline bool test_tsk_restore_sigmask(struct task_struct *task)
4613d0407baSopenharmony_ci{
4623d0407baSopenharmony_ci    return test_tsk_thread_flag(task, TIF_RESTORE_SIGMASK);
4633d0407baSopenharmony_ci}
4643d0407baSopenharmony_cistatic inline bool test_restore_sigmask(void)
4653d0407baSopenharmony_ci{
4663d0407baSopenharmony_ci    return test_thread_flag(TIF_RESTORE_SIGMASK);
4673d0407baSopenharmony_ci}
4683d0407baSopenharmony_cistatic inline bool test_and_clear_restore_sigmask(void)
4693d0407baSopenharmony_ci{
4703d0407baSopenharmony_ci    return test_and_clear_thread_flag(TIF_RESTORE_SIGMASK);
4713d0407baSopenharmony_ci}
4723d0407baSopenharmony_ci
4733d0407baSopenharmony_ci#else /* TIF_RESTORE_SIGMASK */
4743d0407baSopenharmony_ci
4753d0407baSopenharmony_ci/* Higher-quality implementation, used if TIF_RESTORE_SIGMASK doesn't exist. */
4763d0407baSopenharmony_cistatic inline void set_restore_sigmask(void)
4773d0407baSopenharmony_ci{
4783d0407baSopenharmony_ci    current->restore_sigmask = true;
4793d0407baSopenharmony_ci}
4803d0407baSopenharmony_cistatic inline void clear_tsk_restore_sigmask(struct task_struct *task)
4813d0407baSopenharmony_ci{
4823d0407baSopenharmony_ci    task->restore_sigmask = false;
4833d0407baSopenharmony_ci}
4843d0407baSopenharmony_cistatic inline void clear_restore_sigmask(void)
4853d0407baSopenharmony_ci{
4863d0407baSopenharmony_ci    current->restore_sigmask = false;
4873d0407baSopenharmony_ci}
4883d0407baSopenharmony_cistatic inline bool test_restore_sigmask(void)
4893d0407baSopenharmony_ci{
4903d0407baSopenharmony_ci    return current->restore_sigmask;
4913d0407baSopenharmony_ci}
4923d0407baSopenharmony_cistatic inline bool test_tsk_restore_sigmask(struct task_struct *task)
4933d0407baSopenharmony_ci{
4943d0407baSopenharmony_ci    return task->restore_sigmask;
4953d0407baSopenharmony_ci}
4963d0407baSopenharmony_cistatic inline bool test_and_clear_restore_sigmask(void)
4973d0407baSopenharmony_ci{
4983d0407baSopenharmony_ci    if (!current->restore_sigmask) {
4993d0407baSopenharmony_ci        return false;
5003d0407baSopenharmony_ci    }
5013d0407baSopenharmony_ci    current->restore_sigmask = false;
5023d0407baSopenharmony_ci    return true;
5033d0407baSopenharmony_ci}
5043d0407baSopenharmony_ci#endif
5053d0407baSopenharmony_ci
5063d0407baSopenharmony_cistatic inline void restore_saved_sigmask(void)
5073d0407baSopenharmony_ci{
5083d0407baSopenharmony_ci    if (test_and_clear_restore_sigmask()) {
5093d0407baSopenharmony_ci        __set_current_blocked(&current->saved_sigmask);
5103d0407baSopenharmony_ci    }
5113d0407baSopenharmony_ci}
5123d0407baSopenharmony_ci
5133d0407baSopenharmony_ciextern int set_user_sigmask(const sigset_t __user *umask, size_t sigsetsize);
5143d0407baSopenharmony_ci
5153d0407baSopenharmony_cistatic inline void restore_saved_sigmask_unless(bool interrupted)
5163d0407baSopenharmony_ci{
5173d0407baSopenharmony_ci    if (interrupted) {
5183d0407baSopenharmony_ci        WARN_ON(!signal_pending(current));
5193d0407baSopenharmony_ci    } else {
5203d0407baSopenharmony_ci        restore_saved_sigmask();
5213d0407baSopenharmony_ci    }
5223d0407baSopenharmony_ci}
5233d0407baSopenharmony_ci
5243d0407baSopenharmony_cistatic inline sigset_t *sigmask_to_save(void)
5253d0407baSopenharmony_ci{
5263d0407baSopenharmony_ci    sigset_t *res = &current->blocked;
5273d0407baSopenharmony_ci    if (unlikely(test_restore_sigmask())) {
5283d0407baSopenharmony_ci        res = &current->saved_sigmask;
5293d0407baSopenharmony_ci    }
5303d0407baSopenharmony_ci    return res;
5313d0407baSopenharmony_ci}
5323d0407baSopenharmony_ci
5333d0407baSopenharmony_cistatic inline int kill_cad_pid(int sig, int priv)
5343d0407baSopenharmony_ci{
5353d0407baSopenharmony_ci    return kill_pid(cad_pid, sig, priv);
5363d0407baSopenharmony_ci}
5373d0407baSopenharmony_ci
5383d0407baSopenharmony_ci/* These can be the second arg to send_sig_info/send_group_sig_info.  */
5393d0407baSopenharmony_ci#define SEND_SIG_NOINFO ((struct kernel_siginfo *)0)
5403d0407baSopenharmony_ci#define SEND_SIG_PRIV ((struct kernel_siginfo *)1)
5413d0407baSopenharmony_ci
5423d0407baSopenharmony_cistatic inline int __on_sig_stack(unsigned long sp)
5433d0407baSopenharmony_ci{
5443d0407baSopenharmony_ci#ifdef CONFIG_STACK_GROWSUP
5453d0407baSopenharmony_ci    return sp >= current->sas_ss_sp && sp - current->sas_ss_sp < current->sas_ss_size;
5463d0407baSopenharmony_ci#else
5473d0407baSopenharmony_ci    return sp > current->sas_ss_sp && sp - current->sas_ss_sp <= current->sas_ss_size;
5483d0407baSopenharmony_ci#endif
5493d0407baSopenharmony_ci}
5503d0407baSopenharmony_ci
5513d0407baSopenharmony_ci/*
5523d0407baSopenharmony_ci * True if we are on the alternate signal stack.
5533d0407baSopenharmony_ci */
5543d0407baSopenharmony_cistatic inline int on_sig_stack(unsigned long sp)
5553d0407baSopenharmony_ci{
5563d0407baSopenharmony_ci    /*
5573d0407baSopenharmony_ci     * If the signal stack is SS_AUTODISARM then, by construction, we
5583d0407baSopenharmony_ci     * can't be on the signal stack unless user code deliberately set
5593d0407baSopenharmony_ci     * SS_AUTODISARM when we were already on it.
5603d0407baSopenharmony_ci     *
5613d0407baSopenharmony_ci     * This improves reliability: if user state gets corrupted such that
5623d0407baSopenharmony_ci     * the stack pointer points very close to the end of the signal stack,
5633d0407baSopenharmony_ci     * then this check will enable the signal to be handled anyway.
5643d0407baSopenharmony_ci     */
5653d0407baSopenharmony_ci    if (current->sas_ss_flags & SS_AUTODISARM) {
5663d0407baSopenharmony_ci        return 0;
5673d0407baSopenharmony_ci    }
5683d0407baSopenharmony_ci
5693d0407baSopenharmony_ci    return __on_sig_stack(sp);
5703d0407baSopenharmony_ci}
5713d0407baSopenharmony_ci
5723d0407baSopenharmony_cistatic inline int sas_ss_flags(unsigned long sp)
5733d0407baSopenharmony_ci{
5743d0407baSopenharmony_ci    if (!current->sas_ss_size) {
5753d0407baSopenharmony_ci        return SS_DISABLE;
5763d0407baSopenharmony_ci    }
5773d0407baSopenharmony_ci
5783d0407baSopenharmony_ci    return on_sig_stack(sp) ? SS_ONSTACK : 0;
5793d0407baSopenharmony_ci}
5803d0407baSopenharmony_ci
5813d0407baSopenharmony_cistatic inline void sas_ss_reset(struct task_struct *p)
5823d0407baSopenharmony_ci{
5833d0407baSopenharmony_ci    p->sas_ss_sp = 0;
5843d0407baSopenharmony_ci    p->sas_ss_size = 0;
5853d0407baSopenharmony_ci    p->sas_ss_flags = SS_DISABLE;
5863d0407baSopenharmony_ci}
5873d0407baSopenharmony_ci
5883d0407baSopenharmony_cistatic inline unsigned long sigsp(unsigned long sp, struct ksignal *ksig)
5893d0407baSopenharmony_ci{
5903d0407baSopenharmony_ci    if (unlikely((ksig->ka.sa.sa_flags & SA_ONSTACK)) && !sas_ss_flags(sp))
5913d0407baSopenharmony_ci#ifdef CONFIG_STACK_GROWSUP
5923d0407baSopenharmony_ci        return current->sas_ss_sp;
5933d0407baSopenharmony_ci#else
5943d0407baSopenharmony_ci        return current->sas_ss_sp + current->sas_ss_size;
5953d0407baSopenharmony_ci#endif
5963d0407baSopenharmony_ci    return sp;
5973d0407baSopenharmony_ci}
5983d0407baSopenharmony_ci
5993d0407baSopenharmony_ciextern void __cleanup_sighand(struct sighand_struct *);
6003d0407baSopenharmony_ciextern void flush_itimer_signals(void);
6013d0407baSopenharmony_ci
6023d0407baSopenharmony_ci#define tasklist_empty() list_empty(&init_task.tasks)
6033d0407baSopenharmony_ci
6043d0407baSopenharmony_ci#define next_task(p) list_entry_rcu((p)->tasks.next, struct task_struct, tasks)
6053d0407baSopenharmony_ci
6063d0407baSopenharmony_ci#define for_each_process(p) for ((p) = &init_task; ((p) = next_task(p)) != &init_task;)
6073d0407baSopenharmony_ci
6083d0407baSopenharmony_ciextern bool current_is_single_threaded(void);
6093d0407baSopenharmony_ci
6103d0407baSopenharmony_ci/*
6113d0407baSopenharmony_ci * Careful: do_each_thread/while_each_thread is a double loop so
6123d0407baSopenharmony_ci *          'break' will not work as expected - use goto instead.
6133d0407baSopenharmony_ci */
6143d0407baSopenharmony_ci#define do_each_thread(g, t)                                                                                           \
6153d0407baSopenharmony_ci    for ((g) = (t) = &init_task; ((g) = (t) = next_task(g)) != &init_task;)                                            \
6163d0407baSopenharmony_ci        do
6173d0407baSopenharmony_ci
6183d0407baSopenharmony_ci#define while_each_thread(g, t) while (((t) = next_thread(t)) != (g))
6193d0407baSopenharmony_ci
6203d0407baSopenharmony_ci#define _for_each_thread(signal, t) list_for_each_entry_rcu(t, &(signal)->thread_head, thread_node)
6213d0407baSopenharmony_ci
6223d0407baSopenharmony_ci#define for_each_thread(p, t) _for_each_thread((p)->signal, t)
6233d0407baSopenharmony_ci
6243d0407baSopenharmony_ci/* Careful: this is a double loop, 'break' won't work as expected. */
6253d0407baSopenharmony_ci#define for_each_process_thread(p, t) for_each_process(p) for_each_thread(p, t)
6263d0407baSopenharmony_ci
6273d0407baSopenharmony_citypedef int (*proc_visitor)(struct task_struct *p, void *data);
6283d0407baSopenharmony_civoid walk_process_tree(struct task_struct *top, proc_visitor, void *);
6293d0407baSopenharmony_ci
6303d0407baSopenharmony_cistatic inline struct pid *task_pid_type(struct task_struct *task, enum pid_type type)
6313d0407baSopenharmony_ci{
6323d0407baSopenharmony_ci    struct pid *pid;
6333d0407baSopenharmony_ci    if (type == PIDTYPE_PID) {
6343d0407baSopenharmony_ci        pid = task_pid(task);
6353d0407baSopenharmony_ci    } else {
6363d0407baSopenharmony_ci        pid = task->signal->pids[type];
6373d0407baSopenharmony_ci    }
6383d0407baSopenharmony_ci    return pid;
6393d0407baSopenharmony_ci}
6403d0407baSopenharmony_ci
6413d0407baSopenharmony_cistatic inline struct pid *task_tgid(struct task_struct *task)
6423d0407baSopenharmony_ci{
6433d0407baSopenharmony_ci    return task->signal->pids[PIDTYPE_TGID];
6443d0407baSopenharmony_ci}
6453d0407baSopenharmony_ci
6463d0407baSopenharmony_ci/*
6473d0407baSopenharmony_ci * Without tasklist or RCU lock it is not safe to dereference
6483d0407baSopenharmony_ci * the result of task_pgrp/task_session even if task == current,
6493d0407baSopenharmony_ci * we can race with another thread doing sys_setsid/sys_setpgid.
6503d0407baSopenharmony_ci */
6513d0407baSopenharmony_cistatic inline struct pid *task_pgrp(struct task_struct *task)
6523d0407baSopenharmony_ci{
6533d0407baSopenharmony_ci    return task->signal->pids[PIDTYPE_PGID];
6543d0407baSopenharmony_ci}
6553d0407baSopenharmony_ci
6563d0407baSopenharmony_cistatic inline struct pid *task_session(struct task_struct *task)
6573d0407baSopenharmony_ci{
6583d0407baSopenharmony_ci    return task->signal->pids[PIDTYPE_SID];
6593d0407baSopenharmony_ci}
6603d0407baSopenharmony_ci
6613d0407baSopenharmony_cistatic inline int get_nr_threads(struct task_struct *task)
6623d0407baSopenharmony_ci{
6633d0407baSopenharmony_ci    return task->signal->nr_threads;
6643d0407baSopenharmony_ci}
6653d0407baSopenharmony_ci
6663d0407baSopenharmony_cistatic inline bool thread_group_leader(struct task_struct *p)
6673d0407baSopenharmony_ci{
6683d0407baSopenharmony_ci    return p->exit_signal >= 0;
6693d0407baSopenharmony_ci}
6703d0407baSopenharmony_ci
6713d0407baSopenharmony_cistatic inline bool same_thread_group(struct task_struct *p1, struct task_struct *p2)
6723d0407baSopenharmony_ci{
6733d0407baSopenharmony_ci    return p1->signal == p2->signal;
6743d0407baSopenharmony_ci}
6753d0407baSopenharmony_ci
6763d0407baSopenharmony_cistatic inline struct task_struct *next_thread(const struct task_struct *p)
6773d0407baSopenharmony_ci{
6783d0407baSopenharmony_ci    return list_entry_rcu(p->thread_group.next, struct task_struct, thread_group);
6793d0407baSopenharmony_ci}
6803d0407baSopenharmony_ci
6813d0407baSopenharmony_cistatic inline int thread_group_empty(struct task_struct *p)
6823d0407baSopenharmony_ci{
6833d0407baSopenharmony_ci    return list_empty(&p->thread_group);
6843d0407baSopenharmony_ci}
6853d0407baSopenharmony_ci
6863d0407baSopenharmony_ci#define delay_group_leader(p) (thread_group_leader(p) && !thread_group_empty(p))
6873d0407baSopenharmony_ci
6883d0407baSopenharmony_ciextern bool thread_group_exited(struct pid *pid);
6893d0407baSopenharmony_ci
6903d0407baSopenharmony_ciextern struct sighand_struct *__lock_task_sighand(struct task_struct *task, unsigned long *flags);
6913d0407baSopenharmony_ci
6923d0407baSopenharmony_cistatic inline struct sighand_struct *lock_task_sighand(struct task_struct *task, unsigned long *flags)
6933d0407baSopenharmony_ci{
6943d0407baSopenharmony_ci    struct sighand_struct *ret;
6953d0407baSopenharmony_ci
6963d0407baSopenharmony_ci    ret = __lock_task_sighand(task, flags);
6973d0407baSopenharmony_ci    (void)__cond_lock(&task->sighand->siglock, ret);
6983d0407baSopenharmony_ci    return ret;
6993d0407baSopenharmony_ci}
7003d0407baSopenharmony_ci
7013d0407baSopenharmony_cistatic inline void unlock_task_sighand(struct task_struct *task, unsigned long *flags)
7023d0407baSopenharmony_ci{
7033d0407baSopenharmony_ci    spin_unlock_irqrestore(&task->sighand->siglock, *flags);
7043d0407baSopenharmony_ci}
7053d0407baSopenharmony_ci
7063d0407baSopenharmony_cistatic inline unsigned long task_rlimit(const struct task_struct *task, unsigned int limit)
7073d0407baSopenharmony_ci{
7083d0407baSopenharmony_ci    return READ_ONCE(task->signal->rlim[limit].rlim_cur);
7093d0407baSopenharmony_ci}
7103d0407baSopenharmony_ci
7113d0407baSopenharmony_cistatic inline unsigned long task_rlimit_max(const struct task_struct *task, unsigned int limit)
7123d0407baSopenharmony_ci{
7133d0407baSopenharmony_ci    return READ_ONCE(task->signal->rlim[limit].rlim_max);
7143d0407baSopenharmony_ci}
7153d0407baSopenharmony_ci
7163d0407baSopenharmony_cistatic inline unsigned long rlimit(unsigned int limit)
7173d0407baSopenharmony_ci{
7183d0407baSopenharmony_ci    return task_rlimit(current, limit);
7193d0407baSopenharmony_ci}
7203d0407baSopenharmony_ci
7213d0407baSopenharmony_cistatic inline unsigned long rlimit_max(unsigned int limit)
7223d0407baSopenharmony_ci{
7233d0407baSopenharmony_ci    return task_rlimit_max(current, limit);
7243d0407baSopenharmony_ci}
7253d0407baSopenharmony_ci
7263d0407baSopenharmony_ci#endif /* _LINUX_SCHED_SIGNAL_H */
727