1 .\" Copyright (c) 1992 Drew Eckhardt (drew@cs.colorado.edu), March 28, 1992
3 .\" SPDX-License-Identifier: Linux-man-pages-copyleft
5 .\" Modified by Michael Haardt <michael@moria.de>
6 .\" Modified by Thomas Koenig <ig25@rz.uni-karlsruhe.de>
7 .\" Modified 1993-07-23 by Rik Faith <faith@cs.unc.edu>
8 .\" Modified 1993-07-25 by Rik Faith <faith@cs.unc.edu>
9 .\" Modified 1995-11-01 by Michael Haardt
10 .\" <michael@cantor.informatik.rwth-aachen.de>
11 .\" Modified 1996-04-14 by Andries Brouwer <aeb@cwi.nl>
12 .\" [added some polishing contributed by Mike Battersby <mib@deakin.edu.au>]
13 .\" Modified 1996-07-21 by Andries Brouwer <aeb@cwi.nl>
14 .\" Modified 1997-01-17 by Andries Brouwer <aeb@cwi.nl>
15 .\" Modified 2001-12-18 by Andries Brouwer <aeb@cwi.nl>
16 .\" Modified 2002-07-24 by Michael Kerrisk <mtk.manpages@gmail.com>
17 .\" Added note on historical rules enforced when an unprivileged process
19 .\" Modified 2004-06-16 by Michael Kerrisk <mtk.manpages@gmail.com>
20 .\" Added note on CAP_KILL
21 .\" Modified 2004-06-24 by aeb
22 .\" Modified, 2004-11-30, after idea from emmanuel.colbus@ensimag.imag.fr
24 .TH KILL 2 2022-09-09 "Linux man-pages (unreleased)"
26 kill \- send signal to a process
29 .RI ( libc ", " \-lc )
32 .B #include <signal.h>
34 .BI "int kill(pid_t " pid ", int " sig );
38 Feature Test Macro Requirements for glibc (see
39 .BR feature_test_macros (7)):
50 can be used to send any signal to any process group or process.
52 If \fIpid\fP is positive, then signal \fIsig\fP is sent to the
53 process with the ID specified by \fIpid\fP.
55 If \fIpid\fP equals 0, then \fIsig\fP is sent to every process in the
56 process group of the calling process.
58 If \fIpid\fP equals \-1, then \fIsig\fP is sent to every process
59 for which the calling process has permission to send signals,
60 except for process 1 (\fIinit\fP), but see below.
62 If \fIpid\fP is less than \-1, then \fIsig\fP is sent to every process
63 in the process group whose ID is \fI\-pid\fP.
65 If \fIsig\fP is 0, then no signal is sent,
66 but existence and permission checks are still performed;
67 this can be used to check for the existence of a process ID or
68 process group ID that the caller is permitted to signal.
70 For a process to have permission to send a signal,
71 it must either be privileged (under Linux: have the
73 capability in the user namespace of the target process),
74 or the real or effective user ID of the sending process must equal
75 the real or saved set-user-ID of the target process.
78 it suffices when the sending and receiving
79 processes belong to the same session.
80 (Historically, the rules were different; see NOTES.)
82 On success (at least one signal was sent), zero is returned.
83 On error, \-1 is returned, and
85 is set to indicate the error.
89 An invalid signal was specified.
92 The calling process does not have permission to send the signal
93 to any of the target processes.
96 The target process or process group does not exist.
97 Note that an existing process might be a zombie,
98 a process that has terminated execution, but
103 POSIX.1-2001, POSIX.1-2008, SVr4, 4.3BSD.
105 The only signals that can be sent to process ID 1, the
107 process, are those for which
109 has explicitly installed signal handlers.
110 This is done to assure the
111 system is not brought down accidentally.
113 POSIX.1 requires that \fIkill(\-1,sig)\fP send \fIsig\fP
114 to all processes that the calling process may send signals to,
115 except possibly for some implementation-defined system processes.
116 Linux allows a process to signal itself, but on Linux the call
117 \fIkill(\-1,sig)\fP does not signal the calling process.
119 POSIX.1 requires that if a process sends a signal to itself,
120 and the sending thread does not have the signal blocked,
122 has it unblocked or is waiting for it in
125 unblocked signal must be delivered to the sending thread before the
129 Across different kernel versions, Linux has enforced different rules
130 for the permissions required for an unprivileged process
131 to send a signal to another process.
132 .\" In the 0.* kernels things chopped and changed quite
133 .\" a bit - MTK, 24 Jul 02
134 In kernels 1.0 to 1.2.2, a signal could be sent if the
135 effective user ID of the sender matched effective user ID of the target,
136 or the real user ID of the sender matched the real user ID of the target.
137 From kernel 1.2.3 until 1.3.77, a signal could be sent if the
138 effective user ID of the sender matched either the real or effective
139 user ID of the target.
140 The current rules, which conform to POSIX.1, were adopted
143 In 2.6 kernels up to and including 2.6.7,
144 there was a bug that meant that when sending signals to a process group,
146 failed with the error
148 if the caller did not have permission to send the signal to \fIany\fP (rather
149 than \fIall\fP) of the members of the process group.
150 Notwithstanding this error return, the signal was still delivered
151 to all of the processes for which the caller had permission to signal.
155 .BR pidfd_send_signal (2),
161 .BR capabilities (7),