From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail-pf1-f193.google.com ([209.85.210.193]:42922 "EHLO mail-pf1-f193.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726512AbeLCSCp (ORCPT ); Mon, 3 Dec 2018 13:02:45 -0500 Received: by mail-pf1-f193.google.com with SMTP id 64so6752041pfr.9 for ; Mon, 03 Dec 2018 10:02:39 -0800 (PST) Date: Mon, 3 Dec 2018 19:02:29 +0100 From: Christian Brauner To: Florian Weimer Cc: ebiederm@xmission.com, linux-kernel@vger.kernel.org, serge@hallyn.com, jannh@google.com, luto@kernel.org, akpm@linux-foundation.org, oleg@redhat.com, cyphar@cyphar.com, viro@zeniv.linux.org.uk, linux-fsdevel@vger.kernel.org, linux-api@vger.kernel.org, dancol@google.com, timmurray@google.com, linux-man@vger.kernel.org, Kees Cook Subject: Re: [PATCH v2] signal: add procfd_signal() syscall Message-ID: <20181203180224.fkvw4kajtbvru2ku@brauner.io> References: <20181120105124.14733-1-christian@brauner.io> <87in0g5aqo.fsf@oldenburg.str.redhat.com> <746B7C49-CC7B-4040-A7EF-82491796D360@brauner.io> <20181202100304.labt63mzrlr5utdl@brauner.io> <8736rebl9s.fsf@oldenburg.str.redhat.com> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: <8736rebl9s.fsf@oldenburg.str.redhat.com> Sender: linux-fsdevel-owner@vger.kernel.org List-ID: On Mon, Dec 03, 2018 at 05:57:51PM +0100, Florian Weimer wrote: > * Christian Brauner: > > > Ok, I finally have access to source code again. Scratch what I said above! > > I looked at the code and tested it. If the process has exited but not > > yet waited upon aka is a zombie procfd_send_signal() will return 0. This > > is identical to kill(2) behavior. It should've been sort-of obvious > > since when a process is in zombie state /proc/ will still be around > > which means that struct pid must still be around. > > Should we make this state more accessible, by providing a different > error code? No, I don't think we want that. Imho, It's not really helpful. Signals are still delivered to zombies. If zombie state were to always mean that no-one is going to wait on this thread anymore then it would make sense to me. But given that zombie can also mean that someone put a sleep(1000) right before their wait() call in the parent it seems odd to report back that it is a zombie. > > Will the system call ever return ESRCH, given that you have a handle for > the process? Yes, whenever you signal a process that has already been waited upon: - get procfd handle referring to - exits and is waited upon - procfd_send_signal(procfd, ...) returns -1 with errno == ESRCH > > >> >Looking at the rt_tgsigqueueinfo interface, is there a way to implement > >> >the “tg” part with the current procfd_signal interface? Would you use > >> >openat to retrieve the Tgid: line from "status"? > > > > Yes, the tg part can be implemented. > > I meant on top of the existing interface. See below. > > > As I pointed out in another mail my I is to make this work by using > > file descriptors for /proc//task/. I don't want this in the > > initial patchset though. I prefer to slowly add those features once > > we have gotten the basic functionality in. > > Do you want to land all this in one kernel release? I wonder how > applications are supposed to discover kernel support if functionality is > split across several kernel releases. If you get EINVAL or EBADF, it > may not be obvious what is going on. Sigh, I get that but I really don't want to have to land this in one big chunk. I want this syscall to go in in a as soon as we can to fulfill the most basic need: having a way that guarantees us that we signal the process that we intended to signal. The thread case is easy to implement on top of it. But I suspect we will quibble about the exact semantics for a long time. Even now we have been on multiple - justified - detrous. That's all pefectly fine and expected. But if we have the basic functionality in we have time to do all of that. We might even land it in the same kernel release still. I really don't want to come of as tea-party-kernel-conservative here but I have time-and-time again seen that making something fancy and cover ever interesting feature in one patchset takes a very very long time. If you care about userspace being able to detect that case I can return EOPNOTSUPP when a tid descriptor is passed. > > What happens if you use the new interface with an O_PATH descriptor? You get EINVAL. When an O_PATH file descriptor is created the kernel will set file->f_op = &empty_fops at which point the check I added if (!proc_is_tgid_procfd(f.file)) goto err; will fail. Imho this is correct behavior since technically signaling a struct pid is the equivalent of writing to a file and hence doesn't purely operate on the file descriptor level. Christian