From: "Serge E. Hallyn" <serge@hallyn.com> To: Christian Brauner <christian@brauner.io> Cc: Daniel Colascione <dancol@google.com>, "Serge E. Hallyn" <serge@hallyn.com>, "Eric W. Biederman" <ebiederm@xmission.com>, linux-kernel <linux-kernel@vger.kernel.org>, Linux API <linux-api@vger.kernel.org>, Andy Lutomirski <luto@kernel.org>, Arnd Bergmann <arnd@arndb.de>, Jann Horn <jannh@google.com>, Andrew Morton <akpm@linux-foundation.org>, Oleg Nesterov <oleg@redhat.com>, Aleksa Sarai <cyphar@cyphar.com>, Al Viro <viro@zeniv.linux.org.uk>, Linux FS Devel <linux-fsdevel@vger.kernel.org>, Tim Murray <timmurray@google.com>, linux-man <linux-man@vger.kernel.org>, Kees Cook <keescook@chromium.org>, Florian Weimer <fweimer@redhat.com>, tglx@linutronix.de, x86@kernel.org Subject: Re: [PATCH v4] signal: add taskfd_send_signal() syscall Date: Fri, 7 Dec 2018 10:49:28 -0600 Message-ID: <20181207164928.GB972@mail.hallyn.com> (raw) In-Reply-To: <20181207015423.4miorx43l3qhppfz@brauner.io> On Fri, Dec 07, 2018 at 02:54:25AM +0100, Christian Brauner wrote: > On Thu, Dec 06, 2018 at 05:39:18PM -0800, Daniel Colascione wrote: > > On Thu, Dec 6, 2018 at 4:59 PM Serge E. Hallyn <serge@hallyn.com> wrote: > > > > > > On Thu, Dec 06, 2018 at 04:34:54PM -0800, Daniel Colascione wrote: > > > > On Thu, Dec 6, 2018 at 4:31 PM Serge E. Hallyn <serge@hallyn.com> wrote: > > > > > > > > > > On Fri, Dec 07, 2018 at 12:17:45AM +0100, Christian Brauner wrote: > > > > > > On Thu, Dec 06, 2018 at 11:39:48PM +0100, Christian Brauner wrote: > > > > > > > On Thu, Dec 06, 2018 at 03:46:53PM -0600, Eric W. Biederman wrote: > > > > > > > > Christian Brauner <christian@brauner.io> writes: > > > > > > > > > > > > > > > > >> Your intention is to add the thread case to support pthreads once the > > > > > > > > >> process case is sorted out. So this is something that needs to be made > > > > > > > > >> clear. Did I miss how you plan to handle threads? > > > > > > > > > > > > > > > > > > Yeah, maybe you missed it in the commit message [2] which is based on a > > > > > > > > > discussion with Andy [3] and Arnd [4]: > > > > > > > > > > > > > > > > Looking at your references I haven't missed it. You are not deciding > > > > > > > > anything as of yet to keep it simple. Except you are returning > > > > > > > > EOPNOTSUPP. You are very much intending to do something. > > > > > > > > > > > > > > That was clear all along and was pointed at every occassion in the > > > > > > > threads. I even went through the hazzle to give you all of the > > > > > > > references when there's lore.kernel.org. > > > > > > > > > > > > > > > > > > > > > > > Decide. Do you use the flags parameter or is the width of the > > > > > > > > target depending on the flags. > > > > > > > > > > > > Ok, let's try to be constructive. I understand the general concern for > > > > > > the future so let's put a contract into the commit message stating that > > > > > > the width of the target aka *what is signaled* will be based on a flag > > > > > > parameter if we ever extend it: > > > > > > > > > > > > taskfd_send_signal(fd, SIGSTOP, NULL, TASKFD_PGID); > > > > > > taskfd_send_signal(fd, SIGSTOP, NULL, TASKFD_TID); > > > > > > > > > > > > with the current default being > > > > > > > > > > > > taskfd_send_signal(fd, SIGSTOP, NULL, TASKFD_PID); > > > > > > > > > > > > This seems to me the cleanest solution as we only use one type of file > > > > > > descriptor. Can everyone be on board with this? If so I'm going to send > > > > > > out a new version of the patch. > > > > > > > > > > > > Christian > > > > > > > > > > I'm on board with this, but I think you need to also clarify what exactly > > > > > the fd stands for. I think that (a) userspace should not have to care > > > > > about the struct pid implementation, and so (b) the procfd should stand > > > > > for all the pids. So when taskfd_send_signal(fd, SIGSTOP, NULL, TASKFD_PGID) > > > > > becomes implemented, then open(/proc/5) will pin all three pids, as will > > > > > open(/proc/5/task/6). > > > > > > > > This change doesn't "pin" any PID, and it makes no sense to make a > > > > process FD stand for all its threads. What does that even mean? > > > > > > Currently the patch relies on the procfd inode saving a copy to the PIDTYPE_PID > > > pid. > > > > struct pid doesn't have a type field. The interpretation depends on > > the caller's use of the struct pid, and in the current path, that's > > PIDTYPE_PID. What, specifically, is wrong with the current approach? > > > > > I'm not sure offhand, can it go to the PIDTYPE_PGID from that after the > > > task has died, or not? I didn't think so. If it can then great. > > > > You're arguing that something that does, in fact, work, is somehow > > broken in some unspecified way. The kill_pid_info lookup works fine. > > What, specifically, is wrong with the semantics as implemented? > > > > > The point is (a) these are details which should not have to bother userspace, > > > > These details *don't* bother userspace. > > > > You're raising concerns that are either imaginary or long-since > > addressed. Does the patch cause some kind of maintenance burden? No, > > it doesn't, not moreso than any other piece of code. Does the > > interface have unclear semantics? No, it clearly sends a signal to a > > process, just like kill. Does the patch expose kernel implementation > > details? No, it doesn't, because the interface is simply not defined > > in terms of these details. Do we need to change how signal delivery > > works? No, because if it's fine for kill, it's fine for this facility, > > and if some future signal cleanup separates the cases more, that > > cleanup can change this code as well. > > > > The change is well-documented, simple, extensible, and addresses an > > actual problem. Every legitimate technical criticism has now been > > addressed. I don't understand where this opposition is coming from, > > since the objections refer to nothing that's actually in the patch or > > exposed to the user. > > > > > and (b) how to decide who we're sending the signal to (tid/pid/pgid) should > > > be specified in precisely one way. So either a flag, or comign from the type > > > of fd that was opened. > > > > You can't send signals to a thread with the current patch. There's no > > ambiguity in providing zero ways to do something. > > So Serge's point is not about changing the current patch. What he's Right, I'm an ack on the patch. As is no changes are needed. > basically saying is: If we are expected to state how we were to extend > this syscall in the future which Serge and I figured is currently Eric's > only remaining objection then: > - flags are a good way to go (I agree) > - there's a concrete way how to do this by stashing the relevent struct > pids for PIDTYPE_PID, PIDTYPE_TGID, PIDTYPE_PGID in file->private_data > which can then be retrieved in taskfd_send_signal() > There is not intent nor requirement to do this right now. What we have > right now is fine for a start, I agree! But here's how we go forward if > we ever need to! :) > > Christian
next prev parent reply index Thread overview: 38+ messages / expand[flat|nested] mbox.gz Atom feed top 2018-12-06 12:18 Christian Brauner 2018-12-06 12:30 ` Florian Weimer 2018-12-06 12:45 ` Jürg Billeter 2018-12-06 13:12 ` Florian Weimer 2018-12-06 13:18 ` Jürg Billeter 2018-12-06 13:20 ` Florian Weimer 2018-12-06 13:40 ` Eric W. Biederman 2018-12-06 13:44 ` Florian Weimer 2018-12-06 14:27 ` Aleksa Sarai 2018-12-06 14:46 ` Eric W. Biederman 2018-12-06 12:53 ` Christian Brauner 2018-12-06 13:17 ` Florian Weimer 2018-12-06 15:01 ` Eric W. Biederman 2018-12-06 16:17 ` Daniel Colascione 2018-12-06 17:24 ` Eric W. Biederman 2018-12-06 17:41 ` Christian Brauner 2018-12-06 18:30 ` Kees Cook 2018-12-06 22:27 ` Serge E. Hallyn 2018-12-06 17:14 ` Christian Brauner 2018-12-06 19:17 ` Eric W. Biederman 2018-12-06 19:30 ` Christian Brauner 2018-12-06 20:29 ` Eric W. Biederman 2018-12-06 20:37 ` Daniel Colascione 2018-12-06 22:22 ` Eric W. Biederman 2018-12-06 22:43 ` Daniel Colascione 2018-12-06 21:31 ` Christian Brauner 2018-12-06 21:46 ` Eric W. Biederman 2018-12-06 22:01 ` Daniel Colascione 2018-12-06 22:39 ` Christian Brauner 2018-12-06 23:17 ` Christian Brauner 2018-12-07 0:31 ` Serge E. Hallyn 2018-12-07 0:34 ` Daniel Colascione 2018-12-07 0:59 ` Serge E. Hallyn 2018-12-07 1:39 ` Daniel Colascione 2018-12-07 1:54 ` Christian Brauner 2018-12-07 16:49 ` Serge E. Hallyn [this message] 2018-12-07 16:47 ` Serge E. Hallyn 2018-12-08 21:46 ` kbuild test robot
Reply instructions: You may reply publicly to this message via plain-text email using any one of the following methods: * Save the following mbox file, import it into your mail client, and reply-to-all from there: mbox Avoid top-posting and favor interleaved quoting: https://en.wikipedia.org/wiki/Posting_style#Interleaved_style * Reply using the --to, --cc, and --in-reply-to switches of git-send-email(1): git send-email \ --in-reply-to=20181207164928.GB972@mail.hallyn.com \ --to=serge@hallyn.com \ --cc=akpm@linux-foundation.org \ --cc=arnd@arndb.de \ --cc=christian@brauner.io \ --cc=cyphar@cyphar.com \ --cc=dancol@google.com \ --cc=ebiederm@xmission.com \ --cc=fweimer@redhat.com \ --cc=jannh@google.com \ --cc=keescook@chromium.org \ --cc=linux-api@vger.kernel.org \ --cc=linux-fsdevel@vger.kernel.org \ --cc=linux-kernel@vger.kernel.org \ --cc=linux-man@vger.kernel.org \ --cc=luto@kernel.org \ --cc=oleg@redhat.com \ --cc=tglx@linutronix.de \ --cc=timmurray@google.com \ --cc=viro@zeniv.linux.org.uk \ --cc=x86@kernel.org \ /path/to/YOUR_REPLY https://kernel.org/pub/software/scm/git/docs/git-send-email.html * If your mail client supports setting the In-Reply-To header via mailto: links, try the mailto: link
LKML Archive on lore.kernel.org Archives are clonable: git clone --mirror https://lore.kernel.org/lkml/0 lkml/git/0.git git clone --mirror https://lore.kernel.org/lkml/1 lkml/git/1.git git clone --mirror https://lore.kernel.org/lkml/2 lkml/git/2.git git clone --mirror https://lore.kernel.org/lkml/3 lkml/git/3.git git clone --mirror https://lore.kernel.org/lkml/4 lkml/git/4.git git clone --mirror https://lore.kernel.org/lkml/5 lkml/git/5.git git clone --mirror https://lore.kernel.org/lkml/6 lkml/git/6.git git clone --mirror https://lore.kernel.org/lkml/7 lkml/git/7.git git clone --mirror https://lore.kernel.org/lkml/8 lkml/git/8.git git clone --mirror https://lore.kernel.org/lkml/9 lkml/git/9.git # If you have public-inbox 1.1+ installed, you may # initialize and index your mirror using the following commands: public-inbox-init -V2 lkml lkml/ https://lore.kernel.org/lkml \ linux-kernel@vger.kernel.org public-inbox-index lkml Example config snippet for mirrors Newsgroup available over NNTP: nntp://nntp.lore.kernel.org/org.kernel.vger.linux-kernel AGPL code for this site: git clone https://public-inbox.org/public-inbox.git