Re: [PATCH v5 RESEND] signal: add pidfd_send_signal() syscall
From: Christian Brauner
Date: Fri Dec 28 2018 - 18:37:33 EST
On Fri, Dec 28, 2018 at 03:20:12PM -0800, Andrew Morton wrote:
> On Fri, 28 Dec 2018 23:48:53 +0100 Christian Brauner <christian@xxxxxxxxxx> wrote:
> > The kill() syscall operates on process identifiers (pid). After a process
> > has exited its pid can be reused by another process. If a caller sends a
> > signal to a reused pid it will end up signaling the wrong process. This
> > issue has often surfaced and there has been a push to address this problem .
> > This patch uses file descriptors (fd) from proc/<pid> as stable handles on
> > struct pid. Even if a pid is recycled the handle will not change. The fd
> > can be used to send signals to the process it refers to.
> > Thus, the new syscall pidfd_send_signal() is introduced to solve this
> > problem. Instead of pids it operates on process fds (pidfd).
So most of the questions you ask have been extensively discussed in
prior threads. All of them have links above in the long commit message.
> I can't see a description of what happens when the target process has
> exited. Is the task_struct pinned by the fd? Does the entire procfs
A reference to struct pid is kept. struct pid - as far as I understand -
was created exactly for the reason to not require to pin struct
task_struct. This is also noted in the comments to struct pid:
> directory remain visible? Just one entry within it? Does the pid
The same thing that happens when you currently keep an fd to /proc/<pid>
> remain reserved? Do attempts to signal that fd return errors?
The pid does not remain reserved. Which leads back to your question
about what happens when you try to signal a process that has exited: you
> etcetera. These behaviors should be described in the changelog and
> manipulate please.
I can add those questions to the changelog too.
> The code in signal.c appears to be compiled in even when
> CONFIG_PROC_FS=y. Can we add the appropriate ifdefs and an entry in
Without having looked super close at this from the top of my head I'd
say, yes we can.
> A selftest in toole/testing/selftests would be nice. And it will be
> helpful to architecture maintainers as they wire this up.
I can extend the sample program in the commit message to a selftest.
> The feature doesn't have its own Kconfig setting. Perhaps it should?
> It should presumably depend on PROC_FS.
Not sure why we should do this.
> I must say that I dislike the linkage to procfs. procfs is a
> high-level thing which is manipulated using syscalls. To turn around
> and make a syscall dependent upon the presence of procfs seems just ...
> wrong. Is there a cleaner way of obtaining the fd? Another syscall
We may do something like this in the future. There's another syscall
lined up at some point translate_pid() which we may extend to also give
back an fd to a process. For now the open() on /proc/<pid> is the
cleanest way of doing this.
> This fd-for-a-process sounds like a handy thing and people may well
> think up other uses for it in the future, probably unrelated to
> signals. Are the code and the interface designed to permit such future
> applications? I guess "no" - it presently assumes that anything which
This too has been discussed in prior threads linked in the commit
message. Yes, it does permit of such extension and we have already
publicly discussed future extensions (e.g. wait maybe a new clone
> is written to that fd is a signal. Perhaps there should be a tag at
> the start of the message (which is what it is) which identifies the
> message's type?
> Now I think about it, why a new syscall? This thing is looking rather
> like an ioctl?
Again, we have had a lengthy discussion about this and by now we all
agree that a dedicated syscall makes more sense than an ioctl() for
security reasons, because processes are a core-kernel concept, and we
intend to extend this api with syscalls in the future (e.g. wait etc.
also discussed in prior threads linked in here). There's also a summary
article on lwn about parts of this (https://lwn.net/Articles/773459/).