Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751962AbdFHUv1 (ORCPT ); Thu, 8 Jun 2017 16:51:27 -0400 Received: from mx1.redhat.com ([209.132.183.28]:54638 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751475AbdFHUvZ (ORCPT ); Thu, 8 Jun 2017 16:51:25 -0400 DMARC-Filter: OpenDMARC Filter v1.3.2 mx1.redhat.com D6C3061A08 Authentication-Results: ext-mx02.extmail.prod.ext.phx2.redhat.com; dmarc=none (p=none dis=none) header.from=redhat.com Authentication-Results: ext-mx02.extmail.prod.ext.phx2.redhat.com; spf=pass smtp.mailfrom=mpatocka@redhat.com DKIM-Filter: OpenDKIM Filter v2.11.0 mx1.redhat.com D6C3061A08 Date: Thu, 8 Jun 2017 16:51:19 -0400 (EDT) From: Mikulas Patocka X-X-Sender: mpatocka@file01.intranet.prod.int.rdu2.redhat.com To: Shaohua Li cc: NeilBrown , linux-raid@vger.kernel.org, linux-kernel@vger.kernel.org, Ingo Molnar , Peter Zijlstra Subject: Re: [PATCH] md: don't use flush_signals in userspace processes In-Reply-To: <20170608171551.ytxk3yz6xxsfbqma@kernel.org> Message-ID: References: <87h8zrart4.fsf@notabene.neil.brown.name> <20170608171551.ytxk3yz6xxsfbqma@kernel.org> User-Agent: Alpine 2.02 (LRH 1266 2009-07-14) MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.26]); Thu, 08 Jun 2017 20:51:25 +0000 (UTC) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 2214 Lines: 55 On Thu, 8 Jun 2017, Shaohua Li wrote: > On Thu, Jun 08, 2017 at 04:59:03PM +1000, Neil Brown wrote: > > On Wed, Jun 07 2017, Mikulas Patocka wrote: > > > > > The function flush_signals clears all pending signals for the process. It > > > may be used by kernel threads when we need to prepare a kernel thread for > > > responding to signals. However using this function for an userspaces > > > processes is incorrect - clearing signals without the program expecting it > > > can cause misbehavior. > > > > > > The raid1 and raid5 code uses flush_signals in its request routine because > > > it wants to prepare for an interruptible wait. This patch drops > > > flush_signals and uses sigprocmask instead to block all signals (including > > > SIGKILL) around the schedule() call. The signals are not lost, but the > > > schedule() call won't respond to them. > > > > > > Signed-off-by: Mikulas Patocka > > > Cc: stable@vger.kernel.org > > > > Thanks for catching that! > > > > Acked-by: NeilBrown > > Applied, thanks! > > Neil, > Not about the patch itself. I had question about that part of code. Dropped > others since this is raid related. I didn't get the point why it's a > TASK_INTERRUPTIBLE sleep. It seems suggesting the thread will bail out if a > signal is sent. But I didn't see we check the signal and exit the loop. What's > the correct behavior here? Since the suspend range is controlled by userspace, As I understand the code - the purpose is to have an UNINTERRUPTIBLE sleep that isn't accounted in load average and that doesn't trigger the hung task warning. There should really be something like TASK_UNINTERRUPTIBLE_LONG for this purpose. > I think the correct behavior is if user kills the thread, we exit the loop. So > it seems like to be we check if there is fatal signal pending, exit the loop, > and return IO error. Not sure if we should return IO error though. No, this is not correct - if we report an I/O error for the affected bio, it could corrupt filesystem or confuse other device mapper targets that could be on the top of MD. It is not right to corrupt filesystem if the user kills a process. > Thanks, > Shaohua Mikulas