Received: by 2002:ac0:aa62:0:0:0:0:0 with SMTP id w31-v6csp2349634ima; Thu, 25 Oct 2018 13:46:33 -0700 (PDT) X-Google-Smtp-Source: AJdET5fpRlVZEquc+fu6sVH/9y5+4IEsDThNT7vY5Bq7U+TZD+8gcASsZGzVEhXj/lrUDuNcTBPN X-Received: by 2002:a63:a41:: with SMTP id z1mr663565pgk.117.1540500393448; Thu, 25 Oct 2018 13:46:33 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1540500393; cv=none; d=google.com; s=arc-20160816; b=BgtevsDWSUZnMGqDuodXkGU5+x7WWB9d9gp3tNQIu6H3ewSLaDdYGtjGpBYELooYbA D9EPk2lvFof0ohmou6HTeAYSLouUn7G32y++mMP9nSNxB5t4o3stLbXjhzlMmBXsfse+ uAAAKpfG9an9j5G5bLvqHhqB8pJkjW6i91yIXdKhBzn/rzKq5kwynLKDBJxvceh6IeZc /vp+r2KjGMIKS+e4fHX+5bMEuWMLmESTvvBica6DumsY8AV4y1KkF+Xw3MLyoxvagVGj 3Mhxbd8ZtI36nhi0LN1J1y74TMonE02+2oIRw+dEULuoIO6lm/4YR3pIDy0/ZRnlihPX 2iEA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject:dkim-signature; bh=domMLKuxgcUiuVFeRsvfF2sQ2XNj9jyoupPjxLYA6+c=; b=M0gozUbbRmQZgY0m+ouzmRebXeT/fMYNP7zY2FcprDIJx+Plmgwm9eHO3KWeLyb3kQ nWgvjvri7gCzmXL1GxFNte8KpTELOVk6wELV2MM9dVzB+K9yxlKrusoIME7fH4f/CL07 anzoFNr8qXpMoPATAL1hfQ6OT/H7Px8V/J+pD6TsZcEhaPGSFTtphRlS03UKSj0Xqtza T4m2bliCzxyFXdO9AJjWQCEcQxB/FqNLDrJkrmFEZbR8LByI6fKd6R+E53wsO16GN7Jh yohysiY1XjUYboi4uCsvg0b+4YPVXtaPVpRcQbDwUw3W7FQ7vti+VLWzYYNexwdAoAI7 IfdA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@cisco.com header.s=iport header.b=mlmoEQbi; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=cisco.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id z2-v6si9248067pgj.212.2018.10.25.13.46.16; Thu, 25 Oct 2018 13:46:33 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@cisco.com header.s=iport header.b=mlmoEQbi; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=cisco.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726113AbeJZFUB (ORCPT + 99 others); Fri, 26 Oct 2018 01:20:01 -0400 Received: from rcdn-iport-5.cisco.com ([173.37.86.76]:4156 "EHLO rcdn-iport-5.cisco.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725842AbeJZFUA (ORCPT ); Fri, 26 Oct 2018 01:20:00 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=7681; q=dns/txt; s=iport; t=1540500346; x=1541709946; h=subject:to:cc:references:from:message-id:date: mime-version:in-reply-to:content-transfer-encoding; bh=JqOX6hI/yUOX5YqyijtrM5gI9LVpQCehpXgvomRyAGM=; b=mlmoEQbi2twQ40M9SVZCUjwHLLTonWysg6sJ0IX+AP+WmMyECN9q65mN syvict4sYLOds88K1Y8CRxDhS2flXQzroeV0PNRdS59wofNoDFNVA1Lec 8xeUPUSjey+CJDxwzqOblCaLJSBvlVwMOT54CeXIeZ/iVJTarjTE4YyTN I=; X-IronPort-AV: E=Sophos;i="5.54,425,1534809600"; d="scan'208";a="253577095" Received: from alln-core-1.cisco.com ([173.36.13.131]) by rcdn-iport-5.cisco.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 25 Oct 2018 20:45:45 +0000 Received: from [10.154.208.133] ([10.154.208.133]) by alln-core-1.cisco.com (8.15.2/8.15.2) with ESMTP id w9PKjhea010453; Thu, 25 Oct 2018 20:45:43 GMT Subject: Re: [PATCH v2] kernel/signal: Signal-based pre-coredump notification To: "Eric W. Biederman" Cc: Thomas Gleixner , Ingo Molnar , Borislav Petkov , "H. Peter Anvin" , Peter Zijlstra , Arnd Bergmann , Khalid Aziz , Kate Stewart , Helge Deller , Greg Kroah-Hartman , Al Viro , Andrew Morton , Christian Brauner , Catalin Marinas , Will Deacon , Dave Martin , Mauro Carvalho Chehab , Michal Hocko , Rik van Riel , "Kirill A. Shutemov" , Roman Gushchin , Marcos Paulo de Souza , Oleg Nesterov , Dominik Brodowski , Cyrill Gorcunov , Yang Shi , Jann Horn , Kees Cook , x86@kernel.org, linux-kernel@vger.kernel.org, linux-arch@vger.kernel.org, "Victor Kamensky (kamensky)" , xe-linux-external@cisco.com, Stefan Strogin , Enke Chen References: <458c04d8-d189-4a26-729a-bb1d1d751534@cisco.com> <87sh0vpj5q.fsf@xmission.com> <87zhv2md04.fsf@xmission.com> From: Enke Chen Message-ID: Date: Thu, 25 Oct 2018 13:45:44 -0700 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.13; rv:52.0) Gecko/20100101 Thunderbird/52.9.1 MIME-Version: 1.0 In-Reply-To: <87zhv2md04.fsf@xmission.com> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit X-Auto-Response-Suppress: DR, OOF, AutoReply X-Outbound-SMTP-Client: 10.154.208.133, [10.154.208.133] X-Outbound-Node: alln-core-1.cisco.com Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi, Eric: It turns out that the definition of CLD_PREDUMP could well be considered as another instance of "over specification", and is completely unnecessary. When an application chooses a signal for pre-coredump notification, it is much simpler and robust for the signal to be dedicated for that purpose (in the parent) and not be mixed with other semantics. The "signo + pid" should be sufficient for the parent process in both 1:1 and 1:N models. So I will remove the CLD_PREDUMP and related definitions, and the code can then be simplified as the following: +static void do_notify_parent_predump(void) +{ + struct task_struct *parent; + int sig; + + read_lock(&tasklist_lock); + parent = current->parent; + sig = parent->signal->predump_signal; + if (sig != 0) + do_send_sig_info(sig, SEND_SIG_NOINFO, parent, PIDTYPE_TGID); + read_unlock(&tasklist_lock); +} I will follow up with your other comments. Thanks. -- Enke On 10/25/18 5:23 AM, Eric W. Biederman wrote: > Enke Chen writes: > >> Hi, Eric: >> >> Thanks for your comments. Please see my replies inline. >> >> On 10/24/18 6:29 AM, Eric W. Biederman wrote: >>> Enke Chen writes: >>> >>>> For simplicity and consistency, this patch provides an implementation >>>> for signal-based fault notification prior to the coredump of a child >>>> process. A new prctl command, PR_SET_PREDUMP_SIG, is defined that can >>>> be used by an application to express its interest and to specify the >>>> signal (SIGCHLD or SIGUSR1 or SIGUSR2) for such a notification. A new >>>> signal code (si_code), CLD_PREDUMP, is also defined for SIGCHLD. >>>> >>>> Changes to prctl(2): >>>> >>>> PR_SET_PREDUMP_SIG (since Linux 4.20.x) >>>> Set the child pre-coredump signal of the calling process to >>>> arg2 (either SIGUSR1, or SIUSR2, or SIGCHLD, or 0 to clear). >>>> This is the signal that the calling process will get prior to >>>> the coredump of a child process. This value is cleared across >>>> execve(2), or for the child of a fork(2). >>>> >>>> When SIGCHLD is specified, the signal code will be set to >>>> CLD_PREDUMP in such an SIGCHLD signal. >>> >>> Your signal handling is still not right. Please read and comprehend >>> siginfo_layout. >>> >>> You have not filled in all of the required fields for the SIGCHLD case. >>> For the non SIGCHLD case you are using si_code == 0 == SI_USER which is >>> very wrong. This is not a user generated signal. >>> >>> Let me say this slowly. The pair si_signo si_code determines the union >>> member of struct siginfo. That needs to be handled consistently. You >>> aren't. I just finished fixing this up in the entire kernel and now you >>> are trying to add a usage that is worst than most of the bugs I have >>> fixed. I really don't appreciate having to deal with no bugs. >>> >> >> My apologies. I will investigate and make them consistent. >> >>> >>> >>> Further siginfo can be dropped. Multiple signals with the same signal >>> number can be consolidated. What is your plan for dealing with that? >> >> The primary application for the early notification involves a process >> manager which is responsible for re-spawning processes or initiating >> the control-plane fail-over. There are two models: >> >> One model is to have 1:1 relationship between a process manager and >> application process. There can only be one predump-signal (say, SIGUSR1) >> from the child to the parent, and will unlikely be dropped or consolidated. >> >> Another model is to have 1:N where there is only one process manager with >> multiple application processes. One of the RT signal can be used to help >> make it more reliable. > > Which suggests you want one of the negative si_codes, and to use the _rt > siginfo member like sigqueue. > >>> Other code paths pair with wait to get the information out. There >>> is no equivalent of wait in your code. >> >> I was not aware of that before. Let me investigate. >> >>> >>> Signals can be delayed by quite a bit, scheduling delays etc. They can >>> not provide any meaningful kind of real time notification. >>> >> >> The timing requirement is about 50-100 msecs for BFD. Not sure if that >> qualifies as "real time". This mechanism has worked well in deployment >> over the years. > > It would help if those numbers were put into the patch description so > people can tell if the mechanism is quick enough. > >>> So between delays and loss of information signals appear to be a very >>> poor fit for this usecase. >>> >>> I am concerned about code that does not fit the usecase well because >>> such code winds up as code that no one cares about that must be >>> maintained indefinitely, because somewhere out there there is one use >>> that would break if the interface was removed. This does not feel like >>> an interface people will want to use and maintain in proper working >>> order forever. >>> >>> Ugh. Your test case is even using signalfd. So you don't even want >>> this signal to be delivered as a signal. >> >> I actually tested sigaction()/waitpid() as well. If there is a preference, >> I can check in the sigaction()/waitpid() version instead. >> >>> >>> You add an interface that takes a pointer and you don't add a compat >>> interface. See Oleg's point of just returning the signal number in the >>> return code. >> >> This is what Oleg said "but I won't insist, this is subjective and cosmetic". >> >> It is no big deal either way. It just seems less work if we do not keep >> adding exceptions to the prctl(2) manpage: >> >> prctl(2): >> >> On success, PR_GET_DUMPABLE, PR_GET_KEEPCAPS, PR_GET_NO_NEW_PRIVS, PR_CAPBSET_READ, PR_GET_TIMING, PR_GET_SECUREBITS, >> PR_MCE_KILL_GET, PR_CAP_AMBIENT+PR_CAP_AMBIENT_IS_SET, and (if it returns) PR_GET_SECCOMP return the nonnegative values described >> above. All other option values return 0 on success. On error, -1 is returned, and errno is set appropriately. > > More work in the man page versus less work in the kernel, and less code > to maintain. I will vote for more work in the man page. > >>> Now I am wondering how well prctl works from a 32bit process on a 64bit >>> kernel. At first glance it looks like it probably does not work. >>> >> >> I am not sure which part would be problematic. > > 32bit pointers need to be translated into 64bit pointers. If the system > call does not zero extend them. Plus structure sizes. > > I think prctl is just inside the line where problems happen but it is so > close to the line of structure size differences that it makes me > nervous. Typically pointers in structures are what cause system calls > to cross that line. > >>> Consistency with PDEATHSIG is not a good argument for anything. >>> PDEATHSIG at the present time is unusable in the real world by most >>> applications that want something like it. >> >> Agreed, PDEATHSIG seems to have a few issues ... >> >>> >>> So far I see an interface that even you don't want to use as designed, >>> that is implemented incorrectly. >>> >>> The concern is real and deserves to be addressed. I don't think signals >>> are the right way to handle it, and certainly not this patch as it >>> stands. >> >> I will address your concerns on the patch. Regarding the requirement and the >> overall solution, if there are specific questions that I have not answered, >> please let me know. > > So far so good. > > Eric >