Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp10639881imu; Thu, 6 Dec 2018 04:33:13 -0800 (PST) X-Google-Smtp-Source: AFSGD/WkDilSJKG5k1Xs20NSkfQHIqCRETaRiBHCFOF8HBG1Wzf4oeMRgS94W6bKfyF2iT+EaxBb X-Received: by 2002:a65:624c:: with SMTP id q12mr22801717pgv.379.1544099593752; Thu, 06 Dec 2018 04:33:13 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1544099593; cv=none; d=google.com; s=arc-20160816; b=xh6oguDEDaInVBreDI4wrp84NHzRms3MvjoDVHTx40TZsLhHf3MNJeZCyr8u3yDKnq pWiOnQOAD103bGG7aZVaClUoK4csXhKVbpj/YLMI0DLKLj+km6rZfL+Qzk6f5At2/e+3 FqMWOdoAl1IEz/Zph4souMcl6KRjxPHhopI4AVtHm7DveWOpEOGyVXRbtfIlYmeFx4K6 tzKoS3px3LHurlecvaJmiAypxyJp0JtMJBVo8KvECHjHx+gteaw7h4FN2tx8BNnxsG5b mDPeDFalEXoNVET6Hh35sACKO7p9QPhEVF12Q9QvDOYDopFdAfU1+eFcOYZ0Y3QD2HEB 2GSg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:message-id :in-reply-to:date:references:subject:cc:to:from; bh=ZRGTYMEd5Bq42IyZ+1l4+QyfFRfeKjxcNOlIvFqw7OE=; b=e7cfszXAj6ZIlx0MMC4Py1vMNbA7b6vT8ElMBk+h6gbgwkeESVsEQBoKBoUaqSiK4Y cUjtLsOB4deESD5/hV2l6IqFIR18Cv4rfv+7iHbqAAByQ2jHwSgUA5V4bBUo1+m/zAKi AdaGEPH4vUmV3lvokIOv3hr4hLlj+KtjVbGzx0xjJUXOdo6THUtUY3LkT5GdYGXZ3mFD vLevw4mHaJ65S5GV2D2BrccCZRBJl8b/53xvFIJ5XnOnlTgmBlE127IB1GfPhcxTqyhX 6l3rCkJeeUAuu57BbivZO0k1995XfIN5DLOe1vBScGkPsw9SExR5ELEhGgwrt3I83XL4 8YzQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id q2si173693plr.204.2018.12.06.04.32.51; Thu, 06 Dec 2018 04:33:13 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729520AbeLFMa3 (ORCPT + 99 others); Thu, 6 Dec 2018 07:30:29 -0500 Received: from mx1.redhat.com ([209.132.183.28]:57158 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727996AbeLFMa2 (ORCPT ); Thu, 6 Dec 2018 07:30:28 -0500 Received: from smtp.corp.redhat.com (int-mx04.intmail.prod.int.phx2.redhat.com [10.5.11.14]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 1785489AD0; Thu, 6 Dec 2018 12:30:28 +0000 (UTC) Received: from oldenburg2.str.redhat.com (ovpn-116-105.ams2.redhat.com [10.36.116.105]) by smtp.corp.redhat.com (Postfix) with ESMTPS id E63C55D9D6; Thu, 6 Dec 2018 12:30:20 +0000 (UTC) From: Florian Weimer To: Christian Brauner Cc: linux-kernel@vger.kernel.org, linux-api@vger.kernel.org, luto@kernel.org, arnd@arndb.de, ebiederm@xmission.com, serge@hallyn.com, jannh@google.com, akpm@linux-foundation.org, oleg@redhat.com, cyphar@cyphar.com, viro@zeniv.linux.org.uk, linux-fsdevel@vger.kernel.org, dancol@google.com, timmurray@google.com, linux-man@vger.kernel.org, keescook@chromium.org, tglx@linutronix.de, x86@kernel.org Subject: Re: [PATCH v4] signal: add taskfd_send_signal() syscall References: <20181206121858.12215-1-christian@brauner.io> Date: Thu, 06 Dec 2018 13:30:19 +0100 In-Reply-To: <20181206121858.12215-1-christian@brauner.io> (Christian Brauner's message of "Thu, 6 Dec 2018 13:18:58 +0100") Message-ID: <87h8fq7s84.fsf@oldenburg2.str.redhat.com> User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/26.1 (gnu/linux) MIME-Version: 1.0 Content-Type: text/plain X-Scanned-By: MIMEDefang 2.79 on 10.5.11.14 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.26]); Thu, 06 Dec 2018 12:30:28 +0000 (UTC) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org * Christian Brauner: > /* zombies */ > Zombies can be signaled just as any other process. No special error will be > reported since a zombie state is an unreliable state (cf. [3]). I still disagree with this analysis. If I know that the target process is still alive, and it is not, this is a persistent error condition which can be reliably reported. Given that someone might send SIGKILL to the process behind my back, detecting this error condition could be useful. Rest looks good to me (with the usual caveats). Thanks, Florian