Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp10682080imu; Thu, 6 Dec 2018 05:14:30 -0800 (PST) X-Google-Smtp-Source: AFSGD/WIq1C+iNR98ZVedBhiezFQq38iWofQMNO0m/fTSIm9Zt6mAiJfJkY1XZomJGvc4S+MChfe X-Received: by 2002:a17:902:2e01:: with SMTP id q1mr8986284plb.97.1544102070834; Thu, 06 Dec 2018 05:14:30 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1544102070; cv=none; d=google.com; s=arc-20160816; b=lOwQ04iftdT/htG0b+R0S6kA38dh7cyp5ky6b1y7CnqrOEP+7cnpMIRmW3XkiFfYmp hcLMwelkPHOKwzLCll3ybw/ErxyCoDB9j+3/tAYSn+hueTVrqhQ7I2hv+/vyvJcGu+jS vnndyPMzATzUncndHUKTmWy+GhMrn/Uyn7xwcOlggxTA4C2If9Rbt+sJ0w8jm/DNojSC BwiCqcz2Rv14BsA2UrwdsAw0nrx8WzEuGip9fZE0MIfWiRGmsRx6naJzvkQfjhJgbmV0 gz7NAyiifV8oKOucW+7DJx4M1Piha+xYPkcdbjj78D2xg5sQYWumuyO40Qvz1G64JfWD 904g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:message-id:in-reply-to:date:references:subject:cc:to :from; bh=ZpfAP3URmtJEPWzP6NgNTlrXGFep0ABwfx12vRqN4D4=; b=orMwYe2vh+pRPL2UY3c0YfdImw0RlJGY6jXPCPX+mU7ryUmzWMSFPU6e2U/YBbjShN RGzlceKrtnVcrAneuL58RAoqlCeIhstneQy7tq5dCUrqJV3AoymjiyE47fc3LffXzJ1q qQVOVtdT2wMjBhU/NF/EmZ1+r22KuK+THKuPNpGxtShyeJn164tbu+LQWVVyLieQCjHP Dlt3Ot/n9IarpLsy8N+N0RB1avwsHDdq2rhxa+9NEc5PFbPP1aMJAJGF6z2BuvNF4mnC fMDqAOmDRriUdnXkKsKvL4z3MUurYYjxsUUeztI9F/aGGa2FZcrabRRVlQWJw1qJRNcq 6Mlw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 2si259853pgj.104.2018.12.06.05.14.07; Thu, 06 Dec 2018 05:14:30 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729548AbeLFNMx convert rfc822-to-8bit (ORCPT + 99 others); Thu, 6 Dec 2018 08:12:53 -0500 Received: from mx1.redhat.com ([209.132.183.28]:53160 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728648AbeLFNMw (ORCPT ); Thu, 6 Dec 2018 08:12:52 -0500 Received: from smtp.corp.redhat.com (int-mx01.intmail.prod.int.phx2.redhat.com [10.5.11.11]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 443FFC0050CC; Thu, 6 Dec 2018 13:12:52 +0000 (UTC) Received: from oldenburg2.str.redhat.com (ovpn-116-105.ams2.redhat.com [10.36.116.105]) by smtp.corp.redhat.com (Postfix) with ESMTPS id A0F0D6012C; Thu, 6 Dec 2018 13:12:43 +0000 (UTC) From: Florian Weimer To: =?utf-8?Q?J=C3=BCrg?= Billeter Cc: Christian Brauner , linux-kernel@vger.kernel.org, linux-api@vger.kernel.org, luto@kernel.org, arnd@arndb.de, ebiederm@xmission.com, serge@hallyn.com, jannh@google.com, akpm@linux-foundation.org, oleg@redhat.com, cyphar@cyphar.com, viro@zeniv.linux.org.uk, linux-fsdevel@vger.kernel.org, dancol@google.com, timmurray@google.com, linux-man@vger.kernel.org, keescook@chromium.org, tglx@linutronix.de, x86@kernel.org Subject: Re: [PATCH v4] signal: add taskfd_send_signal() syscall References: <20181206121858.12215-1-christian@brauner.io> <87h8fq7s84.fsf@oldenburg2.str.redhat.com> Date: Thu, 06 Dec 2018 14:12:41 +0100 In-Reply-To: (=?utf-8?Q?=22J=C3=BCrg?= Billeter"'s message of "Thu, 06 Dec 2018 13:45:39 +0100") Message-ID: <87pnue6bp2.fsf@oldenburg2.str.redhat.com> User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/26.1 (gnu/linux) MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 8BIT X-Scanned-By: MIMEDefang 2.79 on 10.5.11.11 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.32]); Thu, 06 Dec 2018 13:12:52 +0000 (UTC) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org * Jürg Billeter: > On Thu, 2018-12-06 at 13:30 +0100, Florian Weimer wrote: >> * Christian Brauner: >> >> > /* zombies */ >> > Zombies can be signaled just as any other process. No special error will be >> > reported since a zombie state is an unreliable state (cf. [3]). >> >> I still disagree with this analysis. If I know that the target process >> is still alive, and it is not, this is a persistent error condition >> which can be reliably reported. Given that someone might send SIGKILL >> to the process behind my back, detecting this error condition could be >> useful. > > As I understand it, kill() behaves the same way. I think it's good that > this new syscall keeps the behavior as close as possible to kill(). No, kill does not behave in this way because the PID can be reused. The error condition is not stable there. Thanks, Florian