Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp11072468imu; Thu, 6 Dec 2018 11:05:01 -0800 (PST) X-Google-Smtp-Source: AFSGD/XRXV7x6rep8cnzMDD/qGAnpxZ9fiBMg1FB+WgxQ+qiv8g6qNySgGyDWAsaSjQDCairOa20 X-Received: by 2002:a63:86c2:: with SMTP id x185mr23006584pgd.230.1544123101046; Thu, 06 Dec 2018 11:05:01 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1544123100; cv=none; d=google.com; s=arc-20160816; b=b8xpcI0my9Zm4kHR6qE6431fhLugWNC/g5U5GhWMfIivD/4Gq3ZFvp0uFWBAeUDQjv O/z8NIyKktGcMpOvdUa89CXD19lkSFmM7vFswl9wiHbEvGfsT9kv9I7abf2TGlMcJZp2 PdqMtjm2cbX4/Jm024PqRio6xp0Kmah/LmUpTT8dbCrVdXllOkKjvx+Msf9Z7lOp7ifz 2Kmbv+fuOBDkZEIr882E6cG7aFPjeNFe+FVuXlJmAPOVNh9st6i0b3O8ULRWjxpOjbIu RPyiyg/CvsEr9PnP8U8WNQHwqATpsAekuAiO2Et06oZAHv6QAoBIBW8QNNoV9/BrJy+L LaoA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:from:cc:to:subject :content-transfer-encoding:mime-version:references:in-reply-to :user-agent:date:dkim-signature; bh=QPlOkQh0m6/G5PL4R7Z69cysn/I3zGjF8duaHorvK4o=; b=imbE6paNPREPHtgrlHYXZkCWwSrI2XxZTG0FM3D4PZH6awf8tYiOk4kEYKdOdB04Rc tiKKYuKNtk0sTxNEnNkvHmt6YU7DDAimyfjP+tk35IJJpgwwBQ6xLUR1z7i5ou0MlT9N 1C4QDYUC2MLnykIHBwauUMAUELmVKmGZ9bmdLqLETCCPgNiZ0T9c0JUn4R97TDql/Ois 8MGm8aeQ1vDYNXva7SKxK9l3Bpd3jN+0TvtlVLyB+Jr/b0RyD5kQPVkENls3mxroLHAQ JIjLj1e8yJXwj9SkgwjzlwDOmB0+CsPvfhH7NlddyYUYlZ/XGj57BCSeHtWtN/WKsz/x 8s0g== ARC-Authentication-Results: i=1; mx.google.com; dkim=fail header.i=@brauner.io header.s=google header.b="TY/HOGlJ"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id r14si773684pgh.39.2018.12.06.11.04.34; Thu, 06 Dec 2018 11:05:00 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=fail header.i=@brauner.io header.s=google header.b="TY/HOGlJ"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1725946AbeLFTDy (ORCPT + 99 others); Thu, 6 Dec 2018 14:03:54 -0500 Received: from mail-pg1-f195.google.com ([209.85.215.195]:34752 "EHLO mail-pg1-f195.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725916AbeLFTDy (ORCPT ); Thu, 6 Dec 2018 14:03:54 -0500 Received: by mail-pg1-f195.google.com with SMTP id 17so560312pgg.1 for ; Thu, 06 Dec 2018 11:03:53 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=brauner.io; s=google; h=date:user-agent:in-reply-to:references:mime-version :content-transfer-encoding:subject:to:cc:from:message-id; bh=QPlOkQh0m6/G5PL4R7Z69cysn/I3zGjF8duaHorvK4o=; b=TY/HOGlJmZiO2Y0kl/F48LbJgrvoNgEJPJ4SW7Ua0uzcannPm5u8kdVbJ4wn3EiGmr 9cKWJY+egw3nWvVNQqD1W5/xQrY8/hhoBmYEt7ibNdp7NvQcOTvAzxcJRskPFMxMTnEi cjaM0/DBLIoDb+jj3ekwfj0WpaS7uxh5AZLZ3Bzu92B0KQ6fwEYa+DQyKCweGRq7TelV m34xN06hn387AwRCYpB22IwuR6ih5Yy7TRZrU9YPv29b4FVLSDZbw2RG2fn21wKNftFN RU4oLcbGjaBZ9yT/bz+Dx50Cex1aEAWDCaXGWshW+AIEfZKoXU/pmQ+o3KMqS7+O9ZKf NUwA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:user-agent:in-reply-to:references :mime-version:content-transfer-encoding:subject:to:cc:from :message-id; bh=QPlOkQh0m6/G5PL4R7Z69cysn/I3zGjF8duaHorvK4o=; b=iYG4StA3+qC0Be4z0+hdUICsQJxnmDpTgjxv4LNU3pa75T3Zqnqn93pb4tO3EYTbl0 h6eJW8tE4qsDjl901hTvmtx3H19Qy0Y0kUitfu3c5sa0sddTrX5BI/6EnIMak51QUD5U 35jOkFzGfym/oHjYIH/NaOdpJb/OdVlc/Y/RvssGAFQPvmMGUvSdToLztCRTJvgYJ/Am 7kcursLiQEPyUKmKz7hWSb9LBM5N4h9oareT7sgG+ZR85MWoq9AaArSRJnY4yAvzotON LhOaU22k3buSDHixeJzBUb47aO8pdkTcXaraia6so/eWUBBlye/aMEl7oQcppMtpK2CL YkVQ== X-Gm-Message-State: AA+aEWaS2mcb2H4dSALkMiZM+jDTADaFpgNziFuh1dZ6ncWokx5Js/to nkX9gQnFm37zu5TrybclZgQKTQ== X-Received: by 2002:a63:de46:: with SMTP id y6mr25121081pgi.198.1544123033462; Thu, 06 Dec 2018 11:03:53 -0800 (PST) Received: from ?IPv6:2404:4404:133a:4500:138:8204:e16a:7a26? ([2404:4404:133a:4500:138:8204:e16a:7a26]) by smtp.gmail.com with ESMTPSA id v190sm1341964pfv.26.2018.12.06.11.03.51 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Thu, 06 Dec 2018 11:03:52 -0800 (PST) Date: Fri, 07 Dec 2018 08:03:45 +1300 User-Agent: K-9 Mail for Android In-Reply-To: <87y392h4b7.fsf@oldenburg2.str.redhat.com> References: <20181120105124.14733-1-christian@brauner.io> <87in0g5aqo.fsf@oldenburg.str.redhat.com> <746B7C49-CC7B-4040-A7EF-82491796D360@brauner.io> <20181202100304.labt63mzrlr5utdl@brauner.io> <8736rebl9s.fsf@oldenburg.str.redhat.com> <20181203180224.fkvw4kajtbvru2ku@brauner.io> <874lbtjvtd.fsf@oldenburg2.str.redhat.com> <87y392h4b7.fsf@oldenburg2.str.redhat.com> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: quoted-printable Subject: Re: [PATCH v2] signal: add procfd_signal() syscall To: Florian Weimer , Andy Lutomirski CC: "Eric W. Biederman" , LKML , "Serge E. Hallyn" , Jann Horn , Andrew Morton , Oleg Nesterov , Aleksa Sarai , Al Viro , Linux FS Devel , Linux API , Daniel Colascione , Tim Murray , linux-man , Kees Cook From: Christian Brauner Message-ID: Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On December 7, 2018 7:56:44 AM GMT+13:00, Florian Weimer wrote: >* Andy Lutomirski: > >>> I suppose that's fine=2E Or alternatively, when thread group support >is >>> added, introduce a flag that applications have to use to enable it, >so >>> that they can probe for support by checking support for the flag=2E >>> >>> I wouldn't be opposed to a new system call like this either: >>> >>> int procfd_open (pid_t thread_group, pid_t thread_id, unsigned >flags); >>> >>> But I think this is frowned upon on the kernel side=2E >> >> I have no problem with it, except that I think it shouldn=E2=80=99t ret= urn an >> fd that can be used for proc filesystem access=2E > >Oh no, my intention was that it would just be used with *_send_signal >and related functions=2E Let's postpone that discussion a little=2E I think we don't need a syscall to base this off of pids=2E As I said I rather send my revived version of CLONE_NEWFD that would serve= the same task=2E The same way we could also just add a new open() flag that blocks fs acces= s completely=2E I just pitched that idea to Serge a few days back: O_NOCHDIR or similar=2E That could even be part of Aleksa's path resolution patchset=2E > >Thanks, >Florian