Received: by 2002:ac0:bc90:0:0:0:0:0 with SMTP id a16csp3747232img; Mon, 25 Mar 2019 17:26:03 -0700 (PDT) X-Google-Smtp-Source: APXvYqx2bLYg6Uk2+UO7zFiUUfNirf4DdmqOFIiwAh7ZZFWJmOVOTJjBH6wsnTP79YP//alKbaGh X-Received: by 2002:a17:902:822:: with SMTP id 31mr28256597plk.290.1553559962943; Mon, 25 Mar 2019 17:26:02 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1553559962; cv=none; d=google.com; s=arc-20160816; b=0ScL7+AI1wGNaMrrD38PltZiA6V3ZMGCedu7GtsQHZV1ZuDlfpnjymYJ8sKxZP68e+ UcPYkU6NHx/FoSPUQvnX23ChkxV/zRNVeL3r9B0zssquTbDbWidJK16Q4Ug8c6csdYjs deFoQkoy7/F5ZoTZAEI9eRhqhIczNGmd0uwAOEfElm+X2tomiEvcwyBhYDrG7/caRP7X T1Bqq4C6Q2JxsuW4pmJIHfT7SQwSeuSn6bZqzB85UcqChL+PFQvSX5tzYIAsrYorI4Eb YXDgSGK/8mGGyBgAXNDTeDg97FM4XCl1S6nBr0objbs2U8AxSsmwuSuDA/maV2gfd/v+ KHZw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:dkim-signature; bh=1J/LRohgOYMCKjrW1AhYc3IQgT3kUYqXW24Yqo0FUVk=; b=AkbLAW+vlsj90+EhCWwJZd1GpXqrKjl0iZDtFgJi07T0ihBLUHNsH+jFaaHY43JD51 9A0uU3UqTRza+QRSO7qmplwf8qv+ju5XcKwrqkycUVF/SHvzrRohDS4vU52b3VpzuBT7 ye/0wbLUJCMUmfs+tAWKVqw/C1CKt6Z+LVfDPDqFF5+kcwLkJCmhuwYUxiRwhuPBDgzU 942WxN9GX63X5o1eEssr/U4sC3SLkgi8q6cs2KgvM9bhkMWfXjtbQH2MQgqSue+dtVtW XnC/RFwBvBzIxwMU4TWAI1r132zXMraCJtpDW8pxFFiReUL1qAbaDQPhbzF2UQwN13uX XPJw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=yA1WlJZN; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id f4si14277290pgv.118.2019.03.25.17.25.47; Mon, 25 Mar 2019 17:26:02 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=yA1WlJZN; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727492AbfCZAZE (ORCPT + 99 others); Mon, 25 Mar 2019 20:25:04 -0400 Received: from mail.kernel.org ([198.145.29.99]:44432 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726186AbfCZAZE (ORCPT ); Mon, 25 Mar 2019 20:25:04 -0400 Received: from mail-wr1-f47.google.com (mail-wr1-f47.google.com [209.85.221.47]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 72B362087E for ; Tue, 26 Mar 2019 00:25:02 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1553559902; bh=moN+zykb8LJi23F5i1HmNugTTV3G0I4cScO6wV9ZQjU=; h=References:In-Reply-To:From:Date:Subject:To:Cc:From; b=yA1WlJZNlVpKQorSa6pyd9UUzYIbH6aegdAvtZrADM8j2r9YLoQf+DuTBLCjp/eII tZWpgTqVAmrwLNl7kMz/qQYOuIzxv6oZlkdBsOu1xvdBjcYDoCUgWogVoBz/H3H9/J +KSIqGaAYxqpRxW//TyE8mycWEuP8J0BxWuP8ixs= Received: by mail-wr1-f47.google.com with SMTP id q1so12291001wrp.0 for ; Mon, 25 Mar 2019 17:25:02 -0700 (PDT) X-Gm-Message-State: APjAAAXGtgqOckuhRFCLvns91FWotR4uAbtS2CGy2VLhYqKYmuZpkjiw yeOBQhIjnqPmGXqXwWqOzwqejNoWONS7g4AsxmOOdw== X-Received: by 2002:a5d:4710:: with SMTP id y16mr16771189wrq.176.1553559900918; Mon, 25 Mar 2019 17:25:00 -0700 (PDT) MIME-Version: 1.0 References: <20190320185156.7bq775vvtsxqlzfn@brauner.io> <20190320191412.5ykyast3rgotz3nu@brauner.io> <20190325234547.wo6lyimrp52qie5p@brauner.io> <20190326001231.3tnhhlvzg26mof33@brauner.io> In-Reply-To: <20190326001231.3tnhhlvzg26mof33@brauner.io> From: Andy Lutomirski Date: Mon, 25 Mar 2019 17:24:49 -0700 X-Gmail-Original-Message-ID: Message-ID: Subject: Re: pidfd design To: Christian Brauner Cc: Andy Lutomirski , Daniel Colascione , Jann Horn , Joel Fernandes , Suren Baghdasaryan , Steven Rostedt , Sultan Alsawaf , Tim Murray , Michal Hocko , Greg Kroah-Hartman , =?UTF-8?B?QXJ2ZSBIasO4bm5ldsOlZw==?= , Todd Kjos , Martijn Coenen , Ingo Molnar , Peter Zijlstra , LKML , "open list:ANDROID DRIVERS" , kernel-team , Oleg Nesterov , "Serge E. Hallyn" , Kees Cook , Jonathan Kowalski , Linux API Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Mar 25, 2019 at 5:12 PM Christian Brauner wrote: > > On Mon, Mar 25, 2019 at 05:00:17PM -0700, Andy Lutomirski wrote: > > On Mon, Mar 25, 2019 at 4:45 PM Christian Brauner wrote: > > > > > > On Mon, Mar 25, 2019 at 04:42:14PM -0700, Andy Lutomirski wrote: > > > > On Mon, Mar 25, 2019 at 1:23 PM Daniel Colascione wrote: > > > > > > > > > > On Mon, Mar 25, 2019 at 1:14 PM Jann Horn wrote: > > > > > > > > > > > > On Mon, Mar 25, 2019 at 8:44 PM Andy Lutomirski wrote: > > > > > > > > > > One ioctl on procfs roots to translate pidfds into that procfs, > > > > > > subject to both the normal lookup permission checks and only working > > > > > > if the pidfd has a translation into the procfs: > > > > > > > > > > > > int proc_root_fd = open("/proc", O_RDONLY); > > > > > > int proc_dir_fd = ioctl(proc_root_fd, PROC_PIDFD_TO_PROCFSFD, pidfd); > > > > > > > > > > > > And one ioctl on procfs directories to translate from PGIDs and PIDs to pidfds: > > > > > > > > > > > > int proc_pgid_fd = open("/proc/self", O_RDONLY); > > > > > > int self_pg_pidfd = ioctl(proc_pgid_fd, PROC_PROCFSFD_TO_PIDFD, 0); > > > > > > int proc_pid_fd = open("/proc/thread-self", O_RDONLY); > > > > > > int self_p_pidfd = ioctl(proc_pid_fd, PROC_PROCFSFD_TO_PIDFD, 0); > > > > > > > > > > > > > > This sounds okay to me. Or we could make it so that a procfs > > > > directory fd also works as a pidfd, but that seems more likely to be > > > > problematic than just allowing two-way translation like this > > > > > > > > > > > > > > > > And then, as you proposed, the new sys_clone() can just return a > > > > > > pidfd, and you can convert it into a procfs fd yourself if you want. > > > > > > > > > > I think that's the consensus we reached on the other thread. The > > > > > O_DIRECTORY open on /proc/self/fd/mypidfd seems like it'd work well > > > > > enough. > > > > > > > > I must have missed this particular email. > > > > > > > > IMO, if /proc/self/fd/mypidfd allows O_DIRECTORY open to work, then it > > > > really ought to do function just like /proc/self/fd/mypidfd/. and > > > > /proc/self/fd/mypidfd/status should work. And these latter two > > > > options seem nutty. > > > > > > > > Also, this O_DIRECTORY thing is missing the entire point of the ioctl > > > > interface -- it doesn't require procfs access. > > > > > > The other option was to encode the pid in the callers pid namespace into > > > the pidfd's fdinfo so that you can parse it out and open /proc/. > > > You'd just need an event on the pidfd to tell you when the process has > > > died. Jonathan and I just discussed this. > > > > From an application developer's POV, the ioctl interface sounds much, > > much nicer. > > Some people are strongly against ioctl()s some don't. I'm not against > them so both options are fine with me if people can agree. > There are certainly non-ioctl equivalents that are functionally equivalent. For example, there could be a syscall procfs_open_pidfd(procfs_fd, pid_fd). I personally don't really mind ioctl() when it's really an operation on an fd.