Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp2235846yba; Fri, 19 Apr 2019 15:10:51 -0700 (PDT) X-Google-Smtp-Source: APXvYqwmT0lKGwnHGSzp2Mmw3omQnJ6eZrz1H3jkHzQ2IXUpNJCaMAKsq6US/64wytGI1UhmZnmF X-Received: by 2002:a62:14c3:: with SMTP id 186mr6448612pfu.21.1555711851142; Fri, 19 Apr 2019 15:10:51 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1555711851; cv=none; d=google.com; s=arc-20160816; b=ntSBygnssypbbM71fzoPe0UC8CpHgKTn7ACc5a/xc9txNnpoWTzI+qKH2trrV/BhGV m7wHmkbjF0FY4Qn0IVeMOxp6GH91JkxfJ76eWdivEiy3r0g0+sSpDfG9NqdxyUNb/YTQ CUb9Qt0jMvTHH7nc0PbomBIEGz9nLBnXrz7dOAoMO6vHw0yQhKTZI2p0DaDyWQh4hsum V9vMI0tof8oLYhKvw0/XGEe7wCuPXWncnzjVoMX7cm9pxDI4xd9HVi71B/NgAq6OqvMD f6GkzN2i6ANHA6qKjPI8JMJ4/31Ku36qDKu/bT1SKU5EUUP8nbgBu32RMwQ67FlLpHp2 TOCg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:dkim-signature; bh=fMiIUBFTvUHEyKHfCZq+VAab6/92ykh9ZHPcA4LjBC4=; b=kIGLh1gU/f2ostkgyitZDu/h9NmCmVUCDev5siJFcliNmmQaWOka5QJ1wey6vBz+FU UB70OyvCCT4MiPUM84VQvG+d0MrZa2OI7gSwXJCwHgP3tWxHu5YE/d35TMpVi84Zin76 euf6Jx9/yZV+JeXsFvJ/Ocp9Dkaep61SESNNXm/VBdA4RdD8B/vdYWMpZIJUW6eiDld9 vqqucaSE06T4Tz3AI0e9SNjpiS086GeY0xPJHz8bnzEBe4DPjcXsKpZUq2Ccqya6BQj5 vDIW7PJXiPO6bgsSmttwQKQIarK6eB6Bm1Y6aznzc1QytJO1U31RgSKBVOMmzVOIEKWF 5/Zw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=kODWHtTT; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id k8si6029268plt.354.2019.04.19.15.10.35; Fri, 19 Apr 2019 15:10:51 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=kODWHtTT; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726336AbfDSWI2 (ORCPT + 99 others); Fri, 19 Apr 2019 18:08:28 -0400 Received: from mail-oi1-f195.google.com ([209.85.167.195]:38696 "EHLO mail-oi1-f195.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725844AbfDSWI1 (ORCPT ); Fri, 19 Apr 2019 18:08:27 -0400 Received: by mail-oi1-f195.google.com with SMTP id a6so4866165oie.5 for ; Fri, 19 Apr 2019 15:08:27 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=fMiIUBFTvUHEyKHfCZq+VAab6/92ykh9ZHPcA4LjBC4=; b=kODWHtTTwTp1om+UFdXl6FMtlQq/BKBoa+LizmTc41xMnghRS/rg7bquqmvIvVEU1c RP55ry20HWwOTnr1UaCIQFKsTr6o2NTvDWbksxzVzcqA+fP/VUb1SEkBGO4qHl0XBeo2 JLX86fFYEM5+ilQTyLK6GIDq3RBKoAUzGFWpXhqWee1PWf2LesvzClGnspTWWub3EaLW dyzwW4/kusobqOkDiiHOa4oKWtoSJS8axOIwF+ZRPOow/jFTWNFOPuV+PZS1MbzJDWwA K7EgyPNN2y4q6dx1FeJYLKKbjXKGyAhkBqHbwdbb53x8CVMpaynwlIEEVqc1SQ4uUozt ZoOw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=fMiIUBFTvUHEyKHfCZq+VAab6/92ykh9ZHPcA4LjBC4=; b=dUDHT1WUNozdYBv9ErLQZWiNjNeIFVuBjHzl5c/2Go7A9VbdyCR6LRKR565TWEImKk iwOhC4l36A0y+qhqAjCVc6XEH4WDIq3d7LHNeD04j5HkQrEHYON4nHjsTnB4IpKrSsFj 2SVfsAoVUSKxF5LdBiC9fE73TueHV6K0SIhKE/vXWnuJUJ4JF2ee9zd7pmQ6hNrlGvlg MGrt8kOY8FJ3u/N3LwTAY6k4cEnWRgYh1G442UGmRWqyS8R137iX1wRLi9lF7X6raKDG gB/kjVZKKppc2F1tWvybmWEz/uVrKW4cb6Y0tyeRk2X7s/mwTaNN/+PsBQe+8u4gbH7+ Sfog== X-Gm-Message-State: APjAAAVsg6fFPbht3VCtqK1v1Xh701aEZ4AkvRsXNO7bXTjlFA1RNMMM Gp+Zfz2VQuc5DRIgzFyc02M8yZL70zIxVh/v+UflIg== X-Received: by 2002:aca:f086:: with SMTP id o128mr3045361oih.101.1555711706423; Fri, 19 Apr 2019 15:08:26 -0700 (PDT) MIME-Version: 1.0 References: <20190417130940.GC32622@redhat.com> <20190419190247.GB251571@google.com> <20190419191858.iwcvqm6fihbkaata@brauner.io> <20190419194902.GE251571@google.com> <20190419212002.GB44851@google.com> <20190419214506.GF251571@google.com> In-Reply-To: <20190419214506.GF251571@google.com> From: Daniel Colascione Date: Fri, 19 Apr 2019 15:08:14 -0700 Message-ID: Subject: Re: [PATCH RFC 1/2] Add polling support to pidfd To: Joel Fernandes Cc: Christian Brauner , Jann Horn , Oleg Nesterov , Florian Weimer , kernel list , Andy Lutomirski , Steven Rostedt , Suren Baghdasaryan , Linus Torvalds , Alexey Dobriyan , Al Viro , Andrei Vagin , Andrew Morton , Arnd Bergmann , "Eric W. Biederman" , Kees Cook , linux-fsdevel , "open list:KERNEL SELFTEST FRAMEWORK" , Michal Hocko , Nadav Amit , Serge Hallyn , Shuah Khan , Stephen Rothwell , Taehee Yoo , Tejun Heo , Thomas Gleixner , kernel-team , Tycho Andersen Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Apr 19, 2019 at 2:45 PM Joel Fernandes wrote: > > On Fri, Apr 19, 2019 at 02:24:09PM -0700, Daniel Colascione wrote: > > On Fri, Apr 19, 2019 at 2:20 PM Joel Fernandes wrote: > > > > > > On Fri, Apr 19, 2019 at 10:57:11PM +0200, Christian Brauner wrote: > > > > On Fri, Apr 19, 2019 at 10:34 PM Daniel Colascione wrote: > > > > > > > > > > On Fri, Apr 19, 2019 at 12:49 PM Joel Fernandes wrote: > > > > > > > > > > > > On Fri, Apr 19, 2019 at 09:18:59PM +0200, Christian Brauner wrote: > > > > > > > On Fri, Apr 19, 2019 at 03:02:47PM -0400, Joel Fernandes wrote: > > > > > > > > On Thu, Apr 18, 2019 at 07:26:44PM +0200, Christian Brauner wrote: > > > > > > > > > On April 18, 2019 7:23:38 PM GMT+02:00, Jann Horn wrote: > > > > > > > > > >On Wed, Apr 17, 2019 at 3:09 PM Oleg Nesterov wrote: > > > > > > > > > >> On 04/16, Joel Fernandes wrote: > > > > > > > > > >> > On Tue, Apr 16, 2019 at 02:04:31PM +0200, Oleg Nesterov wrote: > > > > > > > > > >> > > > > > > > > > > > >> > > Could you explain when it should return POLLIN? When the whole > > > > > > > > > >process exits? > > > > > > > > > >> > > > > > > > > > > >> > It returns POLLIN when the task is dead or doesn't exist anymore, > > > > > > > > > >or when it > > > > > > > > > >> > is in a zombie state and there's no other thread in the thread > > > > > > > > > >group. > > > > > > > > > >> > > > > > > > > > >> IOW, when the whole thread group exits, so it can't be used to > > > > > > > > > >monitor sub-threads. > > > > > > > > > >> > > > > > > > > > >> just in case... speaking of this patch it doesn't modify > > > > > > > > > >proc_tid_base_operations, > > > > > > > > > >> so you can't poll("/proc/sub-thread-tid") anyway, but iiuc you are > > > > > > > > > >going to use > > > > > > > > > >> the anonymous file returned by CLONE_PIDFD ? > > > > > > > > > > > > > > > > > > > >I don't think procfs works that way. /proc/sub-thread-tid has > > > > > > > > > >proc_tgid_base_operations despite not being a thread group leader. > > > > > > > > > >(Yes, that's kinda weird.) AFAICS the WARN_ON_ONCE() in this code can > > > > > > > > > >be hit trivially, and then the code will misbehave. > > > > > > > > > > > > > > > > > > > >@Joel: I think you'll have to either rewrite this to explicitly bail > > > > > > > > > >out if you're dealing with a thread group leader, or make the code > > > > > > > > > >work for threads, too. > > > > > > > > > > > > > > > > > > The latter case probably being preferred if this API is supposed to be > > > > > > > > > useable for thread management in userspace. > > > > > > > > > > > > > > > > At the moment, we are not planning to use this for sub-thread management. I > > > > > > > > am reworking this patch to only work on clone(2) pidfds which makes the above > > > > > > > > > > > > > > Indeed and agreed. > > > > > > > > > > > > > > > discussion about /proc a bit unnecessary I think. Per the latest CLONE_PIDFD > > > > > > > > patches, CLONE_THREAD with pidfd is not supported. > > > > > > > > > > > > > > Yes. We have no one asking for it right now and we can easily add this > > > > > > > later. > > > > > > > > > > > > > > Admittedly I haven't gotten around to reviewing the patches here yet > > > > > > > completely. But one thing about using POLLIN. FreeBSD is using POLLHUP > > > > > > > on process exit which I think is nice as well. How about returning > > > > > > > POLLIN | POLLHUP on process exit? > > > > > > > We already do things like this. For example, when you proxy between > > > > > > > ttys. If the process that you're reading data from has exited and closed > > > > > > > it's end you still can't usually simply exit because it might have still > > > > > > > buffered data that you want to read. The way one can deal with this > > > > > > > from userspace is that you can observe a (POLLHUP | POLLIN) event and > > > > > > > you keep on reading until you only observe a POLLHUP without a POLLIN > > > > > > > event at which point you know you have read > > > > > > > all data. > > > > > > > I like the semantics for pidfds as well as it would indicate: > > > > > > > - POLLHUP -> process has exited > > > > > > > - POLLIN -> information can be read > > > > > > > > > > > > Actually I think a bit different about this, in my opinion the pidfd should > > > > > > always be readable (we would store the exit status somewhere in the future > > > > > > which would be readable, even after task_struct is dead). So I was thinking > > > > > > we always return EPOLLIN. If process has not exited, then it blocks. > > > > > > > > > > ITYM that a pidfd polls as readable *once a task exits* and stays > > > > > readable forever. Before a task exit, a poll on a pidfd should *not* > > > > > yield POLLIN and reading that pidfd should *not* complete immediately. > > > > > There's no way that, having observed POLLIN on a pidfd, you should > > > > > ever then *not* see POLLIN on that pidfd in the future --- it's a > > > > > one-way transition from not-ready-to-get-exit-status to > > > > > ready-to-get-exit-status. > > > > > > > > What do you consider interesting state transitions? A listener on a pidfd > > > > in epoll_wait() might be interested if the process execs for example. > > > > That's a very valid use-case for e.g. systemd. > > > > We can't use EPOLLIN for that too otherwise you'd need to to waitid(_WNOHANG) > > > > to check whether an exit status can be read which is not nice and then you > > > > multiplex different meanings on the same bit. > > > > I would prefer if the exit status can only be read from the parent which is > > > > clean and the least complicated semantics, i.e. Linus waitid() idea. > > > > EPOLLIN on a pidfd could very well mean that data can be read via > > > > a read() on the pidfd *other* than the exit status. The read could e.g. > > > > give you a lean struct that indicates the type of state transition: NOTIFY_EXIT, > > > > NOTIFY_EXEC, etc.. This way we are not bound to a specific poll event indicating > > > > a specific state. > > > > Though there's a case to be made that EPOLLHUP could indicate process exit > > > > and EPOLLIN a state change + read(). > > > > > > According to Linus, POLLHUP usually indicates that something is readable: > > > > I don't think Linus said that POLLHUP means readable. He did say that > > it usually doesn't make sense to set POLLHUP without POLLIN, but > > that's not the same as POLLHUP indicating readability. > > Ok, fair enough. > > > > https://lkml.org/lkml/2019/4/18/1181 > > > "So generally a HUP condition should mean that POLLIN and POLLOUT also > > > get set. Not because there's any actual _data_ to be read, but simply > > > because the read will not block." > > > > > > I feel the future state changes such as for NOTIFY_EXEC can easily be > > > implemented on top of this patch. > > > > > > Just for the exit notification purposes, the states are: > > > if process has exit_state == 0, block. > > > if process is zombie/dead but not reaped, then return POLLIN > > > if process is reaped, then return POLLIN | POLLHUP > > > > Setting POLLHUP when the process is reaped is harmless, but I don't > > think it's useful. I can't think of a reason that anyone would care. > > We can also outright remove it. Oleg seemed to not mind it, in fact he said > it may be useful to indicate the reap status so at least I am inclined to > leave it in. > > > You can't block and wait on reaping, so you could only busy-wait, and > > you can look for ESRCH on any proc file today to detect reaping. I'd > > proc file reading is racy though. We shouldn't even talk about that since the > point of pidfd is to avoid such raw "pid" related races. It's not racy if you have a procfs dirfd handle open anyway. But since we moved to the two-kinds-of-file-descriptor model, there's no way to reliably open the procfs directory FD for a process that's exited but that's not yet been reaped. The fdinfo mechanism doesn't solve this problem. But adding a reap flag to poll output doesn't close the race either. I don't see any actual benefit to knowing via poll whether a process was reaped. If you can identify such a use case, great. Otherwise, I want to keep the poll interface simple and not specify semantics for POLLHUP.