Received: by 2002:a25:b794:0:0:0:0:0 with SMTP id n20csp123659ybh; Fri, 2 Aug 2019 19:31:54 -0700 (PDT) X-Google-Smtp-Source: APXvYqxyty965q2KLeVbteB7lXUm1aC+PiXi5BeYixfOecu/SYeizSAG6R6HMImcLbZXNHtGi9MS X-Received: by 2002:a17:902:bf09:: with SMTP id bi9mr125963970plb.143.1564799514573; Fri, 02 Aug 2019 19:31:54 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1564799514; cv=none; d=google.com; s=arc-20160816; b=hHErNZLSJno9g05l3DBU9MwsGDTC0MdF1MjwbMsIVqj+8P9XZAybdQ1zYD0KV9iOsl DR3d825bjolFnzKJJK1Nh7CwWVXx6mWhH61hl+49z/7HlhikxeMaKUAX+eTkEiTtWiwP LnjmC6dJNqYIzsZNKTzqsJnlTFrCLYQaPd3er2GUPvEcI0LAO+3t720m5cdZFbotu9tl 9+OqnsbCkUp2NC1D3IpUE74KYU4nsua0z24G6WuK54CUQzIDpT5yhL2CQi8P/XECgwT3 Oj5u6xtGLdSN92qW1RMmRs0oqXCqENKGSu/ZFvzYcCNwlRZxWPHQ9MWb9E+DztrsJFaP HZ6Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=GHmIbYYFWI5dv4XpjbJRyJ2OtAz9x7xlp15AwtxpQY0=; b=UBL2Ijf2xj3A88wdbGLlpoXnIfm6M4rT2z6ejyy91TTFq5FoDs9FUjkDy0gjjf5VWy lvjpPtUKG9x31BTTZR73ur+mCTIb7bSNoZAIt0UX6tGApRqgSklYjJNnCljlKdI8k5e9 Q3uApgLd+UVESrakppkNPJEldVbs2GUzs8G1QRv9Xl4u6m35TYK7QFmzK8G9EgWVM/iY Hz3s4sbrG//4Er3puvxs7MWfEsIvWKBjwXYrs4AeF3LaSi7xpD6zU/hmplW1NJ+xFXr2 /yEL3i+rx4N8bMN9rkl1ru2n5SezbuLLWEyrwAGJbmtJX7NBtNNy0yO8+CrluF2hfN82 NWXw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id p1si43791625pff.250.2019.08.02.19.31.38; Fri, 02 Aug 2019 19:31:54 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2404212AbfHBNaj (ORCPT + 99 others); Fri, 2 Aug 2019 09:30:39 -0400 Received: from mx1.redhat.com ([209.132.183.28]:50806 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729469AbfHBNYX (ORCPT ); Fri, 2 Aug 2019 09:24:23 -0400 Received: from smtp.corp.redhat.com (int-mx02.intmail.prod.int.phx2.redhat.com [10.5.11.12]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id DDD0E307D90E; Fri, 2 Aug 2019 13:24:22 +0000 (UTC) Received: from dhcp-27-174.brq.redhat.com (unknown [10.43.17.136]) by smtp.corp.redhat.com (Postfix) with SMTP id E9F0560BF4; Fri, 2 Aug 2019 13:24:20 +0000 (UTC) Received: by dhcp-27-174.brq.redhat.com (nbSMTP-1.00) for uid 1000 oleg@redhat.com; Fri, 2 Aug 2019 15:24:22 +0200 (CEST) Date: Fri, 2 Aug 2019 15:24:20 +0200 From: Oleg Nesterov To: Adrian Reber Cc: Christian Brauner , Eric Biederman , Pavel Emelianov , Jann Horn , Dmitry Safonov <0x7f454c46@gmail.com>, linux-kernel@vger.kernel.org, Andrei Vagin , Mike Rapoport , Radostin Stoyanov Subject: Re: [PATCH v2 1/2] fork: extend clone3() to support CLONE_SET_TID Message-ID: <20190802132419.GD20111@redhat.com> References: <20190731161223.2928-1-areber@redhat.com> <20190731174135.GA30225@redhat.com> <20190802072511.GD18263@dcbz.redhat.com> <20190802124738.GC20111@redhat.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20190802124738.GC20111@redhat.com> User-Agent: Mutt/1.5.24 (2015-08-30) X-Scanned-By: MIMEDefang 2.79 on 10.5.11.12 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.48]); Fri, 02 Aug 2019 13:24:23 +0000 (UTC) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 08/02, Oleg Nesterov wrote: > > On 08/02, Adrian Reber wrote: > > > > On Wed, Jul 31, 2019 at 07:41:36PM +0200, Oleg Nesterov wrote: > > > But the main question is how it can really help if ns->level > 0, unlikely > > > CRIU will ever need to clone the process with the same pid_nr == set_tid > > > in the ns->parent chain. > > > > Not sure I understand what you mean. For CRIU only the PID in the PID > > namespace is relevant. > > If it runs "inside" this namespace. But in this case alloc_pid() should > use nr == set_tid only once in the main loop, when i == ns->level. and I just noticed that your patch does exactly this, it clears set_tid after the 1st usage when i == ns->level. > > > So may be kernel_clone_args->set_tid should be pid_t __user *set_tid_array? > > > Or I missed something ? > > > > Not sure why and how an array would be needed. Could you give me some > > more details why you think this is needed. > > IIURC, criu can restore the process tree along with nested pid namespaces. > > how can this patch help in this case? > > But again, perhaps I missed something. I forgot everything about criu. Yes... I guess in this case it can "safely" modify ns_last_pid in the child namespaces it needs to create. So Adrian, sorry for confusion, I think your patch is fine. Oleg.