tech-kern archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
Proposal: killpeer(2)
On Sat, May 14, 2011 at 04:16:54PM +0200, Emmanuel Dreyfus wrote:
> Thor Lancelot Simon <tls%panix.com@localhost> wrote:
>
> > What process group does perfused end up in? Its own? Otherwise killpg
> > might do the trick.
>
> perfused is still in the process group of the terminal it was launched.
> But glusterfs gets -1, acording to ps -o pid,tpgid,command
I have been thinking about ways to handle this that are general and
safe.
The basic problem is that what's really wanted is a way to send a signal
to the other process associated with a particular resource, in this case
a datagram socket.
This can't really work for a datagram (as opposed to a sequenced-packet)
socket because there isn't just one other process -- the mapping can be
one to N and of course N can even be zero. But this just highlights that
SOCK_DGRAM isn't quite right for many uses of unix domain sockets anyway.
What is really wanted is a connection-oriented, record-based socket. I
am not sure but I think SOCK_SEQPACKET is supposed to be for this kind of
thing.
If we had a socket type which was record oriented but cloned on accept()
like stream sockets, then we _would_ have a file descriptor per peer and
what I'm describing below would work:
Putting that aside for a moment, let's pretend we had a stream socket in
this application instead of a datagram one. I think the right thing to
do at that point would be to add a killpeer() syscall, which sends a
signal to the other process associated with a file descriptor. This is
reasonably general -- it would be useful for ptys and pipes as well, I
think. I think it would be a very useful tool for cleanup of potentially
misbehaving peers in many local-IPC client/server applications.
Opinions?
Thor
Home |
Main Index |
Thread Index |
Old Index