[Devel] Re: [PATCH] c/r: Take uts_sem during checkpoint (v2)

Serge E. Hallyn serue at us.ibm.com
Fri Apr 17 08:05:29 PDT 2009


Quoting Dan Smith (danms at us.ibm.com):
> Fix the potential for breakage if our UTS changes during checkpoint
> by grabbing uts_sem and copying those strings to temporary buffers.
> 
> Cc: orenl at cs.columbia.edu
> Signed-off-by: Dan Smith <danms at us.ibm.com>

Looks good.  The only thing I'd add is that you are depending on
__NEW_UTS_LEN+1 being something very specific, so if utsname.h
gets a change, checkpoint/ckpt_task.c needs a corresponding
change.  So it would be robust to future code changes if you

#define MAX_UTS_LEN (__NEW_UTS_LEN+1)

in utsname.h, so that anyone expanding the size of hostname
doesn't need to look for this usage.

Still,
Acked-by: Serge Hallyn <serue at us.ibm.com>

-serge

> Changes in v2:
>   - Be less stupid about holding the system-wide uts_sem during
>     checkpoint (!)
>   - Don't hold it during restart
>   - Hold uts_sem only while copying out the strings
>   - Calculate the length of the saved buffers outside of the semaphore and
>     avoid the duplicate _len variables by cleaning up the cr_hdr_utsns
>     after the cr_write_string() of the two buffers
> ---
>  checkpoint/ckpt_task.c |   25 ++++++++++++++-----------
>  1 files changed, 14 insertions(+), 11 deletions(-)
> 
> diff --git a/checkpoint/ckpt_task.c b/checkpoint/ckpt_task.c
> index 4d19e31..30858d2 100644
> --- a/checkpoint/ckpt_task.c
> +++ b/checkpoint/ckpt_task.c
> @@ -171,8 +171,8 @@ static int cr_write_utsns(struct cr_ctx *ctx, struct uts_namespace *uts_ns)
>  {
>  	struct cr_hdr h;
>  	struct cr_hdr_utsns *hh;
> -	int domainname_len;
> -	int nodename_len;
> +	char nodename[__NEW_UTS_LEN + 1];
> +	char domainname[__NEW_UTS_LEN + 1];
>  	int ret;
> 
>  	h.type = CR_HDR_UTSNS;
> @@ -182,22 +182,25 @@ static int cr_write_utsns(struct cr_ctx *ctx, struct uts_namespace *uts_ns)
>  	if (!hh)
>  		return -ENOMEM;
> 
> -	nodename_len = strlen(uts_ns->name.nodename) + 1;
> -	domainname_len = strlen(uts_ns->name.domainname) + 1;
> +	down_read(&uts_sem);
> +	memcpy(nodename, uts_ns->name.nodename, sizeof(nodename));
> +	memcpy(domainname, uts_ns->name.domainname, sizeof(nodename));
> +	up_read(&uts_sem);
> 
> -	hh->nodename_len = nodename_len;
> -	hh->domainname_len = domainname_len;
> +	hh->nodename_len = strlen(nodename) + 1;
> +	hh->domainname_len = strlen(domainname) + 1;
> 
>  	ret = cr_write_obj(ctx, &h, hh);
> -	cr_hbuf_put(ctx, sizeof(*hh));
>  	if (ret < 0)
> -		return ret;
> +		goto out;
> 
> -	ret = cr_write_string(ctx, uts_ns->name.nodename, nodename_len);
> +	ret = cr_write_string(ctx, nodename, hh->nodename_len);
>  	if (ret < 0)
> -		return ret;
> +		goto out;
> 
> -	ret = cr_write_string(ctx, uts_ns->name.domainname, domainname_len);
> +	ret = cr_write_string(ctx, domainname, hh->domainname_len);
> + out:
> + 	cr_hbuf_put(ctx, sizeof(*hh));
>  	return ret;
>  }
> 
> -- 
> 1.5.6.3
> 
> _______________________________________________
> Containers mailing list
> Containers at lists.linux-foundation.org
> https://lists.linux-foundation.org/mailman/listinfo/containers
_______________________________________________
Containers mailing list
Containers at lists.linux-foundation.org
https://lists.linux-foundation.org/mailman/listinfo/containers




More information about the Devel mailing list