[Devel] [RFC v2][PATCH 07/10] sysvipc-shm: correctly handle deleted (active) ipc shared memory
Oren Laadan
orenl at cs.columbia.edu
Tue Apr 7 05:31:40 PDT 2009
During restart, an ipc shared region may have SHM_DEST, indicating
that it has been originally deleted (while still active). In this
case the task of deleting the region after restoring it is postponed
until the end of the restart; otherwise, it would be quite silly to
delete it at that time, because it will be ... gone :o
Signed-off-by: Oren Laadan <orenl at cs.columbia.edu>
---
ipc/ckpt_shm.c | 44 ++++++++++++++++++++++++++++++++++++++++----
1 files changed, 40 insertions(+), 4 deletions(-)
diff --git a/ipc/ckpt_shm.c b/ipc/ckpt_shm.c
index ee9b77a..c5b7f60 100644
--- a/ipc/ckpt_shm.c
+++ b/ipc/ckpt_shm.c
@@ -145,6 +145,25 @@ int cr_write_ipc_shm(struct cr_ctx *ctx, struct ipc_namespace *ipcns)
* ipc restart
*/
+struct cr_dq_ipcshm_del {
+ struct ipc_namespace *ipcns;
+ int id;
+};
+
+static int cr_ipc_shm_delete(void *data)
+{
+ struct cr_dq_ipcshm_del *dq = (struct cr_dq_ipcshm_del *) data;
+ mm_segment_t old_fs;
+ int ret;
+
+ old_fs = get_fs();
+ set_fs(get_ds());
+ ret = shmctl_down(dq->ipcns, dq->id, IPC_RMID, NULL, 0);
+ set_fs(old_fs);
+
+ return ret;
+}
+
int cr_ipc_shm_attach(struct file *file,
unsigned long vm_addr,
unsigned long vm_flags)
@@ -224,7 +243,25 @@ static int cr_do_read_ipc_shm(struct cr_ctx *ctx)
if (hh->flags & SHM_HUGETLB) /* FIXME: support SHM_HUGETLB */
goto out;
- /* FIXME: this will fail for deleted ipc shm segments */
+ /*
+ * SHM_DEST means that the shm is to be deleted after creation.
+ * However, deleting before it's actually attached is quite silly.
+ * Instead, we defer this task to until restart has succeeded.
+ */
+ if (hh->perms.mode & SHM_DEST) {
+ struct cr_dq_ipcshm_del dq;
+
+ /* to not confuse the rest of the code */
+ hh->perms.mode &= ~SHM_DEST;
+
+ dq.ipcns = current->nsproxy->ipc_ns;
+ dq.id = hh->perms.id;
+
+ ret = cr_deferqueue_add(ctx, cr_ipc_shm_delete,
+ 0, &dq, sizeof(dq));
+ if (ret < 0)
+ goto out;
+ }
shmflag = hh->flags | hh->perms.mode | IPC_CREAT | IPC_EXCL;
cr_debug("shm: do_shmget size %lld flag %#x id %d\n",
@@ -235,7 +272,6 @@ static int cr_do_read_ipc_shm(struct cr_ctx *ctx)
goto out;
down_write(&shm_ids->rw_mutex);
-
ret = -EIDRM;
perms = ipc_lock(shm_ids, hh->perms.id);
if (IS_ERR(perms)) { /* this should not happen .. but be safe */
@@ -261,9 +297,9 @@ static int cr_do_read_ipc_shm(struct cr_ctx *ctx)
/* deposit in objhash and read contents in */
ret = cr_obj_add_ref(ctx, file, hh->objref, CR_OBJ_FILE, 0);
if (ret < 0)
- goto file;
+ goto fput;
ret = cr_read_shmem_contents(ctx, file->f_dentry->d_inode);
- file:
+ fput:
fput(file);
out:
cr_hbuf_put(ctx, sizeof(*hh));
--
1.5.4.3
_______________________________________________
Containers mailing list
Containers at lists.linux-foundation.org
https://lists.linux-foundation.org/mailman/listinfo/containers
More information about the Devel
mailing list