[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <1218479921.5598.35.camel@nimitz>
Date: Mon, 11 Aug 2008 11:38:41 -0700
From: Dave Hansen <dave@...ux.vnet.ibm.com>
To: Jonathan Corbet <corbet@....net>
Cc: Oren Laadan <orenl@...columbia.edu>,
containers@...ts.linux-foundation.org,
linux-kernel@...r.kernel.org, Theodore Tso <tytso@....edu>,
"Serge E. Hallyn" <serue@...ibm.com>
Subject: Re: [RFC][PATCH 1/4] checkpoint-restart: general infrastructure
On Mon, 2008-08-11 at 12:03 -0600, Jonathan Corbet wrote:
> I'm trying to figure out this patch set...here's a few things which
> have caught my eye in passing.
>
> > +/**
> > + * cr_get_fname - return pathname of a given file
> > + * @file: file pointer
> > + * @buf: buffer for pathname
> > + * @n: buffer length (in) and pathname length (out)
> > + *
> > + * if the buffer provivded by the caller is too small, allocate a new
> > + * buffer; caller should call cr_put_pathname() for cleanup
> > + */
> > +char *cr_get_fname(struct path *path, struct path *root, char *buf,
> > int *n) +{
> > + char *fname;
> > +
> > + fname = __d_path(path, root, buf, *n);
> > +
> > + if (IS_ERR(fname) && PTR_ERR(fname) == -ENAMETOOLONG) {
> > + if (!(buf = (char *) __get_free_pages(GFP_KERNEL, 0)))
>
> This seems like a clunky and error-prone interface - why not just have it
> allocate the memory always? But, in this case, cr_get_fname() always seems
> to be called with ctx->tbuf, which, in turn, is an order-1 allocation.
> Here you're saying that if it's too small, you'll try replacing it with an
> order-0 allocation instead. I rather suspect that's not going to help.
Yeah, it doesn't make much sense on the surface. I would imagine that
this has some use for when we're stacking things up in the ctx->hbuf
rather than just using it as a completely temporary buffer. But, in any
case, it doesn't make sense as it stands now, so I think it needs to be
reworked.
> > +/* write the checkpoint header */
> > +static int cr_write_hdr(struct cr_ctx *ctx)
> > +{
> > + struct cr_hdr h;
> > + struct cr_hdr_head *hh = ctx->tbuf;
> > + struct timeval ktv;
> > +
> > + h.type = CR_HDR_HEAD;
> > + h.len = sizeof(*hh);
> > + h.id = 0;
> > +
> > + do_gettimeofday(&ktv);
> > +
> > + hh->magic = 0x00a2d200;
>
> This magic number is hard-coded in a number of places. Could it maybe
> benefit from a macro, which, in turn, could maybe end up in linux/magic.h?
>
> > +/* dump the task_struct of a given task */
> > +static int cr_write_task_struct(struct cr_ctx *ctx, struct task_struct *t)
>
> This function is going to break every time somebody changes struct
> task_struct. I'm not quite sure how to prevent that. I wonder if the
> modversions stuff could somehow be employed to detect changes and make the
> build fail?
In general, I think any time that we are checkpointing $THING and $THING
changes, the checkpoint will break. It just so happens that all we're
checkpointing here is the task_struct, so $THING == task_struct for
now. :)
The things that *really* worry me are things like when flags change
semantics subtly. Or, let's say a flag is used for two different things
in 2.6.26.4 vs 2.6.27. I'm not sure we're ever going to be in a
position to find and fix up stuff like that.
That's one reason I have been advocating doing checkpoint/restart in
much tinier bits so that we can understand each of them as we go along.
I also think that the *less* we expose to userspace, the better.
> > +/**
> > + * sys_checkpoint - checkpoint a container
> > + * @pid: pid of the container init(1) process
> > + * @fd: file to which dump the checkpoint image
> > + * @flags: checkpoint operation flags
> > + */
> > +asmlinkage long sys_checkpoint(pid_t pid, int fd, unsigned long
> > flags) +{
> > + struct cr_ctx *ctx;
> > + struct file *file;
> > + int fput_needed;
> > + int ret;
> > +
> > + if (!capable(CAP_SYS_ADMIN))
> > + return -EPERM;
>
> Like others, I wondered why CAP_SYS_ADMIN was required here. I *still*
> wonder, though, how you'll ever be able to do restart without a privilege
> check. There must be a thousand ways to compromise a system by messing
> with the checkpoint file.
As with everything else coming from userspace, the checkpoint file
should be completely untrusted. I do think, though, that the ptrace
analogy that Serge?? made is a good one.
> > + file = fget_light(fd, &fput_needed);
> > + if (!file)
> > + return -EBADF;
>
> Should you maybe check for write access? An attempt to overwrite a
> read-only file won't succeed, but you could save a lot of work by just
> failing it with a clear code here.
That's true. I'll take a look and see.
This patch does reach down and use vfs_write() at some point. There
really aren't any other in-kernel users that do this (short of ecryptfs
and plan9fs). That makes me doubt that we're even using a good approach
here.
> What about the file position? Perhaps there could be a good reason to
> checkpoint a process into the middle of a file, don't know.
I think this is a good example of a place where the kernel can let
userspace shoot itself in its foot if it wants. We might also want to
allow things to be sent over fds that don't necessarily have positions,
like sockets or pipes.
> In general, I don't see a whole lot of locking going on. Is it really
> possible to save and restore memory without ever holding mmap_sem?
I personally haven't audited the locking, yet. It is going to be fun!
But, take a look in patch 3/4:
+ /* write the vma's */
+ down_read(&mm->mmap_sem);
+ for (vma = mm->mmap; vma; vma = vma->vm_next) {
+ if ((ret = cr_write_vma(ctx, vma)) < 0)
+ break;
+ }
+ up_read(&mm->mmap_sem);
Thanks for the review, Jonathan!
-- Dave
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists