[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <1224522144.1848.115.camel@nimitz>
Date: Mon, 20 Oct 2008 10:02:24 -0700
From: Dave Hansen <dave@...ux.vnet.ibm.com>
To: Andrey Mirkin <major@...nvz.org>
Cc: containers@...ts.linux-foundation.org,
linux-kernel@...r.kernel.org, Pavel Emelyanov <xemul@...nvz.org>
Subject: Re: [PATCH 03/10] Introduce context structure needed during
checkpointing/restart
On Sat, 2008-10-18 at 03:11 +0400, Andrey Mirkin wrote:
> +typedef struct cpt_context
> +{
> + pid_t pid; /* should be changed to ctid later */
> + int ctx_id; /* context id */
> + struct list_head ctx_list;
> + int refcount;
> + int ctx_state;
> + struct semaphore main_sem;
Does this really need to be a semaphore or is a mutex OK?
> + int errno;
Could you hold off on adding these things to the struct until the patch
where they're actually used? It's hard to judge this without seeing
what you do with it.
> + struct file *file;
> + loff_t current_object;
> +
> + struct list_head object_array[CPT_OBJ_MAX];
> +
> + int (*write)(const void *addr, size_t count, struct cpt_context *ctx);
> + int (*read)(void *addr, size_t count, struct cpt_context *ctx);
> +} cpt_context_t;
Man, this is hard to review. I was going to try and make sure that your
refcounting was right and atomic, but there's no use of it in this patch
except for the initialization and accessor functions. Darn.
> +extern int debug_level;
I'm going to go out on a limb here and say that "debug_level" is
probably a wee bit too generic of a variable name.
> +#define cpt_printk(lvl, fmt, args...) do { \
> + if (lvl <= debug_level) \
> + printk(fmt, ##args); \
> + } while (0)
I think you can use pr_debug() here, too, just like Oren did.
> +struct cpt_context * context_alloc(void)
> +{
> + struct cpt_context *ctx;
> + int i;
> +
> + ctx = kzalloc(sizeof(*ctx), GFP_KERNEL);
> + if (!ctx)
> + return NULL;
> +
> + init_MUTEX(&ctx->main_sem);
> + ctx->refcount = 1;
> +
> + ctx->current_object = -1;
> + ctx->write = file_write;
> + ctx->read = file_read;
> + for (i = 0; i < CPT_OBJ_MAX; i++) {
> + INIT_LIST_HEAD(&ctx->object_array[i]);
> + }
> +
> + return ctx;
> +}
> +
> +void context_release(struct cpt_context *ctx)
> +{
> + ctx->ctx_state = CPT_CTX_ERROR;
> +
> + kfree(ctx);
> +}
> +
> +static void context_put(struct cpt_context *ctx)
> +{
> + if (!--ctx->refcount)
> + context_release(ctx);
> +}
> +
> static int checkpoint(pid_t pid, int fd, unsigned long flags)
> {
> - return -ENOSYS;
> + struct file *file;
> + struct cpt_context *ctx;
> + int err;
> +
> + err = -EBADF;
> + file = fget(fd);
> + if (!file)
> + goto out;
> +
> + err = -ENOMEM;
> + ctx = context_alloc();
> + if (!ctx)
> + goto out_file;
> +
> + ctx->file = file;
> + ctx->ctx_state = CPT_CTX_DUMPING;
> +
> + /* checkpoint */
> + err = -ENOSYS;
> +
> + context_put(ctx);
> +
> +out_file:
> + fput(file);
> +out:
> + return err;
> }
So, where is context_get()? Is there only single-threaded access to the
refcount? If so, why do we even need it? We should probably just use
context_release() driectly.
If there is multithreaded access to context_put() or the refcount, then
they're unsafe without additional locking.
-- Dave
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists