[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <1288835258.6132.56.camel@tp-t61>
Date: Wed, 03 Nov 2010 20:47:38 -0500
From: Nathan Lynch <ntl@...ox.com>
To: Christoph Hellwig <hch@....de>
Cc: Tejun Heo <tj@...nel.org>, Oren Laadan <orenl@...columbia.edu>,
ksummit-2010-discuss@...ts.linux-foundation.org,
linux-kernel@...r.kernel.org
Subject: Re: [Ksummit-2010-discuss] checkpoint-restart: naked patch
On Tue, 2010-11-02 at 22:47 +0100, Christoph Hellwig wrote:
> Thanks Tejun,
>
> your writeup brought up a lot of the same issues that I see with
> the in-kernel C/R. Various C/R implementations that are entirely
> in userspace or with limited kernel assistance have been in production
> in HPC environments for years.
FWIW there are a couple of kernel-based C/R implementations (BLCR,
OpenVZ) in use in various contexts (not just HPC).
> I think especially for these workloads
> C/R is an extremly useful feature, and a standard implementation would
> do Linux well.
>
> But I think the "transparent" in-kernel one is the wrong approach. It
> tries to give the illusion that C/R will just work, while a lot of
> things are simply not support.
I think this is somewhat true of the implementation under consideration
here (although generally it should fail checkpoints that it can't
restart), but it needn't be true of all possible kernel-based
implementations.
> In this case whitelisting the allowed
> state by requiring special APIs for all I/O (or even just standard
> APIs as long as they are supposed by the C/R lib you're linked against)
> is the more pragmatic, and I think faithful aproach.
I don't think users will go for it. They'll continue to use dodgy
out-of-tree kernel modules and/or LD_PRELOAD hacks instead of porting
their applications to a new library. I think a C/R library is an
"ideal" solution, but it's one that nobody would use - especially in
HPC, unless the library somehow provides better performance.
The namespace/isolation features of Linux (CLONE_NEWPID et al) already
provide a pretty workable basis for creating tractably checkpoint-
and-restartable jobs, with a minimum of performance overhead and
application modification.
> In addition to
> the amount of state not supported despite looking transparant the
> other big problem with the patchset is that it saves the kernel internal
> state which changes all the time from one release to another.
Most of the objects that the patchset saves and restores are right at
the "border" of the user/kernel interface, and they're not apt to change
much quickly (e.g. vma start and end, task sigaltstack info). The
patchset certainly isn't serializing deep internal state such as wait
queues, locks, or reference counts.
> The handwaiving is that a userspace tool will solve it. I'm pretty sure
> that's not the case; it might solve a few cases but the general
> version n to version m conversion is impossible to maintain.
With this I agree, though. But if a change in kernel implementation
details forces an incompatible change in the checkpoint image format, is
that really a big deal? Would it be so bad to say that a checkpoint
image may be restarted only on the same kernel version that created it?
With -stable or enterprise kernels I suspect the issue is unlikely to
come up.
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists