[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <4E5F7702.2070808@parallels.com>
Date: Thu, 01 Sep 2011 16:13:54 +0400
From: Pavel Emelyanov <xemul@...allels.com>
To: Tejun Heo <tj@...nel.org>
CC: Andrew Morton <akpm@...ux-foundation.org>,
Cyrill Gorcunov <gorcunov@...il.com>,
"Kirill A. Shutemov" <kirill@...temov.name>,
Vasiliy Kulikov <segoon@...nwall.com>,
"containers@...ts.osdl.org" <containers@...ts.osdl.org>,
"linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>,
"linux-fsdevel@...r.kernel.org" <linux-fsdevel@...r.kernel.org>,
Nathan Lynch <ntl@...ox.com>,
Oren Laadan <orenl@...columbia.edu>,
Daniel Lezcano <dlezcano@...ibm.com>,
Glauber Costa <glommer@...allels.com>,
James Bottomley <jbottomley@...allels.com>,
Alexey Dobriyan <adobriyan@...il.com>,
Al Viro <viro@...IV.linux.org.uk>
Subject: Re: [patch 2/2] fs, proc: Introduce the /proc/<pid>/map_files/ directory
v6
On 09/01/2011 03:50 PM, Tejun Heo wrote:
> Hello, Andrew, Pavel.
>
> On Thu, Sep 01, 2011 at 11:58:29AM +0400, Pavel Emelyanov wrote:
>>> What additional kernel patches are required to bring that effort to a
>>> usable state and where are those patches?
>>
>> * The one you've already accepted with ->statfs for pipefs.
>> * PTRACE_SEIZE set from Tejun (RFC was sent some time earlier)
>
> This one is already in mainline. It's necessary to make the existing
> debuggers (strace and gdb) interact properly with job control.
>
>> * CLONE_USEPID flag for the clone() syscall (Cyrill will re-send a bit later)
>> * The binfmt handler for images (I've sent it earlier, but there's a discussion
>> happening over it. We can do restore without one, but it will improve the
>> situation significantly)
>
> I still can't see much point in binfmt handler. The kernel pieces
> should be pretty small no matter how this one gets resolved.
Because with the handler restore process looks very natural and simple - each
task does the following steps
1. restore task resources (open files, set IDs, restore connections, wire back timers, etc.)
2. call execve() to jump into new memory+registers context which is
a. unmap all the user memory
b. map required mappings
c. populate them with data
d. restore registers
e. restore IP
Note, that steps a through e are what execve() is designed for from day 1. Also note,
that when talking about the binary handler I do not insist in having my own one - it's
perfectly fine with me if we can make the ELF handler do the job (and I'm going to investigate
this ability soon).
With SEIZE it looks worse (maybe I'm seeing it wrong, then correct me please):
1. restore task resources
2. freeze
3. some foreigner attaches a parasite to the frozen task and the parasite
should do steps a through e from the previous list to restore mem+regs context,
but when doing steps a and b it should care about not killing himself from the
target task context
This SEIZE-d restoring looks very complex and not efficient to me.
Am I wrong at some point?
> Thanks.
>
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists