Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1757868AbZCJRpp (ORCPT ); Tue, 10 Mar 2009 13:45:45 -0400 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S1755359AbZCJRpg (ORCPT ); Tue, 10 Mar 2009 13:45:36 -0400 Received: from e35.co.us.ibm.com ([32.97.110.153]:54387 "EHLO e35.co.us.ibm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1755265AbZCJRpf (ORCPT ); Tue, 10 Mar 2009 13:45:35 -0400 Date: Tue, 10 Mar 2009 12:45:17 -0500 From: "Serge E. Hallyn" To: Nathan Lynch Cc: Dave Hansen , containers , "linux-kernel@vger.kernel.org" , Christoph Hellwig , Ingo Molnar , Alexey Dobriyan Subject: Re: [RFC][PATCH 00/11] track files for checkpointability Message-ID: <20090310174517.GA12101@us.ibm.com> References: <20090305163857.0C18F3FD@kernel> <20090310105702.43eb1402@thinkcentre.lan> <20090310162026.GA9354@us.ibm.com> <20090310122320.313491ce@thinkcentre.lan> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20090310122320.313491ce@thinkcentre.lan> User-Agent: Mutt/1.5.18 (2008-05-17) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 1863 Lines: 48 Quoting Nathan Lynch (ntl@pobox.com): > "Serge E. Hallyn" wrote: > > Quoting Nathan Lynch (ntl@pobox.com): > > > Please consider this and a following patch. > > > > > > >From a0fb96aa41c4d360559013cfd7f32f07f449c1c4 Mon Sep 17 00:00:00 2001 > > > From: Nathan Lynch > > > Date: Mon, 9 Mar 2009 22:23:02 -0500 > > > Subject: [PATCH] checkpoint: make files_deny_checkpointing print task name and pid > > > > > > This lets the developer know *which* task performed an action that > > > prevents checkpoint. > > > > > > > > > Signed-off-by: Nathan Lynch > > > --- > > > fs/file.c | 2 +- > > > fs/open.c | 2 +- > > > include/linux/checkpoint.h | 13 +++++++------ > > > 3 files changed, 9 insertions(+), 8 deletions(-) > > > > > > diff --git a/fs/file.c b/fs/file.c > > > index 0501af6..fcb2803 100644 > > > --- a/fs/file.c > > > +++ b/fs/file.c > > > @@ -299,7 +299,7 @@ static void __scan_files_for_cr(struct files_struct *files) > > > continue; > > > if (cr_file_supported(f)) > > > continue; > > > - files_deny_checkpointing(files); > > > + files_deny_checkpointing(current, files); > > > > Ah but you can't do this, because __scan_files_for_cr is called > > from dupfd which is called during copy_files, right? > > Are you saying that the message should identify the child instead of > the parent as the uncheckpointable task? Yes. The parent may have opened the fd (or, importantly, may NOT have) but the child is the one now getting that 'dirty' fd and being newly marked uncheckpointable. -serge -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/