Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1754077AbZGWPmg (ORCPT ); Thu, 23 Jul 2009 11:42:36 -0400 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S1753498AbZGWPmf (ORCPT ); Thu, 23 Jul 2009 11:42:35 -0400 Received: from smtp111.iad.emailsrvr.com ([207.97.245.111]:39165 "EHLO smtp111.iad.emailsrvr.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752906AbZGWPmf (ORCPT ); Thu, 23 Jul 2009 11:42:35 -0400 X-Greylist: delayed 544 seconds by postgrey-1.27 at vger.kernel.org; Thu, 23 Jul 2009 11:42:34 EDT Message-ID: <4A6882C0.6020302@librato.com> Date: Thu, 23 Jul 2009 11:33:20 -0400 From: Oren Laadan Organization: Librato User-Agent: Thunderbird 2.0.0.22 (X11/20090608) MIME-Version: 1.0 To: "Serge E. Hallyn" CC: Andrew Morton , Linus Torvalds , containers@lists.linux-foundation.org, linux-kernel@vger.kernel.org, linux-mm@kvack.org, linux-api@vger.kernel.org, Dave Hansen , Ingo Molnar , "H. Peter Anvin" , Alexander Viro , Pavel Emelyanov , Alexey Dobriyan , Oren Laadan Subject: Re: [RFC v17][PATCH 22/60] c/r: external checkpoint of a task other than ourself References: <1248256822-23416-1-git-send-email-orenl@librato.com> <1248256822-23416-23-git-send-email-orenl@librato.com> <20090723144753.GA12416@us.ibm.com> In-Reply-To: <20090723144753.GA12416@us.ibm.com> Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 1703 Lines: 67 Serge E. Hallyn wrote: > Quoting Oren Laadan (orenl@librato.com): >> +/* setup checkpoint-specific parts of ctx */ >> +static int init_checkpoint_ctx(struct ckpt_ctx *ctx, pid_t pid) >> +{ >> + struct task_struct *task; >> + struct nsproxy *nsproxy; >> + int ret; >> + >> + /* >> + * No need for explicit cleanup here, because if an error >> + * occurs then ckpt_ctx_free() is eventually called. >> + */ >> + >> + ctx->root_pid = pid; >> + >> + /* root task */ >> + read_lock(&tasklist_lock); >> + task = find_task_by_vpid(pid); >> + if (task) >> + get_task_struct(task); >> + read_unlock(&tasklist_lock); >> + if (!task) >> + return -ESRCH; >> + else >> + ctx->root_task = task; >> + >> + /* root nsproxy */ >> + rcu_read_lock(); >> + nsproxy = task_nsproxy(task); >> + if (nsproxy) >> + get_nsproxy(nsproxy); >> + rcu_read_unlock(); >> + if (!nsproxy) >> + return -ESRCH; >> + else >> + ctx->root_nsproxy = nsproxy; >> + >> + /* root freezer */ >> + ctx->root_freezer = task; >> + geT_task_struct(task); >> + >> + ret = may_checkpoint_task(ctx, task); >> + if (ret) { >> + ckpt_write_err(ctx, NULL); >> + put_task_struct(task); >> + put_task_struct(task); >> + put_nsproxy(nsproxy); > > I don't think this is safe - the ckpt_ctx_free() will > free them a second time because you're not setting them > to NULL, right? Yes. Fortunately this hole chunk is removed by the 3rd-next patch. I'll make sure it's correct here too. Thanks, Oren. -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/