c/r updates

Nathan Lynch ntl at pobox.com
Thu May 14 09:26:45 PDT 2009


Oren Laadan <orenl at cs.columbia.edu> writes:

> Hi,
>
> The current development kernel git:
>   git://git.ncl.cs.columbia.edu/pub/git/linux-cr    [ckpt-v15-dev]
>
> The current development user tools git:
>   git://git.ncl.cs.columbia.edu/pub/git/user-cr     [ckpt-v15-dev]
>
> (branch naming will remain consistent from now ...)
>
> Dave: I pushed a series of patches/fixes to current c/r tree, some of
> which are are relevant to the patch series you're preparing.
>
> Nathan: patches "tee...", "splice..." and "c/r: redo..." change the
> way pipes are saved/restored, and avoids the lockdep issue.

Yes, I just re-tested and it seems to avoid it.

However, when trying to checkpoint an unfrozen container (user error)
with ckpt -c I see the following trace.  Looks like ckpt_write_err is
called with tasklist_lock held.

BUG: sleeping function called from invalid context at mm/slub.c:1595
in_atomic(): 1, irqs_disabled(): 0, pid: 3603, name: ckpt
1 lock held by ckpt/3603:
 #0:  (tasklist_lock){.+.+.+}, at: [<c0397e9a>] tree_count_tasks+0x2a/0x22e
Pid: 3603, comm: ckpt Not tainted 2.6.30-rc3 #15
Call Trace:
 [<c024ca49>] ? __debug_show_held_locks+0x1e/0x20
 [<c02237a1>] __might_sleep+0x100/0x107
 [<c02aaea0>] __kmalloc+0xd1/0x1b4
 [<c0397179>] ckpt_hdr_get+0x14/0x16
 [<c0397d57>] ckpt_write_obj_type+0x25/0x73
 [<c0397de9>] ckpt_write_err+0x22/0xa9
 [<c024bb97>] ? get_lock_stats+0x16/0x38
 [<c024bbc6>] ? put_lock_stats+0xd/0x21
 [<c024bcd7>] ? lock_release_holdtime+0xfd/0x105
 [<c023bb12>] ? __task_pid_nr_ns+0x84/0xc0
 [<c0397f31>] tree_count_tasks+0xc1/0x22e
 [<c03981ee>] do_checkpoint+0x150/0x532
 [<c0397b0f>] ? ckpt_obj_hash_alloc+0x94/0x122
 [<c0397388>] ? ckpt_ctx_alloc+0xd8/0xfd
 [<c03974b3>] sys_checkpoint+0x6c/0x82
 [<c0202b65>] syscall_call+0x7/0xb
BUG: scheduling while atomic: ckpt/3603/0x10000002
2 locks held by ckpt/3603:
 #0:  (tasklist_lock){.+.+.+}, at: [<c0397e9a>] tree_count_tasks+0x2a/0x22e
 #1:  (&sb->s_type->i_mutex_key#8){+.+.+.}, at: [<c0288fb6>] generic_file_aio_write+0x59/0xc2
Modules linked in:
Pid: 3603, comm: ckpt Not tainted 2.6.30-rc3 #15
Call Trace:
 [<c02242e6>] __schedule_bug+0x63/0x6a
 [<c05f8865>] __schedule+0x8f/0xa34
 [<c03107d9>] ? journal_stop+0x24d/0x258
 [<c03107d9>] ? journal_stop+0x24d/0x258
 [<c0203583>] ? ftrace_call+0x5/0x8
 [<c0203583>] ? ftrace_call+0x5/0x8
 [<c028f2a2>] ? put_page+0xe/0xf1
 [<c02f96fd>] ? ext3_writeback_write_end+0xd5/0x102
 [<c0203583>] ? ftrace_call+0x5/0x8
 [<c05f9221>] schedule+0x17/0x30
 [<c0224b67>] __cond_resched+0x26/0x3f
 [<c05f9337>] _cond_resched+0x29/0x34
 [<c0288094>] generic_file_buffered_write+0x141/0x253
 [<c028874c>] __generic_file_aio_write_nolock+0x3d7/0x40f
 [<c05f9fa6>] ? mutex_lock_nested+0x279/0x2b9
 [<c0288fcb>] generic_file_aio_write+0x6e/0xc2
 [<c02f70b5>] ext3_file_write+0x1f/0x92
 [<c02aef31>] do_sync_write+0xb0/0xee
 [<c023e460>] ? autoremove_wake_function+0x0/0x38
 [<c0367279>] ? selinux_file_permission+0xa1/0xa5
 [<c036328e>] ? security_file_permission+0x14/0x16
 [<c02aee81>] ? do_sync_write+0x0/0xee
 [<c02af947>] vfs_write+0x8f/0x133
 [<c03975bb>] ckpt_kwrite+0x50/0x95
 [<c0397d79>] ckpt_write_obj_type+0x47/0x73
 [<c0397de9>] ckpt_write_err+0x22/0xa9
 [<c024bb97>] ? get_lock_stats+0x16/0x38
 [<c024bbc6>] ? put_lock_stats+0xd/0x21
 [<c024bcd7>] ? lock_release_holdtime+0xfd/0x105
 [<c023bb12>] ? __task_pid_nr_ns+0x84/0xc0
 [<c0397f31>] tree_count_tasks+0xc1/0x22e
 [<c03981ee>] do_checkpoint+0x150/0x532
 [<c0397b0f>] ? ckpt_obj_hash_alloc+0x94/0x122
 [<c0397388>] ? ckpt_ctx_alloc+0xd8/0xfd
 [<c03974b3>] sys_checkpoint+0x6c/0x82
 [<c0202b65>] syscall_call+0x7/0xb


More information about the Containers mailing list