Dan Smith wrote:
> The INET code often creates socket buffers by attaching fragments instead
> of writing to the linear region.  This extends the skb write functions
> to write out the linear and fragment regions of an skb, and adds a
> function to be used by others wishing to restore an skb in the same way.
> This also includes the header-mark-setting bits from a previous patch.
> 
> Signed-off-by: Dan Smith <[email protected]>
> ---
>  include/linux/checkpoint.h     |    1 +
>  include/linux/checkpoint_hdr.h |   11 ++
>  net/checkpoint.c               |  253 
> ++++++++++++++++++++++++++++++++++++----
>  3 files changed, 242 insertions(+), 23 deletions(-)
> 
> diff --git a/include/linux/checkpoint.h b/include/linux/checkpoint.h
> index dfcb59b..3e73e68 100644
> --- a/include/linux/checkpoint.h
> +++ b/include/linux/checkpoint.h
> @@ -100,6 +100,7 @@ extern int ckpt_sock_getnames(struct ckpt_ctx *ctx,
>                             struct socket *socket,
>                             struct sockaddr *loc, unsigned *loc_len,
>                             struct sockaddr *rem, unsigned *rem_len);
> +struct sk_buff *sock_restore_skb(struct ckpt_ctx *ctx);
>  
>  /* ckpt kflags */
>  #define ckpt_set_ctx_kflag(__ctx, __kflag)  \
> diff --git a/include/linux/checkpoint_hdr.h b/include/linux/checkpoint_hdr.h
> index 5d9c088..ace4139 100644
> --- a/include/linux/checkpoint_hdr.h
> +++ b/include/linux/checkpoint_hdr.h
> @@ -561,8 +561,19 @@ struct ckpt_hdr_socket_queue {
>  
>  struct ckpt_hdr_socket_buffer {
>       struct ckpt_hdr h;
> +     __u64 transport_header;
> +     __u64 network_header;
> +     __u64 mac_header;
> +     __u64 lin_len; /* Length of linear data */
> +     __u64 frg_len; /* Length of fragment data */
> +     __u64 skb_len; /* Length of skb (adjusted) */
> +     __u64 hdr_len; /* Length of skipped header */
> +     __u64 mac_len;

Can you use u32 (or even less ?) for these ?

>       __s32 sk_objref;
>       __s32 pr_objref;
> +     __u16 protocol;
> +     __u16 nr_frags;
> +     __u8 cb[48];

Do you it will ever be required that cb[] be aligned ?

>  };

[...]

> +static int sock_restore_skb_frag(struct ckpt_ctx *ctx,
> +                              struct sk_buff *skb,
> +                              int frag_idx)
> +{
> +     int ret = 0;
> +     int fraglen;
> +     struct page *page;
> +     void *buf;
> +
> +     fraglen = _ckpt_read_obj_type(ctx, NULL, 0, CKPT_HDR_BUFFER);
> +     if (fraglen < 0)
> +             return fraglen;
> +
> +     if (fraglen > PAGE_SIZE) {
> +             ckpt_debug("skb frag size %i > PAGE_SIZE\n", fraglen);
> +             return -EINVAL;
> +     }
> +
> +     page = alloc_page(GFP_KERNEL);
> +     if (!page)
> +             return -ENOMEM;
> +
> +     buf = kmap(page);
> +     ret = ckpt_kread(ctx, buf, fraglen);
> +     kunmap(page);

I'm unsure how much of a performance issue this is - I sort of expected
a comment from Dave Hansen about this;  Did you consider reusing the
restore_read_page() from checkpoint/memory.c ?  (and the matching
checkpoint_dump_page() for the checkpoint).

> +
> +     if (ret) {
> +             ckpt_debug("failed to read fragment: %i\n", ret);
> +             ret = -EINVAL;
> +             __free_page(page);
> +     } else {
> +             ckpt_debug("read %i for fragment %i\n", fraglen, frag_idx);
> +             skb_add_rx_frag(skb, frag_idx, page, 0, fraglen);
> +     }
> +
> +     return ret < 0 ? ret : fraglen;
> +}
> +
> +struct sk_buff *sock_restore_skb(struct ckpt_ctx *ctx)
> +{
> +     struct ckpt_hdr_socket_buffer *h;
> +     struct sk_buff *skb = NULL;
> +     int i;
> +     int ret = 0;
> +
> +     h = ckpt_read_obj_type(ctx, sizeof(*h), CKPT_HDR_SOCKET_BUFFER);
> +     if (IS_ERR(h))
> +             return (struct sk_buff *)h;
> +
> +     if (h->lin_len > SKB_MAX_ALLOC) {
> +             ckpt_debug("socket linear buffer too big (%llu > %lu)\n",
> +                        h->lin_len, SKB_MAX_ALLOC);
> +             ret = -ENOSPC;
> +             goto out;
> +     } else if (h->frg_len > SKB_MAX_ALLOC) {
> +             ckpt_debug("socket frag size too big (%llu > %lu\n",
> +                        h->frg_len, SKB_MAX_ALLOC);
> +             ret = -ENOSPC;
> +             goto out;
> +     }
> +
> +     skb = alloc_skb(h->lin_len, GFP_KERNEL);
> +     if (!skb) {
> +             ret = -ENOMEM;
> +             goto out;
> +     }
> +
> +     ret = _ckpt_read_obj_type(ctx, skb_put(skb, h->lin_len),
> +                               h->lin_len, CKPT_HDR_BUFFER);
> +     ckpt_debug("read linear skb length %llu: %i\n", h->lin_len, ret);
> +     if (ret < 0) {
> +             goto out;
> +     }
> +
> +     for (i = 0; i < h->nr_frags; i++) {

Sanitize h->nr_frags ?

> +             ret = sock_restore_skb_frag(ctx, skb, i);
> +             ckpt_debug("read skb frag %i/%i: %i\n",
> +                        i + 1, h->nr_frags, ret);
> +             if (ret < 0)
> +                     goto out;
> +             h->frg_len -= ret;
> +     }
> +
> +     if (h->frg_len != 0) {
> +             ckpt_debug("length %llu remaining after reading frags\n",
> +                        h->frg_len);
> +             ret = -EINVAL;
> +             goto out;
> +     }
> +
> +     sock_restore_header_info(skb, h);
> +
> + out:
> +     ckpt_hdr_put(ctx, h);
> +     if (ret < 0) {
> +             kfree_skb(skb);
> +             skb = ERR_PTR(ret);
> +     }
> +
> +     return skb;
> +}
> +
> +static int __sock_write_skb(struct ckpt_ctx *ctx,
> +                         struct sk_buff *skb,
> +                         int dst_objref)
> +{
> +     struct ckpt_hdr_socket_buffer *h;
> +     int ret = 0;
> +     int i;
> +
> +     h = ckpt_hdr_get_type(ctx, sizeof(*h), CKPT_HDR_SOCKET_BUFFER);
> +     if (!h)
> +             return -ENOMEM;
> +
> +     if (dst_objref > 0) {
> +             BUG_ON(!skb->sk);
> +             ret = checkpoint_obj(ctx, skb->sk, CKPT_OBJ_SOCK);
> +             if (ret < 0)
> +                     goto out;
> +             h->sk_objref = ret;
> +             h->pr_objref = dst_objref;
> +     }
> +
> +     sock_record_header_info(skb, h);
> +
> +     ret = ckpt_write_obj(ctx, (struct ckpt_hdr *) h);
> +     if (ret < 0)
> +             goto out;
> +
> +     ret = ckpt_write_obj_type(ctx, skb->head, h->lin_len, CKPT_HDR_BUFFER);
> +     ckpt_debug("writing skb linear region %llu: %i\n", h->lin_len, ret);
> +     if (ret < 0)
> +             goto out;
> +
> +     for (i = 0; i < skb_shinfo(skb)->nr_frags; i++) {
> +             skb_frag_t *frag = &skb_shinfo(skb)->frags[i];
> +             u8 *vaddr = kmap(frag->page);

Here, too, consider checkpoint_dump_page() to avoid kmap() ?

It makes sense to have a scratch page to be used (also) for this,
on ckpt_ctx - to avoid alloc/dealloc repeatedly.

> +
> +             ckpt_debug("writing buffer fragment %i/%i (%i)\n",
> +                        i + 1, h->nr_frags, frag->size);
> +             ret = ckpt_write_obj_type(ctx, vaddr + frag->page_offset,
> +                                       frag->size, CKPT_HDR_BUFFER);
> +             kunmap(frag->page);

[...]

Oren.

_______________________________________________
Containers mailing list
[email protected]
https://lists.linux-foundation.org/mailman/listinfo/containers

_______________________________________________
Devel mailing list
[email protected]
https://openvz.org/mailman/listinfo/devel

Reply via email to