1 .\" Copyright (c) 2003,2004 The DragonFly Project. All rights reserved.
3 .\" This code is derived from software contributed to The DragonFly Project
4 .\" by Matthew Dillon <dillon@backplane.com>
6 .\" Redistribution and use in source and binary forms, with or without
7 .\" modification, are permitted provided that the following conditions
10 .\" 1. Redistributions of source code must retain the above copyright
11 .\" notice, this list of conditions and the following disclaimer.
12 .\" 2. Redistributions in binary form must reproduce the above copyright
13 .\" notice, this list of conditions and the following disclaimer in
14 .\" the documentation and/or other materials provided with the
16 .\" 3. Neither the name of The DragonFly Project nor the names of its
17 .\" contributors may be used to endorse or promote products derived
18 .\" from this software without specific, prior written permission.
20 .\" THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
21 .\" ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
22 .\" LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
23 .\" FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
24 .\" COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
25 .\" INCIDENTAL, SPECIAL, EXEMPLARY OR CONSEQUENTIAL DAMAGES (INCLUDING,
26 .\" BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
27 .\" LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED
28 .\" AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
29 .\" OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
30 .\" OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
33 .\" $DragonFly: src/lib/libc/sys/sys_checkpoint.2,v 1.9 2007/07/01 17:23:25 swildner Exp $
40 .Nd checkpoint or restore a process
47 .Fn sys_checkpoint "int type" "int fd" "pid_t pid" "int retval"
51 system call executes a checkpoint function as specified by
53 Supported types are as follows:
55 .Bl -tag -width ".Dv CKPT_FREEZE" -offset indent
57 Generate a checkpoint file.
60 must be -1 or the pid of the current process.
61 The checkpoint file will be written out to
65 is unused but must be specified as -1.
70 are both specified as -1, the system will generate a checkpoint file
71 using the system checkpoint template.
73 This function returns 0 on success, -1 on error, and typically 1
75 The value returned on resume is controlled by the
79 when resuming a checkpoint file.
80 A user program which installs its own
82 signal handler and calls
84 manually thus has control over both termination/continuance and
87 Restore a checkpointed program.
90 must be specified as -1, and
92 represents the checkpoint file.
95 specifies the value returned to the resumed program if
99 The checkpointed program will replace the current program, similar to
105 Upon successful completion, the value 0 is typically returned.
106 A checkpoint being resumed typically returns a positive value;
107 otherwise the value -1 is returned and the global variable
109 is set to indicate the error.
111 .Bd -literal -offset indent -compact
113 * Demonstrate checkpointing. Use control-E to checkpoint
114 * the program and 'checkpt -r x.ckpt' to resume it.
116 #include <sys/types.h>
117 #include <sys/signal.h>
118 #include <sys/checkpoint.h>
124 void docheckpoint(void);
135 main(int argc, char** argv)
139 signal(SIGCKPT, dockpt);
142 printf("iteration: %d\en", i);
147 printf("Checkpoint requested\en");
160 fd = open("x.ckpt", O_RDWR|O_CREAT|O_TRUNC, 0666);
162 printf("unable to create checkpoint file: %s\en",
167 ret = sys_checkpoint(CKPT_FREEZE, fd, -1, -1);
169 printf("unable to checkpoint: %s\en",
171 } else if (ret == 0) {
172 printf("checkpoint successful, continuing\en");
173 } else if (ret == 1) {
174 printf("resuming from checkpoint.\en");
176 printf("unknown return value %d from sys_checkpoint\en", ret);
179 /* note that the file descriptor is still valid on a resume */
188 is not a valid regular file, socket descriptor, or pipe.
190 all systems necessarily support checkpointing to sockets and pipes.
192 The caller does not have permission to issue the checkpoint command.
193 Checkpointing may be restricted or disabled using sysctls.
195 An I/O error occurred while reading from the file system.
197 An invalid parameter was specified.
199 .Sh CHECKPOINT FEATURES
200 The system checkpointing code will save the process register state (including
201 floating point registers), signal state, file descriptors representing
202 regular files or directories (anything that can be converted into a file
203 handle for storage), and both shared and private memory mappings.
204 Private, writable mappings are copied to the checkpoint file while shared
205 mappings and stored by referencing the file handle and offset.
206 Note that the system checkpointing code does not retain references to
207 deleted files, so mappings and open descriptors of deleted files
209 Unpredictable operation will occur if a checkpoint-unaware program
210 is restored and some of the underlying files mapped by the program
213 The system checkpointing code is not able to retain the process pid, process
214 group, user/group creds, or descriptors 0, 1, and 2.
215 These will be inherited from whomever restores the checkpoint.
217 When a checkpointed program is restored modified private mappings will
218 be mapped from the checkpoint file itself, but major portions of the
219 original program binary will be mapped from the original program binary.
220 If the resumed program is checkpointed again the system will automatically
221 copy any mappings from the original checkpoint file to the new one, since
222 the original is likely being replaced.
223 The caller must not truncate the existing checkpoint file when creating
224 a new one or specify the existing file's file descriptor as the new
225 one as this will destroy the data that the checkpoint operation needs
226 to copy to the new file.
227 It is best to checkpoint to a new file and then rename-over the old, or to
229 the old file before creating the new
230 one so it remains valid as long as the program continues to run.
232 Threaded programs cannot currently be checkpointed.
234 reduced to a single thread before it can be safely checkpointed.
237 mappings cannot currently be checkpointed.
238 A program must restore such mappings manually on resumption.
239 Only regular file and
240 anonymous memory mappings are checkpointed and restored.
241 Device and other special mappings are not.
242 Only regular file descriptors are checkpointed and restored.
243 Devices, pipes, sockets, and other special descriptors are not.
244 Memory wiring states are not checkpointed or restored.
246 states are not checkpointed or restored.
247 Basic mapping permissions are checkpointed and restored.
251 controls which group can use system checkpointing.
252 By default, only users in the
254 group are allowed to checkpoint and restore processes.
255 To allow users in any group to have this capability (risky), set sysctl
259 Two signals are associated with checkpointing.
261 is delivered via the tty ckpt character, usually control-E.
262 Its default action is to checkpoint a program and continue running it.
265 signal can only be delivered by
267 Its default action is to checkpoint a program and then exit.
269 might not be implemented by the system.
270 Both signals are defined to
271 be greater or equal to signal 32 and cannot be manipulated using legacy
274 If a program overrides the default action for a checkpoint signal the
275 system will not undertake any action of its own.
276 The program may issue
277 the checkpoint command from the signal handler itself or simply set a
278 reminder for later action.
279 It is usually safest to set a reminder and
280 do the actual checkpointing from your main loop.
287 function call appeared in