[CRIU] checkpointing processes under seccomp restrictions

Pavel Emelyanov xemul at parallels.com
Fri May 8 08:05:57 PDT 2015


On 05/08/2015 06:01 PM, Tycho Andersen wrote:

>>> 2. Allow a root task in the init ns to un-set a process' seccomp mode
>>>    so that we can inject the parasite code successfully.
>>>
>>> 3. Some other option that I haven't thought of.
>>
>> Do you have the list of actions the process (parasite) is not allowed to do?
> 
> In SECCOMP_MODE_STRICT the process is only allowed to do exit,
> sigreturn, read, and write (so all fds must already be open). 

In this case we will not even be able to mmap() the memory for parasite :(

> In SECCOMP_MODE_FILTER the restricted syscalls are user defined, so it
> could be anything.

Hm... This sounds promising -- and what's the way to change this mode for
a running process?

-- Pavel



More information about the CRIU mailing list