[CRIU] [PATCH] seccomp: add a --no-seccomp option to disable dumping seccomp

Pavel Emelyanov xemul at virtuozzo.com
Thu Feb 18 02:49:02 PST 2016


On 02/17/2016 09:15 PM, Saied Kazemi wrote:
> On Wed, Feb 17, 2016 at 9:36 AM, Pavel Emelyanov <xemul at virtuozzo.com <mailto:xemul at virtuozzo.com>> wrote:
> 
>     On 02/17/2016 08:27 PM, Saied Kazemi wrote:
>     > I am running the containers with --security-opt seccomp:unconfined option,
>     > so there should be no security risks.
> 
>     Ouch. Why does criu then sees some seccomp configured on it?
> 
> 
> I think I know what happened.  I had a script that would build and install CRIU and then test Docker
> checkpoint and restore.  The script was failing because criu check was failing but somehow I assumed
> that it was criu dump that was failing although --security-opt seccomp:unconfined option was used.
>  Sorry for the confusion :(

Ah, I see. I will then roll-back Tycho's patch not to burden the API with the
stuff we don't really need. OK?
    
>     > Now what can we do to make criu check pass when running on kernels that
>     > don't have seccomp?  The section "Checking That It Works" in
>     > http://criu.org/Installation says that the users should see "Looks OK".
>     > But currently we can't get a "Looks OK" message even with --no-seccomp.
>     > Pavel had a suggestion on how to redo criu check.
> 
>     Yup. We should distinguish tree types of features -- those, that are strictly
>     required to make things work (/proc/pid/map_files, ptrace PEEKSIGINFO ,etc),
>     those that are required, but only for "specific cases" (aio remap, tun, etc)
>     and those that are experimental (e.g. task-diag from Andrey).
> 
> 
> The 3-mode scheme sounds reasonable but which modes are absolutely necessary for
> CRIU to dump and restore successfully.  

Looking at cr_check() I think that we 100% need everything till check_ptrace_peeksiginfo,
as pretty much every task uses what we check with it.

All the other stuff is optional and criu can succeed w/o them.

And, by now, we have no experimental features in criu that require non-upstream kernel.

> We maintained in the past that if users don't get "Looks OK" from criu check they won't
> be able to dump/restore.  But that's not the case anymore as criu check fails with
> seccomp errors but it successfully dumps and restores.

Yes, I agree. Would you be able to prepare the patch to fix the cr-check untill
criu-2.0 release?

>     But as far as seccomp is concerned, I'm now in doubt -- if there's no seccomp
>     configured on a task, criu should just dump it even if there's no support
>     from kernel to dump seccomp. But this seems not to be the case for Saied.
> 
> 
> Per my explanation above, sorry for the false alarm!

That's OK :) Given enough eyeballs, all bugs are shallow.

-- Pavel



More information about the CRIU mailing list