[CRIU] [PATCH] rework criu check logic

Saied Kazemi saied at google.com
Mon Feb 29 14:52:51 PST 2016


The "criu check" command to check if the kernel is properly configured
to run criu is broken.

The "criu check --ms" command used to be the way to tell criu to check
only for features that have been merged upstream.  But recent kernels
have a set of features whose presence doesn't necessarily mean dump will
fail but rather *may* fail to dump or restore (e.g., soft dirty tracker,
tun support, seccomp).

This patch deprecates --ms and introduces --abs for absolutely needed
features.

Typical use cases are:

	$ sudo criu check --abs
	Looks good.
	$ sudo criu check
	<zero or more errors...>
	Looks good but some kernel features are missing.
	$ sudo criu check --feature mnt_id
	Looks good.
	$ sudo criu check --feature seccomp_suspend
	Error (cr-check.c:604): Kernel doesn't support PTRACE_O_SUSPEND_SECCOMP
	$ sudo criu check --feature list
	mnt_id aio_remap timerfd tun userns fdinfo_lock seccomp_suspend \
		seccomp_filters loginuid cgroupns

Signed-off-by: Saied Kazemi <saied at google.com>
---
 criu/cr-check.c           | 178 +++++++++++++++++++++++-----------------------
 criu/cr-service.c         |   4 +-
 criu/crtools.c            |  28 ++++++--
 criu/include/cr_options.h |   2 +-
 4 files changed, 112 insertions(+), 100 deletions(-)

diff --git a/criu/cr-check.c b/criu/cr-check.c
index a67ee2d..d08e085 100644
--- a/criu/cr-check.c
+++ b/criu/cr-check.c
@@ -171,7 +171,6 @@ static int check_kcmp(void)
 
 static int check_prctl(void)
 {
-	unsigned long user_auxv = 0;
 	unsigned int *tid_addr;
 	unsigned int size = 0;
 	int ret;
@@ -183,37 +182,13 @@ static int check_prctl(void)
 	}
 
 	/*
-	 * Either new or old interface must be supported in the kernel.
+	 * The new interface must be supported in the kernel.
 	 */
 	ret = prctl(PR_SET_MM, PR_SET_MM_MAP_SIZE, (unsigned long)&size, 0, 0);
 	if (ret) {
-		if (!opts.check_ms_kernel) {
-			pr_msg("prctl: PR_SET_MM_MAP is not supported, which "
-			       "is required for restoring user namespaces\n");
-			return -1;
-		} else
-			pr_warn("Skipping unssuported PR_SET_MM_MAP\n");
-
-		ret = prctl(PR_SET_MM, PR_SET_MM_BRK, brk(0), 0, 0);
-		if (ret) {
-			if (ret == -EPERM)
-				pr_msg("prctl: One needs CAP_SYS_RESOURCE capability to perform testing\n");
-			else
-				pr_msg("prctl: PR_SET_MM is not supported\n");
-			return -1;
-		}
-
-		ret = prctl(PR_SET_MM, PR_SET_MM_EXE_FILE, -1, 0, 0);
-		if (ret != -EBADF) {
-			pr_msg("prctl: PR_SET_MM_EXE_FILE is not supported (%d)\n", ret);
-			return -1;
-		}
-
-		ret = prctl(PR_SET_MM, PR_SET_MM_AUXV, (long)&user_auxv, sizeof(user_auxv), 0);
-		if (ret) {
-			pr_msg("prctl: PR_SET_MM_AUXV is not supported\n");
-			return -1;
-		}
+		pr_msg("prctl: PR_SET_MM_MAP is not supported, which "
+		       "is required for restoring user namespaces\n");
+		return -1;
 	}
 
 	return 0;
@@ -766,11 +741,8 @@ static int check_aio_remap(void)
 	ctx = (aio_context_t)naddr;
 	r = syscall(SYS_io_getevents, ctx, 0, 1, NULL, NULL);
 	if (r < 0) {
-		if (!opts.check_ms_kernel) {
-			pr_err("AIO remap doesn't work properly\n");
-			return -1;
-		} else
-			pr_warn("Skipping unsupported AIO remap\n");
+		pr_err("AIO remap doesn't work properly\n");
+		return -1;
 	}
 
 	return 0;
@@ -782,12 +754,8 @@ static int check_fdinfo_lock(void)
 		return -1;
 
 	if (!kdat.has_fdinfo_lock) {
-		if (!opts.check_ms_kernel) {
-			pr_err("fdinfo doesn't contain the lock field\n");
-			return -1;
-		} else {
-			pr_warn("fdinfo doesn't contain the lock field\n");
-		}
+		pr_err("fdinfo doesn't contain the lock field\n");
+		return -1;
 	}
 
 	return 0;
@@ -823,14 +791,10 @@ static int check_clone_parent_vs_pid()
 static int check_cgroupns(void)
 {
 	int ret;
-	if (opts.check_ms_kernel) {
-		pr_warn("Skipping cgroup namespaces check\n");
-		return 0;
-	}
 
 	ret = access("/proc/self/ns/cgroup", F_OK);
 	if (ret < 0) {
-		pr_err("cgroupns not supported. This is not fatal.");
+		pr_err("cgroupns not supported. This is not fatal.\n");
 		return -1;
 	}
 
@@ -839,9 +803,22 @@ static int check_cgroupns(void)
 
 static int (*chk_feature)(void);
 
+/*
+ * There are three categories of kernel features:
+ *
+ *	1. Absolutely required (/proc/pid/map_files, ptrace PEEKSIGINFO, etc.)
+ *	2. Required only for specific cases (aio remap, tun, etc.)
+ *	3. Experimental (task-diag)
+ *
+ * We fail if any feature in category 1 is missing but tolerate failures
+ * in the other categories.  Currently, there is nothing in category 3.
+ */
+#define GOOD		"Looks good."
+#define GOOD_BUT	"Looks good but some kernel features are missing."
 int cr_check(void)
 {
 	struct ns_id ns = { .type = NS_CRIU, .ns_pid = PROC_SELF, .nd = &mnt_ns_desc };
+	int absret = 0;
 	int ret = 0;
 
 	if (!is_root_user())
@@ -863,26 +840,39 @@ int cr_check(void)
 		return -1;
 
 	if (chk_feature) {
-		ret = chk_feature();
+		if (chk_feature())
+			return -1;
 		goto out;
 	}
 
-	ret |= check_map_files();
-	ret |= check_sock_diag();
-	ret |= check_ns_last_pid();
-	ret |= check_sock_peek_off();
-	ret |= check_kcmp();
-	ret |= check_prctl();
-	ret |= check_fcntl();
-	ret |= check_proc_stat();
-	ret |= check_tcp();
-	ret |= check_fdinfo_ext();
-	ret |= check_unaligned_vmsplice();
-	ret |= check_tty();
-	ret |= check_so_gets();
-	ret |= check_ipc();
-	ret |= check_sigqueuinfo();
-	ret |= check_ptrace_peeksiginfo();
+	/*
+	 * Category 1 - absolutely required.
+	 */
+	absret |= check_map_files();
+	absret |= check_sock_diag();
+	absret |= check_ns_last_pid();
+	absret |= check_sock_peek_off();
+	absret |= check_kcmp();
+	absret |= check_prctl();
+	absret |= check_fcntl();
+	absret |= check_proc_stat();
+	absret |= check_tcp();
+	absret |= check_fdinfo_ext();
+	absret |= check_unaligned_vmsplice();
+	absret |= check_tty();
+	absret |= check_so_gets();
+	absret |= check_ipc();
+	absret |= check_sigqueuinfo();
+	absret |= check_ptrace_peeksiginfo();
+	if (absret || opts.check_abs_features) {
+		if (!absret)
+			print_on_level(DEFAULT_LOGLEVEL, "%s\n", GOOD);
+		return absret;
+	}
+
+	/*
+	 * Category 2 - required for specific cases.
+	 */
 	ret |= check_ptrace_suspend_seccomp();
 	ret |= check_ptrace_dump_seccomp_filters();
 	ret |= check_mem_dirty_track();
@@ -896,10 +886,8 @@ int cr_check(void)
 	ret |= check_cgroupns();
 
 out:
-	if (!ret)
-		print_on_level(DEFAULT_LOGLEVEL, "Looks good.\n");
-
-	return ret;
+	print_on_level(DEFAULT_LOGLEVEL, "%s\n", ret ? GOOD_BUT : GOOD);
+	return 0;
 }
 
 static int check_tun(void)
@@ -947,32 +935,42 @@ static int check_loginuid(void)
 	return 0;
 }
 
+struct feature_list {
+	char *name;
+	int (*func)();
+};
+
+static struct feature_list feature_list[] = {
+	{ "mnt_id", check_mnt_id },
+	{ "aio_remap", check_aio_remap },
+	{ "timerfd", check_timerfd },
+	{ "tun", check_tun },
+	{ "userns", check_userns },
+	{ "fdinfo_lock", check_fdinfo_lock },
+	{ "seccomp_suspend", check_ptrace_suspend_seccomp },
+	{ "seccomp_filters", check_ptrace_dump_seccomp_filters },
+	{ "loginuid", check_loginuid },
+	{ "cgroupns", check_cgroupns },
+	{ NULL, NULL },
+};
+
 int check_add_feature(char *feat)
 {
-	if (!strcmp(feat, "mnt_id"))
-		chk_feature = check_mnt_id;
-	else if (!strcmp(feat, "aio_remap"))
-		chk_feature = check_aio_remap;
-	else if (!strcmp(feat, "timerfd"))
-		chk_feature = check_timerfd;
-	else if (!strcmp(feat, "tun"))
-		chk_feature = check_tun;
-	else if (!strcmp(feat, "userns"))
-		chk_feature = check_userns;
-	else if (!strcmp(feat, "fdinfo_lock"))
-		chk_feature = check_fdinfo_lock;
-	else if (!strcmp(feat, "seccomp_suspend"))
-		chk_feature = check_ptrace_suspend_seccomp;
-	else if (!strcmp(feat, "seccomp_filters"))
-		chk_feature = check_ptrace_dump_seccomp_filters;
-	else if (!strcmp(feat, "loginuid"))
-		chk_feature = check_loginuid;
-	else if (!strcmp(feat, "cgroupns"))
-		chk_feature = check_cgroupns;
-	else {
-		pr_err("Unknown feature %s\n", feat);
-		return -1;
+	struct feature_list *fl;
+
+	if (!strcmp(feat, "list")) {
+		for (fl = feature_list; fl->name; fl++)
+			pr_msg("%s ", fl->name);
+		pr_msg("\n");
+		return 1;
 	}
 
-	return 0;
+	for (fl = feature_list; fl->name; fl++) {
+		if (!strcmp(feat, fl->name)) {
+			chk_feature = fl->func;
+			return 0;
+		}
+	}
+	pr_err("Unknown feature %s\n", feat);
+	return -1;
 }
diff --git a/criu/cr-service.c b/criu/cr-service.c
index 88d4af7..a1d843d 100644
--- a/criu/cr-service.c
+++ b/criu/cr-service.c
@@ -567,8 +567,8 @@ static int check(int sk)
 
 	setproctitle("check --rpc");
 
-	/* Check only minimal kernel support */
-	opts.check_ms_kernel = true;
+	/* Check only abolutely needed kernel features */
+	opts.check_abs_features = true;
 
 	if (!cr_check())
 		resp.success = true;
diff --git a/criu/crtools.c b/criu/crtools.c
index a8ddb82..2120082 100644
--- a/criu/crtools.c
+++ b/criu/crtools.c
@@ -275,6 +275,7 @@ int main(int argc, char *argv[], char *envp[])
 		{ "timeout",			required_argument,	0, 1072 },
 		{ "external",			required_argument,	0, 1073	},
 		{ "empty-ns",			required_argument,	0, 1074	},
+		{ "abs",			no_argument,		0, 1075	},
 		{ },
 	};
 
@@ -455,8 +456,8 @@ int main(int argc, char *argv[], char *envp[])
 			opts.force_irmap = true;
 			break;
 		case 1054:
-			opts.check_ms_kernel = true;
-			break;
+			pr_err("--ms is deprecated, use --abs instead\n");
+			return 1;
 		case 'L':
 			opts.libdir = optarg;
 			break;
@@ -490,8 +491,11 @@ int main(int argc, char *argv[], char *envp[])
 				return 1;
 			break;
 		case 1063:
-			if (check_add_feature(optarg) < 0)
+			ret = check_add_feature(optarg);
+			if (ret < 0)	/* invalid kernel feature name */
 				return 1;
+			if (ret > 0)	/* list kernel features and exit */
+				return 0;
 			break;
 		case 1064:
 			if (!add_skip_mount(optarg))
@@ -554,6 +558,9 @@ int main(int argc, char *argv[], char *envp[])
 				return 1;
 			}
 			break;
+		case 1075:
+			opts.check_abs_features = true;
+			break;
 		case 'V':
 			pr_msg("Version: %s\n", CRIU_VERSION);
 			if (strcmp(CRIU_GITID, "0"))
@@ -714,7 +721,7 @@ usage:
 "Usage:\n"
 "  criu dump|pre-dump -t PID [<options>]\n"
 "  criu restore [<options>]\n"
-"  criu check [--ms]\n"
+"  criu check [--feature FEAT]\n"
 "  criu exec -p PID <syscall-string>\n"
 "  criu page-server\n"
 "  criu service [<options>]\n"
@@ -807,8 +814,16 @@ usage:
 "                            socket[inode]\n"
 "                            file[mnt_id:inode]\n"
 "  --empty-ns {net}\n"
-"			Create a namespace, but don't restore its properies.\n"
-"			An user will retore them from action scripts.\n"
+"                        Create a namespace, but don't restore its properies.\n"
+"                        An user will retore them from action scripts.\n"
+"Check options:\n"
+"  --abs                 check availability of absolutely needed kernel features\n"
+"  --ms                  deprecated, use --abs (don't check not yet merged kernel features)\n"
+"  --feature FEAT        check availability of one of the following kernel features\n"
+"                        "
+	);
+	check_add_feature("list");
+	pr_msg(
 "\n"
 "* Logging:\n"
 "  -o|--log-file FILE    log file name\n"
@@ -836,7 +851,6 @@ usage:
 "Other options:\n"
 "  -h|--help             show this text\n"
 "  -V|--version          show version\n"
-"     --ms               don't check not yet merged kernel features\n"
 	);
 
 	return 0;
diff --git a/criu/include/cr_options.h b/criu/include/cr_options.h
index a6f0b3e..ba2633a 100644
--- a/criu/include/cr_options.h
+++ b/criu/include/cr_options.h
@@ -56,7 +56,7 @@ struct cr_options {
 	int			final_state;
 	char			*show_dump_file;
 	char			*show_fmt;
-	bool			check_ms_kernel;
+	bool			check_abs_features;
 	bool			show_pages_content;
 	union {
 		bool		restore_detach;
-- 
2.7.0.rc3.207.g0ac5344



More information about the CRIU mailing list