[CRIU] BUG in parasite_infect_seized()
Kirill Tkhai
ktkhai at virtuozzo.com
Fri May 20 07:45:15 PDT 2016
On 20.05.2016 17:40, Dmitry Safonov wrote:
> On 05/20/2016 03:39 PM, Kirill Tkhai wrote:
>> Hi,
>>
>> in case of parasite_start_daemon() fail, there is called:
>>
>> parasite_cure_seized()->parasite_cure_remote()->parasite_unmap()->parasite_run() and parasite_stop_on_syscall(),
>>
>> but the tracee is not infected at the moment, and it can't execute remote commands.
>>
>> So, criu fails to unmap memfd.
>
> That may be fixed by adding else to parasite_stop_daemon:
>> if (ctl->daemonized) {
> ...
>> } else {
>> return -1;
>> }
>
> Which is also logical: parasite_stop_daemon returns error
> if control was not daemonized.
But this case mapped memory still present in a tracee, doesn't it?
More information about the CRIU
mailing list