[CRIU] criu check --extra output and dump failure

Brinkmann, Harald Harald.Brinkmann at bst-international.com
Tue Apr 11 06:16:58 PDT 2017


Hi Dmitry,

On Tue, 2017-04-11 at 14:51 +0300, Dmitry Safonov wrote:
> 2017-04-11 14:43 GMT+03:00 Dmitry Safonov <0x7f454c46 at gmail.com>:
> > 2017-04-11 11:56 GMT+03:00 Brinkmann, Harald
> > <Harald.Brinkmann at bst-international.com>:
> >> On Mon, 2017-04-10 at 17:07 +0300, Dmitry Safonov wrote:
> >>> 2017-04-10 16:59 GMT+03:00 Dmitry Safonov <0x7f454c46 at gmail.com>:
> >>> > 2017-04-07 16:23 GMT+03:00 Dmitry Safonov <0x7f454c46 at gmail.com>:
> >>> >> 2017-04-07 16:14 GMT+03:00 Brinkmann, Harald
> >>> >> <Harald.Brinkmann at bst-international.com>:
> >>> >>>> could you check it on the last release (which is 2.12.1)?
> >>> >>>> I assume that arm port was broken during last changes.
> >>> >>>> We'll try to check and fix them till v3.0 release.
> >>> >>>
> >>> >>> Yes, it is 2.12.1.
> >>> >>>
> >>> >>> Is there a "last known good" ARM-version I might try to go back to?
> >>> >>
> >>> >> Ok, try 2.11, please.
> >>> >
> >>> > Hi Harald,
> >>> >
> >>> > Have you managed your problems with CRIU on ARM32?
> >>> > Because I just tried it on RPI2 board with 4.11.0-rc5 kernel
> >>> > and it works. Yes, there are some problems with tests, etc,
> >>> > but simple setsid loop C/R normally, as many tests.
> >>> >
> >>> > Please, if you still have problems, provide info about your
> >>> > environment: gcc, ld versions, as this looks to depend on it.
> >>> >
> >>> > Will you be able to recompile criu and run some commands?
> >>>
> >>> More info about my env, JFI:
> >>>
> >>> [criu]# gcc --version
> >>> gcc (GCC) 6.3.1 20170306
> >>> Copyright (C) 2016 Free Software Foundation, Inc.
> >>> This is free software; see the source for copying conditions.  There is NO
> >>> warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
> >>> [criu]# ld --version
> >>> GNU ld (GNU Binutils) 2.28.0.20170322
> >>> Copyright (C) 2017 Free Software Foundation, Inc.
> >>> This program is free software; you may redistribute it under the terms of
> >>> the GNU General Public License version 3 or (at your option) a later version.
> >>> This program has absolutely no warranty.
> >>>
> >>> I've checked criu-dev, master and v2.12.1 tag.
> >>
> >> I have been away for a couple of days, so I didn't yet have a chance to
> >> do further tests.
> >>
> >> I am on a custom imx6q-based board. We do full cross-compilation from an
> >> x86-based Linux system. Our versions are quite old compared to yours:
> >>
> >>> platform-imx6/selected_toolchain/arm-v7a-linux-gnueabihf-gcc --version
> >> arm-v7a-linux-gnueabihf-gcc (OSELAS.Toolchain-2014.12.2) 4.9.2
> >> Copyright (C) 2014 Free Software Foundation, Inc.
> >> This is free software; see the source for copying conditions.  There is NO
> >> warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
> >>
> >>> platform-imx6/selected_toolchain/arm-v7a-linux-gnueabihf-ld --version
> >> GNU ld (GNU Binutils) 2.24
> >> Copyright 2013 Free Software Foundation, Inc.
> >> This program is free software; you may redistribute it under the terms of
> >> the GNU General Public License version 3 or (at your option) a later version.
> >> This program has absolutely no warranty.
> >
> > For x86 and ppc64 relocations in parasite's object are handled this way:
> > 1. link-time: parsing ELF relocation table and writing relocations to
> >    a header file, which is used in..
> > 2. run-time: applying relocations on remote task by CRIU (adding base
> >    address where the parasite was loaded)
> >
> > But for arm32/arm64 we do this yet different less-reliable way:
> > we expect that toolchain (ld) will produce a valid PIE, so no relocations
> > done by CRIU in runtime.
> > I've noticed that `-r' flag to ld on arm doesn't handle relocation for PIE
> > binaries. That was solved in criu/pie/Makefile with $(LD_R) thing
> > previously and NO_RELOCS in compel/src/main-host.c on criu-dev
> > at this moment.
> >
> > So, the first thing to do is using objdump from your toolchain, check
> > that relocs were handled during linking:
> >> [criu]# objdump -d criu/pie/parasite.built-in.o
> >> criu/pie/parasite.built-in.o:     file format elf32-littlearm
> >> Disassembly of section .crblob:
> >> 00000000 <__export_parasite_head_start>:
> >>        0:    e24f2008     sub    r2, pc, #8
> >>        4:    e28f0018     add    r0, pc, #24
> >>        8:    e5900000     ldr    r0, [r0]
> >>        c:    e28f100c     add    r1, pc, #12
> >>       10:    e5911000     ldr    r1, [r1]
> >>       14:    e0811002     add    r1, r1, r2
> >>       18:    eb0009ea     bl    27c8 <parasite_service>
> >>       1c:    e7f001f0     .word    0xe7f001f0
> >
> > So, jump to parasite_service() should look like this, not like
> >>      18:    ebfffffe     bl    27c8 <parasite_service>
> >
> > Anyway, I think your issue is something different, not unhandled
> > relocs. Because unhandled relocation instruction is `ebfffffe'
> > which is `bl .' (self-jump).
> > Which would lead to busylooping on dump, not to segfault as
> > in your log.

This is from my objdump:

00000000 <__export_parasite_head_start>:
   0:   e24f2008        sub     r2, pc, #8
   4:   e28f0018        add     r0, pc, #24
   8:   e5900000        ldr     r0, [r0]
   c:   e28f100c        add     r1, pc, #12
  10:   e5911000        ldr     r1, [r1]
  14:   e0811002        add     r1, r1, r2
  18:   ebfffffe        bl      15a4 <parasite_service>
  1c:   e7f001f0        .word   0xe7f001f0

And it looks like the jump to parasite_service() is broken as you first
suspected. Maybe this does give a signal 11 after all - as I understand
it is sort of an illegal address after all.

> > So, to blow some more light on this, could you get the address
> > of segmentation fault and dump log again?
> > You can enable logging of fatal signals with this:
> >> echo 1 > /proc/sys/kernel/print-fatal-signals
> > and get the PC from dmesg afterward.
> >
> > Then we can check where it is in parasite blob, if it's not kind of
> > null-pointer dereference.

This is the dmesg dump:

[  154.054831] potentially unexpected fatal signal 11.
[  154.059803] CPU: 3 PID: 632 Comm: test.sh Tainted: G           O    4.4.8-20170119-1 #3
[  154.067889] Hardware name: Freescale i.MX6 Quad/DualLite (Device Tree)
[  154.075973] task: 99401dc0 ti: a4e84000 task.ti: a4e84000
[  154.081697] PC is at 0x76e78680
[  154.084852] LR is at 0x76e7701c
[  154.088060] pc : [<76e78680>]    lr : [<76e7701c>]    psr: 20080010
[  154.088060] sp : 76e80380  ip : 00000072  fp : 54b122f4
[  154.099607] r10: 55b01008  r9 : 00000000  r8 : 55b01284
[  154.104851] r7 : 00000072  r6 : 55b012f4  r5 : 76f7ef10  r4 : 54b12ab0
[  154.111437] r3 : 00000000  r2 : 76e77000  r1 : 00001e08  r0 : 00000002
[  154.118007] Flags: nzCv  IRQs on  FIQs on  Mode USER_32  ISA ARM  Segment user
[  154.125241] Control: 10c5387d  Table: 3628804a  DAC: 00000055
[  154.131019] CPU: 3 PID: 632 Comm: test.sh Tainted: G           O    4.4.8-20170119-1 #3
[  154.139033] Hardware name: Freescale i.MX6 Quad/DualLite (Device Tree)
[  154.145564] Backtrace:
[  154.148055] [<80013f80>] (dump_backtrace) from [<800141cc>] (show_stack+0x20/0x24)
[  154.155629]  r6:60080113 r5:8099cae8 r4:00000000 r3:00000000
[  154.161363] [<800141ac>] (show_stack) from [<802adab4>] (dump_stack+0x9c/0xb0)
[  154.168596] [<802ada18>] (dump_stack) from [<80010b80>] (show_regs+0x1c/0x20)
[  154.175733]  r6:a4e85edc r5:a609cf88 r4:a4e85fb0 r3:8095cdcc
[  154.181459] [<80010b64>] (show_regs) from [<800335a8>] (get_signal+0x5f8/0x6ec)
[  154.188777] [<80032fb0>] (get_signal) from [<80013350>] (do_signal+0xc4/0x424)
[  154.196001]  r10:55b01008 r9:a4e84000 r8:00000000 r7:00000000 r6:a4e85fb0 r5:a4e85ec8
[  154.203906]  r4:00000000
[  154.206462] [<8001328c>] (do_signal) from [<80013888>] (do_work_pending+0xa8/0xc0)
[  154.214033]  r10:55b01008 r9:a4e84000 r8:00000000 r7:10c5387d r6:a4e85fb0 r5:00000000
[  154.221937]  r4:a4e84010
[  154.224493] [<800137e0>] (do_work_pending) from [<8000fdd4>] (slow_work_pending+0xc/0x20)
[  154.232671]  r7:10c5387d r6:ffffffff r5:20080010 r4:76e78680


And the criu log:

(00.002101) Version: 2.12.1 (gitid 0)
(00.003693) Probing sock diag modules
(00.003964) Done probing
(00.074836) Error (criu/util.c:670): exited, status=3
(00.096082) Error (criu/util.c:670): exited, status=3
(00.096311) ========================================
(00.096335) Dumping processes (pid: 632)
(00.096349) ========================================
(00.096382) Running pre-dump scripts
(00.097713) Pagemap is fully functional
(00.097875) Found anon-shmem device at 5
(00.097908) Reset 699's dirty tracking
(00.097997)  ... done
(00.098110) Dirty tracking support is OFF
(00.098372) Found task size of 7f000000
(00.138385) Adjust mmap_min_addr 0x8000 -> 0x10000
(00.138483) Found mmap_min_addr 0x10000
(00.138514) irmap: Searching irmap cache in work dir
(00.139296) No irmap-cache image
(00.139366) irmap: Searching irmap cache in parent
(00.140066) irmap: No irmap cache
(00.140311) cg-prop: Parsing controller "cpu"
(00.140369) cg-prop:    Strategy "replace"
(00.140406) cg-prop:    Property "cpu.shares"
(00.140439) cg-prop:    Property "cpu.cfs_period_us"
(00.140469) cg-prop:    Property "cpu.cfs_quota_us"
(00.140500) cg-prop:    Property "cpu.rt_period_us"
(00.140530) cg-prop:    Property "cpu.rt_runtime_us"
(00.140575) cg-prop: Parsing controller "memory"
(00.140623) cg-prop:    Strategy "replace"
(00.140658) cg-prop:    Property "memory.limit_in_bytes"
(00.140689) cg-prop:    Property "memory.memsw.limit_in_bytes"
(00.140719) cg-prop:    Property "memory.swappiness"
(00.140749) cg-prop:    Property "memory.soft_limit_in_bytes"
(00.140780) cg-prop:    Property "memory.move_charge_at_immigrate"
(00.140810) cg-prop:    Property "memory.oom_control"
(00.140840) cg-prop:    Property "memory.use_hierarchy"
(00.140870) cg-prop:    Property "memory.kmem.limit_in_bytes"
(00.140900) cg-prop:    Property "memory.kmem.tcp.limit_in_bytes"
(00.140928) cg-prop: Parsing controller "cpuset"
(00.140959) cg-prop:    Strategy "replace"
(00.140991) cg-prop:    Property "cpuset.cpus"
(00.141021) cg-prop:    Property "cpuset.mems"
(00.141050) cg-prop:    Property "cpuset.memory_migrate"
(00.141080) cg-prop:    Property "cpuset.cpu_exclusive"
(00.141109) cg-prop:    Property "cpuset.mem_exclusive"
(00.141139) cg-prop:    Property "cpuset.mem_hardwall"
(00.141168) cg-prop:    Property "cpuset.memory_spread_page"
(00.141198) cg-prop:    Property "cpuset.memory_spread_slab"
(00.141227) cg-prop:    Property "cpuset.sched_load_balance"
(00.141258) cg-prop:    Property "cpuset.sched_relax_domain_level"
(00.141287) cg-prop: Parsing controller "blkio"
(00.141319) cg-prop:    Strategy "replace"
(00.141350) cg-prop:    Property "blkio.weight"
(00.141379) cg-prop: Parsing controller "freezer"
(00.141410) cg-prop:    Strategy "replace"
(00.141442) cg-prop: Parsing controller "perf_event"
(00.141474) cg-prop:    Strategy "replace"
(00.141505) cg-prop: Parsing controller "net_cls"
(00.141537) cg-prop:    Strategy "replace"
(00.141568) cg-prop:    Property "net_cls.classid"
(00.141598) cg-prop: Parsing controller "net_prio"
(00.141629) cg-prop:    Strategy "replace"
(00.141660) cg-prop:    Property "net_prio.ifpriomap"
(00.141690) cg-prop: Parsing controller "pids"
(00.141721) cg-prop:    Strategy "replace"
(00.141752) cg-prop:    Property "pids.max"
(00.141781) cg-prop: Parsing controller "devices"
(00.141812) cg-prop:    Strategy "replace"
(00.141844) cg-prop:    Property "devices.list"
(00.142265) Perparing image inventory (version 1)
(00.142442) Add pid ns 1 pid 699
(00.142551) Add net ns 2 pid 699
(00.142649) Add ipc ns 3 pid 699
(00.142744) Add uts ns 4 pid 699
(00.142837) Add mnt ns 5 pid 699
(00.142902) Add user ns 6 pid 699
(00.142963) Add cgroup ns 7 pid 699
(00.142999) cg: Dumping cgroups for 699
(00.143237) cg:  `- New css ID 1
(00.143281) cg:     `- [devices] -> [/system.slice/system-serial\x2dgetty.slice] [0]
(00.143315) cg:     `- [memory] -> [/] [0]
(00.143343) cg:     `- [name=systemd] -> [/system.slice/system-serial\x2dgetty.slice/serial-getty at ttymxc1.service] [0]
(00.143372) cg: Set 1 is criu one
(00.144209) Seized task 632, state 1
(00.144420) Collected (4 attempts, 0 in_progress)
(00.144619) Seized task 701, state 0
(00.145264) Collected (4 attempts, 0 in_progress)
(00.145471) Collected (4 attempts, 0 in_progress)
(00.145575) Collected 701 in 1 state
(00.145827) Collected (3 attempts, 0 in_progress)
(00.145885) Collected 632 in 1 state
(00.146630) Lock network
(00.147284)     type nfs source 192.168.0.98:/root mnt_id 16 s_dev 0x10 / @ ./ flags 0x300000 options vers=3,rsize=4096,wsize=4096,namlen=255,hard,nolock,proto=tcp,port=2049,timeo=600,retrans=2,sec=sys,mountaddr=192.168.0.98,mountvers=3,mountport=2049,mountproto=tcp,local_lock=all,addr=192.168.0.98
(00.147452)     type devtmpfs source devtmpfs mnt_id 17 s_dev 0x6 / @ ./dev flags 0x300000 options size=316836k,nr_inodes=79209,mode=755
(00.147557)     type sysfs source sysfs mnt_id 18 s_dev 0x11 / @ ./sys flags 0x30000e options
(00.147654)     type proc source proc mnt_id 19 s_dev 0x4 / @ ./proc flags 0x30000e options
(00.147753)     type securityfs source securityfs mnt_id 20 s_dev 0x12 / @ ./sys/kernel/security flags 0x30000e options
(00.147846)     type tmpfs source tmpfs mnt_id 21 s_dev 0x13 / @ ./dev/shm flags 0x1100006 options
(00.147959)     type devpts source devpts mnt_id 22 s_dev 0xd / @ ./dev/pts flags 0x30000a options gid=112,mode=620,ptmxmode=000
(00.148127)     type tmpfs source tmpfs mnt_id 23 s_dev 0x14 / @ ./run flags 0x1100006 options mode=755
(00.148234)     type tmpfs source tmpfs mnt_id 24 s_dev 0x15 / @ ./sys/fs/cgroup flags 0x110000f options mode=755
(00.148516)     type cgroup source cgroup mnt_id 25 s_dev 0x16 / @ ./sys/fs/cgroup/systemd flags 0x30000e options xattr,release_agent=/lib/systemd/systemd-cgroups-agent,name=systemd
(00.148632)     type cgroup source cgroup mnt_id 26 s_dev 0x17 / @ ./sys/fs/cgroup/devices flags 0x30000e options devices
(00.148738)     type cgroup source cgroup mnt_id 27 s_dev 0x18 / @ ./sys/fs/cgroup/memory flags 0x30000e options memory
(00.148832)     type debugfs source debugfs mnt_id 28 s_dev 0x7 / @ ./sys/kernel/debug flags 0x300000 options
(00.148922)     type mqueue source mqueue mnt_id 29 s_dev 0xe / @ ./dev/mqueue flags 0x300000 options
(00.149017)     type fusectl source fusectl mnt_id 30 s_dev 0x19 / @ ./sys/fs/fuse/connections flags 0x300000 options
(00.149162)     type tmpfs source tmpfs mnt_id 47 s_dev 0x1a / @ ./var/tmp flags 0x300006 options size=205488k
(00.149270)     type tmpfs source tmpfs mnt_id 49 s_dev 0x1b / @ ./tmp flags 0x300006 options size=205488k
(00.149377)     type tmpfs source tmpfs mnt_id 51 s_dev 0x1c / @ ./var/lock flags 0x30000e options size=1024k,mode=755
(00.149503) mnt: Building mountpoints tree
(00.149543) mnt:        Building plain mount tree
(00.149570) mnt:                Working on 51->16
(00.149601) mnt:                Working on 49->16
(00.149629) mnt:                Working on 47->16
(00.149656) mnt:                Working on 30->18
(00.149681) mnt:                Working on 29->17
(00.149708) mnt:                Working on 28->18
(00.149734) mnt:                Working on 27->24
(00.149760) mnt:                Working on 26->24
(00.149786) mnt:                Working on 25->24
(00.149811) mnt:                Working on 24->18
(00.149836) mnt:                Working on 23->16
(00.149863) mnt:                Working on 22->17
(00.149888) mnt:                Working on 21->17
(00.149914) mnt:                Working on 20->18
(00.149940) mnt:                Working on 19->16
(00.149966) mnt:                Working on 18->16
(00.149992) mnt:                Working on 17->16
(00.150018) mnt:                Working on 16->0
(00.150045) mnt:        Resorting siblings on 16
(00.150071) mnt:        Resorting siblings on 51
(00.150097) mnt:        Resorting siblings on 49
(00.150255) mnt:        Resorting siblings on 47
(00.150288) mnt:        Resorting siblings on 23
(00.150316) mnt:        Resorting siblings on 19
(00.150343) mnt:        Resorting siblings on 18
(00.150368) mnt:        Resorting siblings on 30
(00.150394) mnt:        Resorting siblings on 28
(00.150421) mnt:        Resorting siblings on 24
(00.150447) mnt:        Resorting siblings on 27
(00.150473) mnt:        Resorting siblings on 26
(00.150499) mnt:        Resorting siblings on 25
(00.150526) mnt:        Resorting siblings on 20
(00.150552) mnt:        Resorting siblings on 17
(00.150577) mnt:        Resorting siblings on 29
(00.150602) mnt:        Resorting siblings on 22
(00.150628) mnt:        Resorting siblings on 21
(00.150654) mnt: Done:
(00.150678) mnt: [./](16->0)
(00.150710) mnt:  [./tmp](49->16)
(00.150739) mnt:  <--
(00.150799) mnt:  [./dev](17->16)
(00.150832) mnt:   [./dev/mqueue](29->17)
(00.150863) mnt:   <--
(00.150890) mnt:   [./dev/shm](21->17)
(00.150918) mnt:   <--
(00.150944) mnt:   [./dev/pts](22->17)
(00.150973) mnt:   <--
(00.150998) mnt:  <--
(00.151023) mnt:  [./sys](18->16)
(00.151051) mnt:   [./sys/kernel/debug](28->18)
(00.151079) mnt:   <--
(00.151103) mnt:   [./sys/kernel/security](20->18)
(00.151132) mnt:   <--
(00.151158) mnt:   [./sys/fs/cgroup](24->18)
(00.151186) mnt:    [./sys/fs/cgroup/memory](27->24)
(00.151214) mnt:    <--
(00.151239) mnt:    [./sys/fs/cgroup/systemd](25->24)
(00.151268) mnt:    <--
(00.151293) mnt:    [./sys/fs/cgroup/devices](26->24)
(00.151321) mnt:    <--
(00.151346) mnt:   <--
(00.151372) mnt:   [./sys/fs/fuse/connections](30->18)
(00.151401) mnt:   <--
(00.151426) mnt:  <--
(00.151451) mnt:  [./proc](19->16)
(00.151479) mnt:  <--
(00.151504) mnt:  [./run](23->16)
(00.151532) mnt:  <--
(00.151557) mnt:  [./var/tmp](47->16)
(00.151584) mnt:  <--
(00.151610) mnt:  [./var/lock](51->16)
(00.151638) mnt:  <--
(00.151664) mnt: <--
(00.151780) Collecting netns 2/699
(00.152927) sk unix:    Collected: ino 0x5c6 peer_ino 0 family    1 type    2 state  7 name /run/systemd/notify
(00.153029) sk unix:    Collected: ino 0x5c8 peer_ino 0 family    1 type    2 state  7 name /run/systemd/cgroups-agent
(00.153111) sk unix:    Collected: ino 0x5cc peer_ino 0 family    1 type    1 state 10 name /run/systemd/private
(00.153191) sk unix:    Collected: ino 0x5d7 peer_ino 0 family    1 type    1 state 10 name /run/systemd/journal/stdout
(00.153266) sk unix:    Collected: ino 0x5da peer_ino 0 family    1 type    2 state  7 name /run/systemd/journal/socket
(00.153341) sk unix:    Collected: ino 0x5e1 peer_ino 0 family    1 type    5 state 10 name /run/systemd/coredump
(00.153448) sk unix:    Collected: ino 0x12e1 peer_ino 0 family    1 type    1 state 10 name /var/run/dbus/system_bus_socket
(00.153529) sk unix:    Collected: ino 0x5ed peer_ino 0 family    1 type    5 state 10 name /run/udev/control
(00.153605) sk unix:    Collected: ino 0x5f1 peer_ino 0 family    1 type    2 state  7 name /run/systemd/journal/dev-log
(00.153678) sk unix:    Collected: ino 0x63a peer_ino 0x20c4 family    1 type    1 state  1 name /run/systemd/journal/stdout
(00.153773) sk unix:    Collected: ino 0x1644 peer_ino 0x22ca family    1 type    1 state  1 name /var/run/dbus/system_bus_socket
(00.153822) sk unix:    Collected: ino 0x15c1 peer_ino 0x15c2 family    1 type    2 state  7 name (null)
(00.153865) sk unix:    Collected: ino 0x7ca peer_ino 0x22a5 family    1 type    1 state  1 name (null)
(00.153956) sk unix:    Collected: ino 0x1612 peer_ino 0x1609 family    1 type    1 state  1 name /var/run/dbus/system_bus_socket
(00.154005) sk unix:    Collected: ino 0x130e peer_ino 0x5da family    1 type    2 state  7 name (null)
(00.154047) sk unix:    Collected: ino 0x7fd peer_ino 0x22ad family    1 type    1 state  1 name (null)
(00.154087) sk unix:    Collected: ino 0x29b1 peer_ino 0 family    1 type    5 state  7 name (null)
(00.154127) sk unix:    Collected: ino 0x22ca peer_ino 0x1644 family    1 type    1 state  1 name (null)
(00.154196) sk unix:    Collected: ino 0x22c6 peer_ino 0x245b family    1 type    1 state  1 name /run/systemd/journal/stdout
(00.154242) sk unix:    Collected: ino 0x1610 peer_ino 0x1611 family    1 type    1 state  1 name (null)
(00.154282) sk unix:    Collected: ino 0x2118 peer_ino 0x5da family    1 type    2 state  7 name (null)
(00.154322) sk unix:    Collected: ino 0x20c4 peer_ino 0x63a family    1 type    1 state  1 name (null)
(00.154362) sk unix:    Collected: ino 0x5ca peer_ino 0x5cb family    1 type    2 state  7 name (null)
(00.154430) sk unix:    Collected: ino 0x22a5 peer_ino 0x7ca family    1 type    1 state  1 name /run/systemd/journal/stdout
(00.154475) sk unix:    Collected: ino 0x15c2 peer_ino 0x15c1 family    1 type    2 state  7 name (null)
(00.154544) sk unix:    Collected: ino 0x22ad peer_ino 0x7fd family    1 type    1 state  1 name /run/systemd/journal/stdout
(00.154589) sk unix:    Collected: ino 0x1609 peer_ino 0x1612 family    1 type    1 state  1 name (null)
(00.154672) sk unix:    Collected: ino 0x1706 peer_ino 0x1707 family    1 type    1 state  1 name (null)
(00.154718) sk unix:    Collected: ino 0x1611 peer_ino 0x1610 family    1 type    1 state  1 name (null)
(00.154759) sk unix:    Collected: ino 0x1707 peer_ino 0x1706 family    1 type    1 state  1 name (null)
(00.154799) sk unix:    Collected: ino 0x11a0 peer_ino 0x11a1 family    1 type    2 state  7 name (null)
(00.154839) sk unix:    Collected: ino 0x15bf peer_ino 0x15c0 family    1 type    2 state  7 name (null)
(00.154910) sk unix:    Collected: ino 0x22be peer_ino 0x2430 family    1 type    1 state  1 name /run/systemd/journal/stdout
(00.154957) sk unix:    Collected: ino 0x1537 peer_ino 0x638 family    1 type    1 state  1 name (null)
(00.155000) sk unix:    Collected: ino 0x11a1 peer_ino 0x11a0 family    1 type    2 state  7 name (null)
(00.155071) sk unix:    Collected: ino 0x15ba peer_ino 0x2257 family    1 type    1 state  1 name /run/systemd/journal/stdout
(00.155118) sk unix:    Collected: ino 0x20d0 peer_ino 0x5da family    1 type    2 state  7 name (null)
(00.155160) sk unix:    Collected: ino 0x15c0 peer_ino 0x15bf family    1 type    2 state  7 name (null)
(00.155201) sk unix:    Collected: ino 0x2430 peer_ino 0x22be family    1 type    1 state  1 name (null)
(00.155239) sk unix:    Collected: ino 0x245b peer_ino 0x22c6 family    1 type    1 state  1 name (null)
(00.155278) sk unix:    Collected: ino 0x12dc peer_ino 0x5da family    1 type    2 state  7 name (null)
(00.155347) sk unix:    Collected: ino 0x638 peer_ino 0x1537 family    1 type    1 state  1 name /run/systemd/journal/stdout
(00.155393) sk unix:    Collected: ino 0x5cb peer_ino 0x5ca family    1 type    2 state  7 name (null)
(00.155434) sk unix:    Collected: ino 0x2257 peer_ino 0x15ba family    1 type    1 state  1 name (null)
(00.155474) sk unix:    Collected: ino 0x14c6 peer_ino 0x5c6 family    1 type    2 state  7 name (null)
(00.155870)     Collected: ino   0x24f9 family    2 type    1 port       80 state 10 src_addr 0.0.0.0
(00.155934)     Collected: ino   0x13c1 family    2 type    1 port      917 state  1 src_addr 192.168.0.1
(00.156440)     Collected: ino    0x79e family   10 type    1 port       22 state 10 src_addr ::
(00.156844) Collect netlink sock 0xe
(00.156896) Collect netlink sock 0x29b0
(00.156930) Collect netlink sock 0x1807
(00.156961) Collect netlink sock 0x1089
(00.156992) Collect netlink sock 0x4f
(00.157023) Collect netlink sock 0x1311
(00.157056) Collect netlink sock 0x5c5
(00.157089) Collect netlink sock 0x5f8
(00.157120) Collect netlink sock 0x10
(00.157151) Collect netlink sock 0x1312
(00.157182) Collect netlink sock 0x1314
(00.157214) Collect netlink sock 0x1313
(00.157246) Collect netlink sock 0x1314
(00.157277) Collect netlink sock 0x1313
(00.157308) Collect netlink sock 0x1312
(00.157339) Collect netlink sock 0x1311
(00.157371) Collect netlink sock 0x5f8
(00.157402) Collect netlink sock 0x5c5
(00.157433) Collect netlink sock 0x56
(00.157653) ========================================
(00.157694) Dumping task (pid: 632)
(00.157722) ========================================
(00.157747) Obtaining task stat ...
(00.158034)
(00.158075) Collecting mappings (pid: 632)
(00.158104) ----------------------------------------
(00.159886) Dumping path for -3 fd via self 8 [/bin/busybox]
(00.162479) vma 54b11000 borrows vfi from previous 54ab4000
(00.162616) vma 54b13000 borrows vfi from previous 54b11000
(00.163701) Dumping path for -3 fd via self 8 [/lib/libc-2.20.so]
(00.163896) vma 76f59000 borrows vfi from previous 76e81000
(00.164024) vma 76f5b000 borrows vfi from previous 76f59000
(00.165375) Dumping path for -3 fd via self 8 [/lib/ld-2.20.so]
(00.165919) vma 76f7f000 borrows vfi from previous 76f7e000
(00.166324) Collected, longest area occupies 216 pages
(00.166367) 0x54ab4000-0x54b09000 (340K) prot 0x5 flags 0x2 fdflags 0 st 0x41 off 0 reg fp  shmid: 0x1
(00.166414) 0x54b11000-0x54b13000 (8K) prot 0x1 flags 0x2 fdflags 0 st 0x41 off 0x55000 reg fp  shmid: 0x1
(00.166455) 0x54b13000-0x54b14000 (4K) prot 0x3 flags 0x2 fdflags 0 st 0x41 off 0x57000 reg fp  shmid: 0x1
(00.166533) 0x55b01000-0x55b22000 (132K) prot 0x3 flags 0x22 fdflags 0 st 0x221 off 0 reg heap ap  shmid: 0
(00.166578) 0x76e81000-0x76f59000 (864K) prot 0x5 flags 0x2 fdflags 0 st 0x41 off 0 reg fp  shmid: 0x2
(00.166618) 0x76f59000-0x76f5b000 (8K) prot 0x1 flags 0x2 fdflags 0 st 0x41 off 0xd8000 reg fp  shmid: 0x2
(00.166657) 0x76f5b000-0x76f5c000 (4K) prot 0x3 flags 0x2 fdflags 0 st 0x41 off 0xda000 reg fp  shmid: 0x2
(00.166695) 0x76f5c000-0x76f5f000 (12K) prot 0x3 flags 0x22 fdflags 0 st 0x201 off 0 reg ap  shmid: 0
(00.166732) 0x76f5f000-0x76f77000 (96K) prot 0x5 flags 0x2 fdflags 0 st 0x41 off 0 reg fp  shmid: 0x3
(00.166769) 0x76f7c000-0x76f7e000 (8K) prot 0x3 flags 0x22 fdflags 0 st 0x201 off 0 reg ap  shmid: 0
(00.166806) 0x76f7e000-0x76f7f000 (4K) prot 0x1 flags 0x2 fdflags 0 st 0x41 off 0x17000 reg fp  shmid: 0x3
(00.166842) 0x76f7f000-0x76f80000 (4K) prot 0x3 flags 0x2 fdflags 0 st 0x41 off 0x18000 reg fp  shmid: 0x3
(00.166879) 0x7ee2f000-0x7ee51000 (136K) prot 0x3 flags 0x122 fdflags 0 st 0x201 off 0 reg ap  shmid: 0
(00.166915) 0x7ef82000-0x7ef83000 (4K) prot 0x5 flags 0x22 fdflags 0 st 0x201 off 0 reg ap  shmid: 0
(00.166952) 0xffff0000-0xffff1000 (4K) prot 0x5 flags 0x22 fdflags 0 st 0x204 off 0 vsys ap  shmid: 0
(00.166988) ----------------------------------------
(00.167019)
(00.167045) Collecting fds (pid: 632)
(00.167071) ----------------------------------------
(00.167323) Found 4 file descriptors
(00.167365) ----------------------------------------
(00.167477) Dump private signals of 632
(00.167573) Dump shared signals of 632
(00.167642) Parasite syscall_ip at 0x54ab4000
(00.168957) Set up parasite blob using memfd
(00.169005) Putting parasite blob into 0x76dd4000->0x76e77000
(00.169267) Dumping GP/FPU registers for 632
(00.169376) Putting tsock into pid 632
(00.169703) Error (criu/parasite-syscall.c:395): si_code=4 si_pid=632 si_status=11
(00.169758) Error (criu/parasite-syscall.c:403): 632 was stopped by 11 unexpectedly


Hope this helps.

Harald

--

BST eltromat International GmbH
Werk Leopoldshöhe
Herforder Straße 249-251
D-33818 Leopoldshöhe

T:      +49 (5208) 987-513

E:      harald.brinkmann at bst-international.com
W:      http://www.bst-eltromat.com




_______________________________________________________
Amtsgericht Bielefeld, HRB Nr. 30830
Geschäftsführer Kristian Jünke, Dr. Johann-Carsten Kipp, Dr. Gunter
Tautorus
Sitz der Gesellschaft: Bielefeld
Vertrauliche E-Mail von BST eltromat International GmbH




More information about the CRIU mailing list