]>
git.proxmox.com Git - mirror_lxc.git/blob - src/lxc/criu.c
2 * lxc: linux Container library
4 * Copyright © 2014-2015 Canonical Ltd.
7 * Tycho Andersen <tycho.andersen@canonical.com>
9 * This library is free software; you can redistribute it and/or
10 * modify it under the terms of the GNU Lesser General Public
11 * License as published by the Free Software Foundation; either
12 * version 2.1 of the License, or (at your option) any later version.
14 * This library is distributed in the hope that it will be useful,
15 * but WITHOUT ANY WARRANTY; without even the implied warranty of
16 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
17 * Lesser General Public License for more details.
19 * You should have received a copy of the GNU Lesser General Public
20 * License along with this library; if not, write to the Free Software
21 * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
26 #include <linux/limits.h>
31 #include <sys/mount.h>
32 #include <sys/types.h>
49 #define CRIU_VERSION "2.0"
51 #define CRIU_GITID_VERSION "2.0"
52 #define CRIU_GITID_PATCHLEVEL 0
54 #define CRIU_IN_FLIGHT_SUPPORT "2.4"
56 lxc_log_define(lxc_criu
, lxc
);
59 /* The type of criu invocation, one of "dump" or "restore" */
62 /* the user-provided migrate options relevant to this action */
63 struct migrate_opts
*user
;
65 /* The container to dump */
66 struct lxc_container
*c
;
68 /* dump: stop the container or not after dumping? */
69 char tty_id
[32]; /* the criu tty id for /dev/console, i.e. "tty[${rdev}:${dev}]" */
71 /* restore: the file to write the init process' pid into */
72 struct lxc_handler
*handler
;
74 /* The path that is bind mounted from /dev/console, if any. We don't
75 * want to use `--ext-mount-map auto`'s result here because the pts
76 * device may have a different path (e.g. if the pty number is
77 * different) on the target host. NULL if lxc.console = "none".
81 /* The detected version of criu */
85 static int load_tty_major_minor(char *directory
, char *output
, int len
)
91 ret
= snprintf(path
, sizeof(path
), "%s/tty.info", directory
);
92 if (ret
< 0 || ret
>= sizeof(path
)) {
93 ERROR("snprintf'd too many chacters: %d", ret
);
99 /* This means we're coming from a liblxc which didn't export
100 * the tty info. In this case they had to have lxc.console =
101 * none, so there's no problem restoring.
106 SYSERROR("couldn't open %s", path
);
110 if (!fgets(output
, len
, f
)) {
112 SYSERROR("couldn't read %s", path
);
120 static void exec_criu(struct criu_opts
*opts
)
122 char **argv
, log
[PATH_MAX
];
123 int static_args
= 23, argc
= 0, i
, ret
;
127 char buf
[4096], tty_info
[32];
129 /* If we are currently in a cgroup /foo/bar, and the container is in a
130 * cgroup /lxc/foo, lxcfs will give us an ENOENT if some task in the
131 * container has an open fd that points to one of the cgroup files
132 * (systemd always opens its "root" cgroup). So, let's escape to the
133 * /actual/ root cgroup so that lxcfs thinks criu has enough rights to
136 if (!cgroup_escape()) {
137 ERROR("failed to escape cgroups");
141 /* The command line always looks like:
142 * criu $(action) --tcp-established --file-locks --link-remap \
143 * --manage-cgroups=full --action-script foo.sh -D $(directory) \
144 * -o $(directory)/$(action).log --ext-mount-map auto
145 * --enable-external-sharing --enable-external-masters
146 * --enable-fs hugetlbfs --enable-fs tracefs --ext-mount-map console:/dev/pts/n
147 * +1 for final NULL */
149 if (strcmp(opts
->action
, "dump") == 0 || strcmp(opts
->action
, "pre-dump") == 0) {
150 /* -t pid --freeze-cgroup /lxc/ct */
153 /* --prev-images-dir <path-to-directory-A-relative-to-B> */
154 if (opts
->user
->predump_dir
)
157 /* --page-server --address <address> --port <port> */
158 if (opts
->user
->pageserver_address
&& opts
->user
->pageserver_port
)
161 /* --leave-running (only for final dump) */
162 if (strcmp(opts
->action
, "dump") == 0 && !opts
->user
->stop
)
165 /* --external tty[88,4] */
170 if (!opts
->user
->preserves_inodes
)
173 /* --ghost-limit 1024 */
174 if (opts
->user
->ghost_limit
)
176 } else if (strcmp(opts
->action
, "restore") == 0) {
177 /* --root $(lxc_mount_point) --restore-detached
179 * --lsm-profile apparmor:whatever
184 if (load_tty_major_minor(opts
->user
->directory
, tty_info
, sizeof(tty_info
)))
187 /* --inherit-fd fd[%d]:tty[%s] */
194 if (cgroup_num_hierarchies() > 0)
195 static_args
+= 2 * cgroup_num_hierarchies();
197 if (opts
->user
->verbose
)
200 if (opts
->user
->action_script
)
203 ret
= snprintf(log
, PATH_MAX
, "%s/%s.log", opts
->user
->directory
, opts
->action
);
204 if (ret
< 0 || ret
>= PATH_MAX
) {
205 ERROR("logfile name too long\n");
209 argv
= malloc(static_args
* sizeof(*argv
));
213 memset(argv
, 0, static_args
* sizeof(*argv
));
215 #define DECLARE_ARG(arg) \
218 ERROR("Got NULL argument for criu"); \
221 argv[argc++] = strdup(arg); \
226 argv
[argc
++] = on_path("criu", NULL
);
228 ERROR("Couldn't find criu binary\n");
232 DECLARE_ARG(opts
->action
);
233 DECLARE_ARG("--tcp-established");
234 DECLARE_ARG("--file-locks");
235 DECLARE_ARG("--link-remap");
236 DECLARE_ARG("--manage-cgroups=full");
237 DECLARE_ARG("--ext-mount-map");
239 DECLARE_ARG("--enable-external-sharing");
240 DECLARE_ARG("--enable-external-masters");
241 DECLARE_ARG("--enable-fs");
242 DECLARE_ARG("hugetlbfs");
243 DECLARE_ARG("--enable-fs");
244 DECLARE_ARG("tracefs");
246 DECLARE_ARG(opts
->user
->directory
);
250 for (i
= 0; i
< cgroup_num_hierarchies(); i
++) {
251 char **controllers
= NULL
, *fullname
;
254 if (!cgroup_get_hierarchies(i
, &controllers
)) {
255 ERROR("failed to get hierarchy %d", i
);
259 /* if we are in a dump, we have to ask the monitor process what
260 * the right cgroup is. if this is a restore, we can just use
261 * the handler the restore task created.
263 if (!strcmp(opts
->action
, "dump") || !strcmp(opts
->action
, "pre-dump")) {
264 path
= lxc_cmd_get_cgroup_path(opts
->c
->name
, opts
->c
->config_path
, controllers
[0]);
266 ERROR("failed to get cgroup path for %s", controllers
[0]);
272 p
= cgroup_get_cgroup(opts
->handler
, controllers
[0]);
274 ERROR("failed to get cgroup path for %s", controllers
[0]);
280 ERROR("strdup failed");
285 if (!lxc_deslashify(&path
)) {
286 ERROR("failed to deslashify %s", path
);
291 fullname
= lxc_string_join(",", (const char **) controllers
, false);
293 ERROR("failed to join controllers");
298 ret
= sprintf(buf
, "%s:%s", fullname
, path
);
301 if (ret
< 0 || ret
>= sizeof(buf
)) {
302 ERROR("sprintf of cgroup root arg failed");
306 DECLARE_ARG("--cgroup-root");
310 if (opts
->user
->verbose
)
311 DECLARE_ARG("-vvvvvv");
313 if (opts
->user
->action_script
) {
314 DECLARE_ARG("--action-script");
315 DECLARE_ARG(opts
->user
->action_script
);
318 if (strcmp(opts
->action
, "dump") == 0 || strcmp(opts
->action
, "pre-dump") == 0) {
319 char pid
[32], *freezer_relative
;
321 if (sprintf(pid
, "%d", opts
->c
->init_pid(opts
->c
)) < 0)
327 freezer_relative
= lxc_cmd_get_cgroup_path(opts
->c
->name
,
328 opts
->c
->config_path
,
330 if (!freezer_relative
) {
331 ERROR("failed getting freezer path");
335 ret
= snprintf(log
, sizeof(log
), "/sys/fs/cgroup/freezer/%s", freezer_relative
);
336 if (ret
< 0 || ret
>= sizeof(log
))
339 if (!opts
->user
->disable_skip_in_flight
&&
340 strcmp(opts
->criu_version
, CRIU_IN_FLIGHT_SUPPORT
) >= 0)
341 DECLARE_ARG("--skip-in-flight");
343 DECLARE_ARG("--freeze-cgroup");
346 if (opts
->tty_id
[0]) {
347 DECLARE_ARG("--ext-mount-map");
348 DECLARE_ARG("/dev/console:console");
350 DECLARE_ARG("--external");
351 DECLARE_ARG(opts
->tty_id
);
354 if (opts
->user
->predump_dir
) {
355 DECLARE_ARG("--prev-images-dir");
356 DECLARE_ARG(opts
->user
->predump_dir
);
359 if (opts
->user
->pageserver_address
&& opts
->user
->pageserver_port
) {
360 DECLARE_ARG("--page-server");
361 DECLARE_ARG("--address");
362 DECLARE_ARG(opts
->user
->pageserver_address
);
363 DECLARE_ARG("--port");
364 DECLARE_ARG(opts
->user
->pageserver_port
);
367 if (!opts
->user
->preserves_inodes
)
368 DECLARE_ARG("--force-irmap");
370 if (opts
->user
->ghost_limit
) {
371 char ghost_limit
[32];
373 ret
= sprintf(ghost_limit
, "%"PRIu64
, opts
->user
->ghost_limit
);
374 if (ret
< 0 || ret
>= sizeof(ghost_limit
)) {
375 ERROR("failed to print ghost limit %"PRIu64
, opts
->user
->ghost_limit
);
379 DECLARE_ARG("--ghost-limit");
380 DECLARE_ARG(ghost_limit
);
383 /* only for final dump */
384 if (strcmp(opts
->action
, "dump") == 0 && !opts
->user
->stop
)
385 DECLARE_ARG("--leave-running");
386 } else if (strcmp(opts
->action
, "restore") == 0) {
389 struct lxc_conf
*lxc_conf
= opts
->c
->lxc_conf
;
391 DECLARE_ARG("--root");
392 DECLARE_ARG(opts
->c
->lxc_conf
->rootfs
.mount
);
393 DECLARE_ARG("--restore-detached");
394 DECLARE_ARG("--restore-sibling");
397 if (opts
->console_fd
< 0) {
398 ERROR("lxc.console configured on source host but not target");
402 ret
= snprintf(buf
, sizeof(buf
), "fd[%d]:%s", opts
->console_fd
, tty_info
);
403 if (ret
< 0 || ret
>= sizeof(buf
))
406 DECLARE_ARG("--inherit-fd");
409 if (opts
->console_name
) {
410 if (snprintf(buf
, sizeof(buf
), "console:%s", opts
->console_name
) < 0) {
411 SYSERROR("sprintf'd too many bytes");
413 DECLARE_ARG("--ext-mount-map");
417 if (lxc_conf
->lsm_aa_profile
|| lxc_conf
->lsm_se_context
) {
419 if (lxc_conf
->lsm_aa_profile
)
420 ret
= snprintf(buf
, sizeof(buf
), "apparmor:%s", lxc_conf
->lsm_aa_profile
);
422 ret
= snprintf(buf
, sizeof(buf
), "selinux:%s", lxc_conf
->lsm_se_context
);
424 if (ret
< 0 || ret
>= sizeof(buf
))
427 DECLARE_ARG("--lsm-profile");
431 additional
= lxc_list_len(&opts
->c
->lxc_conf
->network
) * 2;
433 m
= realloc(argv
, (argc
+ additional
+ 1) * sizeof(*argv
));
438 lxc_list_for_each(it
, &opts
->c
->lxc_conf
->network
) {
439 char eth
[128], *veth
;
440 struct lxc_netdev
*n
= it
->elem
;
443 if (strlen(n
->name
) >= sizeof(eth
))
445 strncpy(eth
, n
->name
, sizeof(eth
));
447 sprintf(eth
, "eth%d", netnr
);
451 veth
= n
->priv
.veth_attr
.pair
;
454 ret
= snprintf(buf
, sizeof(buf
), "veth[%s]:%s@%s", eth
, veth
, n
->link
);
456 ret
= snprintf(buf
, sizeof(buf
), "veth[%s]:%s", eth
, veth
);
457 if (ret
< 0 || ret
>= sizeof(buf
))
460 case LXC_NET_MACVLAN
:
462 if (strlen(n
->name
) >= sizeof(eth
))
464 strncpy(eth
, n
->name
, sizeof(eth
));
466 sprintf(eth
, "eth%d", netnr
);
469 ERROR("no host interface for macvlan %s\n", n
->name
);
473 ret
= snprintf(buf
, sizeof(buf
), "macvlan[%s]:%s", eth
, n
->link
);
474 if (ret
< 0 || ret
>= sizeof(buf
))
481 /* we have screened for this earlier... */
482 ERROR("unexpected network type %d\n", n
->type
);
486 DECLARE_ARG("--external");
498 for (i
= 0; argv
[i
]; i
++) {
499 ret
= snprintf(buf
+ pos
, sizeof(buf
) - pos
, "%s ", argv
[i
]);
500 if (ret
< 0 || ret
>= sizeof(buf
) - pos
)
506 INFO("execing: %s", buf
);
509 execv(argv
[0], argv
);
511 for (i
= 0; argv
[i
]; i
++)
517 * Check to see if the criu version is recent enough for all the features we
518 * use. This version allows either CRIU_VERSION or (CRIU_GITID_VERSION and
519 * CRIU_GITID_PATCHLEVEL) to work, enabling users building from git to c/r
520 * things potentially before a version is released with a particular feature.
522 * The intent is that when criu development slows down, we can drop this, but
523 * for now we shouldn't attempt to c/r with versions that we know won't work.
525 * Note: If version != NULL criu_version() stores the detected criu version in
526 * version. Allocates memory for version which must be freed by caller.
528 static bool criu_version_ok(char **version
)
533 if (pipe(pipes
) < 0) {
534 SYSERROR("pipe() failed");
540 SYSERROR("fork() failed");
545 char *args
[] = { "criu", "--version", NULL
};
549 close(STDERR_FILENO
);
550 if (dup2(pipes
[1], STDOUT_FILENO
) < 0)
553 path
= on_path("criu", NULL
);
565 if (wait_for_pid(pid
) < 0) {
567 SYSERROR("execing criu failed, is it installed?");
571 f
= fdopen(pipes
[0], "r");
583 if (fscanf(f
, "Version: %1023[^\n]s", tmp
) != 1)
586 if (fgetc(f
) != '\n')
589 if (strcmp(tmp
, CRIU_VERSION
) >= 0)
592 if (fscanf(f
, "GitID: v%1023[^-]s", tmp
) != 1)
598 if (fscanf(f
, "%d", &patch
) != 1)
601 if (strcmp(tmp
, CRIU_GITID_VERSION
) < 0)
604 if (patch
< CRIU_GITID_PATCHLEVEL
)
618 ERROR("must have criu " CRIU_VERSION
" or greater to checkpoint/restore\n");
623 /* Check and make sure the container has a configuration that we know CRIU can
625 static bool criu_ok(struct lxc_container
*c
, char **criu_version
)
629 if (!criu_version_ok(criu_version
))
633 ERROR("Must be root to checkpoint\n");
637 /* We only know how to restore containers with veth networks. */
638 lxc_list_for_each(it
, &c
->lxc_conf
->network
) {
639 struct lxc_netdev
*n
= it
->elem
;
644 case LXC_NET_MACVLAN
:
647 ERROR("Found un-dumpable network: %s (%s)\n", lxc_net_type_to_str(n
->type
), n
->name
);
655 static bool restore_net_info(struct lxc_container
*c
)
658 bool has_error
= true;
660 if (container_mem_lock(c
))
663 lxc_list_for_each(it
, &c
->lxc_conf
->network
) {
664 struct lxc_netdev
*netdev
= it
->elem
;
665 char template[IFNAMSIZ
];
667 if (netdev
->type
!= LXC_NET_VETH
)
670 snprintf(template, sizeof(template), "vethXXXXXX");
672 if (!netdev
->priv
.veth_attr
.pair
)
673 netdev
->priv
.veth_attr
.pair
= lxc_mkifname(template);
675 if (!netdev
->priv
.veth_attr
.pair
)
682 container_mem_unlock(c
);
686 // do_restore never returns, the calling process is used as the
687 // monitor process. do_restore calls exit() if it fails.
688 static void do_restore(struct lxc_container
*c
, int status_pipe
, struct migrate_opts
*opts
, char *criu_version
)
691 struct lxc_handler
*handler
;
693 int pipes
[2] = {-1, -1};
695 /* Try to detach from the current controlling tty if it exists.
696 * Othwerise, lxc_init (via lxc_console) will attach the container's
697 * console output to the current tty, which is probably not what any
698 * library user wants, and if they do, they can just manually configure
701 fd
= open("/dev/tty", O_RDWR
);
703 if (ioctl(fd
, TIOCNOTTY
, NULL
) < 0)
704 SYSERROR("couldn't detach from tty");
708 handler
= lxc_init(c
->name
, c
->lxc_conf
, c
->config_path
);
712 if (!cgroup_init(handler
)) {
713 ERROR("failed initing cgroups");
714 goto out_fini_handler
;
717 if (!cgroup_create(handler
)) {
718 ERROR("failed creating groups");
719 goto out_fini_handler
;
722 if (!restore_net_info(c
)) {
723 ERROR("failed restoring network info");
724 goto out_fini_handler
;
727 resolve_clone_flags(handler
);
729 if (pipe(pipes
) < 0) {
730 SYSERROR("pipe() failed");
731 goto out_fini_handler
;
736 goto out_fini_handler
;
740 struct lxc_rootfs
*rootfs
;
748 if (dup2(pipes
[1], STDERR_FILENO
) < 0) {
749 SYSERROR("dup2 failed");
750 goto out_fini_handler
;
753 if (dup2(pipes
[1], STDOUT_FILENO
) < 0) {
754 SYSERROR("dup2 failed");
755 goto out_fini_handler
;
758 if (unshare(CLONE_NEWNS
))
759 goto out_fini_handler
;
761 /* CRIU needs the lxc root bind mounted so that it is the root of some
763 rootfs
= &c
->lxc_conf
->rootfs
;
765 if (rootfs_is_blockdev(c
->lxc_conf
)) {
766 if (do_rootfs_setup(c
->lxc_conf
, c
->name
, c
->config_path
) < 0)
767 goto out_fini_handler
;
769 if (mkdir(rootfs
->mount
, 0755) < 0 && errno
!= EEXIST
)
770 goto out_fini_handler
;
772 if (mount(NULL
, "/", NULL
, MS_SLAVE
| MS_REC
, NULL
) < 0) {
773 SYSERROR("remount / to private failed");
774 goto out_fini_handler
;
777 if (mount(rootfs
->path
, rootfs
->mount
, NULL
, MS_BIND
, NULL
) < 0) {
778 rmdir(rootfs
->mount
);
779 goto out_fini_handler
;
783 os
.action
= "restore";
786 os
.console_fd
= c
->lxc_conf
->console
.slave
;
787 os
.criu_version
= criu_version
;
788 os
.handler
= handler
;
790 if (os
.console_fd
>= 0) {
791 /* Twiddle the FD_CLOEXEC bit. We want to pass this FD to criu
792 * via --inherit-fd, so we don't want it to close.
794 flags
= fcntl(os
.console_fd
, F_GETFD
);
796 SYSERROR("F_GETFD failed: %d", os
.console_fd
);
797 goto out_fini_handler
;
800 flags
&= ~FD_CLOEXEC
;
802 if (fcntl(os
.console_fd
, F_SETFD
, flags
) < 0) {
803 SYSERROR("F_SETFD failed");
804 goto out_fini_handler
;
807 os
.console_name
= c
->lxc_conf
->console
.name
;
809 /* exec_criu() returning is an error */
811 umount(rootfs
->mount
);
812 rmdir(rootfs
->mount
);
813 goto out_fini_handler
;
821 pid_t w
= waitpid(pid
, &status
, 0);
824 goto out_fini_handler
;
827 if (WIFEXITED(status
)) {
830 if (WEXITSTATUS(status
)) {
833 n
= read(pipes
[0], buf
, sizeof(buf
));
835 SYSERROR("failed reading from criu stderr");
836 goto out_fini_handler
;
841 ERROR("criu process exited %d, output:\n%s\n", WEXITSTATUS(status
), buf
);
842 goto out_fini_handler
;
844 ret
= snprintf(buf
, sizeof(buf
), "/proc/self/task/%lu/children", (unsigned long)syscall(__NR_gettid
));
845 if (ret
< 0 || ret
>= sizeof(buf
)) {
846 ERROR("snprintf'd too many characters: %d", ret
);
847 goto out_fini_handler
;
850 FILE *f
= fopen(buf
, "r");
852 SYSERROR("couldn't read restore's children file %s\n", buf
);
853 goto out_fini_handler
;
856 ret
= fscanf(f
, "%d", (int*) &handler
->pid
);
859 ERROR("reading restore pid failed");
860 goto out_fini_handler
;
863 if (lxc_set_state(c
->name
, handler
, RUNNING
)) {
864 ERROR("error setting running state after restore");
865 goto out_fini_handler
;
869 ERROR("CRIU was killed with signal %d\n", WTERMSIG(status
));
870 goto out_fini_handler
;
875 ret
= write(status_pipe
, &status
, sizeof(status
));
879 if (sizeof(status
) != ret
) {
880 SYSERROR("failed to write all of status");
881 goto out_fini_handler
;
885 * See comment in lxcapi_start; we don't care if these
886 * fail because it's just a beauty thing. We just
887 * assign the return here to silence potential.
889 ret
= snprintf(title
, sizeof(title
), "[lxc monitor] %s %s", c
->config_path
, c
->name
);
890 ret
= setproctitle(title
);
892 ret
= lxc_poll(c
->name
, handler
);
894 lxc_abort(c
->name
, handler
);
895 lxc_fini(c
->name
, handler
);
905 lxc_fini(c
->name
, handler
);
908 if (status_pipe
>= 0) {
909 /* ensure getting here was a failure, e.g. if we failed to
910 * parse the child pid or something, even after a successful
915 if (write(status_pipe
, &status
, sizeof(status
)) != sizeof(status
)) {
916 SYSERROR("writing status failed");
924 static int save_tty_major_minor(char *directory
, struct lxc_container
*c
, char *tty_id
, int len
)
931 if (c
->lxc_conf
->console
.path
&& !strcmp(c
->lxc_conf
->console
.path
, "none")) {
936 ret
= snprintf(path
, sizeof(path
), "/proc/%d/root/dev/console", c
->init_pid(c
));
937 if (ret
< 0 || ret
>= sizeof(path
)) {
938 ERROR("snprintf'd too many chacters: %d", ret
);
942 ret
= stat(path
, &sb
);
944 SYSERROR("stat of %s failed", path
);
948 ret
= snprintf(path
, sizeof(path
), "%s/tty.info", directory
);
949 if (ret
< 0 || ret
>= sizeof(path
)) {
950 ERROR("snprintf'd too many characters: %d", ret
);
954 ret
= snprintf(tty_id
, len
, "tty[%llx:%llx]",
955 (long long unsigned) sb
.st_rdev
,
956 (long long unsigned) sb
.st_dev
);
957 if (ret
< 0 || ret
>= sizeof(path
)) {
958 ERROR("snprintf'd too many characters: %d", ret
);
962 f
= fopen(path
, "w");
964 SYSERROR("failed to open %s", path
);
968 ret
= fprintf(f
, "%s", tty_id
);
971 SYSERROR("failed to write to %s", path
);
975 /* do one of either predump or a regular dump */
976 static bool do_dump(struct lxc_container
*c
, char *mode
, struct migrate_opts
*opts
)
979 char *criu_version
= NULL
;
981 if (!criu_ok(c
, &criu_version
))
984 if (mkdir_p(opts
->directory
, 0700) < 0)
989 SYSERROR("fork failed");
995 struct lxc_handler h
;
998 if (!cgroup_init(&h
)) {
999 ERROR("failed to cgroup_init()");
1006 os
.console_name
= c
->lxc_conf
->console
.path
;
1007 os
.criu_version
= criu_version
;
1009 if (save_tty_major_minor(opts
->directory
, c
, os
.tty_id
, sizeof(os
.tty_id
)) < 0)
1012 /* exec_criu() returning is an error */
1017 pid_t w
= waitpid(pid
, &status
, 0);
1019 SYSERROR("waitpid");
1023 if (WIFEXITED(status
)) {
1024 if (WEXITSTATUS(status
)) {
1025 ERROR("dump failed with %d\n", WEXITSTATUS(status
));
1030 } else if (WIFSIGNALED(status
)) {
1031 ERROR("dump signaled with %d\n", WTERMSIG(status
));
1034 ERROR("unknown dump exit %d\n", status
);
1040 bool __criu_pre_dump(struct lxc_container
*c
, struct migrate_opts
*opts
)
1042 return do_dump(c
, "pre-dump", opts
);
1045 bool __criu_dump(struct lxc_container
*c
, struct migrate_opts
*opts
)
1047 char path
[PATH_MAX
];
1050 ret
= snprintf(path
, sizeof(path
), "%s/inventory.img", opts
->directory
);
1051 if (ret
< 0 || ret
>= sizeof(path
))
1054 if (access(path
, F_OK
) == 0) {
1055 ERROR("please use a fresh directory for the dump directory\n");
1059 return do_dump(c
, "dump", opts
);
1062 bool __criu_restore(struct lxc_container
*c
, struct migrate_opts
*opts
)
1067 char *criu_version
= NULL
;
1069 if (!criu_ok(c
, &criu_version
))
1073 ERROR("Must be root to restore\n");
1078 ERROR("failed to create pipe");
1091 // this never returns
1092 do_restore(c
, pipefd
[1], opts
, criu_version
);
1097 nread
= read(pipefd
[0], &status
, sizeof(status
));
1099 if (sizeof(status
) != nread
) {
1100 ERROR("reading status from pipe failed");
1104 // If the criu process was killed or exited nonzero, wait() for the
1105 // handler, since the restore process died. Otherwise, we don't need to
1106 // wait, since the child becomes the monitor process.
1107 if (!WIFEXITED(status
) || WEXITSTATUS(status
))
1112 if (wait_for_pid(pid
))
1113 ERROR("restore process died");