2016-08-03 18:14:00 +03:00
|
|
|
#!/usr/bin/env python
|
|
|
|
import ctypes
|
|
|
|
import ctypes.util
|
|
|
|
import errno
|
|
|
|
import sys
|
|
|
|
import os
|
|
|
|
|
|
|
|
# <sched.h> constants for unshare
|
|
|
|
CLONE_NEWNS = 0x00020000
|
|
|
|
CLONE_NEWPID = 0x20000000
|
|
|
|
|
|
|
|
# <sys/mount.h> - constants for mount
|
|
|
|
MS_REC = 16384
|
|
|
|
MS_PRIVATE = 1 << 18
|
|
|
|
MS_SLAVE = 1 << 19
|
|
|
|
|
|
|
|
# Load libc bindings
|
|
|
|
_libc = ctypes.CDLL(ctypes.util.find_library("c"), use_errno=True)
|
|
|
|
|
|
|
|
try:
|
2020-12-21 20:12:44 +00:00
|
|
|
_unshare = _libc.unshare
|
2016-08-03 18:14:00 +03:00
|
|
|
except AttributeError:
|
2020-12-21 20:12:44 +00:00
|
|
|
raise OSError(errno.EINVAL, "unshare is not supported on this platform")
|
2016-08-03 18:14:00 +03:00
|
|
|
else:
|
2020-12-21 20:15:05 +00:00
|
|
|
_unshare.argtypes = [ctypes.c_int]
|
2020-12-21 20:12:44 +00:00
|
|
|
_unshare.restype = ctypes.c_int
|
2016-08-03 18:14:00 +03:00
|
|
|
|
|
|
|
try:
|
2020-12-21 20:12:44 +00:00
|
|
|
_setns = _libc.setns
|
2016-08-03 18:14:00 +03:00
|
|
|
except AttributeError:
|
2020-12-21 20:12:44 +00:00
|
|
|
raise OSError(errno.EINVAL, "setns is not supported on this platform")
|
2016-08-03 18:14:00 +03:00
|
|
|
else:
|
2020-12-21 20:15:05 +00:00
|
|
|
_setns.argtypes = [ctypes.c_int, ctypes.c_int]
|
2020-12-21 20:12:44 +00:00
|
|
|
_setns.restype = ctypes.c_int
|
2016-08-03 18:14:00 +03:00
|
|
|
|
|
|
|
try:
|
2020-12-21 20:12:44 +00:00
|
|
|
_mount = _libc.mount
|
2016-08-03 18:14:00 +03:00
|
|
|
except AttributeError:
|
2020-12-21 20:12:44 +00:00
|
|
|
raise OSError(errno.EINVAL, "mount is not supported on this platform")
|
2016-08-03 18:14:00 +03:00
|
|
|
else:
|
2020-12-21 20:12:44 +00:00
|
|
|
_mount.argtypes = [
|
|
|
|
ctypes.c_char_p,
|
|
|
|
ctypes.c_char_p,
|
|
|
|
ctypes.c_char_p,
|
|
|
|
ctypes.c_ulong,
|
|
|
|
ctypes.c_void_p
|
|
|
|
]
|
|
|
|
_mount.restype = ctypes.c_int
|
2016-08-03 18:14:00 +03:00
|
|
|
|
|
|
|
|
2020-12-21 20:25:47 +00:00
|
|
|
def _mount_new_proc():
|
|
|
|
"""
|
|
|
|
Mount new /proc filesystem.
|
|
|
|
"""
|
|
|
|
if _mount(None, b"/", None, MS_SLAVE|MS_REC, None):
|
|
|
|
_errno = ctypes.get_errno()
|
|
|
|
raise OSError(_errno, errno.errorcode[_errno])
|
|
|
|
if _mount(b'proc', b'/proc', b'proc', 0, None):
|
|
|
|
_errno = ctypes.get_errno()
|
|
|
|
raise OSError(_errno, errno.errorcode[_errno])
|
|
|
|
|
|
|
|
|
2020-12-21 20:31:50 +00:00
|
|
|
def _wait_for_process_status(criu_pid):
|
|
|
|
"""
|
|
|
|
Wait for CRIU to exit and report the status back.
|
|
|
|
"""
|
|
|
|
while True:
|
|
|
|
try:
|
|
|
|
(pid, status) = os.wait()
|
|
|
|
if pid == criu_pid:
|
|
|
|
return os.WEXITSTATUS(status)
|
|
|
|
except OSError:
|
|
|
|
return -251
|
|
|
|
|
|
|
|
|
2020-12-22 11:57:58 +00:00
|
|
|
def run_criu(args):
|
2020-12-21 20:50:18 +00:00
|
|
|
"""
|
|
|
|
Spawn CRIU binary
|
|
|
|
"""
|
2020-12-21 20:12:44 +00:00
|
|
|
print(sys.argv)
|
2020-12-22 11:57:58 +00:00
|
|
|
os.execlp('criu', *['criu'] + args)
|
|
|
|
raise OSError(errno.ENOENT, "No such command")
|
2016-08-03 18:14:00 +03:00
|
|
|
|
|
|
|
|
|
|
|
def wrap_restore():
|
2020-12-21 20:12:44 +00:00
|
|
|
# Unshare pid and mount namespaces
|
|
|
|
if _unshare(CLONE_NEWNS | CLONE_NEWPID) != 0:
|
|
|
|
_errno = ctypes.get_errno()
|
|
|
|
raise OSError(_errno, errno.errorcode[_errno])
|
|
|
|
|
2020-12-22 12:15:54 +00:00
|
|
|
restore_detached = False
|
|
|
|
restore_args = sys.argv[1:]
|
|
|
|
if '-d' in restore_args:
|
|
|
|
restore_detached = True
|
|
|
|
restore_args.remove('-d')
|
|
|
|
if '--restore-detached' in restore_args:
|
|
|
|
restore_detached = True
|
|
|
|
restore_args.remove('--restore-detached')
|
|
|
|
|
2020-12-21 20:12:44 +00:00
|
|
|
criu_pid = os.fork()
|
|
|
|
if criu_pid == 0:
|
2020-12-21 20:25:47 +00:00
|
|
|
_mount_new_proc()
|
2020-12-22 12:15:54 +00:00
|
|
|
run_criu(restore_args)
|
|
|
|
|
|
|
|
if restore_detached:
|
|
|
|
return 0
|
|
|
|
|
2020-12-21 20:31:50 +00:00
|
|
|
return _wait_for_process_status(criu_pid)
|
2016-08-03 18:14:00 +03:00
|
|
|
|
|
|
|
|
|
|
|
def get_varg(args):
|
2020-12-21 20:12:44 +00:00
|
|
|
for i in range(1, len(sys.argv)):
|
|
|
|
if not sys.argv[i] in args:
|
|
|
|
continue
|
2016-08-03 18:14:00 +03:00
|
|
|
|
2020-12-21 20:12:44 +00:00
|
|
|
if i + 1 >= len(sys.argv):
|
|
|
|
break
|
2016-08-03 18:14:00 +03:00
|
|
|
|
2020-12-21 20:12:44 +00:00
|
|
|
return (sys.argv[i + 1], i + 1)
|
2016-08-03 18:14:00 +03:00
|
|
|
|
2020-12-21 20:12:44 +00:00
|
|
|
return (None, None)
|
2016-08-03 18:14:00 +03:00
|
|
|
|
|
|
|
|
2020-12-22 11:46:03 +00:00
|
|
|
def _set_namespace(fd):
|
|
|
|
"""Join namespace referred to by fd"""
|
|
|
|
if _setns(fd, 0) != 0:
|
|
|
|
_errno = ctypes.get_errno()
|
|
|
|
raise OSError(_errno, errno.errorcode[_errno])
|
|
|
|
|
|
|
|
|
|
|
|
def is_my_namespace(fd):
|
|
|
|
"""Returns True if fd refers to current namespace"""
|
|
|
|
return os.stat('/proc/self/ns/pid').st_ino != os.fstat(fd).st_ino
|
|
|
|
|
2016-08-03 18:14:00 +03:00
|
|
|
|
|
|
|
def set_pidns(tpid, pid_idx):
|
2020-12-21 20:50:18 +00:00
|
|
|
"""
|
|
|
|
Join pid namespace. Note, that the given pid should
|
|
|
|
be changed in -t option, as task lives in different
|
|
|
|
pid namespace.
|
|
|
|
"""
|
2020-12-21 20:12:44 +00:00
|
|
|
ns_fd = os.open('/proc/%s/ns/pid' % tpid, os.O_RDONLY)
|
2020-12-22 11:46:03 +00:00
|
|
|
if is_my_namespace(ns_fd):
|
2020-12-21 20:12:44 +00:00
|
|
|
for l in open('/proc/%s/status' % tpid):
|
|
|
|
if not l.startswith('NSpid:'):
|
|
|
|
continue
|
|
|
|
ls = l.split()
|
|
|
|
if ls[1] != tpid:
|
2021-01-17 13:05:42 +00:00
|
|
|
os.close(ns_fd)
|
2020-12-21 20:12:44 +00:00
|
|
|
raise OSError(errno.ESRCH, 'No such pid')
|
2016-08-03 18:14:00 +03:00
|
|
|
|
2020-12-21 20:12:44 +00:00
|
|
|
print('Replace pid {} with {}'.format(tpid, ls[2]))
|
|
|
|
sys.argv[pid_idx] = ls[2]
|
|
|
|
break
|
|
|
|
else:
|
2021-01-17 13:05:42 +00:00
|
|
|
os.close(ns_fd)
|
2020-12-21 20:12:44 +00:00
|
|
|
raise OSError(errno.ENOENT, 'Cannot find NSpid field in proc')
|
2020-12-22 11:46:03 +00:00
|
|
|
_set_namespace(ns_fd)
|
2020-12-21 20:12:44 +00:00
|
|
|
os.close(ns_fd)
|
2016-08-03 18:14:00 +03:00
|
|
|
|
|
|
|
|
|
|
|
def set_mntns(tpid):
|
2020-12-21 20:50:18 +00:00
|
|
|
"""
|
|
|
|
Join mount namespace. Trick here too -- check / and .
|
|
|
|
will be the same in target mntns.
|
|
|
|
"""
|
2020-12-21 20:12:44 +00:00
|
|
|
ns_fd = os.open('/proc/%s/ns/mnt' % tpid, os.O_RDONLY)
|
2020-12-22 11:46:03 +00:00
|
|
|
if is_my_namespace(ns_fd):
|
2020-12-21 20:12:44 +00:00
|
|
|
root_st = os.stat('/')
|
|
|
|
cwd_st = os.stat('.')
|
|
|
|
cwd_path = os.path.realpath('.')
|
2016-08-03 18:14:00 +03:00
|
|
|
|
2020-12-22 11:46:03 +00:00
|
|
|
_set_namespace(ns_fd)
|
2016-08-03 18:14:00 +03:00
|
|
|
|
2020-12-21 20:12:44 +00:00
|
|
|
os.chdir(cwd_path)
|
|
|
|
root_nst = os.stat('/')
|
|
|
|
cwd_nst = os.stat('.')
|
2016-08-03 18:14:00 +03:00
|
|
|
|
2020-12-21 20:12:44 +00:00
|
|
|
def steq(st, nst):
|
|
|
|
return (st.st_dev, st.st_ino) == (nst.st_dev, nst.st_ino)
|
2016-08-03 18:14:00 +03:00
|
|
|
|
2020-12-21 20:12:44 +00:00
|
|
|
if not steq(root_st, root_nst):
|
2021-01-17 13:05:42 +00:00
|
|
|
os.close(ns_fd)
|
2020-12-21 20:12:44 +00:00
|
|
|
raise OSError(errno.EXDEV, 'Target ns / is not as current')
|
|
|
|
if not steq(cwd_st, cwd_nst):
|
2021-01-17 13:05:42 +00:00
|
|
|
os.close(ns_fd)
|
2020-12-21 20:12:44 +00:00
|
|
|
raise OSError(errno.EXDEV, 'Target ns . is not as current')
|
|
|
|
os.close(ns_fd)
|
2016-08-03 18:14:00 +03:00
|
|
|
|
|
|
|
|
|
|
|
def wrap_dump():
|
2020-12-21 20:12:44 +00:00
|
|
|
(pid, pid_idx) = get_varg(('-t', '--tree'))
|
|
|
|
if pid is None:
|
|
|
|
raise OSError(errno.EINVAL, 'No --tree option given')
|
2016-08-03 18:14:00 +03:00
|
|
|
|
2020-12-21 20:12:44 +00:00
|
|
|
set_pidns(pid, pid_idx)
|
|
|
|
set_mntns(pid)
|
2016-08-03 18:14:00 +03:00
|
|
|
|
2020-12-21 20:12:44 +00:00
|
|
|
criu_pid = os.fork()
|
|
|
|
if criu_pid == 0:
|
2020-12-22 11:57:58 +00:00
|
|
|
run_criu(sys.argv[1:])
|
2020-12-21 20:31:50 +00:00
|
|
|
return _wait_for_process_status(pid)
|
2016-08-03 18:14:00 +03:00
|
|
|
|
|
|
|
|
2019-04-07 20:43:12 +01:00
|
|
|
if len(sys.argv) == 1:
|
2020-12-21 20:12:44 +00:00
|
|
|
print("""
|
2019-04-07 20:43:12 +01:00
|
|
|
Usage:
|
|
|
|
{0} dump|pre-dump -t PID [<options>]
|
|
|
|
{0} restore [<options>]
|
|
|
|
\nCommands:
|
|
|
|
dump checkpoint a process/tree identified by pid
|
|
|
|
pre-dump pre-dump task(s) minimizing their frozen time
|
|
|
|
restore restore a process/tree
|
|
|
|
""".format(sys.argv[0]))
|
2020-12-21 20:12:44 +00:00
|
|
|
exit(1)
|
2019-04-07 20:43:12 +01:00
|
|
|
|
2016-08-03 18:14:00 +03:00
|
|
|
action = sys.argv[1]
|
|
|
|
|
|
|
|
if action == 'restore':
|
2020-12-21 20:12:44 +00:00
|
|
|
res = wrap_restore()
|
2016-08-03 18:14:00 +03:00
|
|
|
elif action == 'dump' or action == 'pre-dump':
|
2020-12-21 20:12:44 +00:00
|
|
|
res = wrap_dump()
|
2016-08-03 18:14:00 +03:00
|
|
|
else:
|
2020-12-21 20:12:44 +00:00
|
|
|
print('Unsupported action {} for nswrap'.format(action))
|
|
|
|
res = -1
|
2016-08-03 18:14:00 +03:00
|
|
|
|
|
|
|
sys.exit(res)
|