Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751895AbdFTHwQ (ORCPT ); Tue, 20 Jun 2017 03:52:16 -0400 Received: from mail-lf0-f65.google.com ([209.85.215.65]:34157 "EHLO mail-lf0-f65.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751119AbdFTHwP (ORCPT ); Tue, 20 Jun 2017 03:52:15 -0400 Date: Tue, 20 Jun 2017 10:52:06 +0300 From: Cyrill Gorcunov To: Hugh Dickins Cc: Andrey Vagin , LKML , Pavel Emelyanov , Dmitry Safonov , Andrew Morton , Oleg Nesterov Subject: [criu] 1M guard page ruined restore Message-ID: <20170620075206.GB1909@uranus.lan> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline User-Agent: Mutt/1.8.0 (2017-02-23) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 2452 Lines: 56 Hi Hugh! We're running our tests on latest vanilla kernel all the time, and recently we've got an issue on restore: https://github.com/xemul/criu/issues/322 | (00.410614) 4: cg: Cgroups 1 inherited from parent | (00.410858) 4: Opened local page read 3 (parent 0) | (00.410961) 4: premap 0x00000000400000-0x00000000406000 -> 00007fe65badf000 | (00.410981) 4: premap 0x00000000605000-0x00000000606000 -> 00007fe65bae5000 | (00.410997) 4: premap 0x00000000606000-0x00000000607000 -> 00007fe65bae6000 | (00.411013) 4: premap 0x000000025a0000-0x000000025c1000 -> 00007fe65bae7000 | (00.411036) 4: Error (criu/mem.c:726): Unable to remap a private vma: Invalid argument | (00.412779) 1: Error (criu/cr-restore.c:1465): 4 exited, status=1 Andrew has narrowed it down to the commit | commit 1be7107fbe18eed3e319a6c3e83c78254b693acb | Author: Hugh Dickins | Date: Mon Jun 19 04:03:24 2017 -0700 | | mm: larger stack guard gap, between vmas and looking into the patch I see the procfs output has been changed | diff --git a/fs/proc/task_mmu.c b/fs/proc/task_mmu.c | index f0c8b33..520802d 100644 | --- a/fs/proc/task_mmu.c | +++ b/fs/proc/task_mmu.c | @@ -300,11 +300,7 @@ show_map_vma(struct seq_file *m, struct vm_area_struct *vma, int is_pid) | | /* We don't show the stack guard page in /proc/maps */ | start = vma->vm_start; | - if (stack_guard_page_start(vma, start)) | - start += PAGE_SIZE; | end = vma->vm_end; | - if (stack_guard_page_end(vma, end)) | - end -= PAGE_SIZE; | | seq_setwidth(m, 25 + sizeof(void *) * 6 - 1); | seq_printf(m, "%08lx-%08lx %c%c%c%c %08llx %02x:%02x %lu ", For which we of course are not ready because we've been implying the guard page is returned here so we adjust addresses locally when saving them into images. So now we need to figure out somehow if show_map_vma accounts [PAGE_SIZE|guard_area] or not, I guess we might use kernel version here but it won't be working fine on custom kernels, or kernels with the patch backported. Second I guess we might need to detect @stack_guard_gap runtime as well but not yet sure because we only have found this problem and hasn't been investigating it deeply yet. Hopefully will do in a day or couple (I guess we still have some time before the final kernel release). Cyrill