Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752968AbdFUQpz (ORCPT ); Wed, 21 Jun 2017 12:45:55 -0400 Received: from mail-lf0-f66.google.com ([209.85.215.66]:35816 "EHLO mail-lf0-f66.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752155AbdFUQpy (ORCPT ); Wed, 21 Jun 2017 12:45:54 -0400 Date: Wed, 21 Jun 2017 18:48:50 +0300 From: Cyrill Gorcunov To: Hugh Dickins Cc: Andrey Vagin , LKML , Pavel Emelyanov , Dmitry Safonov , Andrew Morton , Oleg Nesterov Subject: Re: [criu] 1M guard page ruined restore Message-ID: <20170621154850.GE31050@uranus> References: <20170620075206.GB1909@uranus.lan> <20170621152256.GC31050@uranus> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20170621152256.GC31050@uranus> User-Agent: Mutt/1.8.0 (2017-02-23) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 375 Lines: 10 On Wed, Jun 21, 2017 at 06:22:56PM +0300, Cyrill Gorcunov wrote: > This start failing because > > | static inline int check_stack_guard_page(struct vm_area_struct *vma, unsigned long address) > > function get dropped off. Hugh, it is done on intent and > userspace programs have to extend stack manually? Sorry for noise. I forget to add 1M gap for testing. All is fine!