Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753336AbdFURQi (ORCPT ); Wed, 21 Jun 2017 13:16:38 -0400 Received: from mx1.redhat.com ([209.132.183.28]:26301 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752042AbdFURPs (ORCPT ); Wed, 21 Jun 2017 13:15:48 -0400 DMARC-Filter: OpenDMARC Filter v1.3.2 mx1.redhat.com 045F73D956 Authentication-Results: ext-mx06.extmail.prod.ext.phx2.redhat.com; dmarc=none (p=none dis=none) header.from=redhat.com Authentication-Results: ext-mx06.extmail.prod.ext.phx2.redhat.com; spf=pass smtp.mailfrom=oleg@redhat.com DKIM-Filter: OpenDKIM Filter v2.11.0 mx1.redhat.com 045F73D956 Date: Wed, 21 Jun 2017 19:15:45 +0200 From: Oleg Nesterov To: Cyrill Gorcunov Cc: Hugh Dickins , Andrey Vagin , LKML , Pavel Emelyanov , Dmitry Safonov , Andrew Morton , Adrian Reber Subject: Re: [criu] 1M guard page ruined restore Message-ID: <20170621171545.GA28664@redhat.com> References: <20170620075206.GB1909@uranus.lan> <20170621152256.GC31050@uranus> <20170621155730.GA32554@redhat.com> <20170621160410.GF31050@uranus> <20170621170129.GA32752@redhat.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20170621170129.GA32752@redhat.com> User-Agent: Mutt/1.5.24 (2015-08-30) X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.30]); Wed, 21 Jun 2017 17:15:48 +0000 (UTC) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 1384 Lines: 48 On 06/21, Oleg Nesterov wrote: > > On 06/21, Cyrill Gorcunov wrote: > > > > On Wed, Jun 21, 2017 at 05:57:30PM +0200, Oleg Nesterov wrote: > > > > > > > > p = fake_grow_down; > > > > *p-- = 'c'; > > > > > > I guess this works? I mean, *p-- = 'c' should not fail... > > > > It fails. > > Hmm. Impossible ;) could you add the additional printf's to re-check? Yes, please... > > p = fake_grow_down; > > *p-- = 'c'; > > once again, I can't believe this STORE can fail... > > > *p = 'b'; > > Ah. I forgot about another kernel "feature" ;) not related to the recent guard > page changes... On the second thought it is actually connected, and it seems we really need to remove this code in do_page_fault... I'll re-check tomorrow, need to run away. > Could you test the patch below? > > Oleg. > > > diff --git a/arch/x86/mm/fault.c b/arch/x86/mm/fault.c > index 8ad91a0..edc5d68 100644 > --- a/arch/x86/mm/fault.c > +++ b/arch/x86/mm/fault.c > @@ -1416,7 +1416,7 @@ __do_page_fault(struct pt_regs *regs, unsigned long error_code, > * and pusha to work. ("enter $65535, $31" pushes > * 32 pointers and then decrements %sp by 65535.) > */ > - if (unlikely(address + 65536 + 32 * sizeof(unsigned long) < regs->sp)) { > +if (0) if (unlikely(address + 65536 + 32 * sizeof(unsigned long) < regs->sp)) { > bad_area(regs, error_code, address); > return; > }