Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752717AbdFURbZ (ORCPT ); Wed, 21 Jun 2017 13:31:25 -0400 Received: from mx1.redhat.com ([209.132.183.28]:50412 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751116AbdFURbY (ORCPT ); Wed, 21 Jun 2017 13:31:24 -0400 DMARC-Filter: OpenDMARC Filter v1.3.2 mx1.redhat.com D5F647D0EA Authentication-Results: ext-mx03.extmail.prod.ext.phx2.redhat.com; dmarc=none (p=none dis=none) header.from=redhat.com Authentication-Results: ext-mx03.extmail.prod.ext.phx2.redhat.com; spf=pass smtp.mailfrom=oleg@redhat.com DKIM-Filter: OpenDKIM Filter v2.11.0 mx1.redhat.com D5F647D0EA Date: Wed, 21 Jun 2017 19:31:15 +0200 From: Oleg Nesterov To: Dmitry Safonov Cc: Cyrill Gorcunov , Hugh Dickins , Andrey Vagin , LKML , Pavel Emelyanov , Andrew Morton , Adrian Reber Subject: Re: [criu] 1M guard page ruined restore Message-ID: <20170621173115.GA28723@redhat.com> References: <20170620075206.GB1909@uranus.lan> <20170621152256.GC31050@uranus> <20170621155730.GA32554@redhat.com> <20170621160410.GF31050@uranus> <20170621170129.GA32752@redhat.com> <2551ee70-a4b6-4f38-7d3a-4eb2cddc96a5@virtuozzo.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <2551ee70-a4b6-4f38-7d3a-4eb2cddc96a5@virtuozzo.com> User-Agent: Mutt/1.5.24 (2015-08-30) X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.27]); Wed, 21 Jun 2017 17:31:24 +0000 (UTC) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 356 Lines: 12 On 06/21, Dmitry Safonov wrote: > > The only question I have - how is it connected to guard page? Because with stack guard page do_page_fault() almost never needs to call expand_stack(), thus this check was almost never tested, I guess. Probably it should go away now. I'll write the changelog and patch tomorrow, unless someone does this before. Oleg.