[CRIU] [PATCH v3 0/2] mem: Address dropped guard pages from procfs report

Dmitry Safonov 0x7f454c46 at gmail.com
Thu Jun 29 20:31:20 MSK 2017


2017-06-29 19:48 GMT+03:00 Cyrill Gorcunov <gorcunov at gmail.com>:
> On Thu, Jun 29, 2017 at 05:49:04PM +0200, Adrian Reber wrote:
>> >
>> > Hmm. Hard to say, maybe something with CONFIG_ symbols again?
>> > Mind to try bisecting it?
>>
>> Bisecting does not really work as it does not work right now and if I
>> remove the stack guard gap fix it also does not work. But I removed the
>> following patchset (vdso rework):
>> https://lists.openvz.org/pipermail/criu/2017-June/thread.html
>>
>> and I can run criu again on the RHEL kernel. The patch description talks
>> about the vzkernel and
>>
>> """
>>   I've tested the performance impact of the patches set on:
>>   4.12.0-rc5+ kernel (needed arch_prctl() is available from v4.9 kernel)
>>   With the current criu-dev af6399cc5 ("vma: Fix badly inherited FD
>>   in filemap_open")
>> """
>>
>> Does this mean that the RHEL kernel needs additional patches to work
>> with criu-dev?
>
> Dima?

Hi,

Adrian, could you run it with the patch
"criu/pie/parasite-vdso: Handle also systems without VVAR"
it's on ml currently, and see if that helps?

-- 
             Dmitry


More information about the CRIU mailing list