Line 69: |
Line 69: |
| == Needs to be done (TODO) == | | == Needs to be done (TODO) == |
| | | |
− | === Bug with mmaping over 4Gb === | + | === Kerndat test: check presence of the bug with mmaping over 4Gb === |
| | | |
| As 32-bit application is restored from 64-bit CRIU, some task's properties that were filled on <code>exec()</code> are left, which is quite unusual for 32-bit task. One of the things, left from 64-bit binary is precalculated <code>mmap_base</code> which is used to find task's top/bottom address limit during <code>mmap()</code> syscall. That means that compat <code>sys_mmap()</code> may map page over 4Gb address and return 4-byte pointer to low bytes of address. Looks like no one has used compatible mmap in 64-bit binary. Results in broken mmap in restored 32-bit application, which can map vma over 4Gb. | | As 32-bit application is restored from 64-bit CRIU, some task's properties that were filled on <code>exec()</code> are left, which is quite unusual for 32-bit task. One of the things, left from 64-bit binary is precalculated <code>mmap_base</code> which is used to find task's top/bottom address limit during <code>mmap()</code> syscall. That means that compat <code>sys_mmap()</code> may map page over 4Gb address and return 4-byte pointer to low bytes of address. Looks like no one has used compatible mmap in 64-bit binary. Results in broken mmap in restored 32-bit application, which can map vma over 4Gb. |
| | | |
− | See [[Upstream kernel commits]]. The kerndat test for 32-bit C/R will be reworked to check if the bug present in kernel (which is not nice thing, but ok). | + | See [[Upstream kernel commits]], the bug is fixed in linux-next, but the kerndat criu test should be reworked to check presence of this bug, not only arch_prctl() for 32-bit vdso. |
| | | |
| === Issue with compat vdso helper === | | === Issue with compat vdso helper === |
| Rarely it segfaults: [https://github.com/xemul/criu/issues/290 issue], [https://github.com/xemul/criu/issues/273 reproduce]. | | Rarely it segfaults: [https://github.com/xemul/criu/issues/290 issue], [https://github.com/xemul/criu/issues/273 reproduce]. |
− | Presumply, because of using syscall() and memcpy() from Glibc, instead of raw pie-helpers.
| + | Presumably, because of using syscall() and memcpy() from Glibc, instead of raw pie-helpers at the moment of unmapped vdso/vvar vmas. |
| Hard to reproduce. | | Hard to reproduce. |
| | | |
Line 94: |
Line 94: |
| | vdso01 || need to add 32-bit vDSO symbols: __kernel_* (and check them with handlers in test) | | | vdso01 || need to add 32-bit vDSO symbols: __kernel_* (and check them with handlers in test) |
| |- | | |- |
− | | vdso01 || fails at fault-inject trampoline testing: correct jump trampolines [https://lists.openvz.org/pipermail/criu/2017-March/036187.html Fixed] | + | | vdso01 || fails at fault-inject trampoline testing: correct jump trampolines [https://lists.openvz.org/pipermail/criu/2017-March/036187.html Fixed in this set] |
| |} | | |} |
| | | |