Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1755853AbdCUCwf (ORCPT ); Mon, 20 Mar 2017 22:52:35 -0400 Received: from tartarus.angband.pl ([89.206.35.136]:56617 "EHLO tartarus.angband.pl" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753522AbdCUCwe (ORCPT ); Mon, 20 Mar 2017 22:52:34 -0400 Date: Tue, 21 Mar 2017 02:32:16 +0100 From: Adam Borowski To: Andrei Vagin Cc: Ingo Molnar , Thomas Gleixner , LKML , Dmitry Safonov , Cyrill Gorcunov Subject: Re: linux-next: x86: Unalbe to run x32 processes on the x86_64 kernel Message-ID: <20170321013216.24vsd3tflchr2tl4@angband.pl> References: MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: X-Junkbait: aaron@angband.pl, zzyx@angband.pl User-Agent: NeoMutt/20170113 (1.7.2) X-SA-Exim-Connect-IP: X-SA-Exim-Mail-From: kilobyte@angband.pl X-SA-Exim-Scanned: No (on tartarus.angband.pl); SAEximRunCond expanded to false Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 1011 Lines: 34 On Mon, Mar 20, 2017 at 04:57:39PM -0700, Andrei Vagin wrote: > We run CRIU tests on linux-next. And today we found that when we start > x32 processes, a kernel bug is triggered: > > [root@fc24 ~]# uname -a > Linux fc24 4.11.0-rc2-next-20170320 #159 SMP Mon Mar 20 16:53:58 PDT > 2017 x86_64 x86_64 x86_64 GNU/Linux > [root@fc24 ~]# cat t.c > int main() > { > return 0; > } > [root@fc24 ~]# gcc -m32 t.c -m32 is i386, for x32 you need -mx32. > [root@fc24 ~]# ./a.out > Killed > [root@fc24 ~]# dmesg > [ 90.033310] BUG: unable to handle kernel paging request at ffffffffff576060 Indeed, same for me for i386. On x32 the process gets killed with SEGV with no core, no kernel output. On the other hand, a bare glibc-less process (write(), _exit()) works fine both on i386 and x32. I haven't looked any closer yet. -- ⢀⣴⠾⠻⢶⣦⠀ Meow! ⣾⠁⢠⠒⠀⣿⡁ ⢿⡄⠘⠷⠚⠋⠀ Collisions shmolisions, let's see them find a collision or second ⠈⠳⣄⠀⠀⠀⠀ preimage for double rot13!