Received: by 10.223.176.46 with SMTP id f43csp4124777wra; Tue, 23 Jan 2018 04:46:37 -0800 (PST) X-Google-Smtp-Source: AH8x224NJCHaMOHk75RFkUi7Wd0fqAaie2xTHRf1ih2R9+FflcJ9NAL329jhA4uoX9CSqVsAELId X-Received: by 2002:a17:902:5388:: with SMTP id c8-v6mr5320381pli.91.1516711597015; Tue, 23 Jan 2018 04:46:37 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1516711596; cv=none; d=google.com; s=arc-20160816; b=yzI/xJpdbClMk3DM+/OMj7aXBVBMkPsfWVSBQccTcvYMcnh1IE+KCCSGnZZxFnc6cq Mt70fZ7Ltc8YcDygB9YE8aOLL0x/q40sArb5kMea1JDSvxfoA5ypV+hYrk3eUg95g6sB 3fAj0+5iehbi+eh75qdyGXD/HWiqAzpAOA25jFjM7KT9qjwz7n/+uYFDdqday3YhioUb 5jFds3L6OB1Koy6Y9yU29SlLJz/APy7+ZQA19NyWgQhXtDKKDnFJFNGViBBdEpzBgEXF E7n8lHyYD6IqSGEov9Ut0qdAhykqB+7Yn86hFfUnna7xiRnsbGVebYaKy0Kl4eojyjn9 gVqA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:arc-authentication-results; bh=4cIFZotVDuPrHTI7Sxov9lgX03MxXdHcVh8IEeFebtw=; b=EFo8N2/rZB2cR5tekeGM2hVgWJUX9L3bMyzbp0hclkrwincv0T92P5KrrVC6Ud5vVk y2+3akTD+4P3L9dnhUtqRQz966U2wG82nX4TPM+EGTFCpaml0E/Zv5RFtnOvWnGbAkLQ 2bkRdnLLhuoowWra03+YeJaNy+mZam94Bh76kEjeaPoR+HO8uefh21K8Xyt9Tlxeh3iO v9E0kHQ6D/UpmRjz32duNTng2Qm2nu3bbvxEYGL9LkmrtUJMnKs+Ossj79242K6fPtuV oNI/YePlNtWMsEFAmDVKT+TQbjvqoLqedgSdPyunPbZmKTi0ao3rqtjD+6YLQhnvSv8s Gjdw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 17si1443200pft.88.2018.01.23.04.46.22; Tue, 23 Jan 2018 04:46:36 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751503AbeAWMpt (ORCPT + 99 others); Tue, 23 Jan 2018 07:45:49 -0500 Received: from mx2.suse.de ([195.135.220.15]:37729 "EHLO mx2.suse.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751215AbeAWMps (ORCPT ); Tue, 23 Jan 2018 07:45:48 -0500 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay1.suse.de (charybdis-ext.suse.de [195.135.220.254]) by mx2.suse.de (Postfix) with ESMTP id 290A3ACF9; Tue, 23 Jan 2018 12:45:46 +0000 (UTC) Date: Tue, 23 Jan 2018 13:45:45 +0100 From: Michal Hocko To: Anshuman Khandual Cc: Michael Ellerman , akpm@linux-foundation.org, mm-commits@vger.kernel.org, linux-kernel@vger.kernel.org, linux-mm@kvack.org, linux-fsdevel@vger.kernel.org, linux-next@vger.kernel.org, sfr@canb.auug.org.au, broonie@kernel.org Subject: Re: ppc elf_map breakage with MAP_FIXED_NOREPLACE Message-ID: <20180123124545.GL1526@dhcp22.suse.cz> References: <20180107090229.GB24862@dhcp22.suse.cz> <87mv1phptq.fsf@concordia.ellerman.id.au> <7a44f42e-39d0-1c4b-19e0-7df1b0842c18@linux.vnet.ibm.com> <87tvvw80f2.fsf@concordia.ellerman.id.au> <96458c0a-e273-3fb9-a33b-f6f2d536f90b@linux.vnet.ibm.com> <20180109161355.GL1732@dhcp22.suse.cz> <20180117080731.GA2900@dhcp22.suse.cz> <082aa008-c56a-681d-0949-107245603a97@linux.vnet.ibm.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <082aa008-c56a-681d-0949-107245603a97@linux.vnet.ibm.com> User-Agent: Mutt/1.9.2 (2017-12-15) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue 23-01-18 16:55:18, Anshuman Khandual wrote: > On 01/17/2018 01:37 PM, Michal Hocko wrote: > > On Thu 11-01-18 15:38:37, Anshuman Khandual wrote: > >> On 01/09/2018 09:43 PM, Michal Hocko wrote: > > [...] > >>> Did you manage to catch _who_ is requesting that anonymous mapping? Do > >>> you need a help with the debugging patch? > >> > >> Not yet, will get back on this. > > > > ping? > > Hey Michal, > > Missed this thread, my apologies. This problem is happening only with > certain binaries like 'sed', 'tmux', 'hostname', 'pkg-config' etc. As > you had mentioned before the map request collision is happening on > [10030000, 10040000] and [10030000, 10040000] ranges only which is > just a single PAGE_SIZE. You asked previously that who might have > requested the anon mapping which is already present in there ? Would > not that be the same process itself ? I am bit confused. We are early in the ELF loading. If we are mapping over an existing mapping then we are effectivelly corrupting it. In other words exactly what this patch tries to prevent. I fail to see what would be a relevant anon mapping this early and why it would be colliding with elf segements. > Would it be > helpful to trap all the mmap() requests from any of the binaries > and see where we might have created that anon mapping ? Yeah, that is exactly what I was suggesting. Sorry for not being clear about that. -- Michal Hocko SUSE Labs