Received: by 10.223.176.5 with SMTP id f5csp304288wra; Fri, 26 Jan 2018 23:56:24 -0800 (PST) X-Google-Smtp-Source: AH8x227B5k+ZTqW3AYLtzo16Xw32/fM/N+3LQ80BTxkwPpdRrAuVnq2SZe2UH8iLxZGir6Ds8IaX X-Received: by 2002:a17:902:7597:: with SMTP id j23-v6mr6861049pll.191.1517039784858; Fri, 26 Jan 2018 23:56:24 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1517039784; cv=none; d=google.com; s=arc-20160816; b=TDyQ8Xdr36cfrDnez0Ig3VX4lslQaKLTTmgCA60tlghinPMOJIMuT3HTWwKMx8rxTG CoeiSQcgb4U/MFOg8BPnCfckTAq1OGy36UtNwbdbdyEdbZG+ZT020pvWW8n+fxUhv5Ke vmdh1eXStBXBjELTMoS9Bo0Ui79sgaU5XIceYrXZ3EXSoVBzbl0IdzmFVzLeXd8gG5/E LbKD4APdOj6kuAlQhZN03vjNFK6DJoobg72ESGoMyzNBCIN6YuXfo5wKgyEyO3lT866k 41+FPb/Z58WULERtJuSLoRPckzz+/zKffJBNaPg5WdyZqDt744UycNar7piZrUbVFhBd AKxQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:arc-authentication-results; bh=hAld/ElIA9dpW+AjS9V5iQahJ5mGBUEI43StHtD2pSg=; b=IIqYYw5vaUQB/tm8sq71qfsXunZvvdPAe5gHPUWZ1VFp6FukMgp9v6nKQVFS1CaohV 7A2b7ZStec5fmpk4JrKZHbj8JVOMpXW3BQiz7EdXG+h6IAalYgPagfR28MF3LAzuB6to sW08N+0Uw0ZRl/zfzPb+pp/phxCzQ0zjjXkzXVWF8O6IbEy6wgh6RoWzdmY1d3rUqFQ5 Qn6j+afMU/XqfxyLIqW7jEuZ3HqCQhzPuwR6tHWuWjrWaMTyyoYA/2c6tiPn1A7I6MwV gDDWE3HaNg8epGQ4yCSQWmU0LA3m84SpNjyeSCX0oJLQ2wu/5qnUV54I6VPTqWLhdSOt sBmw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 31-v6si4968988plj.417.2018.01.26.23.56.01; Fri, 26 Jan 2018 23:56:24 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751931AbeA0Hz1 (ORCPT + 99 others); Sat, 27 Jan 2018 02:55:27 -0500 Received: from mx2.suse.de ([195.135.220.15]:54253 "EHLO mx2.suse.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751267AbeA0HzZ (ORCPT ); Sat, 27 Jan 2018 02:55:25 -0500 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay1.suse.de (charybdis-ext.suse.de [195.135.220.254]) by mx2.suse.de (Postfix) with ESMTP id B3CE9AE20; Sat, 27 Jan 2018 07:48:51 +0000 (UTC) Date: Fri, 26 Jan 2018 15:04:15 +0100 From: Michal Hocko To: Anshuman Khandual Cc: Michael Ellerman , akpm@linux-foundation.org, mm-commits@vger.kernel.org, linux-kernel@vger.kernel.org, linux-mm@kvack.org, linux-fsdevel@vger.kernel.org, linux-next@vger.kernel.org, sfr@canb.auug.org.au, broonie@kernel.org Subject: Re: ppc elf_map breakage with MAP_FIXED_NOREPLACE Message-ID: <20180126140415.GD5027@dhcp22.suse.cz> References: <20180109161355.GL1732@dhcp22.suse.cz> <20180117080731.GA2900@dhcp22.suse.cz> <082aa008-c56a-681d-0949-107245603a97@linux.vnet.ibm.com> <20180123124545.GL1526@dhcp22.suse.cz> <20180123160653.GU1526@dhcp22.suse.cz> <2a05eaf2-20fd-57a8-d4bd-5a1fbf57686c@linux.vnet.ibm.com> <20180124090539.GH1526@dhcp22.suse.cz> <5acba3c2-754d-e449-24ff-a72a0ad0d895@linux.vnet.ibm.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <5acba3c2-754d-e449-24ff-a72a0ad0d895@linux.vnet.ibm.com> User-Agent: Mutt/1.9.2 (2017-12-15) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri 26-01-18 18:04:27, Anshuman Khandual wrote: [...] > I tried to instrument mmap_region() for a single instance of 'sed' > binary and traced all it's VMA creation. But there is no trace when > that 'anon' VMA got created which suddenly shows up during subsequent > elf_map() call eventually failing it. Please note that the following > VMA was never created through call into map_region() in the process > which is strange. Could you share your debugging patch? > ================================================================= > [ 9.076867] Details for VMA[3] c000001fce42b7c0 > [ 9.076925] vma c000001fce42b7c0 start 0000000010030000 end 0000000010040000 > next c000001fce42b580 prev c000001fce42b880 mm c000001fce40fa00 > prot 8000000000000104 anon_vma (null) vm_ops (null) > pgoff 1003 file (null) private_data (null) > flags: 0x100073(read|write|mayread|maywrite|mayexec|account) > ================================================================= Isn't this vdso or some other special mapping? It is not really an anonymous vma. Please hook into __install_special_mapping > VMA creation for 'sed' binary > ============================= > [ 9.071902] XXX: mm c000001fce40fa00 registered > > [ 9.071971] Total VMAs 2 on MM c000001fce40fa00 > ---- > [ 9.072010] Details for VMA[1] c000001fce42bdc0 > [ 9.072064] vma c000001fce42bdc0 start 0000000010000000 end 0000000010020000 > next c000001fce42b580 prev (null) mm c000001fce40fa00 > prot 8000000000000105 anon_vma (null) vm_ops c008000011ddca18 > pgoff 0 file c000001fe2969a00 private_data (null) > flags: 0x875(read|exec|mayread|maywrite|mayexec|denywrite) This one doesn't have any stack trace either... Yet it is a file mapping obviously. Special mappings shouldn't have any file associated. Strange... -- Michal Hocko SUSE Labs