Received: by 10.223.185.116 with SMTP id b49csp3411280wrg; Tue, 13 Feb 2018 02:01:47 -0800 (PST) X-Google-Smtp-Source: AH8x226gOaII8n/9bS1NF3AJw0JEcPMLquaH/Bjhgjcn98pxsc8fxA6MAInE4rWV1ykQ1Z/KXLaP X-Received: by 2002:a17:902:b082:: with SMTP id p2-v6mr621157plr.314.1518516107344; Tue, 13 Feb 2018 02:01:47 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1518516107; cv=none; d=google.com; s=arc-20160816; b=yslpe9Xx7Wal15aCM9/K5Fqm4Z5X65MwlUucMtJX8tGD1ZbigQgAVV5O+7yqYHGg6t Oz3TkctSX3Pg5Mt+btp3/qXMtnIdM00TYSERz+Zi9b6Nf9LgZWt3udaa0BM9k4CuhQsx y7rnnMauhrqxB7z4VcShT+LXYY1B5XQ67uewRZn/6PlSmXeOziS/MT8zJTrXA+2KKPRx dej0JrW8hsD7oRrmKx8x8vWNT0QuiYKf+ba+ZLi7PYD2wvAVrtgOZNkQUnTEJiwcE3ae XU+VNNz9LYAo1UWkK/ECJm80+KA/q0UgKe6od8vZhS/NjcIEzYJ43Y8/xvt8r8I7bcz0 +3NA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:arc-authentication-results; bh=IQzYrS9JUPqQiSc0pgmngHOI67w3GWrK1jyLMPhkAcU=; b=wXZllqib6aJLpxpSjDn1+gyrcRYAz0QiofjorDbxMHqWKVxh8fenhp0cT70QcAH2pY CfygKES0U4vS5Uo132uMROo+c3RneNkxjUhgz1F9bg9lepHJTziXgiIeDB7OjR0j3MnA IpLclwdAmUmukBWwR7yFxx5Ia+438qzo2f777SWKNwx8qwf7ETaB02yaBpVus4342hxY ES48IxWqAwpwHDhCYO6p23uETwQ4DvrAZfbfaOgoVHvxhzRSdj8GlEjXVAZpPdttCdbk eNy+qPC/D9FsIbOBkuiuSSglOdiN1OBbgqME8hED29xTiauLxzHzNfSdu2Sq0SnYu7y5 ZpMQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id m63-v6si1265808pld.204.2018.02.13.02.01.32; Tue, 13 Feb 2018 02:01:47 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S934670AbeBMKAZ (ORCPT + 99 others); Tue, 13 Feb 2018 05:00:25 -0500 Received: from mx2.suse.de ([195.135.220.15]:55363 "EHLO mx2.suse.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S933416AbeBMKAT (ORCPT ); Tue, 13 Feb 2018 05:00:19 -0500 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (charybdis-ext.suse.de [195.135.220.254]) by mx2.suse.de (Postfix) with ESMTP id 9E3FEAED9; Tue, 13 Feb 2018 10:00:17 +0000 (UTC) Date: Tue, 13 Feb 2018 11:00:16 +0100 From: Michal Hocko To: Anshuman Khandual Cc: Michael Ellerman , "akpm@linux-foundation.org" , mm-commits@vger.kernel.org, linux-kernel@vger.kernel.org, linux-mm@kvack.org, linux-fsdevel@vger.kernel.org, linux-next@vger.kernel.org, sfr@canb.auug.org.au, broonie@kernel.org Subject: Re: ppc elf_map breakage with MAP_FIXED_NOREPLACE Message-ID: <20180213100016.GL3443@dhcp22.suse.cz> References: <15da8c87-e6db-13aa-01c8-a913656bfdb6@linux.vnet.ibm.com> <6db9b33d-fd46-c529-b357-3397926f0733@linux.vnet.ibm.com> <20180129132235.GE21609@dhcp22.suse.cz> <87k1w081e7.fsf@concordia.ellerman.id.au> <20180130094205.GS21609@dhcp22.suse.cz> <5eccdc1b-6a10-b48a-c63f-295f69473d97@linux.vnet.ibm.com> <20180131131937.GA6740@dhcp22.suse.cz> <20180201134829.GL21609@dhcp22.suse.cz> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.9.2 (2017-12-15) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue 13-02-18 12:19:18, Anshuman Khandual wrote: > On 02/01/2018 07:18 PM, Michal Hocko wrote: > > On Thu 01-02-18 08:43:34, Anshuman Khandual wrote: > > [...] > >> $dmesg | grep elf_brk > >> [ 9.571192] elf_brk 10030328 elf_bss 10030000 > >> > >> static int load_elf_binary(struct linux_binprm *bprm) > >> --------------------- > >> > >> if (unlikely (elf_brk > elf_bss)) { > >> unsigned long nbyte; > >> > >> /* There was a PT_LOAD segment with p_memsz > p_filesz > >> before this one. Map anonymous pages, if needed, > >> and clear the area. */ > >> retval = set_brk(elf_bss + load_bias, > >> elf_brk + load_bias, > >> bss_prot); > >> > >> > >> --------------------- > > > > Just a blind shot... Does the following make any difference? > > --- > > diff --git a/fs/binfmt_elf.c b/fs/binfmt_elf.c > > index 021fe78998ea..04b24d00c911 100644 > > --- a/fs/binfmt_elf.c > > +++ b/fs/binfmt_elf.c > > @@ -895,7 +895,7 @@ static int load_elf_binary(struct linux_binprm *bprm) > > the correct location in memory. */ > > for(i = 0, elf_ppnt = elf_phdata; > > i < loc->elf_ex.e_phnum; i++, elf_ppnt++) { > > - int elf_prot = 0, elf_flags; > > + int elf_prot = 0, elf_flags, elf_fixed = MAP_FIXED_NOREPLACE; > > unsigned long k, vaddr; > > unsigned long total_size = 0; > > > > @@ -927,6 +927,7 @@ static int load_elf_binary(struct linux_binprm *bprm) > > */ > > } > > } > > + elf_fixed = MAP_FIXED; > > } > > > > if (elf_ppnt->p_flags & PF_R) > > @@ -944,7 +945,7 @@ static int load_elf_binary(struct linux_binprm *bprm) > > * the ET_DYN load_addr calculations, proceed normally. > > */ > > if (loc->elf_ex.e_type == ET_EXEC || load_addr_set) { > > - elf_flags |= MAP_FIXED_NOREPLACE; > > + elf_flags |= elf_fixed; > > } else if (loc->elf_ex.e_type == ET_DYN) { > > /* > > * This logic is run once for the first LOAD Program > > @@ -980,7 +981,7 @@ static int load_elf_binary(struct linux_binprm *bprm) > > load_bias = ELF_ET_DYN_BASE; > > if (current->flags & PF_RANDOMIZE) > > load_bias += arch_mmap_rnd(); > > - elf_flags |= MAP_FIXED_NOREPLACE; > > + elf_flags |= elf_fixed; > > } else > > load_bias = 0; > > > > > > Yeah, it does solve the problem on mmotm-2018-01-25-16-20. Thanks a lot for testing! I will post an RFC patch shortly. -- Michal Hocko SUSE Labs