Received: by 2002:a25:8b12:0:0:0:0:0 with SMTP id i18csp4579836ybl; Tue, 20 Aug 2019 14:22:42 -0700 (PDT) X-Google-Smtp-Source: APXvYqwSeTkX+TfyOFlAMihYfWZ22pdieU41eA+99/o05mJeoPn+IGyYK7l4rIzedpi/U/wkdxIL X-Received: by 2002:a17:90a:1110:: with SMTP id d16mr2040634pja.29.1566336162294; Tue, 20 Aug 2019 14:22:42 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1566336162; cv=none; d=google.com; s=arc-20160816; b=Vylw0ud8ZFirItI+1wKCurQC+NICp6yzQzg79qU4c7Muh504Bt4DoZNgA/g2evYgP2 ul9Jlqqmfeb97/kISBdadX1gVLGtJF81mStc/4JIBw0Q2TN/Jl8zvb/1JyxZhYpStEog nbTrCy0X8K6jPYIXMV5s8/ZhLtWae3W+kPSdUh5runIlKAPdNW/iDb/hR1vvjyjCPo6I eayD4s+y+2w2gdnCMWOtxDZ5wW25YZDzy3MNYbtqlfFwg89sGy0+6gupBS+On3PluouW nRzF7iLIKj/lgE3LtNRxa1mX6JfDIDxvlMneVeIgvdwBDkTjvs1yV/dB0TQsmVMB/djo 7WTg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:mime-version:user-agent:date:message-id:to:subject :from; bh=lXm4v1ybN4mtu3CMgeR8iqoG14lf+sMAr2jC8TzP/xk=; b=OpmVGf3lN46j6qGAVDOEblwqdM2nhs3deOiIDdVW4dEl/3R/8/lPK4AJYdFaLEfWyB bdxa0whrV830Vjnj7YHtvz7ZeOH7l83/e1pHg1wHEsKLEI251qc6iABlcL201Q+FaOFo VZHP4diypng88zGX2xRKRLv1bJNyKg/Z2YHiDy4GWFpuiYmZAG2bFoqgaUoNYbQ2SzVx DOGeN+hun+db5Wc34XyOO1C1NKcw576NQrIQOwo2CbiXA1USG35vycVkQljl+ivjRFS5 8sqDbT0FxP5m3vB1yxM1KHAR/nOkVlrthWD5nf4F1kBuhG5xP6TKm2eJO4IXQEAqZd5h EgYQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id r10si13053875pgs.474.2019.08.20.14.22.26; Tue, 20 Aug 2019 14:22:42 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730825AbfHTVV1 (ORCPT + 99 others); Tue, 20 Aug 2019 17:21:27 -0400 Received: from mx3.molgen.mpg.de ([141.14.17.11]:52925 "EHLO mx1.molgen.mpg.de" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1728283AbfHTVV1 (ORCPT ); Tue, 20 Aug 2019 17:21:27 -0400 Received: from [141.14.220.194] (unknown [141.14.220.194]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) (Authenticated sender: buczek) by mx.molgen.mpg.de (Postfix) with ESMTPSA id 084AA201A3C3E; Tue, 20 Aug 2019 23:21:24 +0200 (CEST) From: Donald Buczek Subject: /proc/vmcore and wrong PAGE_OFFSET To: iommu@lists.linux-foundation.org, linux-pci@vger.kernel.org, x86@kernel.org, kexec@lists.infradead.org, linux-kernel@vger.kernel.org, Paul Menzel Message-ID: Date: Tue, 20 Aug 2019 23:21:23 +0200 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.8.0 MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Dear Linux folks, I'm investigating a problem, that the crash utility fails to work with our crash dumps: buczek@kreios:/mnt$ crash vmlinux crash.vmcore crash 7.2.6 Copyright (C) 2002-2019 Red Hat, Inc. Copyright (C) 2004, 2005, 2006, 2010 IBM Corporation Copyright (C) 1999-2006 Hewlett-Packard Co Copyright (C) 2005, 2006, 2011, 2012 Fujitsu Limited Copyright (C) 2006, 2007 VA Linux Systems Japan K.K. Copyright (C) 2005, 2011 NEC Corporation Copyright (C) 1999, 2002, 2007 Silicon Graphics, Inc. Copyright (C) 1999, 2000, 2001, 2002 Mission Critical Linux, Inc. This program is free software, covered by the GNU General Public License, and you are welcome to change it and/or distribute copies of it under certain conditions. Enter "help copying" to see the conditions. This program has absolutely no warranty. Enter "help warranty" for details. GNU gdb (GDB) 7.6 Copyright (C) 2013 Free Software Foundation, Inc. License GPLv3+: GNU GPL version 3 or later This is free software: you are free to change and redistribute it. There is NO WARRANTY, to the extent permitted by law. Type "show copying" and "show warranty" for details. This GDB was configured as "x86_64-unknown-linux-gnu"... crash: read error: kernel virtual address: ffff89807ff77000 type: "memory section root table" The crash file is a copy of /dev/vmcore taken by a crashkernel after a sysctl-forced panic. It looks to me, that 0xffff89807ff77000 is not readable, because the virtual addresses stored in the elf header of the dump file are off by 0x0000008000000000: buczek@kreios:/mnt$ readelf -a crash.vmcore | grep LOAD | perl -lane 'printf "%s (%016x)\n",$_,hex($F[2])-hex($F[3])' LOAD 0x000000000000d000 0xffffffff81000000 0x000001007d000000 (fffffeff04000000) LOAD 0x0000000001c33000 0xffff880000001000 0x0000000000001000 (ffff880000000000) LOAD 0x0000000001cc1000 0xffff880000090000 0x0000000000090000 (ffff880000000000) LOAD 0x0000000001cd1000 0xffff880000100000 0x0000000000100000 (ffff880000000000) LOAD 0x0000000001cd2070 0xffff880000100070 0x0000000000100070 (ffff880000000000) LOAD 0x0000000019bd2000 0xffff880038000000 0x0000000038000000 (ffff880000000000) LOAD 0x000000004e6a1000 0xffff88006ffff000 0x000000006ffff000 (ffff880000000000) LOAD 0x000000004e6a2000 0xffff880100000000 0x0000000100000000 (ffff880000000000) LOAD 0x0000001fcda22000 0xffff882080000000 0x0000002080000000 (ffff880000000000) LOAD 0x0000003fcd9a2000 0xffff884080000000 0x0000004080000000 (ffff880000000000) LOAD 0x0000005fcd922000 0xffff886080000000 0x0000006080000000 (ffff880000000000) LOAD 0x0000007fcd8a2000 0xffff888080000000 0x0000008080000000 (ffff880000000000) LOAD 0x0000009fcd822000 0xffff88a080000000 0x000000a080000000 (ffff880000000000) LOAD 0x000000bfcd7a2000 0xffff88c080000000 0x000000c080000000 (ffff880000000000) LOAD 0x000000dfcd722000 0xffff88e080000000 0x000000e080000000 (ffff880000000000) LOAD 0x000000fc4d722000 0xffff88fe00000000 0x000000fe00000000 (ffff880000000000) (Columns are File offset, Virtual Address, Physical Address and computed offset). I would expect the offset between the virtual and the physical address to be PAGE_OFFSET, which is 0xffff88800000000 on x86_64, not 0xffff880000000000. Unlike /proc/vmcore, /proc/kcore shows the same physical memory (of the last memory section above) with a correct offset: buczek@kreios:/mnt$ sudo readelf -a /proc/kcore | grep 0x000000fe00000000 | perl -lane 'printf "%s (%016x)\n",$_,hex($F[2])-hex($F[3])' LOAD 0x0000097e00004000 0xffff897e00000000 0x000000fe00000000 (ffff888000000000) The failing address 0xffff89807ff77000 happens to be at the end of the last memory section. It is the mem_section array, which crash wants to load and which is visible in the running system: buczek@kreios:/mnt$ sudo gdb vmlinux /proc/kcore [...] (gdb) print mem_section $1 = (struct mem_section **) 0xffff89807ff77000 (gdb) print *mem_section $2 = (struct mem_section *) 0xffff88a07f37b000 (gdb) print **mem_section $3 = {section_mem_map = 18446719884453740551, pageblock_flags = 0xffff88a07f36f040} I can read the same information from the crash dump, if I account for the 0x0000008000000000 error: buczek@kreios:/mnt$ gdb vmlinux crash.vmcore [...] (gdb) print mem_section $1 = (struct mem_section **) 0xffff89807ff77000 (gdb) print *mem_section Cannot access memory at address 0xffff89807ff77000 (gdb) set $t=(struct mem_section **) ((char *)mem_section - 0x0000008000000000) (gdb) print *$t $2 = (struct mem_section *) 0xffff88a07f37b000 (gdb) set $s=(struct mem_section *)((char *)*$t - 0x0000008000000000 ) (gdb) print *$s $3 = {section_mem_map = 18446719884453740551, pageblock_flags = 0xffff88a07f36f040} In the above example, the running kernel, the crashed kernel and the crashkernel are all the same 4.19.57 compilation. But I've tried with several other versions ( crashkernel 4.4, running kernel from 4.0 to linux master) with the same result. The machine in the above example has several numa nodes (this is why there are so many LOAD headers). But I've tried this with a small kvm virtual machine and got the same result. buczek@kreios:/mnt/linux-4.19.57-286.x86_64/build$ grep RANDOMIZE_BASE .config # CONFIG_RANDOMIZE_BASE is not set buczek@kreios:/mnt/linux-4.19.57-286.x86_64/build$ grep SPARSEMEM .config CONFIG_ARCH_SPARSEMEM_ENABLE=y CONFIG_ARCH_SPARSEMEM_DEFAULT=y CONFIG_SPARSEMEM_MANUAL=y CONFIG_SPARSEMEM=y CONFIG_SPARSEMEM_EXTREME=y CONFIG_SPARSEMEM_VMEMMAP_ENABLE=y CONFIG_SPARSEMEM_VMEMMAP=y buczek@kreios:/mnt/linux-4.19.57-286.x86_64/build$ grep PAGE_TABLE_ISOLATION .config CONFIG_PAGE_TABLE_ISOLATION=y Any ideas? Donald