From mboxrd@z Thu Jan 1 00:00:00 1970 Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1755242AbeAHDCS (ORCPT + 1 other); Sun, 7 Jan 2018 22:02:18 -0500 Received: from mx0b-001b2d01.pphosted.com ([148.163.158.5]:36708 "EHLO mx0a-001b2d01.pphosted.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1754995AbeAHDCP (ORCPT ); Sun, 7 Jan 2018 22:02:15 -0500 Subject: Re: ppc elf_map breakage with MAP_FIXED_NOREPLACE To: Michael Ellerman , Michal Hocko , Anshuman Khandual References: <5a4ec4bc.u5I/HzCSE6TLVn02%akpm@linux-foundation.org> <7e35e16a-d71c-2ec8-03ed-b07c2af562f8@linux.vnet.ibm.com> <20180105084631.GG2801@dhcp22.suse.cz> <20180107090229.GB24862@dhcp22.suse.cz> <87mv1phptq.fsf@concordia.ellerman.id.au> Cc: akpm@linux-foundation.org, mm-commits@vger.kernel.org, linux-kernel@vger.kernel.org, linux-mm@kvack.org, linux-fsdevel@vger.kernel.org, linux-next@vger.kernel.org, sfr@canb.auug.org.au, broonie@kernel.org From: Anshuman Khandual Date: Mon, 8 Jan 2018 08:32:03 +0530 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:45.0) Gecko/20100101 Thunderbird/45.5.1 MIME-Version: 1.0 In-Reply-To: <87mv1phptq.fsf@concordia.ellerman.id.au> Content-Type: text/plain; charset=windows-1252 Content-Transfer-Encoding: 7bit X-TM-AS-GCONF: 00 x-cbid: 18010803-0020-0000-0000-000003E7C607 X-IBM-AV-DETECTION: SAVI=unused REMOTE=unused XFE=unused x-cbparentid: 18010803-0021-0000-0000-00004279E072 Message-Id: <7a44f42e-39d0-1c4b-19e0-7df1b0842c18@linux.vnet.ibm.com> X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10432:,, definitions=2018-01-08_02:,, signatures=0 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 priorityscore=1501 malwarescore=0 suspectscore=0 phishscore=0 bulkscore=0 spamscore=0 clxscore=1015 lowpriorityscore=0 impostorscore=0 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1709140000 definitions=main-1801080038 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Return-Path: On 01/07/2018 04:56 PM, Michael Ellerman wrote: > Michal Hocko writes: > >> On Sun 07-01-18 12:19:32, Anshuman Khandual wrote: >>> On 01/05/2018 02:16 PM, Michal Hocko wrote: >> [...] >>>> Could you give us more information about the failure please. Debugging >>>> patch from http://lkml.kernel.org/r/20171218091302.GL16951@dhcp22.suse.cz >>>> should help to see what is the clashing VMA. >>> Seems like its re-requesting the same mapping again. >> It always seems to be the same mapping which is a bit strange as we >> have multiple binaries here. Are these binaries any special? Does this >> happen to all bianries (except for init which has obviously started >> successfully)? Could you add an additional debugging (at the do_mmap >> layer) to see who is requesting the mapping for the first time? >> >>> [ 23.423642] 9148 (sed): Uhuuh, elf segment at 0000000010030000 requested but the memory is mapped already >>> [ 23.423706] requested [10030000, 10040000] mapped [10030000, 10040000] 100073 anon >> I also find it a bit unexpected that this is an anonymous mapping >> because the elf loader should always map a file backed one. > Anshuman what machine is this on, and what distro and toolchain is it running? > > I don't see this on any of my machines, so I wonder if this is > toolchain/distro specific. POWER9, RHEL 7.4, gcc (GCC) 4.8.5 20150623, GNU Make 3.82 etc.