[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <e7705544-04fe-c382-f6d0-48d0680b46f2@oracle.com>
Date: Wed, 30 May 2018 08:00:29 -0700
From: Mike Kravetz <mike.kravetz@...cle.com>
To: Michal Hocko <mhocko@...nel.org>
Cc: Andrew Morton <akpm@...ux-foundation.org>, linux-mm@...ck.org,
LKML <linux-kernel@...r.kernel.org>,
libhugetlbfs@...glegroups.com
Subject: Re: [PATCH 2/2] fs, elf: drop MAP_FIXED usage from elf_map
On 05/30/2018 01:02 AM, Michal Hocko wrote:
> On Tue 29-05-18 15:21:14, Mike Kravetz wrote:
>> Just a quick heads up. I noticed a change in libhugetlbfs testing starting
>> with v4.17-rc1.
>>
>> V4.16 libhugetlbfs test results
>> ********** TEST SUMMARY
>> * 2M
>> * 32-bit 64-bit
>> * Total testcases: 110 113
>> * Skipped: 0 0
>> * PASS: 105 111
>> * FAIL: 0 0
>> * Killed by signal: 4 1
>> * Bad configuration: 1 1
>> * Expected FAIL: 0 0
>> * Unexpected PASS: 0 0
>> * Test not present: 0 0
>> * Strange test result: 0 0
>> **********
>>
>> v4.17-rc1 (and later) libhugetlbfs test results
>> ********** TEST SUMMARY
>> * 2M
>> * 32-bit 64-bit
>> * Total testcases: 110 113
>> * Skipped: 0 0
>> * PASS: 98 111
>> * FAIL: 0 0
>> * Killed by signal: 11 1
>> * Bad configuration: 1 1
>> * Expected FAIL: 0 0
>> * Unexpected PASS: 0 0
>> * Test not present: 0 0
>> * Strange test result: 0 0
>> **********
>>
>> I traced the 7 additional (32-bit) killed by signal results to this
>> commit 4ed28639519c fs, elf: drop MAP_FIXED usage from elf_map.
>>
>> libhugetlbfs does unusual things and even provides custom linker scripts.
>> So, in hindsight this change in behavior does not seem too unexpected. I
>> JUST discovered this while running libhugetlbfs tests for an unrelated
>> issue/change and, will do some analysis to see exactly what is happening.
>
> I am definitely interested about further details. Are there any messages
> in the kernel log?
>
Yes, new messages associated with the failures.
[ 47.570451] 1368 (xB.linkhuge_nof): Uhuuh, elf segment at 00000000a731413b requested but the memory is mapped already
[ 47.606991] 1372 (xB.linkhuge_nof): Uhuuh, elf segment at 00000000a731413b requested but the memory is mapped already
[ 47.641351] 1376 (xB.linkhuge_nof): Uhuuh, elf segment at 00000000a731413b requested but the memory is mapped already
[ 47.726138] 1384 (xB.linkhuge): Uhuuh, elf segment at 0000000090b9eaf6 requested but the memory is mapped already
[ 47.773169] 1393 (xB.linkhuge): Uhuuh, elf segment at 0000000090b9eaf6 requested but the memory is mapped already
[ 47.817788] 1402 (xB.linkhuge): Uhuuh, elf segment at 0000000090b9eaf6 requested but the memory is mapped already
[ 47.857338] 1406 (xB.linkshare): Uhuuh, elf segment at 0000000018430471 requested but the memory is mapped already
[ 47.956355] 1427 (xB.linkshare): Uhuuh, elf segment at 0000000018430471 requested but the memory is mapped already
[ 48.054894] 1448 (xB.linkhuge): Uhuuh, elf segment at 0000000090b9eaf6 requested but the memory is mapped already
[ 48.071221] 1451 (xB.linkhuge): Uhuuh, elf segment at 0000000090b9eaf6 requested but the memory is mapped already
Just curious, the addresses printed in those messages does not seem correct.
They should be page aligned. Correct? I think that %p conversion in the
pr_info() may doing something wrong.
Also, the new failures in question are indeed being built with custom linker
scripts designed for use with binutils older than 2.16 (really old). So, no
new users should encounter this issue (I think). It appears that this may
only impact old applications built long ago with pre-2.16 binutils.
--
Mike Kravetz
Powered by blists - more mailing lists