[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <29bd73d1-ceed-0e4d-324a-b9ae87c4da4e@oracle.com>
Date: Thu, 31 May 2018 14:46:15 -0700
From: Mike Kravetz <mike.kravetz@...cle.com>
To: Michal Hocko <mhocko@...nel.org>
Cc: Andrew Morton <akpm@...ux-foundation.org>, linux-mm@...ck.org,
LKML <linux-kernel@...r.kernel.org>,
libhugetlbfs@...glegroups.com
Subject: Re: [PATCH 2/2] fs, elf: drop MAP_FIXED usage from elf_map
On 05/31/2018 02:24 AM, Michal Hocko wrote:
> I am not an expert on the load linkers myself so I cannot really answer
> this question. Please note that ppc had something similar. See
> ad55eac74f20 ("elf: enforce MAP_FIXED on overlaying elf segments").
> Maybe we need to sprinkle more of those at other places?
I finally understand the issue, and it is NOT a problem with the kernel.
The issue is with old libhugetlbfs provided linker scripts, and yes,
starting with v4.17 people who run libhugetlbfs tests on x86 (at least)
will see additional failures.
I'll try to work this from the libhugetlbfs side. In the unlikely event
that anyone knows about those linker scripts, assistance and/or feedback
would be appreciated.
Read on only if you want additional details about this failure.
The executable files which are now failing are created with the elf_i386.xB
linker script. This script is provided for pre-2.17 versions of binutils.
binutils-2.17 came out aprox in 2007, and this script is disabled by default
if binutils-2.17 or later is used. The only way to create executables with
this script today is by setting the HUGETLB_DEPRECATED_LINK env variable.
This is what libhugetlbfs tests do to simply continue testing the old scripts.
I previously was mistaken about which tests were causing the additional
failures. The example I previously provided failed on v4.16 as well as
v4.17-rc kernels. So, please ignore that information.
For an executable that runs on v4.16 and fails on v4.17-rc, here is a listing
of elf sections that the kernel will attempt to load.
Type Offset VirtAddr PhysAddr FileSiz MemSiz Flg Align
LOAD 0x000000 0x08048000 0x08048000 0x11c24 0x11c24 R E 0x1000
LOAD 0x011c24 0x08059c24 0x08059c24 0x10d04 0x10d04 RW 0x1000
LOAD 0x023000 0x09000000 0x09000000 0x00000 0x10048 RWE 0x1000
The first section is loaded without issue. elf_map() will create a vma
based on the following:
map_addr ELF_PAGESTART(addr) 8048000 ELF_PAGEALIGN(size) 12000
File_offset 0
We then attempt to load the following section with:
map_addr ELF_PAGESTART(addr) 8059000 ELF_PAGEALIGN(size) 12000
File_offset 11000
This results in,
Uhuuh, elf segment at 8059000 requested but the memory is mapped already
Note that the last page of the first section overlaps with the first page
of the second section. Unlike the case in ad55eac74f20, the access
permissions on section 1 (RE) are different than section 2 (RW). If we
allowed the previous MAP_FIXED behavior, we would be changing part of a
read only section to read write. This is exactly what MAP_FIXED_NOREPLACE
was designed to prevent.
--
Mike Kravetz
Powered by blists - more mailing lists