From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1756858Ab0ICRmK (ORCPT ); Fri, 3 Sep 2010 13:42:10 -0400 Received: from casper.infradead.org ([85.118.1.10]:39246 "EHLO casper.infradead.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753857Ab0ICRmJ convert rfc822-to-8bit (ORCPT ); Fri, 3 Sep 2010 13:42:09 -0400 Subject: Re: [PATCHv11 2.6.36-rc2-tip 3/15] 3: uprobes: Slot allocation for Execution out of line(XOL) From: Peter Zijlstra To: Srikar Dronamraju Cc: Ingo Molnar , Steven Rostedt , Randy Dunlap , Arnaldo Carvalho de Melo , Linus Torvalds , Christoph Hellwig , Masami Hiramatsu , Oleg Nesterov , Mark Wielaard , Mathieu Desnoyers , Andrew Morton , Naren A Devaiah , Jim Keniston , Frederic Weisbecker , "Frank Ch. Eigler" , Ananth N Mavinakayanahalli , LKML , "Paul E. McKenney" In-Reply-To: <20100903172620.GA32733@linux.vnet.ibm.com> References: <20100825134117.5447.55209.sendpatchset@localhost6.localdomain6> <20100825134156.5447.43216.sendpatchset@localhost6.localdomain6> <1283372009.2059.1557.camel@laptop> <20100903164010.GA1904@linux.vnet.ibm.com> <1283532714.2050.244.camel@laptop> <20100903172620.GA32733@linux.vnet.ibm.com> Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: 8BIT Date: Fri, 03 Sep 2010 19:41:32 +0200 Message-ID: <1283535692.2050.325.camel@laptop> Mime-Version: 1.0 X-Mailer: Evolution 2.28.3 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, 2010-09-03 at 22:56 +0530, Srikar Dronamraju wrote: > > > static unsigned long xol_get_insn_slot(struct user_bkpt *user_bkpt, > struct uprobes_xol_area *xol_area) > { > unsigned long flags, xol_vaddr = 0; > int len; > > if (unlikely(!xol_area)) > return 0; > > smp_rmb(); > if (user_bkpt->xol_vaddr) > return user_bkpt->xol_vaddr; > > spin_lock_irqsave(&xol_area->lock, flags); > xol_vaddr = xol_take_insn_slot(xol_area); > spin_unlock_irqrestore(&xol_area->lock, flags); > > /* > * Initialize the slot if user_bkpt->vaddr points to valid > * instruction slot. > */ > if (!xol_vaddr) > return 0; > > len = access_process_vm(current, xol_vaddr, user_bkpt->insn, > UPROBES_XOL_SLOT_BYTES, 1); > if (unlikely(len < UPROBES_XOL_SLOT_BYTES)) > printk(KERN_ERR "Failed to copy instruction at %#lx " > "len = %d\n", user_bkpt->vaddr, len); > > /* > * Update user_bkpt->xol_vaddr after giving a chance for the slot to > * be initialized. > */ > smp_mb(); > user_bkpt->xol_vaddr = xol_vaddr; > return user_bkpt->xol_vaddr; > } Racy like you won't believe.. Suppose multiple threads hitting the trap at the same time, every thread will end up failing the check and allocating a new slot for it, at the end the slowest thread will end up setting the value.