From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752329Ab3KDIGJ (ORCPT ); Mon, 4 Nov 2013 03:06:09 -0500 Received: from LGEMRELSE6Q.lge.com ([156.147.1.121]:49852 "EHLO LGEMRELSE6Q.lge.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751519Ab3KDIGH (ORCPT ); Mon, 4 Nov 2013 03:06:07 -0500 X-AuditID: 9c930179-b7b8dae000001b3d-54-5277556d2a93 From: Namhyung Kim To: Oleg Nesterov Cc: Steven Rostedt , Namhyung Kim , Masami Hiramatsu , Hyeoncheol Lee , Hemant Kumar , LKML , Srikar Dronamraju , "zhangwei\(Jovi\)" , Arnaldo Carvalho de Melo Subject: Re: [PATCH 10/13] tracing/uprobes: Fetch args before reserving a ring buffer References: <1383029621-7384-1-git-send-email-namhyung@kernel.org> <1383029621-7384-11-git-send-email-namhyung@kernel.org> <20131031181654.GA11208@redhat.com> Date: Mon, 04 Nov 2013 17:06:05 +0900 In-Reply-To: <20131031181654.GA11208@redhat.com> (Oleg Nesterov's message of "Thu, 31 Oct 2013 19:16:54 +0100") Message-ID: <87y554382a.fsf@sejong.aot.lge.com> User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/24.1 (gnu/linux) MIME-Version: 1.0 Content-Type: text/plain X-Brightmail-Tracker: AAAAAA== Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Oleg, On Thu, 31 Oct 2013 19:16:54 +0100, Oleg Nesterov wrote: > On 10/29, Namhyung Kim wrote: >> >> @@ -630,6 +653,19 @@ probe_event_enable(struct trace_uprobe *tu, int flag, filter_func_t filter) >> if (trace_probe_is_enabled(&tu->p)) >> return -EINTR; >> >> + if (atomic_inc_return(&uprobe_buffer_ref) == 1) { >> + int cpu; >> + >> + uprobe_cpu_buffer = __alloc_percpu(PAGE_SIZE, PAGE_SIZE); >> + if (uprobe_cpu_buffer == NULL) { >> + atomic_dec(&uprobe_buffer_ref); >> + return -ENOMEM; >> + } >> + >> + for_each_possible_cpu(cpu) >> + mutex_init(&per_cpu(uprobe_cpu_mutex, cpu)); >> + } >> + >> WARN_ON(!uprobe_filter_is_empty(&tu->filter)); >> >> tu->p.flags |= flag; >> @@ -646,6 +682,11 @@ static void probe_event_disable(struct trace_uprobe *tu, int flag) >> if (!trace_probe_is_enabled(&tu->p)) >> return; >> >> + if (atomic_dec_and_test(&uprobe_buffer_ref)) { >> + free_percpu(uprobe_cpu_buffer); >> + uprobe_cpu_buffer = NULL; >> + } >> + >> WARN_ON(!uprobe_filter_is_empty(&tu->filter)); > > Do we really need atomic_t? probe_event_enable/disable is called under > event_mutex and we rely on this fact anyway. Looking at the code, it seems probe_event_enable/disable() is called without event_mutex when it called from sys_perf_event_open(). So we still need to protect refcount from concurrent accesses. > > Otherwise this logic looks racy even with atomic_t, another thread could > use the uninitialized uprobe_cpu_buffer/mutex if it registers another probe > and the handler runs before we complete the initialization, no? But yeah, this is indeed a problem. Thanks for pointing it out. I'll put a mutex to prevent such cases. Thanks, Namhyung