All of lore.kernel.org
 help / color / mirror / Atom feed
From: Shakeel Butt <shakeel.butt@linux.dev>
To: Ihor Solodrai <ihor.solodrai@linux.dev>
Cc: Puranjay Mohan <puranjay@kernel.org>,
	 Alexei Starovoitov <ast@kernel.org>,
	Andrii Nakryiko <andrii@kernel.org>,
	 Daniel Borkmann <daniel@iogearbox.net>,
	Eduard Zingerman <eddyz87@gmail.com>,
	 Kumar Kartikeya Dwivedi <memxor@gmail.com>,
	Mykyta Yatsenko <mykyta.yatsenko5@gmail.com>,
	 bpf@vger.kernel.org, linux-kernel@vger.kernel.org,
	kernel-team@meta.com
Subject: Re: [PATCH bpf v4 2/3] bpf: Avoid faultable build ID reads under mm locks
Date: Thu, 14 May 2026 16:02:50 -0700	[thread overview]
Message-ID: <agZTy44AgVB4zxut@linux.dev> (raw)
In-Reply-To: <2895ecd8-df1e-4cc0-b9f9-aef893dc2360@linux.dev>

On Thu, May 14, 2026 at 03:49:27PM -0700, Ihor Solodrai wrote:
> On 5/14/26 3:14 PM, Shakeel Butt wrote:
> > On Thu, May 14, 2026 at 02:31:58PM -0700, Ihor Solodrai wrote:
> >> On 5/14/26 1:47 PM, Shakeel Butt wrote:
> >>> On Thu, May 14, 2026 at 11:47:26AM -0700, Ihor Solodrai wrote:
> >>>> Sleepable build ID parsing can block in __kernel_read() [1], so the
> >>>> stackmap sleepable path must not call it while holding mmap_lock or a
> >>>> per-VMA read lock.
> >>>>
> >>>> The issue and the fix are conceptually similar to a recent procfs
> >>>> patch [2].
> >>>>
> >>>> Resolve each covered VMA with a stable read-side reference, preferring
> >>>> lock_vma_under_rcu() and falling back to mmap_read_trylock()
> >>>
> >>> Why trylock()? Why not just reuse the mechanism introduced in [2]? That is
> >>> abstract out the mechanism introduced in [2] in mm core and reuse it.
> >>
> >> v1 used mmap_read_lock() as the fallback, but Puranjay pointed out [1]
> >> that stackmap can be called when the caller already holds
> >> mmap_lock. 
> > 
> > Can you exapnd on the scenario where caller already holds mmap_lock? Is this
> > code path can be taken from bpf programs and bpf programs can be attached at
> > functions/code-paths already holding the mmap_lock?
> 
> Exactly. For example, tracing BPF programs may attach to mm internals, and
> there are also BPF iterators over VMAs (i.e. SEC("iter/task_vma")). And
> probably other use-cases.
> 
> Bottom line is we can't assume it's safe to take mmap_lock in a code path
> reachable from a BPF program.

Sounds good. Let's add a comment in code amd also explanation in commit message.

> 
> > 
> >> So I changed to trylock since v2, similar to non-sleepable
> >> path.
> >>
> >> AFAIU this means that the common mechanism needs to support trylock
> >> behavior as in stack_map_lock_vma() in this patch.
> >>
> >> Do you think this is worth factoring out of stackmap.c?
> > 
> > Do you think we will need similar handling at more places in future
> > (particularly in bpf world) then it makes sense to factoring out now? Otherwise
> > we can wait until we are sure.
> 
> Honestly, I don't know. IMO we shouldn't prematurely generalize a piece of
> code with a single user. But I just may be unaware of the others.
> 

So, we have two somewhat similar users with trylock being the difference. I
think we can continue as is for now and let's punt the decision to refactoring
and common code when next use-case arise.


  reply	other threads:[~2026-05-14 23:03 UTC|newest]

Thread overview: 15+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2026-05-14 18:47 [PATCH bpf v4 0/3] bpf: Implement stack_map_get_build_id_offset_sleepable() Ihor Solodrai
2026-05-14 18:47 ` [PATCH bpf v4 1/3] bpf: Factor out stack_map_build_id_set_ip() in stackmap.c Ihor Solodrai
2026-05-14 18:47 ` [PATCH bpf v4 2/3] bpf: Avoid faultable build ID reads under mm locks Ihor Solodrai
2026-05-14 19:37   ` bot+bpf-ci
2026-05-14 20:37     ` Ihor Solodrai
2026-05-14 20:47   ` Shakeel Butt
2026-05-14 21:31     ` Ihor Solodrai
2026-05-14 22:14       ` Shakeel Butt
2026-05-14 22:49         ` Ihor Solodrai
2026-05-14 23:02           ` Shakeel Butt [this message]
2026-05-14 21:31   ` sashiko-bot
2026-05-14 18:47 ` [PATCH bpf v4 3/3] bpf: Cache build IDs in sleepable stackmap path Ihor Solodrai
2026-05-14 19:37   ` bot+bpf-ci
2026-05-15  0:24   ` Alexei Starovoitov
2026-05-15  0:27     ` Ihor Solodrai

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=agZTy44AgVB4zxut@linux.dev \
    --to=shakeel.butt@linux.dev \
    --cc=andrii@kernel.org \
    --cc=ast@kernel.org \
    --cc=bpf@vger.kernel.org \
    --cc=daniel@iogearbox.net \
    --cc=eddyz87@gmail.com \
    --cc=ihor.solodrai@linux.dev \
    --cc=kernel-team@meta.com \
    --cc=linux-kernel@vger.kernel.org \
    --cc=memxor@gmail.com \
    --cc=mykyta.yatsenko5@gmail.com \
    --cc=puranjay@kernel.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.