On Tue, 20 May 2025 16:19:26 +0200
Oleg Nesterov <o...@redhat.com> wrote:

> On 05/20, Masami Hiramatsu wrote:
> >
> > On Thu, 15 May 2025 14:10:58 +0200
> > Jiri Olsa <jo...@kernel.org> wrote:
> >
> > > Currently unapply_uprobe takes mmap_read_lock, but it might call
> > > remove_breakpoint which eventually changes user pages.
> > >
> > > Current code writes either breakpoint or original instruction, so
> > > it can probably go away with that, but with the upcoming change that
> > > writes multiple instructions on the probed address we need to ensure
> > > that any update to mm's pages is exclusive.
> > >
> >
> > So, this is a bugfix, right?
> 
> No, mmap_read_lock() is fine.
> 
> To remind, this was already discussed with you, see
> [PATCH 02/12] uprobes: grab write mmap lock in unapply_uprobe()
> https://lore.kernel.org/all/20240625002144.3485799-3-and...@kernel.org/
> 
> And you even reviewed this patch
> [PATCH 1/2] uprobes: document the usage of mm->mmap_lock
> https://lore.kernel.org/all/20240710140045.ga1...@redhat.com/
> 
> But, as the changelog explains, this patch is needed for the upcoming changes.

Oops, OK. So current code is good with either mmap_read_lock() or 
mmap_write_lock().
But the patch description is a bit confusing. If the point is an atomic (byte?)
update or not, it should describe it.

Thank you,

> 
> --------------------------------------------------------------------------
> Just in case... I'll try to read this series tomorrow, but at first glance
> this version addresses all my concerns.
> 
> Oleg.
> 


-- 
Masami Hiramatsu (Google) <mhira...@kernel.org>

Reply via email to