On Thu, 31 Oct 2013 19:22:18 +0100, Oleg Nesterov wrote:
> On 10/29, Namhyung Kim wrote:
>>
>> +static void __user *get_user_vaddr(unsigned long addr, struct trace_uprobe 
>> *tu)
>> +{
>> +    unsigned long pgoff = addr >> PAGE_SHIFT;
>> +    struct vm_area_struct *vma;
>> +    struct address_space *mapping;
>> +    unsigned long vaddr = 0;
>> +
>> +    if (tu == NULL) {
>> +            /* A NULL tu means that we already got the vaddr */
>> +            return (void __force __user *) addr;
>> +    }
>> +
>> +    mapping = tu->inode->i_mapping;
>> +
>> +    mutex_lock(&mapping->i_mmap_mutex);
>> +    vma_interval_tree_foreach(vma, &mapping->i_mmap, pgoff, pgoff) {
>> +            if (vma->vm_mm != current->mm)
>> +                    continue;
>> +            if (!(vma->vm_flags & VM_READ))
>> +                    continue;
>> +
>> +            vaddr = offset_to_vaddr(vma, addr);
>> +            break;
>> +    }
>> +    mutex_unlock(&mapping->i_mmap_mutex);
>> +
>> +    WARN_ON_ONCE(vaddr == 0);
>
> Hmm. But unless I missed something this "addr" passed as an argument can
> be wrong? And if nothing else this or another thread can unmap the vma?

You mean WARN_ON_ONCE here is superfluous?  I admit that it should
protect concurrent vma [un]mappings.  Please see my reply in other
thread for a new approach.

Thanks,
Namhyung
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Reply via email to