diff options
author | 2021-02-25 15:43:15 -0800 | |
---|---|---|
committer | 2021-02-26 11:51:48 -0800 | |
commit | bc235cdb423a2daed6f337676006a66557429cd1 (patch) | |
tree | 397fc9c1c0b454bfe2856b9f70cbf08e1467d396 /include/linux/bpf_types.h | |
parent | bpf: Enable task local storage for tracing programs (diff) | |
download | wireguard-linux-bc235cdb423a2daed6f337676006a66557429cd1.tar.xz wireguard-linux-bc235cdb423a2daed6f337676006a66557429cd1.zip |
bpf: Prevent deadlock from recursive bpf_task_storage_[get|delete]
BPF helpers bpf_task_storage_[get|delete] could hold two locks:
bpf_local_storage_map_bucket->lock and bpf_local_storage->lock. Calling
these helpers from fentry/fexit programs on functions in bpf_*_storage.c
may cause deadlock on either locks.
Prevent such deadlock with a per cpu counter, bpf_task_storage_busy. We
need this counter to be global, because the two locks here belong to two
different objects: bpf_local_storage_map and bpf_local_storage. If we
pick one of them as the owner of the counter, it is still possible to
trigger deadlock on the other lock. For example, if bpf_local_storage_map
owns the counters, it cannot prevent deadlock on bpf_local_storage->lock
when two maps are used.
Signed-off-by: Song Liu <songliubraving@fb.com>
Signed-off-by: Alexei Starovoitov <ast@kernel.org>
Acked-by: Martin KaFai Lau <kafai@fb.com>
Link: https://lore.kernel.org/bpf/20210225234319.336131-3-songliubraving@fb.com
Diffstat (limited to 'include/linux/bpf_types.h')
0 files changed, 0 insertions, 0 deletions