On Sat, Nov 5, 2022 at 6:52 PM Kumar Kartikeya Dwivedi <memxor@xxxxxxxxx> wrote: > > Currently, unlike other tracing program types, BPF_PROG_TYPE_TRACING is > excluded is_tracing_prog_type checks. This means that they can use maps > containing bpf_spin_lock, bpf_timer, etc. without verification failure. > > However, allowing fentry/fexit programs to use maps that have such > bpf_timer in the map value can lead to deadlock. > > Suppose that an fentry program is attached to bpf_prog_put, and a TC > program executes and does bpf_map_update_elem on an array map that both > progs share. If the fentry programs calls bpf_map_update_elem for the > same key, it will lead to acquiring of the same lock from within the > critical section protecting the timer. > > The call chain is: > > bpf_prog_test_run_opts() // TC > bpf_prog_TC > bpf_map_update_elem(array_map, key=0) > bpf_obj_free_fields > bpf_timer_cancel_and_free > __bpf_spin_lock_irqsave > drop_prog_refcnt > bpf_prog_put > bpf_prog_FENTRY // FENTRY > bpf_map_update_elem(array_map, key=0) > bpf_obj_free_fields > bpf_timer_cancel_and_free > __bpf_spin_lock_irqsave // DEADLOCK > > BPF_TRACE_ITER attach type can be excluded because it always executes in > process context. > > Update selftests using bpf_timer in fentry to TC as they will be broken > by this change. which is an obvious red flag and the reason why we cannot do this change. This specific issue could be addressed with addition of notrace in drop_prog_refcnt, bpf_prog_put, __bpf_prog_put. Other calls from __bpf_prog_put can stay as-is, since they won't be called in this convoluted case. I frankly don't get why you're spending time digging such odd corner cases that no one can hit in real use. There are probably other equally weird corner cases and sooner or later will just declare them as 'wont-fix'. Not kidding. Please channel your energy to something that helps. Positive patches are more pleasant to review.