mbox series

[bpf-next,0/9] bpf: Avoid unnecessary deadlock detection and failure in task storage

Message ID 20221025184524.3526117-1-martin.lau@linux.dev (mailing list archive)
Headers show
Series bpf: Avoid unnecessary deadlock detection and failure in task storage | expand

Message

Martin KaFai Lau Oct. 25, 2022, 6:45 p.m. UTC
From: Martin KaFai Lau <martin.lau@kernel.org>

The commit bc235cdb423a ("bpf: Prevent deadlock from recursive bpf_task_storage_[get|delete]")
added deadlock detection to avoid a tracing program from recurring
on the bpf_task_storage_{get,delete}() helpers.  These helpers acquire
a spin lock and it will lead to deadlock.

It is unnecessary for the bpf_lsm and bpf_iter programs which do
not recur.  The situation is the same as the existing
bpf_pid_task_storage_{lookup,delete}_elem() which are
used in the syscall and they also do not have deadlock detection.

This set is to add new bpf_task_storage_{get,delete}() helper proto
without the deadlock detection.  The set also removes the prog->active
check from the bpf_lsm and bpf_iter program.  Please see the individual
patch for details.

Martin KaFai Lau (9):
  bpf: Remove prog->active check for bpf_lsm and bpf_iter
  bpf: Append _recur naming to the bpf_task_storage helper proto
  bpf: Refactor the core bpf_task_storage_get logic into a new function
  bpf: Avoid taking spinlock in bpf_task_storage_get if potential
    deadlock is detected
  bpf: Add new bpf_task_storage_get proto with no deadlock detection
  bpf: bpf_task_storage_delete_recur does lookup first before the
    deadlock check
  bpf: Add new bpf_task_storage_delete proto with no deadlock detection
  selftests/bpf: Ensure no task storage failure for bpf_lsm.s prog due
    to deadlock detection
  selftests/bpf: Tracing prog can still do lookup under busy lock

 arch/arm64/net/bpf_jit_comp.c                 |   9 +-
 arch/x86/net/bpf_jit_comp.c                   |  19 +--
 include/linux/bpf.h                           |  26 ++--
 include/linux/bpf_verifier.h                  |  15 +-
 kernel/bpf/bpf_local_storage.c                |   1 +
 kernel/bpf/bpf_task_storage.c                 | 119 +++++++++++---
 kernel/bpf/syscall.c                          |   5 +-
 kernel/bpf/trampoline.c                       |  80 ++++++++--
 kernel/trace/bpf_trace.c                      |   5 +
 .../bpf/prog_tests/task_local_storage.c       | 146 +++++++++++++++++-
 .../selftests/bpf/progs/task_ls_recursion.c   |  43 +++++-
 .../bpf/progs/task_storage_nodeadlock.c       |  47 ++++++
 12 files changed, 431 insertions(+), 84 deletions(-)
 create mode 100644 tools/testing/selftests/bpf/progs/task_storage_nodeadlock.c

Comments

patchwork-bot+netdevbpf@kernel.org Oct. 26, 2022, 6:20 a.m. UTC | #1
Hello:

This series was applied to bpf/bpf-next.git (master)
by Alexei Starovoitov <ast@kernel.org>:

On Tue, 25 Oct 2022 11:45:15 -0700 you wrote:
> From: Martin KaFai Lau <martin.lau@kernel.org>
> 
> The commit bc235cdb423a ("bpf: Prevent deadlock from recursive bpf_task_storage_[get|delete]")
> added deadlock detection to avoid a tracing program from recurring
> on the bpf_task_storage_{get,delete}() helpers.  These helpers acquire
> a spin lock and it will lead to deadlock.
> 
> [...]

Here is the summary with links:
  - [bpf-next,1/9] bpf: Remove prog->active check for bpf_lsm and bpf_iter
    https://git.kernel.org/bpf/bpf-next/c/271de525e1d7
  - [bpf-next,2/9] bpf: Append _recur naming to the bpf_task_storage helper proto
    https://git.kernel.org/bpf/bpf-next/c/0593dd34e534
  - [bpf-next,3/9] bpf: Refactor the core bpf_task_storage_get logic into a new function
    https://git.kernel.org/bpf/bpf-next/c/6d65500c34d8
  - [bpf-next,4/9] bpf: Avoid taking spinlock in bpf_task_storage_get if potential deadlock is detected
    https://git.kernel.org/bpf/bpf-next/c/e8b02296a6b8
  - [bpf-next,5/9] bpf: Add new bpf_task_storage_get proto with no deadlock detection
    https://git.kernel.org/bpf/bpf-next/c/4279adb094a1
  - [bpf-next,6/9] bpf: bpf_task_storage_delete_recur does lookup first before the deadlock check
    https://git.kernel.org/bpf/bpf-next/c/fda64ae0bb3e
  - [bpf-next,7/9] bpf: Add new bpf_task_storage_delete proto with no deadlock detection
    https://git.kernel.org/bpf/bpf-next/c/8a7dac37f27a
  - [bpf-next,8/9] selftests/bpf: Ensure no task storage failure for bpf_lsm.s prog due to deadlock detection
    https://git.kernel.org/bpf/bpf-next/c/0334b4d8822a
  - [bpf-next,9/9] selftests/bpf: Tracing prog can still do lookup under busy lock
    https://git.kernel.org/bpf/bpf-next/c/387b532138ee

You are awesome, thank you!