[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <87zgqg2r4o.ffs@tglx>
Date: Sun, 07 Nov 2021 11:32:07 +0100
From: Thomas Gleixner <tglx@...utronix.de>
To: Dmitrii Banshchikov <me@...que.spb.ru>
Cc: Alexei Starovoitov <alexei.starovoitov@...il.com>,
syzbot <syzbot+43fd005b5a1b4d10781e@...kaller.appspotmail.com>,
John Stultz <john.stultz@...aro.org>,
LKML <linux-kernel@...r.kernel.org>, sboyd@...nel.org,
syzkaller-bugs <syzkaller-bugs@...glegroups.com>,
Peter Zijlstra <peterz@...radead.org>,
Mark Rutland <mark.rutland@....com>,
Steven Rostedt <rosted@...dmis.org>,
Alexei Starovoitov <ast@...nel.org>,
Daniel Borkmann <daniel@...earbox.net>,
bpf <bpf@...r.kernel.org>
Subject: Re: [syzbot] possible deadlock in ktime_get_coarse_ts64
Dmitrii,
On Sun, Nov 07 2021 at 00:07, Dmitrii Banshchikov wrote:
> On Fri, Nov 05, 2021 at 06:24:30PM +0100, Thomas Gleixner wrote:
>> It cannot be used in TRACING and PERF_EVENT either. But those contexts
>> have to exclude other functions as well:
>>
>> bpf_ktime_get_ns
>> bpf_ktime_get_boot_ns
>>
>> along with
>>
>> bpf_spin_lock/unlock
>> bpf_timer_*
>
> 1) bpf_ktime_get_ns and bpf_ktime_get_boot_ns use
> ktime_get_{mono,boot}_fast_ns.
Ok. That's fine then. I was just going from the bpf function names and
missed the implementation detail.
> 2) bpf_spin_lock/unlock have notrace attribute set.
How is that supposed to help?
You cannot take a spinlock from NMI context if that same lock can be
taken by other contexts as well.
Also notrace on the public function is not guaranteeing that the inlines
(as defined) are not traceable and it does not exclude it from being
kprobed.
> 3) bpf_timer_* helpers fail early if they are in NMI.
>
> Why they have to be excluded?
Because timers take locks and you can just end up in the very same
situation that you create invers lock dependencies or deadlocks when you
use that from a tracepoint.
hrtimer_start()
lock_base();
trace_hrtimer...()
perf_event()
bpf_run()
bpf_timer_start()
hrtimer_start()
lock_base() <- DEADLOCK
Tracepoints and perf events are very limited in what they can actually
do. Just because it's BPF these rules are not magically going away.
Thanks,
tglx
Powered by blists - more mailing lists