* [PATCH bpf-next] bpf: Fix deadlock between rcu_tasks_trace and event_mutex.
@ 2025-02-24 22:16 Alexei Starovoitov
2025-02-25 1:06 ` Andrii Nakryiko
` (2 more replies)
0 siblings, 3 replies; 6+ messages in thread
From: Alexei Starovoitov @ 2025-02-24 22:16 UTC (permalink / raw)
To: bpf; +Cc: daniel, andrii, martin.lau, memxor, eddyz87, kernel-team
From: Alexei Starovoitov <ast@kernel.org>
Fix the following deadlock:
CPU A
_free_event()
perf_kprobe_destroy()
mutex_lock(&event_mutex)
perf_trace_event_unreg()
synchronize_rcu_tasks_trace()
There are several paths where _free_event() grabs event_mutex
and calls sync_rcu_tasks_trace. Above is one such case.
CPU B
bpf_prog_test_run_syscall()
rcu_read_lock_trace()
bpf_prog_run_pin_on_cpu()
bpf_prog_load()
bpf_tracing_func_proto()
trace_set_clr_event()
mutex_lock(&event_mutex)
Delegate trace_set_clr_event() to workqueue to avoid
such lock dependency.
Signed-off-by: Alexei Starovoitov <ast@kernel.org>
---
kernel/trace/bpf_trace.c | 7 ++++---
1 file changed, 4 insertions(+), 3 deletions(-)
diff --git a/kernel/trace/bpf_trace.c b/kernel/trace/bpf_trace.c
index a612f6f182e5..13bef2462e94 100644
--- a/kernel/trace/bpf_trace.c
+++ b/kernel/trace/bpf_trace.c
@@ -392,7 +392,7 @@ static const struct bpf_func_proto bpf_trace_printk_proto = {
.arg2_type = ARG_CONST_SIZE,
};
-static void __set_printk_clr_event(void)
+static void __set_printk_clr_event(struct work_struct *work)
{
/*
* This program might be calling bpf_trace_printk,
@@ -405,10 +405,11 @@ static void __set_printk_clr_event(void)
if (trace_set_clr_event("bpf_trace", "bpf_trace_printk", 1))
pr_warn_ratelimited("could not enable bpf_trace_printk events");
}
+static DECLARE_WORK(set_printk_work, __set_printk_clr_event);
const struct bpf_func_proto *bpf_get_trace_printk_proto(void)
{
- __set_printk_clr_event();
+ schedule_work(&set_printk_work);
return &bpf_trace_printk_proto;
}
@@ -451,7 +452,7 @@ static const struct bpf_func_proto bpf_trace_vprintk_proto = {
const struct bpf_func_proto *bpf_get_trace_vprintk_proto(void)
{
- __set_printk_clr_event();
+ schedule_work(&set_printk_work);
return &bpf_trace_vprintk_proto;
}
--
2.43.5
^ permalink raw reply related [flat|nested] 6+ messages in thread
* Re: [PATCH bpf-next] bpf: Fix deadlock between rcu_tasks_trace and event_mutex.
2025-02-24 22:16 [PATCH bpf-next] bpf: Fix deadlock between rcu_tasks_trace and event_mutex Alexei Starovoitov
@ 2025-02-25 1:06 ` Andrii Nakryiko
2025-02-25 1:56 ` Alexei Starovoitov
2025-02-25 13:03 ` Hou Tao
2025-02-26 17:00 ` patchwork-bot+netdevbpf
2 siblings, 1 reply; 6+ messages in thread
From: Andrii Nakryiko @ 2025-02-25 1:06 UTC (permalink / raw)
To: Alexei Starovoitov
Cc: bpf, daniel, andrii, martin.lau, memxor, eddyz87, kernel-team
On Mon, Feb 24, 2025 at 2:16 PM Alexei Starovoitov
<alexei.starovoitov@gmail.com> wrote:
>
> From: Alexei Starovoitov <ast@kernel.org>
>
> Fix the following deadlock:
> CPU A
> _free_event()
> perf_kprobe_destroy()
> mutex_lock(&event_mutex)
> perf_trace_event_unreg()
> synchronize_rcu_tasks_trace()
>
> There are several paths where _free_event() grabs event_mutex
> and calls sync_rcu_tasks_trace. Above is one such case.
>
> CPU B
> bpf_prog_test_run_syscall()
> rcu_read_lock_trace()
> bpf_prog_run_pin_on_cpu()
> bpf_prog_load()
> bpf_tracing_func_proto()
> trace_set_clr_event()
> mutex_lock(&event_mutex)
>
> Delegate trace_set_clr_event() to workqueue to avoid
> such lock dependency.
>
> Signed-off-by: Alexei Starovoitov <ast@kernel.org>
> ---
> kernel/trace/bpf_trace.c | 7 ++++---
> 1 file changed, 4 insertions(+), 3 deletions(-)
>
There is a tiny chance that bpf_printk() might not produce data (for a
little bit) if the time between program verification and its
triggering right after that is shorter than workqueue delay, right?
It's probably negligible in practice, so lgtm
Acked-by: Andrii Nakryiko <andrii@kernel.org>
> diff --git a/kernel/trace/bpf_trace.c b/kernel/trace/bpf_trace.c
> index a612f6f182e5..13bef2462e94 100644
> --- a/kernel/trace/bpf_trace.c
> +++ b/kernel/trace/bpf_trace.c
> @@ -392,7 +392,7 @@ static const struct bpf_func_proto bpf_trace_printk_proto = {
> .arg2_type = ARG_CONST_SIZE,
> };
>
> -static void __set_printk_clr_event(void)
> +static void __set_printk_clr_event(struct work_struct *work)
> {
> /*
> * This program might be calling bpf_trace_printk,
> @@ -405,10 +405,11 @@ static void __set_printk_clr_event(void)
> if (trace_set_clr_event("bpf_trace", "bpf_trace_printk", 1))
> pr_warn_ratelimited("could not enable bpf_trace_printk events");
> }
> +static DECLARE_WORK(set_printk_work, __set_printk_clr_event);
>
> const struct bpf_func_proto *bpf_get_trace_printk_proto(void)
> {
> - __set_printk_clr_event();
> + schedule_work(&set_printk_work);
> return &bpf_trace_printk_proto;
> }
>
> @@ -451,7 +452,7 @@ static const struct bpf_func_proto bpf_trace_vprintk_proto = {
>
> const struct bpf_func_proto *bpf_get_trace_vprintk_proto(void)
> {
> - __set_printk_clr_event();
> + schedule_work(&set_printk_work);
> return &bpf_trace_vprintk_proto;
> }
>
> --
> 2.43.5
>
^ permalink raw reply [flat|nested] 6+ messages in thread
* Re: [PATCH bpf-next] bpf: Fix deadlock between rcu_tasks_trace and event_mutex.
2025-02-25 1:06 ` Andrii Nakryiko
@ 2025-02-25 1:56 ` Alexei Starovoitov
0 siblings, 0 replies; 6+ messages in thread
From: Alexei Starovoitov @ 2025-02-25 1:56 UTC (permalink / raw)
To: Andrii Nakryiko
Cc: bpf, Daniel Borkmann, Andrii Nakryiko, Martin KaFai Lau,
Kumar Kartikeya Dwivedi, Eddy Z, Kernel Team
On Mon, Feb 24, 2025 at 5:06 PM Andrii Nakryiko
<andrii.nakryiko@gmail.com> wrote:
>
> On Mon, Feb 24, 2025 at 2:16 PM Alexei Starovoitov
> <alexei.starovoitov@gmail.com> wrote:
> >
> > From: Alexei Starovoitov <ast@kernel.org>
> >
> > Fix the following deadlock:
> > CPU A
> > _free_event()
> > perf_kprobe_destroy()
> > mutex_lock(&event_mutex)
> > perf_trace_event_unreg()
> > synchronize_rcu_tasks_trace()
> >
> > There are several paths where _free_event() grabs event_mutex
> > and calls sync_rcu_tasks_trace. Above is one such case.
> >
> > CPU B
> > bpf_prog_test_run_syscall()
> > rcu_read_lock_trace()
> > bpf_prog_run_pin_on_cpu()
> > bpf_prog_load()
> > bpf_tracing_func_proto()
> > trace_set_clr_event()
> > mutex_lock(&event_mutex)
> >
> > Delegate trace_set_clr_event() to workqueue to avoid
> > such lock dependency.
> >
> > Signed-off-by: Alexei Starovoitov <ast@kernel.org>
> > ---
> > kernel/trace/bpf_trace.c | 7 ++++---
> > 1 file changed, 4 insertions(+), 3 deletions(-)
> >
>
> There is a tiny chance that bpf_printk() might not produce data (for a
> little bit) if the time between program verification and its
> triggering right after that is shorter than workqueue delay, right?
yeah, but also see the comment in __set_printk_clr_event().
Unfortunately users can enable/disable this event at any time
just like other ftrace events.
The trace_bpf_trace_printk is fragile and racy.
In addition, trace_pipe can be configured in weird ways.
cat /sys/kernel/tracing/trace_pipe
will look nothing like normal.
All existing footgun warnings apply.
With Kumar we started discussing a new debug/printk mechanism.
So that arena faults, res_spin_lock timeous can be printed there
and consumed per program instead of global trace_pipe.
> It's probably negligible in practice, so lgtm
>
> Acked-by: Andrii Nakryiko <andrii@kernel.org>
>
> > diff --git a/kernel/trace/bpf_trace.c b/kernel/trace/bpf_trace.c
> > index a612f6f182e5..13bef2462e94 100644
> > --- a/kernel/trace/bpf_trace.c
> > +++ b/kernel/trace/bpf_trace.c
> > @@ -392,7 +392,7 @@ static const struct bpf_func_proto bpf_trace_printk_proto = {
> > .arg2_type = ARG_CONST_SIZE,
> > };
> >
> > -static void __set_printk_clr_event(void)
> > +static void __set_printk_clr_event(struct work_struct *work)
> > {
> > /*
> > * This program might be calling bpf_trace_printk,
> > @@ -405,10 +405,11 @@ static void __set_printk_clr_event(void)
> > if (trace_set_clr_event("bpf_trace", "bpf_trace_printk", 1))
> > pr_warn_ratelimited("could not enable bpf_trace_printk events");
> > }
> > +static DECLARE_WORK(set_printk_work, __set_printk_clr_event);
> >
> > const struct bpf_func_proto *bpf_get_trace_printk_proto(void)
> > {
> > - __set_printk_clr_event();
> > + schedule_work(&set_printk_work);
> > return &bpf_trace_printk_proto;
> > }
> >
> > @@ -451,7 +452,7 @@ static const struct bpf_func_proto bpf_trace_vprintk_proto = {
> >
> > const struct bpf_func_proto *bpf_get_trace_vprintk_proto(void)
> > {
> > - __set_printk_clr_event();
> > + schedule_work(&set_printk_work);
> > return &bpf_trace_vprintk_proto;
> > }
> >
> > --
> > 2.43.5
> >
^ permalink raw reply [flat|nested] 6+ messages in thread
* Re: [PATCH bpf-next] bpf: Fix deadlock between rcu_tasks_trace and event_mutex.
2025-02-24 22:16 [PATCH bpf-next] bpf: Fix deadlock between rcu_tasks_trace and event_mutex Alexei Starovoitov
2025-02-25 1:06 ` Andrii Nakryiko
@ 2025-02-25 13:03 ` Hou Tao
2025-02-25 16:01 ` Alexei Starovoitov
2025-02-26 17:00 ` patchwork-bot+netdevbpf
2 siblings, 1 reply; 6+ messages in thread
From: Hou Tao @ 2025-02-25 13:03 UTC (permalink / raw)
To: Alexei Starovoitov, bpf
Cc: daniel, andrii, martin.lau, memxor, eddyz87, kernel-team
Hi,
On 2/25/2025 6:16 AM, Alexei Starovoitov wrote:
> From: Alexei Starovoitov <ast@kernel.org>
>
> Fix the following deadlock:
> CPU A
> _free_event()
> perf_kprobe_destroy()
> mutex_lock(&event_mutex)
> perf_trace_event_unreg()
> synchronize_rcu_tasks_trace()
>
> There are several paths where _free_event() grabs event_mutex
> and calls sync_rcu_tasks_trace. Above is one such case.
>
> CPU B
> bpf_prog_test_run_syscall()
> rcu_read_lock_trace()
> bpf_prog_run_pin_on_cpu()
> bpf_prog_load()
> bpf_tracing_func_proto()
> trace_set_clr_event()
> mutex_lock(&event_mutex)
Considering the unregistered case is not so frequency, would it better
to use mutex_trylock firstly, then fallback to workqueue when the
event_mutex is busy ?
>
> Delegate trace_set_clr_event() to workqueue to avoid
> such lock dependency.
>
> Signed-off-by: Alexei Starovoitov <ast@kernel.org>
> ---
> kernel/trace/bpf_trace.c | 7 ++++---
> 1 file changed, 4 insertions(+), 3 deletions(-)
>
> diff --git a/kernel/trace/bpf_trace.c b/kernel/trace/bpf_trace.c
> index a612f6f182e5..13bef2462e94 100644
> --- a/kernel/trace/bpf_trace.c
> +++ b/kernel/trace/bpf_trace.c
> @@ -392,7 +392,7 @@ static const struct bpf_func_proto bpf_trace_printk_proto = {
> .arg2_type = ARG_CONST_SIZE,
> };
>
> -static void __set_printk_clr_event(void)
> +static void __set_printk_clr_event(struct work_struct *work)
> {
> /*
> * This program might be calling bpf_trace_printk,
> @@ -405,10 +405,11 @@ static void __set_printk_clr_event(void)
> if (trace_set_clr_event("bpf_trace", "bpf_trace_printk", 1))
> pr_warn_ratelimited("could not enable bpf_trace_printk events");
> }
> +static DECLARE_WORK(set_printk_work, __set_printk_clr_event);
>
> const struct bpf_func_proto *bpf_get_trace_printk_proto(void)
> {
> - __set_printk_clr_event();
> + schedule_work(&set_printk_work);
> return &bpf_trace_printk_proto;
> }
>
> @@ -451,7 +452,7 @@ static const struct bpf_func_proto bpf_trace_vprintk_proto = {
>
> const struct bpf_func_proto *bpf_get_trace_vprintk_proto(void)
> {
> - __set_printk_clr_event();
> + schedule_work(&set_printk_work);
> return &bpf_trace_vprintk_proto;
> }
>
^ permalink raw reply [flat|nested] 6+ messages in thread
* Re: [PATCH bpf-next] bpf: Fix deadlock between rcu_tasks_trace and event_mutex.
2025-02-25 13:03 ` Hou Tao
@ 2025-02-25 16:01 ` Alexei Starovoitov
0 siblings, 0 replies; 6+ messages in thread
From: Alexei Starovoitov @ 2025-02-25 16:01 UTC (permalink / raw)
To: Hou Tao
Cc: bpf, Daniel Borkmann, Andrii Nakryiko, Martin KaFai Lau,
Kumar Kartikeya Dwivedi, Eddy Z, Kernel Team
On Tue, Feb 25, 2025 at 5:03 AM Hou Tao <houtao@huaweicloud.com> wrote:
>
> Hi,
>
> On 2/25/2025 6:16 AM, Alexei Starovoitov wrote:
> > From: Alexei Starovoitov <ast@kernel.org>
> >
> > Fix the following deadlock:
> > CPU A
> > _free_event()
> > perf_kprobe_destroy()
> > mutex_lock(&event_mutex)
> > perf_trace_event_unreg()
> > synchronize_rcu_tasks_trace()
> >
> > There are several paths where _free_event() grabs event_mutex
> > and calls sync_rcu_tasks_trace. Above is one such case.
> >
> > CPU B
> > bpf_prog_test_run_syscall()
> > rcu_read_lock_trace()
> > bpf_prog_run_pin_on_cpu()
> > bpf_prog_load()
> > bpf_tracing_func_proto()
> > trace_set_clr_event()
> > mutex_lock(&event_mutex)
>
> Considering the unregistered case is not so frequency, would it better
> to use mutex_trylock firstly, then fallback to workqueue when the
> event_mutex is busy ?
No. That would be an unnecessary complication.
^ permalink raw reply [flat|nested] 6+ messages in thread
* Re: [PATCH bpf-next] bpf: Fix deadlock between rcu_tasks_trace and event_mutex.
2025-02-24 22:16 [PATCH bpf-next] bpf: Fix deadlock between rcu_tasks_trace and event_mutex Alexei Starovoitov
2025-02-25 1:06 ` Andrii Nakryiko
2025-02-25 13:03 ` Hou Tao
@ 2025-02-26 17:00 ` patchwork-bot+netdevbpf
2 siblings, 0 replies; 6+ messages in thread
From: patchwork-bot+netdevbpf @ 2025-02-26 17:00 UTC (permalink / raw)
To: Alexei Starovoitov
Cc: bpf, daniel, andrii, martin.lau, memxor, eddyz87, kernel-team
Hello:
This patch was applied to bpf/bpf-next.git (master)
by Andrii Nakryiko <andrii@kernel.org>:
On Mon, 24 Feb 2025 14:16:37 -0800 you wrote:
> From: Alexei Starovoitov <ast@kernel.org>
>
> Fix the following deadlock:
> CPU A
> _free_event()
> perf_kprobe_destroy()
> mutex_lock(&event_mutex)
> perf_trace_event_unreg()
> synchronize_rcu_tasks_trace()
>
> [...]
Here is the summary with links:
- [bpf-next] bpf: Fix deadlock between rcu_tasks_trace and event_mutex.
https://git.kernel.org/bpf/bpf-next/c/4580f4e0ebdf
You are awesome, thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/patchwork/pwbot.html
^ permalink raw reply [flat|nested] 6+ messages in thread
end of thread, other threads:[~2025-02-26 16:59 UTC | newest]
Thread overview: 6+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2025-02-24 22:16 [PATCH bpf-next] bpf: Fix deadlock between rcu_tasks_trace and event_mutex Alexei Starovoitov
2025-02-25 1:06 ` Andrii Nakryiko
2025-02-25 1:56 ` Alexei Starovoitov
2025-02-25 13:03 ` Hou Tao
2025-02-25 16:01 ` Alexei Starovoitov
2025-02-26 17:00 ` patchwork-bot+netdevbpf
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox