Commit a0c109dc authored by Yafang Shao's avatar Yafang Shao Committed by Alexei Starovoitov

bpf: Add __rcu_read_{lock,unlock} into btf id deny list

The tracing recursion prevention mechanism must be protected by rcu, that
leaves __rcu_read_{lock,unlock} unprotected by this mechanism. If we trace
them, the recursion will happen. Let's add them into the btf id deny list.

When CONFIG_PREEMPT_RCU is enabled, it can be reproduced with a simple bpf
program as such:
  SEC("fentry/__rcu_read_lock")
  int fentry_run()
  {
      return 0;
  }
Signed-off-by: default avatarYafang Shao <laoar.shao@gmail.com>
Link: https://lore.kernel.org/r/20230424161104.3737-2-laoar.shao@gmail.comSigned-off-by: default avatarAlexei Starovoitov <ast@kernel.org>
parent 7deca5ea
...@@ -18671,6 +18671,10 @@ BTF_ID(func, rcu_read_unlock_strict) ...@@ -18671,6 +18671,10 @@ BTF_ID(func, rcu_read_unlock_strict)
BTF_ID(func, preempt_count_add) BTF_ID(func, preempt_count_add)
BTF_ID(func, preempt_count_sub) BTF_ID(func, preempt_count_sub)
#endif #endif
#ifdef CONFIG_PREEMPT_RCU
BTF_ID(func, __rcu_read_lock)
BTF_ID(func, __rcu_read_unlock)
#endif
BTF_SET_END(btf_id_deny) BTF_SET_END(btf_id_deny)
static bool can_be_sleepable(struct bpf_prog *prog) static bool can_be_sleepable(struct bpf_prog *prog)
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment