summaryrefslogtreecommitdiffstats
path: root/kernel/bpf/syscall.c
diff options
context:
space:
mode:
authorThomas Gleixner <tglx@linutronix.de>2020-02-24 15:01:48 +0100
committerAlexei Starovoitov <ast@kernel.org>2020-02-25 01:20:10 +0100
commit085fee1a72a9fba101a4a68a2c02fa8bd2b6f913 (patch)
treee215f625f6ca1185cd82d9fd65a2585c109f6b5d /kernel/bpf/syscall.c
parentbpf: Provide recursion prevention helpers (diff)
downloadlinux-085fee1a72a9fba101a4a68a2c02fa8bd2b6f913.tar.xz
linux-085fee1a72a9fba101a4a68a2c02fa8bd2b6f913.zip
bpf: Use recursion prevention helpers in hashtab code
The required protection is that the caller cannot be migrated to a different CPU as these places take either a hash bucket lock or might trigger a kprobe inside the memory allocator. Both scenarios can lead to deadlocks. The deadlock prevention is per CPU by incrementing a per CPU variable which temporarily blocks the invocation of BPF programs from perf and kprobes. Replace the open coded preempt_disable/enable() and this_cpu_inc/dec() pairs with the new recursion prevention helpers to prepare BPF to work on PREEMPT_RT enabled kernels. On a non-RT kernel the migrate disable/enable in the helpers map to preempt_disable/enable(), i.e. no functional change. Signed-off-by: Thomas Gleixner <tglx@linutronix.de> Signed-off-by: Alexei Starovoitov <ast@kernel.org> Link: https://lore.kernel.org/bpf/20200224145644.211208533@linutronix.de
Diffstat (limited to 'kernel/bpf/syscall.c')
0 files changed, 0 insertions, 0 deletions