new file mode 100644
@@ -0,0 +1,29 @@
+#include <test_progs.h>
+#include <network_helpers.h>
+
+#include "timer_deadlock.skel.h"
+
+void test_timer_deadlock(void)
+{
+ LIBBPF_OPTS(bpf_test_run_opts, topts,
+ .data_in = &pkt_v4,
+ .data_size_in = sizeof(pkt_v4),
+ .repeat = 1,
+ );
+ struct timer_deadlock *skel;
+
+ /* Remove to observe deadlock */
+ test__skip();
+ return;
+
+ skel = timer_deadlock__open_and_load();
+ if (!ASSERT_OK_PTR(skel, "timer_deadlock__open_and_load"))
+ return;
+ if (!ASSERT_OK(timer_deadlock__attach(skel), "timer_deadlock__attach"))
+ goto end;
+ ASSERT_OK(bpf_prog_test_run_opts(bpf_program__fd(skel->progs.tc_prog), &topts), "test_run");
+ ASSERT_EQ(topts.retval, 0, "test_run retval");
+end:
+ timer_deadlock__destroy(skel);
+}
+
new file mode 100644
@@ -0,0 +1,50 @@
+// SPDX-License-Identifier: GPL-2.0
+#include <vmlinux.h>
+#include <bpf/bpf_tracing.h>
+#include <bpf/bpf_helpers.h>
+
+int tid = 0;
+
+struct map_value {
+ struct bpf_timer timer;
+};
+
+struct {
+ __uint(type, BPF_MAP_TYPE_ARRAY);
+ __type(key, int);
+ __type(value, struct map_value);
+ __uint(max_entries, 1);
+} array_map SEC(".maps");
+
+static int cb(struct bpf_map *map, int *key, struct map_value *val)
+{
+ return 0;
+}
+
+SEC("tc")
+int tc_prog(void *ctx)
+{
+ struct task_struct *current = bpf_get_current_task_btf();
+ struct map_value *v, val = {};
+
+ v = bpf_map_lookup_elem(&array_map, &(int){0});
+ if (!v)
+ return 0;
+ bpf_timer_init(&v->timer, &array_map, 0);
+ bpf_timer_set_callback(&v->timer, &cb);
+
+ tid = current->pid;
+ return bpf_map_update_elem(&array_map, &(int){0}, &val, 0);
+}
+
+SEC("fentry/bpf_prog_put")
+int fentry_prog(void *ctx)
+{
+ struct map_value val = {};
+
+ if (tid == bpf_get_current_task_btf()->pid)
+ bpf_map_update_elem(&array_map, &(int){0}, &val, 0);
+ return 0;
+}
+
+char _license[] SEC("license") = "GPL";
This is just an example to showcase that the deadlock can occur in practice. Run this on an unfixed kernel by uncommenting the skipping part in timer_deadlock.c Signed-off-by: Kumar Kartikeya Dwivedi <memxor@gmail.com> --- .../selftests/bpf/prog_tests/timer_deadlock.c | 29 +++++++++++ .../selftests/bpf/progs/timer_deadlock.c | 50 +++++++++++++++++++ 2 files changed, 79 insertions(+) create mode 100644 tools/testing/selftests/bpf/prog_tests/timer_deadlock.c create mode 100644 tools/testing/selftests/bpf/progs/timer_deadlock.c