On 28/04/2025 14:15, Christian König wrote:
On 4/24/25 09:07, Tvrtko Ursulin wrote:
On 23/04/2025 14:12, Christian König wrote:
On 4/18/25 18:42, Tvrtko Ursulin wrote:
Hi all,
Recently I mentioned to Danilo about some fence lifetime issues so here is a
rough series, more than anything intended to start the discussion.
Most of the problem statement can be found in the first patch but to briefly
summarise - because sched fence can outlive the scheduler, we can trivially
engineer an use after free with xe and possibly other drivers. All that is
needed is to convert a syncobj into a sync file behind drivers back, and I don't
see what the driver can do about it.
Yeah that topic again :) The problem here is that this is not a bug, it is a
feature!
IIRC it was Alex who pointed that issue out on the very first fence patch set,
and we already discussed what to do back then.
The problem with grabbing module references for fences is that you get
trivially into circle references and so basically always preventing the module
from unloading.
Where "always" is only "while there are active objects from that module", no?
The problem is that dma_fences stay around after they are signaled. And
basically all drivers keep some dma_fence around for their resource management.
E.g. amdgpu for the VMIDs.
This means that some dma_fence is referenced by the module and the module
referenced by some dma_fence. E.g. you are never able to unload the module.
Are you thinking truly never or for as long someone has a reference?
For example while userspace has a reference to dma_fence via sync_file
fence owning module would not unloadable. One would have to terminate
the process, which granted wouldn't be easy to see which process
prevents the unload, before driver could be unloaded.
For the foreign fences kept around in kernel space, that would be
solvable by some periodic house keeping at worst.
Also, about the use cases for module unload. Since you and Brost
especially seem to be expressing a hard no to module references, what
are the use cases you are concerned about?
The decision was made to postpone this and live with the potential use after
free on module unload until somebody has time to fix it. Well that was +10
years ago :)
I discussed this with Sima again last year and we came to the conclusion that
the easiest way forward would be to decouple the dma_fence implementation from
the driver or component issuing the fence.
I then came up with the following steps to allow this:
1. Decouple the lock used for protecting the dma_fence callback list from the
caller.
2. Stop calling enable_signaling with the lock held.
3. Nuke all those kmem_cache implementations and force drivers to always
allocate fences using kvmalloc().
4. Nuke the release callback (or maybe move it directly after signaling) and set
fence->ops to NULL after signaling the fence.
I already send patches out for #1 and #2, but don't have enough time to
actually finish the work.
If you want take a look at nuking all those kmem_cache implementations for
allocating the fence memory. I think that can be completed completely separate
to everything else.
So enabling dma fence "revoke" so to say.
Just to check we are on the same page, it is not just about the module
references, but also use after frees which can happen even if module is still
loaded but any memory reachable via dma fence entry points has been freed.
Yeah, that came much later when people started to use the scheduler
dynamically. Basically the sched pointer in the drm_sched_fence implementation
becomes invalid as soon as the fence signals.
In that case, as Matt has already asked, if you could dig up your unfinished
work it would be interesting to see.
This is what I already send out:
https://gitlab.freedesktop.org/ckoenig/linux-drm/-/commits/dma-fence-rework-enable-signaling
A bunch of the cleanup patches in that branch have already been applied, only
the last one is missing IIRC.
And here is a WIP patch to decouple the lock I wrote halve a year ago or so:
https://gitlab.freedesktop.org/ckoenig/linux-drm/-/commits/dma-fence-rework-locking
Thanks!
My concern here is that to me it appears the whole premise is to leave
fences dangling in memory and somehow make them safe to be accessed by
importers.
For starters this can create permanent memory leaks. Or at least for the
same window of duration as would the exporters be not unloadable with
the reference counting alternative. So we would not a strong argument
for why poorly bound memory leaks are better than poorly bound
unloadable modules.
It is also a question how to "revoke" fences safely (race free). It
sounds hard to me. It does not seem you got to this last problem in the
above branches so I don't know if you had some elegant ideas for that.
Maybe first to ask if anyone is aware of a precedent where something in
the kernel already uses this design pattern?
Regards,
Tvrtko