Message ID | 20240324101533.3271056-1-cascardo@igalia.com |
---|---|
State | New |
Headers | show |
Series | dma-buf/sw_sync: Add a reference when adding fence to timeline list | expand |
On 24/03/2024 10:15, Thadeu Lima de Souza Cascardo wrote: > commit e531fdb5cd5e ("dma-buf/sw_sync: Avoid recursive lock during fence > signal") fixed a recursive locking when a signal callback released a fence. > It did it by taking an extra reference while traversing it on the list and > holding the timeline lock. > > However, this is racy and may end up adding to a kref that is 0, triggering > a well deserved warning, as later that reference would be put again. > > CPU 0 CPU 1 > sync_file_release sync_timeline_signal > dma_fence_put > timeline_fence_release > spin_lock_irq(&obj->lock) > dma_fence_get(&pt->base) > spin_lock_irqsave(fence->lock, flags) > > As shown above, it is possible for the last reference to be dropped, but > sync_timeline_signal take the lock before timeline_fence_release, which > will lead to a 0->1 kref transition, which is not allowed. > > This is because there is still a pointer to the fence object in the list, > which should be accounted as a reference. > > In previous discussions about this [3], it was called out that keeping such > a reference was not a good idea because the fence also holds a reference to > the timeline, hence leading to a loop. However, accounting for that > reference doesn't change that the loop already exists. And userspace holds > references in the form of file descriptors, so it is still possible to > avoid potential memory leaks. > > This fix also avoids other issues. The nested locking is still possible to > trigger when closing the timeline, as sw_sync_debugfs_release also calls > dma_fence_signal_locked while holding the lock. By holding a reference and > releasing it only after doing the signal, that nested locking is avoided. > > There are a few quirks about the reference counting here, though. > > In the simple case when sync_pt_create adds a new fence to the list, it > returns with 2 references instead of 1. That is dealt with as > sw_sync_ioctl_create_fence always puts a reference after calling > sync_file_create. That is necessary for multiple reasons. > > One is that it takes care of the error case when sync_file_create fails. > > The extra reference is put, while the fence is still held on the list, so > its last reference will be put when it is removed from the list either in > sync_timeline_signal or sw_sync_debugfs_release. So any fences where sync_file_create failed linger around until sw_sync_debugfs_release? Okay-ish I guess since it is a pathological case. > It also avoids the race when a signal may come in between sync_pt_create > and sync_file_create as the lock is dropped. If that happens, the fence > will be removed from the list, but a reference will still be kept as > sync_file_create takes a reference. > > Then, there is the case when a fence with the given seqno already exists. > sync_pt_create returns with an extra reference to it, that we later put. > Similar reasoning can be applied here. That one extra reference is > necessary to avoid a race with signaling (and release), and we later put > that extra reference. > > Finally, there is the case when the fence is already signaled and not added > to the list. In such case, sync_pt_create must return with a single > reference as this fence has not been added to the timeline list. It will > either be freed in case sync_file_create fails or the file will keep its > reference, which is later put when the file is released. > > This is based on Chris Wilson attempt [2] to fix recursive locking during > timeline signal. Hence, their signoff. > > Link: https://lore.kernel.org/all/20200714154102.450826-1-bas@basnieuwenhuizen.nl/ [1] > Link: https://lore.kernel.org/all/20200715100432.13928-2-chris@chris-wilson.co.uk/ [2] > Link: https://lore.kernel.org/all/20230817213729.110087-1-robdclark@gmail.com/T/ [3] > Fixes: e531fdb5cd5e ("dma-buf/sw_sync: Avoid recursive lock during fence signal") > Signed-off-by: Chris Wilson <chris@chris-wilson.co.uk> > Signed-off-by: Thadeu Lima de Souza Cascardo <cascardo@igalia.com> > Cc: Chris Wilson <chris@chris-wilson.co.uk> > Cc: Bas Nieuwenhuizen <bas@basnieuwenhuizen.nl> > Cc: Rob Clark <robdclark@chromium.org> > --- > drivers/dma-buf/sw_sync.c | 42 ++++++++++++++++----------------------- > 1 file changed, 17 insertions(+), 25 deletions(-) > > diff --git a/drivers/dma-buf/sw_sync.c b/drivers/dma-buf/sw_sync.c > index c353029789cf..83b624ac4faa 100644 > --- a/drivers/dma-buf/sw_sync.c > +++ b/drivers/dma-buf/sw_sync.c > @@ -151,16 +151,7 @@ static const char *timeline_fence_get_timeline_name(struct dma_fence *fence) > > static void timeline_fence_release(struct dma_fence *fence) > { > - struct sync_pt *pt = dma_fence_to_sync_pt(fence); > struct sync_timeline *parent = dma_fence_parent(fence); > - unsigned long flags; > - > - spin_lock_irqsave(fence->lock, flags); > - if (!list_empty(&pt->link)) { > - list_del(&pt->link); > - rb_erase(&pt->node, &parent->pt_tree); > - } > - spin_unlock_irqrestore(fence->lock, flags); > > sync_timeline_put(parent); > dma_fence_free(fence); > @@ -229,7 +220,6 @@ static const struct dma_fence_ops timeline_fence_ops = { > */ > static void sync_timeline_signal(struct sync_timeline *obj, unsigned int inc) > { > - LIST_HEAD(signalled); > struct sync_pt *pt, *next; > > trace_sync_timeline(obj); > @@ -242,20 +232,14 @@ static void sync_timeline_signal(struct sync_timeline *obj, unsigned int inc) > if (!timeline_fence_signaled(&pt->base)) > break; > > - dma_fence_get(&pt->base); > - > - list_move_tail(&pt->link, &signalled); > + list_del(&pt->link); > rb_erase(&pt->node, &obj->pt_tree); > > dma_fence_signal_locked(&pt->base); > + dma_fence_put(&pt->base); > } > > spin_unlock_irq(&obj->lock); > - > - list_for_each_entry_safe(pt, next, &signalled, link) { > - list_del_init(&pt->link); > - dma_fence_put(&pt->base); > - } > } > > /** > @@ -299,13 +283,11 @@ static struct sync_pt *sync_pt_create(struct sync_timeline *obj, > } else if (cmp < 0) { > p = &parent->rb_left; > } else { > - if (dma_fence_get_rcu(&other->base)) { > - sync_timeline_put(obj); > - kfree(pt); > - pt = other; > - goto unlock; > - } > - p = &parent->rb_left; > + /* This is later put in sw_sync_ioctl_create_fence. */ > + dma_fence_get(&other->base); > + dma_fence_put(&pt->base); Couldn't this have stayed a direct kfree given pt is not exposed to anywhere at this point, nor it will be? I know there would need to be an explicit sync_timeline_put(obj) too, as before, but perhaps that would read more obvious. > + pt = other; > + goto unlock; > } > } > rb_link_node(&pt->node, parent, p); > @@ -314,6 +296,8 @@ static struct sync_pt *sync_pt_create(struct sync_timeline *obj, > parent = rb_next(&pt->node); > list_add_tail(&pt->link, > parent ? &rb_entry(parent, typeof(*pt), node)->link : &obj->pt_list); > + /* Adding to the list requires a reference. */ > + dma_fence_get(&pt->base); > } > unlock: > spin_unlock_irq(&obj->lock); > @@ -354,6 +338,7 @@ static int sw_sync_debugfs_release(struct inode *inode, struct file *file) > list_for_each_entry_safe(pt, next, &obj->pt_list, link) { > dma_fence_set_error(&pt->base, -ENOENT); > dma_fence_signal_locked(&pt->base); > + dma_fence_put(&pt->base); Can't this be dropping one reference too many? There is one reference for being on the list, and one for the owning file. Or there is another one? If there isn't, dma_fence_signal_locked will drop the one for being on the list, and then we drop one more here. Is it the last one? Shouldn't sync_file_release still own one? Regards, Tvrtko > } > > spin_unlock_irq(&obj->lock); > @@ -386,7 +371,14 @@ static long sw_sync_ioctl_create_fence(struct sync_timeline *obj, > } > > sync_file = sync_file_create(&pt->base); > + > + /* > + * Puts the extra reference returned by sync_pt_create. This is necessary > + * to avoid a race where the fence is signaled, removed from the list and > + * released right after sync_pt_create releases the lock and returns. > + */ > dma_fence_put(&pt->base); > + > if (!sync_file) { > err = -ENOMEM; > goto err;
On Fri, Jun 14, 2024 at 11:52:03AM +0100, Tvrtko Ursulin wrote: > > On 24/03/2024 10:15, Thadeu Lima de Souza Cascardo wrote: > > commit e531fdb5cd5e ("dma-buf/sw_sync: Avoid recursive lock during fence > > signal") fixed a recursive locking when a signal callback released a fence. > > It did it by taking an extra reference while traversing it on the list and > > holding the timeline lock. > > > > However, this is racy and may end up adding to a kref that is 0, triggering > > a well deserved warning, as later that reference would be put again. > > > > CPU 0 CPU 1 > > sync_file_release sync_timeline_signal > > dma_fence_put > > timeline_fence_release > > spin_lock_irq(&obj->lock) > > dma_fence_get(&pt->base) > > spin_lock_irqsave(fence->lock, flags) > > > > As shown above, it is possible for the last reference to be dropped, but > > sync_timeline_signal take the lock before timeline_fence_release, which > > will lead to a 0->1 kref transition, which is not allowed. > > > > This is because there is still a pointer to the fence object in the list, > > which should be accounted as a reference. > > > > In previous discussions about this [3], it was called out that keeping such > > a reference was not a good idea because the fence also holds a reference to > > the timeline, hence leading to a loop. However, accounting for that > > reference doesn't change that the loop already exists. And userspace holds > > references in the form of file descriptors, so it is still possible to > > avoid potential memory leaks. > > > > This fix also avoids other issues. The nested locking is still possible to > > trigger when closing the timeline, as sw_sync_debugfs_release also calls > > dma_fence_signal_locked while holding the lock. By holding a reference and > > releasing it only after doing the signal, that nested locking is avoided. > > > > There are a few quirks about the reference counting here, though. > > > > In the simple case when sync_pt_create adds a new fence to the list, it > > returns with 2 references instead of 1. That is dealt with as > > sw_sync_ioctl_create_fence always puts a reference after calling > > sync_file_create. That is necessary for multiple reasons. > > > > One is that it takes care of the error case when sync_file_create fails. > > > > The extra reference is put, while the fence is still held on the list, so > > its last reference will be put when it is removed from the list either in > > sync_timeline_signal or sw_sync_debugfs_release. > > So any fences where sync_file_create failed linger around until > sw_sync_debugfs_release? Okay-ish I guess since it is a pathological case. > The challenge here is to determine which one of the multiple cases we are dealing with. Since we don't hold the lock while sync_file_create is called, we are left with this situation. An alternative would be to fold sync_pt_create into sw_sync_ioctl_create_fence, so at least we can determine which case is which. That would also fix the case where we handle userspace a file descriptor with a fence that is not even on the list. > > It also avoids the race when a signal may come in between sync_pt_create > > and sync_file_create as the lock is dropped. If that happens, the fence > > will be removed from the list, but a reference will still be kept as > > sync_file_create takes a reference. > > > > Then, there is the case when a fence with the given seqno already exists. > > sync_pt_create returns with an extra reference to it, that we later put. > > Similar reasoning can be applied here. That one extra reference is > > necessary to avoid a race with signaling (and release), and we later put > > that extra reference. > > > > Finally, there is the case when the fence is already signaled and not added > > to the list. In such case, sync_pt_create must return with a single > > reference as this fence has not been added to the timeline list. It will > > either be freed in case sync_file_create fails or the file will keep its > > reference, which is later put when the file is released. > > > > This is based on Chris Wilson attempt [2] to fix recursive locking during > > timeline signal. Hence, their signoff. > > > > Link: https://lore.kernel.org/all/20200714154102.450826-1-bas@basnieuwenhuizen.nl/ [1] > > Link: https://lore.kernel.org/all/20200715100432.13928-2-chris@chris-wilson.co.uk/ [2] > > Link: https://lore.kernel.org/all/20230817213729.110087-1-robdclark@gmail.com/T/ [3] > > Fixes: e531fdb5cd5e ("dma-buf/sw_sync: Avoid recursive lock during fence signal") > > Signed-off-by: Chris Wilson <chris@chris-wilson.co.uk> > > Signed-off-by: Thadeu Lima de Souza Cascardo <cascardo@igalia.com> > > Cc: Chris Wilson <chris@chris-wilson.co.uk> > > Cc: Bas Nieuwenhuizen <bas@basnieuwenhuizen.nl> > > Cc: Rob Clark <robdclark@chromium.org> > > --- > > drivers/dma-buf/sw_sync.c | 42 ++++++++++++++++----------------------- > > 1 file changed, 17 insertions(+), 25 deletions(-) > > > > diff --git a/drivers/dma-buf/sw_sync.c b/drivers/dma-buf/sw_sync.c > > index c353029789cf..83b624ac4faa 100644 > > --- a/drivers/dma-buf/sw_sync.c > > +++ b/drivers/dma-buf/sw_sync.c > > @@ -151,16 +151,7 @@ static const char *timeline_fence_get_timeline_name(struct dma_fence *fence) > > static void timeline_fence_release(struct dma_fence *fence) > > { > > - struct sync_pt *pt = dma_fence_to_sync_pt(fence); > > struct sync_timeline *parent = dma_fence_parent(fence); > > - unsigned long flags; > > - > > - spin_lock_irqsave(fence->lock, flags); > > - if (!list_empty(&pt->link)) { > > - list_del(&pt->link); > > - rb_erase(&pt->node, &parent->pt_tree); > > - } > > - spin_unlock_irqrestore(fence->lock, flags); > > sync_timeline_put(parent); > > dma_fence_free(fence); > > @@ -229,7 +220,6 @@ static const struct dma_fence_ops timeline_fence_ops = { > > */ > > static void sync_timeline_signal(struct sync_timeline *obj, unsigned int inc) > > { > > - LIST_HEAD(signalled); > > struct sync_pt *pt, *next; > > trace_sync_timeline(obj); > > @@ -242,20 +232,14 @@ static void sync_timeline_signal(struct sync_timeline *obj, unsigned int inc) > > if (!timeline_fence_signaled(&pt->base)) > > break; > > - dma_fence_get(&pt->base); > > - > > - list_move_tail(&pt->link, &signalled); > > + list_del(&pt->link); > > rb_erase(&pt->node, &obj->pt_tree); > > dma_fence_signal_locked(&pt->base); > > + dma_fence_put(&pt->base); > > } > > spin_unlock_irq(&obj->lock); > > - > > - list_for_each_entry_safe(pt, next, &signalled, link) { > > - list_del_init(&pt->link); > > - dma_fence_put(&pt->base); > > - } > > } > > /** > > @@ -299,13 +283,11 @@ static struct sync_pt *sync_pt_create(struct sync_timeline *obj, > > } else if (cmp < 0) { > > p = &parent->rb_left; > > } else { > > - if (dma_fence_get_rcu(&other->base)) { > > - sync_timeline_put(obj); > > - kfree(pt); > > - pt = other; > > - goto unlock; > > - } > > - p = &parent->rb_left; > > + /* This is later put in sw_sync_ioctl_create_fence. */ > > + dma_fence_get(&other->base); > > + dma_fence_put(&pt->base); > > Couldn't this have stayed a direct kfree given pt is not exposed to anywhere > at this point, nor it will be? I know there would need to be an explicit > sync_timeline_put(obj) too, as before, but perhaps that would read more > obvious. > Maybe this is a matter of opinion. I find it easier to read dma_fence_put instead of doing what I just did which was checking that sync_timeline_put and kfree was all left to do. And then I notice there is also tracing involved in that path. Do we care about tracing such a case? Or do we want it explicitly not traced? I would rather keep it as dma_fence_put. > > + pt = other; > > + goto unlock; > > } > > } > > rb_link_node(&pt->node, parent, p); > > @@ -314,6 +296,8 @@ static struct sync_pt *sync_pt_create(struct sync_timeline *obj, > > parent = rb_next(&pt->node); > > list_add_tail(&pt->link, > > parent ? &rb_entry(parent, typeof(*pt), node)->link : &obj->pt_list); > > + /* Adding to the list requires a reference. */ > > + dma_fence_get(&pt->base); > > } > > unlock: > > spin_unlock_irq(&obj->lock); > > @@ -354,6 +338,7 @@ static int sw_sync_debugfs_release(struct inode *inode, struct file *file) > > list_for_each_entry_safe(pt, next, &obj->pt_list, link) { > > dma_fence_set_error(&pt->base, -ENOENT); > > dma_fence_signal_locked(&pt->base); > > + dma_fence_put(&pt->base); > > Can't this be dropping one reference too many? > > There is one reference for being on the list, and one for the owning file. > Or there is another one? > > If there isn't, dma_fence_signal_locked will drop the one for being on the > list, and then we drop one more here. Is it the last one? Shouldn't > sync_file_release still own one? Does dma_fence_signal_locked drop a reference? A callback may drop a reference because it was necessarily taken, but then it is an extra reference. We are dropping this one here because we are done with the list. We are not actually removing things from the list because it cannot be referenced anymore, sw_sync is being released. Now, I may not remember some of the details, and this might be related to the circular references that is discussed in the commit message, but let's assume that we still have an opened fd sync_file reference to this fence. The only thing touching the list left is sync_timeline_signal, which is called by an ioctl on the timeline fd which is not available anymore. We can explicitly remove things from the list here and be on the safer side. The issue exists already, it is just not possible to trigger it with the current code. I am not sure how easy it is to provide a different version that fixes both the "useless fence on pt_list to which userspace has no fd" and "fence fd that can never be signaled as it is not on the list because it was already signaled". Perhaps this last one can be "fixed" with setting the signaled bit on the fence, but I have the impression this is already done. So, perhaps, not much worth doing it? Thanks a lot. Cascardo. PS: After a quick revisit here, we can easily fix the case when the fence is not added to the list: return NULL (or rather, change it to an ERR_PTR) when the fence is already signaled. Any preference for an error code here? -EEXIST, perhaps? As for the case where sync_file_create or copy_to_user fails and the fence is left on the list, this wouldn't be different from creating the fence and closing the file descriptor. The fence would still be left there until it is either signaled or the timeline is released. > > Regards, > > Tvrtko > > > } > > spin_unlock_irq(&obj->lock); > > @@ -386,7 +371,14 @@ static long sw_sync_ioctl_create_fence(struct sync_timeline *obj, > > } > > sync_file = sync_file_create(&pt->base); > > + > > + /* > > + * Puts the extra reference returned by sync_pt_create. This is necessary > > + * to avoid a race where the fence is signaled, removed from the list and > > + * released right after sync_pt_create releases the lock and returns. > > + */ > > dma_fence_put(&pt->base); > > + > > if (!sync_file) { > > err = -ENOMEM; > > goto err;
On 14/06/2024 19:00, Thadeu Lima de Souza Cascardo wrote: > On Fri, Jun 14, 2024 at 11:52:03AM +0100, Tvrtko Ursulin wrote: >> >> On 24/03/2024 10:15, Thadeu Lima de Souza Cascardo wrote: >>> commit e531fdb5cd5e ("dma-buf/sw_sync: Avoid recursive lock during fence >>> signal") fixed a recursive locking when a signal callback released a fence. >>> It did it by taking an extra reference while traversing it on the list and >>> holding the timeline lock. >>> >>> However, this is racy and may end up adding to a kref that is 0, triggering >>> a well deserved warning, as later that reference would be put again. >>> >>> CPU 0 CPU 1 >>> sync_file_release sync_timeline_signal >>> dma_fence_put >>> timeline_fence_release >>> spin_lock_irq(&obj->lock) >>> dma_fence_get(&pt->base) >>> spin_lock_irqsave(fence->lock, flags) >>> >>> As shown above, it is possible for the last reference to be dropped, but >>> sync_timeline_signal take the lock before timeline_fence_release, which >>> will lead to a 0->1 kref transition, which is not allowed. >>> >>> This is because there is still a pointer to the fence object in the list, >>> which should be accounted as a reference. >>> >>> In previous discussions about this [3], it was called out that keeping such >>> a reference was not a good idea because the fence also holds a reference to >>> the timeline, hence leading to a loop. However, accounting for that >>> reference doesn't change that the loop already exists. And userspace holds >>> references in the form of file descriptors, so it is still possible to >>> avoid potential memory leaks. >>> >>> This fix also avoids other issues. The nested locking is still possible to >>> trigger when closing the timeline, as sw_sync_debugfs_release also calls >>> dma_fence_signal_locked while holding the lock. By holding a reference and >>> releasing it only after doing the signal, that nested locking is avoided. >>> >>> There are a few quirks about the reference counting here, though. >>> >>> In the simple case when sync_pt_create adds a new fence to the list, it >>> returns with 2 references instead of 1. That is dealt with as >>> sw_sync_ioctl_create_fence always puts a reference after calling >>> sync_file_create. That is necessary for multiple reasons. >>> >>> One is that it takes care of the error case when sync_file_create fails. >>> >>> The extra reference is put, while the fence is still held on the list, so >>> its last reference will be put when it is removed from the list either in >>> sync_timeline_signal or sw_sync_debugfs_release. >> >> So any fences where sync_file_create failed linger around until >> sw_sync_debugfs_release? Okay-ish I guess since it is a pathological case. >> > > The challenge here is to determine which one of the multiple cases we are > dealing with. Since we don't hold the lock while sync_file_create is > called, we are left with this situation. An alternative would be to fold > sync_pt_create into sw_sync_ioctl_create_fence, so at least we can > determine which case is which. That would also fix the case where we handle > userspace a file descriptor with a fence that is not even on the list. Since sync_pt_create is local and has only this single caller it could be worth exploring this option to see if it could simplify things and get rid of this lingering objects corner case. >>> It also avoids the race when a signal may come in between sync_pt_create >>> and sync_file_create as the lock is dropped. If that happens, the fence >>> will be removed from the list, but a reference will still be kept as >>> sync_file_create takes a reference. >>> >>> Then, there is the case when a fence with the given seqno already exists. >>> sync_pt_create returns with an extra reference to it, that we later put. >>> Similar reasoning can be applied here. That one extra reference is >>> necessary to avoid a race with signaling (and release), and we later put >>> that extra reference. >>> >>> Finally, there is the case when the fence is already signaled and not added >>> to the list. In such case, sync_pt_create must return with a single >>> reference as this fence has not been added to the timeline list. It will >>> either be freed in case sync_file_create fails or the file will keep its >>> reference, which is later put when the file is released. >>> >>> This is based on Chris Wilson attempt [2] to fix recursive locking during >>> timeline signal. Hence, their signoff. >>> >>> Link: https://lore.kernel.org/all/20200714154102.450826-1-bas@basnieuwenhuizen.nl/ [1] >>> Link: https://lore.kernel.org/all/20200715100432.13928-2-chris@chris-wilson.co.uk/ [2] >>> Link: https://lore.kernel.org/all/20230817213729.110087-1-robdclark@gmail.com/T/ [3] >>> Fixes: e531fdb5cd5e ("dma-buf/sw_sync: Avoid recursive lock during fence signal") >>> Signed-off-by: Chris Wilson <chris@chris-wilson.co.uk> >>> Signed-off-by: Thadeu Lima de Souza Cascardo <cascardo@igalia.com> >>> Cc: Chris Wilson <chris@chris-wilson.co.uk> >>> Cc: Bas Nieuwenhuizen <bas@basnieuwenhuizen.nl> >>> Cc: Rob Clark <robdclark@chromium.org> >>> --- >>> drivers/dma-buf/sw_sync.c | 42 ++++++++++++++++----------------------- >>> 1 file changed, 17 insertions(+), 25 deletions(-) >>> >>> diff --git a/drivers/dma-buf/sw_sync.c b/drivers/dma-buf/sw_sync.c >>> index c353029789cf..83b624ac4faa 100644 >>> --- a/drivers/dma-buf/sw_sync.c >>> +++ b/drivers/dma-buf/sw_sync.c >>> @@ -151,16 +151,7 @@ static const char *timeline_fence_get_timeline_name(struct dma_fence *fence) >>> static void timeline_fence_release(struct dma_fence *fence) >>> { >>> - struct sync_pt *pt = dma_fence_to_sync_pt(fence); >>> struct sync_timeline *parent = dma_fence_parent(fence); >>> - unsigned long flags; >>> - >>> - spin_lock_irqsave(fence->lock, flags); >>> - if (!list_empty(&pt->link)) { >>> - list_del(&pt->link); >>> - rb_erase(&pt->node, &parent->pt_tree); >>> - } >>> - spin_unlock_irqrestore(fence->lock, flags); >>> sync_timeline_put(parent); >>> dma_fence_free(fence); >>> @@ -229,7 +220,6 @@ static const struct dma_fence_ops timeline_fence_ops = { >>> */ >>> static void sync_timeline_signal(struct sync_timeline *obj, unsigned int inc) >>> { >>> - LIST_HEAD(signalled); >>> struct sync_pt *pt, *next; >>> trace_sync_timeline(obj); >>> @@ -242,20 +232,14 @@ static void sync_timeline_signal(struct sync_timeline *obj, unsigned int inc) >>> if (!timeline_fence_signaled(&pt->base)) >>> break; >>> - dma_fence_get(&pt->base); >>> - >>> - list_move_tail(&pt->link, &signalled); >>> + list_del(&pt->link); >>> rb_erase(&pt->node, &obj->pt_tree); >>> dma_fence_signal_locked(&pt->base); >>> + dma_fence_put(&pt->base); >>> } >>> spin_unlock_irq(&obj->lock); >>> - >>> - list_for_each_entry_safe(pt, next, &signalled, link) { >>> - list_del_init(&pt->link); >>> - dma_fence_put(&pt->base); >>> - } >>> } >>> /** >>> @@ -299,13 +283,11 @@ static struct sync_pt *sync_pt_create(struct sync_timeline *obj, >>> } else if (cmp < 0) { >>> p = &parent->rb_left; >>> } else { >>> - if (dma_fence_get_rcu(&other->base)) { >>> - sync_timeline_put(obj); >>> - kfree(pt); >>> - pt = other; >>> - goto unlock; >>> - } >>> - p = &parent->rb_left; >>> + /* This is later put in sw_sync_ioctl_create_fence. */ >>> + dma_fence_get(&other->base); >>> + dma_fence_put(&pt->base); >> >> Couldn't this have stayed a direct kfree given pt is not exposed to anywhere >> at this point, nor it will be? I know there would need to be an explicit >> sync_timeline_put(obj) too, as before, but perhaps that would read more >> obvious. >> > > Maybe this is a matter of opinion. I find it easier to read dma_fence_put > instead of doing what I just did which was checking that sync_timeline_put > and kfree was all left to do. And then I notice there is also tracing > involved in that path. Do we care about tracing such a case? Or do we want > it explicitly not traced? I would rather keep it as dma_fence_put. Could be a matter of opinion yeah. >>> + pt = other; >>> + goto unlock; >>> } >>> } >>> rb_link_node(&pt->node, parent, p); >>> @@ -314,6 +296,8 @@ static struct sync_pt *sync_pt_create(struct sync_timeline *obj, >>> parent = rb_next(&pt->node); >>> list_add_tail(&pt->link, >>> parent ? &rb_entry(parent, typeof(*pt), node)->link : &obj->pt_list); >>> + /* Adding to the list requires a reference. */ >>> + dma_fence_get(&pt->base); >>> } >>> unlock: >>> spin_unlock_irq(&obj->lock); >>> @@ -354,6 +338,7 @@ static int sw_sync_debugfs_release(struct inode *inode, struct file *file) >>> list_for_each_entry_safe(pt, next, &obj->pt_list, link) { >>> dma_fence_set_error(&pt->base, -ENOENT); >>> dma_fence_signal_locked(&pt->base); >>> + dma_fence_put(&pt->base); >> >> Can't this be dropping one reference too many? >> >> There is one reference for being on the list, and one for the owning file. >> Or there is another one? >> >> If there isn't, dma_fence_signal_locked will drop the one for being on the >> list, and then we drop one more here. Is it the last one? Shouldn't >> sync_file_release still own one? > > Does dma_fence_signal_locked drop a reference? A callback may drop a Is this a question or a suggestive? I mean doesn't it? After this patch sync_timeline_signal() becomes: ... list_for_each_entry_safe(pt, next, &obj->pt_list, link) { if (!timeline_fence_signaled(&pt->base)) break; list_del(&pt->link); rb_erase(&pt->node, &obj->pt_tree); dma_fence_signal_locked(&pt->base); dma_fence_put(&pt->base); --*******--> -1 } ... So this drops the "on the list reference" and then closing of the sw_sync_debugfs closes the other: sw_sync_debugfs_release() ... list_for_each_entry_safe(pt, next, &obj->pt_list, link) { dma_fence_set_error(&pt->base, -ENOENT); dma_fence_signal_locked(&pt->base); dma_fence_put(&pt->base); ---*******--> -2 At which point two references are dropped. What becomes of the reference which is associated with the sync fence fd itself? I mean when userspace closes that fd and sync_file_release runs, will the dma_fence_put in there be one too many? I am easily missing something is my disclaimer. It should be easily testable from an IGT and remove any doubt. Create some fences, close the sw_sync timeline, then close individual fences. Kref debug aids should tell us if there was one reference dropped too many. > reference because it was necessarily taken, but then it is an extra > reference. We are dropping this one here because we are done with the list. > We are not actually removing things from the list because it cannot be > referenced anymore, sw_sync is being released. > > Now, I may not remember some of the details, and this might be related to > the circular references that is discussed in the commit message, but let's > assume that we still have an opened fd sync_file reference to this fence. > The only thing touching the list left is sync_timeline_signal, which is > called by an ioctl on the timeline fd which is not available anymore. We > can explicitly remove things from the list here and be on the safer side. > The issue exists already, it is just not possible to trigger it with the > current code. > > I am not sure how easy it is to provide a different version that fixes both > the "useless fence on pt_list to which userspace has no fd" and "fence fd > that can never be signaled as it is not on the list because it was already > signaled". Perhaps this last one can be "fixed" with setting the signaled > bit on the fence, but I have the impression this is already done. So, > perhaps, not much worth doing it? > > Thanks a lot. > Cascardo. > > PS: > > After a quick revisit here, we can easily fix the case when the fence is > not added to the list: return NULL (or rather, change it to an ERR_PTR) > when the fence is already signaled. Any preference for an error code here? > -EEXIST, perhaps? I'll postpone thinking about this until I understand the main question from above. Regards, Tvrtko > As for the case where sync_file_create or copy_to_user fails and the fence > is left on the list, this wouldn't be different from creating the fence and > closing the file descriptor. The fence would still be left there until it > is either signaled or the timeline is released. > > >> >> Regards, >> >> Tvrtko >> >>> } >>> spin_unlock_irq(&obj->lock); >>> @@ -386,7 +371,14 @@ static long sw_sync_ioctl_create_fence(struct sync_timeline *obj, >>> } >>> sync_file = sync_file_create(&pt->base); >>> + >>> + /* >>> + * Puts the extra reference returned by sync_pt_create. This is necessary >>> + * to avoid a race where the fence is signaled, removed from the list and >>> + * released right after sync_pt_create releases the lock and returns. >>> + */ >>> dma_fence_put(&pt->base); >>> + >>> if (!sync_file) { >>> err = -ENOMEM; >>> goto err; >
On Wed, Jun 19, 2024 at 01:14:38PM +0100, Tvrtko Ursulin wrote: > > On 14/06/2024 19:00, Thadeu Lima de Souza Cascardo wrote: > > On Fri, Jun 14, 2024 at 11:52:03AM +0100, Tvrtko Ursulin wrote: > > > > > > On 24/03/2024 10:15, Thadeu Lima de Souza Cascardo wrote: > > > > commit e531fdb5cd5e ("dma-buf/sw_sync: Avoid recursive lock during fence > > > > signal") fixed a recursive locking when a signal callback released a fence. > > > > It did it by taking an extra reference while traversing it on the list and > > > > holding the timeline lock. > > > > > > > > However, this is racy and may end up adding to a kref that is 0, triggering > > > > a well deserved warning, as later that reference would be put again. > > > > > > > > CPU 0 CPU 1 > > > > sync_file_release sync_timeline_signal > > > > dma_fence_put > > > > timeline_fence_release > > > > spin_lock_irq(&obj->lock) > > > > dma_fence_get(&pt->base) > > > > spin_lock_irqsave(fence->lock, flags) > > > > > > > > As shown above, it is possible for the last reference to be dropped, but > > > > sync_timeline_signal take the lock before timeline_fence_release, which > > > > will lead to a 0->1 kref transition, which is not allowed. > > > > > > > > This is because there is still a pointer to the fence object in the list, > > > > which should be accounted as a reference. > > > > > > > > In previous discussions about this [3], it was called out that keeping such > > > > a reference was not a good idea because the fence also holds a reference to > > > > the timeline, hence leading to a loop. However, accounting for that > > > > reference doesn't change that the loop already exists. And userspace holds > > > > references in the form of file descriptors, so it is still possible to > > > > avoid potential memory leaks. > > > > > > > > This fix also avoids other issues. The nested locking is still possible to > > > > trigger when closing the timeline, as sw_sync_debugfs_release also calls > > > > dma_fence_signal_locked while holding the lock. By holding a reference and > > > > releasing it only after doing the signal, that nested locking is avoided. > > > > > > > > There are a few quirks about the reference counting here, though. > > > > > > > > In the simple case when sync_pt_create adds a new fence to the list, it > > > > returns with 2 references instead of 1. That is dealt with as > > > > sw_sync_ioctl_create_fence always puts a reference after calling > > > > sync_file_create. That is necessary for multiple reasons. > > > > > > > > One is that it takes care of the error case when sync_file_create fails. > > > > > > > > The extra reference is put, while the fence is still held on the list, so > > > > its last reference will be put when it is removed from the list either in > > > > sync_timeline_signal or sw_sync_debugfs_release. > > > > > > So any fences where sync_file_create failed linger around until > > > sw_sync_debugfs_release? Okay-ish I guess since it is a pathological case. > > > > > > > The challenge here is to determine which one of the multiple cases we are > > dealing with. Since we don't hold the lock while sync_file_create is > > called, we are left with this situation. An alternative would be to fold > > sync_pt_create into sw_sync_ioctl_create_fence, so at least we can > > determine which case is which. That would also fix the case where we handle > > userspace a file descriptor with a fence that is not even on the list. > > Since sync_pt_create is local and has only this single caller it could be > worth exploring this option to see if it could simplify things and get rid > of this lingering objects corner case. > So when I went back looking into this, I actually needed to make sw_sync_ioctl_create_fence be able to allocate the sync_file without assigning a fence. That's when I realized it wouldn't buy us much as we could check for the signaled case and return NULL. Let me look at this again and get back to you. > > > > It also avoids the race when a signal may come in between sync_pt_create > > > > and sync_file_create as the lock is dropped. If that happens, the fence > > > > will be removed from the list, but a reference will still be kept as > > > > sync_file_create takes a reference. > > > > > > > > Then, there is the case when a fence with the given seqno already exists. > > > > sync_pt_create returns with an extra reference to it, that we later put. > > > > Similar reasoning can be applied here. That one extra reference is > > > > necessary to avoid a race with signaling (and release), and we later put > > > > that extra reference. > > > > > > > > Finally, there is the case when the fence is already signaled and not added > > > > to the list. In such case, sync_pt_create must return with a single > > > > reference as this fence has not been added to the timeline list. It will > > > > either be freed in case sync_file_create fails or the file will keep its > > > > reference, which is later put when the file is released. > > > > > > > > This is based on Chris Wilson attempt [2] to fix recursive locking during > > > > timeline signal. Hence, their signoff. > > > > > > > > Link: https://lore.kernel.org/all/20200714154102.450826-1-bas@basnieuwenhuizen.nl/ [1] > > > > Link: https://lore.kernel.org/all/20200715100432.13928-2-chris@chris-wilson.co.uk/ [2] > > > > Link: https://lore.kernel.org/all/20230817213729.110087-1-robdclark@gmail.com/T/ [3] > > > > Fixes: e531fdb5cd5e ("dma-buf/sw_sync: Avoid recursive lock during fence signal") > > > > Signed-off-by: Chris Wilson <chris@chris-wilson.co.uk> > > > > Signed-off-by: Thadeu Lima de Souza Cascardo <cascardo@igalia.com> > > > > Cc: Chris Wilson <chris@chris-wilson.co.uk> > > > > Cc: Bas Nieuwenhuizen <bas@basnieuwenhuizen.nl> > > > > Cc: Rob Clark <robdclark@chromium.org> > > > > --- > > > > drivers/dma-buf/sw_sync.c | 42 ++++++++++++++++----------------------- > > > > 1 file changed, 17 insertions(+), 25 deletions(-) > > > > > > > > diff --git a/drivers/dma-buf/sw_sync.c b/drivers/dma-buf/sw_sync.c > > > > index c353029789cf..83b624ac4faa 100644 > > > > --- a/drivers/dma-buf/sw_sync.c > > > > +++ b/drivers/dma-buf/sw_sync.c > > > > @@ -151,16 +151,7 @@ static const char *timeline_fence_get_timeline_name(struct dma_fence *fence) > > > > static void timeline_fence_release(struct dma_fence *fence) > > > > { > > > > - struct sync_pt *pt = dma_fence_to_sync_pt(fence); > > > > struct sync_timeline *parent = dma_fence_parent(fence); > > > > - unsigned long flags; > > > > - > > > > - spin_lock_irqsave(fence->lock, flags); > > > > - if (!list_empty(&pt->link)) { > > > > - list_del(&pt->link); > > > > - rb_erase(&pt->node, &parent->pt_tree); > > > > - } > > > > - spin_unlock_irqrestore(fence->lock, flags); > > > > sync_timeline_put(parent); > > > > dma_fence_free(fence); > > > > @@ -229,7 +220,6 @@ static const struct dma_fence_ops timeline_fence_ops = { > > > > */ > > > > static void sync_timeline_signal(struct sync_timeline *obj, unsigned int inc) > > > > { > > > > - LIST_HEAD(signalled); > > > > struct sync_pt *pt, *next; > > > > trace_sync_timeline(obj); > > > > @@ -242,20 +232,14 @@ static void sync_timeline_signal(struct sync_timeline *obj, unsigned int inc) > > > > if (!timeline_fence_signaled(&pt->base)) > > > > break; > > > > - dma_fence_get(&pt->base); > > > > - > > > > - list_move_tail(&pt->link, &signalled); > > > > + list_del(&pt->link); > > > > rb_erase(&pt->node, &obj->pt_tree); > > > > dma_fence_signal_locked(&pt->base); > > > > + dma_fence_put(&pt->base); > > > > } > > > > spin_unlock_irq(&obj->lock); > > > > - > > > > - list_for_each_entry_safe(pt, next, &signalled, link) { > > > > - list_del_init(&pt->link); > > > > - dma_fence_put(&pt->base); > > > > - } > > > > } > > > > /** > > > > @@ -299,13 +283,11 @@ static struct sync_pt *sync_pt_create(struct sync_timeline *obj, > > > > } else if (cmp < 0) { > > > > p = &parent->rb_left; > > > > } else { > > > > - if (dma_fence_get_rcu(&other->base)) { > > > > - sync_timeline_put(obj); > > > > - kfree(pt); > > > > - pt = other; > > > > - goto unlock; > > > > - } > > > > - p = &parent->rb_left; > > > > + /* This is later put in sw_sync_ioctl_create_fence. */ > > > > + dma_fence_get(&other->base); > > > > + dma_fence_put(&pt->base); > > > > > > Couldn't this have stayed a direct kfree given pt is not exposed to anywhere > > > at this point, nor it will be? I know there would need to be an explicit > > > sync_timeline_put(obj) too, as before, but perhaps that would read more > > > obvious. > > > > > > > Maybe this is a matter of opinion. I find it easier to read dma_fence_put > > instead of doing what I just did which was checking that sync_timeline_put > > and kfree was all left to do. And then I notice there is also tracing > > involved in that path. Do we care about tracing such a case? Or do we want > > it explicitly not traced? I would rather keep it as dma_fence_put. > > Could be a matter of opinion yeah. > So, dma_fence_put has the advantage of being safer in the long term as freeing the fence becomes more than what it is right now. And as I mentioned, it adds tracing to the mix. dma_fence_init was called and that called trace_dma_fence_init. It is fair that a call to trace_dma_fence_destroy is seen when this fence is gone, even if it's not even added to the list. The advantage from doing the kfree instead is that it shows that this is putting the single/last reference. We could add a comment there to make it more explicit. > > > > + pt = other; > > > > + goto unlock; > > > > } > > > > } > > > > rb_link_node(&pt->node, parent, p); > > > > @@ -314,6 +296,8 @@ static struct sync_pt *sync_pt_create(struct sync_timeline *obj, > > > > parent = rb_next(&pt->node); > > > > list_add_tail(&pt->link, > > > > parent ? &rb_entry(parent, typeof(*pt), node)->link : &obj->pt_list); > > > > + /* Adding to the list requires a reference. */ > > > > + dma_fence_get(&pt->base); > > > > } > > > > unlock: > > > > spin_unlock_irq(&obj->lock); > > > > @@ -354,6 +338,7 @@ static int sw_sync_debugfs_release(struct inode *inode, struct file *file) > > > > list_for_each_entry_safe(pt, next, &obj->pt_list, link) { > > > > dma_fence_set_error(&pt->base, -ENOENT); > > > > dma_fence_signal_locked(&pt->base); > > > > + dma_fence_put(&pt->base); > > > > > > Can't this be dropping one reference too many? > > > > > > There is one reference for being on the list, and one for the owning file. > > > Or there is another one? > > > > > > If there isn't, dma_fence_signal_locked will drop the one for being on the > > > list, and then we drop one more here. Is it the last one? Shouldn't > > > sync_file_release still own one? > > > > Does dma_fence_signal_locked drop a reference? A callback may drop a > > Is this a question or a suggestive? I mean doesn't it? After this patch > sync_timeline_signal() becomes: > Well, it was a honest question as you suggested that it does. sync_timeline_signal is not called by dma_fence_signal_locked. It is called as a result of an IOCTL on the timeline/sw_sync fd. And as can be seen below, it removes the fence from the list. So when sw_sync_debugfs_release is called later, it won't find that same fence on the list anymore. The reference to it has been removed, hence why the reference is put. So, basically: to add a reference to the list, you need to get. When removing from the list, you need to put. > ... > list_for_each_entry_safe(pt, next, &obj->pt_list, link) { > if (!timeline_fence_signaled(&pt->base)) > break; > > list_del(&pt->link); > rb_erase(&pt->node, &obj->pt_tree); > > dma_fence_signal_locked(&pt->base); > dma_fence_put(&pt->base); --*******--> -1 > } > ... > > So this drops the "on the list reference" and then closing of the > sw_sync_debugfs closes the other: > > sw_sync_debugfs_release() > ... > > list_for_each_entry_safe(pt, next, &obj->pt_list, link) { > dma_fence_set_error(&pt->base, -ENOENT); > dma_fence_signal_locked(&pt->base); > dma_fence_put(&pt->base); ---*******--> -2 > > At which point two references are dropped. What becomes of the reference > which is associated with the sync fence fd itself? I mean when userspace > closes that fd and sync_file_release runs, will the dma_fence_put in there > be one too many? > > I am easily missing something is my disclaimer. It should be easily testable > from an IGT and remove any doubt. Create some fences, close the sw_sync > timeline, then close individual fences. Kref debug aids should tell us if > there was one reference dropped too many. I will see if I can work out some extra testing with IGT. I have done a lot of ad-hoc testing as I needed to test for the multiple other issues this is fixing: under some race conditions, a use-after-free, a memory leak, a potential deadlock (or lockdep warning). Thanks again for the feedback. Cascardo. > > > reference because it was necessarily taken, but then it is an extra > > reference. We are dropping this one here because we are done with the list. > > We are not actually removing things from the list because it cannot be > > referenced anymore, sw_sync is being released. > > > > Now, I may not remember some of the details, and this might be related to > > the circular references that is discussed in the commit message, but let's > > assume that we still have an opened fd sync_file reference to this fence. > > The only thing touching the list left is sync_timeline_signal, which is > > called by an ioctl on the timeline fd which is not available anymore. We > > can explicitly remove things from the list here and be on the safer side. > > The issue exists already, it is just not possible to trigger it with the > > current code. > > > > I am not sure how easy it is to provide a different version that fixes both > > the "useless fence on pt_list to which userspace has no fd" and "fence fd > > that can never be signaled as it is not on the list because it was already > > signaled". Perhaps this last one can be "fixed" with setting the signaled > > bit on the fence, but I have the impression this is already done. So, > > perhaps, not much worth doing it? > > > > Thanks a lot. > > Cascardo. > > > > PS: > > > > After a quick revisit here, we can easily fix the case when the fence is > > not added to the list: return NULL (or rather, change it to an ERR_PTR) > > when the fence is already signaled. Any preference for an error code here? > > -EEXIST, perhaps? > > I'll postpone thinking about this until I understand the main question from > above. > > Regards, > > Tvrtko > > > As for the case where sync_file_create or copy_to_user fails and the fence > > is left on the list, this wouldn't be different from creating the fence and > > closing the file descriptor. The fence would still be left there until it > > is either signaled or the timeline is released. > > > > > > > > > > Regards, > > > > > > Tvrtko > > > > > > > } > > > > spin_unlock_irq(&obj->lock); > > > > @@ -386,7 +371,14 @@ static long sw_sync_ioctl_create_fence(struct sync_timeline *obj, > > > > } > > > > sync_file = sync_file_create(&pt->base); > > > > + > > > > + /* > > > > + * Puts the extra reference returned by sync_pt_create. This is necessary > > > > + * to avoid a race where the fence is signaled, removed from the list and > > > > + * released right after sync_pt_create releases the lock and returns. > > > > + */ > > > > dma_fence_put(&pt->base); > > > > + > > > > if (!sync_file) { > > > > err = -ENOMEM; > > > > goto err; > > >
On Thu, Jun 20, 2024 at 03:50:58PM -0300, Thadeu Lima de Souza Cascardo wrote: > On Wed, Jun 19, 2024 at 01:14:38PM +0100, Tvrtko Ursulin wrote: > > > > On 14/06/2024 19:00, Thadeu Lima de Souza Cascardo wrote: > > > On Fri, Jun 14, 2024 at 11:52:03AM +0100, Tvrtko Ursulin wrote: > > > > > > > > On 24/03/2024 10:15, Thadeu Lima de Souza Cascardo wrote: > > > > > One is that it takes care of the error case when sync_file_create fails. > > > > > > > > > > The extra reference is put, while the fence is still held on the list, so > > > > > its last reference will be put when it is removed from the list either in > > > > > sync_timeline_signal or sw_sync_debugfs_release. > > > > > > > > So any fences where sync_file_create failed linger around until > > > > sw_sync_debugfs_release? Okay-ish I guess since it is a pathological case. > > > > > > > > > > The challenge here is to determine which one of the multiple cases we are > > > dealing with. Since we don't hold the lock while sync_file_create is > > > called, we are left with this situation. An alternative would be to fold > > > sync_pt_create into sw_sync_ioctl_create_fence, so at least we can > > > determine which case is which. That would also fix the case where we handle > > > userspace a file descriptor with a fence that is not even on the list. > > > > Since sync_pt_create is local and has only this single caller it could be > > worth exploring this option to see if it could simplify things and get rid > > of this lingering objects corner case. > > > > So when I went back looking into this, I actually needed to make > sw_sync_ioctl_create_fence be able to allocate the sync_file without > assigning a fence. That's when I realized it wouldn't buy us much as we > could check for the signaled case and return NULL. Let me look at this > again and get back to you. Okay, so trying to close this subthread down: we also might fail when writing down the filedescriptor to userspace (the copy_to_user after sync_file_create). Neither of the following options appeal to me: 1) try to write to userspace before actually creating the fence, that breaks ABI. Despite the ioctl returning an error, the fd has been written to, even though it has not been installed. 2) try to rollback the insertion of the fence into the list. Imagine two threads: one tries to create fence with value A but has data RO, so fence will be created and inserted into the list, but when copy_to_user fails, it will try to rollback. second thread also tries to create fence with value A, but now data is legit. We might race with the rollback and that won't go well. Also, as I mentioned in one of the other responses, leaving the fence on the list is not different from userspace creating the fence then closing the file descriptor. That will also leave the fence on the list until it is signaled. So perhaps this is the crux of the design here. Before this patch, putting the last reference would remove it from the list. But keeping with this design leads to all sorts of issues that I mentioned. The change that I am proposing is to keep fences on the timeline until either they are signaled or the timeline is destroyed. Thoughts? Cascardo.
diff --git a/drivers/dma-buf/sw_sync.c b/drivers/dma-buf/sw_sync.c index c353029789cf..83b624ac4faa 100644 --- a/drivers/dma-buf/sw_sync.c +++ b/drivers/dma-buf/sw_sync.c @@ -151,16 +151,7 @@ static const char *timeline_fence_get_timeline_name(struct dma_fence *fence) static void timeline_fence_release(struct dma_fence *fence) { - struct sync_pt *pt = dma_fence_to_sync_pt(fence); struct sync_timeline *parent = dma_fence_parent(fence); - unsigned long flags; - - spin_lock_irqsave(fence->lock, flags); - if (!list_empty(&pt->link)) { - list_del(&pt->link); - rb_erase(&pt->node, &parent->pt_tree); - } - spin_unlock_irqrestore(fence->lock, flags); sync_timeline_put(parent); dma_fence_free(fence); @@ -229,7 +220,6 @@ static const struct dma_fence_ops timeline_fence_ops = { */ static void sync_timeline_signal(struct sync_timeline *obj, unsigned int inc) { - LIST_HEAD(signalled); struct sync_pt *pt, *next; trace_sync_timeline(obj); @@ -242,20 +232,14 @@ static void sync_timeline_signal(struct sync_timeline *obj, unsigned int inc) if (!timeline_fence_signaled(&pt->base)) break; - dma_fence_get(&pt->base); - - list_move_tail(&pt->link, &signalled); + list_del(&pt->link); rb_erase(&pt->node, &obj->pt_tree); dma_fence_signal_locked(&pt->base); + dma_fence_put(&pt->base); } spin_unlock_irq(&obj->lock); - - list_for_each_entry_safe(pt, next, &signalled, link) { - list_del_init(&pt->link); - dma_fence_put(&pt->base); - } } /** @@ -299,13 +283,11 @@ static struct sync_pt *sync_pt_create(struct sync_timeline *obj, } else if (cmp < 0) { p = &parent->rb_left; } else { - if (dma_fence_get_rcu(&other->base)) { - sync_timeline_put(obj); - kfree(pt); - pt = other; - goto unlock; - } - p = &parent->rb_left; + /* This is later put in sw_sync_ioctl_create_fence. */ + dma_fence_get(&other->base); + dma_fence_put(&pt->base); + pt = other; + goto unlock; } } rb_link_node(&pt->node, parent, p); @@ -314,6 +296,8 @@ static struct sync_pt *sync_pt_create(struct sync_timeline *obj, parent = rb_next(&pt->node); list_add_tail(&pt->link, parent ? &rb_entry(parent, typeof(*pt), node)->link : &obj->pt_list); + /* Adding to the list requires a reference. */ + dma_fence_get(&pt->base); } unlock: spin_unlock_irq(&obj->lock); @@ -354,6 +338,7 @@ static int sw_sync_debugfs_release(struct inode *inode, struct file *file) list_for_each_entry_safe(pt, next, &obj->pt_list, link) { dma_fence_set_error(&pt->base, -ENOENT); dma_fence_signal_locked(&pt->base); + dma_fence_put(&pt->base); } spin_unlock_irq(&obj->lock); @@ -386,7 +371,14 @@ static long sw_sync_ioctl_create_fence(struct sync_timeline *obj, } sync_file = sync_file_create(&pt->base); + + /* + * Puts the extra reference returned by sync_pt_create. This is necessary + * to avoid a race where the fence is signaled, removed from the list and + * released right after sync_pt_create releases the lock and returns. + */ dma_fence_put(&pt->base); + if (!sync_file) { err = -ENOMEM; goto err;