Received: by 2002:a05:6358:9144:b0:117:f937:c515 with SMTP id r4csp26881rwr; Wed, 19 Apr 2023 02:56:16 -0700 (PDT) X-Google-Smtp-Source: AKy350b63EpC/lkof/ThbVV2GHvcIX2q01/xHd6eTDS1/eRssPJKWq22OAHuCkqApM+kzP+RPj1L X-Received: by 2002:a05:6a20:1612:b0:f0:f4cf:fcf0 with SMTP id l18-20020a056a20161200b000f0f4cffcf0mr3780772pzj.11.1681898176105; Wed, 19 Apr 2023 02:56:16 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1681898176; cv=none; d=google.com; s=arc-20160816; b=zos/HTC3Sl7CWOxMG258sOZlogYnHNB/xxSJfqb4zsLQKUnntejyfI5QTWg2YiivMk J1scSAu9ndaV78SMXh5O+QYVDRBNxwrusC7r/VxJnIZ1y1As6dLt6mKa/e3vuTsGuHYS EdFSqmg6A8UFs9e2zcBFvu/NEdOJ5TRE8zfgNyr6xNbqU5w3NG/+bslNXKm12wSAiOnl dQmnZJ4Z7+AYtgZY3aODQyRpem+UEWwXHE6QHJEX1gDiJE8oDr0picPKYNLtHKTXP7a2 dhgFJmnYGehqeUC7do3LC/Ngv5JE7LVb5Cby6IPRp7jJEWz/SHwmay1RJHAfWtN9/5JW VH2A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:from :references:cc:to:content-language:subject:user-agent:mime-version :date:message-id; bh=eNOI6hsdISpr/2dF3D8FZ8WRiH3/lBje+h1FGJYVCUE=; b=oVHZ0L0sispGDN5+Tu6ymnsAZcOBiHkJPxVkzSdylVDlO0ImZphYv0X9bfvfMyf5dq eWOD6vAmK9EuD0+gSwJ+bKoqX5hFZqS049nqGJUb/ZlAE6bkBI6l4HGaLK+0pB+vE2vE 7RaT0r6yWo+3YvkddrC2FRS/LcTMMWDrT+DYz9cUJyfhydTz+V2v18cyX9PFqdKY3ycp 09/aWkIEFkXJWbxpVSzSg2npNYnyUiSuMS13C4lOnFr8mbbLPixQzCAlen6PT+TebMFw mCInsDhPM17uJtDJlxyreTjE8LjwbkaqnJ0sIHkEL+OKVwkqL0UW/vYQu88SmiDO14Yd CKNg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id w4-20020a656944000000b0052069c100fesi1752134pgq.290.2023.04.19.02.56.03; Wed, 19 Apr 2023 02:56:16 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231167AbjDSJji (ORCPT + 99 others); Wed, 19 Apr 2023 05:39:38 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:37260 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230211AbjDSJjh (ORCPT ); Wed, 19 Apr 2023 05:39:37 -0400 Received: from foss.arm.com (foss.arm.com [217.140.110.172]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id B8FE419BD for ; Wed, 19 Apr 2023 02:39:35 -0700 (PDT) Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 4A1FE143D; Wed, 19 Apr 2023 02:40:19 -0700 (PDT) Received: from [10.57.20.93] (unknown [10.57.20.93]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 7EB0D3F5A1; Wed, 19 Apr 2023 02:39:33 -0700 (PDT) Message-ID: Date: Wed, 19 Apr 2023 10:39:31 +0100 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101 Thunderbird/102.9.0 Subject: Re: [PATCH v2] drm/scheduler: set entity to NULL in drm_sched_entity_pop_job() Content-Language: en-GB To: Danilo Krummrich , luben.tuikov@amd.com, airlied@gmail.com, daniel@ffwll.ch, l.stach@pengutronix.de, christian.koenig@amd.com Cc: linux-kernel@vger.kernel.org, dri-devel@lists.freedesktop.org References: <20230418100453.4433-1-dakr@redhat.com> From: Steven Price In-Reply-To: <20230418100453.4433-1-dakr@redhat.com> Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=-6.8 required=5.0 tests=BAYES_00,NICE_REPLY_A, RCVD_IN_DNSWL_MED,SPF_HELO_NONE,SPF_NONE,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 18/04/2023 11:04, Danilo Krummrich wrote: > It already happend a few times that patches slipped through which > implemented access to an entity through a job that was already removed > from the entities queue. Since jobs and entities might have different > lifecycles, this can potentially cause UAF bugs. > > In order to make it obvious that a jobs entity pointer shouldn't be > accessed after drm_sched_entity_pop_job() was called successfully, set > the jobs entity pointer to NULL once the job is removed from the entity > queue. > > Moreover, debugging a potential NULL pointer dereference is way easier > than potentially corrupted memory through a UAF. > > Signed-off-by: Danilo Krummrich This triggers a splat for me (with Panfrost driver), the cause of which is the following code in drm_sched_get_cleanup_job(): if (job) { job->entity->elapsed_ns += ktime_to_ns( ktime_sub(job->s_fence->finished.timestamp, job->s_fence->scheduled.timestamp)); } which indeed is accessing entity after the job has been returned from drm_sched_entity_pop_job(). And obviously job->entity is a NULL pointer with this patch. I'm afraid I don't fully understand the lifecycle so I'm not sure if this is simply exposing an existing bug in drm_sched_get_cleanup_job() or if this commit needs to be reverted. Thanks, Steve > --- > drivers/gpu/drm/scheduler/sched_entity.c | 6 ++++++ > drivers/gpu/drm/scheduler/sched_main.c | 4 ++++ > 2 files changed, 10 insertions(+) > > diff --git a/drivers/gpu/drm/scheduler/sched_entity.c b/drivers/gpu/drm/scheduler/sched_entity.c > index 15d04a0ec623..a9c6118e534b 100644 > --- a/drivers/gpu/drm/scheduler/sched_entity.c > +++ b/drivers/gpu/drm/scheduler/sched_entity.c > @@ -448,6 +448,12 @@ struct drm_sched_job *drm_sched_entity_pop_job(struct drm_sched_entity *entity) > drm_sched_rq_update_fifo(entity, next->submit_ts); > } > > + /* Jobs and entities might have different lifecycles. Since we're > + * removing the job from the entities queue, set the jobs entity pointer > + * to NULL to prevent any future access of the entity through this job. > + */ > + sched_job->entity = NULL; > + > return sched_job; > } > > diff --git a/drivers/gpu/drm/scheduler/sched_main.c b/drivers/gpu/drm/scheduler/sched_main.c > index 9b16480686f6..e89a3e469cd5 100644 > --- a/drivers/gpu/drm/scheduler/sched_main.c > +++ b/drivers/gpu/drm/scheduler/sched_main.c > @@ -42,6 +42,10 @@ > * the hardware. > * > * The jobs in a entity are always scheduled in the order that they were pushed. > + * > + * Note that once a job was taken from the entities queue and pushed to the > + * hardware, i.e. the pending queue, the entity must not be referenced anymore > + * through the jobs entity pointer. > */ > > #include