** Changed in: linux (Ubuntu Focal) Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team)
-- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1943464 Title: Reassign I/O Path of ConnectX-5 Port 1 before Port 2 causes NULL dereference Status in Ubuntu on IBM z Systems: In Progress Status in linux package in Ubuntu: Fix Released Status in linux source package in Focal: In Progress Status in linux source package in Hirsute: Fix Committed Status in linux source package in Impish: Fix Committed Status in linux source package in Jammy: Fix Released Bug description: SRU Justification: [Impact] * After reassigning a PCHID of a ConnectX-5 based RoCE Adapter from one physical LPAR to another, running Ubuntu 20.04 with kernel 5.4 (latest), a lifetime issue occurs. * Subsequent testing on newer kernels now shows that a NULL pointer dereference in the zPCI code happens (causing a hard crash) that was previously hidden by leaking the struct pci_dev. * For a more detailed root cause analysis, see the below original bug description. [Fix] The following three commits fix this issue in focal: * upstream (since v5.12-rc4): 0b13525c20febcfecccf6fc1db5969727401317d 0b13525c20fe "s390/pci: fix leak of PCI device structure" backport: https://launchpadlibrarian.net/566161494/0001-s390-pci-fix-leak-of-PCI-device-structure.patch * upstream (since v5.14-rc7): 2a671f77ee49f3e78997b77fdee139467ff6a598 2a671f77ee49 "s390/pci: fix use after free of zpci_dev" backport: https://launchpadlibrarian.net/566161496/0002-s390-pci-fix-use-after-free-of-zpci_dev.patch * upstream (since v5.15-rc5): a46044a92add6a400f4dada7b943b30221f7cc80 a46044a92add "s390/pci: fix zpci_zdev_put() on reserve" backport: https://launchpadlibrarian.net/566161497/0003-s390-pci-fix-zpci_zdev_put-on-reserve.patch * Commit 0b13525c20fe fixes a lifetime issue of the struct pci_dev that was not released on removal, commit 2a671f77ee49 fixes the 'NULL pointer dereference' (causing the hard crash) itself. and commit a46044a92add fixes the handling of multiple events for a single reserve state transition of the device. Without this, the NULL dereference can still be triggered as Reassign I/O Path causes a redudant second removal event. * Since none of the three upstream commits does apply cleanly to focal master-next by just cherry-picking them (mainly due to changes in the context), the above backports are needed. [Test Case] * Two z15 or LinuxONE III LPARs, one with a Connect-X5 based RoCE adapter attached. * LPARs need to run Ubuntu 20.04 with kernel 5.4 to hit the lifetime issue (that hides the also potential existing 'NULL pointer dereference') - with Hirsute and kernel 5.11 the 'NULL pointer dereference' crash occurs. * Now change the PCHID (physical channel identifier) to a different one from the 2nd LPAR (at the HMC?). * Verify if the reassignment worked properly (by checking the PCHID) and monitor the kernel ring buffer dmesg (diagnostic messages) for "Krnl PSW" crash (caused by NULL pointer) (for more error details, please see below original bug description). * Due hardware availability reasons (the ConnectX-5 cards are only used in special cases), the testing needs to be done by IBM. [Regression Potential / What can go wrong] * What can go wrong with: 2a671f77ee49 "s390/pci: fix use after free of zpci_dev" * The reference count to the struct zpci_dev got increased while it is used by the PCI core. This could cause a leak if not properly released. * Hot-plug of there Connect-X5 devices could be broken on s390x entirely, in case the new pointer handing is erroneous. * This may even have an impact on "cold plug", too. * Fortunately the modifications are quite minimal and thereby traceable, * and affect /arch/s390/pci/pci.c and arch/s390/pci/pci_bus.h only, hence are specific to the s390x platform only and there again to "plugging" of zPCI devices. * What can go wrong with: 0b13525c20fe "s390/pci: fix leak of PCI device structure" * The function zpci_remove_device got expanded with an additional set_error argument, and the internal flow got significantly changed. In case handled in a wrong way, this may harm the entire remove/release logic. * The calls of zpci_remove_device need to be adjusted (as part of the new arg), failures here will most likely be identified at compile time. * The initialization of the pci_dev struct got improved, * and the flow in __zpci_event_availability carefully changed to reflect the device slot/bus remove characteristics. However, issues here may lead again to general zpci hotplug removal issues. * Fortunately all modifications are limited to s390x only (/arch/s390/* and /drivers/pci/hotplug/s390*) obviously affect zpci devices only (and no ccw devices). [Other] * jammy, the current release in development, has all three commits included. * impish and hirsute already incl. "s390/pci: fix leak of PCI device structure" and "s390/pci: fix use after free of zpci_dev"; "s390/pci: fix zpci_zdev_put() on reserve" is tagged for upstream stable v5.14.x / v5.10.x (see https://lore.kernel.org/stable/31dcc776244843aa76deebd49f4ba3fbe4819990.ca...@linux.ibm.com/) and since we pick up v5.14.x / v5.10.x for the Ubuntu hirsute and impish kernels, it will arrive there via upstream stable. __________ After reassign RoCE ConnectX-5 Card Pchid to another LPAR dmesg show under Ubuntu the following Error message Ubuntu 20.04.01 with updates oot@t35lp02:~# uname -a Linux t35lp02.lnxne.boe 5.4.0-80-generic #90-Ubuntu SMP Fri Jul 9 17:41:33 UTC 2021 s390x s390x s390x GNU/Linux root@t35lp02:~# DMESG Output 761.778422] mlx5_core 0018:00:00.1: poll_health:715:(pid 0): Fatal error 1 detected [ 761.778432] mlx5_core 0018:00:00.1: print_health_info:381:(pid 0): assert_var[0] 0xffffffff [ 761.778435] mlx5_core 0018:00:00.1: print_health_info:381:(pid 0): assert_var[1] 0xffffffff [ 761.778437] mlx5_core 0018:00:00.1: print_health_info:381:(pid 0): assert_var[2] 0xffffffff [ 761.778439] mlx5_core 0018:00:00.1: print_health_info:381:(pid 0): assert_var[3] 0xffffffff [ 761.778442] mlx5_core 0018:00:00.1: print_health_info:381:(pid 0): assert_var[4] 0xffffffff [ 761.778444] mlx5_core 0018:00:00.1: print_health_info:384:(pid 0): assert_exit_ptr 0xffffffff [ 761.778447] mlx5_core 0018:00:00.1: print_health_info:386:(pid 0): assert_callra 0xffffffff [ 761.778451] mlx5_core 0018:00:00.1: print_health_info:389:(pid 0): fw_ver 65535.65535.65535 [ 761.778454] mlx5_core 0018:00:00.1: print_health_info:390:(pid 0): hw_id 0xffffffff [ 761.778456] mlx5_core 0018:00:00.1: print_health_info:391:(pid 0): irisc_index 255 [ 761.778460] mlx5_core 0018:00:00.1: print_health_info:392:(pid 0): synd 0xff: unrecognized error [ 761.778462] mlx5_core 0018:00:00.1: print_health_info:394:(pid 0): ext_synd 0xffff [ 761.778465] mlx5_core 0018:00:00.1: print_health_info:396:(pid 0): raw fw_ver 0xffffffff [ 761.778467] mlx5_core 0018:00:00.1: mlx5_trigger_health_work:696:(pid 0): new health works are not permitted at this stage [ 763.179016] mlx5_core 0018:00:00.1: E-Switch: cleanup [ 768.348431] mlx5_core 0018:00:00.1: mlx5_reclaim_startup_pages:562:(pid 123): FW did not return all pages. giving up... [ 768.348433] ------------[ cut here ]------------ [ 768.348434] FW pages counter is 43318 after reclaiming all pages [ 768.348562] WARNING: CPU: 0 PID: 123 at drivers/net/ethernet/mellanox/mlx5/core/pagealloc.c:567 mlx5_reclaim_startup_pages+0x12c/0x1c0 [mlx5_core] [ 768.348563] Modules linked in: s390_trng chsc_sch eadm_sch vfio_ccw vfio_mdev mdev vfio_iommu_type1 vfio sch_fq_codel drm drm_panel_orientation_quirks i2c_core ip_tables x_tables btrfs zstd_compress zlib_deflate raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx xor raid6_pq libcrc32c raid1 raid0 linear dm_service_time mlx5_ib ib_uverbs ib_core pkey qeth_l2 zcrypt crc32_vx_s390 ghash_s390 prng aes_s390 des_s390 libdes sha3_512_s390 sha3_256_s390 sha512_s390 mlx5_core sha256_s390 sha1_s390 sha_common tls mlxfw ptp pps_core zfcp scsi_transport_fc dasd_eckd_mod dasd_mod qeth qdio ccwgroup scsi_dh_emc scsi_dh_rdac scsi_dh_alua dm_multipath [ 768.348586] CPU: 0 PID: 123 Comm: kmcheck Tainted: G W 5.4.0-80-generic #90-Ubuntu [ 768.348586] Hardware name: IBM 8561 T01 703 (LPAR) [ 768.348587] Krnl PSW : 0704c00180000000 000003ff808d33ac (mlx5_reclaim_startup_pages+0x12c/0x1c0 [mlx5_core]) [ 768.348607] R:0 T:1 IO:1 EX:1 Key:0 M:1 W:0 P:0 AS:3 CC:0 PM:0 RI:0 EA:3 [ 768.348608] Krnl GPRS: 0000000000000004 0000000000000006 0000000000000034 0000000000000007 [ 768.348608] 0000000000000007 00000000fcb4fa00 000000000000007b 000003e00458fafc [ 768.348609] 00000000b7d406f0 000000004d849c00 00000000b7d00120 000000010000b6c0 [ 768.348610] 00000000f4cb1100 000003e00458fe70 000003ff808d33a8 000003e00458fa50 [ 768.348615] Krnl Code: 000003ff808d339c: c02000041043 larl %r2,000003ff80955422 000003ff808d33a2: c0e5ffff70c7 brasl %r14,000003ff808c1530 #000003ff808d33a8: a7f40001 brc 15,000003ff808d33aa >000003ff808d33ac: e330a5f04012 lt %r3,263664(%r10) 000003ff808d33b2: a784ffd7 brc 8,000003ff808d3360 000003ff808d33b6: b9140033 lgfr %r3,%r3 000003ff808d33ba: c0200004104e larl %r2,000003ff80955456 000003ff808d33c0: c0e5ffff70b8 brasl %r14,000003ff808c1530 [ 768.348622] Call Trace: [ 768.348641] ([<000003ff808d33a8>] mlx5_reclaim_startup_pages+0x128/0x1c0 [mlx5_core]) [ 768.348661] [<000003ff808c8e14>] mlx5_function_teardown+0x44/0xa0 [mlx5_core] [ 768.348680] [<000003ff808c95b0>] mlx5_unload_one+0x80/0x160 [mlx5_core] [ 768.348699] [<000003ff808c9720>] remove_one+0x50/0xd0 [mlx5_core] [ 768.348702] [<000000004d2704c0>] pci_device_remove+0x40/0xa0 [ 768.348706] [<000000004d2f724e>] device_release_driver_internal+0xee/0x1c0 [ 768.348707] [<000000004d267054>] pci_stop_bus_device+0x94/0xc0 [ 768.348708] [<000000004d267210>] pci_stop_and_remove_bus_device_locked+0x30/0x50 [ 768.348710] [<000000004cd36cbe>] __zpci_event_availability+0x26e/0x340 [ 768.348713] [<000000004d382794>] chsc_process_crw+0x2e4/0x300 [ 768.348714] [<000000004d389fd6>] crw_collect_info+0x276/0x340 [ 768.348716] [<000000004cd681e6>] kthread+0x126/0x160 [ 768.348719] [<000000004d5a568c>] ret_from_fork+0x28/0x30 [ 768.348720] [<000000004d5a5694>] kernel_thread_starter+0x0/0x10 [ 768.348720] Last Breaking-Event-Address: [ 768.348739] [<000003ff808d33a8>] mlx5_reclaim_startup_pages+0x128/0x1c0 [mlx5_core] [ 768.348740] ---[ end trace 1056779ff3084977 ]--- [ 768.354255] pci 0018:00:00.1: Removing from iommu group 2 [ 768.359097] pci_bus 0018:00: busn_res: [bus 00] is released [ 768.359122] crw_info : CRW reports slct=0, oflw=0, chn=0, rsc=B, anc=0, erc=0, rsid=0 root@t35lp02:~# == Comment: #2 - hel...@de.ibm.com> - 2021-07-27 08:43:37 == Make an Update to Ubuntu 21.04 as mentioned with Niklas: root@t35lp02:~# lsb_release -a No LSB modules are available. Distributor ID: Ubuntu Description: Ubuntu 21.04 Release: 21.04 Codename: hirsute root@t35lp02:~# ls -la total 36 drwx------ 5 root root 4096 Jul 27 13:06 . drwxr-xr-x 20 root root 4096 Jul 27 12:49 .. -rw------- 1 root root 174 Jul 27 13:15 .bash_history -rw-r--r-- 1 root root 3106 Dec 5 2019 .bashrc drwx------ 2 root root 4096 Jul 27 12:58 .cache -rw-r--r-- 1 root root 161 Dec 5 2019 .profile drwxr-xr-x 3 root root 4096 Jul 27 12:58 snap drwx------ 2 root root 4096 Jul 27 12:58 .ssh -rw------- 1 root root 979 Jul 27 13:06 .viminfo root@t35lp02:~# uname -a Linux t35lp02.lnxne.boe 5.11.0-25-generic #27-Ubuntu SMP Fri Jul 9 18:40:37 UTC 2021 s390x s390x s390x GNU/Linux root@t35lp02:~# dmesg show the following Call Trace after reasign ConnectX-5 Ports to another LPAR [ 232.218778] mlx5_core 0008:00:00.1: mlx5_wait_for_pages:735:(pid 140): Skipping wait for vf pages stage [ 234.108700] mlx5_core 0008:00:00.1: E-Switch: cleanup [ 234.281483] pci 0008:00:00.1: Removing from iommu group 1 [ 234.281510] ------------[ cut here ]------------ [ 234.281511] WARNING: CPU: 6 PID: 140 at arch/s390/pci/pci.c:374 pcibios_release_device+0xfe/0x110 [ 234.281522] Modules linked in: s390_trng chsc_sch eadm_sch vfio_ccw vfio_mdev mdev vfio_iommu_type1 vfio sch_fq_codel drm i2c_core drm_panel_orientation_quirks ip_tables x_tables btrfs blake2b_generic zstd_compress raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx xor raid6_pq libcrc32c raid1 raid0 linear dm_service_time mlx5_ib ib_uverbs ib_core qeth_l2 pkey zcrypt crc32_vx_s390 ghash_s390 mlx5_core prng aes_s390 des_s390 libdes sha3_512_s390 sha3_256_s390 sha512_s390 sha256_s390 sha1_s390 sha_common tls mlxfw ptp pps_core zfcp scsi_transport_fc dasd_eckd_mod dasd_mod qeth qdio ccwgroup scsi_dh_emc scsi_dh_rdac scsi_dh_alua dm_multipath [ 234.281573] CPU: 6 PID: 140 Comm: kmcheck Not tainted 5.11.0-25-generic #27-Ubuntu [ 234.281575] Hardware name: IBM 8561 T01 703 (LPAR) [ 234.281576] Krnl PSW : 0704c00180000000 00000000d2af2e92 (pcibios_release_device+0x102/0x110) [ 234.281581] R:0 T:1 IO:1 EX:1 Key:0 M:1 W:0 P:0 AS:3 CC:0 PM:0 RI:0 EA:3 [ 234.281582] Krnl GPRS: 000000000000001f 00000000ffffffff 00000000839dcc00 0000000000000000 [ 234.281584] 0000000000000000 0038008000000000 0000000000000000 0000038000000000 [ 234.281585] 00000000d43efef0 0000000000000006 0000000000000c00 00000000839f5298 [ 234.281586] 0000000083563300 0000000000000000 000003800475fad8 000003800475fa88 [ 234.281596] Krnl Code: 00000000d2af2e84: c0e5003c400e brasl %r14,00000000d327aea0 00000000d2af2e8a: a7f4ffc3 brc 15,00000000d2af2e10 #00000000d2af2e8e: af000000 mc 0,0 >00000000d2af2e92: e5442006ffff mvhhi 6(%r2),-1 00000000d2af2e98: a7f4ffe2 brc 15,00000000d2af2e5c 00000000d2af2e9c: 0707 bcr 0,%r7 00000000d2af2e9e: 0707 bcr 0,%r7 00000000d2af2ea0: c00400000000 brcl 0,00000000d2af2ea0 [ 234.281605] Call Trace: [ 234.281607] [<00000000d2af2e92>] pcibios_release_device+0x102/0x110 [ 234.281612] [<00000000d328fa42>] pci_release_dev+0x62/0xa0 [ 234.281620] [<00000000d335f918>] device_release+0x48/0xb0 [ 234.281626] [<00000000d32604d4>] kobject_put+0x174/0x2e0 [ 234.281632] [<00000000d32cfeee>] pci_iov_release+0x4e/0x70 [ 234.281637] [<00000000d328fa2e>] pci_release_dev+0x4e/0xa0 [ 234.281638] [<00000000d335f918>] device_release+0x48/0xb0 [ 234.281640] [<00000000d32604d4>] kobject_put+0x174/0x2e0 [ 234.281642] [<00000000d2af870a>] __zpci_event_availability+0x20a/0x350 [ 234.281644] [<00000000d36c5d60>] chsc_process_crw+0x2d0/0x2f0 [ 234.281650] [<00000000d36cff36>] crw_collect_info+0x276/0x340 [ 234.281653] [<00000000d2b3c4fa>] kthread+0x14a/0x170 [ 234.281657] [<00000000d3728028>] ret_from_fork+0x24/0x2c [ 234.281662] Last Breaking-Event-Address: [ 234.281662] [<00000000d2af2e2e>] pcibios_release_device+0x9e/0x110 [ 234.281664] ---[ end trace c37123f53d0bbb72 ]--- [ 236.519017] crw_info : CRW reports slct=0, oflw=0, chn=0, rsc=B, anc=0, erc=0, rsid=0 root@t35lp02:~# == Comment: #3 - nik...@ibm.com> - 2021-08-04 05:31:00 == The first dmesg on Ubuntu 20.04 looks like a Mellanox internal driver problem which if my memory serves me correctly has since been fixed in the Mellanox driver. As far as I can tell in the worst case this leaks a few pages. The output on Ubuntu 21.04 turns out to be a NULL pointer dereference in zPCI code however that was previously hidden by us leaking the struct pci_dev. I have analyzed the issue and can reproduce it on current development kernels, here is what I believe happens: The backtrace shows a warning in pcibios_release_device() zpci_unmap_resources() pci_iounmap_fh() which is WARN_ON(!zpci_iomap_start[idx].count); That however is a red herring, on this z15 machine with a ConnectX-5 we have MIO support so should never even enter pci_iounmap_fh(). Adding a debug print in pcibios_release_device() it turns out that the struct zpci_dev * we get to to_zpci(pdev) is NULL. Digging a bit the problem is that during the detach PCI availability event we call zpci_zdev_put() as the zdev went away. We already performed the pci_stop_and_remove_bus_device_locked(pdev) before that point and assumed that after that the struct pci_dev refcount reaches 0 and will not be accessed anymore. This is usually true, however here the problem is that we first removed the PF for Port 1 while keeping the PF for Port 2. Now the "struct pci_sriov" in pdev->sriov where pdev is the PF of the Port 2 has a field sturct pci_sriov::dev with the comment "/* Lowest numbered PF */". This field holds a reference to the struct pci_dev of the PF for Port 1 thus preventing the refcount of that reaching 0 until the PF for Port 2 is released. When the PF for Port 2 is released the refcount for the PF of Port 1 reaches 0 and only then do we get the call pci_release_dev() -> pcibios_release_device() but at this point the struct zpci_dev was already released and zbus->functions[devfn] pointer NULLed when it was unregistered from the zbus. Here is /sys/kernel/debug/s390dbf/pci_msg/sprintf output with the added debug print for my reproduction: root@t35lp47 ~ # cat /sys/kernel/debug/s390dbf/pci_msg/sprintf 00 01627041292:161310 3 - 0007 0000000b3ffa6560 wb bit: 1 ... 00 01627041292:165772 3 - 0007 0000000b3ffa2952 add fid:280, fh:2f80, c:1 00 01627041292:166083 3 - 0007 0000000b3ffa2952 add fid:2c0, fh:3002, c:1 ... 00 01627041292:181187 3 - 0007 0000000b3ffa66aa ena fid:280, fh:a3002f80, rc:0 00 01627041292:181194 3 - 0007 0000000b3ffa6728 ena mio fid:280, fh:a3002f80, rc:0 <-- MIO enabled for PF of Port 1 00 01627041292:182176 3 - 0007 0000000b3ffa66aa ena fid:2c0, fh:a7003002, rc:0 00 01627041292:182181 3 - 0007 0000000b3ffa6728 ena mio fid:2c0, fh:a7003002, rc:0 <-- MIO enabled for PF of Port 2 .... 00 01627041423:815382 3 - 0014 0000000b3ffa2c74 rem fid:280 <-- sturct zpci_dev for Port 1 released but no zpci_unmap_resources() called for it! 00 01627041566:352720 3 - 0012 0000000b3ffa2362 zunmap: zdev:0000000000000000 FID:0, mio:0 <-- zdev is NULL in pcibios_release_device() for Port 1 and we read the FH/MIO from somewhere in lowcore BAD! 00 01627041566:353274 3 - 0012 0000000b3ffa2362 zunmap: zdev:000000008803c000 FID:2c0, mio:1 00 01627041567:548896 3 - 0012 0000000b3ffa2c74 rem fid:2c0 Thus we have a definite bug in the coordination between the lifetimes of struct zpci_dev and struct pci_dev where the former can outlive the latter. I think the problem is that for the struct zpci_dev we only keep exactly one reference owned by the zPCI core that gets released once the underlying zPCI device goes away from the view of the zPCI core. At the same time the struct pci_dev has its own reference counting and via pdev holds its own reference to the struct zpci_dev (indirect via pdev->sysdata which is a strict zpci_bus which holds a struct zpci_dev* for all functions on the bus via zbus->functions[devfn]). This reference is unaccounted for and can outlive the zPCI core's refrence as seen in the above scenario. == Comment: #4 - nik...@ibm.com> - 2021-08-24 09:00:03 == A fix for this has now landed upstream with the following commit: 2a671f77ee49 ("s390/pci: fix use after free of zpci_dev") Note that this references an earlier commit that previously hid the issue and has not yet been merged to Ubuntu 20.04's kernel but is included in 21.04 only with both fixes does the freeing of the struct pci_dev for correctly in the tested case. 0b13525c20fe ("s390/pci: fix leak of PCI device structure") To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-z-systems/+bug/1943464/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp