[Bug 1186194] New: Many processes and up in D state after system resume (5.12.3-1-default, git 25d4ec7)
https://bugzilla.suse.com/show_bug.cgi?id=1186194 Bug ID: 1186194 Summary: Many processes and up in D state after system resume (5.12.3-1-default, git 25d4ec7) Classification: openSUSE Product: openSUSE Tumbleweed Version: Current Hardware: Other OS: Other Status: NEW Severity: Normal Priority: P5 - None Component: Kernel Assignee: kernel-bugs@opensuse.org Reporter: lpechacek@suse.com QA Contact: qa-bugs@suse.de CC: oneukum@suse.com Found By: --- Blocker: --- Created attachment 849440 --> https://bugzilla.suse.com/attachment.cgi?id=849440&action=edit Output of SysRq-T I'm using a Dell laptop (Inspiron 7373) with a USB ethernet adapter (17ef:7205 Lenovo Thinkpad LAN, driver r8152). Sometimes, after resume, network-related utilities (e.g. ip, ping) freeze in D state. No communication over IP networks is possible. Attached is SysRq-T from the malfunctioning state. From my POV, the following stand out: May 18 11:00:34 fmn kernel: task:teams state:D stack: 0 pid: 316 ppid: 3234 flags:0x00000000 May 18 11:00:34 fmn kernel: Call Trace: May 18 11:00:34 fmn kernel: __schedule+0x2ee/0x950 May 18 11:00:34 fmn kernel: schedule+0x46/0xb0 May 18 11:00:34 fmn kernel: rpm_resume+0x19c/0x7b0 May 18 11:00:34 fmn kernel: ? wait_woken+0x80/0x80 May 18 11:00:34 fmn kernel: rpm_resume+0x2e7/0x7b0 May 18 11:00:34 fmn kernel: ? kernfs_fop_open+0x2a8/0x3a0 May 18 11:00:34 fmn kernel: __pm_runtime_resume+0x4a/0x80 May 18 11:00:34 fmn kernel: usb_autopm_get_interface+0x18/0x50 [usbcore] May 18 11:00:34 fmn kernel: rtl8152_get_link_ksettings+0x27/0x80 [r8152] May 18 11:00:34 fmn kernel: speed_show+0x6e/0xb0 May 18 11:00:34 fmn kernel: dev_attr_show+0x19/0x40 May 18 11:00:34 fmn kernel: sysfs_kf_seq_show+0xa6/0xe0 May 18 11:00:34 fmn kernel: seq_read_iter+0x1e1/0x510 May 18 11:00:34 fmn kernel: new_sync_read+0x115/0x1a0 May 18 11:00:34 fmn kernel: vfs_read+0x14b/0x1a0 May 18 11:00:34 fmn kernel: ksys_read+0x5f/0xe0 May 18 11:00:34 fmn kernel: do_syscall_64+0x33/0x80 May 18 11:00:34 fmn kernel: entry_SYSCALL_64_after_hwframe+0x44/0xae AND May 18 11:00:34 fmn kernel: task:kworker/3:2 state:D stack: 0 pid:23489 ppid: 2 flags:0x00004000 May 18 11:00:34 fmn kernel: Workqueue: pm pm_runtime_work May 18 11:00:34 fmn kernel: Call Trace: May 18 11:00:34 fmn kernel: __schedule+0x2ee/0x950 May 18 11:00:34 fmn kernel: schedule+0x46/0xb0 May 18 11:00:34 fmn kernel: schedule_timeout+0x8b/0x140 May 18 11:00:34 fmn kernel: ? __next_timer_interrupt+0x100/0x100 May 18 11:00:34 fmn kernel: msleep+0x2a/0x40 May 18 11:00:34 fmn kernel: napi_disable+0x2b/0x70 May 18 11:00:34 fmn kernel: rtl8152_suspend+0x2ad/0x340 [r8152] May 18 11:00:34 fmn kernel: usb_suspend_both+0x9d/0x230 [usbcore] May 18 11:00:34 fmn kernel: usb_runtime_suspend+0x2b/0x70 [usbcore] May 18 11:00:34 fmn kernel: ? usb_autoresume_device+0x50/0x50 [usbcore] May 18 11:00:34 fmn kernel: __rpm_callback+0x81/0x140 May 18 11:00:34 fmn kernel: rpm_callback+0x4f/0x70 May 18 11:00:34 fmn kernel: ? usb_autoresume_device+0x50/0x50 [usbcore] May 18 11:00:34 fmn kernel: rpm_suspend+0x147/0x6f0 May 18 11:00:34 fmn kernel: ? __switch_to+0x26f/0x450 May 18 11:00:34 fmn kernel: pm_runtime_work+0x8e/0x90 May 18 11:00:34 fmn kernel: process_one_work+0x1df/0x370 May 18 11:00:34 fmn kernel: worker_thread+0x50/0x400 May 18 11:00:34 fmn kernel: ? process_one_work+0x370/0x370 May 18 11:00:34 fmn kernel: kthread+0x11b/0x140 May 18 11:00:34 fmn kernel: ? __kthread_bind_mask+0x60/0x60 May 18 11:00:34 fmn kernel: ret_from_fork+0x22/0x30 -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1186194 https://bugzilla.suse.com/show_bug.cgi?id=1186194#c1 Takashi Iwai <tiwai@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |tiwai@suse.com --- Comment #1 from Takashi Iwai <tiwai@suse.com> --- Is the problem reproducible reliably? The code path looks like a long-standing known issue (bsc#1178015 bsc#1174886). I have a test patch in bsc#1174886, but this couldn't be verified, so far. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1186194 https://bugzilla.suse.com/show_bug.cgi?id=1186194#c2 Takashi Iwai <tiwai@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |lpechacek@suse.com Flags| |needinfo?(lpechacek@suse.co | |m) --- Comment #2 from Takashi Iwai <tiwai@suse.com> --- As a reference, I'm building a TW kernel with my test patch in OBS home:tiwai:bsc1186194. If you can reproduce the problem, please give it a try later. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1186194 https://bugzilla.suse.com/show_bug.cgi?id=1186194#c3 --- Comment #3 from Libor Pechacek <lpechacek@suse.com> --- (In reply to Takashi Iwai from comment #1)
Is the problem reproducible reliably?
Unfortunately not. The freeze happens spontaneously about twice a week. I'll have a look if I can replicate the issue though. Thanks! -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1186194 https://bugzilla.suse.com/show_bug.cgi?id=1186194#c4 Libor Pechacek <lpechacek@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- Flags|needinfo?(lpechacek@suse.co | |m) | --- Comment #4 from Libor Pechacek <lpechacek@suse.com> --- Created attachment 850414 --> https://bugzilla.suse.com/attachment.cgi?id=850414&action=edit Output of SysRq-T with kernel 5.12.4-1.g92853b5-default Although I didn't manage to replicate the freeze at will, it does happen more frequently with the "docking" station that arrived today. So, I installed the test kernel from bug 1174886 and the freeze happened even with the proposed fix. ----------------------8<---------------------- lpechacek@fmn:~> pgrep -war D 7 kworker/0:1+ipv6_addrconf 1679 /usr/sbin/NetworkManager --no-daemon 1688 /usr/sbin/NetworkManager --no-daemon 1689 /usr/sbin/NetworkManager --no-daemon 1813 /usr/sbin/wpa_supplicant -c /etc/wpa_supplicant/wpa_supplicant.conf -u -t -f /var/log/wpa_supplicant.log 6530 kworker/u16:0+netns 7008 kworker/3:2+events 7010 kworker/3:3+pm 7608 kworker/u17:2+i915_flip 7715 net usershare info 8117 ip --color=auto ne lpechacek@fmn:~> uname -a Linux fmn 5.12.4-1.g92853b5-default #1 SMP Tue May 18 12:02:48 UTC 2021 (92853b5) x86_64 x86_64 x86_64 GNU/Linux ---------------------->8---------------------- The output of SysRq-T is attached. Disabling autosuspend for the network adapter (`echo on > /sys/devices/pci0000\:00/0000\:00\:14.0/usb2/2-4/2-4.3/power/control`) helps to prevent the issue. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1186194 https://bugzilla.suse.com/show_bug.cgi?id=1186194#c5 --- Comment #5 from Oliver Neukum <oneukum@suse.com> --- Created attachment 850415 --> https://bugzilla.suse.com/attachment.cgi?id=850415&action=edit unconditionally reset flag Just a hunch, try this please -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1186194 https://bugzilla.suse.com/show_bug.cgi?id=1186194#c6 --- Comment #6 from Libor Pechacek <lpechacek@suse.com> --- Created attachment 850450 --> https://bugzilla.suse.com/attachment.cgi?id=850450&action=edit Output of SysRq-T with "unconditionally reset flag" patch (In reply to Oliver Neukum from comment #5)
Just a hunch, try this please
I patched the Tubleweed 5.12.10-1-default kernel driver so that I don't have to build the whole package. No success, the network stack froze even with this patch. The only remedy so far is the autosuspend disable. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1186194 https://bugzilla.suse.com/show_bug.cgi?id=1186194#c7 --- Comment #7 from Takashi Iwai <tiwai@suse.com> --- Could you try to apply both Oliver's and my patches? The log indicates the same double-resume deadlock. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1186194 https://bugzilla.suse.com/show_bug.cgi?id=1186194#c8 --- Comment #8 from Takashi Iwai <tiwai@suse.com> --- Created attachment 850474 --> https://bugzilla.suse.com/attachment.cgi?id=850474&action=edit Patch for avoid double resume -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1186194 https://bugzilla.suse.com/show_bug.cgi?id=1186194#c9 --- Comment #9 from Takashi Iwai <tiwai@suse.com> --- BTW, the original issue seems like a forever spin in napi_disable() called from the r8152 runtime suspend. The same pattern was found in the log with my patched kernel. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1186194 https://bugzilla.suse.com/show_bug.cgi?id=1186194#c10 Libor Pechacek <lpechacek@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- Status|NEW |IN_PROGRESS --- Comment #10 from Libor Pechacek <lpechacek@suse.com> --- (In reply to Takashi Iwai from comment #7)
Could you try to apply both Oliver's and my patches?
Yes, I'm testing. BTW, the frequency of deadlocks with the new docking station (or rather a port replicator - https://i-tec.pro/en/produkt/c31dualdockpd-2/) is high enough to call the scenario a reliable reproducer. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1186194 https://bugzilla.suse.com/show_bug.cgi?id=1186194#c11 --- Comment #11 from Takashi Iwai <tiwai@suse.com> --- In case you hitting the similar issue, I refreshed my OBS repo with another additional hack, just to drop napi_disable()/napi_enable() in the suspend part. Found in the same OBS home:tiwai:bsc1186194. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1186194 https://bugzilla.suse.com/show_bug.cgi?id=1186194#c12 Libor Pechacek <lpechacek@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- Attachment #850415|0 |1 is obsolete| | Attachment #850474|0 |1 is obsolete| | --- Comment #12 from Libor Pechacek <lpechacek@suse.com> --- Created attachment 850561 --> https://bugzilla.suse.com/attachment.cgi?id=850561&action=edit Combined patch that was tested I would call it a success. No freeze in the last two days with the combined patch against 5.12.12-1-default. For the record, I recompiled only the r8152 module and not the whole kernel package. I'm going to test Takashi's kernel from https://download.opensuse.org/repositories/home:/tiwai:/bsc1186194/standard/... next. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1186194 https://bugzilla.suse.com/show_bug.cgi?id=1186194#c13 --- Comment #13 from Libor Pechacek <lpechacek@suse.com> --- (In reply to Libor Pechacek from comment #12)
I'm going to test Takashi's kernel from https://download.opensuse.org/repositories/home:/tiwai:/bsc1186194/standard/ x86_64/ next.
This one (5.12.12-1.g2fdf821-default) has been running smoothly in the past few days. From the user's point of view, I would call the issue solved. Thanks! -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1186194 https://bugzilla.suse.com/show_bug.cgi?id=1186194#c14 Libor Pechacek <lpechacek@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- Assignee|kernel-bugs@opensuse.org |tiwai@suse.com --- Comment #14 from Libor Pechacek <lpechacek@suse.com> --- Today I booted the Tumbleweed kernel 5.12.13 by mistake. It didn't survive longer than 10 minutes. Please, be so kind as to upstream and merge the fixes for r8152 soon so that I can move away from the experimental build. Thanks! -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1186194 https://bugzilla.suse.com/show_bug.cgi?id=1186194#c15 --- Comment #15 from Takashi Iwai <tiwai@suse.com> --- Now I'm back from vacation. My patched kernel mentioned in comment 11 is really a hack, just dropping napi_disable() / napi_enable() calls at runtime and system suspends temporarily. The fact that this patch worked implies that the usages of napi_disable() calls there are doubtful and very likely buggy. But fixing this properly needs more deep consideration. That said, there are multiple bugs here: - The recursive runtime PM handling that causes a deadlock; this one is addressed by the patch in comment 8 - The napi_disable() / napi_enable() calls at the runtime / system resume callbacks that again causes the deadlock -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1186194 https://bugzilla.suse.com/show_bug.cgi?id=1186194#c16 --- Comment #16 from Takashi Iwai <tiwai@suse.com> --- I've submitted the patches corresponding to comment 8 to the upstream. https://lore.kernel.org/netdev/20210714170022.8162-1-tiwai@suse.de/ The main issue wrt napi_disable() is not fixed yet, though. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1186194 https://bugzilla.suse.com/show_bug.cgi?id=1186194#c17 --- Comment #17 from Takashi Iwai <tiwai@suse.com> --- The two patches have been accepted by the upstream, so I backported to stable branch. Will try to backport to SLE15-SP2/SP3 as well. The main cause about napi_disable() is still unresolved. We need to start discussion. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1186194 https://bugzilla.suse.com/show_bug.cgi?id=1186194#c25 Takashi Iwai <tiwai@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- Flags| |needinfo?(lpechacek@suse.co | |m) --- Comment #25 from Takashi Iwai <tiwai@suse.com> --- Libor, just to be sure, could you check the current status with the latest kernel in OBS Kernel:stable? It contains my two patches, but this might still hit the deadlock around napi_disable(). I'd like to verify before looking further. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1186194 https://bugzilla.suse.com/show_bug.cgi?id=1186194#c27 --- Comment #27 from Swamp Workflow Management <swamp@suse.de> --- openSUSE-SU-2021:2645-1: An update that solves 7 vulnerabilities and has 58 fixes is now available. Category: security (important) Bug References: 1065729,1085224,1094840,1113295,1152472,1152489,1153274,1154353,1155518,1156395,1170511,1176447,1176940,1179243,1180092,1180814,1183871,1184114,1184350,1184631,1184804,1185308,1185377,1185791,1186194,1186206,1186482,1186483,1187215,1187476,1187495,1187585,1188036,1188080,1188101,1188121,1188126,1188176,1188267,1188268,1188269,1188323,1188366,1188405,1188445,1188504,1188620,1188683,1188703,1188720,1188746,1188747,1188748,1188752,1188770,1188771,1188772,1188773,1188774,1188777,1188838,1188876,1188885,1188893,1188973 CVE References: CVE-2021-21781,CVE-2021-22543,CVE-2021-35039,CVE-2021-3609,CVE-2021-3612,CVE-2021-3659,CVE-2021-37576 JIRA References: Sources used: openSUSE Leap 15.3 (src): kernel-azure-5.3.18-38.17.1, kernel-source-azure-5.3.18-38.17.1, kernel-syms-azure-5.3.18-38.17.1 -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1186194 https://bugzilla.suse.com/show_bug.cgi?id=1186194#c28 --- Comment #28 from Swamp Workflow Management <swamp@suse.de> --- SUSE-SU-2021:2645-1: An update that solves 7 vulnerabilities and has 58 fixes is now available. Category: security (important) Bug References: 1065729,1085224,1094840,1113295,1152472,1152489,1153274,1154353,1155518,1156395,1170511,1176447,1176940,1179243,1180092,1180814,1183871,1184114,1184350,1184631,1184804,1185308,1185377,1185791,1186194,1186206,1186482,1186483,1187215,1187476,1187495,1187585,1188036,1188080,1188101,1188121,1188126,1188176,1188267,1188268,1188269,1188323,1188366,1188405,1188445,1188504,1188620,1188683,1188703,1188720,1188746,1188747,1188748,1188752,1188770,1188771,1188772,1188773,1188774,1188777,1188838,1188876,1188885,1188893,1188973 CVE References: CVE-2021-21781,CVE-2021-22543,CVE-2021-35039,CVE-2021-3609,CVE-2021-3612,CVE-2021-3659,CVE-2021-37576 JIRA References: Sources used: SUSE Linux Enterprise Module for Public Cloud 15-SP3 (src): kernel-azure-5.3.18-38.17.1, kernel-source-azure-5.3.18-38.17.1, kernel-syms-azure-5.3.18-38.17.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1186194 https://bugzilla.suse.com/show_bug.cgi?id=1186194#c29 --- Comment #29 from Swamp Workflow Management <swamp@suse.de> --- SUSE-SU-2021:2646-1: An update that solves four vulnerabilities and has 38 fixes is now available. Category: security (important) Bug References: 1065729,1085224,1094840,1113295,1153274,1154353,1155518,1156395,1176940,1179243,1180092,1183871,1184114,1184350,1184631,1184804,1185377,1185902,1186194,1186206,1186482,1186483,1187476,1188101,1188405,1188445,1188504,1188620,1188683,1188746,1188747,1188748,1188770,1188771,1188772,1188773,1188774,1188777,1188838,1188876,1188885,1188973 CVE References: CVE-2021-21781,CVE-2021-22543,CVE-2021-3659,CVE-2021-37576 JIRA References: Sources used: SUSE Linux Enterprise Module for Public Cloud 15-SP2 (src): kernel-azure-5.3.18-18.61.1, kernel-source-azure-5.3.18-18.61.1, kernel-syms-azure-5.3.18-18.61.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1186194 https://bugzilla.suse.com/show_bug.cgi?id=1186194#c30 --- Comment #30 from Swamp Workflow Management <swamp@suse.de> --- openSUSE-SU-2021:1142-1: An update that solves 5 vulnerabilities and has 46 fixes is now available. Category: security (important) Bug References: 1065729,1085224,1094840,1113295,1153274,1154353,1156395,1179243,1183871,1184114,1184350,1184631,1185377,1185902,1186194,1186264,1186482,1187476,1188101,1188405,1188445,1188504,1188620,1188683,1188746,1188747,1188748,1188770,1188771,1188772,1188773,1188774,1188777,1188780,1188781,1188782,1188783,1188784,1188786,1188787,1188788,1188790,1188838,1188842,1188876,1188885,1188973,1189021,1189057,1189077,802154 CVE References: CVE-2021-21781,CVE-2021-22543,CVE-2021-3659,CVE-2021-3679,CVE-2021-37576 JIRA References: Sources used: openSUSE Leap 15.2 (src): kernel-debug-5.3.18-lp152.87.1, kernel-default-5.3.18-lp152.87.1, kernel-default-base-5.3.18-lp152.87.1.lp152.8.40.1, kernel-docs-5.3.18-lp152.87.1, kernel-kvmsmall-5.3.18-lp152.87.1, kernel-obs-build-5.3.18-lp152.87.1, kernel-obs-qa-5.3.18-lp152.87.1, kernel-preempt-5.3.18-lp152.87.1, kernel-source-5.3.18-lp152.87.1, kernel-syms-5.3.18-lp152.87.1 -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1186194 https://bugzilla.suse.com/show_bug.cgi?id=1186194#c31 --- Comment #31 from Swamp Workflow Management <swamp@suse.de> --- SUSE-SU-2021:2678-1: An update that solves 5 vulnerabilities and has 36 fixes is now available. Category: security (important) Bug References: 1065729,1085224,1094840,1113295,1153274,1154353,1156395,1176940,1179243,1183871,1184114,1184350,1184631,1185377,1186194,1186482,1186483,1187476,1188062,1188063,1188101,1188257,1188405,1188445,1188504,1188620,1188683,1188746,1188747,1188748,1188770,1188771,1188772,1188773,1188774,1188777,1188838,1188842,1188876,1188885,1188973 CVE References: CVE-2021-21781,CVE-2021-22543,CVE-2021-33909,CVE-2021-3659,CVE-2021-37576 JIRA References: Sources used: SUSE MicroOS 5.0 (src): kernel-rt-5.3.18-48.1 SUSE Linux Enterprise Module for Realtime 15-SP2 (src): kernel-rt-5.3.18-48.1, kernel-rt_debug-5.3.18-48.1, kernel-source-rt-5.3.18-48.1, kernel-syms-rt-5.3.18-48.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1186194 https://bugzilla.suse.com/show_bug.cgi?id=1186194#c32 --- Comment #32 from Swamp Workflow Management <swamp@suse.de> --- openSUSE-SU-2021:2687-1: An update that solves 7 vulnerabilities and has 58 fixes is now available. Category: security (important) Bug References: 1065729,1085224,1094840,1113295,1152472,1152489,1153274,1154353,1155518,1156395,1170511,1176447,1176940,1179243,1180092,1180814,1183871,1184114,1184350,1184631,1184804,1185308,1185377,1185791,1186194,1186206,1186482,1186483,1187215,1187476,1187495,1187585,1188036,1188080,1188101,1188121,1188126,1188176,1188267,1188268,1188269,1188323,1188366,1188405,1188445,1188504,1188620,1188683,1188703,1188720,1188746,1188747,1188748,1188752,1188770,1188771,1188772,1188773,1188774,1188777,1188838,1188876,1188885,1188893,1188973 CVE References: CVE-2021-21781,CVE-2021-22543,CVE-2021-35039,CVE-2021-3609,CVE-2021-3612,CVE-2021-3659,CVE-2021-37576 JIRA References: Sources used: openSUSE Leap 15.3 (src): dtb-aarch64-5.3.18-59.19.1, kernel-64kb-5.3.18-59.19.1, kernel-debug-5.3.18-59.19.1, kernel-default-5.3.18-59.19.1, kernel-default-base-5.3.18-59.19.1.18.10.1, kernel-docs-5.3.18-59.19.1, kernel-kvmsmall-5.3.18-59.19.1, kernel-obs-build-5.3.18-59.19.1, kernel-obs-qa-5.3.18-59.19.1, kernel-preempt-5.3.18-59.19.1, kernel-source-5.3.18-59.19.1, kernel-syms-5.3.18-59.19.1, kernel-zfcpdump-5.3.18-59.19.1 -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1186194 https://bugzilla.suse.com/show_bug.cgi?id=1186194#c33 --- Comment #33 from Swamp Workflow Management <swamp@suse.de> --- SUSE-SU-2021:2687-1: An update that solves 7 vulnerabilities and has 58 fixes is now available. Category: security (important) Bug References: 1065729,1085224,1094840,1113295,1152472,1152489,1153274,1154353,1155518,1156395,1170511,1176447,1176940,1179243,1180092,1180814,1183871,1184114,1184350,1184631,1184804,1185308,1185377,1185791,1186194,1186206,1186482,1186483,1187215,1187476,1187495,1187585,1188036,1188080,1188101,1188121,1188126,1188176,1188267,1188268,1188269,1188323,1188366,1188405,1188445,1188504,1188620,1188683,1188703,1188720,1188746,1188747,1188748,1188752,1188770,1188771,1188772,1188773,1188774,1188777,1188838,1188876,1188885,1188893,1188973 CVE References: CVE-2021-21781,CVE-2021-22543,CVE-2021-35039,CVE-2021-3609,CVE-2021-3612,CVE-2021-3659,CVE-2021-37576 JIRA References: Sources used: SUSE Linux Enterprise Workstation Extension 15-SP3 (src): kernel-default-5.3.18-59.19.1, kernel-preempt-5.3.18-59.19.1 SUSE Linux Enterprise Module for Live Patching 15-SP3 (src): kernel-default-5.3.18-59.19.1, kernel-livepatch-SLE15-SP3_Update_5-1-7.3.1 SUSE Linux Enterprise Module for Legacy Software 15-SP3 (src): kernel-default-5.3.18-59.19.1 SUSE Linux Enterprise Module for Development Tools 15-SP3 (src): kernel-docs-5.3.18-59.19.1, kernel-obs-build-5.3.18-59.19.1, kernel-preempt-5.3.18-59.19.1, kernel-source-5.3.18-59.19.1, kernel-syms-5.3.18-59.19.1 SUSE Linux Enterprise Module for Basesystem 15-SP3 (src): kernel-64kb-5.3.18-59.19.1, kernel-default-5.3.18-59.19.1, kernel-default-base-5.3.18-59.19.1.18.10.1, kernel-preempt-5.3.18-59.19.1, kernel-source-5.3.18-59.19.1, kernel-zfcpdump-5.3.18-59.19.1 SUSE Linux Enterprise High Availability 15-SP3 (src): kernel-default-5.3.18-59.19.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1186194 https://bugzilla.suse.com/show_bug.cgi?id=1186194#c34 --- Comment #34 from Swamp Workflow Management <swamp@suse.de> --- SUSE-SU-2021:2756-1: An update that solves four vulnerabilities and has 37 fixes is now available. Category: security (important) Bug References: 1065729,1085224,1094840,1113295,1153274,1154353,1155518,1156395,1176940,1179243,1180092,1183871,1184114,1184350,1184631,1184804,1185377,1186194,1186206,1186482,1186483,1187476,1188101,1188405,1188445,1188504,1188620,1188683,1188746,1188747,1188748,1188770,1188771,1188772,1188773,1188774,1188777,1188838,1188876,1188885,1188973 CVE References: CVE-2021-21781,CVE-2021-22543,CVE-2021-3659,CVE-2021-37576 JIRA References: Sources used: SUSE MicroOS 5.0 (src): kernel-default-5.3.18-24.78.1, kernel-default-base-5.3.18-24.78.1.9.36.1 SUSE Linux Enterprise Workstation Extension 15-SP2 (src): kernel-default-5.3.18-24.78.1, kernel-preempt-5.3.18-24.78.1 SUSE Linux Enterprise Module for Live Patching 15-SP2 (src): kernel-default-5.3.18-24.78.1, kernel-livepatch-SLE15-SP2_Update_18-1-5.3.1 SUSE Linux Enterprise Module for Legacy Software 15-SP2 (src): kernel-default-5.3.18-24.78.1 SUSE Linux Enterprise Module for Development Tools 15-SP2 (src): kernel-docs-5.3.18-24.78.1, kernel-obs-build-5.3.18-24.78.1, kernel-preempt-5.3.18-24.78.1, kernel-source-5.3.18-24.78.1, kernel-syms-5.3.18-24.78.1 SUSE Linux Enterprise Module for Basesystem 15-SP2 (src): kernel-default-5.3.18-24.78.1, kernel-default-base-5.3.18-24.78.1.9.36.1, kernel-preempt-5.3.18-24.78.1, kernel-source-5.3.18-24.78.1 SUSE Linux Enterprise High Availability 15-SP2 (src): kernel-default-5.3.18-24.78.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1186194 https://bugzilla.suse.com/show_bug.cgi?id=1186194#c35 --- Comment #35 from Libor Pechacek <lpechacek@suse.com> --- (In reply to Takashi Iwai from comment #25)
Libor, just to be sure, could you check the current status with the latest kernel in OBS Kernel:stable? It contains my two patches, but this might still hit the deadlock around napi_disable(). I'd like to verify before looking further.
I confirm that I saw the deadlock with recent TW kernel packages. It's very infrequent in comparison to the previous state, though. Thanks for the fixes! I've tried to locate kernel logs from one of the recent freezes but I cannot find them at the moment. I'll monitor the situation and post updates here if I hit the bug again. Thanks! -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1186194 https://bugzilla.suse.com/show_bug.cgi?id=1186194#c36 Libor Pechacek <lpechacek@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- Status|IN_PROGRESS |RESOLVED Resolution|--- |FIXED Flags|needinfo?(lpechacek@suse.co | |m) | --- Comment #36 from Libor Pechacek <lpechacek@suse.com> --- No freezes over the past two weeks. From the practical point of view, I'd call this bug fixed, and if you don't mind, I'll close it right away. If I encounter the freeze again, I'll reopen the record. Thanks for the fixes! -- You are receiving this mail because: You are on the CC list for the bug.
participants (1)
-
bugzilla_noreply@suse.com