[Bug 1204382] New: kernel-obs-build 5.3 from SLE 15 SP3 is not loading in qemu anymore
https://bugzilla.suse.com/show_bug.cgi?id=1204382 Bug ID: 1204382 Summary: kernel-obs-build 5.3 from SLE 15 SP3 is not loading in qemu anymore Classification: openSUSE Product: openSUSE Distribution Version: Leap 15.3 Hardware: Other OS: Other Status: NEW Severity: Normal Priority: P5 - None Component: Kernel Assignee: kernel-bugs@opensuse.org Reporter: adrian.schroeter@suse.com QA Contact: qa-bugs@suse.de Found By: --- Blocker: --- We noticed that the kernel-obs-build is not loading in KVM for armv7l anymore. This was noticed in openSUSE:Step:15.3 project, but we used this kernel also so far as default kernel for any distributions which do not bring their own kernel. Switching to SP4 has solved the issues, but SP3 kernel used to work also. It might be caused by switching to SP4 as host OS (qemu 5.3 to 6.2), not verified yet. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1204382 Adrian Schr�ter <adrian.schroeter@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |dmueller@suse.com -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1204382 Guillaume GARDET <guillaume.gardet@arm.com> changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |guillaume.gardet@arm.com -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1204382 https://bugzilla.suse.com/show_bug.cgi?id=1204382#c1 --- Comment #1 from Dirk Mueller <dmueller@suse.com> --- it's been failing since March 23, 2022: https://build.opensuse.org/packages/kernel-lpae/job_history/Kernel:SLE15-SP3... -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1204382 https://bugzilla.suse.com/show_bug.cgi?id=1204382#c2 --- Comment #2 from Dirk Mueller <dmueller@suse.com> --- that points at commit fb07e101baad38c2fc38d1d8fde3adf7986fc24d Author: Jeff Mahoney <jeffm@suse.com> Date: Wed Mar 23 16:25:26 2022 -0400 config: enable DEBUG_INFO_BTF This option allows users to access the btf type information for vmlinux but not kernel modules. diff --git a/config/armv7hl/default b/config/armv7hl/default index d44306e3000..95ad0f57481 100644 --- a/config/armv7hl/default +++ b/config/armv7hl/default @@ -10802,7 +10802,7 @@ CONFIG_DEBUG_INFO=y # CONFIG_DEBUG_INFO_REDUCED is not set # CONFIG_DEBUG_INFO_SPLIT is not set CONFIG_DEBUG_INFO_DWARF4=y -# CONFIG_DEBUG_INFO_BTF is not set +CONFIG_DEBUG_INFO_BTF=y # CONFIG_GDB_SCRIPTS is not set CONFIG_ENABLE_MUST_CHECK=y CONFIG_FRAME_WARN=2048 ~ -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1204382 https://bugzilla.suse.com/show_bug.cgi?id=1204382#c3 Michal Suchanek <msuchanek@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |msuchanek@suse.com --- Comment #3 from Michal Suchanek <msuchanek@suse.com> --- That's also enabled on SP4, though. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1204382 https://bugzilla.suse.com/show_bug.cgi?id=1204382#c5 Fabian Vogt <fvogt@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |fvogt@suse.com --- Comment #5 from Fabian Vogt <fvogt@suse.com> --- I think it's because of virtio-console resp. virtio-serial. Using a pl011 with console=ttyS0 instead of virtio-console at hvc0 works. "info qtree" shows that the virto-serial-bus is connected via PCI, but that fails to load: [ 1.652860] pci-host-generic 4010000000.pcie: host bridge /pcie@10000000 ranges: [ 1.653899] pci-host-generic 4010000000.pcie: IO 0x003eff0000..0x003effffff -> 0x0000000000 [ 1.654767] pci-host-generic 4010000000.pcie: MEM 0x0010000000..0x003efeffff -> 0x0010000000 [ 1.654971] pci-host-generic 4010000000.pcie: MEM 0x8000000000..0xffffffffff -> 0x8000000000 [ 1.655672] pci-host-generic 4010000000.pcie: Memory resource size exceeds max for 32 bits [ 1.700588] vmap allocation for size 1052672 failed: use vmalloc=<size> to increase size [ 1.701144] pci-host-generic 4010000000.pcie: ECAM ioremap failed [ 2.203258] pci-host-generic: probe of 4010000000.pcie failed with error -12 -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1204382 https://bugzilla.suse.com/show_bug.cgi?id=1204382#c6 --- Comment #6 from Michal Suchanek <msuchanek@suse.com> --- kernel-syms does build so it's not that the kernel does not boot in OBS https://build.opensuse.org/packages/kernel-syms/job_history/Kernel:SLE15-SP3... -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1204382 https://bugzilla.suse.com/show_bug.cgi?id=1204382#c7 --- Comment #7 from Fabian Vogt <fvogt@suse.com> --- Turns out the high ECAM is indeed the cause. This was made default starting with virt-3.0. With "-M virt-2.12" (or lower) or "-M virt,highmem=off", no_highmem_ecam is set to true and the PCI devices work: [ 1.864887] pci-host-generic 3f000000.pcie: host bridge /pcie@10000000 ranges: [ 1.865711] pci-host-generic 3f000000.pcie: IO 0x003eff0000..0x003effffff -> 0x0000000000 [ 1.866279] pci-host-generic 3f000000.pcie: MEM 0x0010000000..0x003efeffff -> 0x0010000000 [ 1.868112] pci-host-generic 3f000000.pcie: ECAM at [mem 0x3f000000-0x3fffffff] for [bus 00-0f] [ 1.869320] pci-host-generic 3f000000.pcie: PCI host bridge to bus 0000:00 [ 1.869547] pci_bus 0000:00: root bus resource [bus 00-0f] [ 1.869672] pci_bus 0000:00: root bus resource [io 0x0000-0xffff] [ 1.869698] pci_bus 0000:00: root bus resource [mem 0x10000000-0x3efeffff] [ 1.870864] pci 0000:00:00.0: [1b36:0008] type 00 class 0x060000 [ 1.875207] pci 0000:00:01.0: [1af4:1003] type 00 class 0x078000 [ 1.875705] pci 0000:00:01.0: reg 0x10: [io 0x0000-0x003f] [ 1.875809] pci 0000:00:01.0: reg 0x14: [mem 0x00000000-0x00000fff] [ 1.875983] pci 0000:00:01.0: reg 0x20: [mem 0x00000000-0x00003fff 64bit pref] [ 1.878004] PCI: bus0: Fast back to back transfers disabled [ 1.879779] pci 0000:00:01.0: BAR 4: assigned [mem 0x10000000-0x10003fff 64bit pref] [ 1.880167] pci 0000:00:01.0: BAR 1: assigned [mem 0x10004000-0x10004fff] [ 1.880217] pci 0000:00:01.0: BAR 0: assigned [io 0x1000-0x103f] [ 1.901567] virtio-pci 0000:00:01.0: enabling device (0100 -> 0103) Though I wonder whether highmem MMIO shouldn't be supported by the LPAE enabled kernel-obs-build anyway? (In reply to Michal Suchanek from comment #6)
kernel-syms does build so it's not that the kernel does not boot in OBS
https://build.opensuse.org/packages/kernel-syms/job_history/Kernel:SLE15-SP3... ARM/armv7l
As a workaround, the kernel from 15 SP4 is currently used instead, so the issue is not visible on OBS anymore. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1204382 https://bugzilla.suse.com/show_bug.cgi?id=1204382#c8 --- Comment #8 from Dirk Mueller <dmueller@suse.com> --- that indicates https://github.com/torvalds/linux/commit/8fe55ef23387ce3c7488375b1fd539420d7... could be the fix, which landed in 5.14 (SP4) but wasn't backported to SP3 -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1204382 https://bugzilla.suse.com/show_bug.cgi?id=1204382#c9 Michal Suchanek <msuchanek@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |tiwai@suse.com Flags| |needinfo?(tiwai@suse.com) --- Comment #9 from Michal Suchanek <msuchanek@suse.com> --- Takashi, can you have a look please? commit 8fe55ef23387ce3c7488375b1fd539420d7654bb Author: Russell King <rmk+kernel@armlinux.org.uk> Date: Thu May 13 15:18:27 2021 +0100 PCI: Dynamically map ECAM regions -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1204382 https://bugzilla.suse.com/show_bug.cgi?id=1204382#c10 Takashi Iwai <tiwai@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- Flags|needinfo?(tiwai@suse.com) | --- Comment #10 from Takashi Iwai <tiwai@suse.com> --- The backport pushed to my SLE15-SP3/for-next. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1204382 https://bugzilla.suse.com/show_bug.cgi?id=1204382#c11 --- Comment #11 from Takashi Iwai <tiwai@suse.com> --- ... and broke kABI :-< Will retry with a kABI workaround. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1204382 https://bugzilla.suse.com/show_bug.cgi?id=1204382#c12 --- Comment #12 from Takashi Iwai <tiwai@suse.com> --- The kABI fix pushed to SLE15-SP3/for-next. Fingers crossed. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1204382 https://bugzilla.suse.com/show_bug.cgi?id=1204382#c13 --- Comment #13 from Dirk Mueller <dmueller@suse.com> --- fwiw I'm testing this backport in-place in openSUSE:Step:15-SP3 right now (first attempt at testing was wrong, currently recovering from that) -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1204382 https://bugzilla.suse.com/show_bug.cgi?id=1204382#c18 --- Comment #18 from Swamp Workflow Management <swamp@suse.de> --- SUSE-SU-2022:3897-1: An update that solves 33 vulnerabilities, contains one feature and has 15 fixes is now available. Category: security (important) Bug References: 1032323,1065729,1152489,1196018,1198702,1200465,1200788,1201725,1202638,1202686,1202700,1203066,1203098,1203290,1203387,1203391,1203496,1203514,1203770,1203802,1204051,1204053,1204059,1204060,1204125,1204166,1204168,1204354,1204355,1204382,1204402,1204415,1204417,1204431,1204439,1204470,1204479,1204574,1204575,1204619,1204635,1204637,1204646,1204647,1204653,1204728,1204753,1204754 CVE References: CVE-2021-4037,CVE-2022-2153,CVE-2022-28748,CVE-2022-2964,CVE-2022-2978,CVE-2022-3169,CVE-2022-3176,CVE-2022-3424,CVE-2022-3521,CVE-2022-3524,CVE-2022-3535,CVE-2022-3542,CVE-2022-3545,CVE-2022-3565,CVE-2022-3577,CVE-2022-3586,CVE-2022-3594,CVE-2022-3621,CVE-2022-3623,CVE-2022-3625,CVE-2022-3629,CVE-2022-3640,CVE-2022-3646,CVE-2022-3649,CVE-2022-39189,CVE-2022-40768,CVE-2022-41674,CVE-2022-42703,CVE-2022-42719,CVE-2022-42720,CVE-2022-42721,CVE-2022-42722,CVE-2022-43750 JIRA References: PED-1931 Sources used: openSUSE Leap 15.3 (src): kernel-azure-5.3.18-150300.38.83.1, kernel-source-azure-5.3.18-150300.38.83.1, kernel-syms-azure-5.3.18-150300.38.83.1 SUSE Linux Enterprise Module for Public Cloud 15-SP3 (src): kernel-azure-5.3.18-150300.38.83.1, kernel-source-azure-5.3.18-150300.38.83.1, kernel-syms-azure-5.3.18-150300.38.83.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1204382 https://bugzilla.suse.com/show_bug.cgi?id=1204382#c19 --- Comment #19 from Swamp Workflow Management <swamp@suse.de> --- SUSE-SU-2022:3929-1: An update that solves 25 vulnerabilities, contains four features and has 13 fixes is now available. Category: security (important) Bug References: 1032323,1065729,1196018,1198702,1200465,1200788,1201725,1202686,1202700,1203066,1203098,1203387,1203391,1203496,1204053,1204166,1204168,1204354,1204355,1204382,1204402,1204415,1204417,1204431,1204439,1204470,1204479,1204574,1204575,1204619,1204635,1204637,1204646,1204647,1204653,1204728,1204753,1204754 CVE References: CVE-2021-4037,CVE-2022-2153,CVE-2022-28748,CVE-2022-2964,CVE-2022-2978,CVE-2022-3176,CVE-2022-3424,CVE-2022-3521,CVE-2022-3524,CVE-2022-3535,CVE-2022-3542,CVE-2022-3545,CVE-2022-3565,CVE-2022-3577,CVE-2022-3586,CVE-2022-3594,CVE-2022-3621,CVE-2022-3625,CVE-2022-3629,CVE-2022-3640,CVE-2022-3646,CVE-2022-3649,CVE-2022-39189,CVE-2022-42703,CVE-2022-43750 JIRA References: PED-1931,SLE-13847,SLE-24559,SLE-9246 Sources used: openSUSE Leap Micro 5.2 (src): kernel-rt-5.3.18-150300.109.1 SUSE Linux Enterprise Module for Realtime 15-SP3 (src): kernel-rt-5.3.18-150300.109.1, kernel-rt_debug-5.3.18-150300.109.1, kernel-source-rt-5.3.18-150300.109.1, kernel-syms-rt-5.3.18-150300.109.1 SUSE Linux Enterprise Micro 5.2 (src): kernel-rt-5.3.18-150300.109.1 SUSE Linux Enterprise Micro 5.1 (src): kernel-rt-5.3.18-150300.109.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1204382 https://bugzilla.suse.com/show_bug.cgi?id=1204382#c20 --- Comment #20 from Swamp Workflow Management <swamp@suse.de> --- SUSE-SU-2022:4053-1: An update that solves 24 vulnerabilities, contains four features and has 16 fixes is now available. Category: security (important) Bug References: 1032323,1065729,1152489,1198702,1200465,1200788,1201725,1202638,1202686,1202700,1203066,1203098,1203387,1203391,1203496,1203802,1204053,1204166,1204168,1204354,1204355,1204382,1204402,1204415,1204417,1204431,1204439,1204470,1204479,1204574,1204575,1204619,1204635,1204637,1204646,1204647,1204653,1204728,1204753,1204754 CVE References: CVE-2021-4037,CVE-2022-2153,CVE-2022-2964,CVE-2022-2978,CVE-2022-3176,CVE-2022-3424,CVE-2022-3521,CVE-2022-3524,CVE-2022-3535,CVE-2022-3542,CVE-2022-3545,CVE-2022-3565,CVE-2022-3577,CVE-2022-3586,CVE-2022-3594,CVE-2022-3621,CVE-2022-3625,CVE-2022-3629,CVE-2022-3640,CVE-2022-3646,CVE-2022-3649,CVE-2022-39189,CVE-2022-42703,CVE-2022-43750 JIRA References: PED-1931,SLE-13847,SLE-24559,SLE-9246 Sources used: openSUSE Leap Micro 5.2 (src): kernel-default-5.3.18-150300.59.101.1, kernel-default-base-5.3.18-150300.59.101.1.150300.18.58.1 openSUSE Leap 15.4 (src): dtb-aarch64-5.3.18-150300.59.101.1 openSUSE Leap 15.3 (src): dtb-aarch64-5.3.18-150300.59.101.1, kernel-64kb-5.3.18-150300.59.101.1, kernel-debug-5.3.18-150300.59.101.1, kernel-default-5.3.18-150300.59.101.1, kernel-default-base-5.3.18-150300.59.101.1.150300.18.58.1, kernel-docs-5.3.18-150300.59.101.1, kernel-kvmsmall-5.3.18-150300.59.101.1, kernel-obs-build-5.3.18-150300.59.101.1, kernel-obs-qa-5.3.18-150300.59.101.1, kernel-preempt-5.3.18-150300.59.101.1, kernel-source-5.3.18-150300.59.101.1, kernel-syms-5.3.18-150300.59.101.1, kernel-zfcpdump-5.3.18-150300.59.101.1 SUSE Linux Enterprise Workstation Extension 15-SP3 (src): kernel-default-5.3.18-150300.59.101.1, kernel-preempt-5.3.18-150300.59.101.1 SUSE Linux Enterprise Module for Live Patching 15-SP3 (src): kernel-default-5.3.18-150300.59.101.1, kernel-livepatch-SLE15-SP3_Update_26-1-150300.7.3.1 SUSE Linux Enterprise Module for Legacy Software 15-SP3 (src): kernel-default-5.3.18-150300.59.101.1 SUSE Linux Enterprise Module for Development Tools 15-SP3 (src): kernel-docs-5.3.18-150300.59.101.1, kernel-obs-build-5.3.18-150300.59.101.1, kernel-preempt-5.3.18-150300.59.101.1, kernel-source-5.3.18-150300.59.101.1, kernel-syms-5.3.18-150300.59.101.1 SUSE Linux Enterprise Module for Basesystem 15-SP3 (src): kernel-64kb-5.3.18-150300.59.101.1, kernel-default-5.3.18-150300.59.101.1, kernel-default-base-5.3.18-150300.59.101.1.150300.18.58.1, kernel-preempt-5.3.18-150300.59.101.1, kernel-source-5.3.18-150300.59.101.1, kernel-zfcpdump-5.3.18-150300.59.101.1 SUSE Linux Enterprise Micro 5.2 (src): kernel-default-5.3.18-150300.59.101.1, kernel-default-base-5.3.18-150300.59.101.1.150300.18.58.1 SUSE Linux Enterprise Micro 5.1 (src): kernel-default-5.3.18-150300.59.101.1, kernel-default-base-5.3.18-150300.59.101.1.150300.18.58.1 SUSE Linux Enterprise High Availability 15-SP3 (src): kernel-default-5.3.18-150300.59.101.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. -- You are receiving this mail because: You are on the CC list for the bug.
participants (1)
-
bugzilla_noreply@suse.com