[Bug 1203505] New: 5.14.21-150400.24.21 failes to boot with hard lock on MSI GS66
https://bugzilla.suse.com/show_bug.cgi?id=1203505 Bug ID: 1203505 Summary: 5.14.21-150400.24.21 failes to boot with hard lock on MSI GS66 Classification: openSUSE Product: openSUSE Distribution Version: Leap 15.4 Hardware: x86-64 OS: openSUSE Leap 15.4 Status: NEW Severity: Normal Priority: P5 - None Component: Kernel Assignee: kernel-bugs@opensuse.org Reporter: onur@delipenguen.net QA Contact: qa-bugs@suse.de Found By: --- Blocker: --- Created attachment 861528 --> https://bugzilla.suse.com/attachment.cgi?id=861528&action=edit hard lock Booting 5.14.21-150400.24.21 causes a hard lock on MSI GS66 notebook with the caps lock led blinking and I am not able to do anything. Hard lock always happens. 5.14.21-150400.24.18 works fine, did not have this issue on any of the previous kernels either. I get the same trace on both normal boot and rescue mode boot. I use i915.force_probe=46a6 as extra kernel parameter, removing that does not help, still hard lock. Attached are the photo of trace on hard lock and dmesg output on successful boot with previous kernel. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1203505 https://bugzilla.suse.com/show_bug.cgi?id=1203505#c1 Onur K���k <onur@delipenguen.net> changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |onur@delipenguen.net --- Comment #1 from Onur K���k <onur@delipenguen.net> --- Created attachment 861529 --> https://bugzilla.suse.com/attachment.cgi?id=861529&action=edit successful boot with 5.14.21-150400.24.18 -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1203505 https://bugzilla.suse.com/show_bug.cgi?id=1203505#c2 Takashi Iwai <tiwai@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |tiwai@suse.com Flags| |needinfo?(onur@delipenguen. | |net) --- Comment #2 from Takashi Iwai <tiwai@suse.com> --- Just a blind shot: could you try to boot with iommu=off boot option? (Or intel_iommu=off) -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1203505 https://bugzilla.suse.com/show_bug.cgi?id=1203505#c3 --- Comment #3 from Onur K���k <onur@delipenguen.net> --- Created attachment 861537 --> https://bugzilla.suse.com/attachment.cgi?id=861537&action=edit dmesg with intel_iommu=off -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1203505 https://bugzilla.suse.com/show_bug.cgi?id=1203505#c4 --- Comment #4 from Onur K���k <onur@delipenguen.net> --- With iommu=off I still get the hard lock, but with intel_iommu=off system booted fine. Attached dmesg on 5.14.21-150400.24.21 with intel_iommu off. Curious what has changed with the latest update, note I have been using 15.4 on this computer since pre RC and did not need to disable iommu. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1203505 Onur K���k <onur@delipenguen.net> changed: What |Removed |Added ---------------------------------------------------------------------------- Summary|5.14.21-150400.24.21 failes |5.14.21-150400.24.21 fails |to boot with hard lock on |to boot with hard lock on |MSI GS66 |MSI GS66 -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1203505 https://bugzilla.suse.com/show_bug.cgi?id=1203505#c5 Takashi Iwai <tiwai@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- Assignee|kernel-bugs@opensuse.org |jroedel@suse.com --- Comment #5 from Takashi Iwai <tiwai@suse.com> --- Then it's likely a regression of the fixes we've had recently in SLE15-SP4 branch. Joerg, could you check it? -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1203505 https://bugzilla.suse.com/show_bug.cgi?id=1203505#c7 Takashi Iwai <tiwai@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |noga.dany@gmail.com --- Comment #7 from Takashi Iwai <tiwai@suse.com> --- *** Bug 1203543 has been marked as a duplicate of this bug. *** -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1203505 https://bugzilla.suse.com/show_bug.cgi?id=1203505#c8 Takashi Iwai <tiwai@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- Flags|needinfo?(onur@delipenguen. |needinfo? |net) | --- Comment #8 from Takashi Iwai <tiwai@suse.com> --- Now I took a deeper look at the current code. It seems that the backport patch patches.suse/iommu-vt-d-Acquiring-lock-in-domain-ID-allocation-helpers doesn't fit well with SLE15-SP4 code. It missed the removal of spinlock from a couple of places, and it resulted in a spin deadlock. I'm building a test kernel with the corrected patch. It's being built in OBS home:tiwai:bsc1203505 repo. Once after the build finishes (takes an hour or so), the test kernel package will appear at http://download.opensuse.org/repositories/home:/tiwai:/bsc1203505/pool/ Can anyone give it a try later? -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1203505 https://bugzilla.suse.com/show_bug.cgi?id=1203505#c9 --- Comment #9 from Takashi Iwai <tiwai@suse.com> --- Note that it's an unofficial build, hence disable Secure Boot on BIOS for testing it, if you've enabled Secure Boot beforehand. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1203505 https://bugzilla.suse.com/show_bug.cgi?id=1203505#c10 --- Comment #10 from Onur K���k <onur@delipenguen.net> --- Thank you Takashi Iwai ! The test kernel boots fine without disabling intel_iommu. Attaching dmesg for test boot. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1203505 https://bugzilla.suse.com/show_bug.cgi?id=1203505#c11 --- Comment #11 from Onur K���k <onur@delipenguen.net> --- Created attachment 861681 --> https://bugzilla.suse.com/attachment.cgi?id=861681&action=edit dmesg with test kernel 5.14.21-150400.1.gb7b24a0 -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1203505 https://bugzilla.suse.com/show_bug.cgi?id=1203505#c12 Takashi Iwai <tiwai@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- Status|NEW |RESOLVED Resolution|--- |FIXED Flags|needinfo? | --- Comment #12 from Takashi Iwai <tiwai@suse.com> --- Good to hear. I pushed the fix to SLE15-SP4 branch now, so that it'll be included in the next maintenance update. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1203505 https://bugzilla.suse.com/show_bug.cgi?id=1203505#c13 Takashi Iwai <tiwai@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |msvec@suse.com --- Comment #13 from Takashi Iwai <tiwai@suse.com> --- *** Bug 1203747 has been marked as a duplicate of this bug. *** -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1203505 https://bugzilla.suse.com/show_bug.cgi?id=1203505#c14 Takashi Iwai <tiwai@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |sazhufa@189.cn --- Comment #14 from Takashi Iwai <tiwai@suse.com> --- *** Bug 1203719 has been marked as a duplicate of this bug. *** -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1203505 https://bugzilla.suse.com/show_bug.cgi?id=1203505#c20 Vasilis Liaskovitis <vliaskovitis@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |pavel.svoboda@suse.com --- Comment #20 from Vasilis Liaskovitis <vliaskovitis@suse.com> --- *** Bug 1204031 has been marked as a duplicate of this bug. *** -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1203505 https://bugzilla.suse.com/show_bug.cgi?id=1203505#c22 --- Comment #22 from Swamp Workflow Management <swamp@suse.de> --- SUSE-SU-2022:3585-1: An update that solves 9 vulnerabilities, contains 12 features and has 38 fixes is now available. Category: security (important) Bug References: 1152472,1152489,1185032,1190497,1194023,1194869,1195917,1196444,1196869,1197659,1198189,1200622,1201309,1201310,1201987,1202095,1202960,1203039,1203066,1203101,1203197,1203263,1203338,1203360,1203361,1203389,1203410,1203505,1203552,1203664,1203693,1203699,1203701,1203767,1203769,1203794,1203798,1203893,1203902,1203906,1203908,1203933,1203935,1203939,1203969,1203987,1203992 CVE References: CVE-2022-1263,CVE-2022-2586,CVE-2022-3202,CVE-2022-3239,CVE-2022-3303,CVE-2022-39189,CVE-2022-41218,CVE-2022-41848,CVE-2022-41849 JIRA References: PED-387,PED-529,PED-652,PED-664,PED-682,PED-688,PED-720,PED-729,PED-755,PED-763,SLE-19924,SLE-24814 Sources used: openSUSE Leap 15.4 (src): kernel-azure-5.14.21-150400.14.16.1, kernel-source-azure-5.14.21-150400.14.16.1, kernel-syms-azure-5.14.21-150400.14.16.1 SUSE Linux Enterprise Module for Public Cloud 15-SP4 (src): kernel-azure-5.14.21-150400.14.16.1, kernel-source-azure-5.14.21-150400.14.16.1, kernel-syms-azure-5.14.21-150400.14.16.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1203505 https://bugzilla.suse.com/show_bug.cgi?id=1203505#c25 Claudio Fontana <claudio.fontana@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |dawei.pang@suse.com --- Comment #25 from Claudio Fontana <claudio.fontana@suse.com> --- *** Bug 1204298 has been marked as a duplicate of this bug. *** -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1203505 https://bugzilla.suse.com/show_bug.cgi?id=1203505#c26 Claudio Fontana <claudio.fontana@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |jcao@suse.com --- Comment #26 from Claudio Fontana <claudio.fontana@suse.com> --- *** Bug 1204197 has been marked as a duplicate of this bug. *** -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1203505 https://bugzilla.suse.com/show_bug.cgi?id=1203505#c28 --- Comment #28 from Swamp Workflow Management <swamp@suse.de> --- SUSE-SU-2022:3844-1: An update that solves 15 vulnerabilities, contains 12 features and has 33 fixes is now available. Category: security (important) Bug References: 1185032,1190497,1194023,1194869,1195917,1196444,1196869,1197659,1198189,1200288,1200622,1201309,1201310,1201987,1202095,1202960,1203039,1203066,1203101,1203197,1203263,1203338,1203360,1203361,1203389,1203410,1203505,1203552,1203664,1203693,1203699,1203767,1203769,1203770,1203794,1203798,1203893,1203902,1203906,1203908,1203935,1203939,1203987,1203992,1204051,1204059,1204060,1204125 CVE References: CVE-2022-1263,CVE-2022-2586,CVE-2022-3202,CVE-2022-32296,CVE-2022-3239,CVE-2022-3303,CVE-2022-39189,CVE-2022-41218,CVE-2022-41674,CVE-2022-41848,CVE-2022-41849,CVE-2022-42719,CVE-2022-42720,CVE-2022-42721,CVE-2022-42722 JIRA References: PED-387,PED-529,PED-652,PED-664,PED-682,PED-688,PED-720,PED-729,PED-755,PED-763,SLE-19924,SLE-24814 Sources used: openSUSE Leap 15.4 (src): dtb-aarch64-5.14.21-150400.24.28.1, kernel-64kb-5.14.21-150400.24.28.1, kernel-debug-5.14.21-150400.24.28.1, kernel-default-5.14.21-150400.24.28.1, kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5, kernel-docs-5.14.21-150400.24.28.1, kernel-kvmsmall-5.14.21-150400.24.28.1, kernel-obs-build-5.14.21-150400.24.28.1, kernel-obs-qa-5.14.21-150400.24.28.1, kernel-source-5.14.21-150400.24.28.1, kernel-syms-5.14.21-150400.24.28.1, kernel-zfcpdump-5.14.21-150400.24.28.1 SUSE Linux Enterprise Workstation Extension 15-SP4 (src): kernel-default-5.14.21-150400.24.28.1 SUSE Linux Enterprise Module for Live Patching 15-SP4 (src): kernel-default-5.14.21-150400.24.28.1, kernel-livepatch-SLE15-SP4_Update_4-1-150400.9.3.5 SUSE Linux Enterprise Module for Legacy Software 15-SP4 (src): kernel-default-5.14.21-150400.24.28.1 SUSE Linux Enterprise Module for Development Tools 15-SP4 (src): kernel-docs-5.14.21-150400.24.28.1, kernel-obs-build-5.14.21-150400.24.28.1, kernel-source-5.14.21-150400.24.28.1, kernel-syms-5.14.21-150400.24.28.1 SUSE Linux Enterprise Module for Basesystem 15-SP4 (src): kernel-64kb-5.14.21-150400.24.28.1, kernel-default-5.14.21-150400.24.28.1, kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5, kernel-source-5.14.21-150400.24.28.1, kernel-zfcpdump-5.14.21-150400.24.28.1 SUSE Linux Enterprise Micro 5.3 (src): kernel-default-5.14.21-150400.24.28.1, kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5 SUSE Linux Enterprise High Availability 15-SP4 (src): kernel-default-5.14.21-150400.24.28.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1203505 https://bugzilla.suse.com/show_bug.cgi?id=1203505#c29 Wayne Chen <wchen@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |wchen@suse.com --- Comment #29 from Wayne Chen <wchen@suse.com> --- Anyone can help confirm whether this bug had already been fixed in SLES product ? -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1203505 https://bugzilla.suse.com/show_bug.cgi?id=1203505#c30 --- Comment #30 from Joerg Roedel <jroedel@suse.com> --- (In reply to Wayne Chen from comment #29)
Anyone can help confirm whether this bug had already been fixed in SLES product ?
Yes it is, pleas see comment 28 for details. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1203505 https://bugzilla.suse.com/show_bug.cgi?id=1203505#c35 --- Comment #35 from Swamp Workflow Management <swamp@suse.de> --- SUSE-SU-2022:4617-1: An update that solves 96 vulnerabilities, contains 50 features and has 246 fixes is now available. Category: security (important) Bug References: 1023051,1032323,1065729,1071995,1152472,1152489,1156395,1164051,1177471,1184350,1185032,1188238,1189297,1189999,1190256,1190497,1190969,1192968,1193629,1194023,1194592,1194869,1194904,1195480,1195917,1196018,1196444,1196616,1196632,1196867,1196869,1197158,1197391,1197659,1197755,1197756,1197757,1197763,1198189,1198410,1198577,1198702,1198971,1199086,1199364,1199515,1199670,1199904,1200015,1200058,1200268,1200288,1200301,1200313,1200431,1200465,1200494,1200544,1200567,1200622,1200644,1200651,1200692,1200788,1200845,1200868,1200869,1200870,1200871,1200872,1200873,1201019,1201308,1201309,1201310,1201361,1201427,1201442,1201455,1201489,1201610,1201675,1201725,1201726,1201768,1201865,1201940,1201941,1201948,1201954,1201956,1201958,1202095,1202096,1202097,1202113,1202131,1202154,1202187,1202262,1202265,1202312,1202341,1202346,1202347,1202385,1202393,1202447,1202471,1202558,1202623,1202636,1202672,1202681,1202685,1202686,1202700,1202710,1202711,1202712,1202713,1202715,1202716,1202757,120275 8,1202759,1202761,1202762,1202763,1202764,1202765,1202766,1202767,1202768,1202769,1202770,1202771,1202773,1202774,1202775,1202776,1202778,1202779,1202780,1202781,1202782,1202783,1202822,1202823,1202824,1202860,1202867,1202872,1202874,1202898,1202914,1202960,1202989,1202992,1202993,1203002,1203008,1203036,1203039,1203041,1203063,1203066,1203067,1203098,1203101,1203107,1203116,1203117,1203138,1203139,1203159,1203183,1203197,1203208,1203229,1203263,1203290,1203338,1203360,1203361,1203389,1203391,1203410,1203435,1203505,1203511,1203514,1203552,1203606,1203664,1203693,1203699,1203767,1203769,1203770,1203794,1203798,1203802,1203829,1203893,1203902,1203906,1203908,1203922,1203935,1203939,1203960,1203969,1203987,1203992,1203994,1204017,1204051,1204059,1204060,1204092,1204125,1204132,1204142,1204166,1204168,1204170,1204171,1204183,1204228,1204241,1204289,1204290,1204291,1204292,1204353,1204354,1204355,1204402,1204405,1204413,1204414,1204415,1204417,1204424,1204428,1204431,1204432,1204439,120 4470,1204479,1204486,1204498,1204533,1204569,1204574,1204575,1204576,1204619,1204624,1204631,1204635,1204636,1204637,1204646,1204647,1204650,1204653,1204693,1204705,1204719,1204728,1204745,1204753,1204780,1204810,1204850,1204868,1204926,1204933,1204934,1204947,1204957,1204963,1204970,1205007,1205100,1205111,1205113,1205128,1205130,1205149,1205153,1205220,1205257,1205264,1205282,1205313,1205331,1205332,1205427,1205428,1205473,1205496,1205507,1205514,1205521,1205567,1205616,1205617,1205653,1205671,1205679,1205683,1205700,1205705,1205709,1205711,1205744,1205764,1205796,1205882,1205993,1206035,1206036,1206037,1206045,1206046,1206047,1206048,1206049,1206050,1206051,1206056,1206057,1206113,1206114,1206147,1206149,1206207,1206273,1206391 CVE References: CVE-2016-3695,CVE-2020-16119,CVE-2020-36516,CVE-2021-33135,CVE-2021-4037,CVE-2022-1184,CVE-2022-1263,CVE-2022-1882,CVE-2022-20368,CVE-2022-20369,CVE-2022-2153,CVE-2022-2586,CVE-2022-2588,CVE-2022-2602,CVE-2022-26373,CVE-2022-2639,CVE-2022-2663,CVE-2022-28356,CVE-2022-28693,CVE-2022-2873,CVE-2022-28748,CVE-2022-2905,CVE-2022-2938,CVE-2022-2959,CVE-2022-2964,CVE-2022-2977,CVE-2022-2978,CVE-2022-3028,CVE-2022-3078,CVE-2022-3114,CVE-2022-3169,CVE-2022-3176,CVE-2022-3202,CVE-2022-32250,CVE-2022-32296,CVE-2022-3239,CVE-2022-3303,CVE-2022-33981,CVE-2022-3424,CVE-2022-3435,CVE-2022-3521,CVE-2022-3524,CVE-2022-3526,CVE-2022-3535,CVE-2022-3542,CVE-2022-3545,CVE-2022-3565,CVE-2022-3566,CVE-2022-3567,CVE-2022-3577,CVE-2022-3586,CVE-2022-3594,CVE-2022-3619,CVE-2022-3621,CVE-2022-3625,CVE-2022-3628,CVE-2022-3629,CVE-2022-3633,CVE-2022-3635,CVE-2022-3640,CVE-2022-3643,CVE-2022-3646,CVE-2022-3649,CVE-2022-36879,CVE-2022-36946,CVE-2022-3707,CVE-2022-3903,CVE-2022-39188,CVE-2022-39189,CVE-2022-39190,C VE-2022-40476,CVE-2022-40768,CVE-2022-4095,CVE-2022-41218,CVE-2022-4129,CVE-2022-4139,CVE-2022-41674,CVE-2022-41848,CVE-2022-41849,CVE-2022-41850,CVE-2022-41858,CVE-2022-42328,CVE-2022-42329,CVE-2022-42703,CVE-2022-42719,CVE-2022-42720,CVE-2022-42721,CVE-2022-42722,CVE-2022-42895,CVE-2022-42896,CVE-2022-43750,CVE-2022-4378,CVE-2022-43945,CVE-2022-45869,CVE-2022-45888,CVE-2022-45934 JIRA References: PED-1082,PED-1084,PED-1085,PED-1096,PED-1211,PED-1573,PED-1649,PED-1706,PED-1936,PED-2684,PED-387,PED-529,PED-611,PED-634,PED-652,PED-664,PED-676,PED-678,PED-679,PED-682,PED-688,PED-707,PED-720,PED-729,PED-732,PED-755,PED-763,PED-813,PED-817,PED-822,PED-824,PED-825,PED-833,PED-842,PED-846,PED-849,PED-850,PED-851,PED-856,PED-857,SLE-13847,SLE-18130,SLE-19359,SLE-19924,SLE-20183,SLE-23766,SLE-24572,SLE-24682,SLE-24814,SLE-9246 Sources used: openSUSE Leap Micro 5.3 (src): kernel-rt-5.14.21-150400.15.5.1 openSUSE Leap 15.4 (src): kernel-rt-5.14.21-150400.15.5.1, kernel-rt_debug-5.14.21-150400.15.5.1, kernel-source-rt-5.14.21-150400.15.5.1, kernel-syms-rt-5.14.21-150400.15.5.1 SUSE Linux Enterprise Module for Realtime 15-SP4 (src): kernel-rt-5.14.21-150400.15.5.1, kernel-rt_debug-5.14.21-150400.15.5.1, kernel-source-rt-5.14.21-150400.15.5.1, kernel-syms-rt-5.14.21-150400.15.5.1 SUSE Linux Enterprise Module for Live Patching 15-SP4 (src): kernel-livepatch-SLE15-SP4-RT_Update_1-1-150400.1.3.1 SUSE Linux Enterprise Micro 5.3 (src): kernel-rt-5.14.21-150400.15.5.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. -- You are receiving this mail because: You are on the CC list for the bug.
participants (1)
-
bugzilla_noreply@suse.com