[Kernel-packages] [Bug 1959665] Re: linux-image-5.4.0-97.110 freezes by accessing cifs shares
Hi Tim, i also can confirm that 5.4.0-99.112 fixes the bug. Testscript runs for more than a hour with this kernel without freezing the machine. Thanks! ** Tags removed: verification-needed-focal ** Tags added: verification-done-focal -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1959665 Title: linux-image-5.4.0-97.110 freezes by accessing cifs shares Status in linux package in Ubuntu: Invalid Status in linux source package in Focal: Fix Released Bug description: Ubuntu 20.04 with kernel image 5.4.0-97.110 randomly freezes when we access cifs shares. The system needs a hard reset after the freeze. The previous kernel image (5.4.0-96.109) does not show this behavior. Multiple Ubuntu 20.04 systems running on kernel image 9.4.0-97.110 are affected on our sites. The cifs shares are accessed via autofs using Kerberos authentication. The following info is the only error message we could actively catch on a different system before the system was frozen: general protection fault: [#3] SMP PTI CPU: 0 PID: 21294 Comm: automount Tainted: G DOE 5.4.0-97-generic #110-Ubuntu Hardware name: Dell Inc. Precision 7530/03RV2M, BIOS 1.14.4 10/21/2020 RIP: 0010:kmem_cache_alloc_trace+0x8c/0x240 Code: 08 65 4c 03 05 1d e8 f7 6e 49 83 78 10 00 4d 8b 38 0f 84 92 01 00 00 4d 85 ff 0f 84 89 01 00 00 41 8b 41 20 49 8b 39 4c 01 f8 <48> 8b 18 48 89 c1 49 33 99 70 01 00 00 4c 89 f8 48 0f c9 48 31 cb RSP: 0018:a6ca860f7ba0 EFLAGS: 00010286 RAX: fdd44d7c219190e1 RBX: RCX: RDX: d558 RSI: 0cc0 RDI: 00035060 RBP: a6ca860f7bd0 R08: 99233c035060 R09: 992338c079c0 R10: 0001 R11: 0004 R12: 0cc0 R13: 000b R14: 992338c079c0 R15: fdd44d7c219190e1 FS: 7fdc24e29700() GS:99233c00() knlGS: CS: 0010 DS: ES: CR0: 80050033 CR2: 7f15a80ee010 CR3: 0007e36b2006 CR4: 003606f0 Call Trace: ? proc_self_get_link+0x70/0xd0 proc_self_get_link+0x70/0xd0 link_path_walk.part.0+0x478/0x550 ? trailing_symlink+0x1d1/0x280 path_openat+0xb7/0x290 do_filp_open+0x91/0x100 ? unuse_pde+0x30/0x30 do_sys_open+0x17e/0x290 __x64_sys_openat+0x20/0x30 __orig_openat+0x71/0xc0 [eset_rtp] ? __switch_to_asm+0x40/0x70 ? __switch_to_asm+0x34/0x70 ? __switch_to_asm+0x40/0x70 ? __x64_sys_futex+0x13f/0x170 ? __switch_to_asm+0x34/0x70 ? __switch_to_asm+0x40/0x70 ? __switch_to_asm+0x34/0x70 ? __switch_to_asm+0x40/0x70 __x64_sys_ertp_openat+0x29/0x60 [eset_rtp] do_syscall_64+0x57/0x190 entry_SYSCALL_64_after_hwframe+0x44/0xa9 RIP: 0033:0x7fdc28a41f24 Code: 24 20 eb 8f 66 90 44 89 54 24 0c e8 56 68 f8 ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 32 44 89 c7 89 44 24 0c e8 88 68 f8 ff 8b 44 RSP: 002b:7fdc24e25980 EFLAGS: 0293 ORIG_RAX: 0101 RAX: ffda RBX: 7fdc040008d0 RCX: 7fdc28a41f24 ? unuse_pde+0x30/0x30 do_sys_open+0x17e/0x290 __x64_sys_openat+0x20/0x30 __orig_openat+0x71/0xc0 [eset_rtp] ? __switch_to_asm+0x40/0x70 ? __switch_to_asm+0x34/0x70 ? __switch_to_asm+0x40/0x70 ? __x64_sys_futex+0x13f/0x170 ? __switch_to_asm+0x34/0x70 ? __switch_to_asm+0x40/0x70 ? __switch_to_asm+0x34/0x70 ? __switch_to_asm+0x40/0x70 __x64_sys_ertp_openat+0x29/0x60 [eset_rtp] do_syscall_64+0x57/0x190 entry_SYSCALL_64_after_hwframe+0x44/0xa9 RIP: 0033:0x7fdc28a41f24 Code: 24 20 eb 8f 66 90 44 89 54 24 0c e8 56 68 f8 ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 32 44 89 c7 89 44 24 0c e8 88 68 f8 ff 8b 44 RSP: 002b:7fdc24e25980 EFLAGS: 0293 ORIG_RAX: 0101 RAX: ffda RBX: 7fdc040008d0 RCX: 7fdc28a41f24 RDX: 0008 RSI: 564d4410a8c8 RDI: ff9c RBP: 564d4410a8c8 R08: R09: 0001 R10: R11: 0293 R12: 0008 R13: 564d4410e28a R14: 7fdc24e25b40 R15: 7fdc24e28fc0 Modules linked in: cmac nls_utf8 cifs fscache libdes ccm vboxnetadp(OE) vboxnetflt(OE) vboxdrv(OE) eset_rtp(OE) xt_conntrack xt_MASQUERADE nf_conntrack_netlink nfnetlink xfrm_user xfrm_algo xt_addrtype iptable_filter iptable_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ip> snd_seq_midi coretemp snd_seq_midi_event snd_rawmidi kvm_intel snd_seq kvm dell_wmi snd_seq_device rapl dell_smbios snd_timer dcdbas intel_cstate input_leds iwlwifi serio_raw snd intel_wmi_thunderbolt rtsx_pci_ms dell_wmi_descriptor wmi_bmof processor_thermal_device ucsi_acp> pinctrl_cannonlake video pinctrl_intel ---[ end trace 80828f22da45a19b ]--- RI
[Kernel-packages] [Bug 1959665] Re: linux-image-5.4.0-97.110 freezes by accessing cifs shares
Hi Tim, I can confirm that 5.4.0-99.112 fixes the cifs issue. Testing in our environment does not show any freezes accessing cifs shares while using 5.4.0-99.112. Best Regards, Sebastian -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1959665 Title: linux-image-5.4.0-97.110 freezes by accessing cifs shares Status in linux package in Ubuntu: Invalid Status in linux source package in Focal: Fix Released Bug description: Ubuntu 20.04 with kernel image 5.4.0-97.110 randomly freezes when we access cifs shares. The system needs a hard reset after the freeze. The previous kernel image (5.4.0-96.109) does not show this behavior. Multiple Ubuntu 20.04 systems running on kernel image 9.4.0-97.110 are affected on our sites. The cifs shares are accessed via autofs using Kerberos authentication. The following info is the only error message we could actively catch on a different system before the system was frozen: general protection fault: [#3] SMP PTI CPU: 0 PID: 21294 Comm: automount Tainted: G DOE 5.4.0-97-generic #110-Ubuntu Hardware name: Dell Inc. Precision 7530/03RV2M, BIOS 1.14.4 10/21/2020 RIP: 0010:kmem_cache_alloc_trace+0x8c/0x240 Code: 08 65 4c 03 05 1d e8 f7 6e 49 83 78 10 00 4d 8b 38 0f 84 92 01 00 00 4d 85 ff 0f 84 89 01 00 00 41 8b 41 20 49 8b 39 4c 01 f8 <48> 8b 18 48 89 c1 49 33 99 70 01 00 00 4c 89 f8 48 0f c9 48 31 cb RSP: 0018:a6ca860f7ba0 EFLAGS: 00010286 RAX: fdd44d7c219190e1 RBX: RCX: RDX: d558 RSI: 0cc0 RDI: 00035060 RBP: a6ca860f7bd0 R08: 99233c035060 R09: 992338c079c0 R10: 0001 R11: 0004 R12: 0cc0 R13: 000b R14: 992338c079c0 R15: fdd44d7c219190e1 FS: 7fdc24e29700() GS:99233c00() knlGS: CS: 0010 DS: ES: CR0: 80050033 CR2: 7f15a80ee010 CR3: 0007e36b2006 CR4: 003606f0 Call Trace: ? proc_self_get_link+0x70/0xd0 proc_self_get_link+0x70/0xd0 link_path_walk.part.0+0x478/0x550 ? trailing_symlink+0x1d1/0x280 path_openat+0xb7/0x290 do_filp_open+0x91/0x100 ? unuse_pde+0x30/0x30 do_sys_open+0x17e/0x290 __x64_sys_openat+0x20/0x30 __orig_openat+0x71/0xc0 [eset_rtp] ? __switch_to_asm+0x40/0x70 ? __switch_to_asm+0x34/0x70 ? __switch_to_asm+0x40/0x70 ? __x64_sys_futex+0x13f/0x170 ? __switch_to_asm+0x34/0x70 ? __switch_to_asm+0x40/0x70 ? __switch_to_asm+0x34/0x70 ? __switch_to_asm+0x40/0x70 __x64_sys_ertp_openat+0x29/0x60 [eset_rtp] do_syscall_64+0x57/0x190 entry_SYSCALL_64_after_hwframe+0x44/0xa9 RIP: 0033:0x7fdc28a41f24 Code: 24 20 eb 8f 66 90 44 89 54 24 0c e8 56 68 f8 ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 32 44 89 c7 89 44 24 0c e8 88 68 f8 ff 8b 44 RSP: 002b:7fdc24e25980 EFLAGS: 0293 ORIG_RAX: 0101 RAX: ffda RBX: 7fdc040008d0 RCX: 7fdc28a41f24 ? unuse_pde+0x30/0x30 do_sys_open+0x17e/0x290 __x64_sys_openat+0x20/0x30 __orig_openat+0x71/0xc0 [eset_rtp] ? __switch_to_asm+0x40/0x70 ? __switch_to_asm+0x34/0x70 ? __switch_to_asm+0x40/0x70 ? __x64_sys_futex+0x13f/0x170 ? __switch_to_asm+0x34/0x70 ? __switch_to_asm+0x40/0x70 ? __switch_to_asm+0x34/0x70 ? __switch_to_asm+0x40/0x70 __x64_sys_ertp_openat+0x29/0x60 [eset_rtp] do_syscall_64+0x57/0x190 entry_SYSCALL_64_after_hwframe+0x44/0xa9 RIP: 0033:0x7fdc28a41f24 Code: 24 20 eb 8f 66 90 44 89 54 24 0c e8 56 68 f8 ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 32 44 89 c7 89 44 24 0c e8 88 68 f8 ff 8b 44 RSP: 002b:7fdc24e25980 EFLAGS: 0293 ORIG_RAX: 0101 RAX: ffda RBX: 7fdc040008d0 RCX: 7fdc28a41f24 RDX: 0008 RSI: 564d4410a8c8 RDI: ff9c RBP: 564d4410a8c8 R08: R09: 0001 R10: R11: 0293 R12: 0008 R13: 564d4410e28a R14: 7fdc24e25b40 R15: 7fdc24e28fc0 Modules linked in: cmac nls_utf8 cifs fscache libdes ccm vboxnetadp(OE) vboxnetflt(OE) vboxdrv(OE) eset_rtp(OE) xt_conntrack xt_MASQUERADE nf_conntrack_netlink nfnetlink xfrm_user xfrm_algo xt_addrtype iptable_filter iptable_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ip> snd_seq_midi coretemp snd_seq_midi_event snd_rawmidi kvm_intel snd_seq kvm dell_wmi snd_seq_device rapl dell_smbios snd_timer dcdbas intel_cstate input_leds iwlwifi serio_raw snd intel_wmi_thunderbolt rtsx_pci_ms dell_wmi_descriptor wmi_bmof processor_thermal_device ucsi_acp> pinctrl_cannonlake video pinctrl_intel ---[ end trace 80828f22da45a19b ]--- RIP: 0010:__slab_free+0x199/0x360 Code: 00 48 89
[Kernel-packages] [Bug 1959665] Re: linux-image-5.4.0-97.110 freezes by accessing cifs shares
@sebastian-berner or @kai-szymanski - please confirm that this fixes your cifs issue. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1959665 Title: linux-image-5.4.0-97.110 freezes by accessing cifs shares Status in linux package in Ubuntu: Invalid Status in linux source package in Focal: Fix Released Bug description: Ubuntu 20.04 with kernel image 5.4.0-97.110 randomly freezes when we access cifs shares. The system needs a hard reset after the freeze. The previous kernel image (5.4.0-96.109) does not show this behavior. Multiple Ubuntu 20.04 systems running on kernel image 9.4.0-97.110 are affected on our sites. The cifs shares are accessed via autofs using Kerberos authentication. The following info is the only error message we could actively catch on a different system before the system was frozen: general protection fault: [#3] SMP PTI CPU: 0 PID: 21294 Comm: automount Tainted: G DOE 5.4.0-97-generic #110-Ubuntu Hardware name: Dell Inc. Precision 7530/03RV2M, BIOS 1.14.4 10/21/2020 RIP: 0010:kmem_cache_alloc_trace+0x8c/0x240 Code: 08 65 4c 03 05 1d e8 f7 6e 49 83 78 10 00 4d 8b 38 0f 84 92 01 00 00 4d 85 ff 0f 84 89 01 00 00 41 8b 41 20 49 8b 39 4c 01 f8 <48> 8b 18 48 89 c1 49 33 99 70 01 00 00 4c 89 f8 48 0f c9 48 31 cb RSP: 0018:a6ca860f7ba0 EFLAGS: 00010286 RAX: fdd44d7c219190e1 RBX: RCX: RDX: d558 RSI: 0cc0 RDI: 00035060 RBP: a6ca860f7bd0 R08: 99233c035060 R09: 992338c079c0 R10: 0001 R11: 0004 R12: 0cc0 R13: 000b R14: 992338c079c0 R15: fdd44d7c219190e1 FS: 7fdc24e29700() GS:99233c00() knlGS: CS: 0010 DS: ES: CR0: 80050033 CR2: 7f15a80ee010 CR3: 0007e36b2006 CR4: 003606f0 Call Trace: ? proc_self_get_link+0x70/0xd0 proc_self_get_link+0x70/0xd0 link_path_walk.part.0+0x478/0x550 ? trailing_symlink+0x1d1/0x280 path_openat+0xb7/0x290 do_filp_open+0x91/0x100 ? unuse_pde+0x30/0x30 do_sys_open+0x17e/0x290 __x64_sys_openat+0x20/0x30 __orig_openat+0x71/0xc0 [eset_rtp] ? __switch_to_asm+0x40/0x70 ? __switch_to_asm+0x34/0x70 ? __switch_to_asm+0x40/0x70 ? __x64_sys_futex+0x13f/0x170 ? __switch_to_asm+0x34/0x70 ? __switch_to_asm+0x40/0x70 ? __switch_to_asm+0x34/0x70 ? __switch_to_asm+0x40/0x70 __x64_sys_ertp_openat+0x29/0x60 [eset_rtp] do_syscall_64+0x57/0x190 entry_SYSCALL_64_after_hwframe+0x44/0xa9 RIP: 0033:0x7fdc28a41f24 Code: 24 20 eb 8f 66 90 44 89 54 24 0c e8 56 68 f8 ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 32 44 89 c7 89 44 24 0c e8 88 68 f8 ff 8b 44 RSP: 002b:7fdc24e25980 EFLAGS: 0293 ORIG_RAX: 0101 RAX: ffda RBX: 7fdc040008d0 RCX: 7fdc28a41f24 ? unuse_pde+0x30/0x30 do_sys_open+0x17e/0x290 __x64_sys_openat+0x20/0x30 __orig_openat+0x71/0xc0 [eset_rtp] ? __switch_to_asm+0x40/0x70 ? __switch_to_asm+0x34/0x70 ? __switch_to_asm+0x40/0x70 ? __x64_sys_futex+0x13f/0x170 ? __switch_to_asm+0x34/0x70 ? __switch_to_asm+0x40/0x70 ? __switch_to_asm+0x34/0x70 ? __switch_to_asm+0x40/0x70 __x64_sys_ertp_openat+0x29/0x60 [eset_rtp] do_syscall_64+0x57/0x190 entry_SYSCALL_64_after_hwframe+0x44/0xa9 RIP: 0033:0x7fdc28a41f24 Code: 24 20 eb 8f 66 90 44 89 54 24 0c e8 56 68 f8 ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 32 44 89 c7 89 44 24 0c e8 88 68 f8 ff 8b 44 RSP: 002b:7fdc24e25980 EFLAGS: 0293 ORIG_RAX: 0101 RAX: ffda RBX: 7fdc040008d0 RCX: 7fdc28a41f24 RDX: 0008 RSI: 564d4410a8c8 RDI: ff9c RBP: 564d4410a8c8 R08: R09: 0001 R10: R11: 0293 R12: 0008 R13: 564d4410e28a R14: 7fdc24e25b40 R15: 7fdc24e28fc0 Modules linked in: cmac nls_utf8 cifs fscache libdes ccm vboxnetadp(OE) vboxnetflt(OE) vboxdrv(OE) eset_rtp(OE) xt_conntrack xt_MASQUERADE nf_conntrack_netlink nfnetlink xfrm_user xfrm_algo xt_addrtype iptable_filter iptable_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ip> snd_seq_midi coretemp snd_seq_midi_event snd_rawmidi kvm_intel snd_seq kvm dell_wmi snd_seq_device rapl dell_smbios snd_timer dcdbas intel_cstate input_leds iwlwifi serio_raw snd intel_wmi_thunderbolt rtsx_pci_ms dell_wmi_descriptor wmi_bmof processor_thermal_device ucsi_acp> pinctrl_cannonlake video pinctrl_intel ---[ end trace 80828f22da45a19b ]--- RIP: 0010:__slab_free+0x199/0x360 Code: 00 48 89 c7 fa 66 0f 1f 44 00 00 f0 49 0f ba 2c 24 00 72 79 4d 3b 6c 24 20 74 11 49 0f ba 34 24 00 57 9d 0f 1f
[Kernel-packages] [Bug 1959665] Re: linux-image-5.4.0-97.110 freezes by accessing cifs shares
This bug is awaiting verification that the linux-azure/5.4.0-1069.72 kernel in -proposed solves the problem. Please test the kernel and update this bug with the results. If the problem is solved, change the tag 'verification-needed-focal' to 'verification-done-focal'. If the problem still exists, change the tag 'verification-needed-focal' to 'verification-failed-focal'. If verification is not done by 5 working days from today, this fix will be dropped from the source code, and this bug will be closed. See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how to enable and use -proposed. Thank you! ** Tags added: verification-needed-focal -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1959665 Title: linux-image-5.4.0-97.110 freezes by accessing cifs shares Status in linux package in Ubuntu: Invalid Status in linux source package in Focal: Fix Released Bug description: Ubuntu 20.04 with kernel image 5.4.0-97.110 randomly freezes when we access cifs shares. The system needs a hard reset after the freeze. The previous kernel image (5.4.0-96.109) does not show this behavior. Multiple Ubuntu 20.04 systems running on kernel image 9.4.0-97.110 are affected on our sites. The cifs shares are accessed via autofs using Kerberos authentication. The following info is the only error message we could actively catch on a different system before the system was frozen: general protection fault: [#3] SMP PTI CPU: 0 PID: 21294 Comm: automount Tainted: G DOE 5.4.0-97-generic #110-Ubuntu Hardware name: Dell Inc. Precision 7530/03RV2M, BIOS 1.14.4 10/21/2020 RIP: 0010:kmem_cache_alloc_trace+0x8c/0x240 Code: 08 65 4c 03 05 1d e8 f7 6e 49 83 78 10 00 4d 8b 38 0f 84 92 01 00 00 4d 85 ff 0f 84 89 01 00 00 41 8b 41 20 49 8b 39 4c 01 f8 <48> 8b 18 48 89 c1 49 33 99 70 01 00 00 4c 89 f8 48 0f c9 48 31 cb RSP: 0018:a6ca860f7ba0 EFLAGS: 00010286 RAX: fdd44d7c219190e1 RBX: RCX: RDX: d558 RSI: 0cc0 RDI: 00035060 RBP: a6ca860f7bd0 R08: 99233c035060 R09: 992338c079c0 R10: 0001 R11: 0004 R12: 0cc0 R13: 000b R14: 992338c079c0 R15: fdd44d7c219190e1 FS: 7fdc24e29700() GS:99233c00() knlGS: CS: 0010 DS: ES: CR0: 80050033 CR2: 7f15a80ee010 CR3: 0007e36b2006 CR4: 003606f0 Call Trace: ? proc_self_get_link+0x70/0xd0 proc_self_get_link+0x70/0xd0 link_path_walk.part.0+0x478/0x550 ? trailing_symlink+0x1d1/0x280 path_openat+0xb7/0x290 do_filp_open+0x91/0x100 ? unuse_pde+0x30/0x30 do_sys_open+0x17e/0x290 __x64_sys_openat+0x20/0x30 __orig_openat+0x71/0xc0 [eset_rtp] ? __switch_to_asm+0x40/0x70 ? __switch_to_asm+0x34/0x70 ? __switch_to_asm+0x40/0x70 ? __x64_sys_futex+0x13f/0x170 ? __switch_to_asm+0x34/0x70 ? __switch_to_asm+0x40/0x70 ? __switch_to_asm+0x34/0x70 ? __switch_to_asm+0x40/0x70 __x64_sys_ertp_openat+0x29/0x60 [eset_rtp] do_syscall_64+0x57/0x190 entry_SYSCALL_64_after_hwframe+0x44/0xa9 RIP: 0033:0x7fdc28a41f24 Code: 24 20 eb 8f 66 90 44 89 54 24 0c e8 56 68 f8 ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 32 44 89 c7 89 44 24 0c e8 88 68 f8 ff 8b 44 RSP: 002b:7fdc24e25980 EFLAGS: 0293 ORIG_RAX: 0101 RAX: ffda RBX: 7fdc040008d0 RCX: 7fdc28a41f24 ? unuse_pde+0x30/0x30 do_sys_open+0x17e/0x290 __x64_sys_openat+0x20/0x30 __orig_openat+0x71/0xc0 [eset_rtp] ? __switch_to_asm+0x40/0x70 ? __switch_to_asm+0x34/0x70 ? __switch_to_asm+0x40/0x70 ? __x64_sys_futex+0x13f/0x170 ? __switch_to_asm+0x34/0x70 ? __switch_to_asm+0x40/0x70 ? __switch_to_asm+0x34/0x70 ? __switch_to_asm+0x40/0x70 __x64_sys_ertp_openat+0x29/0x60 [eset_rtp] do_syscall_64+0x57/0x190 entry_SYSCALL_64_after_hwframe+0x44/0xa9 RIP: 0033:0x7fdc28a41f24 Code: 24 20 eb 8f 66 90 44 89 54 24 0c e8 56 68 f8 ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 32 44 89 c7 89 44 24 0c e8 88 68 f8 ff 8b 44 RSP: 002b:7fdc24e25980 EFLAGS: 0293 ORIG_RAX: 0101 RAX: ffda RBX: 7fdc040008d0 RCX: 7fdc28a41f24 RDX: 0008 RSI: 564d4410a8c8 RDI: ff9c RBP: 564d4410a8c8 R08: R09: 0001 R10: R11: 0293 R12: 0008 R13: 564d4410e28a R14: 7fdc24e25b40 R15: 7fdc24e28fc0 Modules linked in: cmac nls_utf8 cifs fscache libdes ccm vboxnetadp(OE) vboxnetflt(OE) vboxdrv(OE) eset_rtp(OE) xt_conntrack xt_MASQUERADE nf_conntrack_netlink nfnetlink xfrm_user xfrm_algo xt_addrtype iptable_filter ip
[Kernel-packages] [Bug 1959665] Re: linux-image-5.4.0-97.110 freezes by accessing cifs shares
This bug was fixed in the package linux - 5.4.0-99.112 --- linux (5.4.0-99.112) focal; urgency=medium * focal/linux: 5.4.0-99.112 -proposed tracker (LP: #1959817) * linux-image-5.4.0-97.110 freezes by accessing cifs shares (LP: #1959665) - Revert "cifs: To match file servers, make sure the server hostname matches" - Revert "cifs: set a minimum of 120s for next dns resolution" - Revert "cifs: use the expiry output of dns_query to schedule next resolution" -- Stefan Bader Wed, 02 Feb 2022 17:21:18 +0100 ** Changed in: linux (Ubuntu Focal) Status: In Progress => Fix Released -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1959665 Title: linux-image-5.4.0-97.110 freezes by accessing cifs shares Status in linux package in Ubuntu: Invalid Status in linux source package in Focal: Fix Released Bug description: Ubuntu 20.04 with kernel image 5.4.0-97.110 randomly freezes when we access cifs shares. The system needs a hard reset after the freeze. The previous kernel image (5.4.0-96.109) does not show this behavior. Multiple Ubuntu 20.04 systems running on kernel image 9.4.0-97.110 are affected on our sites. The cifs shares are accessed via autofs using Kerberos authentication. The following info is the only error message we could actively catch on a different system before the system was frozen: general protection fault: [#3] SMP PTI CPU: 0 PID: 21294 Comm: automount Tainted: G DOE 5.4.0-97-generic #110-Ubuntu Hardware name: Dell Inc. Precision 7530/03RV2M, BIOS 1.14.4 10/21/2020 RIP: 0010:kmem_cache_alloc_trace+0x8c/0x240 Code: 08 65 4c 03 05 1d e8 f7 6e 49 83 78 10 00 4d 8b 38 0f 84 92 01 00 00 4d 85 ff 0f 84 89 01 00 00 41 8b 41 20 49 8b 39 4c 01 f8 <48> 8b 18 48 89 c1 49 33 99 70 01 00 00 4c 89 f8 48 0f c9 48 31 cb RSP: 0018:a6ca860f7ba0 EFLAGS: 00010286 RAX: fdd44d7c219190e1 RBX: RCX: RDX: d558 RSI: 0cc0 RDI: 00035060 RBP: a6ca860f7bd0 R08: 99233c035060 R09: 992338c079c0 R10: 0001 R11: 0004 R12: 0cc0 R13: 000b R14: 992338c079c0 R15: fdd44d7c219190e1 FS: 7fdc24e29700() GS:99233c00() knlGS: CS: 0010 DS: ES: CR0: 80050033 CR2: 7f15a80ee010 CR3: 0007e36b2006 CR4: 003606f0 Call Trace: ? proc_self_get_link+0x70/0xd0 proc_self_get_link+0x70/0xd0 link_path_walk.part.0+0x478/0x550 ? trailing_symlink+0x1d1/0x280 path_openat+0xb7/0x290 do_filp_open+0x91/0x100 ? unuse_pde+0x30/0x30 do_sys_open+0x17e/0x290 __x64_sys_openat+0x20/0x30 __orig_openat+0x71/0xc0 [eset_rtp] ? __switch_to_asm+0x40/0x70 ? __switch_to_asm+0x34/0x70 ? __switch_to_asm+0x40/0x70 ? __x64_sys_futex+0x13f/0x170 ? __switch_to_asm+0x34/0x70 ? __switch_to_asm+0x40/0x70 ? __switch_to_asm+0x34/0x70 ? __switch_to_asm+0x40/0x70 __x64_sys_ertp_openat+0x29/0x60 [eset_rtp] do_syscall_64+0x57/0x190 entry_SYSCALL_64_after_hwframe+0x44/0xa9 RIP: 0033:0x7fdc28a41f24 Code: 24 20 eb 8f 66 90 44 89 54 24 0c e8 56 68 f8 ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 32 44 89 c7 89 44 24 0c e8 88 68 f8 ff 8b 44 RSP: 002b:7fdc24e25980 EFLAGS: 0293 ORIG_RAX: 0101 RAX: ffda RBX: 7fdc040008d0 RCX: 7fdc28a41f24 ? unuse_pde+0x30/0x30 do_sys_open+0x17e/0x290 __x64_sys_openat+0x20/0x30 __orig_openat+0x71/0xc0 [eset_rtp] ? __switch_to_asm+0x40/0x70 ? __switch_to_asm+0x34/0x70 ? __switch_to_asm+0x40/0x70 ? __x64_sys_futex+0x13f/0x170 ? __switch_to_asm+0x34/0x70 ? __switch_to_asm+0x40/0x70 ? __switch_to_asm+0x34/0x70 ? __switch_to_asm+0x40/0x70 __x64_sys_ertp_openat+0x29/0x60 [eset_rtp] do_syscall_64+0x57/0x190 entry_SYSCALL_64_after_hwframe+0x44/0xa9 RIP: 0033:0x7fdc28a41f24 Code: 24 20 eb 8f 66 90 44 89 54 24 0c e8 56 68 f8 ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 32 44 89 c7 89 44 24 0c e8 88 68 f8 ff 8b 44 RSP: 002b:7fdc24e25980 EFLAGS: 0293 ORIG_RAX: 0101 RAX: ffda RBX: 7fdc040008d0 RCX: 7fdc28a41f24 RDX: 0008 RSI: 564d4410a8c8 RDI: ff9c RBP: 564d4410a8c8 R08: R09: 0001 R10: R11: 0293 R12: 0008 R13: 564d4410e28a R14: 7fdc24e25b40 R15: 7fdc24e28fc0 Modules linked in: cmac nls_utf8 cifs fscache libdes ccm vboxnetadp(OE) vboxnetflt(OE) vboxdrv(OE) eset_rtp(OE) xt_conntrack xt_MASQUERADE nf_conntrack_netlink nfnetlink xfrm_user xfrm_algo xt_addrtype iptable_filter iptable_nat nf_nat nf_conntrack nf_def
[Kernel-packages] [Bug 1959665] Re: linux-image-5.4.0-97.110 freezes by accessing cifs shares
Hi Tim, thanks for your afford! Best regards, Kai. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1959665 Title: linux-image-5.4.0-97.110 freezes by accessing cifs shares Status in linux package in Ubuntu: Invalid Status in linux source package in Focal: In Progress Bug description: Ubuntu 20.04 with kernel image 5.4.0-97.110 randomly freezes when we access cifs shares. The system needs a hard reset after the freeze. The previous kernel image (5.4.0-96.109) does not show this behavior. Multiple Ubuntu 20.04 systems running on kernel image 9.4.0-97.110 are affected on our sites. The cifs shares are accessed via autofs using Kerberos authentication. The following info is the only error message we could actively catch on a different system before the system was frozen: general protection fault: [#3] SMP PTI CPU: 0 PID: 21294 Comm: automount Tainted: G DOE 5.4.0-97-generic #110-Ubuntu Hardware name: Dell Inc. Precision 7530/03RV2M, BIOS 1.14.4 10/21/2020 RIP: 0010:kmem_cache_alloc_trace+0x8c/0x240 Code: 08 65 4c 03 05 1d e8 f7 6e 49 83 78 10 00 4d 8b 38 0f 84 92 01 00 00 4d 85 ff 0f 84 89 01 00 00 41 8b 41 20 49 8b 39 4c 01 f8 <48> 8b 18 48 89 c1 49 33 99 70 01 00 00 4c 89 f8 48 0f c9 48 31 cb RSP: 0018:a6ca860f7ba0 EFLAGS: 00010286 RAX: fdd44d7c219190e1 RBX: RCX: RDX: d558 RSI: 0cc0 RDI: 00035060 RBP: a6ca860f7bd0 R08: 99233c035060 R09: 992338c079c0 R10: 0001 R11: 0004 R12: 0cc0 R13: 000b R14: 992338c079c0 R15: fdd44d7c219190e1 FS: 7fdc24e29700() GS:99233c00() knlGS: CS: 0010 DS: ES: CR0: 80050033 CR2: 7f15a80ee010 CR3: 0007e36b2006 CR4: 003606f0 Call Trace: ? proc_self_get_link+0x70/0xd0 proc_self_get_link+0x70/0xd0 link_path_walk.part.0+0x478/0x550 ? trailing_symlink+0x1d1/0x280 path_openat+0xb7/0x290 do_filp_open+0x91/0x100 ? unuse_pde+0x30/0x30 do_sys_open+0x17e/0x290 __x64_sys_openat+0x20/0x30 __orig_openat+0x71/0xc0 [eset_rtp] ? __switch_to_asm+0x40/0x70 ? __switch_to_asm+0x34/0x70 ? __switch_to_asm+0x40/0x70 ? __x64_sys_futex+0x13f/0x170 ? __switch_to_asm+0x34/0x70 ? __switch_to_asm+0x40/0x70 ? __switch_to_asm+0x34/0x70 ? __switch_to_asm+0x40/0x70 __x64_sys_ertp_openat+0x29/0x60 [eset_rtp] do_syscall_64+0x57/0x190 entry_SYSCALL_64_after_hwframe+0x44/0xa9 RIP: 0033:0x7fdc28a41f24 Code: 24 20 eb 8f 66 90 44 89 54 24 0c e8 56 68 f8 ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 32 44 89 c7 89 44 24 0c e8 88 68 f8 ff 8b 44 RSP: 002b:7fdc24e25980 EFLAGS: 0293 ORIG_RAX: 0101 RAX: ffda RBX: 7fdc040008d0 RCX: 7fdc28a41f24 ? unuse_pde+0x30/0x30 do_sys_open+0x17e/0x290 __x64_sys_openat+0x20/0x30 __orig_openat+0x71/0xc0 [eset_rtp] ? __switch_to_asm+0x40/0x70 ? __switch_to_asm+0x34/0x70 ? __switch_to_asm+0x40/0x70 ? __x64_sys_futex+0x13f/0x170 ? __switch_to_asm+0x34/0x70 ? __switch_to_asm+0x40/0x70 ? __switch_to_asm+0x34/0x70 ? __switch_to_asm+0x40/0x70 __x64_sys_ertp_openat+0x29/0x60 [eset_rtp] do_syscall_64+0x57/0x190 entry_SYSCALL_64_after_hwframe+0x44/0xa9 RIP: 0033:0x7fdc28a41f24 Code: 24 20 eb 8f 66 90 44 89 54 24 0c e8 56 68 f8 ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 32 44 89 c7 89 44 24 0c e8 88 68 f8 ff 8b 44 RSP: 002b:7fdc24e25980 EFLAGS: 0293 ORIG_RAX: 0101 RAX: ffda RBX: 7fdc040008d0 RCX: 7fdc28a41f24 RDX: 0008 RSI: 564d4410a8c8 RDI: ff9c RBP: 564d4410a8c8 R08: R09: 0001 R10: R11: 0293 R12: 0008 R13: 564d4410e28a R14: 7fdc24e25b40 R15: 7fdc24e28fc0 Modules linked in: cmac nls_utf8 cifs fscache libdes ccm vboxnetadp(OE) vboxnetflt(OE) vboxdrv(OE) eset_rtp(OE) xt_conntrack xt_MASQUERADE nf_conntrack_netlink nfnetlink xfrm_user xfrm_algo xt_addrtype iptable_filter iptable_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ip> snd_seq_midi coretemp snd_seq_midi_event snd_rawmidi kvm_intel snd_seq kvm dell_wmi snd_seq_device rapl dell_smbios snd_timer dcdbas intel_cstate input_leds iwlwifi serio_raw snd intel_wmi_thunderbolt rtsx_pci_ms dell_wmi_descriptor wmi_bmof processor_thermal_device ucsi_acp> pinctrl_cannonlake video pinctrl_intel ---[ end trace 80828f22da45a19b ]--- RIP: 0010:__slab_free+0x199/0x360 Code: 00 48 89 c7 fa 66 0f 1f 44 00 00 f0 49 0f ba 2c 24 00 72 79 4d 3b 6c 24 20 74 11 49 0f ba 34 24 00 57 9d 0f 1f 44 00 00 eb 9f <0f> 0b 49 3b 5c
[Kernel-packages] [Bug 1959665] Re: linux-image-5.4.0-97.110 freezes by accessing cifs shares
Hi all - thanks for the quick testing. We are evaluating the best course of action. In the short term that will likely be a respin with these patches reverted. Longer term I will work to figure out the error and find a correction. rtg -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1959665 Title: linux-image-5.4.0-97.110 freezes by accessing cifs shares Status in linux package in Ubuntu: Invalid Status in linux source package in Focal: In Progress Bug description: Ubuntu 20.04 with kernel image 5.4.0-97.110 randomly freezes when we access cifs shares. The system needs a hard reset after the freeze. The previous kernel image (5.4.0-96.109) does not show this behavior. Multiple Ubuntu 20.04 systems running on kernel image 9.4.0-97.110 are affected on our sites. The cifs shares are accessed via autofs using Kerberos authentication. The following info is the only error message we could actively catch on a different system before the system was frozen: general protection fault: [#3] SMP PTI CPU: 0 PID: 21294 Comm: automount Tainted: G DOE 5.4.0-97-generic #110-Ubuntu Hardware name: Dell Inc. Precision 7530/03RV2M, BIOS 1.14.4 10/21/2020 RIP: 0010:kmem_cache_alloc_trace+0x8c/0x240 Code: 08 65 4c 03 05 1d e8 f7 6e 49 83 78 10 00 4d 8b 38 0f 84 92 01 00 00 4d 85 ff 0f 84 89 01 00 00 41 8b 41 20 49 8b 39 4c 01 f8 <48> 8b 18 48 89 c1 49 33 99 70 01 00 00 4c 89 f8 48 0f c9 48 31 cb RSP: 0018:a6ca860f7ba0 EFLAGS: 00010286 RAX: fdd44d7c219190e1 RBX: RCX: RDX: d558 RSI: 0cc0 RDI: 00035060 RBP: a6ca860f7bd0 R08: 99233c035060 R09: 992338c079c0 R10: 0001 R11: 0004 R12: 0cc0 R13: 000b R14: 992338c079c0 R15: fdd44d7c219190e1 FS: 7fdc24e29700() GS:99233c00() knlGS: CS: 0010 DS: ES: CR0: 80050033 CR2: 7f15a80ee010 CR3: 0007e36b2006 CR4: 003606f0 Call Trace: ? proc_self_get_link+0x70/0xd0 proc_self_get_link+0x70/0xd0 link_path_walk.part.0+0x478/0x550 ? trailing_symlink+0x1d1/0x280 path_openat+0xb7/0x290 do_filp_open+0x91/0x100 ? unuse_pde+0x30/0x30 do_sys_open+0x17e/0x290 __x64_sys_openat+0x20/0x30 __orig_openat+0x71/0xc0 [eset_rtp] ? __switch_to_asm+0x40/0x70 ? __switch_to_asm+0x34/0x70 ? __switch_to_asm+0x40/0x70 ? __x64_sys_futex+0x13f/0x170 ? __switch_to_asm+0x34/0x70 ? __switch_to_asm+0x40/0x70 ? __switch_to_asm+0x34/0x70 ? __switch_to_asm+0x40/0x70 __x64_sys_ertp_openat+0x29/0x60 [eset_rtp] do_syscall_64+0x57/0x190 entry_SYSCALL_64_after_hwframe+0x44/0xa9 RIP: 0033:0x7fdc28a41f24 Code: 24 20 eb 8f 66 90 44 89 54 24 0c e8 56 68 f8 ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 32 44 89 c7 89 44 24 0c e8 88 68 f8 ff 8b 44 RSP: 002b:7fdc24e25980 EFLAGS: 0293 ORIG_RAX: 0101 RAX: ffda RBX: 7fdc040008d0 RCX: 7fdc28a41f24 ? unuse_pde+0x30/0x30 do_sys_open+0x17e/0x290 __x64_sys_openat+0x20/0x30 __orig_openat+0x71/0xc0 [eset_rtp] ? __switch_to_asm+0x40/0x70 ? __switch_to_asm+0x34/0x70 ? __switch_to_asm+0x40/0x70 ? __x64_sys_futex+0x13f/0x170 ? __switch_to_asm+0x34/0x70 ? __switch_to_asm+0x40/0x70 ? __switch_to_asm+0x34/0x70 ? __switch_to_asm+0x40/0x70 __x64_sys_ertp_openat+0x29/0x60 [eset_rtp] do_syscall_64+0x57/0x190 entry_SYSCALL_64_after_hwframe+0x44/0xa9 RIP: 0033:0x7fdc28a41f24 Code: 24 20 eb 8f 66 90 44 89 54 24 0c e8 56 68 f8 ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 32 44 89 c7 89 44 24 0c e8 88 68 f8 ff 8b 44 RSP: 002b:7fdc24e25980 EFLAGS: 0293 ORIG_RAX: 0101 RAX: ffda RBX: 7fdc040008d0 RCX: 7fdc28a41f24 RDX: 0008 RSI: 564d4410a8c8 RDI: ff9c RBP: 564d4410a8c8 R08: R09: 0001 R10: R11: 0293 R12: 0008 R13: 564d4410e28a R14: 7fdc24e25b40 R15: 7fdc24e28fc0 Modules linked in: cmac nls_utf8 cifs fscache libdes ccm vboxnetadp(OE) vboxnetflt(OE) vboxdrv(OE) eset_rtp(OE) xt_conntrack xt_MASQUERADE nf_conntrack_netlink nfnetlink xfrm_user xfrm_algo xt_addrtype iptable_filter iptable_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ip> snd_seq_midi coretemp snd_seq_midi_event snd_rawmidi kvm_intel snd_seq kvm dell_wmi snd_seq_device rapl dell_smbios snd_timer dcdbas intel_cstate input_leds iwlwifi serio_raw snd intel_wmi_thunderbolt rtsx_pci_ms dell_wmi_descriptor wmi_bmof processor_thermal_device ucsi_acp> pinctrl_cannonlake video pinctrl_intel ---[ end trace 80828f22da45a19b ]--- RIP:
[Kernel-packages] [Bug 1959665] Re: linux-image-5.4.0-97.110 freezes by accessing cifs shares
Just a quick heads up on my tests with different kernel versions. I have installed all available Updates for Ubuntu 20.04 (including samba-*= 2:4.13.17~dfsg-0ubuntu0.21.04.1; CVE-2022-0336). These are the results: GA: 5.4.0-98.111~lp1959665.1 -> no freezes in 3 hours of testing 5.4.0-97.110 -> still keeps freezing HWE: 5.13.0-27.29~20.04.1 -> no freezes in 1 hour of testing 5.13.0-28.31~20.04.1 -> no freezes in 1 hour of testing ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-0336 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1959665 Title: linux-image-5.4.0-97.110 freezes by accessing cifs shares Status in linux package in Ubuntu: Invalid Status in linux source package in Focal: In Progress Bug description: Ubuntu 20.04 with kernel image 5.4.0-97.110 randomly freezes when we access cifs shares. The system needs a hard reset after the freeze. The previous kernel image (5.4.0-96.109) does not show this behavior. Multiple Ubuntu 20.04 systems running on kernel image 9.4.0-97.110 are affected on our sites. The cifs shares are accessed via autofs using Kerberos authentication. The following info is the only error message we could actively catch on a different system before the system was frozen: general protection fault: [#3] SMP PTI CPU: 0 PID: 21294 Comm: automount Tainted: G DOE 5.4.0-97-generic #110-Ubuntu Hardware name: Dell Inc. Precision 7530/03RV2M, BIOS 1.14.4 10/21/2020 RIP: 0010:kmem_cache_alloc_trace+0x8c/0x240 Code: 08 65 4c 03 05 1d e8 f7 6e 49 83 78 10 00 4d 8b 38 0f 84 92 01 00 00 4d 85 ff 0f 84 89 01 00 00 41 8b 41 20 49 8b 39 4c 01 f8 <48> 8b 18 48 89 c1 49 33 99 70 01 00 00 4c 89 f8 48 0f c9 48 31 cb RSP: 0018:a6ca860f7ba0 EFLAGS: 00010286 RAX: fdd44d7c219190e1 RBX: RCX: RDX: d558 RSI: 0cc0 RDI: 00035060 RBP: a6ca860f7bd0 R08: 99233c035060 R09: 992338c079c0 R10: 0001 R11: 0004 R12: 0cc0 R13: 000b R14: 992338c079c0 R15: fdd44d7c219190e1 FS: 7fdc24e29700() GS:99233c00() knlGS: CS: 0010 DS: ES: CR0: 80050033 CR2: 7f15a80ee010 CR3: 0007e36b2006 CR4: 003606f0 Call Trace: ? proc_self_get_link+0x70/0xd0 proc_self_get_link+0x70/0xd0 link_path_walk.part.0+0x478/0x550 ? trailing_symlink+0x1d1/0x280 path_openat+0xb7/0x290 do_filp_open+0x91/0x100 ? unuse_pde+0x30/0x30 do_sys_open+0x17e/0x290 __x64_sys_openat+0x20/0x30 __orig_openat+0x71/0xc0 [eset_rtp] ? __switch_to_asm+0x40/0x70 ? __switch_to_asm+0x34/0x70 ? __switch_to_asm+0x40/0x70 ? __x64_sys_futex+0x13f/0x170 ? __switch_to_asm+0x34/0x70 ? __switch_to_asm+0x40/0x70 ? __switch_to_asm+0x34/0x70 ? __switch_to_asm+0x40/0x70 __x64_sys_ertp_openat+0x29/0x60 [eset_rtp] do_syscall_64+0x57/0x190 entry_SYSCALL_64_after_hwframe+0x44/0xa9 RIP: 0033:0x7fdc28a41f24 Code: 24 20 eb 8f 66 90 44 89 54 24 0c e8 56 68 f8 ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 32 44 89 c7 89 44 24 0c e8 88 68 f8 ff 8b 44 RSP: 002b:7fdc24e25980 EFLAGS: 0293 ORIG_RAX: 0101 RAX: ffda RBX: 7fdc040008d0 RCX: 7fdc28a41f24 ? unuse_pde+0x30/0x30 do_sys_open+0x17e/0x290 __x64_sys_openat+0x20/0x30 __orig_openat+0x71/0xc0 [eset_rtp] ? __switch_to_asm+0x40/0x70 ? __switch_to_asm+0x34/0x70 ? __switch_to_asm+0x40/0x70 ? __x64_sys_futex+0x13f/0x170 ? __switch_to_asm+0x34/0x70 ? __switch_to_asm+0x40/0x70 ? __switch_to_asm+0x34/0x70 ? __switch_to_asm+0x40/0x70 __x64_sys_ertp_openat+0x29/0x60 [eset_rtp] do_syscall_64+0x57/0x190 entry_SYSCALL_64_after_hwframe+0x44/0xa9 RIP: 0033:0x7fdc28a41f24 Code: 24 20 eb 8f 66 90 44 89 54 24 0c e8 56 68 f8 ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 32 44 89 c7 89 44 24 0c e8 88 68 f8 ff 8b 44 RSP: 002b:7fdc24e25980 EFLAGS: 0293 ORIG_RAX: 0101 RAX: ffda RBX: 7fdc040008d0 RCX: 7fdc28a41f24 RDX: 0008 RSI: 564d4410a8c8 RDI: ff9c RBP: 564d4410a8c8 R08: R09: 0001 R10: R11: 0293 R12: 0008 R13: 564d4410e28a R14: 7fdc24e25b40 R15: 7fdc24e28fc0 Modules linked in: cmac nls_utf8 cifs fscache libdes ccm vboxnetadp(OE) vboxnetflt(OE) vboxdrv(OE) eset_rtp(OE) xt_conntrack xt_MASQUERADE nf_conntrack_netlink nfnetlink xfrm_user xfrm_algo xt_addrtype iptable_filter iptable_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ip> snd_seq_midi coretemp snd_seq_midi_event snd_rawmidi kvm_intel snd_seq kvm dell_wmi snd_seq_devi
[Kernel-packages] [Bug 1959665] Re: linux-image-5.4.0-97.110 freezes by accessing cifs shares
Hi, thanks for the quick reply. I can confirm, that while running on 5.4.0-98-generic #111~lp1959665.1 I was able to access all of our cifs shares without issues. A script, which creates, reads, modifies and deletes files on different cifs shares also works without any issue. Removing the latest cifs patches from kernel 5.4.0-97.110 seems to fix our issue. I will keep testing on 5.4.0-98-generic #111~lp1959665.1. Best regards, Sebastian -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1959665 Title: linux-image-5.4.0-97.110 freezes by accessing cifs shares Status in linux package in Ubuntu: Invalid Status in linux source package in Focal: In Progress Bug description: Ubuntu 20.04 with kernel image 5.4.0-97.110 randomly freezes when we access cifs shares. The system needs a hard reset after the freeze. The previous kernel image (5.4.0-96.109) does not show this behavior. Multiple Ubuntu 20.04 systems running on kernel image 9.4.0-97.110 are affected on our sites. The cifs shares are accessed via autofs using Kerberos authentication. The following info is the only error message we could actively catch on a different system before the system was frozen: general protection fault: [#3] SMP PTI CPU: 0 PID: 21294 Comm: automount Tainted: G DOE 5.4.0-97-generic #110-Ubuntu Hardware name: Dell Inc. Precision 7530/03RV2M, BIOS 1.14.4 10/21/2020 RIP: 0010:kmem_cache_alloc_trace+0x8c/0x240 Code: 08 65 4c 03 05 1d e8 f7 6e 49 83 78 10 00 4d 8b 38 0f 84 92 01 00 00 4d 85 ff 0f 84 89 01 00 00 41 8b 41 20 49 8b 39 4c 01 f8 <48> 8b 18 48 89 c1 49 33 99 70 01 00 00 4c 89 f8 48 0f c9 48 31 cb RSP: 0018:a6ca860f7ba0 EFLAGS: 00010286 RAX: fdd44d7c219190e1 RBX: RCX: RDX: d558 RSI: 0cc0 RDI: 00035060 RBP: a6ca860f7bd0 R08: 99233c035060 R09: 992338c079c0 R10: 0001 R11: 0004 R12: 0cc0 R13: 000b R14: 992338c079c0 R15: fdd44d7c219190e1 FS: 7fdc24e29700() GS:99233c00() knlGS: CS: 0010 DS: ES: CR0: 80050033 CR2: 7f15a80ee010 CR3: 0007e36b2006 CR4: 003606f0 Call Trace: ? proc_self_get_link+0x70/0xd0 proc_self_get_link+0x70/0xd0 link_path_walk.part.0+0x478/0x550 ? trailing_symlink+0x1d1/0x280 path_openat+0xb7/0x290 do_filp_open+0x91/0x100 ? unuse_pde+0x30/0x30 do_sys_open+0x17e/0x290 __x64_sys_openat+0x20/0x30 __orig_openat+0x71/0xc0 [eset_rtp] ? __switch_to_asm+0x40/0x70 ? __switch_to_asm+0x34/0x70 ? __switch_to_asm+0x40/0x70 ? __x64_sys_futex+0x13f/0x170 ? __switch_to_asm+0x34/0x70 ? __switch_to_asm+0x40/0x70 ? __switch_to_asm+0x34/0x70 ? __switch_to_asm+0x40/0x70 __x64_sys_ertp_openat+0x29/0x60 [eset_rtp] do_syscall_64+0x57/0x190 entry_SYSCALL_64_after_hwframe+0x44/0xa9 RIP: 0033:0x7fdc28a41f24 Code: 24 20 eb 8f 66 90 44 89 54 24 0c e8 56 68 f8 ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 32 44 89 c7 89 44 24 0c e8 88 68 f8 ff 8b 44 RSP: 002b:7fdc24e25980 EFLAGS: 0293 ORIG_RAX: 0101 RAX: ffda RBX: 7fdc040008d0 RCX: 7fdc28a41f24 ? unuse_pde+0x30/0x30 do_sys_open+0x17e/0x290 __x64_sys_openat+0x20/0x30 __orig_openat+0x71/0xc0 [eset_rtp] ? __switch_to_asm+0x40/0x70 ? __switch_to_asm+0x34/0x70 ? __switch_to_asm+0x40/0x70 ? __x64_sys_futex+0x13f/0x170 ? __switch_to_asm+0x34/0x70 ? __switch_to_asm+0x40/0x70 ? __switch_to_asm+0x34/0x70 ? __switch_to_asm+0x40/0x70 __x64_sys_ertp_openat+0x29/0x60 [eset_rtp] do_syscall_64+0x57/0x190 entry_SYSCALL_64_after_hwframe+0x44/0xa9 RIP: 0033:0x7fdc28a41f24 Code: 24 20 eb 8f 66 90 44 89 54 24 0c e8 56 68 f8 ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 32 44 89 c7 89 44 24 0c e8 88 68 f8 ff 8b 44 RSP: 002b:7fdc24e25980 EFLAGS: 0293 ORIG_RAX: 0101 RAX: ffda RBX: 7fdc040008d0 RCX: 7fdc28a41f24 RDX: 0008 RSI: 564d4410a8c8 RDI: ff9c RBP: 564d4410a8c8 R08: R09: 0001 R10: R11: 0293 R12: 0008 R13: 564d4410e28a R14: 7fdc24e25b40 R15: 7fdc24e28fc0 Modules linked in: cmac nls_utf8 cifs fscache libdes ccm vboxnetadp(OE) vboxnetflt(OE) vboxdrv(OE) eset_rtp(OE) xt_conntrack xt_MASQUERADE nf_conntrack_netlink nfnetlink xfrm_user xfrm_algo xt_addrtype iptable_filter iptable_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ip> snd_seq_midi coretemp snd_seq_midi_event snd_rawmidi kvm_intel snd_seq kvm dell_wmi snd_seq_device rapl dell_smbios snd_timer dcdbas intel_cstate input_led
[Kernel-packages] [Bug 1959665] Re: linux-image-5.4.0-97.110 freezes by accessing cifs shares
Hello, Thanks for the help! :) Are these cifs patches present in 5.13.0.27? I got similar issues with 5.4.0.97 and 5.13.0.27, and moving to previous releases fixed the issues in both cases! :) Cheers! Thomas -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1959665 Title: linux-image-5.4.0-97.110 freezes by accessing cifs shares Status in linux package in Ubuntu: Invalid Status in linux source package in Focal: In Progress Bug description: Ubuntu 20.04 with kernel image 5.4.0-97.110 randomly freezes when we access cifs shares. The system needs a hard reset after the freeze. The previous kernel image (5.4.0-96.109) does not show this behavior. Multiple Ubuntu 20.04 systems running on kernel image 9.4.0-97.110 are affected on our sites. The cifs shares are accessed via autofs using Kerberos authentication. The following info is the only error message we could actively catch on a different system before the system was frozen: general protection fault: [#3] SMP PTI CPU: 0 PID: 21294 Comm: automount Tainted: G DOE 5.4.0-97-generic #110-Ubuntu Hardware name: Dell Inc. Precision 7530/03RV2M, BIOS 1.14.4 10/21/2020 RIP: 0010:kmem_cache_alloc_trace+0x8c/0x240 Code: 08 65 4c 03 05 1d e8 f7 6e 49 83 78 10 00 4d 8b 38 0f 84 92 01 00 00 4d 85 ff 0f 84 89 01 00 00 41 8b 41 20 49 8b 39 4c 01 f8 <48> 8b 18 48 89 c1 49 33 99 70 01 00 00 4c 89 f8 48 0f c9 48 31 cb RSP: 0018:a6ca860f7ba0 EFLAGS: 00010286 RAX: fdd44d7c219190e1 RBX: RCX: RDX: d558 RSI: 0cc0 RDI: 00035060 RBP: a6ca860f7bd0 R08: 99233c035060 R09: 992338c079c0 R10: 0001 R11: 0004 R12: 0cc0 R13: 000b R14: 992338c079c0 R15: fdd44d7c219190e1 FS: 7fdc24e29700() GS:99233c00() knlGS: CS: 0010 DS: ES: CR0: 80050033 CR2: 7f15a80ee010 CR3: 0007e36b2006 CR4: 003606f0 Call Trace: ? proc_self_get_link+0x70/0xd0 proc_self_get_link+0x70/0xd0 link_path_walk.part.0+0x478/0x550 ? trailing_symlink+0x1d1/0x280 path_openat+0xb7/0x290 do_filp_open+0x91/0x100 ? unuse_pde+0x30/0x30 do_sys_open+0x17e/0x290 __x64_sys_openat+0x20/0x30 __orig_openat+0x71/0xc0 [eset_rtp] ? __switch_to_asm+0x40/0x70 ? __switch_to_asm+0x34/0x70 ? __switch_to_asm+0x40/0x70 ? __x64_sys_futex+0x13f/0x170 ? __switch_to_asm+0x34/0x70 ? __switch_to_asm+0x40/0x70 ? __switch_to_asm+0x34/0x70 ? __switch_to_asm+0x40/0x70 __x64_sys_ertp_openat+0x29/0x60 [eset_rtp] do_syscall_64+0x57/0x190 entry_SYSCALL_64_after_hwframe+0x44/0xa9 RIP: 0033:0x7fdc28a41f24 Code: 24 20 eb 8f 66 90 44 89 54 24 0c e8 56 68 f8 ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 32 44 89 c7 89 44 24 0c e8 88 68 f8 ff 8b 44 RSP: 002b:7fdc24e25980 EFLAGS: 0293 ORIG_RAX: 0101 RAX: ffda RBX: 7fdc040008d0 RCX: 7fdc28a41f24 ? unuse_pde+0x30/0x30 do_sys_open+0x17e/0x290 __x64_sys_openat+0x20/0x30 __orig_openat+0x71/0xc0 [eset_rtp] ? __switch_to_asm+0x40/0x70 ? __switch_to_asm+0x34/0x70 ? __switch_to_asm+0x40/0x70 ? __x64_sys_futex+0x13f/0x170 ? __switch_to_asm+0x34/0x70 ? __switch_to_asm+0x40/0x70 ? __switch_to_asm+0x34/0x70 ? __switch_to_asm+0x40/0x70 __x64_sys_ertp_openat+0x29/0x60 [eset_rtp] do_syscall_64+0x57/0x190 entry_SYSCALL_64_after_hwframe+0x44/0xa9 RIP: 0033:0x7fdc28a41f24 Code: 24 20 eb 8f 66 90 44 89 54 24 0c e8 56 68 f8 ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 32 44 89 c7 89 44 24 0c e8 88 68 f8 ff 8b 44 RSP: 002b:7fdc24e25980 EFLAGS: 0293 ORIG_RAX: 0101 RAX: ffda RBX: 7fdc040008d0 RCX: 7fdc28a41f24 RDX: 0008 RSI: 564d4410a8c8 RDI: ff9c RBP: 564d4410a8c8 R08: R09: 0001 R10: R11: 0293 R12: 0008 R13: 564d4410e28a R14: 7fdc24e25b40 R15: 7fdc24e28fc0 Modules linked in: cmac nls_utf8 cifs fscache libdes ccm vboxnetadp(OE) vboxnetflt(OE) vboxdrv(OE) eset_rtp(OE) xt_conntrack xt_MASQUERADE nf_conntrack_netlink nfnetlink xfrm_user xfrm_algo xt_addrtype iptable_filter iptable_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ip> snd_seq_midi coretemp snd_seq_midi_event snd_rawmidi kvm_intel snd_seq kvm dell_wmi snd_seq_device rapl dell_smbios snd_timer dcdbas intel_cstate input_leds iwlwifi serio_raw snd intel_wmi_thunderbolt rtsx_pci_ms dell_wmi_descriptor wmi_bmof processor_thermal_device ucsi_acp> pinctrl_cannonlake video pinctrl_intel ---[ end trace 80828f22da45a19b ]--- RIP: 0010:__slab_free+0x199/0
[Kernel-packages] [Bug 1959665] Re: linux-image-5.4.0-97.110 freezes by accessing cifs shares
Hi, thanks for the fast reply! I have just installed it: :~$ uname -a Linux foo.bar 5.4.0-98-generic #111~lp1959665.1 SMP Tue Feb 1 19:50:04 UTC 2022 x86_64 x86_64 x86_64 GNU/Linux I mount all shares and start my tests (ncdu and a simple bash testscript). With 97#110 it takes 30 seconds to crash a machine. ...with the 98#111 the scripts work (i abort the test after 60 minutes). I dont get a kernel panic with this kernel. Maybe Sebastian can confirm this ? -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1959665 Title: linux-image-5.4.0-97.110 freezes by accessing cifs shares Status in linux package in Ubuntu: Invalid Status in linux source package in Focal: In Progress Bug description: Ubuntu 20.04 with kernel image 5.4.0-97.110 randomly freezes when we access cifs shares. The system needs a hard reset after the freeze. The previous kernel image (5.4.0-96.109) does not show this behavior. Multiple Ubuntu 20.04 systems running on kernel image 9.4.0-97.110 are affected on our sites. The cifs shares are accessed via autofs using Kerberos authentication. The following info is the only error message we could actively catch on a different system before the system was frozen: general protection fault: [#3] SMP PTI CPU: 0 PID: 21294 Comm: automount Tainted: G DOE 5.4.0-97-generic #110-Ubuntu Hardware name: Dell Inc. Precision 7530/03RV2M, BIOS 1.14.4 10/21/2020 RIP: 0010:kmem_cache_alloc_trace+0x8c/0x240 Code: 08 65 4c 03 05 1d e8 f7 6e 49 83 78 10 00 4d 8b 38 0f 84 92 01 00 00 4d 85 ff 0f 84 89 01 00 00 41 8b 41 20 49 8b 39 4c 01 f8 <48> 8b 18 48 89 c1 49 33 99 70 01 00 00 4c 89 f8 48 0f c9 48 31 cb RSP: 0018:a6ca860f7ba0 EFLAGS: 00010286 RAX: fdd44d7c219190e1 RBX: RCX: RDX: d558 RSI: 0cc0 RDI: 00035060 RBP: a6ca860f7bd0 R08: 99233c035060 R09: 992338c079c0 R10: 0001 R11: 0004 R12: 0cc0 R13: 000b R14: 992338c079c0 R15: fdd44d7c219190e1 FS: 7fdc24e29700() GS:99233c00() knlGS: CS: 0010 DS: ES: CR0: 80050033 CR2: 7f15a80ee010 CR3: 0007e36b2006 CR4: 003606f0 Call Trace: ? proc_self_get_link+0x70/0xd0 proc_self_get_link+0x70/0xd0 link_path_walk.part.0+0x478/0x550 ? trailing_symlink+0x1d1/0x280 path_openat+0xb7/0x290 do_filp_open+0x91/0x100 ? unuse_pde+0x30/0x30 do_sys_open+0x17e/0x290 __x64_sys_openat+0x20/0x30 __orig_openat+0x71/0xc0 [eset_rtp] ? __switch_to_asm+0x40/0x70 ? __switch_to_asm+0x34/0x70 ? __switch_to_asm+0x40/0x70 ? __x64_sys_futex+0x13f/0x170 ? __switch_to_asm+0x34/0x70 ? __switch_to_asm+0x40/0x70 ? __switch_to_asm+0x34/0x70 ? __switch_to_asm+0x40/0x70 __x64_sys_ertp_openat+0x29/0x60 [eset_rtp] do_syscall_64+0x57/0x190 entry_SYSCALL_64_after_hwframe+0x44/0xa9 RIP: 0033:0x7fdc28a41f24 Code: 24 20 eb 8f 66 90 44 89 54 24 0c e8 56 68 f8 ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 32 44 89 c7 89 44 24 0c e8 88 68 f8 ff 8b 44 RSP: 002b:7fdc24e25980 EFLAGS: 0293 ORIG_RAX: 0101 RAX: ffda RBX: 7fdc040008d0 RCX: 7fdc28a41f24 ? unuse_pde+0x30/0x30 do_sys_open+0x17e/0x290 __x64_sys_openat+0x20/0x30 __orig_openat+0x71/0xc0 [eset_rtp] ? __switch_to_asm+0x40/0x70 ? __switch_to_asm+0x34/0x70 ? __switch_to_asm+0x40/0x70 ? __x64_sys_futex+0x13f/0x170 ? __switch_to_asm+0x34/0x70 ? __switch_to_asm+0x40/0x70 ? __switch_to_asm+0x34/0x70 ? __switch_to_asm+0x40/0x70 __x64_sys_ertp_openat+0x29/0x60 [eset_rtp] do_syscall_64+0x57/0x190 entry_SYSCALL_64_after_hwframe+0x44/0xa9 RIP: 0033:0x7fdc28a41f24 Code: 24 20 eb 8f 66 90 44 89 54 24 0c e8 56 68 f8 ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 32 44 89 c7 89 44 24 0c e8 88 68 f8 ff 8b 44 RSP: 002b:7fdc24e25980 EFLAGS: 0293 ORIG_RAX: 0101 RAX: ffda RBX: 7fdc040008d0 RCX: 7fdc28a41f24 RDX: 0008 RSI: 564d4410a8c8 RDI: ff9c RBP: 564d4410a8c8 R08: R09: 0001 R10: R11: 0293 R12: 0008 R13: 564d4410e28a R14: 7fdc24e25b40 R15: 7fdc24e28fc0 Modules linked in: cmac nls_utf8 cifs fscache libdes ccm vboxnetadp(OE) vboxnetflt(OE) vboxdrv(OE) eset_rtp(OE) xt_conntrack xt_MASQUERADE nf_conntrack_netlink nfnetlink xfrm_user xfrm_algo xt_addrtype iptable_filter iptable_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ip> snd_seq_midi coretemp snd_seq_midi_event snd_rawmidi kvm_intel snd_seq kvm dell_wmi snd_seq_device rapl dell_smbios snd_timer dcdbas intel_
[Kernel-packages] [Bug 1959665] Re: linux-image-5.4.0-97.110 freezes by accessing cifs shares
There were 3 cifs patches in this last version. I've reverted all 3. please try this test kernel to see if it corrects your issues: wget https://kernel.ubuntu.com/~rtg/focal-cifs-freeze-lp1959665/lp1959665.1/amd64/linux-image-unsigned-5.4.0-98-generic_5.4.0-98.111~lp1959665.1_amd64.deb wget https://kernel.ubuntu.com/~rtg/focal-cifs-freeze-lp1959665/lp1959665.1/amd64/linux-modules-5.4.0-98-generic_5.4.0-98.111~lp1959665.1_amd64.deb wget https://kernel.ubuntu.com/~rtg/focal-cifs-freeze-lp1959665/lp1959665.1/amd64/linux-modules-extra-5.4.0-98-generic_5.4.0-98.111~lp1959665.1_amd64.deb sudo dpkg -i *.deb sudo apt-get -f install ** Also affects: linux (Ubuntu Focal) Importance: Undecided Status: New ** Changed in: linux (Ubuntu Focal) Status: New => In Progress ** Changed in: linux (Ubuntu Focal) Importance: Undecided => Medium ** Changed in: linux (Ubuntu Focal) Assignee: (unassigned) => Tim Gardner (timg-tpi) ** Changed in: linux (Ubuntu) Status: Confirmed => Invalid -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1959665 Title: linux-image-5.4.0-97.110 freezes by accessing cifs shares Status in linux package in Ubuntu: Invalid Status in linux source package in Focal: In Progress Bug description: Ubuntu 20.04 with kernel image 5.4.0-97.110 randomly freezes when we access cifs shares. The system needs a hard reset after the freeze. The previous kernel image (5.4.0-96.109) does not show this behavior. Multiple Ubuntu 20.04 systems running on kernel image 9.4.0-97.110 are affected on our sites. The cifs shares are accessed via autofs using Kerberos authentication. The following info is the only error message we could actively catch on a different system before the system was frozen: general protection fault: [#3] SMP PTI CPU: 0 PID: 21294 Comm: automount Tainted: G DOE 5.4.0-97-generic #110-Ubuntu Hardware name: Dell Inc. Precision 7530/03RV2M, BIOS 1.14.4 10/21/2020 RIP: 0010:kmem_cache_alloc_trace+0x8c/0x240 Code: 08 65 4c 03 05 1d e8 f7 6e 49 83 78 10 00 4d 8b 38 0f 84 92 01 00 00 4d 85 ff 0f 84 89 01 00 00 41 8b 41 20 49 8b 39 4c 01 f8 <48> 8b 18 48 89 c1 49 33 99 70 01 00 00 4c 89 f8 48 0f c9 48 31 cb RSP: 0018:a6ca860f7ba0 EFLAGS: 00010286 RAX: fdd44d7c219190e1 RBX: RCX: RDX: d558 RSI: 0cc0 RDI: 00035060 RBP: a6ca860f7bd0 R08: 99233c035060 R09: 992338c079c0 R10: 0001 R11: 0004 R12: 0cc0 R13: 000b R14: 992338c079c0 R15: fdd44d7c219190e1 FS: 7fdc24e29700() GS:99233c00() knlGS: CS: 0010 DS: ES: CR0: 80050033 CR2: 7f15a80ee010 CR3: 0007e36b2006 CR4: 003606f0 Call Trace: ? proc_self_get_link+0x70/0xd0 proc_self_get_link+0x70/0xd0 link_path_walk.part.0+0x478/0x550 ? trailing_symlink+0x1d1/0x280 path_openat+0xb7/0x290 do_filp_open+0x91/0x100 ? unuse_pde+0x30/0x30 do_sys_open+0x17e/0x290 __x64_sys_openat+0x20/0x30 __orig_openat+0x71/0xc0 [eset_rtp] ? __switch_to_asm+0x40/0x70 ? __switch_to_asm+0x34/0x70 ? __switch_to_asm+0x40/0x70 ? __x64_sys_futex+0x13f/0x170 ? __switch_to_asm+0x34/0x70 ? __switch_to_asm+0x40/0x70 ? __switch_to_asm+0x34/0x70 ? __switch_to_asm+0x40/0x70 __x64_sys_ertp_openat+0x29/0x60 [eset_rtp] do_syscall_64+0x57/0x190 entry_SYSCALL_64_after_hwframe+0x44/0xa9 RIP: 0033:0x7fdc28a41f24 Code: 24 20 eb 8f 66 90 44 89 54 24 0c e8 56 68 f8 ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 32 44 89 c7 89 44 24 0c e8 88 68 f8 ff 8b 44 RSP: 002b:7fdc24e25980 EFLAGS: 0293 ORIG_RAX: 0101 RAX: ffda RBX: 7fdc040008d0 RCX: 7fdc28a41f24 ? unuse_pde+0x30/0x30 do_sys_open+0x17e/0x290 __x64_sys_openat+0x20/0x30 __orig_openat+0x71/0xc0 [eset_rtp] ? __switch_to_asm+0x40/0x70 ? __switch_to_asm+0x34/0x70 ? __switch_to_asm+0x40/0x70 ? __x64_sys_futex+0x13f/0x170 ? __switch_to_asm+0x34/0x70 ? __switch_to_asm+0x40/0x70 ? __switch_to_asm+0x34/0x70 ? __switch_to_asm+0x40/0x70 __x64_sys_ertp_openat+0x29/0x60 [eset_rtp] do_syscall_64+0x57/0x190 entry_SYSCALL_64_after_hwframe+0x44/0xa9 RIP: 0033:0x7fdc28a41f24 Code: 24 20 eb 8f 66 90 44 89 54 24 0c e8 56 68 f8 ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 32 44 89 c7 89 44 24 0c e8 88 68 f8 ff 8b 44 RSP: 002b:7fdc24e25980 EFLAGS: 0293 ORIG_RAX: 0101 RAX: ffda RBX: 7fdc040008d0 RCX: 7fdc28a41f24 RDX: 0008 RSI: 564d4410a8c8 RDI: ff9c RBP: 564d4410a8c8 R08: R09: 0001 R10
[Kernel-packages] [Bug 1959665] Re: linux-image-5.4.0-97.110 freezes by accessing cifs shares
``` Servers: Number of credits: 185 Dialect 0x300 1) Name: a.b.c.d Uses: 1 Capability: 0x300067 Session Status: 1 TCP status: 1 Instance: 1 Local Users To Server: 1 SecMode: 0x1 Req On Wire: 0 SessionId: 0xc1be04000435 Shares: 0) IPC: \\xxx\IPC$ Mounts: 1 DevInfo: 0x0 Attributes: 0x0 PathComponentMax: 0 Status: 1 type: 0 Serial Number: 0x0 Share Capabilities: NoneShare Flags: 0x30 tid: 0x1Maximal Access: 0x11f01ff 1) \\xxx\yyy Mounts: 1 DevInfo: 0x60020 Attributes: 0xc700ff PathComponentMax: 255 Status: 1 type: DISK Serial Number: 0xaaf791c3 Share Capabilities: DFS, Aligned, Partition Aligned, TRIM-support, Share Flags: 0x803 tid: 0x5Optimal sector size: 0x200 Maximal Access: 0x1200a9 MIDs: Server interfaces: 1 0) Speed: 100 bps Capabilities: IPv4: e.f.g.h Debuginfo: [ 710.383873] kernel BUG at mm/slub.c:307! [ 710.384582] invalid opcode: [#1] SMP PTI [ 710.385116] CPU: 1 PID: 3089 Comm: umount Not tainted 5.4.0-97-generic #110-Ubuntu [ 710.385775] Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 12/12/2018 [ 710.386903] RIP: 0010:__slab_free+0x199/0x360 [ 710.387470] Code: 00 48 89 c7 fa 66 0f 1f 44 00 00 f0 49 0f ba 2c 24 00 72 79 4d 3b 6c 24 20 74 11 49 0f ba 34 24 00 57 9d 0f 1f 44 00 00 eb 9f <0f> 0b 49 3b 5c 24 28 75 e8 48 8b 44 24 28 49 89 4c 24 28 49 89 44 [ 710.389229] RSP: 0018:b94541417ce0 EFLAGS: 00010246 [ 710.389809] RAX: 90cfb5fab120 RBX: 8080007f RCX: 90cfb5fab120 [ 710.390406] RDX: 90cfb5fab120 RSI: ec7d84d7eac0 RDI: 90cfbb003880 [ 710.390993] RBP: b94541417d90 R08: 0001 R09: c08ed620 [ 710.391574] R10: 90cfb5fab120 R11: 0001 R12: ec7d84d7eac0 [ 710.392147] R13: 90cfb5fab120 R14: 90cfbb003880 R15: [ 710.392709] FS: 7f7b219e5840() GS:90cfbba8() knlGS: [ 710.393274] CS: 0010 DS: ES: CR0: 80050033 [ 710.393820] CR2: 55a3da30b9d0 CR3: 00012658a006 CR4: 007606e0 [ 710.394545] PKRU: 5554 [ 710.395093] Call Trace: [ 710.395760] ? fscache_free_cookie+0x39/0x60 [fscache] [ 710.396480] ? cifs_cleanup_volume_info_contents+0x30/0x60 [cifs] [ 710.397026] kfree+0x231/0x250 [ 710.397593] cifs_cleanup_volume_info_contents+0x30/0x60 [cifs] [ 710.398159] dfs_cache_del_vol+0xec/0x1a0 [cifs] [ 710.398720] cifs_umount+0x9e/0xd0 [cifs] [ 710.399270] cifs_kill_sb+0x1f/0x30 [cifs] [ 710.399807] deactivate_locked_super+0x3b/0x80 [ 710.400358] deactivate_super+0x3e/0x50 [ 710.400882] cleanup_mnt+0x109/0x160 [ 710.401403] __cleanup_mnt+0x12/0x20 [ 710.401919] task_work_run+0x8f/0xb0 [ 710.402456] exit_to_usermode_loop+0x131/0x160 [ 710.402956] do_syscall_64+0x163/0x190 [ 710.403448] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 710.403922] RIP: 0033:0x7f7b21c4a2cb [ 710.404380] Code: 8b 0c 00 f7 d8 64 89 01 48 83 c8 ff c3 66 90 f3 0f 1e fa 31 f6 e9 05 00 00 00 0f 1f 44 00 00 f3 0f 1e fa b8 a6 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 95 8b 0c 00 f7 d8 64 89 01 48 [ 710.405823] RSP: 002b:7fff6a6cdc28 EFLAGS: 0246 ORIG_RAX: 00a6 [ 710.406325] RAX: RBX: 7f7b21d79204 RCX: 7f7b21c4a2cb [ 710.406811] RDX: RSI: RDI: 560106a71ae0 [ 710.407317] RBP: 560106a6a890 R08: R09: 7fff6a6cc9a0 [ 710.407790] R10: 7f7b21d65339 R11: 0246 R12: 560106a71ae0 [ 710.408249] R13: R14: 560106a6a988 R15: 560106a6aaa0 [ 710.408707] Modules linked in: md4 cmac nls_utf8 cifs libarc4 fscache libdes vmw_vsock_vmci_transport vsock dm_multipath scsi_dh_rdac scsi_dh_emc scsi_dh_alua intel_rapl_msr intel_rapl_common isst_if_mbox_msr isst_if_common nfit rapl vmw_balloon joydev input_leds serio_raw vmw_vmci mac_hid sch_fq_codel msr ip_tables x_tables autofs4 btrfs zstd_compress raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx xor raid6_pq libcrc32c raid1 raid0 multipath linear crct10dif_pclmul crc32_pclmul ghash_clmulni_intel aesni_intel crypto_simd cryptd glue_helper vmwgfx ttm psmouse drm_kms_helper syscopyarea ahci sysfillrect sysimgblt vmw_pvscsi libahci fb_sys_fops vmxnet3 pata_acpi drm i2c_piix4 [ 710.412749] ---[ end trace c3b4f6aeb4b07511 ]--- [ 710.413274] RIP: 0010:__slab_free+0x199/0x360 [ 710.413781] Code: 00 48 89 c7 fa 66 0f 1f 44 00 00 f0 49 0f ba 2c 24 00 72 79 4d 3b 6c 24 20 74 11 49 0f ba 34 24 00 57 9d 0f 1f 44 00 00 eb 9f <0f> 0b 49 3b 5c 24 28 75 e8 48 8b 44 24 28 49 89 4c 24 28 49 89 44 [ 710.415405] RSP: 0018:b94541417ce0 EFLAGS: 00010246 [ 710.415948] RAX: 90cfb5fab120 RBX: 8080007f RCX: 90cfb5fab120 [ 710.416497] RDX: 90cfb5fab
[Kernel-packages] [Bug 1959665] Re: linux-image-5.4.0-97.110 freezes by accessing cifs shares
** Summary changed: - linux-image-9.4.0-97.110 freezes by accessing cifs shares + linux-image-5.4.0-97.110 freezes by accessing cifs shares ** Description changed: - Ubuntu 20.04 with kernel image 9.4.0-97.110 randomly freezes when we + Ubuntu 20.04 with kernel image 5.4.0-97.110 randomly freezes when we access cifs shares. The system needs a hard reset after the freeze. The previous kernel image (5.4.0-96.109) does not show this behavior. Multiple Ubuntu 20.04 systems running on kernel image 9.4.0-97.110 are affected on our sites. The cifs shares are accessed via autofs using Kerberos authentication. The following info is the only error message we could actively catch on a different system before the system was frozen: general protection fault: [#3] SMP PTI CPU: 0 PID: 21294 Comm: automount Tainted: G DOE 5.4.0-97-generic #110-Ubuntu Hardware name: Dell Inc. Precision 7530/03RV2M, BIOS 1.14.4 10/21/2020 RIP: 0010:kmem_cache_alloc_trace+0x8c/0x240 Code: 08 65 4c 03 05 1d e8 f7 6e 49 83 78 10 00 4d 8b 38 0f 84 92 01 00 00 4d 85 ff 0f 84 89 01 00 00 41 8b 41 20 49 8b 39 4c 01 f8 <48> 8b 18 48 89 c1 49 33 99 70 01 00 00 4c 89 f8 48 0f c9 48 31 cb RSP: 0018:a6ca860f7ba0 EFLAGS: 00010286 RAX: fdd44d7c219190e1 RBX: RCX: RDX: d558 RSI: 0cc0 RDI: 00035060 RBP: a6ca860f7bd0 R08: 99233c035060 R09: 992338c079c0 R10: 0001 R11: 0004 R12: 0cc0 R13: 000b R14: 992338c079c0 R15: fdd44d7c219190e1 FS: 7fdc24e29700() GS:99233c00() knlGS: CS: 0010 DS: ES: CR0: 80050033 CR2: 7f15a80ee010 CR3: 0007e36b2006 CR4: 003606f0 Call Trace: - ? proc_self_get_link+0x70/0xd0 - proc_self_get_link+0x70/0xd0 - link_path_walk.part.0+0x478/0x550 - ? trailing_symlink+0x1d1/0x280 - path_openat+0xb7/0x290 - do_filp_open+0x91/0x100 - ? unuse_pde+0x30/0x30 - do_sys_open+0x17e/0x290 - __x64_sys_openat+0x20/0x30 - __orig_openat+0x71/0xc0 [eset_rtp] - ? __switch_to_asm+0x40/0x70 - ? __switch_to_asm+0x34/0x70 - ? __switch_to_asm+0x40/0x70 - ? __x64_sys_futex+0x13f/0x170 - ? __switch_to_asm+0x34/0x70 - ? __switch_to_asm+0x40/0x70 - ? __switch_to_asm+0x34/0x70 - ? __switch_to_asm+0x40/0x70 - __x64_sys_ertp_openat+0x29/0x60 [eset_rtp] - do_syscall_64+0x57/0x190 - entry_SYSCALL_64_after_hwframe+0x44/0xa9 + ? proc_self_get_link+0x70/0xd0 + proc_self_get_link+0x70/0xd0 + link_path_walk.part.0+0x478/0x550 + ? trailing_symlink+0x1d1/0x280 + path_openat+0xb7/0x290 + do_filp_open+0x91/0x100 + ? unuse_pde+0x30/0x30 + do_sys_open+0x17e/0x290 + __x64_sys_openat+0x20/0x30 + __orig_openat+0x71/0xc0 [eset_rtp] + ? __switch_to_asm+0x40/0x70 + ? __switch_to_asm+0x34/0x70 + ? __switch_to_asm+0x40/0x70 + ? __x64_sys_futex+0x13f/0x170 + ? __switch_to_asm+0x34/0x70 + ? __switch_to_asm+0x40/0x70 + ? __switch_to_asm+0x34/0x70 + ? __switch_to_asm+0x40/0x70 + __x64_sys_ertp_openat+0x29/0x60 [eset_rtp] + do_syscall_64+0x57/0x190 + entry_SYSCALL_64_after_hwframe+0x44/0xa9 RIP: 0033:0x7fdc28a41f24 Code: 24 20 eb 8f 66 90 44 89 54 24 0c e8 56 68 f8 ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 32 44 89 c7 89 44 24 0c e8 88 68 f8 ff 8b 44 RSP: 002b:7fdc24e25980 EFLAGS: 0293 ORIG_RAX: 0101 RAX: ffda RBX: 7fdc040008d0 RCX: 7fdc28a41f24 - ? unuse_pde+0x30/0x30 - do_sys_open+0x17e/0x290 - __x64_sys_openat+0x20/0x30 - __orig_openat+0x71/0xc0 [eset_rtp] - ? __switch_to_asm+0x40/0x70 - ? __switch_to_asm+0x34/0x70 - ? __switch_to_asm+0x40/0x70 - ? __x64_sys_futex+0x13f/0x170 - ? __switch_to_asm+0x34/0x70 - ? __switch_to_asm+0x40/0x70 - ? __switch_to_asm+0x34/0x70 - ? __switch_to_asm+0x40/0x70 - __x64_sys_ertp_openat+0x29/0x60 [eset_rtp] - do_syscall_64+0x57/0x190 - entry_SYSCALL_64_after_hwframe+0x44/0xa9 + ? unuse_pde+0x30/0x30 + do_sys_open+0x17e/0x290 + __x64_sys_openat+0x20/0x30 + __orig_openat+0x71/0xc0 [eset_rtp] + ? __switch_to_asm+0x40/0x70 + ? __switch_to_asm+0x34/0x70 + ? __switch_to_asm+0x40/0x70 + ? __x64_sys_futex+0x13f/0x170 + ? __switch_to_asm+0x34/0x70 + ? __switch_to_asm+0x40/0x70 + ? __switch_to_asm+0x34/0x70 + ? __switch_to_asm+0x40/0x70 + __x64_sys_ertp_openat+0x29/0x60 [eset_rtp] + do_syscall_64+0x57/0x190 + entry_SYSCALL_64_after_hwframe+0x44/0xa9 RIP: 0033:0x7fdc28a41f24 Code: 24 20 eb 8f 66 90 44 89 54 24 0c e8 56 68 f8 ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 32 44 89 c7 89 44 24 0c e8 88 68 f8 ff 8b 44 RSP: 002b:7fdc24e25980 EFLAGS: 0293 ORIG_RAX: 0101 RAX: ffda RBX: 7fdc040008d0 RCX: 7fdc28a41f24 RDX: 0008 RSI: 564d4410a8c8 RDI: ff9c RBP: 564d4410a8c8 R08: 0