[Kernel-packages] [Bug 1959665] Re: linux-image-5.4.0-97.110 freezes by accessing cifs shares

2022-02-08 Thread Sebastian Berner
Hi Tim,

I can confirm that 5.4.0-99.112 fixes the cifs issue.

Testing in our environment does not show any freezes accessing cifs
shares while using 5.4.0-99.112.

Best Regards,
Sebastian

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1959665

Title:
  linux-image-5.4.0-97.110 freezes by accessing cifs shares

Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Focal:
  Fix Released

Bug description:
  Ubuntu 20.04 with kernel image 5.4.0-97.110 randomly freezes when we
  access cifs shares. The system needs a hard reset after the freeze.

  The previous kernel image (5.4.0-96.109) does not show this behavior.
  Multiple Ubuntu 20.04 systems running on kernel image 9.4.0-97.110 are
  affected on our sites.

  The cifs shares are accessed via autofs using Kerberos authentication.

  The following info is the only error message we could actively catch
  on a different system before the system was frozen:

  general protection fault:  [#3] SMP PTI
  CPU: 0 PID: 21294 Comm: automount Tainted: G  DOE 
5.4.0-97-generic #110-Ubuntu
  Hardware name: Dell Inc. Precision 7530/03RV2M, BIOS 1.14.4 10/21/2020
  RIP: 0010:kmem_cache_alloc_trace+0x8c/0x240
  Code: 08 65 4c 03 05 1d e8 f7 6e 49 83 78 10 00 4d 8b 38 0f 84 92 01 00 00 4d 
85 ff 0f 84 89 01 00 00 41 8b 41 20 49 8b 39 4c 01 f8 <48> 8b 18 48 89 c1 49 33 
99 70 01 00 00 4c 89 f8 48 0f c9 48 31 cb
  RSP: 0018:a6ca860f7ba0 EFLAGS: 00010286
  RAX: fdd44d7c219190e1 RBX:  RCX: 
  RDX: d558 RSI: 0cc0 RDI: 00035060
  RBP: a6ca860f7bd0 R08: 99233c035060 R09: 992338c079c0
  R10: 0001 R11: 0004 R12: 0cc0
  R13: 000b R14: 992338c079c0 R15: fdd44d7c219190e1
  FS:  7fdc24e29700() GS:99233c00() knlGS:
  CS:  0010 DS:  ES:  CR0: 80050033
  CR2: 7f15a80ee010 CR3: 0007e36b2006 CR4: 003606f0
  Call Trace:
   ? proc_self_get_link+0x70/0xd0
   proc_self_get_link+0x70/0xd0
   link_path_walk.part.0+0x478/0x550
   ? trailing_symlink+0x1d1/0x280
   path_openat+0xb7/0x290
   do_filp_open+0x91/0x100
   ? unuse_pde+0x30/0x30
   do_sys_open+0x17e/0x290
   __x64_sys_openat+0x20/0x30
   __orig_openat+0x71/0xc0 [eset_rtp]
   ? __switch_to_asm+0x40/0x70
   ? __switch_to_asm+0x34/0x70
   ? __switch_to_asm+0x40/0x70
   ? __x64_sys_futex+0x13f/0x170
   ? __switch_to_asm+0x34/0x70
   ? __switch_to_asm+0x40/0x70
   ? __switch_to_asm+0x34/0x70
   ? __switch_to_asm+0x40/0x70
   __x64_sys_ertp_openat+0x29/0x60 [eset_rtp]
   do_syscall_64+0x57/0x190
   entry_SYSCALL_64_after_hwframe+0x44/0xa9
  RIP: 0033:0x7fdc28a41f24
  Code: 24 20 eb 8f 66 90 44 89 54 24 0c e8 56 68 f8 ff 44 8b 54 24 0c 44 89 e2 
48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 32 
44 89 c7 89 44 24 0c e8 88 68 f8 ff 8b 44
  RSP: 002b:7fdc24e25980 EFLAGS: 0293 ORIG_RAX: 0101
  RAX: ffda RBX: 7fdc040008d0 RCX: 7fdc28a41f24
   ? unuse_pde+0x30/0x30
   do_sys_open+0x17e/0x290
   __x64_sys_openat+0x20/0x30
   __orig_openat+0x71/0xc0 [eset_rtp]
   ? __switch_to_asm+0x40/0x70
   ? __switch_to_asm+0x34/0x70
   ? __switch_to_asm+0x40/0x70
   ? __x64_sys_futex+0x13f/0x170
   ? __switch_to_asm+0x34/0x70
   ? __switch_to_asm+0x40/0x70
   ? __switch_to_asm+0x34/0x70
   ? __switch_to_asm+0x40/0x70
   __x64_sys_ertp_openat+0x29/0x60 [eset_rtp]
   do_syscall_64+0x57/0x190
   entry_SYSCALL_64_after_hwframe+0x44/0xa9
  RIP: 0033:0x7fdc28a41f24
  Code: 24 20 eb 8f 66 90 44 89 54 24 0c e8 56 68 f8 ff 44 8b 54 24 0c 44 89 e2 
48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 32 
44 89 c7 89 44 24 0c e8 88 68 f8 ff 8b 44
  RSP: 002b:7fdc24e25980 EFLAGS: 0293 ORIG_RAX: 0101
  RAX: ffda RBX: 7fdc040008d0 RCX: 7fdc28a41f24
  RDX: 0008 RSI: 564d4410a8c8 RDI: ff9c
  RBP: 564d4410a8c8 R08:  R09: 0001
  R10:  R11: 0293 R12: 0008
  R13: 564d4410e28a R14: 7fdc24e25b40 R15: 7fdc24e28fc0
  Modules linked in: cmac nls_utf8 cifs fscache libdes ccm vboxnetadp(OE) 
vboxnetflt(OE) vboxdrv(OE) eset_rtp(OE) xt_conntrack xt_MASQUERADE 
nf_conntrack_netlink nfnetlink xfrm_user xfrm_algo xt_addrtype iptable_filter 
iptable_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ip>
   snd_seq_midi coretemp snd_seq_midi_event snd_rawmidi kvm_intel snd_seq kvm 
dell_wmi snd_seq_device rapl dell_smbios snd_timer dcdbas intel_cstate 
input_leds iwlwifi serio_raw snd intel_wmi_thunderbolt rtsx_pci_ms 
dell_wmi_descriptor wmi_bmof processor_thermal_device ucsi_acp>
   pinctrl_cannonlake video pinctrl_intel
  ---[ end trace 80828f22da45a19b ]---
  RIP: 0010:__slab_free+0x199/0x360
  Code: 00 48 89

[Kernel-packages] [Bug 1959665] Re: linux-image-5.4.0-97.110 freezes by accessing cifs shares

2022-02-02 Thread Sebastian Berner
Just a quick heads up on my tests with different kernel versions. I have
installed all available Updates for Ubuntu 20.04 (including samba-*=
2:4.13.17~dfsg-0ubuntu0.21.04.1; CVE-2022-0336). These are the results:

GA:
5.4.0-98.111~lp1959665.1 -> no freezes in 3 hours of testing
5.4.0-97.110 -> still keeps freezing

HWE:
5.13.0-27.29~20.04.1 -> no freezes in 1 hour of testing
5.13.0-28.31~20.04.1 -> no freezes in 1 hour of testing

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-0336

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1959665

Title:
  linux-image-5.4.0-97.110 freezes by accessing cifs shares

Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Focal:
  In Progress

Bug description:
  Ubuntu 20.04 with kernel image 5.4.0-97.110 randomly freezes when we
  access cifs shares. The system needs a hard reset after the freeze.

  The previous kernel image (5.4.0-96.109) does not show this behavior.
  Multiple Ubuntu 20.04 systems running on kernel image 9.4.0-97.110 are
  affected on our sites.

  The cifs shares are accessed via autofs using Kerberos authentication.

  The following info is the only error message we could actively catch
  on a different system before the system was frozen:

  general protection fault:  [#3] SMP PTI
  CPU: 0 PID: 21294 Comm: automount Tainted: G  DOE 
5.4.0-97-generic #110-Ubuntu
  Hardware name: Dell Inc. Precision 7530/03RV2M, BIOS 1.14.4 10/21/2020
  RIP: 0010:kmem_cache_alloc_trace+0x8c/0x240
  Code: 08 65 4c 03 05 1d e8 f7 6e 49 83 78 10 00 4d 8b 38 0f 84 92 01 00 00 4d 
85 ff 0f 84 89 01 00 00 41 8b 41 20 49 8b 39 4c 01 f8 <48> 8b 18 48 89 c1 49 33 
99 70 01 00 00 4c 89 f8 48 0f c9 48 31 cb
  RSP: 0018:a6ca860f7ba0 EFLAGS: 00010286
  RAX: fdd44d7c219190e1 RBX:  RCX: 
  RDX: d558 RSI: 0cc0 RDI: 00035060
  RBP: a6ca860f7bd0 R08: 99233c035060 R09: 992338c079c0
  R10: 0001 R11: 0004 R12: 0cc0
  R13: 000b R14: 992338c079c0 R15: fdd44d7c219190e1
  FS:  7fdc24e29700() GS:99233c00() knlGS:
  CS:  0010 DS:  ES:  CR0: 80050033
  CR2: 7f15a80ee010 CR3: 0007e36b2006 CR4: 003606f0
  Call Trace:
   ? proc_self_get_link+0x70/0xd0
   proc_self_get_link+0x70/0xd0
   link_path_walk.part.0+0x478/0x550
   ? trailing_symlink+0x1d1/0x280
   path_openat+0xb7/0x290
   do_filp_open+0x91/0x100
   ? unuse_pde+0x30/0x30
   do_sys_open+0x17e/0x290
   __x64_sys_openat+0x20/0x30
   __orig_openat+0x71/0xc0 [eset_rtp]
   ? __switch_to_asm+0x40/0x70
   ? __switch_to_asm+0x34/0x70
   ? __switch_to_asm+0x40/0x70
   ? __x64_sys_futex+0x13f/0x170
   ? __switch_to_asm+0x34/0x70
   ? __switch_to_asm+0x40/0x70
   ? __switch_to_asm+0x34/0x70
   ? __switch_to_asm+0x40/0x70
   __x64_sys_ertp_openat+0x29/0x60 [eset_rtp]
   do_syscall_64+0x57/0x190
   entry_SYSCALL_64_after_hwframe+0x44/0xa9
  RIP: 0033:0x7fdc28a41f24
  Code: 24 20 eb 8f 66 90 44 89 54 24 0c e8 56 68 f8 ff 44 8b 54 24 0c 44 89 e2 
48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 32 
44 89 c7 89 44 24 0c e8 88 68 f8 ff 8b 44
  RSP: 002b:7fdc24e25980 EFLAGS: 0293 ORIG_RAX: 0101
  RAX: ffda RBX: 7fdc040008d0 RCX: 7fdc28a41f24
   ? unuse_pde+0x30/0x30
   do_sys_open+0x17e/0x290
   __x64_sys_openat+0x20/0x30
   __orig_openat+0x71/0xc0 [eset_rtp]
   ? __switch_to_asm+0x40/0x70
   ? __switch_to_asm+0x34/0x70
   ? __switch_to_asm+0x40/0x70
   ? __x64_sys_futex+0x13f/0x170
   ? __switch_to_asm+0x34/0x70
   ? __switch_to_asm+0x40/0x70
   ? __switch_to_asm+0x34/0x70
   ? __switch_to_asm+0x40/0x70
   __x64_sys_ertp_openat+0x29/0x60 [eset_rtp]
   do_syscall_64+0x57/0x190
   entry_SYSCALL_64_after_hwframe+0x44/0xa9
  RIP: 0033:0x7fdc28a41f24
  Code: 24 20 eb 8f 66 90 44 89 54 24 0c e8 56 68 f8 ff 44 8b 54 24 0c 44 89 e2 
48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 32 
44 89 c7 89 44 24 0c e8 88 68 f8 ff 8b 44
  RSP: 002b:7fdc24e25980 EFLAGS: 0293 ORIG_RAX: 0101
  RAX: ffda RBX: 7fdc040008d0 RCX: 7fdc28a41f24
  RDX: 0008 RSI: 564d4410a8c8 RDI: ff9c
  RBP: 564d4410a8c8 R08:  R09: 0001
  R10:  R11: 0293 R12: 0008
  R13: 564d4410e28a R14: 7fdc24e25b40 R15: 7fdc24e28fc0
  Modules linked in: cmac nls_utf8 cifs fscache libdes ccm vboxnetadp(OE) 
vboxnetflt(OE) vboxdrv(OE) eset_rtp(OE) xt_conntrack xt_MASQUERADE 
nf_conntrack_netlink nfnetlink xfrm_user xfrm_algo xt_addrtype iptable_filter 
iptable_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ip>
   snd_seq_midi coretemp snd_seq_midi_event snd_rawmidi kvm_intel snd_seq kvm 
dell_wmi snd_seq_devi

[Kernel-packages] [Bug 1959665] Re: linux-image-5.4.0-97.110 freezes by accessing cifs shares

2022-02-02 Thread Sebastian Berner
Hi,

thanks for the quick reply.

I can confirm, that while running on 5.4.0-98-generic #111~lp1959665.1 I
was able to access all of our cifs shares without issues.

A script, which creates, reads, modifies and deletes files on different
cifs shares also works without any issue.

Removing the latest cifs patches from kernel 5.4.0-97.110 seems to fix
our issue.

I will keep testing on 5.4.0-98-generic #111~lp1959665.1.

Best regards,
Sebastian

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1959665

Title:
  linux-image-5.4.0-97.110 freezes by accessing cifs shares

Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Focal:
  In Progress

Bug description:
  Ubuntu 20.04 with kernel image 5.4.0-97.110 randomly freezes when we
  access cifs shares. The system needs a hard reset after the freeze.

  The previous kernel image (5.4.0-96.109) does not show this behavior.
  Multiple Ubuntu 20.04 systems running on kernel image 9.4.0-97.110 are
  affected on our sites.

  The cifs shares are accessed via autofs using Kerberos authentication.

  The following info is the only error message we could actively catch
  on a different system before the system was frozen:

  general protection fault:  [#3] SMP PTI
  CPU: 0 PID: 21294 Comm: automount Tainted: G  DOE 
5.4.0-97-generic #110-Ubuntu
  Hardware name: Dell Inc. Precision 7530/03RV2M, BIOS 1.14.4 10/21/2020
  RIP: 0010:kmem_cache_alloc_trace+0x8c/0x240
  Code: 08 65 4c 03 05 1d e8 f7 6e 49 83 78 10 00 4d 8b 38 0f 84 92 01 00 00 4d 
85 ff 0f 84 89 01 00 00 41 8b 41 20 49 8b 39 4c 01 f8 <48> 8b 18 48 89 c1 49 33 
99 70 01 00 00 4c 89 f8 48 0f c9 48 31 cb
  RSP: 0018:a6ca860f7ba0 EFLAGS: 00010286
  RAX: fdd44d7c219190e1 RBX:  RCX: 
  RDX: d558 RSI: 0cc0 RDI: 00035060
  RBP: a6ca860f7bd0 R08: 99233c035060 R09: 992338c079c0
  R10: 0001 R11: 0004 R12: 0cc0
  R13: 000b R14: 992338c079c0 R15: fdd44d7c219190e1
  FS:  7fdc24e29700() GS:99233c00() knlGS:
  CS:  0010 DS:  ES:  CR0: 80050033
  CR2: 7f15a80ee010 CR3: 0007e36b2006 CR4: 003606f0
  Call Trace:
   ? proc_self_get_link+0x70/0xd0
   proc_self_get_link+0x70/0xd0
   link_path_walk.part.0+0x478/0x550
   ? trailing_symlink+0x1d1/0x280
   path_openat+0xb7/0x290
   do_filp_open+0x91/0x100
   ? unuse_pde+0x30/0x30
   do_sys_open+0x17e/0x290
   __x64_sys_openat+0x20/0x30
   __orig_openat+0x71/0xc0 [eset_rtp]
   ? __switch_to_asm+0x40/0x70
   ? __switch_to_asm+0x34/0x70
   ? __switch_to_asm+0x40/0x70
   ? __x64_sys_futex+0x13f/0x170
   ? __switch_to_asm+0x34/0x70
   ? __switch_to_asm+0x40/0x70
   ? __switch_to_asm+0x34/0x70
   ? __switch_to_asm+0x40/0x70
   __x64_sys_ertp_openat+0x29/0x60 [eset_rtp]
   do_syscall_64+0x57/0x190
   entry_SYSCALL_64_after_hwframe+0x44/0xa9
  RIP: 0033:0x7fdc28a41f24
  Code: 24 20 eb 8f 66 90 44 89 54 24 0c e8 56 68 f8 ff 44 8b 54 24 0c 44 89 e2 
48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 32 
44 89 c7 89 44 24 0c e8 88 68 f8 ff 8b 44
  RSP: 002b:7fdc24e25980 EFLAGS: 0293 ORIG_RAX: 0101
  RAX: ffda RBX: 7fdc040008d0 RCX: 7fdc28a41f24
   ? unuse_pde+0x30/0x30
   do_sys_open+0x17e/0x290
   __x64_sys_openat+0x20/0x30
   __orig_openat+0x71/0xc0 [eset_rtp]
   ? __switch_to_asm+0x40/0x70
   ? __switch_to_asm+0x34/0x70
   ? __switch_to_asm+0x40/0x70
   ? __x64_sys_futex+0x13f/0x170
   ? __switch_to_asm+0x34/0x70
   ? __switch_to_asm+0x40/0x70
   ? __switch_to_asm+0x34/0x70
   ? __switch_to_asm+0x40/0x70
   __x64_sys_ertp_openat+0x29/0x60 [eset_rtp]
   do_syscall_64+0x57/0x190
   entry_SYSCALL_64_after_hwframe+0x44/0xa9
  RIP: 0033:0x7fdc28a41f24
  Code: 24 20 eb 8f 66 90 44 89 54 24 0c e8 56 68 f8 ff 44 8b 54 24 0c 44 89 e2 
48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 32 
44 89 c7 89 44 24 0c e8 88 68 f8 ff 8b 44
  RSP: 002b:7fdc24e25980 EFLAGS: 0293 ORIG_RAX: 0101
  RAX: ffda RBX: 7fdc040008d0 RCX: 7fdc28a41f24
  RDX: 0008 RSI: 564d4410a8c8 RDI: ff9c
  RBP: 564d4410a8c8 R08:  R09: 0001
  R10:  R11: 0293 R12: 0008
  R13: 564d4410e28a R14: 7fdc24e25b40 R15: 7fdc24e28fc0
  Modules linked in: cmac nls_utf8 cifs fscache libdes ccm vboxnetadp(OE) 
vboxnetflt(OE) vboxdrv(OE) eset_rtp(OE) xt_conntrack xt_MASQUERADE 
nf_conntrack_netlink nfnetlink xfrm_user xfrm_algo xt_addrtype iptable_filter 
iptable_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ip>
   snd_seq_midi coretemp snd_seq_midi_event snd_rawmidi kvm_intel snd_seq kvm 
dell_wmi snd_seq_device rapl dell_smbios snd_timer dcdbas intel_cstate 
input_led

[Kernel-packages] [Bug 1959665] Re: linux-image-5.4.0-97.110 freezes by accessing cifs shares

2022-02-01 Thread Sebastian Berner
** Summary changed:

- linux-image-9.4.0-97.110 freezes by accessing cifs shares
+ linux-image-5.4.0-97.110 freezes by accessing cifs shares

** Description changed:

- Ubuntu 20.04 with kernel image 9.4.0-97.110 randomly freezes when we
+ Ubuntu 20.04 with kernel image 5.4.0-97.110 randomly freezes when we
  access cifs shares. The system needs a hard reset after the freeze.
  
  The previous kernel image (5.4.0-96.109) does not show this behavior.
  Multiple Ubuntu 20.04 systems running on kernel image 9.4.0-97.110 are
  affected on our sites.
  
  The cifs shares are accessed via autofs using Kerberos authentication.
  
  The following info is the only error message we could actively catch on
  a different system before the system was frozen:
  
  general protection fault:  [#3] SMP PTI
  CPU: 0 PID: 21294 Comm: automount Tainted: G  DOE 
5.4.0-97-generic #110-Ubuntu
  Hardware name: Dell Inc. Precision 7530/03RV2M, BIOS 1.14.4 10/21/2020
  RIP: 0010:kmem_cache_alloc_trace+0x8c/0x240
  Code: 08 65 4c 03 05 1d e8 f7 6e 49 83 78 10 00 4d 8b 38 0f 84 92 01 00 00 4d 
85 ff 0f 84 89 01 00 00 41 8b 41 20 49 8b 39 4c 01 f8 <48> 8b 18 48 89 c1 49 33 
99 70 01 00 00 4c 89 f8 48 0f c9 48 31 cb
  RSP: 0018:a6ca860f7ba0 EFLAGS: 00010286
  RAX: fdd44d7c219190e1 RBX:  RCX: 
  RDX: d558 RSI: 0cc0 RDI: 00035060
  RBP: a6ca860f7bd0 R08: 99233c035060 R09: 992338c079c0
  R10: 0001 R11: 0004 R12: 0cc0
  R13: 000b R14: 992338c079c0 R15: fdd44d7c219190e1
  FS:  7fdc24e29700() GS:99233c00() knlGS:
  CS:  0010 DS:  ES:  CR0: 80050033
  CR2: 7f15a80ee010 CR3: 0007e36b2006 CR4: 003606f0
  Call Trace:
-  ? proc_self_get_link+0x70/0xd0
-  proc_self_get_link+0x70/0xd0
-  link_path_walk.part.0+0x478/0x550
-  ? trailing_symlink+0x1d1/0x280
-  path_openat+0xb7/0x290
-  do_filp_open+0x91/0x100
-  ? unuse_pde+0x30/0x30
-  do_sys_open+0x17e/0x290
-  __x64_sys_openat+0x20/0x30
-  __orig_openat+0x71/0xc0 [eset_rtp]
-  ? __switch_to_asm+0x40/0x70
-  ? __switch_to_asm+0x34/0x70
-  ? __switch_to_asm+0x40/0x70
-  ? __x64_sys_futex+0x13f/0x170
-  ? __switch_to_asm+0x34/0x70
-  ? __switch_to_asm+0x40/0x70
-  ? __switch_to_asm+0x34/0x70
-  ? __switch_to_asm+0x40/0x70
-  __x64_sys_ertp_openat+0x29/0x60 [eset_rtp]
-  do_syscall_64+0x57/0x190
-  entry_SYSCALL_64_after_hwframe+0x44/0xa9
+  ? proc_self_get_link+0x70/0xd0
+  proc_self_get_link+0x70/0xd0
+  link_path_walk.part.0+0x478/0x550
+  ? trailing_symlink+0x1d1/0x280
+  path_openat+0xb7/0x290
+  do_filp_open+0x91/0x100
+  ? unuse_pde+0x30/0x30
+  do_sys_open+0x17e/0x290
+  __x64_sys_openat+0x20/0x30
+  __orig_openat+0x71/0xc0 [eset_rtp]
+  ? __switch_to_asm+0x40/0x70
+  ? __switch_to_asm+0x34/0x70
+  ? __switch_to_asm+0x40/0x70
+  ? __x64_sys_futex+0x13f/0x170
+  ? __switch_to_asm+0x34/0x70
+  ? __switch_to_asm+0x40/0x70
+  ? __switch_to_asm+0x34/0x70
+  ? __switch_to_asm+0x40/0x70
+  __x64_sys_ertp_openat+0x29/0x60 [eset_rtp]
+  do_syscall_64+0x57/0x190
+  entry_SYSCALL_64_after_hwframe+0x44/0xa9
  RIP: 0033:0x7fdc28a41f24
  Code: 24 20 eb 8f 66 90 44 89 54 24 0c e8 56 68 f8 ff 44 8b 54 24 0c 44 89 e2 
48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 32 
44 89 c7 89 44 24 0c e8 88 68 f8 ff 8b 44
  RSP: 002b:7fdc24e25980 EFLAGS: 0293 ORIG_RAX: 0101
  RAX: ffda RBX: 7fdc040008d0 RCX: 7fdc28a41f24
-  ? unuse_pde+0x30/0x30
-  do_sys_open+0x17e/0x290
-  __x64_sys_openat+0x20/0x30
-  __orig_openat+0x71/0xc0 [eset_rtp]
-  ? __switch_to_asm+0x40/0x70
-  ? __switch_to_asm+0x34/0x70
-  ? __switch_to_asm+0x40/0x70
-  ? __x64_sys_futex+0x13f/0x170
-  ? __switch_to_asm+0x34/0x70
-  ? __switch_to_asm+0x40/0x70
-  ? __switch_to_asm+0x34/0x70
-  ? __switch_to_asm+0x40/0x70
-  __x64_sys_ertp_openat+0x29/0x60 [eset_rtp]
-  do_syscall_64+0x57/0x190
-  entry_SYSCALL_64_after_hwframe+0x44/0xa9
+  ? unuse_pde+0x30/0x30
+  do_sys_open+0x17e/0x290
+  __x64_sys_openat+0x20/0x30
+  __orig_openat+0x71/0xc0 [eset_rtp]
+  ? __switch_to_asm+0x40/0x70
+  ? __switch_to_asm+0x34/0x70
+  ? __switch_to_asm+0x40/0x70
+  ? __x64_sys_futex+0x13f/0x170
+  ? __switch_to_asm+0x34/0x70
+  ? __switch_to_asm+0x40/0x70
+  ? __switch_to_asm+0x34/0x70
+  ? __switch_to_asm+0x40/0x70
+  __x64_sys_ertp_openat+0x29/0x60 [eset_rtp]
+  do_syscall_64+0x57/0x190
+  entry_SYSCALL_64_after_hwframe+0x44/0xa9
  RIP: 0033:0x7fdc28a41f24
  Code: 24 20 eb 8f 66 90 44 89 54 24 0c e8 56 68 f8 ff 44 8b 54 24 0c 44 89 e2 
48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 32 
44 89 c7 89 44 24 0c e8 88 68 f8 ff 8b 44
  RSP: 002b:7fdc24e25980 EFLAGS: 0293 ORIG_RAX: 0101
  RAX: ffda RBX: 7fdc040008d0 RCX: 7fdc28a41f24
  RDX: 0008 RSI: 564d4410a8c8 RDI: ff9c
  RBP: 564d4410a8c8 R08: 0

[Kernel-packages] [Bug 1959665] [NEW] linux-image-9.4.0-97.110 freezes by accessing cifs shares

2022-02-01 Thread Sebastian Berner
Public bug reported:

Ubuntu 20.04 with kernel image 9.4.0-97.110 randomly freezes when we
access cifs shares. The system needs a hard reset after the freeze.

The previous kernel image (5.4.0-96.109) does not show this behavior.
Multiple Ubuntu 20.04 systems running on kernel image 9.4.0-97.110 are
affected on our sites.

The cifs shares are accessed via autofs using Kerberos authentication.

The following info is the only error message we could actively catch on
a different system before the system was frozen:

general protection fault:  [#3] SMP PTI
CPU: 0 PID: 21294 Comm: automount Tainted: G  DOE 5.4.0-97-generic 
#110-Ubuntu
Hardware name: Dell Inc. Precision 7530/03RV2M, BIOS 1.14.4 10/21/2020
RIP: 0010:kmem_cache_alloc_trace+0x8c/0x240
Code: 08 65 4c 03 05 1d e8 f7 6e 49 83 78 10 00 4d 8b 38 0f 84 92 01 00 00 4d 
85 ff 0f 84 89 01 00 00 41 8b 41 20 49 8b 39 4c 01 f8 <48> 8b 18 48 89 c1 49 33 
99 70 01 00 00 4c 89 f8 48 0f c9 48 31 cb
RSP: 0018:a6ca860f7ba0 EFLAGS: 00010286
RAX: fdd44d7c219190e1 RBX:  RCX: 
RDX: d558 RSI: 0cc0 RDI: 00035060
RBP: a6ca860f7bd0 R08: 99233c035060 R09: 992338c079c0
R10: 0001 R11: 0004 R12: 0cc0
R13: 000b R14: 992338c079c0 R15: fdd44d7c219190e1
FS:  7fdc24e29700() GS:99233c00() knlGS:
CS:  0010 DS:  ES:  CR0: 80050033
CR2: 7f15a80ee010 CR3: 0007e36b2006 CR4: 003606f0
Call Trace:
 ? proc_self_get_link+0x70/0xd0
 proc_self_get_link+0x70/0xd0
 link_path_walk.part.0+0x478/0x550
 ? trailing_symlink+0x1d1/0x280
 path_openat+0xb7/0x290
 do_filp_open+0x91/0x100
 ? unuse_pde+0x30/0x30
 do_sys_open+0x17e/0x290
 __x64_sys_openat+0x20/0x30
 __orig_openat+0x71/0xc0 [eset_rtp]
 ? __switch_to_asm+0x40/0x70
 ? __switch_to_asm+0x34/0x70
 ? __switch_to_asm+0x40/0x70
 ? __x64_sys_futex+0x13f/0x170
 ? __switch_to_asm+0x34/0x70
 ? __switch_to_asm+0x40/0x70
 ? __switch_to_asm+0x34/0x70
 ? __switch_to_asm+0x40/0x70
 __x64_sys_ertp_openat+0x29/0x60 [eset_rtp]
 do_syscall_64+0x57/0x190
 entry_SYSCALL_64_after_hwframe+0x44/0xa9
RIP: 0033:0x7fdc28a41f24
Code: 24 20 eb 8f 66 90 44 89 54 24 0c e8 56 68 f8 ff 44 8b 54 24 0c 44 89 e2 
48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 32 
44 89 c7 89 44 24 0c e8 88 68 f8 ff 8b 44
RSP: 002b:7fdc24e25980 EFLAGS: 0293 ORIG_RAX: 0101
RAX: ffda RBX: 7fdc040008d0 RCX: 7fdc28a41f24
 ? unuse_pde+0x30/0x30
 do_sys_open+0x17e/0x290
 __x64_sys_openat+0x20/0x30
 __orig_openat+0x71/0xc0 [eset_rtp]
 ? __switch_to_asm+0x40/0x70
 ? __switch_to_asm+0x34/0x70
 ? __switch_to_asm+0x40/0x70
 ? __x64_sys_futex+0x13f/0x170
 ? __switch_to_asm+0x34/0x70
 ? __switch_to_asm+0x40/0x70
 ? __switch_to_asm+0x34/0x70
 ? __switch_to_asm+0x40/0x70
 __x64_sys_ertp_openat+0x29/0x60 [eset_rtp]
 do_syscall_64+0x57/0x190
 entry_SYSCALL_64_after_hwframe+0x44/0xa9
RIP: 0033:0x7fdc28a41f24
Code: 24 20 eb 8f 66 90 44 89 54 24 0c e8 56 68 f8 ff 44 8b 54 24 0c 44 89 e2 
48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 32 
44 89 c7 89 44 24 0c e8 88 68 f8 ff 8b 44
RSP: 002b:7fdc24e25980 EFLAGS: 0293 ORIG_RAX: 0101
RAX: ffda RBX: 7fdc040008d0 RCX: 7fdc28a41f24
RDX: 0008 RSI: 564d4410a8c8 RDI: ff9c
RBP: 564d4410a8c8 R08:  R09: 0001
R10:  R11: 0293 R12: 0008
R13: 564d4410e28a R14: 7fdc24e25b40 R15: 7fdc24e28fc0
Modules linked in: cmac nls_utf8 cifs fscache libdes ccm vboxnetadp(OE) 
vboxnetflt(OE) vboxdrv(OE) eset_rtp(OE) xt_conntrack xt_MASQUERADE 
nf_conntrack_netlink nfnetlink xfrm_user xfrm_algo xt_addrtype iptable_filter 
iptable_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ip>
 snd_seq_midi coretemp snd_seq_midi_event snd_rawmidi kvm_intel snd_seq kvm 
dell_wmi snd_seq_device rapl dell_smbios snd_timer dcdbas intel_cstate 
input_leds iwlwifi serio_raw snd intel_wmi_thunderbolt rtsx_pci_ms 
dell_wmi_descriptor wmi_bmof processor_thermal_device ucsi_acp>
 pinctrl_cannonlake video pinctrl_intel
---[ end trace 80828f22da45a19b ]---
RIP: 0010:__slab_free+0x199/0x360
Code: 00 48 89 c7 fa 66 0f 1f 44 00 00 f0 49 0f ba 2c 24 00 72 79 4d 3b 6c 24 
20 74 11 49 0f ba 34 24 00 57 9d 0f 1f 44 00 00 eb 9f <0f> 0b 49 3b 5c 24 28 75 
e8 48 8b 44 24 28 49 89 4c 24 28 49 89 44
RSP: 0018:a6ca85a8f8c0 EFLAGS: 00010246
RAX: 9921db223620 RBX: 80800046 RCX: 9921db223620
RDX: 9921db223620 RSI: f5c79c6c88c0 RDI: 992338c07800
RBP: a6ca85a8f968 R08: 0001 R09: c1514620
R10: 9921db223620 R11: 0001 R12: f5c79c6c88c0
R13: 9921db223620 R14: 992338c07800 R15: 9922e0c4a800
FS:  7fdc24e29700() GS:99233c00() knlGS:
CS:  0010 DS:  ES:  CR0: 000