[Kernel-packages] [Bug 1959665] Re: linux-image-5.4.0-97.110 freezes by accessing cifs shares

2022-02-09 Thread kaiszy
Hi Tim,

i also can confirm that 5.4.0-99.112 fixes the bug. Testscript runs for
more than a hour with this kernel without freezing the machine.

Thanks!


** Tags removed: verification-needed-focal
** Tags added: verification-done-focal

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1959665

Title:
  linux-image-5.4.0-97.110 freezes by accessing cifs shares

Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Focal:
  Fix Released

Bug description:
  Ubuntu 20.04 with kernel image 5.4.0-97.110 randomly freezes when we
  access cifs shares. The system needs a hard reset after the freeze.

  The previous kernel image (5.4.0-96.109) does not show this behavior.
  Multiple Ubuntu 20.04 systems running on kernel image 9.4.0-97.110 are
  affected on our sites.

  The cifs shares are accessed via autofs using Kerberos authentication.

  The following info is the only error message we could actively catch
  on a different system before the system was frozen:

  general protection fault:  [#3] SMP PTI
  CPU: 0 PID: 21294 Comm: automount Tainted: G  DOE 
5.4.0-97-generic #110-Ubuntu
  Hardware name: Dell Inc. Precision 7530/03RV2M, BIOS 1.14.4 10/21/2020
  RIP: 0010:kmem_cache_alloc_trace+0x8c/0x240
  Code: 08 65 4c 03 05 1d e8 f7 6e 49 83 78 10 00 4d 8b 38 0f 84 92 01 00 00 4d 
85 ff 0f 84 89 01 00 00 41 8b 41 20 49 8b 39 4c 01 f8 <48> 8b 18 48 89 c1 49 33 
99 70 01 00 00 4c 89 f8 48 0f c9 48 31 cb
  RSP: 0018:a6ca860f7ba0 EFLAGS: 00010286
  RAX: fdd44d7c219190e1 RBX:  RCX: 
  RDX: d558 RSI: 0cc0 RDI: 00035060
  RBP: a6ca860f7bd0 R08: 99233c035060 R09: 992338c079c0
  R10: 0001 R11: 0004 R12: 0cc0
  R13: 000b R14: 992338c079c0 R15: fdd44d7c219190e1
  FS:  7fdc24e29700() GS:99233c00() knlGS:
  CS:  0010 DS:  ES:  CR0: 80050033
  CR2: 7f15a80ee010 CR3: 0007e36b2006 CR4: 003606f0
  Call Trace:
   ? proc_self_get_link+0x70/0xd0
   proc_self_get_link+0x70/0xd0
   link_path_walk.part.0+0x478/0x550
   ? trailing_symlink+0x1d1/0x280
   path_openat+0xb7/0x290
   do_filp_open+0x91/0x100
   ? unuse_pde+0x30/0x30
   do_sys_open+0x17e/0x290
   __x64_sys_openat+0x20/0x30
   __orig_openat+0x71/0xc0 [eset_rtp]
   ? __switch_to_asm+0x40/0x70
   ? __switch_to_asm+0x34/0x70
   ? __switch_to_asm+0x40/0x70
   ? __x64_sys_futex+0x13f/0x170
   ? __switch_to_asm+0x34/0x70
   ? __switch_to_asm+0x40/0x70
   ? __switch_to_asm+0x34/0x70
   ? __switch_to_asm+0x40/0x70
   __x64_sys_ertp_openat+0x29/0x60 [eset_rtp]
   do_syscall_64+0x57/0x190
   entry_SYSCALL_64_after_hwframe+0x44/0xa9
  RIP: 0033:0x7fdc28a41f24
  Code: 24 20 eb 8f 66 90 44 89 54 24 0c e8 56 68 f8 ff 44 8b 54 24 0c 44 89 e2 
48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 32 
44 89 c7 89 44 24 0c e8 88 68 f8 ff 8b 44
  RSP: 002b:7fdc24e25980 EFLAGS: 0293 ORIG_RAX: 0101
  RAX: ffda RBX: 7fdc040008d0 RCX: 7fdc28a41f24
   ? unuse_pde+0x30/0x30
   do_sys_open+0x17e/0x290
   __x64_sys_openat+0x20/0x30
   __orig_openat+0x71/0xc0 [eset_rtp]
   ? __switch_to_asm+0x40/0x70
   ? __switch_to_asm+0x34/0x70
   ? __switch_to_asm+0x40/0x70
   ? __x64_sys_futex+0x13f/0x170
   ? __switch_to_asm+0x34/0x70
   ? __switch_to_asm+0x40/0x70
   ? __switch_to_asm+0x34/0x70
   ? __switch_to_asm+0x40/0x70
   __x64_sys_ertp_openat+0x29/0x60 [eset_rtp]
   do_syscall_64+0x57/0x190
   entry_SYSCALL_64_after_hwframe+0x44/0xa9
  RIP: 0033:0x7fdc28a41f24
  Code: 24 20 eb 8f 66 90 44 89 54 24 0c e8 56 68 f8 ff 44 8b 54 24 0c 44 89 e2 
48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 32 
44 89 c7 89 44 24 0c e8 88 68 f8 ff 8b 44
  RSP: 002b:7fdc24e25980 EFLAGS: 0293 ORIG_RAX: 0101
  RAX: ffda RBX: 7fdc040008d0 RCX: 7fdc28a41f24
  RDX: 0008 RSI: 564d4410a8c8 RDI: ff9c
  RBP: 564d4410a8c8 R08:  R09: 0001
  R10:  R11: 0293 R12: 0008
  R13: 564d4410e28a R14: 7fdc24e25b40 R15: 7fdc24e28fc0
  Modules linked in: cmac nls_utf8 cifs fscache libdes ccm vboxnetadp(OE) 
vboxnetflt(OE) vboxdrv(OE) eset_rtp(OE) xt_conntrack xt_MASQUERADE 
nf_conntrack_netlink nfnetlink xfrm_user xfrm_algo xt_addrtype iptable_filter 
iptable_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ip>
   snd_seq_midi coretemp snd_seq_midi_event snd_rawmidi kvm_intel snd_seq kvm 
dell_wmi snd_seq_device rapl dell_smbios snd_timer dcdbas intel_cstate 
input_leds iwlwifi serio_raw snd intel_wmi_thunderbolt rtsx_pci_ms 
dell_wmi_descriptor wmi_bmof processor_thermal_device ucsi_acp>
   pinctrl_cannonlake video pinctrl_intel
  ---[ end trace 80828f22da45a19b ]---
  

[Kernel-packages] [Bug 1959665] Re: linux-image-5.4.0-97.110 freezes by accessing cifs shares

2022-02-08 Thread Sebastian Berner
Hi Tim,

I can confirm that 5.4.0-99.112 fixes the cifs issue.

Testing in our environment does not show any freezes accessing cifs
shares while using 5.4.0-99.112.

Best Regards,
Sebastian

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1959665

Title:
  linux-image-5.4.0-97.110 freezes by accessing cifs shares

Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Focal:
  Fix Released

Bug description:
  Ubuntu 20.04 with kernel image 5.4.0-97.110 randomly freezes when we
  access cifs shares. The system needs a hard reset after the freeze.

  The previous kernel image (5.4.0-96.109) does not show this behavior.
  Multiple Ubuntu 20.04 systems running on kernel image 9.4.0-97.110 are
  affected on our sites.

  The cifs shares are accessed via autofs using Kerberos authentication.

  The following info is the only error message we could actively catch
  on a different system before the system was frozen:

  general protection fault:  [#3] SMP PTI
  CPU: 0 PID: 21294 Comm: automount Tainted: G  DOE 
5.4.0-97-generic #110-Ubuntu
  Hardware name: Dell Inc. Precision 7530/03RV2M, BIOS 1.14.4 10/21/2020
  RIP: 0010:kmem_cache_alloc_trace+0x8c/0x240
  Code: 08 65 4c 03 05 1d e8 f7 6e 49 83 78 10 00 4d 8b 38 0f 84 92 01 00 00 4d 
85 ff 0f 84 89 01 00 00 41 8b 41 20 49 8b 39 4c 01 f8 <48> 8b 18 48 89 c1 49 33 
99 70 01 00 00 4c 89 f8 48 0f c9 48 31 cb
  RSP: 0018:a6ca860f7ba0 EFLAGS: 00010286
  RAX: fdd44d7c219190e1 RBX:  RCX: 
  RDX: d558 RSI: 0cc0 RDI: 00035060
  RBP: a6ca860f7bd0 R08: 99233c035060 R09: 992338c079c0
  R10: 0001 R11: 0004 R12: 0cc0
  R13: 000b R14: 992338c079c0 R15: fdd44d7c219190e1
  FS:  7fdc24e29700() GS:99233c00() knlGS:
  CS:  0010 DS:  ES:  CR0: 80050033
  CR2: 7f15a80ee010 CR3: 0007e36b2006 CR4: 003606f0
  Call Trace:
   ? proc_self_get_link+0x70/0xd0
   proc_self_get_link+0x70/0xd0
   link_path_walk.part.0+0x478/0x550
   ? trailing_symlink+0x1d1/0x280
   path_openat+0xb7/0x290
   do_filp_open+0x91/0x100
   ? unuse_pde+0x30/0x30
   do_sys_open+0x17e/0x290
   __x64_sys_openat+0x20/0x30
   __orig_openat+0x71/0xc0 [eset_rtp]
   ? __switch_to_asm+0x40/0x70
   ? __switch_to_asm+0x34/0x70
   ? __switch_to_asm+0x40/0x70
   ? __x64_sys_futex+0x13f/0x170
   ? __switch_to_asm+0x34/0x70
   ? __switch_to_asm+0x40/0x70
   ? __switch_to_asm+0x34/0x70
   ? __switch_to_asm+0x40/0x70
   __x64_sys_ertp_openat+0x29/0x60 [eset_rtp]
   do_syscall_64+0x57/0x190
   entry_SYSCALL_64_after_hwframe+0x44/0xa9
  RIP: 0033:0x7fdc28a41f24
  Code: 24 20 eb 8f 66 90 44 89 54 24 0c e8 56 68 f8 ff 44 8b 54 24 0c 44 89 e2 
48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 32 
44 89 c7 89 44 24 0c e8 88 68 f8 ff 8b 44
  RSP: 002b:7fdc24e25980 EFLAGS: 0293 ORIG_RAX: 0101
  RAX: ffda RBX: 7fdc040008d0 RCX: 7fdc28a41f24
   ? unuse_pde+0x30/0x30
   do_sys_open+0x17e/0x290
   __x64_sys_openat+0x20/0x30
   __orig_openat+0x71/0xc0 [eset_rtp]
   ? __switch_to_asm+0x40/0x70
   ? __switch_to_asm+0x34/0x70
   ? __switch_to_asm+0x40/0x70
   ? __x64_sys_futex+0x13f/0x170
   ? __switch_to_asm+0x34/0x70
   ? __switch_to_asm+0x40/0x70
   ? __switch_to_asm+0x34/0x70
   ? __switch_to_asm+0x40/0x70
   __x64_sys_ertp_openat+0x29/0x60 [eset_rtp]
   do_syscall_64+0x57/0x190
   entry_SYSCALL_64_after_hwframe+0x44/0xa9
  RIP: 0033:0x7fdc28a41f24
  Code: 24 20 eb 8f 66 90 44 89 54 24 0c e8 56 68 f8 ff 44 8b 54 24 0c 44 89 e2 
48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 32 
44 89 c7 89 44 24 0c e8 88 68 f8 ff 8b 44
  RSP: 002b:7fdc24e25980 EFLAGS: 0293 ORIG_RAX: 0101
  RAX: ffda RBX: 7fdc040008d0 RCX: 7fdc28a41f24
  RDX: 0008 RSI: 564d4410a8c8 RDI: ff9c
  RBP: 564d4410a8c8 R08:  R09: 0001
  R10:  R11: 0293 R12: 0008
  R13: 564d4410e28a R14: 7fdc24e25b40 R15: 7fdc24e28fc0
  Modules linked in: cmac nls_utf8 cifs fscache libdes ccm vboxnetadp(OE) 
vboxnetflt(OE) vboxdrv(OE) eset_rtp(OE) xt_conntrack xt_MASQUERADE 
nf_conntrack_netlink nfnetlink xfrm_user xfrm_algo xt_addrtype iptable_filter 
iptable_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ip>
   snd_seq_midi coretemp snd_seq_midi_event snd_rawmidi kvm_intel snd_seq kvm 
dell_wmi snd_seq_device rapl dell_smbios snd_timer dcdbas intel_cstate 
input_leds iwlwifi serio_raw snd intel_wmi_thunderbolt rtsx_pci_ms 
dell_wmi_descriptor wmi_bmof processor_thermal_device ucsi_acp>
   pinctrl_cannonlake video pinctrl_intel
  ---[ end trace 80828f22da45a19b ]---
  RIP: 0010:__slab_free+0x199/0x360
  Code: 00 48 

[Kernel-packages] [Bug 1959665] Re: linux-image-5.4.0-97.110 freezes by accessing cifs shares

2022-02-07 Thread Tim Gardner
@sebastian-berner or @kai-szymanski - please confirm that this fixes
your cifs issue.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1959665

Title:
  linux-image-5.4.0-97.110 freezes by accessing cifs shares

Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Focal:
  Fix Released

Bug description:
  Ubuntu 20.04 with kernel image 5.4.0-97.110 randomly freezes when we
  access cifs shares. The system needs a hard reset after the freeze.

  The previous kernel image (5.4.0-96.109) does not show this behavior.
  Multiple Ubuntu 20.04 systems running on kernel image 9.4.0-97.110 are
  affected on our sites.

  The cifs shares are accessed via autofs using Kerberos authentication.

  The following info is the only error message we could actively catch
  on a different system before the system was frozen:

  general protection fault:  [#3] SMP PTI
  CPU: 0 PID: 21294 Comm: automount Tainted: G  DOE 
5.4.0-97-generic #110-Ubuntu
  Hardware name: Dell Inc. Precision 7530/03RV2M, BIOS 1.14.4 10/21/2020
  RIP: 0010:kmem_cache_alloc_trace+0x8c/0x240
  Code: 08 65 4c 03 05 1d e8 f7 6e 49 83 78 10 00 4d 8b 38 0f 84 92 01 00 00 4d 
85 ff 0f 84 89 01 00 00 41 8b 41 20 49 8b 39 4c 01 f8 <48> 8b 18 48 89 c1 49 33 
99 70 01 00 00 4c 89 f8 48 0f c9 48 31 cb
  RSP: 0018:a6ca860f7ba0 EFLAGS: 00010286
  RAX: fdd44d7c219190e1 RBX:  RCX: 
  RDX: d558 RSI: 0cc0 RDI: 00035060
  RBP: a6ca860f7bd0 R08: 99233c035060 R09: 992338c079c0
  R10: 0001 R11: 0004 R12: 0cc0
  R13: 000b R14: 992338c079c0 R15: fdd44d7c219190e1
  FS:  7fdc24e29700() GS:99233c00() knlGS:
  CS:  0010 DS:  ES:  CR0: 80050033
  CR2: 7f15a80ee010 CR3: 0007e36b2006 CR4: 003606f0
  Call Trace:
   ? proc_self_get_link+0x70/0xd0
   proc_self_get_link+0x70/0xd0
   link_path_walk.part.0+0x478/0x550
   ? trailing_symlink+0x1d1/0x280
   path_openat+0xb7/0x290
   do_filp_open+0x91/0x100
   ? unuse_pde+0x30/0x30
   do_sys_open+0x17e/0x290
   __x64_sys_openat+0x20/0x30
   __orig_openat+0x71/0xc0 [eset_rtp]
   ? __switch_to_asm+0x40/0x70
   ? __switch_to_asm+0x34/0x70
   ? __switch_to_asm+0x40/0x70
   ? __x64_sys_futex+0x13f/0x170
   ? __switch_to_asm+0x34/0x70
   ? __switch_to_asm+0x40/0x70
   ? __switch_to_asm+0x34/0x70
   ? __switch_to_asm+0x40/0x70
   __x64_sys_ertp_openat+0x29/0x60 [eset_rtp]
   do_syscall_64+0x57/0x190
   entry_SYSCALL_64_after_hwframe+0x44/0xa9
  RIP: 0033:0x7fdc28a41f24
  Code: 24 20 eb 8f 66 90 44 89 54 24 0c e8 56 68 f8 ff 44 8b 54 24 0c 44 89 e2 
48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 32 
44 89 c7 89 44 24 0c e8 88 68 f8 ff 8b 44
  RSP: 002b:7fdc24e25980 EFLAGS: 0293 ORIG_RAX: 0101
  RAX: ffda RBX: 7fdc040008d0 RCX: 7fdc28a41f24
   ? unuse_pde+0x30/0x30
   do_sys_open+0x17e/0x290
   __x64_sys_openat+0x20/0x30
   __orig_openat+0x71/0xc0 [eset_rtp]
   ? __switch_to_asm+0x40/0x70
   ? __switch_to_asm+0x34/0x70
   ? __switch_to_asm+0x40/0x70
   ? __x64_sys_futex+0x13f/0x170
   ? __switch_to_asm+0x34/0x70
   ? __switch_to_asm+0x40/0x70
   ? __switch_to_asm+0x34/0x70
   ? __switch_to_asm+0x40/0x70
   __x64_sys_ertp_openat+0x29/0x60 [eset_rtp]
   do_syscall_64+0x57/0x190
   entry_SYSCALL_64_after_hwframe+0x44/0xa9
  RIP: 0033:0x7fdc28a41f24
  Code: 24 20 eb 8f 66 90 44 89 54 24 0c e8 56 68 f8 ff 44 8b 54 24 0c 44 89 e2 
48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 32 
44 89 c7 89 44 24 0c e8 88 68 f8 ff 8b 44
  RSP: 002b:7fdc24e25980 EFLAGS: 0293 ORIG_RAX: 0101
  RAX: ffda RBX: 7fdc040008d0 RCX: 7fdc28a41f24
  RDX: 0008 RSI: 564d4410a8c8 RDI: ff9c
  RBP: 564d4410a8c8 R08:  R09: 0001
  R10:  R11: 0293 R12: 0008
  R13: 564d4410e28a R14: 7fdc24e25b40 R15: 7fdc24e28fc0
  Modules linked in: cmac nls_utf8 cifs fscache libdes ccm vboxnetadp(OE) 
vboxnetflt(OE) vboxdrv(OE) eset_rtp(OE) xt_conntrack xt_MASQUERADE 
nf_conntrack_netlink nfnetlink xfrm_user xfrm_algo xt_addrtype iptable_filter 
iptable_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ip>
   snd_seq_midi coretemp snd_seq_midi_event snd_rawmidi kvm_intel snd_seq kvm 
dell_wmi snd_seq_device rapl dell_smbios snd_timer dcdbas intel_cstate 
input_leds iwlwifi serio_raw snd intel_wmi_thunderbolt rtsx_pci_ms 
dell_wmi_descriptor wmi_bmof processor_thermal_device ucsi_acp>
   pinctrl_cannonlake video pinctrl_intel
  ---[ end trace 80828f22da45a19b ]---
  RIP: 0010:__slab_free+0x199/0x360
  Code: 00 48 89 c7 fa 66 0f 1f 44 00 00 f0 49 0f ba 2c 24 00 72 79 4d 3b 6c 24 
20 74 11 49 0f ba 34 24 00 57 9d 0f 1f 

[Kernel-packages] [Bug 1959665] Re: linux-image-5.4.0-97.110 freezes by accessing cifs shares

2022-02-07 Thread Ubuntu Kernel Bot
This bug is awaiting verification that the linux-azure/5.4.0-1069.72
kernel in -proposed solves the problem. Please test the kernel and
update this bug with the results. If the problem is solved, change the
tag 'verification-needed-focal' to 'verification-done-focal'. If the
problem still exists, change the tag 'verification-needed-focal' to
'verification-failed-focal'.

If verification is not done by 5 working days from today, this fix will
be dropped from the source code, and this bug will be closed.

See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how
to enable and use -proposed. Thank you!


** Tags added: verification-needed-focal

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1959665

Title:
  linux-image-5.4.0-97.110 freezes by accessing cifs shares

Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Focal:
  Fix Released

Bug description:
  Ubuntu 20.04 with kernel image 5.4.0-97.110 randomly freezes when we
  access cifs shares. The system needs a hard reset after the freeze.

  The previous kernel image (5.4.0-96.109) does not show this behavior.
  Multiple Ubuntu 20.04 systems running on kernel image 9.4.0-97.110 are
  affected on our sites.

  The cifs shares are accessed via autofs using Kerberos authentication.

  The following info is the only error message we could actively catch
  on a different system before the system was frozen:

  general protection fault:  [#3] SMP PTI
  CPU: 0 PID: 21294 Comm: automount Tainted: G  DOE 
5.4.0-97-generic #110-Ubuntu
  Hardware name: Dell Inc. Precision 7530/03RV2M, BIOS 1.14.4 10/21/2020
  RIP: 0010:kmem_cache_alloc_trace+0x8c/0x240
  Code: 08 65 4c 03 05 1d e8 f7 6e 49 83 78 10 00 4d 8b 38 0f 84 92 01 00 00 4d 
85 ff 0f 84 89 01 00 00 41 8b 41 20 49 8b 39 4c 01 f8 <48> 8b 18 48 89 c1 49 33 
99 70 01 00 00 4c 89 f8 48 0f c9 48 31 cb
  RSP: 0018:a6ca860f7ba0 EFLAGS: 00010286
  RAX: fdd44d7c219190e1 RBX:  RCX: 
  RDX: d558 RSI: 0cc0 RDI: 00035060
  RBP: a6ca860f7bd0 R08: 99233c035060 R09: 992338c079c0
  R10: 0001 R11: 0004 R12: 0cc0
  R13: 000b R14: 992338c079c0 R15: fdd44d7c219190e1
  FS:  7fdc24e29700() GS:99233c00() knlGS:
  CS:  0010 DS:  ES:  CR0: 80050033
  CR2: 7f15a80ee010 CR3: 0007e36b2006 CR4: 003606f0
  Call Trace:
   ? proc_self_get_link+0x70/0xd0
   proc_self_get_link+0x70/0xd0
   link_path_walk.part.0+0x478/0x550
   ? trailing_symlink+0x1d1/0x280
   path_openat+0xb7/0x290
   do_filp_open+0x91/0x100
   ? unuse_pde+0x30/0x30
   do_sys_open+0x17e/0x290
   __x64_sys_openat+0x20/0x30
   __orig_openat+0x71/0xc0 [eset_rtp]
   ? __switch_to_asm+0x40/0x70
   ? __switch_to_asm+0x34/0x70
   ? __switch_to_asm+0x40/0x70
   ? __x64_sys_futex+0x13f/0x170
   ? __switch_to_asm+0x34/0x70
   ? __switch_to_asm+0x40/0x70
   ? __switch_to_asm+0x34/0x70
   ? __switch_to_asm+0x40/0x70
   __x64_sys_ertp_openat+0x29/0x60 [eset_rtp]
   do_syscall_64+0x57/0x190
   entry_SYSCALL_64_after_hwframe+0x44/0xa9
  RIP: 0033:0x7fdc28a41f24
  Code: 24 20 eb 8f 66 90 44 89 54 24 0c e8 56 68 f8 ff 44 8b 54 24 0c 44 89 e2 
48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 32 
44 89 c7 89 44 24 0c e8 88 68 f8 ff 8b 44
  RSP: 002b:7fdc24e25980 EFLAGS: 0293 ORIG_RAX: 0101
  RAX: ffda RBX: 7fdc040008d0 RCX: 7fdc28a41f24
   ? unuse_pde+0x30/0x30
   do_sys_open+0x17e/0x290
   __x64_sys_openat+0x20/0x30
   __orig_openat+0x71/0xc0 [eset_rtp]
   ? __switch_to_asm+0x40/0x70
   ? __switch_to_asm+0x34/0x70
   ? __switch_to_asm+0x40/0x70
   ? __x64_sys_futex+0x13f/0x170
   ? __switch_to_asm+0x34/0x70
   ? __switch_to_asm+0x40/0x70
   ? __switch_to_asm+0x34/0x70
   ? __switch_to_asm+0x40/0x70
   __x64_sys_ertp_openat+0x29/0x60 [eset_rtp]
   do_syscall_64+0x57/0x190
   entry_SYSCALL_64_after_hwframe+0x44/0xa9
  RIP: 0033:0x7fdc28a41f24
  Code: 24 20 eb 8f 66 90 44 89 54 24 0c e8 56 68 f8 ff 44 8b 54 24 0c 44 89 e2 
48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 32 
44 89 c7 89 44 24 0c e8 88 68 f8 ff 8b 44
  RSP: 002b:7fdc24e25980 EFLAGS: 0293 ORIG_RAX: 0101
  RAX: ffda RBX: 7fdc040008d0 RCX: 7fdc28a41f24
  RDX: 0008 RSI: 564d4410a8c8 RDI: ff9c
  RBP: 564d4410a8c8 R08:  R09: 0001
  R10:  R11: 0293 R12: 0008
  R13: 564d4410e28a R14: 7fdc24e25b40 R15: 7fdc24e28fc0
  Modules linked in: cmac nls_utf8 cifs fscache libdes ccm vboxnetadp(OE) 
vboxnetflt(OE) vboxdrv(OE) eset_rtp(OE) xt_conntrack xt_MASQUERADE 
nf_conntrack_netlink nfnetlink xfrm_user xfrm_algo xt_addrtype iptable_filter 

[Kernel-packages] [Bug 1959665] Re: linux-image-5.4.0-97.110 freezes by accessing cifs shares

2022-02-07 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 5.4.0-99.112

---
linux (5.4.0-99.112) focal; urgency=medium

  * focal/linux: 5.4.0-99.112 -proposed tracker (LP: #1959817)

  * linux-image-5.4.0-97.110 freezes by accessing cifs shares (LP: #1959665)
- Revert "cifs: To match file servers, make sure the server hostname 
matches"
- Revert "cifs: set a minimum of 120s for next dns resolution"
- Revert "cifs: use the expiry output of dns_query to schedule next
  resolution"

 -- Stefan Bader   Wed, 02 Feb 2022 17:21:18
+0100

** Changed in: linux (Ubuntu Focal)
   Status: In Progress => Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1959665

Title:
  linux-image-5.4.0-97.110 freezes by accessing cifs shares

Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Focal:
  Fix Released

Bug description:
  Ubuntu 20.04 with kernel image 5.4.0-97.110 randomly freezes when we
  access cifs shares. The system needs a hard reset after the freeze.

  The previous kernel image (5.4.0-96.109) does not show this behavior.
  Multiple Ubuntu 20.04 systems running on kernel image 9.4.0-97.110 are
  affected on our sites.

  The cifs shares are accessed via autofs using Kerberos authentication.

  The following info is the only error message we could actively catch
  on a different system before the system was frozen:

  general protection fault:  [#3] SMP PTI
  CPU: 0 PID: 21294 Comm: automount Tainted: G  DOE 
5.4.0-97-generic #110-Ubuntu
  Hardware name: Dell Inc. Precision 7530/03RV2M, BIOS 1.14.4 10/21/2020
  RIP: 0010:kmem_cache_alloc_trace+0x8c/0x240
  Code: 08 65 4c 03 05 1d e8 f7 6e 49 83 78 10 00 4d 8b 38 0f 84 92 01 00 00 4d 
85 ff 0f 84 89 01 00 00 41 8b 41 20 49 8b 39 4c 01 f8 <48> 8b 18 48 89 c1 49 33 
99 70 01 00 00 4c 89 f8 48 0f c9 48 31 cb
  RSP: 0018:a6ca860f7ba0 EFLAGS: 00010286
  RAX: fdd44d7c219190e1 RBX:  RCX: 
  RDX: d558 RSI: 0cc0 RDI: 00035060
  RBP: a6ca860f7bd0 R08: 99233c035060 R09: 992338c079c0
  R10: 0001 R11: 0004 R12: 0cc0
  R13: 000b R14: 992338c079c0 R15: fdd44d7c219190e1
  FS:  7fdc24e29700() GS:99233c00() knlGS:
  CS:  0010 DS:  ES:  CR0: 80050033
  CR2: 7f15a80ee010 CR3: 0007e36b2006 CR4: 003606f0
  Call Trace:
   ? proc_self_get_link+0x70/0xd0
   proc_self_get_link+0x70/0xd0
   link_path_walk.part.0+0x478/0x550
   ? trailing_symlink+0x1d1/0x280
   path_openat+0xb7/0x290
   do_filp_open+0x91/0x100
   ? unuse_pde+0x30/0x30
   do_sys_open+0x17e/0x290
   __x64_sys_openat+0x20/0x30
   __orig_openat+0x71/0xc0 [eset_rtp]
   ? __switch_to_asm+0x40/0x70
   ? __switch_to_asm+0x34/0x70
   ? __switch_to_asm+0x40/0x70
   ? __x64_sys_futex+0x13f/0x170
   ? __switch_to_asm+0x34/0x70
   ? __switch_to_asm+0x40/0x70
   ? __switch_to_asm+0x34/0x70
   ? __switch_to_asm+0x40/0x70
   __x64_sys_ertp_openat+0x29/0x60 [eset_rtp]
   do_syscall_64+0x57/0x190
   entry_SYSCALL_64_after_hwframe+0x44/0xa9
  RIP: 0033:0x7fdc28a41f24
  Code: 24 20 eb 8f 66 90 44 89 54 24 0c e8 56 68 f8 ff 44 8b 54 24 0c 44 89 e2 
48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 32 
44 89 c7 89 44 24 0c e8 88 68 f8 ff 8b 44
  RSP: 002b:7fdc24e25980 EFLAGS: 0293 ORIG_RAX: 0101
  RAX: ffda RBX: 7fdc040008d0 RCX: 7fdc28a41f24
   ? unuse_pde+0x30/0x30
   do_sys_open+0x17e/0x290
   __x64_sys_openat+0x20/0x30
   __orig_openat+0x71/0xc0 [eset_rtp]
   ? __switch_to_asm+0x40/0x70
   ? __switch_to_asm+0x34/0x70
   ? __switch_to_asm+0x40/0x70
   ? __x64_sys_futex+0x13f/0x170
   ? __switch_to_asm+0x34/0x70
   ? __switch_to_asm+0x40/0x70
   ? __switch_to_asm+0x34/0x70
   ? __switch_to_asm+0x40/0x70
   __x64_sys_ertp_openat+0x29/0x60 [eset_rtp]
   do_syscall_64+0x57/0x190
   entry_SYSCALL_64_after_hwframe+0x44/0xa9
  RIP: 0033:0x7fdc28a41f24
  Code: 24 20 eb 8f 66 90 44 89 54 24 0c e8 56 68 f8 ff 44 8b 54 24 0c 44 89 e2 
48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 32 
44 89 c7 89 44 24 0c e8 88 68 f8 ff 8b 44
  RSP: 002b:7fdc24e25980 EFLAGS: 0293 ORIG_RAX: 0101
  RAX: ffda RBX: 7fdc040008d0 RCX: 7fdc28a41f24
  RDX: 0008 RSI: 564d4410a8c8 RDI: ff9c
  RBP: 564d4410a8c8 R08:  R09: 0001
  R10:  R11: 0293 R12: 0008
  R13: 564d4410e28a R14: 7fdc24e25b40 R15: 7fdc24e28fc0
  Modules linked in: cmac nls_utf8 cifs fscache libdes ccm vboxnetadp(OE) 
vboxnetflt(OE) vboxdrv(OE) eset_rtp(OE) xt_conntrack xt_MASQUERADE 
nf_conntrack_netlink nfnetlink xfrm_user xfrm_algo xt_addrtype iptable_filter 
iptable_nat nf_nat nf_conntrack 

[Kernel-packages] [Bug 1959665] Re: linux-image-5.4.0-97.110 freezes by accessing cifs shares

2022-02-02 Thread kaiszy
Hi Tim,

thanks for your afford!

Best regards,
  Kai.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1959665

Title:
  linux-image-5.4.0-97.110 freezes by accessing cifs shares

Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Focal:
  In Progress

Bug description:
  Ubuntu 20.04 with kernel image 5.4.0-97.110 randomly freezes when we
  access cifs shares. The system needs a hard reset after the freeze.

  The previous kernel image (5.4.0-96.109) does not show this behavior.
  Multiple Ubuntu 20.04 systems running on kernel image 9.4.0-97.110 are
  affected on our sites.

  The cifs shares are accessed via autofs using Kerberos authentication.

  The following info is the only error message we could actively catch
  on a different system before the system was frozen:

  general protection fault:  [#3] SMP PTI
  CPU: 0 PID: 21294 Comm: automount Tainted: G  DOE 
5.4.0-97-generic #110-Ubuntu
  Hardware name: Dell Inc. Precision 7530/03RV2M, BIOS 1.14.4 10/21/2020
  RIP: 0010:kmem_cache_alloc_trace+0x8c/0x240
  Code: 08 65 4c 03 05 1d e8 f7 6e 49 83 78 10 00 4d 8b 38 0f 84 92 01 00 00 4d 
85 ff 0f 84 89 01 00 00 41 8b 41 20 49 8b 39 4c 01 f8 <48> 8b 18 48 89 c1 49 33 
99 70 01 00 00 4c 89 f8 48 0f c9 48 31 cb
  RSP: 0018:a6ca860f7ba0 EFLAGS: 00010286
  RAX: fdd44d7c219190e1 RBX:  RCX: 
  RDX: d558 RSI: 0cc0 RDI: 00035060
  RBP: a6ca860f7bd0 R08: 99233c035060 R09: 992338c079c0
  R10: 0001 R11: 0004 R12: 0cc0
  R13: 000b R14: 992338c079c0 R15: fdd44d7c219190e1
  FS:  7fdc24e29700() GS:99233c00() knlGS:
  CS:  0010 DS:  ES:  CR0: 80050033
  CR2: 7f15a80ee010 CR3: 0007e36b2006 CR4: 003606f0
  Call Trace:
   ? proc_self_get_link+0x70/0xd0
   proc_self_get_link+0x70/0xd0
   link_path_walk.part.0+0x478/0x550
   ? trailing_symlink+0x1d1/0x280
   path_openat+0xb7/0x290
   do_filp_open+0x91/0x100
   ? unuse_pde+0x30/0x30
   do_sys_open+0x17e/0x290
   __x64_sys_openat+0x20/0x30
   __orig_openat+0x71/0xc0 [eset_rtp]
   ? __switch_to_asm+0x40/0x70
   ? __switch_to_asm+0x34/0x70
   ? __switch_to_asm+0x40/0x70
   ? __x64_sys_futex+0x13f/0x170
   ? __switch_to_asm+0x34/0x70
   ? __switch_to_asm+0x40/0x70
   ? __switch_to_asm+0x34/0x70
   ? __switch_to_asm+0x40/0x70
   __x64_sys_ertp_openat+0x29/0x60 [eset_rtp]
   do_syscall_64+0x57/0x190
   entry_SYSCALL_64_after_hwframe+0x44/0xa9
  RIP: 0033:0x7fdc28a41f24
  Code: 24 20 eb 8f 66 90 44 89 54 24 0c e8 56 68 f8 ff 44 8b 54 24 0c 44 89 e2 
48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 32 
44 89 c7 89 44 24 0c e8 88 68 f8 ff 8b 44
  RSP: 002b:7fdc24e25980 EFLAGS: 0293 ORIG_RAX: 0101
  RAX: ffda RBX: 7fdc040008d0 RCX: 7fdc28a41f24
   ? unuse_pde+0x30/0x30
   do_sys_open+0x17e/0x290
   __x64_sys_openat+0x20/0x30
   __orig_openat+0x71/0xc0 [eset_rtp]
   ? __switch_to_asm+0x40/0x70
   ? __switch_to_asm+0x34/0x70
   ? __switch_to_asm+0x40/0x70
   ? __x64_sys_futex+0x13f/0x170
   ? __switch_to_asm+0x34/0x70
   ? __switch_to_asm+0x40/0x70
   ? __switch_to_asm+0x34/0x70
   ? __switch_to_asm+0x40/0x70
   __x64_sys_ertp_openat+0x29/0x60 [eset_rtp]
   do_syscall_64+0x57/0x190
   entry_SYSCALL_64_after_hwframe+0x44/0xa9
  RIP: 0033:0x7fdc28a41f24
  Code: 24 20 eb 8f 66 90 44 89 54 24 0c e8 56 68 f8 ff 44 8b 54 24 0c 44 89 e2 
48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 32 
44 89 c7 89 44 24 0c e8 88 68 f8 ff 8b 44
  RSP: 002b:7fdc24e25980 EFLAGS: 0293 ORIG_RAX: 0101
  RAX: ffda RBX: 7fdc040008d0 RCX: 7fdc28a41f24
  RDX: 0008 RSI: 564d4410a8c8 RDI: ff9c
  RBP: 564d4410a8c8 R08:  R09: 0001
  R10:  R11: 0293 R12: 0008
  R13: 564d4410e28a R14: 7fdc24e25b40 R15: 7fdc24e28fc0
  Modules linked in: cmac nls_utf8 cifs fscache libdes ccm vboxnetadp(OE) 
vboxnetflt(OE) vboxdrv(OE) eset_rtp(OE) xt_conntrack xt_MASQUERADE 
nf_conntrack_netlink nfnetlink xfrm_user xfrm_algo xt_addrtype iptable_filter 
iptable_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ip>
   snd_seq_midi coretemp snd_seq_midi_event snd_rawmidi kvm_intel snd_seq kvm 
dell_wmi snd_seq_device rapl dell_smbios snd_timer dcdbas intel_cstate 
input_leds iwlwifi serio_raw snd intel_wmi_thunderbolt rtsx_pci_ms 
dell_wmi_descriptor wmi_bmof processor_thermal_device ucsi_acp>
   pinctrl_cannonlake video pinctrl_intel
  ---[ end trace 80828f22da45a19b ]---
  RIP: 0010:__slab_free+0x199/0x360
  Code: 00 48 89 c7 fa 66 0f 1f 44 00 00 f0 49 0f ba 2c 24 00 72 79 4d 3b 6c 24 
20 74 11 49 0f ba 34 24 00 57 9d 0f 1f 44 00 00 eb 9f <0f> 0b 49 3b 5c 

[Kernel-packages] [Bug 1959665] Re: linux-image-5.4.0-97.110 freezes by accessing cifs shares

2022-02-02 Thread Tim Gardner
Hi all - thanks for the quick testing. We are evaluating the best course
of action. In the short term that will likely be a respin with these
patches reverted. Longer term I will work to figure out the error and
find a correction.

rtg

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1959665

Title:
  linux-image-5.4.0-97.110 freezes by accessing cifs shares

Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Focal:
  In Progress

Bug description:
  Ubuntu 20.04 with kernel image 5.4.0-97.110 randomly freezes when we
  access cifs shares. The system needs a hard reset after the freeze.

  The previous kernel image (5.4.0-96.109) does not show this behavior.
  Multiple Ubuntu 20.04 systems running on kernel image 9.4.0-97.110 are
  affected on our sites.

  The cifs shares are accessed via autofs using Kerberos authentication.

  The following info is the only error message we could actively catch
  on a different system before the system was frozen:

  general protection fault:  [#3] SMP PTI
  CPU: 0 PID: 21294 Comm: automount Tainted: G  DOE 
5.4.0-97-generic #110-Ubuntu
  Hardware name: Dell Inc. Precision 7530/03RV2M, BIOS 1.14.4 10/21/2020
  RIP: 0010:kmem_cache_alloc_trace+0x8c/0x240
  Code: 08 65 4c 03 05 1d e8 f7 6e 49 83 78 10 00 4d 8b 38 0f 84 92 01 00 00 4d 
85 ff 0f 84 89 01 00 00 41 8b 41 20 49 8b 39 4c 01 f8 <48> 8b 18 48 89 c1 49 33 
99 70 01 00 00 4c 89 f8 48 0f c9 48 31 cb
  RSP: 0018:a6ca860f7ba0 EFLAGS: 00010286
  RAX: fdd44d7c219190e1 RBX:  RCX: 
  RDX: d558 RSI: 0cc0 RDI: 00035060
  RBP: a6ca860f7bd0 R08: 99233c035060 R09: 992338c079c0
  R10: 0001 R11: 0004 R12: 0cc0
  R13: 000b R14: 992338c079c0 R15: fdd44d7c219190e1
  FS:  7fdc24e29700() GS:99233c00() knlGS:
  CS:  0010 DS:  ES:  CR0: 80050033
  CR2: 7f15a80ee010 CR3: 0007e36b2006 CR4: 003606f0
  Call Trace:
   ? proc_self_get_link+0x70/0xd0
   proc_self_get_link+0x70/0xd0
   link_path_walk.part.0+0x478/0x550
   ? trailing_symlink+0x1d1/0x280
   path_openat+0xb7/0x290
   do_filp_open+0x91/0x100
   ? unuse_pde+0x30/0x30
   do_sys_open+0x17e/0x290
   __x64_sys_openat+0x20/0x30
   __orig_openat+0x71/0xc0 [eset_rtp]
   ? __switch_to_asm+0x40/0x70
   ? __switch_to_asm+0x34/0x70
   ? __switch_to_asm+0x40/0x70
   ? __x64_sys_futex+0x13f/0x170
   ? __switch_to_asm+0x34/0x70
   ? __switch_to_asm+0x40/0x70
   ? __switch_to_asm+0x34/0x70
   ? __switch_to_asm+0x40/0x70
   __x64_sys_ertp_openat+0x29/0x60 [eset_rtp]
   do_syscall_64+0x57/0x190
   entry_SYSCALL_64_after_hwframe+0x44/0xa9
  RIP: 0033:0x7fdc28a41f24
  Code: 24 20 eb 8f 66 90 44 89 54 24 0c e8 56 68 f8 ff 44 8b 54 24 0c 44 89 e2 
48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 32 
44 89 c7 89 44 24 0c e8 88 68 f8 ff 8b 44
  RSP: 002b:7fdc24e25980 EFLAGS: 0293 ORIG_RAX: 0101
  RAX: ffda RBX: 7fdc040008d0 RCX: 7fdc28a41f24
   ? unuse_pde+0x30/0x30
   do_sys_open+0x17e/0x290
   __x64_sys_openat+0x20/0x30
   __orig_openat+0x71/0xc0 [eset_rtp]
   ? __switch_to_asm+0x40/0x70
   ? __switch_to_asm+0x34/0x70
   ? __switch_to_asm+0x40/0x70
   ? __x64_sys_futex+0x13f/0x170
   ? __switch_to_asm+0x34/0x70
   ? __switch_to_asm+0x40/0x70
   ? __switch_to_asm+0x34/0x70
   ? __switch_to_asm+0x40/0x70
   __x64_sys_ertp_openat+0x29/0x60 [eset_rtp]
   do_syscall_64+0x57/0x190
   entry_SYSCALL_64_after_hwframe+0x44/0xa9
  RIP: 0033:0x7fdc28a41f24
  Code: 24 20 eb 8f 66 90 44 89 54 24 0c e8 56 68 f8 ff 44 8b 54 24 0c 44 89 e2 
48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 32 
44 89 c7 89 44 24 0c e8 88 68 f8 ff 8b 44
  RSP: 002b:7fdc24e25980 EFLAGS: 0293 ORIG_RAX: 0101
  RAX: ffda RBX: 7fdc040008d0 RCX: 7fdc28a41f24
  RDX: 0008 RSI: 564d4410a8c8 RDI: ff9c
  RBP: 564d4410a8c8 R08:  R09: 0001
  R10:  R11: 0293 R12: 0008
  R13: 564d4410e28a R14: 7fdc24e25b40 R15: 7fdc24e28fc0
  Modules linked in: cmac nls_utf8 cifs fscache libdes ccm vboxnetadp(OE) 
vboxnetflt(OE) vboxdrv(OE) eset_rtp(OE) xt_conntrack xt_MASQUERADE 
nf_conntrack_netlink nfnetlink xfrm_user xfrm_algo xt_addrtype iptable_filter 
iptable_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ip>
   snd_seq_midi coretemp snd_seq_midi_event snd_rawmidi kvm_intel snd_seq kvm 
dell_wmi snd_seq_device rapl dell_smbios snd_timer dcdbas intel_cstate 
input_leds iwlwifi serio_raw snd intel_wmi_thunderbolt rtsx_pci_ms 
dell_wmi_descriptor wmi_bmof processor_thermal_device ucsi_acp>
   pinctrl_cannonlake video pinctrl_intel
  ---[ end trace 80828f22da45a19b ]---
  RIP: 

[Kernel-packages] [Bug 1959665] Re: linux-image-5.4.0-97.110 freezes by accessing cifs shares

2022-02-02 Thread Sebastian Berner
Just a quick heads up on my tests with different kernel versions. I have
installed all available Updates for Ubuntu 20.04 (including samba-*=
2:4.13.17~dfsg-0ubuntu0.21.04.1; CVE-2022-0336). These are the results:

GA:
5.4.0-98.111~lp1959665.1 -> no freezes in 3 hours of testing
5.4.0-97.110 -> still keeps freezing

HWE:
5.13.0-27.29~20.04.1 -> no freezes in 1 hour of testing
5.13.0-28.31~20.04.1 -> no freezes in 1 hour of testing

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-0336

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1959665

Title:
  linux-image-5.4.0-97.110 freezes by accessing cifs shares

Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Focal:
  In Progress

Bug description:
  Ubuntu 20.04 with kernel image 5.4.0-97.110 randomly freezes when we
  access cifs shares. The system needs a hard reset after the freeze.

  The previous kernel image (5.4.0-96.109) does not show this behavior.
  Multiple Ubuntu 20.04 systems running on kernel image 9.4.0-97.110 are
  affected on our sites.

  The cifs shares are accessed via autofs using Kerberos authentication.

  The following info is the only error message we could actively catch
  on a different system before the system was frozen:

  general protection fault:  [#3] SMP PTI
  CPU: 0 PID: 21294 Comm: automount Tainted: G  DOE 
5.4.0-97-generic #110-Ubuntu
  Hardware name: Dell Inc. Precision 7530/03RV2M, BIOS 1.14.4 10/21/2020
  RIP: 0010:kmem_cache_alloc_trace+0x8c/0x240
  Code: 08 65 4c 03 05 1d e8 f7 6e 49 83 78 10 00 4d 8b 38 0f 84 92 01 00 00 4d 
85 ff 0f 84 89 01 00 00 41 8b 41 20 49 8b 39 4c 01 f8 <48> 8b 18 48 89 c1 49 33 
99 70 01 00 00 4c 89 f8 48 0f c9 48 31 cb
  RSP: 0018:a6ca860f7ba0 EFLAGS: 00010286
  RAX: fdd44d7c219190e1 RBX:  RCX: 
  RDX: d558 RSI: 0cc0 RDI: 00035060
  RBP: a6ca860f7bd0 R08: 99233c035060 R09: 992338c079c0
  R10: 0001 R11: 0004 R12: 0cc0
  R13: 000b R14: 992338c079c0 R15: fdd44d7c219190e1
  FS:  7fdc24e29700() GS:99233c00() knlGS:
  CS:  0010 DS:  ES:  CR0: 80050033
  CR2: 7f15a80ee010 CR3: 0007e36b2006 CR4: 003606f0
  Call Trace:
   ? proc_self_get_link+0x70/0xd0
   proc_self_get_link+0x70/0xd0
   link_path_walk.part.0+0x478/0x550
   ? trailing_symlink+0x1d1/0x280
   path_openat+0xb7/0x290
   do_filp_open+0x91/0x100
   ? unuse_pde+0x30/0x30
   do_sys_open+0x17e/0x290
   __x64_sys_openat+0x20/0x30
   __orig_openat+0x71/0xc0 [eset_rtp]
   ? __switch_to_asm+0x40/0x70
   ? __switch_to_asm+0x34/0x70
   ? __switch_to_asm+0x40/0x70
   ? __x64_sys_futex+0x13f/0x170
   ? __switch_to_asm+0x34/0x70
   ? __switch_to_asm+0x40/0x70
   ? __switch_to_asm+0x34/0x70
   ? __switch_to_asm+0x40/0x70
   __x64_sys_ertp_openat+0x29/0x60 [eset_rtp]
   do_syscall_64+0x57/0x190
   entry_SYSCALL_64_after_hwframe+0x44/0xa9
  RIP: 0033:0x7fdc28a41f24
  Code: 24 20 eb 8f 66 90 44 89 54 24 0c e8 56 68 f8 ff 44 8b 54 24 0c 44 89 e2 
48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 32 
44 89 c7 89 44 24 0c e8 88 68 f8 ff 8b 44
  RSP: 002b:7fdc24e25980 EFLAGS: 0293 ORIG_RAX: 0101
  RAX: ffda RBX: 7fdc040008d0 RCX: 7fdc28a41f24
   ? unuse_pde+0x30/0x30
   do_sys_open+0x17e/0x290
   __x64_sys_openat+0x20/0x30
   __orig_openat+0x71/0xc0 [eset_rtp]
   ? __switch_to_asm+0x40/0x70
   ? __switch_to_asm+0x34/0x70
   ? __switch_to_asm+0x40/0x70
   ? __x64_sys_futex+0x13f/0x170
   ? __switch_to_asm+0x34/0x70
   ? __switch_to_asm+0x40/0x70
   ? __switch_to_asm+0x34/0x70
   ? __switch_to_asm+0x40/0x70
   __x64_sys_ertp_openat+0x29/0x60 [eset_rtp]
   do_syscall_64+0x57/0x190
   entry_SYSCALL_64_after_hwframe+0x44/0xa9
  RIP: 0033:0x7fdc28a41f24
  Code: 24 20 eb 8f 66 90 44 89 54 24 0c e8 56 68 f8 ff 44 8b 54 24 0c 44 89 e2 
48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 32 
44 89 c7 89 44 24 0c e8 88 68 f8 ff 8b 44
  RSP: 002b:7fdc24e25980 EFLAGS: 0293 ORIG_RAX: 0101
  RAX: ffda RBX: 7fdc040008d0 RCX: 7fdc28a41f24
  RDX: 0008 RSI: 564d4410a8c8 RDI: ff9c
  RBP: 564d4410a8c8 R08:  R09: 0001
  R10:  R11: 0293 R12: 0008
  R13: 564d4410e28a R14: 7fdc24e25b40 R15: 7fdc24e28fc0
  Modules linked in: cmac nls_utf8 cifs fscache libdes ccm vboxnetadp(OE) 
vboxnetflt(OE) vboxdrv(OE) eset_rtp(OE) xt_conntrack xt_MASQUERADE 
nf_conntrack_netlink nfnetlink xfrm_user xfrm_algo xt_addrtype iptable_filter 
iptable_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ip>
   snd_seq_midi coretemp snd_seq_midi_event snd_rawmidi kvm_intel snd_seq kvm 
dell_wmi 

[Kernel-packages] [Bug 1959665] Re: linux-image-5.4.0-97.110 freezes by accessing cifs shares

2022-02-02 Thread Sebastian Berner
Hi,

thanks for the quick reply.

I can confirm, that while running on 5.4.0-98-generic #111~lp1959665.1 I
was able to access all of our cifs shares without issues.

A script, which creates, reads, modifies and deletes files on different
cifs shares also works without any issue.

Removing the latest cifs patches from kernel 5.4.0-97.110 seems to fix
our issue.

I will keep testing on 5.4.0-98-generic #111~lp1959665.1.

Best regards,
Sebastian

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1959665

Title:
  linux-image-5.4.0-97.110 freezes by accessing cifs shares

Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Focal:
  In Progress

Bug description:
  Ubuntu 20.04 with kernel image 5.4.0-97.110 randomly freezes when we
  access cifs shares. The system needs a hard reset after the freeze.

  The previous kernel image (5.4.0-96.109) does not show this behavior.
  Multiple Ubuntu 20.04 systems running on kernel image 9.4.0-97.110 are
  affected on our sites.

  The cifs shares are accessed via autofs using Kerberos authentication.

  The following info is the only error message we could actively catch
  on a different system before the system was frozen:

  general protection fault:  [#3] SMP PTI
  CPU: 0 PID: 21294 Comm: automount Tainted: G  DOE 
5.4.0-97-generic #110-Ubuntu
  Hardware name: Dell Inc. Precision 7530/03RV2M, BIOS 1.14.4 10/21/2020
  RIP: 0010:kmem_cache_alloc_trace+0x8c/0x240
  Code: 08 65 4c 03 05 1d e8 f7 6e 49 83 78 10 00 4d 8b 38 0f 84 92 01 00 00 4d 
85 ff 0f 84 89 01 00 00 41 8b 41 20 49 8b 39 4c 01 f8 <48> 8b 18 48 89 c1 49 33 
99 70 01 00 00 4c 89 f8 48 0f c9 48 31 cb
  RSP: 0018:a6ca860f7ba0 EFLAGS: 00010286
  RAX: fdd44d7c219190e1 RBX:  RCX: 
  RDX: d558 RSI: 0cc0 RDI: 00035060
  RBP: a6ca860f7bd0 R08: 99233c035060 R09: 992338c079c0
  R10: 0001 R11: 0004 R12: 0cc0
  R13: 000b R14: 992338c079c0 R15: fdd44d7c219190e1
  FS:  7fdc24e29700() GS:99233c00() knlGS:
  CS:  0010 DS:  ES:  CR0: 80050033
  CR2: 7f15a80ee010 CR3: 0007e36b2006 CR4: 003606f0
  Call Trace:
   ? proc_self_get_link+0x70/0xd0
   proc_self_get_link+0x70/0xd0
   link_path_walk.part.0+0x478/0x550
   ? trailing_symlink+0x1d1/0x280
   path_openat+0xb7/0x290
   do_filp_open+0x91/0x100
   ? unuse_pde+0x30/0x30
   do_sys_open+0x17e/0x290
   __x64_sys_openat+0x20/0x30
   __orig_openat+0x71/0xc0 [eset_rtp]
   ? __switch_to_asm+0x40/0x70
   ? __switch_to_asm+0x34/0x70
   ? __switch_to_asm+0x40/0x70
   ? __x64_sys_futex+0x13f/0x170
   ? __switch_to_asm+0x34/0x70
   ? __switch_to_asm+0x40/0x70
   ? __switch_to_asm+0x34/0x70
   ? __switch_to_asm+0x40/0x70
   __x64_sys_ertp_openat+0x29/0x60 [eset_rtp]
   do_syscall_64+0x57/0x190
   entry_SYSCALL_64_after_hwframe+0x44/0xa9
  RIP: 0033:0x7fdc28a41f24
  Code: 24 20 eb 8f 66 90 44 89 54 24 0c e8 56 68 f8 ff 44 8b 54 24 0c 44 89 e2 
48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 32 
44 89 c7 89 44 24 0c e8 88 68 f8 ff 8b 44
  RSP: 002b:7fdc24e25980 EFLAGS: 0293 ORIG_RAX: 0101
  RAX: ffda RBX: 7fdc040008d0 RCX: 7fdc28a41f24
   ? unuse_pde+0x30/0x30
   do_sys_open+0x17e/0x290
   __x64_sys_openat+0x20/0x30
   __orig_openat+0x71/0xc0 [eset_rtp]
   ? __switch_to_asm+0x40/0x70
   ? __switch_to_asm+0x34/0x70
   ? __switch_to_asm+0x40/0x70
   ? __x64_sys_futex+0x13f/0x170
   ? __switch_to_asm+0x34/0x70
   ? __switch_to_asm+0x40/0x70
   ? __switch_to_asm+0x34/0x70
   ? __switch_to_asm+0x40/0x70
   __x64_sys_ertp_openat+0x29/0x60 [eset_rtp]
   do_syscall_64+0x57/0x190
   entry_SYSCALL_64_after_hwframe+0x44/0xa9
  RIP: 0033:0x7fdc28a41f24
  Code: 24 20 eb 8f 66 90 44 89 54 24 0c e8 56 68 f8 ff 44 8b 54 24 0c 44 89 e2 
48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 32 
44 89 c7 89 44 24 0c e8 88 68 f8 ff 8b 44
  RSP: 002b:7fdc24e25980 EFLAGS: 0293 ORIG_RAX: 0101
  RAX: ffda RBX: 7fdc040008d0 RCX: 7fdc28a41f24
  RDX: 0008 RSI: 564d4410a8c8 RDI: ff9c
  RBP: 564d4410a8c8 R08:  R09: 0001
  R10:  R11: 0293 R12: 0008
  R13: 564d4410e28a R14: 7fdc24e25b40 R15: 7fdc24e28fc0
  Modules linked in: cmac nls_utf8 cifs fscache libdes ccm vboxnetadp(OE) 
vboxnetflt(OE) vboxdrv(OE) eset_rtp(OE) xt_conntrack xt_MASQUERADE 
nf_conntrack_netlink nfnetlink xfrm_user xfrm_algo xt_addrtype iptable_filter 
iptable_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ip>
   snd_seq_midi coretemp snd_seq_midi_event snd_rawmidi kvm_intel snd_seq kvm 
dell_wmi snd_seq_device rapl dell_smbios snd_timer dcdbas intel_cstate 

[Kernel-packages] [Bug 1959665] Re: linux-image-5.4.0-97.110 freezes by accessing cifs shares

2022-02-01 Thread Thomas Hansen
Hello,

Thanks for the help! :)

Are these cifs patches present in 5.13.0.27? I got similar issues with
5.4.0.97 and 5.13.0.27, and moving to previous releases fixed the issues
in both cases! :)

Cheers!

Thomas

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1959665

Title:
  linux-image-5.4.0-97.110 freezes by accessing cifs shares

Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Focal:
  In Progress

Bug description:
  Ubuntu 20.04 with kernel image 5.4.0-97.110 randomly freezes when we
  access cifs shares. The system needs a hard reset after the freeze.

  The previous kernel image (5.4.0-96.109) does not show this behavior.
  Multiple Ubuntu 20.04 systems running on kernel image 9.4.0-97.110 are
  affected on our sites.

  The cifs shares are accessed via autofs using Kerberos authentication.

  The following info is the only error message we could actively catch
  on a different system before the system was frozen:

  general protection fault:  [#3] SMP PTI
  CPU: 0 PID: 21294 Comm: automount Tainted: G  DOE 
5.4.0-97-generic #110-Ubuntu
  Hardware name: Dell Inc. Precision 7530/03RV2M, BIOS 1.14.4 10/21/2020
  RIP: 0010:kmem_cache_alloc_trace+0x8c/0x240
  Code: 08 65 4c 03 05 1d e8 f7 6e 49 83 78 10 00 4d 8b 38 0f 84 92 01 00 00 4d 
85 ff 0f 84 89 01 00 00 41 8b 41 20 49 8b 39 4c 01 f8 <48> 8b 18 48 89 c1 49 33 
99 70 01 00 00 4c 89 f8 48 0f c9 48 31 cb
  RSP: 0018:a6ca860f7ba0 EFLAGS: 00010286
  RAX: fdd44d7c219190e1 RBX:  RCX: 
  RDX: d558 RSI: 0cc0 RDI: 00035060
  RBP: a6ca860f7bd0 R08: 99233c035060 R09: 992338c079c0
  R10: 0001 R11: 0004 R12: 0cc0
  R13: 000b R14: 992338c079c0 R15: fdd44d7c219190e1
  FS:  7fdc24e29700() GS:99233c00() knlGS:
  CS:  0010 DS:  ES:  CR0: 80050033
  CR2: 7f15a80ee010 CR3: 0007e36b2006 CR4: 003606f0
  Call Trace:
   ? proc_self_get_link+0x70/0xd0
   proc_self_get_link+0x70/0xd0
   link_path_walk.part.0+0x478/0x550
   ? trailing_symlink+0x1d1/0x280
   path_openat+0xb7/0x290
   do_filp_open+0x91/0x100
   ? unuse_pde+0x30/0x30
   do_sys_open+0x17e/0x290
   __x64_sys_openat+0x20/0x30
   __orig_openat+0x71/0xc0 [eset_rtp]
   ? __switch_to_asm+0x40/0x70
   ? __switch_to_asm+0x34/0x70
   ? __switch_to_asm+0x40/0x70
   ? __x64_sys_futex+0x13f/0x170
   ? __switch_to_asm+0x34/0x70
   ? __switch_to_asm+0x40/0x70
   ? __switch_to_asm+0x34/0x70
   ? __switch_to_asm+0x40/0x70
   __x64_sys_ertp_openat+0x29/0x60 [eset_rtp]
   do_syscall_64+0x57/0x190
   entry_SYSCALL_64_after_hwframe+0x44/0xa9
  RIP: 0033:0x7fdc28a41f24
  Code: 24 20 eb 8f 66 90 44 89 54 24 0c e8 56 68 f8 ff 44 8b 54 24 0c 44 89 e2 
48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 32 
44 89 c7 89 44 24 0c e8 88 68 f8 ff 8b 44
  RSP: 002b:7fdc24e25980 EFLAGS: 0293 ORIG_RAX: 0101
  RAX: ffda RBX: 7fdc040008d0 RCX: 7fdc28a41f24
   ? unuse_pde+0x30/0x30
   do_sys_open+0x17e/0x290
   __x64_sys_openat+0x20/0x30
   __orig_openat+0x71/0xc0 [eset_rtp]
   ? __switch_to_asm+0x40/0x70
   ? __switch_to_asm+0x34/0x70
   ? __switch_to_asm+0x40/0x70
   ? __x64_sys_futex+0x13f/0x170
   ? __switch_to_asm+0x34/0x70
   ? __switch_to_asm+0x40/0x70
   ? __switch_to_asm+0x34/0x70
   ? __switch_to_asm+0x40/0x70
   __x64_sys_ertp_openat+0x29/0x60 [eset_rtp]
   do_syscall_64+0x57/0x190
   entry_SYSCALL_64_after_hwframe+0x44/0xa9
  RIP: 0033:0x7fdc28a41f24
  Code: 24 20 eb 8f 66 90 44 89 54 24 0c e8 56 68 f8 ff 44 8b 54 24 0c 44 89 e2 
48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 32 
44 89 c7 89 44 24 0c e8 88 68 f8 ff 8b 44
  RSP: 002b:7fdc24e25980 EFLAGS: 0293 ORIG_RAX: 0101
  RAX: ffda RBX: 7fdc040008d0 RCX: 7fdc28a41f24
  RDX: 0008 RSI: 564d4410a8c8 RDI: ff9c
  RBP: 564d4410a8c8 R08:  R09: 0001
  R10:  R11: 0293 R12: 0008
  R13: 564d4410e28a R14: 7fdc24e25b40 R15: 7fdc24e28fc0
  Modules linked in: cmac nls_utf8 cifs fscache libdes ccm vboxnetadp(OE) 
vboxnetflt(OE) vboxdrv(OE) eset_rtp(OE) xt_conntrack xt_MASQUERADE 
nf_conntrack_netlink nfnetlink xfrm_user xfrm_algo xt_addrtype iptable_filter 
iptable_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ip>
   snd_seq_midi coretemp snd_seq_midi_event snd_rawmidi kvm_intel snd_seq kvm 
dell_wmi snd_seq_device rapl dell_smbios snd_timer dcdbas intel_cstate 
input_leds iwlwifi serio_raw snd intel_wmi_thunderbolt rtsx_pci_ms 
dell_wmi_descriptor wmi_bmof processor_thermal_device ucsi_acp>
   pinctrl_cannonlake video pinctrl_intel
  ---[ end trace 80828f22da45a19b ]---
  RIP: 

[Kernel-packages] [Bug 1959665] Re: linux-image-5.4.0-97.110 freezes by accessing cifs shares

2022-02-01 Thread kaiszy
Hi,

thanks for the fast reply! I have just installed it:

:~$ uname -a
Linux foo.bar 5.4.0-98-generic #111~lp1959665.1 SMP Tue Feb 1 19:50:04 UTC 2022 
x86_64 x86_64 x86_64 GNU/Linux

I mount all shares and start my tests (ncdu and a simple bash
testscript). With 97#110 it takes 30 seconds to crash a machine. ...with
the 98#111 the scripts work (i abort the test after 60 minutes). I dont
get a kernel panic with this kernel. Maybe Sebastian can confirm this ?

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1959665

Title:
  linux-image-5.4.0-97.110 freezes by accessing cifs shares

Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Focal:
  In Progress

Bug description:
  Ubuntu 20.04 with kernel image 5.4.0-97.110 randomly freezes when we
  access cifs shares. The system needs a hard reset after the freeze.

  The previous kernel image (5.4.0-96.109) does not show this behavior.
  Multiple Ubuntu 20.04 systems running on kernel image 9.4.0-97.110 are
  affected on our sites.

  The cifs shares are accessed via autofs using Kerberos authentication.

  The following info is the only error message we could actively catch
  on a different system before the system was frozen:

  general protection fault:  [#3] SMP PTI
  CPU: 0 PID: 21294 Comm: automount Tainted: G  DOE 
5.4.0-97-generic #110-Ubuntu
  Hardware name: Dell Inc. Precision 7530/03RV2M, BIOS 1.14.4 10/21/2020
  RIP: 0010:kmem_cache_alloc_trace+0x8c/0x240
  Code: 08 65 4c 03 05 1d e8 f7 6e 49 83 78 10 00 4d 8b 38 0f 84 92 01 00 00 4d 
85 ff 0f 84 89 01 00 00 41 8b 41 20 49 8b 39 4c 01 f8 <48> 8b 18 48 89 c1 49 33 
99 70 01 00 00 4c 89 f8 48 0f c9 48 31 cb
  RSP: 0018:a6ca860f7ba0 EFLAGS: 00010286
  RAX: fdd44d7c219190e1 RBX:  RCX: 
  RDX: d558 RSI: 0cc0 RDI: 00035060
  RBP: a6ca860f7bd0 R08: 99233c035060 R09: 992338c079c0
  R10: 0001 R11: 0004 R12: 0cc0
  R13: 000b R14: 992338c079c0 R15: fdd44d7c219190e1
  FS:  7fdc24e29700() GS:99233c00() knlGS:
  CS:  0010 DS:  ES:  CR0: 80050033
  CR2: 7f15a80ee010 CR3: 0007e36b2006 CR4: 003606f0
  Call Trace:
   ? proc_self_get_link+0x70/0xd0
   proc_self_get_link+0x70/0xd0
   link_path_walk.part.0+0x478/0x550
   ? trailing_symlink+0x1d1/0x280
   path_openat+0xb7/0x290
   do_filp_open+0x91/0x100
   ? unuse_pde+0x30/0x30
   do_sys_open+0x17e/0x290
   __x64_sys_openat+0x20/0x30
   __orig_openat+0x71/0xc0 [eset_rtp]
   ? __switch_to_asm+0x40/0x70
   ? __switch_to_asm+0x34/0x70
   ? __switch_to_asm+0x40/0x70
   ? __x64_sys_futex+0x13f/0x170
   ? __switch_to_asm+0x34/0x70
   ? __switch_to_asm+0x40/0x70
   ? __switch_to_asm+0x34/0x70
   ? __switch_to_asm+0x40/0x70
   __x64_sys_ertp_openat+0x29/0x60 [eset_rtp]
   do_syscall_64+0x57/0x190
   entry_SYSCALL_64_after_hwframe+0x44/0xa9
  RIP: 0033:0x7fdc28a41f24
  Code: 24 20 eb 8f 66 90 44 89 54 24 0c e8 56 68 f8 ff 44 8b 54 24 0c 44 89 e2 
48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 32 
44 89 c7 89 44 24 0c e8 88 68 f8 ff 8b 44
  RSP: 002b:7fdc24e25980 EFLAGS: 0293 ORIG_RAX: 0101
  RAX: ffda RBX: 7fdc040008d0 RCX: 7fdc28a41f24
   ? unuse_pde+0x30/0x30
   do_sys_open+0x17e/0x290
   __x64_sys_openat+0x20/0x30
   __orig_openat+0x71/0xc0 [eset_rtp]
   ? __switch_to_asm+0x40/0x70
   ? __switch_to_asm+0x34/0x70
   ? __switch_to_asm+0x40/0x70
   ? __x64_sys_futex+0x13f/0x170
   ? __switch_to_asm+0x34/0x70
   ? __switch_to_asm+0x40/0x70
   ? __switch_to_asm+0x34/0x70
   ? __switch_to_asm+0x40/0x70
   __x64_sys_ertp_openat+0x29/0x60 [eset_rtp]
   do_syscall_64+0x57/0x190
   entry_SYSCALL_64_after_hwframe+0x44/0xa9
  RIP: 0033:0x7fdc28a41f24
  Code: 24 20 eb 8f 66 90 44 89 54 24 0c e8 56 68 f8 ff 44 8b 54 24 0c 44 89 e2 
48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 32 
44 89 c7 89 44 24 0c e8 88 68 f8 ff 8b 44
  RSP: 002b:7fdc24e25980 EFLAGS: 0293 ORIG_RAX: 0101
  RAX: ffda RBX: 7fdc040008d0 RCX: 7fdc28a41f24
  RDX: 0008 RSI: 564d4410a8c8 RDI: ff9c
  RBP: 564d4410a8c8 R08:  R09: 0001
  R10:  R11: 0293 R12: 0008
  R13: 564d4410e28a R14: 7fdc24e25b40 R15: 7fdc24e28fc0
  Modules linked in: cmac nls_utf8 cifs fscache libdes ccm vboxnetadp(OE) 
vboxnetflt(OE) vboxdrv(OE) eset_rtp(OE) xt_conntrack xt_MASQUERADE 
nf_conntrack_netlink nfnetlink xfrm_user xfrm_algo xt_addrtype iptable_filter 
iptable_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ip>
   snd_seq_midi coretemp snd_seq_midi_event snd_rawmidi kvm_intel snd_seq kvm 
dell_wmi snd_seq_device rapl dell_smbios snd_timer dcdbas 

[Kernel-packages] [Bug 1959665] Re: linux-image-5.4.0-97.110 freezes by accessing cifs shares

2022-02-01 Thread Tim Gardner
There were 3 cifs patches in this last version. I've reverted all 3.
please try this test kernel to see if it corrects your issues:

wget 
https://kernel.ubuntu.com/~rtg/focal-cifs-freeze-lp1959665/lp1959665.1/amd64/linux-image-unsigned-5.4.0-98-generic_5.4.0-98.111~lp1959665.1_amd64.deb
wget 
https://kernel.ubuntu.com/~rtg/focal-cifs-freeze-lp1959665/lp1959665.1/amd64/linux-modules-5.4.0-98-generic_5.4.0-98.111~lp1959665.1_amd64.deb
wget 
https://kernel.ubuntu.com/~rtg/focal-cifs-freeze-lp1959665/lp1959665.1/amd64/linux-modules-extra-5.4.0-98-generic_5.4.0-98.111~lp1959665.1_amd64.deb
sudo dpkg -i *.deb
sudo apt-get -f install


** Also affects: linux (Ubuntu Focal)
   Importance: Undecided
   Status: New

** Changed in: linux (Ubuntu Focal)
   Status: New => In Progress

** Changed in: linux (Ubuntu Focal)
   Importance: Undecided => Medium

** Changed in: linux (Ubuntu Focal)
 Assignee: (unassigned) => Tim Gardner (timg-tpi)

** Changed in: linux (Ubuntu)
   Status: Confirmed => Invalid

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1959665

Title:
  linux-image-5.4.0-97.110 freezes by accessing cifs shares

Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Focal:
  In Progress

Bug description:
  Ubuntu 20.04 with kernel image 5.4.0-97.110 randomly freezes when we
  access cifs shares. The system needs a hard reset after the freeze.

  The previous kernel image (5.4.0-96.109) does not show this behavior.
  Multiple Ubuntu 20.04 systems running on kernel image 9.4.0-97.110 are
  affected on our sites.

  The cifs shares are accessed via autofs using Kerberos authentication.

  The following info is the only error message we could actively catch
  on a different system before the system was frozen:

  general protection fault:  [#3] SMP PTI
  CPU: 0 PID: 21294 Comm: automount Tainted: G  DOE 
5.4.0-97-generic #110-Ubuntu
  Hardware name: Dell Inc. Precision 7530/03RV2M, BIOS 1.14.4 10/21/2020
  RIP: 0010:kmem_cache_alloc_trace+0x8c/0x240
  Code: 08 65 4c 03 05 1d e8 f7 6e 49 83 78 10 00 4d 8b 38 0f 84 92 01 00 00 4d 
85 ff 0f 84 89 01 00 00 41 8b 41 20 49 8b 39 4c 01 f8 <48> 8b 18 48 89 c1 49 33 
99 70 01 00 00 4c 89 f8 48 0f c9 48 31 cb
  RSP: 0018:a6ca860f7ba0 EFLAGS: 00010286
  RAX: fdd44d7c219190e1 RBX:  RCX: 
  RDX: d558 RSI: 0cc0 RDI: 00035060
  RBP: a6ca860f7bd0 R08: 99233c035060 R09: 992338c079c0
  R10: 0001 R11: 0004 R12: 0cc0
  R13: 000b R14: 992338c079c0 R15: fdd44d7c219190e1
  FS:  7fdc24e29700() GS:99233c00() knlGS:
  CS:  0010 DS:  ES:  CR0: 80050033
  CR2: 7f15a80ee010 CR3: 0007e36b2006 CR4: 003606f0
  Call Trace:
   ? proc_self_get_link+0x70/0xd0
   proc_self_get_link+0x70/0xd0
   link_path_walk.part.0+0x478/0x550
   ? trailing_symlink+0x1d1/0x280
   path_openat+0xb7/0x290
   do_filp_open+0x91/0x100
   ? unuse_pde+0x30/0x30
   do_sys_open+0x17e/0x290
   __x64_sys_openat+0x20/0x30
   __orig_openat+0x71/0xc0 [eset_rtp]
   ? __switch_to_asm+0x40/0x70
   ? __switch_to_asm+0x34/0x70
   ? __switch_to_asm+0x40/0x70
   ? __x64_sys_futex+0x13f/0x170
   ? __switch_to_asm+0x34/0x70
   ? __switch_to_asm+0x40/0x70
   ? __switch_to_asm+0x34/0x70
   ? __switch_to_asm+0x40/0x70
   __x64_sys_ertp_openat+0x29/0x60 [eset_rtp]
   do_syscall_64+0x57/0x190
   entry_SYSCALL_64_after_hwframe+0x44/0xa9
  RIP: 0033:0x7fdc28a41f24
  Code: 24 20 eb 8f 66 90 44 89 54 24 0c e8 56 68 f8 ff 44 8b 54 24 0c 44 89 e2 
48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 32 
44 89 c7 89 44 24 0c e8 88 68 f8 ff 8b 44
  RSP: 002b:7fdc24e25980 EFLAGS: 0293 ORIG_RAX: 0101
  RAX: ffda RBX: 7fdc040008d0 RCX: 7fdc28a41f24
   ? unuse_pde+0x30/0x30
   do_sys_open+0x17e/0x290
   __x64_sys_openat+0x20/0x30
   __orig_openat+0x71/0xc0 [eset_rtp]
   ? __switch_to_asm+0x40/0x70
   ? __switch_to_asm+0x34/0x70
   ? __switch_to_asm+0x40/0x70
   ? __x64_sys_futex+0x13f/0x170
   ? __switch_to_asm+0x34/0x70
   ? __switch_to_asm+0x40/0x70
   ? __switch_to_asm+0x34/0x70
   ? __switch_to_asm+0x40/0x70
   __x64_sys_ertp_openat+0x29/0x60 [eset_rtp]
   do_syscall_64+0x57/0x190
   entry_SYSCALL_64_after_hwframe+0x44/0xa9
  RIP: 0033:0x7fdc28a41f24
  Code: 24 20 eb 8f 66 90 44 89 54 24 0c e8 56 68 f8 ff 44 8b 54 24 0c 44 89 e2 
48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 32 
44 89 c7 89 44 24 0c e8 88 68 f8 ff 8b 44
  RSP: 002b:7fdc24e25980 EFLAGS: 0293 ORIG_RAX: 0101
  RAX: ffda RBX: 7fdc040008d0 RCX: 7fdc28a41f24
  RDX: 0008 RSI: 564d4410a8c8 RDI: ff9c
  RBP: 564d4410a8c8 R08:  R09: 0001
  

[Kernel-packages] [Bug 1959665] Re: linux-image-5.4.0-97.110 freezes by accessing cifs shares

2022-02-01 Thread kaiszy
```
Servers:
Number of credits: 185 Dialect 0x300
1) Name: a.b.c.d Uses: 1 Capability: 0x300067 Session Status: 1 TCP status: 
1 Instance: 1
Local Users To Server: 1 SecMode: 0x1 Req On Wire: 0 SessionId: 
0xc1be04000435
Shares:
0) IPC: \\xxx\IPC$ Mounts: 1 DevInfo: 0x0 Attributes: 0x0
PathComponentMax: 0 Status: 1 type: 0 Serial Number: 0x0
Share Capabilities: NoneShare Flags: 0x30
tid: 0x1Maximal Access: 0x11f01ff

1) \\xxx\yyy Mounts: 1 DevInfo: 0x60020 Attributes: 0xc700ff
PathComponentMax: 255 Status: 1 type: DISK Serial Number: 0xaaf791c3
Share Capabilities: DFS, Aligned, Partition Aligned, TRIM-support,  
Share Flags: 0x803
tid: 0x5Optimal sector size: 0x200  Maximal Access: 0x1200a9

MIDs:

Server interfaces: 1
0)  Speed: 100 bps
Capabilities: 
IPv4: e.f.g.h

 Debuginfo:

[  710.383873] kernel BUG at mm/slub.c:307!
[  710.384582] invalid opcode:  [#1] SMP PTI
[  710.385116] CPU: 1 PID: 3089 Comm: umount Not tainted 5.4.0-97-generic 
#110-Ubuntu
[  710.385775] Hardware name: VMware, Inc. VMware Virtual Platform/440BX 
Desktop Reference Platform, BIOS 6.00 12/12/2018
[  710.386903] RIP: 0010:__slab_free+0x199/0x360
[  710.387470] Code: 00 48 89 c7 fa 66 0f 1f 44 00 00 f0 49 0f ba 2c 24 00 72 
79 4d 3b 6c 24 20 74 11 49 0f ba 34 24 00 57 9d 0f 1f 44 00 00 eb 9f <0f> 0b 49 
3b 5c 24 28 75 e8 48 8b 44 24 28 49 89 4c 24 28 49 89 44
[  710.389229] RSP: 0018:b94541417ce0 EFLAGS: 00010246
[  710.389809] RAX: 90cfb5fab120 RBX: 8080007f RCX: 90cfb5fab120
[  710.390406] RDX: 90cfb5fab120 RSI: ec7d84d7eac0 RDI: 90cfbb003880
[  710.390993] RBP: b94541417d90 R08: 0001 R09: c08ed620
[  710.391574] R10: 90cfb5fab120 R11: 0001 R12: ec7d84d7eac0
[  710.392147] R13: 90cfb5fab120 R14: 90cfbb003880 R15: 
[  710.392709] FS:  7f7b219e5840() GS:90cfbba8() 
knlGS:
[  710.393274] CS:  0010 DS:  ES:  CR0: 80050033
[  710.393820] CR2: 55a3da30b9d0 CR3: 00012658a006 CR4: 007606e0
[  710.394545] PKRU: 5554
[  710.395093] Call Trace:
[  710.395760]  ? fscache_free_cookie+0x39/0x60 [fscache]
[  710.396480]  ? cifs_cleanup_volume_info_contents+0x30/0x60 [cifs]
[  710.397026]  kfree+0x231/0x250
[  710.397593]  cifs_cleanup_volume_info_contents+0x30/0x60 [cifs]
[  710.398159]  dfs_cache_del_vol+0xec/0x1a0 [cifs]
[  710.398720]  cifs_umount+0x9e/0xd0 [cifs]
[  710.399270]  cifs_kill_sb+0x1f/0x30 [cifs]
[  710.399807]  deactivate_locked_super+0x3b/0x80
[  710.400358]  deactivate_super+0x3e/0x50
[  710.400882]  cleanup_mnt+0x109/0x160
[  710.401403]  __cleanup_mnt+0x12/0x20
[  710.401919]  task_work_run+0x8f/0xb0
[  710.402456]  exit_to_usermode_loop+0x131/0x160
[  710.402956]  do_syscall_64+0x163/0x190
[  710.403448]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  710.403922] RIP: 0033:0x7f7b21c4a2cb
[  710.404380] Code: 8b 0c 00 f7 d8 64 89 01 48 83 c8 ff c3 66 90 f3 0f 1e fa 
31 f6 e9 05 00 00 00 0f 1f 44 00 00 f3 0f 1e fa b8 a6 00 00 00 0f 05 <48> 3d 01 
f0 ff ff 73 01 c3 48 8b 0d 95 8b 0c 00 f7 d8 64 89 01 48
[  710.405823] RSP: 002b:7fff6a6cdc28 EFLAGS: 0246 ORIG_RAX: 
00a6
[  710.406325] RAX:  RBX: 7f7b21d79204 RCX: 7f7b21c4a2cb
[  710.406811] RDX:  RSI:  RDI: 560106a71ae0
[  710.407317] RBP: 560106a6a890 R08:  R09: 7fff6a6cc9a0
[  710.407790] R10: 7f7b21d65339 R11: 0246 R12: 560106a71ae0
[  710.408249] R13:  R14: 560106a6a988 R15: 560106a6aaa0
[  710.408707] Modules linked in: md4 cmac nls_utf8 cifs libarc4 fscache libdes 
vmw_vsock_vmci_transport vsock dm_multipath scsi_dh_rdac scsi_dh_emc 
scsi_dh_alua intel_rapl_msr intel_rapl_common isst_if_mbox_msr isst_if_common 
nfit rapl vmw_balloon joydev input_leds serio_raw vmw_vmci mac_hid sch_fq_codel 
msr ip_tables x_tables autofs4 btrfs zstd_compress raid10 raid456 
async_raid6_recov async_memcpy async_pq async_xor async_tx xor raid6_pq 
libcrc32c raid1 raid0 multipath linear crct10dif_pclmul crc32_pclmul 
ghash_clmulni_intel aesni_intel crypto_simd cryptd glue_helper vmwgfx ttm 
psmouse drm_kms_helper syscopyarea ahci sysfillrect sysimgblt vmw_pvscsi 
libahci fb_sys_fops vmxnet3 pata_acpi drm i2c_piix4
[  710.412749] ---[ end trace c3b4f6aeb4b07511 ]---
[  710.413274] RIP: 0010:__slab_free+0x199/0x360
[  710.413781] Code: 00 48 89 c7 fa 66 0f 1f 44 00 00 f0 49 0f ba 2c 24 00 72 
79 4d 3b 6c 24 20 74 11 49 0f ba 34 24 00 57 9d 0f 1f 44 00 00 eb 9f <0f> 0b 49 
3b 5c 24 28 75 e8 48 8b 44 24 28 49 89 4c 24 28 49 89 44
[  710.415405] RSP: 0018:b94541417ce0 EFLAGS: 00010246
[  710.415948] RAX: 90cfb5fab120 RBX: 8080007f RCX: 90cfb5fab120
[  710.416497] RDX: 

[Kernel-packages] [Bug 1959665] Re: linux-image-5.4.0-97.110 freezes by accessing cifs shares

2022-02-01 Thread Sebastian Berner
** Summary changed:

- linux-image-9.4.0-97.110 freezes by accessing cifs shares
+ linux-image-5.4.0-97.110 freezes by accessing cifs shares

** Description changed:

- Ubuntu 20.04 with kernel image 9.4.0-97.110 randomly freezes when we
+ Ubuntu 20.04 with kernel image 5.4.0-97.110 randomly freezes when we
  access cifs shares. The system needs a hard reset after the freeze.
  
  The previous kernel image (5.4.0-96.109) does not show this behavior.
  Multiple Ubuntu 20.04 systems running on kernel image 9.4.0-97.110 are
  affected on our sites.
  
  The cifs shares are accessed via autofs using Kerberos authentication.
  
  The following info is the only error message we could actively catch on
  a different system before the system was frozen:
  
  general protection fault:  [#3] SMP PTI
  CPU: 0 PID: 21294 Comm: automount Tainted: G  DOE 
5.4.0-97-generic #110-Ubuntu
  Hardware name: Dell Inc. Precision 7530/03RV2M, BIOS 1.14.4 10/21/2020
  RIP: 0010:kmem_cache_alloc_trace+0x8c/0x240
  Code: 08 65 4c 03 05 1d e8 f7 6e 49 83 78 10 00 4d 8b 38 0f 84 92 01 00 00 4d 
85 ff 0f 84 89 01 00 00 41 8b 41 20 49 8b 39 4c 01 f8 <48> 8b 18 48 89 c1 49 33 
99 70 01 00 00 4c 89 f8 48 0f c9 48 31 cb
  RSP: 0018:a6ca860f7ba0 EFLAGS: 00010286
  RAX: fdd44d7c219190e1 RBX:  RCX: 
  RDX: d558 RSI: 0cc0 RDI: 00035060
  RBP: a6ca860f7bd0 R08: 99233c035060 R09: 992338c079c0
  R10: 0001 R11: 0004 R12: 0cc0
  R13: 000b R14: 992338c079c0 R15: fdd44d7c219190e1
  FS:  7fdc24e29700() GS:99233c00() knlGS:
  CS:  0010 DS:  ES:  CR0: 80050033
  CR2: 7f15a80ee010 CR3: 0007e36b2006 CR4: 003606f0
  Call Trace:
-  ? proc_self_get_link+0x70/0xd0
-  proc_self_get_link+0x70/0xd0
-  link_path_walk.part.0+0x478/0x550
-  ? trailing_symlink+0x1d1/0x280
-  path_openat+0xb7/0x290
-  do_filp_open+0x91/0x100
-  ? unuse_pde+0x30/0x30
-  do_sys_open+0x17e/0x290
-  __x64_sys_openat+0x20/0x30
-  __orig_openat+0x71/0xc0 [eset_rtp]
-  ? __switch_to_asm+0x40/0x70
-  ? __switch_to_asm+0x34/0x70
-  ? __switch_to_asm+0x40/0x70
-  ? __x64_sys_futex+0x13f/0x170
-  ? __switch_to_asm+0x34/0x70
-  ? __switch_to_asm+0x40/0x70
-  ? __switch_to_asm+0x34/0x70
-  ? __switch_to_asm+0x40/0x70
-  __x64_sys_ertp_openat+0x29/0x60 [eset_rtp]
-  do_syscall_64+0x57/0x190
-  entry_SYSCALL_64_after_hwframe+0x44/0xa9
+  ? proc_self_get_link+0x70/0xd0
+  proc_self_get_link+0x70/0xd0
+  link_path_walk.part.0+0x478/0x550
+  ? trailing_symlink+0x1d1/0x280
+  path_openat+0xb7/0x290
+  do_filp_open+0x91/0x100
+  ? unuse_pde+0x30/0x30
+  do_sys_open+0x17e/0x290
+  __x64_sys_openat+0x20/0x30
+  __orig_openat+0x71/0xc0 [eset_rtp]
+  ? __switch_to_asm+0x40/0x70
+  ? __switch_to_asm+0x34/0x70
+  ? __switch_to_asm+0x40/0x70
+  ? __x64_sys_futex+0x13f/0x170
+  ? __switch_to_asm+0x34/0x70
+  ? __switch_to_asm+0x40/0x70
+  ? __switch_to_asm+0x34/0x70
+  ? __switch_to_asm+0x40/0x70
+  __x64_sys_ertp_openat+0x29/0x60 [eset_rtp]
+  do_syscall_64+0x57/0x190
+  entry_SYSCALL_64_after_hwframe+0x44/0xa9
  RIP: 0033:0x7fdc28a41f24
  Code: 24 20 eb 8f 66 90 44 89 54 24 0c e8 56 68 f8 ff 44 8b 54 24 0c 44 89 e2 
48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 32 
44 89 c7 89 44 24 0c e8 88 68 f8 ff 8b 44
  RSP: 002b:7fdc24e25980 EFLAGS: 0293 ORIG_RAX: 0101
  RAX: ffda RBX: 7fdc040008d0 RCX: 7fdc28a41f24
-  ? unuse_pde+0x30/0x30
-  do_sys_open+0x17e/0x290
-  __x64_sys_openat+0x20/0x30
-  __orig_openat+0x71/0xc0 [eset_rtp]
-  ? __switch_to_asm+0x40/0x70
-  ? __switch_to_asm+0x34/0x70
-  ? __switch_to_asm+0x40/0x70
-  ? __x64_sys_futex+0x13f/0x170
-  ? __switch_to_asm+0x34/0x70
-  ? __switch_to_asm+0x40/0x70
-  ? __switch_to_asm+0x34/0x70
-  ? __switch_to_asm+0x40/0x70
-  __x64_sys_ertp_openat+0x29/0x60 [eset_rtp]
-  do_syscall_64+0x57/0x190
-  entry_SYSCALL_64_after_hwframe+0x44/0xa9
+  ? unuse_pde+0x30/0x30
+  do_sys_open+0x17e/0x290
+  __x64_sys_openat+0x20/0x30
+  __orig_openat+0x71/0xc0 [eset_rtp]
+  ? __switch_to_asm+0x40/0x70
+  ? __switch_to_asm+0x34/0x70
+  ? __switch_to_asm+0x40/0x70
+  ? __x64_sys_futex+0x13f/0x170
+  ? __switch_to_asm+0x34/0x70
+  ? __switch_to_asm+0x40/0x70
+  ? __switch_to_asm+0x34/0x70
+  ? __switch_to_asm+0x40/0x70
+  __x64_sys_ertp_openat+0x29/0x60 [eset_rtp]
+  do_syscall_64+0x57/0x190
+  entry_SYSCALL_64_after_hwframe+0x44/0xa9
  RIP: 0033:0x7fdc28a41f24
  Code: 24 20 eb 8f 66 90 44 89 54 24 0c e8 56 68 f8 ff 44 8b 54 24 0c 44 89 e2 
48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 32 
44 89 c7 89 44 24 0c e8 88 68 f8 ff 8b 44
  RSP: 002b:7fdc24e25980 EFLAGS: 0293 ORIG_RAX: 0101
  RAX: ffda RBX: 7fdc040008d0 RCX: 7fdc28a41f24
  RDX: 0008 RSI: 564d4410a8c8 RDI: ff9c
  RBP: 564d4410a8c8 R08: