Bug 1204705 - Kernel 6.0.3: NULL pointer dereference + Plasma 5.26.1 session not working; 6.0.2 works
Kernel 6.0.3: NULL pointer dereference + Plasma 5.26.1 session not working; 6...
Status: RESOLVED FIXED
Classification: openSUSE
Product: openSUSE Tumbleweed
Classification: openSUSE
Component: Kernel
Current
64bit Other
: P5 - None : Normal (vote)
: ---
Assigned To: openSUSE Kernel Bugs
E-mail List
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2022-10-25 11:25 UTC by Alex Debus
Modified: 2023-01-18 17:58 UTC (History)
2 users (show)

See Also:
Found By: ---
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---
tiwai: needinfo? (postix)


Attachments
dmesg for kernel 6.1.0-rc2-1.g796d87f-default (105.64 KB, text/plain)
2022-10-26 16:08 UTC, Alex Debus
Details
dmesg for kernel 6.1.0-rc2-1.g796d87f-default (105.62 KB, text/plain)
2022-10-26 16:11 UTC, Alex Debus
Details
diff between 6.0.3 and the working patched kernel (2.28 KB, patch)
2022-10-30 13:26 UTC, Alex Debus
Details | Diff
dmesg for working patched kernel (104.36 KB, text/plain)
2022-10-30 13:30 UTC, Alex Debus
Details
diff between v6.0.5 and the working patched kernel (2.28 KB, text/plain)
2022-10-30 15:17 UTC, Alex Debus
Details
dmesg for kernel 6.0.5 (w/o the patch) (109.50 KB, text/plain)
2022-10-30 15:18 UTC, Alex Debus
Details
dmesg for kernel 6.0.5 (with the patch) (104.33 KB, text/plain)
2022-10-30 15:19 UTC, Alex Debus
Details
diff between v6.1.0-rc2 and the working patched kernel (2.10 KB, text/plain)
2022-10-30 15:54 UTC, Alex Debus
Details
dmesg for kernel 6.1.0-rc2 (w/o the patch) (105.20 KB, text/plain)
2022-10-30 15:54 UTC, Alex Debus
Details
dmesg for kernel 6.1.0-rc2 (with the patch) (103.28 KB, text/plain)
2022-10-30 15:55 UTC, Alex Debus
Details

Note You need to log in before you can comment on or make changes to this bug.
Description Alex Debus 2022-10-25 11:25:25 UTC
Since updating from kernel 6.0.2 to 6.0.3 on openSUSE TW, KDE Plasma 5.26.1 running X11 or Wayland fails to start, after logging in from SDDM: 

* The cursor works, but no panel shows up, the desktop starts to freeze, i.e. turns gray after a while
* Pressing CTRL+ALT+DEL opens the power-management overlay, where logging out works
* Shutting down the system does not work after having logged in once, but takes infinitely long and requires a forced shut down

Going back to kernel 6.0.2 fixes the issue. 

An interesting part of the journalctl is likely the following:

```
09:56:43 kernel: BUG: kernel NULL pointer dereference, address: 00000000000001c8
09:56:43 kernel: #PF: supervisor write access in kernel mode
09:56:43 kernel: #PF: error_code(0x0002) - not-present page
09:56:43 kernel: PGD 0 P4D 0
09:56:43 kernel: Oops: 0002 [#1] PREEMPT SMP NOPTI
09:56:43 kernel: CPU: 16 PID: 1419 Comm: rasdaemon Tainted: G           O       6.0.3-1-default #1 openSUSE Tumbleweed 50a6ebc5cb1873d6b9c639843cdd1ed0089a1281
09:56:43 kernel: Hardware name: System manufacturer System Product Name/ROG STRIX X570-E GAMING, BIOS 4204 02/24/2022
09:56:43 kernel: RIP: 0010:ring_buffer_wake_waiters+0x1c/0xa0
09:56:43 kernel: Code: 48 39 d0 73 ed 0f 0b eb e9 0f 1f 44 00 00 55 48 89 fd 53 48 63 de 83 fb ff 74 36 48 8b 47 40 48 8b 1c d8 48 81 c3 78 01 00 00 <48> 83 43 50 01 31 c9 31 d2 48 8d 7b 20 be 03 00 00 00 e8 cd af f3
09:56:43 kernel: RSP: 0018:ffffaa7a815a7e20 EFLAGS: 00010206
09:56:43 kernel: RAX: ffff908c434db500 RBX: 0000000000000178 RCX: 0000000000000010
09:56:43 kernel: RDX: ffff908c78ed8000 RSI: 0000000000000018 RDI: ffff908c434da900
09:56:43 kernel: RBP: ffff908c434da900 R08: ffff908c50b82e00 R09: ffff908c8206b200
09:56:43 kernel: R10: 0000000000000000 R11: 0000000000000001 R12: ffff908c8206b200
09:56:43 kernel: R13: ffff908c4387ef20 R14: ffff908c90fddbc0 R15: 0000000000000000
09:56:43 kernel: FS:  00007fd7463a6340(0000) GS:ffff90934ee00000(0000) knlGS:0000000000000000
09:56:43 kernel: CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
09:56:43 kernel: CR2: 00000000000001c8 CR3: 0000000105574000 CR4: 0000000000750ee0
09:56:43 kernel: PKRU: 55555554
09:56:43 kernel: Call Trace:
09:56:43 kernel:  <TASK>
09:56:43 kernel:  tracing_buffers_release+0x49/0x90
09:56:43 kernel:  __fput+0x91/0x250
09:56:43 kernel:  task_work_run+0x5c/0x90
09:56:43 kernel:  exit_to_user_mode_prepare+0x1cb/0x1f0
09:56:43 kernel:  syscall_exit_to_user_mode+0x17/0x40
09:56:43 kernel:  do_syscall_64+0x67/0x80
09:56:43 kernel:  ? syscall_exit_to_user_mode+0x17/0x40
09:56:43 kernel:  ? do_syscall_64+0x67/0x80
09:56:43 kernel:  ? do_syscall_64+0x67/0x80
09:56:43 kernel:  ? syscall_exit_to_user_mode+0x17/0x40
09:56:43 kernel:  ? do_syscall_64+0x67/0x80
09:56:43 kernel:  ? do_syscall_64+0x67/0x80
09:56:43 kernel:  ? do_syscall_64+0x67/0x80
09:56:43 kernel:  ? do_syscall_64+0x67/0x80
09:56:43 kernel:  ? do_syscall_64+0x67/0x80
09:56:43 kernel:  entry_SYSCALL_64_after_hwframe+0x63/0xcd
09:56:43 kernel: RIP: 0033:0x7fd74658e014
09:56:43 kernel: Code: 00 0f 1f 44 00 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 90 90 80 3d 8d 09 0f 00 00 74 13 b8 03 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 44 c3 0f 1f 00 48 83 ec 18 89 7c 24 0c e8 51
09:56:43 kernel: RSP: 002b:00007ffce5e64348 EFLAGS: 00000202 ORIG_RAX: 0000000000000003
09:56:43 kernel: RAX: 0000000000000000 RBX: 00007ffce5e64490 RCX: 00007fd74658e014
09:56:43 kernel: RDX: 0000000000000000 RSI: 00007ffce5e64540 RDI: 000000000000001d
09:56:43 kernel: RBP: 00007ffce5e65a10 R08: 000055939344e6c0 R09: 0000000000000000
09:56:43 kernel: R10: 0000000000000008 R11: 0000000000000202 R12: 0000000000000001
09:56:43 kernel: R13: 00007ffce5e644d8 R14: 000055939344e6c0 R15: 000055939344e6c0
09:56:43 kernel:  </TASK>
09:56:43 kernel: Modules linked in: amd64_edac(-) cmac algif_hash algif_skcipher af_alg vboxdrv(O) qrtr bnep dmi_sysfs wacom nls_iso8859_1 nls_cp437 vfat fat intel_rapl_msr iwlmvm intel_rapl_common asus_ec_sensors mac80211 libarc4 snd_hda_codec_realtek snd_hda_codec_generic btusb edac_mce_amd snd_hda_codec_hdmi btrtl snd_usb_audio btbcm snd_hda_intel btintel snd_intel_dspcfg btmtk snd_intel_sdw_acpi kvm_amd snd_hda_codec snd_usbmidi_lib iwlwifi bluetooth snd_rawmidi snd_hda_core joydev snd_seq_device kvm ecdh_generic eeepc_wmi snd_hwdep asus_wmi cfg80211 battery snd_pcm irqbypass ledtrig_audio sparse_keymap r8169 platform_profile snd_timer video pcspkr wmi_bmof efi_pstore mxm_wmi realtek snd igb k10temp i2c_piix4 mdio_devres soundcore libphy rfkill dca tiny_power_button button acpi_cpufreq fuse configfs ip_tables x_tables hid_generic usbhid amdgpu crct10dif_pclmul crc32_pclmul polyval_clmulni polyval_generic gf128mul xhci_pci xhci_pci_renesas drm_ttm_helper ttm xhci_hcd
09:56:43 kernel:  iommu_v2 gpu_sched ghash_clmulni_intel drm_buddy aesni_intel drm_display_helper nvme usbcore crypto_simd cryptd cec ccp nvme_core sp5100_tco rc_core wmi btrfs blake2b_generic libcrc32c crc32c_intel xor raid6_pq v4l2loopback(O) videodev mc sg br_netfilter bridge stp llc dm_multipath dm_mod scsi_dh_rdac scsi_dh_emc scsi_dh_alua msr efivarfs
09:56:43 kernel: CR2: 00000000000001c8
09:56:43 kernel: ---[ end trace 0000000000000000 ]---
09:56:43 kernel: RIP: 0010:ring_buffer_wake_waiters+0x1c/0xa0
09:56:43 kernel: Code: 48 39 d0 73 ed 0f 0b eb e9 0f 1f 44 00 00 55 48 89 fd 53 48 63 de 83 fb ff 74 36 48 8b 47 40 48 8b 1c d8 48 81 c3 78 01 00 00 <48> 83 43 50 01 31 c9 31 d2 48 8d 7b 20 be 03 00 00 00 e8 cd af f3
09:56:43 kernel: RSP: 0018:ffffaa7a815a7e20 EFLAGS: 00010206
09:56:43 kernel: RAX: ffff908c434db500 RBX: 0000000000000178 RCX: 0000000000000010
09:56:43 kernel: RDX: ffff908c78ed8000 RSI: 0000000000000018 RDI: ffff908c434da900
09:56:43 kernel: RBP: ffff908c434da900 R08: ffff908c50b82e00 R09: ffff908c8206b200
09:56:43 kernel: R10: 0000000000000000 R11: 0000000000000001 R12: ffff908c8206b200
09:56:43 kernel: R13: ffff908c4387ef20 R14: ffff908c90fddbc0 R15: 0000000000000000
09:56:43 kernel: FS:  00007fd7463a6340(0000) GS:ffff90934ee00000(0000) knlGS:0000000000000000
09:56:43 kernel: CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
09:56:43 kernel: CR2: 00000000000001c8 CR3: 0000000105574000 CR4: 0000000000750ee0
09:56:43 kernel: PKRU: 55555554
```



SOFTWARE/OS VERSIONS
Operating System: openSUSE Tumbleweed 20221023
KDE Plasma Version: 5.26.1
KDE Frameworks Version: 5.99.0
Qt Version: 5.15.6
Kernel Version: 6.0.2-1-default (64-bit) / 6.0.3-1-default (64-bit)
Graphics Platform: Wayland
Graphics Processor: AMD Radeon RX 580 Series
Comment 1 Alex Debus 2022-10-25 11:30:10 UTC
Since I could not attach a txt file here (for some technical reasons), I have pasted the content of the journalctl log in [1].

[1] https://paste.opensuse.org/60ae1b9c
Comment 2 Alex Debus 2022-10-25 11:48:27 UTC
And the corresponding dmesg [2]

[2] https://paste.opensuse.org/d9fa4931
Comment 3 Takashi Iwai 2022-10-26 14:39:55 UTC
Could you check whether the same bug is triggered with 6.1-rc kernel in OBS Kernel:HEAD?
Comment 4 Takashi Iwai 2022-10-26 14:45:49 UTC
Also, I'm building a test kernel with a suspected patch reverted.  It's being build in OBS home:tiwai:bsc1204705 repo.  Once after the build finishes, could you give it a try, too?
Comment 5 Alex Debus 2022-10-26 15:09:15 UTC
(In reply to Takashi Iwai from comment #3)
> Could you check whether the same bug is triggered with 6.1-rc kernel in OBS
> Kernel:HEAD?

The issue persists with 6.1.0-rc2-1.g796d87f-default

```
7:01:00 kernel: BUG: kernel NULL pointer dereference, address: 00000000000001c8
17:01:00 kernel: #PF: supervisor write access in kernel mode
17:01:00 kernel: #PF: error_code(0x0002) - not-present page
17:01:00 kernel: PGD 0 P4D 0 
17:01:00 kernel: Oops: 0002 [#1] PREEMPT SMP NOPTI
17:01:00 kernel: CPU: 1 PID: 1439 Comm: rasdaemon Not tainted 6.1.0-rc2-1.g796d87f-default #1 openSUSE Tumbleweed (unreleased) 2a6c86ca26b919960b25f42a93c747e865d741cd
17:01:00 kernel: Hardware name: System manufacturer System Product Name/ROG STRIX X570-E GAMING, BIOS 4204 02/24/2022
17:01:00 kernel: RIP: 0010:ring_buffer_wake_waiters+0x1c/0xa0
17:01:00 kernel: Code: 48 39 d0 73 ed 0f 0b eb e9 0f 1f 44 00 00 55 53 48 89 fb 83 fe ff 74 39 48 8b 47 40 48 63 f6 48 8b 1c f0 48 81 c3 78 01 00 00 <48> 83 43 50 01 31 c9 31 d2 48 8d 7b 20 be 03 00 00 00 e8 bd a7 f3
17:01:00 kernel: RSP: 0018:ffffaf16c140fe70 EFLAGS: 00010206
17:01:00 kernel: RAX: ffff9a22c45d6a00 RBX: 0000000000000178 RCX: 0000000000000001
17:01:00 kernel: RDX: ffff9a22c4d54000 RSI: 0000000000000018 RDI: ffff9a22c45d7d00
17:01:00 kernel: RBP: 00000000000a8001 R08: ffff9a22c9c30e40 R09: ffff9a23128df980
17:01:00 kernel: R10: 0000000000000000 R11: 0000000000000001 R12: ffff9a23128df980
17:01:00 kernel: R13: ffff9a22e38932e0 R14: ffff9a231284ee40 R15: 0000000000000000
17:01:00 kernel: FS:  00007fbe25c5b340(0000) GS:ffff9a29cea40000(0000) knlGS:0000000000000000
17:01:00 kernel: CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
17:01:00 kernel: CR2: 00000000000001c8 CR3: 000000010501e000 CR4: 0000000000750ee0
17:01:00 kernel: PKRU: 55555554
17:01:00 kernel: Call Trace:
17:01:00 kernel:  <TASK>
17:01:00 kernel:  tracing_buffers_release+0x49/0x90
17:01:00 kernel:  __fput+0x91/0x250
17:01:00 kernel:  task_work_run+0x59/0x90
17:01:00 kernel:  exit_to_user_mode_prepare+0x1cb/0x1f0
17:01:00 kernel:  syscall_exit_to_user_mode+0x17/0x40
17:01:00 kernel:  do_syscall_64+0x67/0x80
17:01:00 kernel:  ? syscall_exit_to_user_mode+0x17/0x40
17:01:00 kernel:  ? do_syscall_64+0x67/0x80
17:01:00 kernel:  entry_SYSCALL_64_after_hwframe+0x63/0xcd
17:01:00 kernel: RIP: 0033:0x7fbe25e43014
17:01:00 kernel: Code: 00 0f 1f 44 00 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 90 90 80 3d 8d 09 0f 00 00 74 13 b8 03 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 44 c3 0f 1f 00 48 83 ec 18 89 7c 24 0c e8 51
17:01:00 kernel: RSP: 002b:00007ffda7a81408 EFLAGS: 00000202 ORIG_RAX: 0000000000000003
17:01:00 kernel: RAX: 0000000000000000 RBX: 00007ffda7a81550 RCX: 00007fbe25e43014
17:01:00 kernel: RDX: 0000000000000000 RSI: 00007ffda7a81600 RDI: 000000000000001d
17:01:00 kernel: RBP: 00007ffda7a82ad0 R08: 000055ffa06b86c0 R09: 0000000000000000
17:01:00 kernel: R10: 0000000000000008 R11: 0000000000000202 R12: 0000000000000001
17:01:00 kernel: R13: 00007ffda7a81598 R14: 000055ffa06b86c0 R15: 000055ffa06b86c0
17:01:00 kernel:  </TASK>
17:01:00 kernel: Modules linked in: amd64_edac(-) dmi_sysfs pcc_cpufreq(-) iwlmvm btusb mac80211 btrtl btbcm btintel btmtk libarc4 wacom bluetooth snd_usb_audio snd_usbmidi_lib intel_rapl_msr snd_rawmidi r8169 snd_seq_device realtek mc ecdh_generic iwlwifi igb mdio_devres cfg80211 libphy dca nls_iso8859_1 nls_cp437 intel_rapl_common vfat fat snd_hda_codec_realtek snd_hda_codec_generic asus_ec_sensors snd_hda_codec_hdmi snd_hda_intel snd_intel_dspcfg edac_mce_amd snd_intel_sdw_acpi snd_hda_codec kvm_amd eeepc_wmi joydev snd_hda_core asus_wmi snd_hwdep kvm irqbypass battery snd_pcm ledtrig_audio sparse_keymap platform_profile rfkill pcspkr efi_pstore snd_timer wmi_bmof mxm_wmi k10temp i2c_piix4 snd soundcore tiny_power_button button acpi_cpufreq fuse configfs ip_tables x_tables hid_generic usbhid amdgpu crct10dif_pclmul crc32_pclmul polyval_clmulni polyval_generic gf128mul xhci_pci xhci_pci_renesas drm_ttm_helper ttm xhci_hcd video iommu_v2 ghash_clmulni_intel gpu_sched
17:01:00 kernel:  sha512_ssse3 drm_buddy drm_display_helper aesni_intel cec nvme crypto_simd cryptd usbcore ccp rc_core sp5100_tco nvme_core wmi btrfs blake2b_generic libcrc32c crc32c_intel xor raid6_pq sg br_netfilter bridge stp llc dm_multipath dm_mod scsi_dh_rdac scsi_dh_emc scsi_dh_alua msr efivarfs
17:01:00 kernel: CR2: 00000000000001c8
17:01:00 kernel: ---[ end trace 0000000000000000 ]---
17:01:00 kernel: RIP: 0010:ring_buffer_wake_waiters+0x1c/0xa0
17:01:00 kernel: Code: 48 39 d0 73 ed 0f 0b eb e9 0f 1f 44 00 00 55 53 48 89 fb 83 fe ff 74 39 48 8b 47 40 48 63 f6 48 8b 1c f0 48 81 c3 78 01 00 00 <48> 83 43 50 01 31 c9 31 d2 48 8d 7b 20 be 03 00 00 00 e8 bd a7 f3
17:01:00 kernel: RSP: 0018:ffffaf16c140fe70 EFLAGS: 00010206
17:01:00 kernel: RAX: ffff9a22c45d6a00 RBX: 0000000000000178 RCX: 0000000000000001
17:01:00 kernel: RDX: ffff9a22c4d54000 RSI: 0000000000000018 RDI: ffff9a22c45d7d00
17:01:00 kernel: RBP: 00000000000a8001 R08: ffff9a22c9c30e40 R09: ffff9a23128df980
17:01:00 kernel: R10: 0000000000000000 R11: 0000000000000001 R12: ffff9a23128df980
17:01:00 kernel: R13: ffff9a22e38932e0 R14: ffff9a231284ee40 R15: 0000000000000000
17:01:00 kernel: FS:  00007fbe25c5b340(0000) GS:ffff9a29cea40000(0000) knlGS:0000000000000000
17:01:00 kernel: CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
17:01:00 kernel: CR2: 00000000000001c8 CR3: 000000010501e000 CR4: 0000000000750ee0
17:01:00 kernel: PKRU: 55555554
```
Comment 6 Alex Debus 2022-10-26 15:15:34 UTC
(In reply to Takashi Iwai from comment #4)
> Also, I'm building a test kernel with a suspected patch reverted.  It's
> being build in OBS home:tiwai:bsc1204705 repo.  Once after the build
> finishes, could you give it a try, too?

I will give it a try, but it looks like the latest build failed.
Comment 7 Takashi Iwai 2022-10-26 15:42:34 UTC
My bad.  Now refreshed and triggered the rebuild.  Let's cross fingers.
Comment 8 Takashi Iwai 2022-10-26 15:45:53 UTC
BTW, the problem of uploading attachments on bugzilla should have been fixed now.  Could you upload the dmesg from 6.1-rc kernel to Bugzilla?
Comment 9 Alex Debus 2022-10-26 16:08:45 UTC
Created attachment 862454 [details]
dmesg for kernel 6.1.0-rc2-1.g796d87f-default
Comment 10 Alex Debus 2022-10-26 16:11:35 UTC
Created attachment 862455 [details]
dmesg for kernel 6.1.0-rc2-1.g796d87f-default
Comment 11 Alex Debus 2022-10-27 10:09:56 UTC
(In reply to Takashi Iwai from comment #7)
> My bad.  Now refreshed and triggered the rebuild.  Let's cross fingers.

Looks like it failed again. :-( Could you please also post your patch here? Thank you!
Comment 12 Takashi Iwai 2022-10-27 11:08:14 UTC
Please give the dmesg output.  My test kernel was just dropping two patches:
  patches.kernel.org/6.0.3-159-tracing-Wake-up-ring-buffer-waiters-on-closing-.patch
  patches.kernel.org/6.0.3-160-tracing-Wake-up-waiters-when-tracing-is-disable.patch

I guess the best is to do git bisect in your side between 6.0.2 and 6.0.3 kernels.
Comment 13 Alex Debus 2022-10-27 11:30:53 UTC
(In reply to Takashi Iwai from comment #12)
> Please give the dmesg output.

Please see comment 10 or is this not the one you are looking for?

> I guess the best is to do git bisect in your side between 6.0.2 and 6.0.3 kernels.

I will give it a try!
Comment 14 Takashi Iwai 2022-10-27 13:07:39 UTC
(In reply to Alex Debus from comment #13)
> (In reply to Takashi Iwai from comment #12)
> > Please give the dmesg output.
> 
> Please see comment 10 or is this not the one you are looking for?

I asked the result with my test kernel mentioned in comment 4.
Comment 15 Alex Debus 2022-10-30 13:26:33 UTC
Created attachment 862547 [details]
diff between 6.0.3 and the working patched kernel

(In reply to Takashi Iwai from comment #12)
> My test kernel was just dropping two patches:
>  
> patches.kernel.org/6.0.3-159-tracing-Wake-up-ring-buffer-waiters-on-closing-.
> patch

You already had hit the nail!

> I guess the best is to do git bisect in your side between 6.0.2 and 6.0.3
> kernels.

I have bisected the 6.0.3 branch and found that commit `f3ddb74ad0790030c9592229fb14d8c451f4e9a8` is faulty.
To verify it, I have checked out v6.0.3, applied the attached diff, which basically reverts the commit, built and booted it and it simply works. :)
Comment 16 Alex Debus 2022-10-30 13:30:18 UTC
Created attachment 862548 [details]
dmesg for working patched kernel
Comment 17 Alex Debus 2022-10-30 15:17:51 UTC
Created attachment 862549 [details]
diff between v6.0.5 and the working patched kernel

I have applied the same procedure the v6.0.5 branch. Please see the diff.
Comment 18 Alex Debus 2022-10-30 15:18:46 UTC
Created attachment 862550 [details]
dmesg for kernel 6.0.5 (w/o the patch)
Comment 19 Alex Debus 2022-10-30 15:19:01 UTC
Created attachment 862551 [details]
dmesg for kernel 6.0.5 (with the patch)
Comment 20 Alex Debus 2022-10-30 15:54:04 UTC
Created attachment 862552 [details]
diff between v6.1.0-rc2 and the working patched kernel

Also reverted the changes for kernel 6.1.0-rc2, which now boots fine again. Please see the diff.
Comment 21 Alex Debus 2022-10-30 15:54:51 UTC
Created attachment 862553 [details]
dmesg for kernel 6.1.0-rc2 (w/o the patch)
Comment 22 Alex Debus 2022-10-30 15:55:12 UTC
Created attachment 862554 [details]
dmesg for kernel 6.1.0-rc2 (with the patch)
Comment 23 Takashi Iwai 2022-10-31 07:13:33 UTC
Thanks!  I reported it to the upstream dev now.
  https://lore.kernel.org/87h6zklb6n.wl-tiwai@suse.de
Comment 24 Takashi Iwai 2022-11-01 08:14:03 UTC
Steven asked whether the following change would work around the crash:

--- a/kernel/trace/ring_buffer.c
+++ b/kernel/trace/ring_buffer.c
@@ -937,6 +937,9 @@ void ring_buffer_wake_waiters(struct trace_buffer *buffer, int cpu)
 	struct ring_buffer_per_cpu *cpu_buffer;
 	struct rb_irq_work *rbwork;
 
+	if (!buffer)
+		return;
+
 	if (cpu == RING_BUFFER_ALL_CPUS) {
 
 		/* Wake up individual ones too. One level recursion */


Could you try it quickly on your built kernel?

Meanwhile, I've updated the kernel to 6.0.6 in OBS home:tiwai:bsc1204705 with this patch (instead of the revert):
  http://download.opensuse.org/repositories/home:/tiwai:/bsc1204705/standard/

There was already a negative result in the upstream thread above, but we should double-check.  Thanks!
Comment 25 Takashi Iwai 2022-11-01 08:16:06 UTC
Ah, now I realized that it was you who posted the test result, so scratch my previous request ;)  It's good that you joined in the thread.  Then let's continue to track there.
Comment 26 Takashi Iwai 2022-11-02 07:15:34 UTC
Steven submitted the fix patch to the upstream
  https://lore.kernel.org/r/20221101191009.1e7378c8@rorschach.local.home

I backported it to stable branch now.  A test kernel in OBS home:tiwai:bsc1204705 was built with this patch.  You can test with it, too.
Comment 27 Alex Debus 2022-11-02 17:53:10 UTC
(In reply to Takashi Iwai from comment #26)
> Steven submitted the fix patch to the upstream
>   https://lore.kernel.org/r/20221101191009.1e7378c8@rorschach.local.home


Thank you. I have tested the patch and verified that it resolves the issue!
Just note Steve's comment in [1] regarding the dmsg log [2]

> Yes that's known too. rasdaemon needs to be updated to use the
libtracefs library, which should fix all this.


[1] https://lore.kernel.org/all/20221102123922.790e72bd@rorschach.local.home/
[2] https://paste.opensuse.org/e8d4fa46
Comment 32 Alex Debus 2022-11-15 12:19:24 UTC
Fixed with Kernel 6.0.8+
Comment 33 Swamp Workflow Management 2022-11-15 20:27:16 UTC
SUSE-SU-2022:3998-1: An update that solves 37 vulnerabilities, contains 25 features and has 38 fixes is now available.

Category: security (important)
Bug References: 1065729,1071995,1152472,1152489,1188238,1194869,1196018,1196632,1199904,1200567,1200692,1200788,1202187,1202686,1202700,1202914,1203098,1203229,1203290,1203435,1203514,1203699,1203701,1203767,1203770,1203802,1203922,1203979,1204017,1204051,1204059,1204060,1204125,1204142,1204166,1204168,1204171,1204241,1204353,1204354,1204355,1204402,1204413,1204415,1204417,1204428,1204431,1204439,1204470,1204479,1204498,1204533,1204569,1204574,1204575,1204619,1204635,1204637,1204646,1204647,1204650,1204653,1204693,1204705,1204719,1204728,1204753,1204868,1204926,1204933,1204934,1204947,1204957,1204963,1204970
CVE References: CVE-2022-1882,CVE-2022-2153,CVE-2022-28748,CVE-2022-2964,CVE-2022-2978,CVE-2022-3169,CVE-2022-33981,CVE-2022-3424,CVE-2022-3435,CVE-2022-3521,CVE-2022-3524,CVE-2022-3526,CVE-2022-3535,CVE-2022-3542,CVE-2022-3545,CVE-2022-3565,CVE-2022-3577,CVE-2022-3586,CVE-2022-3594,CVE-2022-3619,CVE-2022-3621,CVE-2022-3625,CVE-2022-3628,CVE-2022-3629,CVE-2022-3633,CVE-2022-3640,CVE-2022-3646,CVE-2022-3649,CVE-2022-40476,CVE-2022-40768,CVE-2022-41674,CVE-2022-42703,CVE-2022-42719,CVE-2022-42720,CVE-2022-42721,CVE-2022-42722,CVE-2022-43750
JIRA References: PED-1082,PED-1084,PED-1085,PED-1096,PED-1211,PED-1649,PED-634,PED-676,PED-678,PED-679,PED-707,PED-732,PED-813,PED-817,PED-822,PED-825,PED-833,PED-842,PED-846,PED-850,PED-851,PED-856,PED-857,SLE-13847,SLE-9246
Sources used:
openSUSE Leap 15.4 (src):    kernel-azure-5.14.21-150400.14.21.2, kernel-source-azure-5.14.21-150400.14.21.1, kernel-syms-azure-5.14.21-150400.14.21.1
SUSE Linux Enterprise Module for Public Cloud 15-SP4 (src):    kernel-azure-5.14.21-150400.14.21.2, kernel-source-azure-5.14.21-150400.14.21.1, kernel-syms-azure-5.14.21-150400.14.21.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 34 Swamp Workflow Management 2022-11-18 17:31:07 UTC
SUSE-SU-2022:4072-1: An update that solves 32 vulnerabilities, contains 25 features and has 36 fixes is now available.

Category: security (important)
Bug References: 1065729,1071995,1152472,1152489,1188238,1194869,1196018,1196632,1199904,1200567,1200692,1200788,1202187,1202686,1202700,1202914,1203098,1203229,1203290,1203435,1203514,1203699,1203767,1203802,1203922,1204017,1204142,1204166,1204168,1204171,1204241,1204353,1204354,1204355,1204402,1204413,1204415,1204417,1204428,1204431,1204439,1204470,1204479,1204498,1204533,1204569,1204574,1204575,1204619,1204635,1204637,1204646,1204647,1204650,1204653,1204693,1204705,1204719,1204728,1204753,1204868,1204926,1204933,1204934,1204947,1204957,1204963,1204970
CVE References: CVE-2022-1882,CVE-2022-2153,CVE-2022-28748,CVE-2022-2964,CVE-2022-2978,CVE-2022-3169,CVE-2022-33981,CVE-2022-3424,CVE-2022-3435,CVE-2022-3521,CVE-2022-3524,CVE-2022-3526,CVE-2022-3535,CVE-2022-3542,CVE-2022-3545,CVE-2022-3565,CVE-2022-3577,CVE-2022-3586,CVE-2022-3594,CVE-2022-3619,CVE-2022-3621,CVE-2022-3625,CVE-2022-3628,CVE-2022-3629,CVE-2022-3633,CVE-2022-3640,CVE-2022-3646,CVE-2022-3649,CVE-2022-40476,CVE-2022-40768,CVE-2022-42703,CVE-2022-43750
JIRA References: PED-1082,PED-1084,PED-1085,PED-1096,PED-1211,PED-1649,PED-634,PED-676,PED-678,PED-679,PED-707,PED-732,PED-813,PED-817,PED-822,PED-825,PED-833,PED-842,PED-846,PED-850,PED-851,PED-856,PED-857,SLE-13847,SLE-9246
Sources used:
openSUSE Leap 15.4 (src):    dtb-aarch64-5.14.21-150400.24.33.1, kernel-64kb-5.14.21-150400.24.33.2, kernel-debug-5.14.21-150400.24.33.2, kernel-default-5.14.21-150400.24.33.2, kernel-default-base-5.14.21-150400.24.33.2.150400.24.11.4, kernel-docs-5.14.21-150400.24.33.2, kernel-kvmsmall-5.14.21-150400.24.33.2, kernel-obs-build-5.14.21-150400.24.33.1, kernel-obs-qa-5.14.21-150400.24.33.1, kernel-source-5.14.21-150400.24.33.1, kernel-syms-5.14.21-150400.24.33.1, kernel-zfcpdump-5.14.21-150400.24.33.2
SUSE Linux Enterprise Workstation Extension 15-SP4 (src):    kernel-default-5.14.21-150400.24.33.2
SUSE Linux Enterprise Module for Live Patching 15-SP4 (src):    kernel-default-5.14.21-150400.24.33.2, kernel-livepatch-SLE15-SP4_Update_5-1-150400.9.3.4
SUSE Linux Enterprise Module for Legacy Software 15-SP4 (src):    kernel-default-5.14.21-150400.24.33.2
SUSE Linux Enterprise Module for Development Tools 15-SP4 (src):    kernel-docs-5.14.21-150400.24.33.2, kernel-obs-build-5.14.21-150400.24.33.1, kernel-source-5.14.21-150400.24.33.1, kernel-syms-5.14.21-150400.24.33.1
SUSE Linux Enterprise Module for Basesystem 15-SP4 (src):    kernel-64kb-5.14.21-150400.24.33.2, kernel-default-5.14.21-150400.24.33.2, kernel-default-base-5.14.21-150400.24.33.2.150400.24.11.4, kernel-source-5.14.21-150400.24.33.1, kernel-zfcpdump-5.14.21-150400.24.33.2
SUSE Linux Enterprise Micro 5.3 (src):    kernel-default-5.14.21-150400.24.33.2, kernel-default-base-5.14.21-150400.24.33.2.150400.24.11.4
SUSE Linux Enterprise High Availability 15-SP4 (src):    kernel-default-5.14.21-150400.24.33.2

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 40 Swamp Workflow Management 2022-12-23 15:24:39 UTC
SUSE-SU-2022:4617-1: An update that solves 96 vulnerabilities, contains 50 features and has 246 fixes is now available.

Category: security (important)
Bug References: 1023051,1032323,1065729,1071995,1152472,1152489,1156395,1164051,1177471,1184350,1185032,1188238,1189297,1189999,1190256,1190497,1190969,1192968,1193629,1194023,1194592,1194869,1194904,1195480,1195917,1196018,1196444,1196616,1196632,1196867,1196869,1197158,1197391,1197659,1197755,1197756,1197757,1197763,1198189,1198410,1198577,1198702,1198971,1199086,1199364,1199515,1199670,1199904,1200015,1200058,1200268,1200288,1200301,1200313,1200431,1200465,1200494,1200544,1200567,1200622,1200644,1200651,1200692,1200788,1200845,1200868,1200869,1200870,1200871,1200872,1200873,1201019,1201308,1201309,1201310,1201361,1201427,1201442,1201455,1201489,1201610,1201675,1201725,1201726,1201768,1201865,1201940,1201941,1201948,1201954,1201956,1201958,1202095,1202096,1202097,1202113,1202131,1202154,1202187,1202262,1202265,1202312,1202341,1202346,1202347,1202385,1202393,1202447,1202471,1202558,1202623,1202636,1202672,1202681,1202685,1202686,1202700,1202710,1202711,1202712,1202713,1202715,1202716,1202757,1202758,1202759,1202761,1202762,1202763,1202764,1202765,1202766,1202767,1202768,1202769,1202770,1202771,1202773,1202774,1202775,1202776,1202778,1202779,1202780,1202781,1202782,1202783,1202822,1202823,1202824,1202860,1202867,1202872,1202874,1202898,1202914,1202960,1202989,1202992,1202993,1203002,1203008,1203036,1203039,1203041,1203063,1203066,1203067,1203098,1203101,1203107,1203116,1203117,1203138,1203139,1203159,1203183,1203197,1203208,1203229,1203263,1203290,1203338,1203360,1203361,1203389,1203391,1203410,1203435,1203505,1203511,1203514,1203552,1203606,1203664,1203693,1203699,1203767,1203769,1203770,1203794,1203798,1203802,1203829,1203893,1203902,1203906,1203908,1203922,1203935,1203939,1203960,1203969,1203987,1203992,1203994,1204017,1204051,1204059,1204060,1204092,1204125,1204132,1204142,1204166,1204168,1204170,1204171,1204183,1204228,1204241,1204289,1204290,1204291,1204292,1204353,1204354,1204355,1204402,1204405,1204413,1204414,1204415,1204417,1204424,1204428,1204431,1204432,1204439,1204470,1204479,1204486,1204498,1204533,1204569,1204574,1204575,1204576,1204619,1204624,1204631,1204635,1204636,1204637,1204646,1204647,1204650,1204653,1204693,1204705,1204719,1204728,1204745,1204753,1204780,1204810,1204850,1204868,1204926,1204933,1204934,1204947,1204957,1204963,1204970,1205007,1205100,1205111,1205113,1205128,1205130,1205149,1205153,1205220,1205257,1205264,1205282,1205313,1205331,1205332,1205427,1205428,1205473,1205496,1205507,1205514,1205521,1205567,1205616,1205617,1205653,1205671,1205679,1205683,1205700,1205705,1205709,1205711,1205744,1205764,1205796,1205882,1205993,1206035,1206036,1206037,1206045,1206046,1206047,1206048,1206049,1206050,1206051,1206056,1206057,1206113,1206114,1206147,1206149,1206207,1206273,1206391
CVE References: CVE-2016-3695,CVE-2020-16119,CVE-2020-36516,CVE-2021-33135,CVE-2021-4037,CVE-2022-1184,CVE-2022-1263,CVE-2022-1882,CVE-2022-20368,CVE-2022-20369,CVE-2022-2153,CVE-2022-2586,CVE-2022-2588,CVE-2022-2602,CVE-2022-26373,CVE-2022-2639,CVE-2022-2663,CVE-2022-28356,CVE-2022-28693,CVE-2022-2873,CVE-2022-28748,CVE-2022-2905,CVE-2022-2938,CVE-2022-2959,CVE-2022-2964,CVE-2022-2977,CVE-2022-2978,CVE-2022-3028,CVE-2022-3078,CVE-2022-3114,CVE-2022-3169,CVE-2022-3176,CVE-2022-3202,CVE-2022-32250,CVE-2022-32296,CVE-2022-3239,CVE-2022-3303,CVE-2022-33981,CVE-2022-3424,CVE-2022-3435,CVE-2022-3521,CVE-2022-3524,CVE-2022-3526,CVE-2022-3535,CVE-2022-3542,CVE-2022-3545,CVE-2022-3565,CVE-2022-3566,CVE-2022-3567,CVE-2022-3577,CVE-2022-3586,CVE-2022-3594,CVE-2022-3619,CVE-2022-3621,CVE-2022-3625,CVE-2022-3628,CVE-2022-3629,CVE-2022-3633,CVE-2022-3635,CVE-2022-3640,CVE-2022-3643,CVE-2022-3646,CVE-2022-3649,CVE-2022-36879,CVE-2022-36946,CVE-2022-3707,CVE-2022-3903,CVE-2022-39188,CVE-2022-39189,CVE-2022-39190,CVE-2022-40476,CVE-2022-40768,CVE-2022-4095,CVE-2022-41218,CVE-2022-4129,CVE-2022-4139,CVE-2022-41674,CVE-2022-41848,CVE-2022-41849,CVE-2022-41850,CVE-2022-41858,CVE-2022-42328,CVE-2022-42329,CVE-2022-42703,CVE-2022-42719,CVE-2022-42720,CVE-2022-42721,CVE-2022-42722,CVE-2022-42895,CVE-2022-42896,CVE-2022-43750,CVE-2022-4378,CVE-2022-43945,CVE-2022-45869,CVE-2022-45888,CVE-2022-45934
JIRA References: PED-1082,PED-1084,PED-1085,PED-1096,PED-1211,PED-1573,PED-1649,PED-1706,PED-1936,PED-2684,PED-387,PED-529,PED-611,PED-634,PED-652,PED-664,PED-676,PED-678,PED-679,PED-682,PED-688,PED-707,PED-720,PED-729,PED-732,PED-755,PED-763,PED-813,PED-817,PED-822,PED-824,PED-825,PED-833,PED-842,PED-846,PED-849,PED-850,PED-851,PED-856,PED-857,SLE-13847,SLE-18130,SLE-19359,SLE-19924,SLE-20183,SLE-23766,SLE-24572,SLE-24682,SLE-24814,SLE-9246
Sources used:
openSUSE Leap Micro 5.3 (src):    kernel-rt-5.14.21-150400.15.5.1
openSUSE Leap 15.4 (src):    kernel-rt-5.14.21-150400.15.5.1, kernel-rt_debug-5.14.21-150400.15.5.1, kernel-source-rt-5.14.21-150400.15.5.1, kernel-syms-rt-5.14.21-150400.15.5.1
SUSE Linux Enterprise Module for Realtime 15-SP4 (src):    kernel-rt-5.14.21-150400.15.5.1, kernel-rt_debug-5.14.21-150400.15.5.1, kernel-source-rt-5.14.21-150400.15.5.1, kernel-syms-rt-5.14.21-150400.15.5.1
SUSE Linux Enterprise Module for Live Patching 15-SP4 (src):    kernel-livepatch-SLE15-SP4-RT_Update_1-1-150400.1.3.1
SUSE Linux Enterprise Micro 5.3 (src):    kernel-rt-5.14.21-150400.15.5.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.