|
Bugzilla – Full Text Bug Listing |
| Summary: | Displays Crash After Logging Into System | ||
|---|---|---|---|
| Product: | [openSUSE] PUBLIC SUSE Linux Enterprise Desktop 15 SP4 | Reporter: | Tim Barber <tim> |
| Component: | Kernel | Assignee: | Kernel Bugs <kernel-bugs> |
| Status: | RESOLVED FIXED | QA Contact: | |
| Severity: | Major | ||
| Priority: | P5 - None | CC: | derekhtodd, jwiesner, tim, tiwai |
| Version: | SLES15SP4-MaintUpd | ||
| Target Milestone: | --- | ||
| Hardware: | x86-64 | ||
| OS: | openSUSE Leap 15.4 | ||
| See Also: | https://bugzilla.opensuse.org/show_bug.cgi?id=1213777 | ||
| Whiteboard: | |||
| Found By: | --- | Services Priority: | |
| Business Priority: | Blocker: | --- | |
| Marketing QA Status: | --- | IT Deployment: | --- |
| Attachments: |
dmesg output
hwinfo output |
||
|
Description
Tim Barber
2023-07-14 00:17:11 UTC
Ran the inxi command with the good kernel to give better hardware/software setup:
System: Kernel: 5.14.21-150400.24.66-default x86_64 bits: 64 compiler: gcc v: 7.5.0
parameters: BOOT_IMAGE=/boot/vmlinuz-5.14.21-150400.24.66-default root=UUID=b8ed1fe8-6d85-4e7e-8e54-5446a967373e
showopts quiet mitigations=off
Desktop: KDE Plasma 5.24.4 tk: Qt 5.15.2 wm: kwin_wayland vt: 2 dm: SDDM Distro: openSUSE Leap 15.4
Graphics: Device-1: Advanced Micro Devices [AMD/ATI] Wani [Radeon R5/R6/R7 Graphics] driver: amdgpu v: kernel bus-ID: 00:01.0
chip-ID: 1002:9874 class-ID: 0300
Device-2: Logitech HD Pro Webcam C920 type: USB driver: snd-usb-audio,uvcvideo bus-ID: 2-4:5 chip-ID: 046d:082d
class-ID: 0102 serial: <filter>
Display: wayland server: SUSE LINUX 1.20.3 compositor: kwin_wayland driver: loaded: amdgpu,ati
unloaded: fbdev,modesetting,vesa display-ID: :1 screens: 1
Screen-1: 0 s-res: 3840x1080 s-dpi: 96 s-size: 1016x286mm (40.0x11.3") s-diag: 1055mm (41.6")
Monitor-1: XWAYLAND0 res: 1920x1080 hz: 60 dpi: 92 size: 530x300mm (20.9x11.8") diag: 609mm (24")
Monitor-2: XWAYLAND1 res: 1920x1080 hz: 60 dpi: 92 size: 530x300mm (20.9x11.8") diag: 609mm (24")
OpenGL: renderer: AMD CARRIZO (DRM 3.42.0 5.14.21-150400.24.66-default LLVM 11.0.1) v: 4.6 Mesa 21.2.4
direct render: Yes
I looked over the output of dmesg with the .69 kernel, and I am not seeing any errors to my untrained eye.
If it's a problem of AMDGPU driver, you can try to take the old good-working kernel module onto the new kernel, e.g. % mkdir /lib/modules/5.14.21-150400.25.69/updates % cp /lib/modules/5.14.21-150400.25.66-default/kernel/drivers/gpu/drm/amd/amdgpu.ko.zst /lib/modules/5.14.21-150400.25.69-default/updates/ % depmod 5.14.21-150400.25.69-default % dracut -f --kver 5.14.21-150400.25.69-default Then retest. Performed the above, and I am still experiencing the same issue where the display server is crashing and leaving one screen fully green and the second blank. I just looked over the files in my /boot directory, and no files were changed from the above actions. Should something have changed? Did I do something incorrectly? Did some investigation here and noticed that there was a file in the directory where I ran the dracut command named kver. I also noticed that the size of the file is approximately the same size (off by a few hundred bytes or so) as the initrd files in /boot. I took a stab and renamed the kver file to /boot/initrd-5.14.21-150400.24.69-default and rebooted. The results were the display server does not crash and I have a working desktop in both KDE Wayland & X11. OK, so it means that replacing the amdgpu from the older kernel worked? Then please give the dmesg output and the hwinfo output. Attach them to Bugzilla. The next thing is to check whether the problem happens with the build from the very latest SLE15-SP4 kernel git branch. The kernel package is found in OBS Kernel:SLE15-SP4 repo: http://download.opensuse.org/repositories/Kernel:/SLE15-SP4/pool/ Download kernel-default.rpm, kernel-default-extra.rpm and kernel-default-optional.rpm and install them via "zypper install". You might need to pass --oldpackage option. Ignore the warnings about keys, etc. Note that it's an unofficial build, hence you need to turn off Secure Boot. Created attachment 868332 [details]
dmesg output
Output of dmesg with the offending amdgpu driver.
Created attachment 868333 [details]
hwinfo output
Attached is the output from hwinfo with the offending amdgpu driver loaded.
Before I attempt to load the latest kernel rpm's, how can I make changes to guarantee that I don't loose access to the .66 kernel? Asking because this is my primary workstation that I must be able to use during the day. You can add "lock" by zypper, e.g. something like: zypper addlock kernel-default-5.14.21-150400.25.66 The lock can be removed by zypper removelock $PKG-$VERSION, too. In addition, try to increase the number of installable kernels by editing /etc/zypp/zypp.conf. Modify the line defining multiversion.kernels to put more entries, e.g. multiversion.kernels = latest,latest-1,latest-2,latest-3,running Supposing that the latest SLE15-SP4 kernel still causes the problem, I built a few test kernels for performing a la bisect. Once after confirming that the latest SLE15-SP4 kernel is broken, try to test another one in OBS home:tiwai:bsc1213304-1 repo: http://download.opensuse.org/repositories/home:/tiwai:/bsc1213304-1/pool/ If this one *works*: - Try another one in OBS home:tiwai:bsc1213304-2 repo: http://download.opensuse.org/repositories/home:/tiwai:/bsc1213304-2/pool/ Or if *-1 kernel failed: - Try the kernel in OBS home:tiwai:bsc1213304-3 repo: http://download.opensuse.org/repositories/home:/tiwai:/bsc1213304-3/pool/ My apologizes for not letting you know that I was going to be on vacation for a week. I will try to get to this ASAP. Hello, Tim. I can reproduce the issue on my desktop machine at home. I have already run tests with the kernels in comment 11, see bug 1213777 comment 3 for the results. It will hopefully allow us to identify the problematic commit soon. Hi Jiri, My apologizes for not getting to this sooner, but I was pulled out of the country on work so I haven't been by my workstation to work through the test kernels. The issue Jiri faced was already fixed in the latest SLE15-SP4 git branch, and the fix will be likely included in the next update in August. So, please check the latest OBS Kernel:SLE15-SP4 kernel (or the update in August) once when you have time. I hope it's the same issue and should be fixed there. My apologizes, but I still have not had the opportunity to test this. My client has requested further work which keeps me out of the country. I just installed the latest update (5.14.21-150400.24.74), and I am still experiencing the issue. Based upon the bug 1213777, I was kinda expecting the fix to be the latest update maybe just too soon. (In reply to Tim Barber from comment #24) > I just installed the latest update (5.14.21-150400.24.74), and I am still > experiencing the issue. Based upon the bug 1213777, I was kinda expecting > the fix to be the latest update maybe just too soon. There was an out-of-band kernel update in July to fix the Zenbleed vulnerability. Kernel 5.14.21-150400.24.74 is that late July update. It had to be done - every day counts when it comes to vulnerabilities. The actual August kernel update, which contains the fix, is still in the pipeline. The release date was set to 8th Aug. I not sure if the kernel will be really released tomorrow but it can be expected soon. If you wanted something to test immediately the latest OBS Kernel:SLE15-SP4 kernel is available. It is a development release, meaning no QA testing has been carried out on it. The kernel package is found in OBS Kernel:SLE15-SP4 repo: http://download.opensuse.org/repositories/Kernel:/SLE15-SP4/pool/ Hi Jiri, Please excuse what might be simple questions, but I am quite new to reporting bugs and having to install these test builds. I have been using OPENSUSE for 8 years, and this is the first time have had a bug like this. I have locked my .66 kernel and added entries to the zypp.conf file as suggested below. I have also downloaded the following files 1. kernel-default-5.14.21-150400.480.1.g6d64757.x86_64.rpm 2. kernel-default-extra-5.14.21-150400.480.1.g6d64757.x86_64.rpm 3. kernel-default-optional-5.14.21-150400.480.1.g6d64757.x86_64.rpm From http://download.opensuse.org/repositories/Kernel:/SLE15-SP4/pool/ Is the next step simply installing the above files with zypper? If so, is there a specific order? Thanks, Tim Yes, just install those packages with zypper install --oldpackage option, and boot with that kernel. But as Jiri pointed, you can wait just for a while until the proper update kernel gets released, too. I will list the commands explicitly. After you have downloaded the packages yourself, use one of these commands: > zypper install --oldpackage kernel-default* > rpm -ivh kernel-default* > rpm -ivh --force --nodeps kernel-default* The order is not important as long as all the packages are installed with a single command. For long term use (not your case), one usually adds a repository: > zypper ar http://download.opensuse.org/repositories/Kernel:/SLE15-SP4/pool/Kernel:SLE15-SP4.repo > zypper ref > zypper se -s kernel-default > zypper in kernel-default-5.14.21-150400.480.1.g6d64757 SUSE-SU-2023:3302-1: An update that solves 28 vulnerabilities, contains two features and has 115 fixes can now be installed. Category: security (important) Bug References: 1150305, 1187829, 1193629, 1194869, 1206418, 1207129, 1207894, 1207948, 1208788, 1210335, 1210565, 1210584, 1210627, 1210780, 1210825, 1210853, 1211014, 1211131, 1211243, 1211738, 1211811, 1211867, 1212051, 1212256, 1212265, 1212301, 1212445, 1212456, 1212502, 1212525, 1212603, 1212604, 1212685, 1212766, 1212835, 1212838, 1212842, 1212846, 1212848, 1212861, 1212869, 1212892, 1212901, 1212905, 1212961, 1213010, 1213011, 1213012, 1213013, 1213014, 1213015, 1213016, 1213017, 1213018, 1213019, 1213020, 1213021, 1213024, 1213025, 1213032, 1213034, 1213035, 1213036, 1213037, 1213038, 1213039, 1213040, 1213041, 1213059, 1213061, 1213087, 1213088, 1213089, 1213090, 1213092, 1213093, 1213094, 1213095, 1213096, 1213098, 1213099, 1213100, 1213102, 1213103, 1213104, 1213105, 1213106, 1213107, 1213108, 1213109, 1213110, 1213111, 1213112, 1213113, 1213114, 1213116, 1213134, 1213167, 1213205, 1213206, 1213226, 1213233, 1213245, 1213247, 1213252, 1213258, 1213259, 1213263, 1213264, 1213272, 1213286, 1213287, 1213304, 1213417, 1213493, 1213523, 1213524, 1213533, 1213543, 1213578, 1213585, 1213586, 1213588, 1213601, 1213620, 1213632, 1213653, 1213705, 1213713, 1213715, 1213747, 1213756, 1213759, 1213777, 1213810, 1213812, 1213856, 1213857, 1213863, 1213867, 1213870, 1213871, 1213872 CVE References: CVE-2022-40982, CVE-2023-0459, CVE-2023-1829, CVE-2023-20569, CVE-2023-20593, CVE-2023-21400, CVE-2023-2156, CVE-2023-2166, CVE-2023-2430, CVE-2023-2985, CVE-2023-3090, CVE-2023-31083, CVE-2023-3111, CVE-2023-3117, CVE-2023-31248, CVE-2023-3212, CVE-2023-3268, CVE-2023-3389, CVE-2023-3390, CVE-2023-35001, CVE-2023-3567, CVE-2023-3609, CVE-2023-3611, CVE-2023-3776, CVE-2023-3812, CVE-2023-38409, CVE-2023-3863, CVE-2023-4004 Jira References: PED-4718, PED-4758 Sources used: openSUSE Leap 15.5 (src): kernel-livepatch-SLE15-SP5-RT_Update_3-1-150500.11.5.1, kernel-syms-rt-5.14.21-150500.13.11.1, kernel-source-rt-5.14.21-150500.13.11.1 SUSE Linux Enterprise Live Patching 15-SP5 (src): kernel-livepatch-SLE15-SP5-RT_Update_3-1-150500.11.5.1 SUSE Real Time Module 15-SP5 (src): kernel-syms-rt-5.14.21-150500.13.11.1, kernel-source-rt-5.14.21-150500.13.11.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. SUSE-SU-2023:3313-1: An update that solves 13 vulnerabilities and has 20 fixes can now be installed. Category: security (important) Bug References: 1206418, 1207129, 1210627, 1210780, 1211131, 1211738, 1212502, 1212604, 1212901, 1213167, 1213272, 1213287, 1213304, 1213585, 1213586, 1213588, 1213620, 1213653, 1213713, 1213715, 1213747, 1213756, 1213759, 1213777, 1213810, 1213812, 1213842, 1213856, 1213857, 1213863, 1213867, 1213870, 1213871 CVE References: CVE-2022-40982, CVE-2023-0459, CVE-2023-20569, CVE-2023-21400, CVE-2023-2156, CVE-2023-2166, CVE-2023-31083, CVE-2023-3268, CVE-2023-3567, CVE-2023-3609, CVE-2023-3611, CVE-2023-3776, CVE-2023-4004 Sources used: SUSE Linux Enterprise Micro for Rancher 5.4 (src): kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3 SUSE Linux Enterprise Micro 5.4 (src): kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3 Basesystem Module 15-SP4 (src): kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3, kernel-source-5.14.21-150400.24.81.1 Development Tools Module 15-SP4 (src): kernel-source-5.14.21-150400.24.81.1, kernel-syms-5.14.21-150400.24.81.1, kernel-obs-build-5.14.21-150400.24.81.1 SUSE Linux Enterprise Live Patching 15-SP4 (src): kernel-livepatch-SLE15-SP4_Update_16-1-150400.9.3.3 openSUSE Leap 15.4 (src): kernel-obs-qa-5.14.21-150400.24.81.1, kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3, kernel-syms-5.14.21-150400.24.81.1, kernel-source-5.14.21-150400.24.81.1, kernel-obs-build-5.14.21-150400.24.81.1, kernel-livepatch-SLE15-SP4_Update_16-1-150400.9.3.3 openSUSE Leap Micro 5.3 (src): kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3 openSUSE Leap Micro 5.4 (src): kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3 SUSE Linux Enterprise Micro for Rancher 5.3 (src): kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3 SUSE Linux Enterprise Micro 5.3 (src): kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. SUSE-SU-2023:3311-1: An update that solves 15 vulnerabilities and has 27 fixes can now be installed. Category: security (important) Bug References: 1206418, 1207129, 1207948, 1210627, 1210780, 1210825, 1211131, 1211738, 1211811, 1212445, 1212502, 1212604, 1212766, 1212901, 1213167, 1213272, 1213287, 1213304, 1213417, 1213578, 1213585, 1213586, 1213588, 1213601, 1213620, 1213632, 1213653, 1213713, 1213715, 1213747, 1213756, 1213759, 1213777, 1213810, 1213812, 1213856, 1213857, 1213863, 1213867, 1213870, 1213871, 1213872 CVE References: CVE-2022-40982, CVE-2023-0459, CVE-2023-20569, CVE-2023-21400, CVE-2023-2156, CVE-2023-2166, CVE-2023-31083, CVE-2023-3268, CVE-2023-3567, CVE-2023-3609, CVE-2023-3611, CVE-2023-3776, CVE-2023-38409, CVE-2023-3863, CVE-2023-4004 Sources used: openSUSE Leap 15.5 (src): kernel-syms-5.14.21-150500.55.19.1, kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4, kernel-livepatch-SLE15-SP5_Update_3-1-150500.11.3.4, kernel-source-5.14.21-150500.55.19.1, kernel-obs-qa-5.14.21-150500.55.19.1, kernel-obs-build-5.14.21-150500.55.19.1 Basesystem Module 15-SP5 (src): kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4, kernel-source-5.14.21-150500.55.19.1 Development Tools Module 15-SP5 (src): kernel-obs-build-5.14.21-150500.55.19.1, kernel-syms-5.14.21-150500.55.19.1, kernel-source-5.14.21-150500.55.19.1 SUSE Linux Enterprise Live Patching 15-SP5 (src): kernel-livepatch-SLE15-SP5_Update_3-1-150500.11.3.4 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. I was able to install vmlinuz-5.14.21-150400.487.gd86b205-default version from the pool, and it corrects my issue I was having with vmlinuz-5.14.21-150400.24.69-default & vmlinuz-5.14.21-150400.24.74-default. I apologize for taking so long, but I had to practice the installation on a test VM because I have never done this before, and I really did not want to bork my workstation. Thanks a ton for all the help, I do appreciate just how fast all responded to my issue. SUSE-SU-2023:3318-1: An update that solves 20 vulnerabilities and has 89 fixes can now be installed. Category: security (important) Bug References: 1150305, 1193629, 1194869, 1206418, 1207129, 1207894, 1208788, 1210565, 1210584, 1210627, 1210780, 1210853, 1211131, 1211243, 1211738, 1211811, 1211867, 1212301, 1212502, 1212604, 1212846, 1212901, 1212905, 1213010, 1213011, 1213012, 1213013, 1213014, 1213015, 1213016, 1213017, 1213018, 1213019, 1213020, 1213021, 1213024, 1213025, 1213032, 1213034, 1213035, 1213036, 1213037, 1213038, 1213039, 1213040, 1213041, 1213059, 1213061, 1213087, 1213088, 1213089, 1213090, 1213092, 1213093, 1213094, 1213095, 1213096, 1213098, 1213099, 1213100, 1213102, 1213103, 1213104, 1213105, 1213106, 1213107, 1213108, 1213109, 1213110, 1213111, 1213112, 1213113, 1213114, 1213134, 1213167, 1213245, 1213247, 1213252, 1213258, 1213259, 1213263, 1213264, 1213272, 1213286, 1213287, 1213304, 1213523, 1213524, 1213543, 1213585, 1213586, 1213588, 1213620, 1213653, 1213705, 1213713, 1213715, 1213747, 1213756, 1213759, 1213777, 1213810, 1213812, 1213856, 1213857, 1213863, 1213867, 1213870, 1213871 CVE References: CVE-2022-40982, CVE-2023-0459, CVE-2023-20569, CVE-2023-20593, CVE-2023-21400, CVE-2023-2156, CVE-2023-2166, CVE-2023-2985, CVE-2023-31083, CVE-2023-3117, CVE-2023-31248, CVE-2023-3268, CVE-2023-3390, CVE-2023-35001, CVE-2023-3567, CVE-2023-3609, CVE-2023-3611, CVE-2023-3776, CVE-2023-3812, CVE-2023-4004 Sources used: openSUSE Leap 15.4 (src): kernel-syms-rt-5.14.21-150400.15.46.1, kernel-source-rt-5.14.21-150400.15.46.1 SUSE Linux Enterprise Live Patching 15-SP4 (src): kernel-livepatch-SLE15-SP4-RT_Update_11-1-150400.1.5.1 SUSE Real Time Module 15-SP4 (src): kernel-syms-rt-5.14.21-150400.15.46.1, kernel-source-rt-5.14.21-150400.15.46.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. SUSE-SU-2023:3376-1: An update that solves 15 vulnerabilities and has 27 fixes can now be installed. Category: security (important) Bug References: 1206418, 1207129, 1207948, 1210627, 1210780, 1210825, 1211131, 1211738, 1211811, 1212445, 1212502, 1212604, 1212766, 1212901, 1213167, 1213272, 1213287, 1213304, 1213417, 1213578, 1213585, 1213586, 1213588, 1213601, 1213620, 1213632, 1213653, 1213713, 1213715, 1213747, 1213756, 1213759, 1213777, 1213810, 1213812, 1213856, 1213857, 1213863, 1213867, 1213870, 1213871, 1213872 CVE References: CVE-2022-40982, CVE-2023-0459, CVE-2023-20569, CVE-2023-21400, CVE-2023-2156, CVE-2023-2166, CVE-2023-31083, CVE-2023-3268, CVE-2023-3567, CVE-2023-3609, CVE-2023-3611, CVE-2023-3776, CVE-2023-38409, CVE-2023-3863, CVE-2023-4004 Sources used: openSUSE Leap 15.5 (src): kernel-syms-azure-5.14.21-150500.33.14.1, kernel-source-azure-5.14.21-150500.33.14.1 Public Cloud Module 15-SP5 (src): kernel-syms-azure-5.14.21-150500.33.14.1, kernel-source-azure-5.14.21-150500.33.14.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. I have an odd question. Am I responsible for changed the Status of this bug from IN_PROGRESS to RESOLVED now that the latest kernel (5.14.21-150400.24.81-default) fixes the issue? SUSE-SU-2023:3377-1: An update that solves 11 vulnerabilities and has 19 fixes can now be installed. Category: security (important) Bug References: 1206418, 1207129, 1210627, 1210780, 1211131, 1211738, 1212502, 1212604, 1212901, 1213167, 1213272, 1213287, 1213304, 1213588, 1213620, 1213653, 1213713, 1213715, 1213747, 1213756, 1213759, 1213777, 1213810, 1213812, 1213856, 1213857, 1213863, 1213867, 1213870, 1213871 CVE References: CVE-2022-40982, CVE-2023-0459, CVE-2023-20569, CVE-2023-21400, CVE-2023-2156, CVE-2023-2166, CVE-2023-31083, CVE-2023-3268, CVE-2023-3567, CVE-2023-3776, CVE-2023-4004 Sources used: openSUSE Leap 15.4 (src): kernel-source-azure-5.14.21-150400.14.63.1, kernel-syms-azure-5.14.21-150400.14.63.1 Public Cloud Module 15-SP4 (src): kernel-source-azure-5.14.21-150400.14.63.1, kernel-syms-azure-5.14.21-150400.14.63.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. You need to clear NEEDINFO flag that was set to you after you provide the info. The rest is our job :) It appears that flag was cleared or am I missing something? Yes, I already removed it before closing. |