Bug 1218738 - freeze: Leap 15.5 as vmware guest
Summary: freeze: Leap 15.5 as vmware guest
Status: RESOLVED FIXED
Alias: None
Product: openSUSE Distribution
Classification: openSUSE
Component: Kernel (show other bugs)
Version: Leap 15.5
Hardware: VMWare openSUSE Tumbleweed
: P4 - Low : Normal (vote)
Target Milestone: ---
Assignee: openSUSE Kernel Bugs
QA Contact: E-mail List
URL:
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2024-01-11 17:36 UTC by temir
Modified: 2024-02-15 16:30 UTC (History)
3 users (show)

See Also:
Found By: ---
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments
BUG: kernel NULL pointer dereference (23.00 KB, text/plain)
2024-01-11 17:36 UTC, temir
Details
complete system log from boot (266.79 KB, text/plain)
2024-01-11 17:59 UTC, temir
Details
boot log w/o 3D, kernel 5.14.21-150500.55.39-default (132.95 KB, text/plain)
2024-01-11 18:11 UTC, temir
Details
msgs with kernel g4f5ea9d (448.24 KB, text/plain)
2024-01-12 13:40 UTC, temir
Details
syslog for kernel-default-5.14.21-150500.2.1.gc9f7605 (269.15 KB, text/plain)
2024-01-12 20:04 UTC, temir
Details
syslog for kernel-default-devel-5.14.21-150500.2.1.g536c93d (267.56 KB, text/plain)
2024-01-12 22:25 UTC, temir
Details
syslog for kernel-default-5.14.21-150500.1.1.g111c798 (259.32 KB, text/plain)
2024-01-13 08:32 UTC, temir
Details

Note You need to log in before you can comment on or make changes to this bug.
Description temir 2024-01-11 17:36:29 UTC
Created attachment 871792 [details]
BUG: kernel NULL pointer dereference

Hello all,

I don't know exactly how long the problem has existed.
The Suse Leap VM is started about once every 4-6 weeks to keep it up to date.

A week ago and so far the hanger.

= Environment =
== Host ==
 Tumbleweed, rel. 20240109-2681.1. kernel 6.6.10-1-default
 Vmware player 17.5.0
 vmmon-only/vmmon.ko vmnet-only/vmnet.ko from https://github.com/mkubecek/vmware-host-modules
  - built/loaded for kernel 6.6.10-1-defaul without errors
 
== Guest ==
 Suse leap 15.5, kernel 5.14.21-150500.55.39-default.
 Autologin in plasma => guest frozen.
 boot into level 3, login, startx => guest frozen

Guest log is attached.

If further information is required - I will be happy to provide it.

Regards, temir.
Comment 1 temir 2024-01-11 17:58:28 UTC
Tried to start Guest with kernel 5.14.21-150500.55.36-default - X also hangs.
Comment 2 temir 2024-01-11 17:59:41 UTC
Created attachment 871796 [details]
complete system log from boot
Comment 3 temir 2024-01-11 18:08:46 UTC
Surprise: 3D acceleration switched off - X11 starts, autologin works.
Boot log attached.
Comment 4 temir 2024-01-11 18:11:01 UTC
Created attachment 871799 [details]
boot log w/o 3D, kernel 5.14.21-150500.55.39-default
Comment 5 Takashi Iwai 2024-01-11 18:47:58 UTC
It could be a regression that has been very recently fixed.

KOTD seems still outdated, so I'm triggering the build from the latest git branch.  It's being built in OBS home:tiwai:bsc1218738 repo.
Once after the build finishes (takes an hour or so), the package will appear at
  http://download.opensuse.org/repositories/home:/tiwai:/bsc1218738/pool/

Could you give it a try later?
Comment 6 temir 2024-01-11 18:51:10 UTC
Yes, of course
Comment 7 temir 2024-01-12 13:38:55 UTC
Hello,

unfortunately it's not good news, the new kernel doesn't bring any improvement either.

Log messages.g4f5ea9d.txt will be uploaded soon.

Regards, temir.
Comment 8 temir 2024-01-12 13:40:05 UTC
Created attachment 871820 [details]
msgs with kernel  g4f5ea9d
Comment 9 temir 2024-01-12 13:42:32 UTC
I mean, without 3D it works with reduced resolution, 
with 3D there are kernel errors, and I can see only a black screen
Comment 10 Takashi Iwai 2024-01-12 14:17:16 UTC
Do you see the kernel Oops as found in the report with the test kernel?
Comment 11 Takashi Iwai 2024-01-12 14:18:04 UTC
(In reply to Takashi Iwai from comment #10)
> Do you see the kernel Oops as found in the report with the test kernel?

Ah, I saw you attached the output.  It's there.
Comment 14 Takashi Iwai 2024-01-12 16:05:16 UTC
I'm building another test kernel with the revised fix patch.
It's being built in OBS home:tiwai:bsc1218738-2 repo.  Once after the build finishes, the package will be available at
  http://download.opensuse.org/repositories/home:/tiwai:/bsc1218738-2/pool/
Please give it a try later again.
Comment 15 temir 2024-01-12 20:03:52 UTC
The new kernel-default-5.14.21-150500.2.1.gc9f7605 lets the guest start the X11 with 3D switched on.
Some trace messages are still present, see attachment messages.gc9f7605.txt.

Good job, we are slowly but surely getting closer to the final solution.
Comment 16 temir 2024-01-12 20:04:25 UTC
Created attachment 871841 [details]
syslog for kernel-default-5.14.21-150500.2.1.gc9f7605
Comment 17 temir 2024-01-12 20:15:26 UTC
Maybe you need additional information about the host, such as graphics card / driver, or the VM's vmx file?
Comment 19 Takashi Iwai 2024-01-12 20:29:40 UTC
Thanks for quick testing!

Now yet another revised patch and rebuild of a new kernel.  It's (unsurprisingly) in OBS home:tiwai:bsc1218738-3 repo, which will appear later at
  http://download.opensuse.org/repositories/home:/tiwai:/bsc1218738-3/pool/

Please check it out later.
Comment 25 temir 2024-01-12 22:24:41 UTC
Tested, trace comes after:
Hardware name: VMware, Inc. VMware Virtual Platform/440BX

System log for kernel-default-devel-5.14.21-150500.2.1.g536c93d will be attached as messages.g536c93d.txt.
Comment 26 temir 2024-01-12 22:25:34 UTC
Created attachment 871844 [details]
syslog for kernel-default-devel-5.14.21-150500.2.1.g536c93d
Comment 27 Ali Abdallah 2024-01-12 22:37:53 UTC
(In reply to temir from comment #26)
> Created attachment 871844 [details]
> syslog for kernel-default-devel-5.14.21-150500.2.1.g536c93d

Thanks temir for your report, we have identified the issue behind the kernel warning and we are working on a fix
Comment 29 Takashi Iwai 2024-01-13 07:27:18 UTC
Thanks, now I kicked the latest patch into OBS home:tiwai:bsc1218738-4 repo.
Please check it out later:
  http://download.opensuse.org/repositories/home:/tiwai:/bsc1218738-4/pool/
Comment 30 temir 2024-01-13 08:32:36 UTC
Thank you very much, the goal has been achieved!
- no more traces in the syslog, see the attachment 
"syslog for kernel-default-5.14.21-150500.1.1.g111c798".

Should I close the report as solved or wait until the fix appears in the regular Suse kernel?
Comment 31 temir 2024-01-13 08:32:53 UTC
Created attachment 871852 [details]
syslog for kernel-default-5.14.21-150500.1.1.g111c798
Comment 32 Takashi Iwai 2024-01-13 09:46:30 UTC
Good to hear!
Ali, please go ahead with the latest v5 patch.

We'll close this entry once when the patch gets submitted / merged to SLE15-SP5 branch.
Comment 33 temir 2024-01-13 10:49:28 UTC
Understood.
Many thanks to everyone involved, that was really quick.

Best Kind Of Regards, temir.
Comment 36 Takashi Iwai 2024-01-18 15:42:10 UTC
Let's close.
Comment 37 Maintenance Automation 2024-01-18 20:30:13 UTC
SUSE-SU-2024:0160-1: An update that solves 10 vulnerabilities, contains three features and has 42 security fixes can now be installed.

Category: security (important)
Bug References: 1179610, 1183045, 1211162, 1211226, 1212139, 1212584, 1214117, 1214158, 1214747, 1214823, 1215237, 1215696, 1215885, 1215952, 1216032, 1216057, 1216559, 1216776, 1217036, 1217217, 1217250, 1217602, 1217692, 1217790, 1217801, 1217822, 1217927, 1217933, 1217938, 1217946, 1217947, 1217980, 1217981, 1217982, 1218056, 1218092, 1218139, 1218184, 1218229, 1218234, 1218253, 1218258, 1218335, 1218357, 1218397, 1218447, 1218461, 1218515, 1218559, 1218569, 1218643, 1218738
CVE References: CVE-2020-26555, CVE-2023-51779, CVE-2023-6121, CVE-2023-6531, CVE-2023-6546, CVE-2023-6606, CVE-2023-6610, CVE-2023-6622, CVE-2023-6931, CVE-2023-6932
Jira References: PED-3459, PED-5021, PED-7167
Sources used:
openSUSE Leap 15.5 (src): kernel-obs-build-5.14.21-150500.55.44.1, kernel-livepatch-SLE15-SP5_Update_9-1-150500.11.5.1, kernel-syms-5.14.21-150500.55.44.1, kernel-source-5.14.21-150500.55.44.1, kernel-default-base-5.14.21-150500.55.44.1.150500.6.19.2, kernel-obs-qa-5.14.21-150500.55.44.1
SUSE Linux Enterprise Micro 5.5 (src): kernel-default-base-5.14.21-150500.55.44.1.150500.6.19.2
Basesystem Module 15-SP5 (src): kernel-default-base-5.14.21-150500.55.44.1.150500.6.19.2, kernel-source-5.14.21-150500.55.44.1
Development Tools Module 15-SP5 (src): kernel-source-5.14.21-150500.55.44.1, kernel-obs-build-5.14.21-150500.55.44.1, kernel-syms-5.14.21-150500.55.44.1
SUSE Linux Enterprise Live Patching 15-SP5 (src): kernel-livepatch-SLE15-SP5_Update_9-1-150500.11.5.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 43 Maintenance Automation 2024-02-14 16:30:07 UTC
SUSE-SU-2024:0469-1: An update that solves 19 vulnerabilities, contains eight features and has 41 security fixes can now be installed.

Category: security (important)
Bug References: 1065729, 1108281, 1141539, 1174649, 1181674, 1193285, 1194869, 1209834, 1210443, 1211515, 1212091, 1214377, 1215275, 1215885, 1216441, 1216559, 1216702, 1217895, 1217987, 1217988, 1217989, 1218005, 1218447, 1218527, 1218659, 1218713, 1218723, 1218730, 1218738, 1218752, 1218757, 1218768, 1218778, 1218779, 1218804, 1218832, 1218836, 1218916, 1218948, 1218958, 1218968, 1218997, 1219006, 1219012, 1219013, 1219014, 1219053, 1219067, 1219120, 1219128, 1219136, 1219285, 1219349, 1219412, 1219429, 1219434, 1219490, 1219512, 1219568, 1219582
CVE References: CVE-2021-33631, CVE-2023-46838, CVE-2023-47233, CVE-2023-4921, CVE-2023-51042, CVE-2023-51043, CVE-2023-51780, CVE-2023-51782, CVE-2023-6040, CVE-2023-6356, CVE-2023-6531, CVE-2023-6535, CVE-2023-6536, CVE-2023-6915, CVE-2024-0565, CVE-2024-0641, CVE-2024-0775, CVE-2024-1085, CVE-2024-1086
Jira References: PED-4729, PED-6694, PED-7322, PED-7615, PED-7616, PED-7620, PED-7622, PED-7623
Sources used:
openSUSE Leap 15.5 (src): kernel-livepatch-SLE15-SP5-RT_Update_10-1-150500.11.5.1, kernel-source-rt-5.14.21-150500.13.35.1, kernel-syms-rt-5.14.21-150500.13.35.1
SUSE Linux Enterprise Live Patching 15-SP5 (src): kernel-livepatch-SLE15-SP5-RT_Update_10-1-150500.11.5.1
SUSE Real Time Module 15-SP5 (src): kernel-source-rt-5.14.21-150500.13.35.1, kernel-syms-rt-5.14.21-150500.13.35.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 44 Maintenance Automation 2024-02-15 16:30:39 UTC
SUSE-SU-2024:0514-1: An update that solves 21 vulnerabilities, contains nine features and has 41 security fixes can now be installed.

Category: security (important)
Bug References: 1065729, 1108281, 1141539, 1174649, 1181674, 1193285, 1194869, 1209834, 1210443, 1211515, 1212091, 1214377, 1215275, 1215885, 1216441, 1216559, 1216702, 1217895, 1217987, 1217988, 1217989, 1218005, 1218447, 1218527, 1218659, 1218689, 1218713, 1218723, 1218730, 1218738, 1218752, 1218757, 1218768, 1218778, 1218779, 1218804, 1218832, 1218836, 1218916, 1218948, 1218958, 1218968, 1218997, 1219006, 1219012, 1219013, 1219014, 1219053, 1219067, 1219120, 1219128, 1219136, 1219285, 1219349, 1219412, 1219429, 1219434, 1219490, 1219512, 1219568, 1219582, 1219608
CVE References: CVE-2021-33631, CVE-2023-46838, CVE-2023-47233, CVE-2023-4921, CVE-2023-51042, CVE-2023-51043, CVE-2023-51780, CVE-2023-51782, CVE-2023-6040, CVE-2023-6356, CVE-2023-6531, CVE-2023-6535, CVE-2023-6536, CVE-2023-6915, CVE-2024-0340, CVE-2024-0565, CVE-2024-0641, CVE-2024-0775, CVE-2024-1085, CVE-2024-1086, CVE-2024-24860
Jira References: PED-4729, PED-6694, PED-7322, PED-7615, PED-7616, PED-7618, PED-7620, PED-7622, PED-7623
Sources used:
openSUSE Leap 15.5 (src): kernel-source-azure-5.14.21-150500.33.34.1, kernel-syms-azure-5.14.21-150500.33.34.1
Public Cloud Module 15-SP5 (src): kernel-source-azure-5.14.21-150500.33.34.1, kernel-syms-azure-5.14.21-150500.33.34.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.