ath9k freezes suspend resume Ubuntu 17.04
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
linux (Ubuntu) |
Fix Released
|
Undecided
|
Unassigned | ||
Zesty |
Fix Released
|
Undecided
|
Unassigned |
Bug Description
[SRU Justification]
[Impact]
Ath9k stops working after system resume from suspend.
[Test Case]
Suspend/resume the system.
Ath9k should no longer freeze.
[Regression Potential]
This patch only effects ath9k, also, the change is pretty small.
The regression potential should be really low.
---
Description: Ubuntu Zesty Zapus
Release: 17.04
What was expected to happen?
I expected the laptop would suspend and resume without issues
What happened instead?
First the network fails, then all other programs slowly start to fail as well until the system freezes completely. The system is unable to shutdown and it requires a forced shutdown.
Often when suspending my system, a recent upgrade to 17.04 from 16.10, after resuming the network does not work and then slowly the whole system freezes. Looking at dmesg, the problem seems to arise just before the system suspends with the kernel trace attached below.
My best guess is that the issue is caused by ath9k. My system is a Dell XPS13 version 9333 (2013) running kernel 4.10.0-22-generic (with 8GB of RAM and no swap) and it is often connected to a Dell U3011 monitor.
I could not find other reports of this bug and this behaviour is new to 17.04, that is, it was not present in 16.10. I was always able to suspend and resume without issues before. I have been waiting to see bug 1674838 fixed before reporting this bug thinking that they might be related, but they are clearly independent as I am still having this suspend issue.
Happy to try to collect more info if this information is not enough to understand where the problem lies, however it is impossible to run apport once the bug arises.
[11292.289928] ------------[ cut here ]------------
[11292.289935] WARNING: CPU: 0 PID: 943 at /build/
[11292.289936] Modules linked in: ccm rfcomm cmac bnep hid_generic dell_wmi sparse_keymap intel_rapl x86_pkg_
[11292.289977] lpc_ich acpi_als kfifo_buf industrialio mac_hid binfmt_misc parport_pc ppdev lp parport ip_tables x_tables autofs4 i915 i2c_algo_bit drm_kms_helper syscopyarea psmouse sysfillrect sysimgblt fb_sys_fops ahci drm libahci wmi fjes video
[11292.289995] CPU: 0 PID: 943 Comm: NetworkManager Not tainted 4.10.0-22-generic #24-Ubuntu
[11292.289996] Hardware name: Dell Inc. Dell System XPS L322X/0PJHXN, BIOS A09 05/15/2013
[11292.289997] Call Trace:
[11292.290001] dump_stack+
[11292.290003] __warn+0xcb/0xf0
[11292.290005] warn_slowpath_
[11292.290007] kthread_
[11292.290014] ath9k_rng_
[11292.290018] ath9k_stop+
[11292.290036] drv_stop+0x33/0x100 [mac80211]
[11292.290055] ieee80211_
[11292.290072] ieee80211_
[11292.290075] ? _raw_spin_
[11292.290077] ? dev_deactivate_
[11292.290093] ieee80211_
[11292.290096] __dev_close_
[11292.290098] __dev_close+
[11292.290100] __dev_change_
[11292.290102] dev_change_
[11292.290104] do_setlink+
[11292.290107] ? load_balance+
[11292.290109] ? update_
[11292.290112] ? dequeue_
[11292.290114] ? nla_parse+
[11292.290115] rtnl_newlink+
[11292.290118] ? lookup_
[11292.290121] ? security_
[11292.290123] ? ns_capable_
[11292.290125] ? ns_capable+
[11292.290127] rtnetlink_
[11292.290130] ? __kmalloc_
[11292.290133] ? __alloc_
[11292.290135] ? rtnl_newlink+
[11292.290137] netlink_
[11292.290138] rtnetlink_
[11292.290140] netlink_
[11292.290141] netlink_
[11292.290144] ? aa_sock_
[11292.290146] sock_sendmsg+
[11292.290148] ___sys_
[11292.290149] ? try_to_
[11292.290152] ? update_
[11292.290154] ? update_
[11292.290156] ? set_next_
[11292.290157] ? pick_next_
[11292.290160] ? __switch_
[11292.290162] ? __fget_
[11292.290164] __sys_sendmsg+
[11292.290166] SyS_sendmsg+
[11292.290168] entry_SYSCALL_
[11292.290169] RIP: 0033:0x7f6e2e5fb460
[11292.290170] RSP: 002b:00007fff77
[11292.290172] RAX: ffffffffffffffda RBX: 0000560645dcbac0 RCX: 00007f6e2e5fb460
[11292.290173] RDX: 0000000000000000 RSI: 00007fff77d8c3f0 RDI: 000000000000000c
[11292.290174] RBP: 0000560645dc5d50 R08: 0000000000000000 R09: 00005606460bf600
[11292.290175] R10: 00005606460bf600 R11: 0000000000000293 R12: 0000560645dcbb40
[11292.290175] R13: 0000560645dcbb00 R14: 00007fff77d8b840 R15: 0000000000000001
[11292.290177] ---[ end trace 582ceb2f8a45c9ad ]---
[11292.290187] BUG: unable to handle kernel paging request at 00007f71eba4bb90
[11292.290232] IP: kthread_
[11292.290255] PGD 2347d6067
[11292.290255] PUD 0
[11292.290271]
[11292.290294] Oops: 0002 [#1] SMP
[11292.290312] Modules linked in: ccm rfcomm cmac bnep hid_generic dell_wmi sparse_keymap intel_rapl x86_pkg_
[11292.290677] lpc_ich acpi_als kfifo_buf industrialio mac_hid binfmt_misc parport_pc ppdev lp parport ip_tables x_tables autofs4 i915 i2c_algo_bit drm_kms_helper syscopyarea psmouse sysfillrect sysimgblt fb_sys_fops ahci drm libahci wmi fjes video
[11292.290796] CPU: 0 PID: 943 Comm: NetworkManager Tainted: G W 4.10.0-22-generic #24-Ubuntu
[11292.290842] Hardware name: Dell Inc. Dell System XPS L322X/0PJHXN, BIOS A09 05/15/2013
[11292.290886] task: ffff9b7ab068ad00 task.stack: ffffbcb581a54000
[11292.290919] RIP: 0010:kthread_
[11292.290943] RSP: 0018:ffffbcb581
[11292.290972] RAX: 0000000000000024 RBX: 00007f71eba4bb90 RCX: 0000000000000006
[11292.291007] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000009
[11292.291043] RBP: ffffbcb581a57610 R08: 0000000000000001 R09: 00000000000003cc
[11292.291079] R10: ffffffffa9606a40 R11: 0000000000000000 R12: ffff9b7a54b92d00
[11292.291115] R13: ffff9b7ab15d9fb0 R14: ffff9b7ab15d8740 R15: ffff9b7ab137c018
[11292.291152] FS: 00007f6e309f654
[11292.291193] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[11292.291222] CR2: 00007f71eba4bb90 CR3: 000000023478b000 CR4: 00000000001406f0
[11292.291259] Call Trace:
[11292.291279] ath9k_rng_
[11292.291306] ath9k_stop+
[11292.291342] drv_stop+0x33/0x100 [mac80211]
[11292.291383] ieee80211_
[11292.291427] ieee80211_
[11292.291455] ? _raw_spin_
[11292.291479] ? dev_deactivate_
[11292.291519] ieee80211_
[11292.291546] __dev_close_
[11292.291570] __dev_close+
[11292.291591] __dev_change_
[11292.291614] dev_change_
[11292.291637] do_setlink+
[11292.291657] ? load_balance+
[11292.291678] ? update_
[11292.291702] ? dequeue_
[11292.291725] ? nla_parse+
[11292.291745] rtnl_newlink+
[11292.291766] ? lookup_
[11292.291785] ? security_
[11292.291805] ? ns_capable_
[11292.291826] ? ns_capable+
[11292.291844] rtnetlink_
[11292.291865] ? __kmalloc_
[11292.291889] ? __alloc_
[11292.291907] ? rtnl_newlink+
[11292.291928] netlink_
[11292.291949] rtnetlink_
[11292.291968] netlink_
[11292.291989] netlink_
[11292.292011] ? aa_sock_
[11292.292033] sock_sendmsg+
[11292.292052] ___sys_
[11292.292073] ? try_to_
[11292.292095] ? update_
[11292.292117] ? update_
[11292.292139] ? set_next_
[11292.292161] ? pick_next_
[11292.292185] ? __switch_
[11292.292207] ? __fget_
[11292.292227] __sys_sendmsg+
[11292.293801] SyS_sendmsg+
[11292.295417] entry_SYSCALL_
[11292.297041] RIP: 0033:0x7f6e2e5fb460
[11292.298664] RSP: 002b:00007fff77
[11292.300331] RAX: ffffffffffffffda RBX: 0000560645dcbac0 RCX: 00007f6e2e5fb460
[11292.302005] RDX: 0000000000000000 RSI: 00007fff77d8c3f0 RDI: 000000000000000c
[11292.303616] RBP: 0000560645dc5d50 R08: 0000000000000000 R09: 00005606460bf600
[11292.305154] R10: 00005606460bf600 R11: 0000000000000293 R12: 0000560645dcbb40
[11292.306622] R13: 0000560645dcbb00 R14: 00007fff77d8b840 R15: 0000000000000001
[11292.308017] Code: 55 48 89 e5 41 55 41 54 49 89 fc 53 0f 1f 44 00 00 f0 41 ff 44 24 18 41 f6 44 24 1e 20 0f 84 c9 00 00 00 49 8b 9c 24 60 09 00 00 <f0> 80 0b 02 4c 89 e7 e8 44 ff ff ff 4c 89 e7 e8 bc b5 00 00 48
[11292.309494] RIP: kthread_
[11292.310864] CR2: 00007f71eba4bb90
[11292.324601] ---[ end trace 582ceb2f8a45c9ae ]---
CVE References
affects: | ubuntu → linux (Ubuntu) |
description: | updated |
Changed in linux (Ubuntu): | |
status: | Fix Released → Fix Committed |
Changed in linux (Ubuntu Zesty): | |
status: | New → Fix Committed |
Thank you for taking the time to report this bug and helping to make Ubuntu better. It seems that your bug report is not filed about a specific source package though, rather it is just filed against Ubuntu in general. It is important that bug reports be filed about source packages so that people interested in the package can find the bugs about it. You can find some hints about determining what package your bug might be about at https:/ /wiki.ubuntu. com/Bugs/ FindRightPackag e. You might also ask for help in the #ubuntu-bugs irc channel on Freenode.
To change the source package that this bug is filed about visit https:/ /bugs.launchpad .net/ubuntu/ +bug/1697027/ +editstatus and add the package name in the text box next to the word Package.
[This is an automated message. I apologize if it reached you inappropriately; please just reply to this message indicating so.]