Bug 1213808

Summary: Unexpected DP dual mode adaptor
Product: [openSUSE] openSUSE Distribution Reporter: Matwey Kornilov <matwey.kornilov>
Component: KernelAssignee: openSUSE Kernel Bugs <kernel-bugs>
Status: RESOLVED FIXED QA Contact: E-mail List <qa-bugs>
Severity: Normal    
Priority: P5 - None CC: matwey.kornilov, tiwai
Version: Leap 15.4   
Target Milestone: ---   
Hardware: Other   
OS: Other   
Whiteboard:
Found By: --- Services Priority:
Business Priority: Blocker: ---
Marketing QA Status: --- IT Deployment: ---
Attachments: hwinfo output

Description Matwey Kornilov 2023-07-31 09:04:44 UTC
Created attachment 868524 [details]
hwinfo output

Hello,

I am running openSUSE Leap 15.4 with kernel-default-5.14.21-150400.24.69.1.x86_64

After I updated to Leap 15.4 from 15.3 I see a lots of the following messages in dmesg:


[135976.467456] i915 0000:00:02.0: [drm] *ERROR* Unexpected DP dual mode adaptor ID 44


Attached here is /usr/sbin/hwinfo output
Comment 1 Takashi Iwai 2023-08-01 06:31:31 UTC
Could you verify whether this also appears with Leap 15.5 kernel, too?
Comment 2 Matwey Kornilov 2023-08-01 07:34:33 UTC
I think I can check 15.5 kernel, but it will take some time.
Comment 3 Matwey Kornilov 2023-08-30 13:06:01 UTC
5.14.21-150400.24.81-default is also affected.

I am still planning to test Leap 15.5 also.
Comment 4 Matwey Kornilov 2023-09-11 09:10:18 UTC
This can be related to the issue:
https://patchwork.kernel.org/project/dri-devel/patch/20221006113314.41101987@computer/
Comment 5 Takashi Iwai 2023-09-11 09:48:32 UTC
Possibly.  Leap 15.5 kernel already contains this patch, so you can check with it, too.
Comment 6 Matwey Kornilov 2023-09-11 15:08:49 UTC
I can say that don't see this error lines with Leap 15.5 kernel 5.14.21-150500.55.12-default

But I am not sure how to reliable trigger this issue. At 15.4 the error lines happens every 5 minutes and then can disappear for a day.
Comment 7 Takashi Iwai 2023-09-11 15:21:16 UTC
OK, please keep testing with it.

Meanwhile, I'm building a test kernel with the backport of the upstream fix patch you suggested for SLE15-SP4.  It's being built in OBS home:tiwai:bsc1213808 repo.  Once after the build finishes, please give it a try later.
Comment 8 Matwey Kornilov 2023-09-18 15:16:46 UTC
(In reply to Takashi Iwai from comment #7)
> OK, please keep testing with it.
> 
> Meanwhile, I'm building a test kernel with the backport of the upstream fix
> patch you suggested for SLE15-SP4.  It's being built in OBS
> home:tiwai:bsc1213808 repo.  Once after the build finishes, please give it a
> try later.

I have been running 5.14.21-150400.1.g3e74086-default for 96 hours without any problem. I think that the patch really fixes the initial issue.
Comment 9 Takashi Iwai 2023-09-18 15:23:02 UTC
OK, then let's merge the fix patch to SLE15-SP4 branch.
Comment 17 Maintenance Automation 2023-10-10 16:35:07 UTC
SUSE-SU-2023:4035-1: An update that solves 12 vulnerabilities and has 12 security fixes can now be installed.

Category: security (important)
Bug References: 1152472, 1202845, 1206453, 1213808, 1214941, 1214942, 1214943, 1214944, 1214950, 1214951, 1214954, 1214957, 1214986, 1214992, 1214993, 1215322, 1215523, 1215877, 1215894, 1215895, 1215896, 1215911, 1215915, 1215916
CVE References: CVE-2023-1206, CVE-2023-39192, CVE-2023-39193, CVE-2023-39194, CVE-2023-4155, CVE-2023-42753, CVE-2023-42754, CVE-2023-4389, CVE-2023-4622, CVE-2023-4623, CVE-2023-4921, CVE-2023-5345
Sources used:
openSUSE Leap 15.5 (src): kernel-livepatch-SLE15-SP5-RT_Update_6-1-150500.11.3.1, kernel-syms-rt-5.14.21-150500.13.21.1, kernel-source-rt-5.14.21-150500.13.21.1
SUSE Linux Enterprise Live Patching 15-SP5 (src): kernel-livepatch-SLE15-SP5-RT_Update_6-1-150500.11.3.1
SUSE Real Time Module 15-SP5 (src): kernel-syms-rt-5.14.21-150500.13.21.1, kernel-source-rt-5.14.21-150500.13.21.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 18 Maintenance Automation 2023-10-12 12:46:28 UTC
SUSE-SU-2023:4058-1: An update that solves 18 vulnerabilities, contains three features and has 71 security fixes can now be installed.

Category: security (important)
Bug References: 1065729, 1152472, 1187236, 1201284, 1202845, 1206453, 1208995, 1210169, 1210643, 1210658, 1212639, 1212703, 1213123, 1213534, 1213808, 1214022, 1214037, 1214040, 1214233, 1214351, 1214479, 1214543, 1214635, 1214813, 1214873, 1214928, 1214940, 1214941, 1214942, 1214943, 1214944, 1214945, 1214946, 1214947, 1214948, 1214949, 1214950, 1214951, 1214952, 1214953, 1214954, 1214955, 1214957, 1214958, 1214959, 1214961, 1214962, 1214963, 1214964, 1214965, 1214966, 1214967, 1214986, 1214988, 1214990, 1214991, 1214992, 1214993, 1214995, 1214997, 1214998, 1215115, 1215117, 1215123, 1215124, 1215148, 1215150, 1215221, 1215275, 1215322, 1215467, 1215523, 1215581, 1215752, 1215858, 1215860, 1215861, 1215875, 1215877, 1215894, 1215895, 1215896, 1215899, 1215911, 1215915, 1215916, 1215941, 1215956, 1215957
CVE References: CVE-2023-1192, CVE-2023-1206, CVE-2023-1859, CVE-2023-2177, CVE-2023-37453, CVE-2023-39192, CVE-2023-39193, CVE-2023-39194, CVE-2023-40283, CVE-2023-4155, CVE-2023-42753, CVE-2023-42754, CVE-2023-4389, CVE-2023-4622, CVE-2023-4623, CVE-2023-4881, CVE-2023-4921, CVE-2023-5345
Jira References: PED-1549, PED-2023, PED-2025
Sources used:
openSUSE Leap 15.5 (src): kernel-source-azure-5.14.21-150500.33.20.1, kernel-syms-azure-5.14.21-150500.33.20.1
Public Cloud Module 15-SP5 (src): kernel-source-azure-5.14.21-150500.33.20.1, kernel-syms-azure-5.14.21-150500.33.20.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 19 Maintenance Automation 2023-10-12 12:46:40 UTC
SUSE-SU-2023:4057-1: An update that solves 18 vulnerabilities and has five security fixes can now be installed.

Category: security (important)
Bug References: 1202845, 1213772, 1213808, 1214928, 1214943, 1214944, 1214950, 1214951, 1214954, 1214957, 1214986, 1214988, 1214992, 1214993, 1215322, 1215523, 1215877, 1215894, 1215895, 1215896, 1215911, 1215915, 1215916
CVE References: CVE-2023-1192, CVE-2023-1206, CVE-2023-1859, CVE-2023-2177, CVE-2023-37453, CVE-2023-39192, CVE-2023-39193, CVE-2023-39194, CVE-2023-4155, CVE-2023-42753, CVE-2023-42754, CVE-2023-4389, CVE-2023-4563, CVE-2023-4622, CVE-2023-4623, CVE-2023-4881, CVE-2023-4921, CVE-2023-5345
Sources used:
openSUSE Leap 15.4 (src): kernel-syms-azure-5.14.21-150400.14.69.1, kernel-source-azure-5.14.21-150400.14.69.1
Public Cloud Module 15-SP4 (src): kernel-syms-azure-5.14.21-150400.14.69.1, kernel-source-azure-5.14.21-150400.14.69.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 20 Maintenance Automation 2023-10-13 12:30:07 UTC
SUSE-SU-2023:4072-1: An update that solves 17 vulnerabilities and has seven security fixes can now be installed.

Category: security (important)
Bug References: 1202845, 1213808, 1214928, 1214940, 1214941, 1214942, 1214943, 1214944, 1214950, 1214951, 1214954, 1214957, 1214986, 1214988, 1214992, 1214993, 1215322, 1215877, 1215894, 1215895, 1215896, 1215911, 1215915, 1215916
CVE References: CVE-2023-1192, CVE-2023-1206, CVE-2023-1859, CVE-2023-2177, CVE-2023-39192, CVE-2023-39193, CVE-2023-39194, CVE-2023-4155, CVE-2023-42753, CVE-2023-42754, CVE-2023-4389, CVE-2023-4563, CVE-2023-4622, CVE-2023-4623, CVE-2023-4881, CVE-2023-4921, CVE-2023-5345
Sources used:
openSUSE Leap 15.4 (src): kernel-obs-build-5.14.21-150400.24.92.1, kernel-livepatch-SLE15-SP4_Update_19-1-150400.9.3.1, kernel-obs-qa-5.14.21-150400.24.92.1, kernel-source-5.14.21-150400.24.92.1, kernel-default-base-5.14.21-150400.24.92.1.150400.24.42.1, kernel-syms-5.14.21-150400.24.92.1
SUSE Linux Enterprise Micro for Rancher 5.3 (src): kernel-default-base-5.14.21-150400.24.92.1.150400.24.42.1
SUSE Linux Enterprise Micro 5.3 (src): kernel-default-base-5.14.21-150400.24.92.1.150400.24.42.1
SUSE Linux Enterprise Micro for Rancher 5.4 (src): kernel-default-base-5.14.21-150400.24.92.1.150400.24.42.1
SUSE Linux Enterprise Micro 5.4 (src): kernel-default-base-5.14.21-150400.24.92.1.150400.24.42.1
Basesystem Module 15-SP4 (src): kernel-source-5.14.21-150400.24.92.1, kernel-default-base-5.14.21-150400.24.92.1.150400.24.42.1
Development Tools Module 15-SP4 (src): kernel-syms-5.14.21-150400.24.92.1, kernel-obs-build-5.14.21-150400.24.92.1, kernel-source-5.14.21-150400.24.92.1
SUSE Linux Enterprise Live Patching 15-SP4 (src): kernel-livepatch-SLE15-SP4_Update_19-1-150400.9.3.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 21 Maintenance Automation 2023-10-13 12:30:12 UTC
SUSE-SU-2023:4071-1: An update that solves 16 vulnerabilities, contains two features and has eight security fixes can now be installed.

Category: security (important)
Bug References: 1152472, 1202845, 1206453, 1213808, 1214928, 1214942, 1214943, 1214944, 1214950, 1214951, 1214954, 1214957, 1214986, 1214988, 1214992, 1214993, 1215322, 1215877, 1215894, 1215895, 1215896, 1215911, 1215915, 1215916
CVE References: CVE-2023-1192, CVE-2023-1206, CVE-2023-1859, CVE-2023-2177, CVE-2023-39192, CVE-2023-39193, CVE-2023-39194, CVE-2023-4155, CVE-2023-42753, CVE-2023-42754, CVE-2023-4389, CVE-2023-4622, CVE-2023-4623, CVE-2023-4881, CVE-2023-4921, CVE-2023-5345
Jira References: PED-2023, PED-2025
Sources used:
openSUSE Leap 15.5 (src): kernel-default-base-5.14.21-150500.55.31.1.150500.6.13.1, kernel-source-5.14.21-150500.55.31.1, kernel-livepatch-SLE15-SP5_Update_6-1-150500.11.3.1, kernel-syms-5.14.21-150500.55.31.1, kernel-obs-build-5.14.21-150500.55.31.1, kernel-obs-qa-5.14.21-150500.55.31.1
SUSE Linux Enterprise Micro 5.5 (src): kernel-default-base-5.14.21-150500.55.31.1.150500.6.13.1
Basesystem Module 15-SP5 (src): kernel-default-base-5.14.21-150500.55.31.1.150500.6.13.1, kernel-source-5.14.21-150500.55.31.1
Development Tools Module 15-SP5 (src): kernel-syms-5.14.21-150500.55.31.1, kernel-obs-build-5.14.21-150500.55.31.1, kernel-source-5.14.21-150500.55.31.1
SUSE Linux Enterprise Live Patching 15-SP5 (src): kernel-livepatch-SLE15-SP5_Update_6-1-150500.11.3.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 22 Maintenance Automation 2023-10-17 08:30:04 UTC
SUSE-SU-2023:4093-1: An update that solves 17 vulnerabilities and has seven security fixes can now be installed.

Category: security (important)
Bug References: 1202845, 1213808, 1214928, 1214940, 1214941, 1214942, 1214943, 1214944, 1214950, 1214951, 1214954, 1214957, 1214986, 1214988, 1214992, 1214993, 1215322, 1215877, 1215894, 1215895, 1215896, 1215911, 1215915, 1215916
CVE References: CVE-2023-1192, CVE-2023-1206, CVE-2023-1859, CVE-2023-2177, CVE-2023-39192, CVE-2023-39193, CVE-2023-39194, CVE-2023-4155, CVE-2023-42753, CVE-2023-42754, CVE-2023-4389, CVE-2023-4563, CVE-2023-4622, CVE-2023-4623, CVE-2023-4881, CVE-2023-4921, CVE-2023-5345
Sources used:
SUSE Linux Enterprise Live Patching 15-SP4 (src): kernel-livepatch-SLE15-SP4-RT_Update_14-1-150400.1.3.1
SUSE Real Time Module 15-SP4 (src): kernel-syms-rt-5.14.21-150400.15.56.1, kernel-source-rt-5.14.21-150400.15.56.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 23 Maintenance Automation 2023-11-06 12:30:02 UTC
SUSE-SU-2023:4072-2: An update that solves 17 vulnerabilities and has seven security fixes can now be installed.

Category: security (important)
Bug References: 1202845, 1213808, 1214928, 1214940, 1214941, 1214942, 1214943, 1214944, 1214950, 1214951, 1214954, 1214957, 1214986, 1214988, 1214992, 1214993, 1215322, 1215877, 1215894, 1215895, 1215896, 1215911, 1215915, 1215916
CVE References: CVE-2023-1192, CVE-2023-1206, CVE-2023-1859, CVE-2023-2177, CVE-2023-39192, CVE-2023-39193, CVE-2023-39194, CVE-2023-4155, CVE-2023-42753, CVE-2023-42754, CVE-2023-4389, CVE-2023-4563, CVE-2023-4622, CVE-2023-4623, CVE-2023-4881, CVE-2023-4921, CVE-2023-5345
Sources used:
openSUSE Leap 15.4 (src): kernel-obs-build-5.14.21-150400.24.92.1, kernel-default-base-5.14.21-150400.24.92.1.150400.24.42.1, kernel-syms-5.14.21-150400.24.92.1, kernel-source-5.14.21-150400.24.92.1, kernel-obs-qa-5.14.21-150400.24.92.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.