|
Bugzilla – Full Text Bug Listing |
| Summary: | ppc64le Kernel panic - illegal instruction (4) at 7fffb6a4f874 nip 7fffb6a4f874 lr 7fffb6a4380c code 1 in ld64.so.2 | ||
|---|---|---|---|
| Product: | [openSUSE] openSUSE Tumbleweed | Reporter: | Jonathan Rivrain <jrivrain> |
| Component: | Kernel | Assignee: | Richard Biener <rguenther> |
| Status: | VERIFIED FIXED | QA Contact: | E-mail List <qa-bugs> |
| Severity: | Critical | ||
| Priority: | P2 - High | CC: | hector.oron, jrivrain, jslaby, mbrugger, msuchanek, rguenther, santiago.zarate |
| Version: | Current | ||
| Target Milestone: | --- | ||
| Hardware: | PowerPC-64 | ||
| OS: | Other | ||
| Whiteboard: | |||
| Found By: | --- | Services Priority: | |
| Business Priority: | Blocker: | --- | |
| Marketing QA Status: | --- | IT Deployment: | --- |
| Attachments: | serial output | ||
|
Description
Jonathan Rivrain
2023-08-02 17:29:55 UTC
It's not a kernel panic per se. The kernel died because init died. Is this a regression?
Could you identify the illegal instruction? Given:
> illegal instruction (4) at 7fffb1f5f874 nip 7fffb1f5f874 lr 7fffb1f5380c code 1 in ld64.so.2[7fffb1f20000+50000]
it is supposed to be in ld64.so.2 at offset 0x7fffb1f5f874-0x7fffb1f20000 = 0x3f874. (Objdump of the lib around the address would help too.)
If you have glibc-2.37-5.1.ppc64le installed, it is this: 3f874: 66 3b 07 7c mtvsrdd vs0,r7,r7 correct? Either VSX or VEX is not supported by your processor, likely. Can you paste output of /proc/cpuinfo? (In reply to Jiri Slaby from comment #2) > If you have glibc-2.37-5.1.ppc64le installed, it is this: > 3f874: 66 3b 07 7c mtvsrdd vs0,r7,r7 > correct? If so, this address is: $ addr2line -e ld64.so.2 3f874 /usr/src/debug/glibc-2.37/string/../string/memset.c:54 which is: 52 /* Write 8 `op_t' per iteration until less than 8 `op_t' remain. */ 53 xlen = len / (OPSIZ * 8); 54 while (xlen > 0) 55 { 56 ((op_t *) dstp)[0] = cccc; 57 ((op_t *) dstp)[1] = cccc; 58 ((op_t *) dstp)[2] = cccc; 59 ((op_t *) dstp)[3] = cccc; 60 ((op_t *) dstp)[4] = cccc; 61 ((op_t *) dstp)[5] = cccc; 62 ((op_t *) dstp)[6] = cccc; 63 ((op_t *) dstp)[7] = cccc; 64 dstp += 8 * OPSIZ; 65 xlen -= 1; 66 } I.e. the generic memset using special instructions? (I am no ppc expert.) I do not currently have access to workers on openqa.opensuse.org, but I could reproduce this on a power8 machine on OSD, and If I emulate a power8 cpu on my x86_64 laptop, it happens as well. I can provide /proc/cpuinfo from the host where I reproduced it, but I can't do so from the guest, as it crashes right away. Anyway, the qemu command line says "-cpu host" so I assume it's the same.
On openqa the VM is launched as follows
/usr/bin/qemu-system-ppc64 -device VGA,edid=on,xres=1024,yres=768 -g 1024x768 -only-migratable -chardev ringbuf,id=serial0,logfile=serial0,logappend=on -serial chardev:serial0 -audiodev none,id=snd0 -device intel-hda -device hda-output,audiodev=snd0 -global isa-fdc.fdtypeA=none -m 4096 -machine usb=off,cap-cfpc=broken,cap-sbbc=broken,cap-ibs=broken,cap-ccf-assist=off -cpu host -netdev user,id=qanet0 -device virtio-net,netdev=qanet0,mac=52:54:00:12:34:56 -object rng-random,filename=/dev/urandom,id=rng0 -device virtio-rng-pci,rng=rng0 -boot once=d -device nec-usb-xhci -device usb-tablet -device usb-kbd -smp 4 -enable-kvm -no-shutdown -vnc :97,share=force-shared -device virtio-serial -chardev pipe,id=virtio_console,path=virtio_console,logfile=virtio_console.log,logappend=on -device virtconsole,chardev=virtio_console,name=org.openqa.console.virtio_console -chardev pipe,id=virtio_console_user,path=virtio_console_user,logfile=virtio_console_user.log,logappend=on -device virtconsole,chardev=virtio_console_user,name=org.openqa.console.virtio_console_user -chardev socket,path=qmp_socket,server=on,wait=off,id=qmp_socket,logfile=qmp_socket.log,logappend=on -qmp chardev:qmp_socket -S -device virtio-scsi-pci,id=scsi0 -device virtio-scsi-pci,id=scsi1 -blockdev driver=file,node-name=hd0-file,filename=/var/lib/openqa/pool/7/raid/hd0,cache.no-flush=on -blockdev driver=qcow2,node-name=hd0,file=hd0-file,cache.no-flush=on,discard=unmap -device scsi-hd,id=hd0-device-path0,drive=hd0,share-rw=true,bus=scsi0.0,serial=hd0 -device scsi-hd,id=hd0-device-path1,drive=hd0,share-rw=true,bus=scsi1.0,serial=hd0 -blockdev driver=file,node-name=cd0-overlay0-file,filename=/var/lib/openqa/pool/7/raid/cd0-overlay0,cache.no-flush=on -blockdev driver=qcow2,node-name=cd0-overlay0,file=cd0-overlay0-file,cache.no-flush=on,discard=unmap -device scsi-cd,id=cd0-device,drive=cd0-overlay0,serial=cd0
I could reproduce it with this simpler command :
qemu-system-ppc64 -m 4096 -enable-kvm -vga none -nographic -cdrom agama-live.ppc64le-3.0.0-ALP-Build1.3.iso -device virtio-scsi-pci,id=scsi0 -blockdev driver=file,node-name=hd0-file,filename=img.qcow2,cache.no-flush=on -blockdev driver=qcow2,node-name=hd0,file=hd0-file,cache.no-flush=on,discard=unmap -device virtio-blk,id=hd0-device,drive=hd0,serial=hd0 -net nic, -net user,hostfwd=tcp::9091-:9090 -smp 1 -machine usb=off,cap-cfpc=broken,cap-sbbc=broken,cap-ibs=broken,cap-ccf-assist=off -cpu host
CPU INFO:
lscpu ;cat /proc/cpuinfo
Architecture: ppc64le
Byte Order: Little Endian
CPU(s): 128
On-line CPU(s) list: 0,8,16,24,32,40,48,56,64,72,80,88,96,104,112,120
Off-line CPU(s) list: 1-7,9-15,17-23,25-31,33-39,41-47,49-55,57-63,65-71,73-79,81-87,89-95,97-103,105-111,113-119,121-12
7
Thread(s) per core: 1
Core(s) per socket: 4
Socket(s): 4
NUMA node(s): 4
Model: 2.1 (pvr 004b 0201)
Model name: POWER8E (raw), altivec supported
CPU max MHz: 4322.0000
CPU min MHz: 2061.0000
L1d cache: 1 MiB
L1i cache: 512 KiB
L2 cache: 8 MiB
L3 cache: 128 MiB
NUMA node0 CPU(s): 0,8,16,24
NUMA node1 CPU(s): 32,40,48,56
NUMA node16 CPU(s): 64,72,80,88
NUMA node17 CPU(s): 96,104,112,120
Vulnerability Itlb multihit: Not affected
Vulnerability L1tf: Mitigation; RFI Flush
Vulnerability Mds: Not affected
Vulnerability Meltdown: Mitigation; RFI Flush
Vulnerability Mmio stale data: Not affected
Vulnerability Retbleed: Not affected
Vulnerability Spec store bypass: Mitigation; Kernel entry/exit barrier (hwsync)
Vulnerability Spectre v1: Mitigation; __user pointer sanitization
Vulnerability Spectre v2: Vulnerable
Vulnerability Srbds: Not affected
Vulnerability Tsx async abort: Not affected
processor : 0
cpu : POWER8E (raw), altivec supported
clock : 4322.000000MHz
revision : 2.1 (pvr 004b 0201)
processor : 8
cpu : POWER8E (raw), altivec supported
clock : 4322.000000MHz
revision : 2.1 (pvr 004b 0201)
processor : 16
cpu : POWER8E (raw), altivec supported
clock : 4322.000000MHz
revision : 2.1 (pvr 004b 0201)
processor : 24
cpu : POWER8E (raw), altivec supported
clock : 4322.000000MHz
revision : 2.1 (pvr 004b 0201)
processor : 32
cpu : POWER8E (raw), altivec supported
clock : 4322.000000MHz
revision : 2.1 (pvr 004b 0201)
processor : 40
cpu : POWER8E (raw), altivec supported
clock : 4322.000000MHz
revision : 2.1 (pvr 004b 0201)
processor : 48
cpu : POWER8E (raw), altivec supported
clock : 4322.000000MHz
revision : 2.1 (pvr 004b 0201)
processor : 56
cpu : POWER8E (raw), altivec supported
clock : 4322.000000MHz
revision : 2.1 (pvr 004b 0201)
processor : 64
cpu : POWER8E (raw), altivec supported
clock : 4322.000000MHz
revision : 2.1 (pvr 004b 0201)
processor : 72
cpu : POWER8E (raw), altivec supported
clock : 4322.000000MHz
revision : 2.1 (pvr 004b 0201)
processor : 80
cpu : POWER8E (raw), altivec supported
clock : 4322.000000MHz
revision : 2.1 (pvr 004b 0201)
processor : 88
cpu : POWER8E (raw), altivec supported
clock : 4322.000000MHz
revision : 2.1 (pvr 004b 0201)
processor : 96
cpu : POWER8E (raw), altivec supported
clock : 4322.000000MHz
revision : 2.1 (pvr 004b 0201)
processor : 104
cpu : POWER8E (raw), altivec supported
clock : 4322.000000MHz
revision : 2.1 (pvr 004b 0201)
processor : 112
cpu : POWER8E (raw), altivec supported
clock : 4322.000000MHz
revision : 2.1 (pvr 004b 0201)
processor : 120
cpu : POWER8E (raw), altivec supported
clock : 4322.000000MHz
revision : 2.1 (pvr 004b 0201)
timebase : 512000000
platform : PowerNV
model : 8284-22A
machine : PowerNV 8284-22A
firmware : OPAL
MMU : Hash
Tumbleweed requires POWER9. (In reply to Andreas Schwab from comment #5) > Tumbleweed requires POWER9. Thus INVALID. (In reply to Andreas Schwab from comment #5) > Tumbleweed requires POWER9. Why, since when? (In reply to Jiri Slaby from comment #1) > It's not a kernel panic per se. The kernel died because init died. Is this a > regression? > > Could you identify the illegal instruction? Given: > > illegal instruction (4) at 7fffb1f5f874 nip 7fffb1f5f874 lr 7fffb1f5380c code 1 in ld64.so.2[7fffb1f20000+50000] > > it is supposed to be in ld64.so.2 at offset 0x7fffb1f5f874-0x7fffb1f20000 = > 0x3f874. (Objdump of the lib around the address would help too.) How is it possible to get that Objdump in such a state? You get objdump from the object on the disk image, the VM does not need to be running. Anyway, builds on POWER8 work again so this is probably fixed. *** Bug 1213224 has been marked as a duplicate of this bug. *** (In reply to Michal Suchanek from comment #10) > *** Bug 1213224 has been marked as a duplicate of this bug. *** (In reply to Michal Suchanek from comment #7) > (In reply to Andreas Schwab from comment #5) > > Tumbleweed requires POWER9. > > Why, since when? from gcc13.spec %if %{suse_version} >= 1600 --with-cpu=power9 \ --with-tune=power9 \ i.e ALP/TW are Power9 this has been true in gcc13.spec since June 13 - * Raise POWER architecture baseline to power9. [PED-2005] Here's the SR: https://build.opensuse.org/request/show/1097918 That's problematic for Tumbleweed. I would not expect that the few users we have are running the latest hardware, and even our build and test hardware is affected. (In reply to Michal Suchanek from comment #12) > That's problematic for Tumbleweed. > > I would not expect that the few users we have are running the latest > hardware, and even our build and test hardware is affected. I would also expect a big warning/message to the community that it is getting dropped... (in the next release or in X months) (In reply to Santiago Zarate from comment #11) > > Why, since when? > > from gcc13.spec > > %if %{suse_version} >= 1600 --with-cpu=power9 \ --with-tune=power9 \ > i.e ALP/TW are Power9 > this has been true in gcc13.spec since June 13 - * Raise POWER > architecture baseline to power9. [PED-2005] > > Here's the SR: https://build.opensuse.org/request/show/1097918 So this is gcc fellows call... PED-2005 is ALP, not TW. Please switch TW to POWER8 again (keeping the ieee128 floats). (In reply to Michal Suchanek from comment #15) > PED-2005 is ALP, not TW. > > Please switch TW to POWER8 again (keeping the ieee128 floats). Factory first? Anyway, please sort this out upwards in the foodchain, it doesn't help to get differing directions from multiple sources. Where exactly should this be sorted for Factory PowerPC? (In reply to Richard Biener from comment #16) > (In reply to Michal Suchanek from comment #15) > > PED-2005 is ALP, not TW. > > > > Please switch TW to POWER8 again (keeping the ieee128 floats). > > Factory first? Nope. ALP shall not disable functionality in TW. Recall, we already were here when they wanted x86_64-v3-only tumbleweed due to ALP. It's non-sense. Further, for example, kernel has much wider HW support in TW than in ALP. That's natural. So if this was an ALP PED, please keep it ALP-only. (In reply to Jiri Slaby from comment #18) > Further, for example, kernel has much wider HW support in TW than in ALP. > That's natural. So if this was an ALP PED, please keep it ALP-only. Also, let me note another example/PED -- we are likely going to disable x86_32 userspace support in ALP's 64-bit kernels. Definitely, I won't allow this to happen in TW (at least nowadays). So ALP PEDs are completely disconnected from TW demands/support. This is an autogenerated message for OBS integration: This bug (1213915) was mentioned in https://build.opensuse.org/request/show/1105273 Factory / gcc13 This is an autogenerated message for OBS integration: This bug (1213915) was mentioned in https://build.opensuse.org/request/show/1105412 Factory / gcc13 This is an autogenerated message for OBS integration: This bug (1213915) was mentioned in https://build.opensuse.org/request/show/1107917 Factory / gcc13 gcc change made it to Factory. SUSE-SU-2023:4162-1: An update that solves one vulnerability, contains five features and has seven security fixes can now be installed. Category: security (important) Bug References: 1206480, 1206684, 1210557, 1211427, 1212101, 1213915, 1214052, 1214460 CVE References: CVE-2023-4039 Jira References: PED-153, PED-2005, PED-252, PED-253, PED-6584 Sources used: openSUSE Leap Micro 5.3 (src): gcc13-13.2.1+git7813-150000.1.3.3 openSUSE Leap Micro 5.4 (src): gcc13-13.2.1+git7813-150000.1.3.3 openSUSE Leap 15.4 (src): gcc13-13.2.1+git7813-150000.1.3.3, cross-nvptx-gcc13-13.2.1+git7813-150000.1.3.2 openSUSE Leap 15.5 (src): gcc13-13.2.1+git7813-150000.1.3.3, cross-nvptx-gcc13-13.2.1+git7813-150000.1.3.2 SUSE Linux Enterprise Server 15 SP2 (src): gcc13-13.2.1+git7813-150000.1.3.3 SUSE Linux Enterprise Server 15 SP3 (src): gcc13-13.2.1+git7813-150000.1.3.3 SUSE Linux Enterprise High Performance Computing 15 SP4 (src): gcc13-13.2.1+git7813-150000.1.3.3 SUSE Linux Enterprise Server 15 SP4 (src): gcc13-13.2.1+git7813-150000.1.3.3 SUSE Manager Server 4.3 (src): gcc13-13.2.1+git7813-150000.1.3.3 SUSE Linux Enterprise Server for SAP Applications 15 SP4 (src): gcc13-13.2.1+git7813-150000.1.3.3 SUSE Linux Enterprise Desktop 15 SP4 (src): gcc13-13.2.1+git7813-150000.1.3.3 SUSE Manager Retail Branch Server 4.3 (src): gcc13-13.2.1+git7813-150000.1.3.3 SUSE Manager Proxy 4.3 (src): gcc13-13.2.1+git7813-150000.1.3.3 SUSE Linux Enterprise High Performance Computing 15 SP5 (src): gcc13-13.2.1+git7813-150000.1.3.3 SUSE Linux Enterprise Server 15 SP5 (src): gcc13-13.2.1+git7813-150000.1.3.3 SUSE Linux Enterprise Server for SAP Applications 15 SP5 (src): gcc13-13.2.1+git7813-150000.1.3.3 SUSE Linux Enterprise Desktop 15 SP5 (src): gcc13-13.2.1+git7813-150000.1.3.3 SUSE Linux Enterprise Micro for Rancher 5.3 (src): gcc13-13.2.1+git7813-150000.1.3.3 SUSE Linux Enterprise Micro 5.3 (src): gcc13-13.2.1+git7813-150000.1.3.3 SUSE Linux Enterprise Micro for Rancher 5.4 (src): gcc13-13.2.1+git7813-150000.1.3.3 SUSE Linux Enterprise Micro 5.4 (src): gcc13-13.2.1+git7813-150000.1.3.3 SUSE Linux Enterprise Micro 5.5 (src): gcc13-13.2.1+git7813-150000.1.3.3 Basesystem Module 15-SP4 (src): gcc13-13.2.1+git7813-150000.1.3.3 Basesystem Module 15-SP5 (src): gcc13-13.2.1+git7813-150000.1.3.3 Development Tools Module 15-SP4 (src): gcc13-13.2.1+git7813-150000.1.3.3, cross-nvptx-gcc13-13.2.1+git7813-150000.1.3.2 Development Tools Module 15-SP5 (src): gcc13-13.2.1+git7813-150000.1.3.3, cross-nvptx-gcc13-13.2.1+git7813-150000.1.3.2 SUSE Package Hub 15 15-SP4 (src): gcc13-13.2.1+git7813-150000.1.3.3 SUSE Package Hub 15 15-SP5 (src): gcc13-13.2.1+git7813-150000.1.3.3 SUSE Manager Proxy 4.2 (src): gcc13-13.2.1+git7813-150000.1.3.3 SUSE Manager Retail Branch Server 4.2 (src): gcc13-13.2.1+git7813-150000.1.3.3 SUSE Manager Server 4.2 (src): gcc13-13.2.1+git7813-150000.1.3.3 SUSE Linux Enterprise Micro 5.1 (src): gcc13-13.2.1+git7813-150000.1.3.3 SUSE Linux Enterprise Micro 5.2 (src): gcc13-13.2.1+git7813-150000.1.3.3 SUSE Linux Enterprise Micro for Rancher 5.2 (src): gcc13-13.2.1+git7813-150000.1.3.3 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. SUSE-SU-2023:4287-1: An update that solves one vulnerability, contains five features and has seven security fixes can now be installed. Category: security (important) Bug References: 1206480, 1206684, 1210557, 1211427, 1212101, 1213915, 1214052, 1214460 CVE References: CVE-2023-4039 Jira References: PED-153, PED-2005, PED-252, PED-253, PED-6584 Sources used: Toolchain Module 12 (src): gcc13-13.2.1+git7813-1.6.1, cross-nvptx-gcc13-13.2.1+git7813-1.6.1 SUSE Linux Enterprise High Performance Computing 12 SP5 (src): gcc13-13.2.1+git7813-1.6.1 SUSE Linux Enterprise Server 12 SP5 (src): gcc13-13.2.1+git7813-1.6.1 SUSE Linux Enterprise Server for SAP Applications 12 SP5 (src): gcc13-13.2.1+git7813-1.6.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. SUSE-SU-2023:4287-2: An update that solves one vulnerability, contains five features and has seven security fixes can now be installed. Category: security (important) Bug References: 1206480, 1206684, 1210557, 1211427, 1212101, 1213915, 1214052, 1214460 CVE References: CVE-2023-4039 Jira References: PED-153, PED-2005, PED-252, PED-253, PED-6584 Sources used: Toolchain Module 12 (src): cross-nvptx-gcc13-13.2.1+git7813-1.6.1, gcc13-13.2.1+git7813-1.6.1 SUSE Linux Enterprise High Performance Computing 12 SP5 (src): gcc13-13.2.1+git7813-1.6.1 SUSE Linux Enterprise Server 12 SP5 (src): gcc13-13.2.1+git7813-1.6.1 SUSE Linux Enterprise Server for SAP Applications 12 SP5 (src): gcc13-13.2.1+git7813-1.6.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. SUSE-SU-2023:4458-1: An update that solves one vulnerability, contains five features and has nine security fixes can now be installed. Category: security (important) Bug References: 1206480, 1206684, 1210557, 1211427, 1212101, 1213915, 1214052, 1214460, 1215427, 1216664 CVE References: CVE-2023-4039 Jira References: PED-153, PED-2005, PED-252, PED-253, PED-6584 Sources used: openSUSE Leap Micro 5.3 (src): gcc13-13.2.1+git7813-150000.1.6.1 openSUSE Leap Micro 5.4 (src): gcc13-13.2.1+git7813-150000.1.6.1 openSUSE Leap 15.4 (src): cross-nvptx-gcc13-13.2.1+git7813-150000.1.6.1, gcc13-13.2.1+git7813-150000.1.6.1 openSUSE Leap 15.5 (src): cross-nvptx-gcc13-13.2.1+git7813-150000.1.6.1, gcc13-13.2.1+git7813-150000.1.6.1 SUSE Linux Enterprise Server 15 SP1 (src): gcc13-13.2.1+git7813-150000.1.6.1 SUSE Linux Enterprise Server 15 SP2 (src): gcc13-13.2.1+git7813-150000.1.6.1 SUSE Linux Enterprise Server 15 SP3 (src): gcc13-13.2.1+git7813-150000.1.6.1 SUSE Linux Enterprise High Performance Computing 15 SP4 (src): gcc13-13.2.1+git7813-150000.1.6.1 SUSE Linux Enterprise Server 15 SP4 (src): gcc13-13.2.1+git7813-150000.1.6.1 SUSE Manager Server 4.3 (src): gcc13-13.2.1+git7813-150000.1.6.1 SUSE Linux Enterprise Server for SAP Applications 15 SP4 (src): gcc13-13.2.1+git7813-150000.1.6.1 SUSE Linux Enterprise Desktop 15 SP4 (src): gcc13-13.2.1+git7813-150000.1.6.1 SUSE Manager Retail Branch Server 4.3 (src): gcc13-13.2.1+git7813-150000.1.6.1 SUSE Manager Proxy 4.3 (src): gcc13-13.2.1+git7813-150000.1.6.1 SUSE Linux Enterprise High Performance Computing 15 SP5 (src): gcc13-13.2.1+git7813-150000.1.6.1 SUSE Linux Enterprise Server 15 SP5 (src): gcc13-13.2.1+git7813-150000.1.6.1 SUSE Linux Enterprise Server for SAP Applications 15 SP5 (src): gcc13-13.2.1+git7813-150000.1.6.1 SUSE Linux Enterprise Desktop 15 SP5 (src): gcc13-13.2.1+git7813-150000.1.6.1 SUSE Linux Enterprise Micro for Rancher 5.3 (src): gcc13-13.2.1+git7813-150000.1.6.1 SUSE Linux Enterprise Micro 5.3 (src): gcc13-13.2.1+git7813-150000.1.6.1 SUSE Linux Enterprise Micro for Rancher 5.4 (src): gcc13-13.2.1+git7813-150000.1.6.1 SUSE Linux Enterprise Micro 5.4 (src): gcc13-13.2.1+git7813-150000.1.6.1 SUSE Linux Enterprise Micro 5.5 (src): gcc13-13.2.1+git7813-150000.1.6.1 Basesystem Module 15-SP4 (src): gcc13-13.2.1+git7813-150000.1.6.1 Basesystem Module 15-SP5 (src): gcc13-13.2.1+git7813-150000.1.6.1 Development Tools Module 15-SP4 (src): cross-nvptx-gcc13-13.2.1+git7813-150000.1.6.1, gcc13-13.2.1+git7813-150000.1.6.1 Development Tools Module 15-SP5 (src): cross-nvptx-gcc13-13.2.1+git7813-150000.1.6.1, gcc13-13.2.1+git7813-150000.1.6.1 SUSE Package Hub 15 15-SP4 (src): gcc13-13.2.1+git7813-150000.1.6.1 SUSE Package Hub 15 15-SP5 (src): gcc13-13.2.1+git7813-150000.1.6.1 SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (src): cross-nvptx-gcc13-13.2.1+git7813-150000.1.6.1, gcc13-13.2.1+git7813-150000.1.6.1 SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (src): cross-nvptx-gcc13-13.2.1+git7813-150000.1.6.1, gcc13-13.2.1+git7813-150000.1.6.1 SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (src): cross-nvptx-gcc13-13.2.1+git7813-150000.1.6.1, gcc13-13.2.1+git7813-150000.1.6.1 SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (src): cross-nvptx-gcc13-13.2.1+git7813-150000.1.6.1, gcc13-13.2.1+git7813-150000.1.6.1 SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (src): cross-nvptx-gcc13-13.2.1+git7813-150000.1.6.1, gcc13-13.2.1+git7813-150000.1.6.1 SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (src): cross-nvptx-gcc13-13.2.1+git7813-150000.1.6.1, gcc13-13.2.1+git7813-150000.1.6.1 SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (src): cross-nvptx-gcc13-13.2.1+git7813-150000.1.6.1, gcc13-13.2.1+git7813-150000.1.6.1 SUSE Linux Enterprise Server for SAP Applications 15 SP1 (src): cross-nvptx-gcc13-13.2.1+git7813-150000.1.6.1, gcc13-13.2.1+git7813-150000.1.6.1 SUSE Linux Enterprise Server for SAP Applications 15 SP2 (src): cross-nvptx-gcc13-13.2.1+git7813-150000.1.6.1, gcc13-13.2.1+git7813-150000.1.6.1 SUSE Linux Enterprise Server for SAP Applications 15 SP3 (src): cross-nvptx-gcc13-13.2.1+git7813-150000.1.6.1, gcc13-13.2.1+git7813-150000.1.6.1 SUSE Enterprise Storage 7.1 (src): cross-nvptx-gcc13-13.2.1+git7813-150000.1.6.1, gcc13-13.2.1+git7813-150000.1.6.1 SUSE CaaS Platform 4.0 (src): cross-nvptx-gcc13-13.2.1+git7813-150000.1.6.1, gcc13-13.2.1+git7813-150000.1.6.1 SUSE Linux Enterprise Micro 5.1 (src): gcc13-13.2.1+git7813-150000.1.6.1 SUSE Linux Enterprise Micro 5.2 (src): gcc13-13.2.1+git7813-150000.1.6.1 SUSE Linux Enterprise Micro for Rancher 5.2 (src): gcc13-13.2.1+git7813-150000.1.6.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. SUSE-SU-2023:4480-1: An update that solves one vulnerability, contains five features and has nine security fixes can now be installed. Category: security (important) Bug References: 1206480, 1206684, 1210557, 1211427, 1212101, 1213915, 1214052, 1214460, 1215427, 1216664 CVE References: CVE-2023-4039 Jira References: PED-153, PED-2005, PED-252, PED-253, PED-6584 Sources used: Toolchain Module 12 (src): gcc13-13.2.1+git7813-1.10.1, cross-nvptx-gcc13-13.2.1+git7813-1.10.1 SUSE Linux Enterprise High Performance Computing 12 SP5 (src): gcc13-13.2.1+git7813-1.10.1 SUSE Linux Enterprise Server 12 SP5 (src): gcc13-13.2.1+git7813-1.10.1 SUSE Linux Enterprise Server for SAP Applications 12 SP5 (src): gcc13-13.2.1+git7813-1.10.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. SUSE-SU-2024:0045-1: An update that solves one vulnerability, contains five features and has nine security fixes can now be installed. Category: security (important) Bug References: 1206480, 1206684, 1210557, 1211427, 1212101, 1213915, 1214052, 1214460, 1215427, 1216664 CVE References: CVE-2023-4039 Jira References: PED-153, PED-2005, PED-252, PED-253, PED-6584 Sources used: SUSE Linux Enterprise Micro for Rancher 5.4 (src): gcc13-13.2.1+git7813-150000.1.6.1 SUSE Linux Enterprise Micro 5.4 (src): gcc13-13.2.1+git7813-150000.1.6.1 SUSE Linux Enterprise Micro 5.5 (src): gcc13-13.2.1+git7813-150000.1.6.1 SUSE Linux Enterprise Micro for Rancher 5.3 (src): gcc13-13.2.1+git7813-150000.1.6.1 SUSE Linux Enterprise Micro 5.3 (src): gcc13-13.2.1+git7813-150000.1.6.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. Openqa jobs are now working on power8 workers. |