Bugzilla – Bug 1098012
Kernel panic after update to 4.4.136-56.1
Last modified: 2018-07-03 19:34:45 UTC
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Firefox/60.0 Build Identifier: I updated from 4.4.132-53 to 4.4.136-56.1 in my default kernel on my 64-bit system (Intel(R) Core(TM) i7-6700T CPU @ 2.80GHz). It will no longer boot showing a kernel panic. The only way to boot is selecting on grub menu the previous kernel version. Kernel panic - not syncing: Attempted to kill init! exitcode=0x0000000b CPU: 2 PID: 1 Com: init Not tainted 4.4.136-56-default #1 Hardware name: ECS SF100/SF100, BIOS 5.11 12/09/2015 I take a screenshot of the error that can be attached to this bug-report if needed. Reproducible: Always Steps to Reproduce: 1. Update kernel from 4.4.132-53 to 4.4.136-56.1 2. Boot Actual Results: Kernel panic
Please compare with messages in bug 1098009. Do they match up?
It's very likely the same bug as bug 1098009. But it's not clear what caused this, as it doesn't appear on every machine, so it must be specific to the hardware. Please give hardware information, e.g. hwinfo output running on the working kernel. Please attach the output to Bugzilla.
Created attachment 774332 [details] hwinfo output
Created attachment 774334 [details] kernel panic dump screenshot Kernel messages look similar to bug 1098009, same CPU (just minor diffs https://ark.intel.com/compare/88196,88200), different motherboard. In this attached image shows the messages of the kernel, may be the panic happens after trying to update the microcode?
I removed the update from the channel again.
This is an autogenerated message for OBS integration: This bug (1098012) was mentioned in https://build.opensuse.org/request/show/617550 42.3 / kernel-source
(In reply to Jiri Kosina from comment #13 on bug 1098009) > David, Ariel, Ruediger, could you please test with kernel (*) from I confirm that test kernel runs fine on my physical machine i7-6700T. Tested kernel from http://download.opensuse.org/update/leap/42.3-test/x86_64/kernel-default-4.4.138-59.1.x86_64.rpm (4.4.138-59-default #1 SMP Mon Jun 18 13:48:42 UTC 2018 (f0b8f6b) x86_64 x86_64 x86_64 GNU/Linux)
Thanks, let's close now.
SUSE-SU-2018:1772-1: An update that solves 6 vulnerabilities and has 47 fixes is now available. Category: security (important) Bug References: 1012382,1024718,1031717,1035432,1041740,1045330,1056415,1066223,1068032,1068054,1068951,1070404,1073311,1075428,1076049,1078583,1079152,1080542,1080656,1081500,1081514,1082153,1082504,1082979,1085185,1085308,1086400,1086716,1087036,1087086,1088871,1090435,1090534,1090734,1090955,1091594,1094532,1095042,1095147,1096037,1096140,1096214,1096242,1096281,1096751,1096982,1097234,1097356,1098009,1098012,971975,973378,978907 CVE References: CVE-2017-17741,CVE-2017-18241,CVE-2017-18249,CVE-2018-12233,CVE-2018-3665,CVE-2018-5848 Sources used: SUSE Linux Enterprise Workstation Extension 12-SP3 (src): kernel-default-4.4.138-94.39.1 SUSE Linux Enterprise Software Development Kit 12-SP3 (src): kernel-docs-4.4.138-94.39.1, kernel-obs-build-4.4.138-94.39.1 SUSE Linux Enterprise Server 12-SP3 (src): kernel-default-4.4.138-94.39.1, kernel-source-4.4.138-94.39.1, kernel-syms-4.4.138-94.39.1 SUSE Linux Enterprise Live Patching 12-SP3 (src): kgraft-patch-SLE12-SP3_Update_14-1-4.5.1 SUSE Linux Enterprise High Availability 12-SP3 (src): kernel-default-4.4.138-94.39.1 SUSE Linux Enterprise Desktop 12-SP3 (src): kernel-default-4.4.138-94.39.1, kernel-source-4.4.138-94.39.1, kernel-syms-4.4.138-94.39.1 SUSE CaaS Platform ALL (src): kernel-default-4.4.138-94.39.1
openSUSE-SU-2018:1773-1: An update that solves 11 vulnerabilities and has 66 fixes is now available. Category: security (important) Bug References: 1012382,1019695,1019699,1022604,1022607,1022743,1024718,1031492,1031717,1035432,1036215,1041740,1045330,1056415,1066223,1068032,1068054,1068951,1070404,1073311,1075428,1076049,1078583,1079152,1080542,1080656,1081500,1081514,1082153,1082504,1082979,1085308,1086400,1086716,1087007,1087012,1087036,1087082,1087086,1087095,1088871,1090435,1090534,1090734,1090955,1091594,1091815,1092552,1092813,1092903,1093533,1093904,1094177,1094268,1094353,1094356,1094405,1094466,1094532,1094823,1094840,1095042,1095147,1096037,1096140,1096214,1096242,1096281,1096751,1096982,1097234,1097356,1098009,1098012,971975,973378,978907 CVE References: CVE-2017-13305,CVE-2017-17741,CVE-2017-18241,CVE-2017-18249,CVE-2018-1092,CVE-2018-1093,CVE-2018-1094,CVE-2018-12233,CVE-2018-3639,CVE-2018-3665,CVE-2018-5848 Sources used: openSUSE Leap 42.3 (src): kernel-debug-4.4.138-59.1, kernel-default-4.4.138-59.1, kernel-docs-4.4.138-59.1, kernel-obs-build-4.4.138-59.1, kernel-obs-qa-4.4.138-59.1, kernel-source-4.4.138-59.1, kernel-syms-4.4.138-59.1, kernel-vanilla-4.4.138-59.1
SUSE-SU-2018:1816-1: An update that solves 17 vulnerabilities and has 109 fixes is now available. Category: security (important) Bug References: 1009062,1012382,1019695,1019699,1022604,1022607,1022743,1024718,1031717,1035432,1036215,1041740,1043598,1044596,1045330,1056415,1056427,1060799,1066223,1068032,1068054,1068951,1070404,1073059,1073311,1075087,1075428,1076049,1076263,1076805,1078583,1079152,1080157,1080542,1080656,1081500,1081514,1081599,1082153,1082299,1082485,1082504,1082962,1082979,1083635,1083650,1083900,1084721,1085185,1085308,1086400,1086716,1087007,1087012,1087036,1087082,1087086,1087095,1088810,1088871,1089023,1089115,1089393,1089895,1090225,1090435,1090534,1090643,1090658,1090663,1090708,1090718,1090734,1090953,1090955,1091041,1091325,1091594,1091728,1091960,1092289,1092497,1092552,1092566,1092772,1092813,1092888,1092904,1092975,1093008,1093035,1093144,1093215,1093533,1093904,1093990,1094019,1094033,1094059,1094177,1094268,1094353,1094356,1094405,1094466,1094532,1094823,1094840,1095042,1095147,1096037,1096140,1096214,1096242,1096281,1096751,1096982,1097234,1097356,1098009,1098012,919144,971975,973378,978907,993388 CVE References: CVE-2017-13305,CVE-2017-17741,CVE-2017-18241,CVE-2017-18249,CVE-2018-1000199,CVE-2018-1065,CVE-2018-1092,CVE-2018-1093,CVE-2018-1094,CVE-2018-1130,CVE-2018-12233,CVE-2018-3639,CVE-2018-3665,CVE-2018-5803,CVE-2018-5848,CVE-2018-7492,CVE-2018-8781 Sources used: SUSE Linux Enterprise Real Time Extension 12-SP3 (src): kernel-rt-4.4.138-3.14.1, kernel-rt_debug-4.4.138-3.14.1, kernel-source-rt-4.4.138-3.14.1, kernel-syms-rt-4.4.138-3.14.1