Bug 1098012 - Kernel panic after update to 4.4.136-56.1
Kernel panic after update to 4.4.136-56.1
Status: RESOLVED FIXED
Classification: openSUSE
Product: openSUSE Distribution
Classification: openSUSE
Component: Kernel
Leap 42.3
x86-64 openSUSE 42.3
: P5 - None : Critical (vote)
: ---
Assigned To: E-mail List
E-mail List
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2018-06-18 09:49 UTC by Ariel Machado
Modified: 2018-07-03 19:34 UTC (History)
5 users (show)

See Also:
Found By: ---
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments
hwinfo output (1.26 MB, text/plain)
2018-06-18 10:25 UTC, Ariel Machado
Details
kernel panic dump screenshot (3.19 MB, image/jpeg)
2018-06-18 10:38 UTC, Ariel Machado
Details

Note You need to log in before you can comment on or make changes to this bug.
Description Ariel Machado 2018-06-18 09:49:25 UTC
User-Agent:       Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Firefox/60.0
Build Identifier: 

I updated from 4.4.132-53 to 4.4.136-56.1 in my default kernel on my 64-bit  system (Intel(R) Core(TM) i7-6700T CPU @ 2.80GHz).

It will no longer boot showing a kernel panic. The only way to boot is selecting on grub menu the previous kernel version.

Kernel panic - not syncing: Attempted to kill init! exitcode=0x0000000b
CPU: 2 PID: 1 Com: init Not tainted 4.4.136-56-default #1
Hardware name: ECS SF100/SF100, BIOS 5.11 12/09/2015

I take a screenshot of the error that can be attached to this bug-report if needed.


Reproducible: Always

Steps to Reproduce:
1. Update kernel from 4.4.132-53 to 4.4.136-56.1
2. Boot

Actual Results:  
Kernel panic
Comment 1 Andreas Stieger 2018-06-18 10:01:29 UTC
Please compare with messages in bug 1098009. Do they match up?
Comment 2 Takashi Iwai 2018-06-18 10:04:29 UTC
It's very likely the same bug as bug 1098009.

But it's not clear what caused this, as it doesn't appear on every machine, so it must be specific to the hardware.

Please give hardware information, e.g. hwinfo output running on the working kernel.  Please attach the output to Bugzilla.
Comment 3 Ariel Machado 2018-06-18 10:25:35 UTC
Created attachment 774332 [details]
hwinfo output
Comment 4 Ariel Machado 2018-06-18 10:38:17 UTC
Created attachment 774334 [details]
kernel panic dump screenshot

Kernel messages look similar to bug 1098009, same CPU (just minor diffs https://ark.intel.com/compare/88196,88200), different motherboard.
In this attached image shows the messages of the kernel, may be the panic happens after trying to update the microcode?
Comment 5 Marcus Meissner 2018-06-18 11:01:46 UTC
I removed the update from the channel again.
Comment 7 Swamp Workflow Management 2018-06-18 16:50:39 UTC
This is an autogenerated message for OBS integration:
This bug (1098012) was mentioned in
https://build.opensuse.org/request/show/617550 42.3 / kernel-source
Comment 9 Ariel Machado 2018-06-20 09:06:06 UTC
(In reply to Jiri Kosina from comment #13 on bug 1098009)
> David, Ariel, Ruediger, could you please test with kernel (*) from

I confirm that test kernel runs fine on my physical machine i7-6700T.
Tested kernel from http://download.opensuse.org/update/leap/42.3-test/x86_64/kernel-default-4.4.138-59.1.x86_64.rpm
(4.4.138-59-default #1 SMP Mon Jun 18 13:48:42 UTC 2018 (f0b8f6b) x86_64 x86_64 x86_64 GNU/Linux)
Comment 10 Takashi Iwai 2018-06-20 09:15:17 UTC
Thanks, let's close now.
Comment 11 Swamp Workflow Management 2018-06-21 16:18:23 UTC
SUSE-SU-2018:1772-1: An update that solves 6 vulnerabilities and has 47 fixes is now available.

Category: security (important)
Bug References: 1012382,1024718,1031717,1035432,1041740,1045330,1056415,1066223,1068032,1068054,1068951,1070404,1073311,1075428,1076049,1078583,1079152,1080542,1080656,1081500,1081514,1082153,1082504,1082979,1085185,1085308,1086400,1086716,1087036,1087086,1088871,1090435,1090534,1090734,1090955,1091594,1094532,1095042,1095147,1096037,1096140,1096214,1096242,1096281,1096751,1096982,1097234,1097356,1098009,1098012,971975,973378,978907
CVE References: CVE-2017-17741,CVE-2017-18241,CVE-2017-18249,CVE-2018-12233,CVE-2018-3665,CVE-2018-5848
Sources used:
SUSE Linux Enterprise Workstation Extension 12-SP3 (src):    kernel-default-4.4.138-94.39.1
SUSE Linux Enterprise Software Development Kit 12-SP3 (src):    kernel-docs-4.4.138-94.39.1, kernel-obs-build-4.4.138-94.39.1
SUSE Linux Enterprise Server 12-SP3 (src):    kernel-default-4.4.138-94.39.1, kernel-source-4.4.138-94.39.1, kernel-syms-4.4.138-94.39.1
SUSE Linux Enterprise Live Patching 12-SP3 (src):    kgraft-patch-SLE12-SP3_Update_14-1-4.5.1
SUSE Linux Enterprise High Availability 12-SP3 (src):    kernel-default-4.4.138-94.39.1
SUSE Linux Enterprise Desktop 12-SP3 (src):    kernel-default-4.4.138-94.39.1, kernel-source-4.4.138-94.39.1, kernel-syms-4.4.138-94.39.1
SUSE CaaS Platform ALL (src):    kernel-default-4.4.138-94.39.1
Comment 12 Swamp Workflow Management 2018-06-21 16:30:53 UTC
openSUSE-SU-2018:1773-1: An update that solves 11 vulnerabilities and has 66 fixes is now available.

Category: security (important)
Bug References: 1012382,1019695,1019699,1022604,1022607,1022743,1024718,1031492,1031717,1035432,1036215,1041740,1045330,1056415,1066223,1068032,1068054,1068951,1070404,1073311,1075428,1076049,1078583,1079152,1080542,1080656,1081500,1081514,1082153,1082504,1082979,1085308,1086400,1086716,1087007,1087012,1087036,1087082,1087086,1087095,1088871,1090435,1090534,1090734,1090955,1091594,1091815,1092552,1092813,1092903,1093533,1093904,1094177,1094268,1094353,1094356,1094405,1094466,1094532,1094823,1094840,1095042,1095147,1096037,1096140,1096214,1096242,1096281,1096751,1096982,1097234,1097356,1098009,1098012,971975,973378,978907
CVE References: CVE-2017-13305,CVE-2017-17741,CVE-2017-18241,CVE-2017-18249,CVE-2018-1092,CVE-2018-1093,CVE-2018-1094,CVE-2018-12233,CVE-2018-3639,CVE-2018-3665,CVE-2018-5848
Sources used:
openSUSE Leap 42.3 (src):    kernel-debug-4.4.138-59.1, kernel-default-4.4.138-59.1, kernel-docs-4.4.138-59.1, kernel-obs-build-4.4.138-59.1, kernel-obs-qa-4.4.138-59.1, kernel-source-4.4.138-59.1, kernel-syms-4.4.138-59.1, kernel-vanilla-4.4.138-59.1
Comment 14 Swamp Workflow Management 2018-06-26 16:30:42 UTC
SUSE-SU-2018:1816-1: An update that solves 17 vulnerabilities and has 109 fixes is now available.

Category: security (important)
Bug References: 1009062,1012382,1019695,1019699,1022604,1022607,1022743,1024718,1031717,1035432,1036215,1041740,1043598,1044596,1045330,1056415,1056427,1060799,1066223,1068032,1068054,1068951,1070404,1073059,1073311,1075087,1075428,1076049,1076263,1076805,1078583,1079152,1080157,1080542,1080656,1081500,1081514,1081599,1082153,1082299,1082485,1082504,1082962,1082979,1083635,1083650,1083900,1084721,1085185,1085308,1086400,1086716,1087007,1087012,1087036,1087082,1087086,1087095,1088810,1088871,1089023,1089115,1089393,1089895,1090225,1090435,1090534,1090643,1090658,1090663,1090708,1090718,1090734,1090953,1090955,1091041,1091325,1091594,1091728,1091960,1092289,1092497,1092552,1092566,1092772,1092813,1092888,1092904,1092975,1093008,1093035,1093144,1093215,1093533,1093904,1093990,1094019,1094033,1094059,1094177,1094268,1094353,1094356,1094405,1094466,1094532,1094823,1094840,1095042,1095147,1096037,1096140,1096214,1096242,1096281,1096751,1096982,1097234,1097356,1098009,1098012,919144,971975,973378,978907,993388
CVE References: CVE-2017-13305,CVE-2017-17741,CVE-2017-18241,CVE-2017-18249,CVE-2018-1000199,CVE-2018-1065,CVE-2018-1092,CVE-2018-1093,CVE-2018-1094,CVE-2018-1130,CVE-2018-12233,CVE-2018-3639,CVE-2018-3665,CVE-2018-5803,CVE-2018-5848,CVE-2018-7492,CVE-2018-8781
Sources used:
SUSE Linux Enterprise Real Time Extension 12-SP3 (src):    kernel-rt-4.4.138-3.14.1, kernel-rt_debug-4.4.138-3.14.1, kernel-source-rt-4.4.138-3.14.1, kernel-syms-rt-4.4.138-3.14.1