Bugzilla – Bug 1201644
Kernel crashes on Dell PowerEdge R340 and R440 after latest kernel upgrade
Last modified: 2022-09-01 18:05:34 UTC
On several Dell PowerEdge Servers that ran without problems on 15.3 for a year we now have crashes on boot after upgrading to 5.3.18-150300.59.81.1. Sometimes it's barely possible to login before the kernel crashes. Booting with the last kernel (.76) works flawlessly. Firmware- and BIOS Upgrades did not help to solve this. The message before the crash in /var/log/messages on one machine is: 2022-07-19T13:39:27.440906+02:00 hostname kernel: [ 50.541883] BUG: kernel NULL pointer dereference, address: 0000000000000000 2022-07-19T13:39:27.440917+02:00 hostname kernel: [ 50.541887] #PF: supervisor instruction fetch in kernel mode 2022-07-19T13:39:27.440918+02:00 hostname kernel: [ 50.541888] #PF: error_code(0x0010) - not-present page 2022-07-19T13:39:27.440919+02:00 hostname kernel: [ 50.541890] PGD 0 P4D 0 2022-07-19T13:39:27.440919+02:00 hostname kernel: [ 50.541891] Oops: 0010 [#2] SMP PTI 2022-07-19T13:39:27.440920+02:00 hostname kernel: [ 50.541893] CPU: 0 PID: 6879 Comm: iptables Tainted: G D X N 5.3.18-150300.59.81-default #1 SLE15-SP3 2022-07-19T13:39:27.440920+02:00 hostname kernel: [ 50.541895] Hardware name: Dell Inc. PowerEdge R340/045M96, BIOS 2.9.1 03/23/2022 2022-07-19T13:39:27.440920+02:00 hostname kernel: [ 50.541898] RIP: 0010:0x0 2022-07-19T13:39:27.440922+02:00 hostname kernel: [ 50.541900] Code: Bad RIP value. 2022-07-19T13:39:27.440922+02:00 hostname kernel: [ 50.541901] RSP: 0000:fffffe0000009ee0 EFLAGS: 00010046 2022-07-19T13:39:27.440922+02:00 hostname kernel: [ 50.541903] RAX: 0000000000000001 RBX: ffff99f41e800000 RCX: 0000000000000048 2022-07-19T13:39:27.440923+02:00 hostname kernel: [ 50.541904] RDX: 0000000000000000 RSI: ffffffffb9c018af RDI: 00005586ead591a0 2022-07-19T13:39:27.440923+02:00 hostname kernel: [ 50.541906] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 2022-07-19T13:39:27.440924+02:00 hostname kernel: [ 50.541907] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 2022-07-19T13:39:27.440924+02:00 hostname kernel: [ 50.541909] R13: 0000000000000000 R14: 0000000858600001 R15: 0000000000000001 2022-07-19T13:39:27.440924+02:00 hostname kernel: [ 50.541911] FS: 00007ffa5ea22440(0000) GS:ffff99f41e800000(0000) knlGS:0000000000000000 2022-07-19T13:39:27.440925+02:00 hostname kernel: [ 50.541912] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 2022-07-19T13:39:27.440925+02:00 hostname kernel: [ 50.541914] CR2: ffffffffffffffd6 CR3: 0000000858600001 CR4: 00000000003706f0 2022-07-19T13:39:27.440925+02:00 hostname kernel: [ 50.541915] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 2022-07-19T13:39:27.440926+02:00 hostname kernel: [ 50.541917] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 2022-07-19T13:39:27.440926+02:00 hostname kernel: [ 50.541918] Call Trace: 2022-07-19T13:39:27.440926+02:00 hostname kernel: [ 50.541920] <NMI> 2022-07-19T13:39:27.440927+02:00 hostname kernel: [ 50.541924] ? end_repeat_nmi+0x7/0x6d 2022-07-19T13:39:27.440927+02:00 hostname kernel: [ 50.541926] ? page_fault+0x8/0x50 2022-07-19T13:39:27.440927+02:00 hostname kernel: [ 50.541928] </NMI> 2022-07-19T13:39:27.440928+02:00 hostname kernel: [ 50.541929] <ENTRY_TRAMPOLINE> 2022-07-19T13:39:27.440928+02:00 hostname kernel: [ 50.541931] ? error_entry+0x8b/0x150 2022-07-19T13:39:27.440928+02:00 hostname kernel: [ 50.541933] ? page_fault+0x8/0x50 2022-07-19T13:39:27.440929+02:00 hostname kernel: [ 50.541935] </ENTRY_TRAMPOLINE> 2022-07-19T13:39:27.440929+02:00 hostname kernel: [ 50.541936] Modules linked in: xt_policy xt_recent nf_log_ipv6 xt_MASQUERADE xt_limit xt_nat nf_log_ipv4 nf_log_common iptable_nat xt_LOG mpt3sas raid_class scfkill xt_pkttype xt_tcpudp ip6t_REJECT ipt_REJECT iptable_filter bpfilter ip6table_mangle nf_conntrack_netbios_ns nf_conntrack_broadcast nf_nat_ftp nf_nat nf_conntrack_ftp ip_tables xt_conntrack nf_conntrack nf_(X) dmi_sysfs msr intel_rapl_msr intel_rapl_common intel_pmc_core_pltdrv(N) intel_pmc_core x86_pkg_temp_thermal intel_powerclamp coretemp kvm_intel iTCO_wdt intel_pmc_bxt iTCO_vendor_support kvm dcdbas(X) mgag20_kms_helper idma64 aesni_intel tg3 cec rc_core cdc_ether syscopyarea usbnet crypto_simd mei_me cryptd sysfillrect sysimgblt mii intel_lpss_pci i40e pcspkr fb_sys_fops libphy i2c_i801 ipmi_si glue_helper 2022-07-19T13:39:27.440930+02:00 hostname kernel: [ 50.541953] intel_lpss mei ipmi_devintf ipmi_msghandler intel_pch_thermal ie31200_edac ac button fuse drm configfs btrfs libcrc32c xor raid6_pq sd_mod t10_pi video pinctrl_cannonlake sg dm_multipath dm_mod scsi_dh_rdac scsi_dh_emc scsi_dh_alua scsi_mod 2022-07-19T13:39:27.440930+02:00 hostname kernel: [ 50.541975] Supported: No, Unsupported modules are loaded 2022-07-19T13:39:27.440930+02:00 hostname kernel: [ 50.541977] CR2: 0000000000000000 2022-07-19T13:39:27.440931+02:00 hostname kernel: [ 50.541978] ---[ end trace 929840a74a61d4f6 ]--- 2022-07-19T13:39:27.440931+02:00 hostname kernel: [ 50.544609] RIP: 0010:0x0 2022-07-19T13:39:27.440931+02:00 hostname kernel: [ 50.544612] Code: Bad RIP value. 2022-07-19T13:39:27.440932+02:00 hostname kernel: [ 50.544613] RSP: 0018:fffffe000018aee0 EFLAGS: 00010046 2022-07-19T13:39:27.440932+02:00 hostname kernel: [ 50.544615] RAX: 0000000000000001 RBX: ffff99f41e9c0000 RCX: 0000000000000048 2022-07-19T13:39:27.440932+02:00 hostname kernel: [ 50.544617] RDX: 0000000000000000 RSI: ffffffffb9c018af RDI: ffff99ecc7152800 2022-07-19T13:39:27.440933+02:00 hostname kernel: [ 50.544618] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 2022-07-19T13:39:27.440933+02:00 hostname kernel: [ 50.544620] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 2022-07-19T13:39:27.440933+02:00 hostname kernel: [ 50.544621] R13: 0000000000000000 R14: 0000000847cd8005 R15: 0000000000000001 2022-07-19T13:39:27.440934+02:00 hostname kernel: [ 50.544623] FS: 00007ffa5ea22440(0000) GS:ffff99f41e800000(0000) knlGS:0000000000000000 2022-07-19T13:39:27.440934+02:00 hostname kernel: [ 50.544625] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 2022-07-19T13:39:27.440934+02:00 hostname kernel: [ 50.544626] CR2: ffffffffffffffd6 CR3: 0000000858600001 CR4: 00000000003706f0 2022-07-19T13:39:27.440934+02:00 hostname kernel: [ 50.544642] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 2022-07-19T13:39:27.440935+02:00 hostname kernel: [ 50.544643] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Same here on HP Z 240. Working with kernel 5.3.18-150300.59.81.1 is not possible, booting with 5.3.18-150300.59.76.1 seems to be ok. During first boot after upgrade to 5.3.18-150300.59.81.1 purge old kernels takes much longer than expected and obviously didn't succeed: 2022-07-19T11:26:14.838055+02:00 localhost zypper[1165]: (5/5) Removing kernel-default-5.3.18-150300.59.71.2.x86_64 [....error] 2022-07-19T11:26:14.838102+02:00 localhost zypper[1165]: Removal of (604)kernel-default-5.3.18-150300.59.71.2.x86_64(@System) failed: 2022-07-19T11:26:14.838144+02:00 localhost zypper[1165]: Error: Subprocess failed. Error: RPM failed: Command was killed by signal 9 (Killed; Out of memory?). 2022-07-19T11:26:14.838183+02:00 localhost zypper[1165]: Abort, retry, ignore? [a/r/i] (a): a 2022-07-19T11:26:14.839147+02:00 localhost zypper[1165]: Problem occurred during or after installation or removal of packages: 2022-07-19T11:26:14.839190+02:00 localhost zypper[1165]: Installation has been aborted as directed. 2022-07-19T11:26:14.839226+02:00 localhost zypper[1165]: Please see the above error message for a hint. 2022-07-19T11:26:14.857411+02:00 localhost systemd[1]: purge-kernels.service: Succeeded. 2022-07-19T11:26:14.857509+02:00 localhost systemd[1]: Finished Purge old kernels. And here the messages about the BUG: kernel NULL pointer dereference: 2022-07-19T11:27:09.640166+02:00 localhost kernel: [ 105.811063] BUG: kernel NULL pointer dereference, address: 0000000000000000 2022-07-19T11:27:09.640176+02:00 localhost kernel: [ 105.811067] #PF: supervisor instruction fetch in kernel mode 2022-07-19T11:27:09.640177+02:00 localhost kernel: [ 105.811068] #PF: error_code(0x0010) - not-present page 2022-07-19T11:27:09.640178+02:00 localhost kernel: [ 105.811070] PGD 0 P4D 0 2022-07-19T11:27:09.640178+02:00 localhost kernel: [ 105.811072] Oops: 0010 [#3] SMP PTI 2022-07-19T11:27:09.640178+02:00 localhost kernel: [ 105.811074] CPU: 7 PID: 14589 Comm: single Tainted: P D OE X N 5.3.18-150300.59.81-default #1 SLE15-SP3 2022-07-19T11:27:09.640179+02:00 localhost kernel: [ 105.811076] Hardware name: HP HP Z240 Tower Workstation/802F, BIOS N51 Ver. 01.63 10/05/2017
Same here on a simple desktop (Fujitsu P958) with kernel 5.3.18-150300.59.81: crashes after some minutes. Reverting to previous kernel (5.3.18-150300.59.76): ok.
Could you provide the full kernel log please? Boris, faulting from the asm glue code sounds suspicious and it would suggest recent RetBleed related changes. Could you have a look please?
Does booting with spectre_v2=off fix the problems?
Ok, it is probably semi-stab in the dark but can folks try this kernel: https://download.opensuse.org/repositories/home:/bpetkov:/15sp3/pool/ ? Thx.
Same here for our Dell R540, but also for HP AIO 800G3. This is a nightmare!
Oh, and this is for the kernel released for SLES and SLED 15 sp3.
spectre_v2=off seems to fix the problem, at least I could boot our main Dell 540 with it that paniced consequently before. Before I came here I've opened a SR with SuSE support (no. 00355361) which contains a dmesg output from a HP AIO that I could collect before it crashed, as well as a screenlog from the full boot process of the Dell 540. I won't post them here in case they contain sensitive information, but you should be able to access them internally I guess.
If that helps: all the failing Dell R540 are the same generation and 1.5 years older than those who boot fine with the new kernel. The failing ones have CPU Intel Xeon Silver 4110 or 4112, the working ones have Silver 4210/12/14. Similar for the HP desktops. The failing ones are 800 G3, the working ones 800 G5. Failing CPUs are Intel Core i7-7700, working ones are i7-9700.
Thanks. You can use the temporary workaround for the time being. I was able to reproduce here and am debugging.
May I just ask: Is kernel-*-5.3.18-150300.59.81.1 *still* in the repos and offered to openSuSE 15.3 systems? To me it looks like this.
Same problem here: Dell XPS 8960 Intel i7-8700, OpenSuse leap 15-3 (all mandatory patches installed). kernel hangs after ~5minutes. Older kernel -76 is stable.
the kernel is now marked as retracted. (meaning it is still on the servers, but will no longer be offered during zypper up or zypper patch.) I replacement / fixed kernel is being worked on.
Thanks for the solution. BTW it is not restricted to DELL systems. I have problems of the kind on a HP Pavilion.
Ok, new kernel here: https://download.opensuse.org/repositories/home:/bpetkov:/15sp3/pool/ Pls test. Thx.
I could test one HP AIO 800 G3 which doesn't show any kernel oops and still runs after 45 minutes. And one Dell R540 that did always crash during boot and now reaches multi-user.target and is still running after some minutes, also without any oops in dmesg. So, wrt this very small test set, your kernel seems to work fine!
Thanks for testing! Lemme know should you see any hickups in the coming days.
Probably related: bug 1201681, bug 1201632, bug 1201665, bug 1201664 May it be that spectre_v2=retpoline is the better choice regarding security? (spectre_v2=retpoline and spectre_v2=off work both for me) See: https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/spectre.html https://www.phoronix.com/scan.php?page=article&item=amd-retpoline-2022&num=1 https://unix.stackexchange.com/questions/617276/spectre-v2-retpoline-and-performance
(In reply to Moritz Duge from comment #18) > May it be that spectre_v2=retpoline is the better choice regarding security? Regarding protection against which one of the CPU bugs and what machine?
Same problem. CPU: Intel(R) Core(TM) i3-6100 CPU @ 3.70GHz (Signature: Type 0, Family 6, Model 94, Stepping 3) Mainboard: HP MS-7957 (taken from a HP ProDesk 400 G3) RAM: 2x8GB GSkill F4-2133C15-8GNT Problem occurred with various BIOS versions. Downgrading kernel to .76 fixed it.
(In reply to Alexander Kruppa from comment #21) > Same problem. > > CPU: Intel(R) Core(TM) i3-6100 CPU @ 3.70GHz (Signature: Type 0, Family 6, > Model 94, Stepping 3) > Mainboard: HP MS-7957 (taken from a HP ProDesk 400 G3) > RAM: 2x8GB GSkill F4-2133C15-8GNT > > Problem occurred with various BIOS versions. Downgrading kernel to .76 fixed > it. Pls see comment #15.
I'm seeing this as well while testing with Elemental on my Intel NUCs (spec:https://www.intel.com/content/www/us/en/products/sku/126147/intel-nuc-kit-nuc8i5bek/specifications.html) CPU: Intel Core i5 -- i58259u Disk: HP SSD EX920 1TB Memory: G.SKILL F4-2400C16-16GRS We have a build going in OBS with the test kernel so will update if that fixes on my hardware.
SUSE-SU-2022:2549-1: An update that solves 11 vulnerabilities and has 49 fixes is now available. Category: security (important) Bug References: 1065729,1179195,1180814,1184924,1185762,1192761,1193629,1194013,1195504,1195775,1196901,1197362,1197754,1198020,1198924,1199482,1199487,1199489,1199657,1200217,1200263,1200343,1200442,1200571,1200599,1200600,1200604,1200605,1200608,1200619,1200622,1200692,1200806,1200807,1200809,1200810,1200813,1200816,1200820,1200821,1200822,1200825,1200828,1200829,1200925,1201050,1201080,1201143,1201147,1201149,1201160,1201171,1201177,1201193,1201222,1201644,1201664,1201672,1201673,1201676 CVE References: CVE-2021-26341,CVE-2021-4157,CVE-2022-1012,CVE-2022-1679,CVE-2022-20132,CVE-2022-20141,CVE-2022-20154,CVE-2022-29900,CVE-2022-29901,CVE-2022-33981,CVE-2022-34918 JIRA References: Sources used: openSUSE Leap 15.4 (src): dtb-aarch64-5.3.18-150300.59.87.1 openSUSE Leap 15.3 (src): dtb-aarch64-5.3.18-150300.59.87.1, kernel-64kb-5.3.18-150300.59.87.1, kernel-debug-5.3.18-150300.59.87.1, kernel-default-5.3.18-150300.59.87.1, kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2, kernel-docs-5.3.18-150300.59.87.1, kernel-kvmsmall-5.3.18-150300.59.87.1, kernel-obs-build-5.3.18-150300.59.87.1, kernel-obs-qa-5.3.18-150300.59.87.1, kernel-preempt-5.3.18-150300.59.87.1, kernel-source-5.3.18-150300.59.87.1, kernel-syms-5.3.18-150300.59.87.1, kernel-zfcpdump-5.3.18-150300.59.87.1 SUSE Linux Enterprise Workstation Extension 15-SP3 (src): kernel-default-5.3.18-150300.59.87.1, kernel-preempt-5.3.18-150300.59.87.1 SUSE Linux Enterprise Module for Live Patching 15-SP3 (src): kernel-default-5.3.18-150300.59.87.1, kernel-livepatch-SLE15-SP3_Update_22-1-150300.7.5.1 SUSE Linux Enterprise Module for Legacy Software 15-SP3 (src): kernel-default-5.3.18-150300.59.87.1 SUSE Linux Enterprise Module for Development Tools 15-SP3 (src): kernel-docs-5.3.18-150300.59.87.1, kernel-obs-build-5.3.18-150300.59.87.1, kernel-preempt-5.3.18-150300.59.87.1, kernel-source-5.3.18-150300.59.87.1, kernel-syms-5.3.18-150300.59.87.1 SUSE Linux Enterprise Module for Basesystem 15-SP3 (src): kernel-64kb-5.3.18-150300.59.87.1, kernel-default-5.3.18-150300.59.87.1, kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2, kernel-preempt-5.3.18-150300.59.87.1, kernel-source-5.3.18-150300.59.87.1, kernel-zfcpdump-5.3.18-150300.59.87.1 SUSE Linux Enterprise Micro 5.2 (src): kernel-default-5.3.18-150300.59.87.1, kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2 SUSE Linux Enterprise Micro 5.1 (src): kernel-default-5.3.18-150300.59.87.1, kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2 SUSE Linux Enterprise High Availability 15-SP3 (src): kernel-default-5.3.18-150300.59.87.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
All SP3 fixes submitted, will be in the KOTD kernels starting tomorrow and soon in the official submission. Closing. Feel free to reopen if something's still not working as expected. Thx.
SUSE-SU-2022:2720-1: An update that solves 7 vulnerabilities and has 18 fixes is now available. Category: security (important) Bug References: 1103269,1114648,1190812,1195775,1195926,1198484,1198829,1200442,1200598,1200644,1200651,1200910,1201196,1201381,1201429,1201635,1201636,1201644,1201651,1201742,1201752,1201930,1201940,1201954,1201958 CVE References: CVE-2020-36557,CVE-2020-36558,CVE-2021-33655,CVE-2021-33656,CVE-2022-1462,CVE-2022-20166,CVE-2022-36946 JIRA References: Sources used: SUSE Linux Enterprise Server 12-SP5 (src): kernel-azure-4.12.14-16.106.1, kernel-source-azure-4.12.14-16.106.1, kernel-syms-azure-4.12.14-16.106.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2022:2719-1: An update that solves 7 vulnerabilities and has 16 fixes is now available. Category: security (important) Bug References: 1103269,1114648,1190812,1195775,1195926,1198484,1198829,1200442,1200598,1200644,1200651,1200910,1201196,1201381,1201429,1201635,1201636,1201644,1201651,1201930,1201940,1201954,1201958 CVE References: CVE-2020-36557,CVE-2020-36558,CVE-2021-33655,CVE-2021-33656,CVE-2022-1462,CVE-2022-20166,CVE-2022-36946 JIRA References: Sources used: SUSE Linux Enterprise Workstation Extension 12-SP5 (src): kernel-default-4.12.14-122.130.1 SUSE Linux Enterprise Software Development Kit 12-SP5 (src): kernel-docs-4.12.14-122.130.2, kernel-obs-build-4.12.14-122.130.1 SUSE Linux Enterprise Server 12-SP5 (src): kernel-default-4.12.14-122.130.1, kernel-source-4.12.14-122.130.1, kernel-syms-4.12.14-122.130.1 SUSE Linux Enterprise Live Patching 12-SP5 (src): kernel-default-4.12.14-122.130.1, kgraft-patch-SLE12-SP5_Update_34-1-8.3.1 SUSE Linux Enterprise High Availability 12-SP5 (src): kernel-default-4.12.14-122.130.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2022:2741-1: An update that solves 16 vulnerabilities, contains one feature and has 15 fixes is now available. Category: security (important) Bug References: 1178134,1198829,1199364,1199647,1199665,1199670,1200521,1200598,1200644,1200651,1200762,1200910,1201196,1201206,1201251,1201381,1201429,1201458,1201635,1201636,1201644,1201664,1201672,1201673,1201676,1201846,1201930,1201940,1201954,1201956,1201958 CVE References: CVE-2020-36557,CVE-2020-36558,CVE-2021-33655,CVE-2021-33656,CVE-2022-1116,CVE-2022-1462,CVE-2022-20166,CVE-2022-21505,CVE-2022-2318,CVE-2022-26365,CVE-2022-29581,CVE-2022-32250,CVE-2022-33740,CVE-2022-33741,CVE-2022-33742,CVE-2022-36946 JIRA References: SLE-24559 Sources used: openSUSE Leap 15.3 (src): kernel-azure-5.3.18-150300.38.75.1, kernel-source-azure-5.3.18-150300.38.75.1, kernel-syms-azure-5.3.18-150300.38.75.1 SUSE Linux Enterprise Module for Public Cloud 15-SP3 (src): kernel-azure-5.3.18-150300.38.75.1, kernel-source-azure-5.3.18-150300.38.75.1, kernel-syms-azure-5.3.18-150300.38.75.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
I encountered similar oops information during boot 15-SP3 kernel 5.3.18-150300.59.81-default on kvmskx1 and boot is hang. The latest kernel 5.3.18-150300.59.87-default can fix this issue. [ 29.943654] BUG: kernel NULL pointer dereference, address: 0000000000000000 [ 29.951429] #PF: supervisor instruction fetch in kernel mode [ 29.957745] #PF: error_code(0x0010) - not-present page [ 29.963479] PGD 0 P4D 0 [ 29.966307] Oops: 0010 [#1] SMP PTI [ 29.970202] CPU: 84 PID: 852 Comm: kworker/84:1 Not tainted 5.3.18-150300.59.81-default #1 SLE15-SP3 [ 29.980397] Hardware name: FUJITSU PRIMERGY RX4770 M4/D3753-A1, BIOS V5.0.0.12 R1.32.0 for D3753-A1x 04/06/2020 [ 29.993510] Workqueue: events work_for_cpu_fn [ 29.998375] RIP: 0010:0x0 [ 30.001301] Code: Bad RIP value. [ 30.004903] RSP: 0018:fffffe0001215ee0 EFLAGS: 00010046 [ 30.010736] RAX: 0000000000000005 RBX: ffff989b1f200000 RCX: 0000000000000048 [ 30.018702] RDX: 0000000000000000 RSI: ffffffffb5a018af RDI: ffff989b1f22cc80 [ 30.026666] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 30.034630] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 30.042594] R13: 0000000000000000 R14: 000000bd513fe004 R15: 0000000000000005 [ 30.050561] FS: 0000000000000000(0000) GS:ffff989b1f200000(0000) knlGS:0000000000000000 [ 30.059585] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 30.065989] CR2: ffffffffffffffd6 CR3: 000000bd513fe004 CR4: 00000000007706e0 [ 30.073955] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 30.081912] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 30.089875] PKRU: 55555554 [ 30.092893] Call Trace: [ 30.095622] <NMI> [ 30.097875] ? end_repeat_nmi+0x7/0x6d [ 30.102079] ? __mlx4_cmd+0x62b/0x9b0 [mlx4_core] [ 30.107337] ? __mlx4_cmd+0x62b/0x9b0 [mlx4_core] [ 30.112593] ? __mlx4_cmd+0x62b/0x9b0 [mlx4_core] [ 30.117843] </NMI> [ 30.120195] ? mlx4_RUN_FW+0x22/0x30 [mlx4_core] [ 30.125350] ? mlx4_load_one+0x444/0x14b0 [mlx4_core] [ 30.130995] ? mlx4_init_one+0x55e/0x770 [mlx4_core] [ 30.136543] ? local_pci_probe+0x42/0x90 [ 30.140920] ? work_for_cpu_fn+0x16/0x20 [ 30.145302] ? process_one_work+0x1f8/0x3e0 [ 30.149972] ? worker_thread+0x221/0x3f0 [ 30.154350] ? process_one_work+0x3e0/0x3e0 [ 30.159019] ? kthread+0x10d/0x130 [ 30.162815] ? kthread_park+0xb0/0xb0 [ 30.166901] ? ret_from_fork+0x1f/0x40 [ 30.171084] Modules linked in: pcc_cpufreq(-) intel_rapl_msr intel_rapl_common isst_if_common iTCO_wdt intel_pmc_bxt iTCO_vendor_support skx_edac nfit libnvdimm x86_pkg_temp_thermal intel_powerclamp coretemp kvm_intel kvm irqbypass crc32_pclmul mgag200 i2c_algo_bit drm_kms_helper ghash_clmulni_intel qla2xxx(+) cec rc_core aesni_intel nvme_fc syscopyarea nvme_fabrics crypto_simd cryptd sysfillrect ipmi_ssif glue_helper mlx4_core(+) mei_me pcspkr nvme_core sysimgblt scsi_transport_fc i40e ioatdma joydev fb_sys_fops mei i2c_i801 lpc_ich dca ipmi_si ipmi_devintf ipmi_msghandler acpi_pad button drm fuse configfs btrfs libcrc32c xor raid6_pq hid_generic usbhid sd_mod t10_pi crc32c_intel xhci_pci xhci_hcd ahci libahci libata megaraid_sas usbcore wmi sg dm_multipath dm_mod scsi_dh_rdac scsi_dh_emc scsi_dh_alua scsi_mod [ 30.251315] Supported: Yes [ 30.254337] CR2: 0000000000000000 [ 30.258029] ---[ end trace d1852d73a1c349f7 ]---
SUSE-SU-2022:2809-1: An update that solves 22 vulnerabilities and has 19 fixes is now available. Category: security (important) Bug References: 1114648,1194013,1195478,1195775,1196472,1196901,1197362,1198829,1199487,1199489,1199647,1199648,1199657,1200263,1200442,1200571,1200599,1200604,1200605,1200608,1200619,1200692,1200762,1200905,1200910,1201050,1201080,1201251,1201429,1201458,1201635,1201636,1201644,1201664,1201672,1201673,1201676,1201742,1201752,1201930,1201940 CVE References: CVE-2020-36557,CVE-2020-36558,CVE-2021-26341,CVE-2021-33655,CVE-2021-33656,CVE-2021-4157,CVE-2022-1116,CVE-2022-1462,CVE-2022-1679,CVE-2022-20132,CVE-2022-20141,CVE-2022-20154,CVE-2022-21505,CVE-2022-2318,CVE-2022-26365,CVE-2022-29900,CVE-2022-29901,CVE-2022-33740,CVE-2022-33741,CVE-2022-33742,CVE-2022-33981,CVE-2022-36946 JIRA References: Sources used: SUSE Manager Server 4.1 (src): kernel-default-5.3.18-150200.24.126.1, kernel-default-base-5.3.18-150200.24.126.1.150200.9.59.2, kernel-docs-5.3.18-150200.24.126.1, kernel-obs-build-5.3.18-150200.24.126.1, kernel-preempt-5.3.18-150200.24.126.1, kernel-source-5.3.18-150200.24.126.1, kernel-syms-5.3.18-150200.24.126.1 SUSE Manager Retail Branch Server 4.1 (src): kernel-default-5.3.18-150200.24.126.1, kernel-default-base-5.3.18-150200.24.126.1.150200.9.59.2, kernel-docs-5.3.18-150200.24.126.1, kernel-preempt-5.3.18-150200.24.126.1, kernel-source-5.3.18-150200.24.126.1, kernel-syms-5.3.18-150200.24.126.1 SUSE Manager Proxy 4.1 (src): kernel-default-5.3.18-150200.24.126.1, kernel-default-base-5.3.18-150200.24.126.1.150200.9.59.2, kernel-docs-5.3.18-150200.24.126.1, kernel-preempt-5.3.18-150200.24.126.1, kernel-source-5.3.18-150200.24.126.1, kernel-syms-5.3.18-150200.24.126.1 SUSE Linux Enterprise Server for SAP 15-SP2 (src): kernel-default-5.3.18-150200.24.126.1, kernel-default-base-5.3.18-150200.24.126.1.150200.9.59.2, kernel-docs-5.3.18-150200.24.126.1, kernel-obs-build-5.3.18-150200.24.126.1, kernel-preempt-5.3.18-150200.24.126.1, kernel-source-5.3.18-150200.24.126.1, kernel-syms-5.3.18-150200.24.126.1 SUSE Linux Enterprise Server 15-SP2-LTSS (src): kernel-default-5.3.18-150200.24.126.1, kernel-default-base-5.3.18-150200.24.126.1.150200.9.59.2, kernel-docs-5.3.18-150200.24.126.1, kernel-obs-build-5.3.18-150200.24.126.1, kernel-preempt-5.3.18-150200.24.126.1, kernel-source-5.3.18-150200.24.126.1, kernel-syms-5.3.18-150200.24.126.1 SUSE Linux Enterprise Server 15-SP2-BCL (src): kernel-default-5.3.18-150200.24.126.1, kernel-default-base-5.3.18-150200.24.126.1.150200.9.59.2, kernel-docs-5.3.18-150200.24.126.1, kernel-preempt-5.3.18-150200.24.126.1, kernel-source-5.3.18-150200.24.126.1, kernel-syms-5.3.18-150200.24.126.1 SUSE Linux Enterprise Module for Live Patching 15-SP2 (src): kernel-default-5.3.18-150200.24.126.1, kernel-livepatch-SLE15-SP2_Update_29-1-150200.5.5.1 SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS (src): kernel-default-5.3.18-150200.24.126.1, kernel-default-base-5.3.18-150200.24.126.1.150200.9.59.2, kernel-docs-5.3.18-150200.24.126.1, kernel-obs-build-5.3.18-150200.24.126.1, kernel-preempt-5.3.18-150200.24.126.1, kernel-source-5.3.18-150200.24.126.1, kernel-syms-5.3.18-150200.24.126.1 SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS (src): kernel-default-5.3.18-150200.24.126.1, kernel-default-base-5.3.18-150200.24.126.1.150200.9.59.2, kernel-docs-5.3.18-150200.24.126.1, kernel-obs-build-5.3.18-150200.24.126.1, kernel-preempt-5.3.18-150200.24.126.1, kernel-source-5.3.18-150200.24.126.1, kernel-syms-5.3.18-150200.24.126.1 SUSE Linux Enterprise High Availability 15-SP2 (src): kernel-default-5.3.18-150200.24.126.1 SUSE Enterprise Storage 7 (src): kernel-default-5.3.18-150200.24.126.1, kernel-default-base-5.3.18-150200.24.126.1.150200.9.59.2, kernel-docs-5.3.18-150200.24.126.1, kernel-obs-build-5.3.18-150200.24.126.1, kernel-preempt-5.3.18-150200.24.126.1, kernel-source-5.3.18-150200.24.126.1, kernel-syms-5.3.18-150200.24.126.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2022:2827-1: An update that solves 7 vulnerabilities and has 7 fixes is now available. Category: security (important) Bug References: 1195775,1195926,1198484,1198829,1200442,1200598,1200910,1201429,1201635,1201636,1201644,1201926,1201930,1201940 CVE References: CVE-2020-36557,CVE-2020-36558,CVE-2021-33655,CVE-2021-33656,CVE-2022-1462,CVE-2022-20166,CVE-2022-36946 JIRA References: Sources used: openSUSE Leap 15.4 (src): kernel-debug-4.12.14-150100.197.120.1, kernel-default-4.12.14-150100.197.120.1, kernel-kvmsmall-4.12.14-150100.197.120.1, kernel-vanilla-4.12.14-150100.197.120.1, kernel-zfcpdump-4.12.14-150100.197.120.1 openSUSE Leap 15.3 (src): kernel-debug-4.12.14-150100.197.120.1, kernel-default-4.12.14-150100.197.120.1, kernel-kvmsmall-4.12.14-150100.197.120.1, kernel-vanilla-4.12.14-150100.197.120.1, kernel-zfcpdump-4.12.14-150100.197.120.1 SUSE Linux Enterprise Server for SAP 15-SP1 (src): kernel-default-4.12.14-150100.197.120.1, kernel-docs-4.12.14-150100.197.120.2, kernel-obs-build-4.12.14-150100.197.120.1, kernel-source-4.12.14-150100.197.120.1, kernel-syms-4.12.14-150100.197.120.1 SUSE Linux Enterprise Server 15-SP1-LTSS (src): kernel-default-4.12.14-150100.197.120.1, kernel-docs-4.12.14-150100.197.120.2, kernel-obs-build-4.12.14-150100.197.120.1, kernel-source-4.12.14-150100.197.120.1, kernel-syms-4.12.14-150100.197.120.1, kernel-zfcpdump-4.12.14-150100.197.120.1 SUSE Linux Enterprise Server 15-SP1-BCL (src): kernel-default-4.12.14-150100.197.120.1, kernel-docs-4.12.14-150100.197.120.2, kernel-obs-build-4.12.14-150100.197.120.1, kernel-source-4.12.14-150100.197.120.1, kernel-syms-4.12.14-150100.197.120.1 SUSE Linux Enterprise Module for Live Patching 15-SP1 (src): kernel-default-4.12.14-150100.197.120.1, kernel-livepatch-SLE15-SP1_Update_33-1-150100.3.3.1 SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS (src): kernel-default-4.12.14-150100.197.120.1, kernel-docs-4.12.14-150100.197.120.2, kernel-obs-build-4.12.14-150100.197.120.1, kernel-source-4.12.14-150100.197.120.1, kernel-syms-4.12.14-150100.197.120.1 SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS (src): kernel-default-4.12.14-150100.197.120.1, kernel-docs-4.12.14-150100.197.120.2, kernel-obs-build-4.12.14-150100.197.120.1, kernel-source-4.12.14-150100.197.120.1, kernel-syms-4.12.14-150100.197.120.1 SUSE Linux Enterprise High Availability 15-SP1 (src): kernel-default-4.12.14-150100.197.120.1 SUSE Enterprise Storage 6 (src): kernel-default-4.12.14-150100.197.120.1, kernel-docs-4.12.14-150100.197.120.2, kernel-obs-build-4.12.14-150100.197.120.1, kernel-source-4.12.14-150100.197.120.1, kernel-syms-4.12.14-150100.197.120.1 SUSE CaaS Platform 4.0 (src): kernel-default-4.12.14-150100.197.120.1, kernel-docs-4.12.14-150100.197.120.2, kernel-obs-build-4.12.14-150100.197.120.1, kernel-source-4.12.14-150100.197.120.1, kernel-syms-4.12.14-150100.197.120.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2022:2875-1: An update that solves 18 vulnerabilities, contains one feature and has 18 fixes is now available. Category: security (important) Bug References: 1178134,1196616,1198829,1199364,1199647,1199665,1199670,1200015,1200521,1200598,1200644,1200651,1200762,1200910,1201196,1201206,1201251,1201381,1201429,1201442,1201458,1201635,1201636,1201644,1201645,1201664,1201672,1201673,1201676,1201846,1201930,1201940,1201954,1201956,1201958,1202154 CVE References: CVE-2020-36516,CVE-2020-36557,CVE-2020-36558,CVE-2021-33655,CVE-2021-33656,CVE-2022-1116,CVE-2022-1462,CVE-2022-20166,CVE-2022-21505,CVE-2022-2318,CVE-2022-26365,CVE-2022-2639,CVE-2022-29581,CVE-2022-32250,CVE-2022-33740,CVE-2022-33741,CVE-2022-33742,CVE-2022-36946 JIRA References: SLE-24559 Sources used: openSUSE Leap 15.4 (src): dtb-aarch64-5.3.18-150300.59.90.1 openSUSE Leap 15.3 (src): dtb-aarch64-5.3.18-150300.59.90.1, kernel-64kb-5.3.18-150300.59.90.1, kernel-debug-5.3.18-150300.59.90.1, kernel-default-5.3.18-150300.59.90.1, kernel-default-base-5.3.18-150300.59.90.1.150300.18.52.1, kernel-docs-5.3.18-150300.59.90.1, kernel-kvmsmall-5.3.18-150300.59.90.1, kernel-obs-build-5.3.18-150300.59.90.1, kernel-obs-qa-5.3.18-150300.59.90.1, kernel-preempt-5.3.18-150300.59.90.1, kernel-source-5.3.18-150300.59.90.1, kernel-syms-5.3.18-150300.59.90.1, kernel-zfcpdump-5.3.18-150300.59.90.1 SUSE Linux Enterprise Workstation Extension 15-SP3 (src): kernel-default-5.3.18-150300.59.90.1, kernel-preempt-5.3.18-150300.59.90.1 SUSE Linux Enterprise Module for Live Patching 15-SP3 (src): kernel-default-5.3.18-150300.59.90.1, kernel-livepatch-SLE15-SP3_Update_23-1-150300.7.3.1 SUSE Linux Enterprise Module for Legacy Software 15-SP3 (src): kernel-default-5.3.18-150300.59.90.1 SUSE Linux Enterprise Module for Development Tools 15-SP3 (src): kernel-docs-5.3.18-150300.59.90.1, kernel-obs-build-5.3.18-150300.59.90.1, kernel-preempt-5.3.18-150300.59.90.1, kernel-source-5.3.18-150300.59.90.1, kernel-syms-5.3.18-150300.59.90.1 SUSE Linux Enterprise Module for Basesystem 15-SP3 (src): kernel-64kb-5.3.18-150300.59.90.1, kernel-default-5.3.18-150300.59.90.1, kernel-default-base-5.3.18-150300.59.90.1.150300.18.52.1, kernel-preempt-5.3.18-150300.59.90.1, kernel-source-5.3.18-150300.59.90.1, kernel-zfcpdump-5.3.18-150300.59.90.1 SUSE Linux Enterprise Micro 5.2 (src): kernel-default-5.3.18-150300.59.90.1, kernel-default-base-5.3.18-150300.59.90.1.150300.18.52.1 SUSE Linux Enterprise Micro 5.1 (src): kernel-default-5.3.18-150300.59.90.1, kernel-default-base-5.3.18-150300.59.90.1.150300.18.52.1 SUSE Linux Enterprise High Availability 15-SP3 (src): kernel-default-5.3.18-150300.59.90.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2022:2892-1: An update that solves 17 vulnerabilities, contains one feature and has 26 fixes is now available. Category: security (important) Bug References: 1178134,1196616,1196867,1198829,1199364,1199647,1199648,1199665,1199670,1199695,1200521,1200598,1200644,1200651,1200762,1200910,1201196,1201206,1201251,1201381,1201429,1201442,1201458,1201635,1201636,1201644,1201645,1201664,1201672,1201673,1201676,1201742,1201752,1201846,1201930,1201940,1201941,1201954,1201956,1201958,1202087,1202154,1202312 CVE References: CVE-2020-36516,CVE-2020-36557,CVE-2020-36558,CVE-2021-33655,CVE-2021-33656,CVE-2022-1116,CVE-2022-1462,CVE-2022-20166,CVE-2022-21505,CVE-2022-2318,CVE-2022-26365,CVE-2022-2639,CVE-2022-29581,CVE-2022-33740,CVE-2022-33741,CVE-2022-33742,CVE-2022-36946 JIRA References: SLE-24559 Sources used: SUSE Linux Enterprise Module for Realtime 15-SP3 (src): kernel-rt-5.3.18-150300.99.1, kernel-rt_debug-5.3.18-150300.99.1, kernel-source-rt-5.3.18-150300.99.1, kernel-syms-rt-5.3.18-150300.99.1 SUSE Linux Enterprise Micro 5.2 (src): kernel-rt-5.3.18-150300.99.1 SUSE Linux Enterprise Micro 5.1 (src): kernel-rt-5.3.18-150300.99.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2022:2910-1: An update that solves 10 vulnerabilities and has 26 fixes is now available. Category: security (important) Bug References: 1065729,1103269,1114648,1190812,1195775,1195926,1196616,1196867,1198484,1198829,1199665,1199695,1200442,1200598,1200644,1200651,1200910,1201019,1201196,1201381,1201429,1201635,1201636,1201644,1201651,1201705,1201742,1201752,1201930,1201940,1201941,1201954,1201958,1202087,1202154,1202312 CVE References: CVE-2020-36516,CVE-2020-36557,CVE-2020-36558,CVE-2021-33655,CVE-2021-33656,CVE-2022-1462,CVE-2022-20166,CVE-2022-2639,CVE-2022-29581,CVE-2022-36946 JIRA References: Sources used: SUSE Linux Enterprise Real Time Extension 12-SP5 (src): kernel-rt-4.12.14-10.97.1, kernel-rt_debug-4.12.14-10.97.1, kernel-source-rt-4.12.14-10.97.1, kernel-syms-rt-4.12.14-10.97.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
openSUSE-SU-2022:2549-1: An update that solves 11 vulnerabilities and has 49 fixes is now available. Category: security (important) Bug References: 1065729,1179195,1180814,1184924,1185762,1192761,1193629,1194013,1195504,1195775,1196901,1197362,1197754,1198020,1198924,1199482,1199487,1199489,1199657,1200217,1200263,1200343,1200442,1200571,1200599,1200600,1200604,1200605,1200608,1200619,1200622,1200692,1200806,1200807,1200809,1200810,1200813,1200816,1200820,1200821,1200822,1200825,1200828,1200829,1200925,1201050,1201080,1201143,1201147,1201149,1201160,1201171,1201177,1201193,1201222,1201644,1201664,1201672,1201673,1201676 CVE References: CVE-2021-26341,CVE-2021-4157,CVE-2022-1012,CVE-2022-1679,CVE-2022-20132,CVE-2022-20141,CVE-2022-20154,CVE-2022-29900,CVE-2022-29901,CVE-2022-33981,CVE-2022-34918 JIRA References: Sources used: openSUSE Leap Micro 5.2 (src): kernel-default-5.3.18-150300.59.87.1, kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2
SUSE-SU-2022:2892-2: An update that solves 17 vulnerabilities, contains one feature and has 26 fixes is now available. Category: security (important) Bug References: 1178134,1196616,1196867,1198829,1199364,1199647,1199648,1199665,1199670,1199695,1200521,1200598,1200644,1200651,1200762,1200910,1201196,1201206,1201251,1201381,1201429,1201442,1201458,1201635,1201636,1201644,1201645,1201664,1201672,1201673,1201676,1201742,1201752,1201846,1201930,1201940,1201941,1201954,1201956,1201958,1202087,1202154,1202312 CVE References: CVE-2020-36516,CVE-2020-36557,CVE-2020-36558,CVE-2021-33655,CVE-2021-33656,CVE-2022-1116,CVE-2022-1462,CVE-2022-20166,CVE-2022-21505,CVE-2022-2318,CVE-2022-26365,CVE-2022-2639,CVE-2022-29581,CVE-2022-33740,CVE-2022-33741,CVE-2022-33742,CVE-2022-36946 JIRA References: SLE-24559 Sources used: openSUSE Leap Micro 5.2 (src): kernel-rt-5.3.18-150300.99.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2022:2875-2: An update that solves 18 vulnerabilities, contains one feature and has 18 fixes is now available. Category: security (important) Bug References: 1178134,1196616,1198829,1199364,1199647,1199665,1199670,1200015,1200521,1200598,1200644,1200651,1200762,1200910,1201196,1201206,1201251,1201381,1201429,1201442,1201458,1201635,1201636,1201644,1201645,1201664,1201672,1201673,1201676,1201846,1201930,1201940,1201954,1201956,1201958,1202154 CVE References: CVE-2020-36516,CVE-2020-36557,CVE-2020-36558,CVE-2021-33655,CVE-2021-33656,CVE-2022-1116,CVE-2022-1462,CVE-2022-20166,CVE-2022-21505,CVE-2022-2318,CVE-2022-26365,CVE-2022-2639,CVE-2022-29581,CVE-2022-32250,CVE-2022-33740,CVE-2022-33741,CVE-2022-33742,CVE-2022-36946 JIRA References: SLE-24559 Sources used: openSUSE Leap Micro 5.2 (src): kernel-default-5.3.18-150300.59.90.1, kernel-default-base-5.3.18-150300.59.90.1.150300.18.52.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.