Bugzilla – Bug 1209436
I915 hangs on Kernel vmlinuz-5.14.21-150400.24.49
Last modified: 2024-06-25 17:32:37 UTC
Got new kernel from zypper up. Rebooted and it hang on line switching from VGA to i915. Had to power off and select previous kernel.
I also hangs on Virtualbox 15.4 guests as well.
Hard poweroff of VirtualBox 15.4 guests allow full reboot without hang. It will not reboot from saved VM state so something in the machine breaks the new kernel on reboot without power off.
Same experience as Comment #1 although I do not know if it is the switch to i915 at the time of hang. Fan comes on strong during hang.
Update hung several HP-800s with Intel video here. Snapper rollback was needed to recover.
Same with i915 on a Dell Precision 3561 laptop. Manually booting to previous (5.14.21-150400.24.46-default) for now.
Thank a lot for reporting this. Same here today on my laptop, it hangs in console with no output, and I had to switch to 5.14.21-150400.24.46-default. Please let me know if you need more info. Relevant log (journalctl -b-1): Mar 17 15:54:00 * kernel: i915 0000:00:02.0: Device initialization failed (-6) Mar 17 15:54:00 * kernel: i915 0000:00:02.0: Please file a bug on drm/i915; see https://gitlab.freedesktop.org/drm/intel/-/wikis/> Mar 17 15:54:00 * kernel: BUG: kernel NULL pointer dereference, address: 0000000000000000 Mar 17 15:54:00 * kernel: #PF: supervisor read access in kernel mode Mar 17 15:54:00 * kernel: #PF: error_code(0x0000) - not-present page Mar 17 15:54:00 * kernel: PGD 0 P4D 0 Mar 17 15:54:00 * kernel: Oops: 0000 [#1] PREEMPT SMP PTI Mar 17 15:54:00 * kernel: CPU: 0 PID: 148 Comm: kworker/0:2 Tainted: G W 5.14.21-150400.24.49-default #1 SLE15-S> Mar 17 15:54:00 * kernel: Hardware name: ASUSTeK Computer Inc. K53SK/K53SK, BIOS K53SK.203 10/11/2011 Mar 17 15:54:00 * kernel: Workqueue: events drm_connector_free_work_fn [drm] Mar 17 15:54:00 * kernel: RIP: 0010:ida_free+0xc2/0x140 inxi -b (the prev kernel): System: Host: ** Kernel: 5.14.21-150400.24.46-default x86_64 bits: 64 Desktop: KDE Plasma 5.24.4 Distro: openSUSE Leap 15.4 Machine: Type: Laptop System: ASUSTeK product: K53SK v: 1.0 serial: BCN0AS416175515 Mobo: ASUSTeK model: K53SK v: 1.0 serial: BSN12345678901234567 BIOS: American Megatrends v: K53SK.203 date: 10/11/2011 Battery: ID-1: BAT0 charge: 36.8 Wh (100.0%) condition: 36.8/59.4 Wh (62.0%) CPU: Info: Quad Core Intel Core i7-2670QM [MT MCP] speed: 2354 MHz min/max: 800/3100 MHz Graphics: Device-1: Intel 2nd Generation Core Processor Family Integrated Graphics driver: i915 v: kernel Device-2: Advanced Micro Devices [AMD/ATI] Whistler LE [Radeon HD 6610M/7610M] driver: radeon v: kernel Device-3: IMC Networks UVC VGA Webcam type: USB driver: uvcvideo Display: x11 server: X.Org 1.20.3 driver: loaded: ati,intel,radeon unloaded: fbdev,modesetting,vesa resolution: 1280x1024~60Hz OpenGL: renderer: Mesa DRI Intel HD Graphics 3000 (SNB GT2) v: 3.3 Mesa 21.2.4 Network: Device-1: Qualcomm Atheros AR9285 Wireless Network Adapter driver: ath9k Device-2: Realtek RTL8111/8168/8411 PCI Express Gigabit Ethernet driver: r8169 Drives: Local Storage: total: 931.52 GiB used: 578.3 GiB (62.1%) Info: Processes: 377 Uptime: 1h 41m Memory: 15.52 GiB used: 7.59 GiB (48.9%) Shell: Bash inxi: 3.3.07
The .49 kernel hangs during boot on my desktop that has an ASUS PRIME H370M-PLUS motherboard and an Intel Core i5-8600 processor (Intel UHD Graphics 630). I was able to boot again by selecting the .46 kernel.
Also hangs on a Gigabyte GA-B85M-HD3 Board (Intel B85 Express Chipset) with Intel Core i3-4170 (Intel HD Graphics 4400). System is set up as server booting to text mode, not to graphical interface. After reboot there were only some 4 lines on console with [OK] in front but: - no login prompt - unable to switch console screens with alt + function keys - no reaction to power button or ctrl-alt-del - not reachable from LAN Like the others after power off and booting to .24.46 worked and system is running again.
same problem here - switch back to 5.14.21-150400.24.46-default helped if it helps, here the information about the graphics: #> lspci | grep VGA 00:02.0 VGA compatible controller: Intel Corporation Xeon E3-1200 v2/3rd Gen Core processor Graphics Controller (rev 09) I have seen on the screen only messages about the TPM chip and then the system hangs (something like 'error communicating to tpm chip'). If any debug information are needed feel free to contact me.
*** Bug 1209440 has been marked as a duplicate of this bug. ***
Same problem here. Nothing works. Can boot to previous kernel. Intel Core i5-9400 Intel Corporation CoffeeLake-S GT2 [UHD Graphics 630]
for those that want to remove the bad kernel - here is a script to remove and lock the kernel - run as root or add sudo to the commands. zypper rm -y kernel-default-5.14.21-150400.24.49.3 zypper al kernel-default kernel-default-extra kernel-default-optional zypper ll cd /boot rm initrd rm vmlinuz ln -s initrd-5.14.21-150400.24.46-default initrd ln -s vmlinuz-5.14.21-150400.24.46-default vmlinuz ls -la /boot to undo zypper rl kernel-default kernel-default-extra kernel-default-optional zypper ll
Created attachment 865638 [details] Rescue mode boot screenshot Here the rescue mode freezes.
Same problem here on Acer Travelmate. Intel(R) Core(TM) i3-2377M CPU @ 1.50GHz # lspci | grep VGA 00:02.0 VGA compatible controller: Intel Corporation 2nd Generation Core Processor Family Integrated Graphics Controller (rev 09)
Could you check the kernel in OBS home:tiwai:bsc1209436 repo? http://download.opensuse.org/repositories/home:/tiwai:/bsc1209436/pool/ It seems that a backport of i915 upstream fix caused the problem. The kernel above reverted it on top of the latest SLE15-SP4 git branch.
> Could you check the kernel in OBS home:tiwai:bsc1209436 repo? Yes, it seems to boot without problems.
(In reply to Takashi Iwai from comment #15) > Could you check the kernel in OBS home:tiwai:bsc1209436 repo? > http://download.opensuse.org/repositories/home:/tiwai:/bsc1209436/pool/ > > It seems that a backport of i915 upstream fix caused the problem. The > kernel above reverted it on top of the latest SLE15-SP4 git branch. I can also confirm that this kernel works!
(In reply to Takashi Iwai from comment #15) > Could you check the kernel in OBS home:tiwai:bsc1209436 repo? > http://download.opensuse.org/repositories/home:/tiwai:/bsc1209436/pool/ > > It seems that a backport of i915 upstream fix caused the problem. The > kernel above reverted it on top of the latest SLE15-SP4 git branch. I confirm this kernel resolved the issue for me too.
*** Bug 1206977 has been marked as a duplicate of this bug. ***
Created attachment 865647 [details] Switch to i915 fails
Kernel 5.14.21-150400.24.49 and i915 also hang on my machine (Dell Latitude E6530). Recovery mode shows, that switch from EFI VGA to i915 fails (see screenshot "Switch to i915 fails"). Choosing 5.14.21-150400.24.46 for boot allows startup. Operating System: openSUSE Leap 15.4 KDE Plasma Version: 5.24.4 KDE Frameworks Version: 5.90.0 Qt Version: 5.15.2 Kernel Version: 5.14.21-150400.24.46-default (64-bit) Graphics Platform: Wayland Processors: 4 × Intel® Core™ i7-3520M CPU @ 2.90GHz Memory: 15.5 GiB of RAM Graphics Processor: Mesa DRI Intel® HD Graphics 4000
Same isue here. Saw the message "Show Plymouth boot screen"and then the system was dead. I had to fallback to the .46 kernel which works fine.
(In reply to Larry Rainey from comment #12) > for those that want to remove the bad kernel - here is a script to remove > and lock the kernel - run as root or add sudo to the commands. > > zypper rm -y kernel-default-5.14.21-150400.24.49.3 > zypper al kernel-default kernel-default-extra kernel-default-optional > zypper ll > cd /boot > rm initrd > rm vmlinuz > ln -s initrd-5.14.21-150400.24.46-default initrd > ln -s vmlinuz-5.14.21-150400.24.46-default vmlinuz > ls -la /boot > > > to undo > > zypper rl kernel-default kernel-default-extra kernel-default-optional > zypper ll Thanks! This script saved me a lot of grief. Both our Intel-PCs were affected.
I am marking the kernel as retracted. (not removing it). this will make it not selectable for update or installation.
*** Bug 1209452 has been marked as a duplicate of this bug. ***
*** Bug 1209451 has been marked as a duplicate of this bug. ***
(In reply to Marcus Meissner from comment #29) > I am marking the kernel as retracted. (not removing it). > this will make it not selectable for update or installation. Why? Seems to work just fine with AMD & NVidia GPUs.
If you have to reboot - you do not want it to hang again. And if you are not there to select the previous kernel - you have to go thru a power off to get back running again. Removing it leaves a good kernel in the boot order without having to muck with the grub menus. If you have a lot of 15.4 machines - it is the only way to fix the issue until a new kernel with a good i915 is released via zypper/yast. Yes, the bug only affects machines with intel graphics cards or cpus with integrated gpus.
(In reply to Takashi Iwai from comment #15) > Could you check the kernel in OBS home:tiwai:bsc1209436 repo? > http://download.opensuse.org/repositories/home:/tiwai:/bsc1209436/pool/ > > It seems that a backport of i915 upstream fix caused the problem. The > kernel above reverted it on top of the latest SLE15-SP4 git branch. Looking at https://patchwork.freedesktop.org/series/114080/, I see that there are two patches in the series; reading the comments for patch #2, it looks like the two patches need to be applied as a pair. Is it possible the bug was caused by a missing patch #1 (drm/i915: Don't use stolen memory for ring buffers with LLC)?
(In reply to Felix Miata from comment #32) > (In reply to Marcus Meissner from comment #29) > > I am marking the kernel as retracted. (not removing it). > > > this will make it not selectable for update or installation. > > Why? Seems to work just fine with AMD & NVidia GPUs. Seriously? Because it affects all machines with Intel onboard graphics, which I assume are the majority by far in desktop computers. And the bug leads to a stuck boot process which can only be resolved by a hard power off and choosing an older kernel at boot time in GRUB (IF you have this option activated... which might not be the case for everyone). If there is a pain in the ass bug, that should be avoided to be shipped to the majority of users, then it is this one.
(In reply to Nick Dordea from comment #3) bug 1206977 > Same problem as Don Hughes [ comment#2 ] > yast maintenance include new kernel-default 5.14.21-150400.24.49.3 > the old kernel kernel-default 5.14.21-150400.24.46,1 > The boot stopped > last message : > [4.198071 ][ T364] fb0: switching to i915 from EFI VGA > > Rebooting with kernel-default 5.14.21-150400.24.46,1 is fine ? > > While waiting for suse solution/fix, I'm going to reboot with nomodset then > downgrade the kernel back to 46.1 1. Tried to boot with nomodset .... the boot hangs as before . 2. reboot with 24.46.1 kernel 3. yast2 remove kernel-default-5.14.21-150400.24.49.3 kernel-default-devel-5.14.21-150400.24.49.3 kernel-default-extra-5.14.21-150400.24.49.3 kernel-default-optimal-5.14.21-150400.24.49.3 3.a check dependencies ===> asks to uninstall kernel-syms-5.14.21-150400.24.49.4 Why is that kernel 24.49.4 used and NOT 24,49,3 ???? It might be cause !!! 4. Try to simulate yast2 maintenance ..... The following 5 NEW packages are going to be installed: kernel-default 5.14.21-150400.24.49.3 x86_64 Update repository with updates from SUSE Linux Enterprise 15 SUSE LLC <https://www.suse.com/> kernel-default-devel 5.14.21-150400.24.49.3 x86_64 Update repository with updates from SUSE Linux Enterprise 15 SUSE LLC <https://www.suse.com/> kernel-default-extra 5.14.21-150400.24.49.3 x86_64 Update repository with updates from SUSE Linux Enterprise 15 SUSE LLC <https://www.suse.com/> kernel-default-optional 5.14.21-150400.24.49.3 x86_64 Update repository with updates from SUSE Linux Enterprise 15 SUSE LLC <https://www.suse.com/> kernel-syms 5.14.21-150400.24.49.4 x86_64 Update repository with updates from SUSE Linux Enterprise 15 SUSE LLC <https://www.suse.com/> The following package requires a system reboot: kernel-default 5.14.21-150400.24.49.3 x86_64 Update repository with updates from SUSE Linux Enterprise 15 SUSE LLC <https://www.suse.com/> Is kernel-syms-5.14.21-150400.24.49.4 really needed OR should be kernel-syms-5.14.21-150400.24.49.3 ????
I either understand but also don't understand the discussion about this bug and it's consequences here. But this is a serious bug for some people. For a non experienced user, this kernel leads to an unusable system. A (slightly) experienced user will try to start the system with the previous kernel. Minimum a workaround like this should be mentioned here: Go to YaST, start boatloader module and set default kernel to previous (Boot Loader Settings - Default Boot Section). So it's possible to "sit out" the problem until the next kernel is provided in the update stream. That's why I putted myself to the CC list... ;-)
(In reply to Peter Küppers from comment #37) > I either understand but also don't understand the discussion about this bug > and it's consequences here. But this is a serious bug for some people. > > For a non experienced user, this kernel leads to an unusable system. > A (slightly) experienced user will try to start the system with the previous > kernel. > > Minimum a workaround like this should be mentioned here: > Go to YaST, start boatloader module and set default kernel to previous (Boot > Loader Settings - Default Boot Section). So it's possible to "sit out" the > problem until the next kernel is provided in the update stream. > > That's why I putted myself to the CC list... ;-) Thanks very much. Steve.
Alternative work around for those affected by the bug is to blacklist the i915 kernel module on the grub boot line.
(In reply to Darren Davis from comment #39) > Alternative work around for those affected by the bug is to blacklist the > i915 kernel module on the grub boot line. Yeah, sure. Another workaround is just to switch it off and put in into the closet.
yeah, how to solve the problem ... for non experienced(!) people who got already the new "buggy" kernel (and can't start the system anymore) I've no clue, but... To be more precise: My system is (regularly) customized by default for two kernels: The actual kernel (from update) and the previous (from installation or previous update). If it comes for an update (here "resolve this bug" by an update kernel), the user has to "listen" to this chat and has to put back the default kernel to the default kernel again (Boot Loader Settings - Default Boot Section - openSUSE Leap <your release>). As I said: That's why I putted myself to the CC list Nothing is easy, unless you know, how it works. It's not a shame to be clueless, unless you don't try...
(In reply to Christian Peters from comment #35) > ...it affects all machines with Intel onboard graphics... It does not, which may be why QA didn't catch it: # inxi -GSaz --vs --zl --hostname inxi 3.3.25-00 (2023-02-07) System: Host: gx620 Kernel: 5.14.21-150400.24.49-default arch: x86_64 bits: 64 compiler: gcc v: 7.5.0 parameters: root=LABEL=<filter> ipv6.disable=1 net.ifnames=0 noresume mitigations=auto consoleblank=0 vga=791 Desktop: Trinity v: R14.0.13 tk: Qt v: 3.5.0 info: kicker wm: Twin v: 3.0 vt: 7 dm: 1: TDM 2: XDM Distro: openSUSE Leap 15.4 Graphics: Device-1: Intel 82945G/GZ Integrated Graphics vendor: Dell driver: i915 v: kernel arch: Gen-3.5 process: Intel 90nm built: 2005-06 ports: active: VGA-1 empty: none bus-ID: 00:02.0 chip-ID: 8086:2772 class-ID: 0300 Display: x11 server: X.Org v: 1.20.3 driver: X: loaded: intel unloaded: fbdev,modesetting,vesa dri: i915 gpu: i915 display-ID: :0 screens: 1 Screen-1: 0 s-res: 1680x1050 s-dpi: 108 s-size: 395x246mm (15.55x9.69") s-diag: 465mm (18.32") Monitor-1: VGA-1 mapped: VGA1 model: Dell P2213 serial: <filter> built: 2012 res: 1680x1050 hz: 60 dpi: 91 gamma: 1.2 size: 470x300mm (18.5x11.81") diag: 558mm (22") ratio: 16:10 modes: max: 1680x1050 min: 720x400 API: OpenGL v: 1.4 Mesa 21.2.4 renderer: Mesa DRI Intel 945G direct-render: Yes # ls -Ggh /boot/[v,i]*49*t -rw------- 1 13M Mar 18 17:38 /boot/initrd-5.14.21-150400.24.49-default -rw-r--r-- 1 11M Mar 9 12:50 /boot/vmlinuz-5.14.21-150400.24.49-default # pinxi -GSaz --vs --zl --hostname pinxi 3.3.25-03 (2023-02-22) System: Host: gx745 Kernel: 5.14.21-150400.24.49-default arch: x86_64 bits: 64 compiler: gcc v: 7.5.0 parameters: root=LABEL=<filter> ipv6.disable=1 net.ifnames=0 noresume mitigations=auto consoleblank=0 vga=791 Desktop: KDE v: 3.5.10 tk: Qt v: 3.3.8c info: kicker wm: kwin vt: 7 dm: 1: KDM 2: XDM Distro: openSUSE Leap 15.4 Graphics: Device-1: Intel 82Q963/Q965 Integrated Graphics vendor: Dell driver: i915 v: kernel arch: Gen-4 process: Intel 65n built: 2006-07 ports: active: DVI-D-1,VGA-1 empty: none bus-ID: 00:02.0 chip-ID: 8086:2992 class-ID: 0300 Display: x11 server: X.Org v: 1.20.3 driver: X: loaded: modesetting unloaded: fbdev,vesa alternate: intel dri: crocus gpu: i915 display-ID: :0 screens: 1 Screen-1: 0 s-res: 3600x1200 s-dpi: 120 s-size: 762x254mm (30.00x10.00") s-diag: 803mm (31.62") Monitor-1: DVI-D-1 pos: primary,left model: NEC EA243WM serial: <filter> built: 2011 res: 1920x1200 hz: 60 dpi: 94 gamma: 1.2 size: 519x324mm (20.43x12.76") diag: 612mm (24.1") ratio: 16:10 modes: max: 1920x1200 min: 640x480 Monitor-2: VGA-1 pos: right model: Dell P2213 serial: <filter> built: 2012 res: 1680x1050 hz: 60 dpi: 90 gamma: 1.2 size: 473x296mm (18.62x11.65") diag: 558mm (22") ratio: 16:10 modes: max: 1680x1050 min: 720x400 API: OpenGL v: 2.1 Mesa 21.2.4 renderer: Mesa Intel 965Q (BW) direct-render: Yes # ls -Ggh /boot/[v,i]*49*t -rw------- 1 16M Mar 18 21:10 /boot/initrd-5.14.21-150400.24.49-default -rw-r--r-- 1 11M Mar 9 12:50 /boot/vmlinuz-5.14.21-150400.24.49-default # pinxi -AGSaz --vs --zl --hostname pinxi 3.3.25-03 (2023-02-22) System: Host: hp750 Kernel: 5.14.21-150400.24.49-default arch: x86_64 bits: 64 compiler: gcc v: 7.5.0 parameters: root=/dev/sda17 noresume mitigations=auto consoleblank=0 net.ifnames=0 ipv6.disable=1 vga=791 Desktop: Trinity v: R14.0.13 tk: Qt v: 3.5.0 info: kicker wm: Twin v: 3.0 vt: 7 dm: 1: TDM 2: XDM Distro: openSUSE Leap 15.4 Graphics: Device-1: Intel Core Processor Integrated Graphics vendor: Hewlett-Packard driver: i915 v: kernel arch: Gen-5.75 process: Intel 45nm built: 2010 ports: active: HDMI-A-1,VGA-1 empty: DP-1 bus-ID: 00:02.0 chip-ID: 8086:0042 class-ID: 0300 Display: x11 server: X.Org v: 1.20.3 driver: X: loaded: modesetting dri: i965 gpu: i915 display-ID: :0 screens: 1 Screen-1: 0 s-res: 3600x1200 s-dpi: 120 s-size: 762x254mm (30.00x10.00") s-diag: 803mm (31.62") Monitor-1: HDMI-A-1 mapped: HDMI-1 pos: primary,left model: NEC EA243WM serial: <filter> built: 2011 res: 1920x1200 hz: 60 dpi: 94 gamma: 1.2 size: 519x324mm (20.43x12.76") diag: 612mm (24.1") ratio: 16:10 modes: max: 1920x1200 min: 640x480 Monitor-2: VGA-1 pos: right model: Dell P2213 serial: <filter> built: 2012 res: 1680x1050 hz: 60 dpi: 90 gamma: 1.2 size: 473x296mm (18.62x11.65") diag: 558mm (22") ratio: 16:10 modes: max: 1680x1050 min: 720x400 API: OpenGL v: 2.1 Mesa 21.2.4 renderer: Mesa DRI Intel HD Graphics (ILK) direct-render: Yes # ls -Ggh /boot/[v,i]*49*t -rw------- 1 13M Mar 18 23:54 /boot/initrd-5.14.21-150400.24.49-default -rw-r--r-- 1 11M Mar 9 12:50 /boot/vmlinuz-5.14.21-150400.24.49-default
(In reply to Stephen Goodey from comment #38) > (In reply to Peter Küppers from comment #37) > > I either understand but also don't understand the discussion about this bug > > and it's consequences here. But this is a serious bug for some people. > > > > For a non experienced user, this kernel leads to an unusable system. > > A (slightly) experienced user will try to start the system with the previous > > kernel. > > > > Minimum a workaround like this should be mentioned here: > > Go to YaST, start boatloader module and set default kernel to previous (Boot > > Loader Settings - Default Boot Section). So it's possible to "sit out" the > > problem until the next kernel is provided in the update stream. > > > > That's why I putted myself to the CC list... ;-) > > Thanks very much. > > Steve. That's what I have done :-) DO not forget to lock the kernel resp. the .46 version in YaST (or zypper as another comentard has explained) so you do not accidentally re-install the broken .49, perhaps hidden in other pending updates.
on my old notebook (i5-2520) the .49 kernel doesnt start up only empty screen (sometimes with minus sign on the left upper corner. with splash=verbose only three lines of text the .46 kernel is running as before hope this help to solve the problem
see comment #12 - that is the temp. solution until a fix for the kernel is there.
*** Bug 1209464 has been marked as a duplicate of this bug. ***
Same problem Here with an Acer Extensa 15, Core i5-10210U. Booting the old kernel .46 works fine.
Thanks for highliting this. Confirm the boot hangs on kernel 5.14.21-150400.24.49-default after update, but machine boots into 5.14.21-150400.24.46-default. Hardware used is ThinkpadX230 iwth i915
We have also an desktop, Fujitsu Esprimo P420 E85+ with Core i3-4170 and Intel HD 4400 Graphics which does not boot with the kernel .49. Had to power off and select previous kernel.
I was able to reproduce the hang on a Lenovo Thinkpad T520 with an Intel Core i5-2520M CPU @ 2.50GHz (Intel HD Graphics 3000) by building the .49 kernel from the https://github.com/openSUSE/kernel/tree/SLE15-SP4 tree, since the .49 kernel was retracted. This shows the last commit from March 14: john@laptop15:~/git/kernel> git -P log -1 commit 4909d30a5b78240d282801fd2fb84a32f59f9e8a (HEAD -> SLE15-SP4, origin/SLE15-SP4) Author: Tony Jones <tonyj@suse.de> Date: Tue Mar 14 12:17:28 2023 -0700 perf/x86/uncore: Don't WARN_ON_ONCE() for a broken discovery table (bsc#1206824, bsc#1206493, bsc#1206492). suse-commit: 23fd14b823e378dfb3e61305633ee67c17881afa I was able to fix the issue by applying patch #1 that I mentioned in #c34. This shows the one-line change to intel_ring.c: john@laptop15:~/git/kernel> git -P diff diff --git a/drivers/gpu/drm/i915/gt/intel_ring.c b/drivers/gpu/drm/i915/gt/intel_ring.c index 6499f8ba953a..64e494357882 100644 --- a/drivers/gpu/drm/i915/gt/intel_ring.c +++ b/drivers/gpu/drm/i915/gt/intel_ring.c @@ -113,7 +113,7 @@ static struct i915_vma *create_ring_vma(struct i915_ggtt *ggtt, int size) struct i915_vma *vma; obj = i915_gem_object_create_lmem(i915, size, I915_BO_ALLOC_VOLATILE); - if (IS_ERR(obj) && i915_ggtt_has_aperture(ggtt)) + if (IS_ERR(obj) && i915_ggtt_has_aperture(ggtt) && !HAS_LLC(i915)) obj = i915_gem_object_create_stolen(i915, size); if (IS_ERR(obj)) obj = i915_gem_object_create_internal(i915, size); diff --git a/scripts/pahole-flags.sh b/scripts/pahole-flags.sh old mode 100644 new mode 100755 This just shows that I'm running the newly built kernel: john@laptop15:~> uname -srv Linux 5.14.21-150400.24.49-default+ #2 SMP PREEMPT_DYNAMIC Mon Mar 20 07:51:18 EDT 2023
*** Bug 1209540 has been marked as a duplicate of this bug. ***
Any information about when this is fixed? And how we will know?
The old kernel was retracted, you can still use that. (deinstall the released buggy one). The new kernel currently enters QA, will be released in the next days.
Same problem also here: Dell Vostro Operating System: openSUSE Leap 15.4 KDE Plasma Version: 5.24.4 KDE Frameworks Version: 5.90.0 Qt Version: 5.15.2 Kernel Version: 5.14.21-150400.24.46-default (64-bit) Graphics Platform: X11 Processors: 8 × Intel® Core™ i5-8250U CPU @ 1.60GHz Memory: 7.5 GiB of RAM Graphics Processor: Mesa DRI Intel® UHD Graphics 620
SUSE-SU-2023:1609-1: An update that solves 17 vulnerabilities and has 44 fixes can now be installed. Category: security (important) Bug References: 1177529, 1193629, 1197534, 1197617, 1198438, 1200054, 1202353, 1202633, 1203200, 1203331, 1204363, 1204993, 1205544, 1205846, 1206103, 1206232, 1206492, 1206493, 1206824, 1206935, 1207051, 1207270, 1207529, 1207560, 1207845, 1207846, 1208179, 1208212, 1208420, 1208449, 1208534, 1208541, 1208542, 1208570, 1208598, 1208599, 1208601, 1208605, 1208607, 1208628, 1208700, 1208741, 1208759, 1208776, 1208777, 1208784, 1208787, 1208816, 1208837, 1208843, 1208848, 1209008, 1209159, 1209188, 1209256, 1209258, 1209262, 1209291, 1209436, 1209457, 1209504 CVE References: CVE-2022-3523, CVE-2022-38096, CVE-2023-0461, CVE-2023-0597, CVE-2023-1075, CVE-2023-1076, CVE-2023-1078, CVE-2023-1095, CVE-2023-1118, CVE-2023-22995, CVE-2023-22998, CVE-2023-23000, CVE-2023-23004, CVE-2023-23559, CVE-2023-25012, CVE-2023-26545, CVE-2023-28328 Sources used: openSUSE Leap 15.4 (src): kernel-source-rt-5.14.21-150400.15.18.1, kernel-syms-rt-5.14.21-150400.15.18.1 SUSE Linux Enterprise Live Patching 15-SP4 (src): kernel-livepatch-SLE15-SP4-RT_Update_5-1-150400.1.3.1 SUSE Real Time Module 15-SP4 (src): kernel-source-rt-5.14.21-150400.15.18.1, kernel-syms-rt-5.14.21-150400.15.18.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2023:1608-1: An update that solves 24 vulnerabilities and has 112 fixes can now be installed. Category: security (important) Bug References: 1166486, 1177529, 1193629, 1197534, 1197617, 1198438, 1200054, 1202353, 1202633, 1203200, 1203331, 1203332, 1204363, 1204993, 1205544, 1205846, 1206103, 1206224, 1206232, 1206459, 1206492, 1206493, 1206640, 1206824, 1206877, 1206878, 1206880, 1206881, 1206882, 1206883, 1206884, 1206886, 1206894, 1206935, 1207036, 1207050, 1207051, 1207125, 1207270, 1207328, 1207529, 1207560, 1207588, 1207590, 1207591, 1207592, 1207593, 1207594, 1207603, 1207605, 1207606, 1207608, 1207609, 1207613, 1207615, 1207617, 1207618, 1207619, 1207620, 1207621, 1207623, 1207624, 1207625, 1207626, 1207630, 1207631, 1207632, 1207634, 1207635, 1207636, 1207638, 1207639, 1207640, 1207641, 1207642, 1207643, 1207644, 1207645, 1207646, 1207647, 1207648, 1207649, 1207650, 1207651, 1207652, 1207653, 1207768, 1207770, 1207771, 1207773, 1207795, 1207845, 1207875, 1208149, 1208153, 1208179, 1208183, 1208212, 1208290, 1208420, 1208428, 1208429, 1208449, 1208534, 1208541, 1208542, 1208570, 1208598, 1208599, 1208601, 1208605, 1208607, 1208628, 1208700, 1208741, 1208759, 1208776, 1208777, 1208784, 1208787, 1208816, 1208829, 1208837, 1208843, 1208848, 1209008, 1209159, 1209188, 1209256, 1209258, 1209262, 1209291, 1209436, 1209457, 1209504, 1209572 CVE References: CVE-2022-3523, CVE-2022-36280, CVE-2022-38096, CVE-2023-0045, CVE-2023-0122, CVE-2023-0461, CVE-2023-0590, CVE-2023-0597, CVE-2023-1075, CVE-2023-1076, CVE-2023-1078, CVE-2023-1095, CVE-2023-1118, CVE-2023-22995, CVE-2023-22998, CVE-2023-23000, CVE-2023-23001, CVE-2023-23004, CVE-2023-23454, CVE-2023-23455, CVE-2023-23559, CVE-2023-25012, CVE-2023-26545, CVE-2023-28328 Sources used: openSUSE Leap 15.4 (src): kernel-syms-azure-5.14.21-150400.14.40.1, kernel-source-azure-5.14.21-150400.14.40.1 Public Cloud Module 15-SP4 (src): kernel-syms-azure-5.14.21-150400.14.40.1, kernel-source-azure-5.14.21-150400.14.40.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Same thing: Dell G5 5590 Hangs during boot on switch to i915 EFI. Write a blacklist to device is not a option, i'm using 2 monitors at work, with blacklist just external works.
(In reply to Andreas Schleth from comment #28) > (In reply to Larry Rainey from comment #12) > > for those that want to remove the bad kernel - here is a script to remove > > and lock the kernel - run as root or add sudo to the commands. > > > > zypper rm -y kernel-default-5.14.21-150400.24.49.3 > > zypper al kernel-default kernel-default-extra kernel-default-optional > > zypper ll > > cd /boot > > rm initrd > > rm vmlinuz > > ln -s initrd-5.14.21-150400.24.46-default initrd > > ln -s vmlinuz-5.14.21-150400.24.46-default vmlinuz > > ls -la /boot > > > > > > to undo > > > > zypper rl kernel-default kernel-default-extra kernel-default-optional > > zypper ll > > Thanks! This script saved me a lot of grief. > Both our Intel-PCs were affected. As this affected kernel packages were retracted, there's no need to lock any packages, and no need to unlock them later. Running: > zypper rm -y kernel-default-5.14.21-150400.24.49.3 > cd /boot > rm initrd > rm vmlinuz > ln -s initrd-5.14.21-150400.24.46-default initrd > ln -s vmlinuz-5.14.21-150400.24.46-default vmlinuz > ls -la /boot Is enough to make 5.14.21-150400.24.46 the default kernel again, and as soon as a new kernel update is released (including a fix for this bug), everyone will get it (otherwise probably a lot of people will not remember about unlocking the packages).
SUSE-SU-2023:1710-1: An update that solves 19 vulnerabilities and has 111 fixes can now be installed. Category: security (important) Bug References: 1166486, 1177529, 1193629, 1197534, 1197617, 1198438, 1202353, 1202633, 1203200, 1203331, 1203332, 1204363, 1204993, 1205544, 1205846, 1206103, 1206224, 1206232, 1206459, 1206492, 1206493, 1206640, 1206824, 1206876, 1206877, 1206878, 1206880, 1206881, 1206882, 1206883, 1206884, 1206885, 1206886, 1206889, 1206894, 1206935, 1207051, 1207270, 1207328, 1207529, 1207560, 1207588, 1207589, 1207590, 1207591, 1207592, 1207593, 1207594, 1207603, 1207605, 1207606, 1207607, 1207608, 1207609, 1207610, 1207613, 1207615, 1207617, 1207618, 1207619, 1207620, 1207621, 1207623, 1207624, 1207625, 1207626, 1207628, 1207630, 1207631, 1207632, 1207634, 1207635, 1207636, 1207638, 1207639, 1207641, 1207642, 1207643, 1207644, 1207645, 1207646, 1207647, 1207648, 1207651, 1207653, 1207770, 1207773, 1207845, 1207875, 1208149, 1208153, 1208179, 1208183, 1208212, 1208290, 1208420, 1208428, 1208429, 1208449, 1208534, 1208541, 1208570, 1208598, 1208599, 1208601, 1208603, 1208605, 1208607, 1208628, 1208700, 1208741, 1208759, 1208776, 1208777, 1208784, 1208787, 1208816, 1208837, 1208843, 1208848, 1209008, 1209159, 1209188, 1209256, 1209258, 1209262, 1209291, 1209436, 1209457, 1209504 CVE References: CVE-2022-3523, CVE-2022-36280, CVE-2022-38096, CVE-2023-0045, CVE-2023-0461, CVE-2023-0597, CVE-2023-1075, CVE-2023-1076, CVE-2023-1078, CVE-2023-1095, CVE-2023-1118, CVE-2023-22995, CVE-2023-22998, CVE-2023-23000, CVE-2023-23004, CVE-2023-23559, CVE-2023-25012, CVE-2023-26545, CVE-2023-28328 Sources used: openSUSE Leap Micro 5.3 (src): kernel-default-base-5.14.21-150400.24.55.3.150400.24.22.7 openSUSE Leap 15.4 (src): kernel-obs-qa-5.14.21-150400.24.55.1, kernel-syms-5.14.21-150400.24.55.1, kernel-source-5.14.21-150400.24.55.2, kernel-default-base-5.14.21-150400.24.55.3.150400.24.22.7, kernel-obs-build-5.14.21-150400.24.55.3 SUSE Linux Enterprise Micro for Rancher 5.3 (src): kernel-default-base-5.14.21-150400.24.55.3.150400.24.22.7 SUSE Linux Enterprise Micro 5.3 (src): kernel-default-base-5.14.21-150400.24.55.3.150400.24.22.7 SUSE Linux Enterprise Micro for Rancher 5.4 (src): kernel-default-base-5.14.21-150400.24.55.3.150400.24.22.7 SUSE Linux Enterprise Micro 5.4 (src): kernel-default-base-5.14.21-150400.24.55.3.150400.24.22.7 Basesystem Module 15-SP4 (src): kernel-source-5.14.21-150400.24.55.2, kernel-default-base-5.14.21-150400.24.55.3.150400.24.22.7 Development Tools Module 15-SP4 (src): kernel-source-5.14.21-150400.24.55.2, kernel-syms-5.14.21-150400.24.55.1, kernel-obs-build-5.14.21-150400.24.55.3 SUSE Linux Enterprise Live Patching 15-SP4 (src): kernel-livepatch-SLE15-SP4_Update_10-1-150400.9.3.7 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
on my i5-2520 the .55 kernel is starting now correctly. Thank you all for your work!
fixed finally
Thanks a lot - .55 kernel works great :)
Hello, new kernel works again, thanks a lot for the very fast bugfixing!
Created attachment 866043 [details] yast: retracted-installed-packages kernel-default technical-data
Comment on attachment 866043 [details] yast: retracted-installed-packages kernel-default technical-data Thanks for fixing the bug. Nevertheless I am wondering to see the actual kernel listed in yast in the package classification group of retracted installed packages (see screenshot attached). How is this to bee understood? Best Klaus
5.14.21-150400.24.55-default works again and boots fine - thank you!
Solved for me by the new kernel 5.14.21-150400.24.55, thanks
New Kernel 5.14.21-150400.24.55-default resolves the hang for me on Lenovo Thinkpad p50.
(In reply to Maintenance Automation from comment #67) > SUSE-SU-2023:1710-1: An update that solves 19 vulnerabilities and has 111 > fixes can now be installed. > > Category: security (important) > Bug References: 1166486, 1177529, 1193629, 1197534, 1197617, 1198438, > 1202353, 1202633, 1203200, 1203331, 1203332, 1204363, 1204993, 1205544, > 1205846, 1206103, 1206224, 1206232, 1206459, 1206492, 1206493, 1206640, > 1206824, 1206876, 1206877, 1206878, 1206880, 1206881, 1206882, 1206883, > 1206884, 1206885, 1206886, 1206889, 1206894, 1206935, 1207051, 1207270, > 1207328, 1207529, 1207560, 1207588, 1207589, 1207590, 1207591, 1207592, > 1207593, 1207594, 1207603, 1207605, 1207606, 1207607, 1207608, 1207609, > 1207610, 1207613, 1207615, 1207617, 1207618, 1207619, 1207620, 1207621, > 1207623, 1207624, 1207625, 1207626, 1207628, 1207630, 1207631, 1207632, > 1207634, 1207635, 1207636, 1207638, 1207639, 1207641, 1207642, 1207643, > 1207644, 1207645, 1207646, 1207647, 1207648, 1207651, 1207653, 1207770, > 1207773, 1207845, 1207875, 1208149, 1208153, 1208179, 1208183, 1208212, > 1208290, 1208420, 1208428, 1208429, 1208449, 1208534, 1208541, 1208570, > 1208598, 1208599, 1208601, 1208603, 1208605, 1208607, 1208628, 1208700, > 1208741, 1208759, 1208776, 1208777, 1208784, 1208787, 1208816, 1208837, > 1208843, 1208848, 1209008, 1209159, 1209188, 1209256, 1209258, 1209262, > 1209291, 1209436, 1209457, 1209504 > CVE References: CVE-2022-3523, CVE-2022-36280, CVE-2022-38096, > CVE-2023-0045, CVE-2023-0461, CVE-2023-0597, CVE-2023-1075, CVE-2023-1076, > CVE-2023-1078, CVE-2023-1095, CVE-2023-1118, CVE-2023-22995, CVE-2023-22998, > CVE-2023-23000, CVE-2023-23004, CVE-2023-23559, CVE-2023-25012, > CVE-2023-26545, CVE-2023-28328 > Sources used: > openSUSE Leap Micro 5.3 (src): > kernel-default-base-5.14.21-150400.24.55.3.150400.24.22.7 > openSUSE Leap 15.4 (src): kernel-obs-qa-5.14.21-150400.24.55.1, > kernel-syms-5.14.21-150400.24.55.1, kernel-source-5.14.21-150400.24.55.2, > kernel-default-base-5.14.21-150400.24.55.3.150400.24.22.7, > kernel-obs-build-5.14.21-150400.24.55.3 > SUSE Linux Enterprise Micro for Rancher 5.3 (src): > kernel-default-base-5.14.21-150400.24.55.3.150400.24.22.7 > SUSE Linux Enterprise Micro 5.3 (src): > kernel-default-base-5.14.21-150400.24.55.3.150400.24.22.7 > SUSE Linux Enterprise Micro for Rancher 5.4 (src): > kernel-default-base-5.14.21-150400.24.55.3.150400.24.22.7 > SUSE Linux Enterprise Micro 5.4 (src): > kernel-default-base-5.14.21-150400.24.55.3.150400.24.22.7 > Basesystem Module 15-SP4 (src): kernel-source-5.14.21-150400.24.55.2, > kernel-default-base-5.14.21-150400.24.55.3.150400.24.22.7 > Development Tools Module 15-SP4 (src): kernel-source-5.14.21-150400.24.55.2, > kernel-syms-5.14.21-150400.24.55.1, kernel-obs-build-5.14.21-150400.24.55.3 > SUSE Linux Enterprise Live Patching 15-SP4 (src): > kernel-livepatch-SLE15-SP4_Update_10-1-150400.9.3.7 > > NOTE: This line indicates an update has been released for the listed > product(s). At times this might be only a partial fix. If you have questions > please reach out to maintenance coordination. = ======================================================= It works i915 is installed boot process works fine Thank you !!! Cheers -------------------------- System: Host: <....> Kernel: 5.14.21-150400.24.55-default arch: x86_64 bits: 64 Desktop: KDE Plasma v: 5.24.4 Distro: openSUSE Leap 15.4 Machine: Type: Laptop System: HP product: HP Laptop 17-by0xxx v: Type1ProductConfigId serial: <superuser required> Mobo: HP model: 84CA v: KBC Version 74.33 serial: <superuser required> UEFI: Insyde v: F.56 date: 04/23/2020 Battery: ID-1: BAT0 charge: 36.7 Wh (100.0%) condition: 36.7/36.7 Wh (100.0%) CPU: Info: quad core model: Intel Core i5-8250U bits: 64 type: MT MCP cache: L2: 1024 KiB Speed (MHz): avg: 712 min/max: 400/3400 cores: 1: 700 2: 712 3: 788 4: 700 5: 700 6: 700 7: 700 8: 700 Graphics: Device-1: Intel UHD Graphics 620 driver: i915 v: kernel Device-2: Chicony HP TrueVision HD Camera type: USB driver: uvcvideo Display: x11 server: X.Org v: 1.20.3 with: Xwayland v: 21.1.4 driver: X: loaded: modesetting unloaded: fbdev,vesa dri: i965 gpu: i915 <==!! OK !! resolution: 1600x900~60Hz API: OpenGL v: 4.6 Mesa 21.2.4 renderer: Mesa DRI Intel UHD Graphics 620 (KBL GT2)
SUSE-SU-2023:0796-2: An update that solves eight vulnerabilities and has 86 fixes can now be installed. Category: security (important) Bug References: 1166486, 1177529, 1203331, 1203332, 1204993, 1205544, 1206224, 1206232, 1206459, 1206640, 1206876, 1206877, 1206878, 1206880, 1206881, 1206882, 1206883, 1206884, 1206885, 1206886, 1206889, 1206894, 1207051, 1207270, 1207328, 1207588, 1207589, 1207590, 1207591, 1207592, 1207593, 1207594, 1207603, 1207605, 1207606, 1207607, 1207608, 1207609, 1207610, 1207613, 1207615, 1207617, 1207618, 1207619, 1207620, 1207621, 1207623, 1207624, 1207625, 1207626, 1207628, 1207630, 1207631, 1207632, 1207634, 1207635, 1207636, 1207638, 1207639, 1207641, 1207642, 1207643, 1207644, 1207645, 1207646, 1207647, 1207648, 1207651, 1207653, 1207770, 1207773, 1207845, 1207875, 1208149, 1208153, 1208183, 1208212, 1208290, 1208420, 1208428, 1208429, 1208449, 1208534, 1208541, 1208570, 1208607, 1208628, 1208700, 1208741, 1208759, 1208784, 1208787, 1209188, 1209436 CVE References: CVE-2022-36280, CVE-2022-38096, CVE-2023-0045, CVE-2023-0461, CVE-2023-0597, CVE-2023-22995, CVE-2023-23559, CVE-2023-26545 Sources used: openSUSE Leap Micro 5.3 (src): kernel-default-base-5.14.21-150400.24.49.3.150400.24.19.3 openSUSE Leap 15.4 (src): kernel-syms-5.14.21-150400.24.49.4, kernel-obs-qa-5.14.21-150400.24.49.2, kernel-source-5.14.21-150400.24.49.4, kernel-default-base-5.14.21-150400.24.49.3.150400.24.19.3, kernel-obs-build-5.14.21-150400.24.49.3 SUSE Linux Enterprise Micro for Rancher 5.3 (src): kernel-default-base-5.14.21-150400.24.49.3.150400.24.19.3 SUSE Linux Enterprise Micro 5.3 (src): kernel-default-base-5.14.21-150400.24.49.3.150400.24.19.3 Basesystem Module 15-SP4 (src): kernel-default-base-5.14.21-150400.24.49.3.150400.24.19.3, kernel-source-5.14.21-150400.24.49.4 Development Tools Module 15-SP4 (src): kernel-syms-5.14.21-150400.24.49.4, kernel-obs-build-5.14.21-150400.24.49.3, kernel-source-5.14.21-150400.24.49.4 SUSE Linux Enterprise Live Patching 15-SP4 (src): kernel-livepatch-SLE15-SP4_Update_9-1-150400.9.3.3 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2023:0749-2: An update that solves 12 vulnerabilities and has 27 fixes can now be installed. Category: security (important) Bug References: 1177529, 1193629, 1197534, 1198438, 1200054, 1202633, 1203331, 1204363, 1204993, 1205544, 1205846, 1206103, 1206232, 1206935, 1207051, 1207270, 1207560, 1207845, 1207846, 1208212, 1208420, 1208449, 1208534, 1208541, 1208542, 1208570, 1208607, 1208628, 1208700, 1208741, 1208759, 1208776, 1208784, 1208787, 1208816, 1208837, 1208843, 1209188, 1209436 CVE References: CVE-2022-3523, CVE-2022-38096, CVE-2023-0461, CVE-2023-0597, CVE-2023-1118, CVE-2023-22995, CVE-2023-22998, CVE-2023-23000, CVE-2023-23004, CVE-2023-23559, CVE-2023-25012, CVE-2023-26545 Sources used: openSUSE Leap 15.4 (src): kernel-syms-rt-5.14.21-150400.15.14.1, kernel-source-rt-5.14.21-150400.15.14.2 SUSE Linux Enterprise Live Patching 15-SP4 (src): kernel-livepatch-SLE15-SP4-RT_Update_4-1-150400.1.3.1 SUSE Real Time Module 15-SP4 (src): kernel-syms-rt-5.14.21-150400.15.14.1, kernel-source-rt-5.14.21-150400.15.14.2 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2023:2809-1: An update that solves 84 vulnerabilities, contains 25 features and has 320 fixes can now be installed. Category: security (important) Bug References: 1065729, 1109158, 1142685, 1152472, 1152489, 1155798, 1160435, 1166486, 1172073, 1174777, 1177529, 1185861, 1186449, 1189998, 1189999, 1191731, 1193629, 1194869, 1195175, 1195655, 1195921, 1196058, 1197534, 1197617, 1198101, 1198400, 1198438, 1198835, 1199304, 1199701, 1200054, 1202353, 1202633, 1203039, 1203200, 1203325, 1203331, 1203332, 1203693, 1203906, 1204356, 1204363, 1204662, 1204993, 1205153, 1205191, 1205205, 1205544, 1205650, 1205756, 1205758, 1205760, 1205762, 1205803, 1205846, 1206024, 1206036, 1206056, 1206057, 1206103, 1206224, 1206232, 1206340, 1206459, 1206492, 1206493, 1206578, 1206640, 1206649, 1206824, 1206843, 1206876, 1206877, 1206878, 1206880, 1206881, 1206882, 1206883, 1206884, 1206885, 1206886, 1206887, 1206888, 1206889, 1206890, 1206891, 1206893, 1206894, 1206935, 1206992, 1207034, 1207036, 1207050, 1207051, 1207088, 1207125, 1207149, 1207158, 1207168, 1207185, 1207270, 1207315, 1207328, 1207497, 1207500, 1207501, 1207506, 1207507, 1207521, 1207553, 1207560, 1207574, 1207588, 1207589, 1207590, 1207591, 1207592, 1207593, 1207594, 1207602, 1207603, 1207605, 1207606, 1207607, 1207608, 1207609, 1207610, 1207611, 1207612, 1207613, 1207614, 1207615, 1207616, 1207617, 1207618, 1207619, 1207620, 1207621, 1207622, 1207623, 1207624, 1207625, 1207626, 1207627, 1207628, 1207629, 1207630, 1207631, 1207632, 1207633, 1207634, 1207635, 1207636, 1207637, 1207638, 1207639, 1207640, 1207641, 1207642, 1207643, 1207644, 1207645, 1207646, 1207647, 1207648, 1207649, 1207650, 1207651, 1207652, 1207653, 1207734, 1207768, 1207769, 1207770, 1207771, 1207773, 1207795, 1207827, 1207842, 1207845, 1207875, 1207878, 1207933, 1207935, 1207948, 1208050, 1208076, 1208081, 1208105, 1208107, 1208128, 1208130, 1208149, 1208153, 1208183, 1208212, 1208219, 1208290, 1208368, 1208410, 1208420, 1208428, 1208429, 1208449, 1208534, 1208541, 1208542, 1208570, 1208588, 1208598, 1208599, 1208600, 1208601, 1208602, 1208604, 1208605, 1208607, 1208619, 1208628, 1208700, 1208741, 1208758, 1208759, 1208776, 1208777, 1208784, 1208787, 1208815, 1208816, 1208829, 1208837, 1208843, 1208845, 1208848, 1208864, 1208902, 1208948, 1208976, 1209008, 1209039, 1209052, 1209092, 1209159, 1209256, 1209258, 1209262, 1209287, 1209288, 1209290, 1209291, 1209292, 1209366, 1209367, 1209436, 1209457, 1209504, 1209532, 1209556, 1209600, 1209615, 1209635, 1209636, 1209637, 1209684, 1209687, 1209693, 1209739, 1209779, 1209780, 1209788, 1209798, 1209799, 1209804, 1209805, 1209856, 1209871, 1209927, 1209980, 1209982, 1209999, 1210034, 1210050, 1210158, 1210165, 1210202, 1210203, 1210206, 1210216, 1210230, 1210294, 1210301, 1210329, 1210336, 1210337, 1210409, 1210439, 1210449, 1210450, 1210453, 1210454, 1210469, 1210498, 1210506, 1210533, 1210551, 1210629, 1210644, 1210647, 1210725, 1210741, 1210762, 1210763, 1210764, 1210765, 1210766, 1210767, 1210768, 1210769, 1210770, 1210771, 1210775, 1210783, 1210791, 1210793, 1210806, 1210816, 1210817, 1210827, 1210940, 1210943, 1210947, 1210953, 1210986, 1211025, 1211037, 1211043, 1211044, 1211089, 1211105, 1211113, 1211131, 1211205, 1211263, 1211280, 1211281, 1211299, 1211346, 1211387, 1211400, 1211410, 1211414, 1211449, 1211465, 1211519, 1211564, 1211590, 1211592, 1211593, 1211595, 1211654, 1211686, 1211687, 1211688, 1211689, 1211690, 1211691, 1211692, 1211693, 1211714, 1211794, 1211796, 1211804, 1211807, 1211808, 1211820, 1211836, 1211847, 1211852, 1211855, 1211960, 1212129, 1212154, 1212155, 1212158, 1212350, 1212405, 1212445, 1212448, 1212494, 1212495, 1212504, 1212513, 1212540, 1212556, 1212561, 1212563, 1212564, 1212584, 1212592, 1212605, 1212606, 1212619, 1212701, 1212741 CVE References: CVE-2020-24588, CVE-2022-2196, CVE-2022-3523, CVE-2022-36280, CVE-2022-38096, CVE-2022-4269, CVE-2022-45884, CVE-2022-45885, CVE-2022-45886, CVE-2022-45887, CVE-2022-45919, CVE-2022-4744, CVE-2023-0045, CVE-2023-0122, CVE-2023-0179, CVE-2023-0386, CVE-2023-0394, CVE-2023-0461, CVE-2023-0469, CVE-2023-0590, CVE-2023-0597, CVE-2023-1075, CVE-2023-1076, CVE-2023-1077, CVE-2023-1078, CVE-2023-1079, CVE-2023-1095, CVE-2023-1118, CVE-2023-1249, CVE-2023-1382, CVE-2023-1513, CVE-2023-1582, CVE-2023-1583, CVE-2023-1611, CVE-2023-1637, CVE-2023-1652, CVE-2023-1670, CVE-2023-1838, CVE-2023-1855, CVE-2023-1989, CVE-2023-1998, CVE-2023-2002, CVE-2023-21102, CVE-2023-21106, CVE-2023-2124, CVE-2023-2156, CVE-2023-2162, CVE-2023-2176, CVE-2023-2235, CVE-2023-2269, CVE-2023-22998, CVE-2023-23000, CVE-2023-23001, CVE-2023-23004, CVE-2023-23006, CVE-2023-23454, CVE-2023-23455, CVE-2023-2483, CVE-2023-25012, CVE-2023-2513, CVE-2023-26545, CVE-2023-28327, CVE-2023-28410, CVE-2023-28464, CVE-2023-28466, CVE-2023-28866, CVE-2023-3006, CVE-2023-30456, CVE-2023-30772, CVE-2023-31084, CVE-2023-3141, CVE-2023-31436, CVE-2023-3161, CVE-2023-3220, CVE-2023-32233, CVE-2023-33288, CVE-2023-3357, CVE-2023-3358, CVE-2023-33951, CVE-2023-33952, CVE-2023-35788, CVE-2023-35823, CVE-2023-35828, CVE-2023-35829 Jira References: PED-1549, PED-3210, PED-3259, PED-3692, PED-370, PED-3750, PED-3759, PED-376, PED-3931, PED-4022, PED-835, SES-1880, SLE-18375, SLE-18377, SLE-18378, SLE-18379, SLE-18383, SLE-18384, SLE-18385, SLE-18978, SLE-18992, SLE-19001, SLE-19253, SLE-19255, SLE-19556 Sources used: openSUSE Leap 15.5 (src): kernel-livepatch-SLE15-SP5-RT_Update_1-1-150500.11.5.1, kernel-syms-rt-5.14.21-150500.13.5.1, kernel-source-rt-5.14.21-150500.13.5.1 SUSE Linux Enterprise Live Patching 15-SP5 (src): kernel-livepatch-SLE15-SP5-RT_Update_1-1-150500.11.5.1 SUSE Real Time Module 15-SP5 (src): kernel-syms-rt-5.14.21-150500.13.5.1, kernel-source-rt-5.14.21-150500.13.5.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2023:2871-1: An update that solves 82 vulnerabilities, contains 25 features and has 390 fixes can now be installed. Category: security (important) Bug References: 1065729, 1109158, 1142685, 1152472, 1152489, 1155798, 1160435, 1166486, 1172073, 1174777, 1177529, 1186449, 1187829, 1189998, 1189999, 1191731, 1193629, 1194869, 1195175, 1195655, 1195921, 1196058, 1197534, 1197617, 1198101, 1198400, 1198438, 1198835, 1199304, 1199701, 1200054, 1202353, 1202633, 1203039, 1203200, 1203325, 1203331, 1203332, 1203693, 1203906, 1204356, 1204363, 1204662, 1204993, 1205153, 1205191, 1205205, 1205544, 1205650, 1205756, 1205758, 1205760, 1205762, 1205803, 1205846, 1206024, 1206036, 1206056, 1206057, 1206103, 1206224, 1206232, 1206340, 1206459, 1206492, 1206493, 1206552, 1206578, 1206640, 1206649, 1206677, 1206824, 1206843, 1206876, 1206877, 1206878, 1206880, 1206881, 1206882, 1206883, 1206884, 1206885, 1206886, 1206887, 1206888, 1206889, 1206890, 1206891, 1206893, 1206894, 1206935, 1206992, 1207034, 1207036, 1207050, 1207051, 1207088, 1207125, 1207149, 1207158, 1207168, 1207185, 1207270, 1207315, 1207328, 1207497, 1207500, 1207501, 1207506, 1207507, 1207521, 1207553, 1207560, 1207574, 1207588, 1207589, 1207590, 1207591, 1207592, 1207593, 1207594, 1207602, 1207603, 1207605, 1207606, 1207607, 1207608, 1207609, 1207610, 1207611, 1207612, 1207613, 1207614, 1207615, 1207616, 1207617, 1207618, 1207619, 1207620, 1207621, 1207622, 1207623, 1207624, 1207625, 1207626, 1207627, 1207628, 1207629, 1207630, 1207631, 1207632, 1207633, 1207634, 1207635, 1207636, 1207637, 1207638, 1207639, 1207640, 1207641, 1207642, 1207643, 1207644, 1207645, 1207646, 1207647, 1207648, 1207649, 1207650, 1207651, 1207652, 1207653, 1207734, 1207768, 1207769, 1207770, 1207771, 1207773, 1207795, 1207827, 1207842, 1207845, 1207875, 1207878, 1207933, 1207935, 1207948, 1208050, 1208076, 1208081, 1208105, 1208107, 1208128, 1208130, 1208149, 1208153, 1208183, 1208212, 1208219, 1208290, 1208368, 1208410, 1208420, 1208428, 1208429, 1208449, 1208534, 1208541, 1208542, 1208570, 1208588, 1208598, 1208599, 1208600, 1208601, 1208602, 1208604, 1208605, 1208607, 1208619, 1208628, 1208700, 1208741, 1208758, 1208759, 1208776, 1208777, 1208784, 1208787, 1208815, 1208816, 1208829, 1208837, 1208843, 1208845, 1208848, 1208864, 1208902, 1208948, 1208976, 1209008, 1209039, 1209052, 1209092, 1209159, 1209256, 1209258, 1209262, 1209287, 1209288, 1209290, 1209291, 1209292, 1209366, 1209367, 1209436, 1209457, 1209504, 1209532, 1209556, 1209600, 1209615, 1209635, 1209636, 1209637, 1209684, 1209687, 1209693, 1209739, 1209779, 1209780, 1209788, 1209798, 1209799, 1209804, 1209805, 1209856, 1209871, 1209927, 1209980, 1209982, 1209999, 1210034, 1210050, 1210158, 1210165, 1210202, 1210203, 1210206, 1210216, 1210230, 1210294, 1210301, 1210329, 1210335, 1210336, 1210337, 1210409, 1210439, 1210449, 1210450, 1210453, 1210454, 1210498, 1210506, 1210533, 1210551, 1210565, 1210584, 1210629, 1210644, 1210647, 1210725, 1210741, 1210762, 1210763, 1210764, 1210765, 1210766, 1210767, 1210768, 1210769, 1210770, 1210771, 1210775, 1210783, 1210791, 1210793, 1210806, 1210816, 1210817, 1210827, 1210853, 1210940, 1210943, 1210947, 1210953, 1210986, 1211014, 1211025, 1211037, 1211043, 1211044, 1211089, 1211105, 1211113, 1211131, 1211205, 1211263, 1211280, 1211281, 1211299, 1211346, 1211387, 1211400, 1211410, 1211414, 1211449, 1211465, 1211519, 1211564, 1211590, 1211592, 1211593, 1211595, 1211654, 1211686, 1211687, 1211688, 1211689, 1211690, 1211691, 1211692, 1211693, 1211714, 1211794, 1211796, 1211804, 1211807, 1211808, 1211820, 1211836, 1211847, 1211852, 1211855, 1211960, 1212051, 1212129, 1212154, 1212155, 1212158, 1212265, 1212350, 1212445, 1212448, 1212456, 1212494, 1212495, 1212504, 1212513, 1212540, 1212556, 1212561, 1212563, 1212564, 1212584, 1212592, 1212603, 1212605, 1212606, 1212619, 1212685, 1212701, 1212741, 1212835, 1212838, 1212842, 1212848, 1212861, 1212869, 1212892, 1212961, 1213010, 1213011, 1213012, 1213013, 1213014, 1213015, 1213016, 1213017, 1213018, 1213019, 1213020, 1213021, 1213024, 1213025, 1213032, 1213034, 1213035, 1213036, 1213037, 1213038, 1213039, 1213040, 1213041, 1213087, 1213088, 1213089, 1213090, 1213092, 1213093, 1213094, 1213095, 1213096, 1213098, 1213099, 1213100, 1213102, 1213103, 1213104, 1213105, 1213106, 1213107, 1213108, 1213109, 1213110, 1213111, 1213112, 1213113, 1213114, 1213116, 1213134 CVE References: CVE-2022-36280, CVE-2022-38096, CVE-2022-4269, CVE-2022-45884, CVE-2022-45885, CVE-2022-45886, CVE-2022-45887, CVE-2022-45919, CVE-2022-4744, CVE-2023-0045, CVE-2023-0122, CVE-2023-0179, CVE-2023-0394, CVE-2023-0461, CVE-2023-0469, CVE-2023-0590, CVE-2023-0597, CVE-2023-1075, CVE-2023-1076, CVE-2023-1077, CVE-2023-1079, CVE-2023-1095, CVE-2023-1118, CVE-2023-1249, CVE-2023-1382, CVE-2023-1513, CVE-2023-1582, CVE-2023-1583, CVE-2023-1611, CVE-2023-1637, CVE-2023-1652, CVE-2023-1670, CVE-2023-1829, CVE-2023-1838, CVE-2023-1855, CVE-2023-1989, CVE-2023-1998, CVE-2023-2002, CVE-2023-21102, CVE-2023-21106, CVE-2023-2124, CVE-2023-2156, CVE-2023-2162, CVE-2023-2176, CVE-2023-2235, CVE-2023-2269, CVE-2023-22998, CVE-2023-23000, CVE-2023-23001, CVE-2023-23004, CVE-2023-23006, CVE-2023-2430, CVE-2023-2483, CVE-2023-25012, CVE-2023-2513, CVE-2023-26545, CVE-2023-28327, CVE-2023-28410, CVE-2023-28464, CVE-2023-28866, CVE-2023-3006, CVE-2023-30456, CVE-2023-30772, CVE-2023-3090, CVE-2023-31084, CVE-2023-3111, CVE-2023-3141, CVE-2023-31436, CVE-2023-3161, CVE-2023-3212, CVE-2023-3220, CVE-2023-32233, CVE-2023-33288, CVE-2023-3357, CVE-2023-3358, CVE-2023-3389, CVE-2023-33951, CVE-2023-33952, CVE-2023-35788, CVE-2023-35823, CVE-2023-35828, CVE-2023-35829 Jira References: PED-1549, PED-3210, PED-3259, PED-3692, PED-370, PED-3750, PED-3759, PED-376, PED-3931, PED-4022, PED-835, SES-1880, SLE-18375, SLE-18377, SLE-18378, SLE-18379, SLE-18383, SLE-18384, SLE-18385, SLE-18978, SLE-18992, SLE-19001, SLE-19253, SLE-19255, SLE-19556 Sources used: openSUSE Leap 15.5 (src): kernel-livepatch-SLE15-SP5_Update_1-1-150500.11.7.1, kernel-syms-5.14.21-150500.55.7.1, kernel-obs-qa-5.14.21-150500.55.7.1, kernel-obs-build-5.14.21-150500.55.7.1, kernel-source-5.14.21-150500.55.7.1, kernel-default-base-5.14.21-150500.55.7.1.150500.6.2.5 Basesystem Module 15-SP5 (src): kernel-source-5.14.21-150500.55.7.1, kernel-default-base-5.14.21-150500.55.7.1.150500.6.2.5 Development Tools Module 15-SP5 (src): kernel-source-5.14.21-150500.55.7.1, kernel-syms-5.14.21-150500.55.7.1, kernel-obs-build-5.14.21-150500.55.7.1 SUSE Linux Enterprise Live Patching 15-SP5 (src): kernel-livepatch-SLE15-SP5_Update_1-1-150500.11.7.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.