Bug 1213493 - BUG: kernel NULL pointer dereference
Summary: BUG: kernel NULL pointer dereference
Status: RESOLVED FIXED
Alias: None
Product: openSUSE Distribution
Classification: openSUSE
Component: Kernel (show other bugs)
Version: Leap 15.5
Hardware: x86-64 openSUSE Leap 15.5
: P5 - None : Normal (vote)
Target Milestone: ---
Assignee: openSUSE Kernel Bugs
QA Contact: E-mail List
URL:
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2023-07-19 16:32 UTC by Krzysztof Chmielewski
Modified: 2024-06-25 17:50 UTC (History)
2 users (show)

See Also:
Found By: ---
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Krzysztof Chmielewski 2023-07-19 16:32:12 UTC
After applaying latest kernel updates:

openSUSE-SLE-15.5-2023-2871 - Security update for the Linux Kernel

Linux version 5.14.21-150500.55.7-default (geeko@buildhost) (gcc (SUSE Linux) 7.5.0, GNU ld (GNU Binutils; SUSE Linux Enterprise 15) 2.39.0.20220810-150100.7.40) #1 SMP PREEMPT_DYNAMIC Mon Jul 10 18:53:13 UTC 2023 (4204a3a)

system crashes when KDE powerdevil switches the display to power saving mode on inactivity, set to 10 min in KDE preferences dialog.

I get the following in /var/log/messages

2023-07-19T15:42:13.728134+02:00 NASK480348 dbus-daemon[890]: [system] Activating service name='org.kde.powerdevil.backlighthelper' requested by ':1.40' (uid=1000 pid=2839 comm="/usr/lib/org_kde_powerdevil ") (using servicehelper)
2023-07-19T15:42:13.753189+02:00 NASK480348 dbus-daemon[890]: [system] Successfully activated service 'org.kde.powerdevil.backlighthelper'
2023-07-19T15:43:28.723497+02:00 NASK480348 dbus-daemon[890]: [system] Activating service name='org.kde.powerdevil.backlighthelper' requested by ':1.40' (uid=1000 pid=2839 comm="/usr/lib/org_kde_powerdevil ") (using servicehelper)
2023-07-19T15:43:28.749192+02:00 NASK480348 dbus-daemon[890]: [system] Successfully activated service 'org.kde.powerdevil.backlighthelper'
2023-07-19T15:44:43.724011+02:00 NASK480348 dbus-daemon[890]: [system] Activating service name='org.kde.powerdevil.backlighthelper' requested by ':1.40' (uid=1000 pid=2839 comm="/usr/lib/org_kde_powerdevil ") (using servicehelper)
2023-07-19T15:44:43.758228+02:00 NASK480348 dbus-daemon[890]: [system] Successfully activated service 'org.kde.powerdevil.backlighthelper'
2023-07-19T15:49:44.066769+02:00 NASK480348 kernel: [ 5162.194932][ T1534] BUG: kernel NULL pointer dereference, address: 0000000000000048
2023-07-19T15:49:44.066795+02:00 NASK480348 kernel: [ 5162.194959][ T1534] #PF: supervisor read access in kernel mode
2023-07-19T15:49:44.066796+02:00 NASK480348 kernel: [ 5162.194967][ T1534] #PF: error_code(0x0000) - not-present page
2023-07-19T15:49:44.066798+02:00 NASK480348 kernel: [ 5162.194975][ T1534] PGD 0 P4D 0 
2023-07-19T15:49:44.066802+02:00 NASK480348 kernel: [ 5162.194983][ T1534] Oops: 0000 [#1] PREEMPT SMP NOPTI
2023-07-19T15:49:44.066803+02:00 NASK480348 kernel: [ 5162.194994][ T1534] CPU: 2 PID: 1534 Comm: X Tainted: G        W      X  N 5.14.21-150500.55.7-default #1 SLE15-SP5 620c7ef889d6152093b9f0b89e9d5debaf36da89
2023-07-19T15:49:44.066804+02:00 NASK480348 kernel: [ 5162.195010][ T1534] Hardware name: Dell Inc. Latitude 5530/0C6CYC, BIOS 1.14.0 06/07/2023
2023-07-19T15:49:44.066805+02:00 NASK480348 kernel: [ 5162.195017][ T1534] RIP: 0010:drm_atomic_get_mst_payload_state+0x5/0x40 [drm_display_helper]
2023-07-19T15:49:44.066806+02:00 NASK480348 kernel: [ 5162.195060][ T1534] Code: 0f 45 c2 45 85 c0 75 c3 ba 08 00 00 00 01 c0 89 c1 80 f1 d5 f6 c4 01 0f 45 c1 83 ea 01 75 ee c3 cc cc cc cc 90 0f 1f 44 00 00 <48> 8b 57 48 48 83 c7 48 48 39 d7 48 8d 42 e8 74 1b 48 3b 72 e8 75
2023-07-19T15:49:44.066809+02:00 NASK480348 kernel: [ 5162.195071][ T1534] RSP: 0018:ffffa1e682aaba78 EFLAGS: 00010246
2023-07-19T15:49:44.066810+02:00 NASK480348 kernel: [ 5162.195081][ T1534] RAX: 0000000000000000 RBX: ffff891c80f63000 RCX: ffff892029c88540
2023-07-19T15:49:44.066811+02:00 NASK480348 kernel: [ 5162.195089][ T1534] RDX: 0000000000000000 RSI: ffff891ca1e7c800 RDI: 0000000000000000
2023-07-19T15:49:44.066812+02:00 NASK480348 kernel: [ 5162.195095][ T1534] RBP: ffff892106f8c888 R08: ffff891c43180ac0 R09: ffff891c43180920
2023-07-19T15:49:44.066813+02:00 NASK480348 kernel: [ 5162.195102][ T1534] R10: ffff891cc0460000 R11: ffffffffba55bfc8 R12: ffff891ca1e78800
2023-07-19T15:49:44.066814+02:00 NASK480348 kernel: [ 5162.195108][ T1534] R13: 0000000000000000 R14: 0000000000000000 R15: ffff892106f8c000
2023-07-19T15:49:44.066815+02:00 NASK480348 kernel: [ 5162.195116][ T1534] FS:  00007f7e06df6980(0000) GS:ffff892b8f480000(0000) knlGS:0000000000000000
2023-07-19T15:49:44.066817+02:00 NASK480348 kernel: [ 5162.195125][ T1534] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
2023-07-19T15:49:44.066818+02:00 NASK480348 kernel: [ 5162.195132][ T1534] CR2: 0000000000000048 CR3: 0000000120396001 CR4: 0000000000770ee0
2023-07-19T15:49:44.066819+02:00 NASK480348 kernel: [ 5162.195139][ T1534] PKRU: 55555554
2023-07-19T15:49:44.066820+02:00 NASK480348 kernel: [ 5162.195145][ T1534] Call Trace:
2023-07-19T15:49:44.066822+02:00 NASK480348 kernel: [ 5162.195154][ T1534]  <TASK>
2023-07-19T15:49:44.066823+02:00 NASK480348 kernel: [ 5162.195165][ T1534]  intel_mst_disable_dp+0x5d/0xe0 [i915 5c4f92ac323d4930b4bc090312f2f2b0fcd62fa1]
2023-07-19T15:49:44.066824+02:00 NASK480348 kernel: [ 5162.195396][ T1534]  intel_encoders_disable+0x8f/0xb0 [i915 5c4f92ac323d4930b4bc090312f2f2b0fcd62fa1]
2023-07-19T15:49:44.066825+02:00 NASK480348 kernel: [ 5162.195623][ T1534]  hsw_crtc_disable+0x54/0x70 [i915 5c4f92ac323d4930b4bc090312f2f2b0fcd62fa1]
2023-07-19T15:49:44.066827+02:00 NASK480348 kernel: [ 5162.195835][ T1534]  intel_old_crtc_state_disables.isra.74+0x39/0xa0 [i915 5c4f92ac323d4930b4bc090312f2f2b0fcd62fa1]
2023-07-19T15:49:44.066828+02:00 NASK480348 kernel: [ 5162.196042][ T1534]  intel_atomic_commit_tail+0x3b4/0xe10 [i915 5c4f92ac323d4930b4bc090312f2f2b0fcd62fa1]
2023-07-19T15:49:44.066829+02:00 NASK480348 kernel: [ 5162.196241][ T1534]  ? intel_atomic_commit+0x340/0x390 [i915 5c4f92ac323d4930b4bc090312f2f2b0fcd62fa1]
2023-07-19T15:49:44.066830+02:00 NASK480348 kernel: [ 5162.196422][ T1534]  intel_atomic_commit+0x340/0x390 [i915 5c4f92ac323d4930b4bc090312f2f2b0fcd62fa1]
2023-07-19T15:49:44.066832+02:00 NASK480348 kernel: [ 5162.196603][ T1534]  drm_atomic_commit+0x93/0xc0 [drm a2dcf0986757ad27ff79cfc51c9ee1229e18d000]
2023-07-19T15:49:44.066833+02:00 NASK480348 kernel: [ 5162.196684][ T1534]  ? __drm_printfn_seq_file+0x20/0x20 [drm a2dcf0986757ad27ff79cfc51c9ee1229e18d000]
2023-07-19T15:49:44.066834+02:00 NASK480348 kernel: [ 5162.196748][ T1534]  drm_atomic_connector_commit_dpms+0xe9/0x100 [drm a2dcf0986757ad27ff79cfc51c9ee1229e18d000]
2023-07-19T15:49:44.066835+02:00 NASK480348 kernel: [ 5162.196803][ T1534]  drm_mode_obj_set_property_ioctl+0x192/0x3c0 [drm a2dcf0986757ad27ff79cfc51c9ee1229e18d000]
2023-07-19T15:49:44.066837+02:00 NASK480348 kernel: [ 5162.196870][ T1534]  ? drm_connector_set_obj_prop+0x80/0x80 [drm a2dcf0986757ad27ff79cfc51c9ee1229e18d000]
2023-07-19T15:49:44.066838+02:00 NASK480348 kernel: [ 5162.196937][ T1534]  drm_connector_property_set_ioctl+0x3e/0x60 [drm a2dcf0986757ad27ff79cfc51c9ee1229e18d000]
2023-07-19T15:49:44.066839+02:00 NASK480348 kernel: [ 5162.197006][ T1534]  drm_ioctl_kernel+0xb8/0x150 [drm a2dcf0986757ad27ff79cfc51c9ee1229e18d000]
2023-07-19T15:49:44.066841+02:00 NASK480348 kernel: [ 5162.197060][ T1534]  drm_ioctl+0x35a/0x400 [drm a2dcf0986757ad27ff79cfc51c9ee1229e18d000]
2023-07-19T15:49:44.066841+02:00 NASK480348 kernel: [ 5162.197111][ T1534]  ? drm_connector_set_obj_prop+0x80/0x80 [drm a2dcf0986757ad27ff79cfc51c9ee1229e18d000]
2023-07-19T15:49:44.066843+02:00 NASK480348 kernel: [ 5162.197179][ T1534]  __x64_sys_ioctl+0x8f/0xd0
2023-07-19T15:49:44.066844+02:00 NASK480348 kernel: [ 5162.197193][ T1534]  do_syscall_64+0x58/0x80
2023-07-19T15:49:44.066845+02:00 NASK480348 kernel: [ 5162.197202][ T1534]  ? do_syscall_64+0x67/0x80
2023-07-19T15:49:44.066847+02:00 NASK480348 kernel: [ 5162.197208][ T1534]  ? exit_to_user_mode_prepare+0x1ce/0x240
2023-07-19T15:49:44.066848+02:00 NASK480348 kernel: [ 5162.197219][ T1534]  ? exit_to_user_mode_prepare+0x1ce/0x240
2023-07-19T15:49:44.066849+02:00 NASK480348 kernel: [ 5162.197228][ T1534]  entry_SYSCALL_64_after_hwframe+0x61/0xcb
2023-07-19T15:49:44.066850+02:00 NASK480348 kernel: [ 5162.197239][ T1534] RIP: 0033:0x7f7e08356b07
2023-07-19T15:49:44.066851+02:00 NASK480348 kernel: [ 5162.197247][ T1534] Code: 90 90 90 48 8b 05 89 c3 0d 00 64 c7 00 26 00 00 00 48 c7 c0 ff ff ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 59 c3 0d 00 f7 d8 64 89 01 48
2023-07-19T15:49:44.066852+02:00 NASK480348 kernel: [ 5162.197257][ T1534] RSP: 002b:00007ffe76d27998 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
2023-07-19T15:49:44.066854+02:00 NASK480348 kernel: [ 5162.197265][ T1534] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00007f7e08356b07
2023-07-19T15:49:44.066855+02:00 NASK480348 kernel: [ 5162.197271][ T1534] RDX: 00007ffe76d279d0 RSI: 00000000c01064ab RDI: 000000000000000e
2023-07-19T15:49:44.066856+02:00 NASK480348 kernel: [ 5162.197276][ T1534] RBP: 00007ffe76d279d0 R08: 000055be2418cc30 R09: 000055be24093ae8
2023-07-19T15:49:44.066857+02:00 NASK480348 kernel: [ 5162.197281][ T1534] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000c01064ab
2023-07-19T15:49:44.066858+02:00 NASK480348 kernel: [ 5162.197287][ T1534] R13: 000000000000000e R14: 0000000000000000 R15: 000055be222fc320
2023-07-19T15:49:44.066859+02:00 NASK480348 kernel: [ 5162.197295][ T1534]  </TASK>
2023-07-19T15:49:44.066860+02:00 NASK480348 kernel: [ 5162.197299][ T1534] Modules linked in: tun rfcomm uhid snd_seq_dummy snd_hrtimer snd_seq zram wireguard curve25519_x86_64 libchacha20poly1305 chacha_x86_64 poly1305_x86_64 libblake2s blake2s_x86_64 libcurve25519_generic libchacha libblake2s_generic ip6_udp_tunnel udp_tunnel cmac algif_hash algif_skcipher af_alg xt_conntrack xt_MASQUERADE nf_conntrack_netlink xfrm_user xfrm_algo r8153_ecm(N) cdc_ether usbnet af_packet xt_addrtype snd_usb_audio sd_mod snd_usbmidi_lib snd_rawmidi snd_seq_device r8152 mii nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject br_netfilter nft_ct bnep bridge stp llc nft_chain_nat btusb btrtl btbcm btintel btmtk bluetooth uvcvideo videobuf2_vmalloc videobuf2_memops videobuf2_v4l2 videobuf2_common videodev mc ecdh_generic crc16 overlay nf_tables joydev ebtable_nat ebtable_broute ip6table_nat ip6table_mangle ip6table_raw ip6table_security iptable_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4
2023-07-19T15:49:44.066862+02:00 NASK480348 kernel: [ 5162.197393][ T1534]  iptable_mangle iptable_raw iptable_security ppdev parport_pc parport vmw_vsock_vmci_transport vsock vmw_vmci ip_set nfnetlink hid_multitouch ebtable_filter ebtables ip6table_filter ip6_tables iptable_filter bpfilter snd_hda_codec_hdmi iwlmvm mac80211 snd_sof_pci_intel_tgl snd_sof_intel_hda_common soundwire_intel soundwire_generic_allocation soundwire_cadence snd_ctl_led snd_sof_intel_hda libarc4 snd_sof_pci snd_sof_xtensa_dsp snd_sof snd_sof_utils snd_soc_hdac_hda snd_hda_codec_realtek snd_soc_acpi_intel_match snd_soc_acpi soundwire_bus snd_hda_codec_generic dell_rbtn(N) snd_hda_ext_core snd_soc_core x86_pkg_temp_thermal intel_powerclamp snd_compress snd_pcm_dmaengine coretemp qrtr(N) dell_laptop i2c_designware_platform ns(N) iwlwifi kvm_intel i2c_designware_core ee1004(N) mei_pxp mei_hdcp(N) snd_hda_intel iTCO_wdt snd_intel_dspcfg snd_intel_sdw_acpi intel_pmc_bxt iTCO_vendor_support intel_rapl_msr kvm dell_wmi ledtrig_audio dell_smbios dcdbas(X) dmi_sysfs
2023-07-19T15:49:44.066863+02:00 NASK480348 kernel: [ 5162.197496][ T1534]  dell_wmi_sysman(N) irqbypass firmware_attributes_class(N) wmi_bmof dell_wmi_descriptor snd_hda_codec pcspkr cfg80211 snd_hda_core snd_hwdep snd_pcm nls_iso8859_1 processor_thermal_device_pci snd_timer i2c_i801 processor_thermal_device nls_cp437 mei_me processor_thermal_rfim snd vfat processor_thermal_mbox ucsi_acpi fat typec_ucsi intel_lpss_pci intel_lpss cros_ec_ishtp(N) typec processor_thermal_rapl e1000e soundcore i2c_smbus mei rfkill idma64 cros_ec(N) intel_rapl_common igen6_edac roles button int3403_thermal int340x_thermal_zone acpi_tad(N) intel_pmc_core int3400_thermal acpi_thermal_rel intel_hid(N) sparse_keymap acpi_pad ac fuse configfs efi_pstore(N) ip_tables x_tables uas usb_storage usbhid hid_sensor_custom(N) hid_sensor_hub mfd_core hid_generic intel_ishtp_loader(N) intel_ishtp_hid nvme nvme_core nvme_common t10_pi crc64_rocksoft_generic crc64_rocksoft crc64 ahci libahci libata i915 i2c_algo_bit drm_buddy drm_display_helper drm_kms_helper
2023-07-19T15:49:44.066890+02:00 NASK480348 kernel: [ 5162.197603][ T1534]  crc32_pclmul syscopyarea sysfillrect sysimgblt fb_sys_fops sdhci_pci cec cqhci rc_core sdhci ttm xhci_pci intel_ish_ipc xhci_pci_renesas ghash_clmulni_intel xhci_hcd aesni_intel crypto_simd cryptd drm serio_raw usbcore mmc_core intel_ishtp vmd wmi battery i2c_hid_acpi i2c_hid video pinctrl_tigerlake btrfs blake2b_generic libcrc32c crc32c_intel xor raid6_pq sg dm_multipath dm_mod scsi_dh_rdac scsi_dh_emc scsi_dh_alua scsi_mod msr efivarfs
2023-07-19T15:49:44.066891+02:00 NASK480348 kernel: [ 5162.197685][ T1534] Supported: No, Unsupported modules are loaded
2023-07-19T15:49:44.066893+02:00 NASK480348 kernel: [ 5162.197692][ T1534] CR2: 0000000000000048
2023-07-19T15:49:44.066894+02:00 NASK480348 kernel: [ 5162.197699][ T1534] ---[ end trace 81d9a8bb4da88d67 ]---
2023-07-19T15:49:44.066895+02:00 NASK480348 kernel: [ 5162.197705][ T1534] RIP: 0010:drm_atomic_get_mst_payload_state+0x5/0x40 [drm_display_helper]
2023-07-19T15:49:44.066896+02:00 NASK480348 kernel: [ 5162.197733][ T1534] Code: 0f 45 c2 45 85 c0 75 c3 ba 08 00 00 00 01 c0 89 c1 80 f1 d5 f6 c4 01 0f 45 c1 83 ea 01 75 ee c3 cc cc cc cc 90 0f 1f 44 00 00 <48> 8b 57 48 48 83 c7 48 48 39 d7 48 8d 42 e8 74 1b 48 3b 72 e8 75
2023-07-19T15:49:44.066898+02:00 NASK480348 kernel: [ 5162.197742][ T1534] RSP: 0018:ffffa1e682aaba78 EFLAGS: 00010246
2023-07-19T15:49:44.066898+02:00 NASK480348 kernel: [ 5162.197748][ T1534] RAX: 0000000000000000 RBX: ffff891c80f63000 RCX: ffff892029c88540
2023-07-19T15:49:44.066900+02:00 NASK480348 kernel: [ 5162.197754][ T1534] RDX: 0000000000000000 RSI: ffff891ca1e7c800 RDI: 0000000000000000
2023-07-19T15:49:44.066901+02:00 NASK480348 kernel: [ 5162.197759][ T1534] RBP: ffff892106f8c888 R08: ffff891c43180ac0 R09: ffff891c43180920
2023-07-19T15:49:44.066902+02:00 NASK480348 kernel: [ 5162.197764][ T1534] R10: ffff891cc0460000 R11: ffffffffba55bfc8 R12: ffff891ca1e78800
2023-07-19T15:49:44.066903+02:00 NASK480348 kernel: [ 5162.197769][ T1534] R13: 0000000000000000 R14: 0000000000000000 R15: ffff892106f8c000
2023-07-19T15:49:44.066903+02:00 NASK480348 kernel: [ 5162.197774][ T1534] FS:  00007f7e06df6980(0000) GS:ffff892b8f480000(0000) knlGS:0000000000000000
2023-07-19T15:49:44.066904+02:00 NASK480348 kernel: [ 5162.197781][ T1534] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
2023-07-19T15:49:44.066905+02:00 NASK480348 kernel: [ 5162.197786][ T1534] CR2: 0000000000000048 CR3: 0000000120396001 CR4: 0000000000770ee0
2023-07-19T15:49:44.066907+02:00 NASK480348 kernel: [ 5162.197792][ T1534] PKRU: 55555554
2023-07-19T15:55:10.778442+02:00 NASK480348 kernel: [    0.000000][    T0] Linux version 5.14.21-150500.53-default (geeko@buildhost) (gcc (SUSE Linux) 7.5.0, GNU ld (GNU Binutils; SUSE Linux Enterprise 15) 2.39.0.20220810-150100.7.40) #1 SMP PREEMPT_DYNAMIC Wed May 10 07:56:26 UTC 2023 (b630043)
2023-07-19T15:55:10.778468+02:00 NASK480348 kernel: [    0.000000][    T0] Command line: BOOT_IMAGE=/boot/vmlinuz-5.14.21-150500.53-default root=UUID=0081dc3e-f07c-4712-965f-d2d836e11059 splash=silent preempt=voluntary quiet security=apparmor mitigations=auto

With the previous version of the kernel:

Linux version 5.14.21-150500.53-default (geeko@buildhost) (gcc (SUSE Linux) 7.5.0, GNU ld (GNU Binutils; SUSE Linux Enterprise 15) 2.39.0.20220810-150100.7.40) #1 SMP PREEMPT_DYNAMIC Wed May 10 07:56:26 UTC 2023 (b630043)

it works without crashes.
Comment 1 Takashi Iwai 2023-07-20 06:10:29 UTC
Thanks for the report.  Just to be sure, could you verify that the problem still persists with the latest kernel in OBS Kernel:SLE15-SP5 repo?
  http://download.opensuse.org/repositories/Kernel:/SLE15-SP5/pool/
Comment 2 Takashi Iwai 2023-07-20 06:45:12 UTC
In the case the latest Kernel:SLE15-SP5 still doesn't work:
I'm building another test kernel with a potential fix patch backport.  It's being built in OBS home:tiwai:bsc1213493 repo.  Once after the build finishes (takes an hour or so), could you try the package at
  http://download.opensuse.org/repositories/home:/tiwai:/bsc1213493/pool/
too?
Comment 3 Krzysztof Chmielewski 2023-07-20 09:39:34 UTC
Thanks for Your replay.

I can confirm, that the problem still persists with the latest kernel in OBS Kernel:SLE15-SP5 repo, from comment #1: 

2023-07-20T10:55:42.144832+02:00 NASK480348 kernel: [    0.000000][    T0] Linux version 5.14.21-150500.148.g7b4d390-default (geeko@buildhost) (gcc (SUSE Linux) 7.5.0, GNU ld (GNU Binutils; SUSE Linux Enterprise 15) 2.39.0.20220810-150100.7.40) #1 SMP PREEMPT_DYNAMIC Mon Jul 17 17:29:05 UTC 2023 (7b4d390)

I can also confirm, that the problem is resolved in the kernel built in OBS home:tiwai:bsc1213493 repo, from comment #2:

2023-07-20T11:05:20.980435+02:00 NASK480348 kernel: [    0.000000][    T0] Linux version 5.14.21-150500.1.g8d27c97-default (geeko@buildhost) (gcc (SUSE Linux) 7.5.0, GNU ld (GNU Binutils; SUSE Linux Enterprise 15) 2.39.0.20220810-150100.7.40) #1 SMP PREEMPT_DYNAMIC Thu Jul 20 06:39:51 UTC 2023 (8d27c97)
Comment 4 Takashi Iwai 2023-07-20 10:04:45 UTC
Thanks for quick testing!

So it was the missing upstream backport of the commit 326b1e792ff08b4d8ecb9605aec98e4e5feef56e
  drm/i915/dp_mst: Add the MST topology state for modesetted CRTCs

The fix will be included in the next maintenance update on August or earlier.
Until the fix is released, please keep my patched kernel.
Comment 5 Krzysztof Chmielewski 2023-07-20 10:14:04 UTC
I will, thank You very much!
Comment 14 Maintenance Automation 2023-08-03 09:40:45 UTC
SUSE-SU-2023:3172-1: An update that solves seven vulnerabilities, contains two features and has 25 fixes can now be installed.

Category: security (important)
Bug References: 1150305, 1193629, 1194869, 1207894, 1208788, 1211243, 1211867, 1212256, 1212301, 1212525, 1212846, 1212905, 1213059, 1213061, 1213205, 1213206, 1213226, 1213233, 1213245, 1213247, 1213252, 1213258, 1213259, 1213263, 1213264, 1213286, 1213493, 1213523, 1213524, 1213533, 1213543, 1213705
CVE References: CVE-2023-20593, CVE-2023-2985, CVE-2023-3117, CVE-2023-31248, CVE-2023-3390, CVE-2023-35001, CVE-2023-3812
Jira References: PED-4718, PED-4758
Sources used:
openSUSE Leap 15.5 (src): kernel-obs-qa-5.14.21-150500.55.12.1, kernel-source-5.14.21-150500.55.12.1, kernel-obs-build-5.14.21-150500.55.12.1, kernel-livepatch-SLE15-SP5_Update_2-1-150500.11.3.2, kernel-default-base-5.14.21-150500.55.12.1.150500.6.4.2, kernel-syms-5.14.21-150500.55.12.1
Basesystem Module 15-SP5 (src): kernel-source-5.14.21-150500.55.12.1, kernel-default-base-5.14.21-150500.55.12.1.150500.6.4.2
Development Tools Module 15-SP5 (src): kernel-obs-build-5.14.21-150500.55.12.1, kernel-source-5.14.21-150500.55.12.1, kernel-syms-5.14.21-150500.55.12.1
SUSE Linux Enterprise Live Patching 15-SP5 (src): kernel-livepatch-SLE15-SP5_Update_2-1-150500.11.3.2

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 15 Maintenance Automation 2023-08-03 20:30:43 UTC
SUSE-SU-2023:3180-1: An update that solves seven vulnerabilities, contains two features and has 26 fixes can now be installed.

Category: security (important)
Bug References: 1150305, 1193629, 1194869, 1207894, 1208788, 1211243, 1211867, 1212256, 1212301, 1212525, 1212846, 1212905, 1213059, 1213061, 1213205, 1213206, 1213226, 1213233, 1213245, 1213247, 1213252, 1213258, 1213259, 1213263, 1213264, 1213286, 1213311, 1213493, 1213523, 1213524, 1213533, 1213543, 1213705
CVE References: CVE-2023-20593, CVE-2023-2985, CVE-2023-3117, CVE-2023-31248, CVE-2023-3390, CVE-2023-35001, CVE-2023-3812
Jira References: PED-4718, PED-4758
Sources used:
openSUSE Leap 15.5 (src): kernel-source-azure-5.14.21-150500.33.11.1, kernel-syms-azure-5.14.21-150500.33.11.1
Public Cloud Module 15-SP5 (src): kernel-source-azure-5.14.21-150500.33.11.1, kernel-syms-azure-5.14.21-150500.33.11.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 20 Maintenance Automation 2023-08-14 08:30:29 UTC
SUSE-SU-2023:3302-1: An update that solves 28 vulnerabilities, contains two features and has 115 fixes can now be installed.

Category: security (important)
Bug References: 1150305, 1187829, 1193629, 1194869, 1206418, 1207129, 1207894, 1207948, 1208788, 1210335, 1210565, 1210584, 1210627, 1210780, 1210825, 1210853, 1211014, 1211131, 1211243, 1211738, 1211811, 1211867, 1212051, 1212256, 1212265, 1212301, 1212445, 1212456, 1212502, 1212525, 1212603, 1212604, 1212685, 1212766, 1212835, 1212838, 1212842, 1212846, 1212848, 1212861, 1212869, 1212892, 1212901, 1212905, 1212961, 1213010, 1213011, 1213012, 1213013, 1213014, 1213015, 1213016, 1213017, 1213018, 1213019, 1213020, 1213021, 1213024, 1213025, 1213032, 1213034, 1213035, 1213036, 1213037, 1213038, 1213039, 1213040, 1213041, 1213059, 1213061, 1213087, 1213088, 1213089, 1213090, 1213092, 1213093, 1213094, 1213095, 1213096, 1213098, 1213099, 1213100, 1213102, 1213103, 1213104, 1213105, 1213106, 1213107, 1213108, 1213109, 1213110, 1213111, 1213112, 1213113, 1213114, 1213116, 1213134, 1213167, 1213205, 1213206, 1213226, 1213233, 1213245, 1213247, 1213252, 1213258, 1213259, 1213263, 1213264, 1213272, 1213286, 1213287, 1213304, 1213417, 1213493, 1213523, 1213524, 1213533, 1213543, 1213578, 1213585, 1213586, 1213588, 1213601, 1213620, 1213632, 1213653, 1213705, 1213713, 1213715, 1213747, 1213756, 1213759, 1213777, 1213810, 1213812, 1213856, 1213857, 1213863, 1213867, 1213870, 1213871, 1213872
CVE References: CVE-2022-40982, CVE-2023-0459, CVE-2023-1829, CVE-2023-20569, CVE-2023-20593, CVE-2023-21400, CVE-2023-2156, CVE-2023-2166, CVE-2023-2430, CVE-2023-2985, CVE-2023-3090, CVE-2023-31083, CVE-2023-3111, CVE-2023-3117, CVE-2023-31248, CVE-2023-3212, CVE-2023-3268, CVE-2023-3389, CVE-2023-3390, CVE-2023-35001, CVE-2023-3567, CVE-2023-3609, CVE-2023-3611, CVE-2023-3776, CVE-2023-3812, CVE-2023-38409, CVE-2023-3863, CVE-2023-4004
Jira References: PED-4718, PED-4758
Sources used:
openSUSE Leap 15.5 (src): kernel-livepatch-SLE15-SP5-RT_Update_3-1-150500.11.5.1, kernel-syms-rt-5.14.21-150500.13.11.1, kernel-source-rt-5.14.21-150500.13.11.1
SUSE Linux Enterprise Live Patching 15-SP5 (src): kernel-livepatch-SLE15-SP5-RT_Update_3-1-150500.11.5.1
SUSE Real Time Module 15-SP5 (src): kernel-syms-rt-5.14.21-150500.13.11.1, kernel-source-rt-5.14.21-150500.13.11.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.