Bug 1214073 - [Build 20230807] nouveau regression on 6.4.8 kernel
Summary: [Build 20230807] nouveau regression on 6.4.8 kernel
Status: RESOLVED FIXED
Alias: None
Product: openSUSE Tumbleweed
Classification: openSUSE
Component: Kernel (show other bugs)
Version: Current
Hardware: x86-64 openSUSE Tumbleweed
: P5 - None : Normal (vote)
Target Milestone: ---
Assignee: openSUSE Kernel Bugs
QA Contact: E-mail List
URL:
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2023-08-08 12:27 UTC by Ilgaz Öcal
Modified: 2024-06-25 17:53 UTC (History)
2 users (show)

See Also:
Found By: ---
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments
photo of screen when system frozen (2.19 MB, image/jpeg)
2023-08-08 12:27 UTC, Ilgaz Öcal
Details
dmesg output of kernel 6.4.8 with nomodeset argument (89.47 KB, text/plain)
2023-08-08 13:05 UTC, Ilgaz Öcal
Details
dmesg of previous (6.4.6) kernel which boots fine without any extra arguments (89.32 KB, text/plain)
2023-08-08 13:06 UTC, Ilgaz Öcal
Details
the result of "modprobe nouveau modeset=1" (112.85 KB, text/plain)
2023-08-08 14:49 UTC, Ilgaz Öcal
Details
The kernel from http://download.opensuse.org/repositories/home:/tiwai:/bsc1214073/standard/ boots normally, its dmesg output (90.37 KB, text/plain)
2023-08-09 09:13 UTC, Ilgaz Öcal
Details
the result of "modprobe nouveau modeset=1" under the stable-kasan build (110.01 KB, text/plain)
2023-08-09 15:38 UTC, Ilgaz Öcal
Details
6.4.9 dmesg output right after it freezes on boot (125.81 KB, text/plain)
2023-08-13 10:52 UTC, Ilgaz Öcal
Details
dmesg output of kernel 6.7.6-1-default openSUSE TW 20240226-2767.1 (92.43 KB, text/plain)
2024-02-27 18:32 UTC, Ilgaz Öcal
Details

Note You need to log in before you can comment on or make changes to this bug.
Description Ilgaz Öcal 2023-08-08 12:27:30 UTC
Created attachment 868684 [details]
photo of screen when system frozen

As the system frozen and I am in hurry, I could only take photo of screen. It says
"ACPI: _SB_.PCIB. IXUE. IGPU: failed to evaluate _DSM"

 on the last line which was said to be a harmless effect of nvidia chipset. I am using nouveau drivers (built into kernel) and the system is macbook 5,1

I don't want to flood here with needless data, I can provide everything needed.
Comment 1 Takashi Iwai 2023-08-08 12:32:19 UTC
That ACPI message doesn't appear when you reboot with the older 6.4.x kernel?
In anyway, please give the dmesg from the old kernel as well as hwinfo output.

Then, boot the new kernel with "nomodeset" boot option for disabling the graphics.  If it's about nouveau, it should continue to boot.  Then give the dmesg output from there, too.
Comment 2 Ilgaz Öcal 2023-08-08 13:05:17 UTC
Created attachment 868685 [details]
dmesg output of kernel 6.4.8 with nomodeset argument

I have successfully booted with the "nomodeset" argument on non booting kernel.
Comment 3 Ilgaz Öcal 2023-08-08 13:06:56 UTC
Created attachment 868686 [details]
dmesg of previous (6.4.6) kernel which boots fine without any extra arguments

I booted from read-only snapshot of kernel 6.4.6 without adding any argument
Comment 4 Takashi Iwai 2023-08-08 13:16:55 UTC
So the ACPI message looks like a red herring; it's also present in 6.4.6, too.
It's likely some other breakage in nouveau, instead.

At 6.4.8 with nomodeset boot, you can load nouveau driver forcibly again:
  modprobe -r nouveau
  modprobe nouveau modeset=1

Then you might be able to get the kernel Oops or such more flexibly.  Test with it.
Comment 5 Ilgaz Öcal 2023-08-08 14:49:56 UTC
Created attachment 868688 [details]
the result of "modprobe nouveau modeset=1"

I did modprobe -r nouveau and modprobe nouveau modeset=1 , when I issued the last command system GUI locked up. Using ssh from another machine, I managed to get dmesg log.
Comment 6 Takashi Iwai 2023-08-08 15:07:21 UTC
Thanks.  So it's a clear bug in nouveau (or underlying DRM stuff).

Through a quick glance between 6.4.6 and 6.4.8, there have been only three changes for nouveau.

I'm building a test kernel with a revert of the suspected patch in OBS home:tiwai:bsc1214073 repo.  Once after the build finishes (takes an hour or so), the package will appear at
  http://download.opensuse.org/repositories/home:/tiwai:/bsc1214073/standard/
Please test it later.
Comment 7 Takashi Iwai 2023-08-08 15:11:05 UTC
... and if the test kernel doesn't work, try another one I'm building in OBS home:tiwai:bsc1214073-2 repo.   It disables two nouveau patches.
Comment 8 Ilgaz Öcal 2023-08-09 09:13:11 UTC
Created attachment 868714 [details]
The kernel from http://download.opensuse.org/repositories/home:/tiwai:/bsc1214073/standard/ boots normally, its dmesg output

Should I test the second one too?
Comment 9 Takashi Iwai 2023-08-09 09:23:12 UTC
Thanks for confirmation.  The test of the second kernel isn't needed.

It's likely the issue Boris reported recently on ML.  I'll add info there.

Unless the fix appears shortly, I'll revert the affecting patch for TW.
You can keep using my test kernel until we revert or fix on TW kernel.
Comment 10 Ilgaz Öcal 2023-08-09 09:44:31 UTC
(In reply to Takashi Iwai from comment #9)
> Thanks for confirmation.  The test of the second kernel isn't needed.
> 
> It's likely the issue Boris reported recently on ML.  I'll add info there.
> 
> Unless the fix appears shortly, I'll revert the affecting patch for TW.
> You can keep using my test kernel until we revert or fix on TW kernel.

I forgot to mention this strange issue I noticed while testing. When you run with "nomodeset" red looks blue etc. false colours appear on X11. I don't know if it is related to anything but I thought I better share.

Thank you again.
Comment 11 Takashi Iwai 2023-08-09 09:48:45 UTC
(In reply to Ilgaz Öcal from comment #10)
> (In reply to Takashi Iwai from comment #9)
> > Thanks for confirmation.  The test of the second kernel isn't needed.
> > 
> > It's likely the issue Boris reported recently on ML.  I'll add info there.
> > 
> > Unless the fix appears shortly, I'll revert the affecting patch for TW.
> > You can keep using my test kernel until we revert or fix on TW kernel.
> 
> I forgot to mention this strange issue I noticed while testing. When you run
> with "nomodeset" red looks blue etc. false colours appear on X11. I don't
> know if it is related to anything but I thought I better share.

It means some issue rather in EFI framebuffer.  Please open another bug entry.
Comment 12 Takashi Iwai 2023-08-09 13:10:28 UTC
The upstream dev asked for testing a code change to verify whether it's hitting the bug or not.  I'm building a test kernel in OBS home:tiwai:bsc1214073-3 repo.  Please check it later and report whether this is still broken or not.

BTW, the upcoming 6.4.9 doesn't contain the fix for nouveau yet.  I'll refresh my test kernel later to sync with 6.4.9.
Comment 13 Takashi Iwai 2023-08-09 13:17:25 UTC
FYI, the upstream commit in question is
2b5d1c29f6c4cb19369ef92881465e5ede75f4ef
    drm/nouveau/disp: PIOR DP uses GPIO for HPD, not PMGR AUX interrupts

Which was backported to stable 6.4.7 kernel.
Comment 14 Ilgaz Öcal 2023-08-09 14:38:23 UTC
(In reply to Takashi Iwai from comment #12)
> The upstream dev asked for testing a code change to verify whether it's
> hitting the bug or not.  I'm building a test kernel in OBS
> home:tiwai:bsc1214073-3 repo.  Please check it later and report whether this
> is still broken or not.
> 
> BTW, the upcoming 6.4.9 doesn't contain the fix for nouveau yet.  I'll
> refresh my test kernel later to sync with 6.4.9.

I installed the home:tiwai:bsc1214073-3 kernel. It freezes on boot. I thought about using ssh but the wireless usb wasn't initialized yet.
Comment 15 Takashi Iwai 2023-08-09 14:49:22 UTC
Thanks for testing.  I reported back to the upstream.

Then, one more favor: could you test the kernel in OBS home:tiwai:kernel:stable-kasan?  Boot with nomodeset, and forcibly reload nouveau with modeset=1 like before, and try to get the kernel log.
Comment 16 Ilgaz Öcal 2023-08-09 15:38:47 UTC
Created attachment 868721 [details]
the result of "modprobe nouveau modeset=1" under the stable-kasan build

I tested home:tiwai:kernel:stable-kasan build via booting with nomodeset and modprobing nouveau modeset=1
Comment 17 Takashi Iwai 2023-08-11 07:33:25 UTC
It's still unresolved in the upstream side, and the development will be paused for a while due to vacation, I'll revert the buggy patch as a temporary workaround for TW kernel.

Let's keep this bug open until we receive more proper fix from the upstream.
Comment 18 Ilgaz Öcal 2023-08-12 13:52:45 UTC
(In reply to Takashi Iwai from comment #17)
> It's still unresolved in the upstream side, and the development will be
> paused for a while due to vacation, I'll revert the buggy patch as a
> temporary workaround for TW kernel.
> 
> Let's keep this bug open until we receive more proper fix from the upstream.

On Reddit I saw another user updating to 6.8.9 kernel and his/her issue was fixed. I booted to openSUSE TW with 'nomodeset' and did 'zypper dup' to get all updates including 6.9.1 . System freezes during boot process right after nouveau module mentioned. I booted with nomodeset to X11 and made sure machine is connected. Once I issue 'modprobe nouveau modeset=1' command, system freezes and unfortunately I can't ssh to it (no route to host).
Comment 19 Ilgaz Öcal 2023-08-13 10:52:36 UTC
Created attachment 868780 [details]
6.4.9 dmesg output right after it freezes on boot

I could ssh to the machine with MCP79 NVidia 9400 (Macbook 5.1) and grab its dmesg from the other Linux I am running. Unfortunately it still freezes. I believe I can still boot with nomodeset so don't hesitate asking me for information/tests.
Comment 20 Takashi Iwai 2023-08-13 16:29:34 UTC
The kernel you booted doesn't include the patch revert yet.
Test with the kernel in OBS Kernel:stable repo.
Comment 21 Takashi Iwai 2023-08-14 15:09:19 UTC
Now we identify a place that may cause a memory corruption, and this *might* be the culprit of your problem:
  https://lore.kernel.org/r/20230814144933.3956959-1-kherbst@redhat.com

I'm building yet another test kernel with the fix (and the drop of the previous revert) in OBS home:tiwai:bsc1214073-4 repo.  Could you test the kernel later and report back?
Comment 22 Ilgaz Öcal 2023-08-14 16:07:41 UTC
(In reply to Takashi Iwai from comment #21)
> Now we identify a place that may cause a memory corruption, and this *might*
> be the culprit of your problem:
>   https://lore.kernel.org/r/20230814144933.3956959-1-kherbst@redhat.com
> 
> I'm building yet another test kernel with the fix (and the drop of the
> previous revert) in OBS home:tiwai:bsc1214073-4 repo.  Could you test the
> kernel later and report back?

Of course, I will be able to test in 16 hours since I am not physically near that Mac.
Comment 23 Ilgaz Öcal 2023-08-15 09:39:53 UTC
(In reply to Takashi Iwai from comment #21)
> Now we identify a place that may cause a memory corruption, and this *might*
> be the culprit of your problem:
>   https://lore.kernel.org/r/20230814144933.3956959-1-kherbst@redhat.com
> 
> I'm building yet another test kernel with the fix (and the drop of the
> previous revert) in OBS home:tiwai:bsc1214073-4 repo.  Could you test the
> kernel later and report back?

I am currently on your build it runs perfectly with both wayland/x11 I even did run glmark2 . 

When I wanted to make sure openGL is working etc, I have installed/run flatpak io.github.arunsivaramanneo.GPUViewer which just calls gl information from system and shows in a formatted view. GPU freezes that time with a lot of messages regarding nouveau. I am not sure if there is a co-incidence or related to this issue.
Comment 24 Takashi Iwai 2023-08-15 09:49:30 UTC
Good to hear.  I pushed the fix and drop the previous revert for TW stable branch now.
Comment 26 Takashi Iwai 2023-08-18 14:22:24 UTC
Let's close.
Comment 33 Maintenance Automation 2023-09-14 12:31:09 UTC
SUSE-SU-2023:3599-1: An update that solves 20 vulnerabilities, contains eight features and has 53 security fixes can now be installed.

Category: security (important)
Bug References: 1023051, 1120059, 1177719, 1188885, 1193629, 1194869, 1203329, 1203330, 1205462, 1206453, 1208902, 1208949, 1209284, 1209799, 1210048, 1210448, 1211220, 1212091, 1212142, 1212423, 1212526, 1212857, 1212873, 1213026, 1213123, 1213546, 1213580, 1213601, 1213666, 1213733, 1213757, 1213759, 1213916, 1213921, 1213927, 1213946, 1213949, 1213968, 1213970, 1213971, 1214000, 1214019, 1214073, 1214120, 1214149, 1214180, 1214233, 1214238, 1214285, 1214297, 1214299, 1214305, 1214350, 1214368, 1214370, 1214371, 1214372, 1214380, 1214386, 1214392, 1214393, 1214397, 1214404, 1214428, 1214451, 1214659, 1214661, 1214727, 1214729, 1214742, 1214743, 1214756, 1214976
CVE References: CVE-2022-38457, CVE-2022-40133, CVE-2023-2007, CVE-2023-20588, CVE-2023-34319, CVE-2023-3610, CVE-2023-37453, CVE-2023-3772, CVE-2023-3863, CVE-2023-40283, CVE-2023-4128, CVE-2023-4133, CVE-2023-4134, CVE-2023-4147, CVE-2023-4194, CVE-2023-4273, CVE-2023-4387, CVE-2023-4459, CVE-2023-4563, CVE-2023-4569
Jira References: PED-3924, PED-4579, PED-4759, PED-4927, PED-4929, PED-5738, PED-6003, PED-6004
Sources used:
openSUSE Leap 15.5 (src): kernel-syms-rt-5.14.21-150500.13.14.1, kernel-livepatch-SLE15-SP5-RT_Update_4-1-150500.11.3.1, kernel-source-rt-5.14.21-150500.13.14.1
SUSE Linux Enterprise Live Patching 15-SP5 (src): kernel-livepatch-SLE15-SP5-RT_Update_4-1-150500.11.3.1
SUSE Real Time Module 15-SP5 (src): kernel-syms-rt-5.14.21-150500.13.14.1, kernel-source-rt-5.14.21-150500.13.14.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 34 Maintenance Automation 2023-09-18 16:30:31 UTC
SUSE-SU-2023:3656-1: An update that solves 20 vulnerabilities, contains eight features and has 54 security fixes can now be installed.

Category: security (important)
Bug References: 1023051, 1120059, 1177719, 1188885, 1193629, 1194869, 1203329, 1203330, 1205462, 1206453, 1208902, 1208949, 1209284, 1209799, 1210048, 1210448, 1211220, 1212091, 1212142, 1212423, 1212526, 1212857, 1212873, 1213026, 1213123, 1213546, 1213580, 1213601, 1213666, 1213733, 1213757, 1213759, 1213916, 1213921, 1213927, 1213946, 1213949, 1213968, 1213970, 1213971, 1214000, 1214019, 1214073, 1214120, 1214149, 1214180, 1214233, 1214238, 1214285, 1214297, 1214299, 1214305, 1214350, 1214368, 1214370, 1214371, 1214372, 1214380, 1214386, 1214392, 1214393, 1214397, 1214404, 1214428, 1214451, 1214659, 1214661, 1214727, 1214729, 1214742, 1214743, 1214756, 1214760, 1214976
CVE References: CVE-2022-38457, CVE-2022-40133, CVE-2023-2007, CVE-2023-20588, CVE-2023-34319, CVE-2023-3610, CVE-2023-37453, CVE-2023-3772, CVE-2023-3863, CVE-2023-40283, CVE-2023-4128, CVE-2023-4133, CVE-2023-4134, CVE-2023-4147, CVE-2023-4194, CVE-2023-4273, CVE-2023-4387, CVE-2023-4459, CVE-2023-4563, CVE-2023-4569
Jira References: PED-3924, PED-4579, PED-4759, PED-4927, PED-4929, PED-5738, PED-6003, PED-6004
Sources used:
openSUSE Leap 15.5 (src): kernel-source-azure-5.14.21-150500.33.17.1, kernel-syms-azure-5.14.21-150500.33.17.1
Public Cloud Module 15-SP5 (src): kernel-source-azure-5.14.21-150500.33.17.1, kernel-syms-azure-5.14.21-150500.33.17.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 35 Maintenance Automation 2023-09-20 12:30:30 UTC
SUSE-SU-2023:3704-1: An update that solves 20 vulnerabilities, contains eight features and has 53 security fixes can now be installed.

Category: security (important)
Bug References: 1023051, 1120059, 1177719, 1188885, 1193629, 1194869, 1203329, 1203330, 1205462, 1206453, 1208902, 1208949, 1209284, 1209799, 1210048, 1210448, 1211220, 1212091, 1212142, 1212423, 1212526, 1212857, 1212873, 1213026, 1213123, 1213546, 1213580, 1213601, 1213666, 1213733, 1213757, 1213759, 1213916, 1213921, 1213927, 1213946, 1213949, 1213968, 1213970, 1213971, 1214000, 1214019, 1214073, 1214120, 1214149, 1214180, 1214233, 1214238, 1214285, 1214297, 1214299, 1214305, 1214350, 1214368, 1214370, 1214371, 1214372, 1214380, 1214386, 1214392, 1214393, 1214397, 1214404, 1214428, 1214451, 1214659, 1214661, 1214727, 1214729, 1214742, 1214743, 1214756, 1214976
CVE References: CVE-2022-38457, CVE-2022-40133, CVE-2023-2007, CVE-2023-20588, CVE-2023-34319, CVE-2023-3610, CVE-2023-37453, CVE-2023-3772, CVE-2023-3863, CVE-2023-40283, CVE-2023-4128, CVE-2023-4133, CVE-2023-4134, CVE-2023-4147, CVE-2023-4194, CVE-2023-4273, CVE-2023-4387, CVE-2023-4459, CVE-2023-4563, CVE-2023-4569
Jira References: PED-3924, PED-4579, PED-4759, PED-4927, PED-4929, PED-5738, PED-6003, PED-6004
Sources used:
openSUSE Leap 15.5 (src): kernel-livepatch-SLE15-SP5_Update_4-1-150500.11.3.1, kernel-obs-build-5.14.21-150500.55.22.1, kernel-syms-5.14.21-150500.55.22.1, kernel-obs-qa-5.14.21-150500.55.22.1, kernel-source-5.14.21-150500.55.22.1, kernel-default-base-5.14.21-150500.55.22.1.150500.6.8.1
Basesystem Module 15-SP5 (src): kernel-source-5.14.21-150500.55.22.1, kernel-default-base-5.14.21-150500.55.22.1.150500.6.8.1
Development Tools Module 15-SP5 (src): kernel-syms-5.14.21-150500.55.22.1, kernel-obs-build-5.14.21-150500.55.22.1, kernel-source-5.14.21-150500.55.22.1
SUSE Linux Enterprise Live Patching 15-SP5 (src): kernel-livepatch-SLE15-SP5_Update_4-1-150500.11.3.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 36 Maintenance Automation 2023-09-21 12:30:17 UTC
SUSE-SU-2023:3599-2: An update that solves 20 vulnerabilities, contains eight features and has 53 security fixes can now be installed.

Category: security (important)
Bug References: 1023051, 1120059, 1177719, 1188885, 1193629, 1194869, 1203329, 1203330, 1205462, 1206453, 1208902, 1208949, 1209284, 1209799, 1210048, 1210448, 1211220, 1212091, 1212142, 1212423, 1212526, 1212857, 1212873, 1213026, 1213123, 1213546, 1213580, 1213601, 1213666, 1213733, 1213757, 1213759, 1213916, 1213921, 1213927, 1213946, 1213949, 1213968, 1213970, 1213971, 1214000, 1214019, 1214073, 1214120, 1214149, 1214180, 1214233, 1214238, 1214285, 1214297, 1214299, 1214305, 1214350, 1214368, 1214370, 1214371, 1214372, 1214380, 1214386, 1214392, 1214393, 1214397, 1214404, 1214428, 1214451, 1214659, 1214661, 1214727, 1214729, 1214742, 1214743, 1214756, 1214976
CVE References: CVE-2022-38457, CVE-2022-40133, CVE-2023-2007, CVE-2023-20588, CVE-2023-34319, CVE-2023-3610, CVE-2023-37453, CVE-2023-3772, CVE-2023-3863, CVE-2023-40283, CVE-2023-4128, CVE-2023-4133, CVE-2023-4134, CVE-2023-4147, CVE-2023-4194, CVE-2023-4273, CVE-2023-4387, CVE-2023-4459, CVE-2023-4563, CVE-2023-4569
Jira References: PED-3924, PED-4579, PED-4759, PED-4927, PED-4929, PED-5738, PED-6003, PED-6004
Sources used:
openSUSE Leap 15.5 (src): kernel-syms-rt-5.14.21-150500.13.14.1, kernel-source-rt-5.14.21-150500.13.14.1, kernel-livepatch-SLE15-SP5-RT_Update_4-1-150500.11.3.1
SUSE Linux Enterprise Live Patching 15-SP5 (src): kernel-livepatch-SLE15-SP5-RT_Update_4-1-150500.11.3.1
SUSE Real Time Module 15-SP5 (src): kernel-syms-rt-5.14.21-150500.13.14.1, kernel-source-rt-5.14.21-150500.13.14.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 37 Maintenance Automation 2023-09-21 12:31:09 UTC
SUSE-SU-2023:3704-2: An update that solves 20 vulnerabilities, contains eight features and has 53 security fixes can now be installed.

Category: security (important)
Bug References: 1023051, 1120059, 1177719, 1188885, 1193629, 1194869, 1203329, 1203330, 1205462, 1206453, 1208902, 1208949, 1209284, 1209799, 1210048, 1210448, 1211220, 1212091, 1212142, 1212423, 1212526, 1212857, 1212873, 1213026, 1213123, 1213546, 1213580, 1213601, 1213666, 1213733, 1213757, 1213759, 1213916, 1213921, 1213927, 1213946, 1213949, 1213968, 1213970, 1213971, 1214000, 1214019, 1214073, 1214120, 1214149, 1214180, 1214233, 1214238, 1214285, 1214297, 1214299, 1214305, 1214350, 1214368, 1214370, 1214371, 1214372, 1214380, 1214386, 1214392, 1214393, 1214397, 1214404, 1214428, 1214451, 1214659, 1214661, 1214727, 1214729, 1214742, 1214743, 1214756, 1214976
CVE References: CVE-2022-38457, CVE-2022-40133, CVE-2023-2007, CVE-2023-20588, CVE-2023-34319, CVE-2023-3610, CVE-2023-37453, CVE-2023-3772, CVE-2023-3863, CVE-2023-40283, CVE-2023-4128, CVE-2023-4133, CVE-2023-4134, CVE-2023-4147, CVE-2023-4194, CVE-2023-4273, CVE-2023-4387, CVE-2023-4459, CVE-2023-4563, CVE-2023-4569
Jira References: PED-3924, PED-4579, PED-4759, PED-4927, PED-4929, PED-5738, PED-6003, PED-6004
Sources used:
openSUSE Leap 15.5 (src): kernel-livepatch-SLE15-SP5_Update_4-1-150500.11.3.1, kernel-obs-build-5.14.21-150500.55.22.1, kernel-syms-5.14.21-150500.55.22.1, kernel-obs-qa-5.14.21-150500.55.22.1, kernel-source-5.14.21-150500.55.22.1, kernel-default-base-5.14.21-150500.55.22.1.150500.6.8.1
Basesystem Module 15-SP5 (src): kernel-source-5.14.21-150500.55.22.1, kernel-default-base-5.14.21-150500.55.22.1.150500.6.8.1
Development Tools Module 15-SP5 (src): kernel-syms-5.14.21-150500.55.22.1, kernel-obs-build-5.14.21-150500.55.22.1, kernel-source-5.14.21-150500.55.22.1
SUSE Linux Enterprise Live Patching 15-SP5 (src): kernel-livepatch-SLE15-SP5_Update_4-1-150500.11.3.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 38 Maintenance Automation 2023-10-04 16:30:21 UTC
SUSE-SU-2023:3971-1: An update that solves 20 vulnerabilities, contains eight features and has 58 security fixes can now be installed.

Category: security (important)
Bug References: 1023051, 1120059, 1177719, 1188885, 1193629, 1194869, 1203329, 1203330, 1205462, 1206453, 1208902, 1208949, 1209284, 1209799, 1210048, 1210448, 1211220, 1212091, 1212142, 1212423, 1212526, 1212857, 1212873, 1213026, 1213123, 1213546, 1213580, 1213601, 1213666, 1213733, 1213757, 1213759, 1213916, 1213921, 1213927, 1213946, 1213949, 1213968, 1213970, 1213971, 1214000, 1214019, 1214073, 1214120, 1214149, 1214180, 1214233, 1214238, 1214285, 1214297, 1214299, 1214305, 1214350, 1214368, 1214370, 1214371, 1214372, 1214380, 1214386, 1214392, 1214393, 1214397, 1214404, 1214428, 1214451, 1214635, 1214659, 1214661, 1214727, 1214729, 1214742, 1214743, 1214756, 1214976, 1215522, 1215523, 1215552, 1215553
CVE References: CVE-2022-38457, CVE-2022-40133, CVE-2023-2007, CVE-2023-20588, CVE-2023-34319, CVE-2023-3610, CVE-2023-37453, CVE-2023-3772, CVE-2023-3863, CVE-2023-40283, CVE-2023-4128, CVE-2023-4133, CVE-2023-4134, CVE-2023-4147, CVE-2023-4194, CVE-2023-4273, CVE-2023-4387, CVE-2023-4459, CVE-2023-4563, CVE-2023-4569
Jira References: PED-3924, PED-4579, PED-4759, PED-4927, PED-4929, PED-5738, PED-6003, PED-6004
Sources used:
openSUSE Leap 15.5 (src): kernel-obs-build-5.14.21-150500.55.28.1, kernel-obs-qa-5.14.21-150500.55.28.1, kernel-syms-5.14.21-150500.55.28.1, kernel-source-5.14.21-150500.55.28.1, kernel-default-base-5.14.21-150500.55.28.1.150500.6.11.2, kernel-livepatch-SLE15-SP5_Update_5-1-150500.11.5.1
SUSE Linux Enterprise Micro 5.5 (src): kernel-default-base-5.14.21-150500.55.28.1.150500.6.11.2
Basesystem Module 15-SP5 (src): kernel-default-base-5.14.21-150500.55.28.1.150500.6.11.2, kernel-source-5.14.21-150500.55.28.1
Development Tools Module 15-SP5 (src): kernel-obs-build-5.14.21-150500.55.28.1, kernel-syms-5.14.21-150500.55.28.1, kernel-source-5.14.21-150500.55.28.1
SUSE Linux Enterprise Live Patching 15-SP5 (src): kernel-livepatch-SLE15-SP5_Update_5-1-150500.11.5.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 39 Maintenance Automation 2023-10-05 16:29:23 UTC
SUSE-SU-2023:3988-1: An update that solves 24 vulnerabilities, contains 10 features and has 64 security fixes can now be installed.

Category: security (important)
Bug References: 1023051, 1065729, 1120059, 1177719, 1187236, 1188885, 1193629, 1194869, 1203329, 1203330, 1205462, 1206453, 1208902, 1208949, 1208995, 1209284, 1209799, 1210048, 1210169, 1210448, 1210643, 1211220, 1212091, 1212142, 1212423, 1212526, 1212857, 1212873, 1213026, 1213123, 1213546, 1213580, 1213601, 1213666, 1213733, 1213757, 1213759, 1213916, 1213921, 1213927, 1213946, 1213949, 1213968, 1213970, 1213971, 1214000, 1214019, 1214073, 1214120, 1214149, 1214180, 1214233, 1214238, 1214285, 1214297, 1214299, 1214305, 1214350, 1214368, 1214370, 1214371, 1214372, 1214380, 1214386, 1214392, 1214393, 1214397, 1214404, 1214428, 1214451, 1214635, 1214659, 1214661, 1214727, 1214729, 1214742, 1214743, 1214756, 1214813, 1214873, 1214928, 1214976, 1214988, 1215123, 1215124, 1215148, 1215221, 1215523
CVE References: CVE-2022-38457, CVE-2022-40133, CVE-2023-1192, CVE-2023-1859, CVE-2023-2007, CVE-2023-20588, CVE-2023-2177, CVE-2023-34319, CVE-2023-3610, CVE-2023-37453, CVE-2023-3772, CVE-2023-3863, CVE-2023-40283, CVE-2023-4128, CVE-2023-4133, CVE-2023-4134, CVE-2023-4147, CVE-2023-4194, CVE-2023-4273, CVE-2023-4387, CVE-2023-4459, CVE-2023-4563, CVE-2023-4569, CVE-2023-4881
Jira References: PED-2023, PED-2025, PED-3924, PED-4579, PED-4759, PED-4927, PED-4929, PED-5738, PED-6003, PED-6004
Sources used:
SUSE Real Time Module 15-SP5 (src): kernel-syms-rt-5.14.21-150500.13.18.1, kernel-source-rt-5.14.21-150500.13.18.1
openSUSE Leap 15.5 (src): kernel-syms-rt-5.14.21-150500.13.18.1, kernel-livepatch-SLE15-SP5-RT_Update_5-1-150500.11.3.1, kernel-source-rt-5.14.21-150500.13.18.1
SUSE Linux Enterprise Live Patching 15-SP5 (src): kernel-livepatch-SLE15-SP5-RT_Update_5-1-150500.11.3.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 45 Ilgaz Öcal 2024-02-27 18:28:55 UTC
Unfortunately, this issue (brightness) has surfaced again. Should I install every 6.x release to figure when it last appeared?
For a start, I checked vanilla version of the current kernel and using nomodeset. I also tried backlight=native etc.
brightnessctl claims I have keyboard backlight and doesn't show anything else.
Comment 46 Ilgaz Öcal 2024-02-27 18:32:17 UTC
Created attachment 873058 [details]
dmesg output of kernel 6.7.6-1-default openSUSE TW 20240226-2767.1
Comment 47 Ilgaz Öcal 2024-02-27 18:34:10 UTC
Apologies, I must have confused my bug reports regarding brightness. I guess this was freeze bug.