Bug 922634 - USB 3.0 Safely Remove Drive attach the drive again
USB 3.0 Safely Remove Drive attach the drive again
Status: RESOLVED FIXED
: 859374 (view as bug list)
Classification: openSUSE
Product: openSUSE Distribution
Classification: openSUSE
Component: Kernel
13.2
i686 openSUSE 13.2
: P5 - None : Normal (vote)
: 13.2
Assigned To: Oliver Neukum
E-mail List
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2015-03-17 02:53 UTC by Luis Medina
Modified: 2017-04-25 22:42 UTC (History)
5 users (show)

See Also:
Found By: Field Engineer
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments
Output of systemd-journalctl (9.36 KB, text/plain)
2015-03-17 02:53 UTC, Luis Medina
Details
systemd-journalctl output (576.51 KB, text/plain)
2015-09-03 19:44 UTC, Luis Medina
Details
systemd-journalctl divided by action (18.21 KB, application/gzip)
2015-09-08 14:56 UTC, Luis Medina
Details

Note You need to log in before you can comment on or make changes to this bug.
Description Luis Medina 2015-03-17 02:53:50 UTC
Created attachment 627090 [details]
Output of systemd-journalctl

Powering usb drive ("Safely Remove Drive") isn't working, the HDD gets reattached again.
Comment 2 Takashi Iwai 2015-06-19 13:27:58 UTC
Does "Eject" also behave same?  It should really detach without re-probe.
If "Eject" works, it's the answer -- why there are two distinct entries.

(Maybe there aren't on GNOME...  It exists on XFCE4, at least.)
Comment 3 Luis Medina 2015-06-24 04:16:19 UTC
The "Eject" button works (Gnome) but it only unmount the partition and does not actually deactivate the disk.

If the disk is connected to an usb 2.0 port "Safely Remove Drive" works, turning off the disk.
Comment 4 Takashi Iwai 2015-06-29 08:13:01 UTC
Oliver, this seems like a regression with xhci (with respect to ehci).  Is there a known fix / workaround?

I also remember that one of my USB disks behaves like this.
Comment 5 Luis Medina 2015-06-29 16:28:42 UTC
(In reply to Takashi Iwai from comment #4)
> Oliver, this seems like a regression with xhci (with respect to ehci).  Is
> there a known fix / workaround?
> 
> I also remember that one of my USB disks behaves like this.

One workaround is to attach the HDD to an USB 2.0 port.
Comment 6 Oliver Neukum 2015-06-30 06:29:29 UTC
What does the eject command on a terminal do?
Comment 7 Luis Medina 2015-06-30 18:22:11 UTC
(In reply to Oliver Neukum from comment #6)
> What does the eject command on a terminal do?

Hi Oliver,

The eject command just unmount the partitions.

medina:~ # eject /dev/sdb

systemd-journalctl log:

Jun 30 13:12:50 medina.novell.com udisksd[2047]: Cleaning up mount point /run/media/luis/LUIS (device 8:17 is not mounted)
Jun 30 13:12:50 medina.novell.com ntfs-3g[4472]: Unmounting /dev/sdb1 (LUIS)
Jun 30 13:12:50 medina.novell.com udisksd[2047]: Cleaning up mount point /run/media/luis/ALBERTO (device 8:18 is not mounted)

However, if detach the hdd it gets remounted in my USB 3.0 port.

medina:~ # udisksctl power-off -b /dev/sdb

systemd-journalctl log:

Jun 30 13:13:01 medina.novell.com udisksd[2047]: Powering off /dev/sdb - successfully sent SCSI command START STOP UNIT
Jun 30 13:13:01 medina.novell.com kernel: sd 7:0:0:0: [sdb] Synchronizing SCSI cache
Jun 30 13:13:01 medina.novell.com udisksd[2047]: Powered off /dev/sdb - successfully wrote to sysfs path /sys/devices/pci0000:00/0000:00:14.0/usb3/3-1/remove
Jun 30 13:13:01 medina.novell.com kernel: sd 7:0:0:0: [sdb]  
Jun 30 13:13:01 medina.novell.com kernel: Result: hostbyte=DID_ERROR driverbyte=DRIVER_OK
Jun 30 13:13:01 medina.novell.com kernel: usb 3-1: USB disconnect, device number 5
Jun 30 13:13:01 medina.novell.com kernel: usb 3-1: new SuperSpeed USB device number 6 using xhci_hcd
Jun 30 13:13:01 medina.novell.com kernel: usb 3-1: New USB device found, idVendor=0bc2, idProduct=2321
Jun 30 13:13:01 medina.novell.com kernel: usb 3-1: New USB device strings: Mfr=2, Product=3, SerialNumber=1
Jun 30 13:13:01 medina.novell.com kernel: usb 3-1: Product: Expansion
Jun 30 13:13:01 medina.novell.com kernel: usb 3-1: Manufacturer: Seagate
Jun 30 13:13:01 medina.novell.com kernel: usb 3-1: SerialNumber: NA4BQHLX
Jun 30 13:13:01 medina.novell.com kernel: scsi8 : uas
Jun 30 13:13:01 medina.novell.com kernel: scsi 8:0:0:0: Direct-Access     Seagate  Expansion        0502 PQ: 0 ANSI: 6
Jun 30 13:13:01 medina.novell.com kernel: sd 8:0:0:0: Attached scsi generic sg1 type 0
Jun 30 13:13:01 medina.novell.com kernel: sd 8:0:0:0: [sdb] 3907029167 512-byte logical blocks: (2.00 TB/1.81 TiB)
Jun 30 13:13:01 medina.novell.com kernel: sd 8:0:0:0: [sdb] 4096-byte physical blocks
Jun 30 13:13:01 medina.novell.com kernel: sd 8:0:0:0: [sdb] Write Protect is off
Jun 30 13:13:01 medina.novell.com kernel: sd 8:0:0:0: [sdb] Mode Sense: 4f 00 00 00
Jun 30 13:13:01 medina.novell.com kernel: sd 8:0:0:0: [sdb] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA
Jun 30 13:13:01 medina.novell.com mtp-probe[4516]: checking bus 3, device 6: "/sys/devices/pci0000:00/0000:00:14.0/usb3/3-1"
Jun 30 13:13:01 medina.novell.com mtp-probe[4516]: bus: 3, device: 6 was not an MTP device
Jun 30 13:13:03 medina.novell.com kernel:  sdb: sdb1 sdb2 sdb3
Jun 30 13:13:03 medina.novell.com kernel: sd 8:0:0:0: [sdb] Attached SCSI disk
Jun 30 13:13:03 medina.novell.com kernel: hfsplus: write access to a journaled filesystem is not supported, use the force option at your own risk, mounting read-only.
Jun 30 13:13:03 medina.novell.com udisksd[2047]: Mounted /dev/sdb2 at /run/media/luis/ALBERTO on behalf of uid 1000
Jun 30 13:13:03 medina.novell.com org.gtk.Private.UDisks2VolumeMonitor[2504]: disc.c:332: error opening file BDMV/index.bdmv
Jun 30 13:13:03 medina.novell.com gnome-session[2458]: (gnome-shell:2609): Clutter-CRITICAL **: clutter_layout_manager_get_child_meta: assertion 'CLUTTER_IS_LAYOUT_MANAGER (manager)' failed
Jun 30 13:13:03 medina.novell.com gnome-session[2458]: (gnome-shell:2609): GLib-GObject-CRITICAL **: g_object_set: assertion 'G_IS_OBJECT (object)' failed
Jun 30 13:13:03 medina.novell.com gnome-session[2458]: (gnome-shell:2609): GLib-GObject-CRITICAL **: g_object_set: assertion 'G_IS_OBJECT (object)' failed
Jun 30 13:13:03 medina.novell.com gnome-session[2458]: (gnome-shell:2609): Clutter-CRITICAL **: clutter_layout_manager_get_child_meta: assertion 'CLUTTER_IS_LAYOUT_MANAGER (manager)' failed
Jun 30 13:13:03 medina.novell.com gnome-session[2458]: (gnome-shell:2609): GLib-GObject-CRITICAL **: g_object_set: assertion 'G_IS_OBJECT (object)' failed
Jun 30 13:13:03 medina.novell.com gnome-session[2458]: (gnome-shell:2609): GLib-GObject-CRITICAL **: g_object_set: assertion 'G_IS_OBJECT (object)' failed
Jun 30 13:13:03 medina.novell.com org.gtk.Private.UDisks2VolumeMonitor[2504]: disc.c:332: error opening file BDMV/BACKUP/index.bdmv
Jun 30 13:13:04 medina.novell.com ntfs-3g[4551]: Version 2014.2.15 external FUSE 29
Jun 30 13:13:04 medina.novell.com ntfs-3g[4551]: Mounted /dev/sdb1 (Read-Write, label "LUIS", NTFS 3.1)
Jun 30 13:13:04 medina.novell.com ntfs-3g[4551]: Cmdline options: rw,nodev,nosuid,uid=1000,gid=100,dmask=0077,fmask=0177,uhelper=udisks2
Jun 30 13:13:04 medina.novell.com ntfs-3g[4551]: Mount options: rw,nodev,nosuid,uhelper=udisks2,allow_other,nonempty,relatime,default_permissions,fsname=/dev/sdb1,blkdev,blksize=4096
Jun 30 13:13:04 medina.novell.com udisksd[2047]: Mounted /dev/sdb1 at /run/media/luis/LUIS on behalf of uid 1000
Jun 30 13:13:04 medina.novell.com ntfs-3g[4551]: Global ownership and permissions enforced, configuration type 1
Jun 30 13:13:04 medina.novell.com org.gtk.Private.UDisks2VolumeMonitor[2504]: disc.c:332: error opening file BDMV/index.bdmv
Jun 30 13:13:04 medina.novell.com org.gtk.Private.UDisks2VolumeMonitor[2504]: disc.c:332: error opening file BDMV/BACKUP/index.bdmv
Jun 30 13:13:04 medina.novell.com gnome-session[2458]: (gnome-shell:2609): Clutter-CRITICAL **: clutter_layout_manager_get_child_meta: assertion 'CLUTTER_IS_LAYOUT_MANAGER (manager)' failed
Jun 30 13:13:04 medina.novell.com gnome-session[2458]: (gnome-shell:2609): GLib-GObject-CRITICAL **: g_object_set: assertion 'G_IS_OBJECT (object)' failed
Jun 30 13:13:04 medina.novell.com gnome-session[2458]: (gnome-shell:2609): GLib-GObject-CRITICAL **: g_object_set: assertion 'G_IS_OBJECT (object)' failed

This is what happens in my USB 2.0 port.

medina:~ # eject /dev/sdb

systemd-journalctl log:

Jun 30 13:17:53 medina.novell.com udisksd[2047]: Cleaning up mount point /run/media/luis/LUIS (device 8:17 is not mounted)
Jun 30 13:17:53 medina.novell.com ntfs-3g[4732]: Unmounting /dev/sdb1 (LUIS)
Jun 30 13:17:53 medina.novell.com udisksd[2047]: Cleaning up mount point /run/media/luis/ALBERTO (device 8:18 is not mounted)

medina:~ # udisksctl power-off -b /dev/sdb

systemd-journalctl log:

Jun 30 13:18:01 medina.novell.com udisksd[2047]: Powering off /dev/sdb - successfully sent SCSI command START STOP UNIT
Jun 30 13:18:01 medina.novell.com kernel: sd 9:0:0:0: [sdb] Synchronizing SCSI cache
Jun 30 13:18:01 medina.novell.com udisksd[2047]: Powered off /dev/sdb - successfully wrote to sysfs path /sys/devices/pci0000:00/0000:00:14.0/usb2/2-3/remove
Jun 30 13:18:01 medina.novell.com kernel: sd 9:0:0:0: [sdb]  
Jun 30 13:18:01 medina.novell.com kernel: Result: hostbyte=DID_ERROR driverbyte=DRIVER_OK
Jun 30 13:18:01 medina.novell.com kernel: usb 2-3: USB disconnect, device number 4

P.S.

medina:~ # uname -a
Linux medina.novell.com 3.16.7-21-desktop #1 SMP PREEMPT Tue Apr 14 07:11:37 UTC 2015 (93c1539) x86_64 x86_64 x86_64 GNU/Linux
Comment 8 Luis Medina 2015-06-30 18:49:57 UTC
*** Bug 859374 has been marked as a duplicate of this bug. ***
Comment 9 Oliver Neukum 2015-07-01 12:53:54 UTC
This is currently handled upstream. The patches are not yet ready. Something is wrong with the port state machine.
Comment 12 Jiri Slaby 2015-08-13 13:06:04 UTC
It's perhaps ready now :).
Comment 13 Oliver Neukum 2015-08-13 13:36:20 UTC
(In reply to Jiri Slaby from comment #12)
> It's perhaps ready now :).

Indeed. Please test KOTD.
Comment 14 Luis Medina 2015-08-13 15:51:09 UTC
Same results with 4.2.rc6-1.1.g4a2cf4a

medina:~ # eject /dev/sdb

systemd-journalctl log:

Aug 13 10:45:10 medina.novell.com udisksd[1953]: Cleaning up mount point /run/media/luis/LUIS (device 8:17 is not mounted)
Aug 13 10:45:10 medina.novell.com ntfs-3g[3278]: Unmounting /dev/sdb1 (LUIS)
Aug 13 10:45:10 medina.novell.com udisksd[1953]: Cleaning up mount point /run/media/luis/ALBERTO (device 8:18 is not mounted)

medina:~ # udisksctl power-off -b /dev/sdb

systemd-journalctl log:

Aug 13 10:45:21 medina.novell.com bluetoothd[997]: Endpoint unregistered: sender=:1.28 path=/MediaEndpoint/A2DPSource
Aug 13 10:45:21 medina.novell.com bluetoothd[997]: Endpoint unregistered: sender=:1.28 path=/MediaEndpoint/A2DPSink
Aug 13 10:45:21 medina.novell.com systemd[1321]: pam_unix(systemd-user:session): session closed for user gdm
Aug 13 10:45:22 medina.novell.com udisksd[1953]: Powering off /dev/sdb - successfully sent SCSI command START STOP UNIT
Aug 13 10:45:22 medina.novell.com kernel: sd 6:0:0:0: [sdb] Synchronizing SCSI cache
Aug 13 10:45:23 medina.novell.com kernel: sd 6:0:0:0: [sdb] Synchronize Cache(10) failed: Result: hostbyte=DID_ERROR driverbyte=DRIVER_OK
Aug 13 10:45:23 medina.novell.com udisksd[1953]: Powered off /dev/sdb - successfully wrote to sysfs path /sys/devices/pci0000:00/0000:00:14.0/usb3/3-1/remove
Aug 13 10:45:23 medina.novell.com kernel: usb 3-1: USB disconnect, device number 4
Aug 13 10:45:23 medina.novell.com kernel: usb 3-1: new SuperSpeed USB device number 5 using xhci_hcd
Aug 13 10:45:23 medina.novell.com kernel: usb 3-1: New USB device found, idVendor=0bc2, idProduct=2321
Aug 13 10:45:23 medina.novell.com kernel: usb 3-1: New USB device strings: Mfr=2, Product=3, SerialNumber=1
Aug 13 10:45:23 medina.novell.com kernel: usb 3-1: Product: Expansion
Aug 13 10:45:23 medina.novell.com kernel: usb 3-1: Manufacturer: Seagate
Aug 13 10:45:23 medina.novell.com kernel: usb 3-1: SerialNumber: NA4BQHLX
Aug 13 10:45:23 medina.novell.com kernel: scsi host7: uas
Aug 13 10:45:23 medina.novell.com kernel: scsi 7:0:0:0: Direct-Access     Seagate  Expansion        0502 PQ: 0 ANSI: 6
Aug 13 10:45:23 medina.novell.com kernel: sd 7:0:0:0: Attached scsi generic sg1 type 0
Aug 13 10:45:23 medina.novell.com kernel: sd 7:0:0:0: [sdb] 3907029167 512-byte logical blocks: (2.00 TB/1.81 TiB)
Aug 13 10:45:23 medina.novell.com kernel: sd 7:0:0:0: [sdb] 4096-byte physical blocks
Aug 13 10:45:23 medina.novell.com kernel: sd 7:0:0:0: [sdb] Write Protect is off
Aug 13 10:45:23 medina.novell.com kernel: sd 7:0:0:0: [sdb] Mode Sense: 4f 00 00 00
Aug 13 10:45:23 medina.novell.com kernel: sd 7:0:0:0: [sdb] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA
Aug 13 10:45:23 medina.novell.com mtp-probe[3392]: checking bus 3, device 5: "/sys/devices/pci0000:00/0000:00:14.0/usb3/3-1"
Aug 13 10:45:23 medina.novell.com mtp-probe[3392]: bus: 3, device: 5 was not an MTP device
Aug 13 10:45:25 medina.novell.com kernel:  sdb: sdb1 sdb2 sdb3
Aug 13 10:45:25 medina.novell.com kernel: sd 7:0:0:0: [sdb] Attached SCSI disk
Aug 13 10:45:25 medina.novell.com kernel: iwlwifi 0000:03:00.0: request for firmware file 'iwlwifi-7265D-11.ucode' failed.
Aug 13 10:45:25 medina.novell.com kernel: iwlwifi 0000:03:00.0: Direct firmware load for iwlwifi-7265D-10.ucode failed with error -2
Aug 13 10:45:25 medina.novell.com kernel: iwlwifi 0000:03:00.0: Falling back to user helper
Aug 13 10:45:25 medina.novell.com kernel: hfsplus: write access to a journaled filesystem is not supported, use the force option at your own risk, mounting read-only.
Aug 13 10:45:25 medina.novell.com ntfs-3g[3421]: Version 2014.2.15 external FUSE 29
Aug 13 10:45:25 medina.novell.com ntfs-3g[3421]: Mounted /dev/sdb1 (Read-Write, label "LUIS", NTFS 3.1)
Aug 13 10:45:25 medina.novell.com ntfs-3g[3421]: Cmdline options: rw,nodev,nosuid,uid=1000,gid=100,dmask=0077,fmask=0177,uhelper=udisks2
Aug 13 10:45:25 medina.novell.com ntfs-3g[3421]: Mount options: rw,nodev,nosuid,uhelper=udisks2,allow_other,nonempty,relatime,default_permissions,fsname=/dev/sdb1,blkdev,blksize=4096
Aug 13 10:45:25 medina.novell.com ntfs-3g[3421]: Global ownership and permissions enforced, configuration type 1
Aug 13 10:45:25 medina.novell.com udisksd[1953]: Mounted /dev/sdb2 at /run/media/luis/ALBERTO on behalf of uid 1000
Aug 13 10:45:25 medina.novell.com udisksd[1953]: Mounted /dev/sdb1 at /run/media/luis/LUIS on behalf of uid 1000
Aug 13 10:45:25 medina.novell.com org.gtk.Private.UDisks2VolumeMonitor[2161]: disc.c:332: error opening file BDMV/index.bdmv
Aug 13 10:45:25 medina.novell.com org.gtk.Private.UDisks2VolumeMonitor[2161]: disc.c:332: error opening file BDMV/BACKUP/index.bdmv
Aug 13 10:45:25 medina.novell.com org.gtk.Private.UDisks2VolumeMonitor[2161]: disc.c:332: error opening file BDMV/index.bdmv
Aug 13 10:45:25 medina.novell.com org.gtk.Private.UDisks2VolumeMonitor[2161]: disc.c:332: error opening file BDMV/BACKUP/index.bdmv

P.S.

medina:~ # uname -a
Linux medina.novell.com 4.2.0-rc6-1.g4a2cf4a-default #1 SMP Mon Aug 10 01:50:31 UTC 2015 (4a2cf4a) x86_64 x86_64 x86_64 GNU/Linux
Comment 15 Oliver Neukum 2015-09-03 08:04:53 UTC
Ok, then this is not the port status issue.
Please activate dynamic debugging of xhci
echo "modules xhci_hcd +p" > /sys/kernel/debug/dynamic_debug/control
and retest.
Comment 16 Luis Medina 2015-09-03 19:44:18 UTC
Created attachment 646177 [details]
systemd-journalctl output

Oliver,

Started "systemd-journalctl -f" and then the following commands and/or actions where ejecuted:

{1.- Activate dynamic debugging of xhci}

  medina:~ # date; echo "modules xhci_hcd +p" > /sys/kernel/debug/dynamic_debug/control
  Thu Sep  3 14:35:29 CDT 2015
  -bash: echo: write error: Invalid argument
  medina:~ # date; echo "module xhci_hcd +p" > /sys/kernel/debug/dynamic_debug/control
  Thu Sep  3 14:35:37 CDT 2015

{2.- Inserted HDD}

{3.- Eject HDD}

  medina:~ # date; eject /dev/sdb
  Thu Sep  3 14:36:17 CDT 2015

{4.- PowerOff HDD (with automatic remouting)}

  medina:~ # date; udisksctl power-off -b /dev/sdb
  Thu Sep  3 14:36:29 CDT 2015

{5.- Disable dynamic debugging of xhci}

  medina:~ # date; echo "module xhci_hcd -p" > /sys/kernel/debug/dynamic_debug/control
  Thu Sep  3 14:36:56 CDT 2015
Comment 17 Oliver Neukum 2015-09-08 09:44:27 UTC
Could you please redo and split the logs when you do something?
Comment 18 Luis Medina 2015-09-08 14:56:07 UTC
Created attachment 646529 [details]
systemd-journalctl divided by action

Sure,

I attached a tar.gz with three files:

01-insertHDD.log, inserting the HDD...

02-ejectHDD.log, execution of the command "eject /dev/sdb"

03-powerOffHDD.log, powering off and automatic remounting, command "udisksctl power-off -b /dev/sdb"


medina:~ # date; eject /dev/sdb
Tue Sep  8 09:44:07 CDT 2015
medina:~ # date; udisksctl power-off -b /dev/sdb
Tue Sep  8 09:44:33 CDT 2015
Comment 19 Oliver Neukum 2015-09-23 12:36:17 UTC
Inconclusive. Something crashes the drive. Possibly LPM is too much for your device. Please try this kernel disabling it:

https://build.opensuse.org/project/monitor?project=home%3Aoneukum%3Abnc922634_disableLPM
Comment 20 Oliver Neukum 2015-12-22 13:20:56 UTC
Ping?
Comment 22 Oliver Neukum 2016-10-10 09:37:28 UTC
Upstream has provided a fix:

commit 91ff70db0c49d22fac1b249bd16949978406c271
Author: Mathias Nyman <mathias.nyman@linux.intel.com>
Date:   Mon Aug 29 14:45:17 2016 +0300

    usb: hub: Fix auto-remount of safely removed or ejected USB-3 devices
    
    USB-3 does not have any link state that will avoid negotiating a connection
    with a plugged-in cable but will signal the host when the cable is
    unplugged.
    
    For USB-3 we used to first set the link to Disabled, then to RxDdetect to
    be able to detect cable connects or disconnects. But in RxDetect the connected
    device is detected again and eventually enabled.
    
    Instead set the link into U3 and disable remote wakeups for the device.
    This is what Windows does, and what Alan Stern suggested.
Comment 23 Oliver Neukum 2016-10-10 13:04:13 UTC
fix added to kernel trees
Comment 24 Swamp Workflow Management 2016-10-21 15:12:15 UTC
openSUSE-SU-2016:2583-1: An update that solves four vulnerabilities and has 21 fixes is now available.

Category: security (important)
Bug References: 1000287,1000304,1000907,1001462,1001486,1004418,1004462,1005101,799133,881008,909994,911687,922634,963655,972460,978094,979681,987703,991247,991665,993890,993891,996664,999600,999932
CVE References: CVE-2016-5195,CVE-2016-7039,CVE-2016-7425,CVE-2016-8658
Sources used:
openSUSE Leap 42.1 (src):    drbd-8.4.6-10.1, hdjmod-1.28-26.1, ipset-6.25.1-7.1, kernel-debug-4.1.34-33.1, kernel-default-4.1.34-33.1, kernel-docs-4.1.34-33.3, kernel-ec2-4.1.34-33.1, kernel-obs-build-4.1.34-33.1, kernel-obs-qa-4.1.34-33.1, kernel-obs-qa-xen-4.1.34-33.1, kernel-pae-4.1.34-33.1, kernel-pv-4.1.34-33.1, kernel-source-4.1.34-33.1, kernel-syms-4.1.34-33.1, kernel-vanilla-4.1.34-33.1, kernel-xen-4.1.34-33.1, lttng-modules-2.7.0-4.1, pcfclock-0.44-268.1, vhba-kmp-20140928-7.1
Comment 25 Bernhard Wiedemann 2016-10-23 18:01:26 UTC
This is an autogenerated message for OBS integration:
This bug (922634) was mentioned in
https://build.opensuse.org/request/show/437000 13.2 / kernel-source
Comment 26 Swamp Workflow Management 2016-10-25 17:09:20 UTC
openSUSE-SU-2016:2625-1: An update that solves 12 vulnerabilities and has 19 fixes is now available.

Category: security (important)
Bug References: 1000287,1001486,1003077,1003925,1003931,1004045,1004418,1004462,881008,909994,911687,922634,951155,960689,978094,980371,986570,989152,991247,991608,991665,993890,993891,994296,994520,994748,994752,994759,996664,999600,999932
CVE References: CVE-2015-7513,CVE-2015-8956,CVE-2016-0823,CVE-2016-1237,CVE-2016-5195,CVE-2016-5696,CVE-2016-6327,CVE-2016-6480,CVE-2016-6828,CVE-2016-7117,CVE-2016-7425,CVE-2016-8658
Sources used:
openSUSE 13.2 (src):    bbswitch-0.8-3.22.1, cloop-2.639-14.22.1, crash-7.0.8-22.1, hdjmod-1.28-18.23.1, ipset-6.23-22.1, kernel-debug-3.16.7-45.1, kernel-default-3.16.7-45.1, kernel-desktop-3.16.7-45.1, kernel-docs-3.16.7-45.2, kernel-ec2-3.16.7-45.1, kernel-obs-build-3.16.7-45.1, kernel-obs-qa-3.16.7-45.1, kernel-obs-qa-xen-3.16.7-45.1, kernel-pae-3.16.7-45.1, kernel-source-3.16.7-45.1, kernel-syms-3.16.7-45.1, kernel-vanilla-3.16.7-45.1, kernel-xen-3.16.7-45.1, pcfclock-0.44-260.22.1, vhba-kmp-20140629-2.22.1, virtualbox-5.0.28-54.2, xen-4.4.4_05-51.2, xtables-addons-2.6-24.1
Comment 27 Swamp Workflow Management 2016-11-25 16:18:00 UTC
SUSE-SU-2016:2912-1: An update that solves 11 vulnerabilities and has 111 fixes is now available.

Category: security (important)
Bug References: 1000189,1000287,1000304,1000776,1001419,1001486,1002165,1003079,1003153,1003400,1003568,1003866,1003925,1003964,1004252,1004462,1004517,1004520,1005666,1006691,1007615,1007886,744692,772786,789311,857397,860441,865545,866130,868923,874131,876463,898675,904489,909994,911687,915183,921338,921784,922064,922634,924381,924384,930399,931454,934067,937086,937888,940545,941420,946309,955446,956514,959463,961257,962846,966864,967640,970943,971975,971989,974406,974620,975596,975772,976195,977687,978094,979451,979928,982783,983619,984194,984419,984779,984992,985562,986445,987192,987333,987542,987565,987621,987805,988440,988617,988715,989152,989953,990245,991247,991608,991665,992244,992555,992591,992593,992712,993392,993841,993890,993891,994296,994438,994520,994748,995153,995968,996664,997059,997299,997708,997896,998689,998795,998825,999577,999584,999600,999779,999907,999932
CVE References: CVE-2015-8956,CVE-2016-5696,CVE-2016-6130,CVE-2016-6327,CVE-2016-6480,CVE-2016-6828,CVE-2016-7042,CVE-2016-7097,CVE-2016-7425,CVE-2016-8658,CVE-2016-8666
Sources used:
SUSE Linux Enterprise Workstation Extension 12-SP1 (src):    kernel-default-3.12.67-60.64.18.1
SUSE Linux Enterprise Software Development Kit 12-SP1 (src):    kernel-docs-3.12.67-60.64.18.3, kernel-obs-build-3.12.67-60.64.18.1
SUSE Linux Enterprise Server 12-SP1 (src):    kernel-default-3.12.67-60.64.18.1, kernel-source-3.12.67-60.64.18.1, kernel-syms-3.12.67-60.64.18.1, kernel-xen-3.12.67-60.64.18.1
SUSE Linux Enterprise Module for Public Cloud 12 (src):    kernel-ec2-3.12.67-60.64.18.1
SUSE Linux Enterprise Live Patching 12 (src):    kgraft-patch-SLE12-SP1_Update_9-1-6.3
SUSE Linux Enterprise Desktop 12-SP1 (src):    kernel-default-3.12.67-60.64.18.1, kernel-source-3.12.67-60.64.18.1, kernel-syms-3.12.67-60.64.18.1, kernel-xen-3.12.67-60.64.18.1
Comment 28 Swamp Workflow Management 2016-12-02 15:25:41 UTC
SUSE-SU-2016:2976-1: An update that solves 13 vulnerabilities and has 87 fixes is now available.

Category: security (important)
Bug References: 1000189,1001419,1002165,1003077,1003344,1003568,1003677,1003866,1003925,1004517,1004520,1005857,1005896,1005903,1006917,1006919,1007944,763198,771065,799133,803320,839104,843236,860441,863873,865783,871728,907611,908458,908684,909077,909350,909484,909618,909994,911687,915183,920016,922634,922947,928138,929141,934760,951392,956514,960689,963655,967716,968010,968014,971975,971989,973203,974620,976867,977687,979514,979595,979681,980371,982218,982783,983535,983619,984102,984194,984992,985206,986337,986362,986365,986445,987565,988440,989152,989261,989764,989779,991608,991665,991923,992566,993127,993890,993891,994296,994436,994618,994759,994926,995968,996329,996664,997708,998399,998689,999584,999600,999907,999932
CVE References: CVE-2013-4312,CVE-2015-7513,CVE-2015-8956,CVE-2016-0823,CVE-2016-3841,CVE-2016-4998,CVE-2016-5696,CVE-2016-6480,CVE-2016-6828,CVE-2016-7042,CVE-2016-7097,CVE-2016-7117,CVE-2016-7425
Sources used:
SUSE Linux Enterprise Software Development Kit 11-SP4 (src):    kernel-docs-3.0.101-88.3
SUSE Linux Enterprise Server 11-SP4 (src):    kernel-bigmem-3.0.101-88.1, kernel-default-3.0.101-88.1, kernel-ec2-3.0.101-88.1, kernel-pae-3.0.101-88.1, kernel-ppc64-3.0.101-88.1, kernel-source-3.0.101-88.1, kernel-syms-3.0.101-88.1, kernel-trace-3.0.101-88.1, kernel-xen-3.0.101-88.1
SUSE Linux Enterprise Server 11-EXTRA (src):    kernel-default-3.0.101-88.1, kernel-pae-3.0.101-88.1, kernel-ppc64-3.0.101-88.1, kernel-trace-3.0.101-88.1, kernel-xen-3.0.101-88.1
SUSE Linux Enterprise Debuginfo 11-SP4 (src):    kernel-bigmem-3.0.101-88.1, kernel-default-3.0.101-88.1, kernel-ec2-3.0.101-88.1, kernel-pae-3.0.101-88.1, kernel-ppc64-3.0.101-88.1, kernel-trace-3.0.101-88.1, kernel-xen-3.0.101-88.1
Comment 29 Swamp Workflow Management 2016-12-06 12:19:33 UTC
openSUSE-SU-2016:3021-1: An update that solves 12 vulnerabilities and has 118 fixes is now available.

Category: security (important)
Bug References: 1000189,1000287,1000304,1000776,1001419,1001486,1002165,1003079,1003153,1003400,1003568,1003866,1003925,1004252,1004418,1004462,1004517,1004520,1005666,1006691,1007615,1007886,744692,772786,789311,799133,857397,860441,865545,866130,868923,874131,875631,876145,876463,898675,904489,909994,911687,915183,921338,921784,922064,922634,924381,924384,930399,931454,934067,937086,937888,940545,941420,946309,954986,955446,956514,959463,961257,962846,963655,963767,966864,967640,970943,971975,971989,974406,974620,975596,975772,976195,977687,978094,979451,979681,979928,982783,983619,984194,984419,984779,984992,985562,986445,987192,987333,987542,987565,987621,987805,988440,988617,988715,989152,989953,990245,991247,991608,991665,992244,992555,992591,992593,992712,993392,993841,993890,993891,994296,994438,994520,994748,994758,995153,995968,996664,997059,997299,997708,997896,998689,998795,998825,999577,999584,999600,999779,999907,999932
CVE References: CVE-2013-5634,CVE-2015-8956,CVE-2016-2069,CVE-2016-5696,CVE-2016-6130,CVE-2016-6327,CVE-2016-6480,CVE-2016-6828,CVE-2016-7042,CVE-2016-7097,CVE-2016-7425,CVE-2016-8658
Sources used:
openSUSE 13.1 (src):    cloop-2.639-11.36.1, crash-7.0.2-2.36.1, hdjmod-1.28-16.36.1, ipset-6.21.1-2.40.1, iscsitarget-1.4.20.3-13.36.1, kernel-debug-3.12.67-58.1, kernel-default-3.12.67-58.1, kernel-desktop-3.12.67-58.1, kernel-docs-3.12.67-58.2, kernel-ec2-3.12.67-58.1, kernel-pae-3.12.67-58.1, kernel-source-3.12.67-58.1, kernel-syms-3.12.67-58.1, kernel-trace-3.12.67-58.1, kernel-vanilla-3.12.67-58.1, kernel-xen-3.12.67-58.1, ndiswrapper-1.58-37.1, openvswitch-1.11.0-0.43.1, pcfclock-0.44-258.37.1, vhba-kmp-20130607-2.36.1, virtualbox-4.2.36-2.68.1, xen-4.3.4_10-69.1, xtables-addons-2.3-2.35.1
Comment 30 Swamp Workflow Management 2016-12-30 17:21:09 UTC
SUSE-SU-2016:3304-1: An update that solves 13 vulnerabilities and has 118 fixes is now available.

Category: security (important)
Bug References: 1000189,1000287,1000304,1000776,1001419,1001486,1002165,1003079,1003153,1003400,1003568,1003925,1004252,1004418,1004462,1004517,1004520,1005666,1006691,1007615,1007886,744692,789311,857397,860441,865545,866130,868923,874131,875631,876145,876463,898675,904489,909994,911687,915183,921338,921784,922064,922634,924381,924384,930399,934067,937086,937888,941420,946309,955446,956514,959463,961257,962846,963655,963767,966864,967640,970943,971975,971989,974406,974620,975596,975772,976195,977687,978094,979451,979681,979928,980371,981597,982783,983619,984194,984419,984779,984992,985562,986362,986365,986445,987192,987333,987542,987565,987621,987805,988440,988617,988715,989152,989953,990058,990245,991247,991608,991665,991667,992244,992555,992568,992591,992593,992712,993392,993841,993890,993891,994167,994296,994438,994520,994758,995153,995968,996664,997059,997299,997708,997896,998689,998795,998825,999577,999584,999600,999779,999907,999932
CVE References: CVE-2015-8956,CVE-2016-2069,CVE-2016-4998,CVE-2016-5195,CVE-2016-5696,CVE-2016-6130,CVE-2016-6327,CVE-2016-6480,CVE-2016-6828,CVE-2016-7042,CVE-2016-7097,CVE-2016-7425,CVE-2016-8658
Sources used:
SUSE Linux Enterprise Real Time Extension 12-SP1 (src):    kernel-compute-3.12.67-60.27.1, kernel-compute_debug-3.12.67-60.27.1, kernel-rt-3.12.67-60.27.1, kernel-rt_debug-3.12.67-60.27.1, kernel-source-rt-3.12.67-60.27.1, kernel-syms-rt-3.12.67-60.27.1
Comment 32 Swamp Workflow Management 2017-01-17 18:34:17 UTC
SUSE-SU-2017:0181-1: An update that solves 13 vulnerabilities and has 127 fixes is now available.

Category: security (important)
Bug References: 1000118,1000189,1000287,1000304,1000433,1000776,1001169,1001171,1001310,1001462,1001486,1001888,1002322,1002770,1002786,1003068,1003566,1003581,1003606,1003813,1003866,1003964,1004048,1004052,1004252,1004365,1004517,1005169,1005327,1005545,1005666,1005745,1005895,1005917,1005921,1005923,1005925,1005929,1006103,1006175,1006267,1006528,1006576,1006804,1006809,1006827,1006915,1006918,1007197,1007615,1007653,1007955,1008557,1008979,1009062,1009969,1010040,1010158,1010444,1010478,1010507,1010665,1010690,1010970,1011176,1011250,1011913,1012060,1012094,1012452,1012767,1012829,1012992,1013001,1013479,1013531,1013700,1014120,1014392,1014701,1014710,1015212,1015359,1015367,1015416,799133,914939,922634,963609,963655,963904,964462,966170,966172,966186,966191,966316,966318,966325,966471,969474,969475,969476,969477,969756,971975,971989,972993,974313,974842,974843,978907,979378,979681,981825,983087,983152,983318,985850,986255,986987,987641,987703,987805,988524,988715,990384,992555,993739,993841,993891,994881,995278,997059,997639,997807,998054,998689,999907,999932
CVE References: CVE-2015-1350,CVE-2015-8964,CVE-2016-7039,CVE-2016-7042,CVE-2016-7425,CVE-2016-7913,CVE-2016-7917,CVE-2016-8645,CVE-2016-8666,CVE-2016-9083,CVE-2016-9084,CVE-2016-9793,CVE-2016-9919
Sources used:
SUSE Linux Enterprise Workstation Extension 12-SP2 (src):    kernel-default-4.4.38-93.1
SUSE Linux Enterprise Software Development Kit 12-SP2 (src):    kernel-docs-4.4.38-93.3, kernel-obs-build-4.4.38-93.1
SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 (src):    kernel-default-4.4.38-93.1, kernel-source-4.4.38-93.1, kernel-syms-4.4.38-93.1
SUSE Linux Enterprise Server 12-SP2 (src):    kernel-default-4.4.38-93.1, kernel-source-4.4.38-93.1, kernel-syms-4.4.38-93.1
SUSE Linux Enterprise Live Patching 12 (src):    kgraft-patch-SLE12-SP2_Update_4-1-2.1
SUSE Linux Enterprise High Availability 12-SP2 (src):    kernel-default-4.4.38-93.1
SUSE Linux Enterprise Desktop 12-SP2 (src):    kernel-default-4.4.38-93.1, kernel-source-4.4.38-93.1, kernel-syms-4.4.38-93.1
Comment 33 Swamp Workflow Management 2017-04-25 19:29:41 UTC
SUSE-SU-2017:1102-1: An update that solves 27 vulnerabilities and has 114 fixes is now available.

Category: security (important)
Bug References: 1003077,1003344,1003568,1003677,1003813,1003866,1003925,1004517,1004520,1005857,1005877,1005896,1005903,1006917,1006919,1007615,1007944,1008557,1008645,1008831,1008833,1008893,1009875,1010150,1010175,1010201,1010467,1010501,1010507,1010711,1010716,1011685,1011820,1012411,1012422,1012832,1012851,1012917,1013018,1013038,1013042,1013070,1013531,1013533,1013542,1013604,1014410,1014454,1014746,1015561,1015752,1015760,1015796,1015803,1015817,1015828,1015844,1015848,1015878,1015932,1016320,1016505,1016520,1016668,1016688,1016824,1016831,1017686,1017710,1019148,1019165,1019348,1019783,1020214,1021258,748806,763198,771065,786036,790588,795297,799133,800999,803320,821612,824171,851603,853052,860441,863873,865783,871728,901809,907611,908458,908684,909077,909350,909484,909491,909618,913387,914939,919382,922634,924708,925065,928138,929141,953233,956514,960689,961589,962846,963655,967716,968010,969340,973203,973691,979681,984194,986337,987333,987576,989152,989680,989764,989896,990245,992566,992991,993739,993832,995968,996541,996557,997401,998689,999101,999907
CVE References: CVE-2004-0230,CVE-2012-6704,CVE-2013-6368,CVE-2015-1350,CVE-2015-8956,CVE-2015-8962,CVE-2015-8964,CVE-2016-10088,CVE-2016-3841,CVE-2016-5696,CVE-2016-7042,CVE-2016-7097,CVE-2016-7117,CVE-2016-7910,CVE-2016-7911,CVE-2016-7916,CVE-2016-8399,CVE-2016-8632,CVE-2016-8633,CVE-2016-8646,CVE-2016-9555,CVE-2016-9576,CVE-2016-9685,CVE-2016-9756,CVE-2016-9793,CVE-2016-9794,CVE-2017-5551
Sources used:
SUSE Linux Enterprise Real Time Extension 11-SP4 (src):    kernel-rt-3.0.101.rt130-68.1, kernel-rt_trace-3.0.101.rt130-68.1, kernel-source-rt-3.0.101.rt130-68.1, kernel-syms-rt-3.0.101.rt130-68.1
SUSE Linux Enterprise Debuginfo 11-SP4 (src):    kernel-rt-3.0.101.rt130-68.1, kernel-rt_debug-3.0.101.rt130-68.1, kernel-rt_trace-3.0.101.rt130-68.1