Bug 1123538

Summary: nouveau modeset: Kernel panic
Product: [openSUSE] openSUSE Distribution Reporter: Vinzenz Vietzke <vinz>
Component: KernelAssignee: E-mail List <kernel-maintainers>
Status: RESOLVED FIXED QA Contact: E-mail List <qa-bugs>
Severity: Normal    
Priority: P5 - None CC: nwr10cst-oslnx, patrik.jakobsson, sndirsch, snwint, tiwai, tzimmermann, vinz
Version: Leap 15.1   
Target Milestone: ---   
Hardware: x86-64   
OS: Other   
Whiteboard:
Found By: --- Services Priority:
Business Priority: Blocker: ---
Marketing QA Status: --- IT Deployment: ---
Bug Depends on: 1123523    
Bug Blocks:    
Attachments: Screen shot just before freeze
hwinfo of xp15
kernel panic with i915.modeset=0 on leap 15.1
dmesg-xp15

Description Vinzenz Vietzke 2019-01-29 15:47:57 UTC
In the aftermath of #1123523 I tried Build402.2 on the same device but ran into a Kernel panic. The green progress bar at the bottom starts loading normally but suddenly at 3/4 stops and switching to TTY2 (before the bar stops) shows a kernel panic.

The device is equipped with:
- Core i7-8750H
- GTX1060 (Optimus)
- Ultra-HD display (3840 x 2160px)
Comment 1 Stefan Hundhammer 2019-01-29 16:18:14 UTC
This sounds like this bug and bug #1123523 are really the same problem.

Did this work with previous builds on that same hardware?

If you can boot any of the previous builds (or any not too old SUSE distro), can you please attach the output of "hwinfo" from any of those builds?
Comment 2 Stefan Hundhammer 2019-01-29 16:19:58 UTC
Notice that we had recent problems with Chrome and Bugzilla attachments (investigating); if you experience similar problems, please try Firefox.
Comment 3 Neil Rickert 2019-01-29 17:11:12 UTC
I'll comment on this, instead of starting a new bug report.  I am seeing different symptoms, but it might be the same bug.

I have two Leap 15.1 systems on KVM virtual machines.  I have updated both this morning, using "zypper dup".  Now neither will boot.  The update should be to build 402.2.

Some more detail:

Machine 1: The KVM machine name is "tw32efi" and and I am booting it with UEFI (32-bit UEFI, but that's a long story and probably not relevant).  On normal booting, I see the Plymouth screen.  And then that partially fades out.  The system freezes at that point, and I have to force off.

If I put "plymouth.enable=0" on the kernel boot line, it still freezes.
If I put a "3" at the end of the kernel boot line, it successfully boots to multi-user mode.  In multi-user mode, if I try "telinit 5" to go to GUI mode, it freezes.  So it looks as if there's a problem with X.

Machine 2: The KVM machine name is "Leap 15.1", and it uses legacy booting from MBR.  I'm not sure that the kernel is even loading.  Or, if it is loading, it does not get very far.  After forcing off, I booted to a Tumbleweed DVD in rescue mode.  And "fsck" showed that the file systems were still clean.  So boot had not proceeded very far at all.

For both machines, I can boot without problems to the previous kernel "4.12.14-lp151.19-default".  But I have the problems that I have described if I boot to "4.12.14-lp151.20-default".

Other differences between the two machines:

The main difference seems to be this.  Machine "tw32efi" is configured to use "virtio" video, while machine "Leap 15.1" is configured to use "QXL" video.  As a test, I reconfigured the "Leap 15.1" virtual machine to use "virtio" video.  And now the kernel clearly loads and boot starts, but it freezes at about the same point as the other virtual machine.  If I boot from the TW DVD in rescue mode, I see that both root and home partitions are dirty but "fsck" can recover from journal.  I should mention that I am using "ext4" on both systems.
Comment 4 Neil Rickert 2019-01-29 19:12:28 UTC
Some further tests.

With the KVM machine named "Leap 15.1", and still using "virtio" video, I am able to boot kernel 4.12.14-lp151.20-default to run level 3 (by appending " 3" to the grub "linux" command.  However, after switching back to QXL video, booting fails early, as if the kernel does not fully load or it freezes shortly after kernel load.

I am doubting that this is the same as bug 1123523 because I think that was for the previous kernel.
Comment 5 Neil Rickert 2019-01-29 20:09:03 UTC
Created attachment 795546 [details]
Screen shot just before freeze

The attached screenshot is the last thing that I see before the screen blanks and the system appears to freeze.  This was with QXL video, and booting the installer DVD to installation mode.  It appears to be the same booting the rescue system (again with QXL video).

When booting the installer with "virtio" video, the last thing that I see is a line something like "Searching for a terminal" -- I think think that's just before trying to start Xorg.
Comment 6 Vinzenz Vietzke 2019-01-30 10:58:59 UTC
(In reply to Stefan Hundhammer from comment #1)
> Did this work with previous builds on that same hardware?

I haven't tried with earlier 15.1 builds but with 15.0 it *somehow* works, see below.

> If you can boot any of the previous builds (or any not too old SUSE distro),
> can you please attach the output of "hwinfo" from any of those builds?

Here's the thing:
We preinstall Leap 15.0 on this machine not via ISO but via FAI (fai-project.org). I tried with the latest ISO which froze just like the Leap 15.1 builds. So I ran our FAI based installation which worked and pulled out hwinfo.
Comment 7 Vinzenz Vietzke 2019-01-30 10:59:32 UTC
Created attachment 795601 [details]
hwinfo of xp15
Comment 8 Steffen Winterfeldt 2019-01-30 12:58:34 UTC
*** Bug 1123523 has been marked as a duplicate of this bug. ***
Comment 9 Steffen Winterfeldt 2019-01-30 13:02:37 UTC
This looks like there's again a nouveau driver problem.

If you boot with 'nomodeset' does it work better?
Comment 10 Stefan Dirsch 2019-01-30 13:33:41 UTC
Looks like an Optimus laptop (Intel/NVIDIA GPU combo). So could even be an Intel driver problem. Could be verified via options
(only set one per run!)

  i915.modeset=0
  nouveau.modeset=0

instead of option 'nomodeset'.
Comment 11 Stefan Dirsch 2019-01-30 13:36:47 UTC
And 80863E9B is already Coffeelake ...
Comment 12 Vinzenz Vietzke 2019-01-30 14:01:59 UTC
(In reply to Stefan Dirsch from comment #10)
>   i915.modeset=0
>   nouveau.modeset=0
> 
> instead of option 'nomodeset'.

nomodeset gave the same results with my tries yesterday.

Leap 15.0 + nouveau.modeset=0: works
Leap 15.0 + i915.modeset=0: freeze

Leap 15.1 Build402.2 + nouveau.modeset=0: works (and scales fine, btw. woohoo!)
Leap 15.1 Build402.2 + i915.modeset=0: kernel panic

So, yes, this seems to be a problem with nouveau.
Comment 13 Stefan Dirsch 2019-01-30 15:15:20 UTC
Ok. nouveau: freeze --> kernel panic. So not so much difference compared to Leap 15.0.
Comment 14 Stefan Dirsch 2019-01-30 15:22:42 UTC
Could  you please attach the kernel panic output? Possibly it's related to our backport of DRM 4.19 sources to Kernel 4.12.
Comment 15 Neil Rickert 2019-01-30 15:34:07 UTC
A question.

My comments to this bug -- c#3 to c#5 -- are not in any way related to nouveau.  If this bug is to be about a nouveau issue, I suppose that I should start a new bug report for the issues that I reported.

Advice wanted here.
Comment 16 Stefan Dirsch 2019-01-30 15:50:24 UTC
(In reply to Neil Rickert from comment #15)
> A question.
> 
> My comments to this bug -- c#3 to c#5 -- are not in any way related to
> nouveau.  If this bug is to be about a nouveau issue, I suppose that I
> should start a new bug report for the issues that I reported.
> 
> Advice wanted here.

You're right. This needs to be addressed separately in a separate bugreport.
Comment 17 Vinzenz Vietzke 2019-01-30 16:12:44 UTC
(In reply to Stefan Dirsch from comment #14)
> Could  you please attach the kernel panic output? Possibly it's related to
> our backport of DRM 4.19 sources to Kernel 4.12.

Attached. Hopefully it's somewhat readable...
Comment 18 Vinzenz Vietzke 2019-01-30 16:13:26 UTC
Created attachment 795633 [details]
kernel panic with i915.modeset=0 on leap 15.1
Comment 19 Stefan Dirsch 2019-01-30 16:17:37 UTC
Thanks!
Comment 20 Takashi Iwai 2019-01-30 16:45:29 UTC
Hm, something wrong with the runtime PM.

Please try to boot with nouveau.runpm=0 boot option.  This is sub-optimal, but let's see whether it works around the stall.
Comment 21 Patrik Jakobsson 2019-01-31 09:13:19 UTC
Yes, it looks like the Nouveau driver tries to access hardware registers that is powered off. This usually causes a freeze on the running cpu thread. But I don't know why this is happening.
Comment 22 Vinzenz Vietzke 2019-01-31 11:56:44 UTC
(In reply to Takashi Iwai from comment #20)
> Please try to boot with nouveau.runpm=0 boot option.  This is sub-optimal,
> but let's see whether it works around the stall.

Yes, that worked flawlessly. Any logs I should collect?
Comment 23 Takashi Iwai 2019-01-31 13:47:59 UTC
OK, could you check whether this option makes with i915 enabled, too?
Comment 24 Vinzenz Vietzke 2019-01-31 14:17:20 UTC
(In reply to Takashi Iwai from comment #23)
> OK, could you check whether this option makes with i915 enabled, too?

I'm not sure what you mean, but:

i915.modeset=0 nouveau.runpm=0 => works
i915.modeset=1 nouveau.runpm=0 => works
Comment 25 Takashi Iwai 2019-01-31 15:41:33 UTC
(In reply to Patrik Jakobsson from comment #21)
> Yes, it looks like the Nouveau driver tries to access hardware registers
> that is powered off. This usually causes a freeze on the running cpu thread.
> But I don't know why this is happening.

As far as I understand, this is a stall in the loop of nvkm_msec() reading the register.  It should have been timed out, but the GPU timer itself seems stalling, hence it spins forever.

The upstream seems to have a GPU timer stall check in the commit e4f90a35c9668f8d0469a0160482b1856d07c2b5, so this might help for avoiding such a complete hangup, at least.

I'm going to build a test kernel including this fix.
Comment 26 Takashi Iwai 2019-01-31 15:46:21 UTC
A test kernel is being built in OBS home:tiwai:bsc1123538 repo.
It'll take some time (an hour or so) until the build finishes, and will appear at
  http://download.opensuse.org/repositories/home:/tiwai:/bsc1123538/standard/

Please give it a try and check whether the stall can be avoided even without runpm=0 option.
Comment 27 Vinzenz Vietzke 2019-01-31 16:18:11 UTC
Thanks for your help!
But how can I pull in this kernel build into the ISO I'm booting from?
Comment 28 Takashi Iwai 2019-01-31 16:21:49 UTC
It's not meant for ISO but just for testing on the already installed system.

Once when it's confirmed to help, I'll merge it to kernel branch, so that the fixed kernel will be included in the release.
Comment 29 Vinzenz Vietzke 2019-02-01 10:43:41 UTC
That worked!

What I did was:
- boot Build402.2 ISO with manually added nouveau.runpm=0
- regular installation
- boot installed (suspectedly with nouveau.runpm=0)
- upgraded the kernel to your test version
- removed nouveau.runpm=0 from GRUB config
- rebooted
Comment 30 Takashi Iwai 2019-02-01 10:46:52 UTC
OK, that's good to hear.  Could you give the dmesg output from the patched kernel?

I pushed the fix to SLE15 branch now, since this bug hits also Leap 15.0 as well.  This will be merged into SLE15-SP1 / Leap 15.0 branch eventually later.
Comment 31 Vinzenz Vietzke 2019-02-01 12:13:51 UTC
Created attachment 795799 [details]
dmesg-xp15
Comment 32 Vinzenz Vietzke 2019-02-01 12:14:21 UTC
(In reply to Takashi Iwai from comment #30)
> OK, that's good to hear.  Could you give the dmesg output from the patched
> kernel?
> 
> I pushed the fix to SLE15 branch now, since this bug hits also Leap 15.0 as
> well.  This will be merged into SLE15-SP1 / Leap 15.0 branch eventually
> later.

Sure thing. Thank you very much for your help!
Comment 33 Takashi Iwai 2019-02-01 12:51:14 UTC
Thanks, the log looks clean.

The fix will be included in Leap 15.1 kernel soon later, and please keep using my test kernel until then.

The KVM virtio issue is a completely different problem and it's already fixed.

Let's close the bug now.
Comment 34 Swamp Workflow Management 2019-02-12 16:25:31 UTC
This is an autogenerated message for OBS integration:
This bug (1123538) was mentioned in
https://build.opensuse.org/request/show/674163 15.0 / kernel-source
Comment 35 Swamp Workflow Management 2019-02-18 20:24:14 UTC
openSUSE-SU-2019:0203-1: An update that solves 6 vulnerabilities and has 61 fixes is now available.

Category: security (important)
Bug References: 1046306,1050252,1051510,1054610,1055121,1056658,1056662,1084216,1086301,1086313,1086314,1086323,1087082,1087092,1098382,1098425,1104353,1106105,1106434,1106811,1108870,1109695,1110705,1111666,1113712,1113722,1114279,1117155,1118338,1118505,1119086,1119766,1120318,1120758,1120854,1120902,1120954,1120955,1121599,1121726,1121973,1122019,1122324,1122554,1122662,1122779,1122885,1122927,1122944,1122971,1123061,1123317,1123348,1123357,1123538,1123697,1123933,1124204,1124579,1124589,1124728,1124732,1124735,1124969,1124985,1125109,802154
CVE References: CVE-2018-20669,CVE-2019-3459,CVE-2019-3460,CVE-2019-6974,CVE-2019-7221,CVE-2019-7222
Sources used:
openSUSE Leap 15.0 (src):    kernel-debug-4.12.14-lp150.12.48.1, kernel-default-4.12.14-lp150.12.48.1, kernel-docs-4.12.14-lp150.12.48.1, kernel-kvmsmall-4.12.14-lp150.12.48.1, kernel-obs-build-4.12.14-lp150.12.48.1, kernel-obs-qa-4.12.14-lp150.12.48.1, kernel-source-4.12.14-lp150.12.48.1, kernel-syms-4.12.14-lp150.12.48.1, kernel-vanilla-4.12.14-lp150.12.48.1
Comment 44 Swamp Workflow Management 2019-03-26 20:28:32 UTC
SUSE-SU-2019:0765-1: An update that solves 13 vulnerabilities and has 215 fixes is now available.

Category: security (important)
Bug References: 1046305,1046306,1050252,1050549,1051510,1054610,1055121,1056658,1056662,1056787,1060463,1063638,1065600,1068032,1070995,1071995,1074562,1074578,1074701,1075006,1075419,1075748,1078355,1080039,1082943,1083548,1083647,1084216,1086095,1086282,1086301,1086313,1086314,1086323,1087082,1087084,1087092,1087939,1088133,1094555,1098382,1098425,1098995,1102055,1103429,1104353,1106105,1106434,1106811,1107078,1107665,1108101,1108870,1109695,1110096,1110705,1111666,1113042,1113712,1113722,1113769,1113939,1114279,1114585,1114893,1117108,1117155,1117645,1117947,1118338,1119019,1119086,1119766,1119843,1120008,1120318,1120601,1120758,1120854,1120902,1120909,1120955,1121317,1121726,1121789,1121805,1122019,1122159,1122192,1122292,1122324,1122554,1122662,1122764,1122779,1122822,1122885,1122927,1122944,1122971,1122982,1123060,1123061,1123161,1123317,1123348,1123357,1123456,1123538,1123697,1123882,1123933,1124055,1124204,1124235,1124579,1124589,1124728,1124732,1124735,1124969,1124974,1124975,1124976,1124978,1124979,1124980,1124981,1124982,1124984,1124985,1125109,1125125,1125252,1125315,1125614,1125728,1125780,1125797,1125799,1125800,1125907,1125947,1126131,1126209,1126389,1126393,1126476,1126480,1126481,1126488,1126495,1126555,1126579,1126789,1126790,1126802,1126803,1126804,1126805,1126806,1126807,1127042,1127062,1127082,1127154,1127285,1127286,1127307,1127363,1127493,1127494,1127495,1127496,1127497,1127498,1127534,1127561,1127567,1127595,1127603,1127682,1127731,1127750,1127836,1127961,1128094,1128166,1128351,1128451,1128895,1129046,1129080,1129163,1129179,1129181,1129182,1129183,1129184,1129205,1129281,1129284,1129285,1129291,1129292,1129293,1129294,1129295,1129296,1129326,1129327,1129330,1129363,1129366,1129497,1129519,1129543,1129547,1129551,1129581,1129625,1129664,1129739,1129923,807502,824948,828192,925178
CVE References: CVE-2017-5753,CVE-2018-20669,CVE-2019-2024,CVE-2019-3459,CVE-2019-3460,CVE-2019-3819,CVE-2019-6974,CVE-2019-7221,CVE-2019-7222,CVE-2019-7308,CVE-2019-8912,CVE-2019-8980,CVE-2019-9213
Sources used:
SUSE Linux Enterprise Workstation Extension 12-SP4 (src):    kernel-default-4.12.14-95.13.1
SUSE Linux Enterprise Software Development Kit 12-SP4 (src):    kernel-docs-4.12.14-95.13.1, kernel-obs-build-4.12.14-95.13.1
SUSE Linux Enterprise Server 12-SP4 (src):    kernel-default-4.12.14-95.13.1, kernel-source-4.12.14-95.13.1, kernel-syms-4.12.14-95.13.1
SUSE Linux Enterprise High Availability 12-SP4 (src):    kernel-default-4.12.14-95.13.1
SUSE Linux Enterprise Desktop 12-SP4 (src):    kernel-default-4.12.14-95.13.1, kernel-source-4.12.14-95.13.1, kernel-syms-4.12.14-95.13.1

*** NOTE: This information is not intended to be used for external
    communication, because this may only be a partial fix.
    If you have questions please reach out to maintenance coordination.
Comment 45 Swamp Workflow Management 2019-03-27 09:38:37 UTC
SUSE-SU-2019:0765-1: An update that solves 13 vulnerabilities and has 215 fixes is now available.

Category: security (important)
Bug References: 1046305,1046306,1050252,1050549,1051510,1054610,1055121,1056658,1056662,1056787,1060463,1063638,1065600,1068032,1070995,1071995,1074562,1074578,1074701,1075006,1075419,1075748,1078355,1080039,1082943,1083548,1083647,1084216,1086095,1086282,1086301,1086313,1086314,1086323,1087082,1087084,1087092,1087939,1088133,1094555,1098382,1098425,1098995,1102055,1103429,1104353,1106105,1106434,1106811,1107078,1107665,1108101,1108870,1109695,1110096,1110705,1111666,1113042,1113712,1113722,1113769,1113939,1114279,1114585,1114893,1117108,1117155,1117645,1117947,1118338,1119019,1119086,1119766,1119843,1120008,1120318,1120601,1120758,1120854,1120902,1120909,1120955,1121317,1121726,1121789,1121805,1122019,1122159,1122192,1122292,1122324,1122554,1122662,1122764,1122779,1122822,1122885,1122927,1122944,1122971,1122982,1123060,1123061,1123161,1123317,1123348,1123357,1123456,1123538,1123697,1123882,1123933,1124055,1124204,1124235,1124579,1124589,1124728,1124732,1124735,1124969,1124974,1124975,1124976,1124978,1124979,1124980,1124981,1124982,1124984,1124985,1125109,1125125,1125252,1125315,1125614,1125728,1125780,1125797,1125799,1125800,1125907,1125947,1126131,1126209,1126389,1126393,1126476,1126480,1126481,1126488,1126495,1126555,1126579,1126789,1126790,1126802,1126803,1126804,1126805,1126806,1126807,1127042,1127062,1127082,1127154,1127285,1127286,1127307,1127363,1127493,1127494,1127495,1127496,1127497,1127498,1127534,1127561,1127567,1127595,1127603,1127682,1127731,1127750,1127836,1127961,1128094,1128166,1128351,1128451,1128895,1129046,1129080,1129163,1129179,1129181,1129182,1129183,1129184,1129205,1129281,1129284,1129285,1129291,1129292,1129293,1129294,1129295,1129296,1129326,1129327,1129330,1129363,1129366,1129497,1129519,1129543,1129547,1129551,1129581,1129625,1129664,1129739,1129923,807502,824948,828192,925178
CVE References: CVE-2017-5753,CVE-2018-20669,CVE-2019-2024,CVE-2019-3459,CVE-2019-3460,CVE-2019-3819,CVE-2019-6974,CVE-2019-7221,CVE-2019-7222,CVE-2019-7308,CVE-2019-8912,CVE-2019-8980,CVE-2019-9213
Sources used:
SUSE Linux Enterprise Workstation Extension 12-SP4 (src):    kernel-default-4.12.14-95.13.1
SUSE Linux Enterprise Software Development Kit 12-SP4 (src):    kernel-docs-4.12.14-95.13.1, kernel-obs-build-4.12.14-95.13.1
SUSE Linux Enterprise Server 12-SP4 (src):    kernel-default-4.12.14-95.13.1, kernel-source-4.12.14-95.13.1, kernel-syms-4.12.14-95.13.1
SUSE Linux Enterprise Live Patching 12-SP4 (src):    kgraft-patch-SLE12-SP4_Update_3-1-6.7.1
SUSE Linux Enterprise High Availability 12-SP4 (src):    kernel-default-4.12.14-95.13.1
SUSE Linux Enterprise Desktop 12-SP4 (src):    kernel-default-4.12.14-95.13.1, kernel-source-4.12.14-95.13.1, kernel-syms-4.12.14-95.13.1

*** NOTE: This information is not intended to be used for external
    communication, because this may only be a partial fix.
    If you have questions please reach out to maintenance coordination.
Comment 46 Swamp Workflow Management 2019-03-27 19:06:22 UTC
SUSE-SU-2019:0767-1: An update that solves 12 vulnerabilities and has 205 fixes is now available.

Category: security (important)
Bug References: 1046305,1046306,1050252,1050549,1051510,1054610,1055121,1056658,1056662,1056787,1060463,1063638,1065600,1070995,1071995,1078355,1082943,1083548,1083647,1084216,1086095,1086282,1086301,1086313,1086314,1086323,1087082,1087092,1088133,1094555,1098382,1098425,1098995,1103429,1104353,1106105,1106434,1106811,1107078,1107665,1108101,1108870,1109695,1110096,1110705,1111666,1113042,1113712,1113722,1113939,1114279,1114585,1114893,1117108,1117155,1117645,1117947,1118338,1119019,1119086,1119766,1119843,1120008,1120318,1120601,1120758,1120854,1120902,1120909,1120955,1121317,1121726,1121789,1121805,1122159,1122192,1122324,1122554,1122662,1122764,1122779,1122822,1122885,1122927,1122944,1122971,1122982,1123060,1123061,1123161,1123317,1123348,1123357,1123456,1123538,1123697,1123882,1123933,1124055,1124204,1124235,1124579,1124589,1124728,1124732,1124735,1124969,1124974,1124975,1124976,1124978,1124979,1124980,1124981,1124982,1124984,1124985,1125109,1125125,1125252,1125315,1125614,1125728,1125780,1125797,1125799,1125800,1125907,1125947,1126131,1126209,1126284,1126389,1126393,1126476,1126480,1126481,1126488,1126495,1126555,1126579,1126789,1126790,1126802,1126803,1126804,1126805,1126806,1126807,1127042,1127062,1127081,1127082,1127154,1127285,1127286,1127307,1127363,1127493,1127494,1127495,1127496,1127497,1127498,1127534,1127561,1127567,1127577,1127595,1127603,1127682,1127731,1127750,1127836,1127961,1128094,1128166,1128351,1128378,1128451,1128895,1129016,1129046,1129080,1129163,1129179,1129181,1129182,1129183,1129184,1129205,1129281,1129284,1129285,1129291,1129292,1129293,1129294,1129295,1129296,1129326,1129327,1129330,1129363,1129366,1129497,1129519,1129543,1129547,1129551,1129581,1129625,1129664,1129739,1129923,807502,828192
CVE References: CVE-2018-20669,CVE-2019-2024,CVE-2019-3459,CVE-2019-3460,CVE-2019-3819,CVE-2019-6974,CVE-2019-7221,CVE-2019-7222,CVE-2019-7308,CVE-2019-8912,CVE-2019-8980,CVE-2019-9213
Sources used:
SUSE Linux Enterprise Server 12-SP4 (src):    kernel-azure-4.12.14-6.9.1, kernel-source-azure-4.12.14-6.9.1, kernel-syms-azure-4.12.14-6.9.1

*** NOTE: This information is not intended to be used for external
    communication, because this may only be a partial fix.
    If you have questions please reach out to maintenance coordination.
Comment 47 Swamp Workflow Management 2019-03-28 12:48:23 UTC
SUSE-SU-2019:0767-1: An update that solves 12 vulnerabilities and has 205 fixes is now available.

Category: security (important)
Bug References: 1046305,1046306,1050252,1050549,1051510,1054610,1055121,1056658,1056662,1056787,1060463,1063638,1065600,1070995,1071995,1078355,1082943,1083548,1083647,1084216,1086095,1086282,1086301,1086313,1086314,1086323,1087082,1087092,1088133,1094555,1098382,1098425,1098995,1103429,1104353,1106105,1106434,1106811,1107078,1107665,1108101,1108870,1109695,1110096,1110705,1111666,1113042,1113712,1113722,1113939,1114279,1114585,1114893,1117108,1117155,1117645,1117947,1118338,1119019,1119086,1119766,1119843,1120008,1120318,1120601,1120758,1120854,1120902,1120909,1120955,1121317,1121726,1121789,1121805,1122159,1122192,1122324,1122554,1122662,1122764,1122779,1122822,1122885,1122927,1122944,1122971,1122982,1123060,1123061,1123161,1123317,1123348,1123357,1123456,1123538,1123697,1123882,1123933,1124055,1124204,1124235,1124579,1124589,1124728,1124732,1124735,1124969,1124974,1124975,1124976,1124978,1124979,1124980,1124981,1124982,1124984,1124985,1125109,1125125,1125252,1125315,1125614,1125728,1125780,1125797,1125799,1125800,1125907,1125947,1126131,1126209,1126284,1126389,1126393,1126476,1126480,1126481,1126488,1126495,1126555,1126579,1126789,1126790,1126802,1126803,1126804,1126805,1126806,1126807,1127042,1127062,1127081,1127082,1127154,1127285,1127286,1127307,1127363,1127493,1127494,1127495,1127496,1127497,1127498,1127534,1127561,1127567,1127577,1127595,1127603,1127682,1127731,1127750,1127836,1127961,1128094,1128166,1128351,1128378,1128451,1128895,1129016,1129046,1129080,1129163,1129179,1129181,1129182,1129183,1129184,1129205,1129281,1129284,1129285,1129291,1129292,1129293,1129294,1129295,1129296,1129326,1129327,1129330,1129363,1129366,1129497,1129519,1129543,1129547,1129551,1129581,1129625,1129664,1129739,1129923,807502,828192
CVE References: CVE-2018-20669,CVE-2019-2024,CVE-2019-3459,CVE-2019-3460,CVE-2019-3819,CVE-2019-6974,CVE-2019-7221,CVE-2019-7222,CVE-2019-7308,CVE-2019-8912,CVE-2019-8980,CVE-2019-9213
Sources used:
SUSE Linux Enterprise Server 12-SP4 (src):    kernel-azure-4.12.14-6.9.1, kernel-source-azure-4.12.14-6.9.1, kernel-syms-azure-4.12.14-6.9.1

*** NOTE: This information is not intended to be used for external
    communication, because this may only be a partial fix.
    If you have questions please reach out to maintenance coordination.
Comment 48 Swamp Workflow Management 2019-03-28 12:48:53 UTC
SUSE-SU-2019:0784-1: An update that solves 12 vulnerabilities and has 197 fixes is now available.

Category: security (important)
Bug References: 1046305,1046306,1050252,1050549,1051510,1054610,1055121,1056658,1056662,1056787,1060463,1063638,1065600,1070995,1071995,1078355,1082943,1083548,1083647,1084216,1086095,1086282,1086301,1086313,1086314,1086323,1087082,1087092,1088133,1094555,1098382,1098425,1098995,1103429,1104353,1106105,1106434,1106811,1107078,1107665,1108101,1108870,1109695,1110096,1110705,1111666,1113042,1113712,1113722,1113939,1114279,1114585,1117108,1117155,1117645,1118338,1119019,1119086,1119766,1119843,1120008,1120318,1120601,1120758,1120854,1120902,1120909,1120955,1121317,1121726,1121789,1121805,1122019,1122192,1122324,1122554,1122662,1122764,1122779,1122822,1122885,1122927,1122944,1122971,1122982,1123060,1123061,1123161,1123317,1123348,1123357,1123456,1123538,1123697,1123882,1123933,1124055,1124204,1124235,1124579,1124589,1124728,1124732,1124735,1124969,1124974,1124975,1124976,1124978,1124979,1124980,1124981,1124982,1124984,1124985,1125109,1125125,1125252,1125315,1125614,1125728,1125780,1125797,1125799,1125800,1125907,1125947,1126131,1126209,1126389,1126393,1126476,1126480,1126481,1126488,1126495,1126555,1126579,1126789,1126790,1126802,1126803,1126804,1126805,1126806,1126807,1127042,1127062,1127082,1127154,1127285,1127286,1127307,1127363,1127493,1127494,1127495,1127496,1127497,1127498,1127534,1127561,1127567,1127595,1127603,1127682,1127731,1127750,1127836,1127961,1128094,1128166,1128351,1128451,1128895,1129046,1129080,1129163,1129179,1129181,1129182,1129183,1129184,1129205,1129281,1129284,1129285,1129291,1129292,1129293,1129294,1129295,1129296,1129326,1129327,1129330,1129363,1129366,1129497,1129519,1129543,1129547,1129551,1129581,1129625,1129664,1129739,1129923,824948
CVE References: CVE-2018-20669,CVE-2019-2024,CVE-2019-3459,CVE-2019-3460,CVE-2019-3819,CVE-2019-6974,CVE-2019-7221,CVE-2019-7222,CVE-2019-7308,CVE-2019-8912,CVE-2019-8980,CVE-2019-9213
Sources used:
SUSE Linux Enterprise Workstation Extension 15 (src):    kernel-default-4.12.14-150.14.2
SUSE Linux Enterprise Module for Open Buildservice Development Tools 15 (src):    kernel-default-4.12.14-150.14.2, kernel-docs-4.12.14-150.14.1, kernel-obs-qa-4.12.14-150.14.2
SUSE Linux Enterprise Module for Live Patching 15 (src):    kernel-default-4.12.14-150.14.2, kernel-livepatch-SLE15_Update_9-1-1.9.3
SUSE Linux Enterprise Module for Legacy Software 15 (src):    kernel-default-4.12.14-150.14.2
SUSE Linux Enterprise Module for Development Tools 15 (src):    kernel-docs-4.12.14-150.14.1, kernel-obs-build-4.12.14-150.14.2, kernel-source-4.12.14-150.14.1, kernel-syms-4.12.14-150.14.1, kernel-vanilla-4.12.14-150.14.2
SUSE Linux Enterprise Module for Basesystem 15 (src):    kernel-default-4.12.14-150.14.2, kernel-source-4.12.14-150.14.1, kernel-zfcpdump-4.12.14-150.14.2
SUSE Linux Enterprise High Availability 15 (src):    kernel-default-4.12.14-150.14.2

*** NOTE: This information is not intended to be used for external
    communication, because this may only be a partial fix.
    If you have questions please reach out to maintenance coordination.
Comment 49 Swamp Workflow Management 2019-03-28 12:53:31 UTC
SUSE-SU-2019:0784-1: An update that solves 12 vulnerabilities and has 197 fixes is now available.

Category: security (important)
Bug References: 1046305,1046306,1050252,1050549,1051510,1054610,1055121,1056658,1056662,1056787,1060463,1063638,1065600,1070995,1071995,1078355,1082943,1083548,1083647,1084216,1086095,1086282,1086301,1086313,1086314,1086323,1087082,1087092,1088133,1094555,1098382,1098425,1098995,1103429,1104353,1106105,1106434,1106811,1107078,1107665,1108101,1108870,1109695,1110096,1110705,1111666,1113042,1113712,1113722,1113939,1114279,1114585,1117108,1117155,1117645,1118338,1119019,1119086,1119766,1119843,1120008,1120318,1120601,1120758,1120854,1120902,1120909,1120955,1121317,1121726,1121789,1121805,1122019,1122192,1122324,1122554,1122662,1122764,1122779,1122822,1122885,1122927,1122944,1122971,1122982,1123060,1123061,1123161,1123317,1123348,1123357,1123456,1123538,1123697,1123882,1123933,1124055,1124204,1124235,1124579,1124589,1124728,1124732,1124735,1124969,1124974,1124975,1124976,1124978,1124979,1124980,1124981,1124982,1124984,1124985,1125109,1125125,1125252,1125315,1125614,1125728,1125780,1125797,1125799,1125800,1125907,1125947,1126131,1126209,1126389,1126393,1126476,1126480,1126481,1126488,1126495,1126555,1126579,1126789,1126790,1126802,1126803,1126804,1126805,1126806,1126807,1127042,1127062,1127082,1127154,1127285,1127286,1127307,1127363,1127493,1127494,1127495,1127496,1127497,1127498,1127534,1127561,1127567,1127595,1127603,1127682,1127731,1127750,1127836,1127961,1128094,1128166,1128351,1128451,1128895,1129046,1129080,1129163,1129179,1129181,1129182,1129183,1129184,1129205,1129281,1129284,1129285,1129291,1129292,1129293,1129294,1129295,1129296,1129326,1129327,1129330,1129363,1129366,1129497,1129519,1129543,1129547,1129551,1129581,1129625,1129664,1129739,1129923,824948
CVE References: CVE-2018-20669,CVE-2019-2024,CVE-2019-3459,CVE-2019-3460,CVE-2019-3819,CVE-2019-6974,CVE-2019-7221,CVE-2019-7222,CVE-2019-7308,CVE-2019-8912,CVE-2019-8980,CVE-2019-9213
Sources used:
SUSE Linux Enterprise Module for Live Patching 15 (src):    kernel-default-4.12.14-150.14.2, kernel-livepatch-SLE15_Update_9-1-1.9.3

*** NOTE: This information is not intended to be used for external
    communication, because this may only be a partial fix.
    If you have questions please reach out to maintenance coordination.
Comment 50 Swamp Workflow Management 2019-03-28 14:26:39 UTC
SUSE-SU-2019:0785-1: An update that solves 12 vulnerabilities and has 198 fixes is now available.

Category: security (important)
Bug References: 1046305,1046306,1050252,1050549,1051510,1054610,1055121,1056658,1056662,1056787,1060463,1063638,1065600,1070995,1071995,1078355,1082943,1083548,1083647,1084216,1086095,1086282,1086301,1086313,1086314,1086323,1087082,1087092,1088133,1094555,1098382,1098425,1098995,1103429,1104353,1106105,1106434,1106811,1107078,1107665,1108101,1108870,1109695,1110096,1110705,1111666,1113042,1113712,1113722,1113939,1114279,1114585,1117108,1117155,1117645,1118338,1119019,1119086,1119766,1119843,1120008,1120318,1120601,1120758,1120854,1120902,1120909,1120955,1121317,1121726,1121789,1121805,1122019,1122192,1122324,1122554,1122662,1122764,1122779,1122822,1122885,1122927,1122944,1122971,1122982,1123060,1123061,1123161,1123317,1123348,1123357,1123456,1123538,1123697,1123882,1123933,1124055,1124204,1124235,1124579,1124589,1124728,1124732,1124735,1124969,1124974,1124975,1124976,1124978,1124979,1124980,1124981,1124982,1124984,1124985,1125109,1125125,1125252,1125315,1125614,1125728,1125780,1125797,1125799,1125800,1125907,1125947,1126131,1126209,1126389,1126393,1126476,1126480,1126481,1126488,1126495,1126555,1126579,1126789,1126790,1126802,1126803,1126804,1126805,1126806,1126807,1127042,1127062,1127082,1127154,1127285,1127286,1127307,1127363,1127493,1127494,1127495,1127496,1127497,1127498,1127534,1127561,1127567,1127578,1127595,1127603,1127682,1127731,1127750,1127836,1127961,1128094,1128166,1128351,1128451,1128895,1129046,1129080,1129163,1129179,1129181,1129182,1129183,1129184,1129205,1129281,1129284,1129285,1129291,1129292,1129293,1129294,1129295,1129296,1129326,1129327,1129330,1129363,1129366,1129497,1129519,1129543,1129547,1129551,1129581,1129625,1129664,1129739,1129923,824948
CVE References: CVE-2018-20669,CVE-2019-2024,CVE-2019-3459,CVE-2019-3460,CVE-2019-3819,CVE-2019-6974,CVE-2019-7221,CVE-2019-7222,CVE-2019-7308,CVE-2019-8912,CVE-2019-8980,CVE-2019-9213
Sources used:
SUSE Linux Enterprise Module for Public Cloud 15 (src):    kernel-azure-4.12.14-5.24.1, kernel-source-azure-4.12.14-5.24.1, kernel-syms-azure-4.12.14-5.24.1

*** NOTE: This information is not intended to be used for external
    communication, because this may only be a partial fix.
    If you have questions please reach out to maintenance coordination.