Bug 1134806 - null pointer dereference in btrfs/qgroup with kernel 5.0.2
null pointer dereference in btrfs/qgroup with kernel 5.0.2
Status: RESOLVED FIXED
Classification: openSUSE
Product: openSUSE Tumbleweed
Classification: openSUSE
Component: Kernel
Current
x86-64 openSUSE Factory
: P5 - None : Major (vote)
: ---
Assigned To: E-mail List
E-mail List
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2019-05-12 15:50 UTC by Juan Erbes
Modified: 2019-09-23 22:47 UTC (History)
4 users (show)

See Also:
Found By: Beta-Customer
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Juan Erbes 2019-05-12 15:50:29 UTC
With the last upgrades in Tumbleweed with kernel 5.xx, zypper dup hangs after upgrading the kernel.

It can be to do with the SATA controller ASMEDIA ASM 1062 (0x1B21), and it don't work without a hardware reset with the new kernel.
Making a hardware reset, after the kernel 5.xx upgrade, the system works fine, and then I must to do a new zypper dup to complete the upgrade of the downloaded packages.

Sistema operativo: openSUSE Tumbleweed 20190506
Versión de KDE Plasma: 5.15.4
Versión de KDE Frameworks: 5.57.0
Versión de Qt: 5.12.3
Versión del kernel: 5.0.2-1-default
Tipo de OS: 64 bits
Procesadores: 8 × AMD FX-8320E Eight-Core Processor
Memoria: 15,6 GiB de RAM

Konsole with zypper dup:
(156/275) Instalando: kernel-default-5.0.11-1.3.x86_64 ..................................................................................................................................................<100%>[/]

Output of ps -aux:
USER       PID %CPU %MEM    VSZ   RSS TTY      STAT START   TIME COMMAND
root         1  0.0  0.0 166352 13936 ?        Ss   17:21   0:10 /usr/lib/systemd/systemd --switched-root --system --deserialize 33
root         2  0.0  0.0      0     0 ?        S    17:21   0:00 [kthreadd]
root         3  0.0  0.0      0     0 ?        I<   17:21   0:00 [rcu_gp]
root         4  0.0  0.0      0     0 ?        I<   17:21   0:00 [rcu_par_gp]
root         6  0.0  0.0      0     0 ?        I<   17:21   0:00 [kworker/0:0H-kblockd]
root         8  0.0  0.0      0     0 ?        I<   17:21   0:00 [mm_percpu_wq]
root         9  0.0  0.0      0     0 ?        S    17:21   0:00 [ksoftirqd/0]
root        10  0.0  0.0      0     0 ?        I    17:21   0:21 [rcu_sched]
root        11  0.0  0.0      0     0 ?        S    17:21   0:00 [migration/0]
root        12  0.0  0.0      0     0 ?        S    17:21   0:00 [idle_inject/0]
root        14  0.0  0.0      0     0 ?        S    17:21   0:00 [cpuhp/0]
root        15  0.0  0.0      0     0 ?        S    17:21   0:00 [cpuhp/1]
root        16  0.0  0.0      0     0 ?        S    17:21   0:00 [idle_inject/1]
root        17  0.0  0.0      0     0 ?        S    17:21   0:00 [migration/1]
root        18  0.0  0.0      0     0 ?        S    17:21   0:00 [ksoftirqd/1]
root        20  0.0  0.0      0     0 ?        I<   17:21   0:00 [kworker/1:0H-kblockd]
root        21  0.0  0.0      0     0 ?        S    17:21   0:00 [cpuhp/2]
root        22  0.0  0.0      0     0 ?        S    17:21   0:00 [idle_inject/2]
root        23  0.0  0.0      0     0 ?        S    17:21   0:00 [migration/2]
root        24  0.0  0.0      0     0 ?        S    17:21   0:00 [ksoftirqd/2]
root        26  0.0  0.0      0     0 ?        I<   17:21   0:00 [kworker/2:0H-kblockd]
root        27  0.0  0.0      0     0 ?        S    17:21   0:00 [cpuhp/3]
root        28  0.0  0.0      0     0 ?        S    17:21   0:00 [idle_inject/3]
root        29  0.0  0.0      0     0 ?        S    17:21   0:00 [migration/3]
root        30  0.0  0.0      0     0 ?        S    17:21   0:00 [ksoftirqd/3]
root        32  0.0  0.0      0     0 ?        I<   17:21   0:00 [kworker/3:0H-kblockd]
root        33  0.0  0.0      0     0 ?        S    17:21   0:00 [cpuhp/4]
root        34  0.0  0.0      0     0 ?        S    17:21   0:00 [idle_inject/4]
root        35  0.0  0.0      0     0 ?        S    17:21   0:00 [migration/4]
root        36  0.0  0.0      0     0 ?        S    17:21   0:00 [ksoftirqd/4]
root        38  0.0  0.0      0     0 ?        I<   17:21   0:00 [kworker/4:0H-kblockd]
root        39  0.0  0.0      0     0 ?        S    17:21   0:00 [cpuhp/5]
root        40  0.0  0.0      0     0 ?        S    17:21   0:00 [idle_inject/5]
root        41  0.0  0.0      0     0 ?        S    17:21   0:00 [migration/5]
root        42  0.0  0.0      0     0 ?        S    17:21   0:00 [ksoftirqd/5]
root        44  0.0  0.0      0     0 ?        I<   17:21   0:00 [kworker/5:0H-kblockd]
root        45  0.0  0.0      0     0 ?        S    17:21   0:00 [cpuhp/6]
root        46  0.0  0.0      0     0 ?        S    17:21   0:00 [idle_inject/6]
root        47  0.0  0.0      0     0 ?        S    17:21   0:00 [migration/6]
root        48  0.0  0.0      0     0 ?        S    17:21   0:00 [ksoftirqd/6]
root        50  0.0  0.0      0     0 ?        I<   17:21   0:00 [kworker/6:0H-kblockd]
root        51  0.0  0.0      0     0 ?        S    17:21   0:00 [cpuhp/7]
root        52  0.0  0.0      0     0 ?        S    17:21   0:00 [idle_inject/7]
root        53  0.0  0.0      0     0 ?        S    17:21   0:00 [migration/7]
root        54  0.0  0.0      0     0 ?        S    17:21   0:00 [ksoftirqd/7]
root        56  0.0  0.0      0     0 ?        I<   17:21   0:00 [kworker/7:0H-kblockd]
root        58  0.0  0.0      0     0 ?        S    17:21   0:00 [kdevtmpfs]
root        59  0.0  0.0      0     0 ?        I<   17:21   0:00 [netns]
root        60  0.0  0.0      0     0 ?        S    17:21   0:00 [rcu_tasks_kthre]
root        61  0.0  0.0      0     0 ?        S    17:21   0:00 [kauditd]
root        62  0.0  0.0      0     0 ?        S    17:21   0:00 [khungtaskd]
root        63  0.0  0.0      0     0 ?        S    17:21   0:00 [oom_reaper]
root        64  0.0  0.0      0     0 ?        I<   17:21   0:00 [writeback]
root        65  0.0  0.0      0     0 ?        S    17:21   0:00 [kcompactd0]
root        66  0.0  0.0      0     0 ?        SN   17:21   0:00 [ksmd]
root        67  0.0  0.0      0     0 ?        SN   17:21   0:00 [khugepaged]
root        68  0.0  0.0      0     0 ?        I<   17:21   0:00 [crypto]
root        69  0.0  0.0      0     0 ?        I<   17:21   0:00 [kintegrityd]
root        70  0.0  0.0      0     0 ?        I<   17:21   0:00 [kblockd]
root        71  0.0  0.0      0     0 ?        I<   17:21   0:00 [tpm_dev_wq]
root        72  0.0  0.0      0     0 ?        I<   17:21   0:00 [ata_sff]
root        73  0.0  0.0      0     0 ?        I<   17:21   0:00 [edac-poller]
root        74  0.0  0.0      0     0 ?        I<   17:21   0:00 [devfreq_wq]
root        75  0.0  0.0      0     0 ?        S    17:21   0:00 [watchdogd]
root        83  0.0  0.0      0     0 ?        S    17:21   0:00 [kswapd0]
root        84  0.0  0.0      0     0 ?        I<   17:21   0:00 [kworker/u17:0]
root       168  0.0  0.0      0     0 ?        I<   17:21   0:00 [kthrotld]
root       169  0.0  0.0      0     0 ?        I<   17:21   0:00 [nvme-wq]
root       170  0.0  0.0      0     0 ?        I<   17:21   0:00 [nvme-reset-wq]
root       171  0.0  0.0      0     0 ?        I<   17:21   0:00 [nvme-delete-wq]
root       172  0.0  0.0      0     0 ?        S    17:21   0:00 [scsi_eh_0]
root       173  0.0  0.0      0     0 ?        I<   17:21   0:00 [scsi_tmf_0]
root       174  0.0  0.0      0     0 ?        S    17:21   0:00 [scsi_eh_1]
root       176  0.0  0.0      0     0 ?        I<   17:21   0:00 [scsi_tmf_1]
root       177  0.0  0.0      0     0 ?        S    17:21   0:00 [scsi_eh_2]
root       178  0.0  0.0      0     0 ?        I<   17:21   0:00 [scsi_tmf_2]
root       179  0.0  0.0      0     0 ?        S    17:21   0:00 [scsi_eh_3]
root       180  0.0  0.0      0     0 ?        I<   17:21   0:00 [scsi_tmf_3]
root       182  0.0  0.0      0     0 ?        S    17:21   0:00 [scsi_eh_4]
root       184  0.0  0.0      0     0 ?        I<   17:21   0:00 [scsi_tmf_4]
root       186  0.0  0.0      0     0 ?        S    17:21   0:00 [scsi_eh_5]
root       187  0.0  0.0      0     0 ?        I<   17:21   0:00 [scsi_tmf_5]
root       190  0.0  0.0      0     0 ?        I<   17:21   0:00 [ipv6_addrconf]
root       203  0.0  0.0      0     0 ?        I<   17:21   0:00 [kstrp]
root       219  0.0  0.0      0     0 ?        I<   17:21   0:00 [kworker/2:1H-kblockd]
root       220  0.0  0.0      0     0 ?        I<   17:21   0:01 [kworker/6:1H-kblockd]
root       252  0.0  0.0   8108  4756 ?        Ss   17:21   0:05 @usr/sbin/haveged -w 1024 -v 0 -F
root       262  0.0  0.0      0     0 ?        I<   17:21   0:00 [kaluad]
root       263  0.0  0.0      0     0 ?        I<   17:21   0:00 [kmpath_rdacd]
root       264  0.0  0.0      0     0 ?        I<   17:21   0:00 [kmpathd]
root       265  0.0  0.0      0     0 ?        I<   17:21   0:00 [kmpath_handlerd]
avahi      347  0.0  0.0   7276  3852 ?        Ss   23:18   0:00 avahi-daemon: running [linux-kzzr.local]
root       356  0.0  0.0      0     0 ?        I    23:18   0:00 [kworker/u16:15-events_unbound]
root       357  0.0  0.0      0     0 ?        S    17:21   0:00 [scsi_eh_6]
root       360  0.0  0.0      0     0 ?        I<   17:21   0:00 [scsi_tmf_6]
root       368  0.0  0.0      0     0 ?        S    17:21   0:00 [scsi_eh_7]
root       369  0.0  0.0      0     0 ?        I<   17:21   0:00 [scsi_tmf_7]
root       389  0.0  0.0      0     0 ?        I    23:18   0:00 [kworker/5:2-events]
root       391  0.0  0.0      0     0 ?        I<   17:21   0:00 [ttm_swap]
root       392  0.2  0.0      0     0 ?        S    17:21   0:48 [gfx]
root       393  0.0  0.0      0     0 ?        S    17:21   0:00 [comp_1.0.0]
root       394  0.0  0.0      0     0 ?        S    17:21   0:00 [comp_1.1.0]
root       395  0.0  0.0      0     0 ?        S    17:21   0:00 [comp_1.2.0]
root       396  0.0  0.0      0     0 ?        S    17:21   0:00 [comp_1.3.0]
root       397  0.0  0.0      0     0 ?        S    17:21   0:00 [comp_1.0.1]
root       398  0.0  0.0      0     0 ?        S    17:21   0:00 [comp_1.1.1]
root       399  0.0  0.0      0     0 ?        S    17:21   0:00 [comp_1.2.1]
root       400  0.0  0.0      0     0 ?        S    17:21   0:00 [comp_1.3.1]
root       401  0.0  0.0      0     0 ?        S    17:21   0:02 [sdma0]
root       402  0.0  0.0      0     0 ?        S    17:21   0:00 [sdma1]
root       403  0.0  0.0      0     0 ?        S    17:21   0:00 [uvd]
root       404  0.0  0.0      0     0 ?        S    17:21   0:00 [uvd_enc0]
root       405  0.0  0.0      0     0 ?        S    17:21   0:00 [uvd_enc1]
root       406  0.0  0.0      0     0 ?        S    17:21   0:00 [vce0]
root       407  0.0  0.0      0     0 ?        S    17:21   0:00 [vce1]
root       408  0.0  0.0      0     0 ?        S    17:21   0:00 [vce2]
root       419  0.0  0.0      0     0 ?        I<   17:21   0:00 [kworker/5:1H-kblockd]
root       423  0.0  0.0      0     0 ?        I<   17:21   0:00 [kworker/4:1H-kblockd]
root       426  0.0  0.0      0     0 ?        I<   17:21   0:00 [kworker/1:1H-kblockd]
root       432  0.0  0.0      0     0 ?        I<   17:21   0:00 [btrfs-worker]
root       433  0.0  0.0      0     0 ?        I<   17:21   0:00 [btrfs-worker-hi]
root       434  0.0  0.0      0     0 ?        I<   17:21   0:00 [btrfs-delalloc]
root       435  0.0  0.0      0     0 ?        I<   17:21   0:00 [btrfs-flush_del]
root       436  0.0  0.0      0     0 ?        I<   17:21   0:00 [btrfs-cache]
root       437  0.0  0.0      0     0 ?        I<   17:21   0:00 [btrfs-submit]
root       438  0.0  0.0      0     0 ?        I<   17:21   0:00 [btrfs-fixup]
root       439  0.0  0.0      0     0 ?        I<   17:21   0:00 [btrfs-endio]
root       440  0.0  0.0      0     0 ?        I<   17:21   0:00 [btrfs-endio-met]
root       441  0.0  0.0      0     0 ?        I<   17:21   0:00 [btrfs-endio-met]
root       442  0.0  0.0      0     0 ?        I<   17:21   0:00 [btrfs-endio-rai]
root       443  0.0  0.0      0     0 ?        I<   17:21   0:00 [btrfs-endio-rep]
root       444  0.0  0.0      0     0 ?        I<   17:21   0:00 [btrfs-rmw]
root       445  0.0  0.0      0     0 ?        I<   17:21   0:00 [btrfs-endio-wri]
root       446  0.0  0.0      0     0 ?        I<   17:21   0:00 [btrfs-freespace]
root       447  0.0  0.0      0     0 ?        I<   17:21   0:00 [btrfs-delayed-m]
root       448  0.0  0.0      0     0 ?        I<   17:21   0:00 [btrfs-readahead]
root       449  0.0  0.0      0     0 ?        I<   17:21   0:00 [btrfs-qgroup-re]
root       450  0.0  0.0      0     0 ?        I<   17:21   0:00 [btrfs-extent-re]
root       455  0.0  0.0      0     0 ?        I<   17:21   0:00 [kworker/0:1H-kblockd]
root       456  0.0  0.0      0     0 ?        S    17:21   0:00 [btrfs-cleaner]
root       457  0.0  0.0      0     0 ?        S    17:21   0:09 [btrfs-transacti]
root       495  0.0  0.0      0     0 ?        I<   17:21   0:00 [kworker/3:1H-kblockd]
root       508  0.0  0.0      0     0 ?        I<   17:21   0:00 [kworker/7:1H-kblockd]
root       526  0.0  0.1  32968 18844 ?        Ss   17:21   0:01 /usr/lib/systemd/systemd-journald
root       542  0.0  0.0  26156 10652 ?        Ss   17:21   0:00 /usr/lib/systemd/systemd-udevd
root       786  0.0  0.0      0     0 ?        I<   17:21   0:00 [xfsalloc]
root       787  0.0  0.0      0     0 ?        I<   17:21   0:00 [xfs_mru_cache]
root       788  0.0  0.0      0     0 ?        I<   17:21   0:00 [xfs-buf/sdb2]
root       789  0.0  0.0      0     0 ?        I<   17:21   0:00 [xfs-data/sdb2]
root       790  0.0  0.0      0     0 ?        I<   17:21   0:00 [xfs-conv/sdb2]
root       791  0.0  0.0      0     0 ?        I<   17:21   0:00 [xfs-cil/sdb2]
root       792  0.0  0.0      0     0 ?        I<   17:21   0:00 [xfs-reclaim/sdb]
root       793  0.0  0.0      0     0 ?        I<   17:21   0:00 [xfs-log/sdb2]
root       794  0.0  0.0      0     0 ?        I<   17:21   0:00 [xfs-eofblocks/s]
root       797  0.0  0.0      0     0 ?        S    17:21   0:03 [xfsaild/sdb2]
root       799  0.0  0.0      0     0 ?        I    23:18   0:00 [kworker/3:3-events]
root       893  0.0  0.0  11172  1632 ?        S<sl 17:21   0:00 /sbin/auditd
root      1033  0.6  0.1  22584 19788 pts/0    S+   23:19   0:09 rpm --root / --dbpath /var/lib/rpm -i --percent --noglob --force --nodeps -- /var/cache/zypp/packages/repo-oss/x86_64/kernel-default-5.0.11-1.3.x
root      1049  0.0  0.0   3920  3008 pts/0    S+   23:19   0:00 /bin/sh /var/tmp/rpm-tmp.IUNMA1 4
root      1107  0.0  0.0   3116  2512 ?        Ss   17:21   0:00 /usr/lib/ipsec/starter --daemon charon --nofork
message+  1111  0.0  0.0   8588  6304 ?        Ss   17:21   0:06 /usr/bin/dbus-daemon --system --address=systemd: --nofork --nopidfile --systemd-activation --syslog-only

Output of dmesg:
[ 1008.048735] fuse init (API version 7.28)
[13633.617396] usb 1-4: new high-speed USB device number 4 using ehci-pci
[13633.778306] usb 1-4: New USB device found, idVendor=03f0, idProduct=6612, bcdDevice= 1.00
[13633.778313] usb 1-4: New USB device strings: Mfr=1, Product=2, SerialNumber=3
[13633.778317] usb 1-4: Product: Deskjet 4620 series
[13633.778321] usb 1-4: Manufacturer: HP
[13633.778325] usb 1-4: SerialNumber: CN2AH210MB05TN
[13634.051756] Did not find alt setting 1 for intf 0, config 1
[13634.052011] Did not find alt setting 1 for intf 0, config 1
[13634.088628] usblp 1-4:1.1: usblp0: USB Bidirectional printer dev 4 if 1 alt 0 proto 2 vid 0x03F0 pid 0x6612
[13634.089454] usblp 1-4:1.2: usblp1: USB Bidirectional printer dev 4 if 2 alt 0 proto 2 vid 0x03F0 pid 0x6612
[13634.089493] usbcore: registered new interface driver usblp
[13639.416880] usblp0: removed
[13639.419597] usblp 1-4:1.1: usblp0: USB Bidirectional printer dev 4 if 1 alt 0 proto 2 vid 0x03F0 pid 0x6612
[13639.419713] usblp1: removed
[13639.421211] usblp 1-4:1.2: usblp1: USB Bidirectional printer dev 4 if 2 alt 0 proto 2 vid 0x03F0 pid 0x6612
[13693.559333] usblp0: removed
[13693.559476] Did not find alt setting 1 for intf 0, config 1
[13800.437507] usb 1-4: USB disconnect, device number 4
[13800.438010] usblp1: removed
[21567.380627] BTRFS info (device sda1): disk space caching is enabled
[21567.380630] BTRFS info (device sda1): has skinny extents
[21567.999694] BUG: unable to handle kernel NULL pointer dereference at 0000000000000068
[21567.999702] #PF error: [normal kernel read fault]
[21567.999706] PGD 0 P4D 0 
[21567.999712] Oops: 0000 [#1] SMP NOPTI
[21567.999718] CPU: 6 PID: 21331 Comm: mount Not tainted 5.0.2-1-default #1 openSUSE Tumbleweed (unreleased)
[21567.999723] Hardware name: To Be Filled By O.E.M. To Be Filled By O.E.M./980DE3/U3S3, BIOS P2.00 09/04/2015
[21567.999784] RIP: 0010:btrfs_qgroup_trace_subtree_swap+0xb2/0x380 [btrfs]
[21567.999789] Code: 65 ba 19 00 00 00 4c 89 fe e8 ea 14 fb ff 48 3b 04 24 0f 82 70 02 00 00 48 8b 44 24 08 4c 89 f6 31 c9 ba 11 00 00 00 48 89 df <48> 8b 40 68 48 89 44 24 08 e8 c0 14 fb ff 31 c9 4c 89 f6 ba 19 00
[21567.999796] RSP: 0018:ffff9d810a203810 EFLAGS: 00010246
[21567.999800] RAX: 0000000000000000 RBX: ffff8b821f8e36d0 RCX: 0000000000000000
[21567.999804] RDX: 0000000000000011 RSI: 0000000000000065 RDI: ffff8b821f8e36d0
[21567.999808] RBP: ffff8b81d463a9d8 R08: ffff9d810a2037c8 R09: ffff9d810a2037d0
[21567.999812] R10: 0000000000000000 R11: 0000000000000000 R12: ffff8b80e8b78000
[21567.999816] R13: 0000000000000000 R14: 0000000000000065 R15: 0000000000000065
[21567.999821] FS:  00007f095c3f5080(0000) GS:ffff8b8226b80000(0000) knlGS:0000000000000000
[21567.999825] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[21567.999829] CR2: 0000000000000068 CR3: 00000002e8b16000 CR4: 00000000000406e0
[21567.999833] Call Trace:
[21567.999886]  ? memcmp_node_keys+0x46/0x50 [btrfs]
[21567.999936]  replace_path.isra.42+0x5f5/0x790 [btrfs]
[21567.999987]  merge_reloc_root+0x262/0x500 [btrfs]
[21568.000036]  merge_reloc_roots+0x120/0x1a0 [btrfs]
[21568.000086]  btrfs_recover_relocation+0x3f0/0x440 [btrfs]
[21568.000130]  open_ctree+0x1923/0x1c00 [btrfs]
[21568.000169]  btrfs_mount_root+0x4d2/0x620 [btrfs]
[21568.000178]  ? cpumask_next+0x16/0x20
[21568.000184]  ? pcpu_alloc+0x1a7/0x610
[21568.000189]  mount_fs+0x3f/0x14d
[21568.000195]  vfs_kern_mount.part.37+0x54/0x110
[21568.000232]  btrfs_mount+0x14f/0x820 [btrfs]
[21568.000239]  ? pcpu_block_update_hint_alloc+0x13f/0x1d0
[21568.000245]  ? pcpu_alloc_area+0xe4/0x130
[21568.000250]  ? pcpu_next_unpop+0x37/0x50
[21568.000254]  ? cpumask_next+0x16/0x20
[21568.000259]  ? pcpu_alloc+0x1a7/0x610
[21568.000263]  ? mount_fs+0x3f/0x14d
[21568.000267]  mount_fs+0x3f/0x14d
[21568.000272]  vfs_kern_mount.part.37+0x54/0x110
[21568.000278]  do_mount+0x1ec/0xc80
[21568.000283]  ? memdup_user+0x3e/0x70
[21568.000288]  ksys_mount+0xb6/0xd0
[21568.000293]  __x64_sys_mount+0x21/0x30
[21568.000298]  do_syscall_64+0x60/0x110
[21568.000311]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[21568.000320] RIP: 0033:0x7f095c29f1ca
[21568.000329] Code: 48 8b 0d d1 ec 0b 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 9e ec 0b 00 f7 d8 64 89 01 48
[21568.000340] RSP: 002b:00007fff964e3338 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5
[21568.000349] RAX: ffffffffffffffda RBX: 000055a9ff38d640 RCX: 00007f095c29f1ca
[21568.000357] RDX: 000055a9ff38d9b0 RSI: 000055a9ff38d9d0 RDI: 000055a9ff38da80
[21568.000365] RBP: 00007f095c3c71c4 R08: 0000000000000000 R09: 00007f095c2e0400
[21568.000373] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
[21568.000381] R13: 0000000000000000 R14: 000055a9ff38da80 R15: 000055a9ff38d9b0
[21568.000390] Modules linked in: usblp fuse xt_tcpudp ip6t_rpfilter ip6t_REJECT nf_reject_ipv6 ipt_REJECT nf_reject_ipv4 xt_conntrack ebtable_nat ip6table_nat nf_nat_ipv6 ip6table_mangle ip6table_raw ip6table_security iptable_nat nf_nat_ipv4 nf_nat iptable_mangle iptable_raw iptable_security nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 ip_set nfnetlink ebtable_filter ebtables scsi_transport_iscsi ip6table_filter ip6_tables iptable_filter ip_tables x_tables bpfilter af_packet twofish_generic twofish_avx_x86_64 twofish_x86_64_3way twofish_x86_64 twofish_common serpent_avx_x86_64 serpent_sse2_x86_64 serpent_generic blowfish_generic blowfish_x86_64 blowfish_common cast5_avx_x86_64 cast5_generic cast_common des_generic algif_skcipher camellia_generic camellia_aesni_avx_x86_64 camellia_x86_64 xcbc sha512_ssse3 sha512_generic md4 algif_hash af_alg xfrm_user xfrm4_tunnel tunnel4 ipcomp xfrm_ipcomp esp4 ah4 af_key xfrm_algo w83627ehf hwmon_vid msr xfs edac_mce_amd snd_hda_codec_hdmi kvm_amd ccp
[21568.000434]  snd_hda_intel snd_usb_audio snd_hda_codec kvm uvcvideo snd_usbmidi_lib snd_hda_core snd_ctxfi snd_rawmidi snd_seq_device snd_hwdep irqbypass snd_pcm videobuf2_vmalloc videobuf2_memops videobuf2_v4l2 crct10dif_pclmul crc32_pclmul ghash_clmulni_intel videodev snd_timer aesni_intel videobuf2_common aes_x86_64 snd crypto_simd cryptd r8169 soundcore realtek wmi_bmof libphy fam15h_power k10temp button sp5100_tco pcspkr glue_helper pcc_cpufreq i2c_piix4 acpi_cpufreq hid_generic usbhid btrfs libcrc32c xor raid6_pq amdgpu ohci_pci crc32c_intel chash amd_iommu_v2 gpu_sched ata_generic i2c_algo_bit xhci_pci serio_raw ttm xhci_hcd ohci_hcd ehci_pci drm_kms_helper ehci_hcd syscopyarea sysfillrect sysimgblt fb_sys_fops pata_atiixp sr_mod usbcore drm cdrom wmi l2tp_ppp l2tp_netlink l2tp_core ip6_udp_tunnel udp_tunnel pppox ppp_generic slhc sg dm_multipath dm_mod scsi_dh_rdac scsi_dh_emc scsi_dh_alua
[21568.000561] CR2: 0000000000000068
[21568.000610] ---[ end trace 9125c38f59164b9c ]---
[21568.000665] RIP: 0010:btrfs_qgroup_trace_subtree_swap+0xb2/0x380 [btrfs]
[21568.000685] Code: 65 ba 19 00 00 00 4c 89 fe e8 ea 14 fb ff 48 3b 04 24 0f 82 70 02 00 00 48 8b 44 24 08 4c 89 f6 31 c9 ba 11 00 00 00 48 89 df <48> 8b 40 68 48 89 44 24 08 e8 c0 14 fb ff 31 c9 4c 89 f6 ba 19 00
[21568.000703] RSP: 0018:ffff9d810a203810 EFLAGS: 00010246
[21568.000720] RAX: 0000000000000000 RBX: ffff8b821f8e36d0 RCX: 0000000000000000
[21568.000734] RDX: 0000000000000011 RSI: 0000000000000065 RDI: ffff8b821f8e36d0
[21568.000749] RBP: ffff8b81d463a9d8 R08: ffff9d810a2037c8 R09: ffff9d810a2037d0
[21568.000764] R10: 0000000000000000 R11: 0000000000000000 R12: ffff8b80e8b78000
[21568.000781] R13: 0000000000000000 R14: 0000000000000065 R15: 0000000000000065
[21568.000795] FS:  00007f095c3f5080(0000) GS:ffff8b8226b80000(0000) knlGS:0000000000000000
[21568.000806] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[21568.000814] CR2: 0000000000000068 CR3: 00000002e8b16000 CR4: 00000000000406e0
Comment 1 Wenruo Qu 2019-05-13 13:19:09 UTC
This looks caused by balance recovery.

You could skip balance by skip_balance mount option, as a workaround.

I'll look into the NULL pointer dereference by reproducing a similar situation.
Comment 2 Juan Erbes 2019-05-14 03:59:30 UTC
(In reply to Wenruo Qu from comment #1)
> This looks caused by balance recovery.
> 
> You could skip balance by skip_balance mount option, as a workaround.
> 
> I'll look into the NULL pointer dereference by reproducing a similar
> situation.

Yes, it looks as a balance problem:
Yet again a new crash with the new kernel kernel-default-5.0.13-1.1.x86_64:
Result of dmesg:

[   14.443299] audit: type=1400 audit(1557776018.192:2): apparmor="STATUS" operation="profile_load" profile="unconfined" name="ping" pid=839 comm="apparmor_parser"
[   14.495028] audit: type=1400 audit(1557776018.244:3): apparmor="STATUS" operation="profile_load" profile="unconfined" name="ghostscript" pid=859 comm="apparmor_parser"
[   14.495033] audit: type=1400 audit(1557776018.244:4): apparmor="STATUS" operation="profile_load" profile="unconfined" name="ghostscript///usr/bin/basename" pid=859 comm="apparmor_parser"
[   14.495035] audit: type=1400 audit(1557776018.244:5): apparmor="STATUS" operation="profile_load" profile="unconfined" name="ghostscript///usr/bin/dirname" pid=859 comm="apparmor_parser"
[   14.495047] audit: type=1400 audit(1557776018.244:6): apparmor="STATUS" operation="profile_load" profile="unconfined" name="ghostscript///usr/bin/hpijs" pid=859 comm="apparmor_parser"
[   14.537051] audit: type=1400 audit(1557776018.288:7): apparmor="STATUS" operation="profile_load" profile="unconfined" name="nvidia_modprobe" pid=870 comm="apparmor_parser"
[   14.537056] audit: type=1400 audit(1557776018.288:8): apparmor="STATUS" operation="profile_load" profile="unconfined" name="nvidia_modprobe//kmod" pid=870 comm="apparmor_parser"
[   14.563267] audit: type=1400 audit(1557776018.312:9): apparmor="STATUS" operation="profile_load" profile="unconfined" name="klogd" pid=877 comm="apparmor_parser"
[   14.587602] audit: type=1400 audit(1557776018.336:10): apparmor="STATUS" operation="profile_load" profile="unconfined" name="syslogd" pid=884 comm="apparmor_parser"
[   14.610980] audit: type=1400 audit(1557776018.360:11): apparmor="STATUS" operation="profile_load" profile="unconfined" name="syslog-ng" pid=894 comm="apparmor_parser"
[   16.368875] w83627ehf: Found NCT6776F chip at 0x290
[   16.369454] w83627ehf w83627ehf.656: hwmon_device_register() is deprecated. Please convert the driver to use hwmon_device_register_with_info().
[   17.734816] NET: Registered protocol family 15
[   19.573330] Initializing XFRM netlink socket
[   20.181788] NET: Registered protocol family 38
[   21.620749] AVX2 or AES-NI instructions are not detected.
[   23.807686] bpfilter: Loaded bpfilter_umh pid 1486
[   24.314466] AVX2 instructions are not detected.
[   24.448616] Loading iSCSI transport class v2.0-870.
[   25.919333] NET: Registered protocol family 17
[   28.484112] RTL8211E Gigabit Ethernet r8169-500:00: attached PHY driver [RTL8211E Gigabit Ethernet] (mii_bus:phy_addr=r8169-500:00, irq=IGNORE)
[   28.695288] r8169 0000:05:00.0 enp5s0: Link is Down
[   33.337073] r8169 0000:05:00.0 enp5s0: Link is Up - 100Mbps/Full - flow control off
[   33.337090] IPv6: ADDRCONF(NETDEV_CHANGE): enp5s0: link becomes ready
[   35.256397] BTRFS info (device sdb1): balance: start -dusage=0
[   35.256535] BTRFS info (device sdb1): balance: ended with status: 0
[   35.734969] BTRFS info (device sdb1): balance: start -dusage=1
[   35.735091] BTRFS info (device sdb1): balance: ended with status: 0
[   36.042071] BTRFS info (device sdb1): balance: start -dusage=5
[   36.042195] BTRFS info (device sdb1): balance: ended with status: 0
[   36.333709] BTRFS info (device sdb1): balance: start -dusage=10
[   36.333832] BTRFS info (device sdb1): balance: ended with status: 0
[   36.676513] BTRFS info (device sdb1): balance: start -dusage=20
[   36.676722] BTRFS info (device sdb1): relocating block group 100612964352 flags data
[   39.726608] BTRFS info (device sdb1): found 1 extents
[   44.066754] BTRFS info (device sdb1): found 1 extents
[   44.350628] BTRFS info (device sdb1): balance: ended with status: 0
[   44.591644] BTRFS info (device sdb1): balance: start -dusage=30
[   44.591855] BTRFS info (device sdb1): relocating block group 88466259968 flags data
[   63.359077] BTRFS info (device sdb1): found 5829 extents
[   82.407947] BTRFS info (device sdb1): found 5829 extents
[   82.926446] BTRFS info (device sdb1): relocating block group 86120595456 flags data
[   85.421049] BTRFS info (device sdb1): found 1586 extents
[   94.004986] BTRFS info (device sdb1): found 1586 extents
[   94.276488] BTRFS info (device sdb1): balance: ended with status: 0
[   94.635608] BTRFS info (device sdb1): balance: start -dusage=40
[   94.635815] BTRFS info (device sdb1): relocating block group 87395663872 flags data
[   95.818786] BTRFS info (device sdb1): found 91 extents
[   98.423094] BTRFS info (device sdb1): found 91 extents
[   98.637107] BTRFS info (device sdb1): balance: ended with status: 0
[   98.819395] BTRFS info (device sdb1): balance: start -dusage=50
[   98.819507] BTRFS info (device sdb1): relocating block group 77530660864 flags data
[  103.560642] BTRFS info (device sdb1): found 3083 extents
[  122.527493] BTRFS info (device sdb1): found 3083 extents
[  122.760586] BTRFS info (device sdb1): balance: ended with status: 0
[  123.157468] BTRFS info (device sdb1): balance: start -musage=0 -susage=0
[  123.157568] BTRFS info (device sdb1): balance: ended with status: 0
[  123.307426] BTRFS info (device sdb1): balance: start -musage=1 -susage=1
[  123.307708] BTRFS info (device sdb1): relocating block group 98968797184 flags system|dup
[  123.524365] BTRFS info (device sdb1): balance: ended with status: 0
[  123.674046] BTRFS info (device sdb1): balance: start -musage=5 -susage=5
[  123.674321] BTRFS info (device sdb1): relocating block group 100344528896 flags system|dup
[  123.890934] BTRFS info (device sdb1): balance: ended with status: 0
[  124.040694] BTRFS info (device sdb1): balance: start -musage=10 -susage=10
[  124.040969] BTRFS info (device sdb1): relocating block group 100378083328 flags system|dup
[  124.249278] BTRFS info (device sdb1): relocating block group 100076093440 flags metadata|dup
[  130.064360] BTRFS info (device sdb1): found 1203 extents
[  130.298674] BTRFS info (device sdb1): balance: ended with status: 0
[  130.489989] BTRFS info (device sdb1): balance: start -musage=20 -susage=20
[  130.490306] BTRFS info (device sdb1): relocating block group 100411637760 flags system|dup
[  130.765251] BTRFS info (device sdb1): balance: ended with status: 0
[  130.948246] BTRFS info (device sdb1): balance: start -musage=30 -susage=30
[  130.948515] BTRFS info (device sdb1): relocating block group 100445192192 flags system|dup
[  131.215187] BTRFS info (device sdb1): balance: ended with status: 0
[  165.645938] fuse init (API version 7.28)
[29969.309319] BTRFS info (device sda1): disk space caching is enabled
[29969.309323] BTRFS info (device sda1): has skinny extents
[29969.975805] BUG: unable to handle kernel NULL pointer dereference at 0000000000000068
[29969.975815] #PF error: [normal kernel read fault]
[29969.975820] PGD 0 P4D 0 
[29969.975828] Oops: 0000 [#1] SMP NOPTI
[29969.975835] CPU: 2 PID: 3422 Comm: mount Not tainted 5.0.2-1-default #1 openSUSE Tumbleweed (unreleased)
[29969.975841] Hardware name: To Be Filled By O.E.M. To Be Filled By O.E.M./980DE3/U3S3, BIOS P2.00 09/04/2015
[29969.975920] RIP: 0010:btrfs_qgroup_trace_subtree_swap+0xb2/0x380 [btrfs]
[29969.975926] Code: 65 ba 19 00 00 00 4c 89 fe e8 ea 14 fb ff 48 3b 04 24 0f 82 70 02 00 00 48 8b 44 24 08 4c 89 f6 31 c9 ba 11 00 00 00 48 89 df <48> 8b 40 68 48 89 44 24 08 e8 c0 14 fb ff 31 c9 4c 89 f6 ba 19 00
[29969.975935] RSP: 0018:ffffb361c9e9f810 EFLAGS: 00010246
[29969.975940] RAX: 0000000000000000 RBX: ffff9ccf2d3c8c48 RCX: 0000000000000000
[29969.975948] RDX: 0000000000000011 RSI: 0000000000000065 RDI: ffff9ccf2d3c8c48
[29969.975953] RBP: ffff9ccf39ee68c0 R08: ffffb361c9e9f7c8 R09: ffffb361c9e9f7d0
[29969.975958] R10: 0000000000000000 R11: 0000000000000000 R12: ffff9ccd9eaa8000
[29969.975963] R13: 0000000000000000 R14: 0000000000000065 R15: 0000000000000065
[29969.975969] FS:  00007f121478b080(0000) GS:ffff9ccf66a80000(0000) knlGS:0000000000000000
[29969.975974] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[29969.975979] CR2: 0000000000000068 CR3: 0000000261e6e000 CR4: 00000000000406e0
[29969.975984] Call Trace:
[29969.976053]  ? memcmp_node_keys+0x46/0x50 [btrfs]
[29969.976115]  replace_path.isra.42+0x5f5/0x790 [btrfs]
[29969.976181]  merge_reloc_root+0x262/0x500 [btrfs]
[29969.976245]  merge_reloc_roots+0x120/0x1a0 [btrfs]
[29969.976309]  btrfs_recover_relocation+0x3f0/0x440 [btrfs]
[29969.976366]  open_ctree+0x1923/0x1c00 [btrfs]
[29969.976416]  btrfs_mount_root+0x4d2/0x620 [btrfs]
[29969.976426]  ? cpumask_next+0x16/0x20
[29969.976434]  ? pcpu_alloc+0x1a7/0x610
[29969.976441]  mount_fs+0x3f/0x14d
[29969.976449]  vfs_kern_mount.part.37+0x54/0x110
[29969.976497]  btrfs_mount+0x14f/0x820 [btrfs]
[29969.976506]  ? pcpu_block_update_hint_alloc+0x13f/0x1d0
[29969.976514]  ? pcpu_alloc_area+0xe4/0x130
[29969.976520]  ? pcpu_next_unpop+0x37/0x50
[29969.976526]  ? cpumask_next+0x16/0x20
[29969.976532]  ? pcpu_alloc+0x1a7/0x610
[29969.976538]  ? mount_fs+0x3f/0x14d
[29969.976542]  mount_fs+0x3f/0x14d
[29969.976549]  vfs_kern_mount.part.37+0x54/0x110
[29969.976556]  do_mount+0x1ec/0xc80
[29969.976563]  ? memdup_user+0x3e/0x70
[29969.976569]  ksys_mount+0xb6/0xd0
[29969.976576]  __x64_sys_mount+0x21/0x30
[29969.976583]  do_syscall_64+0x60/0x110
[29969.976590]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[29969.976596] RIP: 0033:0x7f12146371ca
[29969.976601] Code: 48 8b 0d d1 ec 0b 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 9e ec 0b 00 f7 d8 64 89 01 48
[29969.976610] RSP: 002b:00007ffdea7324f8 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5
[29969.976616] RAX: ffffffffffffffda RBX: 00005607df06d640 RCX: 00007f12146371ca
[29969.976621] RDX: 00005607df06d9b0 RSI: 00005607df06d9d0 RDI: 00005607df06da80
[29969.976626] RBP: 00007f121475f1c4 R08: 0000000000000000 R09: 00007f1214678400
[29969.976631] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
[29969.976644] R13: 0000000000000000 R14: 00005607df06da80 R15: 00005607df06d9b0
[29969.976655] Modules linked in: fuse xt_tcpudp ip6t_rpfilter ip6t_REJECT nf_reject_ipv6 ipt_REJECT nf_reject_ipv4 xt_conntrack ebtable_nat ip6table_nat nf_nat_ipv6 ip6table_mangle ip6table_raw ip6table_security iptable_nat nf_nat_ipv4 nf_nat iptable_mangle iptable_raw iptable_security nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 ip_set nfnetlink ebtable_filter ebtables af_packet twofish_generic twofish_avx_x86_64 twofish_x86_64_3way twofish_x86_64 twofish_common scsi_transport_iscsi serpent_avx_x86_64 ip6table_filter ip6_tables iptable_filter ip_tables serpent_sse2_x86_64 x_tables bpfilter serpent_generic blowfish_generic blowfish_x86_64 blowfish_common cast5_avx_x86_64 cast5_generic cast_common des_generic algif_skcipher camellia_generic camellia_aesni_avx_x86_64 camellia_x86_64 xcbc sha512_ssse3 sha512_generic md4 algif_hash af_alg xfrm_user xfrm4_tunnel tunnel4 ipcomp xfrm_ipcomp esp4 ah4 af_key xfrm_algo w83627ehf hwmon_vid msr edac_mce_amd kvm_amd xfs ccp kvm irqbypass crct10dif_pclmul
[29969.976712]  snd_hda_codec_hdmi crc32_pclmul snd_usb_audio snd_hda_intel ghash_clmulni_intel snd_hda_codec snd_hda_core snd_usbmidi_lib snd_rawmidi snd_hwdep snd_seq_device snd_ctxfi snd_pcm snd_timer snd aesni_intel uvcvideo videobuf2_vmalloc videobuf2_memops r8169 videobuf2_v4l2 videodev aes_x86_64 crypto_simd cryptd realtek videobuf2_common soundcore libphy sp5100_tco pcspkr wmi_bmof glue_helper button pcc_cpufreq acpi_cpufreq i2c_piix4 fam15h_power k10temp hid_generic usbhid btrfs libcrc32c xor raid6_pq amdgpu ohci_pci crc32c_intel ata_generic chash amd_iommu_v2 gpu_sched i2c_algo_bit ttm serio_raw xhci_pci xhci_hcd drm_kms_helper ehci_pci ohci_hcd ehci_hcd syscopyarea sysfillrect pata_atiixp sysimgblt fb_sys_fops usbcore sr_mod drm cdrom wmi l2tp_ppp l2tp_netlink l2tp_core ip6_udp_tunnel udp_tunnel pppox ppp_generic slhc sg dm_multipath dm_mod scsi_dh_rdac scsi_dh_emc scsi_dh_alua
[29969.976875] CR2: 0000000000000068
[29969.976887] ---[ end trace 108c4276d52edd1d ]---
[29969.976956] RIP: 0010:btrfs_qgroup_trace_subtree_swap+0xb2/0x380 [btrfs]
[29969.976968] Code: 65 ba 19 00 00 00 4c 89 fe e8 ea 14 fb ff 48 3b 04 24 0f 82 70 02 00 00 48 8b 44 24 08 4c 89 f6 31 c9 ba 11 00 00 00 48 89 df <48> 8b 40 68 48 89 44 24 08 e8 c0 14 fb ff 31 c9 4c 89 f6 ba 19 00
[29969.976982] RSP: 0018:ffffb361c9e9f810 EFLAGS: 00010246
[29969.976993] RAX: 0000000000000000 RBX: ffff9ccf2d3c8c48 RCX: 0000000000000000
[29969.977003] RDX: 0000000000000011 RSI: 0000000000000065 RDI: ffff9ccf2d3c8c48
[29969.977014] RBP: ffff9ccf39ee68c0 R08: ffffb361c9e9f7c8 R09: ffffb361c9e9f7d0
[29969.977024] R10: 0000000000000000 R11: 0000000000000000 R12: ffff9ccd9eaa8000
[29969.977034] R13: 0000000000000000 R14: 0000000000000065 R15: 0000000000000065
[29969.977046] FS:  00007f121478b080(0000) GS:ffff9ccf66a80000(0000) knlGS:0000000000000000
[29969.977057] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[29969.977107] CR2: 0000000000000068 CR3: 0000000261e6e000 CR4: 00000000000406e0
Comment 3 Wenruo Qu 2019-05-14 07:26:27 UTC
If your primary objective is to continue, you need to mount it with skip_balance, and then cancel the current running balance by "btrfs balance cancel <mount point>".

Or next time you will hit the same problem.
Comment 4 Juan Erbes 2019-05-15 00:17:05 UTC
(In reply to Wenruo Qu from comment #3)
> If your primary objective is to continue, you need to mount it with
> skip_balance, and then cancel the current running balance by "btrfs balance
> cancel <mount point>".
> 
> Or next time you will hit the same problem.

If I add a script for the init or boot of the system, the FS will never get a btrfs balance.
I mean the better way is to add a script to the rpm of the kernel installer to skip the btrfs balance for the first run of the new kernel. 

Thanks
Comment 5 Wenruo Qu 2019-05-15 00:22:41 UTC
(In reply to Juan Erbes from comment #4)
> (In reply to Wenruo Qu from comment #3)
> > If your primary objective is to continue, you need to mount it with
> > skip_balance, and then cancel the current running balance by "btrfs balance
> > cancel <mount point>".
> > 
> > Or next time you will hit the same problem.
> 
> If I add a script for the init or boot of the system, the FS will never get
> a btrfs balance.

It's just a workaround.

You can finish balance when mounted.
The recovery part is only going to restart the paused balance.
Paused one can be caused by either a crash during balance or manually paused.

> I mean the better way is to add a script to the rpm of the kernel installer
> to skip the btrfs balance for the first run of the new kernel. 

Would you please try upstream v5.1 first?
A lot of qgroup changes are merged in v5.1 and incoming v5.2-rc.

Maybe it's already fixed upstream.

Thanks.

> 
> Thanks
Comment 6 Juan Erbes 2019-05-19 14:01:43 UTC
Yesterday with the New Tumbleweed snapshot 20190516, the problem continues:

[   25.149933] RTL8211E Gigabit Ethernet r8169-500:00: attached PHY driver [RTL8211E Gigabit Ethernet] (mii_bus:phy_addr=r8169-500:00, irq=IGNORE)
[   25.350172] r8169 0000:05:00.0 enp5s0: Link is Down
[   29.686101] r8169 0000:05:00.0 enp5s0: Link is Up - 100Mbps/Full - flow control off
[   29.686117] IPv6: ADDRCONF(NETDEV_CHANGE): enp5s0: link becomes ready
[   78.138216] fuse init (API version 7.28)
[14515.134235] BTRFS info (device sda1): disk space caching is enabled
[14515.134238] BTRFS info (device sda1): has skinny extents
[14515.730000] BUG: unable to handle kernel NULL pointer dereference at 0000000000000068
[14515.730010] #PF error: [normal kernel read fault]
[14515.730015] PGD 0 P4D 0 
[14515.730022] Oops: 0000 [#1] SMP NOPTI
[14515.730030] CPU: 0 PID: 16160 Comm: mount Not tainted 5.0.2-1-default #1 openSUSE Tumbleweed (unreleased)
[14515.730036] Hardware name: To Be Filled By O.E.M. To Be Filled By O.E.M./980DE3/U3S3, BIOS P2.00 09/04/2015
[14515.730115] RIP: 0010:btrfs_qgroup_trace_subtree_swap+0xb2/0x380 [btrfs]
[14515.730122] Code: 65 ba 19 00 00 00 4c 89 fe e8 ea 14 fb ff 48 3b 04 24 0f 82 70 02 00 00 48 8b 44 24 08 4c 89 f6 31 c9 ba 11 00 00 00 48 89 df <48> 8b 40 68 48 89 44 24 08 e8 c0 14 fb ff 31 c9 4c 89 f6 ba 19 00
[14515.730131] RSP: 0018:ffffa026c7f1f810 EFLAGS: 00010246
[14515.730136] RAX: 0000000000000000 RBX: ffff892103c8c578 RCX: 0000000000000000
[14515.730141] RDX: 0000000000000011 RSI: 0000000000000065 RDI: ffff892103c8c578
[14515.730146] RBP: ffff892103c8c7a8 R08: ffffa026c7f1f7c8 R09: ffffa026c7f1f7d0
[14515.730151] R10: 0000000000000000 R11: 0000000000000000 R12: ffff892107cc2000
[14515.730156] R13: 0000000000000000 R14: 0000000000000065 R15: 0000000000000065
[14515.730162] FS:  00007fa9815dd080(0000) GS:ffff892266a00000(0000) knlGS:0000000000000000
[14515.730168] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[14515.730173] CR2: 0000000000000068 CR3: 000000041f814000 CR4: 00000000000406f0
[14515.730178] Call Trace:
[14515.730246]  ? memcmp_node_keys+0x46/0x50 [btrfs]
[14515.730310]  replace_path.isra.42+0x5f5/0x790 [btrfs]
[14515.730375]  merge_reloc_root+0x262/0x500 [btrfs]
[14515.730440]  merge_reloc_roots+0x120/0x1a0 [btrfs]
[14515.730507]  btrfs_recover_relocation+0x3f0/0x440 [btrfs]
[14515.730564]  open_ctree+0x1923/0x1c00 [btrfs]
[14515.730614]  btrfs_mount_root+0x4d2/0x620 [btrfs]
[14515.730625]  ? pcpu_chunk_refresh_hint+0x74/0xd0
[14515.730633]  ? cpumask_next+0x16/0x20
[14515.730640]  ? pcpu_alloc+0x1a7/0x610
[14515.730646]  mount_fs+0x3f/0x14d
[14515.730654]  vfs_kern_mount.part.37+0x54/0x110
[14515.730703]  btrfs_mount+0x14f/0x820 [btrfs]
[14515.730711]  ? pcpu_block_update_hint_alloc+0x13f/0x1d0
[14515.730718]  ? pcpu_cnt_pop_pages+0x40/0x50
[14515.730725]  ? pcpu_alloc_area+0xe4/0x130
[14515.730731]  ? pcpu_next_unpop+0x37/0x50
[14515.730736]  ? cpumask_next+0x16/0x20
[14515.730742]  ? pcpu_alloc+0x1a7/0x610
[14515.730748]  ? mount_fs+0x3f/0x14d
[14515.730753]  mount_fs+0x3f/0x14d
[14515.730760]  vfs_kern_mount.part.37+0x54/0x110
[14515.730767]  do_mount+0x1ec/0xc80
[14515.730773]  ? memdup_user+0x3e/0x70
[14515.730779]  ksys_mount+0xb6/0xd0
[14515.730786]  __x64_sys_mount+0x21/0x30
[14515.730793]  do_syscall_64+0x60/0x110
[14515.730800]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[14515.730815] RIP: 0033:0x7fa9814571ca
[14515.730825] Code: 48 8b 0d d1 ec 0b 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 9e ec 0b 00 f7 d8 64 89 01 48
[14515.730839] RSP: 002b:00007ffc98b5b358 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5
[14515.730851] RAX: ffffffffffffffda RBX: 000055de11d6d640 RCX: 00007fa9814571ca
[14515.730861] RDX: 000055de11d6d9b0 RSI: 000055de11d6d9d0 RDI: 000055de11d6da80
[14515.730872] RBP: 00007fa98157f1c4 R08: 0000000000000000 R09: 00007fa981498400
[14515.730882] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
[14515.730892] R13: 0000000000000000 R14: 000055de11d6da80 R15: 000055de11d6d9b0
[14515.730904] Modules linked in: fuse xt_tcpudp ip6t_rpfilter ip6t_REJECT nf_reject_ipv6 ipt_REJECT nf_reject_ipv4 xt_conntrack ebtable_nat ip6table_nat nf_nat_ipv6 ip6table_mangle ip6table_raw ip6table_security iptable_nat nf_nat_ipv4 nf_nat iptable_mangle iptable_raw iptable_security nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 ip_set nfnetlink ebtable_filter ebtables scsi_transport_iscsi af_packet ip6table_filter ip6_tables iptable_filter ip_tables x_tables bpfilter twofish_generic twofish_avx_x86_64 twofish_x86_64_3way twofish_x86_64 twofish_common serpent_avx_x86_64 serpent_sse2_x86_64 serpent_generic blowfish_generic blowfish_x86_64 blowfish_common cast5_avx_x86_64 cast5_generic cast_common des_generic algif_skcipher camellia_generic camellia_aesni_avx_x86_64 camellia_x86_64 xcbc sha512_ssse3 sha512_generic md4 algif_hash af_alg xfrm_user xfrm4_tunnel tunnel4 ipcomp xfrm_ipcomp esp4 ah4 af_key xfrm_algo w83627ehf hwmon_vid msr edac_mce_amd kvm_amd ccp kvm irqbypass crct10dif_pclmul
[14515.730959]  crc32_pclmul xfs ghash_clmulni_intel snd_hda_codec_hdmi snd_hda_intel snd_usb_audio snd_hda_codec uvcvideo snd_usbmidi_lib snd_ctxfi snd_hda_core videobuf2_vmalloc videobuf2_memops videobuf2_v4l2 snd_rawmidi snd_hwdep snd_seq_device videodev aesni_intel snd_pcm videobuf2_common aes_x86_64 snd_timer crypto_simd snd cryptd glue_helper wmi_bmof sp5100_tco r8169 pcspkr realtek k10temp fam15h_power pcc_cpufreq soundcore libphy acpi_cpufreq button i2c_piix4 hid_generic usbhid btrfs libcrc32c xor raid6_pq amdgpu ohci_pci chash amd_iommu_v2 crc32c_intel gpu_sched i2c_algo_bit ata_generic ttm serio_raw xhci_pci drm_kms_helper xhci_hcd ohci_hcd ehci_pci syscopyarea sysfillrect ehci_hcd sysimgblt fb_sys_fops pata_atiixp usbcore sr_mod drm cdrom wmi l2tp_ppp l2tp_netlink l2tp_core ip6_udp_tunnel udp_tunnel pppox ppp_generic slhc sg dm_multipath dm_mod scsi_dh_rdac scsi_dh_emc scsi_dh_alua
[14515.731120] CR2: 0000000000000068
[14515.731131] ---[ end trace ee05bbc64cf75af6 ]---
[14515.731200] RIP: 0010:btrfs_qgroup_trace_subtree_swap+0xb2/0x380 [btrfs]
[14515.731212] Code: 65 ba 19 00 00 00 4c 89 fe e8 ea 14 fb ff 48 3b 04 24 0f 82 70 02 00 00 48 8b 44 24 08 4c 89 f6 31 c9 ba 11 00 00 00 48 89 df <48> 8b 40 68 48 89 44 24 08 e8 c0 14 fb ff 31 c9 4c 89 f6 ba 19 00
[14515.731226] RSP: 0018:ffffa026c7f1f810 EFLAGS: 00010246
[14515.731237] RAX: 0000000000000000 RBX: ffff892103c8c578 RCX: 0000000000000000
[14515.731247] RDX: 0000000000000011 RSI: 0000000000000065 RDI: ffff892103c8c578
[14515.731258] RBP: ffff892103c8c7a8 R08: ffffa026c7f1f7c8 R09: ffffa026c7f1f7d0
[14515.731268] R10: 0000000000000000 R11: 0000000000000000 R12: ffff892107cc2000
[14515.731279] R13: 0000000000000000 R14: 0000000000000065 R15: 0000000000000065
[14515.731290] FS:  00007fa9815dd080(0000) GS:ffff892266a00000(0000) knlGS:0000000000000000
[14515.731301] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[14515.731311] CR2: 0000000000000068 CR3: 000000041f814000 CR4: 00000000000406f0

Tried to remount the file system:
df
S.ficheros     bloques de 1K     Usados Disponibles Uso% Montado en
devtmpfs             8156916          8     8156908   1% /dev
tmpfs                8202932      43548     8159384   1% /dev/shm
tmpfs                8202932       9848     8193084   1% /run
tmpfs                8202932          0     8202932   0% /sys/fs/cgroup
/dev/sdb1           41945088   34304060     5982868  86% /
/dev/sdb1           41945088   34304060     5982868  86% /.snapshots
/dev/sdb1           41945088   34304060     5982868  86% /srv
/dev/sdb1           41945088   34304060     5982868  86% /var
/dev/sdb1           41945088   34304060     5982868  86% /boot/grub2/x86_64-efi
/dev/sdb1           41945088   34304060     5982868  86% /boot/grub2/i386-pc
/dev/sdb1           41945088   34304060     5982868  86% /usr/local
/dev/sdb1           41945088   34304060     5982868  86% /opt
/dev/sdb1           41945088   34304060     5982868  86% /root
/dev/sdb1           41945088   34304060     5982868  86% /tmp
/dev/sdb2         1910635004 1260914936   649720068  66% /home
tmpfs                1640584         20     1640564   1% /run/user/1000

 # btrfs balance cancel /dev/sdb1
ERROR: not a btrfs filesystem: /dev/sdb1

umount /dev/sdb1
umount: /: el destino está ocupado.
Comment 7 Wenruo Qu 2019-05-21 09:30:56 UTC
Confirmed.

The problem is, in relocation recovery routine, we call btrfs_qgroup_trace_subtree_swap() with rc->block_group.

However in recovery routine, we don't fill rc->block_group as we don't have enough info to know which block group we're relocating.

It should also cause problem for latest upstream.

Fix under way.
Comment 8 Juan Erbes 2019-05-22 00:32:23 UTC
Output ps -aux with update kernel-5.1.3-1-default

root     16280  0.0  0.0  14040  6212 pts/0    S    21:03   0:00 /usr/bin/systemd-inhibit --what=sleep:shutdown:idle --who=zypp --mode=block --why=Zypp commit running. /usr/bin/cat
root     16281  0.0  0.0   6980  3492 pts/0    S+   21:03   0:00 /bin/bash /usr/lib/zypp/plugins/commit/btrfs-defrag-plugin.sh
root     16282  0.0  0.0   5380   836 pts/0    S    21:03   0:00 /usr/bin/cat
root     16288  0.0  0.0  19840 13440 pts/0    S+   21:03   0:00 /usr/bin/python3 /usr/lib/zypp/plugins/commit/snapper.py
root     16290  0.0  0.0  87120  7216 ?        Sl   21:03   0:00 /usr/sbin/snapperd
root     16813  0.0  0.0      0     0 ?        I    19:20   0:05 [kworker/1:1-events]
root     16856  0.0  0.0      0     0 ?        I    19:20   0:00 [kworker/3:1-events]
root     16868  0.0  0.0      0     0 ?        I    19:20   0:05 [kworker/4:0-events]
root     17164  0.1  0.0      0     0 ?        I    19:22   0:08 [kworker/2:5-events]
jerbes   17412  0.0  0.0  66636  5204 ?        S    19:27   0:00 /usr/lib64/libexec/kf5/kdesud
root     17469  0.0  0.0   7868  2392 ?        S    19:27   0:00 dbus-launch --autolaunch 23b48a893c0c444a91d6c360f7caac24 --binary-syntax --close-stderr
root     17470  0.0  0.0   7120  2488 ?        Ss   19:27   0:00 /usr/bin/dbus-daemon --syslog-only --fork --print-pid 5 --print-address 7 --session
root     17705  0.0  0.0      0     0 ?        I    21:11   0:00 [kworker/6:0-xfs-cil/sdb2]
root     17718  0.0  0.0      0     0 ?        I    21:11   0:00 [kworker/u16:0-btrfs-endio-write]
root     17737  0.1  0.0      0     0 ?        I    21:12   0:00 [kworker/u16:2-btrfs-endio-write]
root     17865  0.0  0.0      0     0 ?        I    21:15   0:00 [kworker/5:1-events]
root     17919  0.0  0.0      0     0 ?        I    21:16   0:00 [kworker/6:1-events]
root     18021  0.2  0.0      0     0 ?        I    21:19   0:00 [kworker/u16:1-btrfs-endio-write]
root     18028  0.3  0.0      0     0 ?        I    21:19   0:00 [kworker/u16:4-btrfs-endio-write]
root     18029  0.5  0.0      0     0 ?        I    21:19   0:00 [kworker/u16:5-btrfs-endio-write]
root     18030  0.3  0.0      0     0 ?        I    21:19   0:00 [kworker/u16:7-btrfs-submit]
root     18031  0.3  0.0      0     0 ?        I    21:19   0:00 [kworker/u16:8-events_unbound]
root     18032  0.1  0.0      0     0 ?        I    21:19   0:00 [kworker/u16:9-btrfs-worker]
root     18227 16.6  0.1  22012 19280 pts/0    S+   21:19   0:09 rpm --root / --dbpath /var/lib/rpm -i --percent --noglob --force --nodeps -- /var/cache/zypp/packages/repo-oss/x86_64/kernel-default-5.1.3-1.2.x8
root     18237  0.2  0.0      0     0 ?        I    21:20   0:00 [kworker/u16:10-btrfs-endio-write]
root     18238  0.0  0.0      0     0 ?        I    21:20   0:00 [kworker/u16:11-btrfs-endio-write]
root     18239  0.4  0.0      0     0 ?        I    21:20   0:00 [kworker/u16:12-events_unbound]
root     18240  0.2  0.0      0     0 ?        I    21:20   0:00 [kworker/u16:13-events_unbound]
root     18252  0.0  0.0      0     0 ?        I    21:20   0:00 [kworker/u16:14-btrfs-worker]
root     18253  0.0  0.0      0     0 ?        I    21:20   0:00 [kworker/u16:15-btrfs-worker]
root     18254  0.0  0.0   3920  2904 pts/0    S+   21:20   0:00 /bin/sh /var/tmp/rpm-tmp.fMYG52 4
root     18260  0.0  0.0   4316  3396 pts/0    S+   21:20   0:00 /bin/bash -hB /usr/lib/module-init-tools/weak-modules2 --add-kernel 5.1.3-1-default
root     18271  0.0  0.0   4316  2316 pts/0    S+   21:20   0:00 /bin/bash -hB /usr/lib/module-init-tools/weak-modules2 --add-kernel 5.1.3-1-default
jerbes   18275  2.6  0.6 1269808 111792 ?      Rl   21:20   0:01 /usr/bin/konsole
jerbes   18338  0.0  0.0   9436  6328 pts/3    Ss   21:20   0:00 /bin/bash
root     18353  0.0  0.0   4052  3284 pts/0    S+   21:20   0:00 /bin/bash --norc /sbin/mkinitrd -k /boot/vmlinuz-5.1.3-1-default -i /boot/initrd-5.1.3-1-default
root     18358  4.0  0.0  11448  5884 pts/0    S+   21:20   0:01 /bin/bash --norc /usr/bin/dracut --logfile /var/log/YaST2/mkinitrd.log --force /boot/initrd-5.1.3-1-default 5.1.3-1-default

Output dmesg:

[ 9989.777686] BTRFS info (device sda1): disk space caching is enabled
[ 9989.777689] BTRFS info (device sda1): has skinny extents
[ 9990.385542] BUG: unable to handle kernel NULL pointer dereference at 0000000000000068
[ 9990.385553] #PF error: [normal kernel read fault]
[ 9990.385558] PGD 0 P4D 0 
[ 9990.385565] Oops: 0000 [#1] SMP NOPTI
[ 9990.385573] CPU: 2 PID: 6124 Comm: mount Not tainted 5.0.2-1-default #1 openSUSE Tumbleweed (unreleased)
[ 9990.385578] Hardware name: To Be Filled By O.E.M. To Be Filled By O.E.M./980DE3/U3S3, BIOS P2.00 09/04/2015
[ 9990.385657] RIP: 0010:btrfs_qgroup_trace_subtree_swap+0xb2/0x380 [btrfs]
[ 9990.385664] Code: 65 ba 19 00 00 00 4c 89 fe e8 ea 14 fb ff 48 3b 04 24 0f 82 70 02 00 00 48 8b 44 24 08 4c 89 f6 31 c9 ba 11 00 00 00 48 89 df <48> 8b 40 68 48 89 44 24 08 e8 c0 14 fb ff 31 c9 4c 89 f6 ba 19 00
[ 9990.385673] RSP: 0018:ffffb46a49993810 EFLAGS: 00010246
[ 9990.385678] RAX: 0000000000000000 RBX: ffff9ee0f94cf690 RCX: 0000000000000000
[ 9990.385683] RDX: 0000000000000011 RSI: 0000000000000065 RDI: ffff9ee0f94cf690
[ 9990.385688] RBP: ffff9ee0eb2da9d8 R08: ffffb46a499937c8 R09: ffffb46a499937d0
[ 9990.385693] R10: 0000000000000000 R11: 0000000000000000 R12: ffff9ee0dd4f8000
[ 9990.385698] R13: 0000000000000000 R14: 0000000000000065 R15: 0000000000000065
[ 9990.385705] FS:  00007fc7b8cc6080(0000) GS:ffff9ee266a80000(0000) knlGS:0000000000000000
[ 9990.385710] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 9990.385715] CR2: 0000000000000068 CR3: 000000029dc8e000 CR4: 00000000000406e0
[ 9990.385720] Call Trace:
[ 9990.385788]  ? memcmp_node_keys+0x46/0x50 [btrfs]
[ 9990.385852]  replace_path.isra.42+0x5f5/0x790 [btrfs]
[ 9990.385917]  merge_reloc_root+0x262/0x500 [btrfs]
[ 9990.385982]  merge_reloc_roots+0x120/0x1a0 [btrfs]
[ 9990.386050]  btrfs_recover_relocation+0x3f0/0x440 [btrfs]
[ 9990.386107]  open_ctree+0x1923/0x1c00 [btrfs]
[ 9990.386158]  btrfs_mount_root+0x4d2/0x620 [btrfs]
[ 9990.386169]  ? cpumask_next+0x16/0x20
[ 9990.386176]  ? pcpu_alloc+0x1a7/0x610
[ 9990.386183]  mount_fs+0x3f/0x14d
[ 9990.386191]  vfs_kern_mount.part.37+0x54/0x110
[ 9990.386240]  btrfs_mount+0x14f/0x820 [btrfs]
[ 9990.386249]  ? pcpu_block_update_hint_alloc+0x13f/0x1d0
[ 9990.386256]  ? pcpu_alloc_area+0xe4/0x130
[ 9990.386263]  ? pcpu_next_unpop+0x37/0x50
[ 9990.386268]  ? cpumask_next+0x16/0x20
[ 9990.386274]  ? pcpu_alloc+0x1a7/0x610
[ 9990.386280]  ? mount_fs+0x3f/0x14d
[ 9990.386285]  mount_fs+0x3f/0x14d
[ 9990.386291]  vfs_kern_mount.part.37+0x54/0x110
[ 9990.386299]  do_mount+0x1ec/0xc80
[ 9990.386305]  ? memdup_user+0x3e/0x70
[ 9990.386311]  ksys_mount+0xb6/0xd0
[ 9990.386318]  __x64_sys_mount+0x21/0x30
[ 9990.386325]  do_syscall_64+0x60/0x110
[ 9990.386332]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[ 9990.386338] RIP: 0033:0x7fc7b8b3f1ca
[ 9990.386343] Code: 48 8b 0d d1 ec 0b 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 9e ec 0b 00 f7 d8 64 89 01 48
[ 9990.386352] RSP: 002b:00007fff454e3868 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5
[ 9990.386359] RAX: ffffffffffffffda RBX: 000055c6e5153640 RCX: 00007fc7b8b3f1ca
[ 9990.386363] RDX: 000055c6e51539b0 RSI: 000055c6e51539d0 RDI: 000055c6e5153a80
[ 9990.386368] RBP: 00007fc7b8c671c4 R08: 0000000000000000 R09: 00007fc7b8b80400
[ 9990.386373] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
[ 9990.386386] R13: 0000000000000000 R14: 000055c6e5153a80 R15: 000055c6e51539b0
[ 9990.386398] Modules linked in: snd_hda_codec_hdmi snd_hda_intel snd_hda_codec snd_hda_core snd_hwdep joydev fuse xt_tcpudp ip6t_rpfilter ip6t_REJECT nf_reject_ipv6 ipt_REJECT nf_reject_ipv4 xt_conntrack ebtable_nat ip6table_nat nf_nat_ipv6 ip6table_mangle ip6table_raw ip6table_security iptable_nat nf_nat_ipv4 nf_nat iptable_mangle iptable_raw iptable_security nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 ip_set nfnetlink ebtable_filter ebtables scsi_transport_iscsi ip6table_filter ip6_tables iptable_filter ip_tables x_tables bpfilter af_packet twofish_generic twofish_avx_x86_64 twofish_x86_64_3way twofish_x86_64 twofish_common serpent_avx_x86_64 serpent_sse2_x86_64 serpent_generic blowfish_generic blowfish_x86_64 blowfish_common cast5_avx_x86_64 cast5_generic cast_common des_generic algif_skcipher camellia_generic camellia_aesni_avx_x86_64 camellia_x86_64 xcbc sha512_ssse3 sha512_generic md4 algif_hash af_alg xfrm_user xfrm4_tunnel tunnel4 ipcomp xfrm_ipcomp esp4 ah4 af_key xfrm_algo msr
[ 9990.386452]  w83627ehf hwmon_vid xfs edac_mce_amd kvm_amd ccp kvm uvcvideo irqbypass snd_ctxfi videobuf2_vmalloc videobuf2_memops videobuf2_v4l2 snd_pcm videodev crct10dif_pclmul crc32_pclmul ghash_clmulni_intel snd_timer videobuf2_common aesni_intel snd aes_x86_64 crypto_simd cryptd glue_helper pcspkr soundcore sp5100_tco k10temp r8169 button pcc_cpufreq realtek libphy acpi_cpufreq fam15h_power i2c_piix4 wmi_bmof hid_generic usbhid btrfs libcrc32c xor raid6_pq amdgpu ohci_pci sr_mod cdrom crc32c_intel chash amd_iommu_v2 gpu_sched i2c_algo_bit ttm xhci_pci serio_raw drm_kms_helper xhci_hcd ehci_pci ohci_hcd ehci_hcd syscopyarea sysfillrect sysimgblt ata_generic fb_sys_fops pata_atiixp usbcore drm wmi l2tp_ppp l2tp_netlink l2tp_core ip6_udp_tunnel udp_tunnel pppox ppp_generic slhc sg dm_multipath dm_mod scsi_dh_rdac scsi_dh_emc scsi_dh_alua [last unloaded: snd_hda_core]
[ 9990.386613] CR2: 0000000000000068
[ 9990.386624] ---[ end trace 13577d0393e8efd0 ]---
[ 9990.386693] RIP: 0010:btrfs_qgroup_trace_subtree_swap+0xb2/0x380 [btrfs]
[ 9990.386705] Code: 65 ba 19 00 00 00 4c 89 fe e8 ea 14 fb ff 48 3b 04 24 0f 82 70 02 00 00 48 8b 44 24 08 4c 89 f6 31 c9 ba 11 00 00 00 48 89 df <48> 8b 40 68 48 89 44 24 08 e8 c0 14 fb ff 31 c9 4c 89 f6 ba 19 00
[ 9990.386719] RSP: 0018:ffffb46a49993810 EFLAGS: 00010246
[ 9990.386730] RAX: 0000000000000000 RBX: ffff9ee0f94cf690 RCX: 0000000000000000
[ 9990.386740] RDX: 0000000000000011 RSI: 0000000000000065 RDI: ffff9ee0f94cf690
[ 9990.386750] RBP: ffff9ee0eb2da9d8 R08: ffffb46a499937c8 R09: ffffb46a499937d0
[ 9990.386761] R10: 0000000000000000 R11: 0000000000000000 R12: ffff9ee0dd4f8000
[ 9990.386771] R13: 0000000000000000 R14: 0000000000000065 R15: 0000000000000065
[ 9990.386783] FS:  00007fc7b8cc6080(0000) GS:ffff9ee266a80000(0000) knlGS:0000000000000000
[ 9990.386794] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 9990.386804] CR2: 0000000000000068 CR3: 000000029dc8e000 CR4: 00000000000406e0
Comment 9 Wenruo Qu 2019-05-22 00:44:21 UTC
Upstream fix sent to the mail list.

Will be backported to SLE when upstream fix get merged.
Also stable kernel will get backport.
Comment 10 Juan Erbes 2019-05-22 01:15:39 UTC
The problem was with the kernel 5.0.2, and when I runned the Yast boot loader configurator, it crashed.
I booted the system from the other hard disk (sda1) with Leap 15.1 beta, runned the Yast boot loader configurator (configured the default section Tumbleweed), and now I can boot with the latest kernel:
/boot> ls
boot.readme             grub2                   initrd-5.1.3-1-default      sysctl.conf-5.0.2-1-default  System.map-5.1.2-1-default  vmlinux-5.1.3-1-default.gz  vmlinuz-5.1.3-1-default
config-5.0.2-1-default  initrd                  symvers-5.0.2-1-default.gz  sysctl.conf-5.1.2-1-default  System.map-5.1.3-1-default  vmlinuz
config-5.1.2-1-default  initrd-5.0.2-1-default  symvers-5.1.2-1-default.gz  sysctl.conf-5.1.3-1-default  vmlinux-5.0.2-1-default.gz  vmlinuz-5.0.2-1-default
config-5.1.3-1-default  initrd-5.1.2-1-default  symvers-5.1.3-1-default.gz  System.map-5.0.2-1-default   vmlinux-5.1.2-1-default.gz  vmlinuz-5.1.2-1-default
/boot> uname -r
5.1.3-1-default

If I I run the Yast boot loader configurator, it don't crashed anymore, but I got with dmesg:

[  240.695285] BTRFS info (device sda1): disk space caching is enabled
[  240.695287] BTRFS info (device sda1): has skinny extents
[  242.100630] BTRFS info (device sda1): disk space caching is enabled
[  242.100633] BTRFS info (device sda1): has skinny extents
[  252.069389] BTRFS info (device sda1): disk space caching is enabled
[  252.069391] BTRFS info (device sda1): has skinny extents
[  252.086744] BTRFS info (device sda1): checking UUID tree
[  252.703623] BTRFS info (device sda1): disk space caching is enabled
[  252.703627] BTRFS info (device sda1): has skinny extents
[  253.056207] BTRFS info (device sda1): disk space caching is enabled
[  253.056210] BTRFS info (device sda1): has skinny extents
[  253.315516] BTRFS info (device sda1): disk space caching is enabled
[  253.315519] BTRFS info (device sda1): has skinny extents
[  253.485545] BTRFS info (device sda1): disk space caching is enabled
[  253.485548] BTRFS info (device sda1): has skinny extents
[  253.654917] BTRFS info (device sda1): disk space caching is enabled
[  253.654920] BTRFS info (device sda1): has skinny extents
[  253.816208] BTRFS info (device sda1): disk space caching is enabled
[  253.816211] BTRFS info (device sda1): has skinny extents
[  254.000944] BTRFS info (device sda1): disk space caching is enabled
[  254.000947] BTRFS info (device sda1): has skinny extents
[  254.160208] BTRFS info (device sda1): disk space caching is enabled
[  254.160210] BTRFS info (device sda1): has skinny extents
[  254.333554] BTRFS info (device sda1): disk space caching is enabled
[  254.333557] BTRFS info (device sda1): has skinny extents
[  254.488683] BTRFS info (device sda1): disk space caching is enabled
[  254.488686] BTRFS info (device sda1): has skinny extents
[  254.659468] BTRFS info (device sda1): disk space caching is enabled
[  254.659471] BTRFS info (device sda1): has skinny extents
[  256.645099] BTRFS info (device sda1): disk space caching is enabled
[  256.645102] BTRFS info (device sda1): has skinny extents
[  652.244815] BTRFS info (device sda1): disk space caching is enabled
[  652.244818] BTRFS info (device sda1): has skinny extents
[  653.598455] BTRFS info (device sda1): disk space caching is enabled
[  653.598459] BTRFS info (device sda1): has skinny extents
[  661.676994] BTRFS info (device sda1): disk space caching is enabled
[  661.676998] BTRFS info (device sda1): has skinny extents
[  661.881929] BTRFS info (device sda1): disk space caching is enabled
[  661.881933] BTRFS info (device sda1): has skinny extents
[  662.153369] BTRFS info (device sda1): disk space caching is enabled
[  662.153372] BTRFS info (device sda1): has skinny extents
[  662.367141] BTRFS info (device sda1): disk space caching is enabled
[  662.367145] BTRFS info (device sda1): has skinny extents
[  662.554114] BTRFS info (device sda1): disk space caching is enabled
[  662.554117] BTRFS info (device sda1): has skinny extents
[  662.736891] BTRFS info (device sda1): disk space caching is enabled
[  662.736894] BTRFS info (device sda1): has skinny extents
[  662.897850] BTRFS info (device sda1): disk space caching is enabled
[  662.897852] BTRFS info (device sda1): has skinny extents
[  663.056486] BTRFS info (device sda1): disk space caching is enabled
[  663.056488] BTRFS info (device sda1): has skinny extents
[  663.264055] BTRFS info (device sda1): disk space caching is enabled
[  663.264057] BTRFS info (device sda1): has skinny extents
[  663.461674] BTRFS info (device sda1): disk space caching is enabled
[  663.461677] BTRFS info (device sda1): has skinny extents
[  663.613796] BTRFS info (device sda1): disk space caching is enabled
[  663.613799] BTRFS info (device sda1): has skinny extents
[  663.777314] BTRFS info (device sda1): disk space caching is enabled
[  663.777317] BTRFS info (device sda1): has skinny extents
[  665.574923] BTRFS info (device sda1): disk space caching is enabled
[  665.574927] BTRFS info (device sda1): has skinny extents

But it's from the other hard disk:
df
S.ficheros     bloques de 1K     Usados Disponibles Uso% Montado en
devtmpfs             8156864          8     8156856   1% /dev
tmpfs                8202948      84088     8118860   2% /dev/shm
tmpfs                8202948       9832     8193116   1% /run
tmpfs                8202948          0     8202948   0% /sys/fs/cgroup
/dev/sdb1           41945088   32778144     7852048  81% /
/dev/sdb1           41945088   32778144     7852048  81% /.snapshots
/dev/sdb1           41945088   32778144     7852048  81% /boot/grub2/x86_64-efi
/dev/sdb1           41945088   32778144     7852048  81% /usr/local
/dev/sdb1           41945088   32778144     7852048  81% /srv
/dev/sdb1           41945088   32778144     7852048  81% /tmp
/dev/sdb1           41945088   32778144     7852048  81% /var
/dev/sdb1           41945088   32778144     7852048  81% /opt
/dev/sdb1           41945088   32778144     7852048  81% /boot/grub2/i386-pc
/dev/sdb1           41945088   32778144     7852048  81% /root
/dev/sdb2         1910635004 1260923168   649711836  66% /home
tmpfs                1640588         16     1640572   1% /run/user/1000
Comment 24 Swamp Workflow Management 2019-06-17 18:07:03 UTC
This is an autogenerated message for OBS integration:
This bug (1134806) was mentioned in
https://build.opensuse.org/request/show/710395 15.1 / kernel-source
https://build.opensuse.org/request/show/710403 15.0 / kernel-source
https://build.opensuse.org/request/show/710405 42.3 / kernel-source
Comment 25 Swamp Workflow Management 2019-06-17 22:25:05 UTC
SUSE-SU-2019:1529-1: An update that solves 14 vulnerabilities and has 130 fixes is now available.

Category: security (important)
Bug References: 1012382,1050242,1051510,1053043,1055186,1056787,1058115,1063638,1064802,1065600,1065729,1066129,1068546,1071995,1075020,1082387,1083647,1085535,1099658,1103992,1104353,1104427,1106011,1106284,1108193,1108838,1108937,1110946,1111696,1112063,1113722,1114427,1115688,1117158,1117561,1118139,1119843,1120091,1120423,1120566,1120843,1120902,1122776,1123454,1123663,1124503,1124839,1126356,1127616,1128052,1128904,1128979,1129138,1129273,1129497,1129693,1129770,1130579,1130699,1130972,1131326,1131451,1131488,1131565,1131673,1132044,1133176,1133188,1133190,1133320,1133612,1133616,1134160,1134162,1134199,1134200,1134201,1134202,1134203,1134204,1134205,1134354,1134393,1134459,1134460,1134461,1134537,1134597,1134651,1134671,1134760,1134806,1134810,1134813,1134848,1134936,1135006,1135007,1135008,1135056,1135100,1135120,1135278,1135281,1135309,1135312,1135314,1135315,1135316,1135320,1135323,1135330,1135492,1135542,1135556,1135603,1135642,1135661,1135758,1136206,1136424,1136428,1136430,1136432,1136434,1136435,1136438,1136439,1136477,1136478,1136573,1136586,1136881,1136935,1136990,1137151,1137152,1137153,1137162,1137372,1137444,1137586,1137739,1137752
CVE References: CVE-2018-7191,CVE-2019-10124,CVE-2019-11085,CVE-2019-11477,CVE-2019-11478,CVE-2019-11479,CVE-2019-11486,CVE-2019-11487,CVE-2019-11815,CVE-2019-11833,CVE-2019-11884,CVE-2019-12382,CVE-2019-3846,CVE-2019-5489
Sources used:
SUSE Linux Enterprise Module for Live Patching 15 (src):    kernel-default-4.12.14-150.22.1, kernel-livepatch-SLE15_Update_11-1-1.5.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 26 Swamp Workflow Management 2019-06-17 22:44:10 UTC
SUSE-SU-2019:1530-1: An update that solves 14 vulnerabilities and has 132 fixes is now available.

Category: security (important)
Bug References: 1012382,1050242,1051510,1053043,1056787,1058115,1063638,1064802,1065600,1065729,1066129,1068546,1071995,1075020,1082387,1083647,1085535,1099658,1103992,1104353,1104427,1106011,1106284,1108838,1110946,1111696,1112063,1113722,1114427,1114893,1115688,1117158,1117561,1118139,1119843,1120091,1120423,1120566,1120843,1120902,1122776,1123454,1123663,1124503,1124839,1126356,1127616,1128052,1128904,1128905,1128979,1129138,1129497,1129693,1129770,1129848,1129857,1130409,1130699,1130972,1131451,1131488,1131565,1131673,1132044,1132894,1133176,1133188,1133190,1133320,1133612,1133616,1134160,1134162,1134199,1134200,1134201,1134202,1134203,1134204,1134205,1134354,1134393,1134459,1134460,1134461,1134537,1134591,1134597,1134607,1134651,1134671,1134760,1134806,1134810,1134813,1134848,1134936,1135006,1135007,1135008,1135056,1135100,1135120,1135278,1135281,1135309,1135312,1135314,1135315,1135316,1135320,1135323,1135330,1135492,1135542,1135556,1135603,1135642,1135661,1135758,1136206,1136424,1136428,1136430,1136432,1136434,1136435,1136438,1136439,1136477,1136478,1136573,1136586,1136881,1136935,1136990,1137151,1137152,1137153,1137162,1137372,1137444,1137586,1137739,1137752
CVE References: CVE-2018-7191,CVE-2019-10124,CVE-2019-11085,CVE-2019-11477,CVE-2019-11478,CVE-2019-11479,CVE-2019-11486,CVE-2019-11487,CVE-2019-11815,CVE-2019-11833,CVE-2019-11884,CVE-2019-12382,CVE-2019-3846,CVE-2019-5489
Sources used:
SUSE Linux Enterprise Workstation Extension 12-SP4 (src):    kernel-default-4.12.14-95.19.1
SUSE Linux Enterprise Software Development Kit 12-SP4 (src):    kernel-docs-4.12.14-95.19.1, kernel-obs-build-4.12.14-95.19.1
SUSE Linux Enterprise Server 12-SP4 (src):    kernel-default-4.12.14-95.19.1, kernel-source-4.12.14-95.19.1, kernel-syms-4.12.14-95.19.1
SUSE Linux Enterprise High Availability 12-SP4 (src):    kernel-default-4.12.14-95.19.1
SUSE Linux Enterprise Desktop 12-SP4 (src):    kernel-default-4.12.14-95.19.1, kernel-source-4.12.14-95.19.1, kernel-syms-4.12.14-95.19.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 27 Swamp Workflow Management 2019-06-17 23:03:31 UTC
SUSE-SU-2019:1529-1: An update that solves 14 vulnerabilities and has 130 fixes is now available.

Category: security (important)
Bug References: 1012382,1050242,1051510,1053043,1055186,1056787,1058115,1063638,1064802,1065600,1065729,1066129,1068546,1071995,1075020,1082387,1083647,1085535,1099658,1103992,1104353,1104427,1106011,1106284,1108193,1108838,1108937,1110946,1111696,1112063,1113722,1114427,1115688,1117158,1117561,1118139,1119843,1120091,1120423,1120566,1120843,1120902,1122776,1123454,1123663,1124503,1124839,1126356,1127616,1128052,1128904,1128979,1129138,1129273,1129497,1129693,1129770,1130579,1130699,1130972,1131326,1131451,1131488,1131565,1131673,1132044,1133176,1133188,1133190,1133320,1133612,1133616,1134160,1134162,1134199,1134200,1134201,1134202,1134203,1134204,1134205,1134354,1134393,1134459,1134460,1134461,1134537,1134597,1134651,1134671,1134760,1134806,1134810,1134813,1134848,1134936,1135006,1135007,1135008,1135056,1135100,1135120,1135278,1135281,1135309,1135312,1135314,1135315,1135316,1135320,1135323,1135330,1135492,1135542,1135556,1135603,1135642,1135661,1135758,1136206,1136424,1136428,1136430,1136432,1136434,1136435,1136438,1136439,1136477,1136478,1136573,1136586,1136881,1136935,1136990,1137151,1137152,1137153,1137162,1137372,1137444,1137586,1137739,1137752
CVE References: CVE-2018-7191,CVE-2019-10124,CVE-2019-11085,CVE-2019-11477,CVE-2019-11478,CVE-2019-11479,CVE-2019-11486,CVE-2019-11487,CVE-2019-11815,CVE-2019-11833,CVE-2019-11884,CVE-2019-12382,CVE-2019-3846,CVE-2019-5489
Sources used:
SUSE Linux Enterprise Workstation Extension 15 (src):    kernel-default-4.12.14-150.22.1
SUSE Linux Enterprise Module for Open Buildservice Development Tools 15 (src):    kernel-default-4.12.14-150.22.1, kernel-docs-4.12.14-150.22.1, kernel-obs-qa-4.12.14-150.22.1
SUSE Linux Enterprise Module for Live Patching 15 (src):    kernel-default-4.12.14-150.22.1, kernel-livepatch-SLE15_Update_11-1-1.5.1
SUSE Linux Enterprise Module for Legacy Software 15 (src):    kernel-default-4.12.14-150.22.1
SUSE Linux Enterprise Module for Development Tools 15 (src):    kernel-docs-4.12.14-150.22.1, kernel-obs-build-4.12.14-150.22.1, kernel-source-4.12.14-150.22.1, kernel-syms-4.12.14-150.22.1, kernel-vanilla-4.12.14-150.22.1
SUSE Linux Enterprise Module for Basesystem 15 (src):    kernel-default-4.12.14-150.22.1, kernel-source-4.12.14-150.22.1, kernel-zfcpdump-4.12.14-150.22.1
SUSE Linux Enterprise High Availability 15 (src):    kernel-default-4.12.14-150.22.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 28 Swamp Workflow Management 2019-06-17 23:22:38 UTC
SUSE-SU-2019:1530-1: An update that solves 14 vulnerabilities and has 132 fixes is now available.

Category: security (important)
Bug References: 1012382,1050242,1051510,1053043,1056787,1058115,1063638,1064802,1065600,1065729,1066129,1068546,1071995,1075020,1082387,1083647,1085535,1099658,1103992,1104353,1104427,1106011,1106284,1108838,1110946,1111696,1112063,1113722,1114427,1114893,1115688,1117158,1117561,1118139,1119843,1120091,1120423,1120566,1120843,1120902,1122776,1123454,1123663,1124503,1124839,1126356,1127616,1128052,1128904,1128905,1128979,1129138,1129497,1129693,1129770,1129848,1129857,1130409,1130699,1130972,1131451,1131488,1131565,1131673,1132044,1132894,1133176,1133188,1133190,1133320,1133612,1133616,1134160,1134162,1134199,1134200,1134201,1134202,1134203,1134204,1134205,1134354,1134393,1134459,1134460,1134461,1134537,1134591,1134597,1134607,1134651,1134671,1134760,1134806,1134810,1134813,1134848,1134936,1135006,1135007,1135008,1135056,1135100,1135120,1135278,1135281,1135309,1135312,1135314,1135315,1135316,1135320,1135323,1135330,1135492,1135542,1135556,1135603,1135642,1135661,1135758,1136206,1136424,1136428,1136430,1136432,1136434,1136435,1136438,1136439,1136477,1136478,1136573,1136586,1136881,1136935,1136990,1137151,1137152,1137153,1137162,1137372,1137444,1137586,1137739,1137752
CVE References: CVE-2018-7191,CVE-2019-10124,CVE-2019-11085,CVE-2019-11477,CVE-2019-11478,CVE-2019-11479,CVE-2019-11486,CVE-2019-11487,CVE-2019-11815,CVE-2019-11833,CVE-2019-11884,CVE-2019-12382,CVE-2019-3846,CVE-2019-5489
Sources used:
SUSE Linux Enterprise Workstation Extension 12-SP4 (src):    kernel-default-4.12.14-95.19.1
SUSE Linux Enterprise Software Development Kit 12-SP4 (src):    kernel-docs-4.12.14-95.19.1, kernel-obs-build-4.12.14-95.19.1
SUSE Linux Enterprise Server 12-SP4 (src):    kernel-default-4.12.14-95.19.1, kernel-source-4.12.14-95.19.1, kernel-syms-4.12.14-95.19.1
SUSE Linux Enterprise Live Patching 12-SP4 (src):    kgraft-patch-SLE12-SP4_Update_5-1-6.3.1
SUSE Linux Enterprise High Availability 12-SP4 (src):    kernel-default-4.12.14-95.19.1
SUSE Linux Enterprise Desktop 12-SP4 (src):    kernel-default-4.12.14-95.19.1, kernel-source-4.12.14-95.19.1, kernel-syms-4.12.14-95.19.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 29 Swamp Workflow Management 2019-06-17 23:37:25 UTC
SUSE-SU-2019:1532-1: An update that solves 13 vulnerabilities and has 73 fixes is now available.

Category: security (important)
Bug References: 1005778,1005780,1005781,1012382,1019695,1019696,1022604,1063638,1065600,1085535,1085539,1090888,1099658,1100132,1106110,1106284,1106929,1108293,1108838,1110785,1110946,1112063,1112178,1116803,1117562,1119086,1120642,1120843,1120902,1122776,1126040,1126356,1128052,1129138,1129770,1130972,1131107,1131488,1131565,1132212,1132472,1133188,1133874,1134160,1134162,1134338,1134537,1134564,1134565,1134566,1134651,1134760,1134806,1134813,1134848,1135013,1135014,1135015,1135100,1135120,1135281,1135603,1135642,1135661,1135878,1136424,1136438,1136448,1136449,1136451,1136452,1136455,1136458,1136539,1136573,1136575,1136586,1136590,1136623,1136810,1136935,1136990,1137142,1137162,1137586,843419
CVE References: CVE-2018-17972,CVE-2018-7191,CVE-2019-11190,CVE-2019-11477,CVE-2019-11478,CVE-2019-11479,CVE-2019-11486,CVE-2019-11815,CVE-2019-11833,CVE-2019-11884,CVE-2019-12382,CVE-2019-3846,CVE-2019-5489
Sources used:
SUSE Linux Enterprise Live Patching 12-SP3 (src):    kgraft-patch-SLE12-SP3_Update_26-1-4.3.3

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 30 Swamp Workflow Management 2019-06-17 23:53:55 UTC
SUSE-SU-2019:1536-1: An update that solves 13 vulnerabilities and has 132 fixes is now available.

Category: security (important)
Bug References: 1012382,1050242,1051510,1053043,1056787,1058115,1063638,1064802,1065600,1065729,1066129,1068546,1071995,1075020,1082387,1083647,1085535,1099658,1103992,1104353,1104427,1106011,1106284,1108838,1110946,1111696,1112063,1113722,1114427,1114893,1115688,1117158,1117561,1118139,1119843,1120091,1120423,1120566,1120843,1120902,1122776,1123454,1123663,1124503,1124839,1126356,1127616,1128052,1128904,1128905,1128979,1129138,1129497,1129693,1129770,1129848,1129857,1130409,1130972,1131451,1131488,1131565,1131673,1132044,1132894,1133176,1133188,1133190,1133320,1133612,1133616,1134160,1134162,1134199,1134200,1134201,1134202,1134203,1134204,1134205,1134354,1134393,1134459,1134460,1134461,1134537,1134591,1134597,1134607,1134651,1134671,1134760,1134806,1134810,1134813,1134848,1134936,1135006,1135007,1135008,1135056,1135100,1135120,1135278,1135281,1135309,1135312,1135314,1135315,1135316,1135320,1135323,1135330,1135492,1135542,1135556,1135603,1135642,1135661,1135758,1136206,1136424,1136428,1136430,1136432,1136434,1136435,1136438,1136439,1136477,1136478,1136573,1136586,1136881,1136935,1136990,1137151,1137152,1137153,1137162,1137372,1137444,1137586,1137739,1137752
CVE References: CVE-2018-7191,CVE-2019-10124,CVE-2019-11085,CVE-2019-11477,CVE-2019-11479,CVE-2019-11486,CVE-2019-11487,CVE-2019-11815,CVE-2019-11833,CVE-2019-11884,CVE-2019-12382,CVE-2019-3846,CVE-2019-5489
Sources used:
SUSE Linux Enterprise Server 12-SP4 (src):    kernel-azure-4.12.14-6.15.2, kernel-source-azure-4.12.14-6.15.2, kernel-syms-azure-4.12.14-6.15.2

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 31 Swamp Workflow Management 2019-06-18 00:23:18 UTC
SUSE-SU-2019:1527-1: An update that solves 14 vulnerabilities and has 81 fixes is now available.

Category: security (important)
Bug References: 1005778,1005780,1005781,1012382,1019695,1019696,1022604,1053043,1063638,1065600,1066223,1085535,1085539,1090888,1099658,1100132,1106110,1106284,1106929,1108293,1108838,1110785,1110946,1112063,1112178,1116803,1117562,1119086,1120642,1120843,1120885,1120902,1122776,1125580,1126040,1126356,1128052,1129138,1129770,1130972,1131107,1131488,1131543,1131565,1132212,1132374,1132472,1133188,1133874,1134160,1134162,1134338,1134537,1134564,1134565,1134566,1134651,1134760,1134806,1134813,1134848,1135013,1135014,1135015,1135100,1135120,1135281,1135603,1135642,1135661,1135878,1136424,1136438,1136446,1136448,1136449,1136451,1136452,1136455,1136458,1136539,1136573,1136575,1136586,1136590,1136623,1136810,1136935,1136990,1137142,1137162,1137586,1137739,1137752,843419
CVE References: CVE-2013-4343,CVE-2018-17972,CVE-2018-7191,CVE-2019-11190,CVE-2019-11477,CVE-2019-11478,CVE-2019-11479,CVE-2019-11486,CVE-2019-11815,CVE-2019-11833,CVE-2019-11884,CVE-2019-12382,CVE-2019-3846,CVE-2019-5489
Sources used:
SUSE Linux Enterprise Server 12-SP3 (src):    kernel-azure-4.4.180-4.31.1, kernel-source-azure-4.4.180-4.31.1, kernel-syms-azure-4.4.180-4.31.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 32 Swamp Workflow Management 2019-06-18 00:42:30 UTC
SUSE-SU-2019:1535-1: An update that solves 14 vulnerabilities and has 131 fixes is now available.

Category: security (important)
Bug References: 1012382,1050242,1051510,1053043,1055186,1056787,1058115,1061840,1063638,1064802,1065600,1065729,1066129,1068546,1071995,1075020,1082387,1083647,1085535,1099658,1103992,1104353,1104427,1106011,1106284,1108193,1108838,1108937,1110946,1111696,1112063,1113722,1114427,1115688,1117158,1117561,1118139,1119843,1120091,1120423,1120566,1120843,1120902,1122776,1123454,1123663,1124503,1124839,1126356,1127616,1128052,1128904,1128979,1129138,1129273,1129497,1129693,1129770,1130579,1130699,1130972,1131326,1131451,1131488,1131565,1131673,1132044,1133176,1133188,1133190,1133320,1133612,1133616,1134160,1134162,1134199,1134200,1134201,1134202,1134203,1134204,1134205,1134354,1134393,1134459,1134460,1134461,1134537,1134597,1134651,1134671,1134760,1134806,1134810,1134813,1134848,1134936,1135006,1135007,1135008,1135056,1135100,1135120,1135278,1135281,1135309,1135312,1135314,1135315,1135316,1135320,1135323,1135330,1135492,1135542,1135556,1135603,1135642,1135661,1135758,1136206,1136424,1136428,1136430,1136432,1136434,1136435,1136438,1136439,1136477,1136478,1136573,1136586,1136881,1136935,1136990,1137151,1137152,1137153,1137162,1137372,1137444,1137586,1137739,1137752
CVE References: CVE-2018-7191,CVE-2019-10124,CVE-2019-11085,CVE-2019-11477,CVE-2019-11478,CVE-2019-11479,CVE-2019-11486,CVE-2019-11487,CVE-2019-11815,CVE-2019-11833,CVE-2019-11884,CVE-2019-12382,CVE-2019-3846,CVE-2019-5489
Sources used:
SUSE Linux Enterprise Module for Public Cloud 15 (src):    kernel-azure-4.12.14-5.30.1, kernel-source-azure-4.12.14-5.30.1, kernel-syms-azure-4.12.14-5.30.1
SUSE Linux Enterprise Module for Open Buildservice Development Tools 15-SP1 (src):    kernel-azure-4.12.14-5.30.1, kernel-source-azure-4.12.14-5.30.1, kernel-syms-azure-4.12.14-5.30.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 33 Swamp Workflow Management 2019-06-18 13:19:44 UTC
openSUSE-SU-2019:1570-1: An update that solves 15 vulnerabilities and has 62 fixes is now available.

Category: security (important)
Bug References: 1005778,1005780,1005781,1012382,1019695,1019696,1022604,1053043,1063638,1065600,1066223,1085535,1085539,1090888,1099658,1100132,1106110,1106284,1106929,1108838,1109137,1112178,1117562,1119086,1120642,1120843,1120902,1125580,1126356,1127155,1128052,1129770,1131107,1131543,1131565,1132374,1132472,1133190,1133874,1134338,1134806,1134813,1135120,1135281,1135603,1135642,1135661,1135878,1136424,1136438,1136448,1136449,1136451,1136452,1136455,1136458,1136539,1136573,1136575,1136586,1136590,1136598,1136623,1136810,1136922,1136935,1136990,1136993,1137142,1137162,1137586,1137739,1137752,1137915,1138291,1138293,1138374
CVE References: CVE-2018-7191,CVE-2019-11190,CVE-2019-11191,CVE-2019-11477,CVE-2019-11478,CVE-2019-11479,CVE-2019-11487,CVE-2019-11833,CVE-2019-12380,CVE-2019-12382,CVE-2019-12456,CVE-2019-12818,CVE-2019-12819,CVE-2019-3846,CVE-2019-5489
Sources used:
openSUSE Leap 42.3 (src):    kernel-debug-4.4.180-102.1, kernel-default-4.4.180-102.1, kernel-docs-4.4.180-102.1, kernel-obs-build-4.4.180-102.1, kernel-obs-qa-4.4.180-102.1, kernel-source-4.4.180-102.1, kernel-syms-4.4.180-102.1, kernel-vanilla-4.4.180-102.1
Comment 34 Swamp Workflow Management 2019-06-18 16:18:40 UTC
openSUSE-SU-2019:1571-1: An update that solves 11 vulnerabilities and has 167 fixes is now available.

Category: security (important)
Bug References: 1012382,1050242,1051510,1053043,1056787,1058115,1061840,1064802,1065600,1065729,1066129,1068546,1071995,1075020,1082387,1083647,1085535,1093389,1099658,1103992,1104353,1104427,1111666,1111696,1113722,1115688,1117114,1117158,1117561,1118139,1120091,1120423,1120566,1120902,1124503,1126206,1126356,1127616,1128432,1130699,1131673,1133190,1133612,1133616,1134090,1134671,1134730,1134738,1134743,1134806,1134936,1134945,1134946,1134947,1134948,1134949,1134950,1134951,1134952,1134953,1134972,1134974,1134975,1134980,1134981,1134983,1134987,1134989,1134990,1134994,1134995,1134998,1134999,1135018,1135021,1135024,1135026,1135027,1135028,1135029,1135031,1135033,1135034,1135035,1135036,1135037,1135038,1135039,1135041,1135042,1135044,1135045,1135046,1135047,1135049,1135051,1135052,1135053,1135055,1135056,1135058,1135153,1135542,1135556,1135642,1135661,1136188,1136206,1136215,1136345,1136347,1136348,1136353,1136424,1136428,1136430,1136432,1136434,1136435,1136438,1136439,1136456,1136460,1136461,1136469,1136477,1136478,1136498,1136573,1136586,1136598,1136881,1136922,1136935,1136978,1136990,1137151,1137152,1137153,1137162,1137201,1137224,1137232,1137233,1137236,1137372,1137429,1137444,1137586,1137739,1137752,1137995,1137996,1137998,1137999,1138000,1138002,1138003,1138005,1138006,1138007,1138008,1138009,1138010,1138011,1138012,1138013,1138014,1138015,1138016,1138017,1138018,1138019,1138291,1138293,1138336,1138374,1138375
CVE References: CVE-2019-10124,CVE-2019-11477,CVE-2019-11478,CVE-2019-11479,CVE-2019-11487,CVE-2019-12380,CVE-2019-12382,CVE-2019-12456,CVE-2019-12818,CVE-2019-12819,CVE-2019-3846
Sources used:
openSUSE Leap 15.1 (src):    kernel-debug-4.12.14-lp151.28.7.1, kernel-default-4.12.14-lp151.28.7.1, kernel-docs-4.12.14-lp151.28.7.1, kernel-kvmsmall-4.12.14-lp151.28.7.1, kernel-obs-build-4.12.14-lp151.28.7.1, kernel-obs-qa-4.12.14-lp151.28.7.1, kernel-source-4.12.14-lp151.28.7.1, kernel-syms-4.12.14-lp151.28.7.1, kernel-vanilla-4.12.14-lp151.28.7.1
Comment 35 Swamp Workflow Management 2019-06-18 19:41:31 UTC
SUSE-SU-2019:1550-1: An update that solves 28 vulnerabilities and has 318 fixes is now available.

Category: security (important)
Bug References: 1012382,1050242,1050549,1051510,1052904,1053043,1055117,1055121,1055186,1056787,1058115,1061840,1063638,1064802,1065600,1065729,1066129,1068546,1070872,1071995,1075020,1082387,1082555,1083647,1085535,1085536,1086657,1088804,1093389,1097583,1097584,1097585,1097586,1097587,1097588,1099658,1103186,1103259,1103992,1104353,1104427,1106011,1106284,1108193,1108838,1108937,1110946,1111331,1111666,1111696,1112063,1112128,1112178,1113722,1113956,1114279,1114427,1114542,1114638,1115688,1117114,1117158,1117561,1118139,1119680,1119843,1120091,1120318,1120423,1120566,1120843,1120902,1122767,1122776,1123454,1123663,1124503,1124839,1126206,1126356,1126704,1127175,1127371,1127374,1127616,1128052,1128415,1128544,1128904,1128971,1128979,1129138,1129273,1129497,1129693,1129770,1129845,1130195,1130425,1130527,1130567,1130579,1130699,1130937,1130972,1131326,1131427,1131438,1131451,1131467,1131488,1131530,1131565,1131574,1131587,1131659,1131673,1131847,1131848,1131851,1131900,1131934,1131935,1132044,1132219,1132226,1132227,1132365,1132368,1132369,1132370,1132372,1132373,1132384,1132397,1132402,1132403,1132404,1132405,1132407,1132411,1132412,1132413,1132414,1132426,1132527,1132531,1132555,1132558,1132561,1132562,1132563,1132564,1132570,1132571,1132572,1132589,1132618,1132673,1132681,1132726,1132828,1132894,1132943,1132982,1133005,1133016,1133094,1133095,1133115,1133149,1133176,1133188,1133190,1133320,1133486,1133529,1133547,1133584,1133593,1133612,1133616,1133667,1133668,1133672,1133674,1133675,1133698,1133702,1133731,1133769,1133772,1133774,1133778,1133779,1133780,1133825,1133850,1133851,1133852,1133897,1134090,1134160,1134162,1134199,1134200,1134201,1134202,1134203,1134204,1134205,1134223,1134354,1134393,1134397,1134459,1134460,1134461,1134597,1134600,1134607,1134618,1134651,1134671,1134760,1134806,1134810,1134813,1134848,1134936,1134945,1134946,1134947,1134948,1134949,1134950,1134951,1134952,1134953,1134972,1134974,1134975,1134980,1134981,1134983,1134987,1134989,1134990,1134994,1134995,1134998,1134999,1135006,1135007,1135008,1135018,1135021,1135024,1135026,1135027,1135028,1135029,1135031,1135033,1135034,1135035,1135036,1135037,1135038,1135039,1135041,1135042,1135044,1135045,1135046,1135047,1135049,1135051,1135052,1135053,1135055,1135056,1135058,1135100,1135120,1135278,1135281,1135309,1135312,1135314,1135315,1135316,1135320,1135323,1135330,1135492,1135542,1135556,1135603,1135642,1135661,1135758,1136188,1136206,1136215,1136345,1136347,1136348,1136353,1136424,1136428,1136430,1136432,1136434,1136435,1136438,1136439,1136456,1136460,1136461,1136469,1136477,1136478,1136498,1136573,1136586,1136881,1136935,1136990,1137151,1137152,1137153,1137162,1137201,1137224,1137232,1137233,1137236,1137372,1137429,1137444,1137586,1137739,1137752,1138291,1138293
CVE References: CVE-2017-5753,CVE-2018-12126,CVE-2018-12127,CVE-2018-12130,CVE-2018-16880,CVE-2018-7191,CVE-2019-10124,CVE-2019-11085,CVE-2019-11091,CVE-2019-11477,CVE-2019-11478,CVE-2019-11479,CVE-2019-11486,CVE-2019-11487,CVE-2019-11811,CVE-2019-11815,CVE-2019-11833,CVE-2019-11884,CVE-2019-12382,CVE-2019-12818,CVE-2019-12819,CVE-2019-3846,CVE-2019-3882,CVE-2019-5489,CVE-2019-8564,CVE-2019-9003,CVE-2019-9500,CVE-2019-9503
Sources used:
SUSE Linux Enterprise Module for Live Patching 15-SP1 (src):    kernel-default-4.12.14-197.4.1, kernel-livepatch-SLE15-SP1_Update_1-1-3.3.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 36 Swamp Workflow Management 2019-06-18 22:19:30 UTC
openSUSE-SU-2019:1579-1: An update that solves 15 vulnerabilities and has 115 fixes is now available.

Category: security (important)
Bug References: 1012382,1050242,1051510,1053043,1056787,1058115,1061840,1063638,1064802,1065600,1065729,1066129,1068546,1071995,1075020,1082387,1083647,1085535,1099658,1103992,1104353,1104427,1106284,1108838,1111696,1113722,1114427,1115688,1117158,1117561,1118139,1120091,1120423,1120566,1120843,1120902,1123454,1123663,1124503,1126356,1127616,1128052,1128432,1128904,1129693,1129770,1130699,1131565,1131673,1133190,1133320,1133612,1133616,1134597,1134671,1134806,1134936,1135056,1135120,1135278,1135281,1135309,1135312,1135314,1135315,1135316,1135320,1135323,1135330,1135492,1135542,1135556,1135603,1135642,1135661,1135758,1136206,1136424,1136428,1136430,1136432,1136434,1136435,1136438,1136439,1136477,1136478,1136573,1136586,1136598,1136881,1136922,1136935,1136990,1137151,1137152,1137153,1137162,1137372,1137429,1137444,1137586,1137739,1137752,1137995,1137996,1137998,1137999,1138000,1138002,1138003,1138005,1138006,1138007,1138008,1138009,1138010,1138011,1138012,1138013,1138014,1138015,1138016,1138017,1138018,1138019,1138291,1138293,1138374,1138375
CVE References: CVE-2018-7191,CVE-2019-10124,CVE-2019-11085,CVE-2019-11477,CVE-2019-11478,CVE-2019-11479,CVE-2019-11487,CVE-2019-11833,CVE-2019-12380,CVE-2019-12382,CVE-2019-12456,CVE-2019-12818,CVE-2019-12819,CVE-2019-3846,CVE-2019-5489
Sources used:
openSUSE Leap 15.0 (src):    kernel-debug-4.12.14-lp150.12.64.1, kernel-default-4.12.14-lp150.12.64.1, kernel-docs-4.12.14-lp150.12.64.1, kernel-kvmsmall-4.12.14-lp150.12.64.1, kernel-obs-build-4.12.14-lp150.12.64.1, kernel-obs-qa-4.12.14-lp150.12.64.1, kernel-source-4.12.14-lp150.12.64.1, kernel-syms-4.12.14-lp150.12.64.1, kernel-vanilla-4.12.14-lp150.12.64.1
Comment 37 Swamp Workflow Management 2019-06-18 22:57:06 UTC
SUSE-SU-2019:1550-1: An update that solves 28 vulnerabilities and has 318 fixes is now available.

Category: security (important)
Bug References: 1012382,1050242,1050549,1051510,1052904,1053043,1055117,1055121,1055186,1056787,1058115,1061840,1063638,1064802,1065600,1065729,1066129,1068546,1070872,1071995,1075020,1082387,1082555,1083647,1085535,1085536,1086657,1088804,1093389,1097583,1097584,1097585,1097586,1097587,1097588,1099658,1103186,1103259,1103992,1104353,1104427,1106011,1106284,1108193,1108838,1108937,1110946,1111331,1111666,1111696,1112063,1112128,1112178,1113722,1113956,1114279,1114427,1114542,1114638,1115688,1117114,1117158,1117561,1118139,1119680,1119843,1120091,1120318,1120423,1120566,1120843,1120902,1122767,1122776,1123454,1123663,1124503,1124839,1126206,1126356,1126704,1127175,1127371,1127374,1127616,1128052,1128415,1128544,1128904,1128971,1128979,1129138,1129273,1129497,1129693,1129770,1129845,1130195,1130425,1130527,1130567,1130579,1130699,1130937,1130972,1131326,1131427,1131438,1131451,1131467,1131488,1131530,1131565,1131574,1131587,1131659,1131673,1131847,1131848,1131851,1131900,1131934,1131935,1132044,1132219,1132226,1132227,1132365,1132368,1132369,1132370,1132372,1132373,1132384,1132397,1132402,1132403,1132404,1132405,1132407,1132411,1132412,1132413,1132414,1132426,1132527,1132531,1132555,1132558,1132561,1132562,1132563,1132564,1132570,1132571,1132572,1132589,1132618,1132673,1132681,1132726,1132828,1132894,1132943,1132982,1133005,1133016,1133094,1133095,1133115,1133149,1133176,1133188,1133190,1133320,1133486,1133529,1133547,1133584,1133593,1133612,1133616,1133667,1133668,1133672,1133674,1133675,1133698,1133702,1133731,1133769,1133772,1133774,1133778,1133779,1133780,1133825,1133850,1133851,1133852,1133897,1134090,1134160,1134162,1134199,1134200,1134201,1134202,1134203,1134204,1134205,1134223,1134354,1134393,1134397,1134459,1134460,1134461,1134597,1134600,1134607,1134618,1134651,1134671,1134760,1134806,1134810,1134813,1134848,1134936,1134945,1134946,1134947,1134948,1134949,1134950,1134951,1134952,1134953,1134972,1134974,1134975,1134980,1134981,1134983,1134987,1134989,1134990,1134994,1134995,1134998,1134999,1135006,1135007,1135008,1135018,1135021,1135024,1135026,1135027,1135028,1135029,1135031,1135033,1135034,1135035,1135036,1135037,1135038,1135039,1135041,1135042,1135044,1135045,1135046,1135047,1135049,1135051,1135052,1135053,1135055,1135056,1135058,1135100,1135120,1135278,1135281,1135309,1135312,1135314,1135315,1135316,1135320,1135323,1135330,1135492,1135542,1135556,1135603,1135642,1135661,1135758,1136188,1136206,1136215,1136345,1136347,1136348,1136353,1136424,1136428,1136430,1136432,1136434,1136435,1136438,1136439,1136456,1136460,1136461,1136469,1136477,1136478,1136498,1136573,1136586,1136881,1136935,1136990,1137151,1137152,1137153,1137162,1137201,1137224,1137232,1137233,1137236,1137372,1137429,1137444,1137586,1137739,1137752,1138291,1138293
CVE References: CVE-2017-5753,CVE-2018-12126,CVE-2018-12127,CVE-2018-12130,CVE-2018-16880,CVE-2018-7191,CVE-2019-10124,CVE-2019-11085,CVE-2019-11091,CVE-2019-11477,CVE-2019-11478,CVE-2019-11479,CVE-2019-11486,CVE-2019-11487,CVE-2019-11811,CVE-2019-11815,CVE-2019-11833,CVE-2019-11884,CVE-2019-12382,CVE-2019-12818,CVE-2019-12819,CVE-2019-3846,CVE-2019-3882,CVE-2019-5489,CVE-2019-8564,CVE-2019-9003,CVE-2019-9500,CVE-2019-9503
Sources used:
SUSE Linux Enterprise Workstation Extension 15-SP1 (src):    kernel-default-4.12.14-197.4.1
SUSE Linux Enterprise Module for Open Buildservice Development Tools 15-SP1 (src):    dtb-aarch64-4.12.14-197.4.1, kernel-debug-4.12.14-197.4.1, kernel-default-4.12.14-197.4.1, kernel-docs-4.12.14-197.4.1, kernel-kvmsmall-4.12.14-197.4.1, kernel-obs-qa-4.12.14-197.4.1, kernel-source-4.12.14-197.4.1, kernel-vanilla-4.12.14-197.4.1, kernel-zfcpdump-4.12.14-197.4.1
SUSE Linux Enterprise Module for Live Patching 15-SP1 (src):    kernel-default-4.12.14-197.4.1, kernel-livepatch-SLE15-SP1_Update_1-1-3.3.1
SUSE Linux Enterprise Module for Legacy Software 15-SP1 (src):    kernel-default-4.12.14-197.4.1
SUSE Linux Enterprise Module for Development Tools 15-SP1 (src):    kernel-docs-4.12.14-197.4.1, kernel-obs-build-4.12.14-197.4.1, kernel-source-4.12.14-197.4.1, kernel-syms-4.12.14-197.4.1
SUSE Linux Enterprise Module for Basesystem 15-SP1 (src):    kernel-default-4.12.14-197.4.1, kernel-source-4.12.14-197.4.1, kernel-zfcpdump-4.12.14-197.4.1
SUSE Linux Enterprise High Availability 15-SP1 (src):    kernel-default-4.12.14-197.4.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 38 Jiri Slaby 2019-06-20 09:32:11 UTC
This is a part of 5.1.8, so this is fixed now.
Comment 42 Swamp Workflow Management 2019-09-23 13:53:55 UTC
SUSE-SU-2019:2430-1: An update that solves 45 vulnerabilities and has 474 fixes is now available.

Category: security (important)
Bug References: 1050242,1050549,1051510,1052904,1053043,1055117,1055121,1055186,1056787,1058115,1061840,1064802,1065600,1065729,1066129,1070872,1071995,1075020,1082387,1082555,1083647,1083710,1085535,1085536,1088047,1088804,1093389,1094555,1096003,1098633,1099658,1102247,1103186,1103259,1103990,1103991,1103992,1104745,1106011,1106284,1106383,1106751,1108193,1108838,1108937,1109837,1110946,1111331,1111666,1111696,1112063,1112128,1112178,1112374,1113722,1113956,1114279,1114427,1114542,1114638,1114685,1115688,1117114,1117158,1117561,1118139,1119113,1119222,1119532,1119680,1120091,1120318,1120423,1120566,1120843,1120902,1122767,1122776,1123080,1123454,1123663,1124503,1124839,1125703,1126206,1126356,1126704,1127034,1127175,1127315,1127371,1127374,1127611,1127616,1128052,1128415,1128432,1128544,1128902,1128904,1128971,1128979,1129138,1129273,1129693,1129770,1129845,1130195,1130425,1130527,1130567,1130579,1130699,1130836,1130937,1130972,1131326,1131427,1131438,1131451,1131467,1131488,1131530,1131565,1131574,1131587,1131645,1131659,1131673,1131847,1131848,1131851,1131900,1131934,1131935,1132044,1132219,1132226,1132227,1132365,1132368,1132369,1132370,1132372,1132373,1132384,1132390,1132397,1132402,1132403,1132404,1132405,1132407,1132411,1132412,1132413,1132414,1132426,1132527,1132531,1132555,1132558,1132561,1132562,1132563,1132564,1132570,1132571,1132572,1132589,1132618,1132673,1132681,1132726,1132828,1132894,1132943,1132982,1133005,1133016,1133021,1133094,1133095,1133115,1133149,1133176,1133188,1133190,1133311,1133320,1133401,1133486,1133529,1133547,1133584,1133593,1133612,1133616,1133667,1133668,1133672,1133674,1133675,1133698,1133702,1133731,1133738,1133769,1133772,1133774,1133778,1133779,1133780,1133825,1133850,1133851,1133852,1133897,1134090,1134097,1134160,1134162,1134199,1134200,1134201,1134202,1134203,1134204,1134205,1134223,1134303,1134354,1134390,1134393,1134395,1134397,1134399,1134459,1134460,1134461,1134597,1134600,1134607,1134618,1134651,1134671,1134730,1134738,1134743,1134760,1134806,1134810,1134813,1134848,1134936,1134945,1134946,1134947,1134948,1134949,1134950,1134951,1134952,1134953,1134972,1134974,1134975,1134980,1134981,1134983,1134987,1134989,1134990,1134994,1134995,1134998,1134999,1135006,1135007,1135008,1135018,1135021,1135024,1135026,1135027,1135028,1135029,1135031,1135033,1135034,1135035,1135036,1135037,1135038,1135039,1135041,1135042,1135044,1135045,1135046,1135047,1135049,1135051,1135052,1135053,1135055,1135056,1135058,1135100,1135120,1135153,1135278,1135281,1135296,1135309,1135312,1135314,1135315,1135316,1135320,1135323,1135330,1135335,1135492,1135542,1135556,1135603,1135642,1135661,1135758,1135897,1136156,1136157,1136161,1136188,1136206,1136215,1136217,1136264,1136271,1136333,1136342,1136343,1136345,1136347,1136348,1136353,1136424,1136428,1136430,1136432,1136434,1136435,1136438,1136439,1136456,1136460,1136461,1136462,1136467,1136469,1136477,1136478,1136498,1136573,1136586,1136598,1136881,1136922,1136935,1136978,1136990,1137103,1137151,1137152,1137153,1137162,1137194,1137201,1137224,1137232,1137233,1137236,1137366,1137372,1137429,1137444,1137458,1137534,1137535,1137584,1137586,1137609,1137625,1137728,1137739,1137752,1137811,1137827,1137884,1137985,1137995,1137996,1137998,1137999,1138000,1138002,1138003,1138005,1138006,1138007,1138008,1138009,1138010,1138011,1138012,1138013,1138014,1138015,1138016,1138017,1138018,1138019,1138263,1138291,1138293,1138336,1138374,1138375,1138589,1138681,1138719,1138732,1138874,1138879,1139358,1139619,1139712,1139751,1139771,1139865,1140133,1140139,1140228,1140322,1140328,1140405,1140424,1140428,1140454,1140463,1140559,1140575,1140577,1140637,1140652,1140658,1140676,1140715,1140719,1140726,1140727,1140728,1140814,1140887,1140888,1140889,1140891,1140893,1140903,1140945,1140948,1140954,1140955,1140956,1140957,1140958,1140959,1140960,1140961,1140962,1140964,1140971,1140972,1140992,1141312,1141401,1141402,1141452,1141453,1141454,1141478,1141558,1142023,1142052,1142083,1142112,1142115,1142119,1142220,1142221,1142254,1142350,1142351,1142354,1142359,1142450,1142623,1142673,1142701,1142868,1143003,1143045,1143105,1143185,1143189,1143191,1143209,1143507
CVE References: CVE-2017-5753,CVE-2018-12126,CVE-2018-12127,CVE-2018-12130,CVE-2018-16871,CVE-2018-16880,CVE-2018-20836,CVE-2018-20855,CVE-2018-7191,CVE-2019-10124,CVE-2019-10638,CVE-2019-10639,CVE-2019-11085,CVE-2019-11091,CVE-2019-1125,CVE-2019-11477,CVE-2019-11478,CVE-2019-11479,CVE-2019-11486,CVE-2019-11487,CVE-2019-11599,CVE-2019-11810,CVE-2019-11811,CVE-2019-11815,CVE-2019-11833,CVE-2019-11884,CVE-2019-12380,CVE-2019-12382,CVE-2019-12456,CVE-2019-12614,CVE-2019-12817,CVE-2019-12818,CVE-2019-12819,CVE-2019-13233,CVE-2019-13631,CVE-2019-13648,CVE-2019-14283,CVE-2019-14284,CVE-2019-3846,CVE-2019-3882,CVE-2019-5489,CVE-2019-8564,CVE-2019-9003,CVE-2019-9500,CVE-2019-9503
Sources used:
SUSE Linux Enterprise Module for Realtime 15-SP1 (src):    kernel-rt-4.12.14-14.8.1, kernel-rt_debug-4.12.14-14.8.1, kernel-source-rt-4.12.14-14.8.1, kernel-syms-rt-4.12.14-14.8.1
SUSE Linux Enterprise Module for Open Buildservice Development Tools 15-SP1 (src):    kernel-rt-4.12.14-14.8.1, kernel-rt_debug-4.12.14-14.8.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.