Bugzilla – Bug 1134806
null pointer dereference in btrfs/qgroup with kernel 5.0.2
Last modified: 2019-09-23 22:47:31 UTC
With the last upgrades in Tumbleweed with kernel 5.xx, zypper dup hangs after upgrading the kernel. It can be to do with the SATA controller ASMEDIA ASM 1062 (0x1B21), and it don't work without a hardware reset with the new kernel. Making a hardware reset, after the kernel 5.xx upgrade, the system works fine, and then I must to do a new zypper dup to complete the upgrade of the downloaded packages. Sistema operativo: openSUSE Tumbleweed 20190506 Versión de KDE Plasma: 5.15.4 Versión de KDE Frameworks: 5.57.0 Versión de Qt: 5.12.3 Versión del kernel: 5.0.2-1-default Tipo de OS: 64 bits Procesadores: 8 × AMD FX-8320E Eight-Core Processor Memoria: 15,6 GiB de RAM Konsole with zypper dup: (156/275) Instalando: kernel-default-5.0.11-1.3.x86_64 ..................................................................................................................................................<100%>[/] Output of ps -aux: USER PID %CPU %MEM VSZ RSS TTY STAT START TIME COMMAND root 1 0.0 0.0 166352 13936 ? Ss 17:21 0:10 /usr/lib/systemd/systemd --switched-root --system --deserialize 33 root 2 0.0 0.0 0 0 ? S 17:21 0:00 [kthreadd] root 3 0.0 0.0 0 0 ? I< 17:21 0:00 [rcu_gp] root 4 0.0 0.0 0 0 ? I< 17:21 0:00 [rcu_par_gp] root 6 0.0 0.0 0 0 ? I< 17:21 0:00 [kworker/0:0H-kblockd] root 8 0.0 0.0 0 0 ? I< 17:21 0:00 [mm_percpu_wq] root 9 0.0 0.0 0 0 ? S 17:21 0:00 [ksoftirqd/0] root 10 0.0 0.0 0 0 ? I 17:21 0:21 [rcu_sched] root 11 0.0 0.0 0 0 ? S 17:21 0:00 [migration/0] root 12 0.0 0.0 0 0 ? S 17:21 0:00 [idle_inject/0] root 14 0.0 0.0 0 0 ? S 17:21 0:00 [cpuhp/0] root 15 0.0 0.0 0 0 ? S 17:21 0:00 [cpuhp/1] root 16 0.0 0.0 0 0 ? S 17:21 0:00 [idle_inject/1] root 17 0.0 0.0 0 0 ? S 17:21 0:00 [migration/1] root 18 0.0 0.0 0 0 ? S 17:21 0:00 [ksoftirqd/1] root 20 0.0 0.0 0 0 ? I< 17:21 0:00 [kworker/1:0H-kblockd] root 21 0.0 0.0 0 0 ? S 17:21 0:00 [cpuhp/2] root 22 0.0 0.0 0 0 ? S 17:21 0:00 [idle_inject/2] root 23 0.0 0.0 0 0 ? S 17:21 0:00 [migration/2] root 24 0.0 0.0 0 0 ? S 17:21 0:00 [ksoftirqd/2] root 26 0.0 0.0 0 0 ? I< 17:21 0:00 [kworker/2:0H-kblockd] root 27 0.0 0.0 0 0 ? S 17:21 0:00 [cpuhp/3] root 28 0.0 0.0 0 0 ? S 17:21 0:00 [idle_inject/3] root 29 0.0 0.0 0 0 ? S 17:21 0:00 [migration/3] root 30 0.0 0.0 0 0 ? S 17:21 0:00 [ksoftirqd/3] root 32 0.0 0.0 0 0 ? I< 17:21 0:00 [kworker/3:0H-kblockd] root 33 0.0 0.0 0 0 ? S 17:21 0:00 [cpuhp/4] root 34 0.0 0.0 0 0 ? S 17:21 0:00 [idle_inject/4] root 35 0.0 0.0 0 0 ? S 17:21 0:00 [migration/4] root 36 0.0 0.0 0 0 ? S 17:21 0:00 [ksoftirqd/4] root 38 0.0 0.0 0 0 ? I< 17:21 0:00 [kworker/4:0H-kblockd] root 39 0.0 0.0 0 0 ? S 17:21 0:00 [cpuhp/5] root 40 0.0 0.0 0 0 ? S 17:21 0:00 [idle_inject/5] root 41 0.0 0.0 0 0 ? S 17:21 0:00 [migration/5] root 42 0.0 0.0 0 0 ? S 17:21 0:00 [ksoftirqd/5] root 44 0.0 0.0 0 0 ? I< 17:21 0:00 [kworker/5:0H-kblockd] root 45 0.0 0.0 0 0 ? S 17:21 0:00 [cpuhp/6] root 46 0.0 0.0 0 0 ? S 17:21 0:00 [idle_inject/6] root 47 0.0 0.0 0 0 ? S 17:21 0:00 [migration/6] root 48 0.0 0.0 0 0 ? S 17:21 0:00 [ksoftirqd/6] root 50 0.0 0.0 0 0 ? I< 17:21 0:00 [kworker/6:0H-kblockd] root 51 0.0 0.0 0 0 ? S 17:21 0:00 [cpuhp/7] root 52 0.0 0.0 0 0 ? S 17:21 0:00 [idle_inject/7] root 53 0.0 0.0 0 0 ? S 17:21 0:00 [migration/7] root 54 0.0 0.0 0 0 ? S 17:21 0:00 [ksoftirqd/7] root 56 0.0 0.0 0 0 ? I< 17:21 0:00 [kworker/7:0H-kblockd] root 58 0.0 0.0 0 0 ? S 17:21 0:00 [kdevtmpfs] root 59 0.0 0.0 0 0 ? I< 17:21 0:00 [netns] root 60 0.0 0.0 0 0 ? S 17:21 0:00 [rcu_tasks_kthre] root 61 0.0 0.0 0 0 ? S 17:21 0:00 [kauditd] root 62 0.0 0.0 0 0 ? S 17:21 0:00 [khungtaskd] root 63 0.0 0.0 0 0 ? S 17:21 0:00 [oom_reaper] root 64 0.0 0.0 0 0 ? I< 17:21 0:00 [writeback] root 65 0.0 0.0 0 0 ? S 17:21 0:00 [kcompactd0] root 66 0.0 0.0 0 0 ? SN 17:21 0:00 [ksmd] root 67 0.0 0.0 0 0 ? SN 17:21 0:00 [khugepaged] root 68 0.0 0.0 0 0 ? I< 17:21 0:00 [crypto] root 69 0.0 0.0 0 0 ? I< 17:21 0:00 [kintegrityd] root 70 0.0 0.0 0 0 ? I< 17:21 0:00 [kblockd] root 71 0.0 0.0 0 0 ? I< 17:21 0:00 [tpm_dev_wq] root 72 0.0 0.0 0 0 ? I< 17:21 0:00 [ata_sff] root 73 0.0 0.0 0 0 ? I< 17:21 0:00 [edac-poller] root 74 0.0 0.0 0 0 ? I< 17:21 0:00 [devfreq_wq] root 75 0.0 0.0 0 0 ? S 17:21 0:00 [watchdogd] root 83 0.0 0.0 0 0 ? S 17:21 0:00 [kswapd0] root 84 0.0 0.0 0 0 ? I< 17:21 0:00 [kworker/u17:0] root 168 0.0 0.0 0 0 ? I< 17:21 0:00 [kthrotld] root 169 0.0 0.0 0 0 ? I< 17:21 0:00 [nvme-wq] root 170 0.0 0.0 0 0 ? I< 17:21 0:00 [nvme-reset-wq] root 171 0.0 0.0 0 0 ? I< 17:21 0:00 [nvme-delete-wq] root 172 0.0 0.0 0 0 ? S 17:21 0:00 [scsi_eh_0] root 173 0.0 0.0 0 0 ? I< 17:21 0:00 [scsi_tmf_0] root 174 0.0 0.0 0 0 ? S 17:21 0:00 [scsi_eh_1] root 176 0.0 0.0 0 0 ? I< 17:21 0:00 [scsi_tmf_1] root 177 0.0 0.0 0 0 ? S 17:21 0:00 [scsi_eh_2] root 178 0.0 0.0 0 0 ? I< 17:21 0:00 [scsi_tmf_2] root 179 0.0 0.0 0 0 ? S 17:21 0:00 [scsi_eh_3] root 180 0.0 0.0 0 0 ? I< 17:21 0:00 [scsi_tmf_3] root 182 0.0 0.0 0 0 ? S 17:21 0:00 [scsi_eh_4] root 184 0.0 0.0 0 0 ? I< 17:21 0:00 [scsi_tmf_4] root 186 0.0 0.0 0 0 ? S 17:21 0:00 [scsi_eh_5] root 187 0.0 0.0 0 0 ? I< 17:21 0:00 [scsi_tmf_5] root 190 0.0 0.0 0 0 ? I< 17:21 0:00 [ipv6_addrconf] root 203 0.0 0.0 0 0 ? I< 17:21 0:00 [kstrp] root 219 0.0 0.0 0 0 ? I< 17:21 0:00 [kworker/2:1H-kblockd] root 220 0.0 0.0 0 0 ? I< 17:21 0:01 [kworker/6:1H-kblockd] root 252 0.0 0.0 8108 4756 ? Ss 17:21 0:05 @usr/sbin/haveged -w 1024 -v 0 -F root 262 0.0 0.0 0 0 ? I< 17:21 0:00 [kaluad] root 263 0.0 0.0 0 0 ? I< 17:21 0:00 [kmpath_rdacd] root 264 0.0 0.0 0 0 ? I< 17:21 0:00 [kmpathd] root 265 0.0 0.0 0 0 ? I< 17:21 0:00 [kmpath_handlerd] avahi 347 0.0 0.0 7276 3852 ? Ss 23:18 0:00 avahi-daemon: running [linux-kzzr.local] root 356 0.0 0.0 0 0 ? I 23:18 0:00 [kworker/u16:15-events_unbound] root 357 0.0 0.0 0 0 ? S 17:21 0:00 [scsi_eh_6] root 360 0.0 0.0 0 0 ? I< 17:21 0:00 [scsi_tmf_6] root 368 0.0 0.0 0 0 ? S 17:21 0:00 [scsi_eh_7] root 369 0.0 0.0 0 0 ? I< 17:21 0:00 [scsi_tmf_7] root 389 0.0 0.0 0 0 ? I 23:18 0:00 [kworker/5:2-events] root 391 0.0 0.0 0 0 ? I< 17:21 0:00 [ttm_swap] root 392 0.2 0.0 0 0 ? S 17:21 0:48 [gfx] root 393 0.0 0.0 0 0 ? S 17:21 0:00 [comp_1.0.0] root 394 0.0 0.0 0 0 ? S 17:21 0:00 [comp_1.1.0] root 395 0.0 0.0 0 0 ? S 17:21 0:00 [comp_1.2.0] root 396 0.0 0.0 0 0 ? S 17:21 0:00 [comp_1.3.0] root 397 0.0 0.0 0 0 ? S 17:21 0:00 [comp_1.0.1] root 398 0.0 0.0 0 0 ? S 17:21 0:00 [comp_1.1.1] root 399 0.0 0.0 0 0 ? S 17:21 0:00 [comp_1.2.1] root 400 0.0 0.0 0 0 ? S 17:21 0:00 [comp_1.3.1] root 401 0.0 0.0 0 0 ? S 17:21 0:02 [sdma0] root 402 0.0 0.0 0 0 ? S 17:21 0:00 [sdma1] root 403 0.0 0.0 0 0 ? S 17:21 0:00 [uvd] root 404 0.0 0.0 0 0 ? S 17:21 0:00 [uvd_enc0] root 405 0.0 0.0 0 0 ? S 17:21 0:00 [uvd_enc1] root 406 0.0 0.0 0 0 ? S 17:21 0:00 [vce0] root 407 0.0 0.0 0 0 ? S 17:21 0:00 [vce1] root 408 0.0 0.0 0 0 ? S 17:21 0:00 [vce2] root 419 0.0 0.0 0 0 ? I< 17:21 0:00 [kworker/5:1H-kblockd] root 423 0.0 0.0 0 0 ? I< 17:21 0:00 [kworker/4:1H-kblockd] root 426 0.0 0.0 0 0 ? I< 17:21 0:00 [kworker/1:1H-kblockd] root 432 0.0 0.0 0 0 ? I< 17:21 0:00 [btrfs-worker] root 433 0.0 0.0 0 0 ? I< 17:21 0:00 [btrfs-worker-hi] root 434 0.0 0.0 0 0 ? I< 17:21 0:00 [btrfs-delalloc] root 435 0.0 0.0 0 0 ? I< 17:21 0:00 [btrfs-flush_del] root 436 0.0 0.0 0 0 ? I< 17:21 0:00 [btrfs-cache] root 437 0.0 0.0 0 0 ? I< 17:21 0:00 [btrfs-submit] root 438 0.0 0.0 0 0 ? I< 17:21 0:00 [btrfs-fixup] root 439 0.0 0.0 0 0 ? I< 17:21 0:00 [btrfs-endio] root 440 0.0 0.0 0 0 ? I< 17:21 0:00 [btrfs-endio-met] root 441 0.0 0.0 0 0 ? I< 17:21 0:00 [btrfs-endio-met] root 442 0.0 0.0 0 0 ? I< 17:21 0:00 [btrfs-endio-rai] root 443 0.0 0.0 0 0 ? I< 17:21 0:00 [btrfs-endio-rep] root 444 0.0 0.0 0 0 ? I< 17:21 0:00 [btrfs-rmw] root 445 0.0 0.0 0 0 ? I< 17:21 0:00 [btrfs-endio-wri] root 446 0.0 0.0 0 0 ? I< 17:21 0:00 [btrfs-freespace] root 447 0.0 0.0 0 0 ? I< 17:21 0:00 [btrfs-delayed-m] root 448 0.0 0.0 0 0 ? I< 17:21 0:00 [btrfs-readahead] root 449 0.0 0.0 0 0 ? I< 17:21 0:00 [btrfs-qgroup-re] root 450 0.0 0.0 0 0 ? I< 17:21 0:00 [btrfs-extent-re] root 455 0.0 0.0 0 0 ? I< 17:21 0:00 [kworker/0:1H-kblockd] root 456 0.0 0.0 0 0 ? S 17:21 0:00 [btrfs-cleaner] root 457 0.0 0.0 0 0 ? S 17:21 0:09 [btrfs-transacti] root 495 0.0 0.0 0 0 ? I< 17:21 0:00 [kworker/3:1H-kblockd] root 508 0.0 0.0 0 0 ? I< 17:21 0:00 [kworker/7:1H-kblockd] root 526 0.0 0.1 32968 18844 ? Ss 17:21 0:01 /usr/lib/systemd/systemd-journald root 542 0.0 0.0 26156 10652 ? Ss 17:21 0:00 /usr/lib/systemd/systemd-udevd root 786 0.0 0.0 0 0 ? I< 17:21 0:00 [xfsalloc] root 787 0.0 0.0 0 0 ? I< 17:21 0:00 [xfs_mru_cache] root 788 0.0 0.0 0 0 ? I< 17:21 0:00 [xfs-buf/sdb2] root 789 0.0 0.0 0 0 ? I< 17:21 0:00 [xfs-data/sdb2] root 790 0.0 0.0 0 0 ? I< 17:21 0:00 [xfs-conv/sdb2] root 791 0.0 0.0 0 0 ? I< 17:21 0:00 [xfs-cil/sdb2] root 792 0.0 0.0 0 0 ? I< 17:21 0:00 [xfs-reclaim/sdb] root 793 0.0 0.0 0 0 ? I< 17:21 0:00 [xfs-log/sdb2] root 794 0.0 0.0 0 0 ? I< 17:21 0:00 [xfs-eofblocks/s] root 797 0.0 0.0 0 0 ? S 17:21 0:03 [xfsaild/sdb2] root 799 0.0 0.0 0 0 ? I 23:18 0:00 [kworker/3:3-events] root 893 0.0 0.0 11172 1632 ? S<sl 17:21 0:00 /sbin/auditd root 1033 0.6 0.1 22584 19788 pts/0 S+ 23:19 0:09 rpm --root / --dbpath /var/lib/rpm -i --percent --noglob --force --nodeps -- /var/cache/zypp/packages/repo-oss/x86_64/kernel-default-5.0.11-1.3.x root 1049 0.0 0.0 3920 3008 pts/0 S+ 23:19 0:00 /bin/sh /var/tmp/rpm-tmp.IUNMA1 4 root 1107 0.0 0.0 3116 2512 ? Ss 17:21 0:00 /usr/lib/ipsec/starter --daemon charon --nofork message+ 1111 0.0 0.0 8588 6304 ? Ss 17:21 0:06 /usr/bin/dbus-daemon --system --address=systemd: --nofork --nopidfile --systemd-activation --syslog-only Output of dmesg: [ 1008.048735] fuse init (API version 7.28) [13633.617396] usb 1-4: new high-speed USB device number 4 using ehci-pci [13633.778306] usb 1-4: New USB device found, idVendor=03f0, idProduct=6612, bcdDevice= 1.00 [13633.778313] usb 1-4: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [13633.778317] usb 1-4: Product: Deskjet 4620 series [13633.778321] usb 1-4: Manufacturer: HP [13633.778325] usb 1-4: SerialNumber: CN2AH210MB05TN [13634.051756] Did not find alt setting 1 for intf 0, config 1 [13634.052011] Did not find alt setting 1 for intf 0, config 1 [13634.088628] usblp 1-4:1.1: usblp0: USB Bidirectional printer dev 4 if 1 alt 0 proto 2 vid 0x03F0 pid 0x6612 [13634.089454] usblp 1-4:1.2: usblp1: USB Bidirectional printer dev 4 if 2 alt 0 proto 2 vid 0x03F0 pid 0x6612 [13634.089493] usbcore: registered new interface driver usblp [13639.416880] usblp0: removed [13639.419597] usblp 1-4:1.1: usblp0: USB Bidirectional printer dev 4 if 1 alt 0 proto 2 vid 0x03F0 pid 0x6612 [13639.419713] usblp1: removed [13639.421211] usblp 1-4:1.2: usblp1: USB Bidirectional printer dev 4 if 2 alt 0 proto 2 vid 0x03F0 pid 0x6612 [13693.559333] usblp0: removed [13693.559476] Did not find alt setting 1 for intf 0, config 1 [13800.437507] usb 1-4: USB disconnect, device number 4 [13800.438010] usblp1: removed [21567.380627] BTRFS info (device sda1): disk space caching is enabled [21567.380630] BTRFS info (device sda1): has skinny extents [21567.999694] BUG: unable to handle kernel NULL pointer dereference at 0000000000000068 [21567.999702] #PF error: [normal kernel read fault] [21567.999706] PGD 0 P4D 0 [21567.999712] Oops: 0000 [#1] SMP NOPTI [21567.999718] CPU: 6 PID: 21331 Comm: mount Not tainted 5.0.2-1-default #1 openSUSE Tumbleweed (unreleased) [21567.999723] Hardware name: To Be Filled By O.E.M. To Be Filled By O.E.M./980DE3/U3S3, BIOS P2.00 09/04/2015 [21567.999784] RIP: 0010:btrfs_qgroup_trace_subtree_swap+0xb2/0x380 [btrfs] [21567.999789] Code: 65 ba 19 00 00 00 4c 89 fe e8 ea 14 fb ff 48 3b 04 24 0f 82 70 02 00 00 48 8b 44 24 08 4c 89 f6 31 c9 ba 11 00 00 00 48 89 df <48> 8b 40 68 48 89 44 24 08 e8 c0 14 fb ff 31 c9 4c 89 f6 ba 19 00 [21567.999796] RSP: 0018:ffff9d810a203810 EFLAGS: 00010246 [21567.999800] RAX: 0000000000000000 RBX: ffff8b821f8e36d0 RCX: 0000000000000000 [21567.999804] RDX: 0000000000000011 RSI: 0000000000000065 RDI: ffff8b821f8e36d0 [21567.999808] RBP: ffff8b81d463a9d8 R08: ffff9d810a2037c8 R09: ffff9d810a2037d0 [21567.999812] R10: 0000000000000000 R11: 0000000000000000 R12: ffff8b80e8b78000 [21567.999816] R13: 0000000000000000 R14: 0000000000000065 R15: 0000000000000065 [21567.999821] FS: 00007f095c3f5080(0000) GS:ffff8b8226b80000(0000) knlGS:0000000000000000 [21567.999825] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [21567.999829] CR2: 0000000000000068 CR3: 00000002e8b16000 CR4: 00000000000406e0 [21567.999833] Call Trace: [21567.999886] ? memcmp_node_keys+0x46/0x50 [btrfs] [21567.999936] replace_path.isra.42+0x5f5/0x790 [btrfs] [21567.999987] merge_reloc_root+0x262/0x500 [btrfs] [21568.000036] merge_reloc_roots+0x120/0x1a0 [btrfs] [21568.000086] btrfs_recover_relocation+0x3f0/0x440 [btrfs] [21568.000130] open_ctree+0x1923/0x1c00 [btrfs] [21568.000169] btrfs_mount_root+0x4d2/0x620 [btrfs] [21568.000178] ? cpumask_next+0x16/0x20 [21568.000184] ? pcpu_alloc+0x1a7/0x610 [21568.000189] mount_fs+0x3f/0x14d [21568.000195] vfs_kern_mount.part.37+0x54/0x110 [21568.000232] btrfs_mount+0x14f/0x820 [btrfs] [21568.000239] ? pcpu_block_update_hint_alloc+0x13f/0x1d0 [21568.000245] ? pcpu_alloc_area+0xe4/0x130 [21568.000250] ? pcpu_next_unpop+0x37/0x50 [21568.000254] ? cpumask_next+0x16/0x20 [21568.000259] ? pcpu_alloc+0x1a7/0x610 [21568.000263] ? mount_fs+0x3f/0x14d [21568.000267] mount_fs+0x3f/0x14d [21568.000272] vfs_kern_mount.part.37+0x54/0x110 [21568.000278] do_mount+0x1ec/0xc80 [21568.000283] ? memdup_user+0x3e/0x70 [21568.000288] ksys_mount+0xb6/0xd0 [21568.000293] __x64_sys_mount+0x21/0x30 [21568.000298] do_syscall_64+0x60/0x110 [21568.000311] entry_SYSCALL_64_after_hwframe+0x49/0xbe [21568.000320] RIP: 0033:0x7f095c29f1ca [21568.000329] Code: 48 8b 0d d1 ec 0b 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 9e ec 0b 00 f7 d8 64 89 01 48 [21568.000340] RSP: 002b:00007fff964e3338 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [21568.000349] RAX: ffffffffffffffda RBX: 000055a9ff38d640 RCX: 00007f095c29f1ca [21568.000357] RDX: 000055a9ff38d9b0 RSI: 000055a9ff38d9d0 RDI: 000055a9ff38da80 [21568.000365] RBP: 00007f095c3c71c4 R08: 0000000000000000 R09: 00007f095c2e0400 [21568.000373] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [21568.000381] R13: 0000000000000000 R14: 000055a9ff38da80 R15: 000055a9ff38d9b0 [21568.000390] Modules linked in: usblp fuse xt_tcpudp ip6t_rpfilter ip6t_REJECT nf_reject_ipv6 ipt_REJECT nf_reject_ipv4 xt_conntrack ebtable_nat ip6table_nat nf_nat_ipv6 ip6table_mangle ip6table_raw ip6table_security iptable_nat nf_nat_ipv4 nf_nat iptable_mangle iptable_raw iptable_security nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 ip_set nfnetlink ebtable_filter ebtables scsi_transport_iscsi ip6table_filter ip6_tables iptable_filter ip_tables x_tables bpfilter af_packet twofish_generic twofish_avx_x86_64 twofish_x86_64_3way twofish_x86_64 twofish_common serpent_avx_x86_64 serpent_sse2_x86_64 serpent_generic blowfish_generic blowfish_x86_64 blowfish_common cast5_avx_x86_64 cast5_generic cast_common des_generic algif_skcipher camellia_generic camellia_aesni_avx_x86_64 camellia_x86_64 xcbc sha512_ssse3 sha512_generic md4 algif_hash af_alg xfrm_user xfrm4_tunnel tunnel4 ipcomp xfrm_ipcomp esp4 ah4 af_key xfrm_algo w83627ehf hwmon_vid msr xfs edac_mce_amd snd_hda_codec_hdmi kvm_amd ccp [21568.000434] snd_hda_intel snd_usb_audio snd_hda_codec kvm uvcvideo snd_usbmidi_lib snd_hda_core snd_ctxfi snd_rawmidi snd_seq_device snd_hwdep irqbypass snd_pcm videobuf2_vmalloc videobuf2_memops videobuf2_v4l2 crct10dif_pclmul crc32_pclmul ghash_clmulni_intel videodev snd_timer aesni_intel videobuf2_common aes_x86_64 snd crypto_simd cryptd r8169 soundcore realtek wmi_bmof libphy fam15h_power k10temp button sp5100_tco pcspkr glue_helper pcc_cpufreq i2c_piix4 acpi_cpufreq hid_generic usbhid btrfs libcrc32c xor raid6_pq amdgpu ohci_pci crc32c_intel chash amd_iommu_v2 gpu_sched ata_generic i2c_algo_bit xhci_pci serio_raw ttm xhci_hcd ohci_hcd ehci_pci drm_kms_helper ehci_hcd syscopyarea sysfillrect sysimgblt fb_sys_fops pata_atiixp sr_mod usbcore drm cdrom wmi l2tp_ppp l2tp_netlink l2tp_core ip6_udp_tunnel udp_tunnel pppox ppp_generic slhc sg dm_multipath dm_mod scsi_dh_rdac scsi_dh_emc scsi_dh_alua [21568.000561] CR2: 0000000000000068 [21568.000610] ---[ end trace 9125c38f59164b9c ]--- [21568.000665] RIP: 0010:btrfs_qgroup_trace_subtree_swap+0xb2/0x380 [btrfs] [21568.000685] Code: 65 ba 19 00 00 00 4c 89 fe e8 ea 14 fb ff 48 3b 04 24 0f 82 70 02 00 00 48 8b 44 24 08 4c 89 f6 31 c9 ba 11 00 00 00 48 89 df <48> 8b 40 68 48 89 44 24 08 e8 c0 14 fb ff 31 c9 4c 89 f6 ba 19 00 [21568.000703] RSP: 0018:ffff9d810a203810 EFLAGS: 00010246 [21568.000720] RAX: 0000000000000000 RBX: ffff8b821f8e36d0 RCX: 0000000000000000 [21568.000734] RDX: 0000000000000011 RSI: 0000000000000065 RDI: ffff8b821f8e36d0 [21568.000749] RBP: ffff8b81d463a9d8 R08: ffff9d810a2037c8 R09: ffff9d810a2037d0 [21568.000764] R10: 0000000000000000 R11: 0000000000000000 R12: ffff8b80e8b78000 [21568.000781] R13: 0000000000000000 R14: 0000000000000065 R15: 0000000000000065 [21568.000795] FS: 00007f095c3f5080(0000) GS:ffff8b8226b80000(0000) knlGS:0000000000000000 [21568.000806] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [21568.000814] CR2: 0000000000000068 CR3: 00000002e8b16000 CR4: 00000000000406e0
This looks caused by balance recovery. You could skip balance by skip_balance mount option, as a workaround. I'll look into the NULL pointer dereference by reproducing a similar situation.
(In reply to Wenruo Qu from comment #1) > This looks caused by balance recovery. > > You could skip balance by skip_balance mount option, as a workaround. > > I'll look into the NULL pointer dereference by reproducing a similar > situation. Yes, it looks as a balance problem: Yet again a new crash with the new kernel kernel-default-5.0.13-1.1.x86_64: Result of dmesg: [ 14.443299] audit: type=1400 audit(1557776018.192:2): apparmor="STATUS" operation="profile_load" profile="unconfined" name="ping" pid=839 comm="apparmor_parser" [ 14.495028] audit: type=1400 audit(1557776018.244:3): apparmor="STATUS" operation="profile_load" profile="unconfined" name="ghostscript" pid=859 comm="apparmor_parser" [ 14.495033] audit: type=1400 audit(1557776018.244:4): apparmor="STATUS" operation="profile_load" profile="unconfined" name="ghostscript///usr/bin/basename" pid=859 comm="apparmor_parser" [ 14.495035] audit: type=1400 audit(1557776018.244:5): apparmor="STATUS" operation="profile_load" profile="unconfined" name="ghostscript///usr/bin/dirname" pid=859 comm="apparmor_parser" [ 14.495047] audit: type=1400 audit(1557776018.244:6): apparmor="STATUS" operation="profile_load" profile="unconfined" name="ghostscript///usr/bin/hpijs" pid=859 comm="apparmor_parser" [ 14.537051] audit: type=1400 audit(1557776018.288:7): apparmor="STATUS" operation="profile_load" profile="unconfined" name="nvidia_modprobe" pid=870 comm="apparmor_parser" [ 14.537056] audit: type=1400 audit(1557776018.288:8): apparmor="STATUS" operation="profile_load" profile="unconfined" name="nvidia_modprobe//kmod" pid=870 comm="apparmor_parser" [ 14.563267] audit: type=1400 audit(1557776018.312:9): apparmor="STATUS" operation="profile_load" profile="unconfined" name="klogd" pid=877 comm="apparmor_parser" [ 14.587602] audit: type=1400 audit(1557776018.336:10): apparmor="STATUS" operation="profile_load" profile="unconfined" name="syslogd" pid=884 comm="apparmor_parser" [ 14.610980] audit: type=1400 audit(1557776018.360:11): apparmor="STATUS" operation="profile_load" profile="unconfined" name="syslog-ng" pid=894 comm="apparmor_parser" [ 16.368875] w83627ehf: Found NCT6776F chip at 0x290 [ 16.369454] w83627ehf w83627ehf.656: hwmon_device_register() is deprecated. Please convert the driver to use hwmon_device_register_with_info(). [ 17.734816] NET: Registered protocol family 15 [ 19.573330] Initializing XFRM netlink socket [ 20.181788] NET: Registered protocol family 38 [ 21.620749] AVX2 or AES-NI instructions are not detected. [ 23.807686] bpfilter: Loaded bpfilter_umh pid 1486 [ 24.314466] AVX2 instructions are not detected. [ 24.448616] Loading iSCSI transport class v2.0-870. [ 25.919333] NET: Registered protocol family 17 [ 28.484112] RTL8211E Gigabit Ethernet r8169-500:00: attached PHY driver [RTL8211E Gigabit Ethernet] (mii_bus:phy_addr=r8169-500:00, irq=IGNORE) [ 28.695288] r8169 0000:05:00.0 enp5s0: Link is Down [ 33.337073] r8169 0000:05:00.0 enp5s0: Link is Up - 100Mbps/Full - flow control off [ 33.337090] IPv6: ADDRCONF(NETDEV_CHANGE): enp5s0: link becomes ready [ 35.256397] BTRFS info (device sdb1): balance: start -dusage=0 [ 35.256535] BTRFS info (device sdb1): balance: ended with status: 0 [ 35.734969] BTRFS info (device sdb1): balance: start -dusage=1 [ 35.735091] BTRFS info (device sdb1): balance: ended with status: 0 [ 36.042071] BTRFS info (device sdb1): balance: start -dusage=5 [ 36.042195] BTRFS info (device sdb1): balance: ended with status: 0 [ 36.333709] BTRFS info (device sdb1): balance: start -dusage=10 [ 36.333832] BTRFS info (device sdb1): balance: ended with status: 0 [ 36.676513] BTRFS info (device sdb1): balance: start -dusage=20 [ 36.676722] BTRFS info (device sdb1): relocating block group 100612964352 flags data [ 39.726608] BTRFS info (device sdb1): found 1 extents [ 44.066754] BTRFS info (device sdb1): found 1 extents [ 44.350628] BTRFS info (device sdb1): balance: ended with status: 0 [ 44.591644] BTRFS info (device sdb1): balance: start -dusage=30 [ 44.591855] BTRFS info (device sdb1): relocating block group 88466259968 flags data [ 63.359077] BTRFS info (device sdb1): found 5829 extents [ 82.407947] BTRFS info (device sdb1): found 5829 extents [ 82.926446] BTRFS info (device sdb1): relocating block group 86120595456 flags data [ 85.421049] BTRFS info (device sdb1): found 1586 extents [ 94.004986] BTRFS info (device sdb1): found 1586 extents [ 94.276488] BTRFS info (device sdb1): balance: ended with status: 0 [ 94.635608] BTRFS info (device sdb1): balance: start -dusage=40 [ 94.635815] BTRFS info (device sdb1): relocating block group 87395663872 flags data [ 95.818786] BTRFS info (device sdb1): found 91 extents [ 98.423094] BTRFS info (device sdb1): found 91 extents [ 98.637107] BTRFS info (device sdb1): balance: ended with status: 0 [ 98.819395] BTRFS info (device sdb1): balance: start -dusage=50 [ 98.819507] BTRFS info (device sdb1): relocating block group 77530660864 flags data [ 103.560642] BTRFS info (device sdb1): found 3083 extents [ 122.527493] BTRFS info (device sdb1): found 3083 extents [ 122.760586] BTRFS info (device sdb1): balance: ended with status: 0 [ 123.157468] BTRFS info (device sdb1): balance: start -musage=0 -susage=0 [ 123.157568] BTRFS info (device sdb1): balance: ended with status: 0 [ 123.307426] BTRFS info (device sdb1): balance: start -musage=1 -susage=1 [ 123.307708] BTRFS info (device sdb1): relocating block group 98968797184 flags system|dup [ 123.524365] BTRFS info (device sdb1): balance: ended with status: 0 [ 123.674046] BTRFS info (device sdb1): balance: start -musage=5 -susage=5 [ 123.674321] BTRFS info (device sdb1): relocating block group 100344528896 flags system|dup [ 123.890934] BTRFS info (device sdb1): balance: ended with status: 0 [ 124.040694] BTRFS info (device sdb1): balance: start -musage=10 -susage=10 [ 124.040969] BTRFS info (device sdb1): relocating block group 100378083328 flags system|dup [ 124.249278] BTRFS info (device sdb1): relocating block group 100076093440 flags metadata|dup [ 130.064360] BTRFS info (device sdb1): found 1203 extents [ 130.298674] BTRFS info (device sdb1): balance: ended with status: 0 [ 130.489989] BTRFS info (device sdb1): balance: start -musage=20 -susage=20 [ 130.490306] BTRFS info (device sdb1): relocating block group 100411637760 flags system|dup [ 130.765251] BTRFS info (device sdb1): balance: ended with status: 0 [ 130.948246] BTRFS info (device sdb1): balance: start -musage=30 -susage=30 [ 130.948515] BTRFS info (device sdb1): relocating block group 100445192192 flags system|dup [ 131.215187] BTRFS info (device sdb1): balance: ended with status: 0 [ 165.645938] fuse init (API version 7.28) [29969.309319] BTRFS info (device sda1): disk space caching is enabled [29969.309323] BTRFS info (device sda1): has skinny extents [29969.975805] BUG: unable to handle kernel NULL pointer dereference at 0000000000000068 [29969.975815] #PF error: [normal kernel read fault] [29969.975820] PGD 0 P4D 0 [29969.975828] Oops: 0000 [#1] SMP NOPTI [29969.975835] CPU: 2 PID: 3422 Comm: mount Not tainted 5.0.2-1-default #1 openSUSE Tumbleweed (unreleased) [29969.975841] Hardware name: To Be Filled By O.E.M. To Be Filled By O.E.M./980DE3/U3S3, BIOS P2.00 09/04/2015 [29969.975920] RIP: 0010:btrfs_qgroup_trace_subtree_swap+0xb2/0x380 [btrfs] [29969.975926] Code: 65 ba 19 00 00 00 4c 89 fe e8 ea 14 fb ff 48 3b 04 24 0f 82 70 02 00 00 48 8b 44 24 08 4c 89 f6 31 c9 ba 11 00 00 00 48 89 df <48> 8b 40 68 48 89 44 24 08 e8 c0 14 fb ff 31 c9 4c 89 f6 ba 19 00 [29969.975935] RSP: 0018:ffffb361c9e9f810 EFLAGS: 00010246 [29969.975940] RAX: 0000000000000000 RBX: ffff9ccf2d3c8c48 RCX: 0000000000000000 [29969.975948] RDX: 0000000000000011 RSI: 0000000000000065 RDI: ffff9ccf2d3c8c48 [29969.975953] RBP: ffff9ccf39ee68c0 R08: ffffb361c9e9f7c8 R09: ffffb361c9e9f7d0 [29969.975958] R10: 0000000000000000 R11: 0000000000000000 R12: ffff9ccd9eaa8000 [29969.975963] R13: 0000000000000000 R14: 0000000000000065 R15: 0000000000000065 [29969.975969] FS: 00007f121478b080(0000) GS:ffff9ccf66a80000(0000) knlGS:0000000000000000 [29969.975974] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [29969.975979] CR2: 0000000000000068 CR3: 0000000261e6e000 CR4: 00000000000406e0 [29969.975984] Call Trace: [29969.976053] ? memcmp_node_keys+0x46/0x50 [btrfs] [29969.976115] replace_path.isra.42+0x5f5/0x790 [btrfs] [29969.976181] merge_reloc_root+0x262/0x500 [btrfs] [29969.976245] merge_reloc_roots+0x120/0x1a0 [btrfs] [29969.976309] btrfs_recover_relocation+0x3f0/0x440 [btrfs] [29969.976366] open_ctree+0x1923/0x1c00 [btrfs] [29969.976416] btrfs_mount_root+0x4d2/0x620 [btrfs] [29969.976426] ? cpumask_next+0x16/0x20 [29969.976434] ? pcpu_alloc+0x1a7/0x610 [29969.976441] mount_fs+0x3f/0x14d [29969.976449] vfs_kern_mount.part.37+0x54/0x110 [29969.976497] btrfs_mount+0x14f/0x820 [btrfs] [29969.976506] ? pcpu_block_update_hint_alloc+0x13f/0x1d0 [29969.976514] ? pcpu_alloc_area+0xe4/0x130 [29969.976520] ? pcpu_next_unpop+0x37/0x50 [29969.976526] ? cpumask_next+0x16/0x20 [29969.976532] ? pcpu_alloc+0x1a7/0x610 [29969.976538] ? mount_fs+0x3f/0x14d [29969.976542] mount_fs+0x3f/0x14d [29969.976549] vfs_kern_mount.part.37+0x54/0x110 [29969.976556] do_mount+0x1ec/0xc80 [29969.976563] ? memdup_user+0x3e/0x70 [29969.976569] ksys_mount+0xb6/0xd0 [29969.976576] __x64_sys_mount+0x21/0x30 [29969.976583] do_syscall_64+0x60/0x110 [29969.976590] entry_SYSCALL_64_after_hwframe+0x49/0xbe [29969.976596] RIP: 0033:0x7f12146371ca [29969.976601] Code: 48 8b 0d d1 ec 0b 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 9e ec 0b 00 f7 d8 64 89 01 48 [29969.976610] RSP: 002b:00007ffdea7324f8 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [29969.976616] RAX: ffffffffffffffda RBX: 00005607df06d640 RCX: 00007f12146371ca [29969.976621] RDX: 00005607df06d9b0 RSI: 00005607df06d9d0 RDI: 00005607df06da80 [29969.976626] RBP: 00007f121475f1c4 R08: 0000000000000000 R09: 00007f1214678400 [29969.976631] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [29969.976644] R13: 0000000000000000 R14: 00005607df06da80 R15: 00005607df06d9b0 [29969.976655] Modules linked in: fuse xt_tcpudp ip6t_rpfilter ip6t_REJECT nf_reject_ipv6 ipt_REJECT nf_reject_ipv4 xt_conntrack ebtable_nat ip6table_nat nf_nat_ipv6 ip6table_mangle ip6table_raw ip6table_security iptable_nat nf_nat_ipv4 nf_nat iptable_mangle iptable_raw iptable_security nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 ip_set nfnetlink ebtable_filter ebtables af_packet twofish_generic twofish_avx_x86_64 twofish_x86_64_3way twofish_x86_64 twofish_common scsi_transport_iscsi serpent_avx_x86_64 ip6table_filter ip6_tables iptable_filter ip_tables serpent_sse2_x86_64 x_tables bpfilter serpent_generic blowfish_generic blowfish_x86_64 blowfish_common cast5_avx_x86_64 cast5_generic cast_common des_generic algif_skcipher camellia_generic camellia_aesni_avx_x86_64 camellia_x86_64 xcbc sha512_ssse3 sha512_generic md4 algif_hash af_alg xfrm_user xfrm4_tunnel tunnel4 ipcomp xfrm_ipcomp esp4 ah4 af_key xfrm_algo w83627ehf hwmon_vid msr edac_mce_amd kvm_amd xfs ccp kvm irqbypass crct10dif_pclmul [29969.976712] snd_hda_codec_hdmi crc32_pclmul snd_usb_audio snd_hda_intel ghash_clmulni_intel snd_hda_codec snd_hda_core snd_usbmidi_lib snd_rawmidi snd_hwdep snd_seq_device snd_ctxfi snd_pcm snd_timer snd aesni_intel uvcvideo videobuf2_vmalloc videobuf2_memops r8169 videobuf2_v4l2 videodev aes_x86_64 crypto_simd cryptd realtek videobuf2_common soundcore libphy sp5100_tco pcspkr wmi_bmof glue_helper button pcc_cpufreq acpi_cpufreq i2c_piix4 fam15h_power k10temp hid_generic usbhid btrfs libcrc32c xor raid6_pq amdgpu ohci_pci crc32c_intel ata_generic chash amd_iommu_v2 gpu_sched i2c_algo_bit ttm serio_raw xhci_pci xhci_hcd drm_kms_helper ehci_pci ohci_hcd ehci_hcd syscopyarea sysfillrect pata_atiixp sysimgblt fb_sys_fops usbcore sr_mod drm cdrom wmi l2tp_ppp l2tp_netlink l2tp_core ip6_udp_tunnel udp_tunnel pppox ppp_generic slhc sg dm_multipath dm_mod scsi_dh_rdac scsi_dh_emc scsi_dh_alua [29969.976875] CR2: 0000000000000068 [29969.976887] ---[ end trace 108c4276d52edd1d ]--- [29969.976956] RIP: 0010:btrfs_qgroup_trace_subtree_swap+0xb2/0x380 [btrfs] [29969.976968] Code: 65 ba 19 00 00 00 4c 89 fe e8 ea 14 fb ff 48 3b 04 24 0f 82 70 02 00 00 48 8b 44 24 08 4c 89 f6 31 c9 ba 11 00 00 00 48 89 df <48> 8b 40 68 48 89 44 24 08 e8 c0 14 fb ff 31 c9 4c 89 f6 ba 19 00 [29969.976982] RSP: 0018:ffffb361c9e9f810 EFLAGS: 00010246 [29969.976993] RAX: 0000000000000000 RBX: ffff9ccf2d3c8c48 RCX: 0000000000000000 [29969.977003] RDX: 0000000000000011 RSI: 0000000000000065 RDI: ffff9ccf2d3c8c48 [29969.977014] RBP: ffff9ccf39ee68c0 R08: ffffb361c9e9f7c8 R09: ffffb361c9e9f7d0 [29969.977024] R10: 0000000000000000 R11: 0000000000000000 R12: ffff9ccd9eaa8000 [29969.977034] R13: 0000000000000000 R14: 0000000000000065 R15: 0000000000000065 [29969.977046] FS: 00007f121478b080(0000) GS:ffff9ccf66a80000(0000) knlGS:0000000000000000 [29969.977057] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [29969.977107] CR2: 0000000000000068 CR3: 0000000261e6e000 CR4: 00000000000406e0
If your primary objective is to continue, you need to mount it with skip_balance, and then cancel the current running balance by "btrfs balance cancel <mount point>". Or next time you will hit the same problem.
(In reply to Wenruo Qu from comment #3) > If your primary objective is to continue, you need to mount it with > skip_balance, and then cancel the current running balance by "btrfs balance > cancel <mount point>". > > Or next time you will hit the same problem. If I add a script for the init or boot of the system, the FS will never get a btrfs balance. I mean the better way is to add a script to the rpm of the kernel installer to skip the btrfs balance for the first run of the new kernel. Thanks
(In reply to Juan Erbes from comment #4) > (In reply to Wenruo Qu from comment #3) > > If your primary objective is to continue, you need to mount it with > > skip_balance, and then cancel the current running balance by "btrfs balance > > cancel <mount point>". > > > > Or next time you will hit the same problem. > > If I add a script for the init or boot of the system, the FS will never get > a btrfs balance. It's just a workaround. You can finish balance when mounted. The recovery part is only going to restart the paused balance. Paused one can be caused by either a crash during balance or manually paused. > I mean the better way is to add a script to the rpm of the kernel installer > to skip the btrfs balance for the first run of the new kernel. Would you please try upstream v5.1 first? A lot of qgroup changes are merged in v5.1 and incoming v5.2-rc. Maybe it's already fixed upstream. Thanks. > > Thanks
Yesterday with the New Tumbleweed snapshot 20190516, the problem continues: [ 25.149933] RTL8211E Gigabit Ethernet r8169-500:00: attached PHY driver [RTL8211E Gigabit Ethernet] (mii_bus:phy_addr=r8169-500:00, irq=IGNORE) [ 25.350172] r8169 0000:05:00.0 enp5s0: Link is Down [ 29.686101] r8169 0000:05:00.0 enp5s0: Link is Up - 100Mbps/Full - flow control off [ 29.686117] IPv6: ADDRCONF(NETDEV_CHANGE): enp5s0: link becomes ready [ 78.138216] fuse init (API version 7.28) [14515.134235] BTRFS info (device sda1): disk space caching is enabled [14515.134238] BTRFS info (device sda1): has skinny extents [14515.730000] BUG: unable to handle kernel NULL pointer dereference at 0000000000000068 [14515.730010] #PF error: [normal kernel read fault] [14515.730015] PGD 0 P4D 0 [14515.730022] Oops: 0000 [#1] SMP NOPTI [14515.730030] CPU: 0 PID: 16160 Comm: mount Not tainted 5.0.2-1-default #1 openSUSE Tumbleweed (unreleased) [14515.730036] Hardware name: To Be Filled By O.E.M. To Be Filled By O.E.M./980DE3/U3S3, BIOS P2.00 09/04/2015 [14515.730115] RIP: 0010:btrfs_qgroup_trace_subtree_swap+0xb2/0x380 [btrfs] [14515.730122] Code: 65 ba 19 00 00 00 4c 89 fe e8 ea 14 fb ff 48 3b 04 24 0f 82 70 02 00 00 48 8b 44 24 08 4c 89 f6 31 c9 ba 11 00 00 00 48 89 df <48> 8b 40 68 48 89 44 24 08 e8 c0 14 fb ff 31 c9 4c 89 f6 ba 19 00 [14515.730131] RSP: 0018:ffffa026c7f1f810 EFLAGS: 00010246 [14515.730136] RAX: 0000000000000000 RBX: ffff892103c8c578 RCX: 0000000000000000 [14515.730141] RDX: 0000000000000011 RSI: 0000000000000065 RDI: ffff892103c8c578 [14515.730146] RBP: ffff892103c8c7a8 R08: ffffa026c7f1f7c8 R09: ffffa026c7f1f7d0 [14515.730151] R10: 0000000000000000 R11: 0000000000000000 R12: ffff892107cc2000 [14515.730156] R13: 0000000000000000 R14: 0000000000000065 R15: 0000000000000065 [14515.730162] FS: 00007fa9815dd080(0000) GS:ffff892266a00000(0000) knlGS:0000000000000000 [14515.730168] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [14515.730173] CR2: 0000000000000068 CR3: 000000041f814000 CR4: 00000000000406f0 [14515.730178] Call Trace: [14515.730246] ? memcmp_node_keys+0x46/0x50 [btrfs] [14515.730310] replace_path.isra.42+0x5f5/0x790 [btrfs] [14515.730375] merge_reloc_root+0x262/0x500 [btrfs] [14515.730440] merge_reloc_roots+0x120/0x1a0 [btrfs] [14515.730507] btrfs_recover_relocation+0x3f0/0x440 [btrfs] [14515.730564] open_ctree+0x1923/0x1c00 [btrfs] [14515.730614] btrfs_mount_root+0x4d2/0x620 [btrfs] [14515.730625] ? pcpu_chunk_refresh_hint+0x74/0xd0 [14515.730633] ? cpumask_next+0x16/0x20 [14515.730640] ? pcpu_alloc+0x1a7/0x610 [14515.730646] mount_fs+0x3f/0x14d [14515.730654] vfs_kern_mount.part.37+0x54/0x110 [14515.730703] btrfs_mount+0x14f/0x820 [btrfs] [14515.730711] ? pcpu_block_update_hint_alloc+0x13f/0x1d0 [14515.730718] ? pcpu_cnt_pop_pages+0x40/0x50 [14515.730725] ? pcpu_alloc_area+0xe4/0x130 [14515.730731] ? pcpu_next_unpop+0x37/0x50 [14515.730736] ? cpumask_next+0x16/0x20 [14515.730742] ? pcpu_alloc+0x1a7/0x610 [14515.730748] ? mount_fs+0x3f/0x14d [14515.730753] mount_fs+0x3f/0x14d [14515.730760] vfs_kern_mount.part.37+0x54/0x110 [14515.730767] do_mount+0x1ec/0xc80 [14515.730773] ? memdup_user+0x3e/0x70 [14515.730779] ksys_mount+0xb6/0xd0 [14515.730786] __x64_sys_mount+0x21/0x30 [14515.730793] do_syscall_64+0x60/0x110 [14515.730800] entry_SYSCALL_64_after_hwframe+0x49/0xbe [14515.730815] RIP: 0033:0x7fa9814571ca [14515.730825] Code: 48 8b 0d d1 ec 0b 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 9e ec 0b 00 f7 d8 64 89 01 48 [14515.730839] RSP: 002b:00007ffc98b5b358 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [14515.730851] RAX: ffffffffffffffda RBX: 000055de11d6d640 RCX: 00007fa9814571ca [14515.730861] RDX: 000055de11d6d9b0 RSI: 000055de11d6d9d0 RDI: 000055de11d6da80 [14515.730872] RBP: 00007fa98157f1c4 R08: 0000000000000000 R09: 00007fa981498400 [14515.730882] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [14515.730892] R13: 0000000000000000 R14: 000055de11d6da80 R15: 000055de11d6d9b0 [14515.730904] Modules linked in: fuse xt_tcpudp ip6t_rpfilter ip6t_REJECT nf_reject_ipv6 ipt_REJECT nf_reject_ipv4 xt_conntrack ebtable_nat ip6table_nat nf_nat_ipv6 ip6table_mangle ip6table_raw ip6table_security iptable_nat nf_nat_ipv4 nf_nat iptable_mangle iptable_raw iptable_security nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 ip_set nfnetlink ebtable_filter ebtables scsi_transport_iscsi af_packet ip6table_filter ip6_tables iptable_filter ip_tables x_tables bpfilter twofish_generic twofish_avx_x86_64 twofish_x86_64_3way twofish_x86_64 twofish_common serpent_avx_x86_64 serpent_sse2_x86_64 serpent_generic blowfish_generic blowfish_x86_64 blowfish_common cast5_avx_x86_64 cast5_generic cast_common des_generic algif_skcipher camellia_generic camellia_aesni_avx_x86_64 camellia_x86_64 xcbc sha512_ssse3 sha512_generic md4 algif_hash af_alg xfrm_user xfrm4_tunnel tunnel4 ipcomp xfrm_ipcomp esp4 ah4 af_key xfrm_algo w83627ehf hwmon_vid msr edac_mce_amd kvm_amd ccp kvm irqbypass crct10dif_pclmul [14515.730959] crc32_pclmul xfs ghash_clmulni_intel snd_hda_codec_hdmi snd_hda_intel snd_usb_audio snd_hda_codec uvcvideo snd_usbmidi_lib snd_ctxfi snd_hda_core videobuf2_vmalloc videobuf2_memops videobuf2_v4l2 snd_rawmidi snd_hwdep snd_seq_device videodev aesni_intel snd_pcm videobuf2_common aes_x86_64 snd_timer crypto_simd snd cryptd glue_helper wmi_bmof sp5100_tco r8169 pcspkr realtek k10temp fam15h_power pcc_cpufreq soundcore libphy acpi_cpufreq button i2c_piix4 hid_generic usbhid btrfs libcrc32c xor raid6_pq amdgpu ohci_pci chash amd_iommu_v2 crc32c_intel gpu_sched i2c_algo_bit ata_generic ttm serio_raw xhci_pci drm_kms_helper xhci_hcd ohci_hcd ehci_pci syscopyarea sysfillrect ehci_hcd sysimgblt fb_sys_fops pata_atiixp usbcore sr_mod drm cdrom wmi l2tp_ppp l2tp_netlink l2tp_core ip6_udp_tunnel udp_tunnel pppox ppp_generic slhc sg dm_multipath dm_mod scsi_dh_rdac scsi_dh_emc scsi_dh_alua [14515.731120] CR2: 0000000000000068 [14515.731131] ---[ end trace ee05bbc64cf75af6 ]--- [14515.731200] RIP: 0010:btrfs_qgroup_trace_subtree_swap+0xb2/0x380 [btrfs] [14515.731212] Code: 65 ba 19 00 00 00 4c 89 fe e8 ea 14 fb ff 48 3b 04 24 0f 82 70 02 00 00 48 8b 44 24 08 4c 89 f6 31 c9 ba 11 00 00 00 48 89 df <48> 8b 40 68 48 89 44 24 08 e8 c0 14 fb ff 31 c9 4c 89 f6 ba 19 00 [14515.731226] RSP: 0018:ffffa026c7f1f810 EFLAGS: 00010246 [14515.731237] RAX: 0000000000000000 RBX: ffff892103c8c578 RCX: 0000000000000000 [14515.731247] RDX: 0000000000000011 RSI: 0000000000000065 RDI: ffff892103c8c578 [14515.731258] RBP: ffff892103c8c7a8 R08: ffffa026c7f1f7c8 R09: ffffa026c7f1f7d0 [14515.731268] R10: 0000000000000000 R11: 0000000000000000 R12: ffff892107cc2000 [14515.731279] R13: 0000000000000000 R14: 0000000000000065 R15: 0000000000000065 [14515.731290] FS: 00007fa9815dd080(0000) GS:ffff892266a00000(0000) knlGS:0000000000000000 [14515.731301] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [14515.731311] CR2: 0000000000000068 CR3: 000000041f814000 CR4: 00000000000406f0 Tried to remount the file system: df S.ficheros bloques de 1K Usados Disponibles Uso% Montado en devtmpfs 8156916 8 8156908 1% /dev tmpfs 8202932 43548 8159384 1% /dev/shm tmpfs 8202932 9848 8193084 1% /run tmpfs 8202932 0 8202932 0% /sys/fs/cgroup /dev/sdb1 41945088 34304060 5982868 86% / /dev/sdb1 41945088 34304060 5982868 86% /.snapshots /dev/sdb1 41945088 34304060 5982868 86% /srv /dev/sdb1 41945088 34304060 5982868 86% /var /dev/sdb1 41945088 34304060 5982868 86% /boot/grub2/x86_64-efi /dev/sdb1 41945088 34304060 5982868 86% /boot/grub2/i386-pc /dev/sdb1 41945088 34304060 5982868 86% /usr/local /dev/sdb1 41945088 34304060 5982868 86% /opt /dev/sdb1 41945088 34304060 5982868 86% /root /dev/sdb1 41945088 34304060 5982868 86% /tmp /dev/sdb2 1910635004 1260914936 649720068 66% /home tmpfs 1640584 20 1640564 1% /run/user/1000 # btrfs balance cancel /dev/sdb1 ERROR: not a btrfs filesystem: /dev/sdb1 umount /dev/sdb1 umount: /: el destino está ocupado.
Confirmed. The problem is, in relocation recovery routine, we call btrfs_qgroup_trace_subtree_swap() with rc->block_group. However in recovery routine, we don't fill rc->block_group as we don't have enough info to know which block group we're relocating. It should also cause problem for latest upstream. Fix under way.
Output ps -aux with update kernel-5.1.3-1-default root 16280 0.0 0.0 14040 6212 pts/0 S 21:03 0:00 /usr/bin/systemd-inhibit --what=sleep:shutdown:idle --who=zypp --mode=block --why=Zypp commit running. /usr/bin/cat root 16281 0.0 0.0 6980 3492 pts/0 S+ 21:03 0:00 /bin/bash /usr/lib/zypp/plugins/commit/btrfs-defrag-plugin.sh root 16282 0.0 0.0 5380 836 pts/0 S 21:03 0:00 /usr/bin/cat root 16288 0.0 0.0 19840 13440 pts/0 S+ 21:03 0:00 /usr/bin/python3 /usr/lib/zypp/plugins/commit/snapper.py root 16290 0.0 0.0 87120 7216 ? Sl 21:03 0:00 /usr/sbin/snapperd root 16813 0.0 0.0 0 0 ? I 19:20 0:05 [kworker/1:1-events] root 16856 0.0 0.0 0 0 ? I 19:20 0:00 [kworker/3:1-events] root 16868 0.0 0.0 0 0 ? I 19:20 0:05 [kworker/4:0-events] root 17164 0.1 0.0 0 0 ? I 19:22 0:08 [kworker/2:5-events] jerbes 17412 0.0 0.0 66636 5204 ? S 19:27 0:00 /usr/lib64/libexec/kf5/kdesud root 17469 0.0 0.0 7868 2392 ? S 19:27 0:00 dbus-launch --autolaunch 23b48a893c0c444a91d6c360f7caac24 --binary-syntax --close-stderr root 17470 0.0 0.0 7120 2488 ? Ss 19:27 0:00 /usr/bin/dbus-daemon --syslog-only --fork --print-pid 5 --print-address 7 --session root 17705 0.0 0.0 0 0 ? I 21:11 0:00 [kworker/6:0-xfs-cil/sdb2] root 17718 0.0 0.0 0 0 ? I 21:11 0:00 [kworker/u16:0-btrfs-endio-write] root 17737 0.1 0.0 0 0 ? I 21:12 0:00 [kworker/u16:2-btrfs-endio-write] root 17865 0.0 0.0 0 0 ? I 21:15 0:00 [kworker/5:1-events] root 17919 0.0 0.0 0 0 ? I 21:16 0:00 [kworker/6:1-events] root 18021 0.2 0.0 0 0 ? I 21:19 0:00 [kworker/u16:1-btrfs-endio-write] root 18028 0.3 0.0 0 0 ? I 21:19 0:00 [kworker/u16:4-btrfs-endio-write] root 18029 0.5 0.0 0 0 ? I 21:19 0:00 [kworker/u16:5-btrfs-endio-write] root 18030 0.3 0.0 0 0 ? I 21:19 0:00 [kworker/u16:7-btrfs-submit] root 18031 0.3 0.0 0 0 ? I 21:19 0:00 [kworker/u16:8-events_unbound] root 18032 0.1 0.0 0 0 ? I 21:19 0:00 [kworker/u16:9-btrfs-worker] root 18227 16.6 0.1 22012 19280 pts/0 S+ 21:19 0:09 rpm --root / --dbpath /var/lib/rpm -i --percent --noglob --force --nodeps -- /var/cache/zypp/packages/repo-oss/x86_64/kernel-default-5.1.3-1.2.x8 root 18237 0.2 0.0 0 0 ? I 21:20 0:00 [kworker/u16:10-btrfs-endio-write] root 18238 0.0 0.0 0 0 ? I 21:20 0:00 [kworker/u16:11-btrfs-endio-write] root 18239 0.4 0.0 0 0 ? I 21:20 0:00 [kworker/u16:12-events_unbound] root 18240 0.2 0.0 0 0 ? I 21:20 0:00 [kworker/u16:13-events_unbound] root 18252 0.0 0.0 0 0 ? I 21:20 0:00 [kworker/u16:14-btrfs-worker] root 18253 0.0 0.0 0 0 ? I 21:20 0:00 [kworker/u16:15-btrfs-worker] root 18254 0.0 0.0 3920 2904 pts/0 S+ 21:20 0:00 /bin/sh /var/tmp/rpm-tmp.fMYG52 4 root 18260 0.0 0.0 4316 3396 pts/0 S+ 21:20 0:00 /bin/bash -hB /usr/lib/module-init-tools/weak-modules2 --add-kernel 5.1.3-1-default root 18271 0.0 0.0 4316 2316 pts/0 S+ 21:20 0:00 /bin/bash -hB /usr/lib/module-init-tools/weak-modules2 --add-kernel 5.1.3-1-default jerbes 18275 2.6 0.6 1269808 111792 ? Rl 21:20 0:01 /usr/bin/konsole jerbes 18338 0.0 0.0 9436 6328 pts/3 Ss 21:20 0:00 /bin/bash root 18353 0.0 0.0 4052 3284 pts/0 S+ 21:20 0:00 /bin/bash --norc /sbin/mkinitrd -k /boot/vmlinuz-5.1.3-1-default -i /boot/initrd-5.1.3-1-default root 18358 4.0 0.0 11448 5884 pts/0 S+ 21:20 0:01 /bin/bash --norc /usr/bin/dracut --logfile /var/log/YaST2/mkinitrd.log --force /boot/initrd-5.1.3-1-default 5.1.3-1-default Output dmesg: [ 9989.777686] BTRFS info (device sda1): disk space caching is enabled [ 9989.777689] BTRFS info (device sda1): has skinny extents [ 9990.385542] BUG: unable to handle kernel NULL pointer dereference at 0000000000000068 [ 9990.385553] #PF error: [normal kernel read fault] [ 9990.385558] PGD 0 P4D 0 [ 9990.385565] Oops: 0000 [#1] SMP NOPTI [ 9990.385573] CPU: 2 PID: 6124 Comm: mount Not tainted 5.0.2-1-default #1 openSUSE Tumbleweed (unreleased) [ 9990.385578] Hardware name: To Be Filled By O.E.M. To Be Filled By O.E.M./980DE3/U3S3, BIOS P2.00 09/04/2015 [ 9990.385657] RIP: 0010:btrfs_qgroup_trace_subtree_swap+0xb2/0x380 [btrfs] [ 9990.385664] Code: 65 ba 19 00 00 00 4c 89 fe e8 ea 14 fb ff 48 3b 04 24 0f 82 70 02 00 00 48 8b 44 24 08 4c 89 f6 31 c9 ba 11 00 00 00 48 89 df <48> 8b 40 68 48 89 44 24 08 e8 c0 14 fb ff 31 c9 4c 89 f6 ba 19 00 [ 9990.385673] RSP: 0018:ffffb46a49993810 EFLAGS: 00010246 [ 9990.385678] RAX: 0000000000000000 RBX: ffff9ee0f94cf690 RCX: 0000000000000000 [ 9990.385683] RDX: 0000000000000011 RSI: 0000000000000065 RDI: ffff9ee0f94cf690 [ 9990.385688] RBP: ffff9ee0eb2da9d8 R08: ffffb46a499937c8 R09: ffffb46a499937d0 [ 9990.385693] R10: 0000000000000000 R11: 0000000000000000 R12: ffff9ee0dd4f8000 [ 9990.385698] R13: 0000000000000000 R14: 0000000000000065 R15: 0000000000000065 [ 9990.385705] FS: 00007fc7b8cc6080(0000) GS:ffff9ee266a80000(0000) knlGS:0000000000000000 [ 9990.385710] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 9990.385715] CR2: 0000000000000068 CR3: 000000029dc8e000 CR4: 00000000000406e0 [ 9990.385720] Call Trace: [ 9990.385788] ? memcmp_node_keys+0x46/0x50 [btrfs] [ 9990.385852] replace_path.isra.42+0x5f5/0x790 [btrfs] [ 9990.385917] merge_reloc_root+0x262/0x500 [btrfs] [ 9990.385982] merge_reloc_roots+0x120/0x1a0 [btrfs] [ 9990.386050] btrfs_recover_relocation+0x3f0/0x440 [btrfs] [ 9990.386107] open_ctree+0x1923/0x1c00 [btrfs] [ 9990.386158] btrfs_mount_root+0x4d2/0x620 [btrfs] [ 9990.386169] ? cpumask_next+0x16/0x20 [ 9990.386176] ? pcpu_alloc+0x1a7/0x610 [ 9990.386183] mount_fs+0x3f/0x14d [ 9990.386191] vfs_kern_mount.part.37+0x54/0x110 [ 9990.386240] btrfs_mount+0x14f/0x820 [btrfs] [ 9990.386249] ? pcpu_block_update_hint_alloc+0x13f/0x1d0 [ 9990.386256] ? pcpu_alloc_area+0xe4/0x130 [ 9990.386263] ? pcpu_next_unpop+0x37/0x50 [ 9990.386268] ? cpumask_next+0x16/0x20 [ 9990.386274] ? pcpu_alloc+0x1a7/0x610 [ 9990.386280] ? mount_fs+0x3f/0x14d [ 9990.386285] mount_fs+0x3f/0x14d [ 9990.386291] vfs_kern_mount.part.37+0x54/0x110 [ 9990.386299] do_mount+0x1ec/0xc80 [ 9990.386305] ? memdup_user+0x3e/0x70 [ 9990.386311] ksys_mount+0xb6/0xd0 [ 9990.386318] __x64_sys_mount+0x21/0x30 [ 9990.386325] do_syscall_64+0x60/0x110 [ 9990.386332] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 9990.386338] RIP: 0033:0x7fc7b8b3f1ca [ 9990.386343] Code: 48 8b 0d d1 ec 0b 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 9e ec 0b 00 f7 d8 64 89 01 48 [ 9990.386352] RSP: 002b:00007fff454e3868 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 9990.386359] RAX: ffffffffffffffda RBX: 000055c6e5153640 RCX: 00007fc7b8b3f1ca [ 9990.386363] RDX: 000055c6e51539b0 RSI: 000055c6e51539d0 RDI: 000055c6e5153a80 [ 9990.386368] RBP: 00007fc7b8c671c4 R08: 0000000000000000 R09: 00007fc7b8b80400 [ 9990.386373] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 9990.386386] R13: 0000000000000000 R14: 000055c6e5153a80 R15: 000055c6e51539b0 [ 9990.386398] Modules linked in: snd_hda_codec_hdmi snd_hda_intel snd_hda_codec snd_hda_core snd_hwdep joydev fuse xt_tcpudp ip6t_rpfilter ip6t_REJECT nf_reject_ipv6 ipt_REJECT nf_reject_ipv4 xt_conntrack ebtable_nat ip6table_nat nf_nat_ipv6 ip6table_mangle ip6table_raw ip6table_security iptable_nat nf_nat_ipv4 nf_nat iptable_mangle iptable_raw iptable_security nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 ip_set nfnetlink ebtable_filter ebtables scsi_transport_iscsi ip6table_filter ip6_tables iptable_filter ip_tables x_tables bpfilter af_packet twofish_generic twofish_avx_x86_64 twofish_x86_64_3way twofish_x86_64 twofish_common serpent_avx_x86_64 serpent_sse2_x86_64 serpent_generic blowfish_generic blowfish_x86_64 blowfish_common cast5_avx_x86_64 cast5_generic cast_common des_generic algif_skcipher camellia_generic camellia_aesni_avx_x86_64 camellia_x86_64 xcbc sha512_ssse3 sha512_generic md4 algif_hash af_alg xfrm_user xfrm4_tunnel tunnel4 ipcomp xfrm_ipcomp esp4 ah4 af_key xfrm_algo msr [ 9990.386452] w83627ehf hwmon_vid xfs edac_mce_amd kvm_amd ccp kvm uvcvideo irqbypass snd_ctxfi videobuf2_vmalloc videobuf2_memops videobuf2_v4l2 snd_pcm videodev crct10dif_pclmul crc32_pclmul ghash_clmulni_intel snd_timer videobuf2_common aesni_intel snd aes_x86_64 crypto_simd cryptd glue_helper pcspkr soundcore sp5100_tco k10temp r8169 button pcc_cpufreq realtek libphy acpi_cpufreq fam15h_power i2c_piix4 wmi_bmof hid_generic usbhid btrfs libcrc32c xor raid6_pq amdgpu ohci_pci sr_mod cdrom crc32c_intel chash amd_iommu_v2 gpu_sched i2c_algo_bit ttm xhci_pci serio_raw drm_kms_helper xhci_hcd ehci_pci ohci_hcd ehci_hcd syscopyarea sysfillrect sysimgblt ata_generic fb_sys_fops pata_atiixp usbcore drm wmi l2tp_ppp l2tp_netlink l2tp_core ip6_udp_tunnel udp_tunnel pppox ppp_generic slhc sg dm_multipath dm_mod scsi_dh_rdac scsi_dh_emc scsi_dh_alua [last unloaded: snd_hda_core] [ 9990.386613] CR2: 0000000000000068 [ 9990.386624] ---[ end trace 13577d0393e8efd0 ]--- [ 9990.386693] RIP: 0010:btrfs_qgroup_trace_subtree_swap+0xb2/0x380 [btrfs] [ 9990.386705] Code: 65 ba 19 00 00 00 4c 89 fe e8 ea 14 fb ff 48 3b 04 24 0f 82 70 02 00 00 48 8b 44 24 08 4c 89 f6 31 c9 ba 11 00 00 00 48 89 df <48> 8b 40 68 48 89 44 24 08 e8 c0 14 fb ff 31 c9 4c 89 f6 ba 19 00 [ 9990.386719] RSP: 0018:ffffb46a49993810 EFLAGS: 00010246 [ 9990.386730] RAX: 0000000000000000 RBX: ffff9ee0f94cf690 RCX: 0000000000000000 [ 9990.386740] RDX: 0000000000000011 RSI: 0000000000000065 RDI: ffff9ee0f94cf690 [ 9990.386750] RBP: ffff9ee0eb2da9d8 R08: ffffb46a499937c8 R09: ffffb46a499937d0 [ 9990.386761] R10: 0000000000000000 R11: 0000000000000000 R12: ffff9ee0dd4f8000 [ 9990.386771] R13: 0000000000000000 R14: 0000000000000065 R15: 0000000000000065 [ 9990.386783] FS: 00007fc7b8cc6080(0000) GS:ffff9ee266a80000(0000) knlGS:0000000000000000 [ 9990.386794] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 9990.386804] CR2: 0000000000000068 CR3: 000000029dc8e000 CR4: 00000000000406e0
Upstream fix sent to the mail list. Will be backported to SLE when upstream fix get merged. Also stable kernel will get backport.
The problem was with the kernel 5.0.2, and when I runned the Yast boot loader configurator, it crashed. I booted the system from the other hard disk (sda1) with Leap 15.1 beta, runned the Yast boot loader configurator (configured the default section Tumbleweed), and now I can boot with the latest kernel: /boot> ls boot.readme grub2 initrd-5.1.3-1-default sysctl.conf-5.0.2-1-default System.map-5.1.2-1-default vmlinux-5.1.3-1-default.gz vmlinuz-5.1.3-1-default config-5.0.2-1-default initrd symvers-5.0.2-1-default.gz sysctl.conf-5.1.2-1-default System.map-5.1.3-1-default vmlinuz config-5.1.2-1-default initrd-5.0.2-1-default symvers-5.1.2-1-default.gz sysctl.conf-5.1.3-1-default vmlinux-5.0.2-1-default.gz vmlinuz-5.0.2-1-default config-5.1.3-1-default initrd-5.1.2-1-default symvers-5.1.3-1-default.gz System.map-5.0.2-1-default vmlinux-5.1.2-1-default.gz vmlinuz-5.1.2-1-default /boot> uname -r 5.1.3-1-default If I I run the Yast boot loader configurator, it don't crashed anymore, but I got with dmesg: [ 240.695285] BTRFS info (device sda1): disk space caching is enabled [ 240.695287] BTRFS info (device sda1): has skinny extents [ 242.100630] BTRFS info (device sda1): disk space caching is enabled [ 242.100633] BTRFS info (device sda1): has skinny extents [ 252.069389] BTRFS info (device sda1): disk space caching is enabled [ 252.069391] BTRFS info (device sda1): has skinny extents [ 252.086744] BTRFS info (device sda1): checking UUID tree [ 252.703623] BTRFS info (device sda1): disk space caching is enabled [ 252.703627] BTRFS info (device sda1): has skinny extents [ 253.056207] BTRFS info (device sda1): disk space caching is enabled [ 253.056210] BTRFS info (device sda1): has skinny extents [ 253.315516] BTRFS info (device sda1): disk space caching is enabled [ 253.315519] BTRFS info (device sda1): has skinny extents [ 253.485545] BTRFS info (device sda1): disk space caching is enabled [ 253.485548] BTRFS info (device sda1): has skinny extents [ 253.654917] BTRFS info (device sda1): disk space caching is enabled [ 253.654920] BTRFS info (device sda1): has skinny extents [ 253.816208] BTRFS info (device sda1): disk space caching is enabled [ 253.816211] BTRFS info (device sda1): has skinny extents [ 254.000944] BTRFS info (device sda1): disk space caching is enabled [ 254.000947] BTRFS info (device sda1): has skinny extents [ 254.160208] BTRFS info (device sda1): disk space caching is enabled [ 254.160210] BTRFS info (device sda1): has skinny extents [ 254.333554] BTRFS info (device sda1): disk space caching is enabled [ 254.333557] BTRFS info (device sda1): has skinny extents [ 254.488683] BTRFS info (device sda1): disk space caching is enabled [ 254.488686] BTRFS info (device sda1): has skinny extents [ 254.659468] BTRFS info (device sda1): disk space caching is enabled [ 254.659471] BTRFS info (device sda1): has skinny extents [ 256.645099] BTRFS info (device sda1): disk space caching is enabled [ 256.645102] BTRFS info (device sda1): has skinny extents [ 652.244815] BTRFS info (device sda1): disk space caching is enabled [ 652.244818] BTRFS info (device sda1): has skinny extents [ 653.598455] BTRFS info (device sda1): disk space caching is enabled [ 653.598459] BTRFS info (device sda1): has skinny extents [ 661.676994] BTRFS info (device sda1): disk space caching is enabled [ 661.676998] BTRFS info (device sda1): has skinny extents [ 661.881929] BTRFS info (device sda1): disk space caching is enabled [ 661.881933] BTRFS info (device sda1): has skinny extents [ 662.153369] BTRFS info (device sda1): disk space caching is enabled [ 662.153372] BTRFS info (device sda1): has skinny extents [ 662.367141] BTRFS info (device sda1): disk space caching is enabled [ 662.367145] BTRFS info (device sda1): has skinny extents [ 662.554114] BTRFS info (device sda1): disk space caching is enabled [ 662.554117] BTRFS info (device sda1): has skinny extents [ 662.736891] BTRFS info (device sda1): disk space caching is enabled [ 662.736894] BTRFS info (device sda1): has skinny extents [ 662.897850] BTRFS info (device sda1): disk space caching is enabled [ 662.897852] BTRFS info (device sda1): has skinny extents [ 663.056486] BTRFS info (device sda1): disk space caching is enabled [ 663.056488] BTRFS info (device sda1): has skinny extents [ 663.264055] BTRFS info (device sda1): disk space caching is enabled [ 663.264057] BTRFS info (device sda1): has skinny extents [ 663.461674] BTRFS info (device sda1): disk space caching is enabled [ 663.461677] BTRFS info (device sda1): has skinny extents [ 663.613796] BTRFS info (device sda1): disk space caching is enabled [ 663.613799] BTRFS info (device sda1): has skinny extents [ 663.777314] BTRFS info (device sda1): disk space caching is enabled [ 663.777317] BTRFS info (device sda1): has skinny extents [ 665.574923] BTRFS info (device sda1): disk space caching is enabled [ 665.574927] BTRFS info (device sda1): has skinny extents But it's from the other hard disk: df S.ficheros bloques de 1K Usados Disponibles Uso% Montado en devtmpfs 8156864 8 8156856 1% /dev tmpfs 8202948 84088 8118860 2% /dev/shm tmpfs 8202948 9832 8193116 1% /run tmpfs 8202948 0 8202948 0% /sys/fs/cgroup /dev/sdb1 41945088 32778144 7852048 81% / /dev/sdb1 41945088 32778144 7852048 81% /.snapshots /dev/sdb1 41945088 32778144 7852048 81% /boot/grub2/x86_64-efi /dev/sdb1 41945088 32778144 7852048 81% /usr/local /dev/sdb1 41945088 32778144 7852048 81% /srv /dev/sdb1 41945088 32778144 7852048 81% /tmp /dev/sdb1 41945088 32778144 7852048 81% /var /dev/sdb1 41945088 32778144 7852048 81% /opt /dev/sdb1 41945088 32778144 7852048 81% /boot/grub2/i386-pc /dev/sdb1 41945088 32778144 7852048 81% /root /dev/sdb2 1910635004 1260923168 649711836 66% /home tmpfs 1640588 16 1640572 1% /run/user/1000
This is an autogenerated message for OBS integration: This bug (1134806) was mentioned in https://build.opensuse.org/request/show/710395 15.1 / kernel-source https://build.opensuse.org/request/show/710403 15.0 / kernel-source https://build.opensuse.org/request/show/710405 42.3 / kernel-source
SUSE-SU-2019:1529-1: An update that solves 14 vulnerabilities and has 130 fixes is now available. Category: security (important) Bug References: 1012382,1050242,1051510,1053043,1055186,1056787,1058115,1063638,1064802,1065600,1065729,1066129,1068546,1071995,1075020,1082387,1083647,1085535,1099658,1103992,1104353,1104427,1106011,1106284,1108193,1108838,1108937,1110946,1111696,1112063,1113722,1114427,1115688,1117158,1117561,1118139,1119843,1120091,1120423,1120566,1120843,1120902,1122776,1123454,1123663,1124503,1124839,1126356,1127616,1128052,1128904,1128979,1129138,1129273,1129497,1129693,1129770,1130579,1130699,1130972,1131326,1131451,1131488,1131565,1131673,1132044,1133176,1133188,1133190,1133320,1133612,1133616,1134160,1134162,1134199,1134200,1134201,1134202,1134203,1134204,1134205,1134354,1134393,1134459,1134460,1134461,1134537,1134597,1134651,1134671,1134760,1134806,1134810,1134813,1134848,1134936,1135006,1135007,1135008,1135056,1135100,1135120,1135278,1135281,1135309,1135312,1135314,1135315,1135316,1135320,1135323,1135330,1135492,1135542,1135556,1135603,1135642,1135661,1135758,1136206,1136424,1136428,1136430,1136432,1136434,1136435,1136438,1136439,1136477,1136478,1136573,1136586,1136881,1136935,1136990,1137151,1137152,1137153,1137162,1137372,1137444,1137586,1137739,1137752 CVE References: CVE-2018-7191,CVE-2019-10124,CVE-2019-11085,CVE-2019-11477,CVE-2019-11478,CVE-2019-11479,CVE-2019-11486,CVE-2019-11487,CVE-2019-11815,CVE-2019-11833,CVE-2019-11884,CVE-2019-12382,CVE-2019-3846,CVE-2019-5489 Sources used: SUSE Linux Enterprise Module for Live Patching 15 (src): kernel-default-4.12.14-150.22.1, kernel-livepatch-SLE15_Update_11-1-1.5.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2019:1530-1: An update that solves 14 vulnerabilities and has 132 fixes is now available. Category: security (important) Bug References: 1012382,1050242,1051510,1053043,1056787,1058115,1063638,1064802,1065600,1065729,1066129,1068546,1071995,1075020,1082387,1083647,1085535,1099658,1103992,1104353,1104427,1106011,1106284,1108838,1110946,1111696,1112063,1113722,1114427,1114893,1115688,1117158,1117561,1118139,1119843,1120091,1120423,1120566,1120843,1120902,1122776,1123454,1123663,1124503,1124839,1126356,1127616,1128052,1128904,1128905,1128979,1129138,1129497,1129693,1129770,1129848,1129857,1130409,1130699,1130972,1131451,1131488,1131565,1131673,1132044,1132894,1133176,1133188,1133190,1133320,1133612,1133616,1134160,1134162,1134199,1134200,1134201,1134202,1134203,1134204,1134205,1134354,1134393,1134459,1134460,1134461,1134537,1134591,1134597,1134607,1134651,1134671,1134760,1134806,1134810,1134813,1134848,1134936,1135006,1135007,1135008,1135056,1135100,1135120,1135278,1135281,1135309,1135312,1135314,1135315,1135316,1135320,1135323,1135330,1135492,1135542,1135556,1135603,1135642,1135661,1135758,1136206,1136424,1136428,1136430,1136432,1136434,1136435,1136438,1136439,1136477,1136478,1136573,1136586,1136881,1136935,1136990,1137151,1137152,1137153,1137162,1137372,1137444,1137586,1137739,1137752 CVE References: CVE-2018-7191,CVE-2019-10124,CVE-2019-11085,CVE-2019-11477,CVE-2019-11478,CVE-2019-11479,CVE-2019-11486,CVE-2019-11487,CVE-2019-11815,CVE-2019-11833,CVE-2019-11884,CVE-2019-12382,CVE-2019-3846,CVE-2019-5489 Sources used: SUSE Linux Enterprise Workstation Extension 12-SP4 (src): kernel-default-4.12.14-95.19.1 SUSE Linux Enterprise Software Development Kit 12-SP4 (src): kernel-docs-4.12.14-95.19.1, kernel-obs-build-4.12.14-95.19.1 SUSE Linux Enterprise Server 12-SP4 (src): kernel-default-4.12.14-95.19.1, kernel-source-4.12.14-95.19.1, kernel-syms-4.12.14-95.19.1 SUSE Linux Enterprise High Availability 12-SP4 (src): kernel-default-4.12.14-95.19.1 SUSE Linux Enterprise Desktop 12-SP4 (src): kernel-default-4.12.14-95.19.1, kernel-source-4.12.14-95.19.1, kernel-syms-4.12.14-95.19.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2019:1529-1: An update that solves 14 vulnerabilities and has 130 fixes is now available. Category: security (important) Bug References: 1012382,1050242,1051510,1053043,1055186,1056787,1058115,1063638,1064802,1065600,1065729,1066129,1068546,1071995,1075020,1082387,1083647,1085535,1099658,1103992,1104353,1104427,1106011,1106284,1108193,1108838,1108937,1110946,1111696,1112063,1113722,1114427,1115688,1117158,1117561,1118139,1119843,1120091,1120423,1120566,1120843,1120902,1122776,1123454,1123663,1124503,1124839,1126356,1127616,1128052,1128904,1128979,1129138,1129273,1129497,1129693,1129770,1130579,1130699,1130972,1131326,1131451,1131488,1131565,1131673,1132044,1133176,1133188,1133190,1133320,1133612,1133616,1134160,1134162,1134199,1134200,1134201,1134202,1134203,1134204,1134205,1134354,1134393,1134459,1134460,1134461,1134537,1134597,1134651,1134671,1134760,1134806,1134810,1134813,1134848,1134936,1135006,1135007,1135008,1135056,1135100,1135120,1135278,1135281,1135309,1135312,1135314,1135315,1135316,1135320,1135323,1135330,1135492,1135542,1135556,1135603,1135642,1135661,1135758,1136206,1136424,1136428,1136430,1136432,1136434,1136435,1136438,1136439,1136477,1136478,1136573,1136586,1136881,1136935,1136990,1137151,1137152,1137153,1137162,1137372,1137444,1137586,1137739,1137752 CVE References: CVE-2018-7191,CVE-2019-10124,CVE-2019-11085,CVE-2019-11477,CVE-2019-11478,CVE-2019-11479,CVE-2019-11486,CVE-2019-11487,CVE-2019-11815,CVE-2019-11833,CVE-2019-11884,CVE-2019-12382,CVE-2019-3846,CVE-2019-5489 Sources used: SUSE Linux Enterprise Workstation Extension 15 (src): kernel-default-4.12.14-150.22.1 SUSE Linux Enterprise Module for Open Buildservice Development Tools 15 (src): kernel-default-4.12.14-150.22.1, kernel-docs-4.12.14-150.22.1, kernel-obs-qa-4.12.14-150.22.1 SUSE Linux Enterprise Module for Live Patching 15 (src): kernel-default-4.12.14-150.22.1, kernel-livepatch-SLE15_Update_11-1-1.5.1 SUSE Linux Enterprise Module for Legacy Software 15 (src): kernel-default-4.12.14-150.22.1 SUSE Linux Enterprise Module for Development Tools 15 (src): kernel-docs-4.12.14-150.22.1, kernel-obs-build-4.12.14-150.22.1, kernel-source-4.12.14-150.22.1, kernel-syms-4.12.14-150.22.1, kernel-vanilla-4.12.14-150.22.1 SUSE Linux Enterprise Module for Basesystem 15 (src): kernel-default-4.12.14-150.22.1, kernel-source-4.12.14-150.22.1, kernel-zfcpdump-4.12.14-150.22.1 SUSE Linux Enterprise High Availability 15 (src): kernel-default-4.12.14-150.22.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2019:1530-1: An update that solves 14 vulnerabilities and has 132 fixes is now available. Category: security (important) Bug References: 1012382,1050242,1051510,1053043,1056787,1058115,1063638,1064802,1065600,1065729,1066129,1068546,1071995,1075020,1082387,1083647,1085535,1099658,1103992,1104353,1104427,1106011,1106284,1108838,1110946,1111696,1112063,1113722,1114427,1114893,1115688,1117158,1117561,1118139,1119843,1120091,1120423,1120566,1120843,1120902,1122776,1123454,1123663,1124503,1124839,1126356,1127616,1128052,1128904,1128905,1128979,1129138,1129497,1129693,1129770,1129848,1129857,1130409,1130699,1130972,1131451,1131488,1131565,1131673,1132044,1132894,1133176,1133188,1133190,1133320,1133612,1133616,1134160,1134162,1134199,1134200,1134201,1134202,1134203,1134204,1134205,1134354,1134393,1134459,1134460,1134461,1134537,1134591,1134597,1134607,1134651,1134671,1134760,1134806,1134810,1134813,1134848,1134936,1135006,1135007,1135008,1135056,1135100,1135120,1135278,1135281,1135309,1135312,1135314,1135315,1135316,1135320,1135323,1135330,1135492,1135542,1135556,1135603,1135642,1135661,1135758,1136206,1136424,1136428,1136430,1136432,1136434,1136435,1136438,1136439,1136477,1136478,1136573,1136586,1136881,1136935,1136990,1137151,1137152,1137153,1137162,1137372,1137444,1137586,1137739,1137752 CVE References: CVE-2018-7191,CVE-2019-10124,CVE-2019-11085,CVE-2019-11477,CVE-2019-11478,CVE-2019-11479,CVE-2019-11486,CVE-2019-11487,CVE-2019-11815,CVE-2019-11833,CVE-2019-11884,CVE-2019-12382,CVE-2019-3846,CVE-2019-5489 Sources used: SUSE Linux Enterprise Workstation Extension 12-SP4 (src): kernel-default-4.12.14-95.19.1 SUSE Linux Enterprise Software Development Kit 12-SP4 (src): kernel-docs-4.12.14-95.19.1, kernel-obs-build-4.12.14-95.19.1 SUSE Linux Enterprise Server 12-SP4 (src): kernel-default-4.12.14-95.19.1, kernel-source-4.12.14-95.19.1, kernel-syms-4.12.14-95.19.1 SUSE Linux Enterprise Live Patching 12-SP4 (src): kgraft-patch-SLE12-SP4_Update_5-1-6.3.1 SUSE Linux Enterprise High Availability 12-SP4 (src): kernel-default-4.12.14-95.19.1 SUSE Linux Enterprise Desktop 12-SP4 (src): kernel-default-4.12.14-95.19.1, kernel-source-4.12.14-95.19.1, kernel-syms-4.12.14-95.19.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2019:1532-1: An update that solves 13 vulnerabilities and has 73 fixes is now available. Category: security (important) Bug References: 1005778,1005780,1005781,1012382,1019695,1019696,1022604,1063638,1065600,1085535,1085539,1090888,1099658,1100132,1106110,1106284,1106929,1108293,1108838,1110785,1110946,1112063,1112178,1116803,1117562,1119086,1120642,1120843,1120902,1122776,1126040,1126356,1128052,1129138,1129770,1130972,1131107,1131488,1131565,1132212,1132472,1133188,1133874,1134160,1134162,1134338,1134537,1134564,1134565,1134566,1134651,1134760,1134806,1134813,1134848,1135013,1135014,1135015,1135100,1135120,1135281,1135603,1135642,1135661,1135878,1136424,1136438,1136448,1136449,1136451,1136452,1136455,1136458,1136539,1136573,1136575,1136586,1136590,1136623,1136810,1136935,1136990,1137142,1137162,1137586,843419 CVE References: CVE-2018-17972,CVE-2018-7191,CVE-2019-11190,CVE-2019-11477,CVE-2019-11478,CVE-2019-11479,CVE-2019-11486,CVE-2019-11815,CVE-2019-11833,CVE-2019-11884,CVE-2019-12382,CVE-2019-3846,CVE-2019-5489 Sources used: SUSE Linux Enterprise Live Patching 12-SP3 (src): kgraft-patch-SLE12-SP3_Update_26-1-4.3.3 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2019:1536-1: An update that solves 13 vulnerabilities and has 132 fixes is now available. Category: security (important) Bug References: 1012382,1050242,1051510,1053043,1056787,1058115,1063638,1064802,1065600,1065729,1066129,1068546,1071995,1075020,1082387,1083647,1085535,1099658,1103992,1104353,1104427,1106011,1106284,1108838,1110946,1111696,1112063,1113722,1114427,1114893,1115688,1117158,1117561,1118139,1119843,1120091,1120423,1120566,1120843,1120902,1122776,1123454,1123663,1124503,1124839,1126356,1127616,1128052,1128904,1128905,1128979,1129138,1129497,1129693,1129770,1129848,1129857,1130409,1130972,1131451,1131488,1131565,1131673,1132044,1132894,1133176,1133188,1133190,1133320,1133612,1133616,1134160,1134162,1134199,1134200,1134201,1134202,1134203,1134204,1134205,1134354,1134393,1134459,1134460,1134461,1134537,1134591,1134597,1134607,1134651,1134671,1134760,1134806,1134810,1134813,1134848,1134936,1135006,1135007,1135008,1135056,1135100,1135120,1135278,1135281,1135309,1135312,1135314,1135315,1135316,1135320,1135323,1135330,1135492,1135542,1135556,1135603,1135642,1135661,1135758,1136206,1136424,1136428,1136430,1136432,1136434,1136435,1136438,1136439,1136477,1136478,1136573,1136586,1136881,1136935,1136990,1137151,1137152,1137153,1137162,1137372,1137444,1137586,1137739,1137752 CVE References: CVE-2018-7191,CVE-2019-10124,CVE-2019-11085,CVE-2019-11477,CVE-2019-11479,CVE-2019-11486,CVE-2019-11487,CVE-2019-11815,CVE-2019-11833,CVE-2019-11884,CVE-2019-12382,CVE-2019-3846,CVE-2019-5489 Sources used: SUSE Linux Enterprise Server 12-SP4 (src): kernel-azure-4.12.14-6.15.2, kernel-source-azure-4.12.14-6.15.2, kernel-syms-azure-4.12.14-6.15.2 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2019:1527-1: An update that solves 14 vulnerabilities and has 81 fixes is now available. Category: security (important) Bug References: 1005778,1005780,1005781,1012382,1019695,1019696,1022604,1053043,1063638,1065600,1066223,1085535,1085539,1090888,1099658,1100132,1106110,1106284,1106929,1108293,1108838,1110785,1110946,1112063,1112178,1116803,1117562,1119086,1120642,1120843,1120885,1120902,1122776,1125580,1126040,1126356,1128052,1129138,1129770,1130972,1131107,1131488,1131543,1131565,1132212,1132374,1132472,1133188,1133874,1134160,1134162,1134338,1134537,1134564,1134565,1134566,1134651,1134760,1134806,1134813,1134848,1135013,1135014,1135015,1135100,1135120,1135281,1135603,1135642,1135661,1135878,1136424,1136438,1136446,1136448,1136449,1136451,1136452,1136455,1136458,1136539,1136573,1136575,1136586,1136590,1136623,1136810,1136935,1136990,1137142,1137162,1137586,1137739,1137752,843419 CVE References: CVE-2013-4343,CVE-2018-17972,CVE-2018-7191,CVE-2019-11190,CVE-2019-11477,CVE-2019-11478,CVE-2019-11479,CVE-2019-11486,CVE-2019-11815,CVE-2019-11833,CVE-2019-11884,CVE-2019-12382,CVE-2019-3846,CVE-2019-5489 Sources used: SUSE Linux Enterprise Server 12-SP3 (src): kernel-azure-4.4.180-4.31.1, kernel-source-azure-4.4.180-4.31.1, kernel-syms-azure-4.4.180-4.31.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2019:1535-1: An update that solves 14 vulnerabilities and has 131 fixes is now available. Category: security (important) Bug References: 1012382,1050242,1051510,1053043,1055186,1056787,1058115,1061840,1063638,1064802,1065600,1065729,1066129,1068546,1071995,1075020,1082387,1083647,1085535,1099658,1103992,1104353,1104427,1106011,1106284,1108193,1108838,1108937,1110946,1111696,1112063,1113722,1114427,1115688,1117158,1117561,1118139,1119843,1120091,1120423,1120566,1120843,1120902,1122776,1123454,1123663,1124503,1124839,1126356,1127616,1128052,1128904,1128979,1129138,1129273,1129497,1129693,1129770,1130579,1130699,1130972,1131326,1131451,1131488,1131565,1131673,1132044,1133176,1133188,1133190,1133320,1133612,1133616,1134160,1134162,1134199,1134200,1134201,1134202,1134203,1134204,1134205,1134354,1134393,1134459,1134460,1134461,1134537,1134597,1134651,1134671,1134760,1134806,1134810,1134813,1134848,1134936,1135006,1135007,1135008,1135056,1135100,1135120,1135278,1135281,1135309,1135312,1135314,1135315,1135316,1135320,1135323,1135330,1135492,1135542,1135556,1135603,1135642,1135661,1135758,1136206,1136424,1136428,1136430,1136432,1136434,1136435,1136438,1136439,1136477,1136478,1136573,1136586,1136881,1136935,1136990,1137151,1137152,1137153,1137162,1137372,1137444,1137586,1137739,1137752 CVE References: CVE-2018-7191,CVE-2019-10124,CVE-2019-11085,CVE-2019-11477,CVE-2019-11478,CVE-2019-11479,CVE-2019-11486,CVE-2019-11487,CVE-2019-11815,CVE-2019-11833,CVE-2019-11884,CVE-2019-12382,CVE-2019-3846,CVE-2019-5489 Sources used: SUSE Linux Enterprise Module for Public Cloud 15 (src): kernel-azure-4.12.14-5.30.1, kernel-source-azure-4.12.14-5.30.1, kernel-syms-azure-4.12.14-5.30.1 SUSE Linux Enterprise Module for Open Buildservice Development Tools 15-SP1 (src): kernel-azure-4.12.14-5.30.1, kernel-source-azure-4.12.14-5.30.1, kernel-syms-azure-4.12.14-5.30.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
openSUSE-SU-2019:1570-1: An update that solves 15 vulnerabilities and has 62 fixes is now available. Category: security (important) Bug References: 1005778,1005780,1005781,1012382,1019695,1019696,1022604,1053043,1063638,1065600,1066223,1085535,1085539,1090888,1099658,1100132,1106110,1106284,1106929,1108838,1109137,1112178,1117562,1119086,1120642,1120843,1120902,1125580,1126356,1127155,1128052,1129770,1131107,1131543,1131565,1132374,1132472,1133190,1133874,1134338,1134806,1134813,1135120,1135281,1135603,1135642,1135661,1135878,1136424,1136438,1136448,1136449,1136451,1136452,1136455,1136458,1136539,1136573,1136575,1136586,1136590,1136598,1136623,1136810,1136922,1136935,1136990,1136993,1137142,1137162,1137586,1137739,1137752,1137915,1138291,1138293,1138374 CVE References: CVE-2018-7191,CVE-2019-11190,CVE-2019-11191,CVE-2019-11477,CVE-2019-11478,CVE-2019-11479,CVE-2019-11487,CVE-2019-11833,CVE-2019-12380,CVE-2019-12382,CVE-2019-12456,CVE-2019-12818,CVE-2019-12819,CVE-2019-3846,CVE-2019-5489 Sources used: openSUSE Leap 42.3 (src): kernel-debug-4.4.180-102.1, kernel-default-4.4.180-102.1, kernel-docs-4.4.180-102.1, kernel-obs-build-4.4.180-102.1, kernel-obs-qa-4.4.180-102.1, kernel-source-4.4.180-102.1, kernel-syms-4.4.180-102.1, kernel-vanilla-4.4.180-102.1
openSUSE-SU-2019:1571-1: An update that solves 11 vulnerabilities and has 167 fixes is now available. Category: security (important) Bug References: 1012382,1050242,1051510,1053043,1056787,1058115,1061840,1064802,1065600,1065729,1066129,1068546,1071995,1075020,1082387,1083647,1085535,1093389,1099658,1103992,1104353,1104427,1111666,1111696,1113722,1115688,1117114,1117158,1117561,1118139,1120091,1120423,1120566,1120902,1124503,1126206,1126356,1127616,1128432,1130699,1131673,1133190,1133612,1133616,1134090,1134671,1134730,1134738,1134743,1134806,1134936,1134945,1134946,1134947,1134948,1134949,1134950,1134951,1134952,1134953,1134972,1134974,1134975,1134980,1134981,1134983,1134987,1134989,1134990,1134994,1134995,1134998,1134999,1135018,1135021,1135024,1135026,1135027,1135028,1135029,1135031,1135033,1135034,1135035,1135036,1135037,1135038,1135039,1135041,1135042,1135044,1135045,1135046,1135047,1135049,1135051,1135052,1135053,1135055,1135056,1135058,1135153,1135542,1135556,1135642,1135661,1136188,1136206,1136215,1136345,1136347,1136348,1136353,1136424,1136428,1136430,1136432,1136434,1136435,1136438,1136439,1136456,1136460,1136461,1136469,1136477,1136478,1136498,1136573,1136586,1136598,1136881,1136922,1136935,1136978,1136990,1137151,1137152,1137153,1137162,1137201,1137224,1137232,1137233,1137236,1137372,1137429,1137444,1137586,1137739,1137752,1137995,1137996,1137998,1137999,1138000,1138002,1138003,1138005,1138006,1138007,1138008,1138009,1138010,1138011,1138012,1138013,1138014,1138015,1138016,1138017,1138018,1138019,1138291,1138293,1138336,1138374,1138375 CVE References: CVE-2019-10124,CVE-2019-11477,CVE-2019-11478,CVE-2019-11479,CVE-2019-11487,CVE-2019-12380,CVE-2019-12382,CVE-2019-12456,CVE-2019-12818,CVE-2019-12819,CVE-2019-3846 Sources used: openSUSE Leap 15.1 (src): kernel-debug-4.12.14-lp151.28.7.1, kernel-default-4.12.14-lp151.28.7.1, kernel-docs-4.12.14-lp151.28.7.1, kernel-kvmsmall-4.12.14-lp151.28.7.1, kernel-obs-build-4.12.14-lp151.28.7.1, kernel-obs-qa-4.12.14-lp151.28.7.1, kernel-source-4.12.14-lp151.28.7.1, kernel-syms-4.12.14-lp151.28.7.1, kernel-vanilla-4.12.14-lp151.28.7.1
SUSE-SU-2019:1550-1: An update that solves 28 vulnerabilities and has 318 fixes is now available. Category: security (important) Bug References: 1012382,1050242,1050549,1051510,1052904,1053043,1055117,1055121,1055186,1056787,1058115,1061840,1063638,1064802,1065600,1065729,1066129,1068546,1070872,1071995,1075020,1082387,1082555,1083647,1085535,1085536,1086657,1088804,1093389,1097583,1097584,1097585,1097586,1097587,1097588,1099658,1103186,1103259,1103992,1104353,1104427,1106011,1106284,1108193,1108838,1108937,1110946,1111331,1111666,1111696,1112063,1112128,1112178,1113722,1113956,1114279,1114427,1114542,1114638,1115688,1117114,1117158,1117561,1118139,1119680,1119843,1120091,1120318,1120423,1120566,1120843,1120902,1122767,1122776,1123454,1123663,1124503,1124839,1126206,1126356,1126704,1127175,1127371,1127374,1127616,1128052,1128415,1128544,1128904,1128971,1128979,1129138,1129273,1129497,1129693,1129770,1129845,1130195,1130425,1130527,1130567,1130579,1130699,1130937,1130972,1131326,1131427,1131438,1131451,1131467,1131488,1131530,1131565,1131574,1131587,1131659,1131673,1131847,1131848,1131851,1131900,1131934,1131935,1132044,1132219,1132226,1132227,1132365,1132368,1132369,1132370,1132372,1132373,1132384,1132397,1132402,1132403,1132404,1132405,1132407,1132411,1132412,1132413,1132414,1132426,1132527,1132531,1132555,1132558,1132561,1132562,1132563,1132564,1132570,1132571,1132572,1132589,1132618,1132673,1132681,1132726,1132828,1132894,1132943,1132982,1133005,1133016,1133094,1133095,1133115,1133149,1133176,1133188,1133190,1133320,1133486,1133529,1133547,1133584,1133593,1133612,1133616,1133667,1133668,1133672,1133674,1133675,1133698,1133702,1133731,1133769,1133772,1133774,1133778,1133779,1133780,1133825,1133850,1133851,1133852,1133897,1134090,1134160,1134162,1134199,1134200,1134201,1134202,1134203,1134204,1134205,1134223,1134354,1134393,1134397,1134459,1134460,1134461,1134597,1134600,1134607,1134618,1134651,1134671,1134760,1134806,1134810,1134813,1134848,1134936,1134945,1134946,1134947,1134948,1134949,1134950,1134951,1134952,1134953,1134972,1134974,1134975,1134980,1134981,1134983,1134987,1134989,1134990,1134994,1134995,1134998,1134999,1135006,1135007,1135008,1135018,1135021,1135024,1135026,1135027,1135028,1135029,1135031,1135033,1135034,1135035,1135036,1135037,1135038,1135039,1135041,1135042,1135044,1135045,1135046,1135047,1135049,1135051,1135052,1135053,1135055,1135056,1135058,1135100,1135120,1135278,1135281,1135309,1135312,1135314,1135315,1135316,1135320,1135323,1135330,1135492,1135542,1135556,1135603,1135642,1135661,1135758,1136188,1136206,1136215,1136345,1136347,1136348,1136353,1136424,1136428,1136430,1136432,1136434,1136435,1136438,1136439,1136456,1136460,1136461,1136469,1136477,1136478,1136498,1136573,1136586,1136881,1136935,1136990,1137151,1137152,1137153,1137162,1137201,1137224,1137232,1137233,1137236,1137372,1137429,1137444,1137586,1137739,1137752,1138291,1138293 CVE References: CVE-2017-5753,CVE-2018-12126,CVE-2018-12127,CVE-2018-12130,CVE-2018-16880,CVE-2018-7191,CVE-2019-10124,CVE-2019-11085,CVE-2019-11091,CVE-2019-11477,CVE-2019-11478,CVE-2019-11479,CVE-2019-11486,CVE-2019-11487,CVE-2019-11811,CVE-2019-11815,CVE-2019-11833,CVE-2019-11884,CVE-2019-12382,CVE-2019-12818,CVE-2019-12819,CVE-2019-3846,CVE-2019-3882,CVE-2019-5489,CVE-2019-8564,CVE-2019-9003,CVE-2019-9500,CVE-2019-9503 Sources used: SUSE Linux Enterprise Module for Live Patching 15-SP1 (src): kernel-default-4.12.14-197.4.1, kernel-livepatch-SLE15-SP1_Update_1-1-3.3.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
openSUSE-SU-2019:1579-1: An update that solves 15 vulnerabilities and has 115 fixes is now available. Category: security (important) Bug References: 1012382,1050242,1051510,1053043,1056787,1058115,1061840,1063638,1064802,1065600,1065729,1066129,1068546,1071995,1075020,1082387,1083647,1085535,1099658,1103992,1104353,1104427,1106284,1108838,1111696,1113722,1114427,1115688,1117158,1117561,1118139,1120091,1120423,1120566,1120843,1120902,1123454,1123663,1124503,1126356,1127616,1128052,1128432,1128904,1129693,1129770,1130699,1131565,1131673,1133190,1133320,1133612,1133616,1134597,1134671,1134806,1134936,1135056,1135120,1135278,1135281,1135309,1135312,1135314,1135315,1135316,1135320,1135323,1135330,1135492,1135542,1135556,1135603,1135642,1135661,1135758,1136206,1136424,1136428,1136430,1136432,1136434,1136435,1136438,1136439,1136477,1136478,1136573,1136586,1136598,1136881,1136922,1136935,1136990,1137151,1137152,1137153,1137162,1137372,1137429,1137444,1137586,1137739,1137752,1137995,1137996,1137998,1137999,1138000,1138002,1138003,1138005,1138006,1138007,1138008,1138009,1138010,1138011,1138012,1138013,1138014,1138015,1138016,1138017,1138018,1138019,1138291,1138293,1138374,1138375 CVE References: CVE-2018-7191,CVE-2019-10124,CVE-2019-11085,CVE-2019-11477,CVE-2019-11478,CVE-2019-11479,CVE-2019-11487,CVE-2019-11833,CVE-2019-12380,CVE-2019-12382,CVE-2019-12456,CVE-2019-12818,CVE-2019-12819,CVE-2019-3846,CVE-2019-5489 Sources used: openSUSE Leap 15.0 (src): kernel-debug-4.12.14-lp150.12.64.1, kernel-default-4.12.14-lp150.12.64.1, kernel-docs-4.12.14-lp150.12.64.1, kernel-kvmsmall-4.12.14-lp150.12.64.1, kernel-obs-build-4.12.14-lp150.12.64.1, kernel-obs-qa-4.12.14-lp150.12.64.1, kernel-source-4.12.14-lp150.12.64.1, kernel-syms-4.12.14-lp150.12.64.1, kernel-vanilla-4.12.14-lp150.12.64.1
SUSE-SU-2019:1550-1: An update that solves 28 vulnerabilities and has 318 fixes is now available. Category: security (important) Bug References: 1012382,1050242,1050549,1051510,1052904,1053043,1055117,1055121,1055186,1056787,1058115,1061840,1063638,1064802,1065600,1065729,1066129,1068546,1070872,1071995,1075020,1082387,1082555,1083647,1085535,1085536,1086657,1088804,1093389,1097583,1097584,1097585,1097586,1097587,1097588,1099658,1103186,1103259,1103992,1104353,1104427,1106011,1106284,1108193,1108838,1108937,1110946,1111331,1111666,1111696,1112063,1112128,1112178,1113722,1113956,1114279,1114427,1114542,1114638,1115688,1117114,1117158,1117561,1118139,1119680,1119843,1120091,1120318,1120423,1120566,1120843,1120902,1122767,1122776,1123454,1123663,1124503,1124839,1126206,1126356,1126704,1127175,1127371,1127374,1127616,1128052,1128415,1128544,1128904,1128971,1128979,1129138,1129273,1129497,1129693,1129770,1129845,1130195,1130425,1130527,1130567,1130579,1130699,1130937,1130972,1131326,1131427,1131438,1131451,1131467,1131488,1131530,1131565,1131574,1131587,1131659,1131673,1131847,1131848,1131851,1131900,1131934,1131935,1132044,1132219,1132226,1132227,1132365,1132368,1132369,1132370,1132372,1132373,1132384,1132397,1132402,1132403,1132404,1132405,1132407,1132411,1132412,1132413,1132414,1132426,1132527,1132531,1132555,1132558,1132561,1132562,1132563,1132564,1132570,1132571,1132572,1132589,1132618,1132673,1132681,1132726,1132828,1132894,1132943,1132982,1133005,1133016,1133094,1133095,1133115,1133149,1133176,1133188,1133190,1133320,1133486,1133529,1133547,1133584,1133593,1133612,1133616,1133667,1133668,1133672,1133674,1133675,1133698,1133702,1133731,1133769,1133772,1133774,1133778,1133779,1133780,1133825,1133850,1133851,1133852,1133897,1134090,1134160,1134162,1134199,1134200,1134201,1134202,1134203,1134204,1134205,1134223,1134354,1134393,1134397,1134459,1134460,1134461,1134597,1134600,1134607,1134618,1134651,1134671,1134760,1134806,1134810,1134813,1134848,1134936,1134945,1134946,1134947,1134948,1134949,1134950,1134951,1134952,1134953,1134972,1134974,1134975,1134980,1134981,1134983,1134987,1134989,1134990,1134994,1134995,1134998,1134999,1135006,1135007,1135008,1135018,1135021,1135024,1135026,1135027,1135028,1135029,1135031,1135033,1135034,1135035,1135036,1135037,1135038,1135039,1135041,1135042,1135044,1135045,1135046,1135047,1135049,1135051,1135052,1135053,1135055,1135056,1135058,1135100,1135120,1135278,1135281,1135309,1135312,1135314,1135315,1135316,1135320,1135323,1135330,1135492,1135542,1135556,1135603,1135642,1135661,1135758,1136188,1136206,1136215,1136345,1136347,1136348,1136353,1136424,1136428,1136430,1136432,1136434,1136435,1136438,1136439,1136456,1136460,1136461,1136469,1136477,1136478,1136498,1136573,1136586,1136881,1136935,1136990,1137151,1137152,1137153,1137162,1137201,1137224,1137232,1137233,1137236,1137372,1137429,1137444,1137586,1137739,1137752,1138291,1138293 CVE References: CVE-2017-5753,CVE-2018-12126,CVE-2018-12127,CVE-2018-12130,CVE-2018-16880,CVE-2018-7191,CVE-2019-10124,CVE-2019-11085,CVE-2019-11091,CVE-2019-11477,CVE-2019-11478,CVE-2019-11479,CVE-2019-11486,CVE-2019-11487,CVE-2019-11811,CVE-2019-11815,CVE-2019-11833,CVE-2019-11884,CVE-2019-12382,CVE-2019-12818,CVE-2019-12819,CVE-2019-3846,CVE-2019-3882,CVE-2019-5489,CVE-2019-8564,CVE-2019-9003,CVE-2019-9500,CVE-2019-9503 Sources used: SUSE Linux Enterprise Workstation Extension 15-SP1 (src): kernel-default-4.12.14-197.4.1 SUSE Linux Enterprise Module for Open Buildservice Development Tools 15-SP1 (src): dtb-aarch64-4.12.14-197.4.1, kernel-debug-4.12.14-197.4.1, kernel-default-4.12.14-197.4.1, kernel-docs-4.12.14-197.4.1, kernel-kvmsmall-4.12.14-197.4.1, kernel-obs-qa-4.12.14-197.4.1, kernel-source-4.12.14-197.4.1, kernel-vanilla-4.12.14-197.4.1, kernel-zfcpdump-4.12.14-197.4.1 SUSE Linux Enterprise Module for Live Patching 15-SP1 (src): kernel-default-4.12.14-197.4.1, kernel-livepatch-SLE15-SP1_Update_1-1-3.3.1 SUSE Linux Enterprise Module for Legacy Software 15-SP1 (src): kernel-default-4.12.14-197.4.1 SUSE Linux Enterprise Module for Development Tools 15-SP1 (src): kernel-docs-4.12.14-197.4.1, kernel-obs-build-4.12.14-197.4.1, kernel-source-4.12.14-197.4.1, kernel-syms-4.12.14-197.4.1 SUSE Linux Enterprise Module for Basesystem 15-SP1 (src): kernel-default-4.12.14-197.4.1, kernel-source-4.12.14-197.4.1, kernel-zfcpdump-4.12.14-197.4.1 SUSE Linux Enterprise High Availability 15-SP1 (src): kernel-default-4.12.14-197.4.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
This is a part of 5.1.8, so this is fixed now.
SUSE-SU-2019:2430-1: An update that solves 45 vulnerabilities and has 474 fixes is now available. Category: security (important) Bug References: 1050242,1050549,1051510,1052904,1053043,1055117,1055121,1055186,1056787,1058115,1061840,1064802,1065600,1065729,1066129,1070872,1071995,1075020,1082387,1082555,1083647,1083710,1085535,1085536,1088047,1088804,1093389,1094555,1096003,1098633,1099658,1102247,1103186,1103259,1103990,1103991,1103992,1104745,1106011,1106284,1106383,1106751,1108193,1108838,1108937,1109837,1110946,1111331,1111666,1111696,1112063,1112128,1112178,1112374,1113722,1113956,1114279,1114427,1114542,1114638,1114685,1115688,1117114,1117158,1117561,1118139,1119113,1119222,1119532,1119680,1120091,1120318,1120423,1120566,1120843,1120902,1122767,1122776,1123080,1123454,1123663,1124503,1124839,1125703,1126206,1126356,1126704,1127034,1127175,1127315,1127371,1127374,1127611,1127616,1128052,1128415,1128432,1128544,1128902,1128904,1128971,1128979,1129138,1129273,1129693,1129770,1129845,1130195,1130425,1130527,1130567,1130579,1130699,1130836,1130937,1130972,1131326,1131427,1131438,1131451,1131467,1131488,1131530,1131565,1131574,1131587,1131645,1131659,1131673,1131847,1131848,1131851,1131900,1131934,1131935,1132044,1132219,1132226,1132227,1132365,1132368,1132369,1132370,1132372,1132373,1132384,1132390,1132397,1132402,1132403,1132404,1132405,1132407,1132411,1132412,1132413,1132414,1132426,1132527,1132531,1132555,1132558,1132561,1132562,1132563,1132564,1132570,1132571,1132572,1132589,1132618,1132673,1132681,1132726,1132828,1132894,1132943,1132982,1133005,1133016,1133021,1133094,1133095,1133115,1133149,1133176,1133188,1133190,1133311,1133320,1133401,1133486,1133529,1133547,1133584,1133593,1133612,1133616,1133667,1133668,1133672,1133674,1133675,1133698,1133702,1133731,1133738,1133769,1133772,1133774,1133778,1133779,1133780,1133825,1133850,1133851,1133852,1133897,1134090,1134097,1134160,1134162,1134199,1134200,1134201,1134202,1134203,1134204,1134205,1134223,1134303,1134354,1134390,1134393,1134395,1134397,1134399,1134459,1134460,1134461,1134597,1134600,1134607,1134618,1134651,1134671,1134730,1134738,1134743,1134760,1134806,1134810,1134813,1134848,1134936,1134945,1134946,1134947,1134948,1134949,1134950,1134951,1134952,1134953,1134972,1134974,1134975,1134980,1134981,1134983,1134987,1134989,1134990,1134994,1134995,1134998,1134999,1135006,1135007,1135008,1135018,1135021,1135024,1135026,1135027,1135028,1135029,1135031,1135033,1135034,1135035,1135036,1135037,1135038,1135039,1135041,1135042,1135044,1135045,1135046,1135047,1135049,1135051,1135052,1135053,1135055,1135056,1135058,1135100,1135120,1135153,1135278,1135281,1135296,1135309,1135312,1135314,1135315,1135316,1135320,1135323,1135330,1135335,1135492,1135542,1135556,1135603,1135642,1135661,1135758,1135897,1136156,1136157,1136161,1136188,1136206,1136215,1136217,1136264,1136271,1136333,1136342,1136343,1136345,1136347,1136348,1136353,1136424,1136428,1136430,1136432,1136434,1136435,1136438,1136439,1136456,1136460,1136461,1136462,1136467,1136469,1136477,1136478,1136498,1136573,1136586,1136598,1136881,1136922,1136935,1136978,1136990,1137103,1137151,1137152,1137153,1137162,1137194,1137201,1137224,1137232,1137233,1137236,1137366,1137372,1137429,1137444,1137458,1137534,1137535,1137584,1137586,1137609,1137625,1137728,1137739,1137752,1137811,1137827,1137884,1137985,1137995,1137996,1137998,1137999,1138000,1138002,1138003,1138005,1138006,1138007,1138008,1138009,1138010,1138011,1138012,1138013,1138014,1138015,1138016,1138017,1138018,1138019,1138263,1138291,1138293,1138336,1138374,1138375,1138589,1138681,1138719,1138732,1138874,1138879,1139358,1139619,1139712,1139751,1139771,1139865,1140133,1140139,1140228,1140322,1140328,1140405,1140424,1140428,1140454,1140463,1140559,1140575,1140577,1140637,1140652,1140658,1140676,1140715,1140719,1140726,1140727,1140728,1140814,1140887,1140888,1140889,1140891,1140893,1140903,1140945,1140948,1140954,1140955,1140956,1140957,1140958,1140959,1140960,1140961,1140962,1140964,1140971,1140972,1140992,1141312,1141401,1141402,1141452,1141453,1141454,1141478,1141558,1142023,1142052,1142083,1142112,1142115,1142119,1142220,1142221,1142254,1142350,1142351,1142354,1142359,1142450,1142623,1142673,1142701,1142868,1143003,1143045,1143105,1143185,1143189,1143191,1143209,1143507 CVE References: CVE-2017-5753,CVE-2018-12126,CVE-2018-12127,CVE-2018-12130,CVE-2018-16871,CVE-2018-16880,CVE-2018-20836,CVE-2018-20855,CVE-2018-7191,CVE-2019-10124,CVE-2019-10638,CVE-2019-10639,CVE-2019-11085,CVE-2019-11091,CVE-2019-1125,CVE-2019-11477,CVE-2019-11478,CVE-2019-11479,CVE-2019-11486,CVE-2019-11487,CVE-2019-11599,CVE-2019-11810,CVE-2019-11811,CVE-2019-11815,CVE-2019-11833,CVE-2019-11884,CVE-2019-12380,CVE-2019-12382,CVE-2019-12456,CVE-2019-12614,CVE-2019-12817,CVE-2019-12818,CVE-2019-12819,CVE-2019-13233,CVE-2019-13631,CVE-2019-13648,CVE-2019-14283,CVE-2019-14284,CVE-2019-3846,CVE-2019-3882,CVE-2019-5489,CVE-2019-8564,CVE-2019-9003,CVE-2019-9500,CVE-2019-9503 Sources used: SUSE Linux Enterprise Module for Realtime 15-SP1 (src): kernel-rt-4.12.14-14.8.1, kernel-rt_debug-4.12.14-14.8.1, kernel-source-rt-4.12.14-14.8.1, kernel-syms-rt-4.12.14-14.8.1 SUSE Linux Enterprise Module for Open Buildservice Development Tools 15-SP1 (src): kernel-rt-4.12.14-14.8.1, kernel-rt_debug-4.12.14-14.8.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.