Quantcast
Channel: openSUSE Forums
Viewing all 40713 articles
Browse latest View live

LEAP 15.2 integrity Problem loading X.509 certificate -74

$
0
0
Hallo,

ich bekomme beim booten von Leap 15.2 immer den Fehler "integrity Problem loading X.509 certificate -74" - ist das problematisch bzw. wie kann ich das beheben?

Hier mal ein syslog-Auszug:

Code:

08.04.21 21:39    AppArmor    AppArmor sha1 policy hashing enabled08.04.21 21:39    integrity    Loading X.509 certificate: UEFI:db
08.04.21 21:39    integrity    Loaded X.509 cert 'Microsoft Corporation UEFI CA 2011: 13adbxxxxxxxxxxxxxxxxxxxxx1bd4'
08.04.21 21:39    integrity    Loading X.509 certificate: UEFI:db
08.04.21 21:39    integrity    Loaded X.509 cert 'Microsoft Windows Production PCA 2011: a9290xxxxxxxxxxxxxxxxxxaf53'
08.04.21 21:39    integrity    Loading X.509 certificate: UEFI:MokListRT
08.04.21 21:39    integrity    Loaded X.509 cert 'openSUSE Secure Boot Signkey: 0332fxxxxxxxxxxxxxxxxxxxxxxxxefc8'
08.04.21 21:39    integrity    Loading X.509 certificate: UEFI:MokListRT
08.04.21 21:39    integrity    Loaded X.509 cert 'grub: d939xxxxxxxxxxxxxxxxxxxxxxxxxxx9007'
08.04.21 21:39    integrity    Loading X.509 certificate: UEFI:MokListRT
08.04.21 21:39    integrity    Problem loading X.509 certificate -74
08.04.21 21:39        Error adding keys to platform keyring UEFI:MokListRT
08.04.21 21:39    integrity    Loading X.509 certificate: UEFI:MokListRT
08.04.21 21:39    integrity    Loaded X.509 cert 'openSUSE Secure Boot CA: 6842xxxxxxxxxxxxxxxxxxxxxx1762'
08.04.21 21:39    ima    No TPM chip found, activating TPM-bypass!
08.04.21 21:39    ima    Allocated hash algorithm: sha256
08.04.21 21:39    ima    No architecture policies found
08.04.21 21:39    evm    Initialising EVM extended attributes:
08.04.21 21:39    evm    security.selinux

Danke und Grüße,

Gui Do

TUMBLEWEED openrazer drivers don't automatically get rebuilt for new kernel

$
0
0
Greetings:

I use some Razer peripherals and, accordingly, have installed some of the Razer tools for configuring them; the list of items I've installed is below.


  1. openrazer-daemon
  2. openrazer-kernel-modules-dkms
  3. openrazer-meta
  4. polychromatic
  5. python3-openrazer


I, basically, followed the instructions to install it here: https://software.opensuse.org/downlo...openrazer-meta

Anyways, when I update my system, things like the kernel are updated but these packages are not. I update my system with the following commands.

sudo zypper refresh && sudo zypper dup && sudo flatpak update

I can see it being out of date because my tray applet indicates the daemon is not working properly and through some sleuthing (see below).

> uname -a
Linux babeltumble 5.11.11-1-default #1 SMP Tue Mar 30 17:57:52 UTC 2021 (dbc4a02) x86_64 x86_64 x86_
64 GNU/Linux
> sudo dkms status
[sudo] password for root:
openrazer-driver, 3.0.0, 5.11.6-1-default, x86_64: installed

The only way I've found to get this to update is to do the following.

sudo dkms remove -m openrazer-driver -v 3.0.0 -k 5.11.6-1-default
sudo dkms autoinstall


I am new to openSUSE Tumbleweed and absolutely love it. Is this driver something I need to continue manually updating or is there a method for it to automatically update when new kernels are installed? Thank you for any insight you can provide into this. I did a bunch of searches and couldn't find anything to discuss this; I apologize if I missed something.

Kind regards,
Anthony

LEAP 15.3 no login prompt welcome message

$
0
0
On my most recent (fresh) 15.3 installation I'm not seeing the Welcome to openSUSE <version> - <kernel version> message presented with vtty login prompts as I am on all other installations. /etc/issue is absent and /etc/issue.d/ is empty. openSUSE-release-ftp and openSUSE-release are installed. What mechanism is responsible for the welcome message presentation with login prompts? My web search for the mechanism was unhelpful. What is this installation missing? Is this a reportable bug?

LEAP 15.2 Übersetzung von UxPlay scheitert

$
0
0
Hallo,

ich versuche gerade UxPlay zu compilieren. Dazu habe ich folgende Anleitung genommen:

https://rodrigoribeiro.site/2020/08/...reen-on-linux/

Allerdings erhalte ich folgende Fehlermeldung:

Code:

maik@maik-laptop:~/Downloads/rpm/UxPlay-master/build> cmake ..
-- The C compiler identification is unknown
-- The CXX compiler identification is unknown
CMake Error at CMakeLists.txt:3 (project):
  No CMAKE_C_COMPILER could be found.

  Tell CMake where to find the compiler by setting either the environment
  variable "CC" or the CMake cache entry CMAKE_C_COMPILER to the full path to
  the compiler, or to the compiler name if it is in the PATH.


CMake Error at CMakeLists.txt:3 (project):
  No CMAKE_CXX_COMPILER could be found.

  Tell CMake where to find the compiler by setting either the environment
  variable "CXX" or the CMake cache entry CMAKE_CXX_COMPILER to the full path
  to the compiler, or to the compiler name if it is in the PATH.


-- Configuring incomplete, errors occurred!
See also "/home/maik/Downloads/rpm/UxPlay-master/build/CMakeFiles/CMakeError.log".

Ich könnte die CMakeError.log anfügen, finde aber hier dazu keine Option (vielleicht bin ich auch zu blind.).

CMake ist kedenfalls installiert. Was ist denn der CMAKE_CXX_COMPILER? Ich finde dazu in der Paketverwarltung nichts passendes. Leider..

Wie komme ich hier weiter?

Gruß
mairo

{KDE} Autoodtwarzanie plików binarnych

$
0
0
Jestem nowym użytkownikiem linuxa i podczas uruchamiania pliku typu "executable" zaznaczyłem aby zawsze uruchamiało od razu pliki tego typu, nie pytając się wcześniej czy na pewno go uruchomić. Chciałbym to zmienić, ale niestety nie wiem jak. Szukałem w ustawieniach i niestety nic nie znalazłem. Czy byłby ktoś w stanie mi powiedzieć jak to można zmienić?

LEAP 15.2 Leap 15.2 Samba AD DC Password Expiration for Windows user, can't change password

$
0
0
Hi everybody,

I apologize if this topic has already been discussed; weeks of searching has turned up nothing.

I have a Leap 15.2 server built out with samba 4.11.14+git.202.344b137b75d, configured as a domain controller (samba-ad-dc), with MIT KRB5 1.16.3-lp152.5.13.1, nothing fancy, everything right from the Leap 15.2 repositories - no add-ons. Basic bare-bones build. The server works well with respect to joining Windows 10 20H2 workstations to it, creating, removing users, managing passwords via Windows Admin tools. I can change user passwords from workstations by executing CTRL+ALT+DEL and filling out the fields; all of that works well.

I am struggling with expired passwords and responding to them from the Windows 10 workstations. It keeps telling me the password has expired, offering only the OK button, which brings me back to the change password dialog. This happens with a brand new user flagged as "much change password" after creation or any existing user I decide to flag as "much change password" to trigger a password reset at next logon. This also occurs for regular users who do not have the "never expires" password attribute set on their user object; once their 45-day window comes due, and they try to logon, the workstation loops through the cycle, password expired, OK - password dialog box.

the smb.conf looks like this:
Code:

[global]
    workgroup = WRKGRP
    passdb backend = samba_dsdb
    map to guest = Never
    dns forwarder = <IP ADDRESS>
    netbios name = TEST
    realm = TESTING.LAB
    security = AUTO
    server role = domain controller
    log level = 3 passdb:5 auth:5

[netlogon]
    path = /path/to/scripts
    read only = No

[sysvol]
    path = /var/locks/sysvol
    read only = No

Here's my krb5.conf
Code:

[libdefaults]
    default_realm = TESTING.LAB
    dns_lookup_realm = false
    dns_lookup_kdc = true

[logging]
    kdc = FILE:/var/log/krb5/krb5kdc.log
    admin_server = FILE:/var/log/krb5/kadmind.log
    default = SYSLOG:NOTICE:DAEMON

I can provide logs from Samba and Kerberos if you'd like to see them. Executing kinit from the server on the user tells me the password has expired, and allows me to change it successfully. smbclient tells me the password has also expired, but does not offer me a chance to change it, but that may have been my fault; I was doing that test on the quick, and I should go back and try again with more attention to detail. When running kinit, the "change password" flag was not turned off afterward, not that I expected it to do so, but the more info the better, right?

New Tumbleweed snapshot 20210408 released!

$
0
0
Please note that this mail was generated by a script.
The described changes are computed based on the x86_64 DVD.
The full online repo contains too many changes to be listed here.

More...

openSUSE-SU-2021:0531-1: moderate: Security update for gssproxy

$
0
0
openSUSE Security Update: Security update for gssproxy ______________________________________________________________________________ Announcement ID: openSUSE-SU-2021:0531-1 Rating: moderate References: #1180515 Cross-References: CVE-2020-12658 CVSS scores: CVE-2020-12658 (NVD) : 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVE-2020-12658 (SUSE): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L Affected Products: openSUSE Leap 15.2 ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: This update for gssproxy fixes the following issues: - CVE-2020-12658: Fixed an issue where gssproxy was not unlocking cond_mutex before pthread exit in gp_worker_main() (bsc#1180515). This update was imported from the SUSE:SLE-15-SP1:Update update project. Patch Instructions: To install this openSUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - openSUSE Leap 15.2: zypper in -t patch openSUSE-2021-531=1 Package List: - openSUSE Leap 15.2 (x86_64): gssproxy-0.8.2-lp152.2.3.1 gssproxy-debuginfo-0.8.2-lp152.2.3.1 gssproxy-debugsource-0.8.2-lp152.2.3.1 References: https://www.suse.com/security/cve/CVE-2020-12658.html https://bugzilla.suse.com/1180515

More...

LEAP 15.2 Unlock Keyring Window

$
0
0
I am using openSUSE Leap 15.2, 64-bit, KDE.

Every time that I launch Skype, a window pops up (called "Unlock Keyring") wanting my Skype password.

How do I get rid of that window?

TUMBLEWEED Zypper Remove Fails

$
0
0
Tinkered with amdgpu and ran into the follwing problem:

Code:

Reading installed packages...
Resolving package dependencies...

The following package is going to be REMOVED:
  amdgpu-dkms

1 package to remove.
After the operation, 224.1 MiB will be freed.
Continue? [y/n/v/...? shows all options] (y): (1/1) Removing amdgpu-dkms-1:5.9.10.69-1234663.noarch [....error]
Removal of (115)amdgpu-dkms-1:5.9.10.69-1234663.noarch(@System) failed:
Error: Subprocess failed. Error: RPM failed: Error! There are no instances of module: amdgpu
5.9.10.69-1234663 located in the DKMS tree.
error: %preun(amdgpu-dkms-1:5.9.10.69-1234663.noarch) scriptlet failed, exit status 3
error: amdgpu-dkms-1:5.9.10.69-1234663.noarch: erase failed

Abort, retry, ignore? [a/r/i] (a): Problem occurred during or after installation or removal of packages:
Installation has been aborted as directed.
Please see the above error message for a hint.

Any idea?

openSUSE-SU-2021:0532-1: important: Security update for the Linux Kernel

$
0
0
openSUSE Security Update: Security update for the Linux Kernel______________________________________________________________________________Announcement ID: openSUSE-SU-2021:0532-1Rating: importantReferences: #1152472 #1152489 #1153274 #1154353 #1155518 #1156256 #1159280 #1160634 #1167773 #1168777 #1169514 #1169709 #1171295 #1173485 #1177326 #1178163 #1178330 #1179454 #1180197 #1180980 #1181383 #1181674 #1181862 #1182011 #1182077 #1182485 #1182552 #1182574 #1182591 #1182595 #1182715 #1182716 #1182717 #1182770 #1182989 #1183015 #1183018 #1183022 #1183023 #1183048 #1183252 #1183277 #1183278 #1183279 #1183280 #1183281 #1183282 #1183283 #1183284 #1183285 #1183286 #1183287 #1183288 #1183366 #1183369 #1183386 #1183412 #1183416 #1183427 #1183428 #1183445 #1183447 #1183501 #1183509 #1183530 #1183534 #1183540 #1183593 #1183596 #1183598 #1183637 #1183646 #1183662 #1183686 #1183692 #1183696 #1183750 #1183757 #1183775 #1183843 #1183859 #1183871 #1184167 #1184168 #1184170 #1184176 #1184192 #1184193 #1184196 #1184198 #1184217 #1184218 #1184219 #1184220 #1184224 Cross-References: CVE-2019-18814 CVE-2019-19769 CVE-2020-27170 CVE-2020-27171 CVE-2020-27815 CVE-2020-35519 CVE-2021-27363 CVE-2021-27364 CVE-2021-27365 CVE-2021-28038 CVE-2021-28375 CVE-2021-28660 CVE-2021-28688 CVE-2021-28964 CVE-2021-28971 CVE-2021-28972 CVE-2021-29264 CVE-2021-29265 CVE-2021-29647 CVE-2021-3428 CVE-2021-3444 CVSS scores: CVE-2019-18814 (NVD) : 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVE-2019-18814 (SUSE): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L CVE-2019-19769 (NVD) : 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H CVE-2019-19769 (SUSE): 5.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:H CVE-2020-27170 (NVD) : 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N CVE-2020-27171 (NVD) : 6 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H CVE-2020-27815 (SUSE): 7.4 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H CVE-2020-35519 (SUSE): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVE-2021-27363 (NVD) : 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L CVE-2021-27363 (SUSE): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H CVE-2021-27364 (NVD) : 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H CVE-2021-27364 (SUSE): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H CVE-2021-27365 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVE-2021-27365 (SUSE): 7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H CVE-2021-28038 (NVD) : 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H CVE-2021-28375 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVE-2021-28660 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVE-2021-28660 (SUSE): 8 CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H CVE-2021-28964 (SUSE): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVE-2021-28971 (SUSE): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H CVE-2021-28972 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVE-2021-28972 (SUSE): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H CVE-2021-29264 (SUSE): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVE-2021-29265 (NVD) : 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H CVE-2021-29265 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVE-2021-3428 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L CVE-2021-3444 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVE-2021-3444 (SUSE): 7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:HAffected Products: openSUSE Leap 15.2______________________________________________________________________________ An update that solves 21 vulnerabilities and has 74 fixes is now available.Description: The openSUSE Leap 15.2 kernel was updated to receive various security and bugfixes. The following security bugs were fixed: - CVE-2021-3444: Fixed an issue with the bpf verifier which did not properly handle mod32 destination register truncation when the source register was known to be 0 leading to out of bounds read (bsc#1184170). - CVE-2021-3428: Fixed an integer overflow in ext4_es_cache_extent (bsc#1173485). - CVE-2021-29647: Fixed an issue in qrtr_recvmsg which could have allowed attackers to obtain sensitive information from kernel memory because of a partially uninitialized data structure (bsc#1184192 ). - CVE-2021-29265: Fixed an issue in usbip_sockfd_store which could have allowed attackers to cause a denial of service due to race conditions during an update of the local and shared status (bsc#1184167). - CVE-2021-29264: Fixed an issue in the Freescale Gianfar Ethernet driver which could have allowed attackers to cause a system crash due to a calculation of negative fragment size (bsc#1184168). - CVE-2021-28972: Fixed a user-tolerable buffer overflow when writing a new device name to the driver from userspace, allowing userspace to write data to the kernel stack frame directly (bsc#1184198). - CVE-2021-28971: Fixed an issue in intel_pmu_drain_pebs_nhm which could have caused a system crash because the PEBS status in a PEBS record was mishandled (bsc#1184196 ). - CVE-2021-28964: Fixed a race condition in get_old_root which could have allowed attackers to cause a denial of service (bsc#1184193). - CVE-2021-28688: Fixed an issue introduced by XSA-365 (bsc#1183646). - CVE-2021-28660: Fixed an out of bounds write in rtw_wx_set_scan (bsc#1183593 ). - CVE-2021-28375: Fixed an issue in fastrpc_internal_invoke which did not prevent user applications from sending kernel RPC messages (bsc#1183596). - CVE-2021-28038: Fixed an issue with the netback driver which was lacking necessary treatment of errors such as failed memory allocations (bsc#1183022). - CVE-2021-27365: Fixed an issue where an unprivileged user can send a Netlink message that is associated with iSCSI, and has a length up to the maximum length of a Netlink message (bsc#1182715). - CVE-2021-27364: Fixed an issue where an attacker could craft Netlink messages (bsc#1182717). - CVE-2021-27363: Fixed a kernel pointer leak which could have been used to determine the address of the iscsi_transport structure (bsc#1182716). - CVE-2020-35519: Fixed an out-of-bounds memory access was found in x25_bind (bsc#1183696). - CVE-2020-27815: Fixed an issue in JFS filesystem where could have allowed an attacker to execute code (bsc#1179454). - CVE-2020-27171: Fixed an off-by-one error affecting out-of-bounds speculation on pointer arithmetic, leading to side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory (bsc#1183775). - CVE-2020-27170: Fixed potential side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory (bsc#1183686). - CVE-2019-19769: Fixed a use-after-free in the perf_trace_lock_acquire function (bsc#1159280 ). - CVE-2019-18814: Fixed a use-after-free when aa_label_parse() fails in aa_audit_rule_init() (bsc#1156256). The following non-security bugs were fixed: - 0007-block-add-docs-for-gendisk-request_queue-refcount-he.patch: (bsc#1171295, git fixes (block drivers)). - 0008-block-revert-back-to-synchronous-request_queue-remov.patch: (bsc#1171295, git fixes (block drivers)). - 0009-blktrace-fix-debugfs-use-after-free.patch: (bsc#1171295, git fixes (block drivers)). - ACPI: bus: Constify is_acpi_node() and friends (part 2) (git-fixes). - ACPICA: Always create namespace nodes using acpi_ns_create_node() (git-fixes). - ACPICA: Enable sleep button on ACPI legacy wake (bsc#1181383). - ACPICA: Fix race in generic_serial_bus (I2C) and GPIO op_region parameter handling (git-fixes). - ACPI: scan: Rearrange memory allocation in acpi_device_add() (git-fixes). - ACPI: video: Add DMI quirk for GIGABYTE GB-BXBT-2807 (git-fixes). - ACPI: video: Add missing callback back for Sony VPCEH3U1E (git-fixes). - ALSA: ctxfi: cthw20k2: fix mask on conf to allow 4 bits (git-fixes). - ALSA: hda: Avoid spurious unsol event handling during S3/S4 (git-fixes). - ALSA: hda: Drop the BATCH workaround for AMD controllers (git-fixes). - ALSA: hda: generic: Fix the micmute led init state (git-fixes). - ALSA: hda/hdmi: Cancel pending works before suspend (git-fixes). - ALSA: hda/realtek: Add quirk for Clevo NH55RZQ (git-fixes). - ALSA: hda/realtek: Add quirk for Intel NUC 10 (git-fixes). - ALSA: hda/realtek: Apply dual codec quirks for MSI Godlike X570 board (git-fixes). - ALSA: hda/realtek: Apply headset-mic quirks for Xiaomi Redmibook Air (git-fixes). - ALSA: hda/realtek: apply pin quirk for XiaomiNotebook Pro (git-fixes). - ALSA: hda/realtek: Enable headset mic of Acer SWIFT with ALC256 (git-fixes). - ALSA: hda/realtek: fix a determine_headset_type issue for a Dell AIO (git-fixes). - ALSA: usb: Add Plantronics C320-M USB ctrl msg delay quirk (bsc#1182552). - ALSA: usb-audio: Allow modifying parameters with succeeding hw_params calls (bsc#1182552). - ALSA: usb-audio: Apply sample rate quirk to Logitech Connect (git-fixes). - ALSA: usb-audio: Apply the control quirk to Plantronics headsets (bsc#1182552). - ALSA: usb-audio: Disable USB autosuspend properly in setup_disable_autosuspend() (bsc#1182552). - ALSA: usb-audio: Do not abort even if the clock rate differs (bsc#1182552). - ALSA: usb-audio: Drop bogus dB range in too low level (bsc#1182552). - ALSA: usb-audio: Fix "cannot get freq eq" errors on Dell AE515 sound bar (bsc#1182552). - ALSA: usb-audio: fix NULL ptr dereference in usb_audio_probe (bsc#1182552). - ALSA: usb-audio: Fix "RANGE setting not yet supported" errors (git-fixes). - ALSA: usb-audio: fix use after free in usb_audio_disconnect (bsc#1182552). - ALSA: usb-audio: Skip the clock selector inquiry for single connections (git-fixes). - ALSA: usb: Use DIV_ROUND_UP() instead of open-coding it (git-fixes). - amd/amdgpu: Disable VCN DPG mode for Picasso (git-fixes). - apparmor: check/put label on apparmor_sk_clone_security() (git-fixes). - arm64: make STACKPROTECTOR_PER_TASK configurable (bsc#1181862). - ASoC: ak4458: Add MODULE_DEVICE_TABLE (git-fixes). - ASoC: ak5558: Add MODULE_DEVICE_TABLE (git-fixes). - ASoC: cs42l42: Always wait at least 3ms after reset (git-fixes). - ASoC: cs42l42: Do not enable/disable regulator at Bias Level (git-fixes). - ASoC: cs42l42: Fix Bitclock polarity inversion (git-fixes). - ASoC: cs42l42: Fix channel width support (git-fixes). - ASoC: cs42l42: Fix mixer volume control (git-fixes). - ASoC: es8316: Simplify adc_pga_gain_tlv table (git-fixes). - ASoC: fsl_ssi: Fix TDM slot setup for I2S mode (git-fixes). - ASoC: Intel: Add DMI quirk table to soc_intel_is_byt_cr() (git-fixes). - ASoC: Intel: bytcr_rt5640: Add quirk for ARCHOS Cesium 140 (git-fixes). - ASoC: Intel: bytcr_rt5640: Add quirk for the Acer One S1002 tablet (git-fixes). - ASoC: Intel: bytcr_rt5640: Add quirk for the Estar Beauty HD MID 7316R tablet (git-fixes). - ASoC: Intel: bytcr_rt5640: Add quirk for the Voyo Winpad A15 tablet (git-fixes). - ASoC: Intel: bytcr_rt5640: Fix HP Pavilion x2 10-p0XX OVCD current threshold (git-fixes). - ASoC: Intel: bytcr_rt5651: Add quirk for the Jumper EZpad 7 tablet (git-fixes). - ASoC: rt5640: Fix dac- and adc- vol-tlv values being off by a factor of 10 (git-fixes). - ASoC: rt5651: Fix dac- and adc- vol-tlv values being off by a factor of 10 (git-fixes). - ASoC: rt5670: Add emulated 'DAC1 Playback Switch' control (git-fixes). - ASoC: rt5670: Remove ADC vol-ctrl mute bits poking from Sto1 ADC mixer settings (git-fixes). - ASoC: rt5670: Remove 'HP Playback Switch' control (git-fixes). - ASoC: rt5670: Remove 'OUT Channel Switch' control (git-fixes). - ASoC: sgtl5000: set DAP_AVC_CTRL register to correct default value on probe (git-fixes). - ASoC: simple-card-utils: Do not handle device clock (git-fixes). - ath10k: fix wmi mgmt tx queue full due to race condition (git-fixes). - ath9k: fix transmitting to stations in dynamic SMPS mode (git-fixes). - binfmt_misc: fix possible deadlock in bm_register_write (git-fixes). - binfmt_misc: fix possible deadlock in bm_register_write (git-fixes). - blktrace-annotate-required-lock-on-do_blk_trace_setu.patch: (bsc#1171295). - blktrace-Avoid-sparse-warnings-when-assigning-q-blk_.patch: (bsc#1171295). - blktrace-break-out-of-blktrace-setup-on-concurrent-c.patch: (bsc#1171295). - block-clarify-context-for-refcount-increment-helpers.patch: (bsc#1171295). - block: rsxx: fix error return code of rsxx_pci_probe() (git-fixes). - Bluetooth: Fix null pointer dereference in amp_read_loc_assoc_final_data (git-fixes). - Bluetooth: hci_h5: Set HCI_QUIRK_SIMULTANEOUS_DISCOVERY for btrtl (git-fixes). - bnxt_en: reliably allocate IRQ table on reset to avoid crash (jsc#SLE-8371 bsc#1153274). - bpf: Add sanity check for upper ptr_limit (bsc#1183686 bsc#1183775). - bpf: Avoid warning when re-casting __bpf_call_base into __bpf_call_base_args (bsc#1155518). - bpf: Declare __bpf_free_used_maps() unconditionally (bsc#1155518). - bpf: Do not do bpf_cgroup_storage_set() for kuprobe/tp programs (bsc#1155518). - bpf: Fix 32 bit src register truncation on div/mod (bsc#1184170). - bpf_lru_list: Read double-checked variable once without lock (bsc#1155518). - bpf: Simplify alu_limit masking for pointer arithmetic (bsc#1183686 bsc#1183775). - bpf,x64: Pad NOPs to make images converge more easily (bsc#1178163). - brcmfmac: Add DMI nvram filename quirk for Predia Basic tablet (git-fixes). - brcmfmac: Add DMI nvram filename quirk for Voyo winpad A15 tablet (git-fixes). - btrfs: abort the transaction if we fail to inc ref in btrfs_copy_root (bsc#1184217). - btrfs: always pin deleted leaves when there are active tree mod log users (bsc#1184224). - btrfs: fix exhaustion of the system chunk array due to concurrent allocations (bsc#1183386). - btrfs: fix extent buffer leak on failure to copy root (bsc#1184218). - btrfs: fix race when cloning extent buffer during rewind of an old root (bsc#1184193). - btrfs: fix stale data exposure after cloning a hole with NO_HOLES enabled (bsc#1184220). - btrfs: fix subvolume/snapshot deletion not triggered on mount (bsc#1184219). - bus: omap_l3_noc: mark l3 irqs as IRQF_NO_THREAD (git-fixes). - can: c_can: move runtime PM enable/disable to c_can_platform (git-fixes). - can: c_can_pci: c_can_pci_remove(): fix use-after-free (git-fixes). - can: flexcan: assert FRZ bit in flexcan_chip_freeze() (git-fixes). - can: flexcan: enable RX FIFO after FRZ/HALT valid (git-fixes). - can: flexcan: flexcan_chip_freeze(): fix chip freeze for missing bitrate (git-fixes). - can: flexcan: invoke flexcan_chip_freeze() to enter freeze mode (git-fixes). - can: m_can: m_can_do_rx_poll(): fix extraneous msg loss warning (git-fixes). - can: peak_usb: add forgotten supported devices (git-fixes). - can: peak_usb: Revert "can: peak_usb: add forgotten supported devices" (git-fixes). - can: skb: can_skb_set_owner(): fix ref counting if socket was closed before setting skb ownership (git-fixes). - cdc-acm: fix BREAK rx code path adding necessary calls (git-fixes). - certs: Fix blacklist flag type confusion (git-fixes). - cifs: check pointer before freeing (bsc#1183534). - completion: Drop init_completion define (git-fixes). - configfs: fix a use-after-free in __configfs_open_file (git-fixes). - config: net: freescale: change xgmac-mdio to built-in References: bsc#1183015,bsc#1182595 - crypto: aesni - prevent misaligned buffers on the stack (git-fixes). - crypto: arm64/sha - add missing module aliases (git-fixes). - crypto: bcm - Rename struct device_private to bcm_device_private (git-fixes). - crypto: Kconfig - CRYPTO_MANAGER_EXTRA_TESTS requires the manager (git-fixes). - crypto: tcrypt - avoid signed overflow in byte count (git-fixes). - Delete patches.suse/sched-Reenable-interrupts-in-do_sched_yield.patch (bsc#1183530) - drivers/misc/vmw_vmci: restrict too big queue size in qp_host_alloc_queue (git-fixes). - drm/amd/display: Guard against NULL pointer deref when get_i2c_info fails (git-fixes). - drm/amdgpu: Add check to prevent IH overflow (git-fixes). - drm/amdgpu: fix parameter error of RREG32_PCIE() in amdgpu_regs_pcie (git-fixes). - drm/amdkfd: Put ACPI table after using it (bsc#1152489) Backporting notes: * context changes - drm/amd/powerplay: fix spelling mistake "smu_state_memroy_block" -> (bsc#1152489) Backporting notes: * rename amd/pm to amd/powerplay * context changes - drm/compat: Clear bounce structures (git-fixes). - drm/hisilicon: Fix use-after-free (git-fixes). - drm/i915: Reject 446-480MHz HDMI clock on GLK (git-fixes). - drm/mediatek: Fix aal size config (bsc#1152489) Backporting notes: * replaced mtk_ddp_write() with writel() - drm: meson_drv add shutdown function (git-fixes). - drm/msm/a5xx: Remove overwriting A5XX_PC_DBG_ECO_CNTL register (git-fixes). - drm/msm/dsi: Correct io_start for MSM8994 (20nm PHY) (git-fixes). - drm/msm: Fix races managing the OOB state for timestamp vs (bsc#1152489) Backporting notes: * context changes - drm/msm: fix shutdown hook in case GPU components failed to bind (git-fixes). - drm/msm: Fix use-after-free in msm_gem with carveout (bsc#1152489) Backporting notes: * context changes - drm/msm: Fix WARN_ON() splat in _free_object() (bsc#1152489) Backporting notes: * context changes - drm/msm/gem: Add obj->lock wrappers (bsc#1152489) Backporting notes: * taken for 9b73bde39cf2 ("drm/msm: Fix use-after-free in msm_gem with carveout") * context changes - drm/nouveau: bail out of nouveau_channel_new if channel init fails (bsc#1152489) - drm/nouveau/kms: handle mDP connectors (git-fixes). - drm/panfrost: Do not corrupt the queue mutex on open/close (bsc#1152472) - drm/panfrost: Fix job timeout handling (bsc#1152472) Backporting notes: - drm/panfrost: Remove unused variables in panfrost_job_close() (bsc#1152472) - drm/radeon: fix AGP dependency (git-fixes). - drm: rcar-du: Fix crash when using LVDS1 clock for CRTC (bsc#1152489) Backporting notes: * context changes - drm/sched: Cancel and flush all outstanding jobs before finish (git-fixes). - drm/sun4i: tcon: fix inverted DCLK polarity (bsc#1152489) Backporting notes: * context changes - drm/tegra: sor: Grab runtime PM reference across reset (git-fixes). - drm/vc4: hdmi: Restore cec physical address on reconnect (bsc#1152472) Backporting notes: * context changes * change vc4_hdmi to vc4->hdmi * removed references to encoder->hdmi_monitor - efi: use 32-bit alignment for efi_guid_t literals (git-fixes). - epoll: check for events when removing a timed out thread from the wait queue (git-fixes). - ethernet: alx: fix order of calls on resume (git-fixes). - exec: Move would_dump into flush_old_exec (git-fixes). - exfat: add missing MODULE_ALIAS_FS() (bsc#1182989). - exfat: add the dummy mount options to be backward compatible with staging/exfat (bsc#1182989). - extcon: Add stubs for extcon_register_notifier_all() functions (git-fixes). - extcon: Fix error handling in extcon_dev_register (git-fixes). - fbdev: aty: SPARC64 requires FB_ATY_CT (git-fixes). - firmware/efi: Fix a use after bug in efi_mem_reserve_persistent (git-fixes). - flow_dissector: fix byteorder of dissected ICMP ID (bsc#1154353). - fsl/fman: check dereferencing null pointer (git-fixes). - fsl/fman: fix dereference null return value (git-fixes). - fsl/fman: fix eth hash table allocation (git-fixes). - fsl/fman: fix unreachable code (git-fixes). - fsl/fman: use 32-bit unsigned integer (git-fixes). - fuse: verify write return (git-fixes). - gcc-plugins: drop support for GCC buf (git-fixes). - net: mvneta: make tx buffer array agnostic (git-fixes). - net: qcom/emac: add missed clk_disable_unprepare in error path of emac_clks_phase1_init (git-fixes). - netsec: restore phy power state after controller reset (bsc#1183757). - net: spider_net: Fix the size used in a 'dma_free_coherent()' call (git-fixes). - net: stmmac: Fix incorrect location to set real_num_rx|tx_queues (git-fixes). - net: stmmac: removed enabling eee in EEE set callback (git-fixes). - net: stmmac: use netif_tx_start|stop_all_queues() function (git-fixes). - net: stmmac: Use rtnl_lock/unlock on netif_set_real_num_rx_queues() call (git-fixes). - net: usb: ax88179_178a: fix missing stop entry in driver_info (git-fixes). - net: usb: qmi_wwan: allow qmimux add/del with master up (git-fixes). - net: usb: qmi_wwan: support ZTE P685M modem (git-fixes). - nfp: flower: fix pre_tun mask id allocation (bsc#1154353). - nvme: allocate the keep alive request using BLK_MQ_REQ_NOWAIT (bsc#1182077). - nvme-fabrics: fix kato initialization (bsc#1182591). - nvme-fabrics: only reserve a single tag (bsc#1182077). - nvme-fc: fix racing controller reset and create association (bsc#1183048). - nvme-hwmon: Return error code when registration fails (bsc#1177326). - nvme: merge nvme_keep_alive into nvme_keep_alive_work (bsc#1182077). - nvme: return an error if nvme_set_queue_count() fails (bsc#1180197). - nvmet-rdma: Fix list_del corruption on queue establishment failure (bsc#1183501). - objtool: Fix ".cold" section suffix check for newer versions of GCC (bsc#1169514). - objtool: Fix error handling for STD/CLD warnings (bsc#1169514). - objtool: Fix retpoline detection in asm code (bsc#1169514). - ovl: fix dentry leak in ovl_get_redirect (bsc#1184176). - ovl: fix out of date comment and unreachable code (bsc#1184176). - ovl: fix regression with re-formatted lower squashfs (bsc#1184176). - ovl: fix unneeded call to ovl_change_flags() (bsc#1184176). - ovl: fix value of i_ino for lower hardlink corner case (bsc#1184176). - ovl: initialize error in ovl_copy_xattr (bsc#1184176). - ovl: relax WARN_ON() when decoding lower directory file handle (bsc#1184176). - PCI: Add a REBAR size quirk for Sapphire RX 5600 XT Pulse (git-fixes). - PCI: Add function 1 DMA alias quirk for Marvell 9215 SATA controller (git-fixes). - PCI: Align checking of syscall user config accessors (git-fixes). - PCI: Decline to resize resources if boot config must be preserved (git-fixes). - PCI: Fix pci_register_io_range() memory leak (git-fixes). - PCI: mediatek: Add missing of_node_put() to fix reference leak (git-fixes). - PCI: qcom: Use PHY_REFCLK_USE_PAD only for ipq8064 (git-fixes). - PCI: xgene-msi: Fix race in installing chained irq handler (git-fixes). - pinctrl: rockchip: fix restore error in resume (git-fixes). - Platform: OLPC: Fix probe error handling (git-fixes). - platform/x86: acer-wmi: Add ACER_CAP_KBD_DOCK quirk for the Aspire Switch 10E SW3-016 (git-fixes). - platform/x86: acer-wmi: Add ACER_CAP_SET_FUNCTION_MODE capability flag (git-fixes). - platform/x86: acer-wmi: Add new force_caps module parameter (git-fixes). - platform/x86: acer-wmi: Add support for SW_TABLET_MODE on Switch devices (git-fixes). - platform/x86: acer-wmi: Cleanup accelerometer device handling (git-fixes). - platform/x86: acer-wmi: Cleanup ACER_CAP_FOO defines (git-fixes). - platform/x86: intel-vbtn: Stop reporting SW_DOCK events (git-fixes). - PM: EM: postpone creating the debugfs dir till fs_initcall (git-fixes). - PM: runtime: Add pm_runtime_resume_and_get to deal with usage counter (bsc#1183366). - PM: runtime: Fix race getting/putting suppliers at probe (git-fixes). - powerpc/book3s64/radix: Remove WARN_ON in destroy_context() (bsc#1183692 ltc#191963). - powerpc/pseries/mobility: handle premature return from H_JOIN (bsc#1181674 ltc#189159 git-fixes bsc#1183662 ltc#191922). - powerpc/pseries/mobility: use struct for shared state (bsc#1181674 ltc#189159 git-fixes bsc#1183662 ltc#191922). - printk: fix deadlock when kernel panic (bsc#1183018). - proc: fix lookup in /proc/net subdirectories after setns(2) (git-fixes). - pwm: rockchip: rockchip_pwm_probe(): Remove superfluous clk_unprepare() (git-fixes). - qxl: Fix uninitialised struct field head.surface_id (git-fixes). - random: fix the RNDRESEEDCRNG ioctl (git-fixes). - RDMA/hns: Disable RQ inline by default (jsc#SLE-8449). - RDMA/hns: Fix type of sq_signal_bits (jsc#SLE-8449). - RDMA/srp: Fix support for unpopulated and unbalanced NUMA nodes (bsc#1169709) - Revert "net: bonding: fix error return code of bond_neigh_init()" (bsc#1154353). - rpadlpar: fix potential drc_name corruption in store functions (bsc#1183416 ltc#191079). - rpm/check-for-config-changes: add -mrecord-mcount ignore Added by 3b15cdc15956 (tracing: move function tracer options to Kconfig) upstream. - rpm/check-for-config-changes: comment on the list To explain what it actually is. - rpm/check-for-config-changes: declare sed args as an array So that we can reuse it in both seds. This also introduces IGNORED_CONFIGS_RE array which can be easily extended. - rpm/check-for-config-changes: define ignores more strictly * search for whole words, so make wildcards explicit * use ' for quoting * prepend CONFIG_ dynamically, so it need not be in the list - rpm/check-for-config-changes: ignore more configs Specifially, these: * CONFIG_CC_HAS_* * CONFIG_CC_HAVE_* * CONFIG_CC_CAN_* * CONFIG_HAVE_[A-Z]*_COMPILER * CONFIG_TOOLS_SUPPORT_* are compiler specific too. This will allow us to use super configs using kernel's dummy-tools. - rpm/check-for-config-changes: sort the ignores They are growing so to make them searchable by humans. - rsi: Fix TX EAPOL packet handling against iwlwifi AP (git-fixes). - rsi: Move card interrupt handling to RX thread (git-fixes). - rsxx: Return -EFAULT if copy_to_user() fails (git-fixes). - s390/cio: return -EFAULT if copy_to_user() fails (git-fixes). - s390/cio: return -EFAULT if copy_to_user() fails (git-fixes). - s390/crypto: return -EFAULT if copy_to_user() fails (git-fixes). - s390/dasd: fix hanging IO request during DASD driver unbind (git-fixes). - s390/qeth: fix memory leak after failed TX Buffer allocation (git-fixes). - s390/qeth: fix notification for pending buffers during teardown (git-fixes). - s390/qeth: improve completion of pending TX buffers (git-fixes). - s390/qeth: schedule TX NAPI on QAOB completion (git-fixes). - s390/vtime: fix increased steal time accounting (bsc#1183859). - samples, bpf: Add missing munmap in xdpsock (bsc#1155518). - scsi: lpfc: Change wording of invalid pci reset log message (bsc#1182574). - scsi: lpfc: Correct function header comments related to ndlp reference counting (bsc#1182574). - scsi: lpfc: Fix ADISC handling that never frees nodes (bsc#1182574). - scsi: lpfc: Fix crash caused by switch reboot (bsc#1182574). - scsi: lpfc: Fix dropped FLOGI during pt2pt discovery recovery (bsc#1182574). - scsi: lpfc: Fix FLOGI failure due to accessing a freed node (bsc#1182574). - scsi: lpfc: Fix incorrect dbde assignment when building target abts wqe (bsc#1182574). - scsi: lpfc: Fix lpfc_els_retry() possible null pointer dereference (bsc#1182574). - scsi: lpfc: Fix nodeinfo debugfs output (bsc#1182574). - scsi: lpfc: Fix null pointer dereference in lpfc_prep_els_iocb() (bsc#1182574). - scsi: lpfc: Fix PLOGI ACC to be transmit after REG_LOGIN (bsc#1182574). - scsi: lpfc: Fix pt2pt connection does not recover after LOGO (bsc#1182574). - scsi: lpfc: Fix pt2pt state transition causing rmmod hang (bsc#1182574). - scsi: lpfc: Fix reftag generation sizing errors (bsc#1182574). - scsi: lpfc: Fix stale node accesses on stale RRQ request (bsc#1182574). - scsi: lpfc: Fix status returned in lpfc_els_retry() error exit path (bsc#1182574). - scsi: lpfc: Fix unnecessary null check in lpfc_release_scsi_buf (bsc#1182574). - scsi: lpfc: Fix use after free in lpfc_els_free_iocb (bsc#1182574). - scsi: lpfc: Fix vport indices in lpfc_find_vport_by_vpid() (bsc#1182574). - scsi: lpfc: Reduce LOG_TRACE_EVENT logging for vports (bsc#1182574). - scsi: lpfc: Update copyrights for 12.8.0.7 and 12.8.0.8 changes (bsc#1182574). - scsi: lpfc: Update lpfc version to 12.8.0.8 (bsc#1182574). - scsi: target: pscsi: Avoid OOM in pscsi_map_sg() (bsc#1183843). - scsi: target: pscsi: Clean up after failure in pscsi_map_sg() (bsc#1183843). - selftests/bpf: Mask bpf_csum_diff() return value to 16 bits in test_verifier (bsc#1155518). - selftests/bpf: No need to drop the packet when there is no geneve opt (bsc#1155518). - selftests/bpf: Set gopt opt_class to 0 if get tunnel opt failed (bsc#1155518). - selinux: fix error initialization in inode_doinit_with_dentry() (git-fixes). - selinux: Fix error return code in sel_ib_pkey_sid_slow() (git-fixes). - selinux: fix inode_doinit_with_dentry() LABEL_INVALID error handling (git-fixes). - smb3: Fix out-of-bounds bug in SMB2_negotiate() (bsc#1183540). - software node: Fix node registration (git-fixes). - spi: stm32: make spurious and overrun interrupts visible (git-fixes). - squashfs: fix inode lookup sanity checks (bsc#1183750). - squashfs: fix xattr id and id lookup sanity checks (bsc#1183750). - staging: bcm2835-audio: Replace unsafe strcpy() with strscpy() (git-fixes). - staging: comedi: addi_apci_1032: Fix endian problem for COS sample (git-fixes). - staging: comedi: addi_apci_1500: Fix endian problem for command sample (git-fixes). - staging: comedi: adv_pci1710: Fix endian problem for AI command data (git-fixes). - staging: comedi: das6402: Fix endian problem for AI command data (git-fixes). - staging: comedi: das800: Fix endian problem for AI command data (git-fixes). - staging: comedi: dmm32at: Fix endian problem for AI command data (git-fixes). - staging: comedi: me4000: Fix endian problem for AI command data (git-fixes). - staging: comedi: pcl711: Fix endian problem for AI command data (git-fixes). - staging: comedi: pcl818: Fix endian problem for AI command data (git-fixes). - staging: fwserial: Fix error handling in fwserial_create (git-fixes). - staging: gdm724x: Fix DMA from stack (git-fixes). - staging: ks7010: prevent buffer overflow in ks_wlan_set_scan() (git-fixes). - staging: most: sound: add sanity check for function argument (git-fixes). - staging: rtl8188eu: Add Edimax EW-7811UN V2 to device table (git-fixes). - staging: rtl8188eu: fix potential memory corruption in rtw_check_beacon_data() (git-fixes). - staging: rtl8188eu: prevent ->ssid overflow in rtw_wx_set_scan() (git-fixes). - staging: rtl8192e: Change state information from u16 to u8 (git-fixes). - staging: rtl8192e: Fix incorrect source in memcpy() (git-fixes). - staging: rtl8192e: Fix possible buffer overflow in _rtl92e_wx_set_scan (git-fixes). - staging: rtl8192u: fix ->ssid overflow in r8192_wx_set_scan() (git-fixes). - staging: rtl8712: Fix possible buffer overflow in r8712_sitesurvey_cmd (git-fixes). - staging: rtl8712: unterminated string leads to read overflow (git-fixes). - stop_machine: mark helpers __always_inline (git-fixes). - udlfb: Fix memory leak in dlfb_usb_probe (git-fixes). - Update bug reference for USB-audio fixes (bsc#1182552 bsc#1183598) - USB: cdc-acm: fix double free on probe failure (git-fixes). - USB: cdc-acm: fix use-after-free after probe failure (git-fixes). - USB: dwc2: Fix HPRT0.PrtSusp bit setting for HiKey 960 board (git-fixes). - USB: dwc2: Prevent core suspend when port connection flag is 0 (git-fixes). - USB: dwc3: gadget: Fix dep->interval for fullspeed interrupt (git-fixes). - USB: dwc3: gadget: Fix setting of DEPCFG.bInterval_m1 (git-fixes). - USB: dwc3: qcom: Add missing DWC3 OF node refcount decrement (git-fixes). - USB: dwc3: qcom: Honor wakeup enabled/disabled state (git-fixes). - USB: gadget: configfs: Fix KASAN use-after-free (git-fixes). - USB: gadget: f_uac1: stop playback on function disable (git-fixes). - USB: gadget: f_uac2: always increase endpoint max_packet_size by one audio slot (git-fixes). - USB: gadget: udc: amd5536udc_pci fix null-ptr-dereference (git-fixes). - USB: gadget: u_ether: Fix a configfs return code (git-fixes). - USBip: Fix incorrect double assignment to udc->ud.tcp_rx (git-fixes). - USBip: fix stub_dev to check for stream socket (git-fixes). - USBip: fix stub_dev USBip_sockfd_store() races leading to gpf (git-fixes). - USBip: fix vhci_hcd attach_store() races leading to gpf (git-fixes). - USBip: fix vhci_hcd to check for stream socket (git-fixes). - USBip: fix vudc to check for stream socket (git-fixes). - USBip: fix vudc usbip_sockfd_store races leading to gpf (git-fixes). - USBip: tools: fix build error for multiple definition (git-fixes). - USB: musb: Fix suspend with devices connected for a64 (git-fixes). - USB: renesas_usbhs: Clear PIPECFG for re-enabling pipe with other EPNUM (git-fixes). - USB: replace hardcode maximum usb string length by definition (git-fixes). - USB: serial: ch341: add new Product ID (git-fixes). - USB: serial: cp210x: add ID for Acuity Brands nLight Air Adapter (git-fixes). - USB: serial: cp210x: add some more GE USB IDs (git-fixes). - USB: serial: ftdi_sio: fix FTX sub-integer prescaler (git-fixes). - USB: serial: io_edgeport: fix memory leak in edge_startup (git-fixes). - USB-storage: Add quirk to defeat Kindle's automatic unload (git-fixes). - USB: typec: tcpm: Invoke power_supply_changed for tcpm-source-psy- (git-fixes). - USB: usblp: fix a hang in poll() if disconnected (git-fixes). - USB: xhci: do not perform Soft Retry for some xHCI hosts (git-fixes). - USB: xhci: Fix ASMedia ASM1042A and ASM3242 DMA addressing (git-fixes). - USB: xhci-mtk: fix broken streams issue on 0.96 xHCI (git-fixes). - use __netdev_notify_peers in ibmvnic (bsc#1183871 ltc#192139). - video: fbdev: acornfb: remove free_unused_pages() (bsc#1152489) - video: hyperv_fb: Fix a double free in hvfb_probe (git-fixes). - VMCI: Use set_page_dirty_lock() when unregistering guest memory (git-fixes). - vt/consolemap: do font sum unsigned (git-fixes). - watchdog: mei_wdt: request stop on unregister (git-fixes). - wireguard: device: do not generate ICMP for non-IP packets (git-fixes). - wireguard: kconfig: use arm chacha even with no neon (git-fixes). - wireguard: selftests: test multiple parallel streams (git-fixes). - wlcore: Fix command execute failure 19 for wl12xx (git-fixes). - x86/fsgsbase/64: Fix NULL deref in 86_fsgsbase_read_task (bsc#1152489). - xen/events: avoid handling the same event on two cpus at the same time (git-fixes). - xen/events: do not unmask an event channel when an eoi is pending (git-fixes). - xen/events: reset affinity of 2-level event when tearing it down (git-fixes). - xen/gnttab: handle p2m update errors on a per-slot basis (bsc#1183022 XSA-367). - xen-netback: respect gnttab_map_refs()'s return value (bsc#1183022 XSA-367). - xfs: group quota should return EDQUOT when prj quota enabled (bsc#1180980). - xhci: Fix repeated xhci wake after suspend due to uncleared internal wake state (git-fixes). - xhci: Improve detection of device initiated wake signal (git-fixes).Special Instructions and Notes: Please reboot the system after installing this update.Patch Instructions: To install this openSUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - openSUSE Leap 15.2: zypper in -t patch openSUSE-2021-532=1Package List: - openSUSE Leap 15.2 (noarch): kernel-devel-5.3.18-lp152.69.1 kernel-docs-5.3.18-lp152.69.1 kernel-docs-html-5.3.18-lp152.69.1 kernel-macros-5.3.18-lp152.69.1 kernel-source-5.3.18-lp152.69.1 kernel-source-vanilla-5.3.18-lp152.69.1 - openSUSE Leap 15.2 (x86_64): kernel-debug-5.3.18-lp152.69.1 kernel-debug-debuginfo-5.3.18-lp152.69.1 kernel-debug-debugsource-5.3.18-lp152.69.1 kernel-debug-devel-5.3.18-lp152.69.1 kernel-debug-devel-debuginfo-5.3.18-lp152.69.1 kernel-default-5.3.18-lp152.69.1 kernel-default-base-5.3.18-lp152.69.1.lp152.8.28.1 kernel-default-base-rebuild-5.3.18-lp152.69.1.lp152.8.28.1 kernel-default-debuginfo-5.3.18-lp152.69.1 kernel-default-debugsource-5.3.18-lp152.69.1 kernel-default-devel-5.3.18-lp152.69.1 kernel-default-devel-debuginfo-5.3.18-lp152.69.1 kernel-kvmsmall-5.3.18-lp152.69.1 kernel-kvmsmall-debuginfo-5.3.18-lp152.69.1 kernel-kvmsmall-debugsource-5.3.18-lp152.69.1 kernel-kvmsmall-devel-5.3.18-lp152.69.1 kernel-kvmsmall-devel-debuginfo-5.3.18-lp152.69.1 kernel-obs-build-5.3.18-lp152.69.1 kernel-obs-build-debugsource-5.3.18-lp152.69.1 kernel-obs-qa-5.3.18-lp152.69.1 kernel-preempt-5.3.18-lp152.69.1 kernel-preempt-debuginfo-5.3.18-lp152.69.1 kernel-preempt-debugsource-5.3.18-lp152.69.1 kernel-preempt-devel-5.3.18-lp152.69.1 kernel-preempt-devel-debuginfo-5.3.18-lp152.69.1 kernel-syms-5.3.18-lp152.69.1References: https://www.suse.com/security/cve/CVE-2019-18814.html https://www.suse.com/security/cve/CVE-2019-19769.html https://www.suse.com/security/cve/CVE-2020-27170.html https://www.suse.com/security/cve/CVE-2020-27171.html https://www.suse.com/security/cve/CVE-2020-27815.html https://www.suse.com/security/cve/CVE-2020-35519.html https://www.suse.com/security/cve/CVE-2021-27363.html https://www.suse.com/security/cve/CVE-2021-27364.html https://www.suse.com/security/cve/CVE-2021-27365.html https://www.suse.com/security/cve/CVE-2021-28038.html https://www.suse.com/security/cve/CVE-2021-28375.html https://www.suse.com/security/cve/CVE-2021-28660.html https://www.suse.com/security/cve/CVE-2021-28688.html https://www.suse.com/security/cve/CVE-2021-28964.html https://www.suse.com/security/cve/CVE-2021-28971.html https://www.suse.com/security/cve/CVE-2021-28972.html https://www.suse.com/security/cve/CVE-2021-29264.html https://www.suse.com/security/cve/CVE-2021-29265.html https://www.suse.com/security/cve/CVE-2021-29647.html https://www.suse.com/security/cve/CVE-2021-3428.html https://www.suse.com/security/cve/CVE-2021-3444.html https://bugzilla.suse.com/1152472 https://bugzilla.suse.com/1152489 https://bugzilla.suse.com/1153274 https://bugzilla.suse.com/1154353 https://bugzilla.suse.com/1155518 https://bugzilla.suse.com/1156256 https://bugzilla.suse.com/1159280 https://bugzilla.suse.com/1160634 https://bugzilla.suse.com/1167773 https://bugzilla.suse.com/1168777 https://bugzilla.suse.com/1169514 https://bugzilla.suse.com/1169709 https://bugzilla.suse.com/1171295 https://bugzilla.suse.com/1173485 https://bugzilla.suse.com/1177326 https://bugzilla.suse.com/1178163 https://bugzilla.suse.com/1178330 https://bugzilla.suse.com/1179454 https://bugzilla.suse.com/1180197 https://bugzilla.suse.com/1180980 https://bugzilla.suse.com/1181383 https://bugzilla.suse.com/1181674 https://bugzilla.suse.com/1181862 https://bugzilla.suse.com/1182011 https://bugzilla.suse.com/1182077 https://bugzilla.suse.com/1182485 https://bugzilla.suse.com/1182552 https://bugzilla.suse.com/1182574 https://bugzilla.suse.com/1182591 https://bugzilla.suse.com/1182595 https://bugzilla.suse.com/1182715 https://bugzilla.suse.com/1182716 https://bugzilla.suse.com/1182717 https://bugzilla.suse.com/1182770 https://bugzilla.suse.com/1182989 https://bugzilla.suse.com/1183015 https://bugzilla.suse.com/1183018 https://bugzilla.suse.com/1183022 https://bugzilla.suse.com/1183023 https://bugzilla.suse.com/1183048 https://bugzilla.suse.com/1183252 https://bugzilla.suse.com/1183277 https://bugzilla.suse.com/1183278 https://bugzilla.suse.com/1183279 https://bugzilla.suse.com/1183280 https://bugzilla.suse.com/1183281 https://bugzilla.suse.com/1183282 https://bugzilla.suse.com/1183283 https://bugzilla.suse.com/1183284 https://bugzilla.suse.com/1183285 https://bugzilla.suse.com/1183286 https://bugzilla.suse.com/1183287 https://bugzilla.suse.com/1183288 https://bugzilla.suse.com/1183366 https://bugzilla.suse.com/1183369 https://bugzilla.suse.com/1183386 https://bugzilla.suse.com/1183412 https://bugzilla.suse.com/1183416 https://bugzilla.suse.com/1183427 https://bugzilla.suse.com/1183428 https://bugzilla.suse.com/1183445 https://bugzilla.suse.com/1183447 https://bugzilla.suse.com/1183501 https://bugzilla.suse.com/1183509 https://bugzilla.suse.com/1183530 https://bugzilla.suse.com/1183534 https://bugzilla.suse.com/1183540 https://bugzilla.suse.com/1183593 https://bugzilla.suse.com/1183596 https://bugzilla.suse.com/1183598 https://bugzilla.suse.com/1183637 https://bugzilla.suse.com/1183646 https://bugzilla.suse.com/1183662 https://bugzilla.suse.com/1183686 https://bugzilla.suse.com/1183692 https://bugzilla.suse.com/1183696 https://bugzilla.suse.com/1183750 https://bugzilla.suse.com/1183757 https://bugzilla.suse.com/1183775 https://bugzilla.suse.com/1183843 https://bugzilla.suse.com/1183859 https://bugzilla.suse.com/1183871 https://bugzilla.suse.com/1184167 https://bugzilla.suse.com/1184168 https://bugzilla.suse.com/1184170 https://bugzilla.suse.com/1184176 https://bugzilla.suse.com/1184192 https://bugzilla.suse.com/1184193 https://bugzilla.suse.com/1184196 https://bugzilla.suse.com/1184198 https://bugzilla.suse.com/1184217 https://bugzilla.suse.com/1184218 https://bugzilla.suse.com/1184219 https://bugzilla.suse.com/1184220 https://bugzilla.suse.com/1184224

More...

LEAP 15.2 Cannot access samba shares from a server running inside LXC4....but can inside LXC3 :(

$
0
0
Hello all,


I am running samba server inside a container on lxc4 - opensuse 15.2 - that i am able to login into a share but not see the contents:
# mount -t cifs -o username=user //172.16.0.100/USER /mnt/tmp
Password for nuno@//172.16.0.100/USER: **************
# cd /mnt/tmp/
# ls
ls: reading the directory .: Permission Denied.


Hoever, when i run the exact same container, with exact the same config file - on a opensuse 15.1 - LXC3 - i am able to see the content of the share.
I have no apparmor running, or FS acl. Please note that the SMB Server is inside the container and i am so wary right now about this that is running in privileged mode.


# mount -t cifs -o username=user //172.16.0.100/USER /mnt/tmp
Password for nuno@//172.16.0.100/USER: **************
# cd /mnt/tmp/
# ls
total 9
drwxr-xr-x 2 user users 4096 Abr 10 15:54 .
drwxr-xr-x 7 root root 4096 Abr 10 15:53 ..
-rw------- 1 user users 51 Abr 10 15:54 dummy_file.txt


From what i gather it appears to be related with permissions with LXC3 vs LXC4.
What am i missing? Can you help me please?


Thanks.

LEAP 15.2 Some Applications take 30 seconds to load on some identical machines.

$
0
0
I did a fresh load of OpenSUSE 15.2 on a 2 Dell 7490 laptops and cloned the 2 to 6 other Dell 7490 (changed the udev 70 rule for different mac addresses) hostname and ip addresses.

Restored the Virtual Machines from the backup done just before the reload. Restored the repos.d directory and used the exact same zypper in to put back all the pieces that are my other apps.

I installed Mate desktop and no other via the install. VirtualBox is Opensuse default - VLC is packman.

VLC and Virtualbox(GUI) take up to 40 seconds on some machines.

All have the same 32GB ram, Disk partitions and 1tb NVME disk.

On some vlc is instant - less than 1 second others 30 seconds - it works fine

On the same ones the vlc is slow VirtualBox Gui takes 30 seconds to appear.

Starting any Virtualbox Machine from a terminal is sub second to appear.

Any Ideas on what might be the cause - is there hardware mac addresses stored somewhere that slow it down vlc and virtualbox - I have looked but see nothing.

TUMBLEWEED Create a MAP NETWORK DRIVE on TumbleWeed

LEAP 15.2 New kernel will not boot.

$
0
0
Hello everybody,

I just upgraded my laptop running Leap 15.2 with a mundane "sudo zypper up", however, afterwards it will not boot the kernel that was upgraded and which is kernel-default version 5.3.18-lp152.69.1. Also, after I restarted the computer following the "sudo zypper up" upgrade, after posting BIOS, it immediately goes into a "Perform MOK management" screen and the computer simply will not boot. I do not have secure boot enabled and so I do not understand why the MOK management screen is being presented. In any event, I am able to continue to run the previous kernel-default version 5.3.18-lp152.66.1 by selecting it in the grub boot menu. So, my questions are:

  1. kernal-default version 5.3.18-lp152.69.1 will not boot and, instead, simply stalls in the initial boot screen, eventually times out and then restarts the boot process. Why won't it boot?
  2. Where did the MOK management screen come from and why is it being presented immediately after BIOS posts?

Thanks in advance for your suggestions.

Gordon

LEAP 15.1 E.o.L cron email stopped

$
0
0
Hello - I was wondering if anyone has any advice on cron. I've been using a "user cron job" to run two scripts daily, and a "root cron job" to shut down the computer after the scripts run. It has worked well for months and I could check the output in /var/mail/user. Then, suddenly, a couple of weeks ago, the user cron job stopped sending emails with STDIO/STDERR outputs to the user. (in /var/mail/user dir) I haven't been able to find this exact problem on the interwebs, and I need to fix this before I can start troubleshooting one of the scripts. The cron daemon seems to be running as at least one of the scripts is running, but another one is not, and I can't troubleshoot without the outputs I used to find in /var/mail/user.

(This is a single system with only one user - /etc/crontab wasn't edited so apparently that's the 'MAILTO=' that's always been there.)

(should SHELL=/bin/bash ?)

/etc/crontab
Code:

SHELL=/bin/sh
PATH=/usr/bin:/usr/sbin:/sbin:/bin:/usr/lib/news/bin
MAILTO=root
#
# check scripts in cron.hourly, cron.daily, cron.weekly, and cron.monthly
#
-*/15 * * * *  root  test -x /usr/lib/cron/run-crons && /usr/lib/cron/run-crons >/dev/null 2>&1

>> crontab -e
Code:

00 02 * * * /home/user/00_Python/00__RunEMS+Process+upl.txt
30 06 * * * /home/user/00_Python/00__AutoUPL.txt

~

openSUSE-SU-2021:0533-1: important: Security update for isync

$
0
0
openSUSE Security Update: Security update for isync______________________________________________________________________________Announcement ID: openSUSE-SU-2021:0533-1Rating: importantReferences: #1182488 Cross-References: CVE-2021-20247CVSS scores: CVE-2021-20247 (NVD) : 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:NAffected Products: openSUSE Backports SLE-15-SP2______________________________________________________________________________ An update that fixes one vulnerability is now available.Description: This update for isync fixes the following issues: - isync was updated to version 1.3.5 - CVE-2021-20247: reject funny mailbox names from IMAP LIST/LSUB (boo#1182488) This update was imported from the openSUSE:Leap:15.2:Update update project.Patch Instructions: To install this openSUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - openSUSE Backports SLE-15-SP2: zypper in -t patch openSUSE-2021-533=1Package List: - openSUSE Backports SLE-15-SP2 (aarch64 ppc64le s390x x86_64): isync-1.3.5-bp152.4.3.1References: https://www.suse.com/security/cve/CVE-2021-20247.html https://bugzilla.suse.com/1182488

More...

openSUSE-SU-2021:0535-1: moderate: Security update for bcc

$
0
0
openSUSE Security Update: Security update for bcc ______________________________________________________________________________ Announcement ID: openSUSE-SU-2021:0535-1 Rating: moderate References: #1183399 Affected Products: openSUSE Leap 15.2 ______________________________________________________________________________ An update that contains security fixes can now be installed. Description: This update for bcc fixes the following issues: - Enabled PIE for bcc-lua if lua support is enabled (bsc#1183399) This update was imported from the SUSE:SLE-15-SP2:Update update project. Patch Instructions: To install this openSUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - openSUSE Leap 15.2: zypper in -t patch openSUSE-2021-535=1 Package List: - openSUSE Leap 15.2 (x86_64): bcc-debuginfo-0.12.0-lp152.3.3.1 bcc-debugsource-0.12.0-lp152.3.3.1 bcc-devel-0.12.0-lp152.3.3.1 bcc-docs-0.12.0-lp152.3.3.1 bcc-examples-0.12.0-lp152.3.3.1 bcc-lua-0.12.0-lp152.3.3.1 bcc-lua-debuginfo-0.12.0-lp152.3.3.1 bcc-tools-0.12.0-lp152.3.3.1 libbcc0-0.12.0-lp152.3.3.1 libbcc0-debuginfo-0.12.0-lp152.3.3.1 python2-bcc-0.12.0-lp152.3.3.1 python3-bcc-0.12.0-lp152.3.3.1 References: https://bugzilla.suse.com/1183399

More...

openSUSE-SU-2021:0536-1: moderate: Security update for openexr

$
0
0
openSUSE Security Update: Security update for openexr ______________________________________________________________________________ Announcement ID: openSUSE-SU-2021:0536-1 Rating: moderate References: #1184172 #1184173 #1184174 Cross-References: CVE-2021-3474 CVE-2021-3475 CVE-2021-3476 CVSS scores: CVE-2021-3474 (NVD) : 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L CVE-2021-3474 (SUSE): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L CVE-2021-3475 (NVD) : 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L CVE-2021-3475 (SUSE): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L CVE-2021-3476 (NVD) : 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L CVE-2021-3476 (SUSE): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L Affected Products: openSUSE Leap 15.2 ______________________________________________________________________________ An update that fixes three vulnerabilities is now available. Description: This update for openexr fixes the following issues: - CVE-2021-3474: Undefined-shift in Imf_2_5::FastHufDecoder::FastHufDecoder (bsc#1184174) - CVE-2021-3475: Integer-overflow in Imf_2_5::calculateNumTiles (bsc#1184173) - CVE-2021-3476: Undefined-shift in Imf_2_5::unpack14 (bsc#1184172) This update was imported from the SUSE:SLE-15:Update update project. Patch Instructions: To install this openSUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - openSUSE Leap 15.2: zypper in -t patch openSUSE-2021-536=1 Package List: - openSUSE Leap 15.2 (i586 x86_64): libIlmImf-2_2-23-2.2.1-lp152.7.11.1 libIlmImf-2_2-23-debuginfo-2.2.1-lp152.7.11.1 libIlmImfUtil-2_2-23-2.2.1-lp152.7.11.1 libIlmImfUtil-2_2-23-debuginfo-2.2.1-lp152.7.11.1 openexr-2.2.1-lp152.7.11.1 openexr-debuginfo-2.2.1-lp152.7.11.1 openexr-debugsource-2.2.1-lp152.7.11.1 openexr-devel-2.2.1-lp152.7.11.1 openexr-doc-2.2.1-lp152.7.11.1 - openSUSE Leap 15.2 (x86_64): libIlmImf-2_2-23-32bit-2.2.1-lp152.7.11.1 libIlmImf-2_2-23-32bit-debuginfo-2.2.1-lp152.7.11.1 libIlmImfUtil-2_2-23-32bit-2.2.1-lp152.7.11.1 libIlmImfUtil-2_2-23-32bit-debuginfo-2.2.1-lp152.7.11.1 References: https://www.suse.com/security/cve/CVE-2021-3474.html https://www.suse.com/security/cve/CVE-2021-3475.html https://www.suse.com/security/cve/CVE-2021-3476.html https://bugzilla.suse.com/1184172 https://bugzilla.suse.com/1184173 https://bugzilla.suse.com/1184174

More...

LEAP 15.3 KDE Plasma (*) Display Complications

$
0
0
Hey there OpenSUSE Community,

I hope you are all well.

I wanted to reach out to you all for some advice on how I could best handle a recent issue started on my lab box with KDE.

Today, when logging into the system I noticed that my screens (I have two) had changed from 1 / 2 (left to right) to 2 / 1 (right then leading into left). I went into display and changed them proper and then clicked apply - that's when things got really interesting.

From there, my left screen was reaching into my right screen. Too, my right screen started to have a sort of rapid and slight space vibration to anything on that screen. I started to pull things over just to check and windows were fine in the left monitor but shaking in the right. While they were not shaking in the left monitor, the two did share something similar: they each had really huge icons and task bars.

I wasn't sure what was wrong, so I figured a good restart might do the trick. It did not. So, I tried a full power down, turn off the power, and restore power and turn on (I came from Windows... can you tell? lol).

These steps did not resolve the issue. So, I went further and started a next test by downloading XFCE (just picking a random DE) and seeing if the system would react the same (I wasn't sure if this was a video card issue). Upon logging into XFCE, I noticed a dramatic and stable change; there were no issues -- at all.

I logged out to XFCE session and started Plasma (vanilla) and found the display issues were unchanged. Then, I tried Wayland and Full Wayland with poorer experiences than Vanilla Plasma.

Next, I reopened XFCE and did a DE removal of KDE Plamsa and reinstall. I attempted a new session start of KDE and the issues persisted.

To this point, I haven't been able to decide other options I could try and resolve this issue. I'm not stuck to using KDE Plasma but I do really enjoy fixing and learning from experiences like this. So, I wanted to reach out to the community and ask for some suggestions, please.

Thank you!
Viewing all 40713 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>