[Bug 1203794] New: IdeaPad 5 Flex Touch and trackpad not working with kernel 5.19.10 upgrade
https://bugzilla.suse.com/show_bug.cgi?id=1203794 Bug ID: 1203794 Summary: IdeaPad 5 Flex Touch and trackpad not working with kernel 5.19.10 upgrade Classification: openSUSE Product: openSUSE Tumbleweed Version: Current Hardware: x86-64 OS: openSUSE Tumbleweed Status: NEW Severity: Normal Priority: P5 - None Component: Kernel Assignee: kernel-bugs@opensuse.org Reporter: fstrba@suse.com QA Contact: qa-bugs@suse.de Found By: --- Blocker: --- After update to TW snapshot 20220925 from 20220922, the touch-screen and trackpad stopped working on Lenovo IdeaPad 5 Flex (AMD Ryzen with AMD graphics). Booting into kernel 5.19.8 made all work again. I could not yet investigate in details, because it is my son's computer and I had to guide him over whatsapp messages to boot the previous kernel. Fortunately, the keyboard was still working even in the booted environment. But something makes the both pointer devices (touch and trackpad) not to be working. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1203794 https://bugzilla.suse.com/show_bug.cgi?id=1203794#c1 --- Comment #1 from Fridrich Strba <fstrba@suse.com> --- Created attachment 861783 --> https://bugzilla.suse.com/attachment.cgi?id=861783&action=edit Dmesg with old kernel (5.19.8) -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1203794 https://bugzilla.suse.com/show_bug.cgi?id=1203794#c2 --- Comment #2 from Fridrich Strba <fstrba@suse.com> --- Created attachment 861784 --> https://bugzilla.suse.com/attachment.cgi?id=861784&action=edit Dmesg with new kernel (5.19.10) -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1203794 https://bugzilla.suse.com/show_bug.cgi?id=1203794#c3 --- Comment #3 from Fridrich Strba <fstrba@suse.com> --- Created attachment 861785 --> https://bugzilla.suse.com/attachment.cgi?id=861785&action=edit hwinfo with old kernel booted (5.19.8) -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1203794 https://bugzilla.suse.com/show_bug.cgi?id=1203794#c4 --- Comment #4 from Fridrich Strba <fstrba@suse.com> --- Created attachment 861786 --> https://bugzilla.suse.com/attachment.cgi?id=861786&action=edit hwinfo with new kernel booted (5.19.10) -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1203794 https://bugzilla.suse.com/show_bug.cgi?id=1203794#c5 --- Comment #5 from Fridrich Strba <fstrba@suse.com> --- I hope this gives some information. I saw in the dmesg some references to errors with HID devices. Fortunately, a old-fashioned USB mouse plugged in made it a bit less pain to operate. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1203794 https://bugzilla.suse.com/show_bug.cgi?id=1203794#c6 Jiri Slaby <jslaby@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |jslaby@suse.com --- Comment #6 from Jiri Slaby <jslaby@suse.com> --- (In reply to Fridrich Strba from comment #5)
I hope this gives some information. I saw in the dmesg some references to errors with HID devices.
Right:
[ 1.058135] hid-generic 0020:1022:0001.0001: hidraw0: SENSOR HUB HID v0.00 Device [hid-amdsfh 1022:0001] on pcie_mp2_amd [ 2.038937] i2c_designware AMDI0010:00: controller timed out [ 2.146627] i2c_designware AMDI0010:03: controller timed out [ 6.166859] i2c_hid_acpi i2c-MSFT0001:00: failed to reset device: -61 [ 8.279604] i2c_designware AMDI0010:03: controller timed out [ 12.310897] i2c_hid_acpi i2c-MSFT0001:00: failed to reset device: -61 [ 14.429372] i2c_designware AMDI0010:03: controller timed out [ 18.462629] i2c_hid_acpi i2c-MSFT0001:00: failed to reset device: -61 [ 20.579183] i2c_designware AMDI0010:03: controller timed out [ 24.598703] i2c_hid_acpi i2c-MSFT0001:00: failed to reset device: -61 [ 25.629071] i2c_hid_acpi i2c-MSFT0001:00: can't add hid device: -61 [ 25.629430] i2c_hid_acpi: probe of i2c-MSFT0001:00 failed with error -61
This is likely the root cause. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1203794 https://bugzilla.suse.com/show_bug.cgi?id=1203794#c7 Jiri Slaby <jslaby@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- Status|NEW |IN_PROGRESS Assignee|kernel-bugs@opensuse.org |jslaby@suse.com --- Comment #7 from Jiri Slaby <jslaby@suse.com> --- Hm: the diff of dmesgs: -ACPI: IRQ 10 override to edge, high -ACPI: IRQ 6 override to edge, high the diff of /proc/interrupts: 6: ... IR-IO-APIC [-6-fasteoi-] {+6-edge+} AMDI0010:03 10: ... IR-IO-APIC [-10-fasteoi-] {+10-edge+} AMDI0010:00 and: i2c_designware: /devices/platform/AMDI0010:00 i2c_designware: /devices/platform/AMDI0010:03 all clearly point to: commit 37c81d9f1d1b1458894454efcb857f6a769b6bc4 Author: Chuanhong Guo <gch981213@gmail.com> Date: Tue Jul 12 10:00:58 2022 +0800 ACPI: resource: skip IRQ override on AMD Zen platforms commit 9946e39fe8d0a5da9eb947d8e40a7ef204ba016e upstream. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1203794 https://bugzilla.suse.com/show_bug.cgi?id=1203794#c8 --- Comment #8 from Jiri Slaby <jslaby@suse.com> --- Let's see what upstream thinks about this (and what to do): https://lore.kernel.org/all/0450c7c0-4787-2aa2-de3e-c71522e467ce@kernel.org/ -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1203794 Takashi Iwai <tiwai@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |tiwai@suse.com -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1203794 https://bugzilla.suse.com/show_bug.cgi?id=1203794#c9 Jiri Slaby <jslaby@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |fstrba@suse.com Flags| |needinfo?(fstrba@suse.com) --- Comment #9 from Jiri Slaby <jslaby@suse.com> --- Created attachment 861801 --> https://bugzilla.suse.com/attachment.cgi?id=861801&action=edit potential fix A kernel with the attached patch builds at: https://build.opensuse.org/project/monitor/home:jirislaby:kernel-bsc1203794 Obviously untested, I need the output of dmesg to see which of those cases matched. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1203794 https://bugzilla.suse.com/show_bug.cgi?id=1203794#c10 --- Comment #10 from Jiri Slaby <jslaby@suse.com> --- Created attachment 861805 --> https://bugzilla.suse.com/attachment.cgi?id=861805&action=edit potential fix v2 Fixed from info from DSDT. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1203794 https://bugzilla.suse.com/show_bug.cgi?id=1203794#c11 --- Comment #11 from Jiri Slaby <jslaby@suse.com> --- Created attachment 861807 --> https://bugzilla.suse.com/attachment.cgi?id=861807&action=edit DSDT extracted from hwinfo -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1203794 https://bugzilla.suse.com/show_bug.cgi?id=1203794#c12 --- Comment #12 from Jiri Slaby <jslaby@suse.com> --- Created attachment 861808 --> https://bugzilla.suse.com/attachment.cgi?id=861808&action=edit DSDT disassembled -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1203794 Jiri Slaby <jslaby@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- Attachment #861801|0 |1 is obsolete| | -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1203794 https://bugzilla.suse.com/show_bug.cgi?id=1203794#c13 Fridrich Strba <fstrba@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- Flags|needinfo?(fstrba@suse.com) | --- Comment #13 from Fridrich Strba <fstrba@suse.com> --- (In reply to Jiri Slaby from comment #10)
Created attachment 861805 [details] potential fix v2
Fixed from info from DSDT.
The updated kernel from https://build.opensuse.org/project/monitor/home:jirislaby:kernel-bsc1203794 that includes this patch is making the pads work again with that machine. Thanks Jiri for all the hard work. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1203794 Jiri Slaby <jslaby@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- URL| |https://bugzilla.kernel.org | |/show_bug.cgi?id=216552 Flags| |needinfo? -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1203794 Jiri Slaby <jslaby@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- Flags|needinfo? | -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1203794 https://bugzilla.suse.com/show_bug.cgi?id=1203794#c15 --- Comment #15 from Jiri Slaby <jslaby@suse.com> --- The upstream discussion: https://lore.kernel.org/all/20221004103341.12646-1-jirislaby@kernel.org/ -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1203794 https://bugzilla.suse.com/show_bug.cgi?id=1203794#c19 --- Comment #19 from Fridrich Strba <fstrba@suse.com> --- How does this look for TW kernel? My son's computer is running TW, so I would love to know when to remove the lock on kernel-default. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1203794 https://bugzilla.suse.com/show_bug.cgi?id=1203794#c20 Jiri Slaby <jslaby@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- Status|IN_PROGRESS |RESOLVED Resolution|--- |FIXED --- Comment #20 from Jiri Slaby <jslaby@suse.com> --- It was merge to maintainers repo today. Pushed to stable. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1203794 https://bugzilla.suse.com/show_bug.cgi?id=1203794#c23 --- Comment #23 from Swamp Workflow Management <swamp@suse.de> --- SUSE-SU-2022:3585-1: An update that solves 9 vulnerabilities, contains 12 features and has 38 fixes is now available. Category: security (important) Bug References: 1152472,1152489,1185032,1190497,1194023,1194869,1195917,1196444,1196869,1197659,1198189,1200622,1201309,1201310,1201987,1202095,1202960,1203039,1203066,1203101,1203197,1203263,1203338,1203360,1203361,1203389,1203410,1203505,1203552,1203664,1203693,1203699,1203701,1203767,1203769,1203794,1203798,1203893,1203902,1203906,1203908,1203933,1203935,1203939,1203969,1203987,1203992 CVE References: CVE-2022-1263,CVE-2022-2586,CVE-2022-3202,CVE-2022-3239,CVE-2022-3303,CVE-2022-39189,CVE-2022-41218,CVE-2022-41848,CVE-2022-41849 JIRA References: PED-387,PED-529,PED-652,PED-664,PED-682,PED-688,PED-720,PED-729,PED-755,PED-763,SLE-19924,SLE-24814 Sources used: openSUSE Leap 15.4 (src): kernel-azure-5.14.21-150400.14.16.1, kernel-source-azure-5.14.21-150400.14.16.1, kernel-syms-azure-5.14.21-150400.14.16.1 SUSE Linux Enterprise Module for Public Cloud 15-SP4 (src): kernel-azure-5.14.21-150400.14.16.1, kernel-source-azure-5.14.21-150400.14.16.1, kernel-syms-azure-5.14.21-150400.14.16.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1203794 https://bugzilla.suse.com/show_bug.cgi?id=1203794#c26 --- Comment #26 from Swamp Workflow Management <swamp@suse.de> --- SUSE-SU-2022:3844-1: An update that solves 15 vulnerabilities, contains 12 features and has 33 fixes is now available. Category: security (important) Bug References: 1185032,1190497,1194023,1194869,1195917,1196444,1196869,1197659,1198189,1200288,1200622,1201309,1201310,1201987,1202095,1202960,1203039,1203066,1203101,1203197,1203263,1203338,1203360,1203361,1203389,1203410,1203505,1203552,1203664,1203693,1203699,1203767,1203769,1203770,1203794,1203798,1203893,1203902,1203906,1203908,1203935,1203939,1203987,1203992,1204051,1204059,1204060,1204125 CVE References: CVE-2022-1263,CVE-2022-2586,CVE-2022-3202,CVE-2022-32296,CVE-2022-3239,CVE-2022-3303,CVE-2022-39189,CVE-2022-41218,CVE-2022-41674,CVE-2022-41848,CVE-2022-41849,CVE-2022-42719,CVE-2022-42720,CVE-2022-42721,CVE-2022-42722 JIRA References: PED-387,PED-529,PED-652,PED-664,PED-682,PED-688,PED-720,PED-729,PED-755,PED-763,SLE-19924,SLE-24814 Sources used: openSUSE Leap 15.4 (src): dtb-aarch64-5.14.21-150400.24.28.1, kernel-64kb-5.14.21-150400.24.28.1, kernel-debug-5.14.21-150400.24.28.1, kernel-default-5.14.21-150400.24.28.1, kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5, kernel-docs-5.14.21-150400.24.28.1, kernel-kvmsmall-5.14.21-150400.24.28.1, kernel-obs-build-5.14.21-150400.24.28.1, kernel-obs-qa-5.14.21-150400.24.28.1, kernel-source-5.14.21-150400.24.28.1, kernel-syms-5.14.21-150400.24.28.1, kernel-zfcpdump-5.14.21-150400.24.28.1 SUSE Linux Enterprise Workstation Extension 15-SP4 (src): kernel-default-5.14.21-150400.24.28.1 SUSE Linux Enterprise Module for Live Patching 15-SP4 (src): kernel-default-5.14.21-150400.24.28.1, kernel-livepatch-SLE15-SP4_Update_4-1-150400.9.3.5 SUSE Linux Enterprise Module for Legacy Software 15-SP4 (src): kernel-default-5.14.21-150400.24.28.1 SUSE Linux Enterprise Module for Development Tools 15-SP4 (src): kernel-docs-5.14.21-150400.24.28.1, kernel-obs-build-5.14.21-150400.24.28.1, kernel-source-5.14.21-150400.24.28.1, kernel-syms-5.14.21-150400.24.28.1 SUSE Linux Enterprise Module for Basesystem 15-SP4 (src): kernel-64kb-5.14.21-150400.24.28.1, kernel-default-5.14.21-150400.24.28.1, kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5, kernel-source-5.14.21-150400.24.28.1, kernel-zfcpdump-5.14.21-150400.24.28.1 SUSE Linux Enterprise Micro 5.3 (src): kernel-default-5.14.21-150400.24.28.1, kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5 SUSE Linux Enterprise High Availability 15-SP4 (src): kernel-default-5.14.21-150400.24.28.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1203794 https://bugzilla.suse.com/show_bug.cgi?id=1203794#c31 --- Comment #31 from Swamp Workflow Management <swamp@suse.de> --- SUSE-SU-2022:4617-1: An update that solves 96 vulnerabilities, contains 50 features and has 246 fixes is now available. Category: security (important) Bug References: 1023051,1032323,1065729,1071995,1152472,1152489,1156395,1164051,1177471,1184350,1185032,1188238,1189297,1189999,1190256,1190497,1190969,1192968,1193629,1194023,1194592,1194869,1194904,1195480,1195917,1196018,1196444,1196616,1196632,1196867,1196869,1197158,1197391,1197659,1197755,1197756,1197757,1197763,1198189,1198410,1198577,1198702,1198971,1199086,1199364,1199515,1199670,1199904,1200015,1200058,1200268,1200288,1200301,1200313,1200431,1200465,1200494,1200544,1200567,1200622,1200644,1200651,1200692,1200788,1200845,1200868,1200869,1200870,1200871,1200872,1200873,1201019,1201308,1201309,1201310,1201361,1201427,1201442,1201455,1201489,1201610,1201675,1201725,1201726,1201768,1201865,1201940,1201941,1201948,1201954,1201956,1201958,1202095,1202096,1202097,1202113,1202131,1202154,1202187,1202262,1202265,1202312,1202341,1202346,1202347,1202385,1202393,1202447,1202471,1202558,1202623,1202636,1202672,1202681,1202685,1202686,1202700,1202710,1202711,1202712,1202713,1202715,1202716,1202757,120275 8,1202759,1202761,1202762,1202763,1202764,1202765,1202766,1202767,1202768,1202769,1202770,1202771,1202773,1202774,1202775,1202776,1202778,1202779,1202780,1202781,1202782,1202783,1202822,1202823,1202824,1202860,1202867,1202872,1202874,1202898,1202914,1202960,1202989,1202992,1202993,1203002,1203008,1203036,1203039,1203041,1203063,1203066,1203067,1203098,1203101,1203107,1203116,1203117,1203138,1203139,1203159,1203183,1203197,1203208,1203229,1203263,1203290,1203338,1203360,1203361,1203389,1203391,1203410,1203435,1203505,1203511,1203514,1203552,1203606,1203664,1203693,1203699,1203767,1203769,1203770,1203794,1203798,1203802,1203829,1203893,1203902,1203906,1203908,1203922,1203935,1203939,1203960,1203969,1203987,1203992,1203994,1204017,1204051,1204059,1204060,1204092,1204125,1204132,1204142,1204166,1204168,1204170,1204171,1204183,1204228,1204241,1204289,1204290,1204291,1204292,1204353,1204354,1204355,1204402,1204405,1204413,1204414,1204415,1204417,1204424,1204428,1204431,1204432,1204439,120 4470,1204479,1204486,1204498,1204533,1204569,1204574,1204575,1204576,1204619,1204624,1204631,1204635,1204636,1204637,1204646,1204647,1204650,1204653,1204693,1204705,1204719,1204728,1204745,1204753,1204780,1204810,1204850,1204868,1204926,1204933,1204934,1204947,1204957,1204963,1204970,1205007,1205100,1205111,1205113,1205128,1205130,1205149,1205153,1205220,1205257,1205264,1205282,1205313,1205331,1205332,1205427,1205428,1205473,1205496,1205507,1205514,1205521,1205567,1205616,1205617,1205653,1205671,1205679,1205683,1205700,1205705,1205709,1205711,1205744,1205764,1205796,1205882,1205993,1206035,1206036,1206037,1206045,1206046,1206047,1206048,1206049,1206050,1206051,1206056,1206057,1206113,1206114,1206147,1206149,1206207,1206273,1206391 CVE References: CVE-2016-3695,CVE-2020-16119,CVE-2020-36516,CVE-2021-33135,CVE-2021-4037,CVE-2022-1184,CVE-2022-1263,CVE-2022-1882,CVE-2022-20368,CVE-2022-20369,CVE-2022-2153,CVE-2022-2586,CVE-2022-2588,CVE-2022-2602,CVE-2022-26373,CVE-2022-2639,CVE-2022-2663,CVE-2022-28356,CVE-2022-28693,CVE-2022-2873,CVE-2022-28748,CVE-2022-2905,CVE-2022-2938,CVE-2022-2959,CVE-2022-2964,CVE-2022-2977,CVE-2022-2978,CVE-2022-3028,CVE-2022-3078,CVE-2022-3114,CVE-2022-3169,CVE-2022-3176,CVE-2022-3202,CVE-2022-32250,CVE-2022-32296,CVE-2022-3239,CVE-2022-3303,CVE-2022-33981,CVE-2022-3424,CVE-2022-3435,CVE-2022-3521,CVE-2022-3524,CVE-2022-3526,CVE-2022-3535,CVE-2022-3542,CVE-2022-3545,CVE-2022-3565,CVE-2022-3566,CVE-2022-3567,CVE-2022-3577,CVE-2022-3586,CVE-2022-3594,CVE-2022-3619,CVE-2022-3621,CVE-2022-3625,CVE-2022-3628,CVE-2022-3629,CVE-2022-3633,CVE-2022-3635,CVE-2022-3640,CVE-2022-3643,CVE-2022-3646,CVE-2022-3649,CVE-2022-36879,CVE-2022-36946,CVE-2022-3707,CVE-2022-3903,CVE-2022-39188,CVE-2022-39189,CVE-2022-39190,C VE-2022-40476,CVE-2022-40768,CVE-2022-4095,CVE-2022-41218,CVE-2022-4129,CVE-2022-4139,CVE-2022-41674,CVE-2022-41848,CVE-2022-41849,CVE-2022-41850,CVE-2022-41858,CVE-2022-42328,CVE-2022-42329,CVE-2022-42703,CVE-2022-42719,CVE-2022-42720,CVE-2022-42721,CVE-2022-42722,CVE-2022-42895,CVE-2022-42896,CVE-2022-43750,CVE-2022-4378,CVE-2022-43945,CVE-2022-45869,CVE-2022-45888,CVE-2022-45934 JIRA References: PED-1082,PED-1084,PED-1085,PED-1096,PED-1211,PED-1573,PED-1649,PED-1706,PED-1936,PED-2684,PED-387,PED-529,PED-611,PED-634,PED-652,PED-664,PED-676,PED-678,PED-679,PED-682,PED-688,PED-707,PED-720,PED-729,PED-732,PED-755,PED-763,PED-813,PED-817,PED-822,PED-824,PED-825,PED-833,PED-842,PED-846,PED-849,PED-850,PED-851,PED-856,PED-857,SLE-13847,SLE-18130,SLE-19359,SLE-19924,SLE-20183,SLE-23766,SLE-24572,SLE-24682,SLE-24814,SLE-9246 Sources used: openSUSE Leap Micro 5.3 (src): kernel-rt-5.14.21-150400.15.5.1 openSUSE Leap 15.4 (src): kernel-rt-5.14.21-150400.15.5.1, kernel-rt_debug-5.14.21-150400.15.5.1, kernel-source-rt-5.14.21-150400.15.5.1, kernel-syms-rt-5.14.21-150400.15.5.1 SUSE Linux Enterprise Module for Realtime 15-SP4 (src): kernel-rt-5.14.21-150400.15.5.1, kernel-rt_debug-5.14.21-150400.15.5.1, kernel-source-rt-5.14.21-150400.15.5.1, kernel-syms-rt-5.14.21-150400.15.5.1 SUSE Linux Enterprise Module for Live Patching 15-SP4 (src): kernel-livepatch-SLE15-SP4-RT_Update_1-1-150400.1.3.1 SUSE Linux Enterprise Micro 5.3 (src): kernel-rt-5.14.21-150400.15.5.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. -- You are receiving this mail because: You are on the CC list for the bug.
participants (1)
-
bugzilla_noreply@suse.com