[Bug 1179763] New: Patch openSUSE-2020-2161 - EDAC amd64: Error: F1 not found with AMD A10-5750M APU
http://bugzilla.opensuse.org/show_bug.cgi?id=1179763 Bug ID: 1179763 Summary: Patch openSUSE-2020-2161 - EDAC amd64: Error: F1 not found with AMD A10-5750M APU Classification: openSUSE Product: openSUSE Distribution Version: Leap 15.2 Hardware: x86-64 OS: openSUSE Leap 15.2 Status: NEW Severity: Normal Priority: P5 - None Component: Kernel Assignee: kernel-bugs@opensuse.org Reporter: bugrprt21882@online.de QA Contact: qa-bugs@suse.de Found By: --- Blocker: --- Since the Kernel patch openSUSE-2020-2161 the systemd Journal has the following errors: kernel: EDAC amd64: F15h detected (node 0). kernel: EDAC amd64: Error: F1 not found: device 0x1601 (broken BIOS?) The machine's CPU is: # inxi --admin -C CPU: Topology: Quad Core model: AMD A10-5750M APU with Radeon HD Graphics bits: 64 type: MCP arch: Piledriver family: 15 (21) model-id: 13 (19) stepping: 1 microcode: 6001119 L1 cache: 192 KiB L2 cache: 2048 KiB flags: avx lm nx pae sse sse2 sse3 sse4_1 sse4_2 sse4a ssse3 svm bogomips: 19962 Speed: 1251 MHz min/max: 1400/2500 MHz boost: enabled Core speeds (MHz): 1: 1258 2: 1211 3: 1231 4: 1350 Vulnerabilities: Type: itlb_multihit status: Not affected Type: l1tf status: Not affected Type: mds status: Not affected Type: meltdown status: Not affected Type: spec_store_bypass mitigation: Speculative Store Bypass disabled via prctl and seccomp Type: spectre_v1 mitigation: usercopy/swapgs barriers and __user pointer sanitization Type: spectre_v2 mitigation: Full AMD retpoline, STIBP: disabled, RSB filling Type: srbds status: Not affected Type: tsx_async_abort status: Not affected # -- You are receiving this mail because: You are the assignee for the bug.
http://bugzilla.opensuse.org/show_bug.cgi?id=1179763 http://bugzilla.opensuse.org/show_bug.cgi?id=1179763#c1 --- Comment #1 from Donald Curtis <bugrprt21882@online.de> --- Another machine with the following CPU is not exhibiting these errors: # inxi --admin -C CPU: Info: Quad Core model: AMD Ryzen 5 3400G with Radeon Vega Graphics socket: AM4 bits: 64 type: MT MCP arch: Zen+ family: 17 (23) model-id: 18 (24) stepping: 1 microcode: 8108109 L1 cache: 384 KiB L2 cache: 2048 KiB L3 cache: 4096 KiB flags: avx avx2 lm nx pae sse sse2 sse3 sse4_1 sse4_2 sse4a ssse3 svm bogomips: 59089 Speed: 1259 MHz min/max: 1400/3700 MHz base/boost: 3700/4200 boost: enabled volts: 1.5 V ext-clock: 100 MHz Core speeds (MHz): 1: 1259 2: 1258 3: 1258 4: 1259 5: 1263 6: 1286 7: 1259 8: 1259 Vulnerabilities: Type: itlb_multihit status: Not affected Type: l1tf status: Not affected Type: mds status: Not affected Type: meltdown status: Not affected Type: spec_store_bypass mitigation: Speculative Store Bypass disabled via prctl and seccomp Type: spectre_v1 mitigation: usercopy/swapgs barriers and __user pointer sanitization Type: spectre_v2 mitigation: Full AMD retpoline, IBPB: conditional, STIBP: disabled, RSB filling Type: srbds status: Not affected Type: tsx_async_abort status: Not affected # -- You are receiving this mail because: You are the assignee for the bug.
participants (1)
-
bugzilla_noreply@suse.com