Bug 1203794 - IdeaPad 5 Flex Touch and trackpad not working with kernel 5.19.10 upgrade
IdeaPad 5 Flex Touch and trackpad not working with kernel 5.19.10 upgrade
Status: RESOLVED FIXED
Classification: openSUSE
Product: openSUSE Tumbleweed
Classification: openSUSE
Component: Kernel
Current
x86-64 openSUSE Tumbleweed
: P5 - None : Normal (vote)
: ---
Assigned To: Jiri Slaby
E-mail List
https://bugzilla.kernel.org/show_bug....
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2022-09-27 12:33 UTC by Fridrich Strba
Modified: 2023-01-18 17:54 UTC (History)
3 users (show)

See Also:
Found By: ---
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments
Dmesg with old kernel (5.19.8) (81.33 KB, text/plain)
2022-09-27 17:18 UTC, Fridrich Strba
Details
Dmesg with new kernel (5.19.10) (80.39 KB, text/plain)
2022-09-27 17:19 UTC, Fridrich Strba
Details
hwinfo with old kernel booted (5.19.8) (1.53 MB, text/plain)
2022-09-27 17:20 UTC, Fridrich Strba
Details
hwinfo with new kernel booted (5.19.10) (1.52 MB, text/plain)
2022-09-27 17:20 UTC, Fridrich Strba
Details
potential fix (3.93 KB, patch)
2022-09-28 08:27 UTC, Jiri Slaby
Details | Diff
potential fix v2 (3.79 KB, patch)
2022-09-28 08:59 UTC, Jiri Slaby
Details | Diff
DSDT extracted from hwinfo (55.23 KB, application/octet-stream)
2022-09-28 08:59 UTC, Jiri Slaby
Details
DSDT disassembled (404.61 KB, text/plain)
2022-09-28 09:00 UTC, Jiri Slaby
Details

Note You need to log in before you can comment on or make changes to this bug.
Description Fridrich Strba 2022-09-27 12:33:08 UTC
After update to TW snapshot 20220925 from 20220922, the touch-screen and trackpad stopped working on Lenovo IdeaPad 5 Flex (AMD Ryzen with AMD graphics). Booting into kernel 5.19.8 made all work again. I could not yet investigate in details, because it is my son's computer and I had to guide him over whatsapp messages to boot the previous kernel. Fortunately, the keyboard was still working even in the booted environment. But something makes the both pointer devices (touch and trackpad) not to be working.
Comment 1 Fridrich Strba 2022-09-27 17:18:48 UTC
Created attachment 861783 [details]
Dmesg with old kernel (5.19.8)
Comment 2 Fridrich Strba 2022-09-27 17:19:30 UTC
Created attachment 861784 [details]
Dmesg with new kernel (5.19.10)
Comment 3 Fridrich Strba 2022-09-27 17:20:05 UTC
Created attachment 861785 [details]
hwinfo with old kernel booted (5.19.8)
Comment 4 Fridrich Strba 2022-09-27 17:20:38 UTC
Created attachment 861786 [details]
hwinfo with new kernel booted (5.19.10)
Comment 5 Fridrich Strba 2022-09-27 17:22:17 UTC
I hope this gives some information. I saw in the dmesg some references to errors with HID devices. Fortunately, a old-fashioned USB mouse plugged in made it a bit less pain to operate.
Comment 6 Jiri Slaby 2022-09-28 05:59:03 UTC
(In reply to Fridrich Strba from comment #5)
> I hope this gives some information. I saw in the dmesg some references to
> errors with HID devices. 

Right:

> [    1.058135] hid-generic 0020:1022:0001.0001: hidraw0: SENSOR HUB HID v0.00 Device [hid-amdsfh 1022:0001] on pcie_mp2_amd
> [    2.038937] i2c_designware AMDI0010:00: controller timed out
> [    2.146627] i2c_designware AMDI0010:03: controller timed out
> [    6.166859] i2c_hid_acpi i2c-MSFT0001:00: failed to reset device: -61
> [    8.279604] i2c_designware AMDI0010:03: controller timed out
> [   12.310897] i2c_hid_acpi i2c-MSFT0001:00: failed to reset device: -61
> [   14.429372] i2c_designware AMDI0010:03: controller timed out
> [   18.462629] i2c_hid_acpi i2c-MSFT0001:00: failed to reset device: -61
> [   20.579183] i2c_designware AMDI0010:03: controller timed out
> [   24.598703] i2c_hid_acpi i2c-MSFT0001:00: failed to reset device: -61
> [   25.629071] i2c_hid_acpi i2c-MSFT0001:00: can't add hid device: -61
> [   25.629430] i2c_hid_acpi: probe of i2c-MSFT0001:00 failed with error -61

This is likely the root cause.
Comment 7 Jiri Slaby 2022-09-28 06:10:58 UTC
Hm:
the diff of dmesgs:
-ACPI: IRQ 10 override to edge, high
-ACPI: IRQ 6 override to edge, high

the diff of /proc/interrupts:
     6: ...  IR-IO-APIC    [-6-fasteoi-]    {+6-edge+}      AMDI0010:03
    10: ...  IR-IO-APIC   [-10-fasteoi-]   {+10-edge+}      AMDI0010:00

and:
  i2c_designware: /devices/platform/AMDI0010:00
  i2c_designware: /devices/platform/AMDI0010:03

all clearly point to:

commit 37c81d9f1d1b1458894454efcb857f6a769b6bc4
Author: Chuanhong Guo <gch981213@gmail.com>
Date:   Tue Jul 12 10:00:58 2022 +0800

    ACPI: resource: skip IRQ override on AMD Zen platforms
    
    commit 9946e39fe8d0a5da9eb947d8e40a7ef204ba016e upstream.
Comment 8 Jiri Slaby 2022-09-28 06:36:41 UTC
Let's see what upstream thinks about this (and what to do):
https://lore.kernel.org/all/0450c7c0-4787-2aa2-de3e-c71522e467ce@kernel.org/
Comment 9 Jiri Slaby 2022-09-28 08:27:34 UTC
Created attachment 861801 [details]
potential fix

A kernel with the attached patch builds at:
https://build.opensuse.org/project/monitor/home:jirislaby:kernel-bsc1203794

Obviously untested, I need the output of dmesg to see which of those cases matched.
Comment 10 Jiri Slaby 2022-09-28 08:59:21 UTC
Created attachment 861805 [details]
potential fix v2

Fixed from info from DSDT.
Comment 11 Jiri Slaby 2022-09-28 08:59:50 UTC
Created attachment 861807 [details]
DSDT extracted from hwinfo
Comment 12 Jiri Slaby 2022-09-28 09:00:19 UTC
Created attachment 861808 [details]
DSDT disassembled
Comment 13 Fridrich Strba 2022-09-29 19:54:41 UTC
(In reply to Jiri Slaby from comment #10)
> Created attachment 861805 [details]
> potential fix v2
> 
> Fixed from info from DSDT.

The updated kernel from https://build.opensuse.org/project/monitor/home:jirislaby:kernel-bsc1203794 that includes this patch is making the pads work again with that machine. Thanks Jiri for all the hard work.
Comment 15 Jiri Slaby 2022-10-05 07:17:57 UTC
The upstream discussion:
https://lore.kernel.org/all/20221004103341.12646-1-jirislaby@kernel.org/
Comment 19 Fridrich Strba 2022-10-12 06:09:46 UTC
How does this look for TW kernel? My son's computer is running TW, so I would love to know when to remove the lock on kernel-default.
Comment 20 Jiri Slaby 2022-10-14 08:19:22 UTC
It was merge to maintainers repo today. Pushed to stable.
Comment 23 Swamp Workflow Management 2022-10-14 13:24:50 UTC
SUSE-SU-2022:3585-1: An update that solves 9 vulnerabilities, contains 12 features and has 38 fixes is now available.

Category: security (important)
Bug References: 1152472,1152489,1185032,1190497,1194023,1194869,1195917,1196444,1196869,1197659,1198189,1200622,1201309,1201310,1201987,1202095,1202960,1203039,1203066,1203101,1203197,1203263,1203338,1203360,1203361,1203389,1203410,1203505,1203552,1203664,1203693,1203699,1203701,1203767,1203769,1203794,1203798,1203893,1203902,1203906,1203908,1203933,1203935,1203939,1203969,1203987,1203992
CVE References: CVE-2022-1263,CVE-2022-2586,CVE-2022-3202,CVE-2022-3239,CVE-2022-3303,CVE-2022-39189,CVE-2022-41218,CVE-2022-41848,CVE-2022-41849
JIRA References: PED-387,PED-529,PED-652,PED-664,PED-682,PED-688,PED-720,PED-729,PED-755,PED-763,SLE-19924,SLE-24814
Sources used:
openSUSE Leap 15.4 (src):    kernel-azure-5.14.21-150400.14.16.1, kernel-source-azure-5.14.21-150400.14.16.1, kernel-syms-azure-5.14.21-150400.14.16.1
SUSE Linux Enterprise Module for Public Cloud 15-SP4 (src):    kernel-azure-5.14.21-150400.14.16.1, kernel-source-azure-5.14.21-150400.14.16.1, kernel-syms-azure-5.14.21-150400.14.16.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 26 Swamp Workflow Management 2022-11-01 23:24:23 UTC
SUSE-SU-2022:3844-1: An update that solves 15 vulnerabilities, contains 12 features and has 33 fixes is now available.

Category: security (important)
Bug References: 1185032,1190497,1194023,1194869,1195917,1196444,1196869,1197659,1198189,1200288,1200622,1201309,1201310,1201987,1202095,1202960,1203039,1203066,1203101,1203197,1203263,1203338,1203360,1203361,1203389,1203410,1203505,1203552,1203664,1203693,1203699,1203767,1203769,1203770,1203794,1203798,1203893,1203902,1203906,1203908,1203935,1203939,1203987,1203992,1204051,1204059,1204060,1204125
CVE References: CVE-2022-1263,CVE-2022-2586,CVE-2022-3202,CVE-2022-32296,CVE-2022-3239,CVE-2022-3303,CVE-2022-39189,CVE-2022-41218,CVE-2022-41674,CVE-2022-41848,CVE-2022-41849,CVE-2022-42719,CVE-2022-42720,CVE-2022-42721,CVE-2022-42722
JIRA References: PED-387,PED-529,PED-652,PED-664,PED-682,PED-688,PED-720,PED-729,PED-755,PED-763,SLE-19924,SLE-24814
Sources used:
openSUSE Leap 15.4 (src):    dtb-aarch64-5.14.21-150400.24.28.1, kernel-64kb-5.14.21-150400.24.28.1, kernel-debug-5.14.21-150400.24.28.1, kernel-default-5.14.21-150400.24.28.1, kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5, kernel-docs-5.14.21-150400.24.28.1, kernel-kvmsmall-5.14.21-150400.24.28.1, kernel-obs-build-5.14.21-150400.24.28.1, kernel-obs-qa-5.14.21-150400.24.28.1, kernel-source-5.14.21-150400.24.28.1, kernel-syms-5.14.21-150400.24.28.1, kernel-zfcpdump-5.14.21-150400.24.28.1
SUSE Linux Enterprise Workstation Extension 15-SP4 (src):    kernel-default-5.14.21-150400.24.28.1
SUSE Linux Enterprise Module for Live Patching 15-SP4 (src):    kernel-default-5.14.21-150400.24.28.1, kernel-livepatch-SLE15-SP4_Update_4-1-150400.9.3.5
SUSE Linux Enterprise Module for Legacy Software 15-SP4 (src):    kernel-default-5.14.21-150400.24.28.1
SUSE Linux Enterprise Module for Development Tools 15-SP4 (src):    kernel-docs-5.14.21-150400.24.28.1, kernel-obs-build-5.14.21-150400.24.28.1, kernel-source-5.14.21-150400.24.28.1, kernel-syms-5.14.21-150400.24.28.1
SUSE Linux Enterprise Module for Basesystem 15-SP4 (src):    kernel-64kb-5.14.21-150400.24.28.1, kernel-default-5.14.21-150400.24.28.1, kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5, kernel-source-5.14.21-150400.24.28.1, kernel-zfcpdump-5.14.21-150400.24.28.1
SUSE Linux Enterprise Micro 5.3 (src):    kernel-default-5.14.21-150400.24.28.1, kernel-default-base-5.14.21-150400.24.28.1.150400.24.9.5
SUSE Linux Enterprise High Availability 15-SP4 (src):    kernel-default-5.14.21-150400.24.28.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 31 Swamp Workflow Management 2022-12-23 15:19:32 UTC
SUSE-SU-2022:4617-1: An update that solves 96 vulnerabilities, contains 50 features and has 246 fixes is now available.

Category: security (important)
Bug References: 1023051,1032323,1065729,1071995,1152472,1152489,1156395,1164051,1177471,1184350,1185032,1188238,1189297,1189999,1190256,1190497,1190969,1192968,1193629,1194023,1194592,1194869,1194904,1195480,1195917,1196018,1196444,1196616,1196632,1196867,1196869,1197158,1197391,1197659,1197755,1197756,1197757,1197763,1198189,1198410,1198577,1198702,1198971,1199086,1199364,1199515,1199670,1199904,1200015,1200058,1200268,1200288,1200301,1200313,1200431,1200465,1200494,1200544,1200567,1200622,1200644,1200651,1200692,1200788,1200845,1200868,1200869,1200870,1200871,1200872,1200873,1201019,1201308,1201309,1201310,1201361,1201427,1201442,1201455,1201489,1201610,1201675,1201725,1201726,1201768,1201865,1201940,1201941,1201948,1201954,1201956,1201958,1202095,1202096,1202097,1202113,1202131,1202154,1202187,1202262,1202265,1202312,1202341,1202346,1202347,1202385,1202393,1202447,1202471,1202558,1202623,1202636,1202672,1202681,1202685,1202686,1202700,1202710,1202711,1202712,1202713,1202715,1202716,1202757,1202758,1202759,1202761,1202762,1202763,1202764,1202765,1202766,1202767,1202768,1202769,1202770,1202771,1202773,1202774,1202775,1202776,1202778,1202779,1202780,1202781,1202782,1202783,1202822,1202823,1202824,1202860,1202867,1202872,1202874,1202898,1202914,1202960,1202989,1202992,1202993,1203002,1203008,1203036,1203039,1203041,1203063,1203066,1203067,1203098,1203101,1203107,1203116,1203117,1203138,1203139,1203159,1203183,1203197,1203208,1203229,1203263,1203290,1203338,1203360,1203361,1203389,1203391,1203410,1203435,1203505,1203511,1203514,1203552,1203606,1203664,1203693,1203699,1203767,1203769,1203770,1203794,1203798,1203802,1203829,1203893,1203902,1203906,1203908,1203922,1203935,1203939,1203960,1203969,1203987,1203992,1203994,1204017,1204051,1204059,1204060,1204092,1204125,1204132,1204142,1204166,1204168,1204170,1204171,1204183,1204228,1204241,1204289,1204290,1204291,1204292,1204353,1204354,1204355,1204402,1204405,1204413,1204414,1204415,1204417,1204424,1204428,1204431,1204432,1204439,1204470,1204479,1204486,1204498,1204533,1204569,1204574,1204575,1204576,1204619,1204624,1204631,1204635,1204636,1204637,1204646,1204647,1204650,1204653,1204693,1204705,1204719,1204728,1204745,1204753,1204780,1204810,1204850,1204868,1204926,1204933,1204934,1204947,1204957,1204963,1204970,1205007,1205100,1205111,1205113,1205128,1205130,1205149,1205153,1205220,1205257,1205264,1205282,1205313,1205331,1205332,1205427,1205428,1205473,1205496,1205507,1205514,1205521,1205567,1205616,1205617,1205653,1205671,1205679,1205683,1205700,1205705,1205709,1205711,1205744,1205764,1205796,1205882,1205993,1206035,1206036,1206037,1206045,1206046,1206047,1206048,1206049,1206050,1206051,1206056,1206057,1206113,1206114,1206147,1206149,1206207,1206273,1206391
CVE References: CVE-2016-3695,CVE-2020-16119,CVE-2020-36516,CVE-2021-33135,CVE-2021-4037,CVE-2022-1184,CVE-2022-1263,CVE-2022-1882,CVE-2022-20368,CVE-2022-20369,CVE-2022-2153,CVE-2022-2586,CVE-2022-2588,CVE-2022-2602,CVE-2022-26373,CVE-2022-2639,CVE-2022-2663,CVE-2022-28356,CVE-2022-28693,CVE-2022-2873,CVE-2022-28748,CVE-2022-2905,CVE-2022-2938,CVE-2022-2959,CVE-2022-2964,CVE-2022-2977,CVE-2022-2978,CVE-2022-3028,CVE-2022-3078,CVE-2022-3114,CVE-2022-3169,CVE-2022-3176,CVE-2022-3202,CVE-2022-32250,CVE-2022-32296,CVE-2022-3239,CVE-2022-3303,CVE-2022-33981,CVE-2022-3424,CVE-2022-3435,CVE-2022-3521,CVE-2022-3524,CVE-2022-3526,CVE-2022-3535,CVE-2022-3542,CVE-2022-3545,CVE-2022-3565,CVE-2022-3566,CVE-2022-3567,CVE-2022-3577,CVE-2022-3586,CVE-2022-3594,CVE-2022-3619,CVE-2022-3621,CVE-2022-3625,CVE-2022-3628,CVE-2022-3629,CVE-2022-3633,CVE-2022-3635,CVE-2022-3640,CVE-2022-3643,CVE-2022-3646,CVE-2022-3649,CVE-2022-36879,CVE-2022-36946,CVE-2022-3707,CVE-2022-3903,CVE-2022-39188,CVE-2022-39189,CVE-2022-39190,CVE-2022-40476,CVE-2022-40768,CVE-2022-4095,CVE-2022-41218,CVE-2022-4129,CVE-2022-4139,CVE-2022-41674,CVE-2022-41848,CVE-2022-41849,CVE-2022-41850,CVE-2022-41858,CVE-2022-42328,CVE-2022-42329,CVE-2022-42703,CVE-2022-42719,CVE-2022-42720,CVE-2022-42721,CVE-2022-42722,CVE-2022-42895,CVE-2022-42896,CVE-2022-43750,CVE-2022-4378,CVE-2022-43945,CVE-2022-45869,CVE-2022-45888,CVE-2022-45934
JIRA References: PED-1082,PED-1084,PED-1085,PED-1096,PED-1211,PED-1573,PED-1649,PED-1706,PED-1936,PED-2684,PED-387,PED-529,PED-611,PED-634,PED-652,PED-664,PED-676,PED-678,PED-679,PED-682,PED-688,PED-707,PED-720,PED-729,PED-732,PED-755,PED-763,PED-813,PED-817,PED-822,PED-824,PED-825,PED-833,PED-842,PED-846,PED-849,PED-850,PED-851,PED-856,PED-857,SLE-13847,SLE-18130,SLE-19359,SLE-19924,SLE-20183,SLE-23766,SLE-24572,SLE-24682,SLE-24814,SLE-9246
Sources used:
openSUSE Leap Micro 5.3 (src):    kernel-rt-5.14.21-150400.15.5.1
openSUSE Leap 15.4 (src):    kernel-rt-5.14.21-150400.15.5.1, kernel-rt_debug-5.14.21-150400.15.5.1, kernel-source-rt-5.14.21-150400.15.5.1, kernel-syms-rt-5.14.21-150400.15.5.1
SUSE Linux Enterprise Module for Realtime 15-SP4 (src):    kernel-rt-5.14.21-150400.15.5.1, kernel-rt_debug-5.14.21-150400.15.5.1, kernel-source-rt-5.14.21-150400.15.5.1, kernel-syms-rt-5.14.21-150400.15.5.1
SUSE Linux Enterprise Module for Live Patching 15-SP4 (src):    kernel-livepatch-SLE15-SP4-RT_Update_1-1-150400.1.3.1
SUSE Linux Enterprise Micro 5.3 (src):    kernel-rt-5.14.21-150400.15.5.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.