~vicamo/+git/ubuntu-kernel:bug-1852386/fix-detection-for-a-cmp-v-pch/eoan

Last commit made on 2019-11-13
Get this branch:
git clone -b bug-1852386/fix-detection-for-a-cmp-v-pch/eoan https://git.launchpad.net/~vicamo/+git/ubuntu-kernel
Only You-Sheng Yang can upload to this branch. If you are You-Sheng Yang please log in for upload directions.

Branch merges

Branch information

Name:
bug-1852386/fix-detection-for-a-cmp-v-pch/eoan
Repository:
lp:~vicamo/+git/ubuntu-kernel

Recent commits

df7c2e7... by You-Sheng Yang

Bug 1852386: Add new CNL PCH ID seen on a CML platform

c1711ff... by Imre Deak <email address hidden>

UBUNTU: SAUCE: drm/i915: Fix detection for a CMP-V PCH

BugLink: https://bugs.launchpad.net/bugs/1852386

According to internal documents I found for CMP PCHs the PCI ID 0xA3C1
belongs to a CMP-V chipset. Based on the same docs the programming of
the PCH is compatible with that of KBP. Fix up my previous wrong
assumption accordingly using the SPT programming which in turn is the
basis for KBP.

The original bug reporter verified that this is the correct PCH
identification (the only way we'll program valid DDC pin-pair values to
the GMBUS register) and the Windows team uses the same identification
(that is using the KBP programming model for this PCH).

I filed the necessary Bspec update requests (BSpec/33734).

Bugzilla: https://bugs.freedesktop.org/show_bug.cgi?id=112051
Fixes: 37c92dc303dd ("drm/i915: Add new CNL PCH ID seen on a CML platform")
Reported-and-tested-by: Cyrus <email address hidden>
Cc: Cyrus <email address hidden>
Cc: Timo Aaltonen <email address hidden>
Cc: José Roberto de Souza <email address hidden>
Signed-off-by: Imre Deak <email address hidden>
Reviewed-by: José Roberto de Souza <email address hidden>
(backported from https://patchwork.freedesktop.org/patch/340416)
Signed-off-by: You-Sheng Yang <email address hidden>

17b9d3b... by Imre Deak <email address hidden>

drm/i915: Add new CNL PCH ID seen on a CML platform

BugLink: https://bugs.launchpad.net/bugs/1852386

Atm we don't detect a PCH with PCI ID 0xA3C1 which showed up now on a CML
platform. We don't have the official assignment of the PCH PCI IDs, but
this looks like a CNP which was already used on CML platforms. Let's add
the new ID->PCH type mapping accordingly.

Bugzilla: https://bugs.freedesktop.org/show_bug.cgi?id=112051
Reported-and-tested-by: Cyrus <email address hidden>
Cc: Cyrus <email address hidden>
Signed-off-by: Imre Deak <email address hidden>
Reviewed-by: José Roberto de Souza <email address hidden>
Link: https://patchwork<email address hidden>
(backported from commit 37c92dc303dd0977134d1c8501f057de407473ec
https://anongit.freedesktop.org/git/drm-tip.git)
Signed-off-by: You-Sheng Yang <email address hidden>

a0a6189... by Sasha Neftin

UBUNTU: SAUCE: e1000e: Add support for Comet Lake

BugLink: https://bugs.launchpad.net/bugs/1848555

Add devices ID's for the next LOM generations that will be
available on the next Intel Client platform (Comet Lake)
This patch provides the initial support for these devices

Signed-off-by: Sasha Neftin <email address hidden>
(cherry picked from commit bc2f297b47e74df31363e5c0a7eec083c9fc81d2 https://git.kernel.org/pub/scm/linux/kernel/git/jkirsher/next-queue.git dev-queue)
Signed-off-by: Kai-Heng Feng <email address hidden>
Acked-by: Connor Kuehl <email address hidden>
Acked-by: Seth Forshee <email address hidden>
Signed-off-by: Khalid Elmously <email address hidden>

25ac7c1... by Christian Brauner

UBUNTU: SAUCE: seccomp: fix SECCOMP_USER_NOTIF_FLAG_CONTINUE test

The ifndef for SECCOMP_USER_NOTIF_FLAG_CONTINUE was placed under the
ifndef for the SECCOMP_FILTER_FLAG_NEW_LISTENER feature. This will not
work on systems that do support SECCOMP_FILTER_FLAG_NEW_LISTENER but do not
support SECCOMP_USER_NOTIF_FLAG_CONTINUE. So move the latter ifndef out of
the former ifndef's scope.

2019-10-20 11:14:01 make run_tests -C seccomp
make: Entering directory '/usr/src/perf_selftests-x86_64-rhel-7.6-0eebfed2954f152259cae0ad57b91d3ea92968e8/tools/testing/selftests/seccomp'
gcc -Wl,-no-as-needed -Wall seccomp_bpf.c -lpthread -o seccomp_bpf
seccomp_bpf.c: In function ‘user_notification_continue’:
seccomp_bpf.c:3562:15: error: ‘SECCOMP_USER_NOTIF_FLAG_CONTINUE’ undeclared (first use in this function)
  resp.flags = SECCOMP_USER_NOTIF_FLAG_CONTINUE;
               ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
seccomp_bpf.c:3562:15: note: each undeclared identifier is reported only once for each function it appears in
Makefile:12: recipe for target 'seccomp_bpf' failed
make: *** [seccomp_bpf] Error 1
make: Leaving directory '/usr/src/perf_selftests-x86_64-rhel-7.6-0eebfed2954f152259cae0ad57b91d3ea92968e8/tools/testing/selftests/seccomp'

BugLink: https://bugs.launchpad.net/bugs/1849281

Reported-by: kernel test robot <email address hidden>
Fixes: 0eebfed2954f ("seccomp: test SECCOMP_USER_NOTIF_FLAG_CONTINUE")
Cc: <email address hidden>
Signed-off-by: Christian Brauner <email address hidden>
Reviewed-by: Tycho Andersen <email address hidden>
Signed-off-by: Manoj Iyer <email address hidden>
Acked-by: Stefan Bader <email address hidden>
Acked-by: Seth Forshee <email address hidden>
Signed-off-by: Khalid Elmously <email address hidden>

164a597... by Christian Brauner

UBUNTU: SAUCE: seccomp: avoid overflow in implicit constant conversion

USER_NOTIF_MAGIC is assigned to int variables in this test so set it to INT_MAX
to avoid warnings:

seccomp_bpf.c: In function ‘user_notification_continue’:
seccomp_bpf.c:3088:26: warning: overflow in implicit constant conversion [-Woverflow]
 #define USER_NOTIF_MAGIC 116983961184613L
                          ^
seccomp_bpf.c:3572:15: note: in expansion of macro ‘USER_NOTIF_MAGIC’
  resp.error = USER_NOTIF_MAGIC;
               ^~~~~~~~~~~~~~~~

BugLink: https://bugs.launchpad.net/bugs/1849281

Fixes: 6a21cc50f0c7 ("seccomp: add a return code to trap to userspace")
Signed-off-by: Christian Brauner <email address hidden>
Reviewed-by: Tyler Hicks <email address hidden>
Cc: Andy Lutomirski <email address hidden>
Cc: Will Drewry <email address hidden>
Cc: Shuah Khan <email address hidden>
Cc: Alexei Starovoitov <email address hidden>
Cc: Daniel Borkmann <email address hidden>
Cc: Martin KaFai Lau <email address hidden>
Cc: Song Liu <email address hidden>
Cc: Yonghong Song <email address hidden>
Cc: Tycho Andersen <email address hidden>
Cc: <email address hidden>
Cc: <email address hidden>
Cc: <email address hidden>
Cc: <email address hidden>
Reviewed-by: Tycho Andersen <email address hidden>
Link: https://<email address hidden>
Signed-off-by: Kees Cook <email address hidden>
(cherry picked from commit 223e660bc7638d126a0e4fbace4f33f2895788c4
 git.kernel.org/pub/scm/linux/kernel/git/kees/linux.git)
Signed-off-by: Manoj Iyer <email address hidden>
Acked-by: Stefan Bader <email address hidden>
Acked-by: Seth Forshee <email address hidden>
Signed-off-by: Khalid Elmously <email address hidden>

ee54a97... by Christian Brauner

UBUNTU: SAUCE: seccomp: rework define for SECCOMP_USER_NOTIF_FLAG_CONTINUE

Switch from BIT(0) to (1UL << 0).
First, there are already two different forms used in the header, so there's
no need to add a third. Second, the BIT() macros is kernel internal and
afaict not actually exposed to userspace. Maybe there's some magic there
I'm missing but it definitely causes issues when compiling a program that
tries to use SECCOMP_USER_NOTIF_FLAG_CONTINUE. It currently fails in the
following way:

 # github.com/lxc/lxd/lxd
 /usr/bin/ld: $WORK/b001/_x003.o: in function
 `__do_user_notification_continue':
 lxd/main_checkfeature.go:240: undefined reference to `BIT'
 collect2: error: ld returned 1 exit status

Switching to (1UL << 0) should prevent that and is more in line what is
already done in the rest of the header.

BugLink: https://bugs.launchpad.net/bugs/1849281

Cc: Kees Cook <email address hidden>
Cc: Andy Lutomirski <email address hidden>
Signed-off-by: Christian Brauner <email address hidden>
Link: https://<email address hidden>
Signed-off-by: Kees Cook <email address hidden>
(cherry picked from commit 23b2c96fad21886c53f5e1a4ffedd45ddd2e85ba
 git.kernel.org/pub/scm/linux/kernel/git/kees/linux.git)
Signed-off-by: Manoj Iyer <email address hidden>
Acked-by: Stefan Bader <email address hidden>
Acked-by: Seth Forshee <email address hidden>
Signed-off-by: Khalid Elmously <email address hidden>

9559f2f... by Kai-Heng Feng

UBUNTU: SAUCE: x86/intel: Disable HPET on Intel Ice Lake platforms

BugLink: https://bugs.launchpad.net/bugs/1840239

Ice Lake platform have similar behavior as Coffee Lake, have skewed HPET
timer once the SoCs entered PC10 so let's disable HPET on Ice Lake.
as result.

Signed-off-by: Kai-Heng Feng <email address hidden>
Acked-by: Seth Forshee <email address hidden>
Acked-by: AceLan Kao <email address hidden>
Signed-off-by: Khalid Elmously <email address hidden>

c658bfb... by Kai-Heng Feng

UBUNTU: SAUCE: x86/intel: Disable HPET on Intel Coffe Lake platforms

BugLink: https://bugs.launchpad.net/bugs/1840239

Some Coffee Lake platforms have skewed HPET timer once the SoCs entered
PC10, and marked TSC as unstable clocksource as result.

Harry Pan identified it's a firmware bug [1].

To prevent creating a circular dependency between HPET and TSC, let's
disable HPET on affected platforms.

[1]: https://<email address hidden>/
Bugzilla: https://bugzilla.kernel.org/show_bug.cgi?id=203183

Signed-off-by: Kai-Heng Feng <email address hidden>
Acked-by: Seth Forshee <email address hidden>
Acked-by: AceLan Kao <email address hidden>
Signed-off-by: Khalid Elmously <email address hidden>

4925aea... by Nobuto Murata

UBUNTU: [Packaging] include iavf/i40evf in generic

BugLink: https://bugs.launchpad.net/bugs/1848481

Intel's VF drivers such as igbvf and ixgbevf are already available in
generic. It makes sense to add iavf/i40evf especially for SR-IOV enabled
clouds with Intel X710/XXV710/XL710.

Signed-off-by: Nobuto Murata <email address hidden>
Acked-by: Khalid Elmously <email address hidden>
Acked-by: Seth Forshee <email address hidden>
Signed-off-by: Khalid Elmously <email address hidden>