~vicamo/+git/ubuntu-kernel:bug-1895909/debug/3

Last commit made on 2020-09-17
Get this branch:
git clone -b bug-1895909/debug/3 https://git.launchpad.net/~vicamo/+git/ubuntu-kernel
Only You-Sheng Yang can upload to this branch. If you are You-Sheng Yang please log in for upload directions.

Branch merges

Branch information

Name:
bug-1895909/debug/3
Repository:
lp:~vicamo/+git/ubuntu-kernel

Recent commits

b9e8035... by You-Sheng Yang

Bug 1895909: After upgrade kernel 5.6.0-1028-oem, system can not reboot

8981048... by Fabian Vogt <email address hidden>

efi/tpm: Verify event log header before parsing

BugLink: https://bugs.launchpad.net/bugs/1892827

It is possible that the first event in the event log is not actually a
log header at all, but rather a normal event. This leads to the cast in
__calc_tpm2_event_size being an invalid conversion, which means that
the values read are effectively garbage. Depending on the first event's
contents, this leads either to apparently normal behaviour, a crash or
a freeze.

While this behaviour of the firmware is not in accordance with the
TCG Client EFI Specification, this happens on a Dell Precision 5510
with the TPM enabled but hidden from the OS ("TPM On" disabled, state
otherwise untouched). The EFI firmware claims that the TPM is present
and active and that it supports the TCG 2.0 event log format.

Fortunately, this can be worked around by simply checking the header
of the first event and the event log header signature itself.

Commit b4f1874c6216 ("tpm: check event log version before reading final
events") addressed a similar issue also found on Dell models.

Fixes: 6b0326190205 ("efi: Attempt to get the TCG2 event log in the boot stub")
Signed-off-by: Fabian Vogt <email address hidden>
Link: https://<email address hidden>
Bugzilla: https://bugzilla.suse.com/show_bug.cgi?id=1165773
Signed-off-by: Ard Biesheuvel <email address hidden>
(cherry picked from commit 7dfc06a0f25b593a9f51992f540c0f80a57f3629)
Signed-off-by: You-Sheng Yang <email address hidden>
Signed-off-by: Timo Aaltonen <email address hidden>

12f5b41... by Alexander Usyskin

mei: bus: don't clean driver pointer

BugLink: https://bugs.launchpad.net/bugs/1893609

It's not needed to set driver to NULL in mei_cl_device_remove()
which is bus_type remove() handler as this is done anyway
in __device_release_driver().

Actually this is causing an endless loop in driver_detach()
on ubuntu patched kernel, while removing (rmmod) the mei_hdcp module.
The reason list_empty(&drv->p->klist_devices.k_list) is always not-empty.
as the check is always true in __device_release_driver()
 if (dev->driver != drv)
  return;

The non upstream patch is causing this behavior, titled:
'vfio -- release device lock before userspace requests'

Nevertheless the fix is correct also for the upstream.

Link: https://patchwork.<email address hidden>/
Cc: <email address hidden>
Cc: Andy Whitcroft <email address hidden>
Signed-off-by: Alexander Usyskin <email address hidden>
Signed-off-by: Tomas Winkler <email address hidden>
Link: https://<email address hidden>
Signed-off-by: Greg Kroah-Hartman <email address hidden>
(cherry picked from commit e852c2c251ed9c23ae6e3efebc5ec49adb504207)
Signed-off-by: Aaron Ma <email address hidden>
Signed-off-by: Timo Aaltonen <email address hidden>

ddb27a4... by You-Sheng Yang

UBUNTU: SAUCE: PCI/ASPM: VMD: add ASPM quirk for 8086:a0bc

BugLink: https://bugs.launchpad.net/bugs/1893194

One VMD equipped platform has another PCI bridge with PCI ID [8086:a0bc]
that is not already in Ubuntu sauced PCI_DEV_FLAGS_ENABLE_ASPM list.
Link Capability Register shows ASPM L1 supported, but has ASPM Disabled
in Link Control status:

10000:e0:1c.4 PCI bridge [0604]: Intel Corporation Device [8086:a0bc]
(rev 20) (prog-if 00 [Normal decode])
        ...
 Capabilities: [40] Express (v2) Root Port (Slot+), MSI 00
  ...
  LnkCap: Port #5, Speed 8GT/s, Width x4, ASPM L1, Exit Latency L1 <16us
   ClockPM- Surprise- LLActRep+ BwNot+ ASPMOptComp+
  LnkCtl: ASPM Disabled; RCB 64 bytes Disabled- CommClk+
   ExtSynch- ClockPM- AutWidDis- BWInt- AutBWInt-

This adds an additional device [8086:a0bc], a PCI bridge behind VMD
controller, to enable its ASPM.

Signed-off-by: You-Sheng Yang <email address hidden>
Signed-off-by: Timo Aaltonen <email address hidden>

d4544cb... by Jonathan Derrick

UBUNTU: SAUCE: PCI: vmd: Add AHCI to fast interrupt list

BugLink: https://bugs.launchpad.net/bugs/1894778

Some platforms have an AHCI controller behind VMD. These platforms are
working correctly except for a case when the AHCI MSI is programmed with
VMD IRQ vector 0 (0xfee00000). When programmed with any other interrupt
(0xfeeNN000), the MSI is routed correctly and is handled by VMD. Placing
the AHCI MSI(s) in the fast-interrupt allow list solves the issue.

This also requires that VMD allocate more than one MSI/X vector and
changes the minimum MSI/X vectors allocated to two.

Signed-off-by: Jon Derrick <email address hidden>
(cherry-picked from https://patchwork.kernel.org/patch/11758345/)
Signed-off-by: You-Sheng Yang <email address hidden>
Signed-off-by: Timo Aaltonen <email address hidden>

34e99d9... by Timo Aaltonen

UBUNTU: Ubuntu-oem-5.6-5.6.0-1027.27

Signed-off-by: Timo Aaltonen <email address hidden>

cdfe9c1... by Nehal Bakulchandra Shah

UBUNTU: SAUCE: xhci: workaround for S3 issue on AMD SNPS 3.0 xHC

BugLink: https://bugs.launchpad.net/bugs/1893914

On some platform of AMD, S3 fails with HCE and SRE errors.To fix this,
sparse controller enable bit has to be disabled.

Signed-off-by: Nehal Bakulchandra Shah <email address hidden>
(backported from https://lkml.org/lkml/2020/8/31/86)
Signed-off-by: Aaron Ma <email address hidden>
Signed-off-by: Timo Aaltonen <email address hidden>

6bc5de3... by Timo Aaltonen

UBUNTU: link-to-tracker: update tracking bug

BugLink: https://bugs.launchpad.net/bugs/1894714
Properties: no-test-build
Signed-off-by: Timo Aaltonen <email address hidden>

da2181f... by Timo Aaltonen

UBUNTU: Start new release

Ignore: yes
Signed-off-by: Timo Aaltonen <email address hidden>

aa114ae... by Kleber Sacilotto de Souza

UBUNTU: Ubuntu-oem-5.6-5.6.0-1026.26

Signed-off-by: Kleber Sacilotto de Souza <email address hidden>