[ADL-N][RPL-S] support ISHTP module

Bug #2029328 reported by Jian Hui Lee
8
This bug affects 1 person
Affects Status Importance Assigned to Milestone
linux-intel-iotg (Ubuntu)
Invalid
Undecided
Unassigned
Jammy
Fix Released
Undecided
Jian Hui Lee

Bug Description

[Impact]
support ishtp module on intel adl-n/rpl-s platform

[Fix]
add the corresponding pci id for each platform.
the rest of the patches are requested by intel. they belong to code revised, bug fixed and device setup.

[Test]
1. compile test
2. run the kernel on the target platform to see if the module is loaded correctly.
3. run suspend/reboot to see if any error occurs.

[Where problems could occur]
all of the patches are quite clear and easy to understand, so the regression risk should be low.

Changed in linux-intel-iotg (Ubuntu):
status: New → Invalid
tags: added: lookout-canyon oem-priority originate-from-2026343
no longer affects: hwe-next
Changed in linux-intel-iotg (Ubuntu Jammy):
status: New → Fix Committed
Revision history for this message
Ubuntu Kernel Bot (ubuntu-kernel-bot) wrote :

This bug is awaiting verification that the linux-intel-iotg/5.15.0-1039.45 kernel in -proposed solves the problem. Please test the kernel and update this bug with the results. If the problem is solved, change the tag 'verification-needed-jammy-linux-intel-iotg' to 'verification-done-jammy-linux-intel-iotg'. If the problem still exists, change the tag 'verification-needed-jammy-linux-intel-iotg' to 'verification-failed-jammy-linux-intel-iotg'.

If verification is not done by 5 working days from today, this fix will be dropped from the source code, and this bug will be closed.

See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how to enable and use -proposed. Thank you!

tags: added: kernel-spammed-jammy-linux-intel-iotg-v2 verification-needed-jammy-linux-intel-iotg
Revision history for this message
Jian Hui Lee (jianhuilee) wrote :

verified the version 5.15.0-1039.45 fixes the issue.

tags: added: verification-done-jammy-linux-intel-iotg
removed: verification-needed-jammy-linux-intel-iotg
Changed in linux-intel-iotg (Ubuntu Jammy):
assignee: nobody → Jian Hui Lee (jianhuilee)
Revision history for this message
Launchpad Janitor (janitor) wrote :
Download full text (42.8 KiB)

This bug was fixed in the package linux-intel-iotg - 5.15.0-1039.45

---------------
linux-intel-iotg (5.15.0-1039.45) jammy; urgency=medium

  * jammy/linux-intel-iotg: 5.15.0-1039.45 -proposed tracker (LP: #2030409)

  * [EHL] Screen flickering when the setup is in multiple monitors with mirror
    mode output (LP: #2031057)
    - SAUCE: (no-up) drm/i915/display : Remove support for interlace mode

  * [ADL-N][RPL-S] support ISHTP module (LP: #2029328)
    - HID: intel-ish-hid: ipc: add ADL and RPL device id
    - HID: intel-ish-hid: ipc: Specify no cache snooping on TGL and ADL
    - HID: intel-ish-hid: ipc: use time_before to replace "jiffies < a"
    - HID: intel-ish-hid: Fix kernel panic during warm reset

  [ Ubuntu: 5.15.0-83.92 ]

  * jammy/linux: 5.15.0-83.92 -proposed tracker (LP: #2031132)
  * libgnutls report "trap invalid opcode" when trying to install packages over
    https (LP: #2031093)
    - [Config]: disable CONFIG_GDS_FORCE_MITIGATION

  [ Ubuntu: 5.15.0-81.90 ]

  * jammy/linux: 5.15.0-81.90 -proposed tracker (LP: #2030422)
  * Packaging resync (LP: #1786013)
    - [Packaging] resync update-dkms-versions helper
    - [Packaging] resync getabis
    - debian/dkms-versions -- update from kernel-versions (main/2023.08.07)
  * CVE-2022-40982
    - x86/mm: Initialize text poking earlier
    - x86/mm: fix poking_init() for Xen PV guests
    - x86/mm: Use mm_alloc() in poking_init()
    - mm: Move mm_cachep initialization to mm_init()
    - init: Provide arch_cpu_finalize_init()
    - x86/cpu: Switch to arch_cpu_finalize_init()
    - ARM: cpu: Switch to arch_cpu_finalize_init()
    - sparc/cpu: Switch to arch_cpu_finalize_init()
    - um/cpu: Switch to arch_cpu_finalize_init()
    - init: Remove check_bugs() leftovers
    - init: Invoke arch_cpu_finalize_init() earlier
    - init, x86: Move mem_encrypt_init() into arch_cpu_finalize_init()
    - x86/init: Initialize signal frame size late
    - x86/fpu: Remove cpuinfo argument from init functions
    - x86/fpu: Mark init functions __init
    - x86/fpu: Move FPU initialization into arch_cpu_finalize_init()
    - x86/xen: Fix secondary processors' FPU initialization
    - x86/speculation: Add Gather Data Sampling mitigation
    - x86/speculation: Add force option to GDS mitigation
    - x86/speculation: Add Kconfig option for GDS
    - KVM: Add GDS_NO support to KVM
    - Documentation/x86: Fix backwards on/off logic about YMM support
    - [Config]: Enable CONFIG_ARCH_HAS_CPU_FINALIZE_INIT and
      CONFIG_GDS_FORCE_MITIGATION
  * CVE-2023-3609
    - net/sched: cls_u32: Fix reference counter leak leading to overflow
  * CVE-2023-21400
    - io_uring: ensure IOPOLL locks around deferred work
  * CVE-2023-4015
    - netfilter: nf_tables: add NFT_TRANS_PREPARE_ERROR to deal with bound
      set/chain
    - netfilter: nf_tables: unbind non-anonymous set if rule construction fails
    - netfilter: nf_tables: skip immediate deactivate in _PREPARE_ERROR
  * CVE-2023-3995
    - netfilter: nf_tables: disallow rule addition to bound chain via
      NFTA_RULE_CHAIN_ID
  * CVE-2023-3777
    - netfilter: nf_tables: skip bound chain on rule flush
  * losetup with mknod fails on jammy with kerne...

Changed in linux-intel-iotg (Ubuntu Jammy):
status: Fix Committed → Fix Released
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.