Raspberry Pi 3B plus cpuinfo

Bug #1823151 reported by Terrance
12
This bug affects 2 people
Affects Status Importance Assigned to Milestone
linux-raspi2 (Ubuntu)
Confirmed
Undecided
Unassigned
Bionic
Fix Released
Undecided
Unassigned

Bug Description

[Impact]

Missing model name, hardware revision etc. from /proc/cpuinfo.

[Test Case]

'cat /proc/cpuinfo' should show something like:

Hardware : BCM2835
Revision : a02082
Serial : 00000000f13010a2

[Fix]

Backport commit 935eb6f9a319 ("arch/arm64: Add Revision, Serial, Model to cpuinfo") from raspberry/linux rpi-4.19.y.

[Regression Potential]

Low. Isolated and simple fix.

[Original Description]

# OS

```
$ uname -a
Linux host-name 4.15.0-1033-raspi2 #35-Ubuntu SMP PREEMPT Fri Mar 15 15:53:58 UTC 2019 aarch64 aarch64 aarch64 GNU/Linux
$ lsb_release -a
No LSB modules are available.
Distributor ID: Ubuntu
Description: Ubuntu 18.04.2 LTS
Release: 18.04
Codename: bionic

```

# expected cpuinfo

with "model name", "Hardware", "Revision" etc.

some example from raspbian armhf

```
processor : 0
model name : ARMv7 Processor rev 4 (v7l)
BogoMIPS : 38.40
Features : half thumb fastmult vfp edsp neon vfpv3 tls vfpv4 idiva idivt vfpd32 lpae evtstrm crc32
CPU implementer : 0x41
CPU architecture: 7
CPU variant : 0x0
CPU part : 0xd03
CPU revision : 4
.
.
.
Hardware : BCM2835
Revision : a02082
Serial : 00000000f13010a2

```

# actual cpuinfo

This causes golang unable to detect platform.

```
$ cat /proc/cpuinfo
processor : 0
BogoMIPS : 38.40
Features : fp asimd evtstrm crc32 cpuid
CPU implementer : 0x41
CPU architecture: 8
CPU variant : 0x0
CPU part : 0xd03
CPU revision : 4

processor : 1
BogoMIPS : 38.40
Features : fp asimd evtstrm crc32 cpuid
CPU implementer : 0x41
CPU architecture: 8
CPU variant : 0x0
CPU part : 0xd03
CPU revision : 4

processor : 2
BogoMIPS : 38.40
Features : fp asimd evtstrm crc32 cpuid
CPU implementer : 0x41
CPU architecture: 8
CPU variant : 0x0
CPU part : 0xd03
CPU revision : 4

processor : 3
BogoMIPS : 38.40
Features : fp asimd evtstrm crc32 cpuid
CPU implementer : 0x41
CPU architecture: 8
CPU variant : 0x0
CPU part : 0xd03
CPU revision : 4
```

Terrance (terrance-hhh)
description: updated
no longer affects: ubuntu-mate
Revision history for this message
Maximilian Haverkamp (haver007) wrote :

Still affected on Ubuntu Mate 18.04.02 64-bit.
Any fix or workaround out their?

Revision history for this message
Launchpad Janitor (janitor) wrote :

Status changed to 'Confirmed' because the bug affects multiple users.

Changed in cpuinfo (Ubuntu):
status: New → Confirmed
Juerg Haefliger (juergh)
affects: cpuinfo (Ubuntu) → linux-raspi2 (Ubuntu)
Juerg Haefliger (juergh)
description: updated
Changed in linux-raspi2 (Ubuntu Bionic):
status: New → Fix Committed
Revision history for this message
Launchpad Janitor (janitor) wrote :
Download full text (42.4 KiB)

This bug was fixed in the package linux-raspi2 - 4.15.0-1053.57

---------------
linux-raspi2 (4.15.0-1053.57) bionic; urgency=medium

  * bionic/linux-raspi2: 4.15.0-1053.57 -proposed tracker (LP: #1854793)

  * Bionic update: upstream stable patchset 2019-11-21 (LP: #1853519)
    - raspi2: [Config] CONFIG_SGL_ALLOC=y

  * update ENA driver for DIMLIB dynamic interrupt moderation (LP: #1853180)
    - raspi2: [Config] disable CONFIG_DIMLIB

  * bcm2835-sdhost: Lots of Compile warnings (LP: #1847432)
    - mmc: bcm2835-sdhost: Fix warnings on arm64

  * Raspberry Pi 3B plus cpuinfo (LP: #1823151)
    - arch/arm64: Add Revision, Serial, Model to cpuinfo

  * Conflicting mmc modules built in (LP: #1762835)
    - [Config] raspi2: Remove upstream mmc modules

  [ Ubuntu: 4.15.0-73.82 ]

  * bionic/linux: 4.15.0-73.82 -proposed tracker (LP: #1854819)
  * CVE-2019-14901
    - SAUCE: mwifiex: Fix heap overflow in mmwifiex_process_tdls_action_frame()
  * CVE-2019-14896 // CVE-2019-14897
    - SAUCE: libertas: Fix two buffer overflows at parsing bss descriptor
  * CVE-2019-14895
    - SAUCE: mwifiex: fix possible heap overflow in mwifiex_process_country_ie()
  * CVE-2019-18660: patches for Ubuntu (LP: #1853142) // CVE-2019-18660
    - powerpc/64s: support nospectre_v2 cmdline option
    - powerpc/book3s64: Fix link stack flush on context switch
    - KVM: PPC: Book3S HV: Flush link stack on guest exit to host kernel
  * Please add patch fixing RK818 ID detection (LP: #1853192)
    - SAUCE: mfd: rk808: Fix RK818 ID template
  * [SRU][B/OEM-B/OEM-OSP1/D] Enable new Elan touchpads which are not in current
    whitelist (LP: #1853246)
    - HID: quirks: Fix keyboard + touchpad on Lenovo Miix 630
    - Input: elan_i2c - export the device id whitelist
    - HID: quirks: Refactor ELAN 400 and 401 handling
  * Lenovo dock MAC Address pass through doesn't work in Ubuntu (LP: #1827961)
    - r8152: Add macpassthru support for ThinkPad Thunderbolt 3 Dock Gen 2
  * s390/dasd: reduce the default queue depth and nr of hardware queues
    (LP: #1852257)
    - s390/dasd: reduce the default queue depth and nr of hardware queues
  * External microphone can't work on some dell machines with the codec alc256
    or alc236 (LP: #1853791)
    - SAUCE: ALSA: hda/realtek - Move some alc256 pintbls to fallback table
    - SAUCE: ALSA: hda/realtek - Move some alc236 pintbls to fallback table
  * Memory leak in net/xfrm/xfrm_state.c - 8 pages per ipsec connection
    (LP: #1853197)
    - xfrm: Fix memleak on xfrm state destroy
  * CVE-2019-19083
    - drm/amd/display: memory leak
  * update ENA driver for DIMLIB dynamic interrupt moderation (LP: #1853180)
    - net: ena: add intr_moder_rx_interval to struct ena_com_dev and use it
    - net: ena: switch to dim algorithm for rx adaptive interrupt moderation
    - net: ena: reimplement set/get_coalesce()
    - net: ena: enable the interrupt_moderation in driver_supported_features
    - net: ena: remove code duplication in
      ena_com_update_nonadaptive_moderation_interval _*()
    - net: ena: remove old adaptive interrupt moderation code from ena_netdev
    - net: ena: remove ena_restore_ethtool_params() and relevant fields
    ...

Changed in linux-raspi2 (Ubuntu Bionic):
status: Fix Committed → Fix Released
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.