[IOTG][RPL] Integrated TSN controller (stmmac) driver enabling

Bug #2019222 reported by Philip Cox
6
This bug affects 1 person
Affects Status Importance Assigned to Milestone
linux-intel-iotg (Ubuntu)
Fix Committed
Undecided
Philip Cox
Jammy
Fix Released
High
Philip Cox

Bug Description

This is a public version of https://bugs.launchpad.net/bugs/1996592

-----

Description
Enable Integrated TSN controller (stmmac) driver

Hardware: Raptor Lake

Target Release: 22.04
Target Kernel: TBD

External links:
https://github.com/intel/linux-intel-quilt/tree/mainline-tracking-v5.19-linux-221019T120731Z

0001-igc-Disable-PTM-sequences-when-interface-goes-down.tsn
0001-taprio-Add-support-for-frame-preemption-offload.tsn
0002-xsk-add-txtime-field-in-xdp_desc-struct.tsn
0003-tc-Add-index-of-FPE-QMASK.tsn
0004-net-pcs-xpcs-enable-xpcs-reset-skipping.tsn
0007-net-stmmac-add-FPE-preempt-setting-for-TxQ-preemptible.tsn
0008-net-stmmac-support-recalculating-of-CBS-idle-slope-und.tsn
0009-net-stmmac-Add-module-param-to-del-keep-est-hw-conf.tsn
0011-net-stmmac-restructure-Rx-Tx-hardware-timestamping-fun.tsn
0013-net-stmmac-introduce-AF_XDP-ZC-TX-HW-timestamps.tsn
0018-net-stmmac-skip-runtime-handling-in-mdio-read-write.tsn
0019-net-stmmac-Add-support-for-HW-accelerated-VLAN-strippi.tsn
0025-net-phy-add-wrapper-function-for-setup-master-slave-se.tsn
0027-net-stmmac-Adjust-mac_capabilities-for-Intel-mGbE-2.5G.tsn
0031-net-stmmac-fix-deadlock-caused-by-taking-RTNL-in-RPM-r.tsn
0034-stmmac-intel-Separate-ADL-N-and-RPL-P-device-ID-from-T.tsn
0038-stmmac-intel-skip-xpcs-reset-for-2.5Gbps-on-Intel-Alde.tsn
0001-net-phy-marvell10g-Add-check-after-reading-phy-interru.tsn
0002-taprio-Add-check-for-NULL-struct-before-accessing-the-.tsn
0001-Revert-igc-Disable-PTM-sequences-when-interface-goes-d.tsn
0002-igc-Set-the-RX-packet-buffer-size-for-TSN-mode.tsn
0003-igc-Only-dump-registers-if-configured-to-dump-HW-infor.tsn
0004-ethtool-Add-support-for-configuring-and-verifying-fram.tsn
0005-core-Introduce-netdev_tc_map_to_queue_mask.tsn
0006-taprio-Replace-tc_map_to_queue_mask.tsn
0007-mqprio-Add-support-for-frame-preemption-offload.tsn
0008-igc-Add-support-for-enabling-frame-preemption-via-etht.tsn
0009-ethtool-Add-support-for-configuring-frame-preemption-v.tsn
0010-igc-Add-support-for-TC_SETUP_PREEMPT.tsn
0011-igc-Add-support-for-setting-frame-preemption-configura.tsn
0012-igc-Add-support-for-Frame-Preemption-verification.tsn
0013-igc-Add-support-for-exposing-frame-preemption-stats-re.tsn
0014-igc-Optimize-the-packet-buffer-utilization.tsn
0015-igc-Add-support-for-enabling-all-packets-to-be-receive.tsn
0016-igc-Fix-race-condition-in-PTP-Tx-code.tsn
0017-igc-Add-support-for-DMA-timestamp-for-non-PTP-packets.tsn
0018-igc-Correct-the-launchtime-offset.tsn
0019-igc-Export-LEDs.tsn --> cf8331825a8d10e46fa574fdf015a65cb5a6db86 (v5.15-rc1)
0020-bpf-add-btf-register-unregister-API.tsn
0021-net-core-XDP-metadata-BTF-netlink-API.tsn
0022-rtnetlink-Fix-unchecked-return-value-of-dev_xdp_query_.tsn
0023-rtnetlink-Add-return-value-check.tsn
0024-tools-bpf-Query-XDP-metadata-BTF-ID.tsn
0025-tools-bpf-Add-xdp-set-command-for-md-btf.tsn
0026-igc-Add-BTF-based-metadata-for-XDP.tsn
0027-igc-Enable-HW-RX-Timestamp-for-AF_XDP-ZC.tsn
0028-igc-Enable-HW-TX-Timestamp-for-AF_XDP-ZC.tsn
0029-igc-Enable-trace-for-HW-TX-Timestamp-AF_XDP-ZC.tsn
0030-igc-Remove-the-CONFIG_DEBUG_MISC-condition-for-trace.tsn
0031-igc-Take-care-of-DMA-timestamp-rollover.tsn
0032-igc-Use-strict-cycles-for-LaunchTime-mode.tsn
0033-igc-Fix-sending-packets-too-early.tsn
0034-igc-Add-SO_TXTIME-for-AF_XDP-ZC.tsn
0035-igc-Fix-scheduling-multiple-packets-for-next-cycle.tsn
0036-igc-Add-context-for-empty-packet.tsn
0037-igc-Reodering-the-empty-packet-buffers-and-descriptors.tsn
0038-igc-Add-trace-for-launchtime-calculation-corner-case.tsn
0039-igc-Configure-BaseT-after-start-and-end-time-queue-reg.tsn
0040-igc-Remove-PTM-trigger-from-initialization-sequence.tsn
0001-net-stmmac-update-MAC-capabilities-when-tx-queues-are-.tsn
0002-net-stmmac-add-check-for-2.5G-mode-to-prevent-MAC-capa.tsn
0001-Revert-tc-Add-index-of-FPE-QMASK.tsn
0002-Revert-ethtool-Add-support-for-configuring-and-verifyi.tsn
0003-Revert-ethtool-Add-support-for-configuring-frame-preem.tsn
0004-ethtool-Add-support-for-configuring-frame-preemption.tsn
0005-ethtool-Add-support-for-Frame-Preemption-verification.tsn
0001-net-stmmac-check-supported-linkmode-request-for-set-ee.tsn

Revision history for this message
Philip Cox (philcox) wrote :

After applying all of the patches, it ended up that only 4 are needed, as the rest are already contained in the kernel (from the SRU process, from other cherry-picks, or from upstream changes).

Changed in linux-intel-iotg (Ubuntu Jammy):
assignee: nobody → Philip Cox (philcox)
Changed in linux-intel-iotg (Ubuntu):
status: New → In Progress
Changed in linux-intel-iotg (Ubuntu Jammy):
status: New → In Progress
importance: Undecided → High
Philip Cox (philcox)
Changed in linux-intel-iotg (Ubuntu Jammy):
status: In Progress → Fix Committed
Changed in linux-intel-iotg (Ubuntu):
status: In Progress → Fix Committed
Revision history for this message
Ubuntu Kernel Bot (ubuntu-kernel-bot) wrote :

This bug is awaiting verification that the linux-intel-iotg/5.15.0-1041.47 kernel in -proposed solves the problem. Please test the kernel and update this bug with the results. If the problem is solved, change the tag 'verification-needed-jammy-linux-intel-iotg' to 'verification-done-jammy-linux-intel-iotg'. If the problem still exists, change the tag 'verification-needed-jammy-linux-intel-iotg' to 'verification-failed-jammy-linux-intel-iotg'.

If verification is not done by 5 working days from today, this fix will be dropped from the source code, and this bug will be closed.

See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how to enable and use -proposed. Thank you!

tags: added: kernel-spammed-jammy-linux-intel-iotg-v2 verification-needed-jammy-linux-intel-iotg
Revision history for this message
Launchpad Janitor (janitor) wrote :

This bug was fixed in the package linux-intel-iotg - 5.15.0-1043.49

---------------
linux-intel-iotg (5.15.0-1043.49) jammy; urgency=medium

  * jammy/linux-intel-iotg: 5.15.0-1043.49 -proposed tracker (LP: #2038196)

  * CVE-2023-42755
    - [Config] remove NET_CLS_RSVP and NET_CLS_RSVP6

  [ Ubuntu: 5.15.0-87.97 ]

  * jammy/linux: 5.15.0-87.97 -proposed tracker (LP: #2038209)
  * CVE-2023-4623
    - net/sched: sch_hfsc: Ensure inner classes have fsc curve
  * CVE-2023-42755
    - net/sched: Retire rsvp classifier
    - [Config] remove NET_CLS_RSVP and NET_CLS_RSVP6
  * CVE-2023-34319
    - xen/netback: Fix buffer overrun triggered by unusual packet
  * CVE-2023-4921
    - net: sched: sch_qfq: Fix UAF in qfq_dequeue()
  * CVE-2023-42752
    - igmp: limit igmpv3_newpack() packet size to IP_MAX_MTU
  * CVE-2023-4622
    - af_unix: Fix null-ptr-deref in unix_stream_sendpage().
  * CVE-2023-4244
    - netfilter: nft_set_rbtree: fix overlap expiration walk
    - netfilter: nf_tables: don't skip expired elements during walk
    - netfilter: nf_tables: adapt set backend to use GC transaction API
    - netfilter: nft_set_hash: mark set element as dead when deleting from packet
      path
    - netfilter: nf_tables: GC transaction API to avoid race with control plane
    - netfilter: nf_tables: remove busy mark and gc batch API
    - netfilter: nf_tables: don't fail inserts if duplicate has expired
    - netfilter: nf_tables: fix kdoc warnings after gc rework
    - netfilter: nf_tables: fix GC transaction races with netns and netlink event
      exit path
    - netfilter: nf_tables: GC transaction race with netns dismantle
    - netfilter: nf_tables: GC transaction race with abort path
    - netfilter: nf_tables: use correct lock to protect gc_list
    - netfilter: nf_tables: defer gc run if previous batch is still pending
    - netfilter: nft_dynset: disallow object maps
    - netfilter: nft_set_rbtree: skip sync GC for new elements in this transaction
  * CVE-2023-42756
    - netfilter: ipset: Fix race between IPSET_CMD_CREATE and IPSET_CMD_SWAP
  * CVE-2023-42753
    - netfilter: ipset: add the missing IP_SET_HASH_WITH_NET0 macro for
      ip_set_hash_netportnet.c
  * CVE-2023-5197
    - netfilter: nf_tables: skip bound chain in netns release path
    - netfilter: nf_tables: disallow rule removal from chain binding
  * CVE-2023-4881
    - netfilter: nftables: exthdr: fix 4-byte stack OOB write

 -- Philip Cox <email address hidden> Wed, 11 Oct 2023 12:24:56 -0400

Changed in linux-intel-iotg (Ubuntu Jammy):
status: Fix Committed → Fix Released
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.