Bug 1213226 - Backport i2c: tegra: Set ACPI node as primary fwnode
Summary: Backport i2c: tegra: Set ACPI node as primary fwnode
Status: VERIFIED FIXED
Alias: None
Product: PUBLIC SUSE Linux Enterprise Server 15 SP5
Classification: openSUSE
Component: Kernel (show other bugs)
Version: unspecified
Hardware: aarch64 Other
: P5 - None : Normal
Target Milestone: ---
Assignee: Kernel Bugs
QA Contact:
URL:
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2023-07-11 19:35 UTC by Matt Ochs
Modified: 2024-06-25 17:49 UTC (History)
8 users (show)

See Also:
Found By: ---
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Matt Ochs 2023-07-11 19:35:46 UTC
This upstreamed patch is required for ipmitool to work properly on Grace platforms and resolves the following two issues:

    1) "ipmi0" device wasn't enumerating under /dev
    2) "i2c-IPI0001:00" device wasn't enumerating under /sys/bus/i2c/device

https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5bf71889ad9a4d39b7665c105a005c5a33d730ba

This fix needs to be back ported to SLES 15 SP5.

Example behavior:

> sudo ipmitool mc info
Could not open device at /dev/ipmi0 or /dev/ipmi/0 or /dev/ipmidev/0: No such file or directory

> ls -lah /sys/bus/i2c/devices
total 0
drwxr-xr-x 2 root root 0 Jul  6 15:00 .
drwxr-xr-x 4 root root 0 Jul  6 15:00 ..
lrwxrwxrwx 1 root root 0 Jul  6 19:51 1-000c -> ../../../devices/platform/NVDA0301:00/i2c-1/1-000c
lrwxrwxrwx 1 root root 0 Jul  6 15:00 i2c-0 -> ../../../devices/pci0008:00/0008:00:00.0/0008:01:00.0/0008:02:00.0/0008:03:00.0/0008:04:00.0/i2c-0
lrwxrwxrwx 1 root root 0 Jul  6 15:00 i2c-1 -> ../../../devices/platform/NVDA0301:00/i2c-1
lrwxrwxrwx 1 root root 0 Jul  6 15:00 i2c-IPI0001:00 -> ../../../devices/platform/NVDA0301:00/i2c-1/i2c-IPI0001:00 (this entry is missing)
Comment 1 Takashi Iwai 2023-07-12 11:34:02 UTC
Thanks for the report.  I backported the upstream commit to SLE15-SP5 git branch now.  It'll be included in the next (or maybe after the upcoming one) maintenance update kernel.
Comment 2 Takashi Iwai 2023-07-13 13:09:08 UTC
Let's close.
Comment 11 Maintenance Automation 2023-08-03 09:40:42 UTC
SUSE-SU-2023:3172-1: An update that solves seven vulnerabilities, contains two features and has 25 fixes can now be installed.

Category: security (important)
Bug References: 1150305, 1193629, 1194869, 1207894, 1208788, 1211243, 1211867, 1212256, 1212301, 1212525, 1212846, 1212905, 1213059, 1213061, 1213205, 1213206, 1213226, 1213233, 1213245, 1213247, 1213252, 1213258, 1213259, 1213263, 1213264, 1213286, 1213493, 1213523, 1213524, 1213533, 1213543, 1213705
CVE References: CVE-2023-20593, CVE-2023-2985, CVE-2023-3117, CVE-2023-31248, CVE-2023-3390, CVE-2023-35001, CVE-2023-3812
Jira References: PED-4718, PED-4758
Sources used:
openSUSE Leap 15.5 (src): kernel-obs-qa-5.14.21-150500.55.12.1, kernel-source-5.14.21-150500.55.12.1, kernel-obs-build-5.14.21-150500.55.12.1, kernel-livepatch-SLE15-SP5_Update_2-1-150500.11.3.2, kernel-default-base-5.14.21-150500.55.12.1.150500.6.4.2, kernel-syms-5.14.21-150500.55.12.1
Basesystem Module 15-SP5 (src): kernel-source-5.14.21-150500.55.12.1, kernel-default-base-5.14.21-150500.55.12.1.150500.6.4.2
Development Tools Module 15-SP5 (src): kernel-obs-build-5.14.21-150500.55.12.1, kernel-source-5.14.21-150500.55.12.1, kernel-syms-5.14.21-150500.55.12.1
SUSE Linux Enterprise Live Patching 15-SP5 (src): kernel-livepatch-SLE15-SP5_Update_2-1-150500.11.3.2

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 12 Maintenance Automation 2023-08-03 20:30:39 UTC
SUSE-SU-2023:3180-1: An update that solves seven vulnerabilities, contains two features and has 26 fixes can now be installed.

Category: security (important)
Bug References: 1150305, 1193629, 1194869, 1207894, 1208788, 1211243, 1211867, 1212256, 1212301, 1212525, 1212846, 1212905, 1213059, 1213061, 1213205, 1213206, 1213226, 1213233, 1213245, 1213247, 1213252, 1213258, 1213259, 1213263, 1213264, 1213286, 1213311, 1213493, 1213523, 1213524, 1213533, 1213543, 1213705
CVE References: CVE-2023-20593, CVE-2023-2985, CVE-2023-3117, CVE-2023-31248, CVE-2023-3390, CVE-2023-35001, CVE-2023-3812
Jira References: PED-4718, PED-4758
Sources used:
openSUSE Leap 15.5 (src): kernel-source-azure-5.14.21-150500.33.11.1, kernel-syms-azure-5.14.21-150500.33.11.1
Public Cloud Module 15-SP5 (src): kernel-source-azure-5.14.21-150500.33.11.1, kernel-syms-azure-5.14.21-150500.33.11.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 17 Maintenance Automation 2023-08-14 08:30:28 UTC
SUSE-SU-2023:3302-1: An update that solves 28 vulnerabilities, contains two features and has 115 fixes can now be installed.

Category: security (important)
Bug References: 1150305, 1187829, 1193629, 1194869, 1206418, 1207129, 1207894, 1207948, 1208788, 1210335, 1210565, 1210584, 1210627, 1210780, 1210825, 1210853, 1211014, 1211131, 1211243, 1211738, 1211811, 1211867, 1212051, 1212256, 1212265, 1212301, 1212445, 1212456, 1212502, 1212525, 1212603, 1212604, 1212685, 1212766, 1212835, 1212838, 1212842, 1212846, 1212848, 1212861, 1212869, 1212892, 1212901, 1212905, 1212961, 1213010, 1213011, 1213012, 1213013, 1213014, 1213015, 1213016, 1213017, 1213018, 1213019, 1213020, 1213021, 1213024, 1213025, 1213032, 1213034, 1213035, 1213036, 1213037, 1213038, 1213039, 1213040, 1213041, 1213059, 1213061, 1213087, 1213088, 1213089, 1213090, 1213092, 1213093, 1213094, 1213095, 1213096, 1213098, 1213099, 1213100, 1213102, 1213103, 1213104, 1213105, 1213106, 1213107, 1213108, 1213109, 1213110, 1213111, 1213112, 1213113, 1213114, 1213116, 1213134, 1213167, 1213205, 1213206, 1213226, 1213233, 1213245, 1213247, 1213252, 1213258, 1213259, 1213263, 1213264, 1213272, 1213286, 1213287, 1213304, 1213417, 1213493, 1213523, 1213524, 1213533, 1213543, 1213578, 1213585, 1213586, 1213588, 1213601, 1213620, 1213632, 1213653, 1213705, 1213713, 1213715, 1213747, 1213756, 1213759, 1213777, 1213810, 1213812, 1213856, 1213857, 1213863, 1213867, 1213870, 1213871, 1213872
CVE References: CVE-2022-40982, CVE-2023-0459, CVE-2023-1829, CVE-2023-20569, CVE-2023-20593, CVE-2023-21400, CVE-2023-2156, CVE-2023-2166, CVE-2023-2430, CVE-2023-2985, CVE-2023-3090, CVE-2023-31083, CVE-2023-3111, CVE-2023-3117, CVE-2023-31248, CVE-2023-3212, CVE-2023-3268, CVE-2023-3389, CVE-2023-3390, CVE-2023-35001, CVE-2023-3567, CVE-2023-3609, CVE-2023-3611, CVE-2023-3776, CVE-2023-3812, CVE-2023-38409, CVE-2023-3863, CVE-2023-4004
Jira References: PED-4718, PED-4758
Sources used:
openSUSE Leap 15.5 (src): kernel-livepatch-SLE15-SP5-RT_Update_3-1-150500.11.5.1, kernel-syms-rt-5.14.21-150500.13.11.1, kernel-source-rt-5.14.21-150500.13.11.1
SUSE Linux Enterprise Live Patching 15-SP5 (src): kernel-livepatch-SLE15-SP5-RT_Update_3-1-150500.11.5.1
SUSE Real Time Module 15-SP5 (src): kernel-syms-rt-5.14.21-150500.13.11.1, kernel-source-rt-5.14.21-150500.13.11.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 18 Matt Ochs 2023-08-15 15:23:19 UTC
Verified on Grace CG1:

install:~ # ls -lah /sys/bus/i2c/devices
total 0
drwxr-xr-x 2 root root 0 Aug 15 11:12 .
drwxr-xr-x 4 root root 0 Aug 15 11:12 ..
lrwxrwxrwx 1 root root 0 Aug 15 11:13 0-000c -> ../../../devices/platform/NVDA0301:00/i2c-0/0-000c
lrwxrwxrwx 1 root root 0 Aug 15 11:13 i2c-0 -> ../../../devices/platform/NVDA0301:00/i2c-0
lrwxrwxrwx 1 root root 0 Aug 15 11:13 i2c-IPI0001:00 -> ../../../devices/platform/NVDA0301:00/i2c-0/i2c-IPI0001:00
install:~ # ipmitool mc info
Device ID                 : 2
Device Revision           : 5
Firmware Revision         : 23.05
IPMI Version              : 2.0
Manufacturer ID           : 33049
Manufacturer Name         : Mellanox Technologies LTD
Product ID                : 3 (0x0003)
Product Name              : Unknown (0x03)
Device Available          : yes
Provides Device SDRs      : no
Additional Device Support :
    Sensor Device
    SEL Device
    FRU Inventory Device
    Chassis Device
Aux Firmware Rev Info     : 
    0xff
    0x01
    0x03
    0x00
install:~ # ls -l /dev/ipmi*
crw------- 1 root root 507, 0 Aug 15 11:13 /dev/ipmi0
install:~ # cat /proc/driver/rtc 
rtc_time	: 15:16:05
rtc_date	: 2023-08-15
24hr		: yes
Time		: 15:16:5.293380160
Date		: 2023-8-15
Daylight	: 0
Timezone	: unspecified
Resolution	: 1
Accuracy	: 0
SetstoZero	: 0
install:~ #