Azure kernel for focal misses binder and ashmem kernel modules

Bug #1914568 reported by Simon Fels
8
This bug affects 1 person
Affects Status Importance Assigned to Milestone
linux-azure (Ubuntu)
Fix Released
Medium
Unassigned
Focal
Fix Released
Medium
Tim Gardner
Groovy
Fix Released
Medium
Tim Gardner

Bug Description

For the purpose of Anbox Cloud we package both the binder and ashmem kernel modules in the Ubuntu kernel. The generic kernel ships it and all clouds specific kernels should too. However the azure kernel doesn't include the prebuilt binder_linux.ko and ashmem_linux.ko modules:

ubuntu@ac0:~$ uname -r
5.4.0-1039-azure
ubuntu@ac0:~$ dpkg -L linux-modules-extra-5.4.0-1039-azure | grep binder
ubuntu@ac0:~$ dpkg -L linux-modules-extra-5.4.0-1039-azure | grep ashmem

Can we please get both kernel modules added to azure kernel and at the same time double check that the modules are packaged in all other cloud kernels?

Thanks!

Tags: patch
Tim Gardner (timg-tpi)
Changed in linux-azure (Ubuntu):
assignee: nobody → Tim Gardner (timg-tpi)
Tim Gardner (timg-tpi)
Changed in linux-azure (Ubuntu Focal):
assignee: nobody → Tim Gardner (timg-tpi)
Changed in linux-azure (Ubuntu):
assignee: Tim Gardner (timg-tpi) → nobody
Revision history for this message
Tim Gardner (timg-tpi) wrote :

UBUNTU: [Config] azure: Enable Android and ASHMEM=m, ANDROID_BINDER_IPC=m

tags: added: patch
Revision history for this message
Tim Gardner (timg-tpi) wrote :

SRU Justification:

[Impact]
Enable the Android modules ASHMEM and BINDER_IPC in the Azure kernel.

[Fix]
See attached patch for config changes. Set CONFIG_ANDROID=y, CONFIG_ASHMEM=m, CONFIG_BINDER_IPC=m

[Test Case]
1. Installed the kernel deb, linux-modules, and linux-modules-extra.
2. Booted the test kernel.
3. sudo modprobe ashmem_linux
   Checked dmesg for errors
4. sudo modprobe binder_ipc_linux
   Checked dmesg for errors.

[Where problems could occur]
Though the Android subsystem is in staging, enabling ANDROID=y appears to be a standalone operation.
There should be no impact until the Android modules are manually installed.
~
~
~
~
~
~
~
~
~
~

Tim Gardner (timg-tpi)
Changed in linux-azure (Ubuntu Groovy):
assignee: nobody → Tim Gardner (timg-tpi)
Changed in linux-azure (Ubuntu):
importance: Undecided → Medium
Changed in linux-azure (Ubuntu Focal):
importance: Undecided → Medium
Changed in linux-azure (Ubuntu Groovy):
importance: Undecided → Medium
Stefan Bader (smb)
Changed in linux-azure (Ubuntu Focal):
status: New → In Progress
Changed in linux-azure (Ubuntu Groovy):
status: New → In Progress
Stefan Bader (smb)
Changed in linux-azure (Ubuntu Groovy):
status: In Progress → Fix Committed
Changed in linux-azure (Ubuntu Focal):
status: In Progress → Fix Committed
Revision history for this message
Launchpad Janitor (janitor) wrote :
Download full text (19.1 KiB)

This bug was fixed in the package linux-azure - 5.8.0-1024.26

---------------
linux-azure (5.8.0-1024.26) groovy; urgency=medium

  * groovy/linux-azure: 5.8.0-1024.26 -proposed tracker (LP: #1916130)

  * Azure kernel for focal misses binder and ashmem kernel modules
    (LP: #1914568)
    - [Config] Enable CONFIG_ASHMEM=m, CONFIG_ANDROID_BINDER_IPC=m
    - azure: [Config] Disable ION

  * Please trust Canonical Livepatch Service kmod signing key (LP: #1898716)
    - azure: [Config] enable CONFIG_MODVERSIONS=y
    - azure: [Packaging] build canonical-certs.pem from branch/arch certs
    - azure: [Config] Allow ASM_MODVERSIONS

  [ Ubuntu: 5.8.0-45.51 ]

  * groovy/linux: 5.8.0-45.51 -proposed tracker (LP: #1916143)
  * Please trust Canonical Livepatch Service kmod signing key (LP: #1898716)
    - [Config] enable CONFIG_MODVERSIONS=y
    - [Packaging] build canonical-certs.pem from branch/arch certs
    - [Config] add Canonical Livepatch Service key to SYSTEM_TRUSTED_KEYS
    - [Config] add ubuntu-drivers key to SYSTEM_TRUSTED_KEYS
    - [Config] Allow ASM_MODVERSIONS and MODULE_REL_CRCS
  * CVE-2021-20194
    - bpf, cgroup: Fix optlen WARN_ON_ONCE toctou
    - bpf, cgroup: Fix problematic bounds check
  * Missing device id for Intel TGL-H ISH [8086:43fc] in intel-ish-hid driver
    (LP: #1914543)
    - HID: intel-ish-hid: ipc: Add Tiger Lake H PCI device ID
  * Prevent thermal shutdown during boot process (LP: #1906168)
    - thermal/core: Emit a warning if the thermal zone is updated without ops
    - thermal/core: Add critical and hot ops
    - thermal/drivers/acpi: Use hot and critical ops
    - thermal/drivers/rcar: Remove notification usage
    - thermal: int340x: Fix unexpected shutdown at critical temperature
    - thermal: intel: pch: Fix unexpected shutdown at critical temperature
  * geneve overlay network on vlan interface broken with offload enabled
    (LP: #1914447)
    - net/mlx5e: Fix SWP offsets when vlan inserted by driver
  * Groovy update: upstream stable patchset 2021-02-11 (LP: #1915473)
    - net: cdc_ncm: correct overhead in delayed_ndp_size
    - net: hns3: fix the number of queues actually used by ARQ
    - net: hns3: fix a phy loopback fail issue
    - net: stmmac: dwmac-sun8i: Balance internal PHY resource references
    - net: stmmac: dwmac-sun8i: Balance internal PHY power
    - net: vlan: avoid leaks on register_vlan_dev() failures
    - net/sonic: Fix some resource leaks in error handling paths
    - net: ipv6: fib: flush exceptions when purging route
    - tools: selftests: add test for changing routes with PTMU exceptions
    - net: fix pmtu check in nopmtudisc mode
    - net: ip: always refragment ip defragmented packets
    - octeontx2-af: fix memory leak of lmac and lmac->name
    - nexthop: Fix off-by-one error in error path
    - nexthop: Unlink nexthop group entry in error path
    - s390/qeth: fix L2 header access in qeth_l3_osa_features_check()
    - net: dsa: lantiq_gswip: Exclude RMII from modes that report 1 GbE
    - net/mlx5: Use port_num 1 instead of 0 when delete a RoCE address
    - net/mlx5e: ethtool, Fix restriction of autoneg with 56G
    - chtls: Fix hardware tid leak
    - chtls: Remove...

Changed in linux-azure (Ubuntu Groovy):
status: Fix Committed → Fix Released
Revision history for this message
Launchpad Janitor (janitor) wrote :
Download full text (28.9 KiB)

This bug was fixed in the package linux-azure - 5.4.0-1041.43

---------------
linux-azure (5.4.0-1041.43) focal; urgency=medium

  * focal/linux-azure: 5.4.0-1041.43 -proposed tracker (LP: #1916149)

  * Please trust Canonical Livepatch Service kmod signing key (LP: #1898716)
    - [Config] azure: enable CONFIG_MODVERSIONS and CONFIG_ASM_MODVERSIONS
    - [Config] azure: set CONFIG_SYSTEM_TRUSTED_KEYS

  * Azure kernel for focal misses binder and ashmem kernel modules
    (LP: #1914568)
    - [Config] Enable Android and ASHMEM=m, ANDROID_BINDER_IPC=m

  [ Ubuntu: 5.4.0-67.75 ]

  * focal/linux: 5.4.0-67.75 -proposed tracker (LP: #1916169)
  * Please trust Canonical Livepatch Service kmod signing key (LP: #1898716)
    - [Config] enable CONFIG_MODVERSIONS=y
    - [Packaging] build canonical-certs.pem from branch/arch certs
    - [Config] add Canonical Livepatch Service key to SYSTEM_TRUSTED_KEYS
    - [Config] add ubuntu-drivers key to SYSTEM_TRUSTED_KEYS
    - [Config] Allow ASM_MODVERSIONS and MODULE_REL_CRCS
  * geneve overlay network on vlan interface broken with offload enabled
    (LP: #1914447)
    - net/mlx5e: Fix SWP offsets when vlan inserted by driver
  * Add support for selective build of special drivers (LP: #1912789)
    - [Packaging] Fix ODM support in actual build
  * devlink: don't do reporter recovery if the state is healthy (LP: #1915403)
    - devlink: don't do reporter recovery if the state is healthy
  * Missing device id for Intel TGL-H ISH [8086:43fc] in intel-ish-hid driver
    (LP: #1914543)
    - HID: intel-ish-hid: ipc: Add Tiger Lake H PCI device ID
  * Focal update: v5.4.94 upstream stable release (LP: #1915200)
    - gpio: mvebu: fix pwm .get_state period calculation
    - futex: Ensure the correct return value from futex_lock_pi()
    - futex: Replace pointless printk in fixup_owner()
    - futex: Provide and use pi_state_update_owner()
    - rtmutex: Remove unused argument from rt_mutex_proxy_unlock()
    - futex: Use pi_state_update_owner() in put_pi_state()
    - futex: Simplify fixup_pi_state_owner()
    - futex: Handle faults correctly for PI futexes
    - HID: wacom: Correct NULL dereference on AES pen proximity
    - io_uring: Fix current->fs handling in io_sq_wq_submit_work()
    - tracing: Fix race in trace_open and buffer resize call
    - arm64: mm: use single quantity to represent the PA to VA translation
    - SMB3.1.1: do not log warning message if server doesn't populate salt
    - tools: Factor HOSTCC, HOSTLD, HOSTAR definitions
    - dm integrity: conditionally disable "recalculate" feature
    - writeback: Drop I_DIRTY_TIME_EXPIRE
    - fs: fix lazytime expiration handling in __writeback_single_inode()
    - Linux 5.4.94
  * Focal update: v5.4.93 upstream stable release (LP: #1915195)
    - i2c: bpmp-tegra: Ignore unknown I2C_M flags
    - platform/x86: ideapad-laptop: Disable touchpad_switch for ELAN0634
    - ALSA: seq: oss: Fix missing error check in snd_seq_oss_synth_make_info()
    - ALSA: hda/via: Add minimum mute flag
    - ACPI: scan: Make acpi_bus_get_device() clear return pointer on error
    - btrfs: don't get an EINTR during drop_snapshot for reloc
    - btrfs: fix lockdep splat in...

Changed in linux-azure (Ubuntu Focal):
status: Fix Committed → Fix Released
Revision history for this message
Launchpad Janitor (janitor) wrote :
Download full text (149.7 KiB)

This bug was fixed in the package linux-azure - 5.8.0-1024.26+21.04.1

---------------
linux-azure (5.8.0-1024.26+21.04.1) hirsute; urgency=medium

  * hirsute/linux-azure: 5.8.0-1024.26+21.04.1 -proposed tracker (LP: #1916129)

  * Packaging resync (LP: #1786013)
    - update dkms package versions

  [ Ubuntu: 5.8.0-1024.26 ]

  * groovy/linux-azure: 5.8.0-1024.26 -proposed tracker (LP: #1916130)
  * Azure kernel for focal misses binder and ashmem kernel modules
    (LP: #1914568)
    - [Config] Enable CONFIG_ASHMEM=m, CONFIG_ANDROID_BINDER_IPC=m
    - azure: [Config] Disable ION
  * Please trust Canonical Livepatch Service kmod signing key (LP: #1898716)
    - azure: [Config] enable CONFIG_MODVERSIONS=y
    - azure: [Packaging] build canonical-certs.pem from branch/arch certs
    - azure: [Config] Allow ASM_MODVERSIONS
  * groovy/linux: 5.8.0-45.51 -proposed tracker (LP: #1916143)
  * Please trust Canonical Livepatch Service kmod signing key (LP: #1898716)
    - [Config] enable CONFIG_MODVERSIONS=y
    - [Packaging] build canonical-certs.pem from branch/arch certs
    - [Config] add Canonical Livepatch Service key to SYSTEM_TRUSTED_KEYS
    - [Config] add ubuntu-drivers key to SYSTEM_TRUSTED_KEYS
    - [Config] Allow ASM_MODVERSIONS and MODULE_REL_CRCS
  * CVE-2021-20194
    - bpf, cgroup: Fix optlen WARN_ON_ONCE toctou
    - bpf, cgroup: Fix problematic bounds check
  * Missing device id for Intel TGL-H ISH [8086:43fc] in intel-ish-hid driver
    (LP: #1914543)
    - HID: intel-ish-hid: ipc: Add Tiger Lake H PCI device ID
  * Prevent thermal shutdown during boot process (LP: #1906168)
    - thermal/core: Emit a warning if the thermal zone is updated without ops
    - thermal/core: Add critical and hot ops
    - thermal/drivers/acpi: Use hot and critical ops
    - thermal/drivers/rcar: Remove notification usage
    - thermal: int340x: Fix unexpected shutdown at critical temperature
    - thermal: intel: pch: Fix unexpected shutdown at critical temperature
  * geneve overlay network on vlan interface broken with offload enabled
    (LP: #1914447)
    - net/mlx5e: Fix SWP offsets when vlan inserted by driver
  * Groovy update: upstream stable patchset 2021-02-11 (LP: #1915473)
    - net: cdc_ncm: correct overhead in delayed_ndp_size
    - net: hns3: fix the number of queues actually used by ARQ
    - net: hns3: fix a phy loopback fail issue
    - net: stmmac: dwmac-sun8i: Balance internal PHY resource references
    - net: stmmac: dwmac-sun8i: Balance internal PHY power
    - net: vlan: avoid leaks on register_vlan_dev() failures
    - net/sonic: Fix some resource leaks in error handling paths
    - net: ipv6: fib: flush exceptions when purging route
    - tools: selftests: add test for changing routes with PTMU exceptions
    - net: fix pmtu check in nopmtudisc mode
    - net: ip: always refragment ip defragmented packets
    - octeontx2-af: fix memory leak of lmac and lmac->name
    - nexthop: Fix off-by-one error in error path
    - nexthop: Unlink nexthop group entry in error path
    - s390/qeth: fix L2 header access in qeth_l3_osa_features_check()
    - net: dsa: lantiq_gswip: Exclude RMII from modes that report 1 GbE
    - net/mlx5: Us...

Changed in linux-azure (Ubuntu):
status: New → Fix Released
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.