linux-azure: Update HV support to 5.17

Bug #1961329 reported by Tim Gardner
8
This bug affects 1 person
Affects Status Importance Assigned to Milestone
linux-azure (Ubuntu)
Fix Released
Medium
Tim Gardner
Focal
Won't Fix
Undecided
Unassigned
Impish
Fix Released
Medium
Tim Gardner
Jammy
Fix Released
Medium
Tim Gardner

Bug Description

SRU Justification

[Impact]

Microsoft has requested these commits be present in all Azure tuned kernels:

ac0f7d42584125dab8039e60ab4ade48cc2db61c Drivers: hv: copy from message page only what's needed
a276463b7aeb6186e7e4315cccb032773fb31b5d Drivers: hv: allocate the exact needed memory for messages
5cc415001bca8fe0e3f0ee6d58a953a314dd9751 Drivers: hv: avoid passing opaque pointer to vmbus_onmessage()
b0a284dc65b401a508dc2c5ed7d465884220f607 Drivers: hv: make sure that 'struct vmbus_channel_message_header' compiles correctly
52c7803f9bd4b1f0ac6e2e3e6051415198cc06bd Drivers: hv: check VMBus messages lengths
06caa778d8b2fbcb4ac3878751e39d116424ba9b hv_utils: Add validation for untrusted Hyper-V values
e99c4afbee07e9323e9191a20b24d74dbf815bdf Drivers: hv: vmbus: Initialize memory to be sent to the host
fe8c1b18a27de4d6ca5d99b3ffb3125dc69a5b76 Drivers: hv: vmbus: Copy the hv_message in vmbus_on_msg_dpc()
e3fa4b747f085d2cda09bba0533b86fa76038635 Drivers: hv: vmbus: Avoid use-after-free in vmbus_onoffer_rescind()
e4d221b42354b2e2ddb9187a806afb651eee2cda Drivers: hv: vmbus: Resolve race condition in vmbus_onoffer_rescind()
adae1e931acd8b430d31141a283ea06d4b705417 Drivers: hv: vmbus: Copy packets sent by Hyper-V out of the ring buffer
9d68cd9120e4e3af38f843e165631c323b86b4e4 hv_utils: Set the maximum packet size for VSS driver to the length of the receive buffer
f1940d4e9cbe6208e7e77e433c587af108152a17 Drivers: hv: vmbus: Fix kernel crash upon unbinding a device from uio_hv_generic driver
007faec014cb5d26983c1f86fd08c6539b41392e x86/sev: Expose sev_es_ghcb_hv_call() for use by HyperV
0cc4f6d9f0b9f20f3f1e1149bdb6737c0b4e134a x86/hyperv: Initialize GHCB page in Isolation VM
af788f355e343373490b7d2e361016e7c24a0ffa x86/hyperv: Initialize shared memory boundary in the Isolation VM.
810a521265023a1d5c6c081ea2d216bc63d422f5 x86/hyperv: Add new hvcall guest address host visibility support
d4dccf353db80e209f262e3973c834e6e48ba9a9 Drivers: hv: vmbus: Mark vmbus ring buffer visible to host in Isolation VM
faff44069ff538ccdfef187c4d7ec83d22dfb3a4 x86/hyperv: Add Write/Read MSR registers via ghcb page
20c89a559e00dfe352b73e867211a669113ae881 x86/hyperv: Add ghcb hvcall support for SNP VM
f2f136c05fb6093818a3b3fefcba46231ac66a62 Drivers: hv: vmbus: Add SNP support for VMbus channel initiate message
9a8797722e4239242d0cb4cc4baa805df6ac979e Drivers: hv: vmbus: Initialize VMbus ring buffer for Isolation VM
1a5e91d8375fc8369207cc0b9894a324f2bbf1d9 swiotlb: Add swiotlb bounce buffer remap function for HV IVM
c789b90a69045d1924bc0802ae0dce2bba05a04e x86/hyper-v: Add hyperv Isolation VM check in the cc_platform_has()
062a5c4260cdb734a4727230c58e38accf413315 hyper-v: Enable swiotlb bounce buffer for Isolation VM
743b237c3a7b0f5b44aa704aae8a1058877b6322 scsi: storvsc: Add Isolation VM support for storvsc driver
846da38de0e8224f2f94b885125cf1fd2d7b0d39 net: netvsc: Add Isolation VM support for netvsc driver
2deb55d9f57bb7a877c0d77115cc4077e1e974ff swiotlb: Add CONFIG_HAS_IOMEM check around swiotlb_mem_remap()
6a27e396ebb149fc47baccc1957a7a9dd70049a7 Drivers: hv: vmbus: Initialize request offers message for Isolation VM
4eea5332d67d8ae6ba5717ec0f4e671fdbd222e7 scsi: storvsc: Fix storvsc_queuecommand() memory leak
96d9d1fa5cd505078534113308ced0aa56d8da58 Drivers: hv: balloon: account for vmbus packet header in max_pkt_size

[Test Plan]

Microsoft tested

[Where things could go wrong]

Hyper-V guests may not work correctly.

[Other Info]

SF: #00323683

Tim Gardner (timg-tpi)
description: updated
description: updated
Revision history for this message
Tim Gardner (timg-tpi) wrote :
Changed in linux-azure (Ubuntu Impish):
status: New → In Progress
importance: Undecided → Medium
assignee: nobody → Tim Gardner (timg-tpi)
Changed in linux-azure (Ubuntu Jammy):
assignee: nobody → Tim Gardner (timg-tpi)
importance: Undecided → Medium
status: New → Fix Committed
Revision history for this message
Launchpad Janitor (janitor) wrote :
Download full text (74.0 KiB)

This bug was fixed in the package linux-azure - 5.15.0-1002.3

---------------
linux-azure (5.15.0-1002.3) jammy; urgency=medium

  * jammy/linux-azure: 5.15.0-1002.3 -proposed tracker (LP: #1965771)

  * Packaging resync (LP: #1786013)
    - [Packaging] switch dependency from crda to wireless-regdb

  * linux-azure: Update HV support to 5.17 (LP: #1961329)
    - x86/sev: Expose sev_es_ghcb_hv_call() for use by HyperV
    - x86/hyperv: Initialize GHCB page in Isolation VM
    - x86/hyperv: Initialize shared memory boundary in the Isolation VM.
    - x86/hyperv: Add new hvcall guest address host visibility support
    - Drivers: hv: vmbus: Mark vmbus ring buffer visible to host in Isolation VM
    - x86/hyperv: Add Write/Read MSR registers via ghcb page
    - x86/hyperv: Add ghcb hvcall support for SNP VM
    - Drivers: hv: vmbus: Add SNP support for VMbus channel initiate message
    - Drivers: hv: vmbus: Initialize VMbus ring buffer for Isolation VM
    - swiotlb: Add swiotlb bounce buffer remap function for HV IVM
    - x86/hyper-v: Add hyperv Isolation VM check in the cc_platform_has()
    - hyper-v: Enable swiotlb bounce buffer for Isolation VM
    - scsi: storvsc: Add Isolation VM support for storvsc driver
    - net: netvsc: Add Isolation VM support for netvsc driver
    - swiotlb: Add CONFIG_HAS_IOMEM check around swiotlb_mem_remap()
    - Drivers: hv: vmbus: Initialize request offers message for Isolation VM
    - scsi: storvsc: Fix storvsc_queuecommand() memory leak
    - Netvsc: Call hv_unmap_memory() in the netvsc_device_remove()
    - x86/sev: Replace occurrences of sev_active() with cc_platform_has()
    - x86/kvm: Don't waste memory if kvmclock is disabled
    - x86/kvmclock: Fix Hyper-V Isolated VM's boot issue when vCPUs > 64

  * linux-azure: Case VM fails to initialize CX4 VF due to mem fragmentation
    (LP: #1961632)
    - net/mlx5: Reduce flow counters bulk query buffer size for SFs
    - net/mlx5: Fix flow counters SF bulk query len
    - net/mlx5: Dynamically resize flow counters query buffer

  * linux-azure: net: mana: Add handling of CQE_RX_TRUNCATED (LP: #1960322)
    - net: mana: Add handling of CQE_RX_TRUNCATED
    - net: mana: Remove unnecessary check of cqe_type in mana_process_rx_cqe()

  * jammy/linux-azure: CIFS 5.15 backport (LP: #1960671)
    - cifs: add mount parameter tcpnodelay
    - cifs: Create a new shared file holding smb2 pdu definitions
    - cifs: move NEGOTIATE_PROTOCOL definitions out into the common area
    - cifs: Move more definitions into the shared area
    - cifs: Move SMB2_Create definitions to the shared area
    - smb3: add dynamic trace points for socket connection
    - cifs: send workstation name during ntlmssp session setup
    - cifs: fix print of hdr_flags in dfscache_proc_show()
    - cifs: introduce new helper for cifs_reconnect()
    - cifs: convert list_for_each to entry variant
    - cifs: split out dfs code from cifs_reconnect()
    - cifs: for compound requests, use open handle if possible
    - cifs: support nested dfs links over reconnect
    - smb3: remove trivial dfs compile warning
    - smb3: add additional null check in SMB2_ioctl
    - smb3: add additional null che...

Changed in linux-azure (Ubuntu Jammy):
status: Fix Committed → Fix Released
Tim Gardner (timg-tpi)
Changed in linux-azure (Ubuntu Impish):
status: In Progress → Fix Committed
Revision history for this message
Ubuntu Kernel Bot (ubuntu-kernel-bot) wrote :

This bug is awaiting verification that the linux-azure/5.13.0-1022.26 kernel in -proposed solves the problem. Please test the kernel and update this bug with the results. If the problem is solved, change the tag 'verification-needed-impish' to 'verification-done-impish'. If the problem still exists, change the tag 'verification-needed-impish' to 'verification-failed-impish'.

If verification is not done by 5 working days from today, this fix will be dropped from the source code, and this bug will be closed.

See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how to enable and use -proposed. Thank you!

tags: added: verification-needed-impish
Revision history for this message
Tim Gardner (timg-tpi) wrote :

Microsoft tested

tags: added: verification-done-impish
removed: verification-needed-impish
Revision history for this message
Launchpad Janitor (janitor) wrote :
Download full text (55.5 KiB)

This bug was fixed in the package linux-azure - 5.13.0-1022.26

---------------
linux-azure (5.13.0-1022.26) impish; urgency=medium

  * impish/linux-azure: 5.13.0-1022.26 -proposed tracker (LP: #1967347)

  * linux-azure: CONFIG_HIBERNATION=y (LP: #1967336)
    - [Config] Azure: arm64 CONFIG_HIBERNATION=y

  * Azure: not enough RAM under 4GB for CVM (LP: #1967166)
    - SAUCE: azure: Swiotlb: Add swiotlb_alloc_from_low_pages switch
    - SAUCE: x86/hyperv: Make swiotlb bounce buffer allocation not just from low
      pages

  * linux-azure: Update HV support to 5.17 (LP: #1961329)
    - Drivers: hv: vmbus: Copy packets sent by Hyper-V out of the ring buffer
    - hv_utils: Set the maximum packet size for VSS driver to the length of the
      receive buffer
    - Drivers: hv: vmbus: Fix kernel crash upon unbinding a device from
      uio_hv_generic driver
    - x86/sev: Expose sev_es_ghcb_hv_call() for use by HyperV
    - x86/hyperv: Initialize GHCB page in Isolation VM
    - x86/hyperv: Initialize shared memory boundary in the Isolation VM.
    - x86/hyperv: Add new hvcall guest address host visibility support
    - Drivers: hv: vmbus: Mark vmbus ring buffer visible to host in Isolation VM
    - x86/hyperv: Add Write/Read MSR registers via ghcb page
    - x86/hyperv: Add ghcb hvcall support for SNP VM
    - Drivers: hv: vmbus: Add SNP support for VMbus channel initiate message
    - Drivers: hv: vmbus: Initialize VMbus ring buffer for Isolation VM
    - swiotlb: Refactor swiotlb init functions
    - swiotlb: Add swiotlb bounce buffer remap function for HV IVM
    - x86/hyper-v: Add hyperv Isolation VM check in the cc_platform_has()
    - hyper-v: Enable swiotlb bounce buffer for Isolation VM
    - scsi: storvsc: Use blk_mq_unique_tag() to generate requestIDs
    - scsi: storvsc: Add Isolation VM support for storvsc driver
    - net: netvsc: Add Isolation VM support for netvsc driver
    - swiotlb: Add CONFIG_HAS_IOMEM check around swiotlb_mem_remap()
    - Drivers: hv: vmbus: Initialize request offers message for Isolation VM
    - scsi: storvsc: Fix storvsc_queuecommand() memory leak
    - Drivers: hv: balloon: account for vmbus packet header in max_pkt_size
    - Netvsc: Call hv_unmap_memory() in the netvsc_device_remove()
    - scsi: storvsc: Fix validation for unsolicited incoming packets
    - x86/sev: Replace occurrences of sev_active() with cc_platform_has()
    - x86/kvm: Don't waste memory if kvmclock is disabled
    - x86/kvmclock: Fix Hyper-V Isolated VM's boot issue when vCPUs > 64

  [ Ubuntu: 5.13.0-40.45 ]

  * impish/linux: 5.13.0-40.45 -proposed tracker (LP: #1966701)
  * CVE-2022-1016
    - netfilter: nf_tables: initialize registers in nft_do_chain()
  * CVE-2022-1015
    - netfilter: nf_tables: validate registers coming from userspace.
  * audit: improve audit queue handling when "audit=1" on cmdline
    (LP: #1965723) // Impish update: upstream stable patchset 2022-03-22
    (LP: #1966021)
    - audit: improve audit queue handling when "audit=1" on cmdline
  * PS/2 Keyboard wakeup from s2idle not functioning on AMD Yellow Carp platform
    (LP: #1961739)
    - PM: s2idle: ACPI: Fix wakeup interrupts handling
  * Low RX pe...

Changed in linux-azure (Ubuntu Impish):
status: Fix Committed → Fix Released
Tim Gardner (timg-tpi)
Changed in linux-azure (Ubuntu Focal):
status: New → Won't Fix
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers