linux-azure: Update HV support to 5.17

Bug #1961329 reported by Tim Gardner
8
This bug affects 1 person
Affects Status Importance Assigned to Milestone
linux-azure (Ubuntu)
Fix Released
Medium
Tim Gardner
Focal
Won't Fix
Undecided
Unassigned
Impish
Fix Released
Medium
Tim Gardner
Jammy
Fix Released
Medium
Tim Gardner

Bug Description

SRU Justification

[Impact]

Microsoft has requested these commits be present in all Azure tuned kernels:

ac0f7d42584125dab8039e60ab4ade48cc2db61c Drivers: hv: copy from message page only what's needed
a276463b7aeb6186e7e4315cccb032773fb31b5d Drivers: hv: allocate the exact needed memory for messages
5cc415001bca8fe0e3f0ee6d58a953a314dd9751 Drivers: hv: avoid passing opaque pointer to vmbus_onmessage()
b0a284dc65b401a508dc2c5ed7d465884220f607 Drivers: hv: make sure that 'struct vmbus_channel_message_header' compiles correctly
52c7803f9bd4b1f0ac6e2e3e6051415198cc06bd Drivers: hv: check VMBus messages lengths
06caa778d8b2fbcb4ac3878751e39d116424ba9b hv_utils: Add validation for untrusted Hyper-V values
e99c4afbee07e9323e9191a20b24d74dbf815bdf Drivers: hv: vmbus: Initialize memory to be sent to the host
fe8c1b18a27de4d6ca5d99b3ffb3125dc69a5b76 Drivers: hv: vmbus: Copy the hv_message in vmbus_on_msg_dpc()
e3fa4b747f085d2cda09bba0533b86fa76038635 Drivers: hv: vmbus: Avoid use-after-free in vmbus_onoffer_rescind()
e4d221b42354b2e2ddb9187a806afb651eee2cda Drivers: hv: vmbus: Resolve race condition in vmbus_onoffer_rescind()
adae1e931acd8b430d31141a283ea06d4b705417 Drivers: hv: vmbus: Copy packets sent by Hyper-V out of the ring buffer
9d68cd9120e4e3af38f843e165631c323b86b4e4 hv_utils: Set the maximum packet size for VSS driver to the length of the receive buffer
f1940d4e9cbe6208e7e77e433c587af108152a17 Drivers: hv: vmbus: Fix kernel crash upon unbinding a device from uio_hv_generic driver
007faec014cb5d26983c1f86fd08c6539b41392e x86/sev: Expose sev_es_ghcb_hv_call() for use by HyperV
0cc4f6d9f0b9f20f3f1e1149bdb6737c0b4e134a x86/hyperv: Initialize GHCB page in Isolation VM
af788f355e343373490b7d2e361016e7c24a0ffa x86/hyperv: Initialize shared memory boundary in the Isolation VM.
810a521265023a1d5c6c081ea2d216bc63d422f5 x86/hyperv: Add new hvcall guest address host visibility support
d4dccf353db80e209f262e3973c834e6e48ba9a9 Drivers: hv: vmbus: Mark vmbus ring buffer visible to host in Isolation VM
faff44069ff538ccdfef187c4d7ec83d22dfb3a4 x86/hyperv: Add Write/Read MSR registers via ghcb page
20c89a559e00dfe352b73e867211a669113ae881 x86/hyperv: Add ghcb hvcall support for SNP VM
f2f136c05fb6093818a3b3fefcba46231ac66a62 Drivers: hv: vmbus: Add SNP support for VMbus channel initiate message
9a8797722e4239242d0cb4cc4baa805df6ac979e Drivers: hv: vmbus: Initialize VMbus ring buffer for Isolation VM
1a5e91d8375fc8369207cc0b9894a324f2bbf1d9 swiotlb: Add swiotlb bounce buffer remap function for HV IVM
c789b90a69045d1924bc0802ae0dce2bba05a04e x86/hyper-v: Add hyperv Isolation VM check in the cc_platform_has()
062a5c4260cdb734a4727230c58e38accf413315 hyper-v: Enable swiotlb bounce buffer for Isolation VM
743b237c3a7b0f5b44aa704aae8a1058877b6322 scsi: storvsc: Add Isolation VM support for storvsc driver
846da38de0e8224f2f94b885125cf1fd2d7b0d39 net: netvsc: Add Isolation VM support for netvsc driver
2deb55d9f57bb7a877c0d77115cc4077e1e974ff swiotlb: Add CONFIG_HAS_IOMEM check around swiotlb_mem_remap()
6a27e396ebb149fc47baccc1957a7a9dd70049a7 Drivers: hv: vmbus: Initialize request offers message for Isolation VM
4eea5332d67d8ae6ba5717ec0f4e671fdbd222e7 scsi: storvsc: Fix storvsc_queuecommand() memory leak
96d9d1fa5cd505078534113308ced0aa56d8da58 Drivers: hv: balloon: account for vmbus packet header in max_pkt_size

[Test Plan]

Microsoft tested

[Where things could go wrong]

Hyper-V guests may not work correctly.

[Other Info]

SF: #00323683

Tim Gardner (timg-tpi)
description: updated
description: updated
Revision history for this message
Tim Gardner (timg-tpi) wrote :
Changed in linux-azure (Ubuntu Impish):
status: New → In Progress
importance: Undecided → Medium
assignee: nobody → Tim Gardner (timg-tpi)
Changed in linux-azure (Ubuntu Jammy):
assignee: nobody → Tim Gardner (timg-tpi)
importance: Undecided → Medium
status: New → Fix Committed
Revision history for this message
Launchpad Janitor (janitor) wrote :
Download full text (74.0 KiB)

This bug was fixed in the package linux-azure - 5.15.0-1002.3

---------------
linux-azure (5.15.0-1002.3) jammy; urgency=medium

  * jammy/linux-azure: 5.15.0-1002.3 -proposed tracker (LP: #1965771)

  * Packaging resync (LP: #1786013)
    - [Packaging] switch dependency from crda to wireless-regdb

  * linux-azure: Update HV support to 5.17 (LP: #1961329)
    - x86/sev: Expose sev_es_ghcb_hv_call() for use by HyperV
    - x86/hyperv: Initialize GHCB page in Isolation VM
    - x86/hyperv: Initialize shared memory boundary in the Isolation VM.
    - x86/hyperv: Add new hvcall guest address host visibility support
    - Drivers: hv: vmbus: Mark vmbus ring buffer visible to host in Isolation VM
    - x86/hyperv: Add Write/Read MSR registers via ghcb page
    - x86/hyperv: Add ghcb hvcall support for SNP VM
    - Drivers: hv: vmbus: Add SNP support for VMbus channel initiate message
    - Drivers: hv: vmbus: Initialize VMbus ring buffer for Isolation VM
    - swiotlb: Add swiotlb bounce buffer remap function for HV IVM
    - x86/hyper-v: Add hyperv Isolation VM check in the cc_platform_has()
    - hyper-v: Enable swiotlb bounce buffer for Isolation VM
    - scsi: storvsc: Add Isolation VM support for storvsc driver
    - net: netvsc: Add Isolation VM support for netvsc driver
    - swiotlb: Add CONFIG_HAS_IOMEM check around swiotlb_mem_remap()
    - Drivers: hv: vmbus: Initialize request offers message for Isolation VM
    - scsi: storvsc: Fix storvsc_queuecommand() memory leak
    - Netvsc: Call hv_unmap_memory() in the netvsc_device_remove()
    - x86/sev: Replace occurrences of sev_active() with cc_platform_has()
    - x86/kvm: Don't waste memory if kvmclock is disabled
    - x86/kvmclock: Fix Hyper-V Isolated VM's boot issue when vCPUs > 64

  * linux-azure: Case VM fails to initialize CX4 VF due to mem fragmentation
    (LP: #1961632)
    - net/mlx5: Reduce flow counters bulk query buffer size for SFs
    - net/mlx5: Fix flow counters SF bulk query len
    - net/mlx5: Dynamically resize flow counters query buffer

  * linux-azure: net: mana: Add handling of CQE_RX_TRUNCATED (LP: #1960322)
    - net: mana: Add handling of CQE_RX_TRUNCATED
    - net: mana: Remove unnecessary check of cqe_type in mana_process_rx_cqe()

  * jammy/linux-azure: CIFS 5.15 backport (LP: #1960671)
    - cifs: add mount parameter tcpnodelay
    - cifs: Create a new shared file holding smb2 pdu definitions
    - cifs: move NEGOTIATE_PROTOCOL definitions out into the common area
    - cifs: Move more definitions into the shared area
    - cifs: Move SMB2_Create definitions to the shared area
    - smb3: add dynamic trace points for socket connection
    - cifs: send workstation name during ntlmssp session setup
    - cifs: fix print of hdr_flags in dfscache_proc_show()
    - cifs: introduce new helper for cifs_reconnect()
    - cifs: convert list_for_each to entry variant
    - cifs: split out dfs code from cifs_reconnect()
    - cifs: for compound requests, use open handle if possible
    - cifs: support nested dfs links over reconnect
    - smb3: remove trivial dfs compile warning
    - smb3: add additional null check in SMB2_ioctl
    - smb3: add additional null che...

Changed in linux-azure (Ubuntu Jammy):
status: Fix Committed → Fix Released
Tim Gardner (timg-tpi)
Changed in linux-azure (Ubuntu Impish):
status: In Progress → Fix Committed
Revision history for this message
Ubuntu Kernel Bot (ubuntu-kernel-bot) wrote :

This bug is awaiting verification that the linux-azure/5.13.0-1022.26 kernel in -proposed solves the problem. Please test the kernel and update this bug with the results. If the problem is solved, change the tag 'verification-needed-impish' to 'verification-done-impish'. If the problem still exists, change the tag 'verification-needed-impish' to 'verification-failed-impish'.

If verification is not done by 5 working days from today, this fix will be dropped from the source code, and this bug will be closed.

See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how to enable and use -proposed. Thank you!

tags: added: verification-needed-impish
Revision history for this message
Tim Gardner (timg-tpi) wrote :

Microsoft tested

tags: added: verification-done-impish
removed: verification-needed-impish
Revision history for this message
Launchpad Janitor (janitor) wrote :
Download full text (55.5 KiB)

This bug was fixed in the package linux-azure - 5.13.0-1022.26

---------------
linux-azure (5.13.0-1022.26) impish; urgency=medium

  * impish/linux-azure: 5.13.0-1022.26 -proposed tracker (LP: #1967347)

  * linux-azure: CONFIG_HIBERNATION=y (LP: #1967336)
    - [Config] Azure: arm64 CONFIG_HIBERNATION=y

  * Azure: not enough RAM under 4GB for CVM (LP: #1967166)
    - SAUCE: azure: Swiotlb: Add swiotlb_alloc_from_low_pages switch
    - SAUCE: x86/hyperv: Make swiotlb bounce buffer allocation not just from low
      pages

  * linux-azure: Update HV support to 5.17 (LP: #1961329)
    - Drivers: hv: vmbus: Copy packets sent by Hyper-V out of the ring buffer
    - hv_utils: Set the maximum packet size for VSS driver to the length of the
      receive buffer
    - Drivers: hv: vmbus: Fix kernel crash upon unbinding a device from
      uio_hv_generic driver
    - x86/sev: Expose sev_es_ghcb_hv_call() for use by HyperV
    - x86/hyperv: Initialize GHCB page in Isolation VM
    - x86/hyperv: Initialize shared memory boundary in the Isolation VM.
    - x86/hyperv: Add new hvcall guest address host visibility support
    - Drivers: hv: vmbus: Mark vmbus ring buffer visible to host in Isolation VM
    - x86/hyperv: Add Write/Read MSR registers via ghcb page
    - x86/hyperv: Add ghcb hvcall support for SNP VM
    - Drivers: hv: vmbus: Add SNP support for VMbus channel initiate message
    - Drivers: hv: vmbus: Initialize VMbus ring buffer for Isolation VM
    - swiotlb: Refactor swiotlb init functions
    - swiotlb: Add swiotlb bounce buffer remap function for HV IVM
    - x86/hyper-v: Add hyperv Isolation VM check in the cc_platform_has()
    - hyper-v: Enable swiotlb bounce buffer for Isolation VM
    - scsi: storvsc: Use blk_mq_unique_tag() to generate requestIDs
    - scsi: storvsc: Add Isolation VM support for storvsc driver
    - net: netvsc: Add Isolation VM support for netvsc driver
    - swiotlb: Add CONFIG_HAS_IOMEM check around swiotlb_mem_remap()
    - Drivers: hv: vmbus: Initialize request offers message for Isolation VM
    - scsi: storvsc: Fix storvsc_queuecommand() memory leak
    - Drivers: hv: balloon: account for vmbus packet header in max_pkt_size
    - Netvsc: Call hv_unmap_memory() in the netvsc_device_remove()
    - scsi: storvsc: Fix validation for unsolicited incoming packets
    - x86/sev: Replace occurrences of sev_active() with cc_platform_has()
    - x86/kvm: Don't waste memory if kvmclock is disabled
    - x86/kvmclock: Fix Hyper-V Isolated VM's boot issue when vCPUs > 64

  [ Ubuntu: 5.13.0-40.45 ]

  * impish/linux: 5.13.0-40.45 -proposed tracker (LP: #1966701)
  * CVE-2022-1016
    - netfilter: nf_tables: initialize registers in nft_do_chain()
  * CVE-2022-1015
    - netfilter: nf_tables: validate registers coming from userspace.
  * audit: improve audit queue handling when "audit=1" on cmdline
    (LP: #1965723) // Impish update: upstream stable patchset 2022-03-22
    (LP: #1966021)
    - audit: improve audit queue handling when "audit=1" on cmdline
  * PS/2 Keyboard wakeup from s2idle not functioning on AMD Yellow Carp platform
    (LP: #1961739)
    - PM: s2idle: ACPI: Fix wakeup interrupts handling
  * Low RX pe...

Changed in linux-azure (Ubuntu Impish):
status: Fix Committed → Fix Released
Tim Gardner (timg-tpi)
Changed in linux-azure (Ubuntu Focal):
status: New → Won't Fix
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.