[Kernel-packages] [Bug 1961329] Re: linux-azure: Update HV support to 5.17

2022-06-10 Thread Tim Gardner
** Changed in: linux-azure (Ubuntu Focal)
   Status: New => Won't Fix

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-azure in Ubuntu.
https://bugs.launchpad.net/bugs/1961329

Title:
  linux-azure: Update HV support to 5.17

Status in linux-azure package in Ubuntu:
  Fix Released
Status in linux-azure source package in Focal:
  Won't Fix
Status in linux-azure source package in Impish:
  Fix Released
Status in linux-azure source package in Jammy:
  Fix Released

Bug description:
  SRU Justification

  [Impact]

  Microsoft has requested these commits be present in all Azure tuned
  kernels:

  ac0f7d42584125dab8039e60ab4ade48cc2db61c Drivers: hv: copy from message page 
only what's needed
  a276463b7aeb6186e7e4315cccb032773fb31b5d Drivers: hv: allocate the exact 
needed memory for messages
  5cc415001bca8fe0e3f0ee6d58a953a314dd9751 Drivers: hv: avoid passing opaque 
pointer to vmbus_onmessage()
  b0a284dc65b401a508dc2c5ed7d465884220f607 Drivers: hv: make sure that 'struct 
vmbus_channel_message_header' compiles correctly
  52c7803f9bd4b1f0ac6e2e3e6051415198cc06bd Drivers: hv: check VMBus messages 
lengths
  06caa778d8b2fbcb4ac3878751e39d116424ba9b hv_utils: Add validation for 
untrusted Hyper-V values
  e99c4afbee07e9323e9191a20b24d74dbf815bdf Drivers: hv: vmbus: Initialize 
memory to be sent to the host
  fe8c1b18a27de4d6ca5d99b3ffb3125dc69a5b76 Drivers: hv: vmbus: Copy the 
hv_message in vmbus_on_msg_dpc()
  e3fa4b747f085d2cda09bba0533b86fa76038635 Drivers: hv: vmbus: Avoid 
use-after-free in vmbus_onoffer_rescind()
  e4d221b42354b2e2ddb9187a806afb651eee2cda Drivers: hv: vmbus: Resolve race 
condition in vmbus_onoffer_rescind()
  adae1e931acd8b430d31141a283ea06d4b705417 Drivers: hv: vmbus: Copy packets 
sent by Hyper-V out of the ring buffer
  9d68cd9120e4e3af38f843e165631c323b86b4e4 hv_utils: Set the maximum packet 
size for VSS driver to the length of the receive buffer
  f1940d4e9cbe6208e7e77e433c587af108152a17 Drivers: hv: vmbus: Fix kernel crash 
upon unbinding a device from uio_hv_generic driver
  007faec014cb5d26983c1f86fd08c6539b41392e x86/sev: Expose 
sev_es_ghcb_hv_call() for use by HyperV
  0cc4f6d9f0b9f20f3f1e1149bdb6737c0b4e134a x86/hyperv: Initialize GHCB page in 
Isolation VM
  af788f355e343373490b7d2e361016e7c24a0ffa x86/hyperv: Initialize shared memory 
boundary in the Isolation VM.
  810a521265023a1d5c6c081ea2d216bc63d422f5 x86/hyperv: Add new hvcall guest 
address host visibility support
  d4dccf353db80e209f262e3973c834e6e48ba9a9 Drivers: hv: vmbus: Mark vmbus ring 
buffer visible to host in Isolation VM
  faff44069ff538ccdfef187c4d7ec83d22dfb3a4 x86/hyperv: Add Write/Read MSR 
registers via ghcb page
  20c89a559e00dfe352b73e867211a669113ae881 x86/hyperv: Add ghcb hvcall support 
for SNP VM
  f2f136c05fb6093818a3b3fefcba46231ac66a62 Drivers: hv: vmbus: Add SNP support 
for VMbus channel initiate message
  9a8797722e4239242d0cb4cc4baa805df6ac979e Drivers: hv: vmbus: Initialize VMbus 
ring buffer for Isolation VM
  1a5e91d8375fc8369207cc0b9894a324f2bbf1d9 swiotlb: Add swiotlb bounce buffer 
remap function for HV IVM
  c789b90a69045d1924bc0802ae0dce2bba05a04e x86/hyper-v: Add hyperv Isolation VM 
check in the cc_platform_has()
  062a5c4260cdb734a4727230c58e38accf413315 hyper-v: Enable swiotlb bounce 
buffer for Isolation VM
  743b237c3a7b0f5b44aa704aae8a1058877b6322 scsi: storvsc: Add Isolation VM 
support for storvsc driver
  846da38de0e8224f2f94b885125cf1fd2d7b0d39 net: netvsc: Add Isolation VM 
support for netvsc driver
  2deb55d9f57bb7a877c0d77115cc4077e1e974ff swiotlb: Add CONFIG_HAS_IOMEM check 
around swiotlb_mem_remap()
  6a27e396ebb149fc47baccc1957a7a9dd70049a7 Drivers: hv: vmbus: Initialize 
request offers message for Isolation VM
  4eea5332d67d8ae6ba5717ec0f4e671fdbd222e7 scsi: storvsc: Fix 
storvsc_queuecommand() memory leak
  96d9d1fa5cd505078534113308ced0aa56d8da58 Drivers: hv: balloon: account for 
vmbus packet header in max_pkt_size

  [Test Plan]

  Microsoft tested

  [Where things could go wrong]

  Hyper-V guests may not work correctly.

  [Other Info]

  SF: #00323683

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-azure/+bug/1961329/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1961329] Re: linux-azure: Update HV support to 5.17

2022-04-19 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-azure - 5.13.0-1022.26

---
linux-azure (5.13.0-1022.26) impish; urgency=medium

  * impish/linux-azure: 5.13.0-1022.26 -proposed tracker (LP: #1967347)

  * linux-azure: CONFIG_HIBERNATION=y (LP: #1967336)
- [Config] Azure: arm64 CONFIG_HIBERNATION=y

  * Azure: not enough RAM under 4GB for CVM (LP: #1967166)
- SAUCE: azure: Swiotlb: Add swiotlb_alloc_from_low_pages switch
- SAUCE: x86/hyperv: Make swiotlb bounce buffer allocation not just from low
  pages

  * linux-azure: Update HV support to 5.17 (LP: #1961329)
- Drivers: hv: vmbus: Copy packets sent by Hyper-V out of the ring buffer
- hv_utils: Set the maximum packet size for VSS driver to the length of the
  receive buffer
- Drivers: hv: vmbus: Fix kernel crash upon unbinding a device from
  uio_hv_generic driver
- x86/sev: Expose sev_es_ghcb_hv_call() for use by HyperV
- x86/hyperv: Initialize GHCB page in Isolation VM
- x86/hyperv: Initialize shared memory boundary in the Isolation VM.
- x86/hyperv: Add new hvcall guest address host visibility support
- Drivers: hv: vmbus: Mark vmbus ring buffer visible to host in Isolation VM
- x86/hyperv: Add Write/Read MSR registers via ghcb page
- x86/hyperv: Add ghcb hvcall support for SNP VM
- Drivers: hv: vmbus: Add SNP support for VMbus channel initiate message
- Drivers: hv: vmbus: Initialize VMbus ring buffer for Isolation VM
- swiotlb: Refactor swiotlb init functions
- swiotlb: Add swiotlb bounce buffer remap function for HV IVM
- x86/hyper-v: Add hyperv Isolation VM check in the cc_platform_has()
- hyper-v: Enable swiotlb bounce buffer for Isolation VM
- scsi: storvsc: Use blk_mq_unique_tag() to generate requestIDs
- scsi: storvsc: Add Isolation VM support for storvsc driver
- net: netvsc: Add Isolation VM support for netvsc driver
- swiotlb: Add CONFIG_HAS_IOMEM check around swiotlb_mem_remap()
- Drivers: hv: vmbus: Initialize request offers message for Isolation VM
- scsi: storvsc: Fix storvsc_queuecommand() memory leak
- Drivers: hv: balloon: account for vmbus packet header in max_pkt_size
- Netvsc: Call hv_unmap_memory() in the netvsc_device_remove()
- scsi: storvsc: Fix validation for unsolicited incoming packets
- x86/sev: Replace occurrences of sev_active() with cc_platform_has()
- x86/kvm: Don't waste memory if kvmclock is disabled
- x86/kvmclock: Fix Hyper-V Isolated VM's boot issue when vCPUs > 64

  [ Ubuntu: 5.13.0-40.45 ]

  * impish/linux: 5.13.0-40.45 -proposed tracker (LP: #1966701)
  * CVE-2022-1016
- netfilter: nf_tables: initialize registers in nft_do_chain()
  * CVE-2022-1015
- netfilter: nf_tables: validate registers coming from userspace.
  * audit: improve audit queue handling when "audit=1" on cmdline
(LP: #1965723) // Impish update: upstream stable patchset 2022-03-22
(LP: #1966021)
- audit: improve audit queue handling when "audit=1" on cmdline
  * PS/2 Keyboard wakeup from s2idle not functioning on AMD Yellow Carp platform
(LP: #1961739)
- PM: s2idle: ACPI: Fix wakeup interrupts handling
  * Low RX performance for 40G Solarflare NICs (LP: #1964512)
- SAUCE: sfc: The size of the RX recycle ring should be more flexible
  * [UBUNTU 20.04] Fix SIGP processing on KVM/s390 (LP: #1962578)
- KVM: s390: Simplify SIGP Set Arch handling
- KVM: s390: Add a routine for setting userspace CPU state
  * Move virtual graphics drivers from linux-modules-extra to linux-modules
(LP: #1960633)
- [Packaging] Move VM DRM drivers into modules
  * Impish update: upstream stable patchset 2022-03-09 (LP: #1964422)
- bnx2x: Utilize firmware 7.13.21.0
- bnx2x: Invalidate fastpath HSI version for VFs
- rcu: Tighten rcu_advance_cbs_nowake() checks
- select: Fix indefinitely sleeping task in poll_schedule_timeout()
- drm/amdgpu: Use correct VIEWPORT_DIMENSION for DCN2
- arm64/bpf: Remove 128MB limit for BPF JIT programs
- Bluetooth: refactor malicious adv data check
- net: sfp: ignore disabled SFP node
- net: stmmac: skip only stmmac_ptp_register when resume from suspend
- s390/hypfs: include z/VM guests with access control group set
- bpf: Guard against accessing NULL pt_regs in bpf_get_task_stack()
- scsi: zfcp: Fix failed recovery on gone remote port with non-NPIV FCP
  devices
- udf: Restore i_lenAlloc when inode expansion fails
- udf: Fix NULL ptr deref when converting from inline format
- efi: runtime: avoid EFIv2 runtime services on Apple x86 machines
- PM: wakeup: simplify the output logic of pm_show_wakelocks()
- tracing/histogram: Fix a potential memory leak for kstrdup()
- tracing: Don't inc err_log entry count if entry allocation fails
- ceph: properly put ceph_string reference after async create attempt
- ceph: set pool_ns in new inode layout for async creates
- fsnotify: fix f

[Kernel-packages] [Bug 1961329] Re: linux-azure: Update HV support to 5.17

2022-04-11 Thread Tim Gardner
Microsoft tested

** Tags removed: verification-needed-impish
** Tags added: verification-done-impish

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-azure in Ubuntu.
https://bugs.launchpad.net/bugs/1961329

Title:
  linux-azure: Update HV support to 5.17

Status in linux-azure package in Ubuntu:
  Fix Released
Status in linux-azure source package in Focal:
  New
Status in linux-azure source package in Impish:
  Fix Committed
Status in linux-azure source package in Jammy:
  Fix Released

Bug description:
  SRU Justification

  [Impact]

  Microsoft has requested these commits be present in all Azure tuned
  kernels:

  ac0f7d42584125dab8039e60ab4ade48cc2db61c Drivers: hv: copy from message page 
only what's needed
  a276463b7aeb6186e7e4315cccb032773fb31b5d Drivers: hv: allocate the exact 
needed memory for messages
  5cc415001bca8fe0e3f0ee6d58a953a314dd9751 Drivers: hv: avoid passing opaque 
pointer to vmbus_onmessage()
  b0a284dc65b401a508dc2c5ed7d465884220f607 Drivers: hv: make sure that 'struct 
vmbus_channel_message_header' compiles correctly
  52c7803f9bd4b1f0ac6e2e3e6051415198cc06bd Drivers: hv: check VMBus messages 
lengths
  06caa778d8b2fbcb4ac3878751e39d116424ba9b hv_utils: Add validation for 
untrusted Hyper-V values
  e99c4afbee07e9323e9191a20b24d74dbf815bdf Drivers: hv: vmbus: Initialize 
memory to be sent to the host
  fe8c1b18a27de4d6ca5d99b3ffb3125dc69a5b76 Drivers: hv: vmbus: Copy the 
hv_message in vmbus_on_msg_dpc()
  e3fa4b747f085d2cda09bba0533b86fa76038635 Drivers: hv: vmbus: Avoid 
use-after-free in vmbus_onoffer_rescind()
  e4d221b42354b2e2ddb9187a806afb651eee2cda Drivers: hv: vmbus: Resolve race 
condition in vmbus_onoffer_rescind()
  adae1e931acd8b430d31141a283ea06d4b705417 Drivers: hv: vmbus: Copy packets 
sent by Hyper-V out of the ring buffer
  9d68cd9120e4e3af38f843e165631c323b86b4e4 hv_utils: Set the maximum packet 
size for VSS driver to the length of the receive buffer
  f1940d4e9cbe6208e7e77e433c587af108152a17 Drivers: hv: vmbus: Fix kernel crash 
upon unbinding a device from uio_hv_generic driver
  007faec014cb5d26983c1f86fd08c6539b41392e x86/sev: Expose 
sev_es_ghcb_hv_call() for use by HyperV
  0cc4f6d9f0b9f20f3f1e1149bdb6737c0b4e134a x86/hyperv: Initialize GHCB page in 
Isolation VM
  af788f355e343373490b7d2e361016e7c24a0ffa x86/hyperv: Initialize shared memory 
boundary in the Isolation VM.
  810a521265023a1d5c6c081ea2d216bc63d422f5 x86/hyperv: Add new hvcall guest 
address host visibility support
  d4dccf353db80e209f262e3973c834e6e48ba9a9 Drivers: hv: vmbus: Mark vmbus ring 
buffer visible to host in Isolation VM
  faff44069ff538ccdfef187c4d7ec83d22dfb3a4 x86/hyperv: Add Write/Read MSR 
registers via ghcb page
  20c89a559e00dfe352b73e867211a669113ae881 x86/hyperv: Add ghcb hvcall support 
for SNP VM
  f2f136c05fb6093818a3b3fefcba46231ac66a62 Drivers: hv: vmbus: Add SNP support 
for VMbus channel initiate message
  9a8797722e4239242d0cb4cc4baa805df6ac979e Drivers: hv: vmbus: Initialize VMbus 
ring buffer for Isolation VM
  1a5e91d8375fc8369207cc0b9894a324f2bbf1d9 swiotlb: Add swiotlb bounce buffer 
remap function for HV IVM
  c789b90a69045d1924bc0802ae0dce2bba05a04e x86/hyper-v: Add hyperv Isolation VM 
check in the cc_platform_has()
  062a5c4260cdb734a4727230c58e38accf413315 hyper-v: Enable swiotlb bounce 
buffer for Isolation VM
  743b237c3a7b0f5b44aa704aae8a1058877b6322 scsi: storvsc: Add Isolation VM 
support for storvsc driver
  846da38de0e8224f2f94b885125cf1fd2d7b0d39 net: netvsc: Add Isolation VM 
support for netvsc driver
  2deb55d9f57bb7a877c0d77115cc4077e1e974ff swiotlb: Add CONFIG_HAS_IOMEM check 
around swiotlb_mem_remap()
  6a27e396ebb149fc47baccc1957a7a9dd70049a7 Drivers: hv: vmbus: Initialize 
request offers message for Isolation VM
  4eea5332d67d8ae6ba5717ec0f4e671fdbd222e7 scsi: storvsc: Fix 
storvsc_queuecommand() memory leak
  96d9d1fa5cd505078534113308ced0aa56d8da58 Drivers: hv: balloon: account for 
vmbus packet header in max_pkt_size

  [Test Plan]

  Microsoft tested

  [Where things could go wrong]

  Hyper-V guests may not work correctly.

  [Other Info]

  SF: #00323683

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-azure/+bug/1961329/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1961329] Re: linux-azure: Update HV support to 5.17

2022-04-06 Thread Ubuntu Kernel Bot
This bug is awaiting verification that the linux-azure/5.13.0-1022.26
kernel in -proposed solves the problem. Please test the kernel and
update this bug with the results. If the problem is solved, change the
tag 'verification-needed-impish' to 'verification-done-impish'. If the
problem still exists, change the tag 'verification-needed-impish' to
'verification-failed-impish'.

If verification is not done by 5 working days from today, this fix will
be dropped from the source code, and this bug will be closed.

See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how
to enable and use -proposed. Thank you!


** Tags added: verification-needed-impish

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-azure in Ubuntu.
https://bugs.launchpad.net/bugs/1961329

Title:
  linux-azure: Update HV support to 5.17

Status in linux-azure package in Ubuntu:
  Fix Released
Status in linux-azure source package in Focal:
  New
Status in linux-azure source package in Impish:
  Fix Committed
Status in linux-azure source package in Jammy:
  Fix Released

Bug description:
  SRU Justification

  [Impact]

  Microsoft has requested these commits be present in all Azure tuned
  kernels:

  ac0f7d42584125dab8039e60ab4ade48cc2db61c Drivers: hv: copy from message page 
only what's needed
  a276463b7aeb6186e7e4315cccb032773fb31b5d Drivers: hv: allocate the exact 
needed memory for messages
  5cc415001bca8fe0e3f0ee6d58a953a314dd9751 Drivers: hv: avoid passing opaque 
pointer to vmbus_onmessage()
  b0a284dc65b401a508dc2c5ed7d465884220f607 Drivers: hv: make sure that 'struct 
vmbus_channel_message_header' compiles correctly
  52c7803f9bd4b1f0ac6e2e3e6051415198cc06bd Drivers: hv: check VMBus messages 
lengths
  06caa778d8b2fbcb4ac3878751e39d116424ba9b hv_utils: Add validation for 
untrusted Hyper-V values
  e99c4afbee07e9323e9191a20b24d74dbf815bdf Drivers: hv: vmbus: Initialize 
memory to be sent to the host
  fe8c1b18a27de4d6ca5d99b3ffb3125dc69a5b76 Drivers: hv: vmbus: Copy the 
hv_message in vmbus_on_msg_dpc()
  e3fa4b747f085d2cda09bba0533b86fa76038635 Drivers: hv: vmbus: Avoid 
use-after-free in vmbus_onoffer_rescind()
  e4d221b42354b2e2ddb9187a806afb651eee2cda Drivers: hv: vmbus: Resolve race 
condition in vmbus_onoffer_rescind()
  adae1e931acd8b430d31141a283ea06d4b705417 Drivers: hv: vmbus: Copy packets 
sent by Hyper-V out of the ring buffer
  9d68cd9120e4e3af38f843e165631c323b86b4e4 hv_utils: Set the maximum packet 
size for VSS driver to the length of the receive buffer
  f1940d4e9cbe6208e7e77e433c587af108152a17 Drivers: hv: vmbus: Fix kernel crash 
upon unbinding a device from uio_hv_generic driver
  007faec014cb5d26983c1f86fd08c6539b41392e x86/sev: Expose 
sev_es_ghcb_hv_call() for use by HyperV
  0cc4f6d9f0b9f20f3f1e1149bdb6737c0b4e134a x86/hyperv: Initialize GHCB page in 
Isolation VM
  af788f355e343373490b7d2e361016e7c24a0ffa x86/hyperv: Initialize shared memory 
boundary in the Isolation VM.
  810a521265023a1d5c6c081ea2d216bc63d422f5 x86/hyperv: Add new hvcall guest 
address host visibility support
  d4dccf353db80e209f262e3973c834e6e48ba9a9 Drivers: hv: vmbus: Mark vmbus ring 
buffer visible to host in Isolation VM
  faff44069ff538ccdfef187c4d7ec83d22dfb3a4 x86/hyperv: Add Write/Read MSR 
registers via ghcb page
  20c89a559e00dfe352b73e867211a669113ae881 x86/hyperv: Add ghcb hvcall support 
for SNP VM
  f2f136c05fb6093818a3b3fefcba46231ac66a62 Drivers: hv: vmbus: Add SNP support 
for VMbus channel initiate message
  9a8797722e4239242d0cb4cc4baa805df6ac979e Drivers: hv: vmbus: Initialize VMbus 
ring buffer for Isolation VM
  1a5e91d8375fc8369207cc0b9894a324f2bbf1d9 swiotlb: Add swiotlb bounce buffer 
remap function for HV IVM
  c789b90a69045d1924bc0802ae0dce2bba05a04e x86/hyper-v: Add hyperv Isolation VM 
check in the cc_platform_has()
  062a5c4260cdb734a4727230c58e38accf413315 hyper-v: Enable swiotlb bounce 
buffer for Isolation VM
  743b237c3a7b0f5b44aa704aae8a1058877b6322 scsi: storvsc: Add Isolation VM 
support for storvsc driver
  846da38de0e8224f2f94b885125cf1fd2d7b0d39 net: netvsc: Add Isolation VM 
support for netvsc driver
  2deb55d9f57bb7a877c0d77115cc4077e1e974ff swiotlb: Add CONFIG_HAS_IOMEM check 
around swiotlb_mem_remap()
  6a27e396ebb149fc47baccc1957a7a9dd70049a7 Drivers: hv: vmbus: Initialize 
request offers message for Isolation VM
  4eea5332d67d8ae6ba5717ec0f4e671fdbd222e7 scsi: storvsc: Fix 
storvsc_queuecommand() memory leak
  96d9d1fa5cd505078534113308ced0aa56d8da58 Drivers: hv: balloon: account for 
vmbus packet header in max_pkt_size

  [Test Plan]

  Microsoft tested

  [Where things could go wrong]

  Hyper-V guests may not work correctly.

  [Other Info]

  SF: #00323683

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-azure/+bug/1961329/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : http

[Kernel-packages] [Bug 1961329] Re: linux-azure: Update HV support to 5.17

2022-04-04 Thread Tim Gardner
** Changed in: linux-azure (Ubuntu Impish)
   Status: In Progress => Fix Committed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-azure in Ubuntu.
https://bugs.launchpad.net/bugs/1961329

Title:
  linux-azure: Update HV support to 5.17

Status in linux-azure package in Ubuntu:
  Fix Released
Status in linux-azure source package in Focal:
  New
Status in linux-azure source package in Impish:
  Fix Committed
Status in linux-azure source package in Jammy:
  Fix Released

Bug description:
  SRU Justification

  [Impact]

  Microsoft has requested these commits be present in all Azure tuned
  kernels:

  ac0f7d42584125dab8039e60ab4ade48cc2db61c Drivers: hv: copy from message page 
only what's needed
  a276463b7aeb6186e7e4315cccb032773fb31b5d Drivers: hv: allocate the exact 
needed memory for messages
  5cc415001bca8fe0e3f0ee6d58a953a314dd9751 Drivers: hv: avoid passing opaque 
pointer to vmbus_onmessage()
  b0a284dc65b401a508dc2c5ed7d465884220f607 Drivers: hv: make sure that 'struct 
vmbus_channel_message_header' compiles correctly
  52c7803f9bd4b1f0ac6e2e3e6051415198cc06bd Drivers: hv: check VMBus messages 
lengths
  06caa778d8b2fbcb4ac3878751e39d116424ba9b hv_utils: Add validation for 
untrusted Hyper-V values
  e99c4afbee07e9323e9191a20b24d74dbf815bdf Drivers: hv: vmbus: Initialize 
memory to be sent to the host
  fe8c1b18a27de4d6ca5d99b3ffb3125dc69a5b76 Drivers: hv: vmbus: Copy the 
hv_message in vmbus_on_msg_dpc()
  e3fa4b747f085d2cda09bba0533b86fa76038635 Drivers: hv: vmbus: Avoid 
use-after-free in vmbus_onoffer_rescind()
  e4d221b42354b2e2ddb9187a806afb651eee2cda Drivers: hv: vmbus: Resolve race 
condition in vmbus_onoffer_rescind()
  adae1e931acd8b430d31141a283ea06d4b705417 Drivers: hv: vmbus: Copy packets 
sent by Hyper-V out of the ring buffer
  9d68cd9120e4e3af38f843e165631c323b86b4e4 hv_utils: Set the maximum packet 
size for VSS driver to the length of the receive buffer
  f1940d4e9cbe6208e7e77e433c587af108152a17 Drivers: hv: vmbus: Fix kernel crash 
upon unbinding a device from uio_hv_generic driver
  007faec014cb5d26983c1f86fd08c6539b41392e x86/sev: Expose 
sev_es_ghcb_hv_call() for use by HyperV
  0cc4f6d9f0b9f20f3f1e1149bdb6737c0b4e134a x86/hyperv: Initialize GHCB page in 
Isolation VM
  af788f355e343373490b7d2e361016e7c24a0ffa x86/hyperv: Initialize shared memory 
boundary in the Isolation VM.
  810a521265023a1d5c6c081ea2d216bc63d422f5 x86/hyperv: Add new hvcall guest 
address host visibility support
  d4dccf353db80e209f262e3973c834e6e48ba9a9 Drivers: hv: vmbus: Mark vmbus ring 
buffer visible to host in Isolation VM
  faff44069ff538ccdfef187c4d7ec83d22dfb3a4 x86/hyperv: Add Write/Read MSR 
registers via ghcb page
  20c89a559e00dfe352b73e867211a669113ae881 x86/hyperv: Add ghcb hvcall support 
for SNP VM
  f2f136c05fb6093818a3b3fefcba46231ac66a62 Drivers: hv: vmbus: Add SNP support 
for VMbus channel initiate message
  9a8797722e4239242d0cb4cc4baa805df6ac979e Drivers: hv: vmbus: Initialize VMbus 
ring buffer for Isolation VM
  1a5e91d8375fc8369207cc0b9894a324f2bbf1d9 swiotlb: Add swiotlb bounce buffer 
remap function for HV IVM
  c789b90a69045d1924bc0802ae0dce2bba05a04e x86/hyper-v: Add hyperv Isolation VM 
check in the cc_platform_has()
  062a5c4260cdb734a4727230c58e38accf413315 hyper-v: Enable swiotlb bounce 
buffer for Isolation VM
  743b237c3a7b0f5b44aa704aae8a1058877b6322 scsi: storvsc: Add Isolation VM 
support for storvsc driver
  846da38de0e8224f2f94b885125cf1fd2d7b0d39 net: netvsc: Add Isolation VM 
support for netvsc driver
  2deb55d9f57bb7a877c0d77115cc4077e1e974ff swiotlb: Add CONFIG_HAS_IOMEM check 
around swiotlb_mem_remap()
  6a27e396ebb149fc47baccc1957a7a9dd70049a7 Drivers: hv: vmbus: Initialize 
request offers message for Isolation VM
  4eea5332d67d8ae6ba5717ec0f4e671fdbd222e7 scsi: storvsc: Fix 
storvsc_queuecommand() memory leak
  96d9d1fa5cd505078534113308ced0aa56d8da58 Drivers: hv: balloon: account for 
vmbus packet header in max_pkt_size

  [Test Plan]

  Microsoft tested

  [Where things could go wrong]

  Hyper-V guests may not work correctly.

  [Other Info]

  SF: #00323683

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-azure/+bug/1961329/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1961329] Re: linux-azure: Update HV support to 5.17

2022-04-01 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-azure - 5.15.0-1002.3

---
linux-azure (5.15.0-1002.3) jammy; urgency=medium

  * jammy/linux-azure: 5.15.0-1002.3 -proposed tracker (LP: #1965771)

  * Packaging resync (LP: #1786013)
- [Packaging] switch dependency from crda to wireless-regdb

  * linux-azure: Update HV support to 5.17 (LP: #1961329)
- x86/sev: Expose sev_es_ghcb_hv_call() for use by HyperV
- x86/hyperv: Initialize GHCB page in Isolation VM
- x86/hyperv: Initialize shared memory boundary in the Isolation VM.
- x86/hyperv: Add new hvcall guest address host visibility support
- Drivers: hv: vmbus: Mark vmbus ring buffer visible to host in Isolation VM
- x86/hyperv: Add Write/Read MSR registers via ghcb page
- x86/hyperv: Add ghcb hvcall support for SNP VM
- Drivers: hv: vmbus: Add SNP support for VMbus channel initiate message
- Drivers: hv: vmbus: Initialize VMbus ring buffer for Isolation VM
- swiotlb: Add swiotlb bounce buffer remap function for HV IVM
- x86/hyper-v: Add hyperv Isolation VM check in the cc_platform_has()
- hyper-v: Enable swiotlb bounce buffer for Isolation VM
- scsi: storvsc: Add Isolation VM support for storvsc driver
- net: netvsc: Add Isolation VM support for netvsc driver
- swiotlb: Add CONFIG_HAS_IOMEM check around swiotlb_mem_remap()
- Drivers: hv: vmbus: Initialize request offers message for Isolation VM
- scsi: storvsc: Fix storvsc_queuecommand() memory leak
- Netvsc: Call hv_unmap_memory() in the netvsc_device_remove()
- x86/sev: Replace occurrences of sev_active() with cc_platform_has()
- x86/kvm: Don't waste memory if kvmclock is disabled
- x86/kvmclock: Fix Hyper-V Isolated VM's boot issue when vCPUs > 64

  * linux-azure: Case VM fails to initialize CX4 VF due to mem fragmentation
(LP: #1961632)
- net/mlx5: Reduce flow counters bulk query buffer size for SFs
- net/mlx5: Fix flow counters SF bulk query len
- net/mlx5: Dynamically resize flow counters query buffer

  * linux-azure: net: mana: Add handling of CQE_RX_TRUNCATED (LP: #1960322)
- net: mana: Add handling of CQE_RX_TRUNCATED
- net: mana: Remove unnecessary check of cqe_type in mana_process_rx_cqe()

  * jammy/linux-azure: CIFS 5.15 backport (LP: #1960671)
- cifs: add mount parameter tcpnodelay
- cifs: Create a new shared file holding smb2 pdu definitions
- cifs: move NEGOTIATE_PROTOCOL definitions out into the common area
- cifs: Move more definitions into the shared area
- cifs: Move SMB2_Create definitions to the shared area
- smb3: add dynamic trace points for socket connection
- cifs: send workstation name during ntlmssp session setup
- cifs: fix print of hdr_flags in dfscache_proc_show()
- cifs: introduce new helper for cifs_reconnect()
- cifs: convert list_for_each to entry variant
- cifs: split out dfs code from cifs_reconnect()
- cifs: for compound requests, use open handle if possible
- cifs: support nested dfs links over reconnect
- smb3: remove trivial dfs compile warning
- smb3: add additional null check in SMB2_ioctl
- smb3: add additional null check in SMB2_open
- smb3: add additional null check in SMB2_tcon
- cifs: release lock earlier in dequeue_mid error case
- smb3: add additional null check in SMB311_posix_mkdir
- cifs: fix potential use-after-free bugs
- smb3: do not setup the fscache_super_cookie until fsinfo initialized
- cifs: do not negotiate session if session already exists
- cifs: connect individual channel servers to primary channel server
- cifs: do not duplicate fscache cookie for secondary channels
- cifs: move debug print out of spinlock
- cifs: protect srv_count with cifs_tcp_ses_lock
- cifs: introduce cifs_ses_mark_for_reconnect() helper
- cifs: populate server_hostname for extra channels
- smb2: clarify rc initialization in smb2_reconnect
- cifs: update internal version number
- cifs: fix missed refcounting of ipc tcon
- cifs: wait for tcon resource_id before getting fscache super
- cifs: add server conn_id to fscache client cookie
- cifs: avoid use of dstaddr as key for fscache client cookie
- cifs: fix ntlmssp auth when there is no key exchange
- cifs: ignore resource_id while getting fscache super cookie
- cifs: remove redundant assignment to pointer p
- cifs: track individual channel status using chans_need_reconnect
- cifs: use the chans_need_reconnect bitmap for reconnect status
- cifs: adjust DebugData to use chans_need_reconnect for conn status
- cifs: add WARN_ON for when chan_count goes below minimum
- cifs: reconnect only the connection and not smb session where possible
- cifs: take cifs_tcp_ses_lock for status checks
- cifs: fix hang on cifs_get_next_mid()
- cifs: maintain a state machine for tcp/smb/tcon sessions
- cifs: avoid race during socket reconnect bet

[Kernel-packages] [Bug 1961329] Re: linux-azure: Update HV support to 5.17

2022-03-19 Thread Tim Gardner
Impish pull request: https://lists.ubuntu.com/archives/kernel-
team/2022-March/128789.html

** Changed in: linux-azure (Ubuntu Impish)
   Status: New => In Progress

** Changed in: linux-azure (Ubuntu Impish)
   Importance: Undecided => Medium

** Changed in: linux-azure (Ubuntu Impish)
 Assignee: (unassigned) => Tim Gardner (timg-tpi)

** Also affects: linux-azure (Ubuntu Jammy)
   Importance: Undecided
   Status: New

** Changed in: linux-azure (Ubuntu Jammy)
   Importance: Undecided => Medium

** Changed in: linux-azure (Ubuntu Jammy)
   Status: New => Fix Committed

** Changed in: linux-azure (Ubuntu Jammy)
 Assignee: (unassigned) => Tim Gardner (timg-tpi)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-azure in Ubuntu.
https://bugs.launchpad.net/bugs/1961329

Title:
  linux-azure: Update HV support to 5.17

Status in linux-azure package in Ubuntu:
  Fix Committed
Status in linux-azure source package in Focal:
  New
Status in linux-azure source package in Impish:
  In Progress
Status in linux-azure source package in Jammy:
  Fix Committed

Bug description:
  SRU Justification

  [Impact]

  Microsoft has requested these commits be present in all Azure tuned
  kernels:

  ac0f7d42584125dab8039e60ab4ade48cc2db61c Drivers: hv: copy from message page 
only what's needed
  a276463b7aeb6186e7e4315cccb032773fb31b5d Drivers: hv: allocate the exact 
needed memory for messages
  5cc415001bca8fe0e3f0ee6d58a953a314dd9751 Drivers: hv: avoid passing opaque 
pointer to vmbus_onmessage()
  b0a284dc65b401a508dc2c5ed7d465884220f607 Drivers: hv: make sure that 'struct 
vmbus_channel_message_header' compiles correctly
  52c7803f9bd4b1f0ac6e2e3e6051415198cc06bd Drivers: hv: check VMBus messages 
lengths
  06caa778d8b2fbcb4ac3878751e39d116424ba9b hv_utils: Add validation for 
untrusted Hyper-V values
  e99c4afbee07e9323e9191a20b24d74dbf815bdf Drivers: hv: vmbus: Initialize 
memory to be sent to the host
  fe8c1b18a27de4d6ca5d99b3ffb3125dc69a5b76 Drivers: hv: vmbus: Copy the 
hv_message in vmbus_on_msg_dpc()
  e3fa4b747f085d2cda09bba0533b86fa76038635 Drivers: hv: vmbus: Avoid 
use-after-free in vmbus_onoffer_rescind()
  e4d221b42354b2e2ddb9187a806afb651eee2cda Drivers: hv: vmbus: Resolve race 
condition in vmbus_onoffer_rescind()
  adae1e931acd8b430d31141a283ea06d4b705417 Drivers: hv: vmbus: Copy packets 
sent by Hyper-V out of the ring buffer
  9d68cd9120e4e3af38f843e165631c323b86b4e4 hv_utils: Set the maximum packet 
size for VSS driver to the length of the receive buffer
  f1940d4e9cbe6208e7e77e433c587af108152a17 Drivers: hv: vmbus: Fix kernel crash 
upon unbinding a device from uio_hv_generic driver
  007faec014cb5d26983c1f86fd08c6539b41392e x86/sev: Expose 
sev_es_ghcb_hv_call() for use by HyperV
  0cc4f6d9f0b9f20f3f1e1149bdb6737c0b4e134a x86/hyperv: Initialize GHCB page in 
Isolation VM
  af788f355e343373490b7d2e361016e7c24a0ffa x86/hyperv: Initialize shared memory 
boundary in the Isolation VM.
  810a521265023a1d5c6c081ea2d216bc63d422f5 x86/hyperv: Add new hvcall guest 
address host visibility support
  d4dccf353db80e209f262e3973c834e6e48ba9a9 Drivers: hv: vmbus: Mark vmbus ring 
buffer visible to host in Isolation VM
  faff44069ff538ccdfef187c4d7ec83d22dfb3a4 x86/hyperv: Add Write/Read MSR 
registers via ghcb page
  20c89a559e00dfe352b73e867211a669113ae881 x86/hyperv: Add ghcb hvcall support 
for SNP VM
  f2f136c05fb6093818a3b3fefcba46231ac66a62 Drivers: hv: vmbus: Add SNP support 
for VMbus channel initiate message
  9a8797722e4239242d0cb4cc4baa805df6ac979e Drivers: hv: vmbus: Initialize VMbus 
ring buffer for Isolation VM
  1a5e91d8375fc8369207cc0b9894a324f2bbf1d9 swiotlb: Add swiotlb bounce buffer 
remap function for HV IVM
  c789b90a69045d1924bc0802ae0dce2bba05a04e x86/hyper-v: Add hyperv Isolation VM 
check in the cc_platform_has()
  062a5c4260cdb734a4727230c58e38accf413315 hyper-v: Enable swiotlb bounce 
buffer for Isolation VM
  743b237c3a7b0f5b44aa704aae8a1058877b6322 scsi: storvsc: Add Isolation VM 
support for storvsc driver
  846da38de0e8224f2f94b885125cf1fd2d7b0d39 net: netvsc: Add Isolation VM 
support for netvsc driver
  2deb55d9f57bb7a877c0d77115cc4077e1e974ff swiotlb: Add CONFIG_HAS_IOMEM check 
around swiotlb_mem_remap()
  6a27e396ebb149fc47baccc1957a7a9dd70049a7 Drivers: hv: vmbus: Initialize 
request offers message for Isolation VM
  4eea5332d67d8ae6ba5717ec0f4e671fdbd222e7 scsi: storvsc: Fix 
storvsc_queuecommand() memory leak
  96d9d1fa5cd505078534113308ced0aa56d8da58 Drivers: hv: balloon: account for 
vmbus packet header in max_pkt_size

  [Test Plan]

  Microsoft tested

  [Where things could go wrong]

  Hyper-V guests may not work correctly.

  [Other Info]

  SF: #00323683

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-azure/+bug/1961329/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net

[Kernel-packages] [Bug 1961329] Re: linux-azure: Update HV support to 5.17

2022-03-19 Thread Tim Gardner
** Also affects: linux-azure (Ubuntu Impish)
   Importance: Undecided
   Status: New

** Also affects: linux-azure (Ubuntu Focal)
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-azure in Ubuntu.
https://bugs.launchpad.net/bugs/1961329

Title:
  linux-azure: Update HV support to 5.17

Status in linux-azure package in Ubuntu:
  New
Status in linux-azure source package in Focal:
  New
Status in linux-azure source package in Impish:
  New

Bug description:
  SRU Justification

  [Impact]

  Microsoft has requested these commits be present in all Azure tuned
  kernels:

  ac0f7d42584125dab8039e60ab4ade48cc2db61c Drivers: hv: copy from message page 
only what's needed
  a276463b7aeb6186e7e4315cccb032773fb31b5d Drivers: hv: allocate the exact 
needed memory for messages
  5cc415001bca8fe0e3f0ee6d58a953a314dd9751 Drivers: hv: avoid passing opaque 
pointer to vmbus_onmessage()
  b0a284dc65b401a508dc2c5ed7d465884220f607 Drivers: hv: make sure that 'struct 
vmbus_channel_message_header' compiles correctly
  52c7803f9bd4b1f0ac6e2e3e6051415198cc06bd Drivers: hv: check VMBus messages 
lengths
  06caa778d8b2fbcb4ac3878751e39d116424ba9b hv_utils: Add validation for 
untrusted Hyper-V values
  e99c4afbee07e9323e9191a20b24d74dbf815bdf Drivers: hv: vmbus: Initialize 
memory to be sent to the host
  fe8c1b18a27de4d6ca5d99b3ffb3125dc69a5b76 Drivers: hv: vmbus: Copy the 
hv_message in vmbus_on_msg_dpc()
  e3fa4b747f085d2cda09bba0533b86fa76038635 Drivers: hv: vmbus: Avoid 
use-after-free in vmbus_onoffer_rescind()
  e4d221b42354b2e2ddb9187a806afb651eee2cda Drivers: hv: vmbus: Resolve race 
condition in vmbus_onoffer_rescind()
  adae1e931acd8b430d31141a283ea06d4b705417 Drivers: hv: vmbus: Copy packets 
sent by Hyper-V out of the ring buffer
  9d68cd9120e4e3af38f843e165631c323b86b4e4 hv_utils: Set the maximum packet 
size for VSS driver to the length of the receive buffer
  f1940d4e9cbe6208e7e77e433c587af108152a17 Drivers: hv: vmbus: Fix kernel crash 
upon unbinding a device from uio_hv_generic driver
  007faec014cb5d26983c1f86fd08c6539b41392e x86/sev: Expose 
sev_es_ghcb_hv_call() for use by HyperV
  0cc4f6d9f0b9f20f3f1e1149bdb6737c0b4e134a x86/hyperv: Initialize GHCB page in 
Isolation VM
  af788f355e343373490b7d2e361016e7c24a0ffa x86/hyperv: Initialize shared memory 
boundary in the Isolation VM.
  810a521265023a1d5c6c081ea2d216bc63d422f5 x86/hyperv: Add new hvcall guest 
address host visibility support
  d4dccf353db80e209f262e3973c834e6e48ba9a9 Drivers: hv: vmbus: Mark vmbus ring 
buffer visible to host in Isolation VM
  faff44069ff538ccdfef187c4d7ec83d22dfb3a4 x86/hyperv: Add Write/Read MSR 
registers via ghcb page
  20c89a559e00dfe352b73e867211a669113ae881 x86/hyperv: Add ghcb hvcall support 
for SNP VM
  f2f136c05fb6093818a3b3fefcba46231ac66a62 Drivers: hv: vmbus: Add SNP support 
for VMbus channel initiate message
  9a8797722e4239242d0cb4cc4baa805df6ac979e Drivers: hv: vmbus: Initialize VMbus 
ring buffer for Isolation VM
  1a5e91d8375fc8369207cc0b9894a324f2bbf1d9 swiotlb: Add swiotlb bounce buffer 
remap function for HV IVM
  c789b90a69045d1924bc0802ae0dce2bba05a04e x86/hyper-v: Add hyperv Isolation VM 
check in the cc_platform_has()
  062a5c4260cdb734a4727230c58e38accf413315 hyper-v: Enable swiotlb bounce 
buffer for Isolation VM
  743b237c3a7b0f5b44aa704aae8a1058877b6322 scsi: storvsc: Add Isolation VM 
support for storvsc driver
  846da38de0e8224f2f94b885125cf1fd2d7b0d39 net: netvsc: Add Isolation VM 
support for netvsc driver
  2deb55d9f57bb7a877c0d77115cc4077e1e974ff swiotlb: Add CONFIG_HAS_IOMEM check 
around swiotlb_mem_remap()
  6a27e396ebb149fc47baccc1957a7a9dd70049a7 Drivers: hv: vmbus: Initialize 
request offers message for Isolation VM
  4eea5332d67d8ae6ba5717ec0f4e671fdbd222e7 scsi: storvsc: Fix 
storvsc_queuecommand() memory leak
  96d9d1fa5cd505078534113308ced0aa56d8da58 Drivers: hv: balloon: account for 
vmbus packet header in max_pkt_size

  [Test Plan]

  Microsoft tested

  [Where things could go wrong]

  Hyper-V guests may not work correctly.

  [Other Info]

  SF: #00323683

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-azure/+bug/1961329/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp