ACK/Cmnt: [Pull Request][impish/linux-azure] linux-azure: Update HV support to 5.17
Stefan Bader
stefan.bader at canonical.com
Tue Mar 22 07:57:39 UTC 2022
On 19.03.22 17:52, Tim Gardner wrote:
> BugLink: https://bugs.launchpad.net/bugs/1961329
>
> Microsoft has requested that these commits updating Hyper-v to 5.17 be included.
>
> Test results from a Microsoft engineer:
> -I tried the March-4 test kernel and it worked great for me:
> 1. The test kernels can boot up successfully with 256 virtual CPUs.
> 2. The kernel doesn’t panic any more when I unload the hv_netvsc driver or
> change the number of vmbus channels for NetVSC NIC.
> 3. The Hyper-V HeartBeat/TimeSync/ShutDown VMBsus devices also work as expected.
> 4. I did some quick disk I/O and network tests and found no issue.
>
> =======================================================================
>
> The following changes since commit 5a5b0390a5d12146fe322590a464b9049072a51b:
>
> UBUNTU: Ubuntu-azure-5.13.0-1019.21 (2022-03-15 13:41:18 -0500)
>
> are available in the Git repository at:
>
> git://git.launchpad.net/~timg-tpi/ubuntu/+source/linux/+git/impish
> 7cc7422bef9d5121d7a3ebe1ef3c3ee51f258dad
>
> for you to fetch changes up to 7cc7422bef9d5121d7a3ebe1ef3c3ee51f258dad:
>
> x86/kvmclock: Fix Hyper-V Isolated VM's boot issue when vCPUs > 64
> (2022-03-19 10:43:28 -0600)
>
> ----------------------------------------------------------------
> Andrea Parri (Microsoft) (2):
> scsi: storvsc: Use blk_mq_unique_tag() to generate requestIDs
> scsi: storvsc: Fix validation for unsolicited incoming packets
>
> Andres Beltran (1):
> Drivers: hv: vmbus: Copy packets sent by Hyper-V out of the ring buffer
>
> Dexuan Cui (1):
> x86/kvmclock: Fix Hyper-V Isolated VM's boot issue when vCPUs > 64
>
> Juan Vazquez (2):
> Drivers: hv: vmbus: Initialize request offers message for Isolation VM
> scsi: storvsc: Fix storvsc_queuecommand() memory leak
>
> Tianyu Lan (15):
> x86/sev: Expose sev_es_ghcb_hv_call() for use by HyperV
> x86/hyperv: Initialize GHCB page in Isolation VM
> x86/hyperv: Initialize shared memory boundary in the Isolation VM.
> x86/hyperv: Add new hvcall guest address host visibility support
> Drivers: hv: vmbus: Mark vmbus ring buffer visible to host in Isolation VM
> x86/hyperv: Add Write/Read MSR registers via ghcb page
> x86/hyperv: Add ghcb hvcall support for SNP VM
> Drivers: hv: vmbus: Add SNP support for VMbus channel initiate message
> Drivers: hv: vmbus: Initialize VMbus ring buffer for Isolation VM
> swiotlb: Add swiotlb bounce buffer remap function for HV IVM
> x86/hyper-v: Add hyperv Isolation VM check in the cc_platform_has()
> hyper-v: Enable swiotlb bounce buffer for Isolation VM
> scsi: storvsc: Add Isolation VM support for storvsc driver
> net: netvsc: Add Isolation VM support for netvsc driver
> Netvsc: Call hv_unmap_memory() in the netvsc_device_remove()
>
> Tom Lendacky (1):
> x86/sev: Replace occurrences of sev_active() with cc_platform_has()
>
> Vitaly Kuznetsov (2):
> hv_utils: Set the maximum packet size for VSS driver to the length of the
> receive buffer
> Drivers: hv: vmbus: Fix kernel crash upon unbinding a device from
> uio_hv_generic driver
>
> Wanpeng Li (1):
> x86/kvm: Don't waste memory if kvmclock is disabled
>
> Wei Liu (1):
> swiotlb: Add CONFIG_HAS_IOMEM check around swiotlb_mem_remap()
>
> Yanming Liu (1):
> Drivers: hv: balloon: account for vmbus packet header in max_pkt_size
>
> arch/x86/hyperv/Makefile | 2 +-
> arch/x86/hyperv/hv_init.c | 90
> +++++++++++++++++++++++++++++++++----------
> arch/x86/hyperv/ivm.c | 319
> +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
>
> arch/x86/include/asm/hyperv-tlfs.h | 17 ++++++++
> arch/x86/include/asm/mem_encrypt.h | 2 -
> arch/x86/include/asm/mshyperv.h | 70 ++++++++++++++++++++++++++-------
> arch/x86/include/asm/sev.h | 6 +++
> arch/x86/kernel/cc_platform.c | 8 ++++
> arch/x86/kernel/cpu/mshyperv.c | 18 +++++++++
> arch/x86/kernel/crash_dump_64.c | 4 +-
> arch/x86/kernel/kvm.c | 3 +-
> arch/x86/kernel/kvmclock.c | 7 +++-
> arch/x86/kernel/machine_kexec_64.c | 8 ++--
> arch/x86/kernel/sev-shared.c | 25 +++++++-----
> arch/x86/kernel/sev.c | 13 ++++---
> arch/x86/kvm/svm/svm.c | 3 +-
> arch/x86/mm/ioremap.c | 6 +--
> arch/x86/mm/mem_encrypt.c | 24 +++++-------
> arch/x86/mm/pat/set_memory.c | 23 ++++++++---
> arch/x86/platform/efi/efi_64.c | 9 +++--
> drivers/hv/Kconfig | 1 +
> drivers/hv/channel.c | 87
> ++++++++++++++++++++++++++---------------
> drivers/hv/channel_mgmt.c | 2 +-
> drivers/hv/connection.c | 101
> ++++++++++++++++++++++++++++++++++++++++++++----
> drivers/hv/hv.c | 82 +++++++++++++++++++++++++++++++--------
> drivers/hv/hv_balloon.c | 7 ++++
> drivers/hv/hv_common.c | 23 +++++++++++
> drivers/hv/hv_fcopy.c | 1 +
> drivers/hv/hv_kvp.c | 1 +
> drivers/hv/hv_snapshot.c | 1 +
> drivers/hv/hyperv_vmbus.h | 4 +-
> drivers/hv/ring_buffer.c | 159
> +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++----------------
> drivers/hv/vmbus_drv.c | 4 ++
> drivers/net/hyperv/hyperv_net.h | 17 +++++++-
> drivers/net/hyperv/netvsc.c | 169
> +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++-------
> drivers/net/hyperv/netvsc_drv.c | 1 +
> drivers/net/hyperv/rndis_filter.c | 6 +++
> drivers/scsi/storvsc_drv.c | 172
> ++++++++++++++++++++++++++++++++++++++++++++++++++++++++-------------------------
> drivers/uio/uio_hv_generic.c | 18 ++++-----
> include/asm-generic/hyperv-tlfs.h | 1 +
> include/asm-generic/mshyperv.h | 22 ++++++++++-
> include/linux/hyperv.h | 79 +++++++++++++++++++++++++++++++-------
> include/linux/swiotlb.h | 6 +++
> kernel/dma/swiotlb.c | 40 ++++++++++++++++++-
> net/vmw_vsock/hyperv_transport.c | 4 +-
> 45 files changed, 1392 insertions(+), 273 deletions(-)
> create mode 100644 arch/x86/hyperv/ivm.c
Due to size and being for a cloud kernel and supposedly tested:
Acked-by: Stefan Bader <stefan.bader at canonical.com>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_signature
Type: application/pgp-signature
Size: 833 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/kernel-team/attachments/20220322/e4d9805b/attachment.sig>
More information about the kernel-team
mailing list