NAK: ACK/Cmnt: [Pull Request][impish/linux-azure] linux-azure: Update HV support to 5.17
Tim Gardner
tim.gardner at canonical.com
Tue Mar 22 11:26:27 UTC 2022
More extensive testing is showing some issues. There will be changes to
this pull request.
rtg
On 3/22/22 01:57, Stefan Bader wrote:
> On 19.03.22 17:52, Tim Gardner wrote:
>> BugLink: https://bugs.launchpad.net/bugs/1961329
>>
>> Microsoft has requested that these commits updating Hyper-v to 5.17 be
>> included.
>>
>> Test results from a Microsoft engineer:
>> -I tried the March-4 test kernel and it worked great for me:
>> 1. The test kernels can boot up successfully with 256 virtual CPUs.
>> 2. The kernel doesn’t panic any more when I unload the hv_netvsc
>> driver or change the number of vmbus channels for NetVSC NIC.
>> 3. The Hyper-V HeartBeat/TimeSync/ShutDown VMBsus devices also work as
>> expected.
>> 4. I did some quick disk I/O and network tests and found no issue.
>>
>> =======================================================================
>>
>> The following changes since commit
>> 5a5b0390a5d12146fe322590a464b9049072a51b:
>>
>> UBUNTU: Ubuntu-azure-5.13.0-1019.21 (2022-03-15 13:41:18 -0500)
>>
>> are available in the Git repository at:
>>
>> git://git.launchpad.net/~timg-tpi/ubuntu/+source/linux/+git/impish
>> 7cc7422bef9d5121d7a3ebe1ef3c3ee51f258dad
>>
>> for you to fetch changes up to 7cc7422bef9d5121d7a3ebe1ef3c3ee51f258dad:
>>
>> x86/kvmclock: Fix Hyper-V Isolated VM's boot issue when vCPUs > 64
>> (2022-03-19 10:43:28 -0600)
>>
>> ----------------------------------------------------------------
>> Andrea Parri (Microsoft) (2):
>> scsi: storvsc: Use blk_mq_unique_tag() to generate requestIDs
>> scsi: storvsc: Fix validation for unsolicited incoming packets
>>
>> Andres Beltran (1):
>> Drivers: hv: vmbus: Copy packets sent by Hyper-V out of the
>> ring buffer
>>
>> Dexuan Cui (1):
>> x86/kvmclock: Fix Hyper-V Isolated VM's boot issue when vCPUs > 64
>>
>> Juan Vazquez (2):
>> Drivers: hv: vmbus: Initialize request offers message for
>> Isolation VM
>> scsi: storvsc: Fix storvsc_queuecommand() memory leak
>>
>> Tianyu Lan (15):
>> x86/sev: Expose sev_es_ghcb_hv_call() for use by HyperV
>> x86/hyperv: Initialize GHCB page in Isolation VM
>> x86/hyperv: Initialize shared memory boundary in the Isolation VM.
>> x86/hyperv: Add new hvcall guest address host visibility support
>> Drivers: hv: vmbus: Mark vmbus ring buffer visible to host in
>> Isolation VM
>> x86/hyperv: Add Write/Read MSR registers via ghcb page
>> x86/hyperv: Add ghcb hvcall support for SNP VM
>> Drivers: hv: vmbus: Add SNP support for VMbus channel initiate
>> message
>> Drivers: hv: vmbus: Initialize VMbus ring buffer for Isolation VM
>> swiotlb: Add swiotlb bounce buffer remap function for HV IVM
>> x86/hyper-v: Add hyperv Isolation VM check in the
>> cc_platform_has()
>> hyper-v: Enable swiotlb bounce buffer for Isolation VM
>> scsi: storvsc: Add Isolation VM support for storvsc driver
>> net: netvsc: Add Isolation VM support for netvsc driver
>> Netvsc: Call hv_unmap_memory() in the netvsc_device_remove()
>>
>> Tom Lendacky (1):
>> x86/sev: Replace occurrences of sev_active() with
>> cc_platform_has()
>>
>> Vitaly Kuznetsov (2):
>> hv_utils: Set the maximum packet size for VSS driver to the
>> length of the receive buffer
>> Drivers: hv: vmbus: Fix kernel crash upon unbinding a device
>> from uio_hv_generic driver
>>
>> Wanpeng Li (1):
>> x86/kvm: Don't waste memory if kvmclock is disabled
>>
>> Wei Liu (1):
>> swiotlb: Add CONFIG_HAS_IOMEM check around swiotlb_mem_remap()
>>
>> Yanming Liu (1):
>> Drivers: hv: balloon: account for vmbus packet header in
>> max_pkt_size
>>
>> arch/x86/hyperv/Makefile | 2 +-
>> arch/x86/hyperv/hv_init.c | 90
>> +++++++++++++++++++++++++++++++++----------
>> arch/x86/hyperv/ivm.c | 319
>> +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
>>
>> arch/x86/include/asm/hyperv-tlfs.h | 17 ++++++++
>> arch/x86/include/asm/mem_encrypt.h | 2 -
>> arch/x86/include/asm/mshyperv.h | 70
>> ++++++++++++++++++++++++++-------
>> arch/x86/include/asm/sev.h | 6 +++
>> arch/x86/kernel/cc_platform.c | 8 ++++
>> arch/x86/kernel/cpu/mshyperv.c | 18 +++++++++
>> arch/x86/kernel/crash_dump_64.c | 4 +-
>> arch/x86/kernel/kvm.c | 3 +-
>> arch/x86/kernel/kvmclock.c | 7 +++-
>> arch/x86/kernel/machine_kexec_64.c | 8 ++--
>> arch/x86/kernel/sev-shared.c | 25 +++++++-----
>> arch/x86/kernel/sev.c | 13 ++++---
>> arch/x86/kvm/svm/svm.c | 3 +-
>> arch/x86/mm/ioremap.c | 6 +--
>> arch/x86/mm/mem_encrypt.c | 24 +++++-------
>> arch/x86/mm/pat/set_memory.c | 23 ++++++++---
>> arch/x86/platform/efi/efi_64.c | 9 +++--
>> drivers/hv/Kconfig | 1 +
>> drivers/hv/channel.c | 87
>> ++++++++++++++++++++++++++---------------
>> drivers/hv/channel_mgmt.c | 2 +-
>> drivers/hv/connection.c | 101
>> ++++++++++++++++++++++++++++++++++++++++++++----
>> drivers/hv/hv.c | 82
>> +++++++++++++++++++++++++++++++--------
>> drivers/hv/hv_balloon.c | 7 ++++
>> drivers/hv/hv_common.c | 23 +++++++++++
>> drivers/hv/hv_fcopy.c | 1 +
>> drivers/hv/hv_kvp.c | 1 +
>> drivers/hv/hv_snapshot.c | 1 +
>> drivers/hv/hyperv_vmbus.h | 4 +-
>> drivers/hv/ring_buffer.c | 159
>> +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++----------------
>>
>> drivers/hv/vmbus_drv.c | 4 ++
>> drivers/net/hyperv/hyperv_net.h | 17 +++++++-
>> drivers/net/hyperv/netvsc.c | 169
>> +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++-------
>>
>> drivers/net/hyperv/netvsc_drv.c | 1 +
>> drivers/net/hyperv/rndis_filter.c | 6 +++
>> drivers/scsi/storvsc_drv.c | 172
>> ++++++++++++++++++++++++++++++++++++++++++++++++++++++++-------------------------
>>
>> drivers/uio/uio_hv_generic.c | 18 ++++-----
>> include/asm-generic/hyperv-tlfs.h | 1 +
>> include/asm-generic/mshyperv.h | 22 ++++++++++-
>> include/linux/hyperv.h | 79
>> +++++++++++++++++++++++++++++++-------
>> include/linux/swiotlb.h | 6 +++
>> kernel/dma/swiotlb.c | 40 ++++++++++++++++++-
>> net/vmw_vsock/hyperv_transport.c | 4 +-
>> 45 files changed, 1392 insertions(+), 273 deletions(-)
>> create mode 100644 arch/x86/hyperv/ivm.c
>
> Due to size and being for a cloud kernel and supposedly tested:
>
> Acked-by: Stefan Bader <stefan.bader at canonical.com>
>
--
-----------
Tim Gardner
Canonical, Inc
More information about the kernel-team
mailing list