~kerneltoast/ubuntu/+source/linux/+git/bionic:lp1882268

Last commit made on 2020-07-23
Get this branch:
git clone -b lp1882268 https://git.launchpad.net/~kerneltoast/ubuntu/+source/linux/+git/bionic
Only Sultan Alsawaf can upload to this branch. If you are Sultan Alsawaf please log in for upload directions.

Branch merges

Branch information

Recent commits

8faa91b... by Pavel Shilovsky

CIFS: Only send SMB2_NEGOTIATE command on new TCP connections

BugLink: https://bugs.launchpad.net/bugs/1882268

Do not allow commands other than SMB2_NEGOTIATE to be sent over
recently established TCP connections. Return -EAGAIN to let upper
layers handle it properly.

Signed-off-by: Pavel Shilovsky <email address hidden>
Signed-off-by: Steve French <email address hidden>
(backported from commit 2084ed57167c3e39f99ac2bb19f19e85321d2169)
Signed-off-by: Sultan Alsawaf <email address hidden>

e8f7dd7... by "Paulo Alcantara (SUSE)" <email address hidden>

cifs: Fix potential softlockups while refreshing DFS cache

BugLink: https://bugs.launchpad.net/bugs/1882268

We used to skip reconnects on all SMB2_IOCTL commands due to SMB3+
FSCTL_VALIDATE_NEGOTIATE_INFO - which made sense since we're still
establishing a SMB session.

However, when refresh_cache_worker() calls smb2_get_dfs_refer() and
we're under reconnect, SMB2_ioctl() will not be able to get a proper
status error (e.g. -EHOSTDOWN in case we failed to reconnect) but an
-EAGAIN from cifs_send_recv() thus looping forever in
refresh_cache_worker().

Fixes: e99c63e4d86d ("SMB3: Fix deadlock in validate negotiate hits reconnect")
Signed-off-by: Paulo Alcantara (SUSE) <email address hidden>
Suggested-by: Aurelien Aptel <email address hidden>
Reviewed-by: Aurelien Aptel <email address hidden>
Signed-off-by: Steve French <email address hidden>
(backported from commit 84a1f5b1cc6fd7f6cd99fc5630c36f631b19fa60)
Signed-off-by: Sultan Alsawaf <email address hidden>

318ec3d... by Sultan Alsawaf

UBUNTU: Ubuntu-azure-4.15-4.15.0-1092.102

Signed-off-by: Sultan Alsawaf <email address hidden>

8e3eee2... by Sultan Alsawaf

UBUNTU: link-to-tracker: update tracking bug

BugLink: https://bugs.launchpad.net/bugs/1885800
Properties: no-test-build
Signed-off-by: Sultan Alsawaf <email address hidden>

7c58acc... by Sultan Alsawaf

UBUNTU: Start new release

Ignore: yes
Signed-off-by: Sultan Alsawaf <email address hidden>

fc42560... by Sultan Alsawaf

UBUNTU: [Config] azure-4.15: wireguard -- enable on all architectures

BugLink: https://bugs.launchpad.net/bugs/1861284

Enable the DKMS build of wireguard on all architectures and all
derivatives/backports.

Signed-off-by: Sultan Alsawaf <email address hidden>

b6bd901... by Tianyu Lan <email address hidden>

x86/Hyper-V: Report crash data in die() when panic_on_oops is set

BugLink: http://bugs.launchpad.net/bugs/1875456

When oops happens with panic_on_oops unset, the oops
thread is killed by die() and system continues to run.
In such case, guest should not report crash register
data to host since system still runs. Check panic_on_oops
and return directly in hyperv_report_panic() when the function
is called in the die() and panic_on_oops is unset. Fix it.

Fixes: 7ed4325a44ea ("Drivers: hv: vmbus: Make panic reporting to be more useful")
Signed-off-by: Tianyu Lan <email address hidden>
Reviewed-by: Michael Kelley <email address hidden>
Link: https://<email address hidden>
Signed-off-by: Wei Liu <email address hidden>
(backported from commit f3a99e761efa616028b255b4de58e9b5b87c5545)
[mc: small context adjustment and mshyperv.h on different location]
Signed-off-by: Marcelo Henrique Cerri <email address hidden>
Acked-by: Stefan Bader <email address hidden>
Acked-by: Colin Ian King <email address hidden>
Signed-off-by: Khalid Elmously <email address hidden>

00997bf... by Tianyu Lan <email address hidden>

x86/Hyper-V: Report crash register data when sysctl_record_panic_msg is not set

BugLink: http://bugs.launchpad.net/bugs/1875456

When sysctl_record_panic_msg is not set, the panic will
not be reported to Hyper-V via hyperv_report_panic_msg().
So the crash should be reported via hyperv_report_panic().

Fixes: 81b18bce48af ("Drivers: HV: Send one page worth of kmsg dump over Hyper-V during panic")
Reviewed-by: Michael Kelley <email address hidden>
Signed-off-by: Tianyu Lan <email address hidden>
Link: https://<email address hidden>
Signed-off-by: Wei Liu <email address hidden>
(cherry picked from commit 040026df7088c56ccbad28f7042308f67bde63df)
Signed-off-by: Marcelo Henrique Cerri <email address hidden>
Acked-by: Stefan Bader <email address hidden>
Acked-by: Colin Ian King <email address hidden>
Signed-off-by: Khalid Elmously <email address hidden>

bec0466... by Tianyu Lan <email address hidden>

x86/Hyper-V: Report crash register data or kmsg before running crash kernel

BugLink: http://bugs.launchpad.net/bugs/1875456

We want to notify Hyper-V when a Linux guest VM crash occurs, so
there is a record of the crash even when kdump is enabled. But
crash_kexec_post_notifiers defaults to "false", so the kdump kernel
runs before the notifiers and Hyper-V never gets notified. Fix this by
always setting crash_kexec_post_notifiers to be true for Hyper-V VMs.

Fixes: 81b18bce48af ("Drivers: HV: Send one page worth of kmsg dump over Hyper-V during panic")
Reviewed-by: Michael Kelley <email address hidden>
Signed-off-by: Tianyu Lan <email address hidden>
Link: https://<email address hidden>
Signed-off-by: Wei Liu <email address hidden>
(backported from commit a11589563e96bf262767294b89b25a9d44e7303b)
[mc: fixed context]
Signed-off-by: Marcelo Henrique Cerri <email address hidden>
Acked-by: Stefan Bader <email address hidden>
Acked-by: Colin Ian King <email address hidden>
Signed-off-by: Khalid Elmously <email address hidden>

e3833ef... by Tianyu Lan <email address hidden>

x86/Hyper-V: Trigger crash enlightenment only once during system crash.

BugLink: http://bugs.launchpad.net/bugs/1875456

When a guest VM panics, Hyper-V should be notified only once via the
crash synthetic MSRs. Current Linux code might write these crash MSRs
twice during a system panic:
1) hyperv_panic/die_event() calling hyperv_report_panic()
2) hv_kmsg_dump() calling hyperv_report_panic_msg()

Fix this by not calling hyperv_report_panic() if a kmsg dump has been
successfully registered. The notification will happen later via
hyperv_report_panic_msg().

Fixes: 7ed4325a44ea ("Drivers: hv: vmbus: Make panic reporting to be more useful")
Reviewed-by: Michael Kelley <email address hidden>
Signed-off-by: Tianyu Lan <email address hidden>
Link: https://<email address hidden>
Signed-off-by: Wei Liu <email address hidden>
(cherry picked from commit 73f26e526f19afb3a06b76b970a76bcac2cafd05)
Signed-off-by: Marcelo Henrique Cerri <email address hidden>
Acked-by: Stefan Bader <email address hidden>
Acked-by: Colin Ian King <email address hidden>
Signed-off-by: Khalid Elmously <email address hidden>