lp:~mhcerri/ubuntu/+source/linux/+git/azure

Owned by Marcelo Cerri
Get this repository:
git clone https://git.launchpad.net/~mhcerri/ubuntu/+source/linux/+git/azure
Only Marcelo Cerri can upload to this repository. If you are Marcelo Cerri please log in for upload directions.

Branches

Name Last Modified Last Commit
lp1731994_lp1729412_4.13_update 2017-11-20 20:31:41 UTC 2017-11-20
x86/hyperv: Fix hypercalls with extended CPU ranges for TLB flushing

Author: Marcelo Cerri
Author Date: 2017-10-05 13:34:29 UTC

x86/hyperv: Fix hypercalls with extended CPU ranges for TLB flushing

BugLink: http://bugs.launchpad.net/bugs/1729412

Do not consider the fixed size of hv_vp_set when passing the variable
header size to hv_do_rep_hypercall().

The Hyper-V hypervisor specification states that for a hypercall with a
variable header only the size of the variable portion should be supplied
via the input control.

For HVCALL_FLUSH_VIRTUAL_ADDRESS_SPACE_EX/LIST_EX calls that means the
fixed portion of hv_vp_set should not be considered.

That fixes random failures of some applications that are unexpectedly
killed with SIGBUS or SIGSEGV.

Signed-off-by: Marcelo Henrique Cerri <marcelo.cerri@canonical.com>
Cc: Dexuan Cui <decui@microsoft.com>
Cc: Haiyang Zhang <haiyangz@microsoft.com>
Cc: Jork Loeser <Jork.Loeser@microsoft.com>
Cc: Josh Poulson <jopoulso@microsoft.com>
Cc: K. Y. Srinivasan <kys@microsoft.com>
Cc: Linus Torvalds <torvalds@linux-foundation.org>
Cc: Peter Zijlstra <peterz@infradead.org>
Cc: Simon Xiao <sixiao@microsoft.com>
Cc: Stephen Hemminger <sthemmin@microsoft.com>
Cc: Thomas Gleixner <tglx@linutronix.de>
Cc: Vitaly Kuznetsov <vkuznets@redhat.com>
Cc: devel@linuxdriverproject.org
Fixes: 628f54cc6451 ("x86/hyper-v: Support extended CPU ranges for TLB flush hypercalls")
Link: http://lkml.kernel.org/r/1507210469-29065-1-git-send-email-marcelo.cerri@canonical.com
Signed-off-by: Ingo Molnar <mingo@kernel.org>
(cherry picked from commit ab7ff471aa5db670197070760f022622793da7e5)
Signed-off-by: Marcelo Henrique Cerri <marcelo.cerri@canonical.com>

lp1707285-update-linux-azure 2017-08-01 19:14:29 UTC 2017-08-01
UBUNTU: SAUCE: hv-sock: avoid double FINs if shutdown() is called

Author: Dexuan Cui
Author Date: 2017-07-07 01:15:29 UTC

UBUNTU: SAUCE: hv-sock: avoid double FINs if shutdown() is called

BugLink: http://bugs.launchpad.net/bugs/1707285

The host only expects a single FIN.

Signed-off-by: Dexuan Cui <decui@microsoft.com>
Signed-off-by: Marcelo Henrique Cerri <marcelo.cerri@canonical.com>

master-next 2017-07-28 19:30:25 UTC 2017-07-28
UBUNTU: Start new release

Author: Marcelo Cerri
Author Date: 2017-07-28 19:30:25 UTC

UBUNTU: Start new release

Ignore: yes
Signed-off-by: Marcelo Henrique Cerri <marcelo.cerri@canonical.com>

lp1698367-rebase-to-4.11 2017-06-16 13:17:41 UTC 2017-06-16
UBUNTU: [Config] CONFIG_LOCK_DOWN_KERNEL=y

Author: Marcelo Cerri
Author Date: 2017-06-09 20:11:05 UTC

UBUNTU: [Config] CONFIG_LOCK_DOWN_KERNEL=y

BugLink: http://bugs.launchpad.net/bugs/1698367

Signed-off-by: Marcelo Henrique Cerri <marcelo.cerri@canonical.com>

lp1690177-hyperv-backport_v2 2017-05-22 13:02:52 UTC 2017-05-22
netvsc: Deal with rescinded channels correctly

Author: K Y Srinivasan
Author Date: 2017-04-19 20:53:49 UTC

netvsc: Deal with rescinded channels correctly

BugLink: https://bugs.launchpad.net/bugs/1690177

We will not be able to send packets over a channel that has been
rescinded. Make necessary adjustments so we can properly cleanup
even when the channel is rescinded. This issue can be trigerred
in the NIC hot-remove path.

Signed-off-by: K. Y. Srinivasan <kys@microsoft.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
(cherry picked from commit 73e64fa4f417b22d8d5521999a631ced8e2d442e)
Signed-off-by: Marcelo Henrique Cerri <marcelo.cerri@canonical.com>

lp1690177-hyperv-backport 2017-05-18 20:40:01 UTC 2017-05-18
netvsc: Deal with rescinded channels correctly

Author: K Y Srinivasan
Author Date: 2017-04-19 20:53:49 UTC

netvsc: Deal with rescinded channels correctly

BugLink: https://bugs.launchpad.net/bugs/1690177

We will not be able to send packets over a channel that has been
rescinded. Make necessary adjustments so we can properly cleanup
even when the channel is rescinded. This issue can be trigerred
in the NIC hot-remove path.

Signed-off-by: K. Y. Srinivasan <kys@microsoft.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
(cherry picked from commit 73e64fa4f417b22d8d5521999a631ced8e2d442e)
Signed-off-by: Marcelo Henrique Cerri <marcelo.cerri@canonical.com>

lp1670508 2017-03-15 19:18:10 UTC 2017-03-15
CIFS: Fix possible use after free in demultiplex thread

Author: Pavel Shilovsky
Author Date: 2017-03-01 00:05:19 UTC

CIFS: Fix possible use after free in demultiplex thread

BugLink: https://bugs.launchpad.net/bugs/1670508

The recent changes that added SMB3 encryption support introduced
a possible use after free in the demultiplex thread. When we
process an encrypted packed we obtain a pointer to SMB session
but do not obtain a reference. This can possibly lead to a situation
when this session was freed before we copy a decryption key from
there. Fix this by obtaining a copy of the key rather than a pointer
to the session under a spinlock.

Signed-off-by: Pavel Shilovsky <pshilov@microsoft.com>
Signed-off-by: Steve French <smfrench@gmail.com>
(cherry picked from commit 61cfac6f267dabcf2740a7ec8a0295833b28b5f5)
Signed-off-by: Marcelo Henrique Cerri <marcelo.cerri@canonical.com>

configs 2017-03-08 14:59:16 UTC 2017-03-08
UBUNTU: [config] azure: disable CONFIG_LIBFC

Author: Marcelo Cerri
Author Date: 2017-03-08 14:59:16 UTC

UBUNTU: [config] azure: disable CONFIG_LIBFC

Signed-off-by: Marcelo Henrique Cerri <marcelo.cerri@canonical.com>

master 2017-02-27 20:34:33 UTC 2017-02-27
UBUNTU: Ubuntu-4.10.0-1001.1

Author: Brad Figg
Author Date: 2017-02-27 20:34:33 UTC

UBUNTU: Ubuntu-4.10.0-1001.1

Signed-off-by: Brad Figg <brad.figg@canonical.com>

19 of 9 results
This repository contains Public information 
Everyone can see this information.

Subscribers