~timg-tpi/ubuntu/+source/linux/+git/focal:focal-azure-5.4-hv-arm64-sf00310705

Last commit made on 2022-02-15
Get this branch:
git clone -b focal-azure-5.4-hv-arm64-sf00310705 https://git.launchpad.net/~timg-tpi/ubuntu/+source/linux/+git/focal
Only Tim Gardner can upload to this branch. If you are Tim Gardner please log in for upload directions.

Branch merges

Branch information

Name:
focal-azure-5.4-hv-arm64-sf00310705
Repository:
lp:~timg-tpi/ubuntu/+source/linux/+git/focal

Recent commits

65b51fc... by Lijun Pan <email address hidden>

use __netdev_notify_peers in hyperv

Start to use the lockless version of netdev_notify_peers.
Call the helper where notify variable used to be set true.
Remove the notify bool variable and sort the variables
in reverse Christmas tree order.

Cc: Haiyang Zhang <email address hidden>
Signed-off-by: Lijun Pan <email address hidden>
Signed-off-by: Jakub Kicinski <email address hidden>
(cherry picked from commit 935d8a0a43e3f928e3243ae22bc53cd7a014d515)
Signed-off-by: Tim Gardner <email address hidden>

5385aae... by Lijun Pan <email address hidden>

net: core: introduce __netdev_notify_peers

There are some use cases for netdev_notify_peers in the context
when rtnl lock is already held. Introduce lockless version
of netdev_notify_peers call to save the extra code to call
 call_netdevice_notifiers(NETDEV_NOTIFY_PEERS, dev);
 call_netdevice_notifiers(NETDEV_RESEND_IGMP, dev);
After that, convert netdev_notify_peers to call the new helper.

Suggested-by: Nathan Lynch <email address hidden>
Signed-off-by: Lijun Pan <email address hidden>
Signed-off-by: Jakub Kicinski <email address hidden>
(cherry picked from commit 7061eb8cfa902daa1ec71d23b5cddb8b4391e72b)
Signed-off-by: Tim Gardner <email address hidden>

ae2df83... by Stefan Eschenbacher <email address hidden>

drivers/hv: remove obsolete TODO and fix misleading typo in comment

Removes an obsolete TODO in the VMBus module and fixes a misleading typo
in the comment for the macro MAX_NUM_CHANNELS, where two digits have been
twisted.

Signed-off-by: Stefan Eschenbacher <email address hidden>
Co-developed-by: Max Stolze <email address hidden>
Signed-off-by: Max Stolze <email address hidden>
Link: https://<email address hidden>
Signed-off-by: Wei Liu <email address hidden>
(cherry picked from commit 5c641fee4ccfd27520b7863bf4a66491faea6d2a)
Signed-off-by: Tim Gardner <email address hidden>

8fc4eb2... by Andrea Parri

hv_netvsc: Validate number of allocated sub-channels

Lack of validation could lead to out-of-bound reads and information
leaks (cf. usage of nvdev->chan_table[]). Check that the number of
allocated sub-channels fits into the expected range.

Suggested-by: Saruhan Karademir <email address hidden>
Signed-off-by: Andrea Parri (Microsoft) <email address hidden>
Reviewed-by: Haiyang Zhang <email address hidden>
Acked-by: Jakub Kicinski <email address hidden>
Cc: "David S. Miller" <email address hidden>
Cc: Jakub Kicinski <email address hidden>
Cc: <email address hidden>
Link: https://<email address hidden>
Signed-off-by: Wei Liu <email address hidden>
(cherry picked from commit 206ad34d52a2f1205c84d08c12fc116aad0eb407)
Signed-off-by: Tim Gardner <email address hidden>

d2f8a57... by Andres Beltran <email address hidden>

Drivers: hv: vmbus: Add vmbus_requestor data structure for VMBus hardening

Currently, VMbus drivers use pointers into guest memory as request IDs
for interactions with Hyper-V. To be more robust in the face of errors
or malicious behavior from a compromised Hyper-V, avoid exposing
guest memory addresses to Hyper-V. Also avoid Hyper-V giving back a
bad request ID that is then treated as the address of a guest data
structure with no validation. Instead, encapsulate these memory
addresses and provide small integers as request IDs.

Signed-off-by: Andres Beltran <email address hidden>
Co-developed-by: Andrea Parri (Microsoft) <email address hidden>
Signed-off-by: Andrea Parri (Microsoft) <email address hidden>
Reviewed-by: Michael Kelley <email address hidden>
Reviewed-by: Wei Liu <email address hidden>
Link: https://<email address hidden>
Signed-off-by: Wei Liu <email address hidden>
(cherry picked from commit e8b7db38449ac5b950a3f00519171c4be3e226ff)
Signed-off-by: Tim Gardner <email address hidden>

79bf1a9... by Olaf Hering <email address hidden>

video: hyperv_fb: include vmalloc.h

hvfb_getmem uses vzalloc, therefore vmalloc.h should be included.

Fixes commit d21987d709e807ba7bbf47044deb56a3c02e8be4 ("video: hyperv:
hyperv_fb: Support deferred IO for Hyper-V frame buffer driver")

Signed-off-by: Olaf Hering <email address hidden>
Signed-off-by: Sam Ravnborg <email address hidden>
Link: https://<email address hidden>
(cherry picked from commit 34a280831384d7e58327ff0e82e18db8e788107c)
Signed-off-by: Tim Gardner <email address hidden>

2a5cbd1... by tglx

x86/apic: Cleanup delivery mode defines

The enum ioapic_irq_destination_types and the enumerated constants starting
with 'dest_' are gross misnomers because they describe the delivery mode.

Rename then enum and the constants so they actually make sense.

Signed-off-by: Thomas Gleixner <email address hidden>
Signed-off-by: David Woodhouse <email address hidden>
Signed-off-by: Thomas Gleixner <email address hidden>
Link: https://<email address hidden>

(backported from commit 721612994f53ed600b39a80d912b10f51960e2e3)
[rtg - dropped changes to uv_send_IPI_one()]
Signed-off-by: Tim Gardner <email address hidden>

196c445... by Michael Kelley

x86/hyperv: Clarify comment on x2apic mode

The comment about Hyper-V accessors is unclear regarding their
potential use in x2apic mode, as is the associated commit message
in e211288b72f1. Clarify that while the architectural and
synthetic MSRs are equivalent in x2apic mode, the full set of xapic
accessors cannot be used because of register layout differences.

Fixes: e211288b72f1 ("x86/hyperv: Make vapic support x2apic mode")
Signed-off-by: Michael Kelley <email address hidden>
Link: https://<email address hidden>
Signed-off-by: Wei Liu <email address hidden>
(cherry picked from commit dbf563eee0b8cc056744514d91c5ffc2fa6c0982)
Signed-off-by: Tim Gardner <email address hidden>

48987c5... by Michael Kelley

Drivers: hv: vmbus: Add parsing of VMbus interrupt in ACPI DSDT

On ARM64, Hyper-V now specifies the interrupt to be used by VMbus
in the ACPI DSDT. This information is not used on x86 because the
interrupt vector must be hardcoded. But update the generic
VMbus driver to do the parsing and pass the information to the
architecture specific code that sets up the Linux IRQ. Update
consumers of the interrupt to get it from an architecture specific
function.

Signed-off-by: Michael Kelley <email address hidden>
Link: https://<email address hidden>
Signed-off-by: Wei Liu <email address hidden>
(cherry picked from commit 626b901f60446355e35e8c76c6b391a7d7491203)
Signed-off-by: Tim Gardner <email address hidden>

f3ebe18... by Kairui Song <email address hidden>

hyperv_fb: Update screen_info after removing old framebuffer

On gen2 HyperV VM, hyperv_fb will remove the old framebuffer, and the
new allocated framebuffer address could be at a differnt location,
and it might be no longer a VGA framebuffer.

Update screen_info so that after kexec the kernel won't try to reuse
the old invalid/stale framebuffer address as VGA, corrupting memory.

[ mingo: Tidied up the changelog. ]

Signed-off-by: Kairui Song <email address hidden>
Signed-off-by: Ingo Molnar <email address hidden>
Cc: Dexuan Cui <email address hidden>
Cc: Jake Oshins <email address hidden>
Cc: Wei Hu <email address hidden>
Cc: "K. Y. Srinivasan" <email address hidden>
Cc: Haiyang Zhang <email address hidden>
Cc: Stephen Hemminger <email address hidden>
Link: https://<email address hidden>
(cherry picked from commit 3cb73bc3fa2a3cb80b88aa63b48409939e0d996b)
Signed-off-by: Tim Gardner <email address hidden>