~ubuntu-kernel/ubuntu/+source/linux/+git/azure:master-next

Last commit made on 2017-03-17
Get this branch:
git clone -b master-next https://git.launchpad.net/~ubuntu-kernel/ubuntu/+source/linux/+git/azure
Members of Ubuntu Kernel Repositories can upload to this branch. Log in for directions.

Branch merges

Branch information

Recent commits

6e75285... by Kamal Mostafa

UBUNTU: [config] aufs.ko moved to linux-image package

BugLink: https://bugs.launchpad.net/bugs/1673498

Signed-off-by: Kamal Mostafa <email address hidden>
Acked-by: Tim Gardner <email address hidden>
Acked-by: Colin Ian King <email address hidden>
Acked-by: Seth Forshee <email address hidden>
Signed-off-by: Marcelo Henrique Cerri <email address hidden>

aa008f9... by Marcelo Cerri

UBUNTU: Start new release

Ignore: yes
Signed-off-by: Marcelo Henrique Cerri <email address hidden>

d0f37f3... by Marcelo Cerri

UBUNTU: Ubuntu-azure-4.10.0-1002.2

Signed-off-by: Marcelo Henrique Cerri <email address hidden>

fac5f1e... by Jack Morgenstein <email address hidden>

UBUNTU: SAUCE: net/mlx4_core: Avoid delays during VF driver device shutdown

BugLink: https://bugs.launchpad.net/bugs/1672785

Some Hypervisors detach VFs from VMs by instantly causing an FLR event
to be generated for a VF.

In the mlx4 case, this will cause that VF's comm channel to be disabled
before the VM has an opportunity to invoke the VF device's "shutdown"
method.

For such Hypervisors, there is a race condition between the VF's
shutdown method and its internal-error detection/reset thread.

The internal-error detection/reset thread (which runs every 5 seconds) also
detects a disabled comm channel. If the internal-error detection/reset
flow wins the race, we still get delays (while that flow tries repeatedly
to detect comm-channel recovery).

The cited commit fixed the command timeout problem when the
internal-error detection/reset flow loses the race.

This commit avoids the unneeded delays when the internal-error
detection/reset flow wins.

Fixes: d585df1c5ccf ("net/mlx4_core: Avoid command timeouts during VF driver device shutdown")
Signed-off-by: Jack Morgenstein <email address hidden>
Reported-by: Simon Xiao <email address hidden>
Signed-off-by: Tariq Toukan <email address hidden>
Acked-by: Brad Figg <email address hidden>
Signed-off-by: Marcelo Henrique Cerri <email address hidden>

ec7612d... by Pavel Shilovsky

CIFS: Fix possible use after free in demultiplex thread

BugLink: https://bugs.launchpad.net/bugs/1670508

The recent changes that added SMB3 encryption support introduced
a possible use after free in the demultiplex thread. When we
process an encrypted packed we obtain a pointer to SMB session
but do not obtain a reference. This can possibly lead to a situation
when this session was freed before we copy a decryption key from
there. Fix this by obtaining a copy of the key rather than a pointer
to the session under a spinlock.

Signed-off-by: Pavel Shilovsky <email address hidden>
Signed-off-by: Steve French <email address hidden>
(cherry picked from commit 61cfac6f267dabcf2740a7ec8a0295833b28b5f5)
Acked-by: Brad Figg <email address hidden>
Signed-off-by: Marcelo Henrique Cerri <email address hidden>

636d713... by Pavel Shilovsky

CIFS: Allow to switch on encryption with seal mount option

BugLink: https://bugs.launchpad.net/bugs/1670508

This allows users to inforce encryption for SMB3 shares if a server
supports it.

Signed-off-by: Pavel Shilovsky <email address hidden>
(cherry picked from commit ae6f8dd4d0c87bfb72da9d9b56342adf53e69c31)
Acked-by: Brad Figg <email address hidden>
Signed-off-by: Marcelo Henrique Cerri <email address hidden>

1bb15b9... by Pavel Shilovsky

CIFS: Add capability to decrypt big read responses

BugLink: https://bugs.launchpad.net/bugs/1670508

Allow to decrypt transformed packets that are bigger than the big
buffer size. In particular it is used for read responses that can
only exceed the big buffer size.

Signed-off-by: Pavel Shilovsky <email address hidden>
(cherry picked from commit c42a6abe3012832a68a371dabe17c2ced97e62ad)
Acked-by: Brad Figg <email address hidden>
Signed-off-by: Marcelo Henrique Cerri <email address hidden>

8e215c4... by Pavel Shilovsky

CIFS: Decrypt and process small encrypted packets

BugLink: https://bugs.launchpad.net/bugs/1670508

Allow to decrypt transformed packets, find a corresponding mid
and process as usual further.

Signed-off-by: Pavel Shilovsky <email address hidden>
(cherry picked from commit 4326ed2f6a16ae9d33e4209b540dc9a371aba840)
Acked-by: Brad Figg <email address hidden>
Signed-off-by: Marcelo Henrique Cerri <email address hidden>

1fa1d5d... by Pavel Shilovsky

CIFS: Add copy into pages callback for a read operation

BugLink: https://bugs.launchpad.net/bugs/1670508

Since we have two different types of reads (pagecache and direct)
we need to process such responses differently after decryption of
a packet. The change allows to specify a callback that copies a read
payload data into preallocated pages.

Signed-off-by: Pavel Shilovsky <email address hidden>
(cherry picked from commit d70b9104b1ca586f73aaf59426756cec3325a40e)
Acked-by: Brad Figg <email address hidden>
Signed-off-by: Marcelo Henrique Cerri <email address hidden>

92186c6... by Pavel Shilovsky

CIFS: Add mid handle callback

BugLink: https://bugs.launchpad.net/bugs/1670508

We need to process read responses differently because the data
should go directly into preallocated pages. This can be done
by specifying a mid handle callback.

Signed-off-by: Pavel Shilovsky <email address hidden>
(cherry picked from commit 9b7c18a2d4b798963ea80f6769701dcc4c24b55e)
Acked-by: Brad Figg <email address hidden>
Signed-off-by: Marcelo Henrique Cerri <email address hidden>