the performance otherwise.
+*
+* KYS: Oct. 30, 2016:
+* It looks like Windows hosts have logic to deal with DOS attacks that
+* can be triggered if it receives interrupts when it is not expecting
+* the interrupt. The host expects interrupts only when the ring
+
From: Weibing Zhang
Remove unnecessary header files and netlink related code as the daemons
do not use netlink to communicate with the kernel now.
Signed-off-by: Weibing Zhang
Signed-off-by: K. Y. Srinivasan
---
tools/hv/hv_fcopy_daemon.c |7 ---
tools/hv/hv_kvp_daemon.c |7
his is a rare
-* enough condition that it should not matter.
-* NOTE: in this case, the hvsock channel is an exception, because
-* it looks the host side's hvsock implementation has a throttling
-* mechanism which can hurt the performance otherwise.
-
From: Weibing Zhang
hv_kvp_daemon.c: In function .kvp_mac_to_if_name.:
hv_kvp_daemon.c:705:2: warning: format not a string literal and no format
arguments [-Wformat-security]
snprintf(dev_id, sizeof(dev_id), kvp_net_dir);
^
hv_kvp_daemon.c:705:2: warning: format not a string literal and no f
From: Vitaly Kuznetsov
With wrap around mappings in place we can always provide drivers with
direct links to packets on the ring buffer, even when they wrap around.
Do the required updates to get_next_pkt_raw()/put_pkt_raw()
The first version of this commit was reverted (65a532f3d50a) to deal wi
From: K. Y. Srinivasan
Signal the host when we determine the host is to be signaled -
on th read path. The currrent code determines the need to signal in the
ringbuffer code and actually issues the signal elsewhere. This can result
in the host viewing this interrupt as spurious since the host may
From: Vitaly Kuznetsov
I discovered that at least WS2016TP5 host has 60 seconds timeout for the
ICMSGTYPE_NEGOTIATE message so we need to lower guest's timeout a little
bit to make sure we always respond in time. Let's make it 55 seconds.
Signed-off-by: Vitaly Kuznetsov
Signed-off-by: K. Y. Sri
From: Alex Ng
We should intentionally declare the protocols to use for every known host
and default to using the latest protocol if the host is unknown or new.
Signed-off-by: Alex Ng
Signed-off-by: K. Y. Srinivasan
---
drivers/hv/hv_util.c |9 ++---
1 files changed, 6 insertions(+), 3
From: Weibing Zhang
The link flag pthread is not needed.
Signed-off-by: Weibing Zhang
Signed-off-by: K. Y. Srinivasan
---
tools/hv/Makefile |3 +--
1 files changed, 1 insertions(+), 2 deletions(-)
diff --git a/tools/hv/Makefile b/tools/hv/Makefile
index a8c4644..0d1e61b 100644
--- a/tool
From: Alex Ng
Added logging to help troubleshoot common ballooning, hot add,
and versioning issues.
Signed-off-by: Alex Ng
Signed-off-by: K. Y. Srinivasan
---
drivers/hv/hv_balloon.c | 31 ---
1 files changed, 28 insertions(+), 3 deletions(-)
diff --git a/driver
From: K. Y. Srinivasan
Fix some rescind handling issues.
K. Y. Srinivasan (4):
Drivers: hv: vmbus: Fix a rescind handling bug
Drivers: hv: util: kvp: Fix a rescind processing issue
Drivers: hv: util: Fcopy: Fix a rescind processing issue
Drivers: hv: util: Backup: Fix a rescind processin
From: K. Y. Srinivasan
Fcopy may use a char device to support the communication between
the user level daemon and the driver. When the Fcopy channel is rescinded
we need to make sure that the char device is fully cleaned up before
we can process a new Fcopy offer from the host. Implement this log
From: K. Y. Srinivasan
KVP may use a char device to support the communication between
the user level daemon and the driver. When the KVP channel is rescinded
we need to make sure that the char device is fully cleaned up before
we can process a new KVP offer from the host. Implement this logic.
S
From: K. Y. Srinivasan
The host can rescind a channel that has been offered to the
guest and once the channel is rescinded, the host does not
respond to any requests on that channel. Deal with the case where
the guest may be blocked waiting for a response from the host.
Signed-off-by: K. Y. Srin
From: K. Y. Srinivasan
VSS may use a char device to support the communication between
the user level daemon and the driver. When the VSS channel is rescinded
we need to make sure that the char device is fully cleaned up before
we can process a new VSS offer from the host. Implement this logic.
S
From: K. Y. Srinivasan
Miscellaneous fixes and enhancements.
K. Y. Srinivasan (3):
storvsc: Enable tracking of queue depth
storvsc: Remove the restriction on max segment size
storvsc: Enable multi-queue support
Long Li (3):
storvsc: use tagged SRB requests if supported by the device
s
From: K. Y. Srinivasan
Enable multi-q support. We will allocate the outgoing channel using
the following policy:
1. We will make every effort to pick a channel that is in the
same NUMA node that is initiating the I/O
2. The mapping between the guest CPU and the outgoin
From: K. Y. Srinivasan
Enable tracking of queue depth.
Signed-off-by: K. Y. Srinivasan
Reviewed-by: Long Li
---
drivers/scsi/storvsc_drv.c |1 +
1 files changed, 1 insertions(+), 0 deletions(-)
diff --git a/drivers/scsi/storvsc_drv.c b/drivers/scsi/storvsc_drv.c
index 05526b7..ccb2101 10
From: K. Y. Srinivasan
Remove the artificially imposed restriction on max segment size.
Signed-off-by: K. Y. Srinivasan
Reviewed-by: Long Li
---
drivers/scsi/storvsc_drv.c |2 --
1 files changed, 0 insertions(+), 2 deletions(-)
diff --git a/drivers/scsi/storvsc_drv.c b/drivers/scsi/storv
From: Long Li
When sense message is present on error, we should pass along to the upper
layer to decide how to deal with the error.
This patch fixes connectivity issues with Fiber Channel devices.
Signed-off-by: Long Li
Reviewed-by: K. Y. Srinivasan
Signed-off-by: K. Y. Srinivasan
Cc:
---
d
From: Long Li
On I/O errors, the Windows driver doesn't set data_transfer_length
on error conditions other than SRB_STATUS_DATA_OVERRUN.
In these cases we need to set data_transfer_length to 0,
indicating there is no data transferred. On SRB_STATUS_DATA_OVERRUN,
data_transfer_length is set by the
From: Long Li
Properly set SRB flags when hosting device supports tagged queuing.
This patch improves the performance on Fiber Channel disks.
Signed-off-by: Long Li
Reviewed-by: K. Y. Srinivasan
Signed-off-by: K. Y. Srinivasan
Cc:
---
drivers/scsi/storvsc_drv.c |9 +
1 files cha
From: K. Y. Srinivasan
The current Hyper-V code under drivers/hv has bunch of X86 specific code.
Restructure the code and move al architecture specific code to the
appropriate files.
As I was working on this restructuring, Roman Kagan
has submitted patches to restructure the Hyper-V header file
From: K. Y. Srinivasan
As part of the effort to separate out architecture specific code, move the
hypercall page setup to an architecture specific file.
Signed-off-by: K. Y. Srinivasan
---
arch/x86/Kbuild |3 ++
arch/x86/hyperv/Makefile|1 +
arch/x86/hyperv/hv_i
From: K. Y. Srinivasan
As part of cleaning up architecture specific code, define APIs
to manipulate the interrupt controller state.
Signed-off-by: K. Y. Srinivasan
---
arch/x86/include/asm/mshyperv.h |3 +++
drivers/hv/hv.c |8
2 files changed, 7 insertions(+),
From: K. Y. Srinivasan
As part of the effort to separate out architecture specific code, move the
definition of generate_guest_id() to x86 specific header file.
Signed-off-by: K. Y. Srinivasan
---
arch/x86/include/asm/mshyperv.h | 43 +++
drivers/hv/hyperv
From: K. Y. Srinivasan
As part of cleaning up architecture specific code, define an API
to retrieve the virtual procesor index.
Signed-off-by: K. Y. Srinivasan
---
arch/x86/include/asm/mshyperv.h |2 ++
drivers/hv/hv.c |2 +-
2 files changed, 3 insertions(+), 1 deletion
From: K. Y. Srinivasan
As part of the effort to separate out architecture specific code,
extract hypervisor version information in an architecture specific
file.
Signed-off-by: K. Y. Srinivasan
---
arch/x86/include/asm/mshyperv.h | 19 +++
arch/x86/kernel/cpu/mshyperv.c | 20 +
From: K. Y. Srinivasan
As part of the effort to interact with Hyper-V in an instruction set
architecture independent way, use the new API to get the current
tick.
Signed-off-by: K. Y. Srinivasan
---
drivers/hv/hv_util.c |3 ++-
1 files changed, 2 insertions(+), 1 deletions(-)
diff --git a
From: K. Y. Srinivasan
As part of cleaning up architecture specific code, define APIs
to manage interrupt state.
Signed-off-by: K. Y. Srinivasan
---
arch/x86/include/asm/mshyperv.h |3 +++
drivers/hv/hv.c | 12
2 files changed, 11 insertions(+), 4 deletions(-
From: K. Y. Srinivasan
Get rid of all unused definitions.
Signed-off-by: K. Y. Srinivasan
---
drivers/hv/hyperv_vmbus.h | 152 +
1 files changed, 2 insertions(+), 150 deletions(-)
diff --git a/drivers/hv/hyperv_vmbus.h b/drivers/hv/hyperv_vmbus.h
i
From: K. Y. Srinivasan
Move the relevant code that programs the hypervisor to an architecture
specific file.
Signed-off-by: K. Y. Srinivasan
---
arch/x86/include/asm/mshyperv.h |4
drivers/hv/hv.c | 10 +-
2 files changed, 9 insertions(+), 5 deletions(-)
dif
From: K. Y. Srinivasan
As part of the effort to separate out architecture specific code, move the
definition of hv_x64_msr_hypercall_contents to x86 specific header file.
Signed-off-by: K. Y. Srinivasan
---
arch/x86/include/asm/mshyperv.h | 12
drivers/hv/hyperv_vmbus.h |
From: K. Y. Srinivasan
As part of the effort to separate out architecture specific code,
consolidate all Hyper-V specific clocksource code to an architecture
specific code.
Signed-off-by: K. Y. Srinivasan
---
arch/x86/hyperv/hv_init.c | 104 +++
arch/
From: K. Y. Srinivasan
As part of the effort to separate out architecture specific code, move the
hypercall invocation code to an architecture specific file.
Signed-off-by: K. Y. Srinivasan
---
arch/x86/hyperv/hv_init.c | 54 +++---
arch/x86/include/asm/
From: K. Y. Srinivasan
As part of the effort to separate out architecture specific code, move the
check for detecting if the hypercall page is setup.
Signed-off-by: K. Y. Srinivasan
---
arch/x86/hyperv/hv_init.c | 15 +++
arch/x86/include/asm/mshyperv.h |1 +
drivers/hv
From: K. Y. Srinivasan
As part of cleaning up architecture specific code, define APIs
to manipulate the event page.
Signed-off-by: K. Y. Srinivasan
---
arch/x86/include/asm/mshyperv.h |3 +++
drivers/hv/hv.c |8
2 files changed, 7 insertions(+), 4 deletions(-)
From: K. Y. Srinivasan
As part of the effort to separate out architecture specific code, move the
code for signaling end of message.
Signed-off-by: K. Y. Srinivasan
---
arch/x86/include/asm/mshyperv.h | 37 +
drivers/hv/channel_mgmt.c |1 +
drive
From: K. Y. Srinivasan
The version variable while it is initialized is not used;
get rid of it.
Signed-off-by: K. Y. Srinivasan
---
drivers/hv/hv.c |4
1 files changed, 0 insertions(+), 4 deletions(-)
diff --git a/drivers/hv/hv.c b/drivers/hv/hv.c
index 0afffd8..5a2a329 100644
--- a/
From: K. Y. Srinivasan
As part of the effort to separate out architecture specific code, move the
crash notification function.
Signed-off-by: K. Y. Srinivasan
---
arch/x86/hyperv/hv_init.c | 26 ++
arch/x86/include/asm/mshyperv.h|1 +
arch/x86/include
From: K. Y. Srinivasan
As part of cleaning up architecture specific code, define APIs
to manipulate the message page.
Signed-off-by: K. Y. Srinivasan
---
arch/x86/include/asm/mshyperv.h |3 +++
drivers/hv/hv.c |8
2 files changed, 7 insertions(+), 4 deletions(-
From: Vitaly Kuznetsov
It may happen that not all CPUs are online when we do hv_synic_alloc() and
in case more CPUs come online later we may try accessing these allocated
structures.
Signed-off-by: Vitaly Kuznetsov
Signed-off-by: K. Y. Srinivasan
---
drivers/hv/hv.c |4 ++--
1 files chang
From: Haiyang Zhang
Changed it to HV_UNKNOWN
Signed-off-by: Haiyang Zhang
Signed-off-by: K. Y. Srinivasan
---
drivers/hv/channel_mgmt.c |6 +++---
include/linux/hyperv.h|2 +-
2 files changed, 4 insertions(+), 4 deletions(-)
diff --git a/drivers/hv/channel_mgmt.c b/drivers/hv/cha
From: Vitaly Kuznetsov
DoS protection conditions were altered in WS2016 and now it's easy to get
-EAGAIN returned from vmbus_post_msg() (e.g. when we try changing MTU on a
netvsc device in a loop). All vmbus_post_msg() callers don't retry the
operation and we usually end up with a non-functional
From: Vitaly Kuznetsov
Since commit e513229b4c38 ("Drivers: hv: vmbus: prevent cpu offlining on
newer hypervisors") cpu offlining was disabled. It is still true that we
can't offline CPUs which have VMBus channels bound to them but we may have
'free' CPUs (e.v. we booted with maxcpus= parameter a
From: K. Y. Srinivasan
Signed-off-by: K. Y. Srinivasan
---
drivers/hv/channel_mgmt.c | 11 +++
include/linux/hyperv.h|7 ---
2 files changed, 11 insertions(+), 7 deletions(-)
diff --git a/drivers/hv/channel_mgmt.c b/drivers/hv/channel_mgmt.c
index f9c5827..d83c1ac 100644
From: Vitaly Kuznetsov
"kernel BUG at drivers/hv/channel_mgmt.c:350!" is observed when hv_vmbus
module is unloaded. BUG_ON() was introduced in commit 85d9aa705184
("Drivers: hv: vmbus: add an API vmbus_hvsock_device_unregister()") as
vmbus_free_channels() codepath was apparently forgotten.
Fixes
From: Vitaly Kuznetsov
To make it possible to online/offline CPUs switch to cpuhp infrastructure
for doing hv_synic_init()/hv_synic_cleanup().
Signed-off-by: Vitaly Kuznetsov
Signed-off-by: K. Y. Srinivasan
---
drivers/hv/hv.c | 15 +++
drivers/hv/hyperv_vmbus.h |4
From: Vitaly Kuznetsov
To get prepared to CPU offlining support we need co change the way how we
unbind clockevent devices. As one CPU may go online/offline multiple times
we need to bind it in hv_synic_init() and unbind it in hv_synic_cleanup().
There is an additional corner case: when we unload
From: Vitaly Kuznetsov
Initializing hv_context.percpu_list in hv_synic_alloc() helps to prevent a
crash in percpu_channel_enq() when not all CPUs were online during
initialization and it naturally belongs there.
Signed-off-by: Vitaly Kuznetsov
Signed-off-by: K. Y. Srinivasan
---
drivers/hv/hv
From: Stephen Hemminger
This patch adds sysfs interface to dynamically bind new UUID values
to existing VMBus device. This is useful for generic UIO driver to
act similar to uio_pci_generic.
Signed-off-by: Stephen Hemminger
Signed-off-by: K. Y. Srinivasan
---
drivers/hv/vmbus_drv.c | 174 +++
From: Alex Fluter
error when running hypervkvpd:
$ sudo ./hv_kvp_daemon -n
sh: hv_get_dns_info: command not found
sh: hv_get_dhcp_info: command not found
sh: hv_get_dns_info: command not found
sh: hv_get_dhcp_info: command not found
The external scripts are not installed in system path,
adding
From: K. Y. Srinivasan
Fixes to handle CPU online/offline. Also included is a new uio
driver for Hyper-V.
Alex Fluter (1):
Tools: hv: kvp: configurable external scripts path
Haiyang Zhang (2):
hyperv: Add a function to detect hv_device
hyperv: Fix spelling of HV_UNKOWN
K. Y. Srinivasan (
From: Haiyang Zhang
Signed-off-by: Haiyang Zhang
Signed-off-by: K. Y. Srinivasan
---
drivers/hv/vmbus_drv.c |6 ++
include/linux/hyperv.h |2 ++
2 files changed, 8 insertions(+), 0 deletions(-)
diff --git a/drivers/hv/vmbus_drv.c b/drivers/hv/vmbus_drv.c
index 0276d2e..1730ac0 100
From: K. Y. Srinivasan
After the channel is rescinded, the host does not read from the rescinded
channel.
Fail writes to a channel that has already been rescinded
Signed-off-by: K. Y. Srinivasan
---
drivers/hv/ring_buffer.c |3 +++
1 files changed, 3 insertions(+), 0 deletions(-)
diff --g
From: Vitaly Kuznetsov
It may happen that secondary CPUs are still alive and resetting
hv_context.tsc_page will cause a consequent crash in read_hv_clock_tsc()
as we don't check for it being not NULL there. It is safe as we're not
freeing this page anyways.
Signed-off-by: Vitaly Kuznetsov
Signe
From: Stephen Hemminger
This is a new driver to enable userspace networking on VMBus.
It is based largely on the similar driver that already exists
for PCI, and earlier work done by Brocade to support DPDK.
Signed-off-by: Stephen Hemminger
Signed-off-by: K. Y. Srinivasan
---
MAINTAINERS
From: K. Y. Srinivasan
Fixes to handle CPU online/offline. Also included is a new uio
driver for Hyper-V.
V2: Updated commit logs (Greg KH)
Re-implemented the API to detect if it is a vmbus device
Alex Fluter (1):
Tools: hv: kvp: configurable external scripts path
Haiyang
From: Vitaly Kuznetsov
DoS protection conditions were altered in WS2016 and now it's easy to get
-EAGAIN returned from vmbus_post_msg() (e.g. when we try changing MTU on a
netvsc device in a loop). All vmbus_post_msg() callers don't retry the
operation and we usually end up with a non-functional
From: K. Y. Srinivasan
Enhance the rescind callback functionality by permitting the passing of an
opaque
pointer. This functionality will be used by vmbus device drivers to implement
rescind related cleanup more efficiently.
Signed-off-by: K. Y. Srinivasan
---
drivers/hv/channel_mgmt.c | 11
From: Vitaly Kuznetsov
"kernel BUG at drivers/hv/channel_mgmt.c:350!" is observed when hv_vmbus
module is unloaded. BUG_ON() was introduced in commit 85d9aa705184
("Drivers: hv: vmbus: add an API vmbus_hvsock_device_unregister()") as
vmbus_free_channels() codepath was apparently forgotten.
Fixes
From: Haiyang Zhang
On Hyper-V, every VF interface has a corresponding synthetic
interface managed by netvsc that share the same MAC
address. netvsc registers for netdev events to manage this
association. Currently we use the MAC address to manage this
association but going forward, we want to us
From: K. Y. Srinivasan
After the channel is rescinded, the host does not read from the rescinded
channel.
Fail writes to a channel that has already been rescinded.
Signed-off-by: K. Y. Srinivasan
---
drivers/hv/ring_buffer.c |3 +++
1 files changed, 3 insertions(+), 0 deletions(-)
diff -
From: Vitaly Kuznetsov
Initializing hv_context.percpu_list in hv_synic_alloc() helps to prevent a
crash in percpu_channel_enq() when not all CPUs were online during
initialization and it naturally belongs there.
Signed-off-by: Vitaly Kuznetsov
Signed-off-by: K. Y. Srinivasan
---
drivers/hv/hv
From: Haiyang Zhang
Changed it to HV_UNKNOWN
Signed-off-by: Haiyang Zhang
Signed-off-by: K. Y. Srinivasan
---
drivers/hv/channel_mgmt.c |6 +++---
include/linux/hyperv.h|2 +-
2 files changed, 4 insertions(+), 4 deletions(-)
diff --git a/drivers/hv/channel_mgmt.c b/drivers/hv/cha
From: Vitaly Kuznetsov
To make it possible to online/offline CPUs switch to cpuhp infrastructure
for doing hv_synic_init()/hv_synic_cleanup().
Signed-off-by: Vitaly Kuznetsov
Signed-off-by: K. Y. Srinivasan
---
drivers/hv/hv.c | 15 +++
drivers/hv/hyperv_vmbus.h |4
From: Vitaly Kuznetsov
Since commit e513229b4c38 ("Drivers: hv: vmbus: prevent cpu offlining on
newer hypervisors") cpu offlining was disabled. It is still true that we
can't offline CPUs which have VMBus channels bound to them but we may have
'free' CPUs (e.v. we booted with maxcpus= parameter a
From: Stephen Hemminger
This patch adds sysfs interface to dynamically bind new UUID values
to existing VMBus device. This is useful for generic UIO driver to
act similar to uio_pci_generic.
Signed-off-by: Stephen Hemminger
Signed-off-by: K. Y. Srinivasan
---
drivers/hv/vmbus_drv.c | 174 +++
From: Vitaly Kuznetsov
It may happen that secondary CPUs are still alive and resetting
hv_context.tsc_page will cause a consequent crash in read_hv_clock_tsc()
as we don't check for it being not NULL there. It is safe as we're not
freeing this page anyways.
Signed-off-by: Vitaly Kuznetsov
Signe
From: Vitaly Kuznetsov
It may happen that not all CPUs are online when we do hv_synic_alloc() and
in case more CPUs come online later we may try accessing these allocated
structures.
Signed-off-by: Vitaly Kuznetsov
Signed-off-by: K. Y. Srinivasan
---
drivers/hv/hv.c |4 ++--
1 files chang
From: Alex Fluter
error when running hypervkvpd:
$ sudo ./hv_kvp_daemon -n
sh: hv_get_dns_info: command not found
sh: hv_get_dhcp_info: command not found
sh: hv_get_dns_info: command not found
sh: hv_get_dhcp_info: command not found
The external scripts are not installed in system path,
adding
From: Vitaly Kuznetsov
To get prepared to CPU offlining support we need co change the way how we
unbind clockevent devices. As one CPU may go online/offline multiple times
we need to bind it in hv_synic_init() and unbind it in hv_synic_cleanup().
There is an additional corner case: when we unload
From: Stephen Hemminger
This is a new driver to enable userspace networking on VMBus.
It is based largely on the similar driver that already exists
for PCI, and earlier work done by Brocade to support DPDK.
Signed-off-by: Stephen Hemminger
Signed-off-by: K. Y. Srinivasan
---
MAINTAINERS
From: K. Y. Srinivasan
Some miscellaneous fixes.
K. Y. Srinivasan (2):
pci-hyperv: Fix a bug in specifying CPU affinity
pci-hyperv: Fix an atomic bug
drivers/pci/host/pci-hyperv.c | 13 +
1 files changed, 9 insertions(+), 4 deletions(-)
From: K. Y. Srinivasan
The memory allocation here needs to be non-blocking.
Fix the issue.
Signed-off-by: K. Y. Srinivasan
Cc:
---
drivers/pci/host/pci-hyperv.c |2 +-
1 files changed, 1 insertions(+), 1 deletions(-)
diff --git a/drivers/pci/host/pci-hyperv.c b/drivers/pci/host/pci-hyper
From: K. Y. Srinivasan
When we have 32 or more CPUs in the affinity mask, we should
use a special constant to specify that to the host. Fix this issue.
Signed-off-by: K. Y. Srinivasan
Cc:
---
drivers/pci/host/pci-hyperv.c | 11 ---
1 files changed, 8 insertions(+), 3 deletions(-)
d
From: K. Y. Srinivasan
When we have 32 or more CPUs in the affinity mask, we should
use a special constant to specify that to the host. Fix this issue.
Signed-off-by: K. Y. Srinivasan
Cc:
---
drivers/pci/host/pci-hyperv.c | 10 +++---
1 files changed, 7 insertions(+), 3 deletions(-)
di
From: K. Y. Srinivasan
All netvsc channels are handled via NAPI. Setup the "read mode" correctly
for the netvsc sub-channels.
Signed-off-by: K. Y. Srinivasan
---
drivers/net/hyperv/rndis_filter.c |5 +
1 files changed, 5 insertions(+), 0 deletions(-)
diff --git a/drivers/net/hyperv/rn
From: K. Y. Srinivasan
Initialize the return value correctly.
Signed-off-by: K. Y. Srinivasan
---
drivers/net/hyperv/netvsc_drv.c |2 +-
1 files changed, 1 insertions(+), 1 deletions(-)
diff --git a/drivers/net/hyperv/netvsc_drv.c b/drivers/net/hyperv/netvsc_drv.c
index eb7ae79..f830bbb 1
From: K. Y. Srinivasan
Fix miscellaneous issues.
K. Y. Srinivasan (2):
netvsc: Fix a bug in sub-channel handling
netvsc: Properly initialize the return value
drivers/net/hyperv/netvsc_drv.c |2 +-
drivers/net/hyperv/rndis_filter.c |5 +
2 files changed, 6 insertions(+), 1 del
From: K. Y. Srinivasan
Enable autoeoi based on the hypervisor recommendations.
This is required to support vAPIC.
K. Y. Srinivasan (2):
Drivers: hv: Fix a typo
Drivers: hv: Base autoeoi enablement based on hypervisor hints
arch/x86/include/uapi/asm/hyperv.h |7 ++-
drivers/hv/hv.c
From: K. Y. Srinivasan
Don't enable auto-eoi if the hypervisor recommends otherwise. This will
enable vAPIC functionality if available.
Signed-off-by: K. Y. Srinivasan
---
arch/x86/include/uapi/asm/hyperv.h |5 +
drivers/hv/hv.c|5 -
2 files changed, 9 inser
From: K. Y. Srinivasan
Fix a typo in the macro.
Signed-off-by: K. Y. Srinivasan
---
arch/x86/include/uapi/asm/hyperv.h |2 +-
1 files changed, 1 insertions(+), 1 deletions(-)
diff --git a/arch/x86/include/uapi/asm/hyperv.h
b/arch/x86/include/uapi/asm/hyperv.h
index 3a20ccf..32ea7a3 10064
From: K. Y. Srinivasan
When we close a channel that has been rescinded, we will leak memory since
vmbus_teardown_gpadl() returns an error. Fix this so that we can properly
cleanup the memory allocated to the ring buffers.
Fixes: ccb61f8a99e6 ("Drivers: hv: vmbus: Fix a rescind handling bug")
Si
From: K. Y. Srinivasan
If we cannot allocate memory for the channel, free the relid
associated with the channel.
Signed-off-by: K. Y. Srinivasan
Cc:
---
drivers/hv/channel_mgmt.c |1 +
1 files changed, 1 insertions(+), 0 deletions(-)
diff --git a/drivers/hv/channel_mgmt.c b/drivers/hv/ch
From: K. Y. Srinivasan
These patches fix several issues introduced in 4.11. Greg,
Please pick these patches for 4.11.
Dexuan Cui (2):
vmbus: remove hv_event_tasklet_disable/enable
Drivers: hv: util: don't forget to init host_ts.lock
Stephen Hemminger (1):
vmbus: use rcu for per-cpu channe
From: Vitaly Kuznetsov
Waiting for release_event in all three drivers introduced issues on release
as on_reset() hook is not always called. E.g. if the device was never
opened we will never get the completion.
Move the waiting code to hvutil_transport_destroy() and make sure it is
only called wh
From: Stephen Hemminger
The per-cpu channel list is now referred to in the interrupt
routine. This is mostly safe since the host will not normally generate
an interrupt when channel is being deleted but if it did then there
would be a use after free problem.
To solve, this use RCU protection on
From: Dexuan Cui
With the recent introduction of per-channel tasklet, we need to update
the way we handle the 3 concurrency issues:
1. hv_process_channel_removal -> percpu_channel_deq vs.
vmbus_chan_sched -> list_for_each_entry(..., percpu_list);
2. vmbus_process_offer -> percpu_channel_enq/
From: Dexuan Cui
Without the patch, I always get a "BUG: spinlock bad magic" warning.
Fixes: 3716a49a81ba ("hv_utils: implement Hyper-V PTP source")
Signed-off-by: Dexuan Cui
Cc: Vitaly Kuznetsov
Cc: "K. Y. Srinivasan"
Cc: Haiyang Zhang
Cc: Stephen Hemminger
Signed-off-by: K. Y. Srinivasan
From: Stephen Hemminger
hv_ringbuffer_read cleanup.
Signed-off-by: Stephen Hemminger
Signed-off-by: K. Y. Srinivasan
---
drivers/hv/ring_buffer.c |6 ++
1 files changed, 2 insertions(+), 4 deletions(-)
diff --git a/drivers/hv/ring_buffer.c b/drivers/hv/ring_buffer.c
index 52d0556..8a
From: Stephen Hemminger
Don't initialize variables that are then set a few lines later.
Signed-off-by: Stephen Hemminger
Signed-off-by: K. Y. Srinivasan
---
drivers/hv/ring_buffer.c | 13 +
1 files changed, 5 insertions(+), 8 deletions(-)
diff --git a/drivers/hv/ring_buffer.c b
From: Stephen Hemminger
Minor changes to align hyper-v vmbus include files with current
linux kernel style.
Signed-off-by: Stephen Hemminger
Signed-off-by: K. Y. Srinivasan
---
drivers/hv/hyperv_vmbus.h | 16
include/linux/hyperv.h| 12 ++--
2 files changed, 1
From: Stephen Hemminger
This table is immutable and should be const.
Cleanup indentation and whitespace for this as well.
Signed-off-by: Stephen Hemminger
Signed-off-by: K. Y. Srinivasan
---
drivers/hv/channel_mgmt.c | 48 ++--
drivers/hv/hyperv_vmbus
From: Stephen Hemminger
The change to reschedule tasklet if more data arrives in ring buffer
can cause performance regression if host timing is such that the
next response happens in small window.
Go back to a modified version of the original looping behavior.
If the race occurs in a small time,
From: Stephen Hemminger
Allow driver to get debug information about state of the ring.
Signed-off-by: Stephen Hemminger
Signed-off-by: K. Y. Srinivasan
---
drivers/hv/hyperv_vmbus.h | 11 ---
drivers/hv/ring_buffer.c |1 +
include/linux/hyperv.h| 17 +
3 f
From: Stephen Hemminger
Compiling with warnings enabled finds missing prototype for
hv_do_hypercall.
Signed-off-by: Stephen Hemminger
Signed-off-by: K. Y. Srinivasan
---
arch/x86/hyperv/hv_init.c |2 +-
1 files changed, 1 insertions(+), 1 deletions(-)
diff --git a/arch/x86/hyperv/hv_init
From: Stephen Hemminger
No need for empty return at end of void function
Signed-off-by: Stephen Hemminger
Signed-off-by: K. Y. Srinivasan
---
drivers/hv/hv_balloon.c |2 --
drivers/hv/hv_fcopy.c|2 --
drivers/hv/hv_kvp.c |2 --
drivers/hv/hv_snapshot.c |2 --
drivers
From: Stephen Hemminger
Several spelling errors in comments
Signed-off-by: Stephen Hemminger
Signed-off-by: K. Y. Srinivasan
---
drivers/hv/channel.c | 10 +-
drivers/hv/hv_kvp.c | 10 +-
2 files changed, 10 insertions(+), 10 deletions(-)
diff --git a/drivers/hv/channel.
From: K. Y. Srinivasan
Miscellaneous cleanup.
Stephen Hemminger (9):
vmbus: only reschedule tasklet if time limit exceeded
hyperv: fix warning about missing prototype
vmbus: remove useless return's
vmbus: remove unnecessary initialization
vmbus: fix spelling errors
hyperv: remove unn
201 - 300 of 422 matches
Mail list logo