Received: by 2002:ab2:7407:0:b0:1f4:b336:87c4 with SMTP id e7csp102095lqn; Thu, 11 Apr 2024 15:37:53 -0700 (PDT) X-Forwarded-Encrypted: i=3; AJvYcCX+4SsiPgh5l8aWnlG0OURgQMudU48iTvXAbotA8mNGCO5LX2f1YXkHE+om6JgaKyc8dyugXS4yG7zONVQXCGQTG+gi6rMhxKFt5bvMfw== X-Google-Smtp-Source: AGHT+IFvlRuE2axn5799OFPaZUHP4SrFqF+HYt9DxU+pQTcVgV8j/ez/a8mWaZlnZyjwpLXY5KDp X-Received: by 2002:a17:907:7f0f:b0:a4e:5137:9969 with SMTP id qf15-20020a1709077f0f00b00a4e51379969mr828994ejc.32.1712875072996; Thu, 11 Apr 2024 15:37:52 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1712875072; cv=pass; d=google.com; s=arc-20160816; b=aktyMUU3vrw6T3wsRYZlBq1QfretABEaVdseb/encjvIYuYh8cO7+wqljXIdzIMyJ/ Bp7BiEZyLAv6Tq9SV/PeHEpTPVKxZ8//fCFdl6i2na4scW+9XAcYd0RoZbdpyogBuqYQ WxjLrvT6kgUPbqQr+i3eqYdR80kGDu4p9UuU3t4bXMPYn1uPzv8E8r3vBN16vkccHYK7 V6dQ464cHxSvLIxw/DT8ubUO+qiFjvWj5g4t8apSEAgNFJ3h6BbOrcBpr2wisCcAjaHr U11cN2WsCA1vqu7mGX7HJTCIS4jT7pyjkK13xsjFM4j8RSLkzDiUjDBTZXCy1BwW0hM1 K3Sw== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-disposition:mime-version:list-unsubscribe:list-subscribe :list-id:precedence:message-id:subject:cc:to:from:date; bh=b2bA0Klb+Banv4xhLIqQoUZ2zEzeFimrSjJDvif4SFE=; fh=2lV7mouNXO3GsqJowqMcA7Dg2BmbGb1LioDnXD14h0U=; b=pZmoLgoZYWvId0AflvCVM/x1F1wGaAqv1aLUsbyOTCUMLBFKLW6UphvsBtl9wwQWYa g5q6HkEoB+sbT9w3qzUmTr6j8huSn/AsD8mkPOJgCPontM+tPi1ipS4DH046QgaPidt9 iJi1PPYuhqmapWS0acifTp3jRStlTpUpwsatf/sCI9P72+Mot8FcW6wCgxbiskGMwqnl nV4tzgdzjXQUxVoNOoi5VBVWjri8jKsRSMtT8OSuSZgFHuItIXkvo8inQjMmCLilelZn I21JiuBnzfBE5tariVEGeKDofuBDjYYPyf2wXj0SuJiEfCJzyZepsja2mRkqkwjJ8Lwx 2nUQ==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; arc=pass (i=1 spf=pass spfdomain=gmail.com); spf=pass (google.com: domain of linux-kernel+bounces-141672-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.80.249 as permitted sender) smtp.mailfrom="linux-kernel+bounces-141672-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from am.mirrors.kernel.org (am.mirrors.kernel.org. [147.75.80.249]) by mx.google.com with ESMTPS id dk16-20020a170907941000b00a522e519d5dsi370491ejc.395.2024.04.11.15.37.52 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 11 Apr 2024 15:37:52 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel+bounces-141672-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.80.249 as permitted sender) client-ip=147.75.80.249; Authentication-Results: mx.google.com; arc=pass (i=1 spf=pass spfdomain=gmail.com); spf=pass (google.com: domain of linux-kernel+bounces-141672-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.80.249 as permitted sender) smtp.mailfrom="linux-kernel+bounces-141672-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by am.mirrors.kernel.org (Postfix) with ESMTPS id B95DA1F22B8C for ; Thu, 11 Apr 2024 22:37:52 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 84BC346521; Thu, 11 Apr 2024 22:37:46 +0000 (UTC) Received: from mail-pl1-f172.google.com (mail-pl1-f172.google.com [209.85.214.172]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id BD9FC205E00; Thu, 11 Apr 2024 22:37:44 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.214.172 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1712875066; cv=none; b=GTWl7ZQ9GXhtY1lBTe9bZ6sM5jLdOtsBbqYvrl7xcWmmUErFjrceCmH7gXdkWg/iv7bUqIwwUHATlIESJ8hZd14CgpNSE9qIccIVvRKYE9J9mdMfhTf6CtpKitNSV9j2Q5zExuhdgoaMr/MLr10MlhV24MhOny9DJt2sBlu6a4Q= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1712875066; c=relaxed/simple; bh=0nns8Ff4F6D/hiksCnhah+ogGWHAC7v/9Z1x3syG47o=; h=Date:From:To:Cc:Subject:Message-ID:MIME-Version:Content-Type: Content-Disposition; b=iQ15o0gJalCwcaDOsWf9lhSLS2ViY9DbgzzAVvgAV0MPRNt5PWFwu3Us97wA53eehgNlIidMolDwCx50bYoR9AU168MGfXbiSJbLFmOHVRSRG4PpGgs9dSkl+pOBPsXncJlTVHiasm6n0a/kzkSWqTcyDAyUnbVk68tBrW49sZU= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=fail (p=none dis=none) header.from=kernel.org; spf=pass smtp.mailfrom=gmail.com; arc=none smtp.client-ip=209.85.214.172 Authentication-Results: smtp.subspace.kernel.org; dmarc=fail (p=none dis=none) header.from=kernel.org Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=gmail.com Received: by mail-pl1-f172.google.com with SMTP id d9443c01a7336-1e50a04c317so2222855ad.1; Thu, 11 Apr 2024 15:37:44 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1712875064; x=1713479864; h=content-disposition:mime-version:message-id:subject:cc:to:from:date :x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=b2bA0Klb+Banv4xhLIqQoUZ2zEzeFimrSjJDvif4SFE=; b=UhxNZ09x3vF3B1GVYcHiEsWADZACtdSzM2ng/gS0a+Cdhoz4OUjbFr94BCK1VriFNs OakO+DnKFZVLF60Mlu+PQYdUhuN81e+JsbDvRZDsD7VmuTvRV0AnmZOqm5VX4dSvBJWH OxpSLVQWLVMAXng+LlG6M06/zOMFCod+akuNRMmiqcCEU0ll4Cds0XEJDXgiVKCb6DcN 27LWa4yPqFUbzMps5jMJd/k9hz2GVZ4gb9oJvTqpcHMKyDJT+syufxT6CNH/ixGmb0pe JvCUTbuaSA7lyj6wTptnDqMsgQAWVyHcwh8iZXf6vX8B+hUZdqpRCpWsocUgViI8/9gc nx6g== X-Forwarded-Encrypted: i=1; AJvYcCV1ZA8mmKPcbDr0PMXhLL4oaYru2XtWJz4CuuV+hMOPNQz4VSTGdj/uG9N+QlGmxvzU71FZ+xYgORv6+1EeIgoiT2WDCnLmiJrbrjVVe0nsAWJDyzIihgYMcoIVi+mzsUPNDtxcFo8Ojjip X-Gm-Message-State: AOJu0Yxl8QNR0Ejn5fwd66mzgxh1vKUAu4z+7VdjK3TpgxparGZE/B8T DoXHClhiXx6WfYSBsyyAPUdLA6OULNw1i0g0yvDXrT+V5amprBnTF+b1+w== X-Received: by 2002:a17:902:eacd:b0:1e2:23b9:eb24 with SMTP id p13-20020a170902eacd00b001e223b9eb24mr781671pld.33.1712875063994; Thu, 11 Apr 2024 15:37:43 -0700 (PDT) Received: from liuwe-devbox-debian-v2 ([20.69.120.36]) by smtp.gmail.com with ESMTPSA id m17-20020a170902db1100b001ddb4df7f70sm1687503plx.304.2024.04.11.15.37.43 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 11 Apr 2024 15:37:43 -0700 (PDT) Date: Thu, 11 Apr 2024 22:37:35 +0000 From: Wei Liu To: Linus Torvalds Cc: Wei Liu , Linux on Hyper-V List , Linux Kernel List , kys@microsoft.com, haiyangz@microsoft.com, decui@microsoft.com Subject: [GIT PULL] Hyper-V fixes for 6.9-rc4 Message-ID: Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Hi Linus, The following changes since commit e8f897f4afef0031fe618a8e94127a0934896aba: Linux 6.8 (2024-03-10 13:38:09 -0700) are available in the Git repository at: ssh://git@gitolite.kernel.org/pub/scm/linux/kernel/git/hyperv/linux.git tags/hyperv-fixes-signed-20240411 for you to fetch changes up to 30d18df6567be09c1433e81993e35e3da573ac48: Drivers: hv: vmbus: Don't free ring buffers that couldn't be re-encrypted (2024-04-10 21:33:33 +0000) ---------------------------------------------------------------- hyperv-fixes for v6.9-rc4 - Some cosmetic changes (Erni Sri Satya Vennela, Li Zhijian) - Introduce hv_numa_node_to_pxm_info() (Nuno Das Neves) - Fix KVP daemon to handle IPv4 and IPv6 combination for keyfile format (Shradha Gupta) - Avoid freeing decrypted memory in a confidential VM (Rick Edgecombe and Michael Kelley) ---------------------------------------------------------------- Erni Sri Satya Vennela (1): x86/hyperv: Cosmetic changes for hv_apic.c Li Zhijian (1): hv: vmbus: Convert sprintf() family to sysfs_emit() family Michael Kelley (1): Drivers: hv: vmbus: Don't free ring buffers that couldn't be re-encrypted Nuno Das Neves (1): mshyperv: Introduce hv_numa_node_to_pxm_info() Rick Edgecombe (4): Drivers: hv: vmbus: Leak pages if set_memory_encrypted() fails Drivers: hv: vmbus: Track decrypted status in vmbus_gpadl hv_netvsc: Don't free decrypted memory uio_hv_generic: Don't free decrypted memory Shradha Gupta (1): hv/hv_kvp_daemon: Handle IPv4 and Ipv6 combination for keyfile format arch/x86/hyperv/hv_apic.c | 16 +-- arch/x86/hyperv/hv_proc.c | 22 +--- drivers/hv/channel.c | 29 +++++- drivers/hv/connection.c | 29 ++++-- drivers/hv/vmbus_drv.c | 94 ++++++++--------- drivers/net/hyperv/netvsc.c | 7 +- drivers/uio/uio_hv_generic.c | 12 ++- include/asm-generic/hyperv-tlfs.h | 19 ++-- include/asm-generic/mshyperv.h | 14 +++ include/linux/hyperv.h | 1 + tools/hv/hv_kvp_daemon.c | 213 ++++++++++++++++++++++++++++++-------- 11 files changed, 307 insertions(+), 149 deletions(-)