diff options
author | Howard Chen <howardsoc@google.com> | 2022-02-24 17:45:35 +0800 |
---|---|---|
committer | Howard Chen <howardsoc@google.com> | 2022-02-24 17:45:35 +0800 |
commit | 96b5e46c92057c71eaa710b1b6ea82d284925119 (patch) | |
tree | 773484203162f2053aebfc4a8ca4796cebf642ea /virtio_net.ko | |
parent | ed3f38e5202194b6ff28cf6ecf775a8ed28d749e (diff) | |
download | x86-64-96b5e46c92057c71eaa710b1b6ea82d284925119.tar.gz |
Update kernel to builds 8216663
git log --first-parent -100 --oneline --no-decorate 9730810b7ca5..dc855f8bdfc1:
dc855f8bdfc1 ANDROID: dm-bow: remove dm-bow
539aef49d393 ANDROID: align constness of extcon_get_state parameter
2ded03fd7cae Merge 5.15.25 into android13-5.15
a4719cfb574b ANDROID: KVM: arm64: Don't expose TLBI hypercalls after de-privilege
3de00e23a901 UPSTREAM: KVM: arm64: vgic: Read HW interrupt pending state from the HW
5cf72b438790 ANDROID: KVM: arm64: Forward PSCI SYSTEM_RESET2 calls back to the host
1cff9a26fcfa FROMLIST: BACKPORT: KVM: arm64: Indicate SYSTEM_RESET2 in kvm_run::system_event flags field
25aa354adb19 FROMLIST: KVM: arm64: Expose PSCI SYSTEM_RESET2 call to the guest
b5c4401843c3 FROMLIST: KVM: arm64: Bump guest PSCI version to 1.1
a8e96486c3c7 UPSTREAM: nl80211: don't kfree() ERR_PTR() value
0e2eb486c405 UPSTREAM: dma-buf: cma_heap: Fix mutex locking section
f79e49085d1d ANDROID: Add a vendor hook that allow a module to modify the wake flag
50d260a969cb ANDROID: gki_defconfig: Enable CONFIG_RANDOM_TRUST_CPU=y
c96767cc24f1 ANDROID: KVM: arm64: Don't repaint PSCI SYSTEM_RESET to SYSTEM_OFF
8f3d3d547d2c FROMLIST: arm64/mte: Add userspace interface for enabling asymmetric mode
ddd2af6be781 BACKPORT: FROMLIST: arm64/mte: Add hwcap for asymmetric mode
9f7bd54c9d8b FROMLIST: arm64/mte: Add a little bit of documentation for mte_update_sctlr_user()
926ce981052d FROMLIST: arm64/mte: Document ABI for asymmetric mode
81581c794a1a ANDROID: KVM: arm64: pkvm: Add support for fragmented FF-A descriptors
1b0f98a2c207 ANDROID: KVM: arm64: Handle FFA_MEM_LEND calls from the host
08be3bcb7e08 ANDROID: KVM: arm64: Handle FFA_MEM_RECLAIM calls from the host
ad2b2b869f6b ANDROID: KVM: arm64: Handle FFA_MEM_SHARE calls from the host
1b4277a04949 ANDROID: BACKPORT: KVM: arm64: Add FF-A helpers to share/unshare memory with secure world
64eaaad40f56 ANDROID: KVM: arm64: Handle FFA_RXTX_MAP and FFA_RXTX_UNMAP calls from the host
868e8504cc29 ANDROID: KVM: arm64: Allocate pages for hypervisor FF-A mailboxes
1bdc86f0b09f ANDROID: KVM: arm64: Handle FFA_FEATURES call from the host
2c234836ad4a ANDROID: KVM: arm64: Probe FF-A version and host/hyp partition ID during init
c63757defdb0 ANDROID: BACKPORT: KVM: arm64: Block unsafe FF-A calls from the host
80d49439eaab ANDROID: KVM: arm64: Include asm/kvm_mmu.h in nvhe/mem_protect.h
1c0baeb7f001 ANDROID: firmware: arm_ffa: Move comment before the field it is documenting
905f49d35b89 ANDROID: firmware: arm_ffa: Move constants to header file
a2625171d1a1 ANDROID: Update comment in build.config.gki.aarch64.
f0a8f34910d0 ANDROID: Revert "tracefs: Have tracefs directories not set OTH permission bits by default"
91b758441165 FROMGIT: mm: fix use-after-free when anon vma name is used after vma is freed
287cd0232cd8 Merge 5.15.24 into android13-5.15
acccc2aa2ea0 FROMLIST: kasan: improve vmalloc tests
1a0c413e7565 FROMGIT: kasan: documentation updates
6e71e864f388 FROMGIT: arm64: select KASAN_VMALLOC for SW/HW_TAGS modes
838c66893504 FROMGIT: kasan: allow enabling KASAN_VMALLOC and SW/HW_TAGS
7088ced28d9c FROMGIT: kasan: add kasan.vmalloc command line flag
d2e878f05a20 FROMGIT: kasan: clean up feature flags for HW_TAGS mode
b362dc049e62 FROMGIT: kasan: mark kasan_arg_stacktrace as __initdata
2dc1e2b3318b FROMGIT: kasan, arm64: don't tag executable vmalloc allocations
d51f0bf565f4 FROMGIT: kasan, vmalloc: only tag normal vmalloc allocations
261a7a2ac989 BACKPORT: FROMGIT: kasan, vmalloc: add vmalloc tagging for HW_TAGS
bb88568de214 BACKPORT: FROMGIT: kasan, page_alloc: allow skipping memory init for HW_TAGS
61dbe708393f BACKPORT: FROMGIT: kasan, page_alloc: allow skipping unpoisoning for HW_TAGS
99b3decd03c1 BACKPORT: FROMGIT: kasan, mm: only define ___GFP_SKIP_KASAN_POISON with HW_TAGS
7f845e9e5cf6 FROMGIT: kasan, vmalloc: unpoison VM_ALLOC pages after mapping
688abddcfa17 BACKPORT: FROMGIT: kasan, vmalloc, arm64: mark vmalloc mappings as pgprot_tagged
ecf1dc6838bd FROMGIT: kasan, vmalloc: add vmalloc tagging for SW_TAGS
064f89156f1e FROMGIT: kasan, arm64: reset pointer tags of vmapped stacks
cdb4c1893583 FROMLIST: kasan, fork: reset pointer tags of vmapped stacks
25d90a2ba047 FROMGIT: kasan, vmalloc: reset tags in vmalloc functions
be087c0e1418 FROMGIT: kasan: add wrappers for vmalloc hooks
e8c3e6f87a73 BACKPORT: FROMGIT: kasan: reorder vmalloc hooks
7eb4832324ac FROMGIT: kasan, vmalloc: drop outdated VM_KASAN comment
deb5ba531118 FROMGIT: kasan, x86, arm64, s390: rename functions for modules shadow
c0983b3ca7e7 FROMGIT: kasan: define KASAN_VMALLOC_INVALID for SW_TAGS
c7b815fbefa8 FROMGIT: kasan: clean up metadata byte definitions
8a710d3f6839 FROMGIT: kasan, page_alloc: rework kasan_unpoison_pages call site
b5d822fda858 FROMGIT: kasan, page_alloc: move kernel_init_free_pages in post_alloc_hook
7c2ba461d950 FROMGIT: kasan, page_alloc: move SetPageSkipKASanPoison in post_alloc_hook
f34795b8fc83 FROMGIT: kasan, page_alloc: combine tag_clear_highpage calls in post_alloc_hook
00ab82715744 FROMGIT: kasan, page_alloc: merge kasan_alloc_pages into post_alloc_hook
eedf93006433 FROMGIT: kasan, page_alloc: refactor init checks in post_alloc_hook
8847765ba3ab FROMGIT: kasan: only apply __GFP_ZEROTAGS when memory is zeroed
c47a6692034a FROMGIT: mm: clarify __GFP_ZEROTAGS comment
26f19f2b4dd7 FROMGIT: kasan: drop skip_kasan_poison variable in free_pages_prepare
6843e5d12eb4 FROMGIT: kasan, page_alloc: init memory of skipped pages on free
aec66c979da7 FROMGIT: kasan, page_alloc: simplify kasan_poison_pages call site
75f01f8aed06 FROMGIT: kasan, page_alloc: merge kasan_free_pages into free_pages_prepare
fca2cda982dc FROMGIT: kasan, page_alloc: move tag_clear_highpage out of kernel_init_free_pages
55edf5da76b5 FROMGIT: kasan, page_alloc: deduplicate should_skip_kasan_poison
b35dd8c5f724 UPSTREAM: kasan: test: fix compatibility with FORTIFY_SOURCE
07f1b24714cc UPSTREAM: lib/stackdepot: always do filter_irq_stacks() in stack_depot_save()
b8494b66920b UPSTREAM: kasan: fix quarantine conflicting with init_on_free
2ad8d9d321a5 UPSTREAM: kasan: test: add test case for double-kmem_cache_destroy()
96ac8b3213a2 BACKPORT: kasan: add ability to detect double-kmem_cache_destroy()
ac3107b46a67 UPSTREAM: kasan: test: add globals left-out-of-bounds test
68b808216381 UPSTREAM: mm: defer kmemleak object creation of module_alloc()
95a04ddf238e UPSTREAM: kmemleak: fix kmemleak false positive report with HW tag-based kasan enable
3457cc5797a7 UPSTREAM: kasan: test: silence intentional read overflow warnings
0cd94483ffc4 UPSTREAM: kasan: add kasan mode messages when kasan init
c189385c2f64 UPSTREAM: mm: kasan: use is_kernel() helper
bd28b243c5c7 UPSTREAM: arm64: mte: change PR_MTE_TCF_NONE back into an unsigned long
6b8cc5f60bb1 UPSTREAM: kasan: test: bypass __alloc_size checks
0c32aa8a236b UPSTREAM: kasan: test: add memcpy test that avoids out-of-bounds write
a68d14a0410f UPSTREAM: kasan: fix tag for large allocations when using CONFIG_SLAB
2f8e4638859e UPSTREAM: rcu: Avoid alloc_pages() when recording stack
507128e80070 UPSTREAM: workqueue, kasan: avoid alloc_pages() when recording stack
8064e9d4cd47 UPSTREAM: kasan: generic: introduce kasan_record_aux_stack_noalloc()
a5739cc487ef UPSTREAM: kasan: common: provide can_alloc in kasan_save_stack()
52d92e09e96e UPSTREAM: lib/stackdepot: introduce __stack_depot_save()
e6ce5b1fd624 UPSTREAM: lib/stackdepot: remove unused function argument
27afb7e2a515 UPSTREAM: lib/stackdepot: include gfp.h
66e9a387020e UPSTREAM: arm64: Track no early_pgtable_alloc() for kmemleak
54e74987eda3 UPSTREAM: kasan: Extend KASAN mode kernel parameter
caaa139dd2ed UPSTREAM: arm64: mte: Add asymmetric mode support
d43f48c05a9d UPSTREAM: arm64: mte: CPU feature detection for Asymm MTE
Test: treehugger
Bug: 221177147
Change-Id: Ice6d9bcc7f099cb61434a0bb0edbf8237c183f59
Diffstat (limited to 'virtio_net.ko')
-rw-r--r-- | virtio_net.ko | bin | 860824 -> 860912 bytes |
1 files changed, 0 insertions, 0 deletions
diff --git a/virtio_net.ko b/virtio_net.ko Binary files differindex 7252f68..d345730 100644 --- a/virtio_net.ko +++ b/virtio_net.ko |