27 Jun, 2014

40 commits

  • Greg Kroah-Hartman
     
  • commit 03787301420376ae41fbaf4267f4a6253d152ac5 upstream.

    Commit b1cb0982bdd6 ("change the management method of free objects of
    the slab") introduced a bug on slab leak detector
    ('/proc/slab_allocators'). This detector works like as following
    decription.

    1. traverse all objects on all the slabs.
    2. determine whether it is active or not.
    3. if active, print who allocate this object.

    but that commit changed the way how to manage free objects, so the logic
    determining whether it is active or not is also changed. In before, we
    regard object in cpu caches as inactive one, but, with this commit, we
    mistakenly regard object in cpu caches as active one.

    This intoduces kernel oops if DEBUG_PAGEALLOC is enabled. If
    DEBUG_PAGEALLOC is enabled, kernel_map_pages() is used to detect who
    corrupt free memory in the slab. It unmaps page table mapping if object
    is free and map it if object is active. When slab leak detector check
    object in cpu caches, it mistakenly think this object active so try to
    access object memory to retrieve caller of allocation. At this point,
    page table mapping to this object doesn't exist, so oops occurs.

    Following is oops message reported from Dave.

    It blew up when something tried to read /proc/slab_allocators
    (Just cat it, and you should see the oops below)

    Oops: 0000 [#1] PREEMPT SMP DEBUG_PAGEALLOC
    Modules linked in:
    [snip...]
    CPU: 1 PID: 9386 Comm: trinity-c33 Not tainted 3.14.0-rc5+ #131
    task: ffff8801aa46e890 ti: ffff880076924000 task.ti: ffff880076924000
    RIP: 0010:[] [] handle_slab+0x8a/0x180
    RSP: 0018:ffff880076925de0 EFLAGS: 00010002
    RAX: 0000000000001000 RBX: 0000000000000000 RCX: 000000005ce85ce7
    RDX: ffffea00079be100 RSI: 0000000000001000 RDI: ffff880107458000
    RBP: ffff880076925e18 R08: 0000000000000001 R09: 0000000000000000
    R10: 0000000000000000 R11: 000000000000000f R12: ffff8801e6f84000
    R13: ffffea00079be100 R14: ffff880107458000 R15: ffff88022bb8d2c0
    FS: 00007fb769e45740(0000) GS:ffff88024d040000(0000) knlGS:0000000000000000
    CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
    CR2: ffff8801e6f84ff8 CR3: 00000000a22db000 CR4: 00000000001407e0
    DR0: 0000000002695000 DR1: 0000000002695000 DR2: 0000000000000000
    DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000070602
    Call Trace:
    leaks_show+0xce/0x240
    seq_read+0x28e/0x490
    proc_reg_read+0x3d/0x80
    vfs_read+0x9b/0x160
    SyS_read+0x58/0xb0
    tracesys+0xd4/0xd9
    Code: f5 00 00 00 0f 1f 44 00 00 48 63 c8 44 3b 0c 8a 0f 84 e3 00 00 00 83 c0 01 44 39 c0 72 eb 41 f6 47 1a 01 0f 84 e9 00 00 00 89 f0 8b 4c 04 f8 4d 85 c9 0f 84 88 00 00 00 49 8b 7e 08 4d 8d 46
    RIP handle_slab+0x8a/0x180

    To fix the problem, I introduce an object status buffer on each slab.
    With this, we can track object status precisely, so slab leak detector
    would not access active object and no kernel oops would occur. Memory
    overhead caused by this fix is only imposed to CONFIG_DEBUG_SLAB_LEAK
    which is mainly used for debugging, so memory overhead isn't big
    problem.

    Signed-off-by: Joonsoo Kim
    Reported-by: Dave Jones
    Reported-by: Tetsuo Handa
    Reviewed-by: Vladimir Davydov
    Cc: Christoph Lameter
    Cc: Pekka Enberg
    Cc: David Rientjes
    Signed-off-by: Andrew Morton
    Signed-off-by: Linus Torvalds
    Signed-off-by: Greg Kroah-Hartman

    Joonsoo Kim
     
  • commit 13ace4d0d9db40e10ecd66dfda14e297571be813 upstream.

    I was well aware of FALLOC_FL_ZERO_RANGE and FALLOC_FL_COLLAPSE_RANGE
    support being added to fallocate(); but didn't realize until now that I
    had been too stupid to future-proof shmem_fallocate() against new
    additions. -EOPNOTSUPP instead of going on to ordinary fallocation.

    Signed-off-by: Hugh Dickins
    Reviewed-by: Lukas Czerner
    Signed-off-by: Andrew Morton
    Signed-off-by: Linus Torvalds
    Signed-off-by: Greg Kroah-Hartman

    Hugh Dickins
     
  • commit 883a1d49f0d77d30012f114b2e19fc141beb3e8e upstream.

    The ALSA control code expects that the range of assigned indices to a control is
    continuous and does not overflow. Currently there are no checks to enforce this.
    If a control with a overflowing index range is created that control becomes
    effectively inaccessible and unremovable since snd_ctl_find_id() will not be
    able to find it. This patch adds a check that makes sure that controls with a
    overflowing index range can not be created.

    Signed-off-by: Lars-Peter Clausen
    Acked-by: Jaroslav Kysela
    Signed-off-by: Takashi Iwai
    Signed-off-by: Greg Kroah-Hartman

    Lars-Peter Clausen
     
  • commit ac902c112d90a89e59916f751c2745f4dbdbb4bd upstream.

    Each control gets automatically assigned its numids when the control is created.
    The allocation is done by incrementing the numid by the amount of allocated
    numids per allocation. This means that excessive creation and destruction of
    controls (e.g. via SNDRV_CTL_IOCTL_ELEM_ADD/REMOVE) can cause the id to
    eventually overflow. Currently when this happens for the control that caused the
    overflow kctl->id.numid + kctl->count will also over flow causing it to be
    smaller than kctl->id.numid. Most of the code assumes that this is something
    that can not happen, so we need to make sure that it won't happen

    Signed-off-by: Lars-Peter Clausen
    Acked-by: Jaroslav Kysela
    Signed-off-by: Takashi Iwai
    Signed-off-by: Greg Kroah-Hartman

    Lars-Peter Clausen
     
  • commit fd9f26e4eca5d08a27d12c0933fceef76ed9663d upstream.

    A control that is visible on the card->controls list can be freed at any time.
    This means we must not access any of its memory while not holding the
    controls_rw_lock. Otherwise we risk a use after free access.

    Signed-off-by: Lars-Peter Clausen
    Acked-by: Jaroslav Kysela
    Signed-off-by: Takashi Iwai
    Signed-off-by: Greg Kroah-Hartman

    Lars-Peter Clausen
     
  • commit 82262a46627bebb0febcc26664746c25cef08563 upstream.

    There are two issues with the current implementation for replacing user
    controls. The first is that the code does not check if the control is actually a
    user control and neither does it check if the control is owned by the process
    that tries to remove it. That allows userspace applications to remove arbitrary
    controls, which can cause a user after free if a for example a driver does not
    expect a control to be removed from under its feed.

    The second issue is that on one hand when a control is replaced the
    user_ctl_count limit is not checked and on the other hand the user_ctl_count is
    increased (even though the number of user controls does not change). This allows
    userspace, once the user_ctl_count limit as been reached, to repeatedly replace
    a control until user_ctl_count overflows. Once that happens new controls can be
    added effectively bypassing the user_ctl_count limit.

    Both issues can be fixed by instead of open-coding the removal of the control
    that is to be replaced to use snd_ctl_remove_user_ctl(). This function does
    proper permission checks as well as decrements user_ctl_count after the control
    has been removed.

    Note that by using snd_ctl_remove_user_ctl() the check which returns -EBUSY at
    beginning of the function if the control already exists is removed. This is not
    a problem though since the check is quite useless, because the lock that is
    protecting the control list is released between the check and before adding the
    new control to the list, which means that it is possible that a different
    control with the same settings is added to the list after the check. Luckily
    there is another check that is done while holding the lock in snd_ctl_add(), so
    we'll rely on that to make sure that the same control is not added twice.

    Signed-off-by: Lars-Peter Clausen
    Acked-by: Jaroslav Kysela
    Signed-off-by: Takashi Iwai
    Signed-off-by: Greg Kroah-Hartman

    Lars-Peter Clausen
     
  • commit 07f4d9d74a04aa7c72c5dae0ef97565f28f17b92 upstream.

    The user-control put and get handlers as well as the tlv do not protect against
    concurrent access from multiple threads. Since the state of the control is not
    updated atomically it is possible that either two write operations or a write
    and a read operation race against each other. Both can lead to arbitrary memory
    disclosure. This patch introduces a new lock that protects user-controls from
    concurrent access. Since applications typically access controls sequentially
    than in parallel a single lock per card should be fine.

    Signed-off-by: Lars-Peter Clausen
    Acked-by: Jaroslav Kysela
    Signed-off-by: Takashi Iwai
    Signed-off-by: Greg Kroah-Hartman

    Lars-Peter Clausen
     
  • commit 2041d56464a067461d7cc21734a0f024587ed2ff upstream.

    According to the bug reporter (Данило Шеган), the external mic
    starts to work and has proper jack detection if only pin 0x19
    is marked properly as an external headset mic.

    AlsaInfo at https://bugs.launchpad.net/ubuntu/+source/pulseaudio/+bug/1328587/+attachment/4128991/+files/AlsaInfo.txt

    BugLink: https://bugs.launchpad.net/bugs/1328587
    Signed-off-by: David Henningsson
    Signed-off-by: Takashi Iwai
    Signed-off-by: Greg Kroah-Hartman

    David Henningsson
     
  • commit b4f75aea553a2146bbdd159c397a2ac42cbb9902 upstream.

    This patch will verify the pin's coverter selection for an active stream
    when an unsol event reports this pin becomes available again after a display
    mode change or hot-plug event.

    For Haswell+ and Valleyview: display mode change or hot-plug can change the
    transcoder:port connection and make all the involved audio pins share the 1st
    converter. So the stream using 1st convertor will flow to multiple pins
    but active streams using other converters will fail. This workaround
    is to assure the pin selects the right conveter and an assigned converter is
    not shared by other unused pins.

    Signed-off-by: Mengdong Lin
    Signed-off-by: Takashi Iwai
    Signed-off-by: Greg Kroah-Hartman

    Mengdong Lin
     
  • commit 8a02b164d4bfac108bfe37e98108bff1e062bd3d upstream.

    More HP machine need mute led support.

    Signed-off-by: Kailang Yang
    Signed-off-by: Takashi Iwai
    Signed-off-by: Greg Kroah-Hartman

    Kailang Yang
     
  • commit b6c5fbad16aa5026f508093a8d651c25e1cb6179 upstream.

    New codec support for ALC891.

    Signed-off-by: Kailang Yang
    Signed-off-by: Takashi Iwai
    Signed-off-by: Greg Kroah-Hartman

    Kailang Yang
     
  • commit 2bd0ae464a6cf7363bbf72c8545e0aa43caa57f0 upstream.

    Cancel the optimization of compiler for struct snd_compr_avail
    which size will be 0x1c in 32bit kernel while 0x20 in 64bit
    kernel under the optimizer. That will make compaction between
    32bit and 64bit. So add packed to fix the size of struct
    snd_compr_avail to 0x1c for all platform.

    Signed-off-by: Zhang Dongxing
    Signed-off-by: xiaoming wang
    Acked-by: Vinod Koul
    Signed-off-by: Takashi Iwai
    Signed-off-by: Greg Kroah-Hartman

    Wang, Xiaoming
     
  • commit 206204a1162b995e2185275167b22468c00d6b36 upstream.

    Given some pathologically compressed data, lz4 could possibly decide to
    wrap a few internal variables, causing unknown things to happen. Catch
    this before the wrapping happens and abort the decompression.

    Reported-by: "Don A. Bailey"
    Signed-off-by: Greg Kroah-Hartman

    Greg Kroah-Hartman
     
  • commit 206a81c18401c0cde6e579164f752c4b147324ce upstream.

    The lzo decompressor can, if given some really crazy data, possibly
    overrun some variable types. Modify the checking logic to properly
    detect overruns before they happen.

    Reported-by: "Don A. Bailey"
    Tested-by: "Don A. Bailey"
    Signed-off-by: Greg Kroah-Hartman

    Greg Kroah-Hartman
     
  • commit d29f592929489d0a7c414396fae28119f3d280e1 upstream.

    (i) pressure is 20-bit unsigned, not signed; the buffer description
    is incorrect; for raw reads, this is just cosmetic

    (ii) temperature is 12-bit signed, not 16-bit; this affects
    readout of temperatures below zero as the sign bit is incorrectly
    processed

    reported via private mail

    Signed-off-by: Peter Meerwald
    Reported-by: Robert Deliën
    Signed-off-by: Jonathan Cameron
    Signed-off-by: Greg Kroah-Hartman

    Peter Meerwald
     
  • commit 8ba42fb7b17649c9ab5b5e79d4e90370a0b4645e upstream.

    i2c_smbus_read_word_data() does host endian conversion already,
    no need for le16_to_cpu()

    Signed-off-by: Peter Meerwald
    Signed-off-by: Jonathan Cameron
    Signed-off-by: Greg Kroah-Hartman

    Peter Meerwald
     
  • commit 4f3bcd878f1d3c730fe00f619b7260c6125d49eb upstream.

    at91_adc_get_trigger_value_by_name() was returning -ENOMEM truncated to
    a positive u8 and that doesn't work. I've changed it to int and
    refactored it to preserve the error code.

    Signed-off-by: Dan Carpenter
    Acked-by: Alexandre Belloni
    Tested-by: Alexandre Belloni
    Signed-off-by: Jonathan Cameron
    Signed-off-by: Greg Kroah-Hartman

    Dan Carpenter
     
  • commit 19bc4981a213d0c5b0e1e8b08815c0b26f01ec54 upstream.

    All channels' single measurement are happening on CH 0. So enabling / disabling
    the divider once is not enough, because it has impact on all channels.

    Set only a flag, then check this on each measurement, and enable / disable the
    divider as required.

    Signed-off-by: Robert Hodaszi
    Acked-by: Alexandre Belloni
    Acked-by: Marek Vasut
    Signed-off-by: Jonathan Cameron
    Signed-off-by: Greg Kroah-Hartman

    Robert Hodaszi
     
  • commit e94f62e79f7f63a68574ee5e76c19837ec12f3db upstream.

    mcb_request_mem() returns an ERR_PTR(), it doesn't return NULL.

    Fixes: 74aeac4da66f ('iio: adc: Add MEN 16z188 ADC driver')
    Signed-off-by: Dan Carpenter
    Signed-off-by: Jonathan Cameron
    Signed-off-by: Greg Kroah-Hartman

    Dan Carpenter
     
  • commit c404618cd06dad771495fe1cf9d5a63b5664f65f upstream.

    Consider high byte of proximity min and max treshold in function
    'tsl2x7x_chip_on'. So far, the high byte was not set.

    Signed-off-by: Mario Schuknecht
    Signed-off-by: Jonathan Cameron
    Signed-off-by: Greg Kroah-Hartman

    Mario Schuknecht
     
  • commit a91a73c8b39a6b8bcc53fafa5372c65387c81233 upstream.

    Reported-by: Erik Habbinga
    Signed-off-by: Jonathan Cameron
    Acked-by: Hartmut Knaack
    Signed-off-by: Greg Kroah-Hartman

    Jonathan Cameron
     
  • commit e6c111fac4464e3f4bf7b3802b517dafc80f8e0f upstream.

    For some unknown reason the parameters for snd_soc_test_bits() were in wrong
    order:
    It was:
    snd_soc_test_bits(codec, val, mask, reg); /* WRONG!!! */
    while it should be:
    snd_soc_test_bits(codec, reg, mask, val);

    Signed-off-by: Peter Ujfalusi
    Signed-off-by: Mark Brown
    Signed-off-by: Greg Kroah-Hartman

    Peter Ujfalusi
     
  • commit 25b4ab430f8e166c9b63f4db28e7e812d5a59396 upstream.

    Reset needs to wait 20ms before other codec IO is performed. This wait
    was not being performed. Fix this by making sure the reset register is not
    restored with the cache, but use the manual reset method in resume with
    the wait.

    Signed-off-by: Liam Girdwood
    Signed-off-by: Jarkko Nikula
    Signed-off-by: Mark Brown
    Signed-off-by: Greg Kroah-Hartman

    Liam Girdwood
     
  • commit c9e065c27fe9b81e5d6e7681d77a24f7b9616675 upstream.

    When using auto-muted controls it may happen that the register value will not
    change when changing a control from enabled to disabled (since the control might
    be physically disabled due to the auto-muting). We have to make sure to still
    update the DAPM graph and disconnect the mixer input.

    Fixes: commit 5729507 ("ASoC: dapm: Implement mixer input auto-disable")
    Signed-off-by: Lars-Peter Clausen
    Signed-off-by: Mark Brown
    Signed-off-by: Greg Kroah-Hartman

    Lars-Peter Clausen
     
  • commit a100d88df1e924e5c9678fabf054d1bae7ab74fb upstream.

    We try to free two pages when only one has been allocated.
    Cleanup path is unlikely, so I haven't found any trace that would fit,
    but I hope that free_pages_prepare() does catch it.

    Signed-off-by: Radim Krčmář
    Reviewed-by: Amos Kong
    Acked-by: Jason Wang
    Signed-off-by: Greg Kroah-Hartman

    Radim Krčmář
     
  • commit ae339336dc950b9b05e7ccd3565dd3e8781c06d9 upstream.

    The current code posts periodic memory pressure status from a dedicated thread.
    Under some conditions, especially when we are releasing a lot of memory into
    the guest, we may not send timely pressure reports back to the host. Fix this
    issue by reporting pressure in all contexts that can be active in this driver.

    Signed-off-by: K. Y. Srinivasan
    Signed-off-by: Greg Kroah-Hartman

    K. Y. Srinivasan
     
  • commit 5292afa657d0e790b7479ad8eef9450c1e040b3d upstream.

    Make sure only to decrement the PM counters if they were actually
    incremented.

    Note that the USB PM counter, but not necessarily the driver core PM
    counter, is reset when the interface is unbound.

    Fixes: 11ea859d64b6 ("USB: additional power savings for cdc-acm devices
    that support remote wakeup")

    Signed-off-by: Johan Hovold
    Signed-off-by: Greg Kroah-Hartman

    Johan Hovold
     
  • commit e4c36076c2a6195ec62c35b03c3fde84d0087dc8 upstream.

    Make sure to kill any already submitted read urbs on read-urb submission
    failures in open in order to prevent doing I/O for a closed port.

    Fixes: 088c64f81284 ("USB: cdc-acm: re-write read processing")
    Signed-off-by: Johan Hovold
    Signed-off-by: Greg Kroah-Hartman

    Johan Hovold
     
  • commit 8727bf689a77a79816065e23a7a58a474ad544f9 upstream.

    Fix errors during open not being returned to userspace. Specifically,
    failed control-line manipulations or control or read urb submissions
    would not be detected.

    Fixes: 7fb57a019f94 ("USB: cdc-acm: Fix potential deadlock (lockdep
    warning)")

    Signed-off-by: Johan Hovold
    Signed-off-by: Greg Kroah-Hartman

    Johan Hovold
     
  • commit 703df3297fb1950b0aa53e656108eb936d3f21d9 upstream.

    We must not do the usb_autopm_put_interface() before submitting the read
    urbs or we might end up doing I/O to a suspended device.

    Fixes: 088c64f81284 ("USB: cdc-acm: re-write read processing")
    Signed-off-by: Johan Hovold
    Signed-off-by: Greg Kroah-Hartman

    Johan Hovold
     
  • commit 183a45087d126d126e8dd1d9b2602fc129dff9ad upstream.

    Make sure to check return value of autopm get in write() in order to
    avoid urb leak and PM counter imbalance on errors.

    Fixes: 11ea859d64b6 ("USB: additional power savings for cdc-acm devices
    that support remote wakeup")

    Signed-off-by: Johan Hovold
    Signed-off-by: Greg Kroah-Hartman

    Johan Hovold
     
  • commit ed797074031a37bb9bf4a70952fffc606b77274d upstream.

    We should stop I/O unconditionally at suspend rather than rely on the
    tty-port initialised flag (which is set prior to stopping I/O during
    shutdown) in order to prevent suspend returning with URBs still active.

    Fixes: 11ea859d64b6 ("USB: additional power savings for cdc-acm devices
    that support remote wakeup")

    Signed-off-by: Johan Hovold
    Signed-off-by: Greg Kroah-Hartman

    Johan Hovold
     
  • commit bae3f4c53585e9a170da9436e0f06919874bda9a upstream.

    Fix runtime PM handling of control messages by adding the required PM
    counter operations.

    Fixes: 11ea859d64b6 ("USB: additional power savings for cdc-acm devices
    that support remote wakeup")

    Signed-off-by: Johan Hovold
    Signed-off-by: Greg Kroah-Hartman

    Johan Hovold
     
  • commit 140cb81ac8c625942a1d695875932c615767a526 upstream.

    The current ACM runtime-suspend implementation is broken in several
    ways:

    Firstly, it buffers only the first write request being made while
    suspended -- any further writes are silently dropped.

    Secondly, writes being dropped also leak write urbs, which are never
    reclaimed (until the device is unbound).

    Thirdly, even the single buffered write is not cleared at shutdown
    (which may happen before the device is resumed), something which can
    lead to another urb leak as well as a PM usage-counter leak.

    Fix this by implementing a delayed-write queue using urb anchors and
    making sure to discard the queue properly at shutdown.

    Fixes: 11ea859d64b6 ("USB: additional power savings for cdc-acm devices
    that support remote wakeup")

    Reported-by: Xiao Jin
    Signed-off-by: Johan Hovold
    Signed-off-by: Greg Kroah-Hartman

    Johan Hovold
     
  • commit e144ed28bed10684f9aaec6325ed974d53f76110 upstream.

    Fix race between write() and resume() due to improper locking that could
    lead to writes being reordered.

    Resume must be done atomically and susp_count be protected by the
    write_lock in order to prevent racing with write(). This could otherwise
    lead to writes being reordered if write() grabs the write_lock after
    susp_count is decremented, but before the delayed urb is submitted.

    Fixes: 11ea859d64b6 ("USB: additional power savings for cdc-acm devices
    that support remote wakeup")

    Signed-off-by: Johan Hovold
    Signed-off-by: Greg Kroah-Hartman

    Johan Hovold
     
  • commit 5a345c20c17d87099224a4be12e69e5bd7023dca upstream.

    Fix race between write() and suspend() which could lead to writes being
    dropped (or I/O while suspended) if the device is runtime suspended
    while a write request is being processed.

    Specifically, suspend() releases the write_lock after determining the
    device is idle but before incrementing the susp_count, thus leaving a
    window where a concurrent write() can submit an urb.

    Fixes: 11ea859d64b6 ("USB: additional power savings for cdc-acm devices
    that support remote wakeup")

    Signed-off-by: Johan Hovold
    Signed-off-by: Greg Kroah-Hartman

    Johan Hovold
     
  • commit 7006e2dfda9adfa40251093604db76d7e44263b3 upstream.

    Each MIPS KVM guest has its own copy of the KVM exception vector. This
    contains the TLB refill exception handler at offset 0x000, the general
    exception handler at offset 0x180, and interrupt exception handlers at
    offset 0x200 in case Cause_IV=1. A common handler is copied to offset
    0x2000 and offset 0x3000 is used for temporarily storing k1 during entry
    from guest.

    However the amount of memory allocated for this purpose is calculated as
    0x200 rounded up to the next page boundary, which is insufficient if 4KB
    pages are in use. This can lead to the common handler at offset 0x2000
    being overwritten and infinitely recursive exceptions on the next exit
    from the guest.

    Increase the minimum size from 0x200 to 0x4000 to cover the full use of
    the page.

    Signed-off-by: James Hogan
    Cc: Paolo Bonzini
    Cc: Gleb Natapov
    Cc: kvm@vger.kernel.org
    Cc: Ralf Baechle
    Cc: linux-mips@linux-mips.org
    Cc: Sanjay Lal
    Signed-off-by: Paolo Bonzini
    Signed-off-by: Greg Kroah-Hartman

    James Hogan
     
  • commit 67335e63c9ef59e97b45a08b4a6a93767762031d upstream.

    On hard exits (abort, sigkill) we have have some kvm_s390_interrupt_info
    structures hanging around. Delete those on exit to avoid memory leaks.

    Signed-off-by: Christian Borntraeger
    Reviewed-by: Thomas Huth
    Signed-off-by: Greg Kroah-Hartman

    Christian Borntraeger
     
  • commit fc57ac2c9ca8109ea97fcc594f4be436944230cc upstream.

    When Hyper-V enlightenments are in effect, Windows prefers to issue an
    Hyper-V MSR write to issue an EOI rather than an x2apic MSR write.
    The Hyper-V MSR write is not handled by the processor, and besides
    being slower, this also causes bugs with APIC virtualization. The
    reason is that on EOI the processor will modify the highest in-service
    interrupt (SVI) field of the VMCS, as explained in section 29.1.4 of
    the SDM; every other step in EOI virtualization is already done by
    apic_send_eoi or on VM entry, but this one is missing.

    We need to do the same, and be careful not to muck with the isr_count
    and highest_isr_cache fields that are unused when virtual interrupt
    delivery is enabled.

    Reviewed-by: Yang Zhang
    Signed-off-by: Paolo Bonzini
    Signed-off-by: Greg Kroah-Hartman

    Paolo Bonzini