lp:~cascardo/ubuntu/+source/linux/+git/jammy

Get this repository:
git clone https://git.not.enabled/~cascardo/ubuntu/+source/linux/+git/jammy
Only Thadeu Lima de Souza Cascardo can upload to this repository. If you are Thadeu Lima de Souza Cascardo please log in for upload directions.

Branches

Name Last Modified Last Commit
srso+master 2023-09-01 01:28:42 UTC
Ubuntu: [Config]: enable Speculative Return Stack Overflow mitigation

Author: Thadeu Lima de Souza Cascardo
Author Date: 2023-08-31 19:36:41 UTC

Ubuntu: [Config]: enable Speculative Return Stack Overflow mitigation

CVE-2023-20569

Signed-off-by: Thadeu Lima de Souza Cascardo <cascardo@canonical.com>

unfunnel 2022-03-31 12:41:43 UTC
bpf,x86: Respect X86_FEATURE_RETPOLINE*

Author: Peter Zijlstra
Author Date: 2021-10-26 12:01:48 UTC

bpf,x86: Respect X86_FEATURE_RETPOLINE*

BugLink: https://bugs.launchpad.net/bugs/1967579

Current BPF codegen doesn't respect X86_FEATURE_RETPOLINE* flags and
unconditionally emits a thunk call, this is sub-optimal and doesn't
match the regular, compiler generated, code.

Update the i386 JIT to emit code equal to what the compiler emits for
the regular kernel text (IOW. a plain THUNK call).

Update the x86_64 JIT to emit code similar to the result of compiler
and kernel rewrites as according to X86_FEATURE_RETPOLINE* flags.
Inlining RETPOLINE_AMD (lfence; jmp *%reg) and !RETPOLINE (jmp *%reg),
while doing a THUNK call for RETPOLINE.

This removes the hard-coded retpoline thunks and shrinks the generated
code. Leaving a single retpoline thunk definition in the kernel.

Signed-off-by: Peter Zijlstra (Intel) <peterz@infradead.org>
Reviewed-by: Borislav Petkov <bp@suse.de>
Acked-by: Alexei Starovoitov <ast@kernel.org>
Acked-by: Josh Poimboeuf <jpoimboe@redhat.com>
Tested-by: Alexei Starovoitov <ast@kernel.org>
Link: https://lore.kernel.org/r/20211026120310.614772675@infradead.org
(backported from commit 87c87ecd00c54ecd677798cb49ef27329e0fab41)
[cascardo: RETPOLINE_AMD was renamed to RETPOLINE_LFENCE]
Signed-off-by: Thadeu Lima de Souza Cascardo <cascardo@canonical.com>

spectre-bhb 2022-03-09 18:50:57 UTC
ARM: fix build error when BPF_SYSCALL is disabled

Author: Emmanuel Gil Peyrot
Author Date: 2022-03-08 19:18:20 UTC

ARM: fix build error when BPF_SYSCALL is disabled

commit 330f4c53d3c2d8b11d86ec03a964b86dc81452f5 upstream.

It was missing a semicolon.

Signed-off-by: Emmanuel Gil Peyrot <linkmauve@linkmauve.fr>
Reviewed-by: Nathan Chancellor <nathan@kernel.org>
Fixes: 25875aa71dfe ("ARM: include unprivileged BPF status in Spectre V2 reporting").
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
CVE-2022-23960
Signed-off-by: Thadeu Lima de Souza Cascardo <cascardo@canonical.com>

master-next 2022-03-09 14:20:40 UTC
UBUNTU: [Config] updateconfigs

Author: Paolo Pisati
Author Date: 2022-03-09 14:19:21 UTC

UBUNTU: [Config] updateconfigs

BugLink: https://bugs.launchpad.net/bugs/1964361

Signed-off-by: Paolo Pisati <paolo.pisati@canonical.com>

lowlatency-next 2022-02-08 14:59:44 UTC
UBUNTU: Ubuntu-lowlatency-5.15.0-22.22

Author: Paolo Pisati
Author Date: 2022-02-08 14:59:44 UTC

UBUNTU: Ubuntu-lowlatency-5.15.0-22.22

Signed-off-by: Paolo Pisati <paolo.pisati@canonical.com>

master 2021-10-07 09:09:51 UTC
UBUNTU: Ubuntu-5.13.0-19.19

Author: Andrea Righi
Author Date: 2021-10-07 09:09:51 UTC

UBUNTU: Ubuntu-5.13.0-19.19

Signed-off-by: Andrea Righi <andrea.righi@canonical.com>

16 of 6 results
This repository contains Public information 
Everyone can see this information.