lp:~kmously/ubuntu/+source/linux/+git/jammy

Owned by Khaled El Mously
Get this repository:
git clone https://git.not.enabled/~kmously/ubuntu/+source/linux/+git/jammy
Only Khaled El Mously can upload to this repository. If you are Khaled El Mously please log in for upload directions.

Branches

Name Last Modified Last Commit
oracle-6.2-2 2023-07-31 07:01:04 UTC
UBUNTU: Ubuntu-oracle-6.2-6.2.0-1009.9~22.04.2

Author: Khaled El Mously
Author Date: 2023-07-31 02:22:39 UTC

UBUNTU: Ubuntu-oracle-6.2-6.2.0-1009.9~22.04.2

Signed-off-by: Khalid Elmously <khalid.elmously@canonical.com>

oracle-6.2 2023-07-31 03:08:41 UTC
UBUNTU: Ubuntu-oracle-6.2-6.2.0-1009.9~22.04.1

Author: Khaled El Mously
Author Date: 2023-07-31 02:22:39 UTC

UBUNTU: Ubuntu-oracle-6.2-6.2.0-1009.9~22.04.1

Signed-off-by: Khalid Elmously <khalid.elmously@canonical.com>

gcp-6.2 2023-05-29 05:21:12 UTC
UBUNTU: Ubuntu-gcp-6.2-6.2.0-1006.6~22.04.1

Author: Khaled El Mously
Author Date: 2023-05-29 05:21:12 UTC

UBUNTU: Ubuntu-gcp-6.2-6.2.0-1006.6~22.04.1

Signed-off-by: Khalid Elmously <khalid.elmously@canonical.com>

gcp-tcp-direct 2023-05-03 09:50:13 UTC
net: keep track and avoid access of skb containing dma-buf pages.

Author: Kaiyuan Zhang
Author Date: 2022-11-18 21:40:43 UTC

net: keep track and avoid access of skb containing dma-buf pages.

Add checks through the network stack to avoid kmap()ing content
of the frags of devmem skbs.

Technically, whether or not data can be coalesced is a matter of
individual frag pages more than of the skb. An skb can combine
regular pages and dmabuf pages in principle, but in this current
implementation the skb->devmem flag either indicates that _all_ the
pages are devmem pages or none of them are. In the future skbs with
mixed page types can be added.

Change-Id: Iea6f5ea36b29333af11660666249f85c9c26d7dd
(cherry picked from commit 797936b45de798e0c22ecc39ff8d1e7b9e96b1cf)
(cherry picked from commit 24d5898a96b94de17997a1417b5c6ecd0ee1c9e9)
Signed-off-by: Khalid Elmously <khalid.elmously@canonical.com>

gcp-5.19-bringup 2023-03-09 07:29:59 UTC
UBUNTU: Ubuntu-gcp-5.19-5.19.0-1019.21~22.04.1

Author: Khaled El Mously
Author Date: 2023-03-09 06:49:00 UTC

UBUNTU: Ubuntu-gcp-5.19-5.19.0-1019.21~22.04.1

Signed-off-by: Khalid Elmously <khalid.elmously@canonical.com>

gcp-5.19 2023-03-09 07:29:59 UTC
UBUNTU: Ubuntu-gcp-5.19-5.19.0-1019.21~22.04.1

Author: Khaled El Mously
Author Date: 2023-03-09 06:49:00 UTC

UBUNTU: Ubuntu-gcp-5.19-5.19.0-1019.21~22.04.1

Signed-off-by: Khalid Elmously <khalid.elmously@canonical.com>

snp-vuln-fix 2023-02-10 03:10:44 UTC
virt: sev-guest: self-throttle guest request retries

Author: Dionna Glaze
Author Date: 2023-01-24 21:14:55 UTC

virt: sev-guest: self-throttle guest request retries

When throttled, the driver will reschedule itself and then try
again after sleeping half its ratelimit time to avoid a big wait queue.
The ioctl may block indefinitely, but that has always been the case
when deferring these requests to the host.

Cc: Tom Lendacky <Thomas.Lendacky@amd.com>
Cc: Peter Gonda <pgonda@google.com>
Cc: Borislav Petkov <Borislav.Petkov@amd.com>
Cc: Tom Lendacky <thomas.lendacky@amd.com>
Cc: Liam Merwick <liam.merwick@oracle.com>
Cc: Yang Yingliang <yangyingliang@huawei.com>
Cc: Haowen Bai <baihaowen@meizu.com>

Signed-off-by: Dionna Glaze <dionnaglaze@google.com>
Signed-off-by: Khalid Elmously <khalid.elmously@canonical.com>

dionna-1 2023-02-09 07:37:47 UTC
crypto: ccp - Name -1 return value as SEV_RET_NO_FW_CALL

Author: Peter Gonda
Author Date: 2023-01-24 21:14:53 UTC

crypto: ccp - Name -1 return value as SEV_RET_NO_FW_CALL

The PSP can return a "firmware error" code of -1 in circumstances where
the PSP is not actually called. To make this protocol unambiguous, the
value is named SEV_RET_NO_FW_CALL.

Cc: Thomas Lendacky <Thomas.Lendacky@amd.com>
Cc: Paolo Bonzini <pbonzini@redhat.com>
Cc: Joerg Roedel <jroedel@suse.de>
Cc: Ingo Molnar <mingo@redhat.com>
Cc: Andy Lutomirsky <luto@kernel.org>
Cc: John Allen <john.allen@amd.com>
Cc: Herbert Xu <herbert@gondor.apana.org.au>
Cc: "David S. Miller" <davem@davemloft.net>
Cc: Borislav Petkov <Borislav.Petkov@amd.com>

Signed-off-by: Peter Gonda <pgonda@google.com>
Signed-off-by: Dionna Glaze <dionnaglaze@google.com>
Signed-off-by: Khalid Elmously <khalid.elmously@canonical.com>

snp-vuln-fix2 2023-02-09 03:11:19 UTC
virt/coco/sev-guest: Add throttling awareness

Author: Dionna Glaze
Author Date: 2023-01-24 21:14:52 UTC

virt/coco/sev-guest: Add throttling awareness

The host is permitted and encouraged to throttle guest requests to the
AMD-SP since it is a shared resource across all VMs. Without
throttling-awareness, the host returning an error will immediately lock
out access to the VMPCK, which makes the VM less useful as it can't
attest itself. Since throttling is expected to be a common occurrence, a
cooperative host can return a VMM error code that the request was
throttled.

The driver interprets the upper 32 bits of exitinfo2 as a VMM error code.
For safety, since the encryption algorithm in GHCBv2 is AES_GCM, control
must remain in the kernel to complete the request with the current
sequence number. Returning without finishing the request allows the the
guest to make another request but with different message contents. This
is IV reuse, and breaks cryptographic protections.

A guest request may not make it to the AMD-SP before the host returns to
the guest, so the err local variable in handle_guest_request must be
initialized the same way fw_err is. snp_issue_guest_request similarly
should set fw_err whether or not the value is non-zero, in order to
appropriately clear the error value when zero.

Cc: Tom Lendacky <Thomas.Lendacky@amd.com>
Cc: Paolo Bonzini <pbonzini@redhat.com>
Cc: Joerg Roedel <jroedel@suse.de>
Cc: Peter Gonda <pgonda@google.com>
Cc: Thomas Gleixner <tglx@linutronix.de>
Cc: Dave Hansen <dave.hansen@linux.intel.com>
Cc: Ingo Molnar <mingo@redhat.com>
Cc: Borislav Petkov <Borislav.Petkov@amd.com>
Cc: "H. Peter Anvin" <hpa@zytor.com>
Cc: Venu Busireddy <venu.busireddy@oracle.com>
Cc: Michael Roth <michael.roth@amd.com>
Cc: "Kirill A. Shutemov" <kirill@shutemov.name>
Cc: Michael Sterritt <sterritt@google.com>

Fixes: d5af44dde546 ("x86/sev: Provide support for SNP guest request
NAEs")

Signed-off-by: Dionna Glaze <dionnaglaze@google.com>
Signed-off-by: Khalid Elmously <khalid.elmously@canonical.com>

gcp-sev-snp 2023-01-17 06:46:20 UTC
UBUNTU: [config] Enable SEV_GUEST

Author: Khaled El Mously
Author Date: 2022-04-21 05:23:56 UTC

UBUNTU: [config] Enable SEV_GUEST

BugLink: http://bugs.launchpad.net/bugs/2001605

Signed-off-by: Khalid Elmously <khalid.elmously@canonical.com>

gvnic-update 2022-10-12 02:50:36 UTC
gve: Add tx|rx-coalesce-usec for DQO

Author: Tao Liu
Author Date: 2021-12-16 00:46:52 UTC

gve: Add tx|rx-coalesce-usec for DQO

BugLink: https://bugs.launchpad.net/bugs/1953575

Adding ethtool support for changing rx-coalesce-usec and tx-coalesce-usec
when using the DQO queue format.

Signed-off-by: Tao Liu <xliutaox@google.com>
Signed-off-by: Jeroen de Borst <jeroendb@google.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
(cherry picked from commit 6081ac2013ab9f1a8743f90ef13d973888359cda)
Signed-off-by: Khalid Elmously <khalid.elmously@canonical.com>

gkeop-next 2022-06-29 01:01:23 UTC
UBUNTU: Ubuntu-gkeop-5.15.0-1001.1

Author: Khaled El Mously
Author Date: 2022-06-29 01:01:23 UTC

UBUNTU: Ubuntu-gkeop-5.15.0-1001.1

Signed-off-by: Khalid Elmously <khalid.elmously@canonical.com>

sev 2022-04-28 01:06:29 UTC
Update version number to avoid conflicting with released jammy kernels

Author: Khaled El Mously
Author Date: 2022-04-28 01:06:29 UTC

Update version number to avoid conflicting with released jammy kernels

Signed-off-by: Khalid Elmously <khalid.elmously@canonical.com>

sev-try-3 2022-04-05 03:44:59 UTC
virt: sevguest: Add documentation for SEV-SNP CPUID Enforcement

Author: Michael Roth
Author Date: 2022-01-26 15:42:16 UTC

virt: sevguest: Add documentation for SEV-SNP CPUID Enforcement

Update the documentation with information regarding SEV-SNP CPUID
Enforcement details and what sort of assurances it provides to guests.

Signed-off-by: Michael Roth <michael.roth@amd.com>
Signed-off-by: Brijesh Singh <brijesh.singh@amd.com>
(cherry picked from commit 20d8ab8889d7b8b47e1361e73c9633d40d5426a1)
Signed-off-by: Khalid Elmously <khalid.elmously@canonical.com>

gke 2022-02-24 06:51:09 UTC
UBUNTU: Ubuntu-gke-5.15.0-1001.1

Author: Khaled El Mously
Author Date: 2022-02-24 06:50:10 UTC

UBUNTU: Ubuntu-gke-5.15.0-1001.1

Signed-off-by: Khalid Elmously <khalid.elmously@canonical.com>

115 of 15 results
This repository contains Public information 
Everyone can see this information.

Subscribers