lp:~kmously/ubuntu/+source/linux/+git/focal

Owned by Khaled El Mously
Get this repository:
git clone https://git.launchpad.net/~kmously/ubuntu/+source/linux/+git/focal
Only Khaled El Mously can upload to this repository. If you are Khaled El Mously please log in for upload directions.

Branches

Name Last Modified Last Commit
oracle-5.13 2021-12-02 19:12:38 UTC
UBUNTU: Ubuntu-oracle-5.13-5.13.0-1011.13~20.04.1

Author: Khaled El Mously
Author Date: 2021-12-02 19:12:38 UTC

UBUNTU: Ubuntu-oracle-5.13-5.13.0-1011.13~20.04.1

Signed-off-by: Khalid Elmously <khalid.elmously@canonical.com>

gcp-5.13 2021-12-02 09:32:57 UTC
UBUNTU: Ubuntu-gcp-5.13-5.13.0-1008.9~20.04.1

Author: Khaled El Mously
Author Date: 2021-12-02 09:31:23 UTC

UBUNTU: Ubuntu-gcp-5.13-5.13.0-1008.9~20.04.1

Signed-off-by: Khalid Elmously <khalid.elmously@canonical.com>

temp-sev-live-migration-1 2021-10-14 06:55:48 UTC
KVM: X86: Introduce KVM_HC_MAP_GPA_RANGE hypercall

Author: Ashish Kalra
Author Date: 2021-06-08 18:05:43 UTC

KVM: X86: Introduce KVM_HC_MAP_GPA_RANGE hypercall

This hypercall is used by the SEV guest to notify a change in the page
encryption status to the hypervisor. The hypercall should be invoked
only when the encryption attribute is changed from encrypted -> decrypted
and vice versa. By default all guest pages are considered encrypted.

The hypercall exits to userspace to manage the guest shared regions and
integrate with the userspace VMM's migration code.

Cc: Thomas Gleixner <tglx@linutronix.de>
Cc: Ingo Molnar <mingo@redhat.com>
Cc: "H. Peter Anvin" <hpa@zytor.com>
Cc: Paolo Bonzini <pbonzini@redhat.com>
Cc: Joerg Roedel <joro@8bytes.org>
Cc: Borislav Petkov <bp@suse.de>
Cc: Tom Lendacky <thomas.lendacky@amd.com>
Cc: x86@kernel.org
Cc: kvm@vger.kernel.org
Cc: linux-kernel@vger.kernel.org
Reviewed-by: Steve Rutherford <srutherford@google.com>
Signed-off-by: Brijesh Singh <brijesh.singh@amd.com>
Signed-off-by: Ashish Kalra <ashish.kalra@amd.com>
Co-developed-by: Sean Christopherson <seanjc@google.com>
Signed-off-by: Sean Christopherson <seanjc@google.com>
Co-developed-by: Paolo Bonzini <pbonzini@redhat.com>
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
Message-Id: <90778988e1ee01926ff9cac447aacb745f954c8c.1623174621.git.ashish.kalra@amd.com>
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
(backported from commit 0dbb11230437895f7cd6fc55da61cef011e997d8)
[ kmously: many context changes and missing features ]
Signed-off-by: Khalid Elmously <khalid.elmously@canonical.com>

temp-gcp-1 2021-10-14 03:16:23 UTC
swiotlb: manipulate orig_addr when tlb_addr has offset

Author: Bumyong Lee
Author Date: 2021-05-10 09:10:04 UTC

swiotlb: manipulate orig_addr when tlb_addr has offset

BugLink: https://bugs.launchpad.net/bugs/1943902

in case of driver wants to sync part of ranges with offset,
swiotlb_tbl_sync_single() copies from orig_addr base to tlb_addr with
offset and ends up with data mismatch.

It was removed from
"swiotlb: don't modify orig_addr in swiotlb_tbl_sync_single",
but said logic has to be added back in.

From Linus's email:
"That commit which the removed the offset calculation entirely, because the old

        (unsigned long)tlb_addr & (IO_TLB_SIZE - 1)

was wrong, but instead of removing it, I think it should have just
fixed it to be

        (tlb_addr - mem->start) & (IO_TLB_SIZE - 1);

instead. That way the slot offset always matches the slot index calculation."

(Unfortunatly that broke NVMe).

The use-case that drivers are hitting is as follow:

1. Get dma_addr_t from dma_map_single()

dma_addr_t tlb_addr = dma_map_single(dev, vaddr, vsize, DMA_TO_DEVICE);

    |<---------------vsize------------->|
    +-----------------------------------+
    | | original buffer
    +-----------------------------------+
  vaddr

 swiotlb_align_offset
     |<----->|<---------------vsize------------->|
     +-------+-----------------------------------+
     | | | swiotlb buffer
     +-------+-----------------------------------+
          tlb_addr

2. Do something
3. Sync dma_addr_t through dma_sync_single_for_device(..)

dma_sync_single_for_device(dev, tlb_addr + offset, size, DMA_TO_DEVICE);

  Error case.
    Copy data to original buffer but it is from base addr (instead of
  base addr + offset) in original buffer:

 swiotlb_align_offset
     |<----->|<- offset ->|<- size ->|
     +-------+-----------------------------------+
     | | |##########| | swiotlb buffer
     +-------+-----------------------------------+
          tlb_addr

    |<- size ->|
    +-----------------------------------+
    |##########| | original buffer
    +-----------------------------------+
  vaddr

The fix is to copy the data to the original buffer and take into
account the offset, like so:

 swiotlb_align_offset
     |<----->|<- offset ->|<- size ->|
     +-------+-----------------------------------+
     | | |##########| | swiotlb buffer
     +-------+-----------------------------------+
          tlb_addr

    |<- offset ->|<- size ->|
    +-----------------------------------+
    | |##########| | original buffer
    +-----------------------------------+
  vaddr

[One fix which was Linus's that made more sense to as it created a
symmetry would break NVMe. The reason for that is the:
 unsigned int offset = (tlb_addr - mem->start) & (IO_TLB_SIZE - 1);

would come up with the proper offset, but it would lose the
alignment (which this patch contains).]

Fixes: 16fc3cef33a0 ("swiotlb: don't modify orig_addr in swiotlb_tbl_sync_single")
Signed-off-by: Bumyong Lee <bumyong.lee@samsung.com>
Signed-off-by: Chanho Park <chanho61.park@samsung.com>
Reviewed-by: Christoph Hellwig <hch@lst.de>
Reported-by: Dominique MARTINET <dominique.martinet@atmark-techno.com>
Reported-by: Horia Geantă <horia.geanta@nxp.com>
Tested-by: Horia Geantă <horia.geanta@nxp.com>
CC: stable@vger.kernel.org
Signed-off-by: Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>
(backported from commit 5f89468e2f060031cd89fd4287298e0eaf246bf6)
[ kmously: omitted part about alloc_size - not applicable and not needed ]
Signed-off-by: Khalid Elmously <khalid.elmously@canonical.com>
Acked-by: Stefan Bader <stefan.bader@canonical.com>
Acked-by: Kleber Sacilotto de Souza <kleber.souza@canonical.com>
Signed-off-by: Khalid Elmously <khalid.elmously@canonical.com>

gvnic2 2021-10-08 07:23:21 UTC
gve: Check TX QPL was actually assigned

Author: Catherine Sullivan
Author Date: 2021-05-17 21:08:11 UTC

gve: Check TX QPL was actually assigned

Correctly check the TX QPL was assigned and unassigned if
other steps in the allocation fail.

Fixes: f5cedc84a30d (gve: Add transmit and receive support)
Signed-off-by: Catherine Sullivan <csully@google.com>
Signed-off-by: David Awogbemila <awogbemila@google.com>
Acked-by: Willem de Bruijn <willemb@google.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
(cherry picked from commit 5aec55b46c6238506cdf0c60cd0e42ab77a1e5e0)
Signed-off-by: Khalid Elmously <khalid.elmously@canonical.com>

gcp-swiotlb 2021-09-02 04:01:09 UTC
swiotlb: don't modify orig_addr in swiotlb_tbl_sync_single

Author: Jianxiong Gao
Author Date: 2021-05-18 22:18:17 UTC

swiotlb: don't modify orig_addr in swiotlb_tbl_sync_single

swiotlb_tbl_map_single currently nevers sets a tlb_addr that is not
aligned to the tlb bucket size. But we're going to add such a case
soon, for which this adjustment would be bogus.

Signed-off-by: Christoph Hellwig <hch@xxxxxx>
Acked-by: Jianxiong Gao <jxgao@xxxxxxxxxx>
Tested-by: Jianxiong Gao <jxgao@xxxxxxxxxx>
Signed-off-by: Konrad Rzeszutek Wilk <konrad.wilk@xxxxxxxxxx>

Upstream: 16fc3cef33a04632ab6b31758abdd77563a20759
Signed-off-by: Jianxiong Gao <jxgao@xxxxxxxxxx>
Signed-off-by: Khalid Elmously <khalid.elmously@canonical.com>

ibm 2021-08-13 04:54:04 UTC
UBUNTU: Ubuntu-ibm-5.4.0-1003.3

Author: Khaled El Mously
Author Date: 2021-08-13 04:54:04 UTC

UBUNTU: Ubuntu-ibm-5.4.0-1003.3

Signed-off-by: Khalid Elmously <khalid.elmously@canonical.com>

gcp-5.8 2021-04-06 07:17:25 UTC
UBUNTU: Ubuntu-gcp-5.8-5.8.0-1027.28~20.04.1

Author: Khaled El Mously
Author Date: 2021-04-06 07:17:25 UTC

UBUNTU: Ubuntu-gcp-5.8-5.8.0-1027.28~20.04.1

Signed-off-by: Khalid Elmously <khalid.elmously@canonical.com>

branch-for-respin-1 2021-02-05 01:20:19 UTC
vsock: fix the race conditions in multi-transport support

Author: Alexander Popov
Author Date: 2021-02-05 00:00:09 UTC

vsock: fix the race conditions in multi-transport support

BugLink: https://bugs.launchpad.net/bugs/1914668

commit c518adafa39f37858697ac9309c6cf1805581446 upstream.

There are multiple similar bugs implicitly introduced by the
commit c0cfa2d8a788fcf4 ("vsock: add multi-transports support") and
commit 6a2c0962105ae8ce ("vsock: prevent transport modules unloading").

The bug pattern:
 [1] vsock_sock.transport pointer is copied to a local variable,
 [2] lock_sock() is called,
 [3] the local variable is used.
VSOCK multi-transport support introduced the race condition:
vsock_sock.transport value may change between [1] and [2].

Let's copy vsock_sock.transport pointer to local variables after
the lock_sock() call.

Fixes: c0cfa2d8a788fcf4 ("vsock: add multi-transports support")
Signed-off-by: Alexander Popov <alex.popov@linux.com>
Reviewed-by: Stefano Garzarella <sgarzare@redhat.com>
Reviewed-by: Jorgen Hansen <jhansen@vmware.com>
Link: https://lore.kernel.org/r/20210201084719.2257066-1-alex.popov@linux.com
Signed-off-by: Jakub Kicinski <kuba@kernel.org>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Signed-off-by: Kamal Mostafa <kamal@canonical.com>
Acked-by: Khalid Elmously <khalid.elmously@canonical.com>
Acked-by: Colin Ian King <colin.king@canonical.com>
Signed-off-by: Khalid Elmously <khalid.elmously@canonical.com>

temp-for-respin 2020-12-09 06:29:56 UTC
Revert "md: add md_submit_discard_bio() for submitting discard bio"

Author: Khaled El Mously
Author Date: 2020-12-09 06:28:26 UTC

Revert "md: add md_submit_discard_bio() for submitting discard bio"

BugLink: https://bugs.launchpad.net/bugs/1907262

This reverts commit d834834f482ab8d680e4c26f36b373416ff41c22.

Signed-off-by: Khalid Elmously <khalid.elmously@canonical.com>

blah 2020-11-27 05:32:59 UTC
UBUNTU: [config] Set CONFIG_NET_IPIP and CONIG_IPV6_SIT =m

Author: Khaled El Mously
Author Date: 2020-11-25 08:25:16 UTC

UBUNTU: [config] Set CONFIG_NET_IPIP and CONIG_IPV6_SIT =m

BugLink: https://bugs.launchpad.net/bugs/1899832

There's no good reason for these modules to be statically built-in, and they are causing test validation problems on some clouds.

Signed-off-by: Khalid Elmously <khalid.elmously@canonical.com>
Acked-by: Stefan Bader <stefan.bader@canonical.com>
Acked-by: Kleber Sacilotto de Souza <kleber.souza@canonical.com>
Signed-off-by: William Breathitt Gray <william.gray@canonical.com>

odroidc2 2020-05-11 03:57:49 UTC
UBUNTU: Ubuntu-odroidc2-5.4.0-1001.2

Author: Khaled El Mously
Author Date: 2020-05-11 03:57:29 UTC

UBUNTU: Ubuntu-odroidc2-5.4.0-1001.2

Signed-off-by: Khalid Elmously <khalid.elmously@canonical.com>

112 of 12 results
This repository contains Public information 
Everyone can see this information.

Subscribers