~smb/ubuntu/+source/linux/+git/jammy:master

Last commit made on 2021-10-07
Get this branch:
git clone -b master https://git.launchpad.net/~smb/ubuntu/+source/linux/+git/jammy
Only Stefan Bader can upload to this branch. If you are Stefan Bader please log in for upload directions.

Branch merges

Branch information

Name:
master
Repository:
lp:~smb/ubuntu/+source/linux/+git/jammy

Recent commits

86d5f4d... by Andrea Righi

UBUNTU: Ubuntu-5.13.0-19.19

Signed-off-by: Andrea Righi <email address hidden>

4b0d12e... by Andrea Righi

UBUNTU: link-to-tracker: update tracking bug

BugLink: https://bugs.launchpad.net/bugs/1946337
Properties: no-test-build
Signed-off-by: Andrea Righi <email address hidden>

8d2da2d... by Andrea Righi

UBUNTU: Start new release

Ignore: yes
Signed-off-by: Andrea Righi <email address hidden>

3d3bf8b... by Andrea Righi

UBUNTU: [Config] disable KFENCE

BugLink: https://bugs.launchpad.net/bugs/1946001

Disable KFENCE as a workaround to prevent potential kernel panics that
seem to happen in nested KVM environments (e.g., systemd autopackage
test).

Disabling this feature also allows to remove the overhead of the
periodic sampling performed by KFENCE. The regression potential is that
we may receive memory corruption bug reports (that were previously
detected explicitly by KFENCE), but in such case we have always the
option to provide a test kernel with KASAN enabled, that provides a
better coverage for this kind of bugs.

Signed-off-by: Andrea Righi <email address hidden>

df3f2c0... by Andrea Righi

UBUNTU: Ubuntu-5.13.0-18.18

Signed-off-by: Andrea Righi <email address hidden>

84fda20... by Andrea Righi

UBUNTU: link-to-tracker: update tracking bug

BugLink: https://bugs.launchpad.net/bugs/1945995
Properties: no-test-build
Signed-off-by: Andrea Righi <email address hidden>

84d7116... by Andrea Righi

UBUNTU: Start new release

Ignore: yes
Signed-off-by: Andrea Righi <email address hidden>

14ba5a8... by Janis Schoetterl-Glausch <email address hidden>

KVM: s390: Enable specification exception interpretation

BugLink: https://bugs.launchpad.net/bugs/1932157

When this feature is enabled the hardware is free to interpret
specification exceptions generated by the guest, instead of causing
program interruption interceptions.

This benefits (test) programs that generate a lot of specification
exceptions (roughly 4x increase in exceptions/sec).

Interceptions will occur as before if ICTL_PINT is set,
i.e. if guest debug is enabled.

There is no indication if this feature is available or not and the
hardware is free to interpret or not. So we can simply set this bit and
if the hardware ignores it we fall back to intercept 8 handling.

Signed-off-by: Janis Schoetterl-Glausch <email address hidden>
Link: https://<email address hidden>/
Reviewed-by: David Hildenbrand <email address hidden>
Reviewed-by: Christian Borntraeger <email address hidden>
Signed-off-by: Christian Borntraeger <email address hidden>
(cherry picked from commit 7119decf47d9867266459615be502e5d2cecedba)
Signed-off-by: Frank Heimes <email address hidden>
Acked-by: Juerg Haefliger <email address hidden>
Acked-by: Tim Gardner <email address hidden>
Signed-off-by: Paolo Pisati <email address hidden>

673d307... by Andrea Righi

UBUNTU: Ubuntu-5.13.0-17.17

Signed-off-by: Andrea Righi <email address hidden>

193148f... by Andrea Righi

UBUNTU: debian/dkms-versions -- update from kernel-versions (main/master)

BugLink: https://bugs.launchpad.net/bugs/1786013
Signed-off-by: Andrea Righi <email address hidden>