Thank you for your contribution to Debian.


Accepted:

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Tue, 08 Aug 2023 19:08:55 +0200
Source: linux-signed-arm64
Architecture: source
Version: 6.4.4+3
Distribution: sid
Urgency: high
Maintainer: Debian Kernel Team <debian-kernel@lists.debian.org>
Changed-By: Salvatore Bonaccorso <car...@debian.org>
Changes:
 linux-signed-arm64 (6.4.4+3) unstable; urgency=high
 .
   * Sign kernel from linux 6.4.4-3
 .
   * io_uring: gate iowait schedule on having pending requests (Closes: 
#1041855)
   * [x86] Add mitigations for Gather Data Sampling (GDS) (CVE-2022-40982)
     - init: Provide arch_cpu_finalize_init()
     - x86/cpu: Switch to arch_cpu_finalize_init()
     - ARM: cpu: Switch to arch_cpu_finalize_init()
     - ia64/cpu: Switch to arch_cpu_finalize_init()
     - loongarch/cpu: Switch to arch_cpu_finalize_init()
     - m68k/cpu: Switch to arch_cpu_finalize_init()
     - mips/cpu: Switch to arch_cpu_finalize_init()
     - sh/cpu: Switch to arch_cpu_finalize_init()
     - sparc/cpu: Switch to arch_cpu_finalize_init()
     - um/cpu: Switch to arch_cpu_finalize_init()
     - init: Remove check_bugs() leftovers
     - init: Invoke arch_cpu_finalize_init() earlier
     - init, x86: Move mem_encrypt_init() into arch_cpu_finalize_init()
     - x86/init: Initialize signal frame size late
     - x86/fpu: Remove cpuinfo argument from init functions
     - x86/fpu: Mark init functions __init
     - x86/fpu: Move FPU initialization into arch_cpu_finalize_init()
     - x86/speculation: Add Gather Data Sampling mitigation
     - x86/speculation: Add force option to GDS mitigation
     - x86/speculation: Add Kconfig option for GDS
     - KVM: Add GDS_NO support to KVM
     - x86/mem_encrypt: Unbreak the AMD_MEM_ENCRYPT=n build
     - x86/xen: Fix secondary processors' FPU initialization
     - Documentation/x86: Fix backwards on/off logic about YMM support
   * [x86] Add a Speculative RAS Overflow (SRSO) mitigation (CVE-2023-20569)
     - x86/bugs: Increase the x86 bugs vector size to two u32s
     - x86/srso: Add a Speculative RAS Overflow mitigation
     - x86/srso: Add IBPB_BRTYPE support
     - x86/srso: Add SRSO_NO support
     - x86/srso: Add IBPB
     - x86/srso: Add IBPB on VMEXIT
     - x86/srso: Fix return thunks in generated code
     - x86/srso: Add a forgotten NOENDBR annotation
     - x86/srso: Tie SBPB bit setting to microcode patch detection
   * Bump ABI to 2
Checksums-Sha1:
 24d84b0395affd947c6457ebd07d391d84d43ac2 7351 linux-signed-arm64_6.4.4+3.dsc
 3a5e36b0f71a5efaadbe1dd64ea1c400057b4eba 2836016 
linux-signed-arm64_6.4.4+3.tar.xz
Checksums-Sha256:
 06ca64aad5794c37a2aca1a478b33fdfaf53397d64b64a3a9378211aaebd4e08 7351 
linux-signed-arm64_6.4.4+3.dsc
 13d4d22cc8b0b3025441fb8f33e63fd8f352b29e11b80ee8c8530db31f22dca8 2836016 
linux-signed-arm64_6.4.4+3.tar.xz
Files:
 c1d2b21d32dd4187ea190d56091d79ca 7351 kernel optional 
linux-signed-arm64_6.4.4+3.dsc
 136c5f3b58218e44444c00d9d130ae30 2836016 kernel optional 
linux-signed-arm64_6.4.4+3.tar.xz

-----BEGIN PGP SIGNATURE-----
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=DDeU
-----END PGP SIGNATURE-----

Reply via email to