List of previously applied patches: * selftests/net: correct the return value for run_netsocktests * x86/speculation/mds: Add 'mitigations=' support for MDS * x86/speculation: Support 'mitigations=' cmdline option * cpu/speculation: Add 'mitigations=' cmdline option * x86/speculation/mds: Print SMT vulnerable on MSBDS with mitigations off * x86/speculation/mds: Fix comment * x86/speculation/mds: Add SMT warning message * x86/speculation: Move arch_smt_update() call to after mitigation decisions * x86/speculation/mds: Add mitigation mode VMWERV * x86/speculation/mds: Add sysfs reporting for MDS * x86/speculation/mds: Add mitigation control for MDS * x86/speculation: Unify conditional spectre v2 print functions * x86/speculation: Reorder the spec_v2 code * x86/speculation: Rework SMT state change * x86/speculation/mds: Conditionally clear CPU buffers on idle entry * x86/speculation/mds: Clear CPU buffers on exit to user * locking/static_keys: Provide DECLARE and well as DEFINE macros * x86/speculation/mds: Add mds_clear_cpu_buffers() * x86/kvm: Expose X86_FEATURE_MD_CLEAR to guests * x86/speculation/mds: Add BUG_MSBDS_ONLY * x86/speculation/mds: Add basic bug infrastructure for MDS * x86/speculation: Consolidate CPU whitelists * x86/msr-index: Cleanup bit defines * locking/atomics, asm-generic: Move some macros from <linux/bitops.h> to a new <linux/bits.h> file * bitops: avoid integer overflow in GENMASK(_ULL) * kvm: x86: Report STIBP on GET_SUPPORTED_CPUID * x86/cpu: Sanitize FAM6_ATOM naming * x86/speculation: Simplify the CPU bug detection logic * vfio/type1: Limit DMA mappings per container * igb: Fix WARN_ONCE on runtime suspend * KVM: x86: SVM: Call x86_spec_ctrl_set_guest/host() with interrupts disabled * x86/speculation: Support Enhanced IBRS on future CPUs * x86/speculation: Remove SPECTRE_V2_IBRS in enum spectre_v2_mitigation * powerpc/pseries: Restore default security feature flags on setup * powerpc: Move default security feature flags * powerpc/pseries: Fix clearing of security feature flags * powerpc/64s: Wire up cpu_show_spectre_v2() * powerpc/64s: Wire up cpu_show_spectre_v1() * powerpc/pseries: Use the security flags in pseries_setup_rfi_flush() * powerpc/powernv: Use the security flags in pnv_setup_rfi_flush() * powerpc/64s: Enhance the information in cpu_show_meltdown() * powerpc/64s: Move cpu_show_meltdown() * powerpc/powernv: Set or clear security feature flags * powerpc/pseries: Set or clear security feature flags * powerpc: Add security feature flags for Spectre/Meltdown * powerpc/pseries: Add new H_GET_CPU_CHARACTERISTICS flags * powerpc/rfi-flush: Call setup_rfi_flush() after LPM migration * powerpc/rfi-flush: Differentiate enabled and patched flush types * powerpc/rfi-flush: Always enable fallback flush on pseries * powerpc/rfi-flush: Make it possible to call setup_rfi_flush() again * powerpc/rfi-flush: Move the logic to avoid a redo into the debugfs code * powerpc/powernv: Support firmware disable of RFI flush * powerpc/pseries: Support firmware disable of RFI flush
-- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1830176 Title: Xenial update: 4.4.180 upstream stable release To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1830176/+subscriptions -- ubuntu-bugs mailing list [email protected] https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
