Continue Spectre v4 review: * x86/speculation: Update Speculation Control microcode blacklist -> skip, we do not carry the blacklist * x86/speculation: Correct Speculation Control microcode blacklist again -> skip, again firmware blacklist * x86/speculation: Clean up various Spectre related details -> pick, adjusted to match intended goals (low risk as this is only removing line breaks or updating printks). * x86/speculation: Add <asm/msr-index.h> dependency -> skip, no change * x86/spectre_v2: Don't check microcode versions when running under hypervisors -> skip, we do not check for bad microcode versions * x86/speculation: Use IBRS if available before calling into firmware -> pick, adapted to current environment. We already had alternative_msr_write() ported.
-- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1791080 Title: Xenial update to 4.4.144 stable release Status in linux package in Ubuntu: Invalid Status in linux source package in Xenial: In Progress Bug description: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable Linux tree or a minimally backported form of that patch. The 4.4.144 upstream stable patch set is now available. It should be included in the Ubuntu kernel as well. git://git.kernel.org/ TEST CASE: TBD The following patches from the 4.4.144 stable release shall be applied: To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1791080/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp