Xenial update to 4.4.144 stable release
Bug #1791080 reported by
Stefan Bader
This bug affects 1 person
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
linux (Ubuntu) |
Invalid
|
Undecided
|
Unassigned | ||
Xenial |
Fix Released
|
Medium
|
Stefan Bader |
Bug Description
SRU Justification
Impact:
The upstream process for stable tree updates is quite similar
in scope to the Ubuntu SRU process, e.g., each patch has to
demonstrably fix a bug, and each patch is vetted by upstream
by originating either directly from a mainline/stable Linux tree or
a minimally backported form of that patch. The 4.4.144 upstream stable
patch set is now available. It should be included in the Ubuntu
kernel as well.
TEST CASE: TBD
The following patches from the 4.4.144 stable release shall be applied:
tags: | added: kernel-stable-tracking-bug |
Changed in linux (Ubuntu Xenial): | |
assignee: | nobody → Stefan Bader (smb) |
importance: | Undecided → Medium |
status: | New → In Progress |
Changed in linux (Ubuntu): | |
status: | New → Invalid |
Changed in linux (Ubuntu Xenial): | |
status: | In Progress → Fix Committed |
To post a comment you must log in.
This upstream stable update contains the backport for CVE-2018-3639 (x86) aka Spectre v4/SSB. branch_ prediction_ barrier( ). Not sure this branch_ prediction_ barrier( ) which is still
* x86/cpufeatures: Add CPUID_7_EDX CPUID leaf
The upstream stable patch adds two previously unknown
feature bits for word 18 which I added with a SAUCE
patch.
* x86/cpufeatures: Add Intel feature bits for Speculation
Control
-> skip, no change
* x86/cpufeatures: Add AMD feature bits for Speculation
Control
-> skip, no change
* x86/msr: Add definitions for new speculation control
MSRs
-> skip, no change
* x86/pti: Do not enable PTI on CPUs which are not
vulnerable to Meltdown
-> skip, no change
* x86/cpufeature: Blacklist SPEC_CTRL/PRED_CMD on early
Spectre v2 microcodes
-> skip, we have actually reverted this at some point
* x86/speculation: Add basic IBPB (Indirect Branch
Prediction Barrier) support
-> Picked in reduced form (only adding definition for
indirect_
will be needed in the end.
* x86/cpufeatures: Clean up Spectre v2 related CPUID
flags
-> Mostly can be skipped. Only picking up a small change
to indirect_
not used.
Not picking up the firmware blacklist code.
* x86/cpuid: Fix up "virtual" IBRS/IBPB/STIBP feature
bits on Intel
-> skipped, no change