APPLIED: [SRU][Xenial][PATCH 0/3] Fixes for LP:1788563

Kleber Souza kleber.souza at canonical.com
Tue Sep 11 08:18:41 UTC 2018


On 09/10/18 21:38, Tyler Hicks wrote:
> BugLink: https://launchpad.net/bugs/1788563
> 
> == SRU Justification ==
> This regression has been reported in multiple bugs and affects Trusty,
> Xenial and Bionic.  All releases need different backports. jsalisbury
> will provide the backports for Bionic.
> 
> Due to this bug in the original L1TF patch set, L1TF mitigation not
> effective in certain CPU and installed RAM configurations.
> 
> == Fixes ==
> 9df9516940a6 ("x86/speculation/l1tf: Fix overflow in l1tf_pfn_limit() on 32bit")
> b0a182f87568 ("x86/speculation/l1tf: Fix off-by-one error when warning that system has too much RAM")
> cc51e5428ea5 ("x86/speculation/l1tf: Increase l1tf memory limit for Nehalem+")
> 
> == Regression Potential ==
> Low.  These are security fixes and have all been cc'd to upstream
> stable, so they have had additional upstream review.
> 
> == Test Case ==
> A test kernel was built with these patches and tested by the original
> bug reporter. The bug reporter states the test kernel resolved the bug.
> 
> Tyler
> 
> 

Applied to xenial/master-next branch.

Thanks,
Kleber




More information about the kernel-team mailing list