APPLIED: [PATCH 0/4][SRU][X] MDS: Update mitigation patches to match upstream
Kleber Souza
kleber.souza at canonical.com
Tue Jun 4 08:12:06 UTC 2019
On 5/29/19 4:28 AM, Tyler Hicks wrote:
> This series updates our MDS mitigation patches to match the latest
> upstream patches in order to make future backports easier. The SAUCE
> patch's description should explain itself clearly but, to summarize, it
> is needed in order to bring the patches that we shipped on May 14th up
> to the final revision of those patches. The final three patches simply
> update the documentation.
>
> The build logs are clean. I've smoke tested these changes in a VM.
>
> CVE-2018-12126
> CVE-2018-12127
> CVE-2018-12130
> CVE-2019-11091
>
> Tyler
>
> Josh Poimboeuf (1):
> x86/speculation/mds: Fix documentation typo
>
> Tyler Hicks (2):
> UBUNTU: SAUCE: Synchronize MDS mitigations with upstream
> Documentation: Correct the possible MDS sysfs values
>
> speck for Pawan Gupta (1):
> x86/mds: Add MDSUM variant to the MDS documentation
>
> Documentation/ABI/testing/sysfs-devices-system-cpu | 3 +--
> Documentation/admin-guide/hw-vuln/mds.rst | 30 ++++++++++------------
> Documentation/kernel-parameters.txt | 4 ++-
> Documentation/x86/mds.rst | 7 ++++-
> arch/x86/kernel/cpu/bugs.c | 18 +++++++------
> arch/x86/kernel/cpu/common.c | 10 ++++----
> arch/x86/kvm/vmx.c | 5 ++--
> 7 files changed, 41 insertions(+), 36 deletions(-)
>
Applied to xenial/master-next branch.
Thanks,
Kleber
More information about the kernel-team
mailing list