** Tags added: cscc
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1811080
Title:
Xenial update: 4.4.168 upstream stable release
Status in linux package in Ubuntu:
Invalid
Status in l
This bug was fixed in the package linux - 4.4.0-143.169
---
linux (4.4.0-143.169) xenial; urgency=medium
* linux: 4.4.0-143.169 -proposed tracker (LP: #1814647)
* x86/kvm: Backport fixup and missing commits (LP: #1811646)
- KVM: x86: avoid vmalloc(0) in the KVM_SET_CPUID
** Changed in: linux (Ubuntu Xenial)
Status: In Progress => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1811080
Title:
Xenial update: 4.4.168 upstream stable rele
** Changed in: linux (Ubuntu Xenial)
Status: New => In Progress
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1811080
Title:
Xenial update: 4.4.168 upstream stable release
Statu
** Also affects: linux (Ubuntu Xenial)
Importance: Undecided
Status: New
** Changed in: linux (Ubuntu Xenial)
Importance: Undecided => Medium
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launc
The modifications from the following patches are already present (from previous
SAUCE/embargoed patches):
* x86/KVM/VMX: Expose SPEC_CTRL Bit(2) to the guest
* x86/bugs, KVM: Support the combination of guest and host IBRS
--
You received this bug notification because you are a member of Kern
The following already present commits are incomplete and need fixing:
* KVM: SVM: Implement VIRT_SPEC_CTRL support for SSBD
* x86/uaccess: Use __uaccess_begin_nospec() and uaccess_try_nospec
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed
List of already applied patches:
* posix-timers: Sanitize overrun handling
* KVM/VMX: Emulate MSR_IA32_ARCH_CAPABILITIES
* x86/uaccess: Use __uaccess_begin_nospec() and uaccess_try_nospec
* x86/usercopy: Replace open coded stac/clac with __uaccess_{begin, end}
* x86: Introduce __uaccess_b
8 matches
Mail list logo