Public bug reported: SRU Justification
Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable Linux tree or a minimally backported form of that patch. The following upstream stable patches should be included in the Ubuntu kernel: upstream stable patchset 2022-05-06 from git://git.kernel.org/ UBUNTU: [Config] updateconfigs for ARM64_ERRATUM_1188873 arm64: arch_timer: Add workaround for ARM erratum 1188873 arm64: arch_timer: avoid unused function warning arm64: Add silicon-errata.txt entry for ARM erratum 1188873 arm64: Make ARM64_ERRATUM_1188873 depend on COMPAT arm64: Add part number for Neoverse N1 arm64: Add part number for Arm Cortex-A77 arm64: Add Neoverse-N2, Cortex-A710 CPU part definition arm64: Add Cortex-X2 CPU part definition arm64: entry.S: Add ventry overflow sanity checks arm64: entry: Make the trampoline cleanup optional arm64: entry: Free up another register on kpti's tramp_exit path arm64: entry: Move the trampoline data page before the text page arm64: entry: Allow tramp_alias to access symbols after the 4K boundary arm64: entry: Don't assume tramp_vectors is the start of the vectors arm64: entry: Move trampoline macros out of ifdef'd section arm64: entry: Make the kpti trampoline's kpti sequence optional Revert "arm64: mmu: add the entry trampolines start/end section markers into sections.h" arm64: entry: Allow the trampoline text to occupy multiple pages arm64: entry: Add non-kpti __bp_harden_el1_vectors for mitigations UBUNTU: [Config] updateconfigs for MITIGATE_SPECTRE_BRANCH_HISTORY arm64: entry: Add vectors that have the bhb mitigation sequences arm64: entry: Add macro for reading symbol addresses from the trampoline arm64: Add percpu vectors for EL1 arm64: proton-pack: Report Spectre-BHB vulnerabilities as part of Spectre-v2 KVM: arm64: Add templates for BHB mitigation sequences arm64: Mitigate spectre style branch history side channels KVM: arm64: Allow SMCCC_ARCH_WORKAROUND_3 to be discovered and migrated arm64: add ID_AA64ISAR2_EL1 sys register arm64: Use the clearbhb instruction in mitigations UBUNTU: upstream stable to v4.14.275 ** Affects: linux (Ubuntu) Importance: Undecided Status: Invalid ** Affects: linux (Ubuntu Bionic) Importance: Medium Assignee: Kamal Mostafa (kamalmostafa) Status: In Progress ** Tags: kernel-stable-tracking-bug ** Changed in: linux (Ubuntu) Status: New => Confirmed ** Tags added: kernel-stable-tracking-bug ** Also affects: linux (Ubuntu Bionic) Importance: Undecided Status: New ** Description changed: + SRU Justification - SRU Justification + Impact: + The upstream process for stable tree updates is quite similar + in scope to the Ubuntu SRU process, e.g., each patch has to + demonstrably fix a bug, and each patch is vetted by upstream + by originating either directly from a mainline/stable Linux tree or + a minimally backported form of that patch. The following upstream + stable patches should be included in the Ubuntu kernel: - Impact: - The upstream process for stable tree updates is quite similar - in scope to the Ubuntu SRU process, e.g., each patch has to - demonstrably fix a bug, and each patch is vetted by upstream - by originating either directly from a mainline/stable Linux tree or - a minimally backported form of that patch. The following upstream - stable patches should be included in the Ubuntu kernel: + upstream stable patchset 2022-05-06 + from git://git.kernel.org/ - upstream stable patchset 2022-05-06 - from git://git.kernel.org/ + UBUNTU: [Config] updateconfigs for ARM64_ERRATUM_1188873 + arm64: arch_timer: Add workaround for ARM erratum 1188873 + arm64: arch_timer: avoid unused function warning + arm64: Add silicon-errata.txt entry for ARM erratum 1188873 + arm64: Make ARM64_ERRATUM_1188873 depend on COMPAT + arm64: Add part number for Neoverse N1 + arm64: Add part number for Arm Cortex-A77 + arm64: Add Neoverse-N2, Cortex-A710 CPU part definition + arm64: Add Cortex-X2 CPU part definition + arm64: entry.S: Add ventry overflow sanity checks + arm64: entry: Make the trampoline cleanup optional + arm64: entry: Free up another register on kpti's tramp_exit path + arm64: entry: Move the trampoline data page before the text page + arm64: entry: Allow tramp_alias to access symbols after the 4K boundary + arm64: entry: Don't assume tramp_vectors is the start of the vectors + arm64: entry: Move trampoline macros out of ifdef'd section + arm64: entry: Make the kpti trampoline's kpti sequence optional + Revert "arm64: mmu: add the entry trampolines start/end section markers into sections.h" + arm64: entry: Allow the trampoline text to occupy multiple pages + arm64: entry: Add non-kpti __bp_harden_el1_vectors for mitigations + UBUNTU: [Config] updateconfigs for MITIGATE_SPECTRE_BRANCH_HISTORY + arm64: entry: Add vectors that have the bhb mitigation sequences + arm64: entry: Add macro for reading symbol addresses from the trampoline + arm64: Add percpu vectors for EL1 + arm64: proton-pack: Report Spectre-BHB vulnerabilities as part of Spectre-v2 + KVM: arm64: Add templates for BHB mitigation sequences + arm64: Mitigate spectre style branch history side channels + KVM: arm64: Allow SMCCC_ARCH_WORKAROUND_3 to be discovered and migrated + arm64: add ID_AA64ISAR2_EL1 sys register + arm64: Use the clearbhb instruction in mitigations + UBUNTU: upstream stable to v4.14.275 ** Changed in: linux (Ubuntu Bionic) Status: New => In Progress ** Changed in: linux (Ubuntu Bionic) Importance: Undecided => Medium ** Changed in: linux (Ubuntu Bionic) Assignee: (unassigned) => Kamal Mostafa (kamalmostafa) ** Changed in: linux (Ubuntu) Status: Confirmed => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1972006 Title: Bionic update: upstream stable patchset 2022-05-06 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1972006/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs