-linux-snapdragon (4.4.0-1086.91) UNRELEASED; urgency=medium
-
- CHANGELOG: Do not edit directly. Autogenerated at release.
- CHANGELOG: Use the printchanges target to see the curent changes.
- CHANGELOG: Use the insertchanges target to create the final log.
+linux-snapdragon (4.4.0-1086.91) xenial; urgency=medium
+
+ * linux-snapdragon: 4.4.0-1086.91 -proposed tracker (LP: #1748494)
+
+ [ Ubuntu: 4.4.0-115.139 ]
+
+ * linux: 4.4.0-115.138 -proposed tracker (LP: #1748745)
+ * CVE-2017-5715 (Spectre v2 Intel)
+ - Revert "UBUNTU: SAUCE: turn off IBPB when full retpoline is present"
+ - SAUCE: turn off IBRS when full retpoline is present
+ - [Packaging] retpoline files must be sorted
+ - [Packaging] pull in retpoline files
+
+ [ Ubuntu: 4.4.0-114.137 ]
+
+ * linux: 4.4.0-114.137 -proposed tracker (LP: #1748484)
+ * ALSA backport missing NVIDIA GPU codec IDs to patch table to
+ Ubuntu 16.04 LTS Kernel (LP: #1744117)
+ - ALSA: hda - Add missing NVIDIA GPU codec IDs to patch table
+ * Shutdown hang on 16.04 with iscsi targets (LP: #1569925)
+ - scsi: libiscsi: Allow sd_shutdown on bad transport
+ * libata: apply MAX_SEC_1024 to all LITEON EP1 series devices (LP: #1743053)
+ - libata: apply MAX_SEC_1024 to all LITEON EP1 series devices
+ * KVM patches for s390x to provide facility bits 81 (ppa15) and 82 (bpb)
+ (LP: #1747090)
+ - KVM: s390: wire up bpb feature
+ - KVM: s390: Enable all facility bits that are known good for passthrough
+ * CVE-2017-5715 (Spectre v2 Intel)
+ - SAUCE: drop lingering gmb() macro
+ - x86/feature: Enable the x86 feature to control Speculation
+ - x86/feature: Report presence of IBPB and IBRS control
+ - x86/enter: MACROS to set/clear IBRS and set IBPB
+ - x86/enter: Use IBRS on syscall and interrupts
+ - x86/idle: Disable IBRS entering idle and enable it on wakeup
+ - x86/idle: Disable IBRS when offlining cpu and re-enable on wakeup
+ - x86/mm: Set IBPB upon context switch
+ - x86/mm: Only set IBPB when the new thread cannot ptrace current thread
+ - x86/kvm: add MSR_IA32_SPEC_CTRL and MSR_IA32_PRED_CMD to kvm
+ - x86/kvm: Set IBPB when switching VM
+ - x86/kvm: Toggle IBRS on VM entry and exit
+ - x86/spec_ctrl: Add sysctl knobs to enable/disable SPEC_CTRL feature
+ - x86/spec_ctrl: Add lock to serialize changes to ibrs and ibpb control
+ - x86/cpu/amd, kvm: Satisfy guest kernel reads of IC_CFG MSR
+ - x86/cpu/AMD: Add speculative control support for AMD
+ - x86/microcode: Extend post microcode reload to support IBPB feature
+ - KVM: SVM: Do not intercept new speculative control MSRs
+ - x86/svm: Set IBRS value on VM entry and exit
+ - x86/svm: Set IBPB when running a different VCPU
+ - KVM: x86: Add speculative control CPUID support for guests
+ - SAUCE: Fix spec_ctrl support in KVM
+ - SAUCE: turn off IBPB when full retpoline is present
-- Stefan Bader <stefan.bader@canonical.com> Mon, 12 Feb 2018 15:01:49 +0100