[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Accepted linux-signed-amd64 6.4.4+3 (source) into unstable



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Tue, 08 Aug 2023 19:08:55 +0200
Source: linux-signed-amd64
Architecture: source
Version: 6.4.4+3
Distribution: sid
Urgency: high
Maintainer: Debian Kernel Team <debian-kernel@lists.debian.org>
Changed-By: Salvatore Bonaccorso <carnil@debian.org>
Changes:
 linux-signed-amd64 (6.4.4+3) unstable; urgency=high
 .
   * Sign kernel from linux 6.4.4-3
 .
   * io_uring: gate iowait schedule on having pending requests (Closes: #1041855)
   * [x86] Add mitigations for Gather Data Sampling (GDS) (CVE-2022-40982)
     - init: Provide arch_cpu_finalize_init()
     - x86/cpu: Switch to arch_cpu_finalize_init()
     - ARM: cpu: Switch to arch_cpu_finalize_init()
     - ia64/cpu: Switch to arch_cpu_finalize_init()
     - loongarch/cpu: Switch to arch_cpu_finalize_init()
     - m68k/cpu: Switch to arch_cpu_finalize_init()
     - mips/cpu: Switch to arch_cpu_finalize_init()
     - sh/cpu: Switch to arch_cpu_finalize_init()
     - sparc/cpu: Switch to arch_cpu_finalize_init()
     - um/cpu: Switch to arch_cpu_finalize_init()
     - init: Remove check_bugs() leftovers
     - init: Invoke arch_cpu_finalize_init() earlier
     - init, x86: Move mem_encrypt_init() into arch_cpu_finalize_init()
     - x86/init: Initialize signal frame size late
     - x86/fpu: Remove cpuinfo argument from init functions
     - x86/fpu: Mark init functions __init
     - x86/fpu: Move FPU initialization into arch_cpu_finalize_init()
     - x86/speculation: Add Gather Data Sampling mitigation
     - x86/speculation: Add force option to GDS mitigation
     - x86/speculation: Add Kconfig option for GDS
     - KVM: Add GDS_NO support to KVM
     - x86/mem_encrypt: Unbreak the AMD_MEM_ENCRYPT=n build
     - x86/xen: Fix secondary processors' FPU initialization
     - Documentation/x86: Fix backwards on/off logic about YMM support
   * [x86] Add a Speculative RAS Overflow (SRSO) mitigation (CVE-2023-20569)
     - x86/bugs: Increase the x86 bugs vector size to two u32s
     - x86/srso: Add a Speculative RAS Overflow mitigation
     - x86/srso: Add IBPB_BRTYPE support
     - x86/srso: Add SRSO_NO support
     - x86/srso: Add IBPB
     - x86/srso: Add IBPB on VMEXIT
     - x86/srso: Fix return thunks in generated code
     - x86/srso: Add a forgotten NOENDBR annotation
     - x86/srso: Tie SBPB bit setting to microcode patch detection
   * Bump ABI to 2
Checksums-Sha1:
 9da6664a1d3e040fbd3f7530eb9e05d611620617 8359 linux-signed-amd64_6.4.4+3.dsc
 a95d8b2302a4e4b016075509ae9ea1bc0c492d71 3028988 linux-signed-amd64_6.4.4+3.tar.xz
Checksums-Sha256:
 4eba116bd30400d670822e0ab33621781c38d790eaa2ed7a54ddc8fe2620468d 8359 linux-signed-amd64_6.4.4+3.dsc
 1bbe935d0bc0f8061ca135d135c90e37871d82737adc1e3dfc8fd3bec016870d 3028988 linux-signed-amd64_6.4.4+3.tar.xz
Files:
 4c97146c433518a898229932bb3fd8e7 8359 kernel optional linux-signed-amd64_6.4.4+3.dsc
 7b59bed7eb2fcb718da2731c6c83fbea 3028988 kernel optional linux-signed-amd64_6.4.4+3.tar.xz

-----BEGIN PGP SIGNATURE-----
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=z8C0
-----END PGP SIGNATURE-----


Reply to: