Skipped "x86/speculation/l1tf: Fix up pte->pfn conversion for PAE" because we already use the proper conversion.
Skipped because we already applied it for CVE-2018-6554
* "irda: Fix memory leak caused by repeated binds of irda socket"
Skipped because we already applied it for CVE-2018-6555
* "irda: Only insert new objects into the global database via
setsockopt"
Adjusted context for "ovl: rename is_merge to is_lowest".
Major rewrite of "ovl: override creds with the ones from the superblock mounter" because we did apply in the past "SAUCE: overlayfs: Replace ovl_prepare_creds() with ovl_override_creds()" for bug #1659417. Both are nearly identical but use different internal names. So the upstream patch got modified to convert things to the upstream layout.
Skipped "s390/lib: use expoline for all bcr instructions" because we already applied it for CVE-2017-5715.
Skipped "x86/speculatio n/l1tf: Fix up pte->pfn conversion for PAE" because we already use the proper conversion.
Skipped because we already applied it for CVE-2018-6554
* "irda: Fix memory leak caused by repeated binds of irda socket"
Skipped because we already applied it for CVE-2018-6555
* "irda: Only insert new objects into the global database via
setsockopt"
Adjusted context for "ovl: rename is_merge to is_lowest".
Major rewrite of "ovl: override creds with the ones from the superblock mounter" because we did apply in the past "SAUCE: overlayfs: Replace ovl_prepare_creds() with ovl_override_ creds() " for bug #1659417. Both are nearly identical but use different internal names. So the upstream patch got modified to convert things to the upstream layout.
Skipped "s390/lib: use expoline for all bcr instructions" because we already applied it for CVE-2017-5715.