Public bug reported: SRU Justification
Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable Linux tree or a minimally backported form of that patch. The 4.4.113 upstream stable patch set is now available. It should be included in the Ubuntu kernel as well. git://git.kernel.org/ TEST CASE: TBD The following patches from the 4.4.113 stable release shall be applied: * gcov: disable for COMPILE_TEST * x86/cpu/AMD: Make LFENCE a serializing instruction * x86/cpu/AMD: Use LFENCE_RDTSC in preference to MFENCE_RDTSC * x86/mm/32: Move setup_clear_cpu_cap(X86_FEATURE_PCID) earlier * x86/asm: Use register variable to get stack pointer value * x86/kbuild: enable modversions for symbols exported from asm * x86/asm: Make asm/alternative.h safe from assembly * EXPORT_SYMBOL() for asm * kconfig.h: use __is_defined() to check if MODULE is defined * x86/retpoline: Add initial retpoline support * x86/spectre: Add boot time option to select Spectre v2 mitigation * x86/retpoline/crypto: Convert crypto assembler indirect jumps * x86/retpoline/entry: Convert entry assembler indirect jumps * x86/retpoline/ftrace: Convert ftrace assembler indirect jumps * x86/retpoline/hyperv: Convert assembler indirect jumps * x86/retpoline/xen: Convert Xen hypercall indirect jumps * x86/retpoline/checksum32: Convert assembler indirect jumps * x86/retpoline/irq32: Convert assembler indirect jumps * x86/retpoline: Fill return stack buffer on vmexit * x86/retpoline: Remove compile time warning * scsi: sg: disable SET_FORCE_LOW_DMA * futex: Prevent overflow by strengthen input validation * ALSA: pcm: Remove yet superfluous WARN_ON() * ALSA: hda - Apply headphone noise quirk for another Dell XPS 13 variant * ALSA: hda - Apply the existing quirk to iMac 14,1 * af_key: fix buffer overread in verify_address_len() * af_key: fix buffer overread in parse_exthdrs() * scsi: hpsa: fix volume offline state * sched/deadline: Zero out positive runtime after throttling constrained tasks * x86/retpoline: Add LFENCE to the retpoline/RSB filling RSB macros * module: Add retpoline tag to VERMAGIC * pipe: avoid round_pipe_size() nr_pages overflow on 32-bit * x86/apic/vector: Fix off by one in error path * Input: 88pm860x-ts - fix child-node lookup * Input: twl6040-vibra - fix DT node memory management * Input: twl6040-vibra - fix child-node lookup * Input: twl4030-vibra - fix sibling-node lookup * tracing: Fix converting enum's from the map in trace_event_eval_update() * phy: work around 'phys' references to usb-nop-xceiv devices * ARM: dts: kirkwood: fix pin-muxing of MPP7 on OpenBlocks A7 * can: peak: fix potential bug in packet fragmentation * libata: apply MAX_SEC_1024 to all LITEON EP1 series devices * dm btree: fix serious bug in btree_split_beneath() * dm thin metadata: THIN_MAX_CONCURRENT_LOCKS should be 6 * arm64: KVM: Fix SMCCC handling of unimplemented SMC/HVC calls * x86/cpu, x86/pti: Do not enable PTI on AMD processors * kbuild: modversions for EXPORT_SYMBOL() for asm * x86/mce: Make machine check speculation protected * retpoline: Introduce start/end markers of indirect thunk * kprobes/x86: Blacklist indirect thunk functions for kprobes * kprobes/x86: Disable optimizing on the function jumps to indirect thunk * x86/pti: Document fix wrong index * x86/retpoline: Optimize inline assembler for vmexit_fill_RSB * MIPS: AR7: ensure the port type's FCR value is used * Linux 4.4.113 ** Affects: linux (Ubuntu) Importance: Undecided Status: New ** Tags: kernel-stable-tracking-bug ** Tags added: kernel-stable-tracking-bug ** Description changed: + SRU Justification - SRU Justification + Impact: + The upstream process for stable tree updates is quite similar + in scope to the Ubuntu SRU process, e.g., each patch has to + demonstrably fix a bug, and each patch is vetted by upstream + by originating either directly from a mainline/stable Linux tree or + a minimally backported form of that patch. The 4.4.113 upstream stable + patch set is now available. It should be included in the Ubuntu + kernel as well. - Impact: - The upstream process for stable tree updates is quite similar - in scope to the Ubuntu SRU process, e.g., each patch has to - demonstrably fix a bug, and each patch is vetted by upstream - by originating either directly from a mainline/stable Linux tree or - a minimally backported form of that patch. The 4.4.113 upstream stable - patch set is now available. It should be included in the Ubuntu - kernel as well. + git://git.kernel.org/ - git://git.kernel.org/ + TEST CASE: TBD - TEST CASE: TBD - - The following patches from the 4.4.113 stable release shall be - applied: + The following patches from the 4.4.113 stable release shall be applied: + * gcov: disable for COMPILE_TEST + * x86/cpu/AMD: Make LFENCE a serializing instruction + * x86/cpu/AMD: Use LFENCE_RDTSC in preference to MFENCE_RDTSC + * x86/mm/32: Move setup_clear_cpu_cap(X86_FEATURE_PCID) earlier + * x86/asm: Use register variable to get stack pointer value + * x86/kbuild: enable modversions for symbols exported from asm + * x86/asm: Make asm/alternative.h safe from assembly + * EXPORT_SYMBOL() for asm + * kconfig.h: use __is_defined() to check if MODULE is defined + * x86/retpoline: Add initial retpoline support + * x86/spectre: Add boot time option to select Spectre v2 mitigation + * x86/retpoline/crypto: Convert crypto assembler indirect jumps + * x86/retpoline/entry: Convert entry assembler indirect jumps + * x86/retpoline/ftrace: Convert ftrace assembler indirect jumps + * x86/retpoline/hyperv: Convert assembler indirect jumps + * x86/retpoline/xen: Convert Xen hypercall indirect jumps + * x86/retpoline/checksum32: Convert assembler indirect jumps + * x86/retpoline/irq32: Convert assembler indirect jumps + * x86/retpoline: Fill return stack buffer on vmexit + * x86/retpoline: Remove compile time warning + * scsi: sg: disable SET_FORCE_LOW_DMA + * futex: Prevent overflow by strengthen input validation + * ALSA: pcm: Remove yet superfluous WARN_ON() + * ALSA: hda - Apply headphone noise quirk for another Dell XPS 13 variant + * ALSA: hda - Apply the existing quirk to iMac 14,1 + * af_key: fix buffer overread in verify_address_len() + * af_key: fix buffer overread in parse_exthdrs() + * scsi: hpsa: fix volume offline state + * sched/deadline: Zero out positive runtime after throttling constrained tasks + * x86/retpoline: Add LFENCE to the retpoline/RSB filling RSB macros + * module: Add retpoline tag to VERMAGIC + * pipe: avoid round_pipe_size() nr_pages overflow on 32-bit + * x86/apic/vector: Fix off by one in error path + * Input: 88pm860x-ts - fix child-node lookup + * Input: twl6040-vibra - fix DT node memory management + * Input: twl6040-vibra - fix child-node lookup + * Input: twl4030-vibra - fix sibling-node lookup + * tracing: Fix converting enum's from the map in trace_event_eval_update() + * phy: work around 'phys' references to usb-nop-xceiv devices + * ARM: dts: kirkwood: fix pin-muxing of MPP7 on OpenBlocks A7 + * can: peak: fix potential bug in packet fragmentation + * libata: apply MAX_SEC_1024 to all LITEON EP1 series devices + * dm btree: fix serious bug in btree_split_beneath() + * dm thin metadata: THIN_MAX_CONCURRENT_LOCKS should be 6 + * arm64: KVM: Fix SMCCC handling of unimplemented SMC/HVC calls + * x86/cpu, x86/pti: Do not enable PTI on AMD processors + * kbuild: modversions for EXPORT_SYMBOL() for asm + * x86/mce: Make machine check speculation protected + * retpoline: Introduce start/end markers of indirect thunk + * kprobes/x86: Blacklist indirect thunk functions for kprobes + * kprobes/x86: Disable optimizing on the function jumps to indirect thunk + * x86/pti: Document fix wrong index + * x86/retpoline: Optimize inline assembler for vmexit_fill_RSB + * MIPS: AR7: ensure the port type's FCR value is used + * Linux 4.4.113 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1745268 Title: Xenial update to 4.4.113 stable release To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1745268/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs