[Kernel-packages] [Bug 1832661] Re: Xenial update: 4.4.181 upstream stable release
** Changed in: linux (Ubuntu) Status: Confirmed => Invalid -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1832661 Title: Xenial update: 4.4.181 upstream stable release Status in linux package in Ubuntu: Invalid Status in linux source package in Xenial: Fix Released Bug description: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable Linux tree or a minimally backported form of that patch. The following upstream stable patches should be included in the Ubuntu kernel: 4.4.181 upstream stable release from git://git.kernel.org/ To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1832661/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1832661] Re: Xenial update: 4.4.181 upstream stable release
This bug was fixed in the package linux - 4.4.0-157.185 --- linux (4.4.0-157.185) xenial; urgency=medium * linux: 4.4.0-157.185 -proposed tracker (LP: #1837476) * systemd 229-4ubuntu21.22 ADT test failure with linux 4.4.0-156.183 (storage) (LP: #1837235) - Revert "block/bio: Do not zero user pages" - Revert "block: Clear kernel memory before copying to user" - Revert "bio_copy_from_iter(): get rid of copying iov_iter" linux (4.4.0-156.183) xenial; urgency=medium * linux: 4.4.0-156.183 -proposed tracker (LP: #1836880) * BCM43602 802.11ac Wireless regression - PCI ID 14e4:43ba (LP: #1836801) - brcmfmac: add eth_type_trans back for PCIe full dongle linux (4.4.0-155.182) xenial; urgency=medium * linux: 4.4.0-155.182 -proposed tracker (LP: #1834918) * Geneve tunnels don't work when ipv6 is disabled (LP: #1794232) - geneve: correctly handle ipv6.disable module parameter * Kernel modules generated incorrectly when system is localized to a non- English language (LP: #1828084) - scripts: override locale from environment when running recordmcount.pl * Handle overflow in proc_get_long of sysctl (LP: #1833935) - sysctl: handle overflow in proc_get_long * Xenial update: 4.4.181 upstream stable release (LP: #1832661) - x86/speculation/mds: Revert CPU buffer clear on double fault exit - x86/speculation/mds: Improve CPU buffer clear documentation - ARM: exynos: Fix a leaked reference by adding missing of_node_put - crypto: vmx - fix copy-paste error in CTR mode - crypto: crct10dif-generic - fix use via crypto_shash_digest() - crypto: x86/crct10dif-pcl - fix use via crypto_shash_digest() - ALSA: usb-audio: Fix a memory leak bug - ALSA: hda/hdmi - Consider eld_valid when reporting jack event - ALSA: hda/realtek - EAPD turn on later - ASoC: max98090: Fix restore of DAPM Muxes - ASoC: RT5677-SPI: Disable 16Bit SPI Transfers - mm/mincore.c: make mincore() more conservative - ocfs2: fix ocfs2 read inode data panic in ocfs2_iget - mfd: da9063: Fix OTP control register names to match datasheets for DA9063/63L - tty/vt: fix write/write race in ioctl(KDSKBSENT) handler - ext4: actually request zeroing of inode table after grow - ext4: fix ext4_show_options for file systems w/o journal - Btrfs: do not start a transaction at iterate_extent_inodes() - bcache: fix a race between cache register and cacheset unregister - bcache: never set KEY_PTRS of journal key to 0 in journal_reclaim() - ipmi:ssif: compare block number correctly for multi-part return messages - crypto: gcm - Fix error return code in crypto_gcm_create_common() - crypto: gcm - fix incompatibility between "gcm" and "gcm_base" - crypto: chacha20poly1305 - set cra_name correctly - crypto: salsa20 - don't access already-freed walk.iv - crypto: arm/aes-neonbs - don't access already-freed walk.iv - writeback: synchronize sync(2) against cgroup writeback membership switches - fs/writeback.c: use rcu_barrier() to wait for inflight wb switches going into workqueue when umount - ALSA: hda/realtek - Fix for Lenovo B50-70 inverted internal microphone bug - KVM: x86: Skip EFER vs. guest CPUID checks for host-initiated writes - net: avoid weird emergency message - net/mlx4_core: Change the error print to info print - ppp: deflate: Fix possible crash in deflate_init - tipc: switch order of device registration to fix a crash - tipc: fix modprobe tipc failed after switch order of device registration - stm class: Fix channel free in stm output free path - md: add mddev->pers to avoid potential NULL pointer dereference - intel_th: msu: Fix single mode with IOMMU - of: fix clang -Wunsequenced for be32_to_cpu() - cifs: fix strcat buffer overflow and reduce raciness in smb21_set_oplock_level() - media: ov6650: Fix sensor possibly not detected on probe - NFS4: Fix v4.0 client state corruption when mount - clk: tegra: Fix PLLM programming on Tegra124+ when PMC overrides divider - fuse: fix writepages on 32bit - fuse: honor RLIMIT_FSIZE in fuse_file_fallocate - iommu/tegra-smmu: Fix invalid ASID bits on Tegra30/114 - ceph: flush dirty inodes before proceeding with remount - tracing: Fix partial reading of trace event's id file - memory: tegra: Fix integer overflow on tick value calculation - perf intel-pt: Fix instructions sampling rate - perf intel-pt: Fix improved sample timestamp - perf intel-pt: Fix sample timestamp wrt non-taken branches - fbdev: sm712fb: fix brightness control on reboot, don't set SR30 - fbdev: sm712fb: fix VRAM detection, don't set SR70/71/74/75 - fbdev: sm712fb: fix white screen of death on reboot, don't set CR3B-CR3F - fbdev: sm712fb: fix boot screen glitch when sm712fb replaces VGA - fbdev: sm712fb: fix crashes during framebuffer writes by correctly
[Kernel-packages] [Bug 1832661] Re: Xenial update: 4.4.181 upstream stable release
** Changed in: linux (Ubuntu Xenial) Status: Confirmed => Fix Committed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1832661 Title: Xenial update: 4.4.181 upstream stable release Status in linux package in Ubuntu: Confirmed Status in linux source package in Xenial: Fix Committed Bug description: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable Linux tree or a minimally backported form of that patch. The following upstream stable patches should be included in the Ubuntu kernel: 4.4.181 upstream stable release from git://git.kernel.org/ To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1832661/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1832661] Re: Xenial update: 4.4.181 upstream stable release
These 4 patches didn't apply cleanly and needed manual merging. Nothing too hairy though: synchronize sync(2) against cgroup writeback membership switches KVM: x86: Skip EFER vs. guest CPUID checks for host-initiated writes arm64: cpu_ops: fix a leaked reference by adding missing of_node_put crypto: vmx - ghash: do nosimd fallback manually -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1832661 Title: Xenial update: 4.4.181 upstream stable release Status in linux package in Ubuntu: Confirmed Status in linux source package in Xenial: Confirmed Bug description: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable Linux tree or a minimally backported form of that patch. The following upstream stable patches should be included in the Ubuntu kernel: 4.4.181 upstream stable release from git://git.kernel.org/ To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1832661/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1832661] Re: Xenial update: 4.4.181 upstream stable release
The following patches were NOT applied since they were applied previously: tools include: Adopt linux/bits.h net: create skb_gso_validate_mac_len() bnx2x: disable GSO where gso_size is too big for hardware -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1832661 Title: Xenial update: 4.4.181 upstream stable release Status in linux package in Ubuntu: Confirmed Status in linux source package in Xenial: Confirmed Bug description: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable Linux tree or a minimally backported form of that patch. The following upstream stable patches should be included in the Ubuntu kernel: 4.4.181 upstream stable release from git://git.kernel.org/ To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1832661/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1832661] Re: Xenial update: 4.4.181 upstream stable release
Applied patches: * x86/speculation/mds: Revert CPU buffer clear on double fault exit * x86/speculation/mds: Improve CPU buffer clear documentation * ARM: exynos: Fix a leaked reference by adding missing of_node_put * crypto: vmx - fix copy-paste error in CTR mode * crypto: crct10dif-generic - fix use via crypto_shash_digest() * crypto: x86/crct10dif-pcl - fix use via crypto_shash_digest() * ALSA: usb-audio: Fix a memory leak bug * ALSA: hda/hdmi - Consider eld_valid when reporting jack event * ALSA: hda/realtek - EAPD turn on later * ASoC: max98090: Fix restore of DAPM Muxes * ASoC: RT5677-SPI: Disable 16Bit SPI Transfers * mm/mincore.c: make mincore() more conservative * ocfs2: fix ocfs2 read inode data panic in ocfs2_iget * mfd: da9063: Fix OTP control register names to match datasheets for DA9063/63L * tty/vt: fix write/write race in ioctl(KDSKBSENT) handler * ext4: actually request zeroing of inode table after grow * ext4: fix ext4_show_options for file systems w/o journal * Btrfs: do not start a transaction at iterate_extent_inodes() * bcache: fix a race between cache register and cacheset unregister * bcache: never set KEY_PTRS of journal key to 0 in journal_reclaim() * ipmi:ssif: compare block number correctly for multi-part return messages * crypto: gcm - Fix error return code in crypto_gcm_create_common() * crypto: gcm - fix incompatibility between "gcm" and "gcm_base" * crypto: chacha20poly1305 - set cra_name correctly * crypto: salsa20 - don't access already-freed walk.iv * crypto: arm/aes-neonbs - don't access already-freed walk.iv * writeback: synchronize sync(2) against cgroup writeback membership switches * fs/writeback.c: use rcu_barrier() to wait for inflight wb switches going into workqueue when umount * ext4: zero out the unused memory region in the extent tree block * ALSA: hda/realtek - Fix for Lenovo B50-70 inverted internal microphone bug * KVM: x86: Skip EFER vs. guest CPUID checks for host-initiated writes * net: avoid weird emergency message * net/mlx4_core: Change the error print to info print * ppp: deflate: Fix possible crash in deflate_init * tipc: switch order of device registration to fix a crash * tipc: fix modprobe tipc failed after switch order of device registration * stm class: Fix channel free in stm output free path * md: add mddev->pers to avoid potential NULL pointer dereference * intel_th: msu: Fix single mode with IOMMU * of: fix clang -Wunsequenced for be32_to_cpu() * cifs: fix strcat buffer overflow and reduce raciness in smb21_set_oplock_level() * media: ov6650: Fix sensor possibly not detected on probe * NFS4: Fix v4.0 client state corruption when mount * clk: tegra: Fix PLLM programming on Tegra124+ when PMC overrides divider * fuse: fix writepages on 32bit * fuse: honor RLIMIT_FSIZE in fuse_file_fallocate * iommu/tegra-smmu: Fix invalid ASID bits on Tegra30/114 * ceph: flush dirty inodes before proceeding with remount * tracing: Fix partial reading of trace event's id file * memory: tegra: Fix integer overflow on tick value calculation * perf intel-pt: Fix instructions sampling rate * perf intel-pt: Fix improved sample timestamp * perf intel-pt: Fix sample timestamp wrt non-taken branches * fbdev: sm712fb: fix brightness control on reboot, don't set SR30 * fbdev: sm712fb: fix VRAM detection, don't set SR70/71/74/75 * fbdev: sm712fb: fix white screen of death on reboot, don't set CR3B-CR3F * fbdev: sm712fb: fix boot screen glitch when sm712fb replaces VGA * fbdev: sm712fb: fix crashes during framebuffer writes by correctly mapping VRAM * fbdev: sm712fb: fix support for 1024x768-16 mode * fbdev: sm712fb: use 1024x768 by default on non-MIPS, fix garbled display * fbdev: sm712fb: fix crashes and garbled display during DPMS modesetting * PCI: Mark Atheros AR9462 to avoid bus reset * dm delay: fix a crash when invalid device is specified * xfrm: policy: Fix out-of-bound array accesses in __xfrm_policy_unlink * xfrm6_tunnel: Fix potential panic when unloading xfrm6_tunnel module * vti4: ipip tunnel deregistration fixes. * xfrm4: Fix uninitialized memory read in _decode_session4 * KVM: arm/arm64: Ensure vcpu target is unset on reset failure * power: supply: sysfs: prevent endless uevent loop with CONFIG_POWER_SUPPLY_DEBUG * ufs: fix braino in ufs_get_inode_gid() for solaris UFS flavour * perf bench numa: Add define for RUSAGE_THREAD if not present * Revert "Don't jump to compute_result state from check_result state" * md/raid: raid5 preserve the writeback action after the parity check * btrfs: Honour FITRIM range constraints during free space trim * fbdev: sm712fb: fix memory frequency by avoiding a switch/case fallthrough * ext4: do not delete unlinked inode from orphan list on failed truncate * KVM: x86: fix return value for reserved EFER * bio: fix improper use of smp_mb__before_atomic() * Revert "scsi: sd: Keep disk read-only when re-reading partition" * crypto: vmx - CTR: always increment IV as quadword * gfs2: Fix sign extension bug in gfs2_update_stats *
[Kernel-packages] [Bug 1832661] Re: Xenial update: 4.4.181 upstream stable release
Status changed to 'Confirmed' because the bug affects multiple users. ** Changed in: linux (Ubuntu Xenial) Status: New => Confirmed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1832661 Title: Xenial update: 4.4.181 upstream stable release Status in linux package in Ubuntu: Confirmed Status in linux source package in Xenial: Confirmed Bug description: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable Linux tree or a minimally backported form of that patch. The following upstream stable patches should be included in the Ubuntu kernel: 4.4.181 upstream stable release from git://git.kernel.org/ To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1832661/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp