[Kernel-packages] [Bug 1989374] Re: Bionic update: upstream stable patchset 2022-09-12
This bug was fixed in the package linux - 4.15.0-194.205 --- linux (4.15.0-194.205) bionic; urgency=medium * bionic/linux: 4.15.0-194.205 -proposed tracker (LP: #1989935) * Bionic update: upstream stable patchset 2022-09-14 (LP: #1989625) - random: schedule mix_interrupt_randomness() less often - ata: libata: add qc->flags in ata_qc_complete_template tracepoint - dm era: commit metadata in postsuspend after worker stops - random: quiet urandom warning ratelimit suppression message - USB: serial: option: add Telit LE910Cx 0x1250 composition - USB: serial: option: add Quectel EM05-G modem - USB: serial: option: add Quectel RM500K module support - bonding: ARP monitor spams NETDEV_NOTIFY_PEERS notifiers - x86/xen: Remove undefined behavior in setup_features() - MIPS: Remove repetitive increase irq_err_count - igb: Make DMA faster when CPU is active on the PCIe link - iio: adc: vf610: fix conversion mode sysfs node name - usb: chipidea: udc: check request status before setting device address - iio:accel:bma180: rearrange iio trigger get and register - iio: accel: mma8452: ignore the return value of reset operation - iio: gyro: mpu3050: Fix the error handling in mpu3050_power_up() - iio: trigger: sysfs: fix use-after-free on remove - iio: adc: axp288: Override TS pin bias current for some models - xtensa: xtfpga: Fix refcount leak bug in setup - xtensa: Fix refcount leak bug in time.c - powerpc: Enable execve syscall exit tracepoint - powerpc/rtas: Allow ibm,platform-dump RTAS call with null buffer address - powerpc/powernv: wire up rng during setup_arch - ARM: dts: imx6qdl: correct PU regulator ramp delay - ARM: exynos: Fix refcount leak in exynos_map_pmu - ARM: Fix refcount leak in axxia_boot_secondary - ARM: cns3xxx: Fix refcount leak in cns3xxx_init - modpost: fix section mismatch check for exported init/exit sections - powerpc/pseries: wire up rng during setup_arch() - drm: remove drm_fb_helper_modinit - xen: unexport __init-annotated xen_xlate_map_ballooned_pages() - fdt: Update CRC check for rng-seed - kexec_file: drop weak attribute from arch_kexec_apply_relocations[_add] - swiotlb: skip swiotlb_bounce when orig_addr is zero - net/sched: sch_netem: Fix arithmetic in netem_dump() for 32-bit platforms - afs: Fix dynamic root getattr - iio:chemical:ccs811: rearrange iio trigger get and register - soc: bcm: brcmstb: pm: pm-arm: Fix refcount leak in brcmstb_pm_probe - nvdimm: Fix badblocks clear off-by-one error - dm raid: fix accesses beyond end of raid member array - dm raid: fix KASAN warning in raid5_add_disks - s390/archrandom: simplify back to earlier design and initialize earlier - SUNRPC: Fix READ_PLUS crasher - net: rose: fix UAF bugs caused by timer handler - net: usb: ax88179_178a: Fix packet receiving - RDMA/qedr: Fix reporting QP timeout attribute - usbnet: fix memory allocation in helpers - net: ipv6: unexport __init-annotated seg6_hmac_net_init() - caif_virtio: fix race between virtio_device_ready() and ndo_open() - netfilter: nft_dynset: restore set element counter when failing to update - net: bonding: fix possible NULL deref in rlb code - net: bonding: fix use-after-free after 802.3ad slave unbind - nfc: nfcmrvl: Fix irq_of_parse_and_map() return value - NFC: nxp-nci: Don't issue a zero length i2c_master_read() - xen/gntdev: Avoid blocking in unmap_grant_pages() - hwmon: (ibmaem) don't call platform_device_del() if platform_device_add() fails - sit: use min - ipv6/sit: fix ipip6_tunnel_get_prl return value - net: Rename and export copy_skb_header - xen/blkfront: fix leaking data in shared pages - xen/netfront: fix leaking data in shared pages - xen/netfront: force data bouncing when backend is untrusted - xen/blkfront: force data bouncing when backend is untrusted - xen/arm: Fix race in RB-tree based P2M accounting - net: usb: qmi_wwan: add Telit 0x1060 composition - net: usb: qmi_wwan: add Telit 0x1070 composition - virtio-net: fix race between ndo_open() and virtio_device_ready() - net: tun: unlink NAPI from device on destruction - net: tun: stop NAPI when detaching queues - esp: limit skb_page_frag_refill use to a single page - mm/slub: add missing TID updates on slab deactivation - can: grcan: grcan_probe(): remove extra of_node_get() - can: gs_usb: gs_usb_open/close(): fix memory leak - usbnet: fix memory leak in error case - net: rose: fix UAF bug caused by rose_t0timer_expiry - iommu/vt-d: Fix PCI bus rescan device hot add - video: of_display_timing.h: include errno.h - powerpc/powernv: delay rng platform device creation until later in boot - xfs: remove incorrect ASSERT in xfs_rename - pinctrl: sunxi: a83t: Fix NAND function name for some pins
[Kernel-packages] [Bug 1989374] Re: Bionic update: upstream stable patchset 2022-09-12
** Changed in: linux (Ubuntu Bionic) Status: In Progress => Fix Committed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1989374 Title: Bionic update: upstream stable patchset 2022-09-12 Status in linux package in Ubuntu: Invalid Status in linux source package in Bionic: Fix Committed Bug description: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable Linux tree or a minimally backported form of that patch. The following upstream stable patches should be included in the Ubuntu kernel: upstream stable patchset 2022-09-12 Ported from the following upstream stable releases: v4.14.285, v4.19.249 from git://git.kernel.org/ UBUNTU: [Config] dkms-versions -- force wireguard-dkms update Revert "random: Make getrandom() ready earlier" 9p: missing chunk of "fs/9p: Don't update file type when updating file attributes" crypto: chacha20 - Fix keystream alignment for chacha20_block() random: always fill buffer in get_random_bytes_wait random: optimize add_interrupt_randomness drivers/char/random.c: remove unused dont_count_entropy random: Fix whitespace pre random-bytes work random: Return nbytes filled from hw RNG UBUNTU: [Config] updateconfigs for RANDOM_TRUST_CPU, RANDOM_TRUST_BOOTLOADER random: add a config option to trust the CPU's hwrng random: remove preempt disabled region random: Make crng state queryable random: make CPU trust a boot parameter drivers/char/random.c: constify poolinfo_table drivers/char/random.c: remove unused stuct poolinfo::poolbits drivers/char/random.c: make primary_crng static random: only read from /dev/random after its pool has received 128 bits random: move rand_initialize() earlier random: document get_random_int() family latent_entropy: avoid build error when plugin cflags are not set random: fix soft lockup when trying to read from an uninitialized blocking pool random: Support freezable kthreads in add_hwgenerator_randomness() fdt: add support for rng-seed random: Use wait_event_freezable() in add_hwgenerator_randomness() char/random: Add a newline at the end of the file Revert "hwrng: core - Freeze khwrng thread during suspend" crypto: Deduplicate le32_to_cpu_array() and cpu_to_le32_array() crypto: blake2s - generic C library implementation and selftest lib/crypto: blake2s: move hmac construction into wireguard lib/crypto: sha1: re-roll loops to reduce code size random: Don't wake crng_init_wait when crng_init == 1 random: Add a urandom_read_nowait() for random APIs that don't warn random: add GRND_INSECURE to return best-effort non-cryptographic bytes random: ignore GRND_RANDOM in getentropy(2) random: make /dev/random be almost like /dev/urandom random: fix crash on multiple early calls to add_bootloader_randomness() random: remove the blocking pool random: delete code to pull data into pools random: remove kernel.random.read_wakeup_threshold random: remove unnecessary unlikely() random: convert to ENTROPY_BITS for better code readability random: Add and use pr_fmt() random: fix typo in add_timer_randomness() random: remove some dead code of poolinfo random: split primary/secondary crng init paths random: avoid warnings for !CONFIG_NUMA builds x86: Remove arch_has_random, arch_has_random_seed powerpc: Remove arch_has_random, arch_has_random_seed s390: Remove arch_has_random, arch_has_random_seed linux/random.h: Remove arch_has_random, arch_has_random_seed linux/random.h: Use false with bool linux/random.h: Mark CONFIG_ARCH_RANDOM functions __must_check powerpc: Use bool in archrandom.h random: add arch_get_random_*long_early() random: avoid arch_get_random_seed_long() when collecting IRQ randomness random: remove dead code left over from blocking pool MAINTAINERS: co-maintain random.c crypto: blake2s - include instead of crypto: blake2s - adjust include guard naming random: document add_hwgenerator_randomness() with other input functions random: remove unused irq_flags argument from add_interrupt_randomness() random: use BLAKE2s instead of SHA1 in extraction random: do not sign extend bytes for rotation when mixing random: do not re-init if crng_reseed completes before primary init random: mix bootloader randomness into pool random: harmonize "crng init done" messages random: use IS_ENABLED(CONFIG_NUMA) instead of ifdefs random: initialize ChaCha20 constants with correct endianness random: early initialization of ChaCha constants random: avoid superfluous call to RDRAND in CRNG