[Kernel-packages] [Bug 1989374] Re: Bionic update: upstream stable patchset 2022-09-12

2022-10-10 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 4.15.0-194.205

---
linux (4.15.0-194.205) bionic; urgency=medium

  * bionic/linux: 4.15.0-194.205 -proposed tracker (LP: #1989935)

  * Bionic update: upstream stable patchset 2022-09-14 (LP: #1989625)
- random: schedule mix_interrupt_randomness() less often
- ata: libata: add qc->flags in ata_qc_complete_template tracepoint
- dm era: commit metadata in postsuspend after worker stops
- random: quiet urandom warning ratelimit suppression message
- USB: serial: option: add Telit LE910Cx 0x1250 composition
- USB: serial: option: add Quectel EM05-G modem
- USB: serial: option: add Quectel RM500K module support
- bonding: ARP monitor spams NETDEV_NOTIFY_PEERS notifiers
- x86/xen: Remove undefined behavior in setup_features()
- MIPS: Remove repetitive increase irq_err_count
- igb: Make DMA faster when CPU is active on the PCIe link
- iio: adc: vf610: fix conversion mode sysfs node name
- usb: chipidea: udc: check request status before setting device address
- iio:accel:bma180: rearrange iio trigger get and register
- iio: accel: mma8452: ignore the return value of reset operation
- iio: gyro: mpu3050: Fix the error handling in mpu3050_power_up()
- iio: trigger: sysfs: fix use-after-free on remove
- iio: adc: axp288: Override TS pin bias current for some models
- xtensa: xtfpga: Fix refcount leak bug in setup
- xtensa: Fix refcount leak bug in time.c
- powerpc: Enable execve syscall exit tracepoint
- powerpc/rtas: Allow ibm,platform-dump RTAS call with null buffer address
- powerpc/powernv: wire up rng during setup_arch
- ARM: dts: imx6qdl: correct PU regulator ramp delay
- ARM: exynos: Fix refcount leak in exynos_map_pmu
- ARM: Fix refcount leak in axxia_boot_secondary
- ARM: cns3xxx: Fix refcount leak in cns3xxx_init
- modpost: fix section mismatch check for exported init/exit sections
- powerpc/pseries: wire up rng during setup_arch()
- drm: remove drm_fb_helper_modinit
- xen: unexport __init-annotated xen_xlate_map_ballooned_pages()
- fdt: Update CRC check for rng-seed
- kexec_file: drop weak attribute from arch_kexec_apply_relocations[_add]
- swiotlb: skip swiotlb_bounce when orig_addr is zero
- net/sched: sch_netem: Fix arithmetic in netem_dump() for 32-bit platforms
- afs: Fix dynamic root getattr
- iio:chemical:ccs811: rearrange iio trigger get and register
- soc: bcm: brcmstb: pm: pm-arm: Fix refcount leak in brcmstb_pm_probe
- nvdimm: Fix badblocks clear off-by-one error
- dm raid: fix accesses beyond end of raid member array
- dm raid: fix KASAN warning in raid5_add_disks
- s390/archrandom: simplify back to earlier design and initialize earlier
- SUNRPC: Fix READ_PLUS crasher
- net: rose: fix UAF bugs caused by timer handler
- net: usb: ax88179_178a: Fix packet receiving
- RDMA/qedr: Fix reporting QP timeout attribute
- usbnet: fix memory allocation in helpers
- net: ipv6: unexport __init-annotated seg6_hmac_net_init()
- caif_virtio: fix race between virtio_device_ready() and ndo_open()
- netfilter: nft_dynset: restore set element counter when failing to update
- net: bonding: fix possible NULL deref in rlb code
- net: bonding: fix use-after-free after 802.3ad slave unbind
- nfc: nfcmrvl: Fix irq_of_parse_and_map() return value
- NFC: nxp-nci: Don't issue a zero length i2c_master_read()
- xen/gntdev: Avoid blocking in unmap_grant_pages()
- hwmon: (ibmaem) don't call platform_device_del() if platform_device_add()
  fails
- sit: use min
- ipv6/sit: fix ipip6_tunnel_get_prl return value
- net: Rename and export copy_skb_header
- xen/blkfront: fix leaking data in shared pages
- xen/netfront: fix leaking data in shared pages
- xen/netfront: force data bouncing when backend is untrusted
- xen/blkfront: force data bouncing when backend is untrusted
- xen/arm: Fix race in RB-tree based P2M accounting
- net: usb: qmi_wwan: add Telit 0x1060 composition
- net: usb: qmi_wwan: add Telit 0x1070 composition
- virtio-net: fix race between ndo_open() and virtio_device_ready()
- net: tun: unlink NAPI from device on destruction
- net: tun: stop NAPI when detaching queues
- esp: limit skb_page_frag_refill use to a single page
- mm/slub: add missing TID updates on slab deactivation
- can: grcan: grcan_probe(): remove extra of_node_get()
- can: gs_usb: gs_usb_open/close(): fix memory leak
- usbnet: fix memory leak in error case
- net: rose: fix UAF bug caused by rose_t0timer_expiry
- iommu/vt-d: Fix PCI bus rescan device hot add
- video: of_display_timing.h: include errno.h
- powerpc/powernv: delay rng platform device creation until later in boot
- xfs: remove incorrect ASSERT in xfs_rename
- pinctrl: sunxi: a83t: Fix NAND function name for some pins

[Kernel-packages] [Bug 1989374] Re: Bionic update: upstream stable patchset 2022-09-12

2022-09-14 Thread Stefan Bader
** Changed in: linux (Ubuntu Bionic)
   Status: In Progress => Fix Committed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1989374

Title:
  Bionic update: upstream stable patchset 2022-09-12

Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Bionic:
  Fix Committed

Bug description:
  SRU Justification

  Impact:
     The upstream process for stable tree updates is quite similar
     in scope to the Ubuntu SRU process, e.g., each patch has to
     demonstrably fix a bug, and each patch is vetted by upstream
     by originating either directly from a mainline/stable Linux tree or
     a minimally backported form of that patch. The following upstream
     stable patches should be included in the Ubuntu kernel:

     upstream stable patchset 2022-09-12

  Ported from the following upstream stable releases:
  v4.14.285, v4.19.249

     from git://git.kernel.org/

  UBUNTU: [Config] dkms-versions -- force wireguard-dkms update
  Revert "random: Make getrandom() ready earlier"
  9p: missing chunk of "fs/9p: Don't update file type when updating file 
attributes"
  crypto: chacha20 - Fix keystream alignment for chacha20_block()
  random: always fill buffer in get_random_bytes_wait
  random: optimize add_interrupt_randomness
  drivers/char/random.c: remove unused dont_count_entropy
  random: Fix whitespace pre random-bytes work
  random: Return nbytes filled from hw RNG
  UBUNTU: [Config] updateconfigs for RANDOM_TRUST_CPU, RANDOM_TRUST_BOOTLOADER
  random: add a config option to trust the CPU's hwrng
  random: remove preempt disabled region
  random: Make crng state queryable
  random: make CPU trust a boot parameter
  drivers/char/random.c: constify poolinfo_table
  drivers/char/random.c: remove unused stuct poolinfo::poolbits
  drivers/char/random.c: make primary_crng static
  random: only read from /dev/random after its pool has received 128 bits
  random: move rand_initialize() earlier
  random: document get_random_int() family
  latent_entropy: avoid build error when plugin cflags are not set
  random: fix soft lockup when trying to read from an uninitialized blocking 
pool
  random: Support freezable kthreads in add_hwgenerator_randomness()
  fdt: add support for rng-seed
  random: Use wait_event_freezable() in add_hwgenerator_randomness()
  char/random: Add a newline at the end of the file
  Revert "hwrng: core - Freeze khwrng thread during suspend"
  crypto: Deduplicate le32_to_cpu_array() and cpu_to_le32_array()
  crypto: blake2s - generic C library implementation and selftest
  lib/crypto: blake2s: move hmac construction into wireguard
  lib/crypto: sha1: re-roll loops to reduce code size
  random: Don't wake crng_init_wait when crng_init == 1
  random: Add a urandom_read_nowait() for random APIs that don't warn
  random: add GRND_INSECURE to return best-effort non-cryptographic bytes
  random: ignore GRND_RANDOM in getentropy(2)
  random: make /dev/random be almost like /dev/urandom
  random: fix crash on multiple early calls to add_bootloader_randomness()
  random: remove the blocking pool
  random: delete code to pull data into pools
  random: remove kernel.random.read_wakeup_threshold
  random: remove unnecessary unlikely()
  random: convert to ENTROPY_BITS for better code readability
  random: Add and use pr_fmt()
  random: fix typo in add_timer_randomness()
  random: remove some dead code of poolinfo
  random: split primary/secondary crng init paths
  random: avoid warnings for !CONFIG_NUMA builds
  x86: Remove arch_has_random, arch_has_random_seed
  powerpc: Remove arch_has_random, arch_has_random_seed
  s390: Remove arch_has_random, arch_has_random_seed
  linux/random.h: Remove arch_has_random, arch_has_random_seed
  linux/random.h: Use false with bool
  linux/random.h: Mark CONFIG_ARCH_RANDOM functions __must_check
  powerpc: Use bool in archrandom.h
  random: add arch_get_random_*long_early()
  random: avoid arch_get_random_seed_long() when collecting IRQ randomness
  random: remove dead code left over from blocking pool
  MAINTAINERS: co-maintain random.c
  crypto: blake2s - include  instead of 
  crypto: blake2s - adjust include guard naming
  random: document add_hwgenerator_randomness() with other input functions
  random: remove unused irq_flags argument from add_interrupt_randomness()
  random: use BLAKE2s instead of SHA1 in extraction
  random: do not sign extend bytes for rotation when mixing
  random: do not re-init if crng_reseed completes before primary init
  random: mix bootloader randomness into pool
  random: harmonize "crng init done" messages
  random: use IS_ENABLED(CONFIG_NUMA) instead of ifdefs
  random: initialize ChaCha20 constants with correct endianness
  random: early initialization of ChaCha constants
  random: avoid superfluous call to RDRAND in CRNG