** Changed in: linux (Ubuntu Xenial) Status: New => Fix Committed
-- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1596575 Title: Xenial update to v4.4.14 stable release Status in linux package in Ubuntu: New Status in linux source package in Xenial: Fix Committed Bug description: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable Linux tree or a minimally backported form of that patch. The v4.4.14 upstream stable patch set is now available. It should be included in the Ubuntu kernel as well. git://git.kernel.org/ TEST CASE: TBD The following patches from the v4.4.14 stable release shall be applied: scsi_lib: correctly retry failed zero length REQ_TYPE_FS commands scsi: Add QEMU CD-ROM to VPD Inquiry Blacklist netlink: Fix dump skb leak/double free tipc: fix nametable publication field in nl compat switchdev: pass pointer to fib_info instead of copy tuntap: correctly wake up process during uninit bpf: Use mount_nodev not mount_ns to mount the bpf filesystem udp: prevent skbs lingering in tunnel socket queues uapi glibc compat: fix compilation when !__USE_MISC in glibc bpf, inode: disallow userns mounts sfc: on MC reset, clear PIO buffer linkage in TXQs team: don't call netdev_change_features under team->lock vxlan: Accept user specified MTU value when create new vxlan link tcp: record TLP and ER timer stats in v6 stats bridge: Don't insert unnecessary local fdb entry on changing mac address l2tp: fix configuration passed to setup_udp_tunnel_sock() ipv6: Skip XFRM lookup if dst_entry in socket cache is valid vxlan: Relax MTU constraints geneve: Relax MTU constraints vxlan, gre, geneve: Set a large MTU on ovs-created tunnel devices KVM: x86: fix OOPS after invalid KVM_SET_DEBUGREGS KVM: irqfd: fix NULL pointer dereference in kvm_irq_map_gsi ALSA: hda - Add PCI ID for Kabylake ALSA: hda - Fix headset mic detection problem for Dell machine ALSA: hda/realtek - ALC256 speaker noise issue ALSA: hda/realtek - Add support for new codecs ALC700/ALC701/ALC703 ALSA: hda/realtek: Add T560 docking unit fixup ARM: fix PTRACE_SETVFPREGS on SMP systems gpio: bcm-kona: fix bcm_kona_gpio_reset() warnings s390/bpf: fix recache skb->data/hlen for skb_vlan_push/pop s390/bpf: reduce maximum program size to 64 KB irqchip/gic-v3: Fix ICC_SGI1R_EL1.INTID decoding mask crypto: public_key: select CRYPTO_AKCIPHER crypto: ccp - Fix AES XTS error for request sizes above 4096 arm64: Provide "model name" in /proc/cpuinfo for PER_LINUX32 tasks arm64: mm: always take dirty state from new pte in ptep_set_access_flags powerpc/pseries/eeh: Handle RTAS delay requests in configure_bridge powerpc: Fix definition of SIAR and SDAR registers powerpc: Use privileged SPR number for MMCR2 powerpc/pseries: Add POWER8NVL support to ibm,client-architecture-support call pinctrl: mediatek: fix dual-edge code defect parisc: Fix pagefault crash in unaligned __get_user() call memcg: add RCU locking around css_for_each_descendant_pre() in memcg_offline_kmem() wext: Fix 32 bit iwpriv compatibility issue with 64 bit Kernel x86/entry/traps: Don't force in_interrupt() to return true in IST handlers fix d_walk()/non-delayed __d_free() race sparc: Fix system call tracing register handling. sparc64: Fix bootup regressions on some Kconfig combinations. sparc64: Fix numa node distance initialization sparc64: Fix sparc64_set_context stack handling. sparc/PCI: Fix for panic while enabling SR-IOV sparc64: Reduce TLB flushes during hugepte changes sparc64: Take ctx_alloc_lock properly in hugetlb_setup(). sparc: Harden signal return frame checks. sparc64: Fix return from trap window fill crashes. MIPS: Fix 64k page support for 32 bit kernels. crypto: qat - fix adf_ctl_drv.c:undefined reference to adf_init_pf_wq drm/core: Do not preserve framebuffer on rmfb, v4. Linux 4.4.14 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1596575/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp