Public bug reported: SRU Justification
Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable Linux tree or a minimally backported form of that patch. The v4.4.26 upstream stable patch set is now available. It should be included in the Ubuntu kernel as well. git://git.kernel.org/ TEST CASE: TBD The following patches from the v4.4.26 stable release shall be applied: serial: 8250_dw: Check the data->pclk when get apb_pclk btrfs: assign error values to the correct bio structs drivers: base: dma-mapping: page align the size when unmap_kernel_range fuse: listxattr: verify xattr list fuse: invalidate dir dentry after chmod fuse: fix killing s[ug]id in setattr i40e: avoid NULL pointer dereference and recursive errors on early PCI error brcmfmac: fix memory leak in brcmf_fill_bss_param ASoC: Intel: Atom: add a missing star in a memcpy call reiserfs: Unlock superblock before calling reiserfs_quota_on_mount() reiserfs: switch to generic_{get,set,remove}xattr() async_pq_val: fix DMA memory leak scsi: arcmsr: Simplify user_len checking ext4: enforce online defrag restriction for encrypted files ext4: reinforce check of i_dtime when clearing high fields of uid and gid ext4: fix memory leak in ext4_insert_range() ext4: allow DAX writeback for hole punch ext4: release bh in make_indexed_dir dlm: free workqueues after the connections vfs: move permission checking into notify_change() for utimes(NULL) cfq: fix starvation of asynchronous writes Linux 4.4.27 ** Affects: linux (Ubuntu) Importance: Undecided Status: New ** Affects: linux (Ubuntu Xenial) Importance: Undecided Status: New ** Tags: kernel-stable-tracking-bug ** Tags added: kernel-stable-tracking-bug ** Also affects: linux (Ubuntu Xenial) Importance: Undecided Status: New ** Description changed: + SRU Justification - SRU Justification + Impact: + The upstream process for stable tree updates is quite similar + in scope to the Ubuntu SRU process, e.g., each patch has to + demonstrably fix a bug, and each patch is vetted by upstream + by originating either directly from a mainline/stable Linux tree or + a minimally backported form of that patch. The v4.4.26 upstream stable + patch set is now available. It should be included in the Ubuntu + kernel as well. - Impact: - The upstream process for stable tree updates is quite similar - in scope to the Ubuntu SRU process, e.g., each patch has to - demonstrably fix a bug, and each patch is vetted by upstream - by originating either directly from a mainline/stable Linux tree or - a minimally backported form of that patch. The v4.4.26 upstream stable - patch set is now available. It should be included in the Ubuntu - kernel as well. + git://git.kernel.org/ - git://git.kernel.org/ + TEST CASE: TBD - TEST CASE: TBD + The following patches from the v4.4.26 stable release shall be + applied: - The following patches from the v4.4.26 stable release shall be - applied: + serial: 8250_dw: Check the data->pclk when get apb_pclk + btrfs: assign error values to the correct bio structs + drivers: base: dma-mapping: page align the size when unmap_kernel_range + fuse: listxattr: verify xattr list + fuse: invalidate dir dentry after chmod + fuse: fix killing s[ug]id in setattr + i40e: avoid NULL pointer dereference and recursive errors on early PCI error + brcmfmac: fix memory leak in brcmf_fill_bss_param + ASoC: Intel: Atom: add a missing star in a memcpy call + reiserfs: Unlock superblock before calling reiserfs_quota_on_mount() + reiserfs: switch to generic_{get,set,remove}xattr() + async_pq_val: fix DMA memory leak + scsi: arcmsr: Simplify user_len checking + ext4: enforce online defrag restriction for encrypted files + ext4: reinforce check of i_dtime when clearing high fields of uid and gid + ext4: fix memory leak in ext4_insert_range() + ext4: allow DAX writeback for hole punch + ext4: release bh in make_indexed_dir + dlm: free workqueues after the connections + vfs: move permission checking into notify_change() for utimes(NULL) + cfq: fix starvation of asynchronous writes + Linux 4.4.27 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1637501 Title: Xenial update to v4.4.26 stable release Status in linux package in Ubuntu: New Status in linux source package in Xenial: New Bug description: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable Linux tree or a minimally backported form of that patch. The v4.4.26 upstream stable patch set is now available. It should be included in the Ubuntu kernel as well. git://git.kernel.org/ TEST CASE: TBD The following patches from the v4.4.26 stable release shall be applied: serial: 8250_dw: Check the data->pclk when get apb_pclk btrfs: assign error values to the correct bio structs drivers: base: dma-mapping: page align the size when unmap_kernel_range fuse: listxattr: verify xattr list fuse: invalidate dir dentry after chmod fuse: fix killing s[ug]id in setattr i40e: avoid NULL pointer dereference and recursive errors on early PCI error brcmfmac: fix memory leak in brcmf_fill_bss_param ASoC: Intel: Atom: add a missing star in a memcpy call reiserfs: Unlock superblock before calling reiserfs_quota_on_mount() reiserfs: switch to generic_{get,set,remove}xattr() async_pq_val: fix DMA memory leak scsi: arcmsr: Simplify user_len checking ext4: enforce online defrag restriction for encrypted files ext4: reinforce check of i_dtime when clearing high fields of uid and gid ext4: fix memory leak in ext4_insert_range() ext4: allow DAX writeback for hole punch ext4: release bh in make_indexed_dir dlm: free workqueues after the connections vfs: move permission checking into notify_change() for utimes(NULL) cfq: fix starvation of asynchronous writes Linux 4.4.27 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1637501/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp