Public bug reported: SRU Justification
Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable Linux tree or a minimally backported form of that patch. The 4.4.32 upstream stable patch set is now available. It should be included in the Ubuntu kernel as well. git://git.kernel.org/ TEST CASE: TBD The following patches from the 4.4.32 stable release shall be applied: tcp: fix overflow in __tcp_retransmit_skb() net: avoid sk_forward_alloc overflows tcp: fix wrong checksum calculation on MTU probing tcp: fix a compile error in DBGUNDO() ip6_gre: fix flowi6_proto value in ip6gre_xmit_other() ipmr, ip6mr: fix scheduling while atomic and a deadlock with ipmr_get_route tg3: Avoid NULL pointer dereference in tg3_io_error_detected() net: fec: set mac address unconditionally net: pktgen: fix pkt_size net/sched: act_vlan: Push skb->data to mac_header prior calling skb_vlan_*() functions net: Add netdev all_adj_list refcnt propagation to fix panic packet: call fanout_release, while UNREGISTERING a netdev netlink: do not enter direct reclaim from netlink_dump() ipv6: tcp: restore IP6CB for pktoptions skbs ip6_tunnel: fix ip6_tnl_lookup ipv6: correctly add local routes when lo goes up net: pktgen: remove rcu locking in pktgen_change_name() bridge: multicast: restore perm router ports on multicast enable rtnetlink: Add rtnexthop offload flag to compare mask net: add recursion limit to GRO ipv4: disable BH in set_ping_group_range() ipv4: use the right lock for ping_group_range net: sctp, forbid negative length udp: fix IP_CHECKSUM handling net sched filters: fix notification of filter delete with proper handle sctp: validate chunk len before actually using it packet: on direct_xmit, limit tso and csum to supported devices of: silence warnings due to max() usage Revert KVM: MIPS: Drop other CPU ASIDs on guest MMU changes KVM: MIPS: Drop other CPU ASIDs on guest MMU changes drm/amdgpu/dp: add back special handling for NUTMEG drm/amdgpu: fix DP mode validation drm/radeon/dp: add back special handling for NUTMEG drm/radeon: fix DP mode validation scsi: megaraid_sas: fix macro MEGASAS_IS_LOGICAL to avoid regression Linux 4.4.32 ** Affects: linux (Ubuntu) Importance: Undecided Status: New ** Affects: linux (Ubuntu Xenial) Importance: Undecided Assignee: Luis Henriques (henrix) Status: In Progress ** Tags: kernel-stable-tracking-bug ** Tags added: kernel-stable-tracking-bug ** Also affects: linux (Ubuntu Xenial) Importance: Undecided Status: New ** Description changed: + SRU Justification - SRU Justification + Impact: + The upstream process for stable tree updates is quite similar + in scope to the Ubuntu SRU process, e.g., each patch has to + demonstrably fix a bug, and each patch is vetted by upstream + by originating either directly from a mainline/stable Linux tree or + a minimally backported form of that patch. The 4.4.32 upstream stable + patch set is now available. It should be included in the Ubuntu + kernel as well. - Impact: - The upstream process for stable tree updates is quite similar - in scope to the Ubuntu SRU process, e.g., each patch has to - demonstrably fix a bug, and each patch is vetted by upstream - by originating either directly from a mainline/stable Linux tree or - a minimally backported form of that patch. The 4.4.32 upstream stable - patch set is now available. It should be included in the Ubuntu - kernel as well. + git://git.kernel.org/ - git://git.kernel.org/ + TEST CASE: TBD - TEST CASE: TBD + The following patches from the 4.4.32 stable release shall be + applied: - The following patches from the 4.4.32 stable release shall be - applied: + tcp: fix overflow in __tcp_retransmit_skb() + net: avoid sk_forward_alloc overflows + tcp: fix wrong checksum calculation on MTU probing + tcp: fix a compile error in DBGUNDO() + ip6_gre: fix flowi6_proto value in ip6gre_xmit_other() + ipmr, ip6mr: fix scheduling while atomic and a deadlock with ipmr_get_route + tg3: Avoid NULL pointer dereference in tg3_io_error_detected() + net: fec: set mac address unconditionally + net: pktgen: fix pkt_size + net/sched: act_vlan: Push skb->data to mac_header prior calling skb_vlan_*() functions + net: Add netdev all_adj_list refcnt propagation to fix panic + packet: call fanout_release, while UNREGISTERING a netdev + netlink: do not enter direct reclaim from netlink_dump() + ipv6: tcp: restore IP6CB for pktoptions skbs + ip6_tunnel: fix ip6_tnl_lookup + ipv6: correctly add local routes when lo goes up + net: pktgen: remove rcu locking in pktgen_change_name() + bridge: multicast: restore perm router ports on multicast enable + rtnetlink: Add rtnexthop offload flag to compare mask + net: add recursion limit to GRO + ipv4: disable BH in set_ping_group_range() + ipv4: use the right lock for ping_group_range + net: sctp, forbid negative length + udp: fix IP_CHECKSUM handling + net sched filters: fix notification of filter delete with proper handle + sctp: validate chunk len before actually using it + packet: on direct_xmit, limit tso and csum to supported devices + of: silence warnings due to max() usage + Revert KVM: MIPS: Drop other CPU ASIDs on guest MMU changes + KVM: MIPS: Drop other CPU ASIDs on guest MMU changes + drm/amdgpu/dp: add back special handling for NUTMEG + drm/amdgpu: fix DP mode validation + drm/radeon/dp: add back special handling for NUTMEG + drm/radeon: fix DP mode validation + scsi: megaraid_sas: fix macro MEGASAS_IS_LOGICAL to avoid regression + Linux 4.4.32 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1642573 Title: Xenial update to 4.4.32 stable release Status in linux package in Ubuntu: New Status in linux source package in Xenial: In Progress Bug description: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable Linux tree or a minimally backported form of that patch. The 4.4.32 upstream stable patch set is now available. It should be included in the Ubuntu kernel as well. git://git.kernel.org/ TEST CASE: TBD The following patches from the 4.4.32 stable release shall be applied: tcp: fix overflow in __tcp_retransmit_skb() net: avoid sk_forward_alloc overflows tcp: fix wrong checksum calculation on MTU probing tcp: fix a compile error in DBGUNDO() ip6_gre: fix flowi6_proto value in ip6gre_xmit_other() ipmr, ip6mr: fix scheduling while atomic and a deadlock with ipmr_get_route tg3: Avoid NULL pointer dereference in tg3_io_error_detected() net: fec: set mac address unconditionally net: pktgen: fix pkt_size net/sched: act_vlan: Push skb->data to mac_header prior calling skb_vlan_*() functions net: Add netdev all_adj_list refcnt propagation to fix panic packet: call fanout_release, while UNREGISTERING a netdev netlink: do not enter direct reclaim from netlink_dump() ipv6: tcp: restore IP6CB for pktoptions skbs ip6_tunnel: fix ip6_tnl_lookup ipv6: correctly add local routes when lo goes up net: pktgen: remove rcu locking in pktgen_change_name() bridge: multicast: restore perm router ports on multicast enable rtnetlink: Add rtnexthop offload flag to compare mask net: add recursion limit to GRO ipv4: disable BH in set_ping_group_range() ipv4: use the right lock for ping_group_range net: sctp, forbid negative length udp: fix IP_CHECKSUM handling net sched filters: fix notification of filter delete with proper handle sctp: validate chunk len before actually using it packet: on direct_xmit, limit tso and csum to supported devices of: silence warnings due to max() usage Revert KVM: MIPS: Drop other CPU ASIDs on guest MMU changes KVM: MIPS: Drop other CPU ASIDs on guest MMU changes drm/amdgpu/dp: add back special handling for NUTMEG drm/amdgpu: fix DP mode validation drm/radeon/dp: add back special handling for NUTMEG drm/radeon: fix DP mode validation scsi: megaraid_sas: fix macro MEGASAS_IS_LOGICAL to avoid regression Linux 4.4.32 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1642573/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp