Skipped the following patches (already applied): * KVM: s390: Enable all facility bits that are known good for passthrough
-- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1774173 Title: Xenial update to 4.4.132 stable release Status in linux package in Ubuntu: Invalid Bug description: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable Linux tree or a minimally backported form of that patch. The 4.4.132 upstream stable stable patch set is now available. It should be included in the Ubuntu kernel as well. git://git.kernel.org/ TEST CASE: TBD The following patches from the 4.4.132 stable release shall be applied: * Linux 4.4.132 * perf/x86: Fix possible Spectre-v1 indexing for x86_pmu::event_map() * perf/core: Fix possible Spectre-v1 indexing for ->aux_pages[] * perf/x86/msr: Fix possible Spectre-v1 indexing in the MSR driver * perf/x86/cstate: Fix possible Spectre-v1 indexing for pkg_msr * perf/x86: Fix possible Spectre-v1 indexing for hw_perf_event cache_* * tracing/uprobe_event: Fix strncpy corner case * Revert "Bluetooth: btusb: Fix quirk for Atheros 1525/QCA6174" * atm: zatm: Fix potential Spectre v1 * net: atm: Fix potential Spectre v1 * can: kvaser_usb: Increase correct stats counter in kvaser_usb_rx_can_msg() * tracing: Fix regex_match_front() to not over compare the test string * libata: Apply NOLPM quirk for SanDisk SD7UB3Q*G1001 SSDs * rfkill: gpio: fix memory leak in probe error path * xfrm_user: fix return value from xfrm_user_rcv_msg * f2fs: fix a dead loop in f2fs_fiemap() * bdi: Fix oops in wb_workfn() * tcp: fix TCP_REPAIR_QUEUE bound checking * perf: Remove superfluous allocation error check * soreuseport: initialise timewait reuseport field * dccp: initialize ireq->ir_mark * net: fix uninit-value in __hw_addr_add_ex() * net: initialize skb->peeked when cloning * net: fix rtnh_ok() * netlink: fix uninit-value in netlink_sendmsg * crypto: af_alg - fix possible uninit-value in alg_bind() * ipvs: fix rtnl_lock lockups caused by start_sync_thread * usb: musb: host: fix potential NULL pointer dereference * USB: serial: option: adding support for ublox R410M * USB: serial: option: reimplement interface masking * USB: Accept bulk endpoints with 1024-byte maxpacket * USB: serial: visor: handle potential invalid device configuration * test_firmware: fix setting old custom fw path back on exit, second try * drm/vmwgfx: Fix a buffer object leak * IB/mlx5: Use unlimited rate when static rate is not supported * NET: usb: qmi_wwan: add support for ublox R410M PID 0x90b2 * RDMA/mlx5: Protect from shift operand overflow * RDMA/ucma: Allow resolving address w/o specifying source address * xfs: prevent creating negative-sized file via INSERT_RANGE * Input: atmel_mxt_ts - add touchpad button mapping for Samsung Chromebook Pro * Input: leds - fix out of bound access * tracepoint: Do not warn on ENOMEM * ALSA: aloop: Add missing cable lock to ctl API callbacks * ALSA: aloop: Mark paused device as inactive * ALSA: seq: Fix races at MIDI encoding in snd_virmidi_output_trigger() * ALSA: pcm: Check PCM state at xfern compat ioctl * USB: serial: option: Add support for Quectel EP06 * gpmi-nand: Handle ECC Errors in erased pages * ath10k: rebuild crypto header in rx data frames * ath10k: fix rfc1042 header retrieval in QCA4019 with eth decap mode * mac80211: Add RX flag to indicate ICV stripped * mac80211: allow same PN for AMSDU sub-frames * mac80211: allow not sending MIC up from driver for HW crypto * percpu: include linux/sched.h for cond_resched() * KVM: s390: Enable all facility bits that are known good for passthrough * bpf: map_get_next_key to return first key on NULL * perf/core: Fix the perf_cpu_time_max_percent check To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1774173/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp