** Also affects: linux (Ubuntu Xenial) Importance: Undecided Status: New
** Changed in: linux (Ubuntu Xenial) Status: New => Fix Committed ** Changed in: linux (Ubuntu) Status: New => Invalid ** Changed in: linux (Ubuntu Xenial) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1745268 Title: Xenial update to 4.4.113 stable release Status in linux package in Ubuntu: Invalid Status in linux source package in Xenial: Fix Released Bug description: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable Linux tree or a minimally backported form of that patch. The 4.4.113 upstream stable patch set is now available. It should be included in the Ubuntu kernel as well. git://git.kernel.org/ TEST CASE: TBD The following patches from the 4.4.113 stable release shall be applied: * gcov: disable for COMPILE_TEST * x86/cpu/AMD: Make LFENCE a serializing instruction * x86/cpu/AMD: Use LFENCE_RDTSC in preference to MFENCE_RDTSC * x86/mm/32: Move setup_clear_cpu_cap(X86_FEATURE_PCID) earlier * x86/asm: Use register variable to get stack pointer value * x86/kbuild: enable modversions for symbols exported from asm * x86/asm: Make asm/alternative.h safe from assembly * EXPORT_SYMBOL() for asm * kconfig.h: use __is_defined() to check if MODULE is defined * x86/retpoline: Add initial retpoline support * x86/spectre: Add boot time option to select Spectre v2 mitigation * x86/retpoline/crypto: Convert crypto assembler indirect jumps * x86/retpoline/entry: Convert entry assembler indirect jumps * x86/retpoline/ftrace: Convert ftrace assembler indirect jumps * x86/retpoline/hyperv: Convert assembler indirect jumps * x86/retpoline/xen: Convert Xen hypercall indirect jumps * x86/retpoline/checksum32: Convert assembler indirect jumps * x86/retpoline/irq32: Convert assembler indirect jumps * x86/retpoline: Fill return stack buffer on vmexit * x86/retpoline: Remove compile time warning * scsi: sg: disable SET_FORCE_LOW_DMA * futex: Prevent overflow by strengthen input validation * ALSA: pcm: Remove yet superfluous WARN_ON() * ALSA: hda - Apply headphone noise quirk for another Dell XPS 13 variant * ALSA: hda - Apply the existing quirk to iMac 14,1 * af_key: fix buffer overread in verify_address_len() * af_key: fix buffer overread in parse_exthdrs() * scsi: hpsa: fix volume offline state * sched/deadline: Zero out positive runtime after throttling constrained tasks * x86/retpoline: Add LFENCE to the retpoline/RSB filling RSB macros * module: Add retpoline tag to VERMAGIC * pipe: avoid round_pipe_size() nr_pages overflow on 32-bit * x86/apic/vector: Fix off by one in error path * Input: 88pm860x-ts - fix child-node lookup * Input: twl6040-vibra - fix DT node memory management * Input: twl6040-vibra - fix child-node lookup * Input: twl4030-vibra - fix sibling-node lookup * tracing: Fix converting enum's from the map in trace_event_eval_update() * phy: work around 'phys' references to usb-nop-xceiv devices * ARM: dts: kirkwood: fix pin-muxing of MPP7 on OpenBlocks A7 * can: peak: fix potential bug in packet fragmentation * libata: apply MAX_SEC_1024 to all LITEON EP1 series devices * dm btree: fix serious bug in btree_split_beneath() * dm thin metadata: THIN_MAX_CONCURRENT_LOCKS should be 6 * arm64: KVM: Fix SMCCC handling of unimplemented SMC/HVC calls * x86/cpu, x86/pti: Do not enable PTI on AMD processors * kbuild: modversions for EXPORT_SYMBOL() for asm * x86/mce: Make machine check speculation protected * retpoline: Introduce start/end markers of indirect thunk * kprobes/x86: Blacklist indirect thunk functions for kprobes * kprobes/x86: Disable optimizing on the function jumps to indirect thunk * x86/pti: Document fix wrong index * x86/retpoline: Optimize inline assembler for vmexit_fill_RSB * MIPS: AR7: ensure the port type's FCR value is used * Linux 4.4.113 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1745268/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp