← Back to team overview

group.of.nepali.translators team mailing list archive

[Bug 1642573] [NEW] Xenial update to 4.4.32 stable release

 

Public bug reported:

SRU Justification

    Impact:
       The upstream process for stable tree updates is quite similar
       in scope to the Ubuntu SRU process, e.g., each patch has to
       demonstrably fix a bug, and each patch is vetted by upstream
       by originating either directly from a mainline/stable Linux tree or
       a minimally backported form of that patch. The 4.4.32 upstream stable
       patch set is now available. It should be included in the Ubuntu
       kernel as well.

       git://git.kernel.org/

    TEST CASE: TBD

       The following patches from the 4.4.32 stable release shall be
applied:

tcp: fix overflow in __tcp_retransmit_skb()
net: avoid sk_forward_alloc overflows
tcp: fix wrong checksum calculation on MTU probing
tcp: fix a compile error in DBGUNDO()
ip6_gre: fix flowi6_proto value in ip6gre_xmit_other()
ipmr, ip6mr: fix scheduling while atomic and a deadlock with ipmr_get_route
tg3: Avoid NULL pointer dereference in tg3_io_error_detected()
net: fec: set mac address unconditionally
net: pktgen: fix pkt_size
net/sched: act_vlan: Push skb->data to mac_header prior calling skb_vlan_*() functions
net: Add netdev all_adj_list refcnt propagation to fix panic
packet: call fanout_release, while UNREGISTERING a netdev
netlink: do not enter direct reclaim from netlink_dump()
ipv6: tcp: restore IP6CB for pktoptions skbs
ip6_tunnel: fix ip6_tnl_lookup
ipv6: correctly add local routes when lo goes up
net: pktgen: remove rcu locking in pktgen_change_name()
bridge: multicast: restore perm router ports on multicast enable
rtnetlink: Add rtnexthop offload flag to compare mask
net: add recursion limit to GRO
ipv4: disable BH in set_ping_group_range()
ipv4: use the right lock for ping_group_range
net: sctp, forbid negative length
udp: fix IP_CHECKSUM handling
net sched filters: fix notification of filter delete with proper handle
sctp: validate chunk len before actually using it
packet: on direct_xmit, limit tso and csum to supported devices
of: silence warnings due to max() usage
Revert KVM: MIPS: Drop other CPU ASIDs on guest MMU changes
KVM: MIPS: Drop other CPU ASIDs on guest MMU changes
drm/amdgpu/dp: add back special handling for NUTMEG
drm/amdgpu: fix DP mode validation
drm/radeon/dp: add back special handling for NUTMEG
drm/radeon: fix DP mode validation
scsi: megaraid_sas: fix macro MEGASAS_IS_LOGICAL to avoid regression
Linux 4.4.32

** Affects: linux (Ubuntu)
     Importance: Undecided
         Status: New

** Affects: linux (Ubuntu Xenial)
     Importance: Undecided
     Assignee: Luis Henriques (henrix)
         Status: In Progress


** Tags: kernel-stable-tracking-bug

** Tags added: kernel-stable-tracking-bug

** Also affects: linux (Ubuntu Xenial)
   Importance: Undecided
       Status: New

** Description changed:

+ SRU Justification
  
-     SRU Justification
+     Impact:
+        The upstream process for stable tree updates is quite similar
+        in scope to the Ubuntu SRU process, e.g., each patch has to
+        demonstrably fix a bug, and each patch is vetted by upstream
+        by originating either directly from a mainline/stable Linux tree or
+        a minimally backported form of that patch. The 4.4.32 upstream stable
+        patch set is now available. It should be included in the Ubuntu
+        kernel as well.
  
-     Impact:
-        The upstream process for stable tree updates is quite similar
-        in scope to the Ubuntu SRU process, e.g., each patch has to
-        demonstrably fix a bug, and each patch is vetted by upstream
-        by originating either directly from a mainline/stable Linux tree or
-        a minimally backported form of that patch. The 4.4.32 upstream stable
-        patch set is now available. It should be included in the Ubuntu
-        kernel as well.
+        git://git.kernel.org/
  
-        git://git.kernel.org/
+     TEST CASE: TBD
  
-     TEST CASE: TBD
+        The following patches from the 4.4.32 stable release shall be
+ applied:
  
-        The following patches from the 4.4.32 stable release shall be
- applied:
+ tcp: fix overflow in __tcp_retransmit_skb()
+ net: avoid sk_forward_alloc overflows
+ tcp: fix wrong checksum calculation on MTU probing
+ tcp: fix a compile error in DBGUNDO()
+ ip6_gre: fix flowi6_proto value in ip6gre_xmit_other()
+ ipmr, ip6mr: fix scheduling while atomic and a deadlock with ipmr_get_route
+ tg3: Avoid NULL pointer dereference in tg3_io_error_detected()
+ net: fec: set mac address unconditionally
+ net: pktgen: fix pkt_size
+ net/sched: act_vlan: Push skb->data to mac_header prior calling skb_vlan_*() functions
+ net: Add netdev all_adj_list refcnt propagation to fix panic
+ packet: call fanout_release, while UNREGISTERING a netdev
+ netlink: do not enter direct reclaim from netlink_dump()
+ ipv6: tcp: restore IP6CB for pktoptions skbs
+ ip6_tunnel: fix ip6_tnl_lookup
+ ipv6: correctly add local routes when lo goes up
+ net: pktgen: remove rcu locking in pktgen_change_name()
+ bridge: multicast: restore perm router ports on multicast enable
+ rtnetlink: Add rtnexthop offload flag to compare mask
+ net: add recursion limit to GRO
+ ipv4: disable BH in set_ping_group_range()
+ ipv4: use the right lock for ping_group_range
+ net: sctp, forbid negative length
+ udp: fix IP_CHECKSUM handling
+ net sched filters: fix notification of filter delete with proper handle
+ sctp: validate chunk len before actually using it
+ packet: on direct_xmit, limit tso and csum to supported devices
+ of: silence warnings due to max() usage
+ Revert KVM: MIPS: Drop other CPU ASIDs on guest MMU changes
+ KVM: MIPS: Drop other CPU ASIDs on guest MMU changes
+ drm/amdgpu/dp: add back special handling for NUTMEG
+ drm/amdgpu: fix DP mode validation
+ drm/radeon/dp: add back special handling for NUTMEG
+ drm/radeon: fix DP mode validation
+ scsi: megaraid_sas: fix macro MEGASAS_IS_LOGICAL to avoid regression
+ Linux 4.4.32

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1642573

Title:
  Xenial update to 4.4.32 stable release

Status in linux package in Ubuntu:
  New
Status in linux source package in Xenial:
  In Progress

Bug description:
  SRU Justification

      Impact:
         The upstream process for stable tree updates is quite similar
         in scope to the Ubuntu SRU process, e.g., each patch has to
         demonstrably fix a bug, and each patch is vetted by upstream
         by originating either directly from a mainline/stable Linux tree or
         a minimally backported form of that patch. The 4.4.32 upstream stable
         patch set is now available. It should be included in the Ubuntu
         kernel as well.

         git://git.kernel.org/

      TEST CASE: TBD

         The following patches from the 4.4.32 stable release shall be
  applied:

  tcp: fix overflow in __tcp_retransmit_skb()
  net: avoid sk_forward_alloc overflows
  tcp: fix wrong checksum calculation on MTU probing
  tcp: fix a compile error in DBGUNDO()
  ip6_gre: fix flowi6_proto value in ip6gre_xmit_other()
  ipmr, ip6mr: fix scheduling while atomic and a deadlock with ipmr_get_route
  tg3: Avoid NULL pointer dereference in tg3_io_error_detected()
  net: fec: set mac address unconditionally
  net: pktgen: fix pkt_size
  net/sched: act_vlan: Push skb->data to mac_header prior calling skb_vlan_*() functions
  net: Add netdev all_adj_list refcnt propagation to fix panic
  packet: call fanout_release, while UNREGISTERING a netdev
  netlink: do not enter direct reclaim from netlink_dump()
  ipv6: tcp: restore IP6CB for pktoptions skbs
  ip6_tunnel: fix ip6_tnl_lookup
  ipv6: correctly add local routes when lo goes up
  net: pktgen: remove rcu locking in pktgen_change_name()
  bridge: multicast: restore perm router ports on multicast enable
  rtnetlink: Add rtnexthop offload flag to compare mask
  net: add recursion limit to GRO
  ipv4: disable BH in set_ping_group_range()
  ipv4: use the right lock for ping_group_range
  net: sctp, forbid negative length
  udp: fix IP_CHECKSUM handling
  net sched filters: fix notification of filter delete with proper handle
  sctp: validate chunk len before actually using it
  packet: on direct_xmit, limit tso and csum to supported devices
  of: silence warnings due to max() usage
  Revert KVM: MIPS: Drop other CPU ASIDs on guest MMU changes
  KVM: MIPS: Drop other CPU ASIDs on guest MMU changes
  drm/amdgpu/dp: add back special handling for NUTMEG
  drm/amdgpu: fix DP mode validation
  drm/radeon/dp: add back special handling for NUTMEG
  drm/radeon: fix DP mode validation
  scsi: megaraid_sas: fix macro MEGASAS_IS_LOGICAL to avoid regression
  Linux 4.4.32

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1642573/+subscriptions


Follow ups