group.of.nepali.translators team mailing list archive
-
group.of.nepali.translators team
-
Mailing list archive
-
Message #32850
[Bug 1745268] Re: Xenial update to 4.4.113 stable release
** Also affects: linux (Ubuntu Xenial)
Importance: Undecided
Status: New
** Changed in: linux (Ubuntu Xenial)
Status: New => Fix Committed
** Changed in: linux (Ubuntu)
Status: New => Invalid
** Changed in: linux (Ubuntu Xenial)
Status: Fix Committed => Fix Released
--
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1745268
Title:
Xenial update to 4.4.113 stable release
Status in linux package in Ubuntu:
Invalid
Status in linux source package in Xenial:
Fix Released
Bug description:
SRU Justification
Impact:
The upstream process for stable tree updates is quite similar
in scope to the Ubuntu SRU process, e.g., each patch has to
demonstrably fix a bug, and each patch is vetted by upstream
by originating either directly from a mainline/stable Linux tree or
a minimally backported form of that patch. The 4.4.113 upstream stable
patch set is now available. It should be included in the Ubuntu
kernel as well.
git://git.kernel.org/
TEST CASE: TBD
The following patches from the 4.4.113 stable release shall be applied:
* gcov: disable for COMPILE_TEST
* x86/cpu/AMD: Make LFENCE a serializing instruction
* x86/cpu/AMD: Use LFENCE_RDTSC in preference to MFENCE_RDTSC
* x86/mm/32: Move setup_clear_cpu_cap(X86_FEATURE_PCID) earlier
* x86/asm: Use register variable to get stack pointer value
* x86/kbuild: enable modversions for symbols exported from asm
* x86/asm: Make asm/alternative.h safe from assembly
* EXPORT_SYMBOL() for asm
* kconfig.h: use __is_defined() to check if MODULE is defined
* x86/retpoline: Add initial retpoline support
* x86/spectre: Add boot time option to select Spectre v2 mitigation
* x86/retpoline/crypto: Convert crypto assembler indirect jumps
* x86/retpoline/entry: Convert entry assembler indirect jumps
* x86/retpoline/ftrace: Convert ftrace assembler indirect jumps
* x86/retpoline/hyperv: Convert assembler indirect jumps
* x86/retpoline/xen: Convert Xen hypercall indirect jumps
* x86/retpoline/checksum32: Convert assembler indirect jumps
* x86/retpoline/irq32: Convert assembler indirect jumps
* x86/retpoline: Fill return stack buffer on vmexit
* x86/retpoline: Remove compile time warning
* scsi: sg: disable SET_FORCE_LOW_DMA
* futex: Prevent overflow by strengthen input validation
* ALSA: pcm: Remove yet superfluous WARN_ON()
* ALSA: hda - Apply headphone noise quirk for another Dell XPS 13 variant
* ALSA: hda - Apply the existing quirk to iMac 14,1
* af_key: fix buffer overread in verify_address_len()
* af_key: fix buffer overread in parse_exthdrs()
* scsi: hpsa: fix volume offline state
* sched/deadline: Zero out positive runtime after throttling constrained tasks
* x86/retpoline: Add LFENCE to the retpoline/RSB filling RSB macros
* module: Add retpoline tag to VERMAGIC
* pipe: avoid round_pipe_size() nr_pages overflow on 32-bit
* x86/apic/vector: Fix off by one in error path
* Input: 88pm860x-ts - fix child-node lookup
* Input: twl6040-vibra - fix DT node memory management
* Input: twl6040-vibra - fix child-node lookup
* Input: twl4030-vibra - fix sibling-node lookup
* tracing: Fix converting enum's from the map in trace_event_eval_update()
* phy: work around 'phys' references to usb-nop-xceiv devices
* ARM: dts: kirkwood: fix pin-muxing of MPP7 on OpenBlocks A7
* can: peak: fix potential bug in packet fragmentation
* libata: apply MAX_SEC_1024 to all LITEON EP1 series devices
* dm btree: fix serious bug in btree_split_beneath()
* dm thin metadata: THIN_MAX_CONCURRENT_LOCKS should be 6
* arm64: KVM: Fix SMCCC handling of unimplemented SMC/HVC calls
* x86/cpu, x86/pti: Do not enable PTI on AMD processors
* kbuild: modversions for EXPORT_SYMBOL() for asm
* x86/mce: Make machine check speculation protected
* retpoline: Introduce start/end markers of indirect thunk
* kprobes/x86: Blacklist indirect thunk functions for kprobes
* kprobes/x86: Disable optimizing on the function jumps to indirect thunk
* x86/pti: Document fix wrong index
* x86/retpoline: Optimize inline assembler for vmexit_fill_RSB
* MIPS: AR7: ensure the port type's FCR value is used
* Linux 4.4.113
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1745268/+subscriptions