[Kernel-packages] [Bug 1638272] Re: Xenial update to v4.4.30 stable release

2019-10-03 Thread Po-Hsu Lin
** Changed in: linux (Ubuntu)
   Status: Confirmed => Invalid

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1638272

Title:
  Xenial update to v4.4.30 stable release

Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Xenial:
  Fix Released

Bug description:
  SRU Justification

  Impact:
     The upstream process for stable tree updates is quite similar
     in scope to the Ubuntu SRU process, e.g., each patch has to
     demonstrably fix a bug, and each patch is vetted by upstream
     by originating either directly from a mainline/stable Linux tree or
     a minimally backported form of that patch. The v4.4.30 upstream stable
     patch set is now available. It should be included in the Ubuntu
     kernel as well.

     git://git.kernel.org/

  TEST CASE: TBD

     The following patches from the v4.4.30 stable release shall be
  applied:

  Revert "x86/mm: Expand the exception table logic to allow new handling 
options"
  Revert "fix minor infoleak in get_user_ex()"
  Linux 4.4.30

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1638272/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1638272] Re: Xenial update to v4.4.30 stable release

2016-11-29 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 4.4.0-51.72

---
linux (4.4.0-51.72) xenial; urgency=low

  [ Luis Henriques ]

  * Release Tracking Bug
- LP: #1644611

  * 4.4.0-1037-snapdragon #41: kernel panic on boot (LP: #1644596)
- Revert "dma-mapping: introduce the DMA_ATTR_NO_WARN attribute"
- Revert "powerpc: implement the DMA_ATTR_NO_WARN attribute"
- Revert "nvme: use the DMA_ATTR_NO_WARN attribute"

linux (4.4.0-50.71) xenial; urgency=low

  [ Luis Henriques ]

  * Release Tracking Bug
- LP: #1644169

  * xenial 4.4.0-49.70 kernel breaks LXD userspace (LP: #1644165)
- Revert "UBUNTU: SAUCE: (namespace) fuse: Allow user namespace mounts by
  default"
- Revert "UBUNTU: SAUCE: (namespace) fs: Don't remove suid for CAP_FSETID 
for
  userns root"
- Revert "(namespace) Revert "UBUNTU: SAUCE: fs: Don't remove suid for
  CAP_FSETID in s_user_ns""
- Revert "UBUNTU: SAUCE: (namespace) fs: Allow superblock owner to change
  ownership of inodes"
- Revert "(namespace) Revert "UBUNTU: SAUCE: fs: Allow superblock owner to
  change ownership of inodes with unmappable ids""
- Revert "UBUNTU: SAUCE: (namespace) security/integrity: Harden against
  malformed xattrs"
- Revert "(namespace) Revert "UBUNTU: SAUCE: ima/evm: Allow root in 
s_user_ns
  to set xattrs""
- Revert "(namespace) dquot: For now explicitly don't support filesystems
  outside of init_user_ns"
- Revert "(namespace) quota: Handle quota data stored in s_user_ns in
  quota_setxquota"
- Revert "(namespace) quota: Ensure qids map to the filesystem"
- Revert "(namespace) Revert "UBUNTU: SAUCE: quota: Convert ids relative to
  s_user_ns""
- Revert "(namespace) Revert "UBUNTU: SAUCE: quota: Require that qids passed
  to dqget() be valid and map into s_user_ns""
- Revert "(namespace) vfs: Don't create inodes with a uid or gid unknown to
  the vfs"
- Revert "(namespace) vfs: Don't modify inodes with a uid or gid unknown to
  the vfs"
- Revert "UBUNTU: SAUCE: (namespace) fuse: Translate ids in posix acl 
xattrs"
- Revert "UBUNTU: SAUCE: (namespace) posix_acl: Export
  posix_acl_fix_xattr_userns() to modules"
- Revert "(namespace) vfs: Verify acls are valid within superblock's
  s_user_ns."
- Revert "(namespace) Revert "UBUNTU: SAUCE: fs: Update posix_acl support to
  handle user namespace mounts""
- Revert "(namespace) fs: Refuse uid/gid changes which don't map into
  s_user_ns"
- Revert "(namespace) Revert "UBUNTU: SAUCE: fs: Refuse uid/gid changes 
which
  don't map into s_user_ns""
- Revert "(namespace) mnt: Move the FS_USERNS_MOUNT check into sget_userns"

linux (4.4.0-49.70) xenial; urgency=low

  [ Luis Henriques ]

  * Release Tracking Bug
- LP: #1640921

  * Infiniband driver (kernel module) needed for Azure (LP: #1641139)
- SAUCE: RDMA Infiniband for Windows Azure
- [Config] CONFIG_HYPERV_INFINIBAND_ND=m
- SAUCE: Makefile RDMA infiniband driver for Windows Azure
- [Config] Add hv_network_direct.ko to generic inclusion list
- SAUCE: RDMA Infiniband for Windows Azure is dependent on amd64

linux (4.4.0-48.69) xenial; urgency=low

  [ Luis Henriques ]

  * Release Tracking Bug
- LP: #1640758

  * lxc-attach to malicious container allows access to host (LP: #1639345)
- Revert "UBUNTU: SAUCE: (noup) ptrace: being capable wrt a process requires
  mapped uids/gids"
- (upstream) mm: Add a user_ns owner to mm_struct and fix ptrace permission
  checks

  * take 'P' command from upstream xmon (LP: #1637978)
- powerpc/xmon: Add xmon command to dump process/task similar to ps(1)

  * zfs: importing zpool with vdev on zvol hangs kernel (LP: #1636517)
- SAUCE: (noup) Update zfs to 0.6.5.6-0ubuntu15

  * I2C touchpad does not work on AMD platform (LP: #1612006)
- pinctrl/amd: Configure GPIO register using BIOS settings
- pinctrl/amd: switch to using a bool for level

  * [LTCTest] vfio_pci not loaded on Ubuntu 16.10 by default (LP: #1636733)
- [Config] CONFIG_VFIO_PCI=y for ppc64el

  * QEMU throws failure msg while booting guest with SRIOV VF (LP: #1630554)
- KVM: PPC: Always select KVM_VFIO, plus Makefile cleanup

  * Allow fuse user namespace mounts by default in xenial (LP: #1634964)
- (namespace) mnt: Move the FS_USERNS_MOUNT check into sget_userns
- (namespace) Revert "UBUNTU: SAUCE: fs: Refuse uid/gid changes which don't
  map into s_user_ns"
- (namespace) fs: Refuse uid/gid changes which don't map into s_user_ns
- (namespace) Revert "UBUNTU: SAUCE: fs: Update posix_acl support to handle
  user namespace mounts"
- (namespace) vfs: Verify acls are valid within superblock's s_user_ns.
- SAUCE: (namespace) posix_acl: Export posix_acl_fix_xattr_userns() to 
modules
- SAUCE: (namespace) fuse: Translate ids in posix acl xattrs
- (namespace) vfs: Don't modify inodes with a uid 

[Kernel-packages] [Bug 1638272] Re: Xenial update to v4.4.30 stable release

2016-11-10 Thread Luis Henriques
** Changed in: linux (Ubuntu Xenial)
   Status: Confirmed => Fix Committed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1638272

Title:
  Xenial update to v4.4.30 stable release

Status in linux package in Ubuntu:
  Confirmed
Status in linux source package in Xenial:
  Fix Committed

Bug description:
  SRU Justification

  Impact:
     The upstream process for stable tree updates is quite similar
     in scope to the Ubuntu SRU process, e.g., each patch has to
     demonstrably fix a bug, and each patch is vetted by upstream
     by originating either directly from a mainline/stable Linux tree or
     a minimally backported form of that patch. The v4.4.30 upstream stable
     patch set is now available. It should be included in the Ubuntu
     kernel as well.

     git://git.kernel.org/

  TEST CASE: TBD

     The following patches from the v4.4.30 stable release shall be
  applied:

  Revert "x86/mm: Expand the exception table logic to allow new handling 
options"
  Revert "fix minor infoleak in get_user_ex()"
  Linux 4.4.30

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1638272/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1638272] Re: Xenial update to v4.4.30 stable release

2016-11-02 Thread Tim Gardner
** Description changed:

  SRU Justification
  
  Impact:
     The upstream process for stable tree updates is quite similar
     in scope to the Ubuntu SRU process, e.g., each patch has to
     demonstrably fix a bug, and each patch is vetted by upstream
     by originating either directly from a mainline/stable Linux tree or
     a minimally backported form of that patch. The v4.4.30 upstream stable
     patch set is now available. It should be included in the Ubuntu
     kernel as well.
  
     git://git.kernel.org/
  
  TEST CASE: TBD
  
     The following patches from the v4.4.30 stable release shall be
  applied:
  
- KVM: PPC: Book3S HV: Migrate pinned pages out of CMA
+ Revert "x86/mm: Expand the exception table logic to allow new handling 
options"
  Revert "fix minor infoleak in get_user_ex()"
  Linux 4.4.30

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1638272

Title:
  Xenial update to v4.4.30 stable release

Status in linux package in Ubuntu:
  Confirmed
Status in linux source package in Xenial:
  Confirmed

Bug description:
  SRU Justification

  Impact:
     The upstream process for stable tree updates is quite similar
     in scope to the Ubuntu SRU process, e.g., each patch has to
     demonstrably fix a bug, and each patch is vetted by upstream
     by originating either directly from a mainline/stable Linux tree or
     a minimally backported form of that patch. The v4.4.30 upstream stable
     patch set is now available. It should be included in the Ubuntu
     kernel as well.

     git://git.kernel.org/

  TEST CASE: TBD

     The following patches from the v4.4.30 stable release shall be
  applied:

  Revert "x86/mm: Expand the exception table logic to allow new handling 
options"
  Revert "fix minor infoleak in get_user_ex()"
  Linux 4.4.30

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1638272/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1638272] Re: Xenial update to v4.4.30 stable release

2016-11-01 Thread Launchpad Bug Tracker
Status changed to 'Confirmed' because the bug affects multiple users.

** Changed in: linux (Ubuntu)
   Status: New => Confirmed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1638272

Title:
  Xenial update to v4.4.30 stable release

Status in linux package in Ubuntu:
  Confirmed
Status in linux source package in Xenial:
  Confirmed

Bug description:
  SRU Justification

  Impact:
     The upstream process for stable tree updates is quite similar
     in scope to the Ubuntu SRU process, e.g., each patch has to
     demonstrably fix a bug, and each patch is vetted by upstream
     by originating either directly from a mainline/stable Linux tree or
     a minimally backported form of that patch. The v4.4.30 upstream stable
     patch set is now available. It should be included in the Ubuntu
     kernel as well.

     git://git.kernel.org/

  TEST CASE: TBD

     The following patches from the v4.4.30 stable release shall be
  applied:

  KVM: PPC: Book3S HV: Migrate pinned pages out of CMA
  Revert "fix minor infoleak in get_user_ex()"
  Linux 4.4.30

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1638272/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1638272] Re: Xenial update to v4.4.30 stable release

2016-11-01 Thread Launchpad Bug Tracker
Status changed to 'Confirmed' because the bug affects multiple users.

** Changed in: linux (Ubuntu Xenial)
   Status: New => Confirmed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1638272

Title:
  Xenial update to v4.4.30 stable release

Status in linux package in Ubuntu:
  Confirmed
Status in linux source package in Xenial:
  Confirmed

Bug description:
  SRU Justification

  Impact:
     The upstream process for stable tree updates is quite similar
     in scope to the Ubuntu SRU process, e.g., each patch has to
     demonstrably fix a bug, and each patch is vetted by upstream
     by originating either directly from a mainline/stable Linux tree or
     a minimally backported form of that patch. The v4.4.30 upstream stable
     patch set is now available. It should be included in the Ubuntu
     kernel as well.

     git://git.kernel.org/

  TEST CASE: TBD

     The following patches from the v4.4.30 stable release shall be
  applied:

  KVM: PPC: Book3S HV: Migrate pinned pages out of CMA
  Revert "fix minor infoleak in get_user_ex()"
  Linux 4.4.30

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1638272/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp