[Kernel-packages] [Bug 1792174] Re: Xenial update to 4.4.148 stable release

2018-10-22 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 4.4.0-138.164

---
linux (4.4.0-138.164) xenial; urgency=medium

  * linux: 4.4.0-138.164 -proposed tracker (LP: #1795582)

  * Linux 4.4.155 stable release build is broken on ppc64 (LP: #1795662)
- powerpc/fadump: Return error when fadump registration fails

  * Kernel hang on drive pull caused by regression introduced by commit
287922eb0b18 (LP: #1791790)
- block: Fix a race between blk_cleanup_queue() and timeout handling

  * qeth: use vzalloc for QUERY OAT buffer (LP: #1793086)
- s390/qeth: use vzalloc for QUERY OAT buffer

  * Page leaking in cachefiles_read_backing_file while vmscan is active
(LP: #1793430)
- SAUCE: cachefiles: Page leaking in cachefiles_read_backing_file while 
vmscan
  is active

  * Bugfix for handling of shadow doorbell buffer (LP: #1788222)
- nvme-pci: add a memory barrier to nvme_dbbuf_update_and_check_event

  * Xenial update to 4.4.155 stable release (LP: #1792419)
- net: 6lowpan: fix reserved space for single frames
- net: mac802154: tx: expand tailroom if necessary
- 9p/net: Fix zero-copy path in the 9p virtio transport
- net: lan78xx: Fix misplaced tasklet_schedule() call
- spi: davinci: fix a NULL pointer dereference
- drm/i915/userptr: reject zero user_size
- powerpc/fadump: handle crash memory ranges array index overflow
- powerpc/pseries: Fix endianness while restoring of r3 in MCE handler.
- fs/9p/xattr.c: catch the error of p9_client_clunk when setting xattr 
failed
- 9p/virtio: fix off-by-one error in sg list bounds check
- net/9p/client.c: version pointer uninitialized
- net/9p/trans_fd.c: fix race-condition by flushing workqueue before the
  kfree()
- dm cache metadata: save in-core policy_hint_size to on-disk superblock
- iio: ad9523: Fix displayed phase
- iio: ad9523: Fix return value for ad952x_store()
- vmw_balloon: fix inflation of 64-bit GFNs
- vmw_balloon: do not use 2MB without batching
- vmw_balloon: VMCI_DOORBELL_SET does not check status
- vmw_balloon: fix VMCI use when balloon built into kernel
- tracing: Do not call start/stop() functions when tracing_on does not 
change
- tracing/blktrace: Fix to allow setting same value
- kthread, tracing: Don't expose half-written comm when creating kthreads
- uprobes: Use synchronize_rcu() not synchronize_sched()
- 9p: fix multiple NULL-pointer-dereferences
- PM / sleep: wakeup: Fix build error caused by missing SRCU support
- pnfs/blocklayout: off by one in bl_map_stripe()
- ARM: tegra: Fix Tegra30 Cardhu PCA954x reset
- mm/tlb: Remove tlb_remove_table() non-concurrent condition
- iommu/vt-d: Add definitions for PFSID
- iommu/vt-d: Fix dev iotlb pfsid use
- osf_getdomainname(): use copy_to_user()
- sys: don't hold uts_sem while accessing userspace memory
- userns: move user access out of the mutex
- ubifs: Fix memory leak in lprobs self-check
- Revert "UBIFS: Fix potential integer overflow in allocation"
- ubifs: Check data node size before truncate
- ubifs: Fix synced_i_size calculation for xattr inodes
- pwm: tiehrpwm: Fix disabling of output of PWMs
- fb: fix lost console when the user unplugs a USB adapter
- udlfb: set optimal write delay
- getxattr: use correct xattr length
- bcache: release dc->writeback_lock properly in bch_writeback_thread()
- perf auxtrace: Fix queue resize
- fs/quota: Fix spectre gadget in do_quotactl
- x86/io: add interface to reserve io memtype for a resource range. (v1.1)
- drm/drivers: add support for using the arch wc mapping API.
- Linux 4.4.155

  * Xenial update to 4.4.154 stable release (LP: #1792392)
- sched/sysctl: Check user input value of sysctl_sched_time_avg
- Cipso: cipso_v4_optptr enter infinite loop
- vti6: fix PMTU caching and reporting on xmit
- xfrm: fix missing dst_release() after policy blocking lbcast and multicast
- xfrm: free skb if nlsk pointer is NULL
- mac80211: add stations tied to AP_VLANs during hw reconfig
- nl80211: Add a missing break in parse_station_flags
- drm/bridge: adv7511: Reset registers on hotplug
- scsi: libiscsi: fix possible NULL pointer dereference in case of TMF
- drm/imx: imx-ldb: disable LDB on driver bind
- drm/imx: imx-ldb: check if channel is enabled before printing warning
- usb: gadget: r8a66597: Fix two possible sleep-in-atomic-context bugs in
  init_controller()
- usb: gadget: r8a66597: Fix a possible sleep-in-atomic-context bugs in
  r8a66597_queue()
- usb/phy: fix PPC64 build errors in phy-fsl-usb.c
- tools: usb: ffs-test: Fix build on big endian systems
- usb: gadget: f_uac2: fix endianness of 'struct cntrl_*_lay3'
- tools/power turbostat: fix -S on UP systems
- net: caif: Add a missing rcu_read_unlock() in caif_flow_cb
- qed: Fix possible race for the link state value.

[Kernel-packages] [Bug 1792174] Re: Xenial update to 4.4.148 stable release

2018-10-01 Thread Kleber Sacilotto de Souza
** Changed in: linux (Ubuntu Xenial)
   Status: In Progress => Fix Committed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1792174

Title:
  Xenial update to 4.4.148 stable release

Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Xenial:
  Fix Committed

Bug description:
  SRU Justification

  Impact:
     The upstream process for stable tree updates is quite similar
     in scope to the Ubuntu SRU process, e.g., each patch has to
     demonstrably fix a bug, and each patch is vetted by upstream
     by originating either directly from a mainline/stable Linux tree or
     a minimally backported form of that patch. The 4.4.148 upstream stable
     patch set is now available. It should be included in the Ubuntu
     kernel as well.

     git://git.kernel.org/

  TEST CASE: TBD

  The following patches from the 4.4.148 stable release shall be applied:
  * ext4: fix check to prevent initializing reserved inodes
  * tpm: fix race condition in tpm_common_write()
  * ipv4+ipv6: Make INET*_ESP select CRYPTO_ECHAINIV
  * fork: unconditionally clear stack on fork
  * parisc: Enable CONFIG_MLONGCALLS by default
  * parisc: Define mb() and add memory barriers to assembler unlock sequences
  * xen/netfront: don't cache skb_shinfo()
  * ACPI / LPSS: Add missing prv_offset setting for byt/cht PWM devices
  * scsi: sr: Avoid that opening a CD-ROM hangs with runtime power management 
enabled
  * root dentries need RCU-delayed freeing
  * fix mntput/mntput race
  * fix __legitimize_mnt()/mntput() race
  * IB/core: Make testing MR flags for writability a static inline function
  * IB/mlx4: Mark user MR as writable if actual virtual memory is writable
  * IB/ocrdma: fix out of bounds access to local buffer
  * ARM: dts: imx6sx: fix irq for pcie bridge
  * kprobes/x86: Fix %p uses in error messages
  * x86/irqflags: Provide a declaration for native_save_fl
  * UBUNTU: SAUCE: Sync pgtable_64.h with upstream stable
  * mm: x86: move _PAGE_SWP_SOFT_DIRTY from bit 7 to bit 1
  * UBUNTU: SAUCE: Sync pgtable-3level.h with upstream stable
  * UBUNTU: SAUCE: Sync pgtable.h with upstream stable
  * mm: Add vm_insert_pfn_prot()
  * mm: fix cache mode tracking in vm_insert_mixed()
  * x86/mm/kmmio: Make the tracer robust against L1TF
  * x86/init: fix build with CONFIG_SWAP=n
  * Linux 4.4.148

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1792174/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1792174] Re: Xenial update to 4.4.148 stable release

2018-09-12 Thread Stefan Bader
Skipped:
* "x86/paravirt: Fix spectre-v2 mitigations for paravirt
  guests (CVE-2018-15594)
* "x86/speculation: Protect against userspace-userspace
  spectreRSB" (CVE-2018-15572)

Skipped patches from L1TF (CVE-2018-3620, CVE-2018-3646):
* "x86/speculation/l1tf: Increase 32bit PAE
  __PHYSICAL_PAGE_SHIFT"
* "x86/mm: Move swap offset/type up in PTE to work around
  erratum"
* "x86/mm: Fix swap entry comment and macro"
* "x86/speculation/l1tf: Change order of offset/type in
  swap entry"
* "x86/speculation/l1tf: Protect swap entries against L1TF"
* "x86/speculation/l1tf: Protect PROT_NONE PTEs against
  speculation"
* "x86/speculation/l1tf: Make sure the first page is
  always reserved"
* "x86/speculation/l1tf: Add sysfs reporting for l1tf"
* "x86/speculation/l1tf: Disallow non privileged high MMIO
  PROT_NONE mappings"
* "x86/speculation/l1tf: Limit swap file size to MAX_PA/2"
* "x86/bugs: Move the l1tf function and define pr_fmt
  properly"
* "x86/speculation/l1tf: Extend 64bit swap file size limit"
* "x86/cpufeatures: Add detection of L1D cache flush
  support."
* "x86/speculation/l1tf: Protect PAE swap entries against
  L1TF"
* "x86/speculation/l1tf: Fix up pte->pfn conversion for
  PAE"
* "x86/speculation/l1tf: Invert all not present mappings"
* "x86/speculation/l1tf: Make pmd/pud_mknotpresent()
  invert"
* "x86/mm/pat: Make set_memory_np() L1TF safe"
* "x86/speculation/l1tf: Fix up CPU feature flags"
* "x86/speculation/l1tf: Unbreak
  !__HAVE_ARCH_PFN_MODIFY_ALLOWED architectures"


Modified "mm: x86: move _PAGE_SWP_SOFT_DIRTY from bit 7 to bit 1" to do the 
changes to arch/x86/include/asm/pgtable_types.h only (because changes to 
arch/x86/include/asm/pgtable_64.h were already present).


** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-15572

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-15594

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-3620

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-3646

** Description changed:

+ SRU Justification
  
- SRU Justification
+ Impact:
+    The upstream process for stable tree updates is quite similar
+    in scope to the Ubuntu SRU process, e.g., each patch has to
+    demonstrably fix a bug, and each patch is vetted by upstream
+    by originating either directly from a mainline/stable Linux tree or
+    a minimally backported form of that patch. The 4.4.148 upstream stable
+    patch set is now available. It should be included in the Ubuntu
+    kernel as well.
  
- Impact:
-The upstream process for stable tree updates is quite similar
-in scope to the Ubuntu SRU process, e.g., each patch has to
-demonstrably fix a bug, and each patch is vetted by upstream
-by originating either directly from a mainline/stable Linux tree or
-a minimally backported form of that patch. The 4.4.148 upstream stable
-patch set is now available. It should be included in the Ubuntu
-kernel as well.
+    git://git.kernel.org/
  
-git://git.kernel.org/
+ TEST CASE: TBD
  
- TEST CASE: TBD
- 
-The following patches from the 4.4.148 stable release shall be
- applied:
+ The following patches from the 4.4.148 stable release shall be applied:
+ * ext4: fix check to prevent initializing reserved inodes
+ * tpm: fix race condition in tpm_common_write()
+ * ipv4+ipv6: Make INET*_ESP select CRYPTO_ECHAINIV
+ * fork: unconditionally clear stack on fork
+ * parisc: Enable CONFIG_MLONGCALLS by default
+ * parisc: Define mb() and add memory barriers to assembler unlock sequences
+ * xen/netfront: don't cache skb_shinfo()
+ * ACPI / LPSS: Add missing prv_offset setting for byt/cht PWM devices
+ * scsi: sr: Avoid that opening a CD-ROM hangs with runtime power management 
enabled
+ * root dentries need RCU-delayed freeing
+ * fix mntput/mntput race
+ * fix __legitimize_mnt()/mntput() race
+ * IB/core: Make testing MR flags for writability a static inline function
+ * IB/mlx4: Mark user MR as writable if actual virtual memory is writable
+ * IB/ocrdma: fix out of bounds access to local buffer
+ * ARM: dts: imx6sx: fix irq for pcie bridge
+ * kprobes/x86: Fix %p uses in error messages
+ * x86/irqflags: Provide a declaration for native_save_fl
+ * UBUNTU: SAUCE: Sync pgtable_64.h with upstream stable
+ * mm: x86: move _PAGE_SWP_SOFT_DIRTY from bit 7 to bit 1
+ * UBUNTU: SAUCE: Sync pgtable-3level.h with upstream stable
+ * UBUNTU: SAUCE: Sync pgtable.h with upstream stable
+ * mm: Add vm_insert_pfn_prot()
+ * mm: fix cache mode tracking in vm_insert_mixed()
+ * x86/mm/kmmio: Make the tracer robust against L1TF
+ * x86/init: fix build with CONFIG_SWAP=n
+ * Linux 4.4.148

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1792174

Title:
  Xenial update to 4.4.148 stable release

Status in linux package 

[Kernel-packages] [Bug 1792174] Re: Xenial update to 4.4.148 stable release

2018-09-12 Thread Stefan Bader
** Also affects: linux (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Changed in: linux (Ubuntu Xenial)
   Importance: Undecided => Medium

** Changed in: linux (Ubuntu Xenial)
   Status: New => In Progress

** Changed in: linux (Ubuntu Xenial)
 Assignee: (unassigned) => Stefan Bader (smb)

** Changed in: linux (Ubuntu)
   Status: New => Invalid

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1792174

Title:
  Xenial update to 4.4.148 stable release

Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Xenial:
  In Progress

Bug description:
  
  SRU Justification

  Impact:
 The upstream process for stable tree updates is quite similar
 in scope to the Ubuntu SRU process, e.g., each patch has to
 demonstrably fix a bug, and each patch is vetted by upstream
 by originating either directly from a mainline/stable Linux tree or
 a minimally backported form of that patch. The 4.4.148 upstream stable
 patch set is now available. It should be included in the Ubuntu
 kernel as well.

 git://git.kernel.org/

  TEST CASE: TBD

 The following patches from the 4.4.148 stable release shall be
  applied:

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1792174/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp