Public bug reported:

SRU Justification

Impact:
   The upstream process for stable tree updates is quite similar
   in scope to the Ubuntu SRU process, e.g., each patch has to
   demonstrably fix a bug, and each patch is vetted by upstream
   by originating either directly from a mainline/stable Linux tree
   or a minimally backported form of that patch. The 4.4.136 upstream
   stable stable patch set is now available. It should be included
   in the Ubuntu kernel as well.

   git://git.kernel.org/

TEST CASE: TBD

   The following patches from the 4.4.136 stable release shall be
   applied:

  * Linux 4.4.136
  * sparc64: Fix build warnings with gcc 7.
  * mm: fix the NULL mapping case in __isolate_lru_page()
  * fix io_destroy()/aio_complete() race
  * Kbuild: change CC_OPTIMIZE_FOR_SIZE definition
  * drm/i915: Disable LVDS on Radiant P845
  * hwtracing: stm: fix build error on some arches
  * stm class: Use vmalloc for the master map
  * scsi: scsi_transport_srp: Fix shost to rport translation
  * MIPS: prctl: Disallow FRE without FR with PR_SET_FP_MODE requests
  * MIPS: ptrace: Fix PTRACE_PEEKUSR requests for 64-bit FGRs
  * iio:kfifo_buf: check for uint overflow
  * dmaengine: usb-dmac: fix endless loop in usb_dmac_chan_terminate_all()
  * i2c: rcar: revoke START request early
  * i2c: rcar: check master irqs before slave irqs
  * i2c: rcar: don't issue stop when HW does it automatically
  * i2c: rcar: init new messages in irq
  * i2c: rcar: refactor setup of a msg
  * i2c: rcar: remove spinlock
  * i2c: rcar: remove unused IOERROR state
  * i2c: rcar: rework hw init
  * i2c: rcar: make sure clocks are on when doing clock calculation
  * tcp: avoid integer overflows in tcp_rcv_space_adjust()
  * irda: fix overly long udelay()
  * ASoC: Intel: sst: remove redundant variable dma_dev_name
  * rtlwifi: rtl8192cu: Remove variable self-assignment in rf.c
  * cfg80211: further limit wiphy names to 64 bytes
  * selinux: KASAN: slab-out-of-bounds in xattr_getsecurity
  * tracing: Fix crash when freeing instances with event triggers
  * Input: elan_i2c_smbus - fix corrupted stack
  * Revert "ima: limit file hash setting by user to fix and log modes"
  * xfs: detect agfl count corruption and reset agfl
  * sh: New gcc support
  * USB: serial: cp210x: use tcflag_t to fix incompatible pointer type
  * powerpc/64s: Clear PCR on boot
  * arm64: lse: Add early clobbers to some input/output asm operands

** Affects: linux (Ubuntu)
     Importance: Undecided
         Status: Invalid


** Tags: kernel-stable-tracking-bug

** Changed in: linux (Ubuntu)
       Status: New => Invalid

** Description changed:

- 
  SRU Justification
  
  Impact:
-    The upstream process for stable tree updates is quite similar
-    in scope to the Ubuntu SRU process, e.g., each patch has to
-    demonstrably fix a bug, and each patch is vetted by upstream
-    by originating either directly from a mainline/stable Linux tree
-    or a minimally backported form of that patch. The 4.4.136 upstream
-    stable stable patch set is now available. It should be included
-    in the Ubuntu kernel as well.
+    The upstream process for stable tree updates is quite similar
+    in scope to the Ubuntu SRU process, e.g., each patch has to
+    demonstrably fix a bug, and each patch is vetted by upstream
+    by originating either directly from a mainline/stable Linux tree
+    or a minimally backported form of that patch. The 4.4.136 upstream
+    stable stable patch set is now available. It should be included
+    in the Ubuntu kernel as well.
  
-    git://git.kernel.org/
+    git://git.kernel.org/
  
  TEST CASE: TBD
  
-    The following patches from the 4.4.136 stable release shall be
-    applied:
+    The following patches from the 4.4.136 stable release shall be
+    applied:
  
- <to-be-filled-in>
+   * Linux 4.4.136
+   * sparc64: Fix build warnings with gcc 7.
+   * mm: fix the NULL mapping case in __isolate_lru_page()
+   * fix io_destroy()/aio_complete() race
+   * Kbuild: change CC_OPTIMIZE_FOR_SIZE definition
+   * drm/i915: Disable LVDS on Radiant P845
+   * hwtracing: stm: fix build error on some arches
+   * stm class: Use vmalloc for the master map
+   * scsi: scsi_transport_srp: Fix shost to rport translation
+   * MIPS: prctl: Disallow FRE without FR with PR_SET_FP_MODE requests
+   * MIPS: ptrace: Fix PTRACE_PEEKUSR requests for 64-bit FGRs
+   * iio:kfifo_buf: check for uint overflow
+   * dmaengine: usb-dmac: fix endless loop in usb_dmac_chan_terminate_all()
+   * i2c: rcar: revoke START request early
+   * i2c: rcar: check master irqs before slave irqs
+   * i2c: rcar: don't issue stop when HW does it automatically
+   * i2c: rcar: init new messages in irq
+   * i2c: rcar: refactor setup of a msg
+   * i2c: rcar: remove spinlock
+   * i2c: rcar: remove unused IOERROR state
+   * i2c: rcar: rework hw init
+   * i2c: rcar: make sure clocks are on when doing clock calculation
+   * tcp: avoid integer overflows in tcp_rcv_space_adjust()
+   * irda: fix overly long udelay()
+   * ASoC: Intel: sst: remove redundant variable dma_dev_name
+   * rtlwifi: rtl8192cu: Remove variable self-assignment in rf.c
+   * cfg80211: further limit wiphy names to 64 bytes
+   * selinux: KASAN: slab-out-of-bounds in xattr_getsecurity
+   * tracing: Fix crash when freeing instances with event triggers
+   * Input: elan_i2c_smbus - fix corrupted stack
+   * Revert "ima: limit file hash setting by user to fix and log modes"
+   * xfs: detect agfl count corruption and reset agfl
+   * sh: New gcc support
+   * USB: serial: cp210x: use tcflag_t to fix incompatible pointer type
+   * powerpc/64s: Clear PCR on boot
+   * arm64: lse: Add early clobbers to some input/output asm operands

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1776177

Title:
  Xenial update to 4.4.136 stable release

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1776177/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to