** Description changed:

+ SRU Justification
  
-     SRU Justification
+     Impact:
+        The upstream process for stable tree updates is quite similar
+        in scope to the Ubuntu SRU process, e.g., each patch has to
+        demonstrably fix a bug, and each patch is vetted by upstream
+        by originating either directly from a mainline/stable Linux tree or
+        a minimally backported form of that patch. The 4.4.63 upstream stable
+        patch set is now available. It should be included in the Ubuntu
+        kernel as well.
  
-     Impact:
-        The upstream process for stable tree updates is quite similar
-        in scope to the Ubuntu SRU process, e.g., each patch has to
-        demonstrably fix a bug, and each patch is vetted by upstream
-        by originating either directly from a mainline/stable Linux tree or
-        a minimally backported form of that patch. The 4.4.63 upstream stable
-        patch set is now available. It should be included in the Ubuntu
-        kernel as well.
+        git://git.kernel.org/
  
-        git://git.kernel.org/
+     TEST CASE: TBD
  
-     TEST CASE: TBD
- 
-        The following patches from the 4.4.63 stable release shall be
- applied:
+ The following patches from the 4.4.63 stable release shall be applied:
+ * cgroup, kthread: close race window where new kthreads can be migrated to
+   non-root cgroups
+ * thp: fix MADV_DONTNEED vs clear soft dirty race
+ * drm/nouveau/mpeg: mthd returns true on success now
+ * drm/nouveau/mmu/nv4a: use nv04 mmu rather than the nv44 one
+ * CIFS: store results of cifs_reopen_file to avoid infinite wait
+ * Input: xpad - add support for Razer Wildcat gamepad
+ * perf/x86: Avoid exposing wrong/stale data in intel_pmu_lbr_read_32()
+ * x86/vdso: Ensure vdso32_enabled gets set to valid values only
+ * x86/vdso: Plug race between mapping and ELF header setup
+ * acpi, nfit, libnvdimm: fix interleave set cookie calculation (64-bit
+   comparison)
+ * iscsi-target: Fix TMR reference leak during session shutdown
+ * iscsi-target: Drop work-around for legacy GlobalSAN initiator
+ * scsi: sr: Sanity check returned mode data
+ * scsi: sd: Consider max_xfer_blocks if opt_xfer_blocks is unusable
+ * scsi: sd: Fix capacity calculation with 32-bit sector_t
+ * xen, fbfront: fix connecting to backend
+ * libnvdimm: fix reconfig_mutex, mmap_sem, and jbd2_handle lockdep splat
+ * irqchip/irq-imx-gpcv2: Fix spinlock initialization
+ * ftrace: Fix removing of second function probe
+ * char: Drop bogus dependency of DEVPORT on !M68K
+ * char: lack of bool string made CONFIG_DEVPORT always on
+ * Revert "MIPS: Lantiq: Fix cascaded IRQ setup"
+ * kvm: fix page struct leak in handle_vmon
+ * zram: do not use copy_page with non-page aligned address
+ * powerpc: Disable HFSCR[TM] if TM is not supported
+ * crypto: ahash - Fix EINPROGRESS notification callback
+ * ath9k: fix NULL pointer dereference
+ * dvb-usb-v2: avoid use-after-free
+ * ext4: fix inode checksum calculation problem if i_extra_size is small
+ * platform/x86: acer-wmi: setup accelerometer when machine has appropriate
+   notify event
+ * rtc: tegra: Implement clock handling
+ * mm: Tighten x86 /dev/mem with zeroing reads
+ * dvb-usb: don't use stack for firmware load
+ * dvb-usb-firmware: don't do DMA on stack
+ * virtio-console: avoid DMA from stack
+ * pegasus: Use heap buffers for all register access
+ * rtl8150: Use heap buffers for all register access
+ * catc: Combine failure cleanup code in catc_probe()
+ * catc: Use heap buffer for memory size test
+ * tty/serial: atmel: RS485 half duplex w/DMA: enable RX after TX is done
+ * net: ipv6: check route protocol when deleting routes
+ * MIPS: fix Select HAVE_IRQ_EXIT_ON_IRQ_STACK patch.
+ * Linux 4.4.63

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1687629

Title:
  Xenial update to 4.4.63 stable release

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1687629/+subscriptions

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to