The following patches were NOT applied as they had been applied
previously:

 * kvm: vmx: Scrub hardware GPRs at VM-exit
 * bpf: add bpf_patch_insn_single helper

** Description changed:

+ SRU Justification
  
-     SRU Justification
+     Impact:
+        The upstream process for stable tree updates is quite similar
+        in scope to the Ubuntu SRU process, e.g., each patch has to
+        demonstrably fix a bug, and each patch is vetted by upstream
+        by originating either directly from a mainline/stable Linux tree or
+        a minimally backported form of that patch. The 4.4.112 upstream stable
+        patch set is now available. It should be included in the Ubuntu
+        kernel as well.
  
-     Impact:
-        The upstream process for stable tree updates is quite similar
-        in scope to the Ubuntu SRU process, e.g., each patch has to
-        demonstrably fix a bug, and each patch is vetted by upstream
-        by originating either directly from a mainline/stable Linux tree or
-        a minimally backported form of that patch. The 4.4.112 upstream stable
-        patch set is now available. It should be included in the Ubuntu
-        kernel as well.
+        git://git.kernel.org/
  
-        git://git.kernel.org/
+     TEST CASE: TBD
  
-     TEST CASE: TBD
- 
-        The following patches from the 4.4.112 stable release shall be
- applied:
+        The following patches from the 4.4.112 stable release shall be applied:
+ * dm bufio: fix shrinker scans when (nr_to_scan < retain_target)
+ * KVM: Fix stack-out-of-bounds read in write_mmio
+ * can: gs_usb: fix return value of the "set_bittiming" callback
+ * IB/srpt: Disable RDMA access by the initiator
+ * MIPS: Validate PR_SET_FP_MODE prctl(2) requests against the ABI of the task
+ * MIPS: Factor out NT_PRFPREG regset access helpers
+ * MIPS: Guard against any partial write attempt with PTRACE_SETREGSET
+ * MIPS: Consistently handle buffer counter with PTRACE_SETREGSET
+ * MIPS: Fix an FCSR access API regression with NT_PRFPREG and MSA
+ * MIPS: Also verify sizeof `elf_fpreg_t' with PTRACE_SETREGSET
+ * MIPS: Disallow outsized PTRACE_SETREGSET NT_PRFPREG regset accesses
+ * net/mac80211/debugfs.c: prevent build failure with CONFIG_UBSAN=y
+ * kvm: vmx: Scrub hardware GPRs at VM-exit
+ * x86/vsdo: Fix build on PARAVIRT_CLOCK=y, KVM_GUEST=n
+ * x86/acpi: Handle SCI interrupts above legacy space gracefully
+ * iommu/arm-smmu-v3: Don't free page table ops twice
+ * ALSA: pcm: Remove incorrect snd_BUG_ON() usages
+ * ALSA: pcm: Add missing error checks in OSS emulation plugin builder
+ * ALSA: pcm: Abort properly at pending signal in OSS read/write loops
+ * ALSA: pcm: Allow aborting mutex lock at OSS read/write loops
+ * ALSA: aloop: Release cable upon open error path
+ * ALSA: aloop: Fix inconsistent format due to incomplete rule
+ * ALSA: aloop: Fix racy hw constraints adjustment
+ * x86/acpi: Reduce code duplication in mp_override_legacy_irq()
+ * mm/compaction: fix invalid free_pfn and compact_cached_free_pfn
+ * mm/compaction: pass only pageblock aligned range to pageblock_pfn_to_page
+ * mm/page-writeback: fix dirty_ratelimit calculation
+ * mm/zswap: use workqueue to destroy pool
+ * zswap: don't param_set_charp while holding spinlock
+ * locks: don't check for race with close when setting OFD lock
+ * futex: Replace barrier() in unqueue_me() with READ_ONCE()
+ * locking/mutex: Allow next waiter lockless wakeup
+ * usbvision fix overflow of interfaces array
+ * usb: musb: ux500: Fix NULL pointer dereference at system PM
+ * r8152: fix the wake event
+ * r8152: use test_and_clear_bit
+ * r8152: adjust ALDPS function
+ * lan78xx: use skb_cow_head() to deal with cloned skbs
+ * sr9700: use skb_cow_head() to deal with cloned skbs
+ * smsc75xx: use skb_cow_head() to deal with cloned skbs
+ * cx82310_eth: use skb_cow_head() to deal with cloned skbs
+ * x86/mm/pat, /dev/mem: Remove superfluous error message
+ * hwrng: core - sleep interruptible in read
+ * sysrq: Fix warning in sysrq generated crash.
+ * xhci: Fix ring leak in failure path of xhci_alloc_virt_device()
+ * Revert "userfaultfd: selftest: vm: allow to build in vm/ directory"
+ * x86/pti/efi: broken conversion from efi to kernel page table
+ * 8021q: fix a memory leak for VLAN 0 device
+ * ip6_tunnel: disable dst caching if tunnel is dual-stack
+ * net: core: fix module type in sock_diag_bind
+ * RDS: Heap OOB write in rds_message_alloc_sgs()
+ * RDS: null pointer dereference in rds_atomic_free_op
+ * sh_eth: fix TSU resource handling
+ * sh_eth: fix SH7757 GEther initialization
+ * net: stmmac: enable EEE in MII, GMII or RGMII only
+ * ipv6: fix possible mem leaks in ipv6_make_skb()
+ * crypto: algapi - fix NULL dereference in crypto_remove_spawns()
+ * rbd: set max_segments to USHRT_MAX
+ * x86/microcode/intel: Extend BDW late-loading with a revision check
+ * KVM: x86: Add memory barrier on vmcs field lookup
+ * drm/vmwgfx: Potential off by one in vmw_view_add()
+ * kaiser: Set _PAGE_NX only if supported
+ * bpf: add bpf_patch_insn_single helper
+ * bpf: don't (ab)use instructions to store state
+ * bpf: move fixup_bpf_calls() function
+ * bpf: refactor fixup_bpf_calls()
+ * bpf: adjust insn_aux_data when patching insns
+ * bpf: prevent out-of-bounds speculation
+ * bpf, array: fix overflow in max_entries and undefined behavior in index_mask
+ * iscsi-target: Make TASK_REASSIGN use proper se_cmd->cmd_kref
+ * target: Avoid early CMD_T_PRE_EXECUTE failures during ABORT_TASK
+ * USB: serial: cp210x: add IDs for LifeScan OneTouch Verio IQ
+ * USB: serial: cp210x: add new device ID ELV ALC 8xxx
+ * usb: misc: usb3503: make sure reset is low for at least 100us
+ * USB: fix usbmon BUG trigger
+ * usbip: remove kernel addresses from usb device and urb debug msgs
+ * staging: android: ashmem: fix a race condition in ASHMEM_SET_SIZE ioctl
+ * Bluetooth: Prevent stack info leak from the EFS element.
+ * uas: ignore UAS for Norelsys NS1068(X) chips
+ * e1000e: Fix e1000_check_for_copper_link_ich8lan return value.
+ * x86/Documentation: Add PTI description
+ * x86/cpu: Factor out application of forced CPU caps
+ * x86/cpufeatures: Make CPU bugs sticky
+ * x86/cpufeatures: Add X86_BUG_CPU_INSECURE
+ * x86/pti: Rename BUG_CPU_INSECURE to BUG_CPU_MELTDOWN
+ * x86/cpufeatures: Add X86_BUG_SPECTRE_V[12]
+ * x86/cpu: Merge bugs.c and bugs_64.c
+ * sysfs/cpu: Add vulnerability folder
+ * x86/cpu: Implement CPU vulnerabilites sysfs functions
+ * sysfs/cpu: Fix typos in vulnerability documentation
+ * x86/alternatives: Fix optimize_nops() checking
+ * x86/alternatives: Add missing '\n' at end of ALTERNATIVE inline asm
+ * selftests/x86: Add test_vsyscall
+ * Linux 4.4.112

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1745266

Title:
  Xenial update to 4.4.112 stable release

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1745266/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to