** Description changed:

+ SRU Justification
  
-     SRU Justification
+     Impact:
+        The upstream process for stable tree updates is quite similar
+        in scope to the Ubuntu SRU process, e.g., each patch has to
+        demonstrably fix a bug, and each patch is vetted by upstream
+        by originating either directly from a mainline/stable Linux tree or
+        a minimally backported form of that patch. The 4.4.143 upstream stable
+        patch set is now available. It should be included in the Ubuntu
+        kernel as well.
  
-     Impact:
-        The upstream process for stable tree updates is quite similar
-        in scope to the Ubuntu SRU process, e.g., each patch has to
-        demonstrably fix a bug, and each patch is vetted by upstream
-        by originating either directly from a mainline/stable Linux tree or
-        a minimally backported form of that patch. The 4.4.143 upstream stable
-        patch set is now available. It should be included in the Ubuntu
-        kernel as well.
+        git://git.kernel.org/
  
-        git://git.kernel.org/
+     TEST CASE: TBD
  
-     TEST CASE: TBD
- 
-        The following patches from the 4.4.143 stable release shall be
- applied:
+ The following patches from the 4.4.143 stable release shall be applied:
+ * compiler, clang: suppress warning for unused static inline functions
+ * compiler, clang: properly override 'inline' for clang
+ * compiler, clang: always inline when CONFIG_OPTIMIZE_INLINING is disabled
+ * compiler-gcc.h: Add __attribute__((gnu_inline)) to all inline declarations
+ * x86/asm: Add _ASM_ARG* constants for argument registers to <asm/asm.h>
+ * ocfs2: subsystem.su_mutex is required while accessing the item->ci_parent
+ * bcm63xx_enet: correct clock usage
+ * bcm63xx_enet: do not write to random DMA channel on BCM6345
+ * crypto: crypto4xx - remove bad list_del
+ * crypto: crypto4xx - fix crypto4xx_build_pdr, crypto4xx_build_sdr leak
+ * atm: zatm: Fix potential Spectre v1
+ * net: dccp: avoid crash in ccid3_hc_rx_send_feedback()
+ * net: dccp: switch rx_tstamp_last_feedback to monotonic clock
+ * net/mlx5: Fix incorrect raw command length parsing
+ * net: sungem: fix rx checksum support
+ * qed: Limit msix vectors in kdump kernel to the minimum required count.
+ * r8152: napi hangup fix after disconnect
+ * tcp: fix Fast Open key endianness
+ * tcp: prevent bogus FRTO undos with non-SACK flows
+ * vhost_net: validate sock before trying to put its fd
+ * net_sched: blackhole: tell upper qdisc about dropped packets
+ * net/mlx5: Fix command interface race in polling mode
+ * net: cxgb3_main: fix potential Spectre v1
+ * rtlwifi: rtl8821ae: fix firmware is not ready to run
+ * MIPS: Call dump_stack() from show_regs()
+ * MIPS: Use async IPIs for arch_trigger_cpumask_backtrace()
+ * netfilter: ebtables: reject non-bridge targets
+ * KEYS: DNS: fix parsing multiple options
+ * rds: avoid unenecessary cong_update in loop transport
+ * net/nfc: Avoid stalls when nfc_alloc_send_skb() returned NULL.
+ * Linux 4.4.143

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1790884

Title:
  Xenial update to 4.4.143 stable release

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1790884/+subscriptions

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to