Activity log for bug #1852110

Date Who What changed Old value New value Message
2019-11-11 17:59:21 Connor Kuehl bug added bug
2019-11-11 17:59:23 Connor Kuehl linux (Ubuntu): status New Confirmed
2019-11-11 17:59:25 Connor Kuehl tags kernel-stable-tracking-bug
2019-11-11 17:59:26 Connor Kuehl bug added subscriber SRU Verification
2019-11-11 17:59:29 Connor Kuehl bug added subscriber Ubuntu Stable Release Updates Team
2019-11-11 17:59:32 Connor Kuehl nominated for series Ubuntu Xenial
2019-11-11 17:59:33 Connor Kuehl bug task added linux (Ubuntu Xenial)
2019-11-11 18:00:58 Connor Kuehl linux (Ubuntu Xenial): status New In Progress
2019-11-11 18:01:00 Connor Kuehl linux (Ubuntu Xenial): importance Undecided Medium
2019-11-11 18:01:01 Connor Kuehl linux (Ubuntu Xenial): assignee Connor Kuehl (connork)
2019-11-11 18:01:04 Connor Kuehl linux (Ubuntu): status Confirmed Invalid
2019-11-11 22:54:09 Connor Kuehl description SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable Linux tree or a minimally backported form of that patch. The following upstream stable patches should be included in the Ubuntu kernel: 4.4.200 upstream stable release from git://git.kernel.org/ SRU Justification     Impact:        The upstream process for stable tree updates is quite similar        in scope to the Ubuntu SRU process, e.g., each patch has to        demonstrably fix a bug, and each patch is vetted by upstream        by originating either directly from a mainline/stable Linux tree or        a minimally backported form of that patch. The following upstream        stable patches should be included in the Ubuntu kernel: * kbuild: add -fcf-protection=none when using retpoline flags * regulator: ti-abb: Fix timeout in ti_abb_wait_txdone/ti_abb_clear_all_txdone * regulator: pfuze100-regulator: Variable "val" in pfuze100_regulator_probe() could be uninitialized * ASoc: rockchip: i2s: Fix RPM imbalance * ARM: dts: logicpd-torpedo-som: Remove twl_keypad * ARM: mm: fix alignment handler faults under memory pressure * scsi: sni_53c710: fix compilation error * scsi: fix kconfig dependency warning related to 53C700_LE_ON_BE * perf kmem: Fix memory leak in compact_gfp_flags() * scsi: target: core: Do not overwrite CDB byte 1 * of: unittest: fix memory leak in unittest_data_add * MIPS: bmips: mark exception vectors as char arrays * cifs: Fix cifsInodeInfo lock_sem deadlock when reconnect occurs * dccp: do not leak jiffies on the wire * net: fix sk_page_frag() recursion from memory reclaim * net: hisilicon: Fix ping latency when deal with high throughput * Revert "net: Zeroing the structure ethtool_wolinfo in ethtool_get_wol()" * net: Zeroing the structure ethtool_wolinfo in ethtool_get_wol() * net: add READ_ONCE() annotation in __skb_wait_for_more_packets() * vxlan: check tun_info options_len properly * net/mlx4_core: Dynamically set guaranteed amount of counters per VF * inet: stop leaking jiffies on the wire * net/flow_dissector: switch to siphash * dmaengine: qcom: bam_dma: Fix resource leak * ARM: 8051/1: put_user: fix possible data corruption in put_user * ARM: 8478/2: arm/arm64: add arm-smccc * ARM: 8479/2: add implementation for arm-smccc * ARM: 8480/2: arm64: add implementation for arm-smccc * ARM: 8481/2: drivers: psci: replace psci firmware calls * ARM: uaccess: remove put_user() code duplication * ARM: Move system register accessors to asm/cp15.h * arm/arm64: KVM: Advertise SMCCC v1.1 * arm64: KVM: Report SMCCC_ARCH_WORKAROUND_1 BP hardening support * firmware/psci: Expose PSCI conduit * firmware/psci: Expose SMCCC version through psci_ops * arm/arm64: smccc: Make function identifiers an unsigned quantity * arm/arm64: smccc: Implement SMCCC v1.1 inline primitive * arm/arm64: smccc: Add SMCCC-specific return codes * arm/arm64: smccc-1.1: Make return values unsigned long * arm/arm64: smccc-1.1: Handle function result as parameters * ARM: add more CPU part numbers for Cortex and Brahma B15 CPUs * ARM: bugs: prepare processor bug infrastructure * ARM: bugs: hook processor bug checking into SMP and suspend paths * ARM: bugs: add support for per-processor bug checking * ARM: spectre: add Kconfig symbol for CPUs vulnerable to Spectre * ARM: spectre-v2: harden branch predictor on context switches * ARM: spectre-v2: add Cortex A8 and A15 validation of the IBE bit * ARM: spectre-v2: harden user aborts in kernel space * ARM: spectre-v2: add firmware based hardening * ARM: spectre-v2: warn about incorrect context switching functions * ARM: spectre-v1: add speculation barrier (csdb) macros * ARM: spectre-v1: add array_index_mask_nospec() implementation * ARM: spectre-v1: fix syscall entry * ARM: signal: copy registers using __copy_from_user() * ARM: vfp: use __copy_from_user() when restoring VFP state * ARM: oabi-compat: copy semops using __copy_from_user() * ARM: use __inttype() in get_user() * ARM: spectre-v1: use get_user() for __get_user() * ARM: spectre-v1: mitigate user accesses * ARM: 8789/1: signal: copy registers using __copy_to_user() * ARM: 8791/1: vfp: use __copy_to_user() when saving VFP state * ARM: 8792/1: oabi-compat: copy oabi events using __copy_to_user() * ARM: 8793/1: signal: replace __put_user_error with __put_user * ARM: 8794/1: uaccess: Prevent speculative use of the current addr_limit * ARM: 8795/1: spectre-v1.1: use put_user() for __put_user() * ARM: 8796/1: spectre-v1,v1.1: provide helpers for address sanitization * ARM: 8810/1: vfp: Fix wrong assignement to ufp_exc * ARM: make lookup_processor_type() non-__init * ARM: split out processor lookup * ARM: clean up per-processor check_bugs method call * ARM: add PROC_VTABLE and PROC_TABLE macros * ARM: spectre-v2: per-CPU vtables to work around big.Little systems * ARM: ensure that processor vtables is not lost after boot * ARM: fix the cockup in the previous patch * alarmtimer: Change remaining ENOTSUPP to EOPNOTSUPP * fs/dcache: move security_d_instantiate() behind attaching dentry to inode * Linux 4.4.200 * UBUNTU: updateconfigs for Linux v4.4.200 * UBUNTU: upstream stable to v4.4.200        4.4.200 upstream stable release        from git://git.kernel.org/
2019-11-11 23:14:09 Connor Kuehl description SRU Justification     Impact:        The upstream process for stable tree updates is quite similar        in scope to the Ubuntu SRU process, e.g., each patch has to        demonstrably fix a bug, and each patch is vetted by upstream        by originating either directly from a mainline/stable Linux tree or        a minimally backported form of that patch. The following upstream        stable patches should be included in the Ubuntu kernel: * kbuild: add -fcf-protection=none when using retpoline flags * regulator: ti-abb: Fix timeout in ti_abb_wait_txdone/ti_abb_clear_all_txdone * regulator: pfuze100-regulator: Variable "val" in pfuze100_regulator_probe() could be uninitialized * ASoc: rockchip: i2s: Fix RPM imbalance * ARM: dts: logicpd-torpedo-som: Remove twl_keypad * ARM: mm: fix alignment handler faults under memory pressure * scsi: sni_53c710: fix compilation error * scsi: fix kconfig dependency warning related to 53C700_LE_ON_BE * perf kmem: Fix memory leak in compact_gfp_flags() * scsi: target: core: Do not overwrite CDB byte 1 * of: unittest: fix memory leak in unittest_data_add * MIPS: bmips: mark exception vectors as char arrays * cifs: Fix cifsInodeInfo lock_sem deadlock when reconnect occurs * dccp: do not leak jiffies on the wire * net: fix sk_page_frag() recursion from memory reclaim * net: hisilicon: Fix ping latency when deal with high throughput * Revert "net: Zeroing the structure ethtool_wolinfo in ethtool_get_wol()" * net: Zeroing the structure ethtool_wolinfo in ethtool_get_wol() * net: add READ_ONCE() annotation in __skb_wait_for_more_packets() * vxlan: check tun_info options_len properly * net/mlx4_core: Dynamically set guaranteed amount of counters per VF * inet: stop leaking jiffies on the wire * net/flow_dissector: switch to siphash * dmaengine: qcom: bam_dma: Fix resource leak * ARM: 8051/1: put_user: fix possible data corruption in put_user * ARM: 8478/2: arm/arm64: add arm-smccc * ARM: 8479/2: add implementation for arm-smccc * ARM: 8480/2: arm64: add implementation for arm-smccc * ARM: 8481/2: drivers: psci: replace psci firmware calls * ARM: uaccess: remove put_user() code duplication * ARM: Move system register accessors to asm/cp15.h * arm/arm64: KVM: Advertise SMCCC v1.1 * arm64: KVM: Report SMCCC_ARCH_WORKAROUND_1 BP hardening support * firmware/psci: Expose PSCI conduit * firmware/psci: Expose SMCCC version through psci_ops * arm/arm64: smccc: Make function identifiers an unsigned quantity * arm/arm64: smccc: Implement SMCCC v1.1 inline primitive * arm/arm64: smccc: Add SMCCC-specific return codes * arm/arm64: smccc-1.1: Make return values unsigned long * arm/arm64: smccc-1.1: Handle function result as parameters * ARM: add more CPU part numbers for Cortex and Brahma B15 CPUs * ARM: bugs: prepare processor bug infrastructure * ARM: bugs: hook processor bug checking into SMP and suspend paths * ARM: bugs: add support for per-processor bug checking * ARM: spectre: add Kconfig symbol for CPUs vulnerable to Spectre * ARM: spectre-v2: harden branch predictor on context switches * ARM: spectre-v2: add Cortex A8 and A15 validation of the IBE bit * ARM: spectre-v2: harden user aborts in kernel space * ARM: spectre-v2: add firmware based hardening * ARM: spectre-v2: warn about incorrect context switching functions * ARM: spectre-v1: add speculation barrier (csdb) macros * ARM: spectre-v1: add array_index_mask_nospec() implementation * ARM: spectre-v1: fix syscall entry * ARM: signal: copy registers using __copy_from_user() * ARM: vfp: use __copy_from_user() when restoring VFP state * ARM: oabi-compat: copy semops using __copy_from_user() * ARM: use __inttype() in get_user() * ARM: spectre-v1: use get_user() for __get_user() * ARM: spectre-v1: mitigate user accesses * ARM: 8789/1: signal: copy registers using __copy_to_user() * ARM: 8791/1: vfp: use __copy_to_user() when saving VFP state * ARM: 8792/1: oabi-compat: copy oabi events using __copy_to_user() * ARM: 8793/1: signal: replace __put_user_error with __put_user * ARM: 8794/1: uaccess: Prevent speculative use of the current addr_limit * ARM: 8795/1: spectre-v1.1: use put_user() for __put_user() * ARM: 8796/1: spectre-v1,v1.1: provide helpers for address sanitization * ARM: 8810/1: vfp: Fix wrong assignement to ufp_exc * ARM: make lookup_processor_type() non-__init * ARM: split out processor lookup * ARM: clean up per-processor check_bugs method call * ARM: add PROC_VTABLE and PROC_TABLE macros * ARM: spectre-v2: per-CPU vtables to work around big.Little systems * ARM: ensure that processor vtables is not lost after boot * ARM: fix the cockup in the previous patch * alarmtimer: Change remaining ENOTSUPP to EOPNOTSUPP * fs/dcache: move security_d_instantiate() behind attaching dentry to inode * Linux 4.4.200 * UBUNTU: updateconfigs for Linux v4.4.200 * UBUNTU: upstream stable to v4.4.200        4.4.200 upstream stable release        from git://git.kernel.org/ SRU Justification     Impact:        The upstream process for stable tree updates is quite similar        in scope to the Ubuntu SRU process, e.g., each patch has to        demonstrably fix a bug, and each patch is vetted by upstream        by originating either directly from a mainline/stable Linux tree or        a minimally backported form of that patch. The following upstream        stable patches should be included in the Ubuntu kernel: * kbuild: add -fcf-protection=none when using retpoline flags * regulator: ti-abb: Fix timeout in ti_abb_wait_txdone/ti_abb_clear_all_txdone * regulator: pfuze100-regulator: Variable "val" in pfuze100_regulator_probe() could be uninitialized * ASoc: rockchip: i2s: Fix RPM imbalance * ARM: dts: logicpd-torpedo-som: Remove twl_keypad * ARM: mm: fix alignment handler faults under memory pressure * scsi: sni_53c710: fix compilation error * scsi: fix kconfig dependency warning related to 53C700_LE_ON_BE * perf kmem: Fix memory leak in compact_gfp_flags() * scsi: target: core: Do not overwrite CDB byte 1 * of: unittest: fix memory leak in unittest_data_add * MIPS: bmips: mark exception vectors as char arrays * cifs: Fix cifsInodeInfo lock_sem deadlock when reconnect occurs * dccp: do not leak jiffies on the wire * net: fix sk_page_frag() recursion from memory reclaim * net: hisilicon: Fix ping latency when deal with high throughput * UBUNTU: SAUCE: Revert "net: Zeroing the structure ethtool_wolinfo in ethtool_get_wol()" * net: Zeroing the structure ethtool_wolinfo in ethtool_get_wol() * net: add READ_ONCE() annotation in __skb_wait_for_more_packets() * vxlan: check tun_info options_len properly * net/mlx4_core: Dynamically set guaranteed amount of counters per VF * inet: stop leaking jiffies on the wire * net/flow_dissector: switch to siphash * dmaengine: qcom: bam_dma: Fix resource leak * ARM: 8051/1: put_user: fix possible data corruption in put_user * ARM: 8478/2: arm/arm64: add arm-smccc * ARM: 8479/2: add implementation for arm-smccc * ARM: 8480/2: arm64: add implementation for arm-smccc * ARM: 8481/2: drivers: psci: replace psci firmware calls * ARM: uaccess: remove put_user() code duplication * ARM: Move system register accessors to asm/cp15.h * arm/arm64: KVM: Advertise SMCCC v1.1 * arm64: KVM: Report SMCCC_ARCH_WORKAROUND_1 BP hardening support * firmware/psci: Expose PSCI conduit * firmware/psci: Expose SMCCC version through psci_ops * arm/arm64: smccc: Make function identifiers an unsigned quantity * arm/arm64: smccc: Implement SMCCC v1.1 inline primitive * arm/arm64: smccc: Add SMCCC-specific return codes * arm/arm64: smccc-1.1: Make return values unsigned long * arm/arm64: smccc-1.1: Handle function result as parameters * ARM: add more CPU part numbers for Cortex and Brahma B15 CPUs * ARM: bugs: prepare processor bug infrastructure * ARM: bugs: hook processor bug checking into SMP and suspend paths * ARM: bugs: add support for per-processor bug checking * ARM: spectre: add Kconfig symbol for CPUs vulnerable to Spectre * ARM: spectre-v2: harden branch predictor on context switches * ARM: spectre-v2: add Cortex A8 and A15 validation of the IBE bit * ARM: spectre-v2: harden user aborts in kernel space * ARM: spectre-v2: add firmware based hardening * ARM: spectre-v2: warn about incorrect context switching functions * ARM: spectre-v1: add speculation barrier (csdb) macros * ARM: spectre-v1: add array_index_mask_nospec() implementation * ARM: spectre-v1: fix syscall entry * ARM: signal: copy registers using __copy_from_user() * ARM: vfp: use __copy_from_user() when restoring VFP state * ARM: oabi-compat: copy semops using __copy_from_user() * ARM: use __inttype() in get_user() * ARM: spectre-v1: use get_user() for __get_user() * ARM: spectre-v1: mitigate user accesses * ARM: 8789/1: signal: copy registers using __copy_to_user() * ARM: 8791/1: vfp: use __copy_to_user() when saving VFP state * ARM: 8792/1: oabi-compat: copy oabi events using __copy_to_user() * ARM: 8793/1: signal: replace __put_user_error with __put_user * ARM: 8794/1: uaccess: Prevent speculative use of the current addr_limit * ARM: 8795/1: spectre-v1.1: use put_user() for __put_user() * ARM: 8796/1: spectre-v1,v1.1: provide helpers for address sanitization * ARM: 8810/1: vfp: Fix wrong assignement to ufp_exc * ARM: make lookup_processor_type() non-__init * ARM: split out processor lookup * ARM: clean up per-processor check_bugs method call * ARM: add PROC_VTABLE and PROC_TABLE macros * ARM: spectre-v2: per-CPU vtables to work around big.Little systems * ARM: ensure that processor vtables is not lost after boot * ARM: fix the cockup in the previous patch * alarmtimer: Change remaining ENOTSUPP to EOPNOTSUPP * fs/dcache: move security_d_instantiate() behind attaching dentry to inode * Linux 4.4.200 * UBUNTU: updateconfigs for Linux v4.4.200 * UBUNTU: upstream stable to v4.4.200        4.4.200 upstream stable release        from git://git.kernel.org/
2019-11-12 03:44:03 Khaled El Mously linux (Ubuntu Xenial): status In Progress Fix Committed
2019-12-02 14:09:56 Launchpad Janitor linux (Ubuntu Xenial): status Fix Committed Fix Released
2019-12-02 14:09:56 Launchpad Janitor cve linked 2018-20784