Public bug reported: SRU Justification
Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable Linux tree or a minimally backported form of that patch. The following upstream stable patches should be included in the Ubuntu kernel: v5.4.197 upstream stable release from git://git.kernel.org/ x86/pci/xen: Disable PCI/MSI[-X] masking for XEN_HVM guests staging: rtl8723bs: prevent ->Ssid overflow in rtw_wx_set_scan() Input: goodix - fix spurious key release events tcp: change source port randomizarion at connect() time secure_seq: use the 64 bits of the siphash for port offset calculation media: vim2m: Register video device after setting up internals media: vim2m: initialize the media device earlier ACPI: sysfs: Make sparse happy about address space in use ACPI: sysfs: Fix BERT error region memory mapping pinctrl: sunxi: fix f1c100s uart2 function net: af_key: check encryption module availability consistency net: ftgmac100: Disable hardware checksum on AST2600 i2c: ismt: Provide a DMA buffer for Interrupt Cause Logging drivers: i2c: thunderx: Allow driver to work with ACPI defined TWSI controllers assoc_array: Fix BUG_ON during garbage collect cfg80211: set custom regdomain after wiphy registration drm/i915: Fix -Wstringop-overflow warning in call to intel_read_wm_latency() exec: Force single empty string when argv is empty netfilter: conntrack: re-fetch conntrack after insertion crypto: ecrdsa - Fix incorrect use of vli_cmp zsmalloc: fix races between asynchronous zspage free and page migration dm integrity: fix error code in dm_integrity_ctr() dm crypt: make printing of the key constant-time dm stats: add cond_resched when looping over entries dm verity: set DM_TARGET_IMMUTABLE feature flag raid5: introduce MD_BROKEN HID: multitouch: Add support for Google Whiskers Touchpad tpm: Fix buffer access in tpm2_get_tpm_pt() tpm: ibmvtpm: Correct the return value in tpm_ibmvtpm_probe() docs: submitting-patches: Fix crossref to 'The canonical patch format' NFS: Memory allocation failures are not server fatal errors NFSD: Fix possible sleep during nfsd4_release_lockowner() bpf: Enlarge offset check value to INT_MAX in bpf_skb_{load,store}_bytes Linux 5.4.197 UBUNTU: Upstream stable to v5.4.197 ** Affects: linux (Ubuntu) Importance: Undecided Status: Invalid ** Affects: linux (Ubuntu Focal) Importance: Medium Assignee: Kamal Mostafa (kamalmostafa) Status: In Progress ** Tags: kernel-stable-tracking-bug ** Changed in: linux (Ubuntu) Status: New => Confirmed ** Tags added: kernel-stable-tracking-bug ** Also affects: linux (Ubuntu Focal) Importance: Undecided Status: New ** Changed in: linux (Ubuntu) Status: Confirmed => In Progress ** Changed in: linux (Ubuntu) Status: In Progress => Invalid ** Changed in: linux (Ubuntu Focal) Status: New => In Progress ** Changed in: linux (Ubuntu Focal) Importance: Undecided => High ** Changed in: linux (Ubuntu Focal) Importance: High => Medium ** Changed in: linux (Ubuntu Focal) Assignee: (unassigned) => Kamal Mostafa (kamalmostafa) ** Description changed: + SRU Justification - SRU Justification + Impact: + The upstream process for stable tree updates is quite similar + in scope to the Ubuntu SRU process, e.g., each patch has to + demonstrably fix a bug, and each patch is vetted by upstream + by originating either directly from a mainline/stable Linux tree or + a minimally backported form of that patch. The following upstream + stable patches should be included in the Ubuntu kernel: - Impact: - The upstream process for stable tree updates is quite similar - in scope to the Ubuntu SRU process, e.g., each patch has to - demonstrably fix a bug, and each patch is vetted by upstream - by originating either directly from a mainline/stable Linux tree or - a minimally backported form of that patch. The following upstream - stable patches should be included in the Ubuntu kernel: + v5.4.197 upstream stable release + from git://git.kernel.org/ - v5.4.197 upstream stable release - from git://git.kernel.org/ + x86/pci/xen: Disable PCI/MSI[-X] masking for XEN_HVM guests + staging: rtl8723bs: prevent ->Ssid overflow in rtw_wx_set_scan() + Input: goodix - fix spurious key release events + tcp: change source port randomizarion at connect() time + secure_seq: use the 64 bits of the siphash for port offset calculation + media: vim2m: Register video device after setting up internals + media: vim2m: initialize the media device earlier + ACPI: sysfs: Make sparse happy about address space in use + ACPI: sysfs: Fix BERT error region memory mapping + pinctrl: sunxi: fix f1c100s uart2 function + net: af_key: check encryption module availability consistency + net: ftgmac100: Disable hardware checksum on AST2600 + i2c: ismt: Provide a DMA buffer for Interrupt Cause Logging + drivers: i2c: thunderx: Allow driver to work with ACPI defined TWSI controllers + assoc_array: Fix BUG_ON during garbage collect + cfg80211: set custom regdomain after wiphy registration + drm/i915: Fix -Wstringop-overflow warning in call to intel_read_wm_latency() + exec: Force single empty string when argv is empty + netfilter: conntrack: re-fetch conntrack after insertion + crypto: ecrdsa - Fix incorrect use of vli_cmp + zsmalloc: fix races between asynchronous zspage free and page migration + dm integrity: fix error code in dm_integrity_ctr() + dm crypt: make printing of the key constant-time + dm stats: add cond_resched when looping over entries + dm verity: set DM_TARGET_IMMUTABLE feature flag + raid5: introduce MD_BROKEN + HID: multitouch: Add support for Google Whiskers Touchpad + tpm: Fix buffer access in tpm2_get_tpm_pt() + tpm: ibmvtpm: Correct the return value in tpm_ibmvtpm_probe() + docs: submitting-patches: Fix crossref to 'The canonical patch format' + NFS: Memory allocation failures are not server fatal errors + NFSD: Fix possible sleep during nfsd4_release_lockowner() + bpf: Enlarge offset check value to INT_MAX in bpf_skb_{load,store}_bytes + Linux 5.4.197 + UBUNTU: Upstream stable to v5.4.197 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1981758 Title: Focal update: v5.4.197 upstream stable release Status in linux package in Ubuntu: Invalid Status in linux source package in Focal: In Progress Bug description: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable Linux tree or a minimally backported form of that patch. The following upstream stable patches should be included in the Ubuntu kernel: v5.4.197 upstream stable release from git://git.kernel.org/ x86/pci/xen: Disable PCI/MSI[-X] masking for XEN_HVM guests staging: rtl8723bs: prevent ->Ssid overflow in rtw_wx_set_scan() Input: goodix - fix spurious key release events tcp: change source port randomizarion at connect() time secure_seq: use the 64 bits of the siphash for port offset calculation media: vim2m: Register video device after setting up internals media: vim2m: initialize the media device earlier ACPI: sysfs: Make sparse happy about address space in use ACPI: sysfs: Fix BERT error region memory mapping pinctrl: sunxi: fix f1c100s uart2 function net: af_key: check encryption module availability consistency net: ftgmac100: Disable hardware checksum on AST2600 i2c: ismt: Provide a DMA buffer for Interrupt Cause Logging drivers: i2c: thunderx: Allow driver to work with ACPI defined TWSI controllers assoc_array: Fix BUG_ON during garbage collect cfg80211: set custom regdomain after wiphy registration drm/i915: Fix -Wstringop-overflow warning in call to intel_read_wm_latency() exec: Force single empty string when argv is empty netfilter: conntrack: re-fetch conntrack after insertion crypto: ecrdsa - Fix incorrect use of vli_cmp zsmalloc: fix races between asynchronous zspage free and page migration dm integrity: fix error code in dm_integrity_ctr() dm crypt: make printing of the key constant-time dm stats: add cond_resched when looping over entries dm verity: set DM_TARGET_IMMUTABLE feature flag raid5: introduce MD_BROKEN HID: multitouch: Add support for Google Whiskers Touchpad tpm: Fix buffer access in tpm2_get_tpm_pt() tpm: ibmvtpm: Correct the return value in tpm_ibmvtpm_probe() docs: submitting-patches: Fix crossref to 'The canonical patch format' NFS: Memory allocation failures are not server fatal errors NFSD: Fix possible sleep during nfsd4_release_lockowner() bpf: Enlarge offset check value to INT_MAX in bpf_skb_{load,store}_bytes Linux 5.4.197 UBUNTU: Upstream stable to v5.4.197 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1981758/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp