Public bug reported: SRU Justification
Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable Linux tree or a minimally backported form of that patch. The following upstream stable patches should be included in the Ubuntu kernel: upstream stable patchset 2019-11-27 Ported from the following upstream stable releases: v4.19.86, v5.3.13 from git://git.kernel.org/ i2c: mediatek: modify threshold passed to i2c_get_dma_safe_msg_buf() Revert "OPP: Protect dev_list with opp_table lock" net: cdc_ncm: Signedness bug in cdc_ncm_set_dgram_size() mm/memory_hotplug: don't access uninitialized memmaps in shrink_pgdat_span() mm/memory_hotplug: fix updating the node span arm64: uaccess: Ensure PAN is re-enabled after unhandled uaccess fault fbdev: Ditch fb_edid_add_monspecs bpf, x32: Fix bug for BPF_ALU64 | BPF_NEG bpf, x32: Fix bug with ALU64 {LSH, RSH, ARSH} BPF_X shift by 0 bpf, x32: Fix bug with ALU64 {LSH, RSH, ARSH} BPF_K shift by 0 bpf, x32: Fix bug for BPF_JMP | {BPF_JSGT, BPF_JSLE, BPF_JSLT, BPF_JSGE} bpf: btf: Fix a missing check bug UBUNTU: upstream stable to v4.19.86, v5.3.13 ** Affects: linux (Ubuntu) Importance: Undecided Status: Confirmed ** Affects: linux (Ubuntu Disco) Importance: Undecided Assignee: Kamal Mostafa (kamalmostafa) Status: In Progress ** Tags: kernel-stable-tracking-bug ** Changed in: linux (Ubuntu) Status: New => Confirmed ** Tags added: kernel-stable-tracking-bug ** Also affects: linux (Ubuntu Disco) Importance: Undecided Status: New ** Changed in: linux (Ubuntu Disco) Status: New => In Progress ** Changed in: linux (Ubuntu Disco) Assignee: (unassigned) => Kamal Mostafa (kamalmostafa) ** Description changed: + SRU Justification - SRU Justification + Impact: + The upstream process for stable tree updates is quite similar + in scope to the Ubuntu SRU process, e.g., each patch has to + demonstrably fix a bug, and each patch is vetted by upstream + by originating either directly from a mainline/stable Linux tree or + a minimally backported form of that patch. The following upstream + stable patches should be included in the Ubuntu kernel: - Impact: - The upstream process for stable tree updates is quite similar - in scope to the Ubuntu SRU process, e.g., each patch has to - demonstrably fix a bug, and each patch is vetted by upstream - by originating either directly from a mainline/stable Linux tree or - a minimally backported form of that patch. The following upstream - stable patches should be included in the Ubuntu kernel: + upstream stable patchset 2019-11-27 - upstream stable patchset 2019-11-27 - from git://git.kernel.org/ + Ported from the following upstream stable releases: + v4.19.86, v5.3.13 + + from git://git.kernel.org/ + + i2c: mediatek: modify threshold passed to i2c_get_dma_safe_msg_buf() + Revert "OPP: Protect dev_list with opp_table lock" + net: cdc_ncm: Signedness bug in cdc_ncm_set_dgram_size() + mm/memory_hotplug: don't access uninitialized memmaps in shrink_pgdat_span() + mm/memory_hotplug: fix updating the node span + arm64: uaccess: Ensure PAN is re-enabled after unhandled uaccess fault + fbdev: Ditch fb_edid_add_monspecs + bpf, x32: Fix bug for BPF_ALU64 | BPF_NEG + bpf, x32: Fix bug with ALU64 {LSH, RSH, ARSH} BPF_X shift by 0 + bpf, x32: Fix bug with ALU64 {LSH, RSH, ARSH} BPF_K shift by 0 + bpf, x32: Fix bug for BPF_JMP | {BPF_JSGT, BPF_JSLE, BPF_JSLT, BPF_JSGE} + bpf: btf: Fix a missing check bug + UBUNTU: upstream stable to v4.19.86, v5.3.13 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1854229 Title: Disco update: upstream stable patchset 2019-11-27 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1854229/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs