Public bug reported:

SRU Justification

    Impact:
       The upstream process for stable tree updates is quite similar
       in scope to the Ubuntu SRU process, e.g., each patch has to
       demonstrably fix a bug, and each patch is vetted by upstream
       by originating either directly from a mainline/stable Linux tree or
       a minimally backported form of that patch. The following upstream
       stable patches should be included in the Ubuntu kernel:

       v5.4.94 upstream stable release
       from git://git.kernel.org/

gpio: mvebu: fix pwm .get_state period calculation
futex: Ensure the correct return value from futex_lock_pi()
futex: Replace pointless printk in fixup_owner()
futex: Provide and use pi_state_update_owner()
rtmutex: Remove unused argument from rt_mutex_proxy_unlock()
futex: Use pi_state_update_owner() in put_pi_state()
futex: Simplify fixup_pi_state_owner()
futex: Handle faults correctly for PI futexes
HID: wacom: Correct NULL dereference on AES pen proximity
io_uring: Fix current->fs handling in io_sq_wq_submit_work()
tracing: Fix race in trace_open and buffer resize call
arm64: mm: use single quantity to represent the PA to VA translation
SMB3.1.1: do not log warning message if server doesn't populate salt
tools: Factor HOSTCC, HOSTLD, HOSTAR definitions
dm integrity: conditionally disable "recalculate" feature
writeback: Drop I_DIRTY_TIME_EXPIRE
fs: fix lazytime expiration handling in __writeback_single_inode()
Linux 5.4.94
UBUNTU: upstream stable to v5.4.94

** Affects: linux (Ubuntu)
     Importance: Undecided
         Status: Confirmed

** Affects: linux (Ubuntu Focal)
     Importance: Undecided
     Assignee: Kamal Mostafa (kamalmostafa)
         Status: In Progress


** Tags: kernel-stable-tracking-bug

** Changed in: linux (Ubuntu)
       Status: New => Confirmed

** Tags added: kernel-stable-tracking-bug

** Also affects: linux (Ubuntu Focal)
   Importance: Undecided
       Status: New

** Changed in: linux (Ubuntu Focal)
       Status: New => In Progress

** Changed in: linux (Ubuntu Focal)
     Assignee: (unassigned) => Kamal Mostafa (kamalmostafa)

** Description changed:

+ SRU Justification
  
-     SRU Justification
+     Impact:
+        The upstream process for stable tree updates is quite similar
+        in scope to the Ubuntu SRU process, e.g., each patch has to
+        demonstrably fix a bug, and each patch is vetted by upstream
+        by originating either directly from a mainline/stable Linux tree or
+        a minimally backported form of that patch. The following upstream
+        stable patches should be included in the Ubuntu kernel:
  
-     Impact:
-        The upstream process for stable tree updates is quite similar
-        in scope to the Ubuntu SRU process, e.g., each patch has to
-        demonstrably fix a bug, and each patch is vetted by upstream
-        by originating either directly from a mainline/stable Linux tree or
-        a minimally backported form of that patch. The following upstream
-        stable patches should be included in the Ubuntu kernel:
+        v5.4.94 upstream stable release
+        from git://git.kernel.org/
  
-        v5.4.94 upstream stable release
-        from git://git.kernel.org/
+ gpio: mvebu: fix pwm .get_state period calculation
+ futex: Ensure the correct return value from futex_lock_pi()
+ futex: Replace pointless printk in fixup_owner()
+ futex: Provide and use pi_state_update_owner()
+ rtmutex: Remove unused argument from rt_mutex_proxy_unlock()
+ futex: Use pi_state_update_owner() in put_pi_state()
+ futex: Simplify fixup_pi_state_owner()
+ futex: Handle faults correctly for PI futexes
+ HID: wacom: Correct NULL dereference on AES pen proximity
+ io_uring: Fix current->fs handling in io_sq_wq_submit_work()
+ tracing: Fix race in trace_open and buffer resize call
+ arm64: mm: use single quantity to represent the PA to VA translation
+ SMB3.1.1: do not log warning message if server doesn't populate salt
+ tools: Factor HOSTCC, HOSTLD, HOSTAR definitions
+ dm integrity: conditionally disable "recalculate" feature
+ writeback: Drop I_DIRTY_TIME_EXPIRE
+ fs: fix lazytime expiration handling in __writeback_single_inode()
+ Linux 5.4.94
+ UBUNTU: upstream stable to v5.4.94

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1915200

Title:
  Focal update: v5.4.94 upstream stable release

Status in linux package in Ubuntu:
  Confirmed
Status in linux source package in Focal:
  In Progress

Bug description:
  SRU Justification

      Impact:
         The upstream process for stable tree updates is quite similar
         in scope to the Ubuntu SRU process, e.g., each patch has to
         demonstrably fix a bug, and each patch is vetted by upstream
         by originating either directly from a mainline/stable Linux tree or
         a minimally backported form of that patch. The following upstream
         stable patches should be included in the Ubuntu kernel:

         v5.4.94 upstream stable release
         from git://git.kernel.org/

  gpio: mvebu: fix pwm .get_state period calculation
  futex: Ensure the correct return value from futex_lock_pi()
  futex: Replace pointless printk in fixup_owner()
  futex: Provide and use pi_state_update_owner()
  rtmutex: Remove unused argument from rt_mutex_proxy_unlock()
  futex: Use pi_state_update_owner() in put_pi_state()
  futex: Simplify fixup_pi_state_owner()
  futex: Handle faults correctly for PI futexes
  HID: wacom: Correct NULL dereference on AES pen proximity
  io_uring: Fix current->fs handling in io_sq_wq_submit_work()
  tracing: Fix race in trace_open and buffer resize call
  arm64: mm: use single quantity to represent the PA to VA translation
  SMB3.1.1: do not log warning message if server doesn't populate salt
  tools: Factor HOSTCC, HOSTLD, HOSTAR definitions
  dm integrity: conditionally disable "recalculate" feature
  writeback: Drop I_DIRTY_TIME_EXPIRE
  fs: fix lazytime expiration handling in __writeback_single_inode()
  Linux 5.4.94
  UBUNTU: upstream stable to v5.4.94

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1915200/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to     : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to