Public bug reported: SRU Justification
Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable Linux tree or a minimally backported form of that patch. The following upstream stable patches should be included in the Ubuntu kernel: v5.18.1 upstream stable release from git://git.kernel.org/ lockdown: also lock down previous kgdb use HID: amd_sfh: Add support for sensor discovery random: fix sysctl documentation nits init: call time_init() before rand_initialize() ia64: define get_cycles macro for arch-override s390: define get_cycles macro for arch-override parisc: define get_cycles macro for arch-override alpha: define get_cycles macro for arch-override powerpc: define get_cycles macro for arch-override timekeeping: Add raw clock fallback for random_get_entropy() m68k: use fallback for random_get_entropy() instead of zero riscv: use fallback for random_get_entropy() instead of zero mips: use fallback for random_get_entropy() instead of just c0 random arm: use fallback for random_get_entropy() instead of zero nios2: use fallback for random_get_entropy() instead of zero x86/tsc: Use fallback for random_get_entropy() instead of zero um: use fallback for random_get_entropy() instead of zero sparc: use fallback for random_get_entropy() instead of zero xtensa: use fallback for random_get_entropy() instead of zero random: insist on random_get_entropy() existing in order to simplify random: do not use batches when !crng_ready() random: use first 128 bits of input as fast init random: do not pretend to handle premature next security model random: order timer entropy functions below interrupt functions random: do not use input pool from hard IRQs random: help compiler out with fast_mix() by using simpler arguments siphash: use one source of truth for siphash permutations random: use symbolic constants for crng_init states random: avoid initializing twice in credit race random: move initialization out of reseeding hot path random: remove ratelimiting for in-kernel unseeded randomness random: use proper jiffies comparison macro random: handle latent entropy and command line from random_init() random: credit architectural init the exact amount random: use static branch for crng_ready() random: remove extern from functions in header random: use proper return types on get_random_{int,long}_wait() random: make consistent use of buf and len random: move initialization functions out of hot pages random: move randomize_page() into mm where it belongs random: unify batched entropy implementations random: convert to using fops->read_iter() random: convert to using fops->write_iter() random: wire up fops->splice_{read,write}_iter() random: check for signals after page of pool writes ACPI: sysfs: Fix BERT error region memory mapping ALSA: ctxfi: Add SB046x PCI ID Linux 5.18.1 ** Affects: linux (Ubuntu) Importance: Undecided Status: Confirmed ** Affects: linux (Ubuntu Kinetic) Importance: Undecided Status: Confirmed ** Tags: kernel-stable-tracking-bug ** Changed in: linux (Ubuntu) Status: New => Confirmed ** Tags added: kernel-stable-tracking-bug ** Also affects: linux (Ubuntu Kinetic) Importance: Undecided Status: Confirmed ** Description changed: + SRU Justification - SRU Justification + Impact: + The upstream process for stable tree updates is quite similar + in scope to the Ubuntu SRU process, e.g., each patch has to + demonstrably fix a bug, and each patch is vetted by upstream + by originating either directly from a mainline/stable Linux tree or + a minimally backported form of that patch. The following upstream + stable patches should be included in the Ubuntu kernel: - Impact: - The upstream process for stable tree updates is quite similar - in scope to the Ubuntu SRU process, e.g., each patch has to - demonstrably fix a bug, and each patch is vetted by upstream - by originating either directly from a mainline/stable Linux tree or - a minimally backported form of that patch. The following upstream - stable patches should be included in the Ubuntu kernel: + v5.18.1 upstream stable release + from git://git.kernel.org/ - v5.18.1 upstream stable release - from git://git.kernel.org/ + lockdown: also lock down previous kgdb use + HID: amd_sfh: Add support for sensor discovery + random: fix sysctl documentation nits + init: call time_init() before rand_initialize() + ia64: define get_cycles macro for arch-override + s390: define get_cycles macro for arch-override + parisc: define get_cycles macro for arch-override + alpha: define get_cycles macro for arch-override + powerpc: define get_cycles macro for arch-override + timekeeping: Add raw clock fallback for random_get_entropy() + m68k: use fallback for random_get_entropy() instead of zero + riscv: use fallback for random_get_entropy() instead of zero + mips: use fallback for random_get_entropy() instead of just c0 random + arm: use fallback for random_get_entropy() instead of zero + nios2: use fallback for random_get_entropy() instead of zero + x86/tsc: Use fallback for random_get_entropy() instead of zero + um: use fallback for random_get_entropy() instead of zero + sparc: use fallback for random_get_entropy() instead of zero + xtensa: use fallback for random_get_entropy() instead of zero + random: insist on random_get_entropy() existing in order to simplify + random: do not use batches when !crng_ready() + random: use first 128 bits of input as fast init + random: do not pretend to handle premature next security model + random: order timer entropy functions below interrupt functions + random: do not use input pool from hard IRQs + random: help compiler out with fast_mix() by using simpler arguments + siphash: use one source of truth for siphash permutations + random: use symbolic constants for crng_init states + random: avoid initializing twice in credit race + random: move initialization out of reseeding hot path + random: remove ratelimiting for in-kernel unseeded randomness + random: use proper jiffies comparison macro + random: handle latent entropy and command line from random_init() + random: credit architectural init the exact amount + random: use static branch for crng_ready() + random: remove extern from functions in header + random: use proper return types on get_random_{int,long}_wait() + random: make consistent use of buf and len + random: move initialization functions out of hot pages + random: move randomize_page() into mm where it belongs + random: unify batched entropy implementations + random: convert to using fops->read_iter() + random: convert to using fops->write_iter() + random: wire up fops->splice_{read,write}_iter() + random: check for signals after page of pool writes + ACPI: sysfs: Fix BERT error region memory mapping + ALSA: ctxfi: Add SB046x PCI ID + Linux 5.18.1 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1977730 Title: Kinetic update: v5.18.1 upstream stable release Status in linux package in Ubuntu: Confirmed Status in linux source package in Kinetic: Confirmed Bug description: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable Linux tree or a minimally backported form of that patch. The following upstream stable patches should be included in the Ubuntu kernel: v5.18.1 upstream stable release from git://git.kernel.org/ lockdown: also lock down previous kgdb use HID: amd_sfh: Add support for sensor discovery random: fix sysctl documentation nits init: call time_init() before rand_initialize() ia64: define get_cycles macro for arch-override s390: define get_cycles macro for arch-override parisc: define get_cycles macro for arch-override alpha: define get_cycles macro for arch-override powerpc: define get_cycles macro for arch-override timekeeping: Add raw clock fallback for random_get_entropy() m68k: use fallback for random_get_entropy() instead of zero riscv: use fallback for random_get_entropy() instead of zero mips: use fallback for random_get_entropy() instead of just c0 random arm: use fallback for random_get_entropy() instead of zero nios2: use fallback for random_get_entropy() instead of zero x86/tsc: Use fallback for random_get_entropy() instead of zero um: use fallback for random_get_entropy() instead of zero sparc: use fallback for random_get_entropy() instead of zero xtensa: use fallback for random_get_entropy() instead of zero random: insist on random_get_entropy() existing in order to simplify random: do not use batches when !crng_ready() random: use first 128 bits of input as fast init random: do not pretend to handle premature next security model random: order timer entropy functions below interrupt functions random: do not use input pool from hard IRQs random: help compiler out with fast_mix() by using simpler arguments siphash: use one source of truth for siphash permutations random: use symbolic constants for crng_init states random: avoid initializing twice in credit race random: move initialization out of reseeding hot path random: remove ratelimiting for in-kernel unseeded randomness random: use proper jiffies comparison macro random: handle latent entropy and command line from random_init() random: credit architectural init the exact amount random: use static branch for crng_ready() random: remove extern from functions in header random: use proper return types on get_random_{int,long}_wait() random: make consistent use of buf and len random: move initialization functions out of hot pages random: move randomize_page() into mm where it belongs random: unify batched entropy implementations random: convert to using fops->read_iter() random: convert to using fops->write_iter() random: wire up fops->splice_{read,write}_iter() random: check for signals after page of pool writes ACPI: sysfs: Fix BERT error region memory mapping ALSA: ctxfi: Add SB046x PCI ID Linux 5.18.1 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1977730/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp