Public bug reported:

SRU Justification

    Impact:
       The upstream process for stable tree updates is quite similar
       in scope to the Ubuntu SRU process, e.g., each patch has to
       demonstrably fix a bug, and each patch is vetted by upstream
       by originating either directly from a mainline/stable Linux tree or
       a minimally backported form of that patch. The following upstream
       stable patches should be included in the Ubuntu kernel:

       v5.4.184 upstream stable release
       from git://git.kernel.org/

arm/arm64: Provide a wrapper for SMCCC 1.1 calls
arm/arm64: smccc/psci: add arm_smccc_1_1_get_conduit()
ARM: report Spectre v2 status through sysfs
ARM: early traps initialisation
ARM: use LOADADDR() to get load address of sections
UBUNTU: [Config] updateconfigs for HARDEN_BRANCH_HISTORY
ARM: Spectre-BHB workaround
ARM: include unprivileged BPF status in Spectre V2 reporting
ARM: fix build error when BPF_SYSCALL is disabled
ARM: fix co-processor register typo
ARM: Do not use NOCROSSREFS directive with ld.lld
ARM: fix build warning in proc-v7-bugs.c
xen/xenbus: don't let xenbus_grant_ring() remove grants in error case
xen/grant-table: add gnttab_try_end_foreign_access()
xen/blkfront: don't use gnttab_query_foreign_access() for mapped status
xen/netfront: don't use gnttab_query_foreign_access() for mapped status
xen/scsifront: don't use gnttab_query_foreign_access() for mapped status
xen/gntalloc: don't use gnttab_query_foreign_access()
xen: remove gnttab_query_foreign_access()
xen/9p: use alloc/free_pages_exact()
xen/pvcalls: use alloc/free_pages_exact()
xen/gnttab: fix gnttab_end_foreign_access() without page specified
xen/netfront: react properly to failing gnttab_end_foreign_access_ref()
Linux 5.4.184
UBUNTU: upstream stable to v5.4.184

** Affects: linux (Ubuntu)
     Importance: Undecided
         Status: Invalid

** Affects: linux (Ubuntu Focal)
     Importance: Medium
     Assignee: Kamal Mostafa (kamalmostafa)
         Status: In Progress


** Tags: kernel-stable-tracking-bug

** Changed in: linux (Ubuntu)
       Status: New => Confirmed

** Tags added: kernel-stable-tracking-bug

** Also affects: linux (Ubuntu Focal)
   Importance: Undecided
       Status: New

** Changed in: linux (Ubuntu Focal)
       Status: New => In Progress

** Changed in: linux (Ubuntu Focal)
   Importance: Undecided => Medium

** Changed in: linux (Ubuntu Focal)
     Assignee: (unassigned) => Kamal Mostafa (kamalmostafa)

** Changed in: linux (Ubuntu)
       Status: Confirmed => Invalid

** Description changed:

+ SRU Justification
  
-     SRU Justification
+     Impact:
+        The upstream process for stable tree updates is quite similar
+        in scope to the Ubuntu SRU process, e.g., each patch has to
+        demonstrably fix a bug, and each patch is vetted by upstream
+        by originating either directly from a mainline/stable Linux tree or
+        a minimally backported form of that patch. The following upstream
+        stable patches should be included in the Ubuntu kernel:
  
-     Impact:
-        The upstream process for stable tree updates is quite similar
-        in scope to the Ubuntu SRU process, e.g., each patch has to
-        demonstrably fix a bug, and each patch is vetted by upstream
-        by originating either directly from a mainline/stable Linux tree or
-        a minimally backported form of that patch. The following upstream
-        stable patches should be included in the Ubuntu kernel:
+        v5.4.184 upstream stable release
+        from git://git.kernel.org/
  
-        v5.4.184 upstream stable release
-        from git://git.kernel.org/
+ arm/arm64: Provide a wrapper for SMCCC 1.1 calls
+ arm/arm64: smccc/psci: add arm_smccc_1_1_get_conduit()
+ ARM: report Spectre v2 status through sysfs
+ ARM: early traps initialisation
+ ARM: use LOADADDR() to get load address of sections
+ UBUNTU: [Config] updateconfigs for HARDEN_BRANCH_HISTORY
+ ARM: Spectre-BHB workaround
+ ARM: include unprivileged BPF status in Spectre V2 reporting
+ ARM: fix build error when BPF_SYSCALL is disabled
+ ARM: fix co-processor register typo
+ ARM: Do not use NOCROSSREFS directive with ld.lld
+ ARM: fix build warning in proc-v7-bugs.c
+ xen/xenbus: don't let xenbus_grant_ring() remove grants in error case
+ xen/grant-table: add gnttab_try_end_foreign_access()
+ xen/blkfront: don't use gnttab_query_foreign_access() for mapped status
+ xen/netfront: don't use gnttab_query_foreign_access() for mapped status
+ xen/scsifront: don't use gnttab_query_foreign_access() for mapped status
+ xen/gntalloc: don't use gnttab_query_foreign_access()
+ xen: remove gnttab_query_foreign_access()
+ xen/9p: use alloc/free_pages_exact()
+ xen/pvcalls: use alloc/free_pages_exact()
+ xen/gnttab: fix gnttab_end_foreign_access() without page specified
+ xen/netfront: react properly to failing gnttab_end_foreign_access_ref()
+ Linux 5.4.184
+ UBUNTU: upstream stable to v5.4.184

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1969242

Title:
  Focal update: v5.4.184 upstream stable release

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1969242/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to