** Description changed: + SRU Justification - SRU Justification + Impact: + The upstream process for stable tree updates is quite similar + in scope to the Ubuntu SRU process, e.g., each patch has to + demonstrably fix a bug, and each patch is vetted by upstream + by originating either directly from a mainline/stable Linux tree or + a minimally backported form of that patch. The following upstream + stable patches should be included in the Ubuntu kernel: - Impact: - The upstream process for stable tree updates is quite similar - in scope to the Ubuntu SRU process, e.g., each patch has to - demonstrably fix a bug, and each patch is vetted by upstream - by originating either directly from a mainline/stable Linux tree or - a minimally backported form of that patch. The following upstream - stable patches should be included in the Ubuntu kernel: + v5.4.57 upstream stable release + from git://git.kernel.org/ - v5.4.57 upstream stable release - from git://git.kernel.org/ + random32: update the net random state on interrupt and activity + ARM: percpu.h: fix build error + random: fix circular include dependency on arm64 after addition of percpu.h + random32: remove net_rand_state from the latent entropy gcc plugin + random32: move the pseudo-random 32-bit definitions to prandom.h + arm64: Workaround circular dependency in pointer_auth.h + ext4: fix direct I/O read error + selftests: bpf: Fix detach from sockmap tests + bpf: sockmap: Require attach_bpf_fd when detaching a program + Linux 5.4.57 + UBUNTU: upstream stable to v5.4.57
-- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1891064 Title: Focal update: v5.4.57 upstream stable release Status in linux package in Ubuntu: Confirmed Status in linux source package in Focal: In Progress Bug description: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable Linux tree or a minimally backported form of that patch. The following upstream stable patches should be included in the Ubuntu kernel: v5.4.57 upstream stable release from git://git.kernel.org/ random32: update the net random state on interrupt and activity ARM: percpu.h: fix build error random: fix circular include dependency on arm64 after addition of percpu.h random32: remove net_rand_state from the latent entropy gcc plugin random32: move the pseudo-random 32-bit definitions to prandom.h arm64: Workaround circular dependency in pointer_auth.h ext4: fix direct I/O read error selftests: bpf: Fix detach from sockmap tests bpf: sockmap: Require attach_bpf_fd when detaching a program Linux 5.4.57 UBUNTU: upstream stable to v5.4.57 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1891064/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : [email protected] Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp

