This bug is awaiting verification that the linux-xilinx-
zynqmp/5.4.0-1019.22 kernel in -proposed solves the problem. Please test
the kernel and update this bug with the results. If the problem is
solved, change the tag 'verification-needed-focal' to 'verification-
done-focal'. If the problem still exists, change the tag 'verification-
needed-focal' to 'verification-failed-focal'.

If verification is not done by 5 working days from today, this fix will
be dropped from the source code, and this bug will be closed.

See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how
to enable and use -proposed. Thank you!


** Tags added: verification-needed-focal

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1969242

Title:
  Focal update: v5.4.184 upstream stable release

Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Focal:
  Fix Released

Bug description:
  SRU Justification

      Impact:
         The upstream process for stable tree updates is quite similar
         in scope to the Ubuntu SRU process, e.g., each patch has to
         demonstrably fix a bug, and each patch is vetted by upstream
         by originating either directly from a mainline/stable Linux tree or
         a minimally backported form of that patch. The following upstream
         stable patches should be included in the Ubuntu kernel:

         v5.4.184 upstream stable release
         from git://git.kernel.org/

  arm/arm64: Provide a wrapper for SMCCC 1.1 calls
  arm/arm64: smccc/psci: add arm_smccc_1_1_get_conduit()
  ARM: report Spectre v2 status through sysfs
  ARM: early traps initialisation
  ARM: use LOADADDR() to get load address of sections
  UBUNTU: [Config] updateconfigs for HARDEN_BRANCH_HISTORY
  ARM: Spectre-BHB workaround
  ARM: include unprivileged BPF status in Spectre V2 reporting
  ARM: fix build error when BPF_SYSCALL is disabled
  ARM: fix co-processor register typo
  ARM: Do not use NOCROSSREFS directive with ld.lld
  ARM: fix build warning in proc-v7-bugs.c
  xen/xenbus: don't let xenbus_grant_ring() remove grants in error case
  xen/grant-table: add gnttab_try_end_foreign_access()
  xen/blkfront: don't use gnttab_query_foreign_access() for mapped status
  xen/netfront: don't use gnttab_query_foreign_access() for mapped status
  xen/scsifront: don't use gnttab_query_foreign_access() for mapped status
  xen/gntalloc: don't use gnttab_query_foreign_access()
  xen: remove gnttab_query_foreign_access()
  xen/9p: use alloc/free_pages_exact()
  xen/pvcalls: use alloc/free_pages_exact()
  xen/gnttab: fix gnttab_end_foreign_access() without page specified
  xen/netfront: react properly to failing gnttab_end_foreign_access_ref()
  Linux 5.4.184
  UBUNTU: upstream stable to v5.4.184

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1969242/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to     : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to