Public bug reported:
SRU Justification
Impact:
The upstream process for stable tree updates is quite similar
in scope to the Ubuntu SRU process, e.g., each patch has to
demonstrably fix a bug, and each patch is vetted by upstream
by originating either directly from a mainline/stable Linux tree or
a minimally backported form of that patch. The following upstream
stable patches should be included in the Ubuntu kernel:
v5.4.100 upstream stable release
from git://git.kernel.org/
KVM: SEV: fix double locking due to incorrect backport
net: qrtr: Fix port ID for control messages
net: bridge: Fix a warning when del bridge sysfs
Xen/x86: don't bail early from clear_foreign_p2m_mapping()
Xen/x86: also check kernel mapping in set_foreign_p2m_mapping()
Xen/gntdev: correct dev_bus_addr handling in gntdev_map_grant_pages()
Xen/gntdev: correct error checking in gntdev_map_grant_pages()
xen/arm: don't ignore return errors from set_phys_to_machine
xen-blkback: don't "handle" error by BUG()
xen-netback: don't "handle" error by BUG()
xen-scsiback: don't "handle" error by BUG()
xen-blkback: fix error handling in xen_blkbk_map()
media: pwc: Use correct device for DMA
btrfs: fix backport of 2175bf57dc952 in 5.4.95
Linux 5.4.100
UBUNTU: upstream stable to v5.4.100
** Affects: linux (Ubuntu)
Importance: Undecided
Status: Invalid
** Affects: linux (Ubuntu Focal)
Importance: Medium
Assignee: Kamal Mostafa (kamalmostafa)
Status: In Progress
** Tags: kernel-stable-tracking-bug
** Changed in: linux (Ubuntu)
Status: New => Confirmed
** Tags added: kernel-stable-tracking-bug
** Also affects: linux (Ubuntu Focal)
Importance: Undecided
Status: New
** Changed in: linux (Ubuntu Focal)
Status: New => In Progress
** Changed in: linux (Ubuntu Focal)
Assignee: (unassigned) => Kamal Mostafa (kamalmostafa)
** Changed in: linux (Ubuntu Focal)
Importance: Undecided => Medium
** Changed in: linux (Ubuntu)
Status: Confirmed => Invalid
** Description changed:
+ SRU Justification
- SRU Justification
+ Impact:
+ The upstream process for stable tree updates is quite similar
+ in scope to the Ubuntu SRU process, e.g., each patch has to
+ demonstrably fix a bug, and each patch is vetted by upstream
+ by originating either directly from a mainline/stable Linux tree or
+ a minimally backported form of that patch. The following upstream
+ stable patches should be included in the Ubuntu kernel:
- Impact:
- The upstream process for stable tree updates is quite similar
- in scope to the Ubuntu SRU process, e.g., each patch has to
- demonstrably fix a bug, and each patch is vetted by upstream
- by originating either directly from a mainline/stable Linux tree or
- a minimally backported form of that patch. The following upstream
- stable patches should be included in the Ubuntu kernel:
+ v5.4.100 upstream stable release
+ from git://git.kernel.org/
- v5.4.100 upstream stable release
- from git://git.kernel.org/
+ KVM: SEV: fix double locking due to incorrect backport
+ net: qrtr: Fix port ID for control messages
+ net: bridge: Fix a warning when del bridge sysfs
+ Xen/x86: don't bail early from clear_foreign_p2m_mapping()
+ Xen/x86: also check kernel mapping in set_foreign_p2m_mapping()
+ Xen/gntdev: correct dev_bus_addr handling in gntdev_map_grant_pages()
+ Xen/gntdev: correct error checking in gntdev_map_grant_pages()
+ xen/arm: don't ignore return errors from set_phys_to_machine
+ xen-blkback: don't "handle" error by BUG()
+ xen-netback: don't "handle" error by BUG()
+ xen-scsiback: don't "handle" error by BUG()
+ xen-blkback: fix error handling in xen_blkbk_map()
+ media: pwc: Use correct device for DMA
+ btrfs: fix backport of 2175bf57dc952 in 5.4.95
+ Linux 5.4.100
+ UBUNTU: upstream stable to v5.4.100
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1918168
Title:
Focal update: v5.4.100 upstream stable release
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1918168/+subscriptions
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs