** Description changed:

+ SRU Justification
  
-     SRU Justification
+     Impact:
+        The upstream process for stable tree updates is quite similar
+        in scope to the Ubuntu SRU process, e.g., each patch has to
+        demonstrably fix a bug, and each patch is vetted by upstream
+        by originating either directly from a mainline/stable Linux tree or
+        a minimally backported form of that patch. The following upstream
+        stable patches should be included in the Ubuntu kernel:
  
-     Impact:
-        The upstream process for stable tree updates is quite similar
-        in scope to the Ubuntu SRU process, e.g., each patch has to
-        demonstrably fix a bug, and each patch is vetted by upstream
-        by originating either directly from a mainline/stable Linux tree or
-        a minimally backported form of that patch. The following upstream
-        stable patches should be included in the Ubuntu kernel:
+        v5.4.87 upstream stable release
+        from git://git.kernel.org/
  
-        v5.4.87 upstream stable release
-        from git://git.kernel.org/
+ net/sched: sch_taprio: reset child qdiscs before freeing them
+ md/raid10: initialize r10_bio->read_slot before use.
+ thermal/drivers/cpufreq_cooling: Update cpufreq_state only if state has 
changed
+ ext4: prevent creating duplicate encrypted filenames
+ ubifs: prevent creating duplicate encrypted filenames
+ f2fs: prevent creating duplicate encrypted filenames
+ fscrypt: add fscrypt_is_nokey_name()
+ fscrypt: remove kernel-internal constants from UAPI header
+ vfio/pci: Move dummy_resources_list init in vfio_pci_probe()
+ btrfs: fix race when defragmenting leads to unnecessary IO
+ ext4: don't remount read-only with errors=continue on reboot
+ KVM: x86: avoid incorrect writes to host MSR_IA32_SPEC_CTRL
+ KVM: SVM: relax conditions for allowing MSR_IA32_SPEC_CTRL accesses
+ KVM: x86: reinstate vendor-agnostic check on SPEC_CTRL cpuid bits
+ powerpc/bitops: Fix possible undefined behaviour with fls() and fls64()
+ jffs2: Allow setting rp_size to zero during remounting
+ jffs2: Fix NULL pointer dereference in rp_size fs option parsing
+ scsi: block: Fix a race in the runtime power management code
+ uapi: move constants from <linux/kernel.h> to <linux/const.h>
+ tools headers UAPI: Sync linux/const.h with the kernel headers
+ null_blk: Fix zone size initialization
+ of: fix linker-section match-table corruption
+ cgroup: Fix memory leak when parsing multiple source parameters
+ scsi: cxgb4i: Fix TLS dependency
+ Bluetooth: hci_h5: close serdev device and free hu in h5_close
+ reiserfs: add check for an invalid ih_entry_count
+ misc: vmw_vmci: fix kernel info-leak by initializing dbells in 
vmci_ctx_get_chkpt_doorbells()
+ media: gp8psk: initialize stats at power control logic
+ f2fs: fix shift-out-of-bounds in sanity_check_raw_super()
+ ALSA: seq: Use bool for snd_seq_queue internal flags
+ ALSA: rawmidi: Access runtime->avail always in spinlock
+ bfs: don't use WARNING: string when it's just info.
+ fcntl: Fix potential deadlock in send_sig{io, urg}()
+ rtc: sun6i: Fix memleak in sun6i_rtc_clk_init
+ module: set MODULE_STATE_GOING state when a module fails to load
+ quota: Don't overflow quota file offsets
+ rtc: pl031: fix resource leak in pl031_probe
+ powerpc: sysdev: add missing iounmap() on error in mpic_msgr_probe()
+ i3c master: fix missing destroy_workqueue() on error in i3c_master_register
+ NFSv4: Fix a pNFS layout related use-after-free race when freeing the inode
+ f2fs: avoid race condition for shrinker count
+ module: delay kobject uevent until after module init call
+ fs/namespace.c: WARN if mnt_count has become negative
+ um: ubd: Submit all data segments atomically
+ tick/sched: Remove bogus boot "safety" check
+ ALSA: pcm: Clear the full allocated memory at hw_params
+ dm verity: skip verity work if I/O error when system is shutting down
+ Linux 5.4.87
+ UBUNTU: upstream stable to v5.4.87

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1912681

Title:
  Focal update: v5.4.87 upstream stable release

Status in linux package in Ubuntu:
  Confirmed
Status in linux source package in Focal:
  In Progress

Bug description:
  SRU Justification

      Impact:
         The upstream process for stable tree updates is quite similar
         in scope to the Ubuntu SRU process, e.g., each patch has to
         demonstrably fix a bug, and each patch is vetted by upstream
         by originating either directly from a mainline/stable Linux tree or
         a minimally backported form of that patch. The following upstream
         stable patches should be included in the Ubuntu kernel:

         v5.4.87 upstream stable release
         from git://git.kernel.org/

  net/sched: sch_taprio: reset child qdiscs before freeing them
  md/raid10: initialize r10_bio->read_slot before use.
  thermal/drivers/cpufreq_cooling: Update cpufreq_state only if state has 
changed
  ext4: prevent creating duplicate encrypted filenames
  ubifs: prevent creating duplicate encrypted filenames
  f2fs: prevent creating duplicate encrypted filenames
  fscrypt: add fscrypt_is_nokey_name()
  fscrypt: remove kernel-internal constants from UAPI header
  vfio/pci: Move dummy_resources_list init in vfio_pci_probe()
  btrfs: fix race when defragmenting leads to unnecessary IO
  ext4: don't remount read-only with errors=continue on reboot
  KVM: x86: avoid incorrect writes to host MSR_IA32_SPEC_CTRL
  KVM: SVM: relax conditions for allowing MSR_IA32_SPEC_CTRL accesses
  KVM: x86: reinstate vendor-agnostic check on SPEC_CTRL cpuid bits
  powerpc/bitops: Fix possible undefined behaviour with fls() and fls64()
  jffs2: Allow setting rp_size to zero during remounting
  jffs2: Fix NULL pointer dereference in rp_size fs option parsing
  scsi: block: Fix a race in the runtime power management code
  uapi: move constants from <linux/kernel.h> to <linux/const.h>
  tools headers UAPI: Sync linux/const.h with the kernel headers
  null_blk: Fix zone size initialization
  of: fix linker-section match-table corruption
  cgroup: Fix memory leak when parsing multiple source parameters
  scsi: cxgb4i: Fix TLS dependency
  Bluetooth: hci_h5: close serdev device and free hu in h5_close
  reiserfs: add check for an invalid ih_entry_count
  misc: vmw_vmci: fix kernel info-leak by initializing dbells in 
vmci_ctx_get_chkpt_doorbells()
  media: gp8psk: initialize stats at power control logic
  f2fs: fix shift-out-of-bounds in sanity_check_raw_super()
  ALSA: seq: Use bool for snd_seq_queue internal flags
  ALSA: rawmidi: Access runtime->avail always in spinlock
  bfs: don't use WARNING: string when it's just info.
  fcntl: Fix potential deadlock in send_sig{io, urg}()
  rtc: sun6i: Fix memleak in sun6i_rtc_clk_init
  module: set MODULE_STATE_GOING state when a module fails to load
  quota: Don't overflow quota file offsets
  rtc: pl031: fix resource leak in pl031_probe
  powerpc: sysdev: add missing iounmap() on error in mpic_msgr_probe()
  i3c master: fix missing destroy_workqueue() on error in i3c_master_register
  NFSv4: Fix a pNFS layout related use-after-free race when freeing the inode
  f2fs: avoid race condition for shrinker count
  module: delay kobject uevent until after module init call
  fs/namespace.c: WARN if mnt_count has become negative
  um: ubd: Submit all data segments atomically
  tick/sched: Remove bogus boot "safety" check
  ALSA: pcm: Clear the full allocated memory at hw_params
  dm verity: skip verity work if I/O error when system is shutting down
  Linux 5.4.87
  UBUNTU: upstream stable to v5.4.87

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1912681/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to     : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to