** Changed in: linux (Ubuntu)
       Status: Confirmed => Won't Fix

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1977730

Title:
  Kinetic update: v5.18.1 upstream stable release

Status in linux package in Ubuntu:
  Won't Fix
Status in linux source package in Kinetic:
  Won't Fix

Bug description:
  SRU Justification

      Impact:
         The upstream process for stable tree updates is quite similar
         in scope to the Ubuntu SRU process, e.g., each patch has to
         demonstrably fix a bug, and each patch is vetted by upstream
         by originating either directly from a mainline/stable Linux tree or
         a minimally backported form of that patch. The following upstream
         stable patches should be included in the Ubuntu kernel:

         v5.18.1 upstream stable release
         from git://git.kernel.org/

  lockdown: also lock down previous kgdb use
  HID: amd_sfh: Add support for sensor discovery
  random: fix sysctl documentation nits
  init: call time_init() before rand_initialize()
  ia64: define get_cycles macro for arch-override
  s390: define get_cycles macro for arch-override
  parisc: define get_cycles macro for arch-override
  alpha: define get_cycles macro for arch-override
  powerpc: define get_cycles macro for arch-override
  timekeeping: Add raw clock fallback for random_get_entropy()
  m68k: use fallback for random_get_entropy() instead of zero
  riscv: use fallback for random_get_entropy() instead of zero
  mips: use fallback for random_get_entropy() instead of just c0 random
  arm: use fallback for random_get_entropy() instead of zero
  nios2: use fallback for random_get_entropy() instead of zero
  x86/tsc: Use fallback for random_get_entropy() instead of zero
  um: use fallback for random_get_entropy() instead of zero
  sparc: use fallback for random_get_entropy() instead of zero
  xtensa: use fallback for random_get_entropy() instead of zero
  random: insist on random_get_entropy() existing in order to simplify
  random: do not use batches when !crng_ready()
  random: use first 128 bits of input as fast init
  random: do not pretend to handle premature next security model
  random: order timer entropy functions below interrupt functions
  random: do not use input pool from hard IRQs
  random: help compiler out with fast_mix() by using simpler arguments
  siphash: use one source of truth for siphash permutations
  random: use symbolic constants for crng_init states
  random: avoid initializing twice in credit race
  random: move initialization out of reseeding hot path
  random: remove ratelimiting for in-kernel unseeded randomness
  random: use proper jiffies comparison macro
  random: handle latent entropy and command line from random_init()
  random: credit architectural init the exact amount
  random: use static branch for crng_ready()
  random: remove extern from functions in header
  random: use proper return types on get_random_{int,long}_wait()
  random: make consistent use of buf and len
  random: move initialization functions out of hot pages
  random: move randomize_page() into mm where it belongs
  random: unify batched entropy implementations
  random: convert to using fops->read_iter()
  random: convert to using fops->write_iter()
  random: wire up fops->splice_{read,write}_iter()
  random: check for signals after page of pool writes
  ACPI: sysfs: Fix BERT error region memory mapping
  ALSA: ctxfi: Add SB046x PCI ID
  Linux 5.18.1

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1977730/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to     : [email protected]
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to