Format: 1.8 Date: Thu, 14 Jan 2021 08:53:27 -0600 Source: linux-gcp Architecture: source Version: 5.4.0-1036.39 Distribution: focal Urgency: medium Maintainer: Ubuntu Kernel Team Changed-By: Ian May Launchpad-Bugs-Fixed: 1786013 1899802 1900141 1906770 1907151 1911144 1911320 1911333 Changes: linux-gcp (5.4.0-1036.39) focal; urgency=medium . * focal/linux-gcp: 5.4.0-1036.39 -proposed tracker (LP: #1911320) . [ Ubuntu: 5.4.0-63.71 ] . * focal/linux: 5.4.0-63.71 -proposed tracker (LP: #1911333) * overlay: permission regression in 5.4.0-51.56 due to patches related to CVE-2020-16120 (LP: #1900141) - ovl: do not fail because of O_NOATIME * Focal update: v5.4.79 upstream stable release (LP: #1907151) - net/mlx5: Use async EQ setup cleanup helpers for multiple EQs - net/mlx5: poll cmd EQ in case of command timeout - net/mlx5: Fix a race when moving command interface to events mode - net/mlx5: Add retry mechanism to the command entry index allocation * Kernel 5.4.0-56 Wi-Fi does not connect (LP: #1906770) - mt76: fix fix ampdu locking * [Ubuntu 21.04 FEAT] mpt3sas: Request to include the patch set which supports topology where zoning is enabled in expander (LP: #1899802) - scsi: mpt3sas: Define hba_port structure - scsi: mpt3sas: Allocate memory for hba_port objects - scsi: mpt3sas: Rearrange _scsih_mark_responding_sas_device() - scsi: mpt3sas: Update hba_port's sas_address & phy_mask - scsi: mpt3sas: Get device objects using sas_address & portID - scsi: mpt3sas: Rename transport_del_phy_from_an_existing_port() - scsi: mpt3sas: Get sas_device objects using device's rphy - scsi: mpt3sas: Update hba_port objects after host reset - scsi: mpt3sas: Set valid PhysicalPort in SMPPassThrough - scsi: mpt3sas: Handling HBA vSES device - scsi: mpt3sas: Add bypass_dirty_port_flag parameter - scsi: mpt3sas: Handle vSES vphy object during HBA reset - scsi: mpt3sas: Add module parameter multipath_on_hba - scsi: mpt3sas: Bump driver version to 35.101.00.00 . [ Ubuntu: 5.4.0-62.70 ] . * focal/linux: 5.4.0-62.70 -proposed tracker (LP: #1911144) * CVE-2020-28374 - SAUCE: target: fix XCOPY NAA identifier lookup * Packaging resync (LP: #1786013) - update dkms package versions Checksums-Sha1: 0d7d054ef86041ae3b71e9378a899426a9daf909 3860 linux-gcp_5.4.0-1036.39.dsc e93ff3b3d1112440551faea43881df1a59dea295 6836118 linux-gcp_5.4.0-1036.39.diff.gz a8132bc3ee0cd0402cc319116346fc92f6c16f7b 8933 linux-gcp_5.4.0-1036.39_source.buildinfo Checksums-Sha256: dc4846046ed09c46a75a4bc17bbfd10787f38eb413af225653a168b885c03a37 3860 linux-gcp_5.4.0-1036.39.dsc c4f06f09bd98890be2132a7a802adc94a28bbdee8dddb62f6eb9b11db93e4360 6836118 linux-gcp_5.4.0-1036.39.diff.gz ec159efdc95143bd0ce610b6675f31e43ceda8a2deee79aaf77aff24bc4d3b82 8933 linux-gcp_5.4.0-1036.39_source.buildinfo Files: b3b5413580eeec88e649561287c98f76 3860 devel optional linux-gcp_5.4.0-1036.39.dsc 4c708d4e1f93ae286f51470fc636b3c2 6836118 devel optional linux-gcp_5.4.0-1036.39.diff.gz 0ff85c9aa7e9f563704bb4a127e8ecdf 8933 devel optional linux-gcp_5.4.0-1036.39_source.buildinfo