]> git.proxmox.com Git - mirror_ubuntu-artful-kernel.git/blob - debian.master/changelog
UBUNTU: Start new release
[mirror_ubuntu-artful-kernel.git] / debian.master / changelog
1 linux (4.13.0-1.2) UNRELEASED; urgency=low
2
3 CHANGELOG: Do not edit directly. Autogenerated at release.
4 CHANGELOG: Use the printchanges target to see the curent changes.
5 CHANGELOG: Use the insertchanges target to create the final log.
6
7 -- Seth Forshee <seth.forshee@canonical.com> Thu, 20 Jul 2017 09:17:01 -0500
8
9 linux (4.13.0-0.1) artful; urgency=low
10
11 * Miscellaneous Ubuntu changes
12 - Disable hio
13 - Disable zfs build
14 - ubuntu: vbox -- update to 5.1.24-dfsg-1
15
16 [ Upstream Kernel Changes ]
17
18 * Rebase to v4.13-rc1
19
20 -- Seth Forshee <seth.forshee@canonical.com> Wed, 19 Jul 2017 15:09:31 -0500
21
22 linux (4.12.0-7.8) artful; urgency=low
23
24 * ThunderX: soft lockup on 4.8+ kernels when running qemu-efi with vhost=on
25 (LP: #1673564)
26 - arm64: Add a facility to turn an ESR syndrome into a sysreg encoding
27 - KVM: arm/arm64: vgic-v3: Add accessors for the ICH_APxRn_EL2 registers
28 - KVM: arm64: Make kvm_condition_valid32() accessible from EL2
29 - KVM: arm64: vgic-v3: Add hook to handle guest GICv3 sysreg accesses at EL2
30 - KVM: arm64: vgic-v3: Add ICV_BPR1_EL1 handler
31 - KVM: arm64: vgic-v3: Add ICV_IGRPEN1_EL1 handler
32 - KVM: arm64: vgic-v3: Add ICV_IAR1_EL1 handler
33 - KVM: arm64: vgic-v3: Add ICV_EOIR1_EL1 handler
34 - KVM: arm64: vgic-v3: Add ICV_AP1Rn_EL1 handler
35 - KVM: arm64: vgic-v3: Add ICV_HPPIR1_EL1 handler
36 - KVM: arm64: vgic-v3: Enable trapping of Group-1 system registers
37 - KVM: arm64: Enable GICv3 Group-1 sysreg trapping via command-line
38 - KVM: arm64: vgic-v3: Add ICV_BPR0_EL1 handler
39 - KVM: arm64: vgic-v3: Add ICV_IGNREN0_EL1 handler
40 - KVM: arm64: vgic-v3: Add misc Group-0 handlers
41 - KVM: arm64: vgic-v3: Enable trapping of Group-0 system registers
42 - KVM: arm64: Enable GICv3 Group-0 sysreg trapping via command-line
43 - arm64: Add MIDR values for Cavium cn83XX SoCs
44 - arm64: Add workaround for Cavium Thunder erratum 30115
45 - KVM: arm64: vgic-v3: Add ICV_DIR_EL1 handler
46 - KVM: arm64: vgic-v3: Add ICV_RPR_EL1 handler
47 - KVM: arm64: vgic-v3: Add ICV_CTLR_EL1 handler
48 - KVM: arm64: vgic-v3: Add ICV_PMR_EL1 handler
49 - KVM: arm64: Enable GICv3 common sysreg trapping via command-line
50 - KVM: arm64: vgic-v3: Log which GICv3 system registers are trapped
51 - KVM: arm64: Log an error if trapping a read-from-write-only GICv3 access
52 - KVM: arm64: Log an error if trapping a write-to-read-only GICv3 access
53
54 * hns: under heavy load, NIC may fail and require reboot (LP: #1704146)
55 - net: hns: Bugfix for Tx timeout handling in hns driver
56
57 * New ACPI identifiers for ThunderX SMMU (LP: #1703437)
58 - iommu/arm-smmu: Plumb in new ACPI identifiers
59
60 * Transparent hugepages should default to enabled=madvise (LP: #1703742)
61 - SAUCE: use CONFIG_TRANSPARENT_HUGEPAGE_MADVISE=y as default
62
63 * Artful update to v4.12.1 stable release (LP: #1703858)
64 - driver core: platform: fix race condition with driver_override
65 - RDMA/uverbs: Check port number supplied by user verbs cmds
66 - usb: dwc3: replace %p with %pK
67 - USB: serial: cp210x: add ID for CEL EM3588 USB ZigBee stick
68 - usb: usbip: set buffer pointers to NULL after free
69 - Add USB quirk for HVR-950q to avoid intermittent device resets
70 - usb: Fix typo in the definition of Endpoint[out]Request
71 - USB: core: fix device node leak
72 - USB: serial: option: add two Longcheer device ids
73 - USB: serial: qcserial: new Sierra Wireless EM7305 device ID
74 - xhci: Limit USB2 port wake support for AMD Promontory hosts
75 - gfs2: Fix glock rhashtable rcu bug
76 - Add "shutdown" to "struct class".
77 - tpm: Issue a TPM2_Shutdown for TPM2 devices.
78 - tpm: fix a kernel memory leak in tpm-sysfs.c
79 - powerpc/powernv: Fix CPU_HOTPLUG=n idle.c compile error
80 - x86/uaccess: Optimize copy_user_enhanced_fast_string() for short strings
81 - sched/fair, cpumask: Export for_each_cpu_wrap()
82 - sched/core: Implement new approach to scale select_idle_cpu()
83 - sched/numa: Use down_read_trylock() for the mmap_sem
84 - sched/numa: Override part of migrate_degrades_locality() when idle balancing
85 - sched/fair: Simplify wake_affine() for the single socket case
86 - sched/numa: Implement NUMA node level wake_affine()
87 - sched/fair: Remove effective_load()
88 - sched/numa: Hide numa_wake_affine() from UP build
89 - xen: avoid deadlock in xenbus driver
90 - crypto: drbg - Fixes panic in wait_for_completion call
91 - Linux 4.12.1
92
93 * cxlflash update request in the Xenial SRU stream (LP: #1702521)
94 - scsi: cxlflash: Combine the send queue locks
95 - scsi: cxlflash: Update cxlflash_afu_sync() to return errno
96 - scsi: cxlflash: Reset hardware queue context via specified register
97 - scsi: cxlflash: Schedule asynchronous reset of the host
98 - scsi: cxlflash: Handle AFU sync failures
99 - scsi: cxlflash: Track pending scsi commands in each hardware queue
100 - scsi: cxlflash: Flush pending commands in cleanup path
101 - scsi: cxlflash: Add scsi command abort handler
102 - scsi: cxlflash: Create character device to provide host management interface
103 - scsi: cxlflash: Separate AFU internal command handling from AFU sync
104 specifics
105 - scsi: cxlflash: Introduce host ioctl support
106 - scsi: cxlflash: Refactor AFU capability checking
107 - scsi: cxlflash: Support LUN provisioning
108 - scsi: cxlflash: Support AFU debug
109 - scsi: cxlflash: Support WS16 unmap
110 - scsi: cxlflash: Remove zeroing of private command data
111 - scsi: cxlflash: Update TMF command processing
112 - scsi: cxlflash: Avoid double free of character device
113 - scsi: cxlflash: Update send_tmf() parameters
114 - scsi: cxlflash: Update debug prints in reset handlers
115
116 * make snap-pkg support (LP: #1700747)
117 - make snap-pkg support
118
119 * Quirk for non-compliant PCI bridge on HiSilicon D05 board (LP: #1698706)
120 - SAUCE: PCI: Support hibmc VGA cards behind a misbehaving HiSilicon bridge
121
122 * arm64: fix crash reading /proc/kcore (LP: #1702749)
123 - fs/proc: kcore: use kcore_list type to check for vmalloc/module address
124 - arm64: mm: select CONFIG_ARCH_PROC_KCORE_TEXT
125
126 * Opal and POWER9 DD2 (LP: #1702159)
127 - SAUCE: powerpc/powernv: Tell OPAL about our MMU mode on POWER9
128
129 * Data corruption with hio driver (LP: #1701316)
130 - SAUCE: hio: Fix incorrect use of enum req_opf values
131
132 * Miscellaneous Ubuntu changes
133 - SAUCE: (noup) Update spl to 0.6.5.10-1, zfs to 0.6.5.10-1ubuntu2
134 - snapcraft.yaml: Sync with xenial
135 - [Config] CONFIG_CAVIUM_ERRATUM_30115=y
136
137 * Miscellaneous upstream changes
138 - Revert "UBUNTU: SAUCE: (efi-lockdown) efi: Add sysctls for secureboot and
139 MokSBState"
140
141 -- Seth Forshee <seth.forshee@canonical.com> Fri, 14 Jul 2017 15:25:41 -0500
142
143 linux (4.12.0-6.7) artful; urgency=low
144
145 * update ENA driver to 1.2.0k from net-next (LP: #1701575)
146 - net: ena: change return value for unsupported features unsupported return
147 value
148 - net: ena: add hardware hints capability to the driver
149 - net: ena: change sizeof() argument to be the type pointer
150 - net: ena: add reset reason for each device FLR
151 - net: ena: add support for out of order rx buffers refill
152 - net: ena: allow the driver to work with small number of msix vectors
153 - net: ena: use napi_schedule_irqoff when possible
154 - net: ena: separate skb allocation to dedicated function
155 - net: ena: use lower_32_bits()/upper_32_bits() to split dma address
156 - net: ena: update driver's rx drop statistics
157 - net: ena: update ena driver to version 1.2.0
158
159 * APST gets enabled against explicit kernel option (LP: #1699004)
160 - nvme: explicitly disable APST on quirked devices
161
162 * Miscellaneous Ubuntu changes
163 - SAUCE: hio: Update to Huawei ES3000_V2 (2.1.0.40)
164 - SAUCE: hio updates for 4.12
165 - SAUCE: Enable hio build
166
167 -- Seth Forshee <seth.forshee@canonical.com> Wed, 05 Jul 2017 14:23:20 -0500
168
169 linux (4.12.0-5.6) artful; urgency=low
170
171 * ERAT invalidate on context switch removal (LP: #1700819)
172 - powerpc: Only do ERAT invalidate on radix context switch on P9 DD1
173
174 * powerpc: Invalidate ERAT on powersave wakeup for POWER9 (LP: #1700521)
175 - SAUCE: powerpc: Invalidate ERAT on powersave wakeup for POWER9
176
177 * Miscellaneous Ubuntu changes
178 - d-i: Move qcom-emac from arm64 to shared nic-modules
179
180 [ Upstream Kernel Changes ]
181
182 * Rebase to v4.12
183
184 -- Seth Forshee <seth.forshee@canonical.com> Mon, 03 Jul 2017 07:52:02 -0500
185
186 linux (4.12.0-4.5) artful; urgency=low
187
188 * aacraid driver may return uninitialized stack data to userspace
189 (LP: #1700077)
190 - SAUCE: scsi: aacraid: Don't copy uninitialized stack memory to userspace
191
192 * KILLER1435-S[0489:e0a2] BT cannot search BT 4.0 device (LP: #1699651)
193 - Bluetooth: btusb: Add support for 0489:e0a2 QCA_ROME device
194
195 * AACRAID for power9 platform (LP: #1689980)
196 - scsi: aacraid: Remove __GFP_DMA for raw srb memory
197 - scsi: aacraid: Fix DMAR issues with iommu=pt
198 - scsi: aacraid: Added 32 and 64 queue depth for arc natives
199 - scsi: aacraid: Set correct Queue Depth for HBA1000 RAW disks
200 - scsi: aacraid: Remove reset support from check_health
201 - scsi: aacraid: Change wait time for fib completion
202 - scsi: aacraid: Log count info of scsi cmds before reset
203 - scsi: aacraid: Print ctrl status before eh reset
204 - scsi: aacraid: Using single reset mask for IOP reset
205 - scsi: aacraid: Rework IOP reset
206 - scsi: aacraid: Add periodic checks to see IOP reset status
207 - scsi: aacraid: Rework SOFT reset code
208 - scsi: aacraid: Rework aac_src_restart
209 - scsi: aacraid: Use correct function to get ctrl health
210 - scsi: aacraid: Make sure ioctl returns on controller reset
211 - scsi: aacraid: Enable ctrl reset for both hba and arc
212 - scsi: aacraid: Add reset debugging statements
213 - scsi: aacraid: Remove reference to Series-9
214 - scsi: aacraid: Update driver version to 50834
215
216 * hibmc driver does not include "pci:" prefix in bus ID (LP: #1698700)
217 - SAUCE: drm: hibmc: Use set_busid function from drm core
218
219 * HiSilicon D05: installer doesn't appear on VGA (LP: #1698954)
220 - d-i: Add hibmc-drm to kernel-image udeb
221
222 * Fix /proc/cpuinfo revision for POWER9 DD2 (LP: #1698844)
223 - SAUCE: powerpc: Fix /proc/cpuinfo revision for POWER9 DD2
224
225 * Miscellaneous Ubuntu changes
226 - [Config] CONFIG_SATA_MV=n and CONFIG_GENERIC_PHY=n for s390x
227 - [Config] CONFIG_ATA=n for s390x
228 - [Config] Update annotations for 4.12
229
230 [ Upstream Kernel Changes ]
231
232 * Rebase to v4.12-rc7
233
234 -- Seth Forshee <seth.forshee@canonical.com> Mon, 26 Jun 2017 11:27:29 -0500
235
236 linux (4.12.0-3.4) artful; urgency=low
237
238 * Miscellaneous upstream changes
239 - ufs: fix the logics for tail relocation
240
241 [ Upstream Kernel Changes ]
242
243 * Rebase to v4.12-rc6
244
245 -- Seth Forshee <seth.forshee@canonical.com> Mon, 19 Jun 2017 14:50:39 -0500
246
247 linux (4.12.0-2.3) artful; urgency=low
248
249 * CVE-2014-9900
250 - SAUCE: (no-up) net: Zeroing the structure ethtool_wolinfo in
251 ethtool_get_wol()
252
253 * System doesn't boot properly on Gigabyte AM4 motherboards (AMD Ryzen)
254 (LP: #1671360)
255 - pinctrl/amd: Use regular interrupt instead of chained
256
257 * extend-diff-ignore should use exact matches (LP: #1693504)
258 - [Packaging] exact extend-diff-ignore matches
259
260 * Miscellaneous Ubuntu changes
261 - SAUCE: efi: Don't print secure boot state from the efi stub
262 - ubuntu: vbox -- Update to 5.1.22-dfsg-1
263 - SAUCE: vbox fixes for 4.12
264 - Re-enable virtualbox build
265 - [Config] CONFIG_ORANGEFS_FS=m
266 - SAUCE: (noup) Update spl to 0.6.5.9-1ubuntu2, zfs to 0.6.5.9-5ubuntu7
267 - Enable zfs build
268
269 [ Upstream Kernel Changes ]
270
271 * Rebase to v4.12-rc4
272 * Rebase to v4.12-rc5
273
274 -- Seth Forshee <seth.forshee@canonical.com> Sun, 11 Jun 2017 22:25:13 -0500
275
276 linux (4.12.0-1.2) artful; urgency=low
277
278 * Enable Matrox driver for Ubuntu 16.04.3 (LP: #1693337)
279 - [Config] Enable CONFIG_DRM_MGAG200 as module
280
281 * Support low-pin-count devices on Hisilicon SoCs (LP: #1677319)
282 - [Config] CONFIG_LIBIO=y on arm64 only
283 - SAUCE: LIBIO: Introduce a generic PIO mapping method
284 - SAUCE: OF: Add missing I/O range exception for indirect-IO devices
285 - [Config] CONFIG_HISILICON_LPC=y
286 - SAUCE: LPC: Support the device-tree LPC host on Hip06/Hip07
287 - SAUCE: LIBIO: Support the dynamically logical PIO registration of ACPI host
288 I/O
289 - SAUCE: LPC: Add the ACPI LPC support
290 - SAUCE: PCI: Apply the new generic I/O management on PCI IO hosts
291 - SAUCE: PCI: Restore codepath for !CONFIG_LIBIO
292
293 * POWER9: Additional patches for TTY and CPU_IDLE (LP: #1674325)
294 - SAUCE: tty: Fix ldisc crash on reopened tty
295
296 * Miscellaneous Ubuntu changes
297 - [Debian] Add build-dep on libnuma-dev to enable 'perf bench numa'
298 - Rebase to v4.12-rc3
299
300 [ Upstream Kernel Changes ]
301
302 * Rebase to v4.12-rc3
303
304 -- Seth Forshee <seth.forshee@canonical.com> Mon, 29 May 2017 20:56:29 -0500
305
306 linux (4.12.0-0.1) artful; urgency=low
307
308 * please enable CONFIG_ARM64_LSE_ATOMICS (LP: #1691614)
309 - [Config] CONFIG_ARM64_LSE_ATOMICS=y
310
311 * [Regression] NUMA_BALANCING disabled on arm64 (LP: #1690914)
312 - [Config] CONFIG_NUMA_BALANCING{,_DEFAULT_ENABLED}=y on arm64
313
314 * exec'ing a setuid binary from a threaded program sometimes fails to setuid
315 (LP: #1672819)
316 - SAUCE: exec: ensure file system accounting in check_unsafe_exec is correct
317
318 * Miscellaneous Ubuntu changes
319 - Update find-missing-sauce.sh to compare to artful
320 - Update dropped.txt
321 - SAUCE: (efi-lockdown) efi: Add EFI_SECURE_BOOT bit
322 - SAUCE: (efi-lockdown) Add the ability to lock down access to the running
323 kernel image
324 - SAUCE: (efi-lockdown) efi: Lock down the kernel if booted in secure boot
325 mode
326 - SAUCE: (efi-lockdown) Enforce module signatures if the kernel is locked down
327 - SAUCE: (efi-lockdown) Restrict /dev/mem and /dev/kmem when the kernel is
328 locked down
329 - SAUCE: (efi-lockdown) Add a sysrq option to exit secure boot mode
330 - SAUCE: (efi-lockdown) kexec: Disable at runtime if the kernel is locked down
331 - SAUCE: (efi-lockdown) Copy secure_boot flag in boot params across kexec
332 reboot
333 - SAUCE: (efi-lockdown) kexec_file: Disable at runtime if securelevel has been
334 set
335 - SAUCE: (efi-lockdown) hibernate: Disable when the kernel is locked down
336 - SAUCE: (efi-lockdown) uswsusp: Disable when the kernel is locked down
337 - SAUCE: (efi-lockdown) PCI: Lock down BAR access when the kernel is locked
338 down
339 - SAUCE: (efi-lockdown) x86: Lock down IO port access when the kernel is
340 locked down
341 - SAUCE: (efi-lockdown) x86: Restrict MSR access when the kernel is locked
342 down
343 - SAUCE: (efi-lockdown) asus-wmi: Restrict debugfs interface when the kernel
344 is locked down
345 - SAUCE: (efi-lockdown) ACPI: Limit access to custom_method when the kernel is
346 locked down
347 - SAUCE: (efi-lockdown) acpi: Ignore acpi_rsdp kernel param when the kernel
348 has been locked down
349 - SAUCE: (efi-lockdown) acpi: Disable ACPI table override if the kernel is
350 locked down
351 - SAUCE: (efi-lockdown) acpi: Disable APEI error injection if the kernel is
352 locked down
353 - SAUCE: (efi-lockdown) Enable cold boot attack mitigation
354 - SAUCE: (efi-lockdown) bpf: Restrict kernel image access functions when the
355 kernel is locked down
356 - SAUCE: (efi-lockdown) scsi: Lock down the eata driver
357 - SAUCE: (efi-lockdown) Prohibit PCMCIA CIS storage when the kernel is locked
358 down
359 - SAUCE: (efi-lockdown) Lock down TIOCSSERIAL
360 - SAUCE: (efi-lockdown) KEYS: Allow unrestricted boot-time addition of keys to
361 secondary keyring
362 - SAUCE: (efi-lockdown) efi: Add EFI signature data types
363 - SAUCE: (efi-lockdown) efi: Add an EFI signature blob parser
364 - SAUCE: (efi-lockdown) MODSIGN: Import certificates from UEFI Secure Boot
365 - SAUCE: (efi-lockdown) MODSIGN: Allow the "db" UEFI variable to be suppressed
366 - SAUCE: (efi-lockdown) efi: Sanitize boot_params in efi stub
367 - SAUCE: (efi-lockdown) efi: Add secure_boot state and status bit for
368 MokSBState
369 - SAUCE: (efi-lockdown) efi: Add sysctls for secureboot and MokSBState
370 - [Config] Set values for UEFI secure boot lockdown options
371 - Disable virtualbox build
372 - Disable hio build
373 - SAUCE: securityfs: Replace CURRENT_TIME with current_time()
374 - Disable zfs build
375 - [Debian] Work out upstream tag for use with gen-auto-reconstruct
376 - SAUCE: Import aufs driver
377 - SAUCE: aufs -- Include linux/mm.h in fs/aufs/file.h
378 - [Config] Enable aufs
379 - SAUCE: perf callchain: Include errno.h on x86 unconditinally
380
381 [ Upstream Kernel Changes ]
382
383 * Rebase to v4.12-rc2
384
385 -- Seth Forshee <seth.forshee@canonical.com> Sun, 21 May 2017 23:44:44 -0500
386
387 linux (4.11.0-3.8) artful; urgency=low
388
389 [ Seth Forshee ]
390
391 * Release Tracking Bug
392 - LP: #1690999
393
394 * apparmor_parser hangs indefinitely when called by multiple threads
395 (LP: #1645037)
396 - SAUCE: apparmor: fix lock ordering for mkdir
397
398 * apparmor leaking securityfs pin count (LP: #1660846)
399 - SAUCE: apparmor: fix leak on securityfs pin count
400
401 * apparmor reference count leak when securityfs_setup_d_inode\ () fails
402 (LP: #1660845)
403 - SAUCE: apparmor: fix reference count leak when securityfs_setup_d_inode()
404 fails
405
406 * apparmor not checking error if security_pin_fs() fails (LP: #1660842)
407 - SAUCE: apparmor: fix not handling error case when securityfs_pin_fs() fails
408
409 * libvirt profile is blocking global setrlimit despite having no rlimit rule
410 (LP: #1679704)
411 - SAUCE: apparmor: fix complain mode failure for rlimit mediation
412 - apparmor: update auditing of rlimit check to provide capability information
413
414 * apparmor: does not provide a way to detect policy updataes (LP: #1678032)
415 - SAUCE: apparmor: add policy revision file interface
416
417 * apparmor does not make support of query data visible (LP: #1678023)
418 - SAUCE: apparmor: add label data availability to the feature set
419
420 * apparmor query interface does not make supported query info available
421 (LP: #1678030)
422 - SAUCE: apparmor: add information about the query inteface to the feature set
423
424 * change_profile incorrect when using namespaces with a compound stack
425 (LP: #1677959)
426 - SAUCE: apparmor: fix label parse for stacked labels
427
428 * Regression in 4.4.0-65-generic causes very frequent system crashes
429 (LP: #1669611)
430 - apparmor: sync of apparmor 3.6+ (17.04)
431
432 * Artful update to 4.11.1 stable release (LP: #1690814)
433 - dm ioctl: prevent stack leak in dm ioctl call
434 - drm/sti: fix GDP size to support up to UHD resolution
435 - power: supply: lp8788: prevent out of bounds array access
436 - brcmfmac: Ensure pointer correctly set if skb data location changes
437 - brcmfmac: Make skb header writable before use
438 - sparc64: fix fault handling in NGbzero.S and GENbzero.S
439 - refcount: change EXPORT_SYMBOL markings
440 - net: macb: fix phy interrupt parsing
441 - tcp: fix access to sk->sk_state in tcp_poll()
442 - geneve: fix incorrect setting of UDP checksum flag
443 - bpf: enhance verifier to understand stack pointer arithmetic
444 - bpf, arm64: fix jit branch offset related to ldimm64
445 - tcp: fix wraparound issue in tcp_lp
446 - net: ipv6: Do not duplicate DAD on link up
447 - net: usb: qmi_wwan: add Telit ME910 support
448 - tcp: do not inherit fastopen_req from parent
449 - ipv4, ipv6: ensure raw socket message is big enough to hold an IP header
450 - rtnetlink: NUL-terminate IFLA_PHYS_PORT_NAME string
451 - ipv6: initialize route null entry in addrconf_init()
452 - ipv6: reorder ip6_route_dev_notifier after ipv6_dev_notf
453 - tcp: randomize timestamps on syncookies
454 - bnxt_en: allocate enough space for ->ntp_fltr_bmap
455 - bpf: don't let ldimm64 leak map addresses on unprivileged
456 - net: mdio-mux: bcm-iproc: call mdiobus_free() in error path
457 - f2fs: sanity check segment count
458 - xen/arm,arm64: fix xen_dma_ops after 815dd18 "Consolidate get_dma_ops..."
459 - xen: Revert commits da72ff5bfcb0 and 72a9b186292d
460 - block: get rid of blk_integrity_revalidate()
461 - Linux 4.11.1
462
463 * Module signing exclusion for staging drivers does not work properly
464 (LP: #1690908)
465 - SAUCE: Fix module signing exclusion in package builds
466
467 * perf: qcom: Add L3 cache PMU driver (LP: #1689856)
468 - [Config] CONFIG_QCOM_L3_PMU=y
469 - perf: qcom: Add L3 cache PMU driver
470
471 * No PMU support for ACPI-based arm64 systems (LP: #1689661)
472 - drivers/perf: arm_pmu: rework per-cpu allocation
473 - drivers/perf: arm_pmu: manage interrupts per-cpu
474 - drivers/perf: arm_pmu: split irq request from enable
475 - drivers/perf: arm_pmu: remove pointless PMU disabling
476 - drivers/perf: arm_pmu: define armpmu_init_fn
477 - drivers/perf: arm_pmu: fold init into alloc
478 - drivers/perf: arm_pmu: factor out pmu registration
479 - drivers/perf: arm_pmu: simplify cpu_pmu_request_irqs()
480 - drivers/perf: arm_pmu: handle no platform_device
481 - drivers/perf: arm_pmu: rename irq request/free functions
482 - drivers/perf: arm_pmu: split cpu-local irq request/free
483 - drivers/perf: arm_pmu: move irq request/free into probe
484 - drivers/perf: arm_pmu: split out platform device probe logic
485 - arm64: add function to get a cpu's MADT GICC table
486 - [Config] CONFIG_ARM_PMU_ACPI=y
487 - drivers/perf: arm_pmu: add ACPI framework
488 - arm64: pmuv3: handle !PMUv3 when probing
489 - arm64: pmuv3: use arm_pmu ACPI framework
490
491 * Fix NVLINK2 TCE route (LP: #1690155)
492 - powerpc/powernv: Fix TCE kill on NVLink2
493
494 * CVE-2017-0605
495 - tracing: Use strlcpy() instead of strcpy() in __trace_find_cmdline()
496
497 * Miscellaneous Ubuntu changes
498 - [Config] Restore powerpc arch to annotations file
499 - [Config] Disable runtime testing modules
500 - [Config] Disable drivers not needed on s390x
501 - [Config] Update annotations for 4.11
502 - [Config] updateconfigs after apparmor updates
503
504 * Miscellaneous upstream changes
505 - apparmor: use SHASH_DESC_ON_STACK
506 - apparmor: fix invalid reference to index variable of iterator line 836
507 - apparmor: fix parameters so that the permission test is bypassed at boot
508 - apparmor: Make path_max parameter readonly
509 - apparmorfs: Combine two function calls into one in aa_fs_seq_raw_abi_show()
510 - apparmorfs: Use seq_putc() in two functions
511 - apparmor: provide information about path buffer size at boot
512 - apparmor: add/use fns to print hash string hex value
513
514 -- Seth Forshee <seth.forshee@canonical.com> Tue, 16 May 2017 00:39:13 -0500
515
516 linux (4.11.0-2.7) artful; urgency=low
517
518 * kernel-wedge fails in artful due to leftover squashfs-modules d-i files
519 (LP: #1688259)
520 - Remove squashfs-modules files from d-i
521 - [Config] as squashfs-modules is builtin kernel-image must Provides: it
522
523 * [Zesty] d-i: replace msm_emac with qcom_emac (LP: #1677297)
524 - Revert "UBUNTU: d-i: initrd needs msm_emac on amberwing platform."
525 - d-i: initrd needs qcom_emac on amberwing platform.
526
527 * update for V3 kernel bits and improved multiple fan slice support
528 (LP: #1470091)
529 - SAUCE: fan: tunnel multiple mapping mode (v3)
530
531 * Miscellaneous Ubuntu changes
532 - SAUCE: (noup) Update spl to 0.6.5.9-1ubuntu1, zfs to 0.6.5.9-5ubuntu5
533 - Enable zfs
534 - SAUCE: fan: add VXLAN implementation
535 - SAUCE: (efi-lockdown) efi: Add EFI_SECURE_BOOT bit
536 - SAUCE: (efi-lockdown) Add the ability to lock down access to the running
537 kernel image
538 - SAUCE: (efi-lockdown) efi: Lock down the kernel if booted in secure boot
539 mode
540 - SAUCE: (efi-lockdown) Enforce module signatures if the kernel is locked down
541 - SAUCE: (efi-lockdown) Restrict /dev/mem and /dev/kmem when the kernel is
542 locked down
543 - SAUCE: (efi-lockdown) Add a sysrq option to exit secure boot mode
544 - SAUCE: (efi-lockdown) kexec: Disable at runtime if the kernel is locked down
545 - SAUCE: (efi-lockdown) Copy secure_boot flag in boot params across kexec
546 reboot
547 - SAUCE: (efi-lockdown) kexec_file: Disable at runtime if securelevel has been
548 set
549 - SAUCE: (efi-lockdown) hibernate: Disable when the kernel is locked down
550 - SAUCE: (efi-lockdown) uswsusp: Disable when the kernel is locked down
551 - SAUCE: (efi-lockdown) PCI: Lock down BAR access when the kernel is locked
552 down
553 - SAUCE: (efi-lockdown) x86: Lock down IO port access when the kernel is
554 locked down
555 - SAUCE: (efi-lockdown) x86: Restrict MSR access when the kernel is locked
556 down
557 - SAUCE: (efi-lockdown) asus-wmi: Restrict debugfs interface when the kernel
558 is locked down
559 - SAUCE: (efi-lockdown) ACPI: Limit access to custom_method when the kernel is
560 locked down
561 - SAUCE: (efi-lockdown) acpi: Ignore acpi_rsdp kernel param when the kernel
562 has been locked down
563 - SAUCE: (efi-lockdown) acpi: Disable ACPI table override if the kernel is
564 locked down
565 - SAUCE: (efi-lockdown) acpi: Disable APEI error injection if the kernel is
566 locked down
567 - SAUCE: (efi-lockdown) Enable cold boot attack mitigation
568 - SAUCE: (efi-lockdown) bpf: Restrict kernel image access functions when the
569 kernel is locked down
570 - SAUCE: (efi-lockdown) scsi: Lock down the eata driver
571 - SAUCE: (efi-lockdown) Prohibit PCMCIA CIS storage when the kernel is locked
572 down
573 - SAUCE: (efi-lockdown) Lock down TIOCSSERIAL
574 - SAUCE: (efi-lockdown) Add EFI signature data types
575 - SAUCE: (efi-lockdown) Add an EFI signature blob parser and key loader.
576 - SAUCE: (efi-lockdown) KEYS: Add a system blacklist keyring
577 - SAUCE: (efi-lockdown) MODSIGN: Import certificates from UEFI Secure Boot
578 - SAUCE: (efi-lockdown) MODSIGN: Support not importing certs from db
579 - SAUCE: (efi-lockdown) MODSIGN: Don't try secure boot if EFI runtime is
580 disabled
581 - SAUCE: (efi-lockdown) efi: Sanitize boot_params in efi stub
582 - SAUCE: (efi-lockdown) efi: Add secure_boot state and status bit for
583 MokSBState
584 - SAUCE: (efi-lockdown) efi: Add sysctls for secureboot and MokSBState
585 - [Config] Set values for UEFI secure boot lockdown options
586 - Update dropped.txt
587
588 [ Upstream Kernel Changes ]
589
590 * rebase to v4.11
591
592 -- Seth Forshee <seth.forshee@canonical.com> Fri, 05 May 2017 07:43:14 -0500
593
594 linux (4.11.0-1.6) artful; urgency=low
595
596 * Miscellaneous Ubuntu changes
597 - [Debian] Use default compression for all packages
598 - SAUCE: (namespace) block_dev: Support checking inode permissions in
599 lookup_bdev()
600 - SAUCE: (namespace) block_dev: Check permissions towards block device inode
601 when mounting
602 - SAUCE: (namespace) mtd: Check permissions towards mtd block device inode
603 when mounting
604 - SAUCE: (namespace) fs: Allow superblock owner to change ownership of inodes
605 - SAUCE: (namespace) fs: Don't remove suid for CAP_FSETID for userns root
606 - SAUCE: (namespace) fs: Allow superblock owner to access do_remount_sb()
607 - SAUCE: (namespace) capabilities: Allow privileged user in s_user_ns to set
608 security.* xattrs
609 - SAUCE: (namespace) fs: Allow CAP_SYS_ADMIN in s_user_ns to freeze and thaw
610 filesystems
611 - SAUCE: (namespace) fuse: Add support for pid namespaces
612 - SAUCE: (namespace) fuse: Support fuse filesystems outside of init_user_ns
613 - SAUCE: (namespace) fuse: Restrict allow_other to the superblock's namespace
614 or a descendant
615 - SAUCE: (namespace) fuse: Allow user namespace mounts
616 - SAUCE: (namespace) ext4: Add support for unprivileged mounts from user
617 namespaces
618 - SAUCE: (namespace) evm: Don't update hmacs in user ns mounts
619 - SAUCE: (namespace) ext4: Add module parameter to enable user namespace
620 mounts
621 - SAUCE: (namespace) block_dev: Forbid unprivileged mounting when device is
622 opened for writing
623
624 -- Seth Forshee <seth.forshee@canonical.com> Wed, 26 Apr 2017 10:08:29 -0500
625
626 linux (4.11.0-0.5) artful; urgency=low
627
628 * [Hyper-V][SAUCE] pci-hyperv: Use only 16 bit integer for PCI domain
629 (LP: #1684971)
630 - SAUCE: pci-hyperv: Use only 16 bit integer for PCI domain
631
632 * [Hyper-V] Ubuntu 14.04.2 LTS Generation 2 SCSI Errors on VSS Based Backups
633 (LP: #1470250)
634 - SAUCE: Tools: hv: vss: Thaw the filesystem and continue after freeze fails
635
636 * Enable virtual scsi server driver for Power (LP: #1615665)
637 - SAUCE: Return TCMU-generated sense data to fabric module
638
639 * include/linux/security.h header syntax error with !CONFIG_SECURITYFS
640 (LP: #1630990)
641 - SAUCE: (no-up) include/linux/security.h -- fix syntax error with
642 CONFIG_SECURITYFS=n
643
644 * Miscellaneous Ubuntu changes
645 - SAUCE: Import aufs driver
646 - [Config] Enable aufs
647 - [Debian] Add script to update virtualbox
648 - ubuntu: vbox -- Update to 5.1.20-dfsg-2
649 - Enable vbox
650 - SAUCE: aufs -- Include linux/mm.h in fs/aufs/file.h
651
652 [ Upstream Kernel Changes ]
653
654 * rebase to v4.11-rc8
655
656 -- Seth Forshee <seth.forshee@canonical.com> Tue, 25 Apr 2017 13:42:54 -0500
657
658 linux (4.11.0-0.4) zesty; urgency=low
659
660 * POWER9: Improve performance on memory management (LP: #1681429)
661 - SAUCE: powerpc/mm/radix: Don't do page walk cache flush when doing full mm
662 flush
663 - SAUCE: powerpc/mm/radix: Remove unnecessary ptesync
664
665 * Miscellaneous Ubuntu changes
666 - find-missing-sauce.sh
667
668 [ Upstream Kernel Changes ]
669
670 * rebase to v4.11-rc7
671
672 -- Seth Forshee <seth.forshee@canonical.com> Tue, 18 Apr 2017 08:19:43 -0500
673
674 linux (4.11.0-0.3) zesty; urgency=low
675
676 * Disable CONFIG_HVC_UDBG on ppc64el (LP: #1680888)
677 - [Config] Disable CONFIG_HVC_UDBG on ppc64el
678
679 * smartpqi driver needed in initram disk and installer (LP: #1680156)
680 - [Config] Add smartpqi to d-i
681
682 * Disable CONFIG_SECURITY_SELINUX_DISABLE (LP: #1680315)
683 - [Config] CONFIG_SECURITY_SELINUX_DISABLE=n
684
685 * Miscellaneous Ubuntu changes
686 - [Config] flash-kernel should be a Breaks
687 - [Config] drop the info directory
688 - [Config] drop NOTES as obsolete
689 - [Config] drop changelog.historical as obsolete
690 - rebase to v4.11-rc6
691
692 [ Upstream Kernel Changes ]
693
694 * rebase to v4.11-rc6
695
696 -- Tim Gardner <tim.gardner@canonical.com> Tue, 11 Apr 2017 07:16:52 -0600
697
698 linux (4.11.0-0.2) zesty; urgency=low
699
700 [ Upstream Kernel Changes ]
701
702 * rebase to v4.11-rc5
703
704 -- Tim Gardner <tim.gardner@canonical.com> Mon, 03 Apr 2017 08:26:07 +0100
705
706 linux (4.11.0-0.1) zesty; urgency=low
707
708 [ Upstream Kernel Changes ]
709
710 * rebase to v4.11-rc4
711 - LP: #1591053
712
713 -- Tim Gardner <tim.gardner@canonical.com> Mon, 20 Mar 2017 05:15:32 -0600
714
715 linux (4.11.0-0.0) zesty; urgency=low
716
717 * dummy entry
718
719 -- Tim Gardner <tim.gardner@canonical.com> Mon, 20 Mar 2017 05:15:32 -0600