]> git.proxmox.com Git - mirror_ubuntu-artful-kernel.git/blob - debian.master/changelog
UBUNTU: Ubuntu-4.13.0-2.3
[mirror_ubuntu-artful-kernel.git] / debian.master / changelog
1 linux (4.13.0-2.3) artful; urgency=low
2
3 * Change CONFIG_IBMVETH to module (LP: #1704479)
4 - [Config] CONFIG_IBMVETH=m
5
6 [ Upstream Kernel Changes ]
7
8 * Rebase to v4.13-rc2
9
10 -- Seth Forshee <seth.forshee@canonical.com> Mon, 24 Jul 2017 13:58:08 -0500
11
12 linux (4.13.0-1.2) artful; urgency=low
13
14 * Miscellaneous Ubuntu changes
15 - [Debian] Support sphinx-based kernel documentation
16
17 -- Seth Forshee <seth.forshee@canonical.com> Thu, 20 Jul 2017 09:18:33 -0500
18
19 linux (4.13.0-0.1) artful; urgency=low
20
21 * Miscellaneous Ubuntu changes
22 - Disable hio
23 - Disable zfs build
24 - ubuntu: vbox -- update to 5.1.24-dfsg-1
25
26 [ Upstream Kernel Changes ]
27
28 * Rebase to v4.13-rc1
29
30 -- Seth Forshee <seth.forshee@canonical.com> Wed, 19 Jul 2017 15:09:31 -0500
31
32 linux (4.12.0-7.8) artful; urgency=low
33
34 * ThunderX: soft lockup on 4.8+ kernels when running qemu-efi with vhost=on
35 (LP: #1673564)
36 - arm64: Add a facility to turn an ESR syndrome into a sysreg encoding
37 - KVM: arm/arm64: vgic-v3: Add accessors for the ICH_APxRn_EL2 registers
38 - KVM: arm64: Make kvm_condition_valid32() accessible from EL2
39 - KVM: arm64: vgic-v3: Add hook to handle guest GICv3 sysreg accesses at EL2
40 - KVM: arm64: vgic-v3: Add ICV_BPR1_EL1 handler
41 - KVM: arm64: vgic-v3: Add ICV_IGRPEN1_EL1 handler
42 - KVM: arm64: vgic-v3: Add ICV_IAR1_EL1 handler
43 - KVM: arm64: vgic-v3: Add ICV_EOIR1_EL1 handler
44 - KVM: arm64: vgic-v3: Add ICV_AP1Rn_EL1 handler
45 - KVM: arm64: vgic-v3: Add ICV_HPPIR1_EL1 handler
46 - KVM: arm64: vgic-v3: Enable trapping of Group-1 system registers
47 - KVM: arm64: Enable GICv3 Group-1 sysreg trapping via command-line
48 - KVM: arm64: vgic-v3: Add ICV_BPR0_EL1 handler
49 - KVM: arm64: vgic-v3: Add ICV_IGNREN0_EL1 handler
50 - KVM: arm64: vgic-v3: Add misc Group-0 handlers
51 - KVM: arm64: vgic-v3: Enable trapping of Group-0 system registers
52 - KVM: arm64: Enable GICv3 Group-0 sysreg trapping via command-line
53 - arm64: Add MIDR values for Cavium cn83XX SoCs
54 - arm64: Add workaround for Cavium Thunder erratum 30115
55 - KVM: arm64: vgic-v3: Add ICV_DIR_EL1 handler
56 - KVM: arm64: vgic-v3: Add ICV_RPR_EL1 handler
57 - KVM: arm64: vgic-v3: Add ICV_CTLR_EL1 handler
58 - KVM: arm64: vgic-v3: Add ICV_PMR_EL1 handler
59 - KVM: arm64: Enable GICv3 common sysreg trapping via command-line
60 - KVM: arm64: vgic-v3: Log which GICv3 system registers are trapped
61 - KVM: arm64: Log an error if trapping a read-from-write-only GICv3 access
62 - KVM: arm64: Log an error if trapping a write-to-read-only GICv3 access
63
64 * hns: under heavy load, NIC may fail and require reboot (LP: #1704146)
65 - net: hns: Bugfix for Tx timeout handling in hns driver
66
67 * New ACPI identifiers for ThunderX SMMU (LP: #1703437)
68 - iommu/arm-smmu: Plumb in new ACPI identifiers
69
70 * Transparent hugepages should default to enabled=madvise (LP: #1703742)
71 - SAUCE: use CONFIG_TRANSPARENT_HUGEPAGE_MADVISE=y as default
72
73 * Artful update to v4.12.1 stable release (LP: #1703858)
74 - driver core: platform: fix race condition with driver_override
75 - RDMA/uverbs: Check port number supplied by user verbs cmds
76 - usb: dwc3: replace %p with %pK
77 - USB: serial: cp210x: add ID for CEL EM3588 USB ZigBee stick
78 - usb: usbip: set buffer pointers to NULL after free
79 - Add USB quirk for HVR-950q to avoid intermittent device resets
80 - usb: Fix typo in the definition of Endpoint[out]Request
81 - USB: core: fix device node leak
82 - USB: serial: option: add two Longcheer device ids
83 - USB: serial: qcserial: new Sierra Wireless EM7305 device ID
84 - xhci: Limit USB2 port wake support for AMD Promontory hosts
85 - gfs2: Fix glock rhashtable rcu bug
86 - Add "shutdown" to "struct class".
87 - tpm: Issue a TPM2_Shutdown for TPM2 devices.
88 - tpm: fix a kernel memory leak in tpm-sysfs.c
89 - powerpc/powernv: Fix CPU_HOTPLUG=n idle.c compile error
90 - x86/uaccess: Optimize copy_user_enhanced_fast_string() for short strings
91 - sched/fair, cpumask: Export for_each_cpu_wrap()
92 - sched/core: Implement new approach to scale select_idle_cpu()
93 - sched/numa: Use down_read_trylock() for the mmap_sem
94 - sched/numa: Override part of migrate_degrades_locality() when idle balancing
95 - sched/fair: Simplify wake_affine() for the single socket case
96 - sched/numa: Implement NUMA node level wake_affine()
97 - sched/fair: Remove effective_load()
98 - sched/numa: Hide numa_wake_affine() from UP build
99 - xen: avoid deadlock in xenbus driver
100 - crypto: drbg - Fixes panic in wait_for_completion call
101 - Linux 4.12.1
102
103 * cxlflash update request in the Xenial SRU stream (LP: #1702521)
104 - scsi: cxlflash: Combine the send queue locks
105 - scsi: cxlflash: Update cxlflash_afu_sync() to return errno
106 - scsi: cxlflash: Reset hardware queue context via specified register
107 - scsi: cxlflash: Schedule asynchronous reset of the host
108 - scsi: cxlflash: Handle AFU sync failures
109 - scsi: cxlflash: Track pending scsi commands in each hardware queue
110 - scsi: cxlflash: Flush pending commands in cleanup path
111 - scsi: cxlflash: Add scsi command abort handler
112 - scsi: cxlflash: Create character device to provide host management interface
113 - scsi: cxlflash: Separate AFU internal command handling from AFU sync
114 specifics
115 - scsi: cxlflash: Introduce host ioctl support
116 - scsi: cxlflash: Refactor AFU capability checking
117 - scsi: cxlflash: Support LUN provisioning
118 - scsi: cxlflash: Support AFU debug
119 - scsi: cxlflash: Support WS16 unmap
120 - scsi: cxlflash: Remove zeroing of private command data
121 - scsi: cxlflash: Update TMF command processing
122 - scsi: cxlflash: Avoid double free of character device
123 - scsi: cxlflash: Update send_tmf() parameters
124 - scsi: cxlflash: Update debug prints in reset handlers
125
126 * make snap-pkg support (LP: #1700747)
127 - make snap-pkg support
128
129 * Quirk for non-compliant PCI bridge on HiSilicon D05 board (LP: #1698706)
130 - SAUCE: PCI: Support hibmc VGA cards behind a misbehaving HiSilicon bridge
131
132 * arm64: fix crash reading /proc/kcore (LP: #1702749)
133 - fs/proc: kcore: use kcore_list type to check for vmalloc/module address
134 - arm64: mm: select CONFIG_ARCH_PROC_KCORE_TEXT
135
136 * Opal and POWER9 DD2 (LP: #1702159)
137 - SAUCE: powerpc/powernv: Tell OPAL about our MMU mode on POWER9
138
139 * Data corruption with hio driver (LP: #1701316)
140 - SAUCE: hio: Fix incorrect use of enum req_opf values
141
142 * Miscellaneous Ubuntu changes
143 - SAUCE: (noup) Update spl to 0.6.5.10-1, zfs to 0.6.5.10-1ubuntu2
144 - snapcraft.yaml: Sync with xenial
145 - [Config] CONFIG_CAVIUM_ERRATUM_30115=y
146
147 * Miscellaneous upstream changes
148 - Revert "UBUNTU: SAUCE: (efi-lockdown) efi: Add sysctls for secureboot and
149 MokSBState"
150
151 -- Seth Forshee <seth.forshee@canonical.com> Fri, 14 Jul 2017 15:25:41 -0500
152
153 linux (4.12.0-6.7) artful; urgency=low
154
155 * update ENA driver to 1.2.0k from net-next (LP: #1701575)
156 - net: ena: change return value for unsupported features unsupported return
157 value
158 - net: ena: add hardware hints capability to the driver
159 - net: ena: change sizeof() argument to be the type pointer
160 - net: ena: add reset reason for each device FLR
161 - net: ena: add support for out of order rx buffers refill
162 - net: ena: allow the driver to work with small number of msix vectors
163 - net: ena: use napi_schedule_irqoff when possible
164 - net: ena: separate skb allocation to dedicated function
165 - net: ena: use lower_32_bits()/upper_32_bits() to split dma address
166 - net: ena: update driver's rx drop statistics
167 - net: ena: update ena driver to version 1.2.0
168
169 * APST gets enabled against explicit kernel option (LP: #1699004)
170 - nvme: explicitly disable APST on quirked devices
171
172 * Miscellaneous Ubuntu changes
173 - SAUCE: hio: Update to Huawei ES3000_V2 (2.1.0.40)
174 - SAUCE: hio updates for 4.12
175 - SAUCE: Enable hio build
176
177 -- Seth Forshee <seth.forshee@canonical.com> Wed, 05 Jul 2017 14:23:20 -0500
178
179 linux (4.12.0-5.6) artful; urgency=low
180
181 * ERAT invalidate on context switch removal (LP: #1700819)
182 - powerpc: Only do ERAT invalidate on radix context switch on P9 DD1
183
184 * powerpc: Invalidate ERAT on powersave wakeup for POWER9 (LP: #1700521)
185 - SAUCE: powerpc: Invalidate ERAT on powersave wakeup for POWER9
186
187 * Miscellaneous Ubuntu changes
188 - d-i: Move qcom-emac from arm64 to shared nic-modules
189
190 [ Upstream Kernel Changes ]
191
192 * Rebase to v4.12
193
194 -- Seth Forshee <seth.forshee@canonical.com> Mon, 03 Jul 2017 07:52:02 -0500
195
196 linux (4.12.0-4.5) artful; urgency=low
197
198 * aacraid driver may return uninitialized stack data to userspace
199 (LP: #1700077)
200 - SAUCE: scsi: aacraid: Don't copy uninitialized stack memory to userspace
201
202 * KILLER1435-S[0489:e0a2] BT cannot search BT 4.0 device (LP: #1699651)
203 - Bluetooth: btusb: Add support for 0489:e0a2 QCA_ROME device
204
205 * AACRAID for power9 platform (LP: #1689980)
206 - scsi: aacraid: Remove __GFP_DMA for raw srb memory
207 - scsi: aacraid: Fix DMAR issues with iommu=pt
208 - scsi: aacraid: Added 32 and 64 queue depth for arc natives
209 - scsi: aacraid: Set correct Queue Depth for HBA1000 RAW disks
210 - scsi: aacraid: Remove reset support from check_health
211 - scsi: aacraid: Change wait time for fib completion
212 - scsi: aacraid: Log count info of scsi cmds before reset
213 - scsi: aacraid: Print ctrl status before eh reset
214 - scsi: aacraid: Using single reset mask for IOP reset
215 - scsi: aacraid: Rework IOP reset
216 - scsi: aacraid: Add periodic checks to see IOP reset status
217 - scsi: aacraid: Rework SOFT reset code
218 - scsi: aacraid: Rework aac_src_restart
219 - scsi: aacraid: Use correct function to get ctrl health
220 - scsi: aacraid: Make sure ioctl returns on controller reset
221 - scsi: aacraid: Enable ctrl reset for both hba and arc
222 - scsi: aacraid: Add reset debugging statements
223 - scsi: aacraid: Remove reference to Series-9
224 - scsi: aacraid: Update driver version to 50834
225
226 * hibmc driver does not include "pci:" prefix in bus ID (LP: #1698700)
227 - SAUCE: drm: hibmc: Use set_busid function from drm core
228
229 * HiSilicon D05: installer doesn't appear on VGA (LP: #1698954)
230 - d-i: Add hibmc-drm to kernel-image udeb
231
232 * Fix /proc/cpuinfo revision for POWER9 DD2 (LP: #1698844)
233 - SAUCE: powerpc: Fix /proc/cpuinfo revision for POWER9 DD2
234
235 * Miscellaneous Ubuntu changes
236 - [Config] CONFIG_SATA_MV=n and CONFIG_GENERIC_PHY=n for s390x
237 - [Config] CONFIG_ATA=n for s390x
238 - [Config] Update annotations for 4.12
239
240 [ Upstream Kernel Changes ]
241
242 * Rebase to v4.12-rc7
243
244 -- Seth Forshee <seth.forshee@canonical.com> Mon, 26 Jun 2017 11:27:29 -0500
245
246 linux (4.12.0-3.4) artful; urgency=low
247
248 * Miscellaneous upstream changes
249 - ufs: fix the logics for tail relocation
250
251 [ Upstream Kernel Changes ]
252
253 * Rebase to v4.12-rc6
254
255 -- Seth Forshee <seth.forshee@canonical.com> Mon, 19 Jun 2017 14:50:39 -0500
256
257 linux (4.12.0-2.3) artful; urgency=low
258
259 * CVE-2014-9900
260 - SAUCE: (no-up) net: Zeroing the structure ethtool_wolinfo in
261 ethtool_get_wol()
262
263 * System doesn't boot properly on Gigabyte AM4 motherboards (AMD Ryzen)
264 (LP: #1671360)
265 - pinctrl/amd: Use regular interrupt instead of chained
266
267 * extend-diff-ignore should use exact matches (LP: #1693504)
268 - [Packaging] exact extend-diff-ignore matches
269
270 * Miscellaneous Ubuntu changes
271 - SAUCE: efi: Don't print secure boot state from the efi stub
272 - ubuntu: vbox -- Update to 5.1.22-dfsg-1
273 - SAUCE: vbox fixes for 4.12
274 - Re-enable virtualbox build
275 - [Config] CONFIG_ORANGEFS_FS=m
276 - SAUCE: (noup) Update spl to 0.6.5.9-1ubuntu2, zfs to 0.6.5.9-5ubuntu7
277 - Enable zfs build
278
279 [ Upstream Kernel Changes ]
280
281 * Rebase to v4.12-rc4
282 * Rebase to v4.12-rc5
283
284 -- Seth Forshee <seth.forshee@canonical.com> Sun, 11 Jun 2017 22:25:13 -0500
285
286 linux (4.12.0-1.2) artful; urgency=low
287
288 * Enable Matrox driver for Ubuntu 16.04.3 (LP: #1693337)
289 - [Config] Enable CONFIG_DRM_MGAG200 as module
290
291 * Support low-pin-count devices on Hisilicon SoCs (LP: #1677319)
292 - [Config] CONFIG_LIBIO=y on arm64 only
293 - SAUCE: LIBIO: Introduce a generic PIO mapping method
294 - SAUCE: OF: Add missing I/O range exception for indirect-IO devices
295 - [Config] CONFIG_HISILICON_LPC=y
296 - SAUCE: LPC: Support the device-tree LPC host on Hip06/Hip07
297 - SAUCE: LIBIO: Support the dynamically logical PIO registration of ACPI host
298 I/O
299 - SAUCE: LPC: Add the ACPI LPC support
300 - SAUCE: PCI: Apply the new generic I/O management on PCI IO hosts
301 - SAUCE: PCI: Restore codepath for !CONFIG_LIBIO
302
303 * POWER9: Additional patches for TTY and CPU_IDLE (LP: #1674325)
304 - SAUCE: tty: Fix ldisc crash on reopened tty
305
306 * Miscellaneous Ubuntu changes
307 - [Debian] Add build-dep on libnuma-dev to enable 'perf bench numa'
308 - Rebase to v4.12-rc3
309
310 [ Upstream Kernel Changes ]
311
312 * Rebase to v4.12-rc3
313
314 -- Seth Forshee <seth.forshee@canonical.com> Mon, 29 May 2017 20:56:29 -0500
315
316 linux (4.12.0-0.1) artful; urgency=low
317
318 * please enable CONFIG_ARM64_LSE_ATOMICS (LP: #1691614)
319 - [Config] CONFIG_ARM64_LSE_ATOMICS=y
320
321 * [Regression] NUMA_BALANCING disabled on arm64 (LP: #1690914)
322 - [Config] CONFIG_NUMA_BALANCING{,_DEFAULT_ENABLED}=y on arm64
323
324 * exec'ing a setuid binary from a threaded program sometimes fails to setuid
325 (LP: #1672819)
326 - SAUCE: exec: ensure file system accounting in check_unsafe_exec is correct
327
328 * Miscellaneous Ubuntu changes
329 - Update find-missing-sauce.sh to compare to artful
330 - Update dropped.txt
331 - SAUCE: (efi-lockdown) efi: Add EFI_SECURE_BOOT bit
332 - SAUCE: (efi-lockdown) Add the ability to lock down access to the running
333 kernel image
334 - SAUCE: (efi-lockdown) efi: Lock down the kernel if booted in secure boot
335 mode
336 - SAUCE: (efi-lockdown) Enforce module signatures if the kernel is locked down
337 - SAUCE: (efi-lockdown) Restrict /dev/mem and /dev/kmem when the kernel is
338 locked down
339 - SAUCE: (efi-lockdown) Add a sysrq option to exit secure boot mode
340 - SAUCE: (efi-lockdown) kexec: Disable at runtime if the kernel is locked down
341 - SAUCE: (efi-lockdown) Copy secure_boot flag in boot params across kexec
342 reboot
343 - SAUCE: (efi-lockdown) kexec_file: Disable at runtime if securelevel has been
344 set
345 - SAUCE: (efi-lockdown) hibernate: Disable when the kernel is locked down
346 - SAUCE: (efi-lockdown) uswsusp: Disable when the kernel is locked down
347 - SAUCE: (efi-lockdown) PCI: Lock down BAR access when the kernel is locked
348 down
349 - SAUCE: (efi-lockdown) x86: Lock down IO port access when the kernel is
350 locked down
351 - SAUCE: (efi-lockdown) x86: Restrict MSR access when the kernel is locked
352 down
353 - SAUCE: (efi-lockdown) asus-wmi: Restrict debugfs interface when the kernel
354 is locked down
355 - SAUCE: (efi-lockdown) ACPI: Limit access to custom_method when the kernel is
356 locked down
357 - SAUCE: (efi-lockdown) acpi: Ignore acpi_rsdp kernel param when the kernel
358 has been locked down
359 - SAUCE: (efi-lockdown) acpi: Disable ACPI table override if the kernel is
360 locked down
361 - SAUCE: (efi-lockdown) acpi: Disable APEI error injection if the kernel is
362 locked down
363 - SAUCE: (efi-lockdown) Enable cold boot attack mitigation
364 - SAUCE: (efi-lockdown) bpf: Restrict kernel image access functions when the
365 kernel is locked down
366 - SAUCE: (efi-lockdown) scsi: Lock down the eata driver
367 - SAUCE: (efi-lockdown) Prohibit PCMCIA CIS storage when the kernel is locked
368 down
369 - SAUCE: (efi-lockdown) Lock down TIOCSSERIAL
370 - SAUCE: (efi-lockdown) KEYS: Allow unrestricted boot-time addition of keys to
371 secondary keyring
372 - SAUCE: (efi-lockdown) efi: Add EFI signature data types
373 - SAUCE: (efi-lockdown) efi: Add an EFI signature blob parser
374 - SAUCE: (efi-lockdown) MODSIGN: Import certificates from UEFI Secure Boot
375 - SAUCE: (efi-lockdown) MODSIGN: Allow the "db" UEFI variable to be suppressed
376 - SAUCE: (efi-lockdown) efi: Sanitize boot_params in efi stub
377 - SAUCE: (efi-lockdown) efi: Add secure_boot state and status bit for
378 MokSBState
379 - SAUCE: (efi-lockdown) efi: Add sysctls for secureboot and MokSBState
380 - [Config] Set values for UEFI secure boot lockdown options
381 - Disable virtualbox build
382 - Disable hio build
383 - SAUCE: securityfs: Replace CURRENT_TIME with current_time()
384 - Disable zfs build
385 - [Debian] Work out upstream tag for use with gen-auto-reconstruct
386 - SAUCE: Import aufs driver
387 - SAUCE: aufs -- Include linux/mm.h in fs/aufs/file.h
388 - [Config] Enable aufs
389 - SAUCE: perf callchain: Include errno.h on x86 unconditinally
390
391 [ Upstream Kernel Changes ]
392
393 * Rebase to v4.12-rc2
394
395 -- Seth Forshee <seth.forshee@canonical.com> Sun, 21 May 2017 23:44:44 -0500
396
397 linux (4.11.0-3.8) artful; urgency=low
398
399 [ Seth Forshee ]
400
401 * Release Tracking Bug
402 - LP: #1690999
403
404 * apparmor_parser hangs indefinitely when called by multiple threads
405 (LP: #1645037)
406 - SAUCE: apparmor: fix lock ordering for mkdir
407
408 * apparmor leaking securityfs pin count (LP: #1660846)
409 - SAUCE: apparmor: fix leak on securityfs pin count
410
411 * apparmor reference count leak when securityfs_setup_d_inode\ () fails
412 (LP: #1660845)
413 - SAUCE: apparmor: fix reference count leak when securityfs_setup_d_inode()
414 fails
415
416 * apparmor not checking error if security_pin_fs() fails (LP: #1660842)
417 - SAUCE: apparmor: fix not handling error case when securityfs_pin_fs() fails
418
419 * libvirt profile is blocking global setrlimit despite having no rlimit rule
420 (LP: #1679704)
421 - SAUCE: apparmor: fix complain mode failure for rlimit mediation
422 - apparmor: update auditing of rlimit check to provide capability information
423
424 * apparmor: does not provide a way to detect policy updataes (LP: #1678032)
425 - SAUCE: apparmor: add policy revision file interface
426
427 * apparmor does not make support of query data visible (LP: #1678023)
428 - SAUCE: apparmor: add label data availability to the feature set
429
430 * apparmor query interface does not make supported query info available
431 (LP: #1678030)
432 - SAUCE: apparmor: add information about the query inteface to the feature set
433
434 * change_profile incorrect when using namespaces with a compound stack
435 (LP: #1677959)
436 - SAUCE: apparmor: fix label parse for stacked labels
437
438 * Regression in 4.4.0-65-generic causes very frequent system crashes
439 (LP: #1669611)
440 - apparmor: sync of apparmor 3.6+ (17.04)
441
442 * Artful update to 4.11.1 stable release (LP: #1690814)
443 - dm ioctl: prevent stack leak in dm ioctl call
444 - drm/sti: fix GDP size to support up to UHD resolution
445 - power: supply: lp8788: prevent out of bounds array access
446 - brcmfmac: Ensure pointer correctly set if skb data location changes
447 - brcmfmac: Make skb header writable before use
448 - sparc64: fix fault handling in NGbzero.S and GENbzero.S
449 - refcount: change EXPORT_SYMBOL markings
450 - net: macb: fix phy interrupt parsing
451 - tcp: fix access to sk->sk_state in tcp_poll()
452 - geneve: fix incorrect setting of UDP checksum flag
453 - bpf: enhance verifier to understand stack pointer arithmetic
454 - bpf, arm64: fix jit branch offset related to ldimm64
455 - tcp: fix wraparound issue in tcp_lp
456 - net: ipv6: Do not duplicate DAD on link up
457 - net: usb: qmi_wwan: add Telit ME910 support
458 - tcp: do not inherit fastopen_req from parent
459 - ipv4, ipv6: ensure raw socket message is big enough to hold an IP header
460 - rtnetlink: NUL-terminate IFLA_PHYS_PORT_NAME string
461 - ipv6: initialize route null entry in addrconf_init()
462 - ipv6: reorder ip6_route_dev_notifier after ipv6_dev_notf
463 - tcp: randomize timestamps on syncookies
464 - bnxt_en: allocate enough space for ->ntp_fltr_bmap
465 - bpf: don't let ldimm64 leak map addresses on unprivileged
466 - net: mdio-mux: bcm-iproc: call mdiobus_free() in error path
467 - f2fs: sanity check segment count
468 - xen/arm,arm64: fix xen_dma_ops after 815dd18 "Consolidate get_dma_ops..."
469 - xen: Revert commits da72ff5bfcb0 and 72a9b186292d
470 - block: get rid of blk_integrity_revalidate()
471 - Linux 4.11.1
472
473 * Module signing exclusion for staging drivers does not work properly
474 (LP: #1690908)
475 - SAUCE: Fix module signing exclusion in package builds
476
477 * perf: qcom: Add L3 cache PMU driver (LP: #1689856)
478 - [Config] CONFIG_QCOM_L3_PMU=y
479 - perf: qcom: Add L3 cache PMU driver
480
481 * No PMU support for ACPI-based arm64 systems (LP: #1689661)
482 - drivers/perf: arm_pmu: rework per-cpu allocation
483 - drivers/perf: arm_pmu: manage interrupts per-cpu
484 - drivers/perf: arm_pmu: split irq request from enable
485 - drivers/perf: arm_pmu: remove pointless PMU disabling
486 - drivers/perf: arm_pmu: define armpmu_init_fn
487 - drivers/perf: arm_pmu: fold init into alloc
488 - drivers/perf: arm_pmu: factor out pmu registration
489 - drivers/perf: arm_pmu: simplify cpu_pmu_request_irqs()
490 - drivers/perf: arm_pmu: handle no platform_device
491 - drivers/perf: arm_pmu: rename irq request/free functions
492 - drivers/perf: arm_pmu: split cpu-local irq request/free
493 - drivers/perf: arm_pmu: move irq request/free into probe
494 - drivers/perf: arm_pmu: split out platform device probe logic
495 - arm64: add function to get a cpu's MADT GICC table
496 - [Config] CONFIG_ARM_PMU_ACPI=y
497 - drivers/perf: arm_pmu: add ACPI framework
498 - arm64: pmuv3: handle !PMUv3 when probing
499 - arm64: pmuv3: use arm_pmu ACPI framework
500
501 * Fix NVLINK2 TCE route (LP: #1690155)
502 - powerpc/powernv: Fix TCE kill on NVLink2
503
504 * CVE-2017-0605
505 - tracing: Use strlcpy() instead of strcpy() in __trace_find_cmdline()
506
507 * Miscellaneous Ubuntu changes
508 - [Config] Restore powerpc arch to annotations file
509 - [Config] Disable runtime testing modules
510 - [Config] Disable drivers not needed on s390x
511 - [Config] Update annotations for 4.11
512 - [Config] updateconfigs after apparmor updates
513
514 * Miscellaneous upstream changes
515 - apparmor: use SHASH_DESC_ON_STACK
516 - apparmor: fix invalid reference to index variable of iterator line 836
517 - apparmor: fix parameters so that the permission test is bypassed at boot
518 - apparmor: Make path_max parameter readonly
519 - apparmorfs: Combine two function calls into one in aa_fs_seq_raw_abi_show()
520 - apparmorfs: Use seq_putc() in two functions
521 - apparmor: provide information about path buffer size at boot
522 - apparmor: add/use fns to print hash string hex value
523
524 -- Seth Forshee <seth.forshee@canonical.com> Tue, 16 May 2017 00:39:13 -0500
525
526 linux (4.11.0-2.7) artful; urgency=low
527
528 * kernel-wedge fails in artful due to leftover squashfs-modules d-i files
529 (LP: #1688259)
530 - Remove squashfs-modules files from d-i
531 - [Config] as squashfs-modules is builtin kernel-image must Provides: it
532
533 * [Zesty] d-i: replace msm_emac with qcom_emac (LP: #1677297)
534 - Revert "UBUNTU: d-i: initrd needs msm_emac on amberwing platform."
535 - d-i: initrd needs qcom_emac on amberwing platform.
536
537 * update for V3 kernel bits and improved multiple fan slice support
538 (LP: #1470091)
539 - SAUCE: fan: tunnel multiple mapping mode (v3)
540
541 * Miscellaneous Ubuntu changes
542 - SAUCE: (noup) Update spl to 0.6.5.9-1ubuntu1, zfs to 0.6.5.9-5ubuntu5
543 - Enable zfs
544 - SAUCE: fan: add VXLAN implementation
545 - SAUCE: (efi-lockdown) efi: Add EFI_SECURE_BOOT bit
546 - SAUCE: (efi-lockdown) Add the ability to lock down access to the running
547 kernel image
548 - SAUCE: (efi-lockdown) efi: Lock down the kernel if booted in secure boot
549 mode
550 - SAUCE: (efi-lockdown) Enforce module signatures if the kernel is locked down
551 - SAUCE: (efi-lockdown) Restrict /dev/mem and /dev/kmem when the kernel is
552 locked down
553 - SAUCE: (efi-lockdown) Add a sysrq option to exit secure boot mode
554 - SAUCE: (efi-lockdown) kexec: Disable at runtime if the kernel is locked down
555 - SAUCE: (efi-lockdown) Copy secure_boot flag in boot params across kexec
556 reboot
557 - SAUCE: (efi-lockdown) kexec_file: Disable at runtime if securelevel has been
558 set
559 - SAUCE: (efi-lockdown) hibernate: Disable when the kernel is locked down
560 - SAUCE: (efi-lockdown) uswsusp: Disable when the kernel is locked down
561 - SAUCE: (efi-lockdown) PCI: Lock down BAR access when the kernel is locked
562 down
563 - SAUCE: (efi-lockdown) x86: Lock down IO port access when the kernel is
564 locked down
565 - SAUCE: (efi-lockdown) x86: Restrict MSR access when the kernel is locked
566 down
567 - SAUCE: (efi-lockdown) asus-wmi: Restrict debugfs interface when the kernel
568 is locked down
569 - SAUCE: (efi-lockdown) ACPI: Limit access to custom_method when the kernel is
570 locked down
571 - SAUCE: (efi-lockdown) acpi: Ignore acpi_rsdp kernel param when the kernel
572 has been locked down
573 - SAUCE: (efi-lockdown) acpi: Disable ACPI table override if the kernel is
574 locked down
575 - SAUCE: (efi-lockdown) acpi: Disable APEI error injection if the kernel is
576 locked down
577 - SAUCE: (efi-lockdown) Enable cold boot attack mitigation
578 - SAUCE: (efi-lockdown) bpf: Restrict kernel image access functions when the
579 kernel is locked down
580 - SAUCE: (efi-lockdown) scsi: Lock down the eata driver
581 - SAUCE: (efi-lockdown) Prohibit PCMCIA CIS storage when the kernel is locked
582 down
583 - SAUCE: (efi-lockdown) Lock down TIOCSSERIAL
584 - SAUCE: (efi-lockdown) Add EFI signature data types
585 - SAUCE: (efi-lockdown) Add an EFI signature blob parser and key loader.
586 - SAUCE: (efi-lockdown) KEYS: Add a system blacklist keyring
587 - SAUCE: (efi-lockdown) MODSIGN: Import certificates from UEFI Secure Boot
588 - SAUCE: (efi-lockdown) MODSIGN: Support not importing certs from db
589 - SAUCE: (efi-lockdown) MODSIGN: Don't try secure boot if EFI runtime is
590 disabled
591 - SAUCE: (efi-lockdown) efi: Sanitize boot_params in efi stub
592 - SAUCE: (efi-lockdown) efi: Add secure_boot state and status bit for
593 MokSBState
594 - SAUCE: (efi-lockdown) efi: Add sysctls for secureboot and MokSBState
595 - [Config] Set values for UEFI secure boot lockdown options
596 - Update dropped.txt
597
598 [ Upstream Kernel Changes ]
599
600 * rebase to v4.11
601
602 -- Seth Forshee <seth.forshee@canonical.com> Fri, 05 May 2017 07:43:14 -0500
603
604 linux (4.11.0-1.6) artful; urgency=low
605
606 * Miscellaneous Ubuntu changes
607 - [Debian] Use default compression for all packages
608 - SAUCE: (namespace) block_dev: Support checking inode permissions in
609 lookup_bdev()
610 - SAUCE: (namespace) block_dev: Check permissions towards block device inode
611 when mounting
612 - SAUCE: (namespace) mtd: Check permissions towards mtd block device inode
613 when mounting
614 - SAUCE: (namespace) fs: Allow superblock owner to change ownership of inodes
615 - SAUCE: (namespace) fs: Don't remove suid for CAP_FSETID for userns root
616 - SAUCE: (namespace) fs: Allow superblock owner to access do_remount_sb()
617 - SAUCE: (namespace) capabilities: Allow privileged user in s_user_ns to set
618 security.* xattrs
619 - SAUCE: (namespace) fs: Allow CAP_SYS_ADMIN in s_user_ns to freeze and thaw
620 filesystems
621 - SAUCE: (namespace) fuse: Add support for pid namespaces
622 - SAUCE: (namespace) fuse: Support fuse filesystems outside of init_user_ns
623 - SAUCE: (namespace) fuse: Restrict allow_other to the superblock's namespace
624 or a descendant
625 - SAUCE: (namespace) fuse: Allow user namespace mounts
626 - SAUCE: (namespace) ext4: Add support for unprivileged mounts from user
627 namespaces
628 - SAUCE: (namespace) evm: Don't update hmacs in user ns mounts
629 - SAUCE: (namespace) ext4: Add module parameter to enable user namespace
630 mounts
631 - SAUCE: (namespace) block_dev: Forbid unprivileged mounting when device is
632 opened for writing
633
634 -- Seth Forshee <seth.forshee@canonical.com> Wed, 26 Apr 2017 10:08:29 -0500
635
636 linux (4.11.0-0.5) artful; urgency=low
637
638 * [Hyper-V][SAUCE] pci-hyperv: Use only 16 bit integer for PCI domain
639 (LP: #1684971)
640 - SAUCE: pci-hyperv: Use only 16 bit integer for PCI domain
641
642 * [Hyper-V] Ubuntu 14.04.2 LTS Generation 2 SCSI Errors on VSS Based Backups
643 (LP: #1470250)
644 - SAUCE: Tools: hv: vss: Thaw the filesystem and continue after freeze fails
645
646 * Enable virtual scsi server driver for Power (LP: #1615665)
647 - SAUCE: Return TCMU-generated sense data to fabric module
648
649 * include/linux/security.h header syntax error with !CONFIG_SECURITYFS
650 (LP: #1630990)
651 - SAUCE: (no-up) include/linux/security.h -- fix syntax error with
652 CONFIG_SECURITYFS=n
653
654 * Miscellaneous Ubuntu changes
655 - SAUCE: Import aufs driver
656 - [Config] Enable aufs
657 - [Debian] Add script to update virtualbox
658 - ubuntu: vbox -- Update to 5.1.20-dfsg-2
659 - Enable vbox
660 - SAUCE: aufs -- Include linux/mm.h in fs/aufs/file.h
661
662 [ Upstream Kernel Changes ]
663
664 * rebase to v4.11-rc8
665
666 -- Seth Forshee <seth.forshee@canonical.com> Tue, 25 Apr 2017 13:42:54 -0500
667
668 linux (4.11.0-0.4) zesty; urgency=low
669
670 * POWER9: Improve performance on memory management (LP: #1681429)
671 - SAUCE: powerpc/mm/radix: Don't do page walk cache flush when doing full mm
672 flush
673 - SAUCE: powerpc/mm/radix: Remove unnecessary ptesync
674
675 * Miscellaneous Ubuntu changes
676 - find-missing-sauce.sh
677
678 [ Upstream Kernel Changes ]
679
680 * rebase to v4.11-rc7
681
682 -- Seth Forshee <seth.forshee@canonical.com> Tue, 18 Apr 2017 08:19:43 -0500
683
684 linux (4.11.0-0.3) zesty; urgency=low
685
686 * Disable CONFIG_HVC_UDBG on ppc64el (LP: #1680888)
687 - [Config] Disable CONFIG_HVC_UDBG on ppc64el
688
689 * smartpqi driver needed in initram disk and installer (LP: #1680156)
690 - [Config] Add smartpqi to d-i
691
692 * Disable CONFIG_SECURITY_SELINUX_DISABLE (LP: #1680315)
693 - [Config] CONFIG_SECURITY_SELINUX_DISABLE=n
694
695 * Miscellaneous Ubuntu changes
696 - [Config] flash-kernel should be a Breaks
697 - [Config] drop the info directory
698 - [Config] drop NOTES as obsolete
699 - [Config] drop changelog.historical as obsolete
700 - rebase to v4.11-rc6
701
702 [ Upstream Kernel Changes ]
703
704 * rebase to v4.11-rc6
705
706 -- Tim Gardner <tim.gardner@canonical.com> Tue, 11 Apr 2017 07:16:52 -0600
707
708 linux (4.11.0-0.2) zesty; urgency=low
709
710 [ Upstream Kernel Changes ]
711
712 * rebase to v4.11-rc5
713
714 -- Tim Gardner <tim.gardner@canonical.com> Mon, 03 Apr 2017 08:26:07 +0100
715
716 linux (4.11.0-0.1) zesty; urgency=low
717
718 [ Upstream Kernel Changes ]
719
720 * rebase to v4.11-rc4
721 - LP: #1591053
722
723 -- Tim Gardner <tim.gardner@canonical.com> Mon, 20 Mar 2017 05:15:32 -0600
724
725 linux (4.11.0-0.0) zesty; urgency=low
726
727 * dummy entry
728
729 -- Tim Gardner <tim.gardner@canonical.com> Mon, 20 Mar 2017 05:15:32 -0600