]> git.proxmox.com Git - mirror_ubuntu-artful-kernel.git/blob - debian.master/changelog
UBUNTU: Rebase to v4.13-rc3
[mirror_ubuntu-artful-kernel.git] / debian.master / changelog
1 linux (4.13.0-3.4) UNRELEASED; urgency=low
2
3 CHANGELOG: Do not edit directly. Autogenerated at release.
4 CHANGELOG: Use the printchanges target to see the curent changes.
5 CHANGELOG: Use the insertchanges target to create the final log.
6
7 [ Upstream Kernel Changes ]
8
9 * Rebase to v4.13-rc3
10
11 -- Seth Forshee <seth.forshee@canonical.com> Mon, 31 Jul 2017 07:45:57 -0500
12
13 linux (4.13.0-2.3) artful; urgency=low
14
15 * Change CONFIG_IBMVETH to module (LP: #1704479)
16 - [Config] CONFIG_IBMVETH=m
17
18 [ Upstream Kernel Changes ]
19
20 * Rebase to v4.13-rc2
21
22 -- Seth Forshee <seth.forshee@canonical.com> Mon, 24 Jul 2017 13:58:08 -0500
23
24 linux (4.13.0-1.2) artful; urgency=low
25
26 * Miscellaneous Ubuntu changes
27 - [Debian] Support sphinx-based kernel documentation
28
29 -- Seth Forshee <seth.forshee@canonical.com> Thu, 20 Jul 2017 09:18:33 -0500
30
31 linux (4.13.0-0.1) artful; urgency=low
32
33 * Miscellaneous Ubuntu changes
34 - Disable hio
35 - Disable zfs build
36 - ubuntu: vbox -- update to 5.1.24-dfsg-1
37
38 [ Upstream Kernel Changes ]
39
40 * Rebase to v4.13-rc1
41
42 -- Seth Forshee <seth.forshee@canonical.com> Wed, 19 Jul 2017 15:09:31 -0500
43
44 linux (4.12.0-7.8) artful; urgency=low
45
46 * ThunderX: soft lockup on 4.8+ kernels when running qemu-efi with vhost=on
47 (LP: #1673564)
48 - arm64: Add a facility to turn an ESR syndrome into a sysreg encoding
49 - KVM: arm/arm64: vgic-v3: Add accessors for the ICH_APxRn_EL2 registers
50 - KVM: arm64: Make kvm_condition_valid32() accessible from EL2
51 - KVM: arm64: vgic-v3: Add hook to handle guest GICv3 sysreg accesses at EL2
52 - KVM: arm64: vgic-v3: Add ICV_BPR1_EL1 handler
53 - KVM: arm64: vgic-v3: Add ICV_IGRPEN1_EL1 handler
54 - KVM: arm64: vgic-v3: Add ICV_IAR1_EL1 handler
55 - KVM: arm64: vgic-v3: Add ICV_EOIR1_EL1 handler
56 - KVM: arm64: vgic-v3: Add ICV_AP1Rn_EL1 handler
57 - KVM: arm64: vgic-v3: Add ICV_HPPIR1_EL1 handler
58 - KVM: arm64: vgic-v3: Enable trapping of Group-1 system registers
59 - KVM: arm64: Enable GICv3 Group-1 sysreg trapping via command-line
60 - KVM: arm64: vgic-v3: Add ICV_BPR0_EL1 handler
61 - KVM: arm64: vgic-v3: Add ICV_IGNREN0_EL1 handler
62 - KVM: arm64: vgic-v3: Add misc Group-0 handlers
63 - KVM: arm64: vgic-v3: Enable trapping of Group-0 system registers
64 - KVM: arm64: Enable GICv3 Group-0 sysreg trapping via command-line
65 - arm64: Add MIDR values for Cavium cn83XX SoCs
66 - arm64: Add workaround for Cavium Thunder erratum 30115
67 - KVM: arm64: vgic-v3: Add ICV_DIR_EL1 handler
68 - KVM: arm64: vgic-v3: Add ICV_RPR_EL1 handler
69 - KVM: arm64: vgic-v3: Add ICV_CTLR_EL1 handler
70 - KVM: arm64: vgic-v3: Add ICV_PMR_EL1 handler
71 - KVM: arm64: Enable GICv3 common sysreg trapping via command-line
72 - KVM: arm64: vgic-v3: Log which GICv3 system registers are trapped
73 - KVM: arm64: Log an error if trapping a read-from-write-only GICv3 access
74 - KVM: arm64: Log an error if trapping a write-to-read-only GICv3 access
75
76 * hns: under heavy load, NIC may fail and require reboot (LP: #1704146)
77 - net: hns: Bugfix for Tx timeout handling in hns driver
78
79 * New ACPI identifiers for ThunderX SMMU (LP: #1703437)
80 - iommu/arm-smmu: Plumb in new ACPI identifiers
81
82 * Transparent hugepages should default to enabled=madvise (LP: #1703742)
83 - SAUCE: use CONFIG_TRANSPARENT_HUGEPAGE_MADVISE=y as default
84
85 * Artful update to v4.12.1 stable release (LP: #1703858)
86 - driver core: platform: fix race condition with driver_override
87 - RDMA/uverbs: Check port number supplied by user verbs cmds
88 - usb: dwc3: replace %p with %pK
89 - USB: serial: cp210x: add ID for CEL EM3588 USB ZigBee stick
90 - usb: usbip: set buffer pointers to NULL after free
91 - Add USB quirk for HVR-950q to avoid intermittent device resets
92 - usb: Fix typo in the definition of Endpoint[out]Request
93 - USB: core: fix device node leak
94 - USB: serial: option: add two Longcheer device ids
95 - USB: serial: qcserial: new Sierra Wireless EM7305 device ID
96 - xhci: Limit USB2 port wake support for AMD Promontory hosts
97 - gfs2: Fix glock rhashtable rcu bug
98 - Add "shutdown" to "struct class".
99 - tpm: Issue a TPM2_Shutdown for TPM2 devices.
100 - tpm: fix a kernel memory leak in tpm-sysfs.c
101 - powerpc/powernv: Fix CPU_HOTPLUG=n idle.c compile error
102 - x86/uaccess: Optimize copy_user_enhanced_fast_string() for short strings
103 - sched/fair, cpumask: Export for_each_cpu_wrap()
104 - sched/core: Implement new approach to scale select_idle_cpu()
105 - sched/numa: Use down_read_trylock() for the mmap_sem
106 - sched/numa: Override part of migrate_degrades_locality() when idle balancing
107 - sched/fair: Simplify wake_affine() for the single socket case
108 - sched/numa: Implement NUMA node level wake_affine()
109 - sched/fair: Remove effective_load()
110 - sched/numa: Hide numa_wake_affine() from UP build
111 - xen: avoid deadlock in xenbus driver
112 - crypto: drbg - Fixes panic in wait_for_completion call
113 - Linux 4.12.1
114
115 * cxlflash update request in the Xenial SRU stream (LP: #1702521)
116 - scsi: cxlflash: Combine the send queue locks
117 - scsi: cxlflash: Update cxlflash_afu_sync() to return errno
118 - scsi: cxlflash: Reset hardware queue context via specified register
119 - scsi: cxlflash: Schedule asynchronous reset of the host
120 - scsi: cxlflash: Handle AFU sync failures
121 - scsi: cxlflash: Track pending scsi commands in each hardware queue
122 - scsi: cxlflash: Flush pending commands in cleanup path
123 - scsi: cxlflash: Add scsi command abort handler
124 - scsi: cxlflash: Create character device to provide host management interface
125 - scsi: cxlflash: Separate AFU internal command handling from AFU sync
126 specifics
127 - scsi: cxlflash: Introduce host ioctl support
128 - scsi: cxlflash: Refactor AFU capability checking
129 - scsi: cxlflash: Support LUN provisioning
130 - scsi: cxlflash: Support AFU debug
131 - scsi: cxlflash: Support WS16 unmap
132 - scsi: cxlflash: Remove zeroing of private command data
133 - scsi: cxlflash: Update TMF command processing
134 - scsi: cxlflash: Avoid double free of character device
135 - scsi: cxlflash: Update send_tmf() parameters
136 - scsi: cxlflash: Update debug prints in reset handlers
137
138 * make snap-pkg support (LP: #1700747)
139 - make snap-pkg support
140
141 * Quirk for non-compliant PCI bridge on HiSilicon D05 board (LP: #1698706)
142 - SAUCE: PCI: Support hibmc VGA cards behind a misbehaving HiSilicon bridge
143
144 * arm64: fix crash reading /proc/kcore (LP: #1702749)
145 - fs/proc: kcore: use kcore_list type to check for vmalloc/module address
146 - arm64: mm: select CONFIG_ARCH_PROC_KCORE_TEXT
147
148 * Opal and POWER9 DD2 (LP: #1702159)
149 - SAUCE: powerpc/powernv: Tell OPAL about our MMU mode on POWER9
150
151 * Data corruption with hio driver (LP: #1701316)
152 - SAUCE: hio: Fix incorrect use of enum req_opf values
153
154 * Miscellaneous Ubuntu changes
155 - SAUCE: (noup) Update spl to 0.6.5.10-1, zfs to 0.6.5.10-1ubuntu2
156 - snapcraft.yaml: Sync with xenial
157 - [Config] CONFIG_CAVIUM_ERRATUM_30115=y
158
159 * Miscellaneous upstream changes
160 - Revert "UBUNTU: SAUCE: (efi-lockdown) efi: Add sysctls for secureboot and
161 MokSBState"
162
163 -- Seth Forshee <seth.forshee@canonical.com> Fri, 14 Jul 2017 15:25:41 -0500
164
165 linux (4.12.0-6.7) artful; urgency=low
166
167 * update ENA driver to 1.2.0k from net-next (LP: #1701575)
168 - net: ena: change return value for unsupported features unsupported return
169 value
170 - net: ena: add hardware hints capability to the driver
171 - net: ena: change sizeof() argument to be the type pointer
172 - net: ena: add reset reason for each device FLR
173 - net: ena: add support for out of order rx buffers refill
174 - net: ena: allow the driver to work with small number of msix vectors
175 - net: ena: use napi_schedule_irqoff when possible
176 - net: ena: separate skb allocation to dedicated function
177 - net: ena: use lower_32_bits()/upper_32_bits() to split dma address
178 - net: ena: update driver's rx drop statistics
179 - net: ena: update ena driver to version 1.2.0
180
181 * APST gets enabled against explicit kernel option (LP: #1699004)
182 - nvme: explicitly disable APST on quirked devices
183
184 * Miscellaneous Ubuntu changes
185 - SAUCE: hio: Update to Huawei ES3000_V2 (2.1.0.40)
186 - SAUCE: hio updates for 4.12
187 - SAUCE: Enable hio build
188
189 -- Seth Forshee <seth.forshee@canonical.com> Wed, 05 Jul 2017 14:23:20 -0500
190
191 linux (4.12.0-5.6) artful; urgency=low
192
193 * ERAT invalidate on context switch removal (LP: #1700819)
194 - powerpc: Only do ERAT invalidate on radix context switch on P9 DD1
195
196 * powerpc: Invalidate ERAT on powersave wakeup for POWER9 (LP: #1700521)
197 - SAUCE: powerpc: Invalidate ERAT on powersave wakeup for POWER9
198
199 * Miscellaneous Ubuntu changes
200 - d-i: Move qcom-emac from arm64 to shared nic-modules
201
202 [ Upstream Kernel Changes ]
203
204 * Rebase to v4.12
205
206 -- Seth Forshee <seth.forshee@canonical.com> Mon, 03 Jul 2017 07:52:02 -0500
207
208 linux (4.12.0-4.5) artful; urgency=low
209
210 * aacraid driver may return uninitialized stack data to userspace
211 (LP: #1700077)
212 - SAUCE: scsi: aacraid: Don't copy uninitialized stack memory to userspace
213
214 * KILLER1435-S[0489:e0a2] BT cannot search BT 4.0 device (LP: #1699651)
215 - Bluetooth: btusb: Add support for 0489:e0a2 QCA_ROME device
216
217 * AACRAID for power9 platform (LP: #1689980)
218 - scsi: aacraid: Remove __GFP_DMA for raw srb memory
219 - scsi: aacraid: Fix DMAR issues with iommu=pt
220 - scsi: aacraid: Added 32 and 64 queue depth for arc natives
221 - scsi: aacraid: Set correct Queue Depth for HBA1000 RAW disks
222 - scsi: aacraid: Remove reset support from check_health
223 - scsi: aacraid: Change wait time for fib completion
224 - scsi: aacraid: Log count info of scsi cmds before reset
225 - scsi: aacraid: Print ctrl status before eh reset
226 - scsi: aacraid: Using single reset mask for IOP reset
227 - scsi: aacraid: Rework IOP reset
228 - scsi: aacraid: Add periodic checks to see IOP reset status
229 - scsi: aacraid: Rework SOFT reset code
230 - scsi: aacraid: Rework aac_src_restart
231 - scsi: aacraid: Use correct function to get ctrl health
232 - scsi: aacraid: Make sure ioctl returns on controller reset
233 - scsi: aacraid: Enable ctrl reset for both hba and arc
234 - scsi: aacraid: Add reset debugging statements
235 - scsi: aacraid: Remove reference to Series-9
236 - scsi: aacraid: Update driver version to 50834
237
238 * hibmc driver does not include "pci:" prefix in bus ID (LP: #1698700)
239 - SAUCE: drm: hibmc: Use set_busid function from drm core
240
241 * HiSilicon D05: installer doesn't appear on VGA (LP: #1698954)
242 - d-i: Add hibmc-drm to kernel-image udeb
243
244 * Fix /proc/cpuinfo revision for POWER9 DD2 (LP: #1698844)
245 - SAUCE: powerpc: Fix /proc/cpuinfo revision for POWER9 DD2
246
247 * Miscellaneous Ubuntu changes
248 - [Config] CONFIG_SATA_MV=n and CONFIG_GENERIC_PHY=n for s390x
249 - [Config] CONFIG_ATA=n for s390x
250 - [Config] Update annotations for 4.12
251
252 [ Upstream Kernel Changes ]
253
254 * Rebase to v4.12-rc7
255
256 -- Seth Forshee <seth.forshee@canonical.com> Mon, 26 Jun 2017 11:27:29 -0500
257
258 linux (4.12.0-3.4) artful; urgency=low
259
260 * Miscellaneous upstream changes
261 - ufs: fix the logics for tail relocation
262
263 [ Upstream Kernel Changes ]
264
265 * Rebase to v4.12-rc6
266
267 -- Seth Forshee <seth.forshee@canonical.com> Mon, 19 Jun 2017 14:50:39 -0500
268
269 linux (4.12.0-2.3) artful; urgency=low
270
271 * CVE-2014-9900
272 - SAUCE: (no-up) net: Zeroing the structure ethtool_wolinfo in
273 ethtool_get_wol()
274
275 * System doesn't boot properly on Gigabyte AM4 motherboards (AMD Ryzen)
276 (LP: #1671360)
277 - pinctrl/amd: Use regular interrupt instead of chained
278
279 * extend-diff-ignore should use exact matches (LP: #1693504)
280 - [Packaging] exact extend-diff-ignore matches
281
282 * Miscellaneous Ubuntu changes
283 - SAUCE: efi: Don't print secure boot state from the efi stub
284 - ubuntu: vbox -- Update to 5.1.22-dfsg-1
285 - SAUCE: vbox fixes for 4.12
286 - Re-enable virtualbox build
287 - [Config] CONFIG_ORANGEFS_FS=m
288 - SAUCE: (noup) Update spl to 0.6.5.9-1ubuntu2, zfs to 0.6.5.9-5ubuntu7
289 - Enable zfs build
290
291 [ Upstream Kernel Changes ]
292
293 * Rebase to v4.12-rc4
294 * Rebase to v4.12-rc5
295
296 -- Seth Forshee <seth.forshee@canonical.com> Sun, 11 Jun 2017 22:25:13 -0500
297
298 linux (4.12.0-1.2) artful; urgency=low
299
300 * Enable Matrox driver for Ubuntu 16.04.3 (LP: #1693337)
301 - [Config] Enable CONFIG_DRM_MGAG200 as module
302
303 * Support low-pin-count devices on Hisilicon SoCs (LP: #1677319)
304 - [Config] CONFIG_LIBIO=y on arm64 only
305 - SAUCE: LIBIO: Introduce a generic PIO mapping method
306 - SAUCE: OF: Add missing I/O range exception for indirect-IO devices
307 - [Config] CONFIG_HISILICON_LPC=y
308 - SAUCE: LPC: Support the device-tree LPC host on Hip06/Hip07
309 - SAUCE: LIBIO: Support the dynamically logical PIO registration of ACPI host
310 I/O
311 - SAUCE: LPC: Add the ACPI LPC support
312 - SAUCE: PCI: Apply the new generic I/O management on PCI IO hosts
313 - SAUCE: PCI: Restore codepath for !CONFIG_LIBIO
314
315 * POWER9: Additional patches for TTY and CPU_IDLE (LP: #1674325)
316 - SAUCE: tty: Fix ldisc crash on reopened tty
317
318 * Miscellaneous Ubuntu changes
319 - [Debian] Add build-dep on libnuma-dev to enable 'perf bench numa'
320 - Rebase to v4.12-rc3
321
322 [ Upstream Kernel Changes ]
323
324 * Rebase to v4.12-rc3
325
326 -- Seth Forshee <seth.forshee@canonical.com> Mon, 29 May 2017 20:56:29 -0500
327
328 linux (4.12.0-0.1) artful; urgency=low
329
330 * please enable CONFIG_ARM64_LSE_ATOMICS (LP: #1691614)
331 - [Config] CONFIG_ARM64_LSE_ATOMICS=y
332
333 * [Regression] NUMA_BALANCING disabled on arm64 (LP: #1690914)
334 - [Config] CONFIG_NUMA_BALANCING{,_DEFAULT_ENABLED}=y on arm64
335
336 * exec'ing a setuid binary from a threaded program sometimes fails to setuid
337 (LP: #1672819)
338 - SAUCE: exec: ensure file system accounting in check_unsafe_exec is correct
339
340 * Miscellaneous Ubuntu changes
341 - Update find-missing-sauce.sh to compare to artful
342 - Update dropped.txt
343 - SAUCE: (efi-lockdown) efi: Add EFI_SECURE_BOOT bit
344 - SAUCE: (efi-lockdown) Add the ability to lock down access to the running
345 kernel image
346 - SAUCE: (efi-lockdown) efi: Lock down the kernel if booted in secure boot
347 mode
348 - SAUCE: (efi-lockdown) Enforce module signatures if the kernel is locked down
349 - SAUCE: (efi-lockdown) Restrict /dev/mem and /dev/kmem when the kernel is
350 locked down
351 - SAUCE: (efi-lockdown) Add a sysrq option to exit secure boot mode
352 - SAUCE: (efi-lockdown) kexec: Disable at runtime if the kernel is locked down
353 - SAUCE: (efi-lockdown) Copy secure_boot flag in boot params across kexec
354 reboot
355 - SAUCE: (efi-lockdown) kexec_file: Disable at runtime if securelevel has been
356 set
357 - SAUCE: (efi-lockdown) hibernate: Disable when the kernel is locked down
358 - SAUCE: (efi-lockdown) uswsusp: Disable when the kernel is locked down
359 - SAUCE: (efi-lockdown) PCI: Lock down BAR access when the kernel is locked
360 down
361 - SAUCE: (efi-lockdown) x86: Lock down IO port access when the kernel is
362 locked down
363 - SAUCE: (efi-lockdown) x86: Restrict MSR access when the kernel is locked
364 down
365 - SAUCE: (efi-lockdown) asus-wmi: Restrict debugfs interface when the kernel
366 is locked down
367 - SAUCE: (efi-lockdown) ACPI: Limit access to custom_method when the kernel is
368 locked down
369 - SAUCE: (efi-lockdown) acpi: Ignore acpi_rsdp kernel param when the kernel
370 has been locked down
371 - SAUCE: (efi-lockdown) acpi: Disable ACPI table override if the kernel is
372 locked down
373 - SAUCE: (efi-lockdown) acpi: Disable APEI error injection if the kernel is
374 locked down
375 - SAUCE: (efi-lockdown) Enable cold boot attack mitigation
376 - SAUCE: (efi-lockdown) bpf: Restrict kernel image access functions when the
377 kernel is locked down
378 - SAUCE: (efi-lockdown) scsi: Lock down the eata driver
379 - SAUCE: (efi-lockdown) Prohibit PCMCIA CIS storage when the kernel is locked
380 down
381 - SAUCE: (efi-lockdown) Lock down TIOCSSERIAL
382 - SAUCE: (efi-lockdown) KEYS: Allow unrestricted boot-time addition of keys to
383 secondary keyring
384 - SAUCE: (efi-lockdown) efi: Add EFI signature data types
385 - SAUCE: (efi-lockdown) efi: Add an EFI signature blob parser
386 - SAUCE: (efi-lockdown) MODSIGN: Import certificates from UEFI Secure Boot
387 - SAUCE: (efi-lockdown) MODSIGN: Allow the "db" UEFI variable to be suppressed
388 - SAUCE: (efi-lockdown) efi: Sanitize boot_params in efi stub
389 - SAUCE: (efi-lockdown) efi: Add secure_boot state and status bit for
390 MokSBState
391 - SAUCE: (efi-lockdown) efi: Add sysctls for secureboot and MokSBState
392 - [Config] Set values for UEFI secure boot lockdown options
393 - Disable virtualbox build
394 - Disable hio build
395 - SAUCE: securityfs: Replace CURRENT_TIME with current_time()
396 - Disable zfs build
397 - [Debian] Work out upstream tag for use with gen-auto-reconstruct
398 - SAUCE: Import aufs driver
399 - SAUCE: aufs -- Include linux/mm.h in fs/aufs/file.h
400 - [Config] Enable aufs
401 - SAUCE: perf callchain: Include errno.h on x86 unconditinally
402
403 [ Upstream Kernel Changes ]
404
405 * Rebase to v4.12-rc2
406
407 -- Seth Forshee <seth.forshee@canonical.com> Sun, 21 May 2017 23:44:44 -0500
408
409 linux (4.11.0-3.8) artful; urgency=low
410
411 [ Seth Forshee ]
412
413 * Release Tracking Bug
414 - LP: #1690999
415
416 * apparmor_parser hangs indefinitely when called by multiple threads
417 (LP: #1645037)
418 - SAUCE: apparmor: fix lock ordering for mkdir
419
420 * apparmor leaking securityfs pin count (LP: #1660846)
421 - SAUCE: apparmor: fix leak on securityfs pin count
422
423 * apparmor reference count leak when securityfs_setup_d_inode\ () fails
424 (LP: #1660845)
425 - SAUCE: apparmor: fix reference count leak when securityfs_setup_d_inode()
426 fails
427
428 * apparmor not checking error if security_pin_fs() fails (LP: #1660842)
429 - SAUCE: apparmor: fix not handling error case when securityfs_pin_fs() fails
430
431 * libvirt profile is blocking global setrlimit despite having no rlimit rule
432 (LP: #1679704)
433 - SAUCE: apparmor: fix complain mode failure for rlimit mediation
434 - apparmor: update auditing of rlimit check to provide capability information
435
436 * apparmor: does not provide a way to detect policy updataes (LP: #1678032)
437 - SAUCE: apparmor: add policy revision file interface
438
439 * apparmor does not make support of query data visible (LP: #1678023)
440 - SAUCE: apparmor: add label data availability to the feature set
441
442 * apparmor query interface does not make supported query info available
443 (LP: #1678030)
444 - SAUCE: apparmor: add information about the query inteface to the feature set
445
446 * change_profile incorrect when using namespaces with a compound stack
447 (LP: #1677959)
448 - SAUCE: apparmor: fix label parse for stacked labels
449
450 * Regression in 4.4.0-65-generic causes very frequent system crashes
451 (LP: #1669611)
452 - apparmor: sync of apparmor 3.6+ (17.04)
453
454 * Artful update to 4.11.1 stable release (LP: #1690814)
455 - dm ioctl: prevent stack leak in dm ioctl call
456 - drm/sti: fix GDP size to support up to UHD resolution
457 - power: supply: lp8788: prevent out of bounds array access
458 - brcmfmac: Ensure pointer correctly set if skb data location changes
459 - brcmfmac: Make skb header writable before use
460 - sparc64: fix fault handling in NGbzero.S and GENbzero.S
461 - refcount: change EXPORT_SYMBOL markings
462 - net: macb: fix phy interrupt parsing
463 - tcp: fix access to sk->sk_state in tcp_poll()
464 - geneve: fix incorrect setting of UDP checksum flag
465 - bpf: enhance verifier to understand stack pointer arithmetic
466 - bpf, arm64: fix jit branch offset related to ldimm64
467 - tcp: fix wraparound issue in tcp_lp
468 - net: ipv6: Do not duplicate DAD on link up
469 - net: usb: qmi_wwan: add Telit ME910 support
470 - tcp: do not inherit fastopen_req from parent
471 - ipv4, ipv6: ensure raw socket message is big enough to hold an IP header
472 - rtnetlink: NUL-terminate IFLA_PHYS_PORT_NAME string
473 - ipv6: initialize route null entry in addrconf_init()
474 - ipv6: reorder ip6_route_dev_notifier after ipv6_dev_notf
475 - tcp: randomize timestamps on syncookies
476 - bnxt_en: allocate enough space for ->ntp_fltr_bmap
477 - bpf: don't let ldimm64 leak map addresses on unprivileged
478 - net: mdio-mux: bcm-iproc: call mdiobus_free() in error path
479 - f2fs: sanity check segment count
480 - xen/arm,arm64: fix xen_dma_ops after 815dd18 "Consolidate get_dma_ops..."
481 - xen: Revert commits da72ff5bfcb0 and 72a9b186292d
482 - block: get rid of blk_integrity_revalidate()
483 - Linux 4.11.1
484
485 * Module signing exclusion for staging drivers does not work properly
486 (LP: #1690908)
487 - SAUCE: Fix module signing exclusion in package builds
488
489 * perf: qcom: Add L3 cache PMU driver (LP: #1689856)
490 - [Config] CONFIG_QCOM_L3_PMU=y
491 - perf: qcom: Add L3 cache PMU driver
492
493 * No PMU support for ACPI-based arm64 systems (LP: #1689661)
494 - drivers/perf: arm_pmu: rework per-cpu allocation
495 - drivers/perf: arm_pmu: manage interrupts per-cpu
496 - drivers/perf: arm_pmu: split irq request from enable
497 - drivers/perf: arm_pmu: remove pointless PMU disabling
498 - drivers/perf: arm_pmu: define armpmu_init_fn
499 - drivers/perf: arm_pmu: fold init into alloc
500 - drivers/perf: arm_pmu: factor out pmu registration
501 - drivers/perf: arm_pmu: simplify cpu_pmu_request_irqs()
502 - drivers/perf: arm_pmu: handle no platform_device
503 - drivers/perf: arm_pmu: rename irq request/free functions
504 - drivers/perf: arm_pmu: split cpu-local irq request/free
505 - drivers/perf: arm_pmu: move irq request/free into probe
506 - drivers/perf: arm_pmu: split out platform device probe logic
507 - arm64: add function to get a cpu's MADT GICC table
508 - [Config] CONFIG_ARM_PMU_ACPI=y
509 - drivers/perf: arm_pmu: add ACPI framework
510 - arm64: pmuv3: handle !PMUv3 when probing
511 - arm64: pmuv3: use arm_pmu ACPI framework
512
513 * Fix NVLINK2 TCE route (LP: #1690155)
514 - powerpc/powernv: Fix TCE kill on NVLink2
515
516 * CVE-2017-0605
517 - tracing: Use strlcpy() instead of strcpy() in __trace_find_cmdline()
518
519 * Miscellaneous Ubuntu changes
520 - [Config] Restore powerpc arch to annotations file
521 - [Config] Disable runtime testing modules
522 - [Config] Disable drivers not needed on s390x
523 - [Config] Update annotations for 4.11
524 - [Config] updateconfigs after apparmor updates
525
526 * Miscellaneous upstream changes
527 - apparmor: use SHASH_DESC_ON_STACK
528 - apparmor: fix invalid reference to index variable of iterator line 836
529 - apparmor: fix parameters so that the permission test is bypassed at boot
530 - apparmor: Make path_max parameter readonly
531 - apparmorfs: Combine two function calls into one in aa_fs_seq_raw_abi_show()
532 - apparmorfs: Use seq_putc() in two functions
533 - apparmor: provide information about path buffer size at boot
534 - apparmor: add/use fns to print hash string hex value
535
536 -- Seth Forshee <seth.forshee@canonical.com> Tue, 16 May 2017 00:39:13 -0500
537
538 linux (4.11.0-2.7) artful; urgency=low
539
540 * kernel-wedge fails in artful due to leftover squashfs-modules d-i files
541 (LP: #1688259)
542 - Remove squashfs-modules files from d-i
543 - [Config] as squashfs-modules is builtin kernel-image must Provides: it
544
545 * [Zesty] d-i: replace msm_emac with qcom_emac (LP: #1677297)
546 - Revert "UBUNTU: d-i: initrd needs msm_emac on amberwing platform."
547 - d-i: initrd needs qcom_emac on amberwing platform.
548
549 * update for V3 kernel bits and improved multiple fan slice support
550 (LP: #1470091)
551 - SAUCE: fan: tunnel multiple mapping mode (v3)
552
553 * Miscellaneous Ubuntu changes
554 - SAUCE: (noup) Update spl to 0.6.5.9-1ubuntu1, zfs to 0.6.5.9-5ubuntu5
555 - Enable zfs
556 - SAUCE: fan: add VXLAN implementation
557 - SAUCE: (efi-lockdown) efi: Add EFI_SECURE_BOOT bit
558 - SAUCE: (efi-lockdown) Add the ability to lock down access to the running
559 kernel image
560 - SAUCE: (efi-lockdown) efi: Lock down the kernel if booted in secure boot
561 mode
562 - SAUCE: (efi-lockdown) Enforce module signatures if the kernel is locked down
563 - SAUCE: (efi-lockdown) Restrict /dev/mem and /dev/kmem when the kernel is
564 locked down
565 - SAUCE: (efi-lockdown) Add a sysrq option to exit secure boot mode
566 - SAUCE: (efi-lockdown) kexec: Disable at runtime if the kernel is locked down
567 - SAUCE: (efi-lockdown) Copy secure_boot flag in boot params across kexec
568 reboot
569 - SAUCE: (efi-lockdown) kexec_file: Disable at runtime if securelevel has been
570 set
571 - SAUCE: (efi-lockdown) hibernate: Disable when the kernel is locked down
572 - SAUCE: (efi-lockdown) uswsusp: Disable when the kernel is locked down
573 - SAUCE: (efi-lockdown) PCI: Lock down BAR access when the kernel is locked
574 down
575 - SAUCE: (efi-lockdown) x86: Lock down IO port access when the kernel is
576 locked down
577 - SAUCE: (efi-lockdown) x86: Restrict MSR access when the kernel is locked
578 down
579 - SAUCE: (efi-lockdown) asus-wmi: Restrict debugfs interface when the kernel
580 is locked down
581 - SAUCE: (efi-lockdown) ACPI: Limit access to custom_method when the kernel is
582 locked down
583 - SAUCE: (efi-lockdown) acpi: Ignore acpi_rsdp kernel param when the kernel
584 has been locked down
585 - SAUCE: (efi-lockdown) acpi: Disable ACPI table override if the kernel is
586 locked down
587 - SAUCE: (efi-lockdown) acpi: Disable APEI error injection if the kernel is
588 locked down
589 - SAUCE: (efi-lockdown) Enable cold boot attack mitigation
590 - SAUCE: (efi-lockdown) bpf: Restrict kernel image access functions when the
591 kernel is locked down
592 - SAUCE: (efi-lockdown) scsi: Lock down the eata driver
593 - SAUCE: (efi-lockdown) Prohibit PCMCIA CIS storage when the kernel is locked
594 down
595 - SAUCE: (efi-lockdown) Lock down TIOCSSERIAL
596 - SAUCE: (efi-lockdown) Add EFI signature data types
597 - SAUCE: (efi-lockdown) Add an EFI signature blob parser and key loader.
598 - SAUCE: (efi-lockdown) KEYS: Add a system blacklist keyring
599 - SAUCE: (efi-lockdown) MODSIGN: Import certificates from UEFI Secure Boot
600 - SAUCE: (efi-lockdown) MODSIGN: Support not importing certs from db
601 - SAUCE: (efi-lockdown) MODSIGN: Don't try secure boot if EFI runtime is
602 disabled
603 - SAUCE: (efi-lockdown) efi: Sanitize boot_params in efi stub
604 - SAUCE: (efi-lockdown) efi: Add secure_boot state and status bit for
605 MokSBState
606 - SAUCE: (efi-lockdown) efi: Add sysctls for secureboot and MokSBState
607 - [Config] Set values for UEFI secure boot lockdown options
608 - Update dropped.txt
609
610 [ Upstream Kernel Changes ]
611
612 * rebase to v4.11
613
614 -- Seth Forshee <seth.forshee@canonical.com> Fri, 05 May 2017 07:43:14 -0500
615
616 linux (4.11.0-1.6) artful; urgency=low
617
618 * Miscellaneous Ubuntu changes
619 - [Debian] Use default compression for all packages
620 - SAUCE: (namespace) block_dev: Support checking inode permissions in
621 lookup_bdev()
622 - SAUCE: (namespace) block_dev: Check permissions towards block device inode
623 when mounting
624 - SAUCE: (namespace) mtd: Check permissions towards mtd block device inode
625 when mounting
626 - SAUCE: (namespace) fs: Allow superblock owner to change ownership of inodes
627 - SAUCE: (namespace) fs: Don't remove suid for CAP_FSETID for userns root
628 - SAUCE: (namespace) fs: Allow superblock owner to access do_remount_sb()
629 - SAUCE: (namespace) capabilities: Allow privileged user in s_user_ns to set
630 security.* xattrs
631 - SAUCE: (namespace) fs: Allow CAP_SYS_ADMIN in s_user_ns to freeze and thaw
632 filesystems
633 - SAUCE: (namespace) fuse: Add support for pid namespaces
634 - SAUCE: (namespace) fuse: Support fuse filesystems outside of init_user_ns
635 - SAUCE: (namespace) fuse: Restrict allow_other to the superblock's namespace
636 or a descendant
637 - SAUCE: (namespace) fuse: Allow user namespace mounts
638 - SAUCE: (namespace) ext4: Add support for unprivileged mounts from user
639 namespaces
640 - SAUCE: (namespace) evm: Don't update hmacs in user ns mounts
641 - SAUCE: (namespace) ext4: Add module parameter to enable user namespace
642 mounts
643 - SAUCE: (namespace) block_dev: Forbid unprivileged mounting when device is
644 opened for writing
645
646 -- Seth Forshee <seth.forshee@canonical.com> Wed, 26 Apr 2017 10:08:29 -0500
647
648 linux (4.11.0-0.5) artful; urgency=low
649
650 * [Hyper-V][SAUCE] pci-hyperv: Use only 16 bit integer for PCI domain
651 (LP: #1684971)
652 - SAUCE: pci-hyperv: Use only 16 bit integer for PCI domain
653
654 * [Hyper-V] Ubuntu 14.04.2 LTS Generation 2 SCSI Errors on VSS Based Backups
655 (LP: #1470250)
656 - SAUCE: Tools: hv: vss: Thaw the filesystem and continue after freeze fails
657
658 * Enable virtual scsi server driver for Power (LP: #1615665)
659 - SAUCE: Return TCMU-generated sense data to fabric module
660
661 * include/linux/security.h header syntax error with !CONFIG_SECURITYFS
662 (LP: #1630990)
663 - SAUCE: (no-up) include/linux/security.h -- fix syntax error with
664 CONFIG_SECURITYFS=n
665
666 * Miscellaneous Ubuntu changes
667 - SAUCE: Import aufs driver
668 - [Config] Enable aufs
669 - [Debian] Add script to update virtualbox
670 - ubuntu: vbox -- Update to 5.1.20-dfsg-2
671 - Enable vbox
672 - SAUCE: aufs -- Include linux/mm.h in fs/aufs/file.h
673
674 [ Upstream Kernel Changes ]
675
676 * rebase to v4.11-rc8
677
678 -- Seth Forshee <seth.forshee@canonical.com> Tue, 25 Apr 2017 13:42:54 -0500
679
680 linux (4.11.0-0.4) zesty; urgency=low
681
682 * POWER9: Improve performance on memory management (LP: #1681429)
683 - SAUCE: powerpc/mm/radix: Don't do page walk cache flush when doing full mm
684 flush
685 - SAUCE: powerpc/mm/radix: Remove unnecessary ptesync
686
687 * Miscellaneous Ubuntu changes
688 - find-missing-sauce.sh
689
690 [ Upstream Kernel Changes ]
691
692 * rebase to v4.11-rc7
693
694 -- Seth Forshee <seth.forshee@canonical.com> Tue, 18 Apr 2017 08:19:43 -0500
695
696 linux (4.11.0-0.3) zesty; urgency=low
697
698 * Disable CONFIG_HVC_UDBG on ppc64el (LP: #1680888)
699 - [Config] Disable CONFIG_HVC_UDBG on ppc64el
700
701 * smartpqi driver needed in initram disk and installer (LP: #1680156)
702 - [Config] Add smartpqi to d-i
703
704 * Disable CONFIG_SECURITY_SELINUX_DISABLE (LP: #1680315)
705 - [Config] CONFIG_SECURITY_SELINUX_DISABLE=n
706
707 * Miscellaneous Ubuntu changes
708 - [Config] flash-kernel should be a Breaks
709 - [Config] drop the info directory
710 - [Config] drop NOTES as obsolete
711 - [Config] drop changelog.historical as obsolete
712 - rebase to v4.11-rc6
713
714 [ Upstream Kernel Changes ]
715
716 * rebase to v4.11-rc6
717
718 -- Tim Gardner <tim.gardner@canonical.com> Tue, 11 Apr 2017 07:16:52 -0600
719
720 linux (4.11.0-0.2) zesty; urgency=low
721
722 [ Upstream Kernel Changes ]
723
724 * rebase to v4.11-rc5
725
726 -- Tim Gardner <tim.gardner@canonical.com> Mon, 03 Apr 2017 08:26:07 +0100
727
728 linux (4.11.0-0.1) zesty; urgency=low
729
730 [ Upstream Kernel Changes ]
731
732 * rebase to v4.11-rc4
733 - LP: #1591053
734
735 -- Tim Gardner <tim.gardner@canonical.com> Mon, 20 Mar 2017 05:15:32 -0600
736
737 linux (4.11.0-0.0) zesty; urgency=low
738
739 * dummy entry
740
741 -- Tim Gardner <tim.gardner@canonical.com> Mon, 20 Mar 2017 05:15:32 -0600