]> git.proxmox.com Git - mirror_ubuntu-artful-kernel.git/blob - debian.master/changelog
UBUNTU: Start new release
[mirror_ubuntu-artful-kernel.git] / debian.master / changelog
1 linux (4.13.0-3.4) UNRELEASED; urgency=low
2
3 CHANGELOG: Do not edit directly. Autogenerated at release.
4 CHANGELOG: Use the printchanges target to see the curent changes.
5 CHANGELOG: Use the insertchanges target to create the final log.
6
7 -- Seth Forshee <seth.forshee@canonical.com> Mon, 31 Jul 2017 07:45:57 -0500
8
9 linux (4.13.0-2.3) artful; urgency=low
10
11 * Change CONFIG_IBMVETH to module (LP: #1704479)
12 - [Config] CONFIG_IBMVETH=m
13
14 [ Upstream Kernel Changes ]
15
16 * Rebase to v4.13-rc2
17
18 -- Seth Forshee <seth.forshee@canonical.com> Mon, 24 Jul 2017 13:58:08 -0500
19
20 linux (4.13.0-1.2) artful; urgency=low
21
22 * Miscellaneous Ubuntu changes
23 - [Debian] Support sphinx-based kernel documentation
24
25 -- Seth Forshee <seth.forshee@canonical.com> Thu, 20 Jul 2017 09:18:33 -0500
26
27 linux (4.13.0-0.1) artful; urgency=low
28
29 * Miscellaneous Ubuntu changes
30 - Disable hio
31 - Disable zfs build
32 - ubuntu: vbox -- update to 5.1.24-dfsg-1
33
34 [ Upstream Kernel Changes ]
35
36 * Rebase to v4.13-rc1
37
38 -- Seth Forshee <seth.forshee@canonical.com> Wed, 19 Jul 2017 15:09:31 -0500
39
40 linux (4.12.0-7.8) artful; urgency=low
41
42 * ThunderX: soft lockup on 4.8+ kernels when running qemu-efi with vhost=on
43 (LP: #1673564)
44 - arm64: Add a facility to turn an ESR syndrome into a sysreg encoding
45 - KVM: arm/arm64: vgic-v3: Add accessors for the ICH_APxRn_EL2 registers
46 - KVM: arm64: Make kvm_condition_valid32() accessible from EL2
47 - KVM: arm64: vgic-v3: Add hook to handle guest GICv3 sysreg accesses at EL2
48 - KVM: arm64: vgic-v3: Add ICV_BPR1_EL1 handler
49 - KVM: arm64: vgic-v3: Add ICV_IGRPEN1_EL1 handler
50 - KVM: arm64: vgic-v3: Add ICV_IAR1_EL1 handler
51 - KVM: arm64: vgic-v3: Add ICV_EOIR1_EL1 handler
52 - KVM: arm64: vgic-v3: Add ICV_AP1Rn_EL1 handler
53 - KVM: arm64: vgic-v3: Add ICV_HPPIR1_EL1 handler
54 - KVM: arm64: vgic-v3: Enable trapping of Group-1 system registers
55 - KVM: arm64: Enable GICv3 Group-1 sysreg trapping via command-line
56 - KVM: arm64: vgic-v3: Add ICV_BPR0_EL1 handler
57 - KVM: arm64: vgic-v3: Add ICV_IGNREN0_EL1 handler
58 - KVM: arm64: vgic-v3: Add misc Group-0 handlers
59 - KVM: arm64: vgic-v3: Enable trapping of Group-0 system registers
60 - KVM: arm64: Enable GICv3 Group-0 sysreg trapping via command-line
61 - arm64: Add MIDR values for Cavium cn83XX SoCs
62 - arm64: Add workaround for Cavium Thunder erratum 30115
63 - KVM: arm64: vgic-v3: Add ICV_DIR_EL1 handler
64 - KVM: arm64: vgic-v3: Add ICV_RPR_EL1 handler
65 - KVM: arm64: vgic-v3: Add ICV_CTLR_EL1 handler
66 - KVM: arm64: vgic-v3: Add ICV_PMR_EL1 handler
67 - KVM: arm64: Enable GICv3 common sysreg trapping via command-line
68 - KVM: arm64: vgic-v3: Log which GICv3 system registers are trapped
69 - KVM: arm64: Log an error if trapping a read-from-write-only GICv3 access
70 - KVM: arm64: Log an error if trapping a write-to-read-only GICv3 access
71
72 * hns: under heavy load, NIC may fail and require reboot (LP: #1704146)
73 - net: hns: Bugfix for Tx timeout handling in hns driver
74
75 * New ACPI identifiers for ThunderX SMMU (LP: #1703437)
76 - iommu/arm-smmu: Plumb in new ACPI identifiers
77
78 * Transparent hugepages should default to enabled=madvise (LP: #1703742)
79 - SAUCE: use CONFIG_TRANSPARENT_HUGEPAGE_MADVISE=y as default
80
81 * Artful update to v4.12.1 stable release (LP: #1703858)
82 - driver core: platform: fix race condition with driver_override
83 - RDMA/uverbs: Check port number supplied by user verbs cmds
84 - usb: dwc3: replace %p with %pK
85 - USB: serial: cp210x: add ID for CEL EM3588 USB ZigBee stick
86 - usb: usbip: set buffer pointers to NULL after free
87 - Add USB quirk for HVR-950q to avoid intermittent device resets
88 - usb: Fix typo in the definition of Endpoint[out]Request
89 - USB: core: fix device node leak
90 - USB: serial: option: add two Longcheer device ids
91 - USB: serial: qcserial: new Sierra Wireless EM7305 device ID
92 - xhci: Limit USB2 port wake support for AMD Promontory hosts
93 - gfs2: Fix glock rhashtable rcu bug
94 - Add "shutdown" to "struct class".
95 - tpm: Issue a TPM2_Shutdown for TPM2 devices.
96 - tpm: fix a kernel memory leak in tpm-sysfs.c
97 - powerpc/powernv: Fix CPU_HOTPLUG=n idle.c compile error
98 - x86/uaccess: Optimize copy_user_enhanced_fast_string() for short strings
99 - sched/fair, cpumask: Export for_each_cpu_wrap()
100 - sched/core: Implement new approach to scale select_idle_cpu()
101 - sched/numa: Use down_read_trylock() for the mmap_sem
102 - sched/numa: Override part of migrate_degrades_locality() when idle balancing
103 - sched/fair: Simplify wake_affine() for the single socket case
104 - sched/numa: Implement NUMA node level wake_affine()
105 - sched/fair: Remove effective_load()
106 - sched/numa: Hide numa_wake_affine() from UP build
107 - xen: avoid deadlock in xenbus driver
108 - crypto: drbg - Fixes panic in wait_for_completion call
109 - Linux 4.12.1
110
111 * cxlflash update request in the Xenial SRU stream (LP: #1702521)
112 - scsi: cxlflash: Combine the send queue locks
113 - scsi: cxlflash: Update cxlflash_afu_sync() to return errno
114 - scsi: cxlflash: Reset hardware queue context via specified register
115 - scsi: cxlflash: Schedule asynchronous reset of the host
116 - scsi: cxlflash: Handle AFU sync failures
117 - scsi: cxlflash: Track pending scsi commands in each hardware queue
118 - scsi: cxlflash: Flush pending commands in cleanup path
119 - scsi: cxlflash: Add scsi command abort handler
120 - scsi: cxlflash: Create character device to provide host management interface
121 - scsi: cxlflash: Separate AFU internal command handling from AFU sync
122 specifics
123 - scsi: cxlflash: Introduce host ioctl support
124 - scsi: cxlflash: Refactor AFU capability checking
125 - scsi: cxlflash: Support LUN provisioning
126 - scsi: cxlflash: Support AFU debug
127 - scsi: cxlflash: Support WS16 unmap
128 - scsi: cxlflash: Remove zeroing of private command data
129 - scsi: cxlflash: Update TMF command processing
130 - scsi: cxlflash: Avoid double free of character device
131 - scsi: cxlflash: Update send_tmf() parameters
132 - scsi: cxlflash: Update debug prints in reset handlers
133
134 * make snap-pkg support (LP: #1700747)
135 - make snap-pkg support
136
137 * Quirk for non-compliant PCI bridge on HiSilicon D05 board (LP: #1698706)
138 - SAUCE: PCI: Support hibmc VGA cards behind a misbehaving HiSilicon bridge
139
140 * arm64: fix crash reading /proc/kcore (LP: #1702749)
141 - fs/proc: kcore: use kcore_list type to check for vmalloc/module address
142 - arm64: mm: select CONFIG_ARCH_PROC_KCORE_TEXT
143
144 * Opal and POWER9 DD2 (LP: #1702159)
145 - SAUCE: powerpc/powernv: Tell OPAL about our MMU mode on POWER9
146
147 * Data corruption with hio driver (LP: #1701316)
148 - SAUCE: hio: Fix incorrect use of enum req_opf values
149
150 * Miscellaneous Ubuntu changes
151 - SAUCE: (noup) Update spl to 0.6.5.10-1, zfs to 0.6.5.10-1ubuntu2
152 - snapcraft.yaml: Sync with xenial
153 - [Config] CONFIG_CAVIUM_ERRATUM_30115=y
154
155 * Miscellaneous upstream changes
156 - Revert "UBUNTU: SAUCE: (efi-lockdown) efi: Add sysctls for secureboot and
157 MokSBState"
158
159 -- Seth Forshee <seth.forshee@canonical.com> Fri, 14 Jul 2017 15:25:41 -0500
160
161 linux (4.12.0-6.7) artful; urgency=low
162
163 * update ENA driver to 1.2.0k from net-next (LP: #1701575)
164 - net: ena: change return value for unsupported features unsupported return
165 value
166 - net: ena: add hardware hints capability to the driver
167 - net: ena: change sizeof() argument to be the type pointer
168 - net: ena: add reset reason for each device FLR
169 - net: ena: add support for out of order rx buffers refill
170 - net: ena: allow the driver to work with small number of msix vectors
171 - net: ena: use napi_schedule_irqoff when possible
172 - net: ena: separate skb allocation to dedicated function
173 - net: ena: use lower_32_bits()/upper_32_bits() to split dma address
174 - net: ena: update driver's rx drop statistics
175 - net: ena: update ena driver to version 1.2.0
176
177 * APST gets enabled against explicit kernel option (LP: #1699004)
178 - nvme: explicitly disable APST on quirked devices
179
180 * Miscellaneous Ubuntu changes
181 - SAUCE: hio: Update to Huawei ES3000_V2 (2.1.0.40)
182 - SAUCE: hio updates for 4.12
183 - SAUCE: Enable hio build
184
185 -- Seth Forshee <seth.forshee@canonical.com> Wed, 05 Jul 2017 14:23:20 -0500
186
187 linux (4.12.0-5.6) artful; urgency=low
188
189 * ERAT invalidate on context switch removal (LP: #1700819)
190 - powerpc: Only do ERAT invalidate on radix context switch on P9 DD1
191
192 * powerpc: Invalidate ERAT on powersave wakeup for POWER9 (LP: #1700521)
193 - SAUCE: powerpc: Invalidate ERAT on powersave wakeup for POWER9
194
195 * Miscellaneous Ubuntu changes
196 - d-i: Move qcom-emac from arm64 to shared nic-modules
197
198 [ Upstream Kernel Changes ]
199
200 * Rebase to v4.12
201
202 -- Seth Forshee <seth.forshee@canonical.com> Mon, 03 Jul 2017 07:52:02 -0500
203
204 linux (4.12.0-4.5) artful; urgency=low
205
206 * aacraid driver may return uninitialized stack data to userspace
207 (LP: #1700077)
208 - SAUCE: scsi: aacraid: Don't copy uninitialized stack memory to userspace
209
210 * KILLER1435-S[0489:e0a2] BT cannot search BT 4.0 device (LP: #1699651)
211 - Bluetooth: btusb: Add support for 0489:e0a2 QCA_ROME device
212
213 * AACRAID for power9 platform (LP: #1689980)
214 - scsi: aacraid: Remove __GFP_DMA for raw srb memory
215 - scsi: aacraid: Fix DMAR issues with iommu=pt
216 - scsi: aacraid: Added 32 and 64 queue depth for arc natives
217 - scsi: aacraid: Set correct Queue Depth for HBA1000 RAW disks
218 - scsi: aacraid: Remove reset support from check_health
219 - scsi: aacraid: Change wait time for fib completion
220 - scsi: aacraid: Log count info of scsi cmds before reset
221 - scsi: aacraid: Print ctrl status before eh reset
222 - scsi: aacraid: Using single reset mask for IOP reset
223 - scsi: aacraid: Rework IOP reset
224 - scsi: aacraid: Add periodic checks to see IOP reset status
225 - scsi: aacraid: Rework SOFT reset code
226 - scsi: aacraid: Rework aac_src_restart
227 - scsi: aacraid: Use correct function to get ctrl health
228 - scsi: aacraid: Make sure ioctl returns on controller reset
229 - scsi: aacraid: Enable ctrl reset for both hba and arc
230 - scsi: aacraid: Add reset debugging statements
231 - scsi: aacraid: Remove reference to Series-9
232 - scsi: aacraid: Update driver version to 50834
233
234 * hibmc driver does not include "pci:" prefix in bus ID (LP: #1698700)
235 - SAUCE: drm: hibmc: Use set_busid function from drm core
236
237 * HiSilicon D05: installer doesn't appear on VGA (LP: #1698954)
238 - d-i: Add hibmc-drm to kernel-image udeb
239
240 * Fix /proc/cpuinfo revision for POWER9 DD2 (LP: #1698844)
241 - SAUCE: powerpc: Fix /proc/cpuinfo revision for POWER9 DD2
242
243 * Miscellaneous Ubuntu changes
244 - [Config] CONFIG_SATA_MV=n and CONFIG_GENERIC_PHY=n for s390x
245 - [Config] CONFIG_ATA=n for s390x
246 - [Config] Update annotations for 4.12
247
248 [ Upstream Kernel Changes ]
249
250 * Rebase to v4.12-rc7
251
252 -- Seth Forshee <seth.forshee@canonical.com> Mon, 26 Jun 2017 11:27:29 -0500
253
254 linux (4.12.0-3.4) artful; urgency=low
255
256 * Miscellaneous upstream changes
257 - ufs: fix the logics for tail relocation
258
259 [ Upstream Kernel Changes ]
260
261 * Rebase to v4.12-rc6
262
263 -- Seth Forshee <seth.forshee@canonical.com> Mon, 19 Jun 2017 14:50:39 -0500
264
265 linux (4.12.0-2.3) artful; urgency=low
266
267 * CVE-2014-9900
268 - SAUCE: (no-up) net: Zeroing the structure ethtool_wolinfo in
269 ethtool_get_wol()
270
271 * System doesn't boot properly on Gigabyte AM4 motherboards (AMD Ryzen)
272 (LP: #1671360)
273 - pinctrl/amd: Use regular interrupt instead of chained
274
275 * extend-diff-ignore should use exact matches (LP: #1693504)
276 - [Packaging] exact extend-diff-ignore matches
277
278 * Miscellaneous Ubuntu changes
279 - SAUCE: efi: Don't print secure boot state from the efi stub
280 - ubuntu: vbox -- Update to 5.1.22-dfsg-1
281 - SAUCE: vbox fixes for 4.12
282 - Re-enable virtualbox build
283 - [Config] CONFIG_ORANGEFS_FS=m
284 - SAUCE: (noup) Update spl to 0.6.5.9-1ubuntu2, zfs to 0.6.5.9-5ubuntu7
285 - Enable zfs build
286
287 [ Upstream Kernel Changes ]
288
289 * Rebase to v4.12-rc4
290 * Rebase to v4.12-rc5
291
292 -- Seth Forshee <seth.forshee@canonical.com> Sun, 11 Jun 2017 22:25:13 -0500
293
294 linux (4.12.0-1.2) artful; urgency=low
295
296 * Enable Matrox driver for Ubuntu 16.04.3 (LP: #1693337)
297 - [Config] Enable CONFIG_DRM_MGAG200 as module
298
299 * Support low-pin-count devices on Hisilicon SoCs (LP: #1677319)
300 - [Config] CONFIG_LIBIO=y on arm64 only
301 - SAUCE: LIBIO: Introduce a generic PIO mapping method
302 - SAUCE: OF: Add missing I/O range exception for indirect-IO devices
303 - [Config] CONFIG_HISILICON_LPC=y
304 - SAUCE: LPC: Support the device-tree LPC host on Hip06/Hip07
305 - SAUCE: LIBIO: Support the dynamically logical PIO registration of ACPI host
306 I/O
307 - SAUCE: LPC: Add the ACPI LPC support
308 - SAUCE: PCI: Apply the new generic I/O management on PCI IO hosts
309 - SAUCE: PCI: Restore codepath for !CONFIG_LIBIO
310
311 * POWER9: Additional patches for TTY and CPU_IDLE (LP: #1674325)
312 - SAUCE: tty: Fix ldisc crash on reopened tty
313
314 * Miscellaneous Ubuntu changes
315 - [Debian] Add build-dep on libnuma-dev to enable 'perf bench numa'
316 - Rebase to v4.12-rc3
317
318 [ Upstream Kernel Changes ]
319
320 * Rebase to v4.12-rc3
321
322 -- Seth Forshee <seth.forshee@canonical.com> Mon, 29 May 2017 20:56:29 -0500
323
324 linux (4.12.0-0.1) artful; urgency=low
325
326 * please enable CONFIG_ARM64_LSE_ATOMICS (LP: #1691614)
327 - [Config] CONFIG_ARM64_LSE_ATOMICS=y
328
329 * [Regression] NUMA_BALANCING disabled on arm64 (LP: #1690914)
330 - [Config] CONFIG_NUMA_BALANCING{,_DEFAULT_ENABLED}=y on arm64
331
332 * exec'ing a setuid binary from a threaded program sometimes fails to setuid
333 (LP: #1672819)
334 - SAUCE: exec: ensure file system accounting in check_unsafe_exec is correct
335
336 * Miscellaneous Ubuntu changes
337 - Update find-missing-sauce.sh to compare to artful
338 - Update dropped.txt
339 - SAUCE: (efi-lockdown) efi: Add EFI_SECURE_BOOT bit
340 - SAUCE: (efi-lockdown) Add the ability to lock down access to the running
341 kernel image
342 - SAUCE: (efi-lockdown) efi: Lock down the kernel if booted in secure boot
343 mode
344 - SAUCE: (efi-lockdown) Enforce module signatures if the kernel is locked down
345 - SAUCE: (efi-lockdown) Restrict /dev/mem and /dev/kmem when the kernel is
346 locked down
347 - SAUCE: (efi-lockdown) Add a sysrq option to exit secure boot mode
348 - SAUCE: (efi-lockdown) kexec: Disable at runtime if the kernel is locked down
349 - SAUCE: (efi-lockdown) Copy secure_boot flag in boot params across kexec
350 reboot
351 - SAUCE: (efi-lockdown) kexec_file: Disable at runtime if securelevel has been
352 set
353 - SAUCE: (efi-lockdown) hibernate: Disable when the kernel is locked down
354 - SAUCE: (efi-lockdown) uswsusp: Disable when the kernel is locked down
355 - SAUCE: (efi-lockdown) PCI: Lock down BAR access when the kernel is locked
356 down
357 - SAUCE: (efi-lockdown) x86: Lock down IO port access when the kernel is
358 locked down
359 - SAUCE: (efi-lockdown) x86: Restrict MSR access when the kernel is locked
360 down
361 - SAUCE: (efi-lockdown) asus-wmi: Restrict debugfs interface when the kernel
362 is locked down
363 - SAUCE: (efi-lockdown) ACPI: Limit access to custom_method when the kernel is
364 locked down
365 - SAUCE: (efi-lockdown) acpi: Ignore acpi_rsdp kernel param when the kernel
366 has been locked down
367 - SAUCE: (efi-lockdown) acpi: Disable ACPI table override if the kernel is
368 locked down
369 - SAUCE: (efi-lockdown) acpi: Disable APEI error injection if the kernel is
370 locked down
371 - SAUCE: (efi-lockdown) Enable cold boot attack mitigation
372 - SAUCE: (efi-lockdown) bpf: Restrict kernel image access functions when the
373 kernel is locked down
374 - SAUCE: (efi-lockdown) scsi: Lock down the eata driver
375 - SAUCE: (efi-lockdown) Prohibit PCMCIA CIS storage when the kernel is locked
376 down
377 - SAUCE: (efi-lockdown) Lock down TIOCSSERIAL
378 - SAUCE: (efi-lockdown) KEYS: Allow unrestricted boot-time addition of keys to
379 secondary keyring
380 - SAUCE: (efi-lockdown) efi: Add EFI signature data types
381 - SAUCE: (efi-lockdown) efi: Add an EFI signature blob parser
382 - SAUCE: (efi-lockdown) MODSIGN: Import certificates from UEFI Secure Boot
383 - SAUCE: (efi-lockdown) MODSIGN: Allow the "db" UEFI variable to be suppressed
384 - SAUCE: (efi-lockdown) efi: Sanitize boot_params in efi stub
385 - SAUCE: (efi-lockdown) efi: Add secure_boot state and status bit for
386 MokSBState
387 - SAUCE: (efi-lockdown) efi: Add sysctls for secureboot and MokSBState
388 - [Config] Set values for UEFI secure boot lockdown options
389 - Disable virtualbox build
390 - Disable hio build
391 - SAUCE: securityfs: Replace CURRENT_TIME with current_time()
392 - Disable zfs build
393 - [Debian] Work out upstream tag for use with gen-auto-reconstruct
394 - SAUCE: Import aufs driver
395 - SAUCE: aufs -- Include linux/mm.h in fs/aufs/file.h
396 - [Config] Enable aufs
397 - SAUCE: perf callchain: Include errno.h on x86 unconditinally
398
399 [ Upstream Kernel Changes ]
400
401 * Rebase to v4.12-rc2
402
403 -- Seth Forshee <seth.forshee@canonical.com> Sun, 21 May 2017 23:44:44 -0500
404
405 linux (4.11.0-3.8) artful; urgency=low
406
407 [ Seth Forshee ]
408
409 * Release Tracking Bug
410 - LP: #1690999
411
412 * apparmor_parser hangs indefinitely when called by multiple threads
413 (LP: #1645037)
414 - SAUCE: apparmor: fix lock ordering for mkdir
415
416 * apparmor leaking securityfs pin count (LP: #1660846)
417 - SAUCE: apparmor: fix leak on securityfs pin count
418
419 * apparmor reference count leak when securityfs_setup_d_inode\ () fails
420 (LP: #1660845)
421 - SAUCE: apparmor: fix reference count leak when securityfs_setup_d_inode()
422 fails
423
424 * apparmor not checking error if security_pin_fs() fails (LP: #1660842)
425 - SAUCE: apparmor: fix not handling error case when securityfs_pin_fs() fails
426
427 * libvirt profile is blocking global setrlimit despite having no rlimit rule
428 (LP: #1679704)
429 - SAUCE: apparmor: fix complain mode failure for rlimit mediation
430 - apparmor: update auditing of rlimit check to provide capability information
431
432 * apparmor: does not provide a way to detect policy updataes (LP: #1678032)
433 - SAUCE: apparmor: add policy revision file interface
434
435 * apparmor does not make support of query data visible (LP: #1678023)
436 - SAUCE: apparmor: add label data availability to the feature set
437
438 * apparmor query interface does not make supported query info available
439 (LP: #1678030)
440 - SAUCE: apparmor: add information about the query inteface to the feature set
441
442 * change_profile incorrect when using namespaces with a compound stack
443 (LP: #1677959)
444 - SAUCE: apparmor: fix label parse for stacked labels
445
446 * Regression in 4.4.0-65-generic causes very frequent system crashes
447 (LP: #1669611)
448 - apparmor: sync of apparmor 3.6+ (17.04)
449
450 * Artful update to 4.11.1 stable release (LP: #1690814)
451 - dm ioctl: prevent stack leak in dm ioctl call
452 - drm/sti: fix GDP size to support up to UHD resolution
453 - power: supply: lp8788: prevent out of bounds array access
454 - brcmfmac: Ensure pointer correctly set if skb data location changes
455 - brcmfmac: Make skb header writable before use
456 - sparc64: fix fault handling in NGbzero.S and GENbzero.S
457 - refcount: change EXPORT_SYMBOL markings
458 - net: macb: fix phy interrupt parsing
459 - tcp: fix access to sk->sk_state in tcp_poll()
460 - geneve: fix incorrect setting of UDP checksum flag
461 - bpf: enhance verifier to understand stack pointer arithmetic
462 - bpf, arm64: fix jit branch offset related to ldimm64
463 - tcp: fix wraparound issue in tcp_lp
464 - net: ipv6: Do not duplicate DAD on link up
465 - net: usb: qmi_wwan: add Telit ME910 support
466 - tcp: do not inherit fastopen_req from parent
467 - ipv4, ipv6: ensure raw socket message is big enough to hold an IP header
468 - rtnetlink: NUL-terminate IFLA_PHYS_PORT_NAME string
469 - ipv6: initialize route null entry in addrconf_init()
470 - ipv6: reorder ip6_route_dev_notifier after ipv6_dev_notf
471 - tcp: randomize timestamps on syncookies
472 - bnxt_en: allocate enough space for ->ntp_fltr_bmap
473 - bpf: don't let ldimm64 leak map addresses on unprivileged
474 - net: mdio-mux: bcm-iproc: call mdiobus_free() in error path
475 - f2fs: sanity check segment count
476 - xen/arm,arm64: fix xen_dma_ops after 815dd18 "Consolidate get_dma_ops..."
477 - xen: Revert commits da72ff5bfcb0 and 72a9b186292d
478 - block: get rid of blk_integrity_revalidate()
479 - Linux 4.11.1
480
481 * Module signing exclusion for staging drivers does not work properly
482 (LP: #1690908)
483 - SAUCE: Fix module signing exclusion in package builds
484
485 * perf: qcom: Add L3 cache PMU driver (LP: #1689856)
486 - [Config] CONFIG_QCOM_L3_PMU=y
487 - perf: qcom: Add L3 cache PMU driver
488
489 * No PMU support for ACPI-based arm64 systems (LP: #1689661)
490 - drivers/perf: arm_pmu: rework per-cpu allocation
491 - drivers/perf: arm_pmu: manage interrupts per-cpu
492 - drivers/perf: arm_pmu: split irq request from enable
493 - drivers/perf: arm_pmu: remove pointless PMU disabling
494 - drivers/perf: arm_pmu: define armpmu_init_fn
495 - drivers/perf: arm_pmu: fold init into alloc
496 - drivers/perf: arm_pmu: factor out pmu registration
497 - drivers/perf: arm_pmu: simplify cpu_pmu_request_irqs()
498 - drivers/perf: arm_pmu: handle no platform_device
499 - drivers/perf: arm_pmu: rename irq request/free functions
500 - drivers/perf: arm_pmu: split cpu-local irq request/free
501 - drivers/perf: arm_pmu: move irq request/free into probe
502 - drivers/perf: arm_pmu: split out platform device probe logic
503 - arm64: add function to get a cpu's MADT GICC table
504 - [Config] CONFIG_ARM_PMU_ACPI=y
505 - drivers/perf: arm_pmu: add ACPI framework
506 - arm64: pmuv3: handle !PMUv3 when probing
507 - arm64: pmuv3: use arm_pmu ACPI framework
508
509 * Fix NVLINK2 TCE route (LP: #1690155)
510 - powerpc/powernv: Fix TCE kill on NVLink2
511
512 * CVE-2017-0605
513 - tracing: Use strlcpy() instead of strcpy() in __trace_find_cmdline()
514
515 * Miscellaneous Ubuntu changes
516 - [Config] Restore powerpc arch to annotations file
517 - [Config] Disable runtime testing modules
518 - [Config] Disable drivers not needed on s390x
519 - [Config] Update annotations for 4.11
520 - [Config] updateconfigs after apparmor updates
521
522 * Miscellaneous upstream changes
523 - apparmor: use SHASH_DESC_ON_STACK
524 - apparmor: fix invalid reference to index variable of iterator line 836
525 - apparmor: fix parameters so that the permission test is bypassed at boot
526 - apparmor: Make path_max parameter readonly
527 - apparmorfs: Combine two function calls into one in aa_fs_seq_raw_abi_show()
528 - apparmorfs: Use seq_putc() in two functions
529 - apparmor: provide information about path buffer size at boot
530 - apparmor: add/use fns to print hash string hex value
531
532 -- Seth Forshee <seth.forshee@canonical.com> Tue, 16 May 2017 00:39:13 -0500
533
534 linux (4.11.0-2.7) artful; urgency=low
535
536 * kernel-wedge fails in artful due to leftover squashfs-modules d-i files
537 (LP: #1688259)
538 - Remove squashfs-modules files from d-i
539 - [Config] as squashfs-modules is builtin kernel-image must Provides: it
540
541 * [Zesty] d-i: replace msm_emac with qcom_emac (LP: #1677297)
542 - Revert "UBUNTU: d-i: initrd needs msm_emac on amberwing platform."
543 - d-i: initrd needs qcom_emac on amberwing platform.
544
545 * update for V3 kernel bits and improved multiple fan slice support
546 (LP: #1470091)
547 - SAUCE: fan: tunnel multiple mapping mode (v3)
548
549 * Miscellaneous Ubuntu changes
550 - SAUCE: (noup) Update spl to 0.6.5.9-1ubuntu1, zfs to 0.6.5.9-5ubuntu5
551 - Enable zfs
552 - SAUCE: fan: add VXLAN implementation
553 - SAUCE: (efi-lockdown) efi: Add EFI_SECURE_BOOT bit
554 - SAUCE: (efi-lockdown) Add the ability to lock down access to the running
555 kernel image
556 - SAUCE: (efi-lockdown) efi: Lock down the kernel if booted in secure boot
557 mode
558 - SAUCE: (efi-lockdown) Enforce module signatures if the kernel is locked down
559 - SAUCE: (efi-lockdown) Restrict /dev/mem and /dev/kmem when the kernel is
560 locked down
561 - SAUCE: (efi-lockdown) Add a sysrq option to exit secure boot mode
562 - SAUCE: (efi-lockdown) kexec: Disable at runtime if the kernel is locked down
563 - SAUCE: (efi-lockdown) Copy secure_boot flag in boot params across kexec
564 reboot
565 - SAUCE: (efi-lockdown) kexec_file: Disable at runtime if securelevel has been
566 set
567 - SAUCE: (efi-lockdown) hibernate: Disable when the kernel is locked down
568 - SAUCE: (efi-lockdown) uswsusp: Disable when the kernel is locked down
569 - SAUCE: (efi-lockdown) PCI: Lock down BAR access when the kernel is locked
570 down
571 - SAUCE: (efi-lockdown) x86: Lock down IO port access when the kernel is
572 locked down
573 - SAUCE: (efi-lockdown) x86: Restrict MSR access when the kernel is locked
574 down
575 - SAUCE: (efi-lockdown) asus-wmi: Restrict debugfs interface when the kernel
576 is locked down
577 - SAUCE: (efi-lockdown) ACPI: Limit access to custom_method when the kernel is
578 locked down
579 - SAUCE: (efi-lockdown) acpi: Ignore acpi_rsdp kernel param when the kernel
580 has been locked down
581 - SAUCE: (efi-lockdown) acpi: Disable ACPI table override if the kernel is
582 locked down
583 - SAUCE: (efi-lockdown) acpi: Disable APEI error injection if the kernel is
584 locked down
585 - SAUCE: (efi-lockdown) Enable cold boot attack mitigation
586 - SAUCE: (efi-lockdown) bpf: Restrict kernel image access functions when the
587 kernel is locked down
588 - SAUCE: (efi-lockdown) scsi: Lock down the eata driver
589 - SAUCE: (efi-lockdown) Prohibit PCMCIA CIS storage when the kernel is locked
590 down
591 - SAUCE: (efi-lockdown) Lock down TIOCSSERIAL
592 - SAUCE: (efi-lockdown) Add EFI signature data types
593 - SAUCE: (efi-lockdown) Add an EFI signature blob parser and key loader.
594 - SAUCE: (efi-lockdown) KEYS: Add a system blacklist keyring
595 - SAUCE: (efi-lockdown) MODSIGN: Import certificates from UEFI Secure Boot
596 - SAUCE: (efi-lockdown) MODSIGN: Support not importing certs from db
597 - SAUCE: (efi-lockdown) MODSIGN: Don't try secure boot if EFI runtime is
598 disabled
599 - SAUCE: (efi-lockdown) efi: Sanitize boot_params in efi stub
600 - SAUCE: (efi-lockdown) efi: Add secure_boot state and status bit for
601 MokSBState
602 - SAUCE: (efi-lockdown) efi: Add sysctls for secureboot and MokSBState
603 - [Config] Set values for UEFI secure boot lockdown options
604 - Update dropped.txt
605
606 [ Upstream Kernel Changes ]
607
608 * rebase to v4.11
609
610 -- Seth Forshee <seth.forshee@canonical.com> Fri, 05 May 2017 07:43:14 -0500
611
612 linux (4.11.0-1.6) artful; urgency=low
613
614 * Miscellaneous Ubuntu changes
615 - [Debian] Use default compression for all packages
616 - SAUCE: (namespace) block_dev: Support checking inode permissions in
617 lookup_bdev()
618 - SAUCE: (namespace) block_dev: Check permissions towards block device inode
619 when mounting
620 - SAUCE: (namespace) mtd: Check permissions towards mtd block device inode
621 when mounting
622 - SAUCE: (namespace) fs: Allow superblock owner to change ownership of inodes
623 - SAUCE: (namespace) fs: Don't remove suid for CAP_FSETID for userns root
624 - SAUCE: (namespace) fs: Allow superblock owner to access do_remount_sb()
625 - SAUCE: (namespace) capabilities: Allow privileged user in s_user_ns to set
626 security.* xattrs
627 - SAUCE: (namespace) fs: Allow CAP_SYS_ADMIN in s_user_ns to freeze and thaw
628 filesystems
629 - SAUCE: (namespace) fuse: Add support for pid namespaces
630 - SAUCE: (namespace) fuse: Support fuse filesystems outside of init_user_ns
631 - SAUCE: (namespace) fuse: Restrict allow_other to the superblock's namespace
632 or a descendant
633 - SAUCE: (namespace) fuse: Allow user namespace mounts
634 - SAUCE: (namespace) ext4: Add support for unprivileged mounts from user
635 namespaces
636 - SAUCE: (namespace) evm: Don't update hmacs in user ns mounts
637 - SAUCE: (namespace) ext4: Add module parameter to enable user namespace
638 mounts
639 - SAUCE: (namespace) block_dev: Forbid unprivileged mounting when device is
640 opened for writing
641
642 -- Seth Forshee <seth.forshee@canonical.com> Wed, 26 Apr 2017 10:08:29 -0500
643
644 linux (4.11.0-0.5) artful; urgency=low
645
646 * [Hyper-V][SAUCE] pci-hyperv: Use only 16 bit integer for PCI domain
647 (LP: #1684971)
648 - SAUCE: pci-hyperv: Use only 16 bit integer for PCI domain
649
650 * [Hyper-V] Ubuntu 14.04.2 LTS Generation 2 SCSI Errors on VSS Based Backups
651 (LP: #1470250)
652 - SAUCE: Tools: hv: vss: Thaw the filesystem and continue after freeze fails
653
654 * Enable virtual scsi server driver for Power (LP: #1615665)
655 - SAUCE: Return TCMU-generated sense data to fabric module
656
657 * include/linux/security.h header syntax error with !CONFIG_SECURITYFS
658 (LP: #1630990)
659 - SAUCE: (no-up) include/linux/security.h -- fix syntax error with
660 CONFIG_SECURITYFS=n
661
662 * Miscellaneous Ubuntu changes
663 - SAUCE: Import aufs driver
664 - [Config] Enable aufs
665 - [Debian] Add script to update virtualbox
666 - ubuntu: vbox -- Update to 5.1.20-dfsg-2
667 - Enable vbox
668 - SAUCE: aufs -- Include linux/mm.h in fs/aufs/file.h
669
670 [ Upstream Kernel Changes ]
671
672 * rebase to v4.11-rc8
673
674 -- Seth Forshee <seth.forshee@canonical.com> Tue, 25 Apr 2017 13:42:54 -0500
675
676 linux (4.11.0-0.4) zesty; urgency=low
677
678 * POWER9: Improve performance on memory management (LP: #1681429)
679 - SAUCE: powerpc/mm/radix: Don't do page walk cache flush when doing full mm
680 flush
681 - SAUCE: powerpc/mm/radix: Remove unnecessary ptesync
682
683 * Miscellaneous Ubuntu changes
684 - find-missing-sauce.sh
685
686 [ Upstream Kernel Changes ]
687
688 * rebase to v4.11-rc7
689
690 -- Seth Forshee <seth.forshee@canonical.com> Tue, 18 Apr 2017 08:19:43 -0500
691
692 linux (4.11.0-0.3) zesty; urgency=low
693
694 * Disable CONFIG_HVC_UDBG on ppc64el (LP: #1680888)
695 - [Config] Disable CONFIG_HVC_UDBG on ppc64el
696
697 * smartpqi driver needed in initram disk and installer (LP: #1680156)
698 - [Config] Add smartpqi to d-i
699
700 * Disable CONFIG_SECURITY_SELINUX_DISABLE (LP: #1680315)
701 - [Config] CONFIG_SECURITY_SELINUX_DISABLE=n
702
703 * Miscellaneous Ubuntu changes
704 - [Config] flash-kernel should be a Breaks
705 - [Config] drop the info directory
706 - [Config] drop NOTES as obsolete
707 - [Config] drop changelog.historical as obsolete
708 - rebase to v4.11-rc6
709
710 [ Upstream Kernel Changes ]
711
712 * rebase to v4.11-rc6
713
714 -- Tim Gardner <tim.gardner@canonical.com> Tue, 11 Apr 2017 07:16:52 -0600
715
716 linux (4.11.0-0.2) zesty; urgency=low
717
718 [ Upstream Kernel Changes ]
719
720 * rebase to v4.11-rc5
721
722 -- Tim Gardner <tim.gardner@canonical.com> Mon, 03 Apr 2017 08:26:07 +0100
723
724 linux (4.11.0-0.1) zesty; urgency=low
725
726 [ Upstream Kernel Changes ]
727
728 * rebase to v4.11-rc4
729 - LP: #1591053
730
731 -- Tim Gardner <tim.gardner@canonical.com> Mon, 20 Mar 2017 05:15:32 -0600
732
733 linux (4.11.0-0.0) zesty; urgency=low
734
735 * dummy entry
736
737 -- Tim Gardner <tim.gardner@canonical.com> Mon, 20 Mar 2017 05:15:32 -0600