Skip to content

Commit

Permalink
UBUNTU: Ubuntu-5.1.0-2.2
Browse files Browse the repository at this point in the history
Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
  • Loading branch information
Seth Forshee committed May 14, 2019
1 parent 8193c63 commit 0b25e6e
Showing 2 changed files with 171 additions and 6 deletions.
175 changes: 170 additions & 5 deletions debian.master/changelog
Original file line number Diff line number Diff line change
@@ -1,10 +1,175 @@
linux (5.1.0-2.2) UNRELEASED; urgency=medium
linux (5.1.0-2.2) eoan; urgency=medium

CHANGELOG: Do not edit directly. Autogenerated at release.
CHANGELOG: Use the printchanges target to see the curent changes.
CHANGELOG: Use the insertchanges target to create the final log.
* Packaging resync (LP: #1786013)
- [Packaging] resync git-ubuntu-log

* Eoan update: v5.1.2 upstream stable release (LP: #1829050)
- x86/msr-index: Cleanup bit defines
- x86/speculation: Consolidate CPU whitelists
- x86/speculation/mds: Add basic bug infrastructure for MDS
- x86/speculation/mds: Add BUG_MSBDS_ONLY
- x86/kvm: Expose X86_FEATURE_MD_CLEAR to guests
- x86/speculation/mds: Add mds_clear_cpu_buffers()
- x86/speculation/mds: Clear CPU buffers on exit to user
- x86/kvm/vmx: Add MDS protection when L1D Flush is not active
- x86/speculation/mds: Conditionally clear CPU buffers on idle entry
- x86/speculation/mds: Add mitigation control for MDS
- x86/speculation/mds: Add sysfs reporting for MDS
- x86/speculation/mds: Add mitigation mode VMWERV
- Documentation: Move L1TF to separate directory
- Documentation: Add MDS vulnerability documentation
- x86/speculation/mds: Add mds=full,nosmt cmdline option
- x86/speculation: Move arch_smt_update() call to after mitigation decisions
- x86/speculation/mds: Add SMT warning message
- x86/speculation/mds: Fix comment
- x86/speculation/mds: Print SMT vulnerable on MSBDS with mitigations off
- cpu/speculation: Add 'mitigations=' cmdline option
- x86/speculation: Support 'mitigations=' cmdline option
- powerpc/speculation: Support 'mitigations=' cmdline option
- s390/speculation: Support 'mitigations=' cmdline option
- x86/speculation/mds: Add 'mitigations=' support for MDS
- x86/mds: Add MDSUM variant to the MDS documentation
- Documentation: Correct the possible MDS sysfs values
- x86/speculation/mds: Fix documentation typo
- Linux 5.1.2

* Eoan update: v5.1.1 upstream stable release (LP: #1829046)
- Drivers: hv: vmbus: Remove the undesired put_cpu_ptr() in hv_synic_cleanup()
- ubsan: Fix nasty -Wbuiltin-declaration-mismatch GCC-9 warnings
- staging: greybus: power_supply: fix prop-descriptor request size
- staging: wilc1000: Avoid GFP_KERNEL allocation from atomic context.
- staging: most: cdev: fix chrdev_region leak in mod_exit
- staging: most: sound: pass correct device when creating a sound card
- usb: dwc3: Allow building USB_DWC3_QCOM without EXTCON
- usb: dwc3: Fix default lpm_nyet_threshold value
- USB: serial: f81232: fix interrupt worker not stop
- USB: cdc-acm: fix unthrottle races
- usb-storage: Set virt_boundary_mask to avoid SG overflows
- genirq: Prevent use-after-free and work list corruption
- intel_th: pci: Add Comet Lake support
- iio: adc: qcom-spmi-adc5: Fix of-based module autoloading
- cpufreq: armada-37xx: fix frequency calculation for opp
- ACPI / LPSS: Use acpi_lpss_* instead of acpi_subsys_* functions for
hibernate
- soc: sunxi: Fix missing dependency on REGMAP_MMIO
- scsi: lpfc: change snprintf to scnprintf for possible overflow
- scsi: qla2xxx: Fix incorrect region-size setting in optrom SYSFS routines
- scsi: qla2xxx: Set remote port devloss timeout to 0
- scsi: qla2xxx: Fix device staying in blocked state
- Bluetooth: hidp: fix buffer overflow
- Bluetooth: Align minimum encryption key size for LE and BR/EDR connections
- Bluetooth: Fix not initializing L2CAP tx_credits
- Bluetooth: hci_bcm: Fix empty regulator supplies for Intel Macs
- UAS: fix alignment of scatter/gather segments
- ASoC: Intel: avoid Oops if DMA setup fails
- i3c: Fix a shift wrap bug in i3c_bus_set_addr_slot_status()
- locking/futex: Allow low-level atomic operations to return -EAGAIN
- arm64: futex: Bound number of LDXR/STXR loops in FUTEX_WAKE_OP
- Linux 5.1.1

* shiftfs: lock security sensitive superblock flags (LP: #1827122)
- SAUCE: shiftfs: lock down certain superblock flags

* Please package libbpf (which is done out of the kernel src) in Debian [for
19.10] (LP: #1826410)
- SAUCE: tools -- fix add ability to disable libbfd

* ratelimit cma_alloc messages (LP: #1828092)
- SAUCE: cma: ratelimit cma_alloc error messages

* Headphone jack switch sense is inverted: plugging in headphones disables
headphone output (LP: #1824259)
- ASoC: rt5645: Headphone Jack sense inverts on the LattePanda board

* There are 4 HDMI/Displayport audio output listed in sound setting without
attach any HDMI/DP monitor (LP: #1827967)
- ALSA: hda/hdmi - Read the pin sense from register when repolling
- ALSA: hda/hdmi - Consider eld_valid when reporting jack event

* CONFIG_LOG_BUF_SHIFT set to 14 is too low on arm64 (LP: #1824864)
- [Config] CONFIG_LOG_BUF_SHIFT=18 on all 64bit arches

* CTAUTO:DevOps:860.50:devops4fp1:Error occurred during LINUX Dmesg error
Checking for all LINUX clients for devops4p10 (LP: #1766201)
- SAUCE: integrity: downgrade error to warning

* linux-buildinfo: pull out ABI information into its own package
(LP: #1806380)
- [Packaging] autoreconstruct -- base tag is always primary mainline version

* [SRU] Please sync vbox modules from virtualbox 6.0.6 on next kernel update
(LP: #1825210)
- vbox-update: updates for renamed makefiles
- ubuntu: vbox -- update to 6.0.6-dfsg-1

* autofs kernel module missing (LP: #1824333)
- [Config] Update autofs4 path in inclusion list

* The Realtek card reader does not enter PCIe 1.1/1.2 (LP: #1825487)
- SAUCE: misc: rtsx: Fixed rts5260 power saving parameter and sd glitch

* CVE-2019-3874
- sctp: implement memory accounting on tx path
- sctp: implement memory accounting on rx path

* apparmor does not start in Disco LXD containers (LP: #1824812)
- SAUCE: shiftfs: use separate llseek method for directories

* Miscellaneous Ubuntu changes
- [Packaging] autoreconstruct -- remove for -rc kernels
- SAUCE: (efi-lockdown) debugfs: avoid EPERM when no open file operation
defined
- SAUCE: (efi-lockdown) efi: Sanitize boot_params in efi stub
- SAUCE: (efi-lockdown) furter KEXEC_VERIFY_SIG -> KEXEC_SIG updates
- [Config] (efi-lockdown): update configs after efi lockdown patch refresh
- [Packaging] don't delete efi_parser.c
- vbox-update -- do not fix up KERN_DIR or KBUILD_EXTMOD
- ubuntu: vbox -- update to 6.0.6-dfsg-2
- add nvidia-418 dkms build
- remove virtualbox guest drivers
- [Packaging] dkms-build -- expand paths searched for make.log files
- add virtualbox-guest-dkms dkms package build
- enable vbox dkms build for amd64 and i386
- [Config] update configs for v5.1(-rc7)? rebase
- update dkms package versions
- Add the ability to lock down access to the running kernel image
- Enforce module signatures if the kernel is locked down
- Restrict /dev/{mem,kmem,port} when the kernel is locked down
- kexec_load: Disable at runtime if the kernel is locked down
- Copy secure_boot flag in boot params across kexec reboot
- kexec_file: split KEXEC_VERIFY_SIG into KEXEC_SIG and KEXEC_SIG_FORCE
- kexec_file: Restrict at runtime if the kernel is locked down
- hibernate: Disable when the kernel is locked down
- uswsusp: Disable when the kernel is locked down
- PCI: Lock down BAR access when the kernel is locked down
- x86: Lock down IO port access when the kernel is locked down
- x86/msr: Restrict MSR access when the kernel is locked down
- ACPI: Limit access to custom_method when the kernel is locked down
- acpi: Ignore acpi_rsdp kernel param when the kernel has been locked down
- acpi: Disable ACPI table override if the kernel is locked down
- acpi: Disable APEI error injection if the kernel is locked down
- Prohibit PCMCIA CIS storage when the kernel is locked down
- Lock down TIOCSSERIAL
- Lock down module params that specify hardware parameters (eg. ioport)
- x86/mmiotrace: Lock down the testmmiotrace module
- Lock down /proc/kcore
- Lock down kprobes
- bpf: Restrict kernel image access functions when the kernel is locked down
- Lock down perf
- debugfs: Restrict debugfs when the kernel is locked down
- lockdown: Print current->comm in restriction messages
- kexec: Allow kexec_file() with appropriate IMA policy when locked down
- Make get_cert_list() not complain about cert lists that aren't present.
- Add efi_status_to_str() and rework efi_status_to_err().
- Make get_cert_list() use efi_status_to_str() to print error messages.
- efi: Add an EFI_SECURE_BOOT flag to indicate secure boot mode
- efi: Lock down the kernel if booted in secure boot mode
- KEYS: Make use of platform keyring for module signature verify

* Miscellaneous upstream changes
- ALSA: hdea/realtek - Headset fixup for System76 Gazelle (gaze14)

-- Seth Forshee <seth.forshee@canonical.com> Fri, 26 Apr 2019 11:34:51 -0500
-- Seth Forshee <seth.forshee@canonical.com> Tue, 14 May 2019 12:32:56 -0500

linux (5.1.0-1.1) eoan; urgency=medium

2 changes: 1 addition & 1 deletion debian.master/reconstruct
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
# Recreate any symlinks created since the orig.
# Remove any files deleted from the orig.
rm -f 'Documentation/admin-guide/l1tf.rst'
chmod +x 'scripts/kmsg-doc'
chmod +x 'ubuntu/vbox-update'
chmod +x 'update-version-dkms'
exit 0

0 comments on commit 0b25e6e

Please sign in to comment.