[ubuntu/eoan-proposed] linux 5.2.0-8.9 (Accepted)

Seth Forshee seth.forshee+lp at canonical.com
Tue Jul 9 13:03:39 UTC 2019


linux (5.2.0-8.9) eoan; urgency=medium

  * linux: 5.2.0-8.9 -proposed tracker (LP: #1835700)

  * Miscellaneous Ubuntu changes
    - [Packaging] replace zfs and spl build with zfs 0.8.1-1ubuntu1
    - SAUCE: test_bpf: remove expected fail for Ctx heavy transformations test on
      s390
    - SAUCE: add -fcf-protection=none to retpoline flags
    - SAUCE: usbip: ensure strings copied using strncpy are null-terminated
    - SAUCE: usbip: add -Wno-address-of-packed-member to EXTRA_CFLAGS
    - SAUCE: perf jvmti: ensure strncpy result is null-terminated
    - update dkms package versions
    - add removed zfs modules to modules.ignore

  [ Upstream Kernel Changes ]

  * Rebase to v5.2

linux (5.2.0-7.8) eoan; urgency=medium

  * Kernel panic upon resetting ixgbe SR-IOV VFIO virtual function using 5.0
    kernel (LP: #1829652)
    - SAUCE: ixgbe: Avoid NULL pointer dereference with VF on non-IPsec hw

  * Hi1620 driver updates from upstream 5.2 merge window (LP: #1830815)
    - net: hns3: initialize CPU reverse mapping
    - net: hns3: refine the flow director handle
    - net: hns3: add aRFS support for PF
    - net: hns3: fix for FEC configuration
    - RDMA/hns: Remove unnecessary print message in aeq
    - RDMA/hns: Update CQE specifications
    - RDMA/hns: Move spin_lock_irqsave to the correct place
    - RDMA/hns: Remove jiffies operation in disable interrupt context
    - RDMA/hns: Replace magic numbers with #defines
    - net: hns3: fix compile warning without CONFIG_RFS_ACCEL
    - net: hns3: fix for HNS3_RXD_GRO_SIZE_M macro
    - net: hns3: add support for dump firmware statistics by debugfs
    - net: hns3: use HCLGE_STATE_NIC_REGISTERED to indicate PF NIC client has
      registered
    - net: hns3: use HCLGE_STATE_ROCE_REGISTERED to indicate PF ROCE client has
      registered
    - net: hns3: use HCLGEVF_STATE_NIC_REGISTERED to indicate VF NIC client has
      registered
    - net: hns3: modify hclge_init_client_instance()
    - net: hns3: modify hclgevf_init_client_instance()
    - net: hns3: add handshake with hardware while doing reset
    - net: hns3: stop schedule reset service while unloading driver
    - net: hns3: adjust hns3_uninit_phy()'s location in the hns3_client_uninit()
    - net: hns3: fix a memory leak issue for hclge_map_unmap_ring_to_vf_vector
    - RDMA/hns: Bugfix for posting multiple srq work request
    - net: hns3: remove redundant core reset
    - net: hns3: don't configure new VLAN ID into VF VLAN table when it's full
    - net: hns3: fix VLAN filter restore issue after reset
    - net: hns3: set the port shaper according to MAC speed
    - net: hns3: add a check to pointer in error_detected and slot_reset
    - net: hns3: set ops to null when unregister ad_dev
    - net: hns3: add handling of two bits in MAC tunnel interrupts
    - net: hns3: remove setting bit of reset_requests when handling mac tunnel
      interrupts
    - net: hns3: add opcode about query and clear RAS & MSI-X to special opcode
    - net: hns3: delay and separate enabling of NIC and ROCE HW errors
    - RDMA/hns: fix inverted logic of readl read and shift
    - RDMA/hns: Bugfix for filling the sge of srq
    - net: hns3: log detail error info of ROCEE ECC and AXI errors
    - net: hns3: fix wrong size of mailbox responding data
    - net: hns3: make HW GRO handling compliant with SW GRO
    - net: hns3: replace numa_node_id with numa_mem_id for buffer reusing
    - net: hns3: refactor hns3_get_new_int_gl function
    - net: hns3: trigger VF reset if a VF has an over_8bd_nfe_err
    - net: hns3: delete the redundant user NIC codes
    - net: hns3: small changes for magic numbers
    - net: hns3: use macros instead of magic numbers
    - net: hns3: refactor PF/VF RSS hash key configuration
    - net: hns3: some modifications to simplify and optimize code
    - net: hns3: fix some coding style issues
    - net: hns3: delay setting of reset level for hw errors until slot_reset is
      called
    - net: hns3: fix avoid unnecessary resetting for the H/W errors which do not
      require reset
    - net: hns3: process H/W errors occurred before HNS dev initialization
    - net: hns3: add recovery for the H/W errors occurred before the HNS dev
      initialization
    - net: hns3: some changes of MSI-X bits in PPU(RCB)
    - net: hns3: extract handling of mpf/pf msi-x errors into functions
    - net: hns3: clear restting state when initializing HW device
    - net: hns3: free irq when exit from abnormal branch
    - net: hns3: fix for dereferencing before null checking
    - net: hns3: fix for skb leak when doing selftest
    - net: hns3: delay ring buffer clearing during reset
    - net: hns3: some variable modification
    - net: hns3: fix dereference of ae_dev before it is null checked
    - scsi: hisi_sas: Delete PHY timers when rmmod or probe failed
    - scsi: hisi_sas: Fix the issue of argument mismatch of printing ecc errors
    - scsi: hisi_sas: Reduce HISI_SAS_SGE_PAGE_CNT in size
    - scsi: hisi_sas: Change the type of some numbers to unsigned
    - scsi: hisi_sas: Ignore the error code between phy down to phy up
    - scsi: hisi_sas: Disable stash for v3 hw
    - net: hns3: Add missing newline at end of file
    - RDMa/hns: Don't stuck in endless timeout loop

  * Sometimes touchpad automatically trigger double click (LP: #1833484)
    - SAUCE: i2c: designware: Add disable runtime pm quirk

  * Add pointstick support on HP ZBook 17 G5 (LP: #1833387)
    - Revert "HID: multitouch: Support ALPS PTP stick with pid 0x120A"

  * depmod may prefer unsigned l-r-m nvidia modules to signed modules
    (LP: #1834479)
    - [Packaging] dkms-build--nvidia-N -- clean up unsigned ko files

  * Miscellaneous Ubuntu changes
    - SAUCE: selftests/powerpc: disable signal_fuzzer test

  [ Upstream Kernel Changes ]

  * Rebase to v5.2-rc7

linux (5.2.0-6.7) eoan; urgency=medium

  * hinic: fix oops due to race in set_rx_mode (LP: #1832048)
    - hinic: fix a bug in set rx mode

  * Miscellaneous Ubuntu changes
    - rebase to v5.2-rc6

  [ Upstream Kernel Changes ]

  * Rebase to v5.2-rc6

linux (5.2.0-5.6) eoan; urgency=medium

  * QCA9377 isn't being recognized sometimes (LP: #1757218)
    - SAUCE: USB: Disable USB2 LPM at shutdown

  * shiftfs: allow changing ro/rw for subvolumes (LP: #1832316)
    - SAUCE: shiftfs: allow changing ro/rw for subvolumes

  * Miscellaneous Ubuntu changes
    - update dkms package versions
    - [Packaging] replace nvidia-418 dkms build with nvidia-430
    - SAUCE: import aufs driver

  [ Upstream Kernel Changes ]

  * Rebase to v5.2-rc5

linux (5.2.0-4.5) eoan; urgency=medium

  * arm64: cma_alloc errors at boot (LP: #1823753)
    - [Config] Bump CMA_SIZE_MBYTES to 32 on arm64
    - dma-contiguous: add dma_{alloc,free}_contiguous() helpers
    - dma-contiguous: use fallback alloc_pages for single pages
    - dma-contiguous: fix !CONFIG_DMA_CMA version of dma_{alloc,
      free}_contiguous()

  * Miscellaneous Ubuntu changes
    - [Config] CONFIG_MFD_TQMX86=n for s390x
    - [Config] CONFIG_GPIO_AMD_FCH=n for s390x
    - [Config] CONFIG_BACKLIGHT_CLASS_DEVICE=n on s390x
    - [Config] CONFIG_LCD_CLASS_DEVICE=n for s390x
    - [Config] CONFIG_DRM_ETNAVIV=m for armhf generic-lpae
    - [Config] CONFIG_DRM_NOUVEAU_SVM=n
    - [Config] CONFIG_HWMON=n for s390x
    - [Config] CONFIG_NEW_LEDS=n for s390x
    - [Config] CONFIG_MTD_NAND_OMAP2=y for armhf
    - [Config] CONFIG_VOP_BUS=n for non-amd64 arches
    - [Config] CONFIG_TI_CPSW_PHY_SEL=n
    - [Config] CONFIG_INTERCONNECT=n for s390x
    - [Config] CONFIG_SCSI_GDTH=n for s390x
    - [Config] CONFIG_PACKING=n for s390x
    - [Config] CONFIG_ARCH_MILBEAUT=y for armhf
    - [Config] update annotations following config review
    - update dkms package versions
    - [Config] enable nvidia dkms build

  [ Upstream Kernel Changes ]

  * Rebase to v5.2-rc4

linux (5.2.0-3.4) eoan; urgency=medium

  * [18.04/18.10] File libperf-jvmti.so is missing in linux-tools-common deb on
    Ubuntu (LP: #1761379)
    - [Packaging] Support building libperf-jvmti.so

  * Miscellaneous Ubuntu changes
    - SAUCE: Revert "bpf, selftest: test global data/bss/rodata sections"
    - update dkms package versions
    - [Config] enable zfs
    - rebase to v5.2-rc3

  [ Upstream Kernel Changes ]

  * Rebase to v5.2-rc3

linux (5.2.0-2.3) eoan; urgency=medium

  * Miscellaneous Ubuntu changes
    - SAUCE: perf arm64: Fix mksyscalltbl when system kernel headers are ahead of
      the kernel

linux (5.2.0-1.2) eoan; urgency=medium

  * Miscellaneous Ubuntu changes
    - [Config] CONFIG_INTEGRITY_PLATFORM_KEYRING=y
    - update dkms package versions
    - [Config] enable vbox dkms build
    - update dkms package versions

  [ Upstream Kernel Changes ]

  * Rebase to v5.2-rc2

linux (5.2.0-0.1) eoan; urgency=medium

  * Miscellaneous Ubuntu changes
    - SAUCE: import aufs driver
    - [Packaging] disable ZFS
    - [Packaging] disable nvidia
    - [Packaging] dkms-build -- expand paths searched for make.log files
    - add virtualbox-guest-dkms dkms package build
    - enable vbox dkms build for amd64 and i386
    - update dkms package versions
    - SAUCE: (efi-lockdown) Add the ability to lock down access to the running
      kernel image
    - SAUCE: (efi-lockdown) Enforce module signatures if the kernel is locked down
    - SAUCE: (efi-lockdown) Restrict /dev/{mem,kmem,port} when the kernel is
      locked down
    - SAUCE: (efi-lockdown) kexec_load: Disable at runtime if the kernel is locked
      down
    - SAUCE: (efi-lockdown) Copy secure_boot flag in boot params across kexec
      reboot
    - SAUCE: (efi-lockdown) kexec_file: split KEXEC_VERIFY_SIG into KEXEC_SIG and
      KEXEC_SIG_FORCE
    - SAUCE: (efi-lockdown) kexec_file: Restrict at runtime if the kernel is
      locked down
    - SAUCE: (efi-lockdown) hibernate: Disable when the kernel is locked down
    - SAUCE: (efi-lockdown) uswsusp: Disable when the kernel is locked down
    - SAUCE: (efi-lockdown) PCI: Lock down BAR access when the kernel is locked
      down
    - SAUCE: (efi-lockdown) x86: Lock down IO port access when the kernel is
      locked down
    - SAUCE: (efi-lockdown) x86/msr: Restrict MSR access when the kernel is locked
      down
    - SAUCE: (efi-lockdown) ACPI: Limit access to custom_method when the kernel is
      locked down
    - SAUCE: (efi-lockdown) acpi: Ignore acpi_rsdp kernel param when the kernel
      has been locked down
    - SAUCE: (efi-lockdown) acpi: Disable ACPI table override if the kernel is
      locked down
    - SAUCE: (efi-lockdown) acpi: Disable APEI error injection if the kernel is
      locked down
    - SAUCE: (efi-lockdown) Prohibit PCMCIA CIS storage when the kernel is locked
      down
    - SAUCE: (efi-lockdown) Lock down TIOCSSERIAL
    - SAUCE: (efi-lockdown) Lock down module params that specify hardware
      parameters (eg. ioport)
    - SAUCE: (efi-lockdown) x86/mmiotrace: Lock down the testmmiotrace module
    - SAUCE: (efi-lockdown) Lock down /proc/kcore
    - SAUCE: (efi-lockdown) Lock down kprobes
    - SAUCE: (efi-lockdown) bpf: Restrict kernel image access functions when the
      kernel is locked down
    - SAUCE: (efi-lockdown) Lock down perf
    - SAUCE: (efi-lockdown) debugfs: Restrict debugfs when the kernel is locked
      down
    - SAUCE: (efi-lockdown) lockdown: Print current->comm in restriction messages
    - SAUCE: (efi-lockdown) kexec: Allow kexec_file() with appropriate IMA policy
      when locked down
    - SAUCE: (efi-lockdown) Make get_cert_list() not complain about cert lists
      that aren't present.
    - SAUCE: (efi-lockdown) Add efi_status_to_str() and rework
      efi_status_to_err().
    - SAUCE: (efi-lockdown) Make get_cert_list() use efi_status_to_str() to print
      error messages.
    - SAUCE: (efi-lockdown) efi: Add an EFI_SECURE_BOOT flag to indicate secure
      boot mode
    - SAUCE: (efi-lockdown) efi: Lock down the kernel if booted in secure boot
      mode
    - SAUCE: (efi-lockdown) KEYS: Make use of platform keyring for module
      signature verify
    - SAUCE: (efi-lockdown) debugfs: avoid EPERM when no open file operation
      defined
    - SAUCE: (efi-lockdown) efi: Sanitize boot_params in efi stub
    - SAUCE: (efi-lockdown) furter KEXEC_VERIFY_SIG -> KEXEC_SIG updates
    - SAUCE: (efi-lockdown) arm64: add kernel config option to lock down when in
      Secure Boot mode
    - update dkms package versions
    - [Config] disable vbox build
    - SAUCE: s390: mark __cpacf_check_opcode() and cpacf_query_func() as
      __always_inline
    - SAUCE: IB/mlx5: use size_t instead of u64 when dividing

  [ Upstream Kernel Changes ]

  * Rebase to v5.2-rc1

linux (5.2.0-0.0) eoan; urgency=medium

  * Dummy entry.

linux (5.1.0-2.2) eoan; urgency=medium

  * Packaging resync (LP: #1786013)
    - [Packaging] resync git-ubuntu-log

  * Eoan update: v5.1.2 upstream stable release (LP: #1829050)
    - x86/msr-index: Cleanup bit defines
    - x86/speculation: Consolidate CPU whitelists
    - x86/speculation/mds: Add basic bug infrastructure for MDS
    - x86/speculation/mds: Add BUG_MSBDS_ONLY
    - x86/kvm: Expose X86_FEATURE_MD_CLEAR to guests
    - x86/speculation/mds: Add mds_clear_cpu_buffers()
    - x86/speculation/mds: Clear CPU buffers on exit to user
    - x86/kvm/vmx: Add MDS protection when L1D Flush is not active
    - x86/speculation/mds: Conditionally clear CPU buffers on idle entry
    - x86/speculation/mds: Add mitigation control for MDS
    - x86/speculation/mds: Add sysfs reporting for MDS
    - x86/speculation/mds: Add mitigation mode VMWERV
    - Documentation: Move L1TF to separate directory
    - Documentation: Add MDS vulnerability documentation
    - x86/speculation/mds: Add mds=full,nosmt cmdline option
    - x86/speculation: Move arch_smt_update() call to after mitigation decisions
    - x86/speculation/mds: Add SMT warning message
    - x86/speculation/mds: Fix comment
    - x86/speculation/mds: Print SMT vulnerable on MSBDS with mitigations off
    - cpu/speculation: Add 'mitigations=' cmdline option
    - x86/speculation: Support 'mitigations=' cmdline option
    - powerpc/speculation: Support 'mitigations=' cmdline option
    - s390/speculation: Support 'mitigations=' cmdline option
    - x86/speculation/mds: Add 'mitigations=' support for MDS
    - x86/mds: Add MDSUM variant to the MDS documentation
    - Documentation: Correct the possible MDS sysfs values
    - x86/speculation/mds: Fix documentation typo
    - Linux 5.1.2

  * Eoan update: v5.1.1 upstream stable release (LP: #1829046)
    - Drivers: hv: vmbus: Remove the undesired put_cpu_ptr() in hv_synic_cleanup()
    - ubsan: Fix nasty -Wbuiltin-declaration-mismatch GCC-9 warnings
    - staging: greybus: power_supply: fix prop-descriptor request size
    - staging: wilc1000: Avoid GFP_KERNEL allocation from atomic context.
    - staging: most: cdev: fix chrdev_region leak in mod_exit
    - staging: most: sound: pass correct device when creating a sound card
    - usb: dwc3: Allow building USB_DWC3_QCOM without EXTCON
    - usb: dwc3: Fix default lpm_nyet_threshold value
    - USB: serial: f81232: fix interrupt worker not stop
    - USB: cdc-acm: fix unthrottle races
    - usb-storage: Set virt_boundary_mask to avoid SG overflows
    - genirq: Prevent use-after-free and work list corruption
    - intel_th: pci: Add Comet Lake support
    - iio: adc: qcom-spmi-adc5: Fix of-based module autoloading
    - cpufreq: armada-37xx: fix frequency calculation for opp
    - ACPI / LPSS: Use acpi_lpss_* instead of acpi_subsys_* functions for
      hibernate
    - soc: sunxi: Fix missing dependency on REGMAP_MMIO
    - scsi: lpfc: change snprintf to scnprintf for possible overflow
    - scsi: qla2xxx: Fix incorrect region-size setting in optrom SYSFS routines
    - scsi: qla2xxx: Set remote port devloss timeout to 0
    - scsi: qla2xxx: Fix device staying in blocked state
    - Bluetooth: hidp: fix buffer overflow
    - Bluetooth: Align minimum encryption key size for LE and BR/EDR connections
    - Bluetooth: Fix not initializing L2CAP tx_credits
    - Bluetooth: hci_bcm: Fix empty regulator supplies for Intel Macs
    - UAS: fix alignment of scatter/gather segments
    - ASoC: Intel: avoid Oops if DMA setup fails
    - i3c: Fix a shift wrap bug in i3c_bus_set_addr_slot_status()
    - locking/futex: Allow low-level atomic operations to return -EAGAIN
    - arm64: futex: Bound number of LDXR/STXR loops in FUTEX_WAKE_OP
    - Linux 5.1.1

  * shiftfs: lock security sensitive superblock flags (LP: #1827122)
    - SAUCE: shiftfs: lock down certain superblock flags

  * Please package libbpf (which is done out of the kernel src) in Debian [for
    19.10] (LP: #1826410)
    - SAUCE: tools -- fix add ability to disable libbfd

  * ratelimit cma_alloc messages (LP: #1828092)
    - SAUCE: cma: ratelimit cma_alloc error messages

  * Headphone jack switch sense is inverted: plugging in headphones disables
    headphone output (LP: #1824259)
    - ASoC: rt5645: Headphone Jack sense inverts on the LattePanda board

  * There are 4 HDMI/Displayport audio output listed in sound setting without
    attach any HDMI/DP monitor (LP: #1827967)
    - ALSA: hda/hdmi - Read the pin sense from register when repolling
    - ALSA: hda/hdmi - Consider eld_valid when reporting jack event

  * CONFIG_LOG_BUF_SHIFT set to 14 is too low on arm64 (LP: #1824864)
    - [Config] CONFIG_LOG_BUF_SHIFT=18 on all 64bit arches

  * CTAUTO:DevOps:860.50:devops4fp1:Error occurred during LINUX Dmesg error
    Checking for all LINUX clients for devops4p10 (LP: #1766201)
    - SAUCE: integrity: downgrade error to warning

  * linux-buildinfo: pull out ABI information into its own package
    (LP: #1806380)
    - [Packaging] autoreconstruct -- base tag is always primary mainline version

  * [SRU] Please sync vbox modules from virtualbox 6.0.6 on next kernel update
    (LP: #1825210)
    - vbox-update: updates for renamed makefiles
    - ubuntu: vbox -- update to 6.0.6-dfsg-1

  * autofs kernel module missing (LP: #1824333)
    - [Config] Update autofs4 path in inclusion list

  * The Realtek card reader does not enter PCIe 1.1/1.2 (LP: #1825487)
    - SAUCE: misc: rtsx: Fixed rts5260 power saving parameter and sd glitch

  * CVE-2019-3874
    - sctp: implement memory accounting on tx path
    - sctp: implement memory accounting on rx path

  * apparmor does not start in Disco LXD containers (LP: #1824812)
    - SAUCE: shiftfs: use separate llseek method for directories

  * Miscellaneous Ubuntu changes
    - [Packaging] autoreconstruct -- remove for -rc kernels
    - SAUCE: (efi-lockdown) debugfs: avoid EPERM when no open file operation
      defined
    - SAUCE: (efi-lockdown) efi: Sanitize boot_params in efi stub
    - SAUCE: (efi-lockdown) furter KEXEC_VERIFY_SIG -> KEXEC_SIG updates
    - [Config] (efi-lockdown): update configs after efi lockdown patch refresh
    - [Packaging] don't delete efi_parser.c
    - vbox-update -- do not fix up KERN_DIR or KBUILD_EXTMOD
    - ubuntu: vbox -- update to 6.0.6-dfsg-2
    - add nvidia-418 dkms build
    - remove virtualbox guest drivers
    - [Packaging] dkms-build -- expand paths searched for make.log files
    - add virtualbox-guest-dkms dkms package build
    - enable vbox dkms build for amd64 and i386
    - [Config] update configs for v5.1(-rc7)? rebase
    - update dkms package versions
    - Add the ability to lock down access to the running kernel image
    - Enforce module signatures if the kernel is locked down
    - Restrict /dev/{mem,kmem,port} when the kernel is locked down
    - kexec_load: Disable at runtime if the kernel is locked down
    - Copy secure_boot flag in boot params across kexec reboot
    - kexec_file: split KEXEC_VERIFY_SIG into KEXEC_SIG and KEXEC_SIG_FORCE
    - kexec_file: Restrict at runtime if the kernel is locked down
    - hibernate: Disable when the kernel is locked down
    - uswsusp: Disable when the kernel is locked down
    - PCI: Lock down BAR access when the kernel is locked down
    - x86: Lock down IO port access when the kernel is locked down
    - x86/msr: Restrict MSR access when the kernel is locked down
    - ACPI: Limit access to custom_method when the kernel is locked down
    - acpi: Ignore acpi_rsdp kernel param when the kernel has been locked down
    - acpi: Disable ACPI table override if the kernel is locked down
    - acpi: Disable APEI error injection if the kernel is locked down
    - Prohibit PCMCIA CIS storage when the kernel is locked down
    - Lock down TIOCSSERIAL
    - Lock down module params that specify hardware parameters (eg. ioport)
    - x86/mmiotrace: Lock down the testmmiotrace module
    - Lock down /proc/kcore
    - Lock down kprobes
    - bpf: Restrict kernel image access functions when the kernel is locked down
    - Lock down perf
    - debugfs: Restrict debugfs when the kernel is locked down
    - lockdown: Print current->comm in restriction messages
    - kexec: Allow kexec_file() with appropriate IMA policy when locked down
    - Make get_cert_list() not complain about cert lists that aren't present.
    - Add efi_status_to_str() and rework efi_status_to_err().
    - Make get_cert_list() use efi_status_to_str() to print error messages.
    - efi: Add an EFI_SECURE_BOOT flag to indicate secure boot mode
    - efi: Lock down the kernel if booted in secure boot mode
    - KEYS: Make use of platform keyring for module signature verify

  * Miscellaneous upstream changes
    - ALSA: hdea/realtek - Headset fixup for System76 Gazelle (gaze14)

linux (5.1.0-1.1) eoan; urgency=medium

  * bionic: fork out linux-snapdragon into its own topic kernel (LP: #1820868)
    - [Packaging]: really drop snapdragon

  * Miscellaneous Ubuntu changes
    - SAUCE: fix vbox use of MAP_SHARED
    - SAUCE: fix vbox use of vm_fault_t
    - [Packaging] disable ZFS
    - [Packaging] disable nvidia
    - SAUCE: perf annotate: Fix build on 32 bit for BPF annotation
    - [Config]: updateconfig after rebase to v5.1-rc
    - [Config]: build ETNAVIV only on arm platforms
    - [Config]: Disable CMA on non-arm platforms
    - [Config]: MMC_CQHCI is needed by some built-in drivers
    - [Config]: a.out support has been deprecated
    - [Config]: R3964 was marked as BROKEN
    - [Config]: Add SENSIRION_SGP30 module

  * Miscellaneous upstream changes
    - Revert "UBUNTU: SAUCE: tools: lib/bpf -- add generated headers to search
      path"
    - Revert "UBUNTU: SAUCE: btqcomsmd: introduce BT_QCOMSMD_HACK"

linux (5.1.0-0.0) eoan; urgency=medium

  * Dummy entry.

Date: 2019-07-08 13:02:25.672785+00:00
Changed-By: Seth Forshee <seth.forshee+lp at canonical.com>
https://launchpad.net/ubuntu/+source/linux/5.2.0-8.9
-------------- next part --------------
Sorry, changesfile not available.


More information about the Eoan-changes mailing list