[ubuntu/precise-proposed] linux-lts-trusty 3.13.0-101.148~precise1 (Accepted)
Andy Whitcroft
apw at canonical.com
Sat Oct 22 10:13:16 UTC 2016
linux-lts-trusty (3.13.0-101.148~precise1) precise; urgency=low
[ Seth Forshee ]
* Release Tracking Bug
- LP: #1635437
* [arm64] nova instances can't boot with 3.13.0-92 (LP: #1608854)
- Revert "efi: Disable interrupts around EFI calls, not in the epilog/prolog
calls"
- Revert "x86/efi: Use all 64 bit of efi_memmap in setup_e820()"
- Revert "x86/efi: Store upper bits of command line buffer address in
ext_cmd_line_ptr"
- Revert "efivarfs: Ensure VariableName is NUL-terminated"
- Revert "efi/libstub: Fix boundary checking in efi_high_alloc()"
- Revert "arm64: efi: only attempt efi map setup if booting via EFI"
- Revert "UBUNTU: arm64: Implement efi_enabled()"
- Revert "efi/arm64: ignore dtb= when UEFI SecureBoot is enabled"
- Revert "doc: arm64: add description of EFI stub support"
- Revert "UBUNTU: Move get_dram_base to arm private file"
- Revert "arm64: efi: add EFI stub"
- Revert "arm64: add EFI runtime services"
- Revert "efi: Add shared FDT related functions for ARM/ARM64"
- Revert "efi: add helper function to get UEFI params from FDT"
- Revert "doc: efi-stub.txt updates for ARM"
- Revert "efi: Add get_dram_base() helper function"
- Revert "efi: create memory map iteration helper"
- Revert "x86, ia64: Move EFI_FB vga_default_device() initialization to
pci_vga_fixup()"
- Revert "firmware: Do not use WARN_ON(!spin_is_locked())"
- Revert "efi-pstore: Fix an overflow on 32-bit builds"
- Revert "x86/efi: Fix 32-bit fallout"
- Revert "x86/efi: Check krealloc return value"
- Revert "x86/efi: Runtime services virtual mapping"
- Revert "x86/efi: Fix off-by-one bug in EFI Boot Services reservation"
- x86/efi: Simplify EFI_DEBUG
- x86/efi: Runtime services virtual mapping
- x86/efi: Check krealloc return value
- SAUCE: Merge tag 'efi-next' of
git://git.kernel.org/pub/scm/linux/kernel/git/mfleming/efi into x86/efi
- doc: Fix trivial spelling mistake in efi-stub.txt
- x86/efi: Remove unused variables in __map_region()
- x86/efi: Add a wrapper function efi_map_region_fixed()
- x86/efi: Fix off-by-one bug in EFI Boot Services reservation
- x86/efi: Cleanup efi_enter_virtual_mode() function
- efi: Export more EFI table variables to sysfs
- [Config] CONFIG_EFI_RUNTIME_MAP=y
- efi: Export EFI runtime memory mapping to sysfs
- x86/efi: Pass necessary EFI data for kexec via setup_data
- x86/efi: Delete superfluous global variables
- x86/efi: parse_efi_setup() build fix
- SAUCE: Merge tag 'v3.13-rc7' into x86/efi-kexec to resolve conflicts
- x86/efi: Allow mapping BGRT on x86-32
- x86/efi: Fix 32-bit fallout
- x86/efi: Check status field to validate BGRT header
- x86/efi: Quirk out SGI UV
- v3.14 - Bacported EFI up to v3.14
- efi: Move facility flags to struct efi
- efi: Set feature flags inside feature init functions
- efivarfs: 'efivarfs_file_write' function reorganization
- x86/efi: Delete out-of-date comments of efi_query_variable_store
- x86/efi: Style neatening
- x86/efi: Dump the EFI page table
- x86, pageattr: Export page unmapping interface
- x86/efi: Make efi virtual runtime map passing more robust
- x86/efi: Split efi_enter_virtual_mode
- ia64/efi: Implement efi_enabled()
- efi: Use NULL instead of 0 for pointer
- x86, tools: Consolidate #ifdef code
- x86/efi: Delete dead code when checking for non-native
- efi: Add separate 32-bit/64-bit definitions
- x86/efi: Build our own EFI services pointer table
- x86/efi: Add early thunk code to go from 64-bit to 32-bit
- x86/efi: Firmware agnostic handover entry points
- [Config] CONFIG_EFI_MIXED=y
- x86/efi: Wire up CONFIG_EFI_MIXED
- x86/efi: Re-disable interrupts after calling firmware services
- SAUCE: Merge remote-tracking branch 'tip/x86/efi-mixed' into efi-for-mingo
- x86, tools: Fix up compiler warnings
- x86/efi: Preserve segment registers in mixed mode
- x86/efi: Rip out phys_efi_get_time()
- x86/efi: Restore 'attr' argument to query_variable_info()
- SAUCE: merge with v3.15
- fs/efivarfs/super.c: use static const for dentry_operations
- SAUCE: merge with v3.16
- efi: efi-stub-helper cleanup
- efi: create memory map iteration helper
- efi: Add shared printk wrapper for consistent prefixing
- efi: Add get_dram_base() helper function
- efi: x86: Handle arbitrary Unicode characters
- x86/efi: Delete most of the efi_call* macros
- x86/efi: Implement a __efi_call_virt macro
- x86/efi: Save and restore FPU context around efi_calls (x86_64)
- x86/efi: Save and restore FPU context around efi_calls (i386)
- efivars: Use local variables instead of a pointer dereference
- efivars: Check size of user object
- efivars: Stop passing a struct argument to efivar_validate()
- efivars: Refactor sanity checking code into separate function
- efivars: Add compatibility code for compat tasks
- doc: efi-stub.txt updates for ARM
- efi: add helper function to get UEFI params from FDT
- efi: Add shared FDT related functions for ARM/ARM64
- [Config] CONFIG_LIBFDT=y
- arm64: add EFI runtime services
- arm64: efi: add EFI stub
- doc: arm64: add description of EFI stub support
- efi/arm64: ignore dtb= when UEFI SecureBoot is enabled
- arm64: efi: only attempt efi map setup if booting via EFI
- efi-pstore: Fix an overflow on 32-bit builds
- firmware: Do not use WARN_ON(!spin_is_locked())
- x86, ia64: Move EFI_FB vga_default_device() initialization to
pci_vga_fixup()
- efivarfs: Ensure VariableName is NUL-terminated
- x86/efi: Store upper bits of command line buffer address in ext_cmd_line_ptr
- x86/efi: Use all 64 bit of efi_memmap in setup_e820()
- efi: Disable interrupts around EFI calls, not in the epilog/prolog calls
- x86/efi: Fix boot failure with EFI stub
- x86/efi: Fix boot crash by mapping EFI memmap entries bottom-up at runtime,
instead of top-down
- efi/libstub: Fix boundary checking in efi_high_alloc()
- efi: Fix compiler warnings (unused, const, type)
- efi: fdt: Do not report an error during boot if UEFI is not available
- efi: Make our variable validation list include the guid
- lib/ucs2_string: Add ucs2 -> utf8 helper functions
- efi: Use ucs2_as_utf8 in efivarfs instead of open coding a bad version
- efi/reboot: Add generic wrapper around EfiResetSystem()
- efi/arm64: efistub: remove local copy of linux_banner
- x86/reboot: Add EFI reboot quirk for ACPI Hardware Reduced flag
- efi/reboot: Allow powering off machines using EFI
- efi: Fix error handling in add_sysfs_runtime_map_entry()
- efi: Small leak on error in runtime map code
- arm64/efi: map the entire UEFI vendor string before reading it
- arm64/efi: add missing call to early_ioremap_reset()
- efi/arm64: Store Runtime Services revision
- SAUCE: UEFI: Add secure_modules() call
- SAUCE: UEFI: PCI: Lock down BAR access when module security is enabled
- SAUCE: UEFI: x86: Lock down IO port access when module security is enabled
- SAUCE: UEFI: ACPI: Limit access to custom_method
- SAUCE: UEFI: asus-wmi: Restrict debugfs interface when module loading is
restricted
- SAUCE: UEFI: Restrict /dev/mem and /dev/kmem when module loading is
restricted
- SAUCE: UEFI: acpi: Ignore acpi_rsdp kernel parameter when module loading is
restricted
- SAUCE: UEFI: kexec: Disable at runtime if the kernel enforces module loading
restrictions
- SAUCE: UEFI: x86: Restrict MSR access when module loading is restricted
- [Config] CONFIG_EFI_SECURE_BOOT_SIG_ENFORCE=y
- SAUCE: UEFI: Add option to automatically enforce module signatures when in
Secure Boot mode
- SAUCE: UEFI: efi: Make EFI_SECURE_BOOT_SIG_ENFORCE depend on EFI
- SAUCE: UEFI MODSIGN: Import certificates from UEFI Secure Boot
- SAUCE: UEFI: efi: Disable secure boot if shim is in insecure mode
- SAUCE: UEFI: Display MOKSBState when disabled
- SAUCE: UEFI: Add secure boot and MOK SB State disabled sysctl
- SAUCE: UEFI: Set EFI_SECURE_BOOT bit in x86_efi_facility
- Revert "x86/efi: Save and restore FPU context around efi_calls (x86_64)"
- [Config] CONFIG_RTC_DRV_EFI=y
* proc_keys_show crash when reading /proc/keys (LP: #1634496)
- KEYS: ensure xbuf is large enough to fix buffer overflow in proc_keys_show
(LP: #1634496)
* [Trusty->Yakkety] powerpc/64: Fix incorrect return value from
__copy_tofrom_user (LP: #1632462)
- SAUCE: (no-up) powerpc/64: Fix incorrect return value from
__copy_tofrom_user
* Ubuntu 16.10: Oops panic in move_page_tables/page_remove_rmap after running
memory_stress_ng. (LP: #1628976)
- SAUCE: (no-up) powerpc/pseries: Fix stack corruption in htpe code
* sha1-powerpc returning wrong results (LP: #1629977)
- crypto: sha1-powerpc - little-endian support
* linux: Implement secure boot state variables (LP: #1593075)
- SAUCE: UEFI: Add secure boot and MOK SB State disabled sysctl
- SAUCE: UEFI: Set EFI_SECURE_BOOT bit in x86_efi_facility
* linux: MokSBState is ignored (LP: #1571691)
- SAUCE: UEFI MODSIGN: Import certificates from UEFI Secure Boot
- SAUCE: UEFI: efi: Disable secure boot if shim is in insecure mode
- SAUCE: UEFI: Display MOKSBState when disabled
* linux: Enforce signed module loading when UEFI secure boot (LP: #1566221)
- SAUCE: UEFI: Add secure_modules() call
- SAUCE: UEFI: PCI: Lock down BAR access when module security is enabled
- SAUCE: UEFI: x86: Lock down IO port access when module security is enabled
- SAUCE: UEFI: ACPI: Limit access to custom_method
- SAUCE: UEFI: asus-wmi: Restrict debugfs interface when module loading is
restricted
- SAUCE: UEFI: Restrict /dev/mem and /dev/kmem when module loading is
restricted
- SAUCE: UEFI: acpi: Ignore acpi_rsdp kernel parameter when module loading is
restricted
- SAUCE: UEFI: kexec: Disable at runtime if the kernel enforces module loading
restrictions
- SAUCE: UEFI: x86: Restrict MSR access when module loading is restricted
- SAUCE: UEFI: Add option to automatically enforce module signatures when in
Secure Boot mode
- SAUCE: UEFI: efi: Make EFI_SECURE_BOOT_SIG_ENFORCE depend on EFI
- SAUCE: UEFI MODSIGN: Import certificates from UEFI Secure Boot
- SAUCE: UEFI: efi: Disable secure boot if shim is in insecure mode
- SAUCE: UEFI: Display MOKSBState when disabled
* Utopic update to 3.16.7-ckt5 stable release (LP: #1419125)
- arm64/efi: add missing call to early_ioremap_reset()
* Trusty update to 3.16.7-ckt17 stable release (LP: #1500484)
- arm64/efi: map the entire UEFI vendor string before reading it
* Utopic update to 3.16.7-ckt8 stable release (LP: #1434595)
- efi: Small leak on error in runtime map code
* Utopic update to 3.16.7-ckt12 stable release (LP: #1465613)
- efi/reboot: Add generic wrapper around EfiResetSystem()
- x86/reboot: Add EFI reboot quirk for ACPI Hardware Reduced flag
- efi/reboot: Allow powering off machines using EFI
- efi: Fix error handling in add_sysfs_runtime_map_entry()
* Trusty update to 3.16.7-ckt26 stable release (LP: #1563345)
- efi: Make our variable validation list include the guid
- lib/ucs2_string: Add ucs2 -> utf8 helper functions
- efi: Use ucs2_as_utf8 in efivarfs instead of open coding a bad version
* Utopic update to 3.16.7-ckt9 stable release (LP: #1441317)
- efi/libstub: Fix boundary checking in efi_high_alloc()
* Trusty update to 3.16.7-ckt19 stable release (LP: #1514911)
- x86/efi: Fix boot crash by mapping EFI memmap entries bottom-up at runtime,
instead of top-down
* Boot failure with EFI stub (LP: #1603476)
- x86/efi: Fix boot failure with EFI stub
* Trusty update to v3.13.11-ckt33 stable release (LP: #1538756)
- efi: Disable interrupts around EFI calls, not in the epilog/prolog calls
* Trusty update to 3.13.11-ckt26 stable release (LP: #1493305)
- x86/efi: Use all 64 bit of efi_memmap in setup_e820()
* Trusty update to v3.13.11.9 stable release (LP: #1381234)
- x86, ia64: Move EFI_FB vga_default_device() initialization to
pci_vga_fixup()
* CVE-2015-7833
- usbvision: revert commit 588afcc1
* CVE-2014-9904
- ALSA: compress: fix an integer overflow check
* CVE-2015-3288
- mm: avoid setting up anonymous pages into file mapping
* CVE-2016-3961 (LP: #1571020)
- mm: hugetlb: allow hugepages_supported to be architecture specific
- s390/hugetlb: add hugepages_supported define
- x86/mm/xen: Suppress hugetlbfs in PV guests
Date: 2016-10-21 14:36:14.475524+00:00
Changed-By: Seth Forshee <seth.forshee+lp at canonical.com>
Signed-By: Andy Whitcroft <apw at canonical.com>
https://launchpad.net/ubuntu/+source/linux-lts-trusty/3.13.0-101.148~precise1
-------------- next part --------------
Sorry, changesfile not available.
More information about the Precise-changes
mailing list