[linux] 01/01: Update 4.15.1 and 4.15.2 Debian changelog entries

debian-kernel at lists.debian.org debian-kernel at lists.debian.org
Fri Feb 16 09:35:21 UTC 2018


This is an automated email from the git hooks/post-receive script.

carnil pushed a commit to branch master
in repository linux.

commit 3813d82c3e46f92f4670276874bf7107c3616f2b
Author: Salvatore Bonaccorso <carnil at debian.org>
Date:   Fri Feb 16 10:33:37 2018 +0100

    Update 4.15.1 and 4.15.2 Debian changelog entries
    
    Drop/Remove enties included in the 4.14.17-1 upload and add architecture
    tags.
---
 debian/changelog | 145 +++++++++++++++++++------------------------------------
 1 file changed, 50 insertions(+), 95 deletions(-)

diff --git a/debian/changelog b/debian/changelog
index fd4b044..a2f4215 100644
--- a/debian/changelog
+++ b/debian/changelog
@@ -7,117 +7,72 @@ linux (4.15.2-1~exp1) UNRELEASED; urgency=medium
     - tools/gpio: Fix build error with musl libc
     - gpio: stmpe: i2c transfer are forbiden in atomic context
     - gpio: Fix kernel stack leak to userspace
-    - ALSA: hda - Reduce the suspend time consumption for ALC256
-    - crypto: ecdh - fix typo in KPP dependency of CRYPTO_ECDH
-    - crypto: aesni - handle zero length dst buffer
-    - crypto: aesni - fix typo in generic_gcmaes_decrypt
-    - crypto: aesni - add wrapper for generic gcm(aes)
-    - crypto: aesni - Fix out-of-bounds access of the data buffer in generic-gcm-aesni
-    - crypto: aesni - Fix out-of-bounds access of the AAD buffer in generic-gcm-aesni
-    - crypto: inside-secure - fix hash when length is a multiple of a block
-    - crypto: inside-secure - avoid unmapping DMA memory that was not mapped
-    - crypto: sha3-generic - fixes for alignment and big endian operation
-    - crypto: af_alg - whitelist mask and type
-    - HID: wacom: EKR: ensure devres groups at higher indexes are released
-    - HID: wacom: Fix reporting of touch toggle (WACOM_HID_WD_MUTE_DEVICE) events
-    - power: reset: zx-reboot: add missing MODULE_DESCRIPTION/AUTHOR/LICENSE
-    - gpio: iop: add missing MODULE_DESCRIPTION/AUTHOR/LICENSE
-    - gpio: ath79: add missing MODULE_DESCRIPTION/LICENSE
-    - mtd: nand: denali_pci: add missing MODULE_DESCRIPTION/AUTHOR/LICENSE
-    - igb: Free IRQs when device is hotplugged
-    - ima/policy: fix parsing of fsuuid
-    - scsi: aacraid: Fix udev inquiry race condition
-    - scsi: aacraid: Fix hang in kdump
     - scsi: storvsc: missing error code in storvsc_probe()
     - staging: lustre: separate a connection destroy from free struct kib_conn
     - staging: ccree: NULLify backup_info when unused
     - staging: ccree: fix fips event irq handling build
-    - tty: fix data race between tty_init_dev and flush of buf
     - usb: option: Add support for FS040U modem
-    - USB: serial: pl2303: new device id for Chilitag
-    - USB: cdc-acm: Do not log urb submission errors on disconnect
-    - CDC-ACM: apply quirk for card reader
-    - USB: serial: io_edgeport: fix possible sleep-in-atomic
-    - usbip: prevent bind loops on devices attached to vhci_hcd
-    - usbip: list: don't list devices attached to vhci_hcd
-    - USB: serial: simple: add Motorola Tetra driver
-    - usb: f_fs: Prevent gadget unbind if it is already unbound
-    - usb: uas: unconditionally bring back host after reset
-    - usb/gadget: Fix "high bandwidth" check in usb_gadget_ep_match_desc()
-    - ANDROID: binder: remove waitqueue when thread exits.
-    - android: binder: use VM_ALLOC to get vm area
-    - mei: me: allow runtime pm for platform with D0i3
-    - serial: 8250_of: fix return code when probe function fails to get reset
-    - serial: 8250_uniphier: fix error return code in uniphier_uart_probe()
     - serial: 8250_dw: Revert "Improve clock rate setting"
-    - serial: imx: Only wakeup via RTSDEN bit if the system has RTS/CTS
-    - spi: imx: do not access registers while clocks disabled
-    - iio: adc: stm32: fix scan of multiple channels with DMA
-    - iio: chemical: ccs811: Fix output of IIO_CONCENTRATION channels
-    - test_firmware: fix missing unlock on error in config_num_requests_store()
-    - Input: synaptics-rmi4 - unmask F03 interrupts when port is opened
-    - Input: synaptics-rmi4 - do not delete interrupt memory too early
-    - x86/efi: Clarify that reset attack mitigation needs appropriate userspace
   * New upstream stable update:
     https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.15.2
-    - KVM: x86: Make indirect calls in emulator speculation safe
-    - KVM: VMX: Make indirect call speculation safe
+    - [x86] KVM: Make indirect calls in emulator speculation safe
+    - [x86] KVM: VMX: Make indirect call speculation safe
     - module/retpoline: Warn about missing retpoline in module
-    - x86/cpufeatures: Add CPUID_7_EDX CPUID leaf
-    - x86/cpufeatures: Add Intel feature bits for Speculation Control
-    - x86/cpufeatures: Add AMD feature bits for Speculation Control
-    - x86/msr: Add definitions for new speculation control MSRs
-    - x86/pti: Do not enable PTI on CPUs which are not vulnerable to Meltdown
-    - x86/cpufeature: Blacklist SPEC_CTRL/PRED_CMD on early Spectre v2 microcodes
-    - x86/speculation: Add basic IBPB (Indirect Branch Prediction Barrier) support
-    - x86/alternative: Print unadorned pointers
-    - x86/nospec: Fix header guards names
-    - x86/bugs: Drop one "mitigation" from dmesg
-    - x86/cpu/bugs: Make retpoline module warning conditional
-    - x86/cpufeatures: Clean up Spectre v2 related CPUID flags
-    - x86/retpoline: Simplify vmexit_fill_RSB()
-    - x86/speculation: Simplify indirect_branch_prediction_barrier()
-    - auxdisplay: img-ascii-lcd: add missing MODULE_DESCRIPTION/AUTHOR/LICENSE
-    - iio: adc/accel: Fix up module licenses
-    - pinctrl: pxa: pxa2xx: add missing MODULE_DESCRIPTION/AUTHOR/LICENSE
-    - ASoC: pcm512x: add missing MODULE_DESCRIPTION/AUTHOR/LICENSE
-    - KVM: nVMX: Eliminate vmcs02 pool
-    - KVM: VMX: introduce alloc_loaded_vmcs
+    - [x86] cpufeatures: Add CPUID_7_EDX CPUID leaf
+    - [x86] cpufeatures: Add Intel feature bits for Speculation Control
+    - [x86] cpufeatures: Add AMD feature bits for Speculation Control
+    - [x86] msr: Add definitions for new speculation control MSRs
+    - [x86] pti: Do not enable PTI on CPUs which are not vulnerable to
+      Meltdown
+    - [x86] cpufeature: Blacklist SPEC_CTRL/PRED_CMD on early Spectre v2
+      microcodes
+    - [x86] speculation: Add basic IBPB (Indirect Branch Prediction Barrier)
+      support
+    - [x86] alternative: Print unadorned pointers
+    - [x86] nospec: Fix header guards names
+    - [x86] bugs: Drop one "mitigation" from dmesg
+    - [x86] cpu/bugs: Make retpoline module warning conditional
+    - [x86] cpufeatures: Clean up Spectre v2 related CPUID flags
+    - [x86] retpoline: Simplify vmexit_fill_RSB()
+    - [x86] speculation: Simplify indirect_branch_prediction_barrier()
+    - [x86] KVM: nVMX: Eliminate vmcs02 pool
+    - [x86] KVM: VMX: introduce alloc_loaded_vmcs
     - objtool: Improve retpoline alternative handling
     - objtool: Add support for alternatives at the end of a section
     - objtool: Warn on stripped section symbol
-    - x86/mm: Fix overlap of i386 CPU_ENTRY_AREA with FIX_BTMAP
-    - x86/spectre: Check CONFIG_RETPOLINE in command line parser
-    - x86/entry/64: Remove the SYSCALL64 fast path
-    - x86/entry/64: Push extra regs right away
-    - x86/asm: Move 'status' from thread_struct to thread_info
+    - [x86] mm: Fix overlap of i386 CPU_ENTRY_AREA with FIX_BTMAP
+    - [x86] spectre: Check CONFIG_RETPOLINE in command line parser
+    - [x86] entry/64: Remove the SYSCALL64 fast path
+    - [x86] entry/64: Push extra regs right away
+    - [x86] asm: Move 'status' from thread_struct to thread_info
     - Documentation: Document array_index_nospec
     - array_index_nospec: Sanitize speculative array de-references
-    - x86: Implement array_index_mask_nospec
-    - x86: Introduce barrier_nospec
-    - x86: Introduce __uaccess_begin_nospec() and uaccess_try_nospec
-    - x86/usercopy: Replace open coded stac/clac with __uaccess_{begin, end}
-    - x86/uaccess: Use __uaccess_begin_nospec() and uaccess_try_nospec
-    - x86/get_user: Use pointer masking to limit speculation
-    - x86/syscall: Sanitize syscall table de-references under speculation
+    - [x86] Implement array_index_mask_nospec
+    - [x86] Introduce barrier_nospec
+    - [x86] Introduce __uaccess_begin_nospec() and uaccess_try_nospec
+    - [x86] usercopy: Replace open coded stac/clac with __uaccess_{begin, end}
+    - [x86] uaccess: Use __uaccess_begin_nospec() and uaccess_try_nospec
+    - [x86] get_user: Use pointer masking to limit speculation
+    - [x86] syscall: Sanitize syscall table de-references under speculation
     - vfs, fdtable: Prevent bounds-check bypass via speculative execution
     - nl80211: Sanitize array index in parse_txq_params
-    - x86/spectre: Report get_user mitigation for spectre_v1
-    - x86/spectre: Fix spelling mistake: "vunerable"-> "vulnerable"
-    - x86/cpuid: Fix up "virtual" IBRS/IBPB/STIBP feature bits on Intel
-    - x86/speculation: Use Indirect Branch Prediction Barrier in context switch
-    - x86/paravirt: Remove 'noreplace-paravirt' cmdline option
-    - KVM: VMX: make MSR bitmaps per-VCPU
-    - x86/kvm: Update spectre-v1 mitigation
-    - x86/retpoline: Avoid retpolines for built-in __init functions
-    - x86/spectre: Simplify spectre_v2 command line parsing
-    - x86/pti: Mark constant arrays as __initconst
-    - x86/speculation: Fix typo IBRS_ATT, which should be IBRS_ALL
-    - KVM/x86: Update the reverse_cpuid list to include CPUID_7_EDX
-    - KVM/x86: Add IBPB support
-    - KVM/VMX: Emulate MSR_IA32_ARCH_CAPABILITIES
-    - KVM/VMX: Allow direct access to MSR_IA32_SPEC_CTRL
-    - KVM/SVM: Allow direct access to MSR_IA32_SPEC_CTRL
+    - [x86] spectre: Report get_user mitigation for spectre_v1
+    - [x86] spectre: Fix spelling mistake: "vunerable"-> "vulnerable"
+    - [x86] cpuid: Fix up "virtual" IBRS/IBPB/STIBP feature bits on Intel
+    - [x86] speculation: Use Indirect Branch Prediction Barrier in context
+      switch
+    - [x86] paravirt: Remove 'noreplace-paravirt' cmdline option
+    - [x86] KVM: VMX: make MSR bitmaps per-VCPU
+    - [x86] kvm: Update spectre-v1 mitigation
+    - [x86] retpoline: Avoid retpolines for built-in __init functions
+    - [x86] spectre: Simplify spectre_v2 command line parsing
+    - [x86] pti: Mark constant arrays as __initconst
+    - [x86] speculation: Fix typo IBRS_ATT, which should be IBRS_ALL
+    - [x86] KVM: Update the reverse_cpuid list to include CPUID_7_EDX
+    - [x86] KVM: Add IBPB support
+    - [x86] KVM/VMX: Emulate MSR_IA32_ARCH_CAPABILITIES
+    - [x86] KVM/VMX: Allow direct access to MSR_IA32_SPEC_CTRL
+    - [x86] KVM/SVM: Allow direct access to MSR_IA32_SPEC_CTRL
     - serial: core: mark port as initialized after successful IRQ change
     - fpga: region: release of_parse_phandle nodes after use
 

-- 
Alioth's /usr/local/bin/git-commit-notice on /srv/git.debian.org/git/kernel/linux.git



More information about the Kernel-svn-changes mailing list