[linux] 02/10: cleanup changelog entries for 4.9.81

debian-kernel at lists.debian.org debian-kernel at lists.debian.org
Fri Feb 16 17:28:17 UTC 2018


This is an automated email from the git hooks/post-receive script.

corsac pushed a commit to branch stretch
in repository linux.

commit 37e654bd9ce496835fcdfbeadbd99f5630ea5d8b
Author: Yves-Alexis Perez <corsac at corsac.net>
Date:   Thu Feb 15 21:20:14 2018 +0100

    cleanup changelog entries for 4.9.81
---
 debian/changelog | 97 +++++++++++++++-----------------------------------------
 1 file changed, 26 insertions(+), 71 deletions(-)

diff --git a/debian/changelog b/debian/changelog
index eb7bda7..4d3aef4 100644
--- a/debian/changelog
+++ b/debian/changelog
@@ -2,97 +2,52 @@ linux (4.9.81-1) UNRELEASED; urgency=medium
 
   * New upstream stable update:
     https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.81
-    - powerpc/pseries: Add H_GET_CPU_CHARACTERISTICS flags & wrapper
-    - powerpc/64: Add macros for annotating the destination of rfid/hrfid
-    - powerpc/64: Convert fast_exception_return to use RFI_TO_USER/KERNEL
-    - powerpc/64: Convert the syscall exit path to use RFI_TO_USER/KERNEL
-    - powerpc/64s: Convert slb_miss_common to use RFI_TO_USER/KERNEL
-    - powerpc/64s: Add support for RFI flush of L1-D cache
-    - powerpc/64s: Support disabling RFI flush with no_rfi_flush and nopti
-    - powerpc/pseries: Query hypervisor for RFI flush settings
-    - powerpc/powernv: Check device-tree for RFI flush settings
-    - powerpc/64s: Wire up cpu_show_meltdown()
-    - powerpc/64s: Allow control of RFI flush via debugfs
-    - auxdisplay: img-ascii-lcd: add missing MODULE_DESCRIPTION/AUTHOR/LICENSE
-    - pinctrl: pxa: pxa2xx: add missing MODULE_DESCRIPTION/AUTHOR/LICENSE
-    - ASoC: pcm512x: add missing MODULE_DESCRIPTION/AUTHOR/LICENSE
-    - kaiser: fix intel_bts perf crashes
-    - x86/pti: Make unpoison of pgd for trusted boot work for real
+    - [powerpc*] powerpc/64s: Add support for RFI flush of L1-D cache
+      (CVE-2017-5754, Meltdown)
+    - [powerpc*] powerpc/64s: Support disabling RFI flush with no_rfi_flush and nopti
+    - [powerpc*] powerpc/64s: Allow control of RFI flush via debugfs
+    - [x86] kaiser: fix intel_bts perf crashes
+    - [x86] x86/pti: Make unpoison of pgd for trusted boot work for real
     - kaiser: allocate pgd with order 0 when pti=off
     - serial: core: mark port as initialized after successful IRQ change
     - ip6mr: fix stale iterator
     - net: igmp: add a missing rcu locking section
     - qlcnic: fix deadlock bug
-    - qmi_wwan: Add support for Quectel EP06
-    - r8169: fix RTL8168EP take too long to complete driver initialization.
     - tcp: release sk_frag.page in tcp_disconnect
-    - vhost_net: stop device during reset owner
-    - tcp_bbr: fix pacing_gain to always be unity when using lt_bw
-    - cls_u32: add missing RCU annotation.
-    - ipv6: Fix SO_REUSEPORT UDP socket with implicit sk_ipv6only
     - soreuseport: fix mem leak in reuseport_add_sock()
-    - x86/asm: Fix inline asm call constraints for GCC 4.4
-    - x86/microcode/AMD: Do not load when running on a hypervisor
-    - media: soc_camera: soc_scale_crop: add missing MODULE_DESCRIPTION/AUTHOR/LICENSE
-    - b43: Add missing MODULE_FIRMWARE()
     - KEYS: encrypted: fix buffer overread in valid_master_desc()
-    - x86/retpoline: Remove the esp/rsp thunk
-    - KVM: x86: Make indirect calls in emulator speculation safe
+    - [x86] x86/retpoline: Remove the esp/rsp thunk
+    - [x86] KVM: x86: Make indirect calls in emulator speculation safe
+      (CVE-2017-5715, Spectre#2)
     - KVM: VMX: Make indirect call speculation safe
     - module/retpoline: Warn about missing retpoline in module
-    - x86/cpufeatures: Add CPUID_7_EDX CPUID leaf
-    - x86/cpufeatures: Add Intel feature bits for Speculation Control
-    - x86/cpufeatures: Add AMD feature bits for Speculation Control
-    - x86/msr: Add definitions for new speculation control MSRs
-    - x86/pti: Do not enable PTI on CPUs which are not vulnerable to Meltdown
-    - x86/cpufeature: Blacklist SPEC_CTRL/PRED_CMD on early Spectre v2 microcodes
-    - x86/speculation: Add basic IBPB (Indirect Branch Prediction Barrier) support
-    - x86/nospec: Fix header guards names
-    - x86/bugs: Drop one "mitigation" from dmesg
-    - x86/cpu/bugs: Make retpoline module warning conditional
-    - x86/cpufeatures: Clean up Spectre v2 related CPUID flags
-    - x86/retpoline: Simplify vmexit_fill_RSB()
-    - x86/spectre: Check CONFIG_RETPOLINE in command line parser
-    - x86/entry/64: Remove the SYSCALL64 fast path
-    - x86/entry/64: Push extra regs right away
-    - x86/asm: Move 'status' from thread_struct to thread_info
+    - [x86] x86/pti: Do not enable PTI on CPUs which are not vulnerable to Meltdown
+    - [x86] x86/cpufeature: Blacklist SPEC_CTRL/PRED_CMD on early Spectre v2 microcodes
+    - [x86] x86/speculation: Add basic IBPB (Indirect Branch Prediction Barrier) support
+    - [x86] x86/entry/64: Remove the SYSCALL64 fast path
+    - [x86] x86/asm: Move 'status' from thread_struct to thread_info
     - Documentation: Document array_index_nospec
-    - array_index_nospec: Sanitize speculative array de-references
-    - x86: Implement array_index_mask_nospec
-    - x86: Introduce barrier_nospec
-    - x86: Introduce __uaccess_begin_nospec() and uaccess_try_nospec
-    - x86/usercopy: Replace open coded stac/clac with __uaccess_{begin, end}
-    - x86/uaccess: Use __uaccess_begin_nospec() and uaccess_try_nospec
-    - x86/get_user: Use pointer masking to limit speculation
-    - x86/syscall: Sanitize syscall table de-references under speculation
+    - [x86] x86: Implement array_index_mask_nospec
+    - [x86] x86: Introduce barrier_nospec
+    - [x86] x86: Introduce __uaccess_begin_nospec() and uaccess_try_nospec
+    - [x86] x86/uaccess: Use __uaccess_begin_nospec() and uaccess_try_nospec
+    - [x86] x86/get_user: Use pointer masking to limit speculation
+    - [x86] x86/syscall: Sanitize syscall table de-references under speculation
     - vfs, fdtable: Prevent bounds-check bypass via speculative execution
+      (CVE-2017-5753, Spectre#1)
     - nl80211: Sanitize array index in parse_txq_params
-    - x86/spectre: Report get_user mitigation for spectre_v1
-    - x86/spectre: Fix spelling mistake: "vunerable"-> "vulnerable"
-    - x86/cpuid: Fix up "virtual" IBRS/IBPB/STIBP feature bits on Intel
+      (CVE-2017-5753, Spectre#1)
+    - [x86] x86/spectre: Report get_user mitigation for spectre_v1
     - x86/paravirt: Remove 'noreplace-paravirt' cmdline option
     - x86/kvm: Update spectre-v1 mitigation
-    - x86/retpoline: Avoid retpolines for built-in __init functions
-    - x86/spectre: Simplify spectre_v2 command line parsing
-    - x86/pti: Mark constant arrays as __initconst
-    - x86/speculation: Fix typo IBRS_ATT, which should be IBRS_ALL
-    - KVM: nVMX: kmap() can't fail
-    - KVM: nVMX: vmx_complete_nested_posted_interrupt() can't fail
+      (CVE-2017-5753, Spectre#1)
     - KVM: nVMX: mark vmcs12 pages dirty on L2 exit
-    - KVM: nVMX: Eliminate vmcs02 pool
-    - KVM: VMX: introduce alloc_loaded_vmcs
-    - KVM: VMX: make MSR bitmaps per-VCPU
     - KVM/x86: Add IBPB support
+      (CVE-2017-5715, Spectre#2)
     - KVM/VMX: Emulate MSR_IA32_ARCH_CAPABILITIES
     - KVM/VMX: Allow direct access to MSR_IA32_SPEC_CTRL
     - KVM/SVM: Allow direct access to MSR_IA32_SPEC_CTRL
-    - crypto: tcrypt - fix S/G table for test_aead_speed()
-    - ASoC: simple-card: Fix misleading error message
-    - ASoC: rsnd: don't call free_irq() on Parent SSI
-    - ASoC: rsnd: avoid duplicate free_irq()
-    - drm: rcar-du: Use the VBK interrupt for vblank events
-    - drm: rcar-du: Fix race condition when disabling planes at CRTC stop
-    - x86/microcode: Do the family check first
+    - [x86] x86/microcode: Do the family check first
 
  -- Yves-Alexis Perez <corsac at debian.org>  Tue, 13 Feb 2018 17:44:41 +0100
 

-- 
Alioth's /usr/local/bin/git-commit-notice on /srv/git.debian.org/git/kernel/linux.git



More information about the Kernel-svn-changes mailing list