[ubuntu/xenial-proposed] linux-mako 3.4.0-7.40 (Accepted)
Tim Gardner
tim.gardner at canonical.com
Wed Oct 28 18:52:28 UTC 2015
linux-mako (3.4.0-7.40) xenial; urgency=low
[ Kyle Fazzari ]
* SAUCE: Enable SECCOMP_FILTER on mako.
- LP: #1509489
* SAUCE: Remove fake no_new_privs.
- LP: #1509489
* SAUCE: Make sure userspace sees an ENOSYS for no tracer.
- LP: #1509489
* SAUCE: Add seccomp selftests.
- LP: #1509489
[ Upstream Kernel Changes ]
* Add PR_{GET,SET}_NO_NEW_PRIVS to prevent execve from granting privs
- LP: #1509489
* Fix execve behavior apparmor for PR_{GET,SET}_NO_NEW_PRIVS
- LP: #1509489
* sk_run_filter: add BPF_S_ANC_SECCOMP_LD_W
- LP: #1509489
* net/compat.c,linux/filter.h: share compat_sock_fprog
- LP: #1509489
* seccomp: kill the seccomp_t typedef
- LP: #1509489
* asm/syscall.h: add syscall_get_arch
- LP: #1509489
* arch/x86: add syscall_get_arch to syscall.h
- LP: #1509489
* seccomp: add system call filtering using BPF
- LP: #1509489
* seccomp: remove duplicated failure logging
- LP: #1509489
* seccomp: add SECCOMP_RET_ERRNO
- LP: #1509489
* signal, x86: add SIGSYS info and make it synchronous.
- LP: #1509489
* seccomp: Add SECCOMP_RET_TRAP
- LP: #1509489
* ptrace,seccomp: Add PTRACE_SECCOMP support
- LP: #1509489
* x86: Enable HAVE_ARCH_SECCOMP_FILTER
- LP: #1509489
* Documentation: prctl/seccomp_filter
- LP: #1509489
* seccomp: use a static inline for a function stub
- LP: #1509489
* seccomp: ignore secure_computing return values
- LP: #1509489
* seccomp: fix build warnings when there is no CONFIG_SECCOMP_FILTER
- LP: #1509489
* samples/seccomp: fix dependencies on arch macros
- LP: #1509489
* ARM: 7373/1: add support for the generic syscall.h interface
- LP: #1509489
* ARM: 7374/1: add TRACEHOOK support
- LP: #1509489
* ARM: 7456/1: ptrace: provide separate functions for tracing syscall
{entry,exit}
- LP: #1509489
* ARM: 7577/1: arch/add syscall_get_arch
- LP: #1509489
* ARM: 7578/1: arch/move secure_computing into trace
- LP: #1509489
* ARM: 7579/1: arch/allow a scno of -1 to not cause a SIGILL
- LP: #1509489
* ARM: 7580/1: arch/select HAVE_ARCH_SECCOMP_FILTER
- LP: #1509489
Date: Wed, 28 Oct 2015 09:44:02 -0600
Changed-By: Tim Gardner <tim.gardner at canonical.com>
Maintainer: Ubuntu Kernel Team <kernel-team at lists.ubuntu.com>
https://launchpad.net/ubuntu/+source/linux-mako/3.4.0-7.40
-------------- next part --------------
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Wed, 28 Oct 2015 09:44:02 -0600
Source: linux-mako
Binary: linux-mako-headers-3.4.0-7 linux-mako-tools-common linux-mako-tools-3.4.0-7 linux-image-3.4.0-7-mako linux-headers-3.4.0-7-mako linux-image-3.4.0-7-mako-dbgsym
Architecture: source
Version: 3.4.0-7.40
Distribution: xenial
Urgency: low
Maintainer: Ubuntu Kernel Team <kernel-team at lists.ubuntu.com>
Changed-By: Tim Gardner <tim.gardner at canonical.com>
Description:
linux-headers-3.4.0-7-mako - Linux kernel headers for version 3.4.0 on Nexus 4
linux-image-3.4.0-7-mako - Linux kernel image for version 3.4.0 on Nexus 4
linux-image-3.4.0-7-mako-dbgsym - Linux kernel debug image for version 3.4.0 on Nexus 4
linux-mako-headers-3.4.0-7 - Header files related to Linux kernel version 3.4.0
linux-mako-tools-3.4.0-7 - Linux kernel version specific tools for version 3.4.0-7
linux-mako-tools-common - Linux kernel version specific tools for version 3.4.0
Launchpad-Bugs-Fixed: 1509489
Changes:
linux-mako (3.4.0-7.40) xenial; urgency=low
.
[ Kyle Fazzari ]
.
* SAUCE: Enable SECCOMP_FILTER on mako.
- LP: #1509489
* SAUCE: Remove fake no_new_privs.
- LP: #1509489
* SAUCE: Make sure userspace sees an ENOSYS for no tracer.
- LP: #1509489
* SAUCE: Add seccomp selftests.
- LP: #1509489
.
[ Upstream Kernel Changes ]
.
* Add PR_{GET,SET}_NO_NEW_PRIVS to prevent execve from granting privs
- LP: #1509489
* Fix execve behavior apparmor for PR_{GET,SET}_NO_NEW_PRIVS
- LP: #1509489
* sk_run_filter: add BPF_S_ANC_SECCOMP_LD_W
- LP: #1509489
* net/compat.c,linux/filter.h: share compat_sock_fprog
- LP: #1509489
* seccomp: kill the seccomp_t typedef
- LP: #1509489
* asm/syscall.h: add syscall_get_arch
- LP: #1509489
* arch/x86: add syscall_get_arch to syscall.h
- LP: #1509489
* seccomp: add system call filtering using BPF
- LP: #1509489
* seccomp: remove duplicated failure logging
- LP: #1509489
* seccomp: add SECCOMP_RET_ERRNO
- LP: #1509489
* signal, x86: add SIGSYS info and make it synchronous.
- LP: #1509489
* seccomp: Add SECCOMP_RET_TRAP
- LP: #1509489
* ptrace,seccomp: Add PTRACE_SECCOMP support
- LP: #1509489
* x86: Enable HAVE_ARCH_SECCOMP_FILTER
- LP: #1509489
* Documentation: prctl/seccomp_filter
- LP: #1509489
* seccomp: use a static inline for a function stub
- LP: #1509489
* seccomp: ignore secure_computing return values
- LP: #1509489
* seccomp: fix build warnings when there is no CONFIG_SECCOMP_FILTER
- LP: #1509489
* samples/seccomp: fix dependencies on arch macros
- LP: #1509489
* ARM: 7373/1: add support for the generic syscall.h interface
- LP: #1509489
* ARM: 7374/1: add TRACEHOOK support
- LP: #1509489
* ARM: 7456/1: ptrace: provide separate functions for tracing syscall
{entry,exit}
- LP: #1509489
* ARM: 7577/1: arch/add syscall_get_arch
- LP: #1509489
* ARM: 7578/1: arch/move secure_computing into trace
- LP: #1509489
* ARM: 7579/1: arch/allow a scno of -1 to not cause a SIGILL
- LP: #1509489
* ARM: 7580/1: arch/select HAVE_ARCH_SECCOMP_FILTER
- LP: #1509489
Checksums-Sha1:
ad121ead6793424ef8cb7253c03c86938c9b8f5c 2122 linux-mako_3.4.0-7.40.dsc
95df74cde32242cb6cf9a321668fe4b2e13ba092 115034872 linux-mako_3.4.0-7.40.tar.gz
Checksums-Sha256:
408050881b5bc4ac78bf68cee3750b50d342acba7a58e791b1fc89d4910ada7c 2122 linux-mako_3.4.0-7.40.dsc
80667573e00ff8f01dbade8ebdc8a287c493fe0192eedb0d8fb247c8bd997730 115034872 linux-mako_3.4.0-7.40.tar.gz
Files:
f1ade1049a5440ed9b2b68af004325b3 2122 devel optional linux-mako_3.4.0-7.40.dsc
eef477c8f090fb7e8e9ad88588d6c25c 115034872 devel optional linux-mako_3.4.0-7.40.tar.gz
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1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=F1gY
-----END PGP SIGNATURE-----
More information about the Xenial-changes
mailing list