This bug was fixed in the package linux-raspi - 6.8.0-1001.1 --------------- linux-raspi (6.8.0-1001.1) noble; urgency=medium * noble/linux-raspi: 6.8.0-1001.1 -proposed tracker (LP: #2055123) * Packaging resync (LP: #1786013) - debian.raspi/dkms-versions -- update from kernel-versions (main/d2024.01.02) * Miscellaneous Ubuntu changes - [Packaging] raspi: Update reconstruct script - [Packaging] raspi: drop abi files with clean - SAUCE: Sync configs to rpi-6.8.y - [Config] raspi: updateconfigs after update to raspberrypi rpi-6.8.y (2024-02-26) * Miscellaneous upstream changes - dts: rp1: nobble HS and FS/LS park mode for dwc3 xhci - Revert "drm/vc4: Relax VEC modeline requirements and add progressive mode support" - drm/vc4: Do not reset tv mode as this is already handled by framework - ARM: dts: rp1: Add I2C timings - ARM: dts: rp1: Add a safe I2C SDA hold time - overlays: Add overlay for the Solomon SSD1327 OLED - arm: dts: overlays: add Pi 5 variants for w1-gpio overlays - Harmonizing the improvement on backup-switchover-mode overlay value definitions - Add pcie-32bit-dma-overlay-pi5 to enable 32bit DMA on the Pi 5's external PCIe - staging: vchiq_arm: Set up dma ranges on child devices - staging: vchiq: Use the old dma controller for OF config on platform devices - staging: vchiq_arm: Give vchiq children DT nodes - staging: vchiq_arm: Add 36-bit address support - staging: vchiq_arm: children inherit DMA config - staging: vchiq_arm: Usa a DMA pool for small bulks - gpio-poweroff: Disable the WARN - xhci: Use more event ring segment table entries - drivers: usb: dwc3: add FS/LS bus instance parkmode disable bit - drm/vc4: Initialise the tv_mode property default from cmdline_mode. - drivers: media: pisp_be: Update seqeuence numbers of the buffers - i2c: designware: Use SCL rise and fall times in DT - i2c: designware: Support non-standard bus speeds - iommu/bcm2712: don't allow building as module - drm/rp1: depends on, instead of select, MFD_RP1 - ARM: dts: Standardise downstream Pi GPIO pin names - ARM: dts: bcm2712-rpi-5-b: Add act_led_gpio - ARM: dts: rp1: Boost the I2C drive strength - drm: rp1: Use tv_mode from the command line and fix for Linux 6.6 - Update touch PiTFT overlays - ASoC: DACplus - fix 16bit sample support in clock consumer mode - ASoC: adds support for AMP4 Pro to the DAC Plus driver - DT-overlays: adds support for Hifiberry AMP4 Pro - ASoC: DACplusADCPro - fix 16bit sample support in clock consumer mode - overlays: Correct some compatible strings - overlays: Delete deprecated overlay mpu6050 - irqchip: irq-bcm2836: Avoid prototype warning - dmaengine: bcm2835: Delete vestigial code - PCI: brcmstb: resolve conflicts with upstream CLKREQ# selection - PCI: brcmstb: don't set bridge timeouts on BCM2712 - staging: bcm2835-codec: Fix up for 6.8 - use ignore_cap_streaming - overlays: i2c-sensor: include irq.h and use defined triggers - overlays: i2c-sensor: add support for hts221 - overlays: i2c-sensor: add support for veml6075 - drivers: media: cfe: Increase default size of embedded buffer - drm: rp1: VEC and DPI drivers: Fix bug #5901 - drm/vc4: Drop planes that have 0 destination size - vc4/hvs: Support fixed alpha correctly on 2712D0 - drm/vc4: Disable overrun interrupts - media: rp1: cfe: Actually use the number of lanes configured - PCI: brcmstb: Enable CRS software visibility after linkup - dts: bcm2712: update sdio1 on Pi 5 - drivers: mmc: sdhci-brcmstb: fix usage of SD_PIN_SEL on BCM2712 - drivers: pinctrl: add BCM2712D0 EMMC pins - ARM: dts: Add CM5 DTS support - arm: dt: bcm2712: Reduce DDC frequency to 97.5kHz from 200kHz. - PCI: brcmstb: Set new flags to avoid QOS "holes" on BCM2712D0 - non-upstream: support DS1 exit firmware re-download - brcmfmac: Fix interoperating DPP and other encryption network access - brcmfmac: support external SAE authentication in station mode - Impliment driver support for Interlude Audio Digital Hat - Add overlays needed for Interlude Audio Digital and Analog hats - vc4/hvs: Fix lbm size calculation for yuv - brcmfmac: Fix 802.1x - Revert "drm/v3d: Improve MMU support for larger pages" - drm/v3d: Enable V3D to use different PAGE_SIZE - Add IQaudio CodecZero to hat_map.dts - kunit: Setup DMA masks on the kunit device - arm64/Kconfig: Don't set DMA_BOUNCE_UNALIGNED_KMALLOC - Bluetooth: btbcm: Add entry for BCM43439 UART BT - iommu: bcm2712-iommu: Map and unmap multiple pages in a single call - perf/raspberry: Add support for 2712 axi performance monitors - ARM: dts: Add support for 2712 axi performance monitors [ Ubuntu: 6.8.0-11.11 ] * noble/linux: 6.8.0-11.11 -proposed tracker (LP: #2053094) * Miscellaneous Ubuntu changes - [Packaging] riscv64: disable building unnecessary binary debs [ Ubuntu: 6.8.0-10.10 ] * noble/linux: 6.8.0-10.10 -proposed tracker (LP: #2053015) * Miscellaneous Ubuntu changes - [Packaging] add Rust build-deps for riscv64 * Miscellaneous upstream changes - Revert "Revert "UBUNTU: [Packaging] temporarily disable Rust dependencies on riscv64"" [ Ubuntu: 6.8.0-9.9 ] * noble/linux: 6.8.0-9.9 -proposed tracker (LP: #2052945) * Miscellaneous upstream changes - Revert "UBUNTU: [Packaging] temporarily disable Rust dependencies on riscv64" [ Ubuntu: 6.8.0-8.8 ] * noble/linux: 6.8.0-8.8 -proposed tracker (LP: #2052918) * Miscellaneous Ubuntu changes - [Packaging] riscv64: enable linux-libc-dev build - v6.8-rc4 rebase * Rebase on v6.8-rc4 [ Ubuntu: 6.8.0-7.7 ] * noble/linux: 6.8.0-7.7 -proposed tracker (LP: #2052691) * update apparmor and LSM stacking patch set (LP: #2028253) - SAUCE: apparmor4.0.0 [01/87]: LSM stacking v39: integrity: disassociate ima_filter_rule from security_audit_rule - SAUCE: apparmor4.0.0 [02/87]: LSM stacking v39: SM: Infrastructure management of the sock security - SAUCE: apparmor4.0.0 [03/87]: LSM stacking v39: LSM: Add the lsmblob data structure. - SAUCE: apparmor4.0.0 [04/87]: LSM stacking v39: IMA: avoid label collisions with stacked LSMs - SAUCE: apparmor4.0.0 [05/87]: LSM stacking v39: LSM: Use lsmblob in security_audit_rule_match - SAUCE: apparmor4.0.0 [06/87]: LSM stacking v39: LSM: Add lsmblob_to_secctx hook - SAUCE: apparmor4.0.0 [07/87]: LSM stacking v39: Audit: maintain an lsmblob in audit_context - SAUCE: apparmor4.0.0 [08/87]: LSM stacking v39: LSM: Use lsmblob in security_ipc_getsecid - SAUCE: apparmor4.0.0 [09/87]: LSM stacking v39: Audit: Update shutdown LSM data - SAUCE: apparmor4.0.0 [10/87]: LSM stacking v39: LSM: Use lsmblob in security_current_getsecid - SAUCE: apparmor4.0.0 [11/87]: LSM stacking v39: LSM: Use lsmblob in security_inode_getsecid - SAUCE: apparmor4.0.0 [12/87]: LSM stacking v39: Audit: use an lsmblob in audit_names - SAUCE: apparmor4.0.0 [13/87]: LSM stacking v39: LSM: Create new security_cred_getlsmblob LSM hook - SAUCE: apparmor4.0.0 [14/87]: LSM stacking v39: Audit: Change context data from secid to lsmblob - SAUCE: apparmor4.0.0 [15/87]: LSM stacking v39: Netlabel: Use lsmblob for audit data - SAUCE: apparmor4.0.0 [16/87]: LSM stacking v39: LSM: Ensure the correct LSM context releaser - SAUCE: apparmor4.0.0 [17/87]: LSM stacking v39: LSM: Use lsmcontext in security_secid_to_secctx - SAUCE: apparmor4.0.0 [18/87]: LSM stacking v39: LSM: Use lsmcontext in security_lsmblob_to_secctx - SAUCE: apparmor4.0.0 [19/87]: LSM stacking v39: LSM: Use lsmcontext in security_inode_getsecctx - SAUCE: apparmor4.0.0 [20/87]: LSM stacking v39: LSM: Use lsmcontext in security_dentry_init_security - SAUCE: apparmor4.0.0 [21/87]: LSM stacking v39: LSM: security_lsmblob_to_secctx module selection - SAUCE: apparmor4.0.0 [22/87]: LSM stacking v39: Audit: Create audit_stamp structure - SAUCE: apparmor4.0.0 [23/87]: LSM stacking v39: Audit: Allow multiple records in an audit_buffer - SAUCE: apparmor4.0.0 [24/87]: LSM stacking v39: Audit: Add record for multiple task security contexts - SAUCE: apparmor4.0.0 [25/87]: LSM stacking v39: audit: multiple subject lsm values for netlabel - SAUCE: apparmor4.0.0 [26/87]: LSM stacking v39: Audit: Add record for multiple object contexts - SAUCE: apparmor4.0.0 [27/87]: LSM stacking v39: LSM: Remove unused lsmcontext_init() - SAUCE: apparmor4.0.0 [28/87]: LSM stacking v39: LSM: Improve logic in security_getprocattr - SAUCE: apparmor4.0.0 [29/87]: LSM stacking v39: LSM: secctx provider check on release - SAUCE: apparmor4.0.0 [31/87]: LSM stacking v39: LSM: Exclusive secmark usage - SAUCE: apparmor4.0.0 [32/87]: LSM stacking v39: LSM: Identify which LSM handles the context string - SAUCE: apparmor4.0.0 [33/87]: LSM stacking v39: AppArmor: Remove the exclusive flag - SAUCE: apparmor4.0.0 [34/87]: LSM stacking v39: LSM: Add mount opts blob size tracking - SAUCE: apparmor4.0.0 [35/87]: LSM stacking v39: LSM: allocate mnt_opts blobs instead of module specific data - SAUCE: apparmor4.0.0 [36/87]: LSM stacking v39: LSM: Infrastructure management of the key security blob - SAUCE: apparmor4.0.0 [37/87]: LSM stacking v39: LSM: Infrastructure management of the mnt_opts security blob - SAUCE: apparmor4.0.0 [38/87]: LSM stacking v39: LSM: Correct handling of ENOSYS in inode_setxattr - SAUCE: apparmor4.0.0 [39/87]: LSM stacking v39: LSM: Remove lsmblob scaffolding - SAUCE: apparmor4.0.0 [40/87]: LSM stacking v39: LSM: Allow reservation of netlabel - SAUCE: apparmor4.0.0 [41/87]: LSM stacking v39: LSM: restrict security_cred_getsecid() to a single LSM - SAUCE: apparmor4.0.0 [42/87]: LSM stacking v39: Smack: Remove LSM_FLAG_EXCLUSIVE - SAUCE: apparmor4.0.0 [43/87]: LSM stacking v39: UBUNTU: SAUCE: apparmor4.0.0 [12/95]: add/use fns to print hash string hex value - SAUCE: apparmor4.0.0 [44/87]: patch to provide compatibility with v2.x net rules - SAUCE: apparmor4.0.0 [45/87]: add unpriviled user ns mediation - SAUCE: apparmor4.0.0 [46/87]: Add sysctls for additional controls of unpriv userns restrictions - SAUCE: apparmor4.0.0 [47/87]: af_unix mediation - SAUCE: apparmor4.0.0 [48/87]: Add fine grained mediation of posix mqueues - SAUCE: apparmor4.0.0 [49/87]: setup slab cache for audit data - SAUCE: apparmor4.0.0 [50/87]: Improve debug print infrastructure - SAUCE: apparmor4.0.0 [51/87]: add the ability for profiles to have a learning cache - SAUCE: apparmor4.0.0 [52/87]: enable userspace upcall for mediation - SAUCE: apparmor4.0.0 [53/87]: prompt - lock down prompt interface - SAUCE: apparmor4.0.0 [54/87]: prompt - allow controlling of caching of a prompt response - SAUCE: apparmor4.0.0 [55/87]: prompt - add refcount to audit_node in prep or reuse and delete - SAUCE: apparmor4.0.0 [56/87]: prompt - refactor to moving caching to uresponse - SAUCE: apparmor4.0.0 [57/87]: prompt - Improve debug statements - SAUCE: apparmor4.0.0 [58/87]: prompt - fix caching - SAUCE: apparmor4.0.0 [59/87]: prompt - rework build to use append fn, to simplify adding strings - SAUCE: apparmor4.0.0 [60/87]: prompt - refcount notifications - SAUCE: apparmor4.0.0 [61/87]: prompt - add the ability to reply with a profile name - SAUCE: apparmor4.0.0 [62/87]: prompt - fix notification cache when updating - SAUCE: apparmor4.0.0 [63/87]: prompt - add tailglob on name for cache support - SAUCE: apparmor4.0.0 [64/87]: prompt - allow profiles to set prompts as interruptible - SAUCE: apparmor4.0.0 [65/87] v6.8 prompt:fixup interruptible - SAUCE: apparmor4.0.0 [69/87]: add io_uring mediation - SAUCE: apparmor4.0.0 [70/87]: apparmor: fix oops when racing to retrieve notification - SAUCE: apparmor4.0.0 [71/87]: apparmor: fix notification header size - SAUCE: apparmor4.0.0 [72/87]: apparmor: fix request field from a prompt reply that denies all access - SAUCE: apparmor4.0.0 [73/87]: apparmor: open userns related sysctl so lxc can check if restriction are in place - SAUCE: apparmor4.0.0 [74/87]: apparmor: cleanup attachment perm lookup to use lookup_perms() - SAUCE: apparmor4.0.0 [75/87]: apparmor: remove redundant unconfined check. - SAUCE: apparmor4.0.0 [76/87]: apparmor: switch signal mediation to using RULE_MEDIATES - SAUCE: apparmor4.0.0 [77/87]: apparmor: ensure labels with more than one entry have correct flags - SAUCE: apparmor4.0.0 [78/87]: apparmor: remove explicit restriction that unconfined cannot use change_hat - SAUCE: apparmor4.0.0 [79/87]: apparmor: cleanup: refactor file_perm() to provide semantics of some checks - SAUCE: apparmor4.0.0 [80/87]: apparmor: carry mediation check on label - SAUCE: apparmor4.0.0 [81/87]: apparmor: convert easy uses of unconfined() to label_mediates() - SAUCE: apparmor4.0.0 [82/87]: apparmor: add additional flags to extended permission. - SAUCE: apparmor4.0.0 [83/87]: apparmor: add support for profiles to define the kill signal - SAUCE: apparmor4.0.0 [84/87]: apparmor: fix x_table_lookup when stacking is not the first entry - SAUCE: apparmor4.0.0 [85/87]: apparmor: allow profile to be transitioned when a user ns is created - SAUCE: apparmor4.0.0 [86/87]: apparmor: add ability to mediate caps with policy state machine - SAUCE: apparmor4.0.0 [87/87]: fixup notify - [Config] disable CONFIG_SECURITY_APPARMOR_RESTRICT_USERNS * update apparmor and LSM stacking patch set (LP: #2028253) // [FFe] apparmor-4.0.0-alpha2 for unprivileged user namespace restrictions in mantic (LP: #2032602) - SAUCE: apparmor4.0.0 [66/87]: prompt - add support for advanced filtering of notifications - SAUCE: apparmor4.0.0 [67/87]: userns - add the ability to reference a global variable for a feature value - SAUCE: apparmor4.0.0 [68/87]: userns - make it so special unconfined profiles can mediate user namespaces [ Ubuntu: 6.8.0-6.6 ] * noble/linux: 6.8.0-6.6 -proposed tracker (LP: #2052592) * Packaging resync (LP: #1786013) - debian.master/dkms-versions -- update from kernel-versions (main/d2024.02.07) - [Packaging] update variants * FIPS kernels should default to fips mode (LP: #2049082) - SAUCE: Enable fips mode by default, in FIPS kernels only * Fix snapcraftyaml.yaml for jammy:linux-raspi (LP: #2051468) - [Packaging] Remove old snapcraft.yaml * Azure: Fix regression introduced in LP: #2045069 (LP: #2052453) - hv_netvsc: Register VF in netvsc_probe if NET_DEVICE_REGISTER missed * Miscellaneous Ubuntu changes - [Packaging] Remove in-tree abi checks - [Packaging] drop abi files with clean - [Packaging] Remove do_full_source variable (fixup) - [Packaging] Remove update-dkms-versions and move dkms-versions - [Config] updateconfigs following v6.8-rc3 rebase - [packaging] rename to linux - [packaging] rebase on v6.8-rc3 - [packaging] disable signing for ppc64el * Rebase on v6.8-rc3 [ Ubuntu: 6.8.0-5.5 ] * noble/linux-unstable: 6.8.0-5.5 -proposed tracker (LP: #2052136) * Miscellaneous upstream changes - Revert "mm/sparsemem: fix race in accessing memory_section->usage" [ Ubuntu: 6.8.0-4.4 ] * noble/linux-unstable: 6.8.0-4.4 -proposed tracker (LP: #2051502) * Migrate from fbdev drivers to simpledrm and DRM fbdev emulation layer (LP: #1965303) - [Config] enable simpledrm and DRM fbdev emulation layer * Miscellaneous Ubuntu changes - [Config] toolchain update * Miscellaneous upstream changes - rust: upgrade to Rust 1.75.0 [ Ubuntu: 6.8.0-3.3 ] * noble/linux-unstable: 6.8.0-3.3 -proposed tracker (LP: #2051488) * update apparmor and LSM stacking patch set (LP: #2028253) - SAUCE: apparmor4.0.0 [43/87]: LSM stacking v39: UBUNTU: SAUCE: apparmor4.0.0 [12/95]: add/use fns to print hash string hex value - SAUCE: apparmor4.0.0 [44/87]: patch to provide compatibility with v2.x net rules - SAUCE: apparmor4.0.0 [45/87]: add unpriviled user ns mediation - SAUCE: apparmor4.0.0 [46/87]: Add sysctls for additional controls of unpriv userns restrictions - SAUCE: apparmor4.0.0 [47/87]: af_unix mediation - SAUCE: apparmor4.0.0 [48/87]: Add fine grained mediation of posix mqueues - SAUCE: apparmor4.0.0 [49/87]: setup slab cache for audit data - SAUCE: apparmor4.0.0 [50/87]: Improve debug print infrastructure - SAUCE: apparmor4.0.0 [51/87]: add the ability for profiles to have a learning cache - SAUCE: apparmor4.0.0 [52/87]: enable userspace upcall for mediation - SAUCE: apparmor4.0.0 [53/87]: prompt - lock down prompt interface - SAUCE: apparmor4.0.0 [54/87]: prompt - allow controlling of caching of a prompt response - SAUCE: apparmor4.0.0 [55/87]: prompt - add refcount to audit_node in prep or reuse and delete - SAUCE: apparmor4.0.0 [56/87]: prompt - refactor to moving caching to uresponse - SAUCE: apparmor4.0.0 [57/87]: prompt - Improve debug statements - SAUCE: apparmor4.0.0 [58/87]: prompt - fix caching - SAUCE: apparmor4.0.0 [59/87]: prompt - rework build to use append fn, to simplify adding strings - SAUCE: apparmor4.0.0 [60/87]: prompt - refcount notifications - SAUCE: apparmor4.0.0 [61/87]: prompt - add the ability to reply with a profile name - SAUCE: apparmor4.0.0 [62/87]: prompt - fix notification cache when updating - SAUCE: apparmor4.0.0 [63/87]: prompt - add tailglob on name for cache support - SAUCE: apparmor4.0.0 [64/87]: prompt - allow profiles to set prompts as interruptible - SAUCE: apparmor4.0.0 [69/87]: add io_uring mediation - [Config] disable CONFIG_SECURITY_APPARMOR_RESTRICT_USERNS * apparmor restricts read access of user namespace mediation sysctls to root (LP: #2040194) - SAUCE: apparmor4.0.0 [73/87]: apparmor: open userns related sysctl so lxc can check if restriction are in place * AppArmor spams kernel log with assert when auditing (LP: #2040192) - SAUCE: apparmor4.0.0 [72/87]: apparmor: fix request field from a prompt reply that denies all access * apparmor notification files verification (LP: #2040250) - SAUCE: apparmor4.0.0 [71/87]: apparmor: fix notification header size * apparmor oops when racing to retrieve a notification (LP: #2040245) - SAUCE: apparmor4.0.0 [70/87]: apparmor: fix oops when racing to retrieve notification * update apparmor and LSM stacking patch set (LP: #2028253) // [FFe] apparmor-4.0.0-alpha2 for unprivileged user namespace restrictions in mantic (LP: #2032602) - SAUCE: apparmor4.0.0 [66/87]: prompt - add support for advanced filtering of notifications - SAUCE: apparmor4.0.0 [67/87]: userns - add the ability to reference a global variable for a feature value - SAUCE: apparmor4.0.0 [68/87]: userns - make it so special unconfined profiles can mediate user namespaces * Miscellaneous Ubuntu changes - SAUCE: apparmor4.0.0 [01/87]: LSM stacking v39: integrity: disassociate ima_filter_rule from security_audit_rule - SAUCE: apparmor4.0.0 [02/87]: LSM stacking v39: SM: Infrastructure management of the sock security - SAUCE: apparmor4.0.0 [03/87]: LSM stacking v39: LSM: Add the lsmblob data structure. - SAUCE: apparmor4.0.0 [04/87]: LSM stacking v39: IMA: avoid label collisions with stacked LSMs - SAUCE: apparmor4.0.0 [05/87]: LSM stacking v39: LSM: Use lsmblob in security_audit_rule_match - SAUCE: apparmor4.0.0 [06/87]: LSM stacking v39: LSM: Add lsmblob_to_secctx hook - SAUCE: apparmor4.0.0 [07/87]: LSM stacking v39: Audit: maintain an lsmblob in audit_context - SAUCE: apparmor4.0.0 [08/87]: LSM stacking v39: LSM: Use lsmblob in security_ipc_getsecid - SAUCE: apparmor4.0.0 [09/87]: LSM stacking v39: Audit: Update shutdown LSM data - SAUCE: apparmor4.0.0 [10/87]: LSM stacking v39: LSM: Use lsmblob in security_current_getsecid - SAUCE: apparmor4.0.0 [11/87]: LSM stacking v39: LSM: Use lsmblob in security_inode_getsecid - SAUCE: apparmor4.0.0 [12/87]: LSM stacking v39: Audit: use an lsmblob in audit_names - SAUCE: apparmor4.0.0 [13/87]: LSM stacking v39: LSM: Create new security_cred_getlsmblob LSM hook - SAUCE: apparmor4.0.0 [14/87]: LSM stacking v39: Audit: Change context data from secid to lsmblob - SAUCE: apparmor4.0.0 [15/87]: LSM stacking v39: Netlabel: Use lsmblob for audit data - SAUCE: apparmor4.0.0 [16/87]: LSM stacking v39: LSM: Ensure the correct LSM context releaser - SAUCE: apparmor4.0.0 [17/87]: LSM stacking v39: LSM: Use lsmcontext in security_secid_to_secctx - SAUCE: apparmor4.0.0 [18/87]: LSM stacking v39: LSM: Use lsmcontext in security_lsmblob_to_secctx - SAUCE: apparmor4.0.0 [19/87]: LSM stacking v39: LSM: Use lsmcontext in security_inode_getsecctx - SAUCE: apparmor4.0.0 [20/87]: LSM stacking v39: LSM: Use lsmcontext in security_dentry_init_security - SAUCE: apparmor4.0.0 [21/87]: LSM stacking v39: LSM: security_lsmblob_to_secctx module selection - SAUCE: apparmor4.0.0 [22/87]: LSM stacking v39: Audit: Create audit_stamp structure - SAUCE: apparmor4.0.0 [23/87]: LSM stacking v39: Audit: Allow multiple records in an audit_buffer - SAUCE: apparmor4.0.0 [24/87]: LSM stacking v39: Audit: Add record for multiple task security contexts - SAUCE: apparmor4.0.0 [25/87]: LSM stacking v39: audit: multiple subject lsm values for netlabel - SAUCE: apparmor4.0.0 [26/87]: LSM stacking v39: Audit: Add record for multiple object contexts - SAUCE: apparmor4.0.0 [27/87]: LSM stacking v39: LSM: Remove unused lsmcontext_init() - SAUCE: apparmor4.0.0 [28/87]: LSM stacking v39: LSM: Improve logic in security_getprocattr - SAUCE: apparmor4.0.0 [29/87]: LSM stacking v39: LSM: secctx provider check on release - SAUCE: apparmor4.0.0 [30/87]: LSM stacking v39: LSM: Single calls in socket_getpeersec hooks - SAUCE: apparmor4.0.0 [31/87]: LSM stacking v39: LSM: Exclusive secmark usage - SAUCE: apparmor4.0.0 [32/87]: LSM stacking v39: LSM: Identify which LSM handles the context string - SAUCE: apparmor4.0.0 [33/87]: LSM stacking v39: AppArmor: Remove the exclusive flag - SAUCE: apparmor4.0.0 [34/87]: LSM stacking v39: LSM: Add mount opts blob size tracking - SAUCE: apparmor4.0.0 [35/87]: LSM stacking v39: LSM: allocate mnt_opts blobs instead of module specific data - SAUCE: apparmor4.0.0 [36/87]: LSM stacking v39: LSM: Infrastructure management of the key security blob - SAUCE: apparmor4.0.0 [37/87]: LSM stacking v39: LSM: Infrastructure management of the mnt_opts security blob - SAUCE: apparmor4.0.0 [38/87]: LSM stacking v39: LSM: Correct handling of ENOSYS in inode_setxattr - SAUCE: apparmor4.0.0 [39/87]: LSM stacking v39: LSM: Remove lsmblob scaffolding - SAUCE: apparmor4.0.0 [40/87]: LSM stacking v39: LSM: Allow reservation of netlabel - SAUCE: apparmor4.0.0 [41/87]: LSM stacking v39: LSM: restrict security_cred_getsecid() to a single LSM - SAUCE: apparmor4.0.0 [42/87]: LSM stacking v39: Smack: Remove LSM_FLAG_EXCLUSIVE - SAUCE: apparmor4.0.0 [65/87] v6.8 prompt:fixup interruptible - SAUCE: apparmor4.0.0 [74/87]: apparmor: cleanup attachment perm lookup to use lookup_perms() - SAUCE: apparmor4.0.0 [75/87]: apparmor: remove redundant unconfined check. - SAUCE: apparmor4.0.0 [76/87]: apparmor: switch signal mediation to using RULE_MEDIATES - SAUCE: apparmor4.0.0 [77/87]: apparmor: ensure labels with more than one entry have correct flags - SAUCE: apparmor4.0.0 [78/87]: apparmor: remove explicit restriction that unconfined cannot use change_hat - SAUCE: apparmor4.0.0 [79/87]: apparmor: cleanup: refactor file_perm() to provide semantics of some checks - SAUCE: apparmor4.0.0 [80/87]: apparmor: carry mediation check on label - SAUCE: apparmor4.0.0 [81/87]: apparmor: convert easy uses of unconfined() to label_mediates() - SAUCE: apparmor4.0.0 [82/87]: apparmor: add additional flags to extended permission. - SAUCE: apparmor4.0.0 [83/87]: apparmor: add support for profiles to define the kill signal - SAUCE: apparmor4.0.0 [84/87]: apparmor: fix x_table_lookup when stacking is not the first entry - SAUCE: apparmor4.0.0 [85/87]: apparmor: allow profile to be transitioned when a user ns is created - SAUCE: apparmor4.0.0 [86/87]: apparmor: add ability to mediate caps with policy state machine - SAUCE: apparmor4.0.0 [87/87]: fixup notify - [Config] updateconfigs following v6.8-rc2 rebase [ Ubuntu: 6.8.0-2.2 ] * noble/linux-unstable: 6.8.0-2.2 -proposed tracker (LP: #2051110) * Miscellaneous Ubuntu changes - [Config] toolchain update - [Config] enable Rust [ Ubuntu: 6.8.0-1.1 ] * noble/linux-unstable: 6.8.0-1.1 -proposed tracker (LP: #2051102) * Miscellaneous Ubuntu changes - [packaging] move to v6.8-rc1 - [Config] updateconfigs following v6.8-rc1 rebase - SAUCE: export file_close_fd() instead of close_fd_get_file() - SAUCE: cpufreq: s/strlcpy/strscpy/ - debian/dkms-versions -- temporarily disable zfs dkms - debian/dkms-versions -- temporarily disable ipu6 and isvsc dkms - debian/dkms-versions -- temporarily disable v4l2loopback [ Ubuntu: 6.7.0-7.7 ] * noble/linux-unstable: 6.7.0-7.7 -proposed tracker (LP: #2049357) * Packaging resync (LP: #1786013) - [Packaging] update variants * Miscellaneous Ubuntu changes - [Packaging] re-enable signing for s390x and ppc64el -- Juerg Haefliger