linux-oem-6.5 6.5.0-1002.2 source package in Ubuntu

Changelog

linux-oem-6.5 (6.5.0-1002.2) jammy; urgency=medium

  * jammy/linux-oem-6.5: 6.5.0-1002.2 -proposed tracker (LP: #2029454)

  * Packaging resync (LP: #1786013)
    - [Packaging] resync update-dkms-versions helper

  * i915: Backport some fixes for Meteor Lake (LP: #2029470)
    - drm/i915/mtl: update DP 2.0 vswing table for C20 phy
    - drm/i915/mtl: Add new vswing table for C20 phy to support DP 1.4
    - drm/i915/mtl: Skip using vbt hdmi_level_shifter selection on MTL
    - drm/i915/mtl: Update workaround 14018778641
    - drm/i915/mtl: Update cache coherency setting for context structure
    - drm/i915/gt: Do not use stolen on MTL

  * Remove force_probe for i915 on MTL platforms to ease the development process
    (LP: #2029372)
    - SAUCE: drm/i915/mtl: Drop force_probe requirement

  [ Ubuntu: 6.5.0-4.4 ]

  * mantic/linux-unstable: 6.5.0-4.4 -proposed tracker (LP: #2029086)
  * Miscellaneous Ubuntu changes
    - [Packaging] Add .NOTPARALLEL
    - [Packaging] Remove meaningless $(header_arch)
    - [Packaging] Fix File exists error in install-arch-headers
    - [Packaging] clean debian/linux-* directories
    - [Packaging] remove hmake
    - [Packaging] install headers to debian/linux-libc-dev directly
    - [Config] define CONFIG options for arm64 instead of arm64-generic
    - [Config] update annotations after rebase to v6.5-rc4
    - [Packaging] temporarily disable Rust support
  * Rebase to v6.5-rc4

  [ Ubuntu: 6.5.0-3.3 ]

  * mantic/linux-unstable: 6.5.0-3.3 -proposed tracker (LP: #2028779)
  * enable Rust support in the kernel (LP: #2007654)
    - SAUCE: rust: support rustc-1.69.0
    - [Packaging] depend on rustc-1.69.0
  * Packaging resync (LP: #1786013)
    - [Packaging] resync update-dkms-versions helper
    - [Packaging] resync getabis
  * Fix UBSAN in Intel EDAC driver (LP: #2028746)
    - EDAC/i10nm: Skip the absent memory controllers
  * Ship kernel modules Zstd compressed (LP: #2028568)
    - SAUCE: Support but do not require compressed modules
    - [Config] Enable support for ZSTD compressed modules
    - [Packaging] ZSTD compress modules
  * update apparmor and LSM stacking patch set (LP: #2028253)
    - SAUCE: apparmor3.2.0 [02/60]: rename SK_CTX() to aa_sock and make it an
      inline fn
    - SAUCE: apparmor3.2.0 [05/60]: Add sysctls for additional controls of unpriv
      userns restrictions
    - SAUCE: apparmor3.2.0 [08/60]: Stacking v38: LSM: Identify modules by more
      than name
    - SAUCE: apparmor3.2.0 [09/60]: Stacking v38: LSM: Add an LSM identifier for
      external use
    - SAUCE: apparmor3.2.0 [10/60]: Stacking v38: LSM: Identify the process
      attributes for each module
    - SAUCE: apparmor3.2.0 [11/60]: Stacking v38: LSM: Maintain a table of LSM
      attribute data
    - SAUCE: apparmor3.2.0 [12/60]: Stacking v38: proc: Use lsmids instead of lsm
      names for attrs
    - SAUCE: apparmor3.2.0 [13/60]: Stacking v38: integrity: disassociate
      ima_filter_rule from security_audit_rule
    - SAUCE: apparmor3.2.0 [14/60]: Stacking v38: LSM: Infrastructure management
      of the sock security
    - SAUCE: apparmor3.2.0 [15/60]: Stacking v38: LSM: Add the lsmblob data
      structure.
    - SAUCE: apparmor3.2.0 [16/60]: Stacking v38: LSM: provide lsm name and id
      slot mappings
    - SAUCE: apparmor3.2.0 [17/60]: Stacking v38: IMA: avoid label collisions with
      stacked LSMs
    - SAUCE: apparmor3.2.0 [18/60]: Stacking v38: LSM: Use lsmblob in
      security_audit_rule_match
    - SAUCE: apparmor3.2.0 [19/60]: Stacking v38: LSM: Use lsmblob in
      security_kernel_act_as
    - SAUCE: apparmor3.2.0 [20/60]: Stacking v38: LSM: Use lsmblob in
      security_secctx_to_secid
    - SAUCE: apparmor3.2.0 [21/60]: Stacking v38: LSM: Use lsmblob in
      security_secid_to_secctx
    - SAUCE: apparmor3.2.0 [22/60]: Stacking v38: LSM: Use lsmblob in
      security_ipc_getsecid
    - SAUCE: apparmor3.2.0 [23/60]: Stacking v38: LSM: Use lsmblob in
      security_current_getsecid
    - SAUCE: apparmor3.2.0 [24/60]: Stacking v38: LSM: Use lsmblob in
      security_inode_getsecid
    - SAUCE: apparmor3.2.0 [25/60]: Stacking v38: LSM: Use lsmblob in
      security_cred_getsecid
    - SAUCE: apparmor3.2.0 [26/60]: Stacking v38: LSM: Specify which LSM to
      display
    - SAUCE: apparmor3.2.0 [28/60]: Stacking v38: LSM: Ensure the correct LSM
      context releaser
    - SAUCE: apparmor3.2.0 [29/60]: Stacking v38: LSM: Use lsmcontext in
      security_secid_to_secctx
    - SAUCE: apparmor3.2.0 [30/60]: Stacking v38: LSM: Use lsmcontext in
      security_inode_getsecctx
    - SAUCE: apparmor3.2.0 [31/60]: Stacking v38: Use lsmcontext in
      security_dentry_init_security
    - SAUCE: apparmor3.2.0 [32/60]: Stacking v38: LSM: security_secid_to_secctx in
      netlink netfilter
    - SAUCE: apparmor3.2.0 [33/60]: Stacking v38: NET: Store LSM netlabel data in
      a lsmblob
    - SAUCE: apparmor3.2.0 [34/60]: Stacking v38: binder: Pass LSM identifier for
      confirmation
    - SAUCE: apparmor3.2.0 [35/60]: Stacking v38: LSM: security_secid_to_secctx
      module selection
    - SAUCE: apparmor3.2.0 [36/60]: Stacking v38: Audit: Keep multiple LSM data in
      audit_names
    - SAUCE: apparmor3.2.0 [37/60]: Stacking v38: Audit: Create audit_stamp
      structure
    - SAUCE: apparmor3.2.0 [38/60]: Stacking v38: LSM: Add a function to report
      multiple LSMs
    - SAUCE: apparmor3.2.0 [39/60]: Stacking v38: Audit: Allow multiple records in
      an audit_buffer
    - SAUCE: apparmor3.2.0 [40/60]: Stacking v38: Audit: Add record for multiple
      task security contexts
    - SAUCE: apparmor3.2.0 [41/60]: Stacking v38: audit: multiple subject lsm
      values for netlabel
    - SAUCE: apparmor3.2.0 [42/60]: Stacking v38: Audit: Add record for multiple
      object contexts
    - SAUCE: apparmor3.2.0 [43/60]: Stacking v38: netlabel: Use a struct lsmblob
      in audit data
    - SAUCE: apparmor3.2.0 [44/60]: Stacking v38: LSM: Removed scaffolding
      function lsmcontext_init
    - SAUCE: apparmor3.2.0 [45/60]: Stacking v38: AppArmor: Remove the exclusive
      flag
    - SAUCE: apparmor3.2.0 [46/60]: combine common_audit_data and
      apparmor_audit_data
    - SAUCE: apparmor3.2.0 [47/60]: setup slab cache for audit data
    - SAUCE: apparmor3.2.0 [48/60]: rename audit_data->label to
      audit_data->subj_label
    - SAUCE: apparmor3.2.0 [49/60]: pass cred through to audit info.
    - SAUCE: apparmor3.2.0 [50/60]: Improve debug print infrastructure
    - SAUCE: apparmor3.2.0 [51/60]: add the ability for profiles to have a
      learning cache
    - SAUCE: apparmor3.2.0 [52/60]: enable userspace upcall for mediation
    - SAUCE: apparmor3.2.0 [53/60]: cache buffers on percpu list if there is lock
      contention
    - SAUCE: apparmor3.2.0 [55/60]: advertise availability of exended perms
    - SAUCE: apparmor3.2.0 [60/60]: [Config] enable
      CONFIG_SECURITY_APPARMOR_RESTRICT_USERNS
  * LSM stacking and AppArmor for 6.2: additional fixes (LP: #2017903) // update
    apparmor and LSM stacking patch set (LP: #2028253)
    - SAUCE: apparmor3.2.0 [57/60]: fix profile verification and enable it
  * udev fails to make prctl() syscall with apparmor=0 (as used by maas by
    default) (LP: #2016908) // update apparmor and LSM stacking patch set
    (LP: #2028253)
    - SAUCE: apparmor3.2.0 [27/60]: Stacking v38: Fix prctl() syscall with
      apparmor=0
  * kinetic: apply new apparmor and LSM stacking patch set (LP: #1989983) //
    update apparmor and LSM stacking patch set (LP: #2028253)
    - SAUCE: apparmor3.2.0 [01/60]: add/use fns to print hash string hex value
    - SAUCE: apparmor3.2.0 [03/60]: patch to provide compatibility with v2.x net
      rules
    - SAUCE: apparmor3.2.0 [04/60]: add user namespace creation mediation
    - SAUCE: apparmor3.2.0 [06/60]: af_unix mediation
    - SAUCE: apparmor3.2.0 [07/60]: Add fine grained mediation of posix mqueues
  * Miscellaneous Ubuntu changes
    - [Packaging] Use consistent llvm/clang for rust
  * Rebase to v6.5-rc3

 -- Timo Aaltonen <email address hidden>  Mon, 07 Aug 2023 10:43:37 +0300

Upload details

Uploaded by:
Timo Aaltonen
Uploaded to:
Jammy
Original maintainer:
Ubuntu Kernel Team
Architectures:
all amd64
Section:
devel
Urgency:
Medium Urgency

See full publishing history Publishing

Series Pocket Published Component Section

Builds

Jammy: [FULLYBUILT] amd64

Downloads

File Size SHA-256 Checksum
linux-oem-6.5_6.5.0-1002.2.tar.gz 223.9 MiB a0c412e0a2badd30e21bd8f23c13b64bbd3cc68a3a039a7e2849a1c9ad5427b4
linux-oem-6.5_6.5.0-1002.2.dsc 4.6 KiB dce0967ab1f5f12fea037ccbc74a8a38f1760ff6329b1570e0deed90e2391c9f

Available diffs

View changes file

Binary packages built by this source

linux-buildinfo-6.5.0-1002-oem: Linux kernel buildinfo for version 6.5.0 on 64 bit x86 SMP

 This package contains the Linux kernel buildinfo for version 6.5.0 on
 64 bit x86 SMP.
 .
 You likely do not want to install this package.

linux-headers-6.5.0-1002-oem: Linux kernel headers for version 6.5.0 on 64 bit x86 SMP

 This package provides kernel header files for version 6.5.0 on
 64 bit x86 SMP.
 .
 This is for sites that want the latest kernel headers. Please read
 /usr/share/doc/linux-headers-6.5.0-1002/debian.README.gz for details.

linux-image-unsigned-6.5.0-1002-oem: Linux kernel image for version 6.5.0 on 64 bit x86 SMP

 This package contains the unsigned Linux kernel image for version 6.5.0 on
 64 bit x86 SMP.
 .
 Supports OEM processors.
 .
 Geared toward desktops and laptops.
 .
 You likely do not want to install this package directly. Instead, install
 the linux-oem meta-package, which will ensure that upgrades work
 correctly, and that supporting packages are also installed.

linux-image-unsigned-6.5.0-1002-oem-dbgsym: Linux kernel debug image for version 6.5.0 on 64 bit x86 SMP

 This package provides the unsigned kernel debug image for version 6.5.0 on
 64 bit x86 SMP.
 .
 This is for sites that wish to debug the kernel.
 .
 The kernel image contained in this package is NOT meant to boot from. It
 is uncompressed, and unstripped. This package also includes the
 unstripped modules.

linux-modules-6.5.0-1002-oem: Linux kernel extra modules for version 6.5.0 on 64 bit x86 SMP

 Contains the corresponding System.map file, the modules built by the
 packager, and scripts that try to ensure that the system is not left in an
 unbootable state after an update.
 .
 Supports OEM processors.
 .
 Geared toward desktops and laptops.
 .
 You likely do not want to install this package directly. Instead, install
 the linux-oem meta-package, which will ensure that upgrades work
 correctly, and that supporting packages are also installed.

linux-oem-6.5-headers-6.5.0-1002: Header files related to Linux kernel version 6.5.0

 This package provides kernel header files for version 6.5.0, for sites
 that want the latest kernel headers. Please read
 /usr/share/doc/linux-oem-6.5-headers-6.5.0-1002/debian.README.gz for details

linux-oem-6.5-lib-rust-6.5.0-1002-oem: Rust library files related to Linux kernel version 6.5.0

 This package provides kernel library files for version 6.5.0, that allow to
 compile out-of-tree kernel modules written in Rust.

linux-oem-6.5-tools-6.5.0-1002: Linux kernel version specific tools for version 6.5.0-1002

 This package provides the architecture dependant parts for kernel
 version locked tools (such as perf and x86_energy_perf_policy) for
 version 6.5.0-1002 on
 64 bit x86.
 You probably want to install linux-tools-6.5.0-1002-<flavour>.

linux-oem-6.5-tools-host: Linux kernel VM host tools

 This package provides kernel tools useful for VM hosts.

linux-tools-6.5.0-1002-oem: Linux kernel version specific tools for version 6.5.0-1002

 This package provides the architecture dependant parts for kernel
 version locked tools (such as perf and x86_energy_perf_policy) for
 version 6.5.0-1002 on
 64 bit x86.