Format: 1.8 Date: Fri, 06 Oct 2023 23:42:19 +0100 Source: linux-starfive Binary: linux-buildinfo-6.5.0-1002-starfive linux-headers-6.5.0-1002-starfive linux-image-6.5.0-1002-starfive linux-modules-6.5.0-1002-starfive linux-modules-extra-6.5.0-1002-starfive linux-starfive-headers-6.5.0-1002 linux-starfive-tools-6.5.0-1002 linux-tools-6.5.0-1002-starfive Built-For-Profiles: noudeb Architecture: riscv64 all riscv64_translations Version: 6.5.0-1002.3 Distribution: mantic Urgency: medium Maintainer: Launchpad Build Daemon Changed-By: Dimitri John Ledkov Description: linux-buildinfo-6.5.0-1002-starfive - Linux kernel buildinfo for version 6.5.0 on RISC-V SMP linux-headers-6.5.0-1002-starfive - Linux kernel headers for version 6.5.0 on RISC-V SMP linux-image-6.5.0-1002-starfive - Linux kernel image for version 6.5.0 on RISC-V SMP linux-modules-6.5.0-1002-starfive - Linux kernel extra modules for version 6.5.0 on RISC-V SMP linux-modules-extra-6.5.0-1002-starfive - Linux kernel extra modules for version 6.5.0 on RISC-V SMP linux-starfive-headers-6.5.0-1002 - Header files related to Linux kernel version 6.5.0 linux-starfive-tools-6.5.0-1002 - Linux kernel version specific tools for version 6.5.0-1002 linux-tools-6.5.0-1002-starfive - Linux kernel version specific tools for version 6.5.0-1002 Launchpad-Bugs-Fixed: 1989983 2016908 2017903 2028253 2038567 2038577 2038687 2038697 Changes: linux-starfive (6.5.0-1002.3) mantic; urgency=medium . * mantic/linux-starfive: 6.5.0-1002.3 -proposed tracker (LP: #2038697) . [ Ubuntu: 6.5.0-9.9 ] . * mantic/linux: 6.5.0-9.9 -proposed tracker (LP: #2038687) * update apparmor and LSM stacking patch set (LP: #2028253) - re-apply apparmor 4.0.0 * Disable restricting unprivileged change_profile by default, due to LXD latest/stable not yet compatible with this new apparmor feature (LP: #2038567) - SAUCE: apparmor: Make apparmor_restrict_unprivileged_unconfined opt-in . [ Ubuntu: 6.5.0-8.8 ] . * mantic/linux: 6.5.0-8.8 -proposed tracker (LP: #2038577) * update apparmor and LSM stacking patch set (LP: #2028253) - SAUCE: apparmor3.2.0 [02/60]: rename SK_CTX() to aa_sock and make it an inline fn - SAUCE: apparmor3.2.0 [05/60]: Add sysctls for additional controls of unpriv userns restrictions - SAUCE: apparmor3.2.0 [08/60]: Stacking v38: LSM: Identify modules by more than name - SAUCE: apparmor3.2.0 [09/60]: Stacking v38: LSM: Add an LSM identifier for external use - SAUCE: apparmor3.2.0 [10/60]: Stacking v38: LSM: Identify the process attributes for each module - SAUCE: apparmor3.2.0 [11/60]: Stacking v38: LSM: Maintain a table of LSM attribute data - SAUCE: apparmor3.2.0 [12/60]: Stacking v38: proc: Use lsmids instead of lsm names for attrs - SAUCE: apparmor3.2.0 [13/60]: Stacking v38: integrity: disassociate ima_filter_rule from security_audit_rule - SAUCE: apparmor3.2.0 [14/60]: Stacking v38: LSM: Infrastructure management of the sock security - SAUCE: apparmor3.2.0 [15/60]: Stacking v38: LSM: Add the lsmblob data structure. - SAUCE: apparmor3.2.0 [16/60]: Stacking v38: LSM: provide lsm name and id slot mappings - SAUCE: apparmor3.2.0 [17/60]: Stacking v38: IMA: avoid label collisions with stacked LSMs - SAUCE: apparmor3.2.0 [18/60]: Stacking v38: LSM: Use lsmblob in security_audit_rule_match - SAUCE: apparmor3.2.0 [19/60]: Stacking v38: LSM: Use lsmblob in security_kernel_act_as - SAUCE: apparmor3.2.0 [20/60]: Stacking v38: LSM: Use lsmblob in security_secctx_to_secid - SAUCE: apparmor3.2.0 [21/60]: Stacking v38: LSM: Use lsmblob in security_secid_to_secctx - SAUCE: apparmor3.2.0 [22/60]: Stacking v38: LSM: Use lsmblob in security_ipc_getsecid - SAUCE: apparmor3.2.0 [23/60]: Stacking v38: LSM: Use lsmblob in security_current_getsecid - SAUCE: apparmor3.2.0 [24/60]: Stacking v38: LSM: Use lsmblob in security_inode_getsecid - SAUCE: apparmor3.2.0 [25/60]: Stacking v38: LSM: Use lsmblob in security_cred_getsecid - SAUCE: apparmor3.2.0 [26/60]: Stacking v38: LSM: Specify which LSM to display - SAUCE: apparmor3.2.0 [28/60]: Stacking v38: LSM: Ensure the correct LSM context releaser - SAUCE: apparmor3.2.0 [29/60]: Stacking v38: LSM: Use lsmcontext in security_secid_to_secctx - SAUCE: apparmor3.2.0 [30/60]: Stacking v38: LSM: Use lsmcontext in security_inode_getsecctx - SAUCE: apparmor3.2.0 [31/60]: Stacking v38: Use lsmcontext in security_dentry_init_security - SAUCE: apparmor3.2.0 [32/60]: Stacking v38: LSM: security_secid_to_secctx in netlink netfilter - SAUCE: apparmor3.2.0 [33/60]: Stacking v38: NET: Store LSM netlabel data in a lsmblob - SAUCE: apparmor3.2.0 [34/60]: Stacking v38: binder: Pass LSM identifier for confirmation - SAUCE: apparmor3.2.0 [35/60]: Stacking v38: LSM: security_secid_to_secctx module selection - SAUCE: apparmor3.2.0 [36/60]: Stacking v38: Audit: Keep multiple LSM data in audit_names - SAUCE: apparmor3.2.0 [37/60]: Stacking v38: Audit: Create audit_stamp structure - SAUCE: apparmor3.2.0 [38/60]: Stacking v38: LSM: Add a function to report multiple LSMs - SAUCE: apparmor3.2.0 [39/60]: Stacking v38: Audit: Allow multiple records in an audit_buffer - SAUCE: apparmor3.2.0 [40/60]: Stacking v38: Audit: Add record for multiple task security contexts - SAUCE: apparmor3.2.0 [41/60]: Stacking v38: audit: multiple subject lsm values for netlabel - SAUCE: apparmor3.2.0 [42/60]: Stacking v38: Audit: Add record for multiple object contexts - SAUCE: apparmor3.2.0 [43/60]: Stacking v38: netlabel: Use a struct lsmblob in audit data - SAUCE: apparmor3.2.0 [44/60]: Stacking v38: LSM: Removed scaffolding function lsmcontext_init - SAUCE: apparmor3.2.0 [45/60]: Stacking v38: AppArmor: Remove the exclusive flag - SAUCE: apparmor3.2.0 [46/60]: combine common_audit_data and apparmor_audit_data - SAUCE: apparmor3.2.0 [47/60]: setup slab cache for audit data - SAUCE: apparmor3.2.0 [48/60]: rename audit_data->label to audit_data->subj_label - SAUCE: apparmor3.2.0 [49/60]: pass cred through to audit info. - SAUCE: apparmor3.2.0 [50/60]: Improve debug print infrastructure - SAUCE: apparmor3.2.0 [51/60]: add the ability for profiles to have a learning cache - SAUCE: apparmor3.2.0 [52/60]: enable userspace upcall for mediation - SAUCE: apparmor3.2.0 [53/60]: cache buffers on percpu list if there is lock contention - SAUCE: apparmor3.2.0 [55/60]: advertise availability of exended perms - SAUCE: apparmor3.2.0 [60/60]: [Config] enable CONFIG_SECURITY_APPARMOR_RESTRICT_USERNS * LSM stacking and AppArmor for 6.2: additional fixes (LP: #2017903) // update apparmor and LSM stacking patch set (LP: #2028253) - SAUCE: apparmor3.2.0 [57/60]: fix profile verification and enable it * udev fails to make prctl() syscall with apparmor=0 (as used by maas by default) (LP: #2016908) // update apparmor and LSM stacking patch set (LP: #2028253) - SAUCE: apparmor3.2.0 [27/60]: Stacking v38: Fix prctl() syscall with apparmor=0 * kinetic: apply new apparmor and LSM stacking patch set (LP: #1989983) // update apparmor and LSM stacking patch set (LP: #2028253) - SAUCE: apparmor3.2.0 [01/60]: add/use fns to print hash string hex value - SAUCE: apparmor3.2.0 [03/60]: patch to provide compatibility with v2.x net rules - SAUCE: apparmor3.2.0 [04/60]: add user namespace creation mediation - SAUCE: apparmor3.2.0 [06/60]: af_unix mediation - SAUCE: apparmor3.2.0 [07/60]: Add fine grained mediation of posix mqueues Checksums-Sha1: 4fafe86d956ae1c58dbc852c81024e4e80595630 644664 linux-buildinfo-6.5.0-1002-starfive_6.5.0-1002.3_riscv64.deb 6f97a1e4eb4e99e99b46027a14dcb47d80322f22 7107670 linux-headers-6.5.0-1002-starfive_6.5.0-1002.3_riscv64.deb 19431c5c60d64392705601a610b846b6b9ae2eff 1768791764 linux-image-6.5.0-1002-starfive-dbgsym_6.5.0-1002.3_riscv64.ddeb 9cfc9a2855e20742c3d28ccf9f8ae46b3b14c546 36300992 linux-image-6.5.0-1002-starfive_6.5.0-1002.3_riscv64.deb f7021d2a010d906c45eac2da49360aceed9acdaf 32932032 linux-modules-6.5.0-1002-starfive_6.5.0-1002.3_riscv64.deb f8961d89a72ca80062b57a669535979e9a857d10 110100672 linux-modules-extra-6.5.0-1002-starfive_6.5.0-1002.3_riscv64.deb 62590f2e7cfc74f2ae636c97e91d5129046a716a 13389048 linux-starfive-headers-6.5.0-1002_6.5.0-1002.3_all.deb 1f098177616e58da4503f6841de04a7e8fbcf0db 6753560 linux-starfive-tools-6.5.0-1002_6.5.0-1002.3_riscv64.deb a838b2c0664e50e77fe1b132616b01fbc50b70c1 17626 linux-starfive_6.5.0-1002.3_riscv64.buildinfo 5ab2bff7a48cf4f68f385cef6036478dabf1a463 68307 linux-starfive_6.5.0-1002.3_riscv64_translations.tar.gz e9d507ed86a6cecbb5589bf9f8ef2aec46527b09 1734 linux-tools-6.5.0-1002-starfive_6.5.0-1002.3_riscv64.deb Checksums-Sha256: 2e5914ab4a5b00c2fdc8ead2fd7a0267dc2283f2f802480508294b9a560baab1 644664 linux-buildinfo-6.5.0-1002-starfive_6.5.0-1002.3_riscv64.deb 3b312104e8980bfd003c6b0a535877245556804708f8ea28c659b141d26ede76 7107670 linux-headers-6.5.0-1002-starfive_6.5.0-1002.3_riscv64.deb 276fa80ca76e232ac5095d0cc9f5465451e5422b656091d293baf1282df58291 1768791764 linux-image-6.5.0-1002-starfive-dbgsym_6.5.0-1002.3_riscv64.ddeb 628347f7ccd6d77fb12ecdb2d28d61856d48361bcbfdd45a3c3086c64afe9321 36300992 linux-image-6.5.0-1002-starfive_6.5.0-1002.3_riscv64.deb f3678e095bebd5529080d4e3599ad0e764da5060f04480555f68ae204dabf021 32932032 linux-modules-6.5.0-1002-starfive_6.5.0-1002.3_riscv64.deb a1a2f7b12b4c3588e5384d4d6c3ad55be9463f5a11a35ee878d20caff41b67c5 110100672 linux-modules-extra-6.5.0-1002-starfive_6.5.0-1002.3_riscv64.deb 928e030d5b506e6bd581ba109b9586f3f9b025fc5802920771627538fbb789a1 13389048 linux-starfive-headers-6.5.0-1002_6.5.0-1002.3_all.deb fbadaa8812d66b3e31762c69d1d2bac8823549f55da33d81d80cd7a9d786e0ad 6753560 linux-starfive-tools-6.5.0-1002_6.5.0-1002.3_riscv64.deb fa6873ff5b4dc97f92439161e26e6e0b4d804821ba55695c3471f8c424aac086 17626 linux-starfive_6.5.0-1002.3_riscv64.buildinfo ca6ef4920d5911a1747b283baaf64bf9a6a9d76b25c538cb3000960510a64180 68307 linux-starfive_6.5.0-1002.3_riscv64_translations.tar.gz 1f5f61b8e34522e3e44febc411d3507238331a7bf8f1175b819e4029338b60ff 1734 linux-tools-6.5.0-1002-starfive_6.5.0-1002.3_riscv64.deb Files: bc4b22e2df1e8bcbb9735d2887fb5196 644664 kernel optional linux-buildinfo-6.5.0-1002-starfive_6.5.0-1002.3_riscv64.deb fa9185d16e3c98d61afa8f04cce2d4e6 7107670 devel optional linux-headers-6.5.0-1002-starfive_6.5.0-1002.3_riscv64.deb 0538f212cece4147b3cea00ba8fb4491 1768791764 devel optional linux-image-6.5.0-1002-starfive-dbgsym_6.5.0-1002.3_riscv64.ddeb b612121111b5953587c0e4df1a034b6d 36300992 kernel optional linux-image-6.5.0-1002-starfive_6.5.0-1002.3_riscv64.deb 6ef47e4e21a87aa41652d37b9a0397e9 32932032 kernel optional linux-modules-6.5.0-1002-starfive_6.5.0-1002.3_riscv64.deb 99d0581c1f535f091b642894dd152777 110100672 kernel optional linux-modules-extra-6.5.0-1002-starfive_6.5.0-1002.3_riscv64.deb a55cf0ae18c73fb9c903d1ac689b3001 13389048 devel optional linux-starfive-headers-6.5.0-1002_6.5.0-1002.3_all.deb c70b4a45ff98d8f48c30b6e875bd0448 6753560 devel optional linux-starfive-tools-6.5.0-1002_6.5.0-1002.3_riscv64.deb 21358980014475d3f70ee2e0f67d5dda 17626 devel optional linux-starfive_6.5.0-1002.3_riscv64.buildinfo 2002984458c7aac38d157ec425ab6352 68307 raw-translations - linux-starfive_6.5.0-1002.3_riscv64_translations.tar.gz a9948c560224dbf7f00b494ae370ea15 1734 devel optional linux-tools-6.5.0-1002-starfive_6.5.0-1002.3_riscv64.deb Ubuntu-Compatible-Signing: ubuntu/4 pro/3