UbuntuUpdates.org

Package "linux-oem-6.5"




Name: linux-oem-6.5

Description:

This package is just an umbrella for a group of other packages, it has no description.
Description samples from packages in group:

  • Linux kernel buildinfo for version 6.5.0 on 64 bit x86 SMP
  • Linux kernel headers for version 6.5.0 on 64 bit x86 SMP
  • Linux kernel image for version 6.5.0 on 64 bit x86 SMP
  • Linux kernel extra modules for version 6.5.0 on 64 bit x86 SMP

Latest version: *DELETED*
Release: jammy (22.04)
Level: proposed
Repository: universe

Links



Other versions of "linux-oem-6.5" in Jammy

Repository Area Version
security main 6.5.0-1027.28
updates main 6.5.0-1027.28
proposed main 6.5.0-1021.22
PPA: Canonical Kernel Team 6.5.0-1027.28

Packages in group

Deleted packages are displayed in grey.


Changelog

Version: *DELETED* 2023-08-11 17:07:01 UTC
No changelog for deleted or moved packages.

Version: 6.5.0-1002.2 2023-08-10 12:06:52 UTC

  linux-oem-6.5 (6.5.0-1002.2) jammy; urgency=medium

  * jammy/linux-oem-6.5: 6.5.0-1002.2 -proposed tracker (LP: #2029454)

  * Packaging resync (LP: #1786013)
    - [Packaging] resync update-dkms-versions helper

  * i915: Backport some fixes for Meteor Lake (LP: #2029470)
    - drm/i915/mtl: update DP 2.0 vswing table for C20 phy
    - drm/i915/mtl: Add new vswing table for C20 phy to support DP 1.4
    - drm/i915/mtl: Skip using vbt hdmi_level_shifter selection on MTL
    - drm/i915/mtl: Update workaround 14018778641
    - drm/i915/mtl: Update cache coherency setting for context structure
    - drm/i915/gt: Do not use stolen on MTL

  * Remove force_probe for i915 on MTL platforms to ease the development process
    (LP: #2029372)
    - SAUCE: drm/i915/mtl: Drop force_probe requirement

  [ Ubuntu: 6.5.0-4.4 ]

  * mantic/linux-unstable: 6.5.0-4.4 -proposed tracker (LP: #2029086)
  * Miscellaneous Ubuntu changes
    - [Packaging] Add .NOTPARALLEL
    - [Packaging] Remove meaningless $(header_arch)
    - [Packaging] Fix File exists error in install-arch-headers
    - [Packaging] clean debian/linux-* directories
    - [Packaging] remove hmake
    - [Packaging] install headers to debian/linux-libc-dev directly
    - [Config] define CONFIG options for arm64 instead of arm64-generic
    - [Config] update annotations after rebase to v6.5-rc4
    - [Packaging] temporarily disable Rust support
  * Rebase to v6.5-rc4

  [ Ubuntu: 6.5.0-3.3 ]

  * mantic/linux-unstable: 6.5.0-3.3 -proposed tracker (LP: #2028779)
  * enable Rust support in the kernel (LP: #2007654)
    - SAUCE: rust: support rustc-1.69.0
    - [Packaging] depend on rustc-1.69.0
  * Packaging resync (LP: #1786013)
    - [Packaging] resync update-dkms-versions helper
    - [Packaging] resync getabis
  * Fix UBSAN in Intel EDAC driver (LP: #2028746)
    - EDAC/i10nm: Skip the absent memory controllers
  * Ship kernel modules Zstd compressed (LP: #2028568)
    - SAUCE: Support but do not require compressed modules
    - [Config] Enable support for ZSTD compressed modules
    - [Packaging] ZSTD compress modules
  * update apparmor and LSM stacking patch set (LP: #2028253)
    - SAUCE: apparmor3.2.0 [02/60]: rename SK_CTX() to aa_sock and make it an
      inline fn
    - SAUCE: apparmor3.2.0 [05/60]: Add sysctls for additional controls of unpriv
      userns restrictions
    - SAUCE: apparmor3.2.0 [08/60]: Stacking v38: LSM: Identify modules by more
      than name
    - SAUCE: apparmor3.2.0 [09/60]: Stacking v38: LSM: Add an LSM identifier for
      external use
    - SAUCE: apparmor3.2.0 [10/60]: Stacking v38: LSM: Identify the process
      attributes for each module
    - SAUCE: apparmor3.2.0 [11/60]: Stacking v38: LSM: Maintain a table of LSM
      attribute data
    - SAUCE: apparmor3.2.0 [12/60]: Stacking v38: proc: Use lsmids instead of lsm
      names for attrs
    - SAUCE: apparmor3.2.0 [13/60]: Stacking v38: integrity: disassociate
      ima_filter_rule from security_audit_rule
    - SAUCE: apparmor3.2.0 [14/60]: Stacking v38: LSM: Infrastructure management
      of the sock security
    - SAUCE: apparmor3.2.0 [15/60]: Stacking v38: LSM: Add the lsmblob data
      structure.
    - SAUCE: apparmor3.2.0 [16/60]: Stacking v38: LSM: provide lsm name and id
      slot mappings
    - SAUCE: apparmor3.2.0 [17/60]: Stacking v38: IMA: avoid label collisions with
      stacked LSMs
    - SAUCE: apparmor3.2.0 [18/60]: Stacking v38: LSM: Use lsmblob in
      security_audit_rule_match
    - SAUCE: apparmor3.2.0 [19/60]: Stacking v38: LSM: Use lsmblob in
      security_kernel_act_as
    - SAUCE: apparmor3.2.0 [20/60]: Stacking v38: LSM: Use lsmblob in
      security_secctx_to_secid
    - SAUCE: apparmor3.2.0 [21/60]: Stacking v38: LSM: Use lsmblob in
      security_secid_to_secctx
    - SAUCE: apparmor3.2.0 [22/60]: Stacking v38: LSM: Use lsmblob in
      security_ipc_getsecid
    - SAUCE: apparmor3.2.0 [23/60]: Stacking v38: LSM: Use lsmblob in
      security_current_getsecid
    - SAUCE: apparmor3.2.0 [24/60]: Stacking v38: LSM: Use lsmblob in
      security_inode_getsecid
    - SAUCE: apparmor3.2.0 [25/60]: Stacking v38: LSM: Use lsmblob in
      security_cred_getsecid
    - SAUCE: apparmor3.2.0 [26/60]: Stacking v38: LSM: Specify which LSM to
      display
    - SAUCE: apparmor3.2.0 [28/60]: Stacking v38: LSM: Ensure the correct LSM
      context releaser
    - SAUCE: apparmor3.2.0 [29/60]: Stacking v38: LSM: Use lsmcontext in
      security_secid_to_secctx
    - SAUCE: apparmor3.2.0 [30/60]: Stacking v38: LSM: Use lsmcontext in
      security_inode_getsecctx
    - SAUCE: apparmor3.2.0 [31/60]: Stacking v38: Use lsmcontext in
      security_dentry_init_security
    - SAUCE: apparmor3.2.0 [32/60]: Stacking v38: LSM: security_secid_to_secctx in
      netlink netfilter
    - SAUCE: apparmor3.2.0 [33/60]: Stacking v38: NET: Store LSM netlabel data in
      a lsmblob
    - SAUCE: apparmor3.2.0 [34/60]: Stacking v38: binder: Pass LSM identifier for
      confirmation
    - SAUCE: apparmor3.2.0 [35/60]: Stacking v38: LSM: security_secid_to_secctx
      module selection
    - SAUCE: apparmor3.2.0 [36/60]: Stacking v38: Audit: Keep multiple LSM data in
      audit_names
    - SAUCE: apparmor3.2.0 [37/60]: Stacking v38: Audit: Create audit_stamp
      structure
    - SAUCE: apparmor3.2.0 [38/60]: Stacking v38: LSM: Add a function to report
      multiple LSMs
    - SAUCE: apparmor3.2.0 [39/60]: Stacking v38: Audit: Allow multiple records in
      an audit_buffer
    - SAUCE: apparmor3.2.0 [40/60]: Stacking v38: Audit: Add record for multiple
      task security contexts
    - SAUCE: apparmor3.2.0 [41/60]: Stacking v38: audit: multiple subject lsm
      values for netlabel
    - SAUCE: apparmor3.2.0 [42/60]: Stacking v38: Audit: Add record for multiple
      object contexts
    - SAUCE: apparmor3.2.0 [43/60]: Stacking v38: netlabel: Use a struct lsmblob
      in audit data
    - SAUCE: apparmor3.2.0 [44/60]: Stacking v38: LSM: Removed scaffol

1786013 Packaging resync
2029470 i915: Backport some fixes for Meteor Lake
2029372 Remove force_probe for i915 on MTL platforms to ease the development process
2007654 enable Rust support in the kernel
2028746 Fix UBSAN in Intel EDAC driver
2028568 Ship kernel modules Zstd compressed
2028253 update apparmor and LSM stacking patch set
2017903 LSM stacking and AppArmor for 6.2: additional fixes
2016908 udev fails to make prctl() syscall with apparmor=0 (as used by maas by default)
1989983 kinetic: apply new apparmor and LSM stacking patch set



About   -   Send Feedback to @ubuntu_updates