kernel-rt/sources

5 lines
738 B
Plaintext
Raw Normal View History

kernel-rt-5.13.0-1.rt3.2 * Tue Jul 13 2021 Andrew Halaney <ahalaney@redhat.com> [5.13.0-1.rt3.2] - b5dcc29e819c rebase - config: disable KASAN for kernel-rt-debug kernels (Luis Claudio R. Goncalves) [1977862] - Revert "eventfd: track eventfd_signal() recursion depth" (Juri Lelli) - Revert "aio: prevent potential eventfd recursion on poll" (Juri Lelli) - redhat: Add realtime-setup dependecy for kernel-rt metapackage (Juri Lelli) - spec: Generate separate kernel-rt-kvm packages (Juri Lelli) - Add RT config options (Juri Lelli) - specfile: Add with_realtime (Juri Lelli) - RTize build scripts (Juri Lelli) - Add localversion for -RT release (Thomas Gleixner) - sysfs: Add /sys/kernel/realtime entry (Clark Williams) - genirq: Disable irqpoll on -rt (Ingo Molnar) - tpm_tis: fix stall after iowrite*()s (Haris Okanovic) - drivers/block/zram: Replace bit spinlocks with rtmutex for -rt (Mike Galbraith) - powerpc: Avoid recursive header includes (Sebastian Andrzej Siewior) - powerpc/stackprotector: work around stack-guard init from atomic (Sebastian Andrzej Siewior) - powerpc/kvm: Disable in-kernel MPIC emulation for PREEMPT_RT (Bogdan Purcareata) - powerpc/pseries/iommu: Use a locallock instead local_irq_save() (Sebastian Andrzej Siewior) - powerpc: traps: Use PREEMPT_RT (Sebastian Andrzej Siewior) - ARM64: Allow to enable RT (Sebastian Andrzej Siewior) - ARM: Allow to enable RT (Sebastian Andrzej Siewior) - x86: Enable RT also on 32bit (Sebastian Andrzej Siewior) - arm64: fpsimd: Delay freeing memory in fpsimd_flush_thread() (Sebastian Andrzej Siewior) - KVM: arm/arm64: downgrade preempt_disable()d region to migrate_disable() (Josh Cartwright) - genirq: update irq_set_irqchip_state documentation (Josh Cartwright) - ARM: enable irq in translation/section permission fault handlers (Yadi.hu) - tty/serial/pl011: Make the locking work on RT (Thomas Gleixner) - tty/serial/omap: Make the locking RT aware (Thomas Gleixner) - leds: trigger: disable CPU trigger on -RT (Sebastian Andrzej Siewior) - jump-label: disable if stop_machine() is used (Thomas Gleixner) - arch/arm64: Add lazy preempt support (Anders Roxell) - arm: Add support for lazy preemption (Thomas Gleixner) - x86: Support for lazy preemption (Thomas Gleixner) - x86/entry: Use should_resched() in idtentry_exit_cond_resched() (Sebastian Andrzej Siewior) - sched: Add support for lazy preemption (Thomas Gleixner) - mm/scatterlist: Do not disable irqs on RT (Thomas Gleixner) - x86: Allow to enable RT (Sebastian Andrzej Siewior) - cpuset: Convert callback_lock to raw_spinlock_t (Mike Galbraith) - drm/i915/gt: Only disable interrupts for the timeline lock on !force-threaded (Sebastian Andrzej Siewior) - drm/i915: skip DRM_I915_LOW_LEVEL_TRACEPOINTS with NOTRACE (Sebastian Andrzej Siewior) - drm/i915: disable tracing on -RT (Sebastian Andrzej Siewior) - drm/i915: Don't disable interrupts on PREEMPT_RT during atomic updates (Mike Galbraith) - drm,radeon,i915: Use preempt_disable/enable_rt() where recommended (Mike Galbraith) - lockdep: disable self-test (Sebastian Andrzej Siewior) - lockdep: selftest: fix warnings due to missing PREEMPT_RT conditionals (Josh Cartwright) - lockdep: selftest: Only do hardirq context test for raw spinlock (Yong Zhang) - lockdep: Make it RT aware (Thomas Gleixner) - net: Remove preemption disabling in netif_rx() (Priyanka Jain) - random: Make it work on rt (Thomas Gleixner) - x86: stackprotector: Avoid random pool on rt (Thomas Gleixner) - panic: skip get_random_bytes for RT_FULL in init_oops_id (Thomas Gleixner) - crypto: cryptd - add a lock instead preempt_disable/local_bh_disable (Sebastian Andrzej Siewior) - crypto: limit more FPU-enabled sections (Sebastian Andrzej Siewior) - irqwork: push most work into softirq context (Sebastian Andrzej Siewior) - net: dev: always take qdisc's busylock in __dev_xmit_skb() (Sebastian Andrzej Siewior) - net: Dequeue in dev_cpu_dead() without the lock (Sebastian Andrzej Siewior) - net: Use skbufhead with raw lock (Thomas Gleixner) - debugobjects: Make RT aware (Thomas Gleixner) - fs: namespace: Use cpu_chill() in trylock loops (Thomas Gleixner) - rt: Introduce cpu_chill() (Thomas Gleixner) - sunrpc: Make svc_xprt_do_enqueue() use get_cpu_light() (Mike Galbraith) - scsi/fcoe: Make RT aware. (Thomas Gleixner) - md: raid5: Make raid5_percpu handling RT aware (Thomas Gleixner) - block/mq: do not invoke preempt_disable() (Sebastian Andrzej Siewior) - mm/vmalloc: Another preempt disable region which sucks (Thomas Gleixner) - rcutorture: Avoid problematic critical section nesting on RT (Scott Wood) - locking: Make spinlock_t and rwlock_t a RCU section on RT (Sebastian Andrzej Siewior) - rcu: Delay RCU-selftests (Sebastian Andrzej Siewior) - ptrace: fix ptrace_unfreeze_traced() race with rt-lock (Oleg Nesterov) - ptrace: fix ptrace vs tasklist_lock race (Sebastian Andrzej Siewior) - pid.h: include atomic.h (Grygorii Strashko) - net/core: use local_bh_disable() in netif_rx_ni() (Sebastian Andrzej Siewior) - softirq: Disable softirq stacks for RT (Thomas Gleixner) - softirq: Check preemption after reenabling interrupts (Thomas Gleixner) - sched: Disable TTWU_QUEUE on RT (Thomas Gleixner) - sched: Do not account rcu_preempt_depth on RT in might_sleep() (Thomas Gleixner) - kernel/sched: move stack + kprobe clean up to __put_task_struct() (Sebastian Andrzej Siewior) - sched: Move mmdrop to RCU on RT (Thomas Gleixner) - sched: Limit the number of task migrations per batch (Thomas Gleixner) - wait.h: include atomic.h (Sebastian Andrzej Siewior) - x86: kvm Require const tsc for RT (Thomas Gleixner) - mm/zsmalloc: copy with get_cpu_var() and locking (Mike Galbraith) - mm/memcontrol: Replace local_irq_disable with local locks (Sebastian Andrzej Siewior) - mm/memcontrol: Don't call schedule_work_on in preemption disabled context (Yang Shi) - mm: memcontrol: Provide a local_lock for per-CPU memcg_stock (Sebastian Andrzej Siewior) - mm: slub: Don't enable partial CPU caches on PREEMPT_RT by default (Sebastian Andrzej Siewior) - mm: page_alloc: Use a local_lock instead of explicit local_irq_save(). (Ingo Molnar) - mm: page_alloc: Use migrate_disable() in drain_local_pages_wq() (Sebastian Andrzej Siewior) - mm: slub: Don't resize the location tracking cache on PREEMPT_RT (Sebastian Andrzej Siewior) - mm: slub: Move flush_cpu_slab() invocations __free_slab() invocations out of IRQ context (Sebastian Andrzej Siewior) - mm: slub: Move discard_slab() invocations out of IRQ-off sections (Sebastian Andrzej Siewior) - mm: slub: Enable irqs for __GFP_WAIT (Thomas Gleixner) - mm: slub: Make object_map_lock a raw_spinlock_t (Sebastian Andrzej Siewior) - mm: sl[au]b: Change list_lock to raw_spinlock_t (Thomas Gleixner) - locking: don't check for __LINUX_SPINLOCK_TYPES_H on -RT archs (Sebastian Andrzej Siewior) - trace: Add migrate-disabled counter to tracing output (Thomas Gleixner) - kernel/sched: add {put|get}_cpu_light() (Sebastian Andrzej Siewior) - signal/x86: Delay calling signals in atomic (Oleg Nesterov) - rt: Add local irq locks (Thomas Gleixner) - efi: Allow efi=runtime (Sebastian Andrzej Siewior) - efi: Disable runtime services on RT (Sebastian Andrzej Siewior) - net/core: disable NET_RX_BUSY_POLL on RT (Sebastian Andrzej Siewior) - sched: Disable CONFIG_RT_GROUP_SCHED on RT (Thomas Gleixner) - mm: Allow only SLUB on RT (Ingo Molnar) - kconfig: Disable config options which are not RT compatible (Thomas Gleixner) - net: Properly annotate the try-lock for the seqlock (Sebastian Andrzej Siewior) - net/Qdisc: use a seqlock instead seqcount (Sebastian Andrzej Siewior) - fs/dcache: disable preemption on i_dir_seq's write side (Sebastian Andrzej Siewior) - fs/dcache: use swait_queue instead of waitqueue (Sebastian Andrzej Siewior) - u64_stats: Disable preemption on 32bit-UP/SMP with RT during updates (Sebastian Andrzej Siewior) - mm/memcontrol: Disable preemption in __mod_memcg_lruvec_state() (Sebastian Andrzej Siewior) - mm/vmstat: Protect per cpu variables with preempt disable on RT (Ingo Molnar) - preempt: Provide preempt_*_(no)rt variants (Thomas Gleixner) - signal: Revert ptrace preempt magic (Thomas Gleixner) - locking/rtmutex: Use custom scheduling function for spin-schedule() (Sebastian Andrzej Siewior) - locking/rtmutex: add ww_mutex addon for mutex-rt (Sebastian Andrzej Siewior) - locking/rtmutex: wire up RT's locking (Thomas Gleixner) - locking/rtmutex: add rwlock implementation based on rtmutex (Thomas Gleixner) - locking/rtmutex: add rwsem implementation based on rtmutex (Thomas Gleixner) - locking/rtmutex: add mutex implementation based on rtmutex (Thomas Gleixner) - locking/rtmutex: Allow rt_mutex_trylock() on PREEMPT_RT (Sebastian Andrzej Siewior) - locking/rtmutex: add sleeping lock implementation (Thomas Gleixner) - sched: Add saved_state for tasks blocked on sleeping locks (Thomas Gleixner) - locking/rtmutex: export lockdep-less version of rt_mutex's lock, trylock and unlock (Thomas Gleixner) - locking/rtmutex: Provide rt_mutex_slowlock_locked() (Thomas Gleixner) - locking: split out the rbtree definition (Sebastian Andrzej Siewior) - lockdep: Reduce header files in debug_locks.h (Sebastian Andrzej Siewior) - locking/rtmutex: Avoid include hell (Thomas Gleixner) - locking/spinlock: Split the lock types header (Thomas Gleixner) - futex: Fix bug on when a requeued RT task times out (Steven Rostedt) - locking/rtmutex: Handle the various new futex race conditions (Thomas Gleixner) - tasklets: Switch tasklet_disable() to the sleep wait variant (Thomas Gleixner) - tasklets: Use spin wait in tasklet_disable() temporarily (Thomas Gleixner) - smp: Wake ksoftirqd on PREEMPT_RT instead do_softirq(). (Sebastian Andrzej Siewior) - tcp: Remove superfluous BH-disable around listening_hash (Sebastian Andrzej Siewior) - net: Move lockdep where it belongs (Thomas Gleixner) - shmem: Use raw_spinlock_t for ->stat_lock (Sebastian Andrzej Siewior) - mm: workingset: replace IRQ-off check with a lockdep assert. (Sebastian Andrzej Siewior) - cgroup: use irqsave in cgroup_rstat_flush_locked() (Sebastian Andrzej Siewior) - printk: add pr_flush() (John Ogness) - printk: add console handover (John Ogness) - printk: remove deferred printing (John Ogness) - printk: move console printing to kthreads (John Ogness) - printk: introduce kernel sync mode (John Ogness) - printk: use seqcount_latch for console_seq (John Ogness) - printk: combine boot_delay_msec() into printk_delay() (John Ogness) - printk: relocate printk_delay() and vprintk_default() (John Ogness) - serial: 8250: implement write_atomic (John Ogness) - kdb: only use atomic consoles for output mirroring (John Ogness) - console: add write_atomic interface (John Ogness) - printk: convert @syslog_lock to spin_lock (John Ogness) - printk: remove safe buffers (John Ogness) - printk: track/limit recursion (John Ogness) - notifier: Make atomic_notifiers use raw_spinlock (Valentin Schneider) - genirq: Move prio assignment into the newly created thread (Thomas Gleixner) - kthread: Move prio/affinite change into the newly created thread (Sebastian Andrzej Siewior) - timers: Move clearing of base::timer_running under base::lock (Thomas Gleixner) - highmem: Don't disable preemption on RT in kmap_atomic() (Sebastian Andrzej Siewior) Resolves: rhbz#1891873, rhbz#1977862
2021-07-13 17:04:07 +00:00
SHA512 (kernel-abi-whitelists-5.13.0-1.tar.bz2) = ceba454e1f590c1e4ef4115a75463ae3ac2c2aa7ec85fa14a2669d666c421483a38225ee19d7d72b4ac7032375741408b23543e43588538c80161ec0cf57051c
kernel-rt-5.14.0-143.rt21.143.el9 * Fri Aug 05 2022 Luis Claudio R. Goncalves <lgoncalv@redhat.com> [5.14.0-143.rt21.143.el9] - [rt] build kernel-rt-5.14.0-143.rt21.143.el9 [2061574] - sched, cpuset: Fix dl_cpu_busy() panic due to empty cs->cpus_allowed (Waiman Long) [2104946] - intel_idle: Fix false positive RCU splats due to incorrect hardirqs state (Waiman Long) [2090232] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901} - tools headers cpufeatures: Sync with the kernel sources (Waiman Long) [2090232] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901} - um: Add missing apply_returns() (Waiman Long) [2090232] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901} - KVM: emulate: do not adjust size of fastop and setcc subroutines (Waiman Long) [2090232] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901} - x86/kvm: fix FASTOP_SIZE when return thunks are enabled (Waiman Long) [2090232] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901} - efi/x86: use naked RET on mixed mode call wrapper (Waiman Long) [2090232] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901} - x86/bugs: Remove apostrophe typo (Waiman Long) [2090232] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901} - x86/speculation: Use DECLARE_PER_CPU for x86_spec_ctrl_current (Waiman Long) [2090232] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901} - x86/entry: Remove UNTRAIN_RET from native_irq_return_ldt (Waiman Long) [2090232] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901} - x86/bugs: Mark retbleed_strings static (Waiman Long) [2090232] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901} - x86/asm/32: Fix ANNOTATE_UNRET_SAFE use on 32-bit (Waiman Long) [2090232] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901} - x86/static_call: Serialize __static_call_fixup() properly (Waiman Long) [2090232] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901} - x86/speculation: Disable RRSBA behavior (Waiman Long) [2090232] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901} - x86/kexec: Disable RET on kexec (Waiman Long) [2090232] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901} - x86/bugs: Do not enable IBPB-on-entry when IBPB is not supported (Waiman Long) [2090232] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901} - x86/entry: Move PUSH_AND_CLEAR_REGS() back into error_entry (Waiman Long) [2090232] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901} - x86/bugs: Add Cannon lake to RETBleed affected CPU list (Waiman Long) [2090232] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901} - redhat/configs: Add new mitigation configs for RetBleed CVEs (Waiman Long) [2090232] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901} - x86/retbleed: Add fine grained Kconfig knobs (Waiman Long) [2090232] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901} - x86/cpu/amd: Enumerate BTC_NO (Waiman Long) [2090232] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901} - x86/common: Stamp out the stepping madness (Waiman Long) [2090232] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901} - KVM: VMX: Prevent RSB underflow before vmenter (Waiman Long) [2090232] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901} - x86/speculation: Fill RSB on vmexit for IBRS (Waiman Long) [2090232] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901} - KVM: VMX: Fix IBRS handling after vmexit (Waiman Long) [2090232] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901} - KVM: VMX: Prevent guest RSB poisoning attacks with eIBRS (Waiman Long) [2090232] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901} - KVM: VMX: Convert launched argument to flags (Waiman Long) [2090232] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901} - KVM: VMX: Flatten __vmx_vcpu_run() (Waiman Long) [2090232] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901} - objtool: Re-add UNWIND_HINT_{SAVE_RESTORE} (Waiman Long) [2090232] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901} - x86/speculation: Remove x86_spec_ctrl_mask (Waiman Long) [2090232] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901} - x86/speculation: Use cached host SPEC_CTRL value for guest entry/exit (Waiman Long) [2090232] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901} - x86/speculation: Fix SPEC_CTRL write on SMT state change (Waiman Long) [2090232] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901} - x86/speculation: Fix firmware entry SPEC_CTRL handling (Waiman Long) [2090232] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901} - x86/speculation: Fix RSB filling with CONFIG_RETPOLINE=n (Waiman Long) [2090232] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901} - x86/cpu/amd: Add Spectral Chicken (Waiman Long) [2090232] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901} - x86/bugs: Do IBPB fallback check only once (Waiman Long) [2090232] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901} - x86/bugs: Add retbleed=ibpb (Waiman Long) [2090232] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901} - x86/xen: Add UNTRAIN_RET (Waiman Long) [2090232] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901} - x86/xen: Rename SYS* entry points (Waiman Long) [2090232] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901} - objtool: Update Retpoline validation (Waiman Long) [2090232] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901} - intel_idle: Disable IBRS during long idle (Waiman Long) [2090232] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901} - x86/bugs: Report Intel retbleed vulnerability (Waiman Long) [2090232] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901} - x86/bugs: Split spectre_v2_select_mitigation() and spectre_v2_user_select_mitigation() (Waiman Long) [2090232] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901} - x86/speculation: Add spectre_v2=ibrs option to support Kernel IBRS (Waiman Long) [2090232] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901} - x86/bugs: Optimize SPEC_CTRL MSR writes (Waiman Long) [2090232] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901} - x86/entry: Add kernel IBRS implementation (Waiman Long) [2090232] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901} - x86/bugs: Keep a per-CPU IA32_SPEC_CTRL value (Waiman Long) [2090232] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901} - x86/bugs: Enable STIBP for JMP2RET (Waiman Long) [2090232] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901} - x86/bugs: Add AMD retbleed= boot parameter (Waiman Long) [2090232] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901} - x86/bugs: Report AMD retbleed vulnerability (Waiman Long) [2090232] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901} - objtool: skip non-text sections when adding return-thunk sites (Waiman Long) [2090232] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901} - x86: Add magic AMD return-thunk (Waiman Long) [2090232] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901} - objtool: Treat .text.__x86.* as noinstr (Waiman Long) [2090232] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901} - x86/entry: Avoid very early RET (Waiman Long) [2090232] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901} - x86: Use return-thunk in asm code (Waiman Long) [2090232] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901} - x86/sev: Avoid using __x86_return_thunk (Waiman Long) [2090232] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901} - x86/vsyscall_emu/64: Don't use RET in vsyscall emulation (Waiman Long) [2090232] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901} - x86/kvm: Fix SETcc emulation for return thunks (Waiman Long) [2090232] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901} - x86/bpf: Use alternative RET encoding (Waiman Long) [2090232] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901} - x86/ftrace: Use alternative RET encoding (Waiman Long) [2090232] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901} - x86,static_call: Use alternative RET encoding (Waiman Long) [2090232] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901} - x86,objtool: Create .return_sites (Waiman Long) [2090232] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901} - x86: Undo return-thunk damage (Waiman Long) [2090232] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901} - x86/retpoline: Use -mfunction-return (Waiman Long) [2090232] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901} - x86/retpoline: Swizzle retpoline thunk (Waiman Long) [2090232] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901} - x86/retpoline: Cleanup some #ifdefery (Waiman Long) [2090232] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901} - x86/cpufeatures: Move RETPOLINE flags to word 11 (Waiman Long) [2090232] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901} - x86/kvm/vmx: Make noinstr clean (Waiman Long) [2090232] {CVE-2022-23816 CVE-2022-23825 CVE-2022-29900 CVE-2022-29901} - x86/entry: Fix register corruption in compat syscall (Waiman Long) [2090232] - x86/entry: Remove skip_r11rcx (Waiman Long) [2090232] - x86/entry: Use PUSH_AND_CLEAR_REGS for compat (Waiman Long) [2090232] - x86/entry: Simplify entry_INT80_compat() (Waiman Long) [2090232] - x86/entry: Don't call error_entry() for XENPV (Waiman Long) [2090232] - x86/entry: Move CLD to the start of the idtentry macro (Waiman Long) [2090232] - x86/entry: Move PUSH_AND_CLEAR_REGS out of error_entry() (Waiman Long) [2090232] - x86/entry: Switch the stack after error_entry() returns (Waiman Long) [2090232] - x86/traps: Use pt_regs directly in fixup_bad_iret() (Waiman Long) [2090232] - x86/retpoline: Add ANNOTATE_NOENDBR for retpolines (Waiman Long) [2090232] - x86/static_call: Add ANNOTATE_NOENDBR to static call trampoline (Waiman Long) [2090232] - objtool: Fix SLS validation for kcov tail-call replacement (Waiman Long) [2090232] - x86,static_call: Fix __static_call_return0 for i386 (Waiman Long) [2090232] - crypto: x86/poly1305 - Fixup SLS (Waiman Long) [2090232] - kvm/emulate: Fix SETcc emulation for ENDBR (Waiman Long) [2090232] - x86/ibt: Annotate text references (Waiman Long) [2090232] - x86/alternative: Simplify int3_selftest_ip (Waiman Long) [2090232] - x86/ibt,kvm: Add ENDBR to fastops (Waiman Long) [2090232] - x86/ibt,entry: Sprinkle ENDBR dust (Waiman Long) [2090232] - x86/ibt,xen: Sprinkle the ENDBR (Waiman Long) [2090232] - x86/entry: Cleanup PARAVIRT (Waiman Long) [2090232] - x86/ibt: Add ANNOTATE_NOENDBR (Waiman Long) [2090232] - redhat/configs: Disable CONFIG_X86_KERNEL_IBT (Waiman Long) [2090232] - x86/ibt: Base IBT bits (Waiman Long) [2090232] - objtool,efi: Update __efi64_thunk annotation (Waiman Long) [2090232] - objtool: Fix truncated string warning (Waiman Long) [2090232] - redhat/configs: Disable CONFIG_SLS (Waiman Long) [2090232] - x86: Add straight-line-speculation mitigation (Waiman Long) [2090232] - x86/alternative: Relax text_poke_bp() constraint (Waiman Long) [2090232] - objtool: Add straight-line-speculation validation (Waiman Long) [2090232] - x86: Prepare inline-asm for straight-line-speculation (Waiman Long) [2090232] - x86: Prepare asm files for straight-line-speculation (Waiman Long) [2090232] - x86/mce: Reduce number of machine checks taken during recovery (Waiman Long) [2090232] - x86/lib/atomic64_386_32: Rename things (Waiman Long) [2090232] - x86: Use -mindirect-branch-cs-prefix for RETPOLINE builds (Waiman Long) [2090232] - x86: Move RETPOLINE*_CFLAGS to arch Makefile (Waiman Long) [2090232] - x86/xen: Add xenpv_restore_regs_and_return_to_usermode() (Waiman Long) [2090232] - x86/entry: Use the correct fence macro after swapgs in kernel CR3 (Waiman Long) [2090232] - x86/entry: Add a fence for kernel entry SWAPGS in paranoid_entry() (Waiman Long) [2090232] - objtool: Fix pv_ops noinstr validation (Waiman Long) [2090232] - static_call,x86: Robustify trampoline patching (Waiman Long) [2090232] - x86/xen: switch initial pvops IRQ functions to dummy ones (Waiman Long) [2090232] - bpf,x86: Respect X86_FEATURE_RETPOLINE* (Waiman Long) [2090232] - x86/alternative: Add debug prints to apply_retpolines() (Waiman Long) [2090232] - x86/alternative: Try inline spectre_v2=retpoline,amd (Waiman Long) [2090232] - x86/alternative: Handle Jcc __x86_indirect_thunk_\reg (Waiman Long) [2090232] - x86/alternative: Implement .retpoline_sites support (Waiman Long) [2090232] - x86/retpoline: Create a retpoline thunk array (Waiman Long) [2090232] - x86/retpoline: Move the retpoline thunk declarations to nospec-branch.h (Waiman Long) [2090232] - x86/asm: Fixup odd GEN-for-each-reg.h usage (Waiman Long) [2090232] - x86/asm: Fix register order (Waiman Long) [2090232] - x86/retpoline: Remove unused replacement symbols (Waiman Long) [2090232] - objtool,x86: Replace alternatives with .retpoline_sites (Waiman Long) [2090232] - objtool: Shrink struct instruction (Waiman Long) [2090232] - objtool: Explicitly avoid self modifying code in .altinstr_replacement (Waiman Long) [2090232] - objtool: Classify symbols (Waiman Long) [2090232] - objtool: Remove reloc symbol type checks in get_alt_entry() (Waiman Long) [2090232] - objtool: print out the symbol type when complaining about it (Waiman Long) [2090232] - objtool: Teach get_alt_entry() about more relocation types (Waiman Long) [2090232] - kbuild: reuse $(cmd_objtool) for cmd_cc_lto_link_modules (Waiman Long) [2090232] - kbuild: detect objtool update without using .SECONDEXPANSION (Waiman Long) [2090232] - kbuild: factor out OBJECT_FILES_NON_STANDARD check into a macro (Waiman Long) [2090232] - kbuild: store the objtool command in *.cmd files (Waiman Long) [2090232] - kbuild: rename __objtool_obj and reuse it for cmd_cc_lto_link_modules (Waiman Long) [2090232] - kbuild: move objtool_args back to scripts/Makefile.build (Waiman Long) [2090232] - x86/mce: Drop copyin special case for #MC (Waiman Long) [2090232] - objtool: Support pv_opsindirect calls for noinstr (Waiman Long) [2090232] - x86/xen: Rework the xen_{cpu,irq,mmu}_opsarrays (Waiman Long) [2090232] - objtool: Handle __sanitize_cov*() tail calls (Waiman Long) [2090232] - objtool: Introduce CFI hash (Waiman Long) [2090232] - kbuild: clean up objtool_args slightly (Waiman Long) [2090232] - kbuild: remove stale *.symversions (Waiman Long) [2090232] - kbuild: remove unused quiet_cmd_update_lto_symversions (Waiman Long) [2090232] - kbuild: Fix TRIM_UNUSED_KSYMS with LTO_CLANG (Waiman Long) [2090232] - Makefile: remove stale cc-option checks (Waiman Long) [2090232] - x86/build: Remove stale cc-option checks (Waiman Long) [2090232] - xen: assume XENFEAT_mmu_pt_update_preserve_ad being set for pv guests (Waiman Long) [2090232] - dmaengine: idxd: Fixup upstream merge conflict resolution (Jerry Snitselaar) [2100482] - dmaengine: idxd: skip clearing device context when device is read-only (Jerry Snitselaar) [2100482] - dmaengine: idxd: add RO check for wq max_transfer_size write (Jerry Snitselaar) [2100482] - dmaengine: idxd: add RO check for wq max_batch_size write (Jerry Snitselaar) [2100482] - dmaengine: idxd: fix device cleanup on disable (Jerry Snitselaar) [2100482] - Revert "dmaengine: idxd: Separate user and kernel pasid enabling" (Jerry Snitselaar) [2100482] Resolves: rhbz#2061574, rhbz#2090232 Signed-off-by: Luis Claudio R. Goncalves <lgoncalv@redhat.com>
2022-08-05 23:54:58 +00:00
SHA512 (linux-5.14.0-143.rt21.143.el9.tar.xz) = 6fa250da11949539fdbda17193c0b8b88691f6779334e2af0c48c12be851fa8e7c765bbe63cc9247903fca53de372b11f72f9912f875fe2265d84d74e98ca59b
SHA512 (kernel-abi-stablelists-5.14.0-143.rt21.143.el9.tar.bz2) = e9c6470a1efff07f36d518d479e8df06b06f29064482b6a6dfc394f0c98eb4303a137b4e78f7246ee1573bd5661ed2df80eb468d54f8d36cbb63754419b8ed84
SHA512 (kernel-kabi-dw-5.14.0-143.rt21.143.el9.tar.bz2) = 565f812fa83a756ef7b91219031cfe80b1e853f22b4ed38ada76aed482caaf89df35e4d220f45728392765a757f8b0798e3b5a57fee0114e1d0379e887772578