From 8f4c32d884e01a4398f0feb8ed256e0abc40a64b Mon Sep 17 00:00:00 2001 From: "Luis Claudio R. Goncalves" Date: Mon, 18 Jul 2022 23:26:07 -0300 Subject: [PATCH] kernel-rt-5.14.0-131.rt21.131.el9 * Mon Jul 18 2022 Luis Claudio R. Goncalves [5.14.0-131.rt21.131.el9] - [rt] build kernel-rt-5.14.0-131.rt21.131.el9 [2061574] - scsi: lpfc: Copyright updates for 14.2.0.5 patches (Paul Ely) [2102818] - scsi: lpfc: Update lpfc version to 14.2.0.5 (Paul Ely) [2102818] - scsi: lpfc: Remove Menlo/Hornet related code (Paul Ely) [2102818] - scsi: lpfc: Refactor lpfc_nvmet_prep_abort_wqe() into lpfc_sli_prep_abort_xri() (Paul Ely) [2102818] - scsi: lpfc: Fix lost NVMe paths during LIF bounce stress test (Paul Ely) [2102818] - scsi: lpfc: Fix attempted FA-PWWN usage after feature disable (Paul Ely) [2102818] - scsi: lpfc: Fix possible memory leak when failing to issue CMF WQE (Paul Ely) [2102818] - scsi: lpfc: Remove extra atomic_inc on cmd_pending in queuecommand after VMID (Paul Ely) [2102818] - scsi: lpfc: Set PU field when providing D_ID in XMIT_ELS_RSP64_CX iocb (Paul Ely) [2102818] - scsi: lpfc: Prevent buffer overflow crashes in debugfs with malformed user input (Paul Ely) [2102818] - scsi: lpfc: Fix uninitialized cqe field in lpfc_nvme_cancel_iocb() (Paul Ely) [2102818] - scsi: lpfc: Change FA-PWWN detection methodology (Paul Ely) [2102818] - scsi: lpfc: Remove failing soft_wwn support (Paul Ely) [2102818] - scsi: lpfc: Update lpfc version to 14.2.0.4 (Paul Ely) [2102818] - scsi: lpfc: Allow reduced polling rate for nvme_admin_async_event cmd completion (Paul Ely) [2102818] - scsi: lpfc: Add more logging of cmd and cqe information for aborted NVMe cmds (Paul Ely) [2102818] - scsi: lpfc: Fix port stuck in bypassed state after LIP in PT2PT topology (Paul Ely) [2102818] - scsi: lpfc: Resolve NULL ptr dereference after an ELS LOGO is aborted (Paul Ely) [2102818] - scsi: lpfc: Address NULL pointer dereference after starget_to_rport() (Paul Ely) [2102818] - scsi: lpfc: Resolve some cleanup issues following SLI path refactoring (Paul Ely) [2102818] - scsi: lpfc: Resolve some cleanup issues following abort path refactoring (Paul Ely) [2102818] - scsi: lpfc: Correct BDE type for XMIT_SEQ64_WQE in lpfc_ct_reject_event() (Paul Ely) [2102818] - scsi: lpfc: Add support for ATTO Fibre Channel devices (Paul Ely) [2102818] - scsi: lpfc: Add support for VMID tagging of NVMe I/Os (Paul Ely) [2102818] - scsi: lpfc: Rework lpfc_vmid_get_appid() to be protocol independent (Paul Ely) [2102818] - scsi: lpfc: Commonize VMID code location (Paul Ely) [2102818] - scsi: nvme-fc: Add new routine nvme_fc_io_getuuid() (Paul Ely) [2102818] - scsi: target: pscsi: Set SCF_TREAT_READ_AS_NORMAL flag only if there is valid data (Maurizio Lombardi) [2080216] - x86/speculation/mmio: Print SMT warning (Waiman Long) [2090256] {CVE-2022-21123 CVE-2022-21125 CVE-2022-21166} - KVM: x86/speculation: Disable Fill buffer clear within guests (Waiman Long) [2090256] {CVE-2022-21123 CVE-2022-21125 CVE-2022-21166} - x86/speculation/mmio: Reuse SRBDS mitigation for SBDS (Waiman Long) [2090256] {CVE-2022-21123 CVE-2022-21125 CVE-2022-21166} - x86/speculation/srbds: Update SRBDS mitigation selection (Waiman Long) [2090256] {CVE-2022-21123 CVE-2022-21125 CVE-2022-21166} - x86/speculation/mmio: Add sysfs reporting for Processor MMIO Stale Data (Waiman Long) [2090256] {CVE-2022-21123 CVE-2022-21125 CVE-2022-21166} - x86/speculation/mmio: Enable CPU Fill buffer clearing on idle (Waiman Long) [2090256] {CVE-2022-21123 CVE-2022-21125 CVE-2022-21166} - x86/bugs: Group MDS, TAA & Processor MMIO Stale Data mitigations (Waiman Long) [2090256] {CVE-2022-21123 CVE-2022-21125 CVE-2022-21166} - x86/speculation/mmio: Add mitigation for Processor MMIO Stale Data (Waiman Long) [2090256] {CVE-2022-21123 CVE-2022-21125 CVE-2022-21166} - x86/speculation: Add a common function for MD_CLEAR mitigation update (Waiman Long) [2090256] {CVE-2022-21123 CVE-2022-21125 CVE-2022-21166} - x86/speculation/mmio: Enumerate Processor MMIO Stale Data bug (Waiman Long) [2090256] {CVE-2022-21123 CVE-2022-21125 CVE-2022-21166} - Documentation: Add documentation for Processor MMIO Stale Data (Waiman Long) [2090256] {CVE-2022-21123 CVE-2022-21125 CVE-2022-21166} - x86/tsx: Disable TSX development mode at boot (Waiman Long) [2090256] - x86/tsx: Use MSR_TSX_CTRL to clear CPUID bits (Waiman Long) [2090256] - Documentation: Add L1D flushing Documentation (Waiman Long) [2090256] - x86, prctl: Hook L1D flushing in via prctl (Waiman Long) [2090256] - x86/mm: Prepare for opt-in based L1D flush in switch_mm() (Waiman Long) [2090256] - x86/process: Make room for TIF_SPEC_L1D_FLUSH (Waiman Long) [2090256] - sched: Add task_work callback for paranoid L1D flush (Waiman Long) [2090256] - x86/mm: Refactor cond_ibpb() to support other use cases (Waiman Long) [2090256] - cpuidle: psci: Fix regression leading to no genpd governor (Mark Langsdorf) [2067314] - cpuidle: Factor-out power domain related code from PSCI domain driver (Mark Langsdorf) [2067314] - cpuidle: haltpoll: Call cpuidle_poll_state_init() later (Mark Langsdorf) [2067314] - cpuidle: use default_groups in kobj_type (Mark Langsdorf) [2067314] - cpuidle: Fix cpuidle_remove_state_sysfs() kerneldoc comment (Mark Langsdorf) [2067314] - cpuidle: menu: Fix typo in a comment (Mark Langsdorf) [2067314] - cpuidle: Fix kobject memory leaks in error paths (Mark Langsdorf) [2067314] - Reinstate some of "swiotlb: rework "fix info leak with DMA_FROM_DEVICE"" (Chris von Recklinghausen) [2059704] {CVE-2022-0854} - swiotlb: fix info leak with DMA_FROM_DEVICE (Chris von Recklinghausen) [2059704] {CVE-2022-0854} Resolves: rhbz#2061574 Signed-off-by: Luis Claudio R. Goncalves --- Makefile.rhelver | 4 +-- kernel.spec | 70 +++++++++++++++++++++++++++++++++++++++++++----- sources | 6 ++--- 3 files changed, 68 insertions(+), 12 deletions(-) diff --git a/Makefile.rhelver b/Makefile.rhelver index 329bf3b..9e82374 100644 --- a/Makefile.rhelver +++ b/Makefile.rhelver @@ -12,7 +12,7 @@ RHEL_MINOR = 1 # # Use this spot to avoid future merge conflicts. # Do not trim this comment. -RHEL_RELEASE = 130 +RHEL_RELEASE = 131 # # ZSTREAM @@ -66,4 +66,4 @@ ifneq ("$(ZSTREAM)", "yes") endif endif -RTBUILD:=.130 +RTBUILD:=.131 diff --git a/kernel.spec b/kernel.spec index 30181e9..b518f11 100755 --- a/kernel.spec +++ b/kernel.spec @@ -121,13 +121,13 @@ Summary: The Linux kernel %define kversion 5.14 %define rpmversion 5.14.0 -%define pkgrelease 130.rt21.130.el9 +%define pkgrelease 131.rt21.131.el9 # This is needed to do merge window version magic %define patchlevel 14 # allow pkg_release to have configurable %%{?dist} tag -%define specrelease 130.rt21.130%{?buildid}%{?dist} +%define specrelease 131.rt21.131%{?buildid}%{?dist} %define pkg_release %{specrelease} @@ -707,7 +707,7 @@ BuildRequires: lld # exact git commit you can run # # xzcat -qq ${TARBALL} | git get-tar-commit-id -Source0: linux-5.14.0-130.rt21.130.el9.tar.xz +Source0: linux-5.14.0-131.rt21.131.el9.tar.xz Source1: Makefile.rhelver @@ -1422,8 +1422,8 @@ ApplyOptionalPatch() fi } -%setup -q -n kernel-5.14.0-130.rt21.130.el9 -c -mv linux-5.14.0-130.rt21.130.el9 linux-%{KVERREL} +%setup -q -n kernel-5.14.0-131.rt21.131.el9 -c +mv linux-5.14.0-131.rt21.131.el9 linux-%{KVERREL} cd linux-%{KVERREL} cp -a %{SOURCE1} . @@ -3138,8 +3138,64 @@ fi # # %changelog -* Fri Jul 15 2022 Juri Lelli [5.14.0-130.rt21.130.el9] -- [rt] build kernel-rt-5.14.0-130.rt21.130.el9 [2061574] +* Mon Jul 18 2022 Luis Claudio R. Goncalves [5.14.0-131.rt21.131.el9] +- [rt] build kernel-rt-5.14.0-131.rt21.131.el9 [2061574] +- scsi: lpfc: Copyright updates for 14.2.0.5 patches (Paul Ely) [2102818] +- scsi: lpfc: Update lpfc version to 14.2.0.5 (Paul Ely) [2102818] +- scsi: lpfc: Remove Menlo/Hornet related code (Paul Ely) [2102818] +- scsi: lpfc: Refactor lpfc_nvmet_prep_abort_wqe() into lpfc_sli_prep_abort_xri() (Paul Ely) [2102818] +- scsi: lpfc: Fix lost NVMe paths during LIF bounce stress test (Paul Ely) [2102818] +- scsi: lpfc: Fix attempted FA-PWWN usage after feature disable (Paul Ely) [2102818] +- scsi: lpfc: Fix possible memory leak when failing to issue CMF WQE (Paul Ely) [2102818] +- scsi: lpfc: Remove extra atomic_inc on cmd_pending in queuecommand after VMID (Paul Ely) [2102818] +- scsi: lpfc: Set PU field when providing D_ID in XMIT_ELS_RSP64_CX iocb (Paul Ely) [2102818] +- scsi: lpfc: Prevent buffer overflow crashes in debugfs with malformed user input (Paul Ely) [2102818] +- scsi: lpfc: Fix uninitialized cqe field in lpfc_nvme_cancel_iocb() (Paul Ely) [2102818] +- scsi: lpfc: Change FA-PWWN detection methodology (Paul Ely) [2102818] +- scsi: lpfc: Remove failing soft_wwn support (Paul Ely) [2102818] +- scsi: lpfc: Update lpfc version to 14.2.0.4 (Paul Ely) [2102818] +- scsi: lpfc: Allow reduced polling rate for nvme_admin_async_event cmd completion (Paul Ely) [2102818] +- scsi: lpfc: Add more logging of cmd and cqe information for aborted NVMe cmds (Paul Ely) [2102818] +- scsi: lpfc: Fix port stuck in bypassed state after LIP in PT2PT topology (Paul Ely) [2102818] +- scsi: lpfc: Resolve NULL ptr dereference after an ELS LOGO is aborted (Paul Ely) [2102818] +- scsi: lpfc: Address NULL pointer dereference after starget_to_rport() (Paul Ely) [2102818] +- scsi: lpfc: Resolve some cleanup issues following SLI path refactoring (Paul Ely) [2102818] +- scsi: lpfc: Resolve some cleanup issues following abort path refactoring (Paul Ely) [2102818] +- scsi: lpfc: Correct BDE type for XMIT_SEQ64_WQE in lpfc_ct_reject_event() (Paul Ely) [2102818] +- scsi: lpfc: Add support for ATTO Fibre Channel devices (Paul Ely) [2102818] +- scsi: lpfc: Add support for VMID tagging of NVMe I/Os (Paul Ely) [2102818] +- scsi: lpfc: Rework lpfc_vmid_get_appid() to be protocol independent (Paul Ely) [2102818] +- scsi: lpfc: Commonize VMID code location (Paul Ely) [2102818] +- scsi: nvme-fc: Add new routine nvme_fc_io_getuuid() (Paul Ely) [2102818] +- scsi: target: pscsi: Set SCF_TREAT_READ_AS_NORMAL flag only if there is valid data (Maurizio Lombardi) [2080216] +- x86/speculation/mmio: Print SMT warning (Waiman Long) [2090256] {CVE-2022-21123 CVE-2022-21125 CVE-2022-21166} +- KVM: x86/speculation: Disable Fill buffer clear within guests (Waiman Long) [2090256] {CVE-2022-21123 CVE-2022-21125 CVE-2022-21166} +- x86/speculation/mmio: Reuse SRBDS mitigation for SBDS (Waiman Long) [2090256] {CVE-2022-21123 CVE-2022-21125 CVE-2022-21166} +- x86/speculation/srbds: Update SRBDS mitigation selection (Waiman Long) [2090256] {CVE-2022-21123 CVE-2022-21125 CVE-2022-21166} +- x86/speculation/mmio: Add sysfs reporting for Processor MMIO Stale Data (Waiman Long) [2090256] {CVE-2022-21123 CVE-2022-21125 CVE-2022-21166} +- x86/speculation/mmio: Enable CPU Fill buffer clearing on idle (Waiman Long) [2090256] {CVE-2022-21123 CVE-2022-21125 CVE-2022-21166} +- x86/bugs: Group MDS, TAA & Processor MMIO Stale Data mitigations (Waiman Long) [2090256] {CVE-2022-21123 CVE-2022-21125 CVE-2022-21166} +- x86/speculation/mmio: Add mitigation for Processor MMIO Stale Data (Waiman Long) [2090256] {CVE-2022-21123 CVE-2022-21125 CVE-2022-21166} +- x86/speculation: Add a common function for MD_CLEAR mitigation update (Waiman Long) [2090256] {CVE-2022-21123 CVE-2022-21125 CVE-2022-21166} +- x86/speculation/mmio: Enumerate Processor MMIO Stale Data bug (Waiman Long) [2090256] {CVE-2022-21123 CVE-2022-21125 CVE-2022-21166} +- Documentation: Add documentation for Processor MMIO Stale Data (Waiman Long) [2090256] {CVE-2022-21123 CVE-2022-21125 CVE-2022-21166} +- x86/tsx: Disable TSX development mode at boot (Waiman Long) [2090256] +- x86/tsx: Use MSR_TSX_CTRL to clear CPUID bits (Waiman Long) [2090256] +- Documentation: Add L1D flushing Documentation (Waiman Long) [2090256] +- x86, prctl: Hook L1D flushing in via prctl (Waiman Long) [2090256] +- x86/mm: Prepare for opt-in based L1D flush in switch_mm() (Waiman Long) [2090256] +- x86/process: Make room for TIF_SPEC_L1D_FLUSH (Waiman Long) [2090256] +- sched: Add task_work callback for paranoid L1D flush (Waiman Long) [2090256] +- x86/mm: Refactor cond_ibpb() to support other use cases (Waiman Long) [2090256] +- cpuidle: psci: Fix regression leading to no genpd governor (Mark Langsdorf) [2067314] +- cpuidle: Factor-out power domain related code from PSCI domain driver (Mark Langsdorf) [2067314] +- cpuidle: haltpoll: Call cpuidle_poll_state_init() later (Mark Langsdorf) [2067314] +- cpuidle: use default_groups in kobj_type (Mark Langsdorf) [2067314] +- cpuidle: Fix cpuidle_remove_state_sysfs() kerneldoc comment (Mark Langsdorf) [2067314] +- cpuidle: menu: Fix typo in a comment (Mark Langsdorf) [2067314] +- cpuidle: Fix kobject memory leaks in error paths (Mark Langsdorf) [2067314] +- Reinstate some of "swiotlb: rework "fix info leak with DMA_FROM_DEVICE"" (Chris von Recklinghausen) [2059704] {CVE-2022-0854} +- swiotlb: fix info leak with DMA_FROM_DEVICE (Chris von Recklinghausen) [2059704] {CVE-2022-0854} * Fri Jul 15 2022 Juri Lelli [5.14.0-130.rt21.130.el9] - [rt] build kernel-rt-5.14.0-130.rt21.130.el9 [2061574] diff --git a/sources b/sources index 9a5ca59..ace27f1 100644 --- a/sources +++ b/sources @@ -1,4 +1,4 @@ SHA512 (kernel-abi-whitelists-5.13.0-1.tar.bz2) = ceba454e1f590c1e4ef4115a75463ae3ac2c2aa7ec85fa14a2669d666c421483a38225ee19d7d72b4ac7032375741408b23543e43588538c80161ec0cf57051c -SHA512 (linux-5.14.0-130.rt21.130.el9.tar.xz) = f9a60db36d512f01994cb44cc3d37fb4c01fc141ecd70e7d196142f13ee3b6c39cbdf844906f3edfe2e3c140e38dcb3105fb7abd244a99f3829d937769a55b10 -SHA512 (kernel-abi-stablelists-5.14.0-130.rt21.130.el9.tar.bz2) = 431da468e758bb60d72cae8c35300b06b3b09d39223c5561450d11eb456c10680d7bd08c5962cd3377258062eec85ac8977e10fc5fa4bb15681192700c8fb16e -SHA512 (kernel-kabi-dw-5.14.0-130.rt21.130.el9.tar.bz2) = f02d9f77b8dbfa668e2baa08d99d1fd4600fb5634e9892b18b753b5948b1e70ef4b7193e14d81a5847b73a1bf03ec3538a30689fcdd052fdf270feabc4eaad34 +SHA512 (linux-5.14.0-131.rt21.131.el9.tar.xz) = 7fa10982110d04ba73cfe73d506ce2d2e41cc2ac32c73c96a94caef1b8209091e24d68f01f8f566d7270d4a1902425e7800cc5cacb1ff88f0581835f62b0a491 +SHA512 (kernel-abi-stablelists-5.14.0-131.rt21.131.el9.tar.bz2) = 3345d332b962b853206d92a8e32861de4ca618c70fa2873e79223cc55b09b1bba10c9a1625d3d9707d55db5fd9c56d6f9ea171e92e3d1a324a96b6cad80573b7 +SHA512 (kernel-kabi-dw-5.14.0-131.rt21.131.el9.tar.bz2) = 565f812fa83a756ef7b91219031cfe80b1e853f22b4ed38ada76aed482caaf89df35e4d220f45728392765a757f8b0798e3b5a57fee0114e1d0379e887772578