diff --git a/Makefile.rhelver b/Makefile.rhelver index b40ac9ebe..bd567c7a7 100644 --- a/Makefile.rhelver +++ b/Makefile.rhelver @@ -12,7 +12,7 @@ RHEL_MINOR = 1 # # Use this spot to avoid future merge conflicts. # Do not trim this comment. -RHEL_RELEASE = 120 +RHEL_RELEASE = 121 # # ZSTREAM diff --git a/kernel-aarch64-debug-rhel.config b/kernel-aarch64-debug-rhel.config index c8eaffe70..e86050006 100644 --- a/kernel-aarch64-debug-rhel.config +++ b/kernel-aarch64-debug-rhel.config @@ -999,6 +999,8 @@ CONFIG_CRYPTO_ECHAINIV=m # CONFIG_CRYPTO_ECRDSA is not set CONFIG_CRYPTO_ESSIV=m CONFIG_CRYPTO_FCRYPT=m +# CONFIG_CRYPTO_FIPS_CUSTOM_VERSION is not set +CONFIG_CRYPTO_FIPS_NAME="Linux Kernel Cryptographic API" CONFIG_CRYPTO_FIPS=y CONFIG_CRYPTO_GCM=y CONFIG_CRYPTO_GF128MUL=y diff --git a/kernel-aarch64-rhel.config b/kernel-aarch64-rhel.config index a17a90c7c..af26f5733 100644 --- a/kernel-aarch64-rhel.config +++ b/kernel-aarch64-rhel.config @@ -999,6 +999,8 @@ CONFIG_CRYPTO_ECHAINIV=m # CONFIG_CRYPTO_ECRDSA is not set CONFIG_CRYPTO_ESSIV=m CONFIG_CRYPTO_FCRYPT=m +# CONFIG_CRYPTO_FIPS_CUSTOM_VERSION is not set +CONFIG_CRYPTO_FIPS_NAME="Linux Kernel Cryptographic API" CONFIG_CRYPTO_FIPS=y CONFIG_CRYPTO_GCM=y CONFIG_CRYPTO_GF128MUL=y diff --git a/kernel-ppc64le-debug-rhel.config b/kernel-ppc64le-debug-rhel.config index cf82fe01a..a5bc1522b 100644 --- a/kernel-ppc64le-debug-rhel.config +++ b/kernel-ppc64le-debug-rhel.config @@ -823,6 +823,8 @@ CONFIG_CRYPTO_ECHAINIV=m # CONFIG_CRYPTO_ECRDSA is not set CONFIG_CRYPTO_ESSIV=m CONFIG_CRYPTO_FCRYPT=m +# CONFIG_CRYPTO_FIPS_CUSTOM_VERSION is not set +CONFIG_CRYPTO_FIPS_NAME="Linux Kernel Cryptographic API" CONFIG_CRYPTO_FIPS=y CONFIG_CRYPTO_GCM=y CONFIG_CRYPTO_GF128MUL=y diff --git a/kernel-ppc64le-rhel.config b/kernel-ppc64le-rhel.config index a5b2b7f19..f67e584c5 100644 --- a/kernel-ppc64le-rhel.config +++ b/kernel-ppc64le-rhel.config @@ -823,6 +823,8 @@ CONFIG_CRYPTO_ECHAINIV=m # CONFIG_CRYPTO_ECRDSA is not set CONFIG_CRYPTO_ESSIV=m CONFIG_CRYPTO_FCRYPT=m +# CONFIG_CRYPTO_FIPS_CUSTOM_VERSION is not set +CONFIG_CRYPTO_FIPS_NAME="Linux Kernel Cryptographic API" CONFIG_CRYPTO_FIPS=y CONFIG_CRYPTO_GCM=y CONFIG_CRYPTO_GF128MUL=y diff --git a/kernel-s390x-debug-rhel.config b/kernel-s390x-debug-rhel.config index a47b02f3e..0db72cdd4 100644 --- a/kernel-s390x-debug-rhel.config +++ b/kernel-s390x-debug-rhel.config @@ -820,6 +820,8 @@ CONFIG_CRYPTO_ECHAINIV=m # CONFIG_CRYPTO_ECRDSA is not set CONFIG_CRYPTO_ESSIV=m CONFIG_CRYPTO_FCRYPT=m +# CONFIG_CRYPTO_FIPS_CUSTOM_VERSION is not set +CONFIG_CRYPTO_FIPS_NAME="Linux Kernel Cryptographic API" CONFIG_CRYPTO_FIPS=y CONFIG_CRYPTO_GCM=y CONFIG_CRYPTO_GF128MUL=y diff --git a/kernel-s390x-rhel.config b/kernel-s390x-rhel.config index 8023a2913..4ab2976cd 100644 --- a/kernel-s390x-rhel.config +++ b/kernel-s390x-rhel.config @@ -820,6 +820,8 @@ CONFIG_CRYPTO_ECHAINIV=m # CONFIG_CRYPTO_ECRDSA is not set CONFIG_CRYPTO_ESSIV=m CONFIG_CRYPTO_FCRYPT=m +# CONFIG_CRYPTO_FIPS_CUSTOM_VERSION is not set +CONFIG_CRYPTO_FIPS_NAME="Linux Kernel Cryptographic API" CONFIG_CRYPTO_FIPS=y CONFIG_CRYPTO_GCM=y CONFIG_CRYPTO_GF128MUL=y diff --git a/kernel-s390x-zfcpdump-rhel.config b/kernel-s390x-zfcpdump-rhel.config index 042cac7b3..89deb197f 100644 --- a/kernel-s390x-zfcpdump-rhel.config +++ b/kernel-s390x-zfcpdump-rhel.config @@ -825,6 +825,8 @@ CONFIG_CRYPTO_ECHAINIV=y # CONFIG_CRYPTO_ECRDSA is not set # CONFIG_CRYPTO_ESSIV is not set CONFIG_CRYPTO_FCRYPT=y +# CONFIG_CRYPTO_FIPS_CUSTOM_VERSION is not set +CONFIG_CRYPTO_FIPS_NAME="Linux Kernel Cryptographic API" CONFIG_CRYPTO_FIPS=y CONFIG_CRYPTO_GCM=y CONFIG_CRYPTO_GF128MUL=y diff --git a/kernel-x86_64-debug-rhel.config b/kernel-x86_64-debug-rhel.config index e6621bec4..250d9d916 100644 --- a/kernel-x86_64-debug-rhel.config +++ b/kernel-x86_64-debug-rhel.config @@ -876,6 +876,8 @@ CONFIG_CRYPTO_ECHAINIV=m # CONFIG_CRYPTO_ECRDSA is not set CONFIG_CRYPTO_ESSIV=m CONFIG_CRYPTO_FCRYPT=m +# CONFIG_CRYPTO_FIPS_CUSTOM_VERSION is not set +CONFIG_CRYPTO_FIPS_NAME="Linux Kernel Cryptographic API" CONFIG_CRYPTO_FIPS=y CONFIG_CRYPTO_GCM=y CONFIG_CRYPTO_GF128MUL=y @@ -6162,7 +6164,7 @@ CONFIG_VIRTIO_BLK=m CONFIG_VIRTIO_CONSOLE=m CONFIG_VIRTIO_FS=m CONFIG_VIRTIO_INPUT=m -# CONFIG_VIRTIO_IOMMU is not set +CONFIG_VIRTIO_IOMMU=y CONFIG_VIRTIO_MEM=m CONFIG_VIRTIO_MENU=y # CONFIG_VIRTIO_MMIO_CMDLINE_DEVICES is not set diff --git a/kernel-x86_64-rhel.config b/kernel-x86_64-rhel.config index 013a8f1d0..70f1eaf6a 100644 --- a/kernel-x86_64-rhel.config +++ b/kernel-x86_64-rhel.config @@ -876,6 +876,8 @@ CONFIG_CRYPTO_ECHAINIV=m # CONFIG_CRYPTO_ECRDSA is not set CONFIG_CRYPTO_ESSIV=m CONFIG_CRYPTO_FCRYPT=m +# CONFIG_CRYPTO_FIPS_CUSTOM_VERSION is not set +CONFIG_CRYPTO_FIPS_NAME="Linux Kernel Cryptographic API" CONFIG_CRYPTO_FIPS=y CONFIG_CRYPTO_GCM=y CONFIG_CRYPTO_GF128MUL=y @@ -6139,7 +6141,7 @@ CONFIG_VIRTIO_BLK=m CONFIG_VIRTIO_CONSOLE=m CONFIG_VIRTIO_FS=m CONFIG_VIRTIO_INPUT=m -# CONFIG_VIRTIO_IOMMU is not set +CONFIG_VIRTIO_IOMMU=y CONFIG_VIRTIO_MEM=m CONFIG_VIRTIO_MENU=y # CONFIG_VIRTIO_MMIO_CMDLINE_DEVICES is not set diff --git a/kernel.spec b/kernel.spec index d4a36688d..6d2b59c4c 100755 --- a/kernel.spec +++ b/kernel.spec @@ -121,13 +121,13 @@ Summary: The Linux kernel %define kversion 5.14 %define rpmversion 5.14.0 -%define pkgrelease 120.el9 +%define pkgrelease 121.el9 # This is needed to do merge window version magic %define patchlevel 14 # allow pkg_release to have configurable %%{?dist} tag -%define specrelease 120%{?buildid}%{?dist} +%define specrelease 121%{?buildid}%{?dist} %define pkg_release %{specrelease} @@ -679,7 +679,7 @@ BuildRequires: lld # exact git commit you can run # # xzcat -qq ${TARBALL} | git get-tar-commit-id -Source0: linux-5.14.0-120.el9.tar.xz +Source0: linux-5.14.0-121.el9.tar.xz Source1: Makefile.rhelver @@ -1349,8 +1349,8 @@ ApplyOptionalPatch() fi } -%setup -q -n kernel-5.14.0-120.el9 -c -mv linux-5.14.0-120.el9 linux-%{KVERREL} +%setup -q -n kernel-5.14.0-121.el9 -c +mv linux-5.14.0-121.el9 linux-%{KVERREL} cd linux-%{KVERREL} cp -a %{SOURCE1} . @@ -1449,6 +1449,13 @@ done %endif %endif +# Adjust FIPS module name for RHEL +%if 0%{?rhel} +for i in *.config; do + sed -i 's/CONFIG_CRYPTO_FIPS_NAME=.*/CONFIG_CRYPTO_FIPS_NAME="Red Hat Enterprise Linux %{rhel} - Kernel Cryptographic API"/' $i +done +%endif + cp %{SOURCE81} . OPTS="" %if %{with_configchecks} @@ -2309,7 +2316,7 @@ find Documentation -type d | xargs chmod u+w fi \ fi \ if [ "%{zipmodules}" -eq "1" ]; then \ - find $RPM_BUILD_ROOT/lib/modules/ -type f -name '*.ko' | xargs -P%{zcpu} xz; \ + find $RPM_BUILD_ROOT/lib/modules/ -type f -name '*.ko' | xargs -P%{zcpu} -r xz; \ fi \ %{nil} @@ -3000,6 +3007,207 @@ fi # # %changelog +* Wed Jun 29 2022 Patrick Talbert [5.14.0-121.el9] +- redhat/configs: Set CONFIG_VIRTIO_IOMMU on x86_64 (Eric Auger) [2089765] +- crypto: fips - make proc files report fips module name and version (Simo Sorce) [2080499] +- fuse: clean up error exits in fuse_fill_super() (Miklos Szeredi) [2021800] +- fuse: always initialize sb->s_fs_info (Miklos Szeredi) [2021800] +- fuse: clean up fuse_mount destruction (Miklos Szeredi) [2021800] +- fuse: get rid of fuse_put_super() (Miklos Szeredi) [2021800] +- fuse: check s_root when destroying sb (Miklos Szeredi) [2021800] +- fuse: allow sharing existing sb (Miklos Szeredi) [2021800] +- fuse: move fget() to fuse_get_tree() (Miklos Szeredi) [2021800] +- fuse: move option checking into fuse_fill_super() (Miklos Szeredi) [2021800] +- fuse: name fs_context consistently (Miklos Szeredi) [2021800] +- gfs2: Stop using glock holder auto-demotion for now (Andreas Gruenbacher) [2082193] +- gfs2: buffered write prefaulting (Andreas Gruenbacher) [2082193] +- gfs2: Align read and write chunks to the page cache (Andreas Gruenbacher) [2082193] +- gfs2: Pull return value test out of should_fault_in_pages (Andreas Gruenbacher) [2082193] +- gfs2: Clean up use of fault_in_iov_iter_{read,write}able (Andreas Gruenbacher) [2082193] +- gfs2: Variable rename (Andreas Gruenbacher) [2082193] +- gfs2: Fix filesystem block deallocation for short writes (Andreas Gruenbacher) [2082193] +- iomap: iomap_write_end cleanup (Andreas Gruenbacher) [2082193] +- iomap: iomap_write_failed fix (Andreas Gruenbacher) [2082193] +- gfs2: Don't re-check for write past EOF unnecessarily (Andreas Gruenbacher) [2082193] +- gfs2: No short reads or writes upon glock contention (Andreas Gruenbacher) [2082193] +- fs/iomap: Fix buffered write page prefaulting (Andreas Gruenbacher) [2082193] +- gfs2: Make sure not to return short direct writes (Andreas Gruenbacher) [2082193] +- gfs2: Remove dead code in gfs2_file_read_iter (Andreas Gruenbacher) [2082193] +- gfs2: Fix gfs2_file_buffered_write endless loop workaround (Andreas Gruenbacher) [2082193] +- gfs2: Minor retry logic cleanup (Andreas Gruenbacher) [2082193] +- gfs2: Disable page faults during lockless buffered reads (Andreas Gruenbacher) [2082193] +- gfs2: Fix should_fault_in_pages() logic (Andreas Gruenbacher) [2082193] +- gfs2: Initialize gh_error in gfs2_glock_nq (Andreas Gruenbacher) [2082193] +- gfs2: Make use of list_is_first (Andreas Gruenbacher) [2082193] +- gfs2: Switch lock order of inode and iopen glock (Andreas Gruenbacher) [2082193] +- gfs2: cancel timed-out glock requests (Andreas Gruenbacher) [2082193] +- gfs2: Expect -EBUSY after canceling dlm locking requests (Andreas Gruenbacher) [2082193] +- gfs2: gfs2_setattr_size error path fix (Andreas Gruenbacher) [2082193] +- gfs2: assign rgrp glock before compute_bitstructs (Bob Peterson) [2082193] +- redhat/kernel.spec.template: fix standalone tools build (Jan Stancek) [2081992] +- arm64/mte: Clarify mode reported by PR_GET_TAGGED_ADDR_CTRL (Mark Salter) [2076088] +- arm64: mte: change PR_MTE_TCF_NONE back into an unsigned long (Mark Salter) [2076088] +- tools headers UAPI: Sync linux/prctl.h with the kernel sources (Mark Salter) [2076088] +- kselftest/arm64: Skip VL_INHERIT tests for unsupported vector types (Mark Salter) [2076088] +- kselftest/arm64: Parameterise ptrace vector length information (Mark Salter) [2076088] +- arm64: extable: fix load_unaligned_zeropad() reg indices (Mark Salter) [2076088] +- arm64: kexec: Fix missing error code 'ret' warning in load_other_segments() (Mark Salter) [2076088] +- arm64: ftrace: add missing BTIs (Mark Salter) [2076088] +- arm64: kexec: use __pa_symbol(empty_zero_page) (Mark Salter) [2076088] +- arm64: update PAC description for kernel (Mark Salter) [2076088] +- arm64: uaccess: avoid blocking within critical sections (Mark Salter) [2076088] +- arm64: mm: Fix VM_BUG_ON(mm != &init_mm) for trans_pgd (Mark Salter) [2076088] +- arm64: pgtable: make __pte_to_phys/__phys_to_pte_val inline functions (Mark Salter) [2076088] +- arm64: Track no early_pgtable_alloc() for kmemleak (Mark Salter) [2076088] +- arm64: vdso: remove -nostdlib compiler flag (Mark Salter) [2076088] +- arm64: arm64_ftr_reg->name may not be a human-readable string (Mark Salter) [2076088] +- kasan: arm64: fix pcpu_page_first_chunk crash with KASAN_VMALLOC (Mark Salter) [2076088] +- arm64: support page mapping percpu first chunk allocator (Mark Salter) [2076088] +- arm64: cpufeature: Export this_cpu_has_cap helper (Mark Salter) [2076088] +- arm64: Select POSIX_CPU_TIMERS_TASK_WORK (Mark Salter) [2076088] +- arm64: Document boot requirements for FEAT_SME_FA64 (Mark Salter) [2076088] +- arm64: ftrace: use function_nocfi for _mcount as well (Mark Salter) [2076088] +- arm64: asm: setup.h: export common variables (Mark Salter) [2076088] +- arm64/traps: Avoid unnecessary kernel/user pointer conversion (Mark Salter) [2076088] +- arm64/sve: Fix warnings when SVE is disabled (Mark Salter) [2076088] +- arm64/sve: Add stub for sve_max_virtualisable_vl() (Mark Salter) [2076088] +- arm64/sve: Track vector lengths for tasks in an array (Mark Salter) [2076088] +- arm64/sve: Explicitly load vector length when restoring SVE state (Mark Salter) [2076088] +- arm64/sve: Put system wide vector length information into structs (Mark Salter) [2076088] +- arm64/sve: Use accessor functions for vector lengths in thread_struct (Mark Salter) [2076088] +- arm64/sve: Rename find_supported_vector_length() (Mark Salter) [2076088] +- arm64/sve: Make access to FFR optional (Mark Salter) [2076088] +- arm64/sve: Make sve_state_size() static (Mark Salter) [2076088] +- arm64/sve: Remove sve_load_from_fpsimd_state() (Mark Salter) [2076088] +- arm64/fp: Reindent fpsimd_save() (Mark Salter) [2076088] +- selftests: arm64: Factor out utility functions for assembly FP tests (Mark Salter) [2076088] +- selftests: arm64: Add coverage of ptrace flags for SVE VL inheritance (Mark Salter) [2076088] +- selftests: arm64: Verify that all possible vector lengths are handled (Mark Salter) [2076088] +- selftests: arm64: Fix and enable test for setting current VL in vec-syscfg (Mark Salter) [2076088] +- selftests: arm64: Remove bogus error check on writing to files (Mark Salter) [2076088] +- selftests: arm64: Fix printf() format mismatch in vec-syscfg (Mark Salter) [2076088] +- selftests: arm64: Move FPSIMD in SVE ptrace test into a function (Mark Salter) [2076088] +- selftests: arm64: More comprehensively test the SVE ptrace interface (Mark Salter) [2076088] +- selftests: arm64: Verify interoperation of SVE and FPSIMD register sets (Mark Salter) [2076088] +- selftests: arm64: Clarify output when verifying SVE register set (Mark Salter) [2076088] +- selftests: arm64: Document what the SVE ptrace test is doing (Mark Salter) [2076088] +- selftests: arm64: Remove extraneous register setting code (Mark Salter) [2076088] +- selftests: arm64: Don't log child creation as a test in SVE ptrace test (Mark Salter) [2076088] +- selftests: arm64: Use a define for the number of SVE ptrace tests to be run (Mark Salter) [2076088] +- arm64: vmlinux.lds.S: remove `.fixup` section (Mark Salter) [2076088] +- arm64: extable: add load_unaligned_zeropad() handler (Mark Salter) [2076088] +- arm64: extable: add a dedicated uaccess handler (Mark Salter) [2076088] +- arm64: extable: add `type` and `data` fields (Mark Salter) [2076088] +- arm64: extable: use `ex` for `exception_table_entry` (Mark Salter) [2076088] +- arm64: extable: make fixup_exception() return bool (Mark Salter) [2076088] +- arm64: extable: consolidate definitions (Mark Salter) [2076088] +- arm64: gpr-num: support W registers (Mark Salter) [2076088] +- arm64: factor out GPR numbering helpers (Mark Salter) [2076088] +- arm64: kvm: use kvm_exception_table_entry (Mark Salter) [2076088] +- arm64: lib: __arch_copy_to_user(): fold fixups into body (Mark Salter) [2076088] +- arm64: lib: __arch_copy_from_user(): fold fixups into body (Mark Salter) [2076088] +- arm64: lib: __arch_clear_user(): fold fixups into body (Mark Salter) [2076088] +- arm64: vdso32: require CROSS_COMPILE_COMPAT for gcc+bfd (Mark Salter) [2076088] +- arm64: vdso32: suppress error message for 'make mrproper' (Mark Salter) [2076088] +- arm64: vdso32: drop test for -march=armv8-a (Mark Salter) [2076088] +- arm64: vdso32: drop the test for dmb ishld (Mark Salter) [2076088] +- arm64: Add a capability for FEAT_ECV (Mark Salter) [2076088] +- arm64: mte: Add asymmetric mode support (Mark Salter) [2076088] +- arm64: mte: CPU feature detection for Asymm MTE (Mark Salter) [2076088] +- arm64: mte: Bitfield definitions for Asymm MTE (Mark Salter) [2076088] +- arm64: kasan: mte: move GCR_EL1 switch to task switch when KASAN disabled (Mark Salter) [2076088] +- arm64/mm: drop HAVE_ARCH_PFN_VALID (Mark Salter) [2076088] +- arm64: trans_pgd: remove trans_pgd_map_page() (Mark Salter) [2076088] +- arm64: kexec: remove cpu-reset.h (Mark Salter) [2076088] +- arm64: kexec: remove the pre-kexec PoC maintenance (Mark Salter) [2076088] +- arm64: kexec: keep MMU enabled during kexec relocation (Mark Salter) [2076088] +- arm64: kexec: install a copy of the linear-map (Mark Salter) [2076088] +- arm64: kexec: use ld script for relocation function (Mark Salter) [2076088] +- arm64: kexec: relocate in EL1 mode (Mark Salter) [2076088] +- arm64: kexec: configure EL2 vectors for kexec (Mark Salter) [2076088] +- arm64: kexec: pass kimage as the only argument to relocation function (Mark Salter) [2076088] +- arm64: kexec: Use dcache ops macros instead of open-coding (Mark Salter) [2076088] +- arm64: kexec: skip relocation code for inplace kexec (Mark Salter) [2076088] +- arm64: kexec: flush image and lists during kexec load time (Mark Salter) [2076088] +- arm64: hibernate: abstract ttrb0 setup function (Mark Salter) [2076088] +- arm64: trans_pgd: hibernate: Add trans_pgd_copy_el2_vectors (Mark Salter) [2076088] +- arm64: kernel: add helper for booted at EL2 and not VHE (Mark Salter) [2076088] +- arm64: mm: update max_pfn after memory hotplug (Mark Salter) [2076088] +- arm64/mm: Add pud_sect_supported() (Mark Salter) [2076088] +- arm64: mm: Drop pointless call to set_max_mapnr() (Mark Salter) [2076088] +- arm64/hugetlb: fix CMA gigantic page order for non-4K PAGE_SIZE (Mark Salter) [2076088] +- kselftest/arm64: signal: Skip tests if required features are missing (Mark Salter) [2076088] +- arm64: Mitigate MTE issues with str{n}cmp() (Mark Salter) [2076088] +- arm64: add MTE supported check to thread switching and syscall entry/exit (Mark Salter) [2076088] +- arm64: Mark __stack_chk_guard as __ro_after_init (Mark Salter) [2076088] +- arm64/kernel: remove duplicate include in process.c (Mark Salter) [2076088] +- arm64/sve: Use correct size when reinitialising SVE state (Mark Salter) [2076088] +- arm64: remove GCC version check for ARCH_SUPPORTS_INT128 (Mark Salter) [2076088] +- arm64: mm: limit linear region to 51 bits for KVM in nVHE mode (Mark Salter) [2076088] +- arm64: mm: fix comment typo of pud_offset_phys() (Mark Salter) [2076088] +- arm64: signal32: Drop pointless call to sigdelsetmask() (Mark Salter) [2076088] +- arm64/sve: Better handle failure to allocate SVE register storage (Mark Salter) [2076088] +- arm64: Document the requirement for SCR_EL3.HCE (Mark Salter) [2076088] +- arm64: head: avoid over-mapping in map_memory (Mark Salter) [2076088] +- arm64/sve: Add a comment documenting the binutils needed for SVE asm (Mark Salter) [2076088] +- arm64/sve: Add some comments for sve_save/load_state() (Mark Salter) [2076088] +- arm64: replace in_irq() with in_hardirq() (Mark Salter) [2076088] +- arm64: mm: Fix TLBI vs ASID rollover (Mark Salter) [2076088] +- arm64: entry: Add SYM_CODE annotation for __bad_stack (Mark Salter) [2076088] +- arm64: fix typo in a comment (Mark Salter) [2076088] +- arm64: move the (z)install rules to arch/arm64/Makefile (Mark Salter) [2076088] +- arm64/sve: Make fpsimd_bind_task_to_cpu() static (Mark Salter) [2076088] +- arm64: unnecessary end 'return;' in void functions (Mark Salter) [2076088] +- arm64/sme: Document boot requirements for SME (Mark Salter) [2076088] +- arm64: use __func__ to get function name in pr_err (Mark Salter) [2076088] +- arm64: SSBS/DIT: print SSBS and DIT bit when printing PSTATE (Mark Salter) [2076088] +- arm64: cpufeature: Use defined macro instead of magic numbers (Mark Salter) [2076088] +- kselftest/arm64: signal: Add a TODO list for signal handling tests (Mark Salter) [2076088] +- kselftest/arm64: signal: Add test case for SVE register state in signals (Mark Salter) [2076088] +- kselftest/arm64: signal: Verify that signals can't change the SVE vector length (Mark Salter) [2076088] +- kselftest/arm64: signal: Check SVE signal frame shows expected vector length (Mark Salter) [2076088] +- kselftest/arm64: signal: Support signal frames with SVE register data (Mark Salter) [2076088] +- kselftest/arm64: signal: Add SVE to the set of features we can check for (Mark Salter) [2076088] +- kselftest/arm64: pac: Fix skipping of tests on systems without PAC (Mark Salter) [2076088] +- kselftest/arm64: mte: Fix misleading output when skipping tests (Mark Salter) [2076088] +- kselftest/arm64: Add a TODO list for floating point tests (Mark Salter) [2076088] +- kselftest/arm64: Add tests for SVE vector configuration (Mark Salter) [2076088] +- kselftest/arm64: Validate vector lengths are set in sve-probe-vls (Mark Salter) [2076088] +- kselftest/arm64: Provide a helper binary and "library" for SVE RDVL (Mark Salter) [2076088] +- kselftest/arm64: Ignore check_gcr_el1_cswitch binary (Mark Salter) [2076088] +- Documentation: arm64: describe asymmetric 32-bit support (Mark Salter) [2076088] +- arm64: Remove logic to kill 32-bit tasks on 64-bit-only cores (Mark Salter) [2076088] +- arm64: Hook up cmdline parameter to allow mismatched 32-bit EL0 (Mark Salter) [2076088] +- arm64: Advertise CPUs capable of running 32-bit applications in sysfs (Mark Salter) [2076088] +- arm64: Prevent offlining first CPU with 32-bit EL0 on mismatched system (Mark Salter) [2076088] +- arm64: exec: Adjust affinity for compat tasks with mismatched 32-bit EL0 (Mark Salter) [2076088] +- arm64: Implement task_cpu_possible_mask() (Mark Salter) [2076088] +- KVM: arm64: Add feature register flag definitions (Mark Salter) [2076088] +- arm64/perf: Replace '0xf' instances with ID_AA64DFR0_PMUVER_IMP_DEF (Mark Salter) [2076088] +- arm64: entry: call exit_to_user_mode() from C (Mark Salter) [2076088] +- arm64: entry: move bulk of ret_to_user to C (Mark Salter) [2076088] +- arm64: entry: clarify entry/exit helpers (Mark Salter) [2076088] +- arm64: entry: consolidate entry/exit helpers (Mark Salter) [2076088] +- arm64/cpufeature: Optionally disable MTE via command-line (Mark Salter) [2076088] +- arm64: kasan: mte: remove redundant mte_report_once logic (Mark Salter) [2076088] +- arm64: kasan: mte: use a constant kernel GCR_EL1 value (Mark Salter) [2076088] +- arm64: avoid double ISB on kernel entry (Mark Salter) [2076088] +- arm64: mte: optimize GCR_EL1 modification on kernel entry/exit (Mark Salter) [2076088] +- Documentation: document the preferred tag checking mode feature (Mark Salter) [2076088] +- arm64: mte: introduce a per-CPU tag checking mode preference (Mark Salter) [2076088] +- arm64: move preemption disablement to prctl handlers (Mark Salter) [2076088] +- arm64: mte: change ASYNC and SYNC TCF settings into bitfields (Mark Salter) [2076088] +- arm64: mte: rename gcr_user_excl to mte_ctrl (Mark Salter) [2076088] +- arm64: mte: avoid TFSRE0_EL1 related operations unless in async mode (Mark Salter) [2076088] +- arm64/kexec: Test page size support with new TGRAN range values (Mark Salter) [2076088] +- arm64: Add compile-time asserts for siginfo_t offsets (Mark Salter) [2076088] +- Kbuild: use -std=gnu11 for KBUILD_USERCFLAGS (Waiman Long) [2074118] +- Kbuild: move to -std=gnu11 (Waiman Long) [2074118] +- Kbuild: use -Wdeclaration-after-statement (Waiman Long) [2074118] +- Kbuild: add -Wno-shift-negative-value where -Wextra is used (Waiman Long) [2074118] +- kbuild: Add a comment above -Wno-gnu (Waiman Long) [2074118] +- kbuild: Remove -Wno-format-invalid-specifier from clang block (Waiman Long) [2074118] + * Mon Jun 27 2022 Patrick Talbert [5.14.0-120.el9] - vmxnet3: disable overlay offloads if UPT device does not support (Kamal Heib) [2095826] - vmxnet3: update to version 7 (Kamal Heib) [2095826] diff --git a/sources b/sources index 4a8050d30..91f22a580 100644 --- a/sources +++ b/sources @@ -1,3 +1,3 @@ -SHA512 (linux-5.14.0-120.el9.tar.xz) = aca489819f70ab615777c08d0ead83adb8f39a986d5127effc654a264872755c892f5087e5d34c8ebc4e300f8b22675c2798dfca9fa9f93e85ea9c89a2f265ac -SHA512 (kernel-abi-stablelists-5.14.0-120.el9.tar.bz2) = 1cb45a7ed92a3c7abdfe2ecada7ced8c8a329499bd2232f26707ecba57b8872becaaa1a97df3fbc8c0783536006463b1d6c77e171fb574e6d0e032d1f97bafd8 -SHA512 (kernel-kabi-dw-5.14.0-120.el9.tar.bz2) = b07e3d6617cc434bf03eb165691b8b64418260e0a97bf3da3959aa03d142ff345c94b4a0f0856246d2b2c6a6a713fd6495e9f2cb73244cf4cfc5a4b7525e7674 +SHA512 (linux-5.14.0-121.el9.tar.xz) = 166cd7c78c3cd762f0b7ae76cd273735d433900b3625ab9294debb9fc1458b451636d3dae470b41a23845edd386b6f80f1293db09d0b6928f3e34a9a551961c0 +SHA512 (kernel-abi-stablelists-5.14.0-121.el9.tar.bz2) = 3b1b8cde79c2220e024663939537671648aab843e18bae633cad96879dc1f9d859660f753ab55194f67da5c38c63412afc09147a4161f9f20d4df755bb1aacb2 +SHA512 (kernel-kabi-dw-5.14.0-121.el9.tar.bz2) = b07e3d6617cc434bf03eb165691b8b64418260e0a97bf3da3959aa03d142ff345c94b4a0f0856246d2b2c6a6a713fd6495e9f2cb73244cf4cfc5a4b7525e7674