kernel-6.12.0-71.el10
* Tue Apr 08 2025 Julio Faracco <jfaracco@redhat.com> [6.12.0-71.el10] - KVM: arm64: Unconditionally save+flush host FPSIMD/SVE/SME state (Sebastian Ott) [RHEL-82297] - KVM: arm64: nv: Apply RESx settings to sysreg reset values (Sebastian Ott) [RHEL-82297] - KVM: arm64: nv: Always evaluate HCR_EL2 using sanitising accessors (Sebastian Ott) [RHEL-82297] - KVM: arm64: Fix alignment of kvm_hyp_memcache allocations (Sebastian Ott) [RHEL-82297] - tools headers: Sync arm64 kvm header with the kernel sources (Sebastian Ott) [RHEL-82297] - KVM: arm64: Initialize SCTLR_EL1 in __kvm_hyp_init_cpu() (Sebastian Ott) [RHEL-82297] - KVM: arm64: Initialize HCR_EL2.E2H early (Sebastian Ott) [RHEL-82297] - KVM: arm64: Ensure a VMID is allocated before programming VTTBR_EL2 (Sebastian Ott) [RHEL-82297] - KVM: arm64: Fix tcr_el2 initialisation in hVHE mode (Sebastian Ott) [RHEL-82297] - KVM: arm64: vgic: Hoist SGI/PPI alloc from vgic_init() to kvm_create_vgic() (Sebastian Ott) [RHEL-82297] - KVM: arm64: timer: Drop warning on failed interrupt signalling (Sebastian Ott) [RHEL-82297] - KVM: arm64: Convert timer offset VA when accessed in HYP code (Sebastian Ott) [RHEL-82297] - KVM: arm64: Simplify warning in kvm_arch_vcpu_load_fp() (Sebastian Ott) [RHEL-82297] - KVM: arm64: Fix __pkvm_host_mkyoung_guest() return value (Sebastian Ott) [RHEL-82297] - KVM: arm64: Simplify np-guest hypercalls (Sebastian Ott) [RHEL-82297] - KVM: arm64: Improve error handling from check_host_shared_guest() (Sebastian Ott) [RHEL-82297] - KVM: arm64: timer: Don't adjust the EL2 virtual timer offset (Sebastian Ott) [RHEL-82297] - KVM: arm64: timer: Correctly handle EL1 timer emulation when !FEAT_ECV (Sebastian Ott) [RHEL-82297] - KVM: arm64: timer: Always evaluate the need for a soft timer (Sebastian Ott) [RHEL-82297] - KVM: arm64: Fix nested S2 MMU structures reallocation (Sebastian Ott) [RHEL-82297] - KVM: arm64: Fail protected mode init if no vgic hardware is present (Sebastian Ott) [RHEL-82297] - KVM: arm64: Flush/sync debug state in protected mode (Sebastian Ott) [RHEL-82297] - KVM: arm64: Flush hyp bss section after initialization of variables in bss (Sebastian Ott) [RHEL-82297] - KVM: arm64: Fix selftests after sysreg field name update (Sebastian Ott) [RHEL-82297] - coresight: Pass guest TRFCR value to KVM (Sebastian Ott) [RHEL-82297] - KVM: arm64: Support trace filtering for guests (Sebastian Ott) [RHEL-82297] - KVM: arm64: coresight: Give TRBE enabled state to KVM (Sebastian Ott) [RHEL-82297] - coresight: trbe: Remove redundant disable call (Sebastian Ott) [RHEL-82297] - arm64/sysreg/tools: Move TRFCR definitions to sysreg (Sebastian Ott) [RHEL-82297] - tools: arm64: Update sysreg.h header files (Sebastian Ott) [RHEL-82297] - KVM: arm64: Explicitly handle BRBE traps as UNDEFINED (Sebastian Ott) [RHEL-82297] - KVM: arm64: vgic: Use str_enabled_disabled() in vgic_v3_probe() (Sebastian Ott) [RHEL-82297] - arm64: kvm: Introduce nvhe stack size constants (Sebastian Ott) [RHEL-82297] - KVM: arm64: Fix nVHE stacktrace VA bits mask (Sebastian Ott) [RHEL-82297] - KVM: arm64: Fix FEAT_MTE in pKVM (Sebastian Ott) [RHEL-82297] - KVM: arm64: Work around x1e's CNTVOFF_EL2 bogosity (Sebastian Ott) [RHEL-82297] - KVM: arm64: nv: Sanitise CNTHCTL_EL2 (Sebastian Ott) [RHEL-82297] - KVM: arm64: nv: Propagate CNTHCTL_EL2.EL1NV{P,V}CT bits (Sebastian Ott) [RHEL-82297] - KVM: arm64: nv: Add trap routing for CNTHCTL_EL2.EL1{NVPCT,NVVCT,TVT,TVCT} (Sebastian Ott) [RHEL-82297] - KVM: arm64: Handle counter access early in non-HYP context (Sebastian Ott) [RHEL-82297] - KVM: arm64: nv: Accelerate EL0 counter accesses from hypervisor context (Sebastian Ott) [RHEL-82297] - KVM: arm64: nv: Accelerate EL0 timer read accesses when FEAT_ECV in use (Sebastian Ott) [RHEL-82297] - KVM: arm64: nv: Use FEAT_ECV to trap access to EL0 timers (Sebastian Ott) [RHEL-82297] - KVM: arm64: nv: Publish emulated timer interrupt state in the in-memory state (Sebastian Ott) [RHEL-82297] - KVM: arm64: nv: Sync nested timer state with FEAT_NV2 (Sebastian Ott) [RHEL-82297] - KVM: arm64: nv: Add handling of EL2-specific timer registers (Sebastian Ott) [RHEL-82297] - KVM: arm64: nv: Advertise the lack of AArch32 EL0 support (Sebastian Ott) [RHEL-82297] - KVM: arm64: Use kvm_vcpu_has_feature() directly for struct kvm (Sebastian Ott) [RHEL-82297] - KVM: arm64: Convert the SVE guest vcpu flag to a vm flag (Sebastian Ott) [RHEL-82297] - KVM: arm64: Remove PtrAuth guest vcpu flag (Sebastian Ott) [RHEL-82297] - KVM: arm64: Fix the value of the CPTR_EL2 RES1 bitmask for nVHE (Sebastian Ott) [RHEL-82297] - KVM: arm64: Refactor kvm_reset_cptr_el2() (Sebastian Ott) [RHEL-82297] - KVM: arm64: Calculate cptr_el2 traps on activating traps (Sebastian Ott) [RHEL-82297] - KVM: arm64: Remove redundant setting of HCR_EL2 trap bit (Sebastian Ott) [RHEL-82297] - KVM: arm64: Remove fixed_config.h header (Sebastian Ott) [RHEL-82297] - KVM: arm64: Rework specifying restricted features for protected VMs (Sebastian Ott) [RHEL-82297] - KVM: arm64: Set protected VM traps based on its view of feature registers (Sebastian Ott) [RHEL-82297] - KVM: arm64: Fix RAS trapping in pKVM for protected VMs (Sebastian Ott) [RHEL-82297] - KVM: arm64: Initialize feature id registers for protected VMs (Sebastian Ott) [RHEL-82297] - KVM: arm64: Use KVM extension checks for allowed protected VM capabilities (Sebastian Ott) [RHEL-82297] - KVM: arm64: Remove KVM_ARM_VCPU_POWER_OFF from protected VMs allowed features in pKVM (Sebastian Ott) [RHEL-82297] - KVM: arm64: Move checking protected vcpu features to a separate function (Sebastian Ott) [RHEL-82297] - KVM: arm64: Group setting traps for protected VMs by control register (Sebastian Ott) [RHEL-82297] - KVM: arm64: Consolidate allowed and restricted VM feature checks (Sebastian Ott) [RHEL-82297] - KVM: arm64: Plumb the pKVM MMU in KVM (Sebastian Ott) [RHEL-82297] - KVM: arm64: Introduce the EL1 pKVM MMU (Sebastian Ott) [RHEL-82297] - KVM: arm64: Introduce __pkvm_tlb_flush_vmid() (Sebastian Ott) [RHEL-82297] - KVM: arm64: Introduce __pkvm_host_mkyoung_guest() (Sebastian Ott) [RHEL-82297] - KVM: arm64: Introduce __pkvm_host_test_clear_young_guest() (Sebastian Ott) [RHEL-82297] - KVM: arm64: Introduce __pkvm_host_wrprotect_guest() (Sebastian Ott) [RHEL-82297] - KVM: arm64: Introduce __pkvm_host_relax_guest_perms() (Sebastian Ott) [RHEL-82297] - KVM: arm64: Introduce __pkvm_host_unshare_guest() (Sebastian Ott) [RHEL-82297] - KVM: arm64: Introduce __pkvm_host_share_guest() (Sebastian Ott) [RHEL-82297] - KVM: arm64: Introduce __pkvm_vcpu_{load,put}() (Sebastian Ott) [RHEL-82297] - KVM: arm64: Add {get,put}_pkvm_hyp_vm() helpers (Sebastian Ott) [RHEL-82297] - KVM: arm64: Make kvm_pgtable_stage2_init() a static inline function (Sebastian Ott) [RHEL-82297] - KVM: arm64: Pass walk flags to kvm_pgtable_stage2_relax_perms (Sebastian Ott) [RHEL-82297] - KVM: arm64: Pass walk flags to kvm_pgtable_stage2_mkyoung (Sebastian Ott) [RHEL-82297] - KVM: arm64: Move host page ownership tracking to the hyp vmemmap (Sebastian Ott) [RHEL-82297] - KVM: arm64: Make hyp_page::order a u8 (Sebastian Ott) [RHEL-82297] - KVM: arm64: Move enum pkvm_page_state to memory.h (Sebastian Ott) [RHEL-82297] - KVM: arm64: Change the layout of enum pkvm_page_state (Sebastian Ott) [RHEL-82297] - KVM: arm64: Promote guest ownership for DBGxVR/DBGxCR reads (Sebastian Ott) [RHEL-82297] - KVM: arm64: Fold DBGxVR/DBGxCR accessors into common set (Sebastian Ott) [RHEL-82297] - KVM: arm64: Avoid reading ID_AA64DFR0_EL1 for debug save/restore (Sebastian Ott) [RHEL-82297] - KVM: arm64: nv: Honor MDCR_EL2.TDE routing for debug exceptions (Sebastian Ott) [RHEL-82297] - KVM: arm64: Manage software step state at load/put (Sebastian Ott) [RHEL-82297] - KVM: arm64: Don't hijack guest context MDSCR_EL1 (Sebastian Ott) [RHEL-82297] - KVM: arm64: Compute MDCR_EL2 at vcpu_load() (Sebastian Ott) [RHEL-82297] - KVM: arm64: Reload vCPU for accesses to OSLAR_EL1 (Sebastian Ott) [RHEL-82297] - KVM: arm64: Use debug_owner to track if debug regs need save/restore (Sebastian Ott) [RHEL-82297] - KVM: arm64: Remove vestiges of debug_ptr (Sebastian Ott) [RHEL-82297] - KVM: arm64: Remove debug tracepoints (Sebastian Ott) [RHEL-82297] - KVM: arm64: Select debug state to save/restore based on debug owner (Sebastian Ott) [RHEL-82297] - KVM: arm64: Clean up KVM_SET_GUEST_DEBUG handler (Sebastian Ott) [RHEL-82297] - KVM: arm64: Evaluate debug owner at vcpu_load() (Sebastian Ott) [RHEL-82297] - KVM: arm64: Write MDCR_EL2 directly from kvm_arm_setup_mdcr_el2() (Sebastian Ott) [RHEL-82297] - KVM: arm64: Move host SME/SVE tracking flags to host data (Sebastian Ott) [RHEL-82297] - KVM: arm64: Track presence of SPE/TRBE in kvm_host_data instead of vCPU (Sebastian Ott) [RHEL-82297] - KVM: arm64: Get rid of __kvm_get_mdcr_el2() and related warts (Sebastian Ott) [RHEL-82297] - KVM: arm64: Drop MDSCR_EL1_DEBUG_MASK (Sebastian Ott) [RHEL-82297] - arm64/kvm: Avoid invalid physical addresses to signal owner updates (Sebastian Ott) [RHEL-82297] - arm64/kvm: Configure HYP TCR.PS/DS based on host stage1 (Sebastian Ott) [RHEL-82297] - KVM: arm64: Only apply PMCR_EL0.P to the guest range of counters (Sebastian Ott) [RHEL-82297] - KVM: arm64: nv: Reload PMU events upon MDCR_EL2.HPME change (Sebastian Ott) [RHEL-82297] - KVM: arm64: Use KVM_REQ_RELOAD_PMU to handle PMCR_EL0.E change (Sebastian Ott) [RHEL-82297] - KVM: arm64: Add unified helper for reprogramming counters by mask (Sebastian Ott) [RHEL-82297] - KVM: arm64: Always check the state from hyp_ack_unshare() (Sebastian Ott) [RHEL-82297] - arm64: Fix usage of new shifted MDCR_EL2 values (Sebastian Ott) [RHEL-82297] - KVM: arm64: Use MDCR_EL2.HPME to evaluate overflow of hyp counters (Sebastian Ott) [RHEL-82297] - KVM: arm64: Mark set_sysreg_masks() as inline to avoid build failure (Sebastian Ott) [RHEL-82297] - KVM: arm64: Make L1Ip feature in CTR_EL0 writable from userspace (Sebastian Ott) [RHEL-82297] - KVM: arm64: nv: Reprogram PMU events affected by nested transition (Sebastian Ott) [RHEL-82297] - KVM: arm64: nv: Apply EL2 event filtering when in hyp context (Sebastian Ott) [RHEL-82297] - KVM: arm64: nv: Honor MDCR_EL2.HLP (Sebastian Ott) [RHEL-82297] - KVM: arm64: nv: Honor MDCR_EL2.HPME (Sebastian Ott) [RHEL-82297] - KVM: arm64: Add helpers to determine if PMC counts at a given EL (Sebastian Ott) [RHEL-82297] - KVM: arm64: nv: Adjust range of accessible PMCs according to HPMN (Sebastian Ott) [RHEL-82297] - KVM: arm64: Rename kvm_pmu_valid_counter_mask() (Sebastian Ott) [RHEL-82297] - KVM: arm64: nv: Advertise support for FEAT_HPMN0 (Sebastian Ott) [RHEL-82297] - KVM: arm64: nv: Describe trap behaviour of MDCR_EL2.HPMN (Sebastian Ott) [RHEL-82297] - KVM: arm64: nv: Honor MDCR_EL2.{TPM, TPMCR} in Host EL0 (Sebastian Ott) [RHEL-82297] - KVM: arm64: nv: Reinject traps that take effect in Host EL0 (Sebastian Ott) [RHEL-82297] - KVM: arm64: nv: Rename BEHAVE_FORWARD_ANY (Sebastian Ott) [RHEL-82297] - KVM: arm64: nv: Allow coarse-grained trap combos to use complex traps (Sebastian Ott) [RHEL-82297] - arm64: sysreg: Add new definitions for ID_AA64DFR0_EL1 (Sebastian Ott) [RHEL-82297] - arm64: sysreg: Migrate MDCR_EL2 definition to table (Sebastian Ott) [RHEL-82297] - arm64: sysreg: Describe ID_AA64DFR2_EL1 fields (Sebastian Ott) [RHEL-82297] - KVM: arm64: Describe RES0/RES1 bits of MDCR_EL2 (Sebastian Ott) [RHEL-82297] - KVM: arm64: selftests: Test ID_AA64PFR0.MPAM isn't completely ignored (Sebastian Ott) [RHEL-82297] - KVM: arm64: Disable MPAM visibility by default and ignore VMM writes (Sebastian Ott) [RHEL-82297] - KVM: arm64: Add a macro for creating filtered sys_reg_descs entries (Sebastian Ott) [RHEL-82297] - KVM: arm64: Fix missing traps of guest accesses to the MPAM registers (Sebastian Ott) [RHEL-82297] - arm64: cpufeature: discover CPU support for MPAM (Sebastian Ott) [RHEL-82297] - arm64: head.S: Initialise MPAM EL2 registers and disable traps (Sebastian Ott) [RHEL-82297] - arm64/sysreg: Convert existing MPAM sysregs and add the remaining entries (Sebastian Ott) [RHEL-82297] - KVM: arm64: Handle WXN attribute (Sebastian Ott) [RHEL-82297] - KVM: arm64: Handle stage-1 permission overlays (Sebastian Ott) [RHEL-82297] - KVM: arm64: Make PAN conditions part of the S1 walk context (Sebastian Ott) [RHEL-82297] - KVM: arm64: Disable hierarchical permissions when POE is enabled (Sebastian Ott) [RHEL-82297] - KVM: arm64: Add POE save/restore for AT emulation fast-path (Sebastian Ott) [RHEL-82297] - KVM: arm64: Add save/restore support for POR_EL2 (Sebastian Ott) [RHEL-82297] - KVM: arm64: Add basic support for POR_EL2 (Sebastian Ott) [RHEL-82297] - KVM: arm64: Add kvm_has_s1poe() helper (Sebastian Ott) [RHEL-82297] - KVM: arm64: Subject S1PIE/S1POE registers to HCR_EL2.{TVM,TRVM} (Sebastian Ott) [RHEL-82297] - KVM: arm64: Drop bogus CPTR_EL2.E0POE trap routing (Sebastian Ott) [RHEL-82297] - arm64: Add encoding for POR_EL2 (Sebastian Ott) [RHEL-82297] - KVM: arm64: Rely on visibility to let PIR*_ELx/TCR2_ELx UNDEF (Sebastian Ott) [RHEL-82297] - KVM: arm64: Hide S1PIE registers from userspace when disabled for guests (Sebastian Ott) [RHEL-82297] - KVM: arm64: Hide TCR2_EL1 from userspace when disabled for guests (Sebastian Ott) [RHEL-82297] - KVM: arm64: Define helper for EL2 registers with custom visibility (Sebastian Ott) [RHEL-82297] - KVM: arm64: Add a composite EL2 visibility helper (Sebastian Ott) [RHEL-82297] - KVM: arm64: Implement AT S1PIE support (Sebastian Ott) [RHEL-82297] - KVM: arm64: Disable hierarchical permissions when S1PIE is enabled (Sebastian Ott) [RHEL-82297] - KVM: arm64: Split S1 permission evaluation into direct and hierarchical parts (Sebastian Ott) [RHEL-82297] - KVM: arm64: Add AT fast-path support for S1PIE (Sebastian Ott) [RHEL-82297] - KVM: arm64: Handle PIR{,E0}_EL2 traps (Sebastian Ott) [RHEL-82297] - KVM: arm64: Add save/restore for PIR{,E0}_EL2 (Sebastian Ott) [RHEL-82297] - KVM: arm64: Add PIR{,E0}_EL2 to the sysreg arrays (Sebastian Ott) [RHEL-82297] - KVM: arm64: Add save/restore for TCR2_EL2 (Sebastian Ott) [RHEL-82297] - KVM: arm64: Sanitise TCR2_EL2 (Sebastian Ott) [RHEL-82297] - KVM: arm64: nv: Save/Restore vEL2 sysregs (Sebastian Ott) [RHEL-82297] - KVM: arm64: Add TCR2_EL2 to the sysreg arrays (Sebastian Ott) [RHEL-82297] - arm64: Define ID_AA64MMFR1_EL1.HAFDBS advertising FEAT_HAFT (Sebastian Ott) [RHEL-82297] - KVM: arm64: Extend masking facility to arbitrary registers (Sebastian Ott) [RHEL-82297] - KVM: arm64: nv: Handle CNTHCTL_EL2 specially (Sebastian Ott) [RHEL-82297] - KVM: arm64: nv: Add missing EL2->EL1 mappings in get_el2_to_el1_mapping() (Sebastian Ott) [RHEL-82297] - KVM: arm64: Drop useless struct s2_mmu in __kvm_at_s1e2() (Sebastian Ott) [RHEL-82297] - KVM: arm64: Don't mark "struct page" accessed when making SPTE young (Sebastian Ott) [RHEL-82297] - KVM: arm64: nvhe: Pass through PSCI v1.3 SYSTEM_OFF2 call (Sebastian Ott) [RHEL-82297] - KVM: selftests: Add test for PSCI SYSTEM_OFF2 (Sebastian Ott) [RHEL-82297] - KVM: arm64: Add support for PSCI v1.2 and v1.3 (Sebastian Ott) [RHEL-82297] - KVM: arm64: Add PSCI v1.3 SYSTEM_OFF2 function for hibernation (Sebastian Ott) [RHEL-82297] - arm64: Remove VNCR definition for PIRE0_EL2 (Sebastian Ott) [RHEL-82297] - arm64: Add encoding for PIRE0_EL2 (Sebastian Ott) [RHEL-82297] - arm64: Drop SKL0/SKL1 from TCR2_EL2 (Sebastian Ott) [RHEL-82297] - firmware/psci: Add definitions for PSCI v1.3 specification (Sebastian Ott) [RHEL-82297] - KVM: arm64: Fix set_id_regs selftest for ASIDBITS becoming unwritable (Sebastian Ott) [RHEL-82297] - redhat/configs: Enable CONFIG_VDPA_USER on RHEL10 (Cindy Lu) [RHEL-76477] Resolves: RHEL-76477, RHEL-82297 Signed-off-by: Julio Faracco <jfaracco@redhat.com>
This commit is contained in:
parent
d4ec482f45
commit
c65ba87022
@ -12,7 +12,7 @@ RHEL_MINOR = 1
|
||||
#
|
||||
# Use this spot to avoid future merge conflicts.
|
||||
# Do not trim this comment.
|
||||
RHEL_RELEASE = 70
|
||||
RHEL_RELEASE = 71
|
||||
|
||||
#
|
||||
# RHEL_REBASE_NUM
|
||||
|
182
kernel.changelog
182
kernel.changelog
@ -1,3 +1,185 @@
|
||||
* Tue Apr 08 2025 Julio Faracco <jfaracco@redhat.com> [6.12.0-71.el10]
|
||||
- KVM: arm64: Unconditionally save+flush host FPSIMD/SVE/SME state (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: nv: Apply RESx settings to sysreg reset values (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: nv: Always evaluate HCR_EL2 using sanitising accessors (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Fix alignment of kvm_hyp_memcache allocations (Sebastian Ott) [RHEL-82297]
|
||||
- tools headers: Sync arm64 kvm header with the kernel sources (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Initialize SCTLR_EL1 in __kvm_hyp_init_cpu() (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Initialize HCR_EL2.E2H early (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Ensure a VMID is allocated before programming VTTBR_EL2 (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Fix tcr_el2 initialisation in hVHE mode (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: vgic: Hoist SGI/PPI alloc from vgic_init() to kvm_create_vgic() (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: timer: Drop warning on failed interrupt signalling (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Convert timer offset VA when accessed in HYP code (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Simplify warning in kvm_arch_vcpu_load_fp() (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Fix __pkvm_host_mkyoung_guest() return value (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Simplify np-guest hypercalls (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Improve error handling from check_host_shared_guest() (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: timer: Don't adjust the EL2 virtual timer offset (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: timer: Correctly handle EL1 timer emulation when !FEAT_ECV (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: timer: Always evaluate the need for a soft timer (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Fix nested S2 MMU structures reallocation (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Fail protected mode init if no vgic hardware is present (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Flush/sync debug state in protected mode (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Flush hyp bss section after initialization of variables in bss (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Fix selftests after sysreg field name update (Sebastian Ott) [RHEL-82297]
|
||||
- coresight: Pass guest TRFCR value to KVM (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Support trace filtering for guests (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: coresight: Give TRBE enabled state to KVM (Sebastian Ott) [RHEL-82297]
|
||||
- coresight: trbe: Remove redundant disable call (Sebastian Ott) [RHEL-82297]
|
||||
- arm64/sysreg/tools: Move TRFCR definitions to sysreg (Sebastian Ott) [RHEL-82297]
|
||||
- tools: arm64: Update sysreg.h header files (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Explicitly handle BRBE traps as UNDEFINED (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: vgic: Use str_enabled_disabled() in vgic_v3_probe() (Sebastian Ott) [RHEL-82297]
|
||||
- arm64: kvm: Introduce nvhe stack size constants (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Fix nVHE stacktrace VA bits mask (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Fix FEAT_MTE in pKVM (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Work around x1e's CNTVOFF_EL2 bogosity (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: nv: Sanitise CNTHCTL_EL2 (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: nv: Propagate CNTHCTL_EL2.EL1NV{P,V}CT bits (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: nv: Add trap routing for CNTHCTL_EL2.EL1{NVPCT,NVVCT,TVT,TVCT} (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Handle counter access early in non-HYP context (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: nv: Accelerate EL0 counter accesses from hypervisor context (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: nv: Accelerate EL0 timer read accesses when FEAT_ECV in use (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: nv: Use FEAT_ECV to trap access to EL0 timers (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: nv: Publish emulated timer interrupt state in the in-memory state (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: nv: Sync nested timer state with FEAT_NV2 (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: nv: Add handling of EL2-specific timer registers (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: nv: Advertise the lack of AArch32 EL0 support (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Use kvm_vcpu_has_feature() directly for struct kvm (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Convert the SVE guest vcpu flag to a vm flag (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Remove PtrAuth guest vcpu flag (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Fix the value of the CPTR_EL2 RES1 bitmask for nVHE (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Refactor kvm_reset_cptr_el2() (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Calculate cptr_el2 traps on activating traps (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Remove redundant setting of HCR_EL2 trap bit (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Remove fixed_config.h header (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Rework specifying restricted features for protected VMs (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Set protected VM traps based on its view of feature registers (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Fix RAS trapping in pKVM for protected VMs (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Initialize feature id registers for protected VMs (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Use KVM extension checks for allowed protected VM capabilities (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Remove KVM_ARM_VCPU_POWER_OFF from protected VMs allowed features in pKVM (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Move checking protected vcpu features to a separate function (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Group setting traps for protected VMs by control register (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Consolidate allowed and restricted VM feature checks (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Plumb the pKVM MMU in KVM (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Introduce the EL1 pKVM MMU (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Introduce __pkvm_tlb_flush_vmid() (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Introduce __pkvm_host_mkyoung_guest() (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Introduce __pkvm_host_test_clear_young_guest() (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Introduce __pkvm_host_wrprotect_guest() (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Introduce __pkvm_host_relax_guest_perms() (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Introduce __pkvm_host_unshare_guest() (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Introduce __pkvm_host_share_guest() (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Introduce __pkvm_vcpu_{load,put}() (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Add {get,put}_pkvm_hyp_vm() helpers (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Make kvm_pgtable_stage2_init() a static inline function (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Pass walk flags to kvm_pgtable_stage2_relax_perms (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Pass walk flags to kvm_pgtable_stage2_mkyoung (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Move host page ownership tracking to the hyp vmemmap (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Make hyp_page::order a u8 (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Move enum pkvm_page_state to memory.h (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Change the layout of enum pkvm_page_state (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Promote guest ownership for DBGxVR/DBGxCR reads (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Fold DBGxVR/DBGxCR accessors into common set (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Avoid reading ID_AA64DFR0_EL1 for debug save/restore (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: nv: Honor MDCR_EL2.TDE routing for debug exceptions (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Manage software step state at load/put (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Don't hijack guest context MDSCR_EL1 (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Compute MDCR_EL2 at vcpu_load() (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Reload vCPU for accesses to OSLAR_EL1 (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Use debug_owner to track if debug regs need save/restore (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Remove vestiges of debug_ptr (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Remove debug tracepoints (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Select debug state to save/restore based on debug owner (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Clean up KVM_SET_GUEST_DEBUG handler (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Evaluate debug owner at vcpu_load() (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Write MDCR_EL2 directly from kvm_arm_setup_mdcr_el2() (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Move host SME/SVE tracking flags to host data (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Track presence of SPE/TRBE in kvm_host_data instead of vCPU (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Get rid of __kvm_get_mdcr_el2() and related warts (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Drop MDSCR_EL1_DEBUG_MASK (Sebastian Ott) [RHEL-82297]
|
||||
- arm64/kvm: Avoid invalid physical addresses to signal owner updates (Sebastian Ott) [RHEL-82297]
|
||||
- arm64/kvm: Configure HYP TCR.PS/DS based on host stage1 (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Only apply PMCR_EL0.P to the guest range of counters (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: nv: Reload PMU events upon MDCR_EL2.HPME change (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Use KVM_REQ_RELOAD_PMU to handle PMCR_EL0.E change (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Add unified helper for reprogramming counters by mask (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Always check the state from hyp_ack_unshare() (Sebastian Ott) [RHEL-82297]
|
||||
- arm64: Fix usage of new shifted MDCR_EL2 values (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Use MDCR_EL2.HPME to evaluate overflow of hyp counters (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Mark set_sysreg_masks() as inline to avoid build failure (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Make L1Ip feature in CTR_EL0 writable from userspace (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: nv: Reprogram PMU events affected by nested transition (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: nv: Apply EL2 event filtering when in hyp context (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: nv: Honor MDCR_EL2.HLP (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: nv: Honor MDCR_EL2.HPME (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Add helpers to determine if PMC counts at a given EL (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: nv: Adjust range of accessible PMCs according to HPMN (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Rename kvm_pmu_valid_counter_mask() (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: nv: Advertise support for FEAT_HPMN0 (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: nv: Describe trap behaviour of MDCR_EL2.HPMN (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: nv: Honor MDCR_EL2.{TPM, TPMCR} in Host EL0 (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: nv: Reinject traps that take effect in Host EL0 (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: nv: Rename BEHAVE_FORWARD_ANY (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: nv: Allow coarse-grained trap combos to use complex traps (Sebastian Ott) [RHEL-82297]
|
||||
- arm64: sysreg: Add new definitions for ID_AA64DFR0_EL1 (Sebastian Ott) [RHEL-82297]
|
||||
- arm64: sysreg: Migrate MDCR_EL2 definition to table (Sebastian Ott) [RHEL-82297]
|
||||
- arm64: sysreg: Describe ID_AA64DFR2_EL1 fields (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Describe RES0/RES1 bits of MDCR_EL2 (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: selftests: Test ID_AA64PFR0.MPAM isn't completely ignored (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Disable MPAM visibility by default and ignore VMM writes (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Add a macro for creating filtered sys_reg_descs entries (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Fix missing traps of guest accesses to the MPAM registers (Sebastian Ott) [RHEL-82297]
|
||||
- arm64: cpufeature: discover CPU support for MPAM (Sebastian Ott) [RHEL-82297]
|
||||
- arm64: head.S: Initialise MPAM EL2 registers and disable traps (Sebastian Ott) [RHEL-82297]
|
||||
- arm64/sysreg: Convert existing MPAM sysregs and add the remaining entries (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Handle WXN attribute (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Handle stage-1 permission overlays (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Make PAN conditions part of the S1 walk context (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Disable hierarchical permissions when POE is enabled (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Add POE save/restore for AT emulation fast-path (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Add save/restore support for POR_EL2 (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Add basic support for POR_EL2 (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Add kvm_has_s1poe() helper (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Subject S1PIE/S1POE registers to HCR_EL2.{TVM,TRVM} (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Drop bogus CPTR_EL2.E0POE trap routing (Sebastian Ott) [RHEL-82297]
|
||||
- arm64: Add encoding for POR_EL2 (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Rely on visibility to let PIR*_ELx/TCR2_ELx UNDEF (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Hide S1PIE registers from userspace when disabled for guests (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Hide TCR2_EL1 from userspace when disabled for guests (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Define helper for EL2 registers with custom visibility (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Add a composite EL2 visibility helper (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Implement AT S1PIE support (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Disable hierarchical permissions when S1PIE is enabled (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Split S1 permission evaluation into direct and hierarchical parts (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Add AT fast-path support for S1PIE (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Handle PIR{,E0}_EL2 traps (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Add save/restore for PIR{,E0}_EL2 (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Add PIR{,E0}_EL2 to the sysreg arrays (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Add save/restore for TCR2_EL2 (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Sanitise TCR2_EL2 (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: nv: Save/Restore vEL2 sysregs (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Add TCR2_EL2 to the sysreg arrays (Sebastian Ott) [RHEL-82297]
|
||||
- arm64: Define ID_AA64MMFR1_EL1.HAFDBS advertising FEAT_HAFT (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Extend masking facility to arbitrary registers (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: nv: Handle CNTHCTL_EL2 specially (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: nv: Add missing EL2->EL1 mappings in get_el2_to_el1_mapping() (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Drop useless struct s2_mmu in __kvm_at_s1e2() (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Don't mark "struct page" accessed when making SPTE young (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: nvhe: Pass through PSCI v1.3 SYSTEM_OFF2 call (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: selftests: Add test for PSCI SYSTEM_OFF2 (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Add support for PSCI v1.2 and v1.3 (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Add PSCI v1.3 SYSTEM_OFF2 function for hibernation (Sebastian Ott) [RHEL-82297]
|
||||
- arm64: Remove VNCR definition for PIRE0_EL2 (Sebastian Ott) [RHEL-82297]
|
||||
- arm64: Add encoding for PIRE0_EL2 (Sebastian Ott) [RHEL-82297]
|
||||
- arm64: Drop SKL0/SKL1 from TCR2_EL2 (Sebastian Ott) [RHEL-82297]
|
||||
- firmware/psci: Add definitions for PSCI v1.3 specification (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Fix set_id_regs selftest for ASIDBITS becoming unwritable (Sebastian Ott) [RHEL-82297]
|
||||
- redhat/configs: Enable CONFIG_VDPA_USER on RHEL10 (Cindy Lu) [RHEL-76477]
|
||||
Resolves: RHEL-76477, RHEL-82297
|
||||
|
||||
* Wed Apr 02 2025 Julio Faracco <jfaracco@redhat.com> [6.12.0-70.el10]
|
||||
- PCI/ACPI: Constify 'struct bin_attribute' (Myron Stowe) [RHEL-85241]
|
||||
- PCI/P2PDMA: Constify 'struct bin_attribute' (Myron Stowe) [RHEL-85241]
|
||||
|
189
kernel.spec
189
kernel.spec
@ -162,15 +162,15 @@ Summary: The Linux kernel
|
||||
%define specrpmversion 6.12.0
|
||||
%define specversion 6.12.0
|
||||
%define patchversion 6.12
|
||||
%define pkgrelease 70
|
||||
%define pkgrelease 71
|
||||
%define kversion 6
|
||||
%define tarfile_release 6.12.0-70.el10
|
||||
%define tarfile_release 6.12.0-71.el10
|
||||
# This is needed to do merge window version magic
|
||||
%define patchlevel 12
|
||||
# This allows pkg_release to have configurable %%{?dist} tag
|
||||
%define specrelease 70%{?buildid}%{?dist}
|
||||
%define specrelease 71%{?buildid}%{?dist}
|
||||
# This defines the kabi tarball version
|
||||
%define kabiversion 6.12.0-70.el10
|
||||
%define kabiversion 6.12.0-71.el10
|
||||
|
||||
# If this variable is set to 1, a bpf selftests build failure will cause a
|
||||
# fatal kernel package build error
|
||||
@ -4316,6 +4316,187 @@ fi\
|
||||
#
|
||||
#
|
||||
%changelog
|
||||
* Tue Apr 08 2025 Julio Faracco <jfaracco@redhat.com> [6.12.0-71.el10]
|
||||
- KVM: arm64: Unconditionally save+flush host FPSIMD/SVE/SME state (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: nv: Apply RESx settings to sysreg reset values (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: nv: Always evaluate HCR_EL2 using sanitising accessors (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Fix alignment of kvm_hyp_memcache allocations (Sebastian Ott) [RHEL-82297]
|
||||
- tools headers: Sync arm64 kvm header with the kernel sources (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Initialize SCTLR_EL1 in __kvm_hyp_init_cpu() (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Initialize HCR_EL2.E2H early (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Ensure a VMID is allocated before programming VTTBR_EL2 (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Fix tcr_el2 initialisation in hVHE mode (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: vgic: Hoist SGI/PPI alloc from vgic_init() to kvm_create_vgic() (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: timer: Drop warning on failed interrupt signalling (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Convert timer offset VA when accessed in HYP code (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Simplify warning in kvm_arch_vcpu_load_fp() (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Fix __pkvm_host_mkyoung_guest() return value (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Simplify np-guest hypercalls (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Improve error handling from check_host_shared_guest() (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: timer: Don't adjust the EL2 virtual timer offset (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: timer: Correctly handle EL1 timer emulation when !FEAT_ECV (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: timer: Always evaluate the need for a soft timer (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Fix nested S2 MMU structures reallocation (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Fail protected mode init if no vgic hardware is present (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Flush/sync debug state in protected mode (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Flush hyp bss section after initialization of variables in bss (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Fix selftests after sysreg field name update (Sebastian Ott) [RHEL-82297]
|
||||
- coresight: Pass guest TRFCR value to KVM (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Support trace filtering for guests (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: coresight: Give TRBE enabled state to KVM (Sebastian Ott) [RHEL-82297]
|
||||
- coresight: trbe: Remove redundant disable call (Sebastian Ott) [RHEL-82297]
|
||||
- arm64/sysreg/tools: Move TRFCR definitions to sysreg (Sebastian Ott) [RHEL-82297]
|
||||
- tools: arm64: Update sysreg.h header files (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Explicitly handle BRBE traps as UNDEFINED (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: vgic: Use str_enabled_disabled() in vgic_v3_probe() (Sebastian Ott) [RHEL-82297]
|
||||
- arm64: kvm: Introduce nvhe stack size constants (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Fix nVHE stacktrace VA bits mask (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Fix FEAT_MTE in pKVM (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Work around x1e's CNTVOFF_EL2 bogosity (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: nv: Sanitise CNTHCTL_EL2 (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: nv: Propagate CNTHCTL_EL2.EL1NV{P,V}CT bits (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: nv: Add trap routing for CNTHCTL_EL2.EL1{NVPCT,NVVCT,TVT,TVCT} (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Handle counter access early in non-HYP context (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: nv: Accelerate EL0 counter accesses from hypervisor context (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: nv: Accelerate EL0 timer read accesses when FEAT_ECV in use (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: nv: Use FEAT_ECV to trap access to EL0 timers (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: nv: Publish emulated timer interrupt state in the in-memory state (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: nv: Sync nested timer state with FEAT_NV2 (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: nv: Add handling of EL2-specific timer registers (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: nv: Advertise the lack of AArch32 EL0 support (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Use kvm_vcpu_has_feature() directly for struct kvm (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Convert the SVE guest vcpu flag to a vm flag (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Remove PtrAuth guest vcpu flag (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Fix the value of the CPTR_EL2 RES1 bitmask for nVHE (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Refactor kvm_reset_cptr_el2() (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Calculate cptr_el2 traps on activating traps (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Remove redundant setting of HCR_EL2 trap bit (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Remove fixed_config.h header (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Rework specifying restricted features for protected VMs (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Set protected VM traps based on its view of feature registers (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Fix RAS trapping in pKVM for protected VMs (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Initialize feature id registers for protected VMs (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Use KVM extension checks for allowed protected VM capabilities (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Remove KVM_ARM_VCPU_POWER_OFF from protected VMs allowed features in pKVM (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Move checking protected vcpu features to a separate function (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Group setting traps for protected VMs by control register (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Consolidate allowed and restricted VM feature checks (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Plumb the pKVM MMU in KVM (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Introduce the EL1 pKVM MMU (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Introduce __pkvm_tlb_flush_vmid() (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Introduce __pkvm_host_mkyoung_guest() (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Introduce __pkvm_host_test_clear_young_guest() (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Introduce __pkvm_host_wrprotect_guest() (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Introduce __pkvm_host_relax_guest_perms() (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Introduce __pkvm_host_unshare_guest() (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Introduce __pkvm_host_share_guest() (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Introduce __pkvm_vcpu_{load,put}() (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Add {get,put}_pkvm_hyp_vm() helpers (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Make kvm_pgtable_stage2_init() a static inline function (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Pass walk flags to kvm_pgtable_stage2_relax_perms (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Pass walk flags to kvm_pgtable_stage2_mkyoung (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Move host page ownership tracking to the hyp vmemmap (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Make hyp_page::order a u8 (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Move enum pkvm_page_state to memory.h (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Change the layout of enum pkvm_page_state (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Promote guest ownership for DBGxVR/DBGxCR reads (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Fold DBGxVR/DBGxCR accessors into common set (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Avoid reading ID_AA64DFR0_EL1 for debug save/restore (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: nv: Honor MDCR_EL2.TDE routing for debug exceptions (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Manage software step state at load/put (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Don't hijack guest context MDSCR_EL1 (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Compute MDCR_EL2 at vcpu_load() (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Reload vCPU for accesses to OSLAR_EL1 (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Use debug_owner to track if debug regs need save/restore (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Remove vestiges of debug_ptr (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Remove debug tracepoints (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Select debug state to save/restore based on debug owner (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Clean up KVM_SET_GUEST_DEBUG handler (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Evaluate debug owner at vcpu_load() (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Write MDCR_EL2 directly from kvm_arm_setup_mdcr_el2() (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Move host SME/SVE tracking flags to host data (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Track presence of SPE/TRBE in kvm_host_data instead of vCPU (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Get rid of __kvm_get_mdcr_el2() and related warts (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Drop MDSCR_EL1_DEBUG_MASK (Sebastian Ott) [RHEL-82297]
|
||||
- arm64/kvm: Avoid invalid physical addresses to signal owner updates (Sebastian Ott) [RHEL-82297]
|
||||
- arm64/kvm: Configure HYP TCR.PS/DS based on host stage1 (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Only apply PMCR_EL0.P to the guest range of counters (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: nv: Reload PMU events upon MDCR_EL2.HPME change (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Use KVM_REQ_RELOAD_PMU to handle PMCR_EL0.E change (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Add unified helper for reprogramming counters by mask (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Always check the state from hyp_ack_unshare() (Sebastian Ott) [RHEL-82297]
|
||||
- arm64: Fix usage of new shifted MDCR_EL2 values (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Use MDCR_EL2.HPME to evaluate overflow of hyp counters (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Mark set_sysreg_masks() as inline to avoid build failure (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Make L1Ip feature in CTR_EL0 writable from userspace (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: nv: Reprogram PMU events affected by nested transition (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: nv: Apply EL2 event filtering when in hyp context (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: nv: Honor MDCR_EL2.HLP (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: nv: Honor MDCR_EL2.HPME (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Add helpers to determine if PMC counts at a given EL (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: nv: Adjust range of accessible PMCs according to HPMN (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Rename kvm_pmu_valid_counter_mask() (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: nv: Advertise support for FEAT_HPMN0 (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: nv: Describe trap behaviour of MDCR_EL2.HPMN (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: nv: Honor MDCR_EL2.{TPM, TPMCR} in Host EL0 (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: nv: Reinject traps that take effect in Host EL0 (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: nv: Rename BEHAVE_FORWARD_ANY (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: nv: Allow coarse-grained trap combos to use complex traps (Sebastian Ott) [RHEL-82297]
|
||||
- arm64: sysreg: Add new definitions for ID_AA64DFR0_EL1 (Sebastian Ott) [RHEL-82297]
|
||||
- arm64: sysreg: Migrate MDCR_EL2 definition to table (Sebastian Ott) [RHEL-82297]
|
||||
- arm64: sysreg: Describe ID_AA64DFR2_EL1 fields (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Describe RES0/RES1 bits of MDCR_EL2 (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: selftests: Test ID_AA64PFR0.MPAM isn't completely ignored (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Disable MPAM visibility by default and ignore VMM writes (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Add a macro for creating filtered sys_reg_descs entries (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Fix missing traps of guest accesses to the MPAM registers (Sebastian Ott) [RHEL-82297]
|
||||
- arm64: cpufeature: discover CPU support for MPAM (Sebastian Ott) [RHEL-82297]
|
||||
- arm64: head.S: Initialise MPAM EL2 registers and disable traps (Sebastian Ott) [RHEL-82297]
|
||||
- arm64/sysreg: Convert existing MPAM sysregs and add the remaining entries (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Handle WXN attribute (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Handle stage-1 permission overlays (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Make PAN conditions part of the S1 walk context (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Disable hierarchical permissions when POE is enabled (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Add POE save/restore for AT emulation fast-path (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Add save/restore support for POR_EL2 (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Add basic support for POR_EL2 (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Add kvm_has_s1poe() helper (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Subject S1PIE/S1POE registers to HCR_EL2.{TVM,TRVM} (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Drop bogus CPTR_EL2.E0POE trap routing (Sebastian Ott) [RHEL-82297]
|
||||
- arm64: Add encoding for POR_EL2 (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Rely on visibility to let PIR*_ELx/TCR2_ELx UNDEF (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Hide S1PIE registers from userspace when disabled for guests (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Hide TCR2_EL1 from userspace when disabled for guests (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Define helper for EL2 registers with custom visibility (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Add a composite EL2 visibility helper (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Implement AT S1PIE support (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Disable hierarchical permissions when S1PIE is enabled (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Split S1 permission evaluation into direct and hierarchical parts (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Add AT fast-path support for S1PIE (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Handle PIR{,E0}_EL2 traps (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Add save/restore for PIR{,E0}_EL2 (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Add PIR{,E0}_EL2 to the sysreg arrays (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Add save/restore for TCR2_EL2 (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Sanitise TCR2_EL2 (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: nv: Save/Restore vEL2 sysregs (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Add TCR2_EL2 to the sysreg arrays (Sebastian Ott) [RHEL-82297]
|
||||
- arm64: Define ID_AA64MMFR1_EL1.HAFDBS advertising FEAT_HAFT (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Extend masking facility to arbitrary registers (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: nv: Handle CNTHCTL_EL2 specially (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: nv: Add missing EL2->EL1 mappings in get_el2_to_el1_mapping() (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Drop useless struct s2_mmu in __kvm_at_s1e2() (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Don't mark "struct page" accessed when making SPTE young (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: nvhe: Pass through PSCI v1.3 SYSTEM_OFF2 call (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: selftests: Add test for PSCI SYSTEM_OFF2 (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Add support for PSCI v1.2 and v1.3 (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Add PSCI v1.3 SYSTEM_OFF2 function for hibernation (Sebastian Ott) [RHEL-82297]
|
||||
- arm64: Remove VNCR definition for PIRE0_EL2 (Sebastian Ott) [RHEL-82297]
|
||||
- arm64: Add encoding for PIRE0_EL2 (Sebastian Ott) [RHEL-82297]
|
||||
- arm64: Drop SKL0/SKL1 from TCR2_EL2 (Sebastian Ott) [RHEL-82297]
|
||||
- firmware/psci: Add definitions for PSCI v1.3 specification (Sebastian Ott) [RHEL-82297]
|
||||
- KVM: arm64: Fix set_id_regs selftest for ASIDBITS becoming unwritable (Sebastian Ott) [RHEL-82297]
|
||||
- redhat/configs: Enable CONFIG_VDPA_USER on RHEL10 (Cindy Lu) [RHEL-76477]
|
||||
|
||||
* Wed Apr 02 2025 Julio Faracco <jfaracco@redhat.com> [6.12.0-70.el10]
|
||||
- PCI/ACPI: Constify 'struct bin_attribute' (Myron Stowe) [RHEL-85241]
|
||||
- PCI/P2PDMA: Constify 'struct bin_attribute' (Myron Stowe) [RHEL-85241]
|
||||
|
6
sources
6
sources
@ -1,5 +1,5 @@
|
||||
SHA512 (kernel-abi-stablelists-6.6.0.tar.bz2) = 4f917598056dee5e23814621ec96ff2e4a411c8c4ba9d56ecb01b23cb96431825bedbecfcbaac9338efbf5cb21694d85497fa0bf43e7c80d9cd10bc6dd144dbd
|
||||
SHA512 (kernel-kabi-dw-6.6.0.tar.bz2) = 19308cd976031d05e18ef7f5d093218acdb89446418bab0cd956ff12cf66369915b9e64bb66fa9f20939428a60e81884fec5be3529c6c7461738d6540d3cc5c6
|
||||
SHA512 (linux-6.12.0-70.el10.tar.xz) = fbbb7d14a7ba9c457a628fad98b417056da1c79c7b1c5eba044003cba9f80c6d88bcfd9b7088edd03d9532063a9dd4d1cc2246193a66425d8888c9964bb10232
|
||||
SHA512 (kernel-abi-stablelists-6.12.0-70.el10.tar.xz) = e03cb86f0343fcad84f5768243a7b9c174fa6a545512f298df1d1595248eb243e05a8eddd1f25ee9f3ce2676eea9b0b0816d089a6853f23333a2772e9dd414df
|
||||
SHA512 (kernel-kabi-dw-6.12.0-70.el10.tar.xz) = 363638a37d0822f41ee10a642eba36b7442adc8697b96afc32d0dfe7cdfef25279d16621d6a9d75e29ec659a379ba2be6b7a92e59255bdeb00c17b5d4b54690d
|
||||
SHA512 (linux-6.12.0-71.el10.tar.xz) = 1269b922d2cc5126c91118e691b95ebc02cb0c49779e05fff6ad1671d3ad581182636d04aa5bf8813d11b363e7aa839abefd052cec8b40e25e643084f2bcff8f
|
||||
SHA512 (kernel-abi-stablelists-6.12.0-71.el10.tar.xz) = a1d1c99ec3e65498238cee2255aafe6475e6eaf20eca56ea1ebe0646381639b063ff65023020b1eaac043cce29bbc6a3bb233672f4badba43a4d52a8ecd97f99
|
||||
SHA512 (kernel-kabi-dw-6.12.0-71.el10.tar.xz) = 363638a37d0822f41ee10a642eba36b7442adc8697b96afc32d0dfe7cdfef25279d16621d6a9d75e29ec659a379ba2be6b7a92e59255bdeb00c17b5d4b54690d
|
||||
|
Loading…
Reference in New Issue
Block a user