kernel/sources
Jan Stancek 45e06e340a kernel-6.12.0-46.el10
* Mon Jan 27 2025 Jan Stancek <jstancek@redhat.com> [6.12.0-46.el10]
- redhat: hsr: Mark as tech preview (Felix Maurer) [RHEL-74748]
- xfs: Mark all experimental code as tech preview (Bill O'Donnell) [RHEL-64936]
- redhat: create 'debug' addon for UKI (Li Tian) [RHEL-70836]
- mptcp: disable by default (Davide Caratti) [RHEL-74247]
- initramfs: avoid filename buffer overrun (Rafael Aquini) [RHEL-73366] {CVE-2024-53142}
- redhat/configs: set new PKEY_UV option on s390 (Mete Durlu) [RHEL-24135]
- s390/crypto: Add hardware acceleration for full AES-XTS mode (Mete Durlu) [RHEL-24136]
- s390/crypto: Postpone the key split to key conversion (Mete Durlu) [RHEL-24136]
- s390/crypto: Introduce function for tokenize clearkeys (Mete Durlu) [RHEL-24136]
- s390/crypto: Generalize parameters for key conversion (Mete Durlu) [RHEL-24136]
- s390/crypto: Use module-local structures for protected keys (Mete Durlu) [RHEL-24136]
- s390/crypto: Convert to reverse x-mas tree, rename ret to rc (Mete Durlu) [RHEL-24136]
- s390/pkey: Tolerate larger key blobs (Mete Durlu) [RHEL-24136]
- s390/pkey: Add new pkey handler module pkey-uv (Mete Durlu) [RHEL-24135]
- s390/pkey: Build module name array selectively based on kernel config options (Mete Durlu) [RHEL-24135]
- s390/pkey: Fix checkpatch findings in pkey header file (Mete Durlu) [RHEL-24135]
- s390/pkey: Rework pkey verify for protected keys (Mete Durlu) [RHEL-24135]
- s390/pkey: Simplify protected key length calculation code (Mete Durlu) [RHEL-24135]
- s390/zcrypt: Cleanup include zcrypt_api.h (Mete Durlu) [RHEL-24135]
- ipvs: speed up reads from ip_vs_conn proc file (Florian Westphal) [RHEL-68933]
- PCI: Batch BAR sizing operations (Myron Stowe) [RHEL-76026]
- xfrm: mark packet offload as tech preview (Sabrina Dubroca) [RHEL-75472]
- mm/kmemleak: fix sleeping function called from invalid context at print message (CKI Backport Bot) [RHEL-74104] {CVE-2024-57885}
- mm: vmscan: account for free pages to prevent infinite Loop in throttle_direct_reclaim() (CKI Backport Bot) [RHEL-74099] {CVE-2024-57884}
- bnxt_en: Fix DIM shutdown (Michal Schmidt) [RHEL-73718]
- bnxt_en: Fix possible memory leak when hwrm_req_replace fails (Michal Schmidt) [RHEL-73718]
- bnxt_en: Fix aggregation ID mask to prevent oops on 5760X chips (Michal Schmidt) [RHEL-73718]
- bnxt_en: Fix GSO type for HW GRO packets on 5750X chips (Michal Schmidt) [RHEL-73718]
- selftests: drv-net: rss_ctx: Add test for ntuple rule (Michal Schmidt) [RHEL-73718]
- bnxt_en: ethtool: Supply ntuple rss context action (Michal Schmidt) [RHEL-73718]
Resolves: RHEL-24135, RHEL-24136, RHEL-64936, RHEL-68933, RHEL-70836, RHEL-73366, RHEL-73718, RHEL-74099, RHEL-74104, RHEL-74247, RHEL-74748, RHEL-75472, RHEL-76026

Signed-off-by: Jan Stancek <jstancek@redhat.com>
2025-01-27 21:08:27 +01:00

6 lines
876 B
Plaintext

SHA512 (kernel-abi-stablelists-6.6.0.tar.bz2) = 4f917598056dee5e23814621ec96ff2e4a411c8c4ba9d56ecb01b23cb96431825bedbecfcbaac9338efbf5cb21694d85497fa0bf43e7c80d9cd10bc6dd144dbd
SHA512 (kernel-kabi-dw-6.6.0.tar.bz2) = 19308cd976031d05e18ef7f5d093218acdb89446418bab0cd956ff12cf66369915b9e64bb66fa9f20939428a60e81884fec5be3529c6c7461738d6540d3cc5c6
SHA512 (linux-6.12.0-46.el10.tar.xz) = df4546809fe94f92897585e1f2f0ed654352d0a91106965dcca4b360c9bb5d31b829386e0b6119af2d680b0dc2de2dfd4850b1e59c1385672e5ccf1eba163dce
SHA512 (kernel-abi-stablelists-6.12.0-46.el10.tar.xz) = 852ba4fe15184ff4be465d07a005d15a4e577a03b3fed6d88d684e8996dd899ce2279e7dd8e3750c55f295734f3408eaa8e8441a19e80f51b11ee82cc713df42
SHA512 (kernel-kabi-dw-6.12.0-46.el10.tar.xz) = 394165cba4e2d576c21708b70dcd01bf9ae38dd8101104ee468b29bcff00052a062c6808c9ce252769aa5402ad12cae7100d194a43cbb090e6020e043ed9f382