Linux @ CERN

CERN > IT > Linux

CentOS 7 - RealTime for x86_64: Letter K: kernel-rt-debug-kvm

kernel-rt-debug-kvm - KVM modules for package kernel-rt-debug

Website: http://www.kernel.org/
License: GPLv2
Vendor: Scientific Linux CERN, https://cern.ch/linux
Description:
This package provides KVM modules for package kernel-rt-debug.

Packages

kernel-rt-debug-kvm-3.10.0-862.11.6.rt56.819.el7.x86_64 [6.6 MiB] Changelog by Luis Claudio R. Goncalves (2018-08-10):
- [rt] Update source tree to match RHEL 7.5 tree [1549768 1462329]
- [kernel] cpu/hotplug: Fix 'online' sysfs entry with 'nosmt' (Josh Poimboeuf) [1593383 1593384] {CVE-2018-3620}
kernel-rt-debug-kvm-3.10.0-862.6.3.rt56.811.el7.x86_64 [6.6 MiB] Changelog by Luis Claudio R. Goncalves (2018-06-18):
- [rt] Update source tree to match RHEL 7.5 tree [1549768 1462329]
- [x86] always enable eager FPU by default on non-AMD processors (Paolo Bonzini) [1589051 1589048] {CVE-2018-3665}
- [x86] bugs: Switch the selection of mitigation from CPU vendor to CPU features (Waiman Long) [1584323 1584569] {CVE-2018-3639}
- [x86] bugs: Add AMD's SPEC_CTRL MSR usage (Waiman Long) [1584323 1584569] {CVE-2018-3639}
- [x86] bugs: Add AMD's variant of SSB_NO (Waiman Long) [1584323 1584569] {CVE-2018-3639}
- [x86] spec_ctrl: Fix VM guest SSBD problems (Waiman Long) [1584323 1584569] {CVE-2018-3639}
kernel-rt-debug-kvm-3.10.0-862.3.3.rt56.809.el7.x86_64 [6.6 MiB] Changelog by Luis Claudio R. Goncalves (2018-06-13):
- [rt] Update source tree to match RHEL 7.5 tree [1549768 1462329]
- [x86] always enable eager FPU by default on non-AMD processors (Paolo Bonzini) [1589051 1589048] {CVE-2018-3665}
kernel-rt-debug-kvm-3.10.0-862.3.2.rt56.808.el7.x86_64 [6.6 MiB] Changelog by Luis Claudio R. Goncalves (2018-05-17):
- [rt] Update source tree to match RHEL 7.5 tree [1549768 1462329]
- [x86] spec_ctrl: Fix late microcode problem with AMD (Waiman Long) [1566904 1566905] {CVE-2018-3639}
- [x86] entry: Add missing "$" in IBRS macros (Waiman Long) [1566904 1566905] {CVE-2018-3639}
- [x86] spec_ctrl: Clean up entry code & remove unused APIs (Waiman Long) [1566904 1566905] {CVE-2018-3639}
- [x86] spec_ctrl: Mask off SPEC_CTRL MSR bits that are managed by kernel (Waiman Long) [1566904 1566905] {CVE-2018-3639}
- [x86] spec_ctrl: add support for SSBD to RHEL IBRS entry/exit macros (Waiman Long) [1566904 1566905] {CVE-2018-3639}
- [fs] proc: Use CamelCase for SSBD (Waiman Long) [1566904 1566905] {CVE-2018-3639}
- [x86] bugs: Rename _RDS to _SSBD (Waiman Long) [1566904 1566905] {CVE-2018-3639}
- [kernel] seccomp: Enable speculation flaw mitigations (Waiman Long) [1566904 1566905] {CVE-2018-3639}
- [fs] proc: Provide details on speculation flaw mitigations (Waiman Long) [1566904 1566905] {CVE-2018-3639}
- [x86] nospec: Allow getting/setting on non-current task (Waiman Long) [1566904 1566905] {CVE-2018-3639}
- [x86] speculation: Add prctl for Speculative Store Bypass mitigation (Waiman Long) [1566904 1566905] {CVE-2018-3639}
- [x86] process: Allow runtime control of Speculative Store Bypass (Waiman Long) [1566904 1566905] {CVE-2018-3639}
- [uapi] prctl: Add speculation control prctls (Waiman Long) [1566904 1566905] {CVE-2018-3639}
- [x86] kvm/vmx: Expose SPEC_CTRL Bit(2) to the guest (Waiman Long) [1566904 1566905] {CVE-2018-3639}
- [x86] bugs/amd: Add support to disable RDS on Fam[15, 16, 17]h if requested (Waiman Long) [1566904 1566905] {CVE-2018-3639}
- [x86] spec_ctrl: Sync up RDS setting with IBRS code (Waiman Long) [1566904 1566905] {CVE-2018-3639}
- [x86] bugs: Provide boot parameters for the spec_store_bypass_disable mitigation (Waiman Long) [1566904 1566905] {CVE-2018-3639}
- [x86] bugs: Expose /sys/../spec_store_bypass (Waiman Long) [1566904 1566905] {CVE-2018-3639}
- [x86] bugs: Read SPEC_CTRL MSR during boot and re-use (Waiman Long) [1566904 1566905] {CVE-2018-3639}
- [x86] spec_ctrl: Use separate PCP variables for IBRS entry and exit (Waiman Long) [1566904 1566905] {CVE-2018-3639}
- [x86] cpufeatures: Make CPU bugs sticky (Waiman Long) [1566904 1566905] {CVE-2018-3639}
kernel-rt-debug-kvm-3.10.0-862.2.3.rt56.806.el7.x86_64 [6.6 MiB] Changelog by Clark Williams (2018-04-30):
- [rt] Update source tree to match RHEL 7.5 tree [1549768 1462329]
- [x86] kvm: fix icebp instruction handling (Paolo Bonzini) [1566849 1566845] {CVE-2018-1087}
- [x86] entry/64: Don't use IST entry for #BP stack (Paolo Bonzini) [1567084 1567083] {CVE-2018-8897}
kernel-rt-debug-kvm-3.10.0-862.rt56.804.el7.x86_64 [6.6 MiB] Changelog by Luis Claudio R. Goncalves (2018-03-22):
- [rt] Update source tree to match RHEL 7.5 tree [1462329]
- [netdrv] i40e: Fix attach VF to VM issue (Stefan Assmann) [1528123]
- [netdrv] ixgbevf: Add check for ixgbe_mbox_api_13 to ixgbevf_probe when setting max_mtu (Ken Cox) [1556696]
- [md] dm btree: fix serious bug in btree_split_beneath() (Mike Snitzer) [1557849]
- [x86] pti: Disable PTI user page table update in EFI virtual mode (Waiman Long) [1540061]
kernel-rt-debug-kvm-3.10.0-861.rt56.803.el7.x86_64 [6.6 MiB] Changelog by Luis Claudio R. Goncalves (2018-03-14):
- [rt] Update source tree to match RHEL 7.5 tree [1462329]
- [netdrv] tg3: prevent scheduling while atomic splat (Jonathan Toppins) [1554590]
- [nvme] validate admin queue before unquiesce (David Milburn) [1549733]
kernel-rt-debug-kvm-3.10.0-693.21.1.rt56.639.el7.x86_64 [415 KiB] Changelog by Clark Williams (2018-02-23):
- [rt] Update source tree to match RHEL 7.4 tree [1537671 1462329]
kernel-rt-debug-kvm-3.10.0-693.17.1.rt56.636.el7.x86_64 [412 KiB] Changelog by Clark Williams (2018-01-16):
- [rt] Update source tree to match RHEL 7.4 tree [1519506 1462329]
kernel-rt-debug-kvm-3.10.0-693.11.1.rt56.639.el7.x86_64 [422 KiB] Changelog by Clark Williams (2017-12-28):
- [rt] Update source tree to match RHEL 7.4 tree [1489084 1462329]
- x86/spec_ctrl: svm: spec_ctrl at vmexit needs per-cpu areas functional (Andrea Arcangeli)
- x86/mm/kaiser: init_tss is supposed to go in the PAGE_ALIGNED per-cpu section (Andrea Arcangeli)
- x86/spec_ctrl: Eliminate redundnat FEATURE Not Present messages (Waiman Long)
- x86/kaiser/mm: skip IBRS/CR3 restore when paranoid exception returns to userland (Andrea Arcangeli)
- x86/kaiser/mm: consider the init_mm.pgd a kaiser pgd (Andrea Arcangeli)
- x86/kaiser/mm: convert userland visible "kpti" name to "pti" (Andrea Arcangeli)
- Revert "x86/entry: Use retpoline for syscall's indirect calls" (Josh Poimboeuf)
- x86/spec_ctrl: set IBRS during resume from RAM if ibrs_enabled is 2 (Andrea Arcangeli)
- x86/kaiser/mm: __load_cr3 in resume from RAM after kernel gs has been restored (Andrea Arcangeli)
- x86/spec_ctrl: allow use_ibp_disable only if both SPEC_CTRL and IBPB_SUPPORT are missing (Andrea Arcangeli)
- x86/spec_ctrl: Documentation spec_ctrl.txt (Andrea Arcangeli)
- x86/spec_ctrl: remove irqs_disabled() check from intel_idle() (Andrea Arcangeli)
- x86/spec_ctrl: use enum when setting ibrs/ibpb_enabled (Josh Poimboeuf)
- x86/spec_ctrl: undo speculation barrier for ibrs_enabled and noibrs_cmdline (Andrea Arcangeli)
- x86/spec_ctrl: introduce ibpb_enabled = 2 for IBPB instead of IBRS (Andrea Arcangeli)
- x86/spec_ctrl: introduce SPEC_CTRL_PCP_ONLY_IBPB (Andrea Arcangeli)
- x86/spec_ctrl: cleanup s/flush/sync/ naming when sending IPIs (Andrea Arcangeli)
- x86/spec_ctrl: set IBRS during CPU init if in ibrs_enabled == 2 (Andrea Arcangeli)
- x86/spec_ctrl: use IBRS_ENABLED instead of 1 (Andrea Arcangeli)
- x86/spec_ctrl: allow the IBP disable feature to be toggled at runtime (Andrea Arcangeli)
- x86/spec_ctrl: always initialize save_reg in ENABLE_IBRS_SAVE_AND_CLOBBER (Andrea Arcangeli)
- x86/spec_ctrl: ibrs_enabled() is expected to return > 1 (Andrea Arcangeli)
- x86/spec_ctrl: issue a __spec_ctrl_ibpb if a credential check isn't possible (Andrea Arcangeli)
- ibpb: don't optimize spec_cntrl_ibpb on PREEMPT_RCU (Clark Williams)
- x86/spec_ctrl: clear registers after 32bit syscall stackframe is setup (Andrea Arcangeli)
- x86/spec_ctrl: reload spec_ctrl cpuid in all microcode load paths (Andrea Arcangeli)
- x86/kaiser/mm: fix pgd freeing in error path (Andrea Arcangeli)
- x86/mm/kaiser: disable global pages by default with KAISER (Dave Hansen)
- Revert "x86/mm/kaiser: Disable global pages by default with KAISER" (Josh Poimboeuf)
- x86/spec_ctrl: Prevent unwanted speculation without IBRS (Josh Poimboeuf)
- x86/entry: Remove trampoline check from paranoid entry path (Josh Poimboeuf)
- x86/entry: Fix paranoid_exit() trampoline clobber (Josh Poimboeuf)
- x86/entry: Simplify trampoline stack restore code (Waiman Long)
- x86/dumpstack: Remove raw stack dump (Scott Wood)
- x86/spec_ctrl: remove SPEC_CTRL_DEBUG code (Josh Poimboeuf)
- x86/spec_ctrl: add noibrs noibpb boot options (Andrea Arcangeli)
- x86/entry: Use retpoline for syscall's indirect calls (Tim Chen)
- x86/syscall: Clear unused extra registers on 32-bit compatible syscall entrance (Tim Chen)
- x86/spec_ctrl: cleanup unnecessary ptregscall_common function (Andrea Arcangeli)
- x86/spec_ctrl: CLEAR_EXTRA_REGS and extra regs save/restore (Josh Poimboeuf)
- x86/syscall: Clear unused extra registers on syscall entrance (Tim Chen)
- x86/spec_ctrl: rescan cpuid after a late microcode update (Andrea Arcangeli)
- x86/spec_ctrl: add debugfs ibrs_enabled ibpb_enabled (Andrea Arcangeli)
- x86/spec_ctrl: consolidate the spec control boot detection (Andrea Arcangeli)
- x86/KVM/spec_ctrl: allow IBRS to stay enabled in host userland (Andrea Arcangeli)
- x86/spec_ctrl: add debug aid to test the entry code without microcode (Andrea Arcangeli)
- x86/spec_ctrl: move stuff_RSB in spec_ctrl.h (Andrea Arcangeli)
- x86/entry: Stuff RSB for entry to kernel for non-SMEP platform (Tim Chen)
- x86/mm: Only set IBPB when the new thread cannot ptrace current thread (Tim Chen)
- x86/mm: Set IBPB upon context switch (Tim Chen)
- x86/idle: Disable IBRS when offlining cpu and re-enable on wakeup (Tim Chen)
- x86/idle: Disable IBRS entering idle and enable it on wakeup (Tim Chen)
- x86/spec_ctrl: implement spec ctrl C methods (Andrea Arcangeli)
- x86/spec_ctrl: save IBRS MSR value in save_paranoid for NMI (Andrea Arcangeli)
- x86/enter: Use IBRS on syscall and interrupts (Tim Chen)
- x86/spec_ctrl: swap rdx with rsi for nmi nesting detection (Andrea Arcangeli)
- x86/spec_ctrl: spec_ctrl_pcp and kaiser_enabled_pcp in same cachline (Andrea Arcangeli)
- x86/spec_ctrl: use per-cpu knob instead of ALTERNATIVES for ibpb and ibrs (Andrea Arcangeli)
- x86/enter: MACROS to set/clear IBRS and set IBPB (Tim Chen)
- KVM: x86: add SPEC_CTRL to MSR and CPUID lists (Paolo Bonzini)
- kvm: svm: add MSR_IA32_SPEC_CTRL and MSR_IA32_PRED_CMD (Paolo Bonzini)
- x86/svm: Set IBPB when running a different VCPU (Paolo Bonzini)
- kvm: vmx: add MSR_IA32_SPEC_CTRL and MSR_IA32_PRED_CMD (Paolo Bonzini)
- kvm: vmx: Set IBPB when running a different VCPU (Tim Chen)
- KVM: x86: clear registers on VM exit (Tom Lendacky)
- x86/kvm: Pad RSB on VM transition (Tim Chen)
- x86/cpu/AMD: Control indirect branch predictor when SPEC_CTRL not available (Tom Lendacky)
- x86/feature: Report presence of IBPB and IBRS control (Tim Chen)
- x86/feature: Enable the x86 feature to control Speculation (Tim Chen)
- objtool: Don't print 'call dest' warnings for ignored functions (Josh Poimboeuf)
- locking/barriers: prevent speculative execution based on Coverity scan results (Josh Poimboeuf)
- udf: prevent speculative execution (Elena Reshetova)
- fs: prevent speculative execution (Elena Reshetova)
- userns: prevent speculative execution (Elena Reshetova)
- qla2xxx: prevent speculative execution (Elena Reshetova)
- p54: prevent speculative execution (Elena Reshetova)
- carl9170: prevent speculative execution (Elena Reshetova)
- uvcvideo: prevent speculative execution (Elena Reshetova)
- x86/cpu/AMD: Remove now unused definition of MFENCE_RDTSC feature (Tom Lendacky)
- x86/cpu/AMD: Make the LFENCE instruction serialized (Tom Lendacky)
- locking/barriers: introduce new memory barrier gmb() (Elena Reshetova)
- x86/mm/kaiser: Replace kaiser with kpti to sync with upstream (Waiman Long)
- x86/mm/kaiser: add "kaiser" and "nokaiser" boot options (Waiman Long)
- x86/mm/kaiser: map the trace idt tables in userland shadow pgd (Andrea Arcangeli)
- x86/mm/kaiser: fix RESTORE_CR3 crash in kaiser_stop_machine (Andrea Arcangeli)
- x86/mm/kaiser: use stop_machine for enable/disable knob (Andrea Arcangeli)
- x86/mm/kaiser: use atomic ops to poison/unpoison user pagetables (Andrea Arcangeli)
- x86/mm/kaiser: use invpcid to flush the two kaiser PCID AISD (Andrea Arcangeli)
- x86/mm/kaiser: use two PCID ASIDs optimize the TLB during enter/exit kernel (Andrea Arcangeli)
- x86/mm/kaiser: stop patching flush_tlb_single (Andrea Arcangeli)
- x86/mm/kaiser: use PCID feature to make user and kernel switches faster (Dave Hansen)
- x86/mm: If INVPCID is available, use it to flush global mappings (Andy Lutomirski)
- x86/mm/64: Fix reboot interaction with CR4.PCIDE (Andy Lutomirski)
- x86/mm/64: Initialize CR4.PCIDE early (Andy Lutomirski)
- x86/mm: Add a 'noinvpcid' boot option to turn off INVPCID (Andy Lutomirski)
- x86/mm: Add the 'nopcid' boot option to turn off PCID (Andy Lutomirski)
- x86/mm/kaiser: validate trampoline stack (Andrea Arcangeli)
- x86/entry: Move SYSENTER_stack to the beginning of struct tss_struct (Andy Lutomirski)
- x86/mm/kaiser: isolate the user mapped per cpu areas (Andrea Arcangeli)
- x86/mm/kaiser: enable kaiser in build (Andrea Arcangeli)
- x86/mm/kaiser: selective boot time defaults (Andrea Arcangeli)
- x86/mm/kaiser: handle call to xen_pv_domain() on PREEMPT_RT (Clark Williams)
- x86/mm/kaiser/xen: Dynamically disable KAISER when running under Xen PV (Dave Hansen)
- x86/mm/kaiser: add Kconfig (Dave Hansen)
- x86/mm/kaiser: avoid false positives during non-kaiser pgd updates (Andrea Arcangeli)
- x86/mm/kaiser: Respect disabled CPU features (Thomas Gleixner)
- x86/mm/kaiser: trampoline stack comments (Josh Poimboeuf)
- x86/mm/kaiser: stack trampoline (Andrea Arcangeli)
- x86/mm/kaiser: remove paravirt clock warning (Andrea Arcangeli)
- x86/mm/kaiser: re-enable vsyscalls (Andrea Arcangeli)
- x86/mm/kaiser: allow to build KAISER with KASRL (Andrea Arcangeli)
- x86/mm/kaiser: allow KAISER to be enabled/disabled at runtime (Dave Hansen)
- x86/mm/kaiser: un-poison PGDs at runtime (Dave Hansen)
- x86/mm/kaiser: add a function to check for KAISER being enabled (Dave Hansen)
- x86/mm/kaiser: add debugfs file to turn KAISER on/off at runtime (Dave Hansen)
- x86/mm/kaiser: disable native VSYSCALL (Dave Hansen)
- x86/mm/kaiser: map virtually-addressed performance monitoring buffers (Hugh Dickins)
- x86/mm/kaiser: map debug IDT tables (Dave Hansen)
- x86/mm/kaiser: add kprobes text section (Andrea Arcangeli)
- x86/mm/kaiser: map trace interrupt entry (Dave Hansen)
- x86/mm/kaiser: map entry stack per-cpu areas (Andrea Arcangeli)
- x86/mm/kaiser: map dynamically-allocated LDTs (Dave Hansen)
- x86/mm/kaiser: make sure static PGDs are 8k in size (Dave Hansen)
- x86/mm/kaiser: allow NX poison to be set in p4d/pgd (Dave Hansen)
- x86/mm/kaiser: unmap kernel from userspace page tables (core patch) (Dave Hansen)
- x86/mm/kaiser: mark per-cpu data structures required for entry/exit (Dave Hansen)
- x86/mm/kaiser: introduce user-mapped per-cpu areas (Dave Hansen)
- x86/mm/kaiser: add cr3 switches to entry code (Andrea Arcangeli)
- x86/mm/kaiser: remove scratch registers (Andrea Arcangeli)
- x86/mm/kaiser: prepare assembly for entry/exit CR3 switching (Dave Hansen)
- x86/mm/kaiser: Disable global pages by default with KAISER (Dave Hansen)
- x86/mm: Document X86_CR4_PGE toggling behavior (Dave Hansen)
- x86/mm/tlb: Make CR4-based TLB flushes more robust (Dave Hansen)
- x86/mm: Do not set _PAGE_USER for init_mm page tables (Dave Hansen)
- x86: increase robusteness of bad_iret fixup handler (Andrea Arcangeli)
- perf/x86/intel/uncore: Fix memory leaks on allocation failures (Colin Ian King)
- userfaultfd: hugetlbfs: prevent UFFDIO_COPY to fill beyond the end of i_size (Andrea Arcangeli)
- userfaultfd: non-cooperative: fix fork use after free (Andrea Arcangeli)
- userfaultfd: hugetlbfs: remove superfluous page unlock in VM_SHARED case (Andrea Arcangeli)
- mm: fix bad rss-counter if remap_file_pages raced migration (Hugh Dickins)
- redhat: reduce build xz compression to speed it up (Andrea Arcangeli)
- gcc: fix build with 6.4.0 PIE default (Andrea Arcangeli)
kernel-rt-debug-kvm-3.10.0-693.11.1.rt56.632.el7.x86_64 [410 KiB] Changelog by Clark Williams (2017-11-09):
- [rt] Update source tree to match RHEL 7.4 tree [1489084 1462329]
- rt: fix timer softirq merge (Clark Williams)
kernel-rt-debug-kvm-3.10.0-693.5.2.rt56.626.el7.x86_64 [409 KiB] Changelog by Clark Williams (2017-10-13):
- [rt] Update source tree to match RHEL 7.4 tree [1489084 1462329]
kernel-rt-debug-kvm-3.10.0-693.2.2.rt56.623.el7.x86_64 [408 KiB] Changelog by Clark Williams (2017-09-11):
- [rt] Update source tree to match RHEL 7.4 tree [1473393 1462329]
kernel-rt-debug-kvm-3.10.0-693.2.1.rt56.620.el7.x86_64 [408 KiB] Changelog by Clark Williams (2017-08-14):
- [rt] kernel-rt-3.10.0-693.2.1.rt56.620.el7 (Clark Williams) [1473393]
kernel-rt-debug-kvm-3.10.0-693.rt56.617.el7.x86_64 [407 KiB] Changelog by Clark Williams (2017-07-06):
- [rt] kernel-rt-3.10.0-693.rt56.617.el7 (Clark Williams) [1391779]
kernel-rt-debug-kvm-3.10.0-514.26.1.rt56.442.el7.x86_64 [356 KiB] Changelog by Clark Williams (2017-06-20):
- [rt] kernel-rt-3.10.0-514.26.1.rt56.442.el7 (Clark Williams) [1415172]
kernel-rt-debug-kvm-3.10.0-514.21.1.rt56.438.el7.x86_64 [355 KiB] Changelog by Clark Williams (2017-04-24):
- [rt] kernel-rt-3.10.0-514.21.1.rt56.438.el7 (Clark Williams) [1415172]
kernel-rt-debug-kvm-3.10.0-514.16.1.rt56.437.el7.x86_64 [356 KiB] Changelog by Clark Williams (2017-03-13):
- [rt] kernel-rt-3.10.0-514.16.1.rt56.437.el7 (Clark Williams) [1415172]
- memcontrol: call drain_local_stock() with preemption disabled (Luiz Capitulino) [1420784]
- memcontrol: revert "memcontrol: Prevent scheduling while atomic in cgroup code" (Luiz Capitulino) [1420784]
kernel-rt-debug-kvm-3.10.0-514.10.2.rt56.435.el7.x86_64 [355 KiB] Changelog by Luis Claudio R. Goncalves (2017-02-21):
- [rt] kernel-rt-3.10.0-514.10.2.rt56.435.el7 ("Luis Claudio R. Goncalves") [1415172]
kernel-rt-debug-kvm-3.10.0-514.6.1.rt56.430.el7.x86_64 [354 KiB] Changelog by Clark Williams (2017-02-17):
- [rt] kernel-rt-3.10.0-514.6.1.rt56.430.el7 (Clark Williams) [1401863]
- dccp: fix freeing skb too early for IPV6_RECVPKTINFO (Hannes Frederic Sowa) [https://bugzilla.redhat.com/show_bug.cgi?id=1423464]
kernel-rt-debug-kvm-3.10.0-514.6.1.rt56.429.el7.x86_64 [355 KiB] Changelog by Clark Williams (2016-12-14):
- [rt] kernel-rt-3.10.0-514.6.1.rt56.429.el7 (Clark Williams) [1401863]
- [rt] specfile changelog cleanup (Clark Williams)
kernel-rt-debug-kvm-3.10.0-514.2.2.rt56.424.el7.x86_64 [354 KiB] Changelog by Clark Williams (2016-11-17):
- [rt] kernel-rt-3.10.0-514.2.2.rt56.424.el7 (Clark Williams) [1377840]
kernel-rt-debug-kvm-3.10.0-514.rt56.420.el7.x86_64 [352 KiB] Changelog by Clark Williams (2016-10-19):
- [rt] kernel-rt-3.10.0-514.rt56.420.el7 (Clark Williams) [1280494]
kernel-rt-debug-kvm-3.10.0-327.36.3.rt56.238.el7.x86_64 [310 KiB] Changelog by Luis Claudio R. Goncalves (2016-10-20):
- [rt] kernel-3.10.0-327.36.3.el7 [1366538]
- [mm] remove gup_flags FOLL_WRITE games from __get_user_pages() (Alexander Gordeev) [1385126] {CVE-2016-5195}
- [net] add recursion limit to GRO (Sabrina Dubroca) {CVE-2016-7039}
kernel-rt-debug-kvm-3.10.0-327.36.1.rt56.237.el7.x86_64 [310 KiB] Changelog by Luis Claudio R. Goncalves (2016-08-17):
- [rt] kernel-3.10.0-327.36.1.el7 [1366538]
kernel-rt-debug-kvm-3.10.0-327.28.3.rt56.235.el7.x86_64 [310 KiB] Changelog by Luis Claudio R. Goncalves (2016-08-15):
- [rt] kernel-3.10.0-327.28.3.el7 [1350307]
- [rt] use .el7 as the kernel sufix (instead of .el7_2) [1350307]
- [net] fix challenge ACK counter information disclosure [1355618] {CVE-2016-5696}
kernel-rt-debug-kvm-3.10.0-327.28.2.rt56.234.el7_2.x86_64 [309 KiB] Changelog by Luis Claudio R. Goncalves (2016-07-22):
- [rhel-rt] config: enable RCU_NOCB_CPU_ALL [1349770]
kernel-rt-debug-kvm-3.10.0-327.22.2.rt56.230.el7_2.x86_64 [309 KiB] Changelog by Luis Claudio R. Goncalves (2016-07-09):
- [rt] kernel-3.10.0-327.22.2.el7 [1335747]
kernel-rt-debug-kvm-3.10.0-327.18.2.rt56.223.el7_2.x86_64 [307 KiB] Changelog by Luis Claudio R. Goncalves (2016-04-11):
- printk: Prevent console freeze due to out-of-order deadlock [1324767]
kernel-rt-debug-kvm-3.10.0-327.13.1.rt56.216.el7_2.x86_64 [306 KiB] Changelog by Luis Claudio R. Goncalves (2016-02-29):
- [rt] merged kernel-3.10.0-327.13.1.el7 [1311476]
kernel-rt-debug-kvm-3.10.0-327.10.1.rt56.211.el7_2.x86_64 [305 KiB] Changelog by Luis Claudio R. Goncalves (2016-01-25):
- [rt] merged kernel-3.10.0-327.10.1.el7 [1282591]
kernel-rt-debug-kvm-3.10.0-327.4.5.rt56.206.el7_2.x86_64 [304 KiB] Changelog by Luis Claudio R. Goncalves (2016-01-21):
- [rt] merged kernel-3.10.0-327.4.5.el7 [1282591]
- [security] keys: Fix keyring ref leak in join_session_keyring() (David Howells) [1298037] {CVE-2016-0728}
kernel-rt-debug-kvm-3.10.0-327.rt56.204.el7.x86_64 [304 KiB] Changelog by Luis Claudio R. Goncalves (2015-10-29):
- [rt] merged kernel-3.10.0-327.el7 [1201915]
- [rt] nohz: enable nohz if nohz_full encountered on boot command line [1276071]

Listing created by repoview