Linux @ CERN

CERN > IT > Linux

CentOS 7 - RealTime for x86_64: RealTime: kernel-rt-doc

kernel-rt-doc - Various documentation bits found in the kernel source

License: GPLv2
Vendor: Scientific Linux CERN,
This package contains documentation files from the kernel
source. Various bits of information about the Linux kernel and the
device drivers shipped with it are documented in these files.

You will want to install this package if you need a reference to the
options that can be passed to Linux kernel modules at load time.


kernel-rt-doc-3.10.0-862.3.2.rt56.808.el7.noarch [16.8 MiB] Changelog by Luis Claudio R. Goncalves (2018-05-17):
- [rt] Update source tree to match RHEL 7.5 tree [1549768 1462329]
- [x86] spec_ctrl: Fix late microcode problem with AMD (Waiman Long) [1566904 1566905] {CVE-2018-3639}
- [x86] entry: Add missing "$" in IBRS macros (Waiman Long) [1566904 1566905] {CVE-2018-3639}
- [x86] spec_ctrl: Clean up entry code & remove unused APIs (Waiman Long) [1566904 1566905] {CVE-2018-3639}
- [x86] spec_ctrl: Mask off SPEC_CTRL MSR bits that are managed by kernel (Waiman Long) [1566904 1566905] {CVE-2018-3639}
- [x86] spec_ctrl: add support for SSBD to RHEL IBRS entry/exit macros (Waiman Long) [1566904 1566905] {CVE-2018-3639}
- [fs] proc: Use CamelCase for SSBD (Waiman Long) [1566904 1566905] {CVE-2018-3639}
- [x86] bugs: Rename _RDS to _SSBD (Waiman Long) [1566904 1566905] {CVE-2018-3639}
- [kernel] seccomp: Enable speculation flaw mitigations (Waiman Long) [1566904 1566905] {CVE-2018-3639}
- [fs] proc: Provide details on speculation flaw mitigations (Waiman Long) [1566904 1566905] {CVE-2018-3639}
- [x86] nospec: Allow getting/setting on non-current task (Waiman Long) [1566904 1566905] {CVE-2018-3639}
- [x86] speculation: Add prctl for Speculative Store Bypass mitigation (Waiman Long) [1566904 1566905] {CVE-2018-3639}
- [x86] process: Allow runtime control of Speculative Store Bypass (Waiman Long) [1566904 1566905] {CVE-2018-3639}
- [uapi] prctl: Add speculation control prctls (Waiman Long) [1566904 1566905] {CVE-2018-3639}
- [x86] kvm/vmx: Expose SPEC_CTRL Bit(2) to the guest (Waiman Long) [1566904 1566905] {CVE-2018-3639}
- [x86] bugs/amd: Add support to disable RDS on Fam[15, 16, 17]h if requested (Waiman Long) [1566904 1566905] {CVE-2018-3639}
- [x86] spec_ctrl: Sync up RDS setting with IBRS code (Waiman Long) [1566904 1566905] {CVE-2018-3639}
- [x86] bugs: Provide boot parameters for the spec_store_bypass_disable mitigation (Waiman Long) [1566904 1566905] {CVE-2018-3639}
- [x86] bugs: Expose /sys/../spec_store_bypass (Waiman Long) [1566904 1566905] {CVE-2018-3639}
- [x86] bugs: Read SPEC_CTRL MSR during boot and re-use (Waiman Long) [1566904 1566905] {CVE-2018-3639}
- [x86] spec_ctrl: Use separate PCP variables for IBRS entry and exit (Waiman Long) [1566904 1566905] {CVE-2018-3639}
- [x86] cpufeatures: Make CPU bugs sticky (Waiman Long) [1566904 1566905] {CVE-2018-3639}
kernel-rt-doc-3.10.0-862.2.3.rt56.806.el7.noarch [16.8 MiB] Changelog by Clark Williams (2018-04-30):
- [rt] Update source tree to match RHEL 7.5 tree [1549768 1462329]
- [x86] kvm: fix icebp instruction handling (Paolo Bonzini) [1566849 1566845] {CVE-2018-1087}
- [x86] entry/64: Don't use IST entry for #BP stack (Paolo Bonzini) [1567084 1567083] {CVE-2018-8897}
kernel-rt-doc-3.10.0-862.rt56.804.el7.noarch [16.8 MiB] Changelog by Luis Claudio R. Goncalves (2018-03-22):
- [rt] Update source tree to match RHEL 7.5 tree [1462329]
- [netdrv] i40e: Fix attach VF to VM issue (Stefan Assmann) [1528123]
- [netdrv] ixgbevf: Add check for ixgbe_mbox_api_13 to ixgbevf_probe when setting max_mtu (Ken Cox) [1556696]
- [md] dm btree: fix serious bug in btree_split_beneath() (Mike Snitzer) [1557849]
- [x86] pti: Disable PTI user page table update in EFI virtual mode (Waiman Long) [1540061]
kernel-rt-doc-3.10.0-861.rt56.803.el7.noarch [16.8 MiB] Changelog by Luis Claudio R. Goncalves (2018-03-14):
- [rt] Update source tree to match RHEL 7.5 tree [1462329]
- [netdrv] tg3: prevent scheduling while atomic splat (Jonathan Toppins) [1554590]
- [nvme] validate admin queue before unquiesce (David Milburn) [1549733]
kernel-rt-doc-3.10.0-693.21.1.rt56.639.el7.noarch [10.5 MiB] Changelog by Clark Williams (2018-02-23):
- [rt] Update source tree to match RHEL 7.4 tree [1537671 1462329]
kernel-rt-doc-3.10.0-693.17.1.rt56.636.el7.noarch [10.5 MiB] Changelog by Clark Williams (2018-01-16):
- [rt] Update source tree to match RHEL 7.4 tree [1519506 1462329]
kernel-rt-doc-3.10.0-693.11.1.rt56.639.el7.noarch [10.5 MiB] Changelog by Clark Williams (2017-12-28):
- [rt] Update source tree to match RHEL 7.4 tree [1489084 1462329]
- x86/spec_ctrl: svm: spec_ctrl at vmexit needs per-cpu areas functional (Andrea Arcangeli)
- x86/mm/kaiser: init_tss is supposed to go in the PAGE_ALIGNED per-cpu section (Andrea Arcangeli)
- x86/spec_ctrl: Eliminate redundnat FEATURE Not Present messages (Waiman Long)
- x86/kaiser/mm: skip IBRS/CR3 restore when paranoid exception returns to userland (Andrea Arcangeli)
- x86/kaiser/mm: consider the init_mm.pgd a kaiser pgd (Andrea Arcangeli)
- x86/kaiser/mm: convert userland visible "kpti" name to "pti" (Andrea Arcangeli)
- Revert "x86/entry: Use retpoline for syscall's indirect calls" (Josh Poimboeuf)
- x86/spec_ctrl: set IBRS during resume from RAM if ibrs_enabled is 2 (Andrea Arcangeli)
- x86/kaiser/mm: __load_cr3 in resume from RAM after kernel gs has been restored (Andrea Arcangeli)
- x86/spec_ctrl: allow use_ibp_disable only if both SPEC_CTRL and IBPB_SUPPORT are missing (Andrea Arcangeli)
- x86/spec_ctrl: Documentation spec_ctrl.txt (Andrea Arcangeli)
- x86/spec_ctrl: remove irqs_disabled() check from intel_idle() (Andrea Arcangeli)
- x86/spec_ctrl: use enum when setting ibrs/ibpb_enabled (Josh Poimboeuf)
- x86/spec_ctrl: undo speculation barrier for ibrs_enabled and noibrs_cmdline (Andrea Arcangeli)
- x86/spec_ctrl: introduce ibpb_enabled = 2 for IBPB instead of IBRS (Andrea Arcangeli)
- x86/spec_ctrl: introduce SPEC_CTRL_PCP_ONLY_IBPB (Andrea Arcangeli)
- x86/spec_ctrl: cleanup s/flush/sync/ naming when sending IPIs (Andrea Arcangeli)
- x86/spec_ctrl: set IBRS during CPU init if in ibrs_enabled == 2 (Andrea Arcangeli)
- x86/spec_ctrl: use IBRS_ENABLED instead of 1 (Andrea Arcangeli)
- x86/spec_ctrl: allow the IBP disable feature to be toggled at runtime (Andrea Arcangeli)
- x86/spec_ctrl: always initialize save_reg in ENABLE_IBRS_SAVE_AND_CLOBBER (Andrea Arcangeli)
- x86/spec_ctrl: ibrs_enabled() is expected to return > 1 (Andrea Arcangeli)
- x86/spec_ctrl: issue a __spec_ctrl_ibpb if a credential check isn't possible (Andrea Arcangeli)
- ibpb: don't optimize spec_cntrl_ibpb on PREEMPT_RCU (Clark Williams)
- x86/spec_ctrl: clear registers after 32bit syscall stackframe is setup (Andrea Arcangeli)
- x86/spec_ctrl: reload spec_ctrl cpuid in all microcode load paths (Andrea Arcangeli)
- x86/kaiser/mm: fix pgd freeing in error path (Andrea Arcangeli)
- x86/mm/kaiser: disable global pages by default with KAISER (Dave Hansen)
- Revert "x86/mm/kaiser: Disable global pages by default with KAISER" (Josh Poimboeuf)
- x86/spec_ctrl: Prevent unwanted speculation without IBRS (Josh Poimboeuf)
- x86/entry: Remove trampoline check from paranoid entry path (Josh Poimboeuf)
- x86/entry: Fix paranoid_exit() trampoline clobber (Josh Poimboeuf)
- x86/entry: Simplify trampoline stack restore code (Waiman Long)
- x86/dumpstack: Remove raw stack dump (Scott Wood)
- x86/spec_ctrl: remove SPEC_CTRL_DEBUG code (Josh Poimboeuf)
- x86/spec_ctrl: add noibrs noibpb boot options (Andrea Arcangeli)
- x86/entry: Use retpoline for syscall's indirect calls (Tim Chen)
- x86/syscall: Clear unused extra registers on 32-bit compatible syscall entrance (Tim Chen)
- x86/spec_ctrl: cleanup unnecessary ptregscall_common function (Andrea Arcangeli)
- x86/spec_ctrl: CLEAR_EXTRA_REGS and extra regs save/restore (Josh Poimboeuf)
- x86/syscall: Clear unused extra registers on syscall entrance (Tim Chen)
- x86/spec_ctrl: rescan cpuid after a late microcode update (Andrea Arcangeli)
- x86/spec_ctrl: add debugfs ibrs_enabled ibpb_enabled (Andrea Arcangeli)
- x86/spec_ctrl: consolidate the spec control boot detection (Andrea Arcangeli)
- x86/KVM/spec_ctrl: allow IBRS to stay enabled in host userland (Andrea Arcangeli)
- x86/spec_ctrl: add debug aid to test the entry code without microcode (Andrea Arcangeli)
- x86/spec_ctrl: move stuff_RSB in spec_ctrl.h (Andrea Arcangeli)
- x86/entry: Stuff RSB for entry to kernel for non-SMEP platform (Tim Chen)
- x86/mm: Only set IBPB when the new thread cannot ptrace current thread (Tim Chen)
- x86/mm: Set IBPB upon context switch (Tim Chen)
- x86/idle: Disable IBRS when offlining cpu and re-enable on wakeup (Tim Chen)
- x86/idle: Disable IBRS entering idle and enable it on wakeup (Tim Chen)
- x86/spec_ctrl: implement spec ctrl C methods (Andrea Arcangeli)
- x86/spec_ctrl: save IBRS MSR value in save_paranoid for NMI (Andrea Arcangeli)
- x86/enter: Use IBRS on syscall and interrupts (Tim Chen)
- x86/spec_ctrl: swap rdx with rsi for nmi nesting detection (Andrea Arcangeli)
- x86/spec_ctrl: spec_ctrl_pcp and kaiser_enabled_pcp in same cachline (Andrea Arcangeli)
- x86/spec_ctrl: use per-cpu knob instead of ALTERNATIVES for ibpb and ibrs (Andrea Arcangeli)
- x86/enter: MACROS to set/clear IBRS and set IBPB (Tim Chen)
- KVM: x86: add SPEC_CTRL to MSR and CPUID lists (Paolo Bonzini)
- kvm: svm: add MSR_IA32_SPEC_CTRL and MSR_IA32_PRED_CMD (Paolo Bonzini)
- x86/svm: Set IBPB when running a different VCPU (Paolo Bonzini)
- kvm: vmx: add MSR_IA32_SPEC_CTRL and MSR_IA32_PRED_CMD (Paolo Bonzini)
- kvm: vmx: Set IBPB when running a different VCPU (Tim Chen)
- KVM: x86: clear registers on VM exit (Tom Lendacky)
- x86/kvm: Pad RSB on VM transition (Tim Chen)
- x86/cpu/AMD: Control indirect branch predictor when SPEC_CTRL not available (Tom Lendacky)
- x86/feature: Report presence of IBPB and IBRS control (Tim Chen)
- x86/feature: Enable the x86 feature to control Speculation (Tim Chen)
- objtool: Don't print 'call dest' warnings for ignored functions (Josh Poimboeuf)
- locking/barriers: prevent speculative execution based on Coverity scan results (Josh Poimboeuf)
- udf: prevent speculative execution (Elena Reshetova)
- fs: prevent speculative execution (Elena Reshetova)
- userns: prevent speculative execution (Elena Reshetova)
- qla2xxx: prevent speculative execution (Elena Reshetova)
- p54: prevent speculative execution (Elena Reshetova)
- carl9170: prevent speculative execution (Elena Reshetova)
- uvcvideo: prevent speculative execution (Elena Reshetova)
- x86/cpu/AMD: Remove now unused definition of MFENCE_RDTSC feature (Tom Lendacky)
- x86/cpu/AMD: Make the LFENCE instruction serialized (Tom Lendacky)
- locking/barriers: introduce new memory barrier gmb() (Elena Reshetova)
- x86/mm/kaiser: Replace kaiser with kpti to sync with upstream (Waiman Long)
- x86/mm/kaiser: add "kaiser" and "nokaiser" boot options (Waiman Long)
- x86/mm/kaiser: map the trace idt tables in userland shadow pgd (Andrea Arcangeli)
- x86/mm/kaiser: fix RESTORE_CR3 crash in kaiser_stop_machine (Andrea Arcangeli)
- x86/mm/kaiser: use stop_machine for enable/disable knob (Andrea Arcangeli)
- x86/mm/kaiser: use atomic ops to poison/unpoison user pagetables (Andrea Arcangeli)
- x86/mm/kaiser: use invpcid to flush the two kaiser PCID AISD (Andrea Arcangeli)
- x86/mm/kaiser: use two PCID ASIDs optimize the TLB during enter/exit kernel (Andrea Arcangeli)
- x86/mm/kaiser: stop patching flush_tlb_single (Andrea Arcangeli)
- x86/mm/kaiser: use PCID feature to make user and kernel switches faster (Dave Hansen)
- x86/mm: If INVPCID is available, use it to flush global mappings (Andy Lutomirski)
- x86/mm/64: Fix reboot interaction with CR4.PCIDE (Andy Lutomirski)
- x86/mm/64: Initialize CR4.PCIDE early (Andy Lutomirski)
- x86/mm: Add a 'noinvpcid' boot option to turn off INVPCID (Andy Lutomirski)
- x86/mm: Add the 'nopcid' boot option to turn off PCID (Andy Lutomirski)
- x86/mm/kaiser: validate trampoline stack (Andrea Arcangeli)
- x86/entry: Move SYSENTER_stack to the beginning of struct tss_struct (Andy Lutomirski)
- x86/mm/kaiser: isolate the user mapped per cpu areas (Andrea Arcangeli)
- x86/mm/kaiser: enable kaiser in build (Andrea Arcangeli)
- x86/mm/kaiser: selective boot time defaults (Andrea Arcangeli)
- x86/mm/kaiser: handle call to xen_pv_domain() on PREEMPT_RT (Clark Williams)
- x86/mm/kaiser/xen: Dynamically disable KAISER when running under Xen PV (Dave Hansen)
- x86/mm/kaiser: add Kconfig (Dave Hansen)
- x86/mm/kaiser: avoid false positives during non-kaiser pgd updates (Andrea Arcangeli)
- x86/mm/kaiser: Respect disabled CPU features (Thomas Gleixner)
- x86/mm/kaiser: trampoline stack comments (Josh Poimboeuf)
- x86/mm/kaiser: stack trampoline (Andrea Arcangeli)
- x86/mm/kaiser: remove paravirt clock warning (Andrea Arcangeli)
- x86/mm/kaiser: re-enable vsyscalls (Andrea Arcangeli)
- x86/mm/kaiser: allow to build KAISER with KASRL (Andrea Arcangeli)
- x86/mm/kaiser: allow KAISER to be enabled/disabled at runtime (Dave Hansen)
- x86/mm/kaiser: un-poison PGDs at runtime (Dave Hansen)
- x86/mm/kaiser: add a function to check for KAISER being enabled (Dave Hansen)
- x86/mm/kaiser: add debugfs file to turn KAISER on/off at runtime (Dave Hansen)
- x86/mm/kaiser: disable native VSYSCALL (Dave Hansen)
- x86/mm/kaiser: map virtually-addressed performance monitoring buffers (Hugh Dickins)
- x86/mm/kaiser: map debug IDT tables (Dave Hansen)
- x86/mm/kaiser: add kprobes text section (Andrea Arcangeli)
- x86/mm/kaiser: map trace interrupt entry (Dave Hansen)
- x86/mm/kaiser: map entry stack per-cpu areas (Andrea Arcangeli)
- x86/mm/kaiser: map dynamically-allocated LDTs (Dave Hansen)
- x86/mm/kaiser: make sure static PGDs are 8k in size (Dave Hansen)
- x86/mm/kaiser: allow NX poison to be set in p4d/pgd (Dave Hansen)
- x86/mm/kaiser: unmap kernel from userspace page tables (core patch) (Dave Hansen)
- x86/mm/kaiser: mark per-cpu data structures required for entry/exit (Dave Hansen)
- x86/mm/kaiser: introduce user-mapped per-cpu areas (Dave Hansen)
- x86/mm/kaiser: add cr3 switches to entry code (Andrea Arcangeli)
- x86/mm/kaiser: remove scratch registers (Andrea Arcangeli)
- x86/mm/kaiser: prepare assembly for entry/exit CR3 switching (Dave Hansen)
- x86/mm/kaiser: Disable global pages by default with KAISER (Dave Hansen)
- x86/mm: Document X86_CR4_PGE toggling behavior (Dave Hansen)
- x86/mm/tlb: Make CR4-based TLB flushes more robust (Dave Hansen)
- x86/mm: Do not set _PAGE_USER for init_mm page tables (Dave Hansen)
- x86: increase robusteness of bad_iret fixup handler (Andrea Arcangeli)
- perf/x86/intel/uncore: Fix memory leaks on allocation failures (Colin Ian King)
- userfaultfd: hugetlbfs: prevent UFFDIO_COPY to fill beyond the end of i_size (Andrea Arcangeli)
- userfaultfd: non-cooperative: fix fork use after free (Andrea Arcangeli)
- userfaultfd: hugetlbfs: remove superfluous page unlock in VM_SHARED case (Andrea Arcangeli)
- mm: fix bad rss-counter if remap_file_pages raced migration (Hugh Dickins)
- redhat: reduce build xz compression to speed it up (Andrea Arcangeli)
- gcc: fix build with 6.4.0 PIE default (Andrea Arcangeli)
kernel-rt-doc-3.10.0-693.11.1.rt56.632.el7.noarch [10.5 MiB] Changelog by Clark Williams (2017-11-09):
- [rt] Update source tree to match RHEL 7.4 tree [1489084 1462329]
- rt: fix timer softirq merge (Clark Williams)
kernel-rt-doc-3.10.0-693.5.2.rt56.626.el7.noarch [10.5 MiB] Changelog by Clark Williams (2017-10-13):
- [rt] Update source tree to match RHEL 7.4 tree [1489084 1462329]
kernel-rt-doc-3.10.0-693.2.2.rt56.623.el7.noarch [10.5 MiB] Changelog by Clark Williams (2017-09-11):
- [rt] Update source tree to match RHEL 7.4 tree [1473393 1462329]
kernel-rt-doc-3.10.0-693.2.1.rt56.620.el7.noarch [10.5 MiB] Changelog by Clark Williams (2017-08-14):
- [rt] kernel-rt-3.10.0-693.2.1.rt56.620.el7 (Clark Williams) [1473393]
kernel-rt-doc-3.10.0-693.rt56.617.el7.noarch [10.5 MiB] Changelog by Clark Williams (2017-07-06):
- [rt] kernel-rt-3.10.0-693.rt56.617.el7 (Clark Williams) [1391779]
kernel-rt-doc-3.10.0-514.26.1.rt56.442.el7.noarch [10.8 MiB] Changelog by Clark Williams (2017-06-20):
- [rt] kernel-rt-3.10.0-514.26.1.rt56.442.el7 (Clark Williams) [1415172]
kernel-rt-doc-3.10.0-514.21.1.rt56.438.el7.noarch [10.8 MiB] Changelog by Clark Williams (2017-04-24):
- [rt] kernel-rt-3.10.0-514.21.1.rt56.438.el7 (Clark Williams) [1415172]
kernel-rt-doc-3.10.0-514.16.1.rt56.437.el7.noarch [10.8 MiB] Changelog by Clark Williams (2017-03-13):
- [rt] kernel-rt-3.10.0-514.16.1.rt56.437.el7 (Clark Williams) [1415172]
- memcontrol: call drain_local_stock() with preemption disabled (Luiz Capitulino) [1420784]
- memcontrol: revert "memcontrol: Prevent scheduling while atomic in cgroup code" (Luiz Capitulino) [1420784]
kernel-rt-doc-3.10.0-514.10.2.rt56.435.el7.noarch [10.8 MiB] Changelog by Luis Claudio R. Goncalves (2017-02-21):
- [rt] kernel-rt-3.10.0-514.10.2.rt56.435.el7 ("Luis Claudio R. Goncalves") [1415172]
kernel-rt-doc-3.10.0-514.6.1.rt56.430.el7.noarch [10.8 MiB] Changelog by Clark Williams (2017-02-17):
- [rt] kernel-rt-3.10.0-514.6.1.rt56.430.el7 (Clark Williams) [1401863]
- dccp: fix freeing skb too early for IPV6_RECVPKTINFO (Hannes Frederic Sowa) []
kernel-rt-doc-3.10.0-514.6.1.rt56.429.el7.noarch [10.8 MiB] Changelog by Clark Williams (2016-12-14):
- [rt] kernel-rt-3.10.0-514.6.1.rt56.429.el7 (Clark Williams) [1401863]
- [rt] specfile changelog cleanup (Clark Williams)
kernel-rt-doc-3.10.0-514.2.2.rt56.424.el7.noarch [10.8 MiB] Changelog by Clark Williams (2016-11-17):
- [rt] kernel-rt-3.10.0-514.2.2.rt56.424.el7 (Clark Williams) [1377840]
kernel-rt-doc-3.10.0-514.rt56.420.el7.noarch [10.8 MiB] Changelog by Clark Williams (2016-10-19):
- [rt] kernel-rt-3.10.0-514.rt56.420.el7 (Clark Williams) [1280494]
kernel-rt-doc-3.10.0-327.36.3.rt56.238.el7.noarch [10.6 MiB] Changelog by Luis Claudio R. Goncalves (2016-10-20):
- [rt] kernel-3.10.0-327.36.3.el7 [1366538]
- [mm] remove gup_flags FOLL_WRITE games from __get_user_pages() (Alexander Gordeev) [1385126] {CVE-2016-5195}
- [net] add recursion limit to GRO (Sabrina Dubroca) {CVE-2016-7039}
kernel-rt-doc-3.10.0-327.36.1.rt56.237.el7.noarch [10.6 MiB] Changelog by Luis Claudio R. Goncalves (2016-08-17):
- [rt] kernel-3.10.0-327.36.1.el7 [1366538]
kernel-rt-doc-3.10.0-327.28.3.rt56.235.el7.noarch [10.6 MiB] Changelog by Luis Claudio R. Goncalves (2016-08-15):
- [rt] kernel-3.10.0-327.28.3.el7 [1350307]
- [rt] use .el7 as the kernel sufix (instead of .el7_2) [1350307]
- [net] fix challenge ACK counter information disclosure [1355618] {CVE-2016-5696}
kernel-rt-doc-3.10.0-327.28.2.rt56.234.el7_2.noarch [10.6 MiB] Changelog by Luis Claudio R. Goncalves (2016-07-22):
- [rhel-rt] config: enable RCU_NOCB_CPU_ALL [1349770]
kernel-rt-doc-3.10.0-327.22.2.rt56.230.el7_2.noarch [10.6 MiB] Changelog by Luis Claudio R. Goncalves (2016-07-09):
- [rt] kernel-3.10.0-327.22.2.el7 [1335747]
kernel-rt-doc-3.10.0-327.18.2.rt56.223.el7_2.noarch [10.6 MiB] Changelog by Luis Claudio R. Goncalves (2016-04-11):
- printk: Prevent console freeze due to out-of-order deadlock [1324767]
kernel-rt-doc-3.10.0-327.13.1.rt56.216.el7_2.noarch [10.6 MiB] Changelog by Luis Claudio R. Goncalves (2016-02-29):
- [rt] merged kernel-3.10.0-327.13.1.el7 [1311476]
kernel-rt-doc-3.10.0-327.10.1.rt56.211.el7_2.noarch [10.4 MiB] Changelog by Luis Claudio R. Goncalves (2016-01-25):
- [rt] merged kernel-3.10.0-327.10.1.el7 [1282591]
kernel-rt-doc-3.10.0-327.4.5.rt56.206.el7_2.noarch [10.4 MiB] Changelog by Luis Claudio R. Goncalves (2016-01-21):
- [rt] merged kernel-3.10.0-327.4.5.el7 [1282591]
- [security] keys: Fix keyring ref leak in join_session_keyring() (David Howells) [1298037] {CVE-2016-0728}
kernel-rt-doc-3.10.0-327.rt56.204.el7.noarch [10.4 MiB] Changelog by Luis Claudio R. Goncalves (2015-10-29):
- [rt] merged kernel-3.10.0-327.el7 [1201915]
- [rt] nohz: enable nohz if nohz_full encountered on boot command line [1276071]
kernel-rt-doc-3.10.0-229.20.1.rt56.141.14.el7_1.noarch [10.2 MiB] Changelog by Clark Williams (2015-09-28):
- [rt] kernel-rt-3.10.0-229.20.1.rt56.141.14.el7 (Clark Williams) [1266915 1265251]
kernel-rt-doc-3.10.0-229.14.1.rt56.141.13.el7_1.noarch [10.2 MiB] Changelog by Clark Williams (2015-08-25):
- [rt] kernel-rt-3.10.0-229.14.1.rt56.141.13.el7 (Clark Williams) [1253809 1230395]
kernel-rt-doc-3.10.0-229.11.1.rt56.141.11.el7_1.noarch [10.2 MiB] Changelog by Clark Williams (2015-07-22):
- [rt] kernel-rt-3.10.0-229.11.1.rt56.141.11.el7 (Clark Williams) [1234470 1230391]
kernel-rt-doc-3.10.0-229.7.2.rt56.141.6.el7_1.noarch [10.2 MiB] Changelog by Clark Williams (2015-05-22):
- [rt] kernel-rt-3.10.0-229.7.2.rt56.141.6.el7 (Clark Williams) [1212083 1211724]
- xfs: Disable percpu SB on PREEMPT_RT_FULL (Steven Rostedt) [1223955 1223089]
kernel-rt-doc-3.10.0-229.4.2.rt56.141.6.el7_1.noarch [10.2 MiB] Changelog by Clark Williams (2015-04-27):
- [rt] kernel-rt-3.10.0-229.4.1.rt56.141.5.el7 (Clark Williams) [1209963 1209190]
kernel-rt-doc-3.10.0-229.1.2.rt56.141.2.el7_1.noarch [10.2 MiB] Changelog by Clark Williams (2015-03-23):
- [rt] rebase to 1.2 zstream (Clark Williams) [1200897]
kernel-rt-doc-3.10.0-229.rt56.141.el7.noarch [10.2 MiB] Changelog by Clark Williams (2015-02-11):
- [rt] mce: fixed RHEL-RT mis-merge with mce cleanup commit [1191668]

Listing created by repoview