Skip to content

CentOS 7 - RealTime for x86_64: Letter K: kernel-rt-trace-kvm

kernel-rt-trace-kvm - KVM modules for package kernel-rt-trace

Website: http://www.kernel.org/
License: GPLv2
Vendor: Scientific Linux CERN, https://cern.ch/linux
Description:
This package provides KVM modules for package kernel-rt-trace.

Packages

kernel-rt-trace-kvm-3.10.0-1127.13.1.rt56.1110.el7.x86_64 [8.4 MiB] Changelog by Luis Claudio R. Goncalves (2020-06-15):
- [rt] Update source tree to match RHEL rhel-7.8.z tree [1844620 1708718]
- [x86] x86/speculation: Support old struct x86_cpu_id & x86_match_cpu() kABI (Waiman Long) [1827187 1827188] {CVE-2020-0543}
- [documentation] x86/speculation: Add Ivy Bridge to affected list (Waiman Long) [1827187 1827188] {CVE-2020-0543}
- [documentation] x86/speculation: Add SRBDS vulnerability and mitigation documentation (Waiman Long) [1827187 1827188] {CVE-2020-0543}
- [x86] x86/speculation: Add Special Register Buffer Data Sampling (SRBDS) mitigation (Waiman Long) [1827187 1827188] {CVE-2020-0543}
- [x86] x86/cpu: Add 'table' argument to cpu_matches() (Waiman Long) [1827187 1827188] {CVE-2020-0543}
- [x86] x86/cpu: Add a steppings field to struct x86_cpu_id (Waiman Long) [1827187 1827188] {CVE-2020-0543}
- [x86] x86/cpu/bugs: Convert to new matching macros (Waiman Long) [1827187 1827188] {CVE-2020-0543}
- [x86] x86/cpu: Add consistent CPU match macros (Waiman Long) [1827187 1827188] {CVE-2020-0543}
- [cpufreq] x86/devicetable: Move x86 specific macro out of generic code (Waiman Long) [1827187 1827188] {CVE-2020-0543}
- [x86] x86/cpufeature: Fix various quality problems in the <asm/cpu_device_hd.h> header (Waiman Long) [1827187 1827188] {CVE-2020-0543}
kernel-rt-trace-kvm-3.10.0-1127.10.1.rt56.1106.el7.x86_64 [8.4 MiB] Changelog by Tom Rix (2020-05-27):
- [rt] Update source tree to match RHEL rhel-7.8.z tree [1829593 1708718]
- [fs] revert "[fs] xfs: catch bad stripe alignment configurations" (Carlos Maiolino) [1839697 1836292]
- [netdrv] hv_netvsc: Fix error handling in netvsc_set_features() (Mohammed Gamal) [1838600 1821814]
- [netdrv] hv_netvsc: Sync offloading features to VF NIC (Mohammed Gamal) [1838600 1821814]
- [netdrv] hv_netvsc: Fix IP header checksum for coalesced packets (Mohammed Gamal) [1838600 1821814]
- [netdrv] hv_netvsc: Fix rndis_per_packet_info internal field initialization (Mohammed Gamal) [1838600 1821814]
- [netdrv] hv_netvsc: Add handler for LRO setting change (Mohammed Gamal) [1838600 1821814]
- [netdrv] hv_netvsc: Add support for LRO/RSC in the vSwitch (Mohammed Gamal) [1838600 1821814]
- [netdrv] hv_netvsc: Add handlers for ethtool get/set msg level (Mohammed Gamal) [1838600 1821814]
- [netdrv] hv_netvsc: Fix the variable sizes in ipsecv2 and rsc offload (Mohammed Gamal) [1838600 1821814]
- [lib] kobject: don't use WARN for registration failures (Ewan Milne) [1836890 1756495]
- [lib] lib/kobject: Join string literals back (Ewan Milne) [1836890 1756495]
- [scsi] Fix abort timeouts in CQ Full conditions (Dick Kennedy) [1835675 1802654]
kernel-rt-trace-kvm-3.10.0-1127.8.2.rt56.1103.el7.x86_64 [8.4 MiB] Changelog by Luis Claudio R. Goncalves (2020-05-08):
- [rt] Update source tree to match RHEL rhel-7.8.z tree [1812282 1708718]
- [net] netlabel: cope with NULL catmap (Paolo Abeni) [1827239 1827241] {CVE-2020-10711}
kernel-rt-trace-kvm-3.10.0-1127.rt56.1093.el7.x86_64 [8.4 MiB] Changelog by Tom Rix (2020-02-19):
- [rt] Update source tree to match RHEL rhel-7.8 tree [1708718]
- [fs] flexfiles: Don't tie up all the rpciod threads in resends (Benjamin Coddington) [1778963]
kernel-rt-trace-kvm-3.10.0-1062.18.1.rt56.1044.el7.x86_64 [8.2 MiB] Changelog by Tom Rix (2020-02-13):
- [rt] Update source tree to match RHEL rhel-7.7.z tree [1794131 1708718]
- [rt] For RHEL compatiblity, add macros for qread_lock to read_lock (Tom Rix)
- [x86] x86/boot/64: Round memory hole size up to next PMD page (Frank Ramsay) [1798163 1773762]
- [x86] x86/boot/64: Make level2_kernel_pgt pages invalid outside kernel area (Frank Ramsay) [1798163 1773762]
- [fs] gfs2: Use d_materialise_unique instead of d_splice_alias (2) (Andreas Grunbacher) [1796431 1784550]
- [fs] gfs2: gfs2_create_inode(): don't bother with d_splice_alias() (Andreas Grunbacher) [1796431 1784550]
- [fs] gfs2: bugger off early if O_CREAT open finds a directory (Andreas Grunbacher) [1796431 1784550]
- [scsi] scsi: hpsa: remove printing internal cdb on tag collision (Joseph Szczypek) [1793579 1741355]
- [scsi] scsi: hpsa: correct scsi command status issue after reset (Joseph Szczypek) [1793579 1741355]
- [infiniband] IB/mlx5: Fix MR registration flow to use UMR properly (Alaa Hleihel) [1792371 1741343]
- [scsi] qedf: Initialize rport while creation of vport (Nilesh Javali) [1791825 1760746]
- [scsi] scsi: hpsa: add missing hunks in reset-patch (Joseph Szczypek) [1791782 1761978]
- [block] block: don't change REQ_NR_BITS (Ming Lei) [1791781 1779712]
- [scsi] scsi: qla2xxx: Fix panic in qla_dfs_tgt_counters_show (Himanshu Madhani) [1791595 1729270]
- [drm] drm/radeon: fix si_enable_smc_cac() failed issue (Dave Airlie) [1789744 1780026]
- [scsi] scsi: bnx2fc: timeout calculation invalid for bnx2fc_eh_abort() (Nilesh Javali) [1784824 1772966]
- [md] md/raid10: prevent access of uninitialized resync_pages offset (Nigel Croxon) [1781584 1767935]
- [fs] fix inode leaks on d_splice_alias() failure exits (Miklos Szeredi) [1781159 1749390]
- [fs] cachefiles: Fix page leak in cachefiles_read_backing_file while vmscan is active (David Howells) [1780149 1765975]
- [mm] mm: swap: clean up swap readahead (Rafael Aquini) [1780035 1725396]
- [mm] mm: do_swap_page: clean up parameter list passing a pointer to struct vm_fault (Rafael Aquini) [1780035 1725396]
- [mm] mm: __handle_mm_fault: introduce explicit barrier after orig_pte dereference (Rafael Aquini) [1780035 1725396]
- [x86] kvm: vmx: use MSR_IA32_TSX_CTRL to hard-disable TSX on guest that lack it (Paolo Bonzini) [1779766 1779768]
- [x86] kvm: vmx: implement MSR_IA32_TSX_CTRL disable RTM functionality (Paolo Bonzini) [1779766 1779768] {CVE-2019-19338}
- [x86] kvm: x86: Mark expected switch fall-throughs (Paolo Bonzini) [1779766 1779768] {CVE-2019-19338}
- [x86] kvm: x86: implement MSR_IA32_TSX_CTRL effect on CPUID (Paolo Bonzini) [1779766 1779768] {CVE-2019-19338}
- [x86] kvm: x86: do not modify masked bits of shared MSRs (Paolo Bonzini) [1779766 1779768] {CVE-2019-19338}
- [x86] kvm: x86: fix presentation of TSX feature in ARCH_CAPABILITIES (Paolo Bonzini) [1779766 1779768] {CVE-2019-19338}
- [x86] kvm/x86: Export MDS_NO=0 to guests when TSX is enabled (Paolo Bonzini) [1779766 1779768] {CVE-2019-19338}
- [s390] scsi: zfcp: fix reaction on bit error threshold notification (Philipp Rudo) [1778691 1765123]
- [net] ipv6: Rewind hlist offset on interrupted /proc/net/if_inet6 read (Stefano Brivio) [1778084 1753480]
- [net] revert "[net] ipv6: Display all addresses in output of /proc/net/if_inet6" (Stefano Brivio) [1778084 1753480]
- [wireless] rtlwifi: Fix potential overflow on P2P code (Josef Oskera) [1775235 1775236] {CVE-2019-17666}
- [md] md: improve handling of bio with REQ_PREFLUSH in md_flush_request() (Xiao Ni) [1773482 1752061]
- [fs] fscache: Don't use a constructor function on the slab allocator (David Howells) [1793086 1739996]
- [mm] mm: fix insert_pfn regression (Jeff Moyer) [1793088 1739889]
- [mm] mm/page_idle.c: fix oops because end_pfn is larger than max_pfn (Rafael Aquini) [1768386 1730471]
- [mm] mm/mlock.c: mlockall error for flag MCL_ONFAULT (Rafael Aquini) [1768386 1730471]
- [mm] hugetlb: use same fault hash key for shared and private mappings (Rafael Aquini) [1768386 1730471]
- [mm] hugetlbfs: on restore reserve error path retain subpool reservation (Rafael Aquini) [1768386 1730471]
- [mm] mm/memory.c: fix modifying of page protection by insert_pfn() (Rafael Aquini) [1768386 1730471]
- [mm] mm, swap: bounds check swap_info array accesses to avoid NULL derefs (Rafael Aquini) [1768386 1730471]
- [mm] mm/slub.c: remove an unused addr argument (Rafael Aquini) [1768386 1730471]
- [mm] hugetlbfs: fix races and page leaks during migration (Rafael Aquini) [1768386 1730471]
- [mm] mm, oom: fix use-after-free in oom_kill_process (Rafael Aquini) [1768386 1730471]
- [mm] percpu: convert spin_lock_irq to spin_lock_irqsave (Rafael Aquini) [1768386 1730471]
- [mm] mm/swapfile.c: use kvzalloc for swap_info_struct allocation (Rafael Aquini) [1768386 1730471]
- [mm] hugetlbfs: fix kernel BUG at fs/hugetlbfs/inode.c:444! (Rafael Aquini) [1768386 1730471]
- [mm] mm: Fix warning in insert_pfn() (Rafael Aquini) [1768386 1730471]
- [mm] hugetlbfs: dirty pages as they are added to pagecache (Rafael Aquini) [1768386 1730471]
- [mm] mm/swapfile.c: fix swap_count comment about nonexistent SWAP_HAS_CONT (Rafael Aquini) [1768386 1730471]
- [mm] slab: __GFP_ZERO is incompatible with a constructor (Rafael Aquini) [1768386 1730471]
- [mm] mm: fix the NULL mapping case in __isolate_lru_page() (Rafael Aquini) [1768386 1730471]
- [mm] mm/filemap.c: fix NULL pointer in page_cache_tree_insert() (Rafael Aquini) [1768386 1730471]
- [fs] block_invalidatepage(): only release page if the full page was invalidated (Rafael Aquini) [1768386 1730471]
- [mm] mm/mempolicy.c: avoid use uninitialized preferred_node (Rafael Aquini) [1768386 1730471]
- [mm] mm: pin address_space before dereferencing it while isolating an LRU page (Rafael Aquini) [1768386 1730471]
- [fs] fs/hugetlbfs/inode.c: change put_page/unlock_page order in hugetlbfs_fallocate() (Rafael Aquini) [1768386 1730471]
- [mm] mm: do not rely on preempt_count in print_vma_addr (Rafael Aquini) [1768386 1730471]
- [mm] mm, swap: fix race between swap count continuation operations (Rafael Aquini) [1768386 1730471]
- [mm] mm: meminit: mark init_reserved_page as __meminit (Rafael Aquini) [1768386 1730471]
- [mm] mm/vmstat.c: fix wrong comment (Rafael Aquini) [1768386 1730471]
- [mm] mm, hugetlb: do not allocate non-migrateable gigantic pages from movable zones (Rafael Aquini) [1768386 1730471]
- [mm] mm: always flush VMA ranges affected by zap_page_range (Rafael Aquini) [1768386 1730471]
- [mm] mm/mremap: fail map duplication attempts for private mappings (Rafael Aquini) [1768386 1730471]
- [mm] mm/mmap.c: do not blow on PROT_NONE MAP_FIXED holes in the stack (Rafael Aquini) [1768386 1730471]
- [mm] mm: numa: avoid waiting on freed migrated pages (Rafael Aquini) [1768386 1730471]
- [mm] mm/memory-failure.c: use compound_head() flags for huge pages (Rafael Aquini) [1768386 1730471]
- [fs] fs/block_dev: always invalidate cleancache in invalidate_bdev() (Rafael Aquini) [1768386 1730471]
- [mm] percpu: remove unused chunk_alloc parameter from pcpu_get_pages() (Rafael Aquini) [1768386 1730471]
- [mm] percpu: acquire pcpu_lock when updating pcpu_nr_empty_pop_pages (Rafael Aquini) [1768386 1730471]
- [mm] mm: do not access page->mapping directly on page_endio (Rafael Aquini) [1768386 1730471]
- [mm] mm/page_alloc: fix nodes for reclaim in fast path (Rafael Aquini) [1768386 1730471]
- [mm] mm: alloc_contig_range: allow to specify GFP mask (Rafael Aquini) [1768386 1730471]
- [mm] mm: vmscan: scan dirty pages even in laptop mode (Rafael Aquini) [1768386 1730471]
- [mm] mm/mempolicy.c: do not put mempolicy before using its nodemask (Rafael Aquini) [1768386 1730471]
- [mm] mm: fix set pageblock migratetype in deferred struct page init (Rafael Aquini) [1768386 1730471]
- [mm] mm: delete unnecessary and unsafe init_tlb_ubc() (Rafael Aquini) [1768386 1730471]
- [kernel] mm, mempolicy: task->mempolicy must be NULL before dropping final reference (Rafael Aquini) [1768386 1730471]
- [mm] mm: use phys_addr_t for reserve_bootmem_region() arguments (Rafael Aquini) [1768386 1730471]
- [mm] mm/huge_memory: replace VM_NO_THP VM_BUG_ON with actual VMA check (Rafael Aquini) [1768386 1730471]
- [mm] mm: soft-offline: check return value in second __get_any_page() call (Rafael Aquini) [1768386 1730471]
- [include] include/linux/memblock.h: fix ordering of 'flags' argument in comments (Rafael Aquini) [1768386 1730471]
- [mm] rmap: fix theoretical race between do_wp_page and shrink_active_list (Rafael Aquini) [1768386 1730471]
- [mm] mm/mremap.c: clean up goto just return ERR_PTR (Rafael Aquini) [1768386 1730471]
- [mm] mremap should return -ENOMEM when __vm_enough_memory fail (Rafael Aquini) [1768386 1730471]
- [mm] writeback: fix possible underflow in write bandwidth calculation (Rafael Aquini) [1768386 1730471]
- [mm] writeback: add missing INITIAL_JIFFIES init in global_update_bandwidth() (Rafael Aquini) [1768386 1730471]
- [mm] mm/memory.c: actually remap enough memory (Rafael Aquini) [1768386 1730471]
- [mm] mm/compaction: fix wrong order check in compact_finished() (Rafael Aquini) [1768386 1730471]
- [mm] mm, vmscan: prevent kswapd livelock due to pfmemalloc-throttled process being killed (Rafael Aquini) [1768386 1730471]
- [mm] mm: fix anon_vma_clone() error treatment (Rafael Aquini) [1768386 1730471]
- [mm] mm, thp: fix collapsing of hugepages on madvise (Rafael Aquini) [1768386 1730471]
- [mm] cgroup/kmemleak: add kmemleak_free() for cgroup deallocations (Rafael Aquini) [1768386 1730471]
- [mm] OOM, PM: OOM killed task shouldn't escape PM suspend (Rafael Aquini) [1768386 1730471]
- [mm] mm, compaction: pass gfp mask to compact_control (Rafael Aquini) [1768386 1730471]
- [mm] mm: page_alloc: abort fair zone allocation policy when remotes nodes are encountered (Rafael Aquini) [1768386 1730471]
- [mm] mm: vmscan: only update per-cpu thresholds for online CPU (Rafael Aquini) [1768386 1730471]
- [mm] mm, thp: replace smp_mb after atomic_add by smp_mb__after_atomic (Rafael Aquini) [1768386 1730471]
- [mm] mm, thp: move invariant bug check out of loop in __split_huge_page_map (Rafael Aquini) [1768386 1730471]
- [mm] thp: consolidate assert checks in __split_huge_page() (Rafael Aquini) [1768386 1730471]
- [mm] mm: fix sleeping function warning from __put_anon_vma (Rafael Aquini) [1768386 1730471]
- [mm] mm: cleanup add_to_page_cache_locked() (Rafael Aquini) [1768386 1730471]
- [mm] mm: mempolicy: turn vma_set_policy() into vma_dup_policy() (Rafael Aquini) [1768386 1730471]
- [powerpc] powerpc/pseries: correctly track irq state in default idle (Steve Best) [1767620 1751970]
- [mm] mm: prevent get_user_pages() from overflowing page refcount (Aristeu Rozanski) [1705004 1705005] {CVE-2019-11487}
- [mm] mm/hugetlb.c: __get_user_pages ignores certain follow_hugetlb_page errors (Aristeu Rozanski) [1705004 1705005] {CVE-2019-11487}
kernel-rt-trace-kvm-3.10.0-1062.12.1.rt56.1042.el7.x86_64 [8.2 MiB] Changelog by Tom Rix (2020-01-21):
- [rt] Update source tree to match RHEL rhel-7.7.z tree [1780322 1708718] (Tom Rix) [1780322 1708718]
- [rt] Update source tree to match RHEL rhel-7.7.z tree [1780322 1708718] (Tom Rix) [1780322 1708718]
- [rt] : Change ifdef to CONFIG_PREEMPT_RT_FULL (Tom Rix) [1781157 1772894]
kernel-rt-trace-kvm-3.10.0-1062.9.1.rt56.1033.el7.x86_64 [8.2 MiB] Changelog by Luis Claudio R. Goncalves (2019-12-02):
- [rt] Update source tree to match RHEL rhel-7.7.z tree [1740918 1708718]
- [kernel] sched: Fix race between task_group and sched_task_group (Oleksandr Natalenko) [1778545 1738415]
kernel-rt-trace-kvm-3.10.0-1062.7.1.rt56.1030.el7.x86_64 [8.2 MiB] Changelog by Luis Claudio R. Goncalves (2019-11-14):
- [rt] Update source tree to match RHEL rhel-7.7.z tree [1740918 1708718]
- [rt] sched: Call idle_balance() from finish_task_switch() (Scott Wood) [1743328]
- [drm] drm/i915/cmdparser: Fix jump whitelist clearing (Dave Airlie) [1756882 1756883] {CVE-2019-0155}
- [drm] drm/i915: Lower RM timeout to avoid DSI hard hangs (Dave Airlie) [1756815 1756816] {CVE-2019-0154}
- [drm] drm/i915/gen8+: Add RC6 CTX corruption WA (Dave Airlie) [1756815 1756816] {CVE-2019-0154}
- [drm] drm/i915/cmdparser: Ignore Length operands during command matching (Dave Airlie) [1756882 1756883] {CVE-2019-0155}
- [drm] drm/i915/cmdparser: Add support for backward jumps (Dave Airlie) [1756882 1756883] {CVE-2019-0155}
- [drm] drm/i915/cmdparser: Use explicit goto for error paths (Dave Airlie) [1756882 1756883] {CVE-2019-0155}
- [drm] drm/i915: Add gen9 BCS cmdparsing (Dave Airlie) [1756882 1756883] {CVE-2019-0155}
- [drm] drm/i915: Allow parsing of unsized batches (Dave Airlie) [1756882 1756883] {CVE-2019-0155}
- [drm] drm/i915: Support ro ppgtt mapped cmdparser shadow buffers (Dave Airlie) [1756882 1756883] {CVE-2019-0155}
- [drm] drm/i915: Add support for mandatory cmdparsing (Dave Airlie) [1756882 1756883] {CVE-2019-0155}
- [drm] drm/i915: Remove Master tables from cmdparser (Dave Airlie) [1756882 1756883] {CVE-2019-0155}
- [drm] drm/i915: Disable Secure Batches for gen6+ (Dave Airlie) [1756882 1756883] {CVE-2019-0155}
- [drm] drm/i915: Rename gen7 cmdparser tables (Dave Airlie) [1756882 1756883] {CVE-2019-0155}
- [x86] tsx: Add config options to set tsx=on|off|auto (Waiman Long) [1766539 1766540] {CVE-2019-11135}
- [documentation] x86/speculation/taa: Add documentation for TSX Async Abort (Waiman Long) [1766539 1766540] {CVE-2019-11135}
- [x86] tsx: Add "auto" option to the tsx= cmdline parameter (Waiman Long) [1766539 1766540] {CVE-2019-11135}
- [x86] speculation/taa: Add sysfs reporting for TSX Async Abort (Waiman Long) [1766539 1766540] {CVE-2019-11135}
- [x86] speculation/taa: Add mitigation for TSX Async Abort (Waiman Long) [1766539 1766540] {CVE-2019-11135}
- [x86] cpu: Add a "tsx=" cmdline option with TSX disabled by default (Waiman Long) [1766539 1766540] {CVE-2019-11135}
- [x86] cpu: Add a helper function x86_read_arch_cap_msr() (Waiman Long) [1766539 1766540] {CVE-2019-11135}
- [x86] msr: Add the IA32_TSX_CTRL MSR (Waiman Long) [1766539 1766540] {CVE-2019-11135}
- [documentation] documentation: Add ITLB_MULTIHIT documentation (Paolo Bonzini) [1733009 1690343] {CVE-2018-12207}
- [x86] kvm: x86: mmu: Recovery of shattered NX large pages (Paolo Bonzini) [1733009 1690343] {CVE-2018-12207}
- [virt] kvm: Add helper function for creating VM worker threads (Paolo Bonzini) [1733009 1690343] {CVE-2018-12207}
- [x86] kvm: mmu: ITLB_MULTIHIT mitigation (Paolo Bonzini) [1733009 1690343] {CVE-2018-12207}
- [kernel] cpu/speculation: Uninline and export CPU mitigations helpers (Paolo Bonzini) [1733009 1690343] {CVE-2018-12207}
- [x86] cpu: Add Tremont to the cpu vulnerability whitelist (Paolo Bonzini) [1733009 1690343] {CVE-2018-12207}
- [x86] Add ITLB_MULTIHIT bug infrastructure (Paolo Bonzini) [1733009 1690343] {CVE-2018-12207}
- [x86] kvm: vmx, svm: always run with EFER.NXE=1 when shadow paging is active (Paolo Bonzini) [1733009 1690343] {CVE-2018-12207}
- [x86] kvm: x86: add tracepoints around __direct_map and FNAME(fetch) (Paolo Bonzini) [1733009 1690343] {CVE-2018-12207}
- [x86] kvm: x86: change kvm_mmu_page_get_gfn BUG_ON to WARN_ON (Paolo Bonzini) [1733009 1690343] {CVE-2018-12207}
- [x86] kvm: x86: remove now unneeded hugepage gfn adjustment (Paolo Bonzini) [1733009 1690343] {CVE-2018-12207}
- [x86] kvm: x86: make FNAME(fetch) and __direct_map more similar (Paolo Bonzini) [1733009 1690343] {CVE-2018-12207}
- [x86] kvm: mmu: Do not release the page inside mmu_set_spte() (Paolo Bonzini) [1733009 1690343] {CVE-2018-12207}
- [x86] kvm: x86: mmu: Remove unused parameter of __direct_map() (Paolo Bonzini) [1733009 1690343] {CVE-2018-12207}
- [virt] kvm: Convert kvm_lock to a mutex (Paolo Bonzini) [1733009 1690343] {CVE-2018-12207}
- [x86] kvm: mmu: drop vcpu param in gpte_access (Paolo Bonzini) [1733009 1690343] {CVE-2018-12207}
- [virt] kvm: x86, powerpc: do not allow clearing largepages debugfs entry (Paolo Bonzini) [1733009 1690343] {CVE-2018-12207}
- [kernel] sched/fair: Fix endless loop in idle_balance() (Phil Auld) [1766087 1740941]
- [kernel] sched: Skip double execution of pick_next_task_fair() (Phil Auld) [1766098 1750819]
- [kernel] sched/fair: Prevent throttling in early pick_next_task_fair() (Phil Auld) [1756267 1740038]
- [kernel] sched: Check for stop task appearance when balancing happens (Phil Auld) [1756267 1740038]
- [kernel] sched/core: Fix endless loop in pick_next_task() (Phil Auld) [1756267 1740038]
- [kernel] sched/fair: Push down check for high priority class task into idle_balance() (Phil Auld) [1756267 1740038]
- [kernel] sched/rt: Fix picking RT and DL tasks from empty queue (Phil Auld) [1756267 1740038]
- [kernel] sched/core: Allow __sched_setscheduler() in interrupts when PI is not used (Phil Auld) [1756265 1722234]
- [kernel] sched, dl: Convert switched_{from, to}_dl() / prio_changed_dl() to balance callbacks (Phil Auld) [1756265 1722234]
- [kernel] sched,dl: Remove return value from pull_dl_task() (Phil Auld) [1756265 1722234]
- [kernel] sched, rt: Convert switched_{from, to}_rt() / prio_changed_rt() to balance callbacks (Phil Auld) [1756265 1722234]
- [kernel] sched,rt: Remove return value from pull_rt_task() (Phil Auld) [1756265 1722234]
- [kernel] sched: Allow balance callbacks for check_class_changed() (Phil Auld) [1756265 1722234]
- [kernel] sched: Use replace normalize_task() with __sched_setscheduler() (Phil Auld) [1756265 1722234]
- [kernel] sched: Handle priority boosted tasks proper in setscheduler() (Phil Auld) [1756265 1722234]
- [kernel] sched: Fix broken setscheduler() (Phil Auld) [1756265 1722234]
- [kernel] sched: Consider pi boosting in setscheduler() (Phil Auld) [1756265 1722234]
- [kernel] sched: Replace post_schedule with a balance callback list (Phil Auld) [1756265 1722234]
- [kernel] sched: Guarantee task priority in pick_next_task() (Phil Auld) [1756265 1722234]
- [kernel] sched: Remove some #ifdeffery (Phil Auld) [1756265 1722234]
- [kernel] sched: Clean up idle task SMP logic (Phil Auld) [1756265 1722234]
- [kernel] sched: Fix hotplug task migration (Phil Auld) [1756265 1722234]
- [kernel] sched/fair: Remove idle_balance() declaration in sched.h (Phil Auld) [1756265 1722234]
- [kernel] sched: Push down pre_schedule() and idle_balance() (Phil Auld) [1756265 1722234]
- [kernel] sched/fair: Optimize cgroup pick_next_task_fair() (Phil Auld) [1756265 1722234]
- [kernel] sched/fair: Clean up the __clear_buddies_*() functions (Phil Auld) [1756265 1722234]
- [kernel] sched: Push put_prev_task() into pick_next_task() (Phil Auld) [1756265 1722234]
- [kernel] sched: Move rq->idle_stamp up to the core (Phil Auld) [1756265 1722234]
- [kernel] sched: Fix race in idle_balance() (Phil Auld) [1756265 1722234]
- [kernel] sched: Remove 'cpu' parameter from idle_balance() (Phil Auld) [1756265 1722234]
- [kernel] sched/fair: Reset se-depth when task switched to FAIR (Phil Auld) [1756265 1722234]
- [kernel] sched/fair: Track cgroup depth (Phil Auld) [1756265 1722234]
kernel-rt-trace-kvm-3.10.0-1062.4.3.rt56.1029.el7.x86_64 [8.2 MiB] Changelog by Luis Claudio R. Goncalves (2019-11-12):
- [rt] Update source tree to match RHEL rhel-7.7.z tree [1740918 1708718]
- [drm] drm/i915/cmdparser: Fix jump whitelist clearing (Dave Airlie) [1756882 1756883] {CVE-2019-0155}
kernel-rt-trace-kvm-3.10.0-1062.4.2.rt56.1028.el7.x86_64 [8.2 MiB] Changelog by Luis Claudio R. Goncalves (2019-11-06):
- [rt] Update source tree to match RHEL rhel-7.7.z tree [1740918 1708718]
- [drm] drm/i915: Lower RM timeout to avoid DSI hard hangs (Dave Airlie) [1756815 1756816] {CVE-2019-0154}
- [drm] drm/i915/gen8+: Add RC6 CTX corruption WA (Dave Airlie) [1756815 1756816] {CVE-2019-0154}
- [drm] drm/i915/cmdparser: Ignore Length operands during command matching (Dave Airlie) [1756882 1756883] {CVE-2019-0155}
- [drm] drm/i915/cmdparser: Add support for backward jumps (Dave Airlie) [1756882 1756883] {CVE-2019-0155}
- [drm] drm/i915/cmdparser: Use explicit goto for error paths (Dave Airlie) [1756882 1756883] {CVE-2019-0155}
- [drm] drm/i915: Add gen9 BCS cmdparsing (Dave Airlie) [1756882 1756883] {CVE-2019-0155}
- [drm] drm/i915: Allow parsing of unsized batches (Dave Airlie) [1756882 1756883] {CVE-2019-0155}
- [drm] drm/i915: Support ro ppgtt mapped cmdparser shadow buffers (Dave Airlie) [1756882 1756883] {CVE-2019-0155}
- [drm] drm/i915: Add support for mandatory cmdparsing (Dave Airlie) [1756882 1756883] {CVE-2019-0155}
- [drm] drm/i915: Remove Master tables from cmdparser (Dave Airlie) [1756882 1756883] {CVE-2019-0155}
- [drm] drm/i915: Disable Secure Batches for gen6+ (Dave Airlie) [1756882 1756883] {CVE-2019-0155}
- [drm] drm/i915: Rename gen7 cmdparser tables (Dave Airlie) [1756882 1756883] {CVE-2019-0155}
- [x86] tsx: Add config options to set tsx=on|off|auto (Waiman Long) [1766539 1766540] {CVE-2019-11135}
- [documentation] x86/speculation/taa: Add documentation for TSX Async Abort (Waiman Long) [1766539 1766540] {CVE-2019-11135}
- [x86] tsx: Add "auto" option to the tsx= cmdline parameter (Waiman Long) [1766539 1766540] {CVE-2019-11135}
- [x86] speculation/taa: Add sysfs reporting for TSX Async Abort (Waiman Long) [1766539 1766540] {CVE-2019-11135}
- [x86] speculation/taa: Add mitigation for TSX Async Abort (Waiman Long) [1766539 1766540] {CVE-2019-11135}
- [x86] cpu: Add a "tsx=" cmdline option with TSX disabled by default (Waiman Long) [1766539 1766540] {CVE-2019-11135}
- [x86] cpu: Add a helper function x86_read_arch_cap_msr() (Waiman Long) [1766539 1766540] {CVE-2019-11135}
- [x86] msr: Add the IA32_TSX_CTRL MSR (Waiman Long) [1766539 1766540] {CVE-2019-11135}
- [documentation] documentation: Add ITLB_MULTIHIT documentation (Paolo Bonzini) [1733009 1690343] {CVE-2018-12207}
- [x86] kvm: x86: mmu: Recovery of shattered NX large pages (Paolo Bonzini) [1733009 1690343] {CVE-2018-12207}
- [virt] kvm: Add helper function for creating VM worker threads (Paolo Bonzini) [1733009 1690343] {CVE-2018-12207}
- [x86] kvm: mmu: ITLB_MULTIHIT mitigation (Paolo Bonzini) [1733009 1690343] {CVE-2018-12207}
- [kernel] cpu/speculation: Uninline and export CPU mitigations helpers (Paolo Bonzini) [1733009 1690343] {CVE-2018-12207}
- [x86] cpu: Add Tremont to the cpu vulnerability whitelist (Paolo Bonzini) [1733009 1690343] {CVE-2018-12207}
- [x86] Add ITLB_MULTIHIT bug infrastructure (Paolo Bonzini) [1733009 1690343] {CVE-2018-12207}
- [x86] kvm: vmx, svm: always run with EFER.NXE=1 when shadow paging is active (Paolo Bonzini) [1733009 1690343] {CVE-2018-12207}
- [x86] kvm: x86: add tracepoints around __direct_map and FNAME(fetch) (Paolo Bonzini) [1733009 1690343] {CVE-2018-12207}
- [x86] kvm: x86: change kvm_mmu_page_get_gfn BUG_ON to WARN_ON (Paolo Bonzini) [1733009 1690343] {CVE-2018-12207}
- [x86] kvm: x86: remove now unneeded hugepage gfn adjustment (Paolo Bonzini) [1733009 1690343] {CVE-2018-12207}
- [x86] kvm: x86: make FNAME(fetch) and __direct_map more similar (Paolo Bonzini) [1733009 1690343] {CVE-2018-12207}
- [x86] kvm: mmu: Do not release the page inside mmu_set_spte() (Paolo Bonzini) [1733009 1690343] {CVE-2018-12207}
- [x86] kvm: x86: mmu: Remove unused parameter of __direct_map() (Paolo Bonzini) [1733009 1690343] {CVE-2018-12207}
- [virt] kvm: Convert kvm_lock to a mutex (Paolo Bonzini) [1733009 1690343] {CVE-2018-12207}
- [x86] kvm: mmu: drop vcpu param in gpte_access (Paolo Bonzini) [1733009 1690343] {CVE-2018-12207}
- [virt] kvm: x86, powerpc: do not allow clearing largepages debugfs entry (Paolo Bonzini) [1733009 1690343] {CVE-2018-12207}
kernel-rt-trace-kvm-3.10.0-1062.4.1.rt56.1027.el7.x86_64 [8.2 MiB] Changelog by Luis Claudio R. Goncalves (2019-09-25):
- [rt] Update source tree to match RHEL rhel-7.7.z tree [1740918 1708718]
- [vhost] vhost: make sure log_num < in_num (Eugenio Perez) [1750879 1750880] {CVE-2019-14835}
kernel-rt-trace-kvm-3.10.0-1062.1.2.rt56.1025.el7.x86_64 [8.2 MiB] Changelog by Luis Claudio R. Goncalves (2019-09-16):
- [rt] Update source tree to match RHEL rhel-7.7.z tree [1740918 1708718]
- [vhost] vhost: make sure log_num < in_num (Eugenio Perez) [1750879 1750880] {CVE-2019-14835}
kernel-rt-trace-kvm-3.10.0-1062.1.1.rt56.1024.el7.x86_64 [8.2 MiB] Changelog by Luis Claudio R. Goncalves (2019-08-14):
- [rt] timers: condense pending bitmap information (Marcelo Tosatti) [1690543 1550584]
- [rt] timers: do not raise softirq unconditionally (spinlockless version) (Marcelo Tosatti) [1690543 1550584]
- [rt] timers: raise timer softirq on __mod_timer/add_timer_on (Marcelo Tosatti) [1690543 1550584]
- [rt] Revert "tick: sched: Remove hrtimer_active() checks" (Marcelo Tosatti) [1699438 1690543 1550584]
kernel-rt-trace-kvm-3.10.0-1062.rt56.1022.el7.x86_64 [8.2 MiB] Changelog by Luis Claudio R. Goncalves (2019-07-18):
- [rt] Update source tree to match RHEL rhel-7.7 tree [1642619]
- [fs] revert "xfs: disable copy_file_range() to avoid broken splice copy" (Eric Sandeen) [1731205]
kernel-rt-trace-kvm-3.10.0-957.27.2.rt56.940.el7.x86_64 [7.5 MiB] Changelog by Luis Claudio R. Goncalves (2019-07-09):
- [rt] Update source tree to match RHEL 7.6.z tree [1718400 1642619]
- [x86] hyper-v: fix hyperv.h UAPI header (Vitaly Kuznetsov) [1727109 1692492]
- [iommu] hyper-v: Add Hyper-V stub IOMMU driver (Vitaly Kuznetsov) [1727109 1661654]
- [x86] hyper-v: Set x2apic destination mode to physical when x2apic is available (Vitaly Kuznetsov) [1727109 1661654]
- [x86] hyper-v: Consolidate code for converting cpumask to vpset (Vitaly Kuznetsov) [1727109 1661654]
- [x86] hyper-v: Fix the circular dependency in IPI enlightenment (Vitaly Kuznetsov) [1727109 1661654]
- [pci] hv: Refactor hv_irq_unmask() to use cpumask_to_vpset() (Vitaly Kuznetsov) [1727109 1661654]
- [pci] hv: Replace hv_vp_set with hv_vpset (Vitaly Kuznetsov) [1727109 1661654]
- [pci] hv: Add __aligned(8) to struct retarget_msi_interrupt (Vitaly Kuznetsov) [1727109 1661654]
- [hwmon] k10temp: Add support for AMD family 17h, model 30h CPUs (Gary Hook) [1728000 1643292]
- [x86] amd_nb: Add PCI device IDs for family 17h, model 30h (Gary Hook) [1728000 1643292]
- [x86] amd_nb: Add support for newer PCI topologies (Gary Hook) [1728000 1643292]
- [hwmon] k10temp, x86/amd_nb: Consolidate shared device IDs (Gary Hook) [1728000 1643292]
- [hwmon] (k10temp) Use API function to access System Management Network (Gary Hook) [1728000 1643292]
- [x86] amd_nb: Add support for Raven Ridge CPUs (Gary Hook) [1728000 1643292]
- [hwmon] (k10temp) Add support for AMD Ryzen w/ Vega graphics (Gary Hook) [1728000 1643292]
- [hwmon] (k10temp) Add temperature offset for Ryzen 2700X (Gary Hook) [1728000 1643292]
- [x86] cpu/amd: Apply the Erratum 688 fix when the BIOS doesn't (Gary Hook) [1728000 1643292]
kernel-rt-trace-kvm-3.10.0-957.21.3.rt56.935.el7.x86_64 [7.5 MiB] Changelog by Luis Claudio R. Goncalves (2019-06-14):
- [rt] Update source tree to match RHEL 7.6.z tree [1689417 1642619]
- [net] tcp: enforce tcp_min_snd_mss in tcp_mtu_probing() (Florian Westphal) [1719914 1719915] {CVE-2019-11479}
- [net] tcp: add tcp_min_snd_mss sysctl (Florian Westphal) [1719914 1719915] {CVE-2019-11479}
- [net] tcp: tcp_fragment() should apply sane memory limits (Florian Westphal) [1719849 1719850] {CVE-2019-11478}
- [net] tcp: limit payload size of sacked skbs (Florian Westphal) [1719594 1719595] {CVE-2019-11477}
- [net] tcp: pass previous skb to tcp_shifted_skb() (Florian Westphal) [1719594 1719595] {CVE-2019-11477}
kernel-rt-trace-kvm-3.10.0-957.21.2.rt56.934.el7.x86_64 [7.5 MiB] Changelog by Luis Claudio R. Goncalves (2019-05-28):
- [rt] Update source tree to match RHEL 7.6.z tree [1689417 1642619]
- [security] xattr: use RH_KABI_CONST to avoid security_inode_init_security checksum change (Cestmir Kalina) [1702286 1710633]
kernel-rt-trace-kvm-3.10.0-957.12.2.rt56.929.el7.x86_64 [7.5 MiB] Changelog by Luis Claudio R. Goncalves (2019-04-26):
- [rt] Update source tree to match RHEL 7.6.z tree [1689417 1642619]
- [x86] x86/speculation/mds: Add SMT warning message (Waiman Long) [1692597 1692598 1692599 1690335 1690348 1690358] {CVE-2018-12126 CVE-2018-12127 CVE-2018-12130}
- [x86] x86/speculation: Move arch_smt_update() call to after mitigation decisions (Waiman Long) [1692597 1692598 1692599 1690335 1690348 1690358] {CVE-2018-12126 CVE-2018-12127 CVE-2018-12130}
- [documentation] x86/speculation/mds: Add mds=full,nosmt cmdline option (Waiman Long) [1692597 1692598 1692599 1690335 1690348 1690358] {CVE-2018-12126 CVE-2018-12127 CVE-2018-12130}
- [kernel] x86/speculation: Remove redundant arch_smt_update() invocation (Waiman Long) [1692597 1692598 1692599 1690335 1690348 1690358] {CVE-2018-12126 CVE-2018-12127 CVE-2018-12130}
- [x86] x86/spec_ctrl: Update MDS mitigation status after late microcode load (Waiman Long) [1692597 1692598 1692599 1690335 1690348 1690358] {CVE-2018-12126 CVE-2018-12127 CVE-2018-12130}
- [x86] x86/spec_ctrl: Add debugfs x86/smt_present file (Waiman Long) [1692597 1692598 1692599 1690335 1690348 1690358] {CVE-2018-12126 CVE-2018-12127 CVE-2018-12130}
- [x86] x86/spec_ctrl: Disable automatic enabling of STIBP with SMT on (Waiman Long) [1692597 1692598 1692599 1690335 1690348 1690358] {CVE-2018-12126 CVE-2018-12127 CVE-2018-12130}
- [documentation] Documentation: Add MDS vulnerability documentation (Waiman Long) [1692597 1692598 1692599 1690335 1690348 1690358] {CVE-2018-12126 CVE-2018-12127 CVE-2018-12130}
- [documentation] Documentation: Move L1TF to separate directory (Waiman Long) [1692597 1692598 1692599 1690335 1690348 1690358] {CVE-2018-12126 CVE-2018-12127 CVE-2018-12130}
- [x86] x86/speculation/mds: Add mitigation mode VMWERV (Waiman Long) [1692597 1692598 1692599 1690335 1690348 1690358] {CVE-2018-12126 CVE-2018-12127 CVE-2018-12130}
- [base] x86/speculation/mds: Add sysfs reporting for MDS (Waiman Long) [1692597 1692598 1692599 1690335 1690348 1690358] {CVE-2018-12126 CVE-2018-12127 CVE-2018-12130}
- [x86] x86/speculation/mds: Add mitigation control for MDS (Waiman Long) [1692597 1692598 1692599 1690335 1690348 1690358] {CVE-2018-12126 CVE-2018-12127 CVE-2018-12130}
- [x86] x86/speculation/mds: Conditionally clear CPU buffers on idle entry (Waiman Long) [1692597 1692598 1692599 1690335 1690348 1690358] {CVE-2018-12126 CVE-2018-12127 CVE-2018-12130}
- [kvm] x86/kvm/vmx: Add MDS protection when L1D Flush is not active (Waiman Long) [1692597 1692598 1692599 1690335 1690348 1690358] {CVE-2018-12126 CVE-2018-12127 CVE-2018-12130}
- [x86] x86/speculation/mds: Clear CPU buffers on exit to user (Waiman Long) [1692597 1692598 1692599 1690335 1690348 1690358] {CVE-2018-12126 CVE-2018-12127 CVE-2018-12130}
- [x86] x86/speculation/mds: Add mds_clear_cpu_buffers() (Waiman Long) [1692597 1692598 1692599 1690335 1690348 1690358] {CVE-2018-12126 CVE-2018-12130 CVE-2018-12127}
- [kvm] x86/kvm: Expose X86_FEATURE_MD_CLEAR to guests (Waiman Long) [1692597 1692598 1692599 1690335 1690348 1690358] {CVE-2018-12126 CVE-2018-12127 CVE-2018-12130}
- [x86] x86/speculation/mds: Add BUG_MSBDS_ONLY (Waiman Long) [1692597 1692598 1692599 1690335 1690348 1690358] {CVE-2018-12126 CVE-2018-12127 CVE-2018-12130}
- [x86] x86/speculation/mds: Add basic bug infrastructure for MDS (Waiman Long) [1692597 1692598 1692599 1690335 1690348 1690358] {CVE-2018-12126 CVE-2018-12130 CVE-2018-12127}
- [x86] x86/speculation: Consolidate CPU whitelists (Waiman Long) [1692597 1692598 1692599 1690335 1690348 1690358] {CVE-2018-12126 CVE-2018-12127 CVE-2018-12130}
- [x86] x86/msr-index: Cleanup bit defines (Waiman Long) [1692597 1692598 1692599 1690335 1690348 1690358] {CVE-2018-12126 CVE-2018-12130 CVE-2018-12127}
- [x86] x86/l1tf: Show actual SMT state (Waiman Long) [1692597 1692598 1692599 1690335 1690348 1690358] {CVE-2018-12126 CVE-2018-12130 CVE-2018-12127}
- [x86] x86/speculation: Simplify sysfs report of VMX L1TF vulnerability (Waiman Long) [1692597 1692598 1692599 1690335 1690348 1690358] {CVE-2018-12126 CVE-2018-12130 CVE-2018-12127}
- [x86] x86/speculation: Rework SMT state change (Waiman Long) [1692597 1692598 1692599 1690335 1690348 1690358] {CVE-2018-12126 CVE-2018-12130 CVE-2018-12127}
- [kernel] sched/smt: Expose sched_smt_present static key (Waiman Long) [1692597 1692598 1692599 1690335 1690348 1690358] {CVE-2018-12126 CVE-2018-12130 CVE-2018-12127}
- [kernel] sched/smt: Make sched_smt_present track topology (Waiman Long) [1692597 1692598 1692599 1690335 1690348 1690358] {CVE-2018-12126 CVE-2018-12130 CVE-2018-12127}
- [x86] x86/speculation: Disable STIBP when enhanced IBRS is in use (Waiman Long) [1692597 1692598 1692599 1690335 1690348 1690358] {CVE-2018-12126 CVE-2018-12130 CVE-2018-12127}
- [x86] x86/speculation: Move STIPB/IBPB string conditionals out of cpu_show_common() (Waiman Long) [1692597 1692598 1692599 1690335 1690348 1690358] {CVE-2018-12126 CVE-2018-12127 CVE-2018-12130}
- [x86] x86/speculation: Enable cross-hyperthread spectre v2 STIBP mitigation (Waiman Long) [1692597 1692598 1692599 1690335 1690348 1690358] {CVE-2018-12126 CVE-2018-12127 CVE-2018-12130}
- [x86] x86/spectre_v2: Make spectre_v2_mitigation mode available (Waiman Long) [1692597 1692598 1692599 1690335 1690348 1690358] {CVE-2018-12126 CVE-2018-12127 CVE-2018-12130}
- [x86] x86/spec_ctrl: Add X86_FEATURE_USE_IBPB (Waiman Long) [1692597 1692598 1692599 1690335 1690348 1690358] {CVE-2018-12126 CVE-2018-12127 CVE-2018-12130}
- [x86] x86/spec_ctrl: Add casting to fix compilation error (Waiman Long) [1692597 1692598 1692599 1690335 1690348 1690358] {CVE-2018-12126 CVE-2018-12130 CVE-2018-12127}
- [x86] x86/cpu: Sanitize FAM6_ATOM naming (Waiman Long) [1692597 1692598 1692599 1690335 1690348 1690358] {CVE-2018-12126 CVE-2018-12130 CVE-2018-12127}
- [x86] x86/cpufeatures: Add Intel PCONFIG cpufeature (Waiman Long) [1692597 1692598 1692599 1690335 1690348 1690358] {CVE-2018-12126 CVE-2018-12130 CVE-2018-12127}
kernel-rt-trace-kvm-3.10.0-957.12.1.rt56.927.el7.x86_64 [7.5 MiB] Changelog by Luis Claudio R. Goncalves (2019-04-05):
- build: remove stale files from the -devel packages (v3) [1689417 1642619]
kernel-rt-trace-kvm-3.10.0-957.10.1.rt56.921.el7.x86_64 [7.5 MiB] Changelog by Luis Claudio R. Goncalves (2019-02-07):
- [rt] Update source tree to match RHEL 7.6.z tree [1672406 1642619]
- [fs] revert "[fs] nfs: Don't write back further requests if there is a pending write error" (Benjamin Coddington) [1672510 1656674]
- [fs] cifs: connect to servername instead of IP for IPC$ share (Leif Sahlberg) [1672448 1647844]
- [acpi] nfit: Fix command-supported detection (Charles Rose) [1671743 1665811]
- [acpi] nfit: Block function zero DSMs (Charles Rose) [1671743 1665811]
- [x86] efi-bgrt: Replace early_memremap() with memremap() (Lenny Szubowicz) [1671745 1481667]
- [x86] efi-bgrt: Replace ioremap() with early_memremap() (Lenny Szubowicz) [1671745 1481667]
- [scsi] libiscsi: Allow sd_shutdown on bad transport (Chris Leech) [1670680 1630979]
- [block] blk-mq: punt failed direct issue to dispatch list (Ming Lei) [1670511 1656654]
- [block] blk-mq: fix corruption with direct issue (Ming Lei) [1670511 1656654]
- [powerpc] rtas: Fix a potential race between CPU-Offline & Migration (Steve Best) [1669044 1650249]
- [powerpc] pseries: Disable CPU hotplug across migrations (Steve Best) [1669044 1650249]
- [md] Add split counter for raid1 write request in the right place (Xiao Ni) [1668208 1659951]
- [lib] string_helpers.c: fix infinite loop in string_get_size() (Ewan Milne) [1667989 1660565]
- [kernel] stop_machine: Atomically queue and wake stopper threads (Phil Auld) [1667328 1557061]
- [kernel] stop_machine: Disable preemption after queueing stopper threads (Phil Auld) [1667328 1557061]
- [kernel] stop_machine: Disable preemption when waking two stopper threads (Phil Auld) [1667328 1557061]
- [kernel] stop_machine, sched: Fix migrate_swap() vs. active_balance() deadlock (Phil Auld) [1667328 1557061]
- [kernel] stop_machine: Make cpu_stop_queue_work() and stop_one_cpu_nowait() return bool (Phil Auld) [1667328 1557061]
- [fs] proc: restrict kernel stack dumps to root (Joe Lawrence) [1642401 1638194] {CVE-2018-17972}
- [fs] proc: use "unsigned int" for /proc/*/stack (Joe Lawrence) [1642401 1638194] {CVE-2018-17972}
- [fs] libceph: fall back to sendmsg for slab pages (Ilya Dryomov) [1665814 1647460]
- [scsi] csiostor: remove flush_scheduled_work() (Arjun Vynipadath) [1665370 1660882]
- [pci] shpchp: Separate existence of SHPC and permission to use it (Myron Stowe) [1663241 1633873]
- [pci] shpchp: Manage SHPC unconditionally on non-ACPI systems (Myron Stowe) [1663241 1633873]
- [pci] shpchp: Fix AMD POGO identification (Myron Stowe) [1663241 1633873]
- [mm] memcontrol: factor out reclaim iterator loading and updating (Aristeu Rozanski) [1663114 1595932]
- [net] xfrm: policy: init locks early (Herbert Xu) [1660887 1641866]
- [kernel] mm: clear __GFP_FS when PF_MEMALLOC_NOIO is set (Rafael Aquini) [1660392 1657714]
- [nvme] flush namespace scanning work just before removing namespaces (Ewan Milne) [1659937 1622487]
- [fs] fuse: don't need GETATTR after every READ (Miklos Szeredi) [1657921 1648781]
- [fs] fuse: don't invalidate attrs when not using atime (Miklos Szeredi) [1657921 1648781]
- [net] Set sk_prot_creator when cloning sockets to the right proto (Andrea Claudi) [1657351 1657352] {CVE-2018-9568}
- [kernel] bpf: 32-bit RSH verification must truncate input before the ALU op (Jiri Olsa) [1641387 1641388] {CVE-2018-18445}
kernel-rt-trace-kvm-3.10.0-957.5.1.rt56.916.el7.x86_64 [7.4 MiB] Changelog by Luis Claudio R. Goncalves (2018-12-19):
- [rt] Update source tree to match RHEL 7.6.z tree [1653822 1642619]
- [fs] revert "[fs] sunrpc: Ensure we always close the socket after a connection shuts down" (Dave Wysochanski) [1660784 1657399]
kernel-rt-trace-kvm-3.10.0-957.1.3.rt56.913.el7.x86_64 [7.4 MiB] Changelog by Luis Claudio R. Goncalves (2018-11-15):
- [rt] Update source tree to match RHEL 7.6.z tree [1632386 1642619]
- [x86] Mark Intel Cascade Lake supported (Steve Best) [1650213 1639980]
kernel-rt-trace-kvm-3.10.0-957.rt56.910.el7.x86_64 [7.4 MiB] Changelog by Luis Claudio R. Goncalves (2018-10-04):
- [rt] disable CONFIG_PARAVIRT_DEBUG [1553351]
kernel-rt-trace-kvm-3.10.0-862.14.4.rt56.821.el7.x86_64 [6.6 MiB] Changelog by Luis Claudio R. Goncalves (2018-09-21):
- [rt] Update source tree to match RHEL 7.5 tree [1616429 1462329]
kernel-rt-trace-kvm-3.10.0-862.11.6.rt56.819.el7.x86_64 [6.6 MiB] Changelog by Luis Claudio R. Goncalves (2018-08-10):
- [rt] Update source tree to match RHEL 7.5 tree [1549768 1462329]
- [kernel] cpu/hotplug: Fix 'online' sysfs entry with 'nosmt' (Josh Poimboeuf) [1593383 1593384] {CVE-2018-3620}
kernel-rt-trace-kvm-3.10.0-862.6.3.rt56.811.el7.x86_64 [6.6 MiB] Changelog by Luis Claudio R. Goncalves (2018-06-18):
- [rt] Update source tree to match RHEL 7.5 tree [1549768 1462329]
- [x86] always enable eager FPU by default on non-AMD processors (Paolo Bonzini) [1589051 1589048] {CVE-2018-3665}
- [x86] bugs: Switch the selection of mitigation from CPU vendor to CPU features (Waiman Long) [1584323 1584569] {CVE-2018-3639}
- [x86] bugs: Add AMD's SPEC_CTRL MSR usage (Waiman Long) [1584323 1584569] {CVE-2018-3639}
- [x86] bugs: Add AMD's variant of SSB_NO (Waiman Long) [1584323 1584569] {CVE-2018-3639}
- [x86] spec_ctrl: Fix VM guest SSBD problems (Waiman Long) [1584323 1584569] {CVE-2018-3639}
kernel-rt-trace-kvm-3.10.0-862.3.3.rt56.809.el7.x86_64 [6.5 MiB] Changelog by Luis Claudio R. Goncalves (2018-06-13):
- [rt] Update source tree to match RHEL 7.5 tree [1549768 1462329]
- [x86] always enable eager FPU by default on non-AMD processors (Paolo Bonzini) [1589051 1589048] {CVE-2018-3665}
kernel-rt-trace-kvm-3.10.0-862.3.2.rt56.808.el7.x86_64 [6.5 MiB] Changelog by Luis Claudio R. Goncalves (2018-05-17):
- [rt] Update source tree to match RHEL 7.5 tree [1549768 1462329]
- [x86] spec_ctrl: Fix late microcode problem with AMD (Waiman Long) [1566904 1566905] {CVE-2018-3639}
- [x86] entry: Add missing "$" in IBRS macros (Waiman Long) [1566904 1566905] {CVE-2018-3639}
- [x86] spec_ctrl: Clean up entry code & remove unused APIs (Waiman Long) [1566904 1566905] {CVE-2018-3639}
- [x86] spec_ctrl: Mask off SPEC_CTRL MSR bits that are managed by kernel (Waiman Long) [1566904 1566905] {CVE-2018-3639}
- [x86] spec_ctrl: add support for SSBD to RHEL IBRS entry/exit macros (Waiman Long) [1566904 1566905] {CVE-2018-3639}
- [fs] proc: Use CamelCase for SSBD (Waiman Long) [1566904 1566905] {CVE-2018-3639}
- [x86] bugs: Rename _RDS to _SSBD (Waiman Long) [1566904 1566905] {CVE-2018-3639}
- [kernel] seccomp: Enable speculation flaw mitigations (Waiman Long) [1566904 1566905] {CVE-2018-3639}
- [fs] proc: Provide details on speculation flaw mitigations (Waiman Long) [1566904 1566905] {CVE-2018-3639}
- [x86] nospec: Allow getting/setting on non-current task (Waiman Long) [1566904 1566905] {CVE-2018-3639}
- [x86] speculation: Add prctl for Speculative Store Bypass mitigation (Waiman Long) [1566904 1566905] {CVE-2018-3639}
- [x86] process: Allow runtime control of Speculative Store Bypass (Waiman Long) [1566904 1566905] {CVE-2018-3639}
- [uapi] prctl: Add speculation control prctls (Waiman Long) [1566904 1566905] {CVE-2018-3639}
- [x86] kvm/vmx: Expose SPEC_CTRL Bit(2) to the guest (Waiman Long) [1566904 1566905] {CVE-2018-3639}
- [x86] bugs/amd: Add support to disable RDS on Fam[15, 16, 17]h if requested (Waiman Long) [1566904 1566905] {CVE-2018-3639}
- [x86] spec_ctrl: Sync up RDS setting with IBRS code (Waiman Long) [1566904 1566905] {CVE-2018-3639}
- [x86] bugs: Provide boot parameters for the spec_store_bypass_disable mitigation (Waiman Long) [1566904 1566905] {CVE-2018-3639}
- [x86] bugs: Expose /sys/../spec_store_bypass (Waiman Long) [1566904 1566905] {CVE-2018-3639}
- [x86] bugs: Read SPEC_CTRL MSR during boot and re-use (Waiman Long) [1566904 1566905] {CVE-2018-3639}
- [x86] spec_ctrl: Use separate PCP variables for IBRS entry and exit (Waiman Long) [1566904 1566905] {CVE-2018-3639}
- [x86] cpufeatures: Make CPU bugs sticky (Waiman Long) [1566904 1566905] {CVE-2018-3639}
kernel-rt-trace-kvm-3.10.0-862.2.3.rt56.806.el7.x86_64 [6.5 MiB] Changelog by Clark Williams (2018-04-30):
- [rt] Update source tree to match RHEL 7.5 tree [1549768 1462329]
- [x86] kvm: fix icebp instruction handling (Paolo Bonzini) [1566849 1566845] {CVE-2018-1087}
- [x86] entry/64: Don't use IST entry for #BP stack (Paolo Bonzini) [1567084 1567083] {CVE-2018-8897}
kernel-rt-trace-kvm-3.10.0-862.rt56.804.el7.x86_64 [6.5 MiB] Changelog by Luis Claudio R. Goncalves (2018-03-22):
- [rt] Update source tree to match RHEL 7.5 tree [1462329]
- [netdrv] i40e: Fix attach VF to VM issue (Stefan Assmann) [1528123]
- [netdrv] ixgbevf: Add check for ixgbe_mbox_api_13 to ixgbevf_probe when setting max_mtu (Ken Cox) [1556696]
- [md] dm btree: fix serious bug in btree_split_beneath() (Mike Snitzer) [1557849]
- [x86] pti: Disable PTI user page table update in EFI virtual mode (Waiman Long) [1540061]
kernel-rt-trace-kvm-3.10.0-861.rt56.803.el7.x86_64 [6.5 MiB] Changelog by Luis Claudio R. Goncalves (2018-03-14):
- [rt] Update source tree to match RHEL 7.5 tree [1462329]
- [netdrv] tg3: prevent scheduling while atomic splat (Jonathan Toppins) [1554590]
- [nvme] validate admin queue before unquiesce (David Milburn) [1549733]
kernel-rt-trace-kvm-3.10.0-693.21.1.rt56.639.el7.x86_64 [395 KiB] Changelog by Clark Williams (2018-02-23):
- [rt] Update source tree to match RHEL 7.4 tree [1537671 1462329]
kernel-rt-trace-kvm-3.10.0-693.17.1.rt56.636.el7.x86_64 [391 KiB] Changelog by Clark Williams (2018-01-16):
- [rt] Update source tree to match RHEL 7.4 tree [1519506 1462329]
kernel-rt-trace-kvm-3.10.0-693.11.1.rt56.639.el7.x86_64 [401 KiB] Changelog by Clark Williams (2017-12-28):
- [rt] Update source tree to match RHEL 7.4 tree [1489084 1462329]
- x86/spec_ctrl: svm: spec_ctrl at vmexit needs per-cpu areas functional (Andrea Arcangeli)
- x86/mm/kaiser: init_tss is supposed to go in the PAGE_ALIGNED per-cpu section (Andrea Arcangeli)
- x86/spec_ctrl: Eliminate redundnat FEATURE Not Present messages (Waiman Long)
- x86/kaiser/mm: skip IBRS/CR3 restore when paranoid exception returns to userland (Andrea Arcangeli)
- x86/kaiser/mm: consider the init_mm.pgd a kaiser pgd (Andrea Arcangeli)
- x86/kaiser/mm: convert userland visible "kpti" name to "pti" (Andrea Arcangeli)
- Revert "x86/entry: Use retpoline for syscall's indirect calls" (Josh Poimboeuf)
- x86/spec_ctrl: set IBRS during resume from RAM if ibrs_enabled is 2 (Andrea Arcangeli)
- x86/kaiser/mm: __load_cr3 in resume from RAM after kernel gs has been restored (Andrea Arcangeli)
- x86/spec_ctrl: allow use_ibp_disable only if both SPEC_CTRL and IBPB_SUPPORT are missing (Andrea Arcangeli)
- x86/spec_ctrl: Documentation spec_ctrl.txt (Andrea Arcangeli)
- x86/spec_ctrl: remove irqs_disabled() check from intel_idle() (Andrea Arcangeli)
- x86/spec_ctrl: use enum when setting ibrs/ibpb_enabled (Josh Poimboeuf)
- x86/spec_ctrl: undo speculation barrier for ibrs_enabled and noibrs_cmdline (Andrea Arcangeli)
- x86/spec_ctrl: introduce ibpb_enabled = 2 for IBPB instead of IBRS (Andrea Arcangeli)
- x86/spec_ctrl: introduce SPEC_CTRL_PCP_ONLY_IBPB (Andrea Arcangeli)
- x86/spec_ctrl: cleanup s/flush/sync/ naming when sending IPIs (Andrea Arcangeli)
- x86/spec_ctrl: set IBRS during CPU init if in ibrs_enabled == 2 (Andrea Arcangeli)
- x86/spec_ctrl: use IBRS_ENABLED instead of 1 (Andrea Arcangeli)
- x86/spec_ctrl: allow the IBP disable feature to be toggled at runtime (Andrea Arcangeli)
- x86/spec_ctrl: always initialize save_reg in ENABLE_IBRS_SAVE_AND_CLOBBER (Andrea Arcangeli)
- x86/spec_ctrl: ibrs_enabled() is expected to return > 1 (Andrea Arcangeli)
- x86/spec_ctrl: issue a __spec_ctrl_ibpb if a credential check isn't possible (Andrea Arcangeli)
- ibpb: don't optimize spec_cntrl_ibpb on PREEMPT_RCU (Clark Williams)
- x86/spec_ctrl: clear registers after 32bit syscall stackframe is setup (Andrea Arcangeli)
- x86/spec_ctrl: reload spec_ctrl cpuid in all microcode load paths (Andrea Arcangeli)
- x86/kaiser/mm: fix pgd freeing in error path (Andrea Arcangeli)
- x86/mm/kaiser: disable global pages by default with KAISER (Dave Hansen)
- Revert "x86/mm/kaiser: Disable global pages by default with KAISER" (Josh Poimboeuf)
- x86/spec_ctrl: Prevent unwanted speculation without IBRS (Josh Poimboeuf)
- x86/entry: Remove trampoline check from paranoid entry path (Josh Poimboeuf)
- x86/entry: Fix paranoid_exit() trampoline clobber (Josh Poimboeuf)
- x86/entry: Simplify trampoline stack restore code (Waiman Long)
- x86/dumpstack: Remove raw stack dump (Scott Wood)
- x86/spec_ctrl: remove SPEC_CTRL_DEBUG code (Josh Poimboeuf)
- x86/spec_ctrl: add noibrs noibpb boot options (Andrea Arcangeli)
- x86/entry: Use retpoline for syscall's indirect calls (Tim Chen)
- x86/syscall: Clear unused extra registers on 32-bit compatible syscall entrance (Tim Chen)
- x86/spec_ctrl: cleanup unnecessary ptregscall_common function (Andrea Arcangeli)
- x86/spec_ctrl: CLEAR_EXTRA_REGS and extra regs save/restore (Josh Poimboeuf)
- x86/syscall: Clear unused extra registers on syscall entrance (Tim Chen)
- x86/spec_ctrl: rescan cpuid after a late microcode update (Andrea Arcangeli)
- x86/spec_ctrl: add debugfs ibrs_enabled ibpb_enabled (Andrea Arcangeli)
- x86/spec_ctrl: consolidate the spec control boot detection (Andrea Arcangeli)
- x86/KVM/spec_ctrl: allow IBRS to stay enabled in host userland (Andrea Arcangeli)
- x86/spec_ctrl: add debug aid to test the entry code without microcode (Andrea Arcangeli)
- x86/spec_ctrl: move stuff_RSB in spec_ctrl.h (Andrea Arcangeli)
- x86/entry: Stuff RSB for entry to kernel for non-SMEP platform (Tim Chen)
- x86/mm: Only set IBPB when the new thread cannot ptrace current thread (Tim Chen)
- x86/mm: Set IBPB upon context switch (Tim Chen)
- x86/idle: Disable IBRS when offlining cpu and re-enable on wakeup (Tim Chen)
- x86/idle: Disable IBRS entering idle and enable it on wakeup (Tim Chen)
- x86/spec_ctrl: implement spec ctrl C methods (Andrea Arcangeli)
- x86/spec_ctrl: save IBRS MSR value in save_paranoid for NMI (Andrea Arcangeli)
- x86/enter: Use IBRS on syscall and interrupts (Tim Chen)
- x86/spec_ctrl: swap rdx with rsi for nmi nesting detection (Andrea Arcangeli)
- x86/spec_ctrl: spec_ctrl_pcp and kaiser_enabled_pcp in same cachline (Andrea Arcangeli)
- x86/spec_ctrl: use per-cpu knob instead of ALTERNATIVES for ibpb and ibrs (Andrea Arcangeli)
- x86/enter: MACROS to set/clear IBRS and set IBPB (Tim Chen)
- KVM: x86: add SPEC_CTRL to MSR and CPUID lists (Paolo Bonzini)
- kvm: svm: add MSR_IA32_SPEC_CTRL and MSR_IA32_PRED_CMD (Paolo Bonzini)
- x86/svm: Set IBPB when running a different VCPU (Paolo Bonzini)
- kvm: vmx: add MSR_IA32_SPEC_CTRL and MSR_IA32_PRED_CMD (Paolo Bonzini)
- kvm: vmx: Set IBPB when running a different VCPU (Tim Chen)
- KVM: x86: clear registers on VM exit (Tom Lendacky)
- x86/kvm: Pad RSB on VM transition (Tim Chen)
- x86/cpu/AMD: Control indirect branch predictor when SPEC_CTRL not available (Tom Lendacky)
- x86/feature: Report presence of IBPB and IBRS control (Tim Chen)
- x86/feature: Enable the x86 feature to control Speculation (Tim Chen)
- objtool: Don't print 'call dest' warnings for ignored functions (Josh Poimboeuf)
- locking/barriers: prevent speculative execution based on Coverity scan results (Josh Poimboeuf)
- udf: prevent speculative execution (Elena Reshetova)
- fs: prevent speculative execution (Elena Reshetova)
- userns: prevent speculative execution (Elena Reshetova)
- qla2xxx: prevent speculative execution (Elena Reshetova)
- p54: prevent speculative execution (Elena Reshetova)
- carl9170: prevent speculative execution (Elena Reshetova)
- uvcvideo: prevent speculative execution (Elena Reshetova)
- x86/cpu/AMD: Remove now unused definition of MFENCE_RDTSC feature (Tom Lendacky)
- x86/cpu/AMD: Make the LFENCE instruction serialized (Tom Lendacky)
- locking/barriers: introduce new memory barrier gmb() (Elena Reshetova)
- x86/mm/kaiser: Replace kaiser with kpti to sync with upstream (Waiman Long)
- x86/mm/kaiser: add "kaiser" and "nokaiser" boot options (Waiman Long)
- x86/mm/kaiser: map the trace idt tables in userland shadow pgd (Andrea Arcangeli)
- x86/mm/kaiser: fix RESTORE_CR3 crash in kaiser_stop_machine (Andrea Arcangeli)
- x86/mm/kaiser: use stop_machine for enable/disable knob (Andrea Arcangeli)
- x86/mm/kaiser: use atomic ops to poison/unpoison user pagetables (Andrea Arcangeli)
- x86/mm/kaiser: use invpcid to flush the two kaiser PCID AISD (Andrea Arcangeli)
- x86/mm/kaiser: use two PCID ASIDs optimize the TLB during enter/exit kernel (Andrea Arcangeli)
- x86/mm/kaiser: stop patching flush_tlb_single (Andrea Arcangeli)
- x86/mm/kaiser: use PCID feature to make user and kernel switches faster (Dave Hansen)
- x86/mm: If INVPCID is available, use it to flush global mappings (Andy Lutomirski)
- x86/mm/64: Fix reboot interaction with CR4.PCIDE (Andy Lutomirski)
- x86/mm/64: Initialize CR4.PCIDE early (Andy Lutomirski)
- x86/mm: Add a 'noinvpcid' boot option to turn off INVPCID (Andy Lutomirski)
- x86/mm: Add the 'nopcid' boot option to turn off PCID (Andy Lutomirski)
- x86/mm/kaiser: validate trampoline stack (Andrea Arcangeli)
- x86/entry: Move SYSENTER_stack to the beginning of struct tss_struct (Andy Lutomirski)
- x86/mm/kaiser: isolate the user mapped per cpu areas (Andrea Arcangeli)
- x86/mm/kaiser: enable kaiser in build (Andrea Arcangeli)
- x86/mm/kaiser: selective boot time defaults (Andrea Arcangeli)
- x86/mm/kaiser: handle call to xen_pv_domain() on PREEMPT_RT (Clark Williams)
- x86/mm/kaiser/xen: Dynamically disable KAISER when running under Xen PV (Dave Hansen)
- x86/mm/kaiser: add Kconfig (Dave Hansen)
- x86/mm/kaiser: avoid false positives during non-kaiser pgd updates (Andrea Arcangeli)
- x86/mm/kaiser: Respect disabled CPU features (Thomas Gleixner)
- x86/mm/kaiser: trampoline stack comments (Josh Poimboeuf)
- x86/mm/kaiser: stack trampoline (Andrea Arcangeli)
- x86/mm/kaiser: remove paravirt clock warning (Andrea Arcangeli)
- x86/mm/kaiser: re-enable vsyscalls (Andrea Arcangeli)
- x86/mm/kaiser: allow to build KAISER with KASRL (Andrea Arcangeli)
- x86/mm/kaiser: allow KAISER to be enabled/disabled at runtime (Dave Hansen)
- x86/mm/kaiser: un-poison PGDs at runtime (Dave Hansen)
- x86/mm/kaiser: add a function to check for KAISER being enabled (Dave Hansen)
- x86/mm/kaiser: add debugfs file to turn KAISER on/off at runtime (Dave Hansen)
- x86/mm/kaiser: disable native VSYSCALL (Dave Hansen)
- x86/mm/kaiser: map virtually-addressed performance monitoring buffers (Hugh Dickins)
- x86/mm/kaiser: map debug IDT tables (Dave Hansen)
- x86/mm/kaiser: add kprobes text section (Andrea Arcangeli)
- x86/mm/kaiser: map trace interrupt entry (Dave Hansen)
- x86/mm/kaiser: map entry stack per-cpu areas (Andrea Arcangeli)
- x86/mm/kaiser: map dynamically-allocated LDTs (Dave Hansen)
- x86/mm/kaiser: make sure static PGDs are 8k in size (Dave Hansen)
- x86/mm/kaiser: allow NX poison to be set in p4d/pgd (Dave Hansen)
- x86/mm/kaiser: unmap kernel from userspace page tables (core patch) (Dave Hansen)
- x86/mm/kaiser: mark per-cpu data structures required for entry/exit (Dave Hansen)
- x86/mm/kaiser: introduce user-mapped per-cpu areas (Dave Hansen)
- x86/mm/kaiser: add cr3 switches to entry code (Andrea Arcangeli)
- x86/mm/kaiser: remove scratch registers (Andrea Arcangeli)
- x86/mm/kaiser: prepare assembly for entry/exit CR3 switching (Dave Hansen)
- x86/mm/kaiser: Disable global pages by default with KAISER (Dave Hansen)
- x86/mm: Document X86_CR4_PGE toggling behavior (Dave Hansen)
- x86/mm/tlb: Make CR4-based TLB flushes more robust (Dave Hansen)
- x86/mm: Do not set _PAGE_USER for init_mm page tables (Dave Hansen)
- x86: increase robusteness of bad_iret fixup handler (Andrea Arcangeli)
- perf/x86/intel/uncore: Fix memory leaks on allocation failures (Colin Ian King)
- userfaultfd: hugetlbfs: prevent UFFDIO_COPY to fill beyond the end of i_size (Andrea Arcangeli)
- userfaultfd: non-cooperative: fix fork use after free (Andrea Arcangeli)
- userfaultfd: hugetlbfs: remove superfluous page unlock in VM_SHARED case (Andrea Arcangeli)
- mm: fix bad rss-counter if remap_file_pages raced migration (Hugh Dickins)
- redhat: reduce build xz compression to speed it up (Andrea Arcangeli)
- gcc: fix build with 6.4.0 PIE default (Andrea Arcangeli)
kernel-rt-trace-kvm-3.10.0-693.11.1.rt56.632.el7.x86_64 [390 KiB] Changelog by Clark Williams (2017-11-09):
- [rt] Update source tree to match RHEL 7.4 tree [1489084 1462329]
- rt: fix timer softirq merge (Clark Williams)
kernel-rt-trace-kvm-3.10.0-693.5.2.rt56.626.el7.x86_64 [389 KiB] Changelog by Clark Williams (2017-10-13):
- [rt] Update source tree to match RHEL 7.4 tree [1489084 1462329]
kernel-rt-trace-kvm-3.10.0-693.2.2.rt56.623.el7.x86_64 [388 KiB] Changelog by Clark Williams (2017-09-11):
- [rt] Update source tree to match RHEL 7.4 tree [1473393 1462329]
kernel-rt-trace-kvm-3.10.0-693.2.1.rt56.620.el7.x86_64 [388 KiB] Changelog by Clark Williams (2017-08-14):
- [rt] kernel-rt-3.10.0-693.2.1.rt56.620.el7 (Clark Williams) [1473393]
kernel-rt-trace-kvm-3.10.0-693.rt56.617.el7.x86_64 [387 KiB] Changelog by Clark Williams (2017-07-06):
- [rt] kernel-rt-3.10.0-693.rt56.617.el7 (Clark Williams) [1391779]
kernel-rt-trace-kvm-3.10.0-514.26.1.rt56.442.el7.x86_64 [337 KiB] Changelog by Clark Williams (2017-06-20):
- [rt] kernel-rt-3.10.0-514.26.1.rt56.442.el7 (Clark Williams) [1415172]
kernel-rt-trace-kvm-3.10.0-514.21.1.rt56.438.el7.x86_64 [336 KiB] Changelog by Clark Williams (2017-04-24):
- [rt] kernel-rt-3.10.0-514.21.1.rt56.438.el7 (Clark Williams) [1415172]
kernel-rt-trace-kvm-3.10.0-514.16.1.rt56.437.el7.x86_64 [336 KiB] Changelog by Clark Williams (2017-03-13):
- [rt] kernel-rt-3.10.0-514.16.1.rt56.437.el7 (Clark Williams) [1415172]
- memcontrol: call drain_local_stock() with preemption disabled (Luiz Capitulino) [1420784]
- memcontrol: revert "memcontrol: Prevent scheduling while atomic in cgroup code" (Luiz Capitulino) [1420784]
kernel-rt-trace-kvm-3.10.0-514.10.2.rt56.435.el7.x86_64 [335 KiB] Changelog by Luis Claudio R. Goncalves (2017-02-21):
- [rt] kernel-rt-3.10.0-514.10.2.rt56.435.el7 ("Luis Claudio R. Goncalves") [1415172]
kernel-rt-trace-kvm-3.10.0-514.6.1.rt56.430.el7.x86_64 [335 KiB] Changelog by Clark Williams (2017-02-17):
- [rt] kernel-rt-3.10.0-514.6.1.rt56.430.el7 (Clark Williams) [1401863]
- dccp: fix freeing skb too early for IPV6_RECVPKTINFO (Hannes Frederic Sowa) [https://bugzilla.redhat.com/show_bug.cgi?id=1423464]
kernel-rt-trace-kvm-3.10.0-514.6.1.rt56.429.el7.x86_64 [335 KiB] Changelog by Clark Williams (2016-12-14):
- [rt] kernel-rt-3.10.0-514.6.1.rt56.429.el7 (Clark Williams) [1401863]
- [rt] specfile changelog cleanup (Clark Williams)
kernel-rt-trace-kvm-3.10.0-514.2.2.rt56.424.el7.x86_64 [334 KiB] Changelog by Clark Williams (2016-11-17):
- [rt] kernel-rt-3.10.0-514.2.2.rt56.424.el7 (Clark Williams) [1377840]
kernel-rt-trace-kvm-3.10.0-514.rt56.420.el7.x86_64 [333 KiB] Changelog by Clark Williams (2016-10-19):
- [rt] kernel-rt-3.10.0-514.rt56.420.el7 (Clark Williams) [1280494]
kernel-rt-trace-kvm-3.10.0-327.36.3.rt56.238.el7.x86_64 [291 KiB] Changelog by Luis Claudio R. Goncalves (2016-10-20):
- [rt] kernel-3.10.0-327.36.3.el7 [1366538]
- [mm] remove gup_flags FOLL_WRITE games from __get_user_pages() (Alexander Gordeev) [1385126] {CVE-2016-5195}
- [net] add recursion limit to GRO (Sabrina Dubroca) {CVE-2016-7039}
kernel-rt-trace-kvm-3.10.0-327.36.1.rt56.237.el7.x86_64 [291 KiB] Changelog by Luis Claudio R. Goncalves (2016-08-17):
- [rt] kernel-3.10.0-327.36.1.el7 [1366538]
kernel-rt-trace-kvm-3.10.0-327.28.3.rt56.235.el7.x86_64 [291 KiB] Changelog by Luis Claudio R. Goncalves (2016-08-15):
- [rt] kernel-3.10.0-327.28.3.el7 [1350307]
- [rt] use .el7 as the kernel sufix (instead of .el7_2) [1350307]
- [net] fix challenge ACK counter information disclosure [1355618] {CVE-2016-5696}
kernel-rt-trace-kvm-3.10.0-327.28.2.rt56.234.el7_2.x86_64 [290 KiB] Changelog by Luis Claudio R. Goncalves (2016-07-22):
- [rhel-rt] config: enable RCU_NOCB_CPU_ALL [1349770]
kernel-rt-trace-kvm-3.10.0-327.22.2.rt56.230.el7_2.x86_64 [290 KiB] Changelog by Luis Claudio R. Goncalves (2016-07-09):
- [rt] kernel-3.10.0-327.22.2.el7 [1335747]
kernel-rt-trace-kvm-3.10.0-327.18.2.rt56.223.el7_2.x86_64 [288 KiB] Changelog by Luis Claudio R. Goncalves (2016-04-11):
- printk: Prevent console freeze due to out-of-order deadlock [1324767]
kernel-rt-trace-kvm-3.10.0-327.13.1.rt56.216.el7_2.x86_64 [288 KiB] Changelog by Luis Claudio R. Goncalves (2016-02-29):
- [rt] merged kernel-3.10.0-327.13.1.el7 [1311476]
kernel-rt-trace-kvm-3.10.0-327.10.1.rt56.211.el7_2.x86_64 [286 KiB] Changelog by Luis Claudio R. Goncalves (2016-01-25):
- [rt] merged kernel-3.10.0-327.10.1.el7 [1282591]
kernel-rt-trace-kvm-3.10.0-327.4.5.rt56.206.el7_2.x86_64 [285 KiB] Changelog by Luis Claudio R. Goncalves (2016-01-21):
- [rt] merged kernel-3.10.0-327.4.5.el7 [1282591]
- [security] keys: Fix keyring ref leak in join_session_keyring() (David Howells) [1298037] {CVE-2016-0728}
kernel-rt-trace-kvm-3.10.0-327.rt56.204.el7.x86_64 [284 KiB] Changelog by Luis Claudio R. Goncalves (2015-10-29):
- [rt] merged kernel-3.10.0-327.el7 [1201915]
- [rt] nohz: enable nohz if nohz_full encountered on boot command line [1276071]

Listing created by repoview