From 56d43c234eddd79bcdc32722ed203b7a841c5d2d Mon Sep 17 00:00:00 2001 From: CentOS Sources Date: Jun 17 2019 19:52:20 +0000 Subject: import kernel-rt-4.18.0-80.4.2.rt9.152.el8_0 --- diff --git a/.gitignore b/.gitignore index fcacbc3..2d49219 100644 --- a/.gitignore +++ b/.gitignore @@ -1 +1 @@ -SOURCES/linux-4.18.0-80.1.2.rt9.145.el8_0.tar.xz +SOURCES/linux-4.18.0-80.4.2.rt9.152.el8_0.tar.xz diff --git a/.kernel-rt.metadata b/.kernel-rt.metadata index b674187..3f5b38f 100644 --- a/.kernel-rt.metadata +++ b/.kernel-rt.metadata @@ -1 +1 @@ -e32ecab6583ba6198c826869521856d2eb0e3182 SOURCES/linux-4.18.0-80.1.2.rt9.145.el8_0.tar.xz +719406db31babee5cbb038d26d4ec0ecb7698853 SOURCES/linux-4.18.0-80.4.2.rt9.152.el8_0.tar.xz diff --git a/SPECS/kernel-rt.spec b/SPECS/kernel-rt.spec index 330bcb9..2d920ab 100644 --- a/SPECS/kernel-rt.spec +++ b/SPECS/kernel-rt.spec @@ -33,10 +33,10 @@ Summary: The Linux kernel # define buildid .local %define rpmversion 4.18.0 -%define pkgrelease 80.1.2.rt9.145.el8_0 +%define pkgrelease 80.4.2.rt9.152.el8_0 # allow pkg_release to have configurable %%{?dist} tag -%define specrelease 80.1.2.rt9.145%{?dist} +%define specrelease 80.4.2.rt9.152%{?dist} %define pkg_release %{specrelease}%{?buildid} @@ -127,7 +127,7 @@ Summary: The Linux kernel # The preempt RT patch level %global rttag .rt9 # realtimeN -%global rtbuild .145 +%global rtbuild .152 %define with_headers 0 %define with_cross_headers 0 %define with_perf 0 @@ -836,6 +836,7 @@ The kernel package contains the Linux kernel (vmlinuz) for use by the zfcpdump infrastructure. %endif # with_zfcpdump +%if %{with_debug} %define variant_summary The Linux kernel compiled with extra debugging enabled %kernel_variant_package debug %description debug-core @@ -847,6 +848,7 @@ input and output, etc. This variant of the kernel has numerous debugging options enabled. It should only be installed when trying to gather additional information on kernel bugs, as some of these options impact performance noticably. +%endif # with_debug # And finally the main -core package @@ -1930,12 +1932,14 @@ depmod %{KVERREL}%{?1:+%{1}} || exit $?\ %kernel_kvm_variant_postun %endif +%if %{with_debug} %kernel_variant_preun debug %kernel_variant_post -v debug %if %{with_realtime} %kernel_kvm_variant_post debug %kernel_kvm_variant_postun debug %endif +%endif # with_debug %if %{with_zfcpdump} %kernel_variant_preun zfcpdump @@ -2191,7 +2195,9 @@ fi %{nil} %kernel_variant_files %{with_vdso_install} %{with_up} +%if %{with_debug} %kernel_variant_files %{with_vdso_install} %{with_debug} debug +%endif %if %{with_zfcpdump} %kernel_variant_files %{with_vdso_install} %{with_zfcpdump} zfcpdump %endif @@ -2201,6 +2207,111 @@ fi # # %changelog +* Sat Jun 15 2019 Clark Williams [4.18.0-80.4.2.rt9.152.el8_0] +- [rt] Merged RHEL kernel-4.18.0-80.4.2.el8_0 into RT tree as kernel-rt-4.18.0-80.4.2.rt9.151.el8_0 (Clark Williams) [1704955 1678887] + +* Fri Jun 14 2019 Clark Williams [4.18.0-80.4.2.rt9.151.el8_0] +- [rt] Merged RHEL kernel-4.18.0-80.4.2.el8_0 into RT tree as kernel-rt-4.18.0-80.4.2.rt9.150.el8_0 (Clark Williams) [1704955 1678887] +- [net] tcp: enforce tcp_min_snd_mss in tcp_mtu_probing() (Florian Westphal) [1719922 1719923] {CVE-2019-11479} +- [net] tcp: add tcp_min_snd_mss sysctl (Florian Westphal) [1719922 1719923] {CVE-2019-11479} +- [net] tcp: tcp_fragment() should apply sane memory limits (Florian Westphal) [1719857 1719858] {CVE-2019-11478} +- [net] tcp: limit payload size of sacked skbs (Florian Westphal) [1719602 1719603] {CVE-2019-11477} + +* Fri May 31 2019 Clark Williams [4.18.0-80.4.1.rt9.150.el8_0] +- [rt] Merged RHEL kernel-4.18.0-80.4.1.el8_0 into RT tree as kernel-rt-4.18.0-80.4.1.rt9.149.el8_0 (Clark Williams) [1704955 1678887] + +* Tue May 21 2019 Clark Williams [4.18.0-80.4.1.rt9.149.el8_0] +- [rt] Merged RHEL kernel-4.18.0-80.4.1.el8_0 into RT tree as kernel-rt-4.18.0-80.4.1.rt9.148.el8_0 (Clark Williams) [1704955 1678887] + +* Mon May 20 2019 Clark Williams [4.18.0-80.4.1.rt9.148.el8_0] +- [rt] Merged RHEL kernel-4.18.0-80.4.1.el8_0 into RT tree as kernel-rt-4.18.0-80.4.1.rt9.147.el8_0 (Clark Williams) [1704955 1678887] +- [rt] Merged RHEL kernel-4.18.0-80.1.2.el8_0 into RT tree as kernel-rt-4.18.0-80.3.1.rt9.146.el8_0 (Clark Williams) [1704955 1678887] +- Merged RHEL v4.18 into RT tree as kernel-rt-4.18.0-80.2.1.rt9.145.el8_0 (Clark Williams) [1704955 1678887] +- [netdrv] ice: Do autoneg based on VSI state (Jonathan Toppins) [1709433 1687903] +- [arm64] arm64: apply workaround on A64FX v1r0 (Mark Langsdorf) [1700901 1692306] +- [arm64] arm64/speculation: Support 'mitigations=' cmdline option (Josh Poimboeuf) [1698809 1698896 1699001 1705836 1690338 1690360 1690351 1705312] {CVE-2018-12130 CVE-2018-12127 CVE-2018-12126 CVE-2019-11091} +- [s390] s390/speculation: Support 'mitigations=' cmdline option (Josh Poimboeuf) [1698809 1698896 1699001 1705836 1690338 1690360 1690351 1705312] {CVE-2018-12130 CVE-2018-12127 CVE-2018-12126 CVE-2019-11091} +- [powerpc] powerpc/speculation: Support 'mitigations=' cmdline option (Josh Poimboeuf) [1698809 1698896 1699001 1705836 1690338 1690360 1690351 1705312] {CVE-2018-12130 CVE-2018-12127 CVE-2018-12126 CVE-2019-11091} +- [powerpc] powerpc/64: Disable the speculation barrier from the command line (Josh Poimboeuf) [1698809 1698896 1699001 1705836 1690338 1690360 1690351 1705312] {CVE-2018-12130 CVE-2018-12127 CVE-2018-12126 CVE-2019-11091} +- [x86] x86/speculation/mds: Add 'mitigations=' support for MDS (Josh Poimboeuf) [1698809 1698896 1699001 1705836 1690338 1690360 1690351 1705312] {CVE-2018-12130 CVE-2018-12127 CVE-2018-12126 CVE-2019-11091} +- [x86] x86/speculation: Support 'mitigations=' cmdline option (Josh Poimboeuf) [1698809 1698896 1699001 1705836 1690338 1690360 1690351 1705312] {CVE-2018-12130 CVE-2018-12127 CVE-2018-12126 CVE-2019-11091} +- [kernel] cpu/speculation: Add 'mitigations=' cmdline option (Josh Poimboeuf) [1698809 1698896 1699001 1705836 1690338 1690360 1690351 1705312] {CVE-2018-12130 CVE-2018-12127 CVE-2018-12126 CVE-2019-11091} +- [x86] x86/speculation/mds: Print SMT vulnerable on MSBDS with mitigations off (Josh Poimboeuf) [1698809 1698896 1699001 1705836 1690338 1690360 1690351 1705312] {CVE-2018-12130 CVE-2018-12127 CVE-2018-12126 CVE-2019-11091} +- [x86] x86/speculation/mds: Fix comment (Josh Poimboeuf) [1698809 1698896 1699001 1705836 1690338 1690360 1690351 1705312] {CVE-2018-12130 CVE-2018-12127 CVE-2018-12126 CVE-2019-11091} +- [x86] x86/speculation/mds: Add SMT warning message (Josh Poimboeuf) [1698809 1698896 1699001 1705836 1690338 1690360 1690351 1705312] {CVE-2018-12130 CVE-2018-12127 CVE-2018-12126 CVE-2019-11091} +- [x86] x86/speculation: Move arch_smt_update() call to after mitigation decisions (Josh Poimboeuf) [1698809 1698896 1699001 1705836 1690338 1690360 1690351 1705312] {CVE-2018-12130 CVE-2018-12127 CVE-2018-12126 CVE-2019-11091} +- [x86] x86/speculation/mds: Add mds=full, nosmt cmdline option (Josh Poimboeuf) [1698809 1698896 1699001 1705836 1690338 1690360 1690351 1705312] {CVE-2018-12130 CVE-2018-12127 CVE-2018-12126 CVE-2019-11091} +- [documentation] Documentation: Add MDS vulnerability documentation (Josh Poimboeuf) [1698809 1698896 1699001 1705836 1690338 1690360 1690351 1705312] {CVE-2018-12130 CVE-2018-12127 CVE-2018-12126 CVE-2019-11091} +- [documentation] Documentation: Move L1TF to separate directory (Josh Poimboeuf) [1698809 1698896 1699001 1705836 1690338 1690360 1690351 1705312] {CVE-2018-12130 CVE-2018-12127 CVE-2018-12126 CVE-2019-11091} +- [x86] x86/speculation/mds: Add mitigation mode VMWERV (Josh Poimboeuf) [1698809 1698896 1699001 1705836 1690338 1690360 1690351 1705312] {CVE-2018-12130 CVE-2018-12127 CVE-2018-12126 CVE-2019-11091} +- [x86] x86/speculation/mds: Add sysfs reporting for MDS (Josh Poimboeuf) [1698809 1698896 1699001 1705836 1690338 1690360 1690351 1705312] {CVE-2018-12130 CVE-2018-12127 CVE-2018-12126 CVE-2019-11091} +- [x86] x86/speculation/mds: Add mitigation control for MDS (Josh Poimboeuf) [1698809 1698896 1699001 1705836 1690338 1690360 1690351 1705312] {CVE-2018-12130 CVE-2018-12127 CVE-2018-12126 CVE-2019-11091} +- [x86] x86/speculation/mds: Conditionally clear CPU buffers on idle entry (Josh Poimboeuf) [1698809 1698896 1699001 1705836 1690338 1690360 1690351 1705312] {CVE-2018-12130 CVE-2018-12127 CVE-2018-12126 CVE-2019-11091} +- [x86] x86/kvm/vmx: Add MDS protection when L1D Flush is not active (Josh Poimboeuf) [1698809 1698896 1699001 1705836 1690338 1690360 1690351 1705312] {CVE-2018-12130 CVE-2018-12127 CVE-2018-12126 CVE-2019-11091} +- [x86] x86/speculation/mds: Clear CPU buffers on exit to user (Josh Poimboeuf) [1698809 1698896 1699001 1705836 1690338 1690360 1690351 1705312] {CVE-2018-12130 CVE-2018-12127 CVE-2018-12126 CVE-2019-11091} +- [x86] x86/speculation/mds: Add mds_clear_cpu_buffers() (Josh Poimboeuf) [1698809 1698896 1699001 1705836 1690338 1690360 1690351 1705312] {CVE-2018-12130 CVE-2018-12127 CVE-2018-12126 CVE-2019-11091} +- [kvm] x86/kvm: Expose X86_FEATURE_MD_CLEAR to guests (Josh Poimboeuf) [1698809 1698896 1699001 1705836 1690338 1690360 1690351 1705312] {CVE-2018-12130 CVE-2018-12127 CVE-2018-12126 CVE-2019-11091} +- [x86] x86/speculation/mds: Add BUG_MSBDS_ONLY (Josh Poimboeuf) [1698809 1698896 1699001 1705836 1690338 1690360 1690351 1705312] {CVE-2018-12130 CVE-2018-12127 CVE-2018-12126 CVE-2019-11091} +- [x86] x86/speculation/mds: Add basic bug infrastructure for MDS (Josh Poimboeuf) [1698809 1698896 1699001 1705836 1690338 1690360 1690351 1705312] {CVE-2018-12130 CVE-2018-12127 CVE-2018-12126 CVE-2019-11091} +- [x86] x86/speculation: Consolidate CPU whitelists (Josh Poimboeuf) [1698809 1698896 1699001 1705836 1690338 1690360 1690351 1705312] {CVE-2018-12130 CVE-2018-12127 CVE-2018-12126 CVE-2019-11091} +- [x86] x86/msr-index: Cleanup bit defines (Josh Poimboeuf) [1698809 1698896 1699001 1705836 1690338 1690360 1690351 1705312] {CVE-2018-12130 CVE-2018-12127 CVE-2018-12126 CVE-2019-11091} +- [x86] x86/speculation: Cast ~SPEC_CTRL_STIBP atomic value to int (Josh Poimboeuf) [1698809 1698896 1699001 1705836 1690338 1690360 1690351 1705312] {CVE-2018-12130 CVE-2018-12127 CVE-2018-12126 CVE-2019-11091} +- [x86] x86/cpu: Sanitize FAM6_ATOM naming (Josh Poimboeuf) [1698809 1698896 1699001 1705836 1690338 1690360 1690351 1705312] {CVE-2018-12130 CVE-2018-12127 CVE-2018-12126 CVE-2019-11091} +- [include] locking/atomics, asm-generic: Move some macros from to a new file (Josh Poimboeuf) [1698809 1698896 1699001 1705836 1690338 1690360 1690351 1705312] {CVE-2018-12130 CVE-2018-12127 CVE-2018-12126 CVE-2019-11091} +- [tools] tools include: Adopt linux/bits.h (Josh Poimboeuf) [1698809 1698896 1699001 1705836 1690338 1690360 1690351 1705312] {CVE-2018-12130 CVE-2018-12127 CVE-2018-12126 CVE-2019-11091} +- [mm] mm: enforce min addr even if capable() in expand_downwards() (Rafael Aquini) [1708829 1687667] {CVE-2019-9213} +- [powerpc] powerpc/radix: Fix kernel crash with mremap() (Steve Best) [1708617 1674186] +- [powerpc] powerpc/security: Fix spectre_v2 reporting (Gustavo Duarte) [1708112 1694456] +- [powerpc] powerpc/powernv: Query firmware for count cache flush settings (Gustavo Duarte) [1708112 1694456] +- [powerpc] powerpc/pseries: Query hypervisor for count cache flush settings (Gustavo Duarte) [1708112 1694456] +- [powerpc] powerpc/64s: Add support for software count cache flush (Gustavo Duarte) [1708112 1694456] +- [powerpc] powerpc/64s: Add new security feature flags for count cache flush (Gustavo Duarte) [1708112 1694456] +- [powerpc] powerpc/asm: Add a patch_site macro & helpers for patching instructions (Gustavo Duarte) [1708112 1694456] +- [powerpc] powerpc/64: Call setup_barrier_nospec() from setup_arch() (Gustavo Duarte) [1708112 1694456] +- [powerpc] powerpc/64: Add CONFIG_PPC_BARRIER_NOSPEC (Gustavo Duarte) [1708112 1694456] +- [powerpc] powerpc64s: Show ori31 availability in spectre_v1 sysfs file not v2 (Gustavo Duarte) [1708112 1694456] +- [of] of: __of_detach_node() - remove node from phandle cache (Steve Best) [1708102 1669198] +- [of] of: of_node_get()/of_node_put() nodes held in phandle cache (Steve Best) [1708102 1669198] +- [fs] debugfs: Fix EPERM regression from kernel lockdown check (Lenny Szubowicz) [1708100 1686755] +- [block] nvme: lock NS list changes while handling command effects (David Milburn) [1701140 1672759] +- [netdrv] qed: Fix qed_mcp_halt|resume() (Manish Chopra) [1704184 1697310] +- [cpufreq] cpufreq: intel_pstate: Also use CPPC nominal_perf for base_frequency (Prarit Bhargava) [1706739 1696131] +- [acpi] ACPI / CPPC: Fix guaranteed performance handling (Prarit Bhargava) [1706739 1696131] +- [arm64] arm64: Add workaround for Fujitsu A64FX erratum 010001 (Mark Langsdorf) [1700902 1666951] +- [s390] vfio_ap: link the vfio_ap devices to the vfio_ap bus subsystem (Cornelia Huck) [1700290 1686044] +- [netdrv] net/mlx4_en: Force CHECKSUM_NONE for short ethernet frames (Alaa Hleihel) [1700289 1651509] +- [netdrv] net/mlx5e: Force CHECKSUM_UNNECESSARY for short ethernet frames (Alaa Hleihel) [1700289 1651509] +- [pci] PCI: pciehp: Fix re-enabling the slot marked for safe removal (Myron Stowe) [1700288 1695922] + +* Mon May 20 2019 Clark Williams [4.18.0-80.3.1.rt9.147.el8_0] +- [rt] Merged RHEL kernel-4.18.0-80.1.2.el8_0 into RT tree as kernel-rt-4.18.0-80.3.1.rt9.146.el8_0 (Clark Williams) [1704955 1678887] +- [mm] mm: enforce min addr even if capable() in expand_downwards() (Rafael Aquini) [1708829 1687667] {CVE-2019-9213} +- [powerpc] powerpc/radix: Fix kernel crash with mremap() (Steve Best) [1708617 1674186] +- [powerpc] powerpc/security: Fix spectre_v2 reporting (Gustavo Duarte) [1708112 1694456] +- [powerpc] powerpc/powernv: Query firmware for count cache flush settings (Gustavo Duarte) [1708112 1694456] +- [powerpc] powerpc/pseries: Query hypervisor for count cache flush settings (Gustavo Duarte) [1708112 1694456] +- [powerpc] powerpc/64s: Add support for software count cache flush (Gustavo Duarte) [1708112 1694456] +- [powerpc] powerpc/64s: Add new security feature flags for count cache flush (Gustavo Duarte) [1708112 1694456] +- [powerpc] powerpc/asm: Add a patch_site macro & helpers for patching instructions (Gustavo Duarte) [1708112 1694456] +- [powerpc] powerpc/64: Call setup_barrier_nospec() from setup_arch() (Gustavo Duarte) [1708112 1694456] +- [powerpc] powerpc/64: Add CONFIG_PPC_BARRIER_NOSPEC (Gustavo Duarte) [1708112 1694456] +- [powerpc] powerpc64s: Show ori31 availability in spectre_v1 sysfs file not v2 (Gustavo Duarte) [1708112 1694456] +- [of] of: __of_detach_node() - remove node from phandle cache (Steve Best) [1708102 1669198] +- [of] of: of_node_get()/of_node_put() nodes held in phandle cache (Steve Best) [1708102 1669198] +- [fs] debugfs: Fix EPERM regression from kernel lockdown check (Lenny Szubowicz) [1708100 1686755] +- [block] nvme: lock NS list changes while handling command effects (David Milburn) [1701140 1672759] + +* Mon May 20 2019 Clark Williams [4.18.0-80.2.1.rt9.146.el8_0] +- Merged RHEL v4.18 into RT tree as kernel-rt-4.18.0-80.2.1.rt9.145.el8_0 (Clark Williams) [1704955 1678887] +- [netdrv] qed: Fix qed_mcp_halt|resume() (Manish Chopra) [1704184 1697310] +- [cpufreq] cpufreq: intel_pstate: Also use CPPC nominal_perf for base_frequency (Prarit Bhargava) [1706739 1696131] +- [acpi] ACPI / CPPC: Fix guaranteed performance handling (Prarit Bhargava) [1706739 1696131] +- [arm64] arm64: Add workaround for Fujitsu A64FX erratum 010001 (Mark Langsdorf) [1700902 1666951] +- [s390] vfio_ap: link the vfio_ap devices to the vfio_ap bus subsystem (Cornelia Huck) [1700290 1686044] +- [netdrv] net/mlx4_en: Force CHECKSUM_NONE for short ethernet frames (Alaa Hleihel) [1700289 1651509] +- [netdrv] net/mlx5e: Force CHECKSUM_UNNECESSARY for short ethernet frames (Alaa Hleihel) [1700289 1651509] +- [pci] PCI: pciehp: Fix re-enabling the slot marked for safe removal (Myron Stowe) [1700288 1695922] + * Thu May 09 2019 Clark Williams [4.18.0-80.1.2.rt9.145.el8_0] - [rt] kernel-rt-4.18.0-80.1.2.rt9.144.el8_0 (Clark Williams) - [rhel-rt] fix incorrect build number (Clark Williams)