Skip to content

Commit 58035f8

Browse files
committed
[redhat] kernel-5.14.0-479.el9
Signed-off-by: Lucas Zampieri <lzampier@redhat.com>
1 parent 1379962 commit 58035f8

File tree

2 files changed

+205
-1
lines changed

2 files changed

+205
-1
lines changed

Makefile.rhelver

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ RHEL_MINOR = 5
1212
#
1313
# Use this spot to avoid future merge conflicts.
1414
# Do not trim this comment.
15-
RHEL_RELEASE = 478
15+
RHEL_RELEASE = 479
1616

1717
#
1818
# ZSTREAM

redhat/kernel.changelog-9.5

Lines changed: 204 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,207 @@
1+
* Wed Jul 10 2024 Lucas Zampieri <lzampier@redhat.com> [5.14.0-479.el9]
2+
- REDHAT: Makefile, dont reset dist-git-tmp if set (Lucas Zampieri)
3+
- Revert "REDHAT: Fix values in Makefile being redefined" (Lucas Zampieri)
4+
- tools/power turbostat: Add local build_bug.h header for snapshot target (David Arcari) [RHEL-33321]
5+
- tools/power turbostat: Fix unc freq columns not showing with '-q' or '-l' (David Arcari) [RHEL-33321]
6+
- tools/power turbostat: option '-n' is ambiguous (David Arcari) [RHEL-33321 RHEL-36084]
7+
- tools/power turbostat: version 2024.05.10 (David Arcari) [RHEL-33321]
8+
- tools/power turbostat: Ignore pkg_cstate_limit when it is not available (David Arcari) [RHEL-33321]
9+
- tools/power turbostat: Fix order of strings in pkg_cstate_limit_strings (David Arcari) [RHEL-33321]
10+
- tools/power turbostat: Read Package-cstates via perf (David Arcari) [RHEL-33321]
11+
- tools/power turbostat: Read Core-cstates via perf (David Arcari) [RHEL-33321]
12+
- tools/power turbostat: Avoid possible memory corruption due to sparse topology IDs (David Arcari) [RHEL-33321]
13+
- tools/power turbostat: Add columns for clustered uncore frequency (David Arcari) [RHEL-33321]
14+
- tools/power turbostat: Enable non-privileged users to read sysfs counters (David Arcari) [RHEL-33321]
15+
- tools/power turbostat: Replace _Static_assert with BUILD_BUG_ON (David Arcari) [RHEL-33321]
16+
- tools/power turbostat: Add ARL-H support (David Arcari) [RHEL-33321]
17+
- tools/power turbostat: Enhance ARL/LNL support (David Arcari) [RHEL-33321]
18+
- tools/power turbostat: Survive sparse die_id (David Arcari) [RHEL-33321]
19+
- tools/power turbostat: Remember global max_die_id (David Arcari) [RHEL-33321]
20+
- tools/power turbostat: Harden probe_intel_uncore_frequency() (David Arcari) [RHEL-33321]
21+
- tools/power turbostat: Add "snapshot:" Makefile target (David Arcari) [RHEL-33321]
22+
- platform/x86:intel/pmc: Enable S0ix blocker show in Lunar Lake (Steve Best) [RHEL-46817]
23+
- platform/x86:intel/pmc: Update LNL signal status map (Steve Best) [RHEL-46817]
24+
- platform/x86:intel/pmc: Add support to show S0ix blocker counter (Steve Best) [RHEL-46817]
25+
- platform/x86/intel/pmc: Fix PCH names in comments (Steve Best) [RHEL-46817]
26+
- platform/x86/intel/pmc: Improve PKGC residency counters debug (Steve Best) [RHEL-46817]
27+
- platform/x86/intel/pmc/arl: Put GNA device in D3 (Steve Best) [RHEL-46817]
28+
- net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc() (Davide Caratti) [RHEL-45534]
29+
- net/sched: taprio: extend minimum interval restriction to entire cycle too (Davide Caratti) [RHEL-44375 RHEL-45534] {CVE-2024-36244}
30+
- net/sched: taprio: make q->picos_per_byte available to fill_sched_entry() (Davide Caratti) [RHEL-44375 RHEL-45534] {CVE-2024-36244}
31+
- rtnetlink: Correct nested IFLA_VF_VLAN_LIST attribute validation (Davide Caratti) [RHEL-39715] {CVE-2024-36017}
32+
- xfs: process free extents to busy list in FIFO order (Pavel Reichl) [RHEL-7961]
33+
- xfs: adjust the incore perag block_count when shrinking (Pavel Reichl) [RHEL-7961]
34+
- xfs: abort fstrim if kernel is suspending (Pavel Reichl) [RHEL-7961]
35+
- xfs: reduce AGF hold times during fstrim operations (Pavel Reichl) [RHEL-7961]
36+
- xfs: move log discard work to xfs_discard.c (Pavel Reichl) [RHEL-7961]
37+
- can: j1939: j1939_netdev_start(): fix UAF for rx_kref of j1939_priv (Ken Cox) [RHEL-38415] {CVE-2021-47459}
38+
- tty: n_gsm: fix possible out-of-bounds in gsm0_receive() (Steve Best) [RHEL-39354] {CVE-2024-36016}
39+
- net/sched: initialize noop_qdisc owner (Davide Caratti) [RHEL-35058]
40+
- net/sched: Fix mirred deadlock on device recursion (Davide Caratti) [RHEL-35058] {CVE-2024-27010}
41+
- KVM: SEV-ES: Fix svm_get_msr()/svm_set_msr() for KVM_SEV_ES_INIT guests (Paolo Bonzini) [RHEL-16745]
42+
- x86/e820: Add a new e820 table update helper (Paolo Bonzini) [RHEL-16745]
43+
- x86/sev: Add callback to apply RMP table fixups for kexec (Paolo Bonzini) [RHEL-16745]
44+
- x86/kexec: Do not update E820 kexec table for setup_data (Paolo Bonzini) [RHEL-16745]
45+
- x86/e820: Don't reserve SETUP_RNG_SEED in e820 (Paolo Bonzini) [RHEL-16745]
46+
- redhat: add new configs (Paolo Bonzini) [RHEL-16745]
47+
- KVM: SNP: Fix LBR Virtualization for SNP guest (Paolo Bonzini) [RHEL-16745]
48+
- KVM: x86/mmu: Don't save mmu_invalidate_seq after checking private attr (Paolo Bonzini) [RHEL-16745]
49+
- KVM: SEV-ES: Delegate LBR virtualization to the processor (Paolo Bonzini) [RHEL-16745]
50+
- KVM: SEV-ES: Disallow SEV-ES guests when X86_FEATURE_LBRV is absent (Paolo Bonzini) [RHEL-16745]
51+
- KVM: SEV-ES: Prevent MSR access post VMSA encryption (Paolo Bonzini) [RHEL-16745]
52+
- KVM: SVM: Remove the need to trigger an UNBLOCK event on AP creation (Paolo Bonzini) [RHEL-16745]
53+
- KVM: SEV: Don't WARN() if RMP lookup fails when invalidating gmem pages (Paolo Bonzini) [RHEL-16745]
54+
- KVM: SEV: Automatically switch reclaimed pages to shared (Paolo Bonzini) [RHEL-16745]
55+
- KVM: SVM: Add module parameter to enable SEV-SNP (Paolo Bonzini) [RHEL-16745]
56+
- KVM: SEV: Avoid WBINVD for HVA-based MMU notifications for SNP (Paolo Bonzini) [RHEL-16745]
57+
- KVM: x86: Implement hook for determining max NPT mapping level (Paolo Bonzini) [RHEL-16745]
58+
- KVM: SEV: Implement gmem hook for invalidating private pages (Paolo Bonzini) [RHEL-16745]
59+
- KVM: SEV: Implement gmem hook for initializing private pages (Paolo Bonzini) [RHEL-16745]
60+
- KVM: SEV: Support SEV-SNP AP Creation NAE event (Paolo Bonzini) [RHEL-16745]
61+
- KVM: SEV: Add support to handle RMP nested page faults (Paolo Bonzini) [RHEL-16745]
62+
- KVM: SEV: Add support to handle Page State Change VMGEXIT (Paolo Bonzini) [RHEL-16745]
63+
- KVM: SEV: Add support to handle MSR based Page State Change VMGEXIT (Paolo Bonzini) [RHEL-16745]
64+
- KVM: SEV: Add support to handle GHCB GPA register VMGEXIT (Paolo Bonzini) [RHEL-16745]
65+
- KVM: SEV: Add KVM_SEV_SNP_LAUNCH_FINISH command (Paolo Bonzini) [RHEL-16745]
66+
- KVM: SEV: Add KVM_SEV_SNP_LAUNCH_UPDATE command (Paolo Bonzini) [RHEL-16745]
67+
- KVM: SEV: Add KVM_SEV_SNP_LAUNCH_START command (Paolo Bonzini) [RHEL-16745]
68+
- KVM: SEV: Add initial SEV-SNP support (Paolo Bonzini) [RHEL-16745]
69+
- KVM: SEV: Select KVM_GENERIC_PRIVATE_MEM when CONFIG_KVM_AMD_SEV=y (Paolo Bonzini) [RHEL-16745]
70+
- KVM: MMU: Disable fast path if KVM_EXIT_MEMORY_FAULT is needed (Paolo Bonzini) [RHEL-16745]
71+
- KVM: x86: Add hook for determining max NPT mapping level (Paolo Bonzini) [RHEL-16745]
72+
- KVM: guest_memfd: Add hook for invalidating memory (Paolo Bonzini) [RHEL-16745]
73+
- KVM: guest_memfd: Add interface for populating gmem pages with user data (Paolo Bonzini) [RHEL-16745]
74+
- KVM: guest_memfd: extract __kvm_gmem_get_pfn() (Paolo Bonzini) [RHEL-16745]
75+
- KVM: guest_memfd: Add hook for initializing memory (Paolo Bonzini) [RHEL-16745]
76+
- KVM: guest_memfd: limit overzealous WARN (Paolo Bonzini) [RHEL-16745]
77+
- KVM: guest_memfd: pass error up from filemap_grab_folio (Paolo Bonzini) [RHEL-16745]
78+
- KVM: x86: Advertise max mappable GPA in CPUID.0x80000008.GuestPhysBits (Paolo Bonzini) [RHEL-16745]
79+
- KVM: x86: Don't advertise guest.MAXPHYADDR as host.MAXPHYADDR in CPUID (Paolo Bonzini) [RHEL-16745]
80+
- KVM: x86: Split core of hypercall emulation to helper function (Paolo Bonzini) [RHEL-16745]
81+
- KVM: SEV: Allow per-guest configuration of GHCB protocol version (Paolo Bonzini) [RHEL-16745]
82+
- KVM: SEV: Add GHCB handling for termination requests (Paolo Bonzini) [RHEL-16745]
83+
- KVM: SEV: Add GHCB handling for Hypervisor Feature Support requests (Paolo Bonzini) [RHEL-16745]
84+
- KVM: SEV: Add support to handle AP reset MSR protocol (Paolo Bonzini) [RHEL-16745]
85+
- KVM: x86/mmu: Sanity check that __kvm_faultin_pfn() doesn't create noslot pfns (Paolo Bonzini) [RHEL-16745]
86+
- KVM: x86/mmu: Initialize kvm_page_fault's pfn and hva to error values (Paolo Bonzini) [RHEL-16745]
87+
- KVM: x86/mmu: Set kvm_page_fault.hva to KVM_HVA_ERR_BAD for "no slot" faults (Paolo Bonzini) [RHEL-16745]
88+
- KVM: x86/mmu: Handle no-slot faults at the beginning of kvm_faultin_pfn() (Paolo Bonzini) [RHEL-16745]
89+
- KVM: x86/mmu: Move slot checks from __kvm_faultin_pfn() to kvm_faultin_pfn() (Paolo Bonzini) [RHEL-16745]
90+
- KVM: x86/mmu: Explicitly disallow private accesses to emulated MMIO (Paolo Bonzini) [RHEL-16745]
91+
- KVM: x86/mmu: Don't force emulation of L2 accesses to non-APIC internal slots (Paolo Bonzini) [RHEL-16745]
92+
- KVM: x86/mmu: Move private vs. shared check above slot validity checks (Paolo Bonzini) [RHEL-16745]
93+
- KVM: x86/mmu: WARN and skip MMIO cache on private, reserved page faults (Paolo Bonzini) [RHEL-16745]
94+
- KVM: x86/mmu: check for invalid async page faults involving private memory (Paolo Bonzini) [RHEL-16745]
95+
- KVM: x86/mmu: Use synthetic page fault error code to indicate private faults (Paolo Bonzini) [RHEL-16745]
96+
- KVM: x86/mmu: WARN if upper 32 bits of legacy #PF error code are non-zero (Paolo Bonzini) [RHEL-16745]
97+
- KVM: x86/mmu: Pass full 64-bit error code when handling page faults (Paolo Bonzini) [RHEL-16745]
98+
- KVM: x86: Move synthetic PFERR_* sanity checks to SVM's #NPF handler (Paolo Bonzini) [RHEL-16745]
99+
- KVM: x86: Define more SEV+ page fault error bits/flags for #NPF (Paolo Bonzini) [RHEL-16745]
100+
- KVM: x86: Remove separate "bit" defines for page fault error code masks (Paolo Bonzini) [RHEL-16745]
101+
- KVM: x86/mmu: Exit to userspace with -EFAULT if private fault hits emulation (Paolo Bonzini) [RHEL-16745]
102+
- KVM: x86: Disable KVM_INTEL_PROVE_VE by default (Paolo Bonzini) [RHEL-16745]
103+
- KVM: VMX: Enumerate EPT Violation #VE support in /proc/cpuinfo (Paolo Bonzini) [RHEL-16745]
104+
- KVM: x86/mmu: Print SPTEs on unexpected #VE (Paolo Bonzini) [RHEL-16745]
105+
- KVM: VMX: Dump VMCS on unexpected #VE (Paolo Bonzini) [RHEL-16745]
106+
- KVM: x86/mmu: Add sanity checks that KVM doesn't create EPT #VE SPTEs (Paolo Bonzini) [RHEL-16745]
107+
- KVM: nVMX: Always handle #VEs in L0 (never forward #VEs from L2 to L1) (Paolo Bonzini) [RHEL-16745]
108+
- KVM: nVMX: Initialize #VE info page for vmcs02 when proving #VE support (Paolo Bonzini) [RHEL-16745]
109+
- KVM: VMX: Don't kill the VM on an unexpected #VE (Paolo Bonzini) [RHEL-16745]
110+
- KVM: VMX: Introduce test mode related to EPT violation VE (Paolo Bonzini) [RHEL-16745]
111+
- KVM, x86: add architectural support code for #VE (Paolo Bonzini) [RHEL-16745]
112+
- KVM: x86/mmu: Track shadow MMIO value on a per-VM basis (Paolo Bonzini) [RHEL-16745]
113+
- KVM: x86/mmu: Add Suppress VE bit to EPT shadow_mmio_mask/shadow_present_mask (Paolo Bonzini) [RHEL-16745]
114+
- KVM: x86/mmu: Use SHADOW_NONPRESENT_VALUE for atomic zap in TDP MMU (Paolo Bonzini) [RHEL-16745]
115+
- KVM: x86/mmu: Fix a largely theoretical race in kvm_mmu_track_write() (Paolo Bonzini) [RHEL-16745]
116+
- KVM: x86/mmu: Process atomically-zapped SPTEs after TLB flush (Paolo Bonzini) [RHEL-16745]
117+
- KVM: x86/mmu: Allow non-zero value for non-present SPTE and removed SPTE (Paolo Bonzini) [RHEL-16745]
118+
- KVM: x86/mmu: Replace hardcoded value 0 for the initial value for SPTE (Paolo Bonzini) [RHEL-16745]
119+
- KVM: Allow page-sized MMU caches to be initialized with custom 64-bit values (Paolo Bonzini) [RHEL-16745]
120+
- KVM: delete .change_pte MMU notifier callback (Paolo Bonzini) [RHEL-16745]
121+
- KVM: x86: Explicitly zero kvm_caps during vendor module load (Paolo Bonzini) [RHEL-16745]
122+
- KVM: x86: Fully re-initialize supported_mce_cap on vendor module load (Paolo Bonzini) [RHEL-16745]
123+
- KVM: x86: Fully re-initialize supported_vm_types on vendor module load (Paolo Bonzini) [RHEL-16745]
124+
- selftests: kvm: add test for transferring FPU state into VMSA (Paolo Bonzini) [RHEL-16745]
125+
- selftests: kvm: split "launch" phase of SEV VM creation (Paolo Bonzini) [RHEL-16745]
126+
- selftests: kvm: switch to using KVM_X86_*_VM (Paolo Bonzini) [RHEL-16745]
127+
- selftests: kvm: add tests for KVM_SEV_INIT2 (Paolo Bonzini) [RHEL-16745]
128+
- KVM: SEV: allow SEV-ES DebugSwap again (Paolo Bonzini) [RHEL-16745]
129+
- KVM: SEV: introduce KVM_SEV_INIT2 operation (Paolo Bonzini) [RHEL-16745]
130+
- KVM: SEV: sync FPU and AVX state at LAUNCH_UPDATE_VMSA time (Paolo Bonzini) [RHEL-16745]
131+
- KVM: SEV: define VM types for SEV and SEV-ES (Paolo Bonzini) [RHEL-16745]
132+
- KVM: SEV: introduce to_kvm_sev_info (Paolo Bonzini) [RHEL-16745]
133+
- KVM: x86: Add supported_vm_types to kvm_caps (Paolo Bonzini) [RHEL-16745]
134+
- KVM: x86: add fields to struct kvm_arch for CoCo features (Paolo Bonzini) [RHEL-16745]
135+
- KVM: SEV: store VMSA features in kvm_sev_info (Paolo Bonzini) [RHEL-16745]
136+
- KVM: SEV: publish supported VMSA features (Paolo Bonzini) [RHEL-16745]
137+
- KVM: introduce new vendor op for KVM_GET_DEVICE_ATTR (Paolo Bonzini) [RHEL-16745]
138+
- KVM: x86: use u64_to_user_ptr() (Paolo Bonzini) [RHEL-16745]
139+
- KVM: SVM: Compile sev.c if and only if CONFIG_KVM_AMD_SEV=y (Paolo Bonzini) [RHEL-16745]
140+
- KVM: SVM: Invert handling of SEV and SEV_ES feature flags (Paolo Bonzini) [RHEL-16745]
141+
- Documentation: kvm/sev: clarify usage of KVM_MEMORY_ENCRYPT_OP (Paolo Bonzini) [RHEL-16745]
142+
- Documentation: kvm/sev: separate description of firmware (Paolo Bonzini) [RHEL-16745]
143+
- x86/CPU/AMD: Track SNP host status with cc_platform_*() (Paolo Bonzini) [RHEL-16745]
144+
- x86/cc: Add cc_platform_set/_clear() helpers (Paolo Bonzini) [RHEL-16745]
145+
- x86/kvm/Kconfig: Have KVM_AMD_SEV select ARCH_HAS_CC_PLATFORM (Paolo Bonzini) [RHEL-16745]
146+
- x86/tdx: Preserve shared bit on mprotect() (Paolo Bonzini) [RHEL-16745]
147+
- x86/sev: Check for MWAITX and MONITORX opcodes in the #VC handler (Paolo Bonzini) [RHEL-16745]
148+
- x86/CPU/AMD: Add models 0x10-0x1f to the Zen5 range (Paolo Bonzini) [RHEL-16745]
149+
- x86/CPU/AMD: Update the Zenbleed microcode revisions (Paolo Bonzini) [RHEL-16745]
150+
- crypto: ccp - Avoid discarding errors in psp_send_platform_access_msg() (Paolo Bonzini) [RHEL-16745]
151+
- crypto: ccp - State in dmesg that TSME is enabled (Paolo Bonzini) [RHEL-16745]
152+
- x86/sev: Disable KMSAN for memory encryption TUs (Paolo Bonzini) [RHEL-16745]
153+
- x86/sev: Dump SEV_STATUS (Paolo Bonzini) [RHEL-16745]
154+
- crypto: ccp - Have it depend on AMD_IOMMU (Paolo Bonzini) [RHEL-16745]
155+
- iommu/amd: Fix failure return from snp_lookup_rmpentry() (Paolo Bonzini) [RHEL-16745]
156+
- crypto: ccp: Make snp_range_list static (Paolo Bonzini) [RHEL-16745]
157+
- Documentation: virt: Fix up pre-formatted text block for SEV ioctls (Paolo Bonzini) [RHEL-16745]
158+
- crypto: ccp: Add the SNP_SET_CONFIG command (Paolo Bonzini) [RHEL-16745]
159+
- crypto: ccp: Add the SNP_COMMIT command (Paolo Bonzini) [RHEL-16745]
160+
- crypto: ccp: Add the SNP_PLATFORM_STATUS command (Paolo Bonzini) [RHEL-16745]
161+
- x86/cpufeatures: Enable/unmask SEV-SNP CPU feature (Paolo Bonzini) [RHEL-16745]
162+
- KVM: SEV: Make AVIC backing, VMSA and VMCB memory allocation SNP safe (Paolo Bonzini) [RHEL-16745]
163+
- crypto: ccp: Add panic notifier for SEV/SNP firmware shutdown on kdump (Paolo Bonzini) [RHEL-16745]
164+
- iommu/amd: Clean up RMP entries for IOMMU pages during SNP shutdown (Paolo Bonzini) [RHEL-16745]
165+
- crypto: ccp: Handle legacy SEV commands when SNP is enabled (Paolo Bonzini) [RHEL-16745]
166+
- crypto: ccp: Handle non-volatile INIT_EX data when SNP is enabled (Paolo Bonzini) [RHEL-16745]
167+
- crypto: ccp: Handle the legacy TMR allocation when SNP is enabled (Paolo Bonzini) [RHEL-16745]
168+
- x86/sev: Introduce an SNP leaked pages list (Paolo Bonzini) [RHEL-16745]
169+
- crypto: ccp: Provide an API to issue SEV and SNP commands (Paolo Bonzini) [RHEL-16745]
170+
- crypto: ccp: Add support to initialize the AMD-SP for SEV-SNP (Paolo Bonzini) [RHEL-16745]
171+
- crypto: ccp: Define the SEV-SNP commands (Paolo Bonzini) [RHEL-16745]
172+
- crypto: ccp - Fix null pointer dereference in __sev_platform_shutdown_locked (Paolo Bonzini) [RHEL-16745]
173+
- x86/sev: Adjust the directmap to avoid inadvertent RMP faults (Paolo Bonzini) [RHEL-16745]
174+
- x86/sev: Add helper functions for RMPUPDATE and PSMASH instruction (Paolo Bonzini) [RHEL-16745]
175+
- x86/fault: Dump RMP table information when RMP page faults occur (Paolo Bonzini) [RHEL-16745]
176+
- x86/traps: Define RMP violation #PF error code (Paolo Bonzini) [RHEL-16745]
177+
- x86/fault: Add helper for dumping RMP entries (Paolo Bonzini) [RHEL-16745]
178+
- x86/sev: Add RMP entry lookup helpers (Paolo Bonzini) [RHEL-16745]
179+
- x86/sev: Add SEV-SNP host initialization support (Paolo Bonzini) [RHEL-16745]
180+
- x86/mtrr: Don't print errors if MtrrFixDramModEn is set when SNP enabled (Paolo Bonzini) [RHEL-16745]
181+
- iommu/amd: Don't rely on external callers to enable IOMMU SNP support (Paolo Bonzini) [RHEL-16745]
182+
- x86/speculation: Do not enable Automatic IBRS if SEV-SNP is enabled (Paolo Bonzini) [RHEL-16745]
183+
- x86/cpufeatures: Add SEV-SNP CPU feature (Paolo Bonzini) [RHEL-16745]
184+
- x86/CPU/AMD: Do the common init on future Zens too (Paolo Bonzini) [RHEL-16745]
185+
- x86/CPU/AMD: Add more models to X86_FEATURE_ZEN5 (Paolo Bonzini) [RHEL-16745]
186+
- x86/CPU/AMD: Add X86_FEATURE_ZEN5 (Paolo Bonzini) [RHEL-16745]
187+
- x86/CPU/AMD: Add X86_FEATURE_ZEN1 (Paolo Bonzini) [RHEL-16745]
188+
- x86/CPU/AMD: Drop now unused CPU erratum checking function (Paolo Bonzini) [RHEL-16745]
189+
- x86/CPU/AMD: Get rid of amd_erratum_1485[] (Paolo Bonzini) [RHEL-16745]
190+
- x86/CPU/AMD: Get rid of amd_erratum_400[] (Paolo Bonzini) [RHEL-16745]
191+
- x86/CPU/AMD: Get rid of amd_erratum_383[] (Paolo Bonzini) [RHEL-16745]
192+
- x86/CPU/AMD: Get rid of amd_erratum_1054[] (Paolo Bonzini) [RHEL-16745]
193+
- x86/CPU/AMD: Move the DIV0 bug detection to the Zen1 init function (Paolo Bonzini) [RHEL-16745]
194+
- x86/CPU/AMD: Move Zenbleed check to the Zen2 init function (Paolo Bonzini) [RHEL-16745]
195+
- x86/CPU/AMD: Rename init_amd_zn() to init_amd_zen_common() (Paolo Bonzini) [RHEL-16745]
196+
- x86/CPU/AMD: Call the spectral chicken in the Zen2 init function (Paolo Bonzini) [RHEL-16745]
197+
- x86/CPU/AMD: Move erratum 1076 fix into the Zen1 init function (Paolo Bonzini) [RHEL-16745]
198+
- x86/CPU/AMD: Move the Zen3 BTC_NO detection to the Zen3 init function (Paolo Bonzini) [RHEL-16745]
199+
- x86/CPU/AMD: Carve out the erratum 1386 fix (Paolo Bonzini) [RHEL-16745]
200+
- x86/sev: Fix position dependent variable references in startup code (Paolo Bonzini) [RHEL-16745]
201+
- x86/Kconfig: Remove CONFIG_AMD_MEM_ENCRYPT_ACTIVE_BY_DEFAULT (Paolo Bonzini) [RHEL-16745]
202+
- x86/sme: Fix memory encryption setting if enabled by default and not overridden (Paolo Bonzini) [RHEL-16745]
203+
Resolves: RHEL-16745, RHEL-33321, RHEL-35058, RHEL-36084, RHEL-38415, RHEL-39354, RHEL-39715, RHEL-44375, RHEL-45534, RHEL-46817, RHEL-7961
204+
1205
* Tue Jul 09 2024 Lucas Zampieri <lzampier@redhat.com> [5.14.0-478.el9]
2206
- netfilter: conntrack: switch connlabels to atomic_t (Xin Long) [RHEL-28816]
3207
- sched: act_ct: add netns into the key of tcf_ct_flow_table (Xin Long) [RHEL-28816]

0 commit comments

Comments
 (0)