|
| 1 | +* Wed Jul 10 2024 Lucas Zampieri <lzampier@redhat.com> [5.14.0-479.el9] |
| 2 | +- REDHAT: Makefile, dont reset dist-git-tmp if set (Lucas Zampieri) |
| 3 | +- Revert "REDHAT: Fix values in Makefile being redefined" (Lucas Zampieri) |
| 4 | +- tools/power turbostat: Add local build_bug.h header for snapshot target (David Arcari) [RHEL-33321] |
| 5 | +- tools/power turbostat: Fix unc freq columns not showing with '-q' or '-l' (David Arcari) [RHEL-33321] |
| 6 | +- tools/power turbostat: option '-n' is ambiguous (David Arcari) [RHEL-33321 RHEL-36084] |
| 7 | +- tools/power turbostat: version 2024.05.10 (David Arcari) [RHEL-33321] |
| 8 | +- tools/power turbostat: Ignore pkg_cstate_limit when it is not available (David Arcari) [RHEL-33321] |
| 9 | +- tools/power turbostat: Fix order of strings in pkg_cstate_limit_strings (David Arcari) [RHEL-33321] |
| 10 | +- tools/power turbostat: Read Package-cstates via perf (David Arcari) [RHEL-33321] |
| 11 | +- tools/power turbostat: Read Core-cstates via perf (David Arcari) [RHEL-33321] |
| 12 | +- tools/power turbostat: Avoid possible memory corruption due to sparse topology IDs (David Arcari) [RHEL-33321] |
| 13 | +- tools/power turbostat: Add columns for clustered uncore frequency (David Arcari) [RHEL-33321] |
| 14 | +- tools/power turbostat: Enable non-privileged users to read sysfs counters (David Arcari) [RHEL-33321] |
| 15 | +- tools/power turbostat: Replace _Static_assert with BUILD_BUG_ON (David Arcari) [RHEL-33321] |
| 16 | +- tools/power turbostat: Add ARL-H support (David Arcari) [RHEL-33321] |
| 17 | +- tools/power turbostat: Enhance ARL/LNL support (David Arcari) [RHEL-33321] |
| 18 | +- tools/power turbostat: Survive sparse die_id (David Arcari) [RHEL-33321] |
| 19 | +- tools/power turbostat: Remember global max_die_id (David Arcari) [RHEL-33321] |
| 20 | +- tools/power turbostat: Harden probe_intel_uncore_frequency() (David Arcari) [RHEL-33321] |
| 21 | +- tools/power turbostat: Add "snapshot:" Makefile target (David Arcari) [RHEL-33321] |
| 22 | +- platform/x86:intel/pmc: Enable S0ix blocker show in Lunar Lake (Steve Best) [RHEL-46817] |
| 23 | +- platform/x86:intel/pmc: Update LNL signal status map (Steve Best) [RHEL-46817] |
| 24 | +- platform/x86:intel/pmc: Add support to show S0ix blocker counter (Steve Best) [RHEL-46817] |
| 25 | +- platform/x86/intel/pmc: Fix PCH names in comments (Steve Best) [RHEL-46817] |
| 26 | +- platform/x86/intel/pmc: Improve PKGC residency counters debug (Steve Best) [RHEL-46817] |
| 27 | +- platform/x86/intel/pmc/arl: Put GNA device in D3 (Steve Best) [RHEL-46817] |
| 28 | +- net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc() (Davide Caratti) [RHEL-45534] |
| 29 | +- net/sched: taprio: extend minimum interval restriction to entire cycle too (Davide Caratti) [RHEL-44375 RHEL-45534] {CVE-2024-36244} |
| 30 | +- net/sched: taprio: make q->picos_per_byte available to fill_sched_entry() (Davide Caratti) [RHEL-44375 RHEL-45534] {CVE-2024-36244} |
| 31 | +- rtnetlink: Correct nested IFLA_VF_VLAN_LIST attribute validation (Davide Caratti) [RHEL-39715] {CVE-2024-36017} |
| 32 | +- xfs: process free extents to busy list in FIFO order (Pavel Reichl) [RHEL-7961] |
| 33 | +- xfs: adjust the incore perag block_count when shrinking (Pavel Reichl) [RHEL-7961] |
| 34 | +- xfs: abort fstrim if kernel is suspending (Pavel Reichl) [RHEL-7961] |
| 35 | +- xfs: reduce AGF hold times during fstrim operations (Pavel Reichl) [RHEL-7961] |
| 36 | +- xfs: move log discard work to xfs_discard.c (Pavel Reichl) [RHEL-7961] |
| 37 | +- can: j1939: j1939_netdev_start(): fix UAF for rx_kref of j1939_priv (Ken Cox) [RHEL-38415] {CVE-2021-47459} |
| 38 | +- tty: n_gsm: fix possible out-of-bounds in gsm0_receive() (Steve Best) [RHEL-39354] {CVE-2024-36016} |
| 39 | +- net/sched: initialize noop_qdisc owner (Davide Caratti) [RHEL-35058] |
| 40 | +- net/sched: Fix mirred deadlock on device recursion (Davide Caratti) [RHEL-35058] {CVE-2024-27010} |
| 41 | +- KVM: SEV-ES: Fix svm_get_msr()/svm_set_msr() for KVM_SEV_ES_INIT guests (Paolo Bonzini) [RHEL-16745] |
| 42 | +- x86/e820: Add a new e820 table update helper (Paolo Bonzini) [RHEL-16745] |
| 43 | +- x86/sev: Add callback to apply RMP table fixups for kexec (Paolo Bonzini) [RHEL-16745] |
| 44 | +- x86/kexec: Do not update E820 kexec table for setup_data (Paolo Bonzini) [RHEL-16745] |
| 45 | +- x86/e820: Don't reserve SETUP_RNG_SEED in e820 (Paolo Bonzini) [RHEL-16745] |
| 46 | +- redhat: add new configs (Paolo Bonzini) [RHEL-16745] |
| 47 | +- KVM: SNP: Fix LBR Virtualization for SNP guest (Paolo Bonzini) [RHEL-16745] |
| 48 | +- KVM: x86/mmu: Don't save mmu_invalidate_seq after checking private attr (Paolo Bonzini) [RHEL-16745] |
| 49 | +- KVM: SEV-ES: Delegate LBR virtualization to the processor (Paolo Bonzini) [RHEL-16745] |
| 50 | +- KVM: SEV-ES: Disallow SEV-ES guests when X86_FEATURE_LBRV is absent (Paolo Bonzini) [RHEL-16745] |
| 51 | +- KVM: SEV-ES: Prevent MSR access post VMSA encryption (Paolo Bonzini) [RHEL-16745] |
| 52 | +- KVM: SVM: Remove the need to trigger an UNBLOCK event on AP creation (Paolo Bonzini) [RHEL-16745] |
| 53 | +- KVM: SEV: Don't WARN() if RMP lookup fails when invalidating gmem pages (Paolo Bonzini) [RHEL-16745] |
| 54 | +- KVM: SEV: Automatically switch reclaimed pages to shared (Paolo Bonzini) [RHEL-16745] |
| 55 | +- KVM: SVM: Add module parameter to enable SEV-SNP (Paolo Bonzini) [RHEL-16745] |
| 56 | +- KVM: SEV: Avoid WBINVD for HVA-based MMU notifications for SNP (Paolo Bonzini) [RHEL-16745] |
| 57 | +- KVM: x86: Implement hook for determining max NPT mapping level (Paolo Bonzini) [RHEL-16745] |
| 58 | +- KVM: SEV: Implement gmem hook for invalidating private pages (Paolo Bonzini) [RHEL-16745] |
| 59 | +- KVM: SEV: Implement gmem hook for initializing private pages (Paolo Bonzini) [RHEL-16745] |
| 60 | +- KVM: SEV: Support SEV-SNP AP Creation NAE event (Paolo Bonzini) [RHEL-16745] |
| 61 | +- KVM: SEV: Add support to handle RMP nested page faults (Paolo Bonzini) [RHEL-16745] |
| 62 | +- KVM: SEV: Add support to handle Page State Change VMGEXIT (Paolo Bonzini) [RHEL-16745] |
| 63 | +- KVM: SEV: Add support to handle MSR based Page State Change VMGEXIT (Paolo Bonzini) [RHEL-16745] |
| 64 | +- KVM: SEV: Add support to handle GHCB GPA register VMGEXIT (Paolo Bonzini) [RHEL-16745] |
| 65 | +- KVM: SEV: Add KVM_SEV_SNP_LAUNCH_FINISH command (Paolo Bonzini) [RHEL-16745] |
| 66 | +- KVM: SEV: Add KVM_SEV_SNP_LAUNCH_UPDATE command (Paolo Bonzini) [RHEL-16745] |
| 67 | +- KVM: SEV: Add KVM_SEV_SNP_LAUNCH_START command (Paolo Bonzini) [RHEL-16745] |
| 68 | +- KVM: SEV: Add initial SEV-SNP support (Paolo Bonzini) [RHEL-16745] |
| 69 | +- KVM: SEV: Select KVM_GENERIC_PRIVATE_MEM when CONFIG_KVM_AMD_SEV=y (Paolo Bonzini) [RHEL-16745] |
| 70 | +- KVM: MMU: Disable fast path if KVM_EXIT_MEMORY_FAULT is needed (Paolo Bonzini) [RHEL-16745] |
| 71 | +- KVM: x86: Add hook for determining max NPT mapping level (Paolo Bonzini) [RHEL-16745] |
| 72 | +- KVM: guest_memfd: Add hook for invalidating memory (Paolo Bonzini) [RHEL-16745] |
| 73 | +- KVM: guest_memfd: Add interface for populating gmem pages with user data (Paolo Bonzini) [RHEL-16745] |
| 74 | +- KVM: guest_memfd: extract __kvm_gmem_get_pfn() (Paolo Bonzini) [RHEL-16745] |
| 75 | +- KVM: guest_memfd: Add hook for initializing memory (Paolo Bonzini) [RHEL-16745] |
| 76 | +- KVM: guest_memfd: limit overzealous WARN (Paolo Bonzini) [RHEL-16745] |
| 77 | +- KVM: guest_memfd: pass error up from filemap_grab_folio (Paolo Bonzini) [RHEL-16745] |
| 78 | +- KVM: x86: Advertise max mappable GPA in CPUID.0x80000008.GuestPhysBits (Paolo Bonzini) [RHEL-16745] |
| 79 | +- KVM: x86: Don't advertise guest.MAXPHYADDR as host.MAXPHYADDR in CPUID (Paolo Bonzini) [RHEL-16745] |
| 80 | +- KVM: x86: Split core of hypercall emulation to helper function (Paolo Bonzini) [RHEL-16745] |
| 81 | +- KVM: SEV: Allow per-guest configuration of GHCB protocol version (Paolo Bonzini) [RHEL-16745] |
| 82 | +- KVM: SEV: Add GHCB handling for termination requests (Paolo Bonzini) [RHEL-16745] |
| 83 | +- KVM: SEV: Add GHCB handling for Hypervisor Feature Support requests (Paolo Bonzini) [RHEL-16745] |
| 84 | +- KVM: SEV: Add support to handle AP reset MSR protocol (Paolo Bonzini) [RHEL-16745] |
| 85 | +- KVM: x86/mmu: Sanity check that __kvm_faultin_pfn() doesn't create noslot pfns (Paolo Bonzini) [RHEL-16745] |
| 86 | +- KVM: x86/mmu: Initialize kvm_page_fault's pfn and hva to error values (Paolo Bonzini) [RHEL-16745] |
| 87 | +- KVM: x86/mmu: Set kvm_page_fault.hva to KVM_HVA_ERR_BAD for "no slot" faults (Paolo Bonzini) [RHEL-16745] |
| 88 | +- KVM: x86/mmu: Handle no-slot faults at the beginning of kvm_faultin_pfn() (Paolo Bonzini) [RHEL-16745] |
| 89 | +- KVM: x86/mmu: Move slot checks from __kvm_faultin_pfn() to kvm_faultin_pfn() (Paolo Bonzini) [RHEL-16745] |
| 90 | +- KVM: x86/mmu: Explicitly disallow private accesses to emulated MMIO (Paolo Bonzini) [RHEL-16745] |
| 91 | +- KVM: x86/mmu: Don't force emulation of L2 accesses to non-APIC internal slots (Paolo Bonzini) [RHEL-16745] |
| 92 | +- KVM: x86/mmu: Move private vs. shared check above slot validity checks (Paolo Bonzini) [RHEL-16745] |
| 93 | +- KVM: x86/mmu: WARN and skip MMIO cache on private, reserved page faults (Paolo Bonzini) [RHEL-16745] |
| 94 | +- KVM: x86/mmu: check for invalid async page faults involving private memory (Paolo Bonzini) [RHEL-16745] |
| 95 | +- KVM: x86/mmu: Use synthetic page fault error code to indicate private faults (Paolo Bonzini) [RHEL-16745] |
| 96 | +- KVM: x86/mmu: WARN if upper 32 bits of legacy #PF error code are non-zero (Paolo Bonzini) [RHEL-16745] |
| 97 | +- KVM: x86/mmu: Pass full 64-bit error code when handling page faults (Paolo Bonzini) [RHEL-16745] |
| 98 | +- KVM: x86: Move synthetic PFERR_* sanity checks to SVM's #NPF handler (Paolo Bonzini) [RHEL-16745] |
| 99 | +- KVM: x86: Define more SEV+ page fault error bits/flags for #NPF (Paolo Bonzini) [RHEL-16745] |
| 100 | +- KVM: x86: Remove separate "bit" defines for page fault error code masks (Paolo Bonzini) [RHEL-16745] |
| 101 | +- KVM: x86/mmu: Exit to userspace with -EFAULT if private fault hits emulation (Paolo Bonzini) [RHEL-16745] |
| 102 | +- KVM: x86: Disable KVM_INTEL_PROVE_VE by default (Paolo Bonzini) [RHEL-16745] |
| 103 | +- KVM: VMX: Enumerate EPT Violation #VE support in /proc/cpuinfo (Paolo Bonzini) [RHEL-16745] |
| 104 | +- KVM: x86/mmu: Print SPTEs on unexpected #VE (Paolo Bonzini) [RHEL-16745] |
| 105 | +- KVM: VMX: Dump VMCS on unexpected #VE (Paolo Bonzini) [RHEL-16745] |
| 106 | +- KVM: x86/mmu: Add sanity checks that KVM doesn't create EPT #VE SPTEs (Paolo Bonzini) [RHEL-16745] |
| 107 | +- KVM: nVMX: Always handle #VEs in L0 (never forward #VEs from L2 to L1) (Paolo Bonzini) [RHEL-16745] |
| 108 | +- KVM: nVMX: Initialize #VE info page for vmcs02 when proving #VE support (Paolo Bonzini) [RHEL-16745] |
| 109 | +- KVM: VMX: Don't kill the VM on an unexpected #VE (Paolo Bonzini) [RHEL-16745] |
| 110 | +- KVM: VMX: Introduce test mode related to EPT violation VE (Paolo Bonzini) [RHEL-16745] |
| 111 | +- KVM, x86: add architectural support code for #VE (Paolo Bonzini) [RHEL-16745] |
| 112 | +- KVM: x86/mmu: Track shadow MMIO value on a per-VM basis (Paolo Bonzini) [RHEL-16745] |
| 113 | +- KVM: x86/mmu: Add Suppress VE bit to EPT shadow_mmio_mask/shadow_present_mask (Paolo Bonzini) [RHEL-16745] |
| 114 | +- KVM: x86/mmu: Use SHADOW_NONPRESENT_VALUE for atomic zap in TDP MMU (Paolo Bonzini) [RHEL-16745] |
| 115 | +- KVM: x86/mmu: Fix a largely theoretical race in kvm_mmu_track_write() (Paolo Bonzini) [RHEL-16745] |
| 116 | +- KVM: x86/mmu: Process atomically-zapped SPTEs after TLB flush (Paolo Bonzini) [RHEL-16745] |
| 117 | +- KVM: x86/mmu: Allow non-zero value for non-present SPTE and removed SPTE (Paolo Bonzini) [RHEL-16745] |
| 118 | +- KVM: x86/mmu: Replace hardcoded value 0 for the initial value for SPTE (Paolo Bonzini) [RHEL-16745] |
| 119 | +- KVM: Allow page-sized MMU caches to be initialized with custom 64-bit values (Paolo Bonzini) [RHEL-16745] |
| 120 | +- KVM: delete .change_pte MMU notifier callback (Paolo Bonzini) [RHEL-16745] |
| 121 | +- KVM: x86: Explicitly zero kvm_caps during vendor module load (Paolo Bonzini) [RHEL-16745] |
| 122 | +- KVM: x86: Fully re-initialize supported_mce_cap on vendor module load (Paolo Bonzini) [RHEL-16745] |
| 123 | +- KVM: x86: Fully re-initialize supported_vm_types on vendor module load (Paolo Bonzini) [RHEL-16745] |
| 124 | +- selftests: kvm: add test for transferring FPU state into VMSA (Paolo Bonzini) [RHEL-16745] |
| 125 | +- selftests: kvm: split "launch" phase of SEV VM creation (Paolo Bonzini) [RHEL-16745] |
| 126 | +- selftests: kvm: switch to using KVM_X86_*_VM (Paolo Bonzini) [RHEL-16745] |
| 127 | +- selftests: kvm: add tests for KVM_SEV_INIT2 (Paolo Bonzini) [RHEL-16745] |
| 128 | +- KVM: SEV: allow SEV-ES DebugSwap again (Paolo Bonzini) [RHEL-16745] |
| 129 | +- KVM: SEV: introduce KVM_SEV_INIT2 operation (Paolo Bonzini) [RHEL-16745] |
| 130 | +- KVM: SEV: sync FPU and AVX state at LAUNCH_UPDATE_VMSA time (Paolo Bonzini) [RHEL-16745] |
| 131 | +- KVM: SEV: define VM types for SEV and SEV-ES (Paolo Bonzini) [RHEL-16745] |
| 132 | +- KVM: SEV: introduce to_kvm_sev_info (Paolo Bonzini) [RHEL-16745] |
| 133 | +- KVM: x86: Add supported_vm_types to kvm_caps (Paolo Bonzini) [RHEL-16745] |
| 134 | +- KVM: x86: add fields to struct kvm_arch for CoCo features (Paolo Bonzini) [RHEL-16745] |
| 135 | +- KVM: SEV: store VMSA features in kvm_sev_info (Paolo Bonzini) [RHEL-16745] |
| 136 | +- KVM: SEV: publish supported VMSA features (Paolo Bonzini) [RHEL-16745] |
| 137 | +- KVM: introduce new vendor op for KVM_GET_DEVICE_ATTR (Paolo Bonzini) [RHEL-16745] |
| 138 | +- KVM: x86: use u64_to_user_ptr() (Paolo Bonzini) [RHEL-16745] |
| 139 | +- KVM: SVM: Compile sev.c if and only if CONFIG_KVM_AMD_SEV=y (Paolo Bonzini) [RHEL-16745] |
| 140 | +- KVM: SVM: Invert handling of SEV and SEV_ES feature flags (Paolo Bonzini) [RHEL-16745] |
| 141 | +- Documentation: kvm/sev: clarify usage of KVM_MEMORY_ENCRYPT_OP (Paolo Bonzini) [RHEL-16745] |
| 142 | +- Documentation: kvm/sev: separate description of firmware (Paolo Bonzini) [RHEL-16745] |
| 143 | +- x86/CPU/AMD: Track SNP host status with cc_platform_*() (Paolo Bonzini) [RHEL-16745] |
| 144 | +- x86/cc: Add cc_platform_set/_clear() helpers (Paolo Bonzini) [RHEL-16745] |
| 145 | +- x86/kvm/Kconfig: Have KVM_AMD_SEV select ARCH_HAS_CC_PLATFORM (Paolo Bonzini) [RHEL-16745] |
| 146 | +- x86/tdx: Preserve shared bit on mprotect() (Paolo Bonzini) [RHEL-16745] |
| 147 | +- x86/sev: Check for MWAITX and MONITORX opcodes in the #VC handler (Paolo Bonzini) [RHEL-16745] |
| 148 | +- x86/CPU/AMD: Add models 0x10-0x1f to the Zen5 range (Paolo Bonzini) [RHEL-16745] |
| 149 | +- x86/CPU/AMD: Update the Zenbleed microcode revisions (Paolo Bonzini) [RHEL-16745] |
| 150 | +- crypto: ccp - Avoid discarding errors in psp_send_platform_access_msg() (Paolo Bonzini) [RHEL-16745] |
| 151 | +- crypto: ccp - State in dmesg that TSME is enabled (Paolo Bonzini) [RHEL-16745] |
| 152 | +- x86/sev: Disable KMSAN for memory encryption TUs (Paolo Bonzini) [RHEL-16745] |
| 153 | +- x86/sev: Dump SEV_STATUS (Paolo Bonzini) [RHEL-16745] |
| 154 | +- crypto: ccp - Have it depend on AMD_IOMMU (Paolo Bonzini) [RHEL-16745] |
| 155 | +- iommu/amd: Fix failure return from snp_lookup_rmpentry() (Paolo Bonzini) [RHEL-16745] |
| 156 | +- crypto: ccp: Make snp_range_list static (Paolo Bonzini) [RHEL-16745] |
| 157 | +- Documentation: virt: Fix up pre-formatted text block for SEV ioctls (Paolo Bonzini) [RHEL-16745] |
| 158 | +- crypto: ccp: Add the SNP_SET_CONFIG command (Paolo Bonzini) [RHEL-16745] |
| 159 | +- crypto: ccp: Add the SNP_COMMIT command (Paolo Bonzini) [RHEL-16745] |
| 160 | +- crypto: ccp: Add the SNP_PLATFORM_STATUS command (Paolo Bonzini) [RHEL-16745] |
| 161 | +- x86/cpufeatures: Enable/unmask SEV-SNP CPU feature (Paolo Bonzini) [RHEL-16745] |
| 162 | +- KVM: SEV: Make AVIC backing, VMSA and VMCB memory allocation SNP safe (Paolo Bonzini) [RHEL-16745] |
| 163 | +- crypto: ccp: Add panic notifier for SEV/SNP firmware shutdown on kdump (Paolo Bonzini) [RHEL-16745] |
| 164 | +- iommu/amd: Clean up RMP entries for IOMMU pages during SNP shutdown (Paolo Bonzini) [RHEL-16745] |
| 165 | +- crypto: ccp: Handle legacy SEV commands when SNP is enabled (Paolo Bonzini) [RHEL-16745] |
| 166 | +- crypto: ccp: Handle non-volatile INIT_EX data when SNP is enabled (Paolo Bonzini) [RHEL-16745] |
| 167 | +- crypto: ccp: Handle the legacy TMR allocation when SNP is enabled (Paolo Bonzini) [RHEL-16745] |
| 168 | +- x86/sev: Introduce an SNP leaked pages list (Paolo Bonzini) [RHEL-16745] |
| 169 | +- crypto: ccp: Provide an API to issue SEV and SNP commands (Paolo Bonzini) [RHEL-16745] |
| 170 | +- crypto: ccp: Add support to initialize the AMD-SP for SEV-SNP (Paolo Bonzini) [RHEL-16745] |
| 171 | +- crypto: ccp: Define the SEV-SNP commands (Paolo Bonzini) [RHEL-16745] |
| 172 | +- crypto: ccp - Fix null pointer dereference in __sev_platform_shutdown_locked (Paolo Bonzini) [RHEL-16745] |
| 173 | +- x86/sev: Adjust the directmap to avoid inadvertent RMP faults (Paolo Bonzini) [RHEL-16745] |
| 174 | +- x86/sev: Add helper functions for RMPUPDATE and PSMASH instruction (Paolo Bonzini) [RHEL-16745] |
| 175 | +- x86/fault: Dump RMP table information when RMP page faults occur (Paolo Bonzini) [RHEL-16745] |
| 176 | +- x86/traps: Define RMP violation #PF error code (Paolo Bonzini) [RHEL-16745] |
| 177 | +- x86/fault: Add helper for dumping RMP entries (Paolo Bonzini) [RHEL-16745] |
| 178 | +- x86/sev: Add RMP entry lookup helpers (Paolo Bonzini) [RHEL-16745] |
| 179 | +- x86/sev: Add SEV-SNP host initialization support (Paolo Bonzini) [RHEL-16745] |
| 180 | +- x86/mtrr: Don't print errors if MtrrFixDramModEn is set when SNP enabled (Paolo Bonzini) [RHEL-16745] |
| 181 | +- iommu/amd: Don't rely on external callers to enable IOMMU SNP support (Paolo Bonzini) [RHEL-16745] |
| 182 | +- x86/speculation: Do not enable Automatic IBRS if SEV-SNP is enabled (Paolo Bonzini) [RHEL-16745] |
| 183 | +- x86/cpufeatures: Add SEV-SNP CPU feature (Paolo Bonzini) [RHEL-16745] |
| 184 | +- x86/CPU/AMD: Do the common init on future Zens too (Paolo Bonzini) [RHEL-16745] |
| 185 | +- x86/CPU/AMD: Add more models to X86_FEATURE_ZEN5 (Paolo Bonzini) [RHEL-16745] |
| 186 | +- x86/CPU/AMD: Add X86_FEATURE_ZEN5 (Paolo Bonzini) [RHEL-16745] |
| 187 | +- x86/CPU/AMD: Add X86_FEATURE_ZEN1 (Paolo Bonzini) [RHEL-16745] |
| 188 | +- x86/CPU/AMD: Drop now unused CPU erratum checking function (Paolo Bonzini) [RHEL-16745] |
| 189 | +- x86/CPU/AMD: Get rid of amd_erratum_1485[] (Paolo Bonzini) [RHEL-16745] |
| 190 | +- x86/CPU/AMD: Get rid of amd_erratum_400[] (Paolo Bonzini) [RHEL-16745] |
| 191 | +- x86/CPU/AMD: Get rid of amd_erratum_383[] (Paolo Bonzini) [RHEL-16745] |
| 192 | +- x86/CPU/AMD: Get rid of amd_erratum_1054[] (Paolo Bonzini) [RHEL-16745] |
| 193 | +- x86/CPU/AMD: Move the DIV0 bug detection to the Zen1 init function (Paolo Bonzini) [RHEL-16745] |
| 194 | +- x86/CPU/AMD: Move Zenbleed check to the Zen2 init function (Paolo Bonzini) [RHEL-16745] |
| 195 | +- x86/CPU/AMD: Rename init_amd_zn() to init_amd_zen_common() (Paolo Bonzini) [RHEL-16745] |
| 196 | +- x86/CPU/AMD: Call the spectral chicken in the Zen2 init function (Paolo Bonzini) [RHEL-16745] |
| 197 | +- x86/CPU/AMD: Move erratum 1076 fix into the Zen1 init function (Paolo Bonzini) [RHEL-16745] |
| 198 | +- x86/CPU/AMD: Move the Zen3 BTC_NO detection to the Zen3 init function (Paolo Bonzini) [RHEL-16745] |
| 199 | +- x86/CPU/AMD: Carve out the erratum 1386 fix (Paolo Bonzini) [RHEL-16745] |
| 200 | +- x86/sev: Fix position dependent variable references in startup code (Paolo Bonzini) [RHEL-16745] |
| 201 | +- x86/Kconfig: Remove CONFIG_AMD_MEM_ENCRYPT_ACTIVE_BY_DEFAULT (Paolo Bonzini) [RHEL-16745] |
| 202 | +- x86/sme: Fix memory encryption setting if enabled by default and not overridden (Paolo Bonzini) [RHEL-16745] |
| 203 | +Resolves: RHEL-16745, RHEL-33321, RHEL-35058, RHEL-36084, RHEL-38415, RHEL-39354, RHEL-39715, RHEL-44375, RHEL-45534, RHEL-46817, RHEL-7961 |
| 204 | + |
1 | 205 | * Tue Jul 09 2024 Lucas Zampieri <lzampier@redhat.com> [5.14.0-478.el9] |
2 | 206 | - netfilter: conntrack: switch connlabels to atomic_t (Xin Long) [RHEL-28816] |
3 | 207 | - sched: act_ct: add netns into the key of tcf_ct_flow_table (Xin Long) [RHEL-28816] |
|
0 commit comments