From c10974250b4ffc9f3208824771b559f98f0d2559 Mon Sep 17 00:00:00 2001
From: Peridot Bot <rockyautomation@rockylinux.org>
Date: Wed, 8 Jan 2025 07:23:17 +0000
Subject: [PATCH] import kernel-5.14.0-503.21.1.el9_5

---
 .kernel.checksum             |   2 +-
 .kernel.metadata             |  12 ++------
 SOURCES/Makefile.rhelver     |   2 +-
 SOURCES/kernel.changelog     |  49 ++++++++++++++++++++++++++++++
 SOURCES/nvidiagpuoot001.x509 | Bin 0 -> 1416 bytes
 SOURCES/rheldup3.x509        | Bin 0 -> 1198 bytes
 SOURCES/rhelima.x509         | Bin 0 -> 727 bytes
 SOURCES/rhelima_centos.x509  | Bin 0 -> 726 bytes
 SOURCES/rhelimaca1.x509      | Bin 0 -> 908 bytes
 SOURCES/rhelkpatch1.x509     | Bin 0 -> 1176 bytes
 SPECS/kernel.spec            |  57 ++++++++++++++++++++++++++++++++---
 11 files changed, 106 insertions(+), 16 deletions(-)
 create mode 100644 SOURCES/nvidiagpuoot001.x509
 create mode 100644 SOURCES/rheldup3.x509
 create mode 100644 SOURCES/rhelima.x509
 create mode 100644 SOURCES/rhelima_centos.x509
 create mode 100644 SOURCES/rhelimaca1.x509
 create mode 100644 SOURCES/rhelkpatch1.x509

diff --git a/.kernel.checksum b/.kernel.checksum
index 0d38cec..c8bd85d 100644
--- a/.kernel.checksum
+++ b/.kernel.checksum
@@ -1 +1 @@
-18a65a2cef93a1180a8ab86f6fdf6ec14c2835a51a9fafc8d0d2e77444ee3441
+b2dbb36c2dee70eaa9fb8af57369709fda48deb030fbc41523f7c7c0f6f54a6b
diff --git a/.kernel.metadata b/.kernel.metadata
index a79558f..ad62cb5 100644
--- a/.kernel.metadata
+++ b/.kernel.metadata
@@ -1,9 +1,3 @@
-a0d1d9d826f5cd9019a9a43ce009d9b64f217ba65a4597d527fc13061db1cd53 SOURCES/kernel-abi-stablelists-5.14.0-503.19.1.el9_5.tar.bz2
-3167413ce4e53f0e473277ab4c0d6655974e977af0f45b6d94ebad659bde40d0 SOURCES/kernel-kabi-dw-5.14.0-503.19.1.el9_5.tar.bz2
-047b0f26d41b81a709d036e1fb7763f5a42757b636eb1b269447f100aced700f SOURCES/linux-5.14.0-503.19.1.el9_5.tar.xz
-ca3aa0979f9426736d382747bba165e71ea4c42a2fb736d78fd8a4c4b7b58ad4 SOURCES/nvidiagpuoot001.x509
-af61197112f29a3a52f3825d363fe3103dc98cad269763071ee86eb2aedc139b SOURCES/rheldup3.x509
-b466265282193c17b3256b199ecc3bdd986797b4a82ad841de4a132132e9f6ab SOURCES/rhelima.x509
-535ad7cda08187bc7dc22c62456e10990a42d7f87d1c741454525d1035430ebe SOURCES/rhelima_centos.x509
-adf5bbf5871e9658adaeadcfb7d6f7592f1091f8701c1e06dff9bd99cc893dda SOURCES/rhelimaca1.x509
-59385d0b89010159180c6aa71a06f46e3381f6576341627b4b96363dfceeed68 SOURCES/rhelkpatch1.x509
+c0aee52727293519687cc774a44d374a30b7bd335628b4019890d5046f1215e6 SOURCES/kernel-abi-stablelists-5.14.0-503.21.1.el9_5.tar.bz2
+c1e74a6d4feeed9704fd6482b64fce070dde5c9e0e9a16f6571868d0e3fcf1b1 SOURCES/kernel-kabi-dw-5.14.0-503.21.1.el9_5.tar.bz2
+39e2cb29ddffe791a2f993367c2acca97c071478438e139812f1e81288fffd48 SOURCES/linux-5.14.0-503.21.1.el9_5.tar.xz
diff --git a/SOURCES/Makefile.rhelver b/SOURCES/Makefile.rhelver
index 99b8eb0..814217f 100644
--- a/SOURCES/Makefile.rhelver
+++ b/SOURCES/Makefile.rhelver
@@ -12,7 +12,7 @@ RHEL_MINOR = 5
 #
 # Use this spot to avoid future merge conflicts.
 # Do not trim this comment.
-RHEL_RELEASE = 503.19.1
+RHEL_RELEASE = 503.21.1
 
 #
 # ZSTREAM
diff --git a/SOURCES/kernel.changelog b/SOURCES/kernel.changelog
index 9fc95e0..b6b7498 100644
--- a/SOURCES/kernel.changelog
+++ b/SOURCES/kernel.changelog
@@ -1,3 +1,52 @@
+* Thu Dec 19 2024 Lucas Zampieri <lzampier@redhat.com> [5.14.0-503.21.1.el9_5]
+- mlxsw: spectrum_ipip: Fix memory leak when changing remote IPv6 address (CKI Backport Bot) [RHEL-66899] {CVE-2024-50252}
+- CVE-2024-53122 mptcp: cope racing subflow creation in mptcp_rcv_space_adjust (Patrick Talbert) [RHEL-70083 RHEL-69670] {CVE-2024-53122}
+- mm: make show_free_areas() static (Aristeu Rozanski) [RHEL-66998 RHEL-27743]
+- mm: remove arguments of show_mem() (Aristeu Rozanski) [RHEL-66998 RHEL-27743]
+- KVM: s390: Change virtual to physical address access in diag 0x258 handler (Thomas Huth) [RHEL-67922 RHEL-65229]
+- KVM: s390: gaccess: Check if guest address is in memslot (Thomas Huth) [RHEL-67922 RHEL-65229]
+- KVM: s390: Fix SORTL and DFLTCC instruction format error in __insn32_query (Thomas Huth) [RHEL-67922 RHEL-65229]
+- s390/uv: Panic for set and remove shared access UVC errors (Thomas Huth) [RHEL-67922 RHEL-65229]
+- KVM: s390: remove useless include (Thomas Huth) [RHEL-67922 RHEL-65229]
+- s390/mm: Re-enable the shared zeropage for !PV and !skeys KVM guests (Thomas Huth) [RHEL-67922 RHEL-65229]
+- mm/userfaultfd: Do not place zeropages when zeropages are disallowed (Thomas Huth) [RHEL-67922 RHEL-65229]
+- s390: allow pte_offset_map_lock() to fail (Thomas Huth) [RHEL-67922 RHEL-54248]
+- KVM: s390: vsie: Use virt_to_phys for crypto control block (Thomas Huth) [RHEL-67922 RHEL-65229]
+- KVM: s390: vsie: Use virt_to_phys for facility control block (Thomas Huth) [RHEL-67922 RHEL-65229]
+- gfs2: Prevent inode creation race (Andreas Gruenbacher) [RHEL-68137 RHEL-68102]
+- gfs2: Only defer deletes when we have an iopen glock (Andreas Gruenbacher) [RHEL-68137 RHEL-68102]
+- gfs2: Randomize GLF_VERIFY_DELETE work delay (Andreas Gruenbacher) [RHEL-62105 RHEL-60945]
+- gfs2: Use mod_delayed_work in gfs2_queue_try_to_evict (Andreas Gruenbacher) [RHEL-62105 RHEL-60945]
+- gfs2: Update to the evict / remote delete documentation (Andreas Gruenbacher) [RHEL-62105 RHEL-60945]
+- gfs2: Call gfs2_queue_verify_delete from gfs2_evict_inode (Andreas Gruenbacher) [RHEL-62105 RHEL-60945]
+- gfs2: Clean up delete work processing (Andreas Gruenbacher) [RHEL-62105 RHEL-60945]
+- gfs2: Minor delete_work_func cleanup (Andreas Gruenbacher) [RHEL-62105 RHEL-60945]
+- gfs2: Return enum evict_behavior from gfs2_upgrade_iopen_glock (Andreas Gruenbacher) [RHEL-62105 RHEL-60945]
+- gfs2: Rename dinode_demise to evict_behavior (Andreas Gruenbacher) [RHEL-62105 RHEL-60945]
+- gfs2: Rename GIF_{DEFERRED -> DEFER}_DELETE (Andreas Gruenbacher) [RHEL-62105 RHEL-60945]
+- gfs2: Faster gfs2_upgrade_iopen_glock wakeups (Andreas Gruenbacher) [RHEL-62105 RHEL-60945]
+- gfs2: Fix unlinked inode cleanup (Andreas Gruenbacher) [RHEL-62105 RHEL-60945]
+- gfs2: Allow immediate GLF_VERIFY_DELETE work (Andreas Gruenbacher) [RHEL-62105 RHEL-60945]
+- gfs2: Initialize gl_no_formal_ino earlier (Andreas Gruenbacher) [RHEL-62105 RHEL-60945]
+- gfs2: Rename GLF_VERIFY_EVICT to GLF_VERIFY_DELETE (Andreas Gruenbacher) [RHEL-62105 RHEL-60945]
+- gfs2: make timeout values more explicit (Wolfram Sang) [RHEL-62105 RHEL-60945]
+- gfs2: Simplify function gfs2_upgrade_iopen_glock (Andreas Gruenbacher) [RHEL-62105 RHEL-60945]
+- gfs2: Rename SDF_DEACTIVATING to SDF_KILL (Andreas Gruenbacher) [RHEL-62105 RHEL-60945]
+- smb: client: fix use-after-free of signing key (Jay Shin) [RHEL-69306 RHEL-66206]
+- net/iucv: fix use after free in iucv_sock_close() (Mete Durlu) [RHEL-60300 RHEL-53992]
+- KVM: arm64: Ensure vgic_ready() is ordered against MMIO registration (CKI Backport Bot) [RHEL-70294]
+Resolves: RHEL-60300, RHEL-62105, RHEL-66899, RHEL-66998, RHEL-67922, RHEL-68137, RHEL-69306, RHEL-70083, RHEL-70294
+
+* Thu Dec 12 2024 Lucas Zampieri <lzampier@redhat.com> [5.14.0-503.20.1.el9_5]
+- bnxt_en: Add support for user configured RSS key (Michal Schmidt) [RHEL-68699 RHEL-54645]
+- bnxt_en: Add function to calculate Toeplitz hash (Michal Schmidt) [RHEL-68699 RHEL-54645]
+- kvm: Note an RCU quiescent state on guest exit (Leonardo Bras) [RHEL-65734 RHEL-20288]
+- rcu: Add rcutree.nohz_full_patience_delay to reduce nohz_full OS jitter (Leonardo Bras) [RHEL-65734 RHEL-20288]
+- context_tracking: Fix KCSAN noinstr violation (Leonardo Bras) [RHEL-65734 RHEL-20288]
+- perf/aux: Fix AUX buffer serialization (Michael Petlan) [RHEL-67495] {CVE-2024-46713}
+- RDMA/bnxt_re: Fix a bug while setting up Level-2 PBL pages (Mohammad Heib) [RHEL-66669 RHEL-52759] {CVE-2024-50208}
+Resolves: RHEL-65734, RHEL-66669, RHEL-67495, RHEL-68699
+
 * Fri Dec 06 2024 Lucas Zampieri <lzampier@redhat.com> [5.14.0-503.19.1.el9_5]
 - xfrm: validate new SA's prefixlen using SA family when sel.family is unset (Sabrina Dubroca) [RHEL-66462 RHEL-66461] {CVE-2024-50142}
 - xfrm: fix one more kernel-infoleak in algo dumping (CKI Backport Bot) [RHEL-65960] {CVE-2024-50110}
diff --git a/SOURCES/nvidiagpuoot001.x509 b/SOURCES/nvidiagpuoot001.x509
new file mode 100644
index 0000000000000000000000000000000000000000..de1b6016bc372b345bb6b0a47c90079918776f85
GIT binary patch
literal 1416
zcma)*Yc!Mz7{}+GcZ|V|+h}6S3}VRj9hVR`3R5fNlG#ZuVN4mxT`Qx~*hIDn6;X?X
zVO(ZMZElSutc*6Kkg%><*W8k@oISgzv!C|k?|J^`{GSiM2jYnR2ywuGY!D8>;S#Xt
z+K&}8TdQ#p1}UK(cQ9@l0{~KDFvyyWhZK<@4FRI%sApNeEN>NxGfl<G$xY>e4OtCR
z`8O^B;ILs#hIarnG~7Cr>FehmuFnWM0}-}k42{TSLo>3eiK&s%vF#WmGl)$72cbjc
zU6AVE4fy{wgt1NqvI0-3K%4phQ^kR+eSJS51_L>885qQYOTsyD09G_6Lz8V*vd?`#
zDd`qJ9~w&0!K`4l#(SI3Zg(LS_mDprEKKI0`a}H(;s}~Br(D>W!qXIOsfR&kbLSGJ
z=Fe9TlMRgJ?=2>+4lf}qQiv6Ds>0zKVro}>=flOEyq!73ZPqgzkMxC=T-gWfXoqa&
z==2F)`9#Z)<tLWZ5}I3HO<KLk8jJ2OgTH3|5ICI9?MtckA><o?tPzVNsn_D&>U!TW
zN;nqB!;?=_Z|DsFe0<lJM6CyYKs<jiIoDxyV_+Cpn!DsncWC1J6*kzdx>>%QS)=kB
zQPiGNmrp0OE98-U&<j6ir?w(;&$+QjuP<nFze&1&N;f&v@fplvA~Cq@opF!gr1rcg
zj2f$;svZ(GH6hVN*F9=(NKhxvxUy@mDN?EgxV-O}LwDCpZQWCI8X6~k!H_8vw|jc;
z1SLAH;l$pPNnuJ94<+Hy_Xle|EMx^)xl>SCwmz@bU)Z%Hwmv<sI)yafMz?AA3#ZTT
zT?iR=O(JD_F-6a=Se5l5GoWBpmH7>d;zXlgQOUws5J~8=@dR(_YL}G_MlFuF(h_($
zd_cWo#9kLatE*Xp>upmoE{~E!Kq&mW))CQi+ci1x_giT~Tipl-JJQm+6<g!l7ospT
z{njqP^m1(>(BC%7U(Iq19iyzh$O{w|P+tI*a&QoU0rw-Jvk-byIAtsVY#`te43gd=
znJq$qaPb%jx5XM;jD{qUC><mqCMFJokn+}C8i7M7&<5K+T}mBAD9x5nnr0nZj<Dm+
zLd320E`%b4i&60GT9w;Zyf(&|#fE+O<CV**;IjPJZf^e8rkeoF&bk@m;_+#moy<cS
z1dg#@ZQ}Gw>V1y{KHYD!y~%Py*I(g`t@#DU!x1y-3tSC7Pgc3&)w-Bv>5Rjqm2kJ4
zB`Eu2&!^GqQQ{G;B%6&omVG-4by3FvZR#9#!Cm4!jI=(!!y?6J!RJ^#AG#(lFW%<F
zjg<J5A4pQK7%$-Q9#{FyovREnma<!{Go1h26)onNCU~ag9VA`Wk-WQTcd#(IHt|T;
z#pApcn@sb^G=daUq<?GYjuj>WVizOc+RoW{U@Zq5UVeFkj(Ar{8S2{i^69qD;i2B5
zyTNR%tfT#V23>1!@X9x%9r><(N$bShBOv3|g@!xJauWf_>7&$<!qwLs_T@|1f})S?
ze#4kBO_^_L=+Vmg0*tr5%IR)?yZD`sgtCl;E6K&>#Ds9A+9>stGsQIH*Nb<;ec+eW
zPKA`#3-3NcMaReX?>D*W8NsQsj%|^<1q|Zn8fW)>rtfoVyW($^;>s0bMJe2*U*Lwy
zX@aV<qhpxPT#&`9DC-uK(gAg^s2a`lrU|2O*_!+bncLsgu*c7oct!_hPBCZWbhNUZ
z^AC*b9tO$5z8X|74S^;V?|wZ>RIl~hK;8gZ-aM&pZb>w9oz>7H{l?UpZ6$IMIq=}l
i!k;`Nw@LnaE=;wjdca^$>BY|U1x(3&Qz+&`P}*Pl9c2Un

literal 0
HcmV?d00001

diff --git a/SOURCES/rheldup3.x509 b/SOURCES/rheldup3.x509
new file mode 100644
index 0000000000000000000000000000000000000000..5df3b4f30de160efb9bd4dfbe9b831ee44a74007
GIT binary patch
literal 1198
zcmXqLVp(O-#4NOcnTe5!iId?z>lv<viu3FYc-c6$+C196^D;7WvoaW@8rmD!vN4CU
zFbkUnrKTu&B$g<+=9Q!t6%=I_rz-el=9N|`xD;iUr4}iK7NjJWq$&gy<);@V<|=4p
zr&cN$YZ@vUD8S9+WE2xFPEAhCNi8aIC`wJqNG#Dy&d)WF6X!KFF)%hZG_U|tW>Mn2
z#^wgbMy60My`0g+xCl7_7+D#Zn;82U44N3bn3@<H8J1-o<0`)PAbmBb;`YA8-H#fk
zh5p@V8dEj@#5^r|$BiMX-3PO)N}GG{XP;2;onrXm*xPGqc~8&eDa4E0Ke!U*c>dmh
z!vdG3|0;V$ZnEg5ajZEll2;mR@wL@urt`Or%zJ9C?VT(A$fkG62bt;r`OFi~EIb~l
z<&rtS<EK>8)w|#Kv!qQ3&uhNHe&*ln#F@XX?WP}(?tj|znsN2QnNwqA&i88Pl{7Wv
zi0s?jcw^SC@Kv5_e^1!5^_iCM5Bm`;kSTp@vLox+z|>RL4ozSE@7|Z)cYE5~15d9r
zf3ys?`QvqLy|vkD+xaIYkEDNf+^~1@42wPf|Bj`wzFB&D*6+hb6K-vvJ29i1VcUl0
zq@L&pdu28(wf5XsZoV(XoNK9e73=%N=^2Y-A5Mt7c1>x2z(sAPeYKwq_D1pMP0Z@+
z44ZCHD>8WrYvxnl{(Y9Y;!J7v%UEy6f7@i~%p&LVXWgfJLQL16Jb2BqOn&FtE8V3I
zn|J$960KOM=Y6DKzjm$3zHBW`iK{P}m>C%u7snbz8}I<rq^vL_<9`+=0|o<b5RadQ
zg_()H!9W(o;bReF5!oO9`9*Qko+8bgUs8?4i|=3jUe#bA50X}9kuVTzz^(u_2LKa5
zBSX@P#WI#rnZK4D`@cHp+q_v{vs;QzNaTy^vd>?$Wr62!1ty~%stq%KUk|UJQ?XL=
z?$;fAk4G{uU~63|QDu66e((pS#Qj{mWj-&Pce_tVMs-u$V&3WJc)wiGuq<P+VE@GQ
z^}z~81%nk5HS&BD9haTqTCP`d$mrg>Z@P0gI*S{A{9m&1>-)Wng7=FnNZr~SSADzE
z`FM5Za>G-0AsSCywAVQ9JizR7?q!%Tcl*z#XL3!Y%7=8$_x7!IcM#js)-=htyoX7>
z>ip!lieA5N{C;V0W#@@UtjqOcy&G=7S>^x8FLsLX+Tv8TI$u5)Pv(B7r+zP-z2(dP
zNL)O4a82vIH`9e5-h1||^w@{LheYd?i#}=m+Lpg~+S4mrH!aP6yzRWZTlTWaHMJVC
zyUyK`eCe}d$t=0@KT%tq*UtaGdtZF(ypw!B3mHQg7v`-?7jAjC_N793+P+-2;s%L3
xC$5SesqfmFyu<w0zNy`@Zn`To3-?@cvB-EL*xT1TbI~ks_H}~iS#NCr4*-zp0zLo$

literal 0
HcmV?d00001

diff --git a/SOURCES/rhelima.x509 b/SOURCES/rhelima.x509
new file mode 100644
index 0000000000000000000000000000000000000000..a286bfb4dc393c84388c7e599e9c061714f6753f
GIT binary patch
literal 727
zcmXqLV!CY5#JGC_GZP~d6DPy9iY1SqUp~6hfR~L^tIebBJ1-+6H!FidprMd~02^~C
z3l|S(kcY0PucNNBqoKHgC`gQ%hc75KMZqJnL;)zF0F+QNP=M>_WE2xFPEAhCNi8aI
zC`wJqNG#Dy&d)WF6X!KDHZV6ZG&D0bF))b|=QXwfax9=+15-m|14D@MTFAy1rRJn2
z7N;s?r&cOxq~#YWl%*DBre!84mSpDVX&RIP-N_Dg`Z-%BMmARMMivGo<|GCdf4=wo
zA1QZERQIbfT6p1r+N68ty&Ga*)n8MWn7t)wA6u*K&ol0I$M;SQ2~OH_pv&3gP$au{
z$8}q8gWepY-%D@Z>1utM=pymwX7|@PixaKor;0PqdE8%b%jT@_ox^jsV{rx0W*(q(
zWrZ0T|FbX|Fc|QGc>Ew93o{dYgMk=`uL|Px7;v$1XtOc0va&NX8_0sh`B=nQM3jCp
z-r-xIHa~Mk`qT4I=KQ{F#Nufn50X}9kuVTz5czG`6no)8aYnS7pMk|Rv*Pc;Q)i(?
z6>}3KBZHLOLEY4~A5`AVTmJXTtA`<X3}upfG`Xw7^1g3rpJey{s)M)6!i>Ckb4*hg
z+V_3#o-MJF`R(rjy~WBGC(B-I;u6R=*>}xqZ&{BE-`eF`NBVk?Jn0R*p|;(k^P=(s
z<&LsnAJr#@+il`MUmSc}!6CM3=gU2drf`P;ZsiU0z9X3`q@SB*z0XwsO3<q(MP@($
zoxUQ?|Cq0%CL==QFkAfIOF#9b3_c{M>V`gC@^||A{|ADUWK<UC-K#n|xAfA5rVaJ^
zw-p&PKZKOANM`6L72UPwWx2XGs=***Lf#?uFB<EmE530Rl*CviI(<#9X%>o-cHVPE
TT4U?`8AnA}oEq+i7%Tw*6p;x|

literal 0
HcmV?d00001

diff --git a/SOURCES/rhelima_centos.x509 b/SOURCES/rhelima_centos.x509
new file mode 100644
index 0000000000000000000000000000000000000000..691678fabb58879eff6f62eb75f12d414f5237c9
GIT binary patch
literal 726
zcmXqLV!C9|#JFn#GZP~d6DPy9iY1SqUp~6pfR~L^tIebBJ1-+6H!FidprMd~02^~C
z3l|S(kcY0PucNNBqoKHgC`gQ%hc75KMZqJnL;)zF0F+QNP=M>_WE2xFPEAhCNi8aI
zC`wJqNG#Dy&d)WF6X!KDHZV6ZG&D0bF*S@5=QXwfax9=+0~13d0|SWhn$D?tCH}!+
z(~DAbQWJ|)6|z$+6*SWFixkRIi!#$PlM_oa^Yb(f%7D&f2fF;6EfXUft9By`gA#KR
z1Iv{Qh8&!{(=WuF@ccjFi<MaG;^Kujk7)ROU$sK%(0RV@>$BcI`_TELb!yRJ3w15c
z=~>y@j4X?dc6}-R`Q(I${#Ub17xkZ}n|Tf^siX(8T`v9@Hbr4YPm{?3f%oTrZmDuw
zTmiJ12k2T^VMfOPEKCLr27DkMKZwV|%*5VcAO_;Ag7`cJTx=ZLY>cd|?99vtvLJCj
z7BLo)kf)3N#k7sKm;Zn4FV~$WRO1}I)j%F3t;`}}Al4xA+psD2!h_<BXf;0ri)m)X
z--D;lLW?QpCPqevW3rR@COKSNw=~u-R_h`EBqxQ=hbx=fO`T5Gm*16qeE$8uZcG1}
zdS}lpmQb#5^sY^gE!^Tg=hYp3S+QF_Z)fbk-ywLRdp%=lA?v^EYbyNQ?s?2-DRDY<
zLh8>^x2&0Vvo<_oVfT3Cllqi##af%*1E-D_E1PwwhjdT)@hbGs>m8X(yBElIf1G@`
zaNf&~54wD{ZA*H&|1z9BP`qkm>c)h;C7jZB1~-$mM6U&CW&Kro-ZQzvOXKRso4cfY
z-+S<W>8YH+Kee~gve$9xpZq89W8PVRIjnPd!S=*8buV8pu-e6{vv<`>`J+4E6@5Dr
bB423zut3V-3yVZR!jY(3lh1DZmVN>N4apH3

literal 0
HcmV?d00001

diff --git a/SOURCES/rhelimaca1.x509 b/SOURCES/rhelimaca1.x509
new file mode 100644
index 0000000000000000000000000000000000000000..b5501502d12a30f6faaa9728bd5d9a50364ba9e1
GIT binary patch
literal 908
zcmXqLV(u_#Vk%g`%*4pV#L2LVb#G+HlYhGmc-c6$+C196^D;7WvoaV28VVT*urY_S
zaPe>kdFXojI_f$*8j2f;g2b44_<~YX6g(136o3*6KnW!S1-O1rMls>y)a1mR)S?oH
zqSTa(#1g&a{9FS$ab6>119JmILsKIoQ-dgRUSkU&#{$Zwg_TW=O2{5#WMyD(V&rEq
zXkz4IYGPz$I8_qI`fe|Sv6tth+?{&fQd@0VJu?Cd=2>bih-eSpz9FPf@r=}FewjUj
zWiqq)?}bgTbZpj*J+{Nh?5@HW{*4;5p8x%?e)e0q0q@4UKKh0GJTHc`Mdf-&o@)QC
z%Dd*H<MBR$7ZTkL>kj{upT&FYoqz7FPY2Y0oL-mLvfFdVtVf6D-fMjM=o)kWyVv5I
zb#Da(%H8@V6!N|E@Sdm%zh!qRE>UG~x4R;A@Y)aigAJ(%L>sdLCz-8JwybLQ^RSbQ
zUAoxgVNJ~c$8UE>Rv(@mdsY6>^!vF-{}&%lOY!E<DRO?4n!s$a<3QlHbx}Y1eje%%
zopa&R?I~+YPw=;TZk*P{=$+2Q%*epFIN2c4fFBsIvcimv|5;cKn1PgmEJ%QlMT|w{
zw_#K4g$KnM(Q1AM7Sqg%zXwm9WgridR%Vef5Np7$fDfdAA7mg4FsZR2M*}c@0i%JD
zA*irz59=3>JKWuywoP5hviOJOORkl<-rMEA*8aaC#qBS5ntclAhRI^K3W?0oqB|2l
z9E{f}h};@^@1R`SB$?gLH-pz{udU%!s9K}BLr&adTgVl`gd%MhJH1aHrp2s{fpJ@T
zmYy*cy{9Stq112v4!6K*GqTo{a@?2@dqL{;;;9jrx|#QXGXK-6;92ucEZy+6gJ9|u
zsq^#laz8YSw<NPZ<(O`G=TWI!Q1{C4sr-)j&E<Ycm`a8#a~=Fuc`K>4wI<`>?)-{r
zOg()2f`3mJy}bMSzX>z*`3}Zfy;;M)HS=W~i>jvCe2)jV3s?0NrnMS;)_Zn(Vqclc
OYCk*Odr=pij{yJ>hE)#$

literal 0
HcmV?d00001

diff --git a/SOURCES/rhelkpatch1.x509 b/SOURCES/rhelkpatch1.x509
new file mode 100644
index 0000000000000000000000000000000000000000..0c774ba73bd27a421e59a2488cbf6f398fe03e2a
GIT binary patch
literal 1176
zcmXqLVwqyl#PnwYGZP~d6DPyOSTUz>37k(1c-c6$+C196^D;7WvoaV&8JZXvu`!3T
zFbiu3rKTu&B$g<+=9Q!t6%=I_rz-el=9N|`WEUisBxfiTXQt<6=A|oSr&by&87ROF
z;$##PE>2BO%t<XOaVSbn$w(~GOU}<VkQ3(xnr>`tXkcM%VqzX8&TDLLU~FUx<<ivd
zCdNg`US(uuU~XdUXE11D>|$zSY-Cur_MUF}yRwy<27f+n7hK~wr6?mPn<FHn>p0ia
zO#<7tH0Rs=_y0FrZrPLN6%|z%*$g)6eBGQOC9APh#lLjbqcVo>yKIkDf|iOrauOH!
zXN=04zCVFu?E~=yg*}mikJ@c>j_>ID=+e$9T==)F_We`sQx%E6VtpA8xLPkgzGwdM
z;<FnIz8hRl`gKI1ar&(5hx`_KHZWYsU31KCW|T+4`RJghJsp8eo%~$(JA_)LPU{yL
zO+WYRAB+1p*+wtM)P8XVh1{cJ6Zf5-bY`vmvTHhhH$5V1d;f7P5BYL<>9cjJx1LvT
zRA95t**@{<WXGvf_s=>Lqu|dyEp);^hnSg>|M;YTZLipRcl-Yfp3`6Kk21N$#5%$3
z=t;d^b=jEe>3>csZDC|EtI6eGX3A$`&mP%j$yx5sna}0=<k2&pnV%U?*xvZ5_w|=f
z;=-&5XSSl24NG=M_2{T?(|xo<_=9NXcV$+8<(T_ZtJs#z*llTY{550ZiX$~=cz=iW
zO5J)m<>>O48d9cA%!~|-i(?I<4S0a5Pga<b@jnZb0fPZIh{w;u!py|pU?2<P@Ue)o
zi1=FkZS&hFarDD>J&T}6j6PQB`6mqILDI@B5(Z)o*cG6rbzlN$WDvi^+~avx_@(yD
zi6{BpWGBX~d@t^1|L!8IK+y!wQ0XblPMGv|{+@PzYc+?(uJY`snb+kCU#&HHx>;WK
z^!4Mp-&|K5D5=yv^^|SB-FAodX)_uhxL#%XyiEIl=tjR>&0DXQu2yfFbG;%j%(rPn
z?!Em9FQb+p>Fqw8_2FpG=X3gb_BZQ$&&})0pEI@c&eZvv1g3|tv(A1{Bw=)V6Gykn
z=?{UoU$IX!TEJa-<$LnXljRYGdF9M6Yl9|SQd^YEC1|ACvOy>4=D+NlS#wr-`m|?t
zN4EripRcU7^T(Xm|L6YiRpw;4U;g8<crTmjp1S`1%apeUY9Ei+Ef;on?@w}AK4<=F
z6RY-V&G#6VCwOxvc&@hmcy*Eex$-#4tCEe~JcW$0&-G_s5!=FQ8+LHQ>3iP1$FFkF
z^PXB_dOBN<PhQlr<VTL`(|gyxJj<W4^nSC;^mlsSe*D?xoH>VCciR7BQARQwXZ~CD
k<{3+z;?eg4Pxel|&g~RC;X;_4(PtO2eQRg^ILWgO0MaGw8~^|S

literal 0
HcmV?d00001

diff --git a/SPECS/kernel.spec b/SPECS/kernel.spec
index 01edf84..5375f44 100644
--- a/SPECS/kernel.spec
+++ b/SPECS/kernel.spec
@@ -165,15 +165,15 @@ Summary: The Linux kernel
 # define buildid .local
 %define specversion 5.14.0
 %define patchversion 5.14
-%define pkgrelease 503.19.1
+%define pkgrelease 503.21.1
 %define kversion 5
-%define tarfile_release 5.14.0-503.19.1.el9_5
+%define tarfile_release 5.14.0-503.21.1.el9_5
 # This is needed to do merge window version magic
 %define patchlevel 14
 # This allows pkg_release to have configurable %%{?dist} tag
-%define specrelease 503.19.1%{?buildid}%{?dist}
+%define specrelease 503.21.1%{?buildid}%{?dist}
 # This defines the kabi tarball version
-%define kabiversion 5.14.0-503.19.1.el9_5
+%define kabiversion 5.14.0-503.21.1.el9_5
 
 #
 # End of genspec.sh variables
@@ -3795,10 +3795,57 @@ fi
 #
 #
 %changelog
-* Thu Dec 19 2024 Release Engineering <releng@rockylinux.org> - 5.14.0-503.19.1
+* Wed Jan 08 2025 Release Engineering <releng@rockylinux.org> - 5.14.0-503.21.1
 - Porting to Rocky Linux 9, debranding and Rocky branding
 - Ensure aarch64 kernel is not compressed
 
+* Thu Dec 19 2024 Lucas Zampieri <lzampier@redhat.com> [5.14.0-503.21.1.el9_5]
+- mlxsw: spectrum_ipip: Fix memory leak when changing remote IPv6 address (CKI Backport Bot) [RHEL-66899] {CVE-2024-50252}
+- CVE-2024-53122 mptcp: cope racing subflow creation in mptcp_rcv_space_adjust (Patrick Talbert) [RHEL-70083 RHEL-69670] {CVE-2024-53122}
+- mm: make show_free_areas() static (Aristeu Rozanski) [RHEL-66998 RHEL-27743]
+- mm: remove arguments of show_mem() (Aristeu Rozanski) [RHEL-66998 RHEL-27743]
+- KVM: s390: Change virtual to physical address access in diag 0x258 handler (Thomas Huth) [RHEL-67922 RHEL-65229]
+- KVM: s390: gaccess: Check if guest address is in memslot (Thomas Huth) [RHEL-67922 RHEL-65229]
+- KVM: s390: Fix SORTL and DFLTCC instruction format error in __insn32_query (Thomas Huth) [RHEL-67922 RHEL-65229]
+- s390/uv: Panic for set and remove shared access UVC errors (Thomas Huth) [RHEL-67922 RHEL-65229]
+- KVM: s390: remove useless include (Thomas Huth) [RHEL-67922 RHEL-65229]
+- s390/mm: Re-enable the shared zeropage for !PV and !skeys KVM guests (Thomas Huth) [RHEL-67922 RHEL-65229]
+- mm/userfaultfd: Do not place zeropages when zeropages are disallowed (Thomas Huth) [RHEL-67922 RHEL-65229]
+- s390: allow pte_offset_map_lock() to fail (Thomas Huth) [RHEL-67922 RHEL-54248]
+- KVM: s390: vsie: Use virt_to_phys for crypto control block (Thomas Huth) [RHEL-67922 RHEL-65229]
+- KVM: s390: vsie: Use virt_to_phys for facility control block (Thomas Huth) [RHEL-67922 RHEL-65229]
+- gfs2: Prevent inode creation race (Andreas Gruenbacher) [RHEL-68137 RHEL-68102]
+- gfs2: Only defer deletes when we have an iopen glock (Andreas Gruenbacher) [RHEL-68137 RHEL-68102]
+- gfs2: Randomize GLF_VERIFY_DELETE work delay (Andreas Gruenbacher) [RHEL-62105 RHEL-60945]
+- gfs2: Use mod_delayed_work in gfs2_queue_try_to_evict (Andreas Gruenbacher) [RHEL-62105 RHEL-60945]
+- gfs2: Update to the evict / remote delete documentation (Andreas Gruenbacher) [RHEL-62105 RHEL-60945]
+- gfs2: Call gfs2_queue_verify_delete from gfs2_evict_inode (Andreas Gruenbacher) [RHEL-62105 RHEL-60945]
+- gfs2: Clean up delete work processing (Andreas Gruenbacher) [RHEL-62105 RHEL-60945]
+- gfs2: Minor delete_work_func cleanup (Andreas Gruenbacher) [RHEL-62105 RHEL-60945]
+- gfs2: Return enum evict_behavior from gfs2_upgrade_iopen_glock (Andreas Gruenbacher) [RHEL-62105 RHEL-60945]
+- gfs2: Rename dinode_demise to evict_behavior (Andreas Gruenbacher) [RHEL-62105 RHEL-60945]
+- gfs2: Rename GIF_{DEFERRED -> DEFER}_DELETE (Andreas Gruenbacher) [RHEL-62105 RHEL-60945]
+- gfs2: Faster gfs2_upgrade_iopen_glock wakeups (Andreas Gruenbacher) [RHEL-62105 RHEL-60945]
+- gfs2: Fix unlinked inode cleanup (Andreas Gruenbacher) [RHEL-62105 RHEL-60945]
+- gfs2: Allow immediate GLF_VERIFY_DELETE work (Andreas Gruenbacher) [RHEL-62105 RHEL-60945]
+- gfs2: Initialize gl_no_formal_ino earlier (Andreas Gruenbacher) [RHEL-62105 RHEL-60945]
+- gfs2: Rename GLF_VERIFY_EVICT to GLF_VERIFY_DELETE (Andreas Gruenbacher) [RHEL-62105 RHEL-60945]
+- gfs2: make timeout values more explicit (Wolfram Sang) [RHEL-62105 RHEL-60945]
+- gfs2: Simplify function gfs2_upgrade_iopen_glock (Andreas Gruenbacher) [RHEL-62105 RHEL-60945]
+- gfs2: Rename SDF_DEACTIVATING to SDF_KILL (Andreas Gruenbacher) [RHEL-62105 RHEL-60945]
+- smb: client: fix use-after-free of signing key (Jay Shin) [RHEL-69306 RHEL-66206]
+- net/iucv: fix use after free in iucv_sock_close() (Mete Durlu) [RHEL-60300 RHEL-53992]
+- KVM: arm64: Ensure vgic_ready() is ordered against MMIO registration (CKI Backport Bot) [RHEL-70294]
+
+* Thu Dec 12 2024 Lucas Zampieri <lzampier@redhat.com> [5.14.0-503.20.1.el9_5]
+- bnxt_en: Add support for user configured RSS key (Michal Schmidt) [RHEL-68699 RHEL-54645]
+- bnxt_en: Add function to calculate Toeplitz hash (Michal Schmidt) [RHEL-68699 RHEL-54645]
+- kvm: Note an RCU quiescent state on guest exit (Leonardo Bras) [RHEL-65734 RHEL-20288]
+- rcu: Add rcutree.nohz_full_patience_delay to reduce nohz_full OS jitter (Leonardo Bras) [RHEL-65734 RHEL-20288]
+- context_tracking: Fix KCSAN noinstr violation (Leonardo Bras) [RHEL-65734 RHEL-20288]
+- perf/aux: Fix AUX buffer serialization (Michael Petlan) [RHEL-67495] {CVE-2024-46713}
+- RDMA/bnxt_re: Fix a bug while setting up Level-2 PBL pages (Mohammad Heib) [RHEL-66669 RHEL-52759] {CVE-2024-50208}
+
 * Fri Dec 06 2024 Lucas Zampieri <lzampier@redhat.com> [5.14.0-503.19.1.el9_5]
 - xfrm: validate new SA's prefixlen using SA family when sel.family is unset (Sabrina Dubroca) [RHEL-66462 RHEL-66461] {CVE-2024-50142}
 - xfrm: fix one more kernel-infoleak in algo dumping (CKI Backport Bot) [RHEL-65960] {CVE-2024-50110}
-- 
GitLab