meta-intel/recipes-kernel/linux/linux-intel_4.14.bb
Naveen Saini 038e8c6575 linux-intel/4.14: update to v4.14.152
tag 'v4.14.152': (97 commits)
Linux 4.14.152
Revert "ALSA: hda: Flush interrupts on disabling"
ALSA: timer: Fix mutex deadlock at releasing card
ALSA: timer: Simplify error path in snd_timer_open()
xfs: Correctly invert xfs_buftarg LRU isolation logic
sctp: not bind the socket in sctp_connect
sctp: fix the issue that flags are ignored when using kernel_connect
sch_netem: fix rcu splat in netem_enqueue()
net: usb: sr9800: fix uninitialized local variable
bonding: fix potential NULL deref in bond_update_slave_arr
NFC: pn533: fix use-after-free and memleaks
rxrpc: Fix call ref leak
llc: fix sk_buff leak in llc_conn_service()
llc: fix sk_buff leak in llc_sap_state_process()
dmaengine: cppi41: Fix cppi41_dma_prep_slave_sg() when idle
rtlwifi: Fix potential overflow on P2P code
arm64: Ensure VM_WRITE|VM_SHARED ptes are clean by default
s390/idle: fix cpu idle time calculation
s390/cmm: fix information leak in cmm_timeout_handler()
nl80211: fix validation of mesh path nexthop
...

Signed-off-by: Naveen Saini <naveen.kumar.saini@intel.com>
Signed-off-by: Anuj Mittal <anuj.mittal@intel.com>
2019-11-13 14:45:45 +08:00

24 lines
888 B
BlitzBasic

require linux-intel.inc
KBRANCH = "4.14/base"
KMETA_BRANCH = "yocto-4.14"
# Fix for 32-bit perf issue. Remove when patch is backported to 4.14.
SRC_URI_append = " file://0001-perf-x86-32-explicitly-include-errno.h.patch \
file://0001-menuconfig-check-lxdiaglog.sh-Allow-specification-of.patch \
file://0001-perf-tools-Add-Python-3-support.patch \
"
DEPENDS += "elfutils-native openssl-native util-linux-native"
LINUX_VERSION ?= "4.14.152"
SRCREV_machine ?= "f500fab13d11290921fc16c0e8b08c671819ad43"
SRCREV_meta ?= "c8f030fdbf6046dede4b7ce6c94b5b24221c250e"
# For Crystalforest and Romley
KERNEL_MODULE_AUTOLOAD_append_core2-32-intel-common = " uio"
KERNEL_MODULE_AUTOLOAD_append_corei7-64-intel-common = " uio"
# Functionality flags
KERNEL_EXTRA_FEATURES ?= "features/netfilter/netfilter.scc features/security/security.scc"