meta-intel/recipes-kernel/linux/linux-intel_4.14.bb
Naveen Saini 027da41c7e linux-intel_4.14: update to v4.14.133
Includes below CVE fixed:
CVE-2019-13272

tag 'v4.14.133': (56 commits)
Linux 4.14.133
stable/btrfs: fix backport bug in d819d97ea025 ("btrfs: honor path->skip_locking in backref code")
dmaengine: imx-sdma: remove BD_INTR for channel0
MIPS: Add missing EHB in mtc0 -> mfc0 sequence.
MIPS: Fix bounds check virt_addr_valid
svcrdma: Ignore source port when computing DRC hash
KVM: LAPIC: Fix pending interrupt in IRR blocked by software disable LAPIC
KVM: x86: degrade WARN to pr_warn_ratelimited
ARC: handle gcc generated __builtin_trap for older compiler
tty: rocket: fix incorrect forward declaration of 'rp_init()'
vhost: scsi: add weight support
vhost: vsock: add weight support
vhost_net: fix possible infinite loop
vhost: introduce vhost_exceeds_weight()
vhost_net: introduce vhost_exceeds_weight()
vhost_net: use packet weight for rx handler, too
vhost-net: set packet weight of tx polling to 2 * vq size
btrfs: Ensure replaced device doesn't have pending chunk allocation
mm/vmscan.c: prevent useless kswapd loops
ftrace/x86: Remove possible deadlock between register_kprobe() and ftrace_run_update_code()
...

Signed-off-by: Naveen Saini <naveen.kumar.saini@intel.com>
Signed-off-by: Anuj Mittal <anuj.mittal@intel.com>
2019-07-22 07:59:15 +08:00

23 lines
817 B
BlitzBasic

require linux-intel.inc
KBRANCH = "4.14/base"
KMETA_BRANCH = "yocto-4.14"
# Fix for 32-bit perf issue. Remove when patch is backported to 4.14.
SRC_URI_append = " file://0001-perf-x86-32-explicitly-include-errno.h.patch \
file://0001-menuconfig-check-lxdiaglog.sh-Allow-specification-of.patch \
"
DEPENDS += "elfutils-native openssl-native util-linux-native"
LINUX_VERSION ?= "4.14.133"
SRCREV_machine ?= "650e448e7805a5aac42022b353299901548eee14"
SRCREV_meta ?= "bc35d5bd224ab031440a69f9806d839db382f05c"
# For Crystalforest and Romley
KERNEL_MODULE_AUTOLOAD_append_core2-32-intel-common = " uio"
KERNEL_MODULE_AUTOLOAD_append_corei7-64-intel-common = " uio"
# Functionality flags
KERNEL_EXTRA_FEATURES ?= "features/netfilter/netfilter.scc features/security/security.scc"