diff options
author | Bruce Ashfield <bruce.ashfield@windriver.com> | 2018-05-18 11:05:48 -0400 |
---|---|---|
committer | Richard Purdie <richard.purdie@linuxfoundation.org> | 2018-06-15 17:56:52 +0100 |
commit | fc2aeb1372c9462149ecd51ca4cf563b0fda2739 (patch) | |
tree | 8be73f65972d4437a6045b8797122a9e9da94130 /meta/classes/distutils3-base.bbclass | |
parent | 44376d10e6f8c9bab3464a1ce2f8cabfbc78456a (diff) | |
download | poky-fc2aeb1372c9462149ecd51ca4cf563b0fda2739.tar.gz |
linux-yocto/4.12: update to v4.12.22
Paul Gortmaker released another 4.12-stable that comprises the following
changes:
23dcfbfbca0a Linux 4.12.22
d4879ce5efb7 arm64: Kill PSCI_GET_VERSION as a variant-2 workaround
77915e1a7544 arm64: Add ARM_SMCCC_ARCH_WORKAROUND_1 BP hardening support
b06fbedb6e14 arm/arm64: smccc: Implement SMCCC v1.1 inline primitive
1f400b388a20 arm/arm64: smccc: Make function identifiers an unsigned quantity
f5d3afa3aecc firmware/psci: Expose SMCCC version through psci_ops
4c69d3a66e60 firmware/psci: Expose PSCI conduit
cfec930a45f8 arm64: KVM: Add SMCCC_ARCH_WORKAROUND_1 fast handling
9e9697733818 arm64: KVM: Report SMCCC_ARCH_WORKAROUND_1 BP hardening support
2a8574eb6e3f arm/arm64: KVM: Turn kvm_psci_version into a static inline
2c79f828dfed arm64: KVM: Make PSCI_VERSION a fast path
042626a87234 arm/arm64: KVM: Advertise SMCCC v1.1
48a9e563e528 arm/arm64: KVM: Implement PSCI 1.0 support
28283de68052 arm/arm64: KVM: Add smccc accessors to PSCI code
33d47367626b arm/arm64: KVM: Add PSCI_VERSION helper
82ca1dcebf95 arm/arm64: KVM: Consolidate the PSCI include files
efb7c6b5b7f9 arm64: KVM: Increment PC after handling an SMC trap
b720b7837ed8 arm64: Branch predictor hardening for Cavium ThunderX2
6f2750c7a1c9 arm64: Implement branch predictor hardening for Falkor
b56fa11959a7 arm64: Implement branch predictor hardening for affected Cortex-A CPUs
5eb80f970c49 arm64: cputype: Add missing MIDR values for Cortex-A72 and Cortex-A75
cf45e77d8106 arm64: entry: Apply BP hardening for suspicious interrupts from EL0
e9c2f25bf62d arm64: entry: Apply BP hardening for high-priority synchronous exceptions
b4f51ebd0fc3 arm64: KVM: Use per-CPU vector when BP hardening is enabled
e8f7c5ba8c70 arm64: Move BP hardening to check_and_switch_context
e2c124fa14e1 arm64: Add skeleton to harden the branch predictor against aliasing attacks
ddd305f0fdf8 arm64: Move post_ttbr_update_workaround to C code
204d987e7143 drivers/firmware: Expose psci_get_version through psci_ops structure
8880e6380d91 arm64: cpufeature: Pass capability structure to ->enable callback
48017c15187b arm64: Run enable method for errata work arounds on late CPUs
cf64258fb122 arm64: cpufeature: __this_cpu_has_cap() shouldn't stop early
7d550f8cb119 arm64: futex: Mask __user pointers prior to dereference
b9d01590df34 arm64: uaccess: Mask __user pointers for __arch_{clear, copy_*}_user
1b74ca827ed3 arm64: uaccess: Don't bother eliding access_ok checks in __{get, put}_user
41b08b7c365b arm64: uaccess: Prevent speculative use of the current addr_limit
1736debe11ef arm64: entry: Ensure branch through syscall table is bounded under speculation
84e4780beea5 arm64: Use pointer masking to limit uaccess speculation
d77d4c9aa433 arm64: Make USER_DS an inclusive limit
b96ab81a6468 arm64: Implement array_index_mask_nospec()
21eb21937d8e arm64: barrier: Add CSDB macros to control data-value prediction
da1217a79997 arm64: idmap: Use "awx" flags for .idmap.text .pushsection directives
c20b48f5b7a3 arm64: entry: Reword comment about post_ttbr_update_workaround
15d4d37f7709 arm64: Force KPTI to be disabled on Cavium ThunderX
3489abd67e33 arm64: kpti: Add ->enable callback to remap swapper using nG mappings
b154d9be8c6f arm64: mm: Permit transitioning from Global to Non-Global without BBM
1610bb019302 arm64: kpti: Make use of nG dependent on arm64_kernel_unmapped_at_el0()
250a3a64585f arm64: Turn on KPTI only on CPUs that need it
32da2aa26b97 arm64: cputype: Add MIDR values for Cavium ThunderX2 CPUs
93d290bbe8f1 arm64: kpti: Fix the interaction between ASID switching and software PAN
923618230c12 arm64: mm: Introduce TTBR_ASID_MASK for getting at the ASID in the TTBR
51218390beb6 arm64: capabilities: Handle duplicate entries for a capability
630cf7161fca arm64: Take into account ID_AA64PFR0_EL1.CSV3
4b7ebe5c3644 arm64: Kconfig: Reword UNMAP_KERNEL_AT_EL0 kconfig entry
e09f32469091 arm64: Kconfig: Add CONFIG_UNMAP_KERNEL_AT_EL0
8202169d678a arm64: use RET instruction for exiting the trampoline
414d9eabda3d arm64: kaslr: Put kernel vectors address in separate data page
fce92f180168 arm64: entry: Add fake CPU feature for unmapping the kernel at EL0
83584a583bff arm64: tls: Avoid unconditional zeroing of tpidrro_el0 for native tasks
4732b98b6400 arm64: cpu_errata: Add Kryo to Falkor 1003 errata
85dacaa58475 arm64: erratum: Work around Falkor erratum #E1003 in trampoline code
bb0fa2f9cece arm64: entry: Hook up entry trampoline to exception vectors
df7f7308d5f0 arm64: entry: Explicitly pass exception level to kernel_ventry macro
14bcc912ca7e arm64: mm: Map entry trampoline into trampoline and kernel page tables
c30f47afaa64 arm64: entry: Add exception trampoline page for exceptions from EL0
21b891bf770f arm64: mm: Invalidate both kernel and user ASIDs when performing TLBI
09e8df92ba8e arm64: mm: Add arm64_kernel_unmapped_at_el0 helper
6832da386e60 arm64: mm: Allocate ASIDs in pairs
bfd2ff25b585 arm64: mm: Fix and re-enable ARM64_SW_TTBR0_PAN
1e4477930e5e arm64: mm: Rename post_ttbr0_update_workaround
1e1890551573 arm64: mm: Remove pre_ttbr0_update_workaround for Falkor erratum #E1003
0223b2589432 arm64: mm: Move ASID from TTBR0 to TTBR1
9fe82f4ebdc3 arm64: mm: Temporarily disable ARM64_SW_TTBR0_PAN
199f832ebf00 arm64: mm: Use non-global mappings for kernel space
e9b0e14af7e3 arm64: move TASK_* definitions to <asm/processor.h>
cab5207f57fd brd: remove unused brd_mutex
7522521435a4 arm/syscalls: Optimize address limit check
797f169015c5 Revert "arm/syscalls: Check address limit on user-mode return"
3056c8f5be3a syscalls: Use CHECK_DATA_CORRUPTION for addr_limit_user_check
74116ef5625a arm64: add VMAP_STACK overflow detection
0d82fd80a2d1 arm64: add on_accessible_stack()
c38502bc1472 arm64: add basic VMAP_STACK support
c3a53247c1ff arm64: use an irq stack pointer
73dcb6d84040 arm64: assembler: allow adr_this_cpu to use the stack pointer
344a8e142697 arm64: factor out entry stack manipulation
59c4a6fb5606 efi/arm64: add EFI_KIMG_ALIGN
1a5300c6063f arm64: move SEGMENT_ALIGN to <asm/memory.h>
3969d302c52f arm64: clean up irq stack definitions
f030f0edba48 arm64: clean up THREAD_* definitions
1f3c78245a4a arm64: factor out PAGE_* and CONT_* definitions
8a5bc40e0c93 arm64: kernel: remove {THREAD,IRQ_STACK}_START_SP
deba543af0b8 fork: allow arch-override of VMAP stack alignment
774f64ce7b0f arm64: remove __die()'s stack dump
7342855775d5 arm64: unwind: remove sp from struct stackframe
553dbcbcff1d arm64: unwind: reference pt_regs via embedded stack frame
926b0fe43412 arm64: unwind: disregard frame.sp when validating frame pointer
da32ad8b5c11 arm64: unwind: avoid percpu indirection for irq stack
eac4e8ecdd77 arm64: move non-entry code out of .entry.text
b341e176374e arm64: consistently use bl for C exception entry
3cdad1f0b9d0 arm64: Add ASM_BUG()
01ace65c9150 arm64/vdso: Support mremap() for vDSO
8050b6ba63cb arm64: Handle trapped DC CVAP
0ee09d69dc93 arm64: Expose DC CVAP to userspace
704046e3e554 arm64: Convert __inval_cache_range() to area-based
b40935f19c73 arm64: mm: Fix set_memory_valid() declaration
29530b5b549e arm64: Abstract syscallno manipulation
f9f1c9d7d767 arm64: syscallno is secretly an int, make it official
ab69949ffe23 x86/tracing: Build tracepoints only when they are used
03793940e25c x86/tracing: Disentangle pagefault and resched IPI tracing key
2822852ed8a5 x86/idt: Clean up the i386 low level entry macros
d5654eb18f73 x86/idt: Remove the tracing IDT completely
0d38071a05e7 x86/smp: Use static key for reschedule interrupt tracing
4ef6e0f37891 x86/smp: Remove pointless duplicated interrupt code
40b216cec86d x86/mce: Remove duplicated tracing interrupt code
03f41cf538fd x86/irqwork: Get rid of duplicated tracing interrupt code
418b9a493901 x86/apic: Remove the duplicated tracing versions of interrupts
5be95f8dfffe x86/irq: Get rid of duplicated trace_x86_platform_ipi() code
bd936c5d828a x86/apic: Remove the duplicated tracing version of local_timer_interrupt()
f4971407abbb x86/traps: Simplify pagefault tracing logic
2f436623b2c3 x86/tracing: Introduce a static key for exception tracing
4395735bf0a9 arm64/syscalls: Check address limit on user-mode return
3e1d12839e05 arm/syscalls: Check address limit on user-mode return
649cd48799ef x86/syscalls: Check address limit on user-mode return
8fe35f321cd3 audit: fix memleak in auditd_send_unicast_skb.
4b1e889a4dd0 arm64: ptrace: Flush user-RW TLS reg to thread_struct before reading
75a382c72d50 arm64: Add dump_backtrace() in show_regs
(From OE-Core rev: 9edeb4733e4a49d11febadc0e282c68c05e39575)
(From OE-Core rev: 87b88590ec4f9fce8a9d1bcc56631f17abd137f0)
Signed-off-by: Bruce Ashfield <bruce.ashfield@windriver.com>
Signed-off-by: Ross Burton <ross.burton@intel.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta/classes/distutils3-base.bbclass')
0 files changed, 0 insertions, 0 deletions