summaryrefslogtreecommitdiffstats
path: root/meta/classes/distutils3-base.bbclass
diff options
context:
space:
mode:
authorBruce Ashfield <bruce.ashfield@windriver.com>2018-05-18 11:05:48 -0400
committerRichard Purdie <richard.purdie@linuxfoundation.org>2018-06-15 17:56:52 +0100
commitfc2aeb1372c9462149ecd51ca4cf563b0fda2739 (patch)
tree8be73f65972d4437a6045b8797122a9e9da94130 /meta/classes/distutils3-base.bbclass
parent44376d10e6f8c9bab3464a1ce2f8cabfbc78456a (diff)
downloadpoky-fc2aeb1372c9462149ecd51ca4cf563b0fda2739.tar.gz
linux-yocto/4.12: update to v4.12.22
Paul Gortmaker released another 4.12-stable that comprises the following changes: 23dcfbfbca0a Linux 4.12.22 d4879ce5efb7 arm64: Kill PSCI_GET_VERSION as a variant-2 workaround 77915e1a7544 arm64: Add ARM_SMCCC_ARCH_WORKAROUND_1 BP hardening support b06fbedb6e14 arm/arm64: smccc: Implement SMCCC v1.1 inline primitive 1f400b388a20 arm/arm64: smccc: Make function identifiers an unsigned quantity f5d3afa3aecc firmware/psci: Expose SMCCC version through psci_ops 4c69d3a66e60 firmware/psci: Expose PSCI conduit cfec930a45f8 arm64: KVM: Add SMCCC_ARCH_WORKAROUND_1 fast handling 9e9697733818 arm64: KVM: Report SMCCC_ARCH_WORKAROUND_1 BP hardening support 2a8574eb6e3f arm/arm64: KVM: Turn kvm_psci_version into a static inline 2c79f828dfed arm64: KVM: Make PSCI_VERSION a fast path 042626a87234 arm/arm64: KVM: Advertise SMCCC v1.1 48a9e563e528 arm/arm64: KVM: Implement PSCI 1.0 support 28283de68052 arm/arm64: KVM: Add smccc accessors to PSCI code 33d47367626b arm/arm64: KVM: Add PSCI_VERSION helper 82ca1dcebf95 arm/arm64: KVM: Consolidate the PSCI include files efb7c6b5b7f9 arm64: KVM: Increment PC after handling an SMC trap b720b7837ed8 arm64: Branch predictor hardening for Cavium ThunderX2 6f2750c7a1c9 arm64: Implement branch predictor hardening for Falkor b56fa11959a7 arm64: Implement branch predictor hardening for affected Cortex-A CPUs 5eb80f970c49 arm64: cputype: Add missing MIDR values for Cortex-A72 and Cortex-A75 cf45e77d8106 arm64: entry: Apply BP hardening for suspicious interrupts from EL0 e9c2f25bf62d arm64: entry: Apply BP hardening for high-priority synchronous exceptions b4f51ebd0fc3 arm64: KVM: Use per-CPU vector when BP hardening is enabled e8f7c5ba8c70 arm64: Move BP hardening to check_and_switch_context e2c124fa14e1 arm64: Add skeleton to harden the branch predictor against aliasing attacks ddd305f0fdf8 arm64: Move post_ttbr_update_workaround to C code 204d987e7143 drivers/firmware: Expose psci_get_version through psci_ops structure 8880e6380d91 arm64: cpufeature: Pass capability structure to ->enable callback 48017c15187b arm64: Run enable method for errata work arounds on late CPUs cf64258fb122 arm64: cpufeature: __this_cpu_has_cap() shouldn't stop early 7d550f8cb119 arm64: futex: Mask __user pointers prior to dereference b9d01590df34 arm64: uaccess: Mask __user pointers for __arch_{clear, copy_*}_user 1b74ca827ed3 arm64: uaccess: Don't bother eliding access_ok checks in __{get, put}_user 41b08b7c365b arm64: uaccess: Prevent speculative use of the current addr_limit 1736debe11ef arm64: entry: Ensure branch through syscall table is bounded under speculation 84e4780beea5 arm64: Use pointer masking to limit uaccess speculation d77d4c9aa433 arm64: Make USER_DS an inclusive limit b96ab81a6468 arm64: Implement array_index_mask_nospec() 21eb21937d8e arm64: barrier: Add CSDB macros to control data-value prediction da1217a79997 arm64: idmap: Use "awx" flags for .idmap.text .pushsection directives c20b48f5b7a3 arm64: entry: Reword comment about post_ttbr_update_workaround 15d4d37f7709 arm64: Force KPTI to be disabled on Cavium ThunderX 3489abd67e33 arm64: kpti: Add ->enable callback to remap swapper using nG mappings b154d9be8c6f arm64: mm: Permit transitioning from Global to Non-Global without BBM 1610bb019302 arm64: kpti: Make use of nG dependent on arm64_kernel_unmapped_at_el0() 250a3a64585f arm64: Turn on KPTI only on CPUs that need it 32da2aa26b97 arm64: cputype: Add MIDR values for Cavium ThunderX2 CPUs 93d290bbe8f1 arm64: kpti: Fix the interaction between ASID switching and software PAN 923618230c12 arm64: mm: Introduce TTBR_ASID_MASK for getting at the ASID in the TTBR 51218390beb6 arm64: capabilities: Handle duplicate entries for a capability 630cf7161fca arm64: Take into account ID_AA64PFR0_EL1.CSV3 4b7ebe5c3644 arm64: Kconfig: Reword UNMAP_KERNEL_AT_EL0 kconfig entry e09f32469091 arm64: Kconfig: Add CONFIG_UNMAP_KERNEL_AT_EL0 8202169d678a arm64: use RET instruction for exiting the trampoline 414d9eabda3d arm64: kaslr: Put kernel vectors address in separate data page fce92f180168 arm64: entry: Add fake CPU feature for unmapping the kernel at EL0 83584a583bff arm64: tls: Avoid unconditional zeroing of tpidrro_el0 for native tasks 4732b98b6400 arm64: cpu_errata: Add Kryo to Falkor 1003 errata 85dacaa58475 arm64: erratum: Work around Falkor erratum #E1003 in trampoline code bb0fa2f9cece arm64: entry: Hook up entry trampoline to exception vectors df7f7308d5f0 arm64: entry: Explicitly pass exception level to kernel_ventry macro 14bcc912ca7e arm64: mm: Map entry trampoline into trampoline and kernel page tables c30f47afaa64 arm64: entry: Add exception trampoline page for exceptions from EL0 21b891bf770f arm64: mm: Invalidate both kernel and user ASIDs when performing TLBI 09e8df92ba8e arm64: mm: Add arm64_kernel_unmapped_at_el0 helper 6832da386e60 arm64: mm: Allocate ASIDs in pairs bfd2ff25b585 arm64: mm: Fix and re-enable ARM64_SW_TTBR0_PAN 1e4477930e5e arm64: mm: Rename post_ttbr0_update_workaround 1e1890551573 arm64: mm: Remove pre_ttbr0_update_workaround for Falkor erratum #E1003 0223b2589432 arm64: mm: Move ASID from TTBR0 to TTBR1 9fe82f4ebdc3 arm64: mm: Temporarily disable ARM64_SW_TTBR0_PAN 199f832ebf00 arm64: mm: Use non-global mappings for kernel space e9b0e14af7e3 arm64: move TASK_* definitions to <asm/processor.h> cab5207f57fd brd: remove unused brd_mutex 7522521435a4 arm/syscalls: Optimize address limit check 797f169015c5 Revert "arm/syscalls: Check address limit on user-mode return" 3056c8f5be3a syscalls: Use CHECK_DATA_CORRUPTION for addr_limit_user_check 74116ef5625a arm64: add VMAP_STACK overflow detection 0d82fd80a2d1 arm64: add on_accessible_stack() c38502bc1472 arm64: add basic VMAP_STACK support c3a53247c1ff arm64: use an irq stack pointer 73dcb6d84040 arm64: assembler: allow adr_this_cpu to use the stack pointer 344a8e142697 arm64: factor out entry stack manipulation 59c4a6fb5606 efi/arm64: add EFI_KIMG_ALIGN 1a5300c6063f arm64: move SEGMENT_ALIGN to <asm/memory.h> 3969d302c52f arm64: clean up irq stack definitions f030f0edba48 arm64: clean up THREAD_* definitions 1f3c78245a4a arm64: factor out PAGE_* and CONT_* definitions 8a5bc40e0c93 arm64: kernel: remove {THREAD,IRQ_STACK}_START_SP deba543af0b8 fork: allow arch-override of VMAP stack alignment 774f64ce7b0f arm64: remove __die()'s stack dump 7342855775d5 arm64: unwind: remove sp from struct stackframe 553dbcbcff1d arm64: unwind: reference pt_regs via embedded stack frame 926b0fe43412 arm64: unwind: disregard frame.sp when validating frame pointer da32ad8b5c11 arm64: unwind: avoid percpu indirection for irq stack eac4e8ecdd77 arm64: move non-entry code out of .entry.text b341e176374e arm64: consistently use bl for C exception entry 3cdad1f0b9d0 arm64: Add ASM_BUG() 01ace65c9150 arm64/vdso: Support mremap() for vDSO 8050b6ba63cb arm64: Handle trapped DC CVAP 0ee09d69dc93 arm64: Expose DC CVAP to userspace 704046e3e554 arm64: Convert __inval_cache_range() to area-based b40935f19c73 arm64: mm: Fix set_memory_valid() declaration 29530b5b549e arm64: Abstract syscallno manipulation f9f1c9d7d767 arm64: syscallno is secretly an int, make it official ab69949ffe23 x86/tracing: Build tracepoints only when they are used 03793940e25c x86/tracing: Disentangle pagefault and resched IPI tracing key 2822852ed8a5 x86/idt: Clean up the i386 low level entry macros d5654eb18f73 x86/idt: Remove the tracing IDT completely 0d38071a05e7 x86/smp: Use static key for reschedule interrupt tracing 4ef6e0f37891 x86/smp: Remove pointless duplicated interrupt code 40b216cec86d x86/mce: Remove duplicated tracing interrupt code 03f41cf538fd x86/irqwork: Get rid of duplicated tracing interrupt code 418b9a493901 x86/apic: Remove the duplicated tracing versions of interrupts 5be95f8dfffe x86/irq: Get rid of duplicated trace_x86_platform_ipi() code bd936c5d828a x86/apic: Remove the duplicated tracing version of local_timer_interrupt() f4971407abbb x86/traps: Simplify pagefault tracing logic 2f436623b2c3 x86/tracing: Introduce a static key for exception tracing 4395735bf0a9 arm64/syscalls: Check address limit on user-mode return 3e1d12839e05 arm/syscalls: Check address limit on user-mode return 649cd48799ef x86/syscalls: Check address limit on user-mode return 8fe35f321cd3 audit: fix memleak in auditd_send_unicast_skb. 4b1e889a4dd0 arm64: ptrace: Flush user-RW TLS reg to thread_struct before reading 75a382c72d50 arm64: Add dump_backtrace() in show_regs (From OE-Core rev: 9edeb4733e4a49d11febadc0e282c68c05e39575) (From OE-Core rev: 87b88590ec4f9fce8a9d1bcc56631f17abd137f0) Signed-off-by: Bruce Ashfield <bruce.ashfield@windriver.com> Signed-off-by: Ross Burton <ross.burton@intel.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org> Signed-off-by: Armin Kuster <akuster808@gmail.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta/classes/distutils3-base.bbclass')
0 files changed, 0 insertions, 0 deletions