We have an issue with PAT handling on older processes with limited PAT bits,
see the patch description for the full problem. This replaces the runqemu
workaround with a kernel patch until we can get the kernel trees sorted
out and discuss a proper fix with upstream. It should be safe everywhere
so is applied unconditionally.
(From OE-Core rev: e00f0794a535c8e68ae1c87c8b01dd65645d570b)
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Integrating the following CVE update:
Author: Yevgeny Pats <yevgeny@perception-point.io>
Date: Tue Jan 19 22:09:04 2016 +0000
KEYS: Fix keyring ref leak in join_session_keyring()
This fixes CVE-2016-0728.
We also integrate the 4.4-rt3 version.
(From OE-Core rev: cca987b2f62dc6b51a02564ccd4041bde2897f13)
Signed-off-by: Bruce Ashfield <bruce.ashfield@windriver.com>
Signed-off-by: Ross Burton <ross.burton@intel.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
The 4.4 kernel has been under test via linux-yocto-dev, and is the next
LTS/LTSI kernel.
So we take our -dev support and created a named/versioned recipe for use
in upcoming releases.
(From OE-Core rev: 2dbc788bc3988532f0932e8e51e24ba702c28f6a)
Signed-off-by: Bruce Ashfield <bruce.ashfield@windriver.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>