summaryrefslogtreecommitdiff
path: root/meta-openbmc-mods/meta-common/recipes-kernel/linux/linux-aspeed_%.bbappend
blob: 0d15f61d76355ae31203ea9e81e302804cee4d32 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
FILESEXTRAPATHS:prepend := "${THISDIR}/${PN}:"

LINUX_VERSION = "5.15"

KBRANCH = "dev-5.15-intel"
KSRC = "git://git@github.com/Intel-BMC/linux.git;protocol=ssh;branch=${KBRANCH}"
# Include this as a comment only for downstream auto-bump
# SRC_URI = "git://git@github.com/Intel-BMC/linux.git;protocol=ssh;branch=dev-5.15-intel"
SRCREV="aaccb149bfa6ff74dc8e9ff043191730060002db"

do_compile:prepend(){
   # device tree compiler flags
   export DTC_FLAGS=-@
}

SRC_URI += " \
        file://intel.cfg \
        file://0001-peci-aspeed-Improve-workaround-for-controller-hang.patch \
        file://0002-gpio-gpio-aspeed-sgpio-Fix-wrong-hwirq-base-in-irq-h.patch \
        file://0003-Add-mux-deselect-support-on-timeout.patch \
        file://CVE-2022-0847.patch \
        file://CVE-2022-48425.patch \
        file://CVE-2023-0386.patch \
        file://CVE-2023-0458.patch \
        file://CVE-2023-2235.patch \
        file://CVE-2023-34256.patch \
        file://CVE-2023-42754.patch \
        file://CVE-2023-5178.patch \
        file://CVE-2022-0185.patch \
        file://CVE-2021-22600.patch \
        file://CVE-2022-24122.patch \
        file://CVE-2022-0492.patch \
        file://CVE-2022-25258.patch \
        file://CVE-2022-0742.patch\
        file://CVE-2021-4197-001.patch \
        file://CVE-2021-4197-002.patch\
        file://CVE-2021-4197-003.patch\
        file://CVE-2021-44733.patch\
        file://CVE-2022-29582.patch\
        file://CVE-2022-30594.patch\
        file://CVE-2022-20008.patch\
        file://CVE-2022-1998.patch\
        file://CVE-2022-32296.patch\
        file://CVE-2021-39685.patch\
        file://CVE-2021-39685-1.patch\
        file://CVE-2021-39685-2.patch\
        file://CVE-2021-39698.patch\
        file://CVE-2021-39698-1.patch\
        file://CVE-2021-4083.patch\
        file://CVE-2022-1729.patch\
        file://CVE-2022-1184_1.patch\
        file://CVE-2022-1184_2.patch\
        file://CVE-2022-2938.patch\
        file://CVE-2022-2959.patch\
        file://CVE-2022-1012.patch\
        file://CVE-2022-2503.patch\
        file://CVE-2022-20368.patch\
        file://CVE-2022-0168.patch\
        file://CVE-2022-40476.patch\
        file://CVE-2022-2663-1.patch\
        file://CVE-2022-2663-2.patch\
        file://CVE-2022-20158-1.patch\
        file://0004-soc-aspeed-lpc-mbox-Don-t-allow-partial-reads.patch \
        file://CVE-2022-3543.patch \
        file://CVE-2022-42703.patch \
        file://CVE-2022-4378-1.patch \
        file://CVE-2022-4378-2.patch \
        file://CVE-2022-2978.patch \
        file://CVE-2022-3623.patch \
        file://CVE-2023-0394.patch \
        file://CVE-2023-1252.patch\
        file://CVE-2023-1073.patch\
        file://CVE-2023-1077.patch\
        file://CVE-2023-1582.patch \
        file://CVE-2020-36516.patch \
        file://0005-ext4-add-EXT4_INODE_HAS_XATTR_SPACE-macro-in-xattr-h.patch \
        file://CVE-2023-2513.patch \
        file://CVE-2023-2269.patch \
        file://CVE-2023-2156.patch \
        file://CVE-2023-3355.patch \
        file://CVE-2023-3357.patch \
        file://CVE-2023-52458.patch \
        file://CVE-2022-3566.patch \
        file://CVE-2023-3161.patch \
        file://CVE-2022-40982.patch \
        file://CVE-2023-2860.patch \
        file://CVE-2023-31085.patch \
        file://CVE-2023-4004.patch \
	file://CVE-2023-2176.patch \
	file://CVE-2023-45863.patch \
        file://CVE-2021-33631.patch \
        file://CVE-2024-0562.patch \
        file://CVE-2024-0639.patch \
        file://CVE-2024-0775.patch \
        file://CVE-2023-52449.patch \
        file://CVE-2023-52435.patch \
	file://CVE-2021-46933.patch \
	file://CVE-2021-46934.patch \
	file://CVE-2021-46936.patch \
        file://CVE-2021-46923.patch \
        file://CVE-2023-52580.patch \
        file://CVE-2023-52597.patch \
        file://CVE-2023-52598.patch \
        file://CVE-2023-52612.patch \
        file://CVE-2023-52615.patch \
        file://CVE-2023-52619.patch \
        file://CVE-2024-26631.patch \
        file://CVE-2024-26671.patch \
        file://CVE-2024-26679.patch \
        file://CVE-2024-26772.patch \
        file://CVE-2024-26773.patch \
        file://CVE-2024-26774.patch \
        file://CVE-2024-26704.patch \
        file://CVE-2024-26720.patch \
        file://CVE-2024-26735.patch \
        file://CVE-2024-26795.patch \
        file://CVE-2021-47087.patch \
	file://CVE-2023-52467.patch \
        file://CVE-2023-52522.patch \
        file://CVE-2023-52622.patch \
        file://CVE-2024-26676.patch \
        file://CVE-2024-26602.patch \
        file://CVE-2024-26001.patch \
        file://CVE-2024-26686.patch \
        file://CVE-2022-48659.patch \
        file://CVE-2022-48660.patch \
        file://CVE-2022-48672.patch \
        file://CVE-2022-48687.patch \
        file://CVE-2022-48689.patch \
        file://CVE-2024-26900.patch \
        file://CVE-2024-35984.patch \
        file://CVE-2024-36008.patch \
        "
SRC_URI += "${@bb.utils.contains('IMAGE_FSTYPES', 'intel-pfr', 'file://1000-128MB-flashmap-for-PFR.patch', '', d)}"
SRC_URI += "${@bb.utils.contains('EXTRA_IMAGE_FEATURES', 'debug-tweaks', 'file://debug.cfg', '', d)}"