From patchwork Thu Mar 30 21:13:43 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 21955 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id EF33FC6FD1D for ; Thu, 30 Mar 2023 21:14:13 +0000 (UTC) Received: from mail-pj1-f54.google.com (mail-pj1-f54.google.com [209.85.216.54]) by mx.groups.io with SMTP id smtpd.web10.38926.1680210847409167621 for ; Thu, 30 Mar 2023 14:14:07 -0700 Authentication-Results: mx.groups.io; dkim=fail reason="signature has expired" header.i=@sakoman-com.20210112.gappssmtp.com header.s=20210112 header.b=i4sKkkRd; spf=softfail (domain: sakoman.com, ip: 209.85.216.54, mailfrom: steve@sakoman.com) Received: by mail-pj1-f54.google.com with SMTP id d13so18528138pjh.0 for ; Thu, 30 Mar 2023 14:14:07 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20210112.gappssmtp.com; s=20210112; t=1680210846; x=1682802846; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=fLTN6Mgqlk7XAg1zyy2hujU2yzmDPZr8bo5rWdvO5Hc=; b=i4sKkkRdqwBNUeevPzSUzuxWcB++82GdVoRFCSg30t+5cuPggjw3mLeojws3Tz8b9f yPyMpLjKzcCXcLFZLYmNoKuLNK1RzYwnDcZE94CvPZaozvZMqKFPkidVR0fwaWWsd066 34WCWB3My9PsjP/oOMklaOSX3rqgmxXtnJEl4+DQv2+pPGz/pfVdRhoHrE9mJ3ujX8JD 3KOrMVk5yeIPzw0McgjwpagGXIwCObeDQU+P81OUCRNMynJ0pauSiIclAxKdv6BPWT1Z gPdf6HA2grLKWUI+quuax769tSM59Cu8m7Jr33e+3079I38DROYlaZOHljySZviza69Y 7o0A== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; t=1680210846; x=1682802846; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=fLTN6Mgqlk7XAg1zyy2hujU2yzmDPZr8bo5rWdvO5Hc=; b=vXCTaayPw026lCh4WOeXJJ09UKCizlfrqrNyAUKPSbLfZYQ/OVk31eCfbdgTbFsLvm 7UA+nWzJpBQHE6IopUBzIIDJxJiUyLQfcWa71Q8obUhOM3P/8O57T3wYKpPyKYbyPaHP yXIUhge/OVPZBTr3vu4r1pU8I9PMjr+z6jYTlegV3PtfHllL089CfVvaAmpvZIZ8qCTM GV8Ke11ykKCFoCKPTXEEVdKqQ3I2BX1QJ25EsKL8siw8Cn2T/GYAOj0XOV/U8I94MjNM mtzaN5G/TXp/2yN9Qg6X8rr7oqJW2v+l9IyImk/jFkdt8p1PM73mzjf9uNvjMElsotBQ LNYA== X-Gm-Message-State: AAQBX9fURVsvYYDLVmVaTukM/kdxJZ+sqtG5tVz+qXSnHDYZGRwK7nsF nzNRDjr8gHOPwfabQT5gPIQQlGJvVn4CxlQ0XJA= X-Google-Smtp-Source: AKy350a5wMSMsqS8yo3hn6W/FE55xS5lbHSG8mlAC7aPDyjeFJShVw7P2M19dKqBhw8ko9bHVs99Qg== X-Received: by 2002:a17:903:2803:b0:1a1:c0e6:d8d6 with SMTP id kp3-20020a170903280300b001a1c0e6d8d6mr20017834plb.54.1680210846456; Thu, 30 Mar 2023 14:14:06 -0700 (PDT) Received: from hexa.router0800d9.com (dhcp-72-253-4-112.hawaiiantel.net. [72.253.4.112]) by smtp.gmail.com with ESMTPSA id c30-20020a631c1e000000b0050301521335sm250661pgc.11.2023.03.30.14.14.05 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 30 Mar 2023 14:14:06 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][langdale 01/14] python3-setuptools: fix for CVE-2022-40897 Date: Thu, 30 Mar 2023 11:13:43 -1000 Message-Id: X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 30 Mar 2023 21:14:13 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/179360 From: Narpat Mali Python Packaging Authority (PyPA) setuptools before 65.5.1 allows remote attackers to cause a denial of service via HTML in a crafted package or custom PackageIndex page. There is a Regular Expression Denial of Service (ReDoS) in package_index.py. CVE: CVE-2022-40897 Upstream-Status: Backport [https://github.com/pypa/setuptools/commit/43a9c9bfa6aa626ec2a22540bea28d2ca77964be] cherry-pick and modify from OE-Core rev: f574d8d57ff3fbc38e350e7a90913993081c4fdf Signed-off-by: Narpat Mali Signed-off-by: Steve Sakoman Signed-off-by: Chee Yang Lee Signed-off-by: Steve Sakoman --- ...-of-whitespace-to-search-backtrack.-.patch | 31 +++++++++++++++++++ .../python/python3-setuptools_65.0.2.bb | 4 ++- 2 files changed, 34 insertions(+), 1 deletion(-) create mode 100644 meta/recipes-devtools/python/python3-setuptools/0001-Limit-the-amount-of-whitespace-to-search-backtrack.-.patch diff --git a/meta/recipes-devtools/python/python3-setuptools/0001-Limit-the-amount-of-whitespace-to-search-backtrack.-.patch b/meta/recipes-devtools/python/python3-setuptools/0001-Limit-the-amount-of-whitespace-to-search-backtrack.-.patch new file mode 100644 index 0000000000..20a13da7bc --- /dev/null +++ b/meta/recipes-devtools/python/python3-setuptools/0001-Limit-the-amount-of-whitespace-to-search-backtrack.-.patch @@ -0,0 +1,31 @@ +From 9e9f617a83f6593b476669030b0347d48e831c3f Mon Sep 17 00:00:00 2001 +From: Narpat Mali +Date: Mon, 9 Jan 2023 14:45:05 +0000 +Subject: [PATCH] Limit the amount of whitespace to search/backtrack. Fixes + #3659. + +CVE: CVE-2022-40897 + +Upstream-Status: Backport [https://github.com/pypa/setuptools/commit/43a9c9bfa6aa626ec2a22540bea28d2ca77964be] + +Signed-off-by: Narpat Mali +--- + setuptools/package_index.py | 2 +- + 1 file changed, 1 insertion(+), 1 deletion(-) + +diff --git a/setuptools/package_index.py b/setuptools/package_index.py +index 270e7f3..e93fcc6 100644 +--- a/setuptools/package_index.py ++++ b/setuptools/package_index.py +@@ -197,7 +197,7 @@ def unique_values(func): + return wrapper + + +-REL = re.compile(r"""<([^>]*\srel\s*=\s*['"]?([^'">]+)[^>]*)>""", re.I) ++REL = re.compile(r"""<([^>]*\srel\s{0,10}=\s{0,10}['"]?([^'" >]+)[^>]*)>""", re.I) + # this line is here to fix emacs' cruddy broken syntax highlighting + + +-- +2.34.1 + diff --git a/meta/recipes-devtools/python/python3-setuptools_65.0.2.bb b/meta/recipes-devtools/python/python3-setuptools_65.0.2.bb index 1a639ea333..d7cbb99c9d 100644 --- a/meta/recipes-devtools/python/python3-setuptools_65.0.2.bb +++ b/meta/recipes-devtools/python/python3-setuptools_65.0.2.bb @@ -9,7 +9,9 @@ inherit pypi python_setuptools_build_meta SRC_URI:append:class-native = " file://0001-conditionally-do-not-fetch-code-by-easy_install.patch" SRC_URI += "file://0001-change-shebang-to-python3.patch \ - file://0001-_distutils-sysconfig.py-make-it-possible-to-substite.patch" + file://0001-_distutils-sysconfig.py-make-it-possible-to-substite.patch \ + file://0001-Limit-the-amount-of-whitespace-to-search-backtrack.-.patch \ +" SRC_URI[sha256sum] = "101bf15ca723beef42c8db91a761f3748d4d697e17fae904db60c0b619d8d094" From patchwork Thu Mar 30 21:13:44 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 21956 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 01ED8C761AF for ; Thu, 30 Mar 2023 21:14:14 +0000 (UTC) Received: from mail-pf1-f169.google.com (mail-pf1-f169.google.com [209.85.210.169]) by mx.groups.io with SMTP id smtpd.web10.38929.1680210852754171690 for ; Thu, 30 Mar 2023 14:14:12 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20210112.gappssmtp.com header.s=20210112 header.b=zfkccLEK; spf=softfail (domain: sakoman.com, ip: 209.85.210.169, mailfrom: steve@sakoman.com) Received: by mail-pf1-f169.google.com with SMTP id u38so13486318pfg.10 for ; Thu, 30 Mar 2023 14:14:12 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20210112.gappssmtp.com; s=20210112; t=1680210852; x=1682802852; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=bjsmXY26wLtguvqfwj16oYtEf1WuVLnXCQyJFYlqniw=; b=zfkccLEKJK8u5Tcp++trrlT7ysirlD77qONj48eQrqpyeP+2kc7T5vT5wk/RCXdjle def28qHEtemtXf7IJuzInH5GYPDjrARtjKhG9EyjAUBe9I01niwBLpqqq68OFlMPKd0F UhTLbizCDZOSJtykL35oKd52zbBzfYtfwtIGRwEwZ/n1gnEqyT4kjZbuw4lurtdzUvYo nUwsCeSeVqQSMck+AqOM5rK5i2/07BtCt+KGVmjE/TlPqtFX8HWmZW3Yxrv3q7kIKnof eRcFNz5wKmbfUblPwqLLKkcvUzwtljed4rbNI9/U77YfeQUYvMm51H5mOcTpA/pbnToa 2P4A== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; t=1680210852; x=1682802852; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=bjsmXY26wLtguvqfwj16oYtEf1WuVLnXCQyJFYlqniw=; b=TJntrg2g0xYtXhKmRZdgDjAWa5Zov5GOvhdbL3sOOj/I/Op/gdof5ItiwTkWQBj8Mj IiR5Y45Dd/C4Va4jaLi94+yAjCg93HF0TuhxqkdrejRvKPXqENAQ39gCu6yCHskc9U2k TaAXPBvyy21o1yN9BJqE9/1BbUaAJRxsnFshm1t5WwsSJGIkyUYzq9SIJ8gIf5rYIaBZ sPAvO9/0guyFtuh5bY5icSJ0anVli6J2ouutTgsY10WwIJ9X7wtXeSLmvPcaj3lXqR7W TejDt7g8T5f0MvPcBi6gnwz9REGalKAWmcIOKTfywn5bvn+LNPRflWgHzaLm3pfpMMbv cFrg== X-Gm-Message-State: AAQBX9cws7VZ1wof9SM/S3188kq+bQDUyszVHadtSvbJYiV7DyMLPXxR J/Q4lLvh7x99OlXNkX0dyIJ6GNszNsMcrIg4YCg= X-Google-Smtp-Source: AKy350bihHhs7I3PWrLLzi0A7EikWMHX5YXvwjpkSjP1UVN17hzK30jewXu5I7GTj/fysI2k8PEtqA== X-Received: by 2002:aa7:9d9b:0:b0:628:1274:4d67 with SMTP id f27-20020aa79d9b000000b0062812744d67mr857453pfq.24.1680210851567; Thu, 30 Mar 2023 14:14:11 -0700 (PDT) Received: from hexa.router0800d9.com (dhcp-72-253-4-112.hawaiiantel.net. [72.253.4.112]) by smtp.gmail.com with ESMTPSA id c30-20020a631c1e000000b0050301521335sm250661pgc.11.2023.03.30.14.14.10 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 30 Mar 2023 14:14:11 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][langdale 02/14] openssl: Security fix for CVE-2023-0464, CVE-2023-0465, CVE-2023-0466 Date: Thu, 30 Mar 2023 11:13:44 -1000 Message-Id: X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 30 Mar 2023 21:14:14 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/179361 From: Siddharth Doshi Upstream-Status: - CVE-2023-0464: Backport from [https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=959c59c7a0164117e7f8366466a32bb1f8d77ff1] - CVE-2023-0465: Backport from [https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=1dd43e0709fece299b15208f36cc7c76209ba0bb] - CVE-2023-0466: Backport from [https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=51e8a84ce742db0f6c70510d0159dad8f7825908] Signed-off-by: Siddharth Doshi Signed-off-by: Steve Sakoman --- .../openssl/openssl/CVE-2023-0464.patch | 225 ++++++++++++++++++ .../openssl/openssl/CVE-2023-0465.patch | 56 +++++ .../openssl/openssl/CVE-2023-0466.patch | 50 ++++ .../openssl/openssl_3.0.8.bb | 3 + 4 files changed, 334 insertions(+) create mode 100644 meta/recipes-connectivity/openssl/openssl/CVE-2023-0464.patch create mode 100644 meta/recipes-connectivity/openssl/openssl/CVE-2023-0465.patch create mode 100644 meta/recipes-connectivity/openssl/openssl/CVE-2023-0466.patch diff --git a/meta/recipes-connectivity/openssl/openssl/CVE-2023-0464.patch b/meta/recipes-connectivity/openssl/openssl/CVE-2023-0464.patch new file mode 100644 index 0000000000..3b94c48e8d --- /dev/null +++ b/meta/recipes-connectivity/openssl/openssl/CVE-2023-0464.patch @@ -0,0 +1,225 @@ +From 959c59c7a0164117e7f8366466a32bb1f8d77ff1 Mon Sep 17 00:00:00 2001 +From: Pauli +Date: Wed, 8 Mar 2023 15:28:20 +1100 +Subject: [PATCH] x509: excessive resource use verifying policy constraints + +A security vulnerability has been identified in all supported versions +of OpenSSL related to the verification of X.509 certificate chains +that include policy constraints. Attackers may be able to exploit this +vulnerability by creating a malicious certificate chain that triggers +exponential use of computational resources, leading to a denial-of-service +(DoS) attack on affected systems. + +Fixes CVE-2023-0464 + +Reviewed-by: Tomas Mraz +Reviewed-by: Shane Lontis +(Merged from https://github.com/openssl/openssl/pull/20568) + +Upstream-Status: Backport from [https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=959c59c7a0164117e7f8366466a32bb1f8d77ff1] +CVE: CVE-2023-0464 +Signed-off-by: Siddharth Doshi +--- + crypto/x509/pcy_local.h | 8 +++++++- + crypto/x509/pcy_node.c | 12 +++++++++--- + crypto/x509/pcy_tree.c | 36 ++++++++++++++++++++++++++---------- + 3 files changed, 42 insertions(+), 14 deletions(-) + +diff --git a/crypto/x509/pcy_local.h b/crypto/x509/pcy_local.h +index 18b53cc..cba107c 100644 +--- a/crypto/x509/pcy_local.h ++++ b/crypto/x509/pcy_local.h +@@ -111,6 +111,11 @@ struct X509_POLICY_LEVEL_st { + }; + + struct X509_POLICY_TREE_st { ++ /* The number of nodes in the tree */ ++ size_t node_count; ++ /* The maximum number of nodes in the tree */ ++ size_t node_maximum; ++ + /* This is the tree 'level' data */ + X509_POLICY_LEVEL *levels; + int nlevel; +@@ -157,7 +162,8 @@ X509_POLICY_NODE *ossl_policy_tree_find_sk(STACK_OF(X509_POLICY_NODE) *sk, + X509_POLICY_NODE *ossl_policy_level_add_node(X509_POLICY_LEVEL *level, + X509_POLICY_DATA *data, + X509_POLICY_NODE *parent, +- X509_POLICY_TREE *tree); ++ X509_POLICY_TREE *tree, ++ int extra_data); + void ossl_policy_node_free(X509_POLICY_NODE *node); + int ossl_policy_node_match(const X509_POLICY_LEVEL *lvl, + const X509_POLICY_NODE *node, const ASN1_OBJECT *oid); +diff --git a/crypto/x509/pcy_node.c b/crypto/x509/pcy_node.c +index 9d9a7ea..450f95a 100644 +--- a/crypto/x509/pcy_node.c ++++ b/crypto/x509/pcy_node.c +@@ -59,10 +59,15 @@ X509_POLICY_NODE *ossl_policy_level_find_node(const X509_POLICY_LEVEL *level, + X509_POLICY_NODE *ossl_policy_level_add_node(X509_POLICY_LEVEL *level, + X509_POLICY_DATA *data, + X509_POLICY_NODE *parent, +- X509_POLICY_TREE *tree) ++ X509_POLICY_TREE *tree, ++ int extra_data) + { + X509_POLICY_NODE *node; + ++ /* Verify that the tree isn't too large. This mitigates CVE-2023-0464 */ ++ if (tree->node_maximum > 0 && tree->node_count >= tree->node_maximum) ++ return NULL; ++ + node = OPENSSL_zalloc(sizeof(*node)); + if (node == NULL) { + ERR_raise(ERR_LIB_X509V3, ERR_R_MALLOC_FAILURE); +@@ -70,7 +75,7 @@ X509_POLICY_NODE *ossl_policy_level_add_node(X509_POLICY_LEVEL *level, + } + node->data = data; + node->parent = parent; +- if (level) { ++ if (level != NULL) { + if (OBJ_obj2nid(data->valid_policy) == NID_any_policy) { + if (level->anyPolicy) + goto node_error; +@@ -90,7 +95,7 @@ X509_POLICY_NODE *ossl_policy_level_add_node(X509_POLICY_LEVEL *level, + } + } + +- if (tree) { ++ if (extra_data) { + if (tree->extra_data == NULL) + tree->extra_data = sk_X509_POLICY_DATA_new_null(); + if (tree->extra_data == NULL){ +@@ -103,6 +108,7 @@ X509_POLICY_NODE *ossl_policy_level_add_node(X509_POLICY_LEVEL *level, + } + } + ++ tree->node_count++; + if (parent) + parent->nchild++; + +diff --git a/crypto/x509/pcy_tree.c b/crypto/x509/pcy_tree.c +index fa45da5..f953a05 100644 +--- a/crypto/x509/pcy_tree.c ++++ b/crypto/x509/pcy_tree.c +@@ -14,6 +14,17 @@ + + #include "pcy_local.h" + ++/* ++ * If the maximum number of nodes in the policy tree isn't defined, set it to ++ * a generous default of 1000 nodes. ++ * ++ * Defining this to be zero means unlimited policy tree growth which opens the ++ * door on CVE-2023-0464. ++ */ ++#ifndef OPENSSL_POLICY_TREE_NODES_MAX ++# define OPENSSL_POLICY_TREE_NODES_MAX 1000 ++#endif ++ + static void expected_print(BIO *channel, + X509_POLICY_LEVEL *lev, X509_POLICY_NODE *node, + int indent) +@@ -163,6 +174,9 @@ static int tree_init(X509_POLICY_TREE **ptree, STACK_OF(X509) *certs, + return X509_PCY_TREE_INTERNAL; + } + ++ /* Limit the growth of the tree to mitigate CVE-2023-0464 */ ++ tree->node_maximum = OPENSSL_POLICY_TREE_NODES_MAX; ++ + /* + * http://tools.ietf.org/html/rfc5280#section-6.1.2, figure 3. + * +@@ -180,7 +194,7 @@ static int tree_init(X509_POLICY_TREE **ptree, STACK_OF(X509) *certs, + if ((data = ossl_policy_data_new(NULL, + OBJ_nid2obj(NID_any_policy), 0)) == NULL) + goto bad_tree; +- if (ossl_policy_level_add_node(level, data, NULL, tree) == NULL) { ++ if (ossl_policy_level_add_node(level, data, NULL, tree, 1) == NULL) { + ossl_policy_data_free(data); + goto bad_tree; + } +@@ -239,7 +253,8 @@ static int tree_init(X509_POLICY_TREE **ptree, STACK_OF(X509) *certs, + * Return value: 1 on success, 0 otherwise + */ + static int tree_link_matching_nodes(X509_POLICY_LEVEL *curr, +- X509_POLICY_DATA *data) ++ X509_POLICY_DATA *data, ++ X509_POLICY_TREE *tree) + { + X509_POLICY_LEVEL *last = curr - 1; + int i, matched = 0; +@@ -249,13 +264,13 @@ static int tree_link_matching_nodes(X509_POLICY_LEVEL *curr, + X509_POLICY_NODE *node = sk_X509_POLICY_NODE_value(last->nodes, i); + + if (ossl_policy_node_match(last, node, data->valid_policy)) { +- if (ossl_policy_level_add_node(curr, data, node, NULL) == NULL) ++ if (ossl_policy_level_add_node(curr, data, node, tree, 0) == NULL) + return 0; + matched = 1; + } + } + if (!matched && last->anyPolicy) { +- if (ossl_policy_level_add_node(curr, data, last->anyPolicy, NULL) == NULL) ++ if (ossl_policy_level_add_node(curr, data, last->anyPolicy, tree, 0) == NULL) + return 0; + } + return 1; +@@ -268,7 +283,8 @@ static int tree_link_matching_nodes(X509_POLICY_LEVEL *curr, + * Return value: 1 on success, 0 otherwise. + */ + static int tree_link_nodes(X509_POLICY_LEVEL *curr, +- const X509_POLICY_CACHE *cache) ++ const X509_POLICY_CACHE *cache, ++ X509_POLICY_TREE *tree) + { + int i; + +@@ -276,7 +292,7 @@ static int tree_link_nodes(X509_POLICY_LEVEL *curr, + X509_POLICY_DATA *data = sk_X509_POLICY_DATA_value(cache->data, i); + + /* Look for matching nodes in previous level */ +- if (!tree_link_matching_nodes(curr, data)) ++ if (!tree_link_matching_nodes(curr, data, tree)) + return 0; + } + return 1; +@@ -307,7 +323,7 @@ static int tree_add_unmatched(X509_POLICY_LEVEL *curr, + /* Curr may not have anyPolicy */ + data->qualifier_set = cache->anyPolicy->qualifier_set; + data->flags |= POLICY_DATA_FLAG_SHARED_QUALIFIERS; +- if (ossl_policy_level_add_node(curr, data, node, tree) == NULL) { ++ if (ossl_policy_level_add_node(curr, data, node, tree, 1) == NULL) { + ossl_policy_data_free(data); + return 0; + } +@@ -370,7 +386,7 @@ static int tree_link_any(X509_POLICY_LEVEL *curr, + /* Finally add link to anyPolicy */ + if (last->anyPolicy && + ossl_policy_level_add_node(curr, cache->anyPolicy, +- last->anyPolicy, NULL) == NULL) ++ last->anyPolicy, tree, 0) == NULL) + return 0; + return 1; + } +@@ -553,7 +569,7 @@ static int tree_calculate_user_set(X509_POLICY_TREE *tree, + extra->flags = POLICY_DATA_FLAG_SHARED_QUALIFIERS + | POLICY_DATA_FLAG_EXTRA_NODE; + node = ossl_policy_level_add_node(NULL, extra, anyPolicy->parent, +- tree); ++ tree, 1); + } + if (!tree->user_policies) { + tree->user_policies = sk_X509_POLICY_NODE_new_null(); +@@ -580,7 +596,7 @@ static int tree_evaluate(X509_POLICY_TREE *tree) + + for (i = 1; i < tree->nlevel; i++, curr++) { + cache = ossl_policy_cache_set(curr->cert); +- if (!tree_link_nodes(curr, cache)) ++ if (!tree_link_nodes(curr, cache, tree)) + return X509_PCY_TREE_INTERNAL; + + if (!(curr->flags & X509_V_FLAG_INHIBIT_ANY) +-- +2.35.7 + diff --git a/meta/recipes-connectivity/openssl/openssl/CVE-2023-0465.patch b/meta/recipes-connectivity/openssl/openssl/CVE-2023-0465.patch new file mode 100644 index 0000000000..57fd494464 --- /dev/null +++ b/meta/recipes-connectivity/openssl/openssl/CVE-2023-0465.patch @@ -0,0 +1,56 @@ +From 1dd43e0709fece299b15208f36cc7c76209ba0bb Mon Sep 17 00:00:00 2001 +From: Matt Caswell +Date: Tue, 7 Mar 2023 16:52:55 +0000 +Subject: [PATCH] Ensure that EXFLAG_INVALID_POLICY is checked even in leaf + certs + +Even though we check the leaf cert to confirm it is valid, we +later ignored the invalid flag and did not notice that the leaf +cert was bad. + +Fixes: CVE-2023-0465 + +Reviewed-by: Hugo Landau +Reviewed-by: Tomas Mraz +(Merged from https://github.com/openssl/openssl/pull/20587) + +Upstream-Status: Backport from [https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=1dd43e0709fece299b15208f36cc7c76209ba0bb] +CVE: CVE-2023-0465 +Signed-off-by: Siddharth Doshi +--- + crypto/x509/x509_vfy.c | 12 ++++++++++-- + 1 file changed, 10 insertions(+), 2 deletions(-) + +diff --git a/crypto/x509/x509_vfy.c b/crypto/x509/x509_vfy.c +index 9384f1d..a0282c3 100644 +--- a/crypto/x509/x509_vfy.c ++++ b/crypto/x509/x509_vfy.c +@@ -1654,15 +1654,23 @@ static int check_policy(X509_STORE_CTX *ctx) + goto memerr; + /* Invalid or inconsistent extensions */ + if (ret == X509_PCY_TREE_INVALID) { +- int i; ++ int i, cbcalled = 0; + + /* Locate certificates with bad extensions and notify callback. */ +- for (i = 1; i < sk_X509_num(ctx->chain); i++) { ++ for (i = 0; i < sk_X509_num(ctx->chain); i++) { + X509 *x = sk_X509_value(ctx->chain, i); + ++ if ((x->ex_flags & EXFLAG_INVALID_POLICY) != 0) ++ cbcalled = 1; + CB_FAIL_IF((x->ex_flags & EXFLAG_INVALID_POLICY) != 0, + ctx, x, i, X509_V_ERR_INVALID_POLICY_EXTENSION); + } ++ if (!cbcalled) { ++ /* Should not be able to get here */ ++ ERR_raise(ERR_LIB_X509, ERR_R_INTERNAL_ERROR); ++ return 0; ++ } ++ /* The callback ignored the error so we return success */ + return 1; + } + if (ret == X509_PCY_TREE_FAILURE) { +-- +2.35.7 + diff --git a/meta/recipes-connectivity/openssl/openssl/CVE-2023-0466.patch b/meta/recipes-connectivity/openssl/openssl/CVE-2023-0466.patch new file mode 100644 index 0000000000..a16bfe42ca --- /dev/null +++ b/meta/recipes-connectivity/openssl/openssl/CVE-2023-0466.patch @@ -0,0 +1,50 @@ +From 51e8a84ce742db0f6c70510d0159dad8f7825908 Mon Sep 17 00:00:00 2001 +From: Tomas Mraz +Date: Tue, 21 Mar 2023 16:15:47 +0100 +Subject: [PATCH] Fix documentation of X509_VERIFY_PARAM_add0_policy() + +The function was incorrectly documented as enabling policy checking. + +Fixes: CVE-2023-0466 + +Reviewed-by: Matt Caswell +Reviewed-by: Paul Dale +(Merged from https://github.com/openssl/openssl/pull/20563) + +Upstream-Status: Backport from [https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=51e8a84ce742db0f6c70510d0159dad8f7825908] +CVE: CVE-2023-0466 +Signed-off-by: Siddharth Doshi +--- + doc/man3/X509_VERIFY_PARAM_set_flags.pod | 9 +++++++-- + 1 file changed, 7 insertions(+), 2 deletions(-) + +diff --git a/doc/man3/X509_VERIFY_PARAM_set_flags.pod b/doc/man3/X509_VERIFY_PARAM_set_flags.pod +index 75a1677..43c1900 100644 +--- a/doc/man3/X509_VERIFY_PARAM_set_flags.pod ++++ b/doc/man3/X509_VERIFY_PARAM_set_flags.pod +@@ -98,8 +98,9 @@ B. + X509_VERIFY_PARAM_set_time() sets the verification time in B to + B. Normally the current time is used. + +-X509_VERIFY_PARAM_add0_policy() enables policy checking (it is disabled +-by default) and adds B to the acceptable policy set. ++X509_VERIFY_PARAM_add0_policy() adds B to the acceptable policy set. ++Contrary to preexisting documentation of this function it does not enable ++policy checking. + + X509_VERIFY_PARAM_set1_policies() enables policy checking (it is disabled + by default) and sets the acceptable policy set to B. Any existing +@@ -400,6 +401,10 @@ The X509_VERIFY_PARAM_get_hostflags() function was added in OpenSSL 1.1.0i. + The X509_VERIFY_PARAM_get0_host(), X509_VERIFY_PARAM_get0_email(), + and X509_VERIFY_PARAM_get1_ip_asc() functions were added in OpenSSL 3.0. + ++The function X509_VERIFY_PARAM_add0_policy() was historically documented as ++enabling policy checking however the implementation has never done this. ++The documentation was changed to align with the implementation. ++ + =head1 COPYRIGHT + + Copyright 2009-2023 The OpenSSL Project Authors. All Rights Reserved. +-- +2.35.7 + diff --git a/meta/recipes-connectivity/openssl/openssl_3.0.8.bb b/meta/recipes-connectivity/openssl/openssl_3.0.8.bb index 8771884dda..82f3e18dd7 100644 --- a/meta/recipes-connectivity/openssl/openssl_3.0.8.bb +++ b/meta/recipes-connectivity/openssl/openssl_3.0.8.bb @@ -12,6 +12,9 @@ SRC_URI = "http://www.openssl.org/source/openssl-${PV}.tar.gz \ file://0001-buildinfo-strip-sysroot-and-debug-prefix-map-from-co.patch \ file://afalg.patch \ file://0001-Configure-do-not-tweak-mips-cflags.patch \ + file://CVE-2023-0464.patch \ + file://CVE-2023-0465.patch \ + file://CVE-2023-0466.patch \ " SRC_URI:append:class-nativesdk = " \ From patchwork Thu Mar 30 21:13:45 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 21959 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 060DEC77B61 for ; Thu, 30 Mar 2023 21:14:24 +0000 (UTC) Received: from mail-pl1-f182.google.com (mail-pl1-f182.google.com [209.85.214.182]) by mx.groups.io with SMTP id smtpd.web11.38968.1680210854964056357 for ; Thu, 30 Mar 2023 14:14:15 -0700 Authentication-Results: mx.groups.io; dkim=fail reason="signature has expired" header.i=@sakoman-com.20210112.gappssmtp.com header.s=20210112 header.b=uAIjN/6J; spf=softfail (domain: sakoman.com, ip: 209.85.214.182, mailfrom: steve@sakoman.com) Received: by mail-pl1-f182.google.com with SMTP id ix20so19377288plb.3 for ; Thu, 30 Mar 2023 14:14:14 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20210112.gappssmtp.com; s=20210112; t=1680210854; x=1682802854; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=59ANT5PDrxhX7UopVW55D0bzD0YAqHRi/L8egRN5N+M=; b=uAIjN/6Jd81LraHCbEaVWu9IumGCB6FiO/okw03n7yjyCv7e+Hov9Q3RsVbwaxErZJ WDGA+cLeMdlA2vlB1XD86iF+W+6anFW0U3H0itZ771gFHlrp8lZGQvSHeSPfyuxloT/q y27Wgks0Sr4tn+gq4fpUu2qrCH69LwLdsI6ciZLza1vHcyo7fBoFXA3gQio3emFoI15U tTPj9IzRgcCmz4QiTb44IYKqeaTIkAjhroMbPkmCfI1LUTmPWMWM/RzWqFFENlAK6UAm 6KQ88ge1y8QpiY8g8xga5fxIrdrQiCWK2h+TNgs5X/IF+dpXFpklN8w98FSkP4qJ84EK jwMg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; t=1680210854; x=1682802854; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=59ANT5PDrxhX7UopVW55D0bzD0YAqHRi/L8egRN5N+M=; b=UuFCNHmfxsLmTpIlNlVNvkj1IdbL5bzXq0aQLhgMOyDv9NtNms9Jo6d7Pf4ux0wPQT ry3GMTCdvQt85Gnld3mtFhg7UL6Otcu9wSb4AQDwIw5dCw+XgjtHrrB0q4k0FwqTfvRz QpCNFZ/xsq88D0SYDowDbtRjRRbRadTIKkn5AtEaNvCMtz+7bD1HafwG4s/CmEJNj1OD KOxYkI1a7VjiH5IywgcmoN9T0tfTSONSUpTP/CrRU/+Nwb2tyZpMzyJaA77n23FMu8T9 AYlPuiHi40vfLaO8FRfLdPzpqo6/YE8DnCKRMyjhHSWon8MVOxh2IoRfTQVqQomtTkJ1 oNHw== X-Gm-Message-State: AAQBX9d5MluEaJKpM9/54w541cc4CXr6vrQB7LAMR8n5erJz2bYoAJeT ZdRab16jXP33wTlamrMZSrkgtAOQte4i/yrlC6c= X-Google-Smtp-Source: AKy350YR7vdQwOj0elGJWPhTdkUEIz+GquefjIaaXgEmUBQXqdV5hcgpX0XUYvej48Z9ay8ZVfXDtw== X-Received: by 2002:a17:903:32cd:b0:1a2:9ce6:648b with SMTP id i13-20020a17090332cd00b001a29ce6648bmr284041plr.12.1680210853711; Thu, 30 Mar 2023 14:14:13 -0700 (PDT) Received: from hexa.router0800d9.com (dhcp-72-253-4-112.hawaiiantel.net. [72.253.4.112]) by smtp.gmail.com with ESMTPSA id c30-20020a631c1e000000b0050301521335sm250661pgc.11.2023.03.30.14.14.12 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 30 Mar 2023 14:14:13 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][langdale 03/14] cve-extra-exclusions: ignore inapplicable linux-yocto CVEs Date: Thu, 30 Mar 2023 11:13:45 -1000 Message-Id: <58d99257bc5b417c518049c6a79144aecc4e9224.1680210378.git.steve@sakoman.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 30 Mar 2023 21:14:24 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/179362 From: Geoffrey GIRY Multiple CVE are patched in kernel but appears as active because the NVD database is not up to date In common file cve-extra-exclusion.inc, CVE are ignored if and only if all versions of kernel used by langdale are patched Also ignore CVEs with wrong CPE (applied to kernel but actually are for another package) In cve-exclusion_5.15.inc, only ignore CVE that are patched in v5.15, and not patched in v5.19 Recipes of version 5.15 include this file Reviewed-by: Yoann CONGAL Signed-off-by: Geoffrey GIRY Signed-off-by: Steve Sakoman --- .../distro/include/cve-extra-exclusions.inc | 212 ++++++++++++++++++ .../linux/cve-exclusion_5.15.inc | 90 ++++++++ .../linux/linux-yocto-rt_5.15.bb | 3 + .../linux/linux-yocto-tiny_5.15.bb | 3 + meta/recipes-kernel/linux/linux-yocto_5.15.bb | 3 + 5 files changed, 311 insertions(+) create mode 100644 meta/recipes-kernel/linux/cve-exclusion_5.15.inc diff --git a/meta/conf/distro/include/cve-extra-exclusions.inc b/meta/conf/distro/include/cve-extra-exclusions.inc index 8b5f8d49b8..f5d6867ed4 100644 --- a/meta/conf/distro/include/cve-extra-exclusions.inc +++ b/meta/conf/distro/include/cve-extra-exclusions.inc @@ -78,9 +78,34 @@ CVE_CHECK_IGNORE += "CVE-2018-1000026 CVE-2018-10840 CVE-2018-10876 CVE-2018-108 CVE_CHECK_IGNORE += "CVE-2019-10126 CVE-2019-14899 CVE-2019-18910 CVE-2019-3016 CVE-2019-3819 CVE-2019-3846 CVE-2019-3887" # 2020 CVE_CHECK_IGNORE += "CVE-2020-10732 CVE-2020-10742 CVE-2020-16119 CVE-2020-1749 CVE-2020-25672 CVE-2020-27820 CVE-2020-35501 CVE-2020-8834" + +# https://nvd.nist.gov/vuln/detail/CVE-2020-27784 +# Introduced in version v4.1 b26394bd567e5ebe57ec4dee7fe6cd14023c96e9 +# Patched in kernel since v5.10 e8d5f92b8d30bb4ade76494490c3c065e12411b1 +# Backported in version v5.4.73 e9e791f5c39ab30e374a3b1a9c25ca7ff24988f3 +CVE_CHECK_IGNORE += "CVE-2020-27784" + # 2021 CVE_CHECK_IGNORE += "CVE-2021-20194 CVE-2021-20226 CVE-2021-20265 CVE-2021-3564 CVE-2021-3743 CVE-2021-3847 CVE-2021-4002 \ CVE-2021-4090 CVE-2021-4095 CVE-2021-4197 CVE-2021-4202 CVE-2021-44879 CVE-2021-45402" + +# https://nvd.nist.gov/vuln/detail/CVE-2021-3669 +# Introduced in version v2.6.12 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 +# Patched in kernel since v5.15 20401d1058f3f841f35a594ac2fc1293710e55b9 +CVE_CHECK_IGNORE += "CVE-2021-3669" + +# https://nvd.nist.gov/vuln/detail/CVE-2021-3759 +# Introduced in version v4.5 a9bb7e620efdfd29b6d1c238041173e411670996 +# Patched in kernel since v5.15 18319498fdd4cdf8c1c2c48cd432863b1f915d6f +# Backported in version v5.4.224 bad83d55134e647a739ebef2082541963f2cbc92 +# Backported in version v5.10.154 836686e1a01d7e2fda6a5a18252243ff30a6e196 +CVE_CHECK_IGNORE += "CVE-2021-3759" + +# https://nvd.nist.gov/vuln/detail/CVE-2021-4218 +# Introduced in version v2.6.12 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 +# Patched in kernel since v5.8 32927393dc1ccd60fb2bdc05b9e8e88753761469 +CVE_CHECK_IGNORE += "CVE-2021-4218" + # 2022 CVE_CHECK_IGNORE += "CVE-2022-0185 CVE-2022-0264 CVE-2022-0286 CVE-2022-0330 CVE-2022-0382 CVE-2022-0433 CVE-2022-0435 \ CVE-2022-0492 CVE-2022-0494 CVE-2022-0500 CVE-2022-0516 CVE-2022-0617 CVE-2022-0742 CVE-2022-0854 \ @@ -90,6 +115,193 @@ CVE_CHECK_IGNORE += "CVE-2022-0185 CVE-2022-0264 CVE-2022-0286 CVE-2022-0330 CVE CVE-2022-28356 CVE-2022-28388 CVE-2022-28389 CVE-2022-28390 CVE-2022-28796 CVE-2022-28893 CVE-2022-29156 \ CVE-2022-29582 CVE-2022-29968" +# https://nvd.nist.gov/vuln/detail/CVE-2022-0480 +# Introduced in version v2.6.12 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 +# Patched in kernel since v5.15 0f12156dff2862ac54235fc72703f18770769042 +CVE_CHECK_IGNORE += "CVE-2022-0480" + +# https://nvd.nist.gov/vuln/detail/CVE-2022-1184 +# Introduced in version v2.6.12 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 +# Patched in kernel since v5.19 46c116b920ebec58031f0a78c5ea9599b0d2a371 +# Backported in version v5.4.198 17034d45ec443fb0e3c0e7297f9cd10f70446064 +# Backported in version v5.10.121 da2f05919238c7bdc6e28c79539f55c8355408bb +# Backported in version v5.15.46 ca17db384762be0ec38373a12460081d22a8b42d +CVE_CHECK_IGNORE += "CVE-2022-1184" + +# https://nvd.nist.gov/vuln/detail/CVE-2022-1462 +# Introduced in version v2.6.12 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 +# Patched in kernel since v5.19 a501ab75e7624d133a5a3c7ec010687c8b961d23 +# Backported in version v5.4.208 f7785092cb7f022f59ebdaa181651f7c877df132 +# Backported in version v5.10.134 08afa87f58d83dfe040572ed591b47e8cb9e225c +# Backported in version v5.15.58 b2d1e4cd558cffec6bfe318f5d74e6cffc374d29 +CVE_CHECK_IGNORE += "CVE-2022-1462" + +# https://nvd.nist.gov/vuln/detail/CVE-2022-2308 +# Introduced in version v5.15 c8a6153b6c59d95c0e091f053f6f180952ade91e +# Patched in kernel since v6.0 46f8a29272e51b6df7393d58fc5cb8967397ef2b +# Backported in version v5.15.72 dc248ddf41eab4566e95b1ee2433c8a5134ad94a +# Backported in version v5.19.14 38d854c4a11c3bbf6a96ea46f14b282670c784ac +CVE_CHECK_IGNORE += "CVE-2022-2308" + +# https://nvd.nist.gov/vuln/detail/CVE-2022-2327 +# Introduced in version v2.6.12 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 +# Patched in kernel since v5.10.125 df3f3bb5059d20ef094d6b2f0256c4bf4127a859 +CVE_CHECK_IGNORE += "CVE-2022-2327" + +# https://nvd.nist.gov/vuln/detail/CVE-2022-2663 +# Introduced in version v2.6.20 869f37d8e48f3911eb70f38a994feaa8f8380008 +# Patched in kernel since v6.0 0efe125cfb99e6773a7434f3463f7c2fa28f3a43 +# Backported in version v5.4.213 36f7b71f8ad8e4d224b45f7d6ecfeff63b091547 +# Backported in version v5.10.143 e12ce30fe593dd438c5b392290ad7316befc11ca +# Backported in version v5.15.68 451c9ce1e2fc9b9e40303bef8e5a0dca1a923cc4 +# Backported in version v5.19.9 6cf0609154b2ce8d3ae160e7506ab316400a8d3d +CVE_CHECK_IGNORE += "CVE-2022-2663" + +# https://nvd.nist.gov/vuln/detail/CVE-2022-2785 +# Introduced in version v5.18 b1d18a7574d0df5eb4117c14742baf8bc2b9bb74 +# Patched in kernel since v6.0 86f44fcec22ce2979507742bc53db8400e454f46 +# Backported in version v5.19.4 b429d0b9a7a0f3dddb1f782b72629e6353f292fd +CVE_CHECK_IGNORE += "CVE-2022-2785" + +# https://nvd.nist.gov/vuln/detail/CVE-2022-3176 +# Introduced in version v5.1 221c5eb2338232f7340386de1c43decc32682e58 +# Patched in kernel since v5.17 791f3465c4afde02d7f16cf7424ca87070b69396 +# Backported in version v5.15.65 e9d7ca0c4640cbebe6840ee3bac66a25a9bacaf5 +CVE_CHECK_IGNORE += "CVE-2022-3176" + +# https://nvd.nist.gov/vuln/detail/CVE-2022-3526 +# Introduced in version v5.13 427f0c8c194b22edcafef1b0a42995ddc5c2227d +# Patched in kernel since v5.18 e16b859872b87650bb55b12cca5a5fcdc49c1442 +# Backported in version v5.15.35 8f79ce226ad2e9b2ec598de2b9560863b7549d1b +CVE_CHECK_IGNORE += "CVE-2022-3526" + +# https://nvd.nist.gov/vuln/detail/CVE-2022-3621 +# Introduced in version v2.60.30 05fe58fdc10df9ebea04c0eaed57adc47af5c184 +# Patched in kernel since v6.1 21a87d88c2253350e115029f14fe2a10a7e6c856 +# Backported in version v5.4.218 792211333ad77fcea50a44bb7f695783159fc63c +# Backported in version v5.10.148 3f840480e31495ce674db4a69912882b5ac083f2 +# Backported in version v5.15.74 1e512c65b4adcdbdf7aead052f2162b079cc7f55 +# Backported in version v5.19.16 caf2c6b580433b3d3e413a3d54b8414a94725dcd +CVE_CHECK_IGNORE += "CVE-2022-3621" + +# https://nvd.nist.gov/vuln/detail/CVE-2022-3623 +# Introduced in version v5.1 5480280d3f2d11d47f9be59d49b20a8d7d1b33e8 +# Patched in kernel since v6.1 fac35ba763ed07ba93154c95ffc0c4a55023707f +# Backported in version v5.4.228 176ba4c19d1bb153aa6baaa61d586e785b7d736c +# Backported in version v5.10.159 fccee93eb20d72f5390432ecea7f8c16af88c850 +# Backported in version v5.15.78 3a44ae4afaa5318baed3c6e2959f24454e0ae4ff +# Backported in version v5.19.17 86a913d55c89dd13ba070a87f61a493563e94b54 +CVE_CHECK_IGNORE += "CVE-2022-3623" + +# https://nvd.nist.gov/vuln/detail/CVE-2022-3624 +# Introduced in version v6.0 d5410ac7b0baeca91cf73ff5241d35998ecc8c9e +# Patched in kernel since v6.0 4f5d33f4f798b1c6d92b613f0087f639d9836971 +CVE_CHECK_IGNORE += "CVE-2022-3624" + +# https://nvd.nist.gov/vuln/detail/CVE-2022-3625 +# Introduced in version v4.19 45f05def5c44c806f094709f1c9b03dcecdd54f0 +# Patched in kernel since v6.0 6b4db2e528f650c7fb712961aac36455468d5902 +# Backported in version v5.4.211 1ad4ba9341f15412cf86dc6addbb73871a10212f +# Backported in version v5.10.138 0e28678a770df7989108327cfe86f835d8760c33 +# Backported in version v5.15.63 c4d09fd1e18bac11c2f7cf736048112568687301 +# Backported in version v5.19.4 26bef5616255066268c0e40e1da10cc9b78b82e9 +CVE_CHECK_IGNORE += "CVE-2022-3625" + +# https://nvd.nist.gov/vuln/detail/CVE-2022-3629 +# Introduced in version v3.9 d021c344051af91f42c5ba9fdedc176740cbd238 +# Patched in kernel since v6.0 7e97cfed9929eaabc41829c395eb0d1350fccb9d +# Backported in version v5.4.211 f82f1e2042b397277cd39f16349950f5abade58d +# Backported in version v5.10.138 38ddccbda5e8b762c8ee06670bb1f64f1be5ee50 +# Backported in version v5.15.63 e4c0428f8a6fc8c218d7fd72bddd163f05b29795 +# Backported in version v5.19.4 8ff5db3c1b3d6797eda5cd326dcd31b9cd1c5f72 +CVE_CHECK_IGNORE += "CVE-2022-3629" + +# https://nvd.nist.gov/vuln/detail/CVE-2022-3630 +# Introduced in version v5.19 85e4ea1049c70fb99de5c6057e835d151fb647da +# Patched in kernel since v6.0 fb24771faf72a2fd62b3b6287af3c610c3ec9cf1 +# Backported in version v5.19.4 7a369dc87b66acc85d0cffcf39984344a203e20b +CVE_CHECK_IGNORE += "CVE-2022-3630" + +# https://nvd.nist.gov/vuln/detail/CVE-2022-3633 +# Introduced in version v5.4 9d71dd0c70099914fcd063135da3c580865e924c +# Patched in kernel since v6.0 8c21c54a53ab21842f5050fa090f26b03c0313d6 +# Backported in version v5.4.211 04e41b6bacf474f5431491f92e981096e8cc8e93 +# Backported in version v5.10.138 a220ff343396bae8d3b6abee72ab51f1f34b3027 +# Backported in version v5.15.63 98dc8fb08299ab49e0b9c08daedadd2f4de1a2f2 +# Backported in version v5.19.4 a0278dbeaaf7ca60346c62a9add65ae7d62564de +CVE_CHECK_IGNORE += "CVE-2022-3633" + +# https://nvd.nist.gov/vuln/detail/CVE-2022-3635 +# Introduced in version v2.6.12 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 +# Patched in kernel since v6.0 3f4093e2bf4673f218c0bf17d8362337c400e77b +# Backported in version v5.4.211 9a6cbaa50f263b12df18a051b37f3f42f9fb5253 +# Backported in version v5.10.138 a0ae122e9aeccbff75014c4d36d11a9d32e7fb5e +# Backported in version v5.15.63 a5d7ce086fe942c5ab422fd2c034968a152be4c4 +# Backported in version v5.19.4 af412b252550f9ac36d9add7b013c2a2c3463835 +CVE_CHECK_IGNORE += "CVE-2022-3635" + +# https://nvd.nist.gov/vuln/detail/CVE-2022-3636 +# Introduced in version v5.19 33fc42de33278b2b3ec6f3390512987bc29a62b7 +# Patched in kernel since v5.19 17a5f6a78dc7b8db385de346092d7d9f9dc24df6 +# The vulnerability has been introduced and patched in rc1 of v5.19. +CVE_CHECK_IGNORE += "CVE-2022-3636" + +# https://nvd.nist.gov/vuln/detail/CVE-2022-3646 +# Introduced in version v2.6.30 9ff05123e3bfbb1d2b68ba1d9bf1f7d1dffc1453 +# Patched in kernel since v6.1 d0d51a97063db4704a5ef6bc978dddab1636a306 +# Backported in version v5.4.218 b7e409d11db9ce9f8bc05fcdfa24d143f60cd393 +# Backported in version v5.10.148 aad4c997857f1d4b6c1e296c07e4729d3f8058ee +# Backported in version v5.15.74 44b1ee304bac03f1b879be5afe920e3a844e40fc +# Backported in version v5.19.16 4755fcd844240857b525f6e8d8b65ee140fe9570 +CVE_CHECK_IGNORE += "CVE-2022-3646" + +# https://nvd.nist.gov/vuln/detail/CVE-2022-3649 +# Introduced in version v2.6.12 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 +# Patched in kernel since v6.1 d325dc6eb763c10f591c239550b8c7e5466a5d09 +# Backported in version v5.4.220 d1c2d820a2cd73867b7d352e89e92fb3ac29e926 +# Backported in version v5.10.148 21ee3cffed8fbabb669435facfd576ba18ac8652 +# Backported in version v5.15.74 cb602c2b654e26763226d8bd27a702f79cff4006 +# Backported in version v5.19.16 394b2571e9a74ddaed55aa9c4d0f5772f81c21e4 +CVE_CHECK_IGNORE += "CVE-2022-3649" + +# https://nvd.nist.gov/vuln/detail/CVE-2022-26365 +# Introduced in version v2.6.12 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 +# Patched in kernel since v5.19 2f446ffe9d737e9a844b97887919c4fda18246e7 +# Backported in version v5.4.204 42112e8f94617d83943f8f3b8de2b66041905506 +# Backported in version v5.10.129 cfea428030be836d79a7690968232bb7fa4410f1 +# Backported in version v5.15.53 7ed65a4ad8fa9f40bc3979b32c54243d6a684ec9 +CVE_CHECK_IGNORE += "CVE-2022-26365" + +# https://nvd.nist.gov/vuln/detail/CVE-2022-33740 +# Introduced in version v2.6.12 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 +# Patched in kernel since v5.19 307c8de2b02344805ebead3440d8feed28f2f010 +# Backported in version v5.4.204 04945b5beb73019145ac17a2565526afa7293c14 +# Backported in version v5.10.129 728d68bfe68d92eae1407b8a9edc7817d6227404 +# Backported in version v5.15.53 5dd0993c36832d33820238fc8dc741ba801b7961 +CVE_CHECK_IGNORE += "CVE-2022-33740" + +# https://nvd.nist.gov/vuln/detail/CVE-2022-33741 +# Introduced in version v2.6.12 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 +# Patched in kernel since v5.19 4491001c2e0fa69efbb748c96ec96b100a5cdb7e +# Backported in version v5.4.204 ede57be88a5fff42cd00e6bcd071503194d398dd +# Backported in version v5.10.129 4923217af5742a796821272ee03f8d6de15c0cca +# Backported in version v5.15.53 ed3cfc690675d852c3416aedb271e0e7d179bf49 +CVE_CHECK_IGNORE += "CVE-2022-33741" + +# https://nvd.nist.gov/vuln/detail/CVE-2022-33742 +# Introduced in version v2.6.12 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 +# Patched in kernel since v5.19 2400617da7eebf9167d71a46122828bc479d64c9 +# Backported in version v5.4.204 60ac50daad36ef3fe9d70d89cfe3b95d381db997 +# Backported in version v5.10.129 cbbd2d2531539212ff090aecbea9877c996e6ce6 +# Backported in version v5.15.53 6d0a9127279a4533815202e30ad1b3a39f560ba3 +CVE_CHECK_IGNORE += "CVE-2022-33742" + + +# Wrong CPE in NVD database +# https://nvd.nist.gov/vuln/detail/CVE-2022-3563 +# https://nvd.nist.gov/vuln/detail/CVE-2022-3637 +# Those issue do not affect the kernel, patchs listed on CVE pages links to https://git.kernel.org/pub/scm/bluetooth/bluez.git +CVE_CHECK_IGNORE += "CVE-2022-3563 CVE-2022-3637" # qemu:qemu-native:qemu-system-native https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-20255 # There was a proposed patch https://lists.gnu.org/archive/html/qemu-devel/2021-02/msg06098.html diff --git a/meta/recipes-kernel/linux/cve-exclusion_5.15.inc b/meta/recipes-kernel/linux/cve-exclusion_5.15.inc new file mode 100644 index 0000000000..53d5379046 --- /dev/null +++ b/meta/recipes-kernel/linux/cve-exclusion_5.15.inc @@ -0,0 +1,90 @@ +# CVE exclusions specific to version 5.15 of the kernel. + +# 2021 +# https://nvd.nist.gov/vuln/detail/CVE-2022-3435 +# Introduced in version v5.18 6bf92d70e690b7ff12b24f4bfff5e5434d019b82 +# Breaking commit backported in v5.4.189 f5064531c23ad646da7be8b938292b00a7e61438 +# Breaking commit backported in v5.10.111 63ea57478aaa3e06a597081a0f537318fc04e49f +# Breaking commit backported in v5.15.34 907c97986d6fa77318d17659dd76c94b65dd27c5 +# Patched in kernel since v6.1 61b91eb33a69c3be11b259c5ea484505cd79f883 +# Backported in version v5.4.226 cc3cd130ecfb8b0ae52e235e487bae3f16a24a32 +# Backported in version v5.10.158 0b5394229ebae09afc07aabccb5ffd705ffd250e +# Backported in version v5.15.82 25174d91e4a32a24204060d283bd5fa6d0ddf133 +CVE_CHECK_IGNORE += "CVE-2022-3435" + +# https://nvd.nist.gov/vuln/detail/CVE-2022-3534 +# Introduced in version v5.10 919d2b1dbb074d438027135ba644411931179a59 +# Patched in kernel since v6.2 93c660ca40b5d2f7c1b1626e955a8e9fa30e0749 +# Backported in version v5.10.163 c61650b869e0b6fb0c0a28ed42d928eea969afc8 +# Backported in version v5.15.86 a733bf10198eb5bb927890940de8ab457491ed3b +# Backported in version v6.1.2 fbe08093fb2334549859829ef81d42570812597d +CVE_CHECK_IGNORE += "CVE-2022-3534" + +# https://nvd.nist.gov/vuln/detail/CVE-2022-3564 +# Introduced in version v3.6 4b51dae96731c9d82f5634e75ac7ffd3b9c1b060 +# Patched in kernel since v6.1 3aff8aaca4e36dc8b17eaa011684881a80238966 +# Backported in version v5.10.154 cb1c012099ef5904cd468bdb8d6fcdfdd9bcb569 +# Backported in version v5.15.78 8278a87bb1eeea94350d675ef961ee5a03341fde +CVE_CHECK_IGNORE += "CVE-2022-3564" + +# https://nvd.nist.gov/vuln/detail/CVE-2022-3619 +# Introduced in version v5.12 4d7ea8ee90e42fc75995f6fb24032d3233314528 +# Patched in kernel since v6.1 7c9524d929648935bac2bbb4c20437df8f9c3f42 +# Backported in version v5.15.78 aa16cac06b752e5f609c106735bd7838f444784c +CVE_CHECK_IGNORE += "CVE-2022-3619" + +# https://nvd.nist.gov/vuln/detail/CVE-2022-3640 +# Introduced in version v5.19 d0be8347c623e0ac4202a1d4e0373882821f56b0 +# Breaking commit backported in v5.4.209 098e07ef0059296e710a801cdbd74b59016e6624 +# Breaking commit backported in v5.10.135 de5d4654ac6c22b1be756fdf7db18471e7df01ea +# Breaking commit backported in v5.15.59 f32d5615a78a1256c4f557ccc6543866e75d03f4 +# Patched in kernel since v6.1 0d0e2d032811280b927650ff3c15fe5020e82533 +# Backported in version v5.4.224 c1f594dddd9ffd747c39f49cc5b67a9b7677d2ab +# Backported in version v5.10.154 d9ec6e2fbd4a565b2345d4852f586b7ae3ab41fd +# Backported in version v5.15.78 a3a7b2ac64de232edb67279e804932cb42f0b52a +CVE_CHECK_IGNORE += "CVE-2022-3640" + +# https://nvd.nist.gov/vuln/detail/CVE-2022-4382 +# Introduced in version v5.3 e5d82a7360d124ae1a38c2a5eac92ba49b125191 +# Patched in kernel since v6.2-rc5 d18dcfe9860e842f394e37ba01ca9440ab2178f4 +# Backported in version v5.4.230 9a39f4626b361ee7aa10fd990401c37ec3b466ae +# Backported in version v5.10.165 856e4b5e53f21edbd15d275dde62228dd94fb2b4 +# Backported in version v5.15.90 a2e075f40122d8daf587db126c562a67abd69cf9 +# Backported in version v6.1.8 616fd34d017000ecf9097368b13d8a266f4920b3 +CVE_CHECK_IGNORE += "CVE-2022-4382" + +# https://nvd.nist.gov/vuln/detail/CVE-2022-42895 +# Introduced in version v2.6.12 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 +# Patched in kernel since v6.1 b1a2cd50c0357f243b7435a732b4e62ba3157a2e +# Backported in version v5.15.78 3e4697ffdfbb38a2755012c4e571546c89ab6422 +# Backported in version v5.10.154 26ca2ac091b49281d73df86111d16e5a76e43bd7 +# Backported in version v5.4.224 6949400ec9feca7f88c0f6ca5cb5fdbcef419c89 +CVE_CHECK_IGNORE += "CVE-2022-42895" + +# https://nvd.nist.gov/vuln/detail/CVE-2022-42896 +# Introduced in version v2.6.12 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 +# Patched in kernel since v6.1 711f8c3fb3db61897080468586b970c87c61d9e4 +# Backported in version v5.4.226 0d87bb6070361e5d1d9cb391ba7ee73413bc109b +# Backported in version v5.10.154 6b6f94fb9a74dd2891f11de4e638c6202bc89476 +# Backported in version v5.15.78 81035e1201e26d57d9733ac59140a3e29befbc5a +CVE_CHECK_IGNORE += "CVE-2022-42896" + + +# 2023 +# https://nvd.nist.gov/vuln/detail/CVE-2023-0266 +# Introduced in version v2.6.12 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 +# Patched in kernel since v6.2 56b88b50565cd8b946a2d00b0c83927b7ebb055e +# Backported in version v5.15.88 26350c21bc5e97a805af878e092eb8125843fe2c +# Backported in version v6.1.6 d6ad4bd1d896ae1daffd7628cd50f124280fb8b1 +CVE_CHECK_IGNORE += "CVE-2023-0266" + +# https://nvd.nist.gov/vuln/detail/CVE-2023-0394 +# Introduced in version 2.6.12 357b40a18b04c699da1d45608436e9b76b50e251 +# Patched in kernel since v6.2 cb3e9864cdbe35ff6378966660edbcbac955fe17 +# Backported in version v5.4.229 3998dba0f78a59922b0ef333ccfeb58d9410cd3d +# Backported in version v5.10.164 6c9e2c11c33c35563d34d12b343d43b5c12200b5 +# Backported in version v5.15.89 456e3794e08a0b59b259da666e31d0884b376bcf +# Backported in version v6.1.7 0afa5f0736584411771299074bbeca8c1f9706d4 +CVE_CHECK_IGNORE += "CVE-2023-0394" + + diff --git a/meta/recipes-kernel/linux/linux-yocto-rt_5.15.bb b/meta/recipes-kernel/linux/linux-yocto-rt_5.15.bb index 0f557ba2c5..db32522e63 100644 --- a/meta/recipes-kernel/linux/linux-yocto-rt_5.15.bb +++ b/meta/recipes-kernel/linux/linux-yocto-rt_5.15.bb @@ -2,6 +2,9 @@ KBRANCH ?= "v5.15/standard/preempt-rt/base" require recipes-kernel/linux/linux-yocto.inc +# CVE exclusions +include recipes-kernel/linux/cve-exclusion_5.15.inc + # Skip processing of this recipe if it is not explicitly specified as the # PREFERRED_PROVIDER for virtual/kernel. This avoids errors when trying # to build multiple virtual/kernel providers, e.g. as dependency of diff --git a/meta/recipes-kernel/linux/linux-yocto-tiny_5.15.bb b/meta/recipes-kernel/linux/linux-yocto-tiny_5.15.bb index 34ffaa5132..322c07e097 100644 --- a/meta/recipes-kernel/linux/linux-yocto-tiny_5.15.bb +++ b/meta/recipes-kernel/linux/linux-yocto-tiny_5.15.bb @@ -5,6 +5,9 @@ KCONFIG_MODE = "--allnoconfig" require recipes-kernel/linux/linux-yocto.inc +# CVE exclusions +include recipes-kernel/linux/cve-exclusion_5.15.inc + LINUX_VERSION ?= "5.15.96" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" diff --git a/meta/recipes-kernel/linux/linux-yocto_5.15.bb b/meta/recipes-kernel/linux/linux-yocto_5.15.bb index 55580357d2..85fdbf4bec 100644 --- a/meta/recipes-kernel/linux/linux-yocto_5.15.bb +++ b/meta/recipes-kernel/linux/linux-yocto_5.15.bb @@ -2,6 +2,9 @@ KBRANCH ?= "v5.15/standard/base" require recipes-kernel/linux/linux-yocto.inc +# CVE exclusions +include recipes-kernel/linux/cve-exclusion_5.15.inc + # board specific branches KBRANCH:qemuarm ?= "v5.15/standard/arm-versatile-926ejs" KBRANCH:qemuarm64 ?= "v5.15/standard/qemuarm64" From patchwork Thu Mar 30 21:13:46 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 21961 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 1724DC77B6F for ; Thu, 30 Mar 2023 21:14:24 +0000 (UTC) Received: from mail-pj1-f41.google.com (mail-pj1-f41.google.com [209.85.216.41]) by mx.groups.io with SMTP id smtpd.web11.38972.1680210856428173993 for ; Thu, 30 Mar 2023 14:14:16 -0700 Authentication-Results: mx.groups.io; dkim=fail reason="signature has expired" header.i=@sakoman-com.20210112.gappssmtp.com header.s=20210112 header.b=UPT2n8sN; spf=softfail (domain: sakoman.com, ip: 209.85.216.41, mailfrom: steve@sakoman.com) Received: by mail-pj1-f41.google.com with SMTP id c4so2486856pjs.4 for ; Thu, 30 Mar 2023 14:14:16 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20210112.gappssmtp.com; s=20210112; t=1680210855; x=1682802855; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=QkwO7lInM3ZWHU4d7dKNr+V7I848npMkE4ArMFjkeo0=; b=UPT2n8sNdM151Bgb+Zl0zBLWP7LKIcpaxORbi+miuNl0NUA7aNNtULgGjR6lYplBG/ A4Il+GGVNaxZiVd334qTUez339eqL47fkZtu8moY+uNSbMLXnXMY+A1Lowa9ZGihPS07 SYYPdgIIN1TwAyKDgd6OmwGtesXDZce6Nl6ojpfsrt6tjJGh8zM6BIIZsrOlNItELvjP +tqyujw4JvU3qhrVLExWdPlPy2tjn8WC23pkaQmB+I46fhXxcTUXv0tM8M0iQbyT2x+Q x3UzH1bJ90Cn+NLuDDsan62E/ph2ceyhCTt02wGeVyTpW5K9j1Sb1VLjHmA1bGHhw4ga Bg1w== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; t=1680210855; x=1682802855; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=QkwO7lInM3ZWHU4d7dKNr+V7I848npMkE4ArMFjkeo0=; b=lXI2hzxPWOd+7pmjbvtN3RgPsI66WhB64uv3p0QG2D7AA64T088LiFHw1gl6QcNAKf KRtPlkH+0Ff+ho3g4lqK+WmFKaeRHVwdbUV3Ct4FU6mNoxKEw6aPDXftBQVhXhmmMnGg bKI7/cxOo7VN2fKe02+WahiTTd1vREioBbc+eFDz9bZJG6IJoo/SMbCUIEoN2/J84Bp3 1wJCgooAy4NUfy3rVyepPnC57pQhyI+/xHvK3T4WrJWAOjhplpuQ+/qwe41a7Cypivlq YD17TuN03ZSy9jaEQec5lAnr0wvlAWw5nvwM8xEHnhp0gWKRE4xRBzhHYypxcB3+pIYa 8dZQ== X-Gm-Message-State: AAQBX9ethpN2ECp8WJpm3CDQfXbfC0wGNRGnU7o/SBZg9pztkV45Zgtl GjDqUhxd9wkzVz3jVb9Uy5+bo7nf52vNWLqlfq4= X-Google-Smtp-Source: AKy350bFEfUkzYTjjrtzkiysTB5i4aRM3V8MNOLJE5aQZQdeS/Y2RftxqDZynuTjkgKsT5BdRG7DKg== X-Received: by 2002:a17:90b:1d09:b0:240:d327:f3b7 with SMTP id on9-20020a17090b1d0900b00240d327f3b7mr2797817pjb.13.1680210855446; Thu, 30 Mar 2023 14:14:15 -0700 (PDT) Received: from hexa.router0800d9.com (dhcp-72-253-4-112.hawaiiantel.net. [72.253.4.112]) by smtp.gmail.com with ESMTPSA id c30-20020a631c1e000000b0050301521335sm250661pgc.11.2023.03.30.14.14.14 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 30 Mar 2023 14:14:15 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][langdale 04/14] cve-check: Fix false negative version issue Date: Thu, 30 Mar 2023 11:13:46 -1000 Message-Id: <423ba02b0c2a15bf771db2271df17e12c5adabb2.1680210378.git.steve@sakoman.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 30 Mar 2023 21:14:24 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/179363 From: Geoffrey GIRY NVD DB store version and update in the same value, separated by '_'. The proposed patch check if the version from NVD DB contains a "_", ie 9.2.0_p1 is convert to 9.2.0p1 before version comparison. [YOCTO #14127] Reviewed-by: Yoann CONGAL Signed-off-by: Geoffrey GIRY Signed-off-by: Alexandre Belloni (cherry picked from commit 7d00f6ec578084a0a0e5caf36241d53036d996c4) Signed-off-by: Steve Sakoman --- meta/classes/cve-check.bbclass | 5 ++- meta/lib/oe/cve_check.py | 39 +++++++++++++++++++++++ meta/lib/oeqa/selftest/cases/cve_check.py | 19 +++++++++++ 3 files changed, 62 insertions(+), 1 deletion(-) diff --git a/meta/classes/cve-check.bbclass b/meta/classes/cve-check.bbclass index 41fdf8363f..5e2da56046 100644 --- a/meta/classes/cve-check.bbclass +++ b/meta/classes/cve-check.bbclass @@ -260,7 +260,7 @@ def check_cves(d, patched_cves): """ Connect to the NVD database and find unpatched cves. """ - from oe.cve_check import Version + from oe.cve_check import Version, convert_cve_version pn = d.getVar("PN") real_pv = d.getVar("PV") @@ -324,6 +324,9 @@ def check_cves(d, patched_cves): if cve in cve_ignore: ignored = True + version_start = convert_cve_version(version_start) + version_end = convert_cve_version(version_end) + if (operator_start == '=' and pv == version_start) or version_start == '-': vulnerable = True else: diff --git a/meta/lib/oe/cve_check.py b/meta/lib/oe/cve_check.py index 4f1d80f050..dbaa0b373a 100644 --- a/meta/lib/oe/cve_check.py +++ b/meta/lib/oe/cve_check.py @@ -179,3 +179,42 @@ def update_symlinks(target_path, link_path): if os.path.exists(os.path.realpath(link_path)): os.remove(link_path) os.symlink(os.path.basename(target_path), link_path) + + +def convert_cve_version(version): + """ + This function converts from CVE format to Yocto version format. + eg 8.3_p1 -> 8.3p1, 6.2_rc1 -> 6.2-rc1 + + Unless it is redefined using CVE_VERSION in the recipe, + cve_check uses the version in the name of the recipe (${PV}) + to check vulnerabilities against a CVE in the database downloaded from NVD. + + When the version has an update, i.e. + "p1" in OpenSSH 8.3p1, + "-rc1" in linux kernel 6.2-rc1, + the database stores the version as version_update (8.3_p1, 6.2_rc1). + Therefore, we must transform this version before comparing to the + recipe version. + + In this case, the parameter of the function is 8.3_p1. + If the version uses the Release Candidate format, "rc", + this function replaces the '_' by '-'. + If the version uses the Update format, "p", + this function removes the '_' completely. + """ + import re + + matches = re.match('^([0-9.]+)_((p|rc)[0-9]+)$', version) + + if not matches: + return version + + version = matches.group(1) + update = matches.group(2) + + if matches.group(3) == "rc": + return version + '-' + update + + return version + update + diff --git a/meta/lib/oeqa/selftest/cases/cve_check.py b/meta/lib/oeqa/selftest/cases/cve_check.py index ac47af1990..9534c9775c 100644 --- a/meta/lib/oeqa/selftest/cases/cve_check.py +++ b/meta/lib/oeqa/selftest/cases/cve_check.py @@ -54,6 +54,25 @@ class CVECheck(OESelftestTestCase): self.assertTrue( result ,msg="Failed to compare version with suffix '1.0_patch2' < '1.0_patch3'") + def test_convert_cve_version(self): + from oe.cve_check import convert_cve_version + + # Default format + self.assertEqual(convert_cve_version("8.3"), "8.3") + self.assertEqual(convert_cve_version(""), "") + + # OpenSSL format version + self.assertEqual(convert_cve_version("1.1.1t"), "1.1.1t") + + # OpenSSH format + self.assertEqual(convert_cve_version("8.3_p1"), "8.3p1") + self.assertEqual(convert_cve_version("8.3_p22"), "8.3p22") + + # Linux kernel format + self.assertEqual(convert_cve_version("6.2_rc8"), "6.2-rc8") + self.assertEqual(convert_cve_version("6.2_rc31"), "6.2-rc31") + + def test_recipe_report_json(self): config = """ INHERIT += "cve-check" From patchwork Thu Mar 30 21:13:47 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 21960 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 131E3C77B6D for ; Thu, 30 Mar 2023 21:14:24 +0000 (UTC) Received: from mail-pg1-f179.google.com (mail-pg1-f179.google.com [209.85.215.179]) by mx.groups.io with SMTP id smtpd.web10.38932.1680210858081437951 for ; Thu, 30 Mar 2023 14:14:18 -0700 Authentication-Results: mx.groups.io; dkim=fail reason="signature has expired" header.i=@sakoman-com.20210112.gappssmtp.com header.s=20210112 header.b=kPwb8iQE; spf=softfail (domain: sakoman.com, ip: 209.85.215.179, mailfrom: steve@sakoman.com) Received: by mail-pg1-f179.google.com with SMTP id d8so12202483pgm.3 for ; Thu, 30 Mar 2023 14:14:18 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20210112.gappssmtp.com; s=20210112; t=1680210857; x=1682802857; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=40fsjb9avl26UqqzjnOTe/VRjzCW5X1MohLSqH2Dh+M=; b=kPwb8iQE14pv/PSj3ntqoaa8kUps6gX6WhCCsB73et4TG7HOygo8TX0Pypr+3xTAAK rlJ+BqOAAPMt+ijWCTiFe5vbW/8sYTo6BOqqsRGQH3pKiwfBV/3rhMXR9BrtEv/+9obB pyiUchl6FsAtN1UWYf+CJOIdTMlstTlJ0kfzIqnI7rU7QRIKokZ0Ni4cNBPYKjD8yvim mgg6Svdbc6oRgevhTIPHB6XAeTgkJtYH2lX0L0ccxW+UHi/R6qWYFWlxU5pxnsGmjCsb hrq0F8zFDEn5clFJOBuE0nZaPTH44tpSJaBeusqp/nKCj2Oh1O2GFJolHziACbhvtcHZ 8dwg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; t=1680210857; x=1682802857; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=40fsjb9avl26UqqzjnOTe/VRjzCW5X1MohLSqH2Dh+M=; b=cl/aA+OSUuhnAPqqaGPn+tPtmuQ7kaTBY/mGrWh+hLJ9gn0NMtUDV4OGwC6Fni00EL bRAvb/HfSovDDCekmEAHF0TUfgFKijgju4QLQHj8+S+zuvkehzFBrGlc/XWCx653pIjF WNYVC5hK1uD7MPocs/E4Igd5OphZiyXd4Y+tP4lkpLM4qLu4yKblBUlVKM8Oa0KABl7D n2Q1vnWt6+OfsdZFs59ZuMyos4SBu4PvlLNPRfO0W+BhGwxRA353wt5S+Cy6z3D7rjpt LaqUCCr9TOc/NB7ifj1ouC7D2roHEEZUjeBM3uAyLkKfVUd+t5Alrxgsrp2cj31Fdh5g aSaA== X-Gm-Message-State: AAQBX9c/l8BddsEZYXyrxiQdDZkg5+ZsyC2yM5P0xfPehI21fI/f5bmD l1cyEVfqh1R7UDmY05rsQSdiz8iysgwWUNNmS9U= X-Google-Smtp-Source: AKy350ZgULtUWctfsIqoLJ/aqtvvNHcgzAgVmF05ESqT/pxiRYZXFjqr1C+lOShXdikDc4L0nv0UWQ== X-Received: by 2002:aa7:96cf:0:b0:624:a58a:d28 with SMTP id h15-20020aa796cf000000b00624a58a0d28mr23600387pfq.4.1680210857049; Thu, 30 Mar 2023 14:14:17 -0700 (PDT) Received: from hexa.router0800d9.com (dhcp-72-253-4-112.hawaiiantel.net. [72.253.4.112]) by smtp.gmail.com with ESMTPSA id c30-20020a631c1e000000b0050301521335sm250661pgc.11.2023.03.30.14.14.16 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 30 Mar 2023 14:14:16 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][langdale 05/14] linux-yocto/5.15: update to v5.15.98 Date: Thu, 30 Mar 2023 11:13:47 -1000 Message-Id: <0ed52357cdc913224a298144fe5118525de7e0e1.1680210378.git.steve@sakoman.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 30 Mar 2023 21:14:24 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/179364 From: Bruce Ashfield Updating to the latest korg -stable release that comprises the following commits: d9b4a0c83a2d Linux 5.15.98 937c15e27a63 io_uring: ensure that io_init_req() passes in the right issue_flags bf7123dd26a0 Linux 5.15.97 cf7f9cd50013 io_uring: add missing lock in io_get_file_fixed 77358093331e USB: core: Don't hold device lock while reading the "descriptors" sysfs file 3b24c980dc07 usb: gadget: u_serial: Add null pointer check in gserial_resume 2d72795ccde2 USB: serial: option: add support for VW/Skoda "Carstick LTE" 02190d23b731 usb: dwc3: pci: add support for the Intel Meteor Lake-M cc09a7d5a6a1 scripts/tags.sh: fix incompatibility with PCRE2 1aee4ab2c107 scripts/tags.sh: Invoke 'realpath' via 'xargs' 06740b433d9d vc_screen: don't clobber return value in vcs_read e7f460696340 net: Remove WARN_ON_ONCE(sk->sk_forward_alloc) from sk_stream_kill_queues(). 16d319ec18b0 bpf: bpf_fib_lookup should not return neigh in NUD_FAILED state 6dd1de27d771 staging: mt7621-dts: change palmbus address to lower case 07f0c6f9c357 x86/cpu: Add Lunar Lake M e1b09162f268 HID: core: Fix deadloop in hid_apply_multiplier. f1ee47003075 neigh: make sure used and confirmed times are valid 2590058fb058 IB/hfi1: Assign npages earlier 4534ea429ed8 ASoC: rt715-sdca: fix clock stop prepare timeout issue e430f058d90c btrfs: send: limit number of clones and allocated memory size d454a7212e17 ACPI: NFIT: fix a potential deadlock during NFIT teardown 435e8fabd19a HID: elecom: add support for TrackBall 056E:011C 6bd2f1754393 ARM: dts: rockchip: add power-domains property to dp node on rk3288 839a9c0047a1 arm64: dts: rockchip: drop unused LED mode property from rk3328-roc-cc 503e3d93cf35 Fix XFRM-I support for nested ESP tunnels 765b3a0e0a81 ionic: refactor use of ionic_rx_fill() Signed-off-by: Bruce Ashfield Signed-off-by: Richard Purdie (cherry picked from commit 4961d295599b1c3822752c42891006a49aea8ff3) Signed-off-by: Steve Sakoman --- .../linux/linux-yocto-rt_5.15.bb | 6 ++--- .../linux/linux-yocto-tiny_5.15.bb | 6 ++--- meta/recipes-kernel/linux/linux-yocto_5.15.bb | 26 +++++++++---------- 3 files changed, 19 insertions(+), 19 deletions(-) diff --git a/meta/recipes-kernel/linux/linux-yocto-rt_5.15.bb b/meta/recipes-kernel/linux/linux-yocto-rt_5.15.bb index db32522e63..b877c61797 100644 --- a/meta/recipes-kernel/linux/linux-yocto-rt_5.15.bb +++ b/meta/recipes-kernel/linux/linux-yocto-rt_5.15.bb @@ -14,13 +14,13 @@ python () { raise bb.parse.SkipRecipe("Set PREFERRED_PROVIDER_virtual/kernel to linux-yocto-rt to enable it") } -SRCREV_machine ?= "4d335265c1010cdf45dc0169b1b79638323a5109" -SRCREV_meta ?= "509f4b9d68337f103633d48b621c1c9aa0dc975d" +SRCREV_machine ?= "ce19518b87253279a0358d736d8e9a2cca908498" +SRCREV_meta ?= "674b6bbdc9cb7cfdbec5a0642a3cbef0ba1f738c" SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;branch=${KBRANCH};name=machine \ git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-5.15;destsuffix=${KMETA}" -LINUX_VERSION ?= "5.15.96" +LINUX_VERSION ?= "5.15.98" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" diff --git a/meta/recipes-kernel/linux/linux-yocto-tiny_5.15.bb b/meta/recipes-kernel/linux/linux-yocto-tiny_5.15.bb index 322c07e097..f250e62815 100644 --- a/meta/recipes-kernel/linux/linux-yocto-tiny_5.15.bb +++ b/meta/recipes-kernel/linux/linux-yocto-tiny_5.15.bb @@ -8,7 +8,7 @@ require recipes-kernel/linux/linux-yocto.inc # CVE exclusions include recipes-kernel/linux/cve-exclusion_5.15.inc -LINUX_VERSION ?= "5.15.96" +LINUX_VERSION ?= "5.15.98" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}" @@ -17,8 +17,8 @@ DEPENDS += "openssl-native util-linux-native" KMETA = "kernel-meta" KCONF_BSP_AUDIT_LEVEL = "2" -SRCREV_machine ?= "9c8ee16005f204f7f48d6699822dd5e89b01d4a5" -SRCREV_meta ?= "509f4b9d68337f103633d48b621c1c9aa0dc975d" +SRCREV_machine ?= "c5c318ab79b57628d2046185821db1d0eb89df20" +SRCREV_meta ?= "674b6bbdc9cb7cfdbec5a0642a3cbef0ba1f738c" PV = "${LINUX_VERSION}+git${SRCPV}" diff --git a/meta/recipes-kernel/linux/linux-yocto_5.15.bb b/meta/recipes-kernel/linux/linux-yocto_5.15.bb index 85fdbf4bec..5f83d62e46 100644 --- a/meta/recipes-kernel/linux/linux-yocto_5.15.bb +++ b/meta/recipes-kernel/linux/linux-yocto_5.15.bb @@ -16,24 +16,24 @@ KBRANCH:qemux86 ?= "v5.15/standard/base" KBRANCH:qemux86-64 ?= "v5.15/standard/base" KBRANCH:qemumips64 ?= "v5.15/standard/mti-malta64" -SRCREV_machine:qemuarm ?= "5479084dba4fbe0e3db2a97b0ae00ff7651fb90b" -SRCREV_machine:qemuarm64 ?= "91bfb4191c2f19b98b0c724676a69ca9d61bb696" -SRCREV_machine:qemumips ?= "8be1d8e09c4b174ab4ef0fbd67263f9563967818" -SRCREV_machine:qemuppc ?= "6de606ff8d3eeba9f003557ebb37c94a2d0e6bc1" -SRCREV_machine:qemuriscv64 ?= "001e2930e6997f58dd98cda33908111506f53eb7" -SRCREV_machine:qemuriscv32 ?= "001e2930e6997f58dd98cda33908111506f53eb7" -SRCREV_machine:qemux86 ?= "001e2930e6997f58dd98cda33908111506f53eb7" -SRCREV_machine:qemux86-64 ?= "001e2930e6997f58dd98cda33908111506f53eb7" -SRCREV_machine:qemumips64 ?= "d2d2e93f5cea91969185ec1cc05d6833cd7e1412" -SRCREV_machine ?= "001e2930e6997f58dd98cda33908111506f53eb7" -SRCREV_meta ?= "509f4b9d68337f103633d48b621c1c9aa0dc975d" +SRCREV_machine:qemuarm ?= "21e0bbe305e7dbcd73a3b8695084f0cc3334f4ee" +SRCREV_machine:qemuarm64 ?= "574058afde6aba973ebe024686c2e609b9703bbb" +SRCREV_machine:qemumips ?= "80b8c24fa8e87f562cb558662e0c9c8f036aa389" +SRCREV_machine:qemuppc ?= "3263f7de77ed4245e3802e19e7aded24fe957f30" +SRCREV_machine:qemuriscv64 ?= "99700bd79a36b1a0cea28fd65921b5973970fc88" +SRCREV_machine:qemuriscv32 ?= "99700bd79a36b1a0cea28fd65921b5973970fc88" +SRCREV_machine:qemux86 ?= "99700bd79a36b1a0cea28fd65921b5973970fc88" +SRCREV_machine:qemux86-64 ?= "99700bd79a36b1a0cea28fd65921b5973970fc88" +SRCREV_machine:qemumips64 ?= "ad9994f20f03947ef32a18e9cc86b13d37548010" +SRCREV_machine ?= "99700bd79a36b1a0cea28fd65921b5973970fc88" +SRCREV_meta ?= "674b6bbdc9cb7cfdbec5a0642a3cbef0ba1f738c" # set your preferred provider of linux-yocto to 'linux-yocto-upstream', and you'll # get the /base branch, which is pure upstream -stable, and the same # meta SRCREV as the linux-yocto-standard builds. Select your version using the # normal PREFERRED_VERSION settings. BBCLASSEXTEND = "devupstream:target" -SRCREV_machine:class-devupstream ?= "d383d0f28ecac0f3375bdfb9a0c4bfac979f6f8f" +SRCREV_machine:class-devupstream ?= "d9b4a0c83a2d405dd85bf32d672686146b9bedff" PN:class-devupstream = "linux-yocto-upstream" KBRANCH:class-devupstream = "v5.15/base" @@ -41,7 +41,7 @@ SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;name=machine;branch=${KBRA git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-5.15;destsuffix=${KMETA}" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" -LINUX_VERSION ?= "5.15.96" +LINUX_VERSION ?= "5.15.98" DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}" DEPENDS += "openssl-native util-linux-native" From patchwork Thu Mar 30 21:13:48 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 21963 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 0EF57C761AF for ; Thu, 30 Mar 2023 21:14:24 +0000 (UTC) Received: from mail-pf1-f180.google.com (mail-pf1-f180.google.com [209.85.210.180]) by mx.groups.io with SMTP id smtpd.web10.38933.1680210860947729834 for ; Thu, 30 Mar 2023 14:14:21 -0700 Authentication-Results: mx.groups.io; dkim=fail reason="signature has expired" header.i=@sakoman-com.20210112.gappssmtp.com header.s=20210112 header.b=sibfBMrd; spf=softfail (domain: sakoman.com, ip: 209.85.210.180, mailfrom: steve@sakoman.com) Received: by mail-pf1-f180.google.com with SMTP id dw14so13496961pfb.6 for ; Thu, 30 Mar 2023 14:14:20 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20210112.gappssmtp.com; s=20210112; t=1680210860; x=1682802860; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=XnSlbB27TbkZ4+D7Z/iezRrVdpynoFmz78AqhggjRGk=; b=sibfBMrd/GCCxXHZKWEs9m9/UNSqQ1m8RtiFg2pU0Cvned6F1Of6cFd68kr2lrPvJu NRua0iD3dtU2R5M9w4wUgPxAsg1HnB1Xg04hiHb80Lzgnoh7YcOYtAu7k+XdIPmwzKJs sMTh9jfrHl5w4NSWDOf4o1VmyKUFsGyt/2jGBjdbJ79b1JXVmd2SWfgzppm9IYlEWVPK uL+Yw1+4UQbT0YzAs9GoWXq6Snt0CdcxegfSb7wYxsm5Kdz+lyzXVaiLsMBx/pGRE/JT ZhU9U+8N0FH6fvLpOHkDBIjBoyGXq/4sBYpZA6EAKkr8Z5ueNlFC9mwSvmQxPukDFn8z xRrw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; t=1680210860; x=1682802860; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=XnSlbB27TbkZ4+D7Z/iezRrVdpynoFmz78AqhggjRGk=; b=fOxAMhZ+B0ijx8c1J8LbSdPhii3ZB+Qa6arL2YJ5ESuGsqZWo9gGUEcGRD/jqb5s/W q5ftE7T+Fi/cCbA5dTwlw5mdWg1BYXumW6QFa3T3W2Vlj4jKBIVsiTktjpN2tuOL2sNF QhJT2fNenZWkRmT0ZDskM+KWEhkfPNOAZpPxQtXe0URj5vpJ5Wyd3q3pLFjb0AcoMKkW Hd0go1yCOiHPnEXb7cyEHMP2L4SS9OZGQwr9gWjnAYRDYhbrcImy3SJehYpF2XNbv4WH 98BlFeoXfVNXvrLSQQN02iWRscT8vsrjy90KEe9TtF2kTdi2tSbPuMpWlrY96i7Mln7V W/6Q== X-Gm-Message-State: AAQBX9eV0ZEKbW8OxQcfWXARjPTEYU80cIOKkj9gId2n6d+zrdacfuKJ oaFfsu20dJtOn5SPiZ67ns3tgSPH7rN8pgI3xrQ= X-Google-Smtp-Source: AKy350bb+pZjivxoQ9ke2hnxMmnmIqhTplz8BvmOq5J0IrerS9JOPFET66CGw//+zXsCNnhXvTdlnA== X-Received: by 2002:a62:3816:0:b0:62d:dadd:6419 with SMTP id f22-20020a623816000000b0062ddadd6419mr1487458pfa.17.1680210858979; Thu, 30 Mar 2023 14:14:18 -0700 (PDT) Received: from hexa.router0800d9.com (dhcp-72-253-4-112.hawaiiantel.net. [72.253.4.112]) by smtp.gmail.com with ESMTPSA id c30-20020a631c1e000000b0050301521335sm250661pgc.11.2023.03.30.14.14.17 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 30 Mar 2023 14:14:18 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][langdale 06/14] linux-yocto/5.15: update to v5.15.103 Date: Thu, 30 Mar 2023 11:13:48 -1000 Message-Id: X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 30 Mar 2023 21:14:24 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/179365 From: Bruce Ashfield Updating to the latest korg -stable release that comprises the following commits: 8020ae3c051d Linux 5.15.103 10a72c677bce Makefile: use -gdwarf-{4|5} for assembler for DEBUG_INFO_DWARF{4|5} 6e7bc50f97c9 KVM: VMX: Fix crash due to uninitialized current_vmcs 61e5087231f3 KVM: VMX: Introduce vmx_msr_bitmap_l01_changed() helper 1f47cba9364f KVM: nVMX: Don't use Enlightened MSR Bitmap for L3 2153dd644ce4 fs: hold writers when changing mount's idmapping 8c3be6925a92 UML: define RUNTIME_DISCARD_EXIT f616fa79d536 xfs: remove xfs_setattr_time() declaration 5588657f418c KVM: fix memoryleak in kvm_init() 4441a9009193 tools bpftool: Fix compilation error with new binutils 1c27fab24333 tools bpf_jit_disasm: Fix compilation error with new binutils 97f005c0bdba tools perf: Fix compilation error with new binutils 451c9d7b1616 tools include: add dis-asm-compat.h to handle version differences 51b99dc38c1a tools build: Add feature test for init_disassemble_info API changes 381492ef0c51 sh: define RUNTIME_DISCARD_EXIT 1e49bb9ba912 s390: define RUNTIME_DISCARD_EXIT to fix link error with GNU ld < 2.36 d517faf3db23 powerpc/vmlinux.lds: Don't discard .rela* for relocatable builds 4e6708a0f36e powerpc/vmlinux.lds: Define RUNTIME_DISCARD_EXIT 0bfde8c9bb27 arch: fix broken BuildID for arm64 and riscv 560a2744cbbf ext4: block range must be validated before use in ext4_mb_clear_bb() 270422f3e183 ext4: add strict range checks while freeing blocks 2da16af37847 ext4: add ext4_sb_block_valid() refactored out of ext4_inode_block_valid() 09546886a0ea ext4: refactor ext4_free_blocks() to pull out ext4_mb_clear_bb() 48302ee67dd7 filelocks: use mount idmapping for setlease permission check 513572bb89e8 media: rc: gpio-ir-recv: add remove function 5f328c9d32b1 media: ov5640: Fix analogue gain control 4cb302546556 scripts: handle BrokenPipeError for python scripts 405ec99d1d25 PCI: Add SolidRun vendor ID 2c75e258adb9 macintosh: windfarm: Use unsigned type for 1-bit bitfields 6c6f956c9295 alpha: fix R_ALPHA_LITERAL reloc for large modules adb939031af3 powerpc/kcsan: Exclude udelay to prevent recursive instrumentation e3a62a35f903 powerpc/iommu: fix memory leak with using debugfs_lookup() 93aa548a339c MIPS: Fix a compilation issue e69d841d143b fs: use consistent setgid checks in is_sxid() 78eecf2e5cd4 attr: use consistent sgid stripping checks 449badcf876d attr: add setattr_should_drop_sgid() 7e8a9b53141e fs: move should_remove_suid() 93395e1184ed attr: add in_group_or_capable() 0123712492f6 fs: move S_ISGID stripping into the vfs_*() helpers 9c3a620bbf0c fs: add mode_strip_sgid() helper 79821ab3284a xfs: set prealloc flag in xfs_alloc_file_space() a881c1ef16f1 xfs: fallocate() should call file_modified() f8937e4d1d46 xfs: remove XFS_PREALLOC_SYNC 95aab524e12e xfs: use setattr_copy to set vfs inode attributes 2115c14c93ec tpm/eventlog: Don't abort tpm_read_log on faulty ACPI address b43cb0f08767 watch_queue: fix IOC_WATCH_QUEUE_SET_SIZE alloc error paths d15c9ae1c6d9 staging: rtl8723bs: Fix key-store index handling 7fa3bb1bcabe staging: rtl8723bs: fix placement of braces 962293f5443c Staging: rtl8723bs: Placing opening { braces in previous line 890e24564c0a staging: rtl8723bs: clean up comparsions to NULL c513043e0afe iommu/amd: Add a length limitation for the ivrs_acpihid command-line parameter 0fd72f1d1b94 iommu/amd: Fix ill-formed ivrs_ioapic, ivrs_hpet and ivrs_acpihid options 2af17167804c iommu/amd: Add PCI segment support for ivrs_[ioapic/hpet/acpihid] commands ce4bbb2aa9d8 nbd: use the correct block_device in nbd_bdev_reset 7889dfc19492 irqdomain: Fix mapping-creation race a2bc806e95bd ext4: Fix deadlock during directory rename 07b0aba4adf0 RISC-V: Don't check text_mutex during stop_machine d1b47f735f60 s390/ftrace: remove dead code 3a9418d2c93c riscv: Use READ_ONCE_NOCHECK in imprecise unwinding stack mode f3969427fb06 af_unix: fix struct pid leaks in OOB support a9f99eacf79f af_unix: Remove unnecessary brackets around CONFIG_AF_UNIX_OOB. 6a29d71ab421 net: dsa: mt7530: permit port 5 to work without port 6 on MT7621 SoC ad7e40ee157b SUNRPC: Fix a server shutdown leak 64d4eb412761 octeontx2-af: Unlock contexts in the queue context cache in case of fault detection 03c1cc6f554d net/smc: fix fallback failed while sendmsg with fastopen dafde1072202 platform: x86: MLX_PLATFORM: select REGMAP instead of depending on it 36bcbcaf01d8 netfilter: conntrack: adopt safer max chain length a316da050d80 scsi: megaraid_sas: Update max supported LD IDs to 240 2adc29350a5b net: ethernet: mtk_eth_soc: fix RX data corruption issue fe8787c1e4f6 net: phy: smsc: fix link up detection in forced irq mode d83813f724ec net: phy: smsc: Cache interrupt mask 18ab31b8cd37 btf: fix resolving BTF_KIND_VAR after ARRAY, STRUCT, UNION, PTR 2662c5b1f0ef netfilter: tproxy: fix deadlock due to missing BH disable bef8cf77e21c netfilter: ctnetlink: revert to dumping mark regardless of event type 20fd0607acbf bnxt_en: Avoid order-5 memory allocation for TPA data 98fa707a52a3 net: phylib: get rid of unnecessary locking 67431417617d net: stmmac: add to set device wake up flag when stmmac init phy af5c333c84e5 drm/msm/dpu: fix len of sc7180 ctl blocks 4a476285f6d2 bpf, sockmap: Fix an infinite loop error when len is 0 in tcp_bpf_recvmsg_parser() c813f7a31614 ice: copy last block omitted in ice_get_module_eeprom() 3f14457e1584 net: caif: Fix use-after-free in cfusbl_device_notify() c2c71922c5e9 net: lan78xx: fix accessing the LAN7800's internal phy specific registers from the MAC driver c026917887d1 perf stat: Fix counting when initial delay configured fdecfb2603d0 selftests: nft_nat: ensuring the listening side is up before starting the client 91aceb3844d4 ila: do not generate empty messages in ila_xlat_nl_cmd_get_mapping() a5a7f6e6e126 powerpc: dts: t1040rdb: fix compatible string for Rev A boards 4357bbb921fe nfc: fdp: add null check of devm_kmalloc_array in fdp_nci_i2c_read_device_properties 04bfc5bcdfc0 bgmac: fix *initial* chip reset to support BCM5358 60530bfdb647 drm/msm/a5xx: fix context faults during ring switch 7f854b4803e5 drm/msm/a5xx: fix the emptyness check in the preempt code bf66e98285f7 drm/msm/a5xx: fix highest bank bit for a530 2e8efe8c8dab drm/msm/a5xx: fix setting of the CP_PREEMPT_ENABLE_LOCAL register b77c764b4371 drm/msm: Fix potential invalid ptr free ced1f5dd6c1d drm/nouveau/kms/nv50: fix nv50_wndw_new_ prototype e974d8755578 drm/nouveau/kms/nv50-: remove unused functions c50fc503ee1b ext4: Fix possible corruption when moving a directory cfb89ceb22fd regulator: core: Use ktime_get_boottime() to determine how long a regulator was off e1a078cac3e9 regulator: core: Fix off-on-delay-us for always-on/boot-on regulators 67a791df1457 regulator: Flag uncontrollable regulators as always_on e471e928de97 scsi: core: Remove the /proc/scsi/${proc_name} directory earlier 463ae58d7c80 riscv: Add header include guards to insn.h 4dd43ee784a1 riscv: Avoid enabling interrupts in die() 5ab1d0528b04 RISC-V: Avoid dereferening NULL regs in die() 6a72729ed6ac arm64: efi: Make efi_rt_lock a raw_spinlock 14ddb4e6e9de brd: mark as nowait compatible 5089247d6cf3 block/brd: add error handling support for add_disk() 5c65f0971247 iommu/vt-d: Fix PASID directory pointer coherency 8ff7db51d3ed irqdomain: Refactor __irq_domain_alloc_irqs() 62e4ba36a3d7 ipmi:ssif: Add a timer between request retries 2fb8b122ba8f ipmi:ssif: Increase the message retry time a6ef5a9d7263 f2fs: retry to update the inode page given data corruption a517c651f116 f2fs: do not bother checkpoint by f2fs_get_node_info e55332319825 f2fs: avoid down_write on nat_tree_lock during checkpoint 31b5793ca2de udf: Fix off-by-one error when discarding preallocation 30e29af746ee fs: dlm: start midcomms before scand 9c9dd2b3ba83 fs: dlm: add midcomms init/start functions 2e0415522835 fs: dlm: fix log of lowcomms vs midcomms c5a23d43c23a KVM: SVM: Process ICR on AVIC IPI delivery failure due to invalid target a78a355052ab KVM: SVM: Don't rewrite guest ICR on AVIC IPI virtualization failure 45bcf4a4f2b1 KVM: Register /dev/kvm as the _very_ last thing during initialization 0a0ecaf0988b KVM: Pre-allocate cpumasks for kvm_make_all_cpus_request_except() 3e48a6349d29 KVM: Optimize kvm_make_vcpus_request_mask() a bit 339e480baafc nfc: change order inside nfc_se_io error path 01a821aacc64 ext4: zero i_disksize when initializing the bootloader inode ca500cf2eceb ext4: fix WARNING in ext4_update_inline_data d16576142fb9 ext4: move where set the MAY_INLINE_DATA flag is set c5d7c31e1722 ext4: fix another off-by-one fsmap error on 1k block filesystems df621af95e89 ext4: fix RENAME_WHITEOUT handling for inline directories 7349cc5ab32e ext4: fix cgroup writeback accounting with fs-layer encryption fd7b8ebc1dd5 staging: rtl8723bs: Pass correct parameters to cfg80211_get_bss() 0b22cbc05ce2 drm/connector: print max_requested_bpc in state debugfs 5e0eed414156 drm/amdgpu: fix error checking in amdgpu_read_mm_registers for soc15 328d069e9c35 x86/CPU/AMD: Disable XSAVES on AMD family 0x17 92d1caad9f78 fork: allow CLONE_NEWTIME in clone3 flags 7ba76b2ac187 perf inject: Fix --buildid-all not to eat up MMAP2 2072e75b4942 btrfs: fix percent calculation for bg reclaim message f8cd8754a03a fs: prevent out-of-bounds array speculation when closing a file descriptor 2ddbd0f967b3 Linux 5.15.102 cbecbd884e81 staging: rtl8192e: Remove call_usermodehelper starting RadioPower.sh 515017e952ea staging: rtl8192e: Remove function ..dm_check_ac_dc_power calling a script 528dbd80ac21 wifi: cfg80211: Partial revert "wifi: cfg80211: Fix use after free for wext" bbf9f29bac04 Linux 5.15.101 cba6bbf501be Revert "drm/i915: Don't use BAR mappings for ring buffers with LLC" d214f240b0f6 Linux 5.15.100 acf252c1f5c3 usb: gadget: uvc: fix missing mutex_unlock() if kstrtou8() fails 1c7988d5c79f malidp: Fix NULL vs IS_ERR() checking 545d72ba4c2c scsi: mpt3sas: Remove usage of dma_get_required_mask() API 953841f959e3 scsi: mpt3sas: re-do lost mpt3sas DMA mask fix de1afc58a905 scsi: mpt3sas: Don't change DMA mask while reallocating pools 8e6612ff8b5d Revert "scsi: mpt3sas: Fix return value check of dma_get_required_mask()" 72bf6d493c95 drm/virtio: Fix error code in virtio_gpu_object_shmem_init() 8e62139840c0 media: uvcvideo: Fix race condition with usb_kill_urb a1ddee82de80 Bluetooth: hci_sock: purge socket queues in the destruct() callback 22d021232657 drm/display/dp_mst: Fix down message handling after a packet reception error db35e49413a4 drm/display/dp_mst: Fix down/up message handling after sink disconnect e23fa593f1ab x86/resctl: fix scheduler confusion with 'current' be5d5d0637fd net: tls: avoid hanging tasks on the tx_lock e1a3cfdbf5b3 soundwire: cadence: Drain the RX FIFO after an IO timeout ecb33d7a5b58 soundwire: cadence: Remove wasted space in response_buf 473efca280d4 phy: rockchip-typec: Fix unsigned comparison with less than zero ffcd94262e0e PCI: Add ACS quirk for Wangxun NICs 19c4d6c7b049 PCI: loongson: Add more devices that need MRRS quirk bb99db06b8b6 kernel/fail_function: fix memory leak with using debugfs_lookup() 7f1e53f88e8b drivers: base: dd: fix memory leak with using debugfs_lookup() 09709a49283f drivers: base: component: fix memory leak with using debugfs_lookup() b94b39bf3d54 misc: vmw_balloon: fix memory leak with using debugfs_lookup() cf042964c2fa tty: pcn_uart: fix memory leak with using debugfs_lookup() 49ae24f44713 PCI: Take other bus devices into account when distributing resources dba6280105e1 PCI: Align extra resources for hotplug bridges properly 92d6e6bf9cf1 usb: gadget: uvc: Make bSourceID read/write 14cbfd08551a usb: uvc: Enumerate valid values for color matching 7e902b949600 USB: ene_usb6250: Allocate enough memory for full object 95ee8cb26db5 usb: host: xhci: mvebu: Iterate over array indexes instead of using pointer math 8da78a60f332 USB: gadget: pxa27x_udc: fix memory leak with using debugfs_lookup() 6236a6d2cdfb USB: gadget: pxa25x_udc: fix memory leak with using debugfs_lookup() 036ada6ca9ee USB: gadget: lpc32xx_udc: fix memory leak with using debugfs_lookup() b0a2663ecbe8 USB: gadget: bcm63xx_udc: fix memory leak with using debugfs_lookup() 30f9ba2396a1 USB: gadget: gr_udc: fix memory leak with using debugfs_lookup() fb284bee1e21 USB: isp1362: fix memory leak with using debugfs_lookup() 6f12097467ea USB: isp116x: fix memory leak with using debugfs_lookup() 4a71b15744b8 USB: fotg210: fix memory leak with using debugfs_lookup() bb4d5eefb670 USB: sl811: fix memory leak with using debugfs_lookup() c6af1dbc99ad USB: uhci: fix memory leak with using debugfs_lookup() 4322661af6d7 USB: chipidea: fix memory leak with using debugfs_lookup() cf52c320cf74 USB: dwc3: fix memory leak with using debugfs_lookup() baec889a81b8 PCI: loongson: Prevent LS7A MRRS increases 19da678d38d2 soundwire: bus_type: Avoid lockdep assert in sdw_drv_probe() 587b48b18a8a iio: accel: mma9551_core: Prevent uninitialized variable in mma9551_read_config_word() 2b59fdcaaf24 iio: accel: mma9551_core: Prevent uninitialized variable in mma9551_read_status_word() 9e58ebb12210 tools/iio/iio_utils:fix memory leak 54179274476d mei: bus-fixup:upon error print return values of send and receive 49b326ce8a68 serial: sc16is7xx: setup GPIO controller later in probe 45083b86141e tty: serial: fsl_lpuart: disable the CTS when send break signal f9d9d25ad1f0 tty: fix out-of-bounds access in tty_driver_lookup_tty() 4be3213e9d79 staging: emxx_udc: Add checks for dma_alloc_coherent() 6683327b51a6 USB: fix memory leak with using debugfs_lookup() b32d922f86f3 media: uvcvideo: Silence memcpy() run-time false positive warnings c1343a879cce media: uvcvideo: Quirk for autosuspend in Logitech B910 and C910 cdccb1c3fcd2 media: uvcvideo: Handle errors from calls to usb_string 31a8d11d28b5 media: uvcvideo: Handle cameras with invalid descriptors 57b0ff53f4de media: uvcvideo: Remove format descriptions 1f11ed61d69d iommu/amd: Fix error handling for pdev_pri_ats_enable() 77d567091ec3 IB/hfi1: Update RMT size calculation 5a47bb71b1a9 mfd: arizona: Use pm_runtime_resume_and_get() to prevent refcnt leak 1b46c2a76c21 bootconfig: Increase max nodes of bootconfig from 1024 to 8192 for DCC support 0a65cd7379a2 firmware/efi sysfb_efi: Add quirk for Lenovo IdeaPad Duet 3 2e07fa2e30d4 kernel/printk/index.c: fix memory leak with using debugfs_lookup() ba279dc7e47a tracing: Add NULL checks for buffer in ring_buffer_free_read_page() 9c28c74fbd67 thermal: intel: BXT_PMIC: select REGMAP instead of depending on it 5eaf55b38691 thermal: intel: quark_dts: fix error pointer dereference d11f9f030fd8 ASoC: mediatek: mt8195: add missing initialization 488bc1b823c7 ASoC: zl38060 add gpiolib dependency 69e997420cb9 ASoC: zl38060: Remove spurious gpiolib select 35b855381898 ASoC: adau7118: don't disable regulators on device unbind 3e7d0968203d loop: loop_set_status_from_info() check before assignment 746d4e369e04 rtc: allow rtc_read_alarm without read_alarm callback 6e47bb21b63b scsi: ipr: Work around fortify-string warning c775a5246151 genirq: Add and use an irq_data_update_affinity helper 00340ccb5407 genirq: Refactor accessors to use irq_data_get_affinity_mask 2163cf142272 rtc: sun6i: Always export the internal oscillator 660e8f2eeafa vc_screen: modify vcs_size() handling in vcs_read() 72db07cf0d6b tcp: tcp_check_req() can be called from process context ac7014af85aa ARM: dts: spear320-hmi: correct STMPE GPIO compatible dff967aee88a net/sched: act_sample: fix action bind logic 850f914efe04 net/sched: act_mpls: fix action bind logic da4df0cbdf7c net/sched: act_pedit: fix action bind logic 5654a12277b0 net/sched: transition act_pedit to rcu and percpu stats c494365432dc nfc: fix memory leak of se_io context in nfc_genl_se_io 6398bd3c4a50 net/mlx5: Geneve, Fix handling of Geneve object id as error code 48a8c76c7dc6 net/mlx5e: Verify flow_source cap before using it 2721d966680a 9p/rdma: unmap receive dma buffer in rdma_request()/post_recv() 8d3fc907d060 9p/xen: fix connection sequence fc772313f2da 9p/xen: fix version parsing df192270eb72 net: fix __dev_kfree_skb_any() vs drop monitor ada4f805c9e4 octeontx2-pf: Use correct struct reference in test condition bf5540cbd20e sctp: add a refcnt in sctp_stream_priorities to avoid a nested loop dcdddb5f4908 ipv6: Add lwtunnel encap size of all siblings in nexthop calculation e306dbee4c98 netfilter: x_tables: fix percpu counter block leak on error path when creating new netns dbb3cbbf03b3 netfilter: ebtables: fix table blob use-after-free af41b3cd9a92 netfilter: ctnetlink: fix possible refcount leak in ctnetlink_create_conntrack() 041fdbe73de9 watchdog: sbsa_wdog: Make sure the timeout programming is within the limits 3e765f7ff256 watchdog: pcwd_usb: Fix attempting to access uninitialized memory 23cc41c3f19c watchdog: Fix kmemleak in watchdog_cdev_register dd7605dd48e5 watchdog: at91sam9_wdt: use devm_request_irq to avoid missing free_irq() in error path a27e95a6ff3f um: virt-pci: properly remove PCI device from bus 6c738b8805c6 um: virtio_uml: move device breaking into workqueue b7d5712cf9f4 um: virtio_uml: mark device as unregistered when breaking it 1b1ef45d48e1 um: virtio_uml: free command if adding to virtqueue failed 8ba6b0fade97 x86: um: vdso: Add '%rcx' and '%r11' to the syscall clobber list ed1d288ec85d netfilter: nf_tables: allow to fetch set elements when table has an owner 98db4a032244 ext4: use ext4_fc_tl_mem in fast-commit replay path aa4d726af72a f2fs: fix to avoid potential memory corruption in __update_iostat_latency() 3afaaf6f5867 ubi: ubi_wl_put_peb: Fix infinite loop when wear-leveling work failed 79548ccdd992 ubi: Fix UAF wear-leveling entry in eraseblk_count_seq_show() 003bb9868a51 ubi: fastmap: Fix missed fm_anchor PEB in wear-leveling after disabling fastmap 79db0e8323b5 ubifs: ubifs_writepage: Mark page dirty after writing inode failed 10b6c359e374 ubifs: dirty_cow_znode: Fix memleak in error handling path aeb92507ea25 ubifs: Re-statistic cleaned znode count if commit failed 5ec4c8aca5a2 ubi: Fix possible null-ptr-deref in ubi_free_volume() 3e29634eb56e ubifs: Fix memory leak in alloc_wbufs() 95a72417dd13 ubi: Fix unreferenced object reported by kmemleak in ubi_resize_volume() 53818746e549 ubi: Fix use-after-free when volume resizing failed 91bc31579e9f ubifs: Reserve one leb for each journal head while doing budget 2b6d85db0e07 ubifs: do_rename: Fix wrong space budget when target inode's nlink > 1 8e30559876d8 ubifs: Fix wrong dirty space budget for dirty inode 8e166cc9b64b ubifs: Rectify space budget for ubifs_xrename() de6d6bf150b7 ubifs: Rectify space budget for ubifs_symlink() if symlink is encrypted 8c3ebc5e3cd0 ubifs: Fix build errors as symbol undefined 701bb3ed5a88 ubi: ensure that VID header offset + VID header size <= alloc, size 276a7298af6a um: vector: Fix memory leak in vector_config 354dfc05bd5f f2fs: allow set compression option of files without blocks add8515d59a1 fs: f2fs: initialize fsdata in pagecache_write() 06fa1a839fae f2fs: use memcpy_{to,from}_page() where possible 804817f02e2f pwm: stm32-lp: fix the check on arr and cmp registers update 81ea09ae3040 pwm: sifive: Always let the first pwm_apply_state succeed 852703ed6d81 pwm: sifive: Reduce time the controller lock is held 3a75866a5cef objtool: Fix memory leak in create_static_call_sections() ea30508b7bb1 fs/jfs: fix shift exponent db_agl2size negative 8311961a1724 auxdisplay: hd44780: Fix potential memory leak in hd44780_remove() 7c183dc0af47 net/sched: Retire tcindex classifier abddfcf701a5 Linux 5.15.99 d2fb2739e956 kbuild: Port silent mode detection to future gnu make. 2da950a044ee wifi: ath9k: use proper statements in conditionals 7e6eeb5fb3aa arm64: dts: qcom: ipq8074: fix Gen2 PCIe QMP PHY 6ac2adcc2bff iommu/vt-d: Fix an unbalanced rcu_read_lock/rcu_read_unlock() 26f8b1ef30f6 media: uvcvideo: Fix memory leak of object map on error exit path 2137e7c83ed6 qede: avoid uninitialized entries in coal_entry array a8da5a8900fa perf intel-pt: pkt-decoder: Add CFE and EVD packets 922bd6b37276 drm/edid: fix AVI infoframe aspect ratio handling 4eb6789f9177 drm/i915: Don't use BAR mappings for ring buffers with LLC 64bcaffa2d5c drm/radeon: Fix eDP for single-display iMac11,2 6a5f31c3fbf3 drm/i915/quirks: Add inverted backlight quirk for HP 14-r206nv 5f63c879ca95 vfio/type1: restore locked_vm 7329ab7f0249 vfio/type1: track locked_vm per dma eafb81c50da8 vfio/type1: prevent underflow of locked_vm via exec() 2fd6f6c8cb35 iommu/vt-d: Avoid superfluous IOTLB tracking in lazy mode 77ffe5501e02 PCI: Avoid FLR for AMD FCH AHCI adapters 99eefc2c62e0 PCI: hotplug: Allow marking devices as disconnected during bind/unbind 2bb559f12e54 PCI/PM: Observe reset delay irrespective of bridge_d3 b07ded08cd9c MIPS: DTS: CI20: fix otg power gpio 71f81b6842af riscv: ftrace: Reduce the detour code size to half 4accfc428fec riscv: ftrace: Remove wasted nops for !RISCV_ISA_C f6b5db68b256 riscv, mm: Perform BPF exhandler fixup on page fault 043d1657cc51 riscv: jump_label: Fixup unaligned arch_static_branch function ac5ff022d916 riscv: mm: fix regression due to update_mmu_cache change 59b83f7b057d RISC-V: add a spin_shadow_stack declaration 0595cdb58772 scsi: ses: Fix slab-out-of-bounds in ses_intf_remove() 584892fd29a4 scsi: ses: Fix possible desc_ptr out-of-bounds accesses 384aa697d8f2 scsi: ses: Fix possible addl_desc_ptr out-of-bounds accesses 2b28a7d261cb scsi: ses: Fix slab-out-of-bounds in ses_enclosure_data_process() 6fce2307650a scsi: ses: Don't attach if enclosure has no components cb121c4137b2 scsi: qla2xxx: Remove increment of interface err cnt 5f40ca617ef5 scsi: qla2xxx: Fix erroneous link down 77a11df33c48 scsi: qla2xxx: Remove unintended flag clearing 77302fb0e357 scsi: qla2xxx: Fix DMA-API call trace on NVMe LS requests 476126f14dfe scsi: qla2xxx: Check if port is online before sending ELS c54e9311ee0b scsi: qla2xxx: Fix link failure in NPIV environment 37a38ff7edf4 tools/bootconfig: fix single & used for logical condition d41db100bc38 ring-buffer: Handle race between rb_move_tail and rb_check_pages 145999aed74f ktest.pl: Add RUN_TIMEOUT option with default unlimited aab7db9e1e08 ktest.pl: Fix missing "end_monitor" when machine check fails 0c2f4a234bb2 ktest.pl: Give back console on Ctrt^C on monitor fe463fe6aa80 mm/thp: check and bail out if page in deferred queue already ef1fcad8548d mm: memcontrol: deprecate charge moving d0d794371bde docs: gdbmacros: print newest record a16bd95eeb2e remoteproc/mtk_scp: Move clk ops outside send_lock 505627bebd45 media: ipu3-cio2: Fix PM runtime usage_count in driver unbind d15f73b01bce mips: fix syscall_get_nr 34dbf5dd0711 dax/kmem: Fix leak of memory-hotplug resources 7eb171ada303 alpha: fix FEN fault handling efa228b2e6a4 ceph: update the time stamps and try to drop the suid/sgid a73783e4e0c4 rbd: avoid use-after-free in do_rbd_add() when rbd_dev_create() fails c6cc86c6d847 fuse: add inode/permission checks to fileattr_get/fileattr_set cfa97a3b266a ARM: dts: exynos: correct TMU phandle in Odroid HC1 70e18548311c ARM: dts: exynos: correct TMU phandle in Odroid XU 816f83bd2868 ARM: dts: exynos: correct TMU phandle in Exynos5250 269926de8454 ARM: dts: exynos: correct TMU phandle in Odroid XU3 family 78a5fa65a5d7 ARM: dts: exynos: correct TMU phandle in Exynos4 52739e0f7413 ARM: dts: exynos: correct TMU phandle in Exynos4210 89e99f0b031f ARM: dts: qcom: sdx55: Add Qcom SMMU-500 as the fallback for IOMMU node 0e22e0477479 dm flakey: fix a bug with 32-bit highmem systems ff60b2bb680e dm flakey: don't corrupt the zero page 673ca7e7872f dm flakey: fix logic when corrupting a bio 8cbbe0651971 thermal: intel: powerclamp: Fix cur_state for multi package system 935ba268ac0b qede: fix interrupt coalescing configuration fd081afd21eb wifi: cfg80211: Fix use after free for wext 60e49fe9b7e4 wifi: ath11k: allow system suspend to survive ath11k f592cd2f1390 wifi: rtl8xxxu: Use a longer retry limit of 48 931dc7e232b2 dm: add cond_resched() to dm_wq_work() d71a0899e497 dm: send just one event on resize, not two 61d44a4db2f5 mtd: spi-nor: Fix shift-out-of-bounds in spi_nor_set_erase_type afd61540ba77 mtd: spi-nor: spansion: Consider reserved bits in CFR5 register 73a4cbf91e04 mtd: spi-nor: sfdp: Fix index value for SCCR dwords 116008ada3d0 ext4: refuse to create ea block when umounted a6744e14ce70 ext4: optimize ea_inode block expansion c325350d0c54 jbd2: fix data missing when reusing bh which is ready to be checkpointed 83c4e017fbfd ALSA: hda/realtek: Add quirk for HP EliteDesk 800 G6 Tower PC ff9657b1e845 ALSA: ice1712: Do not left ice->gpio_mutex locked in aureon_add_controls() 345fb368e5f5 io_uring/poll: allow some retries for poll triggering spuriously 7e8cd208e9c2 io_uring: remove MSG_NOSIGNAL from recvmsg dde0d0dfbde2 io_uring/rsrc: disallow multi-source reg buffers abd54d87daba io_uring: add a conditional reschedule to the IOPOLL cancelation loop 337eb887c74d io_uring: mark task TASK_RUNNING before handling resume/task work 54df6c5edf87 io_uring: handle TIF_NOTIFY_RESUME when checking for task_work 7697139d5dfd crypto: qat - fix out-of-bounds read ffc9d001fed1 irqdomain: Fix domain registration race a2a46bd4f40c irqdomain: Drop bogus fwspec-mapping error handling 27842d6884d7 irqdomain: Look for existing mapping only once 562e332dd306 irqdomain: Fix disassociation race ee82369e29fb irqdomain: Fix association race 1cb936fee7e7 ima: Align ima_file_mmap() parameters with mmap_file LSM hook cb104b880d78 brd: return 0/-error from brd_insert_page() 113d4b0e12f4 Documentation/hw-vuln: Document the interaction between IBRS and STIBP e7f1ddebd9f5 x86/speculation: Allow enabling STIBP with legacy IBRS be2710deaed3 x86/microcode/AMD: Fix mixed steppings support 5830ff467ab3 x86/microcode/AMD: Add a @cpu parameter to the reloading functions 865af457dd89 x86/microcode/amd: Remove load_microcode_amd()'s bsp parameter e1d35d0d1830 x86/kprobes: Fix arch_check_optimized_kprobe check within optimized_kprobe range c5a2c2bf0b4f x86/kprobes: Fix __recover_optprobed_insn check optimizing logic f46a42130c03 x86/reboot: Disable SVM, not just VMX, when stopping CPUs 5427c3cee789 x86/reboot: Disable virtualization in an emergency if SVM is supported 1e3edbabf57a x86/crash: Disable virt in core NMI crash handler to avoid double shootdown 83a27cd866dd x86/virt: Force GIF=1 prior to disabling SVM (for reboot flows) 6e46d9ff3ed3 KVM: s390: disable migration mode when dirty tracking is disabled 21c95b736058 KVM: SVM: hyper-v: placate modpost section mismatch error 033a4c062124 KVM: SVM: Fix potential overflow in SEV's send|receive_update_data() 11d4b35674c6 KVM: x86: Inject #GP if WRMSR sets reserved bits in APIC Self-IPI 999439fd5da5 KVM: Destroy target device if coalesced MMIO unregistration fails ac791643e77b RDMA/siw: Fix user page pinning accounting a155ad9506f9 udf: Fix file corruption when appending just after end of preallocated extent 37e74003d81e udf: Detect system inodes linked into directory hierarchy e6574337df78 udf: Preserve link count of system files c5787d77a5c2 udf: Do not update file length for failed writes to inline files 9a8d602f0723 udf: Do not bother merging very long extents e43adce883e1 udf: Truncate added extents on failed expansion aa502e760c26 selftests/landlock: Test ptrace as much as possible with Yama 6249f305cd34 selftests/landlock: Skip overlayfs tests when not supported 597ecd95b1f2 ocfs2: fix non-auto defrag path not working issue 33665d104266 ocfs2: fix defrag path triggering jbd2 ASSERT f901c39e670b f2fs: fix cgroup writeback accounting with fs-layer encryption 117d4f6687b1 f2fs: fix information leak in f2fs_move_inline_dirents() 936a8383a021 fs: dlm: send FIN ack back in right cases e9463d46af47 fs: dlm: move sending fin message into state change handling 3ed92883b387 fs: dlm: don't set stop rx flag after node reset 19e99109fb77 exfat: fix inode->i_blocks for non-512 byte sector size device 9717df94d7d0 exfat: redefine DIR_DELETED as the bad cluster number c2c3d86bd4a9 exfat: fix unexpected EOF while reading dir 0d3902cbcf80 exfat: fix reporting fs error when reading dir beyond EOF 05103d88482d fs: hfsplus: fix UAF issue in hfsplus_put_super 2cab8db14566 hfs: fix missing hfs_bnode_get() in __hfs_bnode_create 6817d13c62db ARM: dts: exynos: correct HDMI phy compatible in Exynos4 851c34f19c0a ksmbd: do not allow the actual frame length to be smaller than the rfc1002 length f9b816c55bea ksmbd: fix wrong data area length for smb2 lock request db1c5ec57611 locking/rwsem: Prevent non-first waiter from spinning in down_write() slowpath 79a0583a31ae btrfs: hold block group refcount during async discard 0eba9b4a86e8 cifs: Fix uninitialized memory read in smb3_qfs_tcon() 2c00c08a081e s390/kprobes: fix current_kprobe never cleared after kprobes reenter f12874e6a169 s390/kprobes: fix irq mask clobbering on kprobe reenter from post_handler 76c683864bea s390: discard .interp section 61e64c322739 s390/extmem: return correct segment type in __segment_load() 49be6b25acb7 ipmi_ssif: Rename idle state and check 66db2b9a2dc5 ipmi:ssif: resend_msg() cannot fail db44fae4cb19 rtc: pm8xxx: fix set-alarm race 8b44b4d81598 block: don't allow multiple bios for IOCB_NOWAIT issue ce3eb3c37b2c firmware: coreboot: framebuffer: Ignore reserved pixel color bits d44d34a22ff0 wifi: rtl8xxxu: fixing transmisison failure for rtl8192eu 90ca3fa30fc4 drm/shmem-helper: Revert accidental non-GPL export bde7dcd77807 nfsd: zero out pointers after putting nfsd_files on COPY setup error 8c5f6c699241 dm cache: add cond_resched() to various workqueue loops 01663c215843 dm thin: add cond_resched() to various workqueue loops f0c8b85af2f6 drm: panel-orientation-quirks: Add quirk for Lenovo IdeaPad Duet 3 10IGL5 fbc357c9ad67 HID: logitech-hidpp: Don't restart communication if not necessary 5a46d8bdaf03 scsi: snic: Fix memory leak with using debugfs_lookup() 73dbd0f325af pinctrl: at91: use devm_kasprintf() to avoid potential leaks 52ea47a0ddfb hwmon: (coretemp) Simplify platform device handling c713ebf2fe3f gfs2: Improve gfs2_make_fs_rw error handling a4b3893e4183 regulator: s5m8767: Bounds check id indexing into arrays 88001ac08e69 regulator: max77802: Bounds check regulator id against opmode 4e8c955abc52 ASoC: kirkwood: Iterate over array indexes instead of using pointer math 9576b7ccc203 ASoC: soc-compress: Reposition and add pcm_mutex 204233695407 docs/scripts/gdb: add necessary make scripts_gdb step 5dfe7a5386fd drm/msm/dsi: Add missing check for alloc_ordered_workqueue 9ae15ebaefc4 drm: amd: display: Fix memory leakage a40b97acb817 Revert "fbcon: don't lose the console font across generic->chip driver switch" 51ab4eb1a25e scsi: lpfc: Fix use-after-free KFENCE violation during sysfs firmware write cda2f7efbc2d drm/radeon: free iio for atombios when driver shutdown 340d1cc503f6 drm/tiny: ili9486: Do not assume 8-bit only SPI controllers 1f09c5321f03 HID: Add Mapping for System Microphone Mute fc4f90d6ebd0 drm/omap: dsi: Fix excessive stack usage bb9a5562beb9 drm/amd/display: Fix potential null-deref in dm_resume 54ba1ec7ed34 drm/amd/display: Revert Reduce delay when sink device not able to ACK 00340h write 93be5b2dda27 scm: add user copy checks to put_cmsg() ad01fa14f65c hv_netvsc: Check status in SEND_RNDIS_PKT completion message 90c260fddc65 Bluetooth: btusb: Add VID:PID 13d3:3529 for Realtek RTL8821CE 84e4d4885d0a PM: EM: fix memory leak with using debugfs_lookup() dddc132eb0dc PM: domains: fix memory leak with using debugfs_lookup() dc39fbd865a9 time/debug: Fix memory leak with using debugfs_lookup() 49aa49952116 s390/idle: mark arch_cpu_idle() noinstr eb1fbdf985cc uaccess: Add minimum bounds check on kernel buffer size ce1fb07b7130 coda: Avoid partial allocation of sig_inputArgs dca8fd0f7d70 net/mlx5: fw_tracer: Fix debug print 4d9d7e5e4c79 ACPI: video: Fix Lenovo Ideapad Z570 DMI match 90fa009c6d51 wifi: mt76: dma: free rx_head in mt76_dma_rx_cleanup 634986c94c57 tools/power/x86/intel-speed-select: Add Emerald Rapid quirk 2493966c877f netfilter: nf_tables: NULL pointer dereference in nf_tables_updobj() fcf9fb5242d2 m68k: Check syscall_trace_enter() return code 124ca24e0de9 net: bcmgenet: Add a check for oversized packets bcb03f2be982 crypto: hisilicon: Wipe entire pool on error f1e093291cd6 clocksource: Suspend the watchdog temporarily when high read latency detected e6900ee15d87 thermal: intel: intel_pch: Add support for Wellsburg PCH 31f4c98ecd17 ACPI: Don't build ACPICA with '-Os' 57bb8235ba8f ice: add missing checks for PF vsi type 38f564996906 ice: restrict PTP HW clock freq adjustments to 100, 000, 000 PPB b279fa1ceadb inet: fix fast path in __inet_hash_connect() 1a1f43059afa wifi: mt7601u: fix an integer underflow a0f0ce1c8ab9 wifi: brcmfmac: ensure CLM version is null-terminated to prevent stack-out-of-bounds f5df8d35b228 x86/bugs: Reset speculation control settings on init aa70d1e0f941 timers: Prevent union confusion from unexpected restart_syscall() 599a9dcef8a7 thermal: intel: Fix unsigned comparison with less than zero 208065148930 wifi: ath11k: debugfs: fix to work with multiple PCI devices 4a84fcea596d rcu-tasks: Make rude RCU-Tasks work well with CPU hotplug 0d9fc1397f71 rcu: Suppress smp_processor_id() complaint in synchronize_rcu_expedited_wait() 6f2ce125c760 rcu: Make RCU_LOCKDEP_WARN() avoid early lockdep checks 3a3a5e3f9406 wifi: brcmfmac: Fix potential stack-out-of-bounds in brcmf_c_preinit_dcmds() 634a5471a6bd wifi: ath9k: Fix use-after-free in ath9k_hif_usb_disconnect() a2e4b48d6f9b trace/blktrace: fix memory leak with using debugfs_lookup() 3538ade9d8c2 blk-iocost: fix divide by 0 error in calc_lcoefs() 2e68a0f7bc57 ARM: dts: exynos: Use Exynos5420 compatible for the MIPI video phy 1492fc9b50a4 udf: Define EFSCORRUPTED error code de23e98c1c34 rpmsg: glink: Avoid infinite loop on intent for missing channel 6d24202b8d3d media: saa7134: Use video_unregister_device for radio_dev 114f768e7314 media: usb: siano: Fix use after free bugs caused by do_submit_urb d2512e1c9073 media: i2c: ov7670: 0 instead of -EINVAL was returned 29962c478e8b media: rc: Fix use-after-free bugs caused by ene_tx_irqsim() 09fc82a6a7a8 media: imx-jpeg: Apply clk_bulk api instead of operating specific clk 8f9722ffa432 media: v4l2-jpeg: ignore the unknown APP14 marker ecefc14dd1c9 media: v4l2-jpeg: correct the skip count in jpeg_parse_app14_data 5ed8dde3aa5b media: i2c: imx219: Fix binning for RAW8 capture 800bb32c7636 media: i2c: imx219: Split common registers from mode tables 1da495101ef7 media: i2c: ov772x: Fix memleak in ov772x_probe() ba54908ae822 media: ov5675: Fix memleak in ov5675_init_controls() 3969b2ebc660 media: ov2740: Fix memleak in ov2740_init_controls() 5897fe3ebe82 media: max9286: Fix memleak in max9286_v4l2_register() 956186b8e2c1 builddeb: clean generated package content edc6f486be31 s390/vdso: Drop '-shared' from KBUILD_CFLAGS_64 4ecc0a347da7 s390/vdso: remove -nostdlib compiler flag a26436b90808 powerpc: Remove linker flag from KBUILD_AFLAGS 60abe015c3b5 media: platform: ti: Add missing check for devm_regulator_get 954f27086c07 media: ti: cal: fix possible memory leak in cal_ctx_create() d4f4aa9ec112 remoteproc: qcom_q6v5_mss: Use a carveout to authenticate modem headers bd57756a7e43 IB/hfi1: Fix sdma.h tx->num_descs off-by-one errors 08210a63eb4f IB/hfi1: Fix math bugs in hfi1_can_pin_pages() a495b6a5d027 iommu/vt-d: Allow to use flush-queue when first level is default 990c539e9c33 iommu/vt-d: Use second level for GPA->HPA translation 727fb414fe9f iommu/vt-d: Check FL and SL capability sanity in scalable mode b0a2bf28af77 iommu/vt-d: Remove duplicate identity domain flag db05a58ed435 iommu/vt-d: Fix error handling in sva enable/disable paths 0bb33c5fe4a0 dmaengine: dw-axi-dmac: Do not dereference NULL structure ad222c9af25e dmaengine: sf-pdma: pdma_desc memory leak fix f119ef452e2d iommu: Fix error unwind in iommu_group_alloc() 76e0396313c7 iw_cxgb4: Fix potential NULL dereference in c4iw_fill_res_cm_id_entry() 3df71bb7e8ad phy: rockchip-typec: fix tcphy_get_mode error case 295ab6d49ee5 dmaengine: dw-edma: Fix readq_ch() return value truncation 3d41d9b256ae tty: serial: imx: disable Ageing Timer interrupt request irq 908e091e1b66 tty: serial: imx: Handle RS485 DE signal active high 3fe888ce8152 serial: fsl_lpuart: fix RS485 RTS polariy inverse issue 87674a359ad1 RDMA/irdma: Cap MSIX used to online CPUs + 1 d9e1dae1e278 usb: max-3421: Fix setting of I/O pins 9dca64042d85 RDMA/cxgb4: Fix potential null-ptr-deref in pass_establish() 16603bced2d1 power: supply: remove faulty cooling logic c4f590e84a60 iommu/vt-d: Set No Execute Enable bit in PASID table entry 7bd1d1305c89 usb: gadget: configfs: Restrict symlink creation is UDC already binded da589849cfdd usb: gadget: configfs: remove using list iterator after loop body as a ptr 3d0127aca18f usb: gadget: configfs: use to_usb_function_instance() in cfg (un)link func c955f9cf75b7 usb: gadget: configfs: use to_config_usb_cfg() in os_desc_link() f12829e5130f usb: musb: mediatek: don't unregister something that wasn't registered 2aff0632ac6b RDMA/cxgb4: add null-ptr-check after ip_dev_find() fcbbf34d7820 tty: serial: fsl_lpuart: Fix the wrong RXWATER setting for rx dma case e8fb0f13e45c usb: early: xhci-dbc: Fix a potential out-of-bound memory access 49bf49312b30 dmaengine: dw-edma: Fix missing src/dst address of interleaved xfers 834af318db66 fotg210-udc: Add missing completion handler b4fe158259fb firmware: dmi-sysfs: Fix null-ptr-deref in dmi_sysfs_register_handle ca39a7c65944 drivers: base: transport_class: fix resource leak when transport_add_device() fails 817b415f481b drivers: base: transport_class: fix possible memory leak 8d389e363075 driver core: fix resource leak in device_add() 6cdcee7393d4 misc/mei/hdcp: Use correct macros to initialize uuid_le a3c89e8c69a5 VMCI: check context->notify_page after call to get_user_pages_fast() to avoid GPF b1cdf1113e21 firmware: stratix10-svc: add missing gen_pool_destroy() in stratix10_svc_drv_probe() 7f9416f14e86 applicom: Fix PCI device refcount leak in applicom_init() 4a77ce51f9a8 eeprom: idt_89hpesx: Fix error handling in idt_init() 4143de03d397 Revert "char: pcmcia: cm4000_cs: Replace mdelay with usleep_range in set_protocol" c177d5f24723 serial: tegra: Add missing clk_disable_unprepare() in tegra_uart_hw_init() 7159dced6ffb tty: serial: fsl_lpuart: clear LPUART Status Register in lpuart32_shutdown() d5dcc89c8df8 tty: serial: fsl_lpuart: disable Rx/Tx DMA in lpuart32_shutdown() 707d954d9b5c PCI: switchtec: Return -EFAULT for copy_to_user() errors 53b65fa40c01 PCI/IOV: Enlarge virtfn sysfs name buffer 645384e26f20 usb: typec: intel_pmc_mux: Don't leak the ACPI device reference count 2a023b47d9f5 usb: typec: intel_pmc_mux: Use the helper acpi_dev_get_memory_resources() 2dc1dba1d8d3 ACPI: resource: Add helper function acpi_dev_get_memory_resources() 950c6df6ec6e coresight: cti: Add PM runtime call in enable_store ec4808025406 coresight: cti: Prevent negative values of enable count 4f125de654c4 coresight: etm4x: Fix accesses to TRCSEQRSTEVR and TRCSEQSTR 4ff283009f55 media: uvcvideo: Check for INACTIVE in uvc_ctrl_is_accessible() 5052fe8a95a4 media: uvcvideo: Check controls flags before accessing them bd3a78ace9bd media: uvcvideo: Use control names from framework 5f0b4c77e70d media: uvcvideo: Add support for V4L2_CTRL_TYPE_CTRL_CLASS c7121f186c1c media: uvcvideo: refactor __uvc_ctrl_add_mapping d9eacd945f16 media: uvcvideo: Remove s_ctrl and g_ctrl 07ab366a9aaf media: uvcvideo: Do not check for V4L2_CTRL_WHICH_DEF_VAL 0305bf6af005 alpha/boot/tools/objstrip: fix the check for ELF header 89a0079049f5 kobject: Fix slab-out-of-bounds in fill_kobj_path() e8bfba508cf3 kobject: modify kobject_get_path() to take a const * 2c59650d078b driver core: fix potential null-ptr-deref in device_add() 18f50b830408 soundwire: cadence: Don't overflow the command FIFOs 83ce72f41464 i2c: designware: fix i2c_dw_clk_rate() return size to be u32 d725bc59db96 usb: gadget: fusb300_udc: free irq on the error path in fusb300_probe() 806d41135051 iio: light: tsl2563: Do not hardcode interrupt trigger type 0d6282dc2bd3 dmaengine: HISI_DMA should depend on ARCH_HISI d901a7fb4069 dmaengine: idxd: Set traffic class values in GRPCFG on DSA 2.0 6a8a02dcfae1 mfd: pcf50633-adc: Fix potential memleak in pcf50633_adc_async_read() 413f8b1f8be6 mfd: cs5535: Don't build on UML 41aed1bddcec objtool: add UACCESS exceptions for __tsan_volatile_read/write 1ca4adf2e099 printf: fix errname.c list 3927846a2a53 selftests/ftrace: Fix bash specific "==" operator b41a42d11df7 sparc: allow PM configs for sparc32 COMPILE_TEST 1f3d6661f3f4 perf tools: Fix auto-complete on aarch64 f9a35cd8f017 perf intel-pt: Do not try to queue auxtrace data on pipe bb0a6b5bcebf perf intel-pt: Add support for emulated ptwrite 6d60fdc1e6a1 perf intel-pt: Add link to the perf wiki's Intel PT page ceecd014a8cc perf intel-pt: Add documentation for Event Trace and TNT disable b51f0131fd41 perf inject: Use perf_data__read() for auxtrace 690efcb5827c leds: led-core: Fix refcount leak in of_led_get() 1cdf973d2b3a perf llvm: Fix inadvertent file creation 321b8b2b0b2b gfs2: jdata writepage fix 7cbd5bdb5bd4 cifs: Fix warning and UAF when destroy the MR list 46cd6c639cdd cifs: Fix lost destroy smbd connection when MR allocate failed 22f55cbb0605 nfsd: fix race to check ls_layouts 4abe8b100407 drm/shmem-helper: Fix locking for drm_gem_shmem_get_pages_sgt() 350f0fc9052d hid: bigben_probe(): validate report count 0fd999805292 HID: bigben: use spinlock to safely schedule workers be0b3f4a10bc HID: bigben_worker() remove unneeded check on report_field 4dccaf1e45e1 HID: bigben: use spinlock to protect concurrent accesses 547d18473a16 ASoC: soc-dapm.h: fixup warning struct snd_pcm_substream not declared 78b4d1e54531 spi: synquacer: Fix timeout handling in synquacer_spi_transfer_one() 91758289faad NFS: fix disabling of swap c78cfb19c9a2 nfs4trace: fix state manager flag printing ccbf841c73ef NFSv4: keep state manager thread active if swap is enabled 24ff9c5cdea9 dm: remove flush_scheduled_work() during local_exit() 6739473a05ba ASoC: tlv320adcx140: fix 'ti,gpio-config' DT property init 75eef8cb9d07 hwmon: (mlxreg-fan) Return zero speed for broken fan 528181646644 spi: bcm63xx-hsspi: Fix multi-bit mode setting caed289f95f2 ASoC: codecs: lpass: fix incorrect mclk rate 110589ecae84 ASoC: codecs: tx-macro: move to individual clks from bulk b1c7f77e2831 ASoC: codecs: rx-macro: move to individual clks from bulk 05fd63e7f640 ASoC: codecs: tx-macro: move clk provider to managed variants 8ca893710c67 ASoC: codecs: rx-macro: move clk provider to managed variants bed34709711a ASoC: codecs: Change bulk clock voting to optional voting in digital codecs bf29fda763a9 HID: retain initial quirks set up when creating HID devices 2098a330b2a6 HID: multitouch: Add quirks for flipped axes f6e9b77257c1 scsi: aic94xx: Add missing check for dma_map_single() 378cc0eec4aa scsi: mpt3sas: Fix a memory leak 2dc8d09c1e68 drm/amdgpu: fix enum odm_combine_mode mismatch 8b9415aecb1f hwmon: (ltc2945) Handle error case in ltc2945_value_store 9cd1a9b7de20 ASoC: dt-bindings: meson: fix gx-card codec node regex fecd236ef6be ASoC: mchp-spdifrx: Fix uninitialized use of mr in mchp_spdifrx_hw_params() 2b346cc075ec ASoC: rsnd: fixup #endif position fa077baab8ea ASoC: mchp-spdifrx: disable all interrupts in mchp_spdifrx_dai_remove() 667782d7ef5b ASoC: mchp-spdifrx: fix controls that works with completion mechanism 12396e9300da ASoC: mchp-spdifrx: fix return value in case completion times out 0c4e4d2ccb88 ASoC: mchp-spdifrx: fix controls which rely on rsr register e4d1c3ce2fe3 spi: dw_bt1: fix MUX_MMIO dependencies 5f54a1d08e26 gpio: vf610: connect GPIO label to dev name 0b64984dfbc4 ASoC: soc-compress.c: fixup private_data on snd_soc_new_compress() 49cf87919dae drm/mediatek: Clean dangling pointer on bind error path 62952905e195 drm/mediatek: mtk_drm_crtc: Add checks for devm_kcalloc cd98ea8fa15b drm/mediatek: Drop unbalanced obj unref 088a31fe1edb drm/mediatek: Use NULL instead of 0 for NULL pointer 2a83e2b5b121 drm/mediatek: dsi: Reduce the time of dsi from LP11 to sending cmd be30b05c4a33 drm/msm/dpu: set pdpu->is_rt_pipe early in dpu_plane_sspp_atomic_update() f50858d1b66a drm/tegra: firewall: Check for is_addr_reg existence in IMM check 6f3614226430 gpu: host1x: Don't skip assigning syncpoints to channels 11d6f70f07b0 pinctrl: mediatek: Initialize variable *buf to zero 47a117028113 pinctrl: mediatek: Initialize variable pullen and pullup to zero b5b81fc1ac08 pinctrl: mediatek: fix coding style 58151b609821 pinctrl: bcm2835: Remove of_node_put() in bcm2835_of_gpio_ranges_fallback() 82943a0730e0 drm/msm/mdp5: Add check for kzalloc c7ee1772e3c3 drm/msm/dpu: Add check for pstates d4ba50614cb3 drm/msm/dpu: Add check for cstate f0e9f3e1d6c8 drm/msm: use strscpy instead of strncpy c9b6a75aae4d drm/msm/dsi: Allow 2 CTRLs on v2.5.0 ce9fedc3099e drm: exynos: dsi: Fix MIPI_DSI*_NO_* mode flags 3a40fd51e81e drm/mipi-dsi: Fix byte order of 16-bit DCS set/get brightness 15edaafbff75 drm/bridge: lt9611: pass a pointer to the of node 75b3c2777dbb drm/bridge: lt9611: fix clock calculation a2c196f05a30 drm/bridge: lt9611: fix programming of video modes 24e51dea9885 drm/bridge: lt9611: fix polarity programming 77ba2d294e16 drm/bridge: lt9611: fix HPD reenablement 1b5adc8752b0 drm/bridge: lt9611: fix sleep mode setup bf661c5e3bc4 drm/msm/dpu: Disallow unallocated resources to be returned 436fb91cadb8 drm/msm/gem: Add check for kmalloc 525c43e67d47 ALSA: hda/ca0132: minor fix for allocation size 399d01375659 drm/msm/adreno: Fix null ptr access in adreno_gpu_cleanup() e69f8e959b72 ASoC: fsl_sai: initialize is_dsp_mode flag 6fd4144985fc ASoC: fsl_sai: Update to modern clocking terminology d58b45bbbea8 scsi: qla2xxx: Fix exchange oversubscription for management commands 2232e689f9d9 scsi: qla2xxx: Fix exchange oversubscription 9b2aab3da463 scsi: qla2xxx: edif: Fix I/O timeout due to over-subscription 09af894bc3bd drm/msm: clean event_thread->worker in case of an error e76fbfdad503 drm/vc4: hdmi: Correct interlaced timings again 55f2645e4e12 drm/vc4: hvs: Fix colour order for xRGB1555 on HVS5 ae8b24e8289b drm/vc4: hvs: Set AXI panic modes 0f735f232ff5 pinctrl: rockchip: Fix refcount leak in rockchip_pinctrl_parse_groups af54707c0cca pinctrl: stm32: Fix refcount leak in stm32_pctrl_get_irq_domain b31ad2ecc4f7 pinctrl: qcom: pinctrl-msm8976: Correct function names for wcss pins 9a01ecc312e7 drm/msm/hdmi: Add missing check for alloc_ordered_workqueue 1721badebfc8 hwmon: (ftsteutates) Fix scaling of measurements 11226ab2f99f gpu: ipu-v3: common: Add of_node_put() for reference returned by of_graph_get_port_by_id() 262f8e5940c6 drm: tidss: Fix pixel format definition d2991e6b3002 drm/vc4: dpi: Fix format mapping for RGB565 8e04aaffb6de drm/vc4: dpi: Add option for inverting pixel clock and output enable 1f9836f95271 drm/vkms: Fix null-ptr-deref in vkms_release() bad13de76488 drm/vkms: Fix memory leak in vkms_init() 309e785bae07 drm/bridge: megachips: Fix error handling in i2c_register_driver() b02742255620 drm: mxsfb: DRM_MXSFB should depend on ARCH_MXS || ARCH_MXC da56b06f3828 drm/bridge: ti-sn65dsi83: Fix delay after reset deassert to match spec d72f8548a613 drm/fourcc: Add missing big-endian XRGB1555 and RGB565 formats d06e827a65a6 drm: Fix potential null-ptr-deref due to drmm_mode_config_init() 50c75e7ce64c sefltests: netdevsim: wait for devlink instance after netns removal 1a452b449a29 selftest: fib_tests: Always cleanup before exit 96cf406dea06 net: bcmgenet: fix MoCA LED control f6df58aa15f7 l2tp: Avoid possible recursive deadlock in l2tp_tunnel_register() f7854541b02e selftests/net: Interpret UDP_GRO cmsg data as an int value 75ee94229062 irqchip/irq-bcm7120-l2: Set IRQ_LEVEL for level triggered interrupts 3a413b05c66e irqchip/irq-brcmstb-l2: Set IRQ_LEVEL for level triggered interrupts 95ab0725c521 bpf: Fix global subprog context argument resolution logic bfc344d1e78c can: esd_usb: Move mislocated storage of SJA1000_ECC_SEG bits in case of a bus error f5aaf140ab1c thermal/drivers/hisi: Drop second sensor hi3660 2d20f9b6dd81 wifi: mac80211: make rate u32 in sta_set_rate_info_rx() 62ff301aa492 crypto: crypto4xx - Call dma_unmap_page when done 74fe2bf6746e ACPI: resource: Do IRQ override on all TongFang GMxRGxx b577d0bde456 ACPI: resource: Add IRQ overrides for MAINGEAR Vector Pro 2 models e0ae2d90bc0c selftests/bpf: Fix out-of-srctree build 15fe03e5dd05 wifi: mwifiex: fix loop iterator in mwifiex_update_ampdu_txwinsize() f15ef0ebcf56 wifi: iwl4965: Add missing check for create_singlethread_workqueue() 505c74c4c0b1 wifi: iwl3945: Add missing check for create_singlethread_workqueue 5ac2f1e3bbe6 RISC-V: time: initialize hrtimer based broadcast clock event device e97dd92c3611 m68k: /proc/hardware should depend on PROC_FS b677cb4f0b6b crypto: rsa-pkcs1pad - Use akcipher_request_complete 99e8e6fd70a1 rds: rds_rm_zerocopy_callback() correct order for list_add_tail() d7bd166859fe libbpf: Fix alen calculation in libbpf_nla_dump_errormsg() b8f6c28ce1cf s390/ap: fix status returned by ap_qact() 900a0c25a653 s390/ap: fix status returned by ap_aqic() 0e872b4da7c6 Bluetooth: hci_qca: get wakeup status from serdev device handle 31a288a4df7f Bluetooth: L2CAP: Fix potential user-after-free bf1b79d57e44 OPP: fix error checking in opp_migrate_dentry() db6efde0ab80 tap: tap_open(): correctly initialize socket uid 67f9f02928a3 tun: tun_chr_open(): correctly initialize socket uid a8353cfb4eec net: add sock_init_data_uid() 15a66714bf28 s390/vmem: fix empty page tables cleanup under KASAN 6ce9a22fc021 s390/mem_detect: fix detect_memory() error handling 856fc2195494 irqchip/ti-sci: Fix refcount leak in ti_sci_intr_irq_domain_probe 88cb93d3a16f irqchip/irq-mvebu-gicp: Fix refcount leak in mvebu_gicp_probe d6c66c468897 irqchip/alpine-msi: Fix refcount leak in alpine_msix_init_domains 4401b4858557 irqchip: Fix refcount leak in platform_irqchip_probe a7724a7c2236 net/mlx5: Enhance debug print in page allocation failure a25ff23ba2d7 mt76: mt7915: fix polling firmware-own status 9af6aa18b4e8 bpftool: profile online CPUs instead of possible 457139238f34 crypto: ccp - Flush the SEV-ES TMR memory before giving it to firmware 68c1cfd01332 crypto: ccp - Refactor out sev_fw_alloc() 13cb7851a5b1 leds: led-class: Add missing put_device() to led_put() 912eb10b6564 crypto: xts - Handle EBUSY correctly 55a7f88059c8 x86/microcode: Adjust late loading result reporting message 36b6fc833437 x86/microcode: Check CPU capabilities after late microcode update correctly de6e20f3f33e x86/microcode: Add a parameter to microcode_check() to store CPU capabilities a9e76b276b10 x86/microcode: Print previous version of microcode after reload 6d2b3a319144 x86/microcode: Default-disable late loading dce39c10d885 x86/microcode: Rip out the OLD_INTERFACE 54aa76ad5f01 x86: Mark stop_this_cpu() __noreturn e4de2b98c4bd powercap: fix possible name leak in powercap_register_zone() 36ec108b7bd7 crypto: seqiv - Handle EBUSY correctly 840a1d3b77c1 crypto: essiv - Handle EBUSY correctly 416eb7cc967d crypto: ccp - Failure on re-initialization due to duplicate sysfs filename 3496c1b3f500 ACPI: battery: Fix missing NUL-termination with large strings ac75c78f8f76 wifi: cfg80211: Fix extended KCK key length check in nl80211_set_rekey_data() 53c8a256e5d3 wifi: ath11k: Fix memory leak in ath11k_peer_rx_frag_setup 1af7eacfad45 wifi: ath9k: Fix potential stack-out-of-bounds write in ath9k_wmi_rsp_callback() 61490d271027 wifi: ath9k: hif_usb: clean up skbs if ath9k_hif_usb_rx_stream() fails f1cdbe94f728 ath9k: htc: clean up statistics macros 4adfc9eb8a45 ath9k: hif_usb: simplify if-if to if-else c0c0614f143b wifi: ath9k: htc_hst: free skb in ath9k_htc_rx_msg() if there is no callback function 88f6608c7ede wifi: orinoco: check return value of hermes_write_wordrec() 35fb0e275af1 wifi: rtl8xxxu: Fix memory leaks with RTL8723BU, RTL8192EU ae17414de71b thermal/drivers/tsens: limit num_sensors to 9 for msm8939 80726a391973 thermal/drivers/tsens: fix slope values for msm8939 e991430d2375 thermal/drivers/tsens: Sort out msm8976 vs msm8956 data df56f5265e73 thermal/drivers/tsens: Add compat string for the qcom,msm8960 21cb4e5700be thermal/drivers/tsens: Drop msm8976-specific defines 801d10065b8a ACPICA: nsrepair: handle cases without a return value correctly 0cf3af4de06a crypto: ccp - Avoid page allocation failure warning for SEV_GET_ID2 9ae0f82aa70b lib/mpi: Fix buffer overrun when SG is too long d215e32fe18a rcu-tasks: Fix synchronize_rcu_tasks() VS zap_pid_ns_processes() f7dc606a47d3 rcu-tasks: Remove preemption disablement around srcu_read_[un]lock() calls a0818534fb64 rcu-tasks: Improve comments explaining tasks_rcu_exit_srcu purpose bcaa8b8fc1f1 genirq: Fix the return type of kstat_cpu_irqs_sum() 4222cc9e7912 ACPICA: Drop port I/O validation for some regions 2b56df9102a8 crypto: x86/ghash - fix unaligned access in ghash_setkey() 4f47453c39f3 wifi: wl3501_cs: don't call kfree_skb() under spin_lock_irqsave() f19c9ed16294 wifi: libertas: cmdresp: don't call kfree_skb() under spin_lock_irqsave() b9294aedfb17 wifi: libertas: main: don't call kfree_skb() under spin_lock_irqsave() e9c889b0c458 wifi: libertas: if_usb: don't call kfree_skb() under spin_lock_irqsave() 068e986f2ba8 wifi: libertas_tf: don't call kfree_skb() under spin_lock_irqsave() ddb864ea9ca2 wifi: brcmfmac: unmap dma buffer in brcmf_msgbuf_alloc_pktid() e8ef89e5b89e wifi: brcmfmac: fix potential memory leak in brcmf_netdev_start_xmit() 5706d00fde3f wifi: wilc1000: fix potential memory leak in wilc_mac_xmit() 9424ea9d557e wifi: ipw2200: fix memory leak in ipw_wdev_init() 345692e96bb7 wifi: ipw2x00: don't call dev_kfree_skb() under spin_lock_irqsave() d78d85d84a44 libbpf: Fix btf__align_of() by taking into account field offsets 0c962dcd6bf6 wifi: rtlwifi: Fix global-out-of-bounds bug in _rtl8812ae_phy_set_txpower_limit() 507ad94346da wifi: rtl8xxxu: don't call dev_kfree_skb() under spin_lock_irqsave() 037f84c0bfae wifi: libertas: fix memory leak in lbs_init_adapter() 8722f96adece wifi: iwlegacy: common: don't call dev_kfree_skb() under spin_lock_irqsave() 53aa5137560a wifi: rtlwifi: rtl8723be: don't call kfree_skb() under spin_lock_irqsave() 993cd8cf5442 wifi: rtlwifi: rtl8188ee: don't call kfree_skb() under spin_lock_irqsave() 7d2cb8abaad7 wifi: rtlwifi: rtl8821ae: don't call kfree_skb() under spin_lock_irqsave() b56e60b3b158 wifi: rsi: Fix memory leak in rsi_coex_attach() 3d30678a59af block: bio-integrity: Copy flags when bio_integrity_payload is cloned cabad071ab17 arm64: dts: qcom: pmk8350: Use the correct PON compatible 0e12d7725d58 arm64: dts: qcom: pmk8350: Specify PBS register for PON 2936952fa626 KEYS: asymmetric: Fix ECDSA use via keyctl uapi a5fa5a41791c x86/perf/zhaoxin: Add stepping check for ZXC 2c36c390a749 sched/rt: pick_next_rt_entity(): check list_entry 3f191c2cc567 sched/deadline,rt: Remove unused parameter from pick_next_[rt|dl]_entity() 544a552be086 s390/dasd: Fix potential memleak in dasd_eckd_init() a00cf3619f19 arm64: dts: qcom: msm8992-lg-bullhead: Correct memory overlaps with the SMEM and MPSS memory regions 8173defc3635 blk-mq: correct stale comment of .get_budget 7dd5f83c1149 blk-mq: remove stale comment for blk_mq_sched_mark_restart_hctx 5eb99e7a80fc blk-mq: avoid sleep in blk_mq_alloc_request_hctx 20b9d7b4e0e6 arm64: dts: mediatek: mt7622: Add missing pwm-cells to pwm node 88022f659f63 arm64: dts: mt8192: Fix CPU map for single-cluster SoC 770e769834e1 ARM: dts: imx7s: correct iomuxc gpr mux controller cells 2fe22748d511 ARM: dts: sun8i: nanopi-duo2: Fix regulator GPIO reference 762c821b97a7 arm64: dts: meson: bananapi-m5: switch VDDIO_C pin to OPEN_DRAIN e29709ba5847 arm64: dts: renesas: beacon-renesom: Fix gpio expander reference 3f5ec3c335dd locking/rwsem: Disable preemption in all down_read*() and up_read() code paths ab4d47a343da locking/rwsem: Optimize down_read_trylock() under highly contended case ac0e5a181eff arm64: dts: amlogic: meson-sm1-odroid-hc4: fix active fan thermal trip f4891e5725a0 arm64: dts: amlogic: meson-gxbb-kii-pro: fix led node name 665bdfabec52 arm64: dts: amlogic: meson-gxl-s905d-phicomm-n1: fix led node name f0b5101a6432 arm64: dts: amlogic: meson-sm1-bananapi-m5: fix adc keys node names ae03ae3b6b93 arm64: dts: amlogic: meson-gx-libretech-pc: fix update button name 5be0df1849b6 arm64: dts: amlogic: meson-gxl: add missing unit address to eth-phy-mux node name 7a5b8cd5622b arm64: dts: amlogic: meson-gx: add missing unit address to rng node name 5c1ce648c6c3 arm64: dts: amlogic: meson-gxl-s905d-sml5442tw: drop invalid clock-names property d089142bcc73 arm64: dts: amlogic: meson-gx: add missing SCPI sensors compatible f562cc37f0f0 arm64: dts: amlogic: meson-axg: fix SCPI clock dvfs node name 334bb3461204 arm64: dts: amlogic: meson-gx: fix SCPI clock dvfs node name 88083a25d80a ARM: imx: Call ida_simple_remove() for ida_simple_get abfdfa339675 ARM: dts: exynos: correct wr-active property in Exynos3250 Rinato 70aac3c6b14d arm64: dts: ti: k3-j7200: Fix wakeup pinmux range c42defea2db0 ARM: s3c: fix s3c64xx_set_timer_source prototype af48760133f1 ARM: bcm2835_defconfig: Enable the framebuffer 37858e17e45e ARM: OMAP1: call platform_device_put() in error case in omap1_dm_timer_init() 89895442387d arm64: dts: meson: remove CPU opps below 1GHz for G12A boards 69c7a270357a arm64: dts: qcom: ipq8074: correct PCIe QMP PHY output clock names feb8c71f015d arm64: dts: qcom: ipq8074: fix Gen3 PCIe node 1563af0f28af arm64: dts: qcom: ipq8074: correct Gen2 PCIe ranges e88204931d9a arm64: dts: qcom: ipq8074: fix Gen3 PCIe QMP PHY d9df682bcea5 arm64: dts: qcom: ipq8074: fix PCIe PHY serdes size a55a645aa303 arm64: dts: qcom: Fix IPQ8074 PCIe PHY nodes dd3d021ae547 arm64: dts: qcom: ipq8074: correct USB3 QMP PHY-s clock output names 8a5d81afa6e1 arm64: dts: qcom: msm8992-bullhead: Disable dfps_data_mem 76e794cfd137 arm64: dts: qcom: msm8992-bullhead: Fix cont_splash_mem size 10c5fae6f99d arm64: dts: msm8992-bullhead: add memory hole region 410028a170f3 arm64: dts: meson-gx: Fix the SCPI DVFS node name and unit address a240ab41b3bc arm64: dts: meson-g12a: Fix internal Ethernet PHY unit name 472c333be2c2 arm64: dts: meson-gx: Fix Ethernet MAC address unit name b63bb187696c arm64: dts: qcom: sc7280: correct SPMI bus address cells 9e4063237957 arm64: dts: qcom: sc7180: correct SPMI bus address cells 6ca79943f5e3 arm64: dts: qcom: sdm845-db845c: fix audio codec interrupt pin name e192005e3f69 arm64: dts: mediatek: mt8183: Fix systimer 13 MHz clock description 1cc12d10d13a ARM: zynq: Fix refcount leak in zynq_early_slcr_init a1d42650cf29 arm64: dts: imx8m: Align SoC unique ID node unit address 61ecb2df6923 arm64: dts: qcom: sm6125: Reorder HSUSB PHY clocks to match bindings 738a716d2de6 arm64: dts: qcom: sm8150-kumano: Panel framebuffer is 2.5k instead of 4k a7d6e757169f arm64: dts: qcom: msm8996-tone: Fix USB taking 6 minutes to wake up 795a9a93ed8d arm64: dts: qcom: qcs404: use symbol names for PCIe resets 10fcdad2b9f3 ARM: OMAP2+: Fix memory leak in realtime_counter_init() e2f62d8302bb powerpc/mm: Rearrange if-else block to avoid clang warning 3959316f8ceb HID: asus: use spinlock to safely schedule workers d2ce7b6f3ae4 HID: asus: use spinlock to protect concurrent accesses Signed-off-by: Bruce Ashfield Signed-off-by: Richard Purdie (cherry picked from commit 7be1bc5ce77b31bb634bd3572d8553cad127f38e) Signed-off-by: Steve Sakoman --- .../linux/linux-yocto-rt_5.15.bb | 6 ++--- .../linux/linux-yocto-tiny_5.15.bb | 6 ++--- meta/recipes-kernel/linux/linux-yocto_5.15.bb | 26 +++++++++---------- 3 files changed, 19 insertions(+), 19 deletions(-) diff --git a/meta/recipes-kernel/linux/linux-yocto-rt_5.15.bb b/meta/recipes-kernel/linux/linux-yocto-rt_5.15.bb index b877c61797..943fda8c5f 100644 --- a/meta/recipes-kernel/linux/linux-yocto-rt_5.15.bb +++ b/meta/recipes-kernel/linux/linux-yocto-rt_5.15.bb @@ -14,13 +14,13 @@ python () { raise bb.parse.SkipRecipe("Set PREFERRED_PROVIDER_virtual/kernel to linux-yocto-rt to enable it") } -SRCREV_machine ?= "ce19518b87253279a0358d736d8e9a2cca908498" -SRCREV_meta ?= "674b6bbdc9cb7cfdbec5a0642a3cbef0ba1f738c" +SRCREV_machine ?= "e1ca9a177aff19013178aa30a8eccb4d7b2b67d7" +SRCREV_meta ?= "441f5fe00073620cec471166cf6e94c4ef9c69b2" SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;branch=${KBRANCH};name=machine \ git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-5.15;destsuffix=${KMETA}" -LINUX_VERSION ?= "5.15.98" +LINUX_VERSION ?= "5.15.103" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" diff --git a/meta/recipes-kernel/linux/linux-yocto-tiny_5.15.bb b/meta/recipes-kernel/linux/linux-yocto-tiny_5.15.bb index f250e62815..a3434fcca1 100644 --- a/meta/recipes-kernel/linux/linux-yocto-tiny_5.15.bb +++ b/meta/recipes-kernel/linux/linux-yocto-tiny_5.15.bb @@ -8,7 +8,7 @@ require recipes-kernel/linux/linux-yocto.inc # CVE exclusions include recipes-kernel/linux/cve-exclusion_5.15.inc -LINUX_VERSION ?= "5.15.98" +LINUX_VERSION ?= "5.15.103" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}" @@ -17,8 +17,8 @@ DEPENDS += "openssl-native util-linux-native" KMETA = "kernel-meta" KCONF_BSP_AUDIT_LEVEL = "2" -SRCREV_machine ?= "c5c318ab79b57628d2046185821db1d0eb89df20" -SRCREV_meta ?= "674b6bbdc9cb7cfdbec5a0642a3cbef0ba1f738c" +SRCREV_machine ?= "4ae6c9a73f4e6e356186a541e3fcbea4fa6a09f1" +SRCREV_meta ?= "441f5fe00073620cec471166cf6e94c4ef9c69b2" PV = "${LINUX_VERSION}+git${SRCPV}" diff --git a/meta/recipes-kernel/linux/linux-yocto_5.15.bb b/meta/recipes-kernel/linux/linux-yocto_5.15.bb index 5f83d62e46..4b23b2853d 100644 --- a/meta/recipes-kernel/linux/linux-yocto_5.15.bb +++ b/meta/recipes-kernel/linux/linux-yocto_5.15.bb @@ -16,24 +16,24 @@ KBRANCH:qemux86 ?= "v5.15/standard/base" KBRANCH:qemux86-64 ?= "v5.15/standard/base" KBRANCH:qemumips64 ?= "v5.15/standard/mti-malta64" -SRCREV_machine:qemuarm ?= "21e0bbe305e7dbcd73a3b8695084f0cc3334f4ee" -SRCREV_machine:qemuarm64 ?= "574058afde6aba973ebe024686c2e609b9703bbb" -SRCREV_machine:qemumips ?= "80b8c24fa8e87f562cb558662e0c9c8f036aa389" -SRCREV_machine:qemuppc ?= "3263f7de77ed4245e3802e19e7aded24fe957f30" -SRCREV_machine:qemuriscv64 ?= "99700bd79a36b1a0cea28fd65921b5973970fc88" -SRCREV_machine:qemuriscv32 ?= "99700bd79a36b1a0cea28fd65921b5973970fc88" -SRCREV_machine:qemux86 ?= "99700bd79a36b1a0cea28fd65921b5973970fc88" -SRCREV_machine:qemux86-64 ?= "99700bd79a36b1a0cea28fd65921b5973970fc88" -SRCREV_machine:qemumips64 ?= "ad9994f20f03947ef32a18e9cc86b13d37548010" -SRCREV_machine ?= "99700bd79a36b1a0cea28fd65921b5973970fc88" -SRCREV_meta ?= "674b6bbdc9cb7cfdbec5a0642a3cbef0ba1f738c" +SRCREV_machine:qemuarm ?= "21687086c27bb112f19b0aac455d800961c0b830" +SRCREV_machine:qemuarm64 ?= "7144f86a73fe2ffe4fe57c9e6cf28d8fc8db4b6a" +SRCREV_machine:qemumips ?= "557c06060cb218ade536fccc66f8f3e755537f31" +SRCREV_machine:qemuppc ?= "db19dbdcdf51b9d2a071dcf180ba9e20b8286e9b" +SRCREV_machine:qemuriscv64 ?= "024d08fb706170a9723e9751e505681f9d4c7ab6" +SRCREV_machine:qemuriscv32 ?= "024d08fb706170a9723e9751e505681f9d4c7ab6" +SRCREV_machine:qemux86 ?= "024d08fb706170a9723e9751e505681f9d4c7ab6" +SRCREV_machine:qemux86-64 ?= "024d08fb706170a9723e9751e505681f9d4c7ab6" +SRCREV_machine:qemumips64 ?= "6f1dbe8c258d49f4dba59827124dfe9aa2c151db" +SRCREV_machine ?= "024d08fb706170a9723e9751e505681f9d4c7ab6" +SRCREV_meta ?= "441f5fe00073620cec471166cf6e94c4ef9c69b2" # set your preferred provider of linux-yocto to 'linux-yocto-upstream', and you'll # get the /base branch, which is pure upstream -stable, and the same # meta SRCREV as the linux-yocto-standard builds. Select your version using the # normal PREFERRED_VERSION settings. BBCLASSEXTEND = "devupstream:target" -SRCREV_machine:class-devupstream ?= "d9b4a0c83a2d405dd85bf32d672686146b9bedff" +SRCREV_machine:class-devupstream ?= "8020ae3c051d1c9ec7b7a872e226f9720547649b" PN:class-devupstream = "linux-yocto-upstream" KBRANCH:class-devupstream = "v5.15/base" @@ -41,7 +41,7 @@ SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;name=machine;branch=${KBRA git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-5.15;destsuffix=${KMETA}" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" -LINUX_VERSION ?= "5.15.98" +LINUX_VERSION ?= "5.15.103" DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}" DEPENDS += "openssl-native util-linux-native" From patchwork Thu Mar 30 21:13:49 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 21962 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 03937C7619A for ; Thu, 30 Mar 2023 21:14:24 +0000 (UTC) Received: from mail-pj1-f46.google.com (mail-pj1-f46.google.com [209.85.216.46]) by mx.groups.io with SMTP id smtpd.web10.38934.1680210861955668362 for ; Thu, 30 Mar 2023 14:14:22 -0700 Authentication-Results: mx.groups.io; dkim=fail reason="signature has expired" header.i=@sakoman-com.20210112.gappssmtp.com header.s=20210112 header.b=SlU9FBZS; spf=softfail (domain: sakoman.com, ip: 209.85.216.46, mailfrom: steve@sakoman.com) Received: by mail-pj1-f46.google.com with SMTP id x15so18507795pjk.2 for ; Thu, 30 Mar 2023 14:14:21 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20210112.gappssmtp.com; s=20210112; t=1680210861; x=1682802861; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=H1Uzy6D8rTNuVpmksr7+Lr7nWWzmf8PYBvddCLsTE4s=; b=SlU9FBZSJHxf8wLAobjKWhIVEkzk35oudh2/70grUe596FsWqFT05eS/B2FZNLh4Nd ooY4h1/PnW1Pt2GJ2GeOzs/t9SgFKpbMOX41uSYU8JS2hezq/ES0dCBtxZ5g5Jc4t0+k kuG0htPV/nHtoTb0vaQqtS+g9BlUzmTwO3ANfZrjOcw/Do+GW/u32AVYcdpyyFLCUoQB cbKskkPuSTT/nNUEklluV2MK4t26PG6eDU/9I7O1CriRK9sF+G6kqvF8y3X5asS3VHCZ uBMUfq74M7skE43jlbLLX8NLV+vREsiBH+2hdatT+6qzTQuRx048H34BG0StPm7LLIZR BOig== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; t=1680210861; x=1682802861; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=H1Uzy6D8rTNuVpmksr7+Lr7nWWzmf8PYBvddCLsTE4s=; b=tF8bmCaMMfNzoNA/3qmUc/dJY0Gb3s4I16nx0u0CfEOztzfNhzsOY9glvltWNdb3wZ 92/3PNoRMyAcA6nnpTTKrdRH9/bpRnWJzSXwimhAeqJy0jhALPYRcicjuJVyw53UYVEI XB9qkNr2UJ8FfbgFvG/bgwswbI8MNlWxV73vjNI2c5uk8YKFM7F4urVhmgQGe9ngPCGl JKur50kIsl0A1HiCnS1I34vun4J2miBug2duq8/kBYO992hGfQgpkYnoGyRLweOwONfL EBPk+kn1X+taTAIkpwOgE7bO+cYrl93xEWN40u92ZqItdozWxz3DJ73KtiXG7HiPCKkt kq/Q== X-Gm-Message-State: AAQBX9eZlUO18qA0KI3mVwXVqepYEx8mtSNpALyHrqPMG3y87Aq62gmU H1xq8LdSBz+wd6vpKKaAOiQx6hmndbFeUG8d69w= X-Google-Smtp-Source: AKy350bGJkLNuIQLNyUhkwJfooqEiQ9kh2pzR2fbqXl7JRucQTa8etwOsa+fpMe1u42DEGD1O/UWKA== X-Received: by 2002:a17:90b:4d11:b0:23f:e32:7e62 with SMTP id mw17-20020a17090b4d1100b0023f0e327e62mr29542665pjb.12.1680210860875; Thu, 30 Mar 2023 14:14:20 -0700 (PDT) Received: from hexa.router0800d9.com (dhcp-72-253-4-112.hawaiiantel.net. [72.253.4.112]) by smtp.gmail.com with ESMTPSA id c30-20020a631c1e000000b0050301521335sm250661pgc.11.2023.03.30.14.14.19 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 30 Mar 2023 14:14:20 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][langdale 07/14] lttng-modules: update to v2.13.9 Date: Thu, 30 Mar 2023 11:13:49 -1000 Message-Id: <28c844143b6f32313f15a2f1bb31dda4fd680714.1680210378.git.steve@sakoman.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 30 Mar 2023 21:14:24 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/179366 From: Bruce Ashfield Bumping lttng-modules to version v2.13.9-4-g12f43cab, which comprises the following commits: da1f5a26 Version 2.13.9 dc2d1294 fix: jbd2: use the correct print format (v5.4.229) d04c1211 fix: jbd2 upper bound for v5.10.163 4b8864fc fix: jbd2: use the correct print format (v5.10.163) 69d3aa79 fix: btrfs: move accessor helpers into accessors.h (v6.2) We drop our previously backported commits as well, since they are part of the release. Signed-off-by: Bruce Ashfield Signed-off-by: Alexandre Belloni Signed-off-by: Richard Purdie (cherry picked from commit 79d8e93adde07ff3a4a239d66649ee566a2437d6) Signed-off-by: Steve Sakoman --- ...ccessor-helpers-into-accessors.h-v6..patch | 45 -------------- .../fix-jbd2-upper-bound-for-v5.10.163.patch | 52 ---------------- ...e-the-correct-print-format-v5.10.163.patch | 61 ------------------- ...ules_2.13.8.bb => lttng-modules_2.13.9.bb} | 5 +- 4 files changed, 1 insertion(+), 162 deletions(-) delete mode 100644 meta/recipes-kernel/lttng/lttng-modules/0001-fix-btrfs-move-accessor-helpers-into-accessors.h-v6..patch delete mode 100644 meta/recipes-kernel/lttng/lttng-modules/fix-jbd2-upper-bound-for-v5.10.163.patch delete mode 100644 meta/recipes-kernel/lttng/lttng-modules/fix-jbd2-use-the-correct-print-format-v5.10.163.patch rename meta/recipes-kernel/lttng/{lttng-modules_2.13.8.bb => lttng-modules_2.13.9.bb} (83%) diff --git a/meta/recipes-kernel/lttng/lttng-modules/0001-fix-btrfs-move-accessor-helpers-into-accessors.h-v6..patch b/meta/recipes-kernel/lttng/lttng-modules/0001-fix-btrfs-move-accessor-helpers-into-accessors.h-v6..patch deleted file mode 100644 index 26ae605b31..0000000000 --- a/meta/recipes-kernel/lttng/lttng-modules/0001-fix-btrfs-move-accessor-helpers-into-accessors.h-v6..patch +++ /dev/null @@ -1,45 +0,0 @@ -From 69d3aa79a641f539cfd5c11b46b2dd9b4df9b0f0 Mon Sep 17 00:00:00 2001 -From: Michael Jeanson -Date: Mon, 16 Jan 2023 15:01:51 -0500 -Subject: [PATCH] fix: btrfs: move accessor helpers into accessors.h (v6.2) - -See upstream commit : - - commit 07e81dc94474eb62705c6f96d9ab1a5a797b8703 - Author: Josef Bacik - Date: Wed Oct 19 10:51:00 2022 -0400 - - btrfs: move accessor helpers into accessors.h - - This is a large patch, but because they're all macros it's impossible to - split up. Simply copy all of the item accessors in ctree.h and paste - them in accessors.h, and then update any files to include the header so - everything compiles. - -Upstream-Status: Backport - -Change-Id: I1f0876dd8b7a8687f6802b60c3e3baabd017cc52 -Signed-off-by: Michael Jeanson -Signed-off-by: Mathieu Desnoyers ---- - include/instrumentation/events/btrfs.h | 4 ++++ - 1 file changed, 4 insertions(+) - -diff --git a/include/instrumentation/events/btrfs.h b/include/instrumentation/events/btrfs.h -index 785f16ac..01157107 100644 ---- a/include/instrumentation/events/btrfs.h -+++ b/include/instrumentation/events/btrfs.h -@@ -9,6 +9,10 @@ - #include - #include - -+#if (LTTNG_LINUX_VERSION_CODE >= LTTNG_KERNEL_VERSION(6,2,0)) -+#include <../fs/btrfs/accessors.h> -+#endif -+ - #ifndef _TRACE_BTRFS_DEF_ - #define _TRACE_BTRFS_DEF_ - struct btrfs_root; --- -2.34.1 - diff --git a/meta/recipes-kernel/lttng/lttng-modules/fix-jbd2-upper-bound-for-v5.10.163.patch b/meta/recipes-kernel/lttng/lttng-modules/fix-jbd2-upper-bound-for-v5.10.163.patch deleted file mode 100644 index bfc49294b0..0000000000 --- a/meta/recipes-kernel/lttng/lttng-modules/fix-jbd2-upper-bound-for-v5.10.163.patch +++ /dev/null @@ -1,52 +0,0 @@ -From 4fd2615b87b3cac0fd5bdc5fc82db05f6fcfdecf Mon Sep 17 00:00:00 2001 -From: Michael Jeanson -Date: Tue, 17 Jan 2023 12:16:04 -0500 -Subject: [PATCH] fix: jbd2 upper bound for v5.10.163 - -Use the correct upper bound of 5,11,0. - -Change-Id: I435b44b940c7346ed8c3ef0d445365ed156702d0 -Signed-off-by: Michael Jeanson -Signed-off-by: Mathieu Desnoyers - -Upstream-Status: Backport -Signed-off-by: Armin Kuster - ---- - include/instrumentation/events/jbd2.h | 6 +++--- - 1 file changed, 3 insertions(+), 3 deletions(-) - -diff --git a/include/instrumentation/events/jbd2.h b/include/instrumentation/events/jbd2.h -index f7993511..9b77ab92 100644 ---- a/include/instrumentation/events/jbd2.h -+++ b/include/instrumentation/events/jbd2.h -@@ -28,7 +28,7 @@ LTTNG_TRACEPOINT_EVENT(jbd2_checkpoint, - ) - - #if (LTTNG_LINUX_VERSION_CODE >= LTTNG_KERNEL_VERSION(6,2,0) \ -- || LTTNG_KERNEL_RANGE(5,10,163, 6,0,0) \ -+ || LTTNG_KERNEL_RANGE(5,10,163, 5,11,0) \ - || LTTNG_KERNEL_RANGE(5,15,87, 5,16,0) \ - || LTTNG_KERNEL_RANGE(6,0,18, 6,1,0) \ - || LTTNG_KERNEL_RANGE(6,1,4, 6,2,0)) -@@ -97,7 +97,7 @@ LTTNG_TRACEPOINT_EVENT_INSTANCE(jbd2_commit, jbd2_drop_transaction, - #endif - - #if (LTTNG_LINUX_VERSION_CODE >= LTTNG_KERNEL_VERSION(6,2,0) \ -- || LTTNG_KERNEL_RANGE(5,10,163, 6,0,0) \ -+ || LTTNG_KERNEL_RANGE(5,10,163, 5,11,0) \ - || LTTNG_KERNEL_RANGE(5,15,87, 5,16,0) \ - || LTTNG_KERNEL_RANGE(6,0,18, 6,1,0) \ - || LTTNG_KERNEL_RANGE(6,1,4, 6,2,0)) -@@ -140,7 +140,7 @@ LTTNG_TRACEPOINT_EVENT(jbd2_submit_inode_data, - ) - - #if (LTTNG_LINUX_VERSION_CODE >= LTTNG_KERNEL_VERSION(6,2,0) \ -- || LTTNG_KERNEL_RANGE(5,10,163, 6,0,0) \ -+ || LTTNG_KERNEL_RANGE(5,10,163, 5,11,0) \ - || LTTNG_KERNEL_RANGE(5,15,87, 5,16,0) \ - || LTTNG_KERNEL_RANGE(6,0,18, 6,1,0) \ - || LTTNG_KERNEL_RANGE(6,1,4, 6,2,0)) --- -2.35.4 - diff --git a/meta/recipes-kernel/lttng/lttng-modules/fix-jbd2-use-the-correct-print-format-v5.10.163.patch b/meta/recipes-kernel/lttng/lttng-modules/fix-jbd2-use-the-correct-print-format-v5.10.163.patch deleted file mode 100644 index 8067cffaab..0000000000 --- a/meta/recipes-kernel/lttng/lttng-modules/fix-jbd2-use-the-correct-print-format-v5.10.163.patch +++ /dev/null @@ -1,61 +0,0 @@ -From dd7be14bd04c1de309ba267097b03a308da87dae Mon Sep 17 00:00:00 2001 -From: Michael Jeanson -Date: Tue, 17 Jan 2023 11:03:12 -0500 -Subject: [PATCH] fix: jbd2: use the correct print format (v5.10.163) - -See upstream commit : - - commit d87a7b4c77a997d5388566dd511ca8e6b8e8a0a8 - Author: Bixuan Cui - Date: Tue Oct 11 19:33:44 2022 +0800 - - jbd2: use the correct print format - - The print format error was found when using ftrace event: - <...>-1406 [000] .... 23599442.895823: jbd2_end_commit: dev 252,8 transaction -1866216965 sync 0 head -1866217368 - <...>-1406 [000] .... 23599442.896299: jbd2_start_commit: dev 252,8 transaction -1866216964 sync 0 - - Use the correct print format for transaction, head and tid. - -Change-Id: I7601f5cbb86495c2607be7b11e02724c90b3ebf9 -Signed-off-by: Michael Jeanson -Signed-off-by: Mathieu Desnoyers - -Upstream-Status: Backport -Signed-off-by: Armin Kuster - ---- - include/instrumentation/events/jbd2.h | 3 +++ - 1 file changed, 3 insertions(+) - -diff --git a/include/instrumentation/events/jbd2.h b/include/instrumentation/events/jbd2.h -index d5d8ea0c..f7993511 100644 ---- a/include/instrumentation/events/jbd2.h -+++ b/include/instrumentation/events/jbd2.h -@@ -28,6 +28,7 @@ LTTNG_TRACEPOINT_EVENT(jbd2_checkpoint, - ) - - #if (LTTNG_LINUX_VERSION_CODE >= LTTNG_KERNEL_VERSION(6,2,0) \ -+ || LTTNG_KERNEL_RANGE(5,10,163, 6,0,0) \ - || LTTNG_KERNEL_RANGE(5,15,87, 5,16,0) \ - || LTTNG_KERNEL_RANGE(6,0,18, 6,1,0) \ - || LTTNG_KERNEL_RANGE(6,1,4, 6,2,0)) -@@ -96,6 +97,7 @@ LTTNG_TRACEPOINT_EVENT_INSTANCE(jbd2_commit, jbd2_drop_transaction, - #endif - - #if (LTTNG_LINUX_VERSION_CODE >= LTTNG_KERNEL_VERSION(6,2,0) \ -+ || LTTNG_KERNEL_RANGE(5,10,163, 6,0,0) \ - || LTTNG_KERNEL_RANGE(5,15,87, 5,16,0) \ - || LTTNG_KERNEL_RANGE(6,0,18, 6,1,0) \ - || LTTNG_KERNEL_RANGE(6,1,4, 6,2,0)) -@@ -138,6 +140,7 @@ LTTNG_TRACEPOINT_EVENT(jbd2_submit_inode_data, - ) - - #if (LTTNG_LINUX_VERSION_CODE >= LTTNG_KERNEL_VERSION(6,2,0) \ -+ || LTTNG_KERNEL_RANGE(5,10,163, 6,0,0) \ - || LTTNG_KERNEL_RANGE(5,15,87, 5,16,0) \ - || LTTNG_KERNEL_RANGE(6,0,18, 6,1,0) \ - || LTTNG_KERNEL_RANGE(6,1,4, 6,2,0)) --- -2.35.4 - diff --git a/meta/recipes-kernel/lttng/lttng-modules_2.13.8.bb b/meta/recipes-kernel/lttng/lttng-modules_2.13.9.bb similarity index 83% rename from meta/recipes-kernel/lttng/lttng-modules_2.13.8.bb rename to meta/recipes-kernel/lttng/lttng-modules_2.13.9.bb index c04796be16..a08386b053 100644 --- a/meta/recipes-kernel/lttng/lttng-modules_2.13.8.bb +++ b/meta/recipes-kernel/lttng/lttng-modules_2.13.9.bb @@ -11,15 +11,12 @@ include lttng-platforms.inc SRC_URI = "https://lttng.org/files/${BPN}/${BPN}-${PV}.tar.bz2 \ file://0009-Rename-genhd-wrapper-to-blkdev.patch \ - file://fix-jbd2-use-the-correct-print-format-v5.10.163.patch \ - file://fix-jbd2-upper-bound-for-v5.10.163.patch \ - file://0001-fix-btrfs-move-accessor-helpers-into-accessors.h-v6..patch \ " # Use :append here so that the patch is applied also when using devupstream SRC_URI:append = " file://0001-src-Kbuild-change-missing-CONFIG_TRACEPOINTS-to-warn.patch" -SRC_URI[sha256sum] = "f525d3d48ea3a475cb535339c201666d0e4c75ec8c46d29837bcf381ea02cb19" +SRC_URI[sha256sum] = "bf808b113544287cfe837a6382887fa66354ef5cc8216460cebbef3d27dc3581" export INSTALL_MOD_DIR="kernel/lttng-modules" From patchwork Thu Mar 30 21:13:50 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 21958 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id E05E2C6FD1D for ; Thu, 30 Mar 2023 21:14:23 +0000 (UTC) Received: from mail-pj1-f41.google.com (mail-pj1-f41.google.com [209.85.216.41]) by mx.groups.io with SMTP id smtpd.web11.38972.1680210856428173993 for ; Thu, 30 Mar 2023 14:14:23 -0700 Authentication-Results: mx.groups.io; dkim=fail reason="signature has expired" header.i=@sakoman-com.20210112.gappssmtp.com header.s=20210112 header.b=ylGA8Q/l; spf=softfail (domain: sakoman.com, ip: 209.85.216.41, mailfrom: steve@sakoman.com) Received: by mail-pj1-f41.google.com with SMTP id c4so2487062pjs.4 for ; Thu, 30 Mar 2023 14:14:23 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20210112.gappssmtp.com; s=20210112; t=1680210862; x=1682802862; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=KENU/j2xG3Vsdx0K29hF7OQSXyG13AHFi76Y2uXhO2Q=; b=ylGA8Q/l2HR/yhaK3qQ5Tm+hj64YrhNR33hJltaJuQm4pEQexHELt3gHTfdm3iEri8 I+qJSIlcN3/CipxDBrFNG/C51uTiaT+XZ672akU4yKRhSfRK325I+4oW5XEtFHFcg1N0 vkxJJFkeXDsIbmdPhEGTBWR4Nqvqh/LU5wAgkdG5clNeiU/Sy1iKtvEKP4BeMi7jUOyo ScY2hNlNcIVX2oDaOYOkQHY2Sr3h0ENuPL7ehuV706nS8zNxRlZliDjQb8HJlzsJetdc R7mE+ALOuq3mAuoWYA+xNuAFE7C/joBmtTxBFtiaJCBXGURuSlIM5JYuUoJSJ7rOESYg VXMg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; t=1680210862; x=1682802862; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=KENU/j2xG3Vsdx0K29hF7OQSXyG13AHFi76Y2uXhO2Q=; b=7KjtGEjfr9fqDFpCEmHZpVO4ORrlGrOvnQ8gxjC4EQcCMOMA2EmiiDrhNwC176E4lA fBX9b2vmlG9hv0PyZ5h72o8bYpw/tMmC6Up14KaXvLwNw2uo+h9u1/qii3fsM2WmIjHV CCKSqutUMMst6Z2WkGbYwsljOqjvP+vL2+VrChG0twMbKPoA8hNzcXHCO+nLnMtzE60M oJYLi8murOlAzqS+fh8dBcTpoLWJCfjnfaAThYaiYfEi+aWYIO+E3qVMnkBgyD5SpRvu 3UR0BPZVnFRolKn1Ysf36T2VUY5x1LBO26i6Wzh+vXUd4B6YkVhcm/wz6o+LehN5XhBp IGPA== X-Gm-Message-State: AO0yUKXqGyhjMzyXxQyKAG6Td8/IzpAwyk1OfhCR3bip4/zxrLnz3yMJ 0fiRSYsm0wFu4xEkbCRGPeJw6xW3+lNGDZiFChI= X-Google-Smtp-Source: AK7set8lIC4Rec5OulXsZ0fwzkoacF+P+KnIRzYtMv0Y5vabgY8GIV7kiABjCDVZqPlfym8rwUIGCQ== X-Received: by 2002:a05:6a20:be29:b0:d4:2ce:8c6e with SMTP id ge41-20020a056a20be2900b000d402ce8c6emr19114237pzb.47.1680210862537; Thu, 30 Mar 2023 14:14:22 -0700 (PDT) Received: from hexa.router0800d9.com (dhcp-72-253-4-112.hawaiiantel.net. [72.253.4.112]) by smtp.gmail.com with ESMTPSA id c30-20020a631c1e000000b0050301521335sm250661pgc.11.2023.03.30.14.14.21 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 30 Mar 2023 14:14:22 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][langdale 08/14] vim: upgrade 9.0.1403 -> 9.0.1429 Date: Thu, 30 Mar 2023 11:13:50 -1000 Message-Id: <5b866019573b99306e32ea5734015040c9ed3868.1680210378.git.steve@sakoman.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 30 Mar 2023 21:14:23 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/179367 From: Randy MacLeod Fixes: CVE-2023-1127, CVE-2023-1170, CVE-2023-1175, CVE-2023-1264, CVE-2023-1355 Signed-off-by: Randy MacLeod Signed-off-by: Alexandre Belloni (cherry picked from commit 2415072c3800feb164dd4d1fa0b56bd141a5cbd8) Signed-off-by: Steve Sakoman --- meta/recipes-support/vim/vim.inc | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/meta/recipes-support/vim/vim.inc b/meta/recipes-support/vim/vim.inc index 42a2ba46b8..1e27415288 100644 --- a/meta/recipes-support/vim/vim.inc +++ b/meta/recipes-support/vim/vim.inc @@ -19,8 +19,8 @@ SRC_URI = "git://github.com/vim/vim.git;branch=master;protocol=https \ file://no-path-adjust.patch \ " -PV .= ".1403" -SRCREV = "e764d1b4219e6615a04df1c3a6a5c0210a0a7dac" +PV .= ".1429" +SRCREV = "1a08a3e2a584889f19b84a27672134649b73da58" # Remove when 8.3 is out UPSTREAM_VERSION_UNKNOWN = "1" From patchwork Thu Mar 30 21:13:51 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 21964 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id D502AC7619A for ; Thu, 30 Mar 2023 21:14:33 +0000 (UTC) Received: from mail-pg1-f171.google.com (mail-pg1-f171.google.com [209.85.215.171]) by mx.groups.io with SMTP id smtpd.web10.38936.1680210865224618909 for ; Thu, 30 Mar 2023 14:14:25 -0700 Authentication-Results: mx.groups.io; dkim=fail reason="signature has expired" header.i=@sakoman-com.20210112.gappssmtp.com header.s=20210112 header.b=y/W9p+UC; spf=softfail (domain: sakoman.com, ip: 209.85.215.171, mailfrom: steve@sakoman.com) Received: by mail-pg1-f171.google.com with SMTP id d10so12192112pgt.12 for ; Thu, 30 Mar 2023 14:14:25 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20210112.gappssmtp.com; s=20210112; t=1680210864; x=1682802864; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=LClND6+2qpo+ODzkkORkw+IMqGh96VJVoDABgpDuvsk=; b=y/W9p+UCWHEUUSga68gZs5fdj6he6o6uN2lP5IssaMTyGAc4sJP226IwRTk8x4kxSf zN8gs88qYT/5quEHRMmpGc5DPosjhmiRAllspUV7aJ7dCDKDCfk/FMjbHImuykwPBNYD bkQlqnrTmJ1pcHbC0BVQByxiOkDI0xmIG+pNSfutZLnkk1t4b1KV+Js07S6Y+49bdqwX 1fnrUEWdXKGeZHBLACtfuzzE13pxf6dl1GkXi2NBxG1NQHIopp21HI13/1q1IC5xYTpN 76yMAtcEStC1/MNavAnIo97HPLiKmYUzgHvoMy5D1JvBMVQnlKDSJwMk3HBdlDYuyOT+ AcSw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; t=1680210864; x=1682802864; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=LClND6+2qpo+ODzkkORkw+IMqGh96VJVoDABgpDuvsk=; b=a8u+shfyE4aMiHUIiT39N82q9lg6bAVOIqDnboYuzW6E1n+xHOqZX3tdAvJ/pmM8Hr 1mQw9rtnBSj2OYujsx6ATdGnGelClSriaEAWSeZClWVQfi3I/TTyLje3sJxW83LSUBRH W2ZojW51dBz3T1CgiZDPdK6ZrtzryhIeHg93NT9bQheY+4EKbmI5h+vob8cFKpiVSGdg ADdAitQ4f+WCDT5qonA4GIXDNQc7O38SXvvxPwfuojK34JXobUH+FWHgeEmsNzVgYvFO tPq3z0V5n3I//TYC9MSyXPZxLo5wCldQoKzPsBYMU0BimtInn7U8y3MeLTxzH9AhZ3q8 +kyg== X-Gm-Message-State: AAQBX9ewUV+9lNTlJK4UwJ6f0peAqMgXtyS2lP1YxV2nGhrg29MdlVo5 jJWN0CK22BoznxA95euESjcFayvi0hWyVGPK1s4= X-Google-Smtp-Source: AKy350arUVheROjySYCX5NH/eXfY3YiK9XU7GfAmhQMOokczzBqfsDAgV+XnxcJWr3sKwHliUI6TzA== X-Received: by 2002:aa7:98d2:0:b0:627:f0e5:6ea5 with SMTP id e18-20020aa798d2000000b00627f0e56ea5mr24045622pfm.7.1680210864229; Thu, 30 Mar 2023 14:14:24 -0700 (PDT) Received: from hexa.router0800d9.com (dhcp-72-253-4-112.hawaiiantel.net. [72.253.4.112]) by smtp.gmail.com with ESMTPSA id c30-20020a631c1e000000b0050301521335sm250661pgc.11.2023.03.30.14.14.23 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 30 Mar 2023 14:14:23 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][langdale 09/14] kernel-devsrc: fix mismatched compiler warning Date: Thu, 30 Mar 2023 11:13:51 -1000 Message-Id: X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 30 Mar 2023 21:14:33 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/179368 From: Bruce Ashfield When building a module on target, we use the native compiler (always "gcc") versus the same compiler, but named in a cross compiler manner, for the kernel build. The kernel captures the compiler string in several places, some of which we are already fixing, but others we are not (as they don't cause issues). But when building an on target module, the main kernel Makefile compares compiler strings and outputs a warning similar to: warning: the compiler differs from the one used to build the kernel The kernel was built by: x86_64-poky-linux-gcc (GCC) 11.3.0 You are using: gcc (GCC) 11.3.0 We drop the cross compilation prefix from the captured compiler string, and we avoid the warning. RP: tweaked one sed expression to fix quoting issue with 5.15 Signed-off-by: Bruce Ashfield Signed-off-by: Richard Purdie (cherry picked from commit 70419f281a4571d01975bd79a47a6ed7ae70b1ae) Signed-off-by: Steve Sakoman --- meta/recipes-kernel/linux/kernel-devsrc.bb | 7 +++++++ 1 file changed, 7 insertions(+) diff --git a/meta/recipes-kernel/linux/kernel-devsrc.bb b/meta/recipes-kernel/linux/kernel-devsrc.bb index 46d706b955..17ae744d0d 100644 --- a/meta/recipes-kernel/linux/kernel-devsrc.bb +++ b/meta/recipes-kernel/linux/kernel-devsrc.bb @@ -308,6 +308,13 @@ do_install() { # external modules can be built touch -r $kerneldir/build/Makefile $kerneldir/build/include/generated/uapi/linux/version.h + # This fixes a warning that the compilers don't match when building a module + # Change: CONFIG_CC_VERSION_TEXT="x86_64-poky-linux-gcc (GCC) 12.2.0" to "gcc (GCC) 12.2.0" + # #define CONFIG_CC_VERSION_TEXT "x86_64-poky-linux-gcc (GCC) 12.2.0" to "gcc (GCC) 12.2.0" + sed -i 's/CONFIG_CC_VERSION_TEXT=".*\(gcc.*\)"/CONFIG_CC_VERSION_TEXT="\1"/' "$kerneldir/build/.config" + sed -i 's/#define CONFIG_CC_VERSION_TEXT ".*\(gcc.*\)"/#define CONFIG_CC_VERSION_TEXT "\1"/' $kerneldir/build/include/generated/autoconf.h + sed -i 's/CONFIG_CC_VERSION_TEXT=".*\(gcc.*\)"/CONFIG_CC_VERSION_TEXT="\1"/' $kerneldir/build/include/config/auto.conf + # make sure these are at least as old as the .config, or rebuilds will trigger touch -r $kerneldir/build/.config $kerneldir/build/include/generated/autoconf.h 2>/dev/null || : touch -r $kerneldir/build/.config $kerneldir/build/include/config/auto.conf* 2>/dev/null || : From patchwork Thu Mar 30 21:13:52 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 21968 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id E2F39C77B6D for ; Thu, 30 Mar 2023 21:14:33 +0000 (UTC) Received: from mail-pl1-f169.google.com (mail-pl1-f169.google.com [209.85.214.169]) by mx.groups.io with SMTP id smtpd.web11.38978.1680210866986904883 for ; Thu, 30 Mar 2023 14:14:27 -0700 Authentication-Results: mx.groups.io; dkim=fail reason="signature has expired" header.i=@sakoman-com.20210112.gappssmtp.com header.s=20210112 header.b=6e76ci7d; spf=softfail (domain: sakoman.com, ip: 209.85.214.169, mailfrom: steve@sakoman.com) Received: by mail-pl1-f169.google.com with SMTP id o11so19393073ple.1 for ; Thu, 30 Mar 2023 14:14:26 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20210112.gappssmtp.com; s=20210112; t=1680210866; x=1682802866; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=uYGsAVetNv1WCsX5k+luhaCwvE5bJU7ER+kr0Zpa1D0=; b=6e76ci7d+KCTN6P8EsBsbd4Sth7eevnFXjLEAEwLVFqNjW+Yyp9dY2eOLoNwNjljla MCK9/CpmqrsFOPVBeGUfiWnT+fNyiYsvgwdjceeV63vjdR+cHFvmgZD5aPKKfhxzJgSt g4OJd267Z1sGc9qr/+XWy/uF/GTsNxKOTR9iK0yN9Ai1lygqqPlEHb8HR/5hms0yT3dV yiY9gCYrq4skReRbjDYcZNPnaGCFF9+J8MCR2PRWovvyDrM4zNyORtfrxgaoa2zJMAHU YiQG1FDu/b9f36sqSveIIxMhMnfpn9VIWhuFT6xmY4yjhv6BdVdRaoJznZ6xzQkfvYfj fzqA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; t=1680210866; x=1682802866; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=uYGsAVetNv1WCsX5k+luhaCwvE5bJU7ER+kr0Zpa1D0=; b=tYn+fwy5bA/EkNYd3z9mnsMkqnZZb31/ef8eVvj0ICMqBaEKsWO+rbZLJWrawJ2lcq pPtnEOQ48Ml3Rlk69RDKYJA5Hnb3Dsqka8MazFXfyTLKxSxSKB10eNswtP2WWnivtjZS haelghmsg2pJlchzpCwOW5W6j3ZqSeMCIEoYfLIqOnUoLFxL+wQxoVoDy5OnvkfiFFzl XHskAqFsw73ijYCma9eAlWr+ERHOEKEhCCw1q3sfJeEaWNwHLIrbL6ikrUW2QHryX2V/ HXpcsn9+hC4ROR3rR281xufxLF8dYP5lAC0LqHuMldHKB4bPqxHcCOoEp1faS9NHI9Q/ e4Pw== X-Gm-Message-State: AAQBX9eNRH0kNBFfKEBD2S2lAiouU+ql0WJT9PGsHN0EPx+PsbNEOPGc UculrBV7PassEArJ6Dme678fEyBdqgHrYpLTrL0= X-Google-Smtp-Source: AKy350ZV3m0WZRgTPO21dpfw7GQ8wNgRyeg4BdC5M4QIJC89QuDuGC4TGEeRebdsxSkbQO3+bFBJGQ== X-Received: by 2002:a05:6a20:3545:b0:e4:2a2c:869b with SMTP id f5-20020a056a20354500b000e42a2c869bmr1568833pze.36.1680210865976; Thu, 30 Mar 2023 14:14:25 -0700 (PDT) Received: from hexa.router0800d9.com (dhcp-72-253-4-112.hawaiiantel.net. [72.253.4.112]) by smtp.gmail.com with ESMTPSA id c30-20020a631c1e000000b0050301521335sm250661pgc.11.2023.03.30.14.14.24 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 30 Mar 2023 14:14:25 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][langdale 10/14] selftest: devtool: set BB_HASHSERVE_UPSTREAM when setting SSTATE_MIRROR Date: Thu, 30 Mar 2023 11:13:52 -1000 Message-Id: <14c727e4cafd7e1a945913bcc69747bb2efe3c71.1680210378.git.steve@sakoman.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 30 Mar 2023 21:14:33 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/179369 From: Martin Jansa * with my build/conf/local.conf: SSTATE_DIR = "/OE/build/poky/build/sstate-cache" these devtool tests will first set own SSTATE_DIR and the original one set as SSTATE_MIRROR: 2023-03-11 11:51:46,837 - oe-selftest - INFO - test_devtool_update_recipe_append (devtool.DevtoolUpdateTests.test_devtool_update_recipe_append) 2023-03-11 11:51:46,846 - oe-selftest - DEBUG - Appending to: /OE/build/poky/build/build-st-2023-03-11-patch2/devtool.DevtoolUpdateTests.test_devtool_update_recipe_append/build-st/conf/selftest.inc SSTATE_DIR = "/OE/build/poky/build/build-st-2023-03-11-patch2/devtool.DevtoolUpdateTests.test_devtool_update_recipe_append/build-st/sstate_devtool" SSTATE_MIRRORS += "file://.* file:////OE/build/poky/build/sstate-cache/PATH" * but that unfortunately leads to a warning from sanity.bbclass about SSTATE_MIRRORS without matching BB_HASHSERVE, because BB_HASHSERVE is set to "auto" by default these tests failing with: 2023-03-11 11:55:39,610 - oe-selftest - INFO - ====================================================================== 2023-03-11 11:55:39,610 - oe-selftest - INFO - FAIL: test_devtool_update_recipe_append_git (devtool.DevtoolUpdateTests.test_devtool_update_recipe_append_git) 2023-03-11 11:55:39,610 - oe-selftest - INFO - ---------------------------------------------------------------------- 2023-03-11 11:55:39,611 - oe-selftest - INFO - Traceback (most recent call last): File "/OE/build/poky/meta/lib/oeqa/selftest/cases/devtool.py", line 1118, in test_devtool_update_recipe_append_git self.assertNotIn('WARNING:', result.output) AssertionError: 'WARNING:' unexpectedly found in 'NOTE: Starting bitbake server...\nWARNING: You are using a local hash equivalence server but have configured an sstate mirror. This will likely mean no sstate will match from the mirror. You may wish to disable the hash equivalence use (BB_HASHSERVE), or use a hash equivalence server alongside the sstate mirror.\nLoading cache...done.\nLoaded 0 entries from dependency cache.\nParsing recipes...done.\nParsing of 947 .bb files complete (0 cached, 947 parsed). 1764 targets, 52 skipped, 0 masked, 0 errors.\n\nSummary: There was 1 WARNING message.\nINFO: Updating SRCREV in recipe mtd-utils-selftest_git.bb\nNOTE: Writing append file /tmp/devtoolqa1m2lh02v/layer/recipes-devtools/mtd/mtd-utils-selftest_git.bbappend' ---------------------------------------------------------------------- * just setting BB_HASHSERVE to empty doesn't work, because then we would need to disable OEEquivHash as well as it fails with: ERROR: OEEquivHash requires BB_HASHSERVE to be set Signed-off-by: Martin Jansa Signed-off-by: Alexandre Belloni (cherry picked from commit 96d4392ee9c5c3674e5c4c4512f527a2ca6765e4) Signed-off-by: Steve Sakoman --- meta/lib/oeqa/selftest/cases/devtool.py | 1 + 1 file changed, 1 insertion(+) diff --git a/meta/lib/oeqa/selftest/cases/devtool.py b/meta/lib/oeqa/selftest/cases/devtool.py index 0cb7403f16..877d77d488 100644 --- a/meta/lib/oeqa/selftest/cases/devtool.py +++ b/meta/lib/oeqa/selftest/cases/devtool.py @@ -276,6 +276,7 @@ class DevtoolBase(DevtoolTestCase): cls.sstate_conf = 'SSTATE_DIR = "%s"\n' % cls.devtool_sstate cls.sstate_conf += ('SSTATE_MIRRORS += "file://.* file:///%s/PATH"\n' % cls.original_sstate) + cls.sstate_conf += ('BB_HASHSERVE_UPSTREAM = "hashserv.yocto.io:8687"\n') @classmethod def tearDownClass(cls): From patchwork Thu Mar 30 21:13:53 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 21966 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id E6C00C77B6F for ; Thu, 30 Mar 2023 21:14:33 +0000 (UTC) Received: from mail-pg1-f180.google.com (mail-pg1-f180.google.com [209.85.215.180]) by mx.groups.io with SMTP id smtpd.web11.38982.1680210868702438983 for ; Thu, 30 Mar 2023 14:14:28 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20210112.gappssmtp.com header.s=20210112 header.b=EzXA8TFl; spf=softfail (domain: sakoman.com, ip: 209.85.215.180, mailfrom: steve@sakoman.com) Received: by mail-pg1-f180.google.com with SMTP id s19so12228019pgi.0 for ; Thu, 30 Mar 2023 14:14:28 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20210112.gappssmtp.com; s=20210112; t=1680210868; x=1682802868; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=GAA47bl/7Nnx1oif0cmzdaVbaKhrJ4rdtfrAe8lv1IQ=; b=EzXA8TFlho7IWiRv1r0WacXkjyt8Oq3cdpqBmTbhGe3KpffkvLD7CORrLTS/w/8juX 6/TjcubvxT09oA3ljgIvkgCCsOfOn+jnB1opq/ZQJ3UKueS6RWyfj2rpGqqoONKIbQia xgf4ZBKq14sEvLuG/qFPxSp0egQ0lFzLJlTJqYs71Bk1DXfPhCai4ZnHct7FMo21il9m FQIqKW4tfcc4P6m+uEWr035u7ca61orDHa5yFjSPQdl/D9FYW0vrDrJ4gfbwGMSOkh/V t48nfbDW4vg+H2+M408h7Qy3OlwKVpeJlv4autk9FK2Hu2sSvLuZYDpIp/jma38FebJV DTHw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; t=1680210868; x=1682802868; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=GAA47bl/7Nnx1oif0cmzdaVbaKhrJ4rdtfrAe8lv1IQ=; b=EmmX1FeSlm30IbPguPZYZhAtbni23HE/vzQuySqNQW/0lHBsPswA+Do2awprILfI76 2hvTHuojFhifXn5/rYTBUkQpvcFE8+8kSwro0FwxvTZHRARLVouuwtScHuFSks69NsUL Ty6Dsocjkn0o/3XTs8sHZjRCtIR49qy+nqdZW+IyKuO8BVWgr9udiKlE5ScCQoYBNxPe 1UsnZoihoVExpQuwieSBSJF4inEUUsvLmVlOfXFGn5yQ+tCnrMmscisP7s0EJNaKfhoN MWQ8VYPswerd6Fka4iDbWyrrXfKU3b+gEMF84XDxmeJ3e68+lA+RIXDJmqHpiGgJDkav 9HoQ== X-Gm-Message-State: AAQBX9cWbOz7i252BFjGnE9kp0uWdQyBtXHLJeOyFHAXymFtmx/bdxKa vipwBXtaaGEKMvP1oVl2n54pKbsXXtJPtBPoGek= X-Google-Smtp-Source: AK7set8ufUqMX+leuSehDj86KpgkdEM4tX7BEukXfSqCuRkHk1aBO6yt8EcJu5R1hc5xGATp65HNzA== X-Received: by 2002:a62:1bc4:0:b0:625:d5b5:1e9d with SMTP id b187-20020a621bc4000000b00625d5b51e9dmr22507774pfb.1.1680210867762; Thu, 30 Mar 2023 14:14:27 -0700 (PDT) Received: from hexa.router0800d9.com (dhcp-72-253-4-112.hawaiiantel.net. [72.253.4.112]) by smtp.gmail.com with ESMTPSA id c30-20020a631c1e000000b0050301521335sm250661pgc.11.2023.03.30.14.14.26 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 30 Mar 2023 14:14:27 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][langdale 11/14] bmap-tools: switch to main branch Date: Thu, 30 Mar 2023 11:13:53 -1000 Message-Id: <8fe9e9967c47270c869347581dd5c5b31d4fa623.1680210378.git.steve@sakoman.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 30 Mar 2023 21:14:33 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/179370 From: Martin Jansa * master branch was removed upstream: downloads/git2/github.com.intel.bmap-tools $ git remote prune origin Pruning origin URL: https://github.com/intel/bmap-tools * [pruned] refs/heads/master * [pruned] refs/pull/73/merge * downloads/git2/github.com.intel.bmap-tools $ git branch -a --contains c0673962a8ec1624b5189dc1d24f33fe4f06785a main release-3.0 Signed-off-by: Martin Jansa Signed-off-by: Alexandre Belloni (cherry picked from commit 369fee186d6916322b9be9d936b654d0c5910cb3) Signed-off-by: Steve Sakoman --- meta/recipes-support/bmap-tools/bmap-tools_git.bb | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/meta/recipes-support/bmap-tools/bmap-tools_git.bb b/meta/recipes-support/bmap-tools/bmap-tools_git.bb index 78c51e7731..89b7bf2b93 100644 --- a/meta/recipes-support/bmap-tools/bmap-tools_git.bb +++ b/meta/recipes-support/bmap-tools/bmap-tools_git.bb @@ -9,7 +9,7 @@ SECTION = "console/utils" LICENSE = "GPL-2.0-only" LIC_FILES_CHKSUM = "file://COPYING;md5=b234ee4d69f5fce4486a80fdaf4a4263" -SRC_URI = "git://github.com/intel/${BPN};branch=master;protocol=https" +SRC_URI = "git://github.com/intel/${BPN};branch=main;protocol=https" SRCREV = "c0673962a8ec1624b5189dc1d24f33fe4f06785a" S = "${WORKDIR}/git" From patchwork Thu Mar 30 21:13:54 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 21965 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id D5099C77B61 for ; Thu, 30 Mar 2023 21:14:33 +0000 (UTC) Received: from mail-pf1-f169.google.com (mail-pf1-f169.google.com [209.85.210.169]) by mx.groups.io with SMTP id smtpd.web10.38929.1680210852754171690 for ; Thu, 30 Mar 2023 14:14:30 -0700 Authentication-Results: mx.groups.io; dkim=fail reason="signature has expired" header.i=@sakoman-com.20210112.gappssmtp.com header.s=20210112 header.b=o20WIOBT; spf=softfail (domain: sakoman.com, ip: 209.85.210.169, mailfrom: steve@sakoman.com) Received: by mail-pf1-f169.google.com with SMTP id u38so13486802pfg.10 for ; Thu, 30 Mar 2023 14:14:30 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20210112.gappssmtp.com; s=20210112; t=1680210869; x=1682802869; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=x2dVh6u47Oay2rXDreWDbe50aAhKkcl036xXAEASPoQ=; b=o20WIOBTyAixEhIhwj/tNauzQE8y0ClrR+ez/HhbclbFgOnoomqvmT41MEwmjVv8Vq saEcNoFT6lYOY1UA5WaX0DAEcJPzu/XIrZvQ8LTotx2HglWbGS6J576kLjN5R94jGsF+ qC7uElypt9x8qvNCSstHeYbwM5R5LeaMs0zQ3TcnlXOLtRjO9uLe1c25uZB6T+hbfHos hs4m/id9DeWWMyh8wGP6iQYbE8Hr2Jw5Ji2rX926HIDR2Md+u9c/yj2JYGaS0Y4tvooJ kX9m3g6lGVwy8R9S6UAV/o+VMw31Yhy3XKnmozwpBHYx1hfYrmTgNQd/uHu/Hy7oQlSo 6CQA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; t=1680210869; x=1682802869; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=x2dVh6u47Oay2rXDreWDbe50aAhKkcl036xXAEASPoQ=; b=ZkG9DjuQu3Jh9KOOKqf88Ck2C8mABf/uZ1Z930t/QW+KE4Pvud3QSPUWZaurWzAP7f dRo4smYMT4jZDoz5znquprmlxBOHABftnxFpyym8tmRGe9vs4jZuv2u7A9Lxao6snu8U 23sg73A1YSF2YmJtNsCUYaSSqqs8KHTmHf2DO2lte/IBOT+U6aqRpXSgrjgQAgV3G84B at0aAVIouVu+u4tDuX6mxLzA6bhML6sGuHMR/v/8ui1Z96ac7sX6dvZHGAVkEFJrnbeS ve+8/etBIFM2tlPjRU9npMLtOL5Jpt88DFZjUBdZM+6FfLyQxgM84ZycT4kik+o0gMum mibw== X-Gm-Message-State: AAQBX9csBBRX70oS6glo08mKkpTJa8csRHU2GfRqm1ixRMIhVKUmQTxE yJBDl43qFv9kPsJ5koFYs3M1kPLKFpalFfMAnwc= X-Google-Smtp-Source: AKy350a/64yooalJ/WaooG7/XjOUGyMneQpVaLncdo518cEIWCVYe0XApJtukASC/uJtm3EZTbBttQ== X-Received: by 2002:a62:1dcc:0:b0:625:2636:9cd2 with SMTP id d195-20020a621dcc000000b0062526369cd2mr21316973pfd.18.1680210869446; Thu, 30 Mar 2023 14:14:29 -0700 (PDT) Received: from hexa.router0800d9.com (dhcp-72-253-4-112.hawaiiantel.net. [72.253.4.112]) by smtp.gmail.com with ESMTPSA id c30-20020a631c1e000000b0050301521335sm250661pgc.11.2023.03.30.14.14.28 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 30 Mar 2023 14:14:29 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][langdale 12/14] xcb-proto: Fix install conflict when enable multilib. Date: Thu, 30 Mar 2023 11:13:54 -1000 Message-Id: X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 30 Mar 2023 21:14:33 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/179371 From: Wang Mingyu Error: Transaction test error: file /usr/share/pkgconfig/xcb-proto.pc conflicts between attempted installs of lib32-xcb-proto-dev-1.15.2-r0.armv7ahf_neon and xcb-proto-dev-1.15.2-r0.cortexa57 The differences between the two files are as follows: @@ -2,7 +2,7 @@ exec_prefix=/usr datarootdir=${prefix}/share datadir=/usr/share -libdir=/usr/lib64 +libdir=/usr/lib xcbincludedir=${pc_sysrootdir}${datadir}/xcb PYTHON_PREFIX=${prefix} pythondir=${pc_sysrootdir}${libdir}/python3.11/site-packages Signed-off-by: Wang Mingyu Signed-off-by: Alexandre Belloni (cherry picked from commit 4876189dd2ae5a04a296b11b537b9f613159c6bf) Signed-off-by: Steve Sakoman --- ...nstall-conflict-when-enable-multilib.patch | 32 +++++++++++++++++++ .../xorg-proto/xcb-proto_1.15.2.bb | 1 + 2 files changed, 33 insertions(+) create mode 100644 meta/recipes-graphics/xorg-proto/xcb-proto/0001-Fix-install-conflict-when-enable-multilib.patch diff --git a/meta/recipes-graphics/xorg-proto/xcb-proto/0001-Fix-install-conflict-when-enable-multilib.patch b/meta/recipes-graphics/xorg-proto/xcb-proto/0001-Fix-install-conflict-when-enable-multilib.patch new file mode 100644 index 0000000000..4209139da8 --- /dev/null +++ b/meta/recipes-graphics/xorg-proto/xcb-proto/0001-Fix-install-conflict-when-enable-multilib.patch @@ -0,0 +1,32 @@ +From fc28149b6b198042c8d29e0931415adad7ed3231 Mon Sep 17 00:00:00 2001 +From: Wang Mingyu +Date: Thu, 16 Mar 2023 08:03:47 +0000 +Subject: [PATCH] Fix install conflict when enable multilib. + +Automake defines pythondir in terms of libdir (rather than hardcode 'lib' or query it from python as automake upstream does) +https://git.yoctoproject.org/poky/tree/meta/recipes-devtools/automake/automake/0001-automake-Update-for-python.m4-to-respect-libdir.patch + +So libdir needs to be defined when pythondir is defined. + +Upstream-Status: Inappropriate + +Signed-off-by: Wang Mingyu +--- + Makefile.am | 2 +- + 1 file changed, 1 insertion(+), 1 deletion(-) + +diff --git a/Makefile.am b/Makefile.am +index 8b57a83..580f5bc 100644 +--- a/Makefile.am ++++ b/Makefile.am +@@ -1,6 +1,6 @@ + SUBDIRS = src xcbgen + +-pkgconfigdir = $(datarootdir)/pkgconfig ++pkgconfigdir = $(libdir)/pkgconfig + pkgconfig_DATA = xcb-proto.pc + + EXTRA_DIST=doc xcb-proto.pc.in autogen.sh README.md +-- +2.34.1 + diff --git a/meta/recipes-graphics/xorg-proto/xcb-proto_1.15.2.bb b/meta/recipes-graphics/xorg-proto/xcb-proto_1.15.2.bb index 4e4472a9c1..e60e7958a7 100644 --- a/meta/recipes-graphics/xorg-proto/xcb-proto_1.15.2.bb +++ b/meta/recipes-graphics/xorg-proto/xcb-proto_1.15.2.bb @@ -13,6 +13,7 @@ LIC_FILES_CHKSUM = "file://COPYING;md5=d763b081cb10c223435b01e00dc0aba7 \ SRC_URI = "https://xorg.freedesktop.org/archive/individual/proto/${BP}.tar.xz \ file://0001-xcb-proto.pc.in-reinstate-libdir.patch \ + file://0001-Fix-install-conflict-when-enable-multilib.patch \ " SRC_URI[sha256sum] = "7072beb1f680a2fe3f9e535b797c146d22528990c72f63ddb49d2f350a3653ed" From patchwork Thu Mar 30 21:13:55 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 21967 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id D69E3C6FD1D for ; Thu, 30 Mar 2023 21:14:33 +0000 (UTC) Received: from mail-pj1-f48.google.com (mail-pj1-f48.google.com [209.85.216.48]) by mx.groups.io with SMTP id smtpd.web10.38937.1680210872258774197 for ; Thu, 30 Mar 2023 14:14:32 -0700 Authentication-Results: mx.groups.io; dkim=fail reason="signature has expired" header.i=@sakoman-com.20210112.gappssmtp.com header.s=20210112 header.b=1pjSBqqS; spf=softfail (domain: sakoman.com, ip: 209.85.216.48, mailfrom: steve@sakoman.com) Received: by mail-pj1-f48.google.com with SMTP id p3-20020a17090a74c300b0023f69bc7a68so21161922pjl.4 for ; Thu, 30 Mar 2023 14:14:32 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20210112.gappssmtp.com; s=20210112; t=1680210871; x=1682802871; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=zrB5nKSTh22Z4FVIMnL+SnRgDunBL7oWIB7bSxpJaL0=; b=1pjSBqqSYQIFpCinPvr38IpeKAhbPgqhKs6JyvFiu+hgeG5HMRpsx+AU1VW/fRIzoO 0+b1HuDwUXdRgyz3CFj5gTi6BE/Vu/ZWdpGQd/FzK+xqDobhjlb2BwdreYKd/OEHVvL7 H9SIq7/7DIeltoxwrYIp15I4kuhY2tF5eVF5D7gTppkkvCJBoD84ERLGf86fsFgV/HZ0 eVYdl9/MA89mn2LAyrSU+MTLhAJnAW8IvhJ3VY4KX3yo1Tf4WOhyDlVAoAI51qdwThDg ZJyRceozfLPgX9P1gYvI0SXxc8mYJeEZf1dIoW4XtrkfaxJaZtpBMDoBpkMbF3HcH31r abOg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; t=1680210871; x=1682802871; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=zrB5nKSTh22Z4FVIMnL+SnRgDunBL7oWIB7bSxpJaL0=; b=ykuAz6KdvMw6FoiCHWfIxGOlX8MIq+6gxXalHPmHtoGb96kCCBgwumwLCe6xQYqaGh sEJn/7RJfRV+vgzjIUn4pA7AvNMxxz+XNLCHeL1I8PV8/wQwQ/G0JREtoAQXiepH5U9D NYRL53DjDx3LZny4miXkQSlj0nY/Yr4kZG1psvowLQ7BjRMT8Rwi8mvqxS6BU9FdLlFq xvv91S802AraTuw+bryr/vcZ1gNdhMtm5qu6AfUEWOQBx7Q6aHVY5wBUBICjrLoK9BUi M7YadaPQyB5K0tsh+JgNSrtgM5XJa3mIqnaGqPlJkDxtkcYC0ezo91OPfqTrlvrUDywq 1v4A== X-Gm-Message-State: AAQBX9fMJ3ryVs2eznFPmPIatLjBD2mEAMmToWrVvpz5N0CguWLOW7R8 5iBO+vSvEBUEIS9vgnNk6VRPj5fLY26Qdlk9nWc= X-Google-Smtp-Source: AKy350aqw+G7+LFAJ38J1R2Qt6uOoR4atxAm6vPTDd8fO1efZ+lvsau/NnlNU6hyPYDBW6NUYo49Ig== X-Received: by 2002:a05:6a20:4f11:b0:db:ae75:c70e with SMTP id gi17-20020a056a204f1100b000dbae75c70emr8990292pzb.15.1680210871230; Thu, 30 Mar 2023 14:14:31 -0700 (PDT) Received: from hexa.router0800d9.com (dhcp-72-253-4-112.hawaiiantel.net. [72.253.4.112]) by smtp.gmail.com with ESMTPSA id c30-20020a631c1e000000b0050301521335sm250661pgc.11.2023.03.30.14.14.30 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 30 Mar 2023 14:14:30 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][langdale 13/14] gcc-shared-source: do not use ${S}/.. in deploy_source_date_epoch Date: Thu, 30 Mar 2023 11:13:55 -1000 Message-Id: <6134af5739c8a373db709bdbe2ba897d1ccaf39a.1680210378.git.steve@sakoman.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 30 Mar 2023 21:14:33 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/179372 From: Peter Marko This function is referencing '${S}/..'. It uses ${S} only as good known directory path to start traversing from, and it does not need it to exist or be populated. If ${S} does not exist yet, the function will fail because it cannot evaluate path .. from non-existing directory. Reproducer (verified in master and kirkstone): bitbake gcc -c deploy_source_date_epoch bitbake gcc -c cleansstate rm -rf build/tmp bitbake gcc -c deploy_source_date_epoch Signed-off-by: Peter Marko Signed-off-by: Alexandre Belloni (cherry picked from commit 42661a59cda164b2d236ffc35b4d8cf43312b677) Signed-off-by: Steve Sakoman --- meta/recipes-devtools/gcc/gcc-shared-source.inc | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/meta/recipes-devtools/gcc/gcc-shared-source.inc b/meta/recipes-devtools/gcc/gcc-shared-source.inc index cd2e341099..03f520b093 100644 --- a/meta/recipes-devtools/gcc/gcc-shared-source.inc +++ b/meta/recipes-devtools/gcc/gcc-shared-source.inc @@ -16,6 +16,6 @@ do_deploy_source_date_epoch () { sde_file=${SDE_FILE} sde_file=${sde_file#${WORKDIR}/} mkdir -p ${SDE_DEPLOYDIR} $(dirname ${SDE_FILE}) - cp -p ${S}/../$sde_file ${SDE_DEPLOYDIR} - cp -p ${S}/../$sde_file ${SDE_FILE} + cp -p $(dirname ${S})/$sde_file ${SDE_DEPLOYDIR} + cp -p $(dirname ${S})/$sde_file ${SDE_FILE} } From patchwork Thu Mar 30 21:13:56 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 21969 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id CF723C7619A for ; Thu, 30 Mar 2023 21:14:43 +0000 (UTC) Received: from mail-pj1-f52.google.com (mail-pj1-f52.google.com [209.85.216.52]) by mx.groups.io with SMTP id smtpd.web11.38987.1680210873853986843 for ; Thu, 30 Mar 2023 14:14:33 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20210112.gappssmtp.com header.s=20210112 header.b=XIhifak4; spf=softfail (domain: sakoman.com, ip: 209.85.216.52, mailfrom: steve@sakoman.com) Received: by mail-pj1-f52.google.com with SMTP id gp15-20020a17090adf0f00b0023d1bbd9f9eso23374922pjb.0 for ; Thu, 30 Mar 2023 14:14:33 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20210112.gappssmtp.com; s=20210112; t=1680210873; x=1682802873; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=0SMaCavEhWqnUD1RNxRAQvZOMxViLCeZ/vXJQhvzFYU=; b=XIhifak4EN95zat5Om9OMYp2lrQ/3JuuDSp8uZWfqnBZium5EfAteobwxhRxCZ7w3E O4kt14LQBCUSNs2izN6D9TRqYFH/6zexWNcHBG/yEZ6DnOPSlmZ5pcQOkct+2rmd9U6q FSjABn3YJbDFK4wqSZq6VojUSSTwgiRb+xS2eLP0xotvelgCW/4IzM0qKB4xJ8zVGmQ2 vTEI2gmWFo6qaqRCg6GBo1YgDZfq5foEIuJVq41nw27WnHCfdPVQfR9ssRUShTKBXTXA vjQupGhYLsQLjFFAGNpPNM0TqvetH97RpntaErUL0kgspEUCn/+681lCDJHAsSVdokjg BtNw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; t=1680210873; x=1682802873; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=0SMaCavEhWqnUD1RNxRAQvZOMxViLCeZ/vXJQhvzFYU=; b=kbQH71sRoOqc6xbADf6LGAi+NqIf9cEjOtPq7qpSJ90cVar0duhy7sINOuzVIaE/nI fgEDmWgUs4ZE8vMomECho2loJx8D3WqG0xDgy4tTiJ/LWsk6dC5YFbDrDUGOyi/6VNeT WzlgG3o6zN/SXkbTcM/K1BgO5wxm1Lovmf839Gq22L/zqy1QWoA7d2re0CsBR+tuVYXA rxdvZp25T5NQUT4qaYqw2pBAMu/VuqmyGa/LMsOhJi0FH/cH06rFcrgJnb5LTIQKvF0V rI3vW/7o9YvXUPfuNL4dBHzVf5zQvRepmVWyUw/qv/vPXkqWJ8QYD6pa4ugbRhsFzdGi syVA== X-Gm-Message-State: AAQBX9fypfpHqqrqD9+FxPPnFP6dYcSO7yWoe4bajYCPSOU5JuyFHeLy UFKegPCy1ffgYJFR5/NU9iw8twLSYMRW8rKXV/Q= X-Google-Smtp-Source: AKy350ZppF2cnGbtL/DfkvcOWggUlJcb8zrbqUwuGRkzOIwWiEwAgy714pah37M+Cq/UpURWtI2iAA== X-Received: by 2002:a17:90b:4b8a:b0:23f:582d:f45f with SMTP id lr10-20020a17090b4b8a00b0023f582df45fmr25157564pjb.1.1680210872915; Thu, 30 Mar 2023 14:14:32 -0700 (PDT) Received: from hexa.router0800d9.com (dhcp-72-253-4-112.hawaiiantel.net. [72.253.4.112]) by smtp.gmail.com with ESMTPSA id c30-20020a631c1e000000b0050301521335sm250661pgc.11.2023.03.30.14.14.32 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 30 Mar 2023 14:14:32 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][langdale 14/14] scripts/lib/buildstats: handle top-level build_stats not being complete Date: Thu, 30 Mar 2023 11:13:56 -1000 Message-Id: <6c9ca2f2de98c84d11beccbfde7c1e26cb25dfb6.1680210378.git.steve@sakoman.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 30 Mar 2023 21:14:43 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/179373 From: Ross Burton If we try to parse a buildstats directory which was either aborted or is still being built then the top-level build_stats file doesn't contain an elapsed value which causes an exception: UnboundLocalError: local variable 'elapsed' referenced before assignment Default both start and elapsed to 0 so that the parse succeeds. Signed-off-by: Ross Burton Signed-off-by: Alexandre Belloni (cherry picked from commit 701d985aa8f2e9c2b9c0736fa25b424f3701889e) Signed-off-by: Steve Sakoman --- scripts/lib/buildstats.py | 1 + 1 file changed, 1 insertion(+) diff --git a/scripts/lib/buildstats.py b/scripts/lib/buildstats.py index fa94c65539..6db60d5bcf 100644 --- a/scripts/lib/buildstats.py +++ b/scripts/lib/buildstats.py @@ -234,6 +234,7 @@ class BuildStats(dict): """ Parse the top-level build_stats file for build-wide start and duration. """ + start = elapsed = 0 with open(path) as fobj: for line in fobj.readlines(): key, val = line.split(':', 1)