From patchwork Fri May 3 03:00:06 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Bruce Ashfield X-Patchwork-Id: 43213 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 61D9BC04FFE for ; Fri, 3 May 2024 03:00:25 +0000 (UTC) Received: from mail-qv1-f53.google.com (mail-qv1-f53.google.com [209.85.219.53]) by mx.groups.io with SMTP id smtpd.web11.4326.1714705218553600413 for ; Thu, 02 May 2024 20:00:18 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@gmail.com header.s=20230601 header.b=QhAaIGBG; spf=pass (domain: gmail.com, ip: 209.85.219.53, mailfrom: bruce.ashfield@gmail.com) Received: by mail-qv1-f53.google.com with SMTP id 6a1803df08f44-6a0a7cf89deso27894536d6.0 for ; Thu, 02 May 2024 20:00:18 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1714705217; x=1715310017; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:message-id:date:subject:cc :to:from:from:to:cc:subject:date:message-id:reply-to; bh=FuPdsZnw3llLJ4h+qb+MkwojrydT4kSb1+5hibqRUMM=; b=QhAaIGBGXFLCn0vO4//pmso7q5w+9a/BI8adEHrWAqQvSivI0QFOeQa69kL/n1flcV TtCGs217JmlqOXa/SEcU7Aeyv+depf0fEq4NEgG5P0bID776VzttE5HnZbk57yJ1LT2G Tml90sMrIxtQgGWtVplbGystBSD0JAAN7uOJzExa3CUzOdLXJHbAihJrn3q4bapPCN1c KMITUr+w3DoNSnA2EO10T5WeKa3AWZXVfLPRivJH2/u5czfSiEn8lSOPQaXRRg5KZb2y 9+sO3DWoTQ5UcrqM+WgqAai7UgMpp3c5n6OqY+UYjk8DUUR9MjHDCh5cD3yyBnukS3NG QgNA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1714705217; x=1715310017; h=content-transfer-encoding:mime-version:message-id:date:subject:cc :to:from:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=FuPdsZnw3llLJ4h+qb+MkwojrydT4kSb1+5hibqRUMM=; b=ipJzYl3WL5/nl5AzE+rg3XH7C8Oh3mTAY7k1SqtLp84cMOpS31A9Tw3aahNDQs7VqY mItPwknoBw3k2TbhZkRRaA4UTieZ9U5J4JDMa8jybaiLcl0P7CgZDjrEDBH5yRebaGfw JiMxXWquP/z03v0HDXK55jFALDDneWwoZjeu+umuiRbNoLHKACeto/bwuqaTQYpnyiHL 7+tag8h1uJFKau/zLpnuz85TsFLko3Do9hMJIBTXGw1SUrXsiYQdUcPBNVZh4+RKF35z F2UDaErof4+xDcPGZdvLish5hUn4H5x5pSvV5KRe//wSW17PDPufzdksFHWymNkGLsbP KXZw== X-Gm-Message-State: AOJu0YzfpGoXeo5O2cP1A6i7KUbvUVOlSH8SDf1/e1Dk7ZnTAElcsAih aN6zrV4dAVOd5XpkMtIpZxFlZAS2gVgn99uj60d5wuAJRd9bBy3K6Mrxcw== X-Google-Smtp-Source: AGHT+IHIElhI6kSv+TGLJw8ZjKb8HfEF+UqiPeIX1jULbl0/nkZsNA1PiXROmSBoTHuE4rb0veKrOQ== X-Received: by 2002:a05:6214:1314:b0:6a0:583b:8cc5 with SMTP id pn20-20020a056214131400b006a0583b8cc5mr1601626qvb.33.1714705217387; Thu, 02 May 2024 20:00:17 -0700 (PDT) Received: from bruce-XPS-8940.localdomain (pool-174-112-62-108.cpe.net.cable.rogers.com. [174.112.62.108]) by smtp.gmail.com with ESMTPSA id mi5-20020a056214558500b006a0fa96013asm839357qvb.138.2024.05.02.20.00.16 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 02 May 2024 20:00:16 -0700 (PDT) From: bruce.ashfield@gmail.com To: steve@sakoman.com Cc: openembedded-core@lists.openembedded.org Subject: [OE-core][nanbield 01/10] linux-yocto/6.1: update to v6.1.79 Date: Thu, 2 May 2024 23:00:06 -0400 Message-Id: <20240503030015.374078-1-bruce.ashfield@gmail.com> X-Mailer: git-send-email 2.39.2 MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 03 May 2024 03:00:25 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/198956 From: Bruce Ashfield Updating linux-yocto/6.1 to the latest korg -stable release that comprises the following commits: 81e1dc2f7001 Linux 6.1.79 6fd24675188d mlxsw: spectrum_acl_tcam: Fix stack corruption 9020513afafe fs/ntfs3: Add null pointer checks d028cc6d235f arm64: Subscribe Microsoft Azure Cobalt 100 to ARM Neoverse N2 errata c5d83ac2bf6c dm: limit the number of targets and parameter size area 13f79a002602 nilfs2: replace WARN_ONs for invalid DAT metadata block requests 6589f0f72f8e nilfs2: fix potential bug in end_buffer_async_write 058d1c56167e of: property: Add in-ports/out-ports support to of_graph_get_port_parent() 24ec7504a08a sched/membarrier: reduce the ability to hammer on sys_membarrier d3a5f798bc86 kbuild: Drop -Wdeclaration-after-statement 3c6cc62ce126 locking: Introduce __cleanup() based infrastructure 579cfab21b59 apparmor: Free up __cleanup() name 43ec3c888653 dmaengine: ioat: Free up __cleanup() name a160c3293a1c userfaultfd: fix mmap_changing checking in mfill_atomic_hugetlb f3e975828636 bpf: Remove trace_printk_lock 95b7476f6f68 bpf: Do cleanup in bpf_bprintf_cleanup only when needed f7bbad9561f3 bpf: Add struct for bin_args arg in bpf_bprintf_prepare 989b0ff35fe5 net: prevent mss overflow in skb_segment() 380aeff204b9 smb: client: fix parsing of SMB3.1.1 POSIX create context 1ae3c59355dc smb: client: fix potential OOBs in smb2_parse_contexts() 270325fb3154 RDMA/irdma: Ensure iWarp QP queue memory is OS paged aligned e1c1bdaa3879 hrtimer: Ignore slack time for RT tasks in schedule_hrtimeout_range() 51a8f31b939c nfsd: don't take fi_lock in nfsd_break_deleg_cb() e4cf8941664c nfsd: fix RELEASE_LOCKOWNER 23027309b099 parisc: Fix random data corruption from exception handler ebc442c6403d netfilter: ipset: Missing gc cancellations fixed 653bc5e6d999 netfilter: ipset: fix performance regression in swap operation e7d2e87abc6f block: fix partial zone append completion handling in req_bio_endio() bb44477d4506 crypto: lib/mpi - Fix unexpected pointer access in mpi_ec_init c6feb7f41728 wifi: mwifiex: fix uninitialized firmware_stat 0a9e80354911 arm64: dts: qcom: sm8150: fix USB SS wakeup c0e41c8756ef arm64: dts: qcom: sdm845: fix USB SS wakeup 2488e0e4bc23 arm64: dts: qcom: msm8916: Make blsp_dma controlled-remotely 9c84d580de3c arm64: dts: qcom: msm8916: Enable blsp_dma by default 475369350157 bus: moxtet: Add spi device table 1b7b597a69bb wifi: mwifiex: add extra delay for firmware ready 48b348232070 wifi: mwifiex: Support SD8978 chipset 5447e64acce8 ARM: dts: imx6q-apalis: add can power-up delay on ixora board 4bf19cef220a md: bypass block throttle for superblock update 9a163479ddc4 selftests/mm: Update va_high_addr_switch.sh to check CPU for la57 flag 84df059d2468 selftests/mm: ksm_tests should only MADV_HUGEPAGE valid memory 944900fe2736 tls: fix NULL deref on tls_sw_splice_eof() with empty record 0a371ed6f2c1 xfrm: Silence warnings triggerable by bad packets cf3c8916866c xfrm: Use xfrm_state selector for BEET input 1e4432d463f3 tracing: Inform kmemleak of saved_cmdlines allocation c7f9c3e94e61 fs/proc: do_task_stat: move thread_group_cputime_adjusted() outside of lock_task_sighand() 9359ff1a4501 pmdomain: core: Move the unused cleanup to a _sync initcall 4dd684d4bb3c can: j1939: Fix UAF in j1939_sk_match_filter during setsockopt(SO_J1939_FILTER) aedda066d717 can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock 8a72a4689a8d can: netlink: Fix TDCO calculation using the old data bittiming 08c194882376 of: property: fix typo in io-channels 79081197b4e2 mm: hugetlb pages should not be reserved by shmat() if SHM_NORESERVE 2e2c07104b49 fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super f3f98d7d84b3 ceph: prevent use-after-free in encode_cap_msg() 309ef7de5d84 hv_netvsc: Register VF in netvsc_probe if NET_DEVICE_REGISTER missed 4888754f3dd0 net: ethernet: ti: cpsw_new: enable mac_managed_pm to fix mdio 5140c4d5f4fd s390/qeth: Fix potential loss of L3-IP@ in case of network issues 058fbaf7716b net: ethernet: ti: cpsw: enable mac_managed_pm to fix mdio 95de4ad173ca fs: relax mount_setattr() permission checks 3ff3e6a9363a tools/rtla: Fix Makefile compiler options for clang 4ee28d5a4f57 tools/rtla: Fix uninitialized bucket/data->bucket_size warning 5ccb527b66e6 tools/rtla: Exit with EXIT_SUCCESS when help is invoked 771b74ce9212 tools/rtla: Replace setting prio with nice for SCHED_OTHER d627693e5a55 tools/rtla: Remove unused sched_getattr() function fcf62f94ad80 ASoC: amd: yc: Add DMI quirk for Lenovo Ideapad Pro 5 16ARP8 00f9fcc0a109 mmc: sdhci-pci-o2micro: Fix a warm reboot issue that disk can't be detected by BIOS 09fad23a1a32 zonefs: Improve error handling ce2b826582f5 irqchip/gic-v3-its: Fix GICv4.1 VPE affinity update 659311f59318 irqchip/irq-brcmstb-l2: Add write memory barrier before exit 783912cbce88 wifi: mac80211: reload info pointer in ieee80211_tx_dequeue() 6c84dbe8f8fa wifi: cfg80211: fix wiphy delayed work queueing 685fc1711cda nfp: flower: prevent re-adding mac index for bonded port 57b8478c103a nfp: use correct macro for LengthSelect in BAR config 8731fe001a60 crypto: ccp - Fix null pointer dereference in __sev_platform_shutdown_locked 8494ba2c9ea0 nilfs2: fix hang in nilfs_lookup_dirty_data_buffers() 9c9c68d64fd3 nilfs2: fix data corruption in dsync block recovery for small block sizes 35076e3fb4b8 ALSA: hda/conexant: Add quirk for SWS JS201D 53e8abc14e57 ALSA: hda/realtek: fix mute/micmute LED For HP mt645 a943c7fbdfeb mmc: slot-gpio: Allow non-sleeping GPIO ro eae748df18ed io_uring/net: fix multishot accept overflow handling aedcefae6c18 x86/mm/ident_map: Use gbpages only where full GB page should be mapped. 3863ca052216 KVM: x86/pmu: Fix type length error when reading pmu->fixed_ctr_ctrl 627339cccdc9 x86/fpu: Stop relying on userspace for info to fault in xsave buffer 8b4025679e56 x86/Kconfig: Transmeta Crusoe is CPU family 5, not 6 c194adaa8a4c powerpc/pseries: fix accuracy of stolen time 42422f8f8c52 powerpc/cputable: Add missing PPC_FEATURE_BOOKE on PPC64 Book-E 76d3ad7d0264 powerpc/64: Set task pt_regs->link to the LR value on scv entry 5e2f407646fa serial: max310x: prevent infinite while() loop in port startup 0046dd2e9ff6 serial: max310x: fail probe if clock crystal is unstable 7971a029eb23 serial: max310x: improve crystal stable clock detection 5d89c48337c7 serial: max310x: set default value when reading clock ready bit c96ce4903b62 nfp: flower: fix hardware offload for the transfer layer port ef3d50e884d4 ring-buffer: Clean ring_buffer_poll_wait() error return 48a8ccccffba hv_netvsc: Fix race condition between netvsc_probe and netvsc_remove 3ca5a3cdc0c1 drm/amd/display: Preserve original aspect ratio in create stream e70123fdbe82 drm/amd/display: Increase frame-larger-than for all display_mode_vba files 8c22b23a2778 drm/prime: Support page array >= 4GB fc811d88fb4e drm/msm: Wire up tlb ops ba5f95788345 xfrm: Remove inner/outer modes from input path 01e9f82058e2 xfrm: Remove inner/outer modes from output path 7505a0ce0858 ksmbd: free aux buffer if ksmbd_iov_pin_rsp_read fails 9f6087851ec6 media: rc: bpf attach/detach requires write permission b79e15569d1a iio: imu: bno055: serdev requires REGMAP 9e105dd8c070 iio: imu: adis: ensure proper DMA alignment 18cbe28671e2 iio: adc: ad_sigma_delta: ensure proper DMA alignment 77ba1a86ef22 iio: accel: bma400: Fix a compilation problem 4f10423c0e34 iio: commom: st_sensors: ensure proper DMA alignment 359f220d0e75 iio: core: fix memleak in iio_device_register_sysfs 176256ff8abf iio: magnetometer: rm3100: add boundary check for the value read from RM3100_REG_TMRC c794117a3369 staging: iio: ad5933: fix type mismatch regression 65bf19f55a87 tracing: Fix wasted memory in saved_cmdlines logic ac894a1e19b9 ext4: avoid bb_free and bb_fragments inconsistency in mb_free_blocks() 185eab30486b ext4: fix double-free of blocks due to wrong extents moved_len 4ab56381ac26 misc: fastrpc: Mark all sessions as invalid in cb_remove 90e09c016d72 binder: signal epoll threads of self-work f33789ca65d5 ALSA: hda/realtek: fix mute/micmute LEDs for HP ZBook Power 6c65eb988d4a ALSA: hda/cs8409: Suppress vmaster control for Dolphin models a6bc85847272 ASoC: codecs: wcd938x: handle deferred probe d27f6d6eacac ALSA: hda/realtek: Enable headset mic on Vaio VJFE-ADL 5953f2c7f84d modpost: Add '.ltext' and '.ltext.*' to TEXT_SECTIONS 064cb9dd10ff um: Fix adding '-no-pie' for clang 36fbcadc208e modpost: Include '.text.*' in TEXT_SECTIONS 519b7da44ee4 linux/init: remove __memexit* annotations 999ecc936a99 modpost: Don't let "driver"s reference .exit.* a5767decf743 modpost: propagate W=1 build option to modpost 6286435cd06c xen-netback: properly sync TX responses 55e891f4a272 net: stmmac: do not clear TBS enable bit on link up/down 56440799fc46 net: hsr: remove WARN_ONCE() in send_hsr_supervision_frame() 5c0c5ffaed73 nfc: nci: free rx_data_reassembly skb on NCI device cleanup 76690354e6ac kbuild: Fix changing ELF file type for output of gen_btf for big endian 38acb2e9be54 ALSA: hda/realtek: Apply headset jack quirk for non-bass alc287 thinkpads e1aae84f42ec firewire: core: correct documentation of fw_csr_string() kernel API d0302e2a5732 lsm: fix the logic in security_inode_getsecctx() dc3890441c9e drm/virtio: Set segment size for virtio_gpu device ff70e6ff6fc2 Revert "drm/amd: flush any delayed gfxoff on suspend entry" 6bb22ac1d11d scsi: Revert "scsi: fcoe: Fix potential deadlock on &fip->ctlr_lock" 75500e7ba2a2 media: Revert "media: rkisp1: Drop IRQF_SHARED" e373bfc8ec3d mptcp: check addrs list in userspace_pm_get_local_id d288d2e3e65a mptcp: drop the push_pending field d50d031919b2 selftests: mptcp: increase timeout to 30 min fc0e9cff9db0 selftests: mptcp: add missing kconfig for NF Mangle 2c7337ec22bc selftests: mptcp: add missing kconfig for NF Filter in v6 66e142fbe13f selftests: mptcp: add missing kconfig for NF Filter 6673d9f1c2cd mptcp: fix data re-injection from stale subflow 7857e35ef10e mptcp: get rid of msk->subflow 3e409fb74007 modpost: trim leading spaces when processing source files list 491528935c9c i2c: i801: Fix block process call transactions 0e01ccadfdf7 i2c: pasemi: split driver into two separate modules 4297217bcf1f powerpc/kasan: Limit KASAN thread size increase to 32KB c12920ff9b57 irqchip/loongson-eiointc: Use correct struct type in eiointc_domain_alloc() 083870b029c0 i2c: qcom-geni: Correct I2C TRE sequence 7190353835b4 cifs: fix underflow in parse_server_interfaces() 0c09912dd838 powerpc/kasan: Fix addr error caused by page alignment 2aaa9239c981 driver core: fw_devlink: Improve detection of overlapping cycles be76ad74a43f media: ir_toy: fix a memleak in irtoy_tx 6616d3c4f828 interconnect: qcom: sc8180x: Mark CO0 BCM keepalive 57e2e42ccd3c usb: dwc3: gadget: Fix NULL pointer dereference in dwc3_gadget_suspend 0ecc97c81e3a usb: f_mass_storage: forbid async queue when shutdown happen 2888258144e0 USB: hub: check for alternate port before enabling A_ALT_HNP_SUPPORT 9f754d009483 usb: ucsi_acpi: Fix command completion handling d31b886ed6a5 usb: ulpi: Fix debugfs directory leak 3fd6c16ec78d usb: ucsi: Add missing ppm_lock 711beb8acf5d iio: hid-sensor-als: Return 0 for HID_USAGE_SENSOR_TIME_TIMESTAMP e5c6c8ef3e4d HID: wacom: Do not register input devices until after hid_hw_start b71a906a72dd HID: wacom: generic: Avoid reporting a serial of '0' to userspace d7d7a0e3b6f5 HID: i2c-hid-of: fix NULL-deref on failed power up ea09996b3711 ALSA: hda/realtek: Enable Mute LED on HP Laptop 14-fq0xxx b23c431e5052 ALSA: hda/realtek: Fix the external mic not being recognised for Acer Swift 1 SF114-32 f00e8d0fccf6 parisc: Prevent hung tasks when printing inventory on serial console 607385d75a0b ASoC: amd: yc: Add DMI quirk for MSI Bravo 15 C7VF 30884a44e0ce dm-crypt, dm-verity: disable tasklets 221da504a55b scsi: storvsc: Fix ring buffer size calculation 16b1025eaa8f mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again 36be97e9eb53 tracing/trigger: Fix to return error if failed to alloc snapshot 76a42074d0b8 scs: add CONFIG_MMU dependency for vfree_atomic() 7a245b8a2fa9 i40e: Fix waiting for queues of all VSIs to be disabled 1c981792e4cc i40e: Do not allow untrusted VF to remove administratively set MAC c638b4afc750 MIPS: Add 'memory' clobber to csum_ipv6_magic() inline assembler 4b02c89327f7 nouveau/svm: fix kvcalloc() argument order 20f378f92971 net: sysfs: Fix /sys/class/net/ path for statistics 1f0d7792e902 ASoC: rt5645: Fix deadlock in rt5645_jack_detect_work() 251145e50437 spi: ppc4xx: Drop write-only variable 727cdd2f3dca net: tls: fix returned read length with async decrypt 20b4ed034872 net: tls: fix use-after-free with partial reads and async decrypt 7a3ca06d04d5 tls: fix race between async notify and socket close 2c6841c88201 net: tls: factor out tls_*crypt_async_wait() d55eb0b495a9 tls: extract context alloc/initialization out of tls_set_sw_offload 5ad627faed13 tls/sw: Use splice_eof() to flush b9357489c46c lan966x: Fix crash when adding interface under a lag 65ded4eb2206 net: openvswitch: limit the number of recursions from action sets 68614f1865a0 of: property: Improve finding the supplier of a remote-endpoint property 4bd106ac1c38 wifi: iwlwifi: uninitialized variable in iwl_acpi_get_ppag_table() 72d4600a6eb8 wifi: iwlwifi: Fix some error codes e5ed6c922537 KVM: selftests: Fix a semaphore imbalance in the dirty ring logging test b3557a3697ae KVM: selftests: Clear dirty ring states between two modes in dirty_log_test 0cf05064008c of: unittest: Fix compile in the non-dynamic case 0f081fcfaac3 driver core: Fix device_link_flag_is_sync_state_only() 02f2b95b00bf btrfs: don't drop extent_map for free space inode on write error 7ba7f9ed88a1 btrfs: reject encoded write if inode has nodatasum flag set 4d6b2e17b550 btrfs: don't reserve space for checksums when writing to nocow files dfd1f44e4958 btrfs: send: return EOPNOTSUPP on unknown flags f98913c07cd8 btrfs: forbid deleting live subvol qgroup 66b317a2fc45 btrfs: do not ASSERT() if the newly created subvolume already got read a1a7b9589574 btrfs: forbid creating subvol qgroups e717aecd2a43 btrfs: do not delete unused block group if it may be used soon 84b576ad44ea btrfs: add and use helper to check if block group is used 3af7236d6dbf update workarounds for gcc "asm goto" issue f70efe54b97e work around gcc bugs with 'asm goto' with outputs Signed-off-by: Bruce Ashfield --- .../linux/linux-yocto-rt_6.1.bb | 6 ++-- .../linux/linux-yocto-tiny_6.1.bb | 6 ++-- meta/recipes-kernel/linux/linux-yocto_6.1.bb | 28 +++++++++---------- 3 files changed, 20 insertions(+), 20 deletions(-) diff --git a/meta/recipes-kernel/linux/linux-yocto-rt_6.1.bb b/meta/recipes-kernel/linux/linux-yocto-rt_6.1.bb index cbf8a18d30..4731848569 100644 --- a/meta/recipes-kernel/linux/linux-yocto-rt_6.1.bb +++ b/meta/recipes-kernel/linux/linux-yocto-rt_6.1.bb @@ -14,13 +14,13 @@ python () { raise bb.parse.SkipRecipe("Set PREFERRED_PROVIDER_virtual/kernel to linux-yocto-rt to enable it") } -SRCREV_machine ?= "8c4c2f0278e1c64eb5e95bfb23d6322e81090b3d" -SRCREV_meta ?= "ea5365f818fb6031ec97b8ae7a88bb83001b901e" +SRCREV_machine ?= "d99f54f4ced57500fd5c346afcfa79ff8bab6a61" +SRCREV_meta ?= "1a5f3ae5c51d6698be51e36bf547433564338b18" SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;branch=${KBRANCH};name=machine;protocol=https \ git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.1;destsuffix=${KMETA};protocol=https" -LINUX_VERSION ?= "6.1.78" +LINUX_VERSION ?= "6.1.79" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" diff --git a/meta/recipes-kernel/linux/linux-yocto-tiny_6.1.bb b/meta/recipes-kernel/linux/linux-yocto-tiny_6.1.bb index 3f100b579f..178ab5b7d3 100644 --- a/meta/recipes-kernel/linux/linux-yocto-tiny_6.1.bb +++ b/meta/recipes-kernel/linux/linux-yocto-tiny_6.1.bb @@ -8,7 +8,7 @@ require recipes-kernel/linux/linux-yocto.inc # CVE exclusions include recipes-kernel/linux/cve-exclusion_6.1.inc -LINUX_VERSION ?= "6.1.78" +LINUX_VERSION ?= "6.1.79" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}" @@ -17,8 +17,8 @@ DEPENDS += "openssl-native util-linux-native" KMETA = "kernel-meta" KCONF_BSP_AUDIT_LEVEL = "2" -SRCREV_machine ?= "d025fe8c17718aa4c837bfafee0f3aa0f830bc75" -SRCREV_meta ?= "ea5365f818fb6031ec97b8ae7a88bb83001b901e" +SRCREV_machine ?= "2ca50ef474eea7ab53d9f769b1502c7c9d4f28cc" +SRCREV_meta ?= "1a5f3ae5c51d6698be51e36bf547433564338b18" PV = "${LINUX_VERSION}+git" diff --git a/meta/recipes-kernel/linux/linux-yocto_6.1.bb b/meta/recipes-kernel/linux/linux-yocto_6.1.bb index 982996b9a8..ec84d2614c 100644 --- a/meta/recipes-kernel/linux/linux-yocto_6.1.bb +++ b/meta/recipes-kernel/linux/linux-yocto_6.1.bb @@ -18,25 +18,25 @@ KBRANCH:qemux86-64 ?= "v6.1/standard/base" KBRANCH:qemuloongarch64 ?= "v6.1/standard/base" KBRANCH:qemumips64 ?= "v6.1/standard/mti-malta64" -SRCREV_machine:qemuarm ?= "2f7e672f9677d3cc448ec7e004763f76f95c7fe0" -SRCREV_machine:qemuarm64 ?= "d025fe8c17718aa4c837bfafee0f3aa0f830bc75" -SRCREV_machine:qemuloongarch64 ?= "d025fe8c17718aa4c837bfafee0f3aa0f830bc75" -SRCREV_machine:qemumips ?= "f6c42d90dab94077c1c8b6b7eb77d6ca85eab07e" -SRCREV_machine:qemuppc ?= "ff10270b2748ad74c93ef0abf8e76a464665c23d" -SRCREV_machine:qemuriscv64 ?= "d025fe8c17718aa4c837bfafee0f3aa0f830bc75" -SRCREV_machine:qemuriscv32 ?= "d025fe8c17718aa4c837bfafee0f3aa0f830bc75" -SRCREV_machine:qemux86 ?= "d025fe8c17718aa4c837bfafee0f3aa0f830bc75" -SRCREV_machine:qemux86-64 ?= "d025fe8c17718aa4c837bfafee0f3aa0f830bc75" -SRCREV_machine:qemumips64 ?= "01b545e3fd1f9ea66d812e281de06b07c861dd69" -SRCREV_machine ?= "d025fe8c17718aa4c837bfafee0f3aa0f830bc75" -SRCREV_meta ?= "ea5365f818fb6031ec97b8ae7a88bb83001b901e" +SRCREV_machine:qemuarm ?= "4c6c7312e0e95f7b076f86ef1d791c78d82ddeee" +SRCREV_machine:qemuarm64 ?= "2ca50ef474eea7ab53d9f769b1502c7c9d4f28cc" +SRCREV_machine:qemuloongarch64 ?= "2ca50ef474eea7ab53d9f769b1502c7c9d4f28cc" +SRCREV_machine:qemumips ?= "b2a27a5acb88b991bc6d822f9fdc308d5a108583" +SRCREV_machine:qemuppc ?= "ef1506156c8b381a51c4937c43bca036170df29e" +SRCREV_machine:qemuriscv64 ?= "2ca50ef474eea7ab53d9f769b1502c7c9d4f28cc" +SRCREV_machine:qemuriscv32 ?= "2ca50ef474eea7ab53d9f769b1502c7c9d4f28cc" +SRCREV_machine:qemux86 ?= "2ca50ef474eea7ab53d9f769b1502c7c9d4f28cc" +SRCREV_machine:qemux86-64 ?= "2ca50ef474eea7ab53d9f769b1502c7c9d4f28cc" +SRCREV_machine:qemumips64 ?= "3a17a35babd86c4bc9121469801a04248bf7ae99" +SRCREV_machine ?= "2ca50ef474eea7ab53d9f769b1502c7c9d4f28cc" +SRCREV_meta ?= "1a5f3ae5c51d6698be51e36bf547433564338b18" # set your preferred provider of linux-yocto to 'linux-yocto-upstream', and you'll # get the /base branch, which is pure upstream -stable, and the same # meta SRCREV as the linux-yocto-standard builds. Select your version using the # normal PREFERRED_VERSION settings. BBCLASSEXTEND = "devupstream:target" -SRCREV_machine:class-devupstream ?= "8b4118fabd6eb75fed19483b04dab3a036886489" +SRCREV_machine:class-devupstream ?= "81e1dc2f70014b9523dd02ca763788e4f81e5bac" PN:class-devupstream = "linux-yocto-upstream" KBRANCH:class-devupstream = "v6.1/base" @@ -45,7 +45,7 @@ SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;name=machine;branch=${KBRA SRC_URI += "file://0001-perf-cpumap-Make-counter-as-unsigned-ints.patch" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" -LINUX_VERSION ?= "6.1.78" +LINUX_VERSION ?= "6.1.79" PV = "${LINUX_VERSION}+git" From patchwork Fri May 3 03:00:07 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Bruce Ashfield X-Patchwork-Id: 43214 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 60D97C4345F for ; Fri, 3 May 2024 03:00:25 +0000 (UTC) Received: from mail-qv1-f43.google.com (mail-qv1-f43.google.com [209.85.219.43]) by mx.groups.io with SMTP id smtpd.web10.4160.1714705219760704241 for ; Thu, 02 May 2024 20:00:19 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@gmail.com header.s=20230601 header.b=IAU9hPhw; spf=pass (domain: gmail.com, ip: 209.85.219.43, mailfrom: bruce.ashfield@gmail.com) Received: by mail-qv1-f43.google.com with SMTP id 6a1803df08f44-6a073f10e25so44943926d6.3 for ; Thu, 02 May 2024 20:00:19 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1714705219; x=1715310019; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=30p8RIIM/9DA+52g37UPY99DTP1i8egsJayOnsaboSI=; b=IAU9hPhwzAscMAPTZI7dJM/oI7dAA8hynpu4COBlt2PjC48qsPhcqskUHf3mT8MH7j WF0h7pRv24JVCrMiYKQdawBbjonS1zRCz2wb4i6DvEXHeCDKuAIqJBdh/C55Z2GZJ8ht kzy19qEXFuErgzP4AheMdpdAGyN//hQifLVy7r21xXQnFgJ1owwV6CWC5VWZLQZGCeg9 jzdL13EdlymO8MFIEb0+iW0rZBYRewSS45jR4YdJb0QY4Y5BWDn8Fq4gAgzCfpwSjyR/ mL7TKK2uQTRhTK+X8drsYDg2CaC9zJ3ZaGmuqPEakID3tuulhM12r8WlfatR6v02Gpgr XylA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1714705219; x=1715310019; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=30p8RIIM/9DA+52g37UPY99DTP1i8egsJayOnsaboSI=; b=THSY3TosfuviqNsHey5ypEJx9ZT5x1W9pwCu5ngYzvMjxV9Wb3IOWyfHObB06XB4gl 8IwgVCp8Ulusn+2s1HLkXZk2kIs/mtZy5uZhhPUxT/QW78kIMualIKLp0yN7CnCrXRFe yf7zHT2K50ueKYqmXFK6m6piLEc0meqgbsJ5fRjhsDalOCeM/0ku5lZeV2qat7BugMIQ qeN5RarAk8YKinDbk4jw0FFeX5a3L3aKqWhQeFtUX+oztZJlEER5rZ/hSXvufl01N8e1 QA/Z93ZavRMvsLZhayWAvluoYT24760UdW3sG6ObEaTcZvrdEUzF8c2aRYafixr+rx4s 9LeQ== X-Gm-Message-State: AOJu0YxrGb1oXg5G1wuC7qpjdWderoK4//yG6oT/gcwLcfpazkb9M0Ip lk++wcCzuzbtUv124WI+qKJh3Zwhu0gZAKg10gpIHFzBRtRidNsESJ4T+Q== X-Google-Smtp-Source: AGHT+IHCkT6vrBFDDSIPYdD6zdqTUiSeOu0wFGWaGR6b121TmASzb/zxRlf0F2SEo1p8W+D+h+SGBg== X-Received: by 2002:a05:6214:486:b0:6a0:ca8e:4fd2 with SMTP id pt6-20020a056214048600b006a0ca8e4fd2mr1440941qvb.52.1714705218245; Thu, 02 May 2024 20:00:18 -0700 (PDT) Received: from bruce-XPS-8940.localdomain (pool-174-112-62-108.cpe.net.cable.rogers.com. [174.112.62.108]) by smtp.gmail.com with ESMTPSA id mi5-20020a056214558500b006a0fa96013asm839357qvb.138.2024.05.02.20.00.17 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 02 May 2024 20:00:17 -0700 (PDT) From: bruce.ashfield@gmail.com To: steve@sakoman.com Cc: openembedded-core@lists.openembedded.org Subject: [OE-core][nanbield 02/10] linux-yocto/6.1: update to v6.1.80 Date: Thu, 2 May 2024 23:00:07 -0400 Message-Id: <20240503030015.374078-2-bruce.ashfield@gmail.com> X-Mailer: git-send-email 2.39.2 In-Reply-To: <20240503030015.374078-1-bruce.ashfield@gmail.com> References: <20240503030015.374078-1-bruce.ashfield@gmail.com> MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 03 May 2024 03:00:25 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/198957 From: Bruce Ashfield Updating linux-yocto/6.1 to the latest korg -stable release that comprises the following commits: a3eb3a74aa8c Linux 6.1.80 277439e7cabd fs/ntfs3: Enhance the attribute size check f119f2325ba7 arp: Prevent overflow in arp_req_get(). f8fc1f1d9f65 ahci: Extend ASM1061 43-bit DMA address quirk to other ASM106x parts 4a37c6c06834 ata: ahci: add identifiers for ASM2116 series adapters 70a4a2657201 mptcp: add needs_id for netlink appending addr b03bca85617b mptcp: userspace pm send RM_ADDR for ID 0 14f1992430ef mm: zswap: fix missing folio cleanup in writeback race path 18f614369def fs/aio: Restrict kiocb_set_cancel_fn() to I/O submitted via libaio 7ebeee513f8f mm/damon/reclaim: fix quota stauts loss due to online tunings 47467e04816c erofs: fix inconsistent per-file compression format 54407d9bc5e3 erofs: simplify compression configuration parser b1301f15ddc2 i2c: imx: when being a target, mark the last read as processed 58168005337e drm/amd/display: Fix memory leak in dm_sw_fini() fd7b4f4fdc7c drm/syncobj: call drm_syncobj_fence_add_wait when WAIT_AVAILABLE flag is set b9196289e36c net: phy: realtek: Fix rtl8211f_config_init() for RTL8211F(D)(I)-VD-CG PHY 37919ef31d7c Fix write to cloned skb in ipv6_hop_ioam() 9d5523e065b5 phonet/pep: fix racy skb_queue_empty() use f556a352fdb2 phonet: take correct lock to peek at the RX queue 1623161f80a4 net: sparx5: Add spinlock for frame transmission from CPU c22ad76cfc43 net: mctp: put sock on tag allocation failure ea33b8166912 netfilter: nf_tables: use kzalloc for hook allocation f30535918672 netfilter: nf_tables: register hooks last when adding new chain/flowtable 26994a04b0ba netfilter: nf_tables: rename function to destroy hook list a6cafdb49a7b netfilter: nft_flow_offload: release dst in case direct xmit path is used 012df10717da netfilter: nft_flow_offload: reset dst in route object after setting up flow 9c5662e95a8d netfilter: flowtable: simplify route logic 0c9302a6da26 netfilter: nf_tables: set dormant flag on hook register failure bdaf6bbfc1f2 tls: don't skip over different type records from the rx_list 6756168add1c tls: stop recv() if initial process_rx_list gave us non-DATA ca89b4f5034d tls: break out of main loop when PEEK gets a non-data record 4588b13abcbd bpf, sockmap: Fix NULL pointer dereference in sk_psock_verdict_data_ready() 11277d189267 s390: use the correct count for __iowrite64_copy() 18580e48e624 octeontx2-af: Consider the action set by PF 6216509a2e11 platform/x86: thinkpad_acpi: Only update profile if successfully converted 38c83c2488dc arm64/sme: Restore SME registers on exit from suspend fd84a5fae03c net: dev: Convert sa_data to flexible array in struct sockaddr 8391b9b651cf ipv6: sr: fix possible use-after-free and null-ptr-deref e8530b170e46 afs: Increase buffer size in afs_update_volume_status() addf5e297e6c bpf: Fix racing between bpf_timer_cancel_and_free and bpf_timer_cancel 9a581b17b722 ata: ahci_ceva: fix error handling for Xilinx GT PHY support e5703735e57a ipv6: properly combine dev_base_seq and ipv6.dev_addr_genid b43a4fb42fef ipv4: properly combine dev_base_seq and ipv4.dev_addr_genid 8e29f988ad32 net: stmmac: Fix incorrect dereference in interrupt handlers 25bd33b87f8a x86/numa: Fix the sort compare func used in numa_fill_memblks() ca4a1c00beff x86/numa: Fix the address overlap check in numa_fill_memblks() b06a3b1cbdfb nouveau: fix function cast warnings 729bc77af438 dccp/tcp: Unhash sk from ehash for tb2 alloc failure after check_estalblished(). 91ac2c79e896 net: bridge: switchdev: Ensure deferred event delivery on unoffload 2d5b4b3376fa net: bridge: switchdev: Skip MDB replays of deferred events on offload 44148c1c8245 scsi: jazz_esp: Only build if SCSI core is builtin 3c31b18a8dd8 scsi: smartpqi: Fix disable_managed_interrupts 758b8f5e0498 bpf, scripts: Correct GPL license name a9409d33af61 RDMA/srpt: fix function pointer cast warnings 5f69c475c147 arm64: dts: rockchip: set num-cs property for spi on px30 7f31a244c753 RDMA/qedr: Fix qedr_create_user_qp error flow 47e93d2f286e iommufd/iova_bitmap: Consider page offset for the pages to be pinned c5bc02f60d27 iommufd/iova_bitmap: Switch iova_bitmap::bitmap to an u8 array 8d3a5cbc1e92 iommufd/iova_bitmap: Bounds check mapped::pages access aee4dcfe1721 RDMA/srpt: Support specifying the srpt_service_guid parameter edc2a9afbebd RDMA/irdma: Add AE for too many RNRS 6f4553096ece RDMA/irdma: Set the CQ read threshold for GEN 1 429999729d4a RDMA/irdma: Validate max_send_wr and max_recv_wr b2e4a5266e3d RDMA/irdma: Fix KASAN issue with tasklet 75a64c641cf2 RDMA/bnxt_re: Return error for SRQ resize f0d857ce31a6 IB/hfi1: Fix a memleak in init_credit_return a6cada89ee5a Revert "drm/amd/display: increased min_dcfclk_mhz and min_fclk_mhz" 71787c665d09 mptcp: fix lockless access in subflow ULP diag 9e8e59af3a4a mptcp: add needs_id for userspace appending addr 42a841a84ffd mptcp: make userspace_pm_append_new_local_addr static 2f414a56b369 usb: roles: don't get/set_role() when usb_role_switch is unregistered 0158216805ca usb: roles: fix NULL pointer issue when put module's reference 35b604a37ec7 usb: gadget: ncm: Avoid dropping datagrams of properly parsed NTBs 9a52b694b066 usb: cdns3: fix memory double free when handle zero packet 2134e9906e17 usb: cdns3: fixed memory use after free at cdns3_gadget_ep_disable() c66a8008489b usb: cdnsp: fixed issue with incorrect detecting CDNSP family controllers 748cee4417f6 usb: cdnsp: blocked some cdns3 specific code 4dc87908b183 usb: dwc3: gadget: Don't disconnect if not started d4c7e4b1b024 serial: amba-pl011: Fix DMA transmission in RS485 mode d9d242625353 erofs: fix refcount on the metabuf used for inode lookup 943c8b1fcc86 dm-integrity, dm-verity: reduce stack usage for recheck 545a94ffc29a x86/alternative: Make custom return thunk unconditional b012dcf39d9e Revert "x86/alternative: Make custom return thunk unconditional" 1221b8ea25cc x86/returnthunk: Allow different return thunks 786f089086b5 ARM: ep93xx: Add terminator to gpiod_lookup_table 13cd1daeea84 l2tp: pass correct message length to ip6_append_data 2a19e0042bf1 PCI/MSI: Prevent MSI hardware interrupt number truncation e90211b1f7ac irqchip/sifive-plic: Enable interrupt if needed before EOI 75eaa3666e2c irqchip/gic-v3-its: Do not assume vPE tables are preallocated 62f361bfea60 crypto: virtio/akcipher - Fix stack overflow on memcpy 3963f16cc764 gtp: fix use-after-free and null-ptr-deref in gtp_genl_dump_pdp() 3ac3624a74cf KVM: arm64: vgic-its: Test for valid IRQ in its_sync_lpi_pending_table() 72fdbc728c33 KVM: arm64: vgic-its: Test for valid IRQ in MOVALL handler 6b2ff10390b1 md: Fix missing release of 'active_io' for flush 8b218e2f0a27 cachefiles: fix memory leak in cachefiles_add_cache() 9e7fc40377ec platform/x86: touchscreen_dmi: Allow partial (prefix) matches for ACPI names fff39f496265 platform/x86: intel-vbtn: Stop calling "VBDL" from notify_handler 19e5dc2e6bf7 mm: memcontrol: clarify swapaccount=0 deprecation warning 4c815c3a4834 mm/damon/lru_sort: fix quota status loss due to online tunings 2dedda77d449 mm/swap: fix race when skipping swapcache e3bf0a24e050 scsi: core: Consult supported VPD page list prior to fetching page f49b20fd0134 scsi: target: pscsi: Fix bio_put() for error case 031217128990 cxl/pci: Fix disabling memory if DVSEC CXL Range does not match a CFMWS window 27c1ade6068f dm-verity: recheck the hash after a failure e08c2a8d27e9 dm-crypt: don't modify the data when using authenticated encryption 906414f45964 dm-integrity: recheck the integrity tag after a failure 6437b0b4ddcd Revert "parisc: Only list existing CPUs in cpu_possible_mask" 5583552eec30 dm-crypt: recheck the integrity tag after a failure 287abdcb9e2b ata: libata-core: Do not try to set sleeping devices to standby 65c5a1ba2c32 s390/cio: fix invalid -EBUSY on ccw_device_start 47647795a630 drm/ttm: Fix an invalid freeing on already freed page in error path a262b78dd085 LoongArch: Disable IRQ before init_fn() for nonboot CPUs 52dc9a7a573d IB/hfi1: Fix sdma.h tx->num_descs off-by-one error 4aa4ea70f37c pmdomain: renesas: r8a77980-sysc: CR7 must be always on 339ddc983bc1 pmdomain: mediatek: fix race conditions with genpd 4dd73641d7ac smb3: clarify mount warning db48acce75d7 virtio-blk: Ensure no requests in virtqueues before deleting vqs. 0947d0d463d4 smb: client: set correct d_type for reparse points under DFS mounts 8b661fb17bfa drm/amdgpu: reset gpu for s3 suspend abort case d56edd0f1b30 drm/amdgpu: skip to program GFXDEC registers for suspend abort 6b82ffe7a265 firewire: core: send bus reset promptly on gap count error c0b07b4237e4 LoongArch: Select HAVE_ARCH_SECCOMP to use the common SECCOMP menu c920f604e0c8 LoongArch: Select ARCH_ENABLE_THP_MIGRATION instead of redefining it c7ac9c1f7f93 scsi: ufs: core: Remove the ufshcd_release() in ufshcd_err_handling_prepare() 75745f2b7453 scsi: lpfc: Use unsigned type for num_sge 76ee44af0975 hwmon: (coretemp) Enlarge per package core count limit 48a33c312526 efi: Don't add memblocks for soft-reserved memory 700c3f642c32 efi: runtime: Fix potential overflow of soft-reserved region size 2bf17c3e13aa wifi: mac80211: adding missing drv_mgd_complete_tx() call 4e5bd2287021 wifi: mac80211: set station RX-NSS on reconfig 6ed6cdbe8833 fs/ntfs3: Fix oob in ntfs_listxattr 5d67a4ff3dfe fs/ntfs3: Update inode->i_size after success write into compressed file 32a3974b26df fs/ntfs3: Correct function is_rst_area_valid 0d2f804b9f54 fs/ntfs3: Prevent generic message "attempt to access beyond end of device" 1c005ce9934c fs/ntfs3: use non-movable memory for ntfs3 MFT buffer cache ee12c3102027 fs/ntfs3: Disable ATTR_LIST_ENTRY size check 50545eb6cd5f fs/ntfs3: Add NULL ptr dereference checking at the end of attr_allocate_frame() 95bad562e575 fs/ntfs3: Fix detected field-spanning write (size 8) of single field "le->name" a9f7d7656fbc fs/ntfs3: Print warning while fixing hard links count 25d1694d6e34 fs/ntfs3: Correct hard links updating when dealing with DOS names 1970b5f2048f fs/ntfs3: Improve ntfs_dir_count 9c6684360692 fs/ntfs3: Modified fix directory element type detection b3a996b10694 Input: i8042 - add Fujitsu Lifebook U728 to i8042 quirk table 200627f46e03 ext4: correct the hole length returned by ext4_map_blocks() be36276cb88b smb: client: increase number of PDUs allowed in a compound request f9eef0e49515 nvmet-fc: take ref count on tgtport before delete assoc 9e6987f8937a nvmet-fc: avoid deadlock on delete association path 8b9e4539493b nvmet-fc: abort command when there is no binding 67e2ddf2324a nvmet-fc: hold reference on hostport match b8338116689a nvmet-fc: defer cleanup using RCU properly 6319ab29d5e0 nvmet-fc: release reference on target port 16b2b31ba886 nvmet-fcloop: swap the list_add_tail arguments 085195aa90a9 nvme-fc: do not wait in vain when unloading module dee697ac5330 ALSA: usb-audio: Ignore clock selector errors for single connection 5653a6d65a11 ASoC: wm_adsp: Don't overwrite fwf_name with the default bead6ff98689 drm/amd/display: increased min_dcfclk_mhz and min_fclk_mhz 41b256f473ac netfilter: conntrack: check SCTP_CID_SHUTDOWN_ACK for vtag setting in sctp_new 17fe3616d854 misc: open-dice: Fix spurious lockdep warning 1c57e5ef85c7 Input: xpad - add Lenovo Legion Go controllers 949296ee62db spi: sh-msiof: avoid integer overflow in constants 4dec3068eaa5 ASoC: sunxi: sun4i-spdif: Add support for Allwinner H616 c7bdaff0d075 ALSA: usb-audio: Check presence of valid altsetting control 1675aae9e19e usb: ucsi_acpi: Quirk to ack a connector change ack cmd fbd1cb2a9b77 nvmet-tcp: fix nvme tcp ida memory leak 13c1af5f3bc4 regulator: pwm-regulator: Add validity checks in continuous .get_voltage 9d508c897153 dmaengine: ti: edma: Add some null pointer checks to the edma_probe 3e746c4e4848 Input: goodix - accept ACPI resources with gpio_count == 3 && gpio_int_idx == 0 d639102f4cbd ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal() f97e75fa4e12 ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found() 8b40eb2e716b ext4: avoid dividing by 0 in mb_update_avg_fragment_size() when block bitmap corrupt a600d7f0c1d0 platform/x86: touchscreen_dmi: Add info for the TECLAST X16 Plus tablet 6c292c2f9027 MIPS: reserve exception vector space ONLY ONCE f48a6eb2e5e8 ahci: add 43-bit DMA address quirk for ASMedia ASM1061 controllers 2d623c94fbba aoe: avoid potential deadlock at set_capacity 41e137c2c75a ahci: asm1166: correct count of reported ports a2aa77b5d8e3 cifs: translate network errors on send to -ECONNABORTED bba595eb1422 smb: Work around Clang __bdos() type confusion 8fc80874103a block: Fix WARNING in _copy_from_iter f19361d570c6 spi: hisi-sfc-v3xx: Return IRQ_NONE if no interrupts were detected f329523f6a65 fbdev: sis: Error out if pixclock equals zero 070398d32c5f fbdev: savage: Error out if pixclock equals zero eb39bb548bf9 wifi: mac80211: fix race condition on enabling fast-xmit e540c4498387 wifi: cfg80211: fix missing interfaces when dumping d3dbfb9d11fc dmaengine: fsl-qdma: increase size of 'irq_name' 8dda42b1f2e4 dmaengine: shdma: increase size of 'dev_id' b2cb83539cdb cifs: open_cached_dir should not rely on primary channel e717bd412001 scsi: target: core: Add TMF to tmr_list handling c9ae228cfd1a dmaengine: apple-admac: Keep upper bits of REG_BUS_WIDTH 0d27ac177909 riscv/efistub: Ensure GP-relative addressing is not used 6967ddd378e9 PCI: dwc: Fix a 64bit bug in dw_pcie_ep_raise_msix_irq() 5552b7bf26d9 sched/rt: sysctl_sched_rr_timeslice show default timeslice after reset 89bebf275311 sched/rt: Disallow writing invalid values to sched_rt_period_us a41f6e170b85 net/sched: Retire dsmark qdisc 09038f47e45c net/sched: Retire ATM qdisc 02149c7cd115 net/sched: Retire CBQ qdisc Signed-off-by: Bruce Ashfield --- .../linux/linux-yocto-rt_6.1.bb | 6 ++-- .../linux/linux-yocto-tiny_6.1.bb | 6 ++-- meta/recipes-kernel/linux/linux-yocto_6.1.bb | 28 +++++++++---------- 3 files changed, 20 insertions(+), 20 deletions(-) diff --git a/meta/recipes-kernel/linux/linux-yocto-rt_6.1.bb b/meta/recipes-kernel/linux/linux-yocto-rt_6.1.bb index 4731848569..69d6b4bea9 100644 --- a/meta/recipes-kernel/linux/linux-yocto-rt_6.1.bb +++ b/meta/recipes-kernel/linux/linux-yocto-rt_6.1.bb @@ -14,13 +14,13 @@ python () { raise bb.parse.SkipRecipe("Set PREFERRED_PROVIDER_virtual/kernel to linux-yocto-rt to enable it") } -SRCREV_machine ?= "d99f54f4ced57500fd5c346afcfa79ff8bab6a61" -SRCREV_meta ?= "1a5f3ae5c51d6698be51e36bf547433564338b18" +SRCREV_machine ?= "6c4acb22266e16b25cc391f6c14d25358bdaeb9b" +SRCREV_meta ?= "4b4e682a21aa2796eb9ac95363cfd3849690f550" SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;branch=${KBRANCH};name=machine;protocol=https \ git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.1;destsuffix=${KMETA};protocol=https" -LINUX_VERSION ?= "6.1.79" +LINUX_VERSION ?= "6.1.80" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" diff --git a/meta/recipes-kernel/linux/linux-yocto-tiny_6.1.bb b/meta/recipes-kernel/linux/linux-yocto-tiny_6.1.bb index 178ab5b7d3..8f75e145e4 100644 --- a/meta/recipes-kernel/linux/linux-yocto-tiny_6.1.bb +++ b/meta/recipes-kernel/linux/linux-yocto-tiny_6.1.bb @@ -8,7 +8,7 @@ require recipes-kernel/linux/linux-yocto.inc # CVE exclusions include recipes-kernel/linux/cve-exclusion_6.1.inc -LINUX_VERSION ?= "6.1.79" +LINUX_VERSION ?= "6.1.80" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}" @@ -17,8 +17,8 @@ DEPENDS += "openssl-native util-linux-native" KMETA = "kernel-meta" KCONF_BSP_AUDIT_LEVEL = "2" -SRCREV_machine ?= "2ca50ef474eea7ab53d9f769b1502c7c9d4f28cc" -SRCREV_meta ?= "1a5f3ae5c51d6698be51e36bf547433564338b18" +SRCREV_machine ?= "878c7bd1da5733d94302744caeffd6952fb21946" +SRCREV_meta ?= "4b4e682a21aa2796eb9ac95363cfd3849690f550" PV = "${LINUX_VERSION}+git" diff --git a/meta/recipes-kernel/linux/linux-yocto_6.1.bb b/meta/recipes-kernel/linux/linux-yocto_6.1.bb index ec84d2614c..9e9f796980 100644 --- a/meta/recipes-kernel/linux/linux-yocto_6.1.bb +++ b/meta/recipes-kernel/linux/linux-yocto_6.1.bb @@ -18,25 +18,25 @@ KBRANCH:qemux86-64 ?= "v6.1/standard/base" KBRANCH:qemuloongarch64 ?= "v6.1/standard/base" KBRANCH:qemumips64 ?= "v6.1/standard/mti-malta64" -SRCREV_machine:qemuarm ?= "4c6c7312e0e95f7b076f86ef1d791c78d82ddeee" -SRCREV_machine:qemuarm64 ?= "2ca50ef474eea7ab53d9f769b1502c7c9d4f28cc" -SRCREV_machine:qemuloongarch64 ?= "2ca50ef474eea7ab53d9f769b1502c7c9d4f28cc" -SRCREV_machine:qemumips ?= "b2a27a5acb88b991bc6d822f9fdc308d5a108583" -SRCREV_machine:qemuppc ?= "ef1506156c8b381a51c4937c43bca036170df29e" -SRCREV_machine:qemuriscv64 ?= "2ca50ef474eea7ab53d9f769b1502c7c9d4f28cc" -SRCREV_machine:qemuriscv32 ?= "2ca50ef474eea7ab53d9f769b1502c7c9d4f28cc" -SRCREV_machine:qemux86 ?= "2ca50ef474eea7ab53d9f769b1502c7c9d4f28cc" -SRCREV_machine:qemux86-64 ?= "2ca50ef474eea7ab53d9f769b1502c7c9d4f28cc" -SRCREV_machine:qemumips64 ?= "3a17a35babd86c4bc9121469801a04248bf7ae99" -SRCREV_machine ?= "2ca50ef474eea7ab53d9f769b1502c7c9d4f28cc" -SRCREV_meta ?= "1a5f3ae5c51d6698be51e36bf547433564338b18" +SRCREV_machine:qemuarm ?= "d46a9061129185398c5550d2d37ad9e628a488d3" +SRCREV_machine:qemuarm64 ?= "878c7bd1da5733d94302744caeffd6952fb21946" +SRCREV_machine:qemuloongarch64 ?= "878c7bd1da5733d94302744caeffd6952fb21946" +SRCREV_machine:qemumips ?= "c511f69211cb6dc994a92478449aa022a0fc367a" +SRCREV_machine:qemuppc ?= "fc16624451c0d2d7b7a34addf4c5f4f96950614e" +SRCREV_machine:qemuriscv64 ?= "878c7bd1da5733d94302744caeffd6952fb21946" +SRCREV_machine:qemuriscv32 ?= "878c7bd1da5733d94302744caeffd6952fb21946" +SRCREV_machine:qemux86 ?= "878c7bd1da5733d94302744caeffd6952fb21946" +SRCREV_machine:qemux86-64 ?= "878c7bd1da5733d94302744caeffd6952fb21946" +SRCREV_machine:qemumips64 ?= "0c7a9b0639caf832c1b82edc0334880a4a093cda" +SRCREV_machine ?= "878c7bd1da5733d94302744caeffd6952fb21946" +SRCREV_meta ?= "4b4e682a21aa2796eb9ac95363cfd3849690f550" # set your preferred provider of linux-yocto to 'linux-yocto-upstream', and you'll # get the /base branch, which is pure upstream -stable, and the same # meta SRCREV as the linux-yocto-standard builds. Select your version using the # normal PREFERRED_VERSION settings. BBCLASSEXTEND = "devupstream:target" -SRCREV_machine:class-devupstream ?= "81e1dc2f70014b9523dd02ca763788e4f81e5bac" +SRCREV_machine:class-devupstream ?= "a3eb3a74aa8c94e6c8130b55f3b031f29162868c" PN:class-devupstream = "linux-yocto-upstream" KBRANCH:class-devupstream = "v6.1/base" @@ -45,7 +45,7 @@ SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;name=machine;branch=${KBRA SRC_URI += "file://0001-perf-cpumap-Make-counter-as-unsigned-ints.patch" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" -LINUX_VERSION ?= "6.1.79" +LINUX_VERSION ?= "6.1.80" PV = "${LINUX_VERSION}+git" From patchwork Fri May 3 03:00:08 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Bruce Ashfield X-Patchwork-Id: 43216 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 95C8EC25B10 for ; Fri, 3 May 2024 03:00:25 +0000 (UTC) Received: from mail-vs1-f51.google.com (mail-vs1-f51.google.com [209.85.217.51]) by mx.groups.io with SMTP id smtpd.web11.4327.1714705220406099508 for ; Thu, 02 May 2024 20:00:20 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@gmail.com header.s=20230601 header.b=dpe+DKlo; spf=pass (domain: gmail.com, ip: 209.85.217.51, mailfrom: bruce.ashfield@gmail.com) Received: by mail-vs1-f51.google.com with SMTP id ada2fe7eead31-479c39b78dbso2929432137.2 for ; Thu, 02 May 2024 20:00:20 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1714705219; x=1715310019; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=8+1u+SMk2nNyuRLAAkq/UIY6yj+ekDA0ph4XeeYQY+w=; b=dpe+DKloA7RYd2wm5B+kuVbR+/M34Er5y8kVmnr8RmflLuRdNCgKSp0ERjuYRQxGIA lZA7rj+9tpJcOL4t+OVVAJWr82xWcC9MRT2ikDE2VdBXMceLB4f6OzCoiXKJEH1SF5nq Pm2Vp0lBMOERAddwVxCRUH7lDyLRmMaQskfVhhz430s84DiFUCMprunTlAIe1o4g7E5H Q6gDCHBOO9BFCMl6dMRuYqiRK9s74bIA1VJ9I3a/g05GzvtkVm1gwFY9gNhS7j3/AKUc UFm8Qx7VKoaJ542EgkqFODkaoiAaXPwSEp+ZoFmgb0zrdgpYfbZ73AKNFvioWDy+tENp xQVQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1714705219; x=1715310019; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=8+1u+SMk2nNyuRLAAkq/UIY6yj+ekDA0ph4XeeYQY+w=; b=UNzgWJvB8r2jPoc4tjGp7rziwdqx1sV3AmEgi9m7FaqFUA2z6KwwKyLWo2gzMt5JoU R3iQV2jjc18zdDCNFbdYPT1QhGZW7SOjpQyHE7HMuuRHchamZqlSXfFfLi7X7xnuKq0n 8wgc1OfthuTMkASONlUKRTQC0yyuUSRnyW4BDluadRbKbSMkewg2LgWvDG/eLjSE0AU7 YJKGjMrCaXE8vyNvV8KvGwcz4keAqE3fqlgBr2cy+1lSwtgaImsONdSgWMpCZbhBNk0k qxsvmax8dd9UYPV5XxISIowovJOhGrw4VWzCJyg1YS5xIJnyvtF4wuoJuULSzlQkATPh 9pJA== X-Gm-Message-State: AOJu0YwpZerGJJdZwO76YRbPtzheLqkFw9c3uNNovsdcygExB0s9kptn aeNQEf0Rrnv/S8BULqH/tXAPTDf2mvYsrCu360MKM5qZjYE6Swv+Tlsdkg== X-Google-Smtp-Source: AGHT+IGjw8/1Qt/4+Mr9EeY7GrdsBDyrPqQhl+aiETLC+rRMaXH9q5vpjidBvk+uIpz+ukLU21OqMw== X-Received: by 2002:a67:b648:0:b0:47e:f86b:39e6 with SMTP id e8-20020a67b648000000b0047ef86b39e6mr1755005vsm.21.1714705219190; Thu, 02 May 2024 20:00:19 -0700 (PDT) Received: from bruce-XPS-8940.localdomain (pool-174-112-62-108.cpe.net.cable.rogers.com. [174.112.62.108]) by smtp.gmail.com with ESMTPSA id mi5-20020a056214558500b006a0fa96013asm839357qvb.138.2024.05.02.20.00.18 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 02 May 2024 20:00:18 -0700 (PDT) From: bruce.ashfield@gmail.com To: steve@sakoman.com Cc: openembedded-core@lists.openembedded.org Subject: [OE-core][nanbield 03/10] linux-yocto/6.1: update to v6.1.81 Date: Thu, 2 May 2024 23:00:08 -0400 Message-Id: <20240503030015.374078-3-bruce.ashfield@gmail.com> X-Mailer: git-send-email 2.39.2 In-Reply-To: <20240503030015.374078-1-bruce.ashfield@gmail.com> References: <20240503030015.374078-1-bruce.ashfield@gmail.com> MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 03 May 2024 03:00:25 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/198958 From: Bruce Ashfield Updating linux-yocto/6.1 to the latest korg -stable release that comprises the following commits: 61adba85cc40 Linux 6.1.81 585a344af6bc xen/events: close evtchn after mapping cleanup 8866334e3510 x86/efistub: Give up if memory attribute protocol returns an error 2d7ebcb5d878 bpf: Derive source IP addr via bpf_*_fib_lookup() 5fafd8254add bpf: Add table ID to bpf_fib_lookup BPF helper da67116b74e6 KVM/VMX: Move VERW closer to VMentry for MDS mitigation edfaad334a11 KVM/VMX: Use BT+JNC, i.e. EFLAGS.CF to select VMRESUME vs. VMLAUNCH 07946d956b55 x86/bugs: Use ALTERNATIVE() instead of mds_user_clear static key 2e3087505ddb x86/entry_32: Add VERW just before userspace transition 22444d079b4c x86/entry_64: Add VERW just before userspace transition 29d3e02fb448 x86/bugs: Add asm helpers for executing VERW 559035e04e44 Revert "interconnect: Teach lockdep about icc_bw_lock order" 19ec82b3cad1 Revert "interconnect: Fix locking for runpm vs reclaim" 0e351d1aa2e4 block: define bvec_iter as __packed __aligned(4) c6ff5fb6b157 gpio: fix resource unwinding order in error path 17acece41de3 gpiolib: Fix the error path order in gpiochip_add_data_with_key() a3d369aeb332 gpio: 74x164: Enable output pins after registers are reset 7eb95e0af5c9 powerpc/pseries/iommu: IOMMU table is not initialized for kdump over SR-IOV 2c96f66cd0cc phy: freescale: phy-fsl-imx8-mipi-dphy: Fix alias name to use dashes c4c795b21dd2 af_unix: Drop oob_skb ref before purging queue in GC. 2402392bed4e efi/x86: Fix the missing KASLR_FLAG bit in boot_params->hdr.loadflags 3a396c409a39 x86/boot: efistub: Assign global boot_params variable 8f05493706ff x86/boot: Rename conflicting 'boot_params' pointer to 'boot_params_ptr' 86c909d2275b x86/efistub: Avoid placing the kernel below LOAD_PHYSICAL_ADDR 1b5406257679 efi/x86: Avoid physical KASLR on older Dell systems 2dfaeac3f38e x86/efistub: Avoid legacy decompressor when doing EFI boot fff7614f576f x86/efistub: Perform SNP feature test while running in the firmware 77330c123d7c x86/efistub: Prefer EFI memory attributes protocol over DXE services 5a664585a71c x86/decompressor: Factor out kernel decompression and relocation 350265a753d8 x86/efistub: Perform 4/5 level paging switch from the stub 476a48cd37c9 efi/libstub: Add limit argument to efi_random_alloc() 8ff6d88c0443 efi/libstub: Add memory attribute protocol definitions 34378d7ad273 x86/efistub: Clear BSS in EFI handover protocol entrypoint 1f3fd81bff03 x86/decompressor: Avoid magic offsets for EFI handover entrypoint f0acafd6f79f x86/efistub: Simplify and clean up handover entry code 33d064aecd89 efi: efivars: prevent double registration e58f2862e9fe arm64: efi: Limit allocations to 48-bit addressable physical region 56587affe21c nfsd: don't destroy global nfs4_file table in per-net shutdown f3ea5ec83d1a NFSD: replace delayed_work with work_struct for nfsd_client_shrinker c479755cb80a NFSD: register/unregister of nfsd-client shrinker at nfsd startup/shutdown time ce606d5334c2 NFSD: Use set_bit(RQ_DROPME) 5c6c2fb3c12f NFSD: Avoid clashing function prototypes eb7373312430 NFSD: Use only RQ_DROPME to signal the need to drop a reply 7b2b8a6c75f0 NFSD: add CB_RECALL_ANY tracepoints f28dae54632c NFSD: add delegation reaper to react to low memory condition f30f07ba5789 NFSD: add support for sending CB_RECALL_ANY 4481d72a4b63 NFSD: refactoring courtesy_client_reaper to a generic low memory shrinker 371e1c1b326b trace: Relocate event helper files 0920deeec6dd lockd: fix file selection in nlmsvc_cancel_blocked ccbf6efab8d3 lockd: ensure we use the correct file descriptor when unlocking 8973a8f9b72d lockd: set missing fl_flags field when retrieving args 12e63680a76c NFSD: Use struct_size() helper in alloc_session() 8b7be6ef588e nfsd: fix up the filecache laundrette scheduling e017486dadf9 nfsd: use locks_inode_context helper c66f9f22e6e5 lockd: use locks_inode_context helper 1f76cb66ff22 filelock: add a new locks_inode_context accessor function 6b12589f610a NFSD: Fix licensing header in filecache.c 5a1f61516f80 NFSD: Use rhashtable for managing nfs4_file objects 49e8d9f46500 NFSD: Refactor find_file() 0d4150f5eb20 NFSD: Clean up find_or_add_file() 5aa0c564c017 NFSD: Add a nfsd4_file_hash_remove() helper c8d8876aae34 NFSD: Clean up nfsd4_init_file() 6ee5c4e269a9 NFSD: Update file_hashtbl() helpers 255ac53d78d5 NFSD: Use const pointers as parameters to fh_ helpers fae3f8b554fa NFSD: Trace delegation revocations 9fbef7dcd8aa NFSD: Trace stateids returned via DELEGRETURN 519a80ea5a17 NFSD: Clean up nfs4_preprocess_stateid_op() call sites e62d8c128166 NFSD: Flesh out a documenting comment for filecache.c 137d20da8ea0 exportfs: use pr_debug for unreachable debug statements f82865e2a026 nfsd: allow disabling NFSv2 at compile time 850333a25aab nfsd: move nfserrno() to vfs.c bfef0cfab41c nfsd: ignore requests to disable unsupported versions 0a49efb94888 NFSD: Remove redundant assignment to variable host_err d03a9855cbe6 NFSD: Simplify READ_PLUS 831e9e63cc3b NFS: Fix data corruption caused by congestion. 04dd4403ff37 drm/amd/display: Increase frame warning limit with KASAN or KCSAN in dml bf0ca988e250 decompress: Use 8 byte alignment 5c4feadb0011 x86/decompressor: Move global symbol references to C code 463b51e90c57 x86/decompressor: Merge trampoline cleanup with switching code df3dec320b7c x86/decompressor: Pass pgtable address to trampoline directly e2fa53a04cc7 x86/decompressor: Only call the trampoline when changing paging levels 364d7745974f x86/decompressor: Call trampoline directly from C code 1523291591de x86/decompressor: Avoid the need for a stack in the 32-bit trampoline 6083b4c5908e x86/decompressor: Use standard calling convention for trampoline 640f27fc2e7b x86/decompressor: Call trampoline as a normal function 99a20f58913a x86/decompressor: Assign paging related global variables earlier 2cca5f519e3a x86/decompressor: Store boot_params pointer in callee save register 51a0710218ce x86/efistub: Branch straight to kernel entry point from C code 4f3077c3eae7 x86/boot: Robustify calling startup_{32,64}() from the decompressor code 7bc9533e077e x86/efi: Make the deprecated EFI handover protocol optional a8901f331b8b efi: verify that variable services are supported 71c43b714fd6 x86/boot/compressed: Only build mem_encrypt.S if AMD_MEM_ENCRYPT=y cac22c9a5e66 x86/boot/compressed: Adhere to calling convention in get_sev_encryption_bit() 0912dce9ed4e x86/boot/compressed: Move startup32_check_sev_cbit() out of head_64.S e840ae3dc277 x86/boot/compressed: Move startup32_check_sev_cbit() into .text 801873f1750a x86/boot/compressed: Move startup32_load_idt() out of head_64.S 2e47116315a0 x86/boot/compressed: Move startup32_load_idt() into .text section 29134968f72d x86/boot/compressed: Pull global variable reference into startup32_load_idt() 530a4271b7ba x86/boot/compressed: Avoid touching ECX in startup32_set_idt_entry() 88035744b91a x86/boot/compressed: Simplify IDT/GDT preserve/restore in the EFI thunk ef12d049fa7b x86/boot/compressed, efi: Merge multiple definitions of image_offset into one beeeb4655db9 x86/boot/compressed: Move efi32_pe_entry() out of head_64.S 469b84516cc4 x86/boot/compressed: Move efi32_entry out of head_64.S c577208f81c9 x86/boot/compressed: Move efi32_pe_entry into .text section d8950e8e20e0 x86/boot/compressed: Move bootargs parsing out of 32-bit startup code 3bad8dc0ae8d x86/boot/compressed: Move 32-bit entrypoint code into .text section bad6e66d0701 x86/boot/compressed: Rename efi_thunk_64.S to efi-mixed.S e7945d93fece efi: libstub: use EFI_LOADER_CODE region when moving the kernel in memory 2d9b3e1ae1be RDMA/core: Update CMA destination address on rdma_resolve_addr 88067197e97a RDMA/core: Refactor rdma_bind_addr f27d319df055 mptcp: fix possible deadlock in subflow diag d93fd40c6239 mptcp: fix double-free on socket dismantle a8722cece375 mptcp: fix snd_wnd initialization for passive socket 03ad085eb14d selftests: mptcp: join: add ss mptcp support check 84a3c10a0c79 mptcp: push at DSS boundaries fb7be5e5ec26 mptcp: map v4 address to v6 when destroying subflow 53e3f2ee8a0c mptcp: continue marking the first subflow as UNCONNECTED fbccc5eb1652 mptcp: fix duplicate subflow creation e64148635509 mptcp: fix data races on remote_id e6e04845c2e8 mptcp: fix data races on local_id 65742f4bb1f9 x86/cpu/intel: Detect TME keyid bits before setting MTRR mask registers c9fa51d4c434 x86/e820: Don't reserve SETUP_RNG_SEED in e820 396a4120011d pmdomain: qcom: rpmhpd: Fix enabled_corner aggregation 249d6ca4ff00 efivarfs: Request at most 512 bytes for variable names 76109a226a39 riscv: add CALLER_ADDRx support 4974d928d5e3 mmc: sdhci-xenon: fix PHY init clock stability c65c47556085 mmc: sdhci-xenon: add timeout for PHY init complete bc9f87a41d18 mmc: core: Fix eMMC initialization with 1-bit bus connection 70af82bb9c89 mmc: mmci: stm32: fix DMA API overlapping mappings warning 474d521da890 dmaengine: fsl-qdma: init irq after reg initialization 300111cd9042 dmaengine: ptdma: use consistent DMA masks 034e2d70b5c7 crypto: arm64/neonbs - fix out-of-bounds access on short input 237ecf1afe6c dmaengine: fsl-qdma: fix SoC may hang on 16 byte unaligned read 8dafc066c546 drm/buddy: fix range bias 2e443ed55fe3 Revert "drm/amd/pm: resolve reboot exception for si oland" 444d70889d19 btrfs: send: don't issue unnecessary zero writes for trailing hole f590040ce2b7 btrfs: dev-replace: properly validate device names c34adc20b91a btrfs: fix double free of anonymous device after snapshot creation failure 930e826962d9 wifi: nl80211: reject iftype change with mesh ID change abd32d7f5c02 gtp: fix use-after-free and null-ptr-deref in gtp_newlink() 59ed284c7bff landlock: Fix asymmetric private inodes referring fd3289ab8ed1 ALSA: hda/realtek: fix mute/micmute LED For HP mt440 4cbbc2f0dbe2 ALSA: hda/realtek: Enable Mute LED on HP 840 G8 (MB 8AB8) 8cec41a35065 ALSA: firewire-lib: fix to check cycle continuity 3bfe04c1273d tomoyo: fix UAF write bug in tomoyo_write_control() 8f626221e5fa of: property: fw_devlink: Fix stupid bug in remote-endpoint parsing 8310080799b4 riscv: Sparse-Memory/vmemmap out-of-bounds fix 058ed71e0f7a afs: Fix endless loop in directory parsing 2f91a96b892f fbcon: always restore the old font data in fbcon_do_set_font() d36b9a1b4e52 drm/tegra: Remove existing framebuffer only if we support display 7f8644b6a86d ALSA: Drop leftover snd-rtctimer stuff from Makefile cefe18e9ec84 power: supply: bq27xxx-i2c: Do not free non existing IRQ ddc547dd05a4 efi/capsule-loader: fix incorrect allocation size 08562ca971ff tls: fix peeking with sync+async decryption 40f0f326cfe6 tls: decrement decrypt_pending if no async completion will be called 7d4121b40149 net: hsr: Use correct offset for HSR TLV values in supervisory HSR frames a0222b481757 igb: extend PTP timestamp adjustments to i211 f2261eb994aa rtnetlink: fix error logic of IFLA_BRIDGE_FLAGS writing back 2b1414d5e94e netfilter: bridge: confirm multicast packets before passing them up the stack b8afc22a1160 netfilter: let reset rules clean out conntrack entries ddf6ee3df30b netfilter: nf_tables: allow NFPROTO_INET in nft_(match/target)_validate() 92b8a3273f38 Bluetooth: hci_qca: Set BDA quirk bit if fwnode exists in DT 67ffc334b92a Bluetooth: qca: add support for WCN7850 fc47ed389a88 Bluetooth: qca: use switch case for soc type behavior 940963613275 Bluetooth: btqca: Add WCN3988 support 29059d0f3bc2 Bluetooth: btqca: use le32_to_cpu for ver.soc_id e5383662fd02 Bluetooth: hci_qca: Add support for QTI Bluetooth chip wcn6855 eb7b5777d3c7 Bluetooth: hci_qca: mark OF related data as maybe unused 7b410226d9ef Bluetooth: qca: Fix wrong event type for patch config command 2dc94c160ef0 Bluetooth: Enforce validation on max value of connection interval 30a5e812f78e Bluetooth: hci_event: Fix handling of HCI_EV_IO_CAPA_REQUEST 0b056a52b3ad Bluetooth: hci_event: Fix wrongly recorded wakeup BD_ADDR 926405765f25 Bluetooth: hci_sync: Fix accept_list when attempting to suspend 45085686b955 Bluetooth: Avoid potential use-after-free in hci_error_reset cad078914b62 Bluetooth: hci_sync: Check the correct flag before starting a scan 17ccd9798fe0 stmmac: Clear variable when destroying workqueue aa5897232682 uapi: in6: replace temporary label with rfc9486 1b4223e807fa net: lan78xx: fix "softirq work is pending" error d77ab053fb2f net: usb: dm9601: fix wrong return value in dm9601_mdio_read 548ab6673084 veth: try harder when allocating queue memory c41548fede3d lan78xx: enable auto speed configuration for LAN7850 if no EEPROM is detected 1b0998fdd857 ipv6: fix potential "struct net" leak in inet6_rtm_getaddr() 7985d73961bb net: veth: clear GRO when clearing XDP even when down e85b3c15398f cpufreq: intel_pstate: fix pstate limits enforcement for adjust_perf call back 29360fd3288f tun: Fix xdp_rxq_info's queue_index when detaching a3c8fa54e904 net: mctp: take ownership of skb in mctp_local_output ab63de24ebea net: ip_tunnel: prevent perpetual headroom growth 0ac219c4c3ab netlink: add nla be16/32 types to minlen array 0b27bf4c494d netlink: Fix kernel-infoleak-after-free in __skb_datagram_iter 65a389ef979b mtd: spinand: gigadevice: Fix the get ecc status issue 87632bc9ecff mm: huge_memory: don't force huge page alignment on 32 bit afbf1a5cef46 RDMA/core: Fix multiple -Warray-bounds warnings e5f488993bc1 iommu/arm-smmu-qcom: Limit the SMR groups to 128 329fc4d3f73d fs/ntfs3: Fix NULL pointer dereference in 'ni_write_inode' b3152afc0eb8 fs/ntfs3: Fix NULL dereference in ni_write_inode 0d04e45c65f0 fs/ntfs3: Add length check in indx_get_root 976126f2def4 clk: tegra20: fix gcc-7 constant overflow warning 39c631200957 fs/ntfs3: Fix a possible null-pointer dereference in ni_clear() e89c84422f35 iommu/arm-smmu-v3: Acknowledge pri/event queue overflow if any 8745f3592ee4 iommu/sprd: Release dma buffer to avoid memory leak f8faa536370e Input: xpad - add constants for GIP interface numbers ed9fdc82cafb usb: gadget: Properly configure the device for remote wakeup 49e734926a4b ARM: dts: imx7s: Drop dma-apb interrupt-names 0cea0c330a11 ARM: dts: imx: Adjust dma-apbh node name 507eeaad4d32 PCI: layerscape: Add workaround for lost link capabilities during reset e30f82597bf6 PCI: layerscape: Add the endpoint linkup notifier support 5dbedec7e5cf mlxsw: spectrum_acl_tcam: Add missing mutex_destroy() 174ac6b53a20 mlxsw: spectrum_acl_tcam: Make fini symmetric to init 00459ae532d6 net: restore alpha order to Ethernet devices in config a76072bc73c7 of: overlay: Reorder struct fragment fields kerneldoc 2a3d40b4025f af_unix: Fix task hung while purging oob_skb in GC. b73dd5f99972 scsi: sd: usb_storage: uas: Access media prior to querying device properties cf33e6ca12d8 scsi: core: Add struct for args to execution functions 7d34b1078665 drm/meson: Don't remove bridges which are created by other drivers ae5f10ed9539 drm/meson: fix unbind path if HDMI fails to bind b7be6c737a17 netfilter: nf_tables: disallow timeout for anonymous sets Signed-off-by: Bruce Ashfield --- .../linux/linux-yocto-rt_6.1.bb | 6 ++-- .../linux/linux-yocto-tiny_6.1.bb | 6 ++-- meta/recipes-kernel/linux/linux-yocto_6.1.bb | 28 +++++++++---------- 3 files changed, 20 insertions(+), 20 deletions(-) diff --git a/meta/recipes-kernel/linux/linux-yocto-rt_6.1.bb b/meta/recipes-kernel/linux/linux-yocto-rt_6.1.bb index 69d6b4bea9..cd9deafb8d 100644 --- a/meta/recipes-kernel/linux/linux-yocto-rt_6.1.bb +++ b/meta/recipes-kernel/linux/linux-yocto-rt_6.1.bb @@ -14,13 +14,13 @@ python () { raise bb.parse.SkipRecipe("Set PREFERRED_PROVIDER_virtual/kernel to linux-yocto-rt to enable it") } -SRCREV_machine ?= "6c4acb22266e16b25cc391f6c14d25358bdaeb9b" -SRCREV_meta ?= "4b4e682a21aa2796eb9ac95363cfd3849690f550" +SRCREV_machine ?= "5c94f8a3f0df3075a8b7883ef7675a3ac9bf5e58" +SRCREV_meta ?= "b508a9d9a5ca890a54488d93773a2a86c0e329e7" SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;branch=${KBRANCH};name=machine;protocol=https \ git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.1;destsuffix=${KMETA};protocol=https" -LINUX_VERSION ?= "6.1.80" +LINUX_VERSION ?= "6.1.81" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" diff --git a/meta/recipes-kernel/linux/linux-yocto-tiny_6.1.bb b/meta/recipes-kernel/linux/linux-yocto-tiny_6.1.bb index 8f75e145e4..faf26e56e8 100644 --- a/meta/recipes-kernel/linux/linux-yocto-tiny_6.1.bb +++ b/meta/recipes-kernel/linux/linux-yocto-tiny_6.1.bb @@ -8,7 +8,7 @@ require recipes-kernel/linux/linux-yocto.inc # CVE exclusions include recipes-kernel/linux/cve-exclusion_6.1.inc -LINUX_VERSION ?= "6.1.80" +LINUX_VERSION ?= "6.1.81" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}" @@ -17,8 +17,8 @@ DEPENDS += "openssl-native util-linux-native" KMETA = "kernel-meta" KCONF_BSP_AUDIT_LEVEL = "2" -SRCREV_machine ?= "878c7bd1da5733d94302744caeffd6952fb21946" -SRCREV_meta ?= "4b4e682a21aa2796eb9ac95363cfd3849690f550" +SRCREV_machine ?= "3405bbdc5cfb59d25351b6f7409c1e47cb51fba8" +SRCREV_meta ?= "b508a9d9a5ca890a54488d93773a2a86c0e329e7" PV = "${LINUX_VERSION}+git" diff --git a/meta/recipes-kernel/linux/linux-yocto_6.1.bb b/meta/recipes-kernel/linux/linux-yocto_6.1.bb index 9e9f796980..36d9d2041e 100644 --- a/meta/recipes-kernel/linux/linux-yocto_6.1.bb +++ b/meta/recipes-kernel/linux/linux-yocto_6.1.bb @@ -18,25 +18,25 @@ KBRANCH:qemux86-64 ?= "v6.1/standard/base" KBRANCH:qemuloongarch64 ?= "v6.1/standard/base" KBRANCH:qemumips64 ?= "v6.1/standard/mti-malta64" -SRCREV_machine:qemuarm ?= "d46a9061129185398c5550d2d37ad9e628a488d3" -SRCREV_machine:qemuarm64 ?= "878c7bd1da5733d94302744caeffd6952fb21946" -SRCREV_machine:qemuloongarch64 ?= "878c7bd1da5733d94302744caeffd6952fb21946" -SRCREV_machine:qemumips ?= "c511f69211cb6dc994a92478449aa022a0fc367a" -SRCREV_machine:qemuppc ?= "fc16624451c0d2d7b7a34addf4c5f4f96950614e" -SRCREV_machine:qemuriscv64 ?= "878c7bd1da5733d94302744caeffd6952fb21946" -SRCREV_machine:qemuriscv32 ?= "878c7bd1da5733d94302744caeffd6952fb21946" -SRCREV_machine:qemux86 ?= "878c7bd1da5733d94302744caeffd6952fb21946" -SRCREV_machine:qemux86-64 ?= "878c7bd1da5733d94302744caeffd6952fb21946" -SRCREV_machine:qemumips64 ?= "0c7a9b0639caf832c1b82edc0334880a4a093cda" -SRCREV_machine ?= "878c7bd1da5733d94302744caeffd6952fb21946" -SRCREV_meta ?= "4b4e682a21aa2796eb9ac95363cfd3849690f550" +SRCREV_machine:qemuarm ?= "fd979501e96642c64fa1cc9c81713f4ec098a5c7" +SRCREV_machine:qemuarm64 ?= "3405bbdc5cfb59d25351b6f7409c1e47cb51fba8" +SRCREV_machine:qemuloongarch64 ?= "3405bbdc5cfb59d25351b6f7409c1e47cb51fba8" +SRCREV_machine:qemumips ?= "217690aa1afe0b40d10f05cc96826a264fa5f0ac" +SRCREV_machine:qemuppc ?= "df23dc9de645adb30b9df6d7c26f3245aa6a1716" +SRCREV_machine:qemuriscv64 ?= "3405bbdc5cfb59d25351b6f7409c1e47cb51fba8" +SRCREV_machine:qemuriscv32 ?= "3405bbdc5cfb59d25351b6f7409c1e47cb51fba8" +SRCREV_machine:qemux86 ?= "3405bbdc5cfb59d25351b6f7409c1e47cb51fba8" +SRCREV_machine:qemux86-64 ?= "3405bbdc5cfb59d25351b6f7409c1e47cb51fba8" +SRCREV_machine:qemumips64 ?= "7c8d52cdd913121fc0b5f1c9393b49ef680931de" +SRCREV_machine ?= "3405bbdc5cfb59d25351b6f7409c1e47cb51fba8" +SRCREV_meta ?= "b508a9d9a5ca890a54488d93773a2a86c0e329e7" # set your preferred provider of linux-yocto to 'linux-yocto-upstream', and you'll # get the /base branch, which is pure upstream -stable, and the same # meta SRCREV as the linux-yocto-standard builds. Select your version using the # normal PREFERRED_VERSION settings. BBCLASSEXTEND = "devupstream:target" -SRCREV_machine:class-devupstream ?= "a3eb3a74aa8c94e6c8130b55f3b031f29162868c" +SRCREV_machine:class-devupstream ?= "61adba85cc40287232a539e607164f273260e0fe" PN:class-devupstream = "linux-yocto-upstream" KBRANCH:class-devupstream = "v6.1/base" @@ -45,7 +45,7 @@ SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;name=machine;branch=${KBRA SRC_URI += "file://0001-perf-cpumap-Make-counter-as-unsigned-ints.patch" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" -LINUX_VERSION ?= "6.1.80" +LINUX_VERSION ?= "6.1.81" PV = "${LINUX_VERSION}+git" From patchwork Fri May 3 03:00:09 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Bruce Ashfield X-Patchwork-Id: 43215 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 95CC6C41513 for ; Fri, 3 May 2024 03:00:25 +0000 (UTC) Received: from mail-qv1-f48.google.com (mail-qv1-f48.google.com [209.85.219.48]) by mx.groups.io with SMTP id smtpd.web11.4328.1714705222237340237 for ; Thu, 02 May 2024 20:00:22 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@gmail.com header.s=20230601 header.b=UXBC3qVI; spf=pass (domain: gmail.com, ip: 209.85.219.48, mailfrom: bruce.ashfield@gmail.com) Received: by mail-qv1-f48.google.com with SMTP id 6a1803df08f44-6a073f10e8eso39575536d6.2 for ; Thu, 02 May 2024 20:00:22 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1714705221; x=1715310021; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=/uWRmq+L2AKXnzKLZimi7bPoU8Wa0CpHm1RLUpNSwvg=; b=UXBC3qVIuB1XknBjLtKxlZAq1H+ph7l+HJt2hC4l0SwJapM0vBRt+v3jtdnXt4N+kU DnDqHkpruC7jVLHF4MA1WTZSSe5rw8Rc2mLC4+TP/VMWK6dmE4UZ0FE7huCNyaTPS3io i84B0btufN1yq6EyTraKuRFjcSmJw4cfSxax7S5DxbjxirBRK+wzun3Ch8uQO47jkdkE 2WWcH37h/vLBBpt+RNdLAfZV0kBPVagNwPLlpULtci7uXdOLPHiibivU3G+p0LjGap3K eB+W7a9v1EnzT+dRCq7JBXByZRu20xg5WOi+EuEXVvLCexBFRd0uQLn+0gIBWwD2IhUM LteA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1714705221; x=1715310021; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=/uWRmq+L2AKXnzKLZimi7bPoU8Wa0CpHm1RLUpNSwvg=; b=R/AZAxH/IHOKcAr6pmCtmFArc1oBwkEYHkn9elskAg9OuvF0WBW0l1cZmde0LmLQt7 krUsmBHeUrbOyeLzLBGRkGXfV3kBcaIt2qWDq1rWWIEPWUZYLOYBG3l5z7SWyQoOQM7l YBGE2FfRZD7sdJSqFEujYTLpIX60mBwkQU0Zq9yMjZo+dzuFY3FyU2oVZAoSSk7kanEe D/Ck7ypbYpuSe397MAM+ijqJcTpUdFcDJwmPoN+G5fOabvM7r9lfgbzr5ML6dy2ha3Ke TDFKqvBOSVCer3sNJC1/UQd96SDRZfOXcx0NR4YtJMV9X0mwGDWgXnUKQQtJC1DNwGMu ncVA== X-Gm-Message-State: AOJu0YyokZW1CNK510ARWIBIgEQboiwqBhi1UZbBgpS3YvvAVuGIwB7K yjbH441bBawIS3nUmkGInrq9fBCWUCI7Bprn/YQl+DhTUsEJqBd9+2gb6w== X-Google-Smtp-Source: AGHT+IGX9TIPi3xp891Qr2tlN+Vck0y/E8SQabggLrDr5xr1H3YpUu2NourVuIwaXEkqbyq4Qp0dwA== X-Received: by 2002:a05:6214:e69:b0:6a0:cd65:5996 with SMTP id jz9-20020a0562140e6900b006a0cd655996mr1603928qvb.8.1714705220807; Thu, 02 May 2024 20:00:20 -0700 (PDT) Received: from bruce-XPS-8940.localdomain (pool-174-112-62-108.cpe.net.cable.rogers.com. [174.112.62.108]) by smtp.gmail.com with ESMTPSA id mi5-20020a056214558500b006a0fa96013asm839357qvb.138.2024.05.02.20.00.19 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 02 May 2024 20:00:19 -0700 (PDT) From: bruce.ashfield@gmail.com To: steve@sakoman.com Cc: openembedded-core@lists.openembedded.org Subject: [OE-core][nanbield 04/10] linux-yocto/6.1: update to v6.1.82 Date: Thu, 2 May 2024 23:00:09 -0400 Message-Id: <20240503030015.374078-4-bruce.ashfield@gmail.com> X-Mailer: git-send-email 2.39.2 In-Reply-To: <20240503030015.374078-1-bruce.ashfield@gmail.com> References: <20240503030015.374078-1-bruce.ashfield@gmail.com> MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 03 May 2024 03:00:25 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/198959 From: Bruce Ashfield Updating linux-yocto/6.1 to the latest korg -stable release that comprises the following commits: d7543167affd Linux 6.1.82 cf4b8c39b9a0 fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats d95ef75162f4 fs/proc: do_task_stat: use __for_each_thread() 9793a3bb531c getrusage: use sig->stats_lock rather than lock_task_sighand() 2a304d8c922f getrusage: use __for_each_thread() d9fe6ef24576 getrusage: move thread_group_cputime_adjusted() outside of lock_task_sighand() eba76e4808c9 getrusage: add the "signal_struct *sig" local variable 01d992088dce drm/amd/display: Fix MST Null Ptr for RV f0b6dc034e17 drm/amd/display: Wrong colorimetry workaround 92cdc9d71ab0 selftests: mptcp: decrease BW in simult flows b2e92ab17e44 KVM/x86: Export RFDS_NO and RFDS_CLEAR to guests d405b9c03f06 x86/rfds: Mitigate Register File Data Sampling (RFDS) 29476fac750d Documentation/hw-vuln: Add documentation for RFDS 8b5760939db9 x86/mmio: Disable KVM mitigation when X86_FEATURE_CLEAR_CPU_BUF is set a28f4d1e0bed drm/amdgpu: Reset IH OVERFLOW_CLEAR bit 2e3ec80ea7ba xhci: handle isoc Babble and Buffer Overrun events properly 9158ea9395c1 xhci: process isoc TD properly when there was a transaction error mid TD. a584c7734a4d selftests: mm: fix map_hugetlb failure on 64K page size systems 02e16a41e543 selftests/mm: switch to bash from sh f0c349708290 readahead: avoid multiple marked readahead pages b0b89b470a86 nfp: flower: add hardware offload check for post ct entry 4e2f0cae0bfe nfp: flower: add goto_chain_index for ct entry 66d663da8654 drm/amd/display: Fix uninitialized variable usage in core_link_ 'read_dpcd() & write_dpcd()' functions 35a0d43cee09 ASoC: codecs: wcd938x: fix headphones volume controls 5df3b81a567e KVM: s390: vsie: fix race during shadow creation 51c4435688eb KVM: s390: add stat counter for shadow gmap events 43464808669b netrom: Fix data-races around sysctl_net_busy_read cfedde3058bf netrom: Fix a data-race around sysctl_netrom_link_fails_count 4c02b9ccbb11 netrom: Fix a data-race around sysctl_netrom_routing_control 498f1d6da11e netrom: Fix a data-race around sysctl_netrom_transport_no_activity_timeout 46803b776d86 netrom: Fix a data-race around sysctl_netrom_transport_requested_window_size 5ac337138272 netrom: Fix a data-race around sysctl_netrom_transport_busy_delay 5deaef2bf564 netrom: Fix a data-race around sysctl_netrom_transport_acknowledge_delay d28fa5f0e6c1 netrom: Fix a data-race around sysctl_netrom_transport_maximum_tries fed835d41576 netrom: Fix a data-race around sysctl_netrom_transport_timeout a47d68d777b4 netrom: Fix data-races around sysctl_netrom_network_ttl_initialiser e439607291c0 netrom: Fix a data-race around sysctl_netrom_obsolescence_count_initialiser dec82a8fc45c netrom: Fix a data-race around sysctl_netrom_default_path_quality 6e49f3ac43e2 erofs: apply proper VMA alignment for memory mapped files on THP 39001e3c4200 netfilter: nf_conntrack_h323: Add protection for bmp length out of range bce83144ba7e netfilter: nft_ct: fix l3num expectations with inet pseudo family 998fd719e6d6 net/rds: fix WARNING in rds_conn_connect_if_down 7faff12e828d net: dsa: microchip: fix register write order in ksz8_ind_write8() 3420b3ff1ff4 cpumap: Zero-initialise xdp_rxq_info struct before running XDP program 394334fe2ae3 net/ipv6: avoid possible UAF in ip6_route_mpath_notify() 63a3c1f3c9ec igc: avoid returning frame twice in XDP_REDIRECT afdd29726a6d net: ice: Fix potential NULL pointer dereference in ice_bridge_setlink() 6293ff942e9c ice: virtchnl: stop pretending to support RSS over AQ or registers 0de693d68b0a net: sparx5: Fix use after free inside sparx5_del_mact_entry c0b22568a9d8 geneve: make sure to pull inner header in geneve_rx() 44faf8a48294 tracing/net_sched: Fix tracepoints that save qdisc_dev() as a string 5822c02707da ice: reorder disabling IRQ and NAPI in ice_qp_dis 8e23edc54a5c i40e: disable NAPI right after disabling irqs when handling xsk_pool 6632e19acbdc ixgbe: {dis, en}able irqs in ixgbe_txrx_ring_{dis, en}able ea2a1052f23c net: lan78xx: fix runtime PM count underflow on link stop 850bb481890f ceph: switch to corrected encoding of max_xattr_size in mdsmap cc4860dd1375 Subject: [PATCH v6.1] powerpc: drop duplicate entry in Makefile for lib dir e083231c43f3 net: fix IPSTATS_MIB_OUTFORWDATAGRAMS increment after fragment check 6ee7f29fed8c net: ipv4, ipv6: fix IPSTATS_MIB_OUTOCTETS increment duplicated a771780cdf4a net: fix IPSTATS_MIB_OUTPKGS increment in OutForwDatagrams. 8a9f2d0717f0 riscv: Fix build with CONFIG_CC_OPTIMIZE_FOR_SIZE=y 44fd0c7a5a79 tick/rcu: fix false positive "softirq work is pending" messages on RT 786775632028 kernel/sched: Fix double free on invalid isolcpus/nohz_full params 4675ec8d0b9a kernel/sched: Fix uninitialized read in nohz_full/isolcpus setup f46dc32a8617 bpf: btf: limit logging of ignored BTF mismatches 4687b40201db Revert "Revert "tick/common: Align tick period with the HZ tick."" 947f660bde07 Revert "tick/common: Align tick period with the HZ tick." dded404c66bb yaffs2: Fix miscalculation of devname buffer length 30350f237490 mtd_blkdevs: add mtd_table_mutex lock back to blktrans_{open, release} to avoid race condition 0ac32a83ca02 OF: DT-Overlay configfs interface (v8) 0b07d2478b6b fat: Replace prandom_u32() with get_random_u32() 927b66bfd641 aufs6: core 2af5eb310b11 aufs6: standalone e6537c94f033 aufs6: mmap c51d7f19876f aufs6: base 1785f762bbbb aufs6: kbuild 8f625cf94585 qemux86: add configuration symbol to select values d81fac6e842a sched/isolation: really align nohz_full with rcu_nocbs 07c526200cb3 clear_warn_once: add a clear_warn_once= boot parameter 61e2c52ce198 clear_warn_once: bind a timer to written reset value de03f5a3e6c6 clear_warn_once: expand debugfs to include read support d3f9a25028d4 tools: Remove some options from CLANG_CROSS_FLAGS 0fb98cd2429a libbpf: Fix build warning on ref_ctr_off e156ff56a19f perf python: Account for multiple words in CC f06b9c6ae59d perf: perf can not parser the backtrace of app in the 32bit system and 64bit kernel. 1b099e82095d perf: x86-32: explicitly include 5fec311e2fd2 perf: mips64: Convert __u64 to unsigned long long 6cf30287aeaa perf: fix bench numa compilation bd8f67dcb8e4 perf: add SLANG_INC for slang.h 0314b09bf6b9 perf: add sgidefs.h to for mips builds 4a39cc37b957 perf: change --root to --prefix for python install 3db4f4e91769 perf: add 'libperl not found' warning fa3d24bac29a perf: force include of deaadc523f8d fat: don't use obsolete random32 call in namei_vfat d3c72f5df9a3 FAT: Added FAT_NO_83NAME 8f1eebeb519c FAT: Add CONFIG_VFAT_NO_CREATE_WITH_LONGNAMES option 78b0423ccc14 FAT: Add CONFIG_VFAT_FS_NO_DUALNAMES option e998ad53fb68 yaffs2: replace bdevname call with sprintf 1175db6bf4cb yaffs2: convert read_page -> readfolio beb275c683de yaffs: replace IS_ERR with IS_ERR_OR_NULL to check both ERR and NULL e807c9e420bd yaffs: fix -Wstringop-overread compile warning in yaffs_fix_null_name 2fdd54282de3 yaffs2: v5.12+ build fixups (not runtime tested) 869f41030ed8 yaffs: include blkdev.h e955b68f2b1f yaffs: fix misplaced variable declaration f089603aba1d yaffs2: v5.6 build fixups 82da54859f0b yaffs2: fix memory leak when /proc/yaffs is read 2c4cf6808649 yaffs: add strict check when call yaffs_internal_read_super e7dadb47ef11 yaffs: repair yaffs_get_mtd_device f2e29be130f7 yaffs: Fix build failure by handling inode i_version with proper atomic API 8ea43ac7f3a3 yaffs2: fix memory leak in mount/umount 56db60d0abd2 yaffs: Avoid setting any ACL releated xattr 023baea095bc Yaffs:check oob size before auto selecting Yaffs1 409d39918661 fs: yaffs2: replace CURRENT_TIME by other appropriate apis 4bf42c774804 yaffs2: adjust to proper location of MS_RDONLY 08696e21a84c yaffs2: import git revision b4ce1bb (jan, 2020) ca3d9f546a60 initramfs: allow an optional wrapper script around initramfs generation 301742baace5 pnmtologo: use relocatable file name aba96ccce7d9 tools: use basename to identify file in gen-mach-types e195c32ca7c7 lib/build_OID_registry: fix reproducibility issues 876e2f1f7726 vt/conmakehash: improve reproducibility 28b7a366cfef iwlwifi: select MAC80211_LEDS conditionally 69933d85f61e net/dccp: make it depend on CONFIG_BROKEN (CVE-2020-16119) 5a308d8f142a arm64/perf: Fix wrong cast that may cause wrong truncation 339523a797e9 defconfigs: drop obselete options 3d751aeb9bcd arm64/perf: fix backtrace for AAPCS with FP enabled 86fa47f362ae linux-yocto: Handle /bin/awk issues 86f04668ef6e uvesafb: provide option to specify timeout for task completion 0db5521a1b3c uvesafb: print error message when task timeout occurs 710303c12e99 compiler.h: Undef before redefining __attribute_const__ 14a0ede85080 vmware: include jiffies.h e232e6ffe081 Resolve jiffies wrapping about arp c16abf2d705f nfs: Allow default io size to be configured. 9e9e885f4a6c check console device file on fs when booting 0ce0ce443d58 mount_root: clarify error messages for when no rootfs found 32449db67de8 menuconfig,mconf-cfg: Allow specification of ncurses location c55f1054bdce modpost: mask trivial warnings 30a45d4ee261 kbuild: exclude meta directory from distclean processing 0890b10d8fb1 powerpc: serialize image targets 6c0feb81c3ae arm: serialize build targets 77fa1b70cdbd crtsavres: fixups for 5.4+ cd107e4edd5f crtsavres: fixups for 5.4+ 8f763b35ae5b powerpc/ptrace: Disable array-bounds warning with gcc8 fe6f93755196 powerpc: Disable attribute-alias warnings from gcc8 9b7097364b87 powerpc: add crtsavres.o to archprepare for kbuild c106cd86a07b powerpc: kexec fix for powerpc64 33b7738c61fc powerpc: Add unwind information for SPE registers of E500 core c04e26a9beda mips: vdso: fix 'jalr $t9' crash in vdso code 4733368eab80 mips: Kconfig: add QEMUMIPS64 option ec2df6ae5ee5 4kc cache tlb hazard: tlbp cache coherency c8c511fae0f0 malta uhci quirks: make allowance for slow 4k(e)c b2bf1b6e971a arm64: defconfig: cleanup config options a40a34b02336 vexpress: Pass LOADADDR to Makefile 7c51524611bb arm: ARM EABI socketcall 1f6e77027c24 ARM: LPAE: Invalidate the TLB for module addresses during translation fault Signed-off-by: Bruce Ashfield --- .../linux/linux-yocto-rt_6.1.bb | 6 ++-- .../linux/linux-yocto-tiny_6.1.bb | 6 ++-- meta/recipes-kernel/linux/linux-yocto_6.1.bb | 28 +++++++++---------- 3 files changed, 20 insertions(+), 20 deletions(-) diff --git a/meta/recipes-kernel/linux/linux-yocto-rt_6.1.bb b/meta/recipes-kernel/linux/linux-yocto-rt_6.1.bb index cd9deafb8d..cb091a7d79 100644 --- a/meta/recipes-kernel/linux/linux-yocto-rt_6.1.bb +++ b/meta/recipes-kernel/linux/linux-yocto-rt_6.1.bb @@ -14,13 +14,13 @@ python () { raise bb.parse.SkipRecipe("Set PREFERRED_PROVIDER_virtual/kernel to linux-yocto-rt to enable it") } -SRCREV_machine ?= "5c94f8a3f0df3075a8b7883ef7675a3ac9bf5e58" -SRCREV_meta ?= "b508a9d9a5ca890a54488d93773a2a86c0e329e7" +SRCREV_machine ?= "ff8fd5f68aadf01de61a8a17d3f7fc69ea873801" +SRCREV_meta ?= "2e91a300ba91db8a5d58a7aadf6ed45dd7ae5bef" SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;branch=${KBRANCH};name=machine;protocol=https \ git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.1;destsuffix=${KMETA};protocol=https" -LINUX_VERSION ?= "6.1.81" +LINUX_VERSION ?= "6.1.82" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" diff --git a/meta/recipes-kernel/linux/linux-yocto-tiny_6.1.bb b/meta/recipes-kernel/linux/linux-yocto-tiny_6.1.bb index faf26e56e8..04cff23ecb 100644 --- a/meta/recipes-kernel/linux/linux-yocto-tiny_6.1.bb +++ b/meta/recipes-kernel/linux/linux-yocto-tiny_6.1.bb @@ -8,7 +8,7 @@ require recipes-kernel/linux/linux-yocto.inc # CVE exclusions include recipes-kernel/linux/cve-exclusion_6.1.inc -LINUX_VERSION ?= "6.1.81" +LINUX_VERSION ?= "6.1.82" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}" @@ -17,8 +17,8 @@ DEPENDS += "openssl-native util-linux-native" KMETA = "kernel-meta" KCONF_BSP_AUDIT_LEVEL = "2" -SRCREV_machine ?= "3405bbdc5cfb59d25351b6f7409c1e47cb51fba8" -SRCREV_meta ?= "b508a9d9a5ca890a54488d93773a2a86c0e329e7" +SRCREV_machine ?= "329d19a5be2832acafa4a5c598a244ddb5d15737" +SRCREV_meta ?= "2e91a300ba91db8a5d58a7aadf6ed45dd7ae5bef" PV = "${LINUX_VERSION}+git" diff --git a/meta/recipes-kernel/linux/linux-yocto_6.1.bb b/meta/recipes-kernel/linux/linux-yocto_6.1.bb index 36d9d2041e..ce0bd71dd6 100644 --- a/meta/recipes-kernel/linux/linux-yocto_6.1.bb +++ b/meta/recipes-kernel/linux/linux-yocto_6.1.bb @@ -18,25 +18,25 @@ KBRANCH:qemux86-64 ?= "v6.1/standard/base" KBRANCH:qemuloongarch64 ?= "v6.1/standard/base" KBRANCH:qemumips64 ?= "v6.1/standard/mti-malta64" -SRCREV_machine:qemuarm ?= "fd979501e96642c64fa1cc9c81713f4ec098a5c7" -SRCREV_machine:qemuarm64 ?= "3405bbdc5cfb59d25351b6f7409c1e47cb51fba8" -SRCREV_machine:qemuloongarch64 ?= "3405bbdc5cfb59d25351b6f7409c1e47cb51fba8" -SRCREV_machine:qemumips ?= "217690aa1afe0b40d10f05cc96826a264fa5f0ac" -SRCREV_machine:qemuppc ?= "df23dc9de645adb30b9df6d7c26f3245aa6a1716" -SRCREV_machine:qemuriscv64 ?= "3405bbdc5cfb59d25351b6f7409c1e47cb51fba8" -SRCREV_machine:qemuriscv32 ?= "3405bbdc5cfb59d25351b6f7409c1e47cb51fba8" -SRCREV_machine:qemux86 ?= "3405bbdc5cfb59d25351b6f7409c1e47cb51fba8" -SRCREV_machine:qemux86-64 ?= "3405bbdc5cfb59d25351b6f7409c1e47cb51fba8" -SRCREV_machine:qemumips64 ?= "7c8d52cdd913121fc0b5f1c9393b49ef680931de" -SRCREV_machine ?= "3405bbdc5cfb59d25351b6f7409c1e47cb51fba8" -SRCREV_meta ?= "b508a9d9a5ca890a54488d93773a2a86c0e329e7" +SRCREV_machine:qemuarm ?= "a07afa502355c7653fb9999345c25f86cd7c244b" +SRCREV_machine:qemuarm64 ?= "329d19a5be2832acafa4a5c598a244ddb5d15737" +SRCREV_machine:qemuloongarch64 ?= "329d19a5be2832acafa4a5c598a244ddb5d15737" +SRCREV_machine:qemumips ?= "e66e81887065c1501243b6dc862e3cea58f668b0" +SRCREV_machine:qemuppc ?= "31d1b4e1c6954491122fa3040a5e1a3017ae1462" +SRCREV_machine:qemuriscv64 ?= "329d19a5be2832acafa4a5c598a244ddb5d15737" +SRCREV_machine:qemuriscv32 ?= "329d19a5be2832acafa4a5c598a244ddb5d15737" +SRCREV_machine:qemux86 ?= "329d19a5be2832acafa4a5c598a244ddb5d15737" +SRCREV_machine:qemux86-64 ?= "329d19a5be2832acafa4a5c598a244ddb5d15737" +SRCREV_machine:qemumips64 ?= "34db6af2816a2a565d34e21135a2498e7723df07" +SRCREV_machine ?= "329d19a5be2832acafa4a5c598a244ddb5d15737" +SRCREV_meta ?= "2e91a300ba91db8a5d58a7aadf6ed45dd7ae5bef" # set your preferred provider of linux-yocto to 'linux-yocto-upstream', and you'll # get the /base branch, which is pure upstream -stable, and the same # meta SRCREV as the linux-yocto-standard builds. Select your version using the # normal PREFERRED_VERSION settings. BBCLASSEXTEND = "devupstream:target" -SRCREV_machine:class-devupstream ?= "61adba85cc40287232a539e607164f273260e0fe" +SRCREV_machine:class-devupstream ?= "d7543167affd372819a94879b8b1e8b9b12547d9" PN:class-devupstream = "linux-yocto-upstream" KBRANCH:class-devupstream = "v6.1/base" @@ -45,7 +45,7 @@ SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;name=machine;branch=${KBRA SRC_URI += "file://0001-perf-cpumap-Make-counter-as-unsigned-ints.patch" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" -LINUX_VERSION ?= "6.1.81" +LINUX_VERSION ?= "6.1.82" PV = "${LINUX_VERSION}+git" From patchwork Fri May 3 03:00:10 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Bruce Ashfield X-Patchwork-Id: 43218 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 7E009C25B5C for ; Fri, 3 May 2024 03:00:25 +0000 (UTC) Received: from mail-qv1-f46.google.com (mail-qv1-f46.google.com [209.85.219.46]) by mx.groups.io with SMTP id smtpd.web11.4329.1714705223210016481 for ; Thu, 02 May 2024 20:00:23 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@gmail.com header.s=20230601 header.b=TZcI9zyO; spf=pass (domain: gmail.com, ip: 209.85.219.46, mailfrom: bruce.ashfield@gmail.com) Received: by mail-qv1-f46.google.com with SMTP id 6a1803df08f44-69b4454e2f1so37134676d6.0 for ; Thu, 02 May 2024 20:00:23 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1714705222; x=1715310022; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=jfHw57W3MzgSkWbY2WxbfYCSGWyPZ7jsYmVLV2WuF80=; b=TZcI9zyOFi59sKqUKq2pKLlPNASEgOdxuCAUdZOwrhJTIMwY7pWLY4bp2hJ8kJlZaa 0u5n6iMfNuhPw9GCrrJf1Yii+jeJBmp3xalsFfjFQMnQzFI+8q7pXjJMD/nabPa6swfc 4kfh9DpgD5Qdwo6bz1YFbP9J4yZ94FYAJ/f8K6vLmKNiKDVNzo24TlAsOzEiTjS2RYAX jjDz7TiaVqm3EhYBvwP/msJ8huw1Il6z3ks7b6F03UeQj+mvRzLtupePuDJrtTb2U+uf 52ujtIxDC1z85hiTUeuxaCqY6ar4Tj8ncE6TWrMQpVS5BNVtGDs7BA0/00C6W0Xr55t4 1QvA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1714705222; x=1715310022; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=jfHw57W3MzgSkWbY2WxbfYCSGWyPZ7jsYmVLV2WuF80=; b=xN11sSdY10pPzTVVgqTKbAO4lQoI5kUJZcIFCtmwTaI0Fi5lAiTLIyG+Y0cul3WkSl b0vaSFa1ehdahQAQnPJXL5aA3LbxzE+nHvtsGXukzaxtT6vndXPwkkF0fs9Qy3uqKR+e 5yybyPCqBX6fu6G2wedWk66CToqi0j+H6FhJuNIJhQaD5GKInK2MKlpb7v0G8a1qy2E4 IRijAdu80MD3/A1664LIDs1GDeVo8I8uZYYK3WMUp30uRpP0r7LfwEwX8v8gwLdR2n0b Bo0v9JLnsjIWhiSdAEihY0E4I07gz8LaoUsG39LZzJBPNT/WEEJDzYqI9xqLZPwqBxCs PKCA== X-Gm-Message-State: AOJu0Yya+JOmeU3s6Jt5e1LIgeK2svkISCNsmvFYKOpVeRFzDfD5Ezcf jUOKnw3ZxLEGNHgLIrBh8LuWtBVuMBBKEx0s3bSBEfHdEc8RWMBdJr+ZQg== X-Google-Smtp-Source: AGHT+IHEDpzwZ/n78jjNj2AUxDm0Et4/RfMGZOiMGbYL1qSm+HasEGEvTerasNgtHU9W4C4SaHYSZQ== X-Received: by 2002:ad4:5b8f:0:b0:6a0:c162:2944 with SMTP id 15-20020ad45b8f000000b006a0c1622944mr1488576qvp.29.1714705221807; Thu, 02 May 2024 20:00:21 -0700 (PDT) Received: from bruce-XPS-8940.localdomain (pool-174-112-62-108.cpe.net.cable.rogers.com. [174.112.62.108]) by smtp.gmail.com with ESMTPSA id mi5-20020a056214558500b006a0fa96013asm839357qvb.138.2024.05.02.20.00.20 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 02 May 2024 20:00:21 -0700 (PDT) From: bruce.ashfield@gmail.com To: steve@sakoman.com Cc: openembedded-core@lists.openembedded.org Subject: [OE-core][nanbield 05/10] linux-yocto/6.1: update to v6.1.83 Date: Thu, 2 May 2024 23:00:10 -0400 Message-Id: <20240503030015.374078-5-bruce.ashfield@gmail.com> X-Mailer: git-send-email 2.39.2 In-Reply-To: <20240503030015.374078-1-bruce.ashfield@gmail.com> References: <20240503030015.374078-1-bruce.ashfield@gmail.com> MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 03 May 2024 03:00:25 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/198960 From: Bruce Ashfield Updating linux-yocto/6.1 to the latest korg -stable release that comprises the following commits: e5cd595e23c1 Linux 6.1.83 9b2e8276bfb6 remoteproc: stm32: fix incorrect optional pointers 4b0c54792394 x86/efistub: Don't clear BSS twice in mixed mode f07ffd18d787 x86/efistub: Clear decompressor BSS in native EFI entrypoint aa587257e146 dm-integrity: align the outgoing bio in integrity_recheck 92b3c2437df8 dm io: Support IO priority d0980ed818d7 dm: address indent/space issues 1bf455b2c67c selftests: forwarding: Fix ping failure due to short timeout 766ec94cc574 spi: spi-mt65xx: Fix NULL pointer access in interrupt handler 86c0c154a759 net: dsa: mt7530: fix handling of all link-local frames f1fa919ea596 net: dsa: mt7530: fix link-local frames that ingress vlan filtering ports 5ff8f56c392b bpf: report RCU QS in cpumap kthread 3890e7008c55 net: report RCU QS on threaded NAPI repolling f21ddce5b8c4 rcu: add a helper to report consolidated flavor QS 9683cb6c2c6c netfilter: nf_tables: do not compare internal table flags on updates 5ad233dc731a netfilter: nft_set_pipapo: release elements in clone only from destroy path 29d2550d79a8 octeontx2-af: Use separate handlers for interrupts 53e6709a2ff1 octeontx2-pf: Send UP messages to VF only when VF is up. 53ae0f36690c octeontx2-pf: Use default max_active works instead of one e545e4b1c1c1 net: octeontx2: Use alloc_ordered_workqueue() to create ordered workqueues a64cc7599ece octeontx2: Detect the mbox up or down message via register 8a231bd4d6cb octeontx2-af: add mbox to return CPT_AF_FLT_INT info 8b1140c5808b octeontx2-af: optimize cpt pf identification 35d8af38f199 octeontx2-af: add mbox for CPT LF reset ac3f337f0a2e octeontx2-af: recover CPT engine when it gets fault cf7d8cba639a net/bnx2x: Prevent access to a freed page in page_pool 20e21c3c0195 dm-integrity: fix a memory leak when rechecking the data b29a5055eeb0 net: phy: fix phy_read_poll_timeout argument type in genphy_loopback 6af7c8a2980b ipv4: raw: Fix sending packets from raw sockets via IPsec tunnels 87ca3d940f64 hsr: Handle failures in module init 52287ed416a1 rds: introduce acquire/release ordering in acquire/release_in_xmit() 45a83b220c83 wireguard: receive: annotate data-race around receiving_counter.counter 07b6891ca62e vdpa/mlx5: Allow CVQ size changes 80fc9b9c626b vdpa_sim: reset must not run 1d830032bcba drm: Fix drm_fixp2int_round() making it add 0.5 be4512b9ac6f net: dsa: mt7530: prevent possible incorrect XTAL frequency selection d343a618bc3c net: veth: do not manipulate GRO when using XDP ef7eed7e11d2 packet: annotate data-races around ignore_outgoing f78807362828 net: ethernet: mtk_eth_soc: fix PPE hanging issue 6b62bad2da1b net: mediatek: mtk_eth_soc: clear MAC_MCR_FORCE_LINK only when MAC is up 149afee5c741 nvme: fix reconnection fail due to reserved tag allocation 1883ed12d702 nvme: add the Apple shared tag workaround to nvme_alloc_io_tag_set cb8ae8e5ec28 nvme: only set reserved_tags in nvme_alloc_io_tag_set for fabrics controllers 1ed222ca7396 hsr: Fix uninit-value access in hsr_get_node() 86d9b040421b tcp: Fix refcnt handling in __inet_hash_connect(). 1ff7ffcac109 soc: fsl: dpio: fix kcalloc() argument order bd2474a45df7 net/sched: taprio: proper TCA_TAPRIO_TC_ENTRY_INDEX check abc9b13fd921 s390/vtime: fix average steal time calculation ec0e06c797a0 octeontx2-af: Use matching wake_up API variant in CGX command interface 9905a157048f rds: tcp: Fix use-after-free of net in reqsk_timer_handler(). 6df9cf77e0c7 tcp: Fix NEW_SYN_RECV handling in inet_twsk_purge() d2034a6b92ca nouveau: reset the bo resource bus info after an eviction d23e49f4e4c1 ASoC: rockchip: i2s-tdm: Fix inaccurate sampling rates 2ca629b90dc9 usb: gadget: net2272: Use irqflags in the call to net2272_probe_fin 1d4ff6a8f85e staging: greybus: fix get_channel_from_mode() failure path d2b48ecc760a serial: 8250_exar: Don't remove GPIO device on suspend bea2dfd5fa3f rtc: mt6397: select IRQ_DOMAIN instead of depending on it bc493a56abf8 hwtracing: hisi_ptt: Move type check to the beginning of hisi_ptt_pmu_event_init() c609ce8b3c6f kconfig: fix infinite loop when expanding a macro at the end of file 8aa68d9fc22c arm64: dts: broadcom: bcmbca: bcm4908: drop invalid switch cells ad7362db2fd7 tty: serial: samsung: fix tx_empty() to return TIOCSER_TEMT e955764b4167 serial: max310x: fix syntax error in IRQ error message 52af9897e787 tty: vt: fix 20 vs 0x20 typo in EScsiignore 22ae3d106391 usb: phy: generic: Get the vbus supply e660319fc67c remoteproc: stm32: Fix incorrect type assignment returned by stm32_rproc_get_loaded_rsc_tablef b4f425956362 remoteproc: stm32: Fix incorrect type in assignment for va 0e3aa1749964 remoteproc: stm32: use correct format strings on 64-bit 5c594bdbd519 comedi: comedi_test: Prevent timers rescheduling during deletion b5a579ddf0bf io_uring/net: correct the type of variable 31db25e3141b nfs: fix panic when nfs4_ff_layout_prepare_ds() fails 76426abf9b98 afs: Revert "afs: Hide silly-rename files from userspace" 4fd4a210de9d perf/x86/amd/core: Avoid register reset when CPU is dead 889846dfc8ee f2fs: compress: fix reserve_cblocks counting error when out of space a4e063d67e93 f2fs: compress: relocate some judgments in f2fs_reserve_compress_blocks 02b661956605 f2fs: convert to use sbi directly 4d5e5a044b99 NFS: Fix an off by one in root_nfs_cat() 449684e376a0 f2fs: ro: compress: fix to avoid caching unaligned extent aa25e54f44cb watchdog: stm32_iwdg: initialize default timeout b91d54a2c4aa f2fs: check number of blocks in a current section 7486973accbc f2fs: compress: fix to check compress flag w/ .i_sem lock 18631d43d487 NFSv4.2: fix listxattr maximum XDR buffer size 06e828b3f1b2 NFSv4.2: fix nfs4_listxattr kernel BUG at mm/usercopy.c:102 8c0fe010cbe0 net: sunrpc: Fix an off by one in rpc_sockaddr2uaddr() 8ede73123cd5 f2fs: compress: fix to check zstd compress level correctly in mount option 322eb43c0ea2 scsi: bfa: Fix function pointer type mismatch for hcb_qe->cbfn b0455371cced RDMA/rtrs-clt: Check strnlen return len in sysfs mpath_policy_store() aaa8e143bfe1 RDMA/device: Fix a race between mad_client and cm_client init 987bc93ecdab RDMA/hns: Fix mis-modifying default congestion control algorithm e85d53ebae88 scsi: csiostor: Avoid function pointer casts fe4de493572a f2fs: fix to avoid potential panic during recovery 98df108a9ab0 f2fs: compress: fix to cover f2fs_disable_compressed_file() w/ i_sem 67eba3e674a1 f2fs: compress: fix to avoid inconsistence bewteen i_blocks and dnode bba2a0ba00eb f2fs: update blkaddr in __set_data_blkaddr() for cleanup ebe3a9f3c286 f2fs: introduce get_dnode_addr() to clean up codes 3c2e2c8059da f2fs: delete obsolete FI_DROP_CACHE 17bfaa58db0c f2fs: delete obsolete FI_FIRST_BLOCK_WRITTEN 621da84f1015 f2fs: simplify __allocate_data_block b5ecf59fbab9 f2fs: compress: fix to check unreleased compressed cluster 542c8b3c774a f2fs: compress: fix to cover normal cluster write with cp_rwsem e54cce813725 f2fs: compress: fix to guarantee persisting compressed blocks by CP 492acea36b29 f2fs: reduce stack memory cost by using bitfield in struct f2fs_io_info e362d0072949 RDMA/srpt: Do not register event handler until srpt device is fully setup ae771b805dfd RDMA/irdma: Remove duplicate assignment 0606bedcc373 RDMA/irdma: Allow accurate reporting on QP max send/recv WR 629af0d5fe94 ALSA: usb-audio: Stop parsing channels bits when all channels are found. fd58b4e3c0c6 ALSA: hda/realtek: fix ALC285 issues on HP Envy x360 laptops 8c4889a9ea86 clk: zynq: Prevent null pointer dereference caused by kmalloc failure a8b2b26fdd01 clk: Fix clk_core_get NULL dereference faa2ba4cebdf sparc32: Fix section mismatch in leon_pci_grpci 765f673c0eb9 backlight: lp8788: Fully initialize backlight_properties during probe 693c1edfcf21 backlight: lm3639: Fully initialize backlight_properties during probe 6d7e897358fc backlight: da9052: Fully initialize backlight_properties during probe d6e321dcd7d4 backlight: lm3630a: Don't set bl->props.brightness in get_brightness 491ec4f45443 backlight: lm3630a: Initialize backlight_properties on init dd7f2d0f6187 leds: sgm3140: Add missing timer cleanup and flash gpio control d1f384e4c201 leds: aw2013: Unlock mutex before destroying it c2c32faae82f powerpc/embedded6xx: Fix no previous prototype for avr_uart_send() etc. c550f0055c5d modules: wait do_free_init correctly 0189516bb536 drm/msm/dpu: add division of drm_display_mode's hskew parameter 48feaf23f3a4 powerpc/hv-gpci: Fix the H_GET_PERF_COUNTER_INFO hcall return value checks a3f22feb2220 powerpc/pseries: Fix potential memleak in papr_get_attr() d2bd30c71047 drm/mediatek: Fix a null pointer crash in mtk_drm_crtc_finish_page_flip e9eee1ce1b6c gpio: nomadik: fix offset bug in nmk_pmx_set() 32bfbab72aaa media: mediatek: vcodec: avoid -Wcast-function-type-strict warning 55ca0c7eae84 media: ttpci: fix two memleaks in budget_av_attach e04d15c8bb3e media: go7007: fix a memleak in go7007_load_encoder 107052a8cfef media: dvb-frontends: avoid stack overflow warnings with clang 3a1ec89708d2 media: pvrusb2: fix uaf in pvr2_context_set_notify 0a70199742c2 drm/amdgpu: Fix missing break in ATOM_ARG_IMM Case of atom_get_src_int() fcb7e704827e HID: amd_sfh: Avoid disabling the interrupt c6a05e45de82 HID: amd_sfh: Update HPD sensor structure elements ff4dd05a9415 ASoC: meson: axg-tdm-interface: add frame rate constraint 83ee64af9bed ASoC: meson: axg-tdm-interface: fix mclk setup without mclk-fs 5ac2ca7a50ed mtd: rawnand: lpc32xx_mlc: fix irq handler prototype 438adcd017dc mtd: maps: physmap-core: fix flash size larger than 32-bit 82120c9ab4b8 drm/tidss: Fix sync-lost issue with two displays c82d43406973 drm/tidss: Fix initial plane zpos values 67355a760bf5 crypto: jitter - fix CRYPTO_JITTERENTROPY help text 6a2ef9725068 crypto: arm/sha - fix function cast warnings 6be122c8d215 mfd: altera-sysmgr: Call of_node_put() only when of_parse_phandle() takes a ref 3eb47e41c205 mfd: syscon: Call of_node_put() only when of_parse_phandle() takes a ref 527480cab5cc drm/tegra: put drm_gem_object ref on error in tegra_fb_create e0b0d1c46a2c clk: hisilicon: hi3559a: Fix an erroneous devm_kfree() d183ee71366c clk: hisilicon: hi3519: Release the correct number of gates in hi3519_clk_unregister() ce106d8ef0ba PCI: Mark 3ware-9650SE Root Port Extended Tags as broken 7a08ebcfd721 drm/mediatek: dsi: Fix DSI RGB666 formats and definitions 2101966b7744 clk: qcom: dispcc-sdm845: Adjust internal GDSC wait times 6e93e0f88322 media: pvrusb2: fix pvr2_stream_callback casts 7dee677d17c9 media: pvrusb2: remove redundant NULL check 8e6e28e650ba media: go7007: add check of return value of go7007_read_addr() 8df9a3c7044b media: imx: csc/scaler: fix v4l2_ctrl_handler memory leak 77301ad7bebf media: sun8i-di: Fix chroma difference threshold f4258e5882e2 media: sun8i-di: Fix power on/off sequences 0dfdf4c1ac4c media: sun8i-di: Fix coefficient writes acdf24f3d523 media: cedrus: h265: Fix configuring bitstream size 8006813ebdf1 media: cedrus: h265: Associate mv col buffers with buffer 6632a54ac805 NTB: fix possible name leak in ntb_register_device() 298f7f137021 NTB: EPF: fix possible memory leak in pci_vntb_probe() d133d67e7e72 ASoC: SOF: Add some bounds checking to firmware data 9a819504171d ASoC: SOF: Introduce container struct for SOF firmware b494caad9c6b powerpc: Force inlining of arch_vmap_p{u/m}d_supported() 4a00001d22d1 ASoC: meson: t9015: fix function pointer type mismatch fe636b9a6ede ASoC: meson: aiu: fix function pointer type mismatch 511a6a88b24a perf stat: Avoid metric-only segv b14524556fe3 ALSA: seq: fix function cast warnings 5342ad8db53c clk: renesas: r8a779f0: Correct PFC/GPIO parent clock 128c04cc0472 clk: renesas: r8a779g0: Correct PFC/GPIO parent clocks 4f6274bafde6 clk: renesas: r8a779g0: Add thermal clock bf10ef659b21 clk: renesas: r8a779g0: Add Audio clocks ca9b82755a51 clk: renesas: r8a779g0: Add CMT clocks 7d82efd8d3a9 drm/radeon/ni: Fix wrong firmware size logging in ni_init_microcode() c264af81ad60 drm/msm/dpu: Only enable DSC_MODE_MULTIPLEX if dsc_merge is enabled e4892870a5f5 drm/msm/dpu: fix the programming of INTF_CFG2_DATA_HCTL_EN dc84f8c1a3db perf thread_map: Free strlist on normal path in thread_map__new_by_tid_str() a71f66bd5f7b crypto: xilinx - call finalize with bh disabled 4421c746023b PCI: switchtec: Fix an error handling path in switchtec_pci_probe() c12efda47df9 quota: Fix rcu annotations of inode dquot pointers 7f9e833fc0f9 quota: Fix potential NULL pointer dereference fd14781b3021 quota: simplify drop_dquot_ref() 6814dc592d35 clk: qcom: reset: Ensure write completion on reset de/assertion 1f3e9910422e clk: qcom: reset: Commonize the de/assert functions 99cd54167d0b pinctrl: mediatek: Drop bogus slew rate register range for MT8192 f69b926799b3 pinctrl: mediatek: Drop bogus slew rate register range for MT8186 437a111f79a2 media: edia: dvbdev: fix a use-after-free 0c9550b032de media: v4l2-mem2mem: fix a memleak in v4l2_m2m_register_entity 6bf5c2fade8e media: v4l2-tpg: fix some memleaks in tpg_alloc 3828fc3ab84c media: em28xx: annotate unchecked call to media_device_register() 7ae1b0dc12ec clk: meson: Add missing clocks to axg_clk_regmaps 83fe9c3f445d perf evsel: Fix duplicate initialization of data->id in evsel__parse_sample() 9310d3de984c clk: samsung: exynos850: Propagate SPI IPCLK rate change 29eaa9246b0d pinctrl: renesas: r8a779g0: Add missing SCIF_CLK2 pin group/function a19403d20ed8 pinctrl: renesas: r8a779g0: Add Audio SSI pins, groups, and functions 29fde8895b2f drm/amd/display: Fix potential NULL pointer dereferences in 'dcn10_set_output_transfer_func()' d346b3e5b25c drm/amd/display: Fix a potential buffer overflow in 'dp_dsc_clock_en_read()' fa8810aa5ac3 HID: lenovo: Add middleclick_workaround sysfs knob for cptkbd 845a478304f0 perf record: Fix possible incorrect free in record__switch_output() 43f4364c8f4e PCI/DPC: Print all TLP Prefixes, not just the first 8ba8db9786b5 media: tc358743: register v4l2 async device only after successful setup b17195f1e015 dmaengine: tegra210-adma: Update dependency to ARCH_TEGRA 1eb749a9c305 ASoC: amd: acp: Add missing error handling in sof-mach f6d51a91b417 drm/lima: fix a memleak in lima_heap_alloc 680c94312e86 drm/panel-edp: use put_sync in unprepare 06e38277151e drm/rockchip: lvds: do not print scary message when probing defer fe790f340eb7 drm/rockchip: lvds: do not overwrite error code 40624af66747 drm/vmwgfx: fix a memleak in vmw_gmrid_man_get_node 758629d348b9 drm: Don't treat 0 as -1 in drm_fixp2int_ceil e6ed73bb8e4b drm/rockchip: inno_hdmi: Fix video timing c994fed05c27 drm/tegra: output: Fix missing i2c_put_adapter() in the error handling paths of tegra_output_probe() f3f407ccbe84 drm/tegra: rgb: Fix missing clk_put() in the error handling paths of tegra_dc_rgb_probe() 29f922ae4a0a drm/tegra: rgb: Fix some error handling paths in tegra_dc_rgb_probe() bb459d437d17 drm/tegra: hdmi: Fix some error handling paths in tegra_hdmi_probe() 8bc95d34408b drm/tegra: hdmi: Convert to devm_platform_ioremap_resource() 806dc32deac2 drm/tegra: dsi: Fix missing pm_runtime_disable() in the error handling path of tegra_dsi_probe() a57bbd606a8a drm/tegra: dsi: Fix some error handling paths in tegra_dsi_probe() d3e8c2409a35 drm/tegra: dsi: Make use of the helper function dev_err_probe() f4a1a30f1837 drm/tegra: dpaux: Fix PM disable depth imbalance in tegra_dpaux_probe 50c0ad785a78 drm/tegra: dsi: Add missing check for of_find_device_by_node ad10289f68f4 dm: call the resume method on internal suspend 2b50b4f0d40d dm raid: fix false positive for requeue needed during reshape b605c3831fb4 bpf: hardcode BPF_PROG_PACK_SIZE to 2MB * num_possible_nodes() c9b4e220dd18 nfp: flower: handle acti_netdevs allocation failure b7c2b7eae286 net/x25: fix incorrect parameter validation in the x25_getsockopt() function 440e278cb53b net: kcm: fix incorrect parameter validation in the kcm_getsockopt) function 6bb3c0473863 udp: fix incorrect parameter validation in the udp_lib_getsockopt() function cfea1c9ad406 l2tp: fix incorrect parameter validation in the pppol2tp_getsockopt() function 6ccbd0227fb8 ipmr: fix incorrect parameter validation in the ip_mroute_getsockopt() function dcdcf9a71730 tcp: fix incorrect parameter validation in the do_tcp_getsockopt() function 20fd74fa884f OPP: debugfs: Fix warning around icc_get_name() 877cce250a7b net: phy: dp83822: Fix RGMII TX delay configuration 262a77d85e8b Bluetooth: Fix eir name length 99f30e12e588 Bluetooth: hci_core: Fix missing instances using HCI_MAX_AD_LENGTH f30e6322bc51 Bluetooth: MGMT: Fix always using HCI_MAX_AD_LENGTH 8ec278830c1a net: hns3: fix port duplex configure error in IMP reset b3cf70472a60 net: hns3: fix kernel crash when 1588 is received on HIP08 devices 19af2ce84cd9 net: hns3: fix wrong judgment condition issue 2a2ff7095116 net: phy: fix phy_get_internal_delay accessing an empty array 60044ab84836 net: ip_tunnel: make sure to pull inner header in ip_tunnel_rcv() 66e74f2f74a6 ipv6: fib6_rules: flush route cache when rule is changed 8c91a4bfc7f8 iommu: Fix compilation without CONFIG_IOMMU_INTEL 586e19c88a0c iommu/vt-d: Retrieve IOMMU perfmon capability information f06899582cce bpf: Fix stackmap overflow check on 32-bit arches a83fdaeaea36 bpf: Fix hashtab overflow check on 32-bit arches edf7990baa48 bpf: Fix DEVMAP_HASH overflow check on 32-bit arches 98a2feb8ece6 s390/cache: prevent rebuild of shared_cpu_list 9c402819620a sr9800: Add check for usbnet_get_endpoints 715264ad09fd Bluetooth: fix use-after-free in accessing skb after sending it cb8adca52f30 Bluetooth: af_bluetooth: Fix deadlock 68644bf5ec6b Bluetooth: hci_core: Fix possible buffer overflow da77c1d39bc5 Bluetooth: hci_sync: Fix overwriting request callback 1b6cfa4c760e Bluetooth: hci_core: Cancel request on command timeout 6083089ab006 Bluetooth: hci_conn: Consolidate code for aborting connections ac7a47aaa794 Bluetooth: hci_sync: Only allow hci_cmd_sync_queue if running 1023de27cd1d Bluetooth: Cancel sync command before suspend and power off a96738eb215f Bluetooth: hci_qca: don't use IS_ERR_OR_NULL() with gpiod_get_optional() 653a17a99d75 Bluetooth: Remove superfluous call to hci_conn_check_pending() 8beed376c919 Bluetooth: mgmt: Remove leftover queuing of power_off work e5f04ec44217 Bluetooth: Remove HCI_POWER_OFF_TIMEOUT 8499af0616cf igb: Fix missing time sync events 34a7b30f56d3 iommu/vt-d: Don't issue ATS Invalidation request when device is disconnected 48fba9d7f571 PCI: Make pci_dev_is_disconnected() helper public for other drivers eeaa98f34d84 wifi: rtw88: 8821c: Fix false alarm count 2c727f83eb06 wifi: rtw88: 8821c: Fix beacon loss and disconnect 33fb18efaede ACPI: CPPC: enable AMD CPPC V2 support for family 17h processors 216712c69846 mmc: wmt-sdmmc: remove an incorrect release_mem_region() call in the .remove function 934212a623cb SUNRPC: fix some memleaks in gssx_dec_option_array 47635b112a64 x86, relocs: Ignore relocations in .notes section 9e8486e46f8b arm64: dts: rockchip: add missing interrupt-names for rk356x vdpu 5bd963ff48e8 ACPI: scan: Fix device check notification handling ed86e1fa7bad ACPI: resource: Add MAIBENBEN X577 to irq1_edge_low_force_override c259c196ebd8 ACPI: resource: Do IRQ override on Lunnen Ground laptops 804db3c1ad5c ACPI: resource: Add Infinity laptops to irq1_edge_low_force_override 24cc77b670ad arm64: dts: marvell: reorder crypto interrupts on Armada SoCs 681ba22555dc ARM: dts: imx6dl-yapp4: Move the internal switch PHYs under the switch node 28b43ec7e4c0 ARM: dts: imx6dl-yapp4: Fix typo in the QCA switch register address 23bb0006c9db ARM: dts: imx6dl-yapp4: Move phy reset into switch node 4478f7e5be24 arm64: dts: allwinner: h6: Add RX DMA channel for SPDIF db6e5e16f1ee pstore: inode: Only d_invalidate() is needed be52ee92ced6 pstore: inode: Convert mutex usage to guard(mutex) e16c33dd9967 net: mctp: copy skb ext data when fragmenting 0820c84be636 arm64: dts: renesas: r8a779g0: Correct avb[01] reg sizes bea023d846d3 arm64: dts: renesas: r8a779a0: Correct avb[01] reg sizes efab55e16c55 arm64: dts: renesas: r8a779a0: Update to R-Car Gen4 compatible values 76cfe86f2d20 arm64: dts: renesas: rzg2l: Add missing interrupts to IRQC nodes 7f1d9f8bde62 arm64: dts: renesas: r9a07g043u: Add IRQC node 96132cc2e159 arm64: dts: renesas: r9a07g043: Split out RZ/G2UL SoC specific parts 5425ac2428b3 ARM: dts: arm: realview: Fix development chip ROM compatible value 3936e0f81ac4 wifi: wilc1000: revert reset line logic flip 0d276d9f335f firmware: arm_scmi: Fix double free in SMC transport cleanup path c20211d3df54 arm64: dts: mt8195-cherry-tomato: change watchdog reset boot flow 4c51575705d2 net: ena: Remove ena_select_queue 2b718bb18f5f powercap: dtpm_cpu: Fix error check against freq_qos_add_request() 88611c1fdca4 arm64: dts: qcom: sm8150: correct PCIe wake-gpios 9c23056893a4 arm64: dts: qcom: sm8150: use 'gpios' suffix for PCI GPIOs f95febbffe98 arm64: dts: qcom: sdm845-db845c: correct PCIe wake-gpios 093cec79f0bb wifi: brcmsmac: avoid function pointer casts 386c2487754f iommu/amd: Mark interrupt as managed 031d2acc4217 bus: tegra-aconnect: Update dependency to ARCH_TEGRA fad9bcd4d754 ACPI: processor_idle: Fix memory leak in acpi_processor_power_exit() a9545af2a533 wifi: wilc1000: prevent use-after-free on vif when cleaning up all interfaces e2fed151d53d ARM: dts: qcom: msm8974: correct qfprom node size 8bfc6b840a95 bpf: Mark bpf_spin_{lock,unlock}() helpers with notrace correctly 1e33bdd02394 arm64: dts: mediatek: mt7622: add missing "device_type" to memory nodes 4bc2befb93d1 arm64: dts: mediatek: mt8192: fix vencoder clock name fedd55b8a581 arm64: dts: mediatek: mt8192-asurada: Remove CrosEC base detection node 5c77447aa444 arm64: dts: mediatek: mt7986: add "#reset-cells" to infracfg 6606534538e9 arm64: dts: mt8183: Move CrosEC base detection node to kukui-based DTs ef71a93eec06 arm64: dts: mt8183: kukui: Split out keyboard node and describe detachables a03ede2282eb ipv6: mcast: remove one synchronize_net() barrier in ipv6_mc_down() 21af11fcb03f selftests: forwarding: Add missing multicast routing config entries 4e58093897c9 selftests: forwarding: Add missing config entries 9b2ca91f6eac s390/vdso: drop '-fPIC' from LDFLAGS 8a2f812b4bfb s390/pai: fix attr_event_free upper limit for pai device drivers 437af288ec7b wifi: iwlwifi: mvm: don't set replay counters to 0xff b4907fb68d45 tools/resolve_btfids: Fix cross-compilation to non-host endianness 0697d4862d96 tools/resolve_btfids: Refactor set sorting with types from btf_ids.h 23f96f86de86 pwm: sti: Fix capture for st,pwm-num-chan < st,capture-num-chan d73b916bcc62 printk: Disable passing console lock owner completely during panic() a1f57a0127b8 wifi: wfx: fix memory leak when starting AP 4d99d267da34 wifi: libertas: fix some memleaks in lbs_allocate_cmd_buffer() 71cdbd1fcbe7 wifi: ath11k: initialize rx_mcs_80 and rx_mcs_160 before use b4bb2291d6d4 net: blackhole_dev: fix build warning for ethh set but not used ecab386a8edb pwm: atmel-hlcdc: Fix clock imbalance related to suspend support 78b8952e1df2 pwm: atmel-hlcdc: Use consistent variable naming 992cbc89b0ff pwm: atmel-hlcdc: Convert to platform remove callback returning void a5fd802a1f55 arm64: dts: imx8mm-venice-gw71xx: fix USB OTG VBUS d80bac49aebf gpio: vf610: allow disabling the vf610 driver 5666fe7b8518 wifi: iwlwifi: fix EWRD table validity check c855a1a5b7e3 wifi: iwlwifi: dbg-tlv: ensure NUL termination 9cd961d993b3 wifi: iwlwifi: mvm: report beacon protection failures 74d0639261dd wifi: ath9k: delay all of ath9k_wmi_event_tasklet() until init is complete fed6a1df672e libbpf: Add missing LIBBPF_API annotation to libbpf_set_memlock_rlim API 4f4f1e2deef2 arm64: dts: imx8mm-kontron: Fix interrupt for RTC on OSM-S i.MX8MM module 795fb93bde7a arm64: dts: imx8mm-kontron: Disable pull resistors for SD card signals on BL board a4116bd6ee5e arm64: dts: imx8mm-kontron: Disable pull resistors for SD card signals on BL OSM-S board ed2186ea406f arm64: dts: imx8mm-kontron: Disable pullups for onboard UART signals on BL board dde02bf5fc9b arm64: dts: imx8mm-kontron: Disable pullups for onboard UART signals on BL OSM-S board 333a02b3be6a arm64: dts: imx8mm-kontron: Disable pullups for I2C signals on SL/BL i.MX8MM 8f38b401b4e0 arm64: dts: imx8mm-kontron: Disable pullups for I2C signals on OSM-S i.MX8MM 4c820998a5a4 pmdomain: qcom: rpmhpd: Drop SA8540P gfx.lvl 3248f4ae054c libbpf: Fix faccessat() usage on Android 1b3bae282ae8 cpufreq: mediatek-hw: Don't error out if supply is not found 7ab56f24bf01 af_unix: Annotate data-race of gc_in_progress in wait_for_unix_gc(). 6ae1ec0043d5 selftest/bpf: Add map_in_maps with BPF_MAP_TYPE_PERF_EVENT_ARRAY values bb21851465b3 libbpf: Apply map_set_def_max_entries() for inner_maps on creation c1760abb1002 bpftool: Silence build warning about calloc() d10dbf722d32 inet_diag: annotate data-races around inet_diag_table[] f7dbf2c1675a sock_diag: annotate data-races around sock_diag_handlers[family] 60b5b89e41a6 cpufreq: mediatek-hw: Wait for CPU supplies before probing b98ed6417e59 cpufreq: Explicitly include correct DT includes e72160cb6e23 cpufreq: brcmstb-avs-cpufreq: add check for cpufreq_cpu_get's return value a81edfc5ec8b ARM: dts: renesas: r8a73a4: Fix external clocks and clock rate 6798cf0aaa7c wifi: mwifiex: debugfs: Drop unnecessary error check for debugfs_create_dir() 5a26e6d2a7ec wifi: wilc1000: fix multi-vif management when deleting a vif 515cc676dfbc wifi: wilc1000: do not realloc workqueue everytime an interface is added 3518cea837de wifi: rtl8xxxu: add cancel_work_sync() for c2hcmd_work 745003b5917b wifi: wilc1000: fix RCU usage in connect path d8766257c2e9 wifi: wilc1000: fix declarations ordering b8dd353a1a91 wifi: b43: Disable QoS for bcm4331 3033583a786e wifi: b43: Stop correct queue in DMA worker when QoS is disabled b6b6bdfca8bc wifi: b43: Stop/wake correct queue in PIO Tx path when QoS is disabled c67698325c68 wifi: b43: Stop/wake correct queue in DMA Tx path when QoS is disabled 90f089d77e38 wifi: ath10k: fix NULL pointer dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev() 13fa3326efb2 sched/fair: Take the scheduling domain into account in select_idle_core() 790ae577eff3 sched/fair: Take the scheduling domain into account in select_idle_smt() 9388721260f6 timekeeping: Fix cross-timestamp interpolation for non-x86 8a1d2ecd9bb8 timekeeping: Fix cross-timestamp interpolation corner case decision 081bf64a7e9a timekeeping: Fix cross-timestamp interpolation on counter wrap 3e5e8248c0a4 x86/sme: Fix memory encryption setting if enabled by default and not overridden f0439b7d67b8 x86/resctrl: Implement new mba_MBps throttling heuristic 74ca3ef68d2f aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts 868ec8686164 io_uring/net: fix overflow check in io_recvmsg_mshot_prep() aba7b2140e82 io_uring/net: move receive multishot out of the generic msghdr path a34fba8c44ac io_uring/net: unify how recvmsg and sendmsg copy in the msghdr 28e7fd1c70a2 rtc: test: Fix invalid format specifier. d12ffa03085e time: test: Fix incorrect format specifier 188e9aff6887 lib: memcpy_kunit: Fix an invalid format specifier in an assertion msg eaf5eaa4064d lib/cmdline: Fix an invalid format specifier in an assertion msg d6c28aefe9b4 md: Don't clear MD_CLOSING when the raid is about to stop 283e38fc7dce fs/select: rework stack allocation hack for clang 96436365e5d8 nbd: null check for nla_nest_start 267a6af60863 rcu/exp: Handle RCU expedited grace period kworker allocation failure f8b89a36721f rcu/exp: Fix RCU expedited parallel grace period kworker allocation failure recovery ad999aa18103 s390/dasd: fix double module refcount decrement 977bb962a116 s390/dasd: Use dev_*() for device log messages ba0e1cc43e09 s390/dasd: add autoquiesce feature 7533ed7668bc fs: Fix rw_hint validation e6450d5e46a7 do_sys_name_to_handle(): use kzalloc() to fix kernel-infoleak 807f99139664 ASoC: wm8962: Fix up incorrect error message in wm8962_set_fll 0a5d59ed95f1 ASoC: wm8962: Enable both SPKOUTR_ENA and SPKOUTL_ENA in mono mode f11b50b8baff ASoC: wm8962: Enable oscillator if selecting WM8962_FLL_OSC d575eb8747d6 Input: gpio_keys_polled - suppress deferred probe error for gpio 374709a7e541 ASoC: Intel: bytcr_rt5640: Add an extra entry for the Chuwi Vi8 tablet 9a4fb2bdee2f arm64: tegra: Set the correct PHY mode for MGBE 72dbf660e01a firewire: core: use long bus reset on gap count error 2f3ce8fcbf52 Bluetooth: mgmt: Fix limited discoverable off timeout 567c0411dc3b Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security 0e3732d1df35 ASoC: amd: yc: Fix non-functional mic on Lenovo 21J2 05c7c2d198a0 drm/amdgpu: Enable gpu reset for S3 abort cases on Raven series 5e61a994b228 ALSA: hda/realtek - ALC285 reduce pop noise from Headphone port b0e50fa810e8 scsi: mpt3sas: Prevent sending diag_reset when the controller is ready 008985fd35a7 ASoC: amd: yc: Add Lenovo ThinkBook 21J0 into DMI quirk table 50fbd3a7210f wifi: mac80211: only call drv_sta_rc_update for uploaded stations 80656ee2baa7 net: smsc95xx: add support for SYS TEC USB-SPEmodule1 ab1be3f1aa77 btrfs: fix data race at btrfs_use_block_rsv() when accessing block reserve 995e91c9556c btrfs: fix data races when accessing the reserved amount of block reserves 53983d354bd7 arm64: dts: Fix dtc interrupt_provider warnings b22b54f247f6 dm-verity, dm-crypt: align "struct bvec_iter" correctly 6fb80b3e75b5 block: sed-opal: handle empty atoms when parsing response 4492f2126318 parisc/ftrace: add missing CONFIG_DYNAMIC_FTRACE check 05896c8ff4ed net/iucv: fix the allocation size of iucv_path_table array f175de546a3e x86/mm: Disallow vsyscall page read for copy_from_kernel_nofault() 46c8615de5bf x86/mm: Move is_vsyscall_vaddr() into asm/vsyscall.h d35d346b5df6 riscv: dts: sifive: add missing #interrupt-cells to pmic 6d4c7bd6dc35 RDMA/mlx5: Relax DEVX access upon modify commands cad82f1671e4 RDMA/mlx5: Fix fortify source warning while accessing Eth segment 6d6aa6c0bfd6 soc: microchip: Fix POLARFIRE_SOC_SYS_CTRL input prompt 0e5b11ff7354 arm64/sve: Lower the maximum allocation for the SVE ptrace regset 6ce8cc5e6251 gen_compile_commands: fix invalid escape sequence warning d1614e1fd6c3 HID: multitouch: Add required quirk for Synaptics 0xcddc device 9a07188311af MIPS: Clear Cause.BD in instruction_pointer_set f49c513f46dc x86/xen: Add some null pointer checking to smp.c 7056108e0177 ASoC: amd: yc: Fix non-functional mic on Lenovo 82UU aa9e9c776442 ASoC: rt5645: Make LattePanda board DMI match more precise c4b96f7eaba0 selftests: tls: use exact comparison in recv_partial d23425dab997 perf/arm-cmn: Workaround AmpereOneX errata AC04_MESH_1 (incorrect child count) abd34206f396 media: rkisp1: Fix IRQ handling due to shared interrupts 806a0a1819ba nfsd: Fix creation time serialization order 96e18f236178 NFSD: Add an nfsd4_encode_nfstime4() helper 37085bbd92b3 NFSD: Fix problem of COMMIT and NFS4ERR_DELAY in infinite loop 448f1dcd6240 nfsd: simplify the delayed disposal list code 0af5ee518165 NFSD: Convert filecache to rhltable f7ae48088687 nfsd: allow reaping files still under writeback 7cc954763372 nfsd: update comment over __nfsd_file_cache_purge c01b3f0fef71 nfsd: don't take/put an extra reference when putting a file 917dadb09e31 nfsd: add some comments to nfsd_file_do_acquire ee84c44b4a0a nfsd: don't kill nfsd_files because of lease break error 8a6c19f15766 nfsd: simplify test_bit return in NFSD_FILE_KEY_FULL comparator fab03e0db0c2 nfsd: NFSD_FILE_KEY_INODE only needs to find GC'ed entries 19d22c5ba5c9 nfsd: don't open-code clear_and_wake_up_bit 7762c2d4cc0b nfsd: allow nfsd_file_get to sanely handle a NULL pointer a3812a47a320 io_uring: drop any code related to SCM_RIGHTS 28fe81bcd3ea io_uring/unix: drop usage of io_uring socket 1d467e105071 md/raid10: prevent soft lockup while flush writes 7512a70376f5 md: fix data corruption for raid456 when reshape restart while grow up cc4860dd1375 Subject: [PATCH v6.1] powerpc: drop duplicate entry in Makefile for lib dir e083231c43f3 net: fix IPSTATS_MIB_OUTFORWDATAGRAMS increment after fragment check 6ee7f29fed8c net: ipv4, ipv6: fix IPSTATS_MIB_OUTOCTETS increment duplicated a771780cdf4a net: fix IPSTATS_MIB_OUTPKGS increment in OutForwDatagrams. 8a9f2d0717f0 riscv: Fix build with CONFIG_CC_OPTIMIZE_FOR_SIZE=y 44fd0c7a5a79 tick/rcu: fix false positive "softirq work is pending" messages on RT 786775632028 kernel/sched: Fix double free on invalid isolcpus/nohz_full params 4675ec8d0b9a kernel/sched: Fix uninitialized read in nohz_full/isolcpus setup f46dc32a8617 bpf: btf: limit logging of ignored BTF mismatches 4687b40201db Revert "Revert "tick/common: Align tick period with the HZ tick."" 947f660bde07 Revert "tick/common: Align tick period with the HZ tick." dded404c66bb yaffs2: Fix miscalculation of devname buffer length 30350f237490 mtd_blkdevs: add mtd_table_mutex lock back to blktrans_{open, release} to avoid race condition 0ac32a83ca02 OF: DT-Overlay configfs interface (v8) 0b07d2478b6b fat: Replace prandom_u32() with get_random_u32() 927b66bfd641 aufs6: core 2af5eb310b11 aufs6: standalone e6537c94f033 aufs6: mmap c51d7f19876f aufs6: base 1785f762bbbb aufs6: kbuild 8f625cf94585 qemux86: add configuration symbol to select values d81fac6e842a sched/isolation: really align nohz_full with rcu_nocbs 07c526200cb3 clear_warn_once: add a clear_warn_once= boot parameter 61e2c52ce198 clear_warn_once: bind a timer to written reset value de03f5a3e6c6 clear_warn_once: expand debugfs to include read support d3f9a25028d4 tools: Remove some options from CLANG_CROSS_FLAGS 0fb98cd2429a libbpf: Fix build warning on ref_ctr_off e156ff56a19f perf python: Account for multiple words in CC f06b9c6ae59d perf: perf can not parser the backtrace of app in the 32bit system and 64bit kernel. 1b099e82095d perf: x86-32: explicitly include 5fec311e2fd2 perf: mips64: Convert __u64 to unsigned long long 6cf30287aeaa perf: fix bench numa compilation bd8f67dcb8e4 perf: add SLANG_INC for slang.h 0314b09bf6b9 perf: add sgidefs.h to for mips builds 4a39cc37b957 perf: change --root to --prefix for python install 3db4f4e91769 perf: add 'libperl not found' warning fa3d24bac29a perf: force include of deaadc523f8d fat: don't use obsolete random32 call in namei_vfat d3c72f5df9a3 FAT: Added FAT_NO_83NAME 8f1eebeb519c FAT: Add CONFIG_VFAT_NO_CREATE_WITH_LONGNAMES option 78b0423ccc14 FAT: Add CONFIG_VFAT_FS_NO_DUALNAMES option e998ad53fb68 yaffs2: replace bdevname call with sprintf 1175db6bf4cb yaffs2: convert read_page -> readfolio beb275c683de yaffs: replace IS_ERR with IS_ERR_OR_NULL to check both ERR and NULL e807c9e420bd yaffs: fix -Wstringop-overread compile warning in yaffs_fix_null_name 2fdd54282de3 yaffs2: v5.12+ build fixups (not runtime tested) 869f41030ed8 yaffs: include blkdev.h e955b68f2b1f yaffs: fix misplaced variable declaration f089603aba1d yaffs2: v5.6 build fixups 82da54859f0b yaffs2: fix memory leak when /proc/yaffs is read 2c4cf6808649 yaffs: add strict check when call yaffs_internal_read_super e7dadb47ef11 yaffs: repair yaffs_get_mtd_device f2e29be130f7 yaffs: Fix build failure by handling inode i_version with proper atomic API 8ea43ac7f3a3 yaffs2: fix memory leak in mount/umount 56db60d0abd2 yaffs: Avoid setting any ACL releated xattr 023baea095bc Yaffs:check oob size before auto selecting Yaffs1 409d39918661 fs: yaffs2: replace CURRENT_TIME by other appropriate apis 4bf42c774804 yaffs2: adjust to proper location of MS_RDONLY 08696e21a84c yaffs2: import git revision b4ce1bb (jan, 2020) ca3d9f546a60 initramfs: allow an optional wrapper script around initramfs generation 301742baace5 pnmtologo: use relocatable file name aba96ccce7d9 tools: use basename to identify file in gen-mach-types e195c32ca7c7 lib/build_OID_registry: fix reproducibility issues 876e2f1f7726 vt/conmakehash: improve reproducibility 28b7a366cfef iwlwifi: select MAC80211_LEDS conditionally 69933d85f61e net/dccp: make it depend on CONFIG_BROKEN (CVE-2020-16119) 5a308d8f142a arm64/perf: Fix wrong cast that may cause wrong truncation 339523a797e9 defconfigs: drop obselete options 3d751aeb9bcd arm64/perf: fix backtrace for AAPCS with FP enabled 86fa47f362ae linux-yocto: Handle /bin/awk issues 86f04668ef6e uvesafb: provide option to specify timeout for task completion 0db5521a1b3c uvesafb: print error message when task timeout occurs 710303c12e99 compiler.h: Undef before redefining __attribute_const__ 14a0ede85080 vmware: include jiffies.h e232e6ffe081 Resolve jiffies wrapping about arp c16abf2d705f nfs: Allow default io size to be configured. 9e9e885f4a6c check console device file on fs when booting 0ce0ce443d58 mount_root: clarify error messages for when no rootfs found 32449db67de8 menuconfig,mconf-cfg: Allow specification of ncurses location c55f1054bdce modpost: mask trivial warnings 30a45d4ee261 kbuild: exclude meta directory from distclean processing 0890b10d8fb1 powerpc: serialize image targets 6c0feb81c3ae arm: serialize build targets 77fa1b70cdbd crtsavres: fixups for 5.4+ cd107e4edd5f crtsavres: fixups for 5.4+ 8f763b35ae5b powerpc/ptrace: Disable array-bounds warning with gcc8 fe6f93755196 powerpc: Disable attribute-alias warnings from gcc8 9b7097364b87 powerpc: add crtsavres.o to archprepare for kbuild c106cd86a07b powerpc: kexec fix for powerpc64 33b7738c61fc powerpc: Add unwind information for SPE registers of E500 core c04e26a9beda mips: vdso: fix 'jalr $t9' crash in vdso code 4733368eab80 mips: Kconfig: add QEMUMIPS64 option ec2df6ae5ee5 4kc cache tlb hazard: tlbp cache coherency c8c511fae0f0 malta uhci quirks: make allowance for slow 4k(e)c b2bf1b6e971a arm64: defconfig: cleanup config options a40a34b02336 vexpress: Pass LOADADDR to Makefile 7c51524611bb arm: ARM EABI socketcall 1f6e77027c24 ARM: LPAE: Invalidate the TLB for module addresses during translation fault Signed-off-by: Bruce Ashfield --- .../linux/linux-yocto-rt_6.1.bb | 6 ++-- .../linux/linux-yocto-tiny_6.1.bb | 6 ++-- meta/recipes-kernel/linux/linux-yocto_6.1.bb | 28 +++++++++---------- 3 files changed, 20 insertions(+), 20 deletions(-) diff --git a/meta/recipes-kernel/linux/linux-yocto-rt_6.1.bb b/meta/recipes-kernel/linux/linux-yocto-rt_6.1.bb index cb091a7d79..6ad7302ad3 100644 --- a/meta/recipes-kernel/linux/linux-yocto-rt_6.1.bb +++ b/meta/recipes-kernel/linux/linux-yocto-rt_6.1.bb @@ -14,13 +14,13 @@ python () { raise bb.parse.SkipRecipe("Set PREFERRED_PROVIDER_virtual/kernel to linux-yocto-rt to enable it") } -SRCREV_machine ?= "ff8fd5f68aadf01de61a8a17d3f7fc69ea873801" -SRCREV_meta ?= "2e91a300ba91db8a5d58a7aadf6ed45dd7ae5bef" +SRCREV_machine ?= "f01320520068df70be5d8c916f1d792f69643fe6" +SRCREV_meta ?= "85ba1038b50deb50445772117e82e3e6f60c3142" SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;branch=${KBRANCH};name=machine;protocol=https \ git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.1;destsuffix=${KMETA};protocol=https" -LINUX_VERSION ?= "6.1.82" +LINUX_VERSION ?= "6.1.83" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" diff --git a/meta/recipes-kernel/linux/linux-yocto-tiny_6.1.bb b/meta/recipes-kernel/linux/linux-yocto-tiny_6.1.bb index 04cff23ecb..d59de65d49 100644 --- a/meta/recipes-kernel/linux/linux-yocto-tiny_6.1.bb +++ b/meta/recipes-kernel/linux/linux-yocto-tiny_6.1.bb @@ -8,7 +8,7 @@ require recipes-kernel/linux/linux-yocto.inc # CVE exclusions include recipes-kernel/linux/cve-exclusion_6.1.inc -LINUX_VERSION ?= "6.1.82" +LINUX_VERSION ?= "6.1.83" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}" @@ -17,8 +17,8 @@ DEPENDS += "openssl-native util-linux-native" KMETA = "kernel-meta" KCONF_BSP_AUDIT_LEVEL = "2" -SRCREV_machine ?= "329d19a5be2832acafa4a5c598a244ddb5d15737" -SRCREV_meta ?= "2e91a300ba91db8a5d58a7aadf6ed45dd7ae5bef" +SRCREV_machine ?= "7e5af88b989a76a629e76ace2604f5fe8f69d710" +SRCREV_meta ?= "85ba1038b50deb50445772117e82e3e6f60c3142" PV = "${LINUX_VERSION}+git" diff --git a/meta/recipes-kernel/linux/linux-yocto_6.1.bb b/meta/recipes-kernel/linux/linux-yocto_6.1.bb index ce0bd71dd6..7f6040ddec 100644 --- a/meta/recipes-kernel/linux/linux-yocto_6.1.bb +++ b/meta/recipes-kernel/linux/linux-yocto_6.1.bb @@ -18,25 +18,25 @@ KBRANCH:qemux86-64 ?= "v6.1/standard/base" KBRANCH:qemuloongarch64 ?= "v6.1/standard/base" KBRANCH:qemumips64 ?= "v6.1/standard/mti-malta64" -SRCREV_machine:qemuarm ?= "a07afa502355c7653fb9999345c25f86cd7c244b" -SRCREV_machine:qemuarm64 ?= "329d19a5be2832acafa4a5c598a244ddb5d15737" -SRCREV_machine:qemuloongarch64 ?= "329d19a5be2832acafa4a5c598a244ddb5d15737" -SRCREV_machine:qemumips ?= "e66e81887065c1501243b6dc862e3cea58f668b0" -SRCREV_machine:qemuppc ?= "31d1b4e1c6954491122fa3040a5e1a3017ae1462" -SRCREV_machine:qemuriscv64 ?= "329d19a5be2832acafa4a5c598a244ddb5d15737" -SRCREV_machine:qemuriscv32 ?= "329d19a5be2832acafa4a5c598a244ddb5d15737" -SRCREV_machine:qemux86 ?= "329d19a5be2832acafa4a5c598a244ddb5d15737" -SRCREV_machine:qemux86-64 ?= "329d19a5be2832acafa4a5c598a244ddb5d15737" -SRCREV_machine:qemumips64 ?= "34db6af2816a2a565d34e21135a2498e7723df07" -SRCREV_machine ?= "329d19a5be2832acafa4a5c598a244ddb5d15737" -SRCREV_meta ?= "2e91a300ba91db8a5d58a7aadf6ed45dd7ae5bef" +SRCREV_machine:qemuarm ?= "5431332379ab328763f6d3945a17420591ca58e8" +SRCREV_machine:qemuarm64 ?= "7e5af88b989a76a629e76ace2604f5fe8f69d710" +SRCREV_machine:qemuloongarch64 ?= "7e5af88b989a76a629e76ace2604f5fe8f69d710" +SRCREV_machine:qemumips ?= "0d625849a0114e2389eda2b02c6b79b6b253258e" +SRCREV_machine:qemuppc ?= "44eb5814d0930deabfa9d4167c1944f3c5e54b79" +SRCREV_machine:qemuriscv64 ?= "7e5af88b989a76a629e76ace2604f5fe8f69d710" +SRCREV_machine:qemuriscv32 ?= "7e5af88b989a76a629e76ace2604f5fe8f69d710" +SRCREV_machine:qemux86 ?= "7e5af88b989a76a629e76ace2604f5fe8f69d710" +SRCREV_machine:qemux86-64 ?= "7e5af88b989a76a629e76ace2604f5fe8f69d710" +SRCREV_machine:qemumips64 ?= "848e49dade7ab6c477475dcdc83a1cc2d3da9822" +SRCREV_machine ?= "7e5af88b989a76a629e76ace2604f5fe8f69d710" +SRCREV_meta ?= "85ba1038b50deb50445772117e82e3e6f60c3142" # set your preferred provider of linux-yocto to 'linux-yocto-upstream', and you'll # get the /base branch, which is pure upstream -stable, and the same # meta SRCREV as the linux-yocto-standard builds. Select your version using the # normal PREFERRED_VERSION settings. BBCLASSEXTEND = "devupstream:target" -SRCREV_machine:class-devupstream ?= "d7543167affd372819a94879b8b1e8b9b12547d9" +SRCREV_machine:class-devupstream ?= "e5cd595e23c1a075359a337c0e5c3a4f2dc28dd1" PN:class-devupstream = "linux-yocto-upstream" KBRANCH:class-devupstream = "v6.1/base" @@ -45,7 +45,7 @@ SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;name=machine;branch=${KBRA SRC_URI += "file://0001-perf-cpumap-Make-counter-as-unsigned-ints.patch" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" -LINUX_VERSION ?= "6.1.82" +LINUX_VERSION ?= "6.1.83" PV = "${LINUX_VERSION}+git" From patchwork Fri May 3 03:00:11 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Bruce Ashfield X-Patchwork-Id: 43217 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id A481BC25B75 for ; Fri, 3 May 2024 03:00:25 +0000 (UTC) Received: from mail-qv1-f41.google.com (mail-qv1-f41.google.com [209.85.219.41]) by mx.groups.io with SMTP id smtpd.web10.4161.1714705224099394925 for ; Thu, 02 May 2024 20:00:24 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@gmail.com header.s=20230601 header.b=FHFU676e; spf=pass (domain: gmail.com, ip: 209.85.219.41, mailfrom: bruce.ashfield@gmail.com) Received: by mail-qv1-f41.google.com with SMTP id 6a1803df08f44-6a0ce3e823fso26092406d6.1 for ; Thu, 02 May 2024 20:00:23 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1714705223; x=1715310023; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=hQZKCWloZbB5vel8kovoXXGeY/ohV61DQgEl4LmCopM=; b=FHFU676ej5K0xferTpQ98IE+wj84fqpWEZ1M8w9CZP0J7jlHaw/l+ZCTUmYCKV6vrg fwpPabb9xh1dhQ70JxCEA/9DJobKgE2xgs4ixGixgBTo0XkWLkNQFabQ+HDxpF7APCfk 0doRy5071YHZfhGLELVYwmFnMzN24zAKh4EIbVkZmxtsaY2zA4hC2ldhGnSFBkQRtoDh Q0SgT+UsatptvKSc06hTBwwWbB9EacMK2+52mlph5rqj6bfQqTbAQK3Hc82nqPOj6FNP Qt+X/E+V9w6v832Q/V2LTlVLOuCpXxqJgvYw+fAIR8n1x1c6jVOtg80ZwEkjuTPJugUo Ggfg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1714705223; x=1715310023; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=hQZKCWloZbB5vel8kovoXXGeY/ohV61DQgEl4LmCopM=; b=osqGLjTvkPyMHrz6/LCreGIdOxo6hf8HHUTdnwzgZtanJ5k1P5fEkyNw9gut91bxs2 9F1iaQP8Oy3VeSc17XgQkRtTUXIdBeNoY88BrkXSwKUOadVSBlzo7XJvLr29GwfL3nHo 6scrmUdZ/geehWtdcs4phm7tEM2i98JMVr26u1/QcC9O2OnXDKkofb0Neu/21cyWze/w 9BdoDD4QjmME+GdaJEfYw7iFV+shpoes4ouoLphPwOYRc4mjdf4daq9i47Hv0Z8SB1mh ETVJW7v9YdoiwjxMorOa0z0T/1kesR9VimfQVJe5XX7+1On8FcYf2udq2/ddLmzfCCJS /NkA== X-Gm-Message-State: AOJu0Yy3MkJlIAlfysKgryWLIlK9+fDp/vb9lSp99HgLesCWDFQQ+z30 td8WKbc9us5kYUJL3JHHbxk4bNXGxttL00ZLPaYIP4JE/SCYDqy7NQzQ/w== X-Google-Smtp-Source: AGHT+IHL3ouYATStVvFh7qQJFrA5GR/RJY8+baCREnch+4xdpe+SuVmZc1M7ToGCl4JXjzzruBPoUA== X-Received: by 2002:a05:6214:f6a:b0:6a0:bb9d:e890 with SMTP id iy10-20020a0562140f6a00b006a0bb9de890mr1823370qvb.41.1714705222796; Thu, 02 May 2024 20:00:22 -0700 (PDT) Received: from bruce-XPS-8940.localdomain (pool-174-112-62-108.cpe.net.cable.rogers.com. [174.112.62.108]) by smtp.gmail.com with ESMTPSA id mi5-20020a056214558500b006a0fa96013asm839357qvb.138.2024.05.02.20.00.21 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 02 May 2024 20:00:22 -0700 (PDT) From: bruce.ashfield@gmail.com To: steve@sakoman.com Cc: openembedded-core@lists.openembedded.org Subject: [OE-core][nanbield 06/10] linux-yocto/6.1: update to v6.1.84 Date: Thu, 2 May 2024 23:00:11 -0400 Message-Id: <20240503030015.374078-6-bruce.ashfield@gmail.com> X-Mailer: git-send-email 2.39.2 In-Reply-To: <20240503030015.374078-1-bruce.ashfield@gmail.com> References: <20240503030015.374078-1-bruce.ashfield@gmail.com> MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 03 May 2024 03:00:25 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/198961 From: Bruce Ashfield Updating linux-yocto/6.1 to the latest korg -stable release that comprises the following commits: 347385861c50 Linux 6.1.84 7b970a145c90 tools/resolve_btfids: fix build with musl libc ab062fa3dc69 USB: core: Fix deadlock in usb_deauthorize_interface() df84d9f7796f x86/sev: Skip ROM range scans and validation for SEV-SNP guests 98cfafaf2f41 scsi: libsas: Fix disk not being scanned in after being removed d511040d8169 scsi: libsas: Add a helper sas_get_sas_addr_and_dev_type() 8dbc1762202a scsi: lpfc: Correct size for wqe for memset() d8cd93e03047 scsi: lpfc: Correct size for cmdwqe/rspwqe for memset() f2b85a4cc763 tls: fix use-after-free on failed backlog decryption 00f511d71629 x86/cpu: Enable STIBP on AMD if Automatic IBRS is enabled f30b3ee9a486 scsi: qla2xxx: Delay I/O Abort on PCI error 65f195232b37 scsi: qla2xxx: Change debug message during driver unload 282877633b25 scsi: qla2xxx: Fix double free of fcport 09c0ac18cac2 scsi: qla2xxx: Fix command flush on cable pull 1bcbd100abb8 scsi: qla2xxx: NVME|FCP prefer flag not being honored 101c1d2d46a1 scsi: qla2xxx: Update manufacturer detail 14a3ca35c523 scsi: qla2xxx: Split FCE|EFT trace control 3cd58084e48e scsi: qla2xxx: Fix N2N stuck connection 3b9d72442adf scsi: qla2xxx: Prevent command send on chip reset c223bc352cd3 usb: typec: ucsi: Clear UCSI_CCI_RESET_COMPLETE before reset 12d0306cecf1 usb: typec: ucsi_acpi: Refactor and fix DELL quirk f8704d54c8e7 usb: typec: ucsi: Ack unsupported commands 959aacfe3ab6 usb: typec: ucsi: Clear EVENT_PENDING under PPM lock 2d28af770d4d usb: typec: Return size of buffer if pd_set operation succeeds f74c5e0b54b0 usb: udc: remove warning when queue disabled ep 19ca7ef7d839 usb: dwc2: gadget: LPM flow fix 74cdf12f8dd8 usb: dwc2: gadget: Fix exiting from clock gating bc48eb1b53ce usb: dwc2: host: Fix ISOC flow in DDMA mode 329492820681 usb: dwc2: host: Fix hibernation flow 4a8a42e16a5e usb: dwc2: host: Fix remote wakeup from hibernation 3e284e15b7f0 scsi: sd: Fix TCG OPAL unlock on system resume 9dac54f08198 USB: core: Fix deadlock in port "disable" sysfs attribute cd20a6e83ba0 USB: core: Add hub_get() and hub_put() routines 8416da2df7e0 staging: vc04_services: fix information leak in create_component() 008bf3d622a9 staging: vc04_services: changen strncpy() to strscpy_pad() 3678cf67ff71 scsi: core: Fix unremoved procfs host directory regression 9d66ae0e7bb7 ALSA: sh: aica: reorder cleanup operations to avoid UAF bugs 6c6a45645a2e usb: dwc3-am62: fix module unload/reload behavior aa1d1ce1ad6b usb: dwc3-am62: Rename private data c9006b90ba68 USB: UAS: return ENODEV when submit urbs fail with device not attached 916cd2fcbc1e usb: cdc-wdm: close race between read and workqueue 181f92abda61 Revert "usb: phy: generic: Get the vbus supply" fa2b938438cd Bluetooth: hci_sync: Fix not checking error on hci_cmd_sync_cancel_sync 7eab7b021835 drm/i915/gt: Reset queue_priority_hint on parking 72e4d3fb72e9 drm/i915/bios: Tolerate devdata==NULL in intel_bios_encoder_supports_dp_dual_mode() b691954c94db drm/amdkfd: fix TLB flush after unmap for GFX9.4.2 016119154981 drm/vmwgfx: Create debugfs ttm_resource_manager entry only if needed 46efbdbc95a3 net: ll_temac: platform_get_resource replaced by wrong function 9acfd8b083a0 nouveau/dmem: handle kcalloc() allocation failure 6fc218ccd534 thermal: devfreq_cooling: Fix perf state when calculate dfc res_util 244cb8200e3a block: Do not force full zone append completion in req_bio_endio() ad9cc5e9e53a mmc: core: Avoid negative index with array access 547f4afaced0 mmc: core: Initialize mmc_blk_ioc_data a433300285d7 mmc: sdhci-omap: re-tuning is needed after a pm transition to support emmc HS200 mode 192058bb3e1b hexagon: vmlinux.lds.S: handle attributes section 4e79b4a64d08 exec: Fix NOMMU linux_binprm::exec in transfer_args_to_stack() 7aa70c492272 wifi: iwlwifi: fw: don't always use FW dump trig 7eeabcea79b6 wifi: mac80211: check/clear fast rx for non-4addr sta VLAN changes d7387bcb7781 btrfs: zoned: use zone aware sb location for scrub a321a9907c0e btrfs: zoned: don't skip block groups with 100% zone unusable 6b226ae43d82 efi/libstub: Cast away type warning in use of max() ca8106fffc11 x86/efistub: Add missing boot_params for mixed mode compat entry bf2ba0b241e8 init: open /initrd.image with O_LARGEFILE 3372c3ffc345 mm/migrate: set swap entry values of THP tail pages properly. fe272b61506b x86/sev: Fix position dependent variable references in startup code 77e3de411395 x86/Kconfig: Remove CONFIG_AMD_MEM_ENCRYPT_ACTIVE_BY_DEFAULT 851ddc358737 x86/coco: Get rid of accessor functions 452a38297064 x86/coco: Export cc_vendor 083e750c9f5f vfio/fsl-mc: Block calling interrupt handler without trigger 7932db06c82c vfio/platform: Create persistent IRQ handlers 7d29d4c72c1e vfio/pci: Create persistent INTx handler 33dc33f56001 vfio: Introduce interface to flush virqfd inject workqueue 139dfcc4d723 vfio/pci: Disable auto-enable of exclusive INTx IRQ 6d87a9be2215 selftests: mptcp: diag: return KSFT_FAIL not test_cnt 052e4c8987ee blk-mq: release scheduler resource when request completes 242006996d15 block: Fix page refcounts for unaligned buffers in __bio_release_pages() 4f2debd9c680 tty: serial: imx: Fix broken RS485 44b6fb6cdedb pwm: img: fix pwm clock lookup b9d103aca85f efi: fix panic in kdump kernel 21c7c00dae55 x86/fpu: Keep xfd_state in sync with MSR_IA32_XFD 493ed133b4e4 efi/libstub: fix efi_random_alloc() to allocate memory at alloc_min or higher address 641768431508 kprobes/x86: Use copy_from_kernel_nofault() to read from unsafe address dc33e92af306 irqchip/renesas-rzg2l: Prevent spurious interrupts when setting trigger type 573777eb5607 irqchip/renesas-rzg2l: Rename rzg2l_irq_eoi() 551ad70e8662 irqchip/renesas-rzg2l: Rename rzg2l_tint_eoi() 5dc2cb3eeeee irqchip/renesas-rzg2l: Add macro to retrieve TITSR register offset based on register's index 7775e87f503a irqchip/renesas-rzg2l: Flush posted write in irq_eoi() 0250a68a35c9 irqchip/renesas-rzg2l: Implement restriction when writing ISCR register 2f67c82ed04e printk: Update @console_may_schedule in console_trylock_spinning() d7f62fde4191 iommu/dma: Force swiotlb_max_mapping_size on an untrusted device ef80ecc72127 swiotlb: Fix alignment checks when both allocation and DMA masks are present 8d8be62a7d53 minmax: add umin(a, b) and umax(a, b) 3e5222a17914 entry: Respect changes to system call number by trace_sys_enter() 936381380ae8 clocksource/drivers/arm_global_timer: Fix maximum prescaler value 64c3873cb255 iommu: Avoid races around default domain allocations 6ee02e355931 ASoC: amd: yc: Revert "Fix non-functional mic on Lenovo 21J2" cd1bbca03f3c net: tls: handle backlogging of crypto requests 2149f8a56e2e x86/efistub: Call mixed mode boot services on the firmware's stack 7a391de927a7 drm/amd/display: handle range offsets in VRR ranges 43fe5dc9faa0 i2c: i801: Avoid potential double call to gpiod_remove_lookup_table d50fd2f24f3e iio: accel: adxl367: fix I2C FIFO data register 5df4c386d35e iio: accel: adxl367: fix DEVID read after reset 155a3d8d8f77 mm, vmscan: prevent infinite loop for costly GFP_NOIO | __GFP_RETRY_MAYFAIL allocations e5b5948c769a tee: optee: Fix kernel panic caused by incorrect error handling 2cfa00b0e87f ALSA: hda/realtek: fix mute/micmute LEDs for HP EliteBook 635e23035dd4 ALSA: hda/realtek - Add Headset Mic supported Acer NB platform 18d5fc3c16cc fs/aio: Check IOCB_AIO_RW before the struct aio_kiocb conversion 994a1e583c0c vt: fix unicode buffer corruption when deleting characters 99cd2d491d1c mei: me: add arrow lake point H DID 2d56aca54847 mei: me: add arrow lake point S DID 4154e7673541 misc: lis3lv02d_i2c: Fix regulators getting en-/dis-abled twice on suspend/resume d40ab6921748 tty: serial: fsl_lpuart: avoid idle preamble pending if CTS is enabled ccaa4fb8dc4f usb: port: Don't try to peer unused USB ports based on location 7664ee8bd803 usb: gadget: ncm: Fix handling of zero block length packets f42ba916689f USB: usb-storage: Prevent divide-by-0 error in isd200_ata_command e5b3ad3e8ee4 ALSA: hda/realtek - Fix headset Mic no show at resume back for Lenovo ALC897 platform 2eadf1adf513 drm/i915: Check before removing mm notifier 7f122486a061 drm/amdgpu/pm: Fix the error of pwm1_enable setting 3a70b1c93264 tracing: Use .flush() call to wake up readers 4868c0ecdb6c KVM: SVM: Flush pages under kvm->lock to fix UAF in svm_register_enc_region() 726374dde5d6 KVM: x86: Mark target gfn of emulated atomic instruction as dirty d24a79ccdf25 init/Kconfig: lower GCC version check for -Warray-bounds 408837d7ef66 xfrm: Avoid clang fortify warning in copy_to_user_tmpl() 4f34b79c77ec Drivers: hv: vmbus: Calculate ring buffer size for more efficient use of memory 73e4f955b3f8 netfilter: nf_tables: reject constant set with timeout 72c1efe3f247 netfilter: nf_tables: disallow anonymous set with timeout flag 406b0241d0eb netfilter: nf_tables: mark set as dead when unbinding anonymous set with timeout 196f198ca6fc tls: fix race between tx work scheduling and socket close 36c676e2ed36 platform/x86: p2sb: On Goldmont only cache P2SB and SPI devfn BAR e82dc11315a7 cpufreq: brcmstb-avs-cpufreq: fix up "add check for cpufreq_cpu_get's return value" 62e06fdd180a x86/pm: Work around false positive kmemleak report in msr_build_context() 3d47eb405781 dm snapshot: fix lockup in dm_exception_table_exit 3070c70a3e46 drm/amd/display: Fix noise issue on HDMI AV mute 0581a4dac661 drm/amd/display: Return the correct HDCP error code 589c414138a1 drm/amdgpu: amdgpu_ttm_gart_bind set gtt bound flag 139845240d27 ahci: asm1064: asm1166: don't limit reported ports 25bc98657021 ahci: asm1064: correct count of reported ports 09c3fa70f651 wireguard: netlink: access device through ctx instead of peer b7cea3a9af08 wireguard: netlink: check for dangling peer via is_dead instead of empty list 97cd43ba824a LoongArch: Define the __io_aw() hook as mmiowb() 77eae2d257d6 LoongArch: Change __my_cpu_offset definition to avoid mis-optimization 0e21852b888d net: hns3: tracing: fix hclgevf trace event strings 6bcf9d2cade1 NFSD: Fix nfsd_clid_class use of __string_len() macro efd67e570ae7 x86/CPU/AMD: Update the Zenbleed microcode revisions 9f23176ad72f cpufreq: dt: always allocate zeroed cpumask bbec4e4d84c3 cifs: open_cached_dir(): add FILE_READ_EA to desired access 192e9f9078c9 nilfs2: prevent kernel bug at submit_bh_wbc() 46b832e09d43 nilfs2: fix failure to detect DAT corruption in btree and direct mappings f5bc133ef62e f2fs: truncate page cache before clearing flags when aborting atomic write 1f5124c74aaa f2fs: mark inode dirty for FI_ATOMIC_COMMITTED flag af4b1a5aa00b Revert "block/mq-deadline: use correct way to throttling write requests" 50e9f82b1c1d memtest: use {READ,WRITE}_ONCE in memory scanning fcf7345280af drm/vc4: hdmi: do not return negative values from .get_modes() ae696b7c00ef drm/imx/ipuv3: do not return negative values from .get_modes() 8f914db6fe25 drm/exynos: do not return negative values from .get_modes() 191df89d8fb0 drm/panel: do not return negative error codes from drm_panel_get_modes() cb676955d1ac drm/probe-helper: warn about negative .get_modes() b7f6c3630eb3 s390/zcrypt: fix reference counting on zcrypt card objects d6b5aac451c9 soc: fsl: qbman: Use raw spinlock for cgr_lock a62168653774 soc: fsl: qbman: Always disable interrupts when taking cgr_lock b1cf18e5bd87 ring-buffer: Use wait_event_interruptible() in ring_buffer_wait() 6e0f7e6fb1c4 ring-buffer: Fix full_waiters_pending in poll 6c2f0e055085 ring-buffer: Fix resetting of shortest_full 1df7dcfb8af3 ring-buffer: Do not set shortest_full when full target is hit 6615ef6e3166 ring-buffer: Fix waking up ring buffer readers 2952d0db18cf ksmbd: retrieve number of blocks using vfs_getattr in set_file_allocation_info 4ee09d4099bb vfio/platform: Disable virqfds on cleanup 3fe0ac10bd11 vfio/pci: Lock external INTx masking ops f56ba2d48434 vfio/pci: Remove negative check on unsigned vector dcc6b99c61ec vfio/pci: Consolidate irq cleanup on MSI/MSI-X disable 0f1e6cd8fb3c vfio: Use GFP_KERNEL_ACCOUNT for userspace persistent allocations 4732ac1c23b5 PCI: hv: Fix ring buffer size calculation 3d863cf20797 PCI: dwc: endpoint: Fix advertised resizable BAR size 04f3652bd0fd PCI: qcom: Enable BDF to SID translation properly a601e7a7fc8e PCI: qcom: Rename qcom_pcie_config_sid_sm8250() to reflect IP version 32eaf695d3c7 kbuild: Move -Wenum-{compare-conditional,enum-conversion} into W=1 3abc2d160ed8 nfs: fix UAF in direct writes f3ed58d7b356 sparc32: Fix parport build with sparc32 bda2265e6d1c sparc: Explicitly include correct DT includes 220778af6c72 io_uring/net: correctly handle multishot recvmsg retry setup 3a342fa31840 PCI/AER: Block runtime suspend when handling errors 768625f84b2a speakup: Fix 8bit characters from direct synth bf1eef7fc0f3 usb: gadget: tegra-xudc: Fix USB3 PHY retrieval logic 9cb3ace50238 phy: tegra: xusb: Add API to retrieve the port number of phy b4139fe933df slimbus: core: Remove usage of the deprecated ida_simple_xx() API 08eceec7931e nvmem: meson-efuse: fix function pointer type mismatch fb1088d51bba ext4: fix corruption during on-line resize b04abf51d725 hwmon: (amc6821) add of_match table acda20add476 landlock: Warn once if a Landlock action is requested while disabled 03f58a64794a drm/etnaviv: Restore some id values ad8a4eb66352 mmc: core: Fix switch on gp3 partition 1ede7f1d7eed mm: swap: fix race between free_swap_and_cache() and swapoff() 509546fc0347 swap: comments get_swap_device() with usage rule dcd51ab42b7a mac802154: fix llsec key resources release in mac802154_llsec_key_del f299404fd869 powerpc: xor_vmx: Add '-mhard-float' to CFLAGS aab8a0745f87 dm-raid: fix lockdep waring in "pers->hot_add_disk" c9ef367b3e39 PCI/DPC: Quirk PIO log size for Intel Raptor Lake Root Ports 900b81caf00c PCI/PM: Drain runtime-idle callbacks before driver removal 50361c2af756 btrfs: fix off-by-one chunk length calculation at contains_pending_extent() c13e7256571f btrfs: qgroup: always free reserved space for extent records b8073c069a84 serial: Lock console when calling into driver before registration 2496e37ada36 usb: typec: ucsi: Clean up UCSI_CABLE_PROP macros 371f27c2c8fc fuse: don't unhash root 970e8c49f2cf fuse: fix root lookup with nonzero generation bdba49e46905 mmc: tmio: avoid concurrent runs of mmc_request_done() 56a2038d0017 PM: sleep: wakeirq: fix wake irq warning in system suspend a43ebdbd39ce USB: serial: cp210x: add pid/vid for TDK NC0110013M and MM0110113M ed85c3113ad1 KVM: x86/xen: inject vCPU upcall vector when local APIC is enabled 8093d6e928bd USB: serial: option: add MeiG Smart SLM320 product d0ab375e730a USB: serial: cp210x: add ID for MGP Instruments PDS100 b67095647f5b USB: serial: add device ID for VeriFone adapter a87209645494 USB: serial: ftdi_sio: add support for GMC Z216C Adapter IR-USB 33a4aa08d5f0 powerpc/fsl: Fix mfpmr build errors with newer binutils b2c898469dfc usb: xhci: Add error handling in xhci_map_urb_for_dma 537040c257ab clk: qcom: mmcc-msm8974: fix terminating of frequency table arrays 185de0b7cdea clk: qcom: mmcc-apq8084: fix terminating of frequency table arrays dd92b159c506 clk: qcom: gcc-ipq8074: fix terminating of frequency table arrays 852db52b45ea clk: qcom: gcc-ipq6018: fix terminating of frequency table arrays a7b6523f9200 PM: suspend: Set mem_sleep_current during kernel command line setup 56452891e262 cpufreq: Limit resolving a frequency to policy min/max 9477cfeb3008 md/raid5: fix atomicity violation in raid5_cache_count ceffd026f851 parisc: Strip upper 32 bit of sum in csum_ipv6_magic for 64-bit builds 053bb9aab73d parisc: Fix csum_ipv6_magic on 64-bit systems a5d32783a566 parisc: Fix csum_ipv6_magic on 32-bit systems 3b64d68d90f5 parisc: Fix ip_fast_csum 6eb684e9c0d0 parisc: Avoid clobbering the C/B bits in the PSW with tophys and tovirt macros 10857a2412fc parisc/unaligned: Rewrite 64-bit inline assembly of emulate_ldd() ffbfea10d9c9 mtd: rawnand: meson: fix scrambling mode value in command macro 5d1442eeb936 ubi: correct the calculation of fastmap size 5ecbc7465f66 ubi: Check for too small LEB size in VTBL code 142d87c958d9 ubifs: Set page uptodate in the correct place c8cc05de8e6b fat: fix uninitialized field in nostale filehandles 428ca0000f0a bounds: support non-power-of-two CONFIG_NR_CPUS 03b821647b73 kasan/test: avoid gcc warning for intentional overflow 5ea241b1931f block: Clear zone limits for a non-zoned stacked queue 719d7f899df4 ext4: correct best extent lstart adjustment logic 81479bf75809 selftests/mqueue: Set timeout to 180 seconds 226fc408c5fc crypto: qat - resolve race condition during AER recovery efffffde33d6 crypto: qat - fix double free during reset 8557bef80cc3 sparc: vDSO: fix return value of __setup handler 0993f7f85d26 sparc64: NMI watchdog: fix return value of __setup handler 605ddb3a6e5f powerpc/smp: Increase nr_cpu_ids to include the boot CPU 334fb14389b5 powerpc/smp: Adjust nr_cpu_ids to cover all threads of a core 14cdbd9440a4 cpufreq: amd-pstate: Fix min_perf assignment in amd_pstate_adjust_perf() b54478d20375 KVM: Always flush async #PF workqueue when vCPU is being destroyed e2c545b841a7 media: mc: Expand MUST_CONNECT flag to always require an enabled link 61656ca92ea9 media: mc: Rename pad variable to clarify intent cff51913c5cc media: mc: Add num_links flag to media_pad f29793c33984 media: mc: Fix flags handling when creating pad links 1025ff4e6a7a media: mc: Add local pad to pipeline regardless of the link state 09c1be4d581d media: xc4000: Fix atomicity violation in xc4000_get_frequency 6d21d0356aa4 pci_iounmap(): Fix MMIO mapping leak 12609c76b755 serial: max310x: fix NULL pointer dereference in I2C instantiation 07c3fe923ff7 drm/vmwgfx: Fix possible null pointer derefence with invalid contexts 74cd997ba17b arm: dts: marvell: Fix maxium->maxim typo in brownstone dts dee9c2586555 smack: Handle SMACK64TRANSMUTE in smack_inode_setsecurity() d4b1c3b5ec1c smack: Set SMACK64TRANSMUTE only for dirs in smack_inode_setxattr() a881dd09fd99 clk: qcom: gcc-sdm845: Add soft dependency on rpmhpd 9875deeefedf remoteproc: virtio: Fix wdg cannot recovery remote processor 5166fc45d7ea arm64: dts: qcom: sc7280: Add additional MSI interrupts e144e47703ce media: staging: ipu3-imgu: Set fields before media_entity_pads_init() 0b812f706fd7 wifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach 113d5341ee12 timers: Rename del_timer_sync() to timer_delete_sync() 2957037c1d94 timers: Use del_timer_sync() even on UP a50fd9871257 timers: Update kernel-doc for various functions 981cf0cab48a KVM: x86: Use a switch statement and macros in __feature_translate() b6aa21725fbe KVM: x86: Advertise CPUID.(EAX=7,ECX=2):EDX[5:0] to userspace 8d70aa08326c KVM: x86: Update KVM-only leaf handling to allow for 100% KVM-only leafs 3769db86adec x86/bugs: Use sysfs_emit() f1ee75aa66c7 x86/cpu: Support AMD Automatic IBRS cc4860dd1375 Subject: [PATCH v6.1] powerpc: drop duplicate entry in Makefile for lib dir e083231c43f3 net: fix IPSTATS_MIB_OUTFORWDATAGRAMS increment after fragment check 6ee7f29fed8c net: ipv4, ipv6: fix IPSTATS_MIB_OUTOCTETS increment duplicated a771780cdf4a net: fix IPSTATS_MIB_OUTPKGS increment in OutForwDatagrams. 8a9f2d0717f0 riscv: Fix build with CONFIG_CC_OPTIMIZE_FOR_SIZE=y 44fd0c7a5a79 tick/rcu: fix false positive "softirq work is pending" messages on RT 786775632028 kernel/sched: Fix double free on invalid isolcpus/nohz_full params 4675ec8d0b9a kernel/sched: Fix uninitialized read in nohz_full/isolcpus setup f46dc32a8617 bpf: btf: limit logging of ignored BTF mismatches 4687b40201db Revert "Revert "tick/common: Align tick period with the HZ tick."" 947f660bde07 Revert "tick/common: Align tick period with the HZ tick." dded404c66bb yaffs2: Fix miscalculation of devname buffer length 30350f237490 mtd_blkdevs: add mtd_table_mutex lock back to blktrans_{open, release} to avoid race condition 0ac32a83ca02 OF: DT-Overlay configfs interface (v8) 0b07d2478b6b fat: Replace prandom_u32() with get_random_u32() 927b66bfd641 aufs6: core 2af5eb310b11 aufs6: standalone e6537c94f033 aufs6: mmap c51d7f19876f aufs6: base 1785f762bbbb aufs6: kbuild 8f625cf94585 qemux86: add configuration symbol to select values d81fac6e842a sched/isolation: really align nohz_full with rcu_nocbs 07c526200cb3 clear_warn_once: add a clear_warn_once= boot parameter 61e2c52ce198 clear_warn_once: bind a timer to written reset value de03f5a3e6c6 clear_warn_once: expand debugfs to include read support d3f9a25028d4 tools: Remove some options from CLANG_CROSS_FLAGS 0fb98cd2429a libbpf: Fix build warning on ref_ctr_off e156ff56a19f perf python: Account for multiple words in CC f06b9c6ae59d perf: perf can not parser the backtrace of app in the 32bit system and 64bit kernel. 1b099e82095d perf: x86-32: explicitly include 5fec311e2fd2 perf: mips64: Convert __u64 to unsigned long long 6cf30287aeaa perf: fix bench numa compilation bd8f67dcb8e4 perf: add SLANG_INC for slang.h 0314b09bf6b9 perf: add sgidefs.h to for mips builds 4a39cc37b957 perf: change --root to --prefix for python install 3db4f4e91769 perf: add 'libperl not found' warning fa3d24bac29a perf: force include of deaadc523f8d fat: don't use obsolete random32 call in namei_vfat d3c72f5df9a3 FAT: Added FAT_NO_83NAME 8f1eebeb519c FAT: Add CONFIG_VFAT_NO_CREATE_WITH_LONGNAMES option 78b0423ccc14 FAT: Add CONFIG_VFAT_FS_NO_DUALNAMES option e998ad53fb68 yaffs2: replace bdevname call with sprintf 1175db6bf4cb yaffs2: convert read_page -> readfolio beb275c683de yaffs: replace IS_ERR with IS_ERR_OR_NULL to check both ERR and NULL e807c9e420bd yaffs: fix -Wstringop-overread compile warning in yaffs_fix_null_name 2fdd54282de3 yaffs2: v5.12+ build fixups (not runtime tested) 869f41030ed8 yaffs: include blkdev.h e955b68f2b1f yaffs: fix misplaced variable declaration f089603aba1d yaffs2: v5.6 build fixups 82da54859f0b yaffs2: fix memory leak when /proc/yaffs is read 2c4cf6808649 yaffs: add strict check when call yaffs_internal_read_super e7dadb47ef11 yaffs: repair yaffs_get_mtd_device f2e29be130f7 yaffs: Fix build failure by handling inode i_version with proper atomic API 8ea43ac7f3a3 yaffs2: fix memory leak in mount/umount 56db60d0abd2 yaffs: Avoid setting any ACL releated xattr 023baea095bc Yaffs:check oob size before auto selecting Yaffs1 409d39918661 fs: yaffs2: replace CURRENT_TIME by other appropriate apis 4bf42c774804 yaffs2: adjust to proper location of MS_RDONLY 08696e21a84c yaffs2: import git revision b4ce1bb (jan, 2020) ca3d9f546a60 initramfs: allow an optional wrapper script around initramfs generation 301742baace5 pnmtologo: use relocatable file name aba96ccce7d9 tools: use basename to identify file in gen-mach-types e195c32ca7c7 lib/build_OID_registry: fix reproducibility issues 876e2f1f7726 vt/conmakehash: improve reproducibility 28b7a366cfef iwlwifi: select MAC80211_LEDS conditionally 69933d85f61e net/dccp: make it depend on CONFIG_BROKEN (CVE-2020-16119) 5a308d8f142a arm64/perf: Fix wrong cast that may cause wrong truncation 339523a797e9 defconfigs: drop obselete options 3d751aeb9bcd arm64/perf: fix backtrace for AAPCS with FP enabled 86fa47f362ae linux-yocto: Handle /bin/awk issues 86f04668ef6e uvesafb: provide option to specify timeout for task completion 0db5521a1b3c uvesafb: print error message when task timeout occurs 710303c12e99 compiler.h: Undef before redefining __attribute_const__ 14a0ede85080 vmware: include jiffies.h e232e6ffe081 Resolve jiffies wrapping about arp c16abf2d705f nfs: Allow default io size to be configured. 9e9e885f4a6c check console device file on fs when booting 0ce0ce443d58 mount_root: clarify error messages for when no rootfs found 32449db67de8 menuconfig,mconf-cfg: Allow specification of ncurses location c55f1054bdce modpost: mask trivial warnings 30a45d4ee261 kbuild: exclude meta directory from distclean processing 0890b10d8fb1 powerpc: serialize image targets 6c0feb81c3ae arm: serialize build targets 77fa1b70cdbd crtsavres: fixups for 5.4+ cd107e4edd5f crtsavres: fixups for 5.4+ 8f763b35ae5b powerpc/ptrace: Disable array-bounds warning with gcc8 fe6f93755196 powerpc: Disable attribute-alias warnings from gcc8 9b7097364b87 powerpc: add crtsavres.o to archprepare for kbuild c106cd86a07b powerpc: kexec fix for powerpc64 33b7738c61fc powerpc: Add unwind information for SPE registers of E500 core c04e26a9beda mips: vdso: fix 'jalr $t9' crash in vdso code 4733368eab80 mips: Kconfig: add QEMUMIPS64 option ec2df6ae5ee5 4kc cache tlb hazard: tlbp cache coherency c8c511fae0f0 malta uhci quirks: make allowance for slow 4k(e)c b2bf1b6e971a arm64: defconfig: cleanup config options a40a34b02336 vexpress: Pass LOADADDR to Makefile 7c51524611bb arm: ARM EABI socketcall 1f6e77027c24 ARM: LPAE: Invalidate the TLB for module addresses during translation fault Signed-off-by: Bruce Ashfield --- .../linux/linux-yocto-rt_6.1.bb | 6 ++-- .../linux/linux-yocto-tiny_6.1.bb | 6 ++-- meta/recipes-kernel/linux/linux-yocto_6.1.bb | 28 +++++++++---------- 3 files changed, 20 insertions(+), 20 deletions(-) diff --git a/meta/recipes-kernel/linux/linux-yocto-rt_6.1.bb b/meta/recipes-kernel/linux/linux-yocto-rt_6.1.bb index 6ad7302ad3..d0173e3ee7 100644 --- a/meta/recipes-kernel/linux/linux-yocto-rt_6.1.bb +++ b/meta/recipes-kernel/linux/linux-yocto-rt_6.1.bb @@ -14,13 +14,13 @@ python () { raise bb.parse.SkipRecipe("Set PREFERRED_PROVIDER_virtual/kernel to linux-yocto-rt to enable it") } -SRCREV_machine ?= "f01320520068df70be5d8c916f1d792f69643fe6" -SRCREV_meta ?= "85ba1038b50deb50445772117e82e3e6f60c3142" +SRCREV_machine ?= "4df82ffbb2b0f0b0efb545d1f67e61c987d051c1" +SRCREV_meta ?= "8b555bd39017d9e6b19a0e2c98e563c5ebccef14" SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;branch=${KBRANCH};name=machine;protocol=https \ git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.1;destsuffix=${KMETA};protocol=https" -LINUX_VERSION ?= "6.1.83" +LINUX_VERSION ?= "6.1.84" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" diff --git a/meta/recipes-kernel/linux/linux-yocto-tiny_6.1.bb b/meta/recipes-kernel/linux/linux-yocto-tiny_6.1.bb index d59de65d49..1d438cb43c 100644 --- a/meta/recipes-kernel/linux/linux-yocto-tiny_6.1.bb +++ b/meta/recipes-kernel/linux/linux-yocto-tiny_6.1.bb @@ -8,7 +8,7 @@ require recipes-kernel/linux/linux-yocto.inc # CVE exclusions include recipes-kernel/linux/cve-exclusion_6.1.inc -LINUX_VERSION ?= "6.1.83" +LINUX_VERSION ?= "6.1.84" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}" @@ -17,8 +17,8 @@ DEPENDS += "openssl-native util-linux-native" KMETA = "kernel-meta" KCONF_BSP_AUDIT_LEVEL = "2" -SRCREV_machine ?= "7e5af88b989a76a629e76ace2604f5fe8f69d710" -SRCREV_meta ?= "85ba1038b50deb50445772117e82e3e6f60c3142" +SRCREV_machine ?= "79fae610a03169f636ecf8a2c4a520af0c01ea58" +SRCREV_meta ?= "8b555bd39017d9e6b19a0e2c98e563c5ebccef14" PV = "${LINUX_VERSION}+git" diff --git a/meta/recipes-kernel/linux/linux-yocto_6.1.bb b/meta/recipes-kernel/linux/linux-yocto_6.1.bb index 7f6040ddec..c4e8750e6b 100644 --- a/meta/recipes-kernel/linux/linux-yocto_6.1.bb +++ b/meta/recipes-kernel/linux/linux-yocto_6.1.bb @@ -18,25 +18,25 @@ KBRANCH:qemux86-64 ?= "v6.1/standard/base" KBRANCH:qemuloongarch64 ?= "v6.1/standard/base" KBRANCH:qemumips64 ?= "v6.1/standard/mti-malta64" -SRCREV_machine:qemuarm ?= "5431332379ab328763f6d3945a17420591ca58e8" -SRCREV_machine:qemuarm64 ?= "7e5af88b989a76a629e76ace2604f5fe8f69d710" -SRCREV_machine:qemuloongarch64 ?= "7e5af88b989a76a629e76ace2604f5fe8f69d710" -SRCREV_machine:qemumips ?= "0d625849a0114e2389eda2b02c6b79b6b253258e" -SRCREV_machine:qemuppc ?= "44eb5814d0930deabfa9d4167c1944f3c5e54b79" -SRCREV_machine:qemuriscv64 ?= "7e5af88b989a76a629e76ace2604f5fe8f69d710" -SRCREV_machine:qemuriscv32 ?= "7e5af88b989a76a629e76ace2604f5fe8f69d710" -SRCREV_machine:qemux86 ?= "7e5af88b989a76a629e76ace2604f5fe8f69d710" -SRCREV_machine:qemux86-64 ?= "7e5af88b989a76a629e76ace2604f5fe8f69d710" -SRCREV_machine:qemumips64 ?= "848e49dade7ab6c477475dcdc83a1cc2d3da9822" -SRCREV_machine ?= "7e5af88b989a76a629e76ace2604f5fe8f69d710" -SRCREV_meta ?= "85ba1038b50deb50445772117e82e3e6f60c3142" +SRCREV_machine:qemuarm ?= "6c89adaf651c4599869544f1ccc532641e5e6e9c" +SRCREV_machine:qemuarm64 ?= "79fae610a03169f636ecf8a2c4a520af0c01ea58" +SRCREV_machine:qemuloongarch64 ?= "79fae610a03169f636ecf8a2c4a520af0c01ea58" +SRCREV_machine:qemumips ?= "cef1886035a8438205634d51fdfc3c1481b668e8" +SRCREV_machine:qemuppc ?= "42585bdd38e874d2c4b08364a160e5dad5cd683e" +SRCREV_machine:qemuriscv64 ?= "79fae610a03169f636ecf8a2c4a520af0c01ea58" +SRCREV_machine:qemuriscv32 ?= "79fae610a03169f636ecf8a2c4a520af0c01ea58" +SRCREV_machine:qemux86 ?= "79fae610a03169f636ecf8a2c4a520af0c01ea58" +SRCREV_machine:qemux86-64 ?= "79fae610a03169f636ecf8a2c4a520af0c01ea58" +SRCREV_machine:qemumips64 ?= "a6c079ca05576d39ff871aad90050021aecaf3c7" +SRCREV_machine ?= "79fae610a03169f636ecf8a2c4a520af0c01ea58" +SRCREV_meta ?= "8b555bd39017d9e6b19a0e2c98e563c5ebccef14" # set your preferred provider of linux-yocto to 'linux-yocto-upstream', and you'll # get the /base branch, which is pure upstream -stable, and the same # meta SRCREV as the linux-yocto-standard builds. Select your version using the # normal PREFERRED_VERSION settings. BBCLASSEXTEND = "devupstream:target" -SRCREV_machine:class-devupstream ?= "e5cd595e23c1a075359a337c0e5c3a4f2dc28dd1" +SRCREV_machine:class-devupstream ?= "347385861c50adc8d4801d4b899eded38a2f04cd" PN:class-devupstream = "linux-yocto-upstream" KBRANCH:class-devupstream = "v6.1/base" @@ -45,7 +45,7 @@ SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;name=machine;branch=${KBRA SRC_URI += "file://0001-perf-cpumap-Make-counter-as-unsigned-ints.patch" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" -LINUX_VERSION ?= "6.1.83" +LINUX_VERSION ?= "6.1.84" PV = "${LINUX_VERSION}+git" From patchwork Fri May 3 03:00:12 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Bruce Ashfield X-Patchwork-Id: 43220 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id A6991C04FFE for ; Fri, 3 May 2024 03:00:35 +0000 (UTC) Received: from mail-qv1-f46.google.com (mail-qv1-f46.google.com [209.85.219.46]) by mx.groups.io with SMTP id smtpd.web11.4333.1714705225352673970 for ; Thu, 02 May 2024 20:00:25 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@gmail.com header.s=20230601 header.b=WCWgt5ly; spf=pass (domain: gmail.com, ip: 209.85.219.46, mailfrom: bruce.ashfield@gmail.com) Received: by mail-qv1-f46.google.com with SMTP id 6a1803df08f44-6a0b68733f5so42935526d6.1 for ; Thu, 02 May 2024 20:00:25 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1714705224; x=1715310024; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=ynLyrq8AvgJtB5t3cJy9C2HIp3dm16kPe8QvkPGjQ9k=; b=WCWgt5lyvB8EIKkTY4dCOJs+ueVxb5nAIs5IcXYpc0wPmrNsFFLa4nHUCkJHQhJS19 JK+7KduTdVu2fgdvY2xgAP/2PMCvlWaKHtkKZ1G9cw24V8U+/GyS2Y17XbVenNQBup7w e30Ovy/mBXqSta9SLpFPJFTYi12FBpZMF1j94czyU9iIVsx+Fcw9NCqApDnbKLi6OgCh 9KD3D/yoQT4/LunRm+mS9cbui+vXZWbpqjPUk3Ag3hKZM8xIF5b1ewyJPwFv/gkLhn4c aW0hWlXjL+hVu7sth33WJ7Q5aBQdS2JM0AmyFzw/h4UFZ3FsZHqWQwuiHJf5cn3ybbe8 25TA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1714705224; x=1715310024; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=ynLyrq8AvgJtB5t3cJy9C2HIp3dm16kPe8QvkPGjQ9k=; b=AXcpbYH7cRxsj+wh+gWY81YH9OkymmLSvHWCaef2/1osG+cz2qR1qQUyOeviZwfNgZ V54TbhKazfLR6Wf4dYQyG1G8ZEZ2rCiwEgpuquVa3Qc3QrErpcvvpJRKXXo/OXiDAbLe I+PEuzcHaia+M4J6n1WyRvUaQnBwauAcwJjuZ5gv3fCnoqY1d9v/3R+FQMHxFYLmo3BX Ui5VS8EnVpNwcV7BTxyCT64mLGn8m6lp6MuY1LIAstOTxsPNPwsXdO9IrvpR1p9xqUuz kytyT7fFW4ygJBafCoIQFsTYpGgBOA7rCwWD69xKVzLnQce494GWRQVJZnbwV/Ltq/4d 2eBA== X-Gm-Message-State: AOJu0Ywyz9ecqBVfXUXeTvo8hfM/GWmMFzjE3OQagh4tGgocZix0N3RU +ZruY06MTrT8/pm5Ux1RdZKzMnOFlXWQleWTIRhi9VgX9oQiTjkreOibjw== X-Google-Smtp-Source: AGHT+IFhlWUK769ETzr4fCiB2BbFYp/4txCHfyBccJmdux6BnT/MTYmAlPoBPApCYPuiy0QHEANgAA== X-Received: by 2002:a05:6214:27e4:b0:6a0:af07:1089 with SMTP id jt4-20020a05621427e400b006a0af071089mr1527881qvb.55.1714705223739; Thu, 02 May 2024 20:00:23 -0700 (PDT) Received: from bruce-XPS-8940.localdomain (pool-174-112-62-108.cpe.net.cable.rogers.com. [174.112.62.108]) by smtp.gmail.com with ESMTPSA id mi5-20020a056214558500b006a0fa96013asm839357qvb.138.2024.05.02.20.00.22 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 02 May 2024 20:00:23 -0700 (PDT) From: bruce.ashfield@gmail.com To: steve@sakoman.com Cc: openembedded-core@lists.openembedded.org Subject: [OE-core][nanbield 07/10] linux-yocto/6.1: update to v6.1.86 Date: Thu, 2 May 2024 23:00:12 -0400 Message-Id: <20240503030015.374078-7-bruce.ashfield@gmail.com> X-Mailer: git-send-email 2.39.2 In-Reply-To: <20240503030015.374078-1-bruce.ashfield@gmail.com> References: <20240503030015.374078-1-bruce.ashfield@gmail.com> MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 03 May 2024 03:00:35 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/198962 From: Bruce Ashfield Updating linux-yocto/6.1 to the latest korg -stable release that comprises the following commits: cd5d98c0556c Linux 6.1.86 c5f9fe2c1e50 Revert "drm/amd/amdgpu: Fix potential ioremap() memory leaks in amdgpu_device_init()" eea65ed73898 VMCI: Fix possible memcpy() run-time warning in vmci_datagram_invoke_guest_handler() cea93dae3e25 net: mpls: error out if inner headers are not set 21f5cfed1e7a Bluetooth: btintel: Fixe build regression 00e34ff1ce81 platform/x86: intel-vbtn: Update tablet mode switch at end of probe e80b4980af26 randomize_kstack: Improve entropy diffusion 649e5646362a virtio: reenable config if freezing device failed 3a9c459091e3 scsi: sd: usb_storage: uas: Access media prior to querying device properties 345b6b831980 Revert "scsi: core: Add struct for args to execution functions" f1465ff4c83c Revert "scsi: sd: usb_storage: uas: Access media prior to querying device properties" cf0650adb625 gcc-plugins/stackleak: Avoid .head.text section 2b85977977cb tty: n_gsm: require CAP_NET_ADMIN to attach N_GSM0710 ldisc 2aeb805a1bcd netfilter: nf_tables: discard table flag update with pending basechain deletion 8d3a58af50e4 netfilter: nf_tables: release mutex after nft_gc_seq_end from abort path fcd1993a2937 netfilter: nf_tables: release batch on table validation from abort path 664206ff8b01 fbmon: prevent division by zero in fb_videomode_from_videomode() 30044c66bc1a drivers/nvme: Add quirks for device 126f:2262 5245a6da27ef io_uring: clear opcode specific data for an early failure f8a7b7b085df fbdev: viafb: fix typo in hw_bitblt_1 and hw_bitblt_2 8b849265dad8 ASoC: soc-core.c: Skip dummy codec when adding platforms 103c0f946f9a thermal/of: Assume polling-delay(-passive) 0 when absent 409289d0a151 usb: sl811-hcd: only defined function checkdone if QUIRK2 is defined 57e6634e591b usb: typec: tcpci: add generic tcpci fallback compatible f692c547e3f2 thunderbolt: Keep the domain powered when USB4 port is in redrive mode 893b2562613f usb: gadget: uvc: mark incomplete frames with UVC_STREAM_ERR 7dbf082988d6 bus: mhi: host: Add MHI_PM_SYS_ERR_FAIL state 63eaa43d5d5f tools: iio: replace seekdir() in iio_generic_buffer 1e9f5619d908 ring-buffer: use READ_ONCE() to read cpu_buffer->commit_page in concurrent environment 5e7da5bb2d34 ktest: force $buildonly = 1 for 'make_warnings_file' test type 39da708cb201 perf/x86/amd/lbr: Discard erroneous branch entries 44479c7fefc8 platform/x86: touchscreen_dmi: Add an extra entry for a variant of the Chuwi Vi8 tablet 70310e55b529 Input: allocate keycode for Display refresh rate toggle 055e406d7b0e Input: imagis - use FIELD_GET where applicable 4097b1f10f04 RDMA/cm: add timeout to cm_destroy_id wait 512a01da7134 block: prevent division by zero in blk_rq_stat_sum() c87e811cae7e input/touchscreen: imagis: Correct the maximum touch area value b7d153bfba62 libperf evlist: Avoid out-of-bounds access aaefa79c1532 Revert "ACPI: PM: Block ASUS B1400CEAE from suspend to idle by default" 43be051f35f9 SUNRPC: increase size of rpc_wait_queue.qlen from unsigned short to unsigned int 3a94feab045f drm/amd/amdgpu: Fix potential ioremap() memory leaks in amdgpu_device_init() 354a5d7bb740 drm/amd/display: Fix nanosec stat overflow aba664845af3 ext4: forbid commit inconsistent quota data when errors=remount-ro baba35106855 ext4: add a hint for block bitmap corrupt state in mb_groups b75395ec4b7a ALSA: firewire-lib: handle quirk to calculate payload quadlets as data block counter 84ed33a08218 media: sta2x11: fix irq handler cast 2e2177f94c0e Julia Lawall reported this null pointer dereference, this should fix it. 3f3c1e735d3e rcu-tasks: Repair RCU Tasks Trace quiescence check eae948ecd5f0 ASoC: Intel: common: DMI remap for rebranded Intel NUC M15 (LAPRC710) laptops 13701b0f01b6 isofs: handle CDs with bad root inode but good Joliet root directory ee0b5f96b6d6 scsi: lpfc: Fix possible memory leak in lpfc_rcv_padisc() 53cb1e52c9db sysv: don't call sb_bread() with pointers_lock held 5238e1c2bd31 pinctrl: renesas: checker: Limit cfg reg enum checks to provided IDs c87dd159189a drm: panel-orientation-quirks: Add quirk for GPD Win Mini ac1e0f080a76 Input: synaptics-rmi4 - fail probing if memory allocation for "phys" fails 48bfb4b03c5f drm/vc4: don't check if plane->state->fb == state->fb a83a7728e487 Bluetooth: btmtk: Add MODULE_FIRMWARE() for MT7922 b19fe5eea619 Bluetooth: btintel: Fix null ptr deref in btintel_read_version d7ee3bf0caf5 net/smc: reduce rtnl pressure in smc_pnet_create_pnetids_list() 5693dd6d3d01 ice: use relative VSI index for VFs instead of PF VSI number 9ae356c627b4 btrfs: send: handle path ref underflow in header iterate_inode_ref() 0f30f95b918e btrfs: export: handle invalid inode or root reference in btrfs_get_parent() 36c2a2863bc3 btrfs: handle chunk tree lookup error in btrfs_relocate_sys_chunks() 50bd749c60ce cpufreq: Don't unregister cpufreq cooling on CPU hotplug 6597a6687af5 wifi: ath11k: decrease MHI channel buffer length to 8KB 4e0cfb25d49d dma-direct: Leak pages on dma_set_decrypted() failure a3f6045ce3c9 net: pcs: xpcs: Return EINVAL in the internal methods 51a9b20a047d tools/power x86_energy_perf_policy: Fix file leak in get_pkg_num() 635594cca59f pstore/zone: Add a null pointer check to the psz_kmsg_read 8ead0a04a7f3 wifi: brcmfmac: Add DMI nvram filename quirk for ACEPC W5 Pro 161d6b803778 firmware: tegra: bpmp: Return directly after a failed kzalloc() in get_filename() 8af60bb2b215 net: skbuff: add overflow debug check to pull/push helpers b8ca15861c88 ionic: set adminq irq affinity 6925d11fbda2 arm64: dts: rockchip: fix rk3399 hdmi ports node a29204893476 arm64: dts: rockchip: fix rk3328 hdmi ports node b510fbe3a7bf cpuidle: Avoid potential overflow in integer multiplication 94b016b28bdd panic: Flush kernel log buffer at the end 8d80e092027a wifi: iwlwifi: pcie: Add the PCI device id for new hardware feacd430b42b VMCI: Fix memcpy() run-time warning in dg_dispatch_as_host() fd5fdacae93a wifi: rtw89: pci: enlarge RX DMA buffer to consider size of RX descriptor d6b0472d5fbd bnx2x: Fix firmware version string character counts 7dd4831c3ecb wifi: ath9k: fix LNA selection in ath_ant_try_scan() e6768c6737f4 amdkfd: use calloc instead of kzalloc to avoid integer overflow bf1e3b1cb1e0 Linux 6.1.85 e21838dfd084 x86: set SPECTRE_BHI_ON as default 3e4283b77107 KVM: x86: Add BHI_NO 43704e993ae5 x86/bhi: Mitigate KVM by default bb8384b6dfbc x86/bhi: Add BHI mitigation knob 42196bdec082 x86/bhi: Enumerate Branch History Injection (BHI) bug 29c50bb6fbe4 x86/bhi: Define SPEC_CTRL_BHI_DIS_S 07dbb10f153f x86/bhi: Add support for clearing branch history at syscall entry 74fcb181772e x86/syscall: Don't force use of indirect calls for system calls fd52c0397b53 x86/bugs: Change commas to semicolons in 'spectre_v2' sysfs file 5e6898b8544d nvme: fix miss command type check 9c2b4b657739 mm/secretmem: fix GUP-fast succeeding on secretmem folios a6dc534c073b selftests: mptcp: display simult in extra_msg d1fefedc1a0e mptcp: don't account accept() of non-MPC client as fallback to TCP 08ef93ebc73c selftests: mptcp: join: fix dev in check_endpoint 7e8360ac8774 smb: client: fix potential UAF in cifs_signal_cifsd_for_reconnect() f9414004798d smb: client: fix potential UAF in smb2_is_network_name_deleted() 494c91e1e941 smb: client: fix potential UAF in is_valid_oplock_break() c868cabdf6fd smb: client: fix potential UAF in smb2_is_valid_lease_break() 84488466b7a6 smb: client: fix potential UAF in smb2_is_valid_oplock_break() 16b7d785775e smb: client: fix potential UAF in cifs_stats_proc_show() 8fefd166fcb3 smb: client: fix potential UAF in cifs_stats_proc_write() 229042314602 smb: client: fix potential UAF in cifs_debug_files_proc_show() 8c99dfb49bdc smb3: retrying on failed server close f6583444d7e7 riscv: process: Fix kernel gp leakage c88f7a709512 riscv: Fix spurious errors from __get/put_kernel_nofault 447d844a3e10 s390/entry: align system call table on 8 bytes 22943e4fe4b3 x86/coco: Require seeding RNG with RDRAND on CoCo systems 20a915154ccb x86/mce: Make sure to grab mce_sysfs_mutex in set_bank() 97e93367e827 x86/mm/pat: fix VM_PAT handling in COW mappings 7b6df050c45a of: dynamic: Synchronize of_changeset_destroy() with the devlink removals 9406d598a13a driver core: Introduce device_link_wait_removal() f35d7ede62d9 ALSA: hda/realtek: Update Panasonic CF-SZ6 quirk to support headset with microphone 2ff8f0655057 ALSA: hda/realtek - Fix inactive headset mic jack 883e072e83f1 ksmbd: do not set SMB2_GLOBAL_CAP_ENCRYPTION for SMB 3.1.1 51a6c2af9d20 ksmbd: validate payload size in ipc response 2e5f8dc1dec8 ksmbd: don't send oplock break if rename fails 7ef6a7f9b32f x86/retpoline: Add NOENDBR annotation to the SRSO dummy return thunk c19715ec258d nfsd: hold a lighter-weight client reference over CB_RECALL_ANY 12059cf0487f ata: sata_mv: Fix PCI device ID table declaration compilation warning 78942ac75499 cifs: Fix caching to try to do open O_WRONLY as rdwr on server 9adcfd56703c scsi: sd: Unregister device if device_add_disk() failed in sd_probe() 4b87c1bc2559 scsi: mylex: Fix sysfs buffer lengths 7171d6aef1f1 ata: sata_sx4: fix pdc20621_get_from_dimm() on 64-bit 7ff957cea8af ASoC: ops: Fix wraparound for mask in snd_soc_get_volsw 4ff3d8ac6234 ASoC: rt711-sdw: fix locking sequence 044c34fe3531 ASoC: rt711-sdca: fix locking sequence eb028d1ebd0b ASoC: rt5682-sdw: fix locking sequence 392c47fea7aa drm/panfrost: fix power transition timeout warnings 81f7c9da2bed drivers/perf: riscv: Disable PERF_SAMPLE_BRANCH_* while not supported d00c24ddec51 9p: Fix read/write debug statements to report server reply 90a477dfda3b fs/pipe: Fix lockdep false-positive in watchqueue pipe_write() 4af6d5b4d9f1 KVM: SVM: Add support for allowing zero SEV ASIDs 2233bd583cb5 KVM: SVM: Use unsigned integers when dealing with ASIDs 815c2a1c432b KVM: SVM: WARN, but continue, if misc_cg_set_capacity() fails 2f7efda53a0a KVM: SVM: enhance info printk's in SEV init f089d4554a0b net: ravb: Always update error counters f9690dfa1814 net: ravb: Always process TX descriptor ring 265a0fc55f13 net: ravb: Let IP-specific receive function to interrogate descriptors b3608fe28fab net: fec: Set mac_managed_pm during probe c1781222079c drivers: net: convert to boolean for the mac_managed_pm flag 4eed9d0a4816 tcp: Fix bind() regression for v6-only wildcard and v4(-mapped-v6) non-wildcard addresses. 77db987b47b7 r8169: prepare rtl_hw_aspm_clkreq_enable for usage in atomic context 9109472e7102 r8169: use spinlock to protect access to registers Config2 and Config5 a33b7cb18492 r8169: use spinlock to protect mac ocp register access 095cfa2d9bde i40e: Enforce software interrupt during busy-poll exit 2f6953617d1c i40e: Remove _t suffix from enum type names f3c2ceb84759 i40e: Store the irq number in i40e_q_vector 810dd068ae3b drm/amd: Flush GFXOFF requests in prepare stage 43df8e64dfb8 drm/amd: Add concept of running prepare_suspend() sequence for IP blocks 2990d8eacd2c drm/amd: Evict resources during PM ops prepare() callback 3e89846283f3 i40e: fix vf may be used uninitialized in this function warning fe74ea5b8b78 i40e: fix i40e_count_filters() to count only active/new filters d417e3c16dc5 octeontx2-af: Add array index check e7e7030f0ae2 octeontx2-pf: check negative error code in otx2_open() 39efe5b6f611 octeontx2-af: Fix issue with loading coalesced KPU profiles 940ff35ae8d1 udp: prevent local UDP tunnel packets from being GROed 8c58d384050b udp: do not transition UDP GRO fraglist partial checksums to unnecessary d12245080cb2 udp: do not accept non-tunnel GSO skbs landing in a tunnel fd6692e9b5ed r8169: skip DASH fw status checks when DASH is disabled 80247e0eca14 mlxbf_gige: stop interface during shutdown 167d4b47a9bd ipv6: Fix infinite recursion in fib6_dump_done(). 2febb7eeb493 selftests: reuseaddr_conflict: add missing new line at the end of the output 1db7fcb2b290 erspan: make sure erspan_base_hdr is present in skb->head 1829b618ccc4 i40e: Fix VF MAC filter removal ed37bdaee64b x86/retpoline: Do the necessary fixup to the Zen3/4 srso return thunk for !SRSO 23178ec5abbd x86/bugs: Fix the SRSO mitigation on Zen3/4 2eeab8c47c3c gro: fix ownership transfer 66cb6659008b selftests: net: gro fwd: update vxlan GRO test expectations 10608161696c net: phy: micrel: Fix potential null pointer dereference 77f5e52d7bee net: phy: micrel: lan8814: Fix when enabling/disabling 1-step timestamping e01835f3a1bd net: stmmac: fix rx queue priority assignment b7d1ce2cc719 net/sched: fix lockdep splat in qdisc_tree_reduce_backlog() 55d3fe7b2b7b net/sched: act_skbmod: prevent kernel-infoleak a44770fed865 bpf, sockmap: Prevent lock inversion deadlock in map delete elem 8a57544e9285 vboxsf: Avoid an spurious warning if load_nls_xxx() fails 18aae2cb87e5 netfilter: validate user input for expected length 9b5b7708ec2b netfilter: nf_tables: Fix potential data-race in __nft_flowtable_type_get() 4e8447a9a3d3 netfilter: nf_tables: flush pending destroy work before exit_net release 745cf6a84389 netfilter: nf_tables: reject new basechain after table flag update 1c9e71ca615d Revert "x86/mm/ident_map: Use gbpages only where full GB page should be mapped." db388b8e12aa vsock/virtio: fix packet delivery to tap device fc77240f6316 net: usb: ax88179_178a: avoid the interface always configured as random address cbaac2e5488e net/rds: fix possible cp null dereference 7c1250796b6c xen-netfront: Add missing skb_mark_for_recycle 18e189442a58 Bluetooth: Fix TOCTOU in HCI debugfs implementation 38e3eaa861bd Bluetooth: hci_event: set the conn encrypted before conn establishes 3e773d04aef9 Bluetooth: add quirk for broken address properties a2812ff7ea40 Bluetooth: qca: fix device-address endianness 298dc5dd38d2 arm64: dts: qcom: sc7180-trogdor: mark bluetooth address as broken 9bf4acc80296 Revert "Bluetooth: hci_qca: Set BDA quirk bit if fwnode exists in DT" 5d920886c382 x86/cpufeatures: Add CPUID_LNX_5 to track recently added Linux-defined word 3d61f1704bdf r8169: fix issue caused by buggy BIOS on certain boards with RTL8168d 923579201dec KVM: arm64: Fix host-programmed guest events in nVHE ad141b08d1ce perf/x86/amd/lbr: Use freeze based on availability 8d029111b809 x86/cpufeatures: Add new word for scattered features 58638e3b4879 dm integrity: fix out-of-range warning 7d0567842b78 inet: inet_defrag: prevent sk release while still in use 064267376533 Octeontx2-af: fix pause frame configuration in GMP mode 2553bfaa19b4 net: lan743x: Add set RFE read fifo threshold for PCI1x1x chips 852698c9fd5b cifs: Fix duplicate fscache cookie warnings 98cdac206b11 bpf: Protect against int overflow for stack access size 24444af5ddf7 mlxbf_gige: call request_irq() after NAPI initialized 30fabe50a7ac tls: get psock ref after taking rxlock to avoid leak f52c8f1210da tls: adjust recv return with async crypto and failed copy to userspace efb4573feaa5 tls: recv: process_rx_list shouldn't use an offset with kvec 0e111ce740fc net: hns3: mark unexcuted loopback test result as UNEXECUTED 50b69054f455 net: hns3: fix kernel crash when devlink reload during pf initialization b8b533eeee5b net: hns3: fix index limit to support all queue stats ebabdae52f2a ACPICA: debugger: check status of acpi_evaluate_object() in acpi_db_walk_for_fields() beaf0e7996b7 net: wwan: t7xx: Split 64bit accesses to fix alignment issues 91b243de910a tcp: properly terminate timers for kernel sockets 16307e7bc112 s390/qeth: handle deferred cc1 231b189fa1a1 ixgbe: avoid sleeping allocation in ixgbe_ipsec_vf_add_sa() 99a75d750074 wifi: iwlwifi: mvm: rfi: fix potential response leaks 57beec623ac5 mlxbf_gige: stop PHY during open() error paths b51ec7fc9f87 nfc: nci: Fix uninit-value in nci_dev_up and nci_ntf_packet 0336995512cd dma-buf: Fix NULL pointer dereference in sanitycheck() 8333aae9bba1 scripts/bpf_doc: Use silent mode when exec make cmd cc4860dd1375 Subject: [PATCH v6.1] powerpc: drop duplicate entry in Makefile for lib dir e083231c43f3 net: fix IPSTATS_MIB_OUTFORWDATAGRAMS increment after fragment check 6ee7f29fed8c net: ipv4, ipv6: fix IPSTATS_MIB_OUTOCTETS increment duplicated a771780cdf4a net: fix IPSTATS_MIB_OUTPKGS increment in OutForwDatagrams. 8a9f2d0717f0 riscv: Fix build with CONFIG_CC_OPTIMIZE_FOR_SIZE=y 44fd0c7a5a79 tick/rcu: fix false positive "softirq work is pending" messages on RT 786775632028 kernel/sched: Fix double free on invalid isolcpus/nohz_full params 4675ec8d0b9a kernel/sched: Fix uninitialized read in nohz_full/isolcpus setup f46dc32a8617 bpf: btf: limit logging of ignored BTF mismatches 4687b40201db Revert "Revert "tick/common: Align tick period with the HZ tick."" 947f660bde07 Revert "tick/common: Align tick period with the HZ tick." dded404c66bb yaffs2: Fix miscalculation of devname buffer length 30350f237490 mtd_blkdevs: add mtd_table_mutex lock back to blktrans_{open, release} to avoid race condition 0ac32a83ca02 OF: DT-Overlay configfs interface (v8) 0b07d2478b6b fat: Replace prandom_u32() with get_random_u32() 927b66bfd641 aufs6: core 2af5eb310b11 aufs6: standalone e6537c94f033 aufs6: mmap c51d7f19876f aufs6: base 1785f762bbbb aufs6: kbuild 8f625cf94585 qemux86: add configuration symbol to select values d81fac6e842a sched/isolation: really align nohz_full with rcu_nocbs 07c526200cb3 clear_warn_once: add a clear_warn_once= boot parameter 61e2c52ce198 clear_warn_once: bind a timer to written reset value de03f5a3e6c6 clear_warn_once: expand debugfs to include read support d3f9a25028d4 tools: Remove some options from CLANG_CROSS_FLAGS 0fb98cd2429a libbpf: Fix build warning on ref_ctr_off e156ff56a19f perf python: Account for multiple words in CC f06b9c6ae59d perf: perf can not parser the backtrace of app in the 32bit system and 64bit kernel. 1b099e82095d perf: x86-32: explicitly include 5fec311e2fd2 perf: mips64: Convert __u64 to unsigned long long 6cf30287aeaa perf: fix bench numa compilation bd8f67dcb8e4 perf: add SLANG_INC for slang.h 0314b09bf6b9 perf: add sgidefs.h to for mips builds 4a39cc37b957 perf: change --root to --prefix for python install 3db4f4e91769 perf: add 'libperl not found' warning fa3d24bac29a perf: force include of deaadc523f8d fat: don't use obsolete random32 call in namei_vfat d3c72f5df9a3 FAT: Added FAT_NO_83NAME 8f1eebeb519c FAT: Add CONFIG_VFAT_NO_CREATE_WITH_LONGNAMES option 78b0423ccc14 FAT: Add CONFIG_VFAT_FS_NO_DUALNAMES option e998ad53fb68 yaffs2: replace bdevname call with sprintf 1175db6bf4cb yaffs2: convert read_page -> readfolio beb275c683de yaffs: replace IS_ERR with IS_ERR_OR_NULL to check both ERR and NULL e807c9e420bd yaffs: fix -Wstringop-overread compile warning in yaffs_fix_null_name 2fdd54282de3 yaffs2: v5.12+ build fixups (not runtime tested) 869f41030ed8 yaffs: include blkdev.h e955b68f2b1f yaffs: fix misplaced variable declaration f089603aba1d yaffs2: v5.6 build fixups 82da54859f0b yaffs2: fix memory leak when /proc/yaffs is read 2c4cf6808649 yaffs: add strict check when call yaffs_internal_read_super e7dadb47ef11 yaffs: repair yaffs_get_mtd_device f2e29be130f7 yaffs: Fix build failure by handling inode i_version with proper atomic API 8ea43ac7f3a3 yaffs2: fix memory leak in mount/umount 56db60d0abd2 yaffs: Avoid setting any ACL releated xattr 023baea095bc Yaffs:check oob size before auto selecting Yaffs1 409d39918661 fs: yaffs2: replace CURRENT_TIME by other appropriate apis 4bf42c774804 yaffs2: adjust to proper location of MS_RDONLY 08696e21a84c yaffs2: import git revision b4ce1bb (jan, 2020) ca3d9f546a60 initramfs: allow an optional wrapper script around initramfs generation 301742baace5 pnmtologo: use relocatable file name aba96ccce7d9 tools: use basename to identify file in gen-mach-types e195c32ca7c7 lib/build_OID_registry: fix reproducibility issues 876e2f1f7726 vt/conmakehash: improve reproducibility 28b7a366cfef iwlwifi: select MAC80211_LEDS conditionally 69933d85f61e net/dccp: make it depend on CONFIG_BROKEN (CVE-2020-16119) 5a308d8f142a arm64/perf: Fix wrong cast that may cause wrong truncation 339523a797e9 defconfigs: drop obselete options 3d751aeb9bcd arm64/perf: fix backtrace for AAPCS with FP enabled 86fa47f362ae linux-yocto: Handle /bin/awk issues 86f04668ef6e uvesafb: provide option to specify timeout for task completion 0db5521a1b3c uvesafb: print error message when task timeout occurs 710303c12e99 compiler.h: Undef before redefining __attribute_const__ 14a0ede85080 vmware: include jiffies.h e232e6ffe081 Resolve jiffies wrapping about arp c16abf2d705f nfs: Allow default io size to be configured. 9e9e885f4a6c check console device file on fs when booting 0ce0ce443d58 mount_root: clarify error messages for when no rootfs found 32449db67de8 menuconfig,mconf-cfg: Allow specification of ncurses location c55f1054bdce modpost: mask trivial warnings 30a45d4ee261 kbuild: exclude meta directory from distclean processing 0890b10d8fb1 powerpc: serialize image targets 6c0feb81c3ae arm: serialize build targets 77fa1b70cdbd crtsavres: fixups for 5.4+ cd107e4edd5f crtsavres: fixups for 5.4+ 8f763b35ae5b powerpc/ptrace: Disable array-bounds warning with gcc8 fe6f93755196 powerpc: Disable attribute-alias warnings from gcc8 9b7097364b87 powerpc: add crtsavres.o to archprepare for kbuild c106cd86a07b powerpc: kexec fix for powerpc64 33b7738c61fc powerpc: Add unwind information for SPE registers of E500 core c04e26a9beda mips: vdso: fix 'jalr $t9' crash in vdso code 4733368eab80 mips: Kconfig: add QEMUMIPS64 option ec2df6ae5ee5 4kc cache tlb hazard: tlbp cache coherency c8c511fae0f0 malta uhci quirks: make allowance for slow 4k(e)c b2bf1b6e971a arm64: defconfig: cleanup config options a40a34b02336 vexpress: Pass LOADADDR to Makefile 7c51524611bb arm: ARM EABI socketcall 1f6e77027c24 ARM: LPAE: Invalidate the TLB for module addresses during translation fault Signed-off-by: Bruce Ashfield --- .../linux/linux-yocto-rt_6.1.bb | 6 ++-- .../linux/linux-yocto-tiny_6.1.bb | 6 ++-- meta/recipes-kernel/linux/linux-yocto_6.1.bb | 28 +++++++++---------- 3 files changed, 20 insertions(+), 20 deletions(-) diff --git a/meta/recipes-kernel/linux/linux-yocto-rt_6.1.bb b/meta/recipes-kernel/linux/linux-yocto-rt_6.1.bb index d0173e3ee7..aac0e26210 100644 --- a/meta/recipes-kernel/linux/linux-yocto-rt_6.1.bb +++ b/meta/recipes-kernel/linux/linux-yocto-rt_6.1.bb @@ -14,13 +14,13 @@ python () { raise bb.parse.SkipRecipe("Set PREFERRED_PROVIDER_virtual/kernel to linux-yocto-rt to enable it") } -SRCREV_machine ?= "4df82ffbb2b0f0b0efb545d1f67e61c987d051c1" -SRCREV_meta ?= "8b555bd39017d9e6b19a0e2c98e563c5ebccef14" +SRCREV_machine ?= "7a63ce6bf87492f09a8c685bf99e9a09af97c71b" +SRCREV_meta ?= "3e8602affb44aa12dc7ea436c5ec8514fccb5870" SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;branch=${KBRANCH};name=machine;protocol=https \ git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.1;destsuffix=${KMETA};protocol=https" -LINUX_VERSION ?= "6.1.84" +LINUX_VERSION ?= "6.1.86" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" diff --git a/meta/recipes-kernel/linux/linux-yocto-tiny_6.1.bb b/meta/recipes-kernel/linux/linux-yocto-tiny_6.1.bb index 1d438cb43c..486534f3cf 100644 --- a/meta/recipes-kernel/linux/linux-yocto-tiny_6.1.bb +++ b/meta/recipes-kernel/linux/linux-yocto-tiny_6.1.bb @@ -8,7 +8,7 @@ require recipes-kernel/linux/linux-yocto.inc # CVE exclusions include recipes-kernel/linux/cve-exclusion_6.1.inc -LINUX_VERSION ?= "6.1.84" +LINUX_VERSION ?= "6.1.86" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}" @@ -17,8 +17,8 @@ DEPENDS += "openssl-native util-linux-native" KMETA = "kernel-meta" KCONF_BSP_AUDIT_LEVEL = "2" -SRCREV_machine ?= "79fae610a03169f636ecf8a2c4a520af0c01ea58" -SRCREV_meta ?= "8b555bd39017d9e6b19a0e2c98e563c5ebccef14" +SRCREV_machine ?= "3726df7e9d76ef8836dcf3a34b8cae6ba0aaa594" +SRCREV_meta ?= "3e8602affb44aa12dc7ea436c5ec8514fccb5870" PV = "${LINUX_VERSION}+git" diff --git a/meta/recipes-kernel/linux/linux-yocto_6.1.bb b/meta/recipes-kernel/linux/linux-yocto_6.1.bb index c4e8750e6b..0b417c471f 100644 --- a/meta/recipes-kernel/linux/linux-yocto_6.1.bb +++ b/meta/recipes-kernel/linux/linux-yocto_6.1.bb @@ -18,25 +18,25 @@ KBRANCH:qemux86-64 ?= "v6.1/standard/base" KBRANCH:qemuloongarch64 ?= "v6.1/standard/base" KBRANCH:qemumips64 ?= "v6.1/standard/mti-malta64" -SRCREV_machine:qemuarm ?= "6c89adaf651c4599869544f1ccc532641e5e6e9c" -SRCREV_machine:qemuarm64 ?= "79fae610a03169f636ecf8a2c4a520af0c01ea58" -SRCREV_machine:qemuloongarch64 ?= "79fae610a03169f636ecf8a2c4a520af0c01ea58" -SRCREV_machine:qemumips ?= "cef1886035a8438205634d51fdfc3c1481b668e8" -SRCREV_machine:qemuppc ?= "42585bdd38e874d2c4b08364a160e5dad5cd683e" -SRCREV_machine:qemuriscv64 ?= "79fae610a03169f636ecf8a2c4a520af0c01ea58" -SRCREV_machine:qemuriscv32 ?= "79fae610a03169f636ecf8a2c4a520af0c01ea58" -SRCREV_machine:qemux86 ?= "79fae610a03169f636ecf8a2c4a520af0c01ea58" -SRCREV_machine:qemux86-64 ?= "79fae610a03169f636ecf8a2c4a520af0c01ea58" -SRCREV_machine:qemumips64 ?= "a6c079ca05576d39ff871aad90050021aecaf3c7" -SRCREV_machine ?= "79fae610a03169f636ecf8a2c4a520af0c01ea58" -SRCREV_meta ?= "8b555bd39017d9e6b19a0e2c98e563c5ebccef14" +SRCREV_machine:qemuarm ?= "a817e2cafd9a6f3bc48d9e88cc92330d748e0993" +SRCREV_machine:qemuarm64 ?= "3726df7e9d76ef8836dcf3a34b8cae6ba0aaa594" +SRCREV_machine:qemuloongarch64 ?= "3726df7e9d76ef8836dcf3a34b8cae6ba0aaa594" +SRCREV_machine:qemumips ?= "70d990757526c642411d8a238be6f7a331dbff2c" +SRCREV_machine:qemuppc ?= "ec55f0fb16cfa7335361c8532ccc0883d37d05f5" +SRCREV_machine:qemuriscv64 ?= "3726df7e9d76ef8836dcf3a34b8cae6ba0aaa594" +SRCREV_machine:qemuriscv32 ?= "3726df7e9d76ef8836dcf3a34b8cae6ba0aaa594" +SRCREV_machine:qemux86 ?= "3726df7e9d76ef8836dcf3a34b8cae6ba0aaa594" +SRCREV_machine:qemux86-64 ?= "3726df7e9d76ef8836dcf3a34b8cae6ba0aaa594" +SRCREV_machine:qemumips64 ?= "219c6fc52eede3be9e7e3ae5b64bdb16f57b5dca" +SRCREV_machine ?= "3726df7e9d76ef8836dcf3a34b8cae6ba0aaa594" +SRCREV_meta ?= "3e8602affb44aa12dc7ea436c5ec8514fccb5870" # set your preferred provider of linux-yocto to 'linux-yocto-upstream', and you'll # get the /base branch, which is pure upstream -stable, and the same # meta SRCREV as the linux-yocto-standard builds. Select your version using the # normal PREFERRED_VERSION settings. BBCLASSEXTEND = "devupstream:target" -SRCREV_machine:class-devupstream ?= "347385861c50adc8d4801d4b899eded38a2f04cd" +SRCREV_machine:class-devupstream ?= "cd5d98c0556cd790f78a3ba26afc9d2f896163e4" PN:class-devupstream = "linux-yocto-upstream" KBRANCH:class-devupstream = "v6.1/base" @@ -45,7 +45,7 @@ SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;name=machine;branch=${KBRA SRC_URI += "file://0001-perf-cpumap-Make-counter-as-unsigned-ints.patch" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" -LINUX_VERSION ?= "6.1.84" +LINUX_VERSION ?= "6.1.86" PV = "${LINUX_VERSION}+git" From patchwork Fri May 3 03:00:13 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Bruce Ashfield X-Patchwork-Id: 43219 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id A1129C4345F for ; Fri, 3 May 2024 03:00:35 +0000 (UTC) Received: from mail-qv1-f41.google.com (mail-qv1-f41.google.com [209.85.219.41]) by mx.groups.io with SMTP id smtpd.web11.4334.1714705226741584967 for ; Thu, 02 May 2024 20:00:26 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@gmail.com header.s=20230601 header.b=dh9h7+TV; spf=pass (domain: gmail.com, ip: 209.85.219.41, mailfrom: bruce.ashfield@gmail.com) Received: by mail-qv1-f41.google.com with SMTP id 6a1803df08f44-69b24162dd6so51715446d6.2 for ; Thu, 02 May 2024 20:00:26 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1714705226; x=1715310026; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=t1n6/eTvZWFYdfY4LGRRPqyB58OQl540Fuerj+PcS0A=; b=dh9h7+TVRwwvXK3A8trn9BgGpCui77CK2RfrbDA/rfaHR9AqL9TjPIYMnT3lGZQ9fD UBDlf63U0v/1BBni1S7UeMGEqVWgfhfv1vOBSplsOS3goQS0diWhh9EvJmQ8EQEP2ZdA cdFMRkqsP0m0SsNK7QEOSGOQhZ/9Cksq/x3a5W1S1yGSV6upj992PgWschDdCphDZQAF EpjCKTd3JENuy68c49mKOUmhjOAWFLNOIUm7iM/sFdsCBApyIJxEsn5GrM3TV7Vllm6j jfS+A0i30BFnRISY2okGBTGLqVlHIPcs7KT4uDENKktkDZXWnOTPgvzhvy56A7kB4IHp FByA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1714705226; x=1715310026; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=t1n6/eTvZWFYdfY4LGRRPqyB58OQl540Fuerj+PcS0A=; b=e3MAGQrLAgv0rL1hDYl3XJurPfxfjdHfGVylR6fXtAOxVFZiLN8PwWdEhFa7tHodMX BIDdn750Fg8JAchKCPtmShSQgqfK9L3zio3El9Gh1WwNUmasVy0P03SRZz4yW36gWOvx lPTurTGGnpMKt5JN2W3qvrbFOh+E4l5NUV+1oPh3P/GXN6bkVjZEG6fEawYpMfhD34Jb 6NBpgHGodEFBQXoXQC6drgVm7H+Frn2esXY14DatJgENfz/wyWxCSgsmDKOhjImXjPcn BLuZSA+fMa/rBDnirqHRUzAjvN4tUnYLV1yNKuwSWCjUNgURdwM5sfQucEqJ0F2H6g8K UrBw== X-Gm-Message-State: AOJu0Yw/5zbHrKYydeaABCQ5W0wgcpEuIbzCjD0gSaSxp+zId02y6uAS VRYSaMyuRQ2IieeVAqf0Xkh3ngIb7OyJiVage4/CitaSEHWFHrwJbK36Nw== X-Google-Smtp-Source: AGHT+IGeuXmkndWcF0gigBBVTxVnbbK1KWFF0JsH4E9mtslk+Q3ckNFuXyfp6zRpDGSh+4rEkvAjOA== X-Received: by 2002:a05:6214:2582:b0:6a0:c97e:ec44 with SMTP id fq2-20020a056214258200b006a0c97eec44mr1781634qvb.14.1714705225563; Thu, 02 May 2024 20:00:25 -0700 (PDT) Received: from bruce-XPS-8940.localdomain (pool-174-112-62-108.cpe.net.cable.rogers.com. [174.112.62.108]) by smtp.gmail.com with ESMTPSA id mi5-20020a056214558500b006a0fa96013asm839357qvb.138.2024.05.02.20.00.23 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 02 May 2024 20:00:24 -0700 (PDT) From: bruce.ashfield@gmail.com To: steve@sakoman.com Cc: openembedded-core@lists.openembedded.org Subject: [OE-core][nanbield 08/10] linux-yocto/6.1: update to v6.1.87 Date: Thu, 2 May 2024 23:00:13 -0400 Message-Id: <20240503030015.374078-8-bruce.ashfield@gmail.com> X-Mailer: git-send-email 2.39.2 In-Reply-To: <20240503030015.374078-1-bruce.ashfield@gmail.com> References: <20240503030015.374078-1-bruce.ashfield@gmail.com> MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 03 May 2024 03:00:35 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/198963 From: Bruce Ashfield Updating linux-yocto/6.1 to the latest korg -stable release that comprises the following commits: b140d9d4515f drm/bridge: adv7511: fix crash on irq during probe 5c3bf5a26d61 reiserfs: Avoid touching renamed directory if parent does not change 6741e066ec76 Linux 6.1.87 724fbc7c0cb8 drm/amd/display: fix disable otg wa logic in DCN316 90819b1830bc drm/amdgpu: always force full reset for SOC21 7cc89dbcb8ea drm/amdgpu: Reset dGPU if suspend got aborted 29bd4d05f2c5 drm/i915: Disable port sync when bigjoiner is used 2bc1796f8eeb drm/i915/cdclk: Fix CDCLK programming order when pipes are active d844df110084 x86/bugs: Replace CONFIG_SPECTRE_BHI_{ON,OFF} with CONFIG_MITIGATION_SPECTRE_BHI 7f18a0df7621 x86/bugs: Remove CONFIG_BHI_MITIGATION_AUTO and spectre_bhi=auto d737d8cd8e64 x86/bugs: Clarify that syscall hardening isn't a BHI mitigation 4b0b5d621e89 x86/bugs: Fix BHI handling of RRSBA dc2db3e978c5 x86/bugs: Rename various 'ia32_cap' variables to 'x86_arch_cap_msr' b1b32586f797 x86/bugs: Cache the value of MSR_IA32_ARCH_CAPABILITIES 662e341e57cc x86/bugs: Fix BHI documentation 0d433e40827d x86/bugs: Fix return type of spectre_bhi_state() d447d8de840c irqflags: Explicitly ignore lockdep_hrtimer_exit() argument 22f51ddb0cc1 x86/apic: Force native_apic_mem_read() to use the MOV instruction 881b495ed26b selftests: timers: Fix abs() warning in posix_timers test 9c09773917fb x86/cpu: Actually turn off mitigations by default for SPECULATION_MITIGATIONS=n 0c182182d6d9 perf/x86: Fix out of range data a2c1c0cfab05 vhost: Add smp_rmb() in vhost_enable_notify() f6e2d61dc159 vhost: Add smp_rmb() in vhost_vq_avail_empty() 18c8cc6680ce drm/client: Fully protect modes[] with dev->mode_config.mutex 8a6fea3fcb57 drm/ast: Fix soft lockup d29b50a32c27 drm/amdkfd: Reset GPU on queue preemption failure 4b53d7d620c4 drm/i915/vrr: Disable VRR when using bigjoiner 62029bc9ff2c kprobes: Fix possible use-after-free issue on kprobe registration 88dd8bb129fc io_uring/net: restore msg_control on sendzc retry c00146b399a5 btrfs: qgroup: convert PREALLOC to PERTRANS after record_root_in_trans 06fe99985427 btrfs: record delayed inode root in transaction cb3131b5a204 btrfs: qgroup: correctly model root qgroup rsv in convert 5f1205b86bd0 iommu/vt-d: Allocate local memory for page request queue 91580ea48b6d tracing: hide unused ftrace_event_id_fops 19ff8fed3338 net: ena: Fix incorrect descriptor free behavior 7d44e12efb7d net: ena: Wrong missing IO completions check order 4dea83d483d5 net: ena: Fix potential sign extension issue b75722be422c af_unix: Fix garbage collector racing against connect() fb6d14e23d48 af_unix: Do not use atomic ops for unix_sk(sk)->inflight. 19643bf8c9b5 net: dsa: mt7530: trap link-local frames regardless of ST Port State 8edb087c44a4 net: sparx5: fix wrong config being used when reconfiguring PCS 88a50c8a5048 net/mlx5e: HTB, Fix inconsistencies with QoS SQs number ad26f26abd35 net/mlx5e: Fix mlx5e_priv_init() cleanup flow 2e8dc5cffc84 net/mlx5: Properly link new fs rules into the tree c760089aa982 netfilter: complete validation of user input 9d42f3733912 Bluetooth: L2CAP: Fix not validating setsockopt user input 7bc65d23ba20 Bluetooth: SCO: Fix not validating setsockopt user input de76ae9ea1a6 ipv6: fix race condition between ipv6_get_ifaddr and ipv6_del_addr 03d564999fa8 ipv4/route: avoid unused-but-set-variable warning 2c46877f5f93 ipv6: fib: hide unused 'pn' variable 7e33f68791eb octeontx2-af: Fix NIX SQ mode and BP config 84a352b7eba1 af_unix: Clear stale u->oob_skb. 492337a4fbd1 net: ks8851: Handle softirqs at the end of IRQ thread to fix hang be033154523f net: ks8851: Inline ks8851_rx_skb() ecedcd7e3985 bnxt_en: Reset PTP tx_avail after possible firmware reset 4a1b65d1e55d geneve: fix header validation in geneve[6]_xmit_skb 2a523f14a3f5 xsk: validate user input for XDP_{UMEM|COMPLETION}_FILL_RING ac1c10b4ebdf u64_stats: fix u64_stats_init() for lockdep when used repeatedly in one file 0b445005599d net: openvswitch: fix unwanted error log on timeout policy probing 9fc74e367be4 scsi: qla2xxx: Fix off by one in qla_edif_app_getstats() 438b9a71b25a scsi: hisi_sas: Modify the deadline for ata_wait_after_reset() b7dc2e6b8798 nouveau: fix function cast warning 84fb60063509 Revert "drm/qxl: simplify qxl_fence_wait" 24c0c5867ad2 arm64: dts: imx8-ss-conn: fix usdhc wrong lpcg clock order 49054b3ed249 media: cec: core: remove length check of Timer Status bccc8d155092 PM: s2idle: Make sure CPUs will wakeup directly on resume bd9b94055c3d drm/amd/pm: fixes a random hang in S4 for SMU v13.0.4/11 66fab1e120b3 Bluetooth: Fix memory leak in hci_req_sync_complete() 2d5f12de4cf5 ring-buffer: Only update pages_touched when a new page is touched 3fe79b2c8346 batman-adv: Avoid infinite loop trying to resize local TT 0559b2d759be ata: libata-scsi: Fix ata_scsi_dev_rescan() error path ca5962bdc53c smb3: fix Open files on server counter going negative cc4860dd1375 Subject: [PATCH v6.1] powerpc: drop duplicate entry in Makefile for lib dir e083231c43f3 net: fix IPSTATS_MIB_OUTFORWDATAGRAMS increment after fragment check 6ee7f29fed8c net: ipv4, ipv6: fix IPSTATS_MIB_OUTOCTETS increment duplicated a771780cdf4a net: fix IPSTATS_MIB_OUTPKGS increment in OutForwDatagrams. 8a9f2d0717f0 riscv: Fix build with CONFIG_CC_OPTIMIZE_FOR_SIZE=y 44fd0c7a5a79 tick/rcu: fix false positive "softirq work is pending" messages on RT 786775632028 kernel/sched: Fix double free on invalid isolcpus/nohz_full params 4675ec8d0b9a kernel/sched: Fix uninitialized read in nohz_full/isolcpus setup f46dc32a8617 bpf: btf: limit logging of ignored BTF mismatches 4687b40201db Revert "Revert "tick/common: Align tick period with the HZ tick."" 947f660bde07 Revert "tick/common: Align tick period with the HZ tick." dded404c66bb yaffs2: Fix miscalculation of devname buffer length 30350f237490 mtd_blkdevs: add mtd_table_mutex lock back to blktrans_{open, release} to avoid race condition 0ac32a83ca02 OF: DT-Overlay configfs interface (v8) 0b07d2478b6b fat: Replace prandom_u32() with get_random_u32() 927b66bfd641 aufs6: core 2af5eb310b11 aufs6: standalone e6537c94f033 aufs6: mmap c51d7f19876f aufs6: base 1785f762bbbb aufs6: kbuild 8f625cf94585 qemux86: add configuration symbol to select values d81fac6e842a sched/isolation: really align nohz_full with rcu_nocbs 07c526200cb3 clear_warn_once: add a clear_warn_once= boot parameter 61e2c52ce198 clear_warn_once: bind a timer to written reset value de03f5a3e6c6 clear_warn_once: expand debugfs to include read support d3f9a25028d4 tools: Remove some options from CLANG_CROSS_FLAGS 0fb98cd2429a libbpf: Fix build warning on ref_ctr_off e156ff56a19f perf python: Account for multiple words in CC f06b9c6ae59d perf: perf can not parser the backtrace of app in the 32bit system and 64bit kernel. 1b099e82095d perf: x86-32: explicitly include 5fec311e2fd2 perf: mips64: Convert __u64 to unsigned long long 6cf30287aeaa perf: fix bench numa compilation bd8f67dcb8e4 perf: add SLANG_INC for slang.h 0314b09bf6b9 perf: add sgidefs.h to for mips builds 4a39cc37b957 perf: change --root to --prefix for python install 3db4f4e91769 perf: add 'libperl not found' warning fa3d24bac29a perf: force include of deaadc523f8d fat: don't use obsolete random32 call in namei_vfat d3c72f5df9a3 FAT: Added FAT_NO_83NAME 8f1eebeb519c FAT: Add CONFIG_VFAT_NO_CREATE_WITH_LONGNAMES option 78b0423ccc14 FAT: Add CONFIG_VFAT_FS_NO_DUALNAMES option e998ad53fb68 yaffs2: replace bdevname call with sprintf 1175db6bf4cb yaffs2: convert read_page -> readfolio beb275c683de yaffs: replace IS_ERR with IS_ERR_OR_NULL to check both ERR and NULL e807c9e420bd yaffs: fix -Wstringop-overread compile warning in yaffs_fix_null_name 2fdd54282de3 yaffs2: v5.12+ build fixups (not runtime tested) 869f41030ed8 yaffs: include blkdev.h e955b68f2b1f yaffs: fix misplaced variable declaration f089603aba1d yaffs2: v5.6 build fixups 82da54859f0b yaffs2: fix memory leak when /proc/yaffs is read 2c4cf6808649 yaffs: add strict check when call yaffs_internal_read_super e7dadb47ef11 yaffs: repair yaffs_get_mtd_device f2e29be130f7 yaffs: Fix build failure by handling inode i_version with proper atomic API 8ea43ac7f3a3 yaffs2: fix memory leak in mount/umount 56db60d0abd2 yaffs: Avoid setting any ACL releated xattr 023baea095bc Yaffs:check oob size before auto selecting Yaffs1 409d39918661 fs: yaffs2: replace CURRENT_TIME by other appropriate apis 4bf42c774804 yaffs2: adjust to proper location of MS_RDONLY 08696e21a84c yaffs2: import git revision b4ce1bb (jan, 2020) ca3d9f546a60 initramfs: allow an optional wrapper script around initramfs generation 301742baace5 pnmtologo: use relocatable file name aba96ccce7d9 tools: use basename to identify file in gen-mach-types e195c32ca7c7 lib/build_OID_registry: fix reproducibility issues 876e2f1f7726 vt/conmakehash: improve reproducibility 28b7a366cfef iwlwifi: select MAC80211_LEDS conditionally 69933d85f61e net/dccp: make it depend on CONFIG_BROKEN (CVE-2020-16119) 5a308d8f142a arm64/perf: Fix wrong cast that may cause wrong truncation 339523a797e9 defconfigs: drop obselete options 3d751aeb9bcd arm64/perf: fix backtrace for AAPCS with FP enabled 86fa47f362ae linux-yocto: Handle /bin/awk issues 86f04668ef6e uvesafb: provide option to specify timeout for task completion 0db5521a1b3c uvesafb: print error message when task timeout occurs 710303c12e99 compiler.h: Undef before redefining __attribute_const__ 14a0ede85080 vmware: include jiffies.h e232e6ffe081 Resolve jiffies wrapping about arp c16abf2d705f nfs: Allow default io size to be configured. 9e9e885f4a6c check console device file on fs when booting 0ce0ce443d58 mount_root: clarify error messages for when no rootfs found 32449db67de8 menuconfig,mconf-cfg: Allow specification of ncurses location c55f1054bdce modpost: mask trivial warnings 30a45d4ee261 kbuild: exclude meta directory from distclean processing 0890b10d8fb1 powerpc: serialize image targets 6c0feb81c3ae arm: serialize build targets 77fa1b70cdbd crtsavres: fixups for 5.4+ cd107e4edd5f crtsavres: fixups for 5.4+ 8f763b35ae5b powerpc/ptrace: Disable array-bounds warning with gcc8 fe6f93755196 powerpc: Disable attribute-alias warnings from gcc8 9b7097364b87 powerpc: add crtsavres.o to archprepare for kbuild c106cd86a07b powerpc: kexec fix for powerpc64 33b7738c61fc powerpc: Add unwind information for SPE registers of E500 core c04e26a9beda mips: vdso: fix 'jalr $t9' crash in vdso code 4733368eab80 mips: Kconfig: add QEMUMIPS64 option ec2df6ae5ee5 4kc cache tlb hazard: tlbp cache coherency c8c511fae0f0 malta uhci quirks: make allowance for slow 4k(e)c b2bf1b6e971a arm64: defconfig: cleanup config options a40a34b02336 vexpress: Pass LOADADDR to Makefile 7c51524611bb arm: ARM EABI socketcall 1f6e77027c24 ARM: LPAE: Invalidate the TLB for module addresses during translation fault Signed-off-by: Bruce Ashfield --- .../linux/linux-yocto-rt_6.1.bb | 6 ++-- .../linux/linux-yocto-tiny_6.1.bb | 6 ++-- meta/recipes-kernel/linux/linux-yocto_6.1.bb | 28 +++++++++---------- 3 files changed, 20 insertions(+), 20 deletions(-) diff --git a/meta/recipes-kernel/linux/linux-yocto-rt_6.1.bb b/meta/recipes-kernel/linux/linux-yocto-rt_6.1.bb index aac0e26210..a1b3e2d33c 100644 --- a/meta/recipes-kernel/linux/linux-yocto-rt_6.1.bb +++ b/meta/recipes-kernel/linux/linux-yocto-rt_6.1.bb @@ -14,13 +14,13 @@ python () { raise bb.parse.SkipRecipe("Set PREFERRED_PROVIDER_virtual/kernel to linux-yocto-rt to enable it") } -SRCREV_machine ?= "7a63ce6bf87492f09a8c685bf99e9a09af97c71b" -SRCREV_meta ?= "3e8602affb44aa12dc7ea436c5ec8514fccb5870" +SRCREV_machine ?= "d8b7bfb52d81a60cce39809fb105d760a359def1" +SRCREV_meta ?= "2ccedc62a19929df39eef4a5f2255b6f03652b31" SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;branch=${KBRANCH};name=machine;protocol=https \ git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.1;destsuffix=${KMETA};protocol=https" -LINUX_VERSION ?= "6.1.86" +LINUX_VERSION ?= "6.1.87" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" diff --git a/meta/recipes-kernel/linux/linux-yocto-tiny_6.1.bb b/meta/recipes-kernel/linux/linux-yocto-tiny_6.1.bb index 486534f3cf..2f99c068c1 100644 --- a/meta/recipes-kernel/linux/linux-yocto-tiny_6.1.bb +++ b/meta/recipes-kernel/linux/linux-yocto-tiny_6.1.bb @@ -8,7 +8,7 @@ require recipes-kernel/linux/linux-yocto.inc # CVE exclusions include recipes-kernel/linux/cve-exclusion_6.1.inc -LINUX_VERSION ?= "6.1.86" +LINUX_VERSION ?= "6.1.87" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}" @@ -17,8 +17,8 @@ DEPENDS += "openssl-native util-linux-native" KMETA = "kernel-meta" KCONF_BSP_AUDIT_LEVEL = "2" -SRCREV_machine ?= "3726df7e9d76ef8836dcf3a34b8cae6ba0aaa594" -SRCREV_meta ?= "3e8602affb44aa12dc7ea436c5ec8514fccb5870" +SRCREV_machine ?= "9bf85a364245b2c3b98879c869725adbf8fb37ca" +SRCREV_meta ?= "2ccedc62a19929df39eef4a5f2255b6f03652b31" PV = "${LINUX_VERSION}+git" diff --git a/meta/recipes-kernel/linux/linux-yocto_6.1.bb b/meta/recipes-kernel/linux/linux-yocto_6.1.bb index 0b417c471f..ad19080bc7 100644 --- a/meta/recipes-kernel/linux/linux-yocto_6.1.bb +++ b/meta/recipes-kernel/linux/linux-yocto_6.1.bb @@ -18,25 +18,25 @@ KBRANCH:qemux86-64 ?= "v6.1/standard/base" KBRANCH:qemuloongarch64 ?= "v6.1/standard/base" KBRANCH:qemumips64 ?= "v6.1/standard/mti-malta64" -SRCREV_machine:qemuarm ?= "a817e2cafd9a6f3bc48d9e88cc92330d748e0993" -SRCREV_machine:qemuarm64 ?= "3726df7e9d76ef8836dcf3a34b8cae6ba0aaa594" -SRCREV_machine:qemuloongarch64 ?= "3726df7e9d76ef8836dcf3a34b8cae6ba0aaa594" -SRCREV_machine:qemumips ?= "70d990757526c642411d8a238be6f7a331dbff2c" -SRCREV_machine:qemuppc ?= "ec55f0fb16cfa7335361c8532ccc0883d37d05f5" -SRCREV_machine:qemuriscv64 ?= "3726df7e9d76ef8836dcf3a34b8cae6ba0aaa594" -SRCREV_machine:qemuriscv32 ?= "3726df7e9d76ef8836dcf3a34b8cae6ba0aaa594" -SRCREV_machine:qemux86 ?= "3726df7e9d76ef8836dcf3a34b8cae6ba0aaa594" -SRCREV_machine:qemux86-64 ?= "3726df7e9d76ef8836dcf3a34b8cae6ba0aaa594" -SRCREV_machine:qemumips64 ?= "219c6fc52eede3be9e7e3ae5b64bdb16f57b5dca" -SRCREV_machine ?= "3726df7e9d76ef8836dcf3a34b8cae6ba0aaa594" -SRCREV_meta ?= "3e8602affb44aa12dc7ea436c5ec8514fccb5870" +SRCREV_machine:qemuarm ?= "80e50241e06c17d0ba9d637bbd2e01aeadc0b385" +SRCREV_machine:qemuarm64 ?= "9bf85a364245b2c3b98879c869725adbf8fb37ca" +SRCREV_machine:qemuloongarch64 ?= "9bf85a364245b2c3b98879c869725adbf8fb37ca" +SRCREV_machine:qemumips ?= "32a30aff77ba61611596d04faab7658d2e3d9154" +SRCREV_machine:qemuppc ?= "c2dc480743bc2fa933761e7c68f01d973875f6d9" +SRCREV_machine:qemuriscv64 ?= "9bf85a364245b2c3b98879c869725adbf8fb37ca" +SRCREV_machine:qemuriscv32 ?= "9bf85a364245b2c3b98879c869725adbf8fb37ca" +SRCREV_machine:qemux86 ?= "9bf85a364245b2c3b98879c869725adbf8fb37ca" +SRCREV_machine:qemux86-64 ?= "9bf85a364245b2c3b98879c869725adbf8fb37ca" +SRCREV_machine:qemumips64 ?= "fce0b9ab6a695ab8a214c65f22a5f58ad623b1f9" +SRCREV_machine ?= "9bf85a364245b2c3b98879c869725adbf8fb37ca" +SRCREV_meta ?= "2ccedc62a19929df39eef4a5f2255b6f03652b31" # set your preferred provider of linux-yocto to 'linux-yocto-upstream', and you'll # get the /base branch, which is pure upstream -stable, and the same # meta SRCREV as the linux-yocto-standard builds. Select your version using the # normal PREFERRED_VERSION settings. BBCLASSEXTEND = "devupstream:target" -SRCREV_machine:class-devupstream ?= "cd5d98c0556cd790f78a3ba26afc9d2f896163e4" +SRCREV_machine:class-devupstream ?= "6741e066ec7633450d3186946035c1f80c4226b8" PN:class-devupstream = "linux-yocto-upstream" KBRANCH:class-devupstream = "v6.1/base" @@ -45,7 +45,7 @@ SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;name=machine;branch=${KBRA SRC_URI += "file://0001-perf-cpumap-Make-counter-as-unsigned-ints.patch" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" -LINUX_VERSION ?= "6.1.86" +LINUX_VERSION ?= "6.1.87" PV = "${LINUX_VERSION}+git" From patchwork Fri May 3 03:00:14 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Bruce Ashfield X-Patchwork-Id: 43221 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id B13E5C25B5C for ; Fri, 3 May 2024 03:00:35 +0000 (UTC) Received: from mail-qv1-f41.google.com (mail-qv1-f41.google.com [209.85.219.41]) by mx.groups.io with SMTP id smtpd.web11.4335.1714705227905460401 for ; Thu, 02 May 2024 20:00:28 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@gmail.com header.s=20230601 header.b=BLl7xGaa; spf=pass (domain: gmail.com, ip: 209.85.219.41, mailfrom: bruce.ashfield@gmail.com) Received: by mail-qv1-f41.google.com with SMTP id 6a1803df08f44-69cb4a046dfso37897056d6.2 for ; Thu, 02 May 2024 20:00:27 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1714705227; x=1715310027; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=MvDbdtbL07zj0/k88VCS3Q2tPfxhdSBCPlqWFI9ka90=; b=BLl7xGaaAzgqRMb6+W8kNHkJoEhrYa85u+zMPzgazW2befKNnniheFVFdAS9F1yODg F3bafMKz77s9Vg67s6bL5tn9H0UmE6HkK2vsOGf3RQn2WXYknqKds4waZzbfqfh1Gyp1 WGzFn6ejUJROiXECQ1ZDjuBr/9VjsIlBNxdFWg6On/9cX7tsfpeWPp6q3iU02Yb29JW4 FyNUFGgReunraaimoVwA7oO919UgXJYrNWQmVFQKZKl+nPM05cYscXhyg2Z3VQcLhnok sMwIJGDF+B18ga/YCorVQ+thXQiIt3jq1KSzKtvPCYLRvjdrXAhSDmuK1i7xxY+dHjH0 gWlw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1714705227; x=1715310027; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=MvDbdtbL07zj0/k88VCS3Q2tPfxhdSBCPlqWFI9ka90=; b=ITO0Qu3Ni9h/2GxQQTXWmeC+1BpRandydZT3Dojr/A/EJ53bxa2KsLL5Auh4PtXFdr mmhxIoQ2ty6knr96JyQB9u/kQBaZhnOq3o7Ij7iBwoicV01x762ChouAAhoyGyZJuRbb b129AW6sJT7Y5LgLYXQzEZDyhG2Md0d0Wgl6OzthMYipWWTkTD/URcHJo5i2H3Mwvn4x NOS52jXczDOTzwLJs/kLvX+9HhPT+CwPKPkJm3BQrUfrCeARP8FhH6ie4n916VRWEW/t /mfaeAw706tjPrBQRtJhTD+E5ZsBZQIdUGe3JB3tFmEp/L/WSkuwOLJET0E2hadE/eO2 VWxA== X-Gm-Message-State: AOJu0Yz5se9BN77tiIqelrldfovQzptFdEHzyeNA1+htgbIPPGrbS/K4 AUf06+tVdptfsOlEtKl8XnUHhrL+YgB1XkdGx/FIVZVT0R4g0wXh1ZumHw== X-Google-Smtp-Source: AGHT+IG49Nfv2arcVOW2dDpYE3Vx38F1QkvHNjt0RechG0NCjy88Eek7cBfkM3al+mh0XQF1RmcGVg== X-Received: by 2002:a05:6214:29ea:b0:6a0:c924:10a with SMTP id jv10-20020a05621429ea00b006a0c924010amr1533340qvb.38.1714705226527; Thu, 02 May 2024 20:00:26 -0700 (PDT) Received: from bruce-XPS-8940.localdomain (pool-174-112-62-108.cpe.net.cable.rogers.com. [174.112.62.108]) by smtp.gmail.com with ESMTPSA id mi5-20020a056214558500b006a0fa96013asm839357qvb.138.2024.05.02.20.00.25 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 02 May 2024 20:00:25 -0700 (PDT) From: bruce.ashfield@gmail.com To: steve@sakoman.com Cc: openembedded-core@lists.openembedded.org Subject: [OE-core][nanbield 09/10] linux-yocto/6.1: update to v6.1.89 Date: Thu, 2 May 2024 23:00:14 -0400 Message-Id: <20240503030015.374078-9-bruce.ashfield@gmail.com> X-Mailer: git-send-email 2.39.2 In-Reply-To: <20240503030015.374078-1-bruce.ashfield@gmail.com> References: <20240503030015.374078-1-bruce.ashfield@gmail.com> MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 03 May 2024 03:00:35 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/198964 From: Bruce Ashfield Updating linux-yocto/6.1 to the latest korg -stable release that comprises the following commits: dcbc050cb0d3 Linux 6.1.89 8a5291736e70 Revert "ASoC: ti: Convert Pandora ASoC to GPIO descriptors" f2295faba5e8 Linux 6.1.88 0f7908a016c0 PCI/ASPM: Fix deadlock when enabling ASPM 67a877128bbe ksmbd: common: use struct_group_attr instead of struct_group for network_open_info 4687606d94de ksmbd: clear RENAME_NOREPLACE before calling vfs_rename 21ff9d7d223c ksmbd: validate request buffer size in smb2_allocate_rsp_buf() b80ba648714e ksmbd: fix slab-out-of-bounds in smb2_allocate_rsp_buf 7d51db455ca0 net: dsa: mt7530: fix enabling EEE on MT7531 switch on all boards 41a004ffba9b net: dsa: mt7530: fix improper frames on all 25MHz and 40MHz XTAL MT7530 d9c2f69cc12c net: dsa: introduce preferred_default_local_cpu_port and use on MT7530 013c787d2311 net: dsa: mt7530: set all CPU ports in MT7531_CPU_PMAP 897ac5306bbe nilfs2: fix OOB in nilfs_set_de_type 1e7feb31a18c bootconfig: use memblock_free_late to free xbc memory to buddy ad74d208f213 nouveau: fix instmem race condition around ptr stores bcff1ed2ff19 drm/vmwgfx: Fix crtc's atomic check conditional 8f79b42d1c21 drm/vmwgfx: Sort primary plane formats by order of preference 212e3baccdb1 drm/amdgpu: validate the parameters of bo mapping operations more clearly 5ef7ba2799a3 mm/memory-failure: fix deadlock when hugetlb_optimize_vmemmap is enabled 76c2f4d426a5 init/main.c: Fix potential static_command_line memory overflow f7e71a7cf399 arm64: hibernate: Fix level3 translation fault in swsusp_save() e09465aeccf1 KVM: x86/pmu: Do not mask LVTPC when handling a PMI on AMD platforms 0fb74c00d140 KVM: x86/pmu: Disable support for adaptive PEBS e487b8eccf67 KVM: x86: Snapshot if a vCPU's vendor model is AMD vs. Intel compatible 5d43e072285e fs: sysfs: Fix reference leak in sysfs_break_active_protection() 89af25bd4b4b speakup: Avoid crash on very long word 7c6f941492b7 mei: me: disable RPL-S on SPS and IGN firmwares 0588bbbd718a usb: gadget: f_ncm: Fix UAF ncm object at re-bind after usb ep transport error a676b17edb52 usb: Disable USB3 LPM at shutdown 9de10b59d168 usb: dwc2: host: Fix dereference issue in DDMA completion flow. 8672ad663a22 Revert "usb: cdc-wdm: close race between read and workqueue" 4ed7c7720aa0 USB: serial: option: add Telit FN920C04 rmnet compositions 19f98f214bd6 USB: serial: option: add Rolling RW101-GL and RW135-GL support 25a299c566bf USB: serial: option: support Quectel EM060K sub-models 9eba0750255a USB: serial: option: add Lonsung U8300/U9300 product 3e34029b3c11 USB: serial: option: add support for Fibocom FM650/FG650 3c4ba8a6c589 USB: serial: option: add Fibocom FM135-GL variants 282b223cfd5b serial: stm32: Reset .throttled state in .startup() 87d15af82d24 serial: stm32: Return IRQ_NONE in the ISR if no handling happend bbaafbb4651f serial/pmac_zilog: Remove flawed mitigation for rx irq flood 2c9b943e9924 serial: mxs-auart: add spinlock around changing cts state ac882d6b21bf comedi: vmk80xx: fix incomplete endpoint checking 9eae1facfc06 thunderbolt: Fix wake configurations after device unplug 38e10c9faa95 thunderbolt: Avoid notify PM core about runtime PM resume a6d2a8b211c8 binder: check offset alignment in binder_get_object() d05380576fb4 ALSA: hda/realtek - Enable audio jacks of Haier Boyue G42 with ALC269VC 943c3e45c80a x86/cpufeatures: Fix dependencies for GFNI, VAES, and VPCLMULQDQ d17075a93501 x86/bugs: Fix BHI retpoline check 165d22647257 clk: mediatek: Do a runtime PM get on controllers during probe c1d87d56af06 clk: mediatek: clk-mtk: Extend mtk_clk_simple_probe() a4fe8813a786 clk: mediatek: clk-mux: Propagate struct device for mtk-mux 6f5f72a684a2 clk: mediatek: clk-mtk: Propagate struct device for composites 082b831488a4 clk: mediatek: clk-gate: Propagate struct device with mtk_clk_register_gates() 647a25b07d6d clk: mediatek: mt8192: Propagate struct device for gate clocks 0904f9ef910a clk: mediatek: mt8192: Correctly unregister and free clocks on failure 83ada89e4a86 clk: Get runtime PM before walking tree for clk_summary 5a704c267a21 clk: Show active consumers of clocks in debugfs 5833b99cf8fd clk: remove unnecessary (void*) conversions a424e713e0cc clk: Get runtime PM before walking tree during disable_unused 5558b3b68c24 clk: Initialize struct clk_core kref earlier 43bc4cfef2b1 clk: Print an info line before disabling unused clocks 349dbfd65f86 clk: Remove prepare_lock hold assertion in __clk_release() f6ac4fdfa519 usb: new quirk to reduce the SET_ADDRESS request timeout 5f9b63193bca usb: xhci: Add timeout argument in address_device USB HCD callback 1d011d972f58 drm: panel-orientation-quirks: Add quirk for Lenovo Legion Go 7989b04d6cc4 ALSA: scarlett2: Rename scarlett_gen2 to scarlett2 39f932d2953b PCI: Simplify pcie_capability_clear_and_set_word() to ..._clear_word() 636f0fdb3623 PCI/DPC: Use FIELD_GET() aedbd0961467 ALSA: scarlett2: Add Focusrite Clarett 2Pre and 4Pre USB support 03bfe0e93613 ALSA: scarlett2: Add Focusrite Clarett+ 2Pre and 4Pre support 7c02a4a6ccea ALSA: scarlett2: Add correct product series name to messages b928cde9c07c ALSA: scarlett2: Default mixer driver to enabled 0f4048e1a0c6 ASoC: ti: Convert Pandora ASoC to GPIO descriptors e2b8480b709d ALSA: scarlett2: Add support for Clarett 8Pre USB 4d74cb9cdfd5 ALSA: scarlett2: Move USB IDs out from device_info struct bbdfa1448205 PCI: switchtec: Add support for PCIe Gen5 devices 87709f7ecdb8 PCI: switchtec: Use normal comment style 89a9196aec6b PCI: Execute quirk_enable_clear_retrain_link() earlier caa7ff1d7d51 thunderbolt: Add debug log for link controller power quirk 932a7651002b thunderbolt: Log function name of the called quirk 4b7ed2400e0d x86/quirks: Include linux/pnp.h for arch_pnpbios_disabled() f4aae2afe2d5 PCI: Delay after FLR of Solidigm P44 Pro NVMe 0fe6a97a5fea usb: pci-quirks: Reduce the length of a spinlock section in usb_amd_find_chipset_info() c96b07dca169 HID: kye: Sort kye devices 57aadcc0288c PCI: Avoid FLR for SolidRun SNET DPU rev 1 3c55d4396b15 ARM: omap2: n8x0: stop instantiating codec platform data c330a13ab77c drm/panel: visionox-rm69299: don't unregister DSI device 5fd4b090304e drm: nv04: Fix out of bounds access 559f3a633339 s390/cio: fix race condition during online processing beb3ff19a55d s390/qdio: handle deferred cc1 fe446927f8af RDMA/mlx5: Fix port number for counter query in multi-port configuration ea42dbe75992 RDMA/cm: Print the old state when cm_destroy_id gets timeout 196617d07dd6 RDMA/rxe: Fix the problem "mutex_destroy missing" 45e811bab2d0 net: ethernet: ti: am65-cpsw-nuss: cleanup DMA Channels before using them e86c9db58eba net: dsa: mt7530: fix mirroring frames received on local port 62e27ef18eb4 tun: limit printing rate when illegal packet received by tun dev 6a6ebec40820 ice: tc: allow zero flags in parsing tc flower 46efa4d5930c net/mlx5e: Prevent deadlock while disabling aRFS 8635ac7dd9cf net/mlx5: Lag, restore buckets number to default after hash LAG deactivation ba0db4638525 af_unix: Don't peek OOB data without MSG_OOB. a1d3e3521f02 af_unix: Call manage_oob() for every skb in unix_stream_read_generic(). f1c3c61701a0 netfilter: flowtable: incorrect pppoe tuple 8bf7c76a2a20 netfilter: flowtable: validate pppoe header 41d8fdf3afaf netfilter: nft_set_pipapo: do not free live element b13db0d16bc7 netfilter: br_netfilter: skip conntrack input hook for promisc packets df7c0fb8c2b9 netfilter: nf_tables: Fix potential data-race in __nft_obj_type_get() 8d56bad42ac4 netfilter: nf_tables: Fix potential data-race in __nft_expr_type_get() 408a43b6c948 x86/efistub: Remap kernel text read-only before dropping NX attribute f56faf87c1e9 x86/sev: Move early startup code into .head.text section d6f5bc5ff04f x86/sme: Move early SME kernel encryption handling into .head.text e6489cc45fa7 x86/head/64: Move the __head definition to bbcd0534a3eb x86/head/64: Add missing __head annotation to startup_64_load_idt() 20dc656b0657 x86/mm: Remove P*D_PAGE_MASK and P*D_PAGE_SIZE macros d327e961573f x86/efistub: Use 1:1 file:memory mapping for PE/COFF .compat section c4421279b6c2 x86/boot: Increase section and file alignment to 4k/512 581f5d5e02ef x86/boot: Split off PE/COFF .data section 43b1920588fa x86/boot: Drop PE/COFF .reloc section d03399c3e252 x86/boot: Construct PE/COFF .text section from assembler 1fa0a2147590 x86/boot: Derive file size from _edata symbol 1c754c6ec978 x86/boot: Define setup size in linker script f9d68334dd99 x86/boot: Set EFI handover offset directly in header asm e1380c923ccd x86/boot: Grab kernel_info offset from zoffset header directly 67b8dc50890b x86/boot: Drop references to startup_64 33d38d9b35e9 x86/boot: Drop redundant code setting the root device 5c3e92ad493d x86/boot: Omit compression buffer from PE/COFF image memory footprint f31f521ad27e x86/boot: Remove the 'bugger off' message 0db16d1dce52 x86/efi: Drop alignment flags from PE section headers 1800c9628ece x86/efistub: Reinstate soft limit for initrd loading f46e0e9fbef5 x86/efi: Disregard setup header of loaded image f5603f9e13ad x86/efi: Drop EFI stub .bss from .data section 704edc9252f4 drm/i915/vma: Fix UAF on destroy against retire race add0ff34863e net: usb: ax88179_178a: avoid writing the mac address before first reading 07b37f227c8d random: handle creditable entropy from atomic process context bcdd9ce78d66 selftests/ftrace: Limit length in subsystem-enable tests 45eec81eaca6 SUNRPC: Fix rpcgss_context trace event acceptor field cbe7b911e0c9 io_uring: Fix io_cqring_wait() not restoring sigmask on get_timespec64() failure 121a83be215b drm/amd/display: Do not recursively call manual trigger programming 01c227f5a72b drm/amdgpu: fix incorrect number of active RBs for gfx11 87f8aac740f1 drm/amdgpu: fix incorrect active rb bitmap for gfx11 1e053399681c drm/vmwgfx: Enable DMA mappings with SEV b140d9d4515f drm/bridge: adv7511: fix crash on irq during probe 5c3bf5a26d61 reiserfs: Avoid touching renamed directory if parent does not change cc4860dd1375 Subject: [PATCH v6.1] powerpc: drop duplicate entry in Makefile for lib dir e083231c43f3 net: fix IPSTATS_MIB_OUTFORWDATAGRAMS increment after fragment check 6ee7f29fed8c net: ipv4, ipv6: fix IPSTATS_MIB_OUTOCTETS increment duplicated a771780cdf4a net: fix IPSTATS_MIB_OUTPKGS increment in OutForwDatagrams. 8a9f2d0717f0 riscv: Fix build with CONFIG_CC_OPTIMIZE_FOR_SIZE=y 44fd0c7a5a79 tick/rcu: fix false positive "softirq work is pending" messages on RT 786775632028 kernel/sched: Fix double free on invalid isolcpus/nohz_full params 4675ec8d0b9a kernel/sched: Fix uninitialized read in nohz_full/isolcpus setup f46dc32a8617 bpf: btf: limit logging of ignored BTF mismatches 4687b40201db Revert "Revert "tick/common: Align tick period with the HZ tick."" 947f660bde07 Revert "tick/common: Align tick period with the HZ tick." dded404c66bb yaffs2: Fix miscalculation of devname buffer length 30350f237490 mtd_blkdevs: add mtd_table_mutex lock back to blktrans_{open, release} to avoid race condition 0ac32a83ca02 OF: DT-Overlay configfs interface (v8) 0b07d2478b6b fat: Replace prandom_u32() with get_random_u32() 927b66bfd641 aufs6: core 2af5eb310b11 aufs6: standalone e6537c94f033 aufs6: mmap c51d7f19876f aufs6: base 1785f762bbbb aufs6: kbuild 8f625cf94585 qemux86: add configuration symbol to select values d81fac6e842a sched/isolation: really align nohz_full with rcu_nocbs 07c526200cb3 clear_warn_once: add a clear_warn_once= boot parameter 61e2c52ce198 clear_warn_once: bind a timer to written reset value de03f5a3e6c6 clear_warn_once: expand debugfs to include read support d3f9a25028d4 tools: Remove some options from CLANG_CROSS_FLAGS 0fb98cd2429a libbpf: Fix build warning on ref_ctr_off e156ff56a19f perf python: Account for multiple words in CC f06b9c6ae59d perf: perf can not parser the backtrace of app in the 32bit system and 64bit kernel. 1b099e82095d perf: x86-32: explicitly include 5fec311e2fd2 perf: mips64: Convert __u64 to unsigned long long 6cf30287aeaa perf: fix bench numa compilation bd8f67dcb8e4 perf: add SLANG_INC for slang.h 0314b09bf6b9 perf: add sgidefs.h to for mips builds 4a39cc37b957 perf: change --root to --prefix for python install 3db4f4e91769 perf: add 'libperl not found' warning fa3d24bac29a perf: force include of deaadc523f8d fat: don't use obsolete random32 call in namei_vfat d3c72f5df9a3 FAT: Added FAT_NO_83NAME 8f1eebeb519c FAT: Add CONFIG_VFAT_NO_CREATE_WITH_LONGNAMES option 78b0423ccc14 FAT: Add CONFIG_VFAT_FS_NO_DUALNAMES option e998ad53fb68 yaffs2: replace bdevname call with sprintf 1175db6bf4cb yaffs2: convert read_page -> readfolio beb275c683de yaffs: replace IS_ERR with IS_ERR_OR_NULL to check both ERR and NULL e807c9e420bd yaffs: fix -Wstringop-overread compile warning in yaffs_fix_null_name 2fdd54282de3 yaffs2: v5.12+ build fixups (not runtime tested) 869f41030ed8 yaffs: include blkdev.h e955b68f2b1f yaffs: fix misplaced variable declaration f089603aba1d yaffs2: v5.6 build fixups 82da54859f0b yaffs2: fix memory leak when /proc/yaffs is read 2c4cf6808649 yaffs: add strict check when call yaffs_internal_read_super e7dadb47ef11 yaffs: repair yaffs_get_mtd_device f2e29be130f7 yaffs: Fix build failure by handling inode i_version with proper atomic API 8ea43ac7f3a3 yaffs2: fix memory leak in mount/umount 56db60d0abd2 yaffs: Avoid setting any ACL releated xattr 023baea095bc Yaffs:check oob size before auto selecting Yaffs1 409d39918661 fs: yaffs2: replace CURRENT_TIME by other appropriate apis 4bf42c774804 yaffs2: adjust to proper location of MS_RDONLY 08696e21a84c yaffs2: import git revision b4ce1bb (jan, 2020) ca3d9f546a60 initramfs: allow an optional wrapper script around initramfs generation 301742baace5 pnmtologo: use relocatable file name aba96ccce7d9 tools: use basename to identify file in gen-mach-types e195c32ca7c7 lib/build_OID_registry: fix reproducibility issues 876e2f1f7726 vt/conmakehash: improve reproducibility 28b7a366cfef iwlwifi: select MAC80211_LEDS conditionally 69933d85f61e net/dccp: make it depend on CONFIG_BROKEN (CVE-2020-16119) 5a308d8f142a arm64/perf: Fix wrong cast that may cause wrong truncation 339523a797e9 defconfigs: drop obselete options 3d751aeb9bcd arm64/perf: fix backtrace for AAPCS with FP enabled 86fa47f362ae linux-yocto: Handle /bin/awk issues 86f04668ef6e uvesafb: provide option to specify timeout for task completion 0db5521a1b3c uvesafb: print error message when task timeout occurs 710303c12e99 compiler.h: Undef before redefining __attribute_const__ 14a0ede85080 vmware: include jiffies.h e232e6ffe081 Resolve jiffies wrapping about arp c16abf2d705f nfs: Allow default io size to be configured. 9e9e885f4a6c check console device file on fs when booting 0ce0ce443d58 mount_root: clarify error messages for when no rootfs found 32449db67de8 menuconfig,mconf-cfg: Allow specification of ncurses location c55f1054bdce modpost: mask trivial warnings 30a45d4ee261 kbuild: exclude meta directory from distclean processing 0890b10d8fb1 powerpc: serialize image targets 6c0feb81c3ae arm: serialize build targets 77fa1b70cdbd crtsavres: fixups for 5.4+ cd107e4edd5f crtsavres: fixups for 5.4+ 8f763b35ae5b powerpc/ptrace: Disable array-bounds warning with gcc8 fe6f93755196 powerpc: Disable attribute-alias warnings from gcc8 9b7097364b87 powerpc: add crtsavres.o to archprepare for kbuild c106cd86a07b powerpc: kexec fix for powerpc64 33b7738c61fc powerpc: Add unwind information for SPE registers of E500 core c04e26a9beda mips: vdso: fix 'jalr $t9' crash in vdso code 4733368eab80 mips: Kconfig: add QEMUMIPS64 option ec2df6ae5ee5 4kc cache tlb hazard: tlbp cache coherency c8c511fae0f0 malta uhci quirks: make allowance for slow 4k(e)c b2bf1b6e971a arm64: defconfig: cleanup config options a40a34b02336 vexpress: Pass LOADADDR to Makefile 7c51524611bb arm: ARM EABI socketcall 1f6e77027c24 ARM: LPAE: Invalidate the TLB for module addresses during translation fault Signed-off-by: Bruce Ashfield --- .../linux/linux-yocto-rt_6.1.bb | 6 ++-- .../linux/linux-yocto-tiny_6.1.bb | 6 ++-- meta/recipes-kernel/linux/linux-yocto_6.1.bb | 28 +++++++++---------- 3 files changed, 20 insertions(+), 20 deletions(-) diff --git a/meta/recipes-kernel/linux/linux-yocto-rt_6.1.bb b/meta/recipes-kernel/linux/linux-yocto-rt_6.1.bb index a1b3e2d33c..5872d75a28 100644 --- a/meta/recipes-kernel/linux/linux-yocto-rt_6.1.bb +++ b/meta/recipes-kernel/linux/linux-yocto-rt_6.1.bb @@ -14,13 +14,13 @@ python () { raise bb.parse.SkipRecipe("Set PREFERRED_PROVIDER_virtual/kernel to linux-yocto-rt to enable it") } -SRCREV_machine ?= "d8b7bfb52d81a60cce39809fb105d760a359def1" -SRCREV_meta ?= "2ccedc62a19929df39eef4a5f2255b6f03652b31" +SRCREV_machine ?= "0efb10b7f099e769d4f27db872ef52394021e5b5" +SRCREV_meta ?= "6bf76ba66fb63fb2deb03805dc45ca86186e7010" SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;branch=${KBRANCH};name=machine;protocol=https \ git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.1;destsuffix=${KMETA};protocol=https" -LINUX_VERSION ?= "6.1.87" +LINUX_VERSION ?= "6.1.89" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" diff --git a/meta/recipes-kernel/linux/linux-yocto-tiny_6.1.bb b/meta/recipes-kernel/linux/linux-yocto-tiny_6.1.bb index 2f99c068c1..313aa27406 100644 --- a/meta/recipes-kernel/linux/linux-yocto-tiny_6.1.bb +++ b/meta/recipes-kernel/linux/linux-yocto-tiny_6.1.bb @@ -8,7 +8,7 @@ require recipes-kernel/linux/linux-yocto.inc # CVE exclusions include recipes-kernel/linux/cve-exclusion_6.1.inc -LINUX_VERSION ?= "6.1.87" +LINUX_VERSION ?= "6.1.89" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}" @@ -17,8 +17,8 @@ DEPENDS += "openssl-native util-linux-native" KMETA = "kernel-meta" KCONF_BSP_AUDIT_LEVEL = "2" -SRCREV_machine ?= "9bf85a364245b2c3b98879c869725adbf8fb37ca" -SRCREV_meta ?= "2ccedc62a19929df39eef4a5f2255b6f03652b31" +SRCREV_machine ?= "728b553d7c4fc1fb3512c59462f628b997fff257" +SRCREV_meta ?= "6bf76ba66fb63fb2deb03805dc45ca86186e7010" PV = "${LINUX_VERSION}+git" diff --git a/meta/recipes-kernel/linux/linux-yocto_6.1.bb b/meta/recipes-kernel/linux/linux-yocto_6.1.bb index ad19080bc7..e39106ccd2 100644 --- a/meta/recipes-kernel/linux/linux-yocto_6.1.bb +++ b/meta/recipes-kernel/linux/linux-yocto_6.1.bb @@ -18,25 +18,25 @@ KBRANCH:qemux86-64 ?= "v6.1/standard/base" KBRANCH:qemuloongarch64 ?= "v6.1/standard/base" KBRANCH:qemumips64 ?= "v6.1/standard/mti-malta64" -SRCREV_machine:qemuarm ?= "80e50241e06c17d0ba9d637bbd2e01aeadc0b385" -SRCREV_machine:qemuarm64 ?= "9bf85a364245b2c3b98879c869725adbf8fb37ca" -SRCREV_machine:qemuloongarch64 ?= "9bf85a364245b2c3b98879c869725adbf8fb37ca" -SRCREV_machine:qemumips ?= "32a30aff77ba61611596d04faab7658d2e3d9154" -SRCREV_machine:qemuppc ?= "c2dc480743bc2fa933761e7c68f01d973875f6d9" -SRCREV_machine:qemuriscv64 ?= "9bf85a364245b2c3b98879c869725adbf8fb37ca" -SRCREV_machine:qemuriscv32 ?= "9bf85a364245b2c3b98879c869725adbf8fb37ca" -SRCREV_machine:qemux86 ?= "9bf85a364245b2c3b98879c869725adbf8fb37ca" -SRCREV_machine:qemux86-64 ?= "9bf85a364245b2c3b98879c869725adbf8fb37ca" -SRCREV_machine:qemumips64 ?= "fce0b9ab6a695ab8a214c65f22a5f58ad623b1f9" -SRCREV_machine ?= "9bf85a364245b2c3b98879c869725adbf8fb37ca" -SRCREV_meta ?= "2ccedc62a19929df39eef4a5f2255b6f03652b31" +SRCREV_machine:qemuarm ?= "b1cc4225c4b5588cf0c63e6f86116a38cdb53c64" +SRCREV_machine:qemuarm64 ?= "728b553d7c4fc1fb3512c59462f628b997fff257" +SRCREV_machine:qemuloongarch64 ?= "728b553d7c4fc1fb3512c59462f628b997fff257" +SRCREV_machine:qemumips ?= "731b88d4e5731096e2ca6cb8f04eb8325693abac" +SRCREV_machine:qemuppc ?= "ffcfc9a6c9dfe39c7ed298dce35d814b361774d6" +SRCREV_machine:qemuriscv64 ?= "728b553d7c4fc1fb3512c59462f628b997fff257" +SRCREV_machine:qemuriscv32 ?= "728b553d7c4fc1fb3512c59462f628b997fff257" +SRCREV_machine:qemux86 ?= "728b553d7c4fc1fb3512c59462f628b997fff257" +SRCREV_machine:qemux86-64 ?= "728b553d7c4fc1fb3512c59462f628b997fff257" +SRCREV_machine:qemumips64 ?= "3b4c60db0192221d71a32d8646efa3aa5b96dc8e" +SRCREV_machine ?= "728b553d7c4fc1fb3512c59462f628b997fff257" +SRCREV_meta ?= "6bf76ba66fb63fb2deb03805dc45ca86186e7010" # set your preferred provider of linux-yocto to 'linux-yocto-upstream', and you'll # get the /base branch, which is pure upstream -stable, and the same # meta SRCREV as the linux-yocto-standard builds. Select your version using the # normal PREFERRED_VERSION settings. BBCLASSEXTEND = "devupstream:target" -SRCREV_machine:class-devupstream ?= "6741e066ec7633450d3186946035c1f80c4226b8" +SRCREV_machine:class-devupstream ?= "dcbc050cb0d304c3427d6583384eebcaf0e3caee" PN:class-devupstream = "linux-yocto-upstream" KBRANCH:class-devupstream = "v6.1/base" @@ -45,7 +45,7 @@ SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;name=machine;branch=${KBRA SRC_URI += "file://0001-perf-cpumap-Make-counter-as-unsigned-ints.patch" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" -LINUX_VERSION ?= "6.1.87" +LINUX_VERSION ?= "6.1.89" PV = "${LINUX_VERSION}+git" From patchwork Fri May 3 03:00:15 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Bruce Ashfield X-Patchwork-Id: 43222 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id C81C9C25B10 for ; Fri, 3 May 2024 03:00:35 +0000 (UTC) Received: from mail-qv1-f52.google.com (mail-qv1-f52.google.com [209.85.219.52]) by mx.groups.io with SMTP id smtpd.web11.4337.1714705230781170767 for ; Thu, 02 May 2024 20:00:31 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@gmail.com header.s=20230601 header.b=EE5G296n; spf=pass (domain: gmail.com, ip: 209.85.219.52, mailfrom: bruce.ashfield@gmail.com) Received: by mail-qv1-f52.google.com with SMTP id 6a1803df08f44-6a04bae512aso43106726d6.2 for ; Thu, 02 May 2024 20:00:30 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1714705230; x=1715310030; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=9HPHhksoWKsdtg4f89tJRYQZVcqDuMBGIvRMuk7CDgw=; b=EE5G296nAZjkUZGdNJSxsjYzQ1Zz79FwXq/MGdJZy7X/B7SnEuZbiXXmTYOyCMMC0u 4ihJEl35UPokCwAurh7hXJFjLtjaPg9j1rcKPVok0h93zgU/oiHfHIFbkYB2Ifzfs6Y0 TiGAGF7115VAE9AaBAxXsnnsM27f9i5KgXKtfu+8ItSbTDVfW42Sbw17hp5rEcgNjY/N KeevhIWtoUM5oUxZFIWVosx6pvnUjUKVTfmTeJHUicWBBhYbOYDos7CCoBVITpGbNJRV MLLsd0/XcF+DcgJsX2hDwLGRpgI0e9ZuOqrOIgIXNeSpVwG358QSCbQ/CYrt6U+K72Uc 5/VA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1714705230; x=1715310030; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=9HPHhksoWKsdtg4f89tJRYQZVcqDuMBGIvRMuk7CDgw=; b=Vb5e9IHm10QP/gjQBzTK7APdf0XhXZXgv6o+Yjbr1/arIWt/3sjcUZDZqIuxoyjIK/ Nfw/mgqrp+9GYmRNlEeJKONgwTlDXAb1RSChoFlrjGrHLVBeP986b/QugVVmOcfMAwp4 Ps2mrKcBzEmbnuczgt7ZtIAkoKIc3WFwIMpWqzPMPLbeopXoXCKpqDh/QEFLm5QfmTpX DYx66jtI46kEbsqQ3jIlZ9wxhAwA1nvJ8WdDGm9MkVZnT3Sid/fIbocmOHEcTRfknQWW t3dC6vBich/dFwYMs1+OyObDlCQYZWnkyg+6P/wAaLdkx6hhL/T51bSNUPJvXSNEG9Uv 9Org== X-Gm-Message-State: AOJu0Yyptdl/wVj8WsT+KMeFSpwoBbiLgnUMtpGXHnCKmV18XTxxpHto 1gjXb5vHSULxcKuu+GrFxLnSXgvmWZCM5u8TU/XAkxsGPoUW+JSjC8VDJg== X-Google-Smtp-Source: AGHT+IFS8BcW1jk21Q0uohpKY0s/aCAE/6kiLjpVBExwxCYtMlm/QPZ1WDGQRhRVszTn2tYHthsnhA== X-Received: by 2002:a05:6214:2604:b0:69b:6a3a:c673 with SMTP id gu4-20020a056214260400b0069b6a3ac673mr1605939qvb.32.1714705228490; Thu, 02 May 2024 20:00:28 -0700 (PDT) Received: from bruce-XPS-8940.localdomain (pool-174-112-62-108.cpe.net.cable.rogers.com. [174.112.62.108]) by smtp.gmail.com with ESMTPSA id mi5-20020a056214558500b006a0fa96013asm839357qvb.138.2024.05.02.20.00.26 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 02 May 2024 20:00:27 -0700 (PDT) From: bruce.ashfield@gmail.com To: steve@sakoman.com Cc: openembedded-core@lists.openembedded.org Subject: [OE-core][nanbield 10/10] linux-yocto/6.1: update CVE exclusions (6.1.89) Date: Thu, 2 May 2024 23:00:15 -0400 Message-Id: <20240503030015.374078-10-bruce.ashfield@gmail.com> X-Mailer: git-send-email 2.39.2 In-Reply-To: <20240503030015.374078-1-bruce.ashfield@gmail.com> References: <20240503030015.374078-1-bruce.ashfield@gmail.com> MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 03 May 2024 03:00:35 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/198965 From: Bruce Ashfield Data pulled from: https://github.com/nluedtke/linux_kernel_cves 1/1 [ Author: Nicholas Luedtke Email: nicholas.luedtke@uwalumni.com Subject: Update 8Apr24 Date: Tue, 9 Apr 2024 18:19:11 -0400 ] Signed-off-by: Bruce Ashfield --- .../linux/cve-exclusion_6.1.inc | 2720 +++++++++++++---- 1 file changed, 2054 insertions(+), 666 deletions(-) diff --git a/meta/recipes-kernel/linux/cve-exclusion_6.1.inc b/meta/recipes-kernel/linux/cve-exclusion_6.1.inc index cb48e4d88d..58d7af9a52 100644 --- a/meta/recipes-kernel/linux/cve-exclusion_6.1.inc +++ b/meta/recipes-kernel/linux/cve-exclusion_6.1.inc @@ -1,9 +1,9 @@ # Auto-generated CVE metadata, DO NOT EDIT BY HAND. -# Generated at 2024-02-21 02:22:41.710563+00:00 for version 6.1.78 +# Generated at 2024-05-02 16:10:19.009228+00:00 for version 6.1.89 python check_kernel_cve_status_version() { - this_version = "6.1.78" + this_version = "6.1.89" kernel_version = d.getVar("LINUX_VERSION") if kernel_version != this_version: bb.warn("Kernel CVE status needs updating: generated for %s but kernel is %s" % (this_version, kernel_version)) @@ -2980,6 +2980,10 @@ CVE_STATUS[CVE-2019-25044] = "fixed-version: Fixed from version 5.2rc4" CVE_STATUS[CVE-2019-25045] = "fixed-version: Fixed from version 5.1" +CVE_STATUS[CVE-2019-25160] = "fixed-version: Fixed from version 5.0" + +CVE_STATUS[CVE-2019-25162] = "fixed-version: Fixed from version 6.0rc1" + CVE_STATUS[CVE-2019-3016] = "fixed-version: Fixed from version 5.6rc1" CVE_STATUS[CVE-2019-3459] = "fixed-version: Fixed from version 5.1rc1" @@ -3452,6 +3456,32 @@ CVE_STATUS[CVE-2020-36694] = "fixed-version: Fixed from version 5.10" CVE_STATUS[CVE-2020-36766] = "fixed-version: Fixed from version 5.9rc1" +CVE_STATUS[CVE-2020-36775] = "fixed-version: Fixed from version 5.7rc1" + +CVE_STATUS[CVE-2020-36776] = "fixed-version: Fixed from version 5.13rc1" + +CVE_STATUS[CVE-2020-36777] = "fixed-version: Fixed from version 5.13rc1" + +CVE_STATUS[CVE-2020-36778] = "fixed-version: Fixed from version 5.13rc1" + +CVE_STATUS[CVE-2020-36779] = "fixed-version: Fixed from version 5.13rc1" + +CVE_STATUS[CVE-2020-36780] = "fixed-version: Fixed from version 5.13rc1" + +CVE_STATUS[CVE-2020-36781] = "fixed-version: Fixed from version 5.13rc1" + +CVE_STATUS[CVE-2020-36782] = "fixed-version: Fixed from version 5.13rc1" + +CVE_STATUS[CVE-2020-36783] = "fixed-version: Fixed from version 5.13rc1" + +CVE_STATUS[CVE-2020-36784] = "fixed-version: Fixed from version 5.13rc1" + +CVE_STATUS[CVE-2020-36785] = "fixed-version: Fixed from version 5.13rc1" + +CVE_STATUS[CVE-2020-36786] = "fixed-version: Fixed from version 5.13rc1" + +CVE_STATUS[CVE-2020-36787] = "fixed-version: Fixed from version 5.13rc1" + CVE_STATUS[CVE-2020-3702] = "fixed-version: Fixed from version 5.12rc1" CVE_STATUS[CVE-2020-4788] = "fixed-version: Fixed from version 5.10rc5" @@ -3940,1333 +3970,2691 @@ CVE_STATUS[CVE-2021-45868] = "fixed-version: Fixed from version 5.16rc1" CVE_STATUS[CVE-2021-46283] = "fixed-version: Fixed from version 5.13rc7" -CVE_STATUS[CVE-2022-0001] = "fixed-version: Fixed from version 5.17rc8" +CVE_STATUS[CVE-2021-46904] = "fixed-version: Fixed from version 5.12rc7" -CVE_STATUS[CVE-2022-0002] = "fixed-version: Fixed from version 5.17rc8" +CVE_STATUS[CVE-2021-46905] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-0168] = "fixed-version: Fixed from version 5.18rc1" +CVE_STATUS[CVE-2021-46906] = "fixed-version: Fixed from version 5.13rc5" -CVE_STATUS[CVE-2022-0171] = "fixed-version: Fixed from version 5.18rc4" +CVE_STATUS[CVE-2021-46908] = "fixed-version: Fixed from version 5.12rc8" -CVE_STATUS[CVE-2022-0185] = "fixed-version: Fixed from version 5.17rc1" +CVE_STATUS[CVE-2021-46909] = "fixed-version: Fixed from version 5.12rc8" -CVE_STATUS[CVE-2022-0264] = "fixed-version: Fixed from version 5.16rc6" +CVE_STATUS[CVE-2021-46910] = "fixed-version: Fixed from version 5.12rc8" -CVE_STATUS[CVE-2022-0286] = "fixed-version: Fixed from version 5.14rc2" +CVE_STATUS[CVE-2021-46911] = "fixed-version: Fixed from version 5.12rc8" -CVE_STATUS[CVE-2022-0322] = "fixed-version: Fixed from version 5.15rc6" +CVE_STATUS[CVE-2021-46912] = "fixed-version: Fixed from version 5.12rc8" -CVE_STATUS[CVE-2022-0330] = "fixed-version: Fixed from version 5.17rc2" +CVE_STATUS[CVE-2021-46913] = "fixed-version: Fixed from version 5.12rc8" -CVE_STATUS[CVE-2022-0382] = "fixed-version: Fixed from version 5.16" +CVE_STATUS[CVE-2021-46914] = "fixed-version: Fixed from version 5.12rc8" -# CVE-2022-0400 has no known resolution +CVE_STATUS[CVE-2021-46915] = "fixed-version: Fixed from version 5.12rc8" -CVE_STATUS[CVE-2022-0433] = "fixed-version: Fixed from version 5.17rc1" +CVE_STATUS[CVE-2021-46916] = "fixed-version: Fixed from version 5.12rc8" -CVE_STATUS[CVE-2022-0435] = "fixed-version: Fixed from version 5.17rc4" +CVE_STATUS[CVE-2021-46917] = "fixed-version: Fixed from version 5.12rc8" -CVE_STATUS[CVE-2022-0480] = "fixed-version: Fixed from version 5.15rc1" +CVE_STATUS[CVE-2021-46918] = "fixed-version: Fixed from version 5.12rc8" -CVE_STATUS[CVE-2022-0487] = "fixed-version: Fixed from version 5.17rc4" +CVE_STATUS[CVE-2021-46919] = "fixed-version: Fixed from version 5.12rc8" -CVE_STATUS[CVE-2022-0492] = "fixed-version: Fixed from version 5.17rc3" +CVE_STATUS[CVE-2021-46920] = "fixed-version: Fixed from version 5.12rc8" -CVE_STATUS[CVE-2022-0494] = "fixed-version: Fixed from version 5.17rc5" +CVE_STATUS[CVE-2021-46921] = "fixed-version: Fixed from version 5.12" -CVE_STATUS[CVE-2022-0500] = "fixed-version: Fixed from version 5.17rc1" +CVE_STATUS[CVE-2021-46922] = "fixed-version: Fixed from version 5.12" -CVE_STATUS[CVE-2022-0516] = "fixed-version: Fixed from version 5.17rc4" +CVE_STATUS[CVE-2021-46923] = "fixed-version: Fixed from version 5.16rc8" -CVE_STATUS[CVE-2022-0617] = "fixed-version: Fixed from version 5.17rc2" +CVE_STATUS[CVE-2021-46924] = "fixed-version: Fixed from version 5.16rc8" -CVE_STATUS[CVE-2022-0644] = "fixed-version: Fixed from version 5.15rc7" +CVE_STATUS[CVE-2021-46925] = "fixed-version: Fixed from version 5.16rc8" -CVE_STATUS[CVE-2022-0646] = "fixed-version: Fixed from version 5.17rc5" +CVE_STATUS[CVE-2021-46926] = "fixed-version: Fixed from version 5.16rc7" -CVE_STATUS[CVE-2022-0742] = "fixed-version: Fixed from version 5.17rc7" +CVE_STATUS[CVE-2021-46927] = "fixed-version: Fixed from version 5.16rc8" -CVE_STATUS[CVE-2022-0812] = "fixed-version: Fixed from version 5.8rc6" +CVE_STATUS[CVE-2021-46928] = "fixed-version: Fixed from version 5.16rc7" -CVE_STATUS[CVE-2022-0847] = "fixed-version: Fixed from version 5.17rc6" +CVE_STATUS[CVE-2021-46929] = "fixed-version: Fixed from version 5.16rc8" -CVE_STATUS[CVE-2022-0850] = "fixed-version: Fixed from version 5.14rc1" +CVE_STATUS[CVE-2021-46930] = "fixed-version: Fixed from version 5.16rc8" -CVE_STATUS[CVE-2022-0854] = "fixed-version: Fixed from version 5.17rc8" +CVE_STATUS[CVE-2021-46931] = "fixed-version: Fixed from version 5.16rc8" -CVE_STATUS[CVE-2022-0995] = "fixed-version: Fixed from version 5.17rc8" +CVE_STATUS[CVE-2021-46932] = "fixed-version: Fixed from version 5.16rc8" -CVE_STATUS[CVE-2022-0998] = "fixed-version: Fixed from version 5.17rc1" +CVE_STATUS[CVE-2021-46933] = "fixed-version: Fixed from version 5.16rc8" -CVE_STATUS[CVE-2022-1011] = "fixed-version: Fixed from version 5.17rc8" +CVE_STATUS[CVE-2021-46934] = "fixed-version: Fixed from version 5.16rc8" -CVE_STATUS[CVE-2022-1012] = "fixed-version: Fixed from version 5.18rc6" +CVE_STATUS[CVE-2021-46935] = "fixed-version: Fixed from version 5.16rc8" -CVE_STATUS[CVE-2022-1015] = "fixed-version: Fixed from version 5.18rc1" +CVE_STATUS[CVE-2021-46936] = "fixed-version: Fixed from version 5.16rc8" -CVE_STATUS[CVE-2022-1016] = "fixed-version: Fixed from version 5.18rc1" +CVE_STATUS[CVE-2021-46937] = "fixed-version: Fixed from version 5.16rc8" -CVE_STATUS[CVE-2022-1043] = "fixed-version: Fixed from version 5.14rc7" +CVE_STATUS[CVE-2021-46938] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-1048] = "fixed-version: Fixed from version 5.18rc1" +CVE_STATUS[CVE-2021-46939] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-1055] = "fixed-version: Fixed from version 5.17rc3" +CVE_STATUS[CVE-2021-46940] = "fixed-version: Fixed from version 5.13rc1" -# CVE-2022-1116 has no known resolution +CVE_STATUS[CVE-2021-46941] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-1158] = "fixed-version: Fixed from version 5.18rc1" +CVE_STATUS[CVE-2021-46942] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-1184] = "fixed-version: Fixed from version 5.19rc1" +CVE_STATUS[CVE-2021-46943] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-1195] = "fixed-version: Fixed from version 5.16rc7" +CVE_STATUS[CVE-2021-46944] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-1198] = "fixed-version: Fixed from version 5.17rc6" +CVE_STATUS[CVE-2021-46945] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-1199] = "fixed-version: Fixed from version 5.17rc8" +CVE_STATUS[CVE-2021-46947] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-1204] = "fixed-version: Fixed from version 5.18rc1" +CVE_STATUS[CVE-2021-46948] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-1205] = "fixed-version: Fixed from version 5.18rc1" +CVE_STATUS[CVE-2021-46949] = "fixed-version: Fixed from version 5.13rc1" -# CVE-2022-1247 has no known resolution +CVE_STATUS[CVE-2021-46950] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-1263] = "fixed-version: Fixed from version 5.18rc3" +CVE_STATUS[CVE-2021-46951] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-1280] = "fixed-version: Fixed from version 5.15rc1" +CVE_STATUS[CVE-2021-46952] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-1353] = "fixed-version: Fixed from version 5.17" +CVE_STATUS[CVE-2021-46953] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-1419] = "fixed-version: Fixed from version 5.6rc2" +CVE_STATUS[CVE-2021-46954] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-1462] = "fixed-version: Fixed from version 5.19rc7" +CVE_STATUS[CVE-2021-46955] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-1508] = "fixed-version: Fixed from version 5.15rc1" +CVE_STATUS[CVE-2021-46956] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-1516] = "fixed-version: Fixed from version 5.18rc1" +CVE_STATUS[CVE-2021-46957] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-1651] = "fixed-version: Fixed from version 5.18rc1" +CVE_STATUS[CVE-2021-46958] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-1652] = "fixed-version: Fixed from version 5.18rc6" +CVE_STATUS[CVE-2021-46959] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-1671] = "fixed-version: Fixed from version 5.18rc1" +CVE_STATUS[CVE-2021-46960] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-1678] = "fixed-version: Fixed from version 4.20rc1" +CVE_STATUS[CVE-2021-46961] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-1679] = "fixed-version: Fixed from version 6.0rc1" +CVE_STATUS[CVE-2021-46962] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-1729] = "fixed-version: Fixed from version 5.18" +CVE_STATUS[CVE-2021-46963] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-1734] = "fixed-version: Fixed from version 5.18rc6" +CVE_STATUS[CVE-2021-46964] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-1786] = "fixed-version: Fixed from version 5.12rc1" +CVE_STATUS[CVE-2021-46965] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-1789] = "fixed-version: Fixed from version 5.18" +CVE_STATUS[CVE-2021-46966] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-1836] = "fixed-version: Fixed from version 5.18rc5" +CVE_STATUS[CVE-2021-46967] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-1852] = "fixed-version: Fixed from version 5.19rc1" +CVE_STATUS[CVE-2021-46968] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-1882] = "fixed-version: Fixed from version 5.19rc8" +CVE_STATUS[CVE-2021-46969] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-1943] = "fixed-version: Fixed from version 5.18rc7" +CVE_STATUS[CVE-2021-46970] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-1966] = "fixed-version: Fixed from version 5.19rc1" +CVE_STATUS[CVE-2021-46971] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-1972] = "fixed-version: Fixed from version 5.19rc1" +CVE_STATUS[CVE-2021-46972] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-1973] = "fixed-version: Fixed from version 5.19rc1" +CVE_STATUS[CVE-2021-46973] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-1974] = "fixed-version: Fixed from version 5.18rc6" +CVE_STATUS[CVE-2021-46974] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-1975] = "fixed-version: Fixed from version 5.18rc6" +CVE_STATUS[CVE-2021-46976] = "fixed-version: Fixed from version 5.13rc2" -CVE_STATUS[CVE-2022-1976] = "fixed-version: Fixed from version 5.19rc1" +CVE_STATUS[CVE-2021-46977] = "fixed-version: Fixed from version 5.13rc2" -CVE_STATUS[CVE-2022-1998] = "fixed-version: Fixed from version 5.17rc3" +CVE_STATUS[CVE-2021-46978] = "fixed-version: Fixed from version 5.13rc2" -CVE_STATUS[CVE-2022-20008] = "fixed-version: Fixed from version 5.17rc5" +CVE_STATUS[CVE-2021-46979] = "fixed-version: Fixed from version 5.13rc2" -CVE_STATUS[CVE-2022-20132] = "fixed-version: Fixed from version 5.16rc5" +CVE_STATUS[CVE-2021-46980] = "fixed-version: Fixed from version 5.13rc2" -CVE_STATUS[CVE-2022-20141] = "fixed-version: Fixed from version 5.15rc1" +CVE_STATUS[CVE-2021-46981] = "fixed-version: Fixed from version 5.13rc2" -CVE_STATUS[CVE-2022-20148] = "fixed-version: Fixed from version 5.16rc1" +CVE_STATUS[CVE-2021-46982] = "fixed-version: Fixed from version 5.13rc2" -CVE_STATUS[CVE-2022-20153] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2021-46983] = "fixed-version: Fixed from version 5.13rc2" -CVE_STATUS[CVE-2022-20154] = "fixed-version: Fixed from version 5.16rc8" +CVE_STATUS[CVE-2021-46984] = "fixed-version: Fixed from version 5.13rc2" -CVE_STATUS[CVE-2022-20158] = "fixed-version: Fixed from version 5.17" +CVE_STATUS[CVE-2021-46985] = "fixed-version: Fixed from version 5.13rc2" -CVE_STATUS[CVE-2022-20166] = "fixed-version: Fixed from version 5.10rc1" +CVE_STATUS[CVE-2021-46986] = "fixed-version: Fixed from version 5.13rc2" -CVE_STATUS[CVE-2022-20368] = "fixed-version: Fixed from version 5.17" +CVE_STATUS[CVE-2021-46987] = "fixed-version: Fixed from version 5.13rc2" -CVE_STATUS[CVE-2022-20369] = "fixed-version: Fixed from version 5.18rc1" +CVE_STATUS[CVE-2021-46988] = "fixed-version: Fixed from version 5.13rc2" -CVE_STATUS[CVE-2022-20409] = "fixed-version: Fixed from version 5.12rc1" +CVE_STATUS[CVE-2021-46989] = "fixed-version: Fixed from version 5.13rc2" -CVE_STATUS[CVE-2022-20421] = "fixed-version: Fixed from version 6.0rc4" +CVE_STATUS[CVE-2021-46990] = "fixed-version: Fixed from version 5.13rc2" -CVE_STATUS[CVE-2022-20422] = "fixed-version: Fixed from version 6.0rc1" +CVE_STATUS[CVE-2021-46991] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-20423] = "fixed-version: Fixed from version 5.17" +CVE_STATUS[CVE-2021-46992] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-20424] = "fixed-version: Fixed from version 5.12rc1" +CVE_STATUS[CVE-2021-46993] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-20565] = "fixed-version: Fixed from version 5.9rc4" +CVE_STATUS[CVE-2021-46994] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-20566] = "fixed-version: Fixed from version 5.19" +CVE_STATUS[CVE-2021-46995] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-20567] = "fixed-version: Fixed from version 4.16rc5" +CVE_STATUS[CVE-2021-46996] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-20568] = "fixed-version: Fixed from version 5.12rc1" +CVE_STATUS[CVE-2021-46997] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-20572] = "fixed-version: Fixed from version 5.19rc1" +CVE_STATUS[CVE-2021-46998] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-2078] = "fixed-version: Fixed from version 5.19rc1" +CVE_STATUS[CVE-2021-46999] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-21123] = "fixed-version: Fixed from version 5.19rc3" +CVE_STATUS[CVE-2021-47000] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-21125] = "fixed-version: Fixed from version 5.19rc3" +CVE_STATUS[CVE-2021-47001] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-21166] = "fixed-version: Fixed from version 5.19rc3" +CVE_STATUS[CVE-2021-47002] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-21385] = "fixed-version: Fixed from version 4.20" +CVE_STATUS[CVE-2021-47003] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-21499] = "fixed-version: Fixed from version 5.19rc1" +CVE_STATUS[CVE-2021-47004] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-21505] = "fixed-version: Fixed from version 5.19rc8" +CVE_STATUS[CVE-2021-47005] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-2153] = "fixed-version: Fixed from version 5.18rc1" +CVE_STATUS[CVE-2021-47006] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-2196] = "cpe-stable-backport: Backported in 6.1.14" +CVE_STATUS[CVE-2021-47007] = "fixed-version: Fixed from version 5.13rc1" -# CVE-2022-2209 has no known resolution +CVE_STATUS[CVE-2021-47008] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-22942] = "fixed-version: Fixed from version 5.17rc2" +CVE_STATUS[CVE-2021-47009] = "fixed-version: Fixed from version 5.13rc2" -CVE_STATUS[CVE-2022-23036] = "fixed-version: Fixed from version 5.17rc8" +CVE_STATUS[CVE-2021-47010] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-23037] = "fixed-version: Fixed from version 5.17rc8" +CVE_STATUS[CVE-2021-47011] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-23038] = "fixed-version: Fixed from version 5.17rc8" +CVE_STATUS[CVE-2021-47012] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-23039] = "fixed-version: Fixed from version 5.17rc8" +CVE_STATUS[CVE-2021-47013] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-23040] = "fixed-version: Fixed from version 5.17rc8" +CVE_STATUS[CVE-2021-47014] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-23041] = "fixed-version: Fixed from version 5.17rc8" +CVE_STATUS[CVE-2021-47015] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-23042] = "fixed-version: Fixed from version 5.17rc8" +CVE_STATUS[CVE-2021-47016] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-2308] = "fixed-version: Fixed from version 6.0" +CVE_STATUS[CVE-2021-47017] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-2318] = "fixed-version: Fixed from version 5.19rc5" +CVE_STATUS[CVE-2021-47018] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-23222] = "fixed-version: Fixed from version 5.17rc1" +CVE_STATUS[CVE-2021-47019] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-2327] = "fixed-version: Fixed from version 5.12rc1" +CVE_STATUS[CVE-2021-47020] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-2380] = "fixed-version: Fixed from version 5.18rc1" +CVE_STATUS[CVE-2021-47021] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-23816] = "fixed-version: Fixed from version 5.19rc7" +CVE_STATUS[CVE-2021-47022] = "fixed-version: Fixed from version 5.13rc1" -# CVE-2022-23825 has no known resolution +CVE_STATUS[CVE-2021-47023] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-23960] = "fixed-version: Fixed from version 5.17rc8" +CVE_STATUS[CVE-2021-47024] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-24122] = "fixed-version: Fixed from version 5.17rc2" +CVE_STATUS[CVE-2021-47025] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-24448] = "fixed-version: Fixed from version 5.17rc2" +CVE_STATUS[CVE-2021-47026] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-24958] = "fixed-version: Fixed from version 5.17rc1" +CVE_STATUS[CVE-2021-47027] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-24959] = "fixed-version: Fixed from version 5.17rc2" +CVE_STATUS[CVE-2021-47028] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-2503] = "fixed-version: Fixed from version 5.19rc1" +CVE_STATUS[CVE-2021-47029] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-25258] = "fixed-version: Fixed from version 5.17rc4" +CVE_STATUS[CVE-2021-47030] = "fixed-version: Fixed from version 5.13rc1" -# CVE-2022-25265 has no known resolution +CVE_STATUS[CVE-2021-47031] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-25375] = "fixed-version: Fixed from version 5.17rc4" +CVE_STATUS[CVE-2021-47032] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-25636] = "fixed-version: Fixed from version 5.17rc6" +CVE_STATUS[CVE-2021-47033] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-2585] = "fixed-version: Fixed from version 6.0rc1" +CVE_STATUS[CVE-2021-47034] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-2586] = "fixed-version: Fixed from version 6.0rc1" +CVE_STATUS[CVE-2021-47035] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-2588] = "fixed-version: Fixed from version 6.0rc1" +CVE_STATUS[CVE-2021-47036] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-2590] = "fixed-version: Fixed from version 6.0rc3" +CVE_STATUS[CVE-2021-47037] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-2602] = "fixed-version: Fixed from version 6.1rc1" +CVE_STATUS[CVE-2021-47038] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-26365] = "fixed-version: Fixed from version 5.19rc6" +CVE_STATUS[CVE-2021-47039] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-26373] = "fixed-version: Fixed from version 6.0rc1" +CVE_STATUS[CVE-2021-47040] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-2639] = "fixed-version: Fixed from version 5.18rc4" +CVE_STATUS[CVE-2021-47041] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-26490] = "fixed-version: Fixed from version 5.17rc1" +CVE_STATUS[CVE-2021-47042] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-2663] = "fixed-version: Fixed from version 6.0rc5" +CVE_STATUS[CVE-2021-47043] = "fixed-version: Fixed from version 5.13rc1" -# CVE-2022-26878 has no known resolution +CVE_STATUS[CVE-2021-47044] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-26966] = "fixed-version: Fixed from version 5.17rc6" +CVE_STATUS[CVE-2021-47045] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-27223] = "fixed-version: Fixed from version 5.17rc6" +CVE_STATUS[CVE-2021-47046] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-27666] = "fixed-version: Fixed from version 5.17rc8" +CVE_STATUS[CVE-2021-47047] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-27672] = "cpe-stable-backport: Backported in 6.1.12" +CVE_STATUS[CVE-2021-47048] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-2785] = "fixed-version: Fixed from version 6.0rc1" +CVE_STATUS[CVE-2021-47049] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-27950] = "fixed-version: Fixed from version 5.17rc5" +CVE_STATUS[CVE-2021-47050] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-28356] = "fixed-version: Fixed from version 5.18rc1" +CVE_STATUS[CVE-2021-47051] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-28388] = "fixed-version: Fixed from version 5.18rc1" +CVE_STATUS[CVE-2021-47052] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-28389] = "fixed-version: Fixed from version 5.18rc1" +CVE_STATUS[CVE-2021-47053] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-28390] = "fixed-version: Fixed from version 5.18rc1" +CVE_STATUS[CVE-2021-47054] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-2873] = "fixed-version: Fixed from version 5.19rc1" +CVE_STATUS[CVE-2021-47055] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-28796] = "fixed-version: Fixed from version 5.18rc1" +CVE_STATUS[CVE-2021-47056] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-28893] = "fixed-version: Fixed from version 5.18rc2" +CVE_STATUS[CVE-2021-47057] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-2905] = "fixed-version: Fixed from version 6.0rc4" +CVE_STATUS[CVE-2021-47058] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-29156] = "fixed-version: Fixed from version 5.17rc6" +CVE_STATUS[CVE-2021-47059] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-2938] = "fixed-version: Fixed from version 5.17rc2" +CVE_STATUS[CVE-2021-47060] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-29581] = "fixed-version: Fixed from version 5.18rc4" +CVE_STATUS[CVE-2021-47061] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-29582] = "fixed-version: Fixed from version 5.18rc2" +CVE_STATUS[CVE-2021-47062] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-2959] = "fixed-version: Fixed from version 5.19rc1" +CVE_STATUS[CVE-2021-47063] = "fixed-version: Fixed from version 5.13rc1" -# CVE-2022-2961 has no known resolution +CVE_STATUS[CVE-2021-47064] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-2964] = "fixed-version: Fixed from version 5.17rc4" +CVE_STATUS[CVE-2021-47065] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-2977] = "fixed-version: Fixed from version 5.18rc1" +CVE_STATUS[CVE-2021-47066] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-2978] = "fixed-version: Fixed from version 6.1rc1" +CVE_STATUS[CVE-2021-47067] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-29900] = "fixed-version: Fixed from version 5.19rc7" +CVE_STATUS[CVE-2021-47068] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-29901] = "fixed-version: Fixed from version 5.19rc7" +CVE_STATUS[CVE-2021-47069] = "fixed-version: Fixed from version 5.13rc3" -CVE_STATUS[CVE-2022-2991] = "fixed-version: Fixed from version 5.15rc1" +CVE_STATUS[CVE-2021-47070] = "fixed-version: Fixed from version 5.13rc3" -CVE_STATUS[CVE-2022-29968] = "fixed-version: Fixed from version 5.18rc5" +CVE_STATUS[CVE-2021-47071] = "fixed-version: Fixed from version 5.13rc3" -CVE_STATUS[CVE-2022-3028] = "fixed-version: Fixed from version 6.0rc3" +CVE_STATUS[CVE-2021-47072] = "fixed-version: Fixed from version 5.13rc3" -CVE_STATUS[CVE-2022-30594] = "fixed-version: Fixed from version 5.18rc1" +CVE_STATUS[CVE-2021-47073] = "fixed-version: Fixed from version 5.13rc3" -CVE_STATUS[CVE-2022-3061] = "fixed-version: Fixed from version 5.18rc5" +CVE_STATUS[CVE-2021-47074] = "fixed-version: Fixed from version 5.13rc3" -CVE_STATUS[CVE-2022-3077] = "fixed-version: Fixed from version 5.19rc1" +CVE_STATUS[CVE-2021-47075] = "fixed-version: Fixed from version 5.13rc3" -CVE_STATUS[CVE-2022-3078] = "fixed-version: Fixed from version 5.18rc1" +CVE_STATUS[CVE-2021-47076] = "fixed-version: Fixed from version 5.13rc3" -CVE_STATUS[CVE-2022-3103] = "fixed-version: Fixed from version 6.0rc3" +CVE_STATUS[CVE-2021-47077] = "fixed-version: Fixed from version 5.13rc3" -CVE_STATUS[CVE-2022-3104] = "fixed-version: Fixed from version 5.19rc1" +CVE_STATUS[CVE-2021-47078] = "fixed-version: Fixed from version 5.13rc3" -CVE_STATUS[CVE-2022-3105] = "fixed-version: Fixed from version 5.16" +CVE_STATUS[CVE-2021-47079] = "fixed-version: Fixed from version 5.13rc3" -CVE_STATUS[CVE-2022-3106] = "fixed-version: Fixed from version 5.16rc6" +CVE_STATUS[CVE-2021-47080] = "fixed-version: Fixed from version 5.13rc3" -CVE_STATUS[CVE-2022-3107] = "fixed-version: Fixed from version 5.17" +CVE_STATUS[CVE-2021-47081] = "fixed-version: Fixed from version 5.13rc3" -CVE_STATUS[CVE-2022-3108] = "fixed-version: Fixed from version 5.17rc1" +CVE_STATUS[CVE-2021-47082] = "fixed-version: Fixed from version 5.16rc7" -CVE_STATUS[CVE-2022-3110] = "fixed-version: Fixed from version 5.19rc1" +CVE_STATUS[CVE-2021-47083] = "fixed-version: Fixed from version 5.16rc7" -CVE_STATUS[CVE-2022-3111] = "fixed-version: Fixed from version 5.18rc1" +CVE_STATUS[CVE-2021-47086] = "fixed-version: Fixed from version 5.16rc7" -CVE_STATUS[CVE-2022-3112] = "fixed-version: Fixed from version 5.18rc1" +CVE_STATUS[CVE-2021-47087] = "fixed-version: Fixed from version 5.16rc7" -CVE_STATUS[CVE-2022-3113] = "fixed-version: Fixed from version 5.18rc1" +CVE_STATUS[CVE-2021-47088] = "fixed-version: Fixed from version 5.16rc7" -CVE_STATUS[CVE-2022-3114] = "fixed-version: Fixed from version 5.19rc1" +CVE_STATUS[CVE-2021-47089] = "fixed-version: Fixed from version 5.16rc7" -CVE_STATUS[CVE-2022-3115] = "fixed-version: Fixed from version 5.19rc1" +CVE_STATUS[CVE-2021-47090] = "fixed-version: Fixed from version 5.16rc7" -CVE_STATUS[CVE-2022-3169] = "fixed-version: Fixed from version 6.1rc1" +CVE_STATUS[CVE-2021-47091] = "fixed-version: Fixed from version 5.16rc7" -CVE_STATUS[CVE-2022-3170] = "fixed-version: Fixed from version 6.0rc4" +CVE_STATUS[CVE-2021-47092] = "fixed-version: Fixed from version 5.16rc7" -CVE_STATUS[CVE-2022-3176] = "fixed-version: Fixed from version 5.17rc1" +CVE_STATUS[CVE-2021-47093] = "fixed-version: Fixed from version 5.16rc7" -CVE_STATUS[CVE-2022-3202] = "fixed-version: Fixed from version 5.18rc1" +CVE_STATUS[CVE-2021-47094] = "fixed-version: Fixed from version 5.16rc7" -CVE_STATUS[CVE-2022-32250] = "fixed-version: Fixed from version 5.19rc1" +CVE_STATUS[CVE-2021-47095] = "fixed-version: Fixed from version 5.16rc7" -CVE_STATUS[CVE-2022-32296] = "fixed-version: Fixed from version 5.18rc6" +CVE_STATUS[CVE-2021-47096] = "fixed-version: Fixed from version 5.16rc7" -# CVE-2022-3238 has no known resolution +CVE_STATUS[CVE-2021-47097] = "fixed-version: Fixed from version 5.16rc7" -CVE_STATUS[CVE-2022-3239] = "fixed-version: Fixed from version 5.18rc1" +CVE_STATUS[CVE-2021-47098] = "fixed-version: Fixed from version 5.16rc7" -CVE_STATUS[CVE-2022-32981] = "fixed-version: Fixed from version 5.19rc2" +CVE_STATUS[CVE-2021-47099] = "fixed-version: Fixed from version 5.16rc7" -CVE_STATUS[CVE-2022-3303] = "fixed-version: Fixed from version 6.0rc5" +CVE_STATUS[CVE-2021-47100] = "fixed-version: Fixed from version 5.16rc7" -CVE_STATUS[CVE-2022-3344] = "fixed-version: Fixed from version 6.1rc7" +CVE_STATUS[CVE-2021-47101] = "fixed-version: Fixed from version 5.16rc7" -CVE_STATUS[CVE-2022-33740] = "fixed-version: Fixed from version 5.19rc6" +CVE_STATUS[CVE-2021-47102] = "fixed-version: Fixed from version 5.16rc7" -CVE_STATUS[CVE-2022-33741] = "fixed-version: Fixed from version 5.19rc6" +CVE_STATUS[CVE-2021-47103] = "fixed-version: Fixed from version 5.16rc7" -CVE_STATUS[CVE-2022-33742] = "fixed-version: Fixed from version 5.19rc6" +CVE_STATUS[CVE-2021-47104] = "fixed-version: Fixed from version 5.16rc7" -CVE_STATUS[CVE-2022-33743] = "fixed-version: Fixed from version 5.19rc6" +CVE_STATUS[CVE-2021-47105] = "fixed-version: Fixed from version 5.16rc7" -CVE_STATUS[CVE-2022-33744] = "fixed-version: Fixed from version 5.19rc6" +CVE_STATUS[CVE-2021-47106] = "fixed-version: Fixed from version 5.16rc7" -CVE_STATUS[CVE-2022-33981] = "fixed-version: Fixed from version 5.18rc5" +CVE_STATUS[CVE-2021-47107] = "fixed-version: Fixed from version 5.16rc7" -CVE_STATUS[CVE-2022-3424] = "cpe-stable-backport: Backported in 6.1.2" +CVE_STATUS[CVE-2021-47108] = "fixed-version: Fixed from version 5.16rc7" -CVE_STATUS[CVE-2022-3435] = "fixed-version: Fixed from version 6.1rc1" +CVE_STATUS[CVE-2021-47109] = "fixed-version: Fixed from version 5.13rc7" -CVE_STATUS[CVE-2022-34494] = "fixed-version: Fixed from version 5.19rc1" +CVE_STATUS[CVE-2021-47110] = "fixed-version: Fixed from version 5.13rc2" -CVE_STATUS[CVE-2022-34495] = "fixed-version: Fixed from version 5.19rc1" +CVE_STATUS[CVE-2021-47111] = "fixed-version: Fixed from version 5.13rc6" -CVE_STATUS[CVE-2022-34918] = "fixed-version: Fixed from version 5.19rc6" +CVE_STATUS[CVE-2021-47112] = "fixed-version: Fixed from version 5.13rc2" -CVE_STATUS[CVE-2022-3521] = "fixed-version: Fixed from version 6.1rc1" +CVE_STATUS[CVE-2021-47113] = "fixed-version: Fixed from version 5.13rc5" -CVE_STATUS[CVE-2022-3522] = "fixed-version: Fixed from version 6.1rc1" +CVE_STATUS[CVE-2021-47114] = "fixed-version: Fixed from version 5.13rc5" -CVE_STATUS[CVE-2022-3523] = "fixed-version: Fixed from version 6.1rc1" +CVE_STATUS[CVE-2021-47116] = "fixed-version: Fixed from version 5.13rc5" -CVE_STATUS[CVE-2022-3524] = "fixed-version: Fixed from version 6.1rc1" +CVE_STATUS[CVE-2021-47117] = "fixed-version: Fixed from version 5.13rc5" -CVE_STATUS[CVE-2022-3526] = "fixed-version: Fixed from version 5.18rc3" +CVE_STATUS[CVE-2021-47118] = "fixed-version: Fixed from version 5.13rc5" -CVE_STATUS[CVE-2022-3531] = "cpe-stable-backport: Backported in 6.1.2" +CVE_STATUS[CVE-2021-47119] = "fixed-version: Fixed from version 5.13rc5" -CVE_STATUS[CVE-2022-3532] = "cpe-stable-backport: Backported in 6.1.2" +CVE_STATUS[CVE-2021-47120] = "fixed-version: Fixed from version 5.13rc5" -# CVE-2022-3533 has no known resolution +CVE_STATUS[CVE-2021-47121] = "fixed-version: Fixed from version 5.13rc5" -CVE_STATUS[CVE-2022-3534] = "cpe-stable-backport: Backported in 6.1.2" +CVE_STATUS[CVE-2021-47122] = "fixed-version: Fixed from version 5.13rc5" -CVE_STATUS[CVE-2022-3535] = "fixed-version: Fixed from version 6.1rc1" +CVE_STATUS[CVE-2021-47123] = "fixed-version: Fixed from version 5.13rc2" -CVE_STATUS[CVE-2022-3541] = "fixed-version: Fixed from version 6.1rc1" +CVE_STATUS[CVE-2021-47124] = "fixed-version: Fixed from version 5.13rc2" -CVE_STATUS[CVE-2022-3542] = "fixed-version: Fixed from version 6.1rc1" +CVE_STATUS[CVE-2021-47125] = "fixed-version: Fixed from version 5.13rc5" -CVE_STATUS[CVE-2022-3543] = "fixed-version: Fixed from version 6.1rc1" +CVE_STATUS[CVE-2021-47126] = "fixed-version: Fixed from version 5.13rc5" -# CVE-2022-3544 has no known resolution +CVE_STATUS[CVE-2021-47127] = "fixed-version: Fixed from version 5.13rc5" -CVE_STATUS[CVE-2022-3545] = "fixed-version: Fixed from version 6.0rc1" +CVE_STATUS[CVE-2021-47128] = "fixed-version: Fixed from version 5.13rc5" -CVE_STATUS[CVE-2022-3564] = "fixed-version: Fixed from version 6.1rc4" +CVE_STATUS[CVE-2021-47129] = "fixed-version: Fixed from version 5.13rc5" -CVE_STATUS[CVE-2022-3565] = "fixed-version: Fixed from version 6.1rc1" +CVE_STATUS[CVE-2021-47130] = "fixed-version: Fixed from version 5.13rc5" -CVE_STATUS[CVE-2022-3566] = "fixed-version: Fixed from version 6.1rc1" +CVE_STATUS[CVE-2021-47131] = "fixed-version: Fixed from version 5.13rc5" -CVE_STATUS[CVE-2022-3567] = "fixed-version: Fixed from version 6.1rc1" +CVE_STATUS[CVE-2021-47132] = "fixed-version: Fixed from version 5.13rc5" -CVE_STATUS[CVE-2022-3577] = "fixed-version: Fixed from version 5.19rc1" +CVE_STATUS[CVE-2021-47133] = "fixed-version: Fixed from version 5.13rc5" -CVE_STATUS[CVE-2022-3586] = "fixed-version: Fixed from version 6.0rc5" +CVE_STATUS[CVE-2021-47134] = "fixed-version: Fixed from version 5.13rc5" -CVE_STATUS[CVE-2022-3594] = "fixed-version: Fixed from version 6.1rc1" +CVE_STATUS[CVE-2021-47135] = "fixed-version: Fixed from version 5.13rc5" -CVE_STATUS[CVE-2022-3595] = "fixed-version: Fixed from version 6.1rc1" +CVE_STATUS[CVE-2021-47136] = "fixed-version: Fixed from version 5.13rc4" -# CVE-2022-3606 has no known resolution +CVE_STATUS[CVE-2021-47137] = "fixed-version: Fixed from version 5.13rc4" -CVE_STATUS[CVE-2022-36123] = "fixed-version: Fixed from version 5.19rc6" +CVE_STATUS[CVE-2021-47138] = "fixed-version: Fixed from version 5.13rc4" -CVE_STATUS[CVE-2022-3619] = "fixed-version: Fixed from version 6.1rc4" +CVE_STATUS[CVE-2021-47139] = "fixed-version: Fixed from version 5.13rc4" -CVE_STATUS[CVE-2022-3621] = "fixed-version: Fixed from version 6.1rc1" +CVE_STATUS[CVE-2021-47140] = "fixed-version: Fixed from version 5.13rc4" -CVE_STATUS[CVE-2022-3623] = "fixed-version: Fixed from version 6.1rc1" +CVE_STATUS[CVE-2021-47141] = "fixed-version: Fixed from version 5.13rc4" -CVE_STATUS[CVE-2022-3624] = "fixed-version: Fixed from version 6.0rc1" +CVE_STATUS[CVE-2021-47142] = "fixed-version: Fixed from version 5.13rc3" -CVE_STATUS[CVE-2022-3625] = "fixed-version: Fixed from version 6.0rc1" +CVE_STATUS[CVE-2021-47143] = "fixed-version: Fixed from version 5.13rc4" -CVE_STATUS[CVE-2022-3628] = "fixed-version: Fixed from version 6.1rc5" +CVE_STATUS[CVE-2021-47144] = "fixed-version: Fixed from version 5.13rc3" -CVE_STATUS[CVE-2022-36280] = "cpe-stable-backport: Backported in 6.1.4" +CVE_STATUS[CVE-2021-47145] = "fixed-version: Fixed from version 5.13rc3" -CVE_STATUS[CVE-2022-3629] = "fixed-version: Fixed from version 6.0rc1" +CVE_STATUS[CVE-2021-47146] = "fixed-version: Fixed from version 5.13rc4" -CVE_STATUS[CVE-2022-3630] = "fixed-version: Fixed from version 6.0rc1" +CVE_STATUS[CVE-2021-47147] = "fixed-version: Fixed from version 5.13rc4" -CVE_STATUS[CVE-2022-3633] = "fixed-version: Fixed from version 6.0rc1" +CVE_STATUS[CVE-2021-47148] = "fixed-version: Fixed from version 5.13rc4" -CVE_STATUS[CVE-2022-3635] = "fixed-version: Fixed from version 6.0rc1" +CVE_STATUS[CVE-2021-47149] = "fixed-version: Fixed from version 5.13rc3" -CVE_STATUS[CVE-2022-3636] = "fixed-version: Fixed from version 5.19rc1" +CVE_STATUS[CVE-2021-47150] = "fixed-version: Fixed from version 5.13rc4" + +CVE_STATUS[CVE-2021-47151] = "fixed-version: Fixed from version 5.13rc4" + +CVE_STATUS[CVE-2021-47152] = "fixed-version: Fixed from version 5.13rc4" + +CVE_STATUS[CVE-2021-47153] = "fixed-version: Fixed from version 5.13rc4" + +CVE_STATUS[CVE-2021-47158] = "fixed-version: Fixed from version 5.13rc4" + +CVE_STATUS[CVE-2021-47159] = "fixed-version: Fixed from version 5.13rc4" + +CVE_STATUS[CVE-2021-47160] = "fixed-version: Fixed from version 5.13rc4" + +CVE_STATUS[CVE-2021-47161] = "fixed-version: Fixed from version 5.13rc4" + +CVE_STATUS[CVE-2021-47162] = "fixed-version: Fixed from version 5.13rc4" + +CVE_STATUS[CVE-2021-47163] = "fixed-version: Fixed from version 5.13rc4" + +CVE_STATUS[CVE-2021-47164] = "fixed-version: Fixed from version 5.13rc4" + +CVE_STATUS[CVE-2021-47165] = "fixed-version: Fixed from version 5.13rc4" + +CVE_STATUS[CVE-2021-47166] = "fixed-version: Fixed from version 5.13rc4" + +CVE_STATUS[CVE-2021-47167] = "fixed-version: Fixed from version 5.13rc4" + +CVE_STATUS[CVE-2021-47168] = "fixed-version: Fixed from version 5.13rc4" + +CVE_STATUS[CVE-2021-47169] = "fixed-version: Fixed from version 5.13rc4" + +CVE_STATUS[CVE-2021-47170] = "fixed-version: Fixed from version 5.13rc4" + +CVE_STATUS[CVE-2021-47171] = "fixed-version: Fixed from version 5.13rc4" + +CVE_STATUS[CVE-2021-47172] = "fixed-version: Fixed from version 5.13rc4" + +CVE_STATUS[CVE-2021-47173] = "fixed-version: Fixed from version 5.13rc4" + +CVE_STATUS[CVE-2021-47174] = "fixed-version: Fixed from version 5.13rc4" + +CVE_STATUS[CVE-2021-47175] = "fixed-version: Fixed from version 5.13rc4" + +CVE_STATUS[CVE-2021-47176] = "fixed-version: Fixed from version 5.13rc4" + +CVE_STATUS[CVE-2021-47177] = "fixed-version: Fixed from version 5.13rc4" + +CVE_STATUS[CVE-2021-47178] = "fixed-version: Fixed from version 5.13rc4" + +CVE_STATUS[CVE-2021-47179] = "fixed-version: Fixed from version 5.13rc4" + +CVE_STATUS[CVE-2021-47180] = "fixed-version: Fixed from version 5.13rc4" + +CVE_STATUS[CVE-2022-0001] = "fixed-version: Fixed from version 5.17rc8" + +CVE_STATUS[CVE-2022-0002] = "fixed-version: Fixed from version 5.17rc8" + +CVE_STATUS[CVE-2022-0168] = "fixed-version: Fixed from version 5.18rc1" + +CVE_STATUS[CVE-2022-0171] = "fixed-version: Fixed from version 5.18rc4" + +CVE_STATUS[CVE-2022-0185] = "fixed-version: Fixed from version 5.17rc1" + +CVE_STATUS[CVE-2022-0264] = "fixed-version: Fixed from version 5.16rc6" + +CVE_STATUS[CVE-2022-0286] = "fixed-version: Fixed from version 5.14rc2" + +CVE_STATUS[CVE-2022-0322] = "fixed-version: Fixed from version 5.15rc6" + +CVE_STATUS[CVE-2022-0330] = "fixed-version: Fixed from version 5.17rc2" + +CVE_STATUS[CVE-2022-0382] = "fixed-version: Fixed from version 5.16" + +# CVE-2022-0400 has no known resolution + +CVE_STATUS[CVE-2022-0433] = "fixed-version: Fixed from version 5.17rc1" + +CVE_STATUS[CVE-2022-0435] = "fixed-version: Fixed from version 5.17rc4" + +CVE_STATUS[CVE-2022-0480] = "fixed-version: Fixed from version 5.15rc1" + +CVE_STATUS[CVE-2022-0487] = "fixed-version: Fixed from version 5.17rc4" + +CVE_STATUS[CVE-2022-0492] = "fixed-version: Fixed from version 5.17rc3" + +CVE_STATUS[CVE-2022-0494] = "fixed-version: Fixed from version 5.17rc5" + +CVE_STATUS[CVE-2022-0500] = "fixed-version: Fixed from version 5.17rc1" + +CVE_STATUS[CVE-2022-0516] = "fixed-version: Fixed from version 5.17rc4" + +CVE_STATUS[CVE-2022-0617] = "fixed-version: Fixed from version 5.17rc2" + +CVE_STATUS[CVE-2022-0644] = "fixed-version: Fixed from version 5.15rc7" + +CVE_STATUS[CVE-2022-0646] = "fixed-version: Fixed from version 5.17rc5" + +CVE_STATUS[CVE-2022-0742] = "fixed-version: Fixed from version 5.17rc7" + +CVE_STATUS[CVE-2022-0812] = "fixed-version: Fixed from version 5.8rc6" + +CVE_STATUS[CVE-2022-0847] = "fixed-version: Fixed from version 5.17rc6" + +CVE_STATUS[CVE-2022-0850] = "fixed-version: Fixed from version 5.14rc1" + +CVE_STATUS[CVE-2022-0854] = "fixed-version: Fixed from version 5.17rc8" + +CVE_STATUS[CVE-2022-0995] = "fixed-version: Fixed from version 5.17rc8" + +CVE_STATUS[CVE-2022-0998] = "fixed-version: Fixed from version 5.17rc1" + +CVE_STATUS[CVE-2022-1011] = "fixed-version: Fixed from version 5.17rc8" + +CVE_STATUS[CVE-2022-1012] = "fixed-version: Fixed from version 5.18rc6" + +CVE_STATUS[CVE-2022-1015] = "fixed-version: Fixed from version 5.18rc1" + +CVE_STATUS[CVE-2022-1016] = "fixed-version: Fixed from version 5.18rc1" + +CVE_STATUS[CVE-2022-1043] = "fixed-version: Fixed from version 5.14rc7" + +CVE_STATUS[CVE-2022-1048] = "fixed-version: Fixed from version 5.18rc1" + +CVE_STATUS[CVE-2022-1055] = "fixed-version: Fixed from version 5.17rc3" + +# CVE-2022-1116 has no known resolution + +CVE_STATUS[CVE-2022-1158] = "fixed-version: Fixed from version 5.18rc1" + +CVE_STATUS[CVE-2022-1184] = "fixed-version: Fixed from version 5.19rc1" + +CVE_STATUS[CVE-2022-1195] = "fixed-version: Fixed from version 5.16rc7" + +CVE_STATUS[CVE-2022-1198] = "fixed-version: Fixed from version 5.17rc6" + +CVE_STATUS[CVE-2022-1199] = "fixed-version: Fixed from version 5.17rc8" + +CVE_STATUS[CVE-2022-1204] = "fixed-version: Fixed from version 5.18rc1" + +CVE_STATUS[CVE-2022-1205] = "fixed-version: Fixed from version 5.18rc1" + +# CVE-2022-1247 has no known resolution + +CVE_STATUS[CVE-2022-1263] = "fixed-version: Fixed from version 5.18rc3" + +CVE_STATUS[CVE-2022-1280] = "fixed-version: Fixed from version 5.15rc1" + +CVE_STATUS[CVE-2022-1353] = "fixed-version: Fixed from version 5.17" + +CVE_STATUS[CVE-2022-1419] = "fixed-version: Fixed from version 5.6rc2" + +CVE_STATUS[CVE-2022-1462] = "fixed-version: Fixed from version 5.19rc7" + +CVE_STATUS[CVE-2022-1508] = "fixed-version: Fixed from version 5.15rc1" + +CVE_STATUS[CVE-2022-1516] = "fixed-version: Fixed from version 5.18rc1" + +CVE_STATUS[CVE-2022-1651] = "fixed-version: Fixed from version 5.18rc1" + +CVE_STATUS[CVE-2022-1652] = "fixed-version: Fixed from version 5.18rc6" + +CVE_STATUS[CVE-2022-1671] = "fixed-version: Fixed from version 5.18rc1" + +CVE_STATUS[CVE-2022-1678] = "fixed-version: Fixed from version 4.20rc1" + +CVE_STATUS[CVE-2022-1679] = "fixed-version: Fixed from version 6.0rc1" + +CVE_STATUS[CVE-2022-1729] = "fixed-version: Fixed from version 5.18" + +CVE_STATUS[CVE-2022-1734] = "fixed-version: Fixed from version 5.18rc6" + +CVE_STATUS[CVE-2022-1786] = "fixed-version: Fixed from version 5.12rc1" + +CVE_STATUS[CVE-2022-1789] = "fixed-version: Fixed from version 5.18" + +CVE_STATUS[CVE-2022-1836] = "fixed-version: Fixed from version 5.18rc5" + +CVE_STATUS[CVE-2022-1852] = "fixed-version: Fixed from version 5.19rc1" + +CVE_STATUS[CVE-2022-1882] = "fixed-version: Fixed from version 5.19rc8" + +CVE_STATUS[CVE-2022-1943] = "fixed-version: Fixed from version 5.18rc7" + +CVE_STATUS[CVE-2022-1966] = "fixed-version: Fixed from version 5.19rc1" + +CVE_STATUS[CVE-2022-1972] = "fixed-version: Fixed from version 5.19rc1" + +CVE_STATUS[CVE-2022-1973] = "fixed-version: Fixed from version 5.19rc1" + +CVE_STATUS[CVE-2022-1974] = "fixed-version: Fixed from version 5.18rc6" + +CVE_STATUS[CVE-2022-1975] = "fixed-version: Fixed from version 5.18rc6" + +CVE_STATUS[CVE-2022-1976] = "fixed-version: Fixed from version 5.19rc1" + +CVE_STATUS[CVE-2022-1998] = "fixed-version: Fixed from version 5.17rc3" + +CVE_STATUS[CVE-2022-20008] = "fixed-version: Fixed from version 5.17rc5" + +CVE_STATUS[CVE-2022-20132] = "fixed-version: Fixed from version 5.16rc5" + +CVE_STATUS[CVE-2022-20141] = "fixed-version: Fixed from version 5.15rc1" + +CVE_STATUS[CVE-2022-20148] = "fixed-version: Fixed from version 5.16rc1" + +CVE_STATUS[CVE-2022-20153] = "fixed-version: Fixed from version 5.13rc1" + +CVE_STATUS[CVE-2022-20154] = "fixed-version: Fixed from version 5.16rc8" + +CVE_STATUS[CVE-2022-20158] = "fixed-version: Fixed from version 5.17" + +CVE_STATUS[CVE-2022-20166] = "fixed-version: Fixed from version 5.10rc1" + +CVE_STATUS[CVE-2022-20368] = "fixed-version: Fixed from version 5.17" + +CVE_STATUS[CVE-2022-20369] = "fixed-version: Fixed from version 5.18rc1" + +CVE_STATUS[CVE-2022-20409] = "fixed-version: Fixed from version 5.12rc1" + +CVE_STATUS[CVE-2022-20421] = "fixed-version: Fixed from version 6.0rc4" + +CVE_STATUS[CVE-2022-20422] = "fixed-version: Fixed from version 6.0rc1" + +CVE_STATUS[CVE-2022-20423] = "fixed-version: Fixed from version 5.17" + +CVE_STATUS[CVE-2022-20424] = "fixed-version: Fixed from version 5.12rc1" + +CVE_STATUS[CVE-2022-20565] = "fixed-version: Fixed from version 5.9rc4" + +CVE_STATUS[CVE-2022-20566] = "fixed-version: Fixed from version 5.19" + +CVE_STATUS[CVE-2022-20567] = "fixed-version: Fixed from version 4.16rc5" + +CVE_STATUS[CVE-2022-20568] = "fixed-version: Fixed from version 5.12rc1" + +CVE_STATUS[CVE-2022-20572] = "fixed-version: Fixed from version 5.19rc1" + +CVE_STATUS[CVE-2022-2078] = "fixed-version: Fixed from version 5.19rc1" + +CVE_STATUS[CVE-2022-21123] = "fixed-version: Fixed from version 5.19rc3" + +CVE_STATUS[CVE-2022-21125] = "fixed-version: Fixed from version 5.19rc3" + +CVE_STATUS[CVE-2022-21166] = "fixed-version: Fixed from version 5.19rc3" + +CVE_STATUS[CVE-2022-21385] = "fixed-version: Fixed from version 4.20" + +CVE_STATUS[CVE-2022-21499] = "fixed-version: Fixed from version 5.19rc1" + +CVE_STATUS[CVE-2022-21505] = "fixed-version: Fixed from version 5.19rc8" + +CVE_STATUS[CVE-2022-2153] = "fixed-version: Fixed from version 5.18rc1" + +CVE_STATUS[CVE-2022-2196] = "cpe-stable-backport: Backported in 6.1.14" + +# CVE-2022-2209 has no known resolution + +CVE_STATUS[CVE-2022-22942] = "fixed-version: Fixed from version 5.17rc2" + +CVE_STATUS[CVE-2022-23036] = "fixed-version: Fixed from version 5.17rc8" + +CVE_STATUS[CVE-2022-23037] = "fixed-version: Fixed from version 5.17rc8" + +CVE_STATUS[CVE-2022-23038] = "fixed-version: Fixed from version 5.17rc8" + +CVE_STATUS[CVE-2022-23039] = "fixed-version: Fixed from version 5.17rc8" + +CVE_STATUS[CVE-2022-23040] = "fixed-version: Fixed from version 5.17rc8" + +CVE_STATUS[CVE-2022-23041] = "fixed-version: Fixed from version 5.17rc8" + +CVE_STATUS[CVE-2022-23042] = "fixed-version: Fixed from version 5.17rc8" + +CVE_STATUS[CVE-2022-2308] = "fixed-version: Fixed from version 6.0" + +CVE_STATUS[CVE-2022-2318] = "fixed-version: Fixed from version 5.19rc5" + +CVE_STATUS[CVE-2022-23222] = "fixed-version: Fixed from version 5.17rc1" + +CVE_STATUS[CVE-2022-2327] = "fixed-version: Fixed from version 5.12rc1" + +CVE_STATUS[CVE-2022-2380] = "fixed-version: Fixed from version 5.18rc1" + +CVE_STATUS[CVE-2022-23816] = "fixed-version: Fixed from version 5.19rc7" + +# CVE-2022-23825 has no known resolution + +CVE_STATUS[CVE-2022-23960] = "fixed-version: Fixed from version 5.17rc8" + +CVE_STATUS[CVE-2022-24122] = "fixed-version: Fixed from version 5.17rc2" + +CVE_STATUS[CVE-2022-24448] = "fixed-version: Fixed from version 5.17rc2" + +CVE_STATUS[CVE-2022-24958] = "fixed-version: Fixed from version 5.17rc1" + +CVE_STATUS[CVE-2022-24959] = "fixed-version: Fixed from version 5.17rc2" + +CVE_STATUS[CVE-2022-2503] = "fixed-version: Fixed from version 5.19rc1" + +CVE_STATUS[CVE-2022-25258] = "fixed-version: Fixed from version 5.17rc4" + +# CVE-2022-25265 has no known resolution + +CVE_STATUS[CVE-2022-25375] = "fixed-version: Fixed from version 5.17rc4" + +CVE_STATUS[CVE-2022-25636] = "fixed-version: Fixed from version 5.17rc6" + +CVE_STATUS[CVE-2022-2585] = "fixed-version: Fixed from version 6.0rc1" + +CVE_STATUS[CVE-2022-2586] = "fixed-version: Fixed from version 6.0rc1" + +CVE_STATUS[CVE-2022-2588] = "fixed-version: Fixed from version 6.0rc1" + +CVE_STATUS[CVE-2022-2590] = "fixed-version: Fixed from version 6.0rc3" + +CVE_STATUS[CVE-2022-2602] = "fixed-version: Fixed from version 6.1rc1" + +CVE_STATUS[CVE-2022-26365] = "fixed-version: Fixed from version 5.19rc6" + +CVE_STATUS[CVE-2022-26373] = "fixed-version: Fixed from version 6.0rc1" + +CVE_STATUS[CVE-2022-2639] = "fixed-version: Fixed from version 5.18rc4" + +CVE_STATUS[CVE-2022-26490] = "fixed-version: Fixed from version 5.17rc1" + +CVE_STATUS[CVE-2022-2663] = "fixed-version: Fixed from version 6.0rc5" + +# CVE-2022-26878 has no known resolution + +CVE_STATUS[CVE-2022-26966] = "fixed-version: Fixed from version 5.17rc6" + +CVE_STATUS[CVE-2022-27223] = "fixed-version: Fixed from version 5.17rc6" + +CVE_STATUS[CVE-2022-27666] = "fixed-version: Fixed from version 5.17rc8" + +CVE_STATUS[CVE-2022-27672] = "cpe-stable-backport: Backported in 6.1.12" + +CVE_STATUS[CVE-2022-2785] = "fixed-version: Fixed from version 6.0rc1" + +CVE_STATUS[CVE-2022-27950] = "fixed-version: Fixed from version 5.17rc5" + +CVE_STATUS[CVE-2022-28356] = "fixed-version: Fixed from version 5.18rc1" + +CVE_STATUS[CVE-2022-28388] = "fixed-version: Fixed from version 5.18rc1" + +CVE_STATUS[CVE-2022-28389] = "fixed-version: Fixed from version 5.18rc1" + +CVE_STATUS[CVE-2022-28390] = "fixed-version: Fixed from version 5.18rc1" + +CVE_STATUS[CVE-2022-2873] = "fixed-version: Fixed from version 5.19rc1" + +CVE_STATUS[CVE-2022-28796] = "fixed-version: Fixed from version 5.18rc1" + +CVE_STATUS[CVE-2022-28893] = "fixed-version: Fixed from version 5.18rc2" + +CVE_STATUS[CVE-2022-2905] = "fixed-version: Fixed from version 6.0rc4" + +CVE_STATUS[CVE-2022-29156] = "fixed-version: Fixed from version 5.17rc6" + +CVE_STATUS[CVE-2022-2938] = "fixed-version: Fixed from version 5.17rc2" + +CVE_STATUS[CVE-2022-29581] = "fixed-version: Fixed from version 5.18rc4" + +CVE_STATUS[CVE-2022-29582] = "fixed-version: Fixed from version 5.18rc2" + +CVE_STATUS[CVE-2022-2959] = "fixed-version: Fixed from version 5.19rc1" + +# CVE-2022-2961 has no known resolution + +CVE_STATUS[CVE-2022-2964] = "fixed-version: Fixed from version 5.17rc4" + +CVE_STATUS[CVE-2022-2977] = "fixed-version: Fixed from version 5.18rc1" + +CVE_STATUS[CVE-2022-2978] = "fixed-version: Fixed from version 6.1rc1" + +CVE_STATUS[CVE-2022-29900] = "fixed-version: Fixed from version 5.19rc7" + +CVE_STATUS[CVE-2022-29901] = "fixed-version: Fixed from version 5.19rc7" + +CVE_STATUS[CVE-2022-2991] = "fixed-version: Fixed from version 5.15rc1" + +CVE_STATUS[CVE-2022-29968] = "fixed-version: Fixed from version 5.18rc5" + +CVE_STATUS[CVE-2022-3028] = "fixed-version: Fixed from version 6.0rc3" + +CVE_STATUS[CVE-2022-30594] = "fixed-version: Fixed from version 5.18rc1" + +CVE_STATUS[CVE-2022-3061] = "fixed-version: Fixed from version 5.18rc5" + +CVE_STATUS[CVE-2022-3077] = "fixed-version: Fixed from version 5.19rc1" + +CVE_STATUS[CVE-2022-3078] = "fixed-version: Fixed from version 5.18rc1" + +CVE_STATUS[CVE-2022-3103] = "fixed-version: Fixed from version 6.0rc3" + +CVE_STATUS[CVE-2022-3104] = "fixed-version: Fixed from version 5.19rc1" + +CVE_STATUS[CVE-2022-3105] = "fixed-version: Fixed from version 5.16" + +CVE_STATUS[CVE-2022-3106] = "fixed-version: Fixed from version 5.16rc6" + +CVE_STATUS[CVE-2022-3107] = "fixed-version: Fixed from version 5.17" + +CVE_STATUS[CVE-2022-3108] = "fixed-version: Fixed from version 5.17rc1" + +CVE_STATUS[CVE-2022-3110] = "fixed-version: Fixed from version 5.19rc1" + +CVE_STATUS[CVE-2022-3111] = "fixed-version: Fixed from version 5.18rc1" + +CVE_STATUS[CVE-2022-3112] = "fixed-version: Fixed from version 5.18rc1" + +CVE_STATUS[CVE-2022-3113] = "fixed-version: Fixed from version 5.18rc1" + +CVE_STATUS[CVE-2022-3114] = "fixed-version: Fixed from version 5.19rc1" + +CVE_STATUS[CVE-2022-3115] = "fixed-version: Fixed from version 5.19rc1" + +CVE_STATUS[CVE-2022-3169] = "fixed-version: Fixed from version 6.1rc1" + +CVE_STATUS[CVE-2022-3170] = "fixed-version: Fixed from version 6.0rc4" + +CVE_STATUS[CVE-2022-3176] = "fixed-version: Fixed from version 5.17rc1" + +CVE_STATUS[CVE-2022-3202] = "fixed-version: Fixed from version 5.18rc1" + +CVE_STATUS[CVE-2022-32250] = "fixed-version: Fixed from version 5.19rc1" + +CVE_STATUS[CVE-2022-32296] = "fixed-version: Fixed from version 5.18rc6" + +# CVE-2022-3238 has no known resolution + +CVE_STATUS[CVE-2022-3239] = "fixed-version: Fixed from version 5.18rc1" + +CVE_STATUS[CVE-2022-32981] = "fixed-version: Fixed from version 5.19rc2" + +CVE_STATUS[CVE-2022-3303] = "fixed-version: Fixed from version 6.0rc5" + +CVE_STATUS[CVE-2022-3344] = "fixed-version: Fixed from version 6.1rc7" + +CVE_STATUS[CVE-2022-33740] = "fixed-version: Fixed from version 5.19rc6" + +CVE_STATUS[CVE-2022-33741] = "fixed-version: Fixed from version 5.19rc6" + +CVE_STATUS[CVE-2022-33742] = "fixed-version: Fixed from version 5.19rc6" + +CVE_STATUS[CVE-2022-33743] = "fixed-version: Fixed from version 5.19rc6" + +CVE_STATUS[CVE-2022-33744] = "fixed-version: Fixed from version 5.19rc6" + +CVE_STATUS[CVE-2022-33981] = "fixed-version: Fixed from version 5.18rc5" + +CVE_STATUS[CVE-2022-3424] = "cpe-stable-backport: Backported in 6.1.2" + +CVE_STATUS[CVE-2022-3435] = "fixed-version: Fixed from version 6.1rc1" + +CVE_STATUS[CVE-2022-34494] = "fixed-version: Fixed from version 5.19rc1" + +CVE_STATUS[CVE-2022-34495] = "fixed-version: Fixed from version 5.19rc1" + +CVE_STATUS[CVE-2022-34918] = "fixed-version: Fixed from version 5.19rc6" + +CVE_STATUS[CVE-2022-3521] = "fixed-version: Fixed from version 6.1rc1" + +CVE_STATUS[CVE-2022-3522] = "fixed-version: Fixed from version 6.1rc1" + +CVE_STATUS[CVE-2022-3523] = "fixed-version: Fixed from version 6.1rc1" + +CVE_STATUS[CVE-2022-3524] = "fixed-version: Fixed from version 6.1rc1" + +CVE_STATUS[CVE-2022-3526] = "fixed-version: Fixed from version 5.18rc3" + +CVE_STATUS[CVE-2022-3531] = "cpe-stable-backport: Backported in 6.1.2" + +CVE_STATUS[CVE-2022-3532] = "cpe-stable-backport: Backported in 6.1.2" + +# CVE-2022-3533 has no known resolution + +CVE_STATUS[CVE-2022-3534] = "cpe-stable-backport: Backported in 6.1.2" + +CVE_STATUS[CVE-2022-3535] = "fixed-version: Fixed from version 6.1rc1" + +CVE_STATUS[CVE-2022-3541] = "fixed-version: Fixed from version 6.1rc1" + +CVE_STATUS[CVE-2022-3542] = "fixed-version: Fixed from version 6.1rc1" + +CVE_STATUS[CVE-2022-3543] = "fixed-version: Fixed from version 6.1rc1" + +# CVE-2022-3544 has no known resolution + +CVE_STATUS[CVE-2022-3545] = "fixed-version: Fixed from version 6.0rc1" + +CVE_STATUS[CVE-2022-3564] = "fixed-version: Fixed from version 6.1rc4" + +CVE_STATUS[CVE-2022-3565] = "fixed-version: Fixed from version 6.1rc1" + +CVE_STATUS[CVE-2022-3566] = "fixed-version: Fixed from version 6.1rc1" + +CVE_STATUS[CVE-2022-3567] = "fixed-version: Fixed from version 6.1rc1" + +CVE_STATUS[CVE-2022-3577] = "fixed-version: Fixed from version 5.19rc1" + +CVE_STATUS[CVE-2022-3586] = "fixed-version: Fixed from version 6.0rc5" + +CVE_STATUS[CVE-2022-3594] = "fixed-version: Fixed from version 6.1rc1" + +CVE_STATUS[CVE-2022-3595] = "fixed-version: Fixed from version 6.1rc1" + +# CVE-2022-3606 has no known resolution + +CVE_STATUS[CVE-2022-36123] = "fixed-version: Fixed from version 5.19rc6" + +CVE_STATUS[CVE-2022-3619] = "fixed-version: Fixed from version 6.1rc4" + +CVE_STATUS[CVE-2022-3621] = "fixed-version: Fixed from version 6.1rc1" + +CVE_STATUS[CVE-2022-3623] = "fixed-version: Fixed from version 6.1rc1" + +CVE_STATUS[CVE-2022-3624] = "fixed-version: Fixed from version 6.0rc1" + +CVE_STATUS[CVE-2022-3625] = "fixed-version: Fixed from version 6.0rc1" + +CVE_STATUS[CVE-2022-3628] = "fixed-version: Fixed from version 6.1rc5" + +CVE_STATUS[CVE-2022-36280] = "cpe-stable-backport: Backported in 6.1.4" + +CVE_STATUS[CVE-2022-3629] = "fixed-version: Fixed from version 6.0rc1" + +CVE_STATUS[CVE-2022-3630] = "fixed-version: Fixed from version 6.0rc1" + +CVE_STATUS[CVE-2022-3633] = "fixed-version: Fixed from version 6.0rc1" + +CVE_STATUS[CVE-2022-3635] = "fixed-version: Fixed from version 6.0rc1" + +CVE_STATUS[CVE-2022-3636] = "fixed-version: Fixed from version 5.19rc1" CVE_STATUS[CVE-2022-3640] = "fixed-version: Fixed from version 6.1rc4" -CVE_STATUS[CVE-2022-36402] = "cpe-stable-backport: Backported in 6.1.50" +CVE_STATUS[CVE-2022-36402] = "cpe-stable-backport: Backported in 6.1.50" + +# CVE-2022-3642 has no known resolution + +CVE_STATUS[CVE-2022-3643] = "fixed-version: Fixed from version 6.1" + +CVE_STATUS[CVE-2022-3646] = "fixed-version: Fixed from version 6.1rc1" + +CVE_STATUS[CVE-2022-3649] = "fixed-version: Fixed from version 6.1rc1" + +CVE_STATUS[CVE-2022-36879] = "fixed-version: Fixed from version 5.19rc8" + +CVE_STATUS[CVE-2022-36946] = "fixed-version: Fixed from version 5.19" + +CVE_STATUS[CVE-2022-3707] = "cpe-stable-backport: Backported in 6.1.5" + +# CVE-2022-38096 has no known resolution + +CVE_STATUS[CVE-2022-38457] = "cpe-stable-backport: Backported in 6.1.7" + +CVE_STATUS[CVE-2022-3903] = "fixed-version: Fixed from version 6.1rc2" + +CVE_STATUS[CVE-2022-3910] = "fixed-version: Fixed from version 6.0rc6" + +CVE_STATUS[CVE-2022-39188] = "fixed-version: Fixed from version 5.19rc8" + +CVE_STATUS[CVE-2022-39189] = "fixed-version: Fixed from version 5.19rc2" + +CVE_STATUS[CVE-2022-39190] = "fixed-version: Fixed from version 6.0rc3" + +CVE_STATUS[CVE-2022-3977] = "fixed-version: Fixed from version 6.1rc1" + +CVE_STATUS[CVE-2022-39842] = "fixed-version: Fixed from version 5.19rc4" + +CVE_STATUS[CVE-2022-40133] = "cpe-stable-backport: Backported in 6.1.7" + +CVE_STATUS[CVE-2022-40307] = "fixed-version: Fixed from version 6.0rc5" + +CVE_STATUS[CVE-2022-40476] = "fixed-version: Fixed from version 5.19rc4" + +CVE_STATUS[CVE-2022-40768] = "fixed-version: Fixed from version 6.1rc1" + +CVE_STATUS[CVE-2022-4095] = "fixed-version: Fixed from version 6.0rc4" + +CVE_STATUS[CVE-2022-40982] = "cpe-stable-backport: Backported in 6.1.44" + +CVE_STATUS[CVE-2022-41218] = "cpe-stable-backport: Backported in 6.1.4" + +CVE_STATUS[CVE-2022-41222] = "fixed-version: Fixed from version 5.14rc1" + +CVE_STATUS[CVE-2022-4127] = "fixed-version: Fixed from version 5.19rc6" + +CVE_STATUS[CVE-2022-4128] = "fixed-version: Fixed from version 5.19rc7" + +CVE_STATUS[CVE-2022-4129] = "fixed-version: Fixed from version 6.1rc6" + +CVE_STATUS[CVE-2022-4139] = "fixed-version: Fixed from version 6.1rc8" + +CVE_STATUS[CVE-2022-41674] = "fixed-version: Fixed from version 6.1rc1" + +# CVE-2022-41848 has no known resolution + +CVE_STATUS[CVE-2022-41849] = "fixed-version: Fixed from version 6.1rc1" + +CVE_STATUS[CVE-2022-41850] = "fixed-version: Fixed from version 6.1rc1" + +CVE_STATUS[CVE-2022-41858] = "fixed-version: Fixed from version 5.18rc2" + +CVE_STATUS[CVE-2022-42328] = "fixed-version: Fixed from version 6.1" + +CVE_STATUS[CVE-2022-42329] = "fixed-version: Fixed from version 6.1" + +CVE_STATUS[CVE-2022-42432] = "fixed-version: Fixed from version 6.0rc7" + +CVE_STATUS[CVE-2022-4269] = "cpe-stable-backport: Backported in 6.1.22" + +CVE_STATUS[CVE-2022-42703] = "fixed-version: Fixed from version 6.0rc4" + +CVE_STATUS[CVE-2022-42719] = "fixed-version: Fixed from version 6.1rc1" + +CVE_STATUS[CVE-2022-42720] = "fixed-version: Fixed from version 6.1rc1" + +CVE_STATUS[CVE-2022-42721] = "fixed-version: Fixed from version 6.1rc1" + +CVE_STATUS[CVE-2022-42722] = "fixed-version: Fixed from version 6.1rc1" + +CVE_STATUS[CVE-2022-42895] = "fixed-version: Fixed from version 6.1rc4" + +CVE_STATUS[CVE-2022-42896] = "fixed-version: Fixed from version 6.1rc4" + +CVE_STATUS[CVE-2022-43750] = "fixed-version: Fixed from version 6.1rc1" + +CVE_STATUS[CVE-2022-4378] = "fixed-version: Fixed from version 6.1" + +CVE_STATUS[CVE-2022-4379] = "cpe-stable-backport: Backported in 6.1.3" + +CVE_STATUS[CVE-2022-4382] = "cpe-stable-backport: Backported in 6.1.8" + +CVE_STATUS[CVE-2022-43945] = "fixed-version: Fixed from version 6.1rc1" + +# CVE-2022-44032 needs backporting (fixed from 6.4rc1) + +# CVE-2022-44033 needs backporting (fixed from 6.4rc1) + +# CVE-2022-44034 needs backporting (fixed from 6.4rc1) + +# CVE-2022-4543 has no known resolution + +CVE_STATUS[CVE-2022-45869] = "fixed-version: Fixed from version 6.1rc7" + +# CVE-2022-45884 has no known resolution + +# CVE-2022-45885 has no known resolution + +CVE_STATUS[CVE-2022-45886] = "cpe-stable-backport: Backported in 6.1.33" + +CVE_STATUS[CVE-2022-45887] = "cpe-stable-backport: Backported in 6.1.33" + +# CVE-2022-45888 needs backporting (fixed from 6.2rc1) + +CVE_STATUS[CVE-2022-45919] = "cpe-stable-backport: Backported in 6.1.33" + +CVE_STATUS[CVE-2022-45934] = "fixed-version: Fixed from version 6.1" + +CVE_STATUS[CVE-2022-4662] = "fixed-version: Fixed from version 6.0rc4" + +CVE_STATUS[CVE-2022-4696] = "fixed-version: Fixed from version 5.12rc1" + +CVE_STATUS[CVE-2022-4744] = "fixed-version: Fixed from version 5.16rc7" + +CVE_STATUS[CVE-2022-47518] = "fixed-version: Fixed from version 6.1rc8" + +CVE_STATUS[CVE-2022-47519] = "fixed-version: Fixed from version 6.1rc8" + +CVE_STATUS[CVE-2022-47520] = "fixed-version: Fixed from version 6.1rc8" + +CVE_STATUS[CVE-2022-47521] = "fixed-version: Fixed from version 6.1rc8" + +CVE_STATUS[CVE-2022-47929] = "cpe-stable-backport: Backported in 6.1.6" + +CVE_STATUS[CVE-2022-47938] = "fixed-version: Fixed from version 6.0rc1" + +CVE_STATUS[CVE-2022-47939] = "fixed-version: Fixed from version 6.0rc1" + +CVE_STATUS[CVE-2022-47940] = "fixed-version: Fixed from version 5.19rc1" + +CVE_STATUS[CVE-2022-47941] = "fixed-version: Fixed from version 6.0rc1" + +CVE_STATUS[CVE-2022-47942] = "fixed-version: Fixed from version 6.0rc1" + +CVE_STATUS[CVE-2022-47943] = "fixed-version: Fixed from version 6.0rc1" + +CVE_STATUS[CVE-2022-47946] = "fixed-version: Fixed from version 5.12rc2" + +CVE_STATUS[CVE-2022-4842] = "cpe-stable-backport: Backported in 6.1.8" + +CVE_STATUS[CVE-2022-48423] = "cpe-stable-backport: Backported in 6.1.3" + +CVE_STATUS[CVE-2022-48424] = "cpe-stable-backport: Backported in 6.1.3" + +CVE_STATUS[CVE-2022-48425] = "cpe-stable-backport: Backported in 6.1.33" + +CVE_STATUS[CVE-2022-48502] = "cpe-stable-backport: Backported in 6.1.40" + +CVE_STATUS[CVE-2022-48619] = "fixed-version: Fixed from version 5.18rc1" + +CVE_STATUS[CVE-2022-48626] = "fixed-version: Fixed from version 5.17rc4" + +CVE_STATUS[CVE-2022-48627] = "fixed-version: Fixed from version 5.19rc7" + +CVE_STATUS[CVE-2022-48628] = "cpe-stable-backport: Backported in 6.1.56" + +CVE_STATUS[CVE-2022-48629] = "fixed-version: Fixed from version 5.17" + +CVE_STATUS[CVE-2022-48630] = "fixed-version: Fixed from version 5.18" + +CVE_STATUS[CVE-2023-0030] = "fixed-version: Fixed from version 5.0rc1" + +CVE_STATUS[CVE-2023-0045] = "cpe-stable-backport: Backported in 6.1.5" + +CVE_STATUS[CVE-2023-0047] = "fixed-version: Fixed from version 5.16rc1" + +CVE_STATUS[CVE-2023-0122] = "fixed-version: Fixed from version 6.0rc4" + +CVE_STATUS[CVE-2023-0160] = "cpe-stable-backport: Backported in 6.1.28" + +CVE_STATUS[CVE-2023-0179] = "cpe-stable-backport: Backported in 6.1.7" + +CVE_STATUS[CVE-2023-0210] = "cpe-stable-backport: Backported in 6.1.5" + +CVE_STATUS[CVE-2023-0240] = "fixed-version: Fixed from version 5.10rc1" + +CVE_STATUS[CVE-2023-0266] = "cpe-stable-backport: Backported in 6.1.6" + +CVE_STATUS[CVE-2023-0386] = "cpe-stable-backport: Backported in 6.1.9" + +CVE_STATUS[CVE-2023-0394] = "cpe-stable-backport: Backported in 6.1.7" + +CVE_STATUS[CVE-2023-0458] = "cpe-stable-backport: Backported in 6.1.8" + +CVE_STATUS[CVE-2023-0459] = "cpe-stable-backport: Backported in 6.1.14" + +CVE_STATUS[CVE-2023-0461] = "cpe-stable-backport: Backported in 6.1.5" + +CVE_STATUS[CVE-2023-0468] = "fixed-version: Fixed from version 6.1rc7" + +CVE_STATUS[CVE-2023-0469] = "fixed-version: Fixed from version 6.1rc7" + +CVE_STATUS[CVE-2023-0590] = "fixed-version: Fixed from version 6.1rc2" + +# CVE-2023-0597 needs backporting (fixed from 6.2rc1) + +CVE_STATUS[CVE-2023-0615] = "fixed-version: Fixed from version 6.1rc3" + +CVE_STATUS[CVE-2023-1032] = "cpe-stable-backport: Backported in 6.1.16" + +CVE_STATUS[CVE-2023-1073] = "cpe-stable-backport: Backported in 6.1.9" + +CVE_STATUS[CVE-2023-1074] = "cpe-stable-backport: Backported in 6.1.9" + +CVE_STATUS[CVE-2023-1075] = "cpe-stable-backport: Backported in 6.1.11" + +CVE_STATUS[CVE-2023-1076] = "cpe-stable-backport: Backported in 6.1.16" + +CVE_STATUS[CVE-2023-1077] = "cpe-stable-backport: Backported in 6.1.16" + +CVE_STATUS[CVE-2023-1078] = "cpe-stable-backport: Backported in 6.1.12" + +CVE_STATUS[CVE-2023-1079] = "cpe-stable-backport: Backported in 6.1.16" + +CVE_STATUS[CVE-2023-1095] = "fixed-version: Fixed from version 6.0rc1" + +CVE_STATUS[CVE-2023-1118] = "cpe-stable-backport: Backported in 6.1.16" + +CVE_STATUS[CVE-2023-1192] = "cpe-stable-backport: Backported in 6.1.33" + +CVE_STATUS[CVE-2023-1193] = "cpe-stable-backport: Backported in 6.1.71" + +CVE_STATUS[CVE-2023-1194] = "cpe-stable-backport: Backported in 6.1.34" + +CVE_STATUS[CVE-2023-1195] = "fixed-version: Fixed from version 6.1rc3" + +CVE_STATUS[CVE-2023-1206] = "cpe-stable-backport: Backported in 6.1.43" + +CVE_STATUS[CVE-2023-1249] = "fixed-version: Fixed from version 5.18rc1" + +CVE_STATUS[CVE-2023-1252] = "fixed-version: Fixed from version 5.16rc1" + +CVE_STATUS[CVE-2023-1281] = "cpe-stable-backport: Backported in 6.1.13" + +CVE_STATUS[CVE-2023-1295] = "fixed-version: Fixed from version 5.12rc1" + +CVE_STATUS[CVE-2023-1380] = "cpe-stable-backport: Backported in 6.1.27" + +CVE_STATUS[CVE-2023-1382] = "fixed-version: Fixed from version 6.1rc7" + +CVE_STATUS[CVE-2023-1390] = "fixed-version: Fixed from version 5.11rc4" + +# CVE-2023-1476 has no known resolution + +CVE_STATUS[CVE-2023-1513] = "cpe-stable-backport: Backported in 6.1.13" + +CVE_STATUS[CVE-2023-1582] = "fixed-version: Fixed from version 5.17rc4" + +CVE_STATUS[CVE-2023-1583] = "cpe-stable-backport: Backported in 6.1.22" + +CVE_STATUS[CVE-2023-1611] = "cpe-stable-backport: Backported in 6.1.23" + +CVE_STATUS[CVE-2023-1637] = "fixed-version: Fixed from version 5.18rc2" + +CVE_STATUS[CVE-2023-1652] = "cpe-stable-backport: Backported in 6.1.9" + +CVE_STATUS[CVE-2023-1670] = "cpe-stable-backport: Backported in 6.1.22" + +CVE_STATUS[CVE-2023-1829] = "cpe-stable-backport: Backported in 6.1.18" + +CVE_STATUS[CVE-2023-1838] = "fixed-version: Fixed from version 5.18" + +CVE_STATUS[CVE-2023-1855] = "cpe-stable-backport: Backported in 6.1.21" + +CVE_STATUS[CVE-2023-1859] = "cpe-stable-backport: Backported in 6.1.25" + +CVE_STATUS[CVE-2023-1872] = "fixed-version: Fixed from version 5.18rc2" + +CVE_STATUS[CVE-2023-1989] = "cpe-stable-backport: Backported in 6.1.22" + +CVE_STATUS[CVE-2023-1990] = "cpe-stable-backport: Backported in 6.1.21" + +CVE_STATUS[CVE-2023-1998] = "cpe-stable-backport: Backported in 6.1.16" + +CVE_STATUS[CVE-2023-2002] = "cpe-stable-backport: Backported in 6.1.27" + +CVE_STATUS[CVE-2023-2006] = "fixed-version: Fixed from version 6.1rc7" + +CVE_STATUS[CVE-2023-2007] = "fixed-version: Fixed from version 6.0rc1" + +CVE_STATUS[CVE-2023-2008] = "fixed-version: Fixed from version 5.19rc4" + +CVE_STATUS[CVE-2023-2019] = "fixed-version: Fixed from version 6.0rc1" + +CVE_STATUS[CVE-2023-20569] = "cpe-stable-backport: Backported in 6.1.44" + +CVE_STATUS[CVE-2023-20588] = "cpe-stable-backport: Backported in 6.1.45" + +CVE_STATUS[CVE-2023-20593] = "cpe-stable-backport: Backported in 6.1.41" + +CVE_STATUS[CVE-2023-20928] = "fixed-version: Fixed from version 6.0rc1" + +# CVE-2023-20937 has no known resolution + +CVE_STATUS[CVE-2023-20938] = "fixed-version: Fixed from version 5.18rc5" + +# CVE-2023-20941 has no known resolution + +CVE_STATUS[CVE-2023-21102] = "cpe-stable-backport: Backported in 6.1.8" + +CVE_STATUS[CVE-2023-21106] = "cpe-stable-backport: Backported in 6.1.9" + +CVE_STATUS[CVE-2023-2124] = "cpe-stable-backport: Backported in 6.1.33" + +CVE_STATUS[CVE-2023-21255] = "cpe-stable-backport: Backported in 6.1.31" + +# CVE-2023-21264 needs backporting (fixed from 6.4rc5) + +# CVE-2023-21400 has no known resolution + +CVE_STATUS[CVE-2023-2156] = "cpe-stable-backport: Backported in 6.1.26" + +CVE_STATUS[CVE-2023-2162] = "cpe-stable-backport: Backported in 6.1.11" + +CVE_STATUS[CVE-2023-2163] = "cpe-stable-backport: Backported in 6.1.26" + +CVE_STATUS[CVE-2023-2166] = "fixed-version: Fixed from version 6.1" + +CVE_STATUS[CVE-2023-2176] = "cpe-stable-backport: Backported in 6.1.81" + +CVE_STATUS[CVE-2023-2177] = "fixed-version: Fixed from version 5.19" + +CVE_STATUS[CVE-2023-2194] = "cpe-stable-backport: Backported in 6.1.22" + +CVE_STATUS[CVE-2023-2235] = "cpe-stable-backport: Backported in 6.1.21" + +CVE_STATUS[CVE-2023-2236] = "fixed-version: Fixed from version 6.1rc7" + +CVE_STATUS[CVE-2023-2248] = "cpe-stable-backport: Backported in 6.1.26" + +CVE_STATUS[CVE-2023-2269] = "cpe-stable-backport: Backported in 6.1.28" + +CVE_STATUS[CVE-2023-22995] = "fixed-version: Fixed from version 5.17rc1" + +CVE_STATUS[CVE-2023-22996] = "fixed-version: Fixed from version 5.18rc1" + +CVE_STATUS[CVE-2023-22997] = "cpe-stable-backport: Backported in 6.1.2" + +CVE_STATUS[CVE-2023-22998] = "fixed-version: Fixed from version 6.0rc1" + +CVE_STATUS[CVE-2023-22999] = "fixed-version: Fixed from version 5.17rc1" + +CVE_STATUS[CVE-2023-23000] = "fixed-version: Fixed from version 5.17rc1" + +CVE_STATUS[CVE-2023-23001] = "fixed-version: Fixed from version 5.17rc1" + +CVE_STATUS[CVE-2023-23002] = "fixed-version: Fixed from version 5.17rc1" + +CVE_STATUS[CVE-2023-23003] = "fixed-version: Fixed from version 5.16rc6" + +CVE_STATUS[CVE-2023-23004] = "fixed-version: Fixed from version 5.19rc1" + +# CVE-2023-23005 needs backporting (fixed from 6.2rc1) + +CVE_STATUS[CVE-2023-23006] = "fixed-version: Fixed from version 5.16rc8" + +# CVE-2023-23039 has no known resolution + +CVE_STATUS[CVE-2023-23454] = "cpe-stable-backport: Backported in 6.1.5" + +CVE_STATUS[CVE-2023-23455] = "cpe-stable-backport: Backported in 6.1.5" + +CVE_STATUS[CVE-2023-23559] = "cpe-stable-backport: Backported in 6.1.9" + +CVE_STATUS[CVE-2023-23586] = "fixed-version: Fixed from version 5.12rc1" + +CVE_STATUS[CVE-2023-2430] = "cpe-stable-backport: Backported in 6.1.50" + +CVE_STATUS[CVE-2023-2483] = "cpe-stable-backport: Backported in 6.1.22" + +CVE_STATUS[CVE-2023-25012] = "cpe-stable-backport: Backported in 6.1.16" + +CVE_STATUS[CVE-2023-2513] = "fixed-version: Fixed from version 6.0rc1" + +CVE_STATUS[CVE-2023-25775] = "cpe-stable-backport: Backported in 6.1.53" + +CVE_STATUS[CVE-2023-2598] = "fixed-version: only affects 6.3rc1 onwards" + +# CVE-2023-26242 has no known resolution + +# CVE-2023-2640 has no known resolution + +CVE_STATUS[CVE-2023-26544] = "cpe-stable-backport: Backported in 6.1.3" + +CVE_STATUS[CVE-2023-26545] = "cpe-stable-backport: Backported in 6.1.13" + +CVE_STATUS[CVE-2023-26605] = "fixed-version: Fixed from version 6.1rc7" + +CVE_STATUS[CVE-2023-26606] = "cpe-stable-backport: Backported in 6.1.2" + +CVE_STATUS[CVE-2023-26607] = "fixed-version: Fixed from version 6.1rc1" + +CVE_STATUS[CVE-2023-28327] = "fixed-version: Fixed from version 6.1" + +CVE_STATUS[CVE-2023-28328] = "cpe-stable-backport: Backported in 6.1.2" + +CVE_STATUS[CVE-2023-28410] = "fixed-version: Fixed from version 5.19rc1" + +CVE_STATUS[CVE-2023-28464] = "fixed-version: only affects 6.3rc1 onwards" + +CVE_STATUS[CVE-2023-28466] = "cpe-stable-backport: Backported in 6.1.20" + +CVE_STATUS[CVE-2023-2860] = "fixed-version: Fixed from version 6.0rc5" + +CVE_STATUS[CVE-2023-28746] = "cpe-stable-backport: Backported in 6.1.82" + +CVE_STATUS[CVE-2023-28772] = "fixed-version: Fixed from version 5.14rc1" + +CVE_STATUS[CVE-2023-28866] = "cpe-stable-backport: Backported in 6.1.22" + +CVE_STATUS[CVE-2023-2898] = "cpe-stable-backport: Backported in 6.1.39" + +CVE_STATUS[CVE-2023-2985] = "cpe-stable-backport: Backported in 6.1.16" + +CVE_STATUS[CVE-2023-3006] = "fixed-version: Fixed from version 6.1rc1" + +# Skipping CVE-2023-3022, no affected_versions + +CVE_STATUS[CVE-2023-30456] = "cpe-stable-backport: Backported in 6.1.21" + +CVE_STATUS[CVE-2023-30772] = "cpe-stable-backport: Backported in 6.1.22" + +CVE_STATUS[CVE-2023-3090] = "cpe-stable-backport: Backported in 6.1.30" + +CVE_STATUS[CVE-2023-3106] = "fixed-version: Fixed from version 4.8rc7" + +# Skipping CVE-2023-3108, no affected_versions + +# CVE-2023-31081 has no known resolution + +# CVE-2023-31082 has no known resolution + +# CVE-2023-31083 needs backporting (fixed from 6.6rc1) + +# CVE-2023-31084 needs backporting (fixed from 6.4rc3) + +CVE_STATUS[CVE-2023-31085] = "cpe-stable-backport: Backported in 6.1.57" + +CVE_STATUS[CVE-2023-3111] = "fixed-version: Fixed from version 6.0rc2" + +CVE_STATUS[CVE-2023-3117] = "cpe-stable-backport: Backported in 6.1.35" + +CVE_STATUS[CVE-2023-31248] = "cpe-stable-backport: Backported in 6.1.39" + +CVE_STATUS[CVE-2023-3141] = "cpe-stable-backport: Backported in 6.1.30" + +CVE_STATUS[CVE-2023-31436] = "cpe-stable-backport: Backported in 6.1.26" + +CVE_STATUS[CVE-2023-3159] = "fixed-version: Fixed from version 5.18rc6" + +CVE_STATUS[CVE-2023-3161] = "cpe-stable-backport: Backported in 6.1.11" + +CVE_STATUS[CVE-2023-3212] = "cpe-stable-backport: Backported in 6.1.33" + +CVE_STATUS[CVE-2023-3220] = "cpe-stable-backport: Backported in 6.1.16" + +CVE_STATUS[CVE-2023-32233] = "cpe-stable-backport: Backported in 6.1.28" + +CVE_STATUS[CVE-2023-32247] = "cpe-stable-backport: Backported in 6.1.29" + +CVE_STATUS[CVE-2023-32248] = "cpe-stable-backport: Backported in 6.1.28" + +CVE_STATUS[CVE-2023-32250] = "cpe-stable-backport: Backported in 6.1.29" + +CVE_STATUS[CVE-2023-32252] = "cpe-stable-backport: Backported in 6.1.29" + +CVE_STATUS[CVE-2023-32254] = "cpe-stable-backport: Backported in 6.1.28" + +CVE_STATUS[CVE-2023-32257] = "cpe-stable-backport: Backported in 6.1.29" + +CVE_STATUS[CVE-2023-32258] = "cpe-stable-backport: Backported in 6.1.29" + +CVE_STATUS[CVE-2023-32269] = "cpe-stable-backport: Backported in 6.1.11" + +# CVE-2023-32629 has no known resolution + +CVE_STATUS[CVE-2023-3268] = "cpe-stable-backport: Backported in 6.1.28" + +CVE_STATUS[CVE-2023-3269] = "cpe-stable-backport: Backported in 6.1.37" + +CVE_STATUS[CVE-2023-3312] = "fixed-version: only affects 6.2rc1 onwards" + +CVE_STATUS[CVE-2023-3317] = "fixed-version: only affects 6.2rc1 onwards" + +CVE_STATUS[CVE-2023-33203] = "cpe-stable-backport: Backported in 6.1.22" + +CVE_STATUS[CVE-2023-33250] = "fixed-version: only affects 6.2rc1 onwards" + +CVE_STATUS[CVE-2023-33288] = "cpe-stable-backport: Backported in 6.1.22" + +CVE_STATUS[CVE-2023-3338] = "fixed-version: Fixed from version 6.1rc1" + +CVE_STATUS[CVE-2023-3355] = "cpe-stable-backport: Backported in 6.1.16" + +CVE_STATUS[CVE-2023-3357] = "cpe-stable-backport: Backported in 6.1.2" + +CVE_STATUS[CVE-2023-3358] = "cpe-stable-backport: Backported in 6.1.9" + +CVE_STATUS[CVE-2023-3359] = "cpe-stable-backport: Backported in 6.1.11" + +CVE_STATUS[CVE-2023-3389] = "fixed-version: Fixed from version 6.0rc1" + +CVE_STATUS[CVE-2023-3390] = "cpe-stable-backport: Backported in 6.1.35" + +CVE_STATUS[CVE-2023-33951] = "cpe-stable-backport: Backported in 6.1.13" + +CVE_STATUS[CVE-2023-33952] = "cpe-stable-backport: Backported in 6.1.13" + +# CVE-2023-3397 has no known resolution + +CVE_STATUS[CVE-2023-34255] = "cpe-stable-backport: Backported in 6.1.33" + +CVE_STATUS[CVE-2023-34256] = "cpe-stable-backport: Backported in 6.1.29" + +CVE_STATUS[CVE-2023-34319] = "cpe-stable-backport: Backported in 6.1.44" + +CVE_STATUS[CVE-2023-34324] = "cpe-stable-backport: Backported in 6.1.57" + +CVE_STATUS[CVE-2023-3439] = "fixed-version: Fixed from version 5.18rc5" + +CVE_STATUS[CVE-2023-35001] = "cpe-stable-backport: Backported in 6.1.39" + +CVE_STATUS[CVE-2023-3567] = "cpe-stable-backport: Backported in 6.1.11" + +# CVE-2023-35693 has no known resolution + +CVE_STATUS[CVE-2023-35788] = "cpe-stable-backport: Backported in 6.1.33" + +CVE_STATUS[CVE-2023-35823] = "cpe-stable-backport: Backported in 6.1.28" + +CVE_STATUS[CVE-2023-35824] = "cpe-stable-backport: Backported in 6.1.28" + +CVE_STATUS[CVE-2023-35826] = "cpe-stable-backport: Backported in 6.1.28" + +CVE_STATUS[CVE-2023-35827] = "cpe-stable-backport: Backported in 6.1.59" + +CVE_STATUS[CVE-2023-35828] = "cpe-stable-backport: Backported in 6.1.28" + +CVE_STATUS[CVE-2023-35829] = "cpe-stable-backport: Backported in 6.1.28" + +CVE_STATUS[CVE-2023-3609] = "cpe-stable-backport: Backported in 6.1.35" + +CVE_STATUS[CVE-2023-3610] = "cpe-stable-backport: Backported in 6.1.36" + +CVE_STATUS[CVE-2023-3611] = "cpe-stable-backport: Backported in 6.1.40" + +# CVE-2023-3640 has no known resolution + +CVE_STATUS[CVE-2023-37453] = "fixed-version: only affects 6.3rc1 onwards" + +# CVE-2023-37454 has no known resolution + +CVE_STATUS[CVE-2023-3772] = "cpe-stable-backport: Backported in 6.1.47" + +CVE_STATUS[CVE-2023-3773] = "cpe-stable-backport: Backported in 6.1.47" + +CVE_STATUS[CVE-2023-3776] = "cpe-stable-backport: Backported in 6.1.40" + +CVE_STATUS[CVE-2023-3777] = "cpe-stable-backport: Backported in 6.1.42" + +CVE_STATUS[CVE-2023-3812] = "fixed-version: Fixed from version 6.1rc4" + +CVE_STATUS[CVE-2023-38409] = "cpe-stable-backport: Backported in 6.1.25" + +CVE_STATUS[CVE-2023-38426] = "cpe-stable-backport: Backported in 6.1.30" + +CVE_STATUS[CVE-2023-38427] = "cpe-stable-backport: Backported in 6.1.34" + +CVE_STATUS[CVE-2023-38428] = "cpe-stable-backport: Backported in 6.1.30" + +CVE_STATUS[CVE-2023-38429] = "cpe-stable-backport: Backported in 6.1.30" + +CVE_STATUS[CVE-2023-38430] = "cpe-stable-backport: Backported in 6.1.35" + +CVE_STATUS[CVE-2023-38431] = "cpe-stable-backport: Backported in 6.1.34" + +CVE_STATUS[CVE-2023-38432] = "cpe-stable-backport: Backported in 6.1.36" + +CVE_STATUS[CVE-2023-3863] = "cpe-stable-backport: Backported in 6.1.39" + +CVE_STATUS[CVE-2023-3865] = "cpe-stable-backport: Backported in 6.1.36" + +CVE_STATUS[CVE-2023-3866] = "cpe-stable-backport: Backported in 6.1.36" + +CVE_STATUS[CVE-2023-3867] = "cpe-stable-backport: Backported in 6.1.40" + +CVE_STATUS[CVE-2023-39189] = "cpe-stable-backport: Backported in 6.1.54" + +# CVE-2023-39191 needs backporting (fixed from 6.3rc1) + +CVE_STATUS[CVE-2023-39192] = "cpe-stable-backport: Backported in 6.1.53" + +CVE_STATUS[CVE-2023-39193] = "cpe-stable-backport: Backported in 6.1.53" + +CVE_STATUS[CVE-2023-39194] = "cpe-stable-backport: Backported in 6.1.47" + +CVE_STATUS[CVE-2023-39197] = "cpe-stable-backport: Backported in 6.1.39" + +CVE_STATUS[CVE-2023-39198] = "cpe-stable-backport: Backported in 6.1.47" + +CVE_STATUS[CVE-2023-4004] = "cpe-stable-backport: Backported in 6.1.42" + +# CVE-2023-4010 has no known resolution + +CVE_STATUS[CVE-2023-4015] = "cpe-stable-backport: Backported in 6.1.43" + +CVE_STATUS[CVE-2023-40283] = "cpe-stable-backport: Backported in 6.1.45" + +CVE_STATUS[CVE-2023-40791] = "fixed-version: only affects 6.3rc1 onwards" + +CVE_STATUS[CVE-2023-4128] = "cpe-stable-backport: Backported in 6.1.45" + +CVE_STATUS[CVE-2023-4132] = "cpe-stable-backport: Backported in 6.1.39" + +# CVE-2023-4133 needs backporting (fixed from 6.3) + +# CVE-2023-4134 needs backporting (fixed from 6.5rc1) + +CVE_STATUS[CVE-2023-4147] = "cpe-stable-backport: Backported in 6.1.43" + +CVE_STATUS[CVE-2023-4155] = "cpe-stable-backport: Backported in 6.1.46" + +CVE_STATUS[CVE-2023-4194] = "fixed-version: only affects 6.3rc1 onwards" + +CVE_STATUS[CVE-2023-4206] = "cpe-stable-backport: Backported in 6.1.45" + +CVE_STATUS[CVE-2023-4207] = "cpe-stable-backport: Backported in 6.1.45" + +CVE_STATUS[CVE-2023-4208] = "cpe-stable-backport: Backported in 6.1.45" + +CVE_STATUS[CVE-2023-4244] = "cpe-stable-backport: Backported in 6.1.56" + +CVE_STATUS[CVE-2023-4273] = "cpe-stable-backport: Backported in 6.1.45" + +CVE_STATUS[CVE-2023-42752] = "cpe-stable-backport: Backported in 6.1.53" + +CVE_STATUS[CVE-2023-42753] = "cpe-stable-backport: Backported in 6.1.53" + +CVE_STATUS[CVE-2023-42754] = "cpe-stable-backport: Backported in 6.1.56" + +CVE_STATUS[CVE-2023-42755] = "cpe-stable-backport: Backported in 6.1.55" + +CVE_STATUS[CVE-2023-42756] = "fixed-version: only affects 6.4rc6 onwards" + +CVE_STATUS[CVE-2023-4385] = "fixed-version: Fixed from version 5.19rc1" + +CVE_STATUS[CVE-2023-4387] = "fixed-version: Fixed from version 5.18" + +CVE_STATUS[CVE-2023-4389] = "fixed-version: Fixed from version 5.18rc3" + +CVE_STATUS[CVE-2023-4394] = "fixed-version: Fixed from version 6.0rc3" + +CVE_STATUS[CVE-2023-44466] = "cpe-stable-backport: Backported in 6.1.40" + +CVE_STATUS[CVE-2023-4459] = "fixed-version: Fixed from version 5.18" + +CVE_STATUS[CVE-2023-4563] = "cpe-stable-backport: Backported in 6.1.56" + +CVE_STATUS[CVE-2023-4569] = "cpe-stable-backport: Backported in 6.1.47" + +CVE_STATUS[CVE-2023-45862] = "cpe-stable-backport: Backported in 6.1.18" + +CVE_STATUS[CVE-2023-45863] = "cpe-stable-backport: Backported in 6.1.16" + +CVE_STATUS[CVE-2023-45871] = "cpe-stable-backport: Backported in 6.1.53" + +CVE_STATUS[CVE-2023-45898] = "fixed-version: only affects 6.5rc1 onwards" + +CVE_STATUS[CVE-2023-4610] = "fixed-version: only affects 6.4rc1 onwards" + +CVE_STATUS[CVE-2023-4611] = "fixed-version: only affects 6.4rc1 onwards" + +# CVE-2023-4622 needs backporting (fixed from 6.5rc1) + +CVE_STATUS[CVE-2023-4623] = "cpe-stable-backport: Backported in 6.1.53" + +CVE_STATUS[CVE-2023-46343] = "cpe-stable-backport: Backported in 6.1.60" + +CVE_STATUS[CVE-2023-46813] = "cpe-stable-backport: Backported in 6.1.60" + +CVE_STATUS[CVE-2023-46838] = "cpe-stable-backport: Backported in 6.1.75" + +CVE_STATUS[CVE-2023-46862] = "cpe-stable-backport: Backported in 6.1.61" + +CVE_STATUS[CVE-2023-47233] = "cpe-stable-backport: Backported in 6.1.84" + +CVE_STATUS[CVE-2023-4732] = "fixed-version: Fixed from version 5.14rc1" + +CVE_STATUS[CVE-2023-4881] = "cpe-stable-backport: Backported in 6.1.54" + +CVE_STATUS[CVE-2023-4921] = "cpe-stable-backport: Backported in 6.1.54" + +CVE_STATUS[CVE-2023-50431] = "cpe-stable-backport: Backported in 6.1.75" + +CVE_STATUS[CVE-2023-5090] = "cpe-stable-backport: Backported in 6.1.62" + +CVE_STATUS[CVE-2023-51042] = "cpe-stable-backport: Backported in 6.1.47" + +CVE_STATUS[CVE-2023-51043] = "cpe-stable-backport: Backported in 6.1.40" + +CVE_STATUS[CVE-2023-5158] = "cpe-stable-backport: Backported in 6.1.57" + +CVE_STATUS[CVE-2023-51779] = "cpe-stable-backport: Backported in 6.1.70" + +CVE_STATUS[CVE-2023-5178] = "cpe-stable-backport: Backported in 6.1.60" + +CVE_STATUS[CVE-2023-51780] = "cpe-stable-backport: Backported in 6.1.69" -# CVE-2022-3642 has no known resolution +CVE_STATUS[CVE-2023-51781] = "cpe-stable-backport: Backported in 6.1.69" -CVE_STATUS[CVE-2022-3643] = "fixed-version: Fixed from version 6.1" +CVE_STATUS[CVE-2023-51782] = "cpe-stable-backport: Backported in 6.1.69" -CVE_STATUS[CVE-2022-3646] = "fixed-version: Fixed from version 6.1rc1" +CVE_STATUS[CVE-2023-5197] = "cpe-stable-backport: Backported in 6.1.56" -CVE_STATUS[CVE-2022-3649] = "fixed-version: Fixed from version 6.1rc1" +CVE_STATUS[CVE-2023-52340] = "cpe-stable-backport: Backported in 6.1.73" -CVE_STATUS[CVE-2022-36879] = "fixed-version: Fixed from version 5.19rc8" +CVE_STATUS[CVE-2023-52429] = "cpe-stable-backport: Backported in 6.1.79" -CVE_STATUS[CVE-2022-36946] = "fixed-version: Fixed from version 5.19" +CVE_STATUS[CVE-2023-52433] = "fixed-version: only affects 6.5rc6 onwards" -CVE_STATUS[CVE-2022-3707] = "cpe-stable-backport: Backported in 6.1.5" +CVE_STATUS[CVE-2023-52434] = "cpe-stable-backport: Backported in 6.1.79" -# CVE-2022-38096 has no known resolution +CVE_STATUS[CVE-2023-52435] = "cpe-stable-backport: Backported in 6.1.79" -CVE_STATUS[CVE-2022-38457] = "cpe-stable-backport: Backported in 6.1.7" +CVE_STATUS[CVE-2023-52436] = "cpe-stable-backport: Backported in 6.1.74" -CVE_STATUS[CVE-2022-3903] = "fixed-version: Fixed from version 6.1rc2" +CVE_STATUS[CVE-2023-52438] = "cpe-stable-backport: Backported in 6.1.74" -CVE_STATUS[CVE-2022-3910] = "fixed-version: Fixed from version 6.0rc6" +CVE_STATUS[CVE-2023-52439] = "cpe-stable-backport: Backported in 6.1.74" -CVE_STATUS[CVE-2022-39188] = "fixed-version: Fixed from version 5.19rc8" +CVE_STATUS[CVE-2023-52440] = "cpe-stable-backport: Backported in 6.1.52" -CVE_STATUS[CVE-2022-39189] = "fixed-version: Fixed from version 5.19rc2" +CVE_STATUS[CVE-2023-52441] = "cpe-stable-backport: Backported in 6.1.53" -CVE_STATUS[CVE-2022-39190] = "fixed-version: Fixed from version 6.0rc3" +CVE_STATUS[CVE-2023-52442] = "cpe-stable-backport: Backported in 6.1.53" -CVE_STATUS[CVE-2022-3977] = "fixed-version: Fixed from version 6.1rc1" +CVE_STATUS[CVE-2023-52443] = "cpe-stable-backport: Backported in 6.1.75" -CVE_STATUS[CVE-2022-39842] = "fixed-version: Fixed from version 5.19rc4" +CVE_STATUS[CVE-2023-52444] = "cpe-stable-backport: Backported in 6.1.75" -CVE_STATUS[CVE-2022-40133] = "cpe-stable-backport: Backported in 6.1.7" +CVE_STATUS[CVE-2023-52445] = "cpe-stable-backport: Backported in 6.1.75" -CVE_STATUS[CVE-2022-40307] = "fixed-version: Fixed from version 6.0rc5" +CVE_STATUS[CVE-2023-52446] = "fixed-version: only affects 6.2rc1 onwards" -CVE_STATUS[CVE-2022-40476] = "fixed-version: Fixed from version 5.19rc4" +CVE_STATUS[CVE-2023-52447] = "cpe-stable-backport: Backported in 6.1.75" -CVE_STATUS[CVE-2022-40768] = "fixed-version: Fixed from version 6.1rc1" +CVE_STATUS[CVE-2023-52448] = "cpe-stable-backport: Backported in 6.1.75" -CVE_STATUS[CVE-2022-4095] = "fixed-version: Fixed from version 6.0rc4" +CVE_STATUS[CVE-2023-52449] = "cpe-stable-backport: Backported in 6.1.75" -CVE_STATUS[CVE-2022-40982] = "cpe-stable-backport: Backported in 6.1.44" +CVE_STATUS[CVE-2023-52450] = "fixed-version: only affects 6.2rc1 onwards" -CVE_STATUS[CVE-2022-41218] = "cpe-stable-backport: Backported in 6.1.4" +CVE_STATUS[CVE-2023-52451] = "cpe-stable-backport: Backported in 6.1.75" -CVE_STATUS[CVE-2022-41222] = "fixed-version: Fixed from version 5.14rc1" +# CVE-2023-52452 needs backporting (fixed from 6.8rc1) -CVE_STATUS[CVE-2022-4127] = "fixed-version: Fixed from version 5.19rc6" +CVE_STATUS[CVE-2023-52453] = "fixed-version: only affects 6.2rc1 onwards" -CVE_STATUS[CVE-2022-4128] = "fixed-version: Fixed from version 5.19rc7" +CVE_STATUS[CVE-2023-52454] = "cpe-stable-backport: Backported in 6.1.75" -CVE_STATUS[CVE-2022-4129] = "fixed-version: Fixed from version 6.1rc6" +CVE_STATUS[CVE-2023-52455] = "fixed-version: only affects 6.3rc1 onwards" -CVE_STATUS[CVE-2022-4139] = "fixed-version: Fixed from version 6.1rc8" +CVE_STATUS[CVE-2023-52456] = "cpe-stable-backport: Backported in 6.1.75" -CVE_STATUS[CVE-2022-41674] = "fixed-version: Fixed from version 6.1rc1" +CVE_STATUS[CVE-2023-52457] = "cpe-stable-backport: Backported in 6.1.75" -# CVE-2022-41848 has no known resolution +CVE_STATUS[CVE-2023-52458] = "cpe-stable-backport: Backported in 6.1.75" -CVE_STATUS[CVE-2022-41849] = "fixed-version: Fixed from version 6.1rc1" +CVE_STATUS[CVE-2023-52459] = "fixed-version: only affects 6.6rc1 onwards" -CVE_STATUS[CVE-2022-41850] = "fixed-version: Fixed from version 6.1rc1" +CVE_STATUS[CVE-2023-52460] = "fixed-version: only affects 6.7rc1 onwards" -CVE_STATUS[CVE-2022-41858] = "fixed-version: Fixed from version 5.18rc2" +CVE_STATUS[CVE-2023-52461] = "fixed-version: only affects 6.7rc1 onwards" -CVE_STATUS[CVE-2022-42328] = "fixed-version: Fixed from version 6.1" +CVE_STATUS[CVE-2023-52462] = "cpe-stable-backport: Backported in 6.1.75" -CVE_STATUS[CVE-2022-42329] = "fixed-version: Fixed from version 6.1" +CVE_STATUS[CVE-2023-52463] = "cpe-stable-backport: Backported in 6.1.75" -CVE_STATUS[CVE-2022-42432] = "fixed-version: Fixed from version 6.0rc7" +CVE_STATUS[CVE-2023-52464] = "cpe-stable-backport: Backported in 6.1.75" -CVE_STATUS[CVE-2022-4269] = "cpe-stable-backport: Backported in 6.1.22" +CVE_STATUS[CVE-2023-52465] = "fixed-version: only affects 6.5rc1 onwards" -CVE_STATUS[CVE-2022-42703] = "fixed-version: Fixed from version 6.0rc4" +CVE_STATUS[CVE-2023-52467] = "cpe-stable-backport: Backported in 6.1.75" -CVE_STATUS[CVE-2022-42719] = "fixed-version: Fixed from version 6.1rc1" +CVE_STATUS[CVE-2023-52468] = "fixed-version: only affects 6.4rc1 onwards" -CVE_STATUS[CVE-2022-42720] = "fixed-version: Fixed from version 6.1rc1" +CVE_STATUS[CVE-2023-52469] = "cpe-stable-backport: Backported in 6.1.75" -CVE_STATUS[CVE-2022-42721] = "fixed-version: Fixed from version 6.1rc1" +CVE_STATUS[CVE-2023-52470] = "cpe-stable-backport: Backported in 6.1.75" -CVE_STATUS[CVE-2022-42722] = "fixed-version: Fixed from version 6.1rc1" +CVE_STATUS[CVE-2023-52471] = "fixed-version: only affects 6.7rc1 onwards" -CVE_STATUS[CVE-2022-42895] = "fixed-version: Fixed from version 6.1rc4" +CVE_STATUS[CVE-2023-52472] = "fixed-version: only affects 6.5rc1 onwards" -CVE_STATUS[CVE-2022-42896] = "fixed-version: Fixed from version 6.1rc4" +CVE_STATUS[CVE-2023-52473] = "fixed-version: only affects 6.4rc1 onwards" -CVE_STATUS[CVE-2022-43750] = "fixed-version: Fixed from version 6.1rc1" +CVE_STATUS[CVE-2023-52474] = "cpe-stable-backport: Backported in 6.1.28" -CVE_STATUS[CVE-2022-4378] = "fixed-version: Fixed from version 6.1" +CVE_STATUS[CVE-2023-52475] = "cpe-stable-backport: Backported in 6.1.59" -CVE_STATUS[CVE-2022-4379] = "cpe-stable-backport: Backported in 6.1.3" +CVE_STATUS[CVE-2023-52476] = "cpe-stable-backport: Backported in 6.1.59" -CVE_STATUS[CVE-2022-4382] = "cpe-stable-backport: Backported in 6.1.8" +CVE_STATUS[CVE-2023-52477] = "cpe-stable-backport: Backported in 6.1.59" -CVE_STATUS[CVE-2022-43945] = "fixed-version: Fixed from version 6.1rc1" +CVE_STATUS[CVE-2023-52478] = "cpe-stable-backport: Backported in 6.1.59" -# CVE-2022-44032 needs backporting (fixed from 6.4rc1) +CVE_STATUS[CVE-2023-52479] = "cpe-stable-backport: Backported in 6.1.57" -# CVE-2022-44033 needs backporting (fixed from 6.4rc1) +CVE_STATUS[CVE-2023-52480] = "cpe-stable-backport: Backported in 6.1.57" -# CVE-2022-44034 needs backporting (fixed from 6.4rc1) +CVE_STATUS[CVE-2023-52481] = "cpe-stable-backport: Backported in 6.1.57" -# CVE-2022-4543 has no known resolution +CVE_STATUS[CVE-2023-52482] = "cpe-stable-backport: Backported in 6.1.56" -CVE_STATUS[CVE-2022-45869] = "fixed-version: Fixed from version 6.1rc7" +CVE_STATUS[CVE-2023-52483] = "cpe-stable-backport: Backported in 6.1.59" -# CVE-2022-45884 has no known resolution +CVE_STATUS[CVE-2023-52484] = "cpe-stable-backport: Backported in 6.1.56" -# CVE-2022-45885 has no known resolution +# CVE-2023-52485 needs backporting (fixed from 6.8rc1) -CVE_STATUS[CVE-2022-45886] = "cpe-stable-backport: Backported in 6.1.33" +CVE_STATUS[CVE-2023-52486] = "cpe-stable-backport: Backported in 6.1.76" -CVE_STATUS[CVE-2022-45887] = "cpe-stable-backport: Backported in 6.1.33" +CVE_STATUS[CVE-2023-52487] = "fixed-version: only affects 6.5rc1 onwards" -# CVE-2022-45888 needs backporting (fixed from 6.2rc1) +CVE_STATUS[CVE-2023-52488] = "cpe-stable-backport: Backported in 6.1.76" -CVE_STATUS[CVE-2022-45919] = "cpe-stable-backport: Backported in 6.1.33" +CVE_STATUS[CVE-2023-52489] = "cpe-stable-backport: Backported in 6.1.76" -CVE_STATUS[CVE-2022-45934] = "fixed-version: Fixed from version 6.1" +CVE_STATUS[CVE-2023-52490] = "fixed-version: only affects 6.3rc1 onwards" -CVE_STATUS[CVE-2022-4662] = "fixed-version: Fixed from version 6.0rc4" +CVE_STATUS[CVE-2023-52491] = "cpe-stable-backport: Backported in 6.1.76" -CVE_STATUS[CVE-2022-4696] = "fixed-version: Fixed from version 5.12rc1" +CVE_STATUS[CVE-2023-52492] = "cpe-stable-backport: Backported in 6.1.76" -CVE_STATUS[CVE-2022-4744] = "fixed-version: Fixed from version 5.16rc7" +CVE_STATUS[CVE-2023-52493] = "cpe-stable-backport: Backported in 6.1.76" -CVE_STATUS[CVE-2022-47518] = "fixed-version: Fixed from version 6.1rc8" +CVE_STATUS[CVE-2023-52494] = "cpe-stable-backport: Backported in 6.1.76" -CVE_STATUS[CVE-2022-47519] = "fixed-version: Fixed from version 6.1rc8" +CVE_STATUS[CVE-2023-52495] = "fixed-version: only affects 6.3rc1 onwards" -CVE_STATUS[CVE-2022-47520] = "fixed-version: Fixed from version 6.1rc8" +CVE_STATUS[CVE-2023-52497] = "cpe-stable-backport: Backported in 6.1.76" -CVE_STATUS[CVE-2022-47521] = "fixed-version: Fixed from version 6.1rc8" +CVE_STATUS[CVE-2023-52498] = "cpe-stable-backport: Backported in 6.1.76" -CVE_STATUS[CVE-2022-47929] = "cpe-stable-backport: Backported in 6.1.6" +CVE_STATUS[CVE-2023-52499] = "cpe-stable-backport: Backported in 6.1.59" -CVE_STATUS[CVE-2022-47938] = "fixed-version: Fixed from version 6.0rc1" +CVE_STATUS[CVE-2023-52500] = "cpe-stable-backport: Backported in 6.1.56" -CVE_STATUS[CVE-2022-47939] = "fixed-version: Fixed from version 6.0rc1" +CVE_STATUS[CVE-2023-52501] = "cpe-stable-backport: Backported in 6.1.56" -CVE_STATUS[CVE-2022-47940] = "fixed-version: Fixed from version 5.19rc1" +CVE_STATUS[CVE-2023-52502] = "cpe-stable-backport: Backported in 6.1.59" -CVE_STATUS[CVE-2022-47941] = "fixed-version: Fixed from version 6.0rc1" +CVE_STATUS[CVE-2023-52503] = "cpe-stable-backport: Backported in 6.1.59" -CVE_STATUS[CVE-2022-47942] = "fixed-version: Fixed from version 6.0rc1" +CVE_STATUS[CVE-2023-52504] = "cpe-stable-backport: Backported in 6.1.59" -CVE_STATUS[CVE-2022-47943] = "fixed-version: Fixed from version 6.0rc1" +CVE_STATUS[CVE-2023-52505] = "cpe-stable-backport: Backported in 6.1.59" -CVE_STATUS[CVE-2022-47946] = "fixed-version: Fixed from version 5.12rc2" +CVE_STATUS[CVE-2023-52506] = "cpe-stable-backport: Backported in 6.1.56" -CVE_STATUS[CVE-2022-4842] = "cpe-stable-backport: Backported in 6.1.8" +CVE_STATUS[CVE-2023-52507] = "cpe-stable-backport: Backported in 6.1.59" -CVE_STATUS[CVE-2022-48423] = "cpe-stable-backport: Backported in 6.1.3" +CVE_STATUS[CVE-2023-52508] = "cpe-stable-backport: Backported in 6.1.56" -CVE_STATUS[CVE-2022-48424] = "cpe-stable-backport: Backported in 6.1.3" +CVE_STATUS[CVE-2023-52509] = "cpe-stable-backport: Backported in 6.1.59" -CVE_STATUS[CVE-2022-48425] = "cpe-stable-backport: Backported in 6.1.33" +CVE_STATUS[CVE-2023-52510] = "cpe-stable-backport: Backported in 6.1.59" -CVE_STATUS[CVE-2022-48502] = "cpe-stable-backport: Backported in 6.1.40" +CVE_STATUS[CVE-2023-52511] = "cpe-stable-backport: Backported in 6.1.56" -CVE_STATUS[CVE-2022-48619] = "fixed-version: Fixed from version 5.18rc1" +CVE_STATUS[CVE-2023-52512] = "cpe-stable-backport: Backported in 6.1.59" -CVE_STATUS[CVE-2023-0030] = "fixed-version: Fixed from version 5.0rc1" +CVE_STATUS[CVE-2023-52513] = "cpe-stable-backport: Backported in 6.1.57" -CVE_STATUS[CVE-2023-0045] = "cpe-stable-backport: Backported in 6.1.5" +CVE_STATUS[CVE-2023-52515] = "cpe-stable-backport: Backported in 6.1.57" -CVE_STATUS[CVE-2023-0047] = "fixed-version: Fixed from version 5.16rc1" +CVE_STATUS[CVE-2023-52516] = "cpe-stable-backport: Backported in 6.1.56" -CVE_STATUS[CVE-2023-0122] = "fixed-version: Fixed from version 6.0rc4" +CVE_STATUS[CVE-2023-52517] = "cpe-stable-backport: Backported in 6.1.56" -CVE_STATUS[CVE-2023-0160] = "cpe-stable-backport: Backported in 6.1.28" +CVE_STATUS[CVE-2023-52518] = "cpe-stable-backport: Backported in 6.1.57" -CVE_STATUS[CVE-2023-0179] = "cpe-stable-backport: Backported in 6.1.7" +CVE_STATUS[CVE-2023-52519] = "cpe-stable-backport: Backported in 6.1.57" -CVE_STATUS[CVE-2023-0210] = "cpe-stable-backport: Backported in 6.1.5" +CVE_STATUS[CVE-2023-52520] = "cpe-stable-backport: Backported in 6.1.59" -CVE_STATUS[CVE-2023-0240] = "fixed-version: Fixed from version 5.10rc1" +CVE_STATUS[CVE-2023-52522] = "cpe-stable-backport: Backported in 6.1.57" -CVE_STATUS[CVE-2023-0266] = "cpe-stable-backport: Backported in 6.1.6" +CVE_STATUS[CVE-2023-52523] = "cpe-stable-backport: Backported in 6.1.57" -CVE_STATUS[CVE-2023-0386] = "cpe-stable-backport: Backported in 6.1.9" +CVE_STATUS[CVE-2023-52524] = "fixed-version: only affects 6.5rc1 onwards" -CVE_STATUS[CVE-2023-0394] = "cpe-stable-backport: Backported in 6.1.7" +CVE_STATUS[CVE-2023-52525] = "fixed-version: only affects 6.6rc1 onwards" -CVE_STATUS[CVE-2023-0458] = "cpe-stable-backport: Backported in 6.1.8" +CVE_STATUS[CVE-2023-52526] = "cpe-stable-backport: Backported in 6.1.57" -CVE_STATUS[CVE-2023-0459] = "cpe-stable-backport: Backported in 6.1.14" +CVE_STATUS[CVE-2023-52527] = "cpe-stable-backport: Backported in 6.1.57" -CVE_STATUS[CVE-2023-0461] = "cpe-stable-backport: Backported in 6.1.5" +CVE_STATUS[CVE-2023-52528] = "cpe-stable-backport: Backported in 6.1.57" -CVE_STATUS[CVE-2023-0468] = "fixed-version: Fixed from version 6.1rc7" +CVE_STATUS[CVE-2023-52529] = "cpe-stable-backport: Backported in 6.1.57" -CVE_STATUS[CVE-2023-0469] = "fixed-version: Fixed from version 6.1rc7" +CVE_STATUS[CVE-2023-52530] = "cpe-stable-backport: Backported in 6.1.57" -CVE_STATUS[CVE-2023-0590] = "fixed-version: Fixed from version 6.1rc2" +CVE_STATUS[CVE-2023-52531] = "cpe-stable-backport: Backported in 6.1.57" -# CVE-2023-0597 needs backporting (fixed from 6.2rc1) +CVE_STATUS[CVE-2023-52532] = "cpe-stable-backport: Backported in 6.1.59" -CVE_STATUS[CVE-2023-0615] = "fixed-version: Fixed from version 6.1rc3" +CVE_STATUS[CVE-2023-52559] = "cpe-stable-backport: Backported in 6.1.57" -CVE_STATUS[CVE-2023-1032] = "cpe-stable-backport: Backported in 6.1.16" +CVE_STATUS[CVE-2023-52560] = "cpe-stable-backport: Backported in 6.1.56" -CVE_STATUS[CVE-2023-1073] = "cpe-stable-backport: Backported in 6.1.9" +CVE_STATUS[CVE-2023-52561] = "cpe-stable-backport: Backported in 6.1.56" -CVE_STATUS[CVE-2023-1074] = "cpe-stable-backport: Backported in 6.1.9" +CVE_STATUS[CVE-2023-52562] = "cpe-stable-backport: Backported in 6.1.56" -CVE_STATUS[CVE-2023-1075] = "cpe-stable-backport: Backported in 6.1.11" +CVE_STATUS[CVE-2023-52563] = "cpe-stable-backport: Backported in 6.1.56" -CVE_STATUS[CVE-2023-1076] = "cpe-stable-backport: Backported in 6.1.16" +CVE_STATUS[CVE-2023-52564] = "fixed-version: only affects 6.5rc4 onwards" -CVE_STATUS[CVE-2023-1077] = "cpe-stable-backport: Backported in 6.1.16" +CVE_STATUS[CVE-2023-52565] = "cpe-stable-backport: Backported in 6.1.56" -CVE_STATUS[CVE-2023-1078] = "cpe-stable-backport: Backported in 6.1.12" +CVE_STATUS[CVE-2023-52566] = "cpe-stable-backport: Backported in 6.1.56" -CVE_STATUS[CVE-2023-1079] = "cpe-stable-backport: Backported in 6.1.16" +CVE_STATUS[CVE-2023-52567] = "fixed-version: only affects 6.4rc1 onwards" -CVE_STATUS[CVE-2023-1095] = "fixed-version: Fixed from version 6.0rc1" +CVE_STATUS[CVE-2023-52568] = "cpe-stable-backport: Backported in 6.1.56" -CVE_STATUS[CVE-2023-1118] = "cpe-stable-backport: Backported in 6.1.16" +CVE_STATUS[CVE-2023-52569] = "cpe-stable-backport: Backported in 6.1.56" -CVE_STATUS[CVE-2023-1192] = "cpe-stable-backport: Backported in 6.1.33" +CVE_STATUS[CVE-2023-52570] = "cpe-stable-backport: Backported in 6.1.56" -CVE_STATUS[CVE-2023-1193] = "cpe-stable-backport: Backported in 6.1.71" +CVE_STATUS[CVE-2023-52571] = "cpe-stable-backport: Backported in 6.1.56" -CVE_STATUS[CVE-2023-1194] = "cpe-stable-backport: Backported in 6.1.34" +CVE_STATUS[CVE-2023-52572] = "cpe-stable-backport: Backported in 6.1.56" -CVE_STATUS[CVE-2023-1195] = "fixed-version: Fixed from version 6.1rc3" +CVE_STATUS[CVE-2023-52573] = "cpe-stable-backport: Backported in 6.1.56" -CVE_STATUS[CVE-2023-1206] = "cpe-stable-backport: Backported in 6.1.43" +CVE_STATUS[CVE-2023-52574] = "cpe-stable-backport: Backported in 6.1.56" -CVE_STATUS[CVE-2023-1249] = "fixed-version: Fixed from version 5.18rc1" +CVE_STATUS[CVE-2023-52575] = "fixed-version: only affects 6.5rc6 onwards" -CVE_STATUS[CVE-2023-1252] = "fixed-version: Fixed from version 5.16rc1" +CVE_STATUS[CVE-2023-52576] = "cpe-stable-backport: Backported in 6.1.56" -CVE_STATUS[CVE-2023-1281] = "cpe-stable-backport: Backported in 6.1.13" +CVE_STATUS[CVE-2023-52577] = "fixed-version: only affects 6.6rc1 onwards" -CVE_STATUS[CVE-2023-1295] = "fixed-version: Fixed from version 5.12rc1" +CVE_STATUS[CVE-2023-52578] = "cpe-stable-backport: Backported in 6.1.56" -CVE_STATUS[CVE-2023-1380] = "cpe-stable-backport: Backported in 6.1.27" +CVE_STATUS[CVE-2023-52580] = "cpe-stable-backport: Backported in 6.1.56" -CVE_STATUS[CVE-2023-1382] = "fixed-version: Fixed from version 6.1rc7" +CVE_STATUS[CVE-2023-52581] = "fixed-version: only affects 6.5rc6 onwards" -CVE_STATUS[CVE-2023-1390] = "fixed-version: Fixed from version 5.11rc4" +CVE_STATUS[CVE-2023-52582] = "cpe-stable-backport: Backported in 6.1.56" -# CVE-2023-1476 has no known resolution +CVE_STATUS[CVE-2023-52583] = "cpe-stable-backport: Backported in 6.1.77" -CVE_STATUS[CVE-2023-1513] = "cpe-stable-backport: Backported in 6.1.13" +CVE_STATUS[CVE-2023-52584] = "cpe-stable-backport: Backported in 6.1.77" -CVE_STATUS[CVE-2023-1582] = "fixed-version: Fixed from version 5.17rc4" +# CVE-2023-52585 needs backporting (fixed from 6.8rc1) -CVE_STATUS[CVE-2023-1583] = "cpe-stable-backport: Backported in 6.1.22" +# CVE-2023-52586 needs backporting (fixed from 6.8rc1) -CVE_STATUS[CVE-2023-1611] = "cpe-stable-backport: Backported in 6.1.23" +CVE_STATUS[CVE-2023-52587] = "cpe-stable-backport: Backported in 6.1.77" -CVE_STATUS[CVE-2023-1637] = "fixed-version: Fixed from version 5.18rc2" +CVE_STATUS[CVE-2023-52588] = "cpe-stable-backport: Backported in 6.1.77" -CVE_STATUS[CVE-2023-1652] = "cpe-stable-backport: Backported in 6.1.9" +CVE_STATUS[CVE-2023-52589] = "cpe-stable-backport: Backported in 6.1.77" -CVE_STATUS[CVE-2023-1670] = "cpe-stable-backport: Backported in 6.1.22" +# CVE-2023-52590 needs backporting (fixed from 6.8rc1) -CVE_STATUS[CVE-2023-1829] = "cpe-stable-backport: Backported in 6.1.18" +# CVE-2023-52591 needs backporting (fixed from 6.8rc1) -CVE_STATUS[CVE-2023-1838] = "fixed-version: Fixed from version 5.18" +CVE_STATUS[CVE-2023-52593] = "cpe-stable-backport: Backported in 6.1.77" -CVE_STATUS[CVE-2023-1855] = "cpe-stable-backport: Backported in 6.1.21" +CVE_STATUS[CVE-2023-52594] = "cpe-stable-backport: Backported in 6.1.77" -CVE_STATUS[CVE-2023-1859] = "cpe-stable-backport: Backported in 6.1.25" +CVE_STATUS[CVE-2023-52595] = "cpe-stable-backport: Backported in 6.1.77" -CVE_STATUS[CVE-2023-1872] = "fixed-version: Fixed from version 5.18rc2" +# CVE-2023-52596 needs backporting (fixed from 6.8rc1) -CVE_STATUS[CVE-2023-1989] = "cpe-stable-backport: Backported in 6.1.22" +CVE_STATUS[CVE-2023-52597] = "cpe-stable-backport: Backported in 6.1.77" -CVE_STATUS[CVE-2023-1990] = "cpe-stable-backport: Backported in 6.1.21" +CVE_STATUS[CVE-2023-52598] = "cpe-stable-backport: Backported in 6.1.77" -CVE_STATUS[CVE-2023-1998] = "cpe-stable-backport: Backported in 6.1.16" +CVE_STATUS[CVE-2023-52599] = "cpe-stable-backport: Backported in 6.1.77" -CVE_STATUS[CVE-2023-2002] = "cpe-stable-backport: Backported in 6.1.27" +CVE_STATUS[CVE-2023-52600] = "cpe-stable-backport: Backported in 6.1.77" -CVE_STATUS[CVE-2023-2006] = "fixed-version: Fixed from version 6.1rc7" +CVE_STATUS[CVE-2023-52601] = "cpe-stable-backport: Backported in 6.1.77" -CVE_STATUS[CVE-2023-2007] = "fixed-version: Fixed from version 6.0rc1" +CVE_STATUS[CVE-2023-52602] = "cpe-stable-backport: Backported in 6.1.77" -CVE_STATUS[CVE-2023-2008] = "fixed-version: Fixed from version 5.19rc4" +CVE_STATUS[CVE-2023-52603] = "cpe-stable-backport: Backported in 6.1.77" -CVE_STATUS[CVE-2023-2019] = "fixed-version: Fixed from version 6.0rc1" +CVE_STATUS[CVE-2023-52604] = "cpe-stable-backport: Backported in 6.1.77" -CVE_STATUS[CVE-2023-20569] = "cpe-stable-backport: Backported in 6.1.44" +CVE_STATUS[CVE-2023-52606] = "cpe-stable-backport: Backported in 6.1.77" -CVE_STATUS[CVE-2023-20588] = "cpe-stable-backport: Backported in 6.1.45" +CVE_STATUS[CVE-2023-52607] = "cpe-stable-backport: Backported in 6.1.77" -CVE_STATUS[CVE-2023-20593] = "cpe-stable-backport: Backported in 6.1.41" +CVE_STATUS[CVE-2023-52608] = "cpe-stable-backport: Backported in 6.1.76" -CVE_STATUS[CVE-2023-20928] = "fixed-version: Fixed from version 6.0rc1" +CVE_STATUS[CVE-2023-52609] = "cpe-stable-backport: Backported in 6.1.75" -# CVE-2023-20937 has no known resolution +CVE_STATUS[CVE-2023-52610] = "cpe-stable-backport: Backported in 6.1.75" -CVE_STATUS[CVE-2023-20938] = "fixed-version: Fixed from version 5.18rc5" +CVE_STATUS[CVE-2023-52611] = "fixed-version: only affects 6.4rc1 onwards" -# CVE-2023-20941 has no known resolution +CVE_STATUS[CVE-2023-52612] = "cpe-stable-backport: Backported in 6.1.75" -CVE_STATUS[CVE-2023-21102] = "cpe-stable-backport: Backported in 6.1.8" +CVE_STATUS[CVE-2023-52613] = "fixed-version: only affects 6.6rc1 onwards" -CVE_STATUS[CVE-2023-21106] = "cpe-stable-backport: Backported in 6.1.9" +CVE_STATUS[CVE-2023-52614] = "cpe-stable-backport: Backported in 6.1.76" -CVE_STATUS[CVE-2023-2124] = "cpe-stable-backport: Backported in 6.1.33" +CVE_STATUS[CVE-2023-52615] = "cpe-stable-backport: Backported in 6.1.76" -CVE_STATUS[CVE-2023-21255] = "cpe-stable-backport: Backported in 6.1.31" +CVE_STATUS[CVE-2023-52616] = "cpe-stable-backport: Backported in 6.1.79" -# CVE-2023-21264 needs backporting (fixed from 6.4rc5) +CVE_STATUS[CVE-2023-52617] = "cpe-stable-backport: Backported in 6.1.77" -# CVE-2023-21400 has no known resolution +CVE_STATUS[CVE-2023-52618] = "cpe-stable-backport: Backported in 6.1.77" -CVE_STATUS[CVE-2023-2156] = "cpe-stable-backport: Backported in 6.1.26" +CVE_STATUS[CVE-2023-52619] = "cpe-stable-backport: Backported in 6.1.77" -CVE_STATUS[CVE-2023-2162] = "cpe-stable-backport: Backported in 6.1.11" +CVE_STATUS[CVE-2023-52620] = "cpe-stable-backport: Backported in 6.1.81" -CVE_STATUS[CVE-2023-2163] = "cpe-stable-backport: Backported in 6.1.26" +CVE_STATUS[CVE-2023-52621] = "cpe-stable-backport: Backported in 6.1.77" -CVE_STATUS[CVE-2023-2166] = "fixed-version: Fixed from version 6.1" +CVE_STATUS[CVE-2023-52622] = "cpe-stable-backport: Backported in 6.1.77" -# CVE-2023-2176 needs backporting (fixed from 6.3rc1) +CVE_STATUS[CVE-2023-52623] = "cpe-stable-backport: Backported in 6.1.77" -CVE_STATUS[CVE-2023-2177] = "fixed-version: Fixed from version 5.19" +# CVE-2023-52624 needs backporting (fixed from 6.8rc1) -CVE_STATUS[CVE-2023-2194] = "cpe-stable-backport: Backported in 6.1.22" +# CVE-2023-52625 needs backporting (fixed from 6.8rc1) -CVE_STATUS[CVE-2023-2235] = "cpe-stable-backport: Backported in 6.1.21" +CVE_STATUS[CVE-2023-52626] = "fixed-version: only affects 6.7rc2 onwards" -CVE_STATUS[CVE-2023-2236] = "fixed-version: Fixed from version 6.1rc7" +CVE_STATUS[CVE-2023-52627] = "cpe-stable-backport: Backported in 6.1.76" -CVE_STATUS[CVE-2023-2248] = "cpe-stable-backport: Backported in 6.1.26" +CVE_STATUS[CVE-2023-52628] = "cpe-stable-backport: Backported in 6.1.54" + +# CVE-2023-52629 needs backporting (fixed from 6.6rc1) + +CVE_STATUS[CVE-2023-52630] = "cpe-stable-backport: Backported in 6.1.78" + +CVE_STATUS[CVE-2023-52631] = "cpe-stable-backport: Backported in 6.1.78" + +CVE_STATUS[CVE-2023-52632] = "cpe-stable-backport: Backported in 6.1.77" + +CVE_STATUS[CVE-2023-52633] = "cpe-stable-backport: Backported in 6.1.77" + +# CVE-2023-52634 needs backporting (fixed from 6.8rc1) + +CVE_STATUS[CVE-2023-52635] = "cpe-stable-backport: Backported in 6.1.77" + +CVE_STATUS[CVE-2023-52636] = "fixed-version: only affects 6.6rc1 onwards" + +CVE_STATUS[CVE-2023-52637] = "cpe-stable-backport: Backported in 6.1.79" + +CVE_STATUS[CVE-2023-52638] = "cpe-stable-backport: Backported in 6.1.79" + +CVE_STATUS[CVE-2023-52639] = "cpe-stable-backport: Backported in 6.1.82" + +CVE_STATUS[CVE-2023-52640] = "cpe-stable-backport: Backported in 6.1.80" + +CVE_STATUS[CVE-2023-52641] = "cpe-stable-backport: Backported in 6.1.80" + +CVE_STATUS[CVE-2023-5345] = "cpe-stable-backport: Backported in 6.1.56" + +CVE_STATUS[CVE-2023-5633] = "fixed-version: only affects 6.2 onwards" + +CVE_STATUS[CVE-2023-5717] = "cpe-stable-backport: Backported in 6.1.60" + +CVE_STATUS[CVE-2023-5972] = "fixed-version: only affects 6.2rc1 onwards" + +# CVE-2023-6039 needs backporting (fixed from 6.5rc5) + +CVE_STATUS[CVE-2023-6040] = "fixed-version: Fixed from version 5.18rc1" + +CVE_STATUS[CVE-2023-6111] = "fixed-version: only affects 6.6rc3 onwards" + +CVE_STATUS[CVE-2023-6121] = "cpe-stable-backport: Backported in 6.1.65" + +CVE_STATUS[CVE-2023-6176] = "cpe-stable-backport: Backported in 6.1.54" + +CVE_STATUS[CVE-2023-6200] = "fixed-version: only affects 6.6rc1 onwards" + +# CVE-2023-6238 has no known resolution + +# CVE-2023-6240 has no known resolution + +CVE_STATUS[CVE-2023-6270] = "cpe-stable-backport: Backported in 6.1.83" + +CVE_STATUS[CVE-2023-6356] = "cpe-stable-backport: Backported in 6.1.75" + +CVE_STATUS[CVE-2023-6531] = "cpe-stable-backport: Backported in 6.1.68" + +# CVE-2023-6535 has no known resolution + +CVE_STATUS[CVE-2023-6536] = "cpe-stable-backport: Backported in 6.1.75" + +CVE_STATUS[CVE-2023-6546] = "cpe-stable-backport: Backported in 6.1.47" + +# CVE-2023-6560 needs backporting (fixed from 6.7rc4) + +CVE_STATUS[CVE-2023-6606] = "cpe-stable-backport: Backported in 6.1.70" + +CVE_STATUS[CVE-2023-6610] = "cpe-stable-backport: Backported in 6.1.74" + +CVE_STATUS[CVE-2023-6622] = "cpe-stable-backport: Backported in 6.1.68" + +CVE_STATUS[CVE-2023-6679] = "fixed-version: only affects 6.7rc1 onwards" + +CVE_STATUS[CVE-2023-6817] = "cpe-stable-backport: Backported in 6.1.68" + +CVE_STATUS[CVE-2023-6915] = "cpe-stable-backport: Backported in 6.1.74" + +CVE_STATUS[CVE-2023-6931] = "cpe-stable-backport: Backported in 6.1.68" + +CVE_STATUS[CVE-2023-6932] = "cpe-stable-backport: Backported in 6.1.66" + +CVE_STATUS[CVE-2023-7042] = "cpe-stable-backport: Backported in 6.1.83" + +CVE_STATUS[CVE-2023-7192] = "cpe-stable-backport: Backported in 6.1.18" + +CVE_STATUS[CVE-2024-0193] = "fixed-version: only affects 6.5rc6 onwards" + +CVE_STATUS[CVE-2024-0340] = "cpe-stable-backport: Backported in 6.1.78" + +CVE_STATUS[CVE-2024-0443] = "fixed-version: only affects 6.2rc1 onwards" + +CVE_STATUS[CVE-2024-0562] = "fixed-version: Fixed from version 6.0rc3" + +# CVE-2024-0564 has no known resolution + +CVE_STATUS[CVE-2024-0565] = "cpe-stable-backport: Backported in 6.1.69" + +CVE_STATUS[CVE-2024-0582] = "fixed-version: only affects 6.4rc1 onwards" + +CVE_STATUS[CVE-2024-0584] = "cpe-stable-backport: Backported in 6.1.66" + +CVE_STATUS[CVE-2024-0607] = "cpe-stable-backport: Backported in 6.1.64" -CVE_STATUS[CVE-2023-2269] = "cpe-stable-backport: Backported in 6.1.28" +CVE_STATUS[CVE-2024-0639] = "cpe-stable-backport: Backported in 6.1.39" -CVE_STATUS[CVE-2023-22995] = "fixed-version: Fixed from version 5.17rc1" +CVE_STATUS[CVE-2024-0641] = "cpe-stable-backport: Backported in 6.1.57" -CVE_STATUS[CVE-2023-22996] = "fixed-version: Fixed from version 5.18rc1" +CVE_STATUS[CVE-2024-0646] = "cpe-stable-backport: Backported in 6.1.69" -CVE_STATUS[CVE-2023-22997] = "cpe-stable-backport: Backported in 6.1.2" +CVE_STATUS[CVE-2024-0775] = "cpe-stable-backport: Backported in 6.1.29" -CVE_STATUS[CVE-2023-22998] = "fixed-version: Fixed from version 6.0rc1" +CVE_STATUS[CVE-2024-0841] = "cpe-stable-backport: Backported in 6.1.79" -CVE_STATUS[CVE-2023-22999] = "fixed-version: Fixed from version 5.17rc1" +CVE_STATUS[CVE-2024-1085] = "cpe-stable-backport: Backported in 6.1.75" -CVE_STATUS[CVE-2023-23000] = "fixed-version: Fixed from version 5.17rc1" +CVE_STATUS[CVE-2024-1086] = "cpe-stable-backport: Backported in 6.1.76" -CVE_STATUS[CVE-2023-23001] = "fixed-version: Fixed from version 5.17rc1" +CVE_STATUS[CVE-2024-1151] = "cpe-stable-backport: Backported in 6.1.79" -CVE_STATUS[CVE-2023-23002] = "fixed-version: Fixed from version 5.17rc1" +# CVE-2024-1312 needs backporting (fixed from 6.5rc4) -CVE_STATUS[CVE-2023-23003] = "fixed-version: Fixed from version 5.16rc6" +# CVE-2024-21803 has no known resolution -CVE_STATUS[CVE-2023-23004] = "fixed-version: Fixed from version 5.19rc1" +# CVE-2024-2193 has no known resolution -# CVE-2023-23005 needs backporting (fixed from 6.2rc1) +CVE_STATUS[CVE-2024-22099] = "cpe-stable-backport: Backported in 6.1.83" -CVE_STATUS[CVE-2023-23006] = "fixed-version: Fixed from version 5.16rc8" +# CVE-2024-22386 has no known resolution -# CVE-2023-23039 has no known resolution +CVE_STATUS[CVE-2024-22705] = "cpe-stable-backport: Backported in 6.1.71" -CVE_STATUS[CVE-2023-23454] = "cpe-stable-backport: Backported in 6.1.5" +CVE_STATUS[CVE-2024-23196] = "cpe-stable-backport: Backported in 6.1.47" -CVE_STATUS[CVE-2023-23455] = "cpe-stable-backport: Backported in 6.1.5" +CVE_STATUS[CVE-2024-23307] = "cpe-stable-backport: Backported in 6.1.84" -CVE_STATUS[CVE-2023-23559] = "cpe-stable-backport: Backported in 6.1.9" +# CVE-2024-23848 has no known resolution -CVE_STATUS[CVE-2023-23586] = "fixed-version: Fixed from version 5.12rc1" +CVE_STATUS[CVE-2024-23849] = "cpe-stable-backport: Backported in 6.1.76" -CVE_STATUS[CVE-2023-2430] = "cpe-stable-backport: Backported in 6.1.50" +CVE_STATUS[CVE-2024-23850] = "cpe-stable-backport: Backported in 6.1.79" -CVE_STATUS[CVE-2023-2483] = "cpe-stable-backport: Backported in 6.1.22" +CVE_STATUS[CVE-2024-23851] = "cpe-stable-backport: Backported in 6.1.79" -CVE_STATUS[CVE-2023-25012] = "cpe-stable-backport: Backported in 6.1.16" +# CVE-2024-24855 needs backporting (fixed from 6.5rc2) -CVE_STATUS[CVE-2023-2513] = "fixed-version: Fixed from version 6.0rc1" +# CVE-2024-24857 has no known resolution -CVE_STATUS[CVE-2023-25775] = "cpe-stable-backport: Backported in 6.1.53" +# CVE-2024-24858 has no known resolution -CVE_STATUS[CVE-2023-2598] = "fixed-version: only affects 6.3rc1 onwards" +# CVE-2024-24859 has no known resolution -# CVE-2023-26242 has no known resolution +CVE_STATUS[CVE-2024-24860] = "cpe-stable-backport: Backported in 6.1.75" -# CVE-2023-2640 has no known resolution +CVE_STATUS[CVE-2024-24861] = "cpe-stable-backport: Backported in 6.1.84" -CVE_STATUS[CVE-2023-26544] = "cpe-stable-backport: Backported in 6.1.3" +# CVE-2024-24864 has no known resolution -CVE_STATUS[CVE-2023-26545] = "cpe-stable-backport: Backported in 6.1.13" +# CVE-2024-25739 has no known resolution -CVE_STATUS[CVE-2023-26605] = "fixed-version: Fixed from version 6.1rc7" +# CVE-2024-25740 has no known resolution -CVE_STATUS[CVE-2023-26606] = "cpe-stable-backport: Backported in 6.1.2" +# CVE-2024-25741 has no known resolution -CVE_STATUS[CVE-2023-26607] = "fixed-version: Fixed from version 6.1rc1" +CVE_STATUS[CVE-2024-25744] = "cpe-stable-backport: Backported in 6.1.68" -CVE_STATUS[CVE-2023-28327] = "fixed-version: Fixed from version 6.1" +CVE_STATUS[CVE-2024-26581] = "fixed-version: only affects 6.5rc4 onwards" -CVE_STATUS[CVE-2023-28328] = "cpe-stable-backport: Backported in 6.1.2" +CVE_STATUS[CVE-2024-26582] = "cpe-stable-backport: Backported in 6.1.79" -CVE_STATUS[CVE-2023-28410] = "fixed-version: Fixed from version 5.19rc1" +CVE_STATUS[CVE-2024-26583] = "cpe-stable-backport: Backported in 6.1.79" -CVE_STATUS[CVE-2023-28464] = "fixed-version: only affects 6.3rc1 onwards" +CVE_STATUS[CVE-2024-26584] = "cpe-stable-backport: Backported in 6.1.84" -CVE_STATUS[CVE-2023-28466] = "cpe-stable-backport: Backported in 6.1.20" +CVE_STATUS[CVE-2024-26585] = "cpe-stable-backport: Backported in 6.1.84" -CVE_STATUS[CVE-2023-2860] = "fixed-version: Fixed from version 6.0rc5" +CVE_STATUS[CVE-2024-26586] = "cpe-stable-backport: Backported in 6.1.79" -CVE_STATUS[CVE-2023-28772] = "fixed-version: Fixed from version 5.14rc1" +CVE_STATUS[CVE-2024-26587] = "fixed-version: only affects 6.6rc1 onwards" -CVE_STATUS[CVE-2023-28866] = "cpe-stable-backport: Backported in 6.1.22" +CVE_STATUS[CVE-2024-26588] = "cpe-stable-backport: Backported in 6.1.75" -CVE_STATUS[CVE-2023-2898] = "cpe-stable-backport: Backported in 6.1.39" +CVE_STATUS[CVE-2024-26589] = "cpe-stable-backport: Backported in 6.1.75" -CVE_STATUS[CVE-2023-2985] = "cpe-stable-backport: Backported in 6.1.16" +CVE_STATUS[CVE-2024-26590] = "cpe-stable-backport: Backported in 6.1.80" -CVE_STATUS[CVE-2023-3006] = "fixed-version: Fixed from version 6.1rc1" +CVE_STATUS[CVE-2024-26591] = "cpe-stable-backport: Backported in 6.1.75" -# Skipping CVE-2023-3022, no affected_versions +CVE_STATUS[CVE-2024-26592] = "cpe-stable-backport: Backported in 6.1.75" -CVE_STATUS[CVE-2023-30456] = "cpe-stable-backport: Backported in 6.1.21" +CVE_STATUS[CVE-2024-26593] = "cpe-stable-backport: Backported in 6.1.79" -CVE_STATUS[CVE-2023-30772] = "cpe-stable-backport: Backported in 6.1.22" +CVE_STATUS[CVE-2024-26594] = "cpe-stable-backport: Backported in 6.1.75" -CVE_STATUS[CVE-2023-3090] = "cpe-stable-backport: Backported in 6.1.30" +# CVE-2024-26595 needs backporting (fixed from 6.8rc1) -CVE_STATUS[CVE-2023-3106] = "fixed-version: Fixed from version 4.8rc7" +# CVE-2024-26596 needs backporting (fixed from 6.8rc1) -# Skipping CVE-2023-3108, no affected_versions +CVE_STATUS[CVE-2024-26597] = "cpe-stable-backport: Backported in 6.1.75" -# CVE-2023-31081 has no known resolution +CVE_STATUS[CVE-2024-26598] = "cpe-stable-backport: Backported in 6.1.75" -# CVE-2023-31082 has no known resolution +CVE_STATUS[CVE-2024-26599] = "cpe-stable-backport: Backported in 6.1.75" -# CVE-2023-31083 needs backporting (fixed from 6.6rc1) +CVE_STATUS[CVE-2024-26600] = "cpe-stable-backport: Backported in 6.1.78" -# CVE-2023-31084 needs backporting (fixed from 6.4rc3) +CVE_STATUS[CVE-2024-26601] = "cpe-stable-backport: Backported in 6.1.78" -CVE_STATUS[CVE-2023-31085] = "cpe-stable-backport: Backported in 6.1.57" +CVE_STATUS[CVE-2024-26602] = "cpe-stable-backport: Backported in 6.1.79" -CVE_STATUS[CVE-2023-3111] = "fixed-version: Fixed from version 6.0rc2" +CVE_STATUS[CVE-2024-26603] = "cpe-stable-backport: Backported in 6.1.79" -CVE_STATUS[CVE-2023-3117] = "cpe-stable-backport: Backported in 6.1.35" +CVE_STATUS[CVE-2024-26604] = "fixed-version: only affects 6.6rc1 onwards" -CVE_STATUS[CVE-2023-31248] = "cpe-stable-backport: Backported in 6.1.39" +CVE_STATUS[CVE-2024-26605] = "fixed-version: only affects 6.7 onwards" -CVE_STATUS[CVE-2023-3141] = "cpe-stable-backport: Backported in 6.1.30" +CVE_STATUS[CVE-2024-26606] = "cpe-stable-backport: Backported in 6.1.79" -CVE_STATUS[CVE-2023-31436] = "cpe-stable-backport: Backported in 6.1.26" +CVE_STATUS[CVE-2024-26607] = "cpe-stable-backport: Backported in 6.1.76" -CVE_STATUS[CVE-2023-3159] = "fixed-version: Fixed from version 5.18rc6" +CVE_STATUS[CVE-2024-26608] = "cpe-stable-backport: Backported in 6.1.76" -CVE_STATUS[CVE-2023-3161] = "cpe-stable-backport: Backported in 6.1.11" +CVE_STATUS[CVE-2024-26610] = "cpe-stable-backport: Backported in 6.1.76" -CVE_STATUS[CVE-2023-3212] = "cpe-stable-backport: Backported in 6.1.33" +CVE_STATUS[CVE-2024-26611] = "fixed-version: only affects 6.6rc1 onwards" -CVE_STATUS[CVE-2023-3220] = "cpe-stable-backport: Backported in 6.1.16" +CVE_STATUS[CVE-2024-26612] = "cpe-stable-backport: Backported in 6.1.76" -CVE_STATUS[CVE-2023-32233] = "cpe-stable-backport: Backported in 6.1.28" +CVE_STATUS[CVE-2024-26614] = "cpe-stable-backport: Backported in 6.1.76" -CVE_STATUS[CVE-2023-32247] = "cpe-stable-backport: Backported in 6.1.29" +CVE_STATUS[CVE-2024-26615] = "cpe-stable-backport: Backported in 6.1.76" -CVE_STATUS[CVE-2023-32248] = "cpe-stable-backport: Backported in 6.1.28" +CVE_STATUS[CVE-2024-26616] = "fixed-version: only affects 6.4rc1 onwards" -CVE_STATUS[CVE-2023-32250] = "cpe-stable-backport: Backported in 6.1.29" +CVE_STATUS[CVE-2024-26617] = "fixed-version: only affects 6.7rc1 onwards" -CVE_STATUS[CVE-2023-32252] = "cpe-stable-backport: Backported in 6.1.29" +CVE_STATUS[CVE-2024-26618] = "fixed-version: only affects 6.5rc7 onwards" -CVE_STATUS[CVE-2023-32254] = "cpe-stable-backport: Backported in 6.1.28" +CVE_STATUS[CVE-2024-26619] = "fixed-version: only affects 6.7rc5 onwards" -CVE_STATUS[CVE-2023-32257] = "cpe-stable-backport: Backported in 6.1.29" +CVE_STATUS[CVE-2024-26620] = "cpe-stable-backport: Backported in 6.1.76" -CVE_STATUS[CVE-2023-32258] = "cpe-stable-backport: Backported in 6.1.29" +CVE_STATUS[CVE-2024-26621] = "fixed-version: only affects 6.7 onwards" -CVE_STATUS[CVE-2023-32269] = "cpe-stable-backport: Backported in 6.1.11" +CVE_STATUS[CVE-2024-26622] = "cpe-stable-backport: Backported in 6.1.81" -# CVE-2023-32629 has no known resolution +# CVE-2024-26623 needs backporting (fixed from 6.8rc3) -CVE_STATUS[CVE-2023-3268] = "cpe-stable-backport: Backported in 6.1.28" +CVE_STATUS[CVE-2024-26625] = "cpe-stable-backport: Backported in 6.1.77" -CVE_STATUS[CVE-2023-3269] = "cpe-stable-backport: Backported in 6.1.37" +CVE_STATUS[CVE-2024-26626] = "fixed-version: only affects 6.8rc1 onwards" -CVE_STATUS[CVE-2023-3312] = "fixed-version: only affects 6.2rc1 onwards" +CVE_STATUS[CVE-2024-26627] = "cpe-stable-backport: Backported in 6.1.77" -CVE_STATUS[CVE-2023-3317] = "fixed-version: only affects 6.2rc1 onwards" +CVE_STATUS[CVE-2024-26629] = "cpe-stable-backport: Backported in 6.1.79" -CVE_STATUS[CVE-2023-33203] = "cpe-stable-backport: Backported in 6.1.22" +CVE_STATUS[CVE-2024-26630] = "fixed-version: only affects 6.5rc1 onwards" -CVE_STATUS[CVE-2023-33250] = "fixed-version: only affects 6.2rc1 onwards" +CVE_STATUS[CVE-2024-26631] = "cpe-stable-backport: Backported in 6.1.75" -CVE_STATUS[CVE-2023-33288] = "cpe-stable-backport: Backported in 6.1.22" +CVE_STATUS[CVE-2024-26632] = "cpe-stable-backport: Backported in 6.1.75" -CVE_STATUS[CVE-2023-3338] = "fixed-version: Fixed from version 6.1rc1" +CVE_STATUS[CVE-2024-26633] = "cpe-stable-backport: Backported in 6.1.75" -CVE_STATUS[CVE-2023-3355] = "cpe-stable-backport: Backported in 6.1.16" +CVE_STATUS[CVE-2024-26634] = "fixed-version: only affects 6.6rc7 onwards" -CVE_STATUS[CVE-2023-3357] = "cpe-stable-backport: Backported in 6.1.2" +CVE_STATUS[CVE-2024-26635] = "cpe-stable-backport: Backported in 6.1.76" -CVE_STATUS[CVE-2023-3358] = "cpe-stable-backport: Backported in 6.1.9" +CVE_STATUS[CVE-2024-26636] = "cpe-stable-backport: Backported in 6.1.76" -CVE_STATUS[CVE-2023-3359] = "cpe-stable-backport: Backported in 6.1.11" +CVE_STATUS[CVE-2024-26637] = "fixed-version: only affects 6.7 onwards" -CVE_STATUS[CVE-2023-3389] = "fixed-version: Fixed from version 6.0rc1" +CVE_STATUS[CVE-2024-26638] = "cpe-stable-backport: Backported in 6.1.76" -CVE_STATUS[CVE-2023-3390] = "cpe-stable-backport: Backported in 6.1.35" +CVE_STATUS[CVE-2024-26639] = "fixed-version: only affects 6.8rc1 onwards" -CVE_STATUS[CVE-2023-33951] = "cpe-stable-backport: Backported in 6.1.13" +CVE_STATUS[CVE-2024-26640] = "cpe-stable-backport: Backported in 6.1.77" -CVE_STATUS[CVE-2023-33952] = "cpe-stable-backport: Backported in 6.1.13" +CVE_STATUS[CVE-2024-26641] = "cpe-stable-backport: Backported in 6.1.77" -# CVE-2023-3397 has no known resolution +CVE_STATUS[CVE-2024-26642] = "cpe-stable-backport: Backported in 6.1.84" -CVE_STATUS[CVE-2023-34255] = "cpe-stable-backport: Backported in 6.1.33" +CVE_STATUS[CVE-2024-26643] = "fixed-version: only affects 6.5rc6 onwards" -CVE_STATUS[CVE-2023-34256] = "cpe-stable-backport: Backported in 6.1.29" +CVE_STATUS[CVE-2024-26644] = "cpe-stable-backport: Backported in 6.1.76" -CVE_STATUS[CVE-2023-34319] = "cpe-stable-backport: Backported in 6.1.44" +CVE_STATUS[CVE-2024-26645] = "cpe-stable-backport: Backported in 6.1.76" -CVE_STATUS[CVE-2023-34324] = "cpe-stable-backport: Backported in 6.1.57" +CVE_STATUS[CVE-2024-26646] = "cpe-stable-backport: Backported in 6.1.76" -CVE_STATUS[CVE-2023-3439] = "fixed-version: Fixed from version 5.18rc5" +# CVE-2024-26647 needs backporting (fixed from 6.8rc1) -CVE_STATUS[CVE-2023-35001] = "cpe-stable-backport: Backported in 6.1.39" +# CVE-2024-26648 needs backporting (fixed from 6.8rc1) -CVE_STATUS[CVE-2023-3567] = "cpe-stable-backport: Backported in 6.1.11" +CVE_STATUS[CVE-2024-26649] = "fixed-version: only affects 6.3rc1 onwards" -# CVE-2023-35693 has no known resolution +CVE_STATUS[CVE-2024-26650] = "cpe-stable-backport: Backported in 6.1.76" -CVE_STATUS[CVE-2023-35788] = "cpe-stable-backport: Backported in 6.1.33" +CVE_STATUS[CVE-2024-26651] = "cpe-stable-backport: Backported in 6.1.83" -CVE_STATUS[CVE-2023-35823] = "cpe-stable-backport: Backported in 6.1.28" +CVE_STATUS[CVE-2024-26652] = "fixed-version: only affects 6.4rc1 onwards" -CVE_STATUS[CVE-2023-35824] = "cpe-stable-backport: Backported in 6.1.28" +CVE_STATUS[CVE-2024-26653] = "fixed-version: only affects 6.7rc1 onwards" -CVE_STATUS[CVE-2023-35826] = "cpe-stable-backport: Backported in 6.1.28" +CVE_STATUS[CVE-2024-26654] = "cpe-stable-backport: Backported in 6.1.84" -CVE_STATUS[CVE-2023-35827] = "cpe-stable-backport: Backported in 6.1.59" +# CVE-2024-26655 needs backporting (fixed from 6.9rc2) -CVE_STATUS[CVE-2023-35828] = "cpe-stable-backport: Backported in 6.1.28" +# CVE-2024-26656 needs backporting (fixed from 6.9rc1) -CVE_STATUS[CVE-2023-35829] = "cpe-stable-backport: Backported in 6.1.28" +CVE_STATUS[CVE-2024-26657] = "fixed-version: only affects 6.7rc1 onwards" -CVE_STATUS[CVE-2023-3609] = "cpe-stable-backport: Backported in 6.1.35" +# CVE-2024-26658 needs backporting (fixed from 6.8rc1) -CVE_STATUS[CVE-2023-3610] = "cpe-stable-backport: Backported in 6.1.36" +CVE_STATUS[CVE-2024-26659] = "cpe-stable-backport: Backported in 6.1.82" -CVE_STATUS[CVE-2023-3611] = "cpe-stable-backport: Backported in 6.1.40" +CVE_STATUS[CVE-2024-26660] = "cpe-stable-backport: Backported in 6.1.78" -# CVE-2023-3640 has no known resolution +# CVE-2024-26661 needs backporting (fixed from 6.8rc4) -CVE_STATUS[CVE-2023-37453] = "fixed-version: only affects 6.3rc1 onwards" +# CVE-2024-26662 needs backporting (fixed from 6.8rc4) -# CVE-2023-37454 has no known resolution +CVE_STATUS[CVE-2024-26663] = "cpe-stable-backport: Backported in 6.1.78" -CVE_STATUS[CVE-2023-3772] = "cpe-stable-backport: Backported in 6.1.47" +CVE_STATUS[CVE-2024-26664] = "cpe-stable-backport: Backported in 6.1.78" -CVE_STATUS[CVE-2023-3773] = "cpe-stable-backport: Backported in 6.1.47" +CVE_STATUS[CVE-2024-26665] = "cpe-stable-backport: Backported in 6.1.78" -CVE_STATUS[CVE-2023-3776] = "cpe-stable-backport: Backported in 6.1.40" +CVE_STATUS[CVE-2024-26666] = "fixed-version: only affects 6.5rc1 onwards" -CVE_STATUS[CVE-2023-3777] = "cpe-stable-backport: Backported in 6.1.42" +CVE_STATUS[CVE-2024-26667] = "cpe-stable-backport: Backported in 6.1.78" -CVE_STATUS[CVE-2023-3812] = "fixed-version: Fixed from version 6.1rc4" +CVE_STATUS[CVE-2024-26668] = "cpe-stable-backport: Backported in 6.1.76" -CVE_STATUS[CVE-2023-38409] = "cpe-stable-backport: Backported in 6.1.25" +# CVE-2024-26669 needs backporting (fixed from 6.8rc2) -CVE_STATUS[CVE-2023-38426] = "cpe-stable-backport: Backported in 6.1.30" +CVE_STATUS[CVE-2024-26670] = "fixed-version: only affects 6.6rc5 onwards" -CVE_STATUS[CVE-2023-38427] = "cpe-stable-backport: Backported in 6.1.34" +CVE_STATUS[CVE-2024-26671] = "cpe-stable-backport: Backported in 6.1.77" -CVE_STATUS[CVE-2023-38428] = "cpe-stable-backport: Backported in 6.1.30" +# CVE-2024-26672 needs backporting (fixed from 6.8rc1) -CVE_STATUS[CVE-2023-38429] = "cpe-stable-backport: Backported in 6.1.30" +CVE_STATUS[CVE-2024-26673] = "cpe-stable-backport: Backported in 6.1.77" -CVE_STATUS[CVE-2023-38430] = "cpe-stable-backport: Backported in 6.1.35" +CVE_STATUS[CVE-2024-26674] = "fixed-version: only affects 6.4rc1 onwards" -CVE_STATUS[CVE-2023-38431] = "cpe-stable-backport: Backported in 6.1.34" +CVE_STATUS[CVE-2024-26675] = "cpe-stable-backport: Backported in 6.1.78" -CVE_STATUS[CVE-2023-38432] = "cpe-stable-backport: Backported in 6.1.36" +CVE_STATUS[CVE-2024-26676] = "cpe-stable-backport: Backported in 6.1.78" -CVE_STATUS[CVE-2023-3863] = "cpe-stable-backport: Backported in 6.1.39" +# CVE-2024-26677 needs backporting (fixed from 6.8rc4) -CVE_STATUS[CVE-2023-3865] = "cpe-stable-backport: Backported in 6.1.36" +CVE_STATUS[CVE-2024-26678] = "fixed-version: only affects 6.7rc1 onwards" -CVE_STATUS[CVE-2023-3866] = "cpe-stable-backport: Backported in 6.1.36" +CVE_STATUS[CVE-2024-26679] = "cpe-stable-backport: Backported in 6.1.78" -CVE_STATUS[CVE-2023-3867] = "cpe-stable-backport: Backported in 6.1.40" +CVE_STATUS[CVE-2024-26680] = "cpe-stable-backport: Backported in 6.1.78" -CVE_STATUS[CVE-2023-39189] = "cpe-stable-backport: Backported in 6.1.54" +CVE_STATUS[CVE-2024-26681] = "cpe-stable-backport: Backported in 6.1.78" -# CVE-2023-39191 needs backporting (fixed from 6.3rc1) +CVE_STATUS[CVE-2024-26682] = "fixed-version: only affects 6.7rc1 onwards" -CVE_STATUS[CVE-2023-39192] = "cpe-stable-backport: Backported in 6.1.53" +CVE_STATUS[CVE-2024-26683] = "fixed-version: only affects 6.7rc1 onwards" -CVE_STATUS[CVE-2023-39193] = "cpe-stable-backport: Backported in 6.1.53" +CVE_STATUS[CVE-2024-26684] = "cpe-stable-backport: Backported in 6.1.78" -CVE_STATUS[CVE-2023-39194] = "cpe-stable-backport: Backported in 6.1.47" +CVE_STATUS[CVE-2024-26685] = "cpe-stable-backport: Backported in 6.1.79" -CVE_STATUS[CVE-2023-39197] = "cpe-stable-backport: Backported in 6.1.39" +CVE_STATUS[CVE-2024-26686] = "cpe-stable-backport: Backported in 6.1.82" -CVE_STATUS[CVE-2023-39198] = "cpe-stable-backport: Backported in 6.1.47" +CVE_STATUS[CVE-2024-26687] = "cpe-stable-backport: Backported in 6.1.81" -CVE_STATUS[CVE-2023-4004] = "cpe-stable-backport: Backported in 6.1.42" +CVE_STATUS[CVE-2024-26688] = "cpe-stable-backport: Backported in 6.1.79" -# CVE-2023-4010 has no known resolution +CVE_STATUS[CVE-2024-26689] = "cpe-stable-backport: Backported in 6.1.79" -CVE_STATUS[CVE-2023-4015] = "cpe-stable-backport: Backported in 6.1.43" +CVE_STATUS[CVE-2024-26690] = "fixed-version: only affects 6.6rc1 onwards" -CVE_STATUS[CVE-2023-40283] = "cpe-stable-backport: Backported in 6.1.45" +# CVE-2024-26691 needs backporting (fixed from 6.8rc5) -CVE_STATUS[CVE-2023-40791] = "fixed-version: only affects 6.3rc1 onwards" +CVE_STATUS[CVE-2024-26692] = "fixed-version: only affects 6.3rc1 onwards" -CVE_STATUS[CVE-2023-4128] = "cpe-stable-backport: Backported in 6.1.45" +CVE_STATUS[CVE-2024-26693] = "fixed-version: only affects 6.4rc1 onwards" -CVE_STATUS[CVE-2023-4132] = "cpe-stable-backport: Backported in 6.1.39" +CVE_STATUS[CVE-2024-26694] = "fixed-version: only affects 6.4rc1 onwards" -# CVE-2023-4133 needs backporting (fixed from 6.3) +CVE_STATUS[CVE-2024-26695] = "cpe-stable-backport: Backported in 6.1.79" -# CVE-2023-4134 needs backporting (fixed from 6.5rc1) +CVE_STATUS[CVE-2024-26696] = "cpe-stable-backport: Backported in 6.1.79" -CVE_STATUS[CVE-2023-4147] = "cpe-stable-backport: Backported in 6.1.43" +CVE_STATUS[CVE-2024-26697] = "cpe-stable-backport: Backported in 6.1.79" -CVE_STATUS[CVE-2023-4155] = "cpe-stable-backport: Backported in 6.1.46" +CVE_STATUS[CVE-2024-26698] = "cpe-stable-backport: Backported in 6.1.79" -CVE_STATUS[CVE-2023-4194] = "fixed-version: only affects 6.3rc1 onwards" +# CVE-2024-26699 needs backporting (fixed from 6.8rc5) -CVE_STATUS[CVE-2023-4206] = "cpe-stable-backport: Backported in 6.1.45" +CVE_STATUS[CVE-2024-26700] = "cpe-stable-backport: Backported in 6.1.82" -CVE_STATUS[CVE-2023-4207] = "cpe-stable-backport: Backported in 6.1.45" +CVE_STATUS[CVE-2024-26702] = "cpe-stable-backport: Backported in 6.1.79" -CVE_STATUS[CVE-2023-4208] = "cpe-stable-backport: Backported in 6.1.45" +CVE_STATUS[CVE-2024-26703] = "fixed-version: only affects 6.5rc1 onwards" -CVE_STATUS[CVE-2023-4244] = "cpe-stable-backport: Backported in 6.1.56" +CVE_STATUS[CVE-2024-26704] = "cpe-stable-backport: Backported in 6.1.79" -CVE_STATUS[CVE-2023-4273] = "cpe-stable-backport: Backported in 6.1.45" +CVE_STATUS[CVE-2024-26705] = "fixed-version: only affects 6.6rc2 onwards" -CVE_STATUS[CVE-2023-42752] = "cpe-stable-backport: Backported in 6.1.53" +CVE_STATUS[CVE-2024-26706] = "cpe-stable-backport: Backported in 6.1.79" -CVE_STATUS[CVE-2023-42753] = "cpe-stable-backport: Backported in 6.1.53" +CVE_STATUS[CVE-2024-26707] = "cpe-stable-backport: Backported in 6.1.79" -CVE_STATUS[CVE-2023-42754] = "cpe-stable-backport: Backported in 6.1.56" +CVE_STATUS[CVE-2024-26708] = "fixed-version: only affects 6.2rc1 onwards" -CVE_STATUS[CVE-2023-42755] = "cpe-stable-backport: Backported in 6.1.55" +CVE_STATUS[CVE-2024-26709] = "fixed-version: only affects 6.7rc1 onwards" -CVE_STATUS[CVE-2023-42756] = "fixed-version: only affects 6.4rc6 onwards" +CVE_STATUS[CVE-2024-26710] = "fixed-version: only affects 6.8rc1 onwards" -CVE_STATUS[CVE-2023-4385] = "fixed-version: Fixed from version 5.19rc1" +CVE_STATUS[CVE-2024-26711] = "fixed-version: only affects 6.2rc1 onwards" -CVE_STATUS[CVE-2023-4387] = "fixed-version: Fixed from version 5.18" +CVE_STATUS[CVE-2024-26712] = "cpe-stable-backport: Backported in 6.1.79" -CVE_STATUS[CVE-2023-4389] = "fixed-version: Fixed from version 5.18rc3" +# CVE-2024-26713 needs backporting (fixed from 6.8rc5) -CVE_STATUS[CVE-2023-4394] = "fixed-version: Fixed from version 6.0rc3" +CVE_STATUS[CVE-2024-26714] = "cpe-stable-backport: Backported in 6.1.79" -CVE_STATUS[CVE-2023-44466] = "cpe-stable-backport: Backported in 6.1.40" +CVE_STATUS[CVE-2024-26715] = "cpe-stable-backport: Backported in 6.1.79" -CVE_STATUS[CVE-2023-4459] = "fixed-version: Fixed from version 5.18" +CVE_STATUS[CVE-2024-26716] = "fixed-version: only affects 6.5rc1 onwards" -CVE_STATUS[CVE-2023-4563] = "cpe-stable-backport: Backported in 6.1.56" +CVE_STATUS[CVE-2024-26717] = "cpe-stable-backport: Backported in 6.1.79" -CVE_STATUS[CVE-2023-4569] = "cpe-stable-backport: Backported in 6.1.47" +CVE_STATUS[CVE-2024-26718] = "cpe-stable-backport: Backported in 6.1.79" -CVE_STATUS[CVE-2023-45862] = "cpe-stable-backport: Backported in 6.1.18" +# CVE-2024-26719 needs backporting (fixed from 6.8rc3) -CVE_STATUS[CVE-2023-45863] = "cpe-stable-backport: Backported in 6.1.16" +CVE_STATUS[CVE-2024-26720] = "cpe-stable-backport: Backported in 6.1.79" -CVE_STATUS[CVE-2023-45871] = "cpe-stable-backport: Backported in 6.1.53" +CVE_STATUS[CVE-2024-26721] = "fixed-version: only affects 6.7rc1 onwards" -CVE_STATUS[CVE-2023-45898] = "fixed-version: only affects 6.5rc1 onwards" +CVE_STATUS[CVE-2024-26722] = "fixed-version: only affects 6.7rc5 onwards" -CVE_STATUS[CVE-2023-4610] = "fixed-version: only affects 6.4rc1 onwards" +CVE_STATUS[CVE-2024-26723] = "cpe-stable-backport: Backported in 6.1.79" -CVE_STATUS[CVE-2023-4611] = "fixed-version: only affects 6.4rc1 onwards" +CVE_STATUS[CVE-2024-26724] = "fixed-version: only affects 6.7rc1 onwards" -# CVE-2023-4622 needs backporting (fixed from 6.5rc1) +CVE_STATUS[CVE-2024-26725] = "fixed-version: only affects 6.7rc1 onwards" -CVE_STATUS[CVE-2023-4623] = "cpe-stable-backport: Backported in 6.1.53" +CVE_STATUS[CVE-2024-26726] = "cpe-stable-backport: Backported in 6.1.79" -CVE_STATUS[CVE-2023-46343] = "cpe-stable-backport: Backported in 6.1.60" +CVE_STATUS[CVE-2024-26727] = "cpe-stable-backport: Backported in 6.1.79" -CVE_STATUS[CVE-2023-46813] = "cpe-stable-backport: Backported in 6.1.60" +CVE_STATUS[CVE-2024-26728] = "fixed-version: only affects 6.7rc1 onwards" -CVE_STATUS[CVE-2023-46838] = "cpe-stable-backport: Backported in 6.1.75" +CVE_STATUS[CVE-2024-26729] = "fixed-version: only affects 6.7rc1 onwards" -CVE_STATUS[CVE-2023-46862] = "cpe-stable-backport: Backported in 6.1.61" +CVE_STATUS[CVE-2024-26730] = "fixed-version: only affects 6.6rc1 onwards" -# CVE-2023-47233 has no known resolution +CVE_STATUS[CVE-2024-26731] = "fixed-version: only affects 6.4rc4 onwards" -CVE_STATUS[CVE-2023-4732] = "fixed-version: Fixed from version 5.14rc1" +CVE_STATUS[CVE-2024-26732] = "fixed-version: only affects 6.7rc1 onwards" -CVE_STATUS[CVE-2023-4881] = "cpe-stable-backport: Backported in 6.1.54" +CVE_STATUS[CVE-2024-26733] = "cpe-stable-backport: Backported in 6.1.80" -CVE_STATUS[CVE-2023-4921] = "cpe-stable-backport: Backported in 6.1.54" +CVE_STATUS[CVE-2024-26734] = "fixed-version: only affects 6.3rc1 onwards" -CVE_STATUS[CVE-2023-50431] = "cpe-stable-backport: Backported in 6.1.75" +CVE_STATUS[CVE-2024-26735] = "cpe-stable-backport: Backported in 6.1.80" -CVE_STATUS[CVE-2023-5090] = "cpe-stable-backport: Backported in 6.1.62" +CVE_STATUS[CVE-2024-26736] = "cpe-stable-backport: Backported in 6.1.80" -CVE_STATUS[CVE-2023-51042] = "cpe-stable-backport: Backported in 6.1.47" +CVE_STATUS[CVE-2024-26737] = "cpe-stable-backport: Backported in 6.1.80" -CVE_STATUS[CVE-2023-51043] = "cpe-stable-backport: Backported in 6.1.40" +# CVE-2024-26738 needs backporting (fixed from 6.8rc6) -CVE_STATUS[CVE-2023-5158] = "cpe-stable-backport: Backported in 6.1.57" +# CVE-2024-26739 needs backporting (fixed from 6.8rc6) -CVE_STATUS[CVE-2023-51779] = "cpe-stable-backport: Backported in 6.1.70" +# CVE-2024-26740 needs backporting (fixed from 6.8rc6) -CVE_STATUS[CVE-2023-5178] = "cpe-stable-backport: Backported in 6.1.60" +CVE_STATUS[CVE-2024-26741] = "cpe-stable-backport: Backported in 6.1.80" -CVE_STATUS[CVE-2023-51780] = "cpe-stable-backport: Backported in 6.1.69" +CVE_STATUS[CVE-2024-26742] = "cpe-stable-backport: Backported in 6.1.80" -CVE_STATUS[CVE-2023-51781] = "cpe-stable-backport: Backported in 6.1.69" +CVE_STATUS[CVE-2024-26743] = "cpe-stable-backport: Backported in 6.1.80" -CVE_STATUS[CVE-2023-51782] = "cpe-stable-backport: Backported in 6.1.69" +CVE_STATUS[CVE-2024-26744] = "cpe-stable-backport: Backported in 6.1.80" -CVE_STATUS[CVE-2023-5197] = "cpe-stable-backport: Backported in 6.1.56" +CVE_STATUS[CVE-2024-26745] = "cpe-stable-backport: Backported in 6.1.81" -CVE_STATUS[CVE-2023-52340] = "cpe-stable-backport: Backported in 6.1.73" +CVE_STATUS[CVE-2024-26746] = "fixed-version: only affects 6.4rc1 onwards" -CVE_STATUS[CVE-2023-5345] = "cpe-stable-backport: Backported in 6.1.56" +CVE_STATUS[CVE-2024-26747] = "cpe-stable-backport: Backported in 6.1.80" -CVE_STATUS[CVE-2023-5633] = "fixed-version: only affects 6.2 onwards" +CVE_STATUS[CVE-2024-26748] = "cpe-stable-backport: Backported in 6.1.80" -CVE_STATUS[CVE-2023-5717] = "cpe-stable-backport: Backported in 6.1.60" +CVE_STATUS[CVE-2024-26749] = "cpe-stable-backport: Backported in 6.1.80" -CVE_STATUS[CVE-2023-5972] = "fixed-version: only affects 6.2rc1 onwards" +CVE_STATUS[CVE-2024-26750] = "fixed-version: only affects 6.8rc5 onwards" -# CVE-2023-6039 needs backporting (fixed from 6.5rc5) +CVE_STATUS[CVE-2024-26751] = "cpe-stable-backport: Backported in 6.1.80" -CVE_STATUS[CVE-2023-6040] = "fixed-version: Fixed from version 5.18rc1" +CVE_STATUS[CVE-2024-26752] = "cpe-stable-backport: Backported in 6.1.80" -CVE_STATUS[CVE-2023-6111] = "fixed-version: only affects 6.6rc3 onwards" +CVE_STATUS[CVE-2024-26753] = "cpe-stable-backport: Backported in 6.1.80" -CVE_STATUS[CVE-2023-6121] = "cpe-stable-backport: Backported in 6.1.65" +CVE_STATUS[CVE-2024-26754] = "cpe-stable-backport: Backported in 6.1.80" -CVE_STATUS[CVE-2023-6176] = "cpe-stable-backport: Backported in 6.1.54" +CVE_STATUS[CVE-2024-26755] = "fixed-version: only affects 6.7rc1 onwards" -CVE_STATUS[CVE-2023-6200] = "fixed-version: only affects 6.6rc1 onwards" +# CVE-2024-26756 needs backporting (fixed from 6.8rc6) -# CVE-2023-6238 has no known resolution +# CVE-2024-26757 needs backporting (fixed from 6.8rc6) -# CVE-2023-6240 has no known resolution +# CVE-2024-26758 needs backporting (fixed from 6.8rc6) -# CVE-2023-6270 has no known resolution +CVE_STATUS[CVE-2024-26759] = "cpe-stable-backport: Backported in 6.1.80" -# CVE-2023-6356 has no known resolution +CVE_STATUS[CVE-2024-26760] = "cpe-stable-backport: Backported in 6.1.80" -CVE_STATUS[CVE-2023-6531] = "cpe-stable-backport: Backported in 6.1.68" +CVE_STATUS[CVE-2024-26761] = "cpe-stable-backport: Backported in 6.1.80" -# CVE-2023-6535 has no known resolution +CVE_STATUS[CVE-2024-26762] = "fixed-version: only affects 6.7rc1 onwards" -# CVE-2023-6536 has no known resolution +CVE_STATUS[CVE-2024-26763] = "cpe-stable-backport: Backported in 6.1.80" -CVE_STATUS[CVE-2023-6546] = "cpe-stable-backport: Backported in 6.1.47" +CVE_STATUS[CVE-2024-26764] = "cpe-stable-backport: Backported in 6.1.80" -# CVE-2023-6560 needs backporting (fixed from 6.7rc4) +CVE_STATUS[CVE-2024-26765] = "cpe-stable-backport: Backported in 6.1.80" -CVE_STATUS[CVE-2023-6606] = "cpe-stable-backport: Backported in 6.1.70" +CVE_STATUS[CVE-2024-26766] = "cpe-stable-backport: Backported in 6.1.80" -CVE_STATUS[CVE-2023-6610] = "cpe-stable-backport: Backported in 6.1.74" +# CVE-2024-26767 needs backporting (fixed from 6.8rc5) -CVE_STATUS[CVE-2023-6622] = "cpe-stable-backport: Backported in 6.1.68" +# CVE-2024-26768 needs backporting (fixed from 6.8rc4) -CVE_STATUS[CVE-2023-6679] = "fixed-version: only affects 6.7rc1 onwards" +CVE_STATUS[CVE-2024-26769] = "cpe-stable-backport: Backported in 6.1.80" -CVE_STATUS[CVE-2023-6817] = "cpe-stable-backport: Backported in 6.1.68" +# CVE-2024-26770 needs backporting (fixed from 6.8rc3) -CVE_STATUS[CVE-2023-6915] = "cpe-stable-backport: Backported in 6.1.74" +CVE_STATUS[CVE-2024-26771] = "cpe-stable-backport: Backported in 6.1.80" -CVE_STATUS[CVE-2023-6931] = "cpe-stable-backport: Backported in 6.1.68" +CVE_STATUS[CVE-2024-26772] = "cpe-stable-backport: Backported in 6.1.80" -CVE_STATUS[CVE-2023-6932] = "cpe-stable-backport: Backported in 6.1.66" +CVE_STATUS[CVE-2024-26773] = "cpe-stable-backport: Backported in 6.1.80" -# CVE-2023-7042 has no known resolution +CVE_STATUS[CVE-2024-26774] = "cpe-stable-backport: Backported in 6.1.80" -CVE_STATUS[CVE-2023-7192] = "cpe-stable-backport: Backported in 6.1.18" +CVE_STATUS[CVE-2024-26775] = "cpe-stable-backport: Backported in 6.1.80" -CVE_STATUS[CVE-2024-0193] = "fixed-version: only affects 6.5rc6 onwards" +CVE_STATUS[CVE-2024-26776] = "cpe-stable-backport: Backported in 6.1.80" -# CVE-2024-0340 needs backporting (fixed from 6.4rc6) +CVE_STATUS[CVE-2024-26777] = "cpe-stable-backport: Backported in 6.1.80" -CVE_STATUS[CVE-2024-0443] = "fixed-version: only affects 6.2rc1 onwards" +CVE_STATUS[CVE-2024-26778] = "cpe-stable-backport: Backported in 6.1.80" -CVE_STATUS[CVE-2024-0562] = "fixed-version: Fixed from version 6.0rc3" +CVE_STATUS[CVE-2024-26779] = "cpe-stable-backport: Backported in 6.1.80" -# CVE-2024-0564 has no known resolution +CVE_STATUS[CVE-2024-26780] = "fixed-version: only affects 6.8rc4 onwards" -CVE_STATUS[CVE-2024-0565] = "cpe-stable-backport: Backported in 6.1.69" +CVE_STATUS[CVE-2024-26781] = "fixed-version: only affects 6.8rc6 onwards" -CVE_STATUS[CVE-2024-0582] = "fixed-version: only affects 6.4rc1 onwards" +CVE_STATUS[CVE-2024-26782] = "cpe-stable-backport: Backported in 6.1.81" -CVE_STATUS[CVE-2024-0584] = "cpe-stable-backport: Backported in 6.1.66" +# CVE-2024-26783 needs backporting (fixed from 6.8rc7) -CVE_STATUS[CVE-2024-0607] = "cpe-stable-backport: Backported in 6.1.64" +# CVE-2024-26784 needs backporting (fixed from 6.8rc7) -CVE_STATUS[CVE-2024-0639] = "cpe-stable-backport: Backported in 6.1.39" +CVE_STATUS[CVE-2024-26785] = "fixed-version: only affects 6.6rc1 onwards" -CVE_STATUS[CVE-2024-0641] = "cpe-stable-backport: Backported in 6.1.57" +CVE_STATUS[CVE-2024-26786] = "fixed-version: only affects 6.6rc1 onwards" -CVE_STATUS[CVE-2024-0646] = "cpe-stable-backport: Backported in 6.1.69" +CVE_STATUS[CVE-2024-26787] = "cpe-stable-backport: Backported in 6.1.81" -CVE_STATUS[CVE-2024-0775] = "cpe-stable-backport: Backported in 6.1.29" +CVE_STATUS[CVE-2024-26788] = "cpe-stable-backport: Backported in 6.1.81" -# CVE-2024-0841 has no known resolution +CVE_STATUS[CVE-2024-26789] = "cpe-stable-backport: Backported in 6.1.81" -CVE_STATUS[CVE-2024-1085] = "cpe-stable-backport: Backported in 6.1.75" +CVE_STATUS[CVE-2024-26790] = "cpe-stable-backport: Backported in 6.1.81" -CVE_STATUS[CVE-2024-1086] = "cpe-stable-backport: Backported in 6.1.76" +CVE_STATUS[CVE-2024-26791] = "cpe-stable-backport: Backported in 6.1.81" -# CVE-2024-1312 needs backporting (fixed from 6.5rc4) +CVE_STATUS[CVE-2024-26792] = "fixed-version: only affects 6.8rc4 onwards" -# CVE-2024-21803 has no known resolution +CVE_STATUS[CVE-2024-26793] = "cpe-stable-backport: Backported in 6.1.81" -# CVE-2024-22099 has no known resolution +CVE_STATUS[CVE-2024-26794] = "fixed-version: only affects 6.8rc6 onwards" -# CVE-2024-22386 has no known resolution +CVE_STATUS[CVE-2024-26795] = "cpe-stable-backport: Backported in 6.1.81" -CVE_STATUS[CVE-2024-22705] = "cpe-stable-backport: Backported in 6.1.71" +CVE_STATUS[CVE-2024-26796] = "fixed-version: only affects 6.6rc1 onwards" -# CVE-2024-23196 has no known resolution +# CVE-2024-26797 needs backporting (fixed from 6.8rc7) -# CVE-2024-23307 has no known resolution +CVE_STATUS[CVE-2024-26798] = "cpe-stable-backport: Backported in 6.1.81" -# CVE-2024-23848 has no known resolution +# CVE-2024-26799 needs backporting (fixed from 6.8rc7) -CVE_STATUS[CVE-2024-23849] = "cpe-stable-backport: Backported in 6.1.76" +CVE_STATUS[CVE-2024-26800] = "fixed-version: only affects 6.8rc5 onwards" -# CVE-2024-23850 has no known resolution +CVE_STATUS[CVE-2024-26801] = "cpe-stable-backport: Backported in 6.1.81" -# CVE-2024-23851 has no known resolution +CVE_STATUS[CVE-2024-26802] = "cpe-stable-backport: Backported in 6.1.81" -# CVE-2024-24855 has no known resolution +CVE_STATUS[CVE-2024-26803] = "cpe-stable-backport: Backported in 6.1.81" -# CVE-2024-24857 has no known resolution +CVE_STATUS[CVE-2024-26804] = "cpe-stable-backport: Backported in 6.1.81" -# CVE-2024-24858 has no known resolution +CVE_STATUS[CVE-2024-26805] = "cpe-stable-backport: Backported in 6.1.81" -# CVE-2024-24859 has no known resolution +# CVE-2024-26806 needs backporting (fixed from 6.8rc7) -# CVE-2024-24860 has no known resolution +CVE_STATUS[CVE-2024-26807] = "fixed-version: only affects 6.4rc1 onwards" -# CVE-2024-24861 has no known resolution +CVE_STATUS[CVE-2024-26808] = "cpe-stable-backport: Backported in 6.1.76" -# CVE-2024-24864 has no known resolution +CVE_STATUS[CVE-2024-26809] = "cpe-stable-backport: Backported in 6.1.83"