From patchwork Wed Jul 16 13:48:50 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Bruce Ashfield X-Patchwork-Id: 66968 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 519D8C83F37 for ; Wed, 16 Jul 2025 13:49:06 +0000 (UTC) Received: from mail-qk1-f181.google.com (mail-qk1-f181.google.com [209.85.222.181]) by mx.groups.io with SMTP id smtpd.web10.22787.1752673737509570133 for ; Wed, 16 Jul 2025 06:48:57 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@gmail.com header.s=20230601 header.b=UogZg3LY; spf=pass (domain: gmail.com, ip: 209.85.222.181, mailfrom: bruce.ashfield@gmail.com) Received: by mail-qk1-f181.google.com with SMTP id af79cd13be357-7e2e3108841so400545885a.3 for ; Wed, 16 Jul 2025 06:48:57 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1752673736; x=1753278536; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=fXjRFmXXsZ0GEwxlttVhifi4yrWkEV8G/BI4lCM79YE=; b=UogZg3LYbWwj8fKgD7pxXWGuCW9z1MR3DE+CywACMVcMMzTWKOyOHpXzc12NrwJxPp mIoygRjqchnJSFsNgzgXNWIm7OzhedE70KafGLwub/03Xu0Ac+LZ5B8J0dzAC/5JHSCz nDxybsbd5BIuszwmxxMpqPcKzEu1p9ugnrDWkBhSf9KlcMkcaTwOQaN5Xl0dJweMbJaS rv6o/nEOhuI81FBUEdh5cF85xw9zxMy6KvEbW8VRoqL6pIfc8PbJhl531CL2WQgIAAis P08/pYyxARillC5XwtrxF6YwvtuOeshfx5x7ZVDssfv9+1DP9vXl57ATFjpvRVoN+QjJ DBBw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1752673736; x=1753278536; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=fXjRFmXXsZ0GEwxlttVhifi4yrWkEV8G/BI4lCM79YE=; b=s6j6Hl1qfZ8Ou074cE6K5+CM0oJCf+QDkkPU6LViuVNgXy8SiINUeL9kZKjYOT8c05 VXRmmjCdZKUhoW77UTfbIqxx/i5tQYhSKFworu4xFOAOIH3jfzBSxdRXulwevpEqa1qw QiNLphlm7gqMfOKn/7uF1LgQyHsBW090Je/7zH9AFDNKw/ITYHFBuUMnemiQ99VGdnr5 HpbfA+T0oTS9Y2p6ThSWiSEtMKvd8NNfIhOCq1V45V7b1oj34i55WC22N+GIjbfO5jnG oAFgMo+YNTZleIOI/RxnePQYxzYzdstacEeZcwGuo1JOCq5G35eKeZpfunBtqe2mIGsQ HZ8g== X-Gm-Message-State: AOJu0YwKDqiTzcqdksXfe4Si5ZoPDpPqWgIlzMZPKENarVzAfAD7cKLv GrlQ877YkktBUqVmu7nXOkxkhPiGwMrsI57/D12vuu/4S+UPb3GsZjjdqxuabd+n X-Gm-Gg: ASbGncu6gQ6dy6uxFZNXySiG0V17Tg+Zz6dlBD9BTQGbIBDHr3hSejgAAbkPe2WJ2c2 gLkZDplW/mVW7876m1Sw3v346ya4QRya+HX4n95LfrxLAzGwGsfv8+W55dh2Gmzw1Ck+mvasUvf dz7vImYAoZ8Q8nWrZDa/HXU9pPfRyg4W+/2e4QEPhPheCkXgOSfoXT+1/1daprXuYZ+TAEkPCL/ 6/Nc5TTTFzG713GIGOxPJBhyoKFqTPdUkWrHznSqxakOxJM2PMBd1XFRy77ZurEsCq4kaOpR3cP iETHWy02OHMMs+dedgNAjY6JxxNsKNsOhGU4Fiu/YjVz4AVhN2nFaUy3a3kf5tU+LNAceQH809h 7DDFvJbQ/WnuGw4r3yHby6fpj74YzaJgx0GvkIm/Lj71SLPG4XIBqu5NPW97zFse3C7PMU7vt9U ZMREEj/lIQZlv59klpfMqhgaw= X-Google-Smtp-Source: AGHT+IHJdv/NIxIOMN1HtnlRCRjlC9Xqi5zNIgruijL50h4rHJ0sU42l9ZaDFRBtfRbCwdD3K1Cy3w== X-Received: by 2002:a05:620a:438a:b0:7e3:2c8e:a22d with SMTP id af79cd13be357-7e343563fe8mr400413985a.13.1752673736262; Wed, 16 Jul 2025 06:48:56 -0700 (PDT) Received: from bruce-XPS-8940.localdomain (pool-174-112-62-108.cpe.net.cable.rogers.com. [174.112.62.108]) by smtp.gmail.com with ESMTPSA id af79cd13be357-7e3443d830bsm84245085a.25.2025.07.16.06.48.55 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 16 Jul 2025 06:48:55 -0700 (PDT) From: bruce.ashfield@gmail.com To: richard.purdie@linuxfoundation.org Cc: openembedded-core@lists.openembedded.org Subject: [PATCH 1/4] linux-yocto-dev: bump to v6.16 Date: Wed, 16 Jul 2025 09:48:50 -0400 Message-Id: X-Mailer: git-send-email 2.39.2 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Wed, 16 Jul 2025 13:49:06 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/220456 From: Bruce Ashfield Signed-off-by: Bruce Ashfield --- meta/recipes-kernel/linux/linux-yocto-dev.bb | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/meta/recipes-kernel/linux/linux-yocto-dev.bb b/meta/recipes-kernel/linux/linux-yocto-dev.bb index 4b1f93a692..a4aa6df256 100644 --- a/meta/recipes-kernel/linux/linux-yocto-dev.bb +++ b/meta/recipes-kernel/linux/linux-yocto-dev.bb @@ -14,7 +14,7 @@ require recipes-kernel/linux/linux-yocto.inc # provide this .inc to set specific revisions include recipes-kernel/linux/linux-yocto-dev-revisions.inc -KBRANCH = "v6.15/standard/base" +KBRANCH = "v6.16/standard/base" KMETA = "kernel-meta" SRC_URI = "git://git.yoctoproject.org/linux-yocto-dev.git;branch=${KBRANCH};name=machine;protocol=https \ @@ -28,7 +28,7 @@ SRC_URI = "git://git.yoctoproject.org/linux-yocto-dev.git;branch=${KBRANCH};name SRCREV_machine ?= '${@oe.utils.conditional("PREFERRED_PROVIDER_virtual/kernel", "linux-yocto-dev", "${AUTOREV}", "29594404d7fe73cd80eaa4ee8c43dcc53970c60e", d)}' SRCREV_meta ?= '${@oe.utils.conditional("PREFERRED_PROVIDER_virtual/kernel", "linux-yocto-dev", "${AUTOREV}", "29594404d7fe73cd80eaa4ee8c43dcc53970c60e", d)}' -LINUX_VERSION ?= "6.15" +LINUX_VERSION ?= "6.16" LINUX_VERSION_EXTENSION ?= "-yoctodev-${LINUX_KERNEL_TYPE}" PV = "${LINUX_VERSION}+git" From patchwork Wed Jul 16 13:48:51 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Bruce Ashfield X-Patchwork-Id: 66966 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 37CAAC83F22 for ; Wed, 16 Jul 2025 13:49:06 +0000 (UTC) Received: from mail-qk1-f182.google.com (mail-qk1-f182.google.com [209.85.222.182]) by mx.groups.io with SMTP id smtpd.web11.22529.1752673738945899302 for ; Wed, 16 Jul 2025 06:48:59 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@gmail.com header.s=20230601 header.b=NxeQdBQ+; spf=pass (domain: gmail.com, ip: 209.85.222.182, mailfrom: bruce.ashfield@gmail.com) Received: by mail-qk1-f182.google.com with SMTP id af79cd13be357-7e33d36491dso205525285a.3 for ; Wed, 16 Jul 2025 06:48:58 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1752673738; x=1753278538; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=IyKZuOH/Eddx8cn+h7SPSmsBPDwwopXmmx/O8Xy5Xpk=; b=NxeQdBQ+E/oafy+2Jxi9Oet6dW31EGveVzKNcWgHhmzHWbj3LnzGfdCf4KnwPpNhiq jyRdph8tQWg7LQ96TyuOv760aQ+fsZZzkfDfKKEjHzVtV7LxEiq7kmRAN/TpLvNIKF9+ H4ToH4pvyKZbTyYVykjYbH7RsnwPl+6Fs7PVxfT2FG9C3Qvr4DIWQ+49BWcxqsZlu1mj WllaTZLifXmYQ3zZZ4+PtqbChy9GrWKk2GGsRZfc7Ui6vxHVuA3qsvUIieQsTqQDneCR CVGMWBbygCo5L5mxpzi1sMwP24DUuOGzNcAXXhQzCCFvpoSqsHJwl2yPDRCMlSazNYns wRLA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1752673738; x=1753278538; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=IyKZuOH/Eddx8cn+h7SPSmsBPDwwopXmmx/O8Xy5Xpk=; b=CkpwPtpu87Yh6ZfyrxdSkJDmutiS2TTxKvalGSlNFD3m5NVyKuNXZw1e3vjg4Ru27x xQkNIbc/Bc31kNxkOG/YEDLOBTMhhgzqSo2LT82aW1L5S/ZfHX/djnVw/5m875D+eU8Y WrfvyPWkPFjW5TV0BqrUFjWZW/T9SGdmsqptoWhgKHjed44105+mt3IXLnKDJ78XccMZ OXfgph52nyElbV9YV/VA8iwvllCm00UrqGFVh8mrtOm7YEtuBAbdIl8IOPMyzzmq7mXp /mt/yowb38xLVGoBoTam5RH3K9ElZoeoGXx0n3tM5g6U/jN6Euq42R5EVgOrtNan0KKg l7Mw== X-Gm-Message-State: AOJu0YxjFRCEz7VWTdmncIW9V4M0aVgQKm3ILO87drDAL8GcgRJ6vAoR AGZYWrMVStxp65DqqZUGU6h8ee/7GZ53PfAgsCzZt4a85vbEqXGiaVoZcjayEnI2 X-Gm-Gg: ASbGncvzvKtTo8R2sZHBG7IgjEtzN8Q6ki9nsDMCa/87WdD/aF1T4bPxonQ5+u3WMzb ffDf5y8/EAJn2DnRMJIq/7h0Wywt0UppYJjJcb7DdndHlQCZl1wjI7GkMg/7e0k+WG6ynUtCLBg xT9mol/Xg8QVy9CAlSF000+ZwTE8Jp/MoznSLobDW12237P7KnRKZsoQXbgI/2yx+VL4Eoltz+5 rsyQAs+QvNgW5n9IJMuM6dwTZQ6MmaKbZ137VG8v4YfZlk9b3Ce1T0j7chCzih0vY4ghJ6HCW6B IsUbOedfaKc7gaoauJ47xfPSMuWujjkRNLOULSP1ikPBR3YxYG2/L4mIdhoWYs3JwK9Yueq0vLm JLDjsnJPnyschij5FavTmec5+fw05p9hoOHJItwAVd3j9hujLlaPbJBuTKYfYbl8unJOMXiAsBg NHKEVwTtKKKZ0QuRngjP0z5SlkDTScoSwbvg== X-Google-Smtp-Source: AGHT+IHSiVCeRfShBbrRxeqwsgcHeZcvJFDhK/WbZYErfuJtdHVUF1bve0tKXLpKgj1+0IT6k4zNkg== X-Received: by 2002:a05:620a:400e:b0:7ca:cd16:b433 with SMTP id af79cd13be357-7e342b509dcmr418048985a.31.1752673737830; Wed, 16 Jul 2025 06:48:57 -0700 (PDT) Received: from bruce-XPS-8940.localdomain (pool-174-112-62-108.cpe.net.cable.rogers.com. [174.112.62.108]) by smtp.gmail.com with ESMTPSA id af79cd13be357-7e3443d830bsm84245085a.25.2025.07.16.06.48.56 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 16 Jul 2025 06:48:56 -0700 (PDT) From: bruce.ashfield@gmail.com To: richard.purdie@linuxfoundation.org Cc: openembedded-core@lists.openembedded.org Subject: [PATCH 2/4] kernel-devsrc/x86: add v6.16+ build requirements Date: Wed, 16 Jul 2025 09:48:51 -0400 Message-Id: <2b9e0ef1d143967102ba79647cbe2e865f95dbf0.1752673419.git.bruce.ashfield@gmail.com> X-Mailer: git-send-email 2.39.2 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Wed, 16 Jul 2025 13:49:06 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/220457 From: Bruce Ashfield We require cpufeaturemasks.awk to create the build components for x86. Signed-off-by: Bruce Ashfield --- meta/recipes-kernel/linux/kernel-devsrc.bb | 1 + 1 file changed, 1 insertion(+) diff --git a/meta/recipes-kernel/linux/kernel-devsrc.bb b/meta/recipes-kernel/linux/kernel-devsrc.bb index 3d2eb3929e..0dc9772429 100644 --- a/meta/recipes-kernel/linux/kernel-devsrc.bb +++ b/meta/recipes-kernel/linux/kernel-devsrc.bb @@ -294,6 +294,7 @@ do_install() { cp -a --parents arch/x86/tools/relocs_common.c $kerneldir/build/ cp -a --parents arch/x86/tools/relocs.h $kerneldir/build/ cp -a --parents arch/x86/tools/gen-insn-attr-x86.awk $kerneldir/build/ 2>/dev/null || : + cp -a --parents arch/x86/tools/cpufeaturemasks.awk $kerneldir/build/ 2>/dev/null || : cp -a --parents arch/x86/purgatory/purgatory.c $kerneldir/build/ # 4.18 + have unified the purgatory files, so we ignore any errors if From patchwork Wed Jul 16 13:48:52 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Bruce Ashfield X-Patchwork-Id: 66970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 3E774C83F1B for ; Wed, 16 Jul 2025 13:49:06 +0000 (UTC) Received: from mail-qk1-f182.google.com (mail-qk1-f182.google.com [209.85.222.182]) by mx.groups.io with SMTP id smtpd.web11.22530.1752673741400788205 for ; Wed, 16 Jul 2025 06:49:01 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@gmail.com header.s=20230601 header.b=B+cSDL3D; spf=pass (domain: gmail.com, ip: 209.85.222.182, mailfrom: bruce.ashfield@gmail.com) Received: by mail-qk1-f182.google.com with SMTP id af79cd13be357-7e32c5a174cso255931185a.1 for ; Wed, 16 Jul 2025 06:49:01 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1752673740; x=1753278540; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=cw4oWFqbrF6aMio/s6wpR/qSk1JfplnAysEV9C5KSY8=; b=B+cSDL3DX+aHsY/16X/vF+wSVA0h8y4qmHntKyttGNINxTThC7vMkqUvS2L0IM+2zT Hi/8CZ+LtawblUaEkZLdFjKoeLPPuBwGJgO85POFkNDPX5dJJUn7CJtcF8TqwzL0MWe9 rkecwVrIDG74G0qpoboV8vrUvp4Ovf2TAGhLtR8fUBAUoR3asodif8Iyjcbhm8VLvZp+ naPqji9lhXdWmZqcg9OFXIjChJAc6PRW4NPMz4AuYFOdl6HJW1e+KhvUreTTvWwdQO+I 3Q5Hkqp72cWL/UDmlA/tbwzBFYVQad0MM0LKBwrH7knK7osdbhYv2AHwWYfZKj5ogTxm Qb2g== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1752673740; x=1753278540; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=cw4oWFqbrF6aMio/s6wpR/qSk1JfplnAysEV9C5KSY8=; b=dTumjPN1hVbxvBLPqIgTgMxmOvlfNQs7Tk+mcl1hHipJ249bPz7Kmi9LueEbMH6rTk yZa636X8A30QGL8YTHc/QJTsdBEFAzijIYFKWtf0tGbtqLsVyu8FQx6wUJ5ZFH7EBOMk OsUzrcrjkMJWreBO3ccsgvNJjwlVDc9ttwDFAsKmL/pjjjDXp38rKtCuNft43EDIU8oI Rxlyv+orW3PQKCZOyyKpPfjOMMah/ErbxL+ciT9MwchT9YKjsFoW6GpBfL+jTRc4B/6R 6jEIwCKww2IJkjY2Yjqc7sSi9nwgergTNZr9A1AngnpztZQ7qKBRiZXlD7Zeyg0sPpfU VEhA== X-Gm-Message-State: AOJu0YxCqb3OFtfr6bNH5C8mlpSbF7eqdaHgDeQnC7cjPGf9iyh8BCSt Gy9qSC+F/4y3uEY29aCIEMU8mfvP65jCkevHVZhJkAGc1tT2m5TjE8J2UixRRdfW X-Gm-Gg: ASbGncsqgIGzYBq5czM32pE2UzGAbLyNXmyjE5ktWQU4qBY6Yyrmfx6HjZfivCnLBd9 2UNGrK1QcK37BSfH5BHJo0fCbPfFpkOiQUKIrN4Co0lItzI+V4qyuXto1CG55KdZnc2g3spJCcd n4KdsvB36xh7CVbY2O+khjFVnp9nHrpMIdsY1Xpvu0MR1H0XEZDKXMSL1fsg8p2VGa6tvVvb1my 6fNNC132IUmDhA5kLvfJLikezpH8oeUA/J7FwMdaAjQPY5OnKKyWYccBEttQV5Mdy9TUw94rl+z vgx1ihGnYZSMtbHfgcmkENoriCplhIqWLXneyLwNyYh08ZbyUALl286eRFviDjm0/o64Au5MLJv m78HkpBPG/18PWgfZBjIRfUVG8y9E/xtpUMLSXaSqeaUQvSTKpXTgH18OvbAGw3c687/mFPtEVO p99lNmd23oWuPJdq0gO/MvvDo= X-Google-Smtp-Source: AGHT+IGc8ChvRXly9i+uzORuAHPjq6JoDlIk6mdyWhIKr4btovq4w3soBgRRqwC0J4SE4kl6sZBSzg== X-Received: by 2002:a05:620a:2a14:b0:7d7:32ac:3381 with SMTP id af79cd13be357-7e342a5edb3mr465458385a.1.1752673739503; Wed, 16 Jul 2025 06:48:59 -0700 (PDT) Received: from bruce-XPS-8940.localdomain (pool-174-112-62-108.cpe.net.cable.rogers.com. [174.112.62.108]) by smtp.gmail.com with ESMTPSA id af79cd13be357-7e3443d830bsm84245085a.25.2025.07.16.06.48.57 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 16 Jul 2025 06:48:58 -0700 (PDT) From: bruce.ashfield@gmail.com To: richard.purdie@linuxfoundation.org Cc: openembedded-core@lists.openembedded.org Subject: [PATCH 3/4] linux-yocto/6.12: update to v6.12.38 Date: Wed, 16 Jul 2025 09:48:52 -0400 Message-Id: <9566f4a781deb023a14a85749d9d63d116d505a9.1752673419.git.bruce.ashfield@gmail.com> X-Mailer: git-send-email 2.39.2 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Wed, 16 Jul 2025 13:49:06 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/220458 From: Bruce Ashfield Updating linux-yocto/6.12 to the latest korg -stable release that comprises the following commits: 259f4977409c Linux 6.12.38 faac2abe895d x86/CPU/AMD: Properly check the TSA microcode fbad404f04d7 Linux 6.12.37 0029b3c1320b x86/process: Move the buffer clearing before MONITOR 331cfdd27429 x86/microcode/AMD: Add TSA microcode SHAs d5d66e31fd9a KVM: SVM: Advertise TSA CPUID bits to guests 7a0395f6607a x86/bugs: Add a Transient Scheduler Attacks mitigation 0720e436e594 x86/bugs: Rename MDS machinery to something more generic 4c443046d8c9 mm: userfaultfd: fix race of userfaultfd_move and swap cache ead91de35d9c mm/vmalloc: fix data race in show_numa_info() 679bf9a0ccb8 powerpc/kernel: Fix ppc_save_regs inclusion in build c782f98eef14 usb: typec: displayport: Fix potential deadlock f65ad436e4bc platform/x86: think-lmi: Fix sysfs group cleanup 5805edbea588 platform/x86: think-lmi: Fix kobject cleanup b11397bf9ade platform/x86: think-lmi: Create ksets consecutively f5fe094f35a3 riscv: cpu_ops_sbi: Use static array for boot_data d8ca2036f30d powercap: intel_rapl: Do not change CLAMPING bit if ENABLE bit cannot be changed 53892dc68693 iommu/rockchip: prevent iommus dead loop when two masters share one IOMMU 5f28563f0c68 optee: ffa: fix sleep in atomic context ccdc472b4df6 Logitech C-270 even more broken 4c37963d67fb i2c/designware: Fix an initialization issue c745744a8231 dma-buf: fix timeout handling in dma_resv_wait_timeout v2 631f9de9a7f4 cifs: all initializations for tcon should happen in tcon_info_alloc 7b02e09fc0ba smb: client: fix readdir returning wrong type with POSIX extensions 7cb875016032 usb: acpi: fix device link removal c68a27bbebbd usb: chipidea: udc: disconnect/reconnect from host when do suspend/resume 3b1407caac17 usb: dwc3: Abort suspend on soft disconnect failure 27199ab79079 usb: cdnsp: Fix issue with CV Bad Descriptor test b68e355a6132 usb: cdnsp: do not disable slot for disabled slot 46f758928156 Input: iqs7222 - explicitly define number of external channels dbdd2a232019 Input: xpad - support Acer NGR 200 Controller 195597e0beb3 xhci: Disable stream for xHC controller with XHCI_BROKEN_STREAMS 8bfd11dae3fb xhci: dbc: Flush queued requests before stopping dbc 9f3b2e497deb xhci: dbctty: disable ECHO flag by default fbebc2254af8 usb: xhci: quirk for data loss in ISOC transfers 9f7589318928 Revert "usb: xhci: Implement xhci_handshake_check_state() helper" 8caccd2eac33 usb: xhci: Skip xhci_reset in xhci_resume if xhci is being removed 1a81dfc9d10a NFSv4/flexfiles: Fix handling of NFS level errors in I/O 5e110e867941 drm/xe: Allow dropping kunit dependency as built-in 994b0bc2a0e8 drm/xe/bmg: Update Wa_22019338487 beb89ada5715 IB/mlx5: Fix potential deadlock in MR deregistration f6588557023e RDMA/mlx5: Fix cache entry update on dereg error f94c422157f3 fs: export anon_inode_make_secure_inode() and fix secretmem LSM bypass cdd9862252a0 module: Provide EXPORT_SYMBOL_GPL_FOR_MODULES() helper e036efbe5822 add a string-to-qstr constructor 42c5a4b47d4a rcu: Return early if callback is not specified c40b207cafd0 mtd: spinand: fix memory leak of ECC engine conf 18ff4ed6a33a ACPICA: Refuse to evaluate a method if arguments are missing 327997afbb5e wifi: ath6kl: remove WARN on bad firmware input 1b1026563999 wifi: mac80211: drop invalid source address OCB frames 3e554f115374 aoe: defer rexmit timer downdev work to workqueue 7296c938df24 scsi: target: Fix NULL pointer dereference in core_scsi3_decode_spec_i_port() 3d546c8b1070 regulator: fan53555: add enable_time support and soft-start times 2ec1cc322a01 ASoC: amd: yc: update quirk data for HP Victus 39e36a744ec3 powerpc: Fix struct termio related ioctl macros 19bd7597858d genirq/irq_sim: Initialize work context pointers properly c584b9b62c0c platform/x86/amd/pmc: Add PCSpecialist Lafite Pro V 14M to 8042 quirks list f8155ee19ddc ASoC: amd: yc: Add quirk for MSI Bravo 17 D7VF internal mic c24c06bd14f2 ata: pata_cs5536: fix build on 32-bit UML 3ce57d493dd8 ata: libata-acpi: Do not assume 40 wire cable if no devices are enabled f42b8e575395 ALSA: sb: Force to disable DMAs once when DMA mode is changed c5e0af68c899 ALSA: sb: Don't allow changing the DMA mode during operations 3f6ce8433a90 drm/msm: Fix another leak in the submit error path 0eaa495b3d57 drm/msm: Fix a fence leak in submit error path c0527f7534c0 scsi: lpfc: Restore clearing of NLP_UNREG_INP in ndlp->nlp_flag 790ce73721ab sched_ext: Make scx_group_set_weight() always update tg->scx.weight 7ccaa5fa5d25 drm/amdgpu/mes: add missing locking in helper functions 238a218d422e arm64: dts: qcom: x1e80100-crd: mark l12b and l15b always-on 646442758910 drm/amd/display: Add more checks for DSC / HUBP ONO guarantees 81ebb8d755d9 drm/amdgpu: add kicker fws loading for gfx11/smu13/psp13 710deaff6aeb drm/i915/dp_mst: Work around Thunderbolt sink disconnect after SINK_COUNT_ESI read b47a1f9323c2 drm/amdgpu: VCN v5_0_1 to prevent FW checking RB during DPG pause 4f77d8f8a93e drm/simpledrm: Do not upcast in release helpers acf9ab15ec97 selinux: change security_compute_sid to return the ssid or tsid on match 6d0b588614c4 drm/xe/guc: Explicitly exit CT safe mode on unwind ff6482fb4589 drm/xe/guc: Dead CT helper e595433c6399 drm/xe: Replace double space with single space after comma 0dadcd17e212 drm/xe: move DPT l2 flush to a more sensible place 1883a83695fe drm/xe: Allow bo mapping on multiple ggtts ce1ef3b64ef7 drm/xe: add interface to request physical alignment for buffer objects 98e5c71e7e74 drm/xe: Move DSB l2 flush to a more sensible place e5f01b2b6771 drm/xe: Fix DSB buffer coherency 61628111e74f mfd: exynos-lpass: Fix another error handling path in exynos_lpass_probe() e0fefe9bc07e netfs: Fix oops in write-retry from mis-resetting the subreq iterator c2a952fb41cc remoteproc: k3-r5: Refactor sequential core power up/down operations b14a64c1a97f remoteproc: k3-r5: Use devm_rproc_add() helper 0ea3572c15ad remoteproc: k3-r5: Use devm_ioremap_wc() helper e392148f7fa0 remoteproc: k3-r5: Use devm_kcalloc() helper f802fb717dfd remoteproc: k3-r5: Add devm action to release reserved memory 5eec92eb4fe7 remoteproc: k3: Call of_node_put(rmem_np) only once in three functions 5b6eb04c0552 ubsan: integer-overflow: depend on BROKEN to keep this out of CI f3a472b91408 arm64: dts: qcom: sm8650: add the missing l2 cache node 5a867d09f533 arm64: dts: renesas: white-hawk-single: Improve Ethernet TSN description 7f0e93324122 arm64: dts: renesas: Factor out White Hawk Single board support b9baad894b27 arm64: dts: renesas: Use interrupts-extended for Ethernet PHYs d8b92a122aed arm64: dts: qcom: sm8650: Fix domain-idle-state for CPU2 67b3bb57fa17 arm64: dts: qcom: sm8650: change labels to lower-case 4265682c29c9 bpf: Do not include stack ptr register in precision backtracking bookkeeping c5474a7b04cc bpf: use common instruction history across all states be1e0287ac78 hisi_acc_vfio_pci: bugfix the problem of uninstalling driver bac4641756c2 hisi_acc_vfio_pci: bugfix cache write-back issue ea405fb41449 scsi: lpfc: Avoid potential ndlp use-after-free in dev_loss_tmo_callbk 6857cbf0e4b3 scsi: lpfc: Change lpfc_nodelist nlp_flag member into a bitmask ae082dbcef5b scsi: lpfc: Remove NLP_RELEASE_RPI flag from nodelist structure 8912b139a8d4 f2fs: zone: fix to calculate first_zoned_segno correctly ffbbe11577b7 f2fs: zone: introduce first_zoned_segno in f2fs_sb_info 58330262213a f2fs: decrease spare area for pinned files for zoned devices 81fdecac3f2c iommu: ipmmu-vmsa: avoid Wformat-security warning 7d151bf9bd2b RDMA/rxe: Fix "trying to register non-static key in rxe_qp_do_cleanup" bug 7e48e3ddf9e3 wifi: ath12k: fix wrong handling of CCMP256 and GCMP ciphers 3fffbb8d33de wifi: ath12k: Handle error cases during extended skb allocation 316060297e20 wifi: ath12k: fix skb_ext_desc leak in ath12k_dp_tx() error path b77a5ecb3d3b bonding: Mark active offloaded xfrm_states b24c3c5b421e ACPI: thermal: Execute _SCP before reading trip points 0c44a4095803 ACPI: thermal: Fix stale comment regarding trip points da45b381aafa ASoC: tas2764: Reinit cache on part reset d1f8358c5d35 ASoC: tas2764: Extend driver to SN012776 9468bcd92d64 gfs2: Don't start unnecessary transactions during log flush 519aed5bdab7 gfs2: Move gfs2_trans_add_databufs a2562bdd35e9 sched/fair: Fixup wake_up_sync() vs DELAYED_DEQUEUE 3edcabcfc253 sched/fair: Add new cfs_rq.h_nr_runnable 0cc4721a7182 sched/fair: Rename h_nr_running into h_nr_queued 2dc82f0d781b btrfs: fix wrong start offset for delalloc space release during mmap write 5ff2ed0f0aca btrfs: prepare btrfs_page_mkwrite() for large folios cde7f9407884 gfs2: deallocate inodes in gfs2_create_inode 8e753fc3d5fb gfs2: Move GIF_ALLOC_FAILED check out of gfs2_ea_dealloc 24ae2de15bda gfs2: Move gfs2_dinode_dealloc 4f66983aeb02 gfs2: Replace GIF_DEFER_DELETE with GLF_DEFER_DELETE 7df46e6f8847 gfs2: Add GLF_PENDING_REPLY flag fbb2d296d4ad gfs2: Decode missing glock flags in tracepoints 9649fec0f9c2 gfs2: Prevent inode creation race af2ce45c2824 gfs2: Rename dinode_demise to evict_behavior 862ca0b49f1a gfs2: Rename GIF_{DEFERRED -> DEFER}_DELETE 170af4314e4d gfs2: Initialize gl_no_formal_ino earlier 33b65fcec79e kunit: qemu_configs: Disable faulting tests on 32-bit SPARC b70cda91569a kunit: qemu_configs: sparc: Explicitly enable CONFIG_SPARC32=y a55f301e607c kunit: qemu_configs: sparc: use Zilog console 8a039506c032 crypto: zynqmp-sha - Add locking d78f79a2c1ff spinlock: extend guard with spinlock_bh variants 9a0b8ef2a91b crypto: iaa - Do not clobber req->base.data e23ac0026624 crypto: iaa - Remove dst_null support 3f4adfc58700 arm64: dts: rockchip: fix internal USB hub instability on RK3399 Puma 2ba9db22d72a smb: client: fix race condition in negotiate timeout by using more precise timing 4db893a9bf9e amd-xgbe: do not double read link status a553afd91f55 net/sched: Always pass notifications when child class becomes empty 56aebaaa3adc nui: Fix dma_mapping_error() check 446ac00b86be rose: fix dangling neighbour pointers in rose_rt_device_down() 16858ab7fd61 enic: fix incorrect MTU comparison in enic_change_mtu() 6074bff08ac2 amd-xgbe: align CL37 AN sequence as per databook f358d949cea2 lib: test_objagg: Set error message in check_expect_hints_stats() 50c86c094533 netfs: Fix i_size updating 9b55b7bdb0bb smb: client: set missing retry flag in cifs_writev_callback() 590eb2574929 smb: client: set missing retry flag in cifs_readv_callback() cd8c8c20de3b smb: client: set missing retry flag in smb2_writev_callback() 3eb39038dca3 igc: disable L1.2 PCI-E link substate to avoid performance issue 9a36715cd6bc idpf: convert control queue mutex to a spinlock 018ff57fd79c idpf: return 0 size for RSS key if not supported 6a17e0d27fbe drm/i915/gsc: mei interrupt top half should be in irq disabled context 5a7ae7bebdc4 drm/i915/gt: Fix timeline left held on VMA alloc error 510a6095d754 net: usb: lan78xx: fix WARN in __netif_napi_del_locked on disconnect 3f6932ef2537 smb: client: fix warning when reconnecting channel 6a5348dbd745 drm/bridge: aux-hpd-bridge: fix assignment of the of_node 800a6bde38f9 platform/mellanox: mlxreg-lc: Fix logic error in power state check 206e2dca0ee5 platform/x86: dell-wmi-sysman: Fix class device unregistration 8d6b2f704f6e platform/x86: dell-sysman: Directly use firmware_attributes_class 48edcece52e0 platform/x86: think-lmi: Fix class device unregistration 1cef9e9e0090 platform/x86: think-lmi: Directly use firmware_attributes_class b36faa83285f platform/x86: firmware_attributes_class: Simplify API b5c180ec1fbc platform/x86: firmware_attributes_class: Move include linux/device/class.h 1958bccfa47a platform/x86: hp-bioscfg: Fix class device unregistration 0386a68f959a platform/x86: hp-bioscfg: Directly use firmware_attributes_class 5df3b870bc38 platform/x86: dell-wmi-sysman: Fix WMI data block retrieval in sysfs callbacks 431e58d56fcb nvmet: fix memory leak of bio integrity f0fee863a7cb nvme: Fix incorrect cdw15 value in passthru error logging 9d4064787d8d drm/i915/selftests: Change mock_request() to return error pointers 3832ddc2fae8 spi: spi-fsl-dspi: Clear completion counter before initiating transfer 0a38b1836894 drm/exynos: fimd: Guard display clock control with runtime PM calls dbd187e8c18c dpaa2-eth: fix xdp_rxq_info leak 91a6b86d5845 ethernet: atl1: Add missing DMA mapping error checks and count errors 735ac80fa913 btrfs: use btrfs_record_snapshot_destroy() during rmdir bfd5c9e83d89 btrfs: propagate last_unlink_trans earlier when doing a rmdir 1728fef7ca37 btrfs: record new subvolume in parent dir earlier to avoid dir logging races d6d806004605 btrfs: fix inode lookup error handling during log replay 401d098f92ea btrfs: fix invalid inode pointer dereferences during log replay 0502d1127436 btrfs: return a btrfs_inode from read_one_inode() 56e9882ba22f btrfs: return a btrfs_inode from btrfs_iget_logging() 7ac790dc2ba0 btrfs: fix iteration of extrefs during log replay e4c3176acecf btrfs: fix missing error handling when searching for inode refs during log replay 381c1c121979 Bluetooth: Prevent unintended pause by checking if advertising is active b611a5bf44e2 platform/mellanox: nvsw-sn2201: Fix bus number in adapter error message 4bbdb8dd35b4 platform/mellanox: mlxbf-pmc: Fix duplicate event ID for CACHE_DATA1 bd69049f981d RDMA/mlx5: Fix vport loopback for MPV device 3d8d401d3333 RDMA/mlx5: Fix CC counters query for MPV a33a0c15b762 RDMA/mlx5: Fix HW counters query for non-representor devices e4ff9dedeb56 scsi: ufs: core: Fix spelling of a sysfs attribute name b1abc5ab47d6 scsi: sd: Fix VPD page 0xb7 length check 218ae6bfe253 scsi: qla4xxx: Fix missing DMA mapping error in qla4xxx_alloc_pdu() 350dae778b63 scsi: qla2xxx: Fix DMA mapping test in qla24xx_get_port_database() 864a54c1243e NFSv4/pNFS: Fix a race to wake on NFS_LAYOUT_DRAIN 3c94212b57be nfs: Clean up /proc/net/rpc/nfs when nfs_fs_proc_net_init() fails. 93fccfa71c66 RDMA/mlx5: Initialize obj_event->obj_sub_list before xa_insert 9d2ef890e499 RDMA/mlx5: Fix unsafe xarray access in implicit ODP handling f5fe78cfcba1 platform/mellanox: mlxbf-tmfifo: fix vring_desc.len assignment 896e0d9337b5 arm64: dts: apple: t8103: Fix PCIe BCM4377 nodename 31405510a48d firmware: arm_ffa: Replace mutex with rwlock to avoid sleep in atomic context 2c07fd0eada8 firmware: arm_ffa: Move memory allocation outside the mutex locking 076fa20b4f57 firmware: arm_ffa: Fix memory leak by freeing notifier callback node 9ff95ed0371a drm/v3d: Disable interrupts before resetting the GPU ca40e57b22a0 mtk-sd: reset host->mrq on prepare_data() error 3419bc6a7b65 mtk-sd: Prevent memory corruption from DMA map failure cfbdcabab2fb mtk-sd: Fix a pagefault in dma_unmap_sg() for not prepared data 5581e694d3a1 usb: typec: altmodes/displayport: do not index invalid pin_assignments ea20568895c1 Input: cs40l50-vibra - fix potential NULL dereference in cs40l50_upload_owt() e4d19e5d71b2 regulator: gpio: Fix the out-of-bounds access to drvdata::gpiods dae12bc688b8 iommufd/selftest: Fix iommufd_dirty_tracking with large hugepage sizes a99f80c88a97 Bluetooth: MGMT: mesh_send: check instances prior disabling advertising 44bb1e13b454 Bluetooth: MGMT: set_mesh: update LE scan interval and window 3672fe9d1ed6 Bluetooth: hci_sync: revert some mesh modifications 0698a2eb7d89 Bluetooth: HCI: Set extended advertising data synchronously 50345c93698e mmc: core: sd: Apply BROKEN_SD_DISCARD quirk earlier ec9be081c577 Revert "mmc: sdhci: Disable SD card clock before changing parameters" cf7235914dc4 mmc: sdhci: Add a helper function for dump register in dynamic debug mode 9546118ba789 net: libwx: fix the incorrect display of the queue number 75705b44e0b9 vsock/vmci: Clear the vmci transport packet properly when initializing it e036b72d6a16 net: txgbe: request MISC IRQ in ndo_open a54280b0eb99 s390/pci: Do not try re-enabling load/store if device is disabled 2640c230aac4 s390/pci: Fix stale function handles in error handling bc68bc356334 virtio-net: ensure the received length does not exceed allocated size 892f6ed9a4a3 virtio-net: xsk: rx: fix the frame's length check bd6c1932ac9c rtc: cmos: use spin_lock_irqsave in cmos_interrupt ee61aec8529e rtc: pcf2127: fix SPI command byte for PCF2131 669e6c723b32 rtc: pcf2127: add missing semicolon after statement Signed-off-by: Bruce Ashfield --- .../linux/linux-yocto-rt_6.12.bb | 6 ++-- .../linux/linux-yocto-tiny_6.12.bb | 6 ++-- meta/recipes-kernel/linux/linux-yocto_6.12.bb | 28 +++++++++---------- 3 files changed, 20 insertions(+), 20 deletions(-) diff --git a/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb b/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb index baa13c866e..42ad0cbef0 100644 --- a/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb +++ b/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb @@ -14,13 +14,13 @@ python () { raise bb.parse.SkipRecipe("Set PREFERRED_PROVIDER_virtual/kernel to linux-yocto-rt to enable it") } -SRCREV_machine ?= "6f409db4f0082642197240f39b8a58850c8eb884" -SRCREV_meta ?= "f8cd1607519efd135e4037c84b6e42684b12c5a8" +SRCREV_machine ?= "2aa940a9e5701e5b4107d0250da79a52e01da34a" +SRCREV_meta ?= "5db57044962c6155c4e82f06d87e90dfe49a59e6" SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;branch=${KBRANCH};name=machine;protocol=https \ git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.12;destsuffix=${KMETA};protocol=https" -LINUX_VERSION ?= "6.12.36" +LINUX_VERSION ?= "6.12.38" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" diff --git a/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb b/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb index ec2136f035..452e3f0eb2 100644 --- a/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb +++ b/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb @@ -8,7 +8,7 @@ require recipes-kernel/linux/linux-yocto.inc # CVE exclusions include recipes-kernel/linux/cve-exclusion_6.12.inc -LINUX_VERSION ?= "6.12.36" +LINUX_VERSION ?= "6.12.38" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}" @@ -17,8 +17,8 @@ DEPENDS += "openssl-native util-linux-native" KMETA = "kernel-meta" KCONF_BSP_AUDIT_LEVEL = "2" -SRCREV_machine ?= "5633e9a98a153afa6b2051b116faef6c5e855bd8" -SRCREV_meta ?= "f8cd1607519efd135e4037c84b6e42684b12c5a8" +SRCREV_machine ?= "fa4b881d24f752a559d8e1f75ed08895ef20b14d" +SRCREV_meta ?= "5db57044962c6155c4e82f06d87e90dfe49a59e6" PV = "${LINUX_VERSION}+git" diff --git a/meta/recipes-kernel/linux/linux-yocto_6.12.bb b/meta/recipes-kernel/linux/linux-yocto_6.12.bb index 205c8a3ed5..b9ae0954fa 100644 --- a/meta/recipes-kernel/linux/linux-yocto_6.12.bb +++ b/meta/recipes-kernel/linux/linux-yocto_6.12.bb @@ -18,25 +18,25 @@ KBRANCH:qemux86.104 ?= "v6.12/standard/base" KBRANCH:qemuloongarch64 ?= "v6.12/standard/base" KBRANCH:qemumips64 ?= "v6.12/standard/mti-malta64" -SRCREV_machine:qemuarm ?= "511b6848cd392ee9bbc841794a5e905f4db31689" -SRCREV_machine:qemuarm64 ?= "5633e9a98a153afa6b2051b116faef6c5e855bd8" -SRCREV_machine:qemuloongarch64 ?= "5633e9a98a153afa6b2051b116faef6c5e855bd8" -SRCREV_machine:qemumips ?= "afbfb2216d4f16a231b834922a937641864c8931" -SRCREV_machine:qemuppc ?= "5633e9a98a153afa6b2051b116faef6c5e855bd8" -SRCREV_machine:qemuriscv64 ?= "5633e9a98a153afa6b2051b116faef6c5e855bd8" -SRCREV_machine:qemuriscv32 ?= "5633e9a98a153afa6b2051b116faef6c5e855bd8" -SRCREV_machine:qemux86 ?= "5633e9a98a153afa6b2051b116faef6c5e855bd8" -SRCREV_machine:qemux86-64 ?= "5633e9a98a153afa6b2051b116faef6c5e855bd8" -SRCREV_machine:qemumips64 ?= "707ad7179119ed07e5911b61b08b7b11d2c9a352" -SRCREV_machine ?= "5633e9a98a153afa6b2051b116faef6c5e855bd8" -SRCREV_meta ?= "f8cd1607519efd135e4037c84b6e42684b12c5a8" +SRCREV_machine:qemuarm ?= "c2755158bc029faf978e980235471b0f0e864814" +SRCREV_machine:qemuarm64 ?= "fa4b881d24f752a559d8e1f75ed08895ef20b14d" +SRCREV_machine:qemuloongarch64 ?= "fa4b881d24f752a559d8e1f75ed08895ef20b14d" +SRCREV_machine:qemumips ?= "facf6694c9bdcaa9efb2d46a2c6e8e30fc72cdd3" +SRCREV_machine:qemuppc ?= "fa4b881d24f752a559d8e1f75ed08895ef20b14d" +SRCREV_machine:qemuriscv64 ?= "fa4b881d24f752a559d8e1f75ed08895ef20b14d" +SRCREV_machine:qemuriscv32 ?= "fa4b881d24f752a559d8e1f75ed08895ef20b14d" +SRCREV_machine:qemux86 ?= "fa4b881d24f752a559d8e1f75ed08895ef20b14d" +SRCREV_machine:qemux86-64 ?= "fa4b881d24f752a559d8e1f75ed08895ef20b14d" +SRCREV_machine:qemumips64 ?= "4ef2a68a188df7f561f5e297c4a3bab7e79e426f" +SRCREV_machine ?= "fa4b881d24f752a559d8e1f75ed08895ef20b14d" +SRCREV_meta ?= "5db57044962c6155c4e82f06d87e90dfe49a59e6" # set your preferred provider of linux-yocto to 'linux-yocto-upstream', and you'll # get the /base branch, which is pure upstream -stable, and the same # meta SRCREV as the linux-yocto-standard builds. Select your version using the # normal PREFERRED_VERSION settings. BBCLASSEXTEND = "devupstream:target" -SRCREV_machine:class-devupstream ?= "df64e51d4ab83244b6a4eb11eb41f89403611e24" +SRCREV_machine:class-devupstream ?= "259f4977409c87a980fa2227b7c76a2fe3fb8c2f" PN:class-devupstream = "linux-yocto-upstream" KBRANCH:class-devupstream = "v6.12/base" @@ -44,7 +44,7 @@ SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;name=machine;branch=${KBRA git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.12;destsuffix=${KMETA};protocol=https" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" -LINUX_VERSION ?= "6.12.36" +LINUX_VERSION ?= "6.12.38" PV = "${LINUX_VERSION}+git" From patchwork Wed Jul 16 13:48:53 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Bruce Ashfield X-Patchwork-Id: 66969 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 46B26C83F35 for ; Wed, 16 Jul 2025 13:49:06 +0000 (UTC) Received: from mail-qk1-f171.google.com (mail-qk1-f171.google.com [209.85.222.171]) by mx.groups.io with SMTP id smtpd.web11.22531.1752673742015963836 for ; Wed, 16 Jul 2025 06:49:02 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@gmail.com header.s=20230601 header.b=LVBMBLaq; spf=pass (domain: gmail.com, ip: 209.85.222.171, mailfrom: bruce.ashfield@gmail.com) Received: by mail-qk1-f171.google.com with SMTP id af79cd13be357-7d3f192a64eso642544185a.2 for ; Wed, 16 Jul 2025 06:49:01 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1752673741; x=1753278541; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=deNx64KL82G3NL7ng0l326jG7bSTnyS+kNO89/59fas=; b=LVBMBLaq4k1VxSrZHZkA7hcK9rpsBgKK9FwixtjsciQAIkwJvzB/GpCnutHJ7lCW59 JA4iLL6NiQ2TXLDZxhhHln0V2GJlU9VwN3yx7KX8rvhrVV6YUCghFYR5lf0LIMCbHId1 dpeKcqF7AG06S1v1Q1MXXN6EGiPhxZQpMIIL5tSg+OlGACdkHDhxizJ4J9rIRrZtMlJ0 wBIFGQomeK5jO6+SdflN2hQ5L4fiX+4a1u02OnuWp56ySGdxQa369tLtpdRrFcvwi9RF VgUxl5SEuyGwcngEZjoYNa3pPWMueFq4b6QQ+Hm8+IU0rIYOSa84dGtmfLivh/kgeGBw sjbg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1752673741; x=1753278541; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=deNx64KL82G3NL7ng0l326jG7bSTnyS+kNO89/59fas=; b=ihlv77xsY32YbV3Zs6TNjjyPqrnu+hkrpc11M7ZP8zCnWrs+pTR5HrPBqifHm+tQ1y qTN9reMKRFUf9eTGHbTGIqoPkFFXd2wVLafC5tjaRPbH9kDYTwMvyu8L2X1JlbpMDflW /Ey2GOeTAk/cwUKmkjBzdF7JQG/Ko8ngTDetkHMkq9G1t0XX8UPOEPde7qkq2YgBve47 cScJikM5UywEkh3mWYxRgyJAS8JsY6RezXlBiWFtPKYM9e3xqxPsSdJdc70HB0YBzybV 4+9O/nEmznTmRt81n594qyrRSUf+eEl8Tc9yPlwVlOWWnUmPWIa0xXR0ATvTp19S5AP/ Wlyg== X-Gm-Message-State: AOJu0Yw3jTb7klD9FXduUXJ3CnEfaIoBSwvQRQeb4ak8CzMBMsVG3vNn JthVmCzVZ1Ia5zJQ5HLIkhnON9nEgz9N8ox+9UVulioNmtzcSqHy8ZzbySmrCsF3 X-Gm-Gg: ASbGncsTX9M5SvZ5VGylTy0weqxKcboDhZpI5Rhd99m1jCtt6LjOgnMl/b4y3hHktJX zgxlmZhsoDA82//4PMqDPX7twiADQLf326XI+S++3qiV61/YfhYRoNge0wexi748u8M38prtIZg dlJDnaj8EAmds8IVj5lzGaebIFUDteVWT7vHDpRmrtglW92gZYS6ZZ2zHBnIlZ4EUUSJGizUiHF 3yiu6/EJ91kR5ZXeToopa4YgJjy4mpRBQegtFQiH6qMgMeSj0D1V34CyBw4WGz5TpZ/pECF4avG rM2d6RKag381vg5ILGkKjuAMdrU4H7kePWhuhMiZJCEKPEExVpSMiuNTAwULXmnXJQt8VmsZ0tx ddHEHjeCzE7wFt7CrjBa9L8dAORXbJssPfEJWDjahcCOgf20k0JZnvAWmd8+dcRnz2pwAFHZjMO bRyMj+OGotIck1oFzzO2xlp2UFJmtu0N5jgg== X-Google-Smtp-Source: AGHT+IFZxi+Q7IfPIlIp1UKWuKKAY7ECA9MultKLrP26U2NuTiYarXA09jv290ZHeqOowXDZ0jpazA== X-Received: by 2002:a05:620a:7007:b0:7e3:35fe:46b8 with SMTP id af79cd13be357-7e342b66c9cmr422401185a.44.1752673740660; Wed, 16 Jul 2025 06:49:00 -0700 (PDT) Received: from bruce-XPS-8940.localdomain (pool-174-112-62-108.cpe.net.cable.rogers.com. [174.112.62.108]) by smtp.gmail.com with ESMTPSA id af79cd13be357-7e3443d830bsm84245085a.25.2025.07.16.06.48.59 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 16 Jul 2025 06:49:00 -0700 (PDT) From: bruce.ashfield@gmail.com To: richard.purdie@linuxfoundation.org Cc: openembedded-core@lists.openembedded.org Subject: [PATCH 4/4] linux-yocto/6.12: update CVE exclusions (6.12.38) Date: Wed, 16 Jul 2025 09:48:53 -0400 Message-Id: X-Mailer: git-send-email 2.39.2 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Wed, 16 Jul 2025 13:49:06 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/220459 From: Bruce Ashfield Data pulled from: https://github.com/CVEProject/cvelistV5 Signed-off-by: Bruce Ashfield --- .../linux/cve-exclusion_6.12.inc | 228 +++++++++++++++++- 1 file changed, 224 insertions(+), 4 deletions(-) diff --git a/meta/recipes-kernel/linux/cve-exclusion_6.12.inc b/meta/recipes-kernel/linux/cve-exclusion_6.12.inc index 98e90078d4..02931bbf79 100644 --- a/meta/recipes-kernel/linux/cve-exclusion_6.12.inc +++ b/meta/recipes-kernel/linux/cve-exclusion_6.12.inc @@ -1,11 +1,11 @@ # Auto-generated CVE metadata, DO NOT EDIT BY HAND. -# Generated at 2025-07-09 07:57:09.220247+00:00 for kernel version 6.12.36 -# From cvelistV5 cve_2025-07-09_0700Z-1-gca2b12e7c08 +# Generated at 2025-07-15 14:54:42.649263+00:00 for kernel version 6.12.38 +# From linux_kernel_cves cve_2025-07-15_1400Z-4-gc77733e1fe6 python check_kernel_cve_status_version() { - this_version = "6.12.36" + this_version = "6.12.38" kernel_version = d.getVar("LINUX_VERSION") if kernel_version != this_version: bb.warn("Kernel CVE status needs updating: generated for %s but kernel is %s" % (this_version, kernel_version)) @@ -13816,7 +13816,7 @@ CVE_STATUS[CVE-2025-38136] = "cpe-stable-backport: Backported in 6.12.34" CVE_STATUS[CVE-2025-38138] = "cpe-stable-backport: Backported in 6.12.34" -# CVE-2025-38139 needs backporting (fixed from 6.16rc1) +CVE_STATUS[CVE-2025-38139] = "cpe-stable-backport: Backported in 6.12.37" # CVE-2025-38140 needs backporting (fixed from 6.16rc1) @@ -14014,8 +14014,228 @@ CVE_STATUS[CVE-2025-38236] = "cpe-stable-backport: Backported in 6.12.36" # CVE-2025-38237 needs backporting (fixed from 6.16rc1) +CVE_STATUS[CVE-2025-38238] = "fixed-version: only affects 6.14 onwards" + +CVE_STATUS[CVE-2025-38239] = "cpe-stable-backport: Backported in 6.12.36" + CVE_STATUS[CVE-2025-38240] = "cpe-stable-backport: Backported in 6.12.23" +CVE_STATUS[CVE-2025-38241] = "fixed-version: only affects 6.14 onwards" + +CVE_STATUS[CVE-2025-38242] = "cpe-stable-backport: Backported in 6.12.37" + +CVE_STATUS[CVE-2025-38243] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2025-38244] = "cpe-stable-backport: Backported in 6.12.36" + +CVE_STATUS[CVE-2025-38245] = "cpe-stable-backport: Backported in 6.12.36" + +CVE_STATUS[CVE-2025-38246] = "cpe-stable-backport: Backported in 6.12.36" + +CVE_STATUS[CVE-2025-38247] = "fixed-version: only affects 6.15 onwards" + +# CVE-2025-38248 needs backporting (fixed from 6.16rc4) + +CVE_STATUS[CVE-2025-38249] = "cpe-stable-backport: Backported in 6.12.36" + +CVE_STATUS[CVE-2025-38250] = "cpe-stable-backport: Backported in 6.12.36" + +CVE_STATUS[CVE-2025-38251] = "cpe-stable-backport: Backported in 6.12.36" + +CVE_STATUS[CVE-2025-38252] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2025-38253] = "cpe-stable-backport: Backported in 6.12.36" + +CVE_STATUS[CVE-2025-38254] = "fixed-version: only affects 6.13 onwards" + +CVE_STATUS[CVE-2025-38255] = "cpe-stable-backport: Backported in 6.12.36" + +CVE_STATUS[CVE-2025-38256] = "cpe-stable-backport: Backported in 6.12.36" + +CVE_STATUS[CVE-2025-38257] = "cpe-stable-backport: Backported in 6.12.36" + +CVE_STATUS[CVE-2025-38258] = "cpe-stable-backport: Backported in 6.12.36" + +CVE_STATUS[CVE-2025-38259] = "cpe-stable-backport: Backported in 6.12.36" + +CVE_STATUS[CVE-2025-38260] = "cpe-stable-backport: Backported in 6.12.36" + +# CVE-2025-38261 needs backporting (fixed from 6.16rc1) + +CVE_STATUS[CVE-2025-38262] = "cpe-stable-backport: Backported in 6.12.36" + +CVE_STATUS[CVE-2025-38263] = "cpe-stable-backport: Backported in 6.12.36" + +CVE_STATUS[CVE-2025-38264] = "cpe-stable-backport: Backported in 6.12.36" + +CVE_STATUS[CVE-2025-38265] = "cpe-stable-backport: Backported in 6.12.33" + +CVE_STATUS[CVE-2025-38266] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2025-38267] = "cpe-stable-backport: Backported in 6.12.34" + +CVE_STATUS[CVE-2025-38268] = "cpe-stable-backport: Backported in 6.12.34" + +CVE_STATUS[CVE-2025-38269] = "cpe-stable-backport: Backported in 6.12.34" + +CVE_STATUS[CVE-2025-38270] = "cpe-stable-backport: Backported in 6.12.34" + +CVE_STATUS[CVE-2025-38271] = "fixed-version: only affects 6.15 onwards" + +# CVE-2025-38272 needs backporting (fixed from 6.16rc1) + +CVE_STATUS[CVE-2025-38273] = "cpe-stable-backport: Backported in 6.12.34" + +CVE_STATUS[CVE-2025-38274] = "cpe-stable-backport: Backported in 6.12.34" + +CVE_STATUS[CVE-2025-38275] = "cpe-stable-backport: Backported in 6.12.34" + +CVE_STATUS[CVE-2025-38276] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2025-38277] = "cpe-stable-backport: Backported in 6.12.34" + +CVE_STATUS[CVE-2025-38278] = "cpe-stable-backport: Backported in 6.12.34" + +CVE_STATUS[CVE-2025-38279] = "cpe-stable-backport: Backported in 6.12.37" + +CVE_STATUS[CVE-2025-38280] = "cpe-stable-backport: Backported in 6.12.34" + +CVE_STATUS[CVE-2025-38281] = "fixed-version: only affects 6.14 onwards" + +CVE_STATUS[CVE-2025-38282] = "cpe-stable-backport: Backported in 6.12.34" + +CVE_STATUS[CVE-2025-38283] = "cpe-stable-backport: Backported in 6.12.34" + +# CVE-2025-38284 needs backporting (fixed from 6.16rc1) + +CVE_STATUS[CVE-2025-38285] = "cpe-stable-backport: Backported in 6.12.34" + +CVE_STATUS[CVE-2025-38286] = "cpe-stable-backport: Backported in 6.12.34" + +CVE_STATUS[CVE-2025-38287] = "fixed-version: only affects 6.13 onwards" + +CVE_STATUS[CVE-2025-38288] = "cpe-stable-backport: Backported in 6.12.34" + +CVE_STATUS[CVE-2025-38289] = "cpe-stable-backport: Backported in 6.12.37" + +CVE_STATUS[CVE-2025-38290] = "cpe-stable-backport: Backported in 6.12.34" + +CVE_STATUS[CVE-2025-38291] = "fixed-version: only affects 6.13 onwards" + +CVE_STATUS[CVE-2025-38292] = "cpe-stable-backport: Backported in 6.12.34" + +CVE_STATUS[CVE-2025-38293] = "cpe-stable-backport: Backported in 6.12.34" + +CVE_STATUS[CVE-2025-38294] = "fixed-version: only affects 6.14 onwards" + +CVE_STATUS[CVE-2025-38295] = "cpe-stable-backport: Backported in 6.12.34" + +CVE_STATUS[CVE-2025-38296] = "fixed-version: only affects 6.14 onwards" + +CVE_STATUS[CVE-2025-38297] = "cpe-stable-backport: Backported in 6.12.34" + +CVE_STATUS[CVE-2025-38298] = "cpe-stable-backport: Backported in 6.12.34" + +CVE_STATUS[CVE-2025-38299] = "cpe-stable-backport: Backported in 6.12.34" + +CVE_STATUS[CVE-2025-38300] = "cpe-stable-backport: Backported in 6.12.34" + +CVE_STATUS[CVE-2025-38301] = "cpe-stable-backport: Backported in 6.12.34" + +CVE_STATUS[CVE-2025-38302] = "cpe-stable-backport: Backported in 6.12.34" + +CVE_STATUS[CVE-2025-38303] = "cpe-stable-backport: Backported in 6.12.34" + +CVE_STATUS[CVE-2025-38304] = "cpe-stable-backport: Backported in 6.12.34" + +CVE_STATUS[CVE-2025-38305] = "cpe-stable-backport: Backported in 6.12.34" + +# CVE-2025-38306 needs backporting (fixed from 6.16rc1) + +CVE_STATUS[CVE-2025-38307] = "cpe-stable-backport: Backported in 6.12.34" + +CVE_STATUS[CVE-2025-38308] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2025-38309] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2025-38310] = "cpe-stable-backport: Backported in 6.12.34" + +# CVE-2025-38311 needs backporting (fixed from 6.16rc1) + +CVE_STATUS[CVE-2025-38312] = "cpe-stable-backport: Backported in 6.12.34" + +CVE_STATUS[CVE-2025-38313] = "cpe-stable-backport: Backported in 6.12.34" + +CVE_STATUS[CVE-2025-38314] = "fixed-version: only affects 6.13 onwards" + +CVE_STATUS[CVE-2025-38315] = "cpe-stable-backport: Backported in 6.12.34" + +CVE_STATUS[CVE-2025-38316] = "fixed-version: only affects 6.14 onwards" + +CVE_STATUS[CVE-2025-38317] = "cpe-stable-backport: Backported in 6.12.34" + +CVE_STATUS[CVE-2025-38318] = "cpe-stable-backport: Backported in 6.12.34" + +CVE_STATUS[CVE-2025-38319] = "cpe-stable-backport: Backported in 6.12.34" + +CVE_STATUS[CVE-2025-38320] = "cpe-stable-backport: Backported in 6.12.35" + +CVE_STATUS[CVE-2025-38321] = "cpe-stable-backport: Backported in 6.12.35" + +CVE_STATUS[CVE-2025-38322] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2025-38323] = "cpe-stable-backport: Backported in 6.12.35" + +CVE_STATUS[CVE-2025-38324] = "cpe-stable-backport: Backported in 6.12.35" + +CVE_STATUS[CVE-2025-38325] = "cpe-stable-backport: Backported in 6.12.35" + +CVE_STATUS[CVE-2025-38326] = "cpe-stable-backport: Backported in 6.12.35" + +CVE_STATUS[CVE-2025-38327] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2025-38328] = "cpe-stable-backport: Backported in 6.12.35" + +CVE_STATUS[CVE-2025-38329] = "fixed-version: only affects 6.14 onwards" + +CVE_STATUS[CVE-2025-38330] = "fixed-version: only affects 6.14 onwards" + +CVE_STATUS[CVE-2025-38331] = "cpe-stable-backport: Backported in 6.12.35" + +CVE_STATUS[CVE-2025-38332] = "cpe-stable-backport: Backported in 6.12.35" + +CVE_STATUS[CVE-2025-38333] = "cpe-stable-backport: Backported in 6.12.35" + +CVE_STATUS[CVE-2025-38334] = "cpe-stable-backport: Backported in 6.12.35" + +# CVE-2025-38335 needs backporting (fixed from 6.16rc1) + +CVE_STATUS[CVE-2025-38336] = "cpe-stable-backport: Backported in 6.12.35" + +CVE_STATUS[CVE-2025-38337] = "cpe-stable-backport: Backported in 6.12.35" + +CVE_STATUS[CVE-2025-38338] = "cpe-stable-backport: Backported in 6.12.35" + +CVE_STATUS[CVE-2025-38339] = "fixed-version: only affects 6.13 onwards" + +CVE_STATUS[CVE-2025-38340] = "fixed-version: only affects 6.14 onwards" + +CVE_STATUS[CVE-2025-38341] = "cpe-stable-backport: Backported in 6.12.35" + +CVE_STATUS[CVE-2025-38342] = "cpe-stable-backport: Backported in 6.12.35" + +CVE_STATUS[CVE-2025-38343] = "cpe-stable-backport: Backported in 6.12.35" + +CVE_STATUS[CVE-2025-38344] = "cpe-stable-backport: Backported in 6.12.35" + +CVE_STATUS[CVE-2025-38345] = "cpe-stable-backport: Backported in 6.12.35" + +CVE_STATUS[CVE-2025-38346] = "cpe-stable-backport: Backported in 6.12.35" + +CVE_STATUS[CVE-2025-38347] = "cpe-stable-backport: Backported in 6.12.35" + +CVE_STATUS[CVE-2025-38348] = "cpe-stable-backport: Backported in 6.12.35" + CVE_STATUS[CVE-2025-38479] = "cpe-stable-backport: Backported in 6.12.23" CVE_STATUS[CVE-2025-38575] = "cpe-stable-backport: Backported in 6.12.23"