From patchwork Wed Aug 13 20:49:15 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Bruce Ashfield X-Patchwork-Id: 68472 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 19149CA0EE0 for ; Wed, 13 Aug 2025 20:49:33 +0000 (UTC) Received: from mail-qt1-f178.google.com (mail-qt1-f178.google.com [209.85.160.178]) by mx.groups.io with SMTP id smtpd.web10.7045.1755118167144073398 for ; Wed, 13 Aug 2025 13:49:27 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@gmail.com header.s=20230601 header.b=nH/JVyqn; spf=pass (domain: gmail.com, ip: 209.85.160.178, mailfrom: bruce.ashfield@gmail.com) Received: by mail-qt1-f178.google.com with SMTP id d75a77b69052e-4b109bbea05so4291701cf.2 for ; Wed, 13 Aug 2025 13:49:27 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1755118166; x=1755722966; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=EsvcPqs6Hd9NbGg5D8xlcthVPbm1ammjXdeudYUN1xw=; b=nH/JVyqncryvMwNR8qK8XYJwhTNKbd2L45JAjNXkDDUUL00iLcUc8AWJHMkAJBNWMp TzilZSTqfM58EJgEujNBqFAcYpZyf/th0GnM9zxy24pHJ2qTGdVN4XXluEqouJdWxXAU P967yTxXLAG1VLgCcT5RtAnHujLnkbx1K3wAu98LgetKkjUvjhckcDRnVzDtwhXFhI4R V4BJYUUAFoQ2RIv7qYGJxWCZOOrVHL5WyrS6m3E1TdI4xqXBNGBtAaksWv3eiJMcDZGo iaUprrGz9G9t4X4nKQI5h0HTMB1kHDnhctYMvD5yUTmqiRretGRV4fyFIWecVCJu6+3z GhgQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1755118166; x=1755722966; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=EsvcPqs6Hd9NbGg5D8xlcthVPbm1ammjXdeudYUN1xw=; b=IjCkNqyQd0VJn2iTTz86udW/AcKTmhAyXzaSUso6HatrwBD9kg8uRnqDf//s+k8Bnw /lvhXFlj2bWIIe+WW0BlckL4D+tjAsm4MCnXgHsKobR+xcB6eU7Y53N5n+m4lQE29/mu uTQQMx+4aXoyxwXbBmS3hzelLGQtxCoBWlzaINRcCzYO6ySwx9o1/l3a7Ik+S/BA2zNE dqSsazCxHffNdqrvv5SrG6QH9/HyCUX0QeroF6xbNy7y1xYAAB9c5voYDFCKxYxxjKqA oAWlL/glycO/y2xa3DzY2n6Z55F0GEIk25ZlmpH/YtjnCIJd5ewam667DvSVDPKRzPEU DB+A== X-Gm-Message-State: AOJu0YxfjZW0Wlf41F3r7coQvtZ/zEn81lhY2C0NW4NjxA4FHkEINLYw PvEyJWs9hT0vn030zYDqIPTkKkxgDUFy6Tx1BunS9gnwDM3rptm/3s5SC8T/qdb3 X-Gm-Gg: ASbGncvYWHKimxj2B5TS1YGwxQ842asXVsq2IwkuXM3/uKLlSRJP913TH3J24qeG/qE Y4pVgwpJjS1HteVW2LN+gHaqoo8rxAE0+prir8VjXc+84g5oTfBU4Ur7A4TJmyuyOk46dO9R9sl g+akaaFPrU8+HKcCUP4gAUM0g1cxgn7WqCR8o6zz7O5LibdpJip19WjLEFAI2BIh/M/atrY3SR5 8HUsbOisb4ykEE8oABq1LeKE/ARh1ggDPfCthDzaFkx1PobitF1VmN3Ix5Gt8EioBOwlE2cNJIx HvY3zB4HMOMwINA10FFxgG3sQBQppObH4ceEtIow+brTXuxdYcA27zP6TVEsk/vpzX2gdayZSWF w8XJz2znOog55z76xelxQHTDrOLQtzPiqmZQdN3YD0+P1CKCGcmYP++0EWIU3FuSNx0uZnBguT5 BRzC2P5jTWaqYgpvEWxqzt7To= X-Google-Smtp-Source: AGHT+IEj54DBkVcxeb9RDChxpqDNY09Vy22cdUT3KdY/hOEt3q2DWItILnFdK9oMDMb0mu78J+8pXA== X-Received: by 2002:ad4:588e:0:b0:70b:5320:d416 with SMTP id 6a1803df08f44-70b5320d788mr4449466d6.14.1755118165780; Wed, 13 Aug 2025 13:49:25 -0700 (PDT) Received: from bruce-XPS-8940.localdomain (pool-174-112-62-108.cpe.net.cable.rogers.com. [174.112.62.108]) by smtp.gmail.com with ESMTPSA id 6a1803df08f44-70af5b07658sm3326516d6.43.2025.08.13.13.49.24 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 13 Aug 2025 13:49:24 -0700 (PDT) From: bruce.ashfield@gmail.com To: richard.purdie@linuxfoundation.org Cc: openembedded-core@lists.openembedded.org Subject: [PATCH 1/8] linux-yocto/6.12: update to v6.12.39 Date: Wed, 13 Aug 2025 16:49:15 -0400 Message-Id: <314face7e665d3fff7220aaf54769b4397b9f32f.1755118020.git.bruce.ashfield@gmail.com> X-Mailer: git-send-email 2.39.2 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Wed, 13 Aug 2025 20:49:33 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/221821 From: Bruce Ashfield Updating linux-yocto/6.12 to the latest korg -stable release that comprises the following commits: cdf264c0a590 Linux 6.12.39 f3f9deccfc68 KVM: SVM: Set synthesized TSA CPUID flags f004f58d18a2 rseq: Fix segfault on registration when rseq_cs is non-zero f2133b849ff2 crypto: ecdsa - Harden against integer overflows in DIV_ROUND_UP() 59923d508bd2 arm64: Filter out SME hwcaps when FEAT_SME isn't implemented 815f1161d6db ksmbd: fix potential use-after-free in oplock/lease break ack 2d89dab1ea60 kasan: remove kasan_find_vm_area() to prevent possible deadlock e1aec954583f net: wangxun: revert the adjustment of the IRQ vector sequence 5244536e650c erofs: fix rare pcluster memory leak after unmounting 5ea53aa71c2c selftests/bpf: adapt one more case in test_lru_map to the new target_free 7b4a02631352 HID: nintendo: avoid bluetooth suspend/resume stalls c72536350e82 HID: quirks: Add quirk for 2 Chicony Electronics HP 5MP Cameras 716a0c8dedc6 HID: Add IGNORE quirk for SMARTLINKTECHNOLOGY 70685fb6216f riscv: vdso: Exclude .rodata from the PT_DYNAMIC segment 9ef5d4748dfe bpf: Adjust free target to avoid global starvation of LRU map c23e0792b77d vt: add missing notification when switching back to text mode 0bcc14f36c7a btrfs: fix assertion when building free space tree 589b290d0935 net: mana: Record doorbell physical address in PF mode 921fffa1d8bc HID: lenovo: Add support for ThinkPad X1 Tablet Thin Keyboard Gen2 e46cf2943f91 driver: bluetooth: hci_qca:fix unable to load the BT driver a9c357b08672 net: usb: qmi_wwan: add SIMCom 8230C composition e55b2126961b ALSA: hda/realtek: Add quirks for some Clevo laptops 01b0312a4a3a ALSA: hda/realtek - Enable mute LED on HP Pavilion Laptop 15-eg100 72aad5cf5790 ASoC: amd: yc: add quirk for Acer Nitro ANV15-41 internal mic 383b2399d586 io_uring: make fallocate be hashed work 67be7e6c55a9 ALSA: hda/realtek: Add mic-mute LED setup for ASUS UM5606 68397fda2caa ASoC: SOF: Intel: hda: Use devm_kstrdup() to avoid memleak. dd072fa64715 um: vector: Reduce stack usage in vector_eth_configure() 7df2295c036b atm: idt77252: Add missing `dma_map_error()` 25cab1b83d66 ublk: sanity check add_dev input for underflow f154e41e1d9d bnxt_en: Set DMA unmap len correctly for XDP_REDIRECT b4e7e3f4e9d2 bnxt_en: Fix DCB ETS validation 948ab36ed249 net: ll_temac: Fix missing tx_pending check in ethtools_set_ringparam() bbd385b65f9e net/mlx5e: Add new prio for promiscuous mode 7581afc05154 net/mlx5e: Fix race between DIM disable and net_dim() c4270235db92 can: m_can: m_can_handle_lost_msg(): downgrade msg lost in rx message to debug level 90d0d5a439f5 drm/xe/pm: Correct comment of xe_pm_set_vram_threshold() ec4014566377 selftests: net: lib: fix shift count out of range 182c9f38c367 selftests: net: lib: Move logging from forwarding/lib.sh here e3647c40bea2 net: phy: microchip: limit 100M workaround to link-down events on LAN88xx b215e916336f net: phy: microchip: Use genphy_soft_reset() to purge stale LPA bits 4c934e0cac61 ibmvnic: Fix hardcoded NUM_RX_STATS/NUM_TX_STATS with dynamic sizeof 473f3eadfc73 net: appletalk: Fix device refcount leak in atrtr_create() e0dd2e972966 netfilter: flowtable: account for Ethernet header in nf_flow_pppoe_proto() fd67f52eea80 erofs: fix to add missing tracepoint in erofs_readahead() ea2350dfa378 erofs: refine readahead tracepoint 9493b5f9ad07 erofs: tidy up zdata.c 71e4f033a90d erofs: get rid of `z_erofs_next_pcluster_t` 16396885c26a erofs: free pclusters if no cached folio is attached ff4b8c9ade1b drm/xe/pf: Clear all LMTT pages on alloc 8586552df591 nbd: fix uaf in nbd_genl_connect() error path 1bbdf4213711 wifi: mt76: mt7925: Fix null-ptr-deref in mt7925_thermal_init() fa7e9a15460a drm/nouveau/gsp: fix potential leak of memory used during acpi init 06c566371f8a wifi: rt2x00: fix remove callback type mismatch d21eeb050599 wifi: mac80211: fix non-transmitted BSSID profile search d4a7056ca9ab wifi: mac80211: correctly identify S1G short beacon 2941155d9a5a raid10: cleanup memleak at raid10_make_request 776e6186dc9e md/raid1: Fix stack memory use after return in raid1_reshape a560de522374 drm/tegra: nvdec: Fix dma_alloc_coherent error check fcd9c923b58e wifi: zd1211rw: Fix potential NULL pointer dereference in zd_mac_tx_to_dev() c6625c21ea66 wifi: cfg80211: fix S1G beacon head validation in nl80211 8d4d00ea6038 netfs: Fix ref leak on inserted extra subreq in write retry 42baf997722c netlink: make sure we allow at least one dump skb f98c4cec7504 netlink: Fix rmem check in netlink_broadcast_deliver(). cecc9146d244 ASoC: Intel: sof-function-topology-lib: Print out the unsupported dmic count 19ff875dc516 erofs: address D-cache aliasing 4745bfd34ae7 erofs: fix to add missing tracepoint in erofs_read_folio() 3b16c9b8ba71 ksmbd: fix a mount write count leak in ksmbd_vfs_kern_path_locked() 92c2c005a8ba smb: server: make use of rdma_destroy_qp() 1d219778281e clk: scmi: Handle case where child clocks are initialized before their parents 971da696abf0 x86/mm: Disable hugetlb page table sharing on 32-bit a68b85855732 x86/rdrand: Disable RDSEED on AMD Cyan Skillfish fcee75daecc5 clk: imx: Fix an out-of-bounds access in dispmix_csr_clk_dev_data 5d2d34f36724 rust: init: allow `dead_code` warnings for Rust >= 1.89.0 febc0b5dbabd lib/alloc_tag: do not acquire non-existent lock in alloc_tag_top_users() 4c39dfd13beb mm/vmalloc: leave lazy MMU mode on PTE mapping error 92ed107cd26d scripts/gdb: fix interrupts.py after maple tree conversion 62720dc3cfd9 scripts/gdb: de-reference per-CPU MCE interrupts cb89f9bf6c3a scripts/gdb: fix interrupts display after MCP on x86 ee6c677ef318 mm: fix the inaccurate memory statistics issue for users 839d8682732e maple_tree: fix mt_destroy_walk() on root leaf node 92db42e201f4 kallsyms: fix build without execinfo 7dccd5eb5343 Revert "PCI/ACPI: Fix allocated memory release on error in pci_acpi_scan_root()" e4172522d594 Revert "ACPI: battery: negate current when discharging" ee6f6138d5f2 drm/xe: Allocate PF queue size on pow2 boundary 065bd940ee0a drm/framebuffer: Acquire internal references on GEM handles 9e4af87bd08d Revert "usb: gadget: u_serial: Add null pointer check in gs_start_io" abf3620cba68 usb: gadget: u_serial: Fix race condition in TTY wakeup 48007d6e7bdb Revert "drm/xe/xe2: Enable Indirect Ring State support for Xe2" 57b7c27ef5e7 drm/xe/bmg: fix compressed VRAM handling 2d2f07a99487 drm/gem: Fix race in drm_gem_handle_create_tail() 38df1a5053bc drm/ttm: fix error handling in ttm_buffer_object_transfer e2d6547dc8b9 drm/sched: Increment job count before swapping tail spsc queue 08480e285c6a drm/gem: Acquire references on GEM handles for framebuffers e90ee15ce28c drm/amdkfd: Don't call mmput from MMU notifier callback 9f852d301f64 drm/imagination: Fix kernel crash when hard resetting the GPU a7b2f250ffcd wifi: mt76: mt7925: fix invalid array index in ssid assignment during hw scan fad0f6fcdae0 wifi: mt76: mt7925: fix the wrong config for tx interrupt 9b50874f297f wifi: mt76: mt7925: prevent NULL pointer dereference in mt7925_sta_set_decap_offload() 9639e54025f1 wifi: mt76: mt7921: prevent decap offload config before STA initialization a963819a121f wifi: mwifiex: discard erroneous disassoc frames on STA interface e01851f6e9a6 wifi: prevent A-MSDU attacks in mesh networks 373caeec3651 pwm: mediatek: Ensure to disable clocks in error path d526e11ab274 pwm: Fix invalid state detection 275605a8b480 pinctrl: qcom: msm: mark certain pins as invalid for interrupts 3e0542701b37 md/md-bitmap: fix GPF in bitmap_get_stats() 9f260e16b297 net: ethernet: rtsn: Fix a null pointer dereference in rtsn_probe() 8f65277317a8 gre: Fix IPv6 multicast route creation. 199af064babb ASoC: fsl_sai: Force a software reset when starting in consumer mode e14bffc90866 ALSA: ad1816a: Fix potential NULL pointer deref in snd_card_ad1816a_pnp() d9bd1163c8d8 KVM: Allow CPU to reschedule while setting per-page memory attributes fd044c99d831 KVM: SVM: Reject SEV{-ES} intra host migration if vCPU creation is in-flight 5cb498b20bff KVM: SVM: Add missing member in SNP_LAUNCH_START command structure 55f568521e0b KVM: x86/xen: Allow 'out of range' event channel ports in IRQ routing table. 291eff10b197 x86/mce: Make sure CMCI banks are cleared during shutdown on Intel 8ed7f3de93e1 x86/mce: Ensure user polling settings are honored when restarting timer 55ea884c0dce x86/mce: Don't remove sysfs if thresholding sysfs init fails afcf4f4e7062 x86/mce/amd: Fix threshold limit reset e01d5e33645d x86/mce/amd: Add default names for MCA banks and blocks 9e0d33e75c16 ipmi:msghandler: Fix potential memory corruption in ipmi_create_user() d1ff5f9d2c54 rxrpc: Fix oops due to non-existence of prealloc backlog struct 5385ad53793d rxrpc: Fix bug due to prealloc collision 8ecd651ef24a net/sched: Abort __tc_modify_qdisc if parent class does not exist fc2fffa2faca net: ethernet: ti: am65-cpsw-nuss: Fix skb size by accounting for skb_shared_info 34a09d6240a2 atm: clip: Fix NULL pointer dereference in vcc_sendmsg() 024876b247a8 atm: clip: Fix infinite recursive call of clip_push(). 9f771816f14d atm: clip: Fix memory leak of struct clip_vcc. 36caab990b69 atm: clip: Fix potential null-ptr-deref in to_atmarpd(). 4d5476fa3931 net: phy: smsc: Fix link failure in forced mode with Auto-MDIX 6fb4cd247cda net: phy: smsc: Force predictable MDI-X state on LAN87xx 850812bd2a15 net: phy: smsc: Fix Auto-MDIX configuration when disabled by strap be8792c6702b net: stmmac: Fix interrupt handling for level-triggered mode in DWC_XGMAC2 41a741c476e1 vsock: Fix IOCTL_VM_SOCKETS_GET_LOCAL_CID to check also `transport_local` ae2c712ba39c vsock: Fix transport_* TOCTOU 3734d78210cc vsock: Fix transport_{g2h,h2g} TOCTOU 62e6160cfb55 tcp: Correct signedness in skb remaining space calculation 50aa2d121bc2 tipc: Fix use-after-free in tipc_conn_close(). 8fb2802a1654 vsock: fix `vsock_proto` declaration 4b8e18af7bea netlink: Fix wraparounds of sk->sk_rmem_alloc. b90129445f50 net: phy: qcom: qca808x: Fix WoL issue by utilizing at8031_set_wol() 31db4223db33 net: phy: qcom: move the WoL function to shared library 778f4e173020 arm64: poe: Handle spurious Overlay faults 2e0cb0c74d96 bnxt_en: eliminate the compile warning in bnxt_request_irq due to CONFIG_RFS_ACCEL 0caba66f0073 sched/deadline: Fix dl_server runtime calculation formula 35bda158da39 fix proc_sys_compare() handling of in-lookup dentries df1d6801f16a pinctrl: amd: Clear GPIO debounce for suspend cdbcde935e72 Bluetooth: hci_event: Fix not marking Broadcast Sink BIS as connected 32fa1f92a40e Bluetooth: hci_sync: Fix not disabling advertising instance 0cd863ab4204 ASoC: cs35l56: probe() should fail if the device ID is not recognized a0a8009083e5 perf: Revert to requiring CAP_SYS_ADMIN for uprobes f7fe33f629bb sched/core: Fix migrate_swap() vs. hotplug 1207f57be07f irqchip/irq-msi-lib: Select CONFIG_GENERIC_MSI_IRQ bc179aa79a20 perf/core: Fix the WARN_ON_ONCE is out of lock protected region 8f4c7131721a ASoC: Intel: soc-acpi: arl: Correct order of cs42l43 matches cca47e6e1f78 ASoC: Intel: soc-acpi-intel-arl-match: set get_function_tplg_files ops fc3a8a5e8f8e ASoC: Intel: add sof_sdw_get_tplg_files ops 36536435849b ASoC: soc-acpi: add get_function_tplg_files ops 06e0b070eb97 ASoC: Intel: soc-acpi: arl: Add match entries for new cs42l43 laptops 97d14c04610c ASoC: Intel: soc-acpi: arl: Correct naming of a cs35l56 address struct 724b93a6a694 ASoC: Intel: SND_SOC_INTEL_SOF_BOARD_HELPERS select SND_SOC_ACPI_INTEL_MATCH d4f6a267cc07 ASoC: fsl_asrc: use internal measured ratio for non-ideal ratio mode 07ed75bfa7ed drm/amdgpu: Replace Mutex with Spinlock for RLCG register access to avoid Priority Inversion in SRIOV 56ea7746045a crypto: s390/sha - Fix uninitialized variable in SHA-1 and SHA-2 04513cf1581b drm/amdgpu/ip_discovery: add missing ip_discovery fw 39d6a607d531 drm/amdgpu/discovery: use specific ip_discovery.bin for legacy asics e9d9b25f3767 drm/exynos: exynos7_drm_decon: add vblank check in IRQ handling 6dee745bd0ae eventpoll: don't decrement ep refcount while still holding the ep mutex Signed-off-by: Bruce Ashfield --- .../linux/linux-yocto-rt_6.12.bb | 6 ++-- .../linux/linux-yocto-tiny_6.12.bb | 6 ++-- meta/recipes-kernel/linux/linux-yocto_6.12.bb | 28 +++++++++---------- 3 files changed, 20 insertions(+), 20 deletions(-) diff --git a/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb b/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb index 42ad0cbef0..c003d8464b 100644 --- a/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb +++ b/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb @@ -14,13 +14,13 @@ python () { raise bb.parse.SkipRecipe("Set PREFERRED_PROVIDER_virtual/kernel to linux-yocto-rt to enable it") } -SRCREV_machine ?= "2aa940a9e5701e5b4107d0250da79a52e01da34a" -SRCREV_meta ?= "5db57044962c6155c4e82f06d87e90dfe49a59e6" +SRCREV_machine ?= "ae0f27c5992d230fddf2cab92dc5ae86417285d3" +SRCREV_meta ?= "ae758a118311062560d89a3721abd38d4a35fc1c" SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;branch=${KBRANCH};name=machine;protocol=https \ git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.12;destsuffix=${KMETA};protocol=https" -LINUX_VERSION ?= "6.12.38" +LINUX_VERSION ?= "6.12.39" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" diff --git a/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb b/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb index 452e3f0eb2..50da62af74 100644 --- a/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb +++ b/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb @@ -8,7 +8,7 @@ require recipes-kernel/linux/linux-yocto.inc # CVE exclusions include recipes-kernel/linux/cve-exclusion_6.12.inc -LINUX_VERSION ?= "6.12.38" +LINUX_VERSION ?= "6.12.39" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}" @@ -17,8 +17,8 @@ DEPENDS += "openssl-native util-linux-native" KMETA = "kernel-meta" KCONF_BSP_AUDIT_LEVEL = "2" -SRCREV_machine ?= "fa4b881d24f752a559d8e1f75ed08895ef20b14d" -SRCREV_meta ?= "5db57044962c6155c4e82f06d87e90dfe49a59e6" +SRCREV_machine ?= "faa83e63e24b8a42361214170269144e55ea85fb" +SRCREV_meta ?= "ae758a118311062560d89a3721abd38d4a35fc1c" PV = "${LINUX_VERSION}+git" diff --git a/meta/recipes-kernel/linux/linux-yocto_6.12.bb b/meta/recipes-kernel/linux/linux-yocto_6.12.bb index b9ae0954fa..f65bc4796a 100644 --- a/meta/recipes-kernel/linux/linux-yocto_6.12.bb +++ b/meta/recipes-kernel/linux/linux-yocto_6.12.bb @@ -18,25 +18,25 @@ KBRANCH:qemux86.104 ?= "v6.12/standard/base" KBRANCH:qemuloongarch64 ?= "v6.12/standard/base" KBRANCH:qemumips64 ?= "v6.12/standard/mti-malta64" -SRCREV_machine:qemuarm ?= "c2755158bc029faf978e980235471b0f0e864814" -SRCREV_machine:qemuarm64 ?= "fa4b881d24f752a559d8e1f75ed08895ef20b14d" -SRCREV_machine:qemuloongarch64 ?= "fa4b881d24f752a559d8e1f75ed08895ef20b14d" -SRCREV_machine:qemumips ?= "facf6694c9bdcaa9efb2d46a2c6e8e30fc72cdd3" -SRCREV_machine:qemuppc ?= "fa4b881d24f752a559d8e1f75ed08895ef20b14d" -SRCREV_machine:qemuriscv64 ?= "fa4b881d24f752a559d8e1f75ed08895ef20b14d" -SRCREV_machine:qemuriscv32 ?= "fa4b881d24f752a559d8e1f75ed08895ef20b14d" -SRCREV_machine:qemux86 ?= "fa4b881d24f752a559d8e1f75ed08895ef20b14d" -SRCREV_machine:qemux86-64 ?= "fa4b881d24f752a559d8e1f75ed08895ef20b14d" -SRCREV_machine:qemumips64 ?= "4ef2a68a188df7f561f5e297c4a3bab7e79e426f" -SRCREV_machine ?= "fa4b881d24f752a559d8e1f75ed08895ef20b14d" -SRCREV_meta ?= "5db57044962c6155c4e82f06d87e90dfe49a59e6" +SRCREV_machine:qemuarm ?= "7898594c1d6927a383cceea44c8e29fdcadaa721" +SRCREV_machine:qemuarm64 ?= "faa83e63e24b8a42361214170269144e55ea85fb" +SRCREV_machine:qemuloongarch64 ?= "faa83e63e24b8a42361214170269144e55ea85fb" +SRCREV_machine:qemumips ?= "465c2461220fbd9e9942cb6360bee9b018fbcd23" +SRCREV_machine:qemuppc ?= "faa83e63e24b8a42361214170269144e55ea85fb" +SRCREV_machine:qemuriscv64 ?= "faa83e63e24b8a42361214170269144e55ea85fb" +SRCREV_machine:qemuriscv32 ?= "faa83e63e24b8a42361214170269144e55ea85fb" +SRCREV_machine:qemux86 ?= "faa83e63e24b8a42361214170269144e55ea85fb" +SRCREV_machine:qemux86-64 ?= "faa83e63e24b8a42361214170269144e55ea85fb" +SRCREV_machine:qemumips64 ?= "cabddbe6741f5b05819b50432e33a0b5a9fe1d68" +SRCREV_machine ?= "faa83e63e24b8a42361214170269144e55ea85fb" +SRCREV_meta ?= "ae758a118311062560d89a3721abd38d4a35fc1c" # set your preferred provider of linux-yocto to 'linux-yocto-upstream', and you'll # get the /base branch, which is pure upstream -stable, and the same # meta SRCREV as the linux-yocto-standard builds. Select your version using the # normal PREFERRED_VERSION settings. BBCLASSEXTEND = "devupstream:target" -SRCREV_machine:class-devupstream ?= "259f4977409c87a980fa2227b7c76a2fe3fb8c2f" +SRCREV_machine:class-devupstream ?= "cdf264c0a5906063a0e2b750d420d77cb992446d" PN:class-devupstream = "linux-yocto-upstream" KBRANCH:class-devupstream = "v6.12/base" @@ -44,7 +44,7 @@ SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;name=machine;branch=${KBRA git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.12;destsuffix=${KMETA};protocol=https" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" -LINUX_VERSION ?= "6.12.38" +LINUX_VERSION ?= "6.12.39" PV = "${LINUX_VERSION}+git" From patchwork Wed Aug 13 20:49:16 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Bruce Ashfield X-Patchwork-Id: 68474 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 2A097CA0EE4 for ; Wed, 13 Aug 2025 20:49:33 +0000 (UTC) Received: from mail-qv1-f51.google.com (mail-qv1-f51.google.com [209.85.219.51]) by mx.groups.io with SMTP id smtpd.web10.7046.1755118168315450473 for ; Wed, 13 Aug 2025 13:49:28 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@gmail.com header.s=20230601 header.b=WSFDpAUh; spf=pass (domain: gmail.com, ip: 209.85.219.51, mailfrom: bruce.ashfield@gmail.com) Received: by mail-qv1-f51.google.com with SMTP id 6a1803df08f44-70a9f5509f5so3223096d6.3 for ; Wed, 13 Aug 2025 13:49:28 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1755118167; x=1755722967; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=ppkbLyvCEnBmLPMqoe6pFe7TbAcMGkDcpReG7o2AOSY=; b=WSFDpAUhEtn4I14hSji2/mfEGd/+7tfQTt+8Cw56iHWlEypErDxsqRtcLaDI0ZVt8G WbSX4puxHdb8E0wKcTEBWomWNz/wqmzZpOIU1ZAXXwzpmgP5Hd22weQX5AzzH0N3TggB dCj7eaWE0VOOJxOY8rx7JjU0Cg61mjB4bdDagWzwxfrHtJK/kI6B0KrXxMUDh2WB3i/v GINcvuAcgsI6GepXifaPDHnIEZuTZXN9nIrf6MZfayIx+7I1qaH8czhjqu3jHOnCBrhL H0xJeSIFztIMe/UkGa17Pes8hwmJM7hgVYKhoXxJLNnC10iZX8Y0EQ1hZaIjNtGAD/dG N+Og== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1755118167; x=1755722967; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=ppkbLyvCEnBmLPMqoe6pFe7TbAcMGkDcpReG7o2AOSY=; b=dri9X4/i1zaGWBdqoUg9rydYO3LdYmfbqMotAX6jtEI7jkrMKtgiLIqhHi4+g9GvvK SW/f1nKCW9ugMAipkwcRV3b9+EVm3WpVmm4NxOLiOEHg7vcY8+3bBUGU8R2gfG74VFzC qRBZiI037rT+y7TdFKt37pfFrrl/eEqETvIP3Kwa3z0vhrQrS7il8Zc+3IQ62Hb49eWM QJmmhd8lIuUVaJ/bNtNMSdeURlZY4GT27ZRdoJRDDs2WIWQP5o3DeY7vvLOVniTXJFff hZ6+VjHfALTFCiCE9rZzEbp4FH9d1BrZ0yBqre44cQDkYqEPzHPiomOOFLvU/HXRwWHa uMmg== X-Gm-Message-State: AOJu0YwL4lbc8YMSQINZgpXvqX69fIjoRGnJgu3ZlenAj8UUX1qOKa34 f31BBN8302vz22kfKlUhnuUCS2gBxN0oL7sNVTdbnwZ5VxwF6A9fYXnVTNdzneVY X-Gm-Gg: ASbGncvlPIWT7T6FAbvp8DEOYNRZzNjjvZB8GLtmBWRzUXaxMjOJj/+FSWizSclEp3M TLql1VOkWjKMAKkk1rBm0plVIJYE8q4+0yYsLOV5FQGg54Av4oBZ1DM9zk/ABZDzb43YnyjYsYS gIvQJXHcy+SMYGykFYz1f3VzKu6B9TWX686Cxck2XfRWGUUxvbDxlcoiTqx7oZErGQnP2StsODn I2W7SZeXd0sJ12EIQ/q+07iQrLQv15b2HC6gc3ysO3PXs1DJho2fbMlKayu2RGwq6g5nnutBHqc 4gM4pA/6rm9EuY2+yBFWvUacNDrDPFm8hbSRSVl82XVOJ2YIY8vLdFOlHHCDEjo0v4/1F5GikKl 2PKklvP9O7BNAO2cO5LkRQeCkeHJHMSeCLekJ7WDyLL1+Be/5F7udEQlzBTQUSlNT4wu3gitG3r hAzoZunbqOJUtwfH0/dYMSIsk= X-Google-Smtp-Source: AGHT+IG7CP5BpTKa/LpnOOTyka2rzsLk4S0yk8VHIHiVcpUeY8pElfgAhBk2Mx3qXiCfSl+/pUYcZw== X-Received: by 2002:a05:6214:e42:b0:709:f5a9:d053 with SMTP id 6a1803df08f44-70af5bcf668mr14158526d6.18.1755118167306; Wed, 13 Aug 2025 13:49:27 -0700 (PDT) Received: from bruce-XPS-8940.localdomain (pool-174-112-62-108.cpe.net.cable.rogers.com. [174.112.62.108]) by smtp.gmail.com with ESMTPSA id 6a1803df08f44-70af5b07658sm3326516d6.43.2025.08.13.13.49.25 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 13 Aug 2025 13:49:26 -0700 (PDT) From: bruce.ashfield@gmail.com To: richard.purdie@linuxfoundation.org Cc: openembedded-core@lists.openembedded.org Subject: [PATCH 2/8] linux-yocto/6.12: update CVE exclusions (6.12.39) Date: Wed, 13 Aug 2025 16:49:16 -0400 Message-Id: <2ef13aba8836643763de25e0d3e32510658156e3.1755118020.git.bruce.ashfield@gmail.com> X-Mailer: git-send-email 2.39.2 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Wed, 13 Aug 2025 20:49:33 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/221822 From: Bruce Ashfield Data pulled from: https://github.com/CVEProject/cvelistV5 1/1 [ Author: cvelistV5 Github Action Email: github_action@example.com Subject: 4 changes (1 new | 3 updated): - 1 new CVEs: CVE-2025-46002 - 3 updated CVEs: CVE-2025-5752, CVE-2025-6717, CVE-2025-7397 Date: Fri, 18 Jul 2025 14:11:28 +0000 ] Signed-off-by: Bruce Ashfield --- meta/recipes-kernel/linux/cve-exclusion_6.12.inc | 16 ++++++++-------- 1 file changed, 8 insertions(+), 8 deletions(-) diff --git a/meta/recipes-kernel/linux/cve-exclusion_6.12.inc b/meta/recipes-kernel/linux/cve-exclusion_6.12.inc index 02931bbf79..e428258bb1 100644 --- a/meta/recipes-kernel/linux/cve-exclusion_6.12.inc +++ b/meta/recipes-kernel/linux/cve-exclusion_6.12.inc @@ -1,11 +1,11 @@ # Auto-generated CVE metadata, DO NOT EDIT BY HAND. -# Generated at 2025-07-15 14:54:42.649263+00:00 for kernel version 6.12.38 -# From linux_kernel_cves cve_2025-07-15_1400Z-4-gc77733e1fe6 +# Generated at 2025-07-18 14:17:49.367230+00:00 for kernel version 6.12.39 +# From linux_kernel_cves cve_2025-07-18_1400Z python check_kernel_cve_status_version() { - this_version = "6.12.38" + this_version = "6.12.39" kernel_version = d.getVar("LINUX_VERSION") if kernel_version != this_version: bb.warn("Kernel CVE status needs updating: generated for %s but kernel is %s" % (this_version, kernel_version)) @@ -4132,7 +4132,7 @@ CVE_STATUS[CVE-2022-49962] = "fixed-version: Fixed from version 6.0" CVE_STATUS[CVE-2022-49963] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2022-49964] = "fixed-version: Fixed from version 6.0" +CVE_STATUS[CVE-2022-49964] = "fixed-version: Fixed from version 5.19.7" CVE_STATUS[CVE-2022-49965] = "fixed-version: Fixed from version 6.0" @@ -5582,8 +5582,6 @@ CVE_STATUS[CVE-2023-52999] = "fixed-version: Fixed from version 6.2" CVE_STATUS[CVE-2023-53000] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-53001] = "fixed-version: Fixed from version 6.2" - CVE_STATUS[CVE-2023-53002] = "fixed-version: Fixed from version 6.2" CVE_STATUS[CVE-2023-53003] = "fixed-version: Fixed from version 6.2" @@ -13672,7 +13670,7 @@ CVE_STATUS[CVE-2025-38065] = "cpe-stable-backport: Backported in 6.12.31" CVE_STATUS[CVE-2025-38066] = "cpe-stable-backport: Backported in 6.12.31" -# CVE-2025-38067 needs backporting (fixed from 6.15) +CVE_STATUS[CVE-2025-38067] = "cpe-stable-backport: Backported in 6.12.39" CVE_STATUS[CVE-2025-38068] = "cpe-stable-backport: Backported in 6.12.31" @@ -13746,7 +13744,7 @@ CVE_STATUS[CVE-2025-38102] = "cpe-stable-backport: Backported in 6.12.34" CVE_STATUS[CVE-2025-38103] = "cpe-stable-backport: Backported in 6.12.34" -# CVE-2025-38104 needs backporting (fixed from 6.15) +CVE_STATUS[CVE-2025-38104] = "cpe-stable-backport: Backported in 6.12.39" # CVE-2025-38105 needs backporting (fixed from 6.16rc1) @@ -14236,6 +14234,8 @@ CVE_STATUS[CVE-2025-38347] = "cpe-stable-backport: Backported in 6.12.35" CVE_STATUS[CVE-2025-38348] = "cpe-stable-backport: Backported in 6.12.35" +CVE_STATUS[CVE-2025-38349] = "cpe-stable-backport: Backported in 6.12.39" + CVE_STATUS[CVE-2025-38479] = "cpe-stable-backport: Backported in 6.12.23" CVE_STATUS[CVE-2025-38575] = "cpe-stable-backport: Backported in 6.12.23" From patchwork Wed Aug 13 20:49:17 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Bruce Ashfield X-Patchwork-Id: 68476 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 2A3FECA0EE6 for ; Wed, 13 Aug 2025 20:49:33 +0000 (UTC) Received: from mail-qv1-f41.google.com (mail-qv1-f41.google.com [209.85.219.41]) by mx.groups.io with SMTP id smtpd.web11.7101.1755118170119247783 for ; Wed, 13 Aug 2025 13:49:30 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@gmail.com header.s=20230601 header.b=O+N0QLNc; spf=pass (domain: gmail.com, ip: 209.85.219.41, mailfrom: bruce.ashfield@gmail.com) Received: by mail-qv1-f41.google.com with SMTP id 6a1803df08f44-70a9f5625b7so3269826d6.2 for ; Wed, 13 Aug 2025 13:49:30 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1755118169; x=1755722969; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=tEQWG4faaRIvynGgt0SG1lHK8/RmGId72i5sJXUOCbU=; b=O+N0QLNcj+jn/C2eNYrykbAFw5oHMwjKXa6k1BFaisQEuUy8ijrFJF8qRly0mRJjAf Vg9OgX4DFMvsSxgT40sepVBZ2oBMnmloqG2JkpLwqB/+Xv3EthwS5EHWI2fV42VI/qm0 hJdDLZ4448I4WBSrkO1vgj8zfeXwlN/CdRPILnQV+QQnhqJejRcUaK+X3UPqqMa8aFGN gGs4YCz2ResWKpzLLudNLfAjMt/EdQFy9SuoHT315uuNdLwjLTakmtt9bPBHAkHdHjeZ DPs0kUhqsM9iROWc2S/FcTGYX4/bu4r5kEJrBoI+WQRrJcwZpeajEP2iyQhG6W3wb/ju TZlw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1755118169; x=1755722969; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=tEQWG4faaRIvynGgt0SG1lHK8/RmGId72i5sJXUOCbU=; b=O5PlHqX/uiOay4Mn5C/zzl/IOI+GPfFnRVRW3vQwVVVOONu7P0whaV7XDmXPMRBZ/a FpnZnVVG8/lbNowvGJC4/XH0e/rSK7/f5W6PME3uWIZZyYm+PMBX1b7b1GRVr2bq4Cv2 IvXBON6u0D+kyFOtw+MhMRC8uigbtJuWh8qECNz9nCTv9swJR4ALJqPEFpcF9yFbF5R3 l5GPxHxxfXn0r5OBVePJ8RTpbhIVi3mRMCwrfBPrV3zMYHRvXIewI4/GqilQbNvcwHsm 4yWC+wH5i2pqfsjTNlTV7yO77zSUkNAWl0U2I9FGDNb28zHriT1DAF/fTcPSv6wlPrF/ iWtQ== X-Gm-Message-State: AOJu0YyNnvBCXjFc5/rQvxbzVZ4tZY40eIxmq0lyWlZY4mp2wPFQiNAg Iq3DJPqCNzuL2cai+mfF/CjzPWR6HvFtct/wOp+t355JjSMV7e6woFzlc3MnCDK7 X-Gm-Gg: ASbGncsjmrhYmCGOmL8zopPM6TASAlmjn52NoAg8ygIVTnrOUoKiGMj440RCC35ZhA/ usm4TUeQUN48cDIqnoK3PkLTSjmT+dZib5MR6Zf1wEAzvifirWWtz2z3eo16J+1ec709EBslXKW qmZWwrA5+adaQxTBxve9Z3nlJv67WDkCzZbSUVpPuQU5t2dq0v5crzT2iGzibRopM28QYn4zaIs pt+wZmJEPtZcLrfS64Hu/C0vtOhDUPqme1LeNH0Vj6KRO6l1iv6bGV7rIAqZCIWpxr/tAOMpyfY C55CsD3i0BqRnKmifsgTRJdylwHTQEr8XOdXdE7ibfBEfIgd7+f1+qLRAQFXrlkMPyh0DhrY9/D rMjjt4P+z05ALjEADjjcSXDZAjsFAKegIbea6nv2Yje5daqMo7gZljFC6h3i4EYKevszS+QBrIR axtYs2Dxxa2Vipn//VrFT7RZA= X-Google-Smtp-Source: AGHT+IGfeG2ROnCfCNIV97ozKHOnMH4zfcdr2LCX5EaiOlJl9KQgb55meQM4DTjmDNd9oXiS3864+Q== X-Received: by 2002:a05:6214:5007:b0:707:4628:3e72 with SMTP id 6a1803df08f44-70af5c7c2ddmr12274226d6.45.1755118168927; Wed, 13 Aug 2025 13:49:28 -0700 (PDT) Received: from bruce-XPS-8940.localdomain (pool-174-112-62-108.cpe.net.cable.rogers.com. [174.112.62.108]) by smtp.gmail.com with ESMTPSA id 6a1803df08f44-70af5b07658sm3326516d6.43.2025.08.13.13.49.27 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 13 Aug 2025 13:49:27 -0700 (PDT) From: bruce.ashfield@gmail.com To: richard.purdie@linuxfoundation.org Cc: openembedded-core@lists.openembedded.org Subject: [PATCH 3/8] linux-yocto/6.12: update to v6.12.40 Date: Wed, 13 Aug 2025 16:49:17 -0400 Message-Id: X-Mailer: git-send-email 2.39.2 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Wed, 13 Aug 2025 20:49:33 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/221823 From: Bruce Ashfield Updating linux-yocto/6.12 to the latest korg -stable release that comprises the following commits: d90ecb2b1308 Linux 6.12.40 fd627ac8a5cf KVM: x86/xen: Fix cleanup logic in emulation of Xen schedop poll hypercalls ff7ccaadb0bf iommu/vt-d: Fix misplaced domain_attached assignment e82d8825f712 smb: client: let smbd_post_send_iter() respect the peers max_send_size and transmit all data 11f430b8f5fc drm/xe: Move page fault init after topology init ce7585324b20 drm/xe/mocs: Initialize MOCS index early 8fc25d3055ba sched,freezer: Remove unnecessary warning in __thaw_task 7258b437d55d i2c: omap: fix deprecated of_property_read_bool() use f701716812cb i2c: omap: Handle omap_i2c_init() errors in omap_i2c_probe() ba35cc0598f3 i2c: omap: Fix an error handling path in omap_i2c_probe() c1a786faa6ec i2c: omap: Add support for setting mux 35fdf1093109 selftests/bpf: Set test path for token/obj_priv_implicit_token_envvar d9ebd928288b rust: use `#[used(compiler)]` to fix build and `modpost` with Rust >= 1.89.0 affb46db59f9 net: libwx: fix multicast packets received count 75747e25beca usb: dwc3: qcom: Don't leave BCR asserted c45b48b4f4c0 usb: hub: Don't try to recover devices lost during warm reset. bf71baa3cfe7 usb: hub: Fix flushing of delayed work used for post resume purposes e11359640090 usb: hub: Fix flushing and scheduling of delayed work that tunes runtime pm aec11e5f9c45 usb: hub: fix detection of high tier USB3 devices behind suspended hubs ee56da95f896 btrfs: fix block group refcount race in btrfs_create_pending_block_groups() e77078e52fbf clone_private_mnt(): make sure that caller has CAP_SYS_ADMIN in the right userns 7fc808d98215 sched: Change nr_uninterruptible type to unsigned long 816d36973467 efivarfs: Fix memory leak of efivarfs_fs_info in fs_context error paths 44e73241b8be libbpf: Fix handling of BPF arena relocations f0de9702f9b2 drm/mediatek: only announce AFBC if really supported 40b5b4ba8ed8 drm/mediatek: Add wait_event_timeout when disabling plane b04fb2628b28 Revert "cgroup_freezer: cgroup_freezing: Check if not frozen" d7c1098787a6 rxrpc: Fix transmission of an abort in response to an abort 839fe96c1520 rxrpc: Fix recv-recv race of completed call e5c480dc62a3 net/sched: Return NULL when htb_lookup_leaf encounters an empty rbtree 71f435f846b0 net: bridge: Do not offload IGMP/MLD messages 8984bcbd1edf net: vlan: fix VLAN 0 refcount imbalance of toggling filtering during runtime cdb767915fc9 tls: always refresh the queue when reading sock 4e7c46362550 virtio-net: fix recursived rtnl_lock() during probe() 1a71bf5c91ab hv_netvsc: Set VF priv_flags to IFF_NO_ADDRCONF before open to prevent IPv6 addrconf 5db93cbd7d50 Bluetooth: L2CAP: Fix attempting to adjust outgoing MTU 1259b780e7b9 drm/xe/pf: Prepare to stop SR-IOV support prior GT reset be77ce6b3a6b drm/xe/pf: Move VFs reprovisioning to worker abe59c53b626 drm/xe/pf: Sanitize VF scratch registers on FLR fc38c249c622 netfilter: nf_conntrack: fix crash due to removal of uninitialised entry 7c532f222361 net: fix segmentation after TCP/UDP fraglist GRO 7929d27c747e ipv6: mcast: Delay put pmc->idev in mld_del_delrec() 35b501a2393a net/mlx5: Correctly set gso_size when LRO is used f47400547a95 Bluetooth: btusb: QCA: Fix downloading wrong NVM for WCN6855 GF variant without board ID f5a40e54cd6c Bluetooth: hci_core: add missing braces when using macro parameters db386fc5fa65 Bluetooth: SMP: Fix using HCI_ERROR_REMOTE_USER_TERM on timeout 6c586fcb880a Bluetooth: SMP: If an unallowed command is received consider it a failure 05ab8da312ec Bluetooth: hci_sync: fix connectable extended advertising when using static random address b97be7ee8a1c Bluetooth: Fix null-ptr-deref in l2cap_sock_resume_cb() 95a13b0a6b04 riscv: traps_misaligned: properly sign extend value in misaligned load handler 32b14e757404 riscv: Enable interrupt during exception handling efad4e2a0fa7 loop: use kiocb helpers to fix lockdep warning 65c666aff44e usb: net: sierra: check for no status endpoint cd469b173d14 ice: check correct pointer in fwlog debugfs 5a5d64f0eec8 ice: add NULL check in eswitch lag check 3c4bdc8a852e hwmon: (corsair-cpro) Validate the size of the received input buffer dcf0f03d7f74 selftests: net: increase inter-packet timeout in udpgro.sh 33711db90bd5 can: tcan4x5x: fix reset gpio usage during probe d587e6929b7c can: tcan4x5x: add option for selecting nWKRQ voltage d57dda2056fa wifi: cfg80211: remove scan request n_channels counted_by 6a466ac72fd4 nvmet-tcp: fix callback lock for TLS handshake f9a90478207a nvme: fix misaccounting of nvme-mpath inflight I/O fd6493533af9 net: phy: Don't register LEDs for genphy 5b02e397929e smc: Fix various oops due to inet_sock type confusion. 124765c20603 nvme: fix endianness of command word prints in nvme_log_err_passthru() 8184ee3c667d nvme: fix inconsistent RCU list manipulation in nvme_ns_add_to_ctrl_list() 9a7de97b915a fix a leak in fcntl_dirnotify() 09bce2138a30 smb: client: fix use-after-free in cifs_oplock_break 06ec83b6c792 rpl: Fix use-after-free in rpl_do_srh_inline(). a6d735100f60 net/sched: sch_qfq: Fix race condition on qfq_aggregate e8767b89cd82 block: fix kobject leak in blk_unregister_queue 20648ff4a203 net: emaclite: Fix missing pointer increment in aligned_read() 894780d6dd3e cachefiles: Fix the incorrect return value in __cachefiles_write() dc05051dd10d selftests/sched_ext: Fix exit selftest hang on UP 6952aeace93f bpf: Reject %p% format string in bprintf-like helpers e80692789679 arm64: dts: imx95: Correct the DMA interrupter number of pcie0_ep 6353bf36f56b soundwire: amd: fix for clearing command status register a6e232ee0f86 soundwire: amd: fix for handling slave alerts after link is down 8814cbbddcaf arm64: dts: rockchip: Add cd-gpios for sdcard detect on Cool Pi 4B 6cb38e5d359a arm64: dts: rockchip: Add cd-gpios for sdcard detect on Cool Pi CM5 c42116dc70af comedi: Fix initialization of data for instructions that write to subdevice 2af1e7d389c2 comedi: Fix use of uninitialized data in insn_rw_emulate_bits() 8c20a5cb9879 comedi: Fix some signed shift left operations 992d600f284e comedi: Fail COMEDI_INSNLIST ioctl if n_insns is too large 3eab654f5d19 comedi: das6402: Fix bit shift out of bounds 076b13ee60eb comedi: das16m1: Fix bit shift out of bounds e0f3c0867d7d comedi: aio_iiro_16: Fix bit shift out of bounds a27e27eee313 comedi: pcl812: Fix bit shift out of bounds 610615c96680 iio: common: st_sensors: Fix use of uninitialize device structs 6eea9f7648dd iio: backend: fix out-of-bound write 404b1d0fe0c6 iio: adc: stm32-adc: Fix race in installing chained IRQ handler 07c9a0617d9a iio: adc: max1363: Reorder mode_list[] entries 0ceb2893d360 iio: adc: max1363: Fix MAX1363_4X_CHANS/MAX1363_8X_CHANS[] 086a76474121 iio: adc: axp20x_adc: Add missing sentinel to AXP717 ADC channel maps bfcda3e10157 iio: accel: fxls8962af: Fix use after free in fxls8962af_fifo_flush b361598b7352 soc: aspeed: lpc-snoop: Don't disable channels that aren't enabled 855d4da5f270 soc: aspeed: lpc-snoop: Cleanup resources in stack-order 2a76bc2b24ed smb: client: fix use-after-free in crypt_message when using async crypto d5629d1af060 s390/bpf: Fix bpf_arch_text_poke() with new_addr == NULL again 11c19d42d3a7 pmdomain: governor: Consider CPU latency tolerance from pm_domain_cpu_gov 10e27b2a6ebe net: libwx: properly reset Rx ring descriptor ba7c793f96c1 net: libwx: fix the using of Rx buffer DMA 08d18bda0d03 net: libwx: remove duplicate page_pool_put_full_page() 74cb0f102d4b net: stmmac: intel: populate entire system_counterval_t in get_time_fn() callback 516cd0943a22 mmc: sdhci_am654: Workaround for Errata i2312 5280e0b8bc69 mmc: sdhci-pci: Quirk for broken command queuing on Intel GLK-based Positivo models 6198bfe1af77 mmc: bcm2835: Fix dma_unmap_sg() nents value a25ebc337022 memstick: core: Zero initialize id_reg in h_memstick_read_dev_id() 2594d5ffc081 isofs: Verify inode mode when loading from disk 122160289adf dmaengine: nbpfaxi: Fix memory corruption in probe() 573f1e59024c cpuidle: psci: Fix cpuhotplug routine with PREEMPT_RT=y 9e11e0db4e27 Bluetooth: btintel: Check if controller is ISO capable on btintel_classify_pkt_type 1ddedbd8087d af_packet: fix soft lockup issue caused by tpacket_snd() fa0796cd62c2 af_packet: fix the SO_SNDTIMEO constraint not effective on tpacked_snd() 0e9c4b36ad0c arm64: dts: rockchip: use cs-gpios for spi1 on ringneck b0c7f2984356 arm64: dts: imx8mp-venice-gw73xx: fix TPM SPI frequency 9650e49db619 arm64: dts: imx8mp-venice-gw72xx: fix TPM SPI frequency a3964e87cf15 arm64: dts: imx8mp-venice-gw71xx: fix TPM SPI frequency 1a54317f3868 arm64: dts: freescale: imx8mm-verdin: Keep LDO5 always on a86ea423dc13 arm64: dts: add big-endian property back into watchdog node c70000779432 arm64: dts: imx8mp-venice-gw74xx: fix TPM SPI frequency 5419adaef571 net/mlx5: Update the list of the PCI supported devices 837a9631f180 phonet/pep: Move call to pn_skb_get_dst_sockaddr() earlier in pep_sock_accept() 938126995e64 mptcp: reset fallback status gracefully at disconnect() time f81b6fbe13c7 mptcp: plug races between subflow fail and subflow creation 54999dea879f mptcp: make fallback action and fallback decision atomic f28044a60506 io_uring/poll: fix POLLERR handling 134ec1ed468f ALSA: hda/realtek: Add quirk for ASUS ROG Strix G712LWS 61e867574444 ALSA: hda/realtek - Fix mute LED for HP Victus 16-r0xxx 084eb54b820f drm/amd/display: Free memory allocation 74162dda80e7 drm/amd/display: Disable CRTC degamma LUT for DCN401 62f2a58a4cb0 drm/amdgpu: Increase reset counter only on success 228ad2ab5b33 drm/amdgpu/gfx8: reset compute ring wptr on the GPU on resume 21e649b0bd1a objtool/rust: add one more `noreturn` Rust function for Rust 1.89.0 7bb9ea515cda tracing/osnoise: Fix crash in timerlat_dump_stack() 33e20747b47d tracing: Add down_write(trace_event_sem) when adding trace event 692cfff241f1 tracing/probes: Avoid using params uninitialized in parse_btf_arg() d18f63e84884 HID: core: do not bypass hid_hw_raw_request 953af3c0814a HID: core: ensure __hid_request reserves the report ID as the first byte a262370f385e HID: core: ensure the allocated report buffer can contain the reserved report ID 68860d1ade38 dm-bufio: fix sched in atomic context 0758f7ef402b spi: Add check for 8-bit transfer with 8 IO mode support 40f79e2bf6a4 pch_uart: Fix dma_sync_sg_for_device() nents value 9ecfed987bc8 Input: xpad - set correct controller type for Acer NGR200 c29a2328af96 nvmem: layouts: u-boot-env: remove crc32 endianness conversion c85295f624db nvmem: imx-ocotp: fix MAC address byte length ff628593ba7c Revert "staging: vchiq_arm: Create keep-alive thread during probe" 970635ed63da thunderbolt: Fix bit masking in tb_dp_port_set_hops() 17a6ea23890e thunderbolt: Fix wake on connect at runtime 1a1190b4ba7b i2c: stm32f7: unmap DMA mapped buffer 79b63523bfdc i2c: stm32: fix the device used for the DMA map 783ea37b237a usb: gadget: configfs: Fix OOB read on empty string write 032f22962bfc usb: dwc2: gadget: Fix enter to hibernation for UTMI+ PHY 231bf7e839a8 usb: musb: fix gadget state on disconnect 951dd99ac05a USB: serial: ftdi_sio: add support for NDI EMGUIDE GEMINI 8b8cb0c34c66 USB: serial: option: add Foxconn T99W640 ba1d8dc87ae7 USB: serial: option: add Telit Cinterion FE910C04 (ECM) composition 248ba00d13ff phy: tegra: xusb: Disable periodic tracking on Tegra234 2f2a375304b0 phy: tegra: xusb: Decouple CYA_TRK_CODE_UPDATE_ON_IDLE from trk_hw_mode ec7f98ff05f0 phy: tegra: xusb: Fix unbalanced regulator disable in UTMI PHY mode Signed-off-by: Bruce Ashfield --- .../linux/linux-yocto-rt_6.12.bb | 6 ++-- .../linux/linux-yocto-tiny_6.12.bb | 6 ++-- meta/recipes-kernel/linux/linux-yocto_6.12.bb | 28 +++++++++---------- 3 files changed, 20 insertions(+), 20 deletions(-) diff --git a/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb b/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb index c003d8464b..fdb0caa943 100644 --- a/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb +++ b/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb @@ -14,13 +14,13 @@ python () { raise bb.parse.SkipRecipe("Set PREFERRED_PROVIDER_virtual/kernel to linux-yocto-rt to enable it") } -SRCREV_machine ?= "ae0f27c5992d230fddf2cab92dc5ae86417285d3" -SRCREV_meta ?= "ae758a118311062560d89a3721abd38d4a35fc1c" +SRCREV_machine ?= "96c3b8967c299edb7c8fd1beff358624e3aac443" +SRCREV_meta ?= "52dd739a32215ffca801bc40daebee19a01b6f20" SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;branch=${KBRANCH};name=machine;protocol=https \ git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.12;destsuffix=${KMETA};protocol=https" -LINUX_VERSION ?= "6.12.39" +LINUX_VERSION ?= "6.12.40" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" diff --git a/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb b/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb index 50da62af74..3dccc9e723 100644 --- a/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb +++ b/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb @@ -8,7 +8,7 @@ require recipes-kernel/linux/linux-yocto.inc # CVE exclusions include recipes-kernel/linux/cve-exclusion_6.12.inc -LINUX_VERSION ?= "6.12.39" +LINUX_VERSION ?= "6.12.40" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}" @@ -17,8 +17,8 @@ DEPENDS += "openssl-native util-linux-native" KMETA = "kernel-meta" KCONF_BSP_AUDIT_LEVEL = "2" -SRCREV_machine ?= "faa83e63e24b8a42361214170269144e55ea85fb" -SRCREV_meta ?= "ae758a118311062560d89a3721abd38d4a35fc1c" +SRCREV_machine ?= "50893c3858cc7bbc15a174f06fa30fba25306cac" +SRCREV_meta ?= "52dd739a32215ffca801bc40daebee19a01b6f20" PV = "${LINUX_VERSION}+git" diff --git a/meta/recipes-kernel/linux/linux-yocto_6.12.bb b/meta/recipes-kernel/linux/linux-yocto_6.12.bb index f65bc4796a..c58e5f07f4 100644 --- a/meta/recipes-kernel/linux/linux-yocto_6.12.bb +++ b/meta/recipes-kernel/linux/linux-yocto_6.12.bb @@ -18,25 +18,25 @@ KBRANCH:qemux86.104 ?= "v6.12/standard/base" KBRANCH:qemuloongarch64 ?= "v6.12/standard/base" KBRANCH:qemumips64 ?= "v6.12/standard/mti-malta64" -SRCREV_machine:qemuarm ?= "7898594c1d6927a383cceea44c8e29fdcadaa721" -SRCREV_machine:qemuarm64 ?= "faa83e63e24b8a42361214170269144e55ea85fb" -SRCREV_machine:qemuloongarch64 ?= "faa83e63e24b8a42361214170269144e55ea85fb" -SRCREV_machine:qemumips ?= "465c2461220fbd9e9942cb6360bee9b018fbcd23" -SRCREV_machine:qemuppc ?= "faa83e63e24b8a42361214170269144e55ea85fb" -SRCREV_machine:qemuriscv64 ?= "faa83e63e24b8a42361214170269144e55ea85fb" -SRCREV_machine:qemuriscv32 ?= "faa83e63e24b8a42361214170269144e55ea85fb" -SRCREV_machine:qemux86 ?= "faa83e63e24b8a42361214170269144e55ea85fb" -SRCREV_machine:qemux86-64 ?= "faa83e63e24b8a42361214170269144e55ea85fb" -SRCREV_machine:qemumips64 ?= "cabddbe6741f5b05819b50432e33a0b5a9fe1d68" -SRCREV_machine ?= "faa83e63e24b8a42361214170269144e55ea85fb" -SRCREV_meta ?= "ae758a118311062560d89a3721abd38d4a35fc1c" +SRCREV_machine:qemuarm ?= "3884ae3c574f932b6cfe528f86c83214c2e8a36e" +SRCREV_machine:qemuarm64 ?= "50893c3858cc7bbc15a174f06fa30fba25306cac" +SRCREV_machine:qemuloongarch64 ?= "50893c3858cc7bbc15a174f06fa30fba25306cac" +SRCREV_machine:qemumips ?= "39d23e283ab644b5a8758046130b8c22847176f8" +SRCREV_machine:qemuppc ?= "50893c3858cc7bbc15a174f06fa30fba25306cac" +SRCREV_machine:qemuriscv64 ?= "50893c3858cc7bbc15a174f06fa30fba25306cac" +SRCREV_machine:qemuriscv32 ?= "50893c3858cc7bbc15a174f06fa30fba25306cac" +SRCREV_machine:qemux86 ?= "50893c3858cc7bbc15a174f06fa30fba25306cac" +SRCREV_machine:qemux86-64 ?= "50893c3858cc7bbc15a174f06fa30fba25306cac" +SRCREV_machine:qemumips64 ?= "3cf1294a14f4a23376b86201ab5bdff6159102ad" +SRCREV_machine ?= "50893c3858cc7bbc15a174f06fa30fba25306cac" +SRCREV_meta ?= "52dd739a32215ffca801bc40daebee19a01b6f20" # set your preferred provider of linux-yocto to 'linux-yocto-upstream', and you'll # get the /base branch, which is pure upstream -stable, and the same # meta SRCREV as the linux-yocto-standard builds. Select your version using the # normal PREFERRED_VERSION settings. BBCLASSEXTEND = "devupstream:target" -SRCREV_machine:class-devupstream ?= "cdf264c0a5906063a0e2b750d420d77cb992446d" +SRCREV_machine:class-devupstream ?= "d90ecb2b1308b3e362ec4c21ff7cf0a051b445df" PN:class-devupstream = "linux-yocto-upstream" KBRANCH:class-devupstream = "v6.12/base" @@ -44,7 +44,7 @@ SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;name=machine;branch=${KBRA git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.12;destsuffix=${KMETA};protocol=https" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" -LINUX_VERSION ?= "6.12.39" +LINUX_VERSION ?= "6.12.40" PV = "${LINUX_VERSION}+git" From patchwork Wed Aug 13 20:49:18 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Bruce Ashfield X-Patchwork-Id: 68471 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 17EE8C87FCF for ; Wed, 13 Aug 2025 20:49:33 +0000 (UTC) Received: from mail-qv1-f54.google.com (mail-qv1-f54.google.com [209.85.219.54]) by mx.groups.io with SMTP id smtpd.web10.7048.1755118171038410872 for ; Wed, 13 Aug 2025 13:49:31 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@gmail.com header.s=20230601 header.b=A74u3WK2; spf=pass (domain: gmail.com, ip: 209.85.219.54, mailfrom: bruce.ashfield@gmail.com) Received: by mail-qv1-f54.google.com with SMTP id 6a1803df08f44-70a9f5d4d97so3886776d6.3 for ; Wed, 13 Aug 2025 13:49:30 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1755118170; x=1755722970; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=2G/rbx13N32uOtjBXB5kevlP1DexzAZWbsavpv/uSs0=; b=A74u3WK2X/zO5A9h0fqbIRgXgn8OGep/hI96qzLS3ynizO+yhjYq9CzRnEkFBojrrn sRGGddtD6tW8qJ3ttnFkVLJCUxn2B8ctPdROEIvHYT2GryInwv58yJBIhLjLm9ogCfU0 AWjsYKqFkgT+2TGZpVeUYvXKfsekOYt4ow59DcSdx6VjhkeSbcYi93KrZW/Re81eC0kG nUpwdQ7U46L1MOkd4vn8rQbEAJKfV+o36LFX3W+9QFyp/SSTTO4d4+BZjauKd4UxP43x YwFg5zeyu5Xl9lslwlsRyeLldmbpqLwQHgZtFpig3UK+FfS9cx+JK49Q9eM7yltIA5pe ge1A== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1755118170; x=1755722970; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=2G/rbx13N32uOtjBXB5kevlP1DexzAZWbsavpv/uSs0=; b=ekFdbsskr45oOnKVn6W9PWdIgO6jsiRkn7zA0CMJjzltBz8cCz2+Go9Xx1O0ZyBlhj zt+gHrIPybDDhevOXVdMTvxbE9hhclkOGzs7ok884N+miZNa6gZ/CIZPtJM8kznONOKx JkCoT9hf2Fe1+pDyKNwFkY/jBZ4ffl0c15r2KszTJRKbmqC/aXUNtxPo1w5/vSwIcQRT FFFMtXZ49fdZWfO+OgWeGQKQxQmxRs3RC9nRtMl3HYOfiidkYUzd/0u+RCogcN1J5Joe 0GdE5w28E/g7DPfDevtL1xOJfI/YF8oci0HVCl0AF2iQae1oEq+1P47qGrLjkkVJaTV7 HTfA== X-Gm-Message-State: AOJu0YzZc/R+lzmLS4EC4SXGnpSubAghvInBK5uxhD5znXJSeagGb08M 3KzBLY4UrGhJnCfg9r3qUMFzYkmYALFtonrNfPT8UvKgHe/Bsch+Ynor X-Gm-Gg: ASbGncsqpJ0liu1T+U/AHnfi17flqTV3JeXVrQYKAit0eZzKEk0q4OB9uaZPL0kQd26 YUGUgfmErkb51V6yiY9C7ZXSEvtRrNPVhDGSP6kp9lTaKfdrODImBgKBZqJuxoTcImxfQdDXodp l+OZ7Y4s+gmlyH/H4REd36xa8qmoraxypYactbswey9VwiDdh7lZI1B7ouM6UYj0qT2vJbv1LHe Sj0SuP1lrYLqZF3kWuPpbwQjYdxu4gK8yDOGkMkNtMWQRoSdVZiX79VRziTEjS9+17pj40t/VGK wPuRmvs5sN1Q8YyQ+8mAffnIAohKIAaYJahFRoix0rNVObsfFC5cPcBmV2h2BBQ0nmIgfop2uar q3XWs2k33kv9a+YElDHduZuXFt5NmghQszbZ1l7hKmXajyERbs0zgRIxB2JyQm4HYSmfsc36BN1 +nJWm4S9tmz+RbcZ+MYw96/BI= X-Google-Smtp-Source: AGHT+IEGZRRFQOaxfJH1ceA0Cv2cdREzSVtoHkpd06YP6BphzeraA9rKxxU0xmFDubAaBTdHfvotKw== X-Received: by 2002:a05:6214:500a:b0:702:daca:9049 with SMTP id 6a1803df08f44-70ae6d37321mr13484666d6.7.1755118169950; Wed, 13 Aug 2025 13:49:29 -0700 (PDT) Received: from bruce-XPS-8940.localdomain (pool-174-112-62-108.cpe.net.cable.rogers.com. [174.112.62.108]) by smtp.gmail.com with ESMTPSA id 6a1803df08f44-70af5b07658sm3326516d6.43.2025.08.13.13.49.29 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 13 Aug 2025 13:49:29 -0700 (PDT) From: bruce.ashfield@gmail.com To: richard.purdie@linuxfoundation.org Cc: openembedded-core@lists.openembedded.org Subject: [PATCH 4/8] linux-yocto/6.12: update CVE exclusions (6.12.40) Date: Wed, 13 Aug 2025 16:49:18 -0400 Message-Id: <1167278d1e94e749b48f3ed1d10dba8115c0ed4b.1755118020.git.bruce.ashfield@gmail.com> X-Mailer: git-send-email 2.39.2 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Wed, 13 Aug 2025 20:49:33 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/221824 From: Bruce Ashfield Data pulled from: https://github.com/CVEProject/cvelistV5 1/1 [ Author: cvelistV5 Github Action Email: github_action@example.com Subject: 4 changes (1 new | 3 updated): - 1 new CVEs: CVE-2025-8126 - 3 updated CVEs: CVE-2025-31952, CVE-2025-31953, CVE-2025-31955 Date: Fri, 25 Jul 2025 02:18:30 +0000 ] Signed-off-by: Bruce Ashfield --- meta/recipes-kernel/linux/cve-exclusion_6.12.inc | 14 ++++++++++---- 1 file changed, 10 insertions(+), 4 deletions(-) diff --git a/meta/recipes-kernel/linux/cve-exclusion_6.12.inc b/meta/recipes-kernel/linux/cve-exclusion_6.12.inc index e428258bb1..ee2f30b3db 100644 --- a/meta/recipes-kernel/linux/cve-exclusion_6.12.inc +++ b/meta/recipes-kernel/linux/cve-exclusion_6.12.inc @@ -1,11 +1,11 @@ # Auto-generated CVE metadata, DO NOT EDIT BY HAND. -# Generated at 2025-07-18 14:17:49.367230+00:00 for kernel version 6.12.39 -# From linux_kernel_cves cve_2025-07-18_1400Z +# Generated at 2025-07-25 02:49:32.259439+00:00 for kernel version 6.12.40 +# From linux_kernel_cves cve_2025-07-25_0100Z-1-g854b2f05e2c python check_kernel_cve_status_version() { - this_version = "6.12.39" + this_version = "6.12.40" kernel_version = d.getVar("LINUX_VERSION") if kernel_version != this_version: bb.warn("Kernel CVE status needs updating: generated for %s but kernel is %s" % (this_version, kernel_version)) @@ -12938,7 +12938,7 @@ CVE_STATUS[CVE-2025-22112] = "cpe-stable-backport: Backported in 6.12.35" CVE_STATUS[CVE-2025-22114] = "fixed-version: only affects 6.14 onwards" -# CVE-2025-22115 needs backporting (fixed from 6.15) +CVE_STATUS[CVE-2025-22115] = "cpe-stable-backport: Backported in 6.12.40" # CVE-2025-22116 needs backporting (fixed from 6.15) @@ -14236,6 +14236,12 @@ CVE_STATUS[CVE-2025-38348] = "cpe-stable-backport: Backported in 6.12.35" CVE_STATUS[CVE-2025-38349] = "cpe-stable-backport: Backported in 6.12.39" +CVE_STATUS[CVE-2025-38350] = "cpe-stable-backport: Backported in 6.12.37" + +# CVE-2025-38351 needs backporting (fixed from 6.16rc6) + +CVE_STATUS[CVE-2025-38352] = "cpe-stable-backport: Backported in 6.12.34" + CVE_STATUS[CVE-2025-38479] = "cpe-stable-backport: Backported in 6.12.23" CVE_STATUS[CVE-2025-38575] = "cpe-stable-backport: Backported in 6.12.23" From patchwork Wed Aug 13 20:49:19 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Bruce Ashfield X-Patchwork-Id: 68473 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 41B49CA0EE7 for ; Wed, 13 Aug 2025 20:49:33 +0000 (UTC) Received: from mail-qt1-f171.google.com (mail-qt1-f171.google.com [209.85.160.171]) by mx.groups.io with SMTP id smtpd.web10.7051.1755118172622091004 for ; Wed, 13 Aug 2025 13:49:32 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@gmail.com header.s=20230601 header.b=F7eFCInf; spf=pass (domain: gmail.com, ip: 209.85.160.171, mailfrom: bruce.ashfield@gmail.com) Received: by mail-qt1-f171.google.com with SMTP id d75a77b69052e-4b1099126afso4420631cf.0 for ; Wed, 13 Aug 2025 13:49:32 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1755118172; x=1755722972; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=0nM/hJtI0HX3X/2IvK/tuOTYMQXKdth0KmB7RXeg50c=; b=F7eFCInfn2Y54QdlFJTQtXnJ4HYOPL2TnRRFtHW1zSA5kQDgb4zohZSEPoGKhbScLy 13S0DRJAlAEJmmXHkmsfn6nfQ64QeFinkeYKuwRBjBgU5rN62XIpWZ1tUWXyd9unoaoV d6YxGTbL8dsdkJ2g0ykoI0nEdMKSokmcmO8Ylnt8kRaIyBhlhM/iBSOOgmmDhW2SJ/YO 0AlGPMcP07ZGsK0741nYVGPWUh8dfZmAU7gN3ttft6Tyq6cbgTQAhWgq8Mb16NpjCQn5 Ufup0bpCp9EnoZwyR4L4P/ye5m0H0GiNYUMsOC2yNgPlh3NVDrMlaHAIpdeTINpOqMuP GnmQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1755118172; x=1755722972; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=0nM/hJtI0HX3X/2IvK/tuOTYMQXKdth0KmB7RXeg50c=; b=BtssA8jwYJfAde5Z0ZqW1Z73bYQMh0XkAG54nkID/XEz7HCosYhlrBNFEJykGlv+th fzSrYIAcx8Ot+TwsdHqXbo1xu0dLj7FVdA6TWXcfm+QNkLoqcK97yrYmYCZDJu8w6Xbu lttXzuXzTest/SZ3Wk9iqom+z/Z5U7nEu1hukMVCgmRJUX4ykD/0oUsUEaOp86q14JRa qXyhTCc/6v/xOGtjcRbDlCY3cCe+Pfgv8OGExJaqF5axwPDiPAbsKSRp5M78x+FxVJes LOvkT3LcY/lDvcbGtKzwAsS2biHH0S/CwIyE6+MtZhA7lgC8thrcE21Kh0qB7NjENSGF skwg== X-Gm-Message-State: AOJu0Yx1h5VhO36lJfXyIbz45ShJFJxm4BSEWq2lAlo9ER2Uu2g9uygS rEAUnliQmFX59oBz1WR0tvTkIjjIk+FZUNh9aEdlMMFSiIoSMlIQeJ8aAF4N/1jG X-Gm-Gg: ASbGncspnLupbxV3brgBSDATcSK6yGeF3TcuOZLX9RnONjG2ASFpX5TfSvGtvavufDu 7fXtasdJpE3P6anMbrZ8efiJf9ybAOo7mtymNpgMcc9z0zrAr58WeQ0I7zI9egICiY0K5jk3pn0 fbgvwhYdhFECYXZMcDym1ykChPAAl6i/dATRU56cASZr8+CKpUrQs2UsxEXZV6ki2nWzcv0N70u kfEpH8Sf++d6JxJGhyKnxeLM7HfC/Lh0SCSVl0zVRTLxDHmyKSOgSArcIgXlAR50quqt7zyeQIX AaT+vi3SliZArpq5b/3O/M8YVqQJKuEaTRxLLLRTiZKBnGeb3zM40F0kI/CmwpTOuWIkAKgCb3r dRCusr4DNArotN4AwymfM39j2A1jmsmL94nipOL1IAlx3kZLAYzeodQ9cHYbbiBrud/Y9ttV6XM AwylAApSi8SbrcdBU414Qn8XkzqlfM8Z2CQQ== X-Google-Smtp-Source: AGHT+IFZuYIVvFIxce/mGVtdpfk4xzViJE5TtVajKGb2UK2rQq06hqmTUMKJtOh3wLMm9ITZjF1y4A== X-Received: by 2002:ac8:590e:0:b0:4b0:7950:8cdb with SMTP id d75a77b69052e-4b10abcaa14mr9003191cf.31.1755118171465; Wed, 13 Aug 2025 13:49:31 -0700 (PDT) Received: from bruce-XPS-8940.localdomain (pool-174-112-62-108.cpe.net.cable.rogers.com. [174.112.62.108]) by smtp.gmail.com with ESMTPSA id 6a1803df08f44-70af5b07658sm3326516d6.43.2025.08.13.13.49.30 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 13 Aug 2025 13:49:30 -0700 (PDT) From: bruce.ashfield@gmail.com To: richard.purdie@linuxfoundation.org Cc: openembedded-core@lists.openembedded.org Subject: [PATCH 5/8] linux-libc-headers: update to v6.16 Date: Wed, 13 Aug 2025 16:49:19 -0400 Message-Id: <7e13ec7462482575bc4f2331e17c803c5f522b01.1755118020.git.bruce.ashfield@gmail.com> X-Mailer: git-send-email 2.39.2 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Wed, 13 Aug 2025 20:49:33 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/221825 From: Bruce Ashfield 6.16 will be the reference kernel for the fall 2025 release, bumping our libc-headers to match. Signed-off-by: Bruce Ashfield --- .../{linux-libc-headers_6.15.bb => linux-libc-headers_6.16.bb} | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) rename meta/recipes-kernel/linux-libc-headers/{linux-libc-headers_6.15.bb => linux-libc-headers_6.16.bb} (80%) diff --git a/meta/recipes-kernel/linux-libc-headers/linux-libc-headers_6.15.bb b/meta/recipes-kernel/linux-libc-headers/linux-libc-headers_6.16.bb similarity index 80% rename from meta/recipes-kernel/linux-libc-headers/linux-libc-headers_6.15.bb rename to meta/recipes-kernel/linux-libc-headers/linux-libc-headers_6.16.bb index 70d2fd80ee..c3c77f8719 100644 --- a/meta/recipes-kernel/linux-libc-headers/linux-libc-headers_6.15.bb +++ b/meta/recipes-kernel/linux-libc-headers/linux-libc-headers_6.16.bb @@ -8,5 +8,5 @@ SRC_URI:append:libc-musl = "\ LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" -SRC_URI[sha256sum] = "7586962547803be7ecc4056efc927fb25214548722bd28171172f3599abb9764" +SRC_URI[sha256sum] = "1a4be2fe6b5246aa4ac8987a8a4af34c42a8dd7d08b46ab48516bcc1befbcd83" From patchwork Wed Aug 13 20:49:20 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Bruce Ashfield X-Patchwork-Id: 68478 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 43B1CCA0EE5 for ; Wed, 13 Aug 2025 20:49:43 +0000 (UTC) Received: from mail-qk1-f179.google.com (mail-qk1-f179.google.com [209.85.222.179]) by mx.groups.io with SMTP id smtpd.web11.7103.1755118173641584712 for ; Wed, 13 Aug 2025 13:49:33 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@gmail.com header.s=20230601 header.b=buO7aP5w; spf=pass (domain: gmail.com, ip: 209.85.222.179, mailfrom: bruce.ashfield@gmail.com) Received: by mail-qk1-f179.google.com with SMTP id af79cd13be357-7e864c4615aso150342585a.1 for ; Wed, 13 Aug 2025 13:49:33 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1755118173; x=1755722973; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=9x0PwB5f2aqCIg9sj7klJsGsUfmcGfY8mcHQuptftWs=; b=buO7aP5whcw44sVbzhBGbPggj1wn9vTEEZeF4VuiW/FyZHvULhI2nNPeGI8nU2jp1m KiN46cnYLMxLr07+2oK4oF/lCqZpW8wKVff5CdVSxevVX/K0dDY0WkIeJUHem3IaiABG 93oEDcX2AAi3o+lSSDJh4/xABOlJHdOINlBm8hFpUZVItz3a2EuJTTMx3gFttrjDLX2j wuWy6P1KZS7HE87pphCQVmaRJNI+y7pRWXtY16UBtyCXN6xBkibBezJYE3RCU+cLP8T/ JJ4Lc6Gg6MoAmINKjpknbdzyZAwy8rZbr6GMRhQ/5TnErTpI65iRV2Gc1sy36Cxzw51J fAFg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1755118173; x=1755722973; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=9x0PwB5f2aqCIg9sj7klJsGsUfmcGfY8mcHQuptftWs=; b=Y3m767L3+b92Y1BxuWd8mRayjoOo2hPvAgEXr/A8lmTfbJWrxtikNfxvwoJSfdXAP+ k4Ba4nKEIQFdDj9UQZJGKCJPGwPbNJxfsQWJ2ND9oTQtewx0EDPOmxUrVS+kz7ibnpwi sF+82N76wVRRd0o9uhdcTeISUn5t2M0VofE24D+eKj5X2EJEBA9oP3sEL+RqHoq7glVR zZ6pyu039CB1dSudduwxQw6Ob1FJ82cC4mqL5bCsrb0IQ22I0YQhqwljAlVOrT3psgOg pGq7bONHO3Uat7HGttUH6v6DSnYJCSLPyQ5W0HLc51/yp8M+OqO/Ci4OXKWpD2Dxz9Fp x2+Q== X-Gm-Message-State: AOJu0Yzr1gF/2cFsShriifXuyVFdxb6y962nHKc/j7B8JX+/keMcCBBT 0YDux2KCs5T/sWPgp9gLg4cKibo5PwfchmkHdABW8P6A8xJ+ZFjl+O5R8kDGvZcw X-Gm-Gg: ASbGncuTlLZKHIbuYc4lBQMpPTzXgs+0u3p7zKDgIKL5uKZamUlsmePcGh+nTLrO90/ cNYBDsAFUcLlbtOuDdnCukjD+CmShSTpmDfj70VoQGNNO4DZqyfKJOE6SFNaP/NtH559dFfSt4m 30dFAGnW/LlYq52Q0FYk7nv2ffm18tL97eoQKVW7J0cWY8wXytNShb443fWLYDaxIhNjxKb30zM lwoLD7Tj37CTrXSmTOYC7D+6HGKShkq2fxff7WJnjqfAuAL4lho+ZHpl/B5lZZ8fdfDKL7xvzkk xT0YEI3aCJAFpbDjXY6oD9wKROhYzgA2+J1SmYZn4sjcIeOtw3zp2Od9pE6hhi9Qbb69jUfwHMA SNXEjD5ILqx6tjfNmZkehrwj2qXu/8XYheT+hO1jaQo9sEWp1CvgQqZpxzWtQOLl2Mh6B9GHYyc rLgcY9NLLV0GzmR2VTVOUYllGyt7zACWtKzA== X-Google-Smtp-Source: AGHT+IG/g4QpEVimajMvQ8xoG5ceUQJfZT8CXzRtzJYwnBGpwNg/FI2eEPQUbBJBGNS8l/kjWE5iXA== X-Received: by 2002:a05:6214:20c3:b0:709:66dd:dd51 with SMTP id 6a1803df08f44-70b97d3f082mr3854156d6.6.1755118172410; Wed, 13 Aug 2025 13:49:32 -0700 (PDT) Received: from bruce-XPS-8940.localdomain (pool-174-112-62-108.cpe.net.cable.rogers.com. [174.112.62.108]) by smtp.gmail.com with ESMTPSA id 6a1803df08f44-70af5b07658sm3326516d6.43.2025.08.13.13.49.31 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 13 Aug 2025 13:49:31 -0700 (PDT) From: bruce.ashfield@gmail.com To: richard.purdie@linuxfoundation.org Cc: openembedded-core@lists.openembedded.org Subject: [PATCH 6/8] lttng-modules: update to v2.14.0 Date: Wed, 13 Aug 2025 16:49:20 -0400 Message-Id: X-Mailer: git-send-email 2.39.2 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Wed, 13 Aug 2025 20:49:43 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/221826 From: Bruce Ashfield As part of this update: - drop one patch that is upstream now - refresh one patch for new context - backport two patches to fix the build against 6.16 (drop them in 2.14.1+ - update the license checksum, as the following change has been made to the license: commit 61baff6e8de2462f45006662bc34bcbf5f645ba0 Author: Michael Jeanson Date: Tue Jun 18 14:35:38 2024 -0400 Implement REUSE 3.0 with SPDX identifiers Implement the full REUSE spec [1] to help with copyright and licensing audits and compliance. This will reduce a lot of manual work for the licensing audit required in Debian on each update and also allow using automated tools. For files that lacked copyright and licensing information, I used the following guidelines. If a clear author could be determined from the git history use it, otherwise use 'EfficiOS Inc.'. For code use 'GPL-2.0-only OR LGPL-2.1-only' unless otherwise stated, for documentation 'CC-BY-SA-4.0' and for data files 'CC0-1.0'. Freeform text files were converted to Markdown to allow licensing comments. Running the reuse tool on the repo is now succesful: $ reuse lint # SUMMARY * Bad licenses: 0 * Deprecated licenses: 0 * Licenses without file extension: 0 * Missing licenses: 0 * Unused licenses: 0 * Used licenses: CC0-1.0, GPL-2.0-only, CC-BY-SA-4.0, MIT, LGPL-2.1-only * Read errors: 0 * files with copyright information: 358 / 358 * files with license information: 358 / 358 Congratulations! Your project is compliant with version 3.0 of the REUSE Specification :-) [1] https://reuse.software/tutorial/ Change-Id: I1755cab24a6fcec7a6c9a2136891418203ec34b8 Signed-off-by: Michael Jeanson Signed-off-by: Mathieu Desnoyers Signed-off-by: Bruce Ashfield --- ...x-sigaction-build-without-CONFIG_COM.patch | 35 -- ...e-missing-CONFIG_TRACEPOINTS-to-warn.patch | 18 +- ...mentation-Add-missing-provider-name-.patch | 45 ++ ...pose-__percpu-tag-as-a-named-address.patch | 438 ++++++++++++++++++ ...les_2.13.19.bb => lttng-modules_2.14.0.bb} | 8 +- 5 files changed, 496 insertions(+), 48 deletions(-) delete mode 100644 meta/recipes-kernel/lttng/lttng-modules/0001-lttng-modules-fix-sigaction-build-without-CONFIG_COM.patch create mode 100644 meta/recipes-kernel/lttng/lttng-modules/0001-writeback-instrumentation-Add-missing-provider-name-.patch create mode 100644 meta/recipes-kernel/lttng/lttng-modules/0002-fix-percpu-repurpose-__percpu-tag-as-a-named-address.patch rename meta/recipes-kernel/lttng/{lttng-modules_2.13.19.bb => lttng-modules_2.14.0.bb} (81%) diff --git a/meta/recipes-kernel/lttng/lttng-modules/0001-lttng-modules-fix-sigaction-build-without-CONFIG_COM.patch b/meta/recipes-kernel/lttng/lttng-modules/0001-lttng-modules-fix-sigaction-build-without-CONFIG_COM.patch deleted file mode 100644 index eb43abbae2..0000000000 --- a/meta/recipes-kernel/lttng/lttng-modules/0001-lttng-modules-fix-sigaction-build-without-CONFIG_COM.patch +++ /dev/null @@ -1,35 +0,0 @@ -From 0e2095bcc50e7a07d3478f8d3c0ae5ad46575594 Mon Sep 17 00:00:00 2001 -From: Mikko Rapeli -Date: Mon, 28 Apr 2025 12:07:24 +0000 -Subject: [PATCH] lttng-modules: fix sigaction build without - CONFIG_COMPAT_OLD_SIGACTION - -Workaround build failure when CONFIG_COMPAT_OLD_SIGACTION is not enabled -in kernel config. - -Upstream-Status: Submitted [https://bugs.lttng.org/issues/1426] - -Signed-off-by: Mikko Rapeli ---- - .../instrumentation/syscalls/headers/arm-32-syscalls_pointers.h | 2 ++ - 1 file changed, 2 insertions(+) - -diff --git a/include/instrumentation/syscalls/headers/arm-32-syscalls_pointers.h b/include/instrumentation/syscalls/headers/arm-32-syscalls_pointers.h -index 5f4ca5b..1514cae 100644 ---- a/include/instrumentation/syscalls/headers/arm-32-syscalls_pointers.h -+++ b/include/instrumentation/syscalls/headers/arm-32-syscalls_pointers.h -@@ -1890,9 +1890,11 @@ TRACE_SYSCALL_TABLE(chroot, chroot, 61, 1) - #ifndef OVERRIDE_TABLE_32_ustat - TRACE_SYSCALL_TABLE(ustat, ustat, 62, 2) - #endif -+#ifdef CONFIG_COMPAT_OLD_SIGACTION - #ifndef OVERRIDE_TABLE_32_sigaction - TRACE_SYSCALL_TABLE(sigaction, sigaction, 67, 3) - #endif -+#endif /* CONFIG_COMPAT_OLD_SIGACTION */ - #ifndef OVERRIDE_TABLE_32_sigpending - TRACE_SYSCALL_TABLE(sigpending, sigpending, 73, 1) - #endif --- -2.49.0 - diff --git a/meta/recipes-kernel/lttng/lttng-modules/0001-src-Kbuild-change-missing-CONFIG_TRACEPOINTS-to-warn.patch b/meta/recipes-kernel/lttng/lttng-modules/0001-src-Kbuild-change-missing-CONFIG_TRACEPOINTS-to-warn.patch index 4911982461..1854d9a944 100644 --- a/meta/recipes-kernel/lttng/lttng-modules/0001-src-Kbuild-change-missing-CONFIG_TRACEPOINTS-to-warn.patch +++ b/meta/recipes-kernel/lttng/lttng-modules/0001-src-Kbuild-change-missing-CONFIG_TRACEPOINTS-to-warn.patch @@ -19,11 +19,11 @@ Signed-off-by: Bruce Ashfield src/Kbuild | 7 ++++++- 1 file changed, 6 insertions(+), 1 deletion(-) -diff --git a/src/Kbuild b/src/Kbuild -index 7137874..04eb5c9 100644 ---- a/src/Kbuild -+++ b/src/Kbuild -@@ -2,10 +2,13 @@ +Index: lttng-modules-2.14.0/src/Kbuild +=================================================================== +--- lttng-modules-2.14.0.orig/src/Kbuild ++++ lttng-modules-2.14.0/src/Kbuild +@@ -3,10 +3,13 @@ ifdef CONFIG_LOCALVERSION # Check if dot-config is included. ifeq ($(CONFIG_TRACEPOINTS),) @@ -38,9 +38,9 @@ index 7137874..04eb5c9 100644 TOP_LTTNG_MODULES_DIR := $(shell dirname $(lastword $(MAKEFILE_LIST)))/.. lttng_check_linux_version = $(shell pwd)/include/linux/version.h -@@ -150,3 +153,5 @@ lttng-statedump-objs := lttng-statedump-impl.o - obj-$(CONFIG_LTTNG) += probes/ - obj-$(CONFIG_LTTNG) += lib/ - obj-$(CONFIG_LTTNG) += tests/ +@@ -168,3 +171,5 @@ + obj-$(CONFIG_LTTNG_SYSCALLS_EXTRACTOR) += lttng-syscalls-extractor.o + + # vim:syntax=make + +endif # DISABLE_MODULE diff --git a/meta/recipes-kernel/lttng/lttng-modules/0001-writeback-instrumentation-Add-missing-provider-name-.patch b/meta/recipes-kernel/lttng/lttng-modules/0001-writeback-instrumentation-Add-missing-provider-name-.patch new file mode 100644 index 0000000000..2afad7084b --- /dev/null +++ b/meta/recipes-kernel/lttng/lttng-modules/0001-writeback-instrumentation-Add-missing-provider-name-.patch @@ -0,0 +1,45 @@ +From 039dbff4ba95eca58f8ebbcf1640a46b482c24e0 Mon Sep 17 00:00:00 2001 +From: Mathieu Desnoyers +Date: Fri, 4 Jul 2025 11:34:45 -0400 +Subject: [PATCH 1/2] writeback instrumentation: Add missing provider name + prefix + +The events folio_wait_writeback and wait_on_page_writeback do not have +the writeback event name prefix mandated by the sanity check in +lttng_kernel_probe_register, which trigger a console warning. + +Change those event names to provide the relevant provider name prefix. + +Upstream-Status: Backport [commit 039dbff4] + +Signed-off-by: Mathieu Desnoyers +Change-Id: Ia069e2dac4a373170e059792a947cffb6c956cb2 +--- + include/instrumentation/events/writeback.h | 4 ++-- + 1 file changed, 2 insertions(+), 2 deletions(-) + +diff --git a/include/instrumentation/events/writeback.h b/include/instrumentation/events/writeback.h +index d694e323..b9e26b5b 100644 +--- a/include/instrumentation/events/writeback.h ++++ b/include/instrumentation/events/writeback.h +@@ -122,7 +122,7 @@ LTTNG_TRACEPOINT_EVENT_INSTANCE(writeback_folio_template, writeback_dirty_folio, + TP_ARGS(folio, mapping) + ) + +-LTTNG_TRACEPOINT_EVENT_INSTANCE(writeback_folio_template, folio_wait_writeback, ++LTTNG_TRACEPOINT_EVENT_INSTANCE(writeback_folio_template, writeback_folio_wait, + + TP_PROTO(struct folio *folio, struct address_space *mapping), + +@@ -150,7 +150,7 @@ LTTNG_TRACEPOINT_EVENT_INSTANCE(writeback_page_template, writeback_dirty_page, + TP_ARGS(page, mapping) + ) + +-LTTNG_TRACEPOINT_EVENT_INSTANCE(writeback_page_template, wait_on_page_writeback, ++LTTNG_TRACEPOINT_EVENT_INSTANCE(writeback_page_template, writeback_wait_on_page, + + TP_PROTO(struct page *page, struct address_space *mapping), + +-- +2.39.2 + diff --git a/meta/recipes-kernel/lttng/lttng-modules/0002-fix-percpu-repurpose-__percpu-tag-as-a-named-address.patch b/meta/recipes-kernel/lttng/lttng-modules/0002-fix-percpu-repurpose-__percpu-tag-as-a-named-address.patch new file mode 100644 index 0000000000..26d16c2cb8 --- /dev/null +++ b/meta/recipes-kernel/lttng/lttng-modules/0002-fix-percpu-repurpose-__percpu-tag-as-a-named-address.patch @@ -0,0 +1,438 @@ +From 243dbd5c83fd647144b4e6f4e6e01e9e59fe910f Mon Sep 17 00:00:00 2001 +From: Michael Jeanson +Date: Tue, 29 Jul 2025 15:34:23 -0400 +Subject: [PATCH 2/2] fix: percpu: repurpose __percpu tag as a named address + space qualifier (v6.15) + +The '__percpu' annotation was repurposed as a named address space +qualifier, with compilers supporting 'typeof_unqual' like GCC 14 and +Clang 19 this is now enforced at build time. + +See upstream commits: + + commit 6cea5ae714ba47ea4807d15903baca9857a450e6 + Author: Uros Bizjak + Date: Mon Jan 27 17:05:09 2025 +0100 + + percpu: repurpose __percpu tag as a named address space qualifier + + The patch introduces __percpu_qual define and repurposes __percpu tag as a + named address space qualifier using the new define. + + Arches can now conditionally define __percpu_qual as their named address + space qualifier for percpu variables. + + commit 6a367577153acd9b432a5340fb10891eeb7e10f1 + Author: Uros Bizjak + Date: Mon Jan 27 17:05:10 2025 +0100 + + percpu/x86: enable strict percpu checks via named AS qualifiers + + This patch declares percpu variables in __seg_gs/__seg_fs named AS and + keeps them named AS qualified until they are dereferenced with percpu + accessor. This approach enables various compiler check for + cross-namespace variable assignments. + +Upstream-Status: Backport [commit 243dbd5c] + +Change-Id: Ib212cb4ef077da994867f0541921529dd4a799a0 +Signed-off-by: Michael Jeanson +Signed-off-by: Mathieu Desnoyers +--- + include/ringbuffer/backend_types.h | 5 ++- + include/ringbuffer/frontend_api.h | 4 +- + src/lib/ringbuffer/ring_buffer_backend.c | 30 +++++++------- + src/lib/ringbuffer/ring_buffer_frontend.c | 40 +++++++++---------- + src/lib/ringbuffer/ring_buffer_iterator.c | 8 ++-- + src/lttng-context-callstack.c | 2 +- + src/lttng-ring-buffer-event-notifier-client.h | 2 +- + src/lttng-ring-buffer-metadata-client.h | 2 +- + 8 files changed, 48 insertions(+), 45 deletions(-) + +diff --git a/include/ringbuffer/backend_types.h b/include/ringbuffer/backend_types.h +index c23889ea..caafe4da 100644 +--- a/include/ringbuffer/backend_types.h ++++ b/include/ringbuffer/backend_types.h +@@ -79,7 +79,10 @@ struct channel_backend { + */ + unsigned int buf_size_order; /* Order of buffer size */ + unsigned int extra_reader_sb:1; /* has extra reader subbuffer ? */ +- struct lttng_kernel_ring_buffer *buf; /* Channel per-cpu buffers */ ++ union { ++ struct lttng_kernel_ring_buffer *global_buf; /* Channel global buffer */ ++ struct lttng_kernel_ring_buffer __percpu *percpu_buf; /* Channel per-cpu buffers */ ++ }; + + unsigned long num_subbuf; /* Number of sub-buffers for writer */ + u64 start_timestamp; /* Channel creation timestamp value */ +diff --git a/include/ringbuffer/frontend_api.h b/include/ringbuffer/frontend_api.h +index e8d77d95..a0319c98 100644 +--- a/include/ringbuffer/frontend_api.h ++++ b/include/ringbuffer/frontend_api.h +@@ -153,9 +153,9 @@ int lib_ring_buffer_reserve(const struct lttng_kernel_ring_buffer_config *config + return -EAGAIN; + + if (config->alloc == RING_BUFFER_ALLOC_PER_CPU) +- buf = per_cpu_ptr(chan->backend.buf, ctx->priv.reserve_cpu); ++ buf = per_cpu_ptr(chan->backend.percpu_buf, ctx->priv.reserve_cpu); + else +- buf = chan->backend.buf; ++ buf = chan->backend.global_buf; + if (unlikely(atomic_read(&buf->record_disabled))) + return -EAGAIN; + ctx->priv.buf = buf; +diff --git a/src/lib/ringbuffer/ring_buffer_backend.c b/src/lib/ringbuffer/ring_buffer_backend.c +index 3eaa1b96..b5ecde4d 100644 +--- a/src/lib/ringbuffer/ring_buffer_backend.c ++++ b/src/lib/ringbuffer/ring_buffer_backend.c +@@ -279,7 +279,7 @@ int lttng_cpuhp_rb_backend_prepare(unsigned int cpu, + + CHAN_WARN_ON(chanb, config->alloc == RING_BUFFER_ALLOC_PER_CHANNEL); + +- buf = per_cpu_ptr(chanb->buf, cpu); ++ buf = per_cpu_ptr(chanb->percpu_buf, cpu); + ret = lib_ring_buffer_create(buf, chanb, cpu); + if (ret) { + printk(KERN_ERR +@@ -320,7 +320,7 @@ int lib_ring_buffer_cpu_hp_callback(struct notifier_block *nb, + switch (action) { + case CPU_UP_PREPARE: + case CPU_UP_PREPARE_FROZEN: +- buf = per_cpu_ptr(chanb->buf, cpu); ++ buf = per_cpu_ptr(chanb->percpu_buf, cpu); + ret = lib_ring_buffer_create(buf, chanb, cpu); + if (ret) { + printk(KERN_ERR +@@ -415,8 +415,8 @@ int channel_backend_init(struct channel_backend *chanb, + + if (config->alloc == RING_BUFFER_ALLOC_PER_CPU) { + /* Allocating the buffer per-cpu structures */ +- chanb->buf = alloc_percpu(struct lttng_kernel_ring_buffer); +- if (!chanb->buf) ++ chanb->percpu_buf = alloc_percpu(struct lttng_kernel_ring_buffer); ++ if (!chanb->percpu_buf) + goto free_cpumask; + + #if (LTTNG_LINUX_VERSION_CODE >= LTTNG_KERNEL_VERSION(4,10,0)) +@@ -447,7 +447,7 @@ int channel_backend_init(struct channel_backend *chanb, + + lttng_cpus_read_lock(); + for_each_online_cpu(i) { +- ret = lib_ring_buffer_create(per_cpu_ptr(chanb->buf, i), ++ ret = lib_ring_buffer_create(per_cpu_ptr(chanb->percpu_buf, i), + chanb, i); + if (ret) + goto free_bufs; /* cpu hotplug locked */ +@@ -455,7 +455,7 @@ int channel_backend_init(struct channel_backend *chanb, + lttng_cpus_read_unlock(); + #else + for_each_possible_cpu(i) { +- ret = lib_ring_buffer_create(per_cpu_ptr(chanb->buf, i), ++ ret = lib_ring_buffer_create(per_cpu_ptr(chanb->percpu_buf, i), + chanb, i); + if (ret) + goto free_bufs; +@@ -464,10 +464,10 @@ int channel_backend_init(struct channel_backend *chanb, + } + #endif /* #else #if (LTTNG_LINUX_VERSION_CODE >= LTTNG_KERNEL_VERSION(4,10,0)) */ + } else { +- chanb->buf = kzalloc(sizeof(struct lttng_kernel_ring_buffer), GFP_KERNEL); +- if (!chanb->buf) ++ chanb->global_buf = kzalloc(sizeof(struct lttng_kernel_ring_buffer), GFP_KERNEL); ++ if (!chanb->global_buf) + goto free_cpumask; +- ret = lib_ring_buffer_create(chanb->buf, chanb, -1); ++ ret = lib_ring_buffer_create(chanb->global_buf, chanb, -1); + if (ret) + goto free_bufs; + } +@@ -491,15 +491,15 @@ free_bufs: + #endif /* #else #if (LTTNG_LINUX_VERSION_CODE >= LTTNG_KERNEL_VERSION(4,10,0)) */ + for_each_possible_cpu(i) { + struct lttng_kernel_ring_buffer *buf = +- per_cpu_ptr(chanb->buf, i); ++ per_cpu_ptr(chanb->percpu_buf, i); + + if (!buf->backend.allocated) + continue; + lib_ring_buffer_free(buf); + } +- free_percpu(chanb->buf); ++ free_percpu(chanb->percpu_buf); + } else +- kfree(chanb->buf); ++ kfree(chanb->global_buf); + free_cpumask: + if (config->alloc == RING_BUFFER_ALLOC_PER_CPU) + free_cpumask_var(chanb->cpumask); +@@ -542,16 +542,16 @@ void channel_backend_free(struct channel_backend *chanb) + + if (config->alloc == RING_BUFFER_ALLOC_PER_CPU) { + for_each_possible_cpu(i) { +- struct lttng_kernel_ring_buffer *buf = per_cpu_ptr(chanb->buf, i); ++ struct lttng_kernel_ring_buffer *buf = per_cpu_ptr(chanb->percpu_buf, i); + + if (!buf->backend.allocated) + continue; + lib_ring_buffer_free(buf); + } + free_cpumask_var(chanb->cpumask); +- free_percpu(chanb->buf); ++ free_percpu(chanb->percpu_buf); + } else { +- struct lttng_kernel_ring_buffer *buf = chanb->buf; ++ struct lttng_kernel_ring_buffer *buf = chanb->global_buf; + + CHAN_WARN_ON(chanb, !buf->backend.allocated); + lib_ring_buffer_free(buf); +diff --git a/src/lib/ringbuffer/ring_buffer_frontend.c b/src/lib/ringbuffer/ring_buffer_frontend.c +index 1ed9dc47..f9def043 100644 +--- a/src/lib/ringbuffer/ring_buffer_frontend.c ++++ b/src/lib/ringbuffer/ring_buffer_frontend.c +@@ -505,7 +505,7 @@ int lttng_cpuhp_rb_frontend_dead(unsigned int cpu, + { + struct lttng_kernel_ring_buffer_channel *chan = container_of(node, struct lttng_kernel_ring_buffer_channel, + cpuhp_prepare); +- struct lttng_kernel_ring_buffer *buf = per_cpu_ptr(chan->backend.buf, cpu); ++ struct lttng_kernel_ring_buffer *buf = per_cpu_ptr(chan->backend.percpu_buf, cpu); + const struct lttng_kernel_ring_buffer_config *config = &chan->backend.config; + + CHAN_WARN_ON(chan, config->alloc == RING_BUFFER_ALLOC_PER_CHANNEL); +@@ -526,7 +526,7 @@ int lttng_cpuhp_rb_frontend_online(unsigned int cpu, + { + struct lttng_kernel_ring_buffer_channel *chan = container_of(node, struct lttng_kernel_ring_buffer_channel, + cpuhp_online); +- struct lttng_kernel_ring_buffer *buf = per_cpu_ptr(chan->backend.buf, cpu); ++ struct lttng_kernel_ring_buffer *buf = per_cpu_ptr(chan->backend.percpu_buf, cpu); + const struct lttng_kernel_ring_buffer_config *config = &chan->backend.config; + + CHAN_WARN_ON(chan, config->alloc == RING_BUFFER_ALLOC_PER_CHANNEL); +@@ -543,7 +543,7 @@ int lttng_cpuhp_rb_frontend_offline(unsigned int cpu, + { + struct lttng_kernel_ring_buffer_channel *chan = container_of(node, struct lttng_kernel_ring_buffer_channel, + cpuhp_online); +- struct lttng_kernel_ring_buffer *buf = per_cpu_ptr(chan->backend.buf, cpu); ++ struct lttng_kernel_ring_buffer *buf = per_cpu_ptr(chan->backend.percpu_buf, cpu); + const struct lttng_kernel_ring_buffer_config *config = &chan->backend.config; + + CHAN_WARN_ON(chan, config->alloc == RING_BUFFER_ALLOC_PER_CHANNEL); +@@ -574,7 +574,7 @@ int lib_ring_buffer_cpu_hp_callback(struct notifier_block *nb, + unsigned int cpu = (unsigned long)hcpu; + struct lttng_kernel_ring_buffer_channel *chan = container_of(nb, struct lttng_kernel_ring_buffer_channel, + cpu_hp_notifier); +- struct lttng_kernel_ring_buffer *buf = per_cpu_ptr(chan->backend.buf, cpu); ++ struct lttng_kernel_ring_buffer *buf = per_cpu_ptr(chan->backend.percpu_buf, cpu); + const struct lttng_kernel_ring_buffer_config *config = &chan->backend.config; + + if (!chan->cpu_hp_enable) +@@ -741,7 +741,7 @@ static void channel_unregister_notifiers(struct lttng_kernel_ring_buffer_channel + lttng_cpus_read_lock(); + chan->cpu_hp_enable = 0; + for_each_online_cpu(cpu) { +- struct lttng_kernel_ring_buffer *buf = per_cpu_ptr(chan->backend.buf, ++ struct lttng_kernel_ring_buffer *buf = per_cpu_ptr(chan->backend.percpu_buf, + cpu); + lib_ring_buffer_stop_switch_timer(buf); + lib_ring_buffer_stop_read_timer(buf); +@@ -750,7 +750,7 @@ static void channel_unregister_notifiers(struct lttng_kernel_ring_buffer_channel + unregister_cpu_notifier(&chan->cpu_hp_notifier); + #else + for_each_possible_cpu(cpu) { +- struct lttng_kernel_ring_buffer *buf = per_cpu_ptr(chan->backend.buf, ++ struct lttng_kernel_ring_buffer *buf = per_cpu_ptr(chan->backend.percpu_buf, + cpu); + lib_ring_buffer_stop_switch_timer(buf); + lib_ring_buffer_stop_read_timer(buf); +@@ -759,7 +759,7 @@ static void channel_unregister_notifiers(struct lttng_kernel_ring_buffer_channel + } + #endif /* #else #if (LTTNG_LINUX_VERSION_CODE >= LTTNG_KERNEL_VERSION(4,10,0)) */ + } else { +- struct lttng_kernel_ring_buffer *buf = chan->backend.buf; ++ struct lttng_kernel_ring_buffer *buf = chan->backend.global_buf; + + lib_ring_buffer_stop_switch_timer(buf); + lib_ring_buffer_stop_read_timer(buf); +@@ -788,14 +788,14 @@ void lib_ring_buffer_set_quiescent_channel(struct lttng_kernel_ring_buffer_chann + if (config->alloc == RING_BUFFER_ALLOC_PER_CPU) { + lttng_cpus_read_lock(); + for_each_channel_cpu(cpu, chan) { +- struct lttng_kernel_ring_buffer *buf = per_cpu_ptr(chan->backend.buf, ++ struct lttng_kernel_ring_buffer *buf = per_cpu_ptr(chan->backend.percpu_buf, + cpu); + + lib_ring_buffer_set_quiescent(buf); + } + lttng_cpus_read_unlock(); + } else { +- struct lttng_kernel_ring_buffer *buf = chan->backend.buf; ++ struct lttng_kernel_ring_buffer *buf = chan->backend.global_buf; + + lib_ring_buffer_set_quiescent(buf); + } +@@ -810,14 +810,14 @@ void lib_ring_buffer_clear_quiescent_channel(struct lttng_kernel_ring_buffer_cha + if (config->alloc == RING_BUFFER_ALLOC_PER_CPU) { + lttng_cpus_read_lock(); + for_each_channel_cpu(cpu, chan) { +- struct lttng_kernel_ring_buffer *buf = per_cpu_ptr(chan->backend.buf, ++ struct lttng_kernel_ring_buffer *buf = per_cpu_ptr(chan->backend.percpu_buf, + cpu); + + lib_ring_buffer_clear_quiescent(buf); + } + lttng_cpus_read_unlock(); + } else { +- struct lttng_kernel_ring_buffer *buf = chan->backend.buf; ++ struct lttng_kernel_ring_buffer *buf = chan->backend.global_buf; + + lib_ring_buffer_clear_quiescent(buf); + } +@@ -915,7 +915,7 @@ struct lttng_kernel_ring_buffer_channel *channel_create(const struct lttng_kerne + + lttng_cpus_read_lock(); + for_each_online_cpu(cpu) { +- struct lttng_kernel_ring_buffer *buf = per_cpu_ptr(chan->backend.buf, ++ struct lttng_kernel_ring_buffer *buf = per_cpu_ptr(chan->backend.percpu_buf, + cpu); + spin_lock(&per_cpu(ring_buffer_nohz_lock, cpu)); + lib_ring_buffer_start_switch_timer(buf); +@@ -926,7 +926,7 @@ struct lttng_kernel_ring_buffer_channel *channel_create(const struct lttng_kerne + lttng_cpus_read_unlock(); + #else + for_each_possible_cpu(cpu) { +- struct lttng_kernel_ring_buffer *buf = per_cpu_ptr(chan->backend.buf, ++ struct lttng_kernel_ring_buffer *buf = per_cpu_ptr(chan->backend.percpu_buf, + cpu); + spin_lock(&per_cpu(ring_buffer_nohz_lock, cpu)); + lib_ring_buffer_start_switch_timer(buf); +@@ -947,7 +947,7 @@ struct lttng_kernel_ring_buffer_channel *channel_create(const struct lttng_kerne + #endif /* defined(CONFIG_NO_HZ) && defined(CONFIG_LIB_RING_BUFFER) */ + + } else { +- struct lttng_kernel_ring_buffer *buf = chan->backend.buf; ++ struct lttng_kernel_ring_buffer *buf = chan->backend.global_buf; + + lib_ring_buffer_start_switch_timer(buf); + lib_ring_buffer_start_read_timer(buf); +@@ -1004,7 +1004,7 @@ void *channel_destroy(struct lttng_kernel_ring_buffer_channel *chan) + * unregistered. + */ + for_each_channel_cpu(cpu, chan) { +- struct lttng_kernel_ring_buffer *buf = per_cpu_ptr(chan->backend.buf, ++ struct lttng_kernel_ring_buffer *buf = per_cpu_ptr(chan->backend.percpu_buf, + cpu); + + if (config->cb.buffer_finalize) +@@ -1019,7 +1019,7 @@ void *channel_destroy(struct lttng_kernel_ring_buffer_channel *chan) + wake_up_interruptible(&buf->read_wait); + } + } else { +- struct lttng_kernel_ring_buffer *buf = chan->backend.buf; ++ struct lttng_kernel_ring_buffer *buf = chan->backend.global_buf; + + if (config->cb.buffer_finalize) + config->cb.buffer_finalize(buf, chan->backend.priv, -1); +@@ -1044,9 +1044,9 @@ struct lttng_kernel_ring_buffer *channel_get_ring_buffer( + struct lttng_kernel_ring_buffer_channel *chan, int cpu) + { + if (config->alloc == RING_BUFFER_ALLOC_PER_CHANNEL) +- return chan->backend.buf; ++ return chan->backend.global_buf; + else +- return per_cpu_ptr(chan->backend.buf, cpu); ++ return per_cpu_ptr(chan->backend.percpu_buf, cpu); + } + EXPORT_SYMBOL_GPL(channel_get_ring_buffer); + +@@ -2271,9 +2271,9 @@ static struct lttng_kernel_ring_buffer *get_current_buf(struct lttng_kernel_ring + const struct lttng_kernel_ring_buffer_config *config = &chan->backend.config; + + if (config->alloc == RING_BUFFER_ALLOC_PER_CPU) +- return per_cpu_ptr(chan->backend.buf, cpu); ++ return per_cpu_ptr(chan->backend.percpu_buf, cpu); + else +- return chan->backend.buf; ++ return chan->backend.global_buf; + } + + void lib_ring_buffer_lost_event_too_big(struct lttng_kernel_ring_buffer_channel *chan) +diff --git a/src/lib/ringbuffer/ring_buffer_iterator.c b/src/lib/ringbuffer/ring_buffer_iterator.c +index 88d79412..1a1db5e2 100644 +--- a/src/lib/ringbuffer/ring_buffer_iterator.c ++++ b/src/lib/ringbuffer/ring_buffer_iterator.c +@@ -361,7 +361,7 @@ int lttng_cpuhp_rb_iter_online(unsigned int cpu, + { + struct lttng_kernel_ring_buffer_channel *chan = container_of(node, struct lttng_kernel_ring_buffer_channel, + cpuhp_iter_online); +- struct lttng_kernel_ring_buffer *buf = per_cpu_ptr(chan->backend.buf, cpu); ++ struct lttng_kernel_ring_buffer *buf = per_cpu_ptr(chan->backend.percpu_buf, cpu); + const struct lttng_kernel_ring_buffer_config *config = &chan->backend.config; + + CHAN_WARN_ON(chan, config->alloc == RING_BUFFER_ALLOC_PER_CHANNEL); +@@ -382,7 +382,7 @@ int channel_iterator_cpu_hotplug(struct notifier_block *nb, + unsigned int cpu = (unsigned long)hcpu; + struct lttng_kernel_ring_buffer_channel *chan = container_of(nb, struct lttng_kernel_ring_buffer_channel, + hp_iter_notifier); +- struct lttng_kernel_ring_buffer *buf = per_cpu_ptr(chan->backend.buf, cpu); ++ struct lttng_kernel_ring_buffer *buf = per_cpu_ptr(chan->backend.percpu_buf, cpu); + const struct lttng_kernel_ring_buffer_config *config = &chan->backend.config; + + if (!chan->hp_iter_enable) +@@ -443,14 +443,14 @@ int channel_iterator_init(struct lttng_kernel_ring_buffer_channel *chan) + + lttng_cpus_read_lock(); + for_each_online_cpu(cpu) { +- buf = per_cpu_ptr(chan->backend.buf, cpu); ++ buf = per_cpu_ptr(chan->backend.percpu_buf, cpu); + lib_ring_buffer_iterator_init(chan, buf); + } + chan->hp_iter_enable = 1; + lttng_cpus_read_unlock(); + #else + for_each_possible_cpu(cpu) { +- buf = per_cpu_ptr(chan->backend.buf, cpu); ++ buf = per_cpu_ptr(chan->backend.percpu_buf, cpu); + lib_ring_buffer_iterator_init(chan, buf); + } + #endif +diff --git a/src/lttng-context-callstack.c b/src/lttng-context-callstack.c +index 4385472e..c5910718 100644 +--- a/src/lttng-context-callstack.c ++++ b/src/lttng-context-callstack.c +@@ -69,7 +69,7 @@ void field_data_free(struct field_data *fdata) + } + + static +-struct field_data __percpu *field_data_create(enum lttng_cs_ctx_modes mode) ++struct field_data *field_data_create(enum lttng_cs_ctx_modes mode) + { + struct lttng_cs __percpu *cs_set; + struct field_data *fdata; +diff --git a/src/lttng-ring-buffer-event-notifier-client.h b/src/lttng-ring-buffer-event-notifier-client.h +index 95deab46..b4145914 100644 +--- a/src/lttng-ring-buffer-event-notifier-client.h ++++ b/src/lttng-ring-buffer-event-notifier-client.h +@@ -363,7 +363,7 @@ size_t lttng_packet_avail_size(struct lttng_kernel_ring_buffer_channel *chan) + unsigned long o_begin; + struct lttng_kernel_ring_buffer *buf; + +- buf = chan->backend.buf; /* Only for global buffer ! */ ++ buf = chan->backend.global_buf; /* Only for global buffer ! */ + o_begin = v_read(&client_config, &buf->offset); + if (subbuf_offset(o_begin, chan) != 0) { + return chan->backend.subbuf_size - subbuf_offset(o_begin, chan); +diff --git a/src/lttng-ring-buffer-metadata-client.h b/src/lttng-ring-buffer-metadata-client.h +index 99158451..9ef73266 100644 +--- a/src/lttng-ring-buffer-metadata-client.h ++++ b/src/lttng-ring-buffer-metadata-client.h +@@ -368,7 +368,7 @@ size_t lttng_packet_avail_size(struct lttng_kernel_ring_buffer_channel *chan) + unsigned long o_begin; + struct lttng_kernel_ring_buffer *buf; + +- buf = chan->backend.buf; /* Only for global buffer ! */ ++ buf = chan->backend.global_buf; /* Only for global buffer ! */ + o_begin = v_read(&client_config, &buf->offset); + if (subbuf_offset(o_begin, chan) != 0) { + return chan->backend.subbuf_size - subbuf_offset(o_begin, chan); +-- +2.39.2 + diff --git a/meta/recipes-kernel/lttng/lttng-modules_2.13.19.bb b/meta/recipes-kernel/lttng/lttng-modules_2.14.0.bb similarity index 81% rename from meta/recipes-kernel/lttng/lttng-modules_2.13.19.bb rename to meta/recipes-kernel/lttng/lttng-modules_2.14.0.bb index 63ba488515..6bbe1c5a19 100644 --- a/meta/recipes-kernel/lttng/lttng-modules_2.13.19.bb +++ b/meta/recipes-kernel/lttng/lttng-modules_2.14.0.bb @@ -3,21 +3,21 @@ SUMMARY = "Linux Trace Toolkit KERNEL MODULE" DESCRIPTION = "The lttng-modules 2.0 package contains the kernel tracer modules" HOMEPAGE = "https://lttng.org/" LICENSE = "LGPL-2.1-only & GPL-2.0-only & MIT" -LIC_FILES_CHKSUM = "file://LICENSE;md5=8d0d9f08888046474772a5d745d89d6a" +LIC_FILES_CHKSUM = "file://LICENSE;md5=018e002dbdda3306682e394ddd65fa32" inherit module include lttng-platforms.inc SRC_URI = "https://lttng.org/files/${BPN}/${BPN}-${PV}.tar.bz2 \ - file://0001-lttng-modules-fix-sigaction-build-without-CONFIG_COM.patch \ + file://0001-writeback-instrumentation-Add-missing-provider-name-.patch \ + file://0002-fix-percpu-repurpose-__percpu-tag-as-a-named-address.patch \ " # Use :append here so that the patch is applied also when using devupstream SRC_URI:append = " file://0001-src-Kbuild-change-missing-CONFIG_TRACEPOINTS-to-warn.patch \ " - -SRC_URI[sha256sum] = "06d704633749039f8fa72a954bec6486058386e2a0c3557b22c484698f9b34d5" +SRC_URI[sha256sum] = "f2261e738b1dd1027640e5ba3040dee292241b847d5745766b3ba640e168c94a" export INSTALL_MOD_DIR = "kernel/lttng-modules" From patchwork Wed Aug 13 20:49:21 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Bruce Ashfield X-Patchwork-Id: 68477 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 3E2A6CA0EE0 for ; Wed, 13 Aug 2025 20:49:43 +0000 (UTC) Received: from mail-qt1-f171.google.com (mail-qt1-f171.google.com [209.85.160.171]) by mx.groups.io with SMTP id smtpd.web10.7053.1755118176143432410 for ; Wed, 13 Aug 2025 13:49:36 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@gmail.com header.s=20230601 header.b=VkD98aN3; spf=pass (domain: gmail.com, ip: 209.85.160.171, mailfrom: bruce.ashfield@gmail.com) Received: by mail-qt1-f171.google.com with SMTP id d75a77b69052e-4b0faa6601cso14638391cf.1 for ; Wed, 13 Aug 2025 13:49:36 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1755118175; x=1755722975; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=NPB+EnzZcx6Vb+hiaGnfLYjMbzcKkYKjrDZrGi+g0L4=; b=VkD98aN3Q6W5a/Z125e0up6YuxSODOJ+aKgxXiyd+B73yr98Ecb95Q1QygaBS4dAcb MHqmXIpPW0/APdshsj0aD449EL2skeNKE8qks8h1daY61KhygEjr/wlgtK3e/rbzNcw/ Eg3l/5SGIOjm9wRbSc9CIFwHPRQ2W7xJyqXuI0MM2npawsDO81rPsXLl+5drTJEQJOgC 1paEITlrEUzkmBlvobC0iTvA8TJ/NCiJKAaYuAYjPktgsNXrDWNC74aINH8YBjG2rmjk w9/sB3USYFHfHa01J1sFmAi7YTfOEKVDuTSlzYfBB4I+hU+sFwLEOHjZxl78CCmI2u/g Xsdg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1755118175; x=1755722975; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=NPB+EnzZcx6Vb+hiaGnfLYjMbzcKkYKjrDZrGi+g0L4=; b=srgnPWmeFPp47hCoDmWOjDQ5E1G5e4NkTg69AFc4qjKNoFXIIdmiebXS5PZxTAomb6 I7TPNcmlpAoCa0jA3H+dg1/bKB64WwOL7GduqXPVfDt/GD9eqQf1hiBT3uvPZbVJlHWl jUaAxEA5BqhoFg31SK7vsu+mhaohhVZGbDTCE20teLyjPWaPnVy/vETD5JeR6tHdhe92 PvKcNWDGl6MP+C9uFqnLMA+6nozltQoGwXAG/w6CnhdcAb42IC+0A3sLFzu3yo7QZxXr zc64XUUVpa53YShZjmxtseFHeMcVp72C0Ui03UPl1r3no5MACIB1SiQMyyR3j8GLtx3G XPdQ== X-Gm-Message-State: AOJu0YyrwmDaBrqBhf/ADNC+anE8mfWediBbD5iW0Cd9WL8AZfAJsgnF gbJM93ZLPHimF4tcvdYv6Hr31JckK6TwBb3pIWStOE3Nmj6e6wisJ6GCu1bpyNoU X-Gm-Gg: ASbGncuNMWWVyn9+LGm0nFyspM9682VCH/zPB1SiFA6uSuIcUenWoqveQ9NxA9E9wXn KWb8gH2BBYLrlvd/Xv/aocc2GoyBzjD4TiNvnf2z1lmIlZrtR2OhgYnCvFEnl9ESPQhXUXvipos VRbUaSOS3qT2lHqzdLvt+ZP7WS/gdKUvJF7/pUAdbBT+JQwMAqGoVpWkgLxD5AsG/+3lShJGWPs 17Y4tqkCV102Cz4Diqg/jLmTRRbveRfRg34yKEIYoMhKBr9XWomQpftGXKk6ilXTmqjITkvda3i WRK2+G30G/8NedM4NRHumaVWp08wWaVH+kN1kkYTQmcAjcyiJ/B7vGtT+M2ptDS3LykvfpkQiC3 t+IOk4giKGe+0eoNsNrxHnML9CCdyeWYekYISEBrNPaXxyupnZFi/sIaOzTdPkxFqRI+ah7RlE4 pHJ9hJVQn7r1u69yY/PEMErz8= X-Google-Smtp-Source: AGHT+IELABTBlNC7nIFyrHtAeXhtjDnQCqOjfxSml4Cg9MR3Fb9HhsoWDliM/Hr8q3YNJx1dKxT82w== X-Received: by 2002:a05:6214:1d23:b0:707:5046:6a1e with SMTP id 6a1803df08f44-70b9821b51amr2340306d6.10.1755118174743; Wed, 13 Aug 2025 13:49:34 -0700 (PDT) Received: from bruce-XPS-8940.localdomain (pool-174-112-62-108.cpe.net.cable.rogers.com. [174.112.62.108]) by smtp.gmail.com with ESMTPSA id 6a1803df08f44-70af5b07658sm3326516d6.43.2025.08.13.13.49.32 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 13 Aug 2025 13:49:32 -0700 (PDT) From: bruce.ashfield@gmail.com To: richard.purdie@linuxfoundation.org Cc: openembedded-core@lists.openembedded.org Subject: [PATCH 7/8] linux-yocto/6.12: update to v6.12.41 Date: Wed, 13 Aug 2025 16:49:21 -0400 Message-Id: <0188f21a6bb22e4c09c09f5cfc5540359f5afffa.1755118020.git.bruce.ashfield@gmail.com> X-Mailer: git-send-email 2.39.2 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Wed, 13 Aug 2025 20:49:43 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/221827 From: Bruce Ashfield Updating linux-yocto/6.12 to the latest korg -stable release that comprises the following commits: no ids found, dumping: 8f5ff9784f32 Linux 6.12.41 c0c21293d0c2 mm: khugepaged: fix call hpage_collapse_scan_file() for anonymous vma c60f5156e62d KVM: x86: Free vCPUs before freeing VM state d8b3dfd4d36c Revert "drm/xe/forcewake: Add a helper xe_force_wake_ref_has_domain()" ffbedb4ad984 Revert "drm/xe/devcoredump: Update handling of xe_force_wake_get return" 5a276d341c8e Revert "drm/xe/tests/mocs: Update xe_force_wake_get() return handling" c72303e7eb49 Revert "drm/xe/gt: Update handling of xe_force_wake_get return" 69fbb3f1740b drm/i915/dp: Fix 2.7 Gbps DP_LINK_BW value on g4x bc9abdf6bce8 ALSA: hda: Add missing NVIDIA HDA codec IDs beb314a55e1e ALSA: hda/tegra: Add Tegra264 support c7f864d34529 Drivers: hv: Make the sysfs node size for the ring buffer dynamic beddf74e4064 ARM: 9448/1: Use an absolute path to unified.h in KBUILD_AFLAGS 90d5cd64f46d iio: hid-sensor-prox: Fix incorrect OFFSET calculation 05847477ff8a iio: hid-sensor-prox: Restore lost scale assignments 86dca1cb4804 wifi: mt76: mt7925: adjust rm BSS flow to prevent next connection failure b63eb95856c0 Revert "wifi: mt76: mt7925: Update mt7925_mcu_uni_[tx,rx]_ba for MLO" 98937588ff9c arm64: dts: qcom: x1-crd: Fix vreg_l2j_1p2 voltage 3d12349ade54 x86/hyperv: Fix APIC ID and VP index confusion in hv_snp_boot_ap() f1b3ad11ec11 KVM: x86/hyper-v: Skip non-canonical addresses during PV TLB flush d483bf624f22 KVM: x86: model canonical checks more precisely c0c82c2adc22 KVM: x86: Add X86EMUL_F_MSR and X86EMUL_F_DT_LOAD to aid canonical checks 62dd9132a458 KVM: x86: Route non-canonical checks in emulator through emulate_ops 94620f95f6cd KVM: x86: drop x86.h include from cpuid.h a4d60ba277ec ext4: fix out of bounds punch offset 51492e99894a ext4: correct the error handle in ext4_fallocate() 85defb9933f6 ext4: fix incorrect punch max_end 35bd33e3ef09 ext4: move out common parts into ext4_fallocate() 8a98313caa3a ext4: move out inode_lock into ext4_fallocate() 1697ca500a84 ext4: factor out ext4_do_fallocate() 2cbc4d640d40 ext4: refactor ext4_insert_range() 8bb93d988212 ext4: refactor ext4_collapse_range() db1fcf7fd51c ext4: refactor ext4_zero_range() 33f61ecabb10 ext4: refactor ext4_punch_hole() d9116d28538a ext4: don't explicit update times in ext4_fallocate() a5ae7fa30cd9 erofs: fix large fragment handling 41485d7c637b erofs: clean up header parsing for ztailpacking and fragments f9b2cb6fff33 erofs: simplify tail inline pcluster handling 516fabf34173 erofs: use Z_EROFS_LCLUSTER_TYPE_MAX to simplify switches 9a84e212e334 erofs: refine z_erofs_get_extent_compressedlen() 4d0f12dc8335 erofs: simplify z_erofs_load_compact_lcluster() 1e5a88732ace arm64: dts: qcom: x1e78100-t14s: mark l12b and l15b always-on 4a7b64ba0cca mtd: rawnand: qcom: Fix last codeword read in qcom_param_page_type_exec() a1bc9a394a27 crypto: powerpc/poly1305 - add depends on BROKEN for now b49b543f4e0b comedi: comedi_test: Fix possible deletion of uninitialized timers 28419a4f3a1e jfs: reject on-disk inodes of an unsupported type 3ad50c7c66cc x86/bugs: Fix use of possibly uninit value in amd_check_tsa_microcode() b85815675fc5 spi: cadence-quadspi: fix cleanup of rx_chan on failure paths a7c6de9f8467 usb: typec: tcpm: apply vbus before data bringup in tcpm_src_attach 27e423886a7a usb: typec: tcpm: allow switching to mode accessory to mux properly a9a1eb410f35 usb: typec: tcpm: allow to use sink in accessory mode 77a4a907cc53 selftests/bpf: Add tests with stack ptr register in conditional jmp bafb375c4606 rust: give Clippy the minimum supported Rust version 4c8f15e770fb mm/zsmalloc: do not pass __GFP_MOVABLE if CONFIG_COMPACTION=n 656eaddbc952 mm/vmscan: fix hwpoisoned large folio handling in shrink_folio_list 140edd5adf6d selftests: mptcp: connect: also cover checksum 219c4eb6c3f0 selftests: mptcp: connect: also cover alt modes 1bff28ea4b11 resource: fix false warning in __request_region() 79663a15a1c7 nilfs2: reject invalid file types when reading inodes 27e740614df8 kasan: use vmalloc_dump_obj() for vmalloc error reports 0fde7dccbf4c ice: Fix a null pointer dereference in ice_copy_and_init_pkg() 44af78621c09 gve: Fix stuck TX queue for DQ queue format 50c61f55b6b9 e1000e: ignore uninitialized checksum word on tgp 78328fad6c49 e1000e: disregard NVM checksum on tgp when valid checksum bit is not set a3bba0205830 dpaa2-switch: Fix device reference count leak in MAC endpoint handling 4dd56cabfbe5 dpaa2-eth: Fix device reference count leak in MAC endpoint handling 708fd522b86d arm64/entry: Mask DAIF in cpu_switch_to(), call_on_irq_stack() 060a28e39053 ALSA: hda/realtek - Add mute LED support for HP Victus 15-fa0xxx d3f60054b6a0 ALSA: hda/realtek - Add mute LED support for HP Pavilion 15-eg0xxx ba8e8a8a2e19 sprintf.h requires stdarg.h cf8e62f6e1b2 bus: fsl-mc: Fix potential double device reference in fsl_mc_get_endpoint() 5b8d6cb9a03d i2c: virtio: Avoid hang by using interruptible completion wait 5622108c3041 i2c: tegra: Fix reset error handling with ACPI 42c4471b30fa i2c: qup: jump out of the loop in case of timeout 9ea8a9ebbea8 timekeeping: Zero initialize system_counterval when querying time from phc drivers 6ed79cf1183a ARM: 9450/1: Fix allowing linker DCE with binutils < 2.36 f7ff03247600 mm/ksm: fix -Wsometimes-uninitialized from clang-21 in advisor_mode_show() f5ee8a39f03e drm/sched: Remove optimization that causes hang when killing dependent jobs 198604687f19 drm/amdgpu: Reset the clear flag in buddy during resume d2a6a3543fd2 platform/x86: ideapad-laptop: Fix kbd backlight not remembered among boots 616ca3c4d11e platform/x86: ideapad-laptop: Fix FnLock not remembered among boots 4de81eb46284 net: hns3: default enable tx bounce buffer when smmu enabled 68494b2ca295 net: hns3: fixed vf get max channels bug 952cd60f695b net: hns3: disable interrupt when ptp init failed 7676d652801c net: hns3: fix concurrent setting vlan filter issue 1194ad0d44d6 s390/ism: fix concurrency management in ism_cmd() de5aaea0384c selftests: drv-net: wait for iperf client to stop sending 61baf2a43d45 ALSA: hda/realtek: Fix mute LED mask on HP OMEN 16 laptop 5c25b4f2769e drm/bridge: ti-sn65dsi86: Remove extra semicolon in ti_sn_bridge_probe() 0ca816a96fdc can: netlink: can_changelink(): fix NULL pointer deref of struct can_priv::do_set_mode 11a2eadf0bd2 net/sched: sch_qfq: Avoid triggering might_sleep in atomic context in qfq_delete_class 5f02ea0f63dd net: appletalk: Fix use-after-free in AARP proxy probe 18617f4063e5 i40e: When removing VF MAC filters, only check PF-set MAC dc08e1772566 i40e: report VF tx_dropped with tx_errors instead of tx_discards ebd24581e055 net/mlx5: E-Switch, Fix peer miss rules to use peer eswitch 6b1f7194d02c net/mlx5: Fix memory leak in cmd_exec() 07759e28a3b5 net: ti: icssg-prueth: Fix buffer allocation for ICSSG 1dc0ed16cfbc ASoC: mediatek: mt8365-dai-i2s: pass correct size to mt8365_dai_set_priv 5918c3f4800a xfrm: interface: fix use-after-free after changing collect_md xfrm interface 07ab45902446 xfrm: Set transport header to fix UDP GRO handling 085f24f0be55 xfrm: state: use a consistent pcpu_id in xfrm_state_find 6bf2daafc51b xfrm: state: initialize state_ptrs earlier in xfrm_state_find 80d66be8a04f staging: vchiq_arm: Make vchiq_shutdown never fail 0fb8478fb0ea platform/x86: Fix initialization order for firmware_attributes_class 9128b2dbe510 x86/hyperv: Fix usage of cpu_online_mask to get valid cpu ef3bee8d1da1 tools/hv: fcopy: Fix incorrect file path conversion 8a1fbb642b74 platform/mellanox: mlxbf-pmc: Use kstrtobool() to check 0/1 input d38e1e0a64a9 platform/mellanox: mlxbf-pmc: Validate event/enable input f0580af3d3ec platform/mellanox: mlxbf-pmc: Remove newline char from event name input 1b102d2cc4bc regmap: fix potential memory leak of regmap_bus be4f30f7c178 iio: adc: ad7949: use spi_is_bpw_supported() 5aa9a2d57899 interconnect: qcom: sc7280: Add missing num_links to xm_pcie3_1 node 3fd782ceabea RDMA/core: Rate limit GID cache warning messages 96876f6e859e platform/x86: asus-nb-wmi: add DMI quirk for ASUS Zenbook Duo UX8406CA 5d4261dbb333 regulator: core: fix NULL dereference on unbind due to stale coupling data bf812206f2d0 virtio_ring: Fix error reporting in virtqueue_resize 30ce52f1616e virtio_net: Enforce minimum TX ring size for reliability a7b79db25846 Input: gpio-keys - fix a sleep while atomic with PREEMPT_RT 2bf554c820f1 x86/traps: Initialize DR7 by writing its architectural reset value Signed-off-by: Bruce Ashfield --- .../linux/linux-yocto-rt_6.12.bb | 6 ++-- .../linux/linux-yocto-tiny_6.12.bb | 6 ++-- meta/recipes-kernel/linux/linux-yocto_6.12.bb | 28 +++++++++---------- 3 files changed, 20 insertions(+), 20 deletions(-) diff --git a/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb b/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb index fdb0caa943..72525d8764 100644 --- a/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb +++ b/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb @@ -14,13 +14,13 @@ python () { raise bb.parse.SkipRecipe("Set PREFERRED_PROVIDER_virtual/kernel to linux-yocto-rt to enable it") } -SRCREV_machine ?= "96c3b8967c299edb7c8fd1beff358624e3aac443" -SRCREV_meta ?= "52dd739a32215ffca801bc40daebee19a01b6f20" +SRCREV_machine ?= "a40a131df6cba8f7ff468416f0cbe8e694974c8c" +SRCREV_meta ?= "57f788e849d9b04dd6aa28b896546c56b45f69e7" SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;branch=${KBRANCH};name=machine;protocol=https \ git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.12;destsuffix=${KMETA};protocol=https" -LINUX_VERSION ?= "6.12.40" +LINUX_VERSION ?= "6.12.41" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" diff --git a/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb b/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb index 3dccc9e723..733b163c77 100644 --- a/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb +++ b/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb @@ -8,7 +8,7 @@ require recipes-kernel/linux/linux-yocto.inc # CVE exclusions include recipes-kernel/linux/cve-exclusion_6.12.inc -LINUX_VERSION ?= "6.12.40" +LINUX_VERSION ?= "6.12.41" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}" @@ -17,8 +17,8 @@ DEPENDS += "openssl-native util-linux-native" KMETA = "kernel-meta" KCONF_BSP_AUDIT_LEVEL = "2" -SRCREV_machine ?= "50893c3858cc7bbc15a174f06fa30fba25306cac" -SRCREV_meta ?= "52dd739a32215ffca801bc40daebee19a01b6f20" +SRCREV_machine ?= "4137e9dd62e47f0f7472c7f0dfcbef5f8929f280" +SRCREV_meta ?= "57f788e849d9b04dd6aa28b896546c56b45f69e7" PV = "${LINUX_VERSION}+git" diff --git a/meta/recipes-kernel/linux/linux-yocto_6.12.bb b/meta/recipes-kernel/linux/linux-yocto_6.12.bb index c58e5f07f4..3c27a7e719 100644 --- a/meta/recipes-kernel/linux/linux-yocto_6.12.bb +++ b/meta/recipes-kernel/linux/linux-yocto_6.12.bb @@ -18,25 +18,25 @@ KBRANCH:qemux86.104 ?= "v6.12/standard/base" KBRANCH:qemuloongarch64 ?= "v6.12/standard/base" KBRANCH:qemumips64 ?= "v6.12/standard/mti-malta64" -SRCREV_machine:qemuarm ?= "3884ae3c574f932b6cfe528f86c83214c2e8a36e" -SRCREV_machine:qemuarm64 ?= "50893c3858cc7bbc15a174f06fa30fba25306cac" -SRCREV_machine:qemuloongarch64 ?= "50893c3858cc7bbc15a174f06fa30fba25306cac" -SRCREV_machine:qemumips ?= "39d23e283ab644b5a8758046130b8c22847176f8" -SRCREV_machine:qemuppc ?= "50893c3858cc7bbc15a174f06fa30fba25306cac" -SRCREV_machine:qemuriscv64 ?= "50893c3858cc7bbc15a174f06fa30fba25306cac" -SRCREV_machine:qemuriscv32 ?= "50893c3858cc7bbc15a174f06fa30fba25306cac" -SRCREV_machine:qemux86 ?= "50893c3858cc7bbc15a174f06fa30fba25306cac" -SRCREV_machine:qemux86-64 ?= "50893c3858cc7bbc15a174f06fa30fba25306cac" -SRCREV_machine:qemumips64 ?= "3cf1294a14f4a23376b86201ab5bdff6159102ad" -SRCREV_machine ?= "50893c3858cc7bbc15a174f06fa30fba25306cac" -SRCREV_meta ?= "52dd739a32215ffca801bc40daebee19a01b6f20" +SRCREV_machine:qemuarm ?= "01bbdad6b55cc37010a721899318f591ba5f09a6" +SRCREV_machine:qemuarm64 ?= "4137e9dd62e47f0f7472c7f0dfcbef5f8929f280" +SRCREV_machine:qemuloongarch64 ?= "4137e9dd62e47f0f7472c7f0dfcbef5f8929f280" +SRCREV_machine:qemumips ?= "aa348bdab88ee1c6358af8e3b9d210738884a8f6" +SRCREV_machine:qemuppc ?= "4137e9dd62e47f0f7472c7f0dfcbef5f8929f280" +SRCREV_machine:qemuriscv64 ?= "4137e9dd62e47f0f7472c7f0dfcbef5f8929f280" +SRCREV_machine:qemuriscv32 ?= "4137e9dd62e47f0f7472c7f0dfcbef5f8929f280" +SRCREV_machine:qemux86 ?= "4137e9dd62e47f0f7472c7f0dfcbef5f8929f280" +SRCREV_machine:qemux86-64 ?= "4137e9dd62e47f0f7472c7f0dfcbef5f8929f280" +SRCREV_machine:qemumips64 ?= "d3850d4a70821a2d63be812b316ca0d05c2c0c24" +SRCREV_machine ?= "4137e9dd62e47f0f7472c7f0dfcbef5f8929f280" +SRCREV_meta ?= "57f788e849d9b04dd6aa28b896546c56b45f69e7" # set your preferred provider of linux-yocto to 'linux-yocto-upstream', and you'll # get the /base branch, which is pure upstream -stable, and the same # meta SRCREV as the linux-yocto-standard builds. Select your version using the # normal PREFERRED_VERSION settings. BBCLASSEXTEND = "devupstream:target" -SRCREV_machine:class-devupstream ?= "d90ecb2b1308b3e362ec4c21ff7cf0a051b445df" +SRCREV_machine:class-devupstream ?= "8f5ff9784f3262e6e85c68d86f8b7931827f2983" PN:class-devupstream = "linux-yocto-upstream" KBRANCH:class-devupstream = "v6.12/base" @@ -44,7 +44,7 @@ SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;name=machine;branch=${KBRA git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.12;destsuffix=${KMETA};protocol=https" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" -LINUX_VERSION ?= "6.12.40" +LINUX_VERSION ?= "6.12.41" PV = "${LINUX_VERSION}+git" From patchwork Wed Aug 13 20:49:22 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Bruce Ashfield X-Patchwork-Id: 68479 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 4A0D5C87FCF for ; Wed, 13 Aug 2025 20:49:43 +0000 (UTC) Received: from mail-qt1-f178.google.com (mail-qt1-f178.google.com [209.85.160.178]) by mx.groups.io with SMTP id smtpd.web10.7054.1755118177178787913 for ; Wed, 13 Aug 2025 13:49:37 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@gmail.com header.s=20230601 header.b=azcgOSJw; spf=pass (domain: gmail.com, ip: 209.85.160.178, mailfrom: bruce.ashfield@gmail.com) Received: by mail-qt1-f178.google.com with SMTP id d75a77b69052e-4b109be3726so4113701cf.2 for ; Wed, 13 Aug 2025 13:49:37 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1755118176; x=1755722976; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=CXdsttJ/twlqWCGwut8FLDNoYHTs7/YwJ2TAIQP/dCU=; b=azcgOSJwehPPLRRGLzP71/QmHVh1mFBf/2pkWCb5hYONhviCi0AaDKxOFZ6BeOMTt5 vMdLWMC4I4QfgSbdx+r9AMUUkiM2+2HCN3sYzNnA5955incTJMbe6JLaspCzmGHBj4cT TQ/Vws7U0Co/OVYeQ9eFWGq/IEJQqlqm2zukTJGRkcf00I95+OxokXYFrAjiaVegVHoF jXEFvc7EqB2wQUVh06TmEt7MQyg2nt9og1QIIumGuOkqOf4KwgxgXabMSpRjeFeCfTkI 9GYCBUZsodxyK6kJNOHPg2EOVX10hO5RLdHAHXTewQhgsK38uvt1V9EIi++8xXuzCklI OX1Q== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1755118176; x=1755722976; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=CXdsttJ/twlqWCGwut8FLDNoYHTs7/YwJ2TAIQP/dCU=; b=CtpIbUhfdPKCv+bXdNgW4YfWt4Z3o6Yh+8NAUoBSSWB/1gS2A5lQaMY4KygxPghlgk 8p6U0q/Q0iE1gk5gqWpdVz17clYUbEddssSxlXWZ21Y4HkW6NcfAQMyF4p9AUDJObP2x quDDbViyjdSyk7DeWx3/oBUoBRL0SUER623uExITgDmXOAKhlAWUNPNq/qAe31fk89ot 8noxS/AmD+GsZIGv8tpWrofUbIEt2Xl4gODd6U4dm3BIS700IzgvxWA49zhSQsq+S4NZ bMFIid2Aa2xjOSpcQg8d9o2wzkdT/9qYzqzIQmx6gu2u8UZ+31cn6+oKxvKxiHz3lkh6 aJNg== X-Gm-Message-State: AOJu0Yxin3ocyiCSAoTrkMiHkxVQLgLuYRccdCSxC6akn9arhg5WxsbI 36B2X25Jp2bH6wQhQ3TBihbQSnQOEH4c/PARWAGpbaFge2FQR06meE0mjuHaNGLZ X-Gm-Gg: ASbGncvPwrIEyVGGpz4/TMfc7VYrAQa8ffr4+Hx1Pemj2IzKtDwYnLIZz6u/1kg6sA0 4jzwjoSgj+iPCqSu2K0g2vqLLuc3mCvnrT83cce3g5S35ZDxp0RdcOoVLLyy2p2gkXoGWUv2MpU IXzUuyHukD/brjN5kDZmB+CYD2fD/Fi+mRW9G+D9Q5SYSoJfqd7D1skkyFdjnMXl2M3RTW+A2iF fLX9l9wuYgJR6XNF0XGhv5S9p/rTdmC4C2yqfL+DcXLsnVvY++d9s18LRYXLY1wIUyLjv0qPPAM scgE5L8vVqTYL3kbiblw2UsDscq2szxgbSPlaZ1Fj/aOvFkSnrl7oxWqILLCR5VaymllAABH9dM fxZoCmYjU9aYVdmXdIMvcURAvyDIAMknTqfUZBGw8pR8M5azlZzA/tOvaanPydVfDRaD0djF1bF yxk85aed6NC43vuSSgB51A/p4= X-Google-Smtp-Source: AGHT+IHN/ZApPt9ALj4xptKTYLDeADRwy71ReZ854anHNBzsYW0nc7iJJmnZJHaMU7KkR8zBxTJ0ew== X-Received: by 2002:ac8:5ac8:0:b0:4ae:cc75:4703 with SMTP id d75a77b69052e-4b10ab31062mr8376711cf.58.1755118175698; Wed, 13 Aug 2025 13:49:35 -0700 (PDT) Received: from bruce-XPS-8940.localdomain (pool-174-112-62-108.cpe.net.cable.rogers.com. [174.112.62.108]) by smtp.gmail.com with ESMTPSA id 6a1803df08f44-70af5b07658sm3326516d6.43.2025.08.13.13.49.34 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 13 Aug 2025 13:49:35 -0700 (PDT) From: bruce.ashfield@gmail.com To: richard.purdie@linuxfoundation.org Cc: openembedded-core@lists.openembedded.org Subject: [PATCH 8/8] linux-yocto/6.12: update CVE exclusions (6.12.41) Date: Wed, 13 Aug 2025 16:49:22 -0400 Message-Id: X-Mailer: git-send-email 2.39.2 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Wed, 13 Aug 2025 20:49:43 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/221828 From: Bruce Ashfield Data pulled from: https://github.com/CVEProject/cvelistV5 1/1 [ Author: cvelistV5 Github Action Email: github_action@example.com Subject: 3 changes (2 new | 1 updated): - 2 new CVEs: CVE-2025-8707, CVE-2025-8708 - 1 updated CVEs: CVE-2025-2586 Date: Fri, 8 Aug 2025 02:36:59 +0000 ] Signed-off-by: Bruce Ashfield --- .../linux/cve-exclusion_6.12.inc | 346 ++++++++++++++++-- 1 file changed, 317 insertions(+), 29 deletions(-) diff --git a/meta/recipes-kernel/linux/cve-exclusion_6.12.inc b/meta/recipes-kernel/linux/cve-exclusion_6.12.inc index ee2f30b3db..a110f89af1 100644 --- a/meta/recipes-kernel/linux/cve-exclusion_6.12.inc +++ b/meta/recipes-kernel/linux/cve-exclusion_6.12.inc @@ -1,11 +1,11 @@ # Auto-generated CVE metadata, DO NOT EDIT BY HAND. -# Generated at 2025-07-25 02:49:32.259439+00:00 for kernel version 6.12.40 -# From linux_kernel_cves cve_2025-07-25_0100Z-1-g854b2f05e2c +# Generated at 2025-08-08 02:45:44.343204+00:00 for kernel version 6.12.41 +# From linux_kernel_cves cve_2025-08-08_0100Z-2-g05f2a09f419 python check_kernel_cve_status_version() { - this_version = "6.12.40" + this_version = "6.12.41" kernel_version = d.getVar("LINUX_VERSION") if kernel_version != this_version: bb.warn("Kernel CVE status needs updating: generated for %s but kernel is %s" % (this_version, kernel_version)) @@ -13394,7 +13394,7 @@ CVE_STATUS[CVE-2025-37923] = "cpe-stable-backport: Backported in 6.12.28" CVE_STATUS[CVE-2025-37924] = "cpe-stable-backport: Backported in 6.12.28" -# CVE-2025-37925 needs backporting (fixed from 6.15) +CVE_STATUS[CVE-2025-37925] = "cpe-stable-backport: Backported in 6.12.41" CVE_STATUS[CVE-2025-37926] = "cpe-stable-backport: Backported in 6.12.28" @@ -13510,7 +13510,7 @@ CVE_STATUS[CVE-2025-37982] = "cpe-stable-backport: Backported in 6.12.25" CVE_STATUS[CVE-2025-37983] = "cpe-stable-backport: Backported in 6.12.26" -# CVE-2025-37984 needs backporting (fixed from 6.15) +CVE_STATUS[CVE-2025-37984] = "cpe-stable-backport: Backported in 6.12.39" CVE_STATUS[CVE-2025-37985] = "cpe-stable-backport: Backported in 6.12.26" @@ -13746,7 +13746,7 @@ CVE_STATUS[CVE-2025-38103] = "cpe-stable-backport: Backported in 6.12.34" CVE_STATUS[CVE-2025-38104] = "cpe-stable-backport: Backported in 6.12.39" -# CVE-2025-38105 needs backporting (fixed from 6.16rc1) +# CVE-2025-38105 needs backporting (fixed from 6.16) CVE_STATUS[CVE-2025-38106] = "cpe-stable-backport: Backported in 6.12.34" @@ -13800,7 +13800,7 @@ CVE_STATUS[CVE-2025-38130] = "fixed-version: only affects 6.14 onwards" CVE_STATUS[CVE-2025-38131] = "cpe-stable-backport: Backported in 6.12.34" -# CVE-2025-38132 needs backporting (fixed from 6.16rc1) +# CVE-2025-38132 needs backporting (fixed from 6.16) CVE_STATUS[CVE-2025-38133] = "fixed-version: only affects 6.15 onwards" @@ -13810,13 +13810,13 @@ CVE_STATUS[CVE-2025-38135] = "cpe-stable-backport: Backported in 6.12.34" CVE_STATUS[CVE-2025-38136] = "cpe-stable-backport: Backported in 6.12.34" -# CVE-2025-38137 needs backporting (fixed from 6.16rc1) +# CVE-2025-38137 needs backporting (fixed from 6.16) CVE_STATUS[CVE-2025-38138] = "cpe-stable-backport: Backported in 6.12.34" CVE_STATUS[CVE-2025-38139] = "cpe-stable-backport: Backported in 6.12.37" -# CVE-2025-38140 needs backporting (fixed from 6.16rc1) +# CVE-2025-38140 needs backporting (fixed from 6.16) CVE_STATUS[CVE-2025-38141] = "cpe-stable-backport: Backported in 6.12.34" @@ -13892,8 +13892,6 @@ CVE_STATUS[CVE-2025-38176] = "fixed-version: only affects 6.14 onwards" CVE_STATUS[CVE-2025-38177] = "cpe-stable-backport: Backported in 6.12.28" -CVE_STATUS[CVE-2025-38178] = "fixed-version: only affects 6.16rc1 onwards" - CVE_STATUS[CVE-2025-38179] = "cpe-stable-backport: Backported in 6.12.35" CVE_STATUS[CVE-2025-38180] = "cpe-stable-backport: Backported in 6.12.35" @@ -13910,7 +13908,7 @@ CVE_STATUS[CVE-2025-38185] = "cpe-stable-backport: Backported in 6.12.35" CVE_STATUS[CVE-2025-38186] = "cpe-stable-backport: Backported in 6.12.35" -# CVE-2025-38187 needs backporting (fixed from 6.16rc3) +# CVE-2025-38187 needs backporting (fixed from 6.16) CVE_STATUS[CVE-2025-38188] = "cpe-stable-backport: Backported in 6.12.35" @@ -13934,7 +13932,7 @@ CVE_STATUS[CVE-2025-38197] = "cpe-stable-backport: Backported in 6.12.35" CVE_STATUS[CVE-2025-38198] = "cpe-stable-backport: Backported in 6.12.35" -# CVE-2025-38199 needs backporting (fixed from 6.16rc1) +# CVE-2025-38199 needs backporting (fixed from 6.16) CVE_STATUS[CVE-2025-38200] = "cpe-stable-backport: Backported in 6.12.35" @@ -13942,15 +13940,15 @@ CVE_STATUS[CVE-2025-38201] = "cpe-stable-backport: Backported in 6.12.35" CVE_STATUS[CVE-2025-38202] = "cpe-stable-backport: Backported in 6.12.35" -# CVE-2025-38203 needs backporting (fixed from 6.16rc1) +# CVE-2025-38203 needs backporting (fixed from 6.16) -# CVE-2025-38204 needs backporting (fixed from 6.16rc1) +# CVE-2025-38204 needs backporting (fixed from 6.16) -# CVE-2025-38205 needs backporting (fixed from 6.16rc1) +# CVE-2025-38205 needs backporting (fixed from 6.16) -# CVE-2025-38206 needs backporting (fixed from 6.16rc1) +# CVE-2025-38206 needs backporting (fixed from 6.16) -# CVE-2025-38207 needs backporting (fixed from 6.16rc1) +# CVE-2025-38207 needs backporting (fixed from 6.16) CVE_STATUS[CVE-2025-38208] = "cpe-stable-backport: Backported in 6.12.35" @@ -14004,13 +14002,13 @@ CVE_STATUS[CVE-2025-38232] = "cpe-stable-backport: Backported in 6.12.35" CVE_STATUS[CVE-2025-38233] = "fixed-version: only affects 6.13 onwards" -# CVE-2025-38234 needs backporting (fixed from 6.16rc1) +# CVE-2025-38234 needs backporting (fixed from 6.16) CVE_STATUS[CVE-2025-38235] = "fixed-version: only affects 6.15 onwards" CVE_STATUS[CVE-2025-38236] = "cpe-stable-backport: Backported in 6.12.36" -# CVE-2025-38237 needs backporting (fixed from 6.16rc1) +# CVE-2025-38237 needs backporting (fixed from 6.16) CVE_STATUS[CVE-2025-38238] = "fixed-version: only affects 6.14 onwards" @@ -14032,7 +14030,7 @@ CVE_STATUS[CVE-2025-38246] = "cpe-stable-backport: Backported in 6.12.36" CVE_STATUS[CVE-2025-38247] = "fixed-version: only affects 6.15 onwards" -# CVE-2025-38248 needs backporting (fixed from 6.16rc4) +# CVE-2025-38248 needs backporting (fixed from 6.16) CVE_STATUS[CVE-2025-38249] = "cpe-stable-backport: Backported in 6.12.36" @@ -14058,7 +14056,7 @@ CVE_STATUS[CVE-2025-38259] = "cpe-stable-backport: Backported in 6.12.36" CVE_STATUS[CVE-2025-38260] = "cpe-stable-backport: Backported in 6.12.36" -# CVE-2025-38261 needs backporting (fixed from 6.16rc1) +# CVE-2025-38261 needs backporting (fixed from 6.16) CVE_STATUS[CVE-2025-38262] = "cpe-stable-backport: Backported in 6.12.36" @@ -14080,7 +14078,7 @@ CVE_STATUS[CVE-2025-38270] = "cpe-stable-backport: Backported in 6.12.34" CVE_STATUS[CVE-2025-38271] = "fixed-version: only affects 6.15 onwards" -# CVE-2025-38272 needs backporting (fixed from 6.16rc1) +# CVE-2025-38272 needs backporting (fixed from 6.16) CVE_STATUS[CVE-2025-38273] = "cpe-stable-backport: Backported in 6.12.34" @@ -14104,7 +14102,7 @@ CVE_STATUS[CVE-2025-38282] = "cpe-stable-backport: Backported in 6.12.34" CVE_STATUS[CVE-2025-38283] = "cpe-stable-backport: Backported in 6.12.34" -# CVE-2025-38284 needs backporting (fixed from 6.16rc1) +# CVE-2025-38284 needs backporting (fixed from 6.16) CVE_STATUS[CVE-2025-38285] = "cpe-stable-backport: Backported in 6.12.34" @@ -14148,7 +14146,7 @@ CVE_STATUS[CVE-2025-38304] = "cpe-stable-backport: Backported in 6.12.34" CVE_STATUS[CVE-2025-38305] = "cpe-stable-backport: Backported in 6.12.34" -# CVE-2025-38306 needs backporting (fixed from 6.16rc1) +# CVE-2025-38306 needs backporting (fixed from 6.16) CVE_STATUS[CVE-2025-38307] = "cpe-stable-backport: Backported in 6.12.34" @@ -14158,7 +14156,7 @@ CVE_STATUS[CVE-2025-38309] = "fixed-version: only affects 6.15 onwards" CVE_STATUS[CVE-2025-38310] = "cpe-stable-backport: Backported in 6.12.34" -# CVE-2025-38311 needs backporting (fixed from 6.16rc1) +# CVE-2025-38311 needs backporting (fixed from 6.16) CVE_STATUS[CVE-2025-38312] = "cpe-stable-backport: Backported in 6.12.34" @@ -14180,7 +14178,7 @@ CVE_STATUS[CVE-2025-38320] = "cpe-stable-backport: Backported in 6.12.35" CVE_STATUS[CVE-2025-38321] = "cpe-stable-backport: Backported in 6.12.35" -CVE_STATUS[CVE-2025-38322] = "fixed-version: only affects 6.15 onwards" +# CVE-2025-38322 needs backporting (fixed from 6.16) CVE_STATUS[CVE-2025-38323] = "cpe-stable-backport: Backported in 6.12.35" @@ -14206,7 +14204,7 @@ CVE_STATUS[CVE-2025-38333] = "cpe-stable-backport: Backported in 6.12.35" CVE_STATUS[CVE-2025-38334] = "cpe-stable-backport: Backported in 6.12.35" -# CVE-2025-38335 needs backporting (fixed from 6.16rc1) +CVE_STATUS[CVE-2025-38335] = "cpe-stable-backport: Backported in 6.12.41" CVE_STATUS[CVE-2025-38336] = "cpe-stable-backport: Backported in 6.12.35" @@ -14238,12 +14236,302 @@ CVE_STATUS[CVE-2025-38349] = "cpe-stable-backport: Backported in 6.12.39" CVE_STATUS[CVE-2025-38350] = "cpe-stable-backport: Backported in 6.12.37" -# CVE-2025-38351 needs backporting (fixed from 6.16rc6) +CVE_STATUS[CVE-2025-38351] = "cpe-stable-backport: Backported in 6.12.41" CVE_STATUS[CVE-2025-38352] = "cpe-stable-backport: Backported in 6.12.34" +CVE_STATUS[CVE-2025-38353] = "cpe-stable-backport: Backported in 6.12.36" + +CVE_STATUS[CVE-2025-38354] = "cpe-stable-backport: Backported in 6.12.36" + +CVE_STATUS[CVE-2025-38355] = "cpe-stable-backport: Backported in 6.12.36" + +CVE_STATUS[CVE-2025-38356] = "cpe-stable-backport: Backported in 6.12.37" + +CVE_STATUS[CVE-2025-38357] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2025-38358] = "fixed-version: only affects 6.15 onwards" + +# CVE-2025-38359 needs backporting (fixed from 6.16) + +CVE_STATUS[CVE-2025-38360] = "cpe-stable-backport: Backported in 6.12.37" + +CVE_STATUS[CVE-2025-38361] = "cpe-stable-backport: Backported in 6.12.36" + +CVE_STATUS[CVE-2025-38362] = "cpe-stable-backport: Backported in 6.12.36" + +CVE_STATUS[CVE-2025-38363] = "cpe-stable-backport: Backported in 6.12.36" + +CVE_STATUS[CVE-2025-38364] = "cpe-stable-backport: Backported in 6.12.36" + +CVE_STATUS[CVE-2025-38365] = "cpe-stable-backport: Backported in 6.12.36" + +CVE_STATUS[CVE-2025-38366] = "fixed-version: only affects 6.13 onwards" + +CVE_STATUS[CVE-2025-38367] = "fixed-version: only affects 6.13 onwards" + +CVE_STATUS[CVE-2025-38368] = "cpe-stable-backport: Backported in 6.12.36" + +CVE_STATUS[CVE-2025-38369] = "cpe-stable-backport: Backported in 6.12.36" + +CVE_STATUS[CVE-2025-38370] = "fixed-version: only affects 6.14 onwards" + +CVE_STATUS[CVE-2025-38371] = "cpe-stable-backport: Backported in 6.12.37" + +CVE_STATUS[CVE-2025-38372] = "cpe-stable-backport: Backported in 6.12.37" + +CVE_STATUS[CVE-2025-38373] = "cpe-stable-backport: Backported in 6.12.37" + +CVE_STATUS[CVE-2025-38374] = "cpe-stable-backport: Backported in 6.12.37" + +CVE_STATUS[CVE-2025-38375] = "cpe-stable-backport: Backported in 6.12.37" + +CVE_STATUS[CVE-2025-38376] = "cpe-stable-backport: Backported in 6.12.37" + +CVE_STATUS[CVE-2025-38377] = "cpe-stable-backport: Backported in 6.12.37" + +CVE_STATUS[CVE-2025-38378] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2025-38379] = "cpe-stable-backport: Backported in 6.12.37" + +CVE_STATUS[CVE-2025-38380] = "cpe-stable-backport: Backported in 6.12.37" + +CVE_STATUS[CVE-2025-38381] = "cpe-stable-backport: Backported in 6.12.37" + +CVE_STATUS[CVE-2025-38382] = "cpe-stable-backport: Backported in 6.12.37" + +CVE_STATUS[CVE-2025-38383] = "cpe-stable-backport: Backported in 6.12.37" + +CVE_STATUS[CVE-2025-38384] = "cpe-stable-backport: Backported in 6.12.37" + +CVE_STATUS[CVE-2025-38385] = "cpe-stable-backport: Backported in 6.12.37" + +CVE_STATUS[CVE-2025-38386] = "cpe-stable-backport: Backported in 6.12.37" + +CVE_STATUS[CVE-2025-38387] = "cpe-stable-backport: Backported in 6.12.37" + +CVE_STATUS[CVE-2025-38388] = "cpe-stable-backport: Backported in 6.12.37" + +CVE_STATUS[CVE-2025-38389] = "cpe-stable-backport: Backported in 6.12.37" + +CVE_STATUS[CVE-2025-38390] = "cpe-stable-backport: Backported in 6.12.37" + +CVE_STATUS[CVE-2025-38391] = "cpe-stable-backport: Backported in 6.12.37" + +CVE_STATUS[CVE-2025-38392] = "cpe-stable-backport: Backported in 6.12.37" + +CVE_STATUS[CVE-2025-38393] = "cpe-stable-backport: Backported in 6.12.37" + +CVE_STATUS[CVE-2025-38394] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2025-38395] = "cpe-stable-backport: Backported in 6.12.37" + +CVE_STATUS[CVE-2025-38396] = "cpe-stable-backport: Backported in 6.12.37" + +CVE_STATUS[CVE-2025-38397] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2025-38398] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2025-38399] = "cpe-stable-backport: Backported in 6.12.37" + +CVE_STATUS[CVE-2025-38400] = "cpe-stable-backport: Backported in 6.12.37" + +CVE_STATUS[CVE-2025-38401] = "cpe-stable-backport: Backported in 6.12.37" + +CVE_STATUS[CVE-2025-38402] = "cpe-stable-backport: Backported in 6.12.37" + +CVE_STATUS[CVE-2025-38403] = "cpe-stable-backport: Backported in 6.12.37" + +CVE_STATUS[CVE-2025-38404] = "cpe-stable-backport: Backported in 6.12.37" + +CVE_STATUS[CVE-2025-38405] = "cpe-stable-backport: Backported in 6.12.37" + +CVE_STATUS[CVE-2025-38406] = "cpe-stable-backport: Backported in 6.12.37" + +CVE_STATUS[CVE-2025-38407] = "cpe-stable-backport: Backported in 6.12.37" + +CVE_STATUS[CVE-2025-38408] = "cpe-stable-backport: Backported in 6.12.37" + +CVE_STATUS[CVE-2025-38409] = "cpe-stable-backport: Backported in 6.12.37" + +CVE_STATUS[CVE-2025-38410] = "cpe-stable-backport: Backported in 6.12.37" + +CVE_STATUS[CVE-2025-38411] = "fixed-version: only affects 6.15.3 onwards" + +CVE_STATUS[CVE-2025-38412] = "cpe-stable-backport: Backported in 6.12.37" + +CVE_STATUS[CVE-2025-38413] = "cpe-stable-backport: Backported in 6.12.37" + +CVE_STATUS[CVE-2025-38414] = "cpe-stable-backport: Backported in 6.12.34" + +CVE_STATUS[CVE-2025-38415] = "cpe-stable-backport: Backported in 6.12.34" + +CVE_STATUS[CVE-2025-38416] = "cpe-stable-backport: Backported in 6.12.35" + +CVE_STATUS[CVE-2025-38417] = "cpe-stable-backport: Backported in 6.12.35" + +CVE_STATUS[CVE-2025-38418] = "cpe-stable-backport: Backported in 6.12.35" + +CVE_STATUS[CVE-2025-38419] = "cpe-stable-backport: Backported in 6.12.35" + +CVE_STATUS[CVE-2025-38420] = "cpe-stable-backport: Backported in 6.12.35" + +CVE_STATUS[CVE-2025-38421] = "fixed-version: only affects 6.14 onwards" + +CVE_STATUS[CVE-2025-38422] = "cpe-stable-backport: Backported in 6.12.35" + +CVE_STATUS[CVE-2025-38423] = "cpe-stable-backport: Backported in 6.12.35" + +CVE_STATUS[CVE-2025-38424] = "cpe-stable-backport: Backported in 6.12.35" + +CVE_STATUS[CVE-2025-38425] = "cpe-stable-backport: Backported in 6.12.35" + +# CVE-2025-38426 needs backporting (fixed from 6.16) + +CVE_STATUS[CVE-2025-38427] = "cpe-stable-backport: Backported in 6.12.35" + +CVE_STATUS[CVE-2025-38428] = "cpe-stable-backport: Backported in 6.12.35" + +CVE_STATUS[CVE-2025-38429] = "cpe-stable-backport: Backported in 6.12.35" + +CVE_STATUS[CVE-2025-38430] = "cpe-stable-backport: Backported in 6.12.35" + +CVE_STATUS[CVE-2025-38431] = "fixed-version: only affects 6.14 onwards" + +CVE_STATUS[CVE-2025-38432] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2025-38433] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2025-38434] = "cpe-stable-backport: Backported in 6.12.36" + +CVE_STATUS[CVE-2025-38435] = "fixed-version: only affects 6.14 onwards" + +CVE_STATUS[CVE-2025-38436] = "cpe-stable-backport: Backported in 6.12.36" + +CVE_STATUS[CVE-2025-38437] = "cpe-stable-backport: Backported in 6.12.39" + +CVE_STATUS[CVE-2025-38438] = "cpe-stable-backport: Backported in 6.12.39" + +CVE_STATUS[CVE-2025-38439] = "cpe-stable-backport: Backported in 6.12.39" + +CVE_STATUS[CVE-2025-38440] = "cpe-stable-backport: Backported in 6.12.39" + +CVE_STATUS[CVE-2025-38441] = "cpe-stable-backport: Backported in 6.12.39" + +CVE_STATUS[CVE-2025-38442] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2025-38443] = "cpe-stable-backport: Backported in 6.12.39" + +CVE_STATUS[CVE-2025-38444] = "cpe-stable-backport: Backported in 6.12.39" + +CVE_STATUS[CVE-2025-38445] = "cpe-stable-backport: Backported in 6.12.39" + +CVE_STATUS[CVE-2025-38446] = "cpe-stable-backport: Backported in 6.12.39" + +CVE_STATUS[CVE-2025-38447] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2025-38448] = "cpe-stable-backport: Backported in 6.12.39" + +CVE_STATUS[CVE-2025-38449] = "cpe-stable-backport: Backported in 6.12.39" + +CVE_STATUS[CVE-2025-38450] = "cpe-stable-backport: Backported in 6.12.39" + +CVE_STATUS[CVE-2025-38451] = "cpe-stable-backport: Backported in 6.12.39" + +CVE_STATUS[CVE-2025-38452] = "cpe-stable-backport: Backported in 6.12.39" + +# CVE-2025-38453 needs backporting (fixed from 6.16) + +CVE_STATUS[CVE-2025-38454] = "cpe-stable-backport: Backported in 6.12.39" + +CVE_STATUS[CVE-2025-38455] = "cpe-stable-backport: Backported in 6.12.39" + +CVE_STATUS[CVE-2025-38456] = "cpe-stable-backport: Backported in 6.12.39" + +CVE_STATUS[CVE-2025-38457] = "cpe-stable-backport: Backported in 6.12.39" + +CVE_STATUS[CVE-2025-38458] = "cpe-stable-backport: Backported in 6.12.39" + +CVE_STATUS[CVE-2025-38459] = "cpe-stable-backport: Backported in 6.12.39" + +CVE_STATUS[CVE-2025-38460] = "cpe-stable-backport: Backported in 6.12.39" + +CVE_STATUS[CVE-2025-38461] = "cpe-stable-backport: Backported in 6.12.39" + +CVE_STATUS[CVE-2025-38462] = "cpe-stable-backport: Backported in 6.12.39" + +CVE_STATUS[CVE-2025-38463] = "cpe-stable-backport: Backported in 6.12.39" + +CVE_STATUS[CVE-2025-38464] = "cpe-stable-backport: Backported in 6.12.39" + +CVE_STATUS[CVE-2025-38465] = "cpe-stable-backport: Backported in 6.12.39" + +CVE_STATUS[CVE-2025-38466] = "cpe-stable-backport: Backported in 6.12.39" + +CVE_STATUS[CVE-2025-38467] = "cpe-stable-backport: Backported in 6.12.39" + +CVE_STATUS[CVE-2025-38468] = "cpe-stable-backport: Backported in 6.12.40" + +CVE_STATUS[CVE-2025-38469] = "cpe-stable-backport: Backported in 6.12.40" + +CVE_STATUS[CVE-2025-38470] = "cpe-stable-backport: Backported in 6.12.40" + +CVE_STATUS[CVE-2025-38471] = "cpe-stable-backport: Backported in 6.12.40" + +CVE_STATUS[CVE-2025-38472] = "cpe-stable-backport: Backported in 6.12.40" + +CVE_STATUS[CVE-2025-38473] = "cpe-stable-backport: Backported in 6.12.40" + +CVE_STATUS[CVE-2025-38474] = "cpe-stable-backport: Backported in 6.12.40" + +CVE_STATUS[CVE-2025-38475] = "cpe-stable-backport: Backported in 6.12.40" + +CVE_STATUS[CVE-2025-38476] = "cpe-stable-backport: Backported in 6.12.40" + +CVE_STATUS[CVE-2025-38477] = "cpe-stable-backport: Backported in 6.12.40" + +CVE_STATUS[CVE-2025-38478] = "cpe-stable-backport: Backported in 6.12.40" + CVE_STATUS[CVE-2025-38479] = "cpe-stable-backport: Backported in 6.12.23" +CVE_STATUS[CVE-2025-38480] = "cpe-stable-backport: Backported in 6.12.40" + +CVE_STATUS[CVE-2025-38481] = "cpe-stable-backport: Backported in 6.12.40" + +CVE_STATUS[CVE-2025-38482] = "cpe-stable-backport: Backported in 6.12.40" + +CVE_STATUS[CVE-2025-38483] = "cpe-stable-backport: Backported in 6.12.40" + +CVE_STATUS[CVE-2025-38484] = "cpe-stable-backport: Backported in 6.12.40" + +CVE_STATUS[CVE-2025-38485] = "cpe-stable-backport: Backported in 6.12.40" + +CVE_STATUS[CVE-2025-38486] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2025-38487] = "cpe-stable-backport: Backported in 6.12.40" + +CVE_STATUS[CVE-2025-38488] = "cpe-stable-backport: Backported in 6.12.40" + +CVE_STATUS[CVE-2025-38489] = "cpe-stable-backport: Backported in 6.12.40" + +CVE_STATUS[CVE-2025-38490] = "cpe-stable-backport: Backported in 6.12.40" + +CVE_STATUS[CVE-2025-38491] = "cpe-stable-backport: Backported in 6.12.40" + +CVE_STATUS[CVE-2025-38492] = "fixed-version: only affects 6.14 onwards" + +CVE_STATUS[CVE-2025-38493] = "cpe-stable-backport: Backported in 6.12.40" + +CVE_STATUS[CVE-2025-38494] = "cpe-stable-backport: Backported in 6.12.40" + +CVE_STATUS[CVE-2025-38495] = "cpe-stable-backport: Backported in 6.12.40" + +CVE_STATUS[CVE-2025-38496] = "cpe-stable-backport: Backported in 6.12.40" + +CVE_STATUS[CVE-2025-38497] = "cpe-stable-backport: Backported in 6.12.40" + +CVE_STATUS[CVE-2025-38498] = "cpe-stable-backport: Backported in 6.12.34" + CVE_STATUS[CVE-2025-38575] = "cpe-stable-backport: Backported in 6.12.23" CVE_STATUS[CVE-2025-38637] = "cpe-stable-backport: Backported in 6.12.23"