From patchwork Fri Oct 17 20:38:44 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 72606 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id B1506CCD1A4 for ; Fri, 17 Oct 2025 20:39:23 +0000 (UTC) Received: from mail-pf1-f177.google.com (mail-pf1-f177.google.com [209.85.210.177]) by mx.groups.io with SMTP id smtpd.web10.3200.1760733561412080585 for ; Fri, 17 Oct 2025 13:39:21 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20230601.gappssmtp.com header.s=20230601 header.b=wbkoup/M; spf=softfail (domain: sakoman.com, ip: 209.85.210.177, mailfrom: steve@sakoman.com) Received: by mail-pf1-f177.google.com with SMTP id d2e1a72fcca58-7841da939deso2317310b3a.2 for ; Fri, 17 Oct 2025 13:39:21 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20230601.gappssmtp.com; s=20230601; t=1760733560; x=1761338360; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=KZc6cBjbqXIOKjsfZoTQorsImsHPejnobo7+vzkiX50=; b=wbkoup/MnobEFANUcHMcGNJ02YF5rwxs+rV2q5aRDOdSrhlZDXv2biQB6+MMfJ3cXi xUJSQKrdiwYEEa/9O/H6ACZRZK9hZMM0TjI8JrKh4j2+t+XlHzSDwZDnA3KZYJDCxgMX ZqqJGgaR6nyrBXAJgqU/hfha7lRp5+FPH9501TxOJDJFALBxTbEirIFMilRk88Vtc+tB FEuG6nYTaMS/jYvDdZzOkDx7PUIo9yhB/qNux17kmWdSCQeuSQoiP1KlLrankA2EvxHb FVJ2fGFvLJkqAW+jSjpBQZmf82FRJpd4ewZ9VWm3xAT5PkpxFUJn6fOb/Zal5bFYMbNr 6jmg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1760733560; x=1761338360; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=KZc6cBjbqXIOKjsfZoTQorsImsHPejnobo7+vzkiX50=; b=ThqgB+82XsFea5fby+xCNVN7tZPnKpbP7o1EmD6umOW/NfZURzuISOZgKcHy4ems6L MVrStBOA7JTes1wHJIltBc7EyB4g4skFjfB6NTZaScBiHkmB1Z3TXKLzUrduO+NsAY4l YC0A9CfqnllJPKZPozjyy3Bv8TDpO1QcZUVr754mFSi88KRj/pmh6f+Js+MlQLHVmDFw wuVyV/VMomp47pRwmkFHpgqzMzVSydLMFGKSL5EQm7Og+ILT1dGNVkfd/ffyi9k2K6pe vjPRfDJL1bgEKB4n4zIjVCOW1VsBPcJwZJmRgBZum2gZD5oKsakil4KsE75wYn1ehK9t Ygzg== X-Gm-Message-State: AOJu0YzfbnPQL5e3QAQPNDdX4M0FuKqLI6QG7fMSMkrCVcf5DoKgMXak /L2voMDzLy6oYg0iMm+MNtCtZmBUtGlWzPYlgNWOLAzg3XSFTU3hMkPhh7m53kRRn3JrKW5ZCla 29g0Ecqs= X-Gm-Gg: ASbGncuP/aGC2J656VMWiM/amPd6pd8J772teifyDLeHl8yRGTQzB/F1PHYXBtxYRd2 3eua5yLDpLcvg5NHMwyOCkmQKLhNMVrvVbtf7s2YMRXUX2Enem7WK+3DgOekvCn2omQXwApVq5+ pOKr+fXCWL0b1+zd3iK2LKIQI8QpgsvnchGrFDs7WC3opnMlZqLi/+OwGLzKULT/LbqmaHxh6To F8D3wH+ogk3W/jAzzWg4oL6K2JEF/h6nyqdr+Fq0ZW1gefcep8ZMC2PpmlhmA4paCnXuoDPvmtR sHBIGRe1h7ERtvq+sPWit/5jWLQoYVvkUFE0XLmMU7wd1mcFC/KUejNMDzgbJE9ciHx97Y/6C/L STq+uJ3ejvFs4xbu4fW3zIep3QyGuKq/AWaBcmsqU2KJ/NjkyGuZh+ugX5Gc29D7dow== X-Google-Smtp-Source: AGHT+IFO6+acawB6sAicRkFKex2wZQb+qT9hDKe6DiVrBNaxO2AdZCe3QsDZ8sBT0GtR0o0COcDahg== X-Received: by 2002:a05:6a00:94c3:b0:792:2dd9:d8e9 with SMTP id d2e1a72fcca58-7a2208fe6camr7163166b3a.4.1760733560542; Fri, 17 Oct 2025 13:39:20 -0700 (PDT) Received: from hexa.. ([2602:feb4:3b:2100:aaee:e640:34cd:6f2]) by smtp.gmail.com with ESMTPSA id d2e1a72fcca58-7a2300f254esm477061b3a.45.2025.10.17.13.39.19 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 17 Oct 2025 13:39:20 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][scarthgap 01/26] qemu: patch CVE-2024-8354 Date: Fri, 17 Oct 2025 13:38:44 -0700 Message-ID: <4bab523ed8ee34e8c09deb631fc82417aa0784b9.1760733431.git.steve@sakoman.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 17 Oct 2025 20:39:23 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/225035 From: Peter Marko Pick commit per [1]. [1] https://security-tracker.debian.org/tracker/CVE-2024-8354 Signed-off-by: Peter Marko Signed-off-by: Steve Sakoman --- meta/recipes-devtools/qemu/qemu.inc | 1 + .../qemu/qemu/CVE-2024-8354.patch | 75 +++++++++++++++++++ 2 files changed, 76 insertions(+) create mode 100644 meta/recipes-devtools/qemu/qemu/CVE-2024-8354.patch diff --git a/meta/recipes-devtools/qemu/qemu.inc b/meta/recipes-devtools/qemu/qemu.inc index 220f0a161c..60d372fce0 100644 --- a/meta/recipes-devtools/qemu/qemu.inc +++ b/meta/recipes-devtools/qemu/qemu.inc @@ -41,6 +41,7 @@ SRC_URI = "https://download.qemu.org/${BPN}-${PV}.tar.xz \ file://0001-sched_attr-Do-not-define-for-glibc-2.41.patch \ file://qemu-guest-agent.init \ file://qemu-guest-agent.udev \ + file://CVE-2024-8354.patch \ " UPSTREAM_CHECK_REGEX = "qemu-(?P\d+(\.\d+)+)\.tar" diff --git a/meta/recipes-devtools/qemu/qemu/CVE-2024-8354.patch b/meta/recipes-devtools/qemu/qemu/CVE-2024-8354.patch new file mode 100644 index 0000000000..5472efcd09 --- /dev/null +++ b/meta/recipes-devtools/qemu/qemu/CVE-2024-8354.patch @@ -0,0 +1,75 @@ +From 746269eaae16423572ae7c0dfeb66140fa882149 Mon Sep 17 00:00:00 2001 +From: Peter Maydell +Date: Mon, 15 Sep 2025 14:29:10 +0100 +Subject: [PATCH] hw/usb/hcd-uhci: don't assert for SETUP to non-0 endpoint + +If the guest feeds invalid data to the UHCI controller, we +can assert: +qemu-system-x86_64: ../../hw/usb/core.c:744: usb_ep_get: Assertion `pid == USB_TOKEN_IN || pid == USB_TOKEN_OUT' failed. + +(see issue 2548 for the repro case). This happens because the guest +attempts USB_TOKEN_SETUP to an endpoint other than 0, which is not +valid. The controller code doesn't catch this guest error, so +instead we hit the assertion in the USB core code. + +Catch the case of SETUP to non-zero endpoint, and treat it as a fatal +error in the TD, in the same way we do for an invalid PID value in +the TD. + +This is the UHCI equivalent of the same bug in OHCI that we fixed in +commit 3c3c233677 ("hw/usb/hcd-ohci: Fix #1510, #303: pid not IN or +OUT"). + +This bug has been tracked as CVE-2024-8354. + +Cc: qemu-stable@nongnu.org +Fixes: https://gitlab.com/qemu-project/qemu/-/issues/2548 +Signed-off-by: Peter Maydell +Reviewed-by: Michael Tokarev +(cherry picked from commit d0af3cd0274e265435170a583c72b9f0a4100dff) +Signed-off-by: Michael Tokarev + +CVE: CVE-2024-8354 +Upstream-Status: Backport [https://gitlab.com/qemu-project/qemu/-/commit/746269eaae16423572ae7c0dfeb66140fa882149] +Signed-off-by: Peter Marko +--- + hw/usb/hcd-uhci.c | 10 ++++++++-- + 1 file changed, 8 insertions(+), 2 deletions(-) + +diff --git a/hw/usb/hcd-uhci.c b/hw/usb/hcd-uhci.c +index 0561a6d801..8f4d6a0f71 100644 +--- a/hw/usb/hcd-uhci.c ++++ b/hw/usb/hcd-uhci.c +@@ -722,6 +722,7 @@ static int uhci_handle_td(UHCIState *s, UHCIQueue *q, uint32_t qh_addr, + bool spd; + bool queuing = (q != NULL); + uint8_t pid = td->token & 0xff; ++ uint8_t ep_id = (td->token >> 15) & 0xf; + UHCIAsync *async; + + async = uhci_async_find_td(s, td_addr); +@@ -765,9 +766,14 @@ static int uhci_handle_td(UHCIState *s, UHCIQueue *q, uint32_t qh_addr, + + switch (pid) { + case USB_TOKEN_OUT: +- case USB_TOKEN_SETUP: + case USB_TOKEN_IN: + break; ++ case USB_TOKEN_SETUP: ++ /* SETUP is only valid to endpoint 0 */ ++ if (ep_id == 0) { ++ break; ++ } ++ /* fallthrough */ + default: + /* invalid pid : frame interrupted */ + s->status |= UHCI_STS_HCPERR; +@@ -814,7 +820,7 @@ static int uhci_handle_td(UHCIState *s, UHCIQueue *q, uint32_t qh_addr, + return uhci_handle_td_error(s, td, td_addr, USB_RET_NODEV, + int_mask); + } +- ep = usb_ep_get(dev, pid, (td->token >> 15) & 0xf); ++ ep = usb_ep_get(dev, pid, ep_id); + q = uhci_queue_new(s, qh_addr, td, ep); + } + async = uhci_async_alloc(q, td_addr); From patchwork Fri Oct 17 20:38:45 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 72608 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 9E30ECCD195 for ; Fri, 17 Oct 2025 20:39:33 +0000 (UTC) Received: from mail-pf1-f171.google.com (mail-pf1-f171.google.com [209.85.210.171]) by mx.groups.io with SMTP id smtpd.web10.3202.1760733563471431081 for ; Fri, 17 Oct 2025 13:39:23 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20230601.gappssmtp.com header.s=20230601 header.b=nUhfz/kp; spf=softfail (domain: sakoman.com, ip: 209.85.210.171, mailfrom: steve@sakoman.com) Received: by mail-pf1-f171.google.com with SMTP id d2e1a72fcca58-7a226a0798cso851998b3a.2 for ; Fri, 17 Oct 2025 13:39:23 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20230601.gappssmtp.com; s=20230601; t=1760733563; x=1761338363; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=W4l6JnvrucqqF0PS0GbdZA9SQcqcgayzR/qIg9hPXRs=; b=nUhfz/kpF+Ezc0syESQa2iOKixxc5eqBe3k9nXFV3nO4AEJa4pKzIplWWa67UyIwPg idbis05Cz0iUhNa9HjJkub45YTbN6ozofcAyVBlK3Ox1Slnpw/MxMRH38EcAtxmeHdVW qOKex8c7Zj49YkRcsrFnSkeLd4LYH/2tsYcOpKYfuawr1IsTP65QCz+OT29gwOj0U/8m hTT0rzPUl6QccBu9q6G+Tmq3ZIU0X8hpGqPer/kz0ZgMvcGC7cZ/L9y1CVqxIUw4lN+P 1r0RC9MHCO6TJRVoOl6T8cqf4VfR2SdnCpGSd+UynMYUyBGCrYIZJSWuX6tgHAxrXsYp dfsQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1760733563; x=1761338363; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=W4l6JnvrucqqF0PS0GbdZA9SQcqcgayzR/qIg9hPXRs=; b=b0rpBI5u7R1enLTZh8N0Z4dCZngBoVpbb5JteXBDuCJSt7sfhp6eqsZFor7wXm5W6r zeDCoSrdz4EYWLyhC47vSH128HJRZmXuw+jtJL5cQ4Zifg7XRjYdmUNbF6/TfmIcpkSo 5reazfg1Re+9tO0ZaX6FDOWfiErpb0ZrMPJSiEGPpe8rVZObr7VO1ZQ1C+pQiEMoeF43 ptRO2CArjR1/a9HljreyRomfCfKMewYvmWBJGJ2HR9rAKN75BGIVSEoFk4G4o/rBFZrP CVIxG/0QL1ODaOOL7WGiPeUOWR7TEaV0M67liDCHVfBHX/WOPKyXky+TsdKsgYxM3Xdx f99A== X-Gm-Message-State: AOJu0Yzvax3DLAwW/BWbDvJj/8iG0+RFv4hFNOy694K0Tvkh06xpe1Kr 4S9Xw6XMLzvkcqCfBBRt/y+ofcywooDi+06U5nzB8n2d57FILkTVfo0fYaF40+SX/VrTGIPfWMy dLcBn4lk= X-Gm-Gg: ASbGnct7nkXZCjrgEMhg5qLCDFTKwuK2kzAPu83Kxh/18FSOivYXoxn0A1vo0740TF0 EXxfTgw5hzLxzX4Nqpk3yiL6d89+nbL6XEoutWjHYAshfZqUbHznMkIm7N7rj5z+h86mvoTsrJi MGdAvpvcazQAwqaw0Wwzu56Yz0LrrHtHlaLv70De2SMAhCzJjjwGndkyeHfvdhQWR0mzu2Tihaw aZjV6HadGIEq6GUexL93O3eqJ86FLyntSwGXKbCb46YUaFwTipPYxSKuTPezVVEu9FBP4Elxj5s d2zB0bYtyOTTbySqez2AGKMGOsvQH2yHs7+sobQ+EMNNMmjGB/WWiWQdH/wZh5OTtlmaoShxPWr 233uwtf4VX82fsD/b+EDP9dkBN0r6UtQEtBxx5ObXd/ejnPOsmeCXPPw5kQofhxJLHAg7GsgZCf ICcAbzDqL2HKM= X-Google-Smtp-Source: AGHT+IFnUFkB0hB903dHDdBvtMDTkLxbbr6Z/6X1Sphhzbg4ADtqQlEkcc1s2+PCxvX/sLCSau0HoA== X-Received: by 2002:a05:6a00:b8b:b0:781:1562:1f9e with SMTP id d2e1a72fcca58-7a220b25a74mr6605889b3a.32.1760733562632; Fri, 17 Oct 2025 13:39:22 -0700 (PDT) Received: from hexa.. ([2602:feb4:3b:2100:aaee:e640:34cd:6f2]) by smtp.gmail.com with ESMTPSA id d2e1a72fcca58-7a2300f254esm477061b3a.45.2025.10.17.13.39.21 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 17 Oct 2025 13:39:22 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][scarthgap 02/26] python3-xmltodict: fix CVE-2025-9375 Date: Fri, 17 Oct 2025 13:38:45 -0700 Message-ID: <30624cce634cade0b030aa71a03be754abbf3da9.1760733431.git.steve@sakoman.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 17 Oct 2025 20:39:33 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/225036 From: Saravanan Reference: https://nvd.nist.gov/vuln/detail/CVE-2025-9375 https://security-tracker.debian.org/tracker/CVE-2025-9375 https://git.launchpad.net/ubuntu/+source/python-xmltodict/commit/?id=e8110a20e00d80db31d5fc9f8f4577328385d6b6 Upstream-patch: https://github.com/martinblech/xmltodict/commit/ecd456ab88d379514b116ef9293318b74e5ed3ee https://github.com/martinblech/xmltodict/commit/f98c90f071228ed73df997807298e1df4f790c33 Signed-off-by: Saravanan Signed-off-by: Steve Sakoman --- .../python3-xmltodict/CVE-2025-9375-1.patch | 111 +++++++++++ .../python3-xmltodict/CVE-2025-9375-2.patch | 176 ++++++++++++++++++ .../python/python3-xmltodict_0.13.0.bb | 2 + 3 files changed, 289 insertions(+) create mode 100644 meta/recipes-devtools/python/python3-xmltodict/CVE-2025-9375-1.patch create mode 100644 meta/recipes-devtools/python/python3-xmltodict/CVE-2025-9375-2.patch diff --git a/meta/recipes-devtools/python/python3-xmltodict/CVE-2025-9375-1.patch b/meta/recipes-devtools/python/python3-xmltodict/CVE-2025-9375-1.patch new file mode 100644 index 0000000000..e8977dd2ea --- /dev/null +++ b/meta/recipes-devtools/python/python3-xmltodict/CVE-2025-9375-1.patch @@ -0,0 +1,111 @@ +From ecd456ab88d379514b116ef9293318b74e5ed3ee Mon Sep 17 00:00:00 2001 +From: Martin Blech <78768+martinblech@users.noreply.github.com> +Date: Thu, 4 Sep 2025 17:25:39 -0700 +Subject: [PATCH] Prevent XML injection: reject '<'/'>' in element/attr names + (incl. @xmlns) + +* Add tests for tag names, attribute names, and @xmlns prefixes; confirm attr values are escaped. + +CVE: CVE-2025-9375 + +Upstream-Status: Backport +https://github.com/martinblech/xmltodict/commit/ecd456ab88d379514b116ef9293318b74e5ed3ee +https://git.launchpad.net/ubuntu/+source/python-xmltodict/commit/?id=e8110a20e00d80db31d5fc9f8f4577328385d6b6 + +Signed-off-by: Saravanan + +--- + tests/test_dicttoxml.py | 32 ++++++++++++++++++++++++++++++++ + xmltodict.py | 20 +++++++++++++++++++- + 2 files changed, 51 insertions(+), 1 deletion(-) + +Index: python-xmltodict-0.13.0/tests/test_dicttoxml.py +=================================================================== +--- python-xmltodict-0.13.0.orig/tests/test_dicttoxml.py ++++ python-xmltodict-0.13.0/tests/test_dicttoxml.py +@@ -213,3 +213,35 @@ xmlns:b="http://b.com/"> + expected_xml = '\nfalse' + xml = unparse(dict(x=False)) + self.assertEqual(xml, expected_xml) ++ ++ def test_rejects_tag_name_with_angle_brackets(self): ++ # Minimal guard: disallow '<' or '>' to prevent breaking tag context ++ with self.assertRaises(ValueError): ++ unparse({"m>contentcontent2", "#text": "x"}}, full_document=False) ++ # The generated XML should contain escaped '<' and '>' within the attribute value ++ self.assertIn('attr="1<middle>2"', xml) +Index: python-xmltodict-0.13.0/xmltodict.py +=================================================================== +--- python-xmltodict-0.13.0.orig/xmltodict.py ++++ python-xmltodict-0.13.0/xmltodict.py +@@ -379,6 +379,14 @@ def parse(xml_input, encoding=None, expa + return handler.item + + ++def _has_angle_brackets(value): ++ """Return True if value (a str) contains '<' or '>'. ++ ++ Non-string values return False. Uses fast substring checks implemented in C. ++ """ ++ return isinstance(value, str) and ("<" in value or ">" in value) ++ ++ + def _process_namespace(name, namespaces, ns_sep=':', attr_prefix='@'): + if not namespaces: + return name +@@ -412,6 +420,9 @@ def _emit(key, value, content_handler, + if result is None: + return + key, value = result ++ # Minimal validation to avoid breaking out of tag context ++ if _has_angle_brackets(key): ++ raise ValueError('Invalid element name: "<" or ">" not allowed') + if (not hasattr(value, '__iter__') + or isinstance(value, _basestring) + or isinstance(value, dict)): +@@ -445,12 +456,19 @@ def _emit(key, value, content_handler, + attr_prefix) + if ik == '@xmlns' and isinstance(iv, dict): + for k, v in iv.items(): ++ if _has_angle_brackets(k): ++ raise ValueError( ++ 'Invalid attribute name: "<" or ">" not allowed' ++ ) + attr = 'xmlns{}'.format(':{}'.format(k) if k else '') + attrs[attr] = _unicode(v) + continue + if not isinstance(iv, _unicode): + iv = _unicode(iv) +- attrs[ik[len(attr_prefix):]] = iv ++ attr_name = ik[len(attr_prefix) :] ++ if _has_angle_brackets(attr_name): ++ raise ValueError('Invalid attribute name: "<" or ">" not allowed') ++ attrs[attr_name] = iv + continue + children.append((ik, iv)) + if pretty: diff --git a/meta/recipes-devtools/python/python3-xmltodict/CVE-2025-9375-2.patch b/meta/recipes-devtools/python/python3-xmltodict/CVE-2025-9375-2.patch new file mode 100644 index 0000000000..1be22cff6e --- /dev/null +++ b/meta/recipes-devtools/python/python3-xmltodict/CVE-2025-9375-2.patch @@ -0,0 +1,176 @@ +From f98c90f071228ed73df997807298e1df4f790c33 Mon Sep 17 00:00:00 2001 +From: Martin Blech <78768+martinblech@users.noreply.github.com> +Date: Mon, 8 Sep 2025 11:18:33 -0700 +Subject: [PATCH] Enhance unparse() XML name validation with stricter rules and + tests + +Extend existing validation (previously only for "<" and ">") to also +reject element, attribute, and xmlns prefix names that are non-string, +start with "?" or "!", or contain "/", spaces, tabs, or newlines. +Update _emit and namespace handling to use _validate_name. Add tests +covering these new invalid name cases. + +CVE: CVE-2025-9375 + +Upstream-Status: Backport +https://github.com/martinblech/xmltodict/commit/f98c90f071228ed73df997807298e1df4f790c33 +https://git.launchpad.net/ubuntu/+source/python-xmltodict/commit/?id=e8110a20e00d80db31d5fc9f8f4577328385d6b6 + +Signed-off-by: Saravanan + xml = unparse({"a": {"@attr": "12", "#text": "x"}}, full_document=False) + # The generated XML should contain escaped '<' and '>' within the attribute value + self.assertIn('attr="1<middle>2"', xml) ++ ++ def test_rejects_tag_name_starting_with_question(self): ++ with self.assertRaises(ValueError): ++ unparse({"?pi": "data"}, full_document=False) ++ ++ def test_rejects_tag_name_starting_with_bang(self): ++ with self.assertRaises(ValueError): ++ unparse({"!decl": "data"}, full_document=False) ++ ++ def test_rejects_attribute_name_starting_with_question(self): ++ with self.assertRaises(ValueError): ++ unparse({"a": {"@?weird": "x"}}, full_document=False) ++ ++ def test_rejects_attribute_name_starting_with_bang(self): ++ with self.assertRaises(ValueError): ++ unparse({"a": {"@!weird": "x"}}, full_document=False) ++ ++ def test_rejects_xmlns_prefix_starting_with_question_or_bang(self): ++ with self.assertRaises(ValueError): ++ unparse({"a": {"@xmlns": {"?p": "http://e/"}}}, full_document=False) ++ with self.assertRaises(ValueError): ++ unparse({"a": {"@xmlns": {"!p": "http://e/"}}}, full_document=False) ++ ++ def test_rejects_non_string_names(self): ++ class Weird: ++ def __str__(self): ++ return "bad>name" ++ ++ # Non-string element key ++ with self.assertRaises(ValueError): ++ unparse({Weird(): "x"}, full_document=False) ++ # Non-string attribute key ++ with self.assertRaises(ValueError): ++ unparse({"a": {Weird(): "x"}}, full_document=False) ++ ++ def test_rejects_tag_name_with_slash(self): ++ with self.assertRaises(ValueError): ++ unparse({"bad/name": "x"}, full_document=False) ++ ++ def test_rejects_tag_name_with_whitespace(self): ++ for name in ["bad name", "bad\tname", "bad\nname"]: ++ with self.assertRaises(ValueError): ++ unparse({name: "x"}, full_document=False) ++ ++ def test_rejects_attribute_name_with_slash(self): ++ with self.assertRaises(ValueError): ++ unparse({"a": {"@bad/name": "x"}}, full_document=False) ++ ++ def test_rejects_attribute_name_with_whitespace(self): ++ for name in ["@bad name", "@bad\tname", "@bad\nname"]: ++ with self.assertRaises(ValueError): ++ unparse({"a": {name: "x"}}, full_document=False) ++ ++ def test_rejects_xmlns_prefix_with_slash_or_whitespace(self): ++ # Slash ++ with self.assertRaises(ValueError): ++ unparse({"a": {"@xmlns": {"bad/prefix": "http://e/"}}}, full_document=False) ++ # Whitespace ++ with self.assertRaises(ValueError): ++ unparse({"a": {"@xmlns": {"bad prefix": "http://e/"}}}, full_document=False) +Index: python-xmltodict-0.13.0/xmltodict.py +=================================================================== +--- python-xmltodict-0.13.0.orig/xmltodict.py ++++ python-xmltodict-0.13.0/xmltodict.py +@@ -387,7 +387,42 @@ def _has_angle_brackets(value): + return isinstance(value, str) and ("<" in value or ">" in value) + + ++def _has_invalid_name_chars(value): ++ """Return True if value (a str) contains any disallowed name characters. ++ ++ Disallowed: '<', '>', '/', or any whitespace character. ++ Non-string values return False. ++ """ ++ if not isinstance(value, str): ++ return False ++ if "<" in value or ">" in value or "/" in value: ++ return True ++ # Check for any whitespace (spaces, tabs, newlines, etc.) ++ return any(ch.isspace() for ch in value) ++ ++ ++def _validate_name(value, kind): ++ """Validate an element/attribute name for XML safety. ++ ++ Raises ValueError with a specific reason when invalid. ++ ++ kind: 'element' or 'attribute' (used in error messages) ++ """ ++ if not isinstance(value, str): ++ raise ValueError(f"{kind} name must be a string") ++ if value.startswith("?") or value.startswith("!"): ++ raise ValueError(f'Invalid {kind} name: cannot start with "?" or "!"') ++ if "<" in value or ">" in value: ++ raise ValueError(f'Invalid {kind} name: "<" or ">" not allowed') ++ if "/" in value: ++ raise ValueError(f'Invalid {kind} name: "/" not allowed') ++ if any(ch.isspace() for ch in value): ++ raise ValueError(f"Invalid {kind} name: whitespace not allowed") ++ ++ + def _process_namespace(name, namespaces, ns_sep=':', attr_prefix='@'): ++ if not isinstance(name, str): ++ return name + if not namespaces: + return name + try: +@@ -421,8 +456,7 @@ def _emit(key, value, content_handler, + return + key, value = result + # Minimal validation to avoid breaking out of tag context +- if _has_angle_brackets(key): +- raise ValueError('Invalid element name: "<" or ">" not allowed') ++ _validate_name(key, "element") + if (not hasattr(value, '__iter__') + or isinstance(value, _basestring) + or isinstance(value, dict)): +@@ -451,23 +485,19 @@ def _emit(key, value, content_handler, + if ik == cdata_key: + cdata = iv + continue +- if ik.startswith(attr_prefix): ++ if isinstance(ik, str) and ik.startswith(attr_prefix): + ik = _process_namespace(ik, namespaces, namespace_separator, + attr_prefix) + if ik == '@xmlns' and isinstance(iv, dict): + for k, v in iv.items(): +- if _has_angle_brackets(k): +- raise ValueError( +- 'Invalid attribute name: "<" or ">" not allowed' +- ) ++ _validate_name(k, "attribute") + attr = 'xmlns{}'.format(':{}'.format(k) if k else '') + attrs[attr] = _unicode(v) + continue + if not isinstance(iv, _unicode): + iv = _unicode(iv) + attr_name = ik[len(attr_prefix) :] +- if _has_angle_brackets(attr_name): +- raise ValueError('Invalid attribute name: "<" or ">" not allowed') ++ _validate_name(attr_name, "attribute") + attrs[attr_name] = iv + continue + children.append((ik, iv)) diff --git a/meta/recipes-devtools/python/python3-xmltodict_0.13.0.bb b/meta/recipes-devtools/python/python3-xmltodict_0.13.0.bb index e8e275647c..9a308a29d2 100644 --- a/meta/recipes-devtools/python/python3-xmltodict_0.13.0.bb +++ b/meta/recipes-devtools/python/python3-xmltodict_0.13.0.bb @@ -13,6 +13,8 @@ inherit pypi setuptools3 ptest SRC_URI += " \ file://run-ptest \ + file://CVE-2025-9375-1.patch \ + file://CVE-2025-9375-2.patch \ " RDEPENDS:${PN} += " \ From patchwork Fri Oct 17 20:38:46 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 72611 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 9E343CCD1A5 for ; Fri, 17 Oct 2025 20:39:33 +0000 (UTC) Received: from mail-pf1-f172.google.com (mail-pf1-f172.google.com [209.85.210.172]) by mx.groups.io with SMTP id smtpd.web10.3203.1760733565792700695 for ; Fri, 17 Oct 2025 13:39:25 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20230601.gappssmtp.com header.s=20230601 header.b=DJd082Ih; spf=softfail (domain: sakoman.com, ip: 209.85.210.172, mailfrom: steve@sakoman.com) Received: by mail-pf1-f172.google.com with SMTP id d2e1a72fcca58-77f5d497692so3082232b3a.1 for ; Fri, 17 Oct 2025 13:39:25 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20230601.gappssmtp.com; s=20230601; t=1760733565; x=1761338365; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=NFPV9trZYeUPvUNoE77O1pBMgT2Hg6PoRcON2Sho4dQ=; b=DJd082IhEkjOcDmFdApHirTO3CFHesNCYVwTaIY35Lc64EsULc2qlnP7eepTneQDdA M7uwUjFHBUGm6WbzxJ+lTwsQ/dO6dKSyddapPwUg32tsFIPEEZI/Xjte3wCBh0gLt4m7 nNhbQPDu0MNKF/Q3XOJlpJBm9VKDdiaXQdBsFp23vDZ9uoBv9hP6nwowNigfHhGrLJOw 7GTCVMVhGAU+92CtJ5ZVtV38gFYURLChDBhOn0sAzHImDzpbBvAJQL46XpWeS+zP6GSJ 80vtH3NZf1XwOklO1Svxefan+xuoM8FR5/+hVvOwvQILTKwV8I28ZJ9MaGZ7n/dD7EPV 2Vig== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1760733565; x=1761338365; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=NFPV9trZYeUPvUNoE77O1pBMgT2Hg6PoRcON2Sho4dQ=; b=KoOU0yQqfFma4Bjk46CUytB1GzrKiP5vFl8mMTmGMzp/fpWtIqIao0o8Tn9j7ka9m7 AGmKfprJxoOzQQxjspLTZcgunT1V5Ahx9s2JqFF59Ab1P555Sn+A7l7zSQWuKZr99NkG LKqvp4ARB5jNs02thes+23KfY1CoMbnAnQz5mO8ri7SQNHEyZAY15HynYSORCGAgnO2u 2BnG2bc+VvJ/JwXZfkLWDAhXjkDP28ZI0+Hb1xsWYN6sRVJDTZ1xzgmrdAUwwhC8JSlR CQnWAy70MLNL3iAMFX9i96RWac71CQ3qqRJhChADBdOz4stbb5UvUO8S0UV5MO1fV3+J S2Og== X-Gm-Message-State: AOJu0YywGGteesET0tNdU154TThkhmOeK3lfX9+QHN9Rr4AsJxDNe6zs IW0V/HD/IXdba1HHObUdZTdnBdA6beubSa2/FSbCg1Qd46IYFxSq1tMC6oACBLHV4/iO044K+sd vA7hoeGs= X-Gm-Gg: ASbGncsjjKDJFd01BAYKjIpYbzpwaWoRtRq8o5XWVpH5W4B1oFoGyjRoNtkx9EjN/4G 6dLeZ9bh/8hu7Q0Ru3dDUBlZ5o4NHJf7SOlgf+MWjpxmFqLRlWsCKPFsSI3YhdqWIdvLEDzsOdN uB7T3Wu4+xTuUDZ6u4cqn9BS98Qkr8pqgVLW54LA33Zylt0wQIC5Ob3Wg2nZzk1yiyCyaH5SDnz RqJ3+MKS8VRWtKeyW5cVrLx/dlol5ZBIryn8Y3tKrHWkbVUeDWw1RfFslUDodLHtnL6KTi1qjEz 1HYLQnFCdgbAL0d7XdgTpOuxrL5Bhd5H52h/2bgFJF+B7O5Lx1/dt74RWqyO74R3zrVp9kG4m5a 8rPeYhzEkGGFpO1kxah0gBW2Bfeez4k77fUyckTSwe+bUBU95GONHlJv+zanm+e/5zyQiimyfEE PW X-Google-Smtp-Source: AGHT+IFpwCAAYFWWHF7NmW1B87PRhZWA0LeosDOE4vGj/56frZdbQBNfFooNBocEJnHSLtVPoBbd6Q== X-Received: by 2002:a05:6a00:182a:b0:781:8680:3175 with SMTP id d2e1a72fcca58-7a220adb84cmr5044408b3a.21.1760733564982; Fri, 17 Oct 2025 13:39:24 -0700 (PDT) Received: from hexa.. ([2602:feb4:3b:2100:aaee:e640:34cd:6f2]) by smtp.gmail.com with ESMTPSA id d2e1a72fcca58-7a2300f254esm477061b3a.45.2025.10.17.13.39.23 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 17 Oct 2025 13:39:24 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][scarthgap 03/26] binutils: patch CVE-2025-11082 Date: Fri, 17 Oct 2025 13:38:46 -0700 Message-ID: X-Mailer: git-send-email 2.43.0 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 17 Oct 2025 20:39:33 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/225037 From: Peter Marko Pick patch per link in NVD report. Signed-off-by: Peter Marko Signed-off-by: Mathieu Dubois-Briand Signed-off-by: Steve Sakoman --- .../binutils/binutils-2.42.inc | 1 + .../binutils/0024-CVE-2025-11082.patch | 46 +++++++++++++++++++ 2 files changed, 47 insertions(+) create mode 100644 meta/recipes-devtools/binutils/binutils/0024-CVE-2025-11082.patch diff --git a/meta/recipes-devtools/binutils/binutils-2.42.inc b/meta/recipes-devtools/binutils/binutils-2.42.inc index e791cd2b13..a879a1b501 100644 --- a/meta/recipes-devtools/binutils/binutils-2.42.inc +++ b/meta/recipes-devtools/binutils/binutils-2.42.inc @@ -59,5 +59,6 @@ SRC_URI = "\ file://0022-CVE-2025-5244.patch \ file://0023-CVE-2025-7546.patch \ file://0023-CVE-2025-7545.patch \ + file://0024-CVE-2025-11082.patch \ " S = "${WORKDIR}/git" diff --git a/meta/recipes-devtools/binutils/binutils/0024-CVE-2025-11082.patch b/meta/recipes-devtools/binutils/binutils/0024-CVE-2025-11082.patch new file mode 100644 index 0000000000..d712a62bd5 --- /dev/null +++ b/meta/recipes-devtools/binutils/binutils/0024-CVE-2025-11082.patch @@ -0,0 +1,46 @@ +From ea1a0737c7692737a644af0486b71e4a392cbca8 Mon Sep 17 00:00:00 2001 +From: "H.J. Lu" +Date: Mon, 22 Sep 2025 15:20:34 +0800 +Subject: [PATCH] elf: Don't read beyond .eh_frame section size + + PR ld/33464 + * elf-eh-frame.c (_bfd_elf_parse_eh_frame): Don't read beyond + .eh_frame section size. + +Signed-off-by: H.J. Lu + +CVE: CVE-2025-11082 +Upstream-Status: Backport [https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=ea1a0737c7692737a644af0486b71e4a392cbca8] +Signed-off-by: Peter Marko +--- + bfd/elf-eh-frame.c | 8 ++++++-- + 1 file changed, 6 insertions(+), 2 deletions(-) + +diff --git a/bfd/elf-eh-frame.c b/bfd/elf-eh-frame.c +index dc0d2e097f5..30bb313489c 100644 +--- a/bfd/elf-eh-frame.c ++++ b/bfd/elf-eh-frame.c +@@ -734,6 +734,7 @@ _bfd_elf_parse_eh_frame (bfd *abfd, struct bfd_link_info *info, + if (hdr_id == 0) + { + unsigned int initial_insn_length; ++ char *null_byte; + + /* CIE */ + this_inf->cie = 1; +@@ -750,10 +751,13 @@ _bfd_elf_parse_eh_frame (bfd *abfd, struct bfd_link_info *info, + REQUIRE (cie->version == 1 + || cie->version == 3 + || cie->version == 4); +- REQUIRE (strlen ((char *) buf) < sizeof (cie->augmentation)); ++ null_byte = memchr ((char *) buf, 0, end - buf); ++ REQUIRE (null_byte != NULL); ++ REQUIRE ((size_t) (null_byte - (char *) buf) ++ < sizeof (cie->augmentation)); + + strcpy (cie->augmentation, (char *) buf); +- buf = (bfd_byte *) strchr ((char *) buf, '\0') + 1; ++ buf = (bfd_byte *) null_byte + 1; + this_inf->u.cie.aug_str_len = buf - start - 1; + ENSURE_NO_RELOCS (buf); + if (buf[0] == 'e' && buf[1] == 'h') From patchwork Fri Oct 17 20:38:47 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 72610 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id A8716CCD1A4 for ; Fri, 17 Oct 2025 20:39:33 +0000 (UTC) Received: from mail-pf1-f180.google.com (mail-pf1-f180.google.com [209.85.210.180]) by mx.groups.io with SMTP id smtpd.web11.3118.1760733567544738528 for ; Fri, 17 Oct 2025 13:39:27 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20230601.gappssmtp.com header.s=20230601 header.b=ztQIqbCL; spf=softfail (domain: sakoman.com, ip: 209.85.210.180, mailfrom: steve@sakoman.com) Received: by mail-pf1-f180.google.com with SMTP id d2e1a72fcca58-7841da939deso2317373b3a.2 for ; Fri, 17 Oct 2025 13:39:27 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20230601.gappssmtp.com; s=20230601; t=1760733567; x=1761338367; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=tPnhGdIeed6Hid9C/l/2PgDD2UEUdsKRY+8zz6veVOA=; b=ztQIqbCLj/LWWWxjpqPnyGWhq5eNzbEOmj3ldXqTk1ENeheMOM2MWEgiVdtrloO7nR 0tfsLCE4Y44DvxmJ5NRldRh6c+cgEEvt0lSGSpdDBz4shfjq1Ve71e7NPKmA28ov/lC1 YHBC6d41clqMQAcse1tscSlqfSYRtXxkzW23tjIeHpj12MvouEvvgR6DaIgJ3M3NcOWp lSo1jcwS0Ak9aqhSwH+PEDtpuNFwD8SvP9XK4v5shPfpEtOHlV0+AaEPS+eiWsNFY5N3 3bTwoa3Fx/Pw5Wv76i6caJnU2silzTUSf/KNJqPSbeQHQjyUs8NodGkVtF+XNnB+OdCG GItg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1760733567; x=1761338367; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=tPnhGdIeed6Hid9C/l/2PgDD2UEUdsKRY+8zz6veVOA=; b=BLxhaAmmH4vR+nChPuSEIkRZZPpdXIXaC6nl0PFV3YPUXodFT1HkEAL9fFT0TxWKZu dYxlNy8akXXHnfv8rQRzztiV7Gp76XcTmNSYaC3k09/JT4uI9dlQXJFWtbdLZRiWrgNh 3UwLlZrfkUP8r6QxQBCDWOLLJ1zdamSjVYOfYxH2EFaN+QIMaahR30xMEa9UcpIblUSW kYkbMd7xN7ClyT+bM/+0okZf8yHl+bo9lesfhrbHb9NUSZ0sLbTDU7x3pWODKtMRxEOp hrD8jqKd6gsAhPDehgq05yA5a+oModapTx9M09YfXPWv9X8aPmKkepnItl255R4ytaDZ coqA== X-Gm-Message-State: AOJu0YwSxTQQm9nQqujMsSuYJG6ahu54zkMVHdpLhIRerII/UPc1h3hU 3d+acZ/RJZszr/qfUedf3fQqY/XSZ7VsAs+X0SeMrDKCSHIcHTOIELfm5j+V2ihcURxPt0JoS7P F4AHyHIw= X-Gm-Gg: ASbGnct5HkgODlRn4+heMKRzf9khwiukfdRBhkzAlbp/9JoXpPwqPoWw/npwzze+Ms7 ukjl3Sr/UMEyB+sqWK95kSsZ0XdjSkzVZzYQmkuhEgUX8cqdQJD8KOHbT7o8gsrk4u9RZXN3Qxb 5VN0UGuDTjFf0u8jr0BZoYpFdJHDphC0iV+L44vb9SSLdRdHII59YKqqX9gA/pefB63I02zT1nj PA3E5zcUS2owKYJY0yTL5eIdC3C/70jvGNNdp2dJyhMfoQ+Z0IahGlb1/rLakjFo8mLQ3u+zYl9 igP9qpdUvSYI5BCec9NLkphUD1i26UdOkyw7GiKmn84Q4PEG7u0l0edZuwUkZqEpYQAtxPTDi8V Lfc5cW0Gt+WAaMRBlg7OeBoaLt180ySiz3Vtttk9E1Y05A0pafiMY3YqS+1vU3+c5faW5WYZt+p gf X-Google-Smtp-Source: AGHT+IGu9JHupYBaNITdc9TKKMXwbmoHW87WzwUno6TboTKb+SxH1uAItk5ETHoShAOuXeVJlKiQdw== X-Received: by 2002:a05:6a00:9518:b0:782:ec0f:d273 with SMTP id d2e1a72fcca58-7a2208fe6bfmr6148612b3a.1.1760733566781; Fri, 17 Oct 2025 13:39:26 -0700 (PDT) Received: from hexa.. ([2602:feb4:3b:2100:aaee:e640:34cd:6f2]) by smtp.gmail.com with ESMTPSA id d2e1a72fcca58-7a2300f254esm477061b3a.45.2025.10.17.13.39.26 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 17 Oct 2025 13:39:26 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][scarthgap 04/26] binutils: patch CVE-2025-11083 Date: Fri, 17 Oct 2025 13:38:47 -0700 Message-ID: <155a93a0e0ea52316567b0eaea37b8da4c80d7be.1760733431.git.steve@sakoman.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 17 Oct 2025 20:39:33 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/225038 From: Peter Marko Pick patch per link in NVD report. Signed-off-by: Peter Marko Signed-off-by: Mathieu Dubois-Briand Signed-off-by: Steve Sakoman --- .../binutils/binutils-2.42.inc | 1 + .../binutils/0025-CVE-2025-11083.patch | 77 +++++++++++++++++++ 2 files changed, 78 insertions(+) create mode 100644 meta/recipes-devtools/binutils/binutils/0025-CVE-2025-11083.patch diff --git a/meta/recipes-devtools/binutils/binutils-2.42.inc b/meta/recipes-devtools/binutils/binutils-2.42.inc index a879a1b501..3e180b6018 100644 --- a/meta/recipes-devtools/binutils/binutils-2.42.inc +++ b/meta/recipes-devtools/binutils/binutils-2.42.inc @@ -60,5 +60,6 @@ SRC_URI = "\ file://0023-CVE-2025-7546.patch \ file://0023-CVE-2025-7545.patch \ file://0024-CVE-2025-11082.patch \ + file://0025-CVE-2025-11083.patch \ " S = "${WORKDIR}/git" diff --git a/meta/recipes-devtools/binutils/binutils/0025-CVE-2025-11083.patch b/meta/recipes-devtools/binutils/binutils/0025-CVE-2025-11083.patch new file mode 100644 index 0000000000..b51bb5a19d --- /dev/null +++ b/meta/recipes-devtools/binutils/binutils/0025-CVE-2025-11083.patch @@ -0,0 +1,77 @@ +From 9ca499644a21ceb3f946d1c179c38a83be084490 Mon Sep 17 00:00:00 2001 +From: "H.J. Lu" +Date: Thu, 18 Sep 2025 16:59:25 -0700 +Subject: [PATCH] elf: Don't match corrupt section header in linker input + +Don't swap in nor match corrupt section header in linker input to avoid +linker crash later. + + PR ld/33457 + * elfcode.h (elf_swap_shdr_in): Changed to return bool. Return + false for corrupt section header in linker input. + (elf_object_p): Reject if elf_swap_shdr_in returns false. + +Signed-off-by: H.J. Lu + +CVE: CVE-2025-11083 +Upstream-Status: Backport [https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=9ca499644a21ceb3f946d1c179c38a83be084490] +Signed-off-by: Peter Marko +--- + bfd/elfcode.h | 14 +++++++++----- + 1 file changed, 9 insertions(+), 5 deletions(-) + +diff --git a/bfd/elfcode.h b/bfd/elfcode.h +index 9c65852e103..5224a1abee6 100644 +--- a/bfd/elfcode.h ++++ b/bfd/elfcode.h +@@ -311,7 +311,7 @@ elf_swap_ehdr_out (bfd *abfd, + /* Translate an ELF section header table entry in external format into an + ELF section header table entry in internal format. */ + +-static void ++static bool + elf_swap_shdr_in (bfd *abfd, + const Elf_External_Shdr *src, + Elf_Internal_Shdr *dst) +@@ -341,6 +341,9 @@ elf_swap_shdr_in (bfd *abfd, + { + _bfd_error_handler (_("warning: %pB has a section " + "extending past end of file"), abfd); ++ /* PR ld/33457: Don't match corrupt section header. */ ++ if (abfd->is_linker_input) ++ return false; + abfd->read_only = 1; + } + } +@@ -350,6 +353,7 @@ elf_swap_shdr_in (bfd *abfd, + dst->sh_entsize = H_GET_WORD (abfd, src->sh_entsize); + dst->bfd_section = NULL; + dst->contents = NULL; ++ return true; + } + + /* Translate an ELF section header table entry in internal format into an +@@ -642,9 +646,9 @@ elf_object_p (bfd *abfd) + + /* Read the first section header at index 0, and convert to internal + form. */ +- if (bfd_read (&x_shdr, sizeof x_shdr, abfd) != sizeof (x_shdr)) ++ if (bfd_read (&x_shdr, sizeof x_shdr, abfd) != sizeof (x_shdr) ++ || !elf_swap_shdr_in (abfd, &x_shdr, &i_shdr)) + goto got_no_match; +- elf_swap_shdr_in (abfd, &x_shdr, &i_shdr); + + /* If the section count is zero, the actual count is in the first + section header. */ +@@ -730,9 +734,9 @@ elf_object_p (bfd *abfd) + to internal form. */ + for (shindex = 1; shindex < i_ehdrp->e_shnum; shindex++) + { +- if (bfd_read (&x_shdr, sizeof x_shdr, abfd) != sizeof (x_shdr)) ++ if (bfd_read (&x_shdr, sizeof x_shdr, abfd) != sizeof (x_shdr) ++ || !elf_swap_shdr_in (abfd, &x_shdr, i_shdrp + shindex)) + goto got_no_match; +- elf_swap_shdr_in (abfd, &x_shdr, i_shdrp + shindex); + + /* Sanity check sh_link and sh_info. */ + if (i_shdrp[shindex].sh_link >= num_sec) From patchwork Fri Oct 17 20:38:48 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 72609 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id A89B6CCD1AA for ; Fri, 17 Oct 2025 20:39:33 +0000 (UTC) Received: from mail-pf1-f176.google.com (mail-pf1-f176.google.com [209.85.210.176]) by mx.groups.io with SMTP id smtpd.web11.3121.1760733571467092711 for ; Fri, 17 Oct 2025 13:39:31 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20230601.gappssmtp.com header.s=20230601 header.b=mt7OZ0I/; spf=softfail (domain: sakoman.com, ip: 209.85.210.176, mailfrom: steve@sakoman.com) Received: by mail-pf1-f176.google.com with SMTP id d2e1a72fcca58-781010ff051so1833357b3a.0 for ; Fri, 17 Oct 2025 13:39:31 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20230601.gappssmtp.com; s=20230601; t=1760733571; x=1761338371; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=mrGmyQ5G+KuhnL45dCzVpfpOweq1tsqbC8uhGS5lxNI=; b=mt7OZ0I/Oc6JrehH/NHzzxeBxo3p66qmFQtRyTa4oQOJQT9fips4u4xwA+43ipGF2e 17fRNMyi+Cv9+hyaCbderhVLtYS2glzYAFdqH0rdNdyF6BDS6fG/5qZb2oD6jWii9+xN mjaoAJCKQeR8/3uP3abDalkDEqK7w7slDw78gut6F2U0BwrI4Uwi2gTOgL87YI7lZjvl 5hyoKE8+TuwRoiOEUs/5C7LuSBwDbFXCyM5aqsGd/E0rLTfhR/WmDbopUjfEPcHlUw5r ccwbpdlmSE9wsu/A4dh2p4Oynkk39ZxnFkAzPDkwVBuswZWSAHuVgrj394puOOZ/Y0Mm qwqg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1760733571; x=1761338371; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=mrGmyQ5G+KuhnL45dCzVpfpOweq1tsqbC8uhGS5lxNI=; b=U7yC85zjrnUiR7VFzQg3Mcp6EM91BGiRZrMMKH2zf7zDO43KwZujsY9+/8ctdvBqkl SVjOUpNzx9UkQy8uF25R3jnnBffKk6a34P7jmvtwj+1NrAF/ymOygyk1bKOrJjPKMYiX KwUkfVuGrHL1oEL3cKlyqPMHJ6OERpTLVRugiBv4T4g2/0b4Tp3P4GyOEKYXR7xMK5Py tH0IZtG5Vu6M5qraCIIvl7z7Vjeru86y2RZhG1IyMrn40PF9FozSPBo2Q/DNnHnRlwBH GFOc/J7swL5D1Sauk7apM38htgfkB3q71pE7ITQTA48fXEV55o+IgMbp4KTW8TUEfR2p AI3A== X-Gm-Message-State: AOJu0Yw5QzlBOrBoPDhAx83e+845RhY35aRz2K9TE8YrQCk4VS92rIu2 04fxnSm+nn/XrtVYQ2V9ODaWE1ARpgU7cGPcyj0pXCvvqfDR4RFgs7njLpmt1gKde2W+NPgf4kP LAySE39Q= X-Gm-Gg: ASbGncuNLRMIcvtd8N7LEylDyTJpFVdp98H7HZQYQU9/utUp6Ds7Jn6BtrqG3f6bx7x R50dQJ+tMN2WNlOJrMVIdtoZi7CHQyGHYauvOpIhZ84G8nqcjrJkCwsFs9P/TYTbC+MJ9zpmuSe nay6TANqtCvTNzGToPBmhkyRERkKoEMPag9f8lCXDpuhu++t7V3vEDHsI8ngOcx+i/UPR/Vd7O8 qNvclqR+t61Ddp6uC9BKgVAOwedIi5vra4Fd9JTfXRFeKsH3rVKYIKur5kHvjjbGttd8ccHfswc +3ay6QODYgw9qEPfXq+B3S1s4F1lwnKNAt0uvxa0A1idx0sPjYKMGn3AlCYWnDNNCuWl+UHAwVc RDmEGJFTEqw5sP+TxsTrHCJGgqgzY6WthxVRS6i2swWKztdQC4dMF30lE30M4SRSp44WE6mQwnm oS X-Google-Smtp-Source: AGHT+IHArZEskPcy8QOT0Fy/X8iwYdk35eUFvHZccIcm2+Uicl0RQKz9VS7wu6IRUIZkADXEMjt3Vw== X-Received: by 2002:a05:6a00:2d8d:b0:781:187f:48d1 with SMTP id d2e1a72fcca58-7a220a58497mr6289120b3a.1.1760733570661; Fri, 17 Oct 2025 13:39:30 -0700 (PDT) Received: from hexa.. ([2602:feb4:3b:2100:aaee:e640:34cd:6f2]) by smtp.gmail.com with ESMTPSA id d2e1a72fcca58-7a2300f254esm477061b3a.45.2025.10.17.13.39.30 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 17 Oct 2025 13:39:30 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][scarthgap 05/26] gnupg: mark CVE-2025-30258 as patched Date: Fri, 17 Oct 2025 13:38:48 -0700 Message-ID: <88fe1eaa4bcd7c838902d8cdc067276c5f32624d.1760733431.git.steve@sakoman.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 17 Oct 2025 20:39:33 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/225039 From: Peter Marko Per NVD report [1] this CVE is fixed by [2]. This commit was backported to 2.4.8 via [3]. [1] https://nvd.nist.gov/vuln/detail/CVE-2025-30258 [2] https://dev.gnupg.org/rG48978ccb4e20866472ef18436a32744350a65158 [3] https://gitlab.com/freepg/gnupg/-/commit/da0164efc7f32013bc24d97b9afa9f8d67c318bb Signed-off-by: Peter Marko Signed-off-by: Steve Sakoman --- meta/recipes-support/gnupg/gnupg_2.4.8.bb | 1 + 1 file changed, 1 insertion(+) diff --git a/meta/recipes-support/gnupg/gnupg_2.4.8.bb b/meta/recipes-support/gnupg/gnupg_2.4.8.bb index 9c5de263c5..a6e777abf8 100644 --- a/meta/recipes-support/gnupg/gnupg_2.4.8.bb +++ b/meta/recipes-support/gnupg/gnupg_2.4.8.bb @@ -82,3 +82,4 @@ BBCLASSEXTEND = "native nativesdk" lcl_maybe_fortify:mipsarch = "" CVE_STATUS[CVE-2022-3219] = "upstream-wontfix: Upstream doesn't seem to be keen on merging the proposed commit - https://dev.gnupg.org/T5993" +CVE_STATUS[CVE-2025-30258] = "cpe-stable-backport: fir for this CVE was backported to version 2.4.8" From patchwork Fri Oct 17 20:38:49 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 72607 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 96E28CCD199 for ; Fri, 17 Oct 2025 20:39:33 +0000 (UTC) Received: from mail-pf1-f181.google.com (mail-pf1-f181.google.com [209.85.210.181]) by mx.groups.io with SMTP id smtpd.web10.3207.1760733572895506808 for ; Fri, 17 Oct 2025 13:39:32 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20230601.gappssmtp.com header.s=20230601 header.b=con+CebP; spf=softfail (domain: sakoman.com, ip: 209.85.210.181, mailfrom: steve@sakoman.com) Received: by mail-pf1-f181.google.com with SMTP id d2e1a72fcca58-78f3bfe3f69so2188008b3a.2 for ; Fri, 17 Oct 2025 13:39:32 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20230601.gappssmtp.com; s=20230601; t=1760733572; x=1761338372; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=4yZuZgiAXnIxebgTk1XanzxHN1DhYNcYS9azwmXa86A=; b=con+CebPF73VpJsSPFwCX0EhYv9ZzXYN1vPnsRfaL3iNYGOY271Hs1n/vDvXQdcwPL FxrVquAAW8y1QAgLUfaw7tvHU4VA7J3PuTkP6l9XTXOSxkHzcChHEhGpYH2mgUKcBqRb AppteYRtB4uRSGUwwEQ5AtOrdYRYgHH/fYM9vtZSiPNCKlUE1fRn5ozQ+lLEXDI7Ruow dIRZdLXfkxkQPHzkOSYgybxMHp13q3itY9kpAONEB1VcfrEuax9J0S+cb9yHE4RfzwTE tTZl6vu0O8AxKGf6KFYnM7GeXJuVhg859csBezV7+3swZ94jqwgfy51507r6bhlI9SVm bWwQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1760733572; x=1761338372; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=4yZuZgiAXnIxebgTk1XanzxHN1DhYNcYS9azwmXa86A=; b=F3BhoOX78Urk7xKJdD+oyz8YovsK3Npsn40s8E1smB3Bcl58sEK+5d/Og0X69zsOL6 kGEmTEuFVF5x+wE98rabBCZfgNMs03QuLmMrTFbQ3tZZpZsLLzsW98OEa2J1EGeIbSmi 4xK+Hz0UOf7Ob2AQteK6az/RpY6CEKqis7ql3b5uFYst4yM094CbL5L1+DHpgoTkM0yW tVSagj15MPbmUuLjEWNJBtUdROutdN9bD6eE3YZY/o3/RRHr9+oYYFSez0K8ycPFeoBb MbDnXi4KOrAc76AC+1Lva++dGdq81lyrwXBKaZFGC9v2K/TkbQkWg8DkxEkNmOst15Va 1w8A== X-Gm-Message-State: AOJu0YzdssH+i8DCKUjJUkZvXq7HWklEb1z89vG2V+Qnk9g1WJkckyzD CHzYjEMkUhDEdoGJCPhNoTNlBsBFU7tWZzDrkRjd7pgrHDYV/cVmkIvHzw3agC9Duvo5CZU8K/M HW2ctaRY= X-Gm-Gg: ASbGncs+nPbGPBobgIFUYjmX/+UtrDNzK8DV3DIm5QKkPZytoqCJbxUS78Lpw5akVlA U+DIohjUer9+c6tDlR72GsC5NGtTqOwehU8EpzSyw2Dlvr3syFwSl2OUZg23fU2xKvyzZeXkM1+ HG1sZZknNjKt+NF/QRka1jjiEZXkfCTrV1YACmzoFhACYiSXC9xrLKpfl+dsqdKAa8B0fL1c0Sb 84H0TbmYWL6G4ZssVeRXFMCAWUUtiCeGXYKmwpSC4ajmORyimMl1cBxASyB0YMU+66mczBc5s4i YDaqJMmQ9lqwY59RlTt2GBcG785Onzs6/dRGIF/lDzwWpc49Gt3GqIEBv+bCwWTdtc/GVeiUikf StdS+6RgF0N2Qf/2yo4FYWz1ZTSy0zbG7q9JriaRndRACVQXSNudg2fGJDDoBKFJbtjai4VVnFl ju X-Google-Smtp-Source: AGHT+IH929wBqM8eB8GFV3RQI8ORF1D4zn4UCKEHa19Y9L2MLtgI1wpwCXr6Uv3MTbNA7yRKACMcAw== X-Received: by 2002:a05:6a20:244b:b0:334:7e45:e6b0 with SMTP id adf61e73a8af0-334a86142ecmr6120810637.50.1760733572116; Fri, 17 Oct 2025 13:39:32 -0700 (PDT) Received: from hexa.. ([2602:feb4:3b:2100:aaee:e640:34cd:6f2]) by smtp.gmail.com with ESMTPSA id d2e1a72fcca58-7a2300f254esm477061b3a.45.2025.10.17.13.39.31 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 17 Oct 2025 13:39:31 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][scarthgap 06/26] glib-networking: fix CVE-2025-60018 Date: Fri, 17 Oct 2025 13:38:49 -0700 Message-ID: X-Mailer: git-send-email 2.43.0 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 17 Oct 2025 20:39:33 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/225040 From: Rajeshkumar Ramasamy glib-networking's OpenSSL backend fails to properly check the return value of a call to BIO_write(), resulting in an out of bounds read. Reference: https://nvd.nist.gov/vuln/detail/CVE-2025-60018 Upstream-patch: https://gitlab.gnome.org/GNOME/glib-networking/-/commit/4dd540505d40babe488404f3174ec39f49a84485 Signed-off-by: Rajeshkumar Ramasamy Signed-off-by: Steve Sakoman --- .../glib-networking/CVE-2025-60018.patch | 83 +++++++++++++++++++ .../glib-networking/glib-networking_2.78.1.bb | 1 + 2 files changed, 84 insertions(+) create mode 100644 meta/recipes-core/glib-networking/glib-networking/CVE-2025-60018.patch diff --git a/meta/recipes-core/glib-networking/glib-networking/CVE-2025-60018.patch b/meta/recipes-core/glib-networking/glib-networking/CVE-2025-60018.patch new file mode 100644 index 0000000000..4ccf1cd43b --- /dev/null +++ b/meta/recipes-core/glib-networking/glib-networking/CVE-2025-60018.patch @@ -0,0 +1,83 @@ +From 4dd540505d40babe488404f3174ec39f49a84485 Mon Sep 17 00:00:00 2001 +From: Michael Catanzaro +Date: Mon, 4 Aug 2025 15:10:21 -0500 +Subject: [PATCH] openssl: properly check return value when writing to BIO + objects + +In particular, we will read out of bounds, and then write the invalid +memory, if BIO_write() fails when getting the PROP_CERTIFICATE_PEM +property. Here we attempt to check the return value, but the check is +not correct. + +This also fixes a leak of the BIO in the same place. + +Also add error checking to PROP_SUBJECT_NAME and PROP_ISSUER_NAME, for +good measure. + +Fixes #226 + +CVE: CVE-2025-60018 + +Upstream-Status: Backport [https://gitlab.gnome.org/GNOME/glib-networking/-/commit/4dd540505d40babe488404f3174ec39f49a84485] + +Signed-off-by: Rajeshkumar Ramasamy +--- + tls/openssl/gtlscertificate-openssl.c | 25 +++++++++++++++---------- + 1 file changed, 15 insertions(+), 10 deletions(-) + +diff --git a/tls/openssl/gtlscertificate-openssl.c b/tls/openssl/gtlscertificate-openssl.c +index 648f3e8..b536559 100644 +--- a/tls/openssl/gtlscertificate-openssl.c ++++ b/tls/openssl/gtlscertificate-openssl.c +@@ -362,15 +362,12 @@ g_tls_certificate_openssl_get_property (GObject *object, + case PROP_CERTIFICATE_PEM: + bio = BIO_new (BIO_s_mem ()); + +- if (!PEM_write_bio_X509 (bio, openssl->cert) || !BIO_write (bio, "\0", 1)) +- certificate_pem = NULL; +- else ++ if (PEM_write_bio_X509 (bio, openssl->cert) == 1 && BIO_write (bio, "\0", 1) == 1) + { + BIO_get_mem_data (bio, &certificate_pem); + g_value_set_string (value, certificate_pem); +- +- BIO_free_all (bio); + } ++ BIO_free_all (bio); + break; + + case PROP_PRIVATE_KEY: +@@ -411,8 +408,12 @@ g_tls_certificate_openssl_get_property (GObject *object, + case PROP_SUBJECT_NAME: + bio = BIO_new (BIO_s_mem ()); + name = X509_get_subject_name (openssl->cert); +- X509_NAME_print_ex (bio, name, 0, XN_FLAG_SEP_COMMA_PLUS); +- BIO_write (bio, "\0", 1); ++ if (X509_NAME_print_ex (bio, name, 0, XN_FLAG_SEP_COMMA_PLUS) < 0 || ++ BIO_write (bio, "\0", 1) != 1) ++ { ++ BIO_free_all (bio); ++ break; ++ } + BIO_get_mem_data (bio, (char **)&name_string); + g_value_set_string (value, name_string); + BIO_free_all (bio); +@@ -421,9 +422,13 @@ g_tls_certificate_openssl_get_property (GObject *object, + case PROP_ISSUER_NAME: + bio = BIO_new (BIO_s_mem ()); + name = X509_get_issuer_name (openssl->cert); +- X509_NAME_print_ex (bio, name, 0, XN_FLAG_SEP_COMMA_PLUS); +- BIO_write (bio, "\0", 1); +- BIO_get_mem_data (bio, &name_string); ++ if (X509_NAME_print_ex (bio, name, 0, XN_FLAG_SEP_COMMA_PLUS) < 0 || ++ BIO_write (bio, "\0", 1) != 1) ++ { ++ BIO_free_all (bio); ++ break; ++ } ++ BIO_get_mem_data (bio, (char **)&name_string); + g_value_set_string (value, name_string); + BIO_free_all (bio); + break; +-- +2.48.1 diff --git a/meta/recipes-core/glib-networking/glib-networking_2.78.1.bb b/meta/recipes-core/glib-networking/glib-networking_2.78.1.bb index 5060d9fd7a..22ca90724f 100644 --- a/meta/recipes-core/glib-networking/glib-networking_2.78.1.bb +++ b/meta/recipes-core/glib-networking/glib-networking_2.78.1.bb @@ -31,6 +31,7 @@ inherit gnomebase gettext upstream-version-is-even gio-module-cache ptest-gnome SRC_URI += "file://run-ptest" SRC_URI += "file://eagain.patch" +SRC_URI += "file://CVE-2025-60018.patch" FILES:${PN} += "\ ${libdir}/gio/modules/libgio*.so \ From patchwork Fri Oct 17 20:38:50 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 72612 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id B22F8CCD195 for ; Fri, 17 Oct 2025 20:39:43 +0000 (UTC) Received: from mail-pf1-f174.google.com (mail-pf1-f174.google.com [209.85.210.174]) by mx.groups.io with SMTP id smtpd.web10.3208.1760733574410337302 for ; Fri, 17 Oct 2025 13:39:34 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20230601.gappssmtp.com header.s=20230601 header.b=W/wFj/A7; spf=softfail (domain: sakoman.com, ip: 209.85.210.174, mailfrom: steve@sakoman.com) Received: by mail-pf1-f174.google.com with SMTP id d2e1a72fcca58-78af743c232so2088208b3a.1 for ; Fri, 17 Oct 2025 13:39:34 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20230601.gappssmtp.com; s=20230601; t=1760733574; x=1761338374; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=nRPdh5jZISVP+aUEjIk9+g4/1gbiRHqNwxYNXPBfSGE=; b=W/wFj/A7Jn2boVQbMJJWlF2hKg4JDIs+7lSy0v01l8k0x0JalXgLy8igWc5E8bSx4L 7X0LZcpHRFrFYY9Hs9JGvT/OkiZAYzxymB9zf673rGqJND5d+gwzugietk4YM3m35gJu loOXNfaZMoFyvKOwKCDC+i7jF8PEukZTaWqpkDuTQotqnReL5wUTJPqGb/Dj5Yuu3ylA CnitQ87H0ROkBJvqc0BtO4gM5xhMkC2SHHZAbsmmnHoGB1oR4R+962jmdq4afzpcVTl6 J6i6LmHvo3jo8hnyJlJCMuDPVD85rSFggRDDSO7uyAi9y1cV9bGskvhGsfxCDLoHt00E BdBA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1760733574; x=1761338374; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=nRPdh5jZISVP+aUEjIk9+g4/1gbiRHqNwxYNXPBfSGE=; b=MeWhpoQcvKZgNV53RDXGX9vNe/aNLlG30Bo70z4bZCiJ1e8lkgzoYgPkl7tpBRAzk/ u4kD6XPraj+dkkemNkD+3vdEaEKFCgDmfn2ocNxqmOPNDuUeHXgaAP4wNXgnaVqXNt1e 17PGqTVdPm3evloAijUudx9f7RMR9B7GCPBMRc+IJE+H4fDputXE94J6EZq4YUh2Eibd QCSCTwQAzOkIzzua0gQ2OvSaBRrPmC90Ck1ZAq8H6ZJCe4N1a1Rb1HBtZOfaxa49PEmP yINY+CF09W+IozRtpgNOot5OPiaqEAAYDhjJwOP4MEu2wC6nfRRgu9tHFCYUInSiW25n paiQ== X-Gm-Message-State: AOJu0Yzdw9YIFynFAj0n8SMRpFaIuRmekNlBa9eLfq2GRpUiEaFXhVlW vtPXRQc9T7Jrnpe5VgTRrZmf+d9s8jw96jXLgVoC4T0Z2WC46d0dGSIWILNgUS071VQsyKjYBGH Bia6M2L4= X-Gm-Gg: ASbGncsNHLbqYI4TE/ZWlnZHZ4iCkRZFdgKl7X6ptJcuAamy8aYQ3xpPxRFkcNR1rTB bv3Buztf3NTiGqi6zWx1gG2TsCfz+Nlsn8Wwjw8gKXIVvNAk5B2oC1BScmuEcitgag4Gf3uL+op Lsh2cnzVKIsn0ZnZUAUTIEH7YsLQeFthFX9gbrlzuflVmahFOdyyyIEhx0NUfzf1cGU2KSOMR4e 03+/zmN6IhBlOMqTYku3F5OnuI8vTKXhXHI6H1Sl6njr3W+G1WuOryBHyLA74Pi4uxNU794NEyd 5+b5I6h233NNRFqzs0mHwBl/+cHHgeguf1Vu3C3XleKZUj05J1KrP7MWELJw+zA7hvI6iFiufpn bYZpmVndJ5ypK3jUDZClZAcIZ4KFixvEb929xu/T4GLo3mkL6/PxXeJL4jfc70JZY3g== X-Google-Smtp-Source: AGHT+IEjqpI1+hZggmbC7cc5muH9H294YcRWAXFSQ/YKsBzycLuKFU5HsoJ4HvAioO6ac8G2Nnq0tg== X-Received: by 2002:a05:6a00:2182:b0:781:17fb:d3ca with SMTP id d2e1a72fcca58-7a220ab5260mr7370278b3a.15.1760733573671; Fri, 17 Oct 2025 13:39:33 -0700 (PDT) Received: from hexa.. ([2602:feb4:3b:2100:aaee:e640:34cd:6f2]) by smtp.gmail.com with ESMTPSA id d2e1a72fcca58-7a2300f254esm477061b3a.45.2025.10.17.13.39.33 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 17 Oct 2025 13:39:33 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][scarthgap 07/26] openssh: fix CVE-2025-61985 Date: Fri, 17 Oct 2025 13:38:50 -0700 Message-ID: <52d925423b826383d12a97b834475ab5699fd492.1760733431.git.steve@sakoman.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 17 Oct 2025 20:39:43 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/225041 From: David Nyström ssh in OpenSSH before 10.1 allows the '\0' character in an ssh:// URI, potentially leading to code execution when a ProxyCommand is used. Reference: https://nvd.nist.gov/vuln/detail/CVE-2025-61985 Upstream patch: https://github.com/openssh/openssh-portable/commit/43b3bff47bb029f2299bacb6a36057981b39fdb0 Signed-off-by: David Nyström Signed-off-by: Steve Sakoman --- .../openssh/openssh/CVE-2025-61985.patch | 47 +++++++++++++++++++ .../openssh/openssh_9.6p1.bb | 1 + 2 files changed, 48 insertions(+) create mode 100644 meta/recipes-connectivity/openssh/openssh/CVE-2025-61985.patch diff --git a/meta/recipes-connectivity/openssh/openssh/CVE-2025-61985.patch b/meta/recipes-connectivity/openssh/openssh/CVE-2025-61985.patch new file mode 100644 index 0000000000..9f4de0ed56 --- /dev/null +++ b/meta/recipes-connectivity/openssh/openssh/CVE-2025-61985.patch @@ -0,0 +1,47 @@ +From 54928cb9eaa7143ff17f463efa7ed3109afdbf30 Mon Sep 17 00:00:00 2001 +From: "djm@openbsd.org" +Date: Thu, 4 Sep 2025 00:30:06 +0000 +Subject: [PATCH] upstream: don't allow \0 characters in url-encoded strings. +MIME-Version: 1.0 +Content-Type: text/plain; charset=UTF-8 +Content-Transfer-Encoding: 8bit + +Suggested by David Leadbeater, ok deraadt@ + +OpenBSD-Commit-ID: c92196cef0f970ceabc1e8007a80b01e9b7cd49c + +Upstream-Status: Backport [Upstream commit https://github.com/openssh/openssh-portable/commit/43b3bff47bb029f2299bacb6a36057981b39fdb0] +CVE: CVE-2025-61985 +Signed-off-by: David Nyström +--- + misc.c | 5 +++-- + 1 file changed, 3 insertions(+), 2 deletions(-) + +diff --git a/misc.c b/misc.c +index 3db2e4d0b..cac246b63 100644 +--- a/misc.c ++++ b/misc.c +@@ -955,7 +955,7 @@ urldecode(const char *src) + size_t srclen; + + if ((srclen = strlen(src)) >= SIZE_MAX) +- fatal_f("input too large"); ++ return NULL; + ret = xmalloc(srclen + 1); + for (dst = ret; *src != '\0'; src++) { + switch (*src) { +@@ -963,9 +963,10 @@ urldecode(const char *src) + *dst++ = ' '; + break; + case '%': ++ /* note: don't allow \0 characters */ + if (!isxdigit((unsigned char)src[1]) || + !isxdigit((unsigned char)src[2]) || +- (ch = hexchar(src + 1)) == -1) { ++ (ch = hexchar(src + 1)) == -1 || ch == 0) { + free(ret); + return NULL; + } +-- +2.44.1 + diff --git a/meta/recipes-connectivity/openssh/openssh_9.6p1.bb b/meta/recipes-connectivity/openssh/openssh_9.6p1.bb index afcd50c7e6..bdb8a1599b 100644 --- a/meta/recipes-connectivity/openssh/openssh_9.6p1.bb +++ b/meta/recipes-connectivity/openssh/openssh_9.6p1.bb @@ -32,6 +32,7 @@ SRC_URI = "http://ftp.openbsd.org/pub/OpenBSD/OpenSSH/portable/openssh-${PV}.tar file://CVE-2025-26466.patch \ file://CVE-2025-26465.patch \ file://CVE-2025-32728.patch \ + file://CVE-2025-61985.patch \ " SRC_URI[sha256sum] = "910211c07255a8c5ad654391b40ee59800710dd8119dd5362de09385aa7a777c" From patchwork Fri Oct 17 20:38:51 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 72613 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id B2331CCD1A4 for ; Fri, 17 Oct 2025 20:39:43 +0000 (UTC) Received: from mail-pf1-f170.google.com (mail-pf1-f170.google.com [209.85.210.170]) by mx.groups.io with SMTP id smtpd.web11.3123.1760733576527625863 for ; Fri, 17 Oct 2025 13:39:36 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20230601.gappssmtp.com header.s=20230601 header.b=pxQeNIkD; spf=softfail (domain: sakoman.com, ip: 209.85.210.170, mailfrom: steve@sakoman.com) Received: by mail-pf1-f170.google.com with SMTP id d2e1a72fcca58-76e4fc419a9so2429476b3a.0 for ; Fri, 17 Oct 2025 13:39:36 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20230601.gappssmtp.com; s=20230601; t=1760733576; x=1761338376; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=2zDgawpPAavs3NmSyipQJwxq4H7zzxmRbs1axoU6Z+g=; b=pxQeNIkDzCNSjteOEK92NxxsszJZqMje5VH7N1+2hM6G7+GwWRJkOtr7JeL4bYda06 f6WKrCoXDlNXCMRskK+4yHwk34FkmSaa+X10fbSaALfokkSOHXTNrXJ06me7wZnlpbkl 4rTVlxZQpf5ceyccES8iOy03A32zfCEjDPbKHno9G58qm04MklwM0MQUFU0PTJ1sX/fV v4pFzONkbQwJpToPlZjV0KoyGHVwwSl23C7lregghCotexrlBnHFEV0emr2xbpfi6kpN 7Uy6V9DoIh257tYSdj5bPK2t9G6KQUK/Svhhtfzk0bHeRXQWt9a0MjmUx4Fq4/6fQp81 pQ4Q== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1760733576; x=1761338376; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=2zDgawpPAavs3NmSyipQJwxq4H7zzxmRbs1axoU6Z+g=; b=vTKbCbXdwmp+JGaSQcwv9Edfhcxuo0yufT5Yxa1zSPs6hcvnZExahvbzrJM9Rejj5N oudC3GQ2Rjv1jnD9AfbtoJ2RwxwxanJYC2trnYLJ/fBOABNwhmIoeONEGdMVs5jwMtvT 3W//55AwS2ikGYy2XGSJzE0IF3R1qtyQ6q4UsJbaRfvzkleyNhWyn8FVRtNv9hk1B2Wi Fh5czgowSAlR1y0Mg9B75RSVPBEImaN4lDOIP+7wbJKhtpcMBXznMQBxB0AFY/EMYRdg ySTyWqxvMz7832U+MOh9gos6ObeebkYPhcKZbq52vrcGelEa+cCJkIprtYuCsJh+cceq ZiiQ== X-Gm-Message-State: AOJu0YwnuOlr33t6KdAFOeT1vCSAa1YauJJZbwNSGmvp0AAhEJnT2kAn ckPFYWpwqRd0yy6QBE94h4PYRPgP9A9fscIaNP92Qe4ns1IvXJxhyZvv+Vfo5LWefaxIQWqwwCa bh9zgQ2o= X-Gm-Gg: ASbGncuyQ7czQrI8lK2Pb5m+ijSigUOd+ubD3F4OSmJFowdDKohTaVtjwotM4+mPuPX ZuRuno1OJPiT1AivjKrm/Ztig9k6ya4pcGfN+zsqQ6BjsOzc0MhuX/tGjY7v19oBt0/qofeyAlR 5qw1yAI65PjFJ0t222A/A7dZCu+r+RNvrOgme/2FJmabsMpLzVxD2Kfg+38sGdS/rNxQkDyKfDp G2AoriwWuffZWh+iVa6RZqGLada7w85EPMqdClNgzPwGFN7hs0RJ7oUlvngVLw7aNgo7Q31DrgK ROjCRmvvCCi/mhbZMShBxsnGrYb9fIZHlX4PzvH6mJJXALUYHicNghdbWmgh6FmFLKUm7SOzD7R lqMrT8zC4qiPln52v72SycnEzJ71xL7HlDaz2AIIQkvcnTqJ6uMWLMHfuzqWwjfXGVA== X-Google-Smtp-Source: AGHT+IHNobb8DW+i11th+FOSlM4IqG76bP/S4f+d/T2IKqv55vP3Ahid40iURn9Wxt/JqT4jLOmTsg== X-Received: by 2002:a05:6a00:2d01:b0:774:615b:c8ad with SMTP id d2e1a72fcca58-7a220a4a54bmr5713507b3a.9.1760733575664; Fri, 17 Oct 2025 13:39:35 -0700 (PDT) Received: from hexa.. ([2602:feb4:3b:2100:aaee:e640:34cd:6f2]) by smtp.gmail.com with ESMTPSA id d2e1a72fcca58-7a2300f254esm477061b3a.45.2025.10.17.13.39.34 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 17 Oct 2025 13:39:35 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][scarthgap 08/26] openssh: fix CVE-2025-61984 Date: Fri, 17 Oct 2025 13:38:51 -0700 Message-ID: <717d4c7609cdce2cc3a65b7ba69c316fa86a9333.1760733431.git.steve@sakoman.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 17 Oct 2025 20:39:43 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/225042 From: David Nyström ssh in OpenSSH before 10.1 allows control characters in usernames that originate from certain possibly untrusted sources, potentially leading to code execution when a ProxyCommand is used. The untrusted sources are the command line and %-sequence expansion of a configuration file. Note: openssh does not support variable expansion until 10.0, so backport adapts for this. Reference: https://nvd.nist.gov/vuln/detail/CVE-2025-61984 Upstream patch: https://github.com/openssh/openssh-portable/commit/35d5917652106aede47621bb3f64044604164043 Signed-off-by: David Nyström Signed-off-by: Steve Sakoman --- .../openssh/openssh/CVE-2025-61984.patch | 125 ++++++++++++++++++ .../openssh/openssh_9.6p1.bb | 1 + 2 files changed, 126 insertions(+) create mode 100644 meta/recipes-connectivity/openssh/openssh/CVE-2025-61984.patch diff --git a/meta/recipes-connectivity/openssh/openssh/CVE-2025-61984.patch b/meta/recipes-connectivity/openssh/openssh/CVE-2025-61984.patch new file mode 100644 index 0000000000..f705410b24 --- /dev/null +++ b/meta/recipes-connectivity/openssh/openssh/CVE-2025-61984.patch @@ -0,0 +1,125 @@ +From d45e13c956b296bf933901c4da2b61eb2ccd7582 Mon Sep 17 00:00:00 2001 +From: "djm@openbsd.org" +Date: Thu, 4 Sep 2025 00:29:09 +0000 +Subject: [PATCH] upstream: Improve rules for %-expansion of username. +MIME-Version: 1.0 +Content-Type: text/plain; charset=UTF-8 +Content-Transfer-Encoding: 8bit + +Usernames passed on the commandline will no longer be subject to +% expansion. Some tools invoke ssh with connection information +(i.e. usernames and host names) supplied from untrusted sources. +These may contain % expansion sequences which could yield +unexpected results. + +Since openssh-9.6, all usernames have been subject to validity +checking. This change tightens the validity checks by refusing +usernames that include control characters (again, these can cause +surprises when supplied adversarially). + +This change also relaxes the validity checks in one small way: +usernames supplied via the configuration file as literals (i.e. +include no % expansion characters) are not subject to these +validity checks. This allows usernames that contain arbitrary +characters to be used, but only via configuration files. This +is done on the basis that ssh's configuration is trusted. + +Pointed out by David Leadbeater, ok deraadt@ + +OpenBSD-Commit-ID: e2f0c871fbe664aba30607321575e7c7fc798362 + +Slightly modified since variable expansion of user names was +first released in 10.0, commit bd30cf784d6e8" + +Upstream-Status: Backport [Upstream commit https://github.com/openssh/openssh-portable/commit/35d5917652106aede47621bb3f64044604164043] +CVE: CVE-2025-61984 +Signed-off-by: David Nyström +--- + ssh.c | 26 +++++++++++++++++++++++--- + 1 file changed, 23 insertions(+), 3 deletions(-) + +diff --git a/ssh.c b/ssh.c +index 48d93ddf2..9c49f98a8 100644 +--- a/ssh.c ++++ b/ssh.c +@@ -649,6 +649,8 @@ valid_ruser(const char *s) + if (*s == '-') + return 0; + for (i = 0; s[i] != 0; i++) { ++ if (iscntrl((u_char)s[i])) ++ return 0; + if (strchr("'`\";&<>|(){}", s[i]) != NULL) + return 0; + /* Disallow '-' after whitespace */ +@@ -671,6 +673,7 @@ main(int ac, char **av) + int i, r, opt, exit_status, use_syslog, direct, timeout_ms; + int was_addr, config_test = 0, opt_terminated = 0, want_final_pass = 0; + char *p, *cp, *line, *argv0, *logfile; ++ int user_on_commandline = 0, user_was_default = 0; + char cname[NI_MAXHOST], thishost[NI_MAXHOST]; + struct stat st; + struct passwd *pw; +@@ -1016,8 +1019,10 @@ main(int ac, char **av) + } + break; + case 'l': +- if (options.user == NULL) ++ if (options.user == NULL) { + options.user = optarg; ++ user_on_commandline = 1; ++ } + break; + + case 'L': +@@ -1120,6 +1125,7 @@ main(int ac, char **av) + if (options.user == NULL) { + options.user = tuser; + tuser = NULL; ++ user_on_commandline = 1; + } + free(tuser); + if (options.port == -1 && tport != -1) +@@ -1134,6 +1140,7 @@ main(int ac, char **av) + if (options.user == NULL) { + options.user = p; + p = NULL; ++ user_on_commandline = 1; + } + *cp++ = '\0'; + host = xstrdup(cp); +@@ -1288,8 +1295,10 @@ main(int ac, char **av) + if (fill_default_options(&options) != 0) + cleanup_exit(255); + +- if (options.user == NULL) ++ if (options.user == NULL) { ++ user_was_default = 1; + options.user = xstrdup(pw->pw_name); ++ } + + /* + * If ProxyJump option specified, then construct a ProxyCommand now. +@@ -1430,11 +1439,22 @@ main(int ac, char **av) + options.host_key_alias : options.host_arg); + cinfo->host_arg = xstrdup(options.host_arg); + cinfo->remhost = xstrdup(host); +- cinfo->remuser = xstrdup(options.user); + cinfo->homedir = xstrdup(pw->pw_dir); + cinfo->locuser = xstrdup(pw->pw_name); + cinfo->jmphost = xstrdup(options.jump_host == NULL ? + "" : options.jump_host); ++ ++ /* ++ * Usernames specified on the commandline must be validated. ++ * Conversely, usernames from getpwnam(3) or specified as literals ++ * via configuration (i.e. not expanded) are not subject to validation. ++ */ ++ if (user_on_commandline && !valid_ruser(options.user)) ++ fatal("remote username contains invalid characters"); ++ ++ /* Store it and calculate hash. */ ++ cinfo->remuser = xstrdup(options.user); ++ + cinfo->conn_hash_hex = ssh_connection_hash(cinfo->thishost, + cinfo->remhost, cinfo->portstr, cinfo->remuser, cinfo->jmphost); + diff --git a/meta/recipes-connectivity/openssh/openssh_9.6p1.bb b/meta/recipes-connectivity/openssh/openssh_9.6p1.bb index bdb8a1599b..1cdd888ccb 100644 --- a/meta/recipes-connectivity/openssh/openssh_9.6p1.bb +++ b/meta/recipes-connectivity/openssh/openssh_9.6p1.bb @@ -33,6 +33,7 @@ SRC_URI = "http://ftp.openbsd.org/pub/OpenBSD/OpenSSH/portable/openssh-${PV}.tar file://CVE-2025-26465.patch \ file://CVE-2025-32728.patch \ file://CVE-2025-61985.patch \ + file://CVE-2025-61984.patch \ " SRC_URI[sha256sum] = "910211c07255a8c5ad654391b40ee59800710dd8119dd5362de09385aa7a777c" From patchwork Fri Oct 17 20:38:52 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 72614 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id BF8D3CCD1A5 for ; Fri, 17 Oct 2025 20:39:43 +0000 (UTC) Received: from mail-pf1-f178.google.com (mail-pf1-f178.google.com [209.85.210.178]) by mx.groups.io with SMTP id smtpd.web10.3209.1760733578260055029 for ; Fri, 17 Oct 2025 13:39:38 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20230601.gappssmtp.com header.s=20230601 header.b=uNqfW6qJ; spf=softfail (domain: sakoman.com, ip: 209.85.210.178, mailfrom: steve@sakoman.com) Received: by mail-pf1-f178.google.com with SMTP id d2e1a72fcca58-78af3fe5b17so2053086b3a.2 for ; Fri, 17 Oct 2025 13:39:38 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20230601.gappssmtp.com; s=20230601; t=1760733577; x=1761338377; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=yOKds5m9MT6qqX4fkFPPgMrXpG0Jy83Lf34+PfG0lIU=; b=uNqfW6qJ8nC4eCpDalOxwMaRVGvGoc0SpmfTcVnrccKyPO1iYUwgE7WY/uaBeGO59q oFS8c3ZTy8OPi9a9dlND95vz4KFZqY4z18haCi8HD42DxCd415V8VimYBzMg/GFxGVF9 JFnUeMAFEDgmqg/xx/WDcdu90SY31dQeiBqoWJdSoe6vDkURAu+81/NTmnhmHc/sdgHM fZG0NW9/693CPo4+cmf3L/NzJdi4fjfVsNErmH3QxK6hG546tE5yq2fAd+iZ43NZUHdU pRvU/byF8SbDkbBY6t8ZR4a+NaRO4Fh3unOUfO5wyRUL61rVA6fQ/hgTVbi50KWwY3d8 of1g== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1760733577; x=1761338377; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=yOKds5m9MT6qqX4fkFPPgMrXpG0Jy83Lf34+PfG0lIU=; b=ouYzbENm74y60VXCbo3Dvd5n+Fkn9JZqkrTROhx3mblHIS1+WRvCAM1jIvmY6KEmU2 ITGUMxGmJwE5ljVBQA3NiXAzHLW04hCkZ3gTg5kddXMHHrWil0IUW5TvsMuL+b2vxru/ lWuuQN27QqBmMrEEV9BJlU0IE+I6/79I2g83uS35FxpZ3EqKHjHyzUiMX/bJbfTd9R9d OsUypPf94ArqHGJW1hFTYYhjZppDjWLO0WnDWHgSj97r7r27D+bKQrXu+Go+oq/wp7CD L+G1c6P4Qt9vOTnzHHUG6gAvX0Mb3aHyYWPnQcts+hEJhOXRvfdXWuW0OiwtGxQF+KcA T+iw== X-Gm-Message-State: AOJu0YxxmbwRIQC74y3tNeezoRZUBqm1Z4AhPtXBsxdPYE75btGmQ9o+ Q1GwuULiNAem9IEya/ado76Diy6Ud+or8sMvdVQa2OCvYA81B5n8vfhCasc4M/pM/gj3ddGSARG EfV7160U= X-Gm-Gg: ASbGncuuyfyGa6LBVXfZLfaQpdvUE4fQKiYvdgPmvbXZSPgh2YAB8yo39EmH/gYkNFk saq8iQsVmmSvwT05hKOPOsYeQhwAKw3piQN4d+XKAdR5fVdIE6cMBGqEiBr0lQ2Gcr44p1pCc7o Vl00mNHVH4YYK9gPtVlT02A5wIrPDJMcERm5q7HoPw1CpFtvbdk7fhW40bwvIL/a3yDi+RSsdbK bg8f91Eys60a/inU/2gvEgKykN38D65vMM2/2DCQE6ETNIh46RaXOBjlIeAfs7jsAny9i2QzA/p HNiuRfXikTHnAARLxtg0EjPlgZcSZYsUeMNCuSrA3F9NauL6EEjrMd+Eug/82scL7EgMOf5NyiA wrJwnpWcgjlWoZh5J+a8xuKOSMAcPy7725JBmxOAvrlpOZlwjV4/tSjnlLH9BlDHuIn1P8Hm8O/ zr X-Google-Smtp-Source: AGHT+IEethqWfdNAshzYDy/fLX7emEBMXDdiMrykebSP8Ve45fnXYT7VAt5TX2ME9zc9eIbadvvm6w== X-Received: by 2002:aa7:888e:0:b0:781:17ee:602 with SMTP id d2e1a72fcca58-7a220b23bfdmr6295820b3a.28.1760733577477; Fri, 17 Oct 2025 13:39:37 -0700 (PDT) Received: from hexa.. ([2602:feb4:3b:2100:aaee:e640:34cd:6f2]) by smtp.gmail.com with ESMTPSA id d2e1a72fcca58-7a2300f254esm477061b3a.45.2025.10.17.13.39.36 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 17 Oct 2025 13:39:36 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][scarthgap 09/26] cmake: fix CVE-2025-9301 Date: Fri, 17 Oct 2025 13:38:52 -0700 Message-ID: <5d8a6fb52ca4a7641236712ba51cb322cb1f9f9d.1760733431.git.steve@sakoman.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 17 Oct 2025 20:39:43 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/225043 From: Saravanan Reference: https://nvd.nist.gov/vuln/detail/CVE-2025-9301 https://gitlab.kitware.com/cmake/cmake/-/issues/27135 Upstream-patch: https://gitlab.kitware.com/cmake/cmake/-/commit/37e27f71bc356d880c908040cd0cb68fa2c371b8 Signed-off-by: Saravanan Signed-off-by: Steve Sakoman --- .../cmake/cmake/CVE-2025-9301.patch | 71 +++++++++++++++++++ meta/recipes-devtools/cmake/cmake_3.28.3.bb | 1 + 2 files changed, 72 insertions(+) create mode 100644 meta/recipes-devtools/cmake/cmake/CVE-2025-9301.patch diff --git a/meta/recipes-devtools/cmake/cmake/CVE-2025-9301.patch b/meta/recipes-devtools/cmake/cmake/CVE-2025-9301.patch new file mode 100644 index 0000000000..2d8974e394 --- /dev/null +++ b/meta/recipes-devtools/cmake/cmake/CVE-2025-9301.patch @@ -0,0 +1,71 @@ +From 37e27f71bc356d880c908040cd0cb68fa2c371b8 Mon Sep 17 00:00:00 2001 +From: Tyler Yankee +Date: Wed, 13 Aug 2025 15:22:28 -0400 +Subject: [PATCH] foreach: Explicitly skip replay without iterations + +As written, foreach loops with a trailing `IN` (i.e., no loop +variable(s) given) lead to an assertion error. Handle this case by +exiting early when we know the loop won't execute anything. + +Fixes: #27135 + +CVE: CVE-2025-9301 + +Upstream-Status: Backport +https://gitlab.kitware.com/cmake/cmake/-/commit/37e27f71bc356d880c908040cd0cb68fa2c371b8 + +Signed-off-by: Tyler Yankee +Signed-off-by: Saravanan +--- + Source/cmForEachCommand.cxx | 3 +++ + Tests/RunCMake/foreach/RunCMakeTest.cmake | 1 + + Tests/RunCMake/foreach/TrailingIn-result.txt | 1 + + Tests/RunCMake/foreach/TrailingIn.cmake | 5 +++++ + 4 files changed, 10 insertions(+) + create mode 100644 Tests/RunCMake/foreach/TrailingIn-result.txt + create mode 100644 Tests/RunCMake/foreach/TrailingIn.cmake + +diff --git a/Source/cmForEachCommand.cxx b/Source/cmForEachCommand.cxx +index 21a140d0..23f953a5 100644 +--- a/Source/cmForEachCommand.cxx ++++ b/Source/cmForEachCommand.cxx +@@ -101,6 +101,9 @@ bool cmForEachFunctionBlocker::ArgumentsMatch(cmListFileFunction const& lff, + bool cmForEachFunctionBlocker::Replay( + std::vector functions, cmExecutionStatus& inStatus) + { ++ if (this->Args.size() == this->IterationVarsCount) { ++ return true; ++ } + return this->ZipLists ? this->ReplayZipLists(functions, inStatus) + : this->ReplayItems(functions, inStatus); + } +diff --git a/Tests/RunCMake/foreach/RunCMakeTest.cmake b/Tests/RunCMake/foreach/RunCMakeTest.cmake +index 15ca4770..acfc742e 100644 +--- a/Tests/RunCMake/foreach/RunCMakeTest.cmake ++++ b/Tests/RunCMake/foreach/RunCMakeTest.cmake +@@ -22,3 +22,4 @@ run_cmake(foreach-RANGE-invalid-test) + run_cmake(foreach-RANGE-out-of-range-test) + run_cmake(foreach-var-scope-CMP0124-OLD) + run_cmake(foreach-var-scope-CMP0124-NEW) ++run_cmake(TrailingIn) +diff --git a/Tests/RunCMake/foreach/TrailingIn-result.txt b/Tests/RunCMake/foreach/TrailingIn-result.txt +new file mode 100644 +index 00000000..573541ac +--- /dev/null ++++ b/Tests/RunCMake/foreach/TrailingIn-result.txt +@@ -0,0 +1 @@ ++0 +diff --git a/Tests/RunCMake/foreach/TrailingIn.cmake b/Tests/RunCMake/foreach/TrailingIn.cmake +new file mode 100644 +index 00000000..e2b5b2f2 +--- /dev/null ++++ b/Tests/RunCMake/foreach/TrailingIn.cmake +@@ -0,0 +1,5 @@ ++foreach(v IN) ++endforeach() ++ ++foreach(v1 v2 IN) ++endforeach() +-- +2.44.3 + diff --git a/meta/recipes-devtools/cmake/cmake_3.28.3.bb b/meta/recipes-devtools/cmake/cmake_3.28.3.bb index 2d47b4c027..1841bfd1cf 100644 --- a/meta/recipes-devtools/cmake/cmake_3.28.3.bb +++ b/meta/recipes-devtools/cmake/cmake_3.28.3.bb @@ -11,6 +11,7 @@ SRC_URI:append:class-nativesdk = " \ file://cmake-setup.py \ file://environment.d-cmake.sh \ " +SRC_URI += "file://CVE-2025-9301.patch" LICENSE:append = " & BSD-1-Clause & MIT" LIC_FILES_CHKSUM:append = " \ From patchwork Fri Oct 17 20:38:53 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 72615 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id C7690CCD1A7 for ; Fri, 17 Oct 2025 20:39:43 +0000 (UTC) Received: from mail-pf1-f173.google.com (mail-pf1-f173.google.com [209.85.210.173]) by mx.groups.io with SMTP id smtpd.web11.3124.1760733580057762683 for ; Fri, 17 Oct 2025 13:39:40 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20230601.gappssmtp.com header.s=20230601 header.b=c0G3vB5V; spf=softfail (domain: sakoman.com, ip: 209.85.210.173, mailfrom: steve@sakoman.com) Received: by mail-pf1-f173.google.com with SMTP id d2e1a72fcca58-794e300e20dso2852997b3a.1 for ; Fri, 17 Oct 2025 13:39:40 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20230601.gappssmtp.com; s=20230601; t=1760733579; x=1761338379; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=I8KPmGz9691S/NJ+yk0ZmMO7x7aG/lSU71l8FHk4Q8U=; b=c0G3vB5VnksrkxspkYxkDjf/2Y76gbIQv27A/SDisvg6seclJ4RDfmx05ihSlx2MQy hlP6F/hVK1/HCjZMmFyQq1DoNjsGXqC0aoJiX1wgi5cBttiWwcWYHtUelMD4PQbFLp1m j4CQctyeOAlvuLE2ioT8rCGuH1BEmGHChSaFbHXbPUpXDikRrpPqyMlW8jdRhxAFq/TS uK0omf66aTfF1oAfWV9woFyghV6NJ597P19HR4BCkRTAN7+6yPKeQyAJSP4NBjYNxdqA WPposIp/4Ow5q7JXTb4vel8QtaUNbi+GYrZZiZnjry2Zo4ckSofjElh+0S/5/1BrwTps STFg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1760733579; x=1761338379; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=I8KPmGz9691S/NJ+yk0ZmMO7x7aG/lSU71l8FHk4Q8U=; b=D8QyJzE9P0gwMJE0D/0Q7Do54LtuNpthduDWPUR8j198wAVZEHiG3+uESGySXXKnlP DcnwPeijpHf0PFYkqv28gHgUacpgOcJ6aqGJ3h4+g8tIn+qifXfFx15jBeOIoCitYEVD UnACNYklqZXGAWJMLy0ql/RnZNvcpZb+dNQLqSbnVZk/s3FdGeJmFxyg0wW46K0KirRW WExj6qmDTriJy8bu7cQwMp0zD24gTziyZzi31UP/zeiS6tGlO6s4AdceEkxur2T3s8NQ DjIO3Anw4HQyXXQhAR3lTfUKIfRuakHW4PPDXhE3SHL5eibCV4C2cqkSBupZJyNa6aVp 8vDQ== X-Gm-Message-State: AOJu0Yz2ReQ84UKES40SviHYH6ZA7JIqDHgXQQOYPjCDo4j7Efg2hxCZ Ty51C7KXmFdrg6i23pVpfHS0UidwXFED6Wbd3OecnnrsMKlA11sFEF7OEHCUTbHFzNUnX2dnzRy eu+BdJVw= X-Gm-Gg: ASbGnctYQBc0poFLZruapr6Dy7EqIE1IRqjKxuWArkHdAWdF2WcjVCee+cCo5AO+bVi mO4dxi2sbOyUBa2mw493Sgpkv1Dvl1WWxRoWO7yDMZh36Tr1mql6VFRt36/upU7kzW4fPeDcsY/ oW7A79pLscfhFuTvaJ6aodijKGHhWv2o8TlvhPWG2CT3mst8XhUvjecaQi9SpAgcll7f88KqDC9 ZJHgCaDTVxmcft3PNByPo+g0TCdH/zOCd/p7e5RubN5+Vxp4U1U5LBfkKrOZLf4k8m7bhkgzK8R Tr7BVREfgGkmeYFpKJqGXrtnVxxEcayWPAz/mXsMS8+06tIEMz1MyFqwVtq3xXQ0Tq7zoZxuv+Y Qr4esBkSvTHXlgbvN92ND7IyCcazvEgzBCtt+7DDxBTaIXlaWLz5S7uXNFK3Zc5IZEu7sTBTUVK Cu X-Google-Smtp-Source: AGHT+IFY5QsjqHGHzkkMTZcm3lZpkT/2eKZfedMoiJOYqW3WNTLocMUwlcX95Z/pburEfN+f0NGo3Q== X-Received: by 2002:a05:6a20:3d84:b0:278:bc13:d83e with SMTP id adf61e73a8af0-334a787d9c2mr6942082637.11.1760733579113; Fri, 17 Oct 2025 13:39:39 -0700 (PDT) Received: from hexa.. ([2602:feb4:3b:2100:aaee:e640:34cd:6f2]) by smtp.gmail.com with ESMTPSA id d2e1a72fcca58-7a2300f254esm477061b3a.45.2025.10.17.13.39.38 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 17 Oct 2025 13:39:38 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][scarthgap 10/26] glib-networking: fix CVE-2025-60019 Date: Fri, 17 Oct 2025 13:38:53 -0700 Message-ID: <8c44478c92a8b3d859c7fcecc734ac6bb399277e.1760733431.git.steve@sakoman.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 17 Oct 2025 20:39:43 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/225044 From: Rajeshkumar Ramasamy glib-networking's OpenSSL backend fails to properly check the return value of memory allocation routines. An out of memory condition could potentially result in writing to an invalid memory location. Reference: https://nvd.nist.gov/vuln/detail/CVE-2025-60019 Upstream-patch: https://gitlab.gnome.org/GNOME/glib-networking/-/commit/70df675dd4f5e4a593b2f95406c1aac031aa8bc7 Signed-off-by: Rajeshkumar Ramasamy Signed-off-by: Steve Sakoman --- .../glib-networking/CVE-2025-60019.patch | 147 ++++++++++++++++++ .../glib-networking/glib-networking_2.78.1.bb | 1 + 2 files changed, 148 insertions(+) create mode 100644 meta/recipes-core/glib-networking/glib-networking/CVE-2025-60019.patch diff --git a/meta/recipes-core/glib-networking/glib-networking/CVE-2025-60019.patch b/meta/recipes-core/glib-networking/glib-networking/CVE-2025-60019.patch new file mode 100644 index 0000000000..07d64bf2dc --- /dev/null +++ b/meta/recipes-core/glib-networking/glib-networking/CVE-2025-60019.patch @@ -0,0 +1,147 @@ +From 70df675dd4f5e4a593b2f95406c1aac031aa8bc7 Mon Sep 17 00:00:00 2001 +From: Michael Catanzaro +Date: Thu, 21 Aug 2025 17:21:01 -0500 +Subject: [PATCH] openssl: check return values of BIO_new() + +We probably need to check even more return values of even more OpenSSL +functions, but these ones allocate memory and that's particularly +important to get right. + +CVE: CVE-2025-60019 + +Upstream-Status: Backport [https://gitlab.gnome.org/GNOME/glib-networking/-/commit/70df675dd4f5e4a593b2f95406c1aac031aa8bc7] + +Signed-off-by: Rajeshkumar Ramasamy +--- + tls/openssl/gtlscertificate-openssl.c | 42 ++++++++++++++++++++------- + 1 file changed, 32 insertions(+), 10 deletions(-) + +diff --git a/tls/openssl/gtlscertificate-openssl.c b/tls/openssl/gtlscertificate-openssl.c +index b536559..4fa5286 100644 +--- a/tls/openssl/gtlscertificate-openssl.c ++++ b/tls/openssl/gtlscertificate-openssl.c +@@ -166,6 +166,9 @@ export_privkey_to_der (GTlsCertificateOpenssl *openssl, + goto err; + + bio = BIO_new (BIO_s_mem ()); ++ if (!bio) ++ goto err; ++ + if (i2d_PKCS8_PRIV_KEY_INFO_bio (bio, pkcs8) == 0) + goto err; + +@@ -199,6 +202,9 @@ export_privkey_to_pem (GTlsCertificateOpenssl *openssl) + return NULL; + + bio = BIO_new (BIO_s_mem ()); ++ if (!bio) ++ goto out; ++ + ret = PEM_write_bio_PKCS8PrivateKey (bio, openssl->key, NULL, NULL, 0, NULL, NULL); + if (ret == 0) + goto out; +@@ -211,7 +217,7 @@ export_privkey_to_pem (GTlsCertificateOpenssl *openssl) + result = g_strdup (data); + + out: +- BIO_free_all (bio); ++ g_clear_pointer (&bio, BIO_free_all); + return result; + } + +@@ -232,6 +238,9 @@ maybe_import_pkcs12 (GTlsCertificateOpenssl *openssl) + return; + + bio = BIO_new (BIO_s_mem ()); ++ if (!bio) ++ goto import_failed; ++ + status = BIO_write (bio, openssl->pkcs12_data->data, openssl->pkcs12_data->len); + if (status <= 0) + goto import_failed; +@@ -323,7 +332,7 @@ g_tls_certificate_openssl_get_property (GObject *object, + guint8 *data; + BIO *bio; + GByteArray *byte_array; +- char *certificate_pem; ++ const char *certificate_pem; + long size; + + const ASN1_TIME *time_asn1; +@@ -362,12 +371,12 @@ g_tls_certificate_openssl_get_property (GObject *object, + case PROP_CERTIFICATE_PEM: + bio = BIO_new (BIO_s_mem ()); + +- if (PEM_write_bio_X509 (bio, openssl->cert) == 1 && BIO_write (bio, "\0", 1) == 1) ++ if (bio && PEM_write_bio_X509 (bio, openssl->cert) == 1 && BIO_write (bio, "\0", 1) == 1) + { + BIO_get_mem_data (bio, &certificate_pem); + g_value_set_string (value, certificate_pem); + } +- BIO_free_all (bio); ++ g_clear_pointer (&bio, BIO_free_all); + break; + + case PROP_PRIVATE_KEY: +@@ -407,6 +416,8 @@ g_tls_certificate_openssl_get_property (GObject *object, + + case PROP_SUBJECT_NAME: + bio = BIO_new (BIO_s_mem ()); ++ if (!bio) ++ break; + name = X509_get_subject_name (openssl->cert); + if (X509_NAME_print_ex (bio, name, 0, XN_FLAG_SEP_COMMA_PLUS) < 0 || + BIO_write (bio, "\0", 1) != 1) +@@ -421,6 +432,8 @@ g_tls_certificate_openssl_get_property (GObject *object, + + case PROP_ISSUER_NAME: + bio = BIO_new (BIO_s_mem ()); ++ if (!bio) ++ break; + name = X509_get_issuer_name (openssl->cert); + if (X509_NAME_print_ex (bio, name, 0, XN_FLAG_SEP_COMMA_PLUS) < 0 || + BIO_write (bio, "\0", 1) != 1) +@@ -533,8 +546,11 @@ g_tls_certificate_openssl_set_property (GObject *object, + break; + CRITICAL_IF_CERTIFICATE_INITIALIZED ("certificate-pem"); + bio = BIO_new_mem_buf ((gpointer)string, -1); +- openssl->cert = PEM_read_bio_X509 (bio, NULL, NULL, NULL); +- BIO_free (bio); ++ if (bio) ++ { ++ openssl->cert = PEM_read_bio_X509 (bio, NULL, NULL, NULL); ++ BIO_free (bio); ++ } + if (openssl->cert) + openssl->have_cert = TRUE; + else if (!openssl->construct_error) +@@ -554,8 +570,11 @@ g_tls_certificate_openssl_set_property (GObject *object, + CRITICAL_IF_KEY_INITIALIZED ("private-key"); + + bio = BIO_new_mem_buf (bytes->data, bytes->len); +- openssl->key = d2i_PrivateKey_bio (bio, NULL); +- BIO_free (bio); ++ if (bio) ++ { ++ openssl->key = d2i_PrivateKey_bio (bio, NULL); ++ BIO_free (bio); ++ } + if (openssl->key) + openssl->have_key = TRUE; + else if (!openssl->construct_error) +@@ -575,8 +594,11 @@ g_tls_certificate_openssl_set_property (GObject *object, + CRITICAL_IF_KEY_INITIALIZED ("private-key-pem"); + + bio = BIO_new_mem_buf ((gpointer)string, -1); +- openssl->key = PEM_read_bio_PrivateKey (bio, NULL, NULL, NULL); +- BIO_free (bio); ++ if (bio) ++ { ++ openssl->key = PEM_read_bio_PrivateKey (bio, NULL, NULL, NULL); ++ BIO_free (bio); ++ } + if (openssl->key) + openssl->have_key = TRUE; + else if (!openssl->construct_error) +-- +2.48.1 diff --git a/meta/recipes-core/glib-networking/glib-networking_2.78.1.bb b/meta/recipes-core/glib-networking/glib-networking_2.78.1.bb index 22ca90724f..ffbdf46162 100644 --- a/meta/recipes-core/glib-networking/glib-networking_2.78.1.bb +++ b/meta/recipes-core/glib-networking/glib-networking_2.78.1.bb @@ -32,6 +32,7 @@ inherit gnomebase gettext upstream-version-is-even gio-module-cache ptest-gnome SRC_URI += "file://run-ptest" SRC_URI += "file://eagain.patch" SRC_URI += "file://CVE-2025-60018.patch" +SRC_URI += "file://CVE-2025-60019.patch" FILES:${PN} += "\ ${libdir}/gio/modules/libgio*.so \ From patchwork Fri Oct 17 20:38:54 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 72616 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id B8243CCD199 for ; Fri, 17 Oct 2025 20:39:43 +0000 (UTC) Received: from mail-pf1-f175.google.com (mail-pf1-f175.google.com [209.85.210.175]) by mx.groups.io with SMTP id smtpd.web11.3125.1760733581458551165 for ; Fri, 17 Oct 2025 13:39:41 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20230601.gappssmtp.com header.s=20230601 header.b=qm2B4PDj; spf=softfail (domain: sakoman.com, ip: 209.85.210.175, mailfrom: steve@sakoman.com) Received: by mail-pf1-f175.google.com with SMTP id d2e1a72fcca58-781001e3846so2240839b3a.2 for ; Fri, 17 Oct 2025 13:39:41 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20230601.gappssmtp.com; s=20230601; t=1760733581; x=1761338381; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=jbplsZF7p94rpveeB4nGXS2tapuSKd85i4Vyiuw8ABw=; b=qm2B4PDjaNZeAtKBhLvSu+CiNXCrxXwgQvaOscppZiuivDJIBGeAN94ouEzAgyAG7F dnkOc21KKXegZY7dBJXyRZFLNfISuDpG6mYx5riXDV0tyXT+2o8P3tZ55KAvnbLlrUJf yngDevhTGjqm7aMmxP4E5gVC3/8RiRYKytcaNURohXARs1M8VjOYcOrP1QHy6IpnioOL iRkdy2spnty/qpNg2Ffi2+4E38i1dxVuCMP9Q4ogAgmokMjkfjB9WYbWqITqiY/B/Y1J IYz1A9i6Xlnax5lrcttUQdUT6HrzFKubf+7dOuN+0Le4XXe4QsK4xiMrpCZTqhizI9MN B02Q== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1760733581; x=1761338381; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=jbplsZF7p94rpveeB4nGXS2tapuSKd85i4Vyiuw8ABw=; b=gisl8QhkfK1Vq5TMkPHS78hu9iNp2oICwUKLVfZjcOOCLFuX9QG7whffQRC6SW5Y+W UoyVLV0Ndo60ejNlnOiRaNRLNSYtJoVrVA5TIMQ7iMiH9VsYiCjnytZa2znjY62uVSPU 9V2aV7OspsRGTzEIs0NxYB8/4VE8U/ilPvdKK8Kft/7lCTybRHXO0Onw8yLNGbKNdXkG AKvubbO9zlWhBVD3iDA6PcVxaZKpctRj9LNZv1mAL5fTw8LCfc7PhUe5PzTuQyQF7WpX d9Fy8PLVG45kwP3o9rJfLcO/zE4h4HS2D8t9+7dIzcHMV8ZMSLitmOxcV0RxLf3OyW/d yJlg== X-Gm-Message-State: AOJu0YyvSpN6pNnsOioIewMBHfG9ODqyr2ChKhig0CDQ7RdqFl32WUe0 HRjKxZTRPcSVu6PN5p3LBXPULE4Rj6mRTXzNZQOEMlL1CKWi80WWZdtX72uZwdFT5k/Gwcy28ta SuXIO0rs= X-Gm-Gg: ASbGnctdmcu5wVYmzG6c02bK3X+aOvWkVcnN1CWCnjFTvRVVQytfFmwRggbC+25lIdc 4m0IK0kX3Vrfz3XZZ22NS6V6IAcI9Mr8fAzkUTkBQY7vO02mqGFOScLv5Y/DC/LClJxqmcCi5Fd 7SkIbPouBdC1dGsI/qzA5C12LpESAShppZrM3b8ZeR2dj9nb0JWu9+uf4KeTcJF3ioIG6Crlsfs hF+f8OKFDDqFlEChdJ86+v/UkPIufunVSxdGnxuhTCDgK03P1lY05FsHDQvj8Z/lue2ZjQ6HyWB 9XhHLQNBIlzx0R51tazsRW0yeFqhR/qZW9Y2LemOAtoODZt9wDmuCZ1v1BU4oSsVjxSSpx45Cm2 wYULUsTSTZRdRcAB8JJbNikGnGAlcMi+jI1Mg6bZOhB1b1DInEutjLxasEN9kM3v3vA== X-Google-Smtp-Source: AGHT+IGtYqIQkKXJ8K/ZxSxb57TtAPBZH5UuXD+lnZtlcIae75RoIbZfsWVHBU2aDPjX39XRm7mKHw== X-Received: by 2002:a05:6a00:13a0:b0:781:189:ae43 with SMTP id d2e1a72fcca58-7a220b06cd9mr5141025b3a.20.1760733580619; Fri, 17 Oct 2025 13:39:40 -0700 (PDT) Received: from hexa.. ([2602:feb4:3b:2100:aaee:e640:34cd:6f2]) by smtp.gmail.com with ESMTPSA id d2e1a72fcca58-7a2300f254esm477061b3a.45.2025.10.17.13.39.39 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 17 Oct 2025 13:39:40 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][scarthgap 11/26] glibc: stable 2.39 branch updates Date: Fri, 17 Oct 2025 13:38:54 -0700 Message-ID: X-Mailer: git-send-email 2.43.0 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 17 Oct 2025 20:39:43 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/225045 From: Deepesh Varatharajan git log --oneline b027d5b145f1b2908f370bdb96dfe40180d0fcb6..58cbbd43fe82910cf8ae9008351b0b0665104500 58cbbd43fe (HEAD -> release/2.39/master, origin/release/2.39/master) x86: Detect Intel Nova Lake Processor 835b1e3379 x86: Detect Intel Wildcat Lake Processor 765534258e nss: Group merge does not react to ERANGE during merge (bug 33361) 7ce7b4b2f4 Rename new tst-sem17 test to tst-sem18 a6ac06abeb Avoid uninitialized result in sem_open when file does not exist ff6ce67220 elf: handle addition overflow in _dl_find_object_update_1 [BZ #32245] fffc2df8a3 Optimize __libc_tsd_* thread variable access 83340b35cc i386: Add GLIBC_ABI_GNU_TLS version [BZ #33221] 5541edb1bd i386: Also add GLIBC_ABI_GNU2_TLS version [BZ #33129] 1f17635507 debug: Fix tst-longjmp_chk3 build failure on Hurd 3b6c8ea878 debug: Wire up tst-longjmp_chk3 89596f46e3 i386: Update ___tls_get_addr to preserve vector registers 4c2509882f elf: Preserve _rtld_global layout for the release branch cf0e7d512d elf: Compile _dl_debug_state separately (bug 33224) 5cd1f4b1a1 elf: Restore support for _r_debug interpositions and copy relocations 97017da5ef elf: Introduce _dl_debug_change_state 5601ad79b7 elf: Introduce separate _r_debug_array variable 24c94ea84e elf: Test dlopen (NULL, RTLD_LAZY) from an ELF constructor 79d84b5da5 elf: Fix handling of symbol versions which hash to zero (bug 29190) 5f5c411132 elf: Second ld.so relocation only if libc.so has been loaded 4c9b1877fd elf: Reorder audit events in dlcose to match _dl_fini (bug 32066) f407a14ff7 elf: Call la_objclose for proxy link maps in _dl_fini (bug 32065) e27601b385 elf: Signal la_objopen for the proxy link map in dlmopen (bug 31985) fef226255d elf: Add the endswith function to d21a217fa0 elf: Update DSO list, write audit log to elf/tst-audit23.out 4f145bb35d elf: Switch to main malloc after final ld.so self-relocation 65d86471ce elf: Introduce _dl_relocate_object_no_relro 5434cc2c41 elf: Do not define consider_profiling, consider_symbind as macros b2d8c6cbe7 elf: rtld_multiple_ref is always true 2b89de7c91 Revert "elf: Run constructors on cyclic recursive dlopen (bug 31986)" 46e3ecad27 elf: Fix map_complete Systemtap probe in dl_open_worker 5f225025db elf: Signal RT_CONSISTENT after relocation processing in dlopen (bug 31986) d6cc325fcf elf: Signal LA_ACT_CONSISTENT to auditors after RT_CONSISTENT switch 6917fde6f9 elf: Run constructors on cyclic recursive dlopen (bug 31986) 9fa7cc6a0b ldconfig: Move endswithn into a new header file 269e89bd8d x86-64: Add GLIBC_ABI_DT_X86_64_PLT [BZ #33212] 62ff85fd09 x86-64: Add GLIBC_ABI_GNU2_TLS version [BZ #33129] f0e8d04eef libio: Test for fdopen memory leak without SEEK_END support (bug 31840) 42a8cb7560 Remove memory leak in fdopen (bug 31840) d1c1f78e9e math: Remove no-mathvec flag 20d2d69a2f Use TLS initial-exec model for __libc_tsd_CTYPE_* thread variables [BZ #33234] c11950503f ctype: Fallback initialization of TLS using relocations (bug 19341, bug 32483) 25c537c3b3 Use proper extern declaration for _nl_C_LC_CTYPE_{class,toupper,tolower} fbdf9680cc Remove fca5937510 ctype: Reformat Makefile. 49f0e73fa3 elf: Handle ld.so with LOAD segment gaps in _dl_find_object (bug 31943) 64488b4b31 elf: Extract rtld_setup_phdr function from dl_main 9833fcf7ce elf: Do not add a copy of _dl_find_object to libc.so fbade65338 arm: Use _dl_find_object on __gnu_Unwind_Find_exidx (BZ 31405) 392e6cf1e8 AArch64: Improve codegen in SVE log1p 3a78a276a3 AArch64: Optimize inverse trig functions b6ea8902a7 AArch64: Avoid memset ifunc in cpu-features.c [BZ #33112] Testing Results: Before After Diff PASS 5080 5099 +19 XPASS 4 4 0 FAIL 119 120 +1 XFAIL 16 16 0 UNSUPPORTED 154 154 0 Testcases changes testcase-name before after debug/tst-longjmp_chk3(new) - PASS elf/check-dt-x86-64-plt(new) - PASS elf/check-gnu2-tls(new) - PASS lf/tst-dlmopen4-nonpic(new) - PASS elf/tst-dlmopen4-pic(new) - PASS elf/tst-dlopen-auditdup(new) - PASS elf/tst-dlopen-constructor-null(new) - PASS elf/tst-link-map-contiguous-ldso(new) - PASS elf/tst-link-map-contiguous-libc(new) - PASS elf/tst-nolink-libc-1(new) - PASS elf/tst-nolink-libc-2(new) - PASS elf/tst-rtld-no-malloc(new) - PASS elf/tst-rtld-no-malloc-audit(new) - PASS elf/tst-rtld-no-malloc-preload(new) - PASS elf/tst-tls23(new) - PASS elf/tst-version-hash-zero(new) - PASS libio/tst-fdopen-seek-failure(new) - PASS libio/tst-fdopen-seek-failure-mem(new) - PASS nptl/tst-sem18(new) - PASS ctype/tst-ctype-tls-dlmopen(new) - FAIL ctype/tst-ctype-tls-dlopen-static(new) - FAIL stdio-common/tst-scanf-bz27650 FAIL PASS elf/ifuncmain8 PASS - Signed-off-by: Deepesh Varatharajan Signed-off-by: Steve Sakoman --- meta/recipes-core/glibc/glibc-version.inc | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/meta/recipes-core/glibc/glibc-version.inc b/meta/recipes-core/glibc/glibc-version.inc index 89e532fd67..2ca1571158 100644 --- a/meta/recipes-core/glibc/glibc-version.inc +++ b/meta/recipes-core/glibc/glibc-version.inc @@ -1,7 +1,7 @@ SRCBRANCH ?= "release/2.39/master" PV = "2.39+git" -SRCREV_glibc ?= "b027d5b145f1b2908f370bdb96dfe40180d0fcb6" -SRCREV_localedef ?= "fab74f31b3811df543e24b6de47efdf45b538abc" +SRCREV_glibc ?= "58cbbd43fe82910cf8ae9008351b0b0665104500" +SRCREV_localedef ?= "cba02c503d7c853a38ccfb83c57e343ca5ecd7e5" GLIBC_GIT_URI ?= "git://sourceware.org/git/glibc.git;protocol=https" From patchwork Fri Oct 17 20:38:55 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 72617 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id D287ECCD1AB for ; Fri, 17 Oct 2025 20:39:43 +0000 (UTC) Received: from mail-pf1-f173.google.com (mail-pf1-f173.google.com [209.85.210.173]) by mx.groups.io with SMTP id smtpd.web10.3211.1760733583464376514 for ; Fri, 17 Oct 2025 13:39:43 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20230601.gappssmtp.com header.s=20230601 header.b=WqY7fM8P; spf=softfail (domain: sakoman.com, ip: 209.85.210.173, mailfrom: steve@sakoman.com) Received: by mail-pf1-f173.google.com with SMTP id d2e1a72fcca58-780fc3b181aso1472475b3a.2 for ; Fri, 17 Oct 2025 13:39:43 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20230601.gappssmtp.com; s=20230601; t=1760733583; x=1761338383; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=TZhSgR1GpM7WmVnrhivCS5LR0ywxygsjRCsHeXtRNCM=; b=WqY7fM8PiRWdmrzpcy6bd1Iod+aOyocoTFpOzY0OR+p4xO7MMh1GPFC1HOuQvnNh/Z f3e1DIRtJp4uKLlbIMMvJQX5hdASG6xhJ9pv2Rv0mSPxQF1yfqm3gYqsuLLRAjZE426o qMUU9Bx8ABj2JENy7lqvF3/eqSjGNYjlQGDvwbIkHQH1XqDRZassPYfoksahbijX0IY1 HdlyZsw+dc7xFDR0MgGqCoxiPkW9IbczBtSzstCLxYvuxJDeFyIp8Kg9Xa5LLrAHEa/y l4sF+241BFq/H0Uw9v8oEJHdiRniE61nEMfSxv7E1sPmDTusr2VVE/ZYEJg7KOuruh/n dA4g== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1760733583; x=1761338383; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=TZhSgR1GpM7WmVnrhivCS5LR0ywxygsjRCsHeXtRNCM=; b=c3efpuruSmfKcfkvO5lZG8pzoCm4KyihUHzyGPqqjx7Ec3Tiww1zZDtQr8+PhUJ13R wO7pzJepBBJGbtIy0+RR7YxKGEjc7ZETKwvlvSPWbjPLnlJHPO9qkxMsWL38IYoCDpJF ZjFXRxkPEHxp/inZZ1yFqCmb5n6Xsd1KRQ7UXSqKf4IJ2NY0iEt0CAofbxsKYqoY3ya/ c/FIXtAU8dEoWsIiuB/z0WzXeqbW6p/ra49ce8SGhPKqVbSeQEbCiZgrDG2qqbwLcXWP e+WhnoIucY9HhI7LZT9yOLSvDuqDmKovBd3p6T0CRW4MRq/AVDTiwHqIybHSpODcuEaS XJ3Q== X-Gm-Message-State: AOJu0YwOJSYnpgsyaozlJ+FbkGiOMqLXK/H2CBUxOjF3KZFvuObFiZ9Q 0P3hNLrtdMyi0+KMXZ52944Q6JhhXkPfQrm3J0lSd4PjV/PAVtGXj0DyJCfvWX2npNxgutQXDgN Hjp2UXLA= X-Gm-Gg: ASbGncs/dYXcteauIAX5SdB5Ed7phofSsBzBomUf2JLcsdcbpjcyqi+GitIzkDT53fG mvbt6o1MryuguF21jJ0gf5bR+xca78nOAbAfr27bND+Ke7+DNIbGDmSkyjOsgDgxm9JLU7dr6xB m4kLiZuhzacr60AxRGw8ZOfieFSF8nxoOrSIgEURvtY6fDszSyljF24BGrgubZHOeP0SXlW4vsf onEdK6XeuPBBcJZb/ET7Pks1GhMpXW2Cm/492vbAje+2ZExAMgZ2G1P9wJWxXQPUh0rUlJkgI78 d0jDAhNa9vnDJtxmzkij5FmQOiPa7gGOFwGiZElunMSE/WTNwUZyn8vr6Qc84YhsZIARwZ+VLfm SFlV1r4aDNJW7zPcQHWWQew6wf9gRCdKlBWO78Na6YzYn6zGEkGPQQrj6dNkJIVCPjw80gd++F3 xe X-Google-Smtp-Source: AGHT+IH/thbn7dmpdO07eGhcRetvOX6OChvSBeQ718hEeeMHJDYiA15nkGYlCoFu4ExBJIFvU1xvug== X-Received: by 2002:a05:6a20:1611:b0:334:7aae:c43b with SMTP id adf61e73a8af0-334a853985emr6553306637.20.1760733582542; Fri, 17 Oct 2025 13:39:42 -0700 (PDT) Received: from hexa.. ([2602:feb4:3b:2100:aaee:e640:34cd:6f2]) by smtp.gmail.com with ESMTPSA id d2e1a72fcca58-7a2300f254esm477061b3a.45.2025.10.17.13.39.41 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 17 Oct 2025 13:39:42 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][scarthgap 12/26] linux-yocto/6.6: update to v6.6.98 Date: Fri, 17 Oct 2025 13:38:55 -0700 Message-ID: X-Mailer: git-send-email 2.43.0 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 17 Oct 2025 20:39:43 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/225046 From: Bruce Ashfield Updating linux-yocto/6.6 to the latest korg -stable release that comprises the following commits: 9247f4e6573a Linux 6.6.98 20aa3d519806 x86/CPU/AMD: Properly check the TSA microcode 59a2de10b81a Linux 6.6.97 897761d16564 f2fs: fix to avoid use-after-free issue in f2fs_filemap_fault 8c1944905855 x86/process: Move the buffer clearing before MONITOR 6fb766d53f61 x86/microcode/AMD: Add TSA microcode SHAs 276499bb6944 KVM: SVM: Advertise TSA CPUID bits to guests 90293047df18 x86/bugs: Add a Transient Scheduler Attacks mitigation 2b6a5fbe9dc1 x86/bugs: Rename MDS machinery to something more generic 8a7ac2737211 powerpc/kernel: Fix ppc_save_regs inclusion in build 63cff9f57e86 usb: typec: displayport: Fix potential deadlock 4b91b77af24c platform/x86: think-lmi: Fix sysfs group cleanup 98002f1ac947 platform/x86: think-lmi: Fix kobject cleanup cb3e3244d88d platform/x86: think-lmi: Create ksets consecutively 360546362865 powercap: intel_rapl: Do not change CLAMPING bit if ENABLE bit cannot be changed 73d43c215007 iommu/rockchip: prevent iommus dead loop when two masters share one IOMMU 6052862ba31c Logitech C-270 even more broken 6358cb9c2a31 i2c/designware: Fix an initialization issue d8eab407c08d dma-buf: fix timeout handling in dma_resv_wait_timeout v2 59205a3e93ef smb: client: fix readdir returning wrong type with POSIX extensions 937f49be49d6 usb: chipidea: udc: disconnect/reconnect from host when do suspend/resume afbec8c34428 usb: cdnsp: do not disable slot for disabled slot c9a841fd2ec2 Input: iqs7222 - explicitly define number of external channels 2cd5e7c16942 Input: xpad - support Acer NGR 200 Controller c16b75aa6fb6 xhci: Disable stream for xHC controller with XHCI_BROKEN_STREAMS 881c9274246c xhci: dbc: Flush queued requests before stopping dbc 897d1170c249 xhci: dbctty: disable ECHO flag by default 7609899eb6b7 usb: xhci: quirk for data loss in ISOC transfers 204bdc7a8b7b NFSv4/flexfiles: Fix handling of NFS level errors in I/O e3eed0134772 fs: export anon_inode_make_secure_inode() and fix secretmem LSM bypass adb29b437fe5 module: Provide EXPORT_SYMBOL_GPL_FOR_MODULES() helper a6069306f4e1 platform/x86: hp-bioscfg: Fix class device unregistration 8570c219cd59 platform/x86: hp-bioscfg: Directly use firmware_attributes_class 387da3b6d1a9 drm/v3d: Disable interrupts before resetting the GPU 817662f9bdf8 rcu: Return early if callback is not specified d5c1e3f32902 mtd: spinand: fix memory leak of ECC engine conf d547779e72ce ACPICA: Refuse to evaluate a method if arguments are missing 347827bd0c56 wifi: ath6kl: remove WARN on bad firmware input 5aebb9aa538a wifi: mac80211: drop invalid source address OCB frames 270d637100f9 aoe: defer rexmit timer downdev work to workqueue 55dfffc5e947 scsi: target: Fix NULL pointer dereference in core_scsi3_decode_spec_i_port() 7b9203afeb37 regulator: fan53555: add enable_time support and soft-start times a1d10fee0783 ASoC: amd: yc: update quirk data for HP Victus 871beab5b4f9 powerpc: Fix struct termio related ioctl macros ba9117312795 platform/x86/amd/pmc: Add PCSpecialist Lafite Pro V 14M to 8042 quirks list 785200516552 ASoC: amd: yc: Add quirk for MSI Bravo 17 D7VF internal mic 69283b3fd463 ata: pata_cs5536: fix build on 32-bit UML 71f89fab5cc9 ata: libata-acpi: Do not assume 40 wire cable if no devices are enabled 6766316c1a9f ALSA: sb: Force to disable DMAs once when DMA mode is changed c7922052c6f2 ALSA: sb: Don't allow changing the DMA mode during operations c40ad1c04d30 drm/msm: Fix another leak in the submit error path fe2695b2f63b drm/msm: Fix a fence leak in submit error path 5df2087c9a1e drm/i915/dp_mst: Work around Thunderbolt sink disconnect after SINK_COUNT_ESI read ad09bb7cbd14 drm/simpledrm: Do not upcast in release helpers 51ba65860457 scsi: ufs: core: Fix clk scaling to be conditional in reset and restore 847af89aa163 scsi: ufs: core: Add OPP support for scaling clocks and regulators 95ffe734518d scsi: ufs: core: Fix abnormal scale up after last cmd finish 9e67044aa9a7 f2fs: fix to zero post-eof page d1ccd98eddba f2fs: convert f2fs_vm_page_mkwrite() to use folio 7ac8a61e5503 f2fs: prevent writing without fallocate() for pinned files b43c3050d211 f2fs: add tracepoint for f2fs_vm_page_mkwrite() bceae1daf302 x86/traps: Initialize DR6 by writing its architectural reset value 16254aa985d1 bnxt: properly flush XDP redirect lists 6310aafd4267 wifi: mac80211: finish link init before RCU publish ebca4264c648 wifi: mac80211: Add link iteration macro for link data 32d0b58079ed wifi: mac80211: chan: chandef is non-NULL for reserved bc0819a25e04 Bluetooth: hci_core: Fix use-after-free in vhci_flush() 64d07a40f853 smb: client: remove \t from TP_printk statements 3499dcb6c507 btrfs: fix qgroup reservation leak on failure to allocate ordered extent ccdd3eaec689 Revert "drm/i915/gem: Allow EXEC_CAPTURE on recoverable contexts on DG1" ca7d5aa7ccf0 smb: client: fix race condition in negotiate timeout by using more precise timing 70b32cba5cfd amd-xgbe: do not double read link status f680a4643c6f net/sched: Always pass notifications when child class becomes empty 5ea2a10be7d7 nui: Fix dma_mapping_error() check 7a1841c96093 rose: fix dangling neighbour pointers in rose_rt_device_down() 744cd8baffe8 enic: fix incorrect MTU comparison in enic_change_mtu() a133683c0567 amd-xgbe: align CL37 AN sequence as per databook f2ca04cbf01d lib: test_objagg: Set error message in check_expect_hints_stats() 8f4652848b36 igc: disable L1.2 PCI-E link substate to avoid performance issue 832058110a1d drm/i915/gsc: mei interrupt top half should be in irq disabled context 40e09506aea1 drm/i915/gt: Fix timeline left held on VMA alloc error 968a419c9513 net: usb: lan78xx: fix WARN in __netif_napi_del_locked on disconnect 0cee638d92ac smb: client: fix warning when reconnecting channel 33713f7cda3d platform/mellanox: mlxreg-lc: Fix logic error in power state check 421672fb7f13 platform/x86: dell-wmi-sysman: Fix class device unregistration dba37f72aae3 platform/x86: dell-sysman: Directly use firmware_attributes_class 4074f6a15e95 platform/x86: think-lmi: Fix class device unregistration 093ee65bdafb platform/x86: think-lmi: Directly use firmware_attributes_class ee813c62af62 platform/x86: firmware_attributes_class: Simplify API e52b896d5fb7 platform/x86: firmware_attributes_class: Move include linux/device/class.h 9143d22a09b5 platform/x86: make fw_attr_class constant 3df1e72b7bfe arm64: dts: qcom: sm8550: add UART14 nodes 0deb3eb78ebf platform/x86: dell-wmi-sysman: Fix WMI data block retrieval in sysfs callbacks 55a90f82d4ff drm/i915/selftests: Change mock_request() to return error pointers 822c05444ffa spi: spi-fsl-dspi: Clear completion counter before initiating transfer 1fc5dc930137 drm/exynos: fimd: Guard display clock control with runtime PM calls 7e6423f80bd6 dpaa2-eth: fix xdp_rxq_info leak 31afd307975f ethernet: atl1: Add missing DMA mapping error checks and count errors 2a7ac29f10d8 btrfs: use btrfs_record_snapshot_destroy() during rmdir d77a16802896 btrfs: propagate last_unlink_trans earlier when doing a rmdir 65d7f92db8a9 btrfs: rename err to ret in btrfs_rmdir() 2d11d274e2e1 btrfs: fix iteration of extrefs during log replay 79b025ebc1c0 btrfs: fix missing error handling when searching for inode refs during log replay 529281206f11 Bluetooth: Prevent unintended pause by checking if advertising is active e373354ecfbf platform/mellanox: nvsw-sn2201: Fix bus number in adapter error message d8a1ad180c24 RDMA/mlx5: Fix vport loopback for MPV device efb3413f6ba9 RDMA/mlx5: Fix CC counters query for MPV 301303d14da6 RDMA/mlx5: Fix HW counters query for non-representor devices ee9cb28675a5 scsi: ufs: core: Fix spelling of a sysfs attribute name 39dac98aca12 scsi: qla4xxx: Fix missing DMA mapping error in qla4xxx_alloc_pdu() c3ec87fbb00d scsi: qla2xxx: Fix DMA mapping test in qla24xx_get_port_database() 8ca65fa71024 NFSv4/pNFS: Fix a race to wake on NFS_LAYOUT_DRAIN d0877c479f44 nfs: Clean up /proc/net/rpc/nfs when nfs_fs_proc_net_init() fails. 23a3b32a274a RDMA/mlx5: Initialize obj_event->obj_sub_list before xa_insert edca475158f7 platform/mellanox: mlxbf-tmfifo: fix vring_desc.len assignment 3962e5a3845d arm64: dts: apple: t8103: Fix PCIe BCM4377 nodename b935c1e734d2 mtk-sd: reset host->mrq on prepare_data() error 61cdd6635646 mtk-sd: Prevent memory corruption from DMA map failure b3b00e9b03d3 mtk-sd: Fix a pagefault in dma_unmap_sg() for not prepared data 45e9444b3b97 usb: typec: altmodes/displayport: do not index invalid pin_assignments 24418bc77a66 regulator: gpio: Fix the out-of-bounds access to drvdata::gpiods 0506547f6e3d Bluetooth: MGMT: mesh_send: check instances prior disabling advertising 8af1406949c1 Bluetooth: MGMT: set_mesh: update LE scan interval and window 7e88ad41b63e Bluetooth: hci_sync: revert some mesh modifications 3c0c18ef4c79 mmc: core: sd: Apply BROKEN_SD_DISCARD quirk earlier c4fad2460c17 Revert "mmc: sdhci: Disable SD card clock before changing parameters" 3855b7ace3f9 mmc: sdhci: Add a helper function for dump register in dynamic debug mode 94d0c326cb3e vsock/vmci: Clear the vmci transport packet properly when initializing it e7191481d6ae s390/pci: Do not try re-enabling load/store if device is disabled 80b971be4c37 virtio-net: ensure the received length does not exceed allocated size 39617dc3fafe rtc: cmos: use spin_lock_irqsave in cmos_interrupt 5cdd1f73401d rtc: pcf2127: fix SPI command byte for PCF2131 1cb814dbb03d rtc: pcf2127: add missing semicolon after statement Signed-off-by: Bruce Ashfield Signed-off-by: Steve Sakoman --- .../linux/linux-yocto-rt_6.6.bb | 6 ++-- .../linux/linux-yocto-tiny_6.6.bb | 6 ++-- meta/recipes-kernel/linux/linux-yocto_6.6.bb | 28 +++++++++---------- 3 files changed, 20 insertions(+), 20 deletions(-) diff --git a/meta/recipes-kernel/linux/linux-yocto-rt_6.6.bb b/meta/recipes-kernel/linux/linux-yocto-rt_6.6.bb index 9323918502..6622b87d19 100644 --- a/meta/recipes-kernel/linux/linux-yocto-rt_6.6.bb +++ b/meta/recipes-kernel/linux/linux-yocto-rt_6.6.bb @@ -14,13 +14,13 @@ python () { raise bb.parse.SkipRecipe("Set PREFERRED_PROVIDER_virtual/kernel to linux-yocto-rt to enable it") } -SRCREV_machine ?= "a02058f9508e565ca6d62ff4fda707d1b8894ea0" -SRCREV_meta ?= "533e8057057d5eb7400a400e53972c54ac1169b0" +SRCREV_machine ?= "1c4b6c1312449f28032c8b83ce96280a404ed6e1" +SRCREV_meta ?= "6df14e0eacedd9f025d88e310ef7fcc0bde6f550" SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;branch=${KBRANCH};name=machine;protocol=https \ git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.6;destsuffix=${KMETA};protocol=https" -LINUX_VERSION ?= "6.6.96" +LINUX_VERSION ?= "6.6.98" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" diff --git a/meta/recipes-kernel/linux/linux-yocto-tiny_6.6.bb b/meta/recipes-kernel/linux/linux-yocto-tiny_6.6.bb index 7424dacc42..0d1d8b332e 100644 --- a/meta/recipes-kernel/linux/linux-yocto-tiny_6.6.bb +++ b/meta/recipes-kernel/linux/linux-yocto-tiny_6.6.bb @@ -8,7 +8,7 @@ require recipes-kernel/linux/linux-yocto.inc # CVE exclusions include recipes-kernel/linux/cve-exclusion_6.6.inc -LINUX_VERSION ?= "6.6.96" +LINUX_VERSION ?= "6.6.98" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}" @@ -17,8 +17,8 @@ DEPENDS += "openssl-native util-linux-native" KMETA = "kernel-meta" KCONF_BSP_AUDIT_LEVEL = "2" -SRCREV_machine ?= "d68fff9b37fe90feaef6e6e24d560f07420d2044" -SRCREV_meta ?= "533e8057057d5eb7400a400e53972c54ac1169b0" +SRCREV_machine ?= "f8e22255578e2c951974340aae60bf9dc56b838c" +SRCREV_meta ?= "6df14e0eacedd9f025d88e310ef7fcc0bde6f550" PV = "${LINUX_VERSION}+git" diff --git a/meta/recipes-kernel/linux/linux-yocto_6.6.bb b/meta/recipes-kernel/linux/linux-yocto_6.6.bb index de6952dad0..031925129f 100644 --- a/meta/recipes-kernel/linux/linux-yocto_6.6.bb +++ b/meta/recipes-kernel/linux/linux-yocto_6.6.bb @@ -18,25 +18,25 @@ KBRANCH:qemux86-64 ?= "v6.6/standard/base" KBRANCH:qemuloongarch64 ?= "v6.6/standard/base" KBRANCH:qemumips64 ?= "v6.6/standard/mti-malta64" -SRCREV_machine:qemuarm ?= "a2c45f6283ecd822468883d493f90ab0cc4f3a8a" -SRCREV_machine:qemuarm64 ?= "d72e5d8e6d1a220a18fb2d9848fadbe443c9d555" -SRCREV_machine:qemuloongarch64 ?= "cfb2162b885f040f7d3d2c95103af0d62ad94b28" -SRCREV_machine:qemumips ?= "09314f2a0c95b59863247654f75555489cae9e11" -SRCREV_machine:qemuppc ?= "7ee481d1b7be6cb8897494430119c4a00d40c29e" -SRCREV_machine:qemuriscv64 ?= "cfb2162b885f040f7d3d2c95103af0d62ad94b28" -SRCREV_machine:qemuriscv32 ?= "cfb2162b885f040f7d3d2c95103af0d62ad94b28" -SRCREV_machine:qemux86 ?= "cfb2162b885f040f7d3d2c95103af0d62ad94b28" -SRCREV_machine:qemux86-64 ?= "cfb2162b885f040f7d3d2c95103af0d62ad94b28" -SRCREV_machine:qemumips64 ?= "3b2b3b16411baea07773b9c74093d139a0d0ab25" -SRCREV_machine ?= "cfb2162b885f040f7d3d2c95103af0d62ad94b28" -SRCREV_meta ?= "533e8057057d5eb7400a400e53972c54ac1169b0" +SRCREV_machine:qemuarm ?= "8057ff8a5fafefaf330e60e34bc4b83f4070763a" +SRCREV_machine:qemuarm64 ?= "6a1a2f157c2b4fd7107ae28ccea2e5dd41086118" +SRCREV_machine:qemuloongarch64 ?= "760085c1a370bb909a8d256f8bfffdb9f9f879a8" +SRCREV_machine:qemumips ?= "dc0cec39323fbf083dce76f83fc80462fd582781" +SRCREV_machine:qemuppc ?= "206991d0103afe59a9ea27619d3ed3e82e49f468" +SRCREV_machine:qemuriscv64 ?= "760085c1a370bb909a8d256f8bfffdb9f9f879a8" +SRCREV_machine:qemuriscv32 ?= "760085c1a370bb909a8d256f8bfffdb9f9f879a8" +SRCREV_machine:qemux86 ?= "760085c1a370bb909a8d256f8bfffdb9f9f879a8" +SRCREV_machine:qemux86-64 ?= "760085c1a370bb909a8d256f8bfffdb9f9f879a8" +SRCREV_machine:qemumips64 ?= "fa01c554b0080d610d45cc3dd7fb2dd08ec0e473" +SRCREV_machine ?= "760085c1a370bb909a8d256f8bfffdb9f9f879a8" +SRCREV_meta ?= "6df14e0eacedd9f025d88e310ef7fcc0bde6f550" # set your preferred provider of linux-yocto to 'linux-yocto-upstream', and you'll # get the /base branch, which is pure upstream -stable, and the same # meta SRCREV as the linux-yocto-standard builds. Select your version using the # normal PREFERRED_VERSION settings. BBCLASSEXTEND = "devupstream:target" -SRCREV_machine:class-devupstream ?= "a5df3a702b2cba82bcfb066fa9f5e4a349c33924" +SRCREV_machine:class-devupstream ?= "9247f4e6573a4d05fe70c3e90dbd53da26e8c5cb" PN:class-devupstream = "linux-yocto-upstream" KBRANCH:class-devupstream = "v6.6/base" @@ -44,7 +44,7 @@ SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;name=machine;branch=${KBRA git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.6;destsuffix=${KMETA};protocol=https" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" -LINUX_VERSION ?= "6.6.96" +LINUX_VERSION ?= "6.6.98" PV = "${LINUX_VERSION}+git" From patchwork Fri Oct 17 20:38:56 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 72618 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id D3148CCD195 for ; Fri, 17 Oct 2025 20:39:53 +0000 (UTC) Received: from mail-pf1-f175.google.com (mail-pf1-f175.google.com [209.85.210.175]) by mx.groups.io with SMTP id smtpd.web10.3213.1760733585360716061 for ; Fri, 17 Oct 2025 13:39:45 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20230601.gappssmtp.com header.s=20230601 header.b=qdI9pLYA; spf=softfail (domain: sakoman.com, ip: 209.85.210.175, mailfrom: steve@sakoman.com) Received: by mail-pf1-f175.google.com with SMTP id d2e1a72fcca58-781010ff051so1833475b3a.0 for ; Fri, 17 Oct 2025 13:39:45 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20230601.gappssmtp.com; s=20230601; t=1760733584; x=1761338384; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=mkmdWcNe4fwCRvmOPweXPc9oqr4PcZHBaJkc+ygAak8=; b=qdI9pLYAOGWHco31U6PYZ3EA5rch1elvM6T7aRl87gDvN24+YoAloZTf6HV7QK8kgZ wsL09xbAlNQW0ZM9wwGyaeq8DyieO3ghQKFdJFmkSLMAIkWylgYtfhXL7MtPx/A7swNe JiKitZV/ISn3Hb0q28ZqAMtdW8C49GWCx4YRj+U4n76LInEvKRUW5SacVrR6Fxc4VoEb q5XUv2AvgrKTEJyA3Io7ScxjHRtcIHcFoZfYPY6ROaJBKUGSsUiLHbqaUpkk1C0Rzzb2 uy/aqJOgr1Cq4vZZZO2GiPJkUf3NkKLZK5tvjZAccIIRQUgFVB5l4026nAGIj5XMGQTY +hvg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1760733584; x=1761338384; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=mkmdWcNe4fwCRvmOPweXPc9oqr4PcZHBaJkc+ygAak8=; b=vdDtHjuTtDKUmc28mtGyxhPDJF5cwJDoZBg850e4MSp51sMzKGBqnInYkUxPw5bZ28 K3HizEH9t9TXb+GbK5+SPsVfKoo+vWmERvkN680w2QB9me/TM87eqFFioGD+UmF2iztx F5WVPUSKkEnj/L9yBR2OxriZXrI/4/FV497BZTaUH8xuFglwkoiAUUXmEvEL+BsCgAhY nB6wmoxwJPSGR5jLKVDFE5+qlWiAhgZlsl82/EJ14ZODKEFEgoP1Mp+IrkoZinAw7Ovm LCFRj3EqbOKfwSAO1CboGIKB8XBkJHo/1N4ceSXtTMrPoI+klcug0lZQzuWx+/3BLV7C b51A== X-Gm-Message-State: AOJu0Yx6hhz6dhltKkavDr9/B18ENvHqaDLzR5ehF9s20cJa9edVZHt3 Fk6xxGc/x4JlGdgz97sr86fiyf76QAcPkK5ea4ZYNz3Ry3+tm89+xUv76adyw/T7NvEgUQlBOhd CfK/prYw= X-Gm-Gg: ASbGncskxTdiVgAi4rjx0tT7oaT7NppdXevTG2uq+ht6sBVtBgQPiEfohEAdzd3Qqr4 SDtu9r+WPS546mByH+9fvKjfjseZuBAl2Hup1ijmHvtQL/wJeiEsj9BLCYIw2iO1A4bj0BWGAuT RgMNzUa/OTDxcNbI7e58LKYV1ZlJsZ8M5kVTDxke6bm/uOw2D40KQTn8JvGCi7PaAQlQwwjs6yc dBJ2hRCmXe/fQR+yWxB1+J/YGLiEkBOPb9SkVf1ea1p5ZTPC3TOb93RtBrwfdLlWQKojKRAsYgx ki6KVYJKT5XU75FYkmhkkS9YfZDToLsRKmg2UpFRjtYmvB5McxufBSwWTvrJsWkBXmh33+CaXWx qM92wGeHe3GbwL2+Il7nfU5mYf8j9L4q62+MSvJPkScBRtpkaA6gg5HMW0nW7UEsDEB/JPvRbGf ED/lEadBn+RkE= X-Google-Smtp-Source: AGHT+IGSZyNj1Z8J4EvbCb2CcsC/+XEfc0C4Rxp7qV0P7y3f/Wv5gxfUrPGxl46K+OH7WMs/2FVQxA== X-Received: by 2002:a05:6a00:b4b:b0:77f:4b9b:8c34 with SMTP id d2e1a72fcca58-7a220d34eccmr6080299b3a.31.1760733584420; Fri, 17 Oct 2025 13:39:44 -0700 (PDT) Received: from hexa.. ([2602:feb4:3b:2100:aaee:e640:34cd:6f2]) by smtp.gmail.com with ESMTPSA id d2e1a72fcca58-7a2300f254esm477061b3a.45.2025.10.17.13.39.43 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 17 Oct 2025 13:39:43 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][scarthgap 13/26] linux-yocto/6.6: update to v6.6.99 Date: Fri, 17 Oct 2025 13:38:56 -0700 Message-ID: <5504778cd1c538b6f3c40d3106a3423abdac3203.1760733431.git.steve@sakoman.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 17 Oct 2025 20:39:53 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/225047 From: Bruce Ashfield Updating linux-yocto/6.6 to the latest korg -stable release that comprises the following commits: d96eb99e2f0e Linux 6.6.99 eaf112069a90 rseq: Fix segfault on registration when rseq_cs is non-zero f02f0218be41 crypto: ecdsa - Harden against integer overflows in DIV_ROUND_UP() 97c355989928 ksmbd: fix potential use-after-free in oplock/lease break ack 8377d7744bdc kasan: remove kasan_find_vm_area() to prevent possible deadlock d3927e55c959 smb: client: fix potential race in cifs_put_tcon() a4bb7ced4e8f selftests/bpf: adapt one more case in test_lru_map to the new target_free f35c825a012d Input: atkbd - do not skip atkbd_deactivate() when skipping ATKBD_CMD_GETID 3ce1d87d1f5d HID: quirks: Add quirk for 2 Chicony Electronics HP 5MP Cameras ae915b38e262 HID: Add IGNORE quirk for SMARTLINKTECHNOLOGY b71a75739af9 bpf: Adjust free target to avoid global starvation of LRU map cd5b424d8322 vt: add missing notification when switching back to text mode f4428b2d4c68 btrfs: fix assertion when building free space tree 2cc5ef01ea03 net: mana: Record doorbell physical address in PF mode 9f460b235ef3 HID: lenovo: Add support for ThinkPad X1 Tablet Thin Keyboard Gen2 cd4df14f6180 net: usb: qmi_wwan: add SIMCom 8230C composition e07c2feb4916 ALSA: hda/realtek - Enable mute LED on HP Pavilion Laptop 15-eg100 ee287cf30ffb ASoC: amd: yc: add quirk for Acer Nitro ANV15-41 internal mic 50b1e01aa123 io_uring: make fallocate be hashed work 825088c90357 um: vector: Reduce stack usage in vector_eth_configure() 8cafaba2f275 atm: idt77252: Add missing `dma_map_error()` 0d8a9b6dd321 ublk: sanity check add_dev input for underflow 5909679a82cd bnxt_en: Set DMA unmap len correctly for XDP_REDIRECT e644935d40cb bnxt_en: Fix DCB ETS validation 7d4d1993517b net: ll_temac: Fix missing tx_pending check in ethtools_set_ringparam() 5aa8b3a1d8ab can: m_can: m_can_handle_lost_msg(): downgrade msg lost in rx message to debug level 10946f834638 net: phy: microchip: limit 100M workaround to link-down events on LAN88xx 9fa29314eba1 ibmvnic: Fix hardcoded NUM_RX_STATS/NUM_TX_STATS with dynamic sizeof 4a17370da6e4 net: appletalk: Fix device refcount leak in atrtr_create() 9fbc49429a23 netfilter: flowtable: account for Ethernet header in nf_flow_pppoe_proto() d46186eb7bbd nbd: fix uaf in nbd_genl_connect() error path 8fc3d7b23d13 raid10: cleanup memleak at raid10_make_request df5894014a92 md/raid1: Fix stack memory use after return in raid1_reshape d1240029f97a drm/tegra: nvdec: Fix dma_alloc_coherent error check 5420de65efbe wifi: zd1211rw: Fix potential NULL pointer dereference in zd_mac_tx_to_dev() 739296467a59 cifs: all initializations for tcon should happen in tcon_info_alloc 03c3cd0c3b67 smb: client: fix DFS interlink failover d043b5da37fc smb: client: avoid unnecessary reconnects when refreshing referrals 609a617a97c0 usb: dwc3: Abort suspend on soft disconnect failure e3f79e2c9ad1 usb: cdnsp: Fix issue with CV Bad Descriptor test ae5b191184ce usb: cdnsp: Replace snprintf() with the safer scnprintf() variant 7227a8229f43 usb:cdnsp: remove TRB_FLUSH_ENDPOINT command fd79927c8191 btrfs: fix inode lookup error handling during log replay 6aea26dc23d5 btrfs: return a btrfs_inode from btrfs_iget_logging() e6031107f397 btrfs: remove redundant root argument from fixup_inode_link_count() 28a36e75d196 btrfs: remove redundant root argument from btrfs_update_inode_fallback() ddead3c5ca18 btrfs: remove noinline from btrfs_update_inode() c31ee1695b6d netlink: make sure we allow at least one dump skb ce2ac2e46719 netlink: Fix rmem check in netlink_broadcast_deliver(). 5b1b8f06b179 erofs: fix to add missing tracepoint in erofs_read_folio() 4c4f931676b6 ksmbd: fix a mount write count leak in ksmbd_vfs_kern_path_locked() d903a0fe324e smb: server: make use of rdma_destroy_qp() 3c0994a3fd93 x86/mm: Disable hugetlb page table sharing on 32-bit ee21fbcb87a0 x86/rdrand: Disable RDSEED on AMD Cyan Skillfish ad9d4db5a8ac pwm: mediatek: Ensure to disable clocks in error path 37e2911d2ec1 mm/vmalloc: leave lazy MMU mode on PTE mapping error f64046ae3401 scripts/gdb: fix interrupts.py after maple tree conversion ecf16604f3f0 scripts/gdb: de-reference per-CPU MCE interrupts e2e200c98e9f scripts/gdb: fix interrupts display after MCP on x86 56995226431a mm: fix the inaccurate memory statistics issue for users 167134042418 maple_tree: fix mt_destroy_walk() on root leaf node 688bf63ee6ba kallsyms: fix build without execinfo c23a41086899 Revert "ACPI: battery: negate current when discharging" 2e2e9b3d7084 drm/framebuffer: Acquire internal references on GEM handles dec7774d0ef9 Revert "usb: gadget: u_serial: Add null pointer check in gs_start_io" c6eb4a05af3d usb: gadget: u_serial: Fix race condition in TTY wakeup 8c290a9d629b drm/gem: Fix race in drm_gem_handle_create_tail() db7402d78e7c drm/ttm: fix error handling in ttm_buffer_object_transfer c64f5310530b drm/sched: Increment job count before swapping tail spsc queue cb4c956a15f8 drm/gem: Acquire references on GEM handles for framebuffers ec6392061de6 wifi: prevent A-MSDU attacks in mesh networks 1d57f7132662 pinctrl: qcom: msm: mark certain pins as invalid for interrupts 3d82a729530b md/md-bitmap: fix GPF in bitmap_get_stats() 2ca1db269a8d gre: Fix IPv6 multicast route creation. 8c8e8d4d7544 KVM: SVM: Reject SEV{-ES} intra host migration if vCPU creation is in-flight 20d1d9e7ce69 KVM: x86/xen: Allow 'out of range' event channel ports in IRQ routing table. a18776abc592 x86/mce: Make sure CMCI banks are cleared during shutdown on Intel f536f3b09773 x86/mce: Don't remove sysfs if thresholding sysfs init fails cc058adb9beb x86/mce/amd: Fix threshold limit reset 8e5058a5812e x86/mce/amd: Add default names for MCA banks and blocks e2d5c005dfc9 ipmi:msghandler: Fix potential memory corruption in ipmi_create_user() efc1b2b7c1a3 rxrpc: Fix oops due to non-existence of prealloc backlog struct ddc4fe078948 Bluetooth: HCI: Set extended advertising data synchronously eb952372bf48 perf: build: Setup PKG_CONFIG_LIBDIR for cross compilation e63032e66bca maple_tree: fix MA_STATE_PREALLOC flag in mas_preallocate() 432c5363cd6f rxrpc: Fix bug due to prealloc collision 4c691d1b6b6d net/sched: Abort __tc_modify_qdisc if parent class does not exist 07b585ae3699 atm: clip: Fix NULL pointer dereference in vcc_sendmsg() 3f61b997fe01 atm: clip: Fix infinite recursive call of clip_push(). 1fb9fb5a4b5c atm: clip: Fix memory leak of struct clip_vcc. 06935c50cfa3 atm: clip: Fix potential null-ptr-deref in to_atmarpd(). 36cf9bcf09bd net: phy: smsc: Fix link failure in forced mode with Auto-MDIX 0a0d040f12fe net: phy: smsc: Force predictable MDI-X state on LAN87xx 72c62b4991a2 net: phy: smsc: Fix Auto-MDIX configuration when disabled by strap 791c8d6b76c5 net: stmmac: Fix interrupt handling for level-triggered mode in DWC_XGMAC2 d437e8e7dcb9 vsock: Fix IOCTL_VM_SOCKETS_GET_LOCAL_CID to check also `transport_local` 9d24bb678028 vsock: Fix transport_* TOCTOU 401239811fa7 vsock: Fix transport_{g2h,h2g} TOCTOU 81373cd1d72d tcp: Correct signedness in skb remaining space calculation be4b8392da79 tipc: Fix use-after-free in tipc_conn_close(). 42262bc4e8ef vsock: fix `vsock_proto` declaration 55baecb9eb90 netlink: Fix wraparounds of sk->sk_rmem_alloc. f9b3d28f1f62 fix proc_sys_compare() handling of in-lookup dentries 82c0f15c26be pinctrl: amd: Clear GPIO debounce for suspend a219fcea8e8e Bluetooth: hci_event: Fix not marking Broadcast Sink BIS as connected 51e082108345 Bluetooth: hci_sync: Fix not disabling advertising instance c604dd2c5e6b ASoC: cs35l56: probe() should fail if the device ID is not recognized 183bdb89af1b perf: Revert to requiring CAP_SYS_ADMIN for uprobes 71eb118baf6e perf/core: Fix the WARN_ON_ONCE is out of lock protected region 407f1073ea23 ASoC: fsl_asrc: use internal measured ratio for non-ideal ratio mode 391e5ea5b877 drm/exynos: exynos7_drm_decon: add vblank check in IRQ handling 521e9ff0b67c eventpoll: don't decrement ep refcount while still holding the ep mutex Signed-off-by: Bruce Ashfield Signed-off-by: Steve Sakoman --- .../linux/linux-yocto-rt_6.6.bb | 6 ++-- .../linux/linux-yocto-tiny_6.6.bb | 6 ++-- meta/recipes-kernel/linux/linux-yocto_6.6.bb | 28 +++++++++---------- 3 files changed, 20 insertions(+), 20 deletions(-) diff --git a/meta/recipes-kernel/linux/linux-yocto-rt_6.6.bb b/meta/recipes-kernel/linux/linux-yocto-rt_6.6.bb index 6622b87d19..cfc7b72da8 100644 --- a/meta/recipes-kernel/linux/linux-yocto-rt_6.6.bb +++ b/meta/recipes-kernel/linux/linux-yocto-rt_6.6.bb @@ -14,13 +14,13 @@ python () { raise bb.parse.SkipRecipe("Set PREFERRED_PROVIDER_virtual/kernel to linux-yocto-rt to enable it") } -SRCREV_machine ?= "1c4b6c1312449f28032c8b83ce96280a404ed6e1" -SRCREV_meta ?= "6df14e0eacedd9f025d88e310ef7fcc0bde6f550" +SRCREV_machine ?= "a1284b1ec1c1b4818675778b9746b28dfa62c4bb" +SRCREV_meta ?= "62a638bf97b8ca5e8e7c2e889b9965d6e5aed1bc" SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;branch=${KBRANCH};name=machine;protocol=https \ git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.6;destsuffix=${KMETA};protocol=https" -LINUX_VERSION ?= "6.6.98" +LINUX_VERSION ?= "6.6.99" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" diff --git a/meta/recipes-kernel/linux/linux-yocto-tiny_6.6.bb b/meta/recipes-kernel/linux/linux-yocto-tiny_6.6.bb index 0d1d8b332e..ecc94b4c70 100644 --- a/meta/recipes-kernel/linux/linux-yocto-tiny_6.6.bb +++ b/meta/recipes-kernel/linux/linux-yocto-tiny_6.6.bb @@ -8,7 +8,7 @@ require recipes-kernel/linux/linux-yocto.inc # CVE exclusions include recipes-kernel/linux/cve-exclusion_6.6.inc -LINUX_VERSION ?= "6.6.98" +LINUX_VERSION ?= "6.6.99" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}" @@ -17,8 +17,8 @@ DEPENDS += "openssl-native util-linux-native" KMETA = "kernel-meta" KCONF_BSP_AUDIT_LEVEL = "2" -SRCREV_machine ?= "f8e22255578e2c951974340aae60bf9dc56b838c" -SRCREV_meta ?= "6df14e0eacedd9f025d88e310ef7fcc0bde6f550" +SRCREV_machine ?= "a92b0c8786e4b797f2cd47fb12b36e621a79834d" +SRCREV_meta ?= "62a638bf97b8ca5e8e7c2e889b9965d6e5aed1bc" PV = "${LINUX_VERSION}+git" diff --git a/meta/recipes-kernel/linux/linux-yocto_6.6.bb b/meta/recipes-kernel/linux/linux-yocto_6.6.bb index 031925129f..d47a186a85 100644 --- a/meta/recipes-kernel/linux/linux-yocto_6.6.bb +++ b/meta/recipes-kernel/linux/linux-yocto_6.6.bb @@ -18,25 +18,25 @@ KBRANCH:qemux86-64 ?= "v6.6/standard/base" KBRANCH:qemuloongarch64 ?= "v6.6/standard/base" KBRANCH:qemumips64 ?= "v6.6/standard/mti-malta64" -SRCREV_machine:qemuarm ?= "8057ff8a5fafefaf330e60e34bc4b83f4070763a" -SRCREV_machine:qemuarm64 ?= "6a1a2f157c2b4fd7107ae28ccea2e5dd41086118" -SRCREV_machine:qemuloongarch64 ?= "760085c1a370bb909a8d256f8bfffdb9f9f879a8" -SRCREV_machine:qemumips ?= "dc0cec39323fbf083dce76f83fc80462fd582781" -SRCREV_machine:qemuppc ?= "206991d0103afe59a9ea27619d3ed3e82e49f468" -SRCREV_machine:qemuriscv64 ?= "760085c1a370bb909a8d256f8bfffdb9f9f879a8" -SRCREV_machine:qemuriscv32 ?= "760085c1a370bb909a8d256f8bfffdb9f9f879a8" -SRCREV_machine:qemux86 ?= "760085c1a370bb909a8d256f8bfffdb9f9f879a8" -SRCREV_machine:qemux86-64 ?= "760085c1a370bb909a8d256f8bfffdb9f9f879a8" -SRCREV_machine:qemumips64 ?= "fa01c554b0080d610d45cc3dd7fb2dd08ec0e473" -SRCREV_machine ?= "760085c1a370bb909a8d256f8bfffdb9f9f879a8" -SRCREV_meta ?= "6df14e0eacedd9f025d88e310ef7fcc0bde6f550" +SRCREV_machine:qemuarm ?= "81a67e3d3d46f20a12e869078c60864c466a4fee" +SRCREV_machine:qemuarm64 ?= "68f8e3b8ae0c65828794cdb9e03a8030d3a32c0b" +SRCREV_machine:qemuloongarch64 ?= "58d3f59a009b2b25547fc4a9ec7cd59fca4776f0" +SRCREV_machine:qemumips ?= "90565b2dd07c5ba430ecd9311a5297292f630d71" +SRCREV_machine:qemuppc ?= "7fdf770f5adb7da51033fbf95a44fe4c7da08d74" +SRCREV_machine:qemuriscv64 ?= "58d3f59a009b2b25547fc4a9ec7cd59fca4776f0" +SRCREV_machine:qemuriscv32 ?= "58d3f59a009b2b25547fc4a9ec7cd59fca4776f0" +SRCREV_machine:qemux86 ?= "58d3f59a009b2b25547fc4a9ec7cd59fca4776f0" +SRCREV_machine:qemux86-64 ?= "58d3f59a009b2b25547fc4a9ec7cd59fca4776f0" +SRCREV_machine:qemumips64 ?= "f8013e6f23a92cb0a74c7cff75a340a3e49e0e36" +SRCREV_machine ?= "58d3f59a009b2b25547fc4a9ec7cd59fca4776f0" +SRCREV_meta ?= "62a638bf97b8ca5e8e7c2e889b9965d6e5aed1bc" # set your preferred provider of linux-yocto to 'linux-yocto-upstream', and you'll # get the /base branch, which is pure upstream -stable, and the same # meta SRCREV as the linux-yocto-standard builds. Select your version using the # normal PREFERRED_VERSION settings. BBCLASSEXTEND = "devupstream:target" -SRCREV_machine:class-devupstream ?= "9247f4e6573a4d05fe70c3e90dbd53da26e8c5cb" +SRCREV_machine:class-devupstream ?= "d96eb99e2f0e32b6d29e7f12a790b08c08825503" PN:class-devupstream = "linux-yocto-upstream" KBRANCH:class-devupstream = "v6.6/base" @@ -44,7 +44,7 @@ SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;name=machine;branch=${KBRA git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.6;destsuffix=${KMETA};protocol=https" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" -LINUX_VERSION ?= "6.6.98" +LINUX_VERSION ?= "6.6.99" PV = "${LINUX_VERSION}+git" From patchwork Fri Oct 17 20:38:57 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 72620 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id DDFD6CCD199 for ; Fri, 17 Oct 2025 20:39:53 +0000 (UTC) Received: from mail-pf1-f177.google.com (mail-pf1-f177.google.com [209.85.210.177]) by mx.groups.io with SMTP id smtpd.web11.3128.1760733587315217719 for ; Fri, 17 Oct 2025 13:39:47 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20230601.gappssmtp.com header.s=20230601 header.b=EuHyuQM1; spf=softfail (domain: sakoman.com, ip: 209.85.210.177, mailfrom: steve@sakoman.com) Received: by mail-pf1-f177.google.com with SMTP id d2e1a72fcca58-780fc3b181aso1472500b3a.2 for ; Fri, 17 Oct 2025 13:39:47 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20230601.gappssmtp.com; s=20230601; t=1760733586; x=1761338386; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=IPEQ3N1ZTXfAcZiJpNlpcEUDtalC91Vfy52LsxKIkSc=; b=EuHyuQM1YtINPxXlr0Ko6bezB/XKJEVi3iV9wAb4V5zbg9OwUEW+/NkWCiYi64apMO ZmUnmPtF7+rZjSu2G07So1ogrZtTLt0CmY8KKk99pYewWvXO5BDpMAeMhWggyLpOFoMk W2kX5Qept1uX52KvHR/87n7+qEJ4ZO8o2RCzXtyEdAKK9fzVuY0Bg46sgOkwQO8ExRzn dmZ7nz7tbss7MKBHE+6pEcDRBkikrGnOy+cM2PRsUj87Q+ZNC0yrDPVhLtfrK6UPTnEq FIHJpdz9XxPQlgFOJmzRkRiVYa/lv3vDzvrLCuCG3/e7hzQUF9GwYa+9jOBGVDhdUo7i 2fmw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1760733586; x=1761338386; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=IPEQ3N1ZTXfAcZiJpNlpcEUDtalC91Vfy52LsxKIkSc=; b=DD9j2x48cgrHRRE5pqPCBNT3eebS3yqkqggbUDVbWeZ/xZZIWoacGcBi/L8h/6fC13 0W+FsHmTcch94MSct2vZ4fB+ounEGxqsVYrbjCkHOz2Murxb+B36gXPuboIVfvbUMiVS ViKY/ZnTgFOqyXYgztMhfooIyJEx7YKWG6VlhCYjaXA1N5ZA6wZZ6zLiyKvtvQQ6p87z 71j2waF8tjm34EEJBiHYFGbpH/qkeTD+6MqmxoG1shn9ORLQ2NzW0Qz9i0jespVo3EPx B6za5LSIN7BNcLpTOR9h3UgJoEiZ4VqwZo9BPzgne79KTSKfxowJ0N4SaMULkq3nSsD0 mVKA== X-Gm-Message-State: AOJu0Yxl/QewzmFu+5ElaFSqfrujzLLC9tDDYIGL1Z+kFissF0KZ3Cdl smt4j5yfxVewd0woBY2gGh1HjGEv6Hr2TlqYVLRybRJnITtOtSdhW9t+c+12u1+2z10zwNU0Rmr CfYXEdR4= X-Gm-Gg: ASbGncvsqodXOWOvCaeZ9ywfuOE9Wiav5W/FCVF+1EKN/9iK+ofkl3ckkBOzcCaB8j2 SglocRZynvCve1YGBjnxJACivspx0cmUVQGbcn5DdgJaJ9X1DnMIvtBGVt4vnOSYmbiBJe7Y5lS 1D1SbczdSJr1WAO0m73kKCPIZQAaoj1fP8H4xlr86qFbvmrq0F4+wyeP7HEyYz0N1RPlZZDMdox SlzgcVFDVXSt5nKDU11CfXBQ6O1Wh7PzV2Ro0/GrgLcsEqtbwTqo5xoqeBpDs2f7rMC2dmWtnsG ifeauSSArFebTrM6BIxt6Fr08obxJllB3thiRu39Gl3ZwxoBg0QfldV0+Nyc6rTe4OZsDM1vqaP 9Nvx3vd2YunpY6Ht7aXM8eAetvf79pKjg1oli072LewqoVaBVvMLNB43REhw+j3HFNQBHbjD/+n w+ X-Google-Smtp-Source: AGHT+IE3eFqmrccT2xTgHUW31d09djEtAwECF0VzASxvMroHJqEzwXO+iIh/DJP9txmViTCzwhG7nw== X-Received: by 2002:a05:6a00:b4b:b0:77f:4b9b:8c34 with SMTP id d2e1a72fcca58-7a220d34eccmr6080380b3a.31.1760733586440; Fri, 17 Oct 2025 13:39:46 -0700 (PDT) Received: from hexa.. ([2602:feb4:3b:2100:aaee:e640:34cd:6f2]) by smtp.gmail.com with ESMTPSA id d2e1a72fcca58-7a2300f254esm477061b3a.45.2025.10.17.13.39.45 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 17 Oct 2025 13:39:46 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][scarthgap 14/26] linux-yocto/6.6: update to v6.6.100 Date: Fri, 17 Oct 2025 13:38:57 -0700 Message-ID: X-Mailer: git-send-email 2.43.0 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 17 Oct 2025 20:39:53 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/225048 From: Bruce Ashfield Updating linux-yocto/6.6 to the latest korg -stable release that comprises the following commits: dbcb8d8e4163 Linux 6.6.100 3ee59c38ae73 KVM: x86/xen: Fix cleanup logic in emulation of Xen schedop poll hypercalls 48e879184320 nvmem: layouts: u-boot-env: remove crc32 endianness conversion 35542cbe66c6 i2c: omap: fix deprecated of_property_read_bool() use 056b65a02edc Revert "selftests/bpf: dummy_st_ops should reject 0 for non-nullable params" c148b7282808 Revert "selftests/bpf: adjust dummy_st_ops_success to detect additional error" b9e50a5169b0 ASoC: fsl_sai: Force a software reset when starting in consumer mode 8f2852c1d7aa regulator: pwm-regulator: Manage boot-on with disabled PWM channels cad3ec23e398 regulator: pwm-regulator: Calculate the output voltage for disabled PWMs 7e5ec0059e4d i2c: omap: Handle omap_i2c_init() errors in omap_i2c_probe() a7b84035baa8 i2c: omap: Fix an error handling path in omap_i2c_probe() caa86f8b6c30 i2c: omap: Add support for setting mux 6cfbff5f8dc9 usb: dwc3: qcom: Don't leave BCR asserted 824fa25c85e8 usb: hub: Don't try to recover devices lost during warm reset. 668c7b47a5ee usb: hub: Fix flushing of delayed work used for post resume purposes 71f5c98d2931 usb: hub: Fix flushing and scheduling of delayed work that tunes runtime pm 15fea75a7886 usb: hub: fix detection of high tier USB3 devices behind suspended hubs d5024dc5e644 arm64: Filter out SME hwcaps when FEAT_SME isn't implemented dc6a664089f1 clone_private_mnt(): make sure that caller has CAP_SYS_ADMIN in the right userns 4cb17b11c8af ipv6: make addrconf_wq single threaded 496efa228f0d sched: Change nr_uninterruptible type to unsigned long f371ad6471ee Revert "cgroup_freezer: cgroup_freezing: Check if not frozen" 74bb4de32d92 rxrpc: Fix transmission of an abort in response to an abort 7692bde89006 rxrpc: Fix recv-recv race of completed call 7ff2d83ecf26 net/sched: Return NULL when htb_lookup_leaf encounters an empty rbtree 7b0d42318393 net: bridge: Do not offload IGMP/MLD messages bb515c413064 net: vlan: fix VLAN 0 refcount imbalance of toggling filtering during runtime 1f3a429c21e0 tls: always refresh the queue when reading sock 007142a263db hv_netvsc: Set VF priv_flags to IFF_NO_ADDRCONF before open to prevent IPv6 addrconf bd3051a81621 Bluetooth: L2CAP: Fix attempting to adjust outgoing MTU 76179961c423 netfilter: nf_conntrack: fix crash due to removal of uninitialised entry dcbc346f50a0 ipv6: mcast: Delay put pmc->idev in mld_del_delrec() 6a213143e0ea net/mlx5: Correctly set gso_size when LRO is used ab94e7af363a Bluetooth: btusb: QCA: Fix downloading wrong NVM for WCN6855 GF variant without board ID 4ceefc9c31e7 Bluetooth: SMP: Fix using HCI_ERROR_REMOTE_USER_TERM on timeout f3323b18e3cc Bluetooth: SMP: If an unallowed command is received consider it a failure 32e624912eed Bluetooth: hci_sync: fix connectable extended advertising when using static random address c4f16f6b071a Bluetooth: Fix null-ptr-deref in l2cap_sock_resume_cb() 5dd6a441748d usb: net: sierra: check for no status endpoint 27591d926191 ice: add NULL check in eswitch lag check eda5e38cc4dd hwmon: (corsair-cpro) Validate the size of the received input buffer c18726607c8a selftests: net: increase inter-packet timeout in udpgro.sh 167006f73005 wifi: cfg80211: remove scan request n_channels counted_by a2f02a87fe21 nvme: fix misaccounting of nvme-mpath inflight I/O ec158d05eaa9 net: phy: Don't register LEDs for genphy 5d95fbbfaa8f nvme: fix inconsistent RCU list manipulation in nvme_ns_add_to_ctrl_list() 2baaf5bbab2a smb: client: fix use-after-free in cifs_oplock_break 62dcd9d6e61c rpl: Fix use-after-free in rpl_do_srh_inline(). fbe48f06e641 net/sched: sch_qfq: Fix race condition on qfq_aggregate 21033b49cf09 block: fix kobject leak in blk_unregister_queue c20dd7e8f359 net: emaclite: Fix missing pointer increment in aligned_read() bc016b7842f6 cachefiles: Fix the incorrect return value in __cachefiles_write() e7be679124ba bpf: Reject %p% format string in bprintf-like helpers 12e023df10b6 soundwire: amd: fix for clearing command status register 84830e033bd2 soundwire: amd: fix for handling slave alerts after link is down 673ee92bd2d3 comedi: Fix initialization of data for instructions that write to subdevice 10f9024a8c82 comedi: Fix use of uninitialized data in insn_rw_emulate_bits() 63390b856178 comedi: Fix some signed shift left operations c9d3d9667443 comedi: Fail COMEDI_INSNLIST ioctl if n_insns is too large 8a3637027cee comedi: das6402: Fix bit shift out of bounds adb7df8a8f9d comedi: das16m1: Fix bit shift out of bounds 955e8835855f comedi: aio_iiro_16: Fix bit shift out of bounds 7e470d8efd10 comedi: pcl812: Fix bit shift out of bounds 8d8519aedbf1 iio: adc: stm32-adc: Fix race in installing chained IRQ handler 6471d4b4ac61 iio: adc: max1363: Reorder mode_list[] entries edff26d038d2 iio: adc: max1363: Fix MAX1363_4X_CHANS/MAX1363_8X_CHANS[] dda42f23a8f5 iio: accel: fxls8962af: Fix use after free in fxls8962af_fifo_flush 329a80adc0e5 soc: aspeed: lpc-snoop: Don't disable channels that aren't enabled d93b20c88e5e soc: aspeed: lpc-snoop: Cleanup resources in stack-order 15a0a5de4950 smb: client: fix use-after-free in crypt_message when using async crypto 0c7b20f7785c s390/bpf: Fix bpf_arch_text_poke() with new_addr == NULL again 600f55da8d90 pmdomain: governor: Consider CPU latency tolerance from pm_domain_cpu_gov d510116c80b3 net: libwx: properly reset Rx ring descriptor 027701180a7b net: libwx: fix the using of Rx buffer DMA 3c91a56762b1 net: libwx: remove duplicate page_pool_put_full_page() e30c5fa723dc mmc: sdhci_am654: Workaround for Errata i2312 7ac120c00c5a mmc: sdhci-pci: Quirk for broken command queuing on Intel GLK-based Positivo models 5bfd0078f738 mmc: bcm2835: Fix dma_unmap_sg() nents value 4206824af6dd memstick: core: Zero initialize id_reg in h_memstick_read_dev_id() 928f3a277f2c isofs: Verify inode mode when loading from disk 4bb016438335 dmaengine: nbpfaxi: Fix memory corruption in probe() 2bae35acbb6e af_packet: fix soft lockup issue caused by tpacket_snd() 67ea5f37b203 af_packet: fix the SO_SNDTIMEO constraint not effective on tpacked_snd() e51cf5d4aa98 arm64: dts: rockchip: use cs-gpios for spi1 on ringneck 645af2f069d6 arm64: dts: freescale: imx8mm-verdin: Keep LDO5 always on bec18ebcf05c arm64: dts: imx8mp-venice-gw74xx: fix TPM SPI frequency 33eba752d9de net/mlx5: Update the list of the PCI supported devices 29db3339db0e phonet/pep: Move call to pn_skb_get_dst_sockaddr() earlier in pep_sock_accept() d48845afa083 io_uring/poll: fix POLLERR handling c855b9aa093a ALSA: hda/realtek: Add quirk for ASUS ROG Strix G712LWS 56f99fdb0b8d drm/amdgpu/gfx8: reset compute ring wptr on the GPU on resume 823d79890048 tracing/osnoise: Fix crash in timerlat_dump_stack() 6bc94f20a4c3 tracing: Add down_write(trace_event_sem) when adding trace event 6ba89b382be4 tracing/probes: Avoid using params uninitialized in parse_btf_arg() 0e5017d84d65 HID: core: do not bypass hid_hw_raw_request a1c0b87b7682 HID: core: ensure __hid_request reserves the report ID as the first byte fcda39a9c5b8 HID: core: ensure the allocated report buffer can contain the reserved report ID 469a39a33a99 dm-bufio: fix sched in atomic context 82b29ee8ba90 spi: Add check for 8-bit transfer with 8 IO mode support 415d4966cb54 pch_uart: Fix dma_sync_sg_for_device() nents value db44a558b3af Input: xpad - set correct controller type for Acer NGR200 0f6f30f5b01a nvmem: imx-ocotp: fix MAC address byte length 0cd051cb5852 thunderbolt: Fix bit masking in tb_dp_port_set_hops() dc52aff53465 thunderbolt: Fix wake on connect at runtime e6a2ff56b06e i2c: stm32: fix the device used for the DMA map 58bdd5160184 usb: gadget: configfs: Fix OOB read on empty string write ec35a7125d94 usb: musb: fix gadget state on disconnect 311c434f5d76 USB: serial: ftdi_sio: add support for NDI EMGUIDE GEMINI 909d80414869 USB: serial: option: add Foxconn T99W640 84c320060d53 USB: serial: option: add Telit Cinterion FE910C04 (ECM) composition ad2437f4abca phy: tegra: xusb: Disable periodic tracking on Tegra234 491175c139e5 phy: tegra: xusb: Decouple CYA_TRK_CODE_UPDATE_ON_IDLE from trk_hw_mode 5367cdeb75cb phy: tegra: xusb: Fix unbalanced regulator disable in UTMI PHY mode Signed-off-by: Bruce Ashfield Signed-off-by: Steve Sakoman --- .../linux/linux-yocto-rt_6.6.bb | 6 ++-- .../linux/linux-yocto-tiny_6.6.bb | 6 ++-- meta/recipes-kernel/linux/linux-yocto_6.6.bb | 28 +++++++++---------- 3 files changed, 20 insertions(+), 20 deletions(-) diff --git a/meta/recipes-kernel/linux/linux-yocto-rt_6.6.bb b/meta/recipes-kernel/linux/linux-yocto-rt_6.6.bb index cfc7b72da8..032a648ee8 100644 --- a/meta/recipes-kernel/linux/linux-yocto-rt_6.6.bb +++ b/meta/recipes-kernel/linux/linux-yocto-rt_6.6.bb @@ -14,13 +14,13 @@ python () { raise bb.parse.SkipRecipe("Set PREFERRED_PROVIDER_virtual/kernel to linux-yocto-rt to enable it") } -SRCREV_machine ?= "a1284b1ec1c1b4818675778b9746b28dfa62c4bb" -SRCREV_meta ?= "62a638bf97b8ca5e8e7c2e889b9965d6e5aed1bc" +SRCREV_machine ?= "53bdb3c01caf1113589d30065b983cd20b225124" +SRCREV_meta ?= "d2387ec7cf374ccffe480f7a00102f46b990d529" SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;branch=${KBRANCH};name=machine;protocol=https \ git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.6;destsuffix=${KMETA};protocol=https" -LINUX_VERSION ?= "6.6.99" +LINUX_VERSION ?= "6.6.100" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" diff --git a/meta/recipes-kernel/linux/linux-yocto-tiny_6.6.bb b/meta/recipes-kernel/linux/linux-yocto-tiny_6.6.bb index ecc94b4c70..34512201b5 100644 --- a/meta/recipes-kernel/linux/linux-yocto-tiny_6.6.bb +++ b/meta/recipes-kernel/linux/linux-yocto-tiny_6.6.bb @@ -8,7 +8,7 @@ require recipes-kernel/linux/linux-yocto.inc # CVE exclusions include recipes-kernel/linux/cve-exclusion_6.6.inc -LINUX_VERSION ?= "6.6.99" +LINUX_VERSION ?= "6.6.100" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}" @@ -17,8 +17,8 @@ DEPENDS += "openssl-native util-linux-native" KMETA = "kernel-meta" KCONF_BSP_AUDIT_LEVEL = "2" -SRCREV_machine ?= "a92b0c8786e4b797f2cd47fb12b36e621a79834d" -SRCREV_meta ?= "62a638bf97b8ca5e8e7c2e889b9965d6e5aed1bc" +SRCREV_machine ?= "fefda6092153d01adb8574acd075d7d3f4182442" +SRCREV_meta ?= "d2387ec7cf374ccffe480f7a00102f46b990d529" PV = "${LINUX_VERSION}+git" diff --git a/meta/recipes-kernel/linux/linux-yocto_6.6.bb b/meta/recipes-kernel/linux/linux-yocto_6.6.bb index d47a186a85..e9af2afc3b 100644 --- a/meta/recipes-kernel/linux/linux-yocto_6.6.bb +++ b/meta/recipes-kernel/linux/linux-yocto_6.6.bb @@ -18,25 +18,25 @@ KBRANCH:qemux86-64 ?= "v6.6/standard/base" KBRANCH:qemuloongarch64 ?= "v6.6/standard/base" KBRANCH:qemumips64 ?= "v6.6/standard/mti-malta64" -SRCREV_machine:qemuarm ?= "81a67e3d3d46f20a12e869078c60864c466a4fee" -SRCREV_machine:qemuarm64 ?= "68f8e3b8ae0c65828794cdb9e03a8030d3a32c0b" -SRCREV_machine:qemuloongarch64 ?= "58d3f59a009b2b25547fc4a9ec7cd59fca4776f0" -SRCREV_machine:qemumips ?= "90565b2dd07c5ba430ecd9311a5297292f630d71" -SRCREV_machine:qemuppc ?= "7fdf770f5adb7da51033fbf95a44fe4c7da08d74" -SRCREV_machine:qemuriscv64 ?= "58d3f59a009b2b25547fc4a9ec7cd59fca4776f0" -SRCREV_machine:qemuriscv32 ?= "58d3f59a009b2b25547fc4a9ec7cd59fca4776f0" -SRCREV_machine:qemux86 ?= "58d3f59a009b2b25547fc4a9ec7cd59fca4776f0" -SRCREV_machine:qemux86-64 ?= "58d3f59a009b2b25547fc4a9ec7cd59fca4776f0" -SRCREV_machine:qemumips64 ?= "f8013e6f23a92cb0a74c7cff75a340a3e49e0e36" -SRCREV_machine ?= "58d3f59a009b2b25547fc4a9ec7cd59fca4776f0" -SRCREV_meta ?= "62a638bf97b8ca5e8e7c2e889b9965d6e5aed1bc" +SRCREV_machine:qemuarm ?= "078fa42e2c5520b7c72b56c7f4556b108221386d" +SRCREV_machine:qemuarm64 ?= "848733a4d57fe579bd9d72089fb12720b2c613e8" +SRCREV_machine:qemuloongarch64 ?= "6f026111c3a003eaf81c2aee68d5c12a0a247873" +SRCREV_machine:qemumips ?= "7bb806c4728fd747067d5ea4aa2827274603e3cc" +SRCREV_machine:qemuppc ?= "d1d3313d10d048daeab874e67a2658907812e0cd" +SRCREV_machine:qemuriscv64 ?= "6f026111c3a003eaf81c2aee68d5c12a0a247873" +SRCREV_machine:qemuriscv32 ?= "6f026111c3a003eaf81c2aee68d5c12a0a247873" +SRCREV_machine:qemux86 ?= "6f026111c3a003eaf81c2aee68d5c12a0a247873" +SRCREV_machine:qemux86-64 ?= "6f026111c3a003eaf81c2aee68d5c12a0a247873" +SRCREV_machine:qemumips64 ?= "2654aa46d76428df4acd0e74ad9b281eb4a085fc" +SRCREV_machine ?= "6f026111c3a003eaf81c2aee68d5c12a0a247873" +SRCREV_meta ?= "d2387ec7cf374ccffe480f7a00102f46b990d529" # set your preferred provider of linux-yocto to 'linux-yocto-upstream', and you'll # get the /base branch, which is pure upstream -stable, and the same # meta SRCREV as the linux-yocto-standard builds. Select your version using the # normal PREFERRED_VERSION settings. BBCLASSEXTEND = "devupstream:target" -SRCREV_machine:class-devupstream ?= "d96eb99e2f0e32b6d29e7f12a790b08c08825503" +SRCREV_machine:class-devupstream ?= "dbcb8d8e4163e46066f43e2bd9a6779e594ec900" PN:class-devupstream = "linux-yocto-upstream" KBRANCH:class-devupstream = "v6.6/base" @@ -44,7 +44,7 @@ SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;name=machine;branch=${KBRA git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.6;destsuffix=${KMETA};protocol=https" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" -LINUX_VERSION ?= "6.6.99" +LINUX_VERSION ?= "6.6.100" PV = "${LINUX_VERSION}+git" From patchwork Fri Oct 17 20:38:58 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 72621 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id E4BBECCD1A5 for ; Fri, 17 Oct 2025 20:39:53 +0000 (UTC) Received: from mail-pf1-f182.google.com (mail-pf1-f182.google.com [209.85.210.182]) by mx.groups.io with SMTP id smtpd.web11.3129.1760733589360345908 for ; Fri, 17 Oct 2025 13:39:49 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20230601.gappssmtp.com header.s=20230601 header.b=bFkiEnv3; spf=softfail (domain: sakoman.com, ip: 209.85.210.182, mailfrom: steve@sakoman.com) Received: by mail-pf1-f182.google.com with SMTP id d2e1a72fcca58-79ef9d1805fso2302584b3a.1 for ; Fri, 17 Oct 2025 13:39:49 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20230601.gappssmtp.com; s=20230601; t=1760733588; x=1761338388; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=2DHENV7fOcF0J94jakYnrVVRAWUAlvyEC6uE/5TwM/E=; b=bFkiEnv3GXrTjryEmTLjD3eK8hzhxAFXXVo+89KAxL8eYG8O28qoKnjAuzLFn3TnvO x+fEo0h65YGwXzRw++f4jK8VXtk71zkepul8rgJwsEVVIDtn65qXOyvoLYB2E9zfaBzJ pvAbnraSqqmuTzOyPEGU7LNSJjI+Nh48wYYEmZIzlntFNDCq5LAOnscBDCgpd+Z3jhUG aWTT/lR5H9T/Pc3FeVnKoOy1oP72apqDE0HZwfg6LQMSx6QEoC3a7hO3GqC1XpwiASoA k8Ui4nQOm8/c3QGpn1RkGnYiX7DWW7fbX3h+/IMP94VYPoQhFmTGKuVycu+u+Q1eJlbf ixXg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1760733589; x=1761338389; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=2DHENV7fOcF0J94jakYnrVVRAWUAlvyEC6uE/5TwM/E=; b=d3GSH6QbapbtwrsI2OWR2L2czOQYnrEaq5iJ7JukWML2wIO9TrJtJqd8XymBoeL+rK R8janQEnJDGdjMKVwU1u3mWdK4Na458lb9C8V5T97hCfCLP08hMjMXS9Va3T8jgkdmja vdaBOxXwzqoVk+6cIL9gk7IHivyy+G8LrQ/LxcxvYCwI/wRKsZ/OnevX+/UMlOwa2n+y NRsXpADYaZ8bQCtREr5r014dnxIGyGNlMpmabst5MjX8mkjzVljUiFPV8ynE11T1oY2p AadK+rGOvi0T9SCckTUVw2FTEv8MZ3BKub90qa1jgY9veFzsFilnjn5kA2P8DdfZ4p9D WGKg== X-Gm-Message-State: AOJu0Yyfnu3IGj3A2lBl02Tw8XagiSe+8dO01ZehKF/+vBMu1sFihDzh lKcOqmo8ZxBh6ZiXaaxpEwNiWdmmzDSNFpTqi/JhtCq9uLteDwITSHVQbAu/Odve2+XwlcVI9z0 7llX2MFg= X-Gm-Gg: ASbGncscf/Bdm3D1y1FrBYppxvlKxIsn2b+1etLIa5DEqS/ITHBhAyQsFwgqaV7mUIZ PLA8PMcrmraaaZ3Ar56Jce7t1vEL4DP1Tyo7TNWCQovEp9WXXE9CU2O8CJL4qTV0AQIgOx/Z3ht LPqxmR98YwOVy1yI+hWog86cpYLCmZz+Cl8JXebuRkJNpICfQKeW0Z35k88u2q/Y7Lbr7MTK7kD WBpaQjQEceptNW7KxrCyBJN81OrR12r+0aTYbNibojSF6P7gtSB7tNA2UU43a/jq2UExYnVP22r QdM3jO/IYfxIb2CikybajKOxs9UDjvGbVvCMeg+gSb0BAVOsl2+KV6i5a3cr9kuoiTmLq7Ns2/5 BkgZNYBEEJb8khxj/ChlTJ1qWzOAxpS6O1ETO8yaBirOEstKUcDcRIl9w1u7vsNWAmg== X-Google-Smtp-Source: AGHT+IGNl88/6O9dkGOLgM8WzrWuMVKIKtC0cQXyKLYArw6riDdvGmaNHEO5y/Kb1VwLbQmju2PP+w== X-Received: by 2002:a05:6a21:328a:b0:334:8dcb:567b with SMTP id adf61e73a8af0-334a8643d4amr6996449637.52.1760733588455; Fri, 17 Oct 2025 13:39:48 -0700 (PDT) Received: from hexa.. ([2602:feb4:3b:2100:aaee:e640:34cd:6f2]) by smtp.gmail.com with ESMTPSA id d2e1a72fcca58-7a2300f254esm477061b3a.45.2025.10.17.13.39.47 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 17 Oct 2025 13:39:47 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][scarthgap 15/26] linux-yocto/6.6: update to v6.6.101 Date: Fri, 17 Oct 2025 13:38:58 -0700 Message-ID: <40092b395a04921dd8f0f54f352d958084167227.1760733431.git.steve@sakoman.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 17 Oct 2025 20:39:53 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/225049 From: Bruce Ashfield Updating linux-yocto/6.6 to the latest korg -stable release that comprises the following commits: no ids found, dumping: 3a8ababb8b6a Linux 6.6.101 41d3c751fcb4 Revert "selftests/bpf: Add a cgroup prog bpf_get_ns_current_pid_tgid() test" 1af6d1696ca4 spi: cadence-quadspi: fix cleanup of rx_chan on failure paths aed4053c506b drm/sched: Remove optimization that causes hang when killing dependent jobs 79c8d935147c ARM: 9448/1: Use an absolute path to unified.h in KBUILD_AFLAGS 3277cf433815 mptcp: reset fallback status gracefully at disconnect() time 7c96d519ee15 mptcp: plug races between subflow fail and subflow creation 75a4c9ab8a7a mptcp: make fallback action and fallback decision atomic 23a5773a5da5 arm64/cpufeatures/kvm: Add ARMv8.9 FEAT_ECBHB bits in ID_AA64MMFR1 register 52f5a52dc17a ksmbd: add free_transport ops in ksmbd connection 034adb78fc43 wifi: mt76: mt7921: prevent decap offload config before STA initialization 79e2dd573116 perf/x86/intel: Fix crash in icl_update_topdown_event() 9ef6abbb2868 mtd: rawnand: qcom: Fix last codeword read in qcom_param_page_type_exec() 1da8bd9a10ec ksmbd: fix use-after-free in __smb2_lease_break_noti() 5ea224eaf636 iio: hid-sensor-prox: Restore lost scale assignments a56b79a43f83 iio: hid-sensor-prox: Fix incorrect OFFSET calculation 796c96cf6685 crypto: qat - add shutdown handler to qat_dh895xcc 4b5e07702b67 crypto: powerpc/poly1305 - add depends on BROKEN for now da3e9f0fac60 erofs: address D-cache aliasing 1d117f79b5c6 mm: khugepaged: fix call hpage_collapse_scan_file() for anonymous vma 37c7f0f24b8e drm/i915/dp: Fix 2.7 Gbps DP_LINK_BW value on g4x c383033b0ac8 ALSA: hda: Add missing NVIDIA HDA codec IDs 0a776c273e71 ALSA: hda/tegra: Add Tegra264 support 4e954080d218 comedi: comedi_test: Fix possible deletion of uninitialized timers 45fd8421081e jfs: reject on-disk inodes of an unsupported type 98be604d96a6 x86/bugs: Fix use of possibly uninit value in amd_check_tsa_microcode() f9377bdf86ea usb: typec: tcpm: apply vbus before data bringup in tcpm_src_attach 457d02e71ae9 usb: typec: tcpm: allow switching to mode accessory to mux properly 8f65f4565cab usb: typec: tcpm: allow to use sink in accessory mode 145a56bd68f4 drm/amdkfd: Don't call mmput from MMU notifier callback cc690930cb24 mm/zsmalloc: do not pass __GFP_MOVABLE if CONFIG_COMPACTION=n 325325923a1d selftests: mptcp: connect: also cover checksum 5cdfb402bae9 selftests: mptcp: connect: also cover alt modes a2cd4dcbb725 resource: fix false warning in __request_region() bf585ee198bb nilfs2: reject invalid file types when reading inodes 57104237cd6c kasan: use vmalloc_dump_obj() for vmalloc error reports 3028f2a4e746 ice: Fix a null pointer dereference in ice_copy_and_init_pkg() eaf242ea6fca gve: Fix stuck TX queue for DQ queue format c229192417d4 e1000e: ignore uninitialized checksum word on tgp 1624f9de4432 e1000e: disregard NVM checksum on tgp when valid checksum bit is not set 04d098fbca47 dpaa2-switch: Fix device reference count leak in MAC endpoint handling 1c135ff95167 dpaa2-eth: Fix device reference count leak in MAC endpoint handling 9433a5f437b0 arm64/entry: Mask DAIF in cpu_switch_to(), call_on_irq_stack() 140ca2cac147 ALSA: hda/realtek - Add mute LED support for HP Pavilion 15-eg0xxx e5354899f625 sprintf.h requires stdarg.h 72584a9178af bus: fsl-mc: Fix potential double device reference in fsl_mc_get_endpoint() 6e7836c83635 i2c: virtio: Avoid hang by using interruptible completion wait 68ceeb06316e i2c: tegra: Fix reset error handling with ACPI 0d33913fce67 i2c: qup: jump out of the loop in case of timeout 60962eed62b9 platform/x86: ideapad-laptop: Fix kbd backlight not remembered among boots 989b2c5322dc net: hns3: default enable tx bounce buffer when smmu enabled adbf6f476cd1 net: hns3: fixed vf get max channels bug f377792c4186 net: hns3: disable interrupt when ptp init failed 3cc42004f65b net: hns3: fix concurrent setting vlan filter issue faf44487dfc8 s390/ism: fix concurrency management in ism_cmd() 42e42d64d851 drm/bridge: ti-sn65dsi86: Remove extra semicolon in ti_sn_bridge_probe() cf81a60a9733 can: netlink: can_changelink(): fix NULL pointer deref of struct can_priv::do_set_mode 359492c2024a can: dev: can_restart(): move debug message and stats after successful restart 71a2dc442e12 can: dev: can_restart(): reverse logic to remove need for goto 0ede6ce4fcf2 net/sched: sch_qfq: Avoid triggering might_sleep in atomic context in qfq_delete_class e4f1564c5b69 net: appletalk: Fix use-after-free in AARP proxy probe d989748e9dbb i40e: When removing VF MAC filters, only check PF-set MAC 0c399fd6ac5a i40e: report VF tx_dropped with tx_errors instead of tx_discards a05b3883083b i40e: Add rx_missed_errors for buffer exhaustion e4ca597d3116 net/mlx5: E-Switch, Fix peer miss rules to use peer eswitch c3d8a80d9557 net/mlx5: Fix memory leak in cmd_exec() bfebdb85496e xfrm: interface: fix use-after-free after changing collect_md xfrm interface 2e18442d22c6 staging: vchiq_arm: Make vchiq_shutdown never fail 6758f73f172d platform/x86: Fix initialization order for firmware_attributes_class d72c97b6160d x86/hyperv: Fix usage of cpu_online_mask to get valid cpu 0915f1856c48 regmap: fix potential memory leak of regmap_bus 881f3066fd8d iio: adc: ad7949: use spi_is_bpw_supported() 6a85c96e61c1 interconnect: qcom: sc7280: Add missing num_links to xm_pcie3_1 node fb93e41ecc75 RDMA/core: Rate limit GID cache warning messages 233d3c54c962 regulator: core: fix NULL dereference on unbind due to stale coupling data 0e8c65939ba2 virtio_ring: Fix error reporting in virtqueue_resize fa53beab4740 Input: gpio-keys - fix a sleep while atomic with PREEMPT_RT Signed-off-by: Bruce Ashfield Signed-off-by: Steve Sakoman --- .../linux/linux-yocto-rt_6.6.bb | 6 ++-- .../linux/linux-yocto-tiny_6.6.bb | 6 ++-- meta/recipes-kernel/linux/linux-yocto_6.6.bb | 28 +++++++++---------- 3 files changed, 20 insertions(+), 20 deletions(-) diff --git a/meta/recipes-kernel/linux/linux-yocto-rt_6.6.bb b/meta/recipes-kernel/linux/linux-yocto-rt_6.6.bb index 032a648ee8..990edea966 100644 --- a/meta/recipes-kernel/linux/linux-yocto-rt_6.6.bb +++ b/meta/recipes-kernel/linux/linux-yocto-rt_6.6.bb @@ -14,13 +14,13 @@ python () { raise bb.parse.SkipRecipe("Set PREFERRED_PROVIDER_virtual/kernel to linux-yocto-rt to enable it") } -SRCREV_machine ?= "53bdb3c01caf1113589d30065b983cd20b225124" -SRCREV_meta ?= "d2387ec7cf374ccffe480f7a00102f46b990d529" +SRCREV_machine ?= "a5fb5e62dfdf67e8f12e9be81b74dea8230da1ca" +SRCREV_meta ?= "cdadebd03ef4e7a129f8525938385dba54e32e80" SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;branch=${KBRANCH};name=machine;protocol=https \ git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.6;destsuffix=${KMETA};protocol=https" -LINUX_VERSION ?= "6.6.100" +LINUX_VERSION ?= "6.6.101" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" diff --git a/meta/recipes-kernel/linux/linux-yocto-tiny_6.6.bb b/meta/recipes-kernel/linux/linux-yocto-tiny_6.6.bb index 34512201b5..33e7a094a5 100644 --- a/meta/recipes-kernel/linux/linux-yocto-tiny_6.6.bb +++ b/meta/recipes-kernel/linux/linux-yocto-tiny_6.6.bb @@ -8,7 +8,7 @@ require recipes-kernel/linux/linux-yocto.inc # CVE exclusions include recipes-kernel/linux/cve-exclusion_6.6.inc -LINUX_VERSION ?= "6.6.100" +LINUX_VERSION ?= "6.6.101" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}" @@ -17,8 +17,8 @@ DEPENDS += "openssl-native util-linux-native" KMETA = "kernel-meta" KCONF_BSP_AUDIT_LEVEL = "2" -SRCREV_machine ?= "fefda6092153d01adb8574acd075d7d3f4182442" -SRCREV_meta ?= "d2387ec7cf374ccffe480f7a00102f46b990d529" +SRCREV_machine ?= "fe405475e21ba69486139227f55cbc3a507b073b" +SRCREV_meta ?= "cdadebd03ef4e7a129f8525938385dba54e32e80" PV = "${LINUX_VERSION}+git" diff --git a/meta/recipes-kernel/linux/linux-yocto_6.6.bb b/meta/recipes-kernel/linux/linux-yocto_6.6.bb index e9af2afc3b..826c1e02c8 100644 --- a/meta/recipes-kernel/linux/linux-yocto_6.6.bb +++ b/meta/recipes-kernel/linux/linux-yocto_6.6.bb @@ -18,25 +18,25 @@ KBRANCH:qemux86-64 ?= "v6.6/standard/base" KBRANCH:qemuloongarch64 ?= "v6.6/standard/base" KBRANCH:qemumips64 ?= "v6.6/standard/mti-malta64" -SRCREV_machine:qemuarm ?= "078fa42e2c5520b7c72b56c7f4556b108221386d" -SRCREV_machine:qemuarm64 ?= "848733a4d57fe579bd9d72089fb12720b2c613e8" -SRCREV_machine:qemuloongarch64 ?= "6f026111c3a003eaf81c2aee68d5c12a0a247873" -SRCREV_machine:qemumips ?= "7bb806c4728fd747067d5ea4aa2827274603e3cc" -SRCREV_machine:qemuppc ?= "d1d3313d10d048daeab874e67a2658907812e0cd" -SRCREV_machine:qemuriscv64 ?= "6f026111c3a003eaf81c2aee68d5c12a0a247873" -SRCREV_machine:qemuriscv32 ?= "6f026111c3a003eaf81c2aee68d5c12a0a247873" -SRCREV_machine:qemux86 ?= "6f026111c3a003eaf81c2aee68d5c12a0a247873" -SRCREV_machine:qemux86-64 ?= "6f026111c3a003eaf81c2aee68d5c12a0a247873" -SRCREV_machine:qemumips64 ?= "2654aa46d76428df4acd0e74ad9b281eb4a085fc" -SRCREV_machine ?= "6f026111c3a003eaf81c2aee68d5c12a0a247873" -SRCREV_meta ?= "d2387ec7cf374ccffe480f7a00102f46b990d529" +SRCREV_machine:qemuarm ?= "eec0d117c1da156e2c42a990ef9902e8bf526a3b" +SRCREV_machine:qemuarm64 ?= "7e67ed627f8cfb12bf0beb31d22038cc174f1413" +SRCREV_machine:qemuloongarch64 ?= "af73b639584c1149d99786ca0f235dcbb046ede1" +SRCREV_machine:qemumips ?= "990e670951b176b14bda639e0806364d3c2c560d" +SRCREV_machine:qemuppc ?= "22682716b343688c6e2454b6edca79e723cbd553" +SRCREV_machine:qemuriscv64 ?= "af73b639584c1149d99786ca0f235dcbb046ede1" +SRCREV_machine:qemuriscv32 ?= "af73b639584c1149d99786ca0f235dcbb046ede1" +SRCREV_machine:qemux86 ?= "af73b639584c1149d99786ca0f235dcbb046ede1" +SRCREV_machine:qemux86-64 ?= "af73b639584c1149d99786ca0f235dcbb046ede1" +SRCREV_machine:qemumips64 ?= "bcb7f967a647fbb74836a33d2ef5af6460e30074" +SRCREV_machine ?= "af73b639584c1149d99786ca0f235dcbb046ede1" +SRCREV_meta ?= "cdadebd03ef4e7a129f8525938385dba54e32e80" # set your preferred provider of linux-yocto to 'linux-yocto-upstream', and you'll # get the /base branch, which is pure upstream -stable, and the same # meta SRCREV as the linux-yocto-standard builds. Select your version using the # normal PREFERRED_VERSION settings. BBCLASSEXTEND = "devupstream:target" -SRCREV_machine:class-devupstream ?= "dbcb8d8e4163e46066f43e2bd9a6779e594ec900" +SRCREV_machine:class-devupstream ?= "3a8ababb8b6a0ced2be230b60b6e3ddbd8d67014" PN:class-devupstream = "linux-yocto-upstream" KBRANCH:class-devupstream = "v6.6/base" @@ -44,7 +44,7 @@ SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;name=machine;branch=${KBRA git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.6;destsuffix=${KMETA};protocol=https" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" -LINUX_VERSION ?= "6.6.100" +LINUX_VERSION ?= "6.6.101" PV = "${LINUX_VERSION}+git" From patchwork Fri Oct 17 20:38:59 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 72622 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id EBC9CCCD1AA for ; Fri, 17 Oct 2025 20:39:53 +0000 (UTC) Received: from mail-pf1-f170.google.com (mail-pf1-f170.google.com [209.85.210.170]) by mx.groups.io with SMTP id smtpd.web11.3131.1760733591336927494 for ; Fri, 17 Oct 2025 13:39:51 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20230601.gappssmtp.com header.s=20230601 header.b=Axe8qsa0; spf=softfail (domain: sakoman.com, ip: 209.85.210.170, mailfrom: steve@sakoman.com) Received: by mail-pf1-f170.google.com with SMTP id d2e1a72fcca58-789fb76b466so2174188b3a.0 for ; Fri, 17 Oct 2025 13:39:51 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20230601.gappssmtp.com; s=20230601; t=1760733590; x=1761338390; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=XDDWqSIeqAGYMG3kwhMw01R+hkBPKmHoPxmzsfHmacs=; b=Axe8qsa0SQX7VBVU+e+89k1K4djfgVujeR54XOamCV6uZAjpBl/BiDEk3TE6DKGv86 l8r3dkF0RV0PlQ9RKcAS7gqNvwYiMsl3FSIHeMQ0wIISUmHe34UzEuYl+xBnMdKC5KS5 tm9UfiIDkLfFAqHxsxJwiqZZzOs7N7fuL4lRZTJ7SpDlT0fRwCYaqJ19JnUqNq1T5H/z UPFLfD5I0pS09JODlpzuzOorCi3N3LLimpphuWnXRKf2ZT0ru0Iwv+0JH6TBiRtE4qK8 utIkOnys6zc4GzhKrQR4+8mH7NnlN4kobP84EOT1pIpCDYUzy4AB5p4xtkJNCjkRSAt2 pSKA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1760733590; x=1761338390; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=XDDWqSIeqAGYMG3kwhMw01R+hkBPKmHoPxmzsfHmacs=; b=mcqou0qg3aTwS5EP0hUK5jI7flJjpo/Mcp/OrsGkehvVoMhQxzAONw6kVaVTpqBKvp QW2/FCemdIEKbJjCFhSi1yuhCm2oWTsa2d/O3c4TFfQtFwUqhBwgP6fX9AuqgHEYBDh7 gmJANPknWeYLVRA47+HvrNB5uE8yjA5Q25/MoAiHYseMNVtgfVqfepm3w5FjnmmJ9ILg 0KfTDFatX0DTgKyq4eaPtCFQirT+qgFsACnWJOJ3cUTU3b0zC2EZAI16Tmvs+3zIbWPW 089kY8phttO2s+lnkFcrPRiIdagVMrtXiAlB/LnXCHgxlK1zgLMxeHA23XWhKN/t/nRP ApPg== X-Gm-Message-State: AOJu0YySA3YIoDropDSHnSHe1Kxl1XakG4mlijuZDXh/Xc/2WZohZZY/ X6QnVvRcOa/6aRjQOSSS1A3vd4Ax1LbG6bWfFljOJzDd5VrcuNgjCWJGPqah8OzfFRpEKqZHLLa tha20X9o= X-Gm-Gg: ASbGncspCG8hQQ5fOAHIMjtfxd3/YVXS800HTCGcMJi1/gxRDzT/MF74L0ABZN2hmVs bCZQ5y3f8jKG22Klo+QqYj1xZV11figk4sIanf6TN+OyujDsWOWnfcxwW9e0Qo5+5OMu8XftRsj vz9DY1H7BeoHupFhvlGvvrO1M4e1Cw9Vs0RQJqmnHY6WqC6+oRAAaP/20TXhQZUD50XOfKHxW2h SlOD3JhmmSmrjFl3RQi/tQB61bDO3FoL6HnwDXVDv+sPw5pJgvi2RYdn1mQCJTi3kYwdD6hdG/x RgCAsNSz8lwQv8LJjlgYJcqAccurfUV82RwlSjRO90MyMAy8z92goSTSQNGugxtk4SKvhqqVjic hIAN0ShW2OIxM4wCd6AWTXIAAO6/4F1OS+VjiULPbMjMtq8pbo6AiApjcgDZszpvh/w== X-Google-Smtp-Source: AGHT+IFurHTJuusmbdh3E8Vsh/1CdDIdGX/cTSJM5ysuqNQ0lMZiRCS6sbJRqcjdttY1zMtjmthLgg== X-Received: by 2002:a05:6a20:430e:b0:32d:a70e:120a with SMTP id adf61e73a8af0-334a8621362mr7312443637.45.1760733590087; Fri, 17 Oct 2025 13:39:50 -0700 (PDT) Received: from hexa.. ([2602:feb4:3b:2100:aaee:e640:34cd:6f2]) by smtp.gmail.com with ESMTPSA id d2e1a72fcca58-7a2300f254esm477061b3a.45.2025.10.17.13.39.49 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 17 Oct 2025 13:39:49 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][scarthgap 16/26] linux-yocto/6.6: update to v6.6.102 Date: Fri, 17 Oct 2025 13:38:59 -0700 Message-ID: <9c0af64f5b688d89349a80cb27bbbc451abfab38.1760733431.git.steve@sakoman.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 17 Oct 2025 20:39:53 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/225050 From: Bruce Ashfield Updating linux-yocto/6.6 to the latest korg -stable release that comprises the following commits: no ids found, dumping: bb9c90ab9c5a Linux 6.6.102 aada327a9f80 usb: gadget : fix use-after-free in composite_dev_cleanup() e1ee74b9eeb2 mm/hmm: move pmd_to_hmm_pfn_flags() to the respective #ifdeffery d98b34c40dc7 MIPS: mm: tlb-r4k: Uniquify TLB entries on init ab85071a0354 x86/fpu: Delay instruction pointer fixup until after warning 575b71627529 ALSA: scarlett2: Add retry on -EPROTO from scarlett2_usb_tx() 48a8a2dfc3f5 ALSA: intel_hdmi: Fix off-by-one error in __hdmi_lpe_audio_probe() 1fb873971e23 x86/sev: Evict cache lines during SNP memory validation fdf6959b700b net: usbnet: Fix the wrong netif_carrier_on() call 3c6236588dc8 net: usbnet: Avoid potential RCU stall on LINK_CHANGE event 2b98a1539736 Bluetooth: btusb: Add USB ID 3625:010b for TP-LINK Archer TX10UB Nano ae591cf2348a sched,freezer: Remove unnecessary warning in __thaw_task 036bdae8c985 freezer,sched: Clean saved_state when restoring it during thaw 2e62985121b7 freezer,sched: Do not restore saved_state of a thawed task e241ca2f0ec3 freezer,sched: Use saved_state to reduce some spurious wakeups 8afa818c7733 sched/core: Remove ifdeffery for saved_state 2c9a096e202c i2c: stm32f7: unmap DMA mapped buffer bab0986dc045 i2c: stm32f7: simplify status messages in case of errors d786b6592030 i2c: stm32f7: perform most of irq job in threaded handler 9bfaaa964014 i2c: stm32f7: use dev_err_probe upon calls of devm_request_irq de7c7caea59b i2c: stm32f7: Use devm_clk_get_enabled() 66bf243531ee USB: serial: option: add Foxconn T99W709 2f4d88f5e5ee smb: server: Fix extension string in ksmbd_extract_shortname() fa1c47af4ff6 ksmbd: limit repeated connections from clients with the same IP 62d136d30621 ksmbd: fix corrupted mtime and ctime in smb2_open b69fd87076da ksmbd: fix Preauh_HashValue race condition d79c8bebaa62 ksmbd: fix null pointer dereference error in generate_encryptionkey 44bd006d5c93 vsock: Do not allow binding to VMADDR_PORT_ANY 88caf46db823 net/packet: fix a race in packet_set_ring() and packet_notifier() 29d417b1a0d5 selftests/perf_events: Add a mmap() correctness test 6757a31a8e29 perf/core: Prevent VMA split of buffer mappings f41e9eba77bf perf/core: Exit early on perf_mmap() fail f07ab7a4b572 perf/core: Don't leak AUX buffer refcount on allocation failure b1df39462171 sunrpc: fix handling of server side tls alerts d2622f38652c smb: client: return an error if rdma_connect does not return within 5 seconds bd7f84df5436 pptp: fix pptp_xmit() error path 4e5cf39e4064 smb: client: let recv_done() cleanup before notifying the callers. 83d2a4185f5a smb: client: make sure we call ib_dma_unmap_single() only if we called ib_dma_map_single already f069f7c14204 smb: client: make use of common smbdirect_socket 947569b95987 smb: smbdirect: add smbdirect_socket.h 61f0a6849005 smb: client: Correct typos in multiple comments across various files 91d7e6cbb3f8 smb: client: Use min() macro c29dbc44fbf7 smb: server: let recv_done() avoid touching data_transfer after cleanup/move 66110b35bebc smb: server: let recv_done() consistently call put_recvmsg/smb_direct_disconnect_rdma_connection e67aff50476f smb: server: make sure we call ib_dma_unmap_single() only if we called ib_dma_map_single already 28db0cb8a0da smb: server: remove separate empty_recvmsg_queue 2e4463f44e9b ALSA: hda/ca0132: Fix missing error handling in ca0132_alt_select_out() cd2a7f950038 irqchip: Build IMX_MU_MSI only on ARM 39491e859fd4 net/sched: mqprio: fix stack out-of-bounds write in tc entry parsing c377ba2be943 benet: fix BUG when creating VFs a55b3d153318 sunrpc: fix client side handling of tls alerts a7176675c39a net/sched: taprio: enforce minimum value for picos_per_byte 0d45954034f8 net: drop UFO packets in udp_rcv_segment() ef05007b403d ipv6: reject malicious packets in ipv6_gso_segment() 194cd28c889a net/mlx5: Correctly set gso_segs when LRO is used 97ed92a23f0b netlink: specs: ethtool: fix module EEPROM input/output arguments 5005d2437737 pptp: ensure minimal skb length in pptp_xmit() 5fde6e016004 net: ipa: add IPA v5.1 and v5.5 to ipa_version_string() b80353a72958 phy: mscc: Fix parsing of unicast frames b0cf318f5cc6 netpoll: prevent hanging NAPI when netcons gets enabled 227154eb7567 md/md-cluster: handle REMOVE message earlier 75ed1f6ed8ee NFS: Fixup allocation flags for nfsiod's __GFP_NORETRY 1116e66111f8 NFSv4.2: another fix for listxattr 12ad3def2e5e NFS: Fix filehandle bounds checking in nfs_fh_to_dentry() 30a739931ed8 NFS: Fix wakeup of __nfs_lookup_revalidate() in unblock_revalidate() 147216030e46 sched: Add test_and_clear_wake_up_bit() and atomic_dec_and_wake_up() 3bdb29df2f0d pNFS/flexfiles: don't attempt pnfs on fatal DS errors 6e7b24c71e53 PCI: pnv_php: Fix surprise plug detection and recovery a426e8a6ae16 powerpc/eeh: Make EEH driver device hotplug safe 3f49abdf88b6 powerpc/eeh: Export eeh_unfreeze_pe() 17dabd7efb28 PCI: pnv_php: Work around switches with broken presence detection 32173edf3fe2 PCI: pnv_php: Clean up allocated IRQs on unplug 9184a2bb522c sched/psi: Fix psi_seq initialization 9ea1cc8b0e95 kconfig: qconf: fix ConfigList::updateListAllforAll() 05b450da93c6 scsi: sd: Make sd shutdown issue START STOP UNIT appropriately 450b2a5cf6e4 scsi: ufs: core: Use link recovery when h8 exit fails during runtime resume 4933567ef9e6 scsi: Revert "scsi: iscsi: Fix HW conn removal use after free" 087a8a7ca354 scsi: mpt3sas: Fix a fw_event memory leak 349436bf11b8 vfio/pci: Separate SR-IOV VF dev_set 7dbfae90c5a3 vfio/pds: Fix missing detach_ioas op 9546b26d391f vfio: Prevent open_count decrement to negative a6c5e25861e3 vfio: Fix unbalanced vfio_df_close call in no-iommu mode f289690f50a0 f2fs: fix to trigger foreground gc during f2fs_map_blocks() in lfs mode 704613681c1c f2fs: fix to calculate dirty data during has_not_enough_free_secs() e33c22f2eeba f2fs: fix to update upper_p in __get_secs_required() correctly 1023836d1b94 f2fs: vm_unmap_ram() may be called from an invalid context 345fc8d1838f f2fs: fix to avoid out-of-boundary access in devs.path 880ef748e78a f2fs: fix to avoid panic in f2fs_evict_inode 3d37cadaac1a f2fs: fix to avoid UAF in f2fs_sync_inode_meta() a96f2bf49fbd f2fs: doc: fix wrong quota mount option description dabfa3952c8e f2fs: fix KMSAN uninit-value in extent_info usage c1c818b636d4 rtc: rv3028: fix incorrect maximum clock rate handling f5790cc2ee6f rtc: pcf8563: fix incorrect maximum clock rate handling e337c72b17c6 rtc: pcf85063: fix incorrect maximum clock rate handling 8456b3e28acf rtc: nct3018y: fix incorrect maximum clock rate handling 17827903802b rtc: hym8563: fix incorrect maximum clock rate handling bb94a96374db rtc: ds1307: fix incorrect maximum clock rate handling 15da236904ec ucount: fix atomic_long_inc_below() argument type f9bd692540d8 module: Restore the moduleparam prefix length check 7500ba6533ab apparmor: fix loop detection used in conflicting attachment resolution fad01f7e0d3e apparmor: ensure WB_HISTORY_SIZE value is a power of 2 4795bcafe9a8 bpf: Check netfilter ctx accesses are aligned f56f6054791e bpf: Check flow_dissector ctx accesses are aligned d3bf3088f7e9 vhost-scsi: Fix log flooding with target does not exist errors ebc6e1d0e97a mtd: rawnand: atmel: set pmecc data setup time a01bc4245e43 mtd: rawnand: rockchip: Add missing check after DMA map 7d0b53a6d199 mtd: rawnand: atmel: Fix dma_mapping_error() address 505f4111dd98 jfs: fix metapage reference count leak in dbAllocCtl 4b5d36cc3014 fbdev: imxfb: Check fb_add_videomode to prevent null-ptr-deref 0aa273dbcf53 crypto: qat - fix seq_file position update in adf_ring_next() 1c178ccb6caf crypto: qat - fix DMA direction for compression on GEN2 devices 9ff4de5bd11a perf tools: Remove libtraceevent in .gitignore 106891c7bdbc sh: Do not use hyphen in exported variable name f658f3676538 ASoC: fsl_xcvr: get channel status data when PHY is not exists 3187ffe08ff0 dmaengine: nbpfaxi: Add missing check after DMA map 06ddbb28b72b dmaengine: mv_xor: Fix missing check after DMA map and missing unmap 25d15b0d2b42 fs/orangefs: Allow 2 more characters in do_c_string() b93d06499b6f PCI: endpoint: pci-epf-vntb: Fix the incorrect usage of __iomem attribute bdbaa1041816 soundwire: stream: restore params when prepare ports fail ac961f6c6dc5 crypto: img-hash - Fix dma_unmap_sg() nents value 06bc14f9d047 crypto: keembay - Fix dma_unmap_sg() nents value 5d481d4bea06 hwrng: mtk - handle devm_pm_runtime_enable errors 9c590ae73c3e watchdog: ziirave_wdt: check record length in ziirave_firm_verify() a23fa17e6bec scsi: isci: Fix dma_unmap_sg() nents value 401fcb7e557d scsi: mvsas: Fix dma_unmap_sg() nents value cf9c5b15c4ab scsi: elx: efct: Fix dma_unmap_sg() nents value 214f94ee5d77 scsi: ibmvscsi_tgt: Fix dma_unmap_sg() nents value 5b63d6dec556 clk: sunxi-ng: v3s: Fix de clock definition c07e017a56d6 perf tests bp_account: Fix leaked file descriptor 9b2a3e718902 pinmux: fix race causing mux_owner NULL with active mux_usecount 33c778ea0bd0 proc: use the same treatment to check proc_lseek as ones for proc_read_iter et.al adf2da0bf119 kernel: trace: preemptirq_delay_test: use offstack cpu mask 5449e60e1cbb RDMA/hns: Fix -Wframe-larger-than issue db1114685317 crypto: ccp - Fix crash when rebind ccp device for ccp.ko a762bbe11269 crypto: inside-secure - Fix `dma_unmap_sg()` nents value b86fd2e61a2c perf sched: Fix memory leaks in 'perf sched latency' 282d4b34694f perf sched: Fix memory leaks for evsel->priv in timehist 16ce5ce11145 perf sched: Free thread->priv using priv_destructor e5de9ea7796e perf dso: Add missed dso__put to dso__load_kcore 9fe9f9459951 perf tools: Fix use-after-free in help_unknown_cmd() a99cae46ab16 Fix dma_unmap_sg() nents value 8724a228be43 clk: clk-axi-clkgen: fix fpfd_max frequency for zynq 45338af03ff3 fanotify: sanitize handle_type values when reporting fid e8b4c9e60a7a pinctrl: sunxi: Fix memory leak on krealloc failure 85a7746a05ea PCI: endpoint: pci-epf-vntb: Return -ENOENT if pci_epc_get_next_free_bar() fails 3f5186fd43be crypto: arm/aes-neonbs - work around gcc-15 warning f693be157c59 power: supply: max14577: Handle NULL pdata when CONFIG_OF is not set 8e9bdb563916 power: supply: cpcap-charger: Fix null check for power_supply_get_by_name 51990eecf22f clk: xilinx: vcu: unregister pll_post only if registered correctly a2b437a88370 media: v4l2-ctrls: Fix H264 SEPARATE_COLOUR_PLANE check 1d92608a2925 clk: davinci: Add NULL check in davinci_lpsc_clk_register() 530d4db6fb89 mtd: fix possible integer overflow in erase_xfer() aff3e6eacef2 crypto: marvell/cesa - Fix engine load inaccuracy be1e15938a16 crypto: qat - use unmanaged allocation for dc_data 25c161a8bed1 crypto: sun8i-ce - fix nents passed to dma_unmap_sg() 0c93cd98d0c8 PCI: rockchip-host: Fix "Unexpected Completion" log message e1c3d14c8252 bpf/preload: Don't select USERMODE_DRIVER 3bb72c2e9622 ipv6: annotate data-races around rt->fib6_nsiblings 9cb6de8ee144 ipv6: fix possible infinite loop in fib6_info_uses_dev() e1b7932af47f ipv6: prevent infinite loop in rt6_nlmsg_size() f237664113fe vrf: Drop existing dst reference in vrf_ip6_input_dst dddfc5a996af selftests: rtnetlink.sh: remove esp4_offload after test 314f568b84b0 net/mlx5e: Remove skb secpath if xfrm state is not found 4d81205d27c3 net/mlx5e: Clear Read-Only port buffer size in PBMC before update 58004aa21e79 netfilter: xt_nfacct: don't assume acct name is null-terminated 9705b8b92d6a can: kvaser_usb: Assign netdev.dev_port based on device channel index 56a17d28c3dd can: kvaser_pciefd: Store device channel index 2ac7efc5deef can: peak_usb: fix USB FD devices potential malfunction c9be5abdaf2e tools/rv: Do not skip idle in trace ee2502485702 bpf: Disable migration in nf_hook_run_bpf(). 9d5aecb57e93 Bluetooth: hci_event: Mask data status from LE ext adv reports cdb509f59aaf kcsan: test: Initialize dummy variable bf88b7c114d4 wifi: mac80211: Write cnt before copying in ieee80211_copy_rnr_beacon() 50e98be435df wifi: brcmfmac: fix P2P discovery failure in P2P peer due to missing P2P IE 21e317484d3b wifi: ath12k: fix endianness handling while accessing wmi service bit dde152043f6d Reapply "wifi: mac80211: Update skb's control block key in ieee80211_tx_dequeue()" 9c8e9da118a8 wifi: mac80211: Check 802.11 encaps offloading in ieee80211_tx_h_select_key() f74d4525ebad wifi: mac80211: Don't call fq_flow_idx() for management frames bc6f35967d9a wifi: mac80211: Do not schedule stopped TXQs 2874717012d1 wifi: plfxlc: Fix error handling in usb driver probe 378ae9ccaea3 wifi: mac80211: reject TDLS operations when station is not associated df51cc1e965a iommu/amd: Fix geometry.aperture_end for V2 tables 03df73480547 mwl8k: Add missing check after DMA map 5cb4349d0c35 wifi: rtl8xxxu: Fix RX skb size for aggregation disabled 20a1e6536424 tcp: call tcp_measure_rcv_mss() for ooo packets 9a20c9da5ff1 xen/gntdev: remove struct gntdev_copy_batch from stack c9eeae9639ea net_sched: act_ctinfo: use atomic64_t for three counters 103c4e27ec9f net/sched: Restrict conditions for adding duplicating netems to qdisc tree 0967ee88ec1e um: rtc: Avoid shadowing err in uml_rtc_start() 98f1a97d8627 arch: powerpc: defconfig: Drop obsolete CONFIG_NET_CLS_TCINDEX 9ac58afb0cca netfilter: nf_tables: adjust lockdep assertions handling b488bee5e92f netfilter: nf_tables: Drop dead code from fill_*_info routines f56a863397f5 fbcon: Fix outdated registered_fb reference in comment b1c6b13f48a8 sched/psi: Optimize psi_group_change() cpu_clock() usage dabe5fc2ee7a drm/amd/pm/powerplay/hwmgr/smu_helper: fix order of mask and value 6e2f7903241c m68k: Don't unregister boot console needlessly 7f0377ca6993 drm/msm/dpu: Fill in min_prefill_lines for SC8180X 6d029d85aa2b kselftest/arm64: Fix check for setting new VLs in sve-ptrace f73c0bc2d1d3 net: dst: annotate data-races around dst->output e0b8b6687b7d net: dst: annotate data-races around dst->input 62d7cf455c88 net/mlx5: Check device memory pointer before usage c45a33903e24 tcp: fix tcp_ofo_queue() to avoid including too much DUP SACK range 5bf201c55fdf wifi: ath11k: clear initialized flag for deinit-ed srng lists ca980f1911a7 iwlwifi: Add missing check for alloc_ordered_workqueue d5491ff785f4 wifi: iwlwifi: Fix memory leak in iwl_mvm_init() 14ca6952691f wifi: rtl818x: Kill URBs before clearing tx status queue 892b29eab44b wifi: rtw89: avoid NULL dereference when RX problematic packet on unsupported 6 GHz band 655e3f51de5a caif: reduce stack size, again 0abd1f48cd25 bpftool: Fix memory leak in dump_xx_nlmsg on realloc failure 0f18414f1d6b drm/vmwgfx: Fix Host-Backed userspace on Guest-Backed kernel cc7af1b89c55 net: ipv6: ip6mr: Fix in/out netdev to pass to the FORWARD chain 3ca8e73c58bb selftests/bpf: fix signedness bug in redir_partial() 0e853c1464bc bpf, ktls: Fix data corruption when using bpf_msg_pop_data() in ktls c69d06498ea2 bpf, sockmap: Fix psock incorrectly pointing to sk c4a298ae0d36 drm/rockchip: cleanup fb when drm_gem_fb_afbc_init failed 8b0285fbbd81 selftests/tracing: Fix false failure of subsystem event test faa45887a63c staging: nvec: Fix incorrect null termination of battery manufacturer cc03984d7035 interconnect: qcom: sc8180x: specify num_nodes 37dfd6d6c9e4 interconnect: qcom: sc8280xp: specify num_links for qnm_a1noc_cfg 2fffa72282ed soc: qcom: pmic_glink: fix OF node leak 272cd1f24741 samples: mei: Fix building on musl libc f7e5ae0ddd12 cpufreq: Init policy->rwsem before it may be possibly used 39a0d418b321 cpufreq: Initialize cpufreq-based frequency-invariance later 1bc35f9a50e1 cpufreq: intel_pstate: Always use HWP_DESIRED_PERF in passive mode 81f506193700 PM / devfreq: Check governor before using governor->name 759b918c8f2e arm64: dts: imx8mn-beacon: Fix HS400 USDHC clock speed 1661ee5c2a41 arm64: dts: imx8mm-beacon: Fix HS400 USDHC clock speed d7b49f4f0da7 ARM: dts: imx6ul-kontron-bl-common: Fix RTS polarity for RS485 interface 4f886798e1a4 soc/tegra: cbb: Clear ERR_FORCE register with ERR_STATUS 632c151355ba arm: dts: ti: omap: Fixup pinheader typo 40ff7460a9a6 usb: early: xhci-dbc: Fix early_ioremap leak c6ec27091cf5 powercap: dtpm_cpu: Fix NULL pointer dereference in get_pd_power_uw() 91a177aafc53 Revert "vmci: Prevent the dispatching of uninitialized payloads" 7ed42b79118d pps: fix poll support 6696a46f4ebd vmci: Prevent the dispatching of uninitialized payloads b31cf6f7716a staging: fbtft: fix potential memory leak in fbtft_framebuffer_alloc() 6031a54f4eac spi: stm32: Check for cfg availability in stm32_spi_probe 490877203b40 usb: misc: apple-mfi-fastcharge: Make power supply names unique f24e5b445ab9 usb: host: xhci-plat: fix incorrect type for of_match variable in xhci_plat_probe() 448800900925 ARM: dts: vfxxx: Correctly use two tuples for timer address 964db8725937 arm64: dts: qcom: msm8976: Make blsp_dma controlled-remotely e1b4ca59f633 arm64: dts: qcom: sc7180: Expand IMEM region 2f4bad6b27c3 arm64: dts: qcom: sdm845: Expand IMEM region 603df70062fb soc: qcom: QMI encoding/decoding for big endian 41917d9ce43a selftests: Fix errno checking in syscall_user_dispatch test aa771d2928fe ASoC: mediatek: use reserved memory or enable buffer pre-allocation 4c39fc79ae25 ASoC: ops: dynamically allocate struct snd_ctl_elem_value ee1c30d7c6fc ASoC: soc-dai: tidyup return value of snd_soc_xlate_tdm_slot_mask() 1a91ba12abef gfs2: No more self recovery a936be9b5f51 Revert "fs/ntfs3: Replace inode_trylock with inode_lock" 084933961ecd hfsplus: remove mutex_lock check in hfsplus_free_extents 0926e13a47fc hfs: make splice write available again 1de5895fe68d hfsplus: make splice write available again d89f71aece34 ublk: use vmalloc for ublk_device's __queues b35a50d639ca fs/ntfs3: cancle set bad inode after removing name fails 8d1bfdd30d17 fs_context: fix parameter name in infofc() macro 15da73210929 audit,module: restore audit logging in load failure case 5974c913d6d9 ASoC: amd: yc: add DMI quirk for ASUS M6501RM 61e5aeff2424 ASoC: Intel: fix SND_SOC_SOF dependencies 7e98b00615c6 ASoC: amd: yc: Add DMI entries to support HP 15-fb1xxx 18196a40af52 ethernet: intel: fix building with large NR_CPUS 5f577d47bba6 ASoC: amd: yc: Add DMI quirk for HP Laptop 17 cp-2033dx Signed-off-by: Bruce Ashfield Signed-off-by: Steve Sakoman --- .../linux/linux-yocto-rt_6.6.bb | 6 ++-- .../linux/linux-yocto-tiny_6.6.bb | 6 ++-- meta/recipes-kernel/linux/linux-yocto_6.6.bb | 28 +++++++++---------- 3 files changed, 20 insertions(+), 20 deletions(-) diff --git a/meta/recipes-kernel/linux/linux-yocto-rt_6.6.bb b/meta/recipes-kernel/linux/linux-yocto-rt_6.6.bb index 990edea966..bb92f98616 100644 --- a/meta/recipes-kernel/linux/linux-yocto-rt_6.6.bb +++ b/meta/recipes-kernel/linux/linux-yocto-rt_6.6.bb @@ -14,13 +14,13 @@ python () { raise bb.parse.SkipRecipe("Set PREFERRED_PROVIDER_virtual/kernel to linux-yocto-rt to enable it") } -SRCREV_machine ?= "a5fb5e62dfdf67e8f12e9be81b74dea8230da1ca" -SRCREV_meta ?= "cdadebd03ef4e7a129f8525938385dba54e32e80" +SRCREV_machine ?= "5a1f8bcc75b8f9d5a7fca6cb99a103f8333d7dc5" +SRCREV_meta ?= "f3c786ad20e66517d28812760a884ac3d5dda3db" SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;branch=${KBRANCH};name=machine;protocol=https \ git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.6;destsuffix=${KMETA};protocol=https" -LINUX_VERSION ?= "6.6.101" +LINUX_VERSION ?= "6.6.102" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" diff --git a/meta/recipes-kernel/linux/linux-yocto-tiny_6.6.bb b/meta/recipes-kernel/linux/linux-yocto-tiny_6.6.bb index 33e7a094a5..b8fcd47971 100644 --- a/meta/recipes-kernel/linux/linux-yocto-tiny_6.6.bb +++ b/meta/recipes-kernel/linux/linux-yocto-tiny_6.6.bb @@ -8,7 +8,7 @@ require recipes-kernel/linux/linux-yocto.inc # CVE exclusions include recipes-kernel/linux/cve-exclusion_6.6.inc -LINUX_VERSION ?= "6.6.101" +LINUX_VERSION ?= "6.6.102" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}" @@ -17,8 +17,8 @@ DEPENDS += "openssl-native util-linux-native" KMETA = "kernel-meta" KCONF_BSP_AUDIT_LEVEL = "2" -SRCREV_machine ?= "fe405475e21ba69486139227f55cbc3a507b073b" -SRCREV_meta ?= "cdadebd03ef4e7a129f8525938385dba54e32e80" +SRCREV_machine ?= "25e12cc47d631ed5ba46a6a07acf85d7e1175fad" +SRCREV_meta ?= "f3c786ad20e66517d28812760a884ac3d5dda3db" PV = "${LINUX_VERSION}+git" diff --git a/meta/recipes-kernel/linux/linux-yocto_6.6.bb b/meta/recipes-kernel/linux/linux-yocto_6.6.bb index 826c1e02c8..3a99ce4f1e 100644 --- a/meta/recipes-kernel/linux/linux-yocto_6.6.bb +++ b/meta/recipes-kernel/linux/linux-yocto_6.6.bb @@ -18,25 +18,25 @@ KBRANCH:qemux86-64 ?= "v6.6/standard/base" KBRANCH:qemuloongarch64 ?= "v6.6/standard/base" KBRANCH:qemumips64 ?= "v6.6/standard/mti-malta64" -SRCREV_machine:qemuarm ?= "eec0d117c1da156e2c42a990ef9902e8bf526a3b" -SRCREV_machine:qemuarm64 ?= "7e67ed627f8cfb12bf0beb31d22038cc174f1413" -SRCREV_machine:qemuloongarch64 ?= "af73b639584c1149d99786ca0f235dcbb046ede1" -SRCREV_machine:qemumips ?= "990e670951b176b14bda639e0806364d3c2c560d" -SRCREV_machine:qemuppc ?= "22682716b343688c6e2454b6edca79e723cbd553" -SRCREV_machine:qemuriscv64 ?= "af73b639584c1149d99786ca0f235dcbb046ede1" -SRCREV_machine:qemuriscv32 ?= "af73b639584c1149d99786ca0f235dcbb046ede1" -SRCREV_machine:qemux86 ?= "af73b639584c1149d99786ca0f235dcbb046ede1" -SRCREV_machine:qemux86-64 ?= "af73b639584c1149d99786ca0f235dcbb046ede1" -SRCREV_machine:qemumips64 ?= "bcb7f967a647fbb74836a33d2ef5af6460e30074" -SRCREV_machine ?= "af73b639584c1149d99786ca0f235dcbb046ede1" -SRCREV_meta ?= "cdadebd03ef4e7a129f8525938385dba54e32e80" +SRCREV_machine:qemuarm ?= "465d211d5e4e5333b10eddfb597a03b340a1a8df" +SRCREV_machine:qemuarm64 ?= "57f28ca26dd5f2d2902dd674ed9c9bfafd84139b" +SRCREV_machine:qemuloongarch64 ?= "b5db76e52474d0ee7dbbb897cf02a2665f1a14fd" +SRCREV_machine:qemumips ?= "286ff567d5dcee9cd0b86850b93d1315035b5ece" +SRCREV_machine:qemuppc ?= "c4ee428a256735d175e14da9ebdfede7fa6b57b5" +SRCREV_machine:qemuriscv64 ?= "b5db76e52474d0ee7dbbb897cf02a2665f1a14fd" +SRCREV_machine:qemuriscv32 ?= "b5db76e52474d0ee7dbbb897cf02a2665f1a14fd" +SRCREV_machine:qemux86 ?= "b5db76e52474d0ee7dbbb897cf02a2665f1a14fd" +SRCREV_machine:qemux86-64 ?= "b5db76e52474d0ee7dbbb897cf02a2665f1a14fd" +SRCREV_machine:qemumips64 ?= "dd35c2cddf4a3171b9a0d73410b6ac56780855b3" +SRCREV_machine ?= "b5db76e52474d0ee7dbbb897cf02a2665f1a14fd" +SRCREV_meta ?= "f3c786ad20e66517d28812760a884ac3d5dda3db" # set your preferred provider of linux-yocto to 'linux-yocto-upstream', and you'll # get the /base branch, which is pure upstream -stable, and the same # meta SRCREV as the linux-yocto-standard builds. Select your version using the # normal PREFERRED_VERSION settings. BBCLASSEXTEND = "devupstream:target" -SRCREV_machine:class-devupstream ?= "3a8ababb8b6a0ced2be230b60b6e3ddbd8d67014" +SRCREV_machine:class-devupstream ?= "bb9c90ab9c5a1a933a0dfd302a3fde73642b2b06" PN:class-devupstream = "linux-yocto-upstream" KBRANCH:class-devupstream = "v6.6/base" @@ -44,7 +44,7 @@ SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;name=machine;branch=${KBRA git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.6;destsuffix=${KMETA};protocol=https" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" -LINUX_VERSION ?= "6.6.101" +LINUX_VERSION ?= "6.6.102" PV = "${LINUX_VERSION}+git" From patchwork Fri Oct 17 20:39:00 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 72619 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id DAC2FCCD1A4 for ; Fri, 17 Oct 2025 20:39:53 +0000 (UTC) Received: from mail-pf1-f171.google.com (mail-pf1-f171.google.com [209.85.210.171]) by mx.groups.io with SMTP id smtpd.web11.3132.1760733593431509279 for ; Fri, 17 Oct 2025 13:39:53 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20230601.gappssmtp.com header.s=20230601 header.b=H0kJsDe5; spf=softfail (domain: sakoman.com, ip: 209.85.210.171, mailfrom: steve@sakoman.com) Received: by mail-pf1-f171.google.com with SMTP id d2e1a72fcca58-7835321bc98so2263743b3a.2 for ; Fri, 17 Oct 2025 13:39:53 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20230601.gappssmtp.com; s=20230601; t=1760733593; x=1761338393; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=wb33OUDEUwwDAnKNyMxopLg9MVSy44Tapjqm7qkDsTA=; b=H0kJsDe5pBMXNmZFq8ZHojP36ANz1c+9GaPdfw+w1ofj/6H1+NVD5/DYDWUkhFBtlK cb1KeOQ3U+5rXEE2w2oW74Hp1qiOy49M+hEjfky1B7p0N9bF8//3lXAJdQSlbR9LedGI rtRsOqa1hgRIalh88UftQqzwIKlnssQP25uj6fBmXSWtU+A8jZAnPDJEaZIvD4b5+gk4 2SUhkxHlVucViKR+TfcnEr1jHR/r/BRv1+KbmEwMJGtKL4t2qj0/vOr/7UpTf3TxMgtr TMWRZrMRYrHjQ2hSeM659eMu1gsYP57vbReXxtbyPeMuy8dZnfMwYmP0UMbHJ+2S+1eH eL2A== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1760733593; x=1761338393; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=wb33OUDEUwwDAnKNyMxopLg9MVSy44Tapjqm7qkDsTA=; b=S1LUWAObFT7vvpNbkm8laeCRKgZJo0VrOzhIgIc88fQSaZz3JBsygCjkNNJqec4Oo7 pqguRXaL3FKMV95pnnXR0A7cQCpzmP6Nuh/F20id2lBgAYaawrqBf/a6p7o+A2cxlsDg zVOBGJs0gHL7nfL5gX5Ye2MOetCOdEiQMFovJyDwpqDaDpAZkm4S7LLKoQrMpMnXcvPu Gt0rC2I8K5fvt006C/6xyOKrIm2dEKIM+UoU37lggpcD2X900l32uyJ9sXNDvX0eXHDI qRmzgXz2rghSEAGj90Lv81coQjWLVDSdlbrtrgPTRPbww2aOnzNAsBqsKtF7gRupOKr6 0xjA== X-Gm-Message-State: AOJu0Yy7LCytNgQf4xXnrKjcQRwlnbKan5utSyXd98oU3MC+Jp3V/OSx Hs3g4OdB5qlMUJWiHx63pEP/AZbCi4HVjm6Oku5avl0Rr1ucJo3d72eiUJkepeLY+LVU4M+mbhy PhW4tl5o= X-Gm-Gg: ASbGncuqW9tslIzOCnhElK7iUB8l7Z6KlEE1VXRxfjVe5l6t9Mv6qCAGr9d7jKMbPLW kZctZX4KzMGjO77DA5T2UPjOh/mM1RYhrMBTOxymHzWsLFo185HTr9SIwbF7Hlr/kp09AB4vSFT t5JrTKocXM1yaIdvcmofxh8ieV1jXRYhFUeGNKTrdWLk64v/0nLPb5Eo4LO6j5ZYlxLj28c99bM 2wmKLoZtO54YENl+1WoHkN1brcaxMYW/pVi2VfRi6tmqgV4JNz7zcgZmYwkQIqa57GbIZ3cCL3r lZnpkB/PbRw7MU1tz4E0EBd9dpxdHqJi33hrejROccgcOvCUw8hOYvdYz7avPIoBW0xtdb9ixbC kEbhKEL7/wDmUNkIz/4JWDqhmQvK8b1FReGZryvfApe1fejeqKai+0NQsDFqMp6jM67aD5+5DGK ZO X-Google-Smtp-Source: AGHT+IE3MeVYlYORoFIFyCgrZbweZ+d9KXFqWdhAgwd8S5YLLe9WqPqeypo+rDBO1bHd4fEA1cncOw== X-Received: by 2002:a05:6a20:158a:b0:2f3:f59b:3b03 with SMTP id adf61e73a8af0-334a861fe16mr7076356637.42.1760733592076; Fri, 17 Oct 2025 13:39:52 -0700 (PDT) Received: from hexa.. ([2602:feb4:3b:2100:aaee:e640:34cd:6f2]) by smtp.gmail.com with ESMTPSA id d2e1a72fcca58-7a2300f254esm477061b3a.45.2025.10.17.13.39.51 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 17 Oct 2025 13:39:51 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][scarthgap 17/26] linux-yocto/6.6: update to v6.6.103 Date: Fri, 17 Oct 2025 13:39:00 -0700 Message-ID: X-Mailer: git-send-email 2.43.0 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 17 Oct 2025 20:39:53 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/225051 From: Bruce Ashfield Updating linux-yocto/6.6 to the latest korg -stable release that comprises the following commits: no ids found, dumping: cc1a1c5b404a Linux 6.6.103 40b36d9a612b alloc_fdtable(): change calling conventions. a0a3ace2a578 netfilter: nf_reject: don't leak dst refcount for loopback packets c1aa819059b8 s390/hypfs: Enable limited access during lockdown 972d84075e3b s390/hypfs: Avoid unnecessary ioctl registration in debugfs 81a0f002e4fd ALSA: usb-audio: Use correct sub-type for UAC3 feature unit validation 7d67d591ecb0 net/mlx5e: Preserve shared buffer capacity during headroom updates dacf1ca11735 net/mlx5: Base ECVF devlink port attrs from 0 c71a3e2b02e7 Octeontx2-af: Skip overlap check for SPI field 2919ca876e15 bonding: send LACPDUs periodically in passive mode after receiving partner's LACPDU 45b70352d186 bonding: Add independent control state machine f0c7885ef8d3 bonding: update LACP activity flag after setting lacp_active ca88ac44368c net/sched: Remove unnecessary WARNING condition for empty child qdisc in htb_activate aa12ee1c1bd2 net/sched: Make cake_enqueue return NET_XMIT_CN when past buffer_limit ee7134481ff7 igc: fix disabling L1.2 PCI-E link substate on I226 on init d10f670b6f86 ixgbe: xsk: resolve the negative overflow of budget in ixgbe_xmit_zc 5189c0b7c251 LoongArch: Optimize module load time by optimizing PLT/GOT counting 070b4af44c4b net/smc: fix UAF on smcsk after smc_listen_out() ba51d73408ed gve: prevent ethtool ops after shutdown 748da8083122 net: usb: asix_devices: Fix PHY address mask in MDIO bus initialization 3a4eeea79a46 phy: mscc: Fix timestamping for vsc8584 ca18d751bcc9 ppp: fix race conditions in ppp_fill_forward_path 06a7acd45a8f net: ethernet: mtk_ppe: add RCU lock around dev_fill_forward_path 87f78799e358 ipv6: sr: validate HMAC algorithm ID in seg6_hmac_info_add 2156d9e9f2e4 net: gso: Forbid IPv6 TSO with extensions on devices with only IPV6_CSUM 857b8387a977 drm/amd/display: Add null pointer check in mod_hdcp_hdcp1_create_session() b79027f7ebb7 ALSA: usb-audio: Fix size validation in convert_chmap_v3() f93032e5d68f drm/hisilicon/hibmc: fix the hibmc loaded failed bug e50599adc966 mlxsw: spectrum: Forward packets with an IPv4 link-local source IP 469c45c8a16a Bluetooth: hci_conn: do return error from hci_enhanced_setup_sync() ae1d9779f089 Bluetooth: hci_event: fix MTU for BN == 0 in CIS Established 8f80c633cba1 iommu/amd: Avoid stack buffer overflow from kernel cmdline f5ad0819f902 scsi: qla4xxx: Prevent a potential error pointer dereference 96476b043efb net: bridge: fix soft lockup in br_multicast_query_expired() 7aee3d519d63 RDMA/bnxt_re: Fix to initialize the PBL array 5d3f018fc09a RDMA/bnxt_re: Fix to remove workload check in SRQ limit path 7b044e925aba RDMA/bnxt_re: Fix to do SRQ armena by default acf0dea8dc90 RDMA/erdma: Fix ignored return value of init_kernel_qp 76588276fcf8 iosys-map: Fix undefined behavior in iosys_map_clear() 34c3bc762bc4 cgroup/cpuset: Use static_branch_enable_cpuslocked() on cpusets_insane_config_key 72553fe19317 drm/nouveau/nvif: Fix potential memory leak in nvif_vmm_ctor(). ad994eda5d95 spi: spi-fsl-lpspi: Clamp too high speed_hz 7207923d8453 x86/cpu/hygon: Add missing resctrl_cpu_detect() in bsp_init helper 4986548825fe usb: typec: maxim_contaminant: disable low power mode when reading comparator values f56e75b85b54 usb: typec: maxim_contaminant: re-enable cc toggle if cc is open and port is clean e600de541c37 usb: xhci: Fix slot_id resource race conflict 8d2b63fbfd4d iio: imu: inv_icm42600: change invalid data error to -EBUSY 0af5812acfac iio: imu: inv_icm42600: Convert to uXX and sXX integer types ec3310a5168b iio: imu: inv_icm42600: use = { } instead of memset() f52d8ba43259 iio: imu: inv_icm42600: switch timestamp type from int64_t __aligned(8) to aligned_s64 f13768b9b829 iio: temperature: maxim_thermocouple: use DMA-safe buffer for spi_read() 99b508340d0d iio: light: as73211: Ensure buffer holes are zeroed 58ff8064cb4c tracing: Limit access to parser->buffer when trace_get_user failed 648e01a023cb tracing: Remove unneeded goto out logic c09dd3773b59 tls: fix handling of zero-length records on the rx_list 93879b3ba967 powerpc/boot: Fix build with gcc 15 5c67f7e4330e mmc: sdhci-pci-gli: GL9763e: Mask the replay timer timeout of AER 03695cdfcb5e compiler: remove __ADDRESSABLE_ASM{_STR,}() again fa833df2ba9e drm/amd/display: Don't overclock DCE 6 by 15% 7660124e6506 usb: dwc3: pci: add support for the Intel Wildcat Lake 84c95dbf5bec usb: dwc3: Remove WARN_ON for device endpoint command timeouts 319aba29a486 usb: dwc3: Ignore late xferNotReady event to prevent halt timeout dbfaa79103b4 USB: storage: Ignore driver CD mode for Realtek multi-mode Wi-Fi dongles bf29c9618160 usb: storage: realtek_cr: Use correct byte order for bcs->Residue adfdc6ed189b USB: storage: Add unusual-devs entry for Novatek NTK96550-based camera cd3bace9c9a3 usb: renesas-xhci: Fix External ROM access timeouts 3b4a57b5cc3b usb: core: hcd: fix accessing unmapped memory in SINGLE_STEP_SET_FEATURE test d84f6e77ebe3 comedi: Fix use of uninitialized memory in do_insn_ioctl() and do_insnlist_ioctl() 0eb4ed2aa261 comedi: pcl726: Prevent invalid irq number 842f307a1d11 comedi: Make insn_rw_emulate_bits() do insn->n samples decaa5401cb4 usb: quirks: Add DELAY_INIT quick for another SanDisk 3.2Gen1 Flash Drive 20729b825914 cdx: Fix off-by-one error in cdx_rpmsg_probe() 4de009fc0a3a most: core: Drop device reference after usage in get_channel() bc4e3186a2e2 iio: proximity: isl29501: fix buffered read on big-endian systems 6a605d307b02 iio: pressure: bmp280: Use IS_ERR() in bmp280_common_probe() 3b114a3282ab ftrace: Also allocate and copy hash for reading of filter files bb912a20fab0 fpga: zynq_fpga: Fix the wrong usage of dma_map_sgtable() 65e46aeaf84a drm/dp: Change AUX DPCD probe address from DPCD_REV to LANE0_1_STATUS d404824f3d25 cpuidle: governors: menu: Avoid selecting states with too much latency 3a92598c3e55 cpuidle: menu: Remove iowait influence f0aa8591ba0c mmc: sdhci-pci-gli: Add a new function to simplify the code 1eae029f79b6 mmc: sdhci-pci-gli: Use PCI AER definitions, not hard-coded values fd269466abe6 selftests: mptcp: pm: check flush doesn't reset limits a9cf4362d4d0 mptcp: disable add_addr retransmission when timeout is 0 ebe3d8cf1ee6 mptcp: remove duplicate sk_reset_timer call 1982e18bbcc1 use uniform permission checks for all mount propagation changes c5aa6ba11273 fs/buffer: fix use-after-free when call bh_read() helper 212eb86f75b4 smb: server: split ksmbd_rdma_stop_listening() out of ksmbd_rdma_destroy() 740ccba37a12 arm64: dts: ti: k3-am62-main: Remove eMMC High Speed DDR support 342f7a1dda77 ext4: preserve SB_I_VERSION on remount 047b4cb30e42 scsi: mpi3mr: Serialize admin queue BAR writes on 32-bit systems c065c8d20dd0 scsi: mpi3mr: Drop unnecessary volatile from __iomem pointers 6d53b2a134da scsi: ufs: exynos: Fix programming of HCI_UTRL_NEXUS_TYPE 0c3333f7bfee PCI: imx6: Add IMX8MM_EP and IMX8MP_EP fixed 256-byte BAR 4 in epc_features d0252e69b932 PCI: imx6: Delay link start until configfs 'start' written cee067ef2055 PCI: rockchip: Set Target Link Speed to 5.0 GT/s before retraining 7b688b365ace PCI: rockchip: Use standard PCIe definitions 72ff3acf0044 soc: qcom: mdt_loader: Fix error return values in mdt_header_valid() ef2f64dff281 drm/amd/display: Fill display clock and vblank time in dce110_fill_display_configs a98aa702c74f drm/amd/display: Find first CRTC and its line time in dce110_fill_display_configs e95f4fd56f6c drm/amd/display: Fix DP audio DTO1 clock source on DCE 6. 5b011264c5da drm/amd/display: Fix fractional fb divider in set_pixel_clock_v3 36a6b43573d1 drm/amd/display: Avoid a NULL pointer dereference 86c2825791c3 s390/sclp: Fix SCCB present check 50db1ab0f3ec ALSA: hda/realtek: Add support for HP EliteBook x360 830 G6 and EliteBook 830 G6 0a1385336970 mm/memory-failure: fix infinite UCE for VM_PFNMAP pfn 63962ff932ef mm/debug_vm_pgtable: clear page table entries at destroy_args() 8d03bce0dcb2 squashfs: fix memory leak in squashfs_fill_super 92c9689646c8 mmc: sdhci-pci-gli: GL9763e: Rename the gli_set_gl9763e() for consistency 0207d8faa1fb memstick: Fix deadlock by moving removing flag earlier 28b82be094e2 KVM: arm64: Fix kernel BUG() due to bad backport of FPSIMD/SVE/SME fix d1446050a29a sched/fair: Fix frequency selection for non-invariant case 858e035ea448 topology: Set capacity_freq_ref in all cases 68df021d3cfa arm64/amu: Use capacity_ref_freq() to set AMU ratio cf4faefd3a7b cpufreq/cppc: Set the frequency used for computing the capacity 11da2b1ae4c9 energy_model: Use a fixed reference frequency 6688eb926932 cpufreq/schedutil: Use a fixed reference frequency 9771732ab39c cpufreq: Use the fixed and coherent frequency for scaling capacity 46db6d4797f1 sched/topology: Add a new arch_scale_freq_ref() method 0ed2068de1f9 kbuild: userprogs: use correct linker when mixing clang and GNU ld 5b7912d83962 ata: libata-scsi: Return aborted command when missing sense and result TF 9e9b1fa7ecaa PM: runtime: Take active children into account in pm_runtime_get_if_in_use() ac2e62cab097 PM: runtime: Simplify pm_runtime_get_if_active() usage c0f179c1547f ata: Fix SATA_MOBILE_LPM_POLICY description in Kconfig dc35f594b0d2 usb: dwc3: imx8mp: fix device leak at unbind 1636b5e9c354 mm/ptdump: take the memory hotplug lock inside ptdump_walk_pgd() 365771ee3dc8 wifi: mac80211: check basic rates validity in sta_link_apply_parameters b59bea60396c KVM: x86: Take irqfds.lock when adding/deleting IRQ bypass producer 65b6b10fc005 s390/mm: Remove possible false-positive warning in pte_free_defer() 0852c97fec9c btrfs: send: make fs_path_len() inline and constify its argument 8f3aae5fd76d btrfs: send: use fallocate for hole punching with send stream v2 f942e47453a8 btrfs: send: avoid path allocation for the current inode when issuing commands dbda681a0a93 btrfs: send: keep the current inode's path cached ffc19fe2a7ad btrfs: send: add and use helper to rename current inode when processing refs bfed58ed10f1 btrfs: send: only use boolean variables at process_recorded_refs() 253557254f8d btrfs: send: factor out common logic when sending xattrs b1947464c041 btrfs: populate otime when logging an inode item d7badc2ba4da btrfs: constify more pointer parameters 9dfdea89ceb3 btrfs: fix ssd_spread overallocation 9c64d6b07cbb btrfs: open code timespec64 in struct btrfs_inode 8f85af32692d xfs: fully decouple XFS_IBULK* flags from XFS_IWALK* flags 4734255ef39b btrfs: abort transaction on unexpected eb generation at btrfs_copy_root() 467dcf7e4a61 btrfs: always abort transaction on failure to add block group to free space tree 8c5bf13905f3 btrfs: move transaction aborts to the error site in add_block_group_free_space() b172535ccba1 btrfs: qgroup: fix race between quota disable and quota rescan ioctl d6f1a6c2f567 btrfs: don't ignore inode missing when replaying log tree a779d1dd7f2d usb: typec: fusb302: cache PD RX state 827f7b4fe051 PCI/ACPI: Fix runtime PM ref imbalance on Hot-Plug Capable ports 80617b3926b6 block: Make REQ_OP_ZONE_FINISH a write operation 6c77d4e0f6ad block: reject invalid operation in submit_bio_noacct 3bbd52a413fc fscrypt: Don't use problematic non-inline crypto engines c8a1e1f02921 leds: flash: leds-qcom-flash: Fix registry access after re-bind 71230248a711 leds: flash: leds-qcom-flash: Limit LED current based on thermal condition 84a24fb446ee net/sched: ets: use old 'nbands' while purging unused classes 81505f137b3a net_sched: sch_ets: implement lockless ets_dump() 00dc616e6cb5 smb: client: fix netns refcount leak after net_passive changes 2668e038800b net: better track kernel sockets lifetime ac90037bf398 net: Add net_passive_inc() and net_passive_dec(). 5dd481868eb1 selftests/memfd: add test for mapping write-sealed memfd read-only 2e4179698f84 mm: reinstate ability to map write-sealed memfd mappings read-only 87a75f68eaba mm: update memfd seal write check to include F_SEAL_WRITE 17c5d49beb6c mm: drop the assumption that VM_SHARED always implies writable 440d36847a12 mptcp: pm: kernel: flush: do not reset ADD_ADDR limit 253b7d8bafe6 mptcp: drop skb if MPTCP skb extension allocation fails cf0a88124e35 ACPI: pfr_update: Fix the driver update version check 3ddd55cf19ed ipv6: sr: Fix MAC comparison to be constant-time b117c41b0090 net, hsr: reject HSR frame if skb can't hold tag 3afdeb96dc5f drm/amd/display: Don't overwrite dce60_clk_mgr 39f187cbf7ed drm/amd/display: Add primary plane to commits for correct VRR handling 74ee7445c3b6 drm/amdkfd: Destroy KFD debugfs after destroy KFD wq 627f30a328f2 drm/amdgpu: update mmhub 3.0.1 client id mappings a3201e3b7cf1 drm/amdgpu: Avoid extra evict-restore process. 0e7f5f9aa498 drm/amd: Restore cached power limit during resume 002860142ceb media: venus: venc: Clamp param smaller than 1fps and bigger than 240 f866778583b6 media: venus: vdec: Clamp param smaller than 1fps and bigger than 240. f54be97bc69b media: venus: protect against spurious interrupts during probe 041015a46597 media: venus: hfi: explicitly release IRQ during teardown ba567c2e52fb media: venus: Add a check for packet size after reading from shared memory 03c0e00ccf59 media: qcom: camss: cleanup media device allocated resource on error path 3c0e4cc4f55f media: ivsc: Fix crash at shutdown due to missing mei_cldev_disable() calls 61f267b77dbc media: ov2659: Fix memory leaks in ov2659_probe() 1c2769dc8025 media: rainshadow-cec: fix TOCTOU race condition in rain_interrupt() 3d83d0b5ae50 media: usbtv: Lock resolution while streaming ecb7382089bc media: v4l2-ctrls: Don't reset handler's error in v4l2_ctrl_handler_free() b3433cffee8d media: verisilicon: Fix AV1 decoder clock frequency 6a41dc143e3c media: vivid: fix wrong pixel_array control size 8ad57bd4a952 media: imx: fix a potential memory leak in imx_media_csc_scaler_device_init() c231d1964878 media: hi556: correct the test pattern configuration 0148fcdd9140 media: gspca: Add bounds checking to firmware parser 85bfcb0e40fe parisc: Update comments in make_insert_tlb 9827b2b0c64e parisc: Try to fixup kernel exception in bad_area_nosemaphore path of do_page_fault() 8bccf47adbf6 parisc: Revise gateway LWS calls to probe user read access 4c981077255a parisc: Revise __get_user() to probe user read access d6ac1e11c4a0 parisc: Rename pte_needs_flush() to pte_needs_cache_flush() in cache.c 033605fb20a3 parisc: Makefile: explain that 64BIT requires both 32-bit and 64-bit compilers 69cf90e5aa50 parisc: Drop WARN_ON_ONCE() from flush_cache_vmap 0199adb6d1f2 parisc: Define and use set_pte_at() b334724f6b31 parisc: Check region is readable by user in raw_copy_from_user() fe0886c98b63 soc/tegra: pmc: Ensure power-domains are in a known state 41f40038de62 jbd2: prevent softlockup in jbd2_log_do_checkpoint() 92ef491b506a f2fs: fix to avoid out-of-boundary access in dnode page 5d109edb38c9 phy: qcom: phy-qcom-m31: Update IPQ5332 M31 USB phy initialization sequence adb482170045 vhost/vsock: Avoid allocating arbitrarily-sized SKBs ee438c492b2e vsock/virtio: Validate length in packet header before skb_put() 6ee4578274d1 PCI: endpoint: Fix configfs group removal on driver teardown 0758862386f1 PCI: endpoint: Fix configfs group list head handling d1f59c792c6f mtd: rawnand: renesas: Add missing check after DMA map fcb12d1e4163 mtd: rawnand: fsmc: Add missing check after DMA map 9de4819feef9 mtd: spinand: propagate spinand_wait() errors from spinand_write_page() b9e9afc35a89 mtd: spi-nor: Fix spi_nor_try_unlock_all() 749ccc175ca5 hwmon: (gsc-hwmon) fix fan pwm setpoint show functions 747977aeefd4 pwm: mediatek: Fix duty and period setting 070236488cc9 pwm: mediatek: Handle hardware enable and clock enable separately cbf3815d8c11 pwm: imx-tpm: Reset counter if CMOD is 0 aa48271f7bef wifi: ath11k: fix dest ring-buffer corruption when ring is full ee3c10c9738b wifi: ath11k: fix source ring-buffer corruption 069819aa84d2 wifi: ath11k: fix dest ring-buffer corruption daa2b66fa569 wifi: ath12k: fix dest ring-buffer corruption when ring is full bfd4918b2b9b wifi: ath12k: fix source ring-buffer corruption b5b6201a2b75 wifi: ath12k: fix dest ring-buffer corruption 97e07460ba85 wifi: brcmsmac: Remove const from tbl_ptr parameter in wlc_lcnphy_common_read_table() 296bcff76d41 iio: adc: ad_sigma_delta: change to buffer predisable 50e823a23816 iio: imu: bno055: fix OOB access of hw_xlate array e22e5ac22736 zynq_fpga: use sgtable-based scatterlist wrappers 981c845f2983 soc: qcom: mdt_loader: Ensure we don't read past the ELF header bfa87a2cafb5 ata: libata-scsi: Fix CDL control 6f5d34088250 scsi: ufs: ufs-pci: Fix default runtime and system PM levels 03d559670ccd scsi: ufs: ufs-pci: Fix hibernate state transition for Intel MTL-like host controllers 8247c4269acb ata: libata-scsi: Fix ata_to_sense_error() status handling 728abc895294 scsi: mpi3mr: Fix race between config read submit and interrupt completion 78f1d313442c dt-bindings: display: sprd,sharkl3-dsi-host: Fix missing clocks constraints c4adc491a326 dt-bindings: display: sprd,sharkl3-dpu: Fix missing clocks constraints 745c9b114eaf arm64: dts: ti: k3-am62-verdin: Enable pull-ups on I2C buses d1aca165c1f1 arm64: dts: ti: k3-am62a7-sk: fix pinmux for main_uart1 06c3fda2bda8 arm64: dts: ti: k3-pinctrl: Enable Schmitt Trigger by default 2fdddc181262 btrfs: zoned: fix write time activation failure for metadata block group 5fc0345e1af3 ext4: fix hole length calculation overflow in non-extent inodes e0bb195aea7a ext4: use kmalloc_array() for array space allocation 173270d9fe86 ext4: don't try to clear the orphan_present feature block device is r/o d387cee49cfe ext4: fix reserved gdt blocks handling in fsmap 052cd20d8d75 ext4: fix fsmap end of range reporting with bigalloc ab1cc862e55e ext4: check fast symlink for ea_inode correctly d0570a5b9ccc tracing: fprobe-event: Sanitize wildcard for fprobe event name d9e157fcfebc ksmbd: extend the connection limiting mechanism to support IPv6 a1d2bab4d533 ksmbd: fix refcount leak causing resource not released 820949bbf33f Revert "vgacon: Add check for vc_origin address range in vgacon_scroll()" 5858448a6c65 crypto: qat - flush misc workqueue during device shutdown fd2844179567 crypto: qat - lower priority for skcipher and aead algorithms ea95d4e8a263 lib/crypto: mips/chacha: Fix clang build and remove unneeded byteswap c82ad93be639 vt: defkeymap: Map keycodes above 127 to K_HOLE c0942ce38843 vt: keyboard: Don't process Unicode characters in K_OFF mode 5e17429679a8 bus: mhi: host: Detect events pointing to unexpected TREs 38de63c2876e bus: mhi: host: Fix endianness of BHI vector table e192ebb7521c usb: dwc3: meson-g12a: fix device leaks at unbind d52ad077933f usb: musb: omap2430: fix device leak at unbind 21c400de1079 usb: gadget: udc: renesas_usb3: fix device leak at unbind 295425f52052 usb: atm: cxacru: Merge cxacru_upload_firmware() into cxacru_heavy_init() e06e9ef1912c m68k: Fix lost column on framebuffer debug console b4b21367cb9c platform/chrome: cros_ec: Unregister notifier in cros_ec_unregister() 1bf5cc1edb37 cpufreq: armada-8k: Fix off by one in armada_8k_cpufreq_free_table() cb7b3633ed74 serial: 8250: fix panic due to PSLVERR 2328010117d0 rcu: Fix racy re-initialization of irq_work causing hangs 049874a185aa HID: apple: avoid setting up battery timer for devices without battery 05a40e70ff5a HID: magicmouse: avoid setting up battery timer when not needed 5661fdd218c2 RDMA/siw: Fix the sendmsg byte count in siw_tcp_sendpages b9669bedc63d tools/nolibc: fix spelling of FD_SETBITMASK in FD_* macros fdd1c9f78c24 media: uvcvideo: Do not mark valid metadata as invalid 8f274e2b05fd media: venus: Fix OOB read due to missing payload bound check a97e062e4ff3 media: uvcvideo: Fix 1-byte out-of-bounds read in uvc_parse_format() 1da95d3d4b7b mm/kmemleak: avoid deadlock by moving pr_warn() outside kmemleak_lock e21a3ddd5873 mm/kmemleak: avoid soft lockup in __kmemleak_do_cleanup() 74fb3b1b335b parisc: Makefile: fix a typo in palo.conf 2a70cbd1aef8 hv_netvsc: Fix panic during namespace deletion with VF 27b118aebdd8 fbdev: Fix vmalloc out-of-bounds write in fast_imageblit f83d4c81bda3 btrfs: do not allow relocation of partially dropped subvolumes 77e07f7226f4 btrfs: zoned: do not select metadata BG as finish target 6b801da8e146 btrfs: fix log tree replay failure due to file with 0 links and extents a002525b2fd7 btrfs: clear dirty status from extent buffer on error at insert_new_root() 99e36ff41a74 btrfs: zoned: do not remove unwritten non-data block group e02bdb223399 btrfs: abort transaction during log replay if walk_log_tree() failed ec5bfcfb6e0d btrfs: zoned: use filesystem size not disk size for reclaim decision 9dfe40cb6c2c cdc-acm: fix race between initial clearing halt and open 729ac69a3e81 thunderbolt: Fix copy+paste error in match_service_id() 5c4a2ffcbd05 comedi: fix race between polling and detaching e613904fa419 usb: typec: ucsi: Update power_supply on power role change ca9fb654f89b misc: rtsx: usb: Ensure mmc child device is active when card is present 5badd56c711e usb: core: config: Prevent OOB read in SS endpoint companion parsing 492207cf8372 ext4: fix largest free orders lists corruption on mb_optimize_scan switch 88d02c333989 ext4: fix zombie groups in average fragment size lists d19b817540c0 iommufd: Prevent ALIGN() overflow 2ccccb0e4178 iommufd: Report unmapped bytes in the error path of iopt_unmap_iova_range a11b6ee7cab8 iommu/arm-smmu-qcom: Add SM6115 MDSS compatible 7e0c0664e9aa cifs: reset iface weights when we cannot find a candidate 1b6310d14b13 drm/amdgpu: fix incorrect vm flags to map bo 3fbc2e43ab12 ASoC: fsl_sai: replace regmap_write with regmap_update_bits 8270fbcc1ec4 scsi: lpfc: Remove redundant assignment to avoid memory leak 063fe9b16be1 rtc: ds1307: remove clear of oscillator stop flag (OSF) in probe 24334f3cf8a2 pNFS: Fix uninited ptr deref in block/scsi layout 198f26c55779 pNFS: Handle RPC size limit for layoutcommits 2c5b079bcb31 pNFS: Fix disk addr range check in block/scsi layout cf949a960653 pNFS: Fix stripe mapping in block/scsi layout 3b9d69f0e68a block: avoid possible overflow for chunk_sectors check in blk_stack_limits() 1df5970cd93d ASoC: Intel: avs: Fix uninitialized pointer error in probe() f2e480950d1c net: phy: smsc: add proper reset flags for LAN8710A 6b93ab1ad84a ipmi: Fix strcpy source and destination the same 9da4d5c3ea6b kconfig: lxdialog: fix 'space' to (de)select options 44337363300f kconfig: gconf: fix potential memory leak in renderer_edited() e55c6f052032 kconfig: gconf: avoid hardcoding model2 in on_treeview2_cursor_changed() 933992c60c07 ipmi: Use dev_warn_ratelimited() for incorrect message warnings 2e07a9fe5117 vfio/mlx5: fix possible overflow in tracking max message size 48d7bdd8759c scsi: aacraid: Stop using PCI_IRQ_AFFINITY 0787a522cc9c scsi: target: core: Generate correct identifiers for PR OUT transport IDs a40c4af8083d scsi: Fix sas_user_scan() to handle wildcard and multi-channel scans 28d64271510e kconfig: nconf: Ensure null termination where strncpy is used 106ab3cd026f vfio/type1: conditional rescheduling while pinning 98b7b47cebe3 kconfig: lxdialog: replace strcpy() with strncpy() in inputbox.c b45134f72642 f2fs: check the generic conditions first 868f23286c1a exfat: add cluster chain loop check for dir 6af18148675f i2c: Force DLL0945 touchpad i2c freq to 100khz f8c001884bb4 apparmor: use the condition in AA_BUG_FMT even with debug disabled dd45d42ab290 dm-table: fix checking for rq stackable devices f4133dc2b93d dm-mpath: don't print the "loaded" message if registering fails cf4a40ad2116 i3c: master: Initialize ret in i3c_i2c_notifier_call() 4e24a6a42d91 i3c: don't fail if GETHDRCAP is unsupported 2e487c0fdeb9 apparmor: shift ouid when mediating hard links in userns ef8814a9d64a rtc: ds1307: handle oscillator stop flag (OSF) for ds1341 6e3733fe88a0 i3c: add missing include to internal header 6dd90afb3945 module: Prevent silent truncation of module name in delete_module(2) d386c8e4e587 md: dm-zoned-target: Initialize return variable r to avoid uninitialized use b0cab3d9c70d soundwire: Move handle_nested_irq outside of sdw_dev_lock 1e3697578567 soundwire: amd: serialize amd manager resume sequence during pm_prepare d2974cfd4fa6 crypto: octeontx2 - add timeout for load_fvc completion poll ae5a0993f1e4 media: uvcvideo: Fix bandwidth issue for Alcor camera 6bbaec6a0369 media: dvb-frontends: w7090p: fix null-ptr-deref in w7090p_tuner_write_serpar and w7090p_tuner_read_serpar 09906650484a media: dvb-frontends: dib7090p: fix null-ptr-deref in dib7090p_rw_on_apb() 77ac2addb1dc media: usb: hdpvr: disable zero-length read messages 1512ced62c87 media: tc358743: Increase FIFO trigger level to 374 9b023149b97a media: tc358743: Return an appropriate colorspace from tc358743_set_fmt 5c809ef89e1b media: tc358743: Check I2C succeeded during probe 815cb5818eef pinctrl: stm32: Manage irq affinity settings 67bca5b04313 scsi: mpi3mr: Correctly handle ATA device errors 80726da54c29 scsi: mpt3sas: Correctly handle ATA device errors 924226822419 power: supply: qcom_battmgr: Add lithium-polymer entry 7925dd68807c scsi: lpfc: Check for hdwq null ptr when cleaning up lpfc_vport structure 8c449e588d81 RDMA/core: reduce stack using in nldev_stat_get_doit() 89fdac333a17 RDMA: hfi1: fix possible divide-by-zero in find_hw_thread_mask() 773612b1edf3 dmaengine: stm32-dma: configure next sg only if there are more than 2 sgs 01c412e31d98 leds: leds-lp50xx: Handle reg to get correct multi_index 07cba8891f2c media: v4l2-common: Reduce warnings about missing V4L2_CID_LINK_FREQ control f54eacb5b7f8 MIPS: lantiq: falcon: sysctrl: fix request memory check logic f22de2027b20 MIPS: Don't crash in stack_top() for tasks without ABI or vDSO 9021924d8893 crypto: jitter - fix intermediary handling 173cfd741ad7 jfs: upper bound check of tree index in dbAllocAG 78989af5bbf5 jfs: Regular file corruption check 34d8e982bac4 jfs: truncate good inode pages when hard link is 0 39cfe2c83146 scsi: bfa: Double-free fix 2b98d2c23317 watchdog: iTCO_wdt: Report error if timeout configuration fails 7fe9533fb069 MIPS: vpe-mt: add missing prototypes for vpe_{alloc,start,stop,free} 6caa737a77a5 clk: qcom: ipq5018: keep XO clock always on 16e245176777 hwmon: (emc2305) Set initial PWM minimum value during probe based on thermal state d202efb10a4b watchdog: dw_wdt: Fix default timeout 478bd3bc4e7f fs/orangefs: use snprintf() instead of sprintf() 66a373f50b42 scsi: libiscsi: Initialize iscsi_conn->dd_data only if memory is allocated 4db46a83d817 phy: rockchip-pcie: Properly disable TEST_WRITE strobe signal 41368857a354 mfd: axp20x: Set explicit ID for AXP313 regulator 6c9e12fef997 clk: tegra: periph: Fix error handling and resolve unsigned compare warning d960f4b79391 ext4: do not BUG when INLINE_DATA_FL lacks system.data xattr de6af003239a crypto: hisilicon/hpre - fix dma unmap sequence cbe740de32bb fbdev: fix potential buffer overflow in do_register_framebuffer() 6daa13c20190 cifs: Fix calling CIFSFindFirst() for root path without msearch 74e7af8334c9 watchdog: sbsa: Adjust keepalive timeout to avoid MediaTek WS0 race condition 3a5236c610e2 drm/amd/display: Avoid configuring PSR granularity if PSR-SU not supported 8708914f05ec drm/amd/display: Only finalize atomic_obj if it was initialized 110822d339a0 vhost: fail early when __vhost_add_used() fails c2bdb45f366a vsock/virtio: Resize receive buffers so that each SKB fits in a 4K page bc9ef9783c6b net: dsa: b53: fix IP_MULTICAST_CTRL on BCM5325 e7a375453cca rcu: Fix rcu_read_unlock() deadloop due to IRQ work 58ed3ac8538c drm/ttm: Respect the shrinker core free target 39de3ce65635 drm/amd/display: Avoid trying AUX transactions on disconnected ports d02ee5eebbcf selftests/bpf: Fix a user_ringbuf failure with arm64 64KB page size c03a532fe1d3 bpf: Make reg_not_null() true for CONST_PTR_TO_MAP 86f3cff54956 uapi: in6: restore visibility of most IPv6 socket options 3c9ca275100e drm/ttm: Should to return the evict error e4b67ceb8634 drm: renesas: rz-du: mipi_dsi: Add min check for VCLK range 1df5e6eb71e4 net: ncsi: Fix buffer overflow in fetching version id 859c54bb0120 ionic: clean dbpage in de-init ec33caca7662 wifi: rtlwifi: fix possible skb memory leak in _rtl_pci_init_one_rxdesc() c2e719bcaa26 ptp: Use ratelimite for freerun error message 868b52651f69 bpftool: Fix JSON writer resource leak in version command d930e738c0a8 net: dsa: b53: prevent SWITCH_CTRL access on BCM5325 8609f3c44e27 net: dsa: b53: prevent DIS_LEARNING access on BCM5325 bc0e01d663f4 net: dsa: b53: prevent GMII_PORT_OVERRIDE_CTRL access on BCM5325 668280aa65fc net: dsa: b53: fix b53_imp_vlan_setup for BCM5325 7f36d13d5243 gve: Return error for unknown admin queue command a1172cbfe51c net: vlan: Replace BUG() with WARN_ON_ONCE() in vlan_dev_* stubs 8d1f4798c876 net: vlan: Make is_vlan_dev() a stub when VLAN is not configured 63acb8e26620 drm/amd: Allow printing VanGogh OD SCLK levels without setting dpm to manual 50dbeff47178 dpaa_eth: don't use fixed_phy_change_carrier 7c299d0bc983 neighbour: add support for NUD_PERMANENT proxy entries a70c31416ddd wifi: iwlegacy: Check rate_idx range after addition ad8742e2d1da netmem: fix skb_frag_address_safe with unreadable skbs 88517afa7401 powerpc: floppy: Add missing checks after DMA map eb1e1526b82b wifi: ath12k: Decrement TID on RX peer frag setup error handling 9874a00ba22b wifi: ath12k: Enable REO queue lookup table feature on QCN9274 hw2.0 afb39537d894 wifi: rtlwifi: fix possible skb memory leak in `_rtl_pci_rx_interrupt()`. c387d8fcd330 wifi: mac80211: update radar_required in channel context after channel switch cf48c230a17a drm/amd/display: Fix 'failed to blank crtc!' c43b6b0a8342 wifi: iwlwifi: fw: Fix possible memory leak in iwl_fw_dbg_collect 83aba958e33f wifi: iwlwifi: dvm: fix potential overflow in rs_fill_link_cmd() 5c942d80f3e8 wifi: ath12k: Add memset and update default rate value in wmi tx completion 9febff30eb52 drm/amd/display: Separate set_gsl from set_gsl_source_select f2a4ca5397f5 net: fec: allow disable coalescing b3472b9d9d42 net: atlantic: add set_power to fw_ops for atl2 to fix wol 3d8090bb5342 xfrm: Duplicate SPI Handling 81667abecebc net: thunderbolt: Fix the parameter passing of tb_xdomain_enable_paths()/tb_xdomain_disable_paths() 99f142ec75dd net: thunderbolt: Enable end-to-end flow control also in transmit bdd66b918215 kselftest/arm64: Specify SVE data when testing VL set in sve-ptrace b6c39aaa85c4 wifi: mt76: mt7915: mcu: re-init MCU before loading FW patch 51eb6a5f209b wifi: rtw89: Disable deep power saving for USB/SDIO ecf449ef73a5 wifi: rtw89: Fix rtw89_mac_power_switch() for USB f3d4fa12d6b0 drm/msm: use trylock for debugfs e457e0560b55 wifi: mac80211: fix rx link assignment for non-MLO stations f7bc50927b4e ipv6: mcast: Check inet6_dev->dead under idev->mc_lock in __ipv6_dev_mc_inc(). 5a9b21808323 (powerpc/512) Fix possible `dma_unmap_single()` on uninitialized pointer ffa3a8007d2f wifi: mac80211: don't complete management TX on SAE commit c73e54dba107 sched/fair: Bump sd->max_newidle_lb_cost when newidle balance fails 3f8bcc32050e s390/stp: Remove udelay from stp_sync_clock() 11238e68cb68 wifi: iwlwifi: mvm: fix scan request validation 6cd174be9239 um: Re-evaluate thread flags repeatedly dae6099edf91 wifi: iwlwifi: mvm: set gtk id also in older FWs 8baba93e2e95 perf/cxlpmu: Remove unintended newline from IRQ name format string 05ee035af6d8 net: phy: micrel: Add ksz9131_resume() fd6a21638a1e net: thunderx: Fix format-truncation warning in bgx_acpi_match_id() c133a9327d2d net: ipv4: fix incorrect MTU in broadcast routes 606908835bc4 wifi: cfg80211: Fix interface type validation a4d2cdb31cf4 net: mctp: Prevent duplicate binds b55947b725f1 rcu: Protect ->defer_qs_iw_pending from data race e424653498e4 arm64: Mark kernel as tainted on SAE and SError panic ac361868f134 net/mlx5e: Properly access RCU protected qdisc_sleeping variable d1c8d2426a63 net: ag71xx: Add missing check after DMA map b0862e88b887 et131x: Add missing check after DMA map 72cdcaeaa95b wifi: rtw89: Lower the timeout in rtw89_fw_read_c2h_reg() for USB b16dfa7b4c94 be2net: Use correct byte order and format string for TCP seq and ack_seq d46484e9dbb2 s390/time: Use monotonic clock in get_cycles() 65b7c838736d wifi: cfg80211: reject HTC bit for management frames 7eb1e485bc84 ktest.pl: Prevent recursion of default variable options 30cad8797805 wifi: ath12k: Correct tid cleanup when tid setup fails 5d3559880e9c net: usb: cdc-ncm: check for filtering capability 8f5015143227 xen/netfront: Fix TX response spurious interrupts 5ac23fc080be Bluetooth: hci_sock: Reset cookie to zero in hci_sock_free_cookie() b84f88749ecf powerpc/thp: tracing: Hide hugepage events under CONFIG_PPC_BOOK3S_64 245d23754f5b ASoC: qcom: use drvdata instead of component to keep id c3d3492b12dd ASoC: codecs: rt5640: Retry DEVICE_ID verification 70b3c831cfea iio: adc: ad7768-1: Ensure SYNC_IN pulse minimum timing requirement 2925edfa98f7 ALSA: usb-audio: Avoid precedence issues in mixer_quirks macros 2f81d6e98f32 ALSA: pcm: Rewrite recalculate_boundary() to avoid costly loop 0de69bc9b366 ALSA: hda/ca0132: Fix buffer overflow in add_tuning_control 7731b7d596c5 platform/chrome: cros_ec_typec: Defer probe on missing EC parent 8c046583a234 platform/x86: thinkpad_acpi: Handle KCOV __init vs inline mismatches c2c252d2c180 soc: qcom: mdt_loader: Actually use the e_phoff 7589729947aa imx8m-blk-ctrl: set ISI panic write hurry level ac62b8f82b24 pm: cpupower: Fix the snapshot-order of tsc,mperf, clock in mperf_stop() 454a27cbab9b usb: core: usb_submit_urb: downgrade type check 0455858931ff usb: typec: intel_pmc_mux: Defer probe if SCU IPC isn't present 41f53afe53a5 ASoC: core: Check for rtd == NULL in snd_soc_remove_pcm_runtime() 789aa0b98854 ALSA: intel8x0: Fix incorrect codec index usage in mixer for ICH4 2828f2c4f2e9 ASoC: hdac_hdmi: Rate limit logging on connection and disconnection b80d6972859b x86/bugs: Avoid warning when overriding return thunk 16cdf4f5b959 ALSA: hda: Disable jack polling at shutdown 240e611b784d ALSA: hda: Handle the jack polling always via a work d54d1405f2c6 mmc: rtsx_usb_sdmmc: Fix error-path in sd_set_power_mode() 24f4ceeaeee7 mei: bus: Check for still connected devices in mei_cl_bus_dev_release() a29868db6dcf char: misc: Fix improper and inaccurate error code returned by misc_init() f8818e29d268 reset: brcmstb: Enable reset drivers for ARCH_BCM2835 ff28f5dc3872 pps: clients: gpio: fix interrupt handling order in remove path d9d611639bea ACPI: APEI: GHES: add TAINT_MACHINE_CHECK on GHES panic path d3dd520206bd mmc: sdhci-msm: Ensure SD card power isn't ON when card removed f95174d4d5c4 ACPI: processor: fix acpi_object initialization e656c2db4922 PM: sleep: console: Fix the black screen issue 753cd9f3d396 thermal: sysfs: Return ENODATA instead of EAGAIN for reads 64d78290599a PM: runtime: Clear power.needs_force_resume in pm_runtime_reinit() 5aa770f45da7 firmware: tegra: Fix IVC dependency problems ab3bf61d9351 ACPI: PRM: Reduce unnecessary printing to avoid user confusion 783a726d509e selftests: tracing: Use mutex_unlock for testing glob filter 6ec6282acd89 tools/build: Fix s390(x) cross-compilation with clang 46b3a7a3a36d ARM: tegra: Use I/O memcpy to write to IRAM 149b733d5f80 gpio: tps65912: check the return value of regmap_update_bits() 3c3454b02c62 iio: adc: ad_sigma_delta: don't overallocate scan buffer 0a4757bf988e tools/nolibc: define time_t in terms of __kernel_old_time_t 58a39eda7f95 thermal/drivers/qcom-spmi-temp-alarm: Enable stage 2 shutdown when required cfa9b873a29c ASoC: soc-dapm: set bias_level if snd_soc_dapm_set_bias_level() was successed 7423fc4da94d EDAC/synopsys: Clear the ECC counters on init f53e16dde8ad PM / devfreq: governor: Replace sscanf() with kstrtoul() in set_freq_store() d7d6d076ee95 ARM: rockchip: fix kernel hang during smp initialization 6a8b0c7e93df cpufreq: Exit governor when failed to start old governor 20bbe54f454f gpio: wcd934x: check the return value of regmap_update_bits() 6b8a8eac58a9 remoteproc: imx_rproc: skip clock enable when M-core is managed by the SCU 082735fbcdb6 ACPI: APEI: send SIGBUS to current task if synchronous memory error not recovered 84518ec7f928 soc: qcom: rpmh-rsc: Add RSC version 4 support 16a5088670e6 usb: xhci: Avoid showing errors during surprise removal dabf502ee893 usb: xhci: Set avg_trb_len = 8 for EP0 during Address Device Command 4a62f49f3d04 usb: xhci: Avoid showing warnings for dying controller 6cd81d4ffbaa usb: typec: ucsi: psy: Set current max to 100mA for BC 1.2 and Default b2ba2ad06d8a selftests/futex: Define SYS_futex on 32-bit architectures with 64-bit time_t 146262a48be2 cpufreq: CPPC: Mark driver with NEED_UPDATE_LIMITS flag f5611a58f7af platform/x86/amd: pmc: Add Lenovo Yoga 6 13ALC6 to pmc quirk list 2d32f522c33a usb: xhci: print xhci->xhc_state when queue_command failed 839312bff2c9 tracefs: Add d_delete to remove negative dentries d7e28036b0e9 securityfs: don't pin dentries twice, once is enough... 270ea0b61725 fix locking in efi_secret_unlink() 327276cb8a7e ext2: Handle fiemap on empty files to prevent EINVAL 6c7fadac6cbc fs/ntfs3: correctly create symlink for relative path 3572737a768d fs/ntfs3: Add sanity check for file name 934065fd3024 ata: libata-sata: Disallow changing LPM state if not supported 847a204d3067 better lockdep annotations for simple_recursive_removal() cb7b59560400 hfs: fix not erasing deleted b-tree node issue 9f53b2433ad2 drbd: add missing kref_get in handle_write_conflicts 5a1e1ab83796 udf: Verify partition map count ce8da5d13d8c loop: Avoid updating block size under exclusive owner 3d2c05cbc6a3 gfs2: Set .migrate_folio in gfs2_{rgrp,meta}_aops 524ce0f943d7 nvme-pci: try function level reset on init failure 1e858a7a51c7 smb/server: avoid deadlock when linking with ReplaceIfExists 61ad294996c0 arm64: Handle KCOV __init vs inline mismatches b3359392b753 hfsplus: don't use BUG_ON() in hfsplus_create_attributes_file() 291bb5d931c6 hfsplus: fix slab-out-of-bounds read in hfsplus_uni2asc() 8583d067ae22 hfsplus: fix slab-out-of-bounds in hfsplus_bnode_read() 384a66b89f95 hfs: fix slab-out-of-bounds in hfs_bnode_read() 4f032979b63a hfs: fix general protection fault in hfs_find_init() f1fe99919f62 tls: handle data disappearing from under the TLS ULP acfb4da42fc4 ptp: prevent possible ABBA deadlock in ptp_clock_freerun() 7337a6356dff cpuidle: governors: menu: Avoid using invalid recent intervals data c11f3802d349 intel_idle: Allow loading ACPI tables for any family ea094f38d387 sctp: linearize cloned gso packets in sctp_rcv 7f94af487c7f net: ti: icss-iep: Fix incorrect type for return value in extts_enable() 30cf81105855 netfilter: ctnetlink: fix refcount leak on table dump 19e01bc8c1ac udp: also consider secpath when evaluating ipsec use for checksumming e65ad9a14256 KVM: VMX: Preserve host's DEBUGCTLMSR_FREEZE_IN_SMM while running the guest 91fa23d5b9e5 KVM: VMX: Wrap all accesses to IA32_DEBUGCTL with getter/setter APIs 8867d91ef824 KVM: nVMX: Check vmcs12->guest_ia32_debugctl on nested VM-Enter d1e28ef79b43 KVM: VMX: Extract checking of guest's DEBUGCTL into helper 48ebed8bd66b KVM: VMX: Allow guest to set DEBUGCTL.RTM_DEBUG if RTM is supported ec70c3f25777 KVM: x86: Drop kvm_x86_ops.set_dr6() in favor of a new KVM_RUN flag 0d87da9d6065 KVM: x86: Convert vcpu_run()'s immediate exit param into a generic bitmap d5aa9bb5e348 KVM: x86: Fully defer to vendor code to decide how to force immediate exit 62f586df29ca KVM: VMX: Handle KVM-induced preemption timer exits in fastpath for L2 ca3cc405a3bc KVM: x86: Move handling of is_guest_mode() into fastpath exit handlers 1c1158aceaf2 KVM: VMX: Handle forced exit due to preemption timer in fastpath 1fc288e74cf3 KVM: VMX: Re-enter guest in fastpath for "spurious" preemption timer exits baf9c96e4e9d KVM: x86: Plumb "force_immediate_exit" into kvm_entry() tracepoint a1d4091f94c6 KVM: x86: Snapshot the host's DEBUGCTL after disabling IRQs 76025761e8f3 KVM: x86: Snapshot the host's DEBUGCTL in common x86 cf04778ae1b5 KVM: nVMX: Defer SVI update to vmcs01 on EOI when L2 is active w/o VID ebc281bf14aa KVM: x86: Plumb in the vCPU to kvm_x86_ops.hwapic_isr_update() abe3d6a559f9 KVM: SVM: Set RFLAGS.IF=1 in C code, to get VMRUN out of the STI shadow d5784ea45663 KVM: x86/hyper-v: Skip non-canonical addresses during PV TLB flush edc450030b20 smb: client: don't wait for info->send_pending == 0 on error 429112e9709b smb: client: let send_done() cleanup before calling smbd_disconnect_rdma_connection() 19849010c9e1 ACPI: processor: perflib: Move problematic pr->performance check cb2e6e275d19 ACPI: processor: perflib: Fix initial _PPC limit application 8c09ad855fbf Documentation: ACPI: Fix parent device references 2a0c0c974bea eventpoll: Fix semi-unbounded recursion 237e416eb621 fs: Prevent file descriptor table allocations exceeding INT_MAX a5ff67c66208 sunvdc: Balance device refcount in vdc_port_mpgroup_check 17c010fe45de LoongArch: BPF: Fix jump offset calculation in tailcall d89d47abbad2 PCI: Extend isolated function probing to LoongArch 987c20428f06 NFS: Fix the setting of capabilities when automounting a new filesystem f0b89916d2fe NFSD: detect mismatch of file handle and delegation stateid in OPEN op d71abd1ae4e0 nfsd: handle get_client_locked() failure in nfsd4_setclientid_confirm() 3b53dc1c641f io_uring/net: commit partial buffers on retry ccef5ee4adf5 net: usb: asix_devices: add phy_mask for ax88772 mdio bus eb2d79333f79 net: dpaa: fix device leak when querying time stamp info fd5c51a187ba net: ti: icss-iep: fix device and OF node leaks at probe 5daff127b292 net: mtk_eth_soc: fix device leak at probe 9adaf9a04f9a net: enetc: fix device and OF node leak at probe dc395c838610 net: gianfar: fix device leak when querying time stamp info 8dae82f81e34 net: phy: micrel: fix KSZ8081/KSZ8091 cable test 346c820ef513 netlink: avoid infinite retry looping in netlink_unicast() c66caf21b1d0 Revert "leds: trigger: netdev: Configure LED blink interval for HW offload" 16a46f2e84d7 gpio: mlxbf3: use platform_get_irq_optional() c1aa0743e54b Revert "gpio: mlxbf3: only get IRQ for device instance 0" a157478521b3 gpio: mlxbf2: use platform_get_irq_optional() 50ae9f2d90b2 gpio: virtio: Fix config space reading. 217e18011663 smb: client: remove redundant lstrp update in negotiate protocol a0620e152566 smb3: fix for slab out of bounds on mount to ksmbd d63e929bac53 ALSA: hda/realtek: Add Framework Laptop 13 (AMD Ryzen AI 300) to quirks fb5000cfd7bc ALSA: hda/realtek: Fix headset mic on HONOR BRB-X 1034719fdefd ALSA: usb-audio: Validate UAC3 cluster segment descriptors 07c8d78dbb5e ALSA: usb-audio: Validate UAC3 power domain descriptors, too 17a66aef7ddc io_uring: don't use int for ABI Signed-off-by: Bruce Ashfield Signed-off-by: Steve Sakoman --- .../linux/linux-yocto-rt_6.6.bb | 6 ++-- .../linux/linux-yocto-tiny_6.6.bb | 6 ++-- meta/recipes-kernel/linux/linux-yocto_6.6.bb | 28 +++++++++---------- 3 files changed, 20 insertions(+), 20 deletions(-) diff --git a/meta/recipes-kernel/linux/linux-yocto-rt_6.6.bb b/meta/recipes-kernel/linux/linux-yocto-rt_6.6.bb index bb92f98616..b5e4700d83 100644 --- a/meta/recipes-kernel/linux/linux-yocto-rt_6.6.bb +++ b/meta/recipes-kernel/linux/linux-yocto-rt_6.6.bb @@ -14,13 +14,13 @@ python () { raise bb.parse.SkipRecipe("Set PREFERRED_PROVIDER_virtual/kernel to linux-yocto-rt to enable it") } -SRCREV_machine ?= "5a1f8bcc75b8f9d5a7fca6cb99a103f8333d7dc5" -SRCREV_meta ?= "f3c786ad20e66517d28812760a884ac3d5dda3db" +SRCREV_machine ?= "7ea3f3274ce1ada089f38f1e5bd6167500084acf" +SRCREV_meta ?= "6a511f37e5360c6694ef592ad4fcae2630378ef5" SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;branch=${KBRANCH};name=machine;protocol=https \ git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.6;destsuffix=${KMETA};protocol=https" -LINUX_VERSION ?= "6.6.102" +LINUX_VERSION ?= "6.6.103" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" diff --git a/meta/recipes-kernel/linux/linux-yocto-tiny_6.6.bb b/meta/recipes-kernel/linux/linux-yocto-tiny_6.6.bb index b8fcd47971..454a9c3102 100644 --- a/meta/recipes-kernel/linux/linux-yocto-tiny_6.6.bb +++ b/meta/recipes-kernel/linux/linux-yocto-tiny_6.6.bb @@ -8,7 +8,7 @@ require recipes-kernel/linux/linux-yocto.inc # CVE exclusions include recipes-kernel/linux/cve-exclusion_6.6.inc -LINUX_VERSION ?= "6.6.102" +LINUX_VERSION ?= "6.6.103" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}" @@ -17,8 +17,8 @@ DEPENDS += "openssl-native util-linux-native" KMETA = "kernel-meta" KCONF_BSP_AUDIT_LEVEL = "2" -SRCREV_machine ?= "25e12cc47d631ed5ba46a6a07acf85d7e1175fad" -SRCREV_meta ?= "f3c786ad20e66517d28812760a884ac3d5dda3db" +SRCREV_machine ?= "79a205036af6ef1c4d83a1613d5b206ae7b510fa" +SRCREV_meta ?= "6a511f37e5360c6694ef592ad4fcae2630378ef5" PV = "${LINUX_VERSION}+git" diff --git a/meta/recipes-kernel/linux/linux-yocto_6.6.bb b/meta/recipes-kernel/linux/linux-yocto_6.6.bb index 3a99ce4f1e..be5c3510fc 100644 --- a/meta/recipes-kernel/linux/linux-yocto_6.6.bb +++ b/meta/recipes-kernel/linux/linux-yocto_6.6.bb @@ -18,25 +18,25 @@ KBRANCH:qemux86-64 ?= "v6.6/standard/base" KBRANCH:qemuloongarch64 ?= "v6.6/standard/base" KBRANCH:qemumips64 ?= "v6.6/standard/mti-malta64" -SRCREV_machine:qemuarm ?= "465d211d5e4e5333b10eddfb597a03b340a1a8df" -SRCREV_machine:qemuarm64 ?= "57f28ca26dd5f2d2902dd674ed9c9bfafd84139b" -SRCREV_machine:qemuloongarch64 ?= "b5db76e52474d0ee7dbbb897cf02a2665f1a14fd" -SRCREV_machine:qemumips ?= "286ff567d5dcee9cd0b86850b93d1315035b5ece" -SRCREV_machine:qemuppc ?= "c4ee428a256735d175e14da9ebdfede7fa6b57b5" -SRCREV_machine:qemuriscv64 ?= "b5db76e52474d0ee7dbbb897cf02a2665f1a14fd" -SRCREV_machine:qemuriscv32 ?= "b5db76e52474d0ee7dbbb897cf02a2665f1a14fd" -SRCREV_machine:qemux86 ?= "b5db76e52474d0ee7dbbb897cf02a2665f1a14fd" -SRCREV_machine:qemux86-64 ?= "b5db76e52474d0ee7dbbb897cf02a2665f1a14fd" -SRCREV_machine:qemumips64 ?= "dd35c2cddf4a3171b9a0d73410b6ac56780855b3" -SRCREV_machine ?= "b5db76e52474d0ee7dbbb897cf02a2665f1a14fd" -SRCREV_meta ?= "f3c786ad20e66517d28812760a884ac3d5dda3db" +SRCREV_machine:qemuarm ?= "1c0e98c8258be1bf7e732fb3c792eb165099836f" +SRCREV_machine:qemuarm64 ?= "9d19f112cf4341cd09e45ee0ed221e80c6300125" +SRCREV_machine:qemuloongarch64 ?= "4518ac3620cf9950169ca59bcc72a93c03900f1b" +SRCREV_machine:qemumips ?= "3f653435fd7315763428d3123883cee7c011d506" +SRCREV_machine:qemuppc ?= "32c4d7089e3eed04893bfbb5b75cdc934e920cfd" +SRCREV_machine:qemuriscv64 ?= "4518ac3620cf9950169ca59bcc72a93c03900f1b" +SRCREV_machine:qemuriscv32 ?= "4518ac3620cf9950169ca59bcc72a93c03900f1b" +SRCREV_machine:qemux86 ?= "4518ac3620cf9950169ca59bcc72a93c03900f1b" +SRCREV_machine:qemux86-64 ?= "4518ac3620cf9950169ca59bcc72a93c03900f1b" +SRCREV_machine:qemumips64 ?= "4f64d38b79ca252c932d017ae05a82388403e625" +SRCREV_machine ?= "4518ac3620cf9950169ca59bcc72a93c03900f1b" +SRCREV_meta ?= "6a511f37e5360c6694ef592ad4fcae2630378ef5" # set your preferred provider of linux-yocto to 'linux-yocto-upstream', and you'll # get the /base branch, which is pure upstream -stable, and the same # meta SRCREV as the linux-yocto-standard builds. Select your version using the # normal PREFERRED_VERSION settings. BBCLASSEXTEND = "devupstream:target" -SRCREV_machine:class-devupstream ?= "bb9c90ab9c5a1a933a0dfd302a3fde73642b2b06" +SRCREV_machine:class-devupstream ?= "cc1a1c5b404a5e6ad751d0831b1991a90c3de4c5" PN:class-devupstream = "linux-yocto-upstream" KBRANCH:class-devupstream = "v6.6/base" @@ -44,7 +44,7 @@ SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;name=machine;branch=${KBRA git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.6;destsuffix=${KMETA};protocol=https" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" -LINUX_VERSION ?= "6.6.102" +LINUX_VERSION ?= "6.6.103" PV = "${LINUX_VERSION}+git" From patchwork Fri Oct 17 20:39:01 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 72624 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id EFF74CCD199 for ; Fri, 17 Oct 2025 20:40:03 +0000 (UTC) Received: from mail-pf1-f173.google.com (mail-pf1-f173.google.com [209.85.210.173]) by mx.groups.io with SMTP id smtpd.web11.3133.1760733594876943838 for ; Fri, 17 Oct 2025 13:39:54 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20230601.gappssmtp.com header.s=20230601 header.b=PQrskfOO; spf=softfail (domain: sakoman.com, ip: 209.85.210.173, mailfrom: steve@sakoman.com) Received: by mail-pf1-f173.google.com with SMTP id d2e1a72fcca58-79ef9d1805fso2302637b3a.1 for ; Fri, 17 Oct 2025 13:39:54 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20230601.gappssmtp.com; s=20230601; t=1760733594; x=1761338394; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=RgX/WfDsKUojlouwxbM9/JE1v1z4IkXpqjV8RxFENEM=; b=PQrskfOOR6t+DQKDF3NLnmFhaKxZixtYxsWd+osWEIy6QkA1Al6tPCzGWbGIjJznp8 V5/Vtrk+jj9EuqI0OuDsWtwrnAonJPNnN/a9YCt/K1Jat9jd+lxb1C+GRYNbUY7WjyqA 7NlWMhGQm3RyjDiz41wbueleDb9FbE4EaJujoSqMuaCyf/XkcK0/ioq0aZe4NgdIB/3U TOOTovvm0sFmW6RqW34zGy2yjscQ+z9Pq3fQl8djOeKQ4u+LDUUYaqp27JrdnuWG2gNu crSqTfvxqJTdrCq4DOVgCDYe3CxvzoJARRHd3g8XPNix38aATSVXt4HXzKbPwTjvP8DP D2fA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1760733594; x=1761338394; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=RgX/WfDsKUojlouwxbM9/JE1v1z4IkXpqjV8RxFENEM=; b=fsTLTliTViSc7eMBgCccfTSe5rsWUsE37Q9CFbMFBkRdinzy1Umji1h8QDIeLdD7Kb loatI2069YPE+g7v2jy/aZLPPORLvkVzrEh0gIUT3aMyHU6vrZ4eZ99FalmZF2KFbt1y Yvvv9KPR7Npzsxf8eeMQujCPUt2NTvYCiOq9KSBuCDQQP3Z0N4//+2UqEvbfbzMku5l4 SQ6ooD/nuReyady8ts/nGd9/wRrMb5IlPrQREUugoERvM+WbI5kg1HUVPjvyf3TgC/EA LkdBqXNU2tnV/23eOg6x0D1fHu/sJj5QYfUj6u3AKaY8qff4OR5jRioLL4G4u9wHBvty olrQ== X-Gm-Message-State: AOJu0YzpFbINANCkv0lwJcljEwK2AM/YuF5fZ3QHh4ulh3JEezv8xCbj mHcceDKe1+GpQbElU9H4MMEfoUZbDLtcMU3O1baOL2jU9VBvkM0Hrby1+oL1DU19IvCyxDxOiPy bYnUVwI0= X-Gm-Gg: ASbGncsSxomekWJF+/uCuROZZYMGGco5o/6Bp4BHjmHorG+GvKCQrbSrgw3A5EcjOva TqAMWA0lD2bhzcwlj0+dACizB/kIKK+Clj3AjXbhg7t/j2FkNdn0OoDZWqmhOLEGk4Wxf8jrQlM JHSdv+6ap4KBSZFlcqKK7fcZ83tCKqRKBDVnebRZVSwGwVMfJZYCe28lcCQnqIKFZUR4lHOE46N iDPuKlc0fupC0iLgeYaARNEUhS5+7aiQN13cHobfjpOidssOOc652oegS4Ip/j08lkaHnxl2blj 6wGra7+tn8of8uGbMrQ6jowg2rA1OIWfK7/R842ewlhKUBppRyM/9uqUbLGakzl0MYN6hmKW8iO aM+IyvhNN55UwdVa44nKVVDgWtlgLwySu9pibrwQ+f5AZYWVDyAj/r/bVYNM8yi2UOPKlm8fxhI 3ApeUkEiu6cHc= X-Google-Smtp-Source: AGHT+IG5ziiF7xF5f0jWuv3ckjpRNlbNcOLtL2XcN1Ohihm9sQGfB4S5XJ0NKZr+EgHQW8AHzb5NwQ== X-Received: by 2002:a05:6a20:430d:b0:319:1c54:17ad with SMTP id adf61e73a8af0-334a8607494mr6702236637.37.1760733593835; Fri, 17 Oct 2025 13:39:53 -0700 (PDT) Received: from hexa.. ([2602:feb4:3b:2100:aaee:e640:34cd:6f2]) by smtp.gmail.com with ESMTPSA id d2e1a72fcca58-7a2300f254esm477061b3a.45.2025.10.17.13.39.52 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 17 Oct 2025 13:39:53 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][scarthgap 18/26] linux-yocto/6.6: update to v6.6.106 Date: Fri, 17 Oct 2025 13:39:01 -0700 Message-ID: <212df1778245f7b299b549285ea0994234e163fa.1760733431.git.steve@sakoman.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 17 Oct 2025 20:40:03 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/225052 From: Bruce Ashfield Updating linux-yocto/6.6 to the latest korg -stable release that comprises the following commits: no ids found, dumping: 60a9e718726f Linux 6.6.106 3b9e7e5c5298 x86/vmscape: Add old Intel CPUs to affected list 1e1dc1f9edb9 x86/vmscape: Warn when STIBP is disabled with SMT a5d029f1152a x86/bugs: Move cpu_bugs_smt_update() down 34e566704105 x86/vmscape: Enable the mitigation f866eef8d1c6 x86/vmscape: Add conditional IBPB mitigation 813cb831439c x86/vmscape: Enumerate VMSCAPE bug 9d1677060428 Documentation/hw-vuln: Add VMSCAPE documentation fe9731e10004 Linux 6.6.105 be4e6a221467 spi: fsl-qspi: Fix double cleanup in probe error path 054a444b4c17 dmaengine: mediatek: Fix a flag reuse error in mtk_cqdma_tx_status() b718de5904a6 cpufreq: intel_pstate: Check turbo_is_disabled() in store_no_turbo() d0b26a9f5742 cpufreq: intel_pstate: Read global.no_turbo under READ_ONCE() a44d0904d673 cpufreq: intel_pstate: Rearrange show_no_turbo() and store_no_turbo() 524ee2606a30 riscv: use lw when reading int cpu in asm_per_cpu 522ffe298627 mm: slub: avoid wake up kswapd in set_track_prepare ad2df864033e slub: Reflow ___slab_alloc() c866c40d07c4 tools: gpio: remove the include directory on make clean 3c331f7fc5b6 tools: gpio: rm .*.cmd on make clean 7e4f8e09d577 drm/amd/amdgpu: Fix missing error return on kzalloc failure 718c248902dd drm/amdgpu: Replace DRM_* with dev_* in amdgpu_psp.c c9c4635a6d55 perf bpf-event: Fix use-after-free in synthesis 85da7f36d9a0 drm/bridge: ti-sn65dsi86: fix REFCLK setting 1a7d3947a5dd spi: spi-fsl-lpspi: Clear status register after disabling the module cd53048e7460 spi: spi-fsl-lpspi: Reset FIFO and disable module on transfer abort a339956545a5 spi: spi-fsl-lpspi: Set correct chip-select polarity bit a786ef5f693b spi: spi-fsl-lpspi: Fix transmissions when using CONT 2313baff36d0 hwmon: mlxreg-fan: Prevent fans from getting stuck at 0 RPM 8699358b6ac9 pcmcia: Add error handling for add_interval() in do_validate_mem() 3ee8f5c8938f pcmcia: omap: Add missing check for platform_get_resource 8d7ee56bf530 Revert "drm/amdgpu: Avoid extra evict-restore process." b9cf42a8f034 ALSA: hda/realtek: Fix headset mic for TongFang X6[AF]R5xxY 5f46882be912 ALSA: hda/hdmi: Add pin fix for another HP EliteDesk 800 G4 model 7d98166183d6 drm/mediatek: Fix device/node reference count leaks in mtk_drm_get_all_drm_priv 2c6c9d319017 drm/mediatek: Fix using wrong drm private data to bind mediatek-drm 13d0854e3538 drm/mediatek: Add crtc path enum for all_drm_priv array d5875a478b1b vmxnet3: update MTU after device quiesce 5174ea81d6ca net: dsa: microchip: linearize skb for tail-tagging switches 3b6a5df36604 net: dsa: microchip: update tag_ksz masks for KSZ9477 family 16fea5067092 dmaengine: mediatek: Fix a possible deadlock error in mtk_cqdma_tx_status() dd2b7abd0da3 ALSA: hda/realtek - Add new HP ZBook laptop with micmute led fixup 7df63b5ddd07 ALSA: hda/realtek: Add support for HP Agusta using CS35L41 HDA 47aba94a924c iio: pressure: mprls0025pa: use aligned_s64 for timestamp e791bf216c9e iio: light: opt3001: fix deadlock due to concurrent flag access 91da53307391 iio: chemical: pms7003: use aligned_s64 for timestamp fb6a7c1da207 iio: imu: inv_mpu6050: align buffer for timestamp 977849e8acd2 btrfs: adjust subpage bit start based on sectorsize b088ae4e4184 PCI/MSI: Add an option to write MSIX ENTRY_DATA before any reads 30d201ee3a37 thermal/drivers/mediatek/lvts: Disable low offset IRQ for minimum threshold 50ae352c1848 spi: fsl-qspi: use devm function instead of driver remove 0ef7058b4dc6 mm/slub: avoid accessing metadata when pointer is invalid in object_err() ba0ccc1be52c nouveau: fix disabling the nonstall irq due to storm code 033f09b647db cpufreq: intel_pstate: Unchecked MSR aceess in legacy mode 83440514ef2a cpufreq: intel_pstate: Do not update global.turbo_disabled after initialization 86cade7791a2 cpufreq: intel_pstate: Fold intel_pstate_max_within_limits() into caller e7f4f16ff167 cpufreq: intel_pstate: Revise global turbo disable check de6b545bcdba Revert "spi: spi-cadence-quadspi: Fix pm runtime unbalance" 94f7d9070382 Revert "spi: cadence-quadspi: fix cleanup of rx_chan on failure paths" f4f7cde70f59 net: pcs: rzn1-miic: Correct MODCTRL register offset 50a84d5c8140 e1000e: fix heap overflow in e1000_set_eeprom 1cfa5dd05847 cifs: prevent NULL pointer dereference in UTF16 conversion bb37252c9af1 batman-adv: fix OOB read/write in network-coding decode d96cc9a1b577 scsi: lpfc: Fix buffer free/clear order in deferred receive path abab31c377cb platform/x86/amd/pmc: Add TUXEDO IB Pro Gen10 AMD to spurious 8042 quirks list 350bfdd2841f drm/amdgpu: drop hw access in non-DC audio fini 9e4293766e4f wifi: mt76: mt7996: Initialize hdr before passing to skb_put_data() 9df29aa5637d wifi: mwifiex: Initialize the chan_stats array to zero bc983b834354 soc: qcom: mdt_loader: Deal with zero e_shentsize 698abcf08818 proc: fix missing pde_set_flags() for net proc files e9188f66e949 ocfs2: prevent release journal inode after journal shutdown f9b8d4dba8e7 sched: Fix sched_numa_find_nth_cpu() if mask offline 6797a8b3f71b mm: move page table sync declarations to linux/pgtable.h 26ff568f390a x86/mm/64: define ARCH_PAGE_TABLE_SYNC_MASK and arch_sync_kernel_mappings() 2ee32c4c4f63 pcmcia: Fix a NULL pointer dereference in __iodyn_find_io_region() 50f2f392eb6e arm64: ftrace: fix unreachable PLT for ftrace_caller in init_module with CONFIG_DYNAMIC_FTRACE 90e9372ec0b0 ACPI/IORT: Fix memory leak in iort_rmr_alloc_sids() ad17940a6618 ALSA: usb-audio: Add mute TLV for playback volumes on some devices a4e366fbec8a phy: mscc: Stop taking ts_lock for tx_queue and use its own lock 9b035445b7c9 selftest: net: Fix weird setsockopt() in bind_bhash.c. 85c1c86a67e0 ppp: fix memory leak in pad_compress_skb 01d2690c09e6 net: atm: fix memory leak in atm_register_sysfs when device_register fail 7d449b7a6c8e ax25: properly unshare skbs in ax25_kiss_rcv() 5852cee1d8f6 mctp: return -ENOPROTOOPT for unknown getsockopt options 7f8869586dd6 net/smc: Remove validation of reserved bits in CLC Decline message 90ab05ed47c1 ipv4: Fix NULL vs error pointer check in inet_blackhole_dev_init() bee1e19cf1fa net: thunder_bgx: decrement cleanup index before use 4535729550cf net: thunder_bgx: add a missing of_node_put e472f59d02c8 wifi: cfg80211: sme: cap SSID length in __cfg80211_connect_result() 609f6debdff3 wifi: libertas: cap SSID len in lbs_associate() ccb839602a82 wifi: cw1200: cap SSID length in cw1200_do_join() 61b80fbdc072 net: ethernet: mtk_eth_soc: fix tx vlan tag for llc packets 5d7b2d45770e wifi: ath11k: fix group data packet drops during rekey 6bf934426760 wifi: ath11k: avoid forward declaration of ath11k_mac_start_vdev_delay() 38b86b0a37df wifi: ath11k: rename ath11k_start_vdev_delay() 14ed9f84c7c0 wifi: ath11k: Introduce and use ath11k_sta_to_arsta() fb216d980fae i40e: Fix potential invalid access when MAC list is empty f18d9b3abf9c net/smc: fix one NULL pointer dereference in smc_ib_is_sg_need_sync() 668f4f6382c3 macsec: read MACSEC_SA_ATTR_PN with nla_get_uint 1cf0b558cbb7 netlink: add variable-length / auto integers 5430388a8111 net: macb: Fix tx_ptr_lock locking 8d09b13789ba icmp: fix icmp_ndo_send address translation for reply direction 1dda64fb3f5e mISDN: Fix memory leak in dsp_hwec_enable() 9a4abe262df9 xirc2ps_cs: fix register access when enabling FullDuplex 6077d16b5c0f Bluetooth: Fix use-after-free in l2cap_sock_cleanup_listen() bd75eba88e88 Bluetooth: vhci: Prevent use-after-free by removing debugfs files early 2acc8d3f0a3c netfilter: conntrack: helper: Replace -EEXIST by -EBUSY 50db11e2bbb6 netfilter: br_netfilter: do not check confirmed bit in br_nf_local_in() after confirm f1150153c4e5 wifi: brcmfmac: fix use-after-free when rescheduling brcmf_btcoex_info work b7d08929178c wifi: cfg80211: fix use-after-free in cmp_bss() 4a05520d12a7 arm64: dts: imx8mp: Fix missing microSD slot vqmmc on Data Modul i.MX8M Plus eDM SBC f7a48ef44576 arm64: dts: imx8mp: Fix missing microSD slot vqmmc on DH electronics i.MX8M Plus DHCOM 5b94a825945a tee: optee: ffa: fix a typo of "optee_ffa_api_is_compatible" 0383e172435f arm64: dts: rockchip: Add vcc-supply to SPI flash on rk3399-pinebook-pro add1ecc8f3ad tee: fix NULL pointer dereference in tee_shm_put bf89b1f87c72 fs: writeback: fix use-after-free in __mark_inode_dirty() 41e168db5942 Bluetooth: hci_sync: Avoid adding default advertising on startup 703ea9e34f96 cpupower: Fix a bug where the -t option of the set subcommand was not working. 2b21fd1cf77e drm/amd/display: Don't warn when missing DCE encoder caps 235a4c0a8aaa cdc_ncm: Flag Intel OEM version of Fibocom L850-GL as WWAN ee58a0a35378 LoongArch: Save LBT before FPU in setup_sigcontext() dc4a024b1990 btrfs: avoid load/store tearing races when checking if an inode was logged 48545620ca8f btrfs: fix race between setting last_dir_index_offset and inode logging 9f76a2e19baf btrfs: fix race between logging inode and checking if it was logged before 7acfa07c585e bpf: Fix oob access in cgroup local storage dbd8ec2261b8 bpf: Move bpf map owner out of common struct 8e573ac21fcd bpf: Move cgroup iterator helpers to bpf.h 3eeefeb9d62d bpf: Add cookie object to bpf maps 355bd0b51d2f Linux 6.6.104 d3cc7476b89f xfs: do not propagate ENODATA disk errors into xattr code 0699faf70413 Revert "drm/dp: Change AUX DPCD probe address from DPCD_REV to LANE0_1_STATUS" 6c9552de7f7e HID: mcp2221: Handle reads greater than 60 bytes 5a809b34250c HID: mcp2221: Don't set bus speed on every transfer 1b3ccc394807 net/mlx5: SF, Fix add port error handling ea687c003663 net: rose: fix a typo in rose_clear_routes() 4e86e5ba325e drm/nouveau/disp: Always accept linear modifier 1424f6132fc8 smb3 client: fix return code mapping of remap_file_range 3c3321091733 net: usb: qmi_wwan: add Telit Cinterion LE910C4-WWX new compositions 4191ea1f0bb3 fs/smb: Fix inconsistent refcnt update 4f43a6d376da dma/pool: Ensure DMA_DIRECT_REMAP allocations are decrypted 8911ec881cd7 Revert "drm/amdgpu: fix incorrect vm flags to map bo" e422370e6ab2 HID: hid-ntrig: fix unable to handle page fault in ntrig_report_version() b9166ea27d0a HID: wacom: Add a new Art Pen 2 88d3c2790c33 HID: logitech: Add ids for G PRO 2 LIGHTSPEED 8783b2a0b740 HID: quirks: add support for Legion Go dual dinput modes d4e6e2680807 HID: multitouch: fix slab out-of-bounds access in mt_report_fixup() 5f3c0839b173 HID: asus: fix UAF via HID_CLAIMED_INPUT validation c84ba4cdf4c6 x86/microcode/AMD: Handle the case of no BIOS microcode f49161646e03 KVM: x86: use array_index_nospec with indices that come from guest 925599eba460 efivarfs: Fix slab-out-of-bounds in efivarfs_d_compare 463aa96fca62 sctp: initialize more fields in sctp_v6_from_sk() 9c547c8eee9d net: rose: include node references in rose_neigh refcount f8c29fc437d0 net: rose: convert 'use' field to refcount_t 4998ab3eb2b8 net: rose: split remove and free operations in rose_remove_neigh() b0f8725196ae net: stmmac: Set CIC bit only for TX queues with COE dc38d0111c16 net: stmmac: xgmac: Correct supported speed modes d02d635fc03d net: stmmac: Rename phylink_get_caps() callback to update_caps() ce006b60fc49 net: stmmac: xgmac: Do not enable RX FIFO Overflow interrupts 9b0acd3bb291 net/mlx5e: Set local Xoff after FW update dec9d873bdf7 net/mlx5e: Update and set Xon/Xoff upon port speed set cdd96ed12524 net/mlx5e: Update and set Xon/Xoff upon MTU set 3e07c623fbc5 net/mlx5: Nack sync reset when SFs are present a623e80aaa85 net/mlx5: Convert SF port_indices xarray to function_ids xarray a7e9da4d3afb net/mlx5: Use devlink port pointer to get the pointer of container SF struct 25659835c7af net/mlx5: Call mlx5_sf_id_erase() once in mlx5_sf_dealloc() ddac9d0fe249 net/mlx5: Fix lockdep assertion on sync reset unload event 8da591ae2614 net/mlx5: Add support for sync reset using hot reset 6292688e07d0 net/mlx5: Add device cap for supporting hot reset in sync reset flow 09fd27c8621e net/mlx5: Reload auxiliary drivers on fw_activate 7acefa4c66aa phy: mscc: Fix when PTP clock is register and unregister b3c70f6fc258 net: dlink: fix multicast stats being counted incorrectly 589edd3dc8fb dt-bindings: display/msm: qcom,mdp5: drop lut clock dc70ea942fcd ice: fix incorrect counter for buffer allocation failures 05fc7307e352 ice: stop storing XDP verdict within ice_rx_buf 29bcd31ace16 ice: gather page_count()'s of each frag right before XDP prog call 40a9f217cde1 ice: Introduce ice_xdp_buff 4de399767ddc drm/nouveau: remove unused memory target test 32a498445641 drm/nouveau: remove unused increment in gm200_flcn_pio_imem_wr 3c80c230d6e3 atm: atmtcp: Prevent arbitrary write in atmtcp_recv_control(). 4bd2866db002 Bluetooth: hci_sync: fix set_local_name race condition 961abec8184a Bluetooth: hci_event: Detect if HCI_EV_NUM_COMP_PKTS is unbalanced f356ed87c78c Bluetooth: hci_event: Mark connection as closed during suspend disconnect 4c549d87f016 Bluetooth: hci_event: Treat UNKNOWN_CONN_ID on disconnect as success 430786612abe HID: input: report battery status changes immediately 61d733a568d8 HID: input: rename hidinput_set_battery_charge_status() e7d0bd359f4c powerpc/kvm: Fix ifdef to remove build warning 6de90c2a3b6c drm/msm: Defer fd_install in SUBMIT ioctl a208d67cb44b net: ipv4: fix regression in local-broadcast routes 9b2700151660 vhost/net: Protect ubufs with rcu read lock in vhost_net_ubuf_put() 181feb41f0b2 NFS: Fix a race when updating an existing write 9a1963404cc2 nfs: fold nfs_page_group_lock_subrequests into nfs_lock_and_join_requests b15342e09644 ACPI: EC: Add device to acpi_ec_no_wakeup[] qurik list 612527136e0c erofs: fix atomic context detection when !CONFIG_DEBUG_LOCK_ALLOC 8f8e6a781783 ASoC: codecs: tx-macro: correct tx_macro_component_drv name 24b9ed739c8c smb: client: fix race with concurrent opens in rename(2) bc1427a48371 smb: client: fix race with concurrent opens in unlink(2) 43662b846c7a scsi: core: sysfs: Correct sysfs attributes access rights 28c8fb7ae2ad ftrace: Fix potential warning in trace_printk_seq during ftrace_dump 9e0743eb6dcf of: dynamic: Fix use after free in of_changeset_add_prop_helper() 749137b41e70 of: Add a helper to free property struct d3be2b8cff6f mips: lantiq: xway: sysctrl: rename the etop node e877b861dab9 mips: dts: lantiq: danube: add missing burst length property 6e59b8483e6e pinctrl: STMFX: add missing HAS_IOMEM dependency 43e3118c677a of: dynamic: Fix memleak when of_pci_add_properties() failed Signed-off-by: Bruce Ashfield Signed-off-by: Steve Sakoman --- .../linux/linux-yocto-rt_6.6.bb | 6 ++-- .../linux/linux-yocto-tiny_6.6.bb | 6 ++-- meta/recipes-kernel/linux/linux-yocto_6.6.bb | 28 +++++++++---------- 3 files changed, 20 insertions(+), 20 deletions(-) diff --git a/meta/recipes-kernel/linux/linux-yocto-rt_6.6.bb b/meta/recipes-kernel/linux/linux-yocto-rt_6.6.bb index b5e4700d83..596b7bc49e 100644 --- a/meta/recipes-kernel/linux/linux-yocto-rt_6.6.bb +++ b/meta/recipes-kernel/linux/linux-yocto-rt_6.6.bb @@ -14,13 +14,13 @@ python () { raise bb.parse.SkipRecipe("Set PREFERRED_PROVIDER_virtual/kernel to linux-yocto-rt to enable it") } -SRCREV_machine ?= "7ea3f3274ce1ada089f38f1e5bd6167500084acf" -SRCREV_meta ?= "6a511f37e5360c6694ef592ad4fcae2630378ef5" +SRCREV_machine ?= "ddefe7df2a51318c404e7add38ab5e9d6d56eef3" +SRCREV_meta ?= "8483e6808972d92efd206b41c79f4e7122364d43" SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;branch=${KBRANCH};name=machine;protocol=https \ git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.6;destsuffix=${KMETA};protocol=https" -LINUX_VERSION ?= "6.6.103" +LINUX_VERSION ?= "6.6.106" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" diff --git a/meta/recipes-kernel/linux/linux-yocto-tiny_6.6.bb b/meta/recipes-kernel/linux/linux-yocto-tiny_6.6.bb index 454a9c3102..2624180bf1 100644 --- a/meta/recipes-kernel/linux/linux-yocto-tiny_6.6.bb +++ b/meta/recipes-kernel/linux/linux-yocto-tiny_6.6.bb @@ -8,7 +8,7 @@ require recipes-kernel/linux/linux-yocto.inc # CVE exclusions include recipes-kernel/linux/cve-exclusion_6.6.inc -LINUX_VERSION ?= "6.6.103" +LINUX_VERSION ?= "6.6.106" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}" @@ -17,8 +17,8 @@ DEPENDS += "openssl-native util-linux-native" KMETA = "kernel-meta" KCONF_BSP_AUDIT_LEVEL = "2" -SRCREV_machine ?= "79a205036af6ef1c4d83a1613d5b206ae7b510fa" -SRCREV_meta ?= "6a511f37e5360c6694ef592ad4fcae2630378ef5" +SRCREV_machine ?= "5e027cdb537f4185431ed08d988fbd4eccf4beb3" +SRCREV_meta ?= "8483e6808972d92efd206b41c79f4e7122364d43" PV = "${LINUX_VERSION}+git" diff --git a/meta/recipes-kernel/linux/linux-yocto_6.6.bb b/meta/recipes-kernel/linux/linux-yocto_6.6.bb index be5c3510fc..5614809066 100644 --- a/meta/recipes-kernel/linux/linux-yocto_6.6.bb +++ b/meta/recipes-kernel/linux/linux-yocto_6.6.bb @@ -18,25 +18,25 @@ KBRANCH:qemux86-64 ?= "v6.6/standard/base" KBRANCH:qemuloongarch64 ?= "v6.6/standard/base" KBRANCH:qemumips64 ?= "v6.6/standard/mti-malta64" -SRCREV_machine:qemuarm ?= "1c0e98c8258be1bf7e732fb3c792eb165099836f" -SRCREV_machine:qemuarm64 ?= "9d19f112cf4341cd09e45ee0ed221e80c6300125" -SRCREV_machine:qemuloongarch64 ?= "4518ac3620cf9950169ca59bcc72a93c03900f1b" -SRCREV_machine:qemumips ?= "3f653435fd7315763428d3123883cee7c011d506" -SRCREV_machine:qemuppc ?= "32c4d7089e3eed04893bfbb5b75cdc934e920cfd" -SRCREV_machine:qemuriscv64 ?= "4518ac3620cf9950169ca59bcc72a93c03900f1b" -SRCREV_machine:qemuriscv32 ?= "4518ac3620cf9950169ca59bcc72a93c03900f1b" -SRCREV_machine:qemux86 ?= "4518ac3620cf9950169ca59bcc72a93c03900f1b" -SRCREV_machine:qemux86-64 ?= "4518ac3620cf9950169ca59bcc72a93c03900f1b" -SRCREV_machine:qemumips64 ?= "4f64d38b79ca252c932d017ae05a82388403e625" -SRCREV_machine ?= "4518ac3620cf9950169ca59bcc72a93c03900f1b" -SRCREV_meta ?= "6a511f37e5360c6694ef592ad4fcae2630378ef5" +SRCREV_machine:qemuarm ?= "f922ef6c5d2f40b588b374303b125a556665c427" +SRCREV_machine:qemuarm64 ?= "f1a3c57fd940c97cdc5454f0b833a48f7e2d49b3" +SRCREV_machine:qemuloongarch64 ?= "ee1824941e0bfbd888e46be38faea742328372ec" +SRCREV_machine:qemumips ?= "93f844921cf7bb3df44cf48756bb8872b9a86856" +SRCREV_machine:qemuppc ?= "19a0163dd3acd0c52a8543d5ac0e3f69264d4c99" +SRCREV_machine:qemuriscv64 ?= "ee1824941e0bfbd888e46be38faea742328372ec" +SRCREV_machine:qemuriscv32 ?= "ee1824941e0bfbd888e46be38faea742328372ec" +SRCREV_machine:qemux86 ?= "ee1824941e0bfbd888e46be38faea742328372ec" +SRCREV_machine:qemux86-64 ?= "ee1824941e0bfbd888e46be38faea742328372ec" +SRCREV_machine:qemumips64 ?= "0311ea6c2383b09cbe18b0d3e3cc1dfa2bd91c1d" +SRCREV_machine ?= "ee1824941e0bfbd888e46be38faea742328372ec" +SRCREV_meta ?= "8483e6808972d92efd206b41c79f4e7122364d43" # set your preferred provider of linux-yocto to 'linux-yocto-upstream', and you'll # get the /base branch, which is pure upstream -stable, and the same # meta SRCREV as the linux-yocto-standard builds. Select your version using the # normal PREFERRED_VERSION settings. BBCLASSEXTEND = "devupstream:target" -SRCREV_machine:class-devupstream ?= "cc1a1c5b404a5e6ad751d0831b1991a90c3de4c5" +SRCREV_machine:class-devupstream ?= "60a9e718726fa7019ae00916e4b1c52498da5b60" PN:class-devupstream = "linux-yocto-upstream" KBRANCH:class-devupstream = "v6.6/base" @@ -44,7 +44,7 @@ SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;name=machine;branch=${KBRA git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.6;destsuffix=${KMETA};protocol=https" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" -LINUX_VERSION ?= "6.6.103" +LINUX_VERSION ?= "6.6.106" PV = "${LINUX_VERSION}+git" From patchwork Fri Oct 17 20:39:02 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 72625 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 00794CCD1A5 for ; Fri, 17 Oct 2025 20:40:04 +0000 (UTC) Received: from mail-pf1-f173.google.com (mail-pf1-f173.google.com [209.85.210.173]) by mx.groups.io with SMTP id smtpd.web11.3140.1760733601180639100 for ; Fri, 17 Oct 2025 13:40:01 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20230601.gappssmtp.com header.s=20230601 header.b=oA+VFO+u; spf=softfail (domain: sakoman.com, ip: 209.85.210.173, mailfrom: steve@sakoman.com) Received: by mail-pf1-f173.google.com with SMTP id d2e1a72fcca58-782a77b5ec7so2268911b3a.1 for ; Fri, 17 Oct 2025 13:40:01 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20230601.gappssmtp.com; s=20230601; t=1760733600; x=1761338400; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=p3Bjg6gtZA0NE7cezLtGdjTW3tsvU37Tz2MDmI0fCQk=; b=oA+VFO+uMpkmZ5ep/i/RNSXnc/mCxl2rRw/tDHjRuJeKN5im7OPZ1Z1ekPka1Rl+rF MQxRQ5ztOYZ3EED6O5jtcDsFqPd65GorMc8Bw7Ay9U7uZwN42J2WGeNRpmat7cxQqOTk 3mAdaa7bxxjyOTFGFPebWwO8nPXuIm4YoOnv1A0luYJ1v+NX+HAGvHGZzuNPYQXIg4M9 sqBA4uDFEGlXsCMYWkS8VyQykMdUjup8DpN6szK6lH/MgW9kQVduukMQk0hSo0NrVwp+ r6FsZTuUi0bAkXiH6cK3v6k+0lrzt0GuBscADR3GaqKxirWIJkTagKqNHImccpFJYbzd 2AEw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1760733600; x=1761338400; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=p3Bjg6gtZA0NE7cezLtGdjTW3tsvU37Tz2MDmI0fCQk=; b=pj6HNdDl1jzQh28wqNLcTeCI29k/cQofNd7YZ0EYfx9jEy87ETmbqkcI1UfUxQzh8m 1+vca8ka5rKiEWQaO0ZQN1cUZ4XYSmatdW/FOKTiuWnMfGng8vkusG1EXa0oatwBULtt 5DPgp4X6mN/8T8Z40HzzMh8Y4St/xPtzBJAJaLWsmuOO7h/yd4+Foi1aDHMjB+a465e0 /o1U6C8eSoZMKApjdutUn4PeGMxPLOkwUDwHeLrL39QVCxVSLXC6w6OvJUpYtPoXsDCG gegm0kOx/ppCQ7ARBmce9yvGGN7+Q+JqaASmpYjjGYuDxK76ksmPA5Wm2i3sfyPGdvbu GnYg== X-Gm-Message-State: AOJu0Yx9G/0kPKMGI47uSYgeTk8BfFlW072pr0I3qQKfL/J2hnExeWOF WrTWDGpIcjdjceW2/qlowTyxqsZx9z/HCFCNEXNOXrSrpwQSPTuGw8UTTE538QWt0i3LDnGMm3/ JBPbAIig= X-Gm-Gg: ASbGncuYBhsJUI0hpxt8ev/p6FOrkhSZ2gCXNY6jhAOhWzZDBZ3RTQGOjYwRv8moPuG iiQ5foxc2boM24z9dqEoACvAdFAgR8Ci3ODNqYaiYVQqNUbWOv8fi//uYR+sr5KvBskdL7wt37N qANV+F0ajUs0B+Qp8DhgZ3cgSG1M7KgkbDXLHKDU0Dv2GCo55jCMEzVDlu0rGVdZzph7e7MQy6I pcuPioycoxMGCsuDFhfzahUwXNfB+Ecmyl0RJl2lY8+b6y2sHbFrUyaLdnordyOWL1w1GJbHjPj 8/+CvfZrMP6Dt9kWazbgOgwPiNYVbJuFlF901MUtiobVVsbdPU6nYkbEOJBtWR+MEO8nyp/tFIR spV+/7w6wKYusYptTF+Lz+ike2oClozxfSRinxj5lHWC/tXagnP35mIeNyxwBUC7q47PKbRzWX5 ZT X-Google-Smtp-Source: AGHT+IGyXvvynN2vfaJFJpOXyqaiqiZHWO6LuYFeIFZXgfTdhYW1B/2zmcnr6ptubARPMER47YWZqw== X-Received: by 2002:a05:6a00:3ccd:b0:781:17fb:d3d0 with SMTP id d2e1a72fcca58-7a2208f01dcmr5584143b3a.8.1760733600290; Fri, 17 Oct 2025 13:40:00 -0700 (PDT) Received: from hexa.. ([2602:feb4:3b:2100:aaee:e640:34cd:6f2]) by smtp.gmail.com with ESMTPSA id d2e1a72fcca58-7a2300f254esm477061b3a.45.2025.10.17.13.39.56 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 17 Oct 2025 13:39:59 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][scarthgap 19/26] linux-yocto/6.6: update to v6.6.107 Date: Fri, 17 Oct 2025 13:39:02 -0700 Message-ID: <4964bdf8bf8b4c889928478db3e0d901e748fe55.1760733431.git.steve@sakoman.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 17 Oct 2025 20:40:03 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/225053 From: Bruce Ashfield Updating linux-yocto/6.6 to the latest korg -stable release that comprises the following commits: no ids found, dumping: af1544b5d072 Linux 6.6.107 f075a33ef204 x86: disable image size check for test builds 23f24d0a538e drm/i915/power: fix size for for_each_set_bit() in abox iteration 0a87bf8bd5d7 drm/amdgpu: fix a memory leak in fence cleanup when unloading d70b5910ca31 net: mdiobus: release reset_gpio in mdiobus_unregister_device() cce57cd8c5de ksmbd: fix null pointer dereference in alloc_preauth_hash() ce807c4c88d2 phy: ti-pipe3: fix device leak at unbind 7c89ea3ab302 phy: tegra: xusb: fix device and OF node leak at probe 221f6739369b dmaengine: dw: dmamux: Fix device reference leak in rzn1_dmamux_route_allocate ebf6c7c908e5 dmaengine: qcom: bam_dma: Fix DT error handling for num-channels/ees e0727853992a usb: gadget: midi2: Fix MIDI2 IN EP max packet size a04b32b0ec1b usb: gadget: midi2: Fix missing UMP group attributes initialization bea1946b6919 USB: gadget: dummy-hcd: Fix locking bug in RT-enabled kernels 26f296e4c497 xhci: fix memory leak regression when freeing xhci vdev devices depth first 0d861bc0b5c4 RISC-V: Remove unnecessary include from compat.h 156677ea10ba hrtimers: Unconditionally update target CPU base after offline timer migration b1fa39fb3026 hrtimer: Rename __hrtimer_hres_active() to hrtimer_hres_active() 6276a6b2c84e hrtimer: Remove unused function c504b5aaaaa5 regulator: sy7636a: fix lifecycle of power good gpio 1baed10553fc dmaengine: ti: edma: Fix memory allocation size for queue_priority_map df82c7901513 dmaengine: idxd: Fix double free in idxd_setup_wqs() f0e460925679 dmaengine: idxd: Fix refcount underflow on module unload 0e95ee7f532b dmaengine: idxd: Remove improper idxd_free 608c14c671a8 hsr: use hsr_for_each_port_rtnl in hsr_port_get_hsr b072e32e0874 hsr: use rtnl lock when iterating over ports 72dbae1f2f21 net: hsr: Add VLAN CTAG filter support 64a58ae64da5 net: hsr: Add support for MC filtering at the slave device 94b050726288 can: xilinx_can: xcan_write_frame(): fix use-after-free of transmitted SKB deedea599e87 can: j1939: j1939_local_ecu_get(): undo increment when j1939_local_ecu_get() fails 1e1adfffd3fe can: j1939: j1939_sk_bind(): call j1939_priv_put() immediately when j1939_local_ecu_get() failed 23431998a377 i40e: fix IRQ freeing in i40e_vsi_request_irq_msix error path ff00b2ed7c64 igb: fix link test skipping when interface is admin down e450b4966f72 docs: networking: can: change bcm_msg_head frames member to support flexible array e6867c0ae100 tunnels: reset the GSO metadata before reusing the skb 5e84e18f6727 net: bridge: Bounce invalid boolopts fe78891f296a net: fec: Fix possible NPD in fec_enet_phy_reset_after_clk_enable() 092e5703d400 Disable SLUB_TINY for build testing 8a8f093e621c USB: serial: option: add Telit Cinterion LE910C4-WWX new compositions e88b7810b43e USB: serial: option: add Telit Cinterion FN990A w/audio compositions bb3498089f86 dt-bindings: serial: brcm,bcm7271-uart: Constrain clocks a0da801d3ea0 serial: sc16is7xx: fix bug in flow control levels init 1e92afef6061 tty: hvc_console: Call hvc_kick in hvc_write unconditionally af253b1a5daa Revert "net: usb: asix: ax88772: drop phylink use in PM to avoid MDIO runtime PM wakeups" 7bd41f9c96dd Input: i8042 - add TUXEDO InfinityBook Pro Gen10 AMD to i8042 quirk table 27e126072ee0 Input: iqs7222 - avoid enabling unused interrupts 854baafc00c4 kernfs: Fix UAF in polling when open file is released 5de7b4141af1 cifs: fix pagecache leak when do writepages 9f4b38ad41d6 mm/khugepaged: fix the address passed to notifier on testing young c95c22402b00 mm/khugepaged: convert hpage_collapse_scan_pmd() to use folios 394547b9113f btrfs: fix corruption reading compressed range when block size is smaller than page size a29f891d4f37 btrfs: use readahead_expand() on compressed extents 7bb675c9f025 mm/damon/lru_sort: avoid divide-by-zero in damon_lru_sort_apply_parameters() 9fe0415156fb mm/damon/reclaim: avoid divide-by-zero in damon_reclaim_apply_parameters() 60d7a3d2b985 mm/damon/sysfs: fix use-after-free in state_show() 23538cfbeed8 libceph: fix invalid accesses to ceph_connection_v1_info b97edd195442 mtd: nand: raw: atmel: Respect tAR, tCLR in read setup timing 252bc25d7aac mtd: nand: raw: atmel: Fix comment in timings preparation cfdde9197ecd drm/amdgpu/vcn4: Fix IB parsing with multiple engine info packages 9adb902be26b drm/amdgpu/vcn: Allow limiting ctx to instance 0 for AV1 at any time b2fbe0f9f80b drm/mediatek: fix potential OF node use-after-free 6632845292a4 mm/damon/core: set quota->charged_from to jiffies at first charge window 3d278e89c2ea mm/memory-failure: fix VM_BUG_ON_PAGE(PagePoisoned(page)) when unpoison memory 8577ded2ee3d fuse: prevent overflow in copy_file_range return value 01e1eba64860 fuse: check if copy_file_range() returns larger than requested size c50336dfcb24 mtd: rawnand: stm32_fmc2: fix ECC overwrite 06d8ef8f8537 mtd: rawnand: stm32_fmc2: avoid overlapping mappings on ECC buffer 31dc1603aa43 net: usb: asix: ax88772: drop phylink use in PM to avoid MDIO runtime PM wakeups 9d55370cc4e2 i2c: i801: Hide Intel Birch Stream SoC TCO WDT 0709bc11b942 ocfs2: fix recursive semaphore deadlock in fiemap call 8345a93b9bda mptcp: sockopt: make sync_socket_options propagate SOCK_KEEPOPEN e69f61b8c08e compiler-clang.h: define __SANITIZE_*__ macros only when undefined deedce87471e Revert "SUNRPC: Don't allow waiting for exiting tasks" 6f628d7dd8ac EDAC/altera: Delete an inappropriate dma_free_coherent() call 2089d8a316f4 KVM: SVM: Set synthesized TSA CPUID flags 2b8a1969cae5 rcu-tasks: Maintain real-time response in rcu_tasks_postscan() d89abc4fbee8 rcu-tasks: Eliminate deadlocks involving do_exit() and RCU tasks 4e86206b6967 rcu-tasks: Maintain lists to eliminate RCU-tasks/do_exit() deadlocks 8be3d52101b0 proc: fix type confusion in pde_set_flags() 66bcb04a441f tcp_bpf: Call sk_msg_free() when tcp_bpf_send_verdict() fails to allocate psock->cork. 449682e76f32 bpf: Tell memcg to use allow_spinning=false path in bpf_timer_init() d660c8d8142e s390/cpum_cf: Deny all sampling events by counter PMU 1262bda871da tracing: Silence warning when chunk allocation fails in trace_pid_write 69d99a936f00 NFSv4/flexfiles: Fix layout merge mirror check. c288e4c39d21 NFSv4.2: Serialise O_DIRECT i/o and copy range 9f2fdb18d0bf NFSv4.2: Serialise O_DIRECT i/o and clone range 4089fd70a508 NFSv4.2: Serialise O_DIRECT i/o and fallocate() 320a0954e2c8 NFS: Serialise O_DIRECT i/o and truncate() 275d9fd06d96 fs/nfs/io: make nfs_start_io_*() killable 06c26a679029 ftrace/samples: Fix function size computation f7ec68cc74d8 tracing: Fix tracing_marker may trigger page fault during preempt_disable 781ec30354e6 NFSv4: Clear the NFS_CAP_XATTR flag if not supported by the server b39234ede545 NFSv4: Clear the NFS_CAP_FS_LOCATIONS flag if it is not set a022c9a46455 NFSv4: Don't clear capabilities that won't be reset 9339b4e75a81 SUNRPC: call xs_sock_process_cmsg for all cmsg fd00ae04c5aa flexfiles/pNFS: fix NULL checks on result of ff_layout_choose_ds_for_read 0214b96a6a63 ima: limit the number of ToMToU integrity violations 905d43b8ad24 net: Fix null-ptr-deref by sock_lock_init_class_and_name() and rmmod. 9da2a9d3ccd8 media: i2c: imx214: Fix link frequency validation 817a962db3f3 NFSD: nfsd_unlink() clobbers non-zero status returned from fh_fill_pre_attrs() 913ff520714f nfsd: Fix a regression in nfsd_setattr() 392260eb8e67 kasan: fix GCC mem-intrinsic prefix with sw tags d699575d00ff mm: introduce and use {pgd,p4d}_populate_kernel() 3f8810b2d22d kunit: kasan_test: disable fortify string checker on kasan_strings() test Signed-off-by: Bruce Ashfield Signed-off-by: Steve Sakoman --- .../linux/linux-yocto-rt_6.6.bb | 6 ++-- .../linux/linux-yocto-tiny_6.6.bb | 6 ++-- meta/recipes-kernel/linux/linux-yocto_6.6.bb | 28 +++++++++---------- 3 files changed, 20 insertions(+), 20 deletions(-) diff --git a/meta/recipes-kernel/linux/linux-yocto-rt_6.6.bb b/meta/recipes-kernel/linux/linux-yocto-rt_6.6.bb index 596b7bc49e..8c9704052e 100644 --- a/meta/recipes-kernel/linux/linux-yocto-rt_6.6.bb +++ b/meta/recipes-kernel/linux/linux-yocto-rt_6.6.bb @@ -14,13 +14,13 @@ python () { raise bb.parse.SkipRecipe("Set PREFERRED_PROVIDER_virtual/kernel to linux-yocto-rt to enable it") } -SRCREV_machine ?= "ddefe7df2a51318c404e7add38ab5e9d6d56eef3" -SRCREV_meta ?= "8483e6808972d92efd206b41c79f4e7122364d43" +SRCREV_machine ?= "30885ee3c489e60b779cc24e2fc03a8e6779d935" +SRCREV_meta ?= "053630c8c982aba6d423a87ddc5bc048d02e1371" SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;branch=${KBRANCH};name=machine;protocol=https \ git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.6;destsuffix=${KMETA};protocol=https" -LINUX_VERSION ?= "6.6.106" +LINUX_VERSION ?= "6.6.107" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" diff --git a/meta/recipes-kernel/linux/linux-yocto-tiny_6.6.bb b/meta/recipes-kernel/linux/linux-yocto-tiny_6.6.bb index 2624180bf1..851f55a779 100644 --- a/meta/recipes-kernel/linux/linux-yocto-tiny_6.6.bb +++ b/meta/recipes-kernel/linux/linux-yocto-tiny_6.6.bb @@ -8,7 +8,7 @@ require recipes-kernel/linux/linux-yocto.inc # CVE exclusions include recipes-kernel/linux/cve-exclusion_6.6.inc -LINUX_VERSION ?= "6.6.106" +LINUX_VERSION ?= "6.6.107" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}" @@ -17,8 +17,8 @@ DEPENDS += "openssl-native util-linux-native" KMETA = "kernel-meta" KCONF_BSP_AUDIT_LEVEL = "2" -SRCREV_machine ?= "5e027cdb537f4185431ed08d988fbd4eccf4beb3" -SRCREV_meta ?= "8483e6808972d92efd206b41c79f4e7122364d43" +SRCREV_machine ?= "aaaee193fafab055dd88cf0d607aae621d2176c4" +SRCREV_meta ?= "053630c8c982aba6d423a87ddc5bc048d02e1371" PV = "${LINUX_VERSION}+git" diff --git a/meta/recipes-kernel/linux/linux-yocto_6.6.bb b/meta/recipes-kernel/linux/linux-yocto_6.6.bb index 5614809066..86b21fdcb1 100644 --- a/meta/recipes-kernel/linux/linux-yocto_6.6.bb +++ b/meta/recipes-kernel/linux/linux-yocto_6.6.bb @@ -18,25 +18,25 @@ KBRANCH:qemux86-64 ?= "v6.6/standard/base" KBRANCH:qemuloongarch64 ?= "v6.6/standard/base" KBRANCH:qemumips64 ?= "v6.6/standard/mti-malta64" -SRCREV_machine:qemuarm ?= "f922ef6c5d2f40b588b374303b125a556665c427" -SRCREV_machine:qemuarm64 ?= "f1a3c57fd940c97cdc5454f0b833a48f7e2d49b3" -SRCREV_machine:qemuloongarch64 ?= "ee1824941e0bfbd888e46be38faea742328372ec" -SRCREV_machine:qemumips ?= "93f844921cf7bb3df44cf48756bb8872b9a86856" -SRCREV_machine:qemuppc ?= "19a0163dd3acd0c52a8543d5ac0e3f69264d4c99" -SRCREV_machine:qemuriscv64 ?= "ee1824941e0bfbd888e46be38faea742328372ec" -SRCREV_machine:qemuriscv32 ?= "ee1824941e0bfbd888e46be38faea742328372ec" -SRCREV_machine:qemux86 ?= "ee1824941e0bfbd888e46be38faea742328372ec" -SRCREV_machine:qemux86-64 ?= "ee1824941e0bfbd888e46be38faea742328372ec" -SRCREV_machine:qemumips64 ?= "0311ea6c2383b09cbe18b0d3e3cc1dfa2bd91c1d" -SRCREV_machine ?= "ee1824941e0bfbd888e46be38faea742328372ec" -SRCREV_meta ?= "8483e6808972d92efd206b41c79f4e7122364d43" +SRCREV_machine:qemuarm ?= "55ed661faf43ddeb46b59ce680ae34f801f0795b" +SRCREV_machine:qemuarm64 ?= "33aeb3e8739ce6389b0cf5b4215a1b73d4d5a943" +SRCREV_machine:qemuloongarch64 ?= "b730d8dc28f20af856a66b9fdfbdc9b00ccd9fb9" +SRCREV_machine:qemumips ?= "b1a43ff872dddc15f24c1a0e949370f2425826a4" +SRCREV_machine:qemuppc ?= "8d992b51ac4e4623d5a8dd71bae46fe7018cc552" +SRCREV_machine:qemuriscv64 ?= "b730d8dc28f20af856a66b9fdfbdc9b00ccd9fb9" +SRCREV_machine:qemuriscv32 ?= "b730d8dc28f20af856a66b9fdfbdc9b00ccd9fb9" +SRCREV_machine:qemux86 ?= "b730d8dc28f20af856a66b9fdfbdc9b00ccd9fb9" +SRCREV_machine:qemux86-64 ?= "b730d8dc28f20af856a66b9fdfbdc9b00ccd9fb9" +SRCREV_machine:qemumips64 ?= "01e9998c89f60f5bf5e6ffbb7708cd2f39c495c3" +SRCREV_machine ?= "b730d8dc28f20af856a66b9fdfbdc9b00ccd9fb9" +SRCREV_meta ?= "053630c8c982aba6d423a87ddc5bc048d02e1371" # set your preferred provider of linux-yocto to 'linux-yocto-upstream', and you'll # get the /base branch, which is pure upstream -stable, and the same # meta SRCREV as the linux-yocto-standard builds. Select your version using the # normal PREFERRED_VERSION settings. BBCLASSEXTEND = "devupstream:target" -SRCREV_machine:class-devupstream ?= "60a9e718726fa7019ae00916e4b1c52498da5b60" +SRCREV_machine:class-devupstream ?= "af1544b5d072514b219695b0a9fba0b1e0d5e289" PN:class-devupstream = "linux-yocto-upstream" KBRANCH:class-devupstream = "v6.6/base" @@ -44,7 +44,7 @@ SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;name=machine;branch=${KBRA git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.6;destsuffix=${KMETA};protocol=https" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" -LINUX_VERSION ?= "6.6.106" +LINUX_VERSION ?= "6.6.107" PV = "${LINUX_VERSION}+git" From patchwork Fri Oct 17 20:39:03 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 72623 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 00918CCD195 for ; Fri, 17 Oct 2025 20:40:04 +0000 (UTC) Received: from mail-pf1-f181.google.com (mail-pf1-f181.google.com [209.85.210.181]) by mx.groups.io with SMTP id smtpd.web11.3143.1760733603270000399 for ; Fri, 17 Oct 2025 13:40:03 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20230601.gappssmtp.com header.s=20230601 header.b=J8HEQj/t; spf=softfail (domain: sakoman.com, ip: 209.85.210.181, mailfrom: steve@sakoman.com) Received: by mail-pf1-f181.google.com with SMTP id d2e1a72fcca58-78af3fe5b17so2053321b3a.2 for ; Fri, 17 Oct 2025 13:40:03 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20230601.gappssmtp.com; s=20230601; t=1760733602; x=1761338402; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=JnKOWXS92cSL88Z7ns0qHi2sXAYXecGftMdxPkvVssM=; b=J8HEQj/tQ9yuTZDOhd0WucvqLBOV8zxow/q0+LKCvOndWOb10h+NCLMxGp7I5wL2ol 5km8WUZCmLI586CIHV9W/M3nsDc0wAPV/blEMuegOAC6H2d+snPP0Xd8DCJ/Z1zhnw2w dWfZzfexIZaCy8se6K5ZtPA0KIZulwOaBLvnPk0mvHDkXoDQkVqEnQ+Uet+ke+9CPAIO wm+7Xw920sl6RFfM10ZPO6Hp2QrszWvov7Tk7zXPkTQ33n1TQjmoWpT6N7n0iJPcceQs HjR8nf/MgBxBDVPNNktwtWGUBXviEyLWA/fZTnCYfK787MVowxB+dOFXup5ZaM1pX8N9 TzKw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1760733602; x=1761338402; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=JnKOWXS92cSL88Z7ns0qHi2sXAYXecGftMdxPkvVssM=; b=mW6ZrRSulPw8EMc6zHTy2PzBQzvs6QFULjMOAnAYRlAQae0n05jwnOl9DYCm308Hot FgP7n14I5iPCq/B3lq2LvmuIUP6uusI3ReUOZyOrFj6KmX36XtfzijsvnkJvyrXWMENx hoYUAIH7ICSIdBnMJcKzSUvXmkJnquKRcBd/Z912rtmP6czNUsKjNGRxcde1onXeinRm 1NEdaCnqyn79GAwUHkThugCYCARguZHAGCb4CG6MW5WF8ZgqjpMpnIhz4Ep6nZL90pyH GI7PxuveTpbinhyXzFaa1HmMdM1xQQ9RSPOmmwSAaXnYRr3bEkoWmPFD/c/ZxLDO/1SK BlIg== X-Gm-Message-State: AOJu0Yx+OU51dk7oAogrhp/LXWQdwcDO4w8cr2M4fQJksHUUubAx3IZr eNsHfv5g35XNFwOq4ROVNBM5BslXcb1jKfXy6uIJFycWHldUNMShRws4qW11bakXoHaPycm7DyF lGICndXU= X-Gm-Gg: ASbGncuG2fGMKSc8zfM6mPiPs0duLk5VeJxniDtpGLaZXjMu87aP2uvC1FuA1NGNPUV LBXQczBRYh51nVZ9aOLEA4L2nk8G/jY0EjP7naAzvBKu10hLdLSXJCZfy6pW1Xyi/rI/oXjacOZ QbLDd0DLPYFGm/uhsa54m0SOQw9PeahaMceykbPRHqM4HFR3kvkHJk9MpEcdv1Vd3r0efLJdO4F /FApXakJbNCxblJWcoV7Ol1IyYjyyTrnFOw6GVTwMjKvzwL5immeg79Zu9bNJnZpiDINng6cen6 dwboB4u7XOYK5omO82+BR4LFkEoHZRqf+EFXcqJz+HxA9N16hchoN0kO2bgvIolhm/tDtp83CqZ 7C8tpLWMhT5C8FYYVdS84oYSDB7KcC4GfeZJMLSj2AiIbYRsPKyLwPeLQH+mk+qwNJePRStDIok 4Z X-Google-Smtp-Source: AGHT+IHghI/rxnSLxlczDQgN+plbeoI+S3eNMb7LbWARoQib6Mp85V9ug2PwE/I/ehHoZfFMQtLjdA== X-Received: by 2002:a05:6a20:1611:b0:334:98c0:9c3a with SMTP id adf61e73a8af0-334a8585723mr5908068637.24.1760733602305; Fri, 17 Oct 2025 13:40:02 -0700 (PDT) Received: from hexa.. ([2602:feb4:3b:2100:aaee:e640:34cd:6f2]) by smtp.gmail.com with ESMTPSA id d2e1a72fcca58-7a2300f254esm477061b3a.45.2025.10.17.13.40.01 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 17 Oct 2025 13:40:01 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][scarthgap 20/26] linux-yocto/6.6: update to v6.6.108 Date: Fri, 17 Oct 2025 13:39:03 -0700 Message-ID: <0b5c6e21160e54b3b571343d932614b23231e273.1760733431.git.steve@sakoman.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 17 Oct 2025 20:40:03 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/225054 From: Bruce Ashfield Updating linux-yocto/6.6 to the latest korg -stable release that comprises the following commits: 147338df3487 Linux 6.6.108 42a6aeb4b238 Revert "loop: Avoid updating block size under exclusive owner" 06146c26f5cf minmax: add a few more MIN_T/MAX_T users af8b531ecfd4 minmax: simplify and clarify min_t()/max_t() implementation 2d396aa8264d minmax: avoid overly complicated constant expressions in VM code 532733ff82b9 mptcp: propagate shutdown to subflows when possible 3ef938f6f0b3 rtc: pcf2127: fix SPI command byte for PCF2131 backport 075abf0b1a95 iommu/amd/pgtbl: Fix possible race while increase page table level 564f2312e2ff xhci: dbc: Fix full DbC transfer ring after several reconnects 3c6dd29a460f xhci: dbc: decouple endpoint allocation from initialization 27b04564f7a3 phy: ti: omap-usb2: fix device leak at unbind 34a8d5a198bb phy: Use device_get_match_data() 0ee0ef483aae selftests: mptcp: userspace pm: validate deny-join-id0 flag 650150cc9a3e mptcp: pm: nl: announce deny-join-id0 flag a6157484bee3 vmxnet3: unregister xdp rxq info in the reset path e7b7a9387955 smb: client: fix smbdirect_recv_io leak in smbd_negotiate() error path 2374c11189ef crypto: af_alg - Set merge to zero early in af_alg_sendmsg 6a075f80f303 drm: bridge: cdns-mhdp8546: Fix missing mutex unlock on error path 15a77e1ab0a9 drm: bridge: anx7625: Fix NULL pointer dereference with early IRQ e6b0616a360f ASoC: SOF: Intel: hda-stream: Fix incorrect variable used in error message 7740da20a3a0 ASoC: wm8974: Correct PLL rate rounding b4e8741955dc ASoC: wm8940: Correct typo in control name b7e4884dd853 ASoC: wm8940: Correct PLL rate rounding abc9f859a9ea io_uring: include dying ring in task_work "should cancel" state c8e69b783bc4 io_uring: backport io_should_terminate_tw() 115e7d4d5ee8 ALSA: hda/realtek: Fix mute led for HP Laptop 15-dw4xx 0a3d5a4d4adc selftests: mptcp: avoid spurious errors on TCP disconnect 9ef1af5d4040 selftests: mptcp: connect: catch IO errors on listen side 666b49c848f1 rds: ib: Increment i_fastreg_wrs before bailing out 689aee35ce67 net: rfkill: gpio: Fix crash due to dereferencering uninitialized pointer 7e4c3cd7f0a1 KVM: SVM: Sync TPR from LAPIC into VMCB::V_TPR even if AVIC is active 6584e7ecfa7d mmc: mvsdio: Fix dma_unmap_sg() nents value ac4e940dc7da ASoC: qcom: q6apm-lpass-dais: Fix missing set_fmt DAI op for I2S 411f7d4f7038 ASoC: qcom: q6apm-lpass-dais: Fix NULL pointer dereference if source graph failed 468bb23472b7 ASoC: qcom: audioreach: Fix lpaif_type configuration for the I2S interface fc7bd02dadb8 btrfs: tree-checker: fix the incorrect inode ref size check 090b61b87420 iommu/vt-d: Fix __domain_mapping()'s usage of switch_to_super_page() 561eef41aaa3 LoongArch: Check the return value when creating kobj 2ff7ef2f71b4 LoongArch: Align ACPI structures if ARCH_STRICT_ALIGN enabled fb6ee62d3082 LoongArch: Update help info of ARCH_STRICT_ALIGN 90c0ffa1e0d9 power: supply: bq27xxx: restrict no-battery detection to bq27000 84ac57c4bbfd power: supply: bq27xxx: fix error return in case of no bq27000 hdq battery 7c4491b5644e crypto: af_alg - Disallow concurrent writes in af_alg_sendmsg ee74d69af170 nilfs2: fix CFI failure when accessing /sys/fs/nilfs2/features/* d3cb3f209d35 ksmbd: smbdirect: verify remaining_data_length respects max_fragmented_recv_size eb0378dde086 ksmbd: smbdirect: validate data_offset and data_length field of smb_direct_data_transfer d2cfefa14ce8 octeontx2-pf: Fix use-after-free bugs in otx2_sync_tstamp() 8eeb2091e72d cnic: Fix use-after-free bugs in cnic_delete_task cd093e8bdcfe net: liquidio: fix overflow in octeon_init_instr_queue() 13f57d484676 Revert "net/mlx5e: Update and set Xon/Xoff upon port speed set" 4cefe5be7388 tls: make sure to abort the stream if headers are bogus dfd06131107e tcp: Clear tcp_sk(sk)->fastopen_rsk in tcp_disconnect(). 97d797c5fc6f bonding: don't set oif to bond dev when getting NS target destination 2cb17c88edd3 net/mlx5e: Harden uplink netdev access against device unbind fd74bd40f1a4 net/mlx5e: Consider aggregated port speed during rate configuration a7f10a466d36 i40e: remove redundant memory barrier when cleaning Tx descs 0255c5100470 net: natsemi: fix `rx_dropped` double accounting on `netif_rx()` failure af114ef225e5 selftests: mptcp: sockopt: fix error messages dedaa9bcf79c mptcp: tfo: record 'deny join id0' info 36d9f72e5d66 mptcp: set remote_deny_join_id0 on SYN recv 29a5fd482cd5 bonding: set random address only when slaves already exist ea53e6a47e14 qed: Don't collect too many protection override GRC elements 2f4b68e7905e dpaa2-switch: fix buffer pool seeding for control traffic 4f364023ddcf um: virtio_uml: Fix use-after-free after put_device in probe 5d2c34ff78b8 btrfs: fix invalid extref key setup when replaying dentry 4a1e3ec28e80 cgroup: split cgroup_destroy_wq into 3 workqueues 9ba2b399dee2 pcmcia: omap_cf: Mark driver struct with __refdata to prevent section mismatch eae22a2573a0 wifi: mac80211: fix incorrect type for ret 93e063f15e17 wifi: mac80211: increase scan_ies_len for S1G 0ffb49ba247c ALSA: firewire-motu: drop EPOLLOUT from poll return values as write is not supported 6085291a1a58 wifi: wilc1000: avoid buffer overflow in WID string configuration Signed-off-by: Bruce Ashfield Signed-off-by: Steve Sakoman --- .../linux/linux-yocto-rt_6.6.bb | 6 ++-- .../linux/linux-yocto-tiny_6.6.bb | 6 ++-- meta/recipes-kernel/linux/linux-yocto_6.6.bb | 28 +++++++++---------- 3 files changed, 20 insertions(+), 20 deletions(-) diff --git a/meta/recipes-kernel/linux/linux-yocto-rt_6.6.bb b/meta/recipes-kernel/linux/linux-yocto-rt_6.6.bb index 8c9704052e..591d7cfc06 100644 --- a/meta/recipes-kernel/linux/linux-yocto-rt_6.6.bb +++ b/meta/recipes-kernel/linux/linux-yocto-rt_6.6.bb @@ -14,13 +14,13 @@ python () { raise bb.parse.SkipRecipe("Set PREFERRED_PROVIDER_virtual/kernel to linux-yocto-rt to enable it") } -SRCREV_machine ?= "30885ee3c489e60b779cc24e2fc03a8e6779d935" -SRCREV_meta ?= "053630c8c982aba6d423a87ddc5bc048d02e1371" +SRCREV_machine ?= "d26df76e222469eab0636af87da4c3c34a2c0b88" +SRCREV_meta ?= "a904e672202ae6aefec7b1600df13c15734148f8" SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;branch=${KBRANCH};name=machine;protocol=https \ git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.6;destsuffix=${KMETA};protocol=https" -LINUX_VERSION ?= "6.6.107" +LINUX_VERSION ?= "6.6.108" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" diff --git a/meta/recipes-kernel/linux/linux-yocto-tiny_6.6.bb b/meta/recipes-kernel/linux/linux-yocto-tiny_6.6.bb index 851f55a779..b32ae704f7 100644 --- a/meta/recipes-kernel/linux/linux-yocto-tiny_6.6.bb +++ b/meta/recipes-kernel/linux/linux-yocto-tiny_6.6.bb @@ -8,7 +8,7 @@ require recipes-kernel/linux/linux-yocto.inc # CVE exclusions include recipes-kernel/linux/cve-exclusion_6.6.inc -LINUX_VERSION ?= "6.6.107" +LINUX_VERSION ?= "6.6.108" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}" @@ -17,8 +17,8 @@ DEPENDS += "openssl-native util-linux-native" KMETA = "kernel-meta" KCONF_BSP_AUDIT_LEVEL = "2" -SRCREV_machine ?= "aaaee193fafab055dd88cf0d607aae621d2176c4" -SRCREV_meta ?= "053630c8c982aba6d423a87ddc5bc048d02e1371" +SRCREV_machine ?= "9b27fa4c1b3ed0ded5a407913711813a1fd829c5" +SRCREV_meta ?= "a904e672202ae6aefec7b1600df13c15734148f8" PV = "${LINUX_VERSION}+git" diff --git a/meta/recipes-kernel/linux/linux-yocto_6.6.bb b/meta/recipes-kernel/linux/linux-yocto_6.6.bb index 86b21fdcb1..438bb6d56d 100644 --- a/meta/recipes-kernel/linux/linux-yocto_6.6.bb +++ b/meta/recipes-kernel/linux/linux-yocto_6.6.bb @@ -18,25 +18,25 @@ KBRANCH:qemux86-64 ?= "v6.6/standard/base" KBRANCH:qemuloongarch64 ?= "v6.6/standard/base" KBRANCH:qemumips64 ?= "v6.6/standard/mti-malta64" -SRCREV_machine:qemuarm ?= "55ed661faf43ddeb46b59ce680ae34f801f0795b" -SRCREV_machine:qemuarm64 ?= "33aeb3e8739ce6389b0cf5b4215a1b73d4d5a943" -SRCREV_machine:qemuloongarch64 ?= "b730d8dc28f20af856a66b9fdfbdc9b00ccd9fb9" -SRCREV_machine:qemumips ?= "b1a43ff872dddc15f24c1a0e949370f2425826a4" -SRCREV_machine:qemuppc ?= "8d992b51ac4e4623d5a8dd71bae46fe7018cc552" -SRCREV_machine:qemuriscv64 ?= "b730d8dc28f20af856a66b9fdfbdc9b00ccd9fb9" -SRCREV_machine:qemuriscv32 ?= "b730d8dc28f20af856a66b9fdfbdc9b00ccd9fb9" -SRCREV_machine:qemux86 ?= "b730d8dc28f20af856a66b9fdfbdc9b00ccd9fb9" -SRCREV_machine:qemux86-64 ?= "b730d8dc28f20af856a66b9fdfbdc9b00ccd9fb9" -SRCREV_machine:qemumips64 ?= "01e9998c89f60f5bf5e6ffbb7708cd2f39c495c3" -SRCREV_machine ?= "b730d8dc28f20af856a66b9fdfbdc9b00ccd9fb9" -SRCREV_meta ?= "053630c8c982aba6d423a87ddc5bc048d02e1371" +SRCREV_machine:qemuarm ?= "5e91abaa4811127504cb00853c6af078c56d90ba" +SRCREV_machine:qemuarm64 ?= "6feefe0cbcfe7ca19e79301278220825e80596c9" +SRCREV_machine:qemuloongarch64 ?= "cc50e1696b84b0a12b9721d407ff5945f632fade" +SRCREV_machine:qemumips ?= "dd5b5367adaee59e606630182f14b424bb33cabf" +SRCREV_machine:qemuppc ?= "ed23e394ef890bca72748a35fad57aa96f73fb85" +SRCREV_machine:qemuriscv64 ?= "cc50e1696b84b0a12b9721d407ff5945f632fade" +SRCREV_machine:qemuriscv32 ?= "cc50e1696b84b0a12b9721d407ff5945f632fade" +SRCREV_machine:qemux86 ?= "cc50e1696b84b0a12b9721d407ff5945f632fade" +SRCREV_machine:qemux86-64 ?= "cc50e1696b84b0a12b9721d407ff5945f632fade" +SRCREV_machine:qemumips64 ?= "1bf580ad5f980683abed6fcef876b01da50d81fa" +SRCREV_machine ?= "cc50e1696b84b0a12b9721d407ff5945f632fade" +SRCREV_meta ?= "a904e672202ae6aefec7b1600df13c15734148f8" # set your preferred provider of linux-yocto to 'linux-yocto-upstream', and you'll # get the /base branch, which is pure upstream -stable, and the same # meta SRCREV as the linux-yocto-standard builds. Select your version using the # normal PREFERRED_VERSION settings. BBCLASSEXTEND = "devupstream:target" -SRCREV_machine:class-devupstream ?= "af1544b5d072514b219695b0a9fba0b1e0d5e289" +SRCREV_machine:class-devupstream ?= "147338df34870c0248133d7a986b1fab025ec56a" PN:class-devupstream = "linux-yocto-upstream" KBRANCH:class-devupstream = "v6.6/base" @@ -44,7 +44,7 @@ SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;name=machine;branch=${KBRA git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.6;destsuffix=${KMETA};protocol=https" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" -LINUX_VERSION ?= "6.6.107" +LINUX_VERSION ?= "6.6.108" PV = "${LINUX_VERSION}+git" From patchwork Fri Oct 17 20:39:04 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 72627 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id EE6E3CCD195 for ; Fri, 17 Oct 2025 20:40:13 +0000 (UTC) Received: from mail-pf1-f169.google.com (mail-pf1-f169.google.com [209.85.210.169]) by mx.groups.io with SMTP id smtpd.web10.3222.1760733605608677435 for ; Fri, 17 Oct 2025 13:40:05 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20230601.gappssmtp.com header.s=20230601 header.b=kCgEv08S; spf=softfail (domain: sakoman.com, ip: 209.85.210.169, mailfrom: steve@sakoman.com) Received: by mail-pf1-f169.google.com with SMTP id d2e1a72fcca58-78af743c232so2088591b3a.1 for ; Fri, 17 Oct 2025 13:40:05 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20230601.gappssmtp.com; s=20230601; t=1760733605; x=1761338405; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=aVZOaSqilOzcmx5L5qTG1tSExf2vJc9yHZnak60xHgs=; b=kCgEv08SnDXCNHJ/i05H/9eDMwHEtcoA1P/0Vwj2555l/wAOa0L0NKd7UNbdVDrGiF RUr0JsQa5O3BuBtrnRuUiDpK++RA+b12SU2DVX/0YapqxJp4taw97/hgPBcBU7ehXJ9n Y5Drp5Zq/FD4BklaeASBb0BHqlS/CF3EkzGoABpQrGhomxR8K32txUO3ws/BoTrGc5KA 78Wcwao4u7847g67WaPuRCgJKFvo6bhDZhMB/8tdjyprhMfTND2quJMQBJxZ5OlEcgA9 8fM8n8W7JkQWAcX1aeYNAj2YYQ0UnJ0Rv5MFHnXqI+w83I7Qdl2ONwR5D5fH+dDY7aJj nfBg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1760733605; x=1761338405; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=aVZOaSqilOzcmx5L5qTG1tSExf2vJc9yHZnak60xHgs=; b=NwOk76ugNd29EYqFGrvoYatRI+WdKFvv+wTyCpFgAskwmxphGWOf4amHDAYwDOM6SM EBWetN9H7YaOVe3JkAIO3qvCVeYCLrtRFro7bmsGtFH6tFvqJe/9815899E7HP8UxMgi st7sv9MlZ6M+sI/7nUMybZCvo1fYMFbRxZf1wF1XfwpjxHvY2nWOxJajXnirZvoNeBW4 3rH2Tur6TaaF+bWgcNl61aOwWRN9dFGuVeAf5P0QcA4PDRBU0fAh05Dpc0XWuNW88wWl oZWlw+Z/9NPqxcfj0nw6SwxDCKlckHCj6kLMCp4zumfmV79vOdOwKPLoxOAdsq5oVtYN 7zMA== X-Gm-Message-State: AOJu0YyKCp5Esu/ccTn8xaxjRZcS8TTW8mtldrCABwiS4VgT0q8+Yy3+ 2+INBiF5hSCefSt9+5gH367lnXSbozSTfv8LNFkijE+RSE0o82TK6Kq/fK464YzbFJR3Wz3LRut 6iW3TwmA= X-Gm-Gg: ASbGncvLldFvu5OQNE+TZrQTVLRTnnIWZYjxqKnFkzcyZcrKDvdPQpU0loXTCS1Gh8j 8wLPk4a5Jf87RrH9CC2kwQJ26nkNh2mdlexoN6CGUJj052LAQWhotAGLdmYIVHAt6fMuh+mx2jK WJ0fuOHNi6MEalLBrxH/6vkYsZbNq98f3wpwWX+eEowdJzzC622NQpIClSEfs5clCbAbiH7NVA8 ejamscZkVi5s2tUFsUyB/JlDqvJGF8aBrH+DeNP2wFBxNZmkRasIVAgxz7mPB3d1uIOTwl6q+yD 7CQBsYS+1ILDopT4ctd1iE2s8GhmWVDh/0ogyY9nWFM7Ln1DFrRe00f26eZAmjeXK/v+2+XSErV w7VpJGCEV9ztEwTdJTeXyYhAhSdufHG1RTaLRQfgrhjBPHaCDjZmg8EYRwhlTcf+PBA== X-Google-Smtp-Source: AGHT+IFxiM92/BLrgcwOrGc+2b80MxLFrB9V/nZxg0GKiDet+yhjTMO8wigZCgJ0DtsAdjA7v91brQ== X-Received: by 2002:a05:6a20:72a0:b0:2d5:264c:e494 with SMTP id adf61e73a8af0-334a863acacmr7024588637.56.1760733604683; Fri, 17 Oct 2025 13:40:04 -0700 (PDT) Received: from hexa.. ([2602:feb4:3b:2100:aaee:e640:34cd:6f2]) by smtp.gmail.com with ESMTPSA id d2e1a72fcca58-7a2300f254esm477061b3a.45.2025.10.17.13.40.03 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 17 Oct 2025 13:40:04 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][scarthgap 21/26] linux-yocto/6.6: update to v6.6.109 Date: Fri, 17 Oct 2025 13:39:04 -0700 Message-ID: <5234d795417f97cfce7bcd891e7bdeabc6f36e9e.1760733431.git.steve@sakoman.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 17 Oct 2025 20:40:13 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/225055 From: Bruce Ashfield Updating linux-yocto/6.6 to the latest korg -stable release that comprises the following commits: f34f16e5c6323 Linux 6.6.109 eb53056323f13 drm/i915/backlight: Return immediately when scale() finds invalid parameters 4529bb0b6be3d minmax.h: remove some #defines that are only expanded once 1a899044a0f5a minmax.h: simplify the variants of clamp() 9955044f552b5 minmax.h: move all the clamp() definitions after the min/max() ones 26c3d697becf3 minmax.h: use BUILD_BUG_ON_MSG() for the lo < hi test in clamp() 511e7d2e4d51f minmax.h: reduce the #define expansion of min(), max() and clamp() 85d619594313e minmax.h: update some comments 6012f69bf7495 minmax.h: add whitespace around operators and after commas 46648b94e6ebb minmax: fix up min3() and max3() too f0be4c5dc213d minmax: improve macro expansion and type checking 7194a302345da minmax: don't use max() in situations that want a C constant expression bb63c996c2db0 minmax: simplify min()/max()/clamp() implementation 6183c6579356a minmax: make generic MIN() and MAX() macros available everywhere c0c83f4cd074b i40e: add validation for ring_len param 6e4251690710d i40e: increase max descriptors for XL710 7ea47a560a7a3 drm/ast: Use msleep instead of mdelay for edid read ed6fa21f68973 gpiolib: Extend software-node support to support secondary software-nodes 457d2c5e112fd loop: Avoid updating block size under exclusive owner 78f579cb7d825 mm/migrate_device: don't add folio to be freed to LRU in migrate_device_finalize() e7a85efb873fa mm: migrate_device: use more folio in migrate_device_finalize() 684a9a995748c ARM: bcm: Select ARM_GIC_V3 for ARCH_BRCMSTB 53888cd32a3f6 s390/cpum_cf: Fix uninitialized warning after backport of ce971233242b 09e3bda3a7ba2 fbcon: Fix OOB access in font allocation adac90bb1aaf4 fbcon: fix integer overflow in fbcon_do_set_font c9c2a51f91aea mm/hugetlb: fix folio is still mapped when deleted df1fa034c0fc2 kmsan: fix out-of-bounds access to shadow memory cab278cead49a afs: Fix potential null pointer dereference in afs_put_server 58d304a89178d ARM: dts: socfpga: sodia: Fix mdio bus probe and PHY address 3887f3814c0e7 tracing: dynevent: Add a missing lockdown check on dynevent 8703940bd30b5 crypto: af_alg - Fix incorrect boolean values in af_alg_ctx b769490521cf9 i40e: improve VF MAC filters accounting b247cdd04750e i40e: add mask to apply valid bits for itr_idx edecce7abd715 i40e: add max boundary check for VF filters e748f1ee493f8 i40e: fix validation of VF state in get resources 3883e9702b6a4 i40e: fix input validation logic for action_meta 2cc26dac0518d i40e: fix idx validation in config queues msg 50a1e2f50f6c2 i40e: fix idx validation in i40e_validate_queue_map 3cefd898b7aa1 HID: asus: add support for missing PX series fn keys ba7bcfd52c66d smb: client: fix wrong index reference in smb2_compound_op() 348736955ed6c futex: Prevent use-after-free during requeue-PI 6ffa6b5bc861a drm/gma500: Fix null dereference in hdmi teardown df2c071061ed5 octeontx2-pf: Fix potential use after free in otx2_tc_add_flow() 7b209698e648b net: dsa: lantiq_gswip: suppress -EINVAL errors for bridge FDB entries added to the CPU port 816d30afbad52 net: dsa: lantiq_gswip: move gswip_add_single_port_br() call to port_setup() a7a2b29c1ee44 net: dsa: lantiq_gswip: do also enable or disable cpu port be0bd592298f8 selftests: fib_nexthops: Fix creation of non-FDB nexthops 24046d31f6f92 nexthop: Forbid FDB status change while nexthop is in a group 31ae2fbc9fcb9 net: allow alloc_skb_with_frags() to use MAX_SKB_FRAGS 98a76bd96f382 bnxt_en: correct offset handling for IPv6 destination address 82a1463c968b1 vhost: Take a reference on the task in struct vhost_task. bcce99f613163 Bluetooth: hci_event: Fix UAF in hci_acl_create_conn_sync 6a0070c5c3ad3 Bluetooth: hci_sync: Fix hci_resume_advertising_sync c957284701353 ethernet: rvu-af: Remove slash from the driver name 17edec1830e48 can: peak_usb: fix shift-out-of-bounds issue 3664ae91b26d1 can: mcba_usb: populate ndo_change_mtu() to prevent buffer overflow 2e423e1990f39 can: sun4i_can: populate ndo_change_mtu() to prevent buffer overflow be1b25005fd0f can: hi311x: populate ndo_change_mtu() to prevent buffer overflow cbc1de71766f3 can: etas_es58x: populate ndo_change_mtu() to prevent buffer overflow 0baf92d0b1590 xfrm: xfrm_alloc_spi shouldn't use 0 as SPI f64abeebf763c bpf: Reject bpf_timer for PREEMPT_RT 865eec09b6e44 can: rcar_can: rcar_can_resume(): fix s2ram with PSCI 210b91bfe355b wifi: virt_wifi: Fix page fault on connect c5be7edd42602 smb: server: don't use delayed_work for post_recv_credits_work 6017196aabf1d cpufreq: Initialize cpufreq-based invariance before subsys 35bb271de241d ARM: dts: kirkwood: Fix sound DAI cells for OpenRD clients ebe7a2e46d189 arm64: dts: imx8mp: Correct thermal sensor index 1744aff07b833 mm: folio_may_be_lru_cached() unless folio_test_large() d37ec803b2813 mm/gup: local lru_add_drain() to avoid lru_add_drain_all() 768c44cc8b638 mm/gup: check ref_count instead of lru before migration dc58ab1eb90c9 mm: add folio_expected_ref_count() for reference count calculation 4ed203f79821c mm/gup: revert "mm: gup: fix infinite loop within __get_longterm_locked" df2580fbcedea IB/mlx5: Fix obj_type mismatch for SRQ event subscriptions 943754ad81131 ALSA: usb-audio: Add mute TLV for playback volumes on more devices 0aac2fa4d0c75 ALSA: usb-audio: move mixer_quirks' min_mute into common quirk ea6016c9ec61d ALSA: usb-audio: Add DSD support for Comtrue USB Audio device b61b90b07416f i2c: designware: Add quirk for Intel Xe 41ea28a2de255 mmc: sdhci-cadence: add Mobileye eyeQ support 306697a775fbc usb: core: Add 0x prefix to quirks debug output dc77154e83048 ALSA: usb-audio: Fix build with CONFIG_INPUT=n a3961b1f7f79e ALSA: usb-audio: Convert comma to semicolon d04d301614630 ALSA: usb-audio: Add mixer quirk for Sony DualSense PS5 8fa69bd18148e ALSA: usb-audio: Remove unneeded wmb() in mixer_quirks 9db2614986bd0 ALSA: usb-audio: Simplify NULL comparison in mixer_quirks e8c605fece5b9 ALSA: usb-audio: Avoid multiple assignments in mixer_quirks bafc648b82c3b ALSA: usb-audio: Drop unnecessary parentheses in mixer_quirks 08a96e22bd37f ALSA: usb-audio: Fix block comments in mixer_quirks 18f9e77de5272 firewire: core: fix overlooked update of subsystem ABI version ca3e48e96816c scsi: ufs: mcq: Fix memory allocation checks for SQE and CQE Signed-off-by: Bruce Ashfield Signed-off-by: Steve Sakoman --- .../linux/linux-yocto-rt_6.6.bb | 6 ++-- .../linux/linux-yocto-tiny_6.6.bb | 6 ++-- meta/recipes-kernel/linux/linux-yocto_6.6.bb | 28 +++++++++---------- 3 files changed, 20 insertions(+), 20 deletions(-) diff --git a/meta/recipes-kernel/linux/linux-yocto-rt_6.6.bb b/meta/recipes-kernel/linux/linux-yocto-rt_6.6.bb index 591d7cfc06..c701c29ae1 100644 --- a/meta/recipes-kernel/linux/linux-yocto-rt_6.6.bb +++ b/meta/recipes-kernel/linux/linux-yocto-rt_6.6.bb @@ -14,13 +14,13 @@ python () { raise bb.parse.SkipRecipe("Set PREFERRED_PROVIDER_virtual/kernel to linux-yocto-rt to enable it") } -SRCREV_machine ?= "d26df76e222469eab0636af87da4c3c34a2c0b88" -SRCREV_meta ?= "a904e672202ae6aefec7b1600df13c15734148f8" +SRCREV_machine ?= "3162ade8ac9717b63836229e42b2a9ab9f58201e" +SRCREV_meta ?= "aef3b17fc578bf09fc3b27e4eb45a7ce7a1b39d8" SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;branch=${KBRANCH};name=machine;protocol=https \ git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.6;destsuffix=${KMETA};protocol=https" -LINUX_VERSION ?= "6.6.108" +LINUX_VERSION ?= "6.6.109" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" diff --git a/meta/recipes-kernel/linux/linux-yocto-tiny_6.6.bb b/meta/recipes-kernel/linux/linux-yocto-tiny_6.6.bb index b32ae704f7..1f9d249a3b 100644 --- a/meta/recipes-kernel/linux/linux-yocto-tiny_6.6.bb +++ b/meta/recipes-kernel/linux/linux-yocto-tiny_6.6.bb @@ -8,7 +8,7 @@ require recipes-kernel/linux/linux-yocto.inc # CVE exclusions include recipes-kernel/linux/cve-exclusion_6.6.inc -LINUX_VERSION ?= "6.6.108" +LINUX_VERSION ?= "6.6.109" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}" @@ -17,8 +17,8 @@ DEPENDS += "openssl-native util-linux-native" KMETA = "kernel-meta" KCONF_BSP_AUDIT_LEVEL = "2" -SRCREV_machine ?= "9b27fa4c1b3ed0ded5a407913711813a1fd829c5" -SRCREV_meta ?= "a904e672202ae6aefec7b1600df13c15734148f8" +SRCREV_machine ?= "b481c2fca6f1528d9bfe55daffb89d380e941335" +SRCREV_meta ?= "aef3b17fc578bf09fc3b27e4eb45a7ce7a1b39d8" PV = "${LINUX_VERSION}+git" diff --git a/meta/recipes-kernel/linux/linux-yocto_6.6.bb b/meta/recipes-kernel/linux/linux-yocto_6.6.bb index 438bb6d56d..1660e065f3 100644 --- a/meta/recipes-kernel/linux/linux-yocto_6.6.bb +++ b/meta/recipes-kernel/linux/linux-yocto_6.6.bb @@ -18,25 +18,25 @@ KBRANCH:qemux86-64 ?= "v6.6/standard/base" KBRANCH:qemuloongarch64 ?= "v6.6/standard/base" KBRANCH:qemumips64 ?= "v6.6/standard/mti-malta64" -SRCREV_machine:qemuarm ?= "5e91abaa4811127504cb00853c6af078c56d90ba" -SRCREV_machine:qemuarm64 ?= "6feefe0cbcfe7ca19e79301278220825e80596c9" -SRCREV_machine:qemuloongarch64 ?= "cc50e1696b84b0a12b9721d407ff5945f632fade" -SRCREV_machine:qemumips ?= "dd5b5367adaee59e606630182f14b424bb33cabf" -SRCREV_machine:qemuppc ?= "ed23e394ef890bca72748a35fad57aa96f73fb85" -SRCREV_machine:qemuriscv64 ?= "cc50e1696b84b0a12b9721d407ff5945f632fade" -SRCREV_machine:qemuriscv32 ?= "cc50e1696b84b0a12b9721d407ff5945f632fade" -SRCREV_machine:qemux86 ?= "cc50e1696b84b0a12b9721d407ff5945f632fade" -SRCREV_machine:qemux86-64 ?= "cc50e1696b84b0a12b9721d407ff5945f632fade" -SRCREV_machine:qemumips64 ?= "1bf580ad5f980683abed6fcef876b01da50d81fa" -SRCREV_machine ?= "cc50e1696b84b0a12b9721d407ff5945f632fade" -SRCREV_meta ?= "a904e672202ae6aefec7b1600df13c15734148f8" +SRCREV_machine:qemuarm ?= "d51aeddc46e2565930c596b0dd68b510c4ae56b9" +SRCREV_machine:qemuarm64 ?= "b551efd543db7dff08c01c87822fa9c02c03c9eb" +SRCREV_machine:qemuloongarch64 ?= "b6cb3303de9f505773ec65defd0437d2d13d270f" +SRCREV_machine:qemumips ?= "7c4a971ad6360845687a90f1d07e22f4f1b8c3c9" +SRCREV_machine:qemuppc ?= "61f111b7d27c1153f299945a00cf263f4e289706" +SRCREV_machine:qemuriscv64 ?= "b6cb3303de9f505773ec65defd0437d2d13d270f" +SRCREV_machine:qemuriscv32 ?= "b6cb3303de9f505773ec65defd0437d2d13d270f" +SRCREV_machine:qemux86 ?= "b6cb3303de9f505773ec65defd0437d2d13d270f" +SRCREV_machine:qemux86-64 ?= "b6cb3303de9f505773ec65defd0437d2d13d270f" +SRCREV_machine:qemumips64 ?= "2cbe3d7e9f728945185446f19b06aa785ec0d2ff" +SRCREV_machine ?= "b6cb3303de9f505773ec65defd0437d2d13d270f" +SRCREV_meta ?= "aef3b17fc578bf09fc3b27e4eb45a7ce7a1b39d8" # set your preferred provider of linux-yocto to 'linux-yocto-upstream', and you'll # get the /base branch, which is pure upstream -stable, and the same # meta SRCREV as the linux-yocto-standard builds. Select your version using the # normal PREFERRED_VERSION settings. BBCLASSEXTEND = "devupstream:target" -SRCREV_machine:class-devupstream ?= "147338df34870c0248133d7a986b1fab025ec56a" +SRCREV_machine:class-devupstream ?= "f34f16e5c63232cfd9bfeb722e0878e209caa9ce" PN:class-devupstream = "linux-yocto-upstream" KBRANCH:class-devupstream = "v6.6/base" @@ -44,7 +44,7 @@ SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;name=machine;branch=${KBRA git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.6;destsuffix=${KMETA};protocol=https" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" -LINUX_VERSION ?= "6.6.108" +LINUX_VERSION ?= "6.6.109" PV = "${LINUX_VERSION}+git" From patchwork Fri Oct 17 20:39:05 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 72628 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id F403ACCD1A5 for ; Fri, 17 Oct 2025 20:40:13 +0000 (UTC) Received: from mail-pf1-f178.google.com (mail-pf1-f178.google.com [209.85.210.178]) by mx.groups.io with SMTP id smtpd.web11.3147.1760733607297843960 for ; Fri, 17 Oct 2025 13:40:07 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20230601.gappssmtp.com header.s=20230601 header.b=wz3oEOaR; spf=softfail (domain: sakoman.com, ip: 209.85.210.178, mailfrom: steve@sakoman.com) Received: by mail-pf1-f178.google.com with SMTP id d2e1a72fcca58-78af3fe5b17so2053380b3a.2 for ; Fri, 17 Oct 2025 13:40:07 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20230601.gappssmtp.com; s=20230601; t=1760733606; x=1761338406; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=xirkMxs8O9qY6EH+MoemkTBIBGBnO8vlsc9mtgwevtc=; b=wz3oEOaRqr++aXSinWv7RVeVeSDjr7eGl0TUW9RFAJUHa4JfWrgSKj9iYFiLevgJyt XmBJgaorVZffGbAXDGwZeWHGFZLpBpYKxCCL3dDtFuRZaYEsCjfAnnTH+CanRDEL3kEm 9+KzEAbJ3onmZ+WmjfOy346ycOD0B146NxYtfzzCyOfSOsyGBnGQdY+r4cgetXWI+BRa GtpsJ7+BIczwEVX3Mrgg8ovGRSOXg6WENZ2BDRyAUs27jrWwVjxtZv84uCb+td75w52L D/AaOF8AiPRvB8yL723LmwUO0RF90irG4LNRvtbT75594VmgbMLC8qqWMzZ2sCz9gBTy CILg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1760733606; x=1761338406; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=xirkMxs8O9qY6EH+MoemkTBIBGBnO8vlsc9mtgwevtc=; b=KtSGzZh9wCPzoSFMhoZX3W7YMPo1oT4K/HNA+jwuoK0zwpjm4dH7twUQCZ3Wek3Fhz OFnzKVeyCAPguO4ELhNScghLeOAh4oytXj2hAe0bL7X+T3bBjG0WJ4u1osWnPV1A99u4 tEhjQfXrfMnuRG/O1CPJxQSGlav07panmOsjtPvazVboTLCXGcPlN27uCqxSfA42jCg2 21XWjypXigxNWKV2PvF6pHAteHnWlgOKEHlA4PE/6tjt1RgYp0NfVf76NQi+AONZUFPb 9YFUO20Y8PM6++2+ouFUwmSzRJZWwHB1zJqsih35M94+43YCs4e5VuiGGXpD/Rvb4ijj JaJw== X-Gm-Message-State: AOJu0YzbZmeSmp44XZ693QxtSK+Jtn8+NyjlX+vxDrOeukFsHR9dSDGN a9rWMqaRbeiZNCrriaCF5KHdz3wVm8gq8au7wue/DxzgDf8koirh1OpshFjcw34puPnoiPDJ69E iq006nZ4= X-Gm-Gg: ASbGncvIj2IxWVFYtmPc+/TjB8vsfXMDg6Xm3Kj8iflKHvopzD13JAdAjnAECgZobzR bEE2UiF+RoN2EagpcpKZtYMI+fJR+l9Iw5A9Exa2oPyGRSM4Adlncsfd0bP8gxswZH45tKI+8hG RlXhS0AYUJ6KYVhjm8QSBVT/sVohm7Ff9WdgrpZmNy+0MvpG03VvKluo99BJVQ5DqOhbHR/YEuW 2q2DRPVHAmSsjF75bHzPayRXP/CtkiqXglW8+bZZ8a3POtAUgry6jCe3OWG0dIiAnDiXpq6yv57 FiJO9OiALPlBm0p5qZ473FBYeSYsWyRU3VRLIuShjzIuA0knGLmj8hrLzx1NhqorO7DuKn4wjKG tJEp3w7Jv2856b+TmqjWBSQF50VwmNsKKQDjOz9sKASyrlvu6zQhWC0CNZZgZvTdiUg== X-Google-Smtp-Source: AGHT+IE0OvUhAeq9yiZ9nDyRvU3kHSC3s7883FdKPUJ4fdxpV0vW8cHctBzLQbRzvdxdfJ2VX/rA7w== X-Received: by 2002:a05:6a00:238b:b0:77f:449f:66b0 with SMTP id d2e1a72fcca58-7a220b2cd3dmr6707802b3a.32.1760733606407; Fri, 17 Oct 2025 13:40:06 -0700 (PDT) Received: from hexa.. ([2602:feb4:3b:2100:aaee:e640:34cd:6f2]) by smtp.gmail.com with ESMTPSA id d2e1a72fcca58-7a2300f254esm477061b3a.45.2025.10.17.13.40.05 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 17 Oct 2025 13:40:06 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][scarthgap 22/26] linux-yocto/6.6: update to v6.6.110 Date: Fri, 17 Oct 2025 13:39:05 -0700 Message-ID: <42854520a9476ce5ac210097a5f6ce18ecc66c80.1760733431.git.steve@sakoman.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 17 Oct 2025 20:40:13 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/225056 From: Bruce Ashfield Updating linux-yocto/6.6 to the latest korg -stable release that comprises the following commits: e617101e5626 Linux 6.6.110 70e1e5fe9f7e ASoC: qcom: audioreach: fix potential null pointer dereference f617d515d66c media: uvcvideo: Mark invalid entities with id UVC_INVALID_ENTITY_ID 71da40648741 media: rc: fix races with imon_disconnect() bb10a9ddc8d6 media: b2c2: Fix use-after-free causing by irq_check_work in flexcop_pci_remove f03aa5e39da7 scsi: target: target_core_configfs: Add length check to avoid buffer overflow e28d05370969 gcc-plugins: Remove TODO_verify_il for GCC >= 16 5d646a763232 crypto: sha256 - fix crash at kexec Signed-off-by: Bruce Ashfield Signed-off-by: Steve Sakoman --- .../linux/linux-yocto-rt_6.6.bb | 6 ++-- .../linux/linux-yocto-tiny_6.6.bb | 6 ++-- meta/recipes-kernel/linux/linux-yocto_6.6.bb | 28 +++++++++---------- 3 files changed, 20 insertions(+), 20 deletions(-) diff --git a/meta/recipes-kernel/linux/linux-yocto-rt_6.6.bb b/meta/recipes-kernel/linux/linux-yocto-rt_6.6.bb index c701c29ae1..7652e03569 100644 --- a/meta/recipes-kernel/linux/linux-yocto-rt_6.6.bb +++ b/meta/recipes-kernel/linux/linux-yocto-rt_6.6.bb @@ -14,13 +14,13 @@ python () { raise bb.parse.SkipRecipe("Set PREFERRED_PROVIDER_virtual/kernel to linux-yocto-rt to enable it") } -SRCREV_machine ?= "3162ade8ac9717b63836229e42b2a9ab9f58201e" -SRCREV_meta ?= "aef3b17fc578bf09fc3b27e4eb45a7ce7a1b39d8" +SRCREV_machine ?= "07bc1b79b450a91fa9ed645a4c6c77332f6c7fd3" +SRCREV_meta ?= "46ee47b6ee7ce2b3cef51844d7a7e82c6c2daf5d" SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;branch=${KBRANCH};name=machine;protocol=https \ git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.6;destsuffix=${KMETA};protocol=https" -LINUX_VERSION ?= "6.6.109" +LINUX_VERSION ?= "6.6.110" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" diff --git a/meta/recipes-kernel/linux/linux-yocto-tiny_6.6.bb b/meta/recipes-kernel/linux/linux-yocto-tiny_6.6.bb index 1f9d249a3b..33eafc2f6d 100644 --- a/meta/recipes-kernel/linux/linux-yocto-tiny_6.6.bb +++ b/meta/recipes-kernel/linux/linux-yocto-tiny_6.6.bb @@ -8,7 +8,7 @@ require recipes-kernel/linux/linux-yocto.inc # CVE exclusions include recipes-kernel/linux/cve-exclusion_6.6.inc -LINUX_VERSION ?= "6.6.109" +LINUX_VERSION ?= "6.6.110" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}" @@ -17,8 +17,8 @@ DEPENDS += "openssl-native util-linux-native" KMETA = "kernel-meta" KCONF_BSP_AUDIT_LEVEL = "2" -SRCREV_machine ?= "b481c2fca6f1528d9bfe55daffb89d380e941335" -SRCREV_meta ?= "aef3b17fc578bf09fc3b27e4eb45a7ce7a1b39d8" +SRCREV_machine ?= "0381ada6e1fee2c488a718f82ed83f0435a950c2" +SRCREV_meta ?= "46ee47b6ee7ce2b3cef51844d7a7e82c6c2daf5d" PV = "${LINUX_VERSION}+git" diff --git a/meta/recipes-kernel/linux/linux-yocto_6.6.bb b/meta/recipes-kernel/linux/linux-yocto_6.6.bb index 1660e065f3..c75094dc59 100644 --- a/meta/recipes-kernel/linux/linux-yocto_6.6.bb +++ b/meta/recipes-kernel/linux/linux-yocto_6.6.bb @@ -18,25 +18,25 @@ KBRANCH:qemux86-64 ?= "v6.6/standard/base" KBRANCH:qemuloongarch64 ?= "v6.6/standard/base" KBRANCH:qemumips64 ?= "v6.6/standard/mti-malta64" -SRCREV_machine:qemuarm ?= "d51aeddc46e2565930c596b0dd68b510c4ae56b9" -SRCREV_machine:qemuarm64 ?= "b551efd543db7dff08c01c87822fa9c02c03c9eb" -SRCREV_machine:qemuloongarch64 ?= "b6cb3303de9f505773ec65defd0437d2d13d270f" -SRCREV_machine:qemumips ?= "7c4a971ad6360845687a90f1d07e22f4f1b8c3c9" -SRCREV_machine:qemuppc ?= "61f111b7d27c1153f299945a00cf263f4e289706" -SRCREV_machine:qemuriscv64 ?= "b6cb3303de9f505773ec65defd0437d2d13d270f" -SRCREV_machine:qemuriscv32 ?= "b6cb3303de9f505773ec65defd0437d2d13d270f" -SRCREV_machine:qemux86 ?= "b6cb3303de9f505773ec65defd0437d2d13d270f" -SRCREV_machine:qemux86-64 ?= "b6cb3303de9f505773ec65defd0437d2d13d270f" -SRCREV_machine:qemumips64 ?= "2cbe3d7e9f728945185446f19b06aa785ec0d2ff" -SRCREV_machine ?= "b6cb3303de9f505773ec65defd0437d2d13d270f" -SRCREV_meta ?= "aef3b17fc578bf09fc3b27e4eb45a7ce7a1b39d8" +SRCREV_machine:qemuarm ?= "2a0fa5ba202ff49a42a8f1c5e36ed1a2d7dc9b91" +SRCREV_machine:qemuarm64 ?= "0974351ebdd700bc59eb25d7144e96c34cc28751" +SRCREV_machine:qemuloongarch64 ?= "272bf113897632849f52e9dfc1bb990daa566375" +SRCREV_machine:qemumips ?= "4b003154faca105c81dcfaebfe4e753b378eddde" +SRCREV_machine:qemuppc ?= "b1416ec0248422122027ab9cee287d7c86e5cf77" +SRCREV_machine:qemuriscv64 ?= "272bf113897632849f52e9dfc1bb990daa566375" +SRCREV_machine:qemuriscv32 ?= "272bf113897632849f52e9dfc1bb990daa566375" +SRCREV_machine:qemux86 ?= "272bf113897632849f52e9dfc1bb990daa566375" +SRCREV_machine:qemux86-64 ?= "272bf113897632849f52e9dfc1bb990daa566375" +SRCREV_machine:qemumips64 ?= "4b0c928fbc6df11ad63d99b006a8448597ccdd7d" +SRCREV_machine ?= "272bf113897632849f52e9dfc1bb990daa566375" +SRCREV_meta ?= "46ee47b6ee7ce2b3cef51844d7a7e82c6c2daf5d" # set your preferred provider of linux-yocto to 'linux-yocto-upstream', and you'll # get the /base branch, which is pure upstream -stable, and the same # meta SRCREV as the linux-yocto-standard builds. Select your version using the # normal PREFERRED_VERSION settings. BBCLASSEXTEND = "devupstream:target" -SRCREV_machine:class-devupstream ?= "f34f16e5c63232cfd9bfeb722e0878e209caa9ce" +SRCREV_machine:class-devupstream ?= "e617101e562654c7d59ed5cfcd30f610f1f64411" PN:class-devupstream = "linux-yocto-upstream" KBRANCH:class-devupstream = "v6.6/base" @@ -44,7 +44,7 @@ SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;name=machine;branch=${KBRA git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.6;destsuffix=${KMETA};protocol=https" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" -LINUX_VERSION ?= "6.6.109" +LINUX_VERSION ?= "6.6.110" PV = "${LINUX_VERSION}+git" From patchwork Fri Oct 17 20:39:06 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 72629 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 0C549CCD1AA for ; Fri, 17 Oct 2025 20:40:14 +0000 (UTC) Received: from mail-pf1-f179.google.com (mail-pf1-f179.google.com [209.85.210.179]) by mx.groups.io with SMTP id smtpd.web11.3152.1760733609053131522 for ; Fri, 17 Oct 2025 13:40:09 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20230601.gappssmtp.com header.s=20230601 header.b=E8fDRYIq; spf=softfail (domain: sakoman.com, ip: 209.85.210.179, mailfrom: steve@sakoman.com) Received: by mail-pf1-f179.google.com with SMTP id d2e1a72fcca58-77f5d497692so3082778b3a.1 for ; Fri, 17 Oct 2025 13:40:09 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20230601.gappssmtp.com; s=20230601; t=1760733608; x=1761338408; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=r2IjBpU+VClWguoJitDRTCK9CcCWwZEXgcZsmc8BvWg=; b=E8fDRYIqyG4WO+n0BCJ1oeq5OcmGDXJgM7lq6W6vc7it9F2FJoyEYbaydcSUxXYJ/w h2vbTJo8H9gwuBR3lSjzy91WlNiFJ30uHxpa34OPcXhfCb4lPxsNCOXcVI15f0XBpj28 tqKJcnEojsK8AA+mNi+Kh2MBr259MRyywUP6We3P7m6iQAfrrNGJeqMmI1VIZvg+8wGY 3bU9tiAg4s4EAm7eVwTwWTDoduRPVfQuyM4A/k9t/+S5sb60haH+pjc/OwNaVWXejOh4 ZkA5A7Zbp0BO4ycHoPEGrjphKQTyRiTKE0wqMw5aiifYo/tSBY19aJI5cNVaBsWupHx0 E62g== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1760733608; x=1761338408; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=r2IjBpU+VClWguoJitDRTCK9CcCWwZEXgcZsmc8BvWg=; b=QJs6+9HQ5YjoxeHzflOdPRClEj5GLW8Cl9J74+W/5rZJ7nXpu7Gy8Af2jfiuyE9fZm zLOHwlUHqq24M2oDYDf2NAduB8QTdShWA3pexf5nqXS4JxddsK75a13Lfv8ftnXL0TMI jSi6KehQlIN9eslUNDpsBlI1swZ9ELTBBv+9InduqTtMczCcXdtHBO/PhemBPAwCTkpf fhjYJSv/BSp57spLd5D1vV2Driv6C3bzCIwlZHKw/Ms4qNXwm9T4QR/9uf9c/aKUhjDF wUptpIgxNV0gCRaoEXxrQNCPPyW5m2BDkI6PwmzF9S+to5sRg+Zz+0UTdFmuUY+WlXvQ MVWw== X-Gm-Message-State: AOJu0YziaasTBMXkLBl8rbuSDYOrv364lVdV7nOTqEMlpbXbqSpsDJPe W+4OgTypYJLXsZ4crExhbc4SAGD0UBFvhq0FZP25tGLLlFKDg6LsXRdRNe8c9j85hZaIo98IAnv Q+B8/uUc= X-Gm-Gg: ASbGncvAi/ysvI5hlEVAjIUAfRaanTLfx237n0f4sgI3QpCdLjbdvw+PUbnmxRYnT4w W0zOrR3qRjeo1upefvFUdaaNyrtye2xdWs3R0A7+rO3KJ1q7vcGOf0CINPklSe94NjVpiTpJ0ue fU1hdiLX1bpAlopJHn3OjkgwRgSUYvm+V0tpy4/X0Asv42BOvWrcIbcBhHcTFuhGUod6fgxruKZ TCBk5cQWrCuADcvSmQhSucv7lXv/jkaqTj7DYVhhJde3lIgBMaGsIIDhAIQDJAEeK2qA4DdMbi2 CyDcDSWkONv80xnhtV09M5o4ZUTYL0wQxUmPl5KaPIFDu5rGX/1wdFr5qCf4qa3FvRQ1RlLZgxu YJjE8mNosP6xOkgV3yunqXFVqS4BIiRxdgM5xT9BHml7BGu7usQAaJWH8b7OGL8PXDA== X-Google-Smtp-Source: AGHT+IG6neDjHCC8rcjX7shHtUGJN+9kEoF74Ln5Nk6eldQa5iVVhBBDV63Yc8a3G3y6oDs69eXw2g== X-Received: by 2002:a05:6a00:21c4:b0:781:2290:e7e7 with SMTP id d2e1a72fcca58-7a220adb22bmr7231922b3a.18.1760733608230; Fri, 17 Oct 2025 13:40:08 -0700 (PDT) Received: from hexa.. ([2602:feb4:3b:2100:aaee:e640:34cd:6f2]) by smtp.gmail.com with ESMTPSA id d2e1a72fcca58-7a2300f254esm477061b3a.45.2025.10.17.13.40.07 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 17 Oct 2025 13:40:07 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][scarthgap 23/26] linux-yocto/6.6: update to v6.6.111 Date: Fri, 17 Oct 2025 13:39:06 -0700 Message-ID: <2a947cb13d0d46747f14aa6a1aa39a486459ee8a.1760733431.git.steve@sakoman.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 17 Oct 2025 20:40:14 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/225057 From: Bruce Ashfield Updating linux-yocto/6.6 to the latest korg -stable release that comprises the following commits: 655054d2c3c1 Linux 6.6.111 3d3abf3f7e8b KVM: x86: Don't (re)check L1 intercepts when completing userspace I/O 284e67a93b8c net/9p: fix double req put in p9_fd_cancelled ab172f4f4262 crypto: rng - Ensure set_ent is always present f5f235be7612 riscv: mm: Do not restrict mmap address based on hint 1602c9b4578a riscv: mm: Use hint address in mmap if available e242e52fdfe4 driver core/PM: Set power.no_callbacks along with power.no_pm e857421992ce staging: axis-fifo: flush RX FIFO on read errors a3c71d6c8332 staging: axis-fifo: fix TX handling on copy_from_user() failure 6d953e9d3981 staging: axis-fifo: fix maximum TX packet length check bfeea103cad9 serial: stm32: allow selecting console when the driver is module cb7630e714d6 hid: fix I2C read buffer overflow in raw_event() for mcp2221 dc4874366cf6 ALSA: usb-audio: fix race condition to UAF in snd_usbmidi_free 647410a7da46 ALSA: usb-audio: Kill timer properly at removal 97e87f367c91 platform/x86/amd/pmc: Add Stellaris Slim Gen6 AMD to spurious 8042 quirks list bf28f5db40d5 can: rcar_canfd: Fix controller mode setting e93af787187e can: hi311x: fix null pointer dereference when resuming from sleep before interface was enabled 03510f5fce33 btrfs: ref-verify: handle damaged extent root tree bcccd0220751 ASoC: rt5682s: Adjust SAR ADC button mode to fix noise issue 081f14b9a3eb perf subcmd: avoid crash in exclude_cmds when excludes is empty 6d59f7467f83 platform/x86/amd/pmc: Add MECHREVO Yilong15Pro to spurious_8042 list 4b91d0c5781a dm-integrity: limit MAX_TAG_SIZE to 255 7f7187118bb5 ASoC: amd: acp: Adjust pdm gain value 8281c2a63bbc wifi: rtlwifi: rtl8192cu: Don't claim USB ID 07b8:8188 96dc17ae64b1 USB: serial: option: add SIMCom 8230C compositions 228d06c4cbfc media: i2c: tc358743: Fix use-after-free bugs caused by orphan timer in probe 71ed8b81a490 media: tuner: xc5000: Fix use-after-free in xc5000_release f82dc869220d media: tunner: xc5000: Refactor firmware load 250b6e009ff9 KVM: arm64: Fix softirq masking in FPSIMD register saving sequence Signed-off-by: Bruce Ashfield Signed-off-by: Steve Sakoman --- .../linux/linux-yocto-rt_6.6.bb | 6 ++-- .../linux/linux-yocto-tiny_6.6.bb | 6 ++-- meta/recipes-kernel/linux/linux-yocto_6.6.bb | 28 +++++++++---------- 3 files changed, 20 insertions(+), 20 deletions(-) diff --git a/meta/recipes-kernel/linux/linux-yocto-rt_6.6.bb b/meta/recipes-kernel/linux/linux-yocto-rt_6.6.bb index 7652e03569..1179c03a00 100644 --- a/meta/recipes-kernel/linux/linux-yocto-rt_6.6.bb +++ b/meta/recipes-kernel/linux/linux-yocto-rt_6.6.bb @@ -14,13 +14,13 @@ python () { raise bb.parse.SkipRecipe("Set PREFERRED_PROVIDER_virtual/kernel to linux-yocto-rt to enable it") } -SRCREV_machine ?= "07bc1b79b450a91fa9ed645a4c6c77332f6c7fd3" -SRCREV_meta ?= "46ee47b6ee7ce2b3cef51844d7a7e82c6c2daf5d" +SRCREV_machine ?= "30009325411827c48a376212ef00a5637f67b914" +SRCREV_meta ?= "50530c858c90f124629dadce78f696b590747ea5" SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;branch=${KBRANCH};name=machine;protocol=https \ git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.6;destsuffix=${KMETA};protocol=https" -LINUX_VERSION ?= "6.6.110" +LINUX_VERSION ?= "6.6.111" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" diff --git a/meta/recipes-kernel/linux/linux-yocto-tiny_6.6.bb b/meta/recipes-kernel/linux/linux-yocto-tiny_6.6.bb index 33eafc2f6d..eb906bad17 100644 --- a/meta/recipes-kernel/linux/linux-yocto-tiny_6.6.bb +++ b/meta/recipes-kernel/linux/linux-yocto-tiny_6.6.bb @@ -8,7 +8,7 @@ require recipes-kernel/linux/linux-yocto.inc # CVE exclusions include recipes-kernel/linux/cve-exclusion_6.6.inc -LINUX_VERSION ?= "6.6.110" +LINUX_VERSION ?= "6.6.111" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}" @@ -17,8 +17,8 @@ DEPENDS += "openssl-native util-linux-native" KMETA = "kernel-meta" KCONF_BSP_AUDIT_LEVEL = "2" -SRCREV_machine ?= "0381ada6e1fee2c488a718f82ed83f0435a950c2" -SRCREV_meta ?= "46ee47b6ee7ce2b3cef51844d7a7e82c6c2daf5d" +SRCREV_machine ?= "529f5ce5c38c39bc1fe4022f499ee718bff0cb8b" +SRCREV_meta ?= "50530c858c90f124629dadce78f696b590747ea5" PV = "${LINUX_VERSION}+git" diff --git a/meta/recipes-kernel/linux/linux-yocto_6.6.bb b/meta/recipes-kernel/linux/linux-yocto_6.6.bb index c75094dc59..070342f5b7 100644 --- a/meta/recipes-kernel/linux/linux-yocto_6.6.bb +++ b/meta/recipes-kernel/linux/linux-yocto_6.6.bb @@ -18,25 +18,25 @@ KBRANCH:qemux86-64 ?= "v6.6/standard/base" KBRANCH:qemuloongarch64 ?= "v6.6/standard/base" KBRANCH:qemumips64 ?= "v6.6/standard/mti-malta64" -SRCREV_machine:qemuarm ?= "2a0fa5ba202ff49a42a8f1c5e36ed1a2d7dc9b91" -SRCREV_machine:qemuarm64 ?= "0974351ebdd700bc59eb25d7144e96c34cc28751" -SRCREV_machine:qemuloongarch64 ?= "272bf113897632849f52e9dfc1bb990daa566375" -SRCREV_machine:qemumips ?= "4b003154faca105c81dcfaebfe4e753b378eddde" -SRCREV_machine:qemuppc ?= "b1416ec0248422122027ab9cee287d7c86e5cf77" -SRCREV_machine:qemuriscv64 ?= "272bf113897632849f52e9dfc1bb990daa566375" -SRCREV_machine:qemuriscv32 ?= "272bf113897632849f52e9dfc1bb990daa566375" -SRCREV_machine:qemux86 ?= "272bf113897632849f52e9dfc1bb990daa566375" -SRCREV_machine:qemux86-64 ?= "272bf113897632849f52e9dfc1bb990daa566375" -SRCREV_machine:qemumips64 ?= "4b0c928fbc6df11ad63d99b006a8448597ccdd7d" -SRCREV_machine ?= "272bf113897632849f52e9dfc1bb990daa566375" -SRCREV_meta ?= "46ee47b6ee7ce2b3cef51844d7a7e82c6c2daf5d" +SRCREV_machine:qemuarm ?= "f864fe79b2b8052e10bbe3ae443941ccefa5a951" +SRCREV_machine:qemuarm64 ?= "cdd229fbaaa25d5d9eb055477af8c2b82238763b" +SRCREV_machine:qemuloongarch64 ?= "2a17dc587afe4e133deef4d8c9ec98724aee785b" +SRCREV_machine:qemumips ?= "2f5bef5596eeb6ac65023cfeb1a6402efcdc965f" +SRCREV_machine:qemuppc ?= "be45c09ed7f4b5a09f95cd90484ef083c8552344" +SRCREV_machine:qemuriscv64 ?= "2a17dc587afe4e133deef4d8c9ec98724aee785b" +SRCREV_machine:qemuriscv32 ?= "2a17dc587afe4e133deef4d8c9ec98724aee785b" +SRCREV_machine:qemux86 ?= "2a17dc587afe4e133deef4d8c9ec98724aee785b" +SRCREV_machine:qemux86-64 ?= "2a17dc587afe4e133deef4d8c9ec98724aee785b" +SRCREV_machine:qemumips64 ?= "130d3c48ab3b914907b88ff240463b4e5718d526" +SRCREV_machine ?= "2a17dc587afe4e133deef4d8c9ec98724aee785b" +SRCREV_meta ?= "50530c858c90f124629dadce78f696b590747ea5" # set your preferred provider of linux-yocto to 'linux-yocto-upstream', and you'll # get the /base branch, which is pure upstream -stable, and the same # meta SRCREV as the linux-yocto-standard builds. Select your version using the # normal PREFERRED_VERSION settings. BBCLASSEXTEND = "devupstream:target" -SRCREV_machine:class-devupstream ?= "e617101e562654c7d59ed5cfcd30f610f1f64411" +SRCREV_machine:class-devupstream ?= "655054d2c3c184875f95646abd828b5dfc027d5e" PN:class-devupstream = "linux-yocto-upstream" KBRANCH:class-devupstream = "v6.6/base" @@ -44,7 +44,7 @@ SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;name=machine;branch=${KBRA git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.6;destsuffix=${KMETA};protocol=https" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" -LINUX_VERSION ?= "6.6.110" +LINUX_VERSION ?= "6.6.111" PV = "${LINUX_VERSION}+git" From patchwork Fri Oct 17 20:39:07 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 72630 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 0C506CCD1A4 for ; Fri, 17 Oct 2025 20:40:14 +0000 (UTC) Received: from mail-pf1-f180.google.com (mail-pf1-f180.google.com [209.85.210.180]) by mx.groups.io with SMTP id smtpd.web11.3153.1760733611037057431 for ; Fri, 17 Oct 2025 13:40:11 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20230601.gappssmtp.com header.s=20230601 header.b=yxq7Q+Gf; spf=softfail (domain: sakoman.com, ip: 209.85.210.180, mailfrom: steve@sakoman.com) Received: by mail-pf1-f180.google.com with SMTP id d2e1a72fcca58-76e2ea933b7so2294759b3a.1 for ; Fri, 17 Oct 2025 13:40:10 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20230601.gappssmtp.com; s=20230601; t=1760733610; x=1761338410; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=vL0KRka7xId/ZynaqQAT7PQv6mQwDjZ7A+7+GF4/Au4=; b=yxq7Q+GfOM6sipKI8unf0WNGcXpjfobRaT3y+QmkzpC2fXpU2IOVNiqSyp27oabLj3 aWJW1rGYjB6n2bw8/HD+XfZ93V13pfgDKAPVzv1n74vHwTJerPkqIG+cNRvEf+68rbTW BXh59fNbVP0wDvy0Tj14K0yuwkivwp747XNXAZbZhxQlMf/eyGptbQ6TtOxOUMD/Zjdj QBMzR6INOsZkeOzHVHqiQrynNn1J3dlRzr3VaPGb5bWMndZ2Q+cdPtRX2AzHNh0GBgal 9hF7EE7et1GYtwxg/ITFTDGxQfA0UPdYz1b3TEUIqk2mZZXM8iYT6A+59JIR5Ve4HNmU EsoQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1760733610; x=1761338410; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=vL0KRka7xId/ZynaqQAT7PQv6mQwDjZ7A+7+GF4/Au4=; b=VkTESMru5wgLtu0TuJzMED6rscGvhZN11dtV3C4eTZU50tUhGXcJi2vM6mgosUfWFL bhUPtdMehF1pZHIn1rn5/Dw5Gj0dnEseJFw3Le7P4Umw8NgUiHrGloPRAJV2gNiTtaBx E8aqLbSDkKa8+lLYVVDA7ls52Jinc+T3JMwl4aMsKLKfklJHrtwaLrn19SGps4H2RqSr wrMMfK1LJAhR78TuVkk02ZQPYihdHf68MF88++RUFfJ1WRJOr12u0jYLscEU3WPCyWjE ZgodtE2uPGs9+ogi+APMLS2myB3G67QpIyz/vwdt1xosNrvsi51CuLMzWpMwVDdS2oeV ib8A== X-Gm-Message-State: AOJu0Ywk5NG7d3VnxlNKKdH+/s4dLiClwooqB4R13jq+f/Wzq28MC9wB 5rXVki2AJflK6cue5eEpkvR/lP+HtwPOu/j3no7+ABvhu7R8vvpvZ2i8wXsvaDQVCD2koeGj1P9 yv9gH9YY= X-Gm-Gg: ASbGnctxKrkJ3fe3wNHqNyq6TH7RRj2A2PPkQYE65g2lt81FQYASVunm82w6l5/k738 PA37hprU6/lqTp5Bl2wh7P8EiiusN4Cf6xsjxVMGgYyezDfVAvjDKcTwPJ1RLwJjtgdh8l3HF3O IOoNBmFup1egDNB0/P1lpcO8magh7EGmXK89UL0kmVcFQiqcnEsLKusfvXEG5YQQqt2e2yBE3jq OtkuwWLw3KbW+qXKxV+k7+UQCQZ8KZ+kQW3nIoVyITQE6qLOR9Ba6YApQpmcoCG7NaYP6+Oax2k DOmDmnSkLa3g/K0U8iX3wh3va/sVP7g+YqvRXkx+yMIICkRxje65kl6DY78Ze6jXieQCrAKE3KI K3D7cIrWP633uyVGr0wvnBqC71G3ph2o3KDf6EP9Rzf6UVjHlj/i7SJ3qpRqljG1QgHGNrSoH9q oq X-Google-Smtp-Source: AGHT+IEbS3faaVm0OsswlrUz9NxdICsp3s9qWIULzwGI5E4tr7PoEHBW5W1MzNBojYLirktqkpGmzA== X-Received: by 2002:a05:6a00:b8f:b0:77e:4534:7f1c with SMTP id d2e1a72fcca58-7a21f76888amr6424302b3a.0.1760733610164; Fri, 17 Oct 2025 13:40:10 -0700 (PDT) Received: from hexa.. ([2602:feb4:3b:2100:aaee:e640:34cd:6f2]) by smtp.gmail.com with ESMTPSA id d2e1a72fcca58-7a2300f254esm477061b3a.45.2025.10.17.13.40.09 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 17 Oct 2025 13:40:09 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][scarthgap 24/26] python3: upgrade 3.12.11 -> 3.12.12 Date: Fri, 17 Oct 2025 13:39:07 -0700 Message-ID: X-Mailer: git-send-email 2.43.0 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 17 Oct 2025 20:40:14 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/225058 From: Peter Marko Drop upstreamed patch and refresh remaining patches. Release information: * https://www.python.org/downloads/release/python-31212/ * The release you're looking at is Python 3.12.12, a security bugfix release for the legacy 3.12 series. Handles CVE-2025-59375. Signed-off-by: Peter Marko Signed-off-by: Steve Sakoman --- ...e-treat-overflow-in-UID-GID-as-failu.patch | 2 +- .../python/python3/CVE-2025-8194.patch | 219 ------------------ ...{python3_3.12.11.bb => python3_3.12.12.bb} | 3 +- 3 files changed, 2 insertions(+), 222 deletions(-) delete mode 100644 meta/recipes-devtools/python/python3/CVE-2025-8194.patch rename meta/recipes-devtools/python/{python3_3.12.11.bb => python3_3.12.12.bb} (99%) diff --git a/meta/recipes-devtools/python/python3/0001-gh-107811-tarfile-treat-overflow-in-UID-GID-as-failu.patch b/meta/recipes-devtools/python/python3/0001-gh-107811-tarfile-treat-overflow-in-UID-GID-as-failu.patch index 1cffdd6e05..98b3aa42d2 100644 --- a/meta/recipes-devtools/python/python3/0001-gh-107811-tarfile-treat-overflow-in-UID-GID-as-failu.patch +++ b/meta/recipes-devtools/python/python3/0001-gh-107811-tarfile-treat-overflow-in-UID-GID-as-failu.patch @@ -16,7 +16,7 @@ diff --git a/Lib/tarfile.py b/Lib/tarfile.py index 0a0f31e..4dfb67d 100755 --- a/Lib/tarfile.py +++ b/Lib/tarfile.py -@@ -2685,7 +2685,8 @@ class TarFile(object): +@@ -2688,7 +2688,8 @@ class TarFile(object): os.lchown(targetpath, u, g) else: os.chown(targetpath, u, g) diff --git a/meta/recipes-devtools/python/python3/CVE-2025-8194.patch b/meta/recipes-devtools/python/python3/CVE-2025-8194.patch deleted file mode 100644 index b8243a67f6..0000000000 --- a/meta/recipes-devtools/python/python3/CVE-2025-8194.patch +++ /dev/null @@ -1,219 +0,0 @@ -From c9d9f78feb1467e73fd29356c040bde1c104f29f Mon Sep 17 00:00:00 2001 -From: "Miss Islington (bot)" - <31488909+miss-islington@users.noreply.github.com> -Date: Mon, 4 Aug 2025 13:45:06 +0200 -Subject: [PATCH] [3.12] gh-130577: tarfile now validates archives to ensure - member offsets are non-negative (GH-137027) (#137171) - -(cherry picked from commit 7040aa54f14676938970e10c5f74ea93cd56aa38) - -Co-authored-by: Alexander Urieles -Co-authored-by: Gregory P. Smith - -CVE: CVE-2025-8194 -Upstream-Status: Backport [https://github.com/python/cpython/commit/c9d9f78feb1467e73fd29356c040bde1c104f29f] -Signed-off-by: Peter Marko ---- - Lib/tarfile.py | 3 + - Lib/test/test_tarfile.py | 156 ++++++++++++++++++ - ...-07-23-00-35-29.gh-issue-130577.c7EITy.rst | 3 + - 3 files changed, 162 insertions(+) - create mode 100644 Misc/NEWS.d/next/Library/2025-07-23-00-35-29.gh-issue-130577.c7EITy.rst - -diff --git a/Lib/tarfile.py b/Lib/tarfile.py -index 9999a99d54..59d3f6e5cc 100755 ---- a/Lib/tarfile.py -+++ b/Lib/tarfile.py -@@ -1615,6 +1615,9 @@ class TarInfo(object): - """Round up a byte count by BLOCKSIZE and return it, - e.g. _block(834) => 1024. - """ -+ # Only non-negative offsets are allowed -+ if count < 0: -+ raise InvalidHeaderError("invalid offset") - blocks, remainder = divmod(count, BLOCKSIZE) - if remainder: - blocks += 1 -diff --git a/Lib/test/test_tarfile.py b/Lib/test/test_tarfile.py -index a184ba75a8..759fa03ead 100644 ---- a/Lib/test/test_tarfile.py -+++ b/Lib/test/test_tarfile.py -@@ -50,6 +50,7 @@ bz2name = os.path.join(TEMPDIR, "testtar.tar.bz2") - xzname = os.path.join(TEMPDIR, "testtar.tar.xz") - tmpname = os.path.join(TEMPDIR, "tmp.tar") - dotlessname = os.path.join(TEMPDIR, "testtar") -+SPACE = b" " - - sha256_regtype = ( - "e09e4bc8b3c9d9177e77256353b36c159f5f040531bbd4b024a8f9b9196c71ce" -@@ -4488,6 +4489,161 @@ class OverwriteTests(archiver_tests.OverwriteTests, unittest.TestCase): - ar.extractall(self.testdir, filter='fully_trusted') - - -+class OffsetValidationTests(unittest.TestCase): -+ tarname = tmpname -+ invalid_posix_header = ( -+ # name: 100 bytes -+ tarfile.NUL * tarfile.LENGTH_NAME -+ # mode, space, null terminator: 8 bytes -+ + b"000755" + SPACE + tarfile.NUL -+ # uid, space, null terminator: 8 bytes -+ + b"000001" + SPACE + tarfile.NUL -+ # gid, space, null terminator: 8 bytes -+ + b"000001" + SPACE + tarfile.NUL -+ # size, space: 12 bytes -+ + b"\xff" * 11 + SPACE -+ # mtime, space: 12 bytes -+ + tarfile.NUL * 11 + SPACE -+ # chksum: 8 bytes -+ + b"0011407" + tarfile.NUL -+ # type: 1 byte -+ + tarfile.REGTYPE -+ # linkname: 100 bytes -+ + tarfile.NUL * tarfile.LENGTH_LINK -+ # magic: 6 bytes, version: 2 bytes -+ + tarfile.POSIX_MAGIC -+ # uname: 32 bytes -+ + tarfile.NUL * 32 -+ # gname: 32 bytes -+ + tarfile.NUL * 32 -+ # devmajor, space, null terminator: 8 bytes -+ + tarfile.NUL * 6 + SPACE + tarfile.NUL -+ # devminor, space, null terminator: 8 bytes -+ + tarfile.NUL * 6 + SPACE + tarfile.NUL -+ # prefix: 155 bytes -+ + tarfile.NUL * tarfile.LENGTH_PREFIX -+ # padding: 12 bytes -+ + tarfile.NUL * 12 -+ ) -+ invalid_gnu_header = ( -+ # name: 100 bytes -+ tarfile.NUL * tarfile.LENGTH_NAME -+ # mode, null terminator: 8 bytes -+ + b"0000755" + tarfile.NUL -+ # uid, null terminator: 8 bytes -+ + b"0000001" + tarfile.NUL -+ # gid, space, null terminator: 8 bytes -+ + b"0000001" + tarfile.NUL -+ # size, space: 12 bytes -+ + b"\xff" * 11 + SPACE -+ # mtime, space: 12 bytes -+ + tarfile.NUL * 11 + SPACE -+ # chksum: 8 bytes -+ + b"0011327" + tarfile.NUL -+ # type: 1 byte -+ + tarfile.REGTYPE -+ # linkname: 100 bytes -+ + tarfile.NUL * tarfile.LENGTH_LINK -+ # magic: 8 bytes -+ + tarfile.GNU_MAGIC -+ # uname: 32 bytes -+ + tarfile.NUL * 32 -+ # gname: 32 bytes -+ + tarfile.NUL * 32 -+ # devmajor, null terminator: 8 bytes -+ + tarfile.NUL * 8 -+ # devminor, null terminator: 8 bytes -+ + tarfile.NUL * 8 -+ # padding: 167 bytes -+ + tarfile.NUL * 167 -+ ) -+ invalid_v7_header = ( -+ # name: 100 bytes -+ tarfile.NUL * tarfile.LENGTH_NAME -+ # mode, space, null terminator: 8 bytes -+ + b"000755" + SPACE + tarfile.NUL -+ # uid, space, null terminator: 8 bytes -+ + b"000001" + SPACE + tarfile.NUL -+ # gid, space, null terminator: 8 bytes -+ + b"000001" + SPACE + tarfile.NUL -+ # size, space: 12 bytes -+ + b"\xff" * 11 + SPACE -+ # mtime, space: 12 bytes -+ + tarfile.NUL * 11 + SPACE -+ # chksum: 8 bytes -+ + b"0010070" + tarfile.NUL -+ # type: 1 byte -+ + tarfile.REGTYPE -+ # linkname: 100 bytes -+ + tarfile.NUL * tarfile.LENGTH_LINK -+ # padding: 255 bytes -+ + tarfile.NUL * 255 -+ ) -+ valid_gnu_header = tarfile.TarInfo("filename").tobuf(tarfile.GNU_FORMAT) -+ data_block = b"\xff" * tarfile.BLOCKSIZE -+ -+ def _write_buffer(self, buffer): -+ with open(self.tarname, "wb") as f: -+ f.write(buffer) -+ -+ def _get_members(self, ignore_zeros=None): -+ with open(self.tarname, "rb") as f: -+ with tarfile.open( -+ mode="r", fileobj=f, ignore_zeros=ignore_zeros -+ ) as tar: -+ return tar.getmembers() -+ -+ def _assert_raises_read_error_exception(self): -+ with self.assertRaisesRegex( -+ tarfile.ReadError, "file could not be opened successfully" -+ ): -+ self._get_members() -+ -+ def test_invalid_offset_header_validations(self): -+ for tar_format, invalid_header in ( -+ ("posix", self.invalid_posix_header), -+ ("gnu", self.invalid_gnu_header), -+ ("v7", self.invalid_v7_header), -+ ): -+ with self.subTest(format=tar_format): -+ self._write_buffer(invalid_header) -+ self._assert_raises_read_error_exception() -+ -+ def test_early_stop_at_invalid_offset_header(self): -+ buffer = self.valid_gnu_header + self.invalid_gnu_header + self.valid_gnu_header -+ self._write_buffer(buffer) -+ members = self._get_members() -+ self.assertEqual(len(members), 1) -+ self.assertEqual(members[0].name, "filename") -+ self.assertEqual(members[0].offset, 0) -+ -+ def test_ignore_invalid_archive(self): -+ # 3 invalid headers with their respective data -+ buffer = (self.invalid_gnu_header + self.data_block) * 3 -+ self._write_buffer(buffer) -+ members = self._get_members(ignore_zeros=True) -+ self.assertEqual(len(members), 0) -+ -+ def test_ignore_invalid_offset_headers(self): -+ for first_block, second_block, expected_offset in ( -+ ( -+ (self.valid_gnu_header), -+ (self.invalid_gnu_header + self.data_block), -+ 0, -+ ), -+ ( -+ (self.invalid_gnu_header + self.data_block), -+ (self.valid_gnu_header), -+ 1024, -+ ), -+ ): -+ self._write_buffer(first_block + second_block) -+ members = self._get_members(ignore_zeros=True) -+ self.assertEqual(len(members), 1) -+ self.assertEqual(members[0].name, "filename") -+ self.assertEqual(members[0].offset, expected_offset) -+ -+ - def setUpModule(): - os_helper.unlink(TEMPDIR) - os.makedirs(TEMPDIR) -diff --git a/Misc/NEWS.d/next/Library/2025-07-23-00-35-29.gh-issue-130577.c7EITy.rst b/Misc/NEWS.d/next/Library/2025-07-23-00-35-29.gh-issue-130577.c7EITy.rst -new file mode 100644 -index 0000000000..342cabbc86 ---- /dev/null -+++ b/Misc/NEWS.d/next/Library/2025-07-23-00-35-29.gh-issue-130577.c7EITy.rst -@@ -0,0 +1,3 @@ -+:mod:`tarfile` now validates archives to ensure member offsets are -+non-negative. (Contributed by Alexander Enrique Urieles Nieto in -+:gh:`130577`.) diff --git a/meta/recipes-devtools/python/python3_3.12.11.bb b/meta/recipes-devtools/python/python3_3.12.12.bb similarity index 99% rename from meta/recipes-devtools/python/python3_3.12.11.bb rename to meta/recipes-devtools/python/python3_3.12.12.bb index 1c31077320..9a957c59bc 100644 --- a/meta/recipes-devtools/python/python3_3.12.11.bb +++ b/meta/recipes-devtools/python/python3_3.12.12.bb @@ -34,14 +34,13 @@ SRC_URI = "http://www.python.org/ftp/python/${PV}/Python-${PV}.tar.xz \ file://0001-test_deadlock-skip-problematic-test.patch \ file://0001-test_active_children-skip-problematic-test.patch \ file://0001-test_readline-skip-limited-history-test.patch \ - file://CVE-2025-8194.patch \ " SRC_URI:append:class-native = " \ file://0001-Lib-sysconfig.py-use-prefix-value-from-build-configu.patch \ " -SRC_URI[sha256sum] = "c30bb24b7f1e9a19b11b55a546434f74e739bb4c271a3e3a80ff4380d49f7adb" +SRC_URI[sha256sum] = "fb85a13414b028c49ba18bbd523c2d055a30b56b18b92ce454ea2c51edc656c4" # exclude pre-releases for both python 2.x and 3.x UPSTREAM_CHECK_REGEX = "[Pp]ython-(?P\d+(\.\d+)+).tar" From patchwork Fri Oct 17 20:39:08 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 72626 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id F3E40CCD199 for ; Fri, 17 Oct 2025 20:40:13 +0000 (UTC) Received: from mail-pf1-f172.google.com (mail-pf1-f172.google.com [209.85.210.172]) by mx.groups.io with SMTP id smtpd.web11.3155.1760733613073587507 for ; Fri, 17 Oct 2025 13:40:13 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20230601.gappssmtp.com header.s=20230601 header.b=XYGJQij4; spf=softfail (domain: sakoman.com, ip: 209.85.210.172, mailfrom: steve@sakoman.com) Received: by mail-pf1-f172.google.com with SMTP id d2e1a72fcca58-7930132f59aso3258701b3a.0 for ; Fri, 17 Oct 2025 13:40:13 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20230601.gappssmtp.com; s=20230601; t=1760733612; x=1761338412; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=qrAfwPQC5NJUk1AFgkSKQpV0On3kcL9ufu6BmtATLOw=; b=XYGJQij4Hye+MLMU34vZyITR+U5Q6FGtEWMH3JVTMWGcqaJfQXv2ZPgc9OIOKm5La/ DWEeenxhCZestOCPZws9gvIJLsMWiY0P/O4pw4mpGZuuvFFilozl9i32hZD1QGTl1tXX zWMhfuCijUYkOsEat9FUAzPlXiAy6dsI88bVCso3lc33RaymAa9WEYd9hu0ZGNy7eB73 rMIMD1YUy/RJ2lwrXlxVfO8TrwyGiGn4q2fIgD8C5y4c7qGSA4reUH3LvtySnObIyXRx jyuxtQhOU8E+O85iG3DLbXD+XJjgZXcbu8SjrZMRGbWYU/Tlw+zwVsDGWpdhvTJ7Dcbm KWPQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1760733612; x=1761338412; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=qrAfwPQC5NJUk1AFgkSKQpV0On3kcL9ufu6BmtATLOw=; b=rw7JVdAKUBM0k5utkb0Y2gsvpDxnoicAFJNqpwbHNixtDf0almCpWvytuXJrTap82k JbO9+zTuTtqo/xM0IGYe4eHFoK1GhDxOGt6gx+vvvxENi1kMALRktv47QUl+6cSPIq2m Wz6xj+veeJ7Y3BrBn7aJfJ3qiDQfPBL33rWzRERi6z3xA+jEzeNOGGPIHCzfEmV6LeRl doy8joFKVdJGi9A81X/yFGgi+UofeJ23l4CgZI+s6VN0zBOAp2zNcJU1rzb2YlKL02u8 0w9ebR2W4PnNbBDY49OKiTG8Aw+gLiiJ8NdP0Dg7gkWUFzvOURSishLE4Hs42sz1kG8/ ommA== X-Gm-Message-State: AOJu0YxN4z3PnEiYZZIfa0qrIj//QcQgqgiot94FLVAT4zFtEFS6knUt NHEm+Ki/QSFQ7te0cF3Bshvlk8/94Z1PSQkhsZirGELlCYkYTuIEsU8mZfEqOthKpUFx15ovYfq Ud6Ft/Wg= X-Gm-Gg: ASbGnctOaAtagJQj0bCATtQ0vTNqHcyfzaWAGzjLjashdxLiloGkdDKR3mL1Z+kxOdD 3KpRjON/zzJ9RVtFbGCC40vY1C65fRWLAs3sXueHOl1HDKbxGIn0luWaAgk1d79nZtdaGqQUSxq kphPCJGaIXOUDWohz+5fwu0pc0CPLX5E0lQdFDqgsrqsYfI2Vl7ECKUXYcqK8dPUTfIeCyUIrVy vtWkSQkJLbBBkZxJ9r6J+ULl2Qf/0i43umAvyQ3azK3GazezUuSvz8kQi2nvnX2Cj2qANkXLkKx Lnb0ffraWxV0/x66qiSpnGxGVeYGLjCK5nlfZKPp3dBXkjnGXDj6aIHncHgtnOjWFIecjkjNuQS pRlfSprSy3uSs+3X31BhZGyxGxUyI+4ZfJQq4ZIaBzPQJUpJWEyoaUmf1JfvptAWMhzCGHN8zyz Ec X-Google-Smtp-Source: AGHT+IEYbP0azrLkCDcSKH8h7DBFZY/3Hq3HCtKoyqhA7l56+ti2Ju8Ux0DbzRqorR1wZqsnTteEnw== X-Received: by 2002:a05:6a00:856:b0:781:18dd:31de with SMTP id d2e1a72fcca58-7a220aabb73mr6466539b3a.12.1760733612213; Fri, 17 Oct 2025 13:40:12 -0700 (PDT) Received: from hexa.. ([2602:feb4:3b:2100:aaee:e640:34cd:6f2]) by smtp.gmail.com with ESMTPSA id d2e1a72fcca58-7a2300f254esm477061b3a.45.2025.10.17.13.40.11 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 17 Oct 2025 13:40:11 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][scarthgap 25/26] icu: Backport patch to fix build issues with long paths (>512 chars) Date: Fri, 17 Oct 2025 13:39:08 -0700 Message-ID: <0860992436092f7651e22e2b894f0d0a365a9bb0.1760733431.git.steve@sakoman.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 17 Oct 2025 20:40:13 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/225059 From: Carlos Alberto Lopez Perez There is a bug libicu that causes libicu to be installed incorrectly when the build system uses long paths (more than 512 chars). This condition is not very difficult to trigger on a OE build system due to the long paths an the deep of the directories that are usually generated by default. Also the bug is very subtle and won't be detected by the QA post-install processes because what this bug causes is that a different version of libicudata.so.X.Y (one without data) is installed instead of the one containing the data, but there won't be any file missed on the installation (just that it installed the wrong one). See: https://unicode-org.atlassian.net/browse/ICU-22813 This patch backports the fix from upstream/main (From OE-Core rev: 67d1352873957decacde30ff208fb7bb635b0c5d) Signed-off-by: Carlos Alberto Lopez Perez Signed-off-by: Richard Purdie Signed-off-by: Benjamin Hahn Signed-off-by: Steve Sakoman --- ...813_rise_buffer_sizes_pkgdata_PR3058.patch | 72 +++++++++++++++++++ meta/recipes-support/icu/icu_74-2.bb | 1 + 2 files changed, 73 insertions(+) create mode 100644 meta/recipes-support/icu/icu/ICU-22813_rise_buffer_sizes_pkgdata_PR3058.patch diff --git a/meta/recipes-support/icu/icu/ICU-22813_rise_buffer_sizes_pkgdata_PR3058.patch b/meta/recipes-support/icu/icu/ICU-22813_rise_buffer_sizes_pkgdata_PR3058.patch new file mode 100644 index 0000000000..5b97350e6f --- /dev/null +++ b/meta/recipes-support/icu/icu/ICU-22813_rise_buffer_sizes_pkgdata_PR3058.patch @@ -0,0 +1,72 @@ +From db70adaddcfa8050db6a69cdfef080a7f1423ad7 Mon Sep 17 00:00:00 2001 +From: Carlos Alberto Lopez Perez +Date: Mon, 1 Jul 2024 22:15:18 +0100 +Subject: [PATCH] ICU-22813 Rise the size of the buffers used for the command + strings at pkgdata + +The tool pkgdata uses snprintf() to build the strings of the commands that +will execute later during the install process. But the maximum size of this +buffers is not enough when there is a long path. + +This has caused issues on some CI systems that use very long paths, causing +the install process to produce a wrong result. + +The maximum path on Linux is 4096 (defined as PATH_MAX at ) +So the size of SMALL_BUFFER_MAX_SIZE should be 4096 to avoid errors related +to truncated paths. + +Upstream-Status: Backport [https://github.com/unicode-org/icu/pull/3058] + +Signed-off-by: Carlos Alberto Lopez Perez +--- + tools/pkgdata/pkgdata.cpp | 6 +++--- + tools/toolutil/pkg_genc.h | 5 ++--- + 2 files changed, 5 insertions(+), 6 deletions(-) + +diff --git a/tools/pkgdata/pkgdata.cpp b/tools/pkgdata/pkgdata.cpp +index c2ac112..8d08c85 100644 +--- a/tools/pkgdata/pkgdata.cpp ++++ b/tools/pkgdata/pkgdata.cpp +@@ -1134,7 +1134,7 @@ static int32_t pkg_createSymLinks(const char *targetDir, UBool specialHandling) + + static int32_t pkg_installLibrary(const char *installDir, const char *targetDir, UBool noVersion) { + int32_t result = 0; +- char cmd[SMALL_BUFFER_MAX_SIZE]; ++ char cmd[LARGE_BUFFER_MAX_SIZE]; + + auto ret = snprintf(cmd, + sizeof(cmd), +@@ -1205,7 +1205,7 @@ static int32_t pkg_installLibrary(const char *installDir, const char *targetDir, + + static int32_t pkg_installCommonMode(const char *installDir, const char *fileName) { + int32_t result = 0; +- char cmd[SMALL_BUFFER_MAX_SIZE] = ""; ++ char cmd[LARGE_BUFFER_MAX_SIZE] = ""; + + if (!T_FileStream_file_exists(installDir)) { + UErrorCode status = U_ZERO_ERROR; +@@ -1237,7 +1237,7 @@ static int32_t pkg_installCommonMode(const char *installDir, const char *fileNam + #endif + static int32_t pkg_installFileMode(const char *installDir, const char *srcDir, const char *fileListName) { + int32_t result = 0; +- char cmd[SMALL_BUFFER_MAX_SIZE] = ""; ++ char cmd[LARGE_BUFFER_MAX_SIZE] = ""; + + if (!T_FileStream_file_exists(installDir)) { + UErrorCode status = U_ZERO_ERROR; +diff --git a/tools/toolutil/pkg_genc.h b/tools/toolutil/pkg_genc.h +index 2dd1b45..f811fe5 100644 +--- a/tools/toolutil/pkg_genc.h ++++ b/tools/toolutil/pkg_genc.h +@@ -59,9 +59,8 @@ + #define PKGDATA_FILE_SEP_STRING U_FILE_SEP_STRING + #endif + +-#define LARGE_BUFFER_MAX_SIZE 2048 +-#define SMALL_BUFFER_MAX_SIZE 512 +-#define SMALL_BUFFER_FLAG_NAMES 32 ++#define LARGE_BUFFER_MAX_SIZE 16384 ++#define SMALL_BUFFER_MAX_SIZE 4096 + #define BUFFER_PADDING_SIZE 20 + + /** End platform defines **/ diff --git a/meta/recipes-support/icu/icu_74-2.bb b/meta/recipes-support/icu/icu_74-2.bb index 83753a18e5..104acd37c2 100644 --- a/meta/recipes-support/icu/icu_74-2.bb +++ b/meta/recipes-support/icu/icu_74-2.bb @@ -122,6 +122,7 @@ SRC_URI = "${BASE_SRC_URI};name=code \ file://fix-install-manx.patch \ file://0001-icu-Added-armeb-support.patch \ file://CVE-2025-5222.patch \ + file://ICU-22813_rise_buffer_sizes_pkgdata_PR3058.patch \ " SRC_URI:append:class-target = "\ From patchwork Fri Oct 17 20:39:09 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 72631 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 131D8CCD195 for ; Fri, 17 Oct 2025 20:40:24 +0000 (UTC) Received: from mail-pf1-f177.google.com (mail-pf1-f177.google.com [209.85.210.177]) by mx.groups.io with SMTP id smtpd.web10.3229.1760733614616040642 for ; Fri, 17 Oct 2025 13:40:14 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20230601.gappssmtp.com header.s=20230601 header.b=0RBMxU7k; spf=softfail (domain: sakoman.com, ip: 209.85.210.177, mailfrom: steve@sakoman.com) Received: by mail-pf1-f177.google.com with SMTP id d2e1a72fcca58-7a213c3c3f5so3206788b3a.3 for ; Fri, 17 Oct 2025 13:40:14 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20230601.gappssmtp.com; s=20230601; t=1760733614; x=1761338414; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=KZnT3VMV/cl24rvKsZaGn0KVD8IOtWc/esVaK/k+g3g=; b=0RBMxU7kpzxL818QwQqkLfdv4d8CHz0l55q9nT4sniyqD1f/EP3BIV6DyULEdRwuTx Aah1hvln1CKfxPse6MgN6s5uDxb/+MxnTlPGXRb3pGaEwnH/DEn1MImufoRFrIzLtCCF PCPUvcLcxJbrWSL+CZWF0g/xtqGmSyHyZSX+NPtquN2XAh0W1kYMsTyw9BXVYbVfV1hm nczrr/e1IAOh8ajQxTcxvZw8Mdy2vQjqugsZYvtDX2i5hfWnTcmLLQfuLm3B5+rCOvee ZfDa3M2RG8af2e8joG5gHLIYk0LlUKrr8je96j9txZkyPOMo13jvOAwbQ3oeV0nL0xbd c0tg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1760733614; x=1761338414; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=KZnT3VMV/cl24rvKsZaGn0KVD8IOtWc/esVaK/k+g3g=; b=gzSHXvDplLUAJDgu+TH9zyp8ACbNyhwqoE/dCjsVNU2wHbhIPCQsntwu0NRL7taVn7 soycyfYfxMsv5l5MYRYbntMTsrs03A1mIr+sPHcGLDkDqc8rU4lG1P1b2FpY/cgdFjp/ SUj+2M0ua8kLVISOYc40YmzE6itp6xvesZ3XFjt7p9XDi9yF+Hm8R6aFTSrczZP5+ZrT EhzVwIlatAdRH+2Iy+wAsE13yHm1PRlPo/fZDz4L5BTknSfLNpxc1BHXvOua2ZNCCxTs 5egYSfOgHWSq+Dl5W6bls7LUPoKVMvXOjfPz+6dM4B7S055C8A6dL+JHjY4bK2m3CCRg i+cw== X-Gm-Message-State: AOJu0YybMuPtMvIOfYIenPtU3Nae6eZzFAFxc3+9bRPMu3MZFQfgmU+I BBB/WZq/mb09Lx9M5xWz/1iWUh+yXnk4ZIxplHiyFf5YhS/Z+xG+UJ9oY4vhTEdZZ9U0JQJjvA7 8a0kBS8o= X-Gm-Gg: ASbGncvMgebMW0SVmQFnRravZfSA64u/a3/EtPbmTbC4lCAhnAQtlP4gWEr1K45PhXG WWNZRMiZHu3yY75mNIq7hVNT3gbZXFGj9D0OmEPda1Xr9Qt7fIxeWbswzF1JHsSL7O769h+lYrK NdT4sWN9MfV7I0NkNxZ9J0D+WlHsX6nDgPXIayQ80nCYjzsNTOX6t1Z8i2UQBuRELyvrOECTl6s 3UUBheNP7ZwvHd+TedjHVlbTRaM+HozTiA+s9f0sFLIHEHfD7AnfJGQTtXqQ4LE0jUWNrcrowSo 5RoKKrzN7og3jqOzEawEVWg35Q31JKBrQg3l8/SW/3LGdkWTI/Zyf7kfYI1t6qMY8DHm1xd9ucI scAt9f8QppBZ1eN5aJNO55mMYIvLFifJ3s6eVZAnJLkmUn8cys1UpaTBGs9B5q3Q9TyFEEq8PS9 rh X-Google-Smtp-Source: AGHT+IEseG2BDwHxFkdNJnxvDfHHlW4eQpvwF79fWx12+G+oaE6gscf+HQ0il+TGTgWlaJVT5bz/WQ== X-Received: by 2002:a05:6a00:a95:b0:781:2538:bf95 with SMTP id d2e1a72fcca58-7a220aaaa4amr6078487b3a.10.1760733613720; Fri, 17 Oct 2025 13:40:13 -0700 (PDT) Received: from hexa.. ([2602:feb4:3b:2100:aaee:e640:34cd:6f2]) by smtp.gmail.com with ESMTPSA id d2e1a72fcca58-7a2300f254esm477061b3a.45.2025.10.17.13.40.13 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 17 Oct 2025 13:40:13 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][scarthgap 26/26] oeqa/runtime/ping: don't bother trying to ping localhost Date: Fri, 17 Oct 2025 13:39:09 -0700 Message-ID: <649147913e89cd8f7390cb17cd0be94c9710ffa6.1760733431.git.steve@sakoman.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 17 Oct 2025 20:40:24 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/225060 From: Michael Haener If SLIRP is being used instead of TAP for networking to the guest then the target IP will be localhost. There's no point in pinging localhost to see if the target is up but whilst you'd think it is harmless, in some containers ping doesn't actually have enough rights to work: ping: socktype: SOCK_RAW ping: socket: Operation not permitted ping: => missing cap_net_raw+p capability or setuid? Look at the target address and if it's localhost or 127.0.0.* return immediately. (Backport from OE-Core rev: a06ef43d2a50e16c32bd6edbdc7b32c3528687d5) Signed-off-by: Michael Haener Signed-off-by: Steve Sakoman --- meta/lib/oeqa/runtime/cases/ping.py | 7 +++++++ test | 0 2 files changed, 7 insertions(+) create mode 100644 test diff --git a/meta/lib/oeqa/runtime/cases/ping.py b/meta/lib/oeqa/runtime/cases/ping.py index f72460e7f3..bc543f6c41 100644 --- a/meta/lib/oeqa/runtime/cases/ping.py +++ b/meta/lib/oeqa/runtime/cases/ping.py @@ -18,6 +18,13 @@ class PingTest(OERuntimeTestCase): output = '' count = 0 self.assertNotEqual(len(self.target.ip), 0, msg="No target IP address set") + + # If the target IP is localhost (because user-space networking is being used), + # then there's no point in pinging it. + if self.target.ip.startswith("127.0.0.") or self.target.ip in ("localhost", "::1"): + print("runtime/ping: localhost detected, not pinging") + return + try: while count < 5: cmd = 'ping -c 1 %s' % self.target.ip diff --git a/test b/test new file mode 100644 index 0000000000..e69de29bb2