From patchwork Tue Nov 4 14:47:52 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 73597 X-Patchwork-Delegate: steve@sakoman.com Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 7390DCCFA0D for ; Tue, 4 Nov 2025 14:48:13 +0000 (UTC) Received: from mail-pj1-f51.google.com (mail-pj1-f51.google.com [209.85.216.51]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.19537.1762267685677543907 for ; Tue, 04 Nov 2025 06:48:05 -0800 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20230601.gappssmtp.com header.s=20230601 header.b=xVS+rAq7; spf=softfail (domain: sakoman.com, ip: 209.85.216.51, mailfrom: steve@sakoman.com) Received: by mail-pj1-f51.google.com with SMTP id 98e67ed59e1d1-3402942e79cso7783573a91.2 for ; Tue, 04 Nov 2025 06:48:05 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20230601.gappssmtp.com; s=20230601; t=1762267685; x=1762872485; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=dRMvCgZ1kO8lO5kMUNb8c2N4hJWezq3q82pp/diUBgY=; b=xVS+rAq7aD7dOsl+SBbAwA6McFY3V/QaJyKkcUnAtAue5NsUnPsHXSs1lAu04WfFtB Q/cKhHEKPxTodfCvnuAdiAW8eesQRD1k8SpLsw0EEkUGjnu7hTnBopJVJzdPcCW5fL8E CpUCCP3aT5O2imvThXDjvtiVUL5N+bLT6jnOTzplwFv1Jwpx+ZOduSKOWWo54TQaWFUd gVk7p+wV3G6xY5/uDSTgfzLEvtBh1cB0vITYjcstq8N9ZYiGifdV3+A5IyCtibGKqu54 r1HtDIhTNMuvwULzqMDkUZ9wt36PKEPKFDTfBaYzqqNmiPENa0GEw3n5+Btsjji1KUww whTA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1762267685; x=1762872485; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=dRMvCgZ1kO8lO5kMUNb8c2N4hJWezq3q82pp/diUBgY=; b=DIzso0s8u5V/sFR3Lg15WXtSXnWZ5Eh+SgK706mSJvEx0pRapjQ0D+Gm0zGceJkvYX jRsT1UDnAn+Ldgi78p9u+bzIGkW+rYwoFY1+D6PbtFqFf267yOJotT8TCnN1FxIiTvP+ xkS0V8PmLHl4ng+e1xWbCzO9tcRWYf2m+ARrE3XJ5mvrhz4pUEekanlqmMFJ1SHQitWs DkgoaT1mM+sT0SqmhpfP3KKihwowwa2JA+T5ZdGJPnDvo6KHQr7CmnSS5pqzjOH04lsp siFnvQNwc2GxsKlT9lSXLCja27YhCrvJlZX1yCuUBtPLRojkAAY2kLWVDt24EVKw0Kly RwIA== X-Gm-Message-State: AOJu0YxVNrSetC+84WmpInylUEtShKWpTC6Bo2AgBOZdBMIE8YfWfOsN HF/amihtkWJ8P1mqM1ovycVRksb9UjXf1cVHuZuPfi/Y9+dND7/csr1mMDdwizUR2owLdkRtlSY b8GtUNyQ= X-Gm-Gg: ASbGncsp6wXL81nr6RQG4l4ei5ST1YFsT0WDHgwytiED1YOL+b6T845SIQEcW9AtKp5 hSdm0o91hqv7VFZsWdlthnMao2U1hkNt+3X1wUoGbL/0FQfbM3M4AQpMcYUQHdZVip3aKn1iWVr E2uWrZHfeHVy9pqO6L585/UmorC2riInOmAu9Ya0AeMLWDRLIxbGCMydfkABqzmi4ePD948hv8u XU08BwTKmsI3qQB2qq8GfhyXJqoGXQHKkrCyFU44hOnSaqefLg+K5jZs0mKXWEHuIxN3AtBHHal RzgxAWv40AMrmV42BRNDIUUyCBS9EK2sdRMhqdopFq6YN1SEhEqnLukihY77OXJIs6kpJad6b9P mXcHs/LQl6ET3isrzMrDruiFDRlOtrQbj2VdajW6n+umShHzdDIk4Fke3SDfihA4/3PE= X-Google-Smtp-Source: AGHT+IFeEiB4ALHgHHsY1mWe1J0AqSqCJSG+GDxacgNOIdnwlD7nuCCg6czsxwHEZvrSbB5p0Ds7xg== X-Received: by 2002:a17:90b:55c8:b0:33b:b453:c900 with SMTP id 98e67ed59e1d1-3408306b9cfmr19950727a91.19.1762267684757; Tue, 04 Nov 2025 06:48:04 -0800 (PST) Received: from hexa.. ([2602:feb4:3b:2100:1f4f:a6d3:d9bf:780d]) by smtp.gmail.com with ESMTPSA id 98e67ed59e1d1-3417d40da83sm1341481a91.14.2025.11.04.06.48.04 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 04 Nov 2025 06:48:04 -0800 (PST) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][scarthgap 1/7] wpa-supplicant: patch CVE-2025-24912 Date: Tue, 4 Nov 2025 06:47:52 -0800 Message-ID: X-Mailer: git-send-email 2.43.0 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Tue, 04 Nov 2025 14:48:13 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/225727 From: Peter Marko Pick patches as listed in NVD CVE report. Note that Debian lists one of the patches as introducing the vulnerability. This is against what the original report [1] says. Also the commit messages provide hints that the first patch fixes this issue and second is fixing problem with the first patch. [1] https://jvn.jp/en/jp/JVN19358384/ Signed-off-by: Peter Marko Signed-off-by: Steve Sakoman --- .../wpa-supplicant/CVE-2025-24912-01.patch | 79 +++++++++++++++++++ .../wpa-supplicant/CVE-2025-24912-02.patch | 70 ++++++++++++++++ .../wpa-supplicant/wpa-supplicant_2.10.bb | 2 + 3 files changed, 151 insertions(+) create mode 100644 meta/recipes-connectivity/wpa-supplicant/wpa-supplicant/CVE-2025-24912-01.patch create mode 100644 meta/recipes-connectivity/wpa-supplicant/wpa-supplicant/CVE-2025-24912-02.patch diff --git a/meta/recipes-connectivity/wpa-supplicant/wpa-supplicant/CVE-2025-24912-01.patch b/meta/recipes-connectivity/wpa-supplicant/wpa-supplicant/CVE-2025-24912-01.patch new file mode 100644 index 0000000000..8976047f68 --- /dev/null +++ b/meta/recipes-connectivity/wpa-supplicant/wpa-supplicant/CVE-2025-24912-01.patch @@ -0,0 +1,79 @@ +From 726432d7622cc0088ac353d073b59628b590ea44 Mon Sep 17 00:00:00 2001 +From: Jouni Malinen +Date: Sat, 25 Jan 2025 11:21:16 +0200 +Subject: [PATCH] RADIUS: Drop pending request only when accepting the response + +The case of an invalid authenticator in a RADIUS response could imply +that the response is not from the correct RADIUS server and as such, +such a response should be discarded without changing internal state for +the pending request. The case of an unknown response (RADIUS_RX_UNKNOWN) +is somewhat more complex since it could have been indicated before +validating the authenticator. In any case, it seems better to change the +state for the pending request only when we have fully accepted the +response. + +Allowing the internal state of pending RADIUS request to change based on +responses that are not fully validation could have allow at least a +theoretical DoS attack if an attacker were to have means for injecting +RADIUS messages to the network using the IP address of the real RADIUS +server and being able to do so more quickly than the real server and +with the matching identifier from the request header (i.e., either by +flooding 256 responses quickly or by having means to capture the RADIUS +request). These should not really be realistic options in a properly +protected deployment, but nevertheless it is good to be more careful in +processing RADIUS responses. + +Remove a pending RADIUS request from the internal list only when having +fully accepted a matching RADIUS response, i.e., after one of the +registered handlers has confirmed that the authenticator is valid and +processing of the response has succeeded. + +Signed-off-by: Jouni Malinen + +CVE: CVE-2025-24912 +Upstream-Status: Backport [https://w1.fi/cgit/hostap/commit/?id=726432d7622cc0088ac353d073b59628b590ea44] +Signed-off-by: Peter Marko +--- + src/radius/radius_client.c | 15 +++++++-------- + 1 file changed, 7 insertions(+), 8 deletions(-) + +diff --git a/src/radius/radius_client.c b/src/radius/radius_client.c +index 2a7f36170..7909b29a7 100644 +--- a/src/radius/radius_client.c ++++ b/src/radius/radius_client.c +@@ -922,13 +922,6 @@ static void radius_client_receive(int sock, void *eloop_ctx, void *sock_ctx) + roundtrip / 100, roundtrip % 100); + rconf->round_trip_time = roundtrip; + +- /* Remove ACKed RADIUS packet from retransmit list */ +- if (prev_req) +- prev_req->next = req->next; +- else +- radius->msgs = req->next; +- radius->num_msgs--; +- + for (i = 0; i < num_handlers; i++) { + RadiusRxResult res; + res = handlers[i].handler(msg, req->msg, req->shared_secret, +@@ -939,6 +932,13 @@ static void radius_client_receive(int sock, void *eloop_ctx, void *sock_ctx) + radius_msg_free(msg); + /* fall through */ + case RADIUS_RX_QUEUED: ++ /* Remove ACKed RADIUS packet from retransmit list */ ++ if (prev_req) ++ prev_req->next = req->next; ++ else ++ radius->msgs = req->next; ++ radius->num_msgs--; ++ + radius_client_msg_free(req); + return; + case RADIUS_RX_INVALID_AUTHENTICATOR: +@@ -960,7 +960,6 @@ static void radius_client_receive(int sock, void *eloop_ctx, void *sock_ctx) + msg_type, hdr->code, hdr->identifier, + invalid_authenticator ? " [INVALID AUTHENTICATOR]" : + ""); +- radius_client_msg_free(req); + + fail: + radius_msg_free(msg); diff --git a/meta/recipes-connectivity/wpa-supplicant/wpa-supplicant/CVE-2025-24912-02.patch b/meta/recipes-connectivity/wpa-supplicant/wpa-supplicant/CVE-2025-24912-02.patch new file mode 100644 index 0000000000..f3cecd6d5f --- /dev/null +++ b/meta/recipes-connectivity/wpa-supplicant/wpa-supplicant/CVE-2025-24912-02.patch @@ -0,0 +1,70 @@ +From 339a334551ca911187cc870f4f97ef08e11db109 Mon Sep 17 00:00:00 2001 +From: Jouni Malinen +Date: Wed, 5 Feb 2025 19:23:39 +0200 +Subject: [PATCH] RADIUS: Fix pending request dropping + +A recent change to this moved the place where the processed RADIUS +request was removed from the pending list to happen after the message +handler had been called. This did not take into account possibility of +the handler adding a new pending request in the list and the prev_req +pointer not necessarily pointing to the correct entry anymore. As such, +some of the pending requests could have been lost and that would result +in not being able to process responses to those requests and also, to a +memory leak. + +Fix this by determining prev_req at the point when the pending request +is being removed, i.e., after the handler function has already added a +new entry. + +Fixes: 726432d7622c ("RADIUS: Drop pending request only when accepting the response") +Signed-off-by: Jouni Malinen + +CVE: CVE-2025-24912 +Upstream-Status: Backport [https://w1.fi/cgit/hostap/commit/?id=339a334551ca911187cc870f4f97ef08e11db109] +Signed-off-by: Peter Marko +--- + src/radius/radius_client.c | 10 +++++++--- + 1 file changed, 7 insertions(+), 3 deletions(-) + +diff --git a/src/radius/radius_client.c b/src/radius/radius_client.c +index 7909b29a7..d4faa7936 100644 +--- a/src/radius/radius_client.c ++++ b/src/radius/radius_client.c +@@ -824,7 +824,7 @@ static void radius_client_receive(int sock, void *eloop_ctx, void *sock_ctx) + struct radius_hdr *hdr; + struct radius_rx_handler *handlers; + size_t num_handlers, i; +- struct radius_msg_list *req, *prev_req; ++ struct radius_msg_list *req, *prev_req, *r; + struct os_reltime now; + struct hostapd_radius_server *rconf; + int invalid_authenticator = 0; +@@ -887,7 +887,6 @@ static void radius_client_receive(int sock, void *eloop_ctx, void *sock_ctx) + break; + } + +- prev_req = NULL; + req = radius->msgs; + while (req) { + /* TODO: also match by src addr:port of the packet when using +@@ -899,7 +898,6 @@ static void radius_client_receive(int sock, void *eloop_ctx, void *sock_ctx) + hdr->identifier) + break; + +- prev_req = req; + req = req->next; + } + +@@ -933,6 +931,12 @@ static void radius_client_receive(int sock, void *eloop_ctx, void *sock_ctx) + /* fall through */ + case RADIUS_RX_QUEUED: + /* Remove ACKed RADIUS packet from retransmit list */ ++ prev_req = NULL; ++ for (r = radius->msgs; r; r = r->next) { ++ if (r == req) ++ break; ++ prev_req = r; ++ } + if (prev_req) + prev_req->next = req->next; + else diff --git a/meta/recipes-connectivity/wpa-supplicant/wpa-supplicant_2.10.bb b/meta/recipes-connectivity/wpa-supplicant/wpa-supplicant_2.10.bb index fd98bdcc36..f939945b08 100644 --- a/meta/recipes-connectivity/wpa-supplicant/wpa-supplicant_2.10.bb +++ b/meta/recipes-connectivity/wpa-supplicant/wpa-supplicant_2.10.bb @@ -36,6 +36,8 @@ SRC_URI = "http://w1.fi/releases/wpa_supplicant-${PV}.tar.gz \ file://CVE-2022-37660-0003.patch \ file://CVE-2022-37660-0004.patch \ file://CVE-2022-37660-0005.patch \ + file://CVE-2025-24912-01.patch \ + file://CVE-2025-24912-02.patch \ " SRC_URI[sha256sum] = "20df7ae5154b3830355f8ab4269123a87affdea59fe74fe9292a91d0d7e17b2f" From patchwork Tue Nov 4 14:47:53 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 73598 X-Patchwork-Delegate: steve@sakoman.com Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 83A17CCFA12 for ; Tue, 4 Nov 2025 14:48:13 +0000 (UTC) Received: from mail-pj1-f52.google.com (mail-pj1-f52.google.com [209.85.216.52]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.19540.1762267687371722921 for ; Tue, 04 Nov 2025 06:48:07 -0800 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20230601.gappssmtp.com header.s=20230601 header.b=ohG2Hv9R; spf=softfail (domain: sakoman.com, ip: 209.85.216.52, mailfrom: steve@sakoman.com) Received: by mail-pj1-f52.google.com with SMTP id 98e67ed59e1d1-340c39ee02dso2936218a91.1 for ; Tue, 04 Nov 2025 06:48:07 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20230601.gappssmtp.com; s=20230601; t=1762267687; x=1762872487; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=awJnc3/WY55g22miGPj1opYVHLrtlVYZ1r9lwo6/4bk=; b=ohG2Hv9RMC2kaEpaVuthhthWx1WuiYO0NS6+3DXZIYeenNTyDrgN4BHFLegT7uTxZM EqAcgV0cgxZdUbXdgFbLi8+UVbypNZb8PFX5j1hTBMRlwXlxd+RZ/WfomJt4k4t6tmdw kyUNyHzAg2NOADaoCyz73ZRN80SdLmDPLVmjgJMcBsb5kq74oQhLZBZwRtT19YT8kyZi LMXAjbRZB/eM3fo1Oep90UkEONpMyXMfoGw5rJZVoJnVpGjqumihJvNmlP42OcmhKVbI Lr/2OkZFMYFml6VMEy721JL4Fbh5qxUGgMdn1VpkLBNHVc/rlSeutaYlacnpgdyMO4O8 4AMg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1762267687; x=1762872487; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=awJnc3/WY55g22miGPj1opYVHLrtlVYZ1r9lwo6/4bk=; b=YUy3GQ0quVZpj0toYa/LKGoWyxDZHjZ37p4Q+IXIWUK+mdkCYJMgyTWqmSsimJKRIH rQdTAAmiR9RaanynyOOwxluj90Xjy5UblBfvhvNS5hLQGWeobGRagz9s4Mql49NTOGlE nkl7+BkJu3rjpvr1tn+ZXGW29ieFziHm5nLrf5GDcqJsH5K7XgThqLgy4ac5/zk4xVc5 n45thKhtrTsMz4q1FqpWUiVzQFDMKhawBxcgfaME6TIGr8Ut1ooPLFqYMbyTA4MKSWdm tKE+dEu6UNvIyC8CA2D9FxbshDD9GlfkdszXX91Gb3W/Op0AFnWi5mYIDq5ow76NVpw6 avTg== X-Gm-Message-State: AOJu0YwmVEYB2XnU2OUChLxCcYXBqPvUd/4/wosDxhfxsoPbF2zSLVi4 EfCBCcmO1RSbbmHKELN9hmsBEPiKJeryOqypYzZ8qdZM+zKC0AZe3UVNmy3RazAK2R2BxoRO654 Q0WqlxQE= X-Gm-Gg: ASbGncvZNojkQ6ofZOH9oT5QaIkjyc+5AYjyleClcnOVpH6nZMrILTkWkR+8OP3xZFK meN3HhIw5I2oDOgR4mX80ylvfnIZcOfK4xB+Ccz566uLHukQyEPeMvgU5nnLalXoTC532JmMJiQ x5ty4YSw/U8RFxxl0O353m0ZELhfAA1a+j3ekCIUdeHxiEiYRPPC3Z06AAZS3MrDnnq1Az9RHbD p+8QuyMgzQidq3sXSwiemGcrtHvCqkGm9IosllobV9WZz4OZOgYR59M6JeFAR4JSxBMB92xCc26 yCfAYJnUArOZqgy9dVd94azo0p4nUqDq5f6MDC7FzdplluSUFqPchI8rc1PBDxEVuGTxii25tRc /sEGkn6oBTKPDQoOUG806h+rnx/SaqX3TXUi5aU1eIkdnBi/vLktvMfWD7ba04jjqa0k= X-Google-Smtp-Source: AGHT+IE35VcOUchfYRtVdrQzZTjDIkji3A3Bsk/ZeXV4etelt0NkuznWSkUnb/HsoIXGCp5ooawD2w== X-Received: by 2002:a17:90b:1801:b0:330:6d5e:f17b with SMTP id 98e67ed59e1d1-34083074dddmr19975828a91.21.1762267686576; Tue, 04 Nov 2025 06:48:06 -0800 (PST) Received: from hexa.. ([2602:feb4:3b:2100:1f4f:a6d3:d9bf:780d]) by smtp.gmail.com with ESMTPSA id 98e67ed59e1d1-3417d40da83sm1341481a91.14.2025.11.04.06.48.06 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 04 Nov 2025 06:48:06 -0800 (PST) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][scarthgap 2/7] binutils: patch CVE-2025-11414 Date: Tue, 4 Nov 2025 06:47:53 -0800 Message-ID: X-Mailer: git-send-email 2.43.0 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Tue, 04 Nov 2025 14:48:13 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/225728 From: Peter Marko Pick commit per NVD CVE report. (From OE-Core rev: cd7ce80fa1a99916aa2f93c4d9591c5496c3ef71) Signed-off-by: Peter Marko Signed-off-by: Mathieu Dubois-Briand Signed-off-by: Ross Burton Signed-off-by: Richard Purdie Signed-off-by: Steve Sakoman --- .../binutils/binutils-2.42.inc | 1 + .../binutils/binutils/CVE-2025-11414.patch | 84 +++++++++++++++++++ 2 files changed, 85 insertions(+) create mode 100644 meta/recipes-devtools/binutils/binutils/CVE-2025-11414.patch diff --git a/meta/recipes-devtools/binutils/binutils-2.42.inc b/meta/recipes-devtools/binutils/binutils-2.42.inc index dcd3325ecc..21f0f7e3a7 100644 --- a/meta/recipes-devtools/binutils/binutils-2.42.inc +++ b/meta/recipes-devtools/binutils/binutils-2.42.inc @@ -63,5 +63,6 @@ SRC_URI = "\ file://0025-CVE-2025-11083.patch \ file://0026-CVE-2025-11081.patch \ file://0027-CVE-2025-8225.patch \ + file://CVE-2025-11414.patch \ " S = "${WORKDIR}/git" diff --git a/meta/recipes-devtools/binutils/binutils/CVE-2025-11414.patch b/meta/recipes-devtools/binutils/binutils/CVE-2025-11414.patch new file mode 100644 index 0000000000..c6e45c3091 --- /dev/null +++ b/meta/recipes-devtools/binutils/binutils/CVE-2025-11414.patch @@ -0,0 +1,84 @@ +From aeaaa9af6359c8e394ce9cf24911fec4f4d23703 Mon Sep 17 00:00:00 2001 +From: "H.J. Lu" +Date: Tue, 23 Sep 2025 08:52:26 +0800 +Subject: [PATCH] elf: Return error on unsorted symbol table if not allowed + +Normally ELF symbol table should be sorted, i.e., local symbols precede +global symbols. Irix 6 is an exception and its elf_bad_symtab is set +to true. Issue an error if elf_bad_symtab is false and symbol table is +unsorted. + + PR ld/33450 + * elflink.c (set_symbol_value): Change return type to bool and + return false on error. Issue an error on unsorted symbol table + if not allowed. + (elf_link_input_bfd): Return false if set_symbol_value reurns + false. + +Signed-off-by: H.J. Lu + +CVE: CVE-2025-11414 +Upstream-Status: Backport [https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=aeaaa9af6359c8e394ce9cf24911fec4f4d23703] +Signed-off-by: Peter Marko +--- + bfd/elflink.c | 21 +++++++++++++++------ + 1 file changed, 15 insertions(+), 6 deletions(-) + +diff --git a/bfd/elflink.c b/bfd/elflink.c +index 66982f82b94..54f0d6e957e 100644 +--- a/bfd/elflink.c ++++ b/bfd/elflink.c +@@ -8914,7 +8914,7 @@ struct elf_outext_info + := as in C + := as in C, plus "0-" for unambiguous negation. */ + +-static void ++static bool + set_symbol_value (bfd *bfd_with_globals, + Elf_Internal_Sym *isymbuf, + size_t locsymcount, +@@ -8935,9 +8935,15 @@ set_symbol_value (bfd *bfd_with_globals, + "absolute" section and give it a value. */ + sym->st_shndx = SHN_ABS; + sym->st_value = val; +- return; ++ return true; ++ } ++ if (!elf_bad_symtab (bfd_with_globals)) ++ { ++ _bfd_error_handler (_("%pB: corrupt symbol table"), ++ bfd_with_globals); ++ bfd_set_error (bfd_error_bad_value); ++ return false; + } +- BFD_ASSERT (elf_bad_symtab (bfd_with_globals)); + extsymoff = 0; + } + +@@ -8947,11 +8953,12 @@ set_symbol_value (bfd *bfd_with_globals, + if (h == NULL) + { + /* FIXMEL What should we do ? */ +- return; ++ return false; + } + h->root.type = bfd_link_hash_defined; + h->root.u.def.value = val; + h->root.u.def.section = bfd_abs_section_ptr; ++ return true; + } + + static bool +@@ -11641,8 +11648,10 @@ elf_link_input_bfd (struct elf_final_link_info *flinfo, bfd *input_bfd) + return false; + + /* Symbol evaluated OK. Update to absolute value. */ +- set_symbol_value (input_bfd, isymbuf, locsymcount, +- r_symndx, val); ++ if (!set_symbol_value (input_bfd, isymbuf, locsymcount, r_symndx, ++ val)) ++ return false; ++ + continue; + } + From patchwork Tue Nov 4 14:47:54 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 73595 X-Patchwork-Delegate: steve@sakoman.com Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 73A19CCFA13 for ; Tue, 4 Nov 2025 14:48:13 +0000 (UTC) Received: from mail-pj1-f53.google.com (mail-pj1-f53.google.com [209.85.216.53]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.19625.1762267689051773641 for ; Tue, 04 Nov 2025 06:48:09 -0800 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20230601.gappssmtp.com header.s=20230601 header.b=2Xu4SICB; spf=softfail (domain: sakoman.com, ip: 209.85.216.53, mailfrom: steve@sakoman.com) Received: by mail-pj1-f53.google.com with SMTP id 98e67ed59e1d1-340c1c05feeso2871481a91.1 for ; Tue, 04 Nov 2025 06:48:09 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20230601.gappssmtp.com; s=20230601; t=1762267688; x=1762872488; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=kndNTxsoT9SsCaFZSnH1wkftk4E9tGZkfxUWsbbKK1Y=; b=2Xu4SICB4xwWhSgV+KbQkWuxPdqYm0VchdvJeXrsOYClHSU9HHS6Sew0XWZGWyxWXL nboY7lL1M/6oX+M5C0k1Ior4086GWAR7/Zns82F1UfiXhjqXAfAUkAQdx5uUe5Y/yWgL RJ6rwMYWTY7i9O2EpqpfVx4aGl210ZTIfbN/Bz6gnJO0SRh7YVeebUplVjKG80K/Rus1 0NIdZs4I0618QFnrqjLCQs2SzNwGYUF4S3h+cXujyO412YYPsp+yUjygpDqzKNlwjIIm L09MqaP/yfaCq89vkWMvJNIGvrAuJhu0+X5C5ocevfCEWwLAultTf874bbmzpUP9hI2y POlg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1762267688; x=1762872488; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=kndNTxsoT9SsCaFZSnH1wkftk4E9tGZkfxUWsbbKK1Y=; b=MepmYSNzDhJTb+V9zAi46YQvQ/MWkQLGaSbNZgenMF/VBmt2Xb6xyjeCpt5/z7ru3n rdJX0iE08+qvWbDbn2TJL4mASJs4w8TOsqXowahaObZMzNjHvcpGclkYDQa6fohXHa7J gjLaf3oUzqxV29A+umliAF1O3o1iwWHGqwsFEmxUnqpxRbBu6RKAdgY3RdixnrGSnDCx 8K+5Ic44vLr0SCFN5/FRXPzSvwPOSlm1VZYB1m4tkGQNvB8iFCtYc6RcmCylRU1aypUA OAGMJ/se7huazltn8hZIjF3Zinzj6Gwna8PFr883ZF9jgkKkv1CxIJjHg+CQn7jUMLzu aNHQ== X-Gm-Message-State: AOJu0YxtOJFMcLy6AJaH+i5IJ4xqZnDuuy1QBuDFCttTbXu3ynkTpzPS 0KkiLQ+2R6Y7bnHC8f74ehvSLWn+M6Q55d3fQ1/rTBiEB7kPCm/choxjUsz6zq/kzC08Y9ecexI up1F9TZQ= X-Gm-Gg: ASbGnctDjlKlxQaeIzDnur4SOz8sBPcRa8Qs6FzefzCnCcU/JaUsuNcDWI86AtQnOvz PVhkDwtutB+yD5qg8dTZHwPG4AXT7TbLh3Ih9eGh2eJwLGiGrW+Kop+3cP+HlcRmoXu7sjN0hns QtgW8n3SMpNk26m1UEaBWxEQhhnByMH2XmJolWhtBoaZ6CtyexSiF5PW12Gm7dy7gqcfeWhugHF ManXw4NQdf54tHNBU17CZcgigCb1esn6ATKgsV4LOJ4cyUZdKGydPeqL2DnFE9CfmOsHGk/w199 BT7Mz49XHpQJ1q/oTF9+LIDbsk2F12cLAOLlCAOj+J1ITF30SzmW/oQ8zH8Crm5eiG1NjbR/2ml y53OC7D7LvUQnMP+e5xZB6PCATL2H+EiAdrAqQXLrlA9S3Ujej1ZdbS4Alh8WYf+M6eU= X-Google-Smtp-Source: AGHT+IGHJFdOOodO/O+4a8EVUgMIa+H+zBefBy6JiJy68Onq3BZCSMucEeaiVGE6pPSd9iBer78Y1w== X-Received: by 2002:a17:90b:2b45:b0:341:2141:d809 with SMTP id 98e67ed59e1d1-3412141d8bemr9310617a91.26.1762267688348; Tue, 04 Nov 2025 06:48:08 -0800 (PST) Received: from hexa.. ([2602:feb4:3b:2100:1f4f:a6d3:d9bf:780d]) by smtp.gmail.com with ESMTPSA id 98e67ed59e1d1-3417d40da83sm1341481a91.14.2025.11.04.06.48.07 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 04 Nov 2025 06:48:08 -0800 (PST) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][scarthgap 3/7] binutils: patch CVE-2025-11412 Date: Tue, 4 Nov 2025 06:47:54 -0800 Message-ID: X-Mailer: git-send-email 2.43.0 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Tue, 04 Nov 2025 14:48:13 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/225729 From: Peter Marko Pick commit per NVD CVE report. (From OE-Core rev: 6b94ff6c584a31d2b1e06d1e1dc19392d759b4b7) Signed-off-by: Peter Marko Signed-off-by: Mathieu Dubois-Briand Signed-off-by: Ross Burton Signed-off-by: Richard Purdie Signed-off-by: Steve Sakoman --- .../binutils/binutils-2.42.inc | 1 + .../binutils/binutils/CVE-2025-11412.patch | 35 +++++++++++++++++++ 2 files changed, 36 insertions(+) create mode 100644 meta/recipes-devtools/binutils/binutils/CVE-2025-11412.patch diff --git a/meta/recipes-devtools/binutils/binutils-2.42.inc b/meta/recipes-devtools/binutils/binutils-2.42.inc index 21f0f7e3a7..b13c31717d 100644 --- a/meta/recipes-devtools/binutils/binutils-2.42.inc +++ b/meta/recipes-devtools/binutils/binutils-2.42.inc @@ -64,5 +64,6 @@ SRC_URI = "\ file://0026-CVE-2025-11081.patch \ file://0027-CVE-2025-8225.patch \ file://CVE-2025-11414.patch \ + file://CVE-2025-11412.patch \ " S = "${WORKDIR}/git" diff --git a/meta/recipes-devtools/binutils/binutils/CVE-2025-11412.patch b/meta/recipes-devtools/binutils/binutils/CVE-2025-11412.patch new file mode 100644 index 0000000000..e2a2b10c18 --- /dev/null +++ b/meta/recipes-devtools/binutils/binutils/CVE-2025-11412.patch @@ -0,0 +1,35 @@ +From 047435dd988a3975d40c6626a8f739a0b2e154bc Mon Sep 17 00:00:00 2001 +From: Alan Modra +Date: Thu, 25 Sep 2025 08:22:24 +0930 +Subject: [PATCH] PR 33452 SEGV in bfd_elf_gc_record_vtentry + +Limit addends on vtentry relocs, otherwise ld might attempt to +allocate a stupidly large array. This also fixes the expression +overflow leading to pr33452. A vtable of 33M entries on a 64-bit +host is surely large enough, especially considering that VTINHERIT +and VTENTRY relocations are to support -fvtable-gc that disappeared +from gcc over 20 years ago. + + PR ld/33452 + * elflink.c (bfd_elf_gc_record_vtentry): Sanity check addend. + +CVE: CVE-2025-11412 +Upstream-Status: Backport [https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=047435dd988a3975d40c6626a8f739a0b2e154bc] +Signed-off-by: Peter Marko +--- + bfd/elflink.c | 2 +- + 1 file changed, 1 insertion(+), 1 deletion(-) + +diff --git a/bfd/elflink.c b/bfd/elflink.c +index 54f0d6e957e..0a0456177c2 100644 +--- a/bfd/elflink.c ++++ b/bfd/elflink.c +@@ -14613,7 +14613,7 @@ bfd_elf_gc_record_vtentry (bfd *abfd, asection *sec, + const struct elf_backend_data *bed = get_elf_backend_data (abfd); + unsigned int log_file_align = bed->s->log_file_align; + +- if (!h) ++ if (!h || addend > 1u << 28) + { + /* xgettext:c-format */ + _bfd_error_handler (_("%pB: section '%pA': corrupt VTENTRY entry"), From patchwork Tue Nov 4 14:47:55 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 73596 X-Patchwork-Delegate: steve@sakoman.com Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 65EDCCCF9E3 for ; Tue, 4 Nov 2025 14:48:13 +0000 (UTC) Received: from mail-pj1-f48.google.com (mail-pj1-f48.google.com [209.85.216.48]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.19546.1762267691226942738 for ; Tue, 04 Nov 2025 06:48:11 -0800 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20230601.gappssmtp.com header.s=20230601 header.b=Ns54QLP7; spf=softfail (domain: sakoman.com, ip: 209.85.216.48, mailfrom: steve@sakoman.com) Received: by mail-pj1-f48.google.com with SMTP id 98e67ed59e1d1-34029cee97fso5780649a91.1 for ; Tue, 04 Nov 2025 06:48:11 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20230601.gappssmtp.com; s=20230601; t=1762267690; x=1762872490; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=oWMrCqZDVM1pCIy0fxqiOWOY/jsUo39b+EEb6K82VLc=; b=Ns54QLP7S0dKndyPDY8oUV2cSs3nuh7G29TLBl1zXwVzTupddYv/P0WdmB3lp+kyBE zonqJXP/aX4Q0Y9XsTZAEXs3o6ZgN2qgdp3hyr48dvyouXrOQ4KELPFVShgNo5xPc9Zu I2XZ9NKFnS8x4v4rvR7HEsYucCWy/8zgoYTVQiXeFzQXyGrhA5alFRq+O3M1eNQ+fo1V dCinlDDtrUQm7hZdTks+TZ3qrONZ3tPHmaYbu8Tmj3W38UWYMuJAHaL1NlkOqEfEtiWB o/xRlERU03AHQYrg7XNGLlxxNRFfjgkV1oWSApjXNCCyGyb1dL1iiB60Wt31/WnNnaKd bK/A== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1762267690; x=1762872490; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=oWMrCqZDVM1pCIy0fxqiOWOY/jsUo39b+EEb6K82VLc=; b=CWzlhedYl4BghRdLnKJUD+vjmbHV/Z3Y0zWlEvDcFhqU3iVG24dA/0/a5p43K5ZXxr k1C1AaWY1cZatATi9wgFivC4RUgjsLUdjXMdrprTZbmTDRj8gXxwmNxFfdbkWyQ5b1AF FFMo/p56e7DlrDfXPjPUtmEh1/BrdlUjCz1cMU198o860EpZnn5TKi0Uok+2RHVcFVIF srsU0AAApGhdilxesCapNMuEhkRFvElGnbtx9W5uGfbZ1OpxkwwwAeqkAqCezhFerEXk sAltL8govs5k6BKHG2LSTeIfDgViTr7EhKM3yxFx2iIM6cvPsDs5/oxTxcWpaPa9OvLg BuPg== X-Gm-Message-State: AOJu0Yynu+YneSGnvv8pK1cSAzbouTkcevNmn1meSUZ+rb3rABsYNkIC b/lkFNY+G0e294YUc9gSVM56i2ypXFHzYl9cLtJ/kgyohUczZJoujRDI4bu0fG2HfXQn3wso80j C09QXrKE= X-Gm-Gg: ASbGncukggmgdwaQ2s1d+PT9miJJNZBxVJdXfdRmO0V/juVnFJ8Sr1w3l3BnpFKzS+F VGjRj6ahvHIJ57fNanabmLYtNT6edEo5SHemP3LRVMxn1bi9IlaBBe3qdBRkOiRhxhfPZTW36gF 3Tpt/tPX3+1ya7vzTsCk0stc0hDppH2mgs6J1dMxuAz2fhmxWbOenhb/KnD9zYoLuet/w98yyjd Lw2fqddQipvROdRoBaoob4zqQQw0IGbh8n7CMHtWjoDrPFLne0Gk2jcqiRHrOs9m7xk/c5RYb30 6fwYabqWX1HeiIV6J06DpJXNN56WBSTieBRy9ipy+fgAi31yus+qpVqRc6zp/AvWJvpqYAtloTx EWQA6ZAoG0s/MjRA+DgQRUOFDXjq6lRV+HYEJSDRm9d/GslHZiDhkU9LbX8WaqhM4PGA= X-Google-Smtp-Source: AGHT+IE/Q+gLb3S54Jnt09En9sq7qoMuJRflXKcxx7z+ipMOVnJYIvUYCXJTiaQkGvTPmf8E20KbiA== X-Received: by 2002:a17:90b:5407:b0:340:b152:65c0 with SMTP id 98e67ed59e1d1-340b1527aeemr16558377a91.26.1762267690270; Tue, 04 Nov 2025 06:48:10 -0800 (PST) Received: from hexa.. ([2602:feb4:3b:2100:1f4f:a6d3:d9bf:780d]) by smtp.gmail.com with ESMTPSA id 98e67ed59e1d1-3417d40da83sm1341481a91.14.2025.11.04.06.48.09 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 04 Nov 2025 06:48:09 -0800 (PST) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][scarthgap 4/7] binutils: patch CVE-2025-11413 Date: Tue, 4 Nov 2025 06:47:55 -0800 Message-ID: X-Mailer: git-send-email 2.43.0 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Tue, 04 Nov 2025 14:48:13 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/225730 From: Peter Marko Pick commit per NVD CVE report. Note that there were two patches for this, first [1] and then [2]. The second patch moved the original patch to different location. Cherry-pick of second patch is successful leaving out the code removing the code from first location, so the patch attached here is not identical to the upstream commit but is identical to applying both and merging them to a single patch. [1] https://sourceware.org/git/?p=binutils-gdb.git;a=commitdiff;h=1108620d7a521f1c85d2f629031ce0fbae14e331 [2] https://sourceware.org/git/?p=binutils-gdb.git;a=commitdiff;h=72efdf166aa0ed72ecc69fc2349af6591a7a19c0 (From OE-Core rev: 98df728e6136d04af0f4922b7ffbeffb704de395) Signed-off-by: Peter Marko Signed-off-by: Mathieu Dubois-Briand Signed-off-by: Ross Burton Signed-off-by: Richard Purdie Signed-off-by: Steve Sakoman --- .../binutils/binutils-2.42.inc | 1 + .../binutils/binutils/CVE-2025-11413.patch | 38 +++++++++++++++++++ 2 files changed, 39 insertions(+) create mode 100644 meta/recipes-devtools/binutils/binutils/CVE-2025-11413.patch diff --git a/meta/recipes-devtools/binutils/binutils-2.42.inc b/meta/recipes-devtools/binutils/binutils-2.42.inc index b13c31717d..60b0d03ccd 100644 --- a/meta/recipes-devtools/binutils/binutils-2.42.inc +++ b/meta/recipes-devtools/binutils/binutils-2.42.inc @@ -65,5 +65,6 @@ SRC_URI = "\ file://0027-CVE-2025-8225.patch \ file://CVE-2025-11414.patch \ file://CVE-2025-11412.patch \ + file://CVE-2025-11413.patch \ " S = "${WORKDIR}/git" diff --git a/meta/recipes-devtools/binutils/binutils/CVE-2025-11413.patch b/meta/recipes-devtools/binutils/binutils/CVE-2025-11413.patch new file mode 100644 index 0000000000..a7697d247f --- /dev/null +++ b/meta/recipes-devtools/binutils/binutils/CVE-2025-11413.patch @@ -0,0 +1,38 @@ +From 72efdf166aa0ed72ecc69fc2349af6591a7a19c0 Mon Sep 17 00:00:00 2001 +From: Alan Modra +Date: Thu, 25 Sep 2025 10:41:32 +0930 +Subject: [PATCH] Re: elf: Disallow the empty global symbol name + +sparc64-linux-gnu +FAIL: selective2 +sparc64-linux-gnu +FAIL: selective3 + + PR ld/33456 + * elflink.c (elf_link_add_object_symbols): Move new check later + to give the backend add_symbol_hook a chance to remove symbols + with empty names. + +CVE: CVE-2025-11413 +Upstream-Status: Backport [https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=72efdf166aa0ed72ecc69fc2349af6591a7a19c0] +Signed-off-by: Peter Marko +--- + bfd/elflink.c | 7 +++++++ + 1 file changed, 7 insertions(+) + +diff --git a/bfd/elflink.c b/bfd/elflink.c +index 0a0456177c2..5c8b822e36a 100644 +--- a/bfd/elflink.c ++++ b/bfd/elflink.c +@@ -5015,6 +5015,13 @@ elf_link_add_object_symbols (bfd *abfd, struct bfd_link_info *info) + continue; + } + ++ if (name[0] == '\0') ++ { ++ _bfd_error_handler (_("%pB: corrupt symbol table"), abfd); ++ bfd_set_error (bfd_error_bad_value); ++ goto error_free_vers; ++ } ++ + /* Sanity check that all possibilities were handled. */ + if (sec == NULL) + abort (); From patchwork Tue Nov 4 14:47:56 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 73593 X-Patchwork-Delegate: steve@sakoman.com Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 5911DCCFA04 for ; Tue, 4 Nov 2025 14:48:13 +0000 (UTC) Received: from mail-pj1-f52.google.com (mail-pj1-f52.google.com [209.85.216.52]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.19635.1762267692814140831 for ; Tue, 04 Nov 2025 06:48:12 -0800 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20230601.gappssmtp.com header.s=20230601 header.b=Jn0dOBHQ; spf=softfail (domain: sakoman.com, ip: 209.85.216.52, mailfrom: steve@sakoman.com) Received: by mail-pj1-f52.google.com with SMTP id 98e67ed59e1d1-340ba29d518so2836403a91.3 for ; Tue, 04 Nov 2025 06:48:12 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20230601.gappssmtp.com; s=20230601; t=1762267692; x=1762872492; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=JYCcwOnS+Ui/7nymb78KDWKTCTrVcNW1FiL5++R9qXo=; b=Jn0dOBHQZGDTehqIEP6QWSQV/MyT+H0Tb2gSFO5BKXw6O50NSP365yK5pfR7htgPQ5 iMb+nk+VkXFYU7Yyh/sjSvYyTvXyWc0+w/KHRTeinnGz84BuIRJUEBN7V1BxAeWqVgd7 JkRSD1xKIr9lZJoQSoFVi3LntBZBMQNbBaLJrDDbp2e9GUxPcg3HPGsoZ99AkE2VwqwK kvpOQS6NRBoku4XDqRrSVmcH5cCgBHMvhaZeDPslcVH4MNppFfucihqojDIuPHtcoaoe h8Cn1osirYO1zWUqozg4ecw88yHNR+GhK9MnrblkrsqBAGGX1/6MbK4V3XqrQgHNyjzs xJlA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1762267692; x=1762872492; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=JYCcwOnS+Ui/7nymb78KDWKTCTrVcNW1FiL5++R9qXo=; b=hKYq1yib4Rqk/v8Cu7Ra3eLruzGfLF5UHB232V+GpUS3pkgG/z28g+l0Dui6QUM9GP he7UobYOArOS/LvfRghBAbhcAQbzGQIZR+YOBWLhCgpReCDD1/jbQkcMUk8Q2LkNYDZb 5ZB1U3Vt4J95ZD8J2EHCeKKKxNBI/30jlDZHAeFU2BLy0R+cuPnn/HI03Fjk2+muvXJ6 78AlMyuoiyz8SNgTzRVKWT7E3+gPwZpqieakvtuOrG1bY5o7sXtA9TD+aIGyywBWATZA 3g/Vgy8TF+nXQnu8RDNplawqiXW1vV/zkTSPR9UpTD4W7CNEgsovM9Ccq17Ac6wuL7Tz m2Ug== X-Gm-Message-State: AOJu0YzW5OQ3bLe9st6/toaXPHQtWzg/Wn7hHf+HhfNpl+RXevxwhr0M FP9F0wEYhOMu6d2PO+j6La5R/Ll/43AX5pEHbGIcG3sB60uHCGazmFjgQdKWt63plQHThklCrkL 9YCpl2eM= X-Gm-Gg: ASbGncuDJFqCnqtgMSfy3VCJqKiA52UGxYw/nEmzTn9hr7wQICoR7IVujGLAYevNMwa rF/g2h86Zz+DhnkRZN4HvSfzgqMCry8Y/D8BkJIzhrigud7ChIoxvLU5B3aBHGH4nJ+d0XZtunh JzgpnhQK0MNjnKUg4vOPLoTqyaFdS5UeGNQwXEWNlIydayfwAgZqy9rv+9Wak3+g4e3jThT015i sa86fOzcrmYhjrn8T0uT55vYwilt4gfriuhegujXmBVXGNd8bW8GKC73Jj/QdJZgKQgAkHbJmby ZMBDLgiCXGTzTF7U2HuYAUxZ8l8o1y0Ta59I5ep9oQe2r4nReVZL64yQYgXmpXtWbVdVQqsTyRz 4xJIUpfyaD9E2bqk7Arih1Zx4cxd9UfD6u73ggXKLhNSTgWe/UVmfiGb/LxTUiK02T4ILE20/I0 t71w== X-Google-Smtp-Source: AGHT+IG+CVgy3L6RuLly0Pb82XfaupChlUU2/MbS9ZxJNZOaEFYcRlzdCGoZstdc1Iif7hFR9ZjPHQ== X-Received: by 2002:a17:90b:350a:b0:340:bc27:97bd with SMTP id 98e67ed59e1d1-340bc2799c2mr15145673a91.9.1762267692103; Tue, 04 Nov 2025 06:48:12 -0800 (PST) Received: from hexa.. ([2602:feb4:3b:2100:1f4f:a6d3:d9bf:780d]) by smtp.gmail.com with ESMTPSA id 98e67ed59e1d1-3417d40da83sm1341481a91.14.2025.11.04.06.48.11 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 04 Nov 2025 06:48:11 -0800 (PST) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][scarthgap 5/7] Remove empty file Date: Tue, 4 Nov 2025 06:47:56 -0800 Message-ID: <0539a7869c4a3e28b3e7d0ab93fe07bfb9462d13.1762267481.git.steve@sakoman.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Tue, 04 Nov 2025 14:48:13 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/225731 From: Michael Haener An error occurred in backport commit 649147913e89cd8f7390cb17cd0be94c9710ffa6. The test file is empty and has no functionality at all. Signed-off-by: Michael Haener Signed-off-by: Steve Sakoman --- test | 0 1 file changed, 0 insertions(+), 0 deletions(-) delete mode 100644 test diff --git a/test b/test deleted file mode 100644 index e69de29bb2..0000000000 From patchwork Tue Nov 4 14:47:57 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 73599 X-Patchwork-Delegate: steve@sakoman.com Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 889B8CCF9E3 for ; Tue, 4 Nov 2025 14:48:23 +0000 (UTC) Received: from mail-pl1-f178.google.com (mail-pl1-f178.google.com [209.85.214.178]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.19553.1762267694683313299 for ; Tue, 04 Nov 2025 06:48:14 -0800 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20230601.gappssmtp.com header.s=20230601 header.b=urLuAWqB; spf=softfail (domain: sakoman.com, ip: 209.85.214.178, mailfrom: steve@sakoman.com) Received: by mail-pl1-f178.google.com with SMTP id d9443c01a7336-29524c38f4fso52275495ad.2 for ; Tue, 04 Nov 2025 06:48:14 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20230601.gappssmtp.com; s=20230601; t=1762267694; x=1762872494; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=6Y0tKkUY9/c/dWdPieobUZBxT/th563oyLXSK7zKJw8=; b=urLuAWqBzfWkq8ay13ABrSw4RxGx0y+z0gKJGhAXWXZtunAj0qa7TnsOV7TxFZlybO HDBUhjKV3+6sGfK2v+FyBWmQWT/1Kl9RL8zpaTkegytg1EtzSvbtZT2M+QapUXjw0iuo V+EOGlrSv3cRIIHb8PgrYS4WcU088THXr1XXxKbgHXAz93Ab6BhRNK5az1U7r2SZ0uti vTvxg4bGnFniTMp0gyauPgZGikZveIdrbETXnMqoB4ggSKrTo0cNU3oTvr64UttT/GO5 aagwXMN4OKNB/PO00oA4GO7lOe3q/08BFH1HfmKOq4NpekA5iVNgi+jpCHwXhekXZiXX eXVQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1762267694; x=1762872494; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=6Y0tKkUY9/c/dWdPieobUZBxT/th563oyLXSK7zKJw8=; b=BmYdRRFTZzO+RHLMov/pB+whZF/QYPqgRvIhKXkaXoVpE+6568HMXqPA97Mpl1BXXk FiWQRQVtPTAdCNQpVZeyrakJOji0weUyWq47T+/fKBl0DmZGk4OWZfIYslihDYaY8bpJ 1dfGz6AGwfP/Z5yLwjl9iOExK0EwZV732QqUmpCcAkI9StWqErKuhjEgSJjJ8euwDvDt w6Ubg8La5VeMEocr/xOet5PmI7t3grvR9vwRsj9duyq4GelrXkKkllcOkfY6ZiwbiiSM 2Bi77DT/oIZYFDVl8RLpi1Ib1Ye+vG+uIvpbIF75h9XSFnmjeXbhZvIDodUevTFbUi6h NB7Q== X-Gm-Message-State: AOJu0YwKOwSzCqVam4h3CsXiz/+21nOye98NeSY0hFQ0KIxH7dpkA2Hu y6kTmeTT46DxIovZIluqaHIxQ5U9Z9uK6Fcb+L5iAfqUfP/1fGzdELqGD7RYC51YHtIqtOLUS+q iFLpvxTA= X-Gm-Gg: ASbGncvm3iysjFOXgT24ANBBWV/iCLJ1H9uJJj99OTRSR/Fq+78eTnU2XoXLKAthVB4 py+K1sEctTw+REJrxmjZh3oB7uTneZko1TKhFOqEHphIJxTML0VNK41waDlT5w9ea3/B8nnBJvv 2jQp6PimDaUS2256xUSv/HVgky59iJPC5a5ptfnocr42l0Sd4zHlk+Hnwy1i9QdEtANtQbF3Fib XNiNlMUMONGA/0SD0kIfGjYwM8JOaAmqQpcYsJTJqwdKuqLh7K4XOODQfUmMQFzUHu5bQeUutWz yC3u6JhTT7hQSoy+i2VJhANUD4rxLMa7leIrRZcToNOaybzl2fMrS1f2N3GnYGNjjj5q2kooSLc k0rwzFpvXSWv80GQ/c5zjQDNuupx9RpIQT0vsajPfGPDzwanb+kAP6c8ek3r3fLKc7wk= X-Google-Smtp-Source: AGHT+IErEmQIPDAQAV2UTvepvuhsuPAPThDwwZsFcdDPiQkdhaKE58GPQQBxaRqkdmqUrA3kVk2fkw== X-Received: by 2002:a17:902:f54d:b0:295:82d0:9ba2 with SMTP id d9443c01a7336-29582d0a0ebmr130533335ad.1.1762267693804; Tue, 04 Nov 2025 06:48:13 -0800 (PST) Received: from hexa.. ([2602:feb4:3b:2100:1f4f:a6d3:d9bf:780d]) by smtp.gmail.com with ESMTPSA id 98e67ed59e1d1-3417d40da83sm1341481a91.14.2025.11.04.06.48.13 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 04 Nov 2025 06:48:13 -0800 (PST) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][scarthgap 6/7] util-linux: fix pointer usage in hwclock param handling Date: Tue, 4 Nov 2025 06:47:57 -0800 Message-ID: <3d8f88906f5560286462eaf55226b872e2805df7.1762267481.git.steve@sakoman.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Tue, 04 Nov 2025 14:48:23 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/225732 From: Bastian Krause Passing params as numbers to hwclock is broken in util-linux 2.39.3 due to wrong pointer handling. So backport the fix from upstream included since util-linux 2.41. Signed-off-by: Bastian Krause Signed-off-by: Steve Sakoman --- meta/recipes-core/util-linux/util-linux.inc | 1 + ...-utils-hwclock-rtc-fix-pointer-usage.patch | 27 +++++++++++++++++++ 2 files changed, 28 insertions(+) create mode 100644 meta/recipes-core/util-linux/util-linux/sys-utils-hwclock-rtc-fix-pointer-usage.patch diff --git a/meta/recipes-core/util-linux/util-linux.inc b/meta/recipes-core/util-linux/util-linux.inc index 1ecf5c7b39..ccab4b17f4 100644 --- a/meta/recipes-core/util-linux/util-linux.inc +++ b/meta/recipes-core/util-linux/util-linux.inc @@ -43,6 +43,7 @@ SRC_URI = "${KERNELORG_MIRROR}/linux/utils/util-linux/v${MAJOR_VERSION}/util-lin file://CVE-2024-28085-0001.patch \ file://CVE-2024-28085-0002.patch \ file://fstab-isolation.patch \ + file://sys-utils-hwclock-rtc-fix-pointer-usage.patch \ " SRC_URI[sha256sum] = "7b6605e48d1a49f43cc4b4cfc59f313d0dd5402fa40b96810bd572e167dfed0f" diff --git a/meta/recipes-core/util-linux/util-linux/sys-utils-hwclock-rtc-fix-pointer-usage.patch b/meta/recipes-core/util-linux/util-linux/sys-utils-hwclock-rtc-fix-pointer-usage.patch new file mode 100644 index 0000000000..d98509d6ac --- /dev/null +++ b/meta/recipes-core/util-linux/util-linux/sys-utils-hwclock-rtc-fix-pointer-usage.patch @@ -0,0 +1,27 @@ +From 7064cd275607a43223b2dbaef75c610f33f432ff Mon Sep 17 00:00:00 2001 +From: Karthikeyan Krishnasamy +Date: Sat, 23 Mar 2024 13:39:55 +0530 +Subject: [PATCH] sys-utils: hwclock-rtc: fix pointer usage + +passing double pointer doesn't fill param value + +Signed-off-by: Karthikeyan Krishnasamy +Upstream-Status: Backport [https://github.com/util-linux/util-linux/commit/1064a53e4ff357dc649a8c4a0a41dfb5a1191bba] +Signed-off-by: Bastian Krause +--- + sys-utils/hwclock-rtc.c | 2 +- + 1 file changed, 1 insertion(+), 1 deletion(-) + +diff --git a/sys-utils/hwclock-rtc.c b/sys-utils/hwclock-rtc.c +index 7094cd0..c797397 100644 +--- a/sys-utils/hwclock-rtc.c ++++ b/sys-utils/hwclock-rtc.c +@@ -424,7 +424,7 @@ static int resolve_rtc_param_alias(const char *alias, __u64 *value) + /* kernel uapi __u64 can be defined differently than uint64_t */ + static int strtoku64(const char *str, __u64 *num, int base) + { +- return ul_strtou64(str, (uint64_t *) &num, base); ++ return ul_strtou64(str, (uint64_t *) num, base); + } + + /* From patchwork Tue Nov 4 14:47:58 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 73600 X-Patchwork-Delegate: steve@sakoman.com Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 88A0CCCFA0D for ; Tue, 4 Nov 2025 14:48:23 +0000 (UTC) Received: from mail-pj1-f41.google.com (mail-pj1-f41.google.com [209.85.216.41]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.19558.1762267696096374425 for ; Tue, 04 Nov 2025 06:48:16 -0800 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20230601.gappssmtp.com header.s=20230601 header.b=ejOTtAAn; spf=softfail (domain: sakoman.com, ip: 209.85.216.41, mailfrom: steve@sakoman.com) Received: by mail-pj1-f41.google.com with SMTP id 98e67ed59e1d1-34088fbd65aso4742896a91.0 for ; Tue, 04 Nov 2025 06:48:16 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20230601.gappssmtp.com; s=20230601; t=1762267695; x=1762872495; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=+uoeBhy8kA46v9UqL7OUKdiGKZOKI3NboUAmiBX/OLI=; b=ejOTtAAnBlsBO0YuKI30JhPN0fcWd3i/m49oCfcciZDgYhbtYmdSebckn7IDP4rW1M 6zqSZbMuP2MtHm6vACjUfSewu7PoKyUmdQ6Qu/8FEyK+p1fw6WIXHUd/4t7sQEL7R46F fZoi2K7NjvkMLhLqRyYuorzqLphUPZNcLkz2VEtL5mjgl9UsEJH4Nyr5K2oSz4HUgprG D7HCBKcV6H+qezIaHd4R2i8/h5GwezKpSq8Uu/6gX8cGXy70lcSnzlnlBS0P8lVrGNeT Br2UCpyGP8hR5jeh3OHl4gGjvMdCBhlQrbUqAoKK/NCfeq1oFnjy10wwrnDiIZhmHBXs HPig== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1762267695; x=1762872495; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=+uoeBhy8kA46v9UqL7OUKdiGKZOKI3NboUAmiBX/OLI=; b=sKPbQx1LbveqDFIOY748o+KpbM3E3JGHgbxxdIITunnEmQUoWSN5RALqMZcG505SL8 eHb5rBbvbnGdUObFbTia9ie0a6Jwo/s9Ekg2ckVfaZpBfFNO6kBWJmPGfJDog4OvDwTm 253QEA77/Pw6NDIwKfGVdgJDY7PR6tmUgh74oz3mmzczoY4DnyA7s/XBW4CulEpABcQ9 myJD69zi0TkDT+Vngw6reGNqCRM08329j/PSxAFZH3S9BM8mMXrE8Z0LQznkU60FyR/e a0lN9rszGhItxUC6Utu/q3Uu3gL1vHbg1OCpaSNoEBPyqjpFwkgrvqg1aXI8faXBaca5 M1Cg== X-Gm-Message-State: AOJu0Yxfu/7ZpzOJfIMXOj2zxHffUMLSU5VRvLScymew9RXIMi+5u7zf zlsXhPUzghqYTqV+QhqzKMPsGplEvD2lcWNsH0jguRtO1e0XirRTNajqD6iQKVTbsWYx4RbSRQk /CjD3yN0= X-Gm-Gg: ASbGncstm6Ex/6ZUoUC5VAYs1U49+MkQ1jtS6Wrxoa+PNp9sgIuQIy46998dXqIBneB +bBleVYYjwUfu5fswDe9Txs1nByHKb8qslGsqNNsohK8shOyrNw6UQ1uvZJoHTUqE0h1KfS0Ehj X0z+w1Jf7gRP7US3wUl+v7s2mhlP2Qv60O8omGnBwkjVY7RW73I/LeErEnm84eKD+Po+UE8+v/8 bmXLEcnfxRSKe2mwUxJgFrVCyj698i4AgZeTfkgLZGoEIQwLKsjFCYA8rHsjRkmMeRMUdL2h9kA 26qF3hvMb5mVt018B1OPkodPelzU8TMf2g2oSAJ2q7dkzqtdvFpn4cUgkfMGz4dwb0Z6l2jOS1A VdKqfIkLDFbOAPCksGMyyF39zw9SMPQrZ7VNdcy8Dqp49PHjXpTt/1SVk5aOGc+al+OE= X-Google-Smtp-Source: AGHT+IEkBKXBV0LcGWuYB+LRDJiAAaaDJIDgC8TBiQs50TJ1Jh5ISVusB3q5tl1gvuMSF5R7rmDURA== X-Received: by 2002:a17:90b:53c3:b0:339:d1f0:c740 with SMTP id 98e67ed59e1d1-34082fc64fdmr21347103a91.1.1762267695362; Tue, 04 Nov 2025 06:48:15 -0800 (PST) Received: from hexa.. ([2602:feb4:3b:2100:1f4f:a6d3:d9bf:780d]) by smtp.gmail.com with ESMTPSA id 98e67ed59e1d1-3417d40da83sm1341481a91.14.2025.11.04.06.48.14 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 04 Nov 2025 06:48:15 -0800 (PST) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][scarthgap 7/7] perf: add arm64 source files for unistd_64.h Date: Tue, 4 Nov 2025 06:47:58 -0800 Message-ID: <06d4981313ce67a8d53b1c14be9845b4b5a9f4cf.1762267481.git.steve@sakoman.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Tue, 04 Nov 2025 14:48:23 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/225733 From: Yannic Moog kernel commit bfb713ea53c7 ("perf tools: Fix arm64 build by generating unistd_64.h") introduces a new dependency on source files for arm64, specifically include/uapi/asm-generic. Build fails with: [..]/perf/1.0/perf-1.0/scripts/Makefile.asm-headers:33: [...]/perf/1.0/perf-1.0/include/uapi/asm-generic/Kbuild: No such file or directory make[4]: *** No rule to make target '[...]/perf/1.0/perf-1.0/include/uapi/asm-generic/Kbuild'. Stop. Add the directory to PERF_SRC. Fix whitespace error while at it. Signed-off-by: Yannic Moog Signed-off-by: Richard Purdie Signed-off-by: Steve Sakoman --- meta/recipes-kernel/perf/perf.bb | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/meta/recipes-kernel/perf/perf.bb b/meta/recipes-kernel/perf/perf.bb index 11fa917649..2d432f3f40 100644 --- a/meta/recipes-kernel/perf/perf.bb +++ b/meta/recipes-kernel/perf/perf.bb @@ -145,6 +145,7 @@ PERF_SRC ?= "Makefile \ arch/arm64/tools \ ${PERF_BPF_EVENT_SRC} \ arch/${ARCH}/Makefile \ + include/uapi/asm-generic/Kbuild \ " PERF_EXTRA_LDFLAGS = "" @@ -202,7 +203,7 @@ python copy_perf_source_from_kernel() { do_configure:prepend () { # If building a multlib based perf, the incorrect library path will be # detected by perf, since it triggers via: ifeq ($(ARCH),x86_64). In a 32 bit - # build, with a 64 bit multilib, the arch won't match and the detection of a + # build, with a 64 bit multilib, the arch won't match and the detection of a # 64 bit build (and library) are not exected. To ensure that libraries are # installed to the correct location, we can use the weak assignment in the # config/Makefile.