* [PATCH 0/8] kernel: consolidated pull request
@ 2018-08-30 13:45 Bruce Ashfield
0 siblings, 0 replies; 15+ messages in thread
From: Bruce Ashfield @ 2018-08-30 13:45 UTC (permalink / raw)
To: richard.purdie; +Cc: openembedded-core
Hi all,
Now that 4.18 is in master, this is the next round of config updates,
-stable merges and the removal of the older versioned recipes.
There's also a devsrc fix for the arm targets. With this tweak, we can
once again build the test modules on target.
My last series fixed the kernel configuration audit output, and so we
now have some configuration updates to cleanup warnings and drop
obselete options.
Finally, we remove 4.12 and 4.15 from master, leaving 4.14 and 4.18 as
active kernels. I'll follow up with patches to other repos as required
if any references to those versions remain.
Bruce
The following changes since commit 4434777705cf49300a7d2c9ca8fa3080d551d795:
bitbake: tests/fetch: Update gnome.org urls after upstream changes (2018-08-29 10:43:23 +0100)
are available in the git repository at:
git://git.pokylinux.org/poky-contrib zedd/kernel
http://git.pokylinux.org/cgit.cgi/poky-contrib/log/?h=zedd/kernel
Bruce Ashfield (8):
kernel-devsrc: fix arm/arm64 target module build
linux-yocto: drop 4.15 versioned recipe
linux-yocto/4.12: drop versioned recipes
linux-yocto/4.18: remove obselete bsp configuration options
qemuarm64: add compatibility with -rt
linux-yocto/4.18: update to 4.18.5
linux-yocto/4.14: update to v4.14.67
kernel-yocto/cfg: configuration warning fixes
meta/recipes-kernel/linux/kernel-devsrc.bb | 4 ++
meta/recipes-kernel/linux/linux-yocto-rt_4.12.bb | 38 -----------------
meta/recipes-kernel/linux/linux-yocto-rt_4.14.bb | 6 +--
meta/recipes-kernel/linux/linux-yocto-rt_4.15.bb | 41 -------------------
meta/recipes-kernel/linux/linux-yocto-rt_4.18.bb | 8 ++--
meta/recipes-kernel/linux/linux-yocto-tiny_4.12.bb | 25 ------------
meta/recipes-kernel/linux/linux-yocto-tiny_4.14.bb | 6 +--
meta/recipes-kernel/linux/linux-yocto-tiny_4.15.bb | 26 ------------
meta/recipes-kernel/linux/linux-yocto-tiny_4.18.bb | 6 +--
meta/recipes-kernel/linux/linux-yocto_4.12.bb | 46 ---------------------
meta/recipes-kernel/linux/linux-yocto_4.14.bb | 20 ++++-----
meta/recipes-kernel/linux/linux-yocto_4.15.bb | 47 ----------------------
meta/recipes-kernel/linux/linux-yocto_4.18.bb | 20 ++++-----
13 files changed, 37 insertions(+), 256 deletions(-)
delete mode 100644 meta/recipes-kernel/linux/linux-yocto-rt_4.12.bb
delete mode 100644 meta/recipes-kernel/linux/linux-yocto-rt_4.15.bb
delete mode 100644 meta/recipes-kernel/linux/linux-yocto-tiny_4.12.bb
delete mode 100644 meta/recipes-kernel/linux/linux-yocto-tiny_4.15.bb
delete mode 100644 meta/recipes-kernel/linux/linux-yocto_4.12.bb
delete mode 100644 meta/recipes-kernel/linux/linux-yocto_4.15.bb
--
2.5.0
^ permalink raw reply [flat|nested] 15+ messages in thread
* [PATCH 0/8] kernel: consolidated pull request
@ 2021-03-19 18:58 Bruce Ashfield
2021-03-20 18:46 ` Richard Purdie
0 siblings, 1 reply; 15+ messages in thread
From: Bruce Ashfield @ 2021-03-19 18:58 UTC (permalink / raw)
To: richard.purdie; +Cc: openembedded-core
From: Bruce Ashfield <bruce.ashfield@gmail.com>
Richard,
Here's my latest batch of bugfix and prep for release changes.
We have one configuration fix, as well as a fix to the tools that was
hiding some warnings that we used to get.
** There's a chance that this kern-tools change will pop out some
warnings. I can fix the warnings easily, but if it does, I'd suggest
just dropping it from the queue, since nothing depends on it.
**
We also have normal -stable bumps, that didn't cause any issues for me.
And finally, I'm preparing to bump the -dev kernel to v5.12 for the
release, and found a couple of issues with lttng (as usual) and kernel-devsrc.
I split the lttng one into two patches, so you could decide on the
backported patches separately from the devupstream bump.
The devsrc fix is safe for older kernels, and is a good thing to have
in the release to provide some future proofing.
Cheers,
Bruce
The following changes since commit 3cda6c0bd175282903079dea4affb3fcd290f137:
sudo: upgrade 1.9.5p2 -> 1.9.6 (2021-03-16 17:52:21 +0000)
are available in the Git repository at:
git://git.yoctoproject.org/poky-contrib zedd/kernel
http://git.yoctoproject.org/cgit.cgi/poky-contrib/log/?h=zedd/kernel
Bruce Ashfield (8):
linux-yocto/5.10: fix SERIAL_OF_PLATFORM warning
linux-yocto/5.4: update to v5.4.105
linux-yocto/5.10: update to v5.10.23
linux-yocto/5.10: cfg: features/numa: Remove NODES_SPAN_OTHER_NODES
option
kern-tools: add dropped options to audit output
lttng-modules: update devupstream to 2.12.5+
lttng-modules: backport patches to fix build against 5.12+ kernel
kernel-devsrc: fix on-target scripts/prepare for v5.12+
.../kern-tools/kern-tools-native_git.bb | 2 +-
meta/recipes-kernel/linux/kernel-devsrc.bb | 1 +
.../linux/linux-yocto-rt_5.10.bb | 6 +-
.../linux/linux-yocto-rt_5.4.bb | 6 +-
.../linux/linux-yocto-tiny_5.10.bb | 8 +-
.../linux/linux-yocto-tiny_5.4.bb | 8 +-
meta/recipes-kernel/linux/linux-yocto_5.10.bb | 22 +--
meta/recipes-kernel/linux/linux-yocto_5.4.bb | 22 +--
...01-Fix-memory-leaks-on-event-destroy.patch | 58 +++++++
...preter-early-exits-on-uninitialized-.patch | 159 ++++++++++++++++++
...ecord-slab-name-for-kmem_cache_free-.patch | 91 ++++++++++
...be-null-ptr-deref-on-session-destroy.patch | 41 +++++
.../lttng/lttng-modules_2.12.5.bb | 9 +-
13 files changed, 394 insertions(+), 39 deletions(-)
create mode 100644 meta/recipes-kernel/lttng/lttng-modules/0001-Fix-memory-leaks-on-event-destroy.patch
create mode 100644 meta/recipes-kernel/lttng/lttng-modules/0002-Fix-filter-interpreter-early-exits-on-uninitialized-.patch
create mode 100644 meta/recipes-kernel/lttng/lttng-modules/0003-fix-mm-tracing-record-slab-name-for-kmem_cache_free-.patch
create mode 100644 meta/recipes-kernel/lttng/lttng-modules/0004-Fix-kretprobe-null-ptr-deref-on-session-destroy.patch
--
2.19.1
^ permalink raw reply [flat|nested] 15+ messages in thread
* Re: [PATCH 0/8] kernel: consolidated pull request
2021-03-19 18:58 Bruce Ashfield
@ 2021-03-20 18:46 ` Richard Purdie
2021-03-21 2:17 ` Bruce Ashfield
0 siblings, 1 reply; 15+ messages in thread
From: Richard Purdie @ 2021-03-20 18:46 UTC (permalink / raw)
To: bruce.ashfield; +Cc: openembedded-core
Hi Bruce,
On Fri, 2021-03-19 at 14:58 -0400, bruce.ashfield@gmail.com wrote:
> Here's my latest batch of bugfix and prep for release changes.
>
> We have one configuration fix, as well as a fix to the tools that was
> hiding some warnings that we used to get.
>
> ** There's a chance that this kern-tools change will pop out some
> warnings. I can fix the warnings easily, but if it does, I'd suggest
> just dropping it from the queue, since nothing depends on it.
> **
There is a warning so I'll defer that piece for now:
https://autobuilder.yoctoproject.org/typhoon/#/builders/37/builds/3227
(maybe needs a yocto-bsp bump?)
Do we know the cause of the beaglebone regression btw? We don't
really know what to do with M3 due to that...
Cheers,
Richard
^ permalink raw reply [flat|nested] 15+ messages in thread
* Re: [PATCH 0/8] kernel: consolidated pull request
2021-03-20 18:46 ` Richard Purdie
@ 2021-03-21 2:17 ` Bruce Ashfield
0 siblings, 0 replies; 15+ messages in thread
From: Bruce Ashfield @ 2021-03-21 2:17 UTC (permalink / raw)
To: Richard Purdie; +Cc: Patches and discussions about the oe-core layer
On Sat, Mar 20, 2021 at 2:46 PM Richard Purdie
<richard.purdie@linuxfoundation.org> wrote:
>
> Hi Bruce,
>
> On Fri, 2021-03-19 at 14:58 -0400, bruce.ashfield@gmail.com wrote:
> > Here's my latest batch of bugfix and prep for release changes.
> >
> > We have one configuration fix, as well as a fix to the tools that was
> > hiding some warnings that we used to get.
> >
> > ** There's a chance that this kern-tools change will pop out some
> > warnings. I can fix the warnings easily, but if it does, I'd suggest
> > just dropping it from the queue, since nothing depends on it.
> > **
>
> There is a warning so I'll defer that piece for now:
>
> https://autobuilder.yoctoproject.org/typhoon/#/builders/37/builds/3227
>
> (maybe needs a yocto-bsp bump?)
This is unique to that BSP, so a bump wouldn't get it.
I'll pull together a fix for it, and send a bump to the BSPs to pick
it up (and resend the tools tweak at the same time).
>
> Do we know the cause of the beaglebone regression btw? We don't
> really know what to do with M3 due to that...
Unless Kevin @ WindRiver has ideas, I don't actually have a platform
available for any testing, so we need to hear from him.
Bruce
>
> Cheers,
>
> Richard
>
--
- Thou shalt not follow the NULL pointer, for chaos and madness await
thee at its end
- "Use the force Harry" - Gandalf, Star Trek II
^ permalink raw reply [flat|nested] 15+ messages in thread
* [PATCH 0/8] kernel: consolidated pull request
@ 2022-04-12 21:45 bruce.ashfield
0 siblings, 0 replies; 15+ messages in thread
From: bruce.ashfield @ 2022-04-12 21:45 UTC (permalink / raw)
To: richard.purdie; +Cc: openembedded-core
From: Bruce Ashfield <bruce.ashfield@gmail.com>
Richard,
Here's the collection of -stable, fixes and tweaks that I was talking
about during the engineering sync on Tuesday.
Feel free to take what you want, or just wait on them all until the
release is over.
It is worth taking the 5.18 -dev and lttng fixes IMHO, since they do
make the release a bit more future proof. Likewise with Jon's -tiny
changes.
Cheers,
Bruce
The following changes since commit 632c83ab787211ef927a999f4ecde1d3ce40621d:
license_image.bbclass: close package.manifest file (2022-04-10 08:31:17 +0100)
are available in the Git repository at:
git://git.yoctoproject.org/poky-contrib zedd/kernel
http://git.yoctoproject.org/cgit.cgi/poky-contrib/log/?h=zedd/kernel
Bruce Ashfield (8):
linux-yocto/5.15: arm: poky-tiny cleanup and fixes
linux-yocto/5.15: update to v5.15.33
linux-yocto/5.10: update to v5.10.110
linux-yocto/5.10: base: enable kernel crypto userspace API
linux-yocto/5.15: base: enable kernel crypto userspace API
linux-yocto/5.15: kasan: fix BUG: sleeping function called from
invalid context
lttng-modules: support kernel 5.18+
linux-yocto-dev: update to v5.18+
meta/recipes-kernel/linux/linux-yocto-dev.bb | 4 +-
.../linux/linux-yocto-rt_5.10.bb | 6 +-
.../linux/linux-yocto-rt_5.15.bb | 6 +-
.../linux/linux-yocto-tiny_5.10.bb | 8 +-
.../linux/linux-yocto-tiny_5.15.bb | 8 +-
meta/recipes-kernel/linux/linux-yocto_5.10.bb | 24 +--
meta/recipes-kernel/linux/linux-yocto_5.15.bb | 26 +--
...x-compaction-migratepages-event-name.patch | 37 ++++
...vent-allow-same-provider-and-event-n.patch | 48 +++++
...g-Don-t-re-read-p-state-when-emittin.patch | 183 ++++++++++++++++++
.../0004-fix-block-remove-genhd.h-v5.18.patch | 45 +++++
...emove-REQ_OP_WRITE_SAME-support-v5.1.patch | 79 ++++++++
...ndom-remove-unused-tracepoints-v5.18.patch | 47 +++++
...rethook-for-kretprobe-if-possible-v5.patch | 72 +++++++
...ore-Remove-scsi-scsi_request.h-v5.18.patch | 44 +++++
.../0009-Rename-genhd-wrapper-to-blkdev.patch | 76 ++++++++
...n-cleanup-the-compaction-trace-event.patch | 106 ++++++++++
.../lttng/lttng-modules_2.13.3.bb | 14 +-
18 files changed, 791 insertions(+), 42 deletions(-)
create mode 100644 meta/recipes-kernel/lttng/lttng-modules/0001-Fix-compaction-migratepages-event-name.patch
create mode 100644 meta/recipes-kernel/lttng/lttng-modules/0002-Fix-tracepoint-event-allow-same-provider-and-event-n.patch
create mode 100644 meta/recipes-kernel/lttng/lttng-modules/0003-fix-sched-tracing-Don-t-re-read-p-state-when-emittin.patch
create mode 100644 meta/recipes-kernel/lttng/lttng-modules/0004-fix-block-remove-genhd.h-v5.18.patch
create mode 100644 meta/recipes-kernel/lttng/lttng-modules/0005-fix-scsi-block-Remove-REQ_OP_WRITE_SAME-support-v5.1.patch
create mode 100644 meta/recipes-kernel/lttng/lttng-modules/0006-fix-random-remove-unused-tracepoints-v5.18.patch
create mode 100644 meta/recipes-kernel/lttng/lttng-modules/0007-fix-kprobes-Use-rethook-for-kretprobe-if-possible-v5.patch
create mode 100644 meta/recipes-kernel/lttng/lttng-modules/0008-fix-scsi-core-Remove-scsi-scsi_request.h-v5.18.patch
create mode 100644 meta/recipes-kernel/lttng/lttng-modules/0009-Rename-genhd-wrapper-to-blkdev.patch
create mode 100644 meta/recipes-kernel/lttng/lttng-modules/0010-fix-mm-compaction-cleanup-the-compaction-trace-event.patch
--
2.19.1
^ permalink raw reply [flat|nested] 15+ messages in thread
* [PATCH 0/8] kernel: consolidated pull request
@ 2025-08-13 20:49 bruce.ashfield
2025-08-13 20:49 ` [PATCH 1/8] linux-yocto/6.12: update to v6.12.39 bruce.ashfield
` (7 more replies)
0 siblings, 8 replies; 15+ messages in thread
From: bruce.ashfield @ 2025-08-13 20:49 UTC (permalink / raw)
To: richard.purdie; +Cc: openembedded-core
From: Bruce Ashfield <bruce.ashfield@gmail.com>
Richard,
Here's the next set of updates as I move towards making 6.16 the
default / reference kernel.
linux-yocto-dev is fully done, but now that lttng-modules is building
I can complete sanity testing.
I don't want to sit on those while I finish that testing, let's get
the libc-headers soaking and in the next day or two, I'll get 6.16
out for AB testing.
Bruce
The following changes since commit 3b2f9c31dc17c3ba5f6a9971413afed3d450d826:
poky.yaml.in: increase required disk space to 140G (2025-08-08 23:41:11 +0100)
are available in the Git repository at:
https://git.yoctoproject.org/poky-contrib zedd/kernel
https://git.yoctoproject.org/poky-contrib/log/?h=zedd/kernel
Bruce Ashfield (8):
linux-yocto/6.12: update to v6.12.39
linux-yocto/6.12: update CVE exclusions (6.12.39)
linux-yocto/6.12: update to v6.12.40
linux-yocto/6.12: update CVE exclusions (6.12.40)
linux-libc-headers: update to v6.16
lttng-modules: update to v2.14.0
linux-yocto/6.12: update to v6.12.41
linux-yocto/6.12: update CVE exclusions (6.12.41)
...ers_6.15.bb => linux-libc-headers_6.16.bb} | 2 +-
.../linux/cve-exclusion_6.12.inc | 362 +++++++++++++--
.../linux/linux-yocto-rt_6.12.bb | 6 +-
.../linux/linux-yocto-tiny_6.12.bb | 6 +-
meta/recipes-kernel/linux/linux-yocto_6.12.bb | 28 +-
...x-sigaction-build-without-CONFIG_COM.patch | 35 --
...e-missing-CONFIG_TRACEPOINTS-to-warn.patch | 18 +-
...mentation-Add-missing-provider-name-.patch | 45 ++
...pose-__percpu-tag-as-a-named-address.patch | 438 ++++++++++++++++++
...les_2.13.19.bb => lttng-modules_2.14.0.bb} | 8 +-
10 files changed, 845 insertions(+), 103 deletions(-)
rename meta/recipes-kernel/linux-libc-headers/{linux-libc-headers_6.15.bb => linux-libc-headers_6.16.bb} (80%)
delete mode 100644 meta/recipes-kernel/lttng/lttng-modules/0001-lttng-modules-fix-sigaction-build-without-CONFIG_COM.patch
create mode 100644 meta/recipes-kernel/lttng/lttng-modules/0001-writeback-instrumentation-Add-missing-provider-name-.patch
create mode 100644 meta/recipes-kernel/lttng/lttng-modules/0002-fix-percpu-repurpose-__percpu-tag-as-a-named-address.patch
rename meta/recipes-kernel/lttng/{lttng-modules_2.13.19.bb => lttng-modules_2.14.0.bb} (81%)
--
2.39.2
^ permalink raw reply [flat|nested] 15+ messages in thread
* [PATCH 1/8] linux-yocto/6.12: update to v6.12.39
2025-08-13 20:49 [PATCH 0/8] kernel: consolidated pull request bruce.ashfield
@ 2025-08-13 20:49 ` bruce.ashfield
2025-08-13 20:49 ` [PATCH 2/8] linux-yocto/6.12: update CVE exclusions (6.12.39) bruce.ashfield
` (6 subsequent siblings)
7 siblings, 0 replies; 15+ messages in thread
From: bruce.ashfield @ 2025-08-13 20:49 UTC (permalink / raw)
To: richard.purdie; +Cc: openembedded-core
From: Bruce Ashfield <bruce.ashfield@gmail.com>
Updating linux-yocto/6.12 to the latest korg -stable release that comprises
the following commits:
cdf264c0a590 Linux 6.12.39
f3f9deccfc68 KVM: SVM: Set synthesized TSA CPUID flags
f004f58d18a2 rseq: Fix segfault on registration when rseq_cs is non-zero
f2133b849ff2 crypto: ecdsa - Harden against integer overflows in DIV_ROUND_UP()
59923d508bd2 arm64: Filter out SME hwcaps when FEAT_SME isn't implemented
815f1161d6db ksmbd: fix potential use-after-free in oplock/lease break ack
2d89dab1ea60 kasan: remove kasan_find_vm_area() to prevent possible deadlock
e1aec954583f net: wangxun: revert the adjustment of the IRQ vector sequence
5244536e650c erofs: fix rare pcluster memory leak after unmounting
5ea53aa71c2c selftests/bpf: adapt one more case in test_lru_map to the new target_free
7b4a02631352 HID: nintendo: avoid bluetooth suspend/resume stalls
c72536350e82 HID: quirks: Add quirk for 2 Chicony Electronics HP 5MP Cameras
716a0c8dedc6 HID: Add IGNORE quirk for SMARTLINKTECHNOLOGY
70685fb6216f riscv: vdso: Exclude .rodata from the PT_DYNAMIC segment
9ef5d4748dfe bpf: Adjust free target to avoid global starvation of LRU map
c23e0792b77d vt: add missing notification when switching back to text mode
0bcc14f36c7a btrfs: fix assertion when building free space tree
589b290d0935 net: mana: Record doorbell physical address in PF mode
921fffa1d8bc HID: lenovo: Add support for ThinkPad X1 Tablet Thin Keyboard Gen2
e46cf2943f91 driver: bluetooth: hci_qca:fix unable to load the BT driver
a9c357b08672 net: usb: qmi_wwan: add SIMCom 8230C composition
e55b2126961b ALSA: hda/realtek: Add quirks for some Clevo laptops
01b0312a4a3a ALSA: hda/realtek - Enable mute LED on HP Pavilion Laptop 15-eg100
72aad5cf5790 ASoC: amd: yc: add quirk for Acer Nitro ANV15-41 internal mic
383b2399d586 io_uring: make fallocate be hashed work
67be7e6c55a9 ALSA: hda/realtek: Add mic-mute LED setup for ASUS UM5606
68397fda2caa ASoC: SOF: Intel: hda: Use devm_kstrdup() to avoid memleak.
dd072fa64715 um: vector: Reduce stack usage in vector_eth_configure()
7df2295c036b atm: idt77252: Add missing `dma_map_error()`
25cab1b83d66 ublk: sanity check add_dev input for underflow
f154e41e1d9d bnxt_en: Set DMA unmap len correctly for XDP_REDIRECT
b4e7e3f4e9d2 bnxt_en: Fix DCB ETS validation
948ab36ed249 net: ll_temac: Fix missing tx_pending check in ethtools_set_ringparam()
bbd385b65f9e net/mlx5e: Add new prio for promiscuous mode
7581afc05154 net/mlx5e: Fix race between DIM disable and net_dim()
c4270235db92 can: m_can: m_can_handle_lost_msg(): downgrade msg lost in rx message to debug level
90d0d5a439f5 drm/xe/pm: Correct comment of xe_pm_set_vram_threshold()
ec4014566377 selftests: net: lib: fix shift count out of range
182c9f38c367 selftests: net: lib: Move logging from forwarding/lib.sh here
e3647c40bea2 net: phy: microchip: limit 100M workaround to link-down events on LAN88xx
b215e916336f net: phy: microchip: Use genphy_soft_reset() to purge stale LPA bits
4c934e0cac61 ibmvnic: Fix hardcoded NUM_RX_STATS/NUM_TX_STATS with dynamic sizeof
473f3eadfc73 net: appletalk: Fix device refcount leak in atrtr_create()
e0dd2e972966 netfilter: flowtable: account for Ethernet header in nf_flow_pppoe_proto()
fd67f52eea80 erofs: fix to add missing tracepoint in erofs_readahead()
ea2350dfa378 erofs: refine readahead tracepoint
9493b5f9ad07 erofs: tidy up zdata.c
71e4f033a90d erofs: get rid of `z_erofs_next_pcluster_t`
16396885c26a erofs: free pclusters if no cached folio is attached
ff4b8c9ade1b drm/xe/pf: Clear all LMTT pages on alloc
8586552df591 nbd: fix uaf in nbd_genl_connect() error path
1bbdf4213711 wifi: mt76: mt7925: Fix null-ptr-deref in mt7925_thermal_init()
fa7e9a15460a drm/nouveau/gsp: fix potential leak of memory used during acpi init
06c566371f8a wifi: rt2x00: fix remove callback type mismatch
d21eeb050599 wifi: mac80211: fix non-transmitted BSSID profile search
d4a7056ca9ab wifi: mac80211: correctly identify S1G short beacon
2941155d9a5a raid10: cleanup memleak at raid10_make_request
776e6186dc9e md/raid1: Fix stack memory use after return in raid1_reshape
a560de522374 drm/tegra: nvdec: Fix dma_alloc_coherent error check
fcd9c923b58e wifi: zd1211rw: Fix potential NULL pointer dereference in zd_mac_tx_to_dev()
c6625c21ea66 wifi: cfg80211: fix S1G beacon head validation in nl80211
8d4d00ea6038 netfs: Fix ref leak on inserted extra subreq in write retry
42baf997722c netlink: make sure we allow at least one dump skb
f98c4cec7504 netlink: Fix rmem check in netlink_broadcast_deliver().
cecc9146d244 ASoC: Intel: sof-function-topology-lib: Print out the unsupported dmic count
19ff875dc516 erofs: address D-cache aliasing
4745bfd34ae7 erofs: fix to add missing tracepoint in erofs_read_folio()
3b16c9b8ba71 ksmbd: fix a mount write count leak in ksmbd_vfs_kern_path_locked()
92c2c005a8ba smb: server: make use of rdma_destroy_qp()
1d219778281e clk: scmi: Handle case where child clocks are initialized before their parents
971da696abf0 x86/mm: Disable hugetlb page table sharing on 32-bit
a68b85855732 x86/rdrand: Disable RDSEED on AMD Cyan Skillfish
fcee75daecc5 clk: imx: Fix an out-of-bounds access in dispmix_csr_clk_dev_data
5d2d34f36724 rust: init: allow `dead_code` warnings for Rust >= 1.89.0
febc0b5dbabd lib/alloc_tag: do not acquire non-existent lock in alloc_tag_top_users()
4c39dfd13beb mm/vmalloc: leave lazy MMU mode on PTE mapping error
92ed107cd26d scripts/gdb: fix interrupts.py after maple tree conversion
62720dc3cfd9 scripts/gdb: de-reference per-CPU MCE interrupts
cb89f9bf6c3a scripts/gdb: fix interrupts display after MCP on x86
ee6c677ef318 mm: fix the inaccurate memory statistics issue for users
839d8682732e maple_tree: fix mt_destroy_walk() on root leaf node
92db42e201f4 kallsyms: fix build without execinfo
7dccd5eb5343 Revert "PCI/ACPI: Fix allocated memory release on error in pci_acpi_scan_root()"
e4172522d594 Revert "ACPI: battery: negate current when discharging"
ee6f6138d5f2 drm/xe: Allocate PF queue size on pow2 boundary
065bd940ee0a drm/framebuffer: Acquire internal references on GEM handles
9e4af87bd08d Revert "usb: gadget: u_serial: Add null pointer check in gs_start_io"
abf3620cba68 usb: gadget: u_serial: Fix race condition in TTY wakeup
48007d6e7bdb Revert "drm/xe/xe2: Enable Indirect Ring State support for Xe2"
57b7c27ef5e7 drm/xe/bmg: fix compressed VRAM handling
2d2f07a99487 drm/gem: Fix race in drm_gem_handle_create_tail()
38df1a5053bc drm/ttm: fix error handling in ttm_buffer_object_transfer
e2d6547dc8b9 drm/sched: Increment job count before swapping tail spsc queue
08480e285c6a drm/gem: Acquire references on GEM handles for framebuffers
e90ee15ce28c drm/amdkfd: Don't call mmput from MMU notifier callback
9f852d301f64 drm/imagination: Fix kernel crash when hard resetting the GPU
a7b2f250ffcd wifi: mt76: mt7925: fix invalid array index in ssid assignment during hw scan
fad0f6fcdae0 wifi: mt76: mt7925: fix the wrong config for tx interrupt
9b50874f297f wifi: mt76: mt7925: prevent NULL pointer dereference in mt7925_sta_set_decap_offload()
9639e54025f1 wifi: mt76: mt7921: prevent decap offload config before STA initialization
a963819a121f wifi: mwifiex: discard erroneous disassoc frames on STA interface
e01851f6e9a6 wifi: prevent A-MSDU attacks in mesh networks
373caeec3651 pwm: mediatek: Ensure to disable clocks in error path
d526e11ab274 pwm: Fix invalid state detection
275605a8b480 pinctrl: qcom: msm: mark certain pins as invalid for interrupts
3e0542701b37 md/md-bitmap: fix GPF in bitmap_get_stats()
9f260e16b297 net: ethernet: rtsn: Fix a null pointer dereference in rtsn_probe()
8f65277317a8 gre: Fix IPv6 multicast route creation.
199af064babb ASoC: fsl_sai: Force a software reset when starting in consumer mode
e14bffc90866 ALSA: ad1816a: Fix potential NULL pointer deref in snd_card_ad1816a_pnp()
d9bd1163c8d8 KVM: Allow CPU to reschedule while setting per-page memory attributes
fd044c99d831 KVM: SVM: Reject SEV{-ES} intra host migration if vCPU creation is in-flight
5cb498b20bff KVM: SVM: Add missing member in SNP_LAUNCH_START command structure
55f568521e0b KVM: x86/xen: Allow 'out of range' event channel ports in IRQ routing table.
291eff10b197 x86/mce: Make sure CMCI banks are cleared during shutdown on Intel
8ed7f3de93e1 x86/mce: Ensure user polling settings are honored when restarting timer
55ea884c0dce x86/mce: Don't remove sysfs if thresholding sysfs init fails
afcf4f4e7062 x86/mce/amd: Fix threshold limit reset
e01d5e33645d x86/mce/amd: Add default names for MCA banks and blocks
9e0d33e75c16 ipmi:msghandler: Fix potential memory corruption in ipmi_create_user()
d1ff5f9d2c54 rxrpc: Fix oops due to non-existence of prealloc backlog struct
5385ad53793d rxrpc: Fix bug due to prealloc collision
8ecd651ef24a net/sched: Abort __tc_modify_qdisc if parent class does not exist
fc2fffa2faca net: ethernet: ti: am65-cpsw-nuss: Fix skb size by accounting for skb_shared_info
34a09d6240a2 atm: clip: Fix NULL pointer dereference in vcc_sendmsg()
024876b247a8 atm: clip: Fix infinite recursive call of clip_push().
9f771816f14d atm: clip: Fix memory leak of struct clip_vcc.
36caab990b69 atm: clip: Fix potential null-ptr-deref in to_atmarpd().
4d5476fa3931 net: phy: smsc: Fix link failure in forced mode with Auto-MDIX
6fb4cd247cda net: phy: smsc: Force predictable MDI-X state on LAN87xx
850812bd2a15 net: phy: smsc: Fix Auto-MDIX configuration when disabled by strap
be8792c6702b net: stmmac: Fix interrupt handling for level-triggered mode in DWC_XGMAC2
41a741c476e1 vsock: Fix IOCTL_VM_SOCKETS_GET_LOCAL_CID to check also `transport_local`
ae2c712ba39c vsock: Fix transport_* TOCTOU
3734d78210cc vsock: Fix transport_{g2h,h2g} TOCTOU
62e6160cfb55 tcp: Correct signedness in skb remaining space calculation
50aa2d121bc2 tipc: Fix use-after-free in tipc_conn_close().
8fb2802a1654 vsock: fix `vsock_proto` declaration
4b8e18af7bea netlink: Fix wraparounds of sk->sk_rmem_alloc.
b90129445f50 net: phy: qcom: qca808x: Fix WoL issue by utilizing at8031_set_wol()
31db4223db33 net: phy: qcom: move the WoL function to shared library
778f4e173020 arm64: poe: Handle spurious Overlay faults
2e0cb0c74d96 bnxt_en: eliminate the compile warning in bnxt_request_irq due to CONFIG_RFS_ACCEL
0caba66f0073 sched/deadline: Fix dl_server runtime calculation formula
35bda158da39 fix proc_sys_compare() handling of in-lookup dentries
df1d6801f16a pinctrl: amd: Clear GPIO debounce for suspend
cdbcde935e72 Bluetooth: hci_event: Fix not marking Broadcast Sink BIS as connected
32fa1f92a40e Bluetooth: hci_sync: Fix not disabling advertising instance
0cd863ab4204 ASoC: cs35l56: probe() should fail if the device ID is not recognized
a0a8009083e5 perf: Revert to requiring CAP_SYS_ADMIN for uprobes
f7fe33f629bb sched/core: Fix migrate_swap() vs. hotplug
1207f57be07f irqchip/irq-msi-lib: Select CONFIG_GENERIC_MSI_IRQ
bc179aa79a20 perf/core: Fix the WARN_ON_ONCE is out of lock protected region
8f4c7131721a ASoC: Intel: soc-acpi: arl: Correct order of cs42l43 matches
cca47e6e1f78 ASoC: Intel: soc-acpi-intel-arl-match: set get_function_tplg_files ops
fc3a8a5e8f8e ASoC: Intel: add sof_sdw_get_tplg_files ops
36536435849b ASoC: soc-acpi: add get_function_tplg_files ops
06e0b070eb97 ASoC: Intel: soc-acpi: arl: Add match entries for new cs42l43 laptops
97d14c04610c ASoC: Intel: soc-acpi: arl: Correct naming of a cs35l56 address struct
724b93a6a694 ASoC: Intel: SND_SOC_INTEL_SOF_BOARD_HELPERS select SND_SOC_ACPI_INTEL_MATCH
d4f6a267cc07 ASoC: fsl_asrc: use internal measured ratio for non-ideal ratio mode
07ed75bfa7ed drm/amdgpu: Replace Mutex with Spinlock for RLCG register access to avoid Priority Inversion in SRIOV
56ea7746045a crypto: s390/sha - Fix uninitialized variable in SHA-1 and SHA-2
04513cf1581b drm/amdgpu/ip_discovery: add missing ip_discovery fw
39d6a607d531 drm/amdgpu/discovery: use specific ip_discovery.bin for legacy asics
e9d9b25f3767 drm/exynos: exynos7_drm_decon: add vblank check in IRQ handling
6dee745bd0ae eventpoll: don't decrement ep refcount while still holding the ep mutex
Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
---
.../linux/linux-yocto-rt_6.12.bb | 6 ++--
.../linux/linux-yocto-tiny_6.12.bb | 6 ++--
meta/recipes-kernel/linux/linux-yocto_6.12.bb | 28 +++++++++----------
3 files changed, 20 insertions(+), 20 deletions(-)
diff --git a/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb b/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb
index 42ad0cbef0..c003d8464b 100644
--- a/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb
+++ b/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb
@@ -14,13 +14,13 @@ python () {
raise bb.parse.SkipRecipe("Set PREFERRED_PROVIDER_virtual/kernel to linux-yocto-rt to enable it")
}
-SRCREV_machine ?= "2aa940a9e5701e5b4107d0250da79a52e01da34a"
-SRCREV_meta ?= "5db57044962c6155c4e82f06d87e90dfe49a59e6"
+SRCREV_machine ?= "ae0f27c5992d230fddf2cab92dc5ae86417285d3"
+SRCREV_meta ?= "ae758a118311062560d89a3721abd38d4a35fc1c"
SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;branch=${KBRANCH};name=machine;protocol=https \
git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.12;destsuffix=${KMETA};protocol=https"
-LINUX_VERSION ?= "6.12.38"
+LINUX_VERSION ?= "6.12.39"
LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46"
diff --git a/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb b/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb
index 452e3f0eb2..50da62af74 100644
--- a/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb
+++ b/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb
@@ -8,7 +8,7 @@ require recipes-kernel/linux/linux-yocto.inc
# CVE exclusions
include recipes-kernel/linux/cve-exclusion_6.12.inc
-LINUX_VERSION ?= "6.12.38"
+LINUX_VERSION ?= "6.12.39"
LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46"
DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}"
@@ -17,8 +17,8 @@ DEPENDS += "openssl-native util-linux-native"
KMETA = "kernel-meta"
KCONF_BSP_AUDIT_LEVEL = "2"
-SRCREV_machine ?= "fa4b881d24f752a559d8e1f75ed08895ef20b14d"
-SRCREV_meta ?= "5db57044962c6155c4e82f06d87e90dfe49a59e6"
+SRCREV_machine ?= "faa83e63e24b8a42361214170269144e55ea85fb"
+SRCREV_meta ?= "ae758a118311062560d89a3721abd38d4a35fc1c"
PV = "${LINUX_VERSION}+git"
diff --git a/meta/recipes-kernel/linux/linux-yocto_6.12.bb b/meta/recipes-kernel/linux/linux-yocto_6.12.bb
index b9ae0954fa..f65bc4796a 100644
--- a/meta/recipes-kernel/linux/linux-yocto_6.12.bb
+++ b/meta/recipes-kernel/linux/linux-yocto_6.12.bb
@@ -18,25 +18,25 @@ KBRANCH:qemux86.104 ?= "v6.12/standard/base"
KBRANCH:qemuloongarch64 ?= "v6.12/standard/base"
KBRANCH:qemumips64 ?= "v6.12/standard/mti-malta64"
-SRCREV_machine:qemuarm ?= "c2755158bc029faf978e980235471b0f0e864814"
-SRCREV_machine:qemuarm64 ?= "fa4b881d24f752a559d8e1f75ed08895ef20b14d"
-SRCREV_machine:qemuloongarch64 ?= "fa4b881d24f752a559d8e1f75ed08895ef20b14d"
-SRCREV_machine:qemumips ?= "facf6694c9bdcaa9efb2d46a2c6e8e30fc72cdd3"
-SRCREV_machine:qemuppc ?= "fa4b881d24f752a559d8e1f75ed08895ef20b14d"
-SRCREV_machine:qemuriscv64 ?= "fa4b881d24f752a559d8e1f75ed08895ef20b14d"
-SRCREV_machine:qemuriscv32 ?= "fa4b881d24f752a559d8e1f75ed08895ef20b14d"
-SRCREV_machine:qemux86 ?= "fa4b881d24f752a559d8e1f75ed08895ef20b14d"
-SRCREV_machine:qemux86-64 ?= "fa4b881d24f752a559d8e1f75ed08895ef20b14d"
-SRCREV_machine:qemumips64 ?= "4ef2a68a188df7f561f5e297c4a3bab7e79e426f"
-SRCREV_machine ?= "fa4b881d24f752a559d8e1f75ed08895ef20b14d"
-SRCREV_meta ?= "5db57044962c6155c4e82f06d87e90dfe49a59e6"
+SRCREV_machine:qemuarm ?= "7898594c1d6927a383cceea44c8e29fdcadaa721"
+SRCREV_machine:qemuarm64 ?= "faa83e63e24b8a42361214170269144e55ea85fb"
+SRCREV_machine:qemuloongarch64 ?= "faa83e63e24b8a42361214170269144e55ea85fb"
+SRCREV_machine:qemumips ?= "465c2461220fbd9e9942cb6360bee9b018fbcd23"
+SRCREV_machine:qemuppc ?= "faa83e63e24b8a42361214170269144e55ea85fb"
+SRCREV_machine:qemuriscv64 ?= "faa83e63e24b8a42361214170269144e55ea85fb"
+SRCREV_machine:qemuriscv32 ?= "faa83e63e24b8a42361214170269144e55ea85fb"
+SRCREV_machine:qemux86 ?= "faa83e63e24b8a42361214170269144e55ea85fb"
+SRCREV_machine:qemux86-64 ?= "faa83e63e24b8a42361214170269144e55ea85fb"
+SRCREV_machine:qemumips64 ?= "cabddbe6741f5b05819b50432e33a0b5a9fe1d68"
+SRCREV_machine ?= "faa83e63e24b8a42361214170269144e55ea85fb"
+SRCREV_meta ?= "ae758a118311062560d89a3721abd38d4a35fc1c"
# set your preferred provider of linux-yocto to 'linux-yocto-upstream', and you'll
# get the <version>/base branch, which is pure upstream -stable, and the same
# meta SRCREV as the linux-yocto-standard builds. Select your version using the
# normal PREFERRED_VERSION settings.
BBCLASSEXTEND = "devupstream:target"
-SRCREV_machine:class-devupstream ?= "259f4977409c87a980fa2227b7c76a2fe3fb8c2f"
+SRCREV_machine:class-devupstream ?= "cdf264c0a5906063a0e2b750d420d77cb992446d"
PN:class-devupstream = "linux-yocto-upstream"
KBRANCH:class-devupstream = "v6.12/base"
@@ -44,7 +44,7 @@ SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;name=machine;branch=${KBRA
git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.12;destsuffix=${KMETA};protocol=https"
LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46"
-LINUX_VERSION ?= "6.12.38"
+LINUX_VERSION ?= "6.12.39"
PV = "${LINUX_VERSION}+git"
--
2.39.2
^ permalink raw reply related [flat|nested] 15+ messages in thread
* [PATCH 2/8] linux-yocto/6.12: update CVE exclusions (6.12.39)
2025-08-13 20:49 [PATCH 0/8] kernel: consolidated pull request bruce.ashfield
2025-08-13 20:49 ` [PATCH 1/8] linux-yocto/6.12: update to v6.12.39 bruce.ashfield
@ 2025-08-13 20:49 ` bruce.ashfield
2025-08-13 20:49 ` [PATCH 3/8] linux-yocto/6.12: update to v6.12.40 bruce.ashfield
` (5 subsequent siblings)
7 siblings, 0 replies; 15+ messages in thread
From: bruce.ashfield @ 2025-08-13 20:49 UTC (permalink / raw)
To: richard.purdie; +Cc: openembedded-core
From: Bruce Ashfield <bruce.ashfield@gmail.com>
Data pulled from: https://github.com/CVEProject/cvelistV5
1/1 [
Author: cvelistV5 Github Action
Email: github_action@example.com
Subject: 4 changes (1 new | 3 updated): - 1 new CVEs: CVE-2025-46002 - 3 updated CVEs: CVE-2025-5752, CVE-2025-6717, CVE-2025-7397
Date: Fri, 18 Jul 2025 14:11:28 +0000
]
Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
---
meta/recipes-kernel/linux/cve-exclusion_6.12.inc | 16 ++++++++--------
1 file changed, 8 insertions(+), 8 deletions(-)
diff --git a/meta/recipes-kernel/linux/cve-exclusion_6.12.inc b/meta/recipes-kernel/linux/cve-exclusion_6.12.inc
index 02931bbf79..e428258bb1 100644
--- a/meta/recipes-kernel/linux/cve-exclusion_6.12.inc
+++ b/meta/recipes-kernel/linux/cve-exclusion_6.12.inc
@@ -1,11 +1,11 @@
# Auto-generated CVE metadata, DO NOT EDIT BY HAND.
-# Generated at 2025-07-15 14:54:42.649263+00:00 for kernel version 6.12.38
-# From linux_kernel_cves cve_2025-07-15_1400Z-4-gc77733e1fe6
+# Generated at 2025-07-18 14:17:49.367230+00:00 for kernel version 6.12.39
+# From linux_kernel_cves cve_2025-07-18_1400Z
python check_kernel_cve_status_version() {
- this_version = "6.12.38"
+ this_version = "6.12.39"
kernel_version = d.getVar("LINUX_VERSION")
if kernel_version != this_version:
bb.warn("Kernel CVE status needs updating: generated for %s but kernel is %s" % (this_version, kernel_version))
@@ -4132,7 +4132,7 @@ CVE_STATUS[CVE-2022-49962] = "fixed-version: Fixed from version 6.0"
CVE_STATUS[CVE-2022-49963] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2022-49964] = "fixed-version: Fixed from version 6.0"
+CVE_STATUS[CVE-2022-49964] = "fixed-version: Fixed from version 5.19.7"
CVE_STATUS[CVE-2022-49965] = "fixed-version: Fixed from version 6.0"
@@ -5582,8 +5582,6 @@ CVE_STATUS[CVE-2023-52999] = "fixed-version: Fixed from version 6.2"
CVE_STATUS[CVE-2023-53000] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-53001] = "fixed-version: Fixed from version 6.2"
-
CVE_STATUS[CVE-2023-53002] = "fixed-version: Fixed from version 6.2"
CVE_STATUS[CVE-2023-53003] = "fixed-version: Fixed from version 6.2"
@@ -13672,7 +13670,7 @@ CVE_STATUS[CVE-2025-38065] = "cpe-stable-backport: Backported in 6.12.31"
CVE_STATUS[CVE-2025-38066] = "cpe-stable-backport: Backported in 6.12.31"
-# CVE-2025-38067 needs backporting (fixed from 6.15)
+CVE_STATUS[CVE-2025-38067] = "cpe-stable-backport: Backported in 6.12.39"
CVE_STATUS[CVE-2025-38068] = "cpe-stable-backport: Backported in 6.12.31"
@@ -13746,7 +13744,7 @@ CVE_STATUS[CVE-2025-38102] = "cpe-stable-backport: Backported in 6.12.34"
CVE_STATUS[CVE-2025-38103] = "cpe-stable-backport: Backported in 6.12.34"
-# CVE-2025-38104 needs backporting (fixed from 6.15)
+CVE_STATUS[CVE-2025-38104] = "cpe-stable-backport: Backported in 6.12.39"
# CVE-2025-38105 needs backporting (fixed from 6.16rc1)
@@ -14236,6 +14234,8 @@ CVE_STATUS[CVE-2025-38347] = "cpe-stable-backport: Backported in 6.12.35"
CVE_STATUS[CVE-2025-38348] = "cpe-stable-backport: Backported in 6.12.35"
+CVE_STATUS[CVE-2025-38349] = "cpe-stable-backport: Backported in 6.12.39"
+
CVE_STATUS[CVE-2025-38479] = "cpe-stable-backport: Backported in 6.12.23"
CVE_STATUS[CVE-2025-38575] = "cpe-stable-backport: Backported in 6.12.23"
--
2.39.2
^ permalink raw reply related [flat|nested] 15+ messages in thread
* [PATCH 3/8] linux-yocto/6.12: update to v6.12.40
2025-08-13 20:49 [PATCH 0/8] kernel: consolidated pull request bruce.ashfield
2025-08-13 20:49 ` [PATCH 1/8] linux-yocto/6.12: update to v6.12.39 bruce.ashfield
2025-08-13 20:49 ` [PATCH 2/8] linux-yocto/6.12: update CVE exclusions (6.12.39) bruce.ashfield
@ 2025-08-13 20:49 ` bruce.ashfield
2025-08-13 20:49 ` [PATCH 4/8] linux-yocto/6.12: update CVE exclusions (6.12.40) bruce.ashfield
` (4 subsequent siblings)
7 siblings, 0 replies; 15+ messages in thread
From: bruce.ashfield @ 2025-08-13 20:49 UTC (permalink / raw)
To: richard.purdie; +Cc: openembedded-core
From: Bruce Ashfield <bruce.ashfield@gmail.com>
Updating linux-yocto/6.12 to the latest korg -stable release that comprises
the following commits:
d90ecb2b1308 Linux 6.12.40
fd627ac8a5cf KVM: x86/xen: Fix cleanup logic in emulation of Xen schedop poll hypercalls
ff7ccaadb0bf iommu/vt-d: Fix misplaced domain_attached assignment
e82d8825f712 smb: client: let smbd_post_send_iter() respect the peers max_send_size and transmit all data
11f430b8f5fc drm/xe: Move page fault init after topology init
ce7585324b20 drm/xe/mocs: Initialize MOCS index early
8fc25d3055ba sched,freezer: Remove unnecessary warning in __thaw_task
7258b437d55d i2c: omap: fix deprecated of_property_read_bool() use
f701716812cb i2c: omap: Handle omap_i2c_init() errors in omap_i2c_probe()
ba35cc0598f3 i2c: omap: Fix an error handling path in omap_i2c_probe()
c1a786faa6ec i2c: omap: Add support for setting mux
35fdf1093109 selftests/bpf: Set test path for token/obj_priv_implicit_token_envvar
d9ebd928288b rust: use `#[used(compiler)]` to fix build and `modpost` with Rust >= 1.89.0
affb46db59f9 net: libwx: fix multicast packets received count
75747e25beca usb: dwc3: qcom: Don't leave BCR asserted
c45b48b4f4c0 usb: hub: Don't try to recover devices lost during warm reset.
bf71baa3cfe7 usb: hub: Fix flushing of delayed work used for post resume purposes
e11359640090 usb: hub: Fix flushing and scheduling of delayed work that tunes runtime pm
aec11e5f9c45 usb: hub: fix detection of high tier USB3 devices behind suspended hubs
ee56da95f896 btrfs: fix block group refcount race in btrfs_create_pending_block_groups()
e77078e52fbf clone_private_mnt(): make sure that caller has CAP_SYS_ADMIN in the right userns
7fc808d98215 sched: Change nr_uninterruptible type to unsigned long
816d36973467 efivarfs: Fix memory leak of efivarfs_fs_info in fs_context error paths
44e73241b8be libbpf: Fix handling of BPF arena relocations
f0de9702f9b2 drm/mediatek: only announce AFBC if really supported
40b5b4ba8ed8 drm/mediatek: Add wait_event_timeout when disabling plane
b04fb2628b28 Revert "cgroup_freezer: cgroup_freezing: Check if not frozen"
d7c1098787a6 rxrpc: Fix transmission of an abort in response to an abort
839fe96c1520 rxrpc: Fix recv-recv race of completed call
e5c480dc62a3 net/sched: Return NULL when htb_lookup_leaf encounters an empty rbtree
71f435f846b0 net: bridge: Do not offload IGMP/MLD messages
8984bcbd1edf net: vlan: fix VLAN 0 refcount imbalance of toggling filtering during runtime
cdb767915fc9 tls: always refresh the queue when reading sock
4e7c46362550 virtio-net: fix recursived rtnl_lock() during probe()
1a71bf5c91ab hv_netvsc: Set VF priv_flags to IFF_NO_ADDRCONF before open to prevent IPv6 addrconf
5db93cbd7d50 Bluetooth: L2CAP: Fix attempting to adjust outgoing MTU
1259b780e7b9 drm/xe/pf: Prepare to stop SR-IOV support prior GT reset
be77ce6b3a6b drm/xe/pf: Move VFs reprovisioning to worker
abe59c53b626 drm/xe/pf: Sanitize VF scratch registers on FLR
fc38c249c622 netfilter: nf_conntrack: fix crash due to removal of uninitialised entry
7c532f222361 net: fix segmentation after TCP/UDP fraglist GRO
7929d27c747e ipv6: mcast: Delay put pmc->idev in mld_del_delrec()
35b501a2393a net/mlx5: Correctly set gso_size when LRO is used
f47400547a95 Bluetooth: btusb: QCA: Fix downloading wrong NVM for WCN6855 GF variant without board ID
f5a40e54cd6c Bluetooth: hci_core: add missing braces when using macro parameters
db386fc5fa65 Bluetooth: SMP: Fix using HCI_ERROR_REMOTE_USER_TERM on timeout
6c586fcb880a Bluetooth: SMP: If an unallowed command is received consider it a failure
05ab8da312ec Bluetooth: hci_sync: fix connectable extended advertising when using static random address
b97be7ee8a1c Bluetooth: Fix null-ptr-deref in l2cap_sock_resume_cb()
95a13b0a6b04 riscv: traps_misaligned: properly sign extend value in misaligned load handler
32b14e757404 riscv: Enable interrupt during exception handling
efad4e2a0fa7 loop: use kiocb helpers to fix lockdep warning
65c666aff44e usb: net: sierra: check for no status endpoint
cd469b173d14 ice: check correct pointer in fwlog debugfs
5a5d64f0eec8 ice: add NULL check in eswitch lag check
3c4bdc8a852e hwmon: (corsair-cpro) Validate the size of the received input buffer
dcf0f03d7f74 selftests: net: increase inter-packet timeout in udpgro.sh
33711db90bd5 can: tcan4x5x: fix reset gpio usage during probe
d587e6929b7c can: tcan4x5x: add option for selecting nWKRQ voltage
d57dda2056fa wifi: cfg80211: remove scan request n_channels counted_by
6a466ac72fd4 nvmet-tcp: fix callback lock for TLS handshake
f9a90478207a nvme: fix misaccounting of nvme-mpath inflight I/O
fd6493533af9 net: phy: Don't register LEDs for genphy
5b02e397929e smc: Fix various oops due to inet_sock type confusion.
124765c20603 nvme: fix endianness of command word prints in nvme_log_err_passthru()
8184ee3c667d nvme: fix inconsistent RCU list manipulation in nvme_ns_add_to_ctrl_list()
9a7de97b915a fix a leak in fcntl_dirnotify()
09bce2138a30 smb: client: fix use-after-free in cifs_oplock_break
06ec83b6c792 rpl: Fix use-after-free in rpl_do_srh_inline().
a6d735100f60 net/sched: sch_qfq: Fix race condition on qfq_aggregate
e8767b89cd82 block: fix kobject leak in blk_unregister_queue
20648ff4a203 net: emaclite: Fix missing pointer increment in aligned_read()
894780d6dd3e cachefiles: Fix the incorrect return value in __cachefiles_write()
dc05051dd10d selftests/sched_ext: Fix exit selftest hang on UP
6952aeace93f bpf: Reject %p% format string in bprintf-like helpers
e80692789679 arm64: dts: imx95: Correct the DMA interrupter number of pcie0_ep
6353bf36f56b soundwire: amd: fix for clearing command status register
a6e232ee0f86 soundwire: amd: fix for handling slave alerts after link is down
8814cbbddcaf arm64: dts: rockchip: Add cd-gpios for sdcard detect on Cool Pi 4B
6cb38e5d359a arm64: dts: rockchip: Add cd-gpios for sdcard detect on Cool Pi CM5
c42116dc70af comedi: Fix initialization of data for instructions that write to subdevice
2af1e7d389c2 comedi: Fix use of uninitialized data in insn_rw_emulate_bits()
8c20a5cb9879 comedi: Fix some signed shift left operations
992d600f284e comedi: Fail COMEDI_INSNLIST ioctl if n_insns is too large
3eab654f5d19 comedi: das6402: Fix bit shift out of bounds
076b13ee60eb comedi: das16m1: Fix bit shift out of bounds
e0f3c0867d7d comedi: aio_iiro_16: Fix bit shift out of bounds
a27e27eee313 comedi: pcl812: Fix bit shift out of bounds
610615c96680 iio: common: st_sensors: Fix use of uninitialize device structs
6eea9f7648dd iio: backend: fix out-of-bound write
404b1d0fe0c6 iio: adc: stm32-adc: Fix race in installing chained IRQ handler
07c9a0617d9a iio: adc: max1363: Reorder mode_list[] entries
0ceb2893d360 iio: adc: max1363: Fix MAX1363_4X_CHANS/MAX1363_8X_CHANS[]
086a76474121 iio: adc: axp20x_adc: Add missing sentinel to AXP717 ADC channel maps
bfcda3e10157 iio: accel: fxls8962af: Fix use after free in fxls8962af_fifo_flush
b361598b7352 soc: aspeed: lpc-snoop: Don't disable channels that aren't enabled
855d4da5f270 soc: aspeed: lpc-snoop: Cleanup resources in stack-order
2a76bc2b24ed smb: client: fix use-after-free in crypt_message when using async crypto
d5629d1af060 s390/bpf: Fix bpf_arch_text_poke() with new_addr == NULL again
11c19d42d3a7 pmdomain: governor: Consider CPU latency tolerance from pm_domain_cpu_gov
10e27b2a6ebe net: libwx: properly reset Rx ring descriptor
ba7c793f96c1 net: libwx: fix the using of Rx buffer DMA
08d18bda0d03 net: libwx: remove duplicate page_pool_put_full_page()
74cb0f102d4b net: stmmac: intel: populate entire system_counterval_t in get_time_fn() callback
516cd0943a22 mmc: sdhci_am654: Workaround for Errata i2312
5280e0b8bc69 mmc: sdhci-pci: Quirk for broken command queuing on Intel GLK-based Positivo models
6198bfe1af77 mmc: bcm2835: Fix dma_unmap_sg() nents value
a25ebc337022 memstick: core: Zero initialize id_reg in h_memstick_read_dev_id()
2594d5ffc081 isofs: Verify inode mode when loading from disk
122160289adf dmaengine: nbpfaxi: Fix memory corruption in probe()
573f1e59024c cpuidle: psci: Fix cpuhotplug routine with PREEMPT_RT=y
9e11e0db4e27 Bluetooth: btintel: Check if controller is ISO capable on btintel_classify_pkt_type
1ddedbd8087d af_packet: fix soft lockup issue caused by tpacket_snd()
fa0796cd62c2 af_packet: fix the SO_SNDTIMEO constraint not effective on tpacked_snd()
0e9c4b36ad0c arm64: dts: rockchip: use cs-gpios for spi1 on ringneck
b0c7f2984356 arm64: dts: imx8mp-venice-gw73xx: fix TPM SPI frequency
9650e49db619 arm64: dts: imx8mp-venice-gw72xx: fix TPM SPI frequency
a3964e87cf15 arm64: dts: imx8mp-venice-gw71xx: fix TPM SPI frequency
1a54317f3868 arm64: dts: freescale: imx8mm-verdin: Keep LDO5 always on
a86ea423dc13 arm64: dts: add big-endian property back into watchdog node
c70000779432 arm64: dts: imx8mp-venice-gw74xx: fix TPM SPI frequency
5419adaef571 net/mlx5: Update the list of the PCI supported devices
837a9631f180 phonet/pep: Move call to pn_skb_get_dst_sockaddr() earlier in pep_sock_accept()
938126995e64 mptcp: reset fallback status gracefully at disconnect() time
f81b6fbe13c7 mptcp: plug races between subflow fail and subflow creation
54999dea879f mptcp: make fallback action and fallback decision atomic
f28044a60506 io_uring/poll: fix POLLERR handling
134ec1ed468f ALSA: hda/realtek: Add quirk for ASUS ROG Strix G712LWS
61e867574444 ALSA: hda/realtek - Fix mute LED for HP Victus 16-r0xxx
084eb54b820f drm/amd/display: Free memory allocation
74162dda80e7 drm/amd/display: Disable CRTC degamma LUT for DCN401
62f2a58a4cb0 drm/amdgpu: Increase reset counter only on success
228ad2ab5b33 drm/amdgpu/gfx8: reset compute ring wptr on the GPU on resume
21e649b0bd1a objtool/rust: add one more `noreturn` Rust function for Rust 1.89.0
7bb9ea515cda tracing/osnoise: Fix crash in timerlat_dump_stack()
33e20747b47d tracing: Add down_write(trace_event_sem) when adding trace event
692cfff241f1 tracing/probes: Avoid using params uninitialized in parse_btf_arg()
d18f63e84884 HID: core: do not bypass hid_hw_raw_request
953af3c0814a HID: core: ensure __hid_request reserves the report ID as the first byte
a262370f385e HID: core: ensure the allocated report buffer can contain the reserved report ID
68860d1ade38 dm-bufio: fix sched in atomic context
0758f7ef402b spi: Add check for 8-bit transfer with 8 IO mode support
40f79e2bf6a4 pch_uart: Fix dma_sync_sg_for_device() nents value
9ecfed987bc8 Input: xpad - set correct controller type for Acer NGR200
c29a2328af96 nvmem: layouts: u-boot-env: remove crc32 endianness conversion
c85295f624db nvmem: imx-ocotp: fix MAC address byte length
ff628593ba7c Revert "staging: vchiq_arm: Create keep-alive thread during probe"
970635ed63da thunderbolt: Fix bit masking in tb_dp_port_set_hops()
17a6ea23890e thunderbolt: Fix wake on connect at runtime
1a1190b4ba7b i2c: stm32f7: unmap DMA mapped buffer
79b63523bfdc i2c: stm32: fix the device used for the DMA map
783ea37b237a usb: gadget: configfs: Fix OOB read on empty string write
032f22962bfc usb: dwc2: gadget: Fix enter to hibernation for UTMI+ PHY
231bf7e839a8 usb: musb: fix gadget state on disconnect
951dd99ac05a USB: serial: ftdi_sio: add support for NDI EMGUIDE GEMINI
8b8cb0c34c66 USB: serial: option: add Foxconn T99W640
ba1d8dc87ae7 USB: serial: option: add Telit Cinterion FE910C04 (ECM) composition
248ba00d13ff phy: tegra: xusb: Disable periodic tracking on Tegra234
2f2a375304b0 phy: tegra: xusb: Decouple CYA_TRK_CODE_UPDATE_ON_IDLE from trk_hw_mode
ec7f98ff05f0 phy: tegra: xusb: Fix unbalanced regulator disable in UTMI PHY mode
Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
---
.../linux/linux-yocto-rt_6.12.bb | 6 ++--
.../linux/linux-yocto-tiny_6.12.bb | 6 ++--
meta/recipes-kernel/linux/linux-yocto_6.12.bb | 28 +++++++++----------
3 files changed, 20 insertions(+), 20 deletions(-)
diff --git a/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb b/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb
index c003d8464b..fdb0caa943 100644
--- a/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb
+++ b/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb
@@ -14,13 +14,13 @@ python () {
raise bb.parse.SkipRecipe("Set PREFERRED_PROVIDER_virtual/kernel to linux-yocto-rt to enable it")
}
-SRCREV_machine ?= "ae0f27c5992d230fddf2cab92dc5ae86417285d3"
-SRCREV_meta ?= "ae758a118311062560d89a3721abd38d4a35fc1c"
+SRCREV_machine ?= "96c3b8967c299edb7c8fd1beff358624e3aac443"
+SRCREV_meta ?= "52dd739a32215ffca801bc40daebee19a01b6f20"
SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;branch=${KBRANCH};name=machine;protocol=https \
git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.12;destsuffix=${KMETA};protocol=https"
-LINUX_VERSION ?= "6.12.39"
+LINUX_VERSION ?= "6.12.40"
LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46"
diff --git a/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb b/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb
index 50da62af74..3dccc9e723 100644
--- a/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb
+++ b/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb
@@ -8,7 +8,7 @@ require recipes-kernel/linux/linux-yocto.inc
# CVE exclusions
include recipes-kernel/linux/cve-exclusion_6.12.inc
-LINUX_VERSION ?= "6.12.39"
+LINUX_VERSION ?= "6.12.40"
LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46"
DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}"
@@ -17,8 +17,8 @@ DEPENDS += "openssl-native util-linux-native"
KMETA = "kernel-meta"
KCONF_BSP_AUDIT_LEVEL = "2"
-SRCREV_machine ?= "faa83e63e24b8a42361214170269144e55ea85fb"
-SRCREV_meta ?= "ae758a118311062560d89a3721abd38d4a35fc1c"
+SRCREV_machine ?= "50893c3858cc7bbc15a174f06fa30fba25306cac"
+SRCREV_meta ?= "52dd739a32215ffca801bc40daebee19a01b6f20"
PV = "${LINUX_VERSION}+git"
diff --git a/meta/recipes-kernel/linux/linux-yocto_6.12.bb b/meta/recipes-kernel/linux/linux-yocto_6.12.bb
index f65bc4796a..c58e5f07f4 100644
--- a/meta/recipes-kernel/linux/linux-yocto_6.12.bb
+++ b/meta/recipes-kernel/linux/linux-yocto_6.12.bb
@@ -18,25 +18,25 @@ KBRANCH:qemux86.104 ?= "v6.12/standard/base"
KBRANCH:qemuloongarch64 ?= "v6.12/standard/base"
KBRANCH:qemumips64 ?= "v6.12/standard/mti-malta64"
-SRCREV_machine:qemuarm ?= "7898594c1d6927a383cceea44c8e29fdcadaa721"
-SRCREV_machine:qemuarm64 ?= "faa83e63e24b8a42361214170269144e55ea85fb"
-SRCREV_machine:qemuloongarch64 ?= "faa83e63e24b8a42361214170269144e55ea85fb"
-SRCREV_machine:qemumips ?= "465c2461220fbd9e9942cb6360bee9b018fbcd23"
-SRCREV_machine:qemuppc ?= "faa83e63e24b8a42361214170269144e55ea85fb"
-SRCREV_machine:qemuriscv64 ?= "faa83e63e24b8a42361214170269144e55ea85fb"
-SRCREV_machine:qemuriscv32 ?= "faa83e63e24b8a42361214170269144e55ea85fb"
-SRCREV_machine:qemux86 ?= "faa83e63e24b8a42361214170269144e55ea85fb"
-SRCREV_machine:qemux86-64 ?= "faa83e63e24b8a42361214170269144e55ea85fb"
-SRCREV_machine:qemumips64 ?= "cabddbe6741f5b05819b50432e33a0b5a9fe1d68"
-SRCREV_machine ?= "faa83e63e24b8a42361214170269144e55ea85fb"
-SRCREV_meta ?= "ae758a118311062560d89a3721abd38d4a35fc1c"
+SRCREV_machine:qemuarm ?= "3884ae3c574f932b6cfe528f86c83214c2e8a36e"
+SRCREV_machine:qemuarm64 ?= "50893c3858cc7bbc15a174f06fa30fba25306cac"
+SRCREV_machine:qemuloongarch64 ?= "50893c3858cc7bbc15a174f06fa30fba25306cac"
+SRCREV_machine:qemumips ?= "39d23e283ab644b5a8758046130b8c22847176f8"
+SRCREV_machine:qemuppc ?= "50893c3858cc7bbc15a174f06fa30fba25306cac"
+SRCREV_machine:qemuriscv64 ?= "50893c3858cc7bbc15a174f06fa30fba25306cac"
+SRCREV_machine:qemuriscv32 ?= "50893c3858cc7bbc15a174f06fa30fba25306cac"
+SRCREV_machine:qemux86 ?= "50893c3858cc7bbc15a174f06fa30fba25306cac"
+SRCREV_machine:qemux86-64 ?= "50893c3858cc7bbc15a174f06fa30fba25306cac"
+SRCREV_machine:qemumips64 ?= "3cf1294a14f4a23376b86201ab5bdff6159102ad"
+SRCREV_machine ?= "50893c3858cc7bbc15a174f06fa30fba25306cac"
+SRCREV_meta ?= "52dd739a32215ffca801bc40daebee19a01b6f20"
# set your preferred provider of linux-yocto to 'linux-yocto-upstream', and you'll
# get the <version>/base branch, which is pure upstream -stable, and the same
# meta SRCREV as the linux-yocto-standard builds. Select your version using the
# normal PREFERRED_VERSION settings.
BBCLASSEXTEND = "devupstream:target"
-SRCREV_machine:class-devupstream ?= "cdf264c0a5906063a0e2b750d420d77cb992446d"
+SRCREV_machine:class-devupstream ?= "d90ecb2b1308b3e362ec4c21ff7cf0a051b445df"
PN:class-devupstream = "linux-yocto-upstream"
KBRANCH:class-devupstream = "v6.12/base"
@@ -44,7 +44,7 @@ SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;name=machine;branch=${KBRA
git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.12;destsuffix=${KMETA};protocol=https"
LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46"
-LINUX_VERSION ?= "6.12.39"
+LINUX_VERSION ?= "6.12.40"
PV = "${LINUX_VERSION}+git"
--
2.39.2
^ permalink raw reply related [flat|nested] 15+ messages in thread
* [PATCH 4/8] linux-yocto/6.12: update CVE exclusions (6.12.40)
2025-08-13 20:49 [PATCH 0/8] kernel: consolidated pull request bruce.ashfield
` (2 preceding siblings ...)
2025-08-13 20:49 ` [PATCH 3/8] linux-yocto/6.12: update to v6.12.40 bruce.ashfield
@ 2025-08-13 20:49 ` bruce.ashfield
2025-08-13 20:49 ` [PATCH 5/8] linux-libc-headers: update to v6.16 bruce.ashfield
` (3 subsequent siblings)
7 siblings, 0 replies; 15+ messages in thread
From: bruce.ashfield @ 2025-08-13 20:49 UTC (permalink / raw)
To: richard.purdie; +Cc: openembedded-core
From: Bruce Ashfield <bruce.ashfield@gmail.com>
Data pulled from: https://github.com/CVEProject/cvelistV5
1/1 [
Author: cvelistV5 Github Action
Email: github_action@example.com
Subject: 4 changes (1 new | 3 updated): - 1 new CVEs: CVE-2025-8126 - 3 updated CVEs: CVE-2025-31952, CVE-2025-31953, CVE-2025-31955
Date: Fri, 25 Jul 2025 02:18:30 +0000
]
Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
---
meta/recipes-kernel/linux/cve-exclusion_6.12.inc | 14 ++++++++++----
1 file changed, 10 insertions(+), 4 deletions(-)
diff --git a/meta/recipes-kernel/linux/cve-exclusion_6.12.inc b/meta/recipes-kernel/linux/cve-exclusion_6.12.inc
index e428258bb1..ee2f30b3db 100644
--- a/meta/recipes-kernel/linux/cve-exclusion_6.12.inc
+++ b/meta/recipes-kernel/linux/cve-exclusion_6.12.inc
@@ -1,11 +1,11 @@
# Auto-generated CVE metadata, DO NOT EDIT BY HAND.
-# Generated at 2025-07-18 14:17:49.367230+00:00 for kernel version 6.12.39
-# From linux_kernel_cves cve_2025-07-18_1400Z
+# Generated at 2025-07-25 02:49:32.259439+00:00 for kernel version 6.12.40
+# From linux_kernel_cves cve_2025-07-25_0100Z-1-g854b2f05e2c
python check_kernel_cve_status_version() {
- this_version = "6.12.39"
+ this_version = "6.12.40"
kernel_version = d.getVar("LINUX_VERSION")
if kernel_version != this_version:
bb.warn("Kernel CVE status needs updating: generated for %s but kernel is %s" % (this_version, kernel_version))
@@ -12938,7 +12938,7 @@ CVE_STATUS[CVE-2025-22112] = "cpe-stable-backport: Backported in 6.12.35"
CVE_STATUS[CVE-2025-22114] = "fixed-version: only affects 6.14 onwards"
-# CVE-2025-22115 needs backporting (fixed from 6.15)
+CVE_STATUS[CVE-2025-22115] = "cpe-stable-backport: Backported in 6.12.40"
# CVE-2025-22116 needs backporting (fixed from 6.15)
@@ -14236,6 +14236,12 @@ CVE_STATUS[CVE-2025-38348] = "cpe-stable-backport: Backported in 6.12.35"
CVE_STATUS[CVE-2025-38349] = "cpe-stable-backport: Backported in 6.12.39"
+CVE_STATUS[CVE-2025-38350] = "cpe-stable-backport: Backported in 6.12.37"
+
+# CVE-2025-38351 needs backporting (fixed from 6.16rc6)
+
+CVE_STATUS[CVE-2025-38352] = "cpe-stable-backport: Backported in 6.12.34"
+
CVE_STATUS[CVE-2025-38479] = "cpe-stable-backport: Backported in 6.12.23"
CVE_STATUS[CVE-2025-38575] = "cpe-stable-backport: Backported in 6.12.23"
--
2.39.2
^ permalink raw reply related [flat|nested] 15+ messages in thread
* [PATCH 5/8] linux-libc-headers: update to v6.16
2025-08-13 20:49 [PATCH 0/8] kernel: consolidated pull request bruce.ashfield
` (3 preceding siblings ...)
2025-08-13 20:49 ` [PATCH 4/8] linux-yocto/6.12: update CVE exclusions (6.12.40) bruce.ashfield
@ 2025-08-13 20:49 ` bruce.ashfield
2025-08-13 20:49 ` [PATCH 6/8] lttng-modules: update to v2.14.0 bruce.ashfield
` (2 subsequent siblings)
7 siblings, 0 replies; 15+ messages in thread
From: bruce.ashfield @ 2025-08-13 20:49 UTC (permalink / raw)
To: richard.purdie; +Cc: openembedded-core
From: Bruce Ashfield <bruce.ashfield@gmail.com>
6.16 will be the reference kernel for the fall 2025 release, bumping
our libc-headers to match.
Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
---
| 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
rename meta/recipes-kernel/linux-libc-headers/{linux-libc-headers_6.15.bb => linux-libc-headers_6.16.bb} (80%)
--git a/meta/recipes-kernel/linux-libc-headers/linux-libc-headers_6.15.bb b/meta/recipes-kernel/linux-libc-headers/linux-libc-headers_6.16.bb
similarity index 80%
rename from meta/recipes-kernel/linux-libc-headers/linux-libc-headers_6.15.bb
rename to meta/recipes-kernel/linux-libc-headers/linux-libc-headers_6.16.bb
index 70d2fd80ee..c3c77f8719 100644
--- a/meta/recipes-kernel/linux-libc-headers/linux-libc-headers_6.15.bb
+++ b/meta/recipes-kernel/linux-libc-headers/linux-libc-headers_6.16.bb
@@ -8,5 +8,5 @@ SRC_URI:append:libc-musl = "\
LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46"
-SRC_URI[sha256sum] = "7586962547803be7ecc4056efc927fb25214548722bd28171172f3599abb9764"
+SRC_URI[sha256sum] = "1a4be2fe6b5246aa4ac8987a8a4af34c42a8dd7d08b46ab48516bcc1befbcd83"
--
2.39.2
^ permalink raw reply related [flat|nested] 15+ messages in thread
* [PATCH 6/8] lttng-modules: update to v2.14.0
2025-08-13 20:49 [PATCH 0/8] kernel: consolidated pull request bruce.ashfield
` (4 preceding siblings ...)
2025-08-13 20:49 ` [PATCH 5/8] linux-libc-headers: update to v6.16 bruce.ashfield
@ 2025-08-13 20:49 ` bruce.ashfield
2025-08-13 21:03 ` Patchtest results for " patchtest
2025-08-13 20:49 ` [PATCH 7/8] linux-yocto/6.12: update to v6.12.41 bruce.ashfield
2025-08-13 20:49 ` [PATCH 8/8] linux-yocto/6.12: update CVE exclusions (6.12.41) bruce.ashfield
7 siblings, 1 reply; 15+ messages in thread
From: bruce.ashfield @ 2025-08-13 20:49 UTC (permalink / raw)
To: richard.purdie; +Cc: openembedded-core
From: Bruce Ashfield <bruce.ashfield@gmail.com>
As part of this update:
- drop one patch that is upstream now
- refresh one patch for new context
- backport two patches to fix the build against 6.16 (drop them in
2.14.1+
- update the license checksum, as the following change has been made
to the license:
commit 61baff6e8de2462f45006662bc34bcbf5f645ba0
Author: Michael Jeanson <mjeanson@efficios.com>
Date: Tue Jun 18 14:35:38 2024 -0400
Implement REUSE 3.0 with SPDX identifiers
Implement the full REUSE spec [1] to help with copyright and licensing
audits and compliance. This will reduce a lot of manual work for the
licensing audit required in Debian on each update and also allow using
automated tools.
For files that lacked copyright and licensing information, I used the
following guidelines. If a clear author could be determined from the git
history use it, otherwise use 'EfficiOS Inc.'. For code use
'GPL-2.0-only OR LGPL-2.1-only' unless otherwise stated, for
documentation 'CC-BY-SA-4.0' and for data files 'CC0-1.0'.
Freeform text files were converted to Markdown to allow licensing
comments.
Running the reuse tool on the repo is now succesful:
$ reuse lint
# SUMMARY
* Bad licenses: 0
* Deprecated licenses: 0
* Licenses without file extension: 0
* Missing licenses: 0
* Unused licenses: 0
* Used licenses: CC0-1.0, GPL-2.0-only, CC-BY-SA-4.0, MIT, LGPL-2.1-only
* Read errors: 0
* files with copyright information: 358 / 358
* files with license information: 358 / 358
Congratulations! Your project is compliant with version 3.0 of the REUSE Specification :-)
[1] https://reuse.software/tutorial/
Change-Id: I1755cab24a6fcec7a6c9a2136891418203ec34b8
Signed-off-by: Michael Jeanson <mjeanson@efficios.com>
Signed-off-by: Mathieu Desnoyers <mathieu.desnoyers@efficios.com>
Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
---
...x-sigaction-build-without-CONFIG_COM.patch | 35 --
...e-missing-CONFIG_TRACEPOINTS-to-warn.patch | 18 +-
...mentation-Add-missing-provider-name-.patch | 45 ++
...pose-__percpu-tag-as-a-named-address.patch | 438 ++++++++++++++++++
...les_2.13.19.bb => lttng-modules_2.14.0.bb} | 8 +-
5 files changed, 496 insertions(+), 48 deletions(-)
delete mode 100644 meta/recipes-kernel/lttng/lttng-modules/0001-lttng-modules-fix-sigaction-build-without-CONFIG_COM.patch
create mode 100644 meta/recipes-kernel/lttng/lttng-modules/0001-writeback-instrumentation-Add-missing-provider-name-.patch
create mode 100644 meta/recipes-kernel/lttng/lttng-modules/0002-fix-percpu-repurpose-__percpu-tag-as-a-named-address.patch
rename meta/recipes-kernel/lttng/{lttng-modules_2.13.19.bb => lttng-modules_2.14.0.bb} (81%)
diff --git a/meta/recipes-kernel/lttng/lttng-modules/0001-lttng-modules-fix-sigaction-build-without-CONFIG_COM.patch b/meta/recipes-kernel/lttng/lttng-modules/0001-lttng-modules-fix-sigaction-build-without-CONFIG_COM.patch
deleted file mode 100644
index eb43abbae2..0000000000
--- a/meta/recipes-kernel/lttng/lttng-modules/0001-lttng-modules-fix-sigaction-build-without-CONFIG_COM.patch
+++ /dev/null
@@ -1,35 +0,0 @@
-From 0e2095bcc50e7a07d3478f8d3c0ae5ad46575594 Mon Sep 17 00:00:00 2001
-From: Mikko Rapeli <mikko.rapeli@linaro.org>
-Date: Mon, 28 Apr 2025 12:07:24 +0000
-Subject: [PATCH] lttng-modules: fix sigaction build without
- CONFIG_COMPAT_OLD_SIGACTION
-
-Workaround build failure when CONFIG_COMPAT_OLD_SIGACTION is not enabled
-in kernel config.
-
-Upstream-Status: Submitted [https://bugs.lttng.org/issues/1426]
-
-Signed-off-by: Mikko Rapeli <mikko.rapeli@linaro.org>
----
- .../instrumentation/syscalls/headers/arm-32-syscalls_pointers.h | 2 ++
- 1 file changed, 2 insertions(+)
-
-diff --git a/include/instrumentation/syscalls/headers/arm-32-syscalls_pointers.h b/include/instrumentation/syscalls/headers/arm-32-syscalls_pointers.h
-index 5f4ca5b..1514cae 100644
---- a/include/instrumentation/syscalls/headers/arm-32-syscalls_pointers.h
-+++ b/include/instrumentation/syscalls/headers/arm-32-syscalls_pointers.h
-@@ -1890,9 +1890,11 @@ TRACE_SYSCALL_TABLE(chroot, chroot, 61, 1)
- #ifndef OVERRIDE_TABLE_32_ustat
- TRACE_SYSCALL_TABLE(ustat, ustat, 62, 2)
- #endif
-+#ifdef CONFIG_COMPAT_OLD_SIGACTION
- #ifndef OVERRIDE_TABLE_32_sigaction
- TRACE_SYSCALL_TABLE(sigaction, sigaction, 67, 3)
- #endif
-+#endif /* CONFIG_COMPAT_OLD_SIGACTION */
- #ifndef OVERRIDE_TABLE_32_sigpending
- TRACE_SYSCALL_TABLE(sigpending, sigpending, 73, 1)
- #endif
---
-2.49.0
-
diff --git a/meta/recipes-kernel/lttng/lttng-modules/0001-src-Kbuild-change-missing-CONFIG_TRACEPOINTS-to-warn.patch b/meta/recipes-kernel/lttng/lttng-modules/0001-src-Kbuild-change-missing-CONFIG_TRACEPOINTS-to-warn.patch
index 4911982461..1854d9a944 100644
--- a/meta/recipes-kernel/lttng/lttng-modules/0001-src-Kbuild-change-missing-CONFIG_TRACEPOINTS-to-warn.patch
+++ b/meta/recipes-kernel/lttng/lttng-modules/0001-src-Kbuild-change-missing-CONFIG_TRACEPOINTS-to-warn.patch
@@ -19,11 +19,11 @@ Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
src/Kbuild | 7 ++++++-
1 file changed, 6 insertions(+), 1 deletion(-)
-diff --git a/src/Kbuild b/src/Kbuild
-index 7137874..04eb5c9 100644
---- a/src/Kbuild
-+++ b/src/Kbuild
-@@ -2,10 +2,13 @@
+Index: lttng-modules-2.14.0/src/Kbuild
+===================================================================
+--- lttng-modules-2.14.0.orig/src/Kbuild
++++ lttng-modules-2.14.0/src/Kbuild
+@@ -3,10 +3,13 @@
ifdef CONFIG_LOCALVERSION # Check if dot-config is included.
ifeq ($(CONFIG_TRACEPOINTS),)
@@ -38,9 +38,9 @@ index 7137874..04eb5c9 100644
TOP_LTTNG_MODULES_DIR := $(shell dirname $(lastword $(MAKEFILE_LIST)))/..
lttng_check_linux_version = $(shell pwd)/include/linux/version.h
-@@ -150,3 +153,5 @@ lttng-statedump-objs := lttng-statedump-impl.o
- obj-$(CONFIG_LTTNG) += probes/
- obj-$(CONFIG_LTTNG) += lib/
- obj-$(CONFIG_LTTNG) += tests/
+@@ -168,3 +171,5 @@
+ obj-$(CONFIG_LTTNG_SYSCALLS_EXTRACTOR) += lttng-syscalls-extractor.o
+
+ # vim:syntax=make
+
+endif # DISABLE_MODULE
diff --git a/meta/recipes-kernel/lttng/lttng-modules/0001-writeback-instrumentation-Add-missing-provider-name-.patch b/meta/recipes-kernel/lttng/lttng-modules/0001-writeback-instrumentation-Add-missing-provider-name-.patch
new file mode 100644
index 0000000000..2afad7084b
--- /dev/null
+++ b/meta/recipes-kernel/lttng/lttng-modules/0001-writeback-instrumentation-Add-missing-provider-name-.patch
@@ -0,0 +1,45 @@
+From 039dbff4ba95eca58f8ebbcf1640a46b482c24e0 Mon Sep 17 00:00:00 2001
+From: Mathieu Desnoyers <mathieu.desnoyers@efficios.com>
+Date: Fri, 4 Jul 2025 11:34:45 -0400
+Subject: [PATCH 1/2] writeback instrumentation: Add missing provider name
+ prefix
+
+The events folio_wait_writeback and wait_on_page_writeback do not have
+the writeback event name prefix mandated by the sanity check in
+lttng_kernel_probe_register, which trigger a console warning.
+
+Change those event names to provide the relevant provider name prefix.
+
+Upstream-Status: Backport [commit 039dbff4]
+
+Signed-off-by: Mathieu Desnoyers <mathieu.desnoyers@efficios.com>
+Change-Id: Ia069e2dac4a373170e059792a947cffb6c956cb2
+---
+ include/instrumentation/events/writeback.h | 4 ++--
+ 1 file changed, 2 insertions(+), 2 deletions(-)
+
+diff --git a/include/instrumentation/events/writeback.h b/include/instrumentation/events/writeback.h
+index d694e323..b9e26b5b 100644
+--- a/include/instrumentation/events/writeback.h
++++ b/include/instrumentation/events/writeback.h
+@@ -122,7 +122,7 @@ LTTNG_TRACEPOINT_EVENT_INSTANCE(writeback_folio_template, writeback_dirty_folio,
+ TP_ARGS(folio, mapping)
+ )
+
+-LTTNG_TRACEPOINT_EVENT_INSTANCE(writeback_folio_template, folio_wait_writeback,
++LTTNG_TRACEPOINT_EVENT_INSTANCE(writeback_folio_template, writeback_folio_wait,
+
+ TP_PROTO(struct folio *folio, struct address_space *mapping),
+
+@@ -150,7 +150,7 @@ LTTNG_TRACEPOINT_EVENT_INSTANCE(writeback_page_template, writeback_dirty_page,
+ TP_ARGS(page, mapping)
+ )
+
+-LTTNG_TRACEPOINT_EVENT_INSTANCE(writeback_page_template, wait_on_page_writeback,
++LTTNG_TRACEPOINT_EVENT_INSTANCE(writeback_page_template, writeback_wait_on_page,
+
+ TP_PROTO(struct page *page, struct address_space *mapping),
+
+--
+2.39.2
+
diff --git a/meta/recipes-kernel/lttng/lttng-modules/0002-fix-percpu-repurpose-__percpu-tag-as-a-named-address.patch b/meta/recipes-kernel/lttng/lttng-modules/0002-fix-percpu-repurpose-__percpu-tag-as-a-named-address.patch
new file mode 100644
index 0000000000..26d16c2cb8
--- /dev/null
+++ b/meta/recipes-kernel/lttng/lttng-modules/0002-fix-percpu-repurpose-__percpu-tag-as-a-named-address.patch
@@ -0,0 +1,438 @@
+From 243dbd5c83fd647144b4e6f4e6e01e9e59fe910f Mon Sep 17 00:00:00 2001
+From: Michael Jeanson <mjeanson@efficios.com>
+Date: Tue, 29 Jul 2025 15:34:23 -0400
+Subject: [PATCH 2/2] fix: percpu: repurpose __percpu tag as a named address
+ space qualifier (v6.15)
+
+The '__percpu' annotation was repurposed as a named address space
+qualifier, with compilers supporting 'typeof_unqual' like GCC 14 and
+Clang 19 this is now enforced at build time.
+
+See upstream commits:
+
+ commit 6cea5ae714ba47ea4807d15903baca9857a450e6
+ Author: Uros Bizjak <ubizjak@gmail.com>
+ Date: Mon Jan 27 17:05:09 2025 +0100
+
+ percpu: repurpose __percpu tag as a named address space qualifier
+
+ The patch introduces __percpu_qual define and repurposes __percpu tag as a
+ named address space qualifier using the new define.
+
+ Arches can now conditionally define __percpu_qual as their named address
+ space qualifier for percpu variables.
+
+ commit 6a367577153acd9b432a5340fb10891eeb7e10f1
+ Author: Uros Bizjak <ubizjak@gmail.com>
+ Date: Mon Jan 27 17:05:10 2025 +0100
+
+ percpu/x86: enable strict percpu checks via named AS qualifiers
+
+ This patch declares percpu variables in __seg_gs/__seg_fs named AS and
+ keeps them named AS qualified until they are dereferenced with percpu
+ accessor. This approach enables various compiler check for
+ cross-namespace variable assignments.
+
+Upstream-Status: Backport [commit 243dbd5c]
+
+Change-Id: Ib212cb4ef077da994867f0541921529dd4a799a0
+Signed-off-by: Michael Jeanson <mjeanson@efficios.com>
+Signed-off-by: Mathieu Desnoyers <mathieu.desnoyers@efficios.com>
+---
+ include/ringbuffer/backend_types.h | 5 ++-
+ include/ringbuffer/frontend_api.h | 4 +-
+ src/lib/ringbuffer/ring_buffer_backend.c | 30 +++++++-------
+ src/lib/ringbuffer/ring_buffer_frontend.c | 40 +++++++++----------
+ src/lib/ringbuffer/ring_buffer_iterator.c | 8 ++--
+ src/lttng-context-callstack.c | 2 +-
+ src/lttng-ring-buffer-event-notifier-client.h | 2 +-
+ src/lttng-ring-buffer-metadata-client.h | 2 +-
+ 8 files changed, 48 insertions(+), 45 deletions(-)
+
+diff --git a/include/ringbuffer/backend_types.h b/include/ringbuffer/backend_types.h
+index c23889ea..caafe4da 100644
+--- a/include/ringbuffer/backend_types.h
++++ b/include/ringbuffer/backend_types.h
+@@ -79,7 +79,10 @@ struct channel_backend {
+ */
+ unsigned int buf_size_order; /* Order of buffer size */
+ unsigned int extra_reader_sb:1; /* has extra reader subbuffer ? */
+- struct lttng_kernel_ring_buffer *buf; /* Channel per-cpu buffers */
++ union {
++ struct lttng_kernel_ring_buffer *global_buf; /* Channel global buffer */
++ struct lttng_kernel_ring_buffer __percpu *percpu_buf; /* Channel per-cpu buffers */
++ };
+
+ unsigned long num_subbuf; /* Number of sub-buffers for writer */
+ u64 start_timestamp; /* Channel creation timestamp value */
+diff --git a/include/ringbuffer/frontend_api.h b/include/ringbuffer/frontend_api.h
+index e8d77d95..a0319c98 100644
+--- a/include/ringbuffer/frontend_api.h
++++ b/include/ringbuffer/frontend_api.h
+@@ -153,9 +153,9 @@ int lib_ring_buffer_reserve(const struct lttng_kernel_ring_buffer_config *config
+ return -EAGAIN;
+
+ if (config->alloc == RING_BUFFER_ALLOC_PER_CPU)
+- buf = per_cpu_ptr(chan->backend.buf, ctx->priv.reserve_cpu);
++ buf = per_cpu_ptr(chan->backend.percpu_buf, ctx->priv.reserve_cpu);
+ else
+- buf = chan->backend.buf;
++ buf = chan->backend.global_buf;
+ if (unlikely(atomic_read(&buf->record_disabled)))
+ return -EAGAIN;
+ ctx->priv.buf = buf;
+diff --git a/src/lib/ringbuffer/ring_buffer_backend.c b/src/lib/ringbuffer/ring_buffer_backend.c
+index 3eaa1b96..b5ecde4d 100644
+--- a/src/lib/ringbuffer/ring_buffer_backend.c
++++ b/src/lib/ringbuffer/ring_buffer_backend.c
+@@ -279,7 +279,7 @@ int lttng_cpuhp_rb_backend_prepare(unsigned int cpu,
+
+ CHAN_WARN_ON(chanb, config->alloc == RING_BUFFER_ALLOC_PER_CHANNEL);
+
+- buf = per_cpu_ptr(chanb->buf, cpu);
++ buf = per_cpu_ptr(chanb->percpu_buf, cpu);
+ ret = lib_ring_buffer_create(buf, chanb, cpu);
+ if (ret) {
+ printk(KERN_ERR
+@@ -320,7 +320,7 @@ int lib_ring_buffer_cpu_hp_callback(struct notifier_block *nb,
+ switch (action) {
+ case CPU_UP_PREPARE:
+ case CPU_UP_PREPARE_FROZEN:
+- buf = per_cpu_ptr(chanb->buf, cpu);
++ buf = per_cpu_ptr(chanb->percpu_buf, cpu);
+ ret = lib_ring_buffer_create(buf, chanb, cpu);
+ if (ret) {
+ printk(KERN_ERR
+@@ -415,8 +415,8 @@ int channel_backend_init(struct channel_backend *chanb,
+
+ if (config->alloc == RING_BUFFER_ALLOC_PER_CPU) {
+ /* Allocating the buffer per-cpu structures */
+- chanb->buf = alloc_percpu(struct lttng_kernel_ring_buffer);
+- if (!chanb->buf)
++ chanb->percpu_buf = alloc_percpu(struct lttng_kernel_ring_buffer);
++ if (!chanb->percpu_buf)
+ goto free_cpumask;
+
+ #if (LTTNG_LINUX_VERSION_CODE >= LTTNG_KERNEL_VERSION(4,10,0))
+@@ -447,7 +447,7 @@ int channel_backend_init(struct channel_backend *chanb,
+
+ lttng_cpus_read_lock();
+ for_each_online_cpu(i) {
+- ret = lib_ring_buffer_create(per_cpu_ptr(chanb->buf, i),
++ ret = lib_ring_buffer_create(per_cpu_ptr(chanb->percpu_buf, i),
+ chanb, i);
+ if (ret)
+ goto free_bufs; /* cpu hotplug locked */
+@@ -455,7 +455,7 @@ int channel_backend_init(struct channel_backend *chanb,
+ lttng_cpus_read_unlock();
+ #else
+ for_each_possible_cpu(i) {
+- ret = lib_ring_buffer_create(per_cpu_ptr(chanb->buf, i),
++ ret = lib_ring_buffer_create(per_cpu_ptr(chanb->percpu_buf, i),
+ chanb, i);
+ if (ret)
+ goto free_bufs;
+@@ -464,10 +464,10 @@ int channel_backend_init(struct channel_backend *chanb,
+ }
+ #endif /* #else #if (LTTNG_LINUX_VERSION_CODE >= LTTNG_KERNEL_VERSION(4,10,0)) */
+ } else {
+- chanb->buf = kzalloc(sizeof(struct lttng_kernel_ring_buffer), GFP_KERNEL);
+- if (!chanb->buf)
++ chanb->global_buf = kzalloc(sizeof(struct lttng_kernel_ring_buffer), GFP_KERNEL);
++ if (!chanb->global_buf)
+ goto free_cpumask;
+- ret = lib_ring_buffer_create(chanb->buf, chanb, -1);
++ ret = lib_ring_buffer_create(chanb->global_buf, chanb, -1);
+ if (ret)
+ goto free_bufs;
+ }
+@@ -491,15 +491,15 @@ free_bufs:
+ #endif /* #else #if (LTTNG_LINUX_VERSION_CODE >= LTTNG_KERNEL_VERSION(4,10,0)) */
+ for_each_possible_cpu(i) {
+ struct lttng_kernel_ring_buffer *buf =
+- per_cpu_ptr(chanb->buf, i);
++ per_cpu_ptr(chanb->percpu_buf, i);
+
+ if (!buf->backend.allocated)
+ continue;
+ lib_ring_buffer_free(buf);
+ }
+- free_percpu(chanb->buf);
++ free_percpu(chanb->percpu_buf);
+ } else
+- kfree(chanb->buf);
++ kfree(chanb->global_buf);
+ free_cpumask:
+ if (config->alloc == RING_BUFFER_ALLOC_PER_CPU)
+ free_cpumask_var(chanb->cpumask);
+@@ -542,16 +542,16 @@ void channel_backend_free(struct channel_backend *chanb)
+
+ if (config->alloc == RING_BUFFER_ALLOC_PER_CPU) {
+ for_each_possible_cpu(i) {
+- struct lttng_kernel_ring_buffer *buf = per_cpu_ptr(chanb->buf, i);
++ struct lttng_kernel_ring_buffer *buf = per_cpu_ptr(chanb->percpu_buf, i);
+
+ if (!buf->backend.allocated)
+ continue;
+ lib_ring_buffer_free(buf);
+ }
+ free_cpumask_var(chanb->cpumask);
+- free_percpu(chanb->buf);
++ free_percpu(chanb->percpu_buf);
+ } else {
+- struct lttng_kernel_ring_buffer *buf = chanb->buf;
++ struct lttng_kernel_ring_buffer *buf = chanb->global_buf;
+
+ CHAN_WARN_ON(chanb, !buf->backend.allocated);
+ lib_ring_buffer_free(buf);
+diff --git a/src/lib/ringbuffer/ring_buffer_frontend.c b/src/lib/ringbuffer/ring_buffer_frontend.c
+index 1ed9dc47..f9def043 100644
+--- a/src/lib/ringbuffer/ring_buffer_frontend.c
++++ b/src/lib/ringbuffer/ring_buffer_frontend.c
+@@ -505,7 +505,7 @@ int lttng_cpuhp_rb_frontend_dead(unsigned int cpu,
+ {
+ struct lttng_kernel_ring_buffer_channel *chan = container_of(node, struct lttng_kernel_ring_buffer_channel,
+ cpuhp_prepare);
+- struct lttng_kernel_ring_buffer *buf = per_cpu_ptr(chan->backend.buf, cpu);
++ struct lttng_kernel_ring_buffer *buf = per_cpu_ptr(chan->backend.percpu_buf, cpu);
+ const struct lttng_kernel_ring_buffer_config *config = &chan->backend.config;
+
+ CHAN_WARN_ON(chan, config->alloc == RING_BUFFER_ALLOC_PER_CHANNEL);
+@@ -526,7 +526,7 @@ int lttng_cpuhp_rb_frontend_online(unsigned int cpu,
+ {
+ struct lttng_kernel_ring_buffer_channel *chan = container_of(node, struct lttng_kernel_ring_buffer_channel,
+ cpuhp_online);
+- struct lttng_kernel_ring_buffer *buf = per_cpu_ptr(chan->backend.buf, cpu);
++ struct lttng_kernel_ring_buffer *buf = per_cpu_ptr(chan->backend.percpu_buf, cpu);
+ const struct lttng_kernel_ring_buffer_config *config = &chan->backend.config;
+
+ CHAN_WARN_ON(chan, config->alloc == RING_BUFFER_ALLOC_PER_CHANNEL);
+@@ -543,7 +543,7 @@ int lttng_cpuhp_rb_frontend_offline(unsigned int cpu,
+ {
+ struct lttng_kernel_ring_buffer_channel *chan = container_of(node, struct lttng_kernel_ring_buffer_channel,
+ cpuhp_online);
+- struct lttng_kernel_ring_buffer *buf = per_cpu_ptr(chan->backend.buf, cpu);
++ struct lttng_kernel_ring_buffer *buf = per_cpu_ptr(chan->backend.percpu_buf, cpu);
+ const struct lttng_kernel_ring_buffer_config *config = &chan->backend.config;
+
+ CHAN_WARN_ON(chan, config->alloc == RING_BUFFER_ALLOC_PER_CHANNEL);
+@@ -574,7 +574,7 @@ int lib_ring_buffer_cpu_hp_callback(struct notifier_block *nb,
+ unsigned int cpu = (unsigned long)hcpu;
+ struct lttng_kernel_ring_buffer_channel *chan = container_of(nb, struct lttng_kernel_ring_buffer_channel,
+ cpu_hp_notifier);
+- struct lttng_kernel_ring_buffer *buf = per_cpu_ptr(chan->backend.buf, cpu);
++ struct lttng_kernel_ring_buffer *buf = per_cpu_ptr(chan->backend.percpu_buf, cpu);
+ const struct lttng_kernel_ring_buffer_config *config = &chan->backend.config;
+
+ if (!chan->cpu_hp_enable)
+@@ -741,7 +741,7 @@ static void channel_unregister_notifiers(struct lttng_kernel_ring_buffer_channel
+ lttng_cpus_read_lock();
+ chan->cpu_hp_enable = 0;
+ for_each_online_cpu(cpu) {
+- struct lttng_kernel_ring_buffer *buf = per_cpu_ptr(chan->backend.buf,
++ struct lttng_kernel_ring_buffer *buf = per_cpu_ptr(chan->backend.percpu_buf,
+ cpu);
+ lib_ring_buffer_stop_switch_timer(buf);
+ lib_ring_buffer_stop_read_timer(buf);
+@@ -750,7 +750,7 @@ static void channel_unregister_notifiers(struct lttng_kernel_ring_buffer_channel
+ unregister_cpu_notifier(&chan->cpu_hp_notifier);
+ #else
+ for_each_possible_cpu(cpu) {
+- struct lttng_kernel_ring_buffer *buf = per_cpu_ptr(chan->backend.buf,
++ struct lttng_kernel_ring_buffer *buf = per_cpu_ptr(chan->backend.percpu_buf,
+ cpu);
+ lib_ring_buffer_stop_switch_timer(buf);
+ lib_ring_buffer_stop_read_timer(buf);
+@@ -759,7 +759,7 @@ static void channel_unregister_notifiers(struct lttng_kernel_ring_buffer_channel
+ }
+ #endif /* #else #if (LTTNG_LINUX_VERSION_CODE >= LTTNG_KERNEL_VERSION(4,10,0)) */
+ } else {
+- struct lttng_kernel_ring_buffer *buf = chan->backend.buf;
++ struct lttng_kernel_ring_buffer *buf = chan->backend.global_buf;
+
+ lib_ring_buffer_stop_switch_timer(buf);
+ lib_ring_buffer_stop_read_timer(buf);
+@@ -788,14 +788,14 @@ void lib_ring_buffer_set_quiescent_channel(struct lttng_kernel_ring_buffer_chann
+ if (config->alloc == RING_BUFFER_ALLOC_PER_CPU) {
+ lttng_cpus_read_lock();
+ for_each_channel_cpu(cpu, chan) {
+- struct lttng_kernel_ring_buffer *buf = per_cpu_ptr(chan->backend.buf,
++ struct lttng_kernel_ring_buffer *buf = per_cpu_ptr(chan->backend.percpu_buf,
+ cpu);
+
+ lib_ring_buffer_set_quiescent(buf);
+ }
+ lttng_cpus_read_unlock();
+ } else {
+- struct lttng_kernel_ring_buffer *buf = chan->backend.buf;
++ struct lttng_kernel_ring_buffer *buf = chan->backend.global_buf;
+
+ lib_ring_buffer_set_quiescent(buf);
+ }
+@@ -810,14 +810,14 @@ void lib_ring_buffer_clear_quiescent_channel(struct lttng_kernel_ring_buffer_cha
+ if (config->alloc == RING_BUFFER_ALLOC_PER_CPU) {
+ lttng_cpus_read_lock();
+ for_each_channel_cpu(cpu, chan) {
+- struct lttng_kernel_ring_buffer *buf = per_cpu_ptr(chan->backend.buf,
++ struct lttng_kernel_ring_buffer *buf = per_cpu_ptr(chan->backend.percpu_buf,
+ cpu);
+
+ lib_ring_buffer_clear_quiescent(buf);
+ }
+ lttng_cpus_read_unlock();
+ } else {
+- struct lttng_kernel_ring_buffer *buf = chan->backend.buf;
++ struct lttng_kernel_ring_buffer *buf = chan->backend.global_buf;
+
+ lib_ring_buffer_clear_quiescent(buf);
+ }
+@@ -915,7 +915,7 @@ struct lttng_kernel_ring_buffer_channel *channel_create(const struct lttng_kerne
+
+ lttng_cpus_read_lock();
+ for_each_online_cpu(cpu) {
+- struct lttng_kernel_ring_buffer *buf = per_cpu_ptr(chan->backend.buf,
++ struct lttng_kernel_ring_buffer *buf = per_cpu_ptr(chan->backend.percpu_buf,
+ cpu);
+ spin_lock(&per_cpu(ring_buffer_nohz_lock, cpu));
+ lib_ring_buffer_start_switch_timer(buf);
+@@ -926,7 +926,7 @@ struct lttng_kernel_ring_buffer_channel *channel_create(const struct lttng_kerne
+ lttng_cpus_read_unlock();
+ #else
+ for_each_possible_cpu(cpu) {
+- struct lttng_kernel_ring_buffer *buf = per_cpu_ptr(chan->backend.buf,
++ struct lttng_kernel_ring_buffer *buf = per_cpu_ptr(chan->backend.percpu_buf,
+ cpu);
+ spin_lock(&per_cpu(ring_buffer_nohz_lock, cpu));
+ lib_ring_buffer_start_switch_timer(buf);
+@@ -947,7 +947,7 @@ struct lttng_kernel_ring_buffer_channel *channel_create(const struct lttng_kerne
+ #endif /* defined(CONFIG_NO_HZ) && defined(CONFIG_LIB_RING_BUFFER) */
+
+ } else {
+- struct lttng_kernel_ring_buffer *buf = chan->backend.buf;
++ struct lttng_kernel_ring_buffer *buf = chan->backend.global_buf;
+
+ lib_ring_buffer_start_switch_timer(buf);
+ lib_ring_buffer_start_read_timer(buf);
+@@ -1004,7 +1004,7 @@ void *channel_destroy(struct lttng_kernel_ring_buffer_channel *chan)
+ * unregistered.
+ */
+ for_each_channel_cpu(cpu, chan) {
+- struct lttng_kernel_ring_buffer *buf = per_cpu_ptr(chan->backend.buf,
++ struct lttng_kernel_ring_buffer *buf = per_cpu_ptr(chan->backend.percpu_buf,
+ cpu);
+
+ if (config->cb.buffer_finalize)
+@@ -1019,7 +1019,7 @@ void *channel_destroy(struct lttng_kernel_ring_buffer_channel *chan)
+ wake_up_interruptible(&buf->read_wait);
+ }
+ } else {
+- struct lttng_kernel_ring_buffer *buf = chan->backend.buf;
++ struct lttng_kernel_ring_buffer *buf = chan->backend.global_buf;
+
+ if (config->cb.buffer_finalize)
+ config->cb.buffer_finalize(buf, chan->backend.priv, -1);
+@@ -1044,9 +1044,9 @@ struct lttng_kernel_ring_buffer *channel_get_ring_buffer(
+ struct lttng_kernel_ring_buffer_channel *chan, int cpu)
+ {
+ if (config->alloc == RING_BUFFER_ALLOC_PER_CHANNEL)
+- return chan->backend.buf;
++ return chan->backend.global_buf;
+ else
+- return per_cpu_ptr(chan->backend.buf, cpu);
++ return per_cpu_ptr(chan->backend.percpu_buf, cpu);
+ }
+ EXPORT_SYMBOL_GPL(channel_get_ring_buffer);
+
+@@ -2271,9 +2271,9 @@ static struct lttng_kernel_ring_buffer *get_current_buf(struct lttng_kernel_ring
+ const struct lttng_kernel_ring_buffer_config *config = &chan->backend.config;
+
+ if (config->alloc == RING_BUFFER_ALLOC_PER_CPU)
+- return per_cpu_ptr(chan->backend.buf, cpu);
++ return per_cpu_ptr(chan->backend.percpu_buf, cpu);
+ else
+- return chan->backend.buf;
++ return chan->backend.global_buf;
+ }
+
+ void lib_ring_buffer_lost_event_too_big(struct lttng_kernel_ring_buffer_channel *chan)
+diff --git a/src/lib/ringbuffer/ring_buffer_iterator.c b/src/lib/ringbuffer/ring_buffer_iterator.c
+index 88d79412..1a1db5e2 100644
+--- a/src/lib/ringbuffer/ring_buffer_iterator.c
++++ b/src/lib/ringbuffer/ring_buffer_iterator.c
+@@ -361,7 +361,7 @@ int lttng_cpuhp_rb_iter_online(unsigned int cpu,
+ {
+ struct lttng_kernel_ring_buffer_channel *chan = container_of(node, struct lttng_kernel_ring_buffer_channel,
+ cpuhp_iter_online);
+- struct lttng_kernel_ring_buffer *buf = per_cpu_ptr(chan->backend.buf, cpu);
++ struct lttng_kernel_ring_buffer *buf = per_cpu_ptr(chan->backend.percpu_buf, cpu);
+ const struct lttng_kernel_ring_buffer_config *config = &chan->backend.config;
+
+ CHAN_WARN_ON(chan, config->alloc == RING_BUFFER_ALLOC_PER_CHANNEL);
+@@ -382,7 +382,7 @@ int channel_iterator_cpu_hotplug(struct notifier_block *nb,
+ unsigned int cpu = (unsigned long)hcpu;
+ struct lttng_kernel_ring_buffer_channel *chan = container_of(nb, struct lttng_kernel_ring_buffer_channel,
+ hp_iter_notifier);
+- struct lttng_kernel_ring_buffer *buf = per_cpu_ptr(chan->backend.buf, cpu);
++ struct lttng_kernel_ring_buffer *buf = per_cpu_ptr(chan->backend.percpu_buf, cpu);
+ const struct lttng_kernel_ring_buffer_config *config = &chan->backend.config;
+
+ if (!chan->hp_iter_enable)
+@@ -443,14 +443,14 @@ int channel_iterator_init(struct lttng_kernel_ring_buffer_channel *chan)
+
+ lttng_cpus_read_lock();
+ for_each_online_cpu(cpu) {
+- buf = per_cpu_ptr(chan->backend.buf, cpu);
++ buf = per_cpu_ptr(chan->backend.percpu_buf, cpu);
+ lib_ring_buffer_iterator_init(chan, buf);
+ }
+ chan->hp_iter_enable = 1;
+ lttng_cpus_read_unlock();
+ #else
+ for_each_possible_cpu(cpu) {
+- buf = per_cpu_ptr(chan->backend.buf, cpu);
++ buf = per_cpu_ptr(chan->backend.percpu_buf, cpu);
+ lib_ring_buffer_iterator_init(chan, buf);
+ }
+ #endif
+diff --git a/src/lttng-context-callstack.c b/src/lttng-context-callstack.c
+index 4385472e..c5910718 100644
+--- a/src/lttng-context-callstack.c
++++ b/src/lttng-context-callstack.c
+@@ -69,7 +69,7 @@ void field_data_free(struct field_data *fdata)
+ }
+
+ static
+-struct field_data __percpu *field_data_create(enum lttng_cs_ctx_modes mode)
++struct field_data *field_data_create(enum lttng_cs_ctx_modes mode)
+ {
+ struct lttng_cs __percpu *cs_set;
+ struct field_data *fdata;
+diff --git a/src/lttng-ring-buffer-event-notifier-client.h b/src/lttng-ring-buffer-event-notifier-client.h
+index 95deab46..b4145914 100644
+--- a/src/lttng-ring-buffer-event-notifier-client.h
++++ b/src/lttng-ring-buffer-event-notifier-client.h
+@@ -363,7 +363,7 @@ size_t lttng_packet_avail_size(struct lttng_kernel_ring_buffer_channel *chan)
+ unsigned long o_begin;
+ struct lttng_kernel_ring_buffer *buf;
+
+- buf = chan->backend.buf; /* Only for global buffer ! */
++ buf = chan->backend.global_buf; /* Only for global buffer ! */
+ o_begin = v_read(&client_config, &buf->offset);
+ if (subbuf_offset(o_begin, chan) != 0) {
+ return chan->backend.subbuf_size - subbuf_offset(o_begin, chan);
+diff --git a/src/lttng-ring-buffer-metadata-client.h b/src/lttng-ring-buffer-metadata-client.h
+index 99158451..9ef73266 100644
+--- a/src/lttng-ring-buffer-metadata-client.h
++++ b/src/lttng-ring-buffer-metadata-client.h
+@@ -368,7 +368,7 @@ size_t lttng_packet_avail_size(struct lttng_kernel_ring_buffer_channel *chan)
+ unsigned long o_begin;
+ struct lttng_kernel_ring_buffer *buf;
+
+- buf = chan->backend.buf; /* Only for global buffer ! */
++ buf = chan->backend.global_buf; /* Only for global buffer ! */
+ o_begin = v_read(&client_config, &buf->offset);
+ if (subbuf_offset(o_begin, chan) != 0) {
+ return chan->backend.subbuf_size - subbuf_offset(o_begin, chan);
+--
+2.39.2
+
diff --git a/meta/recipes-kernel/lttng/lttng-modules_2.13.19.bb b/meta/recipes-kernel/lttng/lttng-modules_2.14.0.bb
similarity index 81%
rename from meta/recipes-kernel/lttng/lttng-modules_2.13.19.bb
rename to meta/recipes-kernel/lttng/lttng-modules_2.14.0.bb
index 63ba488515..6bbe1c5a19 100644
--- a/meta/recipes-kernel/lttng/lttng-modules_2.13.19.bb
+++ b/meta/recipes-kernel/lttng/lttng-modules_2.14.0.bb
@@ -3,21 +3,21 @@ SUMMARY = "Linux Trace Toolkit KERNEL MODULE"
DESCRIPTION = "The lttng-modules 2.0 package contains the kernel tracer modules"
HOMEPAGE = "https://lttng.org/"
LICENSE = "LGPL-2.1-only & GPL-2.0-only & MIT"
-LIC_FILES_CHKSUM = "file://LICENSE;md5=8d0d9f08888046474772a5d745d89d6a"
+LIC_FILES_CHKSUM = "file://LICENSE;md5=018e002dbdda3306682e394ddd65fa32"
inherit module
include lttng-platforms.inc
SRC_URI = "https://lttng.org/files/${BPN}/${BPN}-${PV}.tar.bz2 \
- file://0001-lttng-modules-fix-sigaction-build-without-CONFIG_COM.patch \
+ file://0001-writeback-instrumentation-Add-missing-provider-name-.patch \
+ file://0002-fix-percpu-repurpose-__percpu-tag-as-a-named-address.patch \
"
# Use :append here so that the patch is applied also when using devupstream
SRC_URI:append = " file://0001-src-Kbuild-change-missing-CONFIG_TRACEPOINTS-to-warn.patch \
"
-
-SRC_URI[sha256sum] = "06d704633749039f8fa72a954bec6486058386e2a0c3557b22c484698f9b34d5"
+SRC_URI[sha256sum] = "f2261e738b1dd1027640e5ba3040dee292241b847d5745766b3ba640e168c94a"
export INSTALL_MOD_DIR = "kernel/lttng-modules"
--
2.39.2
^ permalink raw reply related [flat|nested] 15+ messages in thread
* [PATCH 7/8] linux-yocto/6.12: update to v6.12.41
2025-08-13 20:49 [PATCH 0/8] kernel: consolidated pull request bruce.ashfield
` (5 preceding siblings ...)
2025-08-13 20:49 ` [PATCH 6/8] lttng-modules: update to v2.14.0 bruce.ashfield
@ 2025-08-13 20:49 ` bruce.ashfield
2025-08-13 20:49 ` [PATCH 8/8] linux-yocto/6.12: update CVE exclusions (6.12.41) bruce.ashfield
7 siblings, 0 replies; 15+ messages in thread
From: bruce.ashfield @ 2025-08-13 20:49 UTC (permalink / raw)
To: richard.purdie; +Cc: openembedded-core
From: Bruce Ashfield <bruce.ashfield@gmail.com>
Updating linux-yocto/6.12 to the latest korg -stable release that comprises
the following commits:
no ids found, dumping:
8f5ff9784f32 Linux 6.12.41
c0c21293d0c2 mm: khugepaged: fix call hpage_collapse_scan_file() for anonymous vma
c60f5156e62d KVM: x86: Free vCPUs before freeing VM state
d8b3dfd4d36c Revert "drm/xe/forcewake: Add a helper xe_force_wake_ref_has_domain()"
ffbedb4ad984 Revert "drm/xe/devcoredump: Update handling of xe_force_wake_get return"
5a276d341c8e Revert "drm/xe/tests/mocs: Update xe_force_wake_get() return handling"
c72303e7eb49 Revert "drm/xe/gt: Update handling of xe_force_wake_get return"
69fbb3f1740b drm/i915/dp: Fix 2.7 Gbps DP_LINK_BW value on g4x
bc9abdf6bce8 ALSA: hda: Add missing NVIDIA HDA codec IDs
beb314a55e1e ALSA: hda/tegra: Add Tegra264 support
c7f864d34529 Drivers: hv: Make the sysfs node size for the ring buffer dynamic
beddf74e4064 ARM: 9448/1: Use an absolute path to unified.h in KBUILD_AFLAGS
90d5cd64f46d iio: hid-sensor-prox: Fix incorrect OFFSET calculation
05847477ff8a iio: hid-sensor-prox: Restore lost scale assignments
86dca1cb4804 wifi: mt76: mt7925: adjust rm BSS flow to prevent next connection failure
b63eb95856c0 Revert "wifi: mt76: mt7925: Update mt7925_mcu_uni_[tx,rx]_ba for MLO"
98937588ff9c arm64: dts: qcom: x1-crd: Fix vreg_l2j_1p2 voltage
3d12349ade54 x86/hyperv: Fix APIC ID and VP index confusion in hv_snp_boot_ap()
f1b3ad11ec11 KVM: x86/hyper-v: Skip non-canonical addresses during PV TLB flush
d483bf624f22 KVM: x86: model canonical checks more precisely
c0c82c2adc22 KVM: x86: Add X86EMUL_F_MSR and X86EMUL_F_DT_LOAD to aid canonical checks
62dd9132a458 KVM: x86: Route non-canonical checks in emulator through emulate_ops
94620f95f6cd KVM: x86: drop x86.h include from cpuid.h
a4d60ba277ec ext4: fix out of bounds punch offset
51492e99894a ext4: correct the error handle in ext4_fallocate()
85defb9933f6 ext4: fix incorrect punch max_end
35bd33e3ef09 ext4: move out common parts into ext4_fallocate()
8a98313caa3a ext4: move out inode_lock into ext4_fallocate()
1697ca500a84 ext4: factor out ext4_do_fallocate()
2cbc4d640d40 ext4: refactor ext4_insert_range()
8bb93d988212 ext4: refactor ext4_collapse_range()
db1fcf7fd51c ext4: refactor ext4_zero_range()
33f61ecabb10 ext4: refactor ext4_punch_hole()
d9116d28538a ext4: don't explicit update times in ext4_fallocate()
a5ae7fa30cd9 erofs: fix large fragment handling
41485d7c637b erofs: clean up header parsing for ztailpacking and fragments
f9b2cb6fff33 erofs: simplify tail inline pcluster handling
516fabf34173 erofs: use Z_EROFS_LCLUSTER_TYPE_MAX to simplify switches
9a84e212e334 erofs: refine z_erofs_get_extent_compressedlen()
4d0f12dc8335 erofs: simplify z_erofs_load_compact_lcluster()
1e5a88732ace arm64: dts: qcom: x1e78100-t14s: mark l12b and l15b always-on
4a7b64ba0cca mtd: rawnand: qcom: Fix last codeword read in qcom_param_page_type_exec()
a1bc9a394a27 crypto: powerpc/poly1305 - add depends on BROKEN for now
b49b543f4e0b comedi: comedi_test: Fix possible deletion of uninitialized timers
28419a4f3a1e jfs: reject on-disk inodes of an unsupported type
3ad50c7c66cc x86/bugs: Fix use of possibly uninit value in amd_check_tsa_microcode()
b85815675fc5 spi: cadence-quadspi: fix cleanup of rx_chan on failure paths
a7c6de9f8467 usb: typec: tcpm: apply vbus before data bringup in tcpm_src_attach
27e423886a7a usb: typec: tcpm: allow switching to mode accessory to mux properly
a9a1eb410f35 usb: typec: tcpm: allow to use sink in accessory mode
77a4a907cc53 selftests/bpf: Add tests with stack ptr register in conditional jmp
bafb375c4606 rust: give Clippy the minimum supported Rust version
4c8f15e770fb mm/zsmalloc: do not pass __GFP_MOVABLE if CONFIG_COMPACTION=n
656eaddbc952 mm/vmscan: fix hwpoisoned large folio handling in shrink_folio_list
140edd5adf6d selftests: mptcp: connect: also cover checksum
219c4eb6c3f0 selftests: mptcp: connect: also cover alt modes
1bff28ea4b11 resource: fix false warning in __request_region()
79663a15a1c7 nilfs2: reject invalid file types when reading inodes
27e740614df8 kasan: use vmalloc_dump_obj() for vmalloc error reports
0fde7dccbf4c ice: Fix a null pointer dereference in ice_copy_and_init_pkg()
44af78621c09 gve: Fix stuck TX queue for DQ queue format
50c61f55b6b9 e1000e: ignore uninitialized checksum word on tgp
78328fad6c49 e1000e: disregard NVM checksum on tgp when valid checksum bit is not set
a3bba0205830 dpaa2-switch: Fix device reference count leak in MAC endpoint handling
4dd56cabfbe5 dpaa2-eth: Fix device reference count leak in MAC endpoint handling
708fd522b86d arm64/entry: Mask DAIF in cpu_switch_to(), call_on_irq_stack()
060a28e39053 ALSA: hda/realtek - Add mute LED support for HP Victus 15-fa0xxx
d3f60054b6a0 ALSA: hda/realtek - Add mute LED support for HP Pavilion 15-eg0xxx
ba8e8a8a2e19 sprintf.h requires stdarg.h
cf8e62f6e1b2 bus: fsl-mc: Fix potential double device reference in fsl_mc_get_endpoint()
5b8d6cb9a03d i2c: virtio: Avoid hang by using interruptible completion wait
5622108c3041 i2c: tegra: Fix reset error handling with ACPI
42c4471b30fa i2c: qup: jump out of the loop in case of timeout
9ea8a9ebbea8 timekeeping: Zero initialize system_counterval when querying time from phc drivers
6ed79cf1183a ARM: 9450/1: Fix allowing linker DCE with binutils < 2.36
f7ff03247600 mm/ksm: fix -Wsometimes-uninitialized from clang-21 in advisor_mode_show()
f5ee8a39f03e drm/sched: Remove optimization that causes hang when killing dependent jobs
198604687f19 drm/amdgpu: Reset the clear flag in buddy during resume
d2a6a3543fd2 platform/x86: ideapad-laptop: Fix kbd backlight not remembered among boots
616ca3c4d11e platform/x86: ideapad-laptop: Fix FnLock not remembered among boots
4de81eb46284 net: hns3: default enable tx bounce buffer when smmu enabled
68494b2ca295 net: hns3: fixed vf get max channels bug
952cd60f695b net: hns3: disable interrupt when ptp init failed
7676d652801c net: hns3: fix concurrent setting vlan filter issue
1194ad0d44d6 s390/ism: fix concurrency management in ism_cmd()
de5aaea0384c selftests: drv-net: wait for iperf client to stop sending
61baf2a43d45 ALSA: hda/realtek: Fix mute LED mask on HP OMEN 16 laptop
5c25b4f2769e drm/bridge: ti-sn65dsi86: Remove extra semicolon in ti_sn_bridge_probe()
0ca816a96fdc can: netlink: can_changelink(): fix NULL pointer deref of struct can_priv::do_set_mode
11a2eadf0bd2 net/sched: sch_qfq: Avoid triggering might_sleep in atomic context in qfq_delete_class
5f02ea0f63dd net: appletalk: Fix use-after-free in AARP proxy probe
18617f4063e5 i40e: When removing VF MAC filters, only check PF-set MAC
dc08e1772566 i40e: report VF tx_dropped with tx_errors instead of tx_discards
ebd24581e055 net/mlx5: E-Switch, Fix peer miss rules to use peer eswitch
6b1f7194d02c net/mlx5: Fix memory leak in cmd_exec()
07759e28a3b5 net: ti: icssg-prueth: Fix buffer allocation for ICSSG
1dc0ed16cfbc ASoC: mediatek: mt8365-dai-i2s: pass correct size to mt8365_dai_set_priv
5918c3f4800a xfrm: interface: fix use-after-free after changing collect_md xfrm interface
07ab45902446 xfrm: Set transport header to fix UDP GRO handling
085f24f0be55 xfrm: state: use a consistent pcpu_id in xfrm_state_find
6bf2daafc51b xfrm: state: initialize state_ptrs earlier in xfrm_state_find
80d66be8a04f staging: vchiq_arm: Make vchiq_shutdown never fail
0fb8478fb0ea platform/x86: Fix initialization order for firmware_attributes_class
9128b2dbe510 x86/hyperv: Fix usage of cpu_online_mask to get valid cpu
ef3bee8d1da1 tools/hv: fcopy: Fix incorrect file path conversion
8a1fbb642b74 platform/mellanox: mlxbf-pmc: Use kstrtobool() to check 0/1 input
d38e1e0a64a9 platform/mellanox: mlxbf-pmc: Validate event/enable input
f0580af3d3ec platform/mellanox: mlxbf-pmc: Remove newline char from event name input
1b102d2cc4bc regmap: fix potential memory leak of regmap_bus
be4f30f7c178 iio: adc: ad7949: use spi_is_bpw_supported()
5aa9a2d57899 interconnect: qcom: sc7280: Add missing num_links to xm_pcie3_1 node
3fd782ceabea RDMA/core: Rate limit GID cache warning messages
96876f6e859e platform/x86: asus-nb-wmi: add DMI quirk for ASUS Zenbook Duo UX8406CA
5d4261dbb333 regulator: core: fix NULL dereference on unbind due to stale coupling data
bf812206f2d0 virtio_ring: Fix error reporting in virtqueue_resize
30ce52f1616e virtio_net: Enforce minimum TX ring size for reliability
a7b79db25846 Input: gpio-keys - fix a sleep while atomic with PREEMPT_RT
2bf554c820f1 x86/traps: Initialize DR7 by writing its architectural reset value
Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
---
.../linux/linux-yocto-rt_6.12.bb | 6 ++--
.../linux/linux-yocto-tiny_6.12.bb | 6 ++--
meta/recipes-kernel/linux/linux-yocto_6.12.bb | 28 +++++++++----------
3 files changed, 20 insertions(+), 20 deletions(-)
diff --git a/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb b/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb
index fdb0caa943..72525d8764 100644
--- a/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb
+++ b/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb
@@ -14,13 +14,13 @@ python () {
raise bb.parse.SkipRecipe("Set PREFERRED_PROVIDER_virtual/kernel to linux-yocto-rt to enable it")
}
-SRCREV_machine ?= "96c3b8967c299edb7c8fd1beff358624e3aac443"
-SRCREV_meta ?= "52dd739a32215ffca801bc40daebee19a01b6f20"
+SRCREV_machine ?= "a40a131df6cba8f7ff468416f0cbe8e694974c8c"
+SRCREV_meta ?= "57f788e849d9b04dd6aa28b896546c56b45f69e7"
SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;branch=${KBRANCH};name=machine;protocol=https \
git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.12;destsuffix=${KMETA};protocol=https"
-LINUX_VERSION ?= "6.12.40"
+LINUX_VERSION ?= "6.12.41"
LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46"
diff --git a/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb b/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb
index 3dccc9e723..733b163c77 100644
--- a/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb
+++ b/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb
@@ -8,7 +8,7 @@ require recipes-kernel/linux/linux-yocto.inc
# CVE exclusions
include recipes-kernel/linux/cve-exclusion_6.12.inc
-LINUX_VERSION ?= "6.12.40"
+LINUX_VERSION ?= "6.12.41"
LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46"
DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}"
@@ -17,8 +17,8 @@ DEPENDS += "openssl-native util-linux-native"
KMETA = "kernel-meta"
KCONF_BSP_AUDIT_LEVEL = "2"
-SRCREV_machine ?= "50893c3858cc7bbc15a174f06fa30fba25306cac"
-SRCREV_meta ?= "52dd739a32215ffca801bc40daebee19a01b6f20"
+SRCREV_machine ?= "4137e9dd62e47f0f7472c7f0dfcbef5f8929f280"
+SRCREV_meta ?= "57f788e849d9b04dd6aa28b896546c56b45f69e7"
PV = "${LINUX_VERSION}+git"
diff --git a/meta/recipes-kernel/linux/linux-yocto_6.12.bb b/meta/recipes-kernel/linux/linux-yocto_6.12.bb
index c58e5f07f4..3c27a7e719 100644
--- a/meta/recipes-kernel/linux/linux-yocto_6.12.bb
+++ b/meta/recipes-kernel/linux/linux-yocto_6.12.bb
@@ -18,25 +18,25 @@ KBRANCH:qemux86.104 ?= "v6.12/standard/base"
KBRANCH:qemuloongarch64 ?= "v6.12/standard/base"
KBRANCH:qemumips64 ?= "v6.12/standard/mti-malta64"
-SRCREV_machine:qemuarm ?= "3884ae3c574f932b6cfe528f86c83214c2e8a36e"
-SRCREV_machine:qemuarm64 ?= "50893c3858cc7bbc15a174f06fa30fba25306cac"
-SRCREV_machine:qemuloongarch64 ?= "50893c3858cc7bbc15a174f06fa30fba25306cac"
-SRCREV_machine:qemumips ?= "39d23e283ab644b5a8758046130b8c22847176f8"
-SRCREV_machine:qemuppc ?= "50893c3858cc7bbc15a174f06fa30fba25306cac"
-SRCREV_machine:qemuriscv64 ?= "50893c3858cc7bbc15a174f06fa30fba25306cac"
-SRCREV_machine:qemuriscv32 ?= "50893c3858cc7bbc15a174f06fa30fba25306cac"
-SRCREV_machine:qemux86 ?= "50893c3858cc7bbc15a174f06fa30fba25306cac"
-SRCREV_machine:qemux86-64 ?= "50893c3858cc7bbc15a174f06fa30fba25306cac"
-SRCREV_machine:qemumips64 ?= "3cf1294a14f4a23376b86201ab5bdff6159102ad"
-SRCREV_machine ?= "50893c3858cc7bbc15a174f06fa30fba25306cac"
-SRCREV_meta ?= "52dd739a32215ffca801bc40daebee19a01b6f20"
+SRCREV_machine:qemuarm ?= "01bbdad6b55cc37010a721899318f591ba5f09a6"
+SRCREV_machine:qemuarm64 ?= "4137e9dd62e47f0f7472c7f0dfcbef5f8929f280"
+SRCREV_machine:qemuloongarch64 ?= "4137e9dd62e47f0f7472c7f0dfcbef5f8929f280"
+SRCREV_machine:qemumips ?= "aa348bdab88ee1c6358af8e3b9d210738884a8f6"
+SRCREV_machine:qemuppc ?= "4137e9dd62e47f0f7472c7f0dfcbef5f8929f280"
+SRCREV_machine:qemuriscv64 ?= "4137e9dd62e47f0f7472c7f0dfcbef5f8929f280"
+SRCREV_machine:qemuriscv32 ?= "4137e9dd62e47f0f7472c7f0dfcbef5f8929f280"
+SRCREV_machine:qemux86 ?= "4137e9dd62e47f0f7472c7f0dfcbef5f8929f280"
+SRCREV_machine:qemux86-64 ?= "4137e9dd62e47f0f7472c7f0dfcbef5f8929f280"
+SRCREV_machine:qemumips64 ?= "d3850d4a70821a2d63be812b316ca0d05c2c0c24"
+SRCREV_machine ?= "4137e9dd62e47f0f7472c7f0dfcbef5f8929f280"
+SRCREV_meta ?= "57f788e849d9b04dd6aa28b896546c56b45f69e7"
# set your preferred provider of linux-yocto to 'linux-yocto-upstream', and you'll
# get the <version>/base branch, which is pure upstream -stable, and the same
# meta SRCREV as the linux-yocto-standard builds. Select your version using the
# normal PREFERRED_VERSION settings.
BBCLASSEXTEND = "devupstream:target"
-SRCREV_machine:class-devupstream ?= "d90ecb2b1308b3e362ec4c21ff7cf0a051b445df"
+SRCREV_machine:class-devupstream ?= "8f5ff9784f3262e6e85c68d86f8b7931827f2983"
PN:class-devupstream = "linux-yocto-upstream"
KBRANCH:class-devupstream = "v6.12/base"
@@ -44,7 +44,7 @@ SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;name=machine;branch=${KBRA
git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.12;destsuffix=${KMETA};protocol=https"
LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46"
-LINUX_VERSION ?= "6.12.40"
+LINUX_VERSION ?= "6.12.41"
PV = "${LINUX_VERSION}+git"
--
2.39.2
^ permalink raw reply related [flat|nested] 15+ messages in thread
* [PATCH 8/8] linux-yocto/6.12: update CVE exclusions (6.12.41)
2025-08-13 20:49 [PATCH 0/8] kernel: consolidated pull request bruce.ashfield
` (6 preceding siblings ...)
2025-08-13 20:49 ` [PATCH 7/8] linux-yocto/6.12: update to v6.12.41 bruce.ashfield
@ 2025-08-13 20:49 ` bruce.ashfield
7 siblings, 0 replies; 15+ messages in thread
From: bruce.ashfield @ 2025-08-13 20:49 UTC (permalink / raw)
To: richard.purdie; +Cc: openembedded-core
From: Bruce Ashfield <bruce.ashfield@gmail.com>
Data pulled from: https://github.com/CVEProject/cvelistV5
1/1 [
Author: cvelistV5 Github Action
Email: github_action@example.com
Subject: 3 changes (2 new | 1 updated): - 2 new CVEs: CVE-2025-8707, CVE-2025-8708 - 1 updated CVEs: CVE-2025-2586
Date: Fri, 8 Aug 2025 02:36:59 +0000
]
Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
---
.../linux/cve-exclusion_6.12.inc | 346 ++++++++++++++++--
1 file changed, 317 insertions(+), 29 deletions(-)
diff --git a/meta/recipes-kernel/linux/cve-exclusion_6.12.inc b/meta/recipes-kernel/linux/cve-exclusion_6.12.inc
index ee2f30b3db..a110f89af1 100644
--- a/meta/recipes-kernel/linux/cve-exclusion_6.12.inc
+++ b/meta/recipes-kernel/linux/cve-exclusion_6.12.inc
@@ -1,11 +1,11 @@
# Auto-generated CVE metadata, DO NOT EDIT BY HAND.
-# Generated at 2025-07-25 02:49:32.259439+00:00 for kernel version 6.12.40
-# From linux_kernel_cves cve_2025-07-25_0100Z-1-g854b2f05e2c
+# Generated at 2025-08-08 02:45:44.343204+00:00 for kernel version 6.12.41
+# From linux_kernel_cves cve_2025-08-08_0100Z-2-g05f2a09f419
python check_kernel_cve_status_version() {
- this_version = "6.12.40"
+ this_version = "6.12.41"
kernel_version = d.getVar("LINUX_VERSION")
if kernel_version != this_version:
bb.warn("Kernel CVE status needs updating: generated for %s but kernel is %s" % (this_version, kernel_version))
@@ -13394,7 +13394,7 @@ CVE_STATUS[CVE-2025-37923] = "cpe-stable-backport: Backported in 6.12.28"
CVE_STATUS[CVE-2025-37924] = "cpe-stable-backport: Backported in 6.12.28"
-# CVE-2025-37925 needs backporting (fixed from 6.15)
+CVE_STATUS[CVE-2025-37925] = "cpe-stable-backport: Backported in 6.12.41"
CVE_STATUS[CVE-2025-37926] = "cpe-stable-backport: Backported in 6.12.28"
@@ -13510,7 +13510,7 @@ CVE_STATUS[CVE-2025-37982] = "cpe-stable-backport: Backported in 6.12.25"
CVE_STATUS[CVE-2025-37983] = "cpe-stable-backport: Backported in 6.12.26"
-# CVE-2025-37984 needs backporting (fixed from 6.15)
+CVE_STATUS[CVE-2025-37984] = "cpe-stable-backport: Backported in 6.12.39"
CVE_STATUS[CVE-2025-37985] = "cpe-stable-backport: Backported in 6.12.26"
@@ -13746,7 +13746,7 @@ CVE_STATUS[CVE-2025-38103] = "cpe-stable-backport: Backported in 6.12.34"
CVE_STATUS[CVE-2025-38104] = "cpe-stable-backport: Backported in 6.12.39"
-# CVE-2025-38105 needs backporting (fixed from 6.16rc1)
+# CVE-2025-38105 needs backporting (fixed from 6.16)
CVE_STATUS[CVE-2025-38106] = "cpe-stable-backport: Backported in 6.12.34"
@@ -13800,7 +13800,7 @@ CVE_STATUS[CVE-2025-38130] = "fixed-version: only affects 6.14 onwards"
CVE_STATUS[CVE-2025-38131] = "cpe-stable-backport: Backported in 6.12.34"
-# CVE-2025-38132 needs backporting (fixed from 6.16rc1)
+# CVE-2025-38132 needs backporting (fixed from 6.16)
CVE_STATUS[CVE-2025-38133] = "fixed-version: only affects 6.15 onwards"
@@ -13810,13 +13810,13 @@ CVE_STATUS[CVE-2025-38135] = "cpe-stable-backport: Backported in 6.12.34"
CVE_STATUS[CVE-2025-38136] = "cpe-stable-backport: Backported in 6.12.34"
-# CVE-2025-38137 needs backporting (fixed from 6.16rc1)
+# CVE-2025-38137 needs backporting (fixed from 6.16)
CVE_STATUS[CVE-2025-38138] = "cpe-stable-backport: Backported in 6.12.34"
CVE_STATUS[CVE-2025-38139] = "cpe-stable-backport: Backported in 6.12.37"
-# CVE-2025-38140 needs backporting (fixed from 6.16rc1)
+# CVE-2025-38140 needs backporting (fixed from 6.16)
CVE_STATUS[CVE-2025-38141] = "cpe-stable-backport: Backported in 6.12.34"
@@ -13892,8 +13892,6 @@ CVE_STATUS[CVE-2025-38176] = "fixed-version: only affects 6.14 onwards"
CVE_STATUS[CVE-2025-38177] = "cpe-stable-backport: Backported in 6.12.28"
-CVE_STATUS[CVE-2025-38178] = "fixed-version: only affects 6.16rc1 onwards"
-
CVE_STATUS[CVE-2025-38179] = "cpe-stable-backport: Backported in 6.12.35"
CVE_STATUS[CVE-2025-38180] = "cpe-stable-backport: Backported in 6.12.35"
@@ -13910,7 +13908,7 @@ CVE_STATUS[CVE-2025-38185] = "cpe-stable-backport: Backported in 6.12.35"
CVE_STATUS[CVE-2025-38186] = "cpe-stable-backport: Backported in 6.12.35"
-# CVE-2025-38187 needs backporting (fixed from 6.16rc3)
+# CVE-2025-38187 needs backporting (fixed from 6.16)
CVE_STATUS[CVE-2025-38188] = "cpe-stable-backport: Backported in 6.12.35"
@@ -13934,7 +13932,7 @@ CVE_STATUS[CVE-2025-38197] = "cpe-stable-backport: Backported in 6.12.35"
CVE_STATUS[CVE-2025-38198] = "cpe-stable-backport: Backported in 6.12.35"
-# CVE-2025-38199 needs backporting (fixed from 6.16rc1)
+# CVE-2025-38199 needs backporting (fixed from 6.16)
CVE_STATUS[CVE-2025-38200] = "cpe-stable-backport: Backported in 6.12.35"
@@ -13942,15 +13940,15 @@ CVE_STATUS[CVE-2025-38201] = "cpe-stable-backport: Backported in 6.12.35"
CVE_STATUS[CVE-2025-38202] = "cpe-stable-backport: Backported in 6.12.35"
-# CVE-2025-38203 needs backporting (fixed from 6.16rc1)
+# CVE-2025-38203 needs backporting (fixed from 6.16)
-# CVE-2025-38204 needs backporting (fixed from 6.16rc1)
+# CVE-2025-38204 needs backporting (fixed from 6.16)
-# CVE-2025-38205 needs backporting (fixed from 6.16rc1)
+# CVE-2025-38205 needs backporting (fixed from 6.16)
-# CVE-2025-38206 needs backporting (fixed from 6.16rc1)
+# CVE-2025-38206 needs backporting (fixed from 6.16)
-# CVE-2025-38207 needs backporting (fixed from 6.16rc1)
+# CVE-2025-38207 needs backporting (fixed from 6.16)
CVE_STATUS[CVE-2025-38208] = "cpe-stable-backport: Backported in 6.12.35"
@@ -14004,13 +14002,13 @@ CVE_STATUS[CVE-2025-38232] = "cpe-stable-backport: Backported in 6.12.35"
CVE_STATUS[CVE-2025-38233] = "fixed-version: only affects 6.13 onwards"
-# CVE-2025-38234 needs backporting (fixed from 6.16rc1)
+# CVE-2025-38234 needs backporting (fixed from 6.16)
CVE_STATUS[CVE-2025-38235] = "fixed-version: only affects 6.15 onwards"
CVE_STATUS[CVE-2025-38236] = "cpe-stable-backport: Backported in 6.12.36"
-# CVE-2025-38237 needs backporting (fixed from 6.16rc1)
+# CVE-2025-38237 needs backporting (fixed from 6.16)
CVE_STATUS[CVE-2025-38238] = "fixed-version: only affects 6.14 onwards"
@@ -14032,7 +14030,7 @@ CVE_STATUS[CVE-2025-38246] = "cpe-stable-backport: Backported in 6.12.36"
CVE_STATUS[CVE-2025-38247] = "fixed-version: only affects 6.15 onwards"
-# CVE-2025-38248 needs backporting (fixed from 6.16rc4)
+# CVE-2025-38248 needs backporting (fixed from 6.16)
CVE_STATUS[CVE-2025-38249] = "cpe-stable-backport: Backported in 6.12.36"
@@ -14058,7 +14056,7 @@ CVE_STATUS[CVE-2025-38259] = "cpe-stable-backport: Backported in 6.12.36"
CVE_STATUS[CVE-2025-38260] = "cpe-stable-backport: Backported in 6.12.36"
-# CVE-2025-38261 needs backporting (fixed from 6.16rc1)
+# CVE-2025-38261 needs backporting (fixed from 6.16)
CVE_STATUS[CVE-2025-38262] = "cpe-stable-backport: Backported in 6.12.36"
@@ -14080,7 +14078,7 @@ CVE_STATUS[CVE-2025-38270] = "cpe-stable-backport: Backported in 6.12.34"
CVE_STATUS[CVE-2025-38271] = "fixed-version: only affects 6.15 onwards"
-# CVE-2025-38272 needs backporting (fixed from 6.16rc1)
+# CVE-2025-38272 needs backporting (fixed from 6.16)
CVE_STATUS[CVE-2025-38273] = "cpe-stable-backport: Backported in 6.12.34"
@@ -14104,7 +14102,7 @@ CVE_STATUS[CVE-2025-38282] = "cpe-stable-backport: Backported in 6.12.34"
CVE_STATUS[CVE-2025-38283] = "cpe-stable-backport: Backported in 6.12.34"
-# CVE-2025-38284 needs backporting (fixed from 6.16rc1)
+# CVE-2025-38284 needs backporting (fixed from 6.16)
CVE_STATUS[CVE-2025-38285] = "cpe-stable-backport: Backported in 6.12.34"
@@ -14148,7 +14146,7 @@ CVE_STATUS[CVE-2025-38304] = "cpe-stable-backport: Backported in 6.12.34"
CVE_STATUS[CVE-2025-38305] = "cpe-stable-backport: Backported in 6.12.34"
-# CVE-2025-38306 needs backporting (fixed from 6.16rc1)
+# CVE-2025-38306 needs backporting (fixed from 6.16)
CVE_STATUS[CVE-2025-38307] = "cpe-stable-backport: Backported in 6.12.34"
@@ -14158,7 +14156,7 @@ CVE_STATUS[CVE-2025-38309] = "fixed-version: only affects 6.15 onwards"
CVE_STATUS[CVE-2025-38310] = "cpe-stable-backport: Backported in 6.12.34"
-# CVE-2025-38311 needs backporting (fixed from 6.16rc1)
+# CVE-2025-38311 needs backporting (fixed from 6.16)
CVE_STATUS[CVE-2025-38312] = "cpe-stable-backport: Backported in 6.12.34"
@@ -14180,7 +14178,7 @@ CVE_STATUS[CVE-2025-38320] = "cpe-stable-backport: Backported in 6.12.35"
CVE_STATUS[CVE-2025-38321] = "cpe-stable-backport: Backported in 6.12.35"
-CVE_STATUS[CVE-2025-38322] = "fixed-version: only affects 6.15 onwards"
+# CVE-2025-38322 needs backporting (fixed from 6.16)
CVE_STATUS[CVE-2025-38323] = "cpe-stable-backport: Backported in 6.12.35"
@@ -14206,7 +14204,7 @@ CVE_STATUS[CVE-2025-38333] = "cpe-stable-backport: Backported in 6.12.35"
CVE_STATUS[CVE-2025-38334] = "cpe-stable-backport: Backported in 6.12.35"
-# CVE-2025-38335 needs backporting (fixed from 6.16rc1)
+CVE_STATUS[CVE-2025-38335] = "cpe-stable-backport: Backported in 6.12.41"
CVE_STATUS[CVE-2025-38336] = "cpe-stable-backport: Backported in 6.12.35"
@@ -14238,12 +14236,302 @@ CVE_STATUS[CVE-2025-38349] = "cpe-stable-backport: Backported in 6.12.39"
CVE_STATUS[CVE-2025-38350] = "cpe-stable-backport: Backported in 6.12.37"
-# CVE-2025-38351 needs backporting (fixed from 6.16rc6)
+CVE_STATUS[CVE-2025-38351] = "cpe-stable-backport: Backported in 6.12.41"
CVE_STATUS[CVE-2025-38352] = "cpe-stable-backport: Backported in 6.12.34"
+CVE_STATUS[CVE-2025-38353] = "cpe-stable-backport: Backported in 6.12.36"
+
+CVE_STATUS[CVE-2025-38354] = "cpe-stable-backport: Backported in 6.12.36"
+
+CVE_STATUS[CVE-2025-38355] = "cpe-stable-backport: Backported in 6.12.36"
+
+CVE_STATUS[CVE-2025-38356] = "cpe-stable-backport: Backported in 6.12.37"
+
+CVE_STATUS[CVE-2025-38357] = "fixed-version: only affects 6.15 onwards"
+
+CVE_STATUS[CVE-2025-38358] = "fixed-version: only affects 6.15 onwards"
+
+# CVE-2025-38359 needs backporting (fixed from 6.16)
+
+CVE_STATUS[CVE-2025-38360] = "cpe-stable-backport: Backported in 6.12.37"
+
+CVE_STATUS[CVE-2025-38361] = "cpe-stable-backport: Backported in 6.12.36"
+
+CVE_STATUS[CVE-2025-38362] = "cpe-stable-backport: Backported in 6.12.36"
+
+CVE_STATUS[CVE-2025-38363] = "cpe-stable-backport: Backported in 6.12.36"
+
+CVE_STATUS[CVE-2025-38364] = "cpe-stable-backport: Backported in 6.12.36"
+
+CVE_STATUS[CVE-2025-38365] = "cpe-stable-backport: Backported in 6.12.36"
+
+CVE_STATUS[CVE-2025-38366] = "fixed-version: only affects 6.13 onwards"
+
+CVE_STATUS[CVE-2025-38367] = "fixed-version: only affects 6.13 onwards"
+
+CVE_STATUS[CVE-2025-38368] = "cpe-stable-backport: Backported in 6.12.36"
+
+CVE_STATUS[CVE-2025-38369] = "cpe-stable-backport: Backported in 6.12.36"
+
+CVE_STATUS[CVE-2025-38370] = "fixed-version: only affects 6.14 onwards"
+
+CVE_STATUS[CVE-2025-38371] = "cpe-stable-backport: Backported in 6.12.37"
+
+CVE_STATUS[CVE-2025-38372] = "cpe-stable-backport: Backported in 6.12.37"
+
+CVE_STATUS[CVE-2025-38373] = "cpe-stable-backport: Backported in 6.12.37"
+
+CVE_STATUS[CVE-2025-38374] = "cpe-stable-backport: Backported in 6.12.37"
+
+CVE_STATUS[CVE-2025-38375] = "cpe-stable-backport: Backported in 6.12.37"
+
+CVE_STATUS[CVE-2025-38376] = "cpe-stable-backport: Backported in 6.12.37"
+
+CVE_STATUS[CVE-2025-38377] = "cpe-stable-backport: Backported in 6.12.37"
+
+CVE_STATUS[CVE-2025-38378] = "fixed-version: only affects 6.15 onwards"
+
+CVE_STATUS[CVE-2025-38379] = "cpe-stable-backport: Backported in 6.12.37"
+
+CVE_STATUS[CVE-2025-38380] = "cpe-stable-backport: Backported in 6.12.37"
+
+CVE_STATUS[CVE-2025-38381] = "cpe-stable-backport: Backported in 6.12.37"
+
+CVE_STATUS[CVE-2025-38382] = "cpe-stable-backport: Backported in 6.12.37"
+
+CVE_STATUS[CVE-2025-38383] = "cpe-stable-backport: Backported in 6.12.37"
+
+CVE_STATUS[CVE-2025-38384] = "cpe-stable-backport: Backported in 6.12.37"
+
+CVE_STATUS[CVE-2025-38385] = "cpe-stable-backport: Backported in 6.12.37"
+
+CVE_STATUS[CVE-2025-38386] = "cpe-stable-backport: Backported in 6.12.37"
+
+CVE_STATUS[CVE-2025-38387] = "cpe-stable-backport: Backported in 6.12.37"
+
+CVE_STATUS[CVE-2025-38388] = "cpe-stable-backport: Backported in 6.12.37"
+
+CVE_STATUS[CVE-2025-38389] = "cpe-stable-backport: Backported in 6.12.37"
+
+CVE_STATUS[CVE-2025-38390] = "cpe-stable-backport: Backported in 6.12.37"
+
+CVE_STATUS[CVE-2025-38391] = "cpe-stable-backport: Backported in 6.12.37"
+
+CVE_STATUS[CVE-2025-38392] = "cpe-stable-backport: Backported in 6.12.37"
+
+CVE_STATUS[CVE-2025-38393] = "cpe-stable-backport: Backported in 6.12.37"
+
+CVE_STATUS[CVE-2025-38394] = "fixed-version: only affects 6.15 onwards"
+
+CVE_STATUS[CVE-2025-38395] = "cpe-stable-backport: Backported in 6.12.37"
+
+CVE_STATUS[CVE-2025-38396] = "cpe-stable-backport: Backported in 6.12.37"
+
+CVE_STATUS[CVE-2025-38397] = "fixed-version: only affects 6.15 onwards"
+
+CVE_STATUS[CVE-2025-38398] = "fixed-version: only affects 6.15 onwards"
+
+CVE_STATUS[CVE-2025-38399] = "cpe-stable-backport: Backported in 6.12.37"
+
+CVE_STATUS[CVE-2025-38400] = "cpe-stable-backport: Backported in 6.12.37"
+
+CVE_STATUS[CVE-2025-38401] = "cpe-stable-backport: Backported in 6.12.37"
+
+CVE_STATUS[CVE-2025-38402] = "cpe-stable-backport: Backported in 6.12.37"
+
+CVE_STATUS[CVE-2025-38403] = "cpe-stable-backport: Backported in 6.12.37"
+
+CVE_STATUS[CVE-2025-38404] = "cpe-stable-backport: Backported in 6.12.37"
+
+CVE_STATUS[CVE-2025-38405] = "cpe-stable-backport: Backported in 6.12.37"
+
+CVE_STATUS[CVE-2025-38406] = "cpe-stable-backport: Backported in 6.12.37"
+
+CVE_STATUS[CVE-2025-38407] = "cpe-stable-backport: Backported in 6.12.37"
+
+CVE_STATUS[CVE-2025-38408] = "cpe-stable-backport: Backported in 6.12.37"
+
+CVE_STATUS[CVE-2025-38409] = "cpe-stable-backport: Backported in 6.12.37"
+
+CVE_STATUS[CVE-2025-38410] = "cpe-stable-backport: Backported in 6.12.37"
+
+CVE_STATUS[CVE-2025-38411] = "fixed-version: only affects 6.15.3 onwards"
+
+CVE_STATUS[CVE-2025-38412] = "cpe-stable-backport: Backported in 6.12.37"
+
+CVE_STATUS[CVE-2025-38413] = "cpe-stable-backport: Backported in 6.12.37"
+
+CVE_STATUS[CVE-2025-38414] = "cpe-stable-backport: Backported in 6.12.34"
+
+CVE_STATUS[CVE-2025-38415] = "cpe-stable-backport: Backported in 6.12.34"
+
+CVE_STATUS[CVE-2025-38416] = "cpe-stable-backport: Backported in 6.12.35"
+
+CVE_STATUS[CVE-2025-38417] = "cpe-stable-backport: Backported in 6.12.35"
+
+CVE_STATUS[CVE-2025-38418] = "cpe-stable-backport: Backported in 6.12.35"
+
+CVE_STATUS[CVE-2025-38419] = "cpe-stable-backport: Backported in 6.12.35"
+
+CVE_STATUS[CVE-2025-38420] = "cpe-stable-backport: Backported in 6.12.35"
+
+CVE_STATUS[CVE-2025-38421] = "fixed-version: only affects 6.14 onwards"
+
+CVE_STATUS[CVE-2025-38422] = "cpe-stable-backport: Backported in 6.12.35"
+
+CVE_STATUS[CVE-2025-38423] = "cpe-stable-backport: Backported in 6.12.35"
+
+CVE_STATUS[CVE-2025-38424] = "cpe-stable-backport: Backported in 6.12.35"
+
+CVE_STATUS[CVE-2025-38425] = "cpe-stable-backport: Backported in 6.12.35"
+
+# CVE-2025-38426 needs backporting (fixed from 6.16)
+
+CVE_STATUS[CVE-2025-38427] = "cpe-stable-backport: Backported in 6.12.35"
+
+CVE_STATUS[CVE-2025-38428] = "cpe-stable-backport: Backported in 6.12.35"
+
+CVE_STATUS[CVE-2025-38429] = "cpe-stable-backport: Backported in 6.12.35"
+
+CVE_STATUS[CVE-2025-38430] = "cpe-stable-backport: Backported in 6.12.35"
+
+CVE_STATUS[CVE-2025-38431] = "fixed-version: only affects 6.14 onwards"
+
+CVE_STATUS[CVE-2025-38432] = "fixed-version: only affects 6.15 onwards"
+
+CVE_STATUS[CVE-2025-38433] = "fixed-version: only affects 6.15 onwards"
+
+CVE_STATUS[CVE-2025-38434] = "cpe-stable-backport: Backported in 6.12.36"
+
+CVE_STATUS[CVE-2025-38435] = "fixed-version: only affects 6.14 onwards"
+
+CVE_STATUS[CVE-2025-38436] = "cpe-stable-backport: Backported in 6.12.36"
+
+CVE_STATUS[CVE-2025-38437] = "cpe-stable-backport: Backported in 6.12.39"
+
+CVE_STATUS[CVE-2025-38438] = "cpe-stable-backport: Backported in 6.12.39"
+
+CVE_STATUS[CVE-2025-38439] = "cpe-stable-backport: Backported in 6.12.39"
+
+CVE_STATUS[CVE-2025-38440] = "cpe-stable-backport: Backported in 6.12.39"
+
+CVE_STATUS[CVE-2025-38441] = "cpe-stable-backport: Backported in 6.12.39"
+
+CVE_STATUS[CVE-2025-38442] = "fixed-version: only affects 6.15 onwards"
+
+CVE_STATUS[CVE-2025-38443] = "cpe-stable-backport: Backported in 6.12.39"
+
+CVE_STATUS[CVE-2025-38444] = "cpe-stable-backport: Backported in 6.12.39"
+
+CVE_STATUS[CVE-2025-38445] = "cpe-stable-backport: Backported in 6.12.39"
+
+CVE_STATUS[CVE-2025-38446] = "cpe-stable-backport: Backported in 6.12.39"
+
+CVE_STATUS[CVE-2025-38447] = "fixed-version: only affects 6.15 onwards"
+
+CVE_STATUS[CVE-2025-38448] = "cpe-stable-backport: Backported in 6.12.39"
+
+CVE_STATUS[CVE-2025-38449] = "cpe-stable-backport: Backported in 6.12.39"
+
+CVE_STATUS[CVE-2025-38450] = "cpe-stable-backport: Backported in 6.12.39"
+
+CVE_STATUS[CVE-2025-38451] = "cpe-stable-backport: Backported in 6.12.39"
+
+CVE_STATUS[CVE-2025-38452] = "cpe-stable-backport: Backported in 6.12.39"
+
+# CVE-2025-38453 needs backporting (fixed from 6.16)
+
+CVE_STATUS[CVE-2025-38454] = "cpe-stable-backport: Backported in 6.12.39"
+
+CVE_STATUS[CVE-2025-38455] = "cpe-stable-backport: Backported in 6.12.39"
+
+CVE_STATUS[CVE-2025-38456] = "cpe-stable-backport: Backported in 6.12.39"
+
+CVE_STATUS[CVE-2025-38457] = "cpe-stable-backport: Backported in 6.12.39"
+
+CVE_STATUS[CVE-2025-38458] = "cpe-stable-backport: Backported in 6.12.39"
+
+CVE_STATUS[CVE-2025-38459] = "cpe-stable-backport: Backported in 6.12.39"
+
+CVE_STATUS[CVE-2025-38460] = "cpe-stable-backport: Backported in 6.12.39"
+
+CVE_STATUS[CVE-2025-38461] = "cpe-stable-backport: Backported in 6.12.39"
+
+CVE_STATUS[CVE-2025-38462] = "cpe-stable-backport: Backported in 6.12.39"
+
+CVE_STATUS[CVE-2025-38463] = "cpe-stable-backport: Backported in 6.12.39"
+
+CVE_STATUS[CVE-2025-38464] = "cpe-stable-backport: Backported in 6.12.39"
+
+CVE_STATUS[CVE-2025-38465] = "cpe-stable-backport: Backported in 6.12.39"
+
+CVE_STATUS[CVE-2025-38466] = "cpe-stable-backport: Backported in 6.12.39"
+
+CVE_STATUS[CVE-2025-38467] = "cpe-stable-backport: Backported in 6.12.39"
+
+CVE_STATUS[CVE-2025-38468] = "cpe-stable-backport: Backported in 6.12.40"
+
+CVE_STATUS[CVE-2025-38469] = "cpe-stable-backport: Backported in 6.12.40"
+
+CVE_STATUS[CVE-2025-38470] = "cpe-stable-backport: Backported in 6.12.40"
+
+CVE_STATUS[CVE-2025-38471] = "cpe-stable-backport: Backported in 6.12.40"
+
+CVE_STATUS[CVE-2025-38472] = "cpe-stable-backport: Backported in 6.12.40"
+
+CVE_STATUS[CVE-2025-38473] = "cpe-stable-backport: Backported in 6.12.40"
+
+CVE_STATUS[CVE-2025-38474] = "cpe-stable-backport: Backported in 6.12.40"
+
+CVE_STATUS[CVE-2025-38475] = "cpe-stable-backport: Backported in 6.12.40"
+
+CVE_STATUS[CVE-2025-38476] = "cpe-stable-backport: Backported in 6.12.40"
+
+CVE_STATUS[CVE-2025-38477] = "cpe-stable-backport: Backported in 6.12.40"
+
+CVE_STATUS[CVE-2025-38478] = "cpe-stable-backport: Backported in 6.12.40"
+
CVE_STATUS[CVE-2025-38479] = "cpe-stable-backport: Backported in 6.12.23"
+CVE_STATUS[CVE-2025-38480] = "cpe-stable-backport: Backported in 6.12.40"
+
+CVE_STATUS[CVE-2025-38481] = "cpe-stable-backport: Backported in 6.12.40"
+
+CVE_STATUS[CVE-2025-38482] = "cpe-stable-backport: Backported in 6.12.40"
+
+CVE_STATUS[CVE-2025-38483] = "cpe-stable-backport: Backported in 6.12.40"
+
+CVE_STATUS[CVE-2025-38484] = "cpe-stable-backport: Backported in 6.12.40"
+
+CVE_STATUS[CVE-2025-38485] = "cpe-stable-backport: Backported in 6.12.40"
+
+CVE_STATUS[CVE-2025-38486] = "fixed-version: only affects 6.15 onwards"
+
+CVE_STATUS[CVE-2025-38487] = "cpe-stable-backport: Backported in 6.12.40"
+
+CVE_STATUS[CVE-2025-38488] = "cpe-stable-backport: Backported in 6.12.40"
+
+CVE_STATUS[CVE-2025-38489] = "cpe-stable-backport: Backported in 6.12.40"
+
+CVE_STATUS[CVE-2025-38490] = "cpe-stable-backport: Backported in 6.12.40"
+
+CVE_STATUS[CVE-2025-38491] = "cpe-stable-backport: Backported in 6.12.40"
+
+CVE_STATUS[CVE-2025-38492] = "fixed-version: only affects 6.14 onwards"
+
+CVE_STATUS[CVE-2025-38493] = "cpe-stable-backport: Backported in 6.12.40"
+
+CVE_STATUS[CVE-2025-38494] = "cpe-stable-backport: Backported in 6.12.40"
+
+CVE_STATUS[CVE-2025-38495] = "cpe-stable-backport: Backported in 6.12.40"
+
+CVE_STATUS[CVE-2025-38496] = "cpe-stable-backport: Backported in 6.12.40"
+
+CVE_STATUS[CVE-2025-38497] = "cpe-stable-backport: Backported in 6.12.40"
+
+CVE_STATUS[CVE-2025-38498] = "cpe-stable-backport: Backported in 6.12.34"
+
CVE_STATUS[CVE-2025-38575] = "cpe-stable-backport: Backported in 6.12.23"
CVE_STATUS[CVE-2025-38637] = "cpe-stable-backport: Backported in 6.12.23"
--
2.39.2
^ permalink raw reply related [flat|nested] 15+ messages in thread
* Patchtest results for [PATCH 6/8] lttng-modules: update to v2.14.0
2025-08-13 20:49 ` [PATCH 6/8] lttng-modules: update to v2.14.0 bruce.ashfield
@ 2025-08-13 21:03 ` patchtest
0 siblings, 0 replies; 15+ messages in thread
From: patchtest @ 2025-08-13 21:03 UTC (permalink / raw)
To: bruce.ashfield; +Cc: openembedded-core
[-- Attachment #1: Type: text/plain, Size: 2922 bytes --]
Thank you for your submission. Patchtest identified one
or more issues with the patch. Please see the log below for
more information:
---
Testing patch /home/patchtest/share/mboxes/6-8-lttng-modules-update-to-v2.14.0.patch
FAIL: test lic files chksum modified not mentioned: LIC_FILES_CHKSUM changed without "License-Update:" tag and description in commit message (test_metadata.TestMetadata.test_lic_files_chksum_modified_not_mentioned)
PASS: pretest src uri left files (test_metadata.TestMetadata.pretest_src_uri_left_files)
PASS: test CVE check ignore (test_metadata.TestMetadata.test_cve_check_ignore)
PASS: test CVE tag format (test_patch.TestPatch.test_cve_tag_format)
PASS: test Signed-off-by presence (test_mbox.TestMbox.test_signed_off_by_presence)
PASS: test Signed-off-by presence (test_patch.TestPatch.test_signed_off_by_presence)
PASS: test Upstream-Status presence (test_patch.TestPatch.test_upstream_status_presence_format)
PASS: test author valid (test_mbox.TestMbox.test_author_valid)
PASS: test commit message presence (test_mbox.TestMbox.test_commit_message_presence)
PASS: test commit message user tags (test_mbox.TestMbox.test_commit_message_user_tags)
PASS: test max line length (test_metadata.TestMetadata.test_max_line_length)
PASS: test mbox format (test_mbox.TestMbox.test_mbox_format)
PASS: test non-AUH upgrade (test_mbox.TestMbox.test_non_auh_upgrade)
PASS: test shortlog format (test_mbox.TestMbox.test_shortlog_format)
PASS: test shortlog length (test_mbox.TestMbox.test_shortlog_length)
PASS: test src uri left files (test_metadata.TestMetadata.test_src_uri_left_files)
PASS: test target mailing list (test_mbox.TestMbox.test_target_mailing_list)
SKIP: pretest pylint: No python related patches, skipping test (test_python_pylint.PyLint.pretest_pylint)
SKIP: test bugzilla entry format: No bug ID found (test_mbox.TestMbox.test_bugzilla_entry_format)
SKIP: test lic files chksum presence: No added recipes, skipping test (test_metadata.TestMetadata.test_lic_files_chksum_presence)
SKIP: test license presence: No added recipes, skipping test (test_metadata.TestMetadata.test_license_presence)
SKIP: test pylint: No python related patches, skipping test (test_python_pylint.PyLint.test_pylint)
SKIP: test series merge on head: Merge test is disabled for now (test_mbox.TestMbox.test_series_merge_on_head)
SKIP: test summary presence: No added recipes, skipping test (test_metadata.TestMetadata.test_summary_presence)
---
Please address the issues identified and
submit a new revision of the patch, or alternatively, reply to this
email with an explanation of why the patch should be accepted. If you
believe these results are due to an error in patchtest, please submit a
bug at https://bugzilla.yoctoproject.org/ (use the 'Patchtest' category
under 'Yocto Project Subprojects'). For more information on specific
failures, see: https://wiki.yoctoproject.org/wiki/Patchtest. Thank
you!
^ permalink raw reply [flat|nested] 15+ messages in thread
end of thread, other threads:[~2025-08-13 21:04 UTC | newest]
Thread overview: 15+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2025-08-13 20:49 [PATCH 0/8] kernel: consolidated pull request bruce.ashfield
2025-08-13 20:49 ` [PATCH 1/8] linux-yocto/6.12: update to v6.12.39 bruce.ashfield
2025-08-13 20:49 ` [PATCH 2/8] linux-yocto/6.12: update CVE exclusions (6.12.39) bruce.ashfield
2025-08-13 20:49 ` [PATCH 3/8] linux-yocto/6.12: update to v6.12.40 bruce.ashfield
2025-08-13 20:49 ` [PATCH 4/8] linux-yocto/6.12: update CVE exclusions (6.12.40) bruce.ashfield
2025-08-13 20:49 ` [PATCH 5/8] linux-libc-headers: update to v6.16 bruce.ashfield
2025-08-13 20:49 ` [PATCH 6/8] lttng-modules: update to v2.14.0 bruce.ashfield
2025-08-13 21:03 ` Patchtest results for " patchtest
2025-08-13 20:49 ` [PATCH 7/8] linux-yocto/6.12: update to v6.12.41 bruce.ashfield
2025-08-13 20:49 ` [PATCH 8/8] linux-yocto/6.12: update CVE exclusions (6.12.41) bruce.ashfield
-- strict thread matches above, loose matches on Subject: below --
2022-04-12 21:45 [PATCH 0/8] kernel: consolidated pull request bruce.ashfield
2021-03-19 18:58 Bruce Ashfield
2021-03-20 18:46 ` Richard Purdie
2021-03-21 2:17 ` Bruce Ashfield
2018-08-30 13:45 Bruce Ashfield
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox