* [PATCH 0/8] kernel: consolidated pull request
@ 2025-08-13 20:49 bruce.ashfield
2025-08-13 20:49 ` [PATCH 1/8] linux-yocto/6.12: update to v6.12.39 bruce.ashfield
` (7 more replies)
0 siblings, 8 replies; 15+ messages in thread
From: bruce.ashfield @ 2025-08-13 20:49 UTC (permalink / raw)
To: richard.purdie; +Cc: openembedded-core
From: Bruce Ashfield <bruce.ashfield@gmail.com>
Richard,
Here's the next set of updates as I move towards making 6.16 the
default / reference kernel.
linux-yocto-dev is fully done, but now that lttng-modules is building
I can complete sanity testing.
I don't want to sit on those while I finish that testing, let's get
the libc-headers soaking and in the next day or two, I'll get 6.16
out for AB testing.
Bruce
The following changes since commit 3b2f9c31dc17c3ba5f6a9971413afed3d450d826:
poky.yaml.in: increase required disk space to 140G (2025-08-08 23:41:11 +0100)
are available in the Git repository at:
https://git.yoctoproject.org/poky-contrib zedd/kernel
https://git.yoctoproject.org/poky-contrib/log/?h=zedd/kernel
Bruce Ashfield (8):
linux-yocto/6.12: update to v6.12.39
linux-yocto/6.12: update CVE exclusions (6.12.39)
linux-yocto/6.12: update to v6.12.40
linux-yocto/6.12: update CVE exclusions (6.12.40)
linux-libc-headers: update to v6.16
lttng-modules: update to v2.14.0
linux-yocto/6.12: update to v6.12.41
linux-yocto/6.12: update CVE exclusions (6.12.41)
...ers_6.15.bb => linux-libc-headers_6.16.bb} | 2 +-
.../linux/cve-exclusion_6.12.inc | 362 +++++++++++++--
.../linux/linux-yocto-rt_6.12.bb | 6 +-
.../linux/linux-yocto-tiny_6.12.bb | 6 +-
meta/recipes-kernel/linux/linux-yocto_6.12.bb | 28 +-
...x-sigaction-build-without-CONFIG_COM.patch | 35 --
...e-missing-CONFIG_TRACEPOINTS-to-warn.patch | 18 +-
...mentation-Add-missing-provider-name-.patch | 45 ++
...pose-__percpu-tag-as-a-named-address.patch | 438 ++++++++++++++++++
...les_2.13.19.bb => lttng-modules_2.14.0.bb} | 8 +-
10 files changed, 845 insertions(+), 103 deletions(-)
rename meta/recipes-kernel/linux-libc-headers/{linux-libc-headers_6.15.bb => linux-libc-headers_6.16.bb} (80%)
delete mode 100644 meta/recipes-kernel/lttng/lttng-modules/0001-lttng-modules-fix-sigaction-build-without-CONFIG_COM.patch
create mode 100644 meta/recipes-kernel/lttng/lttng-modules/0001-writeback-instrumentation-Add-missing-provider-name-.patch
create mode 100644 meta/recipes-kernel/lttng/lttng-modules/0002-fix-percpu-repurpose-__percpu-tag-as-a-named-address.patch
rename meta/recipes-kernel/lttng/{lttng-modules_2.13.19.bb => lttng-modules_2.14.0.bb} (81%)
--
2.39.2
^ permalink raw reply [flat|nested] 15+ messages in thread* [PATCH 1/8] linux-yocto/6.12: update to v6.12.39 2025-08-13 20:49 [PATCH 0/8] kernel: consolidated pull request bruce.ashfield @ 2025-08-13 20:49 ` bruce.ashfield 2025-08-13 20:49 ` [PATCH 2/8] linux-yocto/6.12: update CVE exclusions (6.12.39) bruce.ashfield ` (6 subsequent siblings) 7 siblings, 0 replies; 15+ messages in thread From: bruce.ashfield @ 2025-08-13 20:49 UTC (permalink / raw) To: richard.purdie; +Cc: openembedded-core From: Bruce Ashfield <bruce.ashfield@gmail.com> Updating linux-yocto/6.12 to the latest korg -stable release that comprises the following commits: cdf264c0a590 Linux 6.12.39 f3f9deccfc68 KVM: SVM: Set synthesized TSA CPUID flags f004f58d18a2 rseq: Fix segfault on registration when rseq_cs is non-zero f2133b849ff2 crypto: ecdsa - Harden against integer overflows in DIV_ROUND_UP() 59923d508bd2 arm64: Filter out SME hwcaps when FEAT_SME isn't implemented 815f1161d6db ksmbd: fix potential use-after-free in oplock/lease break ack 2d89dab1ea60 kasan: remove kasan_find_vm_area() to prevent possible deadlock e1aec954583f net: wangxun: revert the adjustment of the IRQ vector sequence 5244536e650c erofs: fix rare pcluster memory leak after unmounting 5ea53aa71c2c selftests/bpf: adapt one more case in test_lru_map to the new target_free 7b4a02631352 HID: nintendo: avoid bluetooth suspend/resume stalls c72536350e82 HID: quirks: Add quirk for 2 Chicony Electronics HP 5MP Cameras 716a0c8dedc6 HID: Add IGNORE quirk for SMARTLINKTECHNOLOGY 70685fb6216f riscv: vdso: Exclude .rodata from the PT_DYNAMIC segment 9ef5d4748dfe bpf: Adjust free target to avoid global starvation of LRU map c23e0792b77d vt: add missing notification when switching back to text mode 0bcc14f36c7a btrfs: fix assertion when building free space tree 589b290d0935 net: mana: Record doorbell physical address in PF mode 921fffa1d8bc HID: lenovo: Add support for ThinkPad X1 Tablet Thin Keyboard Gen2 e46cf2943f91 driver: bluetooth: hci_qca:fix unable to load the BT driver a9c357b08672 net: usb: qmi_wwan: add SIMCom 8230C composition e55b2126961b ALSA: hda/realtek: Add quirks for some Clevo laptops 01b0312a4a3a ALSA: hda/realtek - Enable mute LED on HP Pavilion Laptop 15-eg100 72aad5cf5790 ASoC: amd: yc: add quirk for Acer Nitro ANV15-41 internal mic 383b2399d586 io_uring: make fallocate be hashed work 67be7e6c55a9 ALSA: hda/realtek: Add mic-mute LED setup for ASUS UM5606 68397fda2caa ASoC: SOF: Intel: hda: Use devm_kstrdup() to avoid memleak. dd072fa64715 um: vector: Reduce stack usage in vector_eth_configure() 7df2295c036b atm: idt77252: Add missing `dma_map_error()` 25cab1b83d66 ublk: sanity check add_dev input for underflow f154e41e1d9d bnxt_en: Set DMA unmap len correctly for XDP_REDIRECT b4e7e3f4e9d2 bnxt_en: Fix DCB ETS validation 948ab36ed249 net: ll_temac: Fix missing tx_pending check in ethtools_set_ringparam() bbd385b65f9e net/mlx5e: Add new prio for promiscuous mode 7581afc05154 net/mlx5e: Fix race between DIM disable and net_dim() c4270235db92 can: m_can: m_can_handle_lost_msg(): downgrade msg lost in rx message to debug level 90d0d5a439f5 drm/xe/pm: Correct comment of xe_pm_set_vram_threshold() ec4014566377 selftests: net: lib: fix shift count out of range 182c9f38c367 selftests: net: lib: Move logging from forwarding/lib.sh here e3647c40bea2 net: phy: microchip: limit 100M workaround to link-down events on LAN88xx b215e916336f net: phy: microchip: Use genphy_soft_reset() to purge stale LPA bits 4c934e0cac61 ibmvnic: Fix hardcoded NUM_RX_STATS/NUM_TX_STATS with dynamic sizeof 473f3eadfc73 net: appletalk: Fix device refcount leak in atrtr_create() e0dd2e972966 netfilter: flowtable: account for Ethernet header in nf_flow_pppoe_proto() fd67f52eea80 erofs: fix to add missing tracepoint in erofs_readahead() ea2350dfa378 erofs: refine readahead tracepoint 9493b5f9ad07 erofs: tidy up zdata.c 71e4f033a90d erofs: get rid of `z_erofs_next_pcluster_t` 16396885c26a erofs: free pclusters if no cached folio is attached ff4b8c9ade1b drm/xe/pf: Clear all LMTT pages on alloc 8586552df591 nbd: fix uaf in nbd_genl_connect() error path 1bbdf4213711 wifi: mt76: mt7925: Fix null-ptr-deref in mt7925_thermal_init() fa7e9a15460a drm/nouveau/gsp: fix potential leak of memory used during acpi init 06c566371f8a wifi: rt2x00: fix remove callback type mismatch d21eeb050599 wifi: mac80211: fix non-transmitted BSSID profile search d4a7056ca9ab wifi: mac80211: correctly identify S1G short beacon 2941155d9a5a raid10: cleanup memleak at raid10_make_request 776e6186dc9e md/raid1: Fix stack memory use after return in raid1_reshape a560de522374 drm/tegra: nvdec: Fix dma_alloc_coherent error check fcd9c923b58e wifi: zd1211rw: Fix potential NULL pointer dereference in zd_mac_tx_to_dev() c6625c21ea66 wifi: cfg80211: fix S1G beacon head validation in nl80211 8d4d00ea6038 netfs: Fix ref leak on inserted extra subreq in write retry 42baf997722c netlink: make sure we allow at least one dump skb f98c4cec7504 netlink: Fix rmem check in netlink_broadcast_deliver(). cecc9146d244 ASoC: Intel: sof-function-topology-lib: Print out the unsupported dmic count 19ff875dc516 erofs: address D-cache aliasing 4745bfd34ae7 erofs: fix to add missing tracepoint in erofs_read_folio() 3b16c9b8ba71 ksmbd: fix a mount write count leak in ksmbd_vfs_kern_path_locked() 92c2c005a8ba smb: server: make use of rdma_destroy_qp() 1d219778281e clk: scmi: Handle case where child clocks are initialized before their parents 971da696abf0 x86/mm: Disable hugetlb page table sharing on 32-bit a68b85855732 x86/rdrand: Disable RDSEED on AMD Cyan Skillfish fcee75daecc5 clk: imx: Fix an out-of-bounds access in dispmix_csr_clk_dev_data 5d2d34f36724 rust: init: allow `dead_code` warnings for Rust >= 1.89.0 febc0b5dbabd lib/alloc_tag: do not acquire non-existent lock in alloc_tag_top_users() 4c39dfd13beb mm/vmalloc: leave lazy MMU mode on PTE mapping error 92ed107cd26d scripts/gdb: fix interrupts.py after maple tree conversion 62720dc3cfd9 scripts/gdb: de-reference per-CPU MCE interrupts cb89f9bf6c3a scripts/gdb: fix interrupts display after MCP on x86 ee6c677ef318 mm: fix the inaccurate memory statistics issue for users 839d8682732e maple_tree: fix mt_destroy_walk() on root leaf node 92db42e201f4 kallsyms: fix build without execinfo 7dccd5eb5343 Revert "PCI/ACPI: Fix allocated memory release on error in pci_acpi_scan_root()" e4172522d594 Revert "ACPI: battery: negate current when discharging" ee6f6138d5f2 drm/xe: Allocate PF queue size on pow2 boundary 065bd940ee0a drm/framebuffer: Acquire internal references on GEM handles 9e4af87bd08d Revert "usb: gadget: u_serial: Add null pointer check in gs_start_io" abf3620cba68 usb: gadget: u_serial: Fix race condition in TTY wakeup 48007d6e7bdb Revert "drm/xe/xe2: Enable Indirect Ring State support for Xe2" 57b7c27ef5e7 drm/xe/bmg: fix compressed VRAM handling 2d2f07a99487 drm/gem: Fix race in drm_gem_handle_create_tail() 38df1a5053bc drm/ttm: fix error handling in ttm_buffer_object_transfer e2d6547dc8b9 drm/sched: Increment job count before swapping tail spsc queue 08480e285c6a drm/gem: Acquire references on GEM handles for framebuffers e90ee15ce28c drm/amdkfd: Don't call mmput from MMU notifier callback 9f852d301f64 drm/imagination: Fix kernel crash when hard resetting the GPU a7b2f250ffcd wifi: mt76: mt7925: fix invalid array index in ssid assignment during hw scan fad0f6fcdae0 wifi: mt76: mt7925: fix the wrong config for tx interrupt 9b50874f297f wifi: mt76: mt7925: prevent NULL pointer dereference in mt7925_sta_set_decap_offload() 9639e54025f1 wifi: mt76: mt7921: prevent decap offload config before STA initialization a963819a121f wifi: mwifiex: discard erroneous disassoc frames on STA interface e01851f6e9a6 wifi: prevent A-MSDU attacks in mesh networks 373caeec3651 pwm: mediatek: Ensure to disable clocks in error path d526e11ab274 pwm: Fix invalid state detection 275605a8b480 pinctrl: qcom: msm: mark certain pins as invalid for interrupts 3e0542701b37 md/md-bitmap: fix GPF in bitmap_get_stats() 9f260e16b297 net: ethernet: rtsn: Fix a null pointer dereference in rtsn_probe() 8f65277317a8 gre: Fix IPv6 multicast route creation. 199af064babb ASoC: fsl_sai: Force a software reset when starting in consumer mode e14bffc90866 ALSA: ad1816a: Fix potential NULL pointer deref in snd_card_ad1816a_pnp() d9bd1163c8d8 KVM: Allow CPU to reschedule while setting per-page memory attributes fd044c99d831 KVM: SVM: Reject SEV{-ES} intra host migration if vCPU creation is in-flight 5cb498b20bff KVM: SVM: Add missing member in SNP_LAUNCH_START command structure 55f568521e0b KVM: x86/xen: Allow 'out of range' event channel ports in IRQ routing table. 291eff10b197 x86/mce: Make sure CMCI banks are cleared during shutdown on Intel 8ed7f3de93e1 x86/mce: Ensure user polling settings are honored when restarting timer 55ea884c0dce x86/mce: Don't remove sysfs if thresholding sysfs init fails afcf4f4e7062 x86/mce/amd: Fix threshold limit reset e01d5e33645d x86/mce/amd: Add default names for MCA banks and blocks 9e0d33e75c16 ipmi:msghandler: Fix potential memory corruption in ipmi_create_user() d1ff5f9d2c54 rxrpc: Fix oops due to non-existence of prealloc backlog struct 5385ad53793d rxrpc: Fix bug due to prealloc collision 8ecd651ef24a net/sched: Abort __tc_modify_qdisc if parent class does not exist fc2fffa2faca net: ethernet: ti: am65-cpsw-nuss: Fix skb size by accounting for skb_shared_info 34a09d6240a2 atm: clip: Fix NULL pointer dereference in vcc_sendmsg() 024876b247a8 atm: clip: Fix infinite recursive call of clip_push(). 9f771816f14d atm: clip: Fix memory leak of struct clip_vcc. 36caab990b69 atm: clip: Fix potential null-ptr-deref in to_atmarpd(). 4d5476fa3931 net: phy: smsc: Fix link failure in forced mode with Auto-MDIX 6fb4cd247cda net: phy: smsc: Force predictable MDI-X state on LAN87xx 850812bd2a15 net: phy: smsc: Fix Auto-MDIX configuration when disabled by strap be8792c6702b net: stmmac: Fix interrupt handling for level-triggered mode in DWC_XGMAC2 41a741c476e1 vsock: Fix IOCTL_VM_SOCKETS_GET_LOCAL_CID to check also `transport_local` ae2c712ba39c vsock: Fix transport_* TOCTOU 3734d78210cc vsock: Fix transport_{g2h,h2g} TOCTOU 62e6160cfb55 tcp: Correct signedness in skb remaining space calculation 50aa2d121bc2 tipc: Fix use-after-free in tipc_conn_close(). 8fb2802a1654 vsock: fix `vsock_proto` declaration 4b8e18af7bea netlink: Fix wraparounds of sk->sk_rmem_alloc. b90129445f50 net: phy: qcom: qca808x: Fix WoL issue by utilizing at8031_set_wol() 31db4223db33 net: phy: qcom: move the WoL function to shared library 778f4e173020 arm64: poe: Handle spurious Overlay faults 2e0cb0c74d96 bnxt_en: eliminate the compile warning in bnxt_request_irq due to CONFIG_RFS_ACCEL 0caba66f0073 sched/deadline: Fix dl_server runtime calculation formula 35bda158da39 fix proc_sys_compare() handling of in-lookup dentries df1d6801f16a pinctrl: amd: Clear GPIO debounce for suspend cdbcde935e72 Bluetooth: hci_event: Fix not marking Broadcast Sink BIS as connected 32fa1f92a40e Bluetooth: hci_sync: Fix not disabling advertising instance 0cd863ab4204 ASoC: cs35l56: probe() should fail if the device ID is not recognized a0a8009083e5 perf: Revert to requiring CAP_SYS_ADMIN for uprobes f7fe33f629bb sched/core: Fix migrate_swap() vs. hotplug 1207f57be07f irqchip/irq-msi-lib: Select CONFIG_GENERIC_MSI_IRQ bc179aa79a20 perf/core: Fix the WARN_ON_ONCE is out of lock protected region 8f4c7131721a ASoC: Intel: soc-acpi: arl: Correct order of cs42l43 matches cca47e6e1f78 ASoC: Intel: soc-acpi-intel-arl-match: set get_function_tplg_files ops fc3a8a5e8f8e ASoC: Intel: add sof_sdw_get_tplg_files ops 36536435849b ASoC: soc-acpi: add get_function_tplg_files ops 06e0b070eb97 ASoC: Intel: soc-acpi: arl: Add match entries for new cs42l43 laptops 97d14c04610c ASoC: Intel: soc-acpi: arl: Correct naming of a cs35l56 address struct 724b93a6a694 ASoC: Intel: SND_SOC_INTEL_SOF_BOARD_HELPERS select SND_SOC_ACPI_INTEL_MATCH d4f6a267cc07 ASoC: fsl_asrc: use internal measured ratio for non-ideal ratio mode 07ed75bfa7ed drm/amdgpu: Replace Mutex with Spinlock for RLCG register access to avoid Priority Inversion in SRIOV 56ea7746045a crypto: s390/sha - Fix uninitialized variable in SHA-1 and SHA-2 04513cf1581b drm/amdgpu/ip_discovery: add missing ip_discovery fw 39d6a607d531 drm/amdgpu/discovery: use specific ip_discovery.bin for legacy asics e9d9b25f3767 drm/exynos: exynos7_drm_decon: add vblank check in IRQ handling 6dee745bd0ae eventpoll: don't decrement ep refcount while still holding the ep mutex Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com> --- .../linux/linux-yocto-rt_6.12.bb | 6 ++-- .../linux/linux-yocto-tiny_6.12.bb | 6 ++-- meta/recipes-kernel/linux/linux-yocto_6.12.bb | 28 +++++++++---------- 3 files changed, 20 insertions(+), 20 deletions(-) diff --git a/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb b/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb index 42ad0cbef0..c003d8464b 100644 --- a/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb +++ b/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb @@ -14,13 +14,13 @@ python () { raise bb.parse.SkipRecipe("Set PREFERRED_PROVIDER_virtual/kernel to linux-yocto-rt to enable it") } -SRCREV_machine ?= "2aa940a9e5701e5b4107d0250da79a52e01da34a" -SRCREV_meta ?= "5db57044962c6155c4e82f06d87e90dfe49a59e6" +SRCREV_machine ?= "ae0f27c5992d230fddf2cab92dc5ae86417285d3" +SRCREV_meta ?= "ae758a118311062560d89a3721abd38d4a35fc1c" SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;branch=${KBRANCH};name=machine;protocol=https \ git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.12;destsuffix=${KMETA};protocol=https" -LINUX_VERSION ?= "6.12.38" +LINUX_VERSION ?= "6.12.39" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" diff --git a/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb b/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb index 452e3f0eb2..50da62af74 100644 --- a/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb +++ b/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb @@ -8,7 +8,7 @@ require recipes-kernel/linux/linux-yocto.inc # CVE exclusions include recipes-kernel/linux/cve-exclusion_6.12.inc -LINUX_VERSION ?= "6.12.38" +LINUX_VERSION ?= "6.12.39" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}" @@ -17,8 +17,8 @@ DEPENDS += "openssl-native util-linux-native" KMETA = "kernel-meta" KCONF_BSP_AUDIT_LEVEL = "2" -SRCREV_machine ?= "fa4b881d24f752a559d8e1f75ed08895ef20b14d" -SRCREV_meta ?= "5db57044962c6155c4e82f06d87e90dfe49a59e6" +SRCREV_machine ?= "faa83e63e24b8a42361214170269144e55ea85fb" +SRCREV_meta ?= "ae758a118311062560d89a3721abd38d4a35fc1c" PV = "${LINUX_VERSION}+git" diff --git a/meta/recipes-kernel/linux/linux-yocto_6.12.bb b/meta/recipes-kernel/linux/linux-yocto_6.12.bb index b9ae0954fa..f65bc4796a 100644 --- a/meta/recipes-kernel/linux/linux-yocto_6.12.bb +++ b/meta/recipes-kernel/linux/linux-yocto_6.12.bb @@ -18,25 +18,25 @@ KBRANCH:qemux86.104 ?= "v6.12/standard/base" KBRANCH:qemuloongarch64 ?= "v6.12/standard/base" KBRANCH:qemumips64 ?= "v6.12/standard/mti-malta64" -SRCREV_machine:qemuarm ?= "c2755158bc029faf978e980235471b0f0e864814" -SRCREV_machine:qemuarm64 ?= "fa4b881d24f752a559d8e1f75ed08895ef20b14d" -SRCREV_machine:qemuloongarch64 ?= "fa4b881d24f752a559d8e1f75ed08895ef20b14d" -SRCREV_machine:qemumips ?= "facf6694c9bdcaa9efb2d46a2c6e8e30fc72cdd3" -SRCREV_machine:qemuppc ?= "fa4b881d24f752a559d8e1f75ed08895ef20b14d" -SRCREV_machine:qemuriscv64 ?= "fa4b881d24f752a559d8e1f75ed08895ef20b14d" -SRCREV_machine:qemuriscv32 ?= "fa4b881d24f752a559d8e1f75ed08895ef20b14d" -SRCREV_machine:qemux86 ?= "fa4b881d24f752a559d8e1f75ed08895ef20b14d" -SRCREV_machine:qemux86-64 ?= "fa4b881d24f752a559d8e1f75ed08895ef20b14d" -SRCREV_machine:qemumips64 ?= "4ef2a68a188df7f561f5e297c4a3bab7e79e426f" -SRCREV_machine ?= "fa4b881d24f752a559d8e1f75ed08895ef20b14d" -SRCREV_meta ?= "5db57044962c6155c4e82f06d87e90dfe49a59e6" +SRCREV_machine:qemuarm ?= "7898594c1d6927a383cceea44c8e29fdcadaa721" +SRCREV_machine:qemuarm64 ?= "faa83e63e24b8a42361214170269144e55ea85fb" +SRCREV_machine:qemuloongarch64 ?= "faa83e63e24b8a42361214170269144e55ea85fb" +SRCREV_machine:qemumips ?= "465c2461220fbd9e9942cb6360bee9b018fbcd23" +SRCREV_machine:qemuppc ?= "faa83e63e24b8a42361214170269144e55ea85fb" +SRCREV_machine:qemuriscv64 ?= "faa83e63e24b8a42361214170269144e55ea85fb" +SRCREV_machine:qemuriscv32 ?= "faa83e63e24b8a42361214170269144e55ea85fb" +SRCREV_machine:qemux86 ?= "faa83e63e24b8a42361214170269144e55ea85fb" +SRCREV_machine:qemux86-64 ?= "faa83e63e24b8a42361214170269144e55ea85fb" +SRCREV_machine:qemumips64 ?= "cabddbe6741f5b05819b50432e33a0b5a9fe1d68" +SRCREV_machine ?= "faa83e63e24b8a42361214170269144e55ea85fb" +SRCREV_meta ?= "ae758a118311062560d89a3721abd38d4a35fc1c" # set your preferred provider of linux-yocto to 'linux-yocto-upstream', and you'll # get the <version>/base branch, which is pure upstream -stable, and the same # meta SRCREV as the linux-yocto-standard builds. Select your version using the # normal PREFERRED_VERSION settings. BBCLASSEXTEND = "devupstream:target" -SRCREV_machine:class-devupstream ?= "259f4977409c87a980fa2227b7c76a2fe3fb8c2f" +SRCREV_machine:class-devupstream ?= "cdf264c0a5906063a0e2b750d420d77cb992446d" PN:class-devupstream = "linux-yocto-upstream" KBRANCH:class-devupstream = "v6.12/base" @@ -44,7 +44,7 @@ SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;name=machine;branch=${KBRA git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.12;destsuffix=${KMETA};protocol=https" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" -LINUX_VERSION ?= "6.12.38" +LINUX_VERSION ?= "6.12.39" PV = "${LINUX_VERSION}+git" -- 2.39.2 ^ permalink raw reply related [flat|nested] 15+ messages in thread
* [PATCH 2/8] linux-yocto/6.12: update CVE exclusions (6.12.39) 2025-08-13 20:49 [PATCH 0/8] kernel: consolidated pull request bruce.ashfield 2025-08-13 20:49 ` [PATCH 1/8] linux-yocto/6.12: update to v6.12.39 bruce.ashfield @ 2025-08-13 20:49 ` bruce.ashfield 2025-08-13 20:49 ` [PATCH 3/8] linux-yocto/6.12: update to v6.12.40 bruce.ashfield ` (5 subsequent siblings) 7 siblings, 0 replies; 15+ messages in thread From: bruce.ashfield @ 2025-08-13 20:49 UTC (permalink / raw) To: richard.purdie; +Cc: openembedded-core From: Bruce Ashfield <bruce.ashfield@gmail.com> Data pulled from: https://github.com/CVEProject/cvelistV5 1/1 [ Author: cvelistV5 Github Action Email: github_action@example.com Subject: 4 changes (1 new | 3 updated): - 1 new CVEs: CVE-2025-46002 - 3 updated CVEs: CVE-2025-5752, CVE-2025-6717, CVE-2025-7397 Date: Fri, 18 Jul 2025 14:11:28 +0000 ] Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com> --- meta/recipes-kernel/linux/cve-exclusion_6.12.inc | 16 ++++++++-------- 1 file changed, 8 insertions(+), 8 deletions(-) diff --git a/meta/recipes-kernel/linux/cve-exclusion_6.12.inc b/meta/recipes-kernel/linux/cve-exclusion_6.12.inc index 02931bbf79..e428258bb1 100644 --- a/meta/recipes-kernel/linux/cve-exclusion_6.12.inc +++ b/meta/recipes-kernel/linux/cve-exclusion_6.12.inc @@ -1,11 +1,11 @@ # Auto-generated CVE metadata, DO NOT EDIT BY HAND. -# Generated at 2025-07-15 14:54:42.649263+00:00 for kernel version 6.12.38 -# From linux_kernel_cves cve_2025-07-15_1400Z-4-gc77733e1fe6 +# Generated at 2025-07-18 14:17:49.367230+00:00 for kernel version 6.12.39 +# From linux_kernel_cves cve_2025-07-18_1400Z python check_kernel_cve_status_version() { - this_version = "6.12.38" + this_version = "6.12.39" kernel_version = d.getVar("LINUX_VERSION") if kernel_version != this_version: bb.warn("Kernel CVE status needs updating: generated for %s but kernel is %s" % (this_version, kernel_version)) @@ -4132,7 +4132,7 @@ CVE_STATUS[CVE-2022-49962] = "fixed-version: Fixed from version 6.0" CVE_STATUS[CVE-2022-49963] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2022-49964] = "fixed-version: Fixed from version 6.0" +CVE_STATUS[CVE-2022-49964] = "fixed-version: Fixed from version 5.19.7" CVE_STATUS[CVE-2022-49965] = "fixed-version: Fixed from version 6.0" @@ -5582,8 +5582,6 @@ CVE_STATUS[CVE-2023-52999] = "fixed-version: Fixed from version 6.2" CVE_STATUS[CVE-2023-53000] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-53001] = "fixed-version: Fixed from version 6.2" - CVE_STATUS[CVE-2023-53002] = "fixed-version: Fixed from version 6.2" CVE_STATUS[CVE-2023-53003] = "fixed-version: Fixed from version 6.2" @@ -13672,7 +13670,7 @@ CVE_STATUS[CVE-2025-38065] = "cpe-stable-backport: Backported in 6.12.31" CVE_STATUS[CVE-2025-38066] = "cpe-stable-backport: Backported in 6.12.31" -# CVE-2025-38067 needs backporting (fixed from 6.15) +CVE_STATUS[CVE-2025-38067] = "cpe-stable-backport: Backported in 6.12.39" CVE_STATUS[CVE-2025-38068] = "cpe-stable-backport: Backported in 6.12.31" @@ -13746,7 +13744,7 @@ CVE_STATUS[CVE-2025-38102] = "cpe-stable-backport: Backported in 6.12.34" CVE_STATUS[CVE-2025-38103] = "cpe-stable-backport: Backported in 6.12.34" -# CVE-2025-38104 needs backporting (fixed from 6.15) +CVE_STATUS[CVE-2025-38104] = "cpe-stable-backport: Backported in 6.12.39" # CVE-2025-38105 needs backporting (fixed from 6.16rc1) @@ -14236,6 +14234,8 @@ CVE_STATUS[CVE-2025-38347] = "cpe-stable-backport: Backported in 6.12.35" CVE_STATUS[CVE-2025-38348] = "cpe-stable-backport: Backported in 6.12.35" +CVE_STATUS[CVE-2025-38349] = "cpe-stable-backport: Backported in 6.12.39" + CVE_STATUS[CVE-2025-38479] = "cpe-stable-backport: Backported in 6.12.23" CVE_STATUS[CVE-2025-38575] = "cpe-stable-backport: Backported in 6.12.23" -- 2.39.2 ^ permalink raw reply related [flat|nested] 15+ messages in thread
* [PATCH 3/8] linux-yocto/6.12: update to v6.12.40 2025-08-13 20:49 [PATCH 0/8] kernel: consolidated pull request bruce.ashfield 2025-08-13 20:49 ` [PATCH 1/8] linux-yocto/6.12: update to v6.12.39 bruce.ashfield 2025-08-13 20:49 ` [PATCH 2/8] linux-yocto/6.12: update CVE exclusions (6.12.39) bruce.ashfield @ 2025-08-13 20:49 ` bruce.ashfield 2025-08-13 20:49 ` [PATCH 4/8] linux-yocto/6.12: update CVE exclusions (6.12.40) bruce.ashfield ` (4 subsequent siblings) 7 siblings, 0 replies; 15+ messages in thread From: bruce.ashfield @ 2025-08-13 20:49 UTC (permalink / raw) To: richard.purdie; +Cc: openembedded-core From: Bruce Ashfield <bruce.ashfield@gmail.com> Updating linux-yocto/6.12 to the latest korg -stable release that comprises the following commits: d90ecb2b1308 Linux 6.12.40 fd627ac8a5cf KVM: x86/xen: Fix cleanup logic in emulation of Xen schedop poll hypercalls ff7ccaadb0bf iommu/vt-d: Fix misplaced domain_attached assignment e82d8825f712 smb: client: let smbd_post_send_iter() respect the peers max_send_size and transmit all data 11f430b8f5fc drm/xe: Move page fault init after topology init ce7585324b20 drm/xe/mocs: Initialize MOCS index early 8fc25d3055ba sched,freezer: Remove unnecessary warning in __thaw_task 7258b437d55d i2c: omap: fix deprecated of_property_read_bool() use f701716812cb i2c: omap: Handle omap_i2c_init() errors in omap_i2c_probe() ba35cc0598f3 i2c: omap: Fix an error handling path in omap_i2c_probe() c1a786faa6ec i2c: omap: Add support for setting mux 35fdf1093109 selftests/bpf: Set test path for token/obj_priv_implicit_token_envvar d9ebd928288b rust: use `#[used(compiler)]` to fix build and `modpost` with Rust >= 1.89.0 affb46db59f9 net: libwx: fix multicast packets received count 75747e25beca usb: dwc3: qcom: Don't leave BCR asserted c45b48b4f4c0 usb: hub: Don't try to recover devices lost during warm reset. bf71baa3cfe7 usb: hub: Fix flushing of delayed work used for post resume purposes e11359640090 usb: hub: Fix flushing and scheduling of delayed work that tunes runtime pm aec11e5f9c45 usb: hub: fix detection of high tier USB3 devices behind suspended hubs ee56da95f896 btrfs: fix block group refcount race in btrfs_create_pending_block_groups() e77078e52fbf clone_private_mnt(): make sure that caller has CAP_SYS_ADMIN in the right userns 7fc808d98215 sched: Change nr_uninterruptible type to unsigned long 816d36973467 efivarfs: Fix memory leak of efivarfs_fs_info in fs_context error paths 44e73241b8be libbpf: Fix handling of BPF arena relocations f0de9702f9b2 drm/mediatek: only announce AFBC if really supported 40b5b4ba8ed8 drm/mediatek: Add wait_event_timeout when disabling plane b04fb2628b28 Revert "cgroup_freezer: cgroup_freezing: Check if not frozen" d7c1098787a6 rxrpc: Fix transmission of an abort in response to an abort 839fe96c1520 rxrpc: Fix recv-recv race of completed call e5c480dc62a3 net/sched: Return NULL when htb_lookup_leaf encounters an empty rbtree 71f435f846b0 net: bridge: Do not offload IGMP/MLD messages 8984bcbd1edf net: vlan: fix VLAN 0 refcount imbalance of toggling filtering during runtime cdb767915fc9 tls: always refresh the queue when reading sock 4e7c46362550 virtio-net: fix recursived rtnl_lock() during probe() 1a71bf5c91ab hv_netvsc: Set VF priv_flags to IFF_NO_ADDRCONF before open to prevent IPv6 addrconf 5db93cbd7d50 Bluetooth: L2CAP: Fix attempting to adjust outgoing MTU 1259b780e7b9 drm/xe/pf: Prepare to stop SR-IOV support prior GT reset be77ce6b3a6b drm/xe/pf: Move VFs reprovisioning to worker abe59c53b626 drm/xe/pf: Sanitize VF scratch registers on FLR fc38c249c622 netfilter: nf_conntrack: fix crash due to removal of uninitialised entry 7c532f222361 net: fix segmentation after TCP/UDP fraglist GRO 7929d27c747e ipv6: mcast: Delay put pmc->idev in mld_del_delrec() 35b501a2393a net/mlx5: Correctly set gso_size when LRO is used f47400547a95 Bluetooth: btusb: QCA: Fix downloading wrong NVM for WCN6855 GF variant without board ID f5a40e54cd6c Bluetooth: hci_core: add missing braces when using macro parameters db386fc5fa65 Bluetooth: SMP: Fix using HCI_ERROR_REMOTE_USER_TERM on timeout 6c586fcb880a Bluetooth: SMP: If an unallowed command is received consider it a failure 05ab8da312ec Bluetooth: hci_sync: fix connectable extended advertising when using static random address b97be7ee8a1c Bluetooth: Fix null-ptr-deref in l2cap_sock_resume_cb() 95a13b0a6b04 riscv: traps_misaligned: properly sign extend value in misaligned load handler 32b14e757404 riscv: Enable interrupt during exception handling efad4e2a0fa7 loop: use kiocb helpers to fix lockdep warning 65c666aff44e usb: net: sierra: check for no status endpoint cd469b173d14 ice: check correct pointer in fwlog debugfs 5a5d64f0eec8 ice: add NULL check in eswitch lag check 3c4bdc8a852e hwmon: (corsair-cpro) Validate the size of the received input buffer dcf0f03d7f74 selftests: net: increase inter-packet timeout in udpgro.sh 33711db90bd5 can: tcan4x5x: fix reset gpio usage during probe d587e6929b7c can: tcan4x5x: add option for selecting nWKRQ voltage d57dda2056fa wifi: cfg80211: remove scan request n_channels counted_by 6a466ac72fd4 nvmet-tcp: fix callback lock for TLS handshake f9a90478207a nvme: fix misaccounting of nvme-mpath inflight I/O fd6493533af9 net: phy: Don't register LEDs for genphy 5b02e397929e smc: Fix various oops due to inet_sock type confusion. 124765c20603 nvme: fix endianness of command word prints in nvme_log_err_passthru() 8184ee3c667d nvme: fix inconsistent RCU list manipulation in nvme_ns_add_to_ctrl_list() 9a7de97b915a fix a leak in fcntl_dirnotify() 09bce2138a30 smb: client: fix use-after-free in cifs_oplock_break 06ec83b6c792 rpl: Fix use-after-free in rpl_do_srh_inline(). a6d735100f60 net/sched: sch_qfq: Fix race condition on qfq_aggregate e8767b89cd82 block: fix kobject leak in blk_unregister_queue 20648ff4a203 net: emaclite: Fix missing pointer increment in aligned_read() 894780d6dd3e cachefiles: Fix the incorrect return value in __cachefiles_write() dc05051dd10d selftests/sched_ext: Fix exit selftest hang on UP 6952aeace93f bpf: Reject %p% format string in bprintf-like helpers e80692789679 arm64: dts: imx95: Correct the DMA interrupter number of pcie0_ep 6353bf36f56b soundwire: amd: fix for clearing command status register a6e232ee0f86 soundwire: amd: fix for handling slave alerts after link is down 8814cbbddcaf arm64: dts: rockchip: Add cd-gpios for sdcard detect on Cool Pi 4B 6cb38e5d359a arm64: dts: rockchip: Add cd-gpios for sdcard detect on Cool Pi CM5 c42116dc70af comedi: Fix initialization of data for instructions that write to subdevice 2af1e7d389c2 comedi: Fix use of uninitialized data in insn_rw_emulate_bits() 8c20a5cb9879 comedi: Fix some signed shift left operations 992d600f284e comedi: Fail COMEDI_INSNLIST ioctl if n_insns is too large 3eab654f5d19 comedi: das6402: Fix bit shift out of bounds 076b13ee60eb comedi: das16m1: Fix bit shift out of bounds e0f3c0867d7d comedi: aio_iiro_16: Fix bit shift out of bounds a27e27eee313 comedi: pcl812: Fix bit shift out of bounds 610615c96680 iio: common: st_sensors: Fix use of uninitialize device structs 6eea9f7648dd iio: backend: fix out-of-bound write 404b1d0fe0c6 iio: adc: stm32-adc: Fix race in installing chained IRQ handler 07c9a0617d9a iio: adc: max1363: Reorder mode_list[] entries 0ceb2893d360 iio: adc: max1363: Fix MAX1363_4X_CHANS/MAX1363_8X_CHANS[] 086a76474121 iio: adc: axp20x_adc: Add missing sentinel to AXP717 ADC channel maps bfcda3e10157 iio: accel: fxls8962af: Fix use after free in fxls8962af_fifo_flush b361598b7352 soc: aspeed: lpc-snoop: Don't disable channels that aren't enabled 855d4da5f270 soc: aspeed: lpc-snoop: Cleanup resources in stack-order 2a76bc2b24ed smb: client: fix use-after-free in crypt_message when using async crypto d5629d1af060 s390/bpf: Fix bpf_arch_text_poke() with new_addr == NULL again 11c19d42d3a7 pmdomain: governor: Consider CPU latency tolerance from pm_domain_cpu_gov 10e27b2a6ebe net: libwx: properly reset Rx ring descriptor ba7c793f96c1 net: libwx: fix the using of Rx buffer DMA 08d18bda0d03 net: libwx: remove duplicate page_pool_put_full_page() 74cb0f102d4b net: stmmac: intel: populate entire system_counterval_t in get_time_fn() callback 516cd0943a22 mmc: sdhci_am654: Workaround for Errata i2312 5280e0b8bc69 mmc: sdhci-pci: Quirk for broken command queuing on Intel GLK-based Positivo models 6198bfe1af77 mmc: bcm2835: Fix dma_unmap_sg() nents value a25ebc337022 memstick: core: Zero initialize id_reg in h_memstick_read_dev_id() 2594d5ffc081 isofs: Verify inode mode when loading from disk 122160289adf dmaengine: nbpfaxi: Fix memory corruption in probe() 573f1e59024c cpuidle: psci: Fix cpuhotplug routine with PREEMPT_RT=y 9e11e0db4e27 Bluetooth: btintel: Check if controller is ISO capable on btintel_classify_pkt_type 1ddedbd8087d af_packet: fix soft lockup issue caused by tpacket_snd() fa0796cd62c2 af_packet: fix the SO_SNDTIMEO constraint not effective on tpacked_snd() 0e9c4b36ad0c arm64: dts: rockchip: use cs-gpios for spi1 on ringneck b0c7f2984356 arm64: dts: imx8mp-venice-gw73xx: fix TPM SPI frequency 9650e49db619 arm64: dts: imx8mp-venice-gw72xx: fix TPM SPI frequency a3964e87cf15 arm64: dts: imx8mp-venice-gw71xx: fix TPM SPI frequency 1a54317f3868 arm64: dts: freescale: imx8mm-verdin: Keep LDO5 always on a86ea423dc13 arm64: dts: add big-endian property back into watchdog node c70000779432 arm64: dts: imx8mp-venice-gw74xx: fix TPM SPI frequency 5419adaef571 net/mlx5: Update the list of the PCI supported devices 837a9631f180 phonet/pep: Move call to pn_skb_get_dst_sockaddr() earlier in pep_sock_accept() 938126995e64 mptcp: reset fallback status gracefully at disconnect() time f81b6fbe13c7 mptcp: plug races between subflow fail and subflow creation 54999dea879f mptcp: make fallback action and fallback decision atomic f28044a60506 io_uring/poll: fix POLLERR handling 134ec1ed468f ALSA: hda/realtek: Add quirk for ASUS ROG Strix G712LWS 61e867574444 ALSA: hda/realtek - Fix mute LED for HP Victus 16-r0xxx 084eb54b820f drm/amd/display: Free memory allocation 74162dda80e7 drm/amd/display: Disable CRTC degamma LUT for DCN401 62f2a58a4cb0 drm/amdgpu: Increase reset counter only on success 228ad2ab5b33 drm/amdgpu/gfx8: reset compute ring wptr on the GPU on resume 21e649b0bd1a objtool/rust: add one more `noreturn` Rust function for Rust 1.89.0 7bb9ea515cda tracing/osnoise: Fix crash in timerlat_dump_stack() 33e20747b47d tracing: Add down_write(trace_event_sem) when adding trace event 692cfff241f1 tracing/probes: Avoid using params uninitialized in parse_btf_arg() d18f63e84884 HID: core: do not bypass hid_hw_raw_request 953af3c0814a HID: core: ensure __hid_request reserves the report ID as the first byte a262370f385e HID: core: ensure the allocated report buffer can contain the reserved report ID 68860d1ade38 dm-bufio: fix sched in atomic context 0758f7ef402b spi: Add check for 8-bit transfer with 8 IO mode support 40f79e2bf6a4 pch_uart: Fix dma_sync_sg_for_device() nents value 9ecfed987bc8 Input: xpad - set correct controller type for Acer NGR200 c29a2328af96 nvmem: layouts: u-boot-env: remove crc32 endianness conversion c85295f624db nvmem: imx-ocotp: fix MAC address byte length ff628593ba7c Revert "staging: vchiq_arm: Create keep-alive thread during probe" 970635ed63da thunderbolt: Fix bit masking in tb_dp_port_set_hops() 17a6ea23890e thunderbolt: Fix wake on connect at runtime 1a1190b4ba7b i2c: stm32f7: unmap DMA mapped buffer 79b63523bfdc i2c: stm32: fix the device used for the DMA map 783ea37b237a usb: gadget: configfs: Fix OOB read on empty string write 032f22962bfc usb: dwc2: gadget: Fix enter to hibernation for UTMI+ PHY 231bf7e839a8 usb: musb: fix gadget state on disconnect 951dd99ac05a USB: serial: ftdi_sio: add support for NDI EMGUIDE GEMINI 8b8cb0c34c66 USB: serial: option: add Foxconn T99W640 ba1d8dc87ae7 USB: serial: option: add Telit Cinterion FE910C04 (ECM) composition 248ba00d13ff phy: tegra: xusb: Disable periodic tracking on Tegra234 2f2a375304b0 phy: tegra: xusb: Decouple CYA_TRK_CODE_UPDATE_ON_IDLE from trk_hw_mode ec7f98ff05f0 phy: tegra: xusb: Fix unbalanced regulator disable in UTMI PHY mode Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com> --- .../linux/linux-yocto-rt_6.12.bb | 6 ++-- .../linux/linux-yocto-tiny_6.12.bb | 6 ++-- meta/recipes-kernel/linux/linux-yocto_6.12.bb | 28 +++++++++---------- 3 files changed, 20 insertions(+), 20 deletions(-) diff --git a/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb b/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb index c003d8464b..fdb0caa943 100644 --- a/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb +++ b/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb @@ -14,13 +14,13 @@ python () { raise bb.parse.SkipRecipe("Set PREFERRED_PROVIDER_virtual/kernel to linux-yocto-rt to enable it") } -SRCREV_machine ?= "ae0f27c5992d230fddf2cab92dc5ae86417285d3" -SRCREV_meta ?= "ae758a118311062560d89a3721abd38d4a35fc1c" +SRCREV_machine ?= "96c3b8967c299edb7c8fd1beff358624e3aac443" +SRCREV_meta ?= "52dd739a32215ffca801bc40daebee19a01b6f20" SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;branch=${KBRANCH};name=machine;protocol=https \ git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.12;destsuffix=${KMETA};protocol=https" -LINUX_VERSION ?= "6.12.39" +LINUX_VERSION ?= "6.12.40" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" diff --git a/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb b/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb index 50da62af74..3dccc9e723 100644 --- a/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb +++ b/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb @@ -8,7 +8,7 @@ require recipes-kernel/linux/linux-yocto.inc # CVE exclusions include recipes-kernel/linux/cve-exclusion_6.12.inc -LINUX_VERSION ?= "6.12.39" +LINUX_VERSION ?= "6.12.40" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}" @@ -17,8 +17,8 @@ DEPENDS += "openssl-native util-linux-native" KMETA = "kernel-meta" KCONF_BSP_AUDIT_LEVEL = "2" -SRCREV_machine ?= "faa83e63e24b8a42361214170269144e55ea85fb" -SRCREV_meta ?= "ae758a118311062560d89a3721abd38d4a35fc1c" +SRCREV_machine ?= "50893c3858cc7bbc15a174f06fa30fba25306cac" +SRCREV_meta ?= "52dd739a32215ffca801bc40daebee19a01b6f20" PV = "${LINUX_VERSION}+git" diff --git a/meta/recipes-kernel/linux/linux-yocto_6.12.bb b/meta/recipes-kernel/linux/linux-yocto_6.12.bb index f65bc4796a..c58e5f07f4 100644 --- a/meta/recipes-kernel/linux/linux-yocto_6.12.bb +++ b/meta/recipes-kernel/linux/linux-yocto_6.12.bb @@ -18,25 +18,25 @@ KBRANCH:qemux86.104 ?= "v6.12/standard/base" KBRANCH:qemuloongarch64 ?= "v6.12/standard/base" KBRANCH:qemumips64 ?= "v6.12/standard/mti-malta64" -SRCREV_machine:qemuarm ?= "7898594c1d6927a383cceea44c8e29fdcadaa721" -SRCREV_machine:qemuarm64 ?= "faa83e63e24b8a42361214170269144e55ea85fb" -SRCREV_machine:qemuloongarch64 ?= "faa83e63e24b8a42361214170269144e55ea85fb" -SRCREV_machine:qemumips ?= "465c2461220fbd9e9942cb6360bee9b018fbcd23" -SRCREV_machine:qemuppc ?= "faa83e63e24b8a42361214170269144e55ea85fb" -SRCREV_machine:qemuriscv64 ?= "faa83e63e24b8a42361214170269144e55ea85fb" -SRCREV_machine:qemuriscv32 ?= "faa83e63e24b8a42361214170269144e55ea85fb" -SRCREV_machine:qemux86 ?= "faa83e63e24b8a42361214170269144e55ea85fb" -SRCREV_machine:qemux86-64 ?= "faa83e63e24b8a42361214170269144e55ea85fb" -SRCREV_machine:qemumips64 ?= "cabddbe6741f5b05819b50432e33a0b5a9fe1d68" -SRCREV_machine ?= "faa83e63e24b8a42361214170269144e55ea85fb" -SRCREV_meta ?= "ae758a118311062560d89a3721abd38d4a35fc1c" +SRCREV_machine:qemuarm ?= "3884ae3c574f932b6cfe528f86c83214c2e8a36e" +SRCREV_machine:qemuarm64 ?= "50893c3858cc7bbc15a174f06fa30fba25306cac" +SRCREV_machine:qemuloongarch64 ?= "50893c3858cc7bbc15a174f06fa30fba25306cac" +SRCREV_machine:qemumips ?= "39d23e283ab644b5a8758046130b8c22847176f8" +SRCREV_machine:qemuppc ?= "50893c3858cc7bbc15a174f06fa30fba25306cac" +SRCREV_machine:qemuriscv64 ?= "50893c3858cc7bbc15a174f06fa30fba25306cac" +SRCREV_machine:qemuriscv32 ?= "50893c3858cc7bbc15a174f06fa30fba25306cac" +SRCREV_machine:qemux86 ?= "50893c3858cc7bbc15a174f06fa30fba25306cac" +SRCREV_machine:qemux86-64 ?= "50893c3858cc7bbc15a174f06fa30fba25306cac" +SRCREV_machine:qemumips64 ?= "3cf1294a14f4a23376b86201ab5bdff6159102ad" +SRCREV_machine ?= "50893c3858cc7bbc15a174f06fa30fba25306cac" +SRCREV_meta ?= "52dd739a32215ffca801bc40daebee19a01b6f20" # set your preferred provider of linux-yocto to 'linux-yocto-upstream', and you'll # get the <version>/base branch, which is pure upstream -stable, and the same # meta SRCREV as the linux-yocto-standard builds. Select your version using the # normal PREFERRED_VERSION settings. BBCLASSEXTEND = "devupstream:target" -SRCREV_machine:class-devupstream ?= "cdf264c0a5906063a0e2b750d420d77cb992446d" +SRCREV_machine:class-devupstream ?= "d90ecb2b1308b3e362ec4c21ff7cf0a051b445df" PN:class-devupstream = "linux-yocto-upstream" KBRANCH:class-devupstream = "v6.12/base" @@ -44,7 +44,7 @@ SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;name=machine;branch=${KBRA git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.12;destsuffix=${KMETA};protocol=https" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" -LINUX_VERSION ?= "6.12.39" +LINUX_VERSION ?= "6.12.40" PV = "${LINUX_VERSION}+git" -- 2.39.2 ^ permalink raw reply related [flat|nested] 15+ messages in thread
* [PATCH 4/8] linux-yocto/6.12: update CVE exclusions (6.12.40) 2025-08-13 20:49 [PATCH 0/8] kernel: consolidated pull request bruce.ashfield ` (2 preceding siblings ...) 2025-08-13 20:49 ` [PATCH 3/8] linux-yocto/6.12: update to v6.12.40 bruce.ashfield @ 2025-08-13 20:49 ` bruce.ashfield 2025-08-13 20:49 ` [PATCH 5/8] linux-libc-headers: update to v6.16 bruce.ashfield ` (3 subsequent siblings) 7 siblings, 0 replies; 15+ messages in thread From: bruce.ashfield @ 2025-08-13 20:49 UTC (permalink / raw) To: richard.purdie; +Cc: openembedded-core From: Bruce Ashfield <bruce.ashfield@gmail.com> Data pulled from: https://github.com/CVEProject/cvelistV5 1/1 [ Author: cvelistV5 Github Action Email: github_action@example.com Subject: 4 changes (1 new | 3 updated): - 1 new CVEs: CVE-2025-8126 - 3 updated CVEs: CVE-2025-31952, CVE-2025-31953, CVE-2025-31955 Date: Fri, 25 Jul 2025 02:18:30 +0000 ] Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com> --- meta/recipes-kernel/linux/cve-exclusion_6.12.inc | 14 ++++++++++---- 1 file changed, 10 insertions(+), 4 deletions(-) diff --git a/meta/recipes-kernel/linux/cve-exclusion_6.12.inc b/meta/recipes-kernel/linux/cve-exclusion_6.12.inc index e428258bb1..ee2f30b3db 100644 --- a/meta/recipes-kernel/linux/cve-exclusion_6.12.inc +++ b/meta/recipes-kernel/linux/cve-exclusion_6.12.inc @@ -1,11 +1,11 @@ # Auto-generated CVE metadata, DO NOT EDIT BY HAND. -# Generated at 2025-07-18 14:17:49.367230+00:00 for kernel version 6.12.39 -# From linux_kernel_cves cve_2025-07-18_1400Z +# Generated at 2025-07-25 02:49:32.259439+00:00 for kernel version 6.12.40 +# From linux_kernel_cves cve_2025-07-25_0100Z-1-g854b2f05e2c python check_kernel_cve_status_version() { - this_version = "6.12.39" + this_version = "6.12.40" kernel_version = d.getVar("LINUX_VERSION") if kernel_version != this_version: bb.warn("Kernel CVE status needs updating: generated for %s but kernel is %s" % (this_version, kernel_version)) @@ -12938,7 +12938,7 @@ CVE_STATUS[CVE-2025-22112] = "cpe-stable-backport: Backported in 6.12.35" CVE_STATUS[CVE-2025-22114] = "fixed-version: only affects 6.14 onwards" -# CVE-2025-22115 needs backporting (fixed from 6.15) +CVE_STATUS[CVE-2025-22115] = "cpe-stable-backport: Backported in 6.12.40" # CVE-2025-22116 needs backporting (fixed from 6.15) @@ -14236,6 +14236,12 @@ CVE_STATUS[CVE-2025-38348] = "cpe-stable-backport: Backported in 6.12.35" CVE_STATUS[CVE-2025-38349] = "cpe-stable-backport: Backported in 6.12.39" +CVE_STATUS[CVE-2025-38350] = "cpe-stable-backport: Backported in 6.12.37" + +# CVE-2025-38351 needs backporting (fixed from 6.16rc6) + +CVE_STATUS[CVE-2025-38352] = "cpe-stable-backport: Backported in 6.12.34" + CVE_STATUS[CVE-2025-38479] = "cpe-stable-backport: Backported in 6.12.23" CVE_STATUS[CVE-2025-38575] = "cpe-stable-backport: Backported in 6.12.23" -- 2.39.2 ^ permalink raw reply related [flat|nested] 15+ messages in thread
* [PATCH 5/8] linux-libc-headers: update to v6.16 2025-08-13 20:49 [PATCH 0/8] kernel: consolidated pull request bruce.ashfield ` (3 preceding siblings ...) 2025-08-13 20:49 ` [PATCH 4/8] linux-yocto/6.12: update CVE exclusions (6.12.40) bruce.ashfield @ 2025-08-13 20:49 ` bruce.ashfield 2025-08-13 20:49 ` [PATCH 6/8] lttng-modules: update to v2.14.0 bruce.ashfield ` (2 subsequent siblings) 7 siblings, 0 replies; 15+ messages in thread From: bruce.ashfield @ 2025-08-13 20:49 UTC (permalink / raw) To: richard.purdie; +Cc: openembedded-core From: Bruce Ashfield <bruce.ashfield@gmail.com> 6.16 will be the reference kernel for the fall 2025 release, bumping our libc-headers to match. Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com> --- .../{linux-libc-headers_6.15.bb => linux-libc-headers_6.16.bb} | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) rename meta/recipes-kernel/linux-libc-headers/{linux-libc-headers_6.15.bb => linux-libc-headers_6.16.bb} (80%) diff --git a/meta/recipes-kernel/linux-libc-headers/linux-libc-headers_6.15.bb b/meta/recipes-kernel/linux-libc-headers/linux-libc-headers_6.16.bb similarity index 80% rename from meta/recipes-kernel/linux-libc-headers/linux-libc-headers_6.15.bb rename to meta/recipes-kernel/linux-libc-headers/linux-libc-headers_6.16.bb index 70d2fd80ee..c3c77f8719 100644 --- a/meta/recipes-kernel/linux-libc-headers/linux-libc-headers_6.15.bb +++ b/meta/recipes-kernel/linux-libc-headers/linux-libc-headers_6.16.bb @@ -8,5 +8,5 @@ SRC_URI:append:libc-musl = "\ LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" -SRC_URI[sha256sum] = "7586962547803be7ecc4056efc927fb25214548722bd28171172f3599abb9764" +SRC_URI[sha256sum] = "1a4be2fe6b5246aa4ac8987a8a4af34c42a8dd7d08b46ab48516bcc1befbcd83" -- 2.39.2 ^ permalink raw reply related [flat|nested] 15+ messages in thread
* [PATCH 6/8] lttng-modules: update to v2.14.0 2025-08-13 20:49 [PATCH 0/8] kernel: consolidated pull request bruce.ashfield ` (4 preceding siblings ...) 2025-08-13 20:49 ` [PATCH 5/8] linux-libc-headers: update to v6.16 bruce.ashfield @ 2025-08-13 20:49 ` bruce.ashfield 2025-08-13 21:03 ` Patchtest results for " patchtest 2025-08-13 20:49 ` [PATCH 7/8] linux-yocto/6.12: update to v6.12.41 bruce.ashfield 2025-08-13 20:49 ` [PATCH 8/8] linux-yocto/6.12: update CVE exclusions (6.12.41) bruce.ashfield 7 siblings, 1 reply; 15+ messages in thread From: bruce.ashfield @ 2025-08-13 20:49 UTC (permalink / raw) To: richard.purdie; +Cc: openembedded-core From: Bruce Ashfield <bruce.ashfield@gmail.com> As part of this update: - drop one patch that is upstream now - refresh one patch for new context - backport two patches to fix the build against 6.16 (drop them in 2.14.1+ - update the license checksum, as the following change has been made to the license: commit 61baff6e8de2462f45006662bc34bcbf5f645ba0 Author: Michael Jeanson <mjeanson@efficios.com> Date: Tue Jun 18 14:35:38 2024 -0400 Implement REUSE 3.0 with SPDX identifiers Implement the full REUSE spec [1] to help with copyright and licensing audits and compliance. This will reduce a lot of manual work for the licensing audit required in Debian on each update and also allow using automated tools. For files that lacked copyright and licensing information, I used the following guidelines. If a clear author could be determined from the git history use it, otherwise use 'EfficiOS Inc.'. For code use 'GPL-2.0-only OR LGPL-2.1-only' unless otherwise stated, for documentation 'CC-BY-SA-4.0' and for data files 'CC0-1.0'. Freeform text files were converted to Markdown to allow licensing comments. Running the reuse tool on the repo is now succesful: $ reuse lint # SUMMARY * Bad licenses: 0 * Deprecated licenses: 0 * Licenses without file extension: 0 * Missing licenses: 0 * Unused licenses: 0 * Used licenses: CC0-1.0, GPL-2.0-only, CC-BY-SA-4.0, MIT, LGPL-2.1-only * Read errors: 0 * files with copyright information: 358 / 358 * files with license information: 358 / 358 Congratulations! Your project is compliant with version 3.0 of the REUSE Specification :-) [1] https://reuse.software/tutorial/ Change-Id: I1755cab24a6fcec7a6c9a2136891418203ec34b8 Signed-off-by: Michael Jeanson <mjeanson@efficios.com> Signed-off-by: Mathieu Desnoyers <mathieu.desnoyers@efficios.com> Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com> --- ...x-sigaction-build-without-CONFIG_COM.patch | 35 -- ...e-missing-CONFIG_TRACEPOINTS-to-warn.patch | 18 +- ...mentation-Add-missing-provider-name-.patch | 45 ++ ...pose-__percpu-tag-as-a-named-address.patch | 438 ++++++++++++++++++ ...les_2.13.19.bb => lttng-modules_2.14.0.bb} | 8 +- 5 files changed, 496 insertions(+), 48 deletions(-) delete mode 100644 meta/recipes-kernel/lttng/lttng-modules/0001-lttng-modules-fix-sigaction-build-without-CONFIG_COM.patch create mode 100644 meta/recipes-kernel/lttng/lttng-modules/0001-writeback-instrumentation-Add-missing-provider-name-.patch create mode 100644 meta/recipes-kernel/lttng/lttng-modules/0002-fix-percpu-repurpose-__percpu-tag-as-a-named-address.patch rename meta/recipes-kernel/lttng/{lttng-modules_2.13.19.bb => lttng-modules_2.14.0.bb} (81%) diff --git a/meta/recipes-kernel/lttng/lttng-modules/0001-lttng-modules-fix-sigaction-build-without-CONFIG_COM.patch b/meta/recipes-kernel/lttng/lttng-modules/0001-lttng-modules-fix-sigaction-build-without-CONFIG_COM.patch deleted file mode 100644 index eb43abbae2..0000000000 --- a/meta/recipes-kernel/lttng/lttng-modules/0001-lttng-modules-fix-sigaction-build-without-CONFIG_COM.patch +++ /dev/null @@ -1,35 +0,0 @@ -From 0e2095bcc50e7a07d3478f8d3c0ae5ad46575594 Mon Sep 17 00:00:00 2001 -From: Mikko Rapeli <mikko.rapeli@linaro.org> -Date: Mon, 28 Apr 2025 12:07:24 +0000 -Subject: [PATCH] lttng-modules: fix sigaction build without - CONFIG_COMPAT_OLD_SIGACTION - -Workaround build failure when CONFIG_COMPAT_OLD_SIGACTION is not enabled -in kernel config. - -Upstream-Status: Submitted [https://bugs.lttng.org/issues/1426] - -Signed-off-by: Mikko Rapeli <mikko.rapeli@linaro.org> ---- - .../instrumentation/syscalls/headers/arm-32-syscalls_pointers.h | 2 ++ - 1 file changed, 2 insertions(+) - -diff --git a/include/instrumentation/syscalls/headers/arm-32-syscalls_pointers.h b/include/instrumentation/syscalls/headers/arm-32-syscalls_pointers.h -index 5f4ca5b..1514cae 100644 ---- a/include/instrumentation/syscalls/headers/arm-32-syscalls_pointers.h -+++ b/include/instrumentation/syscalls/headers/arm-32-syscalls_pointers.h -@@ -1890,9 +1890,11 @@ TRACE_SYSCALL_TABLE(chroot, chroot, 61, 1) - #ifndef OVERRIDE_TABLE_32_ustat - TRACE_SYSCALL_TABLE(ustat, ustat, 62, 2) - #endif -+#ifdef CONFIG_COMPAT_OLD_SIGACTION - #ifndef OVERRIDE_TABLE_32_sigaction - TRACE_SYSCALL_TABLE(sigaction, sigaction, 67, 3) - #endif -+#endif /* CONFIG_COMPAT_OLD_SIGACTION */ - #ifndef OVERRIDE_TABLE_32_sigpending - TRACE_SYSCALL_TABLE(sigpending, sigpending, 73, 1) - #endif --- -2.49.0 - diff --git a/meta/recipes-kernel/lttng/lttng-modules/0001-src-Kbuild-change-missing-CONFIG_TRACEPOINTS-to-warn.patch b/meta/recipes-kernel/lttng/lttng-modules/0001-src-Kbuild-change-missing-CONFIG_TRACEPOINTS-to-warn.patch index 4911982461..1854d9a944 100644 --- a/meta/recipes-kernel/lttng/lttng-modules/0001-src-Kbuild-change-missing-CONFIG_TRACEPOINTS-to-warn.patch +++ b/meta/recipes-kernel/lttng/lttng-modules/0001-src-Kbuild-change-missing-CONFIG_TRACEPOINTS-to-warn.patch @@ -19,11 +19,11 @@ Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com> src/Kbuild | 7 ++++++- 1 file changed, 6 insertions(+), 1 deletion(-) -diff --git a/src/Kbuild b/src/Kbuild -index 7137874..04eb5c9 100644 ---- a/src/Kbuild -+++ b/src/Kbuild -@@ -2,10 +2,13 @@ +Index: lttng-modules-2.14.0/src/Kbuild +=================================================================== +--- lttng-modules-2.14.0.orig/src/Kbuild ++++ lttng-modules-2.14.0/src/Kbuild +@@ -3,10 +3,13 @@ ifdef CONFIG_LOCALVERSION # Check if dot-config is included. ifeq ($(CONFIG_TRACEPOINTS),) @@ -38,9 +38,9 @@ index 7137874..04eb5c9 100644 TOP_LTTNG_MODULES_DIR := $(shell dirname $(lastword $(MAKEFILE_LIST)))/.. lttng_check_linux_version = $(shell pwd)/include/linux/version.h -@@ -150,3 +153,5 @@ lttng-statedump-objs := lttng-statedump-impl.o - obj-$(CONFIG_LTTNG) += probes/ - obj-$(CONFIG_LTTNG) += lib/ - obj-$(CONFIG_LTTNG) += tests/ +@@ -168,3 +171,5 @@ + obj-$(CONFIG_LTTNG_SYSCALLS_EXTRACTOR) += lttng-syscalls-extractor.o + + # vim:syntax=make + +endif # DISABLE_MODULE diff --git a/meta/recipes-kernel/lttng/lttng-modules/0001-writeback-instrumentation-Add-missing-provider-name-.patch b/meta/recipes-kernel/lttng/lttng-modules/0001-writeback-instrumentation-Add-missing-provider-name-.patch new file mode 100644 index 0000000000..2afad7084b --- /dev/null +++ b/meta/recipes-kernel/lttng/lttng-modules/0001-writeback-instrumentation-Add-missing-provider-name-.patch @@ -0,0 +1,45 @@ +From 039dbff4ba95eca58f8ebbcf1640a46b482c24e0 Mon Sep 17 00:00:00 2001 +From: Mathieu Desnoyers <mathieu.desnoyers@efficios.com> +Date: Fri, 4 Jul 2025 11:34:45 -0400 +Subject: [PATCH 1/2] writeback instrumentation: Add missing provider name + prefix + +The events folio_wait_writeback and wait_on_page_writeback do not have +the writeback event name prefix mandated by the sanity check in +lttng_kernel_probe_register, which trigger a console warning. + +Change those event names to provide the relevant provider name prefix. + +Upstream-Status: Backport [commit 039dbff4] + +Signed-off-by: Mathieu Desnoyers <mathieu.desnoyers@efficios.com> +Change-Id: Ia069e2dac4a373170e059792a947cffb6c956cb2 +--- + include/instrumentation/events/writeback.h | 4 ++-- + 1 file changed, 2 insertions(+), 2 deletions(-) + +diff --git a/include/instrumentation/events/writeback.h b/include/instrumentation/events/writeback.h +index d694e323..b9e26b5b 100644 +--- a/include/instrumentation/events/writeback.h ++++ b/include/instrumentation/events/writeback.h +@@ -122,7 +122,7 @@ LTTNG_TRACEPOINT_EVENT_INSTANCE(writeback_folio_template, writeback_dirty_folio, + TP_ARGS(folio, mapping) + ) + +-LTTNG_TRACEPOINT_EVENT_INSTANCE(writeback_folio_template, folio_wait_writeback, ++LTTNG_TRACEPOINT_EVENT_INSTANCE(writeback_folio_template, writeback_folio_wait, + + TP_PROTO(struct folio *folio, struct address_space *mapping), + +@@ -150,7 +150,7 @@ LTTNG_TRACEPOINT_EVENT_INSTANCE(writeback_page_template, writeback_dirty_page, + TP_ARGS(page, mapping) + ) + +-LTTNG_TRACEPOINT_EVENT_INSTANCE(writeback_page_template, wait_on_page_writeback, ++LTTNG_TRACEPOINT_EVENT_INSTANCE(writeback_page_template, writeback_wait_on_page, + + TP_PROTO(struct page *page, struct address_space *mapping), + +-- +2.39.2 + diff --git a/meta/recipes-kernel/lttng/lttng-modules/0002-fix-percpu-repurpose-__percpu-tag-as-a-named-address.patch b/meta/recipes-kernel/lttng/lttng-modules/0002-fix-percpu-repurpose-__percpu-tag-as-a-named-address.patch new file mode 100644 index 0000000000..26d16c2cb8 --- /dev/null +++ b/meta/recipes-kernel/lttng/lttng-modules/0002-fix-percpu-repurpose-__percpu-tag-as-a-named-address.patch @@ -0,0 +1,438 @@ +From 243dbd5c83fd647144b4e6f4e6e01e9e59fe910f Mon Sep 17 00:00:00 2001 +From: Michael Jeanson <mjeanson@efficios.com> +Date: Tue, 29 Jul 2025 15:34:23 -0400 +Subject: [PATCH 2/2] fix: percpu: repurpose __percpu tag as a named address + space qualifier (v6.15) + +The '__percpu' annotation was repurposed as a named address space +qualifier, with compilers supporting 'typeof_unqual' like GCC 14 and +Clang 19 this is now enforced at build time. + +See upstream commits: + + commit 6cea5ae714ba47ea4807d15903baca9857a450e6 + Author: Uros Bizjak <ubizjak@gmail.com> + Date: Mon Jan 27 17:05:09 2025 +0100 + + percpu: repurpose __percpu tag as a named address space qualifier + + The patch introduces __percpu_qual define and repurposes __percpu tag as a + named address space qualifier using the new define. + + Arches can now conditionally define __percpu_qual as their named address + space qualifier for percpu variables. + + commit 6a367577153acd9b432a5340fb10891eeb7e10f1 + Author: Uros Bizjak <ubizjak@gmail.com> + Date: Mon Jan 27 17:05:10 2025 +0100 + + percpu/x86: enable strict percpu checks via named AS qualifiers + + This patch declares percpu variables in __seg_gs/__seg_fs named AS and + keeps them named AS qualified until they are dereferenced with percpu + accessor. This approach enables various compiler check for + cross-namespace variable assignments. + +Upstream-Status: Backport [commit 243dbd5c] + +Change-Id: Ib212cb4ef077da994867f0541921529dd4a799a0 +Signed-off-by: Michael Jeanson <mjeanson@efficios.com> +Signed-off-by: Mathieu Desnoyers <mathieu.desnoyers@efficios.com> +--- + include/ringbuffer/backend_types.h | 5 ++- + include/ringbuffer/frontend_api.h | 4 +- + src/lib/ringbuffer/ring_buffer_backend.c | 30 +++++++------- + src/lib/ringbuffer/ring_buffer_frontend.c | 40 +++++++++---------- + src/lib/ringbuffer/ring_buffer_iterator.c | 8 ++-- + src/lttng-context-callstack.c | 2 +- + src/lttng-ring-buffer-event-notifier-client.h | 2 +- + src/lttng-ring-buffer-metadata-client.h | 2 +- + 8 files changed, 48 insertions(+), 45 deletions(-) + +diff --git a/include/ringbuffer/backend_types.h b/include/ringbuffer/backend_types.h +index c23889ea..caafe4da 100644 +--- a/include/ringbuffer/backend_types.h ++++ b/include/ringbuffer/backend_types.h +@@ -79,7 +79,10 @@ struct channel_backend { + */ + unsigned int buf_size_order; /* Order of buffer size */ + unsigned int extra_reader_sb:1; /* has extra reader subbuffer ? */ +- struct lttng_kernel_ring_buffer *buf; /* Channel per-cpu buffers */ ++ union { ++ struct lttng_kernel_ring_buffer *global_buf; /* Channel global buffer */ ++ struct lttng_kernel_ring_buffer __percpu *percpu_buf; /* Channel per-cpu buffers */ ++ }; + + unsigned long num_subbuf; /* Number of sub-buffers for writer */ + u64 start_timestamp; /* Channel creation timestamp value */ +diff --git a/include/ringbuffer/frontend_api.h b/include/ringbuffer/frontend_api.h +index e8d77d95..a0319c98 100644 +--- a/include/ringbuffer/frontend_api.h ++++ b/include/ringbuffer/frontend_api.h +@@ -153,9 +153,9 @@ int lib_ring_buffer_reserve(const struct lttng_kernel_ring_buffer_config *config + return -EAGAIN; + + if (config->alloc == RING_BUFFER_ALLOC_PER_CPU) +- buf = per_cpu_ptr(chan->backend.buf, ctx->priv.reserve_cpu); ++ buf = per_cpu_ptr(chan->backend.percpu_buf, ctx->priv.reserve_cpu); + else +- buf = chan->backend.buf; ++ buf = chan->backend.global_buf; + if (unlikely(atomic_read(&buf->record_disabled))) + return -EAGAIN; + ctx->priv.buf = buf; +diff --git a/src/lib/ringbuffer/ring_buffer_backend.c b/src/lib/ringbuffer/ring_buffer_backend.c +index 3eaa1b96..b5ecde4d 100644 +--- a/src/lib/ringbuffer/ring_buffer_backend.c ++++ b/src/lib/ringbuffer/ring_buffer_backend.c +@@ -279,7 +279,7 @@ int lttng_cpuhp_rb_backend_prepare(unsigned int cpu, + + CHAN_WARN_ON(chanb, config->alloc == RING_BUFFER_ALLOC_PER_CHANNEL); + +- buf = per_cpu_ptr(chanb->buf, cpu); ++ buf = per_cpu_ptr(chanb->percpu_buf, cpu); + ret = lib_ring_buffer_create(buf, chanb, cpu); + if (ret) { + printk(KERN_ERR +@@ -320,7 +320,7 @@ int lib_ring_buffer_cpu_hp_callback(struct notifier_block *nb, + switch (action) { + case CPU_UP_PREPARE: + case CPU_UP_PREPARE_FROZEN: +- buf = per_cpu_ptr(chanb->buf, cpu); ++ buf = per_cpu_ptr(chanb->percpu_buf, cpu); + ret = lib_ring_buffer_create(buf, chanb, cpu); + if (ret) { + printk(KERN_ERR +@@ -415,8 +415,8 @@ int channel_backend_init(struct channel_backend *chanb, + + if (config->alloc == RING_BUFFER_ALLOC_PER_CPU) { + /* Allocating the buffer per-cpu structures */ +- chanb->buf = alloc_percpu(struct lttng_kernel_ring_buffer); +- if (!chanb->buf) ++ chanb->percpu_buf = alloc_percpu(struct lttng_kernel_ring_buffer); ++ if (!chanb->percpu_buf) + goto free_cpumask; + + #if (LTTNG_LINUX_VERSION_CODE >= LTTNG_KERNEL_VERSION(4,10,0)) +@@ -447,7 +447,7 @@ int channel_backend_init(struct channel_backend *chanb, + + lttng_cpus_read_lock(); + for_each_online_cpu(i) { +- ret = lib_ring_buffer_create(per_cpu_ptr(chanb->buf, i), ++ ret = lib_ring_buffer_create(per_cpu_ptr(chanb->percpu_buf, i), + chanb, i); + if (ret) + goto free_bufs; /* cpu hotplug locked */ +@@ -455,7 +455,7 @@ int channel_backend_init(struct channel_backend *chanb, + lttng_cpus_read_unlock(); + #else + for_each_possible_cpu(i) { +- ret = lib_ring_buffer_create(per_cpu_ptr(chanb->buf, i), ++ ret = lib_ring_buffer_create(per_cpu_ptr(chanb->percpu_buf, i), + chanb, i); + if (ret) + goto free_bufs; +@@ -464,10 +464,10 @@ int channel_backend_init(struct channel_backend *chanb, + } + #endif /* #else #if (LTTNG_LINUX_VERSION_CODE >= LTTNG_KERNEL_VERSION(4,10,0)) */ + } else { +- chanb->buf = kzalloc(sizeof(struct lttng_kernel_ring_buffer), GFP_KERNEL); +- if (!chanb->buf) ++ chanb->global_buf = kzalloc(sizeof(struct lttng_kernel_ring_buffer), GFP_KERNEL); ++ if (!chanb->global_buf) + goto free_cpumask; +- ret = lib_ring_buffer_create(chanb->buf, chanb, -1); ++ ret = lib_ring_buffer_create(chanb->global_buf, chanb, -1); + if (ret) + goto free_bufs; + } +@@ -491,15 +491,15 @@ free_bufs: + #endif /* #else #if (LTTNG_LINUX_VERSION_CODE >= LTTNG_KERNEL_VERSION(4,10,0)) */ + for_each_possible_cpu(i) { + struct lttng_kernel_ring_buffer *buf = +- per_cpu_ptr(chanb->buf, i); ++ per_cpu_ptr(chanb->percpu_buf, i); + + if (!buf->backend.allocated) + continue; + lib_ring_buffer_free(buf); + } +- free_percpu(chanb->buf); ++ free_percpu(chanb->percpu_buf); + } else +- kfree(chanb->buf); ++ kfree(chanb->global_buf); + free_cpumask: + if (config->alloc == RING_BUFFER_ALLOC_PER_CPU) + free_cpumask_var(chanb->cpumask); +@@ -542,16 +542,16 @@ void channel_backend_free(struct channel_backend *chanb) + + if (config->alloc == RING_BUFFER_ALLOC_PER_CPU) { + for_each_possible_cpu(i) { +- struct lttng_kernel_ring_buffer *buf = per_cpu_ptr(chanb->buf, i); ++ struct lttng_kernel_ring_buffer *buf = per_cpu_ptr(chanb->percpu_buf, i); + + if (!buf->backend.allocated) + continue; + lib_ring_buffer_free(buf); + } + free_cpumask_var(chanb->cpumask); +- free_percpu(chanb->buf); ++ free_percpu(chanb->percpu_buf); + } else { +- struct lttng_kernel_ring_buffer *buf = chanb->buf; ++ struct lttng_kernel_ring_buffer *buf = chanb->global_buf; + + CHAN_WARN_ON(chanb, !buf->backend.allocated); + lib_ring_buffer_free(buf); +diff --git a/src/lib/ringbuffer/ring_buffer_frontend.c b/src/lib/ringbuffer/ring_buffer_frontend.c +index 1ed9dc47..f9def043 100644 +--- a/src/lib/ringbuffer/ring_buffer_frontend.c ++++ b/src/lib/ringbuffer/ring_buffer_frontend.c +@@ -505,7 +505,7 @@ int lttng_cpuhp_rb_frontend_dead(unsigned int cpu, + { + struct lttng_kernel_ring_buffer_channel *chan = container_of(node, struct lttng_kernel_ring_buffer_channel, + cpuhp_prepare); +- struct lttng_kernel_ring_buffer *buf = per_cpu_ptr(chan->backend.buf, cpu); ++ struct lttng_kernel_ring_buffer *buf = per_cpu_ptr(chan->backend.percpu_buf, cpu); + const struct lttng_kernel_ring_buffer_config *config = &chan->backend.config; + + CHAN_WARN_ON(chan, config->alloc == RING_BUFFER_ALLOC_PER_CHANNEL); +@@ -526,7 +526,7 @@ int lttng_cpuhp_rb_frontend_online(unsigned int cpu, + { + struct lttng_kernel_ring_buffer_channel *chan = container_of(node, struct lttng_kernel_ring_buffer_channel, + cpuhp_online); +- struct lttng_kernel_ring_buffer *buf = per_cpu_ptr(chan->backend.buf, cpu); ++ struct lttng_kernel_ring_buffer *buf = per_cpu_ptr(chan->backend.percpu_buf, cpu); + const struct lttng_kernel_ring_buffer_config *config = &chan->backend.config; + + CHAN_WARN_ON(chan, config->alloc == RING_BUFFER_ALLOC_PER_CHANNEL); +@@ -543,7 +543,7 @@ int lttng_cpuhp_rb_frontend_offline(unsigned int cpu, + { + struct lttng_kernel_ring_buffer_channel *chan = container_of(node, struct lttng_kernel_ring_buffer_channel, + cpuhp_online); +- struct lttng_kernel_ring_buffer *buf = per_cpu_ptr(chan->backend.buf, cpu); ++ struct lttng_kernel_ring_buffer *buf = per_cpu_ptr(chan->backend.percpu_buf, cpu); + const struct lttng_kernel_ring_buffer_config *config = &chan->backend.config; + + CHAN_WARN_ON(chan, config->alloc == RING_BUFFER_ALLOC_PER_CHANNEL); +@@ -574,7 +574,7 @@ int lib_ring_buffer_cpu_hp_callback(struct notifier_block *nb, + unsigned int cpu = (unsigned long)hcpu; + struct lttng_kernel_ring_buffer_channel *chan = container_of(nb, struct lttng_kernel_ring_buffer_channel, + cpu_hp_notifier); +- struct lttng_kernel_ring_buffer *buf = per_cpu_ptr(chan->backend.buf, cpu); ++ struct lttng_kernel_ring_buffer *buf = per_cpu_ptr(chan->backend.percpu_buf, cpu); + const struct lttng_kernel_ring_buffer_config *config = &chan->backend.config; + + if (!chan->cpu_hp_enable) +@@ -741,7 +741,7 @@ static void channel_unregister_notifiers(struct lttng_kernel_ring_buffer_channel + lttng_cpus_read_lock(); + chan->cpu_hp_enable = 0; + for_each_online_cpu(cpu) { +- struct lttng_kernel_ring_buffer *buf = per_cpu_ptr(chan->backend.buf, ++ struct lttng_kernel_ring_buffer *buf = per_cpu_ptr(chan->backend.percpu_buf, + cpu); + lib_ring_buffer_stop_switch_timer(buf); + lib_ring_buffer_stop_read_timer(buf); +@@ -750,7 +750,7 @@ static void channel_unregister_notifiers(struct lttng_kernel_ring_buffer_channel + unregister_cpu_notifier(&chan->cpu_hp_notifier); + #else + for_each_possible_cpu(cpu) { +- struct lttng_kernel_ring_buffer *buf = per_cpu_ptr(chan->backend.buf, ++ struct lttng_kernel_ring_buffer *buf = per_cpu_ptr(chan->backend.percpu_buf, + cpu); + lib_ring_buffer_stop_switch_timer(buf); + lib_ring_buffer_stop_read_timer(buf); +@@ -759,7 +759,7 @@ static void channel_unregister_notifiers(struct lttng_kernel_ring_buffer_channel + } + #endif /* #else #if (LTTNG_LINUX_VERSION_CODE >= LTTNG_KERNEL_VERSION(4,10,0)) */ + } else { +- struct lttng_kernel_ring_buffer *buf = chan->backend.buf; ++ struct lttng_kernel_ring_buffer *buf = chan->backend.global_buf; + + lib_ring_buffer_stop_switch_timer(buf); + lib_ring_buffer_stop_read_timer(buf); +@@ -788,14 +788,14 @@ void lib_ring_buffer_set_quiescent_channel(struct lttng_kernel_ring_buffer_chann + if (config->alloc == RING_BUFFER_ALLOC_PER_CPU) { + lttng_cpus_read_lock(); + for_each_channel_cpu(cpu, chan) { +- struct lttng_kernel_ring_buffer *buf = per_cpu_ptr(chan->backend.buf, ++ struct lttng_kernel_ring_buffer *buf = per_cpu_ptr(chan->backend.percpu_buf, + cpu); + + lib_ring_buffer_set_quiescent(buf); + } + lttng_cpus_read_unlock(); + } else { +- struct lttng_kernel_ring_buffer *buf = chan->backend.buf; ++ struct lttng_kernel_ring_buffer *buf = chan->backend.global_buf; + + lib_ring_buffer_set_quiescent(buf); + } +@@ -810,14 +810,14 @@ void lib_ring_buffer_clear_quiescent_channel(struct lttng_kernel_ring_buffer_cha + if (config->alloc == RING_BUFFER_ALLOC_PER_CPU) { + lttng_cpus_read_lock(); + for_each_channel_cpu(cpu, chan) { +- struct lttng_kernel_ring_buffer *buf = per_cpu_ptr(chan->backend.buf, ++ struct lttng_kernel_ring_buffer *buf = per_cpu_ptr(chan->backend.percpu_buf, + cpu); + + lib_ring_buffer_clear_quiescent(buf); + } + lttng_cpus_read_unlock(); + } else { +- struct lttng_kernel_ring_buffer *buf = chan->backend.buf; ++ struct lttng_kernel_ring_buffer *buf = chan->backend.global_buf; + + lib_ring_buffer_clear_quiescent(buf); + } +@@ -915,7 +915,7 @@ struct lttng_kernel_ring_buffer_channel *channel_create(const struct lttng_kerne + + lttng_cpus_read_lock(); + for_each_online_cpu(cpu) { +- struct lttng_kernel_ring_buffer *buf = per_cpu_ptr(chan->backend.buf, ++ struct lttng_kernel_ring_buffer *buf = per_cpu_ptr(chan->backend.percpu_buf, + cpu); + spin_lock(&per_cpu(ring_buffer_nohz_lock, cpu)); + lib_ring_buffer_start_switch_timer(buf); +@@ -926,7 +926,7 @@ struct lttng_kernel_ring_buffer_channel *channel_create(const struct lttng_kerne + lttng_cpus_read_unlock(); + #else + for_each_possible_cpu(cpu) { +- struct lttng_kernel_ring_buffer *buf = per_cpu_ptr(chan->backend.buf, ++ struct lttng_kernel_ring_buffer *buf = per_cpu_ptr(chan->backend.percpu_buf, + cpu); + spin_lock(&per_cpu(ring_buffer_nohz_lock, cpu)); + lib_ring_buffer_start_switch_timer(buf); +@@ -947,7 +947,7 @@ struct lttng_kernel_ring_buffer_channel *channel_create(const struct lttng_kerne + #endif /* defined(CONFIG_NO_HZ) && defined(CONFIG_LIB_RING_BUFFER) */ + + } else { +- struct lttng_kernel_ring_buffer *buf = chan->backend.buf; ++ struct lttng_kernel_ring_buffer *buf = chan->backend.global_buf; + + lib_ring_buffer_start_switch_timer(buf); + lib_ring_buffer_start_read_timer(buf); +@@ -1004,7 +1004,7 @@ void *channel_destroy(struct lttng_kernel_ring_buffer_channel *chan) + * unregistered. + */ + for_each_channel_cpu(cpu, chan) { +- struct lttng_kernel_ring_buffer *buf = per_cpu_ptr(chan->backend.buf, ++ struct lttng_kernel_ring_buffer *buf = per_cpu_ptr(chan->backend.percpu_buf, + cpu); + + if (config->cb.buffer_finalize) +@@ -1019,7 +1019,7 @@ void *channel_destroy(struct lttng_kernel_ring_buffer_channel *chan) + wake_up_interruptible(&buf->read_wait); + } + } else { +- struct lttng_kernel_ring_buffer *buf = chan->backend.buf; ++ struct lttng_kernel_ring_buffer *buf = chan->backend.global_buf; + + if (config->cb.buffer_finalize) + config->cb.buffer_finalize(buf, chan->backend.priv, -1); +@@ -1044,9 +1044,9 @@ struct lttng_kernel_ring_buffer *channel_get_ring_buffer( + struct lttng_kernel_ring_buffer_channel *chan, int cpu) + { + if (config->alloc == RING_BUFFER_ALLOC_PER_CHANNEL) +- return chan->backend.buf; ++ return chan->backend.global_buf; + else +- return per_cpu_ptr(chan->backend.buf, cpu); ++ return per_cpu_ptr(chan->backend.percpu_buf, cpu); + } + EXPORT_SYMBOL_GPL(channel_get_ring_buffer); + +@@ -2271,9 +2271,9 @@ static struct lttng_kernel_ring_buffer *get_current_buf(struct lttng_kernel_ring + const struct lttng_kernel_ring_buffer_config *config = &chan->backend.config; + + if (config->alloc == RING_BUFFER_ALLOC_PER_CPU) +- return per_cpu_ptr(chan->backend.buf, cpu); ++ return per_cpu_ptr(chan->backend.percpu_buf, cpu); + else +- return chan->backend.buf; ++ return chan->backend.global_buf; + } + + void lib_ring_buffer_lost_event_too_big(struct lttng_kernel_ring_buffer_channel *chan) +diff --git a/src/lib/ringbuffer/ring_buffer_iterator.c b/src/lib/ringbuffer/ring_buffer_iterator.c +index 88d79412..1a1db5e2 100644 +--- a/src/lib/ringbuffer/ring_buffer_iterator.c ++++ b/src/lib/ringbuffer/ring_buffer_iterator.c +@@ -361,7 +361,7 @@ int lttng_cpuhp_rb_iter_online(unsigned int cpu, + { + struct lttng_kernel_ring_buffer_channel *chan = container_of(node, struct lttng_kernel_ring_buffer_channel, + cpuhp_iter_online); +- struct lttng_kernel_ring_buffer *buf = per_cpu_ptr(chan->backend.buf, cpu); ++ struct lttng_kernel_ring_buffer *buf = per_cpu_ptr(chan->backend.percpu_buf, cpu); + const struct lttng_kernel_ring_buffer_config *config = &chan->backend.config; + + CHAN_WARN_ON(chan, config->alloc == RING_BUFFER_ALLOC_PER_CHANNEL); +@@ -382,7 +382,7 @@ int channel_iterator_cpu_hotplug(struct notifier_block *nb, + unsigned int cpu = (unsigned long)hcpu; + struct lttng_kernel_ring_buffer_channel *chan = container_of(nb, struct lttng_kernel_ring_buffer_channel, + hp_iter_notifier); +- struct lttng_kernel_ring_buffer *buf = per_cpu_ptr(chan->backend.buf, cpu); ++ struct lttng_kernel_ring_buffer *buf = per_cpu_ptr(chan->backend.percpu_buf, cpu); + const struct lttng_kernel_ring_buffer_config *config = &chan->backend.config; + + if (!chan->hp_iter_enable) +@@ -443,14 +443,14 @@ int channel_iterator_init(struct lttng_kernel_ring_buffer_channel *chan) + + lttng_cpus_read_lock(); + for_each_online_cpu(cpu) { +- buf = per_cpu_ptr(chan->backend.buf, cpu); ++ buf = per_cpu_ptr(chan->backend.percpu_buf, cpu); + lib_ring_buffer_iterator_init(chan, buf); + } + chan->hp_iter_enable = 1; + lttng_cpus_read_unlock(); + #else + for_each_possible_cpu(cpu) { +- buf = per_cpu_ptr(chan->backend.buf, cpu); ++ buf = per_cpu_ptr(chan->backend.percpu_buf, cpu); + lib_ring_buffer_iterator_init(chan, buf); + } + #endif +diff --git a/src/lttng-context-callstack.c b/src/lttng-context-callstack.c +index 4385472e..c5910718 100644 +--- a/src/lttng-context-callstack.c ++++ b/src/lttng-context-callstack.c +@@ -69,7 +69,7 @@ void field_data_free(struct field_data *fdata) + } + + static +-struct field_data __percpu *field_data_create(enum lttng_cs_ctx_modes mode) ++struct field_data *field_data_create(enum lttng_cs_ctx_modes mode) + { + struct lttng_cs __percpu *cs_set; + struct field_data *fdata; +diff --git a/src/lttng-ring-buffer-event-notifier-client.h b/src/lttng-ring-buffer-event-notifier-client.h +index 95deab46..b4145914 100644 +--- a/src/lttng-ring-buffer-event-notifier-client.h ++++ b/src/lttng-ring-buffer-event-notifier-client.h +@@ -363,7 +363,7 @@ size_t lttng_packet_avail_size(struct lttng_kernel_ring_buffer_channel *chan) + unsigned long o_begin; + struct lttng_kernel_ring_buffer *buf; + +- buf = chan->backend.buf; /* Only for global buffer ! */ ++ buf = chan->backend.global_buf; /* Only for global buffer ! */ + o_begin = v_read(&client_config, &buf->offset); + if (subbuf_offset(o_begin, chan) != 0) { + return chan->backend.subbuf_size - subbuf_offset(o_begin, chan); +diff --git a/src/lttng-ring-buffer-metadata-client.h b/src/lttng-ring-buffer-metadata-client.h +index 99158451..9ef73266 100644 +--- a/src/lttng-ring-buffer-metadata-client.h ++++ b/src/lttng-ring-buffer-metadata-client.h +@@ -368,7 +368,7 @@ size_t lttng_packet_avail_size(struct lttng_kernel_ring_buffer_channel *chan) + unsigned long o_begin; + struct lttng_kernel_ring_buffer *buf; + +- buf = chan->backend.buf; /* Only for global buffer ! */ ++ buf = chan->backend.global_buf; /* Only for global buffer ! */ + o_begin = v_read(&client_config, &buf->offset); + if (subbuf_offset(o_begin, chan) != 0) { + return chan->backend.subbuf_size - subbuf_offset(o_begin, chan); +-- +2.39.2 + diff --git a/meta/recipes-kernel/lttng/lttng-modules_2.13.19.bb b/meta/recipes-kernel/lttng/lttng-modules_2.14.0.bb similarity index 81% rename from meta/recipes-kernel/lttng/lttng-modules_2.13.19.bb rename to meta/recipes-kernel/lttng/lttng-modules_2.14.0.bb index 63ba488515..6bbe1c5a19 100644 --- a/meta/recipes-kernel/lttng/lttng-modules_2.13.19.bb +++ b/meta/recipes-kernel/lttng/lttng-modules_2.14.0.bb @@ -3,21 +3,21 @@ SUMMARY = "Linux Trace Toolkit KERNEL MODULE" DESCRIPTION = "The lttng-modules 2.0 package contains the kernel tracer modules" HOMEPAGE = "https://lttng.org/" LICENSE = "LGPL-2.1-only & GPL-2.0-only & MIT" -LIC_FILES_CHKSUM = "file://LICENSE;md5=8d0d9f08888046474772a5d745d89d6a" +LIC_FILES_CHKSUM = "file://LICENSE;md5=018e002dbdda3306682e394ddd65fa32" inherit module include lttng-platforms.inc SRC_URI = "https://lttng.org/files/${BPN}/${BPN}-${PV}.tar.bz2 \ - file://0001-lttng-modules-fix-sigaction-build-without-CONFIG_COM.patch \ + file://0001-writeback-instrumentation-Add-missing-provider-name-.patch \ + file://0002-fix-percpu-repurpose-__percpu-tag-as-a-named-address.patch \ " # Use :append here so that the patch is applied also when using devupstream SRC_URI:append = " file://0001-src-Kbuild-change-missing-CONFIG_TRACEPOINTS-to-warn.patch \ " - -SRC_URI[sha256sum] = "06d704633749039f8fa72a954bec6486058386e2a0c3557b22c484698f9b34d5" +SRC_URI[sha256sum] = "f2261e738b1dd1027640e5ba3040dee292241b847d5745766b3ba640e168c94a" export INSTALL_MOD_DIR = "kernel/lttng-modules" -- 2.39.2 ^ permalink raw reply related [flat|nested] 15+ messages in thread
* Patchtest results for [PATCH 6/8] lttng-modules: update to v2.14.0 2025-08-13 20:49 ` [PATCH 6/8] lttng-modules: update to v2.14.0 bruce.ashfield @ 2025-08-13 21:03 ` patchtest 0 siblings, 0 replies; 15+ messages in thread From: patchtest @ 2025-08-13 21:03 UTC (permalink / raw) To: bruce.ashfield; +Cc: openembedded-core [-- Attachment #1: Type: text/plain, Size: 2922 bytes --] Thank you for your submission. Patchtest identified one or more issues with the patch. Please see the log below for more information: --- Testing patch /home/patchtest/share/mboxes/6-8-lttng-modules-update-to-v2.14.0.patch FAIL: test lic files chksum modified not mentioned: LIC_FILES_CHKSUM changed without "License-Update:" tag and description in commit message (test_metadata.TestMetadata.test_lic_files_chksum_modified_not_mentioned) PASS: pretest src uri left files (test_metadata.TestMetadata.pretest_src_uri_left_files) PASS: test CVE check ignore (test_metadata.TestMetadata.test_cve_check_ignore) PASS: test CVE tag format (test_patch.TestPatch.test_cve_tag_format) PASS: test Signed-off-by presence (test_mbox.TestMbox.test_signed_off_by_presence) PASS: test Signed-off-by presence (test_patch.TestPatch.test_signed_off_by_presence) PASS: test Upstream-Status presence (test_patch.TestPatch.test_upstream_status_presence_format) PASS: test author valid (test_mbox.TestMbox.test_author_valid) PASS: test commit message presence (test_mbox.TestMbox.test_commit_message_presence) PASS: test commit message user tags (test_mbox.TestMbox.test_commit_message_user_tags) PASS: test max line length (test_metadata.TestMetadata.test_max_line_length) PASS: test mbox format (test_mbox.TestMbox.test_mbox_format) PASS: test non-AUH upgrade (test_mbox.TestMbox.test_non_auh_upgrade) PASS: test shortlog format (test_mbox.TestMbox.test_shortlog_format) PASS: test shortlog length (test_mbox.TestMbox.test_shortlog_length) PASS: test src uri left files (test_metadata.TestMetadata.test_src_uri_left_files) PASS: test target mailing list (test_mbox.TestMbox.test_target_mailing_list) SKIP: pretest pylint: No python related patches, skipping test (test_python_pylint.PyLint.pretest_pylint) SKIP: test bugzilla entry format: No bug ID found (test_mbox.TestMbox.test_bugzilla_entry_format) SKIP: test lic files chksum presence: No added recipes, skipping test (test_metadata.TestMetadata.test_lic_files_chksum_presence) SKIP: test license presence: No added recipes, skipping test (test_metadata.TestMetadata.test_license_presence) SKIP: test pylint: No python related patches, skipping test (test_python_pylint.PyLint.test_pylint) SKIP: test series merge on head: Merge test is disabled for now (test_mbox.TestMbox.test_series_merge_on_head) SKIP: test summary presence: No added recipes, skipping test (test_metadata.TestMetadata.test_summary_presence) --- Please address the issues identified and submit a new revision of the patch, or alternatively, reply to this email with an explanation of why the patch should be accepted. If you believe these results are due to an error in patchtest, please submit a bug at https://bugzilla.yoctoproject.org/ (use the 'Patchtest' category under 'Yocto Project Subprojects'). For more information on specific failures, see: https://wiki.yoctoproject.org/wiki/Patchtest. Thank you! ^ permalink raw reply [flat|nested] 15+ messages in thread
* [PATCH 7/8] linux-yocto/6.12: update to v6.12.41 2025-08-13 20:49 [PATCH 0/8] kernel: consolidated pull request bruce.ashfield ` (5 preceding siblings ...) 2025-08-13 20:49 ` [PATCH 6/8] lttng-modules: update to v2.14.0 bruce.ashfield @ 2025-08-13 20:49 ` bruce.ashfield 2025-08-13 20:49 ` [PATCH 8/8] linux-yocto/6.12: update CVE exclusions (6.12.41) bruce.ashfield 7 siblings, 0 replies; 15+ messages in thread From: bruce.ashfield @ 2025-08-13 20:49 UTC (permalink / raw) To: richard.purdie; +Cc: openembedded-core From: Bruce Ashfield <bruce.ashfield@gmail.com> Updating linux-yocto/6.12 to the latest korg -stable release that comprises the following commits: no ids found, dumping: 8f5ff9784f32 Linux 6.12.41 c0c21293d0c2 mm: khugepaged: fix call hpage_collapse_scan_file() for anonymous vma c60f5156e62d KVM: x86: Free vCPUs before freeing VM state d8b3dfd4d36c Revert "drm/xe/forcewake: Add a helper xe_force_wake_ref_has_domain()" ffbedb4ad984 Revert "drm/xe/devcoredump: Update handling of xe_force_wake_get return" 5a276d341c8e Revert "drm/xe/tests/mocs: Update xe_force_wake_get() return handling" c72303e7eb49 Revert "drm/xe/gt: Update handling of xe_force_wake_get return" 69fbb3f1740b drm/i915/dp: Fix 2.7 Gbps DP_LINK_BW value on g4x bc9abdf6bce8 ALSA: hda: Add missing NVIDIA HDA codec IDs beb314a55e1e ALSA: hda/tegra: Add Tegra264 support c7f864d34529 Drivers: hv: Make the sysfs node size for the ring buffer dynamic beddf74e4064 ARM: 9448/1: Use an absolute path to unified.h in KBUILD_AFLAGS 90d5cd64f46d iio: hid-sensor-prox: Fix incorrect OFFSET calculation 05847477ff8a iio: hid-sensor-prox: Restore lost scale assignments 86dca1cb4804 wifi: mt76: mt7925: adjust rm BSS flow to prevent next connection failure b63eb95856c0 Revert "wifi: mt76: mt7925: Update mt7925_mcu_uni_[tx,rx]_ba for MLO" 98937588ff9c arm64: dts: qcom: x1-crd: Fix vreg_l2j_1p2 voltage 3d12349ade54 x86/hyperv: Fix APIC ID and VP index confusion in hv_snp_boot_ap() f1b3ad11ec11 KVM: x86/hyper-v: Skip non-canonical addresses during PV TLB flush d483bf624f22 KVM: x86: model canonical checks more precisely c0c82c2adc22 KVM: x86: Add X86EMUL_F_MSR and X86EMUL_F_DT_LOAD to aid canonical checks 62dd9132a458 KVM: x86: Route non-canonical checks in emulator through emulate_ops 94620f95f6cd KVM: x86: drop x86.h include from cpuid.h a4d60ba277ec ext4: fix out of bounds punch offset 51492e99894a ext4: correct the error handle in ext4_fallocate() 85defb9933f6 ext4: fix incorrect punch max_end 35bd33e3ef09 ext4: move out common parts into ext4_fallocate() 8a98313caa3a ext4: move out inode_lock into ext4_fallocate() 1697ca500a84 ext4: factor out ext4_do_fallocate() 2cbc4d640d40 ext4: refactor ext4_insert_range() 8bb93d988212 ext4: refactor ext4_collapse_range() db1fcf7fd51c ext4: refactor ext4_zero_range() 33f61ecabb10 ext4: refactor ext4_punch_hole() d9116d28538a ext4: don't explicit update times in ext4_fallocate() a5ae7fa30cd9 erofs: fix large fragment handling 41485d7c637b erofs: clean up header parsing for ztailpacking and fragments f9b2cb6fff33 erofs: simplify tail inline pcluster handling 516fabf34173 erofs: use Z_EROFS_LCLUSTER_TYPE_MAX to simplify switches 9a84e212e334 erofs: refine z_erofs_get_extent_compressedlen() 4d0f12dc8335 erofs: simplify z_erofs_load_compact_lcluster() 1e5a88732ace arm64: dts: qcom: x1e78100-t14s: mark l12b and l15b always-on 4a7b64ba0cca mtd: rawnand: qcom: Fix last codeword read in qcom_param_page_type_exec() a1bc9a394a27 crypto: powerpc/poly1305 - add depends on BROKEN for now b49b543f4e0b comedi: comedi_test: Fix possible deletion of uninitialized timers 28419a4f3a1e jfs: reject on-disk inodes of an unsupported type 3ad50c7c66cc x86/bugs: Fix use of possibly uninit value in amd_check_tsa_microcode() b85815675fc5 spi: cadence-quadspi: fix cleanup of rx_chan on failure paths a7c6de9f8467 usb: typec: tcpm: apply vbus before data bringup in tcpm_src_attach 27e423886a7a usb: typec: tcpm: allow switching to mode accessory to mux properly a9a1eb410f35 usb: typec: tcpm: allow to use sink in accessory mode 77a4a907cc53 selftests/bpf: Add tests with stack ptr register in conditional jmp bafb375c4606 rust: give Clippy the minimum supported Rust version 4c8f15e770fb mm/zsmalloc: do not pass __GFP_MOVABLE if CONFIG_COMPACTION=n 656eaddbc952 mm/vmscan: fix hwpoisoned large folio handling in shrink_folio_list 140edd5adf6d selftests: mptcp: connect: also cover checksum 219c4eb6c3f0 selftests: mptcp: connect: also cover alt modes 1bff28ea4b11 resource: fix false warning in __request_region() 79663a15a1c7 nilfs2: reject invalid file types when reading inodes 27e740614df8 kasan: use vmalloc_dump_obj() for vmalloc error reports 0fde7dccbf4c ice: Fix a null pointer dereference in ice_copy_and_init_pkg() 44af78621c09 gve: Fix stuck TX queue for DQ queue format 50c61f55b6b9 e1000e: ignore uninitialized checksum word on tgp 78328fad6c49 e1000e: disregard NVM checksum on tgp when valid checksum bit is not set a3bba0205830 dpaa2-switch: Fix device reference count leak in MAC endpoint handling 4dd56cabfbe5 dpaa2-eth: Fix device reference count leak in MAC endpoint handling 708fd522b86d arm64/entry: Mask DAIF in cpu_switch_to(), call_on_irq_stack() 060a28e39053 ALSA: hda/realtek - Add mute LED support for HP Victus 15-fa0xxx d3f60054b6a0 ALSA: hda/realtek - Add mute LED support for HP Pavilion 15-eg0xxx ba8e8a8a2e19 sprintf.h requires stdarg.h cf8e62f6e1b2 bus: fsl-mc: Fix potential double device reference in fsl_mc_get_endpoint() 5b8d6cb9a03d i2c: virtio: Avoid hang by using interruptible completion wait 5622108c3041 i2c: tegra: Fix reset error handling with ACPI 42c4471b30fa i2c: qup: jump out of the loop in case of timeout 9ea8a9ebbea8 timekeeping: Zero initialize system_counterval when querying time from phc drivers 6ed79cf1183a ARM: 9450/1: Fix allowing linker DCE with binutils < 2.36 f7ff03247600 mm/ksm: fix -Wsometimes-uninitialized from clang-21 in advisor_mode_show() f5ee8a39f03e drm/sched: Remove optimization that causes hang when killing dependent jobs 198604687f19 drm/amdgpu: Reset the clear flag in buddy during resume d2a6a3543fd2 platform/x86: ideapad-laptop: Fix kbd backlight not remembered among boots 616ca3c4d11e platform/x86: ideapad-laptop: Fix FnLock not remembered among boots 4de81eb46284 net: hns3: default enable tx bounce buffer when smmu enabled 68494b2ca295 net: hns3: fixed vf get max channels bug 952cd60f695b net: hns3: disable interrupt when ptp init failed 7676d652801c net: hns3: fix concurrent setting vlan filter issue 1194ad0d44d6 s390/ism: fix concurrency management in ism_cmd() de5aaea0384c selftests: drv-net: wait for iperf client to stop sending 61baf2a43d45 ALSA: hda/realtek: Fix mute LED mask on HP OMEN 16 laptop 5c25b4f2769e drm/bridge: ti-sn65dsi86: Remove extra semicolon in ti_sn_bridge_probe() 0ca816a96fdc can: netlink: can_changelink(): fix NULL pointer deref of struct can_priv::do_set_mode 11a2eadf0bd2 net/sched: sch_qfq: Avoid triggering might_sleep in atomic context in qfq_delete_class 5f02ea0f63dd net: appletalk: Fix use-after-free in AARP proxy probe 18617f4063e5 i40e: When removing VF MAC filters, only check PF-set MAC dc08e1772566 i40e: report VF tx_dropped with tx_errors instead of tx_discards ebd24581e055 net/mlx5: E-Switch, Fix peer miss rules to use peer eswitch 6b1f7194d02c net/mlx5: Fix memory leak in cmd_exec() 07759e28a3b5 net: ti: icssg-prueth: Fix buffer allocation for ICSSG 1dc0ed16cfbc ASoC: mediatek: mt8365-dai-i2s: pass correct size to mt8365_dai_set_priv 5918c3f4800a xfrm: interface: fix use-after-free after changing collect_md xfrm interface 07ab45902446 xfrm: Set transport header to fix UDP GRO handling 085f24f0be55 xfrm: state: use a consistent pcpu_id in xfrm_state_find 6bf2daafc51b xfrm: state: initialize state_ptrs earlier in xfrm_state_find 80d66be8a04f staging: vchiq_arm: Make vchiq_shutdown never fail 0fb8478fb0ea platform/x86: Fix initialization order for firmware_attributes_class 9128b2dbe510 x86/hyperv: Fix usage of cpu_online_mask to get valid cpu ef3bee8d1da1 tools/hv: fcopy: Fix incorrect file path conversion 8a1fbb642b74 platform/mellanox: mlxbf-pmc: Use kstrtobool() to check 0/1 input d38e1e0a64a9 platform/mellanox: mlxbf-pmc: Validate event/enable input f0580af3d3ec platform/mellanox: mlxbf-pmc: Remove newline char from event name input 1b102d2cc4bc regmap: fix potential memory leak of regmap_bus be4f30f7c178 iio: adc: ad7949: use spi_is_bpw_supported() 5aa9a2d57899 interconnect: qcom: sc7280: Add missing num_links to xm_pcie3_1 node 3fd782ceabea RDMA/core: Rate limit GID cache warning messages 96876f6e859e platform/x86: asus-nb-wmi: add DMI quirk for ASUS Zenbook Duo UX8406CA 5d4261dbb333 regulator: core: fix NULL dereference on unbind due to stale coupling data bf812206f2d0 virtio_ring: Fix error reporting in virtqueue_resize 30ce52f1616e virtio_net: Enforce minimum TX ring size for reliability a7b79db25846 Input: gpio-keys - fix a sleep while atomic with PREEMPT_RT 2bf554c820f1 x86/traps: Initialize DR7 by writing its architectural reset value Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com> --- .../linux/linux-yocto-rt_6.12.bb | 6 ++-- .../linux/linux-yocto-tiny_6.12.bb | 6 ++-- meta/recipes-kernel/linux/linux-yocto_6.12.bb | 28 +++++++++---------- 3 files changed, 20 insertions(+), 20 deletions(-) diff --git a/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb b/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb index fdb0caa943..72525d8764 100644 --- a/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb +++ b/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb @@ -14,13 +14,13 @@ python () { raise bb.parse.SkipRecipe("Set PREFERRED_PROVIDER_virtual/kernel to linux-yocto-rt to enable it") } -SRCREV_machine ?= "96c3b8967c299edb7c8fd1beff358624e3aac443" -SRCREV_meta ?= "52dd739a32215ffca801bc40daebee19a01b6f20" +SRCREV_machine ?= "a40a131df6cba8f7ff468416f0cbe8e694974c8c" +SRCREV_meta ?= "57f788e849d9b04dd6aa28b896546c56b45f69e7" SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;branch=${KBRANCH};name=machine;protocol=https \ git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.12;destsuffix=${KMETA};protocol=https" -LINUX_VERSION ?= "6.12.40" +LINUX_VERSION ?= "6.12.41" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" diff --git a/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb b/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb index 3dccc9e723..733b163c77 100644 --- a/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb +++ b/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb @@ -8,7 +8,7 @@ require recipes-kernel/linux/linux-yocto.inc # CVE exclusions include recipes-kernel/linux/cve-exclusion_6.12.inc -LINUX_VERSION ?= "6.12.40" +LINUX_VERSION ?= "6.12.41" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}" @@ -17,8 +17,8 @@ DEPENDS += "openssl-native util-linux-native" KMETA = "kernel-meta" KCONF_BSP_AUDIT_LEVEL = "2" -SRCREV_machine ?= "50893c3858cc7bbc15a174f06fa30fba25306cac" -SRCREV_meta ?= "52dd739a32215ffca801bc40daebee19a01b6f20" +SRCREV_machine ?= "4137e9dd62e47f0f7472c7f0dfcbef5f8929f280" +SRCREV_meta ?= "57f788e849d9b04dd6aa28b896546c56b45f69e7" PV = "${LINUX_VERSION}+git" diff --git a/meta/recipes-kernel/linux/linux-yocto_6.12.bb b/meta/recipes-kernel/linux/linux-yocto_6.12.bb index c58e5f07f4..3c27a7e719 100644 --- a/meta/recipes-kernel/linux/linux-yocto_6.12.bb +++ b/meta/recipes-kernel/linux/linux-yocto_6.12.bb @@ -18,25 +18,25 @@ KBRANCH:qemux86.104 ?= "v6.12/standard/base" KBRANCH:qemuloongarch64 ?= "v6.12/standard/base" KBRANCH:qemumips64 ?= "v6.12/standard/mti-malta64" -SRCREV_machine:qemuarm ?= "3884ae3c574f932b6cfe528f86c83214c2e8a36e" -SRCREV_machine:qemuarm64 ?= "50893c3858cc7bbc15a174f06fa30fba25306cac" -SRCREV_machine:qemuloongarch64 ?= "50893c3858cc7bbc15a174f06fa30fba25306cac" -SRCREV_machine:qemumips ?= "39d23e283ab644b5a8758046130b8c22847176f8" -SRCREV_machine:qemuppc ?= "50893c3858cc7bbc15a174f06fa30fba25306cac" -SRCREV_machine:qemuriscv64 ?= "50893c3858cc7bbc15a174f06fa30fba25306cac" -SRCREV_machine:qemuriscv32 ?= "50893c3858cc7bbc15a174f06fa30fba25306cac" -SRCREV_machine:qemux86 ?= "50893c3858cc7bbc15a174f06fa30fba25306cac" -SRCREV_machine:qemux86-64 ?= "50893c3858cc7bbc15a174f06fa30fba25306cac" -SRCREV_machine:qemumips64 ?= "3cf1294a14f4a23376b86201ab5bdff6159102ad" -SRCREV_machine ?= "50893c3858cc7bbc15a174f06fa30fba25306cac" -SRCREV_meta ?= "52dd739a32215ffca801bc40daebee19a01b6f20" +SRCREV_machine:qemuarm ?= "01bbdad6b55cc37010a721899318f591ba5f09a6" +SRCREV_machine:qemuarm64 ?= "4137e9dd62e47f0f7472c7f0dfcbef5f8929f280" +SRCREV_machine:qemuloongarch64 ?= "4137e9dd62e47f0f7472c7f0dfcbef5f8929f280" +SRCREV_machine:qemumips ?= "aa348bdab88ee1c6358af8e3b9d210738884a8f6" +SRCREV_machine:qemuppc ?= "4137e9dd62e47f0f7472c7f0dfcbef5f8929f280" +SRCREV_machine:qemuriscv64 ?= "4137e9dd62e47f0f7472c7f0dfcbef5f8929f280" +SRCREV_machine:qemuriscv32 ?= "4137e9dd62e47f0f7472c7f0dfcbef5f8929f280" +SRCREV_machine:qemux86 ?= "4137e9dd62e47f0f7472c7f0dfcbef5f8929f280" +SRCREV_machine:qemux86-64 ?= "4137e9dd62e47f0f7472c7f0dfcbef5f8929f280" +SRCREV_machine:qemumips64 ?= "d3850d4a70821a2d63be812b316ca0d05c2c0c24" +SRCREV_machine ?= "4137e9dd62e47f0f7472c7f0dfcbef5f8929f280" +SRCREV_meta ?= "57f788e849d9b04dd6aa28b896546c56b45f69e7" # set your preferred provider of linux-yocto to 'linux-yocto-upstream', and you'll # get the <version>/base branch, which is pure upstream -stable, and the same # meta SRCREV as the linux-yocto-standard builds. Select your version using the # normal PREFERRED_VERSION settings. BBCLASSEXTEND = "devupstream:target" -SRCREV_machine:class-devupstream ?= "d90ecb2b1308b3e362ec4c21ff7cf0a051b445df" +SRCREV_machine:class-devupstream ?= "8f5ff9784f3262e6e85c68d86f8b7931827f2983" PN:class-devupstream = "linux-yocto-upstream" KBRANCH:class-devupstream = "v6.12/base" @@ -44,7 +44,7 @@ SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;name=machine;branch=${KBRA git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.12;destsuffix=${KMETA};protocol=https" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" -LINUX_VERSION ?= "6.12.40" +LINUX_VERSION ?= "6.12.41" PV = "${LINUX_VERSION}+git" -- 2.39.2 ^ permalink raw reply related [flat|nested] 15+ messages in thread
* [PATCH 8/8] linux-yocto/6.12: update CVE exclusions (6.12.41) 2025-08-13 20:49 [PATCH 0/8] kernel: consolidated pull request bruce.ashfield ` (6 preceding siblings ...) 2025-08-13 20:49 ` [PATCH 7/8] linux-yocto/6.12: update to v6.12.41 bruce.ashfield @ 2025-08-13 20:49 ` bruce.ashfield 7 siblings, 0 replies; 15+ messages in thread From: bruce.ashfield @ 2025-08-13 20:49 UTC (permalink / raw) To: richard.purdie; +Cc: openembedded-core From: Bruce Ashfield <bruce.ashfield@gmail.com> Data pulled from: https://github.com/CVEProject/cvelistV5 1/1 [ Author: cvelistV5 Github Action Email: github_action@example.com Subject: 3 changes (2 new | 1 updated): - 2 new CVEs: CVE-2025-8707, CVE-2025-8708 - 1 updated CVEs: CVE-2025-2586 Date: Fri, 8 Aug 2025 02:36:59 +0000 ] Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com> --- .../linux/cve-exclusion_6.12.inc | 346 ++++++++++++++++-- 1 file changed, 317 insertions(+), 29 deletions(-) diff --git a/meta/recipes-kernel/linux/cve-exclusion_6.12.inc b/meta/recipes-kernel/linux/cve-exclusion_6.12.inc index ee2f30b3db..a110f89af1 100644 --- a/meta/recipes-kernel/linux/cve-exclusion_6.12.inc +++ b/meta/recipes-kernel/linux/cve-exclusion_6.12.inc @@ -1,11 +1,11 @@ # Auto-generated CVE metadata, DO NOT EDIT BY HAND. -# Generated at 2025-07-25 02:49:32.259439+00:00 for kernel version 6.12.40 -# From linux_kernel_cves cve_2025-07-25_0100Z-1-g854b2f05e2c +# Generated at 2025-08-08 02:45:44.343204+00:00 for kernel version 6.12.41 +# From linux_kernel_cves cve_2025-08-08_0100Z-2-g05f2a09f419 python check_kernel_cve_status_version() { - this_version = "6.12.40" + this_version = "6.12.41" kernel_version = d.getVar("LINUX_VERSION") if kernel_version != this_version: bb.warn("Kernel CVE status needs updating: generated for %s but kernel is %s" % (this_version, kernel_version)) @@ -13394,7 +13394,7 @@ CVE_STATUS[CVE-2025-37923] = "cpe-stable-backport: Backported in 6.12.28" CVE_STATUS[CVE-2025-37924] = "cpe-stable-backport: Backported in 6.12.28" -# CVE-2025-37925 needs backporting (fixed from 6.15) +CVE_STATUS[CVE-2025-37925] = "cpe-stable-backport: Backported in 6.12.41" CVE_STATUS[CVE-2025-37926] = "cpe-stable-backport: Backported in 6.12.28" @@ -13510,7 +13510,7 @@ CVE_STATUS[CVE-2025-37982] = "cpe-stable-backport: Backported in 6.12.25" CVE_STATUS[CVE-2025-37983] = "cpe-stable-backport: Backported in 6.12.26" -# CVE-2025-37984 needs backporting (fixed from 6.15) +CVE_STATUS[CVE-2025-37984] = "cpe-stable-backport: Backported in 6.12.39" CVE_STATUS[CVE-2025-37985] = "cpe-stable-backport: Backported in 6.12.26" @@ -13746,7 +13746,7 @@ CVE_STATUS[CVE-2025-38103] = "cpe-stable-backport: Backported in 6.12.34" CVE_STATUS[CVE-2025-38104] = "cpe-stable-backport: Backported in 6.12.39" -# CVE-2025-38105 needs backporting (fixed from 6.16rc1) +# CVE-2025-38105 needs backporting (fixed from 6.16) CVE_STATUS[CVE-2025-38106] = "cpe-stable-backport: Backported in 6.12.34" @@ -13800,7 +13800,7 @@ CVE_STATUS[CVE-2025-38130] = "fixed-version: only affects 6.14 onwards" CVE_STATUS[CVE-2025-38131] = "cpe-stable-backport: Backported in 6.12.34" -# CVE-2025-38132 needs backporting (fixed from 6.16rc1) +# CVE-2025-38132 needs backporting (fixed from 6.16) CVE_STATUS[CVE-2025-38133] = "fixed-version: only affects 6.15 onwards" @@ -13810,13 +13810,13 @@ CVE_STATUS[CVE-2025-38135] = "cpe-stable-backport: Backported in 6.12.34" CVE_STATUS[CVE-2025-38136] = "cpe-stable-backport: Backported in 6.12.34" -# CVE-2025-38137 needs backporting (fixed from 6.16rc1) +# CVE-2025-38137 needs backporting (fixed from 6.16) CVE_STATUS[CVE-2025-38138] = "cpe-stable-backport: Backported in 6.12.34" CVE_STATUS[CVE-2025-38139] = "cpe-stable-backport: Backported in 6.12.37" -# CVE-2025-38140 needs backporting (fixed from 6.16rc1) +# CVE-2025-38140 needs backporting (fixed from 6.16) CVE_STATUS[CVE-2025-38141] = "cpe-stable-backport: Backported in 6.12.34" @@ -13892,8 +13892,6 @@ CVE_STATUS[CVE-2025-38176] = "fixed-version: only affects 6.14 onwards" CVE_STATUS[CVE-2025-38177] = "cpe-stable-backport: Backported in 6.12.28" -CVE_STATUS[CVE-2025-38178] = "fixed-version: only affects 6.16rc1 onwards" - CVE_STATUS[CVE-2025-38179] = "cpe-stable-backport: Backported in 6.12.35" CVE_STATUS[CVE-2025-38180] = "cpe-stable-backport: Backported in 6.12.35" @@ -13910,7 +13908,7 @@ CVE_STATUS[CVE-2025-38185] = "cpe-stable-backport: Backported in 6.12.35" CVE_STATUS[CVE-2025-38186] = "cpe-stable-backport: Backported in 6.12.35" -# CVE-2025-38187 needs backporting (fixed from 6.16rc3) +# CVE-2025-38187 needs backporting (fixed from 6.16) CVE_STATUS[CVE-2025-38188] = "cpe-stable-backport: Backported in 6.12.35" @@ -13934,7 +13932,7 @@ CVE_STATUS[CVE-2025-38197] = "cpe-stable-backport: Backported in 6.12.35" CVE_STATUS[CVE-2025-38198] = "cpe-stable-backport: Backported in 6.12.35" -# CVE-2025-38199 needs backporting (fixed from 6.16rc1) +# CVE-2025-38199 needs backporting (fixed from 6.16) CVE_STATUS[CVE-2025-38200] = "cpe-stable-backport: Backported in 6.12.35" @@ -13942,15 +13940,15 @@ CVE_STATUS[CVE-2025-38201] = "cpe-stable-backport: Backported in 6.12.35" CVE_STATUS[CVE-2025-38202] = "cpe-stable-backport: Backported in 6.12.35" -# CVE-2025-38203 needs backporting (fixed from 6.16rc1) +# CVE-2025-38203 needs backporting (fixed from 6.16) -# CVE-2025-38204 needs backporting (fixed from 6.16rc1) +# CVE-2025-38204 needs backporting (fixed from 6.16) -# CVE-2025-38205 needs backporting (fixed from 6.16rc1) +# CVE-2025-38205 needs backporting (fixed from 6.16) -# CVE-2025-38206 needs backporting (fixed from 6.16rc1) +# CVE-2025-38206 needs backporting (fixed from 6.16) -# CVE-2025-38207 needs backporting (fixed from 6.16rc1) +# CVE-2025-38207 needs backporting (fixed from 6.16) CVE_STATUS[CVE-2025-38208] = "cpe-stable-backport: Backported in 6.12.35" @@ -14004,13 +14002,13 @@ CVE_STATUS[CVE-2025-38232] = "cpe-stable-backport: Backported in 6.12.35" CVE_STATUS[CVE-2025-38233] = "fixed-version: only affects 6.13 onwards" -# CVE-2025-38234 needs backporting (fixed from 6.16rc1) +# CVE-2025-38234 needs backporting (fixed from 6.16) CVE_STATUS[CVE-2025-38235] = "fixed-version: only affects 6.15 onwards" CVE_STATUS[CVE-2025-38236] = "cpe-stable-backport: Backported in 6.12.36" -# CVE-2025-38237 needs backporting (fixed from 6.16rc1) +# CVE-2025-38237 needs backporting (fixed from 6.16) CVE_STATUS[CVE-2025-38238] = "fixed-version: only affects 6.14 onwards" @@ -14032,7 +14030,7 @@ CVE_STATUS[CVE-2025-38246] = "cpe-stable-backport: Backported in 6.12.36" CVE_STATUS[CVE-2025-38247] = "fixed-version: only affects 6.15 onwards" -# CVE-2025-38248 needs backporting (fixed from 6.16rc4) +# CVE-2025-38248 needs backporting (fixed from 6.16) CVE_STATUS[CVE-2025-38249] = "cpe-stable-backport: Backported in 6.12.36" @@ -14058,7 +14056,7 @@ CVE_STATUS[CVE-2025-38259] = "cpe-stable-backport: Backported in 6.12.36" CVE_STATUS[CVE-2025-38260] = "cpe-stable-backport: Backported in 6.12.36" -# CVE-2025-38261 needs backporting (fixed from 6.16rc1) +# CVE-2025-38261 needs backporting (fixed from 6.16) CVE_STATUS[CVE-2025-38262] = "cpe-stable-backport: Backported in 6.12.36" @@ -14080,7 +14078,7 @@ CVE_STATUS[CVE-2025-38270] = "cpe-stable-backport: Backported in 6.12.34" CVE_STATUS[CVE-2025-38271] = "fixed-version: only affects 6.15 onwards" -# CVE-2025-38272 needs backporting (fixed from 6.16rc1) +# CVE-2025-38272 needs backporting (fixed from 6.16) CVE_STATUS[CVE-2025-38273] = "cpe-stable-backport: Backported in 6.12.34" @@ -14104,7 +14102,7 @@ CVE_STATUS[CVE-2025-38282] = "cpe-stable-backport: Backported in 6.12.34" CVE_STATUS[CVE-2025-38283] = "cpe-stable-backport: Backported in 6.12.34" -# CVE-2025-38284 needs backporting (fixed from 6.16rc1) +# CVE-2025-38284 needs backporting (fixed from 6.16) CVE_STATUS[CVE-2025-38285] = "cpe-stable-backport: Backported in 6.12.34" @@ -14148,7 +14146,7 @@ CVE_STATUS[CVE-2025-38304] = "cpe-stable-backport: Backported in 6.12.34" CVE_STATUS[CVE-2025-38305] = "cpe-stable-backport: Backported in 6.12.34" -# CVE-2025-38306 needs backporting (fixed from 6.16rc1) +# CVE-2025-38306 needs backporting (fixed from 6.16) CVE_STATUS[CVE-2025-38307] = "cpe-stable-backport: Backported in 6.12.34" @@ -14158,7 +14156,7 @@ CVE_STATUS[CVE-2025-38309] = "fixed-version: only affects 6.15 onwards" CVE_STATUS[CVE-2025-38310] = "cpe-stable-backport: Backported in 6.12.34" -# CVE-2025-38311 needs backporting (fixed from 6.16rc1) +# CVE-2025-38311 needs backporting (fixed from 6.16) CVE_STATUS[CVE-2025-38312] = "cpe-stable-backport: Backported in 6.12.34" @@ -14180,7 +14178,7 @@ CVE_STATUS[CVE-2025-38320] = "cpe-stable-backport: Backported in 6.12.35" CVE_STATUS[CVE-2025-38321] = "cpe-stable-backport: Backported in 6.12.35" -CVE_STATUS[CVE-2025-38322] = "fixed-version: only affects 6.15 onwards" +# CVE-2025-38322 needs backporting (fixed from 6.16) CVE_STATUS[CVE-2025-38323] = "cpe-stable-backport: Backported in 6.12.35" @@ -14206,7 +14204,7 @@ CVE_STATUS[CVE-2025-38333] = "cpe-stable-backport: Backported in 6.12.35" CVE_STATUS[CVE-2025-38334] = "cpe-stable-backport: Backported in 6.12.35" -# CVE-2025-38335 needs backporting (fixed from 6.16rc1) +CVE_STATUS[CVE-2025-38335] = "cpe-stable-backport: Backported in 6.12.41" CVE_STATUS[CVE-2025-38336] = "cpe-stable-backport: Backported in 6.12.35" @@ -14238,12 +14236,302 @@ CVE_STATUS[CVE-2025-38349] = "cpe-stable-backport: Backported in 6.12.39" CVE_STATUS[CVE-2025-38350] = "cpe-stable-backport: Backported in 6.12.37" -# CVE-2025-38351 needs backporting (fixed from 6.16rc6) +CVE_STATUS[CVE-2025-38351] = "cpe-stable-backport: Backported in 6.12.41" CVE_STATUS[CVE-2025-38352] = "cpe-stable-backport: Backported in 6.12.34" +CVE_STATUS[CVE-2025-38353] = "cpe-stable-backport: Backported in 6.12.36" + +CVE_STATUS[CVE-2025-38354] = "cpe-stable-backport: Backported in 6.12.36" + +CVE_STATUS[CVE-2025-38355] = "cpe-stable-backport: Backported in 6.12.36" + +CVE_STATUS[CVE-2025-38356] = "cpe-stable-backport: Backported in 6.12.37" + +CVE_STATUS[CVE-2025-38357] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2025-38358] = "fixed-version: only affects 6.15 onwards" + +# CVE-2025-38359 needs backporting (fixed from 6.16) + +CVE_STATUS[CVE-2025-38360] = "cpe-stable-backport: Backported in 6.12.37" + +CVE_STATUS[CVE-2025-38361] = "cpe-stable-backport: Backported in 6.12.36" + +CVE_STATUS[CVE-2025-38362] = "cpe-stable-backport: Backported in 6.12.36" + +CVE_STATUS[CVE-2025-38363] = "cpe-stable-backport: Backported in 6.12.36" + +CVE_STATUS[CVE-2025-38364] = "cpe-stable-backport: Backported in 6.12.36" + +CVE_STATUS[CVE-2025-38365] = "cpe-stable-backport: Backported in 6.12.36" + +CVE_STATUS[CVE-2025-38366] = "fixed-version: only affects 6.13 onwards" + +CVE_STATUS[CVE-2025-38367] = "fixed-version: only affects 6.13 onwards" + +CVE_STATUS[CVE-2025-38368] = "cpe-stable-backport: Backported in 6.12.36" + +CVE_STATUS[CVE-2025-38369] = "cpe-stable-backport: Backported in 6.12.36" + +CVE_STATUS[CVE-2025-38370] = "fixed-version: only affects 6.14 onwards" + +CVE_STATUS[CVE-2025-38371] = "cpe-stable-backport: Backported in 6.12.37" + +CVE_STATUS[CVE-2025-38372] = "cpe-stable-backport: Backported in 6.12.37" + +CVE_STATUS[CVE-2025-38373] = "cpe-stable-backport: Backported in 6.12.37" + +CVE_STATUS[CVE-2025-38374] = "cpe-stable-backport: Backported in 6.12.37" + +CVE_STATUS[CVE-2025-38375] = "cpe-stable-backport: Backported in 6.12.37" + +CVE_STATUS[CVE-2025-38376] = "cpe-stable-backport: Backported in 6.12.37" + +CVE_STATUS[CVE-2025-38377] = "cpe-stable-backport: Backported in 6.12.37" + +CVE_STATUS[CVE-2025-38378] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2025-38379] = "cpe-stable-backport: Backported in 6.12.37" + +CVE_STATUS[CVE-2025-38380] = "cpe-stable-backport: Backported in 6.12.37" + +CVE_STATUS[CVE-2025-38381] = "cpe-stable-backport: Backported in 6.12.37" + +CVE_STATUS[CVE-2025-38382] = "cpe-stable-backport: Backported in 6.12.37" + +CVE_STATUS[CVE-2025-38383] = "cpe-stable-backport: Backported in 6.12.37" + +CVE_STATUS[CVE-2025-38384] = "cpe-stable-backport: Backported in 6.12.37" + +CVE_STATUS[CVE-2025-38385] = "cpe-stable-backport: Backported in 6.12.37" + +CVE_STATUS[CVE-2025-38386] = "cpe-stable-backport: Backported in 6.12.37" + +CVE_STATUS[CVE-2025-38387] = "cpe-stable-backport: Backported in 6.12.37" + +CVE_STATUS[CVE-2025-38388] = "cpe-stable-backport: Backported in 6.12.37" + +CVE_STATUS[CVE-2025-38389] = "cpe-stable-backport: Backported in 6.12.37" + +CVE_STATUS[CVE-2025-38390] = "cpe-stable-backport: Backported in 6.12.37" + +CVE_STATUS[CVE-2025-38391] = "cpe-stable-backport: Backported in 6.12.37" + +CVE_STATUS[CVE-2025-38392] = "cpe-stable-backport: Backported in 6.12.37" + +CVE_STATUS[CVE-2025-38393] = "cpe-stable-backport: Backported in 6.12.37" + +CVE_STATUS[CVE-2025-38394] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2025-38395] = "cpe-stable-backport: Backported in 6.12.37" + +CVE_STATUS[CVE-2025-38396] = "cpe-stable-backport: Backported in 6.12.37" + +CVE_STATUS[CVE-2025-38397] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2025-38398] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2025-38399] = "cpe-stable-backport: Backported in 6.12.37" + +CVE_STATUS[CVE-2025-38400] = "cpe-stable-backport: Backported in 6.12.37" + +CVE_STATUS[CVE-2025-38401] = "cpe-stable-backport: Backported in 6.12.37" + +CVE_STATUS[CVE-2025-38402] = "cpe-stable-backport: Backported in 6.12.37" + +CVE_STATUS[CVE-2025-38403] = "cpe-stable-backport: Backported in 6.12.37" + +CVE_STATUS[CVE-2025-38404] = "cpe-stable-backport: Backported in 6.12.37" + +CVE_STATUS[CVE-2025-38405] = "cpe-stable-backport: Backported in 6.12.37" + +CVE_STATUS[CVE-2025-38406] = "cpe-stable-backport: Backported in 6.12.37" + +CVE_STATUS[CVE-2025-38407] = "cpe-stable-backport: Backported in 6.12.37" + +CVE_STATUS[CVE-2025-38408] = "cpe-stable-backport: Backported in 6.12.37" + +CVE_STATUS[CVE-2025-38409] = "cpe-stable-backport: Backported in 6.12.37" + +CVE_STATUS[CVE-2025-38410] = "cpe-stable-backport: Backported in 6.12.37" + +CVE_STATUS[CVE-2025-38411] = "fixed-version: only affects 6.15.3 onwards" + +CVE_STATUS[CVE-2025-38412] = "cpe-stable-backport: Backported in 6.12.37" + +CVE_STATUS[CVE-2025-38413] = "cpe-stable-backport: Backported in 6.12.37" + +CVE_STATUS[CVE-2025-38414] = "cpe-stable-backport: Backported in 6.12.34" + +CVE_STATUS[CVE-2025-38415] = "cpe-stable-backport: Backported in 6.12.34" + +CVE_STATUS[CVE-2025-38416] = "cpe-stable-backport: Backported in 6.12.35" + +CVE_STATUS[CVE-2025-38417] = "cpe-stable-backport: Backported in 6.12.35" + +CVE_STATUS[CVE-2025-38418] = "cpe-stable-backport: Backported in 6.12.35" + +CVE_STATUS[CVE-2025-38419] = "cpe-stable-backport: Backported in 6.12.35" + +CVE_STATUS[CVE-2025-38420] = "cpe-stable-backport: Backported in 6.12.35" + +CVE_STATUS[CVE-2025-38421] = "fixed-version: only affects 6.14 onwards" + +CVE_STATUS[CVE-2025-38422] = "cpe-stable-backport: Backported in 6.12.35" + +CVE_STATUS[CVE-2025-38423] = "cpe-stable-backport: Backported in 6.12.35" + +CVE_STATUS[CVE-2025-38424] = "cpe-stable-backport: Backported in 6.12.35" + +CVE_STATUS[CVE-2025-38425] = "cpe-stable-backport: Backported in 6.12.35" + +# CVE-2025-38426 needs backporting (fixed from 6.16) + +CVE_STATUS[CVE-2025-38427] = "cpe-stable-backport: Backported in 6.12.35" + +CVE_STATUS[CVE-2025-38428] = "cpe-stable-backport: Backported in 6.12.35" + +CVE_STATUS[CVE-2025-38429] = "cpe-stable-backport: Backported in 6.12.35" + +CVE_STATUS[CVE-2025-38430] = "cpe-stable-backport: Backported in 6.12.35" + +CVE_STATUS[CVE-2025-38431] = "fixed-version: only affects 6.14 onwards" + +CVE_STATUS[CVE-2025-38432] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2025-38433] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2025-38434] = "cpe-stable-backport: Backported in 6.12.36" + +CVE_STATUS[CVE-2025-38435] = "fixed-version: only affects 6.14 onwards" + +CVE_STATUS[CVE-2025-38436] = "cpe-stable-backport: Backported in 6.12.36" + +CVE_STATUS[CVE-2025-38437] = "cpe-stable-backport: Backported in 6.12.39" + +CVE_STATUS[CVE-2025-38438] = "cpe-stable-backport: Backported in 6.12.39" + +CVE_STATUS[CVE-2025-38439] = "cpe-stable-backport: Backported in 6.12.39" + +CVE_STATUS[CVE-2025-38440] = "cpe-stable-backport: Backported in 6.12.39" + +CVE_STATUS[CVE-2025-38441] = "cpe-stable-backport: Backported in 6.12.39" + +CVE_STATUS[CVE-2025-38442] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2025-38443] = "cpe-stable-backport: Backported in 6.12.39" + +CVE_STATUS[CVE-2025-38444] = "cpe-stable-backport: Backported in 6.12.39" + +CVE_STATUS[CVE-2025-38445] = "cpe-stable-backport: Backported in 6.12.39" + +CVE_STATUS[CVE-2025-38446] = "cpe-stable-backport: Backported in 6.12.39" + +CVE_STATUS[CVE-2025-38447] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2025-38448] = "cpe-stable-backport: Backported in 6.12.39" + +CVE_STATUS[CVE-2025-38449] = "cpe-stable-backport: Backported in 6.12.39" + +CVE_STATUS[CVE-2025-38450] = "cpe-stable-backport: Backported in 6.12.39" + +CVE_STATUS[CVE-2025-38451] = "cpe-stable-backport: Backported in 6.12.39" + +CVE_STATUS[CVE-2025-38452] = "cpe-stable-backport: Backported in 6.12.39" + +# CVE-2025-38453 needs backporting (fixed from 6.16) + +CVE_STATUS[CVE-2025-38454] = "cpe-stable-backport: Backported in 6.12.39" + +CVE_STATUS[CVE-2025-38455] = "cpe-stable-backport: Backported in 6.12.39" + +CVE_STATUS[CVE-2025-38456] = "cpe-stable-backport: Backported in 6.12.39" + +CVE_STATUS[CVE-2025-38457] = "cpe-stable-backport: Backported in 6.12.39" + +CVE_STATUS[CVE-2025-38458] = "cpe-stable-backport: Backported in 6.12.39" + +CVE_STATUS[CVE-2025-38459] = "cpe-stable-backport: Backported in 6.12.39" + +CVE_STATUS[CVE-2025-38460] = "cpe-stable-backport: Backported in 6.12.39" + +CVE_STATUS[CVE-2025-38461] = "cpe-stable-backport: Backported in 6.12.39" + +CVE_STATUS[CVE-2025-38462] = "cpe-stable-backport: Backported in 6.12.39" + +CVE_STATUS[CVE-2025-38463] = "cpe-stable-backport: Backported in 6.12.39" + +CVE_STATUS[CVE-2025-38464] = "cpe-stable-backport: Backported in 6.12.39" + +CVE_STATUS[CVE-2025-38465] = "cpe-stable-backport: Backported in 6.12.39" + +CVE_STATUS[CVE-2025-38466] = "cpe-stable-backport: Backported in 6.12.39" + +CVE_STATUS[CVE-2025-38467] = "cpe-stable-backport: Backported in 6.12.39" + +CVE_STATUS[CVE-2025-38468] = "cpe-stable-backport: Backported in 6.12.40" + +CVE_STATUS[CVE-2025-38469] = "cpe-stable-backport: Backported in 6.12.40" + +CVE_STATUS[CVE-2025-38470] = "cpe-stable-backport: Backported in 6.12.40" + +CVE_STATUS[CVE-2025-38471] = "cpe-stable-backport: Backported in 6.12.40" + +CVE_STATUS[CVE-2025-38472] = "cpe-stable-backport: Backported in 6.12.40" + +CVE_STATUS[CVE-2025-38473] = "cpe-stable-backport: Backported in 6.12.40" + +CVE_STATUS[CVE-2025-38474] = "cpe-stable-backport: Backported in 6.12.40" + +CVE_STATUS[CVE-2025-38475] = "cpe-stable-backport: Backported in 6.12.40" + +CVE_STATUS[CVE-2025-38476] = "cpe-stable-backport: Backported in 6.12.40" + +CVE_STATUS[CVE-2025-38477] = "cpe-stable-backport: Backported in 6.12.40" + +CVE_STATUS[CVE-2025-38478] = "cpe-stable-backport: Backported in 6.12.40" + CVE_STATUS[CVE-2025-38479] = "cpe-stable-backport: Backported in 6.12.23" +CVE_STATUS[CVE-2025-38480] = "cpe-stable-backport: Backported in 6.12.40" + +CVE_STATUS[CVE-2025-38481] = "cpe-stable-backport: Backported in 6.12.40" + +CVE_STATUS[CVE-2025-38482] = "cpe-stable-backport: Backported in 6.12.40" + +CVE_STATUS[CVE-2025-38483] = "cpe-stable-backport: Backported in 6.12.40" + +CVE_STATUS[CVE-2025-38484] = "cpe-stable-backport: Backported in 6.12.40" + +CVE_STATUS[CVE-2025-38485] = "cpe-stable-backport: Backported in 6.12.40" + +CVE_STATUS[CVE-2025-38486] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2025-38487] = "cpe-stable-backport: Backported in 6.12.40" + +CVE_STATUS[CVE-2025-38488] = "cpe-stable-backport: Backported in 6.12.40" + +CVE_STATUS[CVE-2025-38489] = "cpe-stable-backport: Backported in 6.12.40" + +CVE_STATUS[CVE-2025-38490] = "cpe-stable-backport: Backported in 6.12.40" + +CVE_STATUS[CVE-2025-38491] = "cpe-stable-backport: Backported in 6.12.40" + +CVE_STATUS[CVE-2025-38492] = "fixed-version: only affects 6.14 onwards" + +CVE_STATUS[CVE-2025-38493] = "cpe-stable-backport: Backported in 6.12.40" + +CVE_STATUS[CVE-2025-38494] = "cpe-stable-backport: Backported in 6.12.40" + +CVE_STATUS[CVE-2025-38495] = "cpe-stable-backport: Backported in 6.12.40" + +CVE_STATUS[CVE-2025-38496] = "cpe-stable-backport: Backported in 6.12.40" + +CVE_STATUS[CVE-2025-38497] = "cpe-stable-backport: Backported in 6.12.40" + +CVE_STATUS[CVE-2025-38498] = "cpe-stable-backport: Backported in 6.12.34" + CVE_STATUS[CVE-2025-38575] = "cpe-stable-backport: Backported in 6.12.23" CVE_STATUS[CVE-2025-38637] = "cpe-stable-backport: Backported in 6.12.23" -- 2.39.2 ^ permalink raw reply related [flat|nested] 15+ messages in thread
* [PATCH 0/8] kernel: consolidated pull request
@ 2022-04-12 21:45 bruce.ashfield
0 siblings, 0 replies; 15+ messages in thread
From: bruce.ashfield @ 2022-04-12 21:45 UTC (permalink / raw)
To: richard.purdie; +Cc: openembedded-core
From: Bruce Ashfield <bruce.ashfield@gmail.com>
Richard,
Here's the collection of -stable, fixes and tweaks that I was talking
about during the engineering sync on Tuesday.
Feel free to take what you want, or just wait on them all until the
release is over.
It is worth taking the 5.18 -dev and lttng fixes IMHO, since they do
make the release a bit more future proof. Likewise with Jon's -tiny
changes.
Cheers,
Bruce
The following changes since commit 632c83ab787211ef927a999f4ecde1d3ce40621d:
license_image.bbclass: close package.manifest file (2022-04-10 08:31:17 +0100)
are available in the Git repository at:
git://git.yoctoproject.org/poky-contrib zedd/kernel
http://git.yoctoproject.org/cgit.cgi/poky-contrib/log/?h=zedd/kernel
Bruce Ashfield (8):
linux-yocto/5.15: arm: poky-tiny cleanup and fixes
linux-yocto/5.15: update to v5.15.33
linux-yocto/5.10: update to v5.10.110
linux-yocto/5.10: base: enable kernel crypto userspace API
linux-yocto/5.15: base: enable kernel crypto userspace API
linux-yocto/5.15: kasan: fix BUG: sleeping function called from
invalid context
lttng-modules: support kernel 5.18+
linux-yocto-dev: update to v5.18+
meta/recipes-kernel/linux/linux-yocto-dev.bb | 4 +-
.../linux/linux-yocto-rt_5.10.bb | 6 +-
.../linux/linux-yocto-rt_5.15.bb | 6 +-
.../linux/linux-yocto-tiny_5.10.bb | 8 +-
.../linux/linux-yocto-tiny_5.15.bb | 8 +-
meta/recipes-kernel/linux/linux-yocto_5.10.bb | 24 +--
meta/recipes-kernel/linux/linux-yocto_5.15.bb | 26 +--
...x-compaction-migratepages-event-name.patch | 37 ++++
...vent-allow-same-provider-and-event-n.patch | 48 +++++
...g-Don-t-re-read-p-state-when-emittin.patch | 183 ++++++++++++++++++
.../0004-fix-block-remove-genhd.h-v5.18.patch | 45 +++++
...emove-REQ_OP_WRITE_SAME-support-v5.1.patch | 79 ++++++++
...ndom-remove-unused-tracepoints-v5.18.patch | 47 +++++
...rethook-for-kretprobe-if-possible-v5.patch | 72 +++++++
...ore-Remove-scsi-scsi_request.h-v5.18.patch | 44 +++++
.../0009-Rename-genhd-wrapper-to-blkdev.patch | 76 ++++++++
...n-cleanup-the-compaction-trace-event.patch | 106 ++++++++++
.../lttng/lttng-modules_2.13.3.bb | 14 +-
18 files changed, 791 insertions(+), 42 deletions(-)
create mode 100644 meta/recipes-kernel/lttng/lttng-modules/0001-Fix-compaction-migratepages-event-name.patch
create mode 100644 meta/recipes-kernel/lttng/lttng-modules/0002-Fix-tracepoint-event-allow-same-provider-and-event-n.patch
create mode 100644 meta/recipes-kernel/lttng/lttng-modules/0003-fix-sched-tracing-Don-t-re-read-p-state-when-emittin.patch
create mode 100644 meta/recipes-kernel/lttng/lttng-modules/0004-fix-block-remove-genhd.h-v5.18.patch
create mode 100644 meta/recipes-kernel/lttng/lttng-modules/0005-fix-scsi-block-Remove-REQ_OP_WRITE_SAME-support-v5.1.patch
create mode 100644 meta/recipes-kernel/lttng/lttng-modules/0006-fix-random-remove-unused-tracepoints-v5.18.patch
create mode 100644 meta/recipes-kernel/lttng/lttng-modules/0007-fix-kprobes-Use-rethook-for-kretprobe-if-possible-v5.patch
create mode 100644 meta/recipes-kernel/lttng/lttng-modules/0008-fix-scsi-core-Remove-scsi-scsi_request.h-v5.18.patch
create mode 100644 meta/recipes-kernel/lttng/lttng-modules/0009-Rename-genhd-wrapper-to-blkdev.patch
create mode 100644 meta/recipes-kernel/lttng/lttng-modules/0010-fix-mm-compaction-cleanup-the-compaction-trace-event.patch
--
2.19.1
^ permalink raw reply [flat|nested] 15+ messages in thread* [PATCH 0/8] kernel: consolidated pull request
@ 2021-03-19 18:58 Bruce Ashfield
2021-03-20 18:46 ` Richard Purdie
0 siblings, 1 reply; 15+ messages in thread
From: Bruce Ashfield @ 2021-03-19 18:58 UTC (permalink / raw)
To: richard.purdie; +Cc: openembedded-core
From: Bruce Ashfield <bruce.ashfield@gmail.com>
Richard,
Here's my latest batch of bugfix and prep for release changes.
We have one configuration fix, as well as a fix to the tools that was
hiding some warnings that we used to get.
** There's a chance that this kern-tools change will pop out some
warnings. I can fix the warnings easily, but if it does, I'd suggest
just dropping it from the queue, since nothing depends on it.
**
We also have normal -stable bumps, that didn't cause any issues for me.
And finally, I'm preparing to bump the -dev kernel to v5.12 for the
release, and found a couple of issues with lttng (as usual) and kernel-devsrc.
I split the lttng one into two patches, so you could decide on the
backported patches separately from the devupstream bump.
The devsrc fix is safe for older kernels, and is a good thing to have
in the release to provide some future proofing.
Cheers,
Bruce
The following changes since commit 3cda6c0bd175282903079dea4affb3fcd290f137:
sudo: upgrade 1.9.5p2 -> 1.9.6 (2021-03-16 17:52:21 +0000)
are available in the Git repository at:
git://git.yoctoproject.org/poky-contrib zedd/kernel
http://git.yoctoproject.org/cgit.cgi/poky-contrib/log/?h=zedd/kernel
Bruce Ashfield (8):
linux-yocto/5.10: fix SERIAL_OF_PLATFORM warning
linux-yocto/5.4: update to v5.4.105
linux-yocto/5.10: update to v5.10.23
linux-yocto/5.10: cfg: features/numa: Remove NODES_SPAN_OTHER_NODES
option
kern-tools: add dropped options to audit output
lttng-modules: update devupstream to 2.12.5+
lttng-modules: backport patches to fix build against 5.12+ kernel
kernel-devsrc: fix on-target scripts/prepare for v5.12+
.../kern-tools/kern-tools-native_git.bb | 2 +-
meta/recipes-kernel/linux/kernel-devsrc.bb | 1 +
.../linux/linux-yocto-rt_5.10.bb | 6 +-
.../linux/linux-yocto-rt_5.4.bb | 6 +-
.../linux/linux-yocto-tiny_5.10.bb | 8 +-
.../linux/linux-yocto-tiny_5.4.bb | 8 +-
meta/recipes-kernel/linux/linux-yocto_5.10.bb | 22 +--
meta/recipes-kernel/linux/linux-yocto_5.4.bb | 22 +--
...01-Fix-memory-leaks-on-event-destroy.patch | 58 +++++++
...preter-early-exits-on-uninitialized-.patch | 159 ++++++++++++++++++
...ecord-slab-name-for-kmem_cache_free-.patch | 91 ++++++++++
...be-null-ptr-deref-on-session-destroy.patch | 41 +++++
.../lttng/lttng-modules_2.12.5.bb | 9 +-
13 files changed, 394 insertions(+), 39 deletions(-)
create mode 100644 meta/recipes-kernel/lttng/lttng-modules/0001-Fix-memory-leaks-on-event-destroy.patch
create mode 100644 meta/recipes-kernel/lttng/lttng-modules/0002-Fix-filter-interpreter-early-exits-on-uninitialized-.patch
create mode 100644 meta/recipes-kernel/lttng/lttng-modules/0003-fix-mm-tracing-record-slab-name-for-kmem_cache_free-.patch
create mode 100644 meta/recipes-kernel/lttng/lttng-modules/0004-Fix-kretprobe-null-ptr-deref-on-session-destroy.patch
--
2.19.1
^ permalink raw reply [flat|nested] 15+ messages in thread* Re: [PATCH 0/8] kernel: consolidated pull request 2021-03-19 18:58 Bruce Ashfield @ 2021-03-20 18:46 ` Richard Purdie 2021-03-21 2:17 ` Bruce Ashfield 0 siblings, 1 reply; 15+ messages in thread From: Richard Purdie @ 2021-03-20 18:46 UTC (permalink / raw) To: bruce.ashfield; +Cc: openembedded-core Hi Bruce, On Fri, 2021-03-19 at 14:58 -0400, bruce.ashfield@gmail.com wrote: > Here's my latest batch of bugfix and prep for release changes. > > We have one configuration fix, as well as a fix to the tools that was > hiding some warnings that we used to get. > > ** There's a chance that this kern-tools change will pop out some > warnings. I can fix the warnings easily, but if it does, I'd suggest > just dropping it from the queue, since nothing depends on it. > ** There is a warning so I'll defer that piece for now: https://autobuilder.yoctoproject.org/typhoon/#/builders/37/builds/3227 (maybe needs a yocto-bsp bump?) Do we know the cause of the beaglebone regression btw? We don't really know what to do with M3 due to that... Cheers, Richard ^ permalink raw reply [flat|nested] 15+ messages in thread
* Re: [PATCH 0/8] kernel: consolidated pull request 2021-03-20 18:46 ` Richard Purdie @ 2021-03-21 2:17 ` Bruce Ashfield 0 siblings, 0 replies; 15+ messages in thread From: Bruce Ashfield @ 2021-03-21 2:17 UTC (permalink / raw) To: Richard Purdie; +Cc: Patches and discussions about the oe-core layer On Sat, Mar 20, 2021 at 2:46 PM Richard Purdie <richard.purdie@linuxfoundation.org> wrote: > > Hi Bruce, > > On Fri, 2021-03-19 at 14:58 -0400, bruce.ashfield@gmail.com wrote: > > Here's my latest batch of bugfix and prep for release changes. > > > > We have one configuration fix, as well as a fix to the tools that was > > hiding some warnings that we used to get. > > > > ** There's a chance that this kern-tools change will pop out some > > warnings. I can fix the warnings easily, but if it does, I'd suggest > > just dropping it from the queue, since nothing depends on it. > > ** > > There is a warning so I'll defer that piece for now: > > https://autobuilder.yoctoproject.org/typhoon/#/builders/37/builds/3227 > > (maybe needs a yocto-bsp bump?) This is unique to that BSP, so a bump wouldn't get it. I'll pull together a fix for it, and send a bump to the BSPs to pick it up (and resend the tools tweak at the same time). > > Do we know the cause of the beaglebone regression btw? We don't > really know what to do with M3 due to that... Unless Kevin @ WindRiver has ideas, I don't actually have a platform available for any testing, so we need to hear from him. Bruce > > Cheers, > > Richard > -- - Thou shalt not follow the NULL pointer, for chaos and madness await thee at its end - "Use the force Harry" - Gandalf, Star Trek II ^ permalink raw reply [flat|nested] 15+ messages in thread
* [PATCH 0/8] kernel: consolidated pull request @ 2018-08-30 13:45 Bruce Ashfield 0 siblings, 0 replies; 15+ messages in thread From: Bruce Ashfield @ 2018-08-30 13:45 UTC (permalink / raw) To: richard.purdie; +Cc: openembedded-core Hi all, Now that 4.18 is in master, this is the next round of config updates, -stable merges and the removal of the older versioned recipes. There's also a devsrc fix for the arm targets. With this tweak, we can once again build the test modules on target. My last series fixed the kernel configuration audit output, and so we now have some configuration updates to cleanup warnings and drop obselete options. Finally, we remove 4.12 and 4.15 from master, leaving 4.14 and 4.18 as active kernels. I'll follow up with patches to other repos as required if any references to those versions remain. Bruce The following changes since commit 4434777705cf49300a7d2c9ca8fa3080d551d795: bitbake: tests/fetch: Update gnome.org urls after upstream changes (2018-08-29 10:43:23 +0100) are available in the git repository at: git://git.pokylinux.org/poky-contrib zedd/kernel http://git.pokylinux.org/cgit.cgi/poky-contrib/log/?h=zedd/kernel Bruce Ashfield (8): kernel-devsrc: fix arm/arm64 target module build linux-yocto: drop 4.15 versioned recipe linux-yocto/4.12: drop versioned recipes linux-yocto/4.18: remove obselete bsp configuration options qemuarm64: add compatibility with -rt linux-yocto/4.18: update to 4.18.5 linux-yocto/4.14: update to v4.14.67 kernel-yocto/cfg: configuration warning fixes meta/recipes-kernel/linux/kernel-devsrc.bb | 4 ++ meta/recipes-kernel/linux/linux-yocto-rt_4.12.bb | 38 ----------------- meta/recipes-kernel/linux/linux-yocto-rt_4.14.bb | 6 +-- meta/recipes-kernel/linux/linux-yocto-rt_4.15.bb | 41 ------------------- meta/recipes-kernel/linux/linux-yocto-rt_4.18.bb | 8 ++-- meta/recipes-kernel/linux/linux-yocto-tiny_4.12.bb | 25 ------------ meta/recipes-kernel/linux/linux-yocto-tiny_4.14.bb | 6 +-- meta/recipes-kernel/linux/linux-yocto-tiny_4.15.bb | 26 ------------ meta/recipes-kernel/linux/linux-yocto-tiny_4.18.bb | 6 +-- meta/recipes-kernel/linux/linux-yocto_4.12.bb | 46 --------------------- meta/recipes-kernel/linux/linux-yocto_4.14.bb | 20 ++++----- meta/recipes-kernel/linux/linux-yocto_4.15.bb | 47 ---------------------- meta/recipes-kernel/linux/linux-yocto_4.18.bb | 20 ++++----- 13 files changed, 37 insertions(+), 256 deletions(-) delete mode 100644 meta/recipes-kernel/linux/linux-yocto-rt_4.12.bb delete mode 100644 meta/recipes-kernel/linux/linux-yocto-rt_4.15.bb delete mode 100644 meta/recipes-kernel/linux/linux-yocto-tiny_4.12.bb delete mode 100644 meta/recipes-kernel/linux/linux-yocto-tiny_4.15.bb delete mode 100644 meta/recipes-kernel/linux/linux-yocto_4.12.bb delete mode 100644 meta/recipes-kernel/linux/linux-yocto_4.15.bb -- 2.5.0 ^ permalink raw reply [flat|nested] 15+ messages in thread
end of thread, other threads:[~2025-08-13 21:04 UTC | newest] Thread overview: 15+ messages (download: mbox.gz follow: Atom feed -- links below jump to the message on this page -- 2025-08-13 20:49 [PATCH 0/8] kernel: consolidated pull request bruce.ashfield 2025-08-13 20:49 ` [PATCH 1/8] linux-yocto/6.12: update to v6.12.39 bruce.ashfield 2025-08-13 20:49 ` [PATCH 2/8] linux-yocto/6.12: update CVE exclusions (6.12.39) bruce.ashfield 2025-08-13 20:49 ` [PATCH 3/8] linux-yocto/6.12: update to v6.12.40 bruce.ashfield 2025-08-13 20:49 ` [PATCH 4/8] linux-yocto/6.12: update CVE exclusions (6.12.40) bruce.ashfield 2025-08-13 20:49 ` [PATCH 5/8] linux-libc-headers: update to v6.16 bruce.ashfield 2025-08-13 20:49 ` [PATCH 6/8] lttng-modules: update to v2.14.0 bruce.ashfield 2025-08-13 21:03 ` Patchtest results for " patchtest 2025-08-13 20:49 ` [PATCH 7/8] linux-yocto/6.12: update to v6.12.41 bruce.ashfield 2025-08-13 20:49 ` [PATCH 8/8] linux-yocto/6.12: update CVE exclusions (6.12.41) bruce.ashfield -- strict thread matches above, loose matches on Subject: below -- 2022-04-12 21:45 [PATCH 0/8] kernel: consolidated pull request bruce.ashfield 2021-03-19 18:58 Bruce Ashfield 2021-03-20 18:46 ` Richard Purdie 2021-03-21 2:17 ` Bruce Ashfield 2018-08-30 13:45 Bruce Ashfield
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox