From patchwork Fri Dec 8 02:33:07 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 35903 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id AB584C4167B for ; Fri, 8 Dec 2023 02:33:39 +0000 (UTC) Received: from mail-pl1-f174.google.com (mail-pl1-f174.google.com [209.85.214.174]) by mx.groups.io with SMTP id smtpd.web10.11139.1702002815925041324 for ; Thu, 07 Dec 2023 18:33:35 -0800 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20230601.gappssmtp.com header.s=20230601 header.b=rphJJlML; spf=softfail (domain: sakoman.com, ip: 209.85.214.174, mailfrom: steve@sakoman.com) Received: by mail-pl1-f174.google.com with SMTP id d9443c01a7336-1d2e6e14865so6009385ad.0 for ; Thu, 07 Dec 2023 18:33:35 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20230601.gappssmtp.com; s=20230601; t=1702002815; x=1702607615; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=r7VFDBjtjaVmrJ6UjzV2T4LIHWf7mIqdBLMiLsb0Sm4=; b=rphJJlMLDZLmMNPl7uCboJFqYc8hkjiZ5/JJn83xogLf1vkNt25pgF6t9eiaCUNfDm kfdw2VViDw9kwXK5WtSr4724lZXK9irEq3pfzphGegCDvhbx3BE9mnY0DfRDC3FBKcdo Ymxu+JxFGcZzJHy7wsxXa6u2tvyfdUSFgYOwS79z/CTMIehjyt03GuH+tQ2K41d5psia dCeMXGZ3IpV/h4seOSuWXnRfNti1vIx4nlU+mKwfB/lfI3rpcMmJ9rNO0cVeKVveP9zq OegD6FmLRa+nPROsRo4QD62ArOYFiDQdwcgQW/Bs0KmdrhBy+6XdUxWxuUV66XGGz8Tp 6Y3A== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1702002815; x=1702607615; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=r7VFDBjtjaVmrJ6UjzV2T4LIHWf7mIqdBLMiLsb0Sm4=; b=TzqGdsy0cfv1c7DtV1MPBMUINwXQd2BQCrZ/szKoqFkqRJ9rP2Z66ppgQknbemtPd0 wZ8xpD5p9lbPVr5AfiOroiCTVTnEtxNi7kQAtpHGScDk26k11anyCAFW7DplyMLKOSHk FxnEqqLy4fuB1YGbv7yYeO/+c+/qz+iND5CUJow0UWYJr227UU5uhc9ug4/LRamGOFa4 TuCHH7vcTU9vV/7LJGNc+ms1Kk89MWu6/FpME4RYH6TFjflG+tVAmcRthv/p+z77d3h0 hFx+AyApFR44SbJOLJFlbi2154URvGbgIGppaEOY6aXiu37reqRNQSsmTkpFg9OeJFDO qS7w== X-Gm-Message-State: AOJu0Yx5fE9HUwrQXufGDlJl0DmmFJ7knW4iVwbrAOk7ompyP0TpkuK6 zK+Iv9NWZwdPVUSv27PImFd0SDoX8zwtvpXg7Lo= X-Google-Smtp-Source: AGHT+IGU7MQFSheWUrSVeb/uAH95N/QTyYTlqOPDGlYytBx29Ine21S99DeGJEoJPpcV0brVR1Cvqg== X-Received: by 2002:a17:903:555:b0:1d0:6ffd:6e53 with SMTP id jo21-20020a170903055500b001d06ffd6e53mr3093249plb.75.1702002815067; Thu, 07 Dec 2023 18:33:35 -0800 (PST) Received: from hexa.lan (dhcp-72-234-108-41.hawaiiantel.net. [72.234.108.41]) by smtp.gmail.com with ESMTPSA id i11-20020a170902c94b00b001c9bc811d4dsm499752pla.295.2023.12.07.18.33.34 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 07 Dec 2023 18:33:34 -0800 (PST) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][kirkstone 01/15] libsndfile: fix CVE-2022-33065 Signed integer overflow in src/mat4.c Date: Thu, 7 Dec 2023 16:33:07 -1000 Message-Id: <0dc086b37b1c333adf99c01ce4ecb717df48d6f9.1702002667.git.steve@sakoman.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 08 Dec 2023 02:33:39 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/191993 From: Vivek Kumbhar Signed-off-by: Vivek Kumbhar Signed-off-by: Steve Sakoman --- .../libsndfile1/CVE-2022-33065.patch | 46 +++++++++++++++++++ .../libsndfile/libsndfile1_1.0.31.bb | 1 + 2 files changed, 47 insertions(+) create mode 100644 meta/recipes-multimedia/libsndfile/libsndfile1/CVE-2022-33065.patch diff --git a/meta/recipes-multimedia/libsndfile/libsndfile1/CVE-2022-33065.patch b/meta/recipes-multimedia/libsndfile/libsndfile1/CVE-2022-33065.patch new file mode 100644 index 0000000000..c5fba4d6b5 --- /dev/null +++ b/meta/recipes-multimedia/libsndfile/libsndfile1/CVE-2022-33065.patch @@ -0,0 +1,46 @@ +From 0754562e13d2e63a248a1c82f90b30bc0ffe307c Mon Sep 17 00:00:00 2001 +From: Alex Stewart +Date: Tue, 10 Oct 2023 16:10:34 -0400 +Subject: [PATCH] mat4/mat5: fix int overflow in dataend calculation + +The clang sanitizer warns of a possible signed integer overflow when +calculating the `dataend` value in `mat4_read_header()`. + +``` +src/mat4.c:323:41: runtime error: signed integer overflow: 205 * -100663296 cannot be represented in type 'int' +SUMMARY: UndefinedBehaviorSanitizer: undefined-behavior src/mat4.c:323:41 in +src/mat4.c:323:48: runtime error: signed integer overflow: 838860800 * 4 cannot be represented in type 'int' +SUMMARY: UndefinedBehaviorSanitizer: undefined-behavior src/mat4.c:323:48 in +``` + +Cast the offending `rows` and `cols` ints to `sf_count_t` (the type of +`dataend` before performing the calculation, to avoid the issue. + +CVE: CVE-2022-33065 +Fixes: https://github.com/libsndfile/libsndfile/issues/789 +Fixes: https://github.com/libsndfile/libsndfile/issues/833 + +Signed-off-by: Alex Stewart + +Upstream-Status: Backport [https://github.com/libsndfile/libsndfile/commit/0754562e13d2e63a248a1c82f90b30bc0ffe307c] +CVE: CVE-2022-33065 +Signed-off-by: Vivek Kumbhar +--- + src/mat4.c | 2 +- + 1 file changed, 1 insertion(+), 1 deletion(-) + +diff --git a/src/mat4.c b/src/mat4.c +index 0b1b414..575683b 100644 +--- a/src/mat4.c ++++ b/src/mat4.c +@@ -320,7 +320,7 @@ mat4_read_header (SF_PRIVATE *psf) + psf->filelength - psf->dataoffset, psf->sf.channels * psf->sf.frames * psf->bytewidth) ; + } + else if ((psf->filelength - psf->dataoffset) > psf->sf.channels * psf->sf.frames * psf->bytewidth) +- psf->dataend = psf->dataoffset + rows * cols * psf->bytewidth ; ++ psf->dataend = psf->dataoffset + (sf_count_t) rows * (sf_count_t) cols * psf->bytewidth ; + + psf->datalength = psf->filelength - psf->dataoffset - psf->dataend ; + +-- +2.40.1 diff --git a/meta/recipes-multimedia/libsndfile/libsndfile1_1.0.31.bb b/meta/recipes-multimedia/libsndfile/libsndfile1_1.0.31.bb index f6ea585e34..0c654fd853 100644 --- a/meta/recipes-multimedia/libsndfile/libsndfile1_1.0.31.bb +++ b/meta/recipes-multimedia/libsndfile/libsndfile1_1.0.31.bb @@ -11,6 +11,7 @@ LICENSE = "LGPL-2.1-only" SRC_URI = "https://github.com/libsndfile/libsndfile/releases/download/${PV}/libsndfile-${PV}.tar.bz2 \ file://noopus.patch \ file://0001-flac-Fix-improper-buffer-reusing-732.patch \ + file://CVE-2022-33065.patch \ " UPSTREAM_CHECK_URI = "https://github.com/libsndfile/libsndfile/releases/" From patchwork Fri Dec 8 02:33:08 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 35904 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id B7D93C10F04 for ; Fri, 8 Dec 2023 02:33:39 +0000 (UTC) Received: from mail-pl1-f169.google.com (mail-pl1-f169.google.com [209.85.214.169]) by mx.groups.io with SMTP id smtpd.web10.11143.1702002818471187046 for ; Thu, 07 Dec 2023 18:33:38 -0800 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20230601.gappssmtp.com header.s=20230601 header.b=osVevNZz; spf=softfail (domain: sakoman.com, ip: 209.85.214.169, mailfrom: steve@sakoman.com) Received: by mail-pl1-f169.google.com with SMTP id d9443c01a7336-1d08a924fcfso14843585ad.2 for ; Thu, 07 Dec 2023 18:33:38 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20230601.gappssmtp.com; s=20230601; t=1702002817; x=1702607617; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=c79vRigKah5WGQ+zaQb4Whks6tKwpTVaF1sgLWxe/og=; b=osVevNZzM3AGV75tfmnPsQFZ/HxJt4BciQpR62g4U0OXaEOjBa/UmogkoniafV5xt5 ejR9ao/6yCGbPhNUDspGKJRQee4GEscI55aGbmz5GGxBR/90PzQxjT4CMmZRw5r0O6hY 0B+M2Opff1xwScseMftJBvlfhCrUm2YTBAFRos5Yhiy4JgKEtHdUcndAlfkFlJaB+pXW SP+zpaByNNA4Wl3GjBhtqzrYVTbQqKF5v21zJ8Us+ZuL4SM/hE90hvw2c2i00ygRzvE0 OTi7wW6lHqWGjWlfFq7pKK7Rtyl0eFqf3a3IZ/nACNOrhFROdBf06ZuecP4Y4wJ75Esp qerA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1702002817; x=1702607617; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=c79vRigKah5WGQ+zaQb4Whks6tKwpTVaF1sgLWxe/og=; b=nDA7fVEmkekC/KfqTC6L971PZh2iL759ygIuWQRUkVMhWtDsPlb/JSwlTor/E6wZdr dgZJ3knttgviO9NlIIDrXMFZR6JX8F/icQrYPOGDH59MgGNoPmQHEcyRuNqtmqHn3qjK g1IyzmKYvEDkMdme5VIDhtohWhy2ckbM2YDM7ln5ZT+BPjS5bEiG8UMZiGbu+zCA0FPy zxrwI5XI9wet4nn/f5DUsUUbV3ZUPQr6FqK9PYWfx6Sy5pAn/nvuew/z1u5EX+VzKfof 4VThkTyob9KVx32nnQD2V7nf0ZnsCBqQYAugDZcaS6CD4x06gAQevuNs2BCxPCcDfEbl N7rA== X-Gm-Message-State: AOJu0YzzW5qwA+mzuWq4m5V4NffADpM4yAtLioPppNw1gNoN5Y3pbACR YPgFefleuxrb5tOv95UA5orjQXUTyq72u9VDK1Q= X-Google-Smtp-Source: AGHT+IHLRxZOfQfByrGdpHnYjV1O794wzSqvn5wU66+89YCr1KIqkKe+h+ljc0baqC2wfBtikb0oJQ== X-Received: by 2002:a17:902:e88a:b0:1d0:68a:4a46 with SMTP id w10-20020a170902e88a00b001d0068a4a46mr4359214plg.3.1702002817070; Thu, 07 Dec 2023 18:33:37 -0800 (PST) Received: from hexa.lan (dhcp-72-234-108-41.hawaiiantel.net. [72.234.108.41]) by smtp.gmail.com with ESMTPSA id i11-20020a170902c94b00b001c9bc811d4dsm499752pla.295.2023.12.07.18.33.36 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 07 Dec 2023 18:33:36 -0800 (PST) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][kirkstone 02/15] xwayland: fix CVE-2023-5367 Date: Thu, 7 Dec 2023 16:33:08 -1000 Message-Id: <9c21b08c18414bb61abebcbbb8704946ea288a7b.1702002667.git.steve@sakoman.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 08 Dec 2023 02:33:39 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/191994 From: Lee Chee Yang Signed-off-by: Lee Chee Yang Signed-off-by: Steve Sakoman --- .../xwayland/xwayland/CVE-2023-5367.patch | 85 +++++++++++++++++++ .../xwayland/xwayland_22.1.8.bb | 4 +- 2 files changed, 88 insertions(+), 1 deletion(-) create mode 100644 meta/recipes-graphics/xwayland/xwayland/CVE-2023-5367.patch diff --git a/meta/recipes-graphics/xwayland/xwayland/CVE-2023-5367.patch b/meta/recipes-graphics/xwayland/xwayland/CVE-2023-5367.patch new file mode 100644 index 0000000000..d4da1ecb4b --- /dev/null +++ b/meta/recipes-graphics/xwayland/xwayland/CVE-2023-5367.patch @@ -0,0 +1,85 @@ +CVE: CVE-2023-5367 +Upstream-Status: Backport [ https://gitlab.freedesktop.org/xorg/xserver/-/commit/541ab2ecd41d4d8689e71855d93e492bc554719a ] +Signed-off-by: Lee Chee Yang + + +From 541ab2ecd41d4d8689e71855d93e492bc554719a Mon Sep 17 00:00:00 2001 +From: Peter Hutterer +Date: Tue, 3 Oct 2023 11:53:05 +1000 +Subject: [PATCH] Xi/randr: fix handling of PropModeAppend/Prepend + +The handling of appending/prepending properties was incorrect, with at +least two bugs: the property length was set to the length of the new +part only, i.e. appending or prepending N elements to a property with P +existing elements always resulted in the property having N elements +instead of N + P. + +Second, when pre-pending a value to a property, the offset for the old +values was incorrect, leaving the new property with potentially +uninitalized values and/or resulting in OOB memory writes. +For example, prepending a 3 element value to a 5 element property would +result in this 8 value array: + [N, N, N, ?, ?, P, P, P ] P, P + ^OOB write + +The XI2 code is a copy/paste of the RandR code, so the bug exists in +both. + +CVE-2023-5367, ZDI-CAN-22153 + +This vulnerability was discovered by: +Jan-Niklas Sohn working with Trend Micro Zero Day Initiative + +Signed-off-by: Peter Hutterer +--- + Xi/xiproperty.c | 4 ++-- + randr/rrproperty.c | 4 ++-- + 2 files changed, 4 insertions(+), 4 deletions(-) + +diff --git a/Xi/xiproperty.c b/Xi/xiproperty.c +index 066ba21fba..d315f04d0e 100644 +--- a/Xi/xiproperty.c ++++ b/Xi/xiproperty.c +@@ -730,7 +730,7 @@ XIChangeDeviceProperty(DeviceIntPtr dev, Atom property, Atom type, + XIDestroyDeviceProperty(prop); + return BadAlloc; + } +- new_value.size = len; ++ new_value.size = total_len; + new_value.type = type; + new_value.format = format; + +@@ -747,7 +747,7 @@ XIChangeDeviceProperty(DeviceIntPtr dev, Atom property, Atom type, + case PropModePrepend: + new_data = new_value.data; + old_data = (void *) (((char *) new_value.data) + +- (prop_value->size * size_in_bytes)); ++ (len * size_in_bytes)); + break; + } + if (new_data) +diff --git a/randr/rrproperty.c b/randr/rrproperty.c +index c2fb9585c6..25469f57b2 100644 +--- a/randr/rrproperty.c ++++ b/randr/rrproperty.c +@@ -209,7 +209,7 @@ RRChangeOutputProperty(RROutputPtr output, Atom property, Atom type, + RRDestroyOutputProperty(prop); + return BadAlloc; + } +- new_value.size = len; ++ new_value.size = total_len; + new_value.type = type; + new_value.format = format; + +@@ -226,7 +226,7 @@ RRChangeOutputProperty(RROutputPtr output, Atom property, Atom type, + case PropModePrepend: + new_data = new_value.data; + old_data = (void *) (((char *) new_value.data) + +- (prop_value->size * size_in_bytes)); ++ (len * size_in_bytes)); + break; + } + if (new_data) +-- +GitLab + diff --git a/meta/recipes-graphics/xwayland/xwayland_22.1.8.bb b/meta/recipes-graphics/xwayland/xwayland_22.1.8.bb index 6919ba421b..94797be8e0 100644 --- a/meta/recipes-graphics/xwayland/xwayland_22.1.8.bb +++ b/meta/recipes-graphics/xwayland/xwayland_22.1.8.bb @@ -9,7 +9,9 @@ HOMEPAGE = "https://fedoraproject.org/wiki/Changes/XwaylandStandalone" LICENSE = "MIT" LIC_FILES_CHKSUM = "file://COPYING;md5=5df87950af51ac2c5822094553ea1880" -SRC_URI = "https://www.x.org/archive/individual/xserver/xwayland-${PV}.tar.xz" +SRC_URI = "https://www.x.org/archive/individual/xserver/xwayland-${PV}.tar.xz \ + file://CVE-2023-5367.patch \ +" SRC_URI[sha256sum] = "d11eeee73290b88ea8da42a7d9350dedfaba856ce4ae44e58c045ad9ecaa2f73" UPSTREAM_CHECK_REGEX = "xwayland-(?P\d+(\.(?!90\d)\d+)+)\.tar" From patchwork Fri Dec 8 02:33:09 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 35905 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 925BAC4167B for ; Fri, 8 Dec 2023 02:33:49 +0000 (UTC) Received: from mail-pf1-f173.google.com (mail-pf1-f173.google.com [209.85.210.173]) by mx.groups.io with SMTP id smtpd.web10.11147.1702002820348704445 for ; Thu, 07 Dec 2023 18:33:40 -0800 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20230601.gappssmtp.com header.s=20230601 header.b=T4suMkI1; spf=softfail (domain: sakoman.com, ip: 209.85.210.173, mailfrom: steve@sakoman.com) Received: by mail-pf1-f173.google.com with SMTP id d2e1a72fcca58-6ce33234fd7so1071089b3a.0 for ; Thu, 07 Dec 2023 18:33:40 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20230601.gappssmtp.com; s=20230601; t=1702002819; x=1702607619; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=zOWUF9CrjFpMqfpQZd74Z2yCVLyL06QID4ULmUiFuk4=; b=T4suMkI1XZnOJTpJxgdv7yQVnjrh/75PtkmvnXn/qgWPwKORQjobWJLZ7jZ+5NZLX4 Ruglj8ryVcreKK6Iwi32NlLbfSmbK2C4ZO3iD0LedbmrZY/34zK/3xCsNdUOpLKlT0dG zmv/HfV6kqXJh2KyhOfzN5UO871bacn6rUbjM/0xkWhrtvaSY3IL+zkzuExjdEicVJdk JNwiKZ4FnTNC57yG5mHHz65GWVrm0WUL6BEKMMLRLoQ1sEjf1/j7coMYRqiTB6R4lNs4 Jdrh3VbJZnVgl/YDJnHGfd4uR4QndyCTe5LYcsZ8ee9apCgk1JlcfJtugK/eNQdPocjQ oKyQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1702002819; x=1702607619; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=zOWUF9CrjFpMqfpQZd74Z2yCVLyL06QID4ULmUiFuk4=; b=qAbher+J3ydEBW0sk2w4pWCeO8ugQ5U3rK0bl4EW0hbPZ2ppgbso7/Kqr968o/Zupt 6FUOYawNvQFORc9ykAZCwTtynnZXrc4p89dFDNX6GCmSVbiE7nKQP+pY5y5i/utXFU8p sBi7ZpfK/V7exayu4SF+S5zScgB5ksvjbhIG8QgwrpA/Se0aZGs1nRhEyEY5ekOePORp sKhqiM7N6PewQKAVrOqLhmus4C6bTVLZCoay+bsqROGLjlco2EzEDSyAHRc3O7hfGNxU 6eUivp7uuaujJcl8NiIgeS2znQPqicl/0UYatXAKjvu5gT/Yx5LGiMb7fHK9P0UIxAuk ge7A== X-Gm-Message-State: AOJu0YzXRmgEZ3NcTBtRJ+zicUw0u8UTuMhx65+2bji8J6wJGHb8xKy/ NzOXkTUEMvR8PpHfnGsvUlttEC3fWyBcZzA7eC8= X-Google-Smtp-Source: AGHT+IFWT4frA2jhPsugYavpJbIsGft0FM1dvV4E11Z5rfWabTn0X600GE/IjwNXwtCfXMcQRHPCNw== X-Received: by 2002:a05:6a20:8e18:b0:190:fca:72d7 with SMTP id y24-20020a056a208e1800b001900fca72d7mr1792077pzj.90.1702002819055; Thu, 07 Dec 2023 18:33:39 -0800 (PST) Received: from hexa.lan (dhcp-72-234-108-41.hawaiiantel.net. [72.234.108.41]) by smtp.gmail.com with ESMTPSA id i11-20020a170902c94b00b001c9bc811d4dsm499752pla.295.2023.12.07.18.33.38 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 07 Dec 2023 18:33:38 -0800 (PST) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][kirkstone 03/15] python3-cryptography: fix CVE-2023-49083 Date: Thu, 7 Dec 2023 16:33:09 -1000 Message-Id: <2d104f78cd13a10640bc284c7fc8358bf305279c.1702002667.git.steve@sakoman.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 08 Dec 2023 02:33:49 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/191995 From: Narpat Mali cryptography is a package designed to expose cryptographic primitives and recipes to Python developers. Calling `load_pem_pkcs7_certificates` or `load_der_pkcs7_certificates` could lead to a NULL-pointer dereference and segfault. Exploitation of this vulnerability poses a serious risk of Denial of Service (DoS) for any application attempting to deserialize a PKCS7 blob/certificate. The consequences extend to potential disruptions in system availability and stability. This vulnerability has been patched in version 41.0.6. References: https://nvd.nist.gov/vuln/detail/CVE-2023-49083 https://security-tracker.debian.org/tracker/CVE-2023-49083 Signed-off-by: Narpat Mali Signed-off-by: Steve Sakoman --- .../python3-cryptography/CVE-2023-49083.patch | 53 +++++++++++++++++++ .../python/python3-cryptography_36.0.2.bb | 1 + 2 files changed, 54 insertions(+) create mode 100644 meta/recipes-devtools/python/python3-cryptography/CVE-2023-49083.patch diff --git a/meta/recipes-devtools/python/python3-cryptography/CVE-2023-49083.patch b/meta/recipes-devtools/python/python3-cryptography/CVE-2023-49083.patch new file mode 100644 index 0000000000..d398eea1d9 --- /dev/null +++ b/meta/recipes-devtools/python/python3-cryptography/CVE-2023-49083.patch @@ -0,0 +1,53 @@ +From 627ac5e314303acc00a19d58f09eb1eabd029fd1 Mon Sep 17 00:00:00 2001 +From: Alex Gaynor +Date: Wed, 6 Dec 2023 08:04:53 +0000 +Subject: [PATCH] Fixed crash when loading a PKCS#7 bundle with no certificates + (#9926) + +CVE: CVE-2023-49083 + +Upstream-Status: Backport [https://github.com/pyca/cryptography/commit/1e7b4d074e14c4e694d3ce69ad6754a6039fd6ff] + +Signed-off-by: Narpat Mali +--- + src/cryptography/hazmat/backends/openssl/backend.py | 5 ++++- + tests/hazmat/primitives/test_pkcs7.py | 6 ++++++ + 2 files changed, 10 insertions(+), 1 deletion(-) + +diff --git a/src/cryptography/hazmat/backends/openssl/backend.py b/src/cryptography/hazmat/backends/openssl/backend.py +index 5606fe6..c43fea0 100644 +--- a/src/cryptography/hazmat/backends/openssl/backend.py ++++ b/src/cryptography/hazmat/backends/openssl/backend.py +@@ -2189,9 +2189,12 @@ class Backend(BackendInterface): + _Reasons.UNSUPPORTED_SERIALIZATION, + ) + ++ certs: list[x509.Certificate] = [] ++ if p7.d.sign == self._ffi.NULL: ++ return certs ++ + sk_x509 = p7.d.sign.cert + num = self._lib.sk_X509_num(sk_x509) +- certs = [] + for i in range(num): + x509 = self._lib.sk_X509_value(sk_x509, i) + self.openssl_assert(x509 != self._ffi.NULL) +diff --git a/tests/hazmat/primitives/test_pkcs7.py b/tests/hazmat/primitives/test_pkcs7.py +index 91ac842..b98a9f1 100644 +--- a/tests/hazmat/primitives/test_pkcs7.py ++++ b/tests/hazmat/primitives/test_pkcs7.py +@@ -81,6 +81,12 @@ class TestPKCS7Loading(object): + mode="rb", + ) + ++ def test_load_pkcs7_empty_certificates(self): ++ der = b"\x30\x0B\x06\x09\x2A\x86\x48\x86\xF7\x0D\x01\x07\x02" ++ ++ certificates = pkcs7.load_der_pkcs7_certificates(der) ++ assert certificates == [] ++ + + # We have no public verification API and won't be adding one until we get + # some requirements from users so this function exists to give us basic +-- +2.40.0 diff --git a/meta/recipes-devtools/python/python3-cryptography_36.0.2.bb b/meta/recipes-devtools/python/python3-cryptography_36.0.2.bb index c3ae0c1ab9..c429c75e1b 100644 --- a/meta/recipes-devtools/python/python3-cryptography_36.0.2.bb +++ b/meta/recipes-devtools/python/python3-cryptography_36.0.2.bb @@ -18,6 +18,7 @@ SRC_URI += " \ file://0002-Cargo.toml-edition-2018-2021.patch \ file://fix-leak-metric.patch \ file://CVE-2023-23931.patch \ + file://CVE-2023-49083.patch \ " inherit pypi python_setuptools3_rust From patchwork Fri Dec 8 02:33:10 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 35907 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 97F9FC10F04 for ; Fri, 8 Dec 2023 02:33:49 +0000 (UTC) Received: from mail-pl1-f181.google.com (mail-pl1-f181.google.com [209.85.214.181]) by mx.groups.io with SMTP id smtpd.web10.11152.1702002822206043392 for ; Thu, 07 Dec 2023 18:33:42 -0800 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20230601.gappssmtp.com header.s=20230601 header.b=DgllzLYh; spf=softfail (domain: sakoman.com, ip: 209.85.214.181, mailfrom: steve@sakoman.com) Received: by mail-pl1-f181.google.com with SMTP id d9443c01a7336-1d075392ff6so13257695ad.1 for ; Thu, 07 Dec 2023 18:33:42 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20230601.gappssmtp.com; s=20230601; t=1702002821; x=1702607621; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=JrtOtSCdc4weOrQT9KKwaWGd3NG5ykmm2segnHjB+3U=; b=DgllzLYhk5LdG5RyOve6O4yruHQO3q4NOn+86nfn2ZL2q6wqFSNI5tS8pkTv1I3sw6 /F1OVjQdYteQXf3NxujfvoIQmNxjNQJcF7cJ5fcQ9rDa7Ge01LEfQWz+1ffhqWRzuDDg GjEqy5pS5TKpZMBiW1cZ5uUKhsluejV2g7Wip+NM/XAnLNrx9Hk7ysJx4NncOLHm2nBT fswefDH8+BPozLPNECbRALJ/noSmV5FM2r6YUvTsol2PEqy0V1otPRDm3HnNqdBr7OSX E+1hOWHxrGYoEZeAEXI8/GWZO4fO1GsAZPoue8kEBspU9cxqzPgkk1GDy+Wysie2EIOa wsPA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1702002821; x=1702607621; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=JrtOtSCdc4weOrQT9KKwaWGd3NG5ykmm2segnHjB+3U=; b=k+yY6G/vSbO3B58yvPCtHVUMWT2K43dEgp9k0Re64ZZzAAxSfuMpfEzZ428HW6pMdO jTddSng9UES4ykO2+DJZ6Ir1fVeLzJrCvcdsjuGrJQo5UyeObPnDbnKDD3cYq5xPqSjn RFRSllpmRMDoKVSl7EFYXNHmGTFmdqhNYVEzFyIZdUwtUzDarmjuXirn8DUUXmih0+nv gFG+P4cPNSzUjl6htHSPQqzBrQmxDOqR334KazS4Q7En/zQ1IC92N4uOjw6Qcdy/qZeh PIPMNpqHa0C6oluWC2z6kG4Fyzkv/Iis1jJfecdAT+FR6H1h4Wo9B6l4gtOjoh0XM0jJ 1nxA== X-Gm-Message-State: AOJu0Yy7MzBL2/T8zEikqdA7r9VnWG8Oivm4gA94thWq0V7BU9xS6sen QwgkqNO7ZhY0I+76tZfK/tv9noBUd/D9wJW9dLc= X-Google-Smtp-Source: AGHT+IEC+EmGcA3H28RX63xJP8KzPCTT2IL4tie4hqY2x3w0WfjI+aZs5CY/cHcCjrMATYKMkohbkg== X-Received: by 2002:a17:902:d48e:b0:1d0:8be8:bb6f with SMTP id c14-20020a170902d48e00b001d08be8bb6fmr236531plg.38.1702002820878; Thu, 07 Dec 2023 18:33:40 -0800 (PST) Received: from hexa.lan (dhcp-72-234-108-41.hawaiiantel.net. [72.234.108.41]) by smtp.gmail.com with ESMTPSA id i11-20020a170902c94b00b001c9bc811d4dsm499752pla.295.2023.12.07.18.33.40 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 07 Dec 2023 18:33:40 -0800 (PST) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][kirkstone 04/15] vim: upgrade 9.0.2068 -> 9.0.2130 Date: Thu, 7 Dec 2023 16:33:10 -1000 Message-Id: <7a6aab8b28b57bbaa4d4cf436a8cae18f1a43eba.1702002667.git.steve@sakoman.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 08 Dec 2023 02:33:49 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/191996 From: Tim Orling https://github.com/vim/vim/compare/v9.0.2068...v9.0.2130 CVE: CVE-2023-48231 CVE: CVE-2023-48232 CVE: CVE-2023-48233 CVE: CVE-2023-48234 CVE: CVE-2023-48235 CVE: CVE-2023-48236 CVE: CVE-2023-48237 Signed-off-by: Tim Orling Signed-off-by: Alexandre Belloni (cherry picked from commit 5978d565a9e700485fc563dfe2e3c0045dd74b59) Signed-off-by: Steve Sakoman --- meta/recipes-support/vim/vim.inc | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/meta/recipes-support/vim/vim.inc b/meta/recipes-support/vim/vim.inc index a37310afd8..6b440d8947 100644 --- a/meta/recipes-support/vim/vim.inc +++ b/meta/recipes-support/vim/vim.inc @@ -19,8 +19,8 @@ SRC_URI = "git://github.com/vim/vim.git;branch=master;protocol=https \ file://no-path-adjust.patch \ " -PV .= ".2068" -SRCREV = "9198c1f2b1ddecde22af918541e0de2a32f0f45a" +PV .= ".2130" +SRCREV = "075ad7047457debfeef13442c01e74088b461092" # Do not consider .z in x.y.z, as that is updated with every commit UPSTREAM_CHECK_GITTAGREGEX = "(?P\d+\.\d+)\.0" From patchwork Fri Dec 8 02:33:11 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 35908 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id A3EF2C10DC3 for ; Fri, 8 Dec 2023 02:33:49 +0000 (UTC) Received: from mail-pl1-f169.google.com (mail-pl1-f169.google.com [209.85.214.169]) by mx.groups.io with SMTP id smtpd.web10.11156.1702002824070074020 for ; Thu, 07 Dec 2023 18:33:44 -0800 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20230601.gappssmtp.com header.s=20230601 header.b=r5d3YaHI; spf=softfail (domain: sakoman.com, ip: 209.85.214.169, mailfrom: steve@sakoman.com) Received: by mail-pl1-f169.google.com with SMTP id d9443c01a7336-1d06d42a58aso14940745ad.0 for ; Thu, 07 Dec 2023 18:33:43 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20230601.gappssmtp.com; s=20230601; t=1702002823; x=1702607623; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=bFSRaoyTvk91KwbZBHdadN0h1J0RGDO8mrCFISG3sUc=; b=r5d3YaHIVHT1xK19SMfM7QJTSFmNs9hMh0dlLWg8sNVgMbITZLJY4w/sh6KsvNMWVO Ei8RVHTMqVl+UXJM+kkzu7sBrZtglH4RUCja+QawEBmuSAyukK1mjr3aOIc2GuJRSWNR n5seuRFkSiq81wWKb+vy9q9FNoEN/1ZkxQgDTVCUa5n8eVmTOPP45YQDT6tVxxKy/5vj mDESvfCiiqEuBRJU57+c0jdon+mukr/5yOLriK9xTIIzP4Dg5OoNQKz54nTcHkgDj8Od VdWAiLh22EVaiaPq8flM0CjysdxaGxaMAumoVv3dZHmhOSK3VG+E5SID3WeM/kXe+qJU 6EMw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1702002823; x=1702607623; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=bFSRaoyTvk91KwbZBHdadN0h1J0RGDO8mrCFISG3sUc=; b=OopdX68aSrSlZOwdKEnYpciknnednOaMHv1BlSBlrX+SlVYmchIUU8OlRFhSaesCKW x9fTtp+86R4EFbEOEuhRaOCHAGdn6BUs9vX/QaKKjn90gispguidER6ifUI7/OV8SLRv gKD0uSJBVnT0+PlMJFLK35oPdc1Vw7k/5XN07aOkxLVzDnwWQiu3AoxGeAURDG2OFvqt LbI3Be9UAuxLaYjlbXIHWmskFMHxPIDPBCCyh7Dh37KyMYl65ub2v9+G5/kLVUJKGuEk 9CiSTROfDE0To87wKLu0MBwdXfJRNyRGWpKecEvXJSLzyu76v0Bf/xRsbLUQdkoIxl7P RcZg== X-Gm-Message-State: AOJu0YwFco0UNgpKxnK4bTvNFHpU5r28yhe4Eaci1Yzuq92yOEqV1iqf MSTFkmbgeUrba/BNl73jsWA1JbZSMrCBgwKfDu8= X-Google-Smtp-Source: AGHT+IFti++eq/9SmdUnxkBAaPcvNnK8egdXhVaW1PIQ0XAJcBOqt3A5LXYXDIBuPnLUNC8KUHB2rA== X-Received: by 2002:a17:903:2308:b0:1d0:b3f5:c30c with SMTP id d8-20020a170903230800b001d0b3f5c30cmr4268510plh.98.1702002822925; Thu, 07 Dec 2023 18:33:42 -0800 (PST) Received: from hexa.lan (dhcp-72-234-108-41.hawaiiantel.net. [72.234.108.41]) by smtp.gmail.com with ESMTPSA id i11-20020a170902c94b00b001c9bc811d4dsm499752pla.295.2023.12.07.18.33.41 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 07 Dec 2023 18:33:42 -0800 (PST) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][kirkstone 05/15] linux-yocto/5.10: update to v5.10.198 Date: Thu, 7 Dec 2023 16:33:11 -1000 Message-Id: <2c379dc34820b80f3f4132437737f0e4d601e36a.1702002667.git.steve@sakoman.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 08 Dec 2023 02:33:49 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/191997 From: Bruce Ashfield Updating to the latest korg -stable release that comprises the following commits: a8d812240fdd Linux 5.10.198 660627c71bc1 xen/events: replace evtchn_rwlock with RCU 1e3d016a9506 mmc: renesas_sdhi: only reset SCC when its pointer is populated a7d86a77c33b netfilter: nftables: exthdr: fix 4-byte stack OOB write 84f6b686df2d netfilter: nf_tables: fix kdoc warnings after gc rework c17446c00805 parisc: Restore __ldcw_align for PA-RISC 2.0 processors cfc333393ae6 RDMA/mlx5: Fix NULL string error 0d520cdb0cd0 RDMA/siw: Fix connection failure handling 5a4a6a47e074 RDMA/uverbs: Fix typo of sizeof argument 626868282c36 RDMA/cma: Fix truncation compilation warning in make_cma_ports 7de0e42444e9 RDMA/cma: Initialize ib_sa_multicast structure to 0 when join 36953b4da78b gpio: pxa: disable pinctrl calls for MMP_GPIO 6ad972e66870 gpio: aspeed: fix the GPIO number passed to pinctrl_gpio_set_config() d7d8f1a679ec IB/mlx4: Fix the size of a buffer in add_port_entries() 204c2d485f86 of: dynamic: Fix potential memory leak in of_changeset_action() b74f12f98b7f RDMA/core: Require admin capabilities to set system parameters ccd87fe7a0f6 dm zoned: free dmz->ddev array in dmz_put_zoned_devices 82d87c944ea8 cpupower: add Makefile dependencies for install targets 492241613cf4 sctp: update hb timer immediately after users change hb_interval f87658493898 sctp: update transport state when processing a dupcook packet ff346b01eba5 tcp: fix delayed ACKs for MSS boundary condition 677aaa261e7a tcp: fix quick-ack counting to count actual ACKs of new data 6a24d0661fa3 tipc: fix a potential deadlock on &tx->lock b9f1568ba37f net: stmmac: dwmac-stm32: fix resume on STM32 MCU 3a5142f01758 netfilter: nf_tables: nft_set_rbtree: fix spurious insertion failure 0ba9348532bd netfilter: handle the connecting collision properly in nf_conntrack_proto_sctp b212f361a5d1 net: ethernet: ti: am65-cpsw: Fix error code in am65_cpsw_nuss_init_tx_chns() dba849cc9811 net: nfc: llcp: Add lock when modifying device list 30bc4d7aebe3 net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg d44346dda7d4 net: dsa: mv88e6xxx: Avoid EEPROM timeout when EEPROM is absent 96b2e1090397 ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data() 2ea52a2fb8e8 net: fix possible store tearing in neigh_periodic_work() 6e3d9e5caba8 modpost: add missing else to the "of" check 225cd4f67bd4 NFSv4: Fix a nfs4_state_manager() race d8f2ba9ec358 ima: rework CONFIG_IMA dependency block 77f82df960cb scsi: target: core: Fix deadlock due to recursive locking a9430129d8db ima: Finish deprecation of IMA_TRUSTED_KEYRING Kconfig 725fd2080559 regmap: rbtree: Fix wrong register marked as in-cache when creating new node 666cdc43df24 wifi: mt76: mt76x02: fix MT76x0 external LNA gain handling 54a4faab2baa drivers/net: process the result of hdlc_open() and add call of hdlc_close() in uhdlc_close() 93dd471d3a2f bpf: Fix tr dereferencing 10a18c8bac7f wifi: mwifiex: Fix oob check condition in mwifiex_process_rx_packet 8c15c1bcc5b5 wifi: iwlwifi: dbg_ini: fix structure packing a5f643ab1163 ubi: Refuse attaching if mtd's erasesize is 0 33420a82067b arm64: Add Cortex-A520 CPU part definition 81d03e251894 net: prevent rewrite of msg_name in sock_sendmsg() 72fc02ebfc93 net: replace calls to sock->ops->connect() with kernel_connect() 1aeff207e295 wifi: mwifiex: Fix tlv_buf_left calculation f6f25930fa34 qed/red_ll2: Fix undefined behavior bug in struct qed_ll2_info b9c4b3ca9016 scsi: zfcp: Fix a double put in zfcp_port_enqueue() 04b6b67a3e77 Revert "PCI: qcom: Disable write access to read only registers for IP v2.3.3" c2cf152e8bb8 Revert "clk: imx: pll14xx: dynamically configure PLL for 393216000/361267200Hz" f94471c0cc31 block: fix use-after-free of q->q_usage_counter 0d6987d4a34c rbd: take header_rwsem in rbd_dev_refresh() only when updating d3d170c5fc06 rbd: decouple parent info read-in from updating rbd_dev 3ceb306f9b2d rbd: decouple header read-in from updating rbd_dev->header 7c4f11d73b24 rbd: move rbd_dev_refresh() definition d0952ce316d1 drm/mediatek: Fix backport issue in mtk_drm_gem_prime_vmap() c33d75a57a81 ring-buffer: Fix bytes info in per_cpu buffer stats 0ecde7dd766f ring-buffer: remove obsolete comment for free_buffer_page() 2ad1a1d3d616 NFSv4: Fix a state manager thread deadlock regression ec4325e80633 NFS: rename nfs_client_kset to nfs_kset 598539f38c72 NFS: Cleanup unused rpc_clnt variable 19f3d5d13b75 spi: zynqmp-gqspi: fix clock imbalance on probe failure 2cdec9c13f81 spi: spi-zynqmp-gqspi: Fix runtime PM imbalance in zynqmp_qspi_probe ae03dafc3761 fs: binfmt_elf_efpic: fix personality for ELF-FDPIC 8ec1abb59a98 ata: libata-sata: increase PMP SRST timeout to 10s dc0bd0f2da5c ata: libata-core: Do not register PM operations for SAS ports 531d9f6dbfd5 ata: libata-core: Fix port and device removal 99d308c31923 ata: libata-core: Fix ata_port_request_pm() locking eaf449666221 net: thunderbolt: Fix TCPv6 GSO checksum calculation 72595dbfcae3 bpf: Fix BTF_ID symbol generation collision in tools/ 6a80578bd441 bpf: Fix BTF_ID symbol generation collision cbbfdb4bab70 btrfs: properly report 0 avail for very full file systems ef47f25e98de ring-buffer: Update "shortest_full" in polling b7a0df4c0877 proc: nommu: /proc//maps: release mmap read lock acc7fc82d0ad Revert "SUNRPC dont update timeout value on connection reset" e3b8c9e0fc3c i2c: i801: unregister tco_pdev in i801_probe() error path b664e9db8d2c ata: libata-scsi: ignore reserved bits for REPORT SUPPORTED OPERATION CODES 25872c67de20 ALSA: hda: Disable power save for solving pop issue on Lenovo ThinkCentre M70q 5a03b42ae1ed netfilter: nf_tables: disallow rule removal from chain binding 7130a87ca323 nilfs2: fix potential use after free in nilfs_gccache_submit_read_data() e14afa4450cb serial: 8250_port: Check IRQ data before use 6d5c8862932d Revert "tty: n_gsm: fix UAF in gsm_cleanup_mux" 14443223e08c Smack:- Use overlay inode label in smack_inode_copy_up() 297c51c63fe1 smack: Retrieve transmuting information in smack_inode_getsecurity() 41de7a6b95df smack: Record transmuting in smk_transmuted 831f18c735e2 nvme-pci: always return an ERR_PTR from nvme_pci_alloc_dev fb28f89d50c0 netfilter: nft_exthdr: Fix for unsafe packet data read e18216cd0ec7 netfilter: nft_exthdr: Search chunks in SCTP packets only 152b8ac839c9 watchdog: iTCO_wdt: Set NO_REBOOT if the watchdog is not already running 13b7d49f339a watchdog: iTCO_wdt: No need to stop the timer in probe 0d599a3f57a5 nvme-pci: do not set the NUMA node of device if it has none 97e148dcb97d nvme-pci: factor out a nvme_pci_alloc_dev helper 71357c751fb2 nvme-pci: factor the iod mempool creation into a helper 38f82cf86096 ACPI: Check StorageD3Enable _DSD property in ACPI code 67025d565450 cgroup: Fix suspicious rcu_dereference_check() usage warning b2788f6d4924 sched/cpuacct: Optimize away RCU read lock 82756d8a2394 sched/cpuacct: Fix charge percpu cpuusage f8e8e72c58c7 sched/cpuacct: Fix user/system in shown cpuacct.usage* ef3c728ca0d4 perf build: Define YYNOMEM as YYNOABORT for bison < 3.81 da91481c5d2b fbdev/sh7760fb: Depend on FB=y ffc459a93065 ncsi: Propagate carrier gain/loss events to the NCSI controller 8c2500228b8f powerpc/watchpoints: Disable preemption in thread_change_pc() f5bdbed0361c media: vb2: frame_vector.c: replace WARN_ONCE with a comment ebc91848062e bpf: Clarify error expectations from bpf_clone_redirect 0118244848a5 spi: nxp-fspi: reset the FLSHxCR1 registers f6cf19c1b313 ata: libata-eh: do not clear ATA_PFLAG_EH_PENDING in ata_eh_reset() 2afd8fcee0c4 scsi: pm80xx: Avoid leaking tags when processing OPC_INB_SET_CONTROLLER_CONFIG command 0decc581e1dc scsi: pm80xx: Use phy-specific SAS address when sending PHY_START command f44e66447c4f platform/mellanox: mlxbf-bootctl: add NET dependency into Kconfig cee5151c5410 ring-buffer: Do not attempt to read past "commit" 2956e33fb4f8 selftests: fix dependency checker script 9ccce21bd77b ring-buffer: Avoid softlockup in ring_buffer_resize() 5dfcb92905b3 selftests/ftrace: Correctly enable event in instance-event.tc 38ef4b2e4dca scsi: qedf: Add synchronization between I/O completions and abort 2081b2a15b08 parisc: irq: Make irq_stack_union static to avoid sparse warning f47efdffdc13 parisc: drivers: Fix sparse warning d967a9472bf9 parisc: iosapic.c: Fix sparse warnings 7b2440c2d64f parisc: sba: Fix compile warning wrt list of SBA devices c79300599923 dma-debug: don't call __dma_entry_alloc_check_leak() under free_entries_lock 061f40275338 i2c: npcm7xx: Fix callback completion ordering dd81e91b2efc gpio: pmic-eic-sprd: Add can_sleep flag for PMIC EIC chip b317f69871ef xtensa: boot/lib: fix function prototypes be17dfdcc87a xtensa: boot: don't add include-dirs a10bfbe599b7 xtensa: iss/network: make functions static 608af5511a8f xtensa: add default definition for XCHAL_HAVE_DIV32 3696261859c5 power: supply: ucs1002: fix error code in ucs1002_get_property() eff55feb8b87 bus: ti-sysc: Fix SYSC_QUIRK_SWSUP_SIDLE_ACT handling for uart wake-up 1bc88671960f ARM: dts: ti: omap: motorola-mapphone: Fix abe_clkctrl warning on boot a2a592adad7c ARM: dts: Unify pwm-omap-dmtimer node names 2d9c9589da6a ARM: dts: am335x: Guardian: Update beeper label ef83f35ced40 ARM: dts: motorola-mapphone: Drop second ti,wlcore compatible value 12a28c379ef8 ARM: dts: motorola-mapphone: Add 1.2GHz OPP afdc40a74ae3 ARM: dts: motorola-mapphone: Configure lower temperature passive cooling 093a9a02d4d5 ARM: dts: ti: omap: Fix bandgap thermal cells addressing for omap3/4 28e5423ad8fb ARM: dts: omap: correct indentation 50789f37239c clk: tegra: fix error return case for recalc_rate 0fd5839e2504 bus: ti-sysc: Fix missing AM35xx SoC matching 1d4d846e2a49 bus: ti-sysc: Use fsleep() instead of usleep_range() in sysc_reset() a8ee76d72737 MIPS: Alchemy: only build mmc support helpers if au1xmmc is enabled d678c078f302 btrfs: reset destination buffer when read_extent_buffer() gets invalid range a1f85bc9bc69 ata: ahci: Add Elkhart Lake AHCI controller 51d190cc98de ata: ahci: Rename board_ahci_mobile 8061c399c83b ata: ahci: Add support for AMD A85 FCH (Hudson D4) 0156cce71f8e ata: libata: Rename link flag ATA_LFLAG_NO_DB_DELAY 9f0d34663025 netfilter: nft_exthdr: Fix non-linear header modification ed60b8014c9a netfilter: exthdr: add support for tcp option removal 10670abe1115 netfilter: nft_exthdr: break evaluation if setting TCP option fails 45b3eb6afcff netfilter: nf_tables: add and use nft_thoff helper 39546418b84d netfilter: nf_tables: add and use nft_sk helper af844ba799b5 netfilter: nft_exthdr: Support SCTP chunks 858ca1921639 netfilter: use actual socket sk for REJECT action 2d9ea86f3c4a media: venus: hfi_venus: Write to VIDC_CTRL_INIT after unmasking interrupts c4cc1f690f19 media: venus: hfi: Add a 6xx boot logic 4596fece3c24 media: venus: core: Add differentiator IS_V6(core) 3ed9d3dc244b media: venus: hfi: Define additional 6xx registers ebccb53232cc media: venus: hfi,pm,firmware: Convert to block relative addressing 4ccdeb68da0c media: venus: core: Add io base variables for each block 6d3745bbc334 mmc: renesas_sdhi: register irqs before registering controller 995ef65e4b5c mmc: tmio: support custom irq masks 97eb045386de mmc: renesas_sdhi: populate SCC pointer at the proper place 7217ceb61a47 mmc: renesas_sdhi: probe into TMIO after SCC parameters have been setup e492f8125133 Input: i8042 - add quirk for TUXEDO Gemini 17 Gen1/Clevo PD70PN 677bff659fd3 Input: i8042 - rename i8042-x86ia64io.h to i8042-acpipnpio.h 3fac8ce48fa9 netfilter: nf_tables: double hook unregistration in netns path e51f30826bc5 netfilter: nf_tables: unregister flowtable hooks on netns exit 5e95c88e9061 i2c: mux: demux-pinctrl: check the return value of devm_kstrdup() 0a78bcc2d526 gpio: tb10x: Fix an error handling path in tb10x_gpio_probe() f515112e8337 net: rds: Fix possible NULL-pointer dereference 466e88548e19 bnxt_en: Flush XDP for bnxt_poll_nitroa0()'s NAPI 78106529b390 locking/seqlock: Do the lockdep annotation before locking in do_write_seqcount_begin_nested() a8dd21118b0f seqlock: Prefix internal seqcount_t-only macros with a "do_" ac01a0dd7905 seqlock: Rename __seqprop() users a8460ee6c80b seqlock: avoid -Wshadow warnings f1893feb20ea netfilter: ipset: Fix race between IPSET_CMD_CREATE and IPSET_CMD_SWAP b44dd92e2afd team: fix null-ptr-deref when team device type is changed 04cc361f029c net: bridge: use DEV_STATS_INC() 1671dc1b25e5 net: hns3: add 5ms delay before clear firmware reset irq source 309af4a39b8e net: hns3: only enable unicast promisc when mac table full ae806c74c063 x86/srso: Fix SBPB enablement for spec_rstack_overflow=off 423ba1b3a5a7 x86/srso: Fix srso_show_state() side effect 1ec40ef6f765 platform/x86: intel_scu_ipc: Fail IPC send if still busy 4c5eaf6d8bb4 platform/x86: intel_scu_ipc: Don't override scu in intel_scu_ipc_dev_simple_command() 441b61d742ef platform/x86: intel_scu_ipc: Check status upon timeout in ipc_wait_for_interrupt() c463898b6e72 platform/x86: intel_scu_ipc: Check status after timeout in busy_loop() 60d73c62e3e4 dccp: fix dccp_v4_err()/dccp_v6_err() again 09a1c790e1b9 powerpc/perf/hv-24x7: Update domain value check 8689c9ace976 ipv4: fix null-deref in ipv4_link_failure 47907ebeb77a i40e: Fix VF VLAN offloading when port VLAN is configured a91861446f1c ASoC: imx-audmix: Fix return error with devm_clk_get() c4ecedf980b0 selftests: tls: swap the TX and RX sockets in some tests 78ef69b6e770 selftests/tls: Add {} to avoid static checker warning 388c9d3eefae bpf: Avoid deadlock when using queue and stack maps from NMI 6dc85d848c26 netfilter: nf_tables: disallow element removal on anonymous sets a45632f99713 ASoC: meson: spdifin: start hw on dai probe 09c85f2d21ab netfilter: nf_tables: fix memleak when more than 255 elements expired 4deaf1316b42 netfilter: nft_set_hash: try later when GC hits EAGAIN on iteration 26d0e4d632f8 netfilter: nft_set_pipapo: stop GC iteration if GC transaction allocation fails b796c4e4bf29 netfilter: nft_set_rbtree: use read spinlock to avoid datapath contention c323ed65f66e netfilter: nft_set_rbtree: skip sync GC for new elements in this transaction 09f2dda1e576 netfilter: nf_tables: defer gc run if previous batch is still pending b71dcee2fc9c netfilter: nf_tables: use correct lock to protect gc_list 23292bdfda5f netfilter: nf_tables: GC transaction race with abort path dc0b1f019554 netfilter: nf_tables: GC transaction race with netns dismantle 4046f2b56e5a netfilter: nf_tables: fix GC transaction races with netns and netlink event exit path 891ca5dfe3b7 netfilter: nf_tables: don't fail inserts if duplicate has expired 911dd3cdf108 netfilter: nf_tables: remove busy mark and gc batch API 77046cb00850 netfilter: nft_set_hash: mark set element as dead when deleting from packet path 146c76866795 netfilter: nf_tables: adapt set backend to use GC transaction API 448be0774882 netfilter: nf_tables: GC transaction API to avoid race with control plane b15ea4017af8 netfilter: nf_tables: don't skip expired elements during walk f8bf7706151a netfilter: nf_tables: integrate pipapo into commit protocol 9b65bff30a61 tracing: Have event inject files inc the trace array ref count f8a86ab3c4a4 ext4: do not let fstrim block system suspend c502b09d9bef ext4: move setting of trimmed bit into ext4_try_to_trim_range() e78e9f08a24e ext4: replace the traditional ternary conditional operator with with max()/min() cbf6a0f65404 ext4: mark group as trimmed only if it was fully scanned 5eaf4a1e06cf ext4: change s_last_trim_minblks type to unsigned long 24a86315a353 ext4: scope ret locally in ext4_try_to_trim_range() da1895f731f3 ext4: add new helper interface ext4_try_to_trim_range() 6f5fc957dfb7 ext4: remove the 'group' parameter of ext4_trim_extent 69c966583022 ata: libahci: clear pending interrupt status 11d15a115c90 ata: ahci: Drop pointless VPRINTK() calls and convert the remaining ones 407bf1c140f0 tracing: Increase trace array ref count on enable and filter files 3f7df02fa0d4 SUNRPC: Mark the cred for revalidation if the server rejects it 25ae2b2fdb12 NFS/pNFS: Report EINVAL errors from connect() to the server 26db22a6397b NFS: Use the correct commit info in nfs_join_page_group() Signed-off-by: Bruce Ashfield Signed-off-by: Steve Sakoman --- .../linux/linux-yocto-rt_5.10.bb | 6 ++--- .../linux/linux-yocto-tiny_5.10.bb | 8 +++---- meta/recipes-kernel/linux/linux-yocto_5.10.bb | 24 +++++++++---------- 3 files changed, 19 insertions(+), 19 deletions(-) diff --git a/meta/recipes-kernel/linux/linux-yocto-rt_5.10.bb b/meta/recipes-kernel/linux/linux-yocto-rt_5.10.bb index b61c0a98c9..ea27d58ed7 100644 --- a/meta/recipes-kernel/linux/linux-yocto-rt_5.10.bb +++ b/meta/recipes-kernel/linux/linux-yocto-rt_5.10.bb @@ -11,13 +11,13 @@ python () { raise bb.parse.SkipRecipe("Set PREFERRED_PROVIDER_virtual/kernel to linux-yocto-rt to enable it") } -SRCREV_machine ?= "361bd6dc8f750afb690d28fd9aab33d116b38f68" -SRCREV_meta ?= "080adc96faafd98d2370b009338fcad42cf8e5fd" +SRCREV_machine ?= "2da7024055c1fb827608ef2529c22356612f6ddd" +SRCREV_meta ?= "d787ac6931e013c185858482f491f8bfa9fa5177" SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;branch=${KBRANCH};name=machine \ git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-5.10;destsuffix=${KMETA}" -LINUX_VERSION ?= "5.10.197" +LINUX_VERSION ?= "5.10.198" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" diff --git a/meta/recipes-kernel/linux/linux-yocto-tiny_5.10.bb b/meta/recipes-kernel/linux/linux-yocto-tiny_5.10.bb index 6e98407a7b..7de15b3427 100644 --- a/meta/recipes-kernel/linux/linux-yocto-tiny_5.10.bb +++ b/meta/recipes-kernel/linux/linux-yocto-tiny_5.10.bb @@ -6,7 +6,7 @@ KCONFIG_MODE = "--allnoconfig" require recipes-kernel/linux/linux-yocto.inc -LINUX_VERSION ?= "5.10.197" +LINUX_VERSION ?= "5.10.198" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}" @@ -15,9 +15,9 @@ DEPENDS += "openssl-native util-linux-native" KMETA = "kernel-meta" KCONF_BSP_AUDIT_LEVEL = "2" -SRCREV_machine:qemuarm ?= "c27508f48245090385d55b192f866b6ad60a79f7" -SRCREV_machine ?= "3050ddb1d59017a62d3d7d589a11d168be86b6a3" -SRCREV_meta ?= "080adc96faafd98d2370b009338fcad42cf8e5fd" +SRCREV_machine:qemuarm ?= "0456488add9cb4b7d3cd462829c9dc7565bd129e" +SRCREV_machine ?= "a1c6b99d88f23dcdaeb66e932239e43b4ffb44f0" +SRCREV_meta ?= "d787ac6931e013c185858482f491f8bfa9fa5177" PV = "${LINUX_VERSION}+git${SRCPV}" diff --git a/meta/recipes-kernel/linux/linux-yocto_5.10.bb b/meta/recipes-kernel/linux/linux-yocto_5.10.bb index adb4aa69a0..764b2ae52b 100644 --- a/meta/recipes-kernel/linux/linux-yocto_5.10.bb +++ b/meta/recipes-kernel/linux/linux-yocto_5.10.bb @@ -14,23 +14,23 @@ KBRANCH:qemux86 ?= "v5.10/standard/base" KBRANCH:qemux86-64 ?= "v5.10/standard/base" KBRANCH:qemumips64 ?= "v5.10/standard/mti-malta64" -SRCREV_machine:qemuarm ?= "28db2d5b2451e2c6b055dcd65bbe2fa581fa1538" -SRCREV_machine:qemuarm64 ?= "3f6544c8ee1330484b5c341dcac662ef73836a0e" -SRCREV_machine:qemumips ?= "7643ee350375086f23ddffbe1613150ce988dce5" -SRCREV_machine:qemuppc ?= "9320f948b72a073ab0c27f0ca884842bb8eed036" -SRCREV_machine:qemuriscv64 ?= "4eedb5d32121ace6ad137e7d01b22f94c592923e" -SRCREV_machine:qemuriscv32 ?= "4eedb5d32121ace6ad137e7d01b22f94c592923e" -SRCREV_machine:qemux86 ?= "4eedb5d32121ace6ad137e7d01b22f94c592923e" -SRCREV_machine:qemux86-64 ?= "4eedb5d32121ace6ad137e7d01b22f94c592923e" -SRCREV_machine:qemumips64 ?= "a3f4193c0ed91cbcfaed2e6cc984eb4906e511e0" -SRCREV_machine ?= "4eedb5d32121ace6ad137e7d01b22f94c592923e" -SRCREV_meta ?= "080adc96faafd98d2370b009338fcad42cf8e5fd" +SRCREV_machine:qemuarm ?= "55637625329cf574d8e33c94e58562d418d9a342" +SRCREV_machine:qemuarm64 ?= "259c25670564324f7098c7f5e5fd136e0d708216" +SRCREV_machine:qemumips ?= "8333009219a39ea271fe238a482423bfa4738703" +SRCREV_machine:qemuppc ?= "bd719802d7bca16c82af1cb31e3dc254cf8992b8" +SRCREV_machine:qemuriscv64 ?= "5601201f60a8abb5bbb54da99da2a38bfb7a46dd" +SRCREV_machine:qemuriscv32 ?= "5601201f60a8abb5bbb54da99da2a38bfb7a46dd" +SRCREV_machine:qemux86 ?= "5601201f60a8abb5bbb54da99da2a38bfb7a46dd" +SRCREV_machine:qemux86-64 ?= "5601201f60a8abb5bbb54da99da2a38bfb7a46dd" +SRCREV_machine:qemumips64 ?= "f3dfd049230bbbf54854c21f5b85b8b52e2b2f65" +SRCREV_machine ?= "5601201f60a8abb5bbb54da99da2a38bfb7a46dd" +SRCREV_meta ?= "d787ac6931e013c185858482f491f8bfa9fa5177" SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;name=machine;branch=${KBRANCH}; \ git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-5.10;destsuffix=${KMETA}" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" -LINUX_VERSION ?= "5.10.197" +LINUX_VERSION ?= "5.10.198" DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}" DEPENDS += "openssl-native util-linux-native" From patchwork Fri Dec 8 02:33:12 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 35909 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id A6BA6C10F07 for ; Fri, 8 Dec 2023 02:33:49 +0000 (UTC) Received: from mail-pl1-f175.google.com (mail-pl1-f175.google.com [209.85.214.175]) by mx.groups.io with SMTP id smtpd.web11.11232.1702002826009457147 for ; Thu, 07 Dec 2023 18:33:46 -0800 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20230601.gappssmtp.com header.s=20230601 header.b=l5hY1msY; spf=softfail (domain: sakoman.com, ip: 209.85.214.175, mailfrom: steve@sakoman.com) Received: by mail-pl1-f175.google.com with SMTP id d9443c01a7336-1d04c097e34so13402765ad.0 for ; Thu, 07 Dec 2023 18:33:45 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20230601.gappssmtp.com; s=20230601; t=1702002825; x=1702607625; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=Zq2xcpQkRJ9DaJ8YVAaEOzKQpfKtKP6O9Nx/pGcG/x8=; b=l5hY1msYiB55M0tP4QZQyKL/L9d9VQImswYKXIg3E95/LkgULtn59JBjrKKcUzonwZ tNysxz7ZhyrZeI9cisosQE197/7+DehGKfaLrtTd2bMagBSikAKJwQdyZ8BKPLOPWtl1 MR88MW9ml/TUpA2BE8ZferkzeyjHRlfoEycr/9lCErqJkYIhmz/WMHQ6RCWw9wppnyU2 n4dVo4HnscP8WwlhcSwPuNX3NB+GIk9akOEIGcF0Dc86CdI/M08DcywroI5XlODd32Cs AhUpXuqBF63uIOnPOaw+0ZeX+BNkw8xdOq1rhKw6CVb6moPAtU3YJJ+tH6lfpPgiXAoK blIQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1702002825; x=1702607625; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=Zq2xcpQkRJ9DaJ8YVAaEOzKQpfKtKP6O9Nx/pGcG/x8=; b=iTlw/7W6Mmqs63ZhHyA/o68clAnrUCviJrQplK5rxWyZ4KENK36KptfXm2VicLFsWb CugAjY0wrw9FqRO+YLA4nsahAfk9T+Dk4C9n5mX15B6ptPGlQWwd0CYUHv3TOU7R2oMZ oz+lMllW6YyvqktDl8ZkdQ4CX1nJb8eZhd6706pRYJIUTXSuM25ZZR95pjo6oy8Unk0W 3hemsbawLJRJRK153j3mOgFfN7Bt3S55llhlvv3ixoCg64nlbwkwCQqfFqKz6cYCLYwH DmdAUHWw/Xp8gArPq3FKp5/MPdWBAMbtSOgZIVbYXjJA1FaTz6GW9DwFMEYcDnB/RezV NL0g== X-Gm-Message-State: AOJu0YwvLBb8OTqAr8vwpkk4BU5PRJGrkaRV4ZSqBhQ4mBGD02bQYq3R LOeXAcia5Et31Yy6G6qpDX7dPvEVY7gqhvQjynI= X-Google-Smtp-Source: AGHT+IHYZoedMIVZIk5BB48yR6F6Ba/QEDdy52OtryIEEcTTriK4F3RhEGGDH/Dl0xn8tuLz5tW/cw== X-Received: by 2002:a17:903:230e:b0:1d0:874a:5f98 with SMTP id d14-20020a170903230e00b001d0874a5f98mr309188plh.24.1702002824729; Thu, 07 Dec 2023 18:33:44 -0800 (PST) Received: from hexa.lan (dhcp-72-234-108-41.hawaiiantel.net. [72.234.108.41]) by smtp.gmail.com with ESMTPSA id i11-20020a170902c94b00b001c9bc811d4dsm499752pla.295.2023.12.07.18.33.43 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 07 Dec 2023 18:33:44 -0800 (PST) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][kirkstone 06/15] linux-yocto/5.10: update to v5.10.200 Date: Thu, 7 Dec 2023 16:33:12 -1000 Message-Id: <630963a1396afa8c1550ec971d50e444f5ccbcfd.1702002667.git.steve@sakoman.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 08 Dec 2023 02:33:49 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/191998 From: Bruce Ashfield Updating to the latest korg -stable release that comprises the following commits: 3e55583405ac Linux 5.10.200 a5feaf765935 ALSA: hda: intel-dsp-config: Fix JSL Chromebook quirk detection 9109649559f9 tty: 8250: Add support for Intashield IS-100 73bcb4d44988 tty: 8250: Add support for Brainboxes UP cards 119f38e8ca16 tty: 8250: Add support for additional Brainboxes UC cards a8bf6f62187f tty: 8250: Remove UC-257 and UC-431 e705aee2a657 usb: raw-gadget: properly handle interrupted requests 8e0324f2cbb7 usb: storage: set 1.50 as the lower bcdDevice for older "Super Top" compatibility 747b8f877998 PCI: Prevent xHCI driver from claiming AMD VanGogh USB3 DRD device deddf60c271f can: isotp: isotp_sendmsg(): fix TX state detection and wait behavior 8716c28f695c can: isotp: isotp_bind(): do not validate unused address information e4c4e0e1b29c can: isotp: add local echo tx processing and tx without FC 569c95b7ece0 can: isotp: handle wait_event_interruptible() return values de3c02383aa6 can: isotp: check CAN address family in isotp_bind() 0386f3704789 can: isotp: isotp_bind(): return -EINVAL on incorrect CAN ID formatting 93b1e3f3a263 can: isotp: set max PDU size to 64 kByte 7adbc048d84b can: isotp: Add error message if txqueuelen is too small 57798a2cfe15 can: isotp: add symbolic error message to isotp_module_init() 186ab5645199 can: isotp: change error format from decimal to symbolic error names b881ce6c7d10 powerpc/mm: Fix boot crash with FLATMEM 1b285a1bfb0d net: chelsio: cxgb4: add an error code check in t4_load_phy_fw 955a1105eec2 platform/mellanox: mlxbf-tmfifo: Fix a warning message 268ec38b797b scsi: mpt3sas: Fix in error path abf9c7811836 fbdev: uvesafb: Call cn_del_callback() at the end of uvesafb_exit() ec45886637ee ASoC: rt5650: fix the wrong result of key button c683d8b6417c netfilter: nfnetlink_log: silence bogus compiler warning 66cc633fc6e1 spi: npcm-fiu: Fix UMA reads when dummy.nbytes == 0 6f9093b6f8f7 fbdev: atyfb: only use ioremap_uc() on i386 and ia64 ead3c123a753 Input: synaptics-rmi4 - handle reset delay when using SMBus trsnsport fb8f253b9532 dmaengine: ste_dma40: Fix PM disable depth imbalance in d40_probe e619b38a873f irqchip/stm32-exti: add missing DT IRQ flag translation d151fb801957 net: sched: cls_u32: Fix allocation size in u32_init() 9ade01b2949b x86: Fix .brk attribute in linker script 3fdd5b2bb09f rpmsg: Fix possible refcount leak in rpmsg_register_device_override() 41c13a571de4 rpmsg: glink: Release driver_override 5f1bb9f4d4b5 rpmsg: Fix calling device_lock() on non-initialized device 5bbd3469a4b6 rpmsg: Fix kfree() of static memory on setting driver_override d0208fb38f43 rpmsg: Constify local variable in field store macro da369d3996cc driver: platform: Add helper for safer setting of driver_override 4a20f5ea62db objtool/x86: add missing embedded_insn check 6b977a7323f7 ext4: avoid overlapping preallocations due to overflow 58fe961c606c ext4: fix BUG in ext4_mb_new_inode_pa() due to overflow c0db17e55ff6 ext4: add two helper functions extent_logical_end() and pa_logical_end() c761d34a7ec0 x86/mm: Fix RESERVE_BRK() for older binutils 01a5e17e3ef3 x86/mm: Simplify RESERVE_BRK() 571ce7d944cd f2fs: fix to do sanity check on inode type during garbage collection d1c37e849f37 smbdirect: missing rc checks while waiting for rdma events b2e62728b106 kobject: Fix slab-out-of-bounds in fill_kobj_path() b9b197f65904 x86/i8259: Skip probing when ACPI/MADT advertises PCAT compatibility 62184eb77821 iio: adc: xilinx-xadc: Don't clobber preset voltage/temperature thresholds e96eb8853f33 iio: adc: xilinx: use more devres helpers and remove remove() 0eb1198fe4d6 iio: adc: xilinx: use devm_krealloc() instead of kfree() + kcalloc() c4b496c9f772 iio: adc: xilinx: use helper variable for &pdev->dev d8928befffe5 clk: Sanitize possible_parent_show to Handle Return Value of of_clk_get_parent_name 09ce0d85cc00 sparc32: fix a braino in fault handling in csum_and_copy_..._user() 0258ca32b0ea perf/core: Fix potential NULL deref 4e3c606afa25 nvmem: imx: correct nregs for i.MX6UL 37ccf15ebeec nvmem: imx: correct nregs for i.MX6SLL 7a1c29e93c25 nvmem: imx: correct nregs for i.MX6ULL d44166341f4b misc: fastrpc: Clean buffers on remote invocation failures 866838eb8ee9 tracing/kprobes: Fix the description of variable length arguments ca764116b5c1 i2c: aspeed: Fix i2c bus hang in slave read 18c5167d0460 i2c: stm32f7: Fix PEC handling in case of SMBUS transfers 80416f6ba002 i2c: muxes: i2c-demux-pinctrl: Use of_get_i2c_adapter_by_node() 9a9ead53e72f i2c: muxes: i2c-mux-gpmux: Use of_get_i2c_adapter_by_node() 3cb69f1dbc86 i2c: muxes: i2c-mux-pinctrl: Use of_get_i2c_adapter_by_node() 0c8587fec9d5 iio: exynos-adc: request second interupt only when touchscreen mode is used 632c2199e52d kasan: print the original fault addr when access invalid shadow be9e6f51ba7b i40e: Fix wrong check for I40E_TXR_FLAGS_WB_ON_ITR fe65fc90e9f2 gtp: fix fragmentation needed check with gso 3ae8b75fce05 gtp: uapi: fix GTPA_MAX 4d0d5e54b590 tcp: fix wrong RTO timeout when received SACK reneging e0308c793943 r8152: Release firmware if we have an error in probe 17b455747bc6 r8152: Cancel hw_phy_work if we have an error in probe 7dc907d855df r8152: Run the unload routine if we have errors during probe 704c25fc6abd r8152: Increase USB control msg timeout to 5000ms as per spec 79e2610efc94 net: usb: smsc95xx: Fix uninit-value access in smsc95xx_read_reg d9864e589f0e net: ieee802154: adf7242: Fix some potential buffer overflow in adf7242_stats_show() 634c72adc864 igc: Fix ambiguity in the ethtool advertising 1e628189a21b neighbour: fix various data-races 77c4f14f952e igb: Fix potential memory leak in igb_add_ethtool_nfc_entry 1ac4f8e5553c treewide: Spelling fix in comment 5eab293b1cbf r8169: fix the KCSAN reported data race in rtl_rx while reading desc->opts1 13d357d9f226 r8169: fix the KCSAN reported data-race in rtl_tx while reading TxDescArray[entry].opts1 31c31a78dccf drm/dp_mst: Fix NULL deref in get_mst_branch_device_by_guid_helper() 957ec0823a5a mmc: renesas_sdhi: use custom mask for TMIO_MASK_ALL 3ab81820bf92 mm/page_alloc: correct start page when guard page debug is enabled f2c0b571a5fc virtio-mmio: fix memory leak of vm_dev 8b857a93d6be virtio_balloon: Fix endless deflation and inflation on arm64 c88dd2aebf0c mcb-lpc: Reallocate memory region to avoid memory overlapping 6976459c6439 mcb: Return actual parsed size when reading chameleon table 09bcf9254838 selftests/ftrace: Add new test case which checks non unique symbol cb49f0e441ce Linux 5.10.199 657a3ca8236c xfrm6: fix inet6_dev refcount underflow problem 5d5680755bce Bluetooth: hci_sock: Correctly bounds check and pad HCI_MON_NEW_INDEX name b423509bc99c Bluetooth: hci_sock: fix slab oob read in create_monitor_event 653c808023cd phy: mapphone-mdm6600: Fix pinctrl_pm handling for sleep pins e9c20d3078cc phy: mapphone-mdm6600: Fix runtime PM for remove f42634685ee5 phy: mapphone-mdm6600: Fix runtime disable on probe 05e06fb6a642 ASoC: pxa: fix a memory leak in probe() 7e29dadf265d gpio: vf610: set value before the direction to avoid a glitch 6c3a72d4ae24 platform/x86: asus-wmi: Map 0x2a code, Ignore 0x2b and 0x2c events 8fece0081b64 platform/x86: asus-wmi: Change ASUS_WMI_BRN_DOWN code from 0x20 to 0x2e 3be044840e8e s390/pci: fix iommu bitmap allocation 487a8e24643a perf: Disallow mis-matched inherited group reads 550c70f72a1b USB: serial: option: add Fibocom to DELL custom modem FM101R-GL a39ea926ff6d USB: serial: option: add entry for Sierra EM9191 with new firmware 3fb223086de9 USB: serial: option: add Telit LE910C4-WWX 0x1035 composition d78d3e0d8462 nvme-rdma: do not try to stop unallocated queues 6238faecf88a nvme-pci: add BOGUS_NID for Intel 0a54 device 9efa38fdca2c ACPI: irq: Fix incorrect return value in acpi_register_gsi() 9df654268aec pNFS: Fix a hang in nfs4_evict_inode() c44e09a89ad2 Revert "pinctrl: avoid unsafe code pattern in find_pinctrl()" b26b0b8757c6 mmc: core: Capture correct oemid-bits for eMMC cards f4771efb0683 mmc: core: sdio: hold retuning if sdio in 1-bit mode 2312fb7f3b20 mtd: physmap-core: Restore map_rom fallback 3a141424f8fe mtd: spinand: micron: correct bitmask for ecc status 7682dae0a607 mtd: rawnand: arasan: Ensure program page operations are successful 875d17e4524b mtd: rawnand: marvell: Ensure program page operations are successful 6224890ad0b4 mtd: rawnand: qcom: Unmap the right resource upon probe failure f707bc0a55b7 Bluetooth: hci_event: Fix using memcmp when comparing keys 3b6aa631df0c net/mlx5: Handle fw tracer change ownership event based on MTRC ead8131372af platform/x86: touchscreen_dmi: Add info for the Positivo C4128B fd1271632769 HID: multitouch: Add required quirk for Synaptics 0xcd7e device 4e71ae53f121 btrfs: fix some -Wmaybe-uninitialized warnings in ioctl.c 661b4ce3b54a drm: panel-orientation-quirks: Add quirk for One Mix 2S 5b7cae7c35dd ipv4/fib: send notify when delete source address routes 21f85b026dfe sky2: Make sure there is at least one frag_addr available f06c3a50ef2b regulator/core: Revert "fix kobject release warning and memory leak in regulator_register()" 461341412960 wifi: cfg80211: avoid leaking stack data into trace fde6d84daa0f wifi: mac80211: allow transmitting EAPOL frames with tainted key 8de7f7058314 wifi: cfg80211: Fix 6GHz scan configuration ffb060b136dd Bluetooth: hci_core: Fix build warnings 65f5da6df897 Bluetooth: Avoid redundant authentication 115f2c88fde3 HID: holtek: fix slab-out-of-bounds Write in holtek_kbd_input_event a59636cdd84a tracing: relax trace_event_eval_update() execution with cond_resched() fb60e9c00042 ata: libata-eh: Fix compilation warning in ata_eh_link_report() 22c3641bef9c gpio: timberdale: Fix potential deadlock on &tgpio->lock b4fcf1a0bbd0 overlayfs: set ctime when setting mtime and atime 4b472c25a597 i2c: mux: Avoid potential false error message in i2c_mux_add_adapter 840b912df518 btrfs: initialize start_slot in btrfs_log_prealloc_extents 9801e2798b63 btrfs: return -EUCLEAN for delayed tree ref with a ref count not equals to 1 d69131b48fea ARM: dts: ti: omap: Fix noisy serial with overrun-throttle-ms for mapphone 9ed14f807f4f usb: typec: altmodes/displayport: Signal hpd low when exiting mode f25a13d318b8 usb: typec: altmodes/displayport: Notify drm subsys of hotplug events 2ea6a14e8a55 drm/connector: Add support for out-of-band hotplug notification (v3) 6e55f6a8a498 drm/connector: Add drm_connector_find_by_fwnode() function (v3) 89b1868bab48 drm/connector: Add a fwnode pointer to drm_connector and register with ACPI (v2) 86502f1b63aa drm/connector: Give connector sysfs devices there own device_type cedcbf61dfce drm/amd/display: Don't set dpms_off for seamless boot ebba01fcd562 drm/amd/display: only check available pipe to disable vbios mode. 1ac717000403 serial: 8250_omap: Fix errors with no_console_suspend be300358b55d serial: 8250: omap: Fix imprecise external abort for omap_8250_pm() fc778e9d7995 xhci: track port suspend state correctly in unsuccessful resume cases 1c034c6e224d xhci: decouple usb2 port resume and get_port_status request handling 92088dd88627 xhci: clear usb2 resume related variables in one place. e7abc4b18d1a xhci: rename resume_done to resume_timestamp d44c9285ce35 xhci: move port specific items such as state completions to port structure e2b4de13e5f9 xhci: cleanup xhci_hub_control port references 95b9f1e3927b usb: core: Track SuperSpeed Plus GenXxY d6316f592988 selftests/mm: fix awk usage in charge_reserved_hugetlb.sh and hugetlb_reparenting_test.sh that may cause error 69f40ce372b9 selftests/vm: make charge_reserved_hugetlb.sh work with existing cgroup setting cb868d8857ae ACPI: resource: Skip IRQ override on ASUS ExpertBook B1402CBA 7d0728e7ac04 ACPI: resource: Skip IRQ override on ASUS ExpertBook B1502CBA 3a58c28bff79 ACPI: resource: Skip IRQ override on Asus Expertbook B2402CBA 1b4659e283bc ACPI: resource: Add Asus ExpertBook B2502 to Asus quirks 980dd4dfb9e8 ACPI: resource: Skip IRQ override on Asus Vivobook S5602ZA e0014184cd11 ACPI: resource: Add ASUS model S5402ZA to quirks 7f26f0ac3854 ACPI: resource: Skip IRQ override on Asus Vivobook K3402ZA/K3502ZA ffcb69e923aa ACPI: resources: Add DMI-based legacy IRQ override quirk 8a8918b51080 ACPI: Drop acpi_dev_irqresource_disabled() 196896455bd1 resource: Add irqresource_disabled() faa9a9d07c06 thunderbolt: Workaround an IOMMU fault on certain systems with Intel Maple Ridge 482fa2345f03 net: pktgen: Fix interface flags printing 068e4ecea226 netfilter: nft_set_rbtree: .deactivate fails if element has expired 9cef803e9ed0 neighbor: tracing: Move pin6 inside CONFIG_IPV6=y section 36848adbdeba net/sched: sch_hfsc: upgrade 'rt' to 'sc' when it becomes a inner curve 923e47c0b40a net: dsa: bcm_sf2: Fix possible memory leak in bcm_sf2_mdio_register() a53fc0641683 i40e: prevent crash on probe if hw registers have invalid values 9b5661bda392 net: usb: smsc95xx: Fix an error code in smsc95xx_reset() 250cd610f8c4 ipv4: fib: annotate races around nh->nh_saddr_genid and nh->nh_saddr 1cef1a2d5c22 tun: prevent negative ifindex f828e15db3c7 tcp: tsq: relax tcp_small_queue_check() when rtx queue contains a single skb c39c31c5265b tcp: fix excessive TLP and RACK timeouts from HZ rounding 805b38062e28 net: rfkill: gpio: prevent value glitch during probe 8023c7e90007 net: ipv6: fix return value check in esp_remove_trailer 2ca00d93f2b1 net: ipv4: fix return value check in esp_remove_trailer 4ba4eec4f40d xfrm: interface: use DEV_STATS_INC() 4d78b9dc79d5 xfrm: fix a data-race in xfrm_gen_index() 8c6c3d0b9f2e qed: fix LL2 RX buffer allocation 88c493297e40 drm/i915: Retry gtt fault when out of fence registers e985d78bdcf3 nvmet-tcp: Fix a possible UAF in queue intialization setup 287401f92c57 netfilter: nft_payload: fix wrong mac header matching fe37e56ed47d tcp: check mptcp-level constraints for backlog coalescing 6550cbe25de1 x86/sev: Check for user-space IOIO pointing to kernel space 5bb9ba7dafbe x86/sev: Check IOBM for IOIO exceptions from user-space d78c5d8c23c3 x86/sev: Disable MMIO emulation from user mode 459af3fb81e6 KVM: x86: Mask LVTPC when handling a PMI 4cbac83549dd regmap: fix NULL deref on lookup c95fa5b20fe0 nfc: nci: fix possible NULL pointer dereference in send_acknowledge() 2e64f4c732cb ice: reset first in crash dump kernels 95d68fdc71ba ice: fix over-shifted variable a56c436b4335 Bluetooth: avoid memcmp() out of bounds warning 7e83d15e0ca2 Bluetooth: hci_event: Fix coding style c6878fa1730b Bluetooth: vhci: Fix race when opening vhci device 40a33a129d99 Bluetooth: Fix a refcnt underflow problem for hci_conn ab950561bca4 Bluetooth: Reject connection with the device which has same BD_ADDR 0e025a4528f4 Bluetooth: hci_event: Ignore NULL link key 241f23032433 usb: hub: Guard against accesses to uninitialized BOS descriptors aec24b096300 Documentation: sysctl: align cells in second content column f10690787d2c mm/memory_hotplug: rate limit page migration warnings bf97ea76eac5 lib/Kconfig.debug: do not enable DEBUG_PREEMPT by default c44b14469af0 dev_forward_skb: do not scrub skb mark within the same name space db9aafa19547 ravb: Fix use-after-free issue in ravb_tx_timeout_work() db375fa550c0 RDMA/srp: Fix srp_abort() f022576aa03c RDMA/srp: Set scmnd->result only when scmnd is not NULL 489818719a88 arm64: armv8_deprecated: fix unused-function error da7603cedb7d arm64: armv8_deprecated: rework deprected instruction handling 45a26d2a5394 arm64: armv8_deprecated: move aarch32 helper earlier 0b6a7a9f6d94 arm64: armv8_deprecated move emulation functions 2202536144bc arm64: armv8_deprecated: fold ops into insn_emulation 5aa232345e4d arm64: rework EL0 MRS emulation 15e964971ff7 arm64: factor insn read out of call_undef_hook() 0edde7fd1c3b arm64: factor out EL1 SSBS emulation hook 7a76df1ae1b3 arm64: split EL0/EL1 UNDEF handlers 8a8d4cc303ef arm64: allow kprobes on EL0 handlers 793ed958b62a arm64: rework BTI exception handling 9113333d7c7c arm64: rework FPAC exception handling a8d7c8484ff7 arm64: consistently pass ESR_ELx to die() 004bdab6edc7 arm64: die(): pass 'err' as long 835cb1f78d74 arm64: report EL1 UNDEFs better 6788b10620ca x86/alternatives: Disable KASAN in apply_alternatives() ba4b37721096 powerpc/64e: Fix wrong test in __ptep_test_and_clear_young() dadb86fba67f powerpc/8xx: Fix pte_access_permitted() for PAGE_NONE 288a0593c798 dmaengine: mediatek: Fix deadlock caused by synchronize_irq() 17c653d4913b usb: gadget: ncm: Handle decoding of multiple NTB's in unwrap call a906f2eb675c usb: gadget: udc-xilinx: replace memcpy with memcpy_toio 7decb6515138 counter: microchip-tcb-capture: Fix the use of internal GCLK logic a177771bff63 pinctrl: avoid unsafe code pattern in find_pinctrl() 2a4a82804024 cgroup: Remove duplicates in cgroup v1 tasks file da7ce52a2f6c tee: amdtee: fix use-after-free vulnerability in amdtee_close_session 0ea0231dd1b2 Input: goodix - ensure int GPIO is in input for gpio_count == 1 && gpio_int_idx == 0 case 39fb79407e59 Input: i8042 - add Fujitsu Lifebook E5411 to i8042 quirk table 8d862a3dff7e Input: xpad - add PXN V900 support e8ea649fc35f Input: psmouse - fix fast_reconnect function for PS/2 mode cd2fbfd8b922 Input: powermate - fix use-after-free in powermate_config_complete 27b6c809d393 ceph: fix type promotion bug on 32bit systems 2b2bf63671cc ceph: fix incorrect revoked caps assert in ceph_fill_file_size() 62f6d24f2e7d libceph: use kernel_connect() 5850eb4df422 thunderbolt: Check that lane 1 is in CL0 before enabling lane bonding 008ba1a5ada5 mcb: remove is_added flag from mcb_device struct ec93456c0289 x86/cpu: Fix AMD erratum #1485 on Zen4-based CPUs b608f4aedc0e iio: pressure: ms5611: ms5611_prom_is_valid false negative bug 02388eaf3a15 iio: pressure: dps310: Adjust Timeout Settings 2abd2cffa1b8 iio: pressure: bmp280: Fix NULL pointer exception aadbf612f8b1 usb: musb: Modify the "HWVers" register address bc929a0052c4 usb: musb: Get the musb_qh poniter after musb_giveback 459eb7c6885f usb: dwc3: Soft reset phy on probe for host d71d0009f9e7 net: usb: dm9601: fix uninitialized variable use in dm9601_mdio_read 4bf69ee6bb41 usb: xhci: xhci-ring: Use sysdev for mapping bounce buffer 2d30692c6c94 dmaengine: stm32-mdma: abort resume if no ongoing transfer d346a2ef6b1e media: mtk-jpeg: Fix use after free bug due to uncanceled work 014cab5329d1 net: release reference to inet6_dev pointer d491ac7aa12a net: change accept_ra_min_rtr_lft to affect all RA lifetimes 354a96770d94 net: add sysctl accept_ra_min_rtr_lft 1ceaf0d3a883 Revert "spi: spi-zynqmp-gqspi: Fix runtime PM imbalance in zynqmp_qspi_probe" 649237ccf440 Revert "spi: zynqmp-gqspi: fix clock imbalance on probe failure" ce03f0234f9d workqueue: Override implicit ordered attribute in workqueue_apply_unbound_cpumask() a424807d860b nfc: nci: assert requested protocol is valid b5b03da30bd5 pinctrl: renesas: rzn1: Enable missing PINMUX 6ac22ecdaad2 net: nfc: fix races in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn() 31ea13e3ff52 ixgbe: fix crash with empty VF macvlan list b24bd1277501 net: phy: mscc: macsec: reject PN update requests a848ae8b5ad7 net: macsec: indicate next pn update when offloading a629f0575c9c drm/vmwgfx: fix typo of sizeof argument d4ba78e5522e riscv, bpf: Sign-extend return values 2a8ef2234b3a riscv, bpf: Factor out emit_call for kernel and bpf context 1bf4da1818c2 xen-netback: use default TX queue size for vifs 33548a6b3c7c mlxsw: fix mlxsw_sp2_nve_vxlan_learning_set() return type 55e06850c789 ieee802154: ca8210: Fix a potential UAF in ca8210_probe ef7a0d51bfdb ravb: Fix up dma_free_coherent() call in ravb_remove() 1673841da013 drm/msm/dpu: change _dpu_plane_calc_bw() to use u64 to avoid overflow 6004ca7ad2d0 drm/msm/dsi: skip the wait for video mode done if not applicable dbbbeaef7786 drm/msm/dp: do not reinitialize phy unless retry during link training 31e7e77b24f1 net: prevent address rewrite in kernel_bind() 22c06bf1f99e quota: Fix slow quotaoff 093af62c0235 HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect cb4a8146e3a9 lib/test_meminit: fix off-by-one error in test_pages() 06068e7f3ff8 perf/arm-cmn: Fix the unhandled overflow status of counter 4 to 7 0ed2ad00f333 RDMA/cxgb4: Check skb value for failure to allocate 26788a5b48d9 RDMA/srp: Do not call scsi_done() from srp_abort() 81982125c352 RDMA/srp: Make struct scsi_cmnd and struct srp_request adjacent Signed-off-by: Bruce Ashfield Signed-off-by: Steve Sakoman --- .../linux/linux-yocto-rt_5.10.bb | 6 ++--- .../linux/linux-yocto-tiny_5.10.bb | 8 +++---- meta/recipes-kernel/linux/linux-yocto_5.10.bb | 24 +++++++++---------- 3 files changed, 19 insertions(+), 19 deletions(-) diff --git a/meta/recipes-kernel/linux/linux-yocto-rt_5.10.bb b/meta/recipes-kernel/linux/linux-yocto-rt_5.10.bb index ea27d58ed7..aa142e9991 100644 --- a/meta/recipes-kernel/linux/linux-yocto-rt_5.10.bb +++ b/meta/recipes-kernel/linux/linux-yocto-rt_5.10.bb @@ -11,13 +11,13 @@ python () { raise bb.parse.SkipRecipe("Set PREFERRED_PROVIDER_virtual/kernel to linux-yocto-rt to enable it") } -SRCREV_machine ?= "2da7024055c1fb827608ef2529c22356612f6ddd" -SRCREV_meta ?= "d787ac6931e013c185858482f491f8bfa9fa5177" +SRCREV_machine ?= "b24960ebb2a4b1ef65c32b2d76b3c5cc078da6e3" +SRCREV_meta ?= "2a34d5498413dc22a5f735d5e830751fe07dc825" SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;branch=${KBRANCH};name=machine \ git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-5.10;destsuffix=${KMETA}" -LINUX_VERSION ?= "5.10.198" +LINUX_VERSION ?= "5.10.200" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" diff --git a/meta/recipes-kernel/linux/linux-yocto-tiny_5.10.bb b/meta/recipes-kernel/linux/linux-yocto-tiny_5.10.bb index 7de15b3427..e9b140826f 100644 --- a/meta/recipes-kernel/linux/linux-yocto-tiny_5.10.bb +++ b/meta/recipes-kernel/linux/linux-yocto-tiny_5.10.bb @@ -6,7 +6,7 @@ KCONFIG_MODE = "--allnoconfig" require recipes-kernel/linux/linux-yocto.inc -LINUX_VERSION ?= "5.10.198" +LINUX_VERSION ?= "5.10.200" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}" @@ -15,9 +15,9 @@ DEPENDS += "openssl-native util-linux-native" KMETA = "kernel-meta" KCONF_BSP_AUDIT_LEVEL = "2" -SRCREV_machine:qemuarm ?= "0456488add9cb4b7d3cd462829c9dc7565bd129e" -SRCREV_machine ?= "a1c6b99d88f23dcdaeb66e932239e43b4ffb44f0" -SRCREV_meta ?= "d787ac6931e013c185858482f491f8bfa9fa5177" +SRCREV_machine:qemuarm ?= "649d500e6df0c844c207d14168290483f0e2e3a4" +SRCREV_machine ?= "913ae61c1450439a52b0ed396805b65c2735a136" +SRCREV_meta ?= "2a34d5498413dc22a5f735d5e830751fe07dc825" PV = "${LINUX_VERSION}+git${SRCPV}" diff --git a/meta/recipes-kernel/linux/linux-yocto_5.10.bb b/meta/recipes-kernel/linux/linux-yocto_5.10.bb index 764b2ae52b..20ac329cdb 100644 --- a/meta/recipes-kernel/linux/linux-yocto_5.10.bb +++ b/meta/recipes-kernel/linux/linux-yocto_5.10.bb @@ -14,23 +14,23 @@ KBRANCH:qemux86 ?= "v5.10/standard/base" KBRANCH:qemux86-64 ?= "v5.10/standard/base" KBRANCH:qemumips64 ?= "v5.10/standard/mti-malta64" -SRCREV_machine:qemuarm ?= "55637625329cf574d8e33c94e58562d418d9a342" -SRCREV_machine:qemuarm64 ?= "259c25670564324f7098c7f5e5fd136e0d708216" -SRCREV_machine:qemumips ?= "8333009219a39ea271fe238a482423bfa4738703" -SRCREV_machine:qemuppc ?= "bd719802d7bca16c82af1cb31e3dc254cf8992b8" -SRCREV_machine:qemuriscv64 ?= "5601201f60a8abb5bbb54da99da2a38bfb7a46dd" -SRCREV_machine:qemuriscv32 ?= "5601201f60a8abb5bbb54da99da2a38bfb7a46dd" -SRCREV_machine:qemux86 ?= "5601201f60a8abb5bbb54da99da2a38bfb7a46dd" -SRCREV_machine:qemux86-64 ?= "5601201f60a8abb5bbb54da99da2a38bfb7a46dd" -SRCREV_machine:qemumips64 ?= "f3dfd049230bbbf54854c21f5b85b8b52e2b2f65" -SRCREV_machine ?= "5601201f60a8abb5bbb54da99da2a38bfb7a46dd" -SRCREV_meta ?= "d787ac6931e013c185858482f491f8bfa9fa5177" +SRCREV_machine:qemuarm ?= "cc21138c594fb43fba8e73aa72f3264c086689ff" +SRCREV_machine:qemuarm64 ?= "bd39db109551e3df6a5cd523d2d7f7bbf6e756ea" +SRCREV_machine:qemumips ?= "d8fb3fcb7e6d85e098ab813d26a20f5226f48f47" +SRCREV_machine:qemuppc ?= "67ee435101a2b79ea826a22877e30d0a5ddf70f3" +SRCREV_machine:qemuriscv64 ?= "7042b40d250aaaf2fe5f027de38e31575c01b22a" +SRCREV_machine:qemuriscv32 ?= "7042b40d250aaaf2fe5f027de38e31575c01b22a" +SRCREV_machine:qemux86 ?= "7042b40d250aaaf2fe5f027de38e31575c01b22a" +SRCREV_machine:qemux86-64 ?= "7042b40d250aaaf2fe5f027de38e31575c01b22a" +SRCREV_machine:qemumips64 ?= "a36187617acc67fd12b752e74b68152c59374f88" +SRCREV_machine ?= "7042b40d250aaaf2fe5f027de38e31575c01b22a" +SRCREV_meta ?= "2a34d5498413dc22a5f735d5e830751fe07dc825" SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;name=machine;branch=${KBRANCH}; \ git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-5.10;destsuffix=${KMETA}" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" -LINUX_VERSION ?= "5.10.198" +LINUX_VERSION ?= "5.10.200" DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}" DEPENDS += "openssl-native util-linux-native" From patchwork Fri Dec 8 02:33:13 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 35906 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 98417C46CA3 for ; Fri, 8 Dec 2023 02:33:49 +0000 (UTC) Received: from mail-pl1-f169.google.com (mail-pl1-f169.google.com [209.85.214.169]) by mx.groups.io with SMTP id smtpd.web11.11236.1702002828417775720 for ; Thu, 07 Dec 2023 18:33:48 -0800 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20230601.gappssmtp.com header.s=20230601 header.b=Ce5PrlvP; spf=softfail (domain: sakoman.com, ip: 209.85.214.169, mailfrom: steve@sakoman.com) Received: by mail-pl1-f169.google.com with SMTP id d9443c01a7336-1d03bcf27e9so13953855ad.0 for ; Thu, 07 Dec 2023 18:33:48 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20230601.gappssmtp.com; s=20230601; t=1702002827; x=1702607627; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=MdQvsXJo7YpE1utFu96weiKp/RUmobGvMfrXmbdrZHc=; b=Ce5PrlvPJgbsprfaTgm4L9RGYTZop/MHlHLpLSaOO0ry5W1ksdDxXvkiQf0Uuqtpc1 vj4cn7ylWtp59lQ8pkE4dFeiAMOkWskrnjGbjqrKwLiX8OGoYvSWNmwp/1AWJCpN3ygE zu304CHqfFiADZFKgwAgSCVoPGIScrsL8+2B7lehLP4Cwjk5FdnIosNIUN4mpn+91+Uo CXSSx/R+X7CzcijSp79xSm/nXO/zMksYspb3Ac6jEmi8r/9wvD4s16yWNClPV6inkSW+ aYhoM+0PQ/FiwjZFWOLL0LCDEqO4RS3XT4Naq2OJPwEpZ/cmjDVL3bRTkC4b+DwTNs6J OGPw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1702002827; x=1702607627; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=MdQvsXJo7YpE1utFu96weiKp/RUmobGvMfrXmbdrZHc=; b=iGdIVw5/vAQXLp/TJgQFNr37BlFlbfPuwJgt8vRHEf52C9a0tYKBIW4M34OjaZjdnJ CeQXno/mKFmR0Qe8UF1odeUf9ZwQuDpFZnVp4v8pBGfIQR3E/Fu+4NXLQNWDi31+vU/b E1QojT2+f40AyoB1Jdp4PqDC+Q2w+nonFxqb8HUWDJJUgmoBtb/TWfk2UvLvQrv+FZLT Fi3Bybj1ecVuDDWalBLhD3R5Mhc1zHQSMnSnEKOSXlil70ATYRgTR+rLzuQqJ4U9pjia wTM912M0GaopUkKbOWySFxA62jVHw+bW2zXcqmV7rbYiSzUMvVe/LXGSPfYZIZQCqqzG ylXg== X-Gm-Message-State: AOJu0YxWFWHFXe4ioHGkvOR0XAOjzEp7VDbNCV4Lq/nCeAScbC1F6la5 xEiA0/e5JgPPG0CSKoiPJFw/xFBhvqFCVy7Lb1Q= X-Google-Smtp-Source: AGHT+IHpU/CSSVlv+YeTZc7Gy/kJCEWUDFFJvIBa2T03ozYDlUx42ubLUkxTiHoXuMcJY/bMW+07fA== X-Received: by 2002:a17:903:22c1:b0:1d0:6ffe:1e68 with SMTP id y1-20020a17090322c100b001d06ffe1e68mr3139407plg.75.1702002826709; Thu, 07 Dec 2023 18:33:46 -0800 (PST) Received: from hexa.lan (dhcp-72-234-108-41.hawaiiantel.net. [72.234.108.41]) by smtp.gmail.com with ESMTPSA id i11-20020a170902c94b00b001c9bc811d4dsm499752pla.295.2023.12.07.18.33.45 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 07 Dec 2023 18:33:46 -0800 (PST) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][kirkstone 07/15] linux-yocto/5.10: update to v5.10.202 Date: Thu, 7 Dec 2023 16:33:13 -1000 Message-Id: <8f2c31ddd3b93f3f3e4eee5f3e97c84167f54dc4.1702002667.git.steve@sakoman.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 08 Dec 2023 02:33:49 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/191999 From: Bruce Ashfield Updating to the latest korg -stable release that comprises the following commits: 479e8b892541 Linux 5.10.202 610057f4f6e0 interconnect: qcom: Add support for mask-based BCMs 7ce66afcaaf6 netfilter: nf_tables: disable toggling dormant table state more than once d9c4da8cb74e netfilter: nf_tables: fix table flag updates 7d1d3f113425 netfilter: nftables: update table flags from the commit phase a98172e36e5f tracing: Have trace_event_file have ref counters c6e8af2a8a63 io_uring/fdinfo: lock SQ thread while retrieving thread cpu/pid aeeb1ad2dd4e drm/amd/display: Change the DMCUB mailbox memory location from FB to inbox e2bdd437886c drm/amdgpu: fix error handling in amdgpu_bo_list_get() dfa8e63ca527 drm/amd/pm: Handle non-terminated overdrive commands. 7dc933b4b498 ext4: remove gdb backup copy for meta bg in setup_new_flex_group_blocks 0932764fb54a ext4: correct the start block of counting reserved clusters 3c1ad03a5ff2 ext4: correct return value of ext4_convert_meta_bg d739a7e38944 ext4: correct offset of gdb backup in non meta_bg group to update_backups c878db71edc0 ext4: apply umask if ACL support is disabled 3a51aee542b0 Revert "net: r8169: Disable multicast filter for RTL8168H and RTL8107E" f6e014b5eb1d media: qcom: camss: Fix vfe_get() error jump e2d2e266089d mm: kmem: drop __GFP_NOFAIL when allocating objcg vectors 6875820f36bf nfsd: fix file memleak on client_opens_release b51b20c018c6 media: venus: hfi: add checks to handle capabilities from firmware bcee276a1e02 media: venus: hfi: fix the check to handle session buffer requirement da240b7bada2 media: venus: hfi_parser: Add check to keep the number of codecs within range 0f887306bd8b media: sharp: fix sharp encoding dfa9f4ea6502 media: lirc: drop trailing space from scancode transmit c041f5ddef00 f2fs: avoid format-overflow warning 829f0d5231b7 i2c: i801: fix potential race in i801_block_transaction_byte_by_byte 430603f6de33 net: phylink: initialize carrier state at creation 4dc0484e90a3 net: dsa: lan9303: consequently nested-lock physical MDIO cb1006640cb3 i2c: designware: Disable TX_EMPTY irq while waiting for block length byte 8e29eebe4c39 lsm: fix default return value for inode_getsecctx 8327f50442d2 lsm: fix default return value for vm_enough_memory a011391f019c Revert ncsi: Propagate carrier gain/loss events to the NCSI controller 969d994612ff arm64: dts: qcom: ipq6018: Fix tcsr_mutex register size 2b3931eb8e9c arm64: dts: qcom: ipq6018: switch TCSR mutex to MMIO bdda1c356d58 PCI: exynos: Don't discard .remove() callback 62d15b6a6ec9 Bluetooth: btusb: Add 0bda:b85b for Fn-Link RTL8852BE dbbf3c456002 Bluetooth: btusb: Add RTW8852BE device 13d3:3570 to device tables 990d4c76d254 bluetooth: Add device 13d3:3571 to device tables 3aba34baa4fb bluetooth: Add device 0bda:887b to device tables 0952747362c1 Bluetooth: btusb: Add Realtek RTL8852BE support ID 0x0cb8:0xc559 8617305611c1 cpufreq: stats: Fix buffer overflow detection in trans_stats() 2ed25af15b32 tty: serial: meson: fix hard LOCKUP on crtscts mode 07c61839582d serial: meson: Use platform_get_irq() to get the interrupt 980c3135f1ae tty: serial: meson: retrieve port FIFO size from DT 1e66cd408353 serial: meson: remove redundant initialization of variable id ba30578def84 ALSA: hda/realtek - Enable internal speaker of ASUS K6500ZC ddd47d8d1ba6 ALSA: hda/realtek - Add Dell ALC295 to pin fall back table a681d28b973f ALSA: info: Fix potential deadlock at disconnection f04fa1e1997f xhci: Enable RPM on controllers that support low-power states 5e34fe50a976 parisc/pgtable: Do not drop upper 5 address bits of physical address 064c697cac4b parisc: Prevent booting 64-bit kernels on PA1.x machines c6effcdd7dd0 i3c: master: cdns: Fix reading status register 76320f05b99d mtd: cfi_cmdset_0001: Byte swap OTP info dce3e7c40055 mm/memory_hotplug: use pfn math in place of direct struct page manipulation 63d2023fbbe1 mm/cma: use nth_page() in place of direct struct page manipulation d24340f08104 dmaengine: stm32-mdma: correct desc prep when channel running 788322e1ede6 mcb: fix error handling for different scenarios when parsing 25284c46b657 i2c: core: Run atomic i2c xfer when !preemptible 8f8fc95b3a7f kernel/reboot: emergency_restart: Set correct system_state 9386f59759b4 quota: explicitly forbid quota files from being encrypted f729cf6f3217 jbd2: fix potential data lost in recovering journal raced with synchronizing fs bdev db5ebaeb8fda PCI: keystone: Don't discard .probe() callback 2bcdc1b6b61e PCI: keystone: Don't discard .remove() callback 943347e53a75 genirq/generic_chip: Make irq_remove_generic_chip() irqdomain aware b2c194fe8f31 mmc: meson-gx: Remove setting of CMD_CFG_ERROR 03ed26935beb wifi: ath11k: fix htt pktlog locking f882f5190551 wifi: ath11k: fix dfs radar event locking c3f61ca48612 wifi: ath11k: fix temperature event locking cd5a262a07a5 ima: detect changes to the backing overlay file df4133ebc86a firmware: qcom_scm: use 64-bit calling convention only when client is 64-bit 76211f1dd91d btrfs: don't arbitrarily slow down delalloc if we're committing 175f4b062f69 rcu: kmemleak: Ignore kmemleak false positives when RCU-freeing objects 3c1c1af25d45 PM: hibernate: Clean up sync_read handling in snapshot_write_next() df8363e468f2 PM: hibernate: Use __get_safe_page() rather than touching the list 21bc829337ca arm64: dts: qcom: ipq6018: Fix hwlock index for SMEM 1fd46d32772d PCI/ASPM: Fix L1 substate handling in aspm_attr_store_common() e3ed58ee4e4a mmc: sdhci_am654: fix start loop index for TAP value parsing 198366a5ffe6 mmc: vub300: fix an error code 3a4431014cfb clk: qcom: ipq6018: drop the CLK_SET_RATE_PARENT flag from PLL clocks 30af31fc002e clk: qcom: ipq8074: drop the CLK_SET_RATE_PARENT flag from PLL clocks 8dc83cf76290 parisc/pdc: Add width field to struct pdc_model d08a1e75253b arm64: Restrict CPU_BIG_ENDIAN to GNU as or LLVM IAS 15.x or newer 61695b9aecfe ACPI: resource: Do IRQ override on TongFang GMxXGxx 6edbd6b4811f watchdog: move softlockup_panic back to early_param 85fe64c8dcce PCI/sysfs: Protect driver's D3cold preference from user space 1b0836242900 hvc/xen: fix error path in xen_hvc_init() to always register frontend driver d5455c421fad hvc/xen: fix console unplug a158a74e701b tty/sysrq: replace smp_processor_id() with get_cpu() fc557bcfd7ff audit: don't WARN_ON_ONCE(!current->mm) in audit_exe_compare() 121973ef1ad7 audit: don't take task_lock() in audit_exe_compare() code path 910caee34640 KVM: x86: Ignore MSR_AMD64_TW_CFG access 66406d49ac14 KVM: x86: hyper-v: Don't auto-enable stimer on write from user-space 8cf6b6658541 x86/cpu/hygon: Fix the CPU topology evaluation for real 243c4833f345 scsi: megaraid_sas: Increase register read retry rount from 3 to 30 for selected registers 697bc325b977 scsi: mpt3sas: Fix loop logic 5fb8ec5943b1 bpf: Fix precision tracking for BPF_ALU | BPF_TO_BE | BPF_END 9617a9fe4f41 bpf: Fix check_stack_write_fixed_off() to correctly spill imm 7975f7b2a6fc randstruct: Fix gcc-plugin performance mode to stay in group d83f4bc0a4db powerpc/perf: Fix disabling BHRB and instruction sampling e7de8ffbbbc7 media: venus: hfi: add checks to perform sanity on queue pointers 99dbc39c22ce cifs: fix check of rc in function generate_smb3signingkey e5a0ef02829d cifs: spnego: add ';' in HOST_KEY_LEN 6d388b641c8f tools/power/turbostat: Fix a knl bug f56e228d67fc macvlan: Don't propagate promisc change to lower dev in passthru ac4979dbd9b6 net/mlx5e: Check return value of snprintf writing to fw_version buffer for representors a3ce491b1738 net/mlx5_core: Clean driver version and name 0eaec8126b46 net/mlx5e: fix double free of encap_header 541fece7caa4 net: stmmac: fix rx budget limit check 66dbaa2eecf1 netfilter: nf_conntrack_bridge: initialize err to 0 3f643150563c net: ethernet: cortina: Fix MTU max setting eac9ef50d6f3 net: ethernet: cortina: Handle large frames f0d9b80f7624 net: ethernet: cortina: Fix max RX frame define 396baca6683f bonding: stop the device in bond_setup_by_slave() 1f368fd61223 ptp: annotate data-race around q->head and q->tail ecc74e7acb6d xen/events: fix delayed eoi list handling 144a80ef40a6 ppp: limit MRU to 64K 3ee249a3b993 tipc: Fix kernel-infoleak due to uninitialized TLV value 072f0eb962c9 net: hns3: fix VF reset fail issue b0eac93bae42 net: hns3: fix variable may not initialized problem in hns3_init_mac_addr() 48fa8a85f8f5 tty: Fix uninit-value access in ppp_sync_receive() 43b781e7cb5c ipvlan: add ipvlan_route_v6_outbound() helper 59fadfa99bcb gfs2: Silence "suspicious RCU usage in gfs2_permission" warning dedf2a0eb944 SUNRPC: Fix RPC client cleaned up the freed pipefs dentries 39b2bf040510 NFSv4.1: fix SP4_MACH_CRED protection for pnfs IO 37f3aaf7945e SUNRPC: Add an IS_ERR() check back to where it was c7eacf01ddb1 SUNRPC: ECONNRESET might require a rebind 4ea3b98fa6a1 xhci: turn cancelled td cleanup to its own function 6ebd42a7b713 wifi: iwlwifi: Use FW rate for non-data frames e52518b9cb9f pwm: Fix double shift bug 53b2393eeba7 drm/amdgpu: fix software pci_unplug on some chips f1ea84696ea5 ASoC: ti: omap-mcbsp: Fix runtime PM underflow warnings 3cfacacb9caa kgdb: Flush console before entering kgdb on panic 79b6a90f4f24 drm/amd/display: Avoid NULL dereference of timing generator 0f5068519f89 media: imon: fix access to invalid resource for the second interface cf8519f40ce3 media: cobalt: Use FIELD_GET() to extract Link Width 5f8d51a04baf gfs2: fix an oops in gfs2_permission 2a054b87a1b7 gfs2: ignore negated quota changes 0ac2652b9674 media: vivid: avoid integer overflow c6b6b8692218 media: gspca: cpia1: shift-out-of-bounds in set_flicker 90e3c3dd9306 i2c: sun6i-p2wi: Prevent potential division by zero 18fa7a30cd0c 9p/trans_fd: Annotate data-racy writes to file::f_flags 76716a7604b2 usb: gadget: f_ncm: Always set current gadget in ncm_bind() 4ef41a7f33ff tty: vcc: Add check for kstrdup() in vcc_probe() 484cc536a3a2 exfat: support handle zero-size directory 491529d383b7 HID: Add quirk for Dell Pro Wireless Keyboard and Mouse KM5221W 65d78d54e4e5 misc: pci_endpoint_test: Add Device ID for R-Car S4-8 PCIe controller bb83f79f90e9 scsi: libfc: Fix potential NULL pointer dereference in fc_lport_ptp_setup() 5cebe796eaaa atm: iphase: Do PCI error checks on own line 65491968365c PCI: tegra194: Use FIELD_GET()/FIELD_PREP() with Link Width fields 25354bae4fc3 ALSA: hda: Fix possible null-ptr-deref when assigning a stream e0d739e66bc1 ARM: 9320/1: fix stack depot IRQ stack filter 62d21f9df46d HID: lenovo: Detect quirk-free fw on cptkbd and stop applying workaround 1ba7df5457dc jfs: fix array-index-out-of-bounds in diAlloc 81aa58cd8495 jfs: fix array-index-out-of-bounds in dbFindLeaf c6c8863fb3f5 fs/jfs: Add validity check for db_maxag and db_agpref 524b4f203afc fs/jfs: Add check for negative db_l2nbperpage 885824a44d35 RDMA/hfi1: Use FIELD_GET() to extract Link Width e97bf4ada7dd crypto: pcrypt - Fix hungtask for PADATA_RESET 98fa52d89a4f ASoC: soc-card: Add storage for PCI SSID f161a6b11ae7 selftests/efivarfs: create-read: fix a resource leak f475d5502f33 drm/amdgpu: Fix a null pointer access when the smc_rreg pointer is NULL da1409ea0845 drm/panel: st7703: Pick different reset sequence 9acc2bc00135 drm/panel/panel-tpo-tpg110: fix a possible null pointer dereference c7dc0aca5962 drm/panel: fix a possible null pointer dereference b93a25de28af drm/amdgpu: Fix potential null pointer derefernce 8c1dbddbfcb0 drm/amd: Fix UBSAN array-index-out-of-bounds for Polaris and Tonga 8af28ae3acb7 drm/amd: Fix UBSAN array-index-out-of-bounds for SMU7 4ffb2b0e48c0 drm/msm/dp: skip validity check for DP CTS EDID checksum 2810a9c40b6f drm/komeda: drop all currently held locks if deadlock happens a70457f181d6 platform/x86: thinkpad_acpi: Add battery quirk for Thinkpad X120e 53d61daf35b1 Bluetooth: Fix double free in hci_conn_cleanup 9f8e4d1a4ca1 Bluetooth: btusb: Add date->evt_skb is NULL check bba97f5e8ff3 wifi: ath10k: Don't touch the CE interrupt registers after power up 22fa35ded3ec net: annotate data-races around sk->sk_dst_pending_confirm 67b7de95d1e3 net: annotate data-races around sk->sk_tx_queue_mapping beb75dccba9d wifi: ath10k: fix clang-specific fortify warning 2d6303cafb7c wifi: ath9k: fix clang-specific fortify warnings 6058e4829696 bpf: Detect IP == ksym.end as part of BPF program 717de20abdcd wifi: mac80211: don't return unset power in ieee80211_get_tx_power() cdfc689e10e6 wifi: mac80211_hwsim: fix clang-specific fortify warning a7aa2f1ca855 x86/mm: Drop the 4 MB restriction on minimal NUMA node memory size 89356bee8eda clocksource/drivers/timer-atmel-tcb: Fix initialization on SAM9 hardware 1b8687ed3cf3 clocksource/drivers/timer-imx-gpt: Fix potential memory leak 1a2a4202c60f perf/core: Bail out early if the request AUX area is out of bound 9ed2d68b3925 locking/ww_mutex/test: Fix potential workqueue corruption 6db6caba87ef Linux 5.10.201 4be0407ffcf6 btrfs: use u64 for buffer sizes in the tree search ioctls 2bbbb976faa1 Revert "mmc: core: Capture correct oemid-bits for eMMC cards" 3b092dfdabf2 tracing/kprobes: Fix the order of argument descriptions 3697fda1c671 fbdev: fsl-diu-fb: mark wr_reg_wa() static a4dfebec32ec fbdev: imsttfb: fix a resource leak in probe 9e8e731571e6 fbdev: imsttfb: Fix error path of imsttfb_probe() de721d7ef7ac spi: spi-zynq-qspi: add spi-mem to driver kconfig dependencies 876a119790e5 drm/syncobj: fix DRM_SYNCOBJ_WAIT_FLAGS_WAIT_AVAILABLE b9bc1806b907 x86/sev-es: Allow copy_from_kernel_nofault() in earlier boot 14042d6d80db x86: Share definition of __is_canonical_address() bc794a667b1e netfilter: nat: fix ipv6 nat redirect with mapped and scoped addresses b65d851b2eb0 netfilter: nft_redir: use `struct nf_nat_range2` throughout and deduplicate eval call-backs 7764290452d1 netfilter: xt_recent: fix (increase) ipv6 literal buffer length 00b188209196 r8169: respect userspace disabling IFF_MULTICAST e02824db7c43 tg3: power down device only on SYSTEM_POWER_OFF 34c5a24633bc net/smc: put sk reference if close work was canceled f652ab15af0a net/smc: allow cdc msg send rather than drop it with NULL sndbuf_desc 4e7bad730160 net/smc: fix dangling sock under state SMC_APPFINCLOSEWAIT 13d6bc35deb1 net: stmmac: xgmac: Enable support for multiple Flexible PPS outputs eafacef7eeef Fix termination state for idr_for_each_entry_ul() 0a84ffc72f1e net: r8169: Disable multicast filter for RTL8168H and RTL8107E 4969fcebe76d dccp/tcp: Call security_inet_conn_request() after setting IPv6 addresses. 7827667989e1 dccp: Call security_inet_conn_request() after setting IPv4 addresses. f830d4f69835 inet: shrink struct flowi_common b33d130f07f1 tipc: Change nla_policy for bearer-related names to NLA_NUL_STRING ddf4e04e946a hsr: Prevent use after free in prp_create_tagged_frame() 3a2653828ffc llc: verify mac len before reading mac header 6c71e065befb Input: synaptics-rmi4 - fix use after free in rmi_unregister_function() e5d481d9b6cf pwm: brcmstb: Utilize appropriate clock APIs in suspend/resume 005965cab108 pwm: sti: Reduce number of allocations and drop usage of chip_data ce5e0a3c9d39 pwm: sti: Avoid conditional gotos 0bc796e66b5d regmap: prevent noinc writes from clobbering cache 1b86938925bd media: dvb-usb-v2: af9035: fix missing unlock 2e2efaed79c0 media: cedrus: Fix clock/reset sequence 64863ba8e6b7 media: vidtv: mux: Add check and kfree for kstrdup 3387490c89b1 media: vidtv: psi: Add check for kstrdup 62557ab73d3a media: s3c-camif: Avoid inappropriate kfree() 2f3d9198cdae media: bttv: fix use after free error due to btv->timeout timer 0627e8623eb5 media: i2c: max9286: Fix some redundant of_node_put() calls c3e148aba95a pcmcia: ds: fix possible name leak in error path in pcmcia_device_add() 84540ef92434 pcmcia: ds: fix refcount leak in pcmcia_device_add() cd154225d419 pcmcia: cs: fix possible hung task and memory leak pccardd() 5e3c75158642 rtc: pcf85363: fix wrong mask/val parameters in regmap_update_bits call 1832ed55df45 i3c: Fix potential refcount leak in i3c_master_register_new_i3c_devs a83fc293acd5 perf hist: Add missing puts to hist__account_cycles 4e66bde5c7d1 perf machine: Avoid out of bounds LBR memory read 188425eb2da2 usb: host: xhci-plat: fix possible kernel oops while resuming ba894bd2737c xhci: Loosen RPM as default policy to cover for AMD xHC 1.1 ad0370c41a19 powerpc/pseries: fix potential memory leak in init_cpu_associativity() d12372af8955 powerpc/imc-pmu: Use the correct spinlock initializer. c75707293dcf powerpc/xive: Fix endian conversion size f95f5512fdcb powerpc/40x: Remove stale PTE_ATOMIC_UPDATES macro b54a4c8ca1c8 modpost: fix tee MODULE_DEVICE_TABLE built on big-endian host 362f0241dbe9 interconnect: qcom: sc7180: Set ACV enable_mask 08588fac00b1 interconnect: qcom: sc7180: Retire DEFINE_QBCM ebaf7a73f634 f2fs: fix to initialize map.m_pblk in f2fs_precache_extents() 758f735604f8 dmaengine: pxa_dma: Remove an erroneous BUG_ON() in pxad_free_desc() 5fe228041c51 USB: usbip: fix stub_dev hub disconnect 798692e48c0a tools: iio: iio_generic_buffer ensure alignment 3eadba058276 tools: iio: iio_generic_buffer: Fix some integer type and calculation a0a41991ddf2 tools: iio: privatize globals and functions in iio_generic_buffer.c file d046e3f8de1d misc: st_core: Do not call kfree_skb() under spin_lock_irqsave() c53cfe99c2aa dmaengine: ti: edma: handle irq_of_parse_and_map() errors bdb3dd409630 usb: dwc2: fix possible NULL pointer dereference caused by driver concurrency 05de1536d052 livepatch: Fix missing newline character in klp_resolve_symbols() 3ebf42fe8cc7 tty: tty_jobctrl: fix pid memleak in disassociate_ctty() 380837052669 leds: trigger: ledtrig-cpu:: Fix 'output may be truncated' issue for 'cpu' 23eb8629c22f leds: pwm: Don't disable the PWM when the LED should be off c2766ed2b7af mfd: dln2: Fix double put in dln2_probe b708eb26b560 mfd: core: Ensure disabled devices are skipped without aborting 9f831533d2d0 mfd: core: Un-constify mfd_cell.of_reg b7b4851e630d ASoC: ams-delta.c: use component after check 41aad9d69539 padata: Fix refcnt handling in padata_free_shell() 7606807bd6d0 padata: Convert from atomic_t to refcount_t on parallel_data->refcnt 2de16f6169a2 ASoC: Intel: Skylake: Fix mem leak when parsing UUIDs fails 6fd432f392a7 HID: logitech-hidpp: Move get_wireless_feature_index() check to hidpp_connect_event() 7581eef4aef2 HID: logitech-hidpp: Revert "Don't restart communication if not necessary" c82e376bc24e HID: logitech-hidpp: Don't restart IO, instead defer hid_connect() only 0fe443314cf6 HID: logitech-hidpp: Remove HIDPP_QUIRK_NO_HIDINPUT quirk 8337286600cd Revert "HID: logitech-hidpp: add a module parameter to keep firmware gestures" 6d2de161cdc6 sh: bios: Revive earlyprintk support 2ca51477c6da hid: cp2112: Fix IRQ shutdown stopping polling for all IRQs on chip 9c895d20f8ee RDMA/hfi1: Workaround truncation compilation error cd268264f594 scsi: ufs: core: Leave space for '\0' in utf8 desc string cded69a7f8b3 ASoC: fsl: Fix PM disable depth imbalance in fsl_easrc_probe 159639486834 RDMA/hns: Fix signed-unsigned mixed comparisons 8018a3444e39 RDMA/hns: Fix uninitialized ucmd in hns_roce_create_qp_common() 08a246064def IB/mlx5: Fix rdma counter binding for RAW QP 53067926cd83 ASoC: fsl: mpc5200_dma.c: Fix warning of Function parameter or member not described 83eee515e415 ext4: move 'ix' sanity check to corrent position 67959b362687 ARM: 9321/1: memset: cast the constant byte to unsigned char 3d959406c8ff hid: cp2112: Fix duplicate workqueue initialization 63e8e2ee5815 crypto: qat - increase size of buffers a921d6b795a0 crypto: qat - mask device capabilities with soft straps 16f2033de013 crypto: caam/jr - fix Chacha20 + Poly1305 self test failure 727ba935d906 crypto: caam/qi2 - fix Chacha20 + Poly1305 self test failure b0e7a935739f nd_btt: Make BTT lanes preemptible efeaa2396e3b libnvdimm/of_pmem: Use devm_kstrdup instead of kstrdup and check its return value ffb3483c4b0b hwrng: geode - fix accessing registers 02db438311f8 crypto: hisilicon/hpre - Fix a erroneous check after snprintf() 5176ebe6aa2b selftests/resctrl: Ensure the benchmark commands fits to its array b3768f089210 selftests/pidfd: Fix ksft print formats a0846b4c8e74 clk: scmi: Free scmi_clk allocated when the clocks with invalid info are skipped bcc7d46fa4dd firmware: ti_sci: Mark driver as non removable 5e5b85ea0f4b soc: qcom: llcc: Handle a second device without data corruption a44aa8d8a532 ARM: dts: qcom: mdm9615: populate vsdcc fixed regulator 8bd7c8a9b838 arm64: dts: qcom: sdm845-mtp: fix WiFi configuration 4df18b233ef2 arm64: dts: qcom: msm8916: Fix iommu local address range 1e17eab1a49a xen-pciback: Consider INTx disabled when MSI/MSI-X is enabled bc714abe7dc0 drm/rockchip: Fix type promotion bug in rockchip_gem_iommu_map() 666a4120dcf6 arm64/arm: xen: enlighten: Fix KPTI checks 0dd40dca1ebb drm/rockchip: cdn-dp: Fix some error handling paths in cdn_dp_probe() 6f710918df7d drm/mediatek: Fix iommu fault during crtc enabling c12f2eaeb38b drm/bridge: tc358768: Fix bit updates 1133e72cd82b drm/bridge: tc358768: Disable non-continuous clock mode c0d25ef81a11 drm/bridge: tc358768: Fix use of uninitialized variable 7b063c93bece drm/radeon: possible buffer overflow a6d6769e2db6 drm/rockchip: vop: Fix call to crtc reset helper bb8143016130 drm/rockchip: vop: Fix reset of state in duplicate state crtc funcs 9899097b1fcf hwmon: (coretemp) Fix potentially truncated sysfs attribute name 7d870088db48 hwmon: (axi-fan-control) Fix possible NULL pointer dereference 060d54f09004 hwmon: (axi-fan-control) Support temperature vs pwm points d426a2955e45 platform/x86: wmi: Fix opening of char device d2220737330b platform/x86: wmi: remove unnecessary initializations 3433a69c00ee platform/x86: wmi: Fix probe failure when failing to register WMI devices b16622d304e7 clk: qcom: config IPQ_APSS_6018 should depend on QCOM_SMEM 001e5def774f clk: mediatek: clk-mt2701: Add check for mtk_alloc_clk_data 4f861b63945e clk: mediatek: clk-mt7629: Add check for mtk_alloc_clk_data 96e9544a0c4f clk: mediatek: clk-mt7629-eth: Add check for mtk_alloc_clk_data 81b162861107 clk: mediatek: clk-mt6797: Add check for mtk_alloc_clk_data 3994387ba356 clk: mediatek: clk-mt6779: Add check for mtk_alloc_clk_data 2617aa8ceaf3 clk: mediatek: clk-mt6765: Add check for mtk_alloc_clk_data 55e5fd11a21d clk: npcm7xx: Fix incorrect kfree 0beaefa9885f clk: ti: fix double free in of_ti_divider_clk_setup() acb535d75077 clk: ti: change ti_clk_register[_omap_hw]() API 98c5012c11a1 clk: ti: Update component clocks to use ti_dt_clk_name() 1c4253252c7f clk: ti: Update pll and clockdomain clocks to use ti_dt_clk_name() 00c67e0aa7e4 clk: ti: Add ti_dt_clk_name() helper to use clock-output-names de33b367f80d clk: keystone: pll: fix a couple NULL vs IS_ERR() checks c07a0e2e93b6 spi: nxp-fspi: use the correct ioremap function d459cb424483 clk: linux/clk-provider.h: fix kernel-doc warnings and typos f28709097db4 clk: asm9260: use parent index to link the reference clock 8d03f7c5800d clk: imx: imx8mq: correct error handling path c1bacea8a64b clk: imx: Select MXC_CLK for CLK_IMX8QXP a52c963d8d7b clk: qcom: gcc-sm8150: Fix gcc_sdcc2_apps_clk_src c6919a1576bc clk: qcom: gcc-sm8150: use ARRAY_SIZE instead of specifying num_parents 355a12fa1c50 clk: qcom: mmcc-msm8998: Fix the SMMU GDSC ba7f9695d545 clk: qcom: mmcc-msm8998: Set bimc_smmu_gdsc always on 97a671174433 clk: qcom: mmcc-msm8998: Don't check halt bit on some branch clks 05eebcd4bc5b clk: qcom: mmcc-msm8998: Add hardware clockgating registers to some clks 3181168e61f4 clk: qcom: clk-rcg2: Fix clock rate overflow for high parent frequencies 80836b5859b7 regmap: debugfs: Fix a erroneous check after snprintf() 9954a7f3808b ipvlan: properly track tx_errors e897dcbd5fbc net: add DEV_STATS_READ() helper 98e8a5a370da ipv6: avoid atomic fragment on GSO packets dea8d9e571ee ACPI: sysfs: Fix create_pnp_modalias() and create_of_modalias() 88be6453d7c9 tcp: fix cookie_init_timestamp() overflows 76894f305c96 chtls: fix tp->rcv_tstamp initialization d104f6cb41e8 r8169: fix rare issue with broken rx after link-down on RTL8125 fdd4a3c20ad5 r8169: use tp_to_dev instead of open code 3f795fb35c2d thermal: core: prevent potential string overflow ae681e5eff0c PM / devfreq: rockchip-dfi: Make pmu regmap mandatory d7a220bf6bd6 can: dev: can_restart(): fix race condition between controller restart and netif_carrier_on() 040f65c2821f can: dev: can_restart(): don't crash kernel if carrier is OK 03d138b6b243 wifi: rtlwifi: fix EDCA limit set by BT coexistence d8f2e18d1dcf tcp_metrics: do not create an entry from tcp_init_metrics() 73999f29ab19 tcp_metrics: properly set tp->snd_ssthresh in tcp_init_metrics() 37308a39262b tcp_metrics: add missing barriers on delete d203f9921ac0 wifi: mt76: mt7603: rework/fix rx pse hang check 3068527d17e8 wifi: rtw88: debug: Fix the NULL vs IS_ERR() bug for debugfs_create_file() d44f88b20d44 net: spider_net: Use size_add() in call to struct_size() 9b8486fdad65 tipc: Use size_add() in calls to struct_size() 5f5aabbdc27f mlxsw: Use size_mul() in call to struct_size() f927d4469632 gve: Use size_add() in call to struct_size() 2b46db3bb73d overflow: Implement size_t saturating arithmetic helpers 2f4b4eb58fc0 tcp: call tcp_try_undo_recovery when an RTOd TFO SYNACK is ACKed 0ca9fc8200d4 udp: add missing WRITE_ONCE() around up->encap_rcv 61e7961ff33d i40e: fix potential memory leaks in i40e_remove() 47479ed7fcf7 genirq/matrix: Exclude managed interrupts in irq_matrix_allocated() bb166bdae1a7 pstore/platform: Add check for kstrdup 66f9969141c0 x86/boot: Fix incorrect startup_gdt_descr.size ffa4cc86e959 futex: Don't include process MM in futex key on no-MMU f52587051637 x86/srso: Fix SBPB enablement for (possible) future fixed HW f49926b8d2a5 vfs: fix readahead(2) on block devices 9fe0f6b5720e sched/uclamp: Ignore (util == 0) optimization in feec() when p_util_max = 0 bdb7de7ed5ba iov_iter, x86: Be consistent about the __user tag on copy_mc_to_user() Signed-off-by: Bruce Ashfield Signed-off-by: Steve Sakoman --- .../linux/linux-yocto-rt_5.10.bb | 6 ++--- .../linux/linux-yocto-tiny_5.10.bb | 8 +++---- meta/recipes-kernel/linux/linux-yocto_5.10.bb | 24 +++++++++---------- 3 files changed, 19 insertions(+), 19 deletions(-) diff --git a/meta/recipes-kernel/linux/linux-yocto-rt_5.10.bb b/meta/recipes-kernel/linux/linux-yocto-rt_5.10.bb index aa142e9991..ce882123f2 100644 --- a/meta/recipes-kernel/linux/linux-yocto-rt_5.10.bb +++ b/meta/recipes-kernel/linux/linux-yocto-rt_5.10.bb @@ -11,13 +11,13 @@ python () { raise bb.parse.SkipRecipe("Set PREFERRED_PROVIDER_virtual/kernel to linux-yocto-rt to enable it") } -SRCREV_machine ?= "b24960ebb2a4b1ef65c32b2d76b3c5cc078da6e3" -SRCREV_meta ?= "2a34d5498413dc22a5f735d5e830751fe07dc825" +SRCREV_machine ?= "4c84fd48919bf3fa759cd02947899e90b5f13be1" +SRCREV_meta ?= "0ac177cb2df1cff8799d72b9224ed69423a22eef" SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;branch=${KBRANCH};name=machine \ git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-5.10;destsuffix=${KMETA}" -LINUX_VERSION ?= "5.10.200" +LINUX_VERSION ?= "5.10.202" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" diff --git a/meta/recipes-kernel/linux/linux-yocto-tiny_5.10.bb b/meta/recipes-kernel/linux/linux-yocto-tiny_5.10.bb index e9b140826f..267b2bcad1 100644 --- a/meta/recipes-kernel/linux/linux-yocto-tiny_5.10.bb +++ b/meta/recipes-kernel/linux/linux-yocto-tiny_5.10.bb @@ -6,7 +6,7 @@ KCONFIG_MODE = "--allnoconfig" require recipes-kernel/linux/linux-yocto.inc -LINUX_VERSION ?= "5.10.200" +LINUX_VERSION ?= "5.10.202" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}" @@ -15,9 +15,9 @@ DEPENDS += "openssl-native util-linux-native" KMETA = "kernel-meta" KCONF_BSP_AUDIT_LEVEL = "2" -SRCREV_machine:qemuarm ?= "649d500e6df0c844c207d14168290483f0e2e3a4" -SRCREV_machine ?= "913ae61c1450439a52b0ed396805b65c2735a136" -SRCREV_meta ?= "2a34d5498413dc22a5f735d5e830751fe07dc825" +SRCREV_machine:qemuarm ?= "b010aecb876ae2adf4548989459cc4878035d1ad" +SRCREV_machine ?= "69bfe10cd8d98c45a361d2efdddfc1bb940f5601" +SRCREV_meta ?= "0ac177cb2df1cff8799d72b9224ed69423a22eef" PV = "${LINUX_VERSION}+git${SRCPV}" diff --git a/meta/recipes-kernel/linux/linux-yocto_5.10.bb b/meta/recipes-kernel/linux/linux-yocto_5.10.bb index 20ac329cdb..a057dd54de 100644 --- a/meta/recipes-kernel/linux/linux-yocto_5.10.bb +++ b/meta/recipes-kernel/linux/linux-yocto_5.10.bb @@ -14,23 +14,23 @@ KBRANCH:qemux86 ?= "v5.10/standard/base" KBRANCH:qemux86-64 ?= "v5.10/standard/base" KBRANCH:qemumips64 ?= "v5.10/standard/mti-malta64" -SRCREV_machine:qemuarm ?= "cc21138c594fb43fba8e73aa72f3264c086689ff" -SRCREV_machine:qemuarm64 ?= "bd39db109551e3df6a5cd523d2d7f7bbf6e756ea" -SRCREV_machine:qemumips ?= "d8fb3fcb7e6d85e098ab813d26a20f5226f48f47" -SRCREV_machine:qemuppc ?= "67ee435101a2b79ea826a22877e30d0a5ddf70f3" -SRCREV_machine:qemuriscv64 ?= "7042b40d250aaaf2fe5f027de38e31575c01b22a" -SRCREV_machine:qemuriscv32 ?= "7042b40d250aaaf2fe5f027de38e31575c01b22a" -SRCREV_machine:qemux86 ?= "7042b40d250aaaf2fe5f027de38e31575c01b22a" -SRCREV_machine:qemux86-64 ?= "7042b40d250aaaf2fe5f027de38e31575c01b22a" -SRCREV_machine:qemumips64 ?= "a36187617acc67fd12b752e74b68152c59374f88" -SRCREV_machine ?= "7042b40d250aaaf2fe5f027de38e31575c01b22a" -SRCREV_meta ?= "2a34d5498413dc22a5f735d5e830751fe07dc825" +SRCREV_machine:qemuarm ?= "cf28b49bd6d196edf71e532b95675b683f24adca" +SRCREV_machine:qemuarm64 ?= "255936309d9ae21a5b5b76bbf4c4392b997eafdf" +SRCREV_machine:qemumips ?= "fa8423d3d00a45d8ee4b64684fd2111d10e48b67" +SRCREV_machine:qemuppc ?= "3c348c832ffb927a3f580e40d8190f385dfdce12" +SRCREV_machine:qemuriscv64 ?= "d05c0de69c0091d4ec418a225cfd942bd666630c" +SRCREV_machine:qemuriscv32 ?= "d05c0de69c0091d4ec418a225cfd942bd666630c" +SRCREV_machine:qemux86 ?= "d05c0de69c0091d4ec418a225cfd942bd666630c" +SRCREV_machine:qemux86-64 ?= "d05c0de69c0091d4ec418a225cfd942bd666630c" +SRCREV_machine:qemumips64 ?= "d38df4bfa230e568606fda66ec7ae697ed41e9ca" +SRCREV_machine ?= "d05c0de69c0091d4ec418a225cfd942bd666630c" +SRCREV_meta ?= "0ac177cb2df1cff8799d72b9224ed69423a22eef" SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;name=machine;branch=${KBRANCH}; \ git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-5.10;destsuffix=${KMETA}" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" -LINUX_VERSION ?= "5.10.200" +LINUX_VERSION ?= "5.10.202" DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}" DEPENDS += "openssl-native util-linux-native" From patchwork Fri Dec 8 02:33:14 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 35911 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id AC60FC4167B for ; Fri, 8 Dec 2023 02:33:59 +0000 (UTC) Received: from mail-pl1-f171.google.com (mail-pl1-f171.google.com [209.85.214.171]) by mx.groups.io with SMTP id smtpd.web10.11167.1702002830347314945 for ; Thu, 07 Dec 2023 18:33:50 -0800 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20230601.gappssmtp.com header.s=20230601 header.b=PeoNEO5f; spf=softfail (domain: sakoman.com, ip: 209.85.214.171, mailfrom: steve@sakoman.com) Received: by mail-pl1-f171.google.com with SMTP id d9443c01a7336-1d0538d9bbcso14792695ad.3 for ; Thu, 07 Dec 2023 18:33:50 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20230601.gappssmtp.com; s=20230601; t=1702002829; x=1702607629; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=3+xIV3VnzYiDFXAc4gQ/HUy6tTYxt2hwKv9dPU0ADCQ=; b=PeoNEO5fsbC1WN7nvHOcktRpymgmpAIPh9h+fzQ/c54vBheh4BUbgj3dgtqTWdpamb Lfqb6QPfPAvDJIOJCC1cHArtdSKrct8T7VCGb2SNMJFYu0KzxdV9NwfiSoFSnGqPTxcW fIavjdc5lnljWUi4k2f9OqghjQN/i+yMqoDWv1q1VarIfi14JkE5G80kuKJsEpsWwNb1 yDg+0gZN6nA6YNGBplvAeKGpmHtDKcBS4gFgqYVVsPLMP7htv1oM9IxpqgJ5U5atg3UG cBoj51z1LwzYyMJthoGq28bO/EWY9Wd3wsMjxjqp38qHSLMgnCNl0nYnyU/ywKpXPFzg FK2A== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1702002829; x=1702607629; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=3+xIV3VnzYiDFXAc4gQ/HUy6tTYxt2hwKv9dPU0ADCQ=; b=D/KfvXY500OazYX7keLCWyBIo9tM9bZsYLDRSPCgro9TQoih8h+lN8YA7Ok4EIZQlf WIeV0+0gXQVy8jPQCqX+7yvHphUzPtr+7ReSHR1NHemXpGCkVyVLBvJA6R0/Se/uuH1X 27Beda46baugSIoL4Z5vfk+9CGX/UESMGsQL6T6PxzjNKUTsbj0JuqkVsonmZ+ZhMwpr 3VIrsZT1JrEViaQOnkcQlzauofr/ki+jclGcRHjnCtWiMzzsD0FlNaKlpy8b4ir3FqRb wktFHH2pLiW1kHQKAx0A3R1kzkJKyOicqr423neGXdeyDAo/mdkSiztO4V5bbhta22jX zYsQ== X-Gm-Message-State: AOJu0YxzZWu8fkYFy7b+GsNtMPxka6okfKGfb9qGHbB+ljHGNjDqiOya 5ADSfvp1hCKJ4OqLDRlBo8YFNBcGmljCKKVVpLE= X-Google-Smtp-Source: AGHT+IFhnIrdRTZSvPFhXKN76bJXkOUZecIqH9w1RRdJvIUGPlemmG+mdaVaLtBAC7XdPPHJgOaESw== X-Received: by 2002:a17:902:d48a:b0:1d0:d312:bbfe with SMTP id c10-20020a170902d48a00b001d0d312bbfemr4396680plg.15.1702002828994; Thu, 07 Dec 2023 18:33:48 -0800 (PST) Received: from hexa.lan (dhcp-72-234-108-41.hawaiiantel.net. [72.234.108.41]) by smtp.gmail.com with ESMTPSA id i11-20020a170902c94b00b001c9bc811d4dsm499752pla.295.2023.12.07.18.33.47 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 07 Dec 2023 18:33:48 -0800 (PST) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][kirkstone 08/15] cve-exclusion_5.10.inc: update for 5.10.202 Date: Thu, 7 Dec 2023 16:33:14 -1000 Message-Id: X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 08 Dec 2023 02:33:59 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/192000 Signed-off-by: Steve Sakoman --- .../linux/cve-exclusion_5.10.inc | 92 +++++++++++++++---- 1 file changed, 73 insertions(+), 19 deletions(-) diff --git a/meta/recipes-kernel/linux/cve-exclusion_5.10.inc b/meta/recipes-kernel/linux/cve-exclusion_5.10.inc index 7b4f68c428..583d81d0f2 100644 --- a/meta/recipes-kernel/linux/cve-exclusion_5.10.inc +++ b/meta/recipes-kernel/linux/cve-exclusion_5.10.inc @@ -1,9 +1,9 @@ # Auto-generated CVE metadata, DO NOT EDIT BY HAND. -# Generated at 2023-10-24 06:17:08.900468 for version 5.10.197 +# Generated at 2023-12-05 05:25:07.507188 for version 5.10.202 python check_kernel_cve_status_version() { - this_version = "5.10.197" + this_version = "5.10.202" kernel_version = d.getVar("LINUX_VERSION") if kernel_version != this_version: bb.warn("Kernel CVE status needs updating: generated for %s but kernel is %s" % (this_version, kernel_version)) @@ -5651,7 +5651,8 @@ CVE_CHECK_IGNORE += "CVE-2021-43976" # cpe-stable-backport: Backported in 5.10.89 CVE_CHECK_IGNORE += "CVE-2021-44733" -# CVE-2021-44879 needs backporting (fixed from 5.17rc1) +# cpe-stable-backport: Backported in 5.10.200 +CVE_CHECK_IGNORE += "CVE-2021-44879" # cpe-stable-backport: Backported in 5.10.91 CVE_CHECK_IGNORE += "CVE-2021-45095" @@ -6515,7 +6516,7 @@ CVE_CHECK_IGNORE += "CVE-2022-43945" # CVE-2022-44033 needs backporting (fixed from 6.4rc1) -# CVE-2022-44034 has no known resolution +# CVE-2022-44034 needs backporting (fixed from 6.4rc1) # CVE-2022-4543 has no known resolution @@ -6686,7 +6687,8 @@ CVE_CHECK_IGNORE += "CVE-2023-1118" # fixed-version: only affects 5.15rc1 onwards CVE_CHECK_IGNORE += "CVE-2023-1192" -# CVE-2023-1193 has no known resolution +# fixed-version: only affects 5.15rc1 onwards +CVE_CHECK_IGNORE += "CVE-2023-1193" # fixed-version: only affects 5.15rc1 onwards CVE_CHECK_IGNORE += "CVE-2023-1194" @@ -6982,7 +6984,8 @@ CVE_CHECK_IGNORE += "CVE-2023-3106" # CVE-2023-31084 needs backporting (fixed from 6.4rc3) -# CVE-2023-31085 needs backporting (fixed from 5.10.198) +# cpe-stable-backport: Backported in 5.10.198 +CVE_CHECK_IGNORE += "CVE-2023-31085" # cpe-stable-backport: Backported in 5.10.184 CVE_CHECK_IGNORE += "CVE-2023-3111" @@ -7098,7 +7101,8 @@ CVE_CHECK_IGNORE += "CVE-2023-34256" # fixed-version: only affects 6.1 onwards CVE_CHECK_IGNORE += "CVE-2023-34319" -# CVE-2023-34324 needs backporting (fixed from 5.10.198) +# cpe-stable-backport: Backported in 5.10.198 +CVE_CHECK_IGNORE += "CVE-2023-34324" # fixed-version: only affects 5.15rc1 onwards CVE_CHECK_IGNORE += "CVE-2023-3439" @@ -7123,7 +7127,8 @@ CVE_CHECK_IGNORE += "CVE-2023-35824" # fixed-version: only affects 5.18rc1 onwards CVE_CHECK_IGNORE += "CVE-2023-35826" -# CVE-2023-35827 has no known resolution +# cpe-stable-backport: Backported in 5.10.199 +CVE_CHECK_IGNORE += "CVE-2023-35827" # cpe-stable-backport: Backported in 5.10.180 CVE_CHECK_IGNORE += "CVE-2023-35828" @@ -7201,7 +7206,8 @@ CVE_CHECK_IGNORE += "CVE-2023-3867" # cpe-stable-backport: Backported in 5.10.195 CVE_CHECK_IGNORE += "CVE-2023-39189" -# CVE-2023-39191 needs backporting (fixed from 6.3rc1) +# fixed-version: only affects 5.19rc1 onwards +CVE_CHECK_IGNORE += "CVE-2023-39191" # cpe-stable-backport: Backported in 5.10.195 CVE_CHECK_IGNORE += "CVE-2023-39192" @@ -7212,6 +7218,11 @@ CVE_CHECK_IGNORE += "CVE-2023-39193" # cpe-stable-backport: Backported in 5.10.192 CVE_CHECK_IGNORE += "CVE-2023-39194" +# cpe-stable-backport: Backported in 5.10.188 +CVE_CHECK_IGNORE += "CVE-2023-39197" + +# CVE-2023-39198 needs backporting (fixed from 6.5rc7) + # cpe-stable-backport: Backported in 5.10.188 CVE_CHECK_IGNORE += "CVE-2023-4004" @@ -7223,7 +7234,8 @@ CVE_CHECK_IGNORE += "CVE-2023-4015" # cpe-stable-backport: Backported in 5.10.190 CVE_CHECK_IGNORE += "CVE-2023-40283" -# CVE-2023-40791 needs backporting (fixed from 6.5rc6) +# fixed-version: only affects 6.3rc1 onwards +CVE_CHECK_IGNORE += "CVE-2023-40791" # cpe-stable-backport: Backported in 5.10.190 CVE_CHECK_IGNORE += "CVE-2023-4128" @@ -7253,7 +7265,8 @@ CVE_CHECK_IGNORE += "CVE-2023-4207" # cpe-stable-backport: Backported in 5.10.190 CVE_CHECK_IGNORE += "CVE-2023-4208" -# CVE-2023-4244 needs backporting (fixed from 5.10.198) +# cpe-stable-backport: Backported in 5.10.198 +CVE_CHECK_IGNORE += "CVE-2023-4244" # cpe-stable-backport: Backported in 5.10.190 CVE_CHECK_IGNORE += "CVE-2023-4273" @@ -7264,7 +7277,8 @@ CVE_CHECK_IGNORE += "CVE-2023-42752" # cpe-stable-backport: Backported in 5.10.195 CVE_CHECK_IGNORE += "CVE-2023-42753" -# CVE-2023-42754 needs backporting (fixed from 5.10.198) +# cpe-stable-backport: Backported in 5.10.198 +CVE_CHECK_IGNORE += "CVE-2023-42754" # cpe-stable-backport: Backported in 5.10.197 CVE_CHECK_IGNORE += "CVE-2023-42755" @@ -7290,7 +7304,8 @@ CVE_CHECK_IGNORE += "CVE-2023-44466" # cpe-stable-backport: Backported in 5.10.118 CVE_CHECK_IGNORE += "CVE-2023-4459" -# CVE-2023-4563 needs backporting (fixed from 5.10.198) +# cpe-stable-backport: Backported in 5.10.198 +CVE_CHECK_IGNORE += "CVE-2023-4563" # fixed-version: only affects 5.13rc1 onwards CVE_CHECK_IGNORE += "CVE-2023-4569" @@ -7298,14 +7313,16 @@ CVE_CHECK_IGNORE += "CVE-2023-4569" # cpe-stable-backport: Backported in 5.10.173 CVE_CHECK_IGNORE += "CVE-2023-45862" -# CVE-2023-45863 needs backporting (fixed from 6.3rc1) +# cpe-stable-backport: Backported in 5.10.200 +CVE_CHECK_IGNORE += "CVE-2023-45863" # cpe-stable-backport: Backported in 5.10.195 CVE_CHECK_IGNORE += "CVE-2023-45871" -# CVE-2023-45898 needs backporting (fixed from 6.6rc1) +# fixed-version: only affects 6.5rc1 onwards +CVE_CHECK_IGNORE += "CVE-2023-45898" -# CVE-2023-4610 has no known resolution +# CVE-2023-4610 needs backporting (fixed from 6.4) # fixed-version: only affects 6.4rc1 onwards CVE_CHECK_IGNORE += "CVE-2023-4611" @@ -7315,18 +7332,55 @@ CVE_CHECK_IGNORE += "CVE-2023-4611" # cpe-stable-backport: Backported in 5.10.195 CVE_CHECK_IGNORE += "CVE-2023-4623" +# cpe-stable-backport: Backported in 5.10.199 +CVE_CHECK_IGNORE += "CVE-2023-46813" + +# cpe-stable-backport: Backported in 5.10.202 +CVE_CHECK_IGNORE += "CVE-2023-46862" + +# CVE-2023-47233 has no known resolution + # cpe-stable-backport: Backported in 5.10.53 CVE_CHECK_IGNORE += "CVE-2023-4732" -# CVE-2023-4881 needs backporting (fixed from 5.10.198) +# cpe-stable-backport: Backported in 5.10.198 +CVE_CHECK_IGNORE += "CVE-2023-4881" # cpe-stable-backport: Backported in 5.10.195 CVE_CHECK_IGNORE += "CVE-2023-4921" -# CVE-2023-5158 has no known resolution +# fixed-version: only affects 6.0rc1 onwards +CVE_CHECK_IGNORE += "CVE-2023-5090" + +# fixed-version: only affects 5.13rc1 onwards +CVE_CHECK_IGNORE += "CVE-2023-5158" + +# cpe-stable-backport: Backported in 5.10.199 +CVE_CHECK_IGNORE += "CVE-2023-5178" -# CVE-2023-5197 needs backporting (fixed from 5.10.198) +# cpe-stable-backport: Backported in 5.10.198 +CVE_CHECK_IGNORE += "CVE-2023-5197" # fixed-version: only affects 6.1rc1 onwards CVE_CHECK_IGNORE += "CVE-2023-5345" +# fixed-version: only affects 6.2 onwards +CVE_CHECK_IGNORE += "CVE-2023-5633" + +# cpe-stable-backport: Backported in 5.10.199 +CVE_CHECK_IGNORE += "CVE-2023-5717" + +# CVE-2023-5972 needs backporting (fixed from 6.6rc7) + +# CVE-2023-6039 needs backporting (fixed from 6.5rc5) + +# fixed-version: only affects 6.6rc3 onwards +CVE_CHECK_IGNORE += "CVE-2023-6111" + +# CVE-2023-6121 needs backporting (fixed from 6.7rc3) + +# cpe-stable-backport: Backported in 5.10.195 +CVE_CHECK_IGNORE += "CVE-2023-6176" + +# CVE-2023-6238 has no known resolution + From patchwork Fri Dec 8 02:33:15 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 35910 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id AD9EAC46CA3 for ; Fri, 8 Dec 2023 02:33:59 +0000 (UTC) Received: from mail-pg1-f178.google.com (mail-pg1-f178.google.com [209.85.215.178]) by mx.groups.io with SMTP id smtpd.web10.11168.1702002832085840696 for ; Thu, 07 Dec 2023 18:33:52 -0800 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20230601.gappssmtp.com header.s=20230601 header.b=myH6qpVz; spf=softfail (domain: sakoman.com, ip: 209.85.215.178, mailfrom: steve@sakoman.com) Received: by mail-pg1-f178.google.com with SMTP id 41be03b00d2f7-5c230c79c0bso1197986a12.1 for ; Thu, 07 Dec 2023 18:33:52 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20230601.gappssmtp.com; s=20230601; t=1702002831; x=1702607631; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=vciU/I6JpB6/VKpIAHbE9zj2GA34sjHpL0dG9BPSI98=; b=myH6qpVz6tD5YPAu1RMtt5oo5R1eh1448N6AMkqt6yMDL99ZPiTGfOQpQlMeDTr9Pu E/bmVyHJiq/bzBjrXZoRi2Y6/Rk7+V5mpKuCNaAqpMuhG1fk6Q5oOX27UK3Rz50lf7wo PsfE95Q1djwf7kuJxgR8GImpieP+zw8KYVfHKo65baW/AawQ4YtfWZGxXlyKpvUgXSLe t1yE+mxCzZRn0VxaXROSJmq1WXfiXaQEVe5TmizpJJoXMwr/+qJOABeybHeF//CGP8ez Bg6UkTx3IJdH5D5REybXdKH9G4nEVpTfHAcaeLqhiQmyLoeTTUyDA6TGF+v3xwrS+duY Ergg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1702002831; x=1702607631; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=vciU/I6JpB6/VKpIAHbE9zj2GA34sjHpL0dG9BPSI98=; b=djVA3BzogREijO0ojLaKptWK8Jeeeg+kHZWarq1tRR3nl9uOz4O7WgWlk0PMHznUt9 VKKE9WmRPimHjaZ9Lv9hHK6dnUMnI8d7X8S2DpwmDa/vzMKEuzb9+0l4JS5RwHWhXv8z stiO9OT3S45a+6mvAFPtDipmYs0fWmAZ+8kIs8RUPFqGJK5b68ICCNR+2MwpUYvW/JZ4 WJidbNtKcwa+K8RsE7QeH8jUq4lq+/Zh5r2yoNMch6ACeKg0SHjGXP+NUTStX9bqBqXz 3DkSqSUOEUSNLGAo/nj9OGJJPiyRlIfnD9kxq8G8d+0auz784A/+qwvVGg31d9z+1gc6 3QSQ== X-Gm-Message-State: AOJu0YwJZ5RxozwNuzKn/LgjtXa4eSCpq1Sk+p+oyU+KrT4wPPc3KdSD jgintJ+wvM5wJF6RDV8ux4QjVvATeLvAwo9Eotk= X-Google-Smtp-Source: AGHT+IGnBLKHSzEZkh7p/KE3ZMZgWOAglTJOvJWv/kVe8hhAZZNKux+Eue91eafwsUTi00TPhheRXw== X-Received: by 2002:a05:6a20:a087:b0:18f:97c:ba1c with SMTP id r7-20020a056a20a08700b0018f097cba1cmr2582419pzj.118.1702002830759; Thu, 07 Dec 2023 18:33:50 -0800 (PST) Received: from hexa.lan (dhcp-72-234-108-41.hawaiiantel.net. [72.234.108.41]) by smtp.gmail.com with ESMTPSA id i11-20020a170902c94b00b001c9bc811d4dsm499752pla.295.2023.12.07.18.33.49 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 07 Dec 2023 18:33:50 -0800 (PST) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][kirkstone 09/15] bash: changes to SIGINT handler while waiting for a child Date: Thu, 7 Dec 2023 16:33:15 -1000 Message-Id: X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 08 Dec 2023 02:33:59 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/192001 From: Wenlin Kang It rarely observes the problem while running shell script aborting test repeatedly, at the problem, the test shell script never returns to shell Steps to reproduce: 1. Run test script and ctrl-c repeatedly 2. Observe whether returns to shell after ctrl-c Fixed issue: https://lists.gnu.org/archive/html/bug-bash/2023-10/msg00131.html Signed-off-by: Wenlin Kang Signed-off-by: Steve Sakoman --- ...T-handler-while-waiting-for-a-child-.patch | 229 ++++++++++++++++++ meta/recipes-extended/bash/bash_5.1.16.bb | 1 + 2 files changed, 230 insertions(+) create mode 100644 meta/recipes-extended/bash/bash/0001-changes-to-SIGINT-handler-while-waiting-for-a-child-.patch diff --git a/meta/recipes-extended/bash/bash/0001-changes-to-SIGINT-handler-while-waiting-for-a-child-.patch b/meta/recipes-extended/bash/bash/0001-changes-to-SIGINT-handler-while-waiting-for-a-child-.patch new file mode 100644 index 0000000000..c12b4b7766 --- /dev/null +++ b/meta/recipes-extended/bash/bash/0001-changes-to-SIGINT-handler-while-waiting-for-a-child-.patch @@ -0,0 +1,229 @@ +From 7e84276e07c0835a8729d6fe1265e70eedb2a7f7 Mon Sep 17 00:00:00 2001 +From: Chet Ramey +Date: Mon, 30 Oct 2023 12:16:07 -0400 +Subject: [PATCH] changes to SIGINT handler while waiting for a child; skip + vertical whitespace after translating an integer + +Upstream-Status: Backport +https://git.savannah.gnu.org/cgit/bash.git/commit/?h=devel&id=fe24a6a55e8850298b496c5b9d82f1866eba190e + +[Adjust and drop some codes to be applicable the tree] +Signed-off-by: Wenlin Kang +--- + general.c | 5 +++-- + jobs.c | 26 ++++++++++++++++---------- + tests/redir.right | 4 ++-- + tests/redir11.sub | 2 ++ + tests/type.right | 16 ++++++++-------- + tests/type.tests | 24 ++++++++++++------------ + 6 files changed, 43 insertions(+), 34 deletions(-) + +diff --git a/general.c b/general.c +index 50d5216..68987e2 100644 +--- a/general.c ++++ b/general.c +@@ -262,8 +262,9 @@ legal_number (string, result) + if (errno || ep == string) + return 0; /* errno is set on overflow or underflow */ + +- /* Skip any trailing whitespace, since strtoimax does not. */ +- while (whitespace (*ep)) ++ /* Skip any trailing whitespace, since strtoimax does not, using the same ++ test that strtoimax uses for leading whitespace. */ ++ while (isspace ((unsigned char) *ep)) + ep++; + + /* If *string is not '\0' but *ep is '\0' on return, the entire string +diff --git a/jobs.c b/jobs.c +index 7c3b6e8..84dab4d 100644 +--- a/jobs.c ++++ b/jobs.c +@@ -2727,6 +2727,10 @@ wait_for_background_pids (ps) + #define INVALID_SIGNAL_HANDLER (SigHandler *)wait_for_background_pids + static SigHandler *old_sigint_handler = INVALID_SIGNAL_HANDLER; + ++/* The current SIGINT handler as set by restore_sigint_handler. Only valid ++ immediately after restore_sigint_handler, used for continuations. */ ++static SigHandler *cur_sigint_handler = INVALID_SIGNAL_HANDLER; ++ + static int wait_sigint_received; + static int child_caught_sigint; + +@@ -2743,6 +2747,7 @@ wait_sigint_cleanup () + static void + restore_sigint_handler () + { ++ cur_sigint_handler = old_sigint_handler; + if (old_sigint_handler != INVALID_SIGNAL_HANDLER) + { + set_signal_handler (SIGINT, old_sigint_handler); +@@ -2766,8 +2771,7 @@ wait_sigint_handler (sig) + restore_sigint_handler (); + /* If we got a SIGINT while in `wait', and SIGINT is trapped, do + what POSIX.2 says (see builtins/wait.def for more info). */ +- if (this_shell_builtin && this_shell_builtin == wait_builtin && +- signal_is_trapped (SIGINT) && ++ if (signal_is_trapped (SIGINT) && + ((sigint_handler = trap_to_sighandler (SIGINT)) == trap_handler)) + { + trap_handler (SIGINT); /* set pending_traps[SIGINT] */ +@@ -2792,6 +2796,8 @@ wait_sigint_handler (sig) + { + set_exit_status (128+SIGINT); + restore_sigint_handler (); ++ if (cur_sigint_handler == INVALID_SIGNAL_HANDLER) ++ set_sigint_handler (); /* XXX - only do this in one place */ + kill (getpid (), SIGINT); + } + +@@ -2934,15 +2940,15 @@ wait_for (pid, flags) + { + SigHandler *temp_sigint_handler; + +- temp_sigint_handler = set_signal_handler (SIGINT, wait_sigint_handler); +- if (temp_sigint_handler == wait_sigint_handler) +- { ++ temp_sigint_handler = old_sigint_handler; ++ old_sigint_handler = set_signal_handler (SIGINT, wait_sigint_handler); ++ if (old_sigint_handler == wait_sigint_handler) ++ { + #if defined (DEBUG) +- internal_warning ("wait_for: recursively setting old_sigint_handler to wait_sigint_handler: running_trap = %d", running_trap); ++ internal_debug ("wait_for: recursively setting old_sigint_handler to wait_sigint_handler: running_trap = %d", running_trap); + #endif +- } +- else +- old_sigint_handler = temp_sigint_handler; ++ old_sigint_handler = temp_sigint_handler; ++ } + waiting_for_child = 0; + if (old_sigint_handler == SIG_IGN) + set_signal_handler (SIGINT, old_sigint_handler); +@@ -4148,7 +4154,7 @@ set_job_status_and_cleanup (job) + SIGINT (if we reset the sighandler to the default). + In this case, we have to fix things up. What a crock. */ + if (temp_handler == trap_handler && signal_is_trapped (SIGINT) == 0) +- temp_handler = trap_to_sighandler (SIGINT); ++ temp_handler = trap_to_sighandler (SIGINT); + restore_sigint_handler (); + if (temp_handler == SIG_DFL) + termsig_handler (SIGINT); /* XXX */ +diff --git a/tests/redir.right b/tests/redir.right +index 8db1041..9e1403c 100644 +--- a/tests/redir.right ++++ b/tests/redir.right +@@ -154,10 +154,10 @@ foo + 1 + 7 + after: 42 +-./redir11.sub: line 53: $(ss= declare -i ss): ambiguous redirect ++./redir11.sub: line 55: $(ss= declare -i ss): ambiguous redirect + after: 42 + a+=3 + foo + foo +-./redir11.sub: line 75: 42: No such file or directory ++./redir11.sub: line 77: 42: No such file or directory + 42 +diff --git a/tests/redir11.sub b/tests/redir11.sub +index d417cdb..2a9f2b8 100644 +--- a/tests/redir11.sub ++++ b/tests/redir11.sub +@@ -56,6 +56,8 @@ foo() + a=4 b=7 foo + echo after: $a + ++exec 7>&- 4>&- ++ + unset a + typeset -i a + a=4 eval echo $(echo a+=3) +diff --git a/tests/type.right b/tests/type.right +index f876715..c09ab73 100644 +--- a/tests/type.right ++++ b/tests/type.right +@@ -24,15 +24,15 @@ func () + } + while + while is a shell keyword +-./type.tests: line 56: type: m: not found +-alias m='more' +-alias m='more' +-m is aliased to `more' ++./type.tests: line 56: type: morealias: not found ++alias morealias='more' ++alias morealias='more' ++morealias is aliased to `more' + alias +-alias m='more' +-alias m='more' +-alias m='more' +-m is aliased to `more' ++alias morealias='more' ++alias morealias='more' ++alias morealias='more' ++morealias is aliased to `more' + builtin + builtin is a shell builtin + /bin/sh +diff --git a/tests/type.tests b/tests/type.tests +index fd39c18..ddc1540 100644 +--- a/tests/type.tests ++++ b/tests/type.tests +@@ -25,8 +25,6 @@ type -r ${THIS_SH} + type notthere + command -v notthere + +-alias m=more +- + unset -f func 2>/dev/null + func() { echo this is func; } + +@@ -49,24 +47,26 @@ command -V func + command -v while + command -V while + ++alias morealias=more ++ + # the following two lines should produce the same output + # post-3.0 patch makes command -v silent, as posix specifies + # first test with alias expansion off (should all fail or produce no output) +-type -t m +-type m +-command -v m ++type -t morealias ++type morealias ++command -v morealias + alias -p +-alias m ++alias morealias + + # then test with alias expansion on + shopt -s expand_aliases +-type m +-type -t m +-command -v m ++type morealias ++type -t morealias ++command -v morealias + alias -p +-alias m ++alias morealias + +-command -V m ++command -V morealias + shopt -u expand_aliases + + command -v builtin +@@ -76,7 +76,7 @@ command -V /bin/sh + + unset -f func + type func +-unalias m ++unalias morealias + type m + + hash -r +-- +2.25.1 + diff --git a/meta/recipes-extended/bash/bash_5.1.16.bb b/meta/recipes-extended/bash/bash_5.1.16.bb index 11c2314fbf..ab1ecffb3d 100644 --- a/meta/recipes-extended/bash/bash_5.1.16.bb +++ b/meta/recipes-extended/bash/bash_5.1.16.bb @@ -16,6 +16,7 @@ SRC_URI = "${GNU_MIRROR}/bash/${BP}.tar.gz;name=tarball \ file://makerace.patch \ file://makerace2.patch \ file://CVE-2022-3715.patch \ + file://0001-changes-to-SIGINT-handler-while-waiting-for-a-child-.patch \ " SRC_URI[tarball.sha256sum] = "5bac17218d3911834520dad13cd1f85ab944e1c09ae1aba55906be1f8192f558" From patchwork Fri Dec 8 02:33:16 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 35912 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id B9865C46CC5 for ; Fri, 8 Dec 2023 02:33:59 +0000 (UTC) Received: from mail-pg1-f175.google.com (mail-pg1-f175.google.com [209.85.215.175]) by mx.groups.io with SMTP id smtpd.web11.11246.1702002834002646573 for ; Thu, 07 Dec 2023 18:33:54 -0800 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20230601.gappssmtp.com header.s=20230601 header.b=RMeca3oN; spf=softfail (domain: sakoman.com, ip: 209.85.215.175, mailfrom: steve@sakoman.com) Received: by mail-pg1-f175.google.com with SMTP id 41be03b00d2f7-5c5fb06b131so1191333a12.0 for ; Thu, 07 Dec 2023 18:33:53 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20230601.gappssmtp.com; s=20230601; t=1702002833; x=1702607633; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=tYlzdUCflPgalEV6mKxqJf2Ex9L5WQ8f25frPDaS+1E=; b=RMeca3oNFF8nrfFv12xLjZJAX0nnXK+iuGBEwZELSo++U0yR4o0xK33vb1ZGlvDXhf oMK3eHrk8deGTnXsyrH84gnLf5F/wrH4qJl5L0wWNrnN2BnMqnj8eK1MgyqNuA0ERc6w MDqizvW253VSgDhy82Ccsg+Mk79DwKMPn+lHuLubkpDSdNjXVY+5S42DBDAIj7I+F8Ys eJ0VeMe6H0EgjmhxR1Ea7/v7SkpRaGWMDahK6bC1vqFpV1sgSVTCQ7Q/rhlktkg62F1e Jb+WvhROFGXHKvg0DeK8MlEjScsuvZ/6MRtIXGoueIl7sdrDFhIvtw4aXafTBXBcvsOF oxKA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1702002833; x=1702607633; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=tYlzdUCflPgalEV6mKxqJf2Ex9L5WQ8f25frPDaS+1E=; b=LodzRStfkx+/otfF9umQEhhwHaZ6GQeDOcxXIQYyw6Ya3B97XPU79QiXZiy2IriOAu 44CCKsJqBse83mFV3hUrovivE6Nux2Fm+f92A6dntFsb9/unkE3ul/xxo4PF78XB+xNO sp7RTd6HFvJD0n00dAe5Esut94g0PbfEcUt2TsV1g4LkR6+xVrco39aNqKrXHkUv/kyY IEOQlkFnCN1mbx2RyYkBdfMS6TXh99nXbRHP+sqYyWZH8WrqkHJvgPk0VWJt5lzt3gpG vV9GHpgYcX0JEtzpZLFYIedR82t/u7/cn+jPKtRO7CVRI6SbDkiSQewYan9JXVnQLNTq dyIA== X-Gm-Message-State: AOJu0Yx8AhgZ9khUYrN8VyMBjuIqsCueDyu26cN+sy1EjvjyAsVmCU8b jTJRXYPoCtEmm4sqhinV4vwvgFGQlrCKaMxEx1Y= X-Google-Smtp-Source: AGHT+IGmKv9Q2hwi25l3iDZE9sa6hqzwsjPxHvp/CgCiBiYinKmSYVTDrZIXCxlKJoEymR72hySI3w== X-Received: by 2002:a05:6a20:2c88:b0:18f:b99d:df9d with SMTP id g8-20020a056a202c8800b0018fb99ddf9dmr2377808pzj.120.1702002832725; Thu, 07 Dec 2023 18:33:52 -0800 (PST) Received: from hexa.lan (dhcp-72-234-108-41.hawaiiantel.net. [72.234.108.41]) by smtp.gmail.com with ESMTPSA id i11-20020a170902c94b00b001c9bc811d4dsm499752pla.295.2023.12.07.18.33.51 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 07 Dec 2023 18:33:52 -0800 (PST) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][kirkstone 10/15] rust-llvm: Allow overriding LLVM target archs Date: Thu, 7 Dec 2023 16:33:16 -1000 Message-Id: <93458c302938bf704e8e9f14dfdfee57454adf7a.1702002667.git.steve@sakoman.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 08 Dec 2023 02:33:59 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/192002 From: Niko Mauno Move the default value into a variable which can be overridden to match more accurately the use case specific scenario. (From OE-Core rev: 645370e85d8742d0614cd52ca7507b5df2d38ad8) Signed-off-by: Niko Mauno Signed-off-by: Alexandre Belloni Signed-off-by: Richard Purdie Signed-off-by: Steve Sakoman --- meta/recipes-devtools/rust/rust-llvm.inc | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/meta/recipes-devtools/rust/rust-llvm.inc b/meta/recipes-devtools/rust/rust-llvm.inc index e645e7a7ac..416a07cd40 100644 --- a/meta/recipes-devtools/rust/rust-llvm.inc +++ b/meta/recipes-devtools/rust/rust-llvm.inc @@ -25,9 +25,11 @@ CXXFLAGS:remove = "-g" LLVM_DIR = "llvm${LLVM_RELEASE}" +RUST_LLVM_TARGETS ?= "ARM;AArch64;Mips;PowerPC;RISCV;X86" + EXTRA_OECMAKE = " \ -DCMAKE_BUILD_TYPE=Release \ - -DLLVM_TARGETS_TO_BUILD='ARM;AArch64;Mips;PowerPC;RISCV;X86' \ + -DLLVM_TARGETS_TO_BUILD='${RUST_LLVM_TARGETS}' \ -DLLVM_BUILD_DOCS=OFF \ -DLLVM_ENABLE_TERMINFO=OFF \ -DLLVM_ENABLE_ZLIB=OFF \ From patchwork Fri Dec 8 02:33:17 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 35913 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id C6307C10F04 for ; Fri, 8 Dec 2023 02:33:59 +0000 (UTC) Received: from mail-pj1-f46.google.com (mail-pj1-f46.google.com [209.85.216.46]) by mx.groups.io with SMTP id smtpd.web10.11173.1702002835759874529 for ; Thu, 07 Dec 2023 18:33:55 -0800 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20230601.gappssmtp.com header.s=20230601 header.b=nlbHeJz0; spf=softfail (domain: sakoman.com, ip: 209.85.216.46, mailfrom: steve@sakoman.com) Received: by mail-pj1-f46.google.com with SMTP id 98e67ed59e1d1-286fb44eb16so1317881a91.3 for ; Thu, 07 Dec 2023 18:33:55 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20230601.gappssmtp.com; s=20230601; t=1702002834; x=1702607634; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=SqxpUumbwSNHKzpl4XXrPiaxxhuLgYRJhll3f4mTPIE=; b=nlbHeJz0DIzx04TTue2C2Ae+pQTBXyk1fTn2jrT5GOm9FlMwHu3A9HYjBS8VUbinxz pFxNSWORG57u5m0yDe4oGsnMVkUJYLMgwZPjHouZ9M0+8GElFjFe/5LaYjqPEa70XTJy blBzg92V3zIydtLVuDWDVA4TCBNfWmgVrRE6OS+cObklHVBK3MDsOGOtvMmOfRA3yUuU Km0u6GCZqzEmVVc4yjPJ9bjCRWjS8GYKKpUDQHDloa7Vlm4p2g+Juzx+La0CWeQc9GtQ 7gv9M9j3FXoytu7DCGaDXORW4rG86FzR9tIxeCxmnc+zauubemK2aD82OJS+yhYISQhh q9cQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1702002834; x=1702607634; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=SqxpUumbwSNHKzpl4XXrPiaxxhuLgYRJhll3f4mTPIE=; b=QmspUrimwfuzhm2+HmEDJQKmku8GVXZotJT2VsVy7N/xNFf8tKYz8nzcQPegENDnaK Gh1HiXCRjiFb6sgaqMk5vdZBolDyv/Vswrai+ZWWaBYsjRIajoduDEslIhNEApM8bkIS +SfPs/V72X9dg0jmK5gS+jDwZLNDpmv55G6EdAjl8i6dt81I0eIWqS8xSekdCkWIHRP3 o5jOeot112h/4RKKvpQk/LF9WgyUcS94r2xwN+sjTIw2mRjyDjECVoL12ZNyGFCZUmVa e6kUv/mFUgAo8NWLOFxC+KtYMRv7l5nrLZ7G9HaUEUnjuKB6DYdNSiLDHAQf2FVejR/s 3XbA== X-Gm-Message-State: AOJu0YxlTBs9GsQneCd8JfGXuEnvfT1lFfns3524SFl9L52BJQq9hY/6 UvjLB3Ky4s9746zYnV+sTiRSKlayANCkOTkNG8Q= X-Google-Smtp-Source: AGHT+IExWJjVmuQ+cUrhrYVbhZlBnI6DkJ5ubOmj7iNUHCApU+hB2uAbbbGlDFTVfpeXdqswpBN2XQ== X-Received: by 2002:a17:90b:3686:b0:286:6cc1:28d with SMTP id mj6-20020a17090b368600b002866cc1028dmr3253476pjb.88.1702002834489; Thu, 07 Dec 2023 18:33:54 -0800 (PST) Received: from hexa.lan (dhcp-72-234-108-41.hawaiiantel.net. [72.234.108.41]) by smtp.gmail.com with ESMTPSA id i11-20020a170902c94b00b001c9bc811d4dsm499752pla.295.2023.12.07.18.33.53 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 07 Dec 2023 18:33:54 -0800 (PST) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][kirkstone 11/15] rust-common: Set llvm-target correctly for cross SDK targets Date: Thu, 7 Dec 2023 16:33:17 -1000 Message-Id: X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 08 Dec 2023 02:33:59 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/192003 From: Richard Purdie When a 'BUILD' target is requested we shouldn't be looking at TARGET_SYS but at BUILD_SYS. Due to the way rust mangles triplets, we need the HOST_SYS triplet to work with existing code - fixing that issue is a separate patch. Also drop the arch_abi argument, it doens't make any sense to a getVar() call and was a copy and paste error. Based on a patch from Otavio Salvador but separated out and tweaked. Fixes: bd36593ba3 ("rust-common: Drop LLVM_TARGET and simplify") Signed-off-by: Richard Purdie (cherry picked from commit d554161a045d12411f288394e253c54aa4c1257c) Signed-off-by: Jermain Horsman Signed-off-by: Steve Sakoman --- meta/recipes-devtools/rust/rust-common.inc | 6 +++++- 1 file changed, 5 insertions(+), 1 deletion(-) diff --git a/meta/recipes-devtools/rust/rust-common.inc b/meta/recipes-devtools/rust/rust-common.inc index db0bd8fc1b..ac00fd3d43 100644 --- a/meta/recipes-devtools/rust/rust-common.inc +++ b/meta/recipes-devtools/rust/rust-common.inc @@ -307,9 +307,13 @@ def rust_gen_target(d, thing, wd, features, cpu, arch, abi=""): features = features or d.getVarFlag('FEATURES', arch_abi) or "" features = features.strip() + llvm_target = d.getVar('RUST_TARGET_SYS') + if thing == "BUILD": + llvm_target = d.getVar('RUST_HOST_SYS') + # build tspec tspec = {} - tspec['llvm-target'] = d.getVar('RUST_TARGET_SYS', arch_abi) + tspec['llvm-target'] = llvm_target tspec['data-layout'] = d.getVarFlag('DATA_LAYOUT', arch_abi) tspec['max-atomic-width'] = int(d.getVarFlag('MAX_ATOMIC_WIDTH', arch_abi)) tspec['target-pointer-width'] = d.getVarFlag('TARGET_POINTER_WIDTH', arch_abi) From patchwork Fri Dec 8 02:33:18 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 35914 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id B9823C10F07 for ; Fri, 8 Dec 2023 02:33:59 +0000 (UTC) Received: from mail-pg1-f172.google.com (mail-pg1-f172.google.com [209.85.215.172]) by mx.groups.io with SMTP id smtpd.web11.11252.1702002837027311756 for ; Thu, 07 Dec 2023 18:33:57 -0800 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20230601.gappssmtp.com header.s=20230601 header.b=IRNYHP3k; spf=softfail (domain: sakoman.com, ip: 209.85.215.172, mailfrom: steve@sakoman.com) Received: by mail-pg1-f172.google.com with SMTP id 41be03b00d2f7-5c5fb06b131so1191353a12.0 for ; Thu, 07 Dec 2023 18:33:56 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20230601.gappssmtp.com; s=20230601; t=1702002836; x=1702607636; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=qHFZ5HhpSMd7lTWdPdlidq3Nhg0WpDbAC4ragDW4xxs=; b=IRNYHP3kUrKrRiGMJ7URJXseqPZkowBzXrQqSUbh4xbZSpFW8UhQ7/vYoy5J5j59lJ dmGZdIs+GTpcyQCWDVaZEcnGrGV1oPuDWGdaho2TtQXFJqM+u4+1ywCaqNEbz0aVDhO2 fw7G2WgnuuzSSG7F9hcLHnaTRi6HjS/NXI6MPsStQB5p8ohxX6kfliW5tfY3hiKShfNx 4q9CFSKaPKt95Fhb+Oj6kmZcQu3G/hywc5HukLSfU6HBFVPm9Wsd3wGm8NwPY8tg4F/3 KlJM5V/6/DnzaAD/ixlEdSvvxjLjx8T6bjKVVTPraBf00+FmoGw0+vmvCaS+SoNJkZg7 mhUA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1702002836; x=1702607636; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=qHFZ5HhpSMd7lTWdPdlidq3Nhg0WpDbAC4ragDW4xxs=; b=tSc58FhDhEm36HSpK53hEYN6yKYDMRIrNBKTtrG18iY/EZV/m+M6Tg2LVN2571VQoI PJO/xbgBZ72wZkYY9p2Md2P6gWYaZhgUDvc0l790bU7rRxFEXZn+OtKvU05YsC2HL/3J BKLhAHEHrIsqD2QD1bQD0KXoeYzY+9L3HCwfujV+26u2UxxfjW8qh7Vstmk16wRGtU2u vgjH4gn58GtaAFwt84fI+gvMK8BfswV0g4oXTSrLPD37Sfirpbg51AAhZu2+kffFl9U2 gOwnkqyGUuJUAYpIMO0crtOqfmRhKhu/HurBxYMR2H61XKeQKfIUQlsW3mIaqdzY4/nt /ZJA== X-Gm-Message-State: AOJu0YwPkfvWM+aYv/Qm1kosdCtfz0z6EX8TMifHEGsCX8a4iDkq10rH aNz/qmNgThqxG58ZTOyGSQQgsgQyFNesyRRgH7I= X-Google-Smtp-Source: AGHT+IHoRyoj3wck1xASqipExs4kbIb6wmI3sh4qU/ylMj2bw5jrNhKbLZ+7NHGWONgU3/REhmJ7nA== X-Received: by 2002:a17:902:d50b:b0:1d0:969b:4bdf with SMTP id b11-20020a170902d50b00b001d0969b4bdfmr2900167plg.108.1702002836188; Thu, 07 Dec 2023 18:33:56 -0800 (PST) Received: from hexa.lan (dhcp-72-234-108-41.hawaiiantel.net. [72.234.108.41]) by smtp.gmail.com with ESMTPSA id i11-20020a170902c94b00b001c9bc811d4dsm499752pla.295.2023.12.07.18.33.55 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 07 Dec 2023 18:33:55 -0800 (PST) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][kirkstone 12/15] rust-cross-canadian: Fix ordering of target json config generation Date: Thu, 7 Dec 2023 16:33:18 -1000 Message-Id: X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 08 Dec 2023 02:33:59 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/192004 From: Richard Purdie Based upon a patch from Otavio Salvador , ensure the target json files are written in the correct order with the most specific last incase it overwrites earlier files if the prefixes match. Signed-off-by: Richard Purdie (cherry picked from commit 1912c4e9e0ecf9655f3b3a41588b54d7956f5899) Signed-off-by: Jermain Horsman Signed-off-by: Steve Sakoman --- meta/recipes-devtools/rust/rust-cross-canadian-common.inc | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) diff --git a/meta/recipes-devtools/rust/rust-cross-canadian-common.inc b/meta/recipes-devtools/rust/rust-cross-canadian-common.inc index 1f21c8af26..df4901f1fa 100644 --- a/meta/recipes-devtools/rust/rust-cross-canadian-common.inc +++ b/meta/recipes-devtools/rust/rust-cross-canadian-common.inc @@ -27,9 +27,10 @@ DEBUG_PREFIX_MAP = "-fdebug-prefix-map=${WORKDIR}=/usr/src/debug/${PN}/${EXTENDP python do_rust_gen_targets () { wd = d.getVar('WORKDIR') + '/targets/' - rust_gen_target(d, 'TARGET', wd, d.getVar('TARGET_LLVM_FEATURES') or "", d.getVar('TARGET_LLVM_CPU'), d.getVar('TARGET_ARCH')) - rust_gen_target(d, 'HOST', wd, "", "generic", d.getVar('HOST_ARCH')) + # Order of BUILD, HOST, TARGET is important in case the files overwrite, most specific last rust_gen_target(d, 'BUILD', wd, "", "generic", d.getVar('BUILD_ARCH')) + rust_gen_target(d, 'HOST', wd, "", "generic", d.getVar('HOST_ARCH')) + rust_gen_target(d, 'TARGET', wd, d.getVar('TARGET_LLVM_FEATURES') or "", d.getVar('TARGET_LLVM_CPU'), d.getVar('TARGET_ARCH')) } INHIBIT_DEFAULT_RUST_DEPS = "1" From patchwork Fri Dec 8 02:33:19 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 35915 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id D4AF8C46CCD for ; Fri, 8 Dec 2023 02:33:59 +0000 (UTC) Received: from mail-pl1-f177.google.com (mail-pl1-f177.google.com [209.85.214.177]) by mx.groups.io with SMTP id smtpd.web10.11182.1702002838716761098 for ; Thu, 07 Dec 2023 18:33:58 -0800 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20230601.gappssmtp.com header.s=20230601 header.b=2LQDndTu; spf=softfail (domain: sakoman.com, ip: 209.85.214.177, mailfrom: steve@sakoman.com) Received: by mail-pl1-f177.google.com with SMTP id d9443c01a7336-1d06819a9cbso12653385ad.1 for ; Thu, 07 Dec 2023 18:33:58 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20230601.gappssmtp.com; s=20230601; t=1702002838; x=1702607638; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=5V1/HstD7vIdY0yygkF+I4TALISNce8RXHHplUIcH0A=; b=2LQDndTuLC0Ffak7E4P18bzrf1t0FKAiKEDppyU/Nssd6/9eJ1cabrcwIxHeRtsk41 6Y8NIeWvnF+Yt1k0KTZ4XappoA/6tS4B4JiqrsJHVMeGrx81pQ8Y8j0R6B4b0q7Xhx8W df1NPwQGXPRLbBKjE6yjfFcRCF+t1THZRnR354IMveTO/kOzW4/sgRm0SNo5qlmTmpFi Z+2XLqrshwi1rlAb6ar4eNJSgzqWFzsYPP1NimKZGFGWTqIcYFWtpWMxGoQTfxgf+k4X GWWWcGtBVamRQw6GitmCAMEjQaLfZuPywNnYyvVbK4TF/JUZq01EdcaOIPvUqzfxSD9o fRfQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1702002838; x=1702607638; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=5V1/HstD7vIdY0yygkF+I4TALISNce8RXHHplUIcH0A=; b=sBK3t8JgKvRIj4j5gKWH5xtQqF+PHlHtTqFHNr+5/hAKbYhi3cPtDyMPPz/VefZfPX H+tIgSrXovUMuB8oFMn5ERBAAT+lpFRrql82adTR0CdlwNvsjJ/KaOdl7W0b8iV2L1zL EkXFEzynCILmn17I7dIL/Wbn9vy2iVrDUVuBgf91GYH9HJ4gHhufJ62S17JoNuBR2xOK TMC713Mnz2vrTNztaAN6Jd7bh2lQIcjSanfcQj17+t6FoY3pUCnUC5MQfZqIl+mo83ZZ eGKLtcSug//8gjLXdU5ZpX8s1GtlFmmJAd/Mzo6LflFP423DppaMkbiMcsnJ4FAOzFMR RGdQ== X-Gm-Message-State: AOJu0YwSATAhHqitSqFN05w8RSerY6FPmZWpvOuoFhwhdsCt8ucNcAfa UTVPuY2C9OcvAwoBbPSyWiF7GD2tghuPiXOYRSs= X-Google-Smtp-Source: AGHT+IFTTEV8SGqY/hxjcOtImKXubvDR6K/h1xgsx0BT7s+tkgPVSA8+STRUwqyh02Hy6e9A6qb+OQ== X-Received: by 2002:a17:902:f54f:b0:1d0:c849:780 with SMTP id h15-20020a170902f54f00b001d0c8490780mr3526833plf.70.1702002837857; Thu, 07 Dec 2023 18:33:57 -0800 (PST) Received: from hexa.lan (dhcp-72-234-108-41.hawaiiantel.net. [72.234.108.41]) by smtp.gmail.com with ESMTPSA id i11-20020a170902c94b00b001c9bc811d4dsm499752pla.295.2023.12.07.18.33.57 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 07 Dec 2023 18:33:57 -0800 (PST) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][kirkstone 13/15] rust-cross/rust-common: Merge arm target handling code to fix cross-canadian Date: Thu, 7 Dec 2023 16:33:19 -1000 Message-Id: <0adada8111c17e8e5a7c32cef86bdb8e7dfd79d3.1702002667.git.steve@sakoman.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 08 Dec 2023 02:33:59 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/192005 From: Richard Purdie rust-cross had special handling for armv7 targets but we also need this for cross-canadian. Merge the code into the main function so everything is consistent. Also then fix the arm definition to be arm-eabi since ABI is correctly being looked up. Signed-off-by: Richard Purdie (cherry picked from commit ff3c3dbbd2bf1bb7bb70b55cca203e9eedcf14a8) Signed-off-by: Jermain Horsman Signed-off-by: Steve Sakoman --- meta/recipes-devtools/rust/rust-common.inc | 6 ++++++ meta/recipes-devtools/rust/rust-cross.inc | 7 +------ 2 files changed, 7 insertions(+), 6 deletions(-) diff --git a/meta/recipes-devtools/rust/rust-common.inc b/meta/recipes-devtools/rust/rust-common.inc index ac00fd3d43..3252827818 100644 --- a/meta/recipes-devtools/rust/rust-common.inc +++ b/meta/recipes-devtools/rust/rust-common.inc @@ -297,6 +297,12 @@ def rust_gen_target(d, thing, wd, features, cpu, arch, abi=""): sys = sys_for(d, thing) prefix = prefix_for(d, thing) + if thing == "TARGET": + abi = d.getVar('ABIEXTENSION') + # arm and armv7 have different targets in llvm + if arch == "arm" and target_is_armv7(d): + arch = 'armv7' + rust_arch = oe.rust.arch_to_rust_arch(arch) if abi: diff --git a/meta/recipes-devtools/rust/rust-cross.inc b/meta/recipes-devtools/rust/rust-cross.inc index f6babfeeda..4c026b1f38 100644 --- a/meta/recipes-devtools/rust/rust-cross.inc +++ b/meta/recipes-devtools/rust/rust-cross.inc @@ -8,15 +8,10 @@ python do_rust_gen_targets () { features = "" cpu = "generic" arch = d.getVar('{}_ARCH'.format(thing)) - abi = "" if thing is "TARGET": - abi = d.getVar('ABIEXTENSION') - # arm and armv7 have different targets in llvm - if arch == "arm" and target_is_armv7(d): - arch = 'armv7' features = d.getVar('TARGET_LLVM_FEATURES') or "" cpu = d.getVar('TARGET_LLVM_CPU') - rust_gen_target(d, thing, wd, features, cpu, arch, abi) + rust_gen_target(d, thing, wd, features, cpu, arch) } # Otherwise we'll depend on what we provide From patchwork Fri Dec 8 02:33:20 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 35917 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id CD346C10F04 for ; Fri, 8 Dec 2023 02:34:09 +0000 (UTC) Received: from mail-pl1-f182.google.com (mail-pl1-f182.google.com [209.85.214.182]) by mx.groups.io with SMTP id smtpd.web10.11192.1702002840382927915 for ; Thu, 07 Dec 2023 18:34:00 -0800 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20230601.gappssmtp.com header.s=20230601 header.b=zZ656mwq; spf=softfail (domain: sakoman.com, ip: 209.85.214.182, mailfrom: steve@sakoman.com) Received: by mail-pl1-f182.google.com with SMTP id d9443c01a7336-1d03bcf27e9so13954485ad.0 for ; Thu, 07 Dec 2023 18:34:00 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20230601.gappssmtp.com; s=20230601; t=1702002839; x=1702607639; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=GbZWjCJeNz7JUi2hUUUuL+hRp4ZJpjzoWNot+JHRL0k=; b=zZ656mwq3k4EOxdbQXMA0oLoNV0pO00vtIi0Lkmh58fIJTw4W2Bkc9p02ji0cJuoCS PvXWLFcHKWuyNX4uZyCFydVgQEnjDb2I3XhZVjGQcZt3cq5cUX9il+h7tgbbtMEEq4d1 JBY22egf5cfDx2kQCir0uhKNRjfpzoDvxrTkoti1Nj9lKdavNwA8sJKKt3eUsQaAS8Ax 8Q8zehl6G1vNwj/IdwF+LWmyjHMlANWffKFaZWeQ5n/25qMzPKyHQ983mlOTcXPiI5hD nJApGEZOQTd+jiv3/oG6PRiH5ZnmOU2otc3PIdB9XkriBfm5ccXRUsnFzckAWEPEGodd 2MiQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1702002839; x=1702607639; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=GbZWjCJeNz7JUi2hUUUuL+hRp4ZJpjzoWNot+JHRL0k=; b=XpCH0AsVjBEe+5plWp70Ecj9RZ/+f3+eBcBaVqLXdwYn078BplaY67zy+ErwmtdBld DFT9XhWWWGysUvYs1kRh7o6LuFr1LRV7ERCrzizZD8wILuIeoR6VZzKJJdgBLD1epKDQ yZbcVLWRndblBCaZjmhf3YlsNNkQnKGgLhOD9c76Gf07I3IE/hXMCJr+EVqDDooxxC3X UNXfm5Q4nLGczxiFOEbJZCLbS1zh8VrckZN40VEuU/bNoRkVbBfozTtDurz1CPuOYxZj A+vaIaHWOlg+hS1hxMoRoelc+JJA7IMF+rhlQZRGb0zHfL4O4zZuJJGe+pqYeUK3Mqew SIaw== X-Gm-Message-State: AOJu0YxeJbDNF8gqv0s6K8ATUOee0tS5PsZK2dPJbG0RQYXgqftex+aO tUjiS6sVkRtaRxM25RLn45kmTZuT2qnTCTnXfL8= X-Google-Smtp-Source: AGHT+IH2l20ApJeuLPeXnBFdCz2uJZbaUjDOoCUJZCLxDaEsFVfPI2ykb2nclK9dBmJ0d5TQwfAHUg== X-Received: by 2002:a17:903:1104:b0:1cf:51f9:197b with SMTP id n4-20020a170903110400b001cf51f9197bmr3512781plh.23.1702002839490; Thu, 07 Dec 2023 18:33:59 -0800 (PST) Received: from hexa.lan (dhcp-72-234-108-41.hawaiiantel.net. [72.234.108.41]) by smtp.gmail.com with ESMTPSA id i11-20020a170902c94b00b001c9bc811d4dsm499752pla.295.2023.12.07.18.33.58 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 07 Dec 2023 18:33:59 -0800 (PST) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][kirkstone 14/15] rust-cross: Simplfy the rust_gen_target calls Date: Thu, 7 Dec 2023 16:33:20 -1000 Message-Id: <9fb5f81f58306b2d355049698b6a17d045bd5e1e.1702002667.git.steve@sakoman.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 08 Dec 2023 02:34:09 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/192006 From: Richard Purdie Match the code in rust-cross-canadian so that further simplifications can be considered in future. Signed-off-by: Richard Purdie (cherry picked from commit 5cb62d0a33777cb9afb1eea5f736a2580ce50dc7) Signed-off-by: Jermain Horsman Signed-off-by: Steve Sakoman --- meta/recipes-devtools/rust/rust-common.inc | 12 ++++++------ meta/recipes-devtools/rust/rust-cross.inc | 16 ++++------------ 2 files changed, 10 insertions(+), 18 deletions(-) diff --git a/meta/recipes-devtools/rust/rust-common.inc b/meta/recipes-devtools/rust/rust-common.inc index 3252827818..a73367bbd5 100644 --- a/meta/recipes-devtools/rust/rust-common.inc +++ b/meta/recipes-devtools/rust/rust-common.inc @@ -119,12 +119,12 @@ def llvm_features(d): ## arm-unknown-linux-gnueabihf -DATA_LAYOUT[arm] = "e-m:e-p:32:32-i64:64-v128:64:128-a:0:32-n32-S64" -TARGET_ENDIAN[arm] = "little" -TARGET_POINTER_WIDTH[arm] = "32" -TARGET_C_INT_WIDTH[arm] = "32" -MAX_ATOMIC_WIDTH[arm] = "64" -FEATURES[arm] = "+v6,+vfp2" +DATA_LAYOUT[arm-eabi] = "e-m:e-p:32:32-i64:64-v128:64:128-a:0:32-n32-S64" +TARGET_ENDIAN[arm-eabi] = "little" +TARGET_POINTER_WIDTH[arm-eabi] = "32" +TARGET_C_INT_WIDTH[arm-eabi] = "32" +MAX_ATOMIC_WIDTH[arm-eabi] = "64" +FEATURES[arm-eabi] = "+v6,+vfp2" ## armv7-unknown-linux-gnueabihf DATA_LAYOUT[armv7-eabi] = "e-m:e-p:32:32-i64:64-v128:64:128-a:0:32-n32-S64" diff --git a/meta/recipes-devtools/rust/rust-cross.inc b/meta/recipes-devtools/rust/rust-cross.inc index 4c026b1f38..2e47a3aa5f 100644 --- a/meta/recipes-devtools/rust/rust-cross.inc +++ b/meta/recipes-devtools/rust/rust-cross.inc @@ -1,17 +1,9 @@ python do_rust_gen_targets () { wd = d.getVar('WORKDIR') + '/targets/' - # It is important 'TARGET' is last here so that it overrides our less - # informed choices for BUILD & HOST if TARGET happens to be the same as - # either of them. - for thing in ['BUILD', 'HOST', 'TARGET']: - bb.debug(1, "rust_gen_target for " + thing) - features = "" - cpu = "generic" - arch = d.getVar('{}_ARCH'.format(thing)) - if thing is "TARGET": - features = d.getVar('TARGET_LLVM_FEATURES') or "" - cpu = d.getVar('TARGET_LLVM_CPU') - rust_gen_target(d, thing, wd, features, cpu, arch) + # Order of BUILD, HOST, TARGET is important in case the files overwrite, most specific last + rust_gen_target(d, 'BUILD', wd, "", "generic", d.getVar('BUILD_ARCH')) + rust_gen_target(d, 'HOST', wd, "", "generic", d.getVar('HOST_ARCH')) + rust_gen_target(d, 'TARGET', wd, d.getVar('TARGET_LLVM_FEATURES') or "", d.getVar('TARGET_LLVM_CPU'), d.getVar('TARGET_ARCH')) } # Otherwise we'll depend on what we provide From patchwork Fri Dec 8 02:33:21 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 35916 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id C5C94C46CC5 for ; Fri, 8 Dec 2023 02:34:09 +0000 (UTC) Received: from mail-pg1-f182.google.com (mail-pg1-f182.google.com [209.85.215.182]) by mx.groups.io with SMTP id smtpd.web10.11198.1702002842485820100 for ; Thu, 07 Dec 2023 18:34:02 -0800 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20230601.gappssmtp.com header.s=20230601 header.b=mxKTcQI0; spf=softfail (domain: sakoman.com, ip: 209.85.215.182, mailfrom: steve@sakoman.com) Received: by mail-pg1-f182.google.com with SMTP id 41be03b00d2f7-5c65ca2e1eeso1181198a12.2 for ; Thu, 07 Dec 2023 18:34:02 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20230601.gappssmtp.com; s=20230601; t=1702002841; x=1702607641; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=+QmZ/b0rzCuH5B5RKQ+ldRnLwAHvpIeHAhTc0AzNpSU=; b=mxKTcQI0019MnO18+3xDzworcx5wSMl4XJEzLILJOZH6+RWBUjlypIpW4DwcXMDAbI wLZtahSW366da8WYZbg+tAJE6itzLDwF6cpPA0WPwReIy33mwf8HHl5P8lCPTxd/98sj INlDE7tlri9E1XeX3IpCYOw6LtNer9yV9QnjjsPHf9RCYlYor7CuhkXR5z07mvNj4r5O sOKIn9bxCyGImnwh9Dr0oL8NznIdsJ8hoNemwSspxWsnkd8qNL+cFAWbVxJKougxJ0sA FGWpS2Xk55+56zZiwZgOv+uaI4kFFTTB2C+8/FOK42kBNgepE7M+VskdUb42kXL/haBb Egkg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1702002841; x=1702607641; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=+QmZ/b0rzCuH5B5RKQ+ldRnLwAHvpIeHAhTc0AzNpSU=; b=ADP3jQckqQCXNjyw/v6Ac8hULzQNnJ2/wlaYEwCNBDisE4EwZvQJWinW35wn9uDIik 0bfiCVVyhOYgE4+AiuVe1Q9JpfKGv4D6atXC2GB3qWflNn6VAY8WLLvVFiWi1StsOmB0 rVkp7/0OdjecNwcXMGKvLAjiyusqdSpZ8jnZpNwP8wjRA0ekKJ8TLbMhV71v/dk2s0B+ jZzvE+nN5Val5HZJ5UpsHY+FyFMYBFN27xUVlqAiyTOyOWeBMTrKtox/7D8MJg5ZB8wt M9CL4XvkWXr1SHp1/MQiJZZSG3Ku/yd+MX8y9tEDiY9R8P+HGwBJFZj0RpXkqt1f5nsy 2Ltg== X-Gm-Message-State: AOJu0Ywlmy5C6KDdBs15UsscLsDaaZeuOBDRMvAn+89l5mjKAUK6I3Lw y6HysDnf9Wmq6SkXEsOKx1CO7W6arRYzPcoX9jI= X-Google-Smtp-Source: AGHT+IFFlak6V47mDfCiMZ01P6YZhLV8aD88w60N1UMbaDkGhCoIbNw6hjDVXy4KNAsplR4augENbQ== X-Received: by 2002:a05:6a20:748d:b0:187:ce5a:2a87 with SMTP id p13-20020a056a20748d00b00187ce5a2a87mr3409932pzd.12.1702002841115; Thu, 07 Dec 2023 18:34:01 -0800 (PST) Received: from hexa.lan (dhcp-72-234-108-41.hawaiiantel.net. [72.234.108.41]) by smtp.gmail.com with ESMTPSA id i11-20020a170902c94b00b001c9bc811d4dsm499752pla.295.2023.12.07.18.34.00 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 07 Dec 2023 18:34:00 -0800 (PST) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][kirkstone 15/15] native: Clear TUNE_FEATURES/ABIEXTENSION Date: Thu, 7 Dec 2023 16:33:21 -1000 Message-Id: <09ecafaf0e128c4dea062d359de37cbef461aed2.1702002667.git.steve@sakoman.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 08 Dec 2023 02:34:09 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/192007 From: Richard Purdie Some recipes reference these. Rather than continually trying to chase down the references and taskhash issues, clear the variables for an easier life and simpler code. These wouldn't convey anything useful in a native build. Signed-off-by: Richard Purdie (cherry picked from commit f8edeead263708889d31a7ff578ef8274cb678b4) Signed-off-by: Jermain Horsman Signed-off-by: Steve Sakoman --- meta/classes/native.bbclass | 2 ++ 1 file changed, 2 insertions(+) diff --git a/meta/classes/native.bbclass b/meta/classes/native.bbclass index 4de96cd59b..56726301bd 100644 --- a/meta/classes/native.bbclass +++ b/meta/classes/native.bbclass @@ -23,6 +23,8 @@ TARGET_CFLAGS = "${BUILD_CFLAGS}" TARGET_CXXFLAGS = "${BUILD_CXXFLAGS}" TARGET_LDFLAGS = "${BUILD_LDFLAGS}" TARGET_FPU = "" +TUNE_FEATURES = "" +ABIEXTENSION = "" HOST_ARCH = "${BUILD_ARCH}" HOST_OS = "${BUILD_OS}"