From patchwork Mon Jan 17 02:10:21 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: "Mittal, Anuj" X-Patchwork-Id: 2529 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 4E9C8C433EF for ; Mon, 17 Jan 2022 02:10:41 +0000 (UTC) Received: from mga11.intel.com (mga11.intel.com [192.55.52.93]) by mx.groups.io with SMTP id smtpd.web11.6039.1642385439848259298 for ; Sun, 16 Jan 2022 18:10:40 -0800 Authentication-Results: mx.groups.io; dkim=fail reason="unable to parse pub key" header.i=@intel.com header.s=intel header.b=LHgsp7Sv; spf=pass (domain: intel.com, ip: 192.55.52.93, mailfrom: anuj.mittal@intel.com) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1642385439; x=1673921439; h=from:to:subject:date:message-id:in-reply-to:references: mime-version:content-transfer-encoding; bh=OA4SfIyGL8i6we8sdQbeKRKPoYnvSawOCnDvbdvO41k=; b=LHgsp7SvYoGXdxUsaK4ZEFP78snFtgblJJxmOMCcRsNzMijQgwRC8qED FoeUtXL46rMhrYyZdyPW17I6dvg2j9kIie7knKyokTVsQV3PX/nxRIWY3 UlYRNet7XrmDIBGiCxOJykNNlUa8x2oMcYjlktzpsczmn7S5RkVnULNY0 Mf26Sk1IflvRTAdt7CbuBm+W3VAdFOSJ1BPgnHnw+9s8hTCM7Yec/0Exp YlD/RM4sTq6xaIvwyZa/xRBkRahUiqva7Jyniyw7srbGEin0/FwYf4sC0 GJoj1Zb2rMkJQdyENvackS6yTOlTBLvu+kHMo9DS/YupNW7/ny/fYXmJ/ Q==; X-IronPort-AV: E=McAfee;i="6200,9189,10229"; a="242094187" X-IronPort-AV: E=Sophos;i="5.88,294,1635231600"; d="scan'208";a="242094187" Received: from orsmga002.jf.intel.com ([10.7.209.21]) by fmsmga102.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 16 Jan 2022 18:10:39 -0800 X-IronPort-AV: E=Sophos;i="5.88,294,1635231600"; d="scan'208";a="492220682" Received: from khershix-mobl.gar.corp.intel.com (HELO anmitta2-mobl3.intel.com) ([10.215.230.190]) by orsmga002-auth.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 16 Jan 2022 18:10:38 -0800 From: Anuj Mittal To: openembedded-core@lists.openembedded.org Subject: [honister][PATCH 01/12] epiphany: Update 40.3 -> 40.6 Date: Mon, 17 Jan 2022 10:10:21 +0800 Message-Id: <25b1c078dfa15fd7760c6bd2f5908d9373cca5dc.1642385249.git.anuj.mittal@intel.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Mon, 17 Jan 2022 02:10:41 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/160620 From: Khairul Rohaizzat Jamaluddin 40.4 Changelogs: Fix crash when clearing all passwords (#1570) Fix security indicator disappearing after entering reader mode (#1580) Fix crash opening PDFs not loaded via HTTP (#1611) Fix CVE-2021-45085, CVE-2021-45086, CVE-2021-45087, CVE-2021-45088 (#1612) Fix web applications with non-Latin characters (#1626, #1627) Disable captive portal helper in Pantheon desktop (!1006, Cassidy James Blaede) Somewhat improve password manager robustness (!1014) 40.5 Changelogs: Fix reader mode (!1047) 40.6 Changelogs: Fix Reload buttons on error pages (!1050) Fix delete button in about:applications (!1050) CVE: CVE-2021-45085 CVE-2021-45086 CVE-2021-45087 CVE-2021-45088 Signed-off-by: Khairul Rohaizzat Jamaluddin Signed-off-by: Anuj Mittal --- .../epiphany/{epiphany_40.3.bb => epiphany_40.6.bb} | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) rename meta/recipes-gnome/epiphany/{epiphany_40.3.bb => epiphany_40.6.bb} (93%) diff --git a/meta/recipes-gnome/epiphany/epiphany_40.3.bb b/meta/recipes-gnome/epiphany/epiphany_40.6.bb similarity index 93% rename from meta/recipes-gnome/epiphany/epiphany_40.3.bb rename to meta/recipes-gnome/epiphany/epiphany_40.6.bb index c5dc0baefa..1f3fab3c4a 100644 --- a/meta/recipes-gnome/epiphany/epiphany_40.3.bb +++ b/meta/recipes-gnome/epiphany/epiphany_40.6.bb @@ -20,7 +20,7 @@ SRC_URI = "${GNOME_MIRROR}/${GNOMEBN}/${@oe.utils.trim_version("${PV}", 1)}/${GN file://migrator.patch \ file://distributor.patch \ " -SRC_URI[archive.sha256sum] = "dad138b9f2d55de271128fca38b61f53fd980c587d29e1ba6b508fff3b19f564" +SRC_URI[archive.sha256sum] = "a2abf71b165b4302643147d637808847d64df6a97ce460703542dec75e81b5f7" # Developer mode enables debugging PACKAGECONFIG[developer-mode] = "-Ddeveloper_mode=true,-Ddeveloper_mode=false" From patchwork Mon Jan 17 02:10:22 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: "Mittal, Anuj" X-Patchwork-Id: 2537 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 28194C433FE for ; Mon, 17 Jan 2022 02:11:02 +0000 (UTC) Received: from mga11.intel.com (mga11.intel.com [192.55.52.93]) by mx.groups.io with SMTP id smtpd.web11.6040.1642385441199973001 for ; Sun, 16 Jan 2022 18:10:42 -0800 Authentication-Results: mx.groups.io; dkim=fail reason="unable to parse pub key" header.i=@intel.com header.s=intel header.b=bmqpvouY; spf=pass (domain: intel.com, ip: 192.55.52.93, mailfrom: anuj.mittal@intel.com) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1642385441; x=1673921441; h=from:to:subject:date:message-id:in-reply-to:references: mime-version:content-transfer-encoding; bh=5fLbRWPj4Rd10cMvx9Xp5wP7pczsKvvJmn2YPnCKuHk=; b=bmqpvouYnsxEKtSOTmQE/hRFU2dM2qD/UkiFo0A3lB6bErFYdBUPj+j1 UXdHwVaD9GbHHUkLA8ZdFWmYuOE03sZg7BXavcx7Y3x3ZYv6hl0TRpkcS K7g7ZJSE2hEIISeYge6uxl+y4Jy5Fa6dJuvhzv/pw+eY2sLPqLK6CdUEK T8GfqOn1dk0t4mCVOSs67/cd7lGV7uVXPumzYosAUHH9V0vkxMHMKaxNu QJK7yCGuwV2OjTxEHgUI+jM7Hcn/xwg4Cp2tJMW9GeTGra3azvf4VBFXG PP8eEck8zDdkl+R9GToXs1KrQdjUGNKQcpqq1a1K/msRIzt4/st+/Lwoh Q==; X-IronPort-AV: E=McAfee;i="6200,9189,10229"; a="242094190" X-IronPort-AV: E=Sophos;i="5.88,294,1635231600"; d="scan'208";a="242094190" Received: from orsmga002.jf.intel.com ([10.7.209.21]) by fmsmga102.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 16 Jan 2022 18:10:40 -0800 X-IronPort-AV: E=Sophos;i="5.88,294,1635231600"; d="scan'208";a="492220686" Received: from khershix-mobl.gar.corp.intel.com (HELO anmitta2-mobl3.intel.com) ([10.215.230.190]) by orsmga002-auth.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 16 Jan 2022 18:10:39 -0800 From: Anuj Mittal To: openembedded-core@lists.openembedded.org Subject: [honister][PATCH 02/12] lib/oe/reproducible: correctly set .git location when recursively looking for git repos Date: Mon, 17 Jan 2022 10:10:22 +0800 Message-Id: <1b41f1a38d43c1f0ef351bd6959a77821886a8b6.1642385249.git.anuj.mittal@intel.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Mon, 17 Jan 2022 02:11:02 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/160621 From: Alexander Kanavin Signed-off-by: Alexander Kanavin Signed-off-by: Richard Purdie (cherry picked from commit ffdaa1a0527691d66dd28e86bd015bfad7a020f6) Signed-off-by: Anuj Mittal --- meta/lib/oe/reproducible.py | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/meta/lib/oe/reproducible.py b/meta/lib/oe/reproducible.py index 204b9bd734..0938e4cb39 100644 --- a/meta/lib/oe/reproducible.py +++ b/meta/lib/oe/reproducible.py @@ -41,7 +41,7 @@ def find_git_folder(d, sourcedir): for root, dirs, files in os.walk(workdir, topdown=True): dirs[:] = [d for d in dirs if d not in exclude] if '.git' in dirs: - return root + return os.path.join(root, ".git") bb.warn("Failed to find a git repository in WORKDIR: %s" % workdir) return None From patchwork Mon Jan 17 02:10:23 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: "Mittal, Anuj" X-Patchwork-Id: 2531 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 1F69CC4332F for ; Mon, 17 Jan 2022 02:10:43 +0000 (UTC) Received: from mga11.intel.com (mga11.intel.com [192.55.52.93]) by mx.groups.io with SMTP id smtpd.web11.6040.1642385441199973001 for ; Sun, 16 Jan 2022 18:10:42 -0800 Authentication-Results: mx.groups.io; dkim=fail reason="unable to parse pub key" header.i=@intel.com header.s=intel header.b=U01mgxkt; spf=pass (domain: intel.com, ip: 192.55.52.93, mailfrom: anuj.mittal@intel.com) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1642385442; x=1673921442; h=from:to:subject:date:message-id:in-reply-to:references: mime-version:content-transfer-encoding; bh=lYiqsk7sBbUp5/ItuUFmLFk8y/8hh39+WeRlo+Szpfw=; b=U01mgxktJ6LdeSx1BvYKdBYbtWOpB0f9ywmwimy2VwNeC+IosX0pXQtz NntQEIQdcWEMg/hW20fmape/iSh4iRftg3CLzrS4wzKRlOjGSnIGjYTCs yKGwJZBS917yMTmPBHoJkvJGsIf/ONQyYVX2FUeNBAwUq3JL8DY7vcnXJ SdU7VlgP6A1YFJ5uus8O5FxX84oGu6KpmCv/9zM5kagVd0UmqgOTTuxHF NSlq5FSISCLPz12SFDkcbvuh2iXVob+qD44adrUyhRj1GlNjLdt749ftT WQuzIqmwOAuRr5aOIAdTFixgyirNRHsa0QfAacJHj0c+g8HtQQ/QyUOL3 g==; X-IronPort-AV: E=McAfee;i="6200,9189,10229"; a="242094197" X-IronPort-AV: E=Sophos;i="5.88,294,1635231600"; d="scan'208";a="242094197" Received: from orsmga002.jf.intel.com ([10.7.209.21]) by fmsmga102.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 16 Jan 2022 18:10:42 -0800 X-IronPort-AV: E=Sophos;i="5.88,294,1635231600"; d="scan'208";a="492220691" Received: from khershix-mobl.gar.corp.intel.com (HELO anmitta2-mobl3.intel.com) ([10.215.230.190]) by orsmga002-auth.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 16 Jan 2022 18:10:41 -0800 From: Anuj Mittal To: openembedded-core@lists.openembedded.org Subject: [honister][PATCH 03/12] cve-check: add lockfile to task Date: Mon, 17 Jan 2022 10:10:23 +0800 Message-Id: <53dc9b10eb5f064c68120337126f1542c1e0c832.1642385249.git.anuj.mittal@intel.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Mon, 17 Jan 2022 02:10:43 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/160622 From: Konrad Weihmann this should prevent running into the very rare error sqlite3.OperationalError: attempt to write a readonly database As highlighted by https://www.sqlite.org/faq.html#q5 it is likely that the adapter won't allow use multiple exec calls at the same time. So it's best to prevent multiple accesses at a time, by reusing the already in place CVE_CHECK_DB_FILE_LOCK YOCTO #14110 Signed-off-by: Konrad Weihmann Signed-off-by: Richard Purdie (cherry picked from commit 677f5741bd265be49d4a5bb933b3e8d8c4eec653) Signed-off-by: Anuj Mittal --- meta/classes/cve-check.bbclass | 1 + 1 file changed, 1 insertion(+) diff --git a/meta/classes/cve-check.bbclass b/meta/classes/cve-check.bbclass index 70d1988a70..6c04ff9f09 100644 --- a/meta/classes/cve-check.bbclass +++ b/meta/classes/cve-check.bbclass @@ -111,6 +111,7 @@ python do_cve_check () { } addtask cve_check before do_build after do_fetch +do_cve_check[lockfiles] += "${CVE_CHECK_DB_FILE_LOCK}" do_cve_check[depends] = "cve-update-db-native:do_fetch" do_cve_check[nostamp] = "1" From patchwork Mon Jan 17 02:10:24 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: "Mittal, Anuj" X-Patchwork-Id: 2538 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 3099BC4332F for ; Mon, 17 Jan 2022 02:11:02 +0000 (UTC) Received: from mga11.intel.com (mga11.intel.com [192.55.52.93]) by mx.groups.io with SMTP id smtpd.web11.6040.1642385441199973001 for ; Sun, 16 Jan 2022 18:10:44 -0800 Authentication-Results: mx.groups.io; dkim=fail reason="unable to parse pub key" header.i=@intel.com header.s=intel header.b=HRO41iyS; spf=pass (domain: intel.com, ip: 192.55.52.93, mailfrom: anuj.mittal@intel.com) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1642385443; x=1673921443; h=from:to:subject:date:message-id:in-reply-to:references: mime-version:content-transfer-encoding; bh=atQ72PLvD3/bne7DN2Gzw+WUBsH7fXY1axl5Z4TkTKY=; b=HRO41iyS0LNV0xDXgLyCUi1cBRCxNlxmTFAOJp0Oss34tejQD/pFBVWx L/PjlmlVcwYxYzYs4465rMNQD58RjwnhInEiVhLsSuOHCqGgrp9bAHC2e 0WKEY27tM1V1IAdtbIJlHOXa+MAwazRmnt28YX7WH5zzJM40nWRgQIvqO E6DAX+YZxnv98Q8UGso1oX7BzhEVLrx5CTVNnsdRW7hWeLREJL3eEziSD QxJvXAZaZxnYqdJBBRWL+TWnqnVpBD1vpAh+rXypjPDPvcDRax6Ewj2Ov /hSEsF3NBYLJ1WZstZfHjKQxSifLr2SmM3bYT4M1jheQ/dMr1f3zWepvy w==; X-IronPort-AV: E=McAfee;i="6200,9189,10229"; a="242094205" X-IronPort-AV: E=Sophos;i="5.88,294,1635231600"; d="scan'208";a="242094205" Received: from orsmga002.jf.intel.com ([10.7.209.21]) by fmsmga102.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 16 Jan 2022 18:10:43 -0800 X-IronPort-AV: E=Sophos;i="5.88,294,1635231600"; d="scan'208";a="492220693" Received: from khershix-mobl.gar.corp.intel.com (HELO anmitta2-mobl3.intel.com) ([10.215.230.190]) by orsmga002-auth.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 16 Jan 2022 18:10:42 -0800 From: Anuj Mittal To: openembedded-core@lists.openembedded.org Subject: [honister][PATCH 04/12] xserver-xorg: whitelist two CVEs Date: Mon, 17 Jan 2022 10:10:24 +0800 Message-Id: X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Mon, 17 Jan 2022 02:11:02 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/160623 From: Ross Burton CVE-2011-4613 is specific to Debian/Ubuntu. CVE-2020-25697 is a non-trivial attack that may not actually be feasible considering the default behaviour for clients is to exit if the connection is lost. Signed-off-by: Ross Burton Signed-off-by: Richard Purdie (cherry picked from commit afa2e6c31a79f75ff4113d53f618bbb349cd6c17) Signed-off-by: Anuj Mittal --- meta/recipes-graphics/xorg-xserver/xserver-xorg.inc | 8 ++++++++ 1 file changed, 8 insertions(+) diff --git a/meta/recipes-graphics/xorg-xserver/xserver-xorg.inc b/meta/recipes-graphics/xorg-xserver/xserver-xorg.inc index 85d0788eaf..8864564b3e 100644 --- a/meta/recipes-graphics/xorg-xserver/xserver-xorg.inc +++ b/meta/recipes-graphics/xorg-xserver/xserver-xorg.inc @@ -20,6 +20,14 @@ SRC_URI = "${XORG_MIRROR}/individual/xserver/${XORG_PN}-${PV}.tar.xz" UPSTREAM_CHECK_REGEX = "xorg-server-(?P\d+(\.(?!99)\d+)+)\.tar" CVE_PRODUCT = "xorg-server x_server" +# This is specific to Debian's xserver-wrapper.c +CVE_CHECK_WHITELIST += "CVE-2011-4613" +# As per upstream, exploiting this flaw is non-trivial and it requires exact +# timing on the behalf of the attacker. Many graphical applications exit if their +# connection to the X server is lost, so a typical desktop session is either +# impossible or difficult to exploit. There is currently no upstream patch +# available for this flaw. +CVE_CHECK_WHITELIST += "CVE-2020-25697" S = "${WORKDIR}/${XORG_PN}-${PV}" From patchwork Mon Jan 17 02:10:25 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: "Mittal, Anuj" X-Patchwork-Id: 2532 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 1FF88C433EF for ; Mon, 17 Jan 2022 02:10:47 +0000 (UTC) Received: from mga11.intel.com (mga11.intel.com [192.55.52.93]) by mx.groups.io with SMTP id smtpd.web11.6040.1642385441199973001 for ; Sun, 16 Jan 2022 18:10:45 -0800 Authentication-Results: mx.groups.io; dkim=fail reason="unable to parse pub key" header.i=@intel.com header.s=intel header.b=lI7voyrZ; spf=pass (domain: intel.com, ip: 192.55.52.93, mailfrom: anuj.mittal@intel.com) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1642385445; x=1673921445; h=from:to:subject:date:message-id:in-reply-to:references: mime-version:content-transfer-encoding; bh=Qc3nZi2cUT5dRj9fXkooHi3axt4QEIjSuBMvNlF8PBg=; b=lI7voyrZy62zD2/wwZXDHCGrWRL2foZI87YqKa4csk/y8RHVkabDrYLR ULw1ybYSsAX/p0q5gr8gzOBV66eyxVobPSdZRBuL2+sVuYplJJqMHzgIq 9jYI4pS7MBE1rLJzJty8jzw9HiVNLbVqNK7zpIv6NaTrzhey8jQtubDXi i/u3gAdwcBYdlaST5LJRFOeY4MpurK1GkBHmfL9dH8A0q7/+EIYWx4tyE OA7rKGGBrPl4lUcewnX1MVuFxlmoerZk/tqawFY22EOEIDeArW2vrDeRw yvu+K0JjhyZoEyqnUZxoppWfKzvJAJUqPzEajdaJVDBGKLZPT/9qqlQjY A==; X-IronPort-AV: E=McAfee;i="6200,9189,10229"; a="242094214" X-IronPort-AV: E=Sophos;i="5.88,294,1635231600"; d="scan'208";a="242094214" Received: from orsmga002.jf.intel.com ([10.7.209.21]) by fmsmga102.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 16 Jan 2022 18:10:45 -0800 X-IronPort-AV: E=Sophos;i="5.88,294,1635231600"; d="scan'208";a="492220700" Received: from khershix-mobl.gar.corp.intel.com (HELO anmitta2-mobl3.intel.com) ([10.215.230.190]) by orsmga002-auth.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 16 Jan 2022 18:10:43 -0800 From: Anuj Mittal To: openembedded-core@lists.openembedded.org Subject: [honister][PATCH 05/12] rootfs-postcommands.bbclass: Make two comments use the new variable syntax Date: Mon, 17 Jan 2022 10:10:25 +0800 Message-Id: <5293916ac660c4cfd6304826fb10de1454a40bf5.1642385249.git.anuj.mittal@intel.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Mon, 17 Jan 2022 02:10:47 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/160624 From: Peter Kjellerstedt Signed-off-by: Peter Kjellerstedt Signed-off-by: Richard Purdie (cherry picked from commit cb17cccaf2f51558bd1d320559bd792d5869688e) Signed-off-by: Anuj Mittal --- meta/classes/rootfs-postcommands.bbclass | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/meta/classes/rootfs-postcommands.bbclass b/meta/classes/rootfs-postcommands.bbclass index a3f96ef7ed..74035c30b7 100644 --- a/meta/classes/rootfs-postcommands.bbclass +++ b/meta/classes/rootfs-postcommands.bbclass @@ -21,7 +21,7 @@ ROOTFS_POSTPROCESS_COMMAND += '${@bb.utils.contains("IMAGE_FEATURES", "read-only # otherwise kernel or initramfs end up mounting the rootfs read/write # (the default) if supported by the underlying storage. # -# We do this with _append because the default value might get set later with ?= +# We do this with :append because the default value might get set later with ?= # and we don't want to disable such a default that by setting a value here. APPEND:append = '${@bb.utils.contains("IMAGE_FEATURES", "read-only-rootfs", " ro", "", d)}' @@ -52,7 +52,7 @@ inherit image-artifact-names # the numeric IDs of dynamically created entries remain stable. # # We want this to run as late as possible, in particular after -# systemd_sysusers_create and set_user_group. Using _append is not +# systemd_sysusers_create and set_user_group. Using :append is not # enough for that, set_user_group is added that way and would end # up running after us. SORT_PASSWD_POSTPROCESS_COMMAND ??= " sort_passwd; " From patchwork Mon Jan 17 02:10:26 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: "Mittal, Anuj" X-Patchwork-Id: 2539 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 23562C433EF for ; Mon, 17 Jan 2022 02:11:02 +0000 (UTC) Received: from mga11.intel.com (mga11.intel.com [192.55.52.93]) by mx.groups.io with SMTP id smtpd.web11.6040.1642385441199973001 for ; Sun, 16 Jan 2022 18:10:46 -0800 Authentication-Results: mx.groups.io; dkim=fail reason="unable to parse pub key" header.i=@intel.com header.s=intel header.b=bw/1xfOl; spf=pass (domain: intel.com, ip: 192.55.52.93, mailfrom: anuj.mittal@intel.com) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1642385446; x=1673921446; h=from:to:subject:date:message-id:in-reply-to:references: mime-version:content-transfer-encoding; bh=sb4ypC/pZPaRxp3m3SragC05Ka61tLd0twpYRequm+Y=; b=bw/1xfOl25/1VccN6g/1HSzC2Feri0Wyuj1imhPrqSmJGZxXsYBWK250 B6cj/CZcmcRsaRUw/QoH+136FUG10yj7H4N95OJJ6IIvETF91igNp584R NIzNhdbAsH9usbHyajTh/bsBR8ZcDeZxWjichbRsrQ35eDgwp6oP/xHW/ 9ScdwThzhEgGm2tSk707ZRJLsOx64NSaIgPbWGhTRTO6K1ifwkMKf9LMe 2smHJsmgwFuRbaxM88ljLUkjx/9jYvcaPtrbzu2jiW6jLjPC4FsDUoiwE r/2740Sk5jnJhjeh1X3izhRfttZM0Dq1nabnBOm05Oy8I+j4gJYyP104h w==; X-IronPort-AV: E=McAfee;i="6200,9189,10229"; a="242094219" X-IronPort-AV: E=Sophos;i="5.88,294,1635231600"; d="scan'208";a="242094219" Received: from orsmga002.jf.intel.com ([10.7.209.21]) by fmsmga102.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 16 Jan 2022 18:10:46 -0800 X-IronPort-AV: E=Sophos;i="5.88,294,1635231600"; d="scan'208";a="492220708" Received: from khershix-mobl.gar.corp.intel.com (HELO anmitta2-mobl3.intel.com) ([10.215.230.190]) by orsmga002-auth.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 16 Jan 2022 18:10:45 -0800 From: Anuj Mittal To: openembedded-core@lists.openembedded.org Subject: [honister][PATCH 06/12] oeqa/sstate: Fix allarch samesigs test Date: Mon, 17 Jan 2022 10:10:26 +0800 Message-Id: <93a2c497368b56c912d6c9b06f18551cc8c6ddc8.1642385249.git.anuj.mittal@intel.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Mon, 17 Jan 2022 02:11:02 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/160625 From: Richard Purdie The allarch sstate sigs test is supposed to compare the allarch sigs but does not. Fix this. Also rename the common function to make it clear it isn't just used by the allarch test. Signed-off-by: Richard Purdie (cherry picked from commit 549597d422c7bcb467f34139ff25d2bee96bf851) Signed-off-by: Anuj Mittal --- meta/lib/oeqa/selftest/cases/sstatetests.py | 13 ++++++++++--- 1 file changed, 10 insertions(+), 3 deletions(-) diff --git a/meta/lib/oeqa/selftest/cases/sstatetests.py b/meta/lib/oeqa/selftest/cases/sstatetests.py index 7e0ed0dac1..4b8669e9d3 100644 --- a/meta/lib/oeqa/selftest/cases/sstatetests.py +++ b/meta/lib/oeqa/selftest/cases/sstatetests.py @@ -347,7 +347,7 @@ TCLIBCAPPEND = \"\" MACHINE = \"qemuarm\" BB_SIGNATURE_HANDLER = "OEBasicHash" """ - self.sstate_allarch_samesigs(configA, configB) + self.sstate_common_samesigs(configA, configB, allarch=True) def test_sstate_nativesdk_samesigs_multilib(self): """ @@ -371,9 +371,9 @@ require conf/multilib.conf MULTILIBS = \"\" BB_SIGNATURE_HANDLER = "OEBasicHash" """ - self.sstate_allarch_samesigs(configA, configB) + self.sstate_common_samesigs(configA, configB) - def sstate_allarch_samesigs(self, configA, configB): + def sstate_common_samesigs(self, configA, configB, allarch=False): self.write_config(configA) self.track_for_cleanup(self.topdir + "/tmp-sstatesamehash") @@ -401,6 +401,13 @@ BB_SIGNATURE_HANDLER = "OEBasicHash" self.maxDiff = None self.assertEqual(files1, files2) + if allarch: + allarchdir = os.path.basename(glob.glob(self.topdir + "/tmp-sstatesamehash/stamps/all-*-linux")[0]) + + files1 = get_files(self.topdir + "/tmp-sstatesamehash/stamps/" + allarchdir) + files2 = get_files(self.topdir + "/tmp-sstatesamehash2/stamps/" + allarchdir) + self.assertEqual(files1, files2) + def test_sstate_sametune_samesigs(self): """ The sstate checksums of two identical machines (using the same tune) should be the From patchwork Mon Jan 17 02:10:27 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: "Mittal, Anuj" X-Patchwork-Id: 2533 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 2683DC433F5 for ; Mon, 17 Jan 2022 02:10:50 +0000 (UTC) Received: from mga11.intel.com (mga11.intel.com [192.55.52.93]) by mx.groups.io with SMTP id smtpd.web11.6040.1642385441199973001 for ; Sun, 16 Jan 2022 18:10:49 -0800 Authentication-Results: mx.groups.io; dkim=fail reason="unable to parse pub key" header.i=@intel.com header.s=intel header.b=Z2WophIz; spf=pass (domain: intel.com, ip: 192.55.52.93, mailfrom: anuj.mittal@intel.com) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1642385448; x=1673921448; h=from:to:subject:date:message-id:in-reply-to:references: mime-version:content-transfer-encoding; bh=DX2iRccgBCKsqHqktF2mr0u+fn7kgfixG04v22cm9Wg=; b=Z2WophIzrkMkuRhqfhAUr8nMsm7N+6Uc7ZDQRTKQyeu/4aVLGEiz0h+0 aP2jrPuG97Q7DnaVzbfR+1t5GuxMN4PJ671G3MzJdv3mJorD4AmoStNIp KFvvIxVLK1NAj27CYhmG/OHfkJPqdpRXJaa/TNqk1qgTBsOs7ZDjGrLEV ZkK3JWhaVjHWCX+aC7cl8h/HydzRDFdkvubCToe9QUdDdlz4ym2ioFy9d vPF3DFov/Sb9s5vHq+EcjKuGcoDJ/sw1wk3r+TYGjRFehwdXwhULr0Rj8 tBTNhIB7ekT/daiRF0LaUrS0NFMlPusTMWaspJs4H3V4W/Mzl0+Rqfapp g==; X-IronPort-AV: E=McAfee;i="6200,9189,10229"; a="242094226" X-IronPort-AV: E=Sophos;i="5.88,294,1635231600"; d="scan'208";a="242094226" Received: from orsmga002.jf.intel.com ([10.7.209.21]) by fmsmga102.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 16 Jan 2022 18:10:48 -0800 X-IronPort-AV: E=Sophos;i="5.88,294,1635231600"; d="scan'208";a="492220716" Received: from khershix-mobl.gar.corp.intel.com (HELO anmitta2-mobl3.intel.com) ([10.215.230.190]) by orsmga002-auth.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 16 Jan 2022 18:10:46 -0800 From: Anuj Mittal To: openembedded-core@lists.openembedded.org Subject: [honister][PATCH 07/12] linux-yocto/5.10: update to v5.10.89 Date: Mon, 17 Jan 2022 10:10:27 +0800 Message-Id: <249b07715eccfb9f28fbc752c948cf4f19b8bb09.1642385249.git.anuj.mittal@intel.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Mon, 17 Jan 2022 02:10:50 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/160626 From: Bruce Ashfield Updating linux-yocto/5.10 to the latest korg -stable release that comprises the following commits: eb967e323f7f Linux 5.10.89 52ad5da8e316 phonet/pep: refuse to enable an unbound pipe 7dd52af1eb57 hamradio: improve the incomplete fix to avoid NPD 450121075a6a hamradio: defer ax25 kfree after unregister_netdev 8e34d07dd4d9 ax25: NPD bug when detaching AX25 device 50f78486f90b hwmon: (lm90) Do not report 'busy' status bit as alarm ec1d222d37ea hwmom: (lm90) Fix citical alarm status for MAX6680/MAX6681 441d3873664d pinctrl: mediatek: fix global-out-of-bounds issue 9c75a9657bdc ASoC: rt5682: fix the wrong jack type detected 94caab5af19a ASoC: tas2770: Fix setting of high sample rates c7282790c782 Input: goodix - add id->model mapping for the "9111" model 3bb3bf50d69f Input: elants_i2c - do not check Remark ID on eKTH3900/eKTH5312 ee6f34215c5d mm: mempolicy: fix THP allocations escaping mempolicy restrictions 8008fc1d0be1 KVM: VMX: Fix stale docs for kvm-intel.emulate_invalid_guest_state d91ed251fd70 usb: gadget: u_ether: fix race in setting MAC address in setup phase 6697f29bf56b ceph: fix up non-directory creation in SGID directories fffb6581a23a f2fs: fix to do sanity check on last xattr entry in __f2fs_setxattr() ad338d825e3f tee: optee: Fix incorrect page free bug 1f2070767401 mm/hwpoison: clear MF_COUNT_INCREASED before retrying get_any_page() ac61b9c6c054 mac80211: fix locking in ieee80211_start_ap error path 89876d10830d ARM: 9169/1: entry: fix Thumb2 bug in iWMMXt exception handling c3253d3a38bc mmc: mmci: stm32: clear DLYB_CR after sending tuning command 0d66b395210c mmc: core: Disable card detect during shutdown c8e366a01c20 mmc: meson-mx-sdhc: Set MANUAL_STOP for multi-block SDIO commands 4af79153617b mmc: sdhci-tegra: Fix switch to HS400ES mode 9a7ec7979785 gpio: dln2: Fix interrupts when replugging the device f5b02912e2dd pinctrl: stm32: consider the GPIO offset to expose all the GPIO lines 28626e76baf5 KVM: VMX: Wake vCPU when delivering posted IRQ even if vCPU == this vCPU 7a37f2e37069 platform/x86: intel_pmc_core: fix memleak on registration failure b57afd124046 x86/pkey: Fix undefined behaviour with PKRU_WD_BIT c05d8f66ec34 tee: handle lookup of shm with reference count 0 0ffb9f83e4f6 parisc: Fix mask used to select futex spinlock 5deeb9ad598b parisc: Correct completer in lws start 8b745616ba8f ipmi: fix initialization when workqueue allocation fails 1f6ab847461c ipmi: ssif: initialize ssif_info->client early a5192f31160c ipmi: bail out if init_srcu_struct fails bc674f1b2119 Input: atmel_mxt_ts - fix double free in mxt_read_info_block 30140e252fdb ASoC: meson: aiu: Move AIU_I2S_MISC hold setting to aiu-fifo-i2s 2b4c020b70cc ALSA: hda/realtek: Fix quirk for Clevo NJ51CU 7470780f3b0c ALSA: hda/realtek: Add new alc285-hp-amp-init model 4cb7dc2e3074 ALSA: hda/realtek: Amp init fixup for HP ZBook 15 G6 69e492161c7b ALSA: drivers: opl3: Fix incorrect use of vp->state a96c08e0b41e ALSA: jack: Check the return value of kstrdup() 51c7b2a7b86a hwmon: (lm90) Drop critical attribute support for MAX6654 2464738d0ee4 hwmon: (lm90) Introduce flag indicating extended temperature support 196df56c3dc8 hwmon: (lm90) Add basic support for TI TMP461 fa2e149260bf hwmon: (lm90) Fix usage of CONFIG2 register in detect function ba696b470839 pinctrl: bcm2835: Change init order for gpio hogs 676c572439e5 Input: elantech - fix stack out of bound access in elantech_change_report_id() 2792fde84cce sfc: falcon: Check null pointer of rx_queue->page_ring d70b4001ef74 sfc: Check null pointer of rx_queue->page_ring 75c962f02a4f net: ks8851: Check for error irq 9db0f8d395fd drivers: net: smc911x: Check for error irq ca2a15053b07 fjes: Check for error irq c6d2754006c1 bonding: fix ad_actor_system option setting to default 6809da518514 ipmi: Fix UAF when uninstall ipmi_si and ipmi_msghandler module 61e6b82e7b6c igb: fix deadlock caused by taking RTNL in RPM resume path e00eace2325c net: skip virtio_net_hdr_set_proto if protocol already set ed05e4dcfba6 net: accept UFOv6 packages in virtio_net_hdr_to_skb 56b0bbba782b qlcnic: potential dereference null pointer of rx_queue->page_ring 78e49d77e517 net: marvell: prestera: fix incorrect return of port_find 861b4413e41d ARM: dts: imx6qdl-wandboard: Fix Ethernet support d79f5e0d458b netfilter: fix regression in looped (broad|multi)cast's MAC handling 579cefef7c42 RDMA/hns: Replace kfree() with kvfree() 7cf6466e00a7 IB/qib: Fix memory leak in qib_user_sdma_queue_pkts() cd9c90682b2f ASoC: meson: aiu: fifo: Add missing dma_coerce_mask_and_coherent() 580ecf86e772 spi: change clk_disable_unprepare to clk_unprepare 93a957bbf46c arm64: dts: allwinner: orangepi-zero-plus: fix PHY mode ef2dce43257d HID: potential dereference of null pointer 3110bc5862d2 HID: holtek: fix mouse probing 0875873b2a97 ext4: check for inconsistent extents between index and leaf block 76366c024f56 ext4: check for out-of-order index extents in ext4_valid_extent_entries() 1d4b1c4e8bbd ext4: prevent partial update of the extent blocks f69a47fcbb9c net: usb: lan78xx: add Allied Telesis AT29M2-AF 8c0059a25cb1 arm64: vdso32: require CROSS_COMPILE_COMPAT for gcc+bfd b16b124a42e0 arm64: vdso32: drop -no-integrated-as flag 856f88f27bbc Linux 5.10.88 88f20cccbeec xen/netback: don't queue unlimited number of packages 525875c410df xen/netback: fix rx queue stall detection 8fa3a370cc2a xen/console: harden hvc_xen against event channel storms d31b3379179d xen/netfront: harden netfront against event channel storms 8ac3b6ee7c9f xen/blkfront: harden blkfront against event channel storms 76ec7fe2d866 Revert "xsk: Do not sleep in poll() when need_wakeup set" e24fc8983025 bus: ti-sysc: Fix variable set but not used warning for reinit_modules 70692b06208c rcu: Mark accesses to rcu_state.n_force_qs a9078e791426 scsi: scsi_debug: Sanity check block descriptor length in resp_mode_select() bdb854f134b9 scsi: scsi_debug: Fix type in min_t to avoid stack OOB aa1f912712a1 scsi: scsi_debug: Don't call kcalloc() if size arg is zero 6859985a2fbd ovl: fix warning in ovl_create_real() 5fd7d62daa24 fuse: annotate lock in fuse_reverse_inval_entry() b99bdf127af9 media: mxl111sf: change mutex_init() location 0413f7a1a533 xsk: Do not sleep in poll() when need_wakeup set 6b8d8ecdd980 ARM: dts: imx6ull-pinfunc: Fix CSI_DATA07__ESAI_TX0 pad name 8affa1b68db6 Input: touchscreen - avoid bitwise vs logical OR warning aec5897b277b drm/amdgpu: correct register access for RLC_JUMP_TABLE_RESTORE c1d519263ded libata: if T_LENGTH is zero, dma direction should be DMA_NONE a9f2c6af5a60 timekeeping: Really make sure wall_to_monotonic isn't positive 6471ebcd6f15 serial: 8250_fintek: Fix garbled text for console a7c80674538f iocost: Fix divide-by-zero on donation from low hweight cgroup bcebb8eb1948 zonefs: add MODULE_ALIAS_FS 1c414ff63b2d btrfs: fix double free of anon_dev after failure to create subvolume 005d9292b5b2 btrfs: fix memory leak in __add_inode_ref() cd98cb5216a0 USB: serial: option: add Telit FN990 compositions 5c93584d9a2f USB: serial: cp210x: fix CP2105 GPIO registration 8f207f12630b usb: xhci: Extend support for runtime power management for AMD's Yellow carp. e5949933f313 PCI/MSI: Mask MSI-X vectors only on success f8aa09186c30 PCI/MSI: Clear PCI_MSIX_FLAGS_MASKALL on error d17c5a389768 usb: dwc2: fix STM ID/VBUS detection startup delay in dwc2_driver_probe 2b2edc8fc5a8 USB: NO_LPM quirk Lenovo USB-C to Ethernet Adapher(RTL8153-04) fd623e16b2ff tty: n_hdlc: make n_hdlc_tty_wakeup() asynchronous 9439fabfc349 KVM: x86: Drop guest CPUID check for host initiated writes to MSR_IA32_PERF_CAPABILITIES 5fe305c6d485 Revert "usb: early: convert to readl_poll_timeout_atomic()" 2b54f485f2c1 USB: gadget: bRequestType is a bitfield, not a enum 151ffac3ac27 powerpc/85xx: Fix oops when CONFIG_FSL_PMC=n fcf9194d366c bpf, selftests: Fix racing issue in btf_skc_cls_ingress test 6f46c59e60b6 sit: do not call ipip6_dev_free() from sit_init_net() 6e1011cd183f net: systemport: Add global locking for descriptor lifecycle d1765f984c99 net/smc: Prevent smc_release() from long blocking 337bb7bf7c31 net: Fix double 0x prefix print in SKB dump 734a3f310605 sfc_ef100: potential dereference of null pointer 7da349f07e45 net/packet: rx_owner_map depends on pg_vec 1a34fb9e2bf3 netdevsim: Zero-initialize memory for new map's value in function nsim_bpf_map_alloc d3e1f54508f1 ixgbe: set X550 MDIO speed before talking to PHY 48e01e388182 ixgbe: Document how to enable NBASE-T support 776ed8b36697 igc: Fix typo in i225 LTR functions 74a16e062b23 igbvf: fix double free in `igbvf_probe` ddac50d04f34 igb: Fix removal of unicast MAC filters of VFs 12c1938870dc soc/tegra: fuse: Fix bitwise vs. logical OR warning 451f1eded7f5 mptcp: clear 'kern' flag from fallback sockets 222cebd995cd drm/amd/pm: fix a potential gpu_metrics_table memory leak 74dc97dfb276 rds: memory leak in __rds_conn_create() 67f4362ae286 flow_offload: return EOPNOTSUPP for the unsupported mpls action type 03fd6ca05601 mac80211: fix lookup when adding AddBA extension element bef59d6a83d3 mac80211: agg-tx: don't schedule_and_wake_txq() under sta->lock 96bc86cac0a9 drm/ast: potential dereference of null pointer cac0fd4b9bd3 selftest/net/forwarding: declare NETIFS p9 p10 81fbdd45652d net/sched: sch_ets: don't remove idle classes from the round-robin list be32c8a78887 dmaengine: st_fdma: fix MODULE_ALIAS dfff1d5e85ff selftests: Fix IPv6 address bind tests 08896ecfffc3 selftests: Fix raw socket bind tests with VRF 5ba4dfb8b8a1 selftests: Add duplicate config only for MD5 VRF tests 12512bc8f25b net: hns3: fix use-after-free bug in hclgevf_send_mbx_msg 3a4f6dba1eb9 inet_diag: fix kernel-infoleak for UDP sockets 20ad1ef02f9a sch_cake: do not call cake_destroy() from cake_init() 1208b445a497 s390/kexec_file: fix error handling when applying relocations c058c544e73a selftests: net: Correct ping6 expected rc from 2 to 1 9983425c203b virtio/vsock: fix the transport to work with VMADDR_CID_ANY 94a01e6fb2d8 soc: imx: Register SoC device only on i.MX boards cc426a91d384 clk: Don't parent clks until the parent is fully registered 429bb01e4dda ARM: socfpga: dts: fix qspi node compatible 7b4cc168d9ca ceph: initialize pathlen variable in reconnect_caps_cb e0f06c32afb2 ceph: fix duplicate increment of opened_inodes metric 640e28d618e8 tee: amdtee: fix an IS_ERR() vs NULL bug eed897a22230 mac80211: track only QoS data frames for admission control 24983f750881 arm64: dts: rockchip: fix audio-supply for Rock Pi 4 49bd597719bf arm64: dts: rockchip: fix rk3399-leez-p710 vcc3v3-lan supply 9fcdbbf3964d arm64: dts: rockchip: fix rk3308-roc-cc vcc-sd supply ba866840b240 arm64: dts: rockchip: remove mmc-hs400-enhanced-strobe from rk3399-khadas-edge 3516bc149223 arm64: dts: imx8mp-evk: Improve the Ethernet PHY description 06294e7e341a arm64: dts: imx8m: correct assigned clocks for FEC 4cc6badff97f audit: improve robustness of the audit queue handling 0e21e6cd5eeb dm btree remove: fix use after free in rebalance_children() f5187a9d52ae recordmcount.pl: look for jgnop instruction as well as bcrl on s390 51f6302f81d2 vdpa: check that offsets are within bounds e3a1ab5aea4c virtio_ring: Fix querying of maximum DMA mapping size for virtio device 0612679e48d0 bpf, selftests: Add test case trying to taint map value pointer 279e0bf80d95 bpf: Make 32->64 bounds propagation slightly more robust e2aad0b5f2cb bpf: Fix signed bounds propagation after mov32 f0f484714f35 firmware: arm_scpi: Fix string overflow in SCPI genpd driver 7fd214fc7f2e mac80211: validate extended element ID is present 0bb50470f1e0 mac80211: send ADDBA requests using the tid/queue of the aggregation session 29bb131dbbb5 mac80211: mark TX-during-stop for TX in in_reconfig 15640e40e3bb mac80211: fix regression in SSN handling of addba tx 49b7e496928e KVM: downgrade two BUG_ONs to WARN_ON_ONCE 8d0f56c2ed71 KVM: selftests: Make sure kvm_create_max_vcpus test won't hit RLIMIT_NOFILE Signed-off-by: Bruce Ashfield Signed-off-by: Richard Purdie (cherry picked from commit 8710dca273bada79536e84ad3c206bd1b40aab97) Signed-off-by: Anuj Mittal --- .../linux/linux-yocto-rt_5.10.bb | 6 ++--- .../linux/linux-yocto-tiny_5.10.bb | 8 +++---- meta/recipes-kernel/linux/linux-yocto_5.10.bb | 24 +++++++++---------- 3 files changed, 19 insertions(+), 19 deletions(-) diff --git a/meta/recipes-kernel/linux/linux-yocto-rt_5.10.bb b/meta/recipes-kernel/linux/linux-yocto-rt_5.10.bb index 63ae89611f..f2279326b7 100644 --- a/meta/recipes-kernel/linux/linux-yocto-rt_5.10.bb +++ b/meta/recipes-kernel/linux/linux-yocto-rt_5.10.bb @@ -11,13 +11,13 @@ python () { raise bb.parse.SkipRecipe("Set PREFERRED_PROVIDER_virtual/kernel to linux-yocto-rt to enable it") } -SRCREV_machine ?= "d6b1cc83a5315388b060eaa6195f1ce77103c3d1" -SRCREV_meta ?= "1ab943530f4016a9ee7bd8fc3d10acf702c23c44" +SRCREV_machine ?= "301346d30bcaccedc71da8d5f78bd262063d4ba7" +SRCREV_meta ?= "38b4f2e3bc974717352e8bc5491664e47542d237" SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;branch=${KBRANCH};name=machine \ git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-5.10;destsuffix=${KMETA}" -LINUX_VERSION ?= "5.10.87" +LINUX_VERSION ?= "5.10.89" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" diff --git a/meta/recipes-kernel/linux/linux-yocto-tiny_5.10.bb b/meta/recipes-kernel/linux/linux-yocto-tiny_5.10.bb index 7d6e9cb992..ae6d884954 100644 --- a/meta/recipes-kernel/linux/linux-yocto-tiny_5.10.bb +++ b/meta/recipes-kernel/linux/linux-yocto-tiny_5.10.bb @@ -6,7 +6,7 @@ KCONFIG_MODE = "--allnoconfig" require recipes-kernel/linux/linux-yocto.inc -LINUX_VERSION ?= "5.10.87" +LINUX_VERSION ?= "5.10.89" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}" @@ -15,9 +15,9 @@ DEPENDS += "openssl-native util-linux-native" KMETA = "kernel-meta" KCONF_BSP_AUDIT_LEVEL = "2" -SRCREV_machine:qemuarm ?= "a46d018920762d81e283ecc80cf156fe226712ed" -SRCREV_machine ?= "e36ccf7356af83243e55f6ca491049462f7feab7" -SRCREV_meta ?= "1ab943530f4016a9ee7bd8fc3d10acf702c23c44" +SRCREV_machine:qemuarm ?= "913d41ebe409dfd03c49fafd1923f8663df2a4ff" +SRCREV_machine ?= "5575e67330fb6d979ed1cd2e9e64400b4c21b595" +SRCREV_meta ?= "38b4f2e3bc974717352e8bc5491664e47542d237" PV = "${LINUX_VERSION}+git${SRCPV}" diff --git a/meta/recipes-kernel/linux/linux-yocto_5.10.bb b/meta/recipes-kernel/linux/linux-yocto_5.10.bb index bbb25f7393..3df4e86bd1 100644 --- a/meta/recipes-kernel/linux/linux-yocto_5.10.bb +++ b/meta/recipes-kernel/linux/linux-yocto_5.10.bb @@ -13,17 +13,17 @@ KBRANCH:qemux86 ?= "v5.10/standard/base" KBRANCH:qemux86-64 ?= "v5.10/standard/base" KBRANCH:qemumips64 ?= "v5.10/standard/mti-malta64" -SRCREV_machine:qemuarm ?= "c5c39f3ba284421eceeb9b084da1508167b37abe" -SRCREV_machine:qemuarm64 ?= "fab21fdf95a62d013b98eb91adc0d9cfc69f700b" -SRCREV_machine:qemumips ?= "ef1d4a1e93c209637022c9337131394a6f3679ae" -SRCREV_machine:qemuppc ?= "8009be617e2fd4c34c80892776d79f463d436fc0" -SRCREV_machine:qemuriscv64 ?= "4f2bb635ea267e71f112fd11323c1d3a2f2b85d0" -SRCREV_machine:qemuriscv32 ?= "4f2bb635ea267e71f112fd11323c1d3a2f2b85d0" -SRCREV_machine:qemux86 ?= "4f2bb635ea267e71f112fd11323c1d3a2f2b85d0" -SRCREV_machine:qemux86-64 ?= "4f2bb635ea267e71f112fd11323c1d3a2f2b85d0" -SRCREV_machine:qemumips64 ?= "2f42ab7aac37cd61f47231301b3f1e232807e0e6" -SRCREV_machine ?= "4f2bb635ea267e71f112fd11323c1d3a2f2b85d0" -SRCREV_meta ?= "1ab943530f4016a9ee7bd8fc3d10acf702c23c44" +SRCREV_machine:qemuarm ?= "b0dfabc86c3b6e1fb2ddb153664961e107bedfa9" +SRCREV_machine:qemuarm64 ?= "fea23aa594ce16a15564f991e14868dd255674cf" +SRCREV_machine:qemumips ?= "0ec16d85647a337f392ae358db3dcc200d958938" +SRCREV_machine:qemuppc ?= "a6a07d8acd8991883464bd3034beabb9ee23f11a" +SRCREV_machine:qemuriscv64 ?= "d59202c85b0f96b7a928ec594021a38e80c35a46" +SRCREV_machine:qemuriscv32 ?= "d59202c85b0f96b7a928ec594021a38e80c35a46" +SRCREV_machine:qemux86 ?= "d59202c85b0f96b7a928ec594021a38e80c35a46" +SRCREV_machine:qemux86-64 ?= "d59202c85b0f96b7a928ec594021a38e80c35a46" +SRCREV_machine:qemumips64 ?= "29cb56446b0b66b7a15d2577773e69c4e813bfd7" +SRCREV_machine ?= "d59202c85b0f96b7a928ec594021a38e80c35a46" +SRCREV_meta ?= "38b4f2e3bc974717352e8bc5491664e47542d237" # remap qemuarm to qemuarma15 for the 5.8 kernel # KMACHINE:qemuarm ?= "qemuarma15" @@ -32,7 +32,7 @@ SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;name=machine;branch=${KBRA git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-5.10;destsuffix=${KMETA}" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" -LINUX_VERSION ?= "5.10.87" +LINUX_VERSION ?= "5.10.89" DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}" DEPENDS += "openssl-native util-linux-native" From patchwork Mon Jan 17 02:10:28 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: "Mittal, Anuj" X-Patchwork-Id: 2534 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 21B7FC433EF for ; Mon, 17 Jan 2022 02:10:55 +0000 (UTC) Received: from mga11.intel.com (mga11.intel.com [192.55.52.93]) by mx.groups.io with SMTP id smtpd.web11.6040.1642385441199973001 for ; Sun, 16 Jan 2022 18:10:54 -0800 Authentication-Results: mx.groups.io; dkim=fail reason="unable to parse pub key" header.i=@intel.com header.s=intel header.b=XMblj2C+; spf=pass (domain: intel.com, ip: 192.55.52.93, mailfrom: anuj.mittal@intel.com) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1642385454; x=1673921454; h=from:to:subject:date:message-id:in-reply-to:references: mime-version:content-transfer-encoding; bh=K8MTeN9jCmCS//IHRJfbpaDkpF7ZKmBqXgF1wbRzZew=; b=XMblj2C+JU/OenpWgIWrZPF04UfIGNDvXnAdihhZ+0AqybjiYkx8ryRk Ld48Kex4HtOe4L4QzeTiDYQNJZX+Mc19hbgg+dBWOixuV4O8T1qDbaFBw 5PjX4icYTL7AFIeCkvMxu9YECGbqEDui7kG0GOjwrNL/LwlTgjnD7YZPg X3ukU5M/f1rlgTSOrO9gcOhJQHd4akrDdVpHpd2Tz0y9tIChO+8MUYd09 ImSREf3CtHZ9FXQMXdGMBdc8KDBQBr4k4rwztLkB1VSqXksGFBwBAV3Xu ZVrIs7fEvjenOLOxmghsAHMxWHaN6Vn7NiTfL1x9Xh2CXXm8FbcNouAPn Q==; X-IronPort-AV: E=McAfee;i="6200,9189,10229"; a="242094250" X-IronPort-AV: E=Sophos;i="5.88,294,1635231600"; d="scan'208";a="242094250" Received: from orsmga002.jf.intel.com ([10.7.209.21]) by fmsmga102.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 16 Jan 2022 18:10:52 -0800 X-IronPort-AV: E=Sophos;i="5.88,294,1635231600"; d="scan'208";a="492220720" Received: from khershix-mobl.gar.corp.intel.com (HELO anmitta2-mobl3.intel.com) ([10.215.230.190]) by orsmga002-auth.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 16 Jan 2022 18:10:48 -0800 From: Anuj Mittal To: openembedded-core@lists.openembedded.org Subject: [honister][PATCH 08/12] linux-yocto/5.14: fix arm 32bit -rt warnings Date: Mon, 17 Jan 2022 10:10:28 +0800 Message-Id: <182332fd5c2080942dd53862e76459677194347b.1642385249.git.anuj.mittal@intel.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Mon, 17 Jan 2022 02:10:55 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/160627 From: Bruce Ashfield Integrating the following commit(s): f9e349e1745 preempt-rt.scc: arm should come after ftrace 25f5db372ac drivers-zynq.cfg: update CONFIG_NET_CADENCE option Signed-off-by: Bruce Ashfield Signed-off-by: Richard Purdie (cherry picked from commit 704720e28f67e880998d4dab85b366cb7f1a4ce3) Signed-off-by: Anuj Mittal --- meta/recipes-kernel/linux/linux-yocto-rt_5.14.bb | 2 +- meta/recipes-kernel/linux/linux-yocto-tiny_5.14.bb | 2 +- meta/recipes-kernel/linux/linux-yocto_5.14.bb | 2 +- 3 files changed, 3 insertions(+), 3 deletions(-) diff --git a/meta/recipes-kernel/linux/linux-yocto-rt_5.14.bb b/meta/recipes-kernel/linux/linux-yocto-rt_5.14.bb index 7dcab51f01..6f22173b1e 100644 --- a/meta/recipes-kernel/linux/linux-yocto-rt_5.14.bb +++ b/meta/recipes-kernel/linux/linux-yocto-rt_5.14.bb @@ -12,7 +12,7 @@ python () { } SRCREV_machine ?= "b18aaa90f5ce15336aacf4cc24c7a086aeb4bc84" -SRCREV_meta ?= "4f4ad2c8083408bb303e110090dcf5ca0ad447dd" +SRCREV_meta ?= "f9e349e174542980f72dcd087445d0106b7a5e75" SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;branch=${KBRANCH};name=machine \ git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-5.14;destsuffix=${KMETA}" diff --git a/meta/recipes-kernel/linux/linux-yocto-tiny_5.14.bb b/meta/recipes-kernel/linux/linux-yocto-tiny_5.14.bb index 23062df3b0..d44fac6094 100644 --- a/meta/recipes-kernel/linux/linux-yocto-tiny_5.14.bb +++ b/meta/recipes-kernel/linux/linux-yocto-tiny_5.14.bb @@ -17,7 +17,7 @@ KCONF_BSP_AUDIT_LEVEL = "2" SRCREV_machine:qemuarm ?= "159f57f8e022351d5193e51c02c951f2e255db1a" SRCREV_machine ?= "9d5572038eacda2e2a86e3f743f35ec415319fb4" -SRCREV_meta ?= "4f4ad2c8083408bb303e110090dcf5ca0ad447dd" +SRCREV_meta ?= "f9e349e174542980f72dcd087445d0106b7a5e75" PV = "${LINUX_VERSION}+git${SRCPV}" diff --git a/meta/recipes-kernel/linux/linux-yocto_5.14.bb b/meta/recipes-kernel/linux/linux-yocto_5.14.bb index aa7bf53682..b5be96b7c9 100644 --- a/meta/recipes-kernel/linux/linux-yocto_5.14.bb +++ b/meta/recipes-kernel/linux/linux-yocto_5.14.bb @@ -23,7 +23,7 @@ SRCREV_machine:qemux86 ?= "9d5572038eacda2e2a86e3f743f35ec415319fb4" SRCREV_machine:qemux86-64 ?= "9d5572038eacda2e2a86e3f743f35ec415319fb4" SRCREV_machine:qemumips64 ?= "f6646a344afbf6cacc91cbeaaec4240b372dd192" SRCREV_machine ?= "9d5572038eacda2e2a86e3f743f35ec415319fb4" -SRCREV_meta ?= "4f4ad2c8083408bb303e110090dcf5ca0ad447dd" +SRCREV_meta ?= "f9e349e174542980f72dcd087445d0106b7a5e75" # set your preferred provider of linux-yocto to 'linux-yocto-upstream', and you'll # get the /base branch, which is pure upstream -stable, and the same From patchwork Mon Jan 17 02:10:29 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: "Mittal, Anuj" X-Patchwork-Id: 2535 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 29F0BC43217 for ; Mon, 17 Jan 2022 02:11:02 +0000 (UTC) Received: from mga11.intel.com (mga11.intel.com [192.55.52.93]) by mx.groups.io with SMTP id smtpd.web11.6040.1642385441199973001 for ; Sun, 16 Jan 2022 18:10:55 -0800 Authentication-Results: mx.groups.io; dkim=fail reason="unable to parse pub key" header.i=@intel.com header.s=intel header.b=k9Hup109; spf=pass (domain: intel.com, ip: 192.55.52.93, mailfrom: anuj.mittal@intel.com) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1642385455; x=1673921455; h=from:to:subject:date:message-id:in-reply-to:references: mime-version:content-transfer-encoding; bh=c22fAvSOu50Nq/nKGMwvc0bthrxMwyu0GsqvNdNqCfk=; b=k9Hup1097c1ZZhZ9vI37ZKYavCOOrwq0MMnh10/4MrJizobjPeFS/FeN BF5e/qWr0yKd6VGgwBlFDu1/ejn8GAkq2zs7T+3IrPOPYbkN9EA3m/IK8 ufTV5YARs0L7CzicYXm7JYp7h/8IP9OKcEx3LE+42nB6AtQqYDSE10M0Y zYZmFpTbNBi3mcX9C2+MoEfDFhARlwgI+E/jp0FbiXj1GnVpxh+5lGU7H 51jL6cEC+pcPL3RXWZng/MbKdqoXqD4v4ppbS1HAzwoQux4Agfmq0kIuP S0ZCFgHM/AkZzcwkakaZr7Pq5PDvyhtvYvrJ8jyDbjeZCPeA/HhHwYbv7 Q==; X-IronPort-AV: E=McAfee;i="6200,9189,10229"; a="242094259" X-IronPort-AV: E=Sophos;i="5.88,294,1635231600"; d="scan'208";a="242094259" Received: from orsmga002.jf.intel.com ([10.7.209.21]) by fmsmga102.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 16 Jan 2022 18:10:54 -0800 X-IronPort-AV: E=Sophos;i="5.88,294,1635231600"; d="scan'208";a="492220734" Received: from khershix-mobl.gar.corp.intel.com (HELO anmitta2-mobl3.intel.com) ([10.215.230.190]) by orsmga002-auth.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 16 Jan 2022 18:10:52 -0800 From: Anuj Mittal To: openembedded-core@lists.openembedded.org Subject: [honister][PATCH 09/12] linux-yocto/5.10/cfg: add kcov feature fragment Date: Mon, 17 Jan 2022 10:10:29 +0800 Message-Id: <08e7077614ef010b74577fc0e183ce6f553ea5ad.1642385249.git.anuj.mittal@intel.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Mon, 17 Jan 2022 02:11:02 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/160628 From: Bruce Ashfield Integrating the following commit(s) to linux-yocto: 41721be8a03 cfg/debug: add kcov kernel configs Signed-off-by: Bruce Ashfield Signed-off-by: Richard Purdie (cherry picked from commit 6a11ed0910a9ed231bc3c4a9ee532358014ce535) Signed-off-by: Anuj Mittal --- meta/recipes-kernel/linux/linux-yocto-rt_5.10.bb | 2 +- meta/recipes-kernel/linux/linux-yocto-tiny_5.10.bb | 2 +- meta/recipes-kernel/linux/linux-yocto_5.10.bb | 2 +- 3 files changed, 3 insertions(+), 3 deletions(-) diff --git a/meta/recipes-kernel/linux/linux-yocto-rt_5.10.bb b/meta/recipes-kernel/linux/linux-yocto-rt_5.10.bb index f2279326b7..dd8326e92c 100644 --- a/meta/recipes-kernel/linux/linux-yocto-rt_5.10.bb +++ b/meta/recipes-kernel/linux/linux-yocto-rt_5.10.bb @@ -12,7 +12,7 @@ python () { } SRCREV_machine ?= "301346d30bcaccedc71da8d5f78bd262063d4ba7" -SRCREV_meta ?= "38b4f2e3bc974717352e8bc5491664e47542d237" +SRCREV_meta ?= "fdabd97ceceb2e3e74a132332c875f68b47b755b" SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;branch=${KBRANCH};name=machine \ git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-5.10;destsuffix=${KMETA}" diff --git a/meta/recipes-kernel/linux/linux-yocto-tiny_5.10.bb b/meta/recipes-kernel/linux/linux-yocto-tiny_5.10.bb index ae6d884954..9d2bbc010c 100644 --- a/meta/recipes-kernel/linux/linux-yocto-tiny_5.10.bb +++ b/meta/recipes-kernel/linux/linux-yocto-tiny_5.10.bb @@ -17,7 +17,7 @@ KCONF_BSP_AUDIT_LEVEL = "2" SRCREV_machine:qemuarm ?= "913d41ebe409dfd03c49fafd1923f8663df2a4ff" SRCREV_machine ?= "5575e67330fb6d979ed1cd2e9e64400b4c21b595" -SRCREV_meta ?= "38b4f2e3bc974717352e8bc5491664e47542d237" +SRCREV_meta ?= "fdabd97ceceb2e3e74a132332c875f68b47b755b" PV = "${LINUX_VERSION}+git${SRCPV}" diff --git a/meta/recipes-kernel/linux/linux-yocto_5.10.bb b/meta/recipes-kernel/linux/linux-yocto_5.10.bb index 3df4e86bd1..50fa1fb281 100644 --- a/meta/recipes-kernel/linux/linux-yocto_5.10.bb +++ b/meta/recipes-kernel/linux/linux-yocto_5.10.bb @@ -23,7 +23,7 @@ SRCREV_machine:qemux86 ?= "d59202c85b0f96b7a928ec594021a38e80c35a46" SRCREV_machine:qemux86-64 ?= "d59202c85b0f96b7a928ec594021a38e80c35a46" SRCREV_machine:qemumips64 ?= "29cb56446b0b66b7a15d2577773e69c4e813bfd7" SRCREV_machine ?= "d59202c85b0f96b7a928ec594021a38e80c35a46" -SRCREV_meta ?= "38b4f2e3bc974717352e8bc5491664e47542d237" +SRCREV_meta ?= "fdabd97ceceb2e3e74a132332c875f68b47b755b" # remap qemuarm to qemuarma15 for the 5.8 kernel # KMACHINE:qemuarm ?= "qemuarma15" From patchwork Mon Jan 17 02:10:30 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: "Mittal, Anuj" X-Patchwork-Id: 2536 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 27B98C433F5 for ; Mon, 17 Jan 2022 02:11:01 +0000 (UTC) Received: from mga11.intel.com (mga11.intel.com [192.55.52.93]) by mx.groups.io with SMTP id smtpd.web11.6040.1642385441199973001 for ; Sun, 16 Jan 2022 18:11:00 -0800 Authentication-Results: mx.groups.io; dkim=fail reason="unable to parse pub key" header.i=@intel.com header.s=intel header.b=Z86Sqhw0; spf=pass (domain: intel.com, ip: 192.55.52.93, mailfrom: anuj.mittal@intel.com) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1642385460; x=1673921460; h=from:to:subject:date:message-id:in-reply-to:references: mime-version:content-transfer-encoding; bh=ievXX15orQ01UXXX3t0j0D4gEgytCR6DtlMkndTVKMs=; b=Z86Sqhw0lAH/VrNqWxry9D4Zir5MmVXqfleaYNg9d6+DTu4VMzojWDqp ZcrUOwW2+Rca60m/q2VvoeM1wN1+jsa/S5IUhAEUgmHaxVghINT+Kcnyr NjNbHuzbiERg40YA/Sorlx+QlG1m5vw873hq8aNB0/uTrfofyBpJPGPiS YYUWf4/7u2artC3Ch4xex8hJdp0PGT1iD/rKY5P8xE/DpAwFi5gg/5uuS WNIiU0WTIizxtoFpT35Z7PeaddcadFDrwah5fo1cqIhrbQ86q05f/KjNl e6AEe34rGAJ5CBK7WLAxva5MbEa23ldV3kfo/RFHHeGbWAZ2xGB6x05Z4 A==; X-IronPort-AV: E=McAfee;i="6200,9189,10229"; a="242094285" X-IronPort-AV: E=Sophos;i="5.88,294,1635231600"; d="scan'208";a="242094285" Received: from orsmga002.jf.intel.com ([10.7.209.21]) by fmsmga102.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 16 Jan 2022 18:10:59 -0800 X-IronPort-AV: E=Sophos;i="5.88,294,1635231600"; d="scan'208";a="492220744" Received: from khershix-mobl.gar.corp.intel.com (HELO anmitta2-mobl3.intel.com) ([10.215.230.190]) by orsmga002-auth.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 16 Jan 2022 18:10:54 -0800 From: Anuj Mittal To: openembedded-core@lists.openembedded.org Subject: [honister][PATCH 10/12] linux-yocto/5.10: update to v5.10.90 Date: Mon, 17 Jan 2022 10:10:30 +0800 Message-Id: X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Mon, 17 Jan 2022 02:11:01 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/160629 From: Bruce Ashfield Updating linux-yocto/5.10 to the latest korg -stable release that comprises the following commits: d3e491a20d15 Linux 5.10.90 8c15bfb36a44 bpf: Add kconfig knob for disabling unpriv bpf by default d8a5b1377bf6 perf script: Fix CPU filtering of a script's switch events 2386e81a1d27 net: fix use-after-free in tw_timer_handler 34087cf96046 Input: spaceball - fix parsing of movement data packets 9f329d0d6c91 Input: appletouch - initialize work before device registration 2a4f551dec1a scsi: vmw_pvscsi: Set residual data length conditionally 1cb8444f3114 binder: fix async_free_space accounting for empty parcels a6e26251dd3a usb: mtu3: set interval of FS intr and isoc endpoint 3b6efe0b7ba0 usb: mtu3: fix list_head check warning f10b01c48f85 usb: mtu3: add memory barrier before set GPD's HWO 1c4ace3e6b85 usb: gadget: f_fs: Clear ffs_eventfd in ffs_data_clear. 1933fe8ce712 xhci: Fresco FL1100 controller should not have BROKEN_MSI quirk set. b8553330a077 drm/amdgpu: add support for IP discovery gc_info table v2 28863ffe21ff drm/amdgpu: When the VCN(1.0) block is suspended, powergating is explicitly enabled a0f3ac399ef5 uapi: fix linux/nfc.h userspace compilation errors 818c9e0a04df nfc: uapi: use kernel size_t to fix user-space builds 8d31cbab4c29 i2c: validate user data in compat ioctl 51c94d8fbd09 fsl/fman: Fix missing put_device() call in fman_port_probe 920932b20e0c net/ncsi: check for error return from call to nla_put_u32 610af55f9fbe selftests/net: udpgso_bench_tx: fix dst ip argument 78503589b1e0 net/mlx5e: Fix wrong features assignment in case of error 61146008087a ionic: Initialize the 'lif->dbid_inuse' bitmap b7c9a1427b32 igc: Fix TX timestamp support for non-MSI-X platforms e8a5988a85c7 net/smc: fix kernel panic caused by race of smc_sock 97c87c1db9ff net/smc: don't send CDC/LLC message if link not ready 99f19566b1c4 net/smc: improved fix wait on already cleared link e553265ea564 NFC: st21nfca: Fix memory leak in device probe and remove 8d70dc0eecf0 net: lantiq_xrx200: fix statistics of received bytes 7ef89bd1e8f1 net: ag71xx: Fix a potential double free in error handling paths 40d36186913b net: usb: pegasus: Do not drop long Ethernet frames a67becdaa8ad net/smc: fix using of uninitialized completions 769d14abd35e sctp: use call_rcu to free endpoint 13c1bf43b674 selftests: Calculate udpgso segment count without header adjustment abe74fb43378 udp: using datalen to cap ipv6 udp max gso segments 5e6ad649e927 net/mlx5e: Fix ICOSQ recovery flow for XSK 73665165b64a net/mlx5e: Wrap the tx reporter dump callback to extract the sq 4cd1da02f0c3 net/mlx5: DR, Fix NULL vs IS_ERR checking in dr_domain_init_resources fcb32eb3d04d scsi: lpfc: Terminate string in lpfc_debugfs_nvmeio_trc_write() 4833ad4908a1 selinux: initialize proto variable in selinux_ip_postroute_compat() ec941a2277a1 recordmcount.pl: fix typo in s390 mcount regex a0e82d5ef992 memblock: fix memblock_phys_alloc() section mismatch error 7da855e93964 platform/x86: apple-gmux: use resource_size() with res d01e9ce1af61 parisc: Clear stale IIR value on instruction access rights trap 0643d9175dc6 tomoyo: use hwight16() in tomoyo_domain_quota_is_ok() e2048a1f9186 tomoyo: Check exceeded quota early in tomoyo_domain_quota_is_ok(). 210c7c6908f3 Input: i8042 - enable deferred probe quirk for ASUS UM325UA bb672eff7447 Input: i8042 - add deferred probe support Signed-off-by: Bruce Ashfield Signed-off-by: Richard Purdie (cherry picked from commit ada52c924b8033939a448d8cedfc4e587bfdbc46) Signed-off-by: Anuj Mittal --- .../linux/linux-yocto-rt_5.10.bb | 6 ++--- .../linux/linux-yocto-tiny_5.10.bb | 8 +++---- meta/recipes-kernel/linux/linux-yocto_5.10.bb | 24 +++++++++---------- 3 files changed, 19 insertions(+), 19 deletions(-) diff --git a/meta/recipes-kernel/linux/linux-yocto-rt_5.10.bb b/meta/recipes-kernel/linux/linux-yocto-rt_5.10.bb index dd8326e92c..52ba3b9f61 100644 --- a/meta/recipes-kernel/linux/linux-yocto-rt_5.10.bb +++ b/meta/recipes-kernel/linux/linux-yocto-rt_5.10.bb @@ -11,13 +11,13 @@ python () { raise bb.parse.SkipRecipe("Set PREFERRED_PROVIDER_virtual/kernel to linux-yocto-rt to enable it") } -SRCREV_machine ?= "301346d30bcaccedc71da8d5f78bd262063d4ba7" -SRCREV_meta ?= "fdabd97ceceb2e3e74a132332c875f68b47b755b" +SRCREV_machine ?= "e137d5d92c05530840f2e191ec471f8f0ea2d62e" +SRCREV_meta ?= "65d66ac9789372923b42be0683a87955e52705a5" SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;branch=${KBRANCH};name=machine \ git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-5.10;destsuffix=${KMETA}" -LINUX_VERSION ?= "5.10.89" +LINUX_VERSION ?= "5.10.90" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" diff --git a/meta/recipes-kernel/linux/linux-yocto-tiny_5.10.bb b/meta/recipes-kernel/linux/linux-yocto-tiny_5.10.bb index 9d2bbc010c..d0166f6c4f 100644 --- a/meta/recipes-kernel/linux/linux-yocto-tiny_5.10.bb +++ b/meta/recipes-kernel/linux/linux-yocto-tiny_5.10.bb @@ -6,7 +6,7 @@ KCONFIG_MODE = "--allnoconfig" require recipes-kernel/linux/linux-yocto.inc -LINUX_VERSION ?= "5.10.89" +LINUX_VERSION ?= "5.10.90" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}" @@ -15,9 +15,9 @@ DEPENDS += "openssl-native util-linux-native" KMETA = "kernel-meta" KCONF_BSP_AUDIT_LEVEL = "2" -SRCREV_machine:qemuarm ?= "913d41ebe409dfd03c49fafd1923f8663df2a4ff" -SRCREV_machine ?= "5575e67330fb6d979ed1cd2e9e64400b4c21b595" -SRCREV_meta ?= "fdabd97ceceb2e3e74a132332c875f68b47b755b" +SRCREV_machine:qemuarm ?= "c0774ebd6bc1c7541deb4f9a649a1a6bfa42853f" +SRCREV_machine ?= "ab201bf6e3f9d187c7c26a0ec6537fadb41de918" +SRCREV_meta ?= "65d66ac9789372923b42be0683a87955e52705a5" PV = "${LINUX_VERSION}+git${SRCPV}" diff --git a/meta/recipes-kernel/linux/linux-yocto_5.10.bb b/meta/recipes-kernel/linux/linux-yocto_5.10.bb index 50fa1fb281..43274a318f 100644 --- a/meta/recipes-kernel/linux/linux-yocto_5.10.bb +++ b/meta/recipes-kernel/linux/linux-yocto_5.10.bb @@ -13,17 +13,17 @@ KBRANCH:qemux86 ?= "v5.10/standard/base" KBRANCH:qemux86-64 ?= "v5.10/standard/base" KBRANCH:qemumips64 ?= "v5.10/standard/mti-malta64" -SRCREV_machine:qemuarm ?= "b0dfabc86c3b6e1fb2ddb153664961e107bedfa9" -SRCREV_machine:qemuarm64 ?= "fea23aa594ce16a15564f991e14868dd255674cf" -SRCREV_machine:qemumips ?= "0ec16d85647a337f392ae358db3dcc200d958938" -SRCREV_machine:qemuppc ?= "a6a07d8acd8991883464bd3034beabb9ee23f11a" -SRCREV_machine:qemuriscv64 ?= "d59202c85b0f96b7a928ec594021a38e80c35a46" -SRCREV_machine:qemuriscv32 ?= "d59202c85b0f96b7a928ec594021a38e80c35a46" -SRCREV_machine:qemux86 ?= "d59202c85b0f96b7a928ec594021a38e80c35a46" -SRCREV_machine:qemux86-64 ?= "d59202c85b0f96b7a928ec594021a38e80c35a46" -SRCREV_machine:qemumips64 ?= "29cb56446b0b66b7a15d2577773e69c4e813bfd7" -SRCREV_machine ?= "d59202c85b0f96b7a928ec594021a38e80c35a46" -SRCREV_meta ?= "fdabd97ceceb2e3e74a132332c875f68b47b755b" +SRCREV_machine:qemuarm ?= "d9597fe71e155c5a96452d23694188d6d4091673" +SRCREV_machine:qemuarm64 ?= "210fcd9ee603afb731beaa5833e7e3f1d1918786" +SRCREV_machine:qemumips ?= "8688d3707cea38bd7ed115a12005079c2215f77d" +SRCREV_machine:qemuppc ?= "933b47667b7549bb36a809cca90bc372a7182620" +SRCREV_machine:qemuriscv64 ?= "2a2f4a19d9d77ad40b9d079be860f736846f5d55" +SRCREV_machine:qemuriscv32 ?= "2a2f4a19d9d77ad40b9d079be860f736846f5d55" +SRCREV_machine:qemux86 ?= "2a2f4a19d9d77ad40b9d079be860f736846f5d55" +SRCREV_machine:qemux86-64 ?= "2a2f4a19d9d77ad40b9d079be860f736846f5d55" +SRCREV_machine:qemumips64 ?= "25fcfe4f5c4be9bbb67498f09b2dd088f8bb6dfd" +SRCREV_machine ?= "2a2f4a19d9d77ad40b9d079be860f736846f5d55" +SRCREV_meta ?= "65d66ac9789372923b42be0683a87955e52705a5" # remap qemuarm to qemuarma15 for the 5.8 kernel # KMACHINE:qemuarm ?= "qemuarma15" @@ -32,7 +32,7 @@ SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;name=machine;branch=${KBRA git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-5.10;destsuffix=${KMETA}" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" -LINUX_VERSION ?= "5.10.89" +LINUX_VERSION ?= "5.10.90" DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}" DEPENDS += "openssl-native util-linux-native" From patchwork Mon Jan 17 02:10:31 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: "Mittal, Anuj" X-Patchwork-Id: 2540 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 231A0C43219 for ; Mon, 17 Jan 2022 02:11:04 +0000 (UTC) Received: from mga11.intel.com (mga11.intel.com [192.55.52.93]) by mx.groups.io with SMTP id smtpd.web11.6040.1642385441199973001 for ; Sun, 16 Jan 2022 18:11:03 -0800 Authentication-Results: mx.groups.io; dkim=fail reason="unable to parse pub key" header.i=@intel.com header.s=intel header.b=Mo93GYn5; spf=pass (domain: intel.com, ip: 192.55.52.93, mailfrom: anuj.mittal@intel.com) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1642385463; x=1673921463; h=from:to:subject:date:message-id:in-reply-to:references: mime-version:content-transfer-encoding; bh=yE8AuVeUurBG9grgRn34K/MglRElAYsilFTgib4qrAY=; b=Mo93GYn59hLt+vApqs8oMIUaP6shi0jLUGYOtszs4hQWi9gTMfCHgknr daWIJbstogcCVVG2NXbDtMqo07vzlvUpEaUX3Bam3wBmV+E3K7zkKtF5R ZtdLp4viCkANxdATgxfBPlYqXTvErcBaaaPo3vzm4dDWNaWSY1aWcCT5Y N8inZTN5BQlU2+wbK9kBWYMH0kwuOdG2mE2kGqi81nfLHlb18RfSUNLUJ J5hwm73BZ2MHCGg2We6PrxJVebG+V7yGJZWkxEeeIU2rF5YxEh5FX4fd7 pG40hx+LqMCggfak0gYPkIaqI0WzytXt/HrGvZbrgKMcCBnejV6u+CcRc A==; X-IronPort-AV: E=McAfee;i="6200,9189,10229"; a="242094299" X-IronPort-AV: E=Sophos;i="5.88,294,1635231600"; d="scan'208";a="242094299" Received: from orsmga002.jf.intel.com ([10.7.209.21]) by fmsmga102.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 16 Jan 2022 18:11:03 -0800 X-IronPort-AV: E=Sophos;i="5.88,294,1635231600"; d="scan'208";a="492220759" Received: from khershix-mobl.gar.corp.intel.com (HELO anmitta2-mobl3.intel.com) ([10.215.230.190]) by orsmga002-auth.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 16 Jan 2022 18:10:57 -0800 From: Anuj Mittal To: openembedded-core@lists.openembedded.org Subject: [honister][PATCH 11/12] libsndfile1: fix CVE-2021-4156 Date: Mon, 17 Jan 2022 10:10:31 +0800 Message-Id: <6566b64a55079aab8fa9b252e919a158bc595615.1642385249.git.anuj.mittal@intel.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Mon, 17 Jan 2022 02:11:04 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/160630 From: Changqing Li Signed-off-by: Changqing Li Signed-off-by: Anuj Mittal --- .../libsndfile1/CVE-2021-4156.patch | 32 +++++++++++++++++++ .../libsndfile/libsndfile1_1.0.28.bb | 1 + 2 files changed, 33 insertions(+) create mode 100644 meta/recipes-multimedia/libsndfile/libsndfile1/CVE-2021-4156.patch diff --git a/meta/recipes-multimedia/libsndfile/libsndfile1/CVE-2021-4156.patch b/meta/recipes-multimedia/libsndfile/libsndfile1/CVE-2021-4156.patch new file mode 100644 index 0000000000..b0ff1a0885 --- /dev/null +++ b/meta/recipes-multimedia/libsndfile/libsndfile1/CVE-2021-4156.patch @@ -0,0 +1,32 @@ +From 5adbc377cd90aa40f0cd56ae325ca70065a8aa19 Mon Sep 17 00:00:00 2001 +From: Changqing Li +Date: Thu, 13 Jan 2022 16:45:59 +0800 +Subject: [PATCH] flac: Fix improper buffer reusing + +CVE: CVE-2021-4156.patch +Upstream-Status: Backport [https://github.com/libsndfile/libsndfile/issues/731] + +Signed-off-by: Changqing Li +--- + src/flac.c | 4 ++++ + 1 file changed, 4 insertions(+) + +diff --git a/src/flac.c b/src/flac.c +index 0be82ac..6548bba 100644 +--- a/src/flac.c ++++ b/src/flac.c +@@ -952,7 +952,11 @@ flac_read_loop (SF_PRIVATE *psf, unsigned len) + /* Decode some more. */ + while (pflac->pos < pflac->len) + { if (FLAC__stream_decoder_process_single (pflac->fsd) == 0) ++ { psf_log_printf (psf, "FLAC__stream_decoder_process_single returned false\n") ; ++ /* Current frame is busted, so NULL the pointer. */ ++ pflac->frame = NULL ; + break ; ++ } + state = FLAC__stream_decoder_get_state (pflac->fsd) ; + if (state >= FLAC__STREAM_DECODER_END_OF_STREAM) + { psf_log_printf (psf, "FLAC__stream_decoder_get_state returned %s\n", FLAC__StreamDecoderStateString [state]) ; +-- +2.17.1 + diff --git a/meta/recipes-multimedia/libsndfile/libsndfile1_1.0.28.bb b/meta/recipes-multimedia/libsndfile/libsndfile1_1.0.28.bb index 443ca95e32..884d680fbe 100644 --- a/meta/recipes-multimedia/libsndfile/libsndfile1_1.0.28.bb +++ b/meta/recipes-multimedia/libsndfile/libsndfile1_1.0.28.bb @@ -20,6 +20,7 @@ SRC_URI = "http://www.mega-nerd.com/libsndfile/files/libsndfile-${PV}.tar.gz \ file://CVE-2017-12562.patch \ file://CVE-2018-19758.patch \ file://CVE-2019-3832.patch \ + file://CVE-2021-4156.patch \ " SRC_URI[md5sum] = "646b5f98ce89ac60cdb060fcd398247c" From patchwork Mon Jan 17 02:10:32 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: "Mittal, Anuj" X-Patchwork-Id: 2541 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 285EEC433EF for ; Mon, 17 Jan 2022 02:11:07 +0000 (UTC) Received: from mga11.intel.com (mga11.intel.com [192.55.52.93]) by mx.groups.io with SMTP id smtpd.web11.6040.1642385441199973001 for ; Sun, 16 Jan 2022 18:11:06 -0800 Authentication-Results: mx.groups.io; dkim=fail reason="unable to parse pub key" header.i=@intel.com header.s=intel header.b=DwBb9u6O; spf=pass (domain: intel.com, ip: 192.55.52.93, mailfrom: anuj.mittal@intel.com) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1642385466; x=1673921466; h=from:to:subject:date:message-id:in-reply-to:references: mime-version:content-transfer-encoding; bh=sVE+BuRR03Gw08PSTaV6zshqsW9p6Va46d8yZbFXkZ0=; b=DwBb9u6OZ7Y9fJnS3K5FDMbOfSPT5m6174hzNbjORpTNR5I9bnZ2yAYu gr/C3vAVLVeTtXQ1IPkLZOEk3GHLctN9zBY+8X5Nmek3WCoi/v5BZYbEm npDYBz+QuwakEPOlvq4hX1lVYuGD+8VyIohsMCDkoEmVhC2Pn5ZcdnfBM RpFlePE+gecKAka8JZFVZMHizqQ4CDSSLmph8+1csJmx8ze1NoWhniFcg Myo2G/iJK+ZyIgh6/7IUo58tyJoXj3p+jDcCnMmdR7ZtMW0VXm54QsM44 Aon6VHf9/wqtWeRqK9n+9FOMgjju/uG+q9oWxx5PlifB4QvyInVQIkT35 g==; X-IronPort-AV: E=McAfee;i="6200,9189,10229"; a="242094308" X-IronPort-AV: E=Sophos;i="5.88,294,1635231600"; d="scan'208";a="242094308" Received: from orsmga002.jf.intel.com ([10.7.209.21]) by fmsmga102.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 16 Jan 2022 18:11:05 -0800 X-IronPort-AV: E=Sophos;i="5.88,294,1635231600"; d="scan'208";a="492220769" Received: from khershix-mobl.gar.corp.intel.com (HELO anmitta2-mobl3.intel.com) ([10.215.230.190]) by orsmga002-auth.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 16 Jan 2022 18:11:01 -0800 From: Anuj Mittal To: openembedded-core@lists.openembedded.org Subject: [honister][PATCH 12/12] go: upgrade 1.16.10 -> 1.16.13 Date: Mon, 17 Jan 2022 10:10:32 +0800 Message-Id: <5a904f0fd02613664aa8c03d6d4935a68c01bf35.1642385249.git.anuj.mittal@intel.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Mon, 17 Jan 2022 02:11:07 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/160631 From: Sakib Sajal Release 1.16.13 includes fixes for CVE-2021-44716 and CVE-2021-44717. Signed-off-by: Sakib Sajal Signed-off-by: Anuj Mittal --- meta/recipes-devtools/go/{go-1.16.10.inc => go-1.16.13.inc} | 4 ++-- ...o-binary-native_1.16.10.bb => go-binary-native_1.16.13.bb} | 4 ++-- ...cross-canadian_1.16.10.bb => go-cross-canadian_1.16.13.bb} | 0 .../go/{go-cross_1.16.10.bb => go-cross_1.16.13.bb} | 0 .../go/{go-crosssdk_1.16.10.bb => go-crosssdk_1.16.13.bb} | 0 .../go/{go-native_1.16.10.bb => go-native_1.16.13.bb} | 0 .../go/{go-runtime_1.16.10.bb => go-runtime_1.16.13.bb} | 0 meta/recipes-devtools/go/{go_1.16.10.bb => go_1.16.13.bb} | 0 8 files changed, 4 insertions(+), 4 deletions(-) rename meta/recipes-devtools/go/{go-1.16.10.inc => go-1.16.13.inc} (90%) rename meta/recipes-devtools/go/{go-binary-native_1.16.10.bb => go-binary-native_1.16.13.bb} (83%) rename meta/recipes-devtools/go/{go-cross-canadian_1.16.10.bb => go-cross-canadian_1.16.13.bb} (100%) rename meta/recipes-devtools/go/{go-cross_1.16.10.bb => go-cross_1.16.13.bb} (100%) rename meta/recipes-devtools/go/{go-crosssdk_1.16.10.bb => go-crosssdk_1.16.13.bb} (100%) rename meta/recipes-devtools/go/{go-native_1.16.10.bb => go-native_1.16.13.bb} (100%) rename meta/recipes-devtools/go/{go-runtime_1.16.10.bb => go-runtime_1.16.13.bb} (100%) rename meta/recipes-devtools/go/{go_1.16.10.bb => go_1.16.13.bb} (100%) diff --git a/meta/recipes-devtools/go/go-1.16.10.inc b/meta/recipes-devtools/go/go-1.16.13.inc similarity index 90% rename from meta/recipes-devtools/go/go-1.16.10.inc rename to meta/recipes-devtools/go/go-1.16.13.inc index 7549ffc211..46c6528dc4 100644 --- a/meta/recipes-devtools/go/go-1.16.10.inc +++ b/meta/recipes-devtools/go/go-1.16.13.inc @@ -1,7 +1,7 @@ require go-common.inc GO_BASEVERSION = "1.16" -PV = "1.16.10" +PV = "1.16.13" FILESEXTRAPATHS:prepend := "${FILE_DIRNAME}/go-${GO_BASEVERSION}:" LIC_FILES_CHKSUM = "file://LICENSE;md5=5d4950ecb7b26d2c5e4e7b4e0dd74707" @@ -17,7 +17,7 @@ SRC_URI += "\ file://0008-use-GOBUILDMODE-to-set-buildmode.patch \ file://0009-Revert-cmd-go-make-sure-CC-and-CXX-are-absolute.patch \ " -SRC_URI[main.sha256sum] = "a905472011585e403d00d2a41de7ced29b8884309d73482a307f689fd0f320b5" +SRC_URI[main.sha256sum] = "b0926654eaeb01ef43816638f42d7b1681f2d3f41b9559f07735522b7afad41a" # Upstream don't believe it is a signifiant real world issue and will only # fix in 1.17 onwards where we can drop this. diff --git a/meta/recipes-devtools/go/go-binary-native_1.16.10.bb b/meta/recipes-devtools/go/go-binary-native_1.16.13.bb similarity index 83% rename from meta/recipes-devtools/go/go-binary-native_1.16.10.bb rename to meta/recipes-devtools/go/go-binary-native_1.16.13.bb index 4866c9f847..6e498a17be 100644 --- a/meta/recipes-devtools/go/go-binary-native_1.16.10.bb +++ b/meta/recipes-devtools/go/go-binary-native_1.16.13.bb @@ -8,8 +8,8 @@ LIC_FILES_CHKSUM = "file://LICENSE;md5=5d4950ecb7b26d2c5e4e7b4e0dd74707" PROVIDES = "go-native" SRC_URI = "https://dl.google.com/go/go${PV}.${BUILD_GOOS}-${BUILD_GOARCH}.tar.gz;name=go_${BUILD_GOTUPLE}" -SRC_URI[go_linux_amd64.sha256sum] = "414cd18ce1d193769b9e97d2401ad718755ab47816e13b2a1cde203d263b55cf" -SRC_URI[go_linux_arm64.sha256sum] = "bfe1d4b82626c742b4690a832ca59a21e3d702161556f3c0ed26dffb368927e9" +SRC_URI[go_linux_amd64.sha256sum] = "275fc03c90c13b0bbff13125a43f1f7a9f9c00a0d5a9f2d5b16dbc2fa2c6e12a" +SRC_URI[go_linux_arm64.sha256sum] = "3dd8e14837105cbfedf7124c7f8c524ce492748c370036c7316ef99e18d116d7" UPSTREAM_CHECK_URI = "https://golang.org/dl/" UPSTREAM_CHECK_REGEX = "go(?P\d+(\.\d+)+)\.linux" diff --git a/meta/recipes-devtools/go/go-cross-canadian_1.16.10.bb b/meta/recipes-devtools/go/go-cross-canadian_1.16.13.bb similarity index 100% rename from meta/recipes-devtools/go/go-cross-canadian_1.16.10.bb rename to meta/recipes-devtools/go/go-cross-canadian_1.16.13.bb diff --git a/meta/recipes-devtools/go/go-cross_1.16.10.bb b/meta/recipes-devtools/go/go-cross_1.16.13.bb similarity index 100% rename from meta/recipes-devtools/go/go-cross_1.16.10.bb rename to meta/recipes-devtools/go/go-cross_1.16.13.bb diff --git a/meta/recipes-devtools/go/go-crosssdk_1.16.10.bb b/meta/recipes-devtools/go/go-crosssdk_1.16.13.bb similarity index 100% rename from meta/recipes-devtools/go/go-crosssdk_1.16.10.bb rename to meta/recipes-devtools/go/go-crosssdk_1.16.13.bb diff --git a/meta/recipes-devtools/go/go-native_1.16.10.bb b/meta/recipes-devtools/go/go-native_1.16.13.bb similarity index 100% rename from meta/recipes-devtools/go/go-native_1.16.10.bb rename to meta/recipes-devtools/go/go-native_1.16.13.bb diff --git a/meta/recipes-devtools/go/go-runtime_1.16.10.bb b/meta/recipes-devtools/go/go-runtime_1.16.13.bb similarity index 100% rename from meta/recipes-devtools/go/go-runtime_1.16.10.bb rename to meta/recipes-devtools/go/go-runtime_1.16.13.bb diff --git a/meta/recipes-devtools/go/go_1.16.10.bb b/meta/recipes-devtools/go/go_1.16.13.bb similarity index 100% rename from meta/recipes-devtools/go/go_1.16.10.bb rename to meta/recipes-devtools/go/go_1.16.13.bb