From patchwork Sat Apr 29 17:20:21 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 23174 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id C2E58C7EE23 for ; Sat, 29 Apr 2023 17:20:56 +0000 (UTC) Received: from mail-pf1-f172.google.com (mail-pf1-f172.google.com [209.85.210.172]) by mx.groups.io with SMTP id smtpd.web11.51325.1682788852001233636 for ; Sat, 29 Apr 2023 10:20:52 -0700 Authentication-Results: mx.groups.io; dkim=fail reason="signature has expired" header.i=@sakoman-com.20221208.gappssmtp.com header.s=20221208 header.b=lfkZohDB; spf=softfail (domain: sakoman.com, ip: 209.85.210.172, mailfrom: steve@sakoman.com) Received: by mail-pf1-f172.google.com with SMTP id d2e1a72fcca58-64115e652eeso19066504b3a.0 for ; Sat, 29 Apr 2023 10:20:51 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20221208.gappssmtp.com; s=20221208; t=1682788851; x=1685380851; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=Cuxd0KSAKW2egAr7ix3D5Z+Z994oXV2woH9DquAY2Qo=; b=lfkZohDBL4yV/nYQouYW2VtvoYO9kcBM/050rJ+v1bGfdYGs/L1Jy+z4eLsOK32v1x 6G8Z+wEY0wH0yKDez6uWGphaerUq2+2kIHeO7dl64QqBjphlpnOhYSsgeDOSTngQpDEa I3oHz0aBKVAMEKaYVYLhnNgRq5jjGamv8FhodpBmG1xWiuIw/x4srUPAaE1sEM/apQLw coxbWt6iblpvmde4RdYNjylrac/1ZV5ZUdYZc1by199qUFdxnZvvcjnAzVJRmALM+1Xb h7JqyJOwRSiCW/X/pgsehRgvZ4U94hupDIf4WpiCjFcAUmcGUT4MANYCqJ0m0t9mQeaL mgXg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1682788851; x=1685380851; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=Cuxd0KSAKW2egAr7ix3D5Z+Z994oXV2woH9DquAY2Qo=; b=LTotRtENgBevo1ITRrt1WcX/4fFcIN7d1yDRD2jXoZtmcC3XZUJlyCHkRBO3//w7ys /poCFNvNrSw/dihe9tjqMWbAut/xKgSSYz8VfIIg7ewDXOkGoCbFMDH1fRDYCU6/VYLw rKXoatCBKfEjO9CJo6WlTdKbKsQsfKG56Oup2FmZv8cBxEuf8xg7XHReHnCdXf0mOeAh X1LpXZZEdAFNEczfsENCwk9WfJY51pN3OU3g+kSw6n9e9Vo5TyFfl+RmpnBnXeASZPjf qsMS0o6ktDaLfBE8UxXsoft+3PIOc7HVNV5R7a+5XqQBsVYTdatBDiwIcGlKk7NDevJ4 ADlw== X-Gm-Message-State: AC+VfDylpDU52gReyTUsbCffRKWoZHQZsoxaVkq3R2enj3kWaqNDy/Et 1t2dlankuUyYHYdrt/mLNmBh7+vPZkQo/PnCK1I= X-Google-Smtp-Source: ACHHUZ4Kr9VMB36bs7niCtCZyx2xt9tGKDcTtXlwK6Ook9U1Jr03csxA2ZjA1tvuafdPdvo8ycVoIQ== X-Received: by 2002:a17:903:1c9:b0:1a6:f5d5:b7f6 with SMTP id e9-20020a17090301c900b001a6f5d5b7f6mr16477440plh.10.1682788850883; Sat, 29 Apr 2023 10:20:50 -0700 (PDT) Received: from hexa.lan (rrcs-66-91-142-162.west.biz.rr.com. [66.91.142.162]) by smtp.gmail.com with ESMTPSA id c3-20020a170902d90300b001a6b9c42dbasm15156041plz.88.2023.04.29.10.20.49 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sat, 29 Apr 2023 10:20:50 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][kirkstone 01/13] ruby: Fix CVE-2023-28755 Date: Sat, 29 Apr 2023 07:20:21 -1000 Message-Id: <605634cf1adef2d9cf6dc6fdf17aa4032385497f.1682788726.git.steve@sakoman.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Sat, 29 Apr 2023 17:20:56 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/180544 From: Mingli Yu Backport patch [1] to fix CVE-2023-28755. [1] https://github.com/ruby/ruby/commit/8ce4ab146498879b65e22f1be951b25eebb79300 Signed-off-by: Mingli Yu Signed-off-by: Steve Sakoman --- .../ruby/ruby/CVE-2023-28755.patch | 68 +++++++++++++++++++ meta/recipes-devtools/ruby/ruby_3.1.3.bb | 1 + 2 files changed, 69 insertions(+) create mode 100644 meta/recipes-devtools/ruby/ruby/CVE-2023-28755.patch diff --git a/meta/recipes-devtools/ruby/ruby/CVE-2023-28755.patch b/meta/recipes-devtools/ruby/ruby/CVE-2023-28755.patch new file mode 100644 index 0000000000..d611c41dcc --- /dev/null +++ b/meta/recipes-devtools/ruby/ruby/CVE-2023-28755.patch @@ -0,0 +1,68 @@ +From db4bb57d4af6d097a0c29490536793d95f1d8983 Mon Sep 17 00:00:00 2001 +From: Hiroshi SHIBATA +Date: Mon, 24 Apr 2023 08:27:24 +0000 +Subject: [PATCH] Merge URI-0.12.1 + +CVE: CVE-2023-28755 + +Upstream-Status: Backport [https://github.com/ruby/ruby/commit/8ce4ab146498879b65e22f1be951b25eebb79300] + +Signed-off-by: Mingli Yu +--- + lib/uri/rfc3986_parser.rb | 4 ++-- + lib/uri/version.rb | 2 +- + test/uri/test_common.rb | 11 +++++++++++ + 3 files changed, 14 insertions(+), 3 deletions(-) + +diff --git a/lib/uri/rfc3986_parser.rb b/lib/uri/rfc3986_parser.rb +index 3e07de4..3c89311 100644 +--- a/lib/uri/rfc3986_parser.rb ++++ b/lib/uri/rfc3986_parser.rb +@@ -3,8 +3,8 @@ module URI + class RFC3986_Parser # :nodoc: + # URI defined in RFC3986 + # this regexp is modified not to host is not empty string +- RFC3986_URI = /\A(?(?[A-Za-z][+\-.0-9A-Za-z]*):(?\/\/(?(?:(?(?:%\h\h|[!$&-.0-;=A-Z_a-z~])*)@)?(?(?\[(?:(?(?:\h{1,4}:){6}(?\h{1,4}:\h{1,4}|(?(?[1-9]\d|1\d{2}|2[0-4]\d|25[0-5]|\d)\.\g\.\g\.\g))|::(?:\h{1,4}:){5}\g|\h{1,4}?::(?:\h{1,4}:){4}\g|(?:(?:\h{1,4}:)?\h{1,4})?::(?:\h{1,4}:){3}\g|(?:(?:\h{1,4}:){,2}\h{1,4})?::(?:\h{1,4}:){2}\g|(?:(?:\h{1,4}:){,3}\h{1,4})?::\h{1,4}:\g|(?:(?:\h{1,4}:){,4}\h{1,4})?::\g|(?:(?:\h{1,4}:){,5}\h{1,4})?::\h{1,4}|(?:(?:\h{1,4}:){,6}\h{1,4})?::)|(?v\h+\.[!$&-.0-;=A-Z_a-z~]+))\])|\g|(?(?:%\h\h|[!$&-.0-9;=A-Z_a-z~])+))?(?::(?\d*))?)(?(?:\/(?(?:%\h\h|[!$&-.0-;=@-Z_a-z~])*))*)|(?\/(?:(?(?:%\h\h|[!$&-.0-;=@-Z_a-z~])+)(?:\/\g)*)?)|(?\g(?:\/\g)*)|(?))(?:\?(?[^#]*))?(?:\#(?(?:%\h\h|[!$&-.0-;=@-Z_a-z~\/?])*))?)\z/ +- RFC3986_relative_ref = /\A(?(?\/\/(?(?:(?(?:%\h\h|[!$&-.0-;=A-Z_a-z~])*)@)?(?(?\[(?(?:\h{1,4}:){6}(?\h{1,4}:\h{1,4}|(?(?[1-9]\d|1\d{2}|2[0-4]\d|25[0-5]|\d)\.\g\.\g\.\g))|::(?:\h{1,4}:){5}\g|\h{1,4}?::(?:\h{1,4}:){4}\g|(?:(?:\h{1,4}:){,1}\h{1,4})?::(?:\h{1,4}:){3}\g|(?:(?:\h{1,4}:){,2}\h{1,4})?::(?:\h{1,4}:){2}\g|(?:(?:\h{1,4}:){,3}\h{1,4})?::\h{1,4}:\g|(?:(?:\h{1,4}:){,4}\h{1,4})?::\g|(?:(?:\h{1,4}:){,5}\h{1,4})?::\h{1,4}|(?:(?:\h{1,4}:){,6}\h{1,4})?::)|(?v\h+\.[!$&-.0-;=A-Z_a-z~]+)\])|\g|(?(?:%\h\h|[!$&-.0-9;=A-Z_a-z~])+))?(?::(?\d*))?)(?(?:\/(?(?:%\h\h|[!$&-.0-;=@-Z_a-z~])*))*)|(?\/(?:(?(?:%\h\h|[!$&-.0-;=@-Z_a-z~])+)(?:\/\g)*)?)|(?(?(?:%\h\h|[!$&-.0-9;=@-Z_a-z~])+)(?:\/\g)*)|(?))(?:\?(?[^#]*))?(?:\#(?(?:%\h\h|[!$&-.0-;=@-Z_a-z~\/?])*))?)\z/ ++ RFC3986_URI = /\A(?(?[A-Za-z][+\-.0-9A-Za-z]*+):(?\/\/(?(?:(?(?:%\h\h|[!$&-.0-;=A-Z_a-z~])*+)@)?(?(?\[(?:(?(?:\h{1,4}:){6}(?\h{1,4}:\h{1,4}|(?(?[1-9]\d|1\d{2}|2[0-4]\d|25[0-5]|\d)\.\g\.\g\.\g))|::(?:\h{1,4}:){5}\g|\h{1,4}?::(?:\h{1,4}:){4}\g|(?:(?:\h{1,4}:)?\h{1,4})?::(?:\h{1,4}:){3}\g|(?:(?:\h{1,4}:){,2}\h{1,4})?::(?:\h{1,4}:){2}\g|(?:(?:\h{1,4}:){,3}\h{1,4})?::\h{1,4}:\g|(?:(?:\h{1,4}:){,4}\h{1,4})?::\g|(?:(?:\h{1,4}:){,5}\h{1,4})?::\h{1,4}|(?:(?:\h{1,4}:){,6}\h{1,4})?::)|(?v\h++\.[!$&-.0-;=A-Z_a-z~]++))\])|\g|(?(?:%\h\h|[!$&-.0-9;=A-Z_a-z~])*+))(?::(?\d*+))?)(?(?:\/(?(?:%\h\h|[!$&-.0-;=@-Z_a-z~])*+))*+)|(?\/(?:(?(?:%\h\h|[!$&-.0-;=@-Z_a-z~])++)(?:\/\g)*+)?)|(?\g(?:\/\g)*+)|(?))(?:\?(?[^#]*+))?(?:\#(?(?:%\h\h|[!$&-.0-;=@-Z_a-z~\/?])*+))?)\z/ ++ RFC3986_relative_ref = /\A(?(?\/\/(?(?:(?(?:%\h\h|[!$&-.0-;=A-Z_a-z~])*+)@)?(?(?\[(?:(?(?:\h{1,4}:){6}(?\h{1,4}:\h{1,4}|(?(?[1-9]\d|1\d{2}|2[0-4]\d|25[0-5]|\d)\.\g\.\g\.\g))|::(?:\h{1,4}:){5}\g|\h{1,4}?::(?:\h{1,4}:){4}\g|(?:(?:\h{1,4}:){,1}\h{1,4})?::(?:\h{1,4}:){3}\g|(?:(?:\h{1,4}:){,2}\h{1,4})?::(?:\h{1,4}:){2}\g|(?:(?:\h{1,4}:){,3}\h{1,4})?::\h{1,4}:\g|(?:(?:\h{1,4}:){,4}\h{1,4})?::\g|(?:(?:\h{1,4}:){,5}\h{1,4})?::\h{1,4}|(?:(?:\h{1,4}:){,6}\h{1,4})?::)|(?v\h++\.[!$&-.0-;=A-Z_a-z~]++))\])|\g|(?(?:%\h\h|[!$&-.0-9;=A-Z_a-z~])++))?(?::(?\d*+))?)(?(?:\/(?(?:%\h\h|[!$&-.0-;=@-Z_a-z~])*+))*+)|(?\/(?:(?(?:%\h\h|[!$&-.0-;=@-Z_a-z~])++)(?:\/\g)*+)?)|(?(?(?:%\h\h|[!$&-.0-9;=@-Z_a-z~])++)(?:\/\g)*+)|(?))(?:\?(?[^#]*+))?(?:\#(?(?:%\h\h|[!$&-.0-;=@-Z_a-z~\/?])*+))?)\z/ + attr_reader :regexp + + def initialize +diff --git a/lib/uri/version.rb b/lib/uri/version.rb +index 82188e2..7497a7d 100644 +--- a/lib/uri/version.rb ++++ b/lib/uri/version.rb +@@ -1,6 +1,6 @@ + module URI + # :stopdoc: +- VERSION_CODE = '001100'.freeze ++ VERSION_CODE = '001201'.freeze + VERSION = VERSION_CODE.scan(/../).collect{|n| n.to_i}.join('.').freeze + # :startdoc: + end +diff --git a/test/uri/test_common.rb b/test/uri/test_common.rb +index 5e30cda..1d34783 100644 +--- a/test/uri/test_common.rb ++++ b/test/uri/test_common.rb +@@ -78,6 +78,17 @@ class TestCommon < Test::Unit::TestCase + assert_raise(NoMethodError) { Object.new.URI("http://www.ruby-lang.org/") } + end + ++ def test_parse_timeout ++ pre = ->(n) { ++ 'https://example.com/dir/' + 'a' * (n * 100) + '/##.jpg' ++ } ++ assert_linear_performance((1..10).map {|i| i * 100}, rehearsal: 1000, pre: pre) do |uri| ++ assert_raise(URI::InvalidURIError) do ++ URI.parse(uri) ++ end ++ end ++ end ++ + def test_encode_www_form_component + assert_equal("%00+%21%22%23%24%25%26%27%28%29*%2B%2C-.%2F09%3A%3B%3C%3D%3E%3F%40" \ + "AZ%5B%5C%5D%5E_%60az%7B%7C%7D%7E", +-- +2.35.5 + diff --git a/meta/recipes-devtools/ruby/ruby_3.1.3.bb b/meta/recipes-devtools/ruby/ruby_3.1.3.bb index 92efc5db91..72030508dd 100644 --- a/meta/recipes-devtools/ruby/ruby_3.1.3.bb +++ b/meta/recipes-devtools/ruby/ruby_3.1.3.bb @@ -30,6 +30,7 @@ SRC_URI = "http://cache.ruby-lang.org/pub/ruby/${SHRT_VER}/ruby-${PV}.tar.gz \ file://0006-Make-gemspecs-reproducible.patch \ file://0001-vm_dump.c-Define-REG_S1-and-REG_S2-for-musl-riscv.patch \ file://CVE-2023-28756.patch \ + file://CVE-2023-28755.patch \ " UPSTREAM_CHECK_URI = "https://www.ruby-lang.org/en/downloads/" From patchwork Sat Apr 29 17:20:22 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 23173 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id C2D02C77B7F for ; Sat, 29 Apr 2023 17:20:56 +0000 (UTC) Received: from mail-pj1-f53.google.com (mail-pj1-f53.google.com [209.85.216.53]) by mx.groups.io with SMTP id smtpd.web10.51572.1682788854250366077 for ; Sat, 29 Apr 2023 10:20:54 -0700 Authentication-Results: mx.groups.io; dkim=fail reason="signature has expired" header.i=@sakoman-com.20221208.gappssmtp.com header.s=20221208 header.b=rIGKDCGx; spf=softfail (domain: sakoman.com, ip: 209.85.216.53, mailfrom: steve@sakoman.com) Received: by mail-pj1-f53.google.com with SMTP id 98e67ed59e1d1-24dec03ad8fso95418a91.1 for ; Sat, 29 Apr 2023 10:20:54 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20221208.gappssmtp.com; s=20221208; t=1682788853; x=1685380853; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=Zop7QyqOlnweELx104dtrZmqStiJ9p+/SqWmS6m4e+0=; b=rIGKDCGxMvLPmB5DmXizaXbXp/EtnbT48kRGSNigdUtWT3qe43fd4ycVoi/rExZfS2 2Fqb5oC0ciphFlTFCWPrGSevA2s42ESDmoUQ2j++Kj11v/UmWApzGVnnJGH5wmersxg4 jWHmP75t1YvRoRk1InWMpOAkcV2mC6tMTh6QmYjT+yzQhWRD2cGP1au+nl6QlvhwylSS pfKUgbyoUkErcju64+eClP7fEiCNZFfVFao/TuBgXEnkpSNH381l5OA1oPb7q7P0ePQO DJ3aTEeYbvv4MNj5M0sAs+QHXsbEa2iEIv0IyEggdyZZ9gao2JE9IFmAZwut0p1VI3X7 EiVA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1682788853; x=1685380853; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=Zop7QyqOlnweELx104dtrZmqStiJ9p+/SqWmS6m4e+0=; b=dbHcuUKmqxwl3mx/qZ9FafkjsIfzqXjYNUsm4nSdO76hz9rKJLq5s9P8xO/6c4voxf xJcenzN6Dc8T4ganYK7ZbcSX5Zqk/ctJWcZxq1xIt1iJsUHpGXm92IijrnG7U/2HkClO 7oeCvtRVMNlr6ZGg4rRMqq0KhcNDn92aK5nnChWJ8lhMRDZdK6zkPqhhbow8hhPI4ebO OKyUQwsF0m9aDoGnj84iFZ3aOqsZVF0MKdo2ESVfC+Z/BXY899Slb5cxEoOESAQr+nft 8yyBAeMkDfMPH42HJqHe5c2fY9Sl7DfildPAndk4Vo/YKfrgXxzBCXIczhhMrCbDxDEp 1/NQ== X-Gm-Message-State: AC+VfDxqJ9WkGNVTUwQnBe4RHuN0uuJXhShcBo56G1Vrk3KlpHyMokd0 wqIU+7udgYxpAR6Y0bs2sQQNboW7OgGAqpF7d2s= X-Google-Smtp-Source: ACHHUZ59v0Mwhwpv2fpQQWB0s+VEHiktg4PjTtnTPDEaTErhzTAR6T5Bno9npCJE7Yrd167S55T+MA== X-Received: by 2002:a17:902:e805:b0:19e:7a2c:78a7 with SMTP id u5-20020a170902e80500b0019e7a2c78a7mr11758522plg.57.1682788853212; Sat, 29 Apr 2023 10:20:53 -0700 (PDT) Received: from hexa.lan (rrcs-66-91-142-162.west.biz.rr.com. [66.91.142.162]) by smtp.gmail.com with ESMTPSA id c3-20020a170902d90300b001a6b9c42dbasm15156041plz.88.2023.04.29.10.20.52 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sat, 29 Apr 2023 10:20:52 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][kirkstone 02/13] ghostscript: fix CVE-2023-29979 Date: Sat, 29 Apr 2023 07:20:22 -1000 Message-Id: <6d5baff50aa83c663856cccc375c522add97625e.1682788726.git.steve@sakoman.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Sat, 29 Apr 2023 17:20:56 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/180545 From: Joe Slater Backport from 10.02.0 (unreleased). Signed-off-by: Joe Slater Signed-off-by: Steve Sakoman --- .../ghostscript/cve-2023-28879.patch | 60 +++++++++++++++++++ .../ghostscript/ghostscript_9.55.0.bb | 1 + 2 files changed, 61 insertions(+) create mode 100644 meta/recipes-extended/ghostscript/ghostscript/cve-2023-28879.patch diff --git a/meta/recipes-extended/ghostscript/ghostscript/cve-2023-28879.patch b/meta/recipes-extended/ghostscript/ghostscript/cve-2023-28879.patch new file mode 100644 index 0000000000..9b057d609a --- /dev/null +++ b/meta/recipes-extended/ghostscript/ghostscript/cve-2023-28879.patch @@ -0,0 +1,60 @@ +From 37ed5022cecd584de868933b5b60da2e995b3179 Mon Sep 17 00:00:00 2001 +From: Ken Sharp +Date: Fri, 24 Mar 2023 13:19:57 +0000 +Subject: [PATCH] Graphics library - prevent buffer overrun in (T)BCP encoding + +Bug #706494 "Buffer Overflow in s_xBCPE_process" + +As described in detail in the bug report, if the write buffer is filled +to one byte less than full, and we then try to write an escaped +character, we overrun the buffer because we don't check before +writing two bytes to it. + +This just checks if we have two bytes before starting to write an +escaped character and exits if we don't (replacing the consumed byte +of the input). + +Up for further discussion; why do we even permit a BCP encoding filter +anyway ? I think we should remove this, at least when SAFER is true. +--- +CVE: CVE-2023-28879 + +Upstream-Status: Backport [see text] + +git://git.ghostscript.com/ghostpdl +cherry-pick + +Signed-off-by: Joe Slater + +--- + base/sbcp.c | 10 +++++++++- + 1 file changed, 9 insertions(+), 1 deletion(-) + +diff --git a/base/sbcp.c b/base/sbcp.c +index 979ae0992..47fc233ec 100644 +--- a/base/sbcp.c ++++ b/base/sbcp.c +@@ -1,4 +1,4 @@ +-/* Copyright (C) 2001-2021 Artifex Software, Inc. ++/* Copyright (C) 2001-2023 Artifex Software, Inc. + All Rights Reserved. + + This software is provided AS-IS with no warranty, either express or +@@ -50,6 +50,14 @@ s_xBCPE_process(stream_state * st, stream_cursor_read * pr, + byte ch = *++p; + + if (ch <= 31 && escaped[ch]) { ++ /* Make sure we have space to store two characters in the write buffer, ++ * if we don't then exit without consuming the input character, we'll process ++ * that on the next time round. ++ */ ++ if (pw->limit - q < 2) { ++ p--; ++ break; ++ } + if (p == rlimit) { + p--; + break; +-- +2.25.1 + diff --git a/meta/recipes-extended/ghostscript/ghostscript_9.55.0.bb b/meta/recipes-extended/ghostscript/ghostscript_9.55.0.bb index 365420fb64..f29c57beea 100644 --- a/meta/recipes-extended/ghostscript/ghostscript_9.55.0.bb +++ b/meta/recipes-extended/ghostscript/ghostscript_9.55.0.bb @@ -34,6 +34,7 @@ SRC_URI_BASE = "https://github.com/ArtifexSoftware/ghostpdl-downloads/releases/d file://avoid-host-contamination.patch \ file://mkdir-p.patch \ file://CVE-2022-2085.patch \ + file://cve-2023-28879.patch \ " SRC_URI = "${SRC_URI_BASE} \ From patchwork Sat Apr 29 17:20:23 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 23176 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 8C438C77B60 for ; Sat, 29 Apr 2023 17:21:06 +0000 (UTC) Received: from mail-pj1-f49.google.com (mail-pj1-f49.google.com [209.85.216.49]) by mx.groups.io with SMTP id smtpd.web10.51575.1682788858041398188 for ; Sat, 29 Apr 2023 10:20:58 -0700 Authentication-Results: mx.groups.io; dkim=fail reason="signature has expired" header.i=@sakoman-com.20221208.gappssmtp.com header.s=20221208 header.b=RFBMi+jm; spf=softfail (domain: sakoman.com, ip: 209.85.216.49, mailfrom: steve@sakoman.com) Received: by mail-pj1-f49.google.com with SMTP id 98e67ed59e1d1-24dd508237bso443523a91.3 for ; Sat, 29 Apr 2023 10:20:57 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20221208.gappssmtp.com; s=20221208; t=1682788857; x=1685380857; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=C5Xg9IGUav94zD1FslEFFsHEuaSnR9pf9EXPeMGpP54=; b=RFBMi+jmL3NbBSGSwdixVgBnOXk7FWQfvF3q8gF3lO+fK7caNTOLRp4zGrMUw8sqNZ ZHeuoUo0OyH4ObJBDg/p4sT9J7vXibTgrCTmDCDIIDFQFjmPpWCW8ibgd4JRg6xVrECv 202mqwFfUY4CbdgQmmK41bHX7vxCEhNLpuasfzCI7C7VSDaQ0nBZLwi9UGFa7Ih16zzP X9IpAqOJElld9W5UQJctKzfPmOwSkDXegO358Qed31FNkoLGunYINwhuHLcvwmIIkDqB CMHbpGlE8r0G/ytOa0S3WT1AWdgL5lVb4oVrRtJPPRCJKAmKITd9zWx88eEeoRCRHd0N gihw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1682788857; x=1685380857; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=C5Xg9IGUav94zD1FslEFFsHEuaSnR9pf9EXPeMGpP54=; b=cqADBOQ++J6+0NFTp4SwP2l2PYR9AsQmZFsyNpI57gr9JFV0eC2HPv4pNYR9aNK0UI 9zP4HMlfvMuq+nP7EpVNAhyEbMFN+VWWR1cFsuqkTWAloBfLBfPc1diNtE6ajIE2Hc3s 7iK0+oWRFD1Xn1kjz4napTzOIXJ0NLKDvMJmPD7P6pyVmTIR7dEdbQn1Dn5wBuefkGcv VufIlKFxYigY8tWMx3H93ogq6hfOXXGVGJ+MeuH8xtVh+enaAiUK18D8bCNsuC6/2hGN rIZgggjfAhBh3qOLEKg+YkG6LMjP1sXP5Fvz8QinxDID2mAXjJiEyMq+shNn8PFlmSud CHGg== X-Gm-Message-State: AC+VfDyMrIaI5HM5WohxkXWs381/AzR4NF+/4IicGS4AbYn3+RJmLIPP NhmQXccJNLGkwZcVdNp0EA+17aUFoeYNv3PEFIA= X-Google-Smtp-Source: ACHHUZ7bsymqCUS6hX0fEA8KGMfjiVtjTZHzoTu838TILkRhGLCFkR/cRTjHT4nB4zWC+ADxez+jyA== X-Received: by 2002:a17:902:7489:b0:1a6:8f8c:fa1a with SMTP id h9-20020a170902748900b001a68f8cfa1amr8579166pll.16.1682788857118; Sat, 29 Apr 2023 10:20:57 -0700 (PDT) Received: from hexa.lan (rrcs-66-91-142-162.west.biz.rr.com. [66.91.142.162]) by smtp.gmail.com with ESMTPSA id c3-20020a170902d90300b001a6b9c42dbasm15156041plz.88.2023.04.29.10.20.56 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sat, 29 Apr 2023 10:20:56 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][kirkstone 03/13] xserver-xorg: backport fix for CVE-2023-1393 Date: Sat, 29 Apr 2023 07:20:23 -1000 Message-Id: X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Sat, 29 Apr 2023 17:21:06 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/180546 From: Ross Burton Signed-off-by: Ross Burton Signed-off-by: Richard Purdie (cherry picked from commit 7828f7026b4cd3ae97ebe5d849c09fabbc17272d) Signed-off-by: Steve Sakoman --- ...posite-Fix-use-after-free-of-the-COW.patch | 46 +++++++++++++++++++ .../xorg-xserver/xserver-xorg_21.1.7.bb | 3 +- 2 files changed, 48 insertions(+), 1 deletion(-) create mode 100644 meta/recipes-graphics/xorg-xserver/xserver-xorg/0001-composite-Fix-use-after-free-of-the-COW.patch diff --git a/meta/recipes-graphics/xorg-xserver/xserver-xorg/0001-composite-Fix-use-after-free-of-the-COW.patch b/meta/recipes-graphics/xorg-xserver/xserver-xorg/0001-composite-Fix-use-after-free-of-the-COW.patch new file mode 100644 index 0000000000..fc426daba5 --- /dev/null +++ b/meta/recipes-graphics/xorg-xserver/xserver-xorg/0001-composite-Fix-use-after-free-of-the-COW.patch @@ -0,0 +1,46 @@ +From 26ef545b3502f61ca722a7a3373507e88ef64110 Mon Sep 17 00:00:00 2001 +From: Olivier Fourdan +Date: Mon, 13 Mar 2023 11:08:47 +0100 +Subject: [PATCH] composite: Fix use-after-free of the COW + +ZDI-CAN-19866/CVE-2023-1393 + +If a client explicitly destroys the compositor overlay window (aka COW), +we would leave a dangling pointer to that window in the CompScreen +structure, which will trigger a use-after-free later. + +Make sure to clear the CompScreen pointer to the COW when the latter gets +destroyed explicitly by the client. + +This vulnerability was discovered by: +Jan-Niklas Sohn working with Trend Micro Zero Day Initiative + +Signed-off-by: Olivier Fourdan +Reviewed-by: Adam Jackson + +CVE: CVE-2023-1393 +Upstream-Status: Backport +Signed-off-by: Ross Burton +--- + composite/compwindow.c | 5 +++++ + 1 file changed, 5 insertions(+) + +diff --git a/composite/compwindow.c b/composite/compwindow.c +index 4e2494b86..b30da589e 100644 +--- a/composite/compwindow.c ++++ b/composite/compwindow.c +@@ -620,6 +620,11 @@ compDestroyWindow(WindowPtr pWin) + ret = (*pScreen->DestroyWindow) (pWin); + cs->DestroyWindow = pScreen->DestroyWindow; + pScreen->DestroyWindow = compDestroyWindow; ++ ++ /* Did we just destroy the overlay window? */ ++ if (pWin == cs->pOverlayWin) ++ cs->pOverlayWin = NULL; ++ + /* compCheckTree (pWin->drawable.pScreen); can't check -- tree isn't good*/ + return ret; + } +-- +2.34.1 + diff --git a/meta/recipes-graphics/xorg-xserver/xserver-xorg_21.1.7.bb b/meta/recipes-graphics/xorg-xserver/xserver-xorg_21.1.7.bb index 212c7d39c2..f0771cc86e 100644 --- a/meta/recipes-graphics/xorg-xserver/xserver-xorg_21.1.7.bb +++ b/meta/recipes-graphics/xorg-xserver/xserver-xorg_21.1.7.bb @@ -1,7 +1,8 @@ require xserver-xorg.inc SRC_URI += "file://0001-xf86pciBus.c-use-Intel-ddx-only-for-pre-gen4-hardwar.patch \ - file://0001-Avoid-duplicate-definitions-of-IOPortBase.patch \ + file://0001-Avoid-duplicate-definitions-of-IOPortBase.patch \ + file://0001-composite-Fix-use-after-free-of-the-COW.patch \ " SRC_URI[sha256sum] = "d9c60b2dd0ec52326ca6ab20db0e490b1ff4f566f59ca742d6532e92795877bb" From patchwork Sat Apr 29 17:20:24 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 23179 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 9B6F5C77B7C for ; Sat, 29 Apr 2023 17:21:06 +0000 (UTC) Received: from mail-pf1-f170.google.com (mail-pf1-f170.google.com [209.85.210.170]) by mx.groups.io with SMTP id smtpd.web11.51329.1682788860083944918 for ; Sat, 29 Apr 2023 10:21:00 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20221208.gappssmtp.com header.s=20221208 header.b=ptF/dJQJ; spf=softfail (domain: sakoman.com, ip: 209.85.210.170, mailfrom: steve@sakoman.com) Received: by mail-pf1-f170.google.com with SMTP id d2e1a72fcca58-63b78b344d5so806973b3a.1 for ; Sat, 29 Apr 2023 10:20:59 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20221208.gappssmtp.com; s=20221208; t=1682788859; x=1685380859; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=T3v8PZ07xEkCRTKorZIXpE3GHrM/U0CooqmpUM0lZ2Q=; b=ptF/dJQJnRLogyAcxxQZTAAZF1GLX2tdVnmqm4czN3pydOULQgyebBqrnNnBPqsgpw Bipi2iBKhcVHRzwHamR7OFcIuwcoOHCEHrk+aRNAN2/1Tn01zLZJCE/MDrUirecPEhnz jAESoR5R2a1egc2MQUzQ3U36cmjiZhk/1ib8QBvBjgAJ7dUaaYhGJVEKgdJegTFg7Ugo 1w/0a0KfoRFk4XDOaYzMZf93FO2T1eY5xeG6uyHudFoUK9UexhNGdt6H7JF+WuwopeJw j6Id9yGttnYMnw/69SjEDpnEhSwWQmyip2tF+pvyjB2NPR9SpYW2f1KvcWvTkJhG5wOg ygCg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1682788859; x=1685380859; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=T3v8PZ07xEkCRTKorZIXpE3GHrM/U0CooqmpUM0lZ2Q=; b=U7aGu4LEN6IaMWZ0wt+AXJyVeQOLnIpwKkiYGf/F9bWaxWxMj04r/XclQvmycIdwbb OB4Dkd+0/UZCiiWDtcbmHpcQTm1dX3pGB0u3Q5wmTG4nAP4+lfl127yeXpIUMt9h093e rkLfDxiG1ZYOYX9rniHVw9DcQt49dqlnKLwAitJnKaLAH2mJYFgjMJgM9PBQZ6QAftjt /Xn2Z8TAa4AY9j4x6Wooj6WSu+sYbH4GTu4VvGQXih6SazAzvJ0+UIQ6kpXBveQ/ViId OymUuuD+eMyQYOMAWF2Td5dPUMhLVCcNqKu6f2Ws9hhytc+cJ83zkFViHm6JHLnNy8AU FtxA== X-Gm-Message-State: AC+VfDxakeIAuzv8jWDZoc/6xiDFdt/zbFyg0lCkWrBTA5NiLjovVQnC W7xOg2OhOpmJAP4IBCemlp3DBY7u3GVucT0G5wc= X-Google-Smtp-Source: ACHHUZ5P7fjp4qE/p2LqJgmCO4Y2N/F/5qC5i8PMGIW+1Z3eV/lbbmNljooL9UMTePwaIW2x4ZnCFQ== X-Received: by 2002:a17:902:f68c:b0:1aa:d9c5:9cd5 with SMTP id l12-20020a170902f68c00b001aad9c59cd5mr1886144plg.11.1682788859078; Sat, 29 Apr 2023 10:20:59 -0700 (PDT) Received: from hexa.lan (rrcs-66-91-142-162.west.biz.rr.com. [66.91.142.162]) by smtp.gmail.com with ESMTPSA id c3-20020a170902d90300b001a6b9c42dbasm15156041plz.88.2023.04.29.10.20.58 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sat, 29 Apr 2023 10:20:58 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][kirkstone 04/13] nasm: fix CVE-2022-44370 Date: Sat, 29 Apr 2023 07:20:24 -1000 Message-Id: <1568df72136f46f0767bba56c10c48bf2a1ec259.1682788726.git.steve@sakoman.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Sat, 29 Apr 2023 17:21:06 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/180547 From: Archana Polampalli NASM v2.16 was discovered to contain a heap buffer overflow in the component quote_for_pmake() asm/nasm.c:856 References: https://nvd.nist.gov/vuln/detail/CVE-2022-44370 Upstream patches: https://github.com/netwide-assembler/nasm/commit/2d4e6952417ec6f08b6f135d2b5d0e19b7dae30d Signed-off-by: Archana Polampalli Signed-off-by: Steve Sakoman --- .../nasm/nasm/CVE-2022-44370.patch | 104 ++++++++++++++++++ meta/recipes-devtools/nasm/nasm_2.15.05.bb | 1 + 2 files changed, 105 insertions(+) create mode 100644 meta/recipes-devtools/nasm/nasm/CVE-2022-44370.patch diff --git a/meta/recipes-devtools/nasm/nasm/CVE-2022-44370.patch b/meta/recipes-devtools/nasm/nasm/CVE-2022-44370.patch new file mode 100644 index 0000000000..1bd49c9fd9 --- /dev/null +++ b/meta/recipes-devtools/nasm/nasm/CVE-2022-44370.patch @@ -0,0 +1,104 @@ +From b37677f7e40276bd8f504584bcba2c092f1146a8 Mon Sep 17 00:00:00 2001 +From: "H. Peter Anvin" +Date: Mon, 7 Nov 2022 10:26:03 -0800 +Subject: [PATCH] quote_for_pmake: fix counter underrun resulting in segfault + +while (nbs--) { ... } ends with nbs == -1. Rather than a minimal fix, +introduce mempset() to make these kinds of errors less likely in the +future. + +Fixes: https://bugzilla.nasm.us/show_bug.cgi?id=3392815 +Reported-by: <13579and24680@gmail.com> +Signed-off-by: H. Peter Anvin + +Upstream-Status: Backport +CVE: CVE-2022-4437 + +Reference to upstream patch: +[https://github.com/netwide-assembler/nasm/commit/2d4e6952417ec6f08b6f135d2b5d0e19b7dae30d] + +Signed-off-by: Archana Polampalli +--- + asm/nasm.c | 12 +++++------- + configure.ac | 1 + + include/compiler.h | 7 +++++++ + 3 files changed, 13 insertions(+), 7 deletions(-) + +diff --git a/asm/nasm.c b/asm/nasm.c +index 7a7f8b4..675cff4 100644 +--- a/asm/nasm.c ++++ b/asm/nasm.c +@@ -1,6 +1,6 @@ + /* ----------------------------------------------------------------------- * + * +- * Copyright 1996-2020 The NASM Authors - All Rights Reserved ++ * Copyright 1996-2022 The NASM Authors - All Rights Reserved + * See the file AUTHORS included with the NASM distribution for + * the specific copyright holders. + * +@@ -814,8 +814,7 @@ static char *quote_for_pmake(const char *str) + } + + /* Convert N backslashes at the end of filename to 2N backslashes */ +- if (nbs) +- n += nbs; ++ n += nbs; + + os = q = nasm_malloc(n); + +@@ -824,10 +823,10 @@ static char *quote_for_pmake(const char *str) + switch (*p) { + case ' ': + case '\t': +- while (nbs--) +- *q++ = '\\'; ++ q = mempset(q, '\\', nbs); + *q++ = '\\'; + *q++ = *p; ++ nbs = 0; + break; + case '$': + *q++ = *p; +@@ -849,9 +848,8 @@ static char *quote_for_pmake(const char *str) + break; + } + } +- while (nbs--) +- *q++ = '\\'; + ++ q = mempset(q, '\\', nbs); + *q = '\0'; + + return os; +diff --git a/configure.ac b/configure.ac +index 39680b1..940ebe2 100644 +--- a/configure.ac ++++ b/configure.ac +@@ -199,6 +199,7 @@ AC_CHECK_FUNCS(strrchrnul) + AC_CHECK_FUNCS(iscntrl) + AC_CHECK_FUNCS(isascii) + AC_CHECK_FUNCS(mempcpy) ++AC_CHECK_FUNCS(mempset) + + AC_CHECK_FUNCS(getuid) + AC_CHECK_FUNCS(getgid) +diff --git a/include/compiler.h b/include/compiler.h +index db3d6d6..b64da6a 100644 +--- a/include/compiler.h ++++ b/include/compiler.h +@@ -256,6 +256,13 @@ static inline void *mempcpy(void *dst, const void *src, size_t n) + } + #endif + ++#ifndef HAVE_MEMPSET ++static inline void *mempset(void *dst, int c, size_t n) ++{ ++ return (char *)memset(dst, c, n) + n; ++} ++#endif ++ + /* + * Hack to support external-linkage inline functions + */ +-- +2.40.0 diff --git a/meta/recipes-devtools/nasm/nasm_2.15.05.bb b/meta/recipes-devtools/nasm/nasm_2.15.05.bb index edc17aeebf..59b1121bd4 100644 --- a/meta/recipes-devtools/nasm/nasm_2.15.05.bb +++ b/meta/recipes-devtools/nasm/nasm_2.15.05.bb @@ -8,6 +8,7 @@ LIC_FILES_CHKSUM = "file://LICENSE;md5=90904486f8fbf1861cf42752e1a39efe" SRC_URI = "http://www.nasm.us/pub/nasm/releasebuilds/${PV}/nasm-${PV}.tar.bz2 \ file://0001-stdlib-Add-strlcat.patch \ file://0002-Add-debug-prefix-map-option.patch \ + file://CVE-2022-44370.patch \ " SRC_URI[sha256sum] = "3c4b8339e5ab54b1bcb2316101f8985a5da50a3f9e504d43fa6f35668bee2fd0" From patchwork Sat Apr 29 17:20:25 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 23178 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 9D40AC7EE23 for ; Sat, 29 Apr 2023 17:21:06 +0000 (UTC) Received: from mail-pl1-f171.google.com (mail-pl1-f171.google.com [209.85.214.171]) by mx.groups.io with SMTP id smtpd.web11.51331.1682788861862516026 for ; Sat, 29 Apr 2023 10:21:01 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20221208.gappssmtp.com header.s=20221208 header.b=FHjI4ncf; spf=softfail (domain: sakoman.com, ip: 209.85.214.171, mailfrom: steve@sakoman.com) Received: by mail-pl1-f171.google.com with SMTP id d9443c01a7336-1aae46e62e9so1663815ad.2 for ; Sat, 29 Apr 2023 10:21:01 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20221208.gappssmtp.com; s=20221208; t=1682788861; x=1685380861; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=6hehms40VKagwa60FcV4yTscgz8hcv03ZSkhNaxCTtY=; b=FHjI4ncfrspQTjdHIu6XkhZ824H8PnkSlPoeWhQTxHJjqU6HlBRd4mIbNZDBmdj6pQ l8qM3p6iT/usrYGQVJc8+XM5A/aqXcOgSnpWad1AW59fqYNGxhzGteSwEvg5nGHfk5MM Dtc2OKKlxXAqMZFvur5n9LCkFcPyOMhcq86ZjpUTgbG0eGs7WWu1c6E8NeN0FAPVl3v4 tDmRgIFLeS4H7io0E/kGYMfS6HWuzZzGtOMkG6QFvwOD/23S5vKEf+W8CjtuBMLz/bbF fPvDC/YJot0p6gIhfR38qXzggB/kxhapy3Yq7E7q9s/uoA+PdppZ9/5k3ekLfW17PlEA /TGQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1682788861; x=1685380861; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=6hehms40VKagwa60FcV4yTscgz8hcv03ZSkhNaxCTtY=; b=XS1nAV5FRQI+zFVy9cvo4ZIAevBs9s4A6i7zKQ2pWybi5U9I2c9KIyBe/74KXhsJ13 ozYssz+cAITTruhSj5kQrWOZ1qHUWPJHEaZNfcFOKHZ9JZcttKCxWaJPlyJ1gnRTMqrL VHU+70MfNiHYWkJZzNbL11wueTolujKwgv0nkJ3NEMde46XSzbQF4dYKh3Iis7p02e46 uFnFJLSy6gkV8KLxfGqbZDBoG/ePdfFpK3mUSiID77jTibRFX+q1ATUt/fXhz9f87ogK pE9yDDERRnAvWSrnSYD1i2BHdteh8ly8/gY53/HSF06ErhVabHeFyC28BjtAlxT8p84J 4GYg== X-Gm-Message-State: AC+VfDxuxODAXd31JEv6i7tyusaOh9KTRmgYvOMrihOMEwX4Y/HT5OJ/ mMv0sl/NdF/W9QlmSeX3Eu3plANaI3RFNiNXizs= X-Google-Smtp-Source: ACHHUZ7XVJ/gVWScPlSn9j6Z4L2QFM2wHAIDLiFt8p1GpkVp9yFH5hnRl5En1+Im/cos6unBfsLDGw== X-Received: by 2002:a17:902:e74c:b0:1aa:db0f:1aba with SMTP id p12-20020a170902e74c00b001aadb0f1abamr2128158plf.47.1682788860932; Sat, 29 Apr 2023 10:21:00 -0700 (PDT) Received: from hexa.lan (rrcs-66-91-142-162.west.biz.rr.com. [66.91.142.162]) by smtp.gmail.com with ESMTPSA id c3-20020a170902d90300b001a6b9c42dbasm15156041plz.88.2023.04.29.10.20.59 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sat, 29 Apr 2023 10:21:00 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][kirkstone 05/13] qemu: Whitelist CVE-2023-0664 Date: Sat, 29 Apr 2023 07:20:25 -1000 Message-Id: X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Sat, 29 Apr 2023 17:21:06 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/180548 From: Virendra Thakur This CVE is related to Windows. Link: https://nvd.nist.gov/vuln/detail/CVE-2023-0664 Signed-off-by: Virendra Thakur Signed-off-by: Steve Sakoman --- meta/recipes-devtools/qemu/qemu.inc | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/meta/recipes-devtools/qemu/qemu.inc b/meta/recipes-devtools/qemu/qemu.inc index a6ee958e4b..7f2b52fa88 100644 --- a/meta/recipes-devtools/qemu/qemu.inc +++ b/meta/recipes-devtools/qemu/qemu.inc @@ -112,6 +112,11 @@ CVE_CHECK_IGNORE += "CVE-2007-0998" # https://bugzilla.redhat.com/show_bug.cgi?id=1609015#c11 CVE_CHECK_IGNORE += "CVE-2018-18438" +# As per https://nvd.nist.gov/vuln/detail/CVE-2023-0664 +# https://bugzilla.redhat.com/show_bug.cgi?id=2167423 +# this bug related to windows specific. +CVE_CHECK_IGNORE += "CVE-2023-0664" + COMPATIBLE_HOST:mipsarchn32 = "null" COMPATIBLE_HOST:mipsarchn64 = "null" COMPATIBLE_HOST:riscv32 = "null" From patchwork Sat Apr 29 17:20:26 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 23180 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 9B76CC7EE24 for ; Sat, 29 Apr 2023 17:21:06 +0000 (UTC) Received: from mail-pl1-f180.google.com (mail-pl1-f180.google.com [209.85.214.180]) by mx.groups.io with SMTP id smtpd.web11.51333.1682788864221544002 for ; Sat, 29 Apr 2023 10:21:04 -0700 Authentication-Results: mx.groups.io; dkim=fail reason="signature has expired" header.i=@sakoman-com.20221208.gappssmtp.com header.s=20221208 header.b=boqlZhsr; spf=softfail (domain: sakoman.com, ip: 209.85.214.180, mailfrom: steve@sakoman.com) Received: by mail-pl1-f180.google.com with SMTP id d9443c01a7336-1a686260adcso11441685ad.0 for ; Sat, 29 Apr 2023 10:21:04 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20221208.gappssmtp.com; s=20221208; t=1682788863; x=1685380863; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=rCxYujxa/9Y1w6sPwtYZpmgQgH02vXVSol8MsoMN+u0=; b=boqlZhsr9h9Oq3BRtGuI8E0RbPoTTf514M+EE3fyzJ2xPvKL33Oplf69nB3k7MUg/N 4S8dLREw5RyGzyJHa2vRj9yacQsFsTba0HevCz13+/XOk5S4O1qufOnwVwe5SigwLriv /cjSO5cLQkxRzskurJVRgUWWnFYoFwojjmEUitLoRK0bxRDH1sIiFeW5T+jcdzd7haZu 6gNOd28cwesFX0UGsa30jcxQRo87r6vBsIscs6v/pb83yMdVNz+V1xMm/izSNrOK7YVu Ai1s2xvUFP0us3OYicNYhKxC7jzN+VnEXDGuW2Y9n5R00hDqQroFiAzHUPqMBgpxt08J BxxA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1682788863; x=1685380863; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=rCxYujxa/9Y1w6sPwtYZpmgQgH02vXVSol8MsoMN+u0=; b=BzrBY3nmowVrejveCT+pRuTDC2v9jWd8TjuME9V8SqOBz3Ff0IN5o4uoLpovvJ84nk og5MTZwTj0bVWXSAtQkp8A5ljp04VgKoIMaiZBKnTWRffUbkLoinca2vsAF2TRIZQNBo EBakTWS84nuf34wntbHhvtOtDl/odXmmPOOle1MAf8SkE3+4S9KuTyBS0JaPYPGM4vfQ BWt4mRlJvNAvTHrnKRoq90RZQycvs3oQySmFjcoduNW5mQLHVIoCDBRu+EQuE5KtF5GZ LdKqNEqSWLMT1m8ZUtTnBijb05OfV8WfvfpZictZsMeobP0fAPsUz7yUngxUWD+N8pOW WiwA== X-Gm-Message-State: AC+VfDxx03F9yxn/urffisSpHVu2+LE0Epi4FARcrIj6sJicAvKXcifQ TmgnYl7RXyKT38/0jtIZXjzoOgkxzQxh7uu7kjM= X-Google-Smtp-Source: ACHHUZ5/JQBdo2j05dj3FTGKV51QlogzlzGjsoX1WUGeBpEzoG4FpB/n3tG0yi/UrcGH0Tjhr2Jt4w== X-Received: by 2002:a17:903:32ce:b0:1a6:6f09:6736 with SMTP id i14-20020a17090332ce00b001a66f096736mr11658519plr.20.1682788862859; Sat, 29 Apr 2023 10:21:02 -0700 (PDT) Received: from hexa.lan (rrcs-66-91-142-162.west.biz.rr.com. [66.91.142.162]) by smtp.gmail.com with ESMTPSA id c3-20020a170902d90300b001a6b9c42dbasm15156041plz.88.2023.04.29.10.21.01 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sat, 29 Apr 2023 10:21:02 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][kirkstone 06/13] linux-yocto/5.15: update to v5.15.106 Date: Sat, 29 Apr 2023 07:20:26 -1000 Message-Id: <8814af71d54ffaf7507789855b645211f769240d.1682788726.git.steve@sakoman.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Sat, 29 Apr 2023 17:21:06 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/180549 From: Bruce Ashfield Updating to the latest korg -stable release that comprises the following commits: d86dfc4d95cd Linux 5.15.106 06a948b8347c x86/PVH: avoid 32-bit build warning when obtaining VGA console info 3abdf6d71fdb hsr: ratelimit only when errors are printed fcc09ef87e79 libbpf: Fix btf_dump's packed struct determination 74059587b25d selftests/bpf: Add few corner cases to test padding handling of btf_dump c74ae8678dfa libbpf: Fix BTF-to-C converter's padding logic 17a61d1e9431 selftests/bpf: Test btf dump for struct with padding only fields 6777291c7b14 zonefs: Fix error message in zonefs_file_dio_append() 71ab5c1d506d KVM: x86: Purge "highest ISR" cache when updating APICv state 61e0863dc8dd KVM: x86: Inject #GP on x2APIC WRMSR that sets reserved bits 63:32 4483dc41d123 KVM: VMX: Move preemption timer <=> hrtimer dance to common x86 a58d4e66712b s390/uaccess: add missing earlyclobber annotations to __clear_user() 1dfccde646aa KVM: arm64: Disable interrupts while walking userspace PTs 25e74e728168 drm/amd/display: Add DSC Support for Synaptics Cascaded MST Hub 3bfedfdbf92b drm/etnaviv: fix reference leak when mmaping imported buffer fd1f48613e9f rcu: Fix rcu_torture_read ftrace event 9097ba15ea5c xtensa: fix KASAN report for show_stack 8861429f883e ALSA: hda/realtek: Add quirk for Lenovo ZhaoYang CF4620Z 77ab3e5f9873 ALSA: hda/realtek: Add quirks for some Clevo laptops f775413ffeff ALSA: usb-audio: Fix regression on detection of Roland VS-100 b39d42ed67d5 ALSA: hda/conexant: Partial revert of a quirk for Lenovo 305a171cf617 NFSv4: Fix hangs when recovering open state after a server reboot 7624973bc15b powerpc: Don't try to copy PPR for task with NULL pt_regs 3a9510113f5b pinctrl: at91-pio4: fix domain name assignment 6c1bc7b50e02 pinctrl: amd: Disable and mask interrupts on resume 45ed4e5149e8 net: phy: dp83869: fix default value for tx-/rx-internal-delay 0f75ef136169 xen/netback: don't do grant copy across page boundary 8a581b71cf68 can: j1939: prevent deadlock by moving j1939_sk_errqueue() a3373a681d9a zonefs: Always invalidate last cached page on append write c1310fc7abe6 btrfs: scan device in non-exclusive mode c976f9233ef9 btrfs: fix race between quota disable and quota assign ioctls 1484852ca152 Input: goodix - add Lenovo Yoga Book X90F to nine_bytes_report DMI table b64305185b76 cifs: fix DFS traversal oops without CONFIG_CIFS_DFS_UPCALL 0a2e0baf3677 cifs: prevent infinite recursion in CIFSGetDFSRefer() a5075c097de1 Input: focaltech - use explicitly signed char type cf43bc826159 Input: alps - fix compatibility with -funsigned-char 16c951f3eba4 iommu/vt-d: Allow zero SAGAW if second-stage not supported e4fbeaa31362 pinctrl: ocelot: Fix alt mode for ocelot 76f09582a191 net: ethernet: mtk_eth_soc: fix flow block refcounting logic 9caf3cbf1224 net: dsa: mv88e6xxx: Enable IGMP snooping on user ports only 4c6c0e8510a2 bnxt_en: Add missing 200G link speed reporting c519174366a3 bnxt_en: Fix typo in PCI id to device description string mapping 24722a0e0925 bnxt_en: Fix reporting of test result in ethtool selftest 3e3654bf679f i40e: fix registers dump after run ethtool adapter self test 8d7b0b22ea22 net: ipa: compute DMA pool size properly 81d2a7e93c83 ALSA: ymfpci: Fix BUG_ON in probe function 95642872c466 ALSA: ymfpci: Create card with device-managed snd_devm_card_new() 9cb4f23e4f7a ice: fix invalid check for empty list in ice_sched_assoc_vsi_to_agg() 938eba5b434d ice: add profile conflict check for AVF FDIR 0ea60b230d19 smsc911x: avoid PHY being resumed when interface is not up 41f77a6d9841 net: mvpp2: parser fix PPPoE ec117d22f143 net: mvpp2: parser fix QinQ 18d6e95fbb08 net: mvpp2: classifier flow fix fragmentation flags aa45d3dd74e9 loop: LOOP_CONFIGURE: send uevents for partitions 83ee49ab185d loop: suppress uevents while reconfiguring the device aa2bff25e9bb s390/vfio-ap: fix memory leak in vfio_ap device driver bf70e0eab64c can: bcm: bcm_tx_setup(): fix KMSAN uninit-value in vfs_write 959348f7c300 platform/x86/intel/pmc: Alder Lake PCH slp_s0_residency fix c8e7ff3071bf drm/i915/tc: Fix the ICL PHY ownership check in TC-cold state 61e2e6d444cd net: stmmac: don't reject VLANs when IFF_PROMISC is set 2d5cebf57296 net/net_failover: fix txq exceeding warning 829a0d013c00 regulator: Handle deferred clk 75155f4d8dcd r8169: fix RTL8168H and RTL8107E rx crc error 4597e104a365 net: dsa: microchip: ksz8863_smi: fix bulk access c0de1a26e659 ptp_qoriq: fix memory leak in probe() d84796008a89 scsi: mpt3sas: Don't print sense pool info twice 27b1ae000bf1 scsi: megaraid_sas: Fix crash after a double completion d63a83146d25 sfc: ef10: don't overwrite offload features at NIC reset 7ea88e90dabb SUNRPC: fix shutdown of NFS TCP client socket 34c554376ec9 mtd: rawnand: meson: invalidate cache on polling ECC bit dae47bf0222e platform/x86: think-lmi: Add possible_values for ThinkStation e91ffea491af platform/x86: think-lmi: only display possible_values if available fbfd5f59fa5c platform/x86: think-lmi: use correct possible_values delimiters 2c67f08bdc5f platform/x86: think-lmi: add missing type attribute cb1baad60e5d ALSA: usb-audio: Fix recursive locking at XRUN during syncing 65b723644294 mips: bmips: BCM6358: disable RAC flush for TP1 e38b0ab9dba3 ca8210: Fix unsigned mac_len comparison with zero in ca8210_skb_tx() 5362344e1c2c tracing: Fix wrong return in kprobe_event_gen_test.c 19c71156fa92 tools/power turbostat: fix decoding of HWP_STATUS f8580c0a3279 tools/power turbostat: Fix /dev/cpu_dma_latency warnings 6494344d7ef7 fbdev: au1200fb: Fix potential divide by zero f9c5deee4b66 fbdev: lxfb: Fix potential divide by zero 86c8db5d12f4 fbdev: intelfb: Fix potential divide by zero c22a8d3ae54a fbdev: nvidia: Fix potential divide by zero 9de1325bc2cc sched_getaffinity: don't assume 'cpumask_size()' is fully initialized f9584dcc5549 fbdev: tgafb: Fix potential divide by zero d23f65f08247 ALSA: hda/ca0132: fixup buffer overrun at tuning_ctl_set() cb1bc1223906 ALSA: asihpi: check pao in control_message() 1ec57d1bed38 net: hsr: Don't log netdev_err message on unknown prp dst node 4e90e52616f6 x86/PVH: obtain VGA console info in Dom0 5175ed17a5a8 md: avoid signed overflow in slot_store() da35a4e6eee5 ASoC: codecs: tx-macro: Fix for KASAN: slab-out-of-bounds 0725daaa9a87 xfrm: Zero padding when dumping algos and encap 7258c58f6e25 bus: imx-weim: fix branch condition evaluates to a garbage value 07987422023e ksmbd: don't terminate inactive sessions after a few seconds 0c873ab68fcb kcsan: avoid passing -g for test b27e663cf1e5 kernel: kcsan: kcsan_test: build without structleak plugin 1450c82a16bb usb: dwc3: gadget: Add 1ms delay after end transfer command without IOC 1536e51c30ad usb: dwc3: gadget: move cmd_endtransfer to extra function 0f7fddb5a9b7 fsverity: don't drop pagecache at end of FS_IOC_ENABLE_VERITY c957cbb87315 Linux 5.15.105 ec5b78143535 NFSD: fix use-after-free in __nfs42_ssc_open() a9e53869cb43 ocfs2: fix data corruption after failed write 5229bb42fba2 mm: kfence: fix using kfence_metadata without initialization in show_object() 7a74603c248d sched/fair: Sanitize vruntime of entity being migrated ab938a0c81eb sched/fair: sanitize vruntime of entity being placed 1ac20290f6b4 dm crypt: avoid accessing uninitialized tasklet eb485b7404a2 dm crypt: add cond_resched() to dmcrypt_write() 443c9d522397 dm stats: check for and propagate alloc_percpu failure 272dc775a52f i2c: xgene-slimpro: Fix out-of-bounds bug in xgene_slimpro_i2c_xfer() 8e69fae32e88 firmware: arm_scmi: Fix device node validation for mailbox transport 02b296978a21 tee: amdtee: fix race condition in amdtee_open_session 9c7ee9471550 riscv: Handle zicsr/zifencei issues between clang and binutils c10023682096 riscv: mm: Fix incorrect ASID argument when flushing TLB 555ec88c75ad drm/i915: Preserve crtc_state->inherited during state clearing 476b3f03dca8 drm/i915/active: Fix missing debug object activation ef3c38f33b62 drm/amdgpu/nv: Apply ASPM quirk on Intel ADL + AMD Navi fdd5b4e37200 drm/meson: fix missing component unbind on bind errors 071a69cde196 drm/bridge: lt8912b: return EPROBE_DEFER if bridge is not found 5bb105cc72be nilfs2: fix kernel-infoleak in nilfs_ioctl_wrap_copy() 8ec5e996c2f8 wifi: mac80211: fix qos on mesh interfaces 51a8534c0f35 ksmbd: return unsupported error on smb1 mount 496e186bc005 ksmbd: return STATUS_NOT_SUPPORTED on unsupported smb2.0 dialect 604a4a6f8414 ksmbd: set FILE_NAMED_STREAMS attribute in FS_ATTRIBUTE_INFORMATION 52e7ac849971 KVM: x86: hyper-v: Avoid calling kvm_make_vcpus_request_mask() with vcpu_mask==NULL 6f682b070f46 kfence: avoid passing -g for test 7dd27aed9c45 usb: ucsi: Fix NULL pointer deref in ucsi_connector_change() 27c40c3aa4b0 usb: chipidea: core: fix possible concurrent when switch role ef74a7ffe77c usb: chipdea: core: fix return -EINVAL if request role is the same with current role 76e8bd0f5544 usb: cdnsp: changes PCI Device ID to fix conflict with CNDS3 driver e4df290deb33 usb: cdnsp: Fixes issue with redundant Status Stage 5662d139e6e1 usb: cdns3: Fix issue with using incorrect PCI device function bb579b3f75c6 usb: typec: tcpm: fix warning when handle discover_identity message 0f84b0b71179 dm thin: fix deadlock when swapping to thin device 66e5577cabc3 igb: revert rtnl_lock() that causes deadlock a179d3450c0c arm64: dts: imx8mm-nitrogen-r2: fix WM8960 clock name ed1869a25286 lockd: set file_lock start and end when decoding nlm4 testargs 0bfadbbcd7a5 fsverity: Remove WQ_UNBOUND from fsverity read workqueue 992a3f3e8a0c fscrypt: destroy keyring after security_sb_delete() 287bb9a918e2 mm/slab: Fix undefined init_cache_node_node() for NUMA and !SMP 408dcd7c3883 efi: sysfb_efi: Fix DMI quirks not working for simpledrm b131989797f7 usb: gadget: u_audio: don't let userspace block driver unbind cba76e1fb896 usb: dwc2: fix a devres leak in hw_enable upon suspend resume c83f7ba71d38 scsi: core: Add BLIST_SKIP_VPD_PAGES for SKhynix H28U74301AMR df0462e4b361 cifs: print session id while listing open files 9a45df4ec39b cifs: empty interface list when server doesn't support query interfaces 169a41073993 act_mirred: use the backlog for nested calls to mirred ingress 5b347652aebd net/sched: act_mirred: better wording on protection against excessive stack growth f6cf5f13fa5b sh: sanitize the flags on sigreturn 91bcae3df2a4 net: usb: qmi_wwan: add Telit 0x1080 composition f631af07cfc9 net: usb: cdc_mbim: avoid altsetting toggling for Telit FE990 41b67e621b93 scsi: storvsc: Handle BlockSize change in Hyper-V VHD/VHDX file 60643ef5a139 scsi: lpfc: Avoid usage of list iterator variable after loop 67b8343998b8 scsi: lpfc: Check kzalloc() in lpfc_sli4_cgn_params_read() d758f543cea2 scsi: ufs: core: Add soft dependency on governor_simpleondemand 0267cd047133 scsi: hisi_sas: Check devm_add_action() return value 83e7b1db4523 scsi: target: iscsi: Fix an error message in iscsi_check_key() 40c216efb327 selftests/bpf: check that modifier resolves after pointer 8bf8d5dade4c m68k: Only force 030 bus error if PC not in exception table 8c1d378b8c22 HID: intel-ish-hid: ipc: Fix potential use-after-free in work function d143e327c972 ca8210: fix mac_len negative array access 3056af1a2d46 HID: cp2112: Fix driver not registering GPIO IRQ chip as threaded 3e9aac5e935f drm/cirrus: NULL-check pipe->plane.state->fb in cirrus_pipe_update() a4c639012ad0 riscv: Bump COMMAND_LINE_SIZE value to 1024 c2cf47dc0822 ACPI: x86: utils: Add Cezanne to the list for forcing StorageD3Enable 8dc1c6efd7d2 thunderbolt: Rename shadowed variables bit to interrupt_bit and auto_clear_bit a74a2e124c48 thunderbolt: Use const qualifier for `ring_interrupt_index` 752007df40ca thunderbolt: Add missing UNSET_INBOUND_SBTX for retimer access 8f7525a8b98c thunderbolt: Disable interrupt auto clear for rings 56cba129dd11 thunderbolt: Call tb_check_quirks() after initializing adapters d50a527b4815 thunderbolt: Use scale field when allocating USB3 bandwidth 7ab026561cb0 uas: Add US_FL_NO_REPORT_OPCODES for JMicron JMS583Gen 2 d6f7377528d2 scsi: qla2xxx: Perform lockless command completion in abort path 6295b3ec64a3 scsi: qla2xxx: Synchronize the IOCB count to be in order f1e2ab24c4ea hwmon (it87): Fix voltage scaling for chips with 10.9mV ADCs 5662f50cd9e9 hwmon: fix potential sensor registration fail if of_node is missing 8f6b943f9fc9 entry/rcu: Check TIF_RESCHED _after_ delayed RCU wake-up eb57d0dcd5da entry: Snapshot thread flags d9c53eb46217 thread_info: Add helpers to snapshot thread flags ebea2e16504f platform/chrome: cros_ec_chardev: fix kernel data leak from ioctl 8efae2112d91 Bluetooth: btsdio: fix use after free bug in btsdio_remove due to unfinished work c35fd1b9b90a Bluetooth: L2CAP: Fix responding with wrong PDU type b203ee4be2f1 Bluetooth: btqcomsmd: Fix command timeout after setting BD address 771d3c1c949b net: mdio: thunder: Add missing fwnode_handle_put() b433fbf17603 net: dsa: mt7530: move setting ssc_delta to PHY_INTERFACE_MODE_TRGMII case 01c727402ddc net: dsa: mt7530: move lowering TRGMII driving to mt7530_setup() 5163bb8e4c6b net: dsa: mt7530: move enabling disabling core clock to mt7530_pll_setup() a76d35f3448c gve: Cache link_speed value from device c33344b79722 ksmbd: fix possible refcount leak in smb2_open() 96039c44ae47 ksmbd: add low bound validation to FSCTL_QUERY_ALLOCATED_RANGES d897216325d7 ksmbd: add low bound validation to FSCTL_SET_ZERO_DATA 7a83bb6d56a5 hvc/xen: prevent concurrent accesses to the shared ring 29e80d7964cf nvme-tcp: fix nvme_tcp_term_pdu to match spec c7037dea19f0 net/sonic: use dma_mapping_error() for error check b41f37dbd9cd erspan: do not use skb_mac_header() in ndo_start_xmit() 4a8286baf22e atm: idt77252: fix kmemleak when rmmod idt77252 48f52431af99 net: dsa: tag_brcm: legacy: fix daisy-chained switches 388188fb58be net/mlx5: E-Switch, Fix an Oops in error handling code 6068a6db3a96 net/mlx5: Read the TC mapping of all priorities on ETS query 4df1f2d36bdc net/mlx5: Fix steering rules cleanup 2b0f1716c107 net/mlx5e: Set uplink rep as NETNS_LOCAL 54869daa6a43 bpf: Adjust insufficient default bpf_jit_limit 9b2e9105230f i40e: fix flow director packet filter programming 7a29799fc141 iavf: fix hang on reboot with ice ce19c70f308f keys: Do not cache key in task struct if key is requested from kernel thread 0cb68c307e72 bootconfig: Fix testcase to increase max node 90874b76e5f8 octeontx2-vf: Add missing free for alloc_percpu 77d2f5ff9365 net/ps3_gelic_net: Use dma_mapping_error cc8531d0e223 net/ps3_gelic_net: Fix RX sk_buff length 8c4a180dc123 net: qcom/emac: Fix use after free bug in emac_remove due to race condition e686b78a003a drm/i915/gt: perform uc late init after probe error injection cbb8bac2388a net: mdio: fix owner field for mdio buses registered using ACPI b94af62cdd50 net: mdio: fix owner field for mdio buses registered using device-tree 0bdf593390e7 net: phy: Ensure state transitions are processed from phy_stop() 4ab9e85a5ce0 xirc2ps_cs: Fix use after free bug in xirc2ps_detach e42d3bde4ec0 qed/qed_sriov: guard against NULL derefs from qed_iov_get_vf_info ba6c40227108 net: usb: smsc95xx: Limit packet length to skb->len 9bbb3d3f218f net: dsa: b53: mmap: fix device tree support 9311e7a554df scsi: scsi_dh_alua: Fix memleak for 'qdata' in alua_activate() 257738627a9b i2c: hisi: Only use the completion interrupt to finish the transfer c0deddabb278 i2c: imx-lpi2c: check only for enabled interrupt flags b82b0a0eea27 igc: fix the validation logic for taprio's gate list 68ebdcba619a igbvf: Regard vf reset nack as success 9630432b427f intel/igbvf: free irq on the error path in igbvf_request_msix() 2afe7aebf642 iavf: fix non-tunneled IPv6 UDP packet type and hashing 078e049c49a6 iavf: fix inverted Rx hash condition leading to disabled hash 3cfc3564411a xsk: Add missing overflow check in xdp_umem_reg 1d59b8fae0c3 arm64: dts: imx8mn: specify #sound-dai-cells for SAI nodes 98c9bca167e6 ARM: dts: imx6sl: tolino-shine2hd: fix usbotg1 pinctrl ed5f3c0b95bd ARM: dts: imx6sll: e60k02: fix usbotg1 pinctrl 0fdb1cc4fe52 power: supply: da9150: Fix use after free bug in da9150_charger_remove due to race condition 4ca3fd39c72e power: supply: bq24190: Fix use after free bug in bq24190_remove due to race condition 10ce6db6253d power: supply: bq24190_charger: using pm_runtime_resume_and_get instead of pm_runtime_get_sync 0b54d75aa43a net: tls: fix possible race condition between do_tls_getsockopt_conf() and do_tls_setsockopt_conf() 2ebe231abaf1 trace/hwlat: Do not start per-cpu thread if it is already running 7743dd873f2a trace/hwlat: make use of the helper function kthread_run_on_cpu() 909c5eb6ed76 kthread: add the helper function kthread_run_on_cpu() 09b51f10bc1f serial: 8250: ASPEED_VUART: select REGMAP instead of depending on it cfb64de61f07 serial: 8250: SERIAL_8250_ASPEED_VUART should depend on ARCH_ASPEED 90530e7214c8 tty: serial: fsl_lpuart: fix race on RX DMA shutdown b7d0fbe4976d tty: serial: fsl_lpuart: switch to new dmaengine_terminate_* API 90a77bca4240 serial: fsl_lpuart: Fix comment typo bde1ae240751 tracing/hwlat: Replace sched_setaffinity with set_cpus_allowed_ptr 5255e6d49ff9 perf: fix perf_event_context->time ac5f88642cb2 perf/core: Fix perf_output_begin parameter is incorrectly invoked in perf_event_bpf_output d2430d45f1a0 interconnect: qcom: osm-l3: fix icc_onecell_data allocation 115472395b0a Linux 5.15.104 de3ef7ba684a perf: Fix check before add_event_to_groups() in perf_group_detach() 02904e8a2f65 HID: uhid: Over-ride the default maximum data buffer value with our own 3df32812eb4b HID: core: Provide new max_buffer_size attribute to over-ride the default ffe2318405e6 PCI/DPC: Await readiness of secondary bus after reset 09795f82aecc PCI: Unify delay handling for reset and resume f4ba55411cc8 io_uring: avoid null-ptr-deref in io_arm_poll_handler 6ab7d3361755 drm/i915/active: Fix misuse of non-idle barriers as fence trackers 71dffdd4764c drm/i915: Don't use stolen memory for ring buffers with LLC 86db319d25db x86/resctrl: Clear staged_config[] before and after it is used 0186f7656940 x86/mm: Fix use of uninitialized buffer in sme_enable() 09d3a46c8c02 x86/mce: Make sure logged MCEs are processed after sysfs update 8575c98224b2 cpuidle: psci: Iterate backwards over list in psci_pd_remove() b3d042638049 net: phy: nxp-c45-tja11xx: fix MII_BASIC_CONFIG_REV bit f3de49782612 trace/hwlat: Do not wipe the contents of per-cpu thread data cb72b4bd81b9 fbdev: stifb: Provide valid pixelclock and add fb_check_var() checks e9cdd3f722b6 mmc: sdhci_am654: lower power-on failed message severity b02de083c7c7 mm/userfaultfd: propagate uffd-wp bit when PTE-mapping the huge zeropage 87b9ac7bd301 ice: avoid bonding causing auxiliary plug/unplug under RTNL lock 520e134431ac nvme-pci: add NVME_QUIRK_BOGUS_NID for Netac NV3000 2a0d71fabfeb ftrace: Fix invalid address access in lookup_rec() when index is 0 ad7f9c6982b1 mptcp: fix lockdep false positive in mptcp_pm_nl_create_listen_socket() f4afee17de43 mptcp: avoid setting TCP_CLOSE state twice 64473c18d27a mptcp: add ro_after_init for tcp{,v6}_prot_override c1df4bed3d91 mptcp: fix possible deadlock in subflow_error_report ccf44ffbbf25 drm/amd/pm: Fix sienna cichlid incorrect OD volage after resume 64ef8aa3910b drm/sun4i: fix missing component unbind on bind errors 5cfb617967b0 drm/shmem-helper: Remove another errant put in error path d1d826954475 riscv: asid: Fixup stale TLB entry cause application crash aeefcfc57978 Revert "riscv: mm: notify remote harts about mmu cache updates" 882cbe0c5d6a ALSA: hda/realtek: Fix the speaker output on Samsung Galaxy Book2 Pro 36d75e1f7357 ALSA: hda: intel-dsp-config: add MTL PCI id 9c2f09add608 KVM: nVMX: add missing consistency checks for CR0 and CR4 77fcc52d2919 cifs: Fix smb2_set_path_size() 9b9a118cc428 tracing: Make tracepoint lockdep check actually test something 2846bf67cd24 tracing: Check field value in hist_field_name() 2dd00dbc6a5a tracing: Make splice_read available again fd4738ae1a0c interconnect: exynos: fix node leak in probe PM QoS error path 2e0b13a18272 interconnect: fix mem leak when freeing nodes 62b74cf8bcee s390/ipl: add missing intersection check to ipl_report handling 86afb633beaa firmware: xilinx: don't make a sleepable memory allocation from an atomic context 250a11f9c43b serial: 8250_fsl: fix handle_irq locking 4c23bf093449 serial: 8250_em: Fix UART port type 53a5ab3a8991 tty: serial: fsl_lpuart: skip waiting for transmission complete when UARTCTRL_SBK is asserted 1c93c42c7bb2 ext4: fix possible double unlock when moving a directory bec1bea2fa97 drm/amd/display: fix shift-out-of-bounds in CalculateVMAndRowBytes f9252605b8f3 sh: intc: Avoid spurious sizeof-pointer-div warning 0fc608a115ce net/9p: fix bug in client create for .L 2fece63b55c5 drm/amdkfd: Fix an illegal memory access 1aec41c98cce ext4: fix task hung in ext4_xattr_delete_inode 499fef2030fb ext4: update s_journal_inum if it changes after journal replay 088da6b80539 ext4: fail ext4_iget if special inode unallocated eccd017165db jffs2: correct logic when creating a hole in jffs2_write_begin 4392e87c47e8 mmc: atmel-mci: fix race between stop command and start of next command 0c511f926b00 media: m5mols: fix off-by-one loop termination error 233058efee02 hwmon: (ltc2992) Set `can_sleep` flag for GPIO chip b576de01da80 hwmon: (adm1266) Set `can_sleep` flag for GPIO chip c80b2acdb049 kconfig: Update config changed flag before calling callback 52f64c5fc0d6 hwmon: tmp512: drop of_match_ptr for ID table 3f3576e25bfe hwmon: (ucd90320) Add minimum delay between bus accesses 9cc4aa40b58c hwmon: (ina3221) return prober error code 7091951c2ca9 hwmon: (xgene) Fix use after free bug in xgene_hwmon_remove due to race condition a8e42dbfc493 hwmon: (adt7475) Fix masking of hysteresis registers d1f4eda1ae85 hwmon: (adt7475) Display smoothing attributes in correct order 93c8cbeb1b2b bonding: restore bond's IFF_SLAVE flag if a non-eth dev enslave fails d424c7b1c478 bonding: restore IFF_MASTER/SLAVE flags on bond enslave ether type change 8a1ce024f1f6 ethernet: sun: add check for the mdesc_grab() 030393041f8c qed/qed_mng_tlv: correctly zero out ->min instead of ->hour a7836253349e selftests: net: devlink_port_split.py: skip test if no suitable device available 3cfdefdaaa4b net/iucv: Fix size of interrupt data 7bf0eac3fdd2 net: usb: smsc75xx: Move packet length check to prevent kernel panic in skb_pull c99779740100 ipv4: Fix incorrect table ID in IOCTL path 340dd8f1942a sh_eth: avoid PHY being resumed when interface is not up d5236286398d ravb: avoid PHY being resumed when interface is not up 7059be754873 net: dsa: mv88e6xxx: fix max_mtu of 1492 on 6165, 6191, 6220, 6250, 6290 b89a453c6918 ice: xsk: disable txq irq before flushing hw d1bfd4cf6bb8 block: sunvdc: add check for mdesc_grab() returning NULL f1d5888a5efe nvmet: avoid potential UAF in nvmet_req_complete() 07eac3310e00 nvme: fix handling single range discard request fff9441da1c3 block: null_blk: Fix handling of fake timeout request 6d3ff07347d3 drm/bridge: Fix returned array size name for atomic_get_input_bus_fmts kdoc 105db6574281 net: usb: smsc75xx: Limit packet length to skb->len b615238e5bc0 net/smc: fix deadlock triggered by cancel_delayed_work_syn() 84dd9cc34014 nfc: st-nci: Fix use after free bug in ndlc_remove due to race condition edc0a34e277b net: phy: smsc: bail out in lan87xx_read_status if genphy_read_status fails e0a557fc1daf net: tunnels: annotate lockless accesses to dev->needed_headroom 407badf73ec9 loop: Fix use-after-free issues a0316de981ce net: dsa: mt7530: set PLL frequency and trgmii only when trgmii is used f48468b27c0b net: dsa: mt7530: remove now incorrect comment regarding port 5 6ffa05700100 qed/qed_dev: guard against a possible division by zero b108bd9e6be0 net/smc: fix NULL sndbuf_desc in smc_cdc_tx_handler() d59d2561da73 drm/i915/psr: Use calculated io and fast wake lines 297ae18bd2cd drm/i915/display: clean up comments 21d679cb983e drm/i915/display/psr: Handle plane and pipe restrictions at every page flip 8c80b12e697f drm/i915/display/psr: Use drm damage helpers to calculate plane damaged area eea001d88ffd drm/i915/display: Workaround cursor left overs with PSR2 selective fetch enabled 437bb839e36c PCI: s390: Fix use-after-free of PCI resources with per-function hotplug ee6ef8137789 vdpa_sim: set last_used_idx as last_avail_idx in vdpasim_queue_ready 1cdbaf18a5e4 vdpa_sim: not reset state in vdpasim_queue_ready 4ff826952665 i40e: Fix kernel crash during reboot when adapter is in recovery mode ecaa1bf50635 ipvlan: Make skb->skb_iif track skb->dev for l3s mode 2bee84369b76 nfc: pn533: initialize struct pn533_out_arg properly ad07290d63ff tcp: tcp_make_synack() can be called from process context 2a764d55e938 scsi: core: Fix a procfs host directory removal regression a219cabadaee netfilter: nft_redir: correct value of inet type `.maxattrs` de03d130176b netfilter: nft_redir: correct length for loading protocol registers d2a2ad64b9b6 netfilter: nft_masq: correct length for loading protocol registers 343fe451e6d3 netfilter: nft_nat: correct length for loading protocol registers 256bcf626b7c ALSA: hda: Match only Intel devices with CONTROLLER_IN_GPU() 9937f784a608 scsi: mpt3sas: Fix NULL pointer access in mpt3sas_transport_port_add() 29cb0f6c1dd8 docs: Correct missing "d_" prefix for dentry_operations member d_weak_revalidate a5a1a7112e98 clk: HI655X: select REGMAP instead of depending on it 0f78e36f652a drm/meson: fix 1px pink line on GXM when scaling video overlay 630f8a857578 cifs: Move the in_send statistic to __smb_send_rqst() 418bde7227dd drm/panfrost: Don't sync rpm suspension after mmu flushing b9cd2f875525 xfrm: Allow transport-mode states with AF_UNSPEC selector Signed-off-by: Bruce Ashfield Signed-off-by: Richard Purdie (cherry picked from commit d04122e76e21654caef2ec42ab5612bc9883d5f7) Signed-off-by: Steve Sakoman --- .../linux/linux-yocto-rt_5.15.bb | 6 ++--- .../linux/linux-yocto-tiny_5.15.bb | 6 ++--- meta/recipes-kernel/linux/linux-yocto_5.15.bb | 26 +++++++++---------- 3 files changed, 19 insertions(+), 19 deletions(-) diff --git a/meta/recipes-kernel/linux/linux-yocto-rt_5.15.bb b/meta/recipes-kernel/linux/linux-yocto-rt_5.15.bb index 38daab6bbe..32fa7c9c07 100644 --- a/meta/recipes-kernel/linux/linux-yocto-rt_5.15.bb +++ b/meta/recipes-kernel/linux/linux-yocto-rt_5.15.bb @@ -11,13 +11,13 @@ python () { raise bb.parse.SkipRecipe("Set PREFERRED_PROVIDER_virtual/kernel to linux-yocto-rt to enable it") } -SRCREV_machine ?= "e1ca9a177aff19013178aa30a8eccb4d7b2b67d7" -SRCREV_meta ?= "441f5fe00073620cec471166cf6e94c4ef9c69b2" +SRCREV_machine ?= "8f08817edd40a17f6653c1d83334e7ce80d63120" +SRCREV_meta ?= "c115a945a64f98eed4cf20a90dbf3043e99c97b9" SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;branch=${KBRANCH};name=machine \ git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-5.15;destsuffix=${KMETA}" -LINUX_VERSION ?= "5.15.103" +LINUX_VERSION ?= "5.15.106" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" diff --git a/meta/recipes-kernel/linux/linux-yocto-tiny_5.15.bb b/meta/recipes-kernel/linux/linux-yocto-tiny_5.15.bb index eb6af62015..c511486d23 100644 --- a/meta/recipes-kernel/linux/linux-yocto-tiny_5.15.bb +++ b/meta/recipes-kernel/linux/linux-yocto-tiny_5.15.bb @@ -5,7 +5,7 @@ KCONFIG_MODE = "--allnoconfig" require recipes-kernel/linux/linux-yocto.inc -LINUX_VERSION ?= "5.15.103" +LINUX_VERSION ?= "5.15.106" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}" @@ -14,8 +14,8 @@ DEPENDS += "openssl-native util-linux-native" KMETA = "kernel-meta" KCONF_BSP_AUDIT_LEVEL = "2" -SRCREV_machine ?= "4ae6c9a73f4e6e356186a541e3fcbea4fa6a09f1" -SRCREV_meta ?= "441f5fe00073620cec471166cf6e94c4ef9c69b2" +SRCREV_machine ?= "e0157de1c901f48dcdcae0e0ce7ae20798617a5e" +SRCREV_meta ?= "c115a945a64f98eed4cf20a90dbf3043e99c97b9" PV = "${LINUX_VERSION}+git${SRCPV}" diff --git a/meta/recipes-kernel/linux/linux-yocto_5.15.bb b/meta/recipes-kernel/linux/linux-yocto_5.15.bb index 41f20c96dd..3c6aec60b2 100644 --- a/meta/recipes-kernel/linux/linux-yocto_5.15.bb +++ b/meta/recipes-kernel/linux/linux-yocto_5.15.bb @@ -13,24 +13,24 @@ KBRANCH:qemux86 ?= "v5.15/standard/base" KBRANCH:qemux86-64 ?= "v5.15/standard/base" KBRANCH:qemumips64 ?= "v5.15/standard/mti-malta64" -SRCREV_machine:qemuarm ?= "21687086c27bb112f19b0aac455d800961c0b830" -SRCREV_machine:qemuarm64 ?= "7144f86a73fe2ffe4fe57c9e6cf28d8fc8db4b6a" -SRCREV_machine:qemumips ?= "557c06060cb218ade536fccc66f8f3e755537f31" -SRCREV_machine:qemuppc ?= "db19dbdcdf51b9d2a071dcf180ba9e20b8286e9b" -SRCREV_machine:qemuriscv64 ?= "024d08fb706170a9723e9751e505681f9d4c7ab6" -SRCREV_machine:qemuriscv32 ?= "024d08fb706170a9723e9751e505681f9d4c7ab6" -SRCREV_machine:qemux86 ?= "024d08fb706170a9723e9751e505681f9d4c7ab6" -SRCREV_machine:qemux86-64 ?= "024d08fb706170a9723e9751e505681f9d4c7ab6" -SRCREV_machine:qemumips64 ?= "6f1dbe8c258d49f4dba59827124dfe9aa2c151db" -SRCREV_machine ?= "024d08fb706170a9723e9751e505681f9d4c7ab6" -SRCREV_meta ?= "441f5fe00073620cec471166cf6e94c4ef9c69b2" +SRCREV_machine:qemuarm ?= "e65b22cbbc83e9d36e8e1ec344e7774c70e8e570" +SRCREV_machine:qemuarm64 ?= "b996e66c4b696160d196ff6f5204ea125a39c1e9" +SRCREV_machine:qemumips ?= "4f6deb38925508846a45bc33de0bf35b4113c946" +SRCREV_machine:qemuppc ?= "1b715c2fa0c9224df807807695a1048386c5a355" +SRCREV_machine:qemuriscv64 ?= "686a68a75222a0fadc1f829334596b02534dcb42" +SRCREV_machine:qemuriscv32 ?= "686a68a75222a0fadc1f829334596b02534dcb42" +SRCREV_machine:qemux86 ?= "686a68a75222a0fadc1f829334596b02534dcb42" +SRCREV_machine:qemux86-64 ?= "686a68a75222a0fadc1f829334596b02534dcb42" +SRCREV_machine:qemumips64 ?= "6465e8e14e57d6725cbee376f3a2cb9361d29688" +SRCREV_machine ?= "686a68a75222a0fadc1f829334596b02534dcb42" +SRCREV_meta ?= "c115a945a64f98eed4cf20a90dbf3043e99c97b9" # set your preferred provider of linux-yocto to 'linux-yocto-upstream', and you'll # get the /base branch, which is pure upstream -stable, and the same # meta SRCREV as the linux-yocto-standard builds. Select your version using the # normal PREFERRED_VERSION settings. BBCLASSEXTEND = "devupstream:target" -SRCREV_machine:class-devupstream ?= "8020ae3c051d1c9ec7b7a872e226f9720547649b" +SRCREV_machine:class-devupstream ?= "d86dfc4d95cd218246b10ca7adf22c8626547599" PN:class-devupstream = "linux-yocto-upstream" KBRANCH:class-devupstream = "v5.15/base" @@ -38,7 +38,7 @@ SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;name=machine;branch=${KBRA git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-5.15;destsuffix=${KMETA}" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" -LINUX_VERSION ?= "5.15.103" +LINUX_VERSION ?= "5.15.106" DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}" DEPENDS += "openssl-native util-linux-native" From patchwork Sat Apr 29 17:20:27 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 23177 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 8C97DC77B7F for ; Sat, 29 Apr 2023 17:21:06 +0000 (UTC) Received: from mail-pj1-f51.google.com (mail-pj1-f51.google.com [209.85.216.51]) by mx.groups.io with SMTP id smtpd.web11.51335.1682788865842459532 for ; Sat, 29 Apr 2023 10:21:05 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20221208.gappssmtp.com header.s=20221208 header.b=c+uCNYs7; spf=softfail (domain: sakoman.com, ip: 209.85.216.51, mailfrom: steve@sakoman.com) Received: by mail-pj1-f51.google.com with SMTP id 98e67ed59e1d1-246fd87a124so1051875a91.0 for ; Sat, 29 Apr 2023 10:21:05 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20221208.gappssmtp.com; s=20221208; t=1682788865; x=1685380865; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=RB0sS9kym/LGIdaFsLckkVcg3EYRW3R0AVN31mQecfU=; b=c+uCNYs71fzAHKnRkuj61s7EOmKcqYjmRUSccOi4BLK/uiNS69a/eHXsQ/3VbWDVQ/ ncD3L0tEQhWUgqcPqBo/4oMOZRJoX+3TLYQy4hxMkhNcMFrVPwlEPXHYZ6KQ8RFwJkHJ WtBD2XJtSo8/h6b1XH8MRO2thJa3EfUWNX75f+8EV2TdaZO/Ah8JsGbuE2PrLG2wA3Aq WNBfklAT9Ptg2Ca8ipcryh+9dnr+lXlTya+fO4XzKHWcvqDTQjk6YBrQpgPLldUPJCY5 cQNoURKVnym0GL7svUewZnbOhPi9SByqxL76z4SyhI21QF1yFxh0i0MGglb5XuH1+GFi Q4QQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1682788865; x=1685380865; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=RB0sS9kym/LGIdaFsLckkVcg3EYRW3R0AVN31mQecfU=; b=UutQknyx9fDmVoCCnWafN2WWUkvzzHel1aNrLhV9dwK3PnH8qzRX9MOkGvOYFFj9dT BHxx7uiuVSRv0PBxz70MPUmLOVyjimlf0LfAdzTZHs68S0SWBrZxLIR0HMXDJuVX4wYM QGun0e0mNsrfoGSqkwPNrUr5kJYWJsf7qT98qb70/tpTlcq5n9tNMOFcmAB3rAc5Iezu MZhy5Dvu7xpGjYhk9U6xJy2v1+kKA2e2XHgnlisc/0CL2LyZv3VLbqlDRb/zVHtEacOj Uj9frnHF1WCQ/scJXd260zlti/Wk5sPeiG0rD3lstUuYbvan33QY6iyTXOp8mk5eQDbb 1OJw== X-Gm-Message-State: AC+VfDx/vavaawSHbXiyb517xsjDkaaK49wZiNYW4BlGSJFT77F4G7Mw SxLMUor/IqS2lqax8ZLHiQH5tcrhqmEMunXMTZ0= X-Google-Smtp-Source: ACHHUZ5bgxMhaMdsZAZBRgKGn6iN4OVkEdGkJ9Zf8jCPuLh/yplXLhjdZRnlpkUY7enGjUQvo6WcIQ== X-Received: by 2002:a17:903:41c4:b0:1a8:1b63:8aee with SMTP id u4-20020a17090341c400b001a81b638aeemr10627557ple.46.1682788864797; Sat, 29 Apr 2023 10:21:04 -0700 (PDT) Received: from hexa.lan (rrcs-66-91-142-162.west.biz.rr.com. [66.91.142.162]) by smtp.gmail.com with ESMTPSA id c3-20020a170902d90300b001a6b9c42dbasm15156041plz.88.2023.04.29.10.21.03 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sat, 29 Apr 2023 10:21:04 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][kirkstone 07/13] linux-yocto/5.15: update to v5.15.107 Date: Sat, 29 Apr 2023 07:20:27 -1000 Message-Id: <84efe52ea8b1c28614200683289e589211c35b44.1682788726.git.steve@sakoman.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Sat, 29 Apr 2023 17:21:06 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/180550 From: Bruce Ashfield Updating to the latest korg -stable release that comprises the following commits: 4fdad925aa1a Linux 5.15.107 c862d7debe55 bpftool: Print newline before '}' for struct with padding only fields 1585f3fc24b5 ocfs2: fix freeing uninitialized resource on ocfs2_dlm_shutdown b97e4100be37 kbuild: fix single directory build 326b80bd2267 mm: take a page reference when removing device exclusive entries 1fc9263ad795 drm/bridge: lt9611: Fix PLL being unable to lock 4bdf1514b426 mm/swap: fix swap_info_struct race between swapoff and get_swap_pages() cbe5f7fed7f7 ring-buffer: Fix race while reader and writer are on the same page 23ed5af5767a drm/nouveau/disp: Support more modes by checking with lower bpc 6f2180c5273a drm/panfrost: Fix the panfrost_mmu_map_fault_addr() error path a184df0de132 mm: vmalloc: avoid warn_alloc noise caused by fatal signal d88d7a9fcf20 ASoC: hdac_hdmi: use set_stream() instead of set_tdm_slots() 33d5d4e67a0e tracing: Free error logs of tracing instances c74065da695e can: isotp: isotp_ops: fix poll() to not report false EPOLLOUT events 4fe1d9b6231a can: j1939: j1939_tp_tx_dat_new(): fix out-of-bounds memory access 0af8fae81d8b fs: drop peer group ids under namespace lock 33a503b7c339 ftrace: Fix issue that 'direct->addr' not restored in modify_ftrace_direct() 20c5e10950e9 ftrace: Mark get_lock_parent_ip() __always_inline a007b7dc19de perf/core: Fix the same task check in perf_event_set_output 8417eb9aaf1e cifs: sanitize paths in cifs_update_super_prepath. df23c702d11c smb3: lower default deferred close timeout to address perf regression 1d9cad9c5873 smb3: allow deferred close timeout to be configurable 5e5c5f472972 scsi: iscsi_tcp: Check that sock is valid before iscsi_set_param() ae73c4dd48f2 scsi: qla2xxx: Fix memory leak in qla2x00_probe_one() c8c17991dab0 iio: adc: ad7791: fix IRQ flags bc61cce6a658 coresight-etm4: Fix for() loop drvdata->nr_addr_cmp range bug 97302eb6ca48 coresight: etm4x: Do not access TRCIDR1 for identification fd23e9bbfccc ALSA: hda/realtek: Add quirk for Clevo X370SNW f204f38212dc ksmbd: do not call kvmalloc() with __GFP_NORETRY | __GFP_NO_WARN 091b3e31275b dt-bindings: serial: renesas,scif: Fix 4th IRQ for 4-IRQ SCIFs d540aea451ab nilfs2: fix sysfs interface lifetime 92684e02654c nilfs2: fix potential UAF of struct nilfs_sc_info in nilfs_segctor_thread() ba3a88b444cd tty: serial: fsl_lpuart: avoid checking for transfer complete when UARTCTRL_SBK is asserted in lpuart32_tx_empty ad142624ccc3 tty: serial: sh-sci: Fix Rx on RZ/G2L SCI 1184bd5c5ee4 tty: serial: sh-sci: Fix transmit end interrupt handler 1f49173be32d iio: light: cm32181: Unregister second I2C client if present 77593b4e963c iio: dac: cio-dac: Fix max DAC write value check for 12-bit 73742a446e08 iio: adc: ti-ads7950: Set `can_sleep` flag for GPIO chip 7a1e21d26104 iio: adis16480: select CONFIG_CRC32 4d3841fe16c4 USB: serial: option: add Quectel RM500U-CN modem 7151d2af0656 USB: serial: option: add Telit FE990 compositions e1aa1c1bc51f usb: typec: altmodes/displayport: Fix configure initial pin assignment 9cd66aa2fa04 USB: serial: cp210x: add Silicon Labs IFS-USB-DATACABLE IDs f8d59e2a36ac usb: dwc3: pci: add support for the Intel Meteor Lake-S 11453332fa40 usb: cdnsp: Fixes error: uninitialized symbol 'len' 83637720ea20 xhci: also avoid the XHCI_ZERO_64B_REGS quirk with a passthrough iommu 1122474b757a usb: xhci: tegra: fix sleep in atomic call f5c5934580e7 kbuild: refactor single builds of *.ko e62d179b9177 gve: Secure enough bytes in the first TX desc for all TCP pkts 40c6802d7dae ethtool: reset #lanes when lanes is omitted 4eada1dabdfb ice: Reset FDIR counter in FDIR init stage 391d28c0e38c ice: fix wrong fallback logic for FDIR e215928a510c NFSD: callback request does not use correct credential for AUTH_SYS bbca64f2052e sunrpc: only free unix grouplist after RCU settles ca7c3b4ae03e net: stmmac: fix up RX flow hash indirection table when setting channels 3a997c0d2341 net: ethernet: ti: am65-cpsw: Fix mdio cleanup in probe 0ae8cdf0153c gpio: davinci: Add irq chip flag to skip set wake 1c19a42b2863 platform/x86: think-lmi: Clean up display of current_value on Thinkstation cccdb30935c8 platform/x86: think-lmi: Fix memory leaks when parsing ThinkStation WMI strings b9396d991abe platform/x86: think-lmi: Fix memory leak when showing current settings d65ff2fe877c ipv6: Fix an uninit variable access bug in __ip6_make_skb() 926c8299ac3d net: qrtr: Do not do DEL_SERVER broadcast after DEL_CLIENT 667eb99cf7c1 sctp: check send stream number after wait_for_sndbuf 9692e16b5991 net: dsa: mv88e6xxx: Reset mv88e6393x force WD event bit 5d1007e81fb6 net: don't let netpoll invoke NAPI if in xmit context e150a5c9f44c icmp: guard against too small mtu a64160124d5a NFSD: Avoid calling OPDESC() with ops->opnum == OP_ILLEGAL b9ba5906c420 net: qrtr: Fix a refcount bug in qrtr_recvmsg() 3ef52e4bcfd7 net: qrtr: combine nameservice into main module 30c5a016a37a wifi: mac80211: fix invalid drv_sta_pre_rcu_remove calls for non-uploaded sta 32a8dc8d9ebe KVM: s390: pv: fix external interruption loop not always detected fcd6c7476e43 pwm: sprd: Explicitly set .polarity in .get_state() a8ab13c73259 pwm: cros-ec: Explicitly set .polarity in .get_state() c373e49fbb87 Drivers: vmbus: Check for channel allocation before looking up relids b50cd6789dbb gpio: GPIO_REGMAP: select REGMAP instead of depending on it 0a473f834393 bpf: hash map, avoid deadlock with suitable hash mask 543d66a54dbf serial: exar: Add support for Sealevel 7xxxC serial cards 7773bb08e8b6 serial: 8250_exar: derive nr_ports from PCI ID for Acces I/O cards c73db89da686 iavf/iavf_main: actually log ->src mask when talking about it b2d29830db30 iavf: return errno code instead of status code cdf3f5ef1893 platform/x86: int3472/discrete: Ensure the clk/power enable pins are in output mode 7798cd69cfc3 platform/x86: int3472: Split into 2 drivers 5cc70e78bbcc RDMA/irdma: Do not request 2-level PBLEs for CQ alloc c22ac849aabb NFSD: pass range end to vfs_fsync_range() instead of count 34a14759d90c NFSD: Fix sparse warning 8059e200259e ocfs2: fix memory leak in ocfs2_mount_volume() b613d8dcdff3 ocfs2: rewrite error handling of ocfs2_fill_super 05abe9c0bf38 ocfs2: ocfs2_mount_volume does cleanup job before return error Signed-off-by: Bruce Ashfield Signed-off-by: Richard Purdie (cherry picked from commit 214643f386a3e4f226acd25903cde14a2c0a7376) Signed-off-by: Steve Sakoman --- .../linux/linux-yocto-rt_5.15.bb | 6 ++--- .../linux/linux-yocto-tiny_5.15.bb | 6 ++--- meta/recipes-kernel/linux/linux-yocto_5.15.bb | 26 +++++++++---------- 3 files changed, 19 insertions(+), 19 deletions(-) diff --git a/meta/recipes-kernel/linux/linux-yocto-rt_5.15.bb b/meta/recipes-kernel/linux/linux-yocto-rt_5.15.bb index 32fa7c9c07..de74f3b816 100644 --- a/meta/recipes-kernel/linux/linux-yocto-rt_5.15.bb +++ b/meta/recipes-kernel/linux/linux-yocto-rt_5.15.bb @@ -11,13 +11,13 @@ python () { raise bb.parse.SkipRecipe("Set PREFERRED_PROVIDER_virtual/kernel to linux-yocto-rt to enable it") } -SRCREV_machine ?= "8f08817edd40a17f6653c1d83334e7ce80d63120" -SRCREV_meta ?= "c115a945a64f98eed4cf20a90dbf3043e99c97b9" +SRCREV_machine ?= "17de8839ffeb953a58b32a1d9ef13675864f4f00" +SRCREV_meta ?= "c0c3836249b3a2fd02ad30ae54637a2bed54107b" SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;branch=${KBRANCH};name=machine \ git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-5.15;destsuffix=${KMETA}" -LINUX_VERSION ?= "5.15.106" +LINUX_VERSION ?= "5.15.107" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" diff --git a/meta/recipes-kernel/linux/linux-yocto-tiny_5.15.bb b/meta/recipes-kernel/linux/linux-yocto-tiny_5.15.bb index c511486d23..78d655b110 100644 --- a/meta/recipes-kernel/linux/linux-yocto-tiny_5.15.bb +++ b/meta/recipes-kernel/linux/linux-yocto-tiny_5.15.bb @@ -5,7 +5,7 @@ KCONFIG_MODE = "--allnoconfig" require recipes-kernel/linux/linux-yocto.inc -LINUX_VERSION ?= "5.15.106" +LINUX_VERSION ?= "5.15.107" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}" @@ -14,8 +14,8 @@ DEPENDS += "openssl-native util-linux-native" KMETA = "kernel-meta" KCONF_BSP_AUDIT_LEVEL = "2" -SRCREV_machine ?= "e0157de1c901f48dcdcae0e0ce7ae20798617a5e" -SRCREV_meta ?= "c115a945a64f98eed4cf20a90dbf3043e99c97b9" +SRCREV_machine ?= "9f7b6a8032cef0df7e4c4b2e2d185d21924127c5" +SRCREV_meta ?= "c0c3836249b3a2fd02ad30ae54637a2bed54107b" PV = "${LINUX_VERSION}+git${SRCPV}" diff --git a/meta/recipes-kernel/linux/linux-yocto_5.15.bb b/meta/recipes-kernel/linux/linux-yocto_5.15.bb index 3c6aec60b2..5195735f92 100644 --- a/meta/recipes-kernel/linux/linux-yocto_5.15.bb +++ b/meta/recipes-kernel/linux/linux-yocto_5.15.bb @@ -13,24 +13,24 @@ KBRANCH:qemux86 ?= "v5.15/standard/base" KBRANCH:qemux86-64 ?= "v5.15/standard/base" KBRANCH:qemumips64 ?= "v5.15/standard/mti-malta64" -SRCREV_machine:qemuarm ?= "e65b22cbbc83e9d36e8e1ec344e7774c70e8e570" -SRCREV_machine:qemuarm64 ?= "b996e66c4b696160d196ff6f5204ea125a39c1e9" -SRCREV_machine:qemumips ?= "4f6deb38925508846a45bc33de0bf35b4113c946" -SRCREV_machine:qemuppc ?= "1b715c2fa0c9224df807807695a1048386c5a355" -SRCREV_machine:qemuriscv64 ?= "686a68a75222a0fadc1f829334596b02534dcb42" -SRCREV_machine:qemuriscv32 ?= "686a68a75222a0fadc1f829334596b02534dcb42" -SRCREV_machine:qemux86 ?= "686a68a75222a0fadc1f829334596b02534dcb42" -SRCREV_machine:qemux86-64 ?= "686a68a75222a0fadc1f829334596b02534dcb42" -SRCREV_machine:qemumips64 ?= "6465e8e14e57d6725cbee376f3a2cb9361d29688" -SRCREV_machine ?= "686a68a75222a0fadc1f829334596b02534dcb42" -SRCREV_meta ?= "c115a945a64f98eed4cf20a90dbf3043e99c97b9" +SRCREV_machine:qemuarm ?= "cafbf3840cb619fa324fa4222ceec63787409f77" +SRCREV_machine:qemuarm64 ?= "3ec37a5997470f25ca0a443ad8afee62a3201edc" +SRCREV_machine:qemumips ?= "e0561aff7c1b9e04452e02cd2e5786525b7ac03b" +SRCREV_machine:qemuppc ?= "4f3c3cb71e1ac3b1ba29c2d0e5b62f5b8a78e720" +SRCREV_machine:qemuriscv64 ?= "bbc363b82b92d99e0e29b0d5c9810d2636b54f9e" +SRCREV_machine:qemuriscv32 ?= "bbc363b82b92d99e0e29b0d5c9810d2636b54f9e" +SRCREV_machine:qemux86 ?= "bbc363b82b92d99e0e29b0d5c9810d2636b54f9e" +SRCREV_machine:qemux86-64 ?= "bbc363b82b92d99e0e29b0d5c9810d2636b54f9e" +SRCREV_machine:qemumips64 ?= "5eba919cd8b3ca2e7ca047e49adf98c344e9998e" +SRCREV_machine ?= "bbc363b82b92d99e0e29b0d5c9810d2636b54f9e" +SRCREV_meta ?= "c0c3836249b3a2fd02ad30ae54637a2bed54107b" # set your preferred provider of linux-yocto to 'linux-yocto-upstream', and you'll # get the /base branch, which is pure upstream -stable, and the same # meta SRCREV as the linux-yocto-standard builds. Select your version using the # normal PREFERRED_VERSION settings. BBCLASSEXTEND = "devupstream:target" -SRCREV_machine:class-devupstream ?= "d86dfc4d95cd218246b10ca7adf22c8626547599" +SRCREV_machine:class-devupstream ?= "4fdad925aa1a320c2f32bf956ed29100c7fdc464" PN:class-devupstream = "linux-yocto-upstream" KBRANCH:class-devupstream = "v5.15/base" @@ -38,7 +38,7 @@ SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;name=machine;branch=${KBRA git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-5.15;destsuffix=${KMETA}" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" -LINUX_VERSION ?= "5.15.106" +LINUX_VERSION ?= "5.15.107" DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}" DEPENDS += "openssl-native util-linux-native" From patchwork Sat Apr 29 17:20:28 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 23185 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 8E2F6C77B60 for ; Sat, 29 Apr 2023 17:21:16 +0000 (UTC) Received: from mail-pj1-f46.google.com (mail-pj1-f46.google.com [209.85.216.46]) by mx.groups.io with SMTP id smtpd.web10.51586.1682788867792198021 for ; Sat, 29 Apr 2023 10:21:07 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20221208.gappssmtp.com header.s=20221208 header.b=fK7FZV0x; spf=softfail (domain: sakoman.com, ip: 209.85.216.46, mailfrom: steve@sakoman.com) Received: by mail-pj1-f46.google.com with SMTP id 98e67ed59e1d1-2474e09fdcfso1085168a91.0 for ; Sat, 29 Apr 2023 10:21:07 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20221208.gappssmtp.com; s=20221208; t=1682788867; x=1685380867; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=3vuZoOlMIG3jBLi1MPO3YvQgg7R58wVLpt49DVV7Xl0=; b=fK7FZV0xhNVdVt7wjEXJFDtIrqG/oKpHPyxZ2Us+LwIj7IRfq31ZB37UVZuMh44vYJ TYZTDTL+FFas1gOWl3SHmUJVpygyCjpQKxWhZcBlGV9JBfmI4Kgf24Pr17YgwDiSA9+y Rwl5mUudUHnaxKIcE1m4g1ZxIYsPerYBE8VAwydOtcwnTnjOZrmQiGCEMjHWdQPaGFer G7/3RA4dHsuEh2+v67ZjtJJcXhJgrlhC05VT/6l16Rq2WBmQa7O7hu+dYHtyMREZokXy 7LOS6BECOrY7GUavpDEEjNju8erCEUzM4Adf/y3+PDAbRf2gyzUgA9TMPng3sx7LL/jh wI3w== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1682788867; x=1685380867; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=3vuZoOlMIG3jBLi1MPO3YvQgg7R58wVLpt49DVV7Xl0=; b=BDVVBziYCybMjKPIQRdF1DvY32A0UTduse0zFS2kqxOGbBnIxoxCkfaALoQFp8daCI I2+VpeiSZMGLwzNd+fsAMA9w82x0JTotNDIsrJqzfw3Xl0q2jYz1Of3RE14NwhpZezH6 JTJbje/oQjK0VUcKu2nmbKvasJSDaqMCelAolqdMHPpzrqxXwvQTbOsMLCMyqGy10IXF RHBN8l4gsKH8v8A3Ja8VTPHgp7Oi6LXttBV9i2M8DIYaCTypTakn6+/h7Zrw3HT7MjU9 vYnDEEq9efGfgI7dj/X4Gd2suGioU4wkKPH3Ar00+K3CEi6HZIKgRIRiONnmIWYrSsz7 /hfA== X-Gm-Message-State: AC+VfDxQ5Jx8SBc7n2+86af7yvvxz6ujMz1yMjEQPnQ1ZKoe3EmU0HML y68SW6C6UMpf4V9UU8UM8kzgrhPp0YZG2D2T/oc= X-Google-Smtp-Source: ACHHUZ7Mru5ZFQxPKwd6YQaXYP+5guYKC2DHqJm1Y2au3qxqIvCxPxT1Ji3VQTm7kpfuZ6nVKmk/Fw== X-Received: by 2002:a17:903:11c6:b0:1a0:48c6:3b43 with SMTP id q6-20020a17090311c600b001a048c63b43mr10798551plh.37.1682788866711; Sat, 29 Apr 2023 10:21:06 -0700 (PDT) Received: from hexa.lan (rrcs-66-91-142-162.west.biz.rr.com. [66.91.142.162]) by smtp.gmail.com with ESMTPSA id c3-20020a170902d90300b001a6b9c42dbasm15156041plz.88.2023.04.29.10.21.05 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sat, 29 Apr 2023 10:21:06 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][kirkstone 08/13] linux-yocto/5.15: update to v5.15.108 Date: Sat, 29 Apr 2023 07:20:28 -1000 Message-Id: X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Sat, 29 Apr 2023 17:21:16 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/180551 From: Bruce Ashfield Updating to the latest korg -stable release that comprises the following commits: 3299fb36854f Linux 5.15.108 adef0cebea85 nvme-pci: avoid the deepest sleep state on ZHITAI TiPro5000 SSDs c6897dfe2bb6 counter: Add the necessary colons and indents to the comments of counter_compi fa934784fb65 counter: fix docum. build problems after filename change 0cf283340023 panic, kexec: make __crash_kexec() NMI safe 9e1e511119b1 kexec: turn all kexec_mutex acquisitions into trylocks 6fc7a53fcc4c nvme-pci: add NVME_QUIRK_BOGUS_NID for T-FORCE Z330 SSD fa43e0591900 nvme-pci: mark Lexar NM760 as IGNORE_DEV_SUBNQN a814fc9e6e59 nvme-pci: add NVME_QUIRK_BOGUS_NID for Lexar NM760 972e06d09e86 nvme-pci: add NVME_QUIRK_BOGUS_NID for Lexar NM610 cf773832139b nvme-pci: Crucial P2 has bogus namespace ids 5a19b9a49aea nvme-pci: avoid the deepest sleep state on ZHITAI TiPro7000 SSDs 65f5dc5dff29 nvme-pci: add NVME_QUIRK_BOGUS_NID for ADATA XPG GAMMIX S50 3daaa5f7aae2 i2c: ocores: generate stop condition after timeout in polling mode 0af686415ca2 x86/rtc: Remove __init for runtime functions b11ff3ef4d09 sched/fair: Fix imbalance overflow 90e3dc510106 sched/fair: Move calculate of avg_load to a better location 6d1353781bba powerpc/papr_scm: Update the NUMA distance table for the target node 0b031f5983f8 ubi: Fix deadlock caused by recursively holding work_sem 85d7a7044b75 ubi: Fix failure attaching when vid_hdr offset equals to (sub)page size f0b4a4086cf2 mptcp: stricter state check in mptcp_worker 925e1a510a2e mptcp: use mptcp_schedule_work instead of open-coding it f4f2a1d491e9 cgroup/cpuset: Wake up cpuset_attach_wq tasks in cpuset_cancel_attach() 19c7f9329bdb x86/PCI: Add quirk for AMD XHCI controller that loses MSI-X state in D3hot 05143d90ac90 scsi: ses: Handle enclosure with just a primary component gracefully aaae6d303150 net: phy: nxp-c45-tja11xx: fix unsigned long multiplication overflow b1ca14361d49 net: phy: nxp-c45-tja11xx: add remove callback 0359e505bcd7 net: sfp: initialize sfp->i2c_block_size at sfp allocation a42f565c0e96 riscv: add icache flush for nommu sigreturn trampoline 6eeb1cba4c9d drm/i915: fix race condition UAF in i915_perf_add_config_ioctl 9b344cf6aea0 i915/perf: Replace DRM_DEBUG with driver specific drm_dbg call 6b337a13c144 tracing: Have tracing_snapshot_instance_cond() write errors to the appropriate instance 1403518ed0d9 tracing: Add trace_array_puts() to write into instance 670e54151b7a counter: 104-quad-8: Fix Synapse action reported for Index signals 6e25d374cd95 counter: Internalize sysfs interface code c4153e662883 counter: stm32-timer-cnt: Provide defines for slave mode selection 4c1010848b12 counter: stm32-lptimer-cnt: Provide defines for clock polarities 189ada57e88c ACPI: resource: Add Medion S17413 to IRQ override quirk 248a18a895e2 wifi: iwlwifi: mvm: fix mvmtxq->stopped handling 0efd9ed92926 asymmetric_keys: log on fatal failures in PE/pkcs7 ae2b44aeade1 verify_pefile: relax wrapper length check 744f80ae0716 drm: panel-orientation-quirks: Add quirk for Lenovo Yoga Book X90F 05a24344296e efi: sysfb_efi: Add quirk for Lenovo Yoga Book X91F/L 0f9d2fc58824 i2c: hisi: Avoid redundant interrupts d21a46212009 i2c: imx-lpi2c: clean rx/tx buffers upon new message 8451da304b4a wifi: mwifiex: mark OF related data as maybe unused 9aeff275b7f7 power: supply: cros_usbpd: reclassify "default case!" as debug 788f4a3d3987 ARM: 9290/1: uaccess: Fix KASAN false-positives 53967ac8080b libbpf: Fix single-line struct definition output in btf_dump 906a6689bb01 skbuff: Fix a race between coalescing and releasing SKBs 7ccc58a1a756 net: macb: fix a memory corruption in extended buffer descriptor mode ed2ec39e46fe udp6: fix potential access to stale information e97ff11b396c RDMA/core: Fix GID entry ref leak when create_ah fails 6109f5b13ce3 sctp: fix a potential overflow in sctp_ifwdtsn_skip c6a796ee5a63 net: qrtr: Fix an uninit variable access bug in qrtr_tx_resume() 9b1ca43bcf3d qlcnic: check pci_reset_function result ffa4f32952e2 drm/armada: Fix a potential double free in an error handling path a94f5d35fdbb tcp: restrict net.ipv4.tcp_app_win a08ec4ed3b6e niu: Fix missing unwind goto in niu_alloc_channels() e35ae49bc198 9p/xen : Fix use after free bug in xen_9pfs_front_remove due to race condition b41da67451b0 bpf: tcp: Use sock_gen_put instead of sock_put in bpf_iter_tcp 48e8e7851dc0 RDMA/cma: Allow UD qp_type to join multicast only 1569a4cdb973 IB/mlx5: Add support for 400G_8X lane speed f6711bc5c016 RDMA/irdma: Add ipv4 check to irdma_find_listener() c8c7a7aee861 RDMA/irdma: Increase iWARP CM default rexmit count 810250c9c661 RDMA/irdma: Fix memory leak of PBLE objects aa2607bae45f clk: sprd: set max_register according to mapping range 0004a50c535f drm/i915/dsi: fix DSS CTL register offsets for TGL+ 1bb4a52c3caa KVM: arm64: PMU: Restore the guest's EL0 event counting after migration c7acce3a0eeb mtd: rawnand: stm32_fmc2: use timings.mode instead of checking tRC_min 7233b5baba10 mtd: rawnand: stm32_fmc2: remove unsupported EDO mode 5ded9b750f30 mtd: rawnand: meson: fix bitmask for length in command word 0162836a51bb mtdblock: tolerate corrected bit-flips ad574345ce26 fbmem: Reject FB_ACTIVATE_KD_TEXT from userspace a55a95365e08 btrfs: fix fast csum implementation detection 6da03c237d56 btrfs: print checksum type and implementation at mount time 0efb276d5848 Bluetooth: Fix race condition in hidp_session_thread ac6725a634f7 Bluetooth: L2CAP: Fix use-after-free in l2cap_disconnect_{req,rsp} d98498ad5695 ALSA: hda/sigmatel: fix S/PDIF out on Intel D*45* motherboards c5797c87e74e ALSA: emu10k1: don't create old pass-through playback device on Audigy f1ef453157b4 ALSA: firewire-tascam: add missing unwind goto in snd_tscm_stream_start_duplex() 7901d787e455 ALSA: i2c/cs8427: fix iec958 mixer control deactivation d8697aa12ae6 ALSA: hda/sigmatel: add pin overrides for Intel DP45SG motherboard 34a0ada0a8b2 ALSA: emu10k1: fix capture interrupt handler unlinking 55e4eef5545d Revert "pinctrl: amd: Disable and mask interrupts on resume" Signed-off-by: Bruce Ashfield Signed-off-by: Richard Purdie (cherry picked from commit 5339d44b0b0b23f30cb0f8ab395da62e83733c40) Signed-off-by: Steve Sakoman --- .../linux/linux-yocto-rt_5.15.bb | 6 ++--- .../linux/linux-yocto-tiny_5.15.bb | 6 ++--- meta/recipes-kernel/linux/linux-yocto_5.15.bb | 26 +++++++++---------- 3 files changed, 19 insertions(+), 19 deletions(-) diff --git a/meta/recipes-kernel/linux/linux-yocto-rt_5.15.bb b/meta/recipes-kernel/linux/linux-yocto-rt_5.15.bb index de74f3b816..29379791f4 100644 --- a/meta/recipes-kernel/linux/linux-yocto-rt_5.15.bb +++ b/meta/recipes-kernel/linux/linux-yocto-rt_5.15.bb @@ -11,13 +11,13 @@ python () { raise bb.parse.SkipRecipe("Set PREFERRED_PROVIDER_virtual/kernel to linux-yocto-rt to enable it") } -SRCREV_machine ?= "17de8839ffeb953a58b32a1d9ef13675864f4f00" -SRCREV_meta ?= "c0c3836249b3a2fd02ad30ae54637a2bed54107b" +SRCREV_machine ?= "8e0611e36c848a07f9cdd778903c9e51bb90b319" +SRCREV_meta ?= "e4b95ec17228274acb38bf10061448224df3a312" SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;branch=${KBRANCH};name=machine \ git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-5.15;destsuffix=${KMETA}" -LINUX_VERSION ?= "5.15.107" +LINUX_VERSION ?= "5.15.108" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" diff --git a/meta/recipes-kernel/linux/linux-yocto-tiny_5.15.bb b/meta/recipes-kernel/linux/linux-yocto-tiny_5.15.bb index 78d655b110..c19c289b97 100644 --- a/meta/recipes-kernel/linux/linux-yocto-tiny_5.15.bb +++ b/meta/recipes-kernel/linux/linux-yocto-tiny_5.15.bb @@ -5,7 +5,7 @@ KCONFIG_MODE = "--allnoconfig" require recipes-kernel/linux/linux-yocto.inc -LINUX_VERSION ?= "5.15.107" +LINUX_VERSION ?= "5.15.108" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}" @@ -14,8 +14,8 @@ DEPENDS += "openssl-native util-linux-native" KMETA = "kernel-meta" KCONF_BSP_AUDIT_LEVEL = "2" -SRCREV_machine ?= "9f7b6a8032cef0df7e4c4b2e2d185d21924127c5" -SRCREV_meta ?= "c0c3836249b3a2fd02ad30ae54637a2bed54107b" +SRCREV_machine ?= "3d762b85647844790979dd1e17a762003aaa7476" +SRCREV_meta ?= "e4b95ec17228274acb38bf10061448224df3a312" PV = "${LINUX_VERSION}+git${SRCPV}" diff --git a/meta/recipes-kernel/linux/linux-yocto_5.15.bb b/meta/recipes-kernel/linux/linux-yocto_5.15.bb index 5195735f92..785944c3cf 100644 --- a/meta/recipes-kernel/linux/linux-yocto_5.15.bb +++ b/meta/recipes-kernel/linux/linux-yocto_5.15.bb @@ -13,24 +13,24 @@ KBRANCH:qemux86 ?= "v5.15/standard/base" KBRANCH:qemux86-64 ?= "v5.15/standard/base" KBRANCH:qemumips64 ?= "v5.15/standard/mti-malta64" -SRCREV_machine:qemuarm ?= "cafbf3840cb619fa324fa4222ceec63787409f77" -SRCREV_machine:qemuarm64 ?= "3ec37a5997470f25ca0a443ad8afee62a3201edc" -SRCREV_machine:qemumips ?= "e0561aff7c1b9e04452e02cd2e5786525b7ac03b" -SRCREV_machine:qemuppc ?= "4f3c3cb71e1ac3b1ba29c2d0e5b62f5b8a78e720" -SRCREV_machine:qemuriscv64 ?= "bbc363b82b92d99e0e29b0d5c9810d2636b54f9e" -SRCREV_machine:qemuriscv32 ?= "bbc363b82b92d99e0e29b0d5c9810d2636b54f9e" -SRCREV_machine:qemux86 ?= "bbc363b82b92d99e0e29b0d5c9810d2636b54f9e" -SRCREV_machine:qemux86-64 ?= "bbc363b82b92d99e0e29b0d5c9810d2636b54f9e" -SRCREV_machine:qemumips64 ?= "5eba919cd8b3ca2e7ca047e49adf98c344e9998e" -SRCREV_machine ?= "bbc363b82b92d99e0e29b0d5c9810d2636b54f9e" -SRCREV_meta ?= "c0c3836249b3a2fd02ad30ae54637a2bed54107b" +SRCREV_machine:qemuarm ?= "80421c525a12141d31bf1592b0d8c176defe3010" +SRCREV_machine:qemuarm64 ?= "9d140dbc3171bf272f51b524edeeb2f22783aca5" +SRCREV_machine:qemumips ?= "b29a8fa62d88db512f1fa5d60e430a851d7e3aaf" +SRCREV_machine:qemuppc ?= "7ee6b7fc4b57933114376cf012218c2ae3d23558" +SRCREV_machine:qemuriscv64 ?= "e8c818cce43dd720c366d831aeb102c20c237652" +SRCREV_machine:qemuriscv32 ?= "e8c818cce43dd720c366d831aeb102c20c237652" +SRCREV_machine:qemux86 ?= "e8c818cce43dd720c366d831aeb102c20c237652" +SRCREV_machine:qemux86-64 ?= "e8c818cce43dd720c366d831aeb102c20c237652" +SRCREV_machine:qemumips64 ?= "5c900befc90365f6daa80989e8de0ccc546ff0f5" +SRCREV_machine ?= "e8c818cce43dd720c366d831aeb102c20c237652" +SRCREV_meta ?= "e4b95ec17228274acb38bf10061448224df3a312" # set your preferred provider of linux-yocto to 'linux-yocto-upstream', and you'll # get the /base branch, which is pure upstream -stable, and the same # meta SRCREV as the linux-yocto-standard builds. Select your version using the # normal PREFERRED_VERSION settings. BBCLASSEXTEND = "devupstream:target" -SRCREV_machine:class-devupstream ?= "4fdad925aa1a320c2f32bf956ed29100c7fdc464" +SRCREV_machine:class-devupstream ?= "3299fb36854fdc288bddc2c4d265f8a2e5105944" PN:class-devupstream = "linux-yocto-upstream" KBRANCH:class-devupstream = "v5.15/base" @@ -38,7 +38,7 @@ SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;name=machine;branch=${KBRA git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-5.15;destsuffix=${KMETA}" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" -LINUX_VERSION ?= "5.15.107" +LINUX_VERSION ?= "5.15.108" DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}" DEPENDS += "openssl-native util-linux-native" From patchwork Sat Apr 29 17:20:29 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 23183 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 9D9F1C7EE23 for ; Sat, 29 Apr 2023 17:21:16 +0000 (UTC) Received: from mail-pl1-f172.google.com (mail-pl1-f172.google.com [209.85.214.172]) by mx.groups.io with SMTP id smtpd.web11.51336.1682788869515764788 for ; Sat, 29 Apr 2023 10:21:09 -0700 Authentication-Results: mx.groups.io; dkim=fail reason="signature has expired" header.i=@sakoman-com.20221208.gappssmtp.com header.s=20221208 header.b=QhlFcFMO; spf=softfail (domain: sakoman.com, ip: 209.85.214.172, mailfrom: steve@sakoman.com) Received: by mail-pl1-f172.google.com with SMTP id d9443c01a7336-1a66b9bd7dfso11070685ad.2 for ; Sat, 29 Apr 2023 10:21:09 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20221208.gappssmtp.com; s=20221208; t=1682788868; x=1685380868; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=X2ZVzh66wkeAerV307cUkO3JQ+9iBkwqzSp2d3u2jiY=; b=QhlFcFMOzSERy2+Vrgjz3z0h/54DfbPAWhtsdzZYDE8JocK60POpjASYclPdkCch1C 4W+okgbhJk+m+HGtek68dEowZECEd4nEPqYN07RVLf2FV05nG3GrYoI3KgPEn+TXlgjA dp+5KP8Ro5ZMIVzpiM4xpJoidR5JXC9qtDntAhFfdMiIZW/9KpuSxbQwt5Jykj81dTc+ U18DvYAbi/zDFeSdj9BbgF/Eo8sh94yLCtTqGZTgwaN/JjITnwvwQoZOCntBIUglfKJF cULWnF/UMMW8OL3bc1mQ+EGFQAMOSxLzAEf6LjOcLMuBUm6lDWi5I/h93dJFwuHuVV8W W43g== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1682788868; x=1685380868; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=X2ZVzh66wkeAerV307cUkO3JQ+9iBkwqzSp2d3u2jiY=; b=JccI6e7J7lH4kWMrWJWXvCLgNjY+vttpy632Q6CQ88GgliC7W7d7kPfpkxDm7v2OQG nrSKQobg06z4p3Vk7Y12lBZeOUEsg+PfJcpSmcqY1tJ0u0sUwb7zkBVbxGWAsoP8bu/j 0qVQoFIhmqMHsSNln3InBmRds09aTx5qv/S4vtyrMtOuvWilP5lrQF9wW4QVtWnznVhB stRNVaJLu60nJdvXnuLE8HxoipvfZNNcBxAnBLuZ1AEuTVoqw6ad8kvlt37B4X1JWxVd sNzL/3lk7YuCLH9hpW6TqdVOPqaioMGTbfK/1ob0TizMz+PgOdahb6aCnAwnXwkZPk98 LRMA== X-Gm-Message-State: AC+VfDx1+b7Xhs3cR17BKQxMwTmGh9P9weL+vbFSH9ZcuVBoMEKaTBaW s9H/CkEUnRkN4zEBdrzufaR+Wn3CaJHhtsXMPuM= X-Google-Smtp-Source: ACHHUZ6F6rZ9Y71RSdcQrkdpqhDOm+4/SE0GyivAMKM3376JOzaTC84uMXep5YLNTePn9QC2vBIsVQ== X-Received: by 2002:a17:902:db09:b0:1a6:8405:f709 with SMTP id m9-20020a170902db0900b001a68405f709mr11431372plx.20.1682788868634; Sat, 29 Apr 2023 10:21:08 -0700 (PDT) Received: from hexa.lan (rrcs-66-91-142-162.west.biz.rr.com. [66.91.142.162]) by smtp.gmail.com with ESMTPSA id c3-20020a170902d90300b001a6b9c42dbasm15156041plz.88.2023.04.29.10.21.07 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sat, 29 Apr 2023 10:21:08 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][kirkstone 09/13] xorg-lib-common: Add variable to set tarball type Date: Sat, 29 Apr 2023 07:20:29 -1000 Message-Id: <56ea2b625f81e397e911b3610130d3e838d10938.1682788726.git.steve@sakoman.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Sat, 29 Apr 2023 17:21:16 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/180552 From: Yogita Urade Upstream has switched some new releases from bz2 to xz compression. Add an XORG_EXT variable so recipes can set the file name extension needed for the compression type. Following the approach in oe-core/master: 6a8068e036b4b2a40b38896275b936916b4db76e xorg-lib-common: Add variable to set tarball type use a variable for the tarball suffix/compression format. Signed-off-by: Robert Joslyn Signed-off-by: Alexandre Belloni Signed-off-by: Yogita Urade Signed-off-by: Steve Sakoman --- meta/recipes-graphics/xorg-lib/xorg-lib-common.inc | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/meta/recipes-graphics/xorg-lib/xorg-lib-common.inc b/meta/recipes-graphics/xorg-lib/xorg-lib-common.inc index 60bc8c76fa..68137c4147 100644 --- a/meta/recipes-graphics/xorg-lib/xorg-lib-common.inc +++ b/meta/recipes-graphics/xorg-lib/xorg-lib-common.inc @@ -6,8 +6,9 @@ LICENSE = "MIT" DEPENDS = "util-macros" XORG_PN = "${BPN}" +XORG_EXT ?= "tar.bz2" -SRC_URI = "${XORG_MIRROR}/individual/lib/${XORG_PN}-${PV}.tar.bz2" +SRC_URI = "${XORG_MIRROR}/individual/lib/${XORG_PN}-${PV}.${XORG_EXT}" S = "${WORKDIR}/${XORG_PN}-${PV}" From patchwork Sat Apr 29 17:20:30 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 23184 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 9CB7FC7EE24 for ; Sat, 29 Apr 2023 17:21:16 +0000 (UTC) Received: from mail-pl1-f180.google.com (mail-pl1-f180.google.com [209.85.214.180]) by mx.groups.io with SMTP id smtpd.web11.51337.1682788871497989364 for ; Sat, 29 Apr 2023 10:21:11 -0700 Authentication-Results: mx.groups.io; dkim=fail reason="signature has expired" header.i=@sakoman-com.20221208.gappssmtp.com header.s=20221208 header.b=RQ+JlQxJ; spf=softfail (domain: sakoman.com, ip: 209.85.214.180, mailfrom: steve@sakoman.com) Received: by mail-pl1-f180.google.com with SMTP id d9443c01a7336-1aad5245571so3749655ad.1 for ; Sat, 29 Apr 2023 10:21:11 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20221208.gappssmtp.com; s=20221208; t=1682788870; x=1685380870; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=ljN7b6Dryth0zI0BqAi0iEX/Nv8EZO586zFA0R/N+jg=; b=RQ+JlQxJyBtpgIAl7EbOt9tDh3kiwtq+34IIJyvmcPl9CFriDB4b18UnkcQuvi3oqH 2NqLO4kmh6b2nvwejAVToRbXfLTwvWsN7PH7yJkMmYh0L+lN3h+SAC8/sLKJvo+PK6YM g/9RHmukJobcgMlfla8e4fhsWqh2ZMnRyNbr72CvPIWA7F2/HeMvW83Tx+oKCLd8IOTR xuGVDp0xjYbAbBDvEHqZamD44T55k+hq7ls7ZeI3XG3nYHHpCa1c/snjXa84Qi/c6hPJ DP1xJhVZqv0kwbzLKRTJaaL25g5mnOj6ilkAXNMbiVCbzaF+xbUYd8jH9GWCq5KLn7DZ 1XDA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1682788870; x=1685380870; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=ljN7b6Dryth0zI0BqAi0iEX/Nv8EZO586zFA0R/N+jg=; b=BLSKNdsjwUEE7DAALCV8AKp2UWs+riyhIrAxJFYAEmLADpD30gXuQqiqW1lRNwjs1W KBDjn8Jftzir+gPTU4ikLwSerU9/1cvydv4g4ti7+uNhTH1q6/eHM9ncW0smNLUHNciC Kgl4mgx3q3ckiiSfO/PYxAmuGDOBT4mslGk0ojIsDEgpB7vGtqFzCzcA751uXuBwqAMk VRb5AYGzWYwagWM6/5x5kRGOzAtwOogdhxnZQzIHPGKI4COo/4/8tdr9UxbXrY9+9+o1 ON1Rg3NVt5PSOAc7enDwX7UN17XwEWELVWyUJaKSS8qcQ/ighCvTT8dLGD57tbZ1cVy+ Lchw== X-Gm-Message-State: AC+VfDzlcOq5u2643JzWg4x8G2vOdx2nPX9PusFjFbEyzDVw8ckDn1wd 4fcAU+rmqRFKG7KddJI8ggNjr2aHm9u/MytMsHI= X-Google-Smtp-Source: ACHHUZ7ykwt1ubnbZyket7i9SbIdBlvNJozO89IBoWY7/1mn6GEpUhKMT/zYglbhAvbqAcowtGVZ4g== X-Received: by 2002:a17:902:9a8e:b0:1a9:8ba4:d0d3 with SMTP id w14-20020a1709029a8e00b001a98ba4d0d3mr8329931plp.8.1682788870560; Sat, 29 Apr 2023 10:21:10 -0700 (PDT) Received: from hexa.lan (rrcs-66-91-142-162.west.biz.rr.com. [66.91.142.162]) by smtp.gmail.com with ESMTPSA id c3-20020a170902d90300b001a6b9c42dbasm15156041plz.88.2023.04.29.10.21.09 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sat, 29 Apr 2023 10:21:10 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][kirkstone 10/13] libxpm: upgrade 3.5.13 -> 3.5.15 Date: Sat, 29 Apr 2023 07:20:30 -1000 Message-Id: X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Sat, 29 Apr 2023 17:21:16 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/180553 From: Yogita Urade Upgrade libxpm 3.5.13 to 3.5.15 License-update: additional copyright holders f0857c0 man pages: Correct Copyright/License notices The above commit is introduced while upgrading the libxpm 3.5.15. which is mentioned in below changelog. Due to this commit LIC_FILES_CHKSUM is changed. Disable reading compressed files as that requires compress/uncompress executables. Following the approach in oe-core/master: 7de4084634 libxpm: upgrade 3.5.14 -> 3.5.15 Changelog: ------------- ------------- ddd8339 libXpm 3.5.15 8178eb0 Use gzip -d instead of gunzip c5ab17b Prevent a double free in the error code path 515294b Fix CVE-2022-4883: compression commands depend on $PATH f80fa6a Fix CVE-2022-44617: Runaway loop with width of 0 and enormous height f7fbbb9 test: add test cases for CVE-2022-44617 (zero-width w/enormous height) a3a7c6d Fix CVE-2022-46285: Infinite loop on unclosed comments f7a167a test: add test case for CVE-2022-46285 (unclosed comments) 0ff2c6a cxpm: getc/ungetc wrappers should not adjust position when c == EOF 501494c test: Add unit tests using glib framework 4841039 configure: add --disable-open-zfile instead of requiring -DNO_ZPIPE aef0c8d man pages: Apply standard man page style/formatting 5d55a0b man pages: Replace "See Also" entries with more useful ones 392cb8f man pages: Fix typos and other minor editing 08bc174 libXpm 3.5.14 f0857c0 man pages: Correct Copyright/License notices deb81a9 man pages: Fix typos 2d5fa4c man pages: Add missing word 'function' where needed 2b7357e man pages: Make function synopses more consistent with other pages fb8590c man pages: Fix shadow man pages bfaebfd man pages: Make file names consistent with their displayed names 7a138a5 gitlab CI: add a basic build test 3433f43 man: strip trailing whitespace 9612454 Fix spelling/wording issues fa16fbd Build xz tarballs instead of bzip2 83e5427 update man pages e48e649 add man pages based on doc/xpm.PS Signed-off-by: Yogita Urade Signed-off-by: Steve Sakoman --- .../xorg-lib/{libxpm_3.5.13.bb => libxpm_3.5.15.bb} | 8 +++++--- 1 file changed, 5 insertions(+), 3 deletions(-) rename meta/recipes-graphics/xorg-lib/{libxpm_3.5.13.bb => libxpm_3.5.15.bb} (67%) diff --git a/meta/recipes-graphics/xorg-lib/libxpm_3.5.13.bb b/meta/recipes-graphics/xorg-lib/libxpm_3.5.15.bb similarity index 67% rename from meta/recipes-graphics/xorg-lib/libxpm_3.5.13.bb rename to meta/recipes-graphics/xorg-lib/libxpm_3.5.15.bb index 4f0a5d7ba0..22e322a9eb 100644 --- a/meta/recipes-graphics/xorg-lib/libxpm_3.5.13.bb +++ b/meta/recipes-graphics/xorg-lib/libxpm_3.5.15.bb @@ -11,17 +11,19 @@ an extension of the monochrome XBM bitmap specificied in the X \ protocol." LICENSE = "MIT" -LIC_FILES_CHKSUM = "file://COPYING;md5=51f4270b012ecd4ab1a164f5f4ed6cf7" +LIC_FILES_CHKSUM = "file://COPYING;md5=903942ebc9d807dfb68540f40bae5aff" DEPENDS += "libxext libsm libxt gettext-native" PE = "1" XORG_PN = "libXpm" +XORG_EXT = "tar.xz" +EXTRA_OECONF += "--disable-open-zfile" PACKAGES =+ "sxpm cxpm" FILES:cxpm = "${bindir}/cxpm" FILES:sxpm = "${bindir}/sxpm" -SRC_URI[md5sum] = "6f0ecf8d103d528cfc803aa475137afa" -SRC_URI[sha256sum] = "9cd1da57588b6cb71450eff2273ef6b657537a9ac4d02d0014228845b935ac25" +SRC_URI[md5sum] = "b3c58c94e284fd6940d3615e660a0007" +SRC_URI[sha256sum] = "60bb906c5c317a6db863e39b69c4a83fdbd2ae2154fcf47640f8fefc9fdfd1c1" BBCLASSEXTEND = "native" From patchwork Sat Apr 29 17:20:31 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 23181 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 8E3F9C77B7F for ; Sat, 29 Apr 2023 17:21:16 +0000 (UTC) Received: from mail-pl1-f181.google.com (mail-pl1-f181.google.com [209.85.214.181]) by mx.groups.io with SMTP id smtpd.web10.51589.1682788873359231542 for ; Sat, 29 Apr 2023 10:21:13 -0700 Authentication-Results: mx.groups.io; dkim=fail reason="signature has expired" header.i=@sakoman-com.20221208.gappssmtp.com header.s=20221208 header.b=SZfzIkci; spf=softfail (domain: sakoman.com, ip: 209.85.214.181, mailfrom: steve@sakoman.com) Received: by mail-pl1-f181.google.com with SMTP id d9443c01a7336-1a66888cb89so8128125ad.3 for ; Sat, 29 Apr 2023 10:21:13 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20221208.gappssmtp.com; s=20221208; t=1682788872; x=1685380872; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=pOiQgugVqUW7Z32fW+jXoiGv+Gjz3SUB794KgAaCLnU=; b=SZfzIkcibCeSikCdciQKDZV2ZiKqYvDHrjTJwiNDCLF2rcSEwN6qGx613TDRXyS0aK +TI4nGBEHAmEhUIrpRMlgxxoKqGvr88NTNkrNaRNhBE4wR/scpgMQOF45ym7FhnuY8YV tAYYyHL3GMiQkVdBwKd6u/9LXCzL8SIo4xUjFOGk3qPN2o3WMNOzz0imuNzVj2yze8yL qRxa/m0Y/BTjL37ZyddAcAy267O05zfLNC+y/Id6GuHpCFzK0yXRLvw2AAWijgiqibed Xfd5peftXNFVtk5euFeJ3JCAgmfnBagjd0LJ6SZn9m7jMCD4kr8ToU+zhYKe4s8Lxdi9 KUPQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1682788872; x=1685380872; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=pOiQgugVqUW7Z32fW+jXoiGv+Gjz3SUB794KgAaCLnU=; b=Y41Wj9ZXvN692/WLIgJPZZBQJ6DC/GSummHy1Li1KYjDMr9rfM0X0vzZT6ecT3vCzu 0ccpDZiQtWJoLUf8dVGZTwT2aeSrCMSUaLxL35SeOtO1WtFSQrWfXQDef0drljmWbGud pJEP/+FAv3F+I2qNQGMsgBO5Ui2OeDQx1gf9JH9iYZwZuXy87nBTghlALEQwo6yEijV/ UFVgQR2NrQzQ2ckwrF52Gq3q1pVoopnU7aJsC7/ZBjFKg63ig9UPRyd9RokH4H6WN8sJ P2y+L1WmkYdwsMFURbp/wdHi9DvcmE783E8IJH1EOdiuyWyO2usr3U7mDRCaQ5rdWvMp ctqg== X-Gm-Message-State: AC+VfDxjaENFEeDgjZPrvPKVqBauJW56XXYcAkgCquXEoizNcXHYWODF FOqLpcFy6TfjWvbJHb96chaqrTO3Z+yuz2bnLU4= X-Google-Smtp-Source: ACHHUZ75CA/5CmlqVegk2+2Qc2IIf1ruq+RXU85+ViAFMZG0DcVlDCRSuaYsWsA8u0M/ueIvChTaPg== X-Received: by 2002:a17:902:db03:b0:1a6:e1ac:ecb8 with SMTP id m3-20020a170902db0300b001a6e1acecb8mr11853526plx.43.1682788872441; Sat, 29 Apr 2023 10:21:12 -0700 (PDT) Received: from hexa.lan (rrcs-66-91-142-162.west.biz.rr.com. [66.91.142.162]) by smtp.gmail.com with ESMTPSA id c3-20020a170902d90300b001a6b9c42dbasm15156041plz.88.2023.04.29.10.21.11 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sat, 29 Apr 2023 10:21:12 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][kirkstone 11/13] cmake: add CMAKE_SYSROOT to generated toolchain file Date: Sat, 29 Apr 2023 07:20:31 -1000 Message-Id: <1105c67d554bcd155e8247cb16efc8d6a642444f.1682788726.git.steve@sakoman.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Sat, 29 Apr 2023 17:21:16 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/180554 From: Pascal Bach This already got fixed in the toolchain file that is used during development in https://github.com/openembedded/openembedded-core/commit/cb42802f2fe1760f894a435b07286bca3a220364 The toolchain file generated by the cmake.bbclass however does not set CMAKE_SYSROOT. Under certain circumstances this also leads to the error: `"stdlib.h: No such file or directory #include_next "` during the build of a recipe. An example where this accured was during the upgrade of the Apache Thrift recipe in meta-openembedded to 0.11.0. With this change the build works out of the box. CMAKE_SYSROOT must only be set when crosscompiling, otherwise it will interfere with the native compiler headers. Signed-off-by: Pascal Bach (from http://lists.openembedded.org/pipermail/openembedded-core/2018-August/154791.html ) Signed-off-by: Mikko Rapeli Signed-off-by: Poonam Jadhav Signed-off-by: Steve Sakoman --- meta/classes/cmake.bbclass | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/meta/classes/cmake.bbclass b/meta/classes/cmake.bbclass index d9bcddbdbb..7ec6ca58fc 100644 --- a/meta/classes/cmake.bbclass +++ b/meta/classes/cmake.bbclass @@ -85,9 +85,12 @@ def map_host_arch_to_uname_arch(host_arch): return "ppc64" return host_arch + cmake_do_generate_toolchain_file() { if [ "${BUILD_SYS}" = "${HOST_SYS}" ]; then cmake_crosscompiling="set( CMAKE_CROSSCOMPILING FALSE )" + else + cmake_sysroot="set( CMAKE_SYSROOT \"${RECIPE_SYSROOT}\" )" fi cat > ${WORKDIR}/toolchain.cmake < X-Patchwork-Id: 23182 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 9268EC77B7C for ; Sat, 29 Apr 2023 17:21:16 +0000 (UTC) Received: from mail-pj1-f42.google.com (mail-pj1-f42.google.com [209.85.216.42]) by mx.groups.io with SMTP id smtpd.web10.51591.1682788875183762113 for ; Sat, 29 Apr 2023 10:21:15 -0700 Authentication-Results: mx.groups.io; dkim=fail reason="signature has expired" header.i=@sakoman-com.20221208.gappssmtp.com header.s=20221208 header.b=e/Jb4Y3n; spf=softfail (domain: sakoman.com, ip: 209.85.216.42, mailfrom: steve@sakoman.com) Received: by mail-pj1-f42.google.com with SMTP id 98e67ed59e1d1-2472740a0dbso1025918a91.3 for ; Sat, 29 Apr 2023 10:21:15 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20221208.gappssmtp.com; s=20221208; t=1682788874; x=1685380874; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=+uf1EaT6ZO2ote1VAOb4orRmQeuRByXTbkCaWCMjeyk=; b=e/Jb4Y3nIT8VHRp9sNGq56FiuaEPR6SxCxavLvhWFoSsHO/7QnAOef16mnfIBIKSpS jQKm8HkP09FbAkYMf6nyV5a3tBu51QU+HZt4K+JTjAVAs5BEoNaZQBTaQgneU8ClZXTT JXKDoSv+mKnm8pL4CUptzl1iOLzCGgFTfs4pnzprNz43kCUk+8l527moUouPVz7kyhLg 3/dmkm38jffR5vEp5lVlR3GMMhYgDi+AupDdKDHCpPVz81mq2HoFnt45tohhlVb5welc bEv5fF0uPXUbdudab/lHfCbHEUnRC2iMHwzw0KLr2nzK/UMve8v+sGJaqZYkl1XMRdmH KzzA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1682788874; x=1685380874; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=+uf1EaT6ZO2ote1VAOb4orRmQeuRByXTbkCaWCMjeyk=; b=RYq6IxnRcnDeXE2XhvAUsH0C2CDNlWH3WIktA7SAw9DemxXZwzXFpra63mS/KV7ukQ x5ei8I6xP4TJFztJfHvPWSaLUYsxyzPJYvfYecShSsAKtPaf1yORlXDOBFhWCOluoPf9 VfjIQnq65kF8Fy8uExG2GllyeU/IRRdb4xXKCEIjz/z+5BmgK1gZtv++frmv3yU1K4Ga CiW3Xq26T6inGkqdye8MlCmKA/47UHg7afhYCwrnMFwdEExwSnR8g3b5P21E1tMh+yb9 Ie15d64vb/tvyIqnWgPEL0aGLTq9oeKWgITmbbxZujU9AwHvrKUrnK4Pp1JfZlJxuKln lMqQ== X-Gm-Message-State: AC+VfDzXLiFC48jZoz5PA9z16+JqLvwCIHzpFK/k2gceiyEp9tDHanUm pK0uBtBD3ulbdjwy+VJbHC5MXtLk6EsHvl0wxfM= X-Google-Smtp-Source: ACHHUZ6bqwt1GY4oriaCykyLH4Sf/x5wdIooUU03yqjzQrC8HNMeORptN5pC6/SR7DIezpTI7asbww== X-Received: by 2002:a17:902:ef91:b0:1a6:81bd:c4d9 with SMTP id iz17-20020a170902ef9100b001a681bdc4d9mr7440008plb.39.1682788874270; Sat, 29 Apr 2023 10:21:14 -0700 (PDT) Received: from hexa.lan (rrcs-66-91-142-162.west.biz.rr.com. [66.91.142.162]) by smtp.gmail.com with ESMTPSA id c3-20020a170902d90300b001a6b9c42dbasm15156041plz.88.2023.04.29.10.21.13 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sat, 29 Apr 2023 10:21:13 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][kirkstone 12/13] populate_sdk_base: add zip options Date: Sat, 29 Apr 2023 07:20:32 -1000 Message-Id: <4f5bf144bfe4f34adfc22d86783d6ce29e9f6e15.1682788726.git.steve@sakoman.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Sat, 29 Apr 2023 17:21:16 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/180555 From: Christoph Lauer Add SDK_ZIP_OPTIONS to remove symbolic link creation in zip archive or add options, e.g. for encryption of the zip archive. (From OE-Core rev: 04b62f9459b401c276255f166d0738b6f902a576) Signed-off-by: Christoph Lauer Signed-off-by: Alexandre Belloni Signed-off-by: Richard Purdie Signed-off-by: Steve Sakoman --- meta/classes/populate_sdk_base.bbclass | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/meta/classes/populate_sdk_base.bbclass b/meta/classes/populate_sdk_base.bbclass index 16f929bf59..fb00460172 100644 --- a/meta/classes/populate_sdk_base.bbclass +++ b/meta/classes/populate_sdk_base.bbclass @@ -53,6 +53,8 @@ TOOLCHAIN_OUTPUTNAME ?= "${SDK_NAME}-toolchain-${SDK_VERSION}" SDK_ARCHIVE_TYPE ?= "tar.xz" SDK_XZ_COMPRESSION_LEVEL ?= "-9" SDK_XZ_OPTIONS ?= "${XZ_DEFAULTS} ${SDK_XZ_COMPRESSION_LEVEL}" +SDK_ZIP_OPTIONS ?= "-y" + # To support different sdk type according to SDK_ARCHIVE_TYPE, now support zip and tar.xz python () { @@ -60,7 +62,7 @@ python () { d.setVar('SDK_ARCHIVE_DEPENDS', 'zip-native') # SDK_ARCHIVE_CMD used to generate archived sdk ${TOOLCHAIN_OUTPUTNAME}.${SDK_ARCHIVE_TYPE} from input dir ${SDK_OUTPUT}/${SDKPATH} to output dir ${SDKDEPLOYDIR} # recommand to cd into input dir first to avoid archive with buildpath - d.setVar('SDK_ARCHIVE_CMD', 'cd ${SDK_OUTPUT}/${SDKPATH}; zip -r -y ${SDKDEPLOYDIR}/${TOOLCHAIN_OUTPUTNAME}.${SDK_ARCHIVE_TYPE} .') + d.setVar('SDK_ARCHIVE_CMD', 'cd ${SDK_OUTPUT}/${SDKPATH}; zip -r ${SDK_ZIP_OPTIONS} ${SDKDEPLOYDIR}/${TOOLCHAIN_OUTPUTNAME}.${SDK_ARCHIVE_TYPE} .') else: d.setVar('SDK_ARCHIVE_DEPENDS', 'xz-native') d.setVar('SDK_ARCHIVE_CMD', 'cd ${SDK_OUTPUT}/${SDKPATH}; tar ${SDKTAROPTS} -cf - . | xz ${SDK_XZ_OPTIONS} > ${SDKDEPLOYDIR}/${TOOLCHAIN_OUTPUTNAME}.${SDK_ARCHIVE_TYPE}') From patchwork Sat Apr 29 17:20:33 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 23186 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 8EE03C77B60 for ; Sat, 29 Apr 2023 17:21:26 +0000 (UTC) Received: from mail-pg1-f181.google.com (mail-pg1-f181.google.com [209.85.215.181]) by mx.groups.io with SMTP id smtpd.web11.51341.1682788877347445374 for ; Sat, 29 Apr 2023 10:21:17 -0700 Authentication-Results: mx.groups.io; dkim=fail reason="signature has expired" header.i=@sakoman-com.20221208.gappssmtp.com header.s=20221208 header.b=EQ6z/HKP; spf=softfail (domain: sakoman.com, ip: 209.85.215.181, mailfrom: steve@sakoman.com) Received: by mail-pg1-f181.google.com with SMTP id 41be03b00d2f7-528dd896165so134017a12.2 for ; Sat, 29 Apr 2023 10:21:17 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20221208.gappssmtp.com; s=20221208; t=1682788876; x=1685380876; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=GlqTgzvsG/s5IXGT3MWVifvG8bNBEFL6d10I71SyQK4=; b=EQ6z/HKP+LhDebSnwgewznurYBaPsNp8JuCyuBYsXNOq4qRS1A9U4sWPLLVA4pcRyS BI7S0dLTWm5JxmbRkJ6HPu+0qyS3rdksYCcmnUTPvxJ7RKqgO7W6Ll/1jXiBbKjM0+FK QCa2wSxByhxs5GargL9xVxVucmiGzvneGyU/q4F5ajAzYc4MD+4FEDZaVrS7GFvOsNoq vdfXQuHTbIPuIpsbCyqatHfK41ZsQD6irfDKWCltmBjVmWpkHEMGBBESn/lMTmliSHl7 wcwmBoJhOJDgC35Km2FdsdPPrrBJL3h2H2OxzM+kPPXgBGEA821YaFti8xcY+vtW1CQX hBrg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1682788876; x=1685380876; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=GlqTgzvsG/s5IXGT3MWVifvG8bNBEFL6d10I71SyQK4=; b=LutF2NV8uRCL6Y9+wNpbXiIpWKTtFIUtdFmFWrynFs0kge6c8+H5XhxYRA9Vg+xqZQ 0yxxsad3i+QL9rd4s2a6nr8vveSj2dESPlRDO/Ec21ROA5vzfzpQt/tzEpZlyUsPX2N4 O480L03qTDr81oXgHZ15vKuxPGYweQ4KR1xOlwi3FShfVCxOZ7kxk8fwSqVq8Jj0X9a2 +OasyALnmV5NjCRR6NwexzdeqlKvvk28SWXM2FhBxk3b/bNFhf37NdWSDi3bCdlURp5n +xVRDWMtodFwG5V0OrjNY9XyCQSnOhMUD8TWKuGJnm/NJChA8d2oMk8JvMnyZCmN9kPz 5A3g== X-Gm-Message-State: AC+VfDzAlpnB5BubAR4gBo5pgrpbNwY5aER6aRJJpUTPOvqXR2a863Q5 DFZFna8RLwO9npcGv1oc2kdgtvp8B2jkIhJu+RQ= X-Google-Smtp-Source: ACHHUZ4Epj6lEXOKaIV3GH9i6eNjnqT1RXQpliyQIRKgCZ3J+f2pz+SHui6t3eD9scso60/RB7Li2w== X-Received: by 2002:a17:902:a50f:b0:19a:9880:175f with SMTP id s15-20020a170902a50f00b0019a9880175fmr8318362plq.51.1682788876399; Sat, 29 Apr 2023 10:21:16 -0700 (PDT) Received: from hexa.lan (rrcs-66-91-142-162.west.biz.rr.com. [66.91.142.162]) by smtp.gmail.com with ESMTPSA id c3-20020a170902d90300b001a6b9c42dbasm15156041plz.88.2023.04.29.10.21.15 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sat, 29 Apr 2023 10:21:16 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][kirkstone 13/13] glibc: stable 2.35 branch updates. Date: Sat, 29 Apr 2023 07:20:33 -1000 Message-Id: <2d67702bdfc64358d364dd6484ae41842ee7c52f.1682788726.git.steve@sakoman.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Sat, 29 Apr 2023 17:21:26 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/180556 From: Deepthi Hemraj Below commits on glibc-2.35 stable branch are updated. 1c7f51c75a x86_64: Fix asm constraints in feraiseexcept (bug 30305) 8d07e65d15 gshadow: Matching sgetsgent, sgetsgent_r ERANGE handling (bug 30151) b7cc55a24e x86: Check minimum/maximum of non_temporal_threshold [BZ #29953] 3f63f9dfe1 stdlib: Undo post review change to 16adc58e73f3 [BZ #27749] 757d9a6306 elf: Smoke-test ldconfig -p against system /etc/ld.so.cache 416bd20b3f Use 64-bit time_t interfaces in strftime and strptime (bug 30053) ae045ed16b cdefs: Limit definition of fortification macros 6bcd5d8e36 x86: Prevent SIGSEGV in memcmp-sse2 when data is concurrently modified [BZ #29863] 82663d3c03 time: Set daylight to 1 for matching DST/offset change (bug 29951) d9923235f0 elf/tst-tlsopt-powerpc fails when compiled with -mcpu=power10 (BZ# 29776) Signed-off-by: Deepthi Hemraj Signed-off-by: Steve Sakoman --- meta/recipes-core/glibc/glibc-version.inc | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/meta/recipes-core/glibc/glibc-version.inc b/meta/recipes-core/glibc/glibc-version.inc index d36da0ce3f..4d8d96cefb 100644 --- a/meta/recipes-core/glibc/glibc-version.inc +++ b/meta/recipes-core/glibc/glibc-version.inc @@ -1,6 +1,6 @@ SRCBRANCH ?= "release/2.35/master" PV = "2.35" -SRCREV_glibc ?= "293211b6fddf60fc407d21fcba0326dd2148f76b" +SRCREV_glibc ?= "1c7f51c75ae300fe52ccb636e71b8e28cb20824c" SRCREV_localedef ?= "794da69788cbf9bf57b59a852f9f11307663fa87" GLIBC_GIT_URI ?= "git://sourceware.org/git/glibc.git"