From patchwork Thu Mar 7 23:37:13 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 40680 X-Patchwork-Delegate: steve@sakoman.com Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 1D62CC54798 for ; Thu, 7 Mar 2024 23:37:43 +0000 (UTC) Received: from mail-pl1-f180.google.com (mail-pl1-f180.google.com [209.85.214.180]) by mx.groups.io with SMTP id smtpd.web10.8459.1709854653743087015 for ; Thu, 07 Mar 2024 15:37:33 -0800 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20230601.gappssmtp.com header.s=20230601 header.b=wIUApuv/; spf=softfail (domain: sakoman.com, ip: 209.85.214.180, mailfrom: steve@sakoman.com) Received: by mail-pl1-f180.google.com with SMTP id d9443c01a7336-1dc29f1956cso1840295ad.0 for ; Thu, 07 Mar 2024 15:37:33 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20230601.gappssmtp.com; s=20230601; t=1709854653; x=1710459453; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=BFEZsg0LMXuneNM9u+rkn+nHXW67XjE7RQkM+p4AKO0=; b=wIUApuv/GF1ayHiXAw5mfxsPRjZ5Gq9fz7+UNnSfxJsImz94r5yepEcQnmhnOhGRK6 uDL4edHcJZMcmFYaysCzTSqTfOazxDMeKeo77SfFO5FebaKV3kOfqu6M9BdlChHez+6w wM7WGLQ7Y4Vhv8siWQW/g1ffMQ1vS0mhc6EpplrFLW3MjYGEFSSEIz1RkhuUJFrXphgU a0QnLO3ZJtfPKyR/cpu0+jgwB3bkA6snuqOCaGJaxL1YIGjwhA0NlmTTaCkiynAq0Lkl /IpJjpirqXMzPq+OfwkcOhMtdZCOBNLwG2yE6M50ehc5NSNNuFdD+/CfyIKOK6JL9hd5 0CEg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1709854653; x=1710459453; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=BFEZsg0LMXuneNM9u+rkn+nHXW67XjE7RQkM+p4AKO0=; b=mGG9d+Y9Y4pa09nrw9ocG7cRLrQ/mo4wGKae9mm0+zFIb8+B85kKvIDuF60iYvgbOO vnLAmJmkdSjkMYLaUR8/6un+7BHkVc5LQVfEj9Nm/ZNqN10MSNqAJHfVkSbin8eMcyGL KEW1mtE7euQ/3vjh2WWp/2gVQR+R1DK9rDUwcjiVqRw25lryUVlrhHgvc250PUoxnOx5 FKMBXtJorKApcl8CzldlMA2NKG5aCrL2nJznYAcyx4PeKUXAOXonDUMhKaILcJk3LBwf SMSrLLun5+fjtUKQmh1hpREqL8+Ca5xqm/jpwkNq9+Hm0SS50GqwWtcTnv/mWaKnIrj+ MHLw== X-Gm-Message-State: AOJu0Yxm/AhpBBuPC9Z/kU98hhW063PsmZJfkic9GsHEolwDeRih6Zog O1hHTEKbXu7QyUONr5pj7wCr6CUkVYBvQzTS+9jWXIvd9RnXWWd1Tw4Mz8Fz67cUDz4bUhuxY/Z r+GM= X-Google-Smtp-Source: AGHT+IGbF+hY93ySO1YfLWVPEtFmHUcmKUbQZUR1VlAoQOODuPL2zcsw8nRE128CjccuUQuBjL/tjg== X-Received: by 2002:a17:903:11ce:b0:1dc:7856:2213 with SMTP id q14-20020a17090311ce00b001dc78562213mr10142663plh.37.1709854652819; Thu, 07 Mar 2024 15:37:32 -0800 (PST) Received: from hexa.lan (dhcp-72-234-108-41.hawaiiantel.net. [72.234.108.41]) by smtp.gmail.com with ESMTPSA id h18-20020a170902f7d200b001dd526ff7d2sm1933243plw.308.2024.03.07.15.37.32 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 07 Mar 2024 15:37:32 -0800 (PST) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][kirkstone 1/9] Revert "linux-yocto/5.15: update CVE exclusions" Date: Thu, 7 Mar 2024 13:37:13 -1000 Message-Id: <666f712018e486913ad469eb96cef6a9596c4830.1709853987.git.steve@sakoman.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 07 Mar 2024 23:37:43 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/196828 This series is causing issues with adding and resizing partitions. This reverts commit b71eeab71911ab49a8e8b8d78560fdbd66f883e7. --- .../linux/cve-exclusion_5.15.inc | 91 ++----------------- 1 file changed, 6 insertions(+), 85 deletions(-) diff --git a/meta/recipes-kernel/linux/cve-exclusion_5.15.inc b/meta/recipes-kernel/linux/cve-exclusion_5.15.inc index d33f2b3c7f..0d54b414d9 100644 --- a/meta/recipes-kernel/linux/cve-exclusion_5.15.inc +++ b/meta/recipes-kernel/linux/cve-exclusion_5.15.inc @@ -1,9 +1,9 @@ # Auto-generated CVE metadata, DO NOT EDIT BY HAND. -# Generated at 2024-02-06 21:02:11.546853 for version 5.15.148 +# Generated at 2024-01-18 18:47:24.084935 for version 5.15.147 python check_kernel_cve_status_version() { - this_version = "5.15.148" + this_version = "5.15.147" kernel_version = d.getVar("LINUX_VERSION") if kernel_version != this_version: bb.warn("Kernel CVE status needs updating: generated for %s but kernel is %s" % (this_version, kernel_version)) @@ -5299,12 +5299,6 @@ CVE_CHECK_IGNORE += "CVE-2021-3348" # fixed-version: Fixed after version 5.13rc7 CVE_CHECK_IGNORE += "CVE-2021-33624" -# fixed-version: Fixed after version 5.4rc1 -CVE_CHECK_IGNORE += "CVE-2021-33630" - -# cpe-stable-backport: Backported in 5.15.87 -CVE_CHECK_IGNORE += "CVE-2021-33631" - # cpe-stable-backport: Backported in 5.15.54 CVE_CHECK_IGNORE += "CVE-2021-33655" @@ -6401,8 +6395,7 @@ CVE_CHECK_IGNORE += "CVE-2022-3635" # fixed-version: only affects 5.19 onwards CVE_CHECK_IGNORE += "CVE-2022-3640" -# cpe-stable-backport: Backported in 5.15.129 -CVE_CHECK_IGNORE += "CVE-2022-36402" +# CVE-2022-36402 has no known resolution # CVE-2022-3642 has no known resolution @@ -7375,15 +7368,9 @@ CVE_CHECK_IGNORE += "CVE-2023-4611" # cpe-stable-backport: Backported in 5.15.132 CVE_CHECK_IGNORE += "CVE-2023-4623" -# cpe-stable-backport: Backported in 5.15.137 -CVE_CHECK_IGNORE += "CVE-2023-46343" - # cpe-stable-backport: Backported in 5.15.137 CVE_CHECK_IGNORE += "CVE-2023-46813" -# cpe-stable-backport: Backported in 5.15.148 -CVE_CHECK_IGNORE += "CVE-2023-46838" - # cpe-stable-backport: Backported in 5.15.140 CVE_CHECK_IGNORE += "CVE-2023-46862" @@ -7398,17 +7385,11 @@ CVE_CHECK_IGNORE += "CVE-2023-4881" # cpe-stable-backport: Backported in 5.15.132 CVE_CHECK_IGNORE += "CVE-2023-4921" -# CVE-2023-50431 needs backporting (fixed from 6.8rc1) +# CVE-2023-50431 has no known resolution # fixed-version: only affects 6.0rc1 onwards CVE_CHECK_IGNORE += "CVE-2023-5090" -# cpe-stable-backport: Backported in 5.15.128 -CVE_CHECK_IGNORE += "CVE-2023-51042" - -# cpe-stable-backport: Backported in 5.15.121 -CVE_CHECK_IGNORE += "CVE-2023-51043" - # cpe-stable-backport: Backported in 5.15.135 CVE_CHECK_IGNORE += "CVE-2023-5158" @@ -7430,9 +7411,6 @@ CVE_CHECK_IGNORE += "CVE-2023-51782" # cpe-stable-backport: Backported in 5.15.134 CVE_CHECK_IGNORE += "CVE-2023-5197" -# cpe-stable-backport: Backported in 5.15.147 -CVE_CHECK_IGNORE += "CVE-2023-52340" - # fixed-version: only affects 6.1rc1 onwards CVE_CHECK_IGNORE += "CVE-2023-5345" @@ -7447,8 +7425,7 @@ CVE_CHECK_IGNORE += "CVE-2023-5972" # CVE-2023-6039 needs backporting (fixed from 6.5rc5) -# cpe-stable-backport: Backported in 5.15.147 -CVE_CHECK_IGNORE += "CVE-2023-6040" +# CVE-2023-6040 needs backporting (fixed from 5.18rc1) # fixed-version: only affects 6.6rc3 onwards CVE_CHECK_IGNORE += "CVE-2023-6111" @@ -7459,9 +7436,6 @@ CVE_CHECK_IGNORE += "CVE-2023-6121" # cpe-stable-backport: Backported in 5.15.132 CVE_CHECK_IGNORE += "CVE-2023-6176" -# fixed-version: only affects 6.6rc1 onwards -CVE_CHECK_IGNORE += "CVE-2023-6200" - # CVE-2023-6238 has no known resolution # CVE-2023-6270 has no known resolution @@ -7494,9 +7468,6 @@ CVE_CHECK_IGNORE += "CVE-2023-6679" # cpe-stable-backport: Backported in 5.15.143 CVE_CHECK_IGNORE += "CVE-2023-6817" -# cpe-stable-backport: Backported in 5.15.148 -CVE_CHECK_IGNORE += "CVE-2023-6915" - # cpe-stable-backport: Backported in 5.15.143 CVE_CHECK_IGNORE += "CVE-2023-6931" @@ -7516,55 +7487,5 @@ CVE_CHECK_IGNORE += "CVE-2024-0193" # fixed-version: only affects 6.2rc1 onwards CVE_CHECK_IGNORE += "CVE-2024-0443" -# cpe-stable-backport: Backported in 5.15.64 -CVE_CHECK_IGNORE += "CVE-2024-0562" - -# CVE-2024-0564 has no known resolution - -# CVE-2024-0565 needs backporting (fixed from 6.7rc6) - -# fixed-version: only affects 6.4rc1 onwards -CVE_CHECK_IGNORE += "CVE-2024-0582" - -# cpe-stable-backport: Backported in 5.15.142 -CVE_CHECK_IGNORE += "CVE-2024-0584" - -# cpe-stable-backport: Backported in 5.15.140 -CVE_CHECK_IGNORE += "CVE-2024-0607" - -# cpe-stable-backport: Backported in 5.15.121 -CVE_CHECK_IGNORE += "CVE-2024-0639" - -# cpe-stable-backport: Backported in 5.15.135 -CVE_CHECK_IGNORE += "CVE-2024-0641" - -# cpe-stable-backport: Backported in 5.15.147 -CVE_CHECK_IGNORE += "CVE-2024-0646" - -# cpe-stable-backport: Backported in 5.15.112 -CVE_CHECK_IGNORE += "CVE-2024-0775" - -# CVE-2024-0841 has no known resolution - -# cpe-stable-backport: Backported in 5.15.148 -CVE_CHECK_IGNORE += "CVE-2024-1085" - -# CVE-2024-1086 needs backporting (fixed from 6.8rc2) - -# CVE-2024-21803 has no known resolution - -# CVE-2024-22099 has no known resolution - -# cpe-stable-backport: Backported in 5.15.146 -CVE_CHECK_IGNORE += "CVE-2024-22705" - -# CVE-2024-23307 has no known resolution - -# CVE-2024-23848 has no known resolution - -# CVE-2024-23849 has no known resolution - -# CVE-2024-23850 has no known resolution - -# CVE-2024-23851 has no known resolution +# Skipping dd=CVE-2023-1476, no affected_versions From patchwork Thu Mar 7 23:37:14 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 40684 X-Patchwork-Delegate: steve@sakoman.com Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 56378C54E60 for ; Thu, 7 Mar 2024 23:37:43 +0000 (UTC) Received: from mail-pl1-f169.google.com (mail-pl1-f169.google.com [209.85.214.169]) by mx.groups.io with SMTP id smtpd.web11.8646.1709854655282786304 for ; Thu, 07 Mar 2024 15:37:35 -0800 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20230601.gappssmtp.com header.s=20230601 header.b=K/IIBNDa; spf=softfail (domain: sakoman.com, ip: 209.85.214.169, mailfrom: steve@sakoman.com) Received: by mail-pl1-f169.google.com with SMTP id d9443c01a7336-1dd2c8f1204so1645255ad.1 for ; Thu, 07 Mar 2024 15:37:35 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20230601.gappssmtp.com; s=20230601; t=1709854654; x=1710459454; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=bZH/5yWkYpkatt34T1ZwbhRAcJx9CwB91KZq9GH665g=; b=K/IIBNDaErh0GcsjHVRFdmsgOKFv4XmJvbqjqABuzhOXpBzTflanS28bcrvDAJdGol UfUx2FYQP8mxg24Wj6knZEtMf4hAYwLRalVP+QzKqvgytf9gshA6ZFoN7iw5OpAYkFZZ 7AQbPs7H8xhn+TjiUiFmfje3NoIvmbhvSBWS1Cl3cc83hQuKO9zeEtmmDPx5Wiw8f8qZ RAgh/xITr2Ofxj3X8NregOd7mKSqyt9Hn+hk05XhVpcK7kuDwurjS3yUceEj+xPkGACN Sblk07j8K3hNT3ibUe45VEd2dIVFuFQR8Jbbg/qQ5CTSwC0ka+MT0ErlGUg36A8+QV8/ +RXg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1709854654; x=1710459454; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=bZH/5yWkYpkatt34T1ZwbhRAcJx9CwB91KZq9GH665g=; b=H9YyPlLbHpVKc1dhfAJbetodHZmNj4cjFxuJ3wZ0fDz6ceZzksBPBt5Uqn5g1/k/tR gSjFrFoNMpACqHxExGj7zauzATt5OYcglS1vCrQsNt9viBseDt9KPhWfbmAD3aXDjYeF 5kFgrvb0jRQVpLtviPwMtnyZyR/Vpx8D5sZ+K3Nxy5+107+r8Y0NmQ/Y06+PWvF3E9Hn 02CAPn8XTbx0W6dxByN1+mqMlBo0+3Silxff8z4janrPDDSjuT5pXFBP8dcape77/Tej q+5RIsYicbIUT2ilBZSm++im0DI4aTxPWwikmIgvtRSzTEszlpnt7dw3sUlLzVGFmczh 0unA== X-Gm-Message-State: AOJu0YzxnCEclyzdxDXrEVV4DApSjKbmnzFSeGPk1oJr+lae7kF4R0KV PwaEH+t15FPVhi4A3a+NneZjAoIs7mB5pU32ZU22uECzIjXxyNP0O8H+VhTiylDKICaowRkNy+D pSAY= X-Google-Smtp-Source: AGHT+IF21GAhLDTRRxmj1gRFPc87vFsB5HyrOGOMVSDYKYOlxD+gihfaoOsiBGxMzOGydoU+AE1QCA== X-Received: by 2002:a17:902:dac5:b0:1dc:68b6:9243 with SMTP id q5-20020a170902dac500b001dc68b69243mr10186916plx.58.1709854654504; Thu, 07 Mar 2024 15:37:34 -0800 (PST) Received: from hexa.lan (dhcp-72-234-108-41.hawaiiantel.net. [72.234.108.41]) by smtp.gmail.com with ESMTPSA id h18-20020a170902f7d200b001dd526ff7d2sm1933243plw.308.2024.03.07.15.37.33 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 07 Mar 2024 15:37:34 -0800 (PST) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][kirkstone 2/9] Revert "linux-yocto/5.15: update to v5.15.148" Date: Thu, 7 Mar 2024 13:37:14 -1000 Message-Id: <651c28f59b865ff31b8578c87addca26c64c0965.1709853987.git.steve@sakoman.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 07 Mar 2024 23:37:43 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/196829 This series is causing issues with adding and resizing partitions. This reverts commit f1326d008a2a37b3860f25eb082efabdeba7cc32. --- .../linux/linux-yocto-rt_5.15.bb | 6 ++--- .../linux/linux-yocto-tiny_5.15.bb | 6 ++--- meta/recipes-kernel/linux/linux-yocto_5.15.bb | 26 +++++++++---------- 3 files changed, 19 insertions(+), 19 deletions(-) diff --git a/meta/recipes-kernel/linux/linux-yocto-rt_5.15.bb b/meta/recipes-kernel/linux/linux-yocto-rt_5.15.bb index 4578a1d819..e64f21b2f0 100644 --- a/meta/recipes-kernel/linux/linux-yocto-rt_5.15.bb +++ b/meta/recipes-kernel/linux/linux-yocto-rt_5.15.bb @@ -11,13 +11,13 @@ python () { raise bb.parse.SkipRecipe("Set PREFERRED_PROVIDER_virtual/kernel to linux-yocto-rt to enable it") } -SRCREV_machine ?= "198d85bb67700ac968a286cf7f89f008bb6eff39" -SRCREV_meta ?= "c07c75a1e9438e70a80615cac0f48eb91d8f34ea" +SRCREV_machine ?= "7168cfa2ce6492db31163393808806b6f48af5e8" +SRCREV_meta ?= "487de687c6a4553f11d67b83d01f16f79449ee49" SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;branch=${KBRANCH};name=machine \ git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-5.15;destsuffix=${KMETA}" -LINUX_VERSION ?= "5.15.148" +LINUX_VERSION ?= "5.15.147" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" diff --git a/meta/recipes-kernel/linux/linux-yocto-tiny_5.15.bb b/meta/recipes-kernel/linux/linux-yocto-tiny_5.15.bb index 267ebb11c4..38bea23264 100644 --- a/meta/recipes-kernel/linux/linux-yocto-tiny_5.15.bb +++ b/meta/recipes-kernel/linux/linux-yocto-tiny_5.15.bb @@ -5,7 +5,7 @@ KCONFIG_MODE = "--allnoconfig" require recipes-kernel/linux/linux-yocto.inc -LINUX_VERSION ?= "5.15.148" +LINUX_VERSION ?= "5.15.147" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}" @@ -14,8 +14,8 @@ DEPENDS += "openssl-native util-linux-native" KMETA = "kernel-meta" KCONF_BSP_AUDIT_LEVEL = "2" -SRCREV_machine ?= "0780801e81912c4bbd53b4fc01dad6df556739b6" -SRCREV_meta ?= "c07c75a1e9438e70a80615cac0f48eb91d8f34ea" +SRCREV_machine ?= "641e2136a155ce3179c84b9365a5998c1354fdd0" +SRCREV_meta ?= "487de687c6a4553f11d67b83d01f16f79449ee49" PV = "${LINUX_VERSION}+git${SRCPV}" diff --git a/meta/recipes-kernel/linux/linux-yocto_5.15.bb b/meta/recipes-kernel/linux/linux-yocto_5.15.bb index 9a7c96b453..1acd7b62cd 100644 --- a/meta/recipes-kernel/linux/linux-yocto_5.15.bb +++ b/meta/recipes-kernel/linux/linux-yocto_5.15.bb @@ -14,24 +14,24 @@ KBRANCH:qemux86 ?= "v5.15/standard/base" KBRANCH:qemux86-64 ?= "v5.15/standard/base" KBRANCH:qemumips64 ?= "v5.15/standard/mti-malta64" -SRCREV_machine:qemuarm ?= "c0150afdb5ca785c04acec22c7f42f42b044ca43" -SRCREV_machine:qemuarm64 ?= "201f4f28b183815dbabda398e9ee90a2e628ad94" -SRCREV_machine:qemumips ?= "1d82f42872b46d7f129bbe631931a09590d9d6bf" -SRCREV_machine:qemuppc ?= "e985732d9de961b364b9bbf03ef3eba41adf8e37" -SRCREV_machine:qemuriscv64 ?= "9bc0938c9f31f2f63b8e9d7b8f43671927858068" -SRCREV_machine:qemuriscv32 ?= "9bc0938c9f31f2f63b8e9d7b8f43671927858068" -SRCREV_machine:qemux86 ?= "9bc0938c9f31f2f63b8e9d7b8f43671927858068" -SRCREV_machine:qemux86-64 ?= "9bc0938c9f31f2f63b8e9d7b8f43671927858068" -SRCREV_machine:qemumips64 ?= "c87c9b74f382aba2886320ca29dd32544e53f15b" -SRCREV_machine ?= "9bc0938c9f31f2f63b8e9d7b8f43671927858068" -SRCREV_meta ?= "c07c75a1e9438e70a80615cac0f48eb91d8f34ea" +SRCREV_machine:qemuarm ?= "82f8a25a3894c10d1cf26914b8e51726351ba11e" +SRCREV_machine:qemuarm64 ?= "cf955e443d881e296b83940143fd30ea83fcf222" +SRCREV_machine:qemumips ?= "1c3babd3b42768e24c797edfc3f67906aca6d072" +SRCREV_machine:qemuppc ?= "b08998787bece69376578b049cab073d8b80e872" +SRCREV_machine:qemuriscv64 ?= "5822f13dba3b1f460536d873aea707f4b25840cf" +SRCREV_machine:qemuriscv32 ?= "5822f13dba3b1f460536d873aea707f4b25840cf" +SRCREV_machine:qemux86 ?= "5822f13dba3b1f460536d873aea707f4b25840cf" +SRCREV_machine:qemux86-64 ?= "5822f13dba3b1f460536d873aea707f4b25840cf" +SRCREV_machine:qemumips64 ?= "4ff2c0496c0160a96185a080ec9678c63b68bd47" +SRCREV_machine ?= "5822f13dba3b1f460536d873aea707f4b25840cf" +SRCREV_meta ?= "487de687c6a4553f11d67b83d01f16f79449ee49" # set your preferred provider of linux-yocto to 'linux-yocto-upstream', and you'll # get the /base branch, which is pure upstream -stable, and the same # meta SRCREV as the linux-yocto-standard builds. Select your version using the # normal PREFERRED_VERSION settings. BBCLASSEXTEND = "devupstream:target" -SRCREV_machine:class-devupstream ?= "6139f2a02fe0ac7a08389b4eb786e0c659039ddd" +SRCREV_machine:class-devupstream ?= "26c690eff0a56293e0b6911a38e406c211b35547" PN:class-devupstream = "linux-yocto-upstream" KBRANCH:class-devupstream = "v5.15/base" @@ -39,7 +39,7 @@ SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;name=machine;branch=${KBRA git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-5.15;destsuffix=${KMETA}" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" -LINUX_VERSION ?= "5.15.148" +LINUX_VERSION ?= "5.15.147" DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}" DEPENDS += "openssl-native util-linux-native" From patchwork Thu Mar 7 23:37:15 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 40681 X-Patchwork-Delegate: steve@sakoman.com Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 1E1F5C54E58 for ; Thu, 7 Mar 2024 23:37:43 +0000 (UTC) Received: from mail-pl1-f174.google.com (mail-pl1-f174.google.com [209.85.214.174]) by mx.groups.io with SMTP id smtpd.web10.8461.1709854656927028208 for ; Thu, 07 Mar 2024 15:37:36 -0800 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20230601.gappssmtp.com header.s=20230601 header.b=BKnqQLTN; spf=softfail (domain: sakoman.com, ip: 209.85.214.174, mailfrom: steve@sakoman.com) Received: by mail-pl1-f174.google.com with SMTP id d9443c01a7336-1dd178fc492so10106855ad.2 for ; Thu, 07 Mar 2024 15:37:36 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20230601.gappssmtp.com; s=20230601; t=1709854656; x=1710459456; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=2xKSHYRJTeunhwzSTpz38LTTrpNedQ7mRq3FVENnbfk=; b=BKnqQLTNML3qtFqKd+YOs4bDeXto1aU//zw6vJMg3dVhLIY8rTKgiGoDEKOJoErCxf SBmSN2GtgT5eIgZDWiERShOywpe8IurIDbde8oNK4z+tFhWyxr+c0Y09un3Dx468zZmB ItobsxqnVu5Z4TZMsGnWKWMyCwhIt5gQ1Afa8wLXEeparMbdHkYoXqwRVrOPZvePrmgw 7VaN+RVtSXILPNKg8uAJ83tmNMsnHwhtO2wBUfmyiA2vP9WbzhmHm/LWnuhpWRn/jk7j yucxoSup/7IfBVwLEJkCQGNw81aQwC/rB8s3oVwZPnoVdMLbn38QcY15tru+nW7xmDxq ZtGQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1709854656; x=1710459456; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=2xKSHYRJTeunhwzSTpz38LTTrpNedQ7mRq3FVENnbfk=; b=qgznXNAnF7zWMAf0s6gXTPh56IllrpxQkRoIEItinAQYFSdZapyNU36dXBAuld+T83 uUyNnDyqKCnaJFojlTgZKF5sPqrbTuFsU25R5Pucc7sXvu4R3OJwRsSGZpnuPLUm1x0T 5WA4xQUs4Od2c+asA+qladEgtffC1Nr/XzDMmLoxSgbbUGpVl4vnMhpUjYZEofBWgES1 +QH90/YubXchPorZ0wDfAXP2xc3WEyy+uwy8Z/DtNRYaFJrBubO4412Cm6Jr/iywuzvr iKHxeWjNzCjD3JMYe/kxzdwf4ZdxjeF73qVaLjuA1ibcwmy591x4u85tkWcWlq8pRDVu 8LKA== X-Gm-Message-State: AOJu0YxT20InO9Y6f8v/SJ+4lpGa0PMG6pGs9MXVb1GGOU7WH8YKxqsX W6JPtprz8GUw7a1RJPfXvMVD0ankGqn9vk5l/fcMjcYk9/P6b+737neXdUytn7QYHlfnJdqlFWT //p4= X-Google-Smtp-Source: AGHT+IEQ0Oga/JFguNNHW5KrY5dlIyUHJnlRbs8S713iYWtkeroMttL9hFwo93HVJ+bQ17r1LF6N5w== X-Received: by 2002:a17:903:2448:b0:1db:f811:66f7 with SMTP id l8-20020a170903244800b001dbf81166f7mr10230992pls.60.1709854656171; Thu, 07 Mar 2024 15:37:36 -0800 (PST) Received: from hexa.lan (dhcp-72-234-108-41.hawaiiantel.net. [72.234.108.41]) by smtp.gmail.com with ESMTPSA id h18-20020a170902f7d200b001dd526ff7d2sm1933243plw.308.2024.03.07.15.37.35 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 07 Mar 2024 15:37:35 -0800 (PST) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][kirkstone 3/9] Revert "linux-yocto/5.15: update CVE exclusions" Date: Thu, 7 Mar 2024 13:37:15 -1000 Message-Id: <929849eba86b5fe0d0aeaaf7ee78316b4dd77d99.1709853987.git.steve@sakoman.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 07 Mar 2024 23:37:43 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/196830 This series is causing issues with adding and resizing partitions. This reverts commit c7c86d97f6a0e1d09eaca999ecec13656655f299. --- .../linux/cve-exclusion_5.15.inc | 44 +++---------------- 1 file changed, 7 insertions(+), 37 deletions(-) diff --git a/meta/recipes-kernel/linux/cve-exclusion_5.15.inc b/meta/recipes-kernel/linux/cve-exclusion_5.15.inc index 0d54b414d9..84d0becb8d 100644 --- a/meta/recipes-kernel/linux/cve-exclusion_5.15.inc +++ b/meta/recipes-kernel/linux/cve-exclusion_5.15.inc @@ -1,9 +1,9 @@ # Auto-generated CVE metadata, DO NOT EDIT BY HAND. -# Generated at 2024-01-18 18:47:24.084935 for version 5.15.147 +# Generated at 2024-01-11 21:16:55.956074 for version 5.15.146 python check_kernel_cve_status_version() { - this_version = "5.15.147" + this_version = "5.15.146" kernel_version = d.getVar("LINUX_VERSION") if kernel_version != this_version: bb.warn("Kernel CVE status needs updating: generated for %s but kernel is %s" % (this_version, kernel_version)) @@ -6626,9 +6626,6 @@ CVE_CHECK_IGNORE += "CVE-2022-48425" # cpe-stable-backport: Backported in 5.15.121 CVE_CHECK_IGNORE += "CVE-2022-48502" -# cpe-stable-backport: Backported in 5.15.42 -CVE_CHECK_IGNORE += "CVE-2022-48619" - # fixed-version: Fixed after version 5.0rc1 CVE_CHECK_IGNORE += "CVE-2023-0030" @@ -6750,8 +6747,6 @@ CVE_CHECK_IGNORE += "CVE-2023-1382" # fixed-version: Fixed after version 5.11rc4 CVE_CHECK_IGNORE += "CVE-2023-1390" -# CVE-2023-1476 has no known resolution - # cpe-stable-backport: Backported in 5.15.95 CVE_CHECK_IGNORE += "CVE-2023-1513" @@ -6926,8 +6921,7 @@ CVE_CHECK_IGNORE += "CVE-2023-23559" # fixed-version: Fixed after version 5.12rc1 CVE_CHECK_IGNORE += "CVE-2023-23586" -# fixed-version: only affects 5.18rc1 onwards -CVE_CHECK_IGNORE += "CVE-2023-2430" +# CVE-2023-2430 needs backporting (fixed from 6.2rc5) # cpe-stable-backport: Backported in 5.15.105 CVE_CHECK_IGNORE += "CVE-2023-2483" @@ -7357,8 +7351,7 @@ CVE_CHECK_IGNORE += "CVE-2023-45871" # fixed-version: only affects 6.5rc1 onwards CVE_CHECK_IGNORE += "CVE-2023-45898" -# fixed-version: only affects 6.4rc1 onwards -CVE_CHECK_IGNORE += "CVE-2023-4610" +# CVE-2023-4610 needs backporting (fixed from 6.4) # fixed-version: only affects 6.4rc1 onwards CVE_CHECK_IGNORE += "CVE-2023-4611" @@ -7393,8 +7386,7 @@ CVE_CHECK_IGNORE += "CVE-2023-5090" # cpe-stable-backport: Backported in 5.15.135 CVE_CHECK_IGNORE += "CVE-2023-5158" -# cpe-stable-backport: Backported in 5.15.146 -CVE_CHECK_IGNORE += "CVE-2023-51779" +# CVE-2023-51779 needs backporting (fixed from 6.7rc7) # cpe-stable-backport: Backported in 5.15.137 CVE_CHECK_IGNORE += "CVE-2023-5178" @@ -7425,8 +7417,6 @@ CVE_CHECK_IGNORE += "CVE-2023-5972" # CVE-2023-6039 needs backporting (fixed from 6.5rc5) -# CVE-2023-6040 needs backporting (fixed from 5.18rc1) - # fixed-version: only affects 6.6rc3 onwards CVE_CHECK_IGNORE += "CVE-2023-6111" @@ -7438,13 +7428,8 @@ CVE_CHECK_IGNORE += "CVE-2023-6176" # CVE-2023-6238 has no known resolution -# CVE-2023-6270 has no known resolution - # CVE-2023-6356 has no known resolution -# fixed-version: only affects 6.1rc1 onwards -CVE_CHECK_IGNORE += "CVE-2023-6531" - # CVE-2023-6535 has no known resolution # CVE-2023-6536 has no known resolution @@ -7454,16 +7439,14 @@ CVE_CHECK_IGNORE += "CVE-2023-6546" # CVE-2023-6560 needs backporting (fixed from 6.7rc4) -# cpe-stable-backport: Backported in 5.15.146 -CVE_CHECK_IGNORE += "CVE-2023-6606" +# CVE-2023-6606 needs backporting (fixed from 6.7rc7) # CVE-2023-6610 needs backporting (fixed from 6.7rc7) # cpe-stable-backport: Backported in 5.15.143 CVE_CHECK_IGNORE += "CVE-2023-6622" -# fixed-version: only affects 6.7rc1 onwards -CVE_CHECK_IGNORE += "CVE-2023-6679" +# CVE-2023-6679 needs backporting (fixed from 6.7rc6) # cpe-stable-backport: Backported in 5.15.143 CVE_CHECK_IGNORE += "CVE-2023-6817" @@ -7476,16 +7459,3 @@ CVE_CHECK_IGNORE += "CVE-2023-6932" # CVE-2023-7042 has no known resolution -# cpe-stable-backport: Backported in 5.15.100 -CVE_CHECK_IGNORE += "CVE-2023-7192" - -# fixed-version: only affects 6.5rc6 onwards -CVE_CHECK_IGNORE += "CVE-2024-0193" - -# CVE-2024-0340 needs backporting (fixed from 6.4rc6) - -# fixed-version: only affects 6.2rc1 onwards -CVE_CHECK_IGNORE += "CVE-2024-0443" - -# Skipping dd=CVE-2023-1476, no affected_versions - From patchwork Thu Mar 7 23:37:16 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 40682 X-Patchwork-Delegate: steve@sakoman.com Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 34468C54E4A for ; Thu, 7 Mar 2024 23:37:43 +0000 (UTC) Received: from mail-pl1-f179.google.com (mail-pl1-f179.google.com [209.85.214.179]) by mx.groups.io with SMTP id smtpd.web11.8649.1709854658670912044 for ; Thu, 07 Mar 2024 15:37:38 -0800 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20230601.gappssmtp.com header.s=20230601 header.b=HWs6O4Ce; spf=softfail (domain: sakoman.com, ip: 209.85.214.179, mailfrom: steve@sakoman.com) Received: by mail-pl1-f179.google.com with SMTP id d9443c01a7336-1dca160163dso2050875ad.3 for ; Thu, 07 Mar 2024 15:37:38 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20230601.gappssmtp.com; s=20230601; t=1709854658; x=1710459458; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=fxXXoW4PckQD0+W/iq+PC7tjk2FoX+reUrN7UOOIrBA=; b=HWs6O4CeJmv4sk3+3u2+oB0eyGWk5loeGKQfimu8/2GFXtsM7abbiFReme98FiB4/J YIiIiGIK/HkOtvq2UREeFFMjiGL+0gz4VaeNULIG20thXJSpBxiyYA8oWG9si34sv3AT UphT4diV/ePyN8Dw446SPIwlm15tTylQun3P0EXVvJgjR/WAcJEekCBwSdHnMPwDWVDe mO1eNBKwrDnVfQxccEN3VWABm0doZbKDWMtTBb26EjaD9brUVW4HT6argqfY9gwuqgLD uvaeQS7IZQLzsPSTuHCuQ/dKfLOnKoJ9TxBdcmvUIzZArrWSYi9y9hGeUhnE/N0QdFta LD1A== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1709854658; x=1710459458; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=fxXXoW4PckQD0+W/iq+PC7tjk2FoX+reUrN7UOOIrBA=; b=ZaY6aed5TC9TBCN+uHfLO8wWFxsVXDsG/1cNGYbf4KmD7aI+WHIM2TFKFIE+be+0tf LZJb8qjM+wEY4rZyfTO9Ok6TqHxPKBPjixWMGLJ7jtmQs7L6mmfpuud/w1Nr6iyRZGb7 /uuf+XU/YXJAbieZ7uttVJ2w93K9E3D5TIF3z5q+R40rExp7Dm8tHBQ6zz1d2V5gxr19 yZkcJZWA7ozEUHoXMBJNkb6Ua/bZwa+kIe5x3KTLlyZHEyi/yrCYnMVygj2VQiJs8yWu M0DKnF/fqVSzx1OUdifIyoZCq4w2LXZ8cDADx8tuR3GGNAPd5t+R6phGczx3V6ITuaZ7 +IxA== X-Gm-Message-State: AOJu0YzC8TqF5AqdSIvPPw5FMxcR0kqbLfjOWXyFPsLMvPglqaC0E3Yy Ne1ZkCchu4VtNBw5HjAehQ1D2nCtEDTLIdfkmisNd3hY8ahePNP9FYnpZoEmC2XhOc9VtK8Zu0x badg= X-Google-Smtp-Source: AGHT+IEg0Z58u79VoCmw1gh1w84ZnHKf94jpdDalKp/21Pf6iUU8tW7YhwaAnFR3QHJ/ly9E6JBJFw== X-Received: by 2002:a17:902:f64c:b0:1dd:5df5:e6e5 with SMTP id m12-20020a170902f64c00b001dd5df5e6e5mr2836386plg.35.1709854657975; Thu, 07 Mar 2024 15:37:37 -0800 (PST) Received: from hexa.lan (dhcp-72-234-108-41.hawaiiantel.net. [72.234.108.41]) by smtp.gmail.com with ESMTPSA id h18-20020a170902f7d200b001dd526ff7d2sm1933243plw.308.2024.03.07.15.37.37 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 07 Mar 2024 15:37:37 -0800 (PST) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][kirkstone 4/9] Revert "linux-yocto/5.15: update to v5.15.147" Date: Thu, 7 Mar 2024 13:37:16 -1000 Message-Id: <68b4acdc16996050196aaa20445dc5f7467e353b.1709853987.git.steve@sakoman.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 07 Mar 2024 23:37:43 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/196831 This series is causing issues with adding and resizing partitions. This reverts commit f4f1964a7a2922f3253484852b76602af5f31a89. --- .../linux/linux-yocto-rt_5.15.bb | 6 ++--- .../linux/linux-yocto-tiny_5.15.bb | 6 ++--- meta/recipes-kernel/linux/linux-yocto_5.15.bb | 24 +++++++++---------- 3 files changed, 18 insertions(+), 18 deletions(-) diff --git a/meta/recipes-kernel/linux/linux-yocto-rt_5.15.bb b/meta/recipes-kernel/linux/linux-yocto-rt_5.15.bb index e64f21b2f0..1e61698222 100644 --- a/meta/recipes-kernel/linux/linux-yocto-rt_5.15.bb +++ b/meta/recipes-kernel/linux/linux-yocto-rt_5.15.bb @@ -11,13 +11,13 @@ python () { raise bb.parse.SkipRecipe("Set PREFERRED_PROVIDER_virtual/kernel to linux-yocto-rt to enable it") } -SRCREV_machine ?= "7168cfa2ce6492db31163393808806b6f48af5e8" -SRCREV_meta ?= "487de687c6a4553f11d67b83d01f16f79449ee49" +SRCREV_machine ?= "daa620f017a02ae381f1e54be7ceb8a2f3e3caee" +SRCREV_meta ?= "be429ba6790683eae6d1c34d527af29890988c25" SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;branch=${KBRANCH};name=machine \ git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-5.15;destsuffix=${KMETA}" -LINUX_VERSION ?= "5.15.147" +LINUX_VERSION ?= "5.15.146" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" diff --git a/meta/recipes-kernel/linux/linux-yocto-tiny_5.15.bb b/meta/recipes-kernel/linux/linux-yocto-tiny_5.15.bb index 38bea23264..c7c4e09bd9 100644 --- a/meta/recipes-kernel/linux/linux-yocto-tiny_5.15.bb +++ b/meta/recipes-kernel/linux/linux-yocto-tiny_5.15.bb @@ -5,7 +5,7 @@ KCONFIG_MODE = "--allnoconfig" require recipes-kernel/linux/linux-yocto.inc -LINUX_VERSION ?= "5.15.147" +LINUX_VERSION ?= "5.15.146" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}" @@ -14,8 +14,8 @@ DEPENDS += "openssl-native util-linux-native" KMETA = "kernel-meta" KCONF_BSP_AUDIT_LEVEL = "2" -SRCREV_machine ?= "641e2136a155ce3179c84b9365a5998c1354fdd0" -SRCREV_meta ?= "487de687c6a4553f11d67b83d01f16f79449ee49" +SRCREV_machine ?= "aade2fc343af128889d6c6f1071ec1a8e9a548a8" +SRCREV_meta ?= "be429ba6790683eae6d1c34d527af29890988c25" PV = "${LINUX_VERSION}+git${SRCPV}" diff --git a/meta/recipes-kernel/linux/linux-yocto_5.15.bb b/meta/recipes-kernel/linux/linux-yocto_5.15.bb index 1acd7b62cd..ef8c18b1b2 100644 --- a/meta/recipes-kernel/linux/linux-yocto_5.15.bb +++ b/meta/recipes-kernel/linux/linux-yocto_5.15.bb @@ -14,17 +14,17 @@ KBRANCH:qemux86 ?= "v5.15/standard/base" KBRANCH:qemux86-64 ?= "v5.15/standard/base" KBRANCH:qemumips64 ?= "v5.15/standard/mti-malta64" -SRCREV_machine:qemuarm ?= "82f8a25a3894c10d1cf26914b8e51726351ba11e" -SRCREV_machine:qemuarm64 ?= "cf955e443d881e296b83940143fd30ea83fcf222" -SRCREV_machine:qemumips ?= "1c3babd3b42768e24c797edfc3f67906aca6d072" -SRCREV_machine:qemuppc ?= "b08998787bece69376578b049cab073d8b80e872" -SRCREV_machine:qemuriscv64 ?= "5822f13dba3b1f460536d873aea707f4b25840cf" -SRCREV_machine:qemuriscv32 ?= "5822f13dba3b1f460536d873aea707f4b25840cf" -SRCREV_machine:qemux86 ?= "5822f13dba3b1f460536d873aea707f4b25840cf" -SRCREV_machine:qemux86-64 ?= "5822f13dba3b1f460536d873aea707f4b25840cf" -SRCREV_machine:qemumips64 ?= "4ff2c0496c0160a96185a080ec9678c63b68bd47" -SRCREV_machine ?= "5822f13dba3b1f460536d873aea707f4b25840cf" -SRCREV_meta ?= "487de687c6a4553f11d67b83d01f16f79449ee49" +SRCREV_machine:qemuarm ?= "f59d00a628c3ddb39052284a4a7bd54f9ee12999" +SRCREV_machine:qemuarm64 ?= "8b10556d4fd67dec1a16252ef0d3058dfe31dff5" +SRCREV_machine:qemumips ?= "b0c8aefa7811fd3b7cebb25c1565f73523c7b2ac" +SRCREV_machine:qemuppc ?= "0ebd785a8436934e3f3e6dea6506de7f7ed9947e" +SRCREV_machine:qemuriscv64 ?= "ea4d6bb2c229f41b49dc8a8a9cdcd6d7e55dc46f" +SRCREV_machine:qemuriscv32 ?= "ea4d6bb2c229f41b49dc8a8a9cdcd6d7e55dc46f" +SRCREV_machine:qemux86 ?= "ea4d6bb2c229f41b49dc8a8a9cdcd6d7e55dc46f" +SRCREV_machine:qemux86-64 ?= "ea4d6bb2c229f41b49dc8a8a9cdcd6d7e55dc46f" +SRCREV_machine:qemumips64 ?= "187d249255a797c470b0680f28e18a17a05c3bb4" +SRCREV_machine ?= "ea4d6bb2c229f41b49dc8a8a9cdcd6d7e55dc46f" +SRCREV_meta ?= "be429ba6790683eae6d1c34d527af29890988c25" # set your preferred provider of linux-yocto to 'linux-yocto-upstream', and you'll # get the /base branch, which is pure upstream -stable, and the same @@ -39,7 +39,7 @@ SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;name=machine;branch=${KBRA git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-5.15;destsuffix=${KMETA}" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" -LINUX_VERSION ?= "5.15.147" +LINUX_VERSION ?= "5.15.146" DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}" DEPENDS += "openssl-native util-linux-native" From patchwork Thu Mar 7 23:37:17 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 40685 X-Patchwork-Delegate: steve@sakoman.com Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 348A5C54E5C for ; Thu, 7 Mar 2024 23:37:43 +0000 (UTC) Received: from mail-pl1-f169.google.com (mail-pl1-f169.google.com [209.85.214.169]) by mx.groups.io with SMTP id smtpd.web11.8650.1709854660736034779 for ; Thu, 07 Mar 2024 15:37:40 -0800 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20230601.gappssmtp.com header.s=20230601 header.b=X5yG3OQ7; spf=softfail (domain: sakoman.com, ip: 209.85.214.169, mailfrom: steve@sakoman.com) Received: by mail-pl1-f169.google.com with SMTP id d9443c01a7336-1dd0d46ecc3so11624775ad.2 for ; Thu, 07 Mar 2024 15:37:40 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20230601.gappssmtp.com; s=20230601; t=1709854660; x=1710459460; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=yxgAcm+U20P1c9gSl04H0bSsA4UrALAVTnympCGAJHk=; b=X5yG3OQ74gbWj7/bs4XZfvFCOXCuxIAM/lQ6Z1TPfX2yZOGT5oINSg27sEzD4tAqIj 8dZTrWp8xWFXMrH2i+Nz/Yzj2IRaY6D477bAAhQyiipDMCODMFRD0sm/Dx+91GdWcyx9 cUapy41DMI0fsevkfOKRuioPXoDm843M8FsrTl3QL9mKrqJcx+9tja3XjqBATgXVcMxc hq8r6nIwSYNhYga09nAW6iR8DKoipQg6Udg9lrsYKa+io4raBA/Kb3gNWP9FoHJ1iKBE IflljT3nLP+zlWeGHDt08niAF3PeYIvuRMAfCmrgNiSO3ymIYE4LT0eNFXTYBJTD6+I8 36dA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1709854660; x=1710459460; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=yxgAcm+U20P1c9gSl04H0bSsA4UrALAVTnympCGAJHk=; b=NcO1SdOIfGa4gghsQwkZXApMGlzwZ3SbKDQnrQG4tXP5tLWkzFZVFRNgawbD9s/bCm aXuRA+/gS5r0nTO7TnbrMYLYTATeEZH0ZF8r5cys6jGSG0eIMpSCAHO2XiMvgTHkJacl Nfq8ilPe8l7Zi0u+whb6uRBSu3bmKkM61Cz5+mch/tuJEd880lpOR/vVVmpISA3flJKA btj21O1tA52Jd57Yhy+J8tZiyxdNtWRpCxpL7Wei8/lUVb+tVJTMEbiW9Gdd330u3HU8 wmZRdleRDGW0jvhmR599cYr6vFKTxk+Dvuc5e98jr5kVcCRJvpRFfjqdCxK991JR4Res abKA== X-Gm-Message-State: AOJu0YyKqS13B78mLMmIZas2fPBLMTmGRL6wR33NXry+8y57Q2Z4A+tX LrGyl0+0up4kV9rvGHhYBCKMy6jntjrXBRE5TC7V4iWdO7AWd5fFX6/wSAgZ+RqaQMOiOxp+x17 SgSk= X-Google-Smtp-Source: AGHT+IFTANfrK/e0K2cN6MWcq2erSGWEkYqtAFWuzc1w2MUXONTxPvuVYw3znRYGSpsiPTCYt1k2sg== X-Received: by 2002:a17:902:8608:b0:1dd:39:d651 with SMTP id f8-20020a170902860800b001dd0039d651mr9724201plo.69.1709854659887; Thu, 07 Mar 2024 15:37:39 -0800 (PST) Received: from hexa.lan (dhcp-72-234-108-41.hawaiiantel.net. [72.234.108.41]) by smtp.gmail.com with ESMTPSA id h18-20020a170902f7d200b001dd526ff7d2sm1933243plw.308.2024.03.07.15.37.38 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 07 Mar 2024 15:37:39 -0800 (PST) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][kirkstone 5/9] Revert "linux-yocto/5.15: update CVE exclusions" Date: Thu, 7 Mar 2024 13:37:17 -1000 Message-Id: X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 07 Mar 2024 23:37:43 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/196832 This series is causing issues with adding and resizing partitions. This reverts commit 22b1db5362e18ee6c2a90049facc72c3554542dd. --- .../linux/cve-exclusion_5.15.inc | 259 +++--------------- 1 file changed, 36 insertions(+), 223 deletions(-) diff --git a/meta/recipes-kernel/linux/cve-exclusion_5.15.inc b/meta/recipes-kernel/linux/cve-exclusion_5.15.inc index 84d0becb8d..7822040782 100644 --- a/meta/recipes-kernel/linux/cve-exclusion_5.15.inc +++ b/meta/recipes-kernel/linux/cve-exclusion_5.15.inc @@ -1,9 +1,9 @@ # Auto-generated CVE metadata, DO NOT EDIT BY HAND. -# Generated at 2024-01-11 21:16:55.956074 for version 5.15.146 +# Generated at 2023-09-23 10:40:51.641475 for version 5.15.124 python check_kernel_cve_status_version() { - this_version = "5.15.146" + this_version = "5.15.124" kernel_version = d.getVar("LINUX_VERSION") if kernel_version != this_version: bb.warn("Kernel CVE status needs updating: generated for %s but kernel is %s" % (this_version, kernel_version)) @@ -4839,8 +4839,7 @@ CVE_CHECK_IGNORE += "CVE-2020-27194" # fixed-version: Fixed after version 5.6rc4 CVE_CHECK_IGNORE += "CVE-2020-2732" -# fixed-version: Fixed after version 5.6rc5 -CVE_CHECK_IGNORE += "CVE-2020-27418" +# CVE-2020-27418 has no known resolution # fixed-version: Fixed after version 5.10rc1 CVE_CHECK_IGNORE += "CVE-2020-27673" @@ -4982,9 +4981,6 @@ CVE_CHECK_IGNORE += "CVE-2020-36691" # fixed-version: Fixed after version 5.10 CVE_CHECK_IGNORE += "CVE-2020-36694" -# fixed-version: Fixed after version 5.9rc1 -CVE_CHECK_IGNORE += "CVE-2020-36766" - # fixed-version: Fixed after version 5.12rc1 CVE_CHECK_IGNORE += "CVE-2020-3702" @@ -6454,8 +6450,7 @@ CVE_CHECK_IGNORE += "CVE-2022-40768" # cpe-stable-backport: Backported in 5.15.66 CVE_CHECK_IGNORE += "CVE-2022-4095" -# cpe-stable-backport: Backported in 5.15.125 -CVE_CHECK_IGNORE += "CVE-2022-40982" +# CVE-2022-40982 needs backporting (fixed from 5.15.125) # cpe-stable-backport: Backported in 5.15.87 CVE_CHECK_IGNORE += "CVE-2022-41218" @@ -6541,7 +6536,7 @@ CVE_CHECK_IGNORE += "CVE-2022-43945" # CVE-2022-44033 needs backporting (fixed from 6.4rc1) -# CVE-2022-44034 needs backporting (fixed from 6.4rc1) +# CVE-2022-44034 has no known resolution # CVE-2022-4543 has no known resolution @@ -6596,8 +6591,7 @@ CVE_CHECK_IGNORE += "CVE-2022-47938" # cpe-stable-backport: Backported in 5.15.61 CVE_CHECK_IGNORE += "CVE-2022-47939" -# cpe-stable-backport: Backported in 5.15.145 -CVE_CHECK_IGNORE += "CVE-2022-47940" +# CVE-2022-47940 needs backporting (fixed from 5.19rc1) # cpe-stable-backport: Backported in 5.15.61 CVE_CHECK_IGNORE += "CVE-2022-47941" @@ -6714,11 +6708,9 @@ CVE_CHECK_IGNORE += "CVE-2023-1118" # cpe-stable-backport: Backported in 5.15.113 CVE_CHECK_IGNORE += "CVE-2023-1192" -# cpe-stable-backport: Backported in 5.15.145 -CVE_CHECK_IGNORE += "CVE-2023-1193" +# CVE-2023-1193 has no known resolution -# cpe-stable-backport: Backported in 5.15.145 -CVE_CHECK_IGNORE += "CVE-2023-1194" +# CVE-2023-1194 has no known resolution # fixed-version: only affects 5.16rc1 onwards CVE_CHECK_IGNORE += "CVE-2023-1195" @@ -6805,11 +6797,9 @@ CVE_CHECK_IGNORE += "CVE-2023-2008" # cpe-stable-backport: Backported in 5.15.61 CVE_CHECK_IGNORE += "CVE-2023-2019" -# cpe-stable-backport: Backported in 5.15.125 -CVE_CHECK_IGNORE += "CVE-2023-20569" +# CVE-2023-20569 needs backporting (fixed from 5.15.125) -# cpe-stable-backport: Backported in 5.15.126 -CVE_CHECK_IGNORE += "CVE-2023-20588" +# CVE-2023-20588 needs backporting (fixed from 5.15.126) # cpe-stable-backport: Backported in 5.15.122 CVE_CHECK_IGNORE += "CVE-2023-20593" @@ -6932,8 +6922,7 @@ CVE_CHECK_IGNORE += "CVE-2023-25012" # cpe-stable-backport: Backported in 5.15.61 CVE_CHECK_IGNORE += "CVE-2023-2513" -# cpe-stable-backport: Backported in 5.15.144 -CVE_CHECK_IGNORE += "CVE-2023-25775" +# CVE-2023-25775 needs backporting (fixed from 6.6rc1) # fixed-version: only affects 6.3rc1 onwards CVE_CHECK_IGNORE += "CVE-2023-2598" @@ -7014,8 +7003,7 @@ CVE_CHECK_IGNORE += "CVE-2023-3106" # CVE-2023-31084 needs backporting (fixed from 6.4rc3) -# cpe-stable-backport: Backported in 5.15.135 -CVE_CHECK_IGNORE += "CVE-2023-31085" +# CVE-2023-31085 has no known resolution # cpe-stable-backport: Backported in 5.15.63 CVE_CHECK_IGNORE += "CVE-2023-3111" @@ -7047,26 +7035,20 @@ CVE_CHECK_IGNORE += "CVE-2023-3220" # cpe-stable-backport: Backported in 5.15.111 CVE_CHECK_IGNORE += "CVE-2023-32233" -# cpe-stable-backport: Backported in 5.15.145 -CVE_CHECK_IGNORE += "CVE-2023-32247" +# CVE-2023-32247 needs backporting (fixed from 6.4rc1) # cpe-stable-backport: Backported in 5.15.111 CVE_CHECK_IGNORE += "CVE-2023-32248" -# cpe-stable-backport: Backported in 5.15.145 -CVE_CHECK_IGNORE += "CVE-2023-32250" +# CVE-2023-32250 needs backporting (fixed from 6.4rc1) -# cpe-stable-backport: Backported in 5.15.145 -CVE_CHECK_IGNORE += "CVE-2023-32252" +# CVE-2023-32252 needs backporting (fixed from 6.4rc1) -# cpe-stable-backport: Backported in 5.15.145 -CVE_CHECK_IGNORE += "CVE-2023-32254" +# CVE-2023-32254 needs backporting (fixed from 6.4rc1) -# cpe-stable-backport: Backported in 5.15.145 -CVE_CHECK_IGNORE += "CVE-2023-32257" +# CVE-2023-32257 needs backporting (fixed from 6.4rc1) -# cpe-stable-backport: Backported in 5.15.145 -CVE_CHECK_IGNORE += "CVE-2023-32258" +# CVE-2023-32258 needs backporting (fixed from 6.4rc1) # cpe-stable-backport: Backported in 5.15.93 CVE_CHECK_IGNORE += "CVE-2023-32269" @@ -7131,9 +7113,6 @@ CVE_CHECK_IGNORE += "CVE-2023-34256" # fixed-version: only affects 6.1 onwards CVE_CHECK_IGNORE += "CVE-2023-34319" -# cpe-stable-backport: Backported in 5.15.135 -CVE_CHECK_IGNORE += "CVE-2023-34324" - # CVE-2023-3439 needs backporting (fixed from 5.18rc5) # cpe-stable-backport: Backported in 5.15.121 @@ -7156,8 +7135,7 @@ CVE_CHECK_IGNORE += "CVE-2023-35824" # fixed-version: only affects 5.18rc1 onwards CVE_CHECK_IGNORE += "CVE-2023-35826" -# cpe-stable-backport: Backported in 5.15.136 -CVE_CHECK_IGNORE += "CVE-2023-35827" +# CVE-2023-35827 has no known resolution # cpe-stable-backport: Backported in 5.15.111 CVE_CHECK_IGNORE += "CVE-2023-35828" @@ -7181,8 +7159,7 @@ CVE_CHECK_IGNORE += "CVE-2023-37453" # CVE-2023-37454 has no known resolution -# cpe-stable-backport: Backported in 5.15.128 -CVE_CHECK_IGNORE += "CVE-2023-3772" +# CVE-2023-3772 needs backporting (fixed from 5.15.128) # fixed-version: only affects 5.17rc1 onwards CVE_CHECK_IGNORE += "CVE-2023-3773" @@ -7202,8 +7179,7 @@ CVE_CHECK_IGNORE += "CVE-2023-38409" # cpe-stable-backport: Backported in 5.15.113 CVE_CHECK_IGNORE += "CVE-2023-38426" -# cpe-stable-backport: Backported in 5.15.145 -CVE_CHECK_IGNORE += "CVE-2023-38427" +# CVE-2023-38427 needs backporting (fixed from 6.4rc6) # cpe-stable-backport: Backported in 5.15.113 CVE_CHECK_IGNORE += "CVE-2023-38428" @@ -7211,11 +7187,9 @@ CVE_CHECK_IGNORE += "CVE-2023-38428" # cpe-stable-backport: Backported in 5.15.113 CVE_CHECK_IGNORE += "CVE-2023-38429" -# cpe-stable-backport: Backported in 5.15.145 -CVE_CHECK_IGNORE += "CVE-2023-38430" +# CVE-2023-38430 needs backporting (fixed from 6.4rc6) -# cpe-stable-backport: Backported in 5.15.145 -CVE_CHECK_IGNORE += "CVE-2023-38431" +# CVE-2023-38431 needs backporting (fixed from 6.4rc6) # cpe-stable-backport: Backported in 5.15.121 CVE_CHECK_IGNORE += "CVE-2023-38432" @@ -7229,29 +7203,7 @@ CVE_CHECK_IGNORE += "CVE-2023-3865" # cpe-stable-backport: Backported in 5.15.121 CVE_CHECK_IGNORE += "CVE-2023-3866" -# cpe-stable-backport: Backported in 5.15.145 -CVE_CHECK_IGNORE += "CVE-2023-3867" - -# cpe-stable-backport: Backported in 5.15.132 -CVE_CHECK_IGNORE += "CVE-2023-39189" - -# fixed-version: only affects 5.19rc1 onwards -CVE_CHECK_IGNORE += "CVE-2023-39191" - -# cpe-stable-backport: Backported in 5.15.132 -CVE_CHECK_IGNORE += "CVE-2023-39192" - -# cpe-stable-backport: Backported in 5.15.132 -CVE_CHECK_IGNORE += "CVE-2023-39193" - -# cpe-stable-backport: Backported in 5.15.128 -CVE_CHECK_IGNORE += "CVE-2023-39194" - -# cpe-stable-backport: Backported in 5.15.121 -CVE_CHECK_IGNORE += "CVE-2023-39197" - -# cpe-stable-backport: Backported in 5.15.128 -CVE_CHECK_IGNORE += "CVE-2023-39198" +# CVE-2023-3867 needs backporting (fixed from 6.5rc1) # cpe-stable-backport: Backported in 5.15.123 CVE_CHECK_IGNORE += "CVE-2023-4004" @@ -7261,14 +7213,9 @@ CVE_CHECK_IGNORE += "CVE-2023-4004" # cpe-stable-backport: Backported in 5.15.124 CVE_CHECK_IGNORE += "CVE-2023-4015" -# cpe-stable-backport: Backported in 5.15.126 -CVE_CHECK_IGNORE += "CVE-2023-40283" +# CVE-2023-40283 needs backporting (fixed from 5.15.126) -# fixed-version: only affects 6.3rc1 onwards -CVE_CHECK_IGNORE += "CVE-2023-40791" - -# cpe-stable-backport: Backported in 5.15.126 -CVE_CHECK_IGNORE += "CVE-2023-4128" +# CVE-2023-4128 needs backporting (fixed from 5.15.126) # cpe-stable-backport: Backported in 5.15.121 CVE_CHECK_IGNORE += "CVE-2023-4132" @@ -7285,35 +7232,15 @@ CVE_CHECK_IGNORE += "CVE-2023-4147" # fixed-version: only affects 6.3rc1 onwards CVE_CHECK_IGNORE += "CVE-2023-4194" -# cpe-stable-backport: Backported in 5.15.126 -CVE_CHECK_IGNORE += "CVE-2023-4206" - -# cpe-stable-backport: Backported in 5.15.126 -CVE_CHECK_IGNORE += "CVE-2023-4207" - -# cpe-stable-backport: Backported in 5.15.126 -CVE_CHECK_IGNORE += "CVE-2023-4208" +# CVE-2023-4206 needs backporting (fixed from 5.15.126) -# cpe-stable-backport: Backported in 5.15.134 -CVE_CHECK_IGNORE += "CVE-2023-4244" +# CVE-2023-4207 needs backporting (fixed from 5.15.126) -# cpe-stable-backport: Backported in 5.15.128 -CVE_CHECK_IGNORE += "CVE-2023-4273" +# CVE-2023-4208 needs backporting (fixed from 5.15.126) -# cpe-stable-backport: Backported in 5.15.132 -CVE_CHECK_IGNORE += "CVE-2023-42752" +# CVE-2023-4244 needs backporting (fixed from 6.5rc7) -# cpe-stable-backport: Backported in 5.15.132 -CVE_CHECK_IGNORE += "CVE-2023-42753" - -# cpe-stable-backport: Backported in 5.15.134 -CVE_CHECK_IGNORE += "CVE-2023-42754" - -# cpe-stable-backport: Backported in 5.15.133 -CVE_CHECK_IGNORE += "CVE-2023-42755" - -# fixed-version: only affects 6.4rc6 onwards -CVE_CHECK_IGNORE += "CVE-2023-42756" +# CVE-2023-4273 needs backporting (fixed from 5.15.128) # cpe-stable-backport: Backported in 5.15.46 CVE_CHECK_IGNORE += "CVE-2023-4385" @@ -7327,135 +7254,21 @@ CVE_CHECK_IGNORE += "CVE-2023-4389" # fixed-version: only affects 5.16rc1 onwards CVE_CHECK_IGNORE += "CVE-2023-4394" -# cpe-stable-backport: Backported in 5.15.121 -CVE_CHECK_IGNORE += "CVE-2023-44466" - # cpe-stable-backport: Backported in 5.15.42 CVE_CHECK_IGNORE += "CVE-2023-4459" -# cpe-stable-backport: Backported in 5.15.134 -CVE_CHECK_IGNORE += "CVE-2023-4563" +# CVE-2023-4563 needs backporting (fixed from 6.5rc6) -# cpe-stable-backport: Backported in 5.15.128 -CVE_CHECK_IGNORE += "CVE-2023-4569" - -# cpe-stable-backport: Backported in 5.15.100 -CVE_CHECK_IGNORE += "CVE-2023-45862" - -# cpe-stable-backport: Backported in 5.15.99 -CVE_CHECK_IGNORE += "CVE-2023-45863" - -# cpe-stable-backport: Backported in 5.15.132 -CVE_CHECK_IGNORE += "CVE-2023-45871" - -# fixed-version: only affects 6.5rc1 onwards -CVE_CHECK_IGNORE += "CVE-2023-45898" - -# CVE-2023-4610 needs backporting (fixed from 6.4) +# CVE-2023-4569 needs backporting (fixed from 5.15.128) # fixed-version: only affects 6.4rc1 onwards CVE_CHECK_IGNORE += "CVE-2023-4611" # CVE-2023-4622 needs backporting (fixed from 6.5rc1) -# cpe-stable-backport: Backported in 5.15.132 -CVE_CHECK_IGNORE += "CVE-2023-4623" - -# cpe-stable-backport: Backported in 5.15.137 -CVE_CHECK_IGNORE += "CVE-2023-46813" - -# cpe-stable-backport: Backported in 5.15.140 -CVE_CHECK_IGNORE += "CVE-2023-46862" - -# CVE-2023-47233 has no known resolution - -# fixed-version: Fixed after version 5.14rc1 -CVE_CHECK_IGNORE += "CVE-2023-4732" - -# cpe-stable-backport: Backported in 5.15.132 -CVE_CHECK_IGNORE += "CVE-2023-4881" - -# cpe-stable-backport: Backported in 5.15.132 -CVE_CHECK_IGNORE += "CVE-2023-4921" - -# CVE-2023-50431 has no known resolution - -# fixed-version: only affects 6.0rc1 onwards -CVE_CHECK_IGNORE += "CVE-2023-5090" - -# cpe-stable-backport: Backported in 5.15.135 -CVE_CHECK_IGNORE += "CVE-2023-5158" - -# CVE-2023-51779 needs backporting (fixed from 6.7rc7) - -# cpe-stable-backport: Backported in 5.15.137 -CVE_CHECK_IGNORE += "CVE-2023-5178" - -# cpe-stable-backport: Backported in 5.15.144 -CVE_CHECK_IGNORE += "CVE-2023-51780" - -# cpe-stable-backport: Backported in 5.15.144 -CVE_CHECK_IGNORE += "CVE-2023-51781" - -# cpe-stable-backport: Backported in 5.15.144 -CVE_CHECK_IGNORE += "CVE-2023-51782" - -# cpe-stable-backport: Backported in 5.15.134 -CVE_CHECK_IGNORE += "CVE-2023-5197" - -# fixed-version: only affects 6.1rc1 onwards -CVE_CHECK_IGNORE += "CVE-2023-5345" - -# fixed-version: only affects 6.2 onwards -CVE_CHECK_IGNORE += "CVE-2023-5633" - -# cpe-stable-backport: Backported in 5.15.137 -CVE_CHECK_IGNORE += "CVE-2023-5717" - -# fixed-version: only affects 6.2rc1 onwards -CVE_CHECK_IGNORE += "CVE-2023-5972" - -# CVE-2023-6039 needs backporting (fixed from 6.5rc5) - -# fixed-version: only affects 6.6rc3 onwards -CVE_CHECK_IGNORE += "CVE-2023-6111" - -# cpe-stable-backport: Backported in 5.15.141 -CVE_CHECK_IGNORE += "CVE-2023-6121" - -# cpe-stable-backport: Backported in 5.15.132 -CVE_CHECK_IGNORE += "CVE-2023-6176" - -# CVE-2023-6238 has no known resolution - -# CVE-2023-6356 has no known resolution - -# CVE-2023-6535 has no known resolution - -# CVE-2023-6536 has no known resolution - -# cpe-stable-backport: Backported in 5.15.128 -CVE_CHECK_IGNORE += "CVE-2023-6546" - -# CVE-2023-6560 needs backporting (fixed from 6.7rc4) - -# CVE-2023-6606 needs backporting (fixed from 6.7rc7) - -# CVE-2023-6610 needs backporting (fixed from 6.7rc7) - -# cpe-stable-backport: Backported in 5.15.143 -CVE_CHECK_IGNORE += "CVE-2023-6622" - -# CVE-2023-6679 needs backporting (fixed from 6.7rc6) - -# cpe-stable-backport: Backported in 5.15.143 -CVE_CHECK_IGNORE += "CVE-2023-6817" - -# cpe-stable-backport: Backported in 5.15.143 -CVE_CHECK_IGNORE += "CVE-2023-6931" +# CVE-2023-4623 needs backporting (fixed from 6.6rc1) -# cpe-stable-backport: Backported in 5.15.142 -CVE_CHECK_IGNORE += "CVE-2023-6932" +# CVE-2023-4881 needs backporting (fixed from 6.6rc1) -# CVE-2023-7042 has no known resolution +# CVE-2023-4921 needs backporting (fixed from 6.6rc1) From patchwork Thu Mar 7 23:37:18 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 40683 X-Patchwork-Delegate: steve@sakoman.com Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 4AF66C54E5E for ; Thu, 7 Mar 2024 23:37:43 +0000 (UTC) Received: from mail-pl1-f176.google.com (mail-pl1-f176.google.com [209.85.214.176]) by mx.groups.io with SMTP id smtpd.web11.8651.1709854662267295067 for ; Thu, 07 Mar 2024 15:37:42 -0800 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20230601.gappssmtp.com header.s=20230601 header.b=1q9ccCiw; spf=softfail (domain: sakoman.com, ip: 209.85.214.176, mailfrom: steve@sakoman.com) Received: by mail-pl1-f176.google.com with SMTP id d9443c01a7336-1dd0d46ecc3so11624935ad.2 for ; Thu, 07 Mar 2024 15:37:42 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20230601.gappssmtp.com; s=20230601; t=1709854661; x=1710459461; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=NVpn6u1B0CQnaFBkCc6KUWt1ZjSvG3WU2hGfSyDHGjw=; b=1q9ccCiwSwez+Xjfe4aLvOtuCwYhOvDZWp/aniXn0LAJYumDAab/h4Gckr+Wwv73Cx /pOXEmJU6o5a1lGw+JowHxwcllEEiCzXZJdHBabeREX9qI8SfzhsA/OjLUlNfHXUNPbV GanRfyr+aUkDQMxKJjhtBssfP/OW4oPMGuYWmClXPd1WCoBcZ66yySb2ly0qRZQQ19zV ElavfUlrTqTnZjKBXTGPSgtMqPVtoxghl/YwzEmNOm6O9Watdyf/V8ITQtCeBiHkW02O Ca/Yydi4tcw8gmt7foCeIuFJ8GwCRwalKMF2N324oiCNMaai+NXQ6F1JGWXRqV1ere+p /Zeg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1709854661; x=1710459461; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=NVpn6u1B0CQnaFBkCc6KUWt1ZjSvG3WU2hGfSyDHGjw=; b=NPsmr1WJIuY+IqJdVy3mzI6fyE6KDH351KkVZ+6zsI5pLaWHlNb2l2BWqHZuouiZBB 5GiXY85i3sbux80moZzNmI7oTbReYEcGUuFUwWUb47A1eykSJzzoc+aRCZIXQ3TXwljS pASU3aP4mAzggVhYB09VeDCmU9mFLPsSSU5pBw5D9Mu5os7ZhSjMcHAcC+qhAaUukd6e FeQDwz4W2EFBre9rxsHFR3bD6JNh3R/tK2i1UeFb2B3ZOtkRaSCbzGEbpB05qPxhR9Wp 6SxLD7aFWYL2dTG89lf24R7rhRHgQlphPHsVCaEHXVfo0BnTQRY/jJeJjJvN3H7NTNY3 hWYQ== X-Gm-Message-State: AOJu0YxVzPX/nd0SRBjFp4UZm+rryQ+ekdagdQtcuX64hdCzWtRoQShK IFrazcIn/3i/Et+uqaMW7dHf9UNcY7VYLtcbs7Za+x1HSgIFDxusiBHLFALhrB4Y2fAZVz+N/6S MoaA= X-Google-Smtp-Source: AGHT+IHZWFJoS3Do/o4iX7JBQ0UshDNqV4Lzl+CAp6mAwqV/RWkRWCG5e8gX+qHkX5mCG/dp/shwkQ== X-Received: by 2002:a17:902:a582:b0:1db:e7a7:63f4 with SMTP id az2-20020a170902a58200b001dbe7a763f4mr9507730plb.19.1709854661563; Thu, 07 Mar 2024 15:37:41 -0800 (PST) Received: from hexa.lan (dhcp-72-234-108-41.hawaiiantel.net. [72.234.108.41]) by smtp.gmail.com with ESMTPSA id h18-20020a170902f7d200b001dd526ff7d2sm1933243plw.308.2024.03.07.15.37.40 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 07 Mar 2024 15:37:41 -0800 (PST) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][kirkstone 6/9] Revert "linux-yocto/5.15: update to v5.15.146" Date: Thu, 7 Mar 2024 13:37:18 -1000 Message-Id: X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 07 Mar 2024 23:37:43 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/196833 This series is causing issues with adding and resizing partitions. This reverts commit ee4695138e36155c8e0b173f7952372693c0589a. --- .../linux/linux-yocto-rt_5.15.bb | 6 ++--- .../linux/linux-yocto-tiny_5.15.bb | 6 ++--- meta/recipes-kernel/linux/linux-yocto_5.15.bb | 26 +++++++++---------- 3 files changed, 19 insertions(+), 19 deletions(-) diff --git a/meta/recipes-kernel/linux/linux-yocto-rt_5.15.bb b/meta/recipes-kernel/linux/linux-yocto-rt_5.15.bb index 1e61698222..4f02e5acfa 100644 --- a/meta/recipes-kernel/linux/linux-yocto-rt_5.15.bb +++ b/meta/recipes-kernel/linux/linux-yocto-rt_5.15.bb @@ -11,13 +11,13 @@ python () { raise bb.parse.SkipRecipe("Set PREFERRED_PROVIDER_virtual/kernel to linux-yocto-rt to enable it") } -SRCREV_machine ?= "daa620f017a02ae381f1e54be7ceb8a2f3e3caee" -SRCREV_meta ?= "be429ba6790683eae6d1c34d527af29890988c25" +SRCREV_machine ?= "cf2f74df4ffdee7034979616bc37c5717b0d6070" +SRCREV_meta ?= "d3ba5beca1136447584b7af10546fff974c36cc1" SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;branch=${KBRANCH};name=machine \ git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-5.15;destsuffix=${KMETA}" -LINUX_VERSION ?= "5.15.146" +LINUX_VERSION ?= "5.15.145" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" diff --git a/meta/recipes-kernel/linux/linux-yocto-tiny_5.15.bb b/meta/recipes-kernel/linux/linux-yocto-tiny_5.15.bb index c7c4e09bd9..037c33f434 100644 --- a/meta/recipes-kernel/linux/linux-yocto-tiny_5.15.bb +++ b/meta/recipes-kernel/linux/linux-yocto-tiny_5.15.bb @@ -5,7 +5,7 @@ KCONFIG_MODE = "--allnoconfig" require recipes-kernel/linux/linux-yocto.inc -LINUX_VERSION ?= "5.15.146" +LINUX_VERSION ?= "5.15.145" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}" @@ -14,8 +14,8 @@ DEPENDS += "openssl-native util-linux-native" KMETA = "kernel-meta" KCONF_BSP_AUDIT_LEVEL = "2" -SRCREV_machine ?= "aade2fc343af128889d6c6f1071ec1a8e9a548a8" -SRCREV_meta ?= "be429ba6790683eae6d1c34d527af29890988c25" +SRCREV_machine ?= "3b30ca7fb1716cd0f7bbf16c1253d8a4bbdeb421" +SRCREV_meta ?= "d3ba5beca1136447584b7af10546fff974c36cc1" PV = "${LINUX_VERSION}+git${SRCPV}" diff --git a/meta/recipes-kernel/linux/linux-yocto_5.15.bb b/meta/recipes-kernel/linux/linux-yocto_5.15.bb index ef8c18b1b2..0cb559b162 100644 --- a/meta/recipes-kernel/linux/linux-yocto_5.15.bb +++ b/meta/recipes-kernel/linux/linux-yocto_5.15.bb @@ -14,24 +14,24 @@ KBRANCH:qemux86 ?= "v5.15/standard/base" KBRANCH:qemux86-64 ?= "v5.15/standard/base" KBRANCH:qemumips64 ?= "v5.15/standard/mti-malta64" -SRCREV_machine:qemuarm ?= "f59d00a628c3ddb39052284a4a7bd54f9ee12999" -SRCREV_machine:qemuarm64 ?= "8b10556d4fd67dec1a16252ef0d3058dfe31dff5" -SRCREV_machine:qemumips ?= "b0c8aefa7811fd3b7cebb25c1565f73523c7b2ac" -SRCREV_machine:qemuppc ?= "0ebd785a8436934e3f3e6dea6506de7f7ed9947e" -SRCREV_machine:qemuriscv64 ?= "ea4d6bb2c229f41b49dc8a8a9cdcd6d7e55dc46f" -SRCREV_machine:qemuriscv32 ?= "ea4d6bb2c229f41b49dc8a8a9cdcd6d7e55dc46f" -SRCREV_machine:qemux86 ?= "ea4d6bb2c229f41b49dc8a8a9cdcd6d7e55dc46f" -SRCREV_machine:qemux86-64 ?= "ea4d6bb2c229f41b49dc8a8a9cdcd6d7e55dc46f" -SRCREV_machine:qemumips64 ?= "187d249255a797c470b0680f28e18a17a05c3bb4" -SRCREV_machine ?= "ea4d6bb2c229f41b49dc8a8a9cdcd6d7e55dc46f" -SRCREV_meta ?= "be429ba6790683eae6d1c34d527af29890988c25" +SRCREV_machine:qemuarm ?= "5b261b61614c090b787fdadb865c5db3ee0171f4" +SRCREV_machine:qemuarm64 ?= "fdaf870c63fc887b40138cca652ae961c9556a95" +SRCREV_machine:qemumips ?= "8a07b5a788879035d1eea4df0780a40d131cf5d9" +SRCREV_machine:qemuppc ?= "fffda6901d92bf63f7876cb6d912492030995588" +SRCREV_machine:qemuriscv64 ?= "dd7a3940edb28ce99789430818b521c38dec4c6f" +SRCREV_machine:qemuriscv32 ?= "dd7a3940edb28ce99789430818b521c38dec4c6f" +SRCREV_machine:qemux86 ?= "dd7a3940edb28ce99789430818b521c38dec4c6f" +SRCREV_machine:qemux86-64 ?= "dd7a3940edb28ce99789430818b521c38dec4c6f" +SRCREV_machine:qemumips64 ?= "510f5a0a3daaf9f970b610a427f77c52289a2777" +SRCREV_machine ?= "dd7a3940edb28ce99789430818b521c38dec4c6f" +SRCREV_meta ?= "d3ba5beca1136447584b7af10546fff974c36cc1" # set your preferred provider of linux-yocto to 'linux-yocto-upstream', and you'll # get the /base branch, which is pure upstream -stable, and the same # meta SRCREV as the linux-yocto-standard builds. Select your version using the # normal PREFERRED_VERSION settings. BBCLASSEXTEND = "devupstream:target" -SRCREV_machine:class-devupstream ?= "26c690eff0a56293e0b6911a38e406c211b35547" +SRCREV_machine:class-devupstream ?= "d93fa2c78854d25ed4b67ac87f1c3c264d8b27fb" PN:class-devupstream = "linux-yocto-upstream" KBRANCH:class-devupstream = "v5.15/base" @@ -39,7 +39,7 @@ SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;name=machine;branch=${KBRA git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-5.15;destsuffix=${KMETA}" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" -LINUX_VERSION ?= "5.15.146" +LINUX_VERSION ?= "5.15.145" DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}" DEPENDS += "openssl-native util-linux-native" From patchwork Thu Mar 7 23:37:19 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 40686 X-Patchwork-Delegate: steve@sakoman.com Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 472C0C54E4A for ; Thu, 7 Mar 2024 23:37:53 +0000 (UTC) Received: from mail-pl1-f181.google.com (mail-pl1-f181.google.com [209.85.214.181]) by mx.groups.io with SMTP id smtpd.web10.8463.1709854664005919833 for ; Thu, 07 Mar 2024 15:37:44 -0800 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20230601.gappssmtp.com header.s=20230601 header.b=YCYeQtNt; spf=softfail (domain: sakoman.com, ip: 209.85.214.181, mailfrom: steve@sakoman.com) Received: by mail-pl1-f181.google.com with SMTP id d9443c01a7336-1d944e8f367so12774725ad.0 for ; Thu, 07 Mar 2024 15:37:43 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20230601.gappssmtp.com; s=20230601; t=1709854663; x=1710459463; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=dgMmABkllbv9nnld9Xl599kOuyLJHdMTITtxV10sQGk=; b=YCYeQtNtPZrtF3kuiPTEFpJ/rGA9SB/Ilwjt8SYvP+aTbgCZFwwtwlncC32yr9+1Yw qTfmjr47ty3ZebM6yNFJ45mLhXb4kb3YnGH6uXazoJ+p0toA7dmb6CBsLUjkDY3//cJn V7USxo2/6YXLj8Lh7Gda9hcf5Y8IS17Rq6DGMl1NM/pv/ybMxR2XlE2wYnvi9qqNW9hm 5cco+liWAH/NHtlsktCdhP1AqqhCGQbehdkRcLuvzIxms9K3PxLSCI5Kf3mieRnYEXds ZizM2k0bQWJxtRXCJzX7vTmr4xseyDWAuUxLHkKv74qupaFiVJ5J1LYta3X8qhwKaWac 3K0g== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1709854663; x=1710459463; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=dgMmABkllbv9nnld9Xl599kOuyLJHdMTITtxV10sQGk=; b=o1QB9ceLqiWW66NJuYCkQNswTCYq0gP2zIZ4bJpDViBHfUGPF5OofJm1SCqm+rg8n4 Xu2t1+Q2BzScmcdSxGkqt5uxuKHa2hTjBuyPULnwRH0WpsKYAbl+jwt0BjuJkJWS7630 B4mRjnXtDYn7wvihpNdkay6JOQ2Q+H0+jlB3NtGLU1h1RfJxRmz1fRFacmc4Ut18FLkP dMxjKEMICfFSsjFE3Dm9JFzpQtlZwlnM9clEXfhxzeLj9XEuHR5eR4fVbzXwZzKEal5w ibsI2sMhxpnrxp18+xOmkZP0+GprkhCm6c8a3TJQDRFoFcQx5mle0eTmOM5z1REqQpfg pVbw== X-Gm-Message-State: AOJu0YyGpms6QtNIaFUysFesVTPJ1Q+9ulETPcibHyIqDscPX1YtB3Uf B88YHJXNMU7KHaN9F4Is4yGbLq8W9vlHwkDMMDbHlmCR8PUf6mRlGUutATcWuCsKxANvCcU3d7L jQ0U= X-Google-Smtp-Source: AGHT+IEH7BNcKt5ziYkrzMoMkhO4JId+J8Z0/i3te0la/FKQvUCuZZ04A6obnp3gLbz+sinD6HZS2g== X-Received: by 2002:a17:902:684d:b0:1dd:6899:397a with SMTP id f13-20020a170902684d00b001dd6899397amr274242pln.64.1709854663139; Thu, 07 Mar 2024 15:37:43 -0800 (PST) Received: from hexa.lan (dhcp-72-234-108-41.hawaiiantel.net. [72.234.108.41]) by smtp.gmail.com with ESMTPSA id h18-20020a170902f7d200b001dd526ff7d2sm1933243plw.308.2024.03.07.15.37.42 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 07 Mar 2024 15:37:42 -0800 (PST) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][kirkstone 7/9] Revert "linux-yocto/5.15: update to v5.15.145" Date: Thu, 7 Mar 2024 13:37:19 -1000 Message-Id: <8f43a73efedaf1256d5f277d5d066bf11ada74df.1709853987.git.steve@sakoman.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 07 Mar 2024 23:37:53 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/196834 This series is causing issues with adding and resizing partitions. This reverts commit 03794866c1333113c909ef88dc232bcc47a7c459. --- .../linux/linux-yocto-rt_5.15.bb | 6 ++--- .../linux/linux-yocto-tiny_5.15.bb | 6 ++--- meta/recipes-kernel/linux/linux-yocto_5.15.bb | 26 +++++++++---------- 3 files changed, 19 insertions(+), 19 deletions(-) diff --git a/meta/recipes-kernel/linux/linux-yocto-rt_5.15.bb b/meta/recipes-kernel/linux/linux-yocto-rt_5.15.bb index 4f02e5acfa..37fb729e0d 100644 --- a/meta/recipes-kernel/linux/linux-yocto-rt_5.15.bb +++ b/meta/recipes-kernel/linux/linux-yocto-rt_5.15.bb @@ -11,13 +11,13 @@ python () { raise bb.parse.SkipRecipe("Set PREFERRED_PROVIDER_virtual/kernel to linux-yocto-rt to enable it") } -SRCREV_machine ?= "cf2f74df4ffdee7034979616bc37c5717b0d6070" -SRCREV_meta ?= "d3ba5beca1136447584b7af10546fff974c36cc1" +SRCREV_machine ?= "205938506aafa86698f2753a59d2c9f13d080fbb" +SRCREV_meta ?= "9a1e0301f56cda16a9fabd03745dba445f068349" SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;branch=${KBRANCH};name=machine \ git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-5.15;destsuffix=${KMETA}" -LINUX_VERSION ?= "5.15.145" +LINUX_VERSION ?= "5.15.142" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" diff --git a/meta/recipes-kernel/linux/linux-yocto-tiny_5.15.bb b/meta/recipes-kernel/linux/linux-yocto-tiny_5.15.bb index 037c33f434..f502030c9d 100644 --- a/meta/recipes-kernel/linux/linux-yocto-tiny_5.15.bb +++ b/meta/recipes-kernel/linux/linux-yocto-tiny_5.15.bb @@ -5,7 +5,7 @@ KCONFIG_MODE = "--allnoconfig" require recipes-kernel/linux/linux-yocto.inc -LINUX_VERSION ?= "5.15.145" +LINUX_VERSION ?= "5.15.142" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}" @@ -14,8 +14,8 @@ DEPENDS += "openssl-native util-linux-native" KMETA = "kernel-meta" KCONF_BSP_AUDIT_LEVEL = "2" -SRCREV_machine ?= "3b30ca7fb1716cd0f7bbf16c1253d8a4bbdeb421" -SRCREV_meta ?= "d3ba5beca1136447584b7af10546fff974c36cc1" +SRCREV_machine ?= "53b8058476d634a0103dff993e24d15b1fd087c7" +SRCREV_meta ?= "9a1e0301f56cda16a9fabd03745dba445f068349" PV = "${LINUX_VERSION}+git${SRCPV}" diff --git a/meta/recipes-kernel/linux/linux-yocto_5.15.bb b/meta/recipes-kernel/linux/linux-yocto_5.15.bb index 0cb559b162..1021065bf7 100644 --- a/meta/recipes-kernel/linux/linux-yocto_5.15.bb +++ b/meta/recipes-kernel/linux/linux-yocto_5.15.bb @@ -14,24 +14,24 @@ KBRANCH:qemux86 ?= "v5.15/standard/base" KBRANCH:qemux86-64 ?= "v5.15/standard/base" KBRANCH:qemumips64 ?= "v5.15/standard/mti-malta64" -SRCREV_machine:qemuarm ?= "5b261b61614c090b787fdadb865c5db3ee0171f4" -SRCREV_machine:qemuarm64 ?= "fdaf870c63fc887b40138cca652ae961c9556a95" -SRCREV_machine:qemumips ?= "8a07b5a788879035d1eea4df0780a40d131cf5d9" -SRCREV_machine:qemuppc ?= "fffda6901d92bf63f7876cb6d912492030995588" -SRCREV_machine:qemuriscv64 ?= "dd7a3940edb28ce99789430818b521c38dec4c6f" -SRCREV_machine:qemuriscv32 ?= "dd7a3940edb28ce99789430818b521c38dec4c6f" -SRCREV_machine:qemux86 ?= "dd7a3940edb28ce99789430818b521c38dec4c6f" -SRCREV_machine:qemux86-64 ?= "dd7a3940edb28ce99789430818b521c38dec4c6f" -SRCREV_machine:qemumips64 ?= "510f5a0a3daaf9f970b610a427f77c52289a2777" -SRCREV_machine ?= "dd7a3940edb28ce99789430818b521c38dec4c6f" -SRCREV_meta ?= "d3ba5beca1136447584b7af10546fff974c36cc1" +SRCREV_machine:qemuarm ?= "325679bc1a595ca81783f7652e13ce7f2be58620" +SRCREV_machine:qemuarm64 ?= "338f086bcd841a5b0239ddb66c34ca23ff5af2f5" +SRCREV_machine:qemumips ?= "af26192f4dd0fc7396faedd4653034ae02d5ed6d" +SRCREV_machine:qemuppc ?= "be567407d4d9009407c4e7a511e7227fcb36b0b7" +SRCREV_machine:qemuriscv64 ?= "97015a8737f3f284f9a9c4967bf12c8b26efcdcc" +SRCREV_machine:qemuriscv32 ?= "97015a8737f3f284f9a9c4967bf12c8b26efcdcc" +SRCREV_machine:qemux86 ?= "97015a8737f3f284f9a9c4967bf12c8b26efcdcc" +SRCREV_machine:qemux86-64 ?= "97015a8737f3f284f9a9c4967bf12c8b26efcdcc" +SRCREV_machine:qemumips64 ?= "3a2ff5c2f2e6e0c0653da1192081681e2a50b592" +SRCREV_machine ?= "97015a8737f3f284f9a9c4967bf12c8b26efcdcc" +SRCREV_meta ?= "9a1e0301f56cda16a9fabd03745dba445f068349" # set your preferred provider of linux-yocto to 'linux-yocto-upstream', and you'll # get the /base branch, which is pure upstream -stable, and the same # meta SRCREV as the linux-yocto-standard builds. Select your version using the # normal PREFERRED_VERSION settings. BBCLASSEXTEND = "devupstream:target" -SRCREV_machine:class-devupstream ?= "d93fa2c78854d25ed4b67ac87f1c3c264d8b27fb" +SRCREV_machine:class-devupstream ?= "8a1d809b05454b2e08fb3d801787917975fdb037" PN:class-devupstream = "linux-yocto-upstream" KBRANCH:class-devupstream = "v5.15/base" @@ -39,7 +39,7 @@ SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;name=machine;branch=${KBRA git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-5.15;destsuffix=${KMETA}" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" -LINUX_VERSION ?= "5.15.145" +LINUX_VERSION ?= "5.15.142" DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}" DEPENDS += "openssl-native util-linux-native" From patchwork Thu Mar 7 23:37:20 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 40688 X-Patchwork-Delegate: steve@sakoman.com Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 5E89CC54E5C for ; Thu, 7 Mar 2024 23:37:53 +0000 (UTC) Received: from mail-pl1-f171.google.com (mail-pl1-f171.google.com [209.85.214.171]) by mx.groups.io with SMTP id smtpd.web11.8653.1709854665458462427 for ; Thu, 07 Mar 2024 15:37:45 -0800 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20230601.gappssmtp.com header.s=20230601 header.b=yuNk4tgJ; spf=softfail (domain: sakoman.com, ip: 209.85.214.171, mailfrom: steve@sakoman.com) Received: by mail-pl1-f171.google.com with SMTP id d9443c01a7336-1dca3951ad9so11933595ad.3 for ; Thu, 07 Mar 2024 15:37:45 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20230601.gappssmtp.com; s=20230601; t=1709854665; x=1710459465; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=AyOwqaLRSuoQ5CSMlxyHzkhR/zqj26Ke9wY1a7WHgE8=; b=yuNk4tgJUfqKQBCxcNq2wNKDSctW70dfZguh1j4s3KBSOykwxJKA5YtTsu3xgEH6Jw hwn+9nMK9N3x5rMxAYehuJlIeODNbegq0EQWj5n6Jc5bDuaePzCxwvTkibQS3SxRya4a Ia7ZBgawUJJS/JDulfhox2T5CHqJ+xFM+U6fSKEHo7+LnvnImtRuQi55h+6KKBFKcJQH 0cqzM2qASTstc/ZKa6jm43ixRwpWH5w5+uYLbfWug0JORzrKKaaxxjXRY4uqnyViO1jv hF+/3rPmWYU9V4vpS4DHzEIxZGw+qyQEVz5NRlcJ/PUBQXoagmhxIMiIDd3dKD1vLwVl uFBg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1709854665; x=1710459465; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=AyOwqaLRSuoQ5CSMlxyHzkhR/zqj26Ke9wY1a7WHgE8=; b=ikP4TqhnvdIp+oufpAJGLNvZnsoXiKLJJhos2umgqF8/6YeEgvrCzOKSaBuPAE8EKb 1ndbz4QSXQVNWKhW6BwJIZcGiPpzP2pKfLqEoJMdRYQymjlGgViEMq+jV3h+hl+w4blg oOF/9EjVDFvn+ZGfSrJmgJraLVvneLOzu15rSnIMQCqD+R74RNzvHGa2QgnMcWZQXg+D DmlvbkQ0ZAh05fAH0gk5tqKJI6zSc1aPszkipy3d5BZQprURk2DtA900Fx93p+xNhdco uo4Hb2VXF05Bgy9dq9Q0tEZCSQCG+n1bCkO1Ie4aLFocvAF6AxoVSP2VcabCuvD8ZYhH Y6cQ== X-Gm-Message-State: AOJu0Yyv+PKWRYlcChoMNOHydZYz74lJD1x/oIBZpHOTGbyxSG7yOO4h 6WE/qx8sk3mKO7cvWFIs3l27BPIzsOhKtQVSS/g3Uf7/uECc6xnx6gZTmZUAShOHdHHn5NKDfeG 0kOY= X-Google-Smtp-Source: AGHT+IFGzq1uyCRmDuH9AJKcjhWi+CeIBZ9Mot/vKm/W+hyuuM8ZEgYBWoSwPgmM4iW8az7cfauTjQ== X-Received: by 2002:a17:902:e88d:b0:1db:35b5:7e37 with SMTP id w13-20020a170902e88d00b001db35b57e37mr11083399plg.50.1709854664749; Thu, 07 Mar 2024 15:37:44 -0800 (PST) Received: from hexa.lan (dhcp-72-234-108-41.hawaiiantel.net. [72.234.108.41]) by smtp.gmail.com with ESMTPSA id h18-20020a170902f7d200b001dd526ff7d2sm1933243plw.308.2024.03.07.15.37.44 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 07 Mar 2024 15:37:44 -0800 (PST) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][kirkstone 8/9] Revert "linux-yocto/5.15: update to v5.15.142" Date: Thu, 7 Mar 2024 13:37:20 -1000 Message-Id: X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 07 Mar 2024 23:37:53 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/196835 This series is causing issues with adding and resizing partitions. This reverts commit 4deed206f92fc207d18cdb4c8bc35ce1bf0fb0f6. --- .../linux/linux-yocto-rt_5.15.bb | 6 ++--- .../linux/linux-yocto-tiny_5.15.bb | 6 ++--- meta/recipes-kernel/linux/linux-yocto_5.15.bb | 26 +++++++++---------- 3 files changed, 19 insertions(+), 19 deletions(-) diff --git a/meta/recipes-kernel/linux/linux-yocto-rt_5.15.bb b/meta/recipes-kernel/linux/linux-yocto-rt_5.15.bb index 37fb729e0d..f7286759a9 100644 --- a/meta/recipes-kernel/linux/linux-yocto-rt_5.15.bb +++ b/meta/recipes-kernel/linux/linux-yocto-rt_5.15.bb @@ -11,13 +11,13 @@ python () { raise bb.parse.SkipRecipe("Set PREFERRED_PROVIDER_virtual/kernel to linux-yocto-rt to enable it") } -SRCREV_machine ?= "205938506aafa86698f2753a59d2c9f13d080fbb" -SRCREV_meta ?= "9a1e0301f56cda16a9fabd03745dba445f068349" +SRCREV_machine ?= "423b5d5cb3f45a272285fa4157d1964086fabc2e" +SRCREV_meta ?= "92bd0a656f0f9db955fb53c52be71cce9296bdb2" SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;branch=${KBRANCH};name=machine \ git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-5.15;destsuffix=${KMETA}" -LINUX_VERSION ?= "5.15.142" +LINUX_VERSION ?= "5.15.141" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" diff --git a/meta/recipes-kernel/linux/linux-yocto-tiny_5.15.bb b/meta/recipes-kernel/linux/linux-yocto-tiny_5.15.bb index f502030c9d..7461087299 100644 --- a/meta/recipes-kernel/linux/linux-yocto-tiny_5.15.bb +++ b/meta/recipes-kernel/linux/linux-yocto-tiny_5.15.bb @@ -5,7 +5,7 @@ KCONFIG_MODE = "--allnoconfig" require recipes-kernel/linux/linux-yocto.inc -LINUX_VERSION ?= "5.15.142" +LINUX_VERSION ?= "5.15.141" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}" @@ -14,8 +14,8 @@ DEPENDS += "openssl-native util-linux-native" KMETA = "kernel-meta" KCONF_BSP_AUDIT_LEVEL = "2" -SRCREV_machine ?= "53b8058476d634a0103dff993e24d15b1fd087c7" -SRCREV_meta ?= "9a1e0301f56cda16a9fabd03745dba445f068349" +SRCREV_machine ?= "ddf2eeeb31d1edaa5a80e9aabc8b2674ae95f865" +SRCREV_meta ?= "92bd0a656f0f9db955fb53c52be71cce9296bdb2" PV = "${LINUX_VERSION}+git${SRCPV}" diff --git a/meta/recipes-kernel/linux/linux-yocto_5.15.bb b/meta/recipes-kernel/linux/linux-yocto_5.15.bb index 1021065bf7..c7b07dee62 100644 --- a/meta/recipes-kernel/linux/linux-yocto_5.15.bb +++ b/meta/recipes-kernel/linux/linux-yocto_5.15.bb @@ -14,24 +14,24 @@ KBRANCH:qemux86 ?= "v5.15/standard/base" KBRANCH:qemux86-64 ?= "v5.15/standard/base" KBRANCH:qemumips64 ?= "v5.15/standard/mti-malta64" -SRCREV_machine:qemuarm ?= "325679bc1a595ca81783f7652e13ce7f2be58620" -SRCREV_machine:qemuarm64 ?= "338f086bcd841a5b0239ddb66c34ca23ff5af2f5" -SRCREV_machine:qemumips ?= "af26192f4dd0fc7396faedd4653034ae02d5ed6d" -SRCREV_machine:qemuppc ?= "be567407d4d9009407c4e7a511e7227fcb36b0b7" -SRCREV_machine:qemuriscv64 ?= "97015a8737f3f284f9a9c4967bf12c8b26efcdcc" -SRCREV_machine:qemuriscv32 ?= "97015a8737f3f284f9a9c4967bf12c8b26efcdcc" -SRCREV_machine:qemux86 ?= "97015a8737f3f284f9a9c4967bf12c8b26efcdcc" -SRCREV_machine:qemux86-64 ?= "97015a8737f3f284f9a9c4967bf12c8b26efcdcc" -SRCREV_machine:qemumips64 ?= "3a2ff5c2f2e6e0c0653da1192081681e2a50b592" -SRCREV_machine ?= "97015a8737f3f284f9a9c4967bf12c8b26efcdcc" -SRCREV_meta ?= "9a1e0301f56cda16a9fabd03745dba445f068349" +SRCREV_machine:qemuarm ?= "0bd882ff2a47566033965928ab468491f7e1ffd6" +SRCREV_machine:qemuarm64 ?= "d353330a9ba30300be32f1d732723ae3678da684" +SRCREV_machine:qemumips ?= "7f8fbffda634dc22a70f69ff2b762a1f3ff9c842" +SRCREV_machine:qemuppc ?= "fb2191ca96824c7451fbca4eef129660d25711af" +SRCREV_machine:qemuriscv64 ?= "54a3472506956ed41289ae423ca9b7ad4cbb3ab5" +SRCREV_machine:qemuriscv32 ?= "54a3472506956ed41289ae423ca9b7ad4cbb3ab5" +SRCREV_machine:qemux86 ?= "54a3472506956ed41289ae423ca9b7ad4cbb3ab5" +SRCREV_machine:qemux86-64 ?= "54a3472506956ed41289ae423ca9b7ad4cbb3ab5" +SRCREV_machine:qemumips64 ?= "35895af6b529915f9c09a720592554feaca9a2c7" +SRCREV_machine ?= "54a3472506956ed41289ae423ca9b7ad4cbb3ab5" +SRCREV_meta ?= "92bd0a656f0f9db955fb53c52be71cce9296bdb2" # set your preferred provider of linux-yocto to 'linux-yocto-upstream', and you'll # get the /base branch, which is pure upstream -stable, and the same # meta SRCREV as the linux-yocto-standard builds. Select your version using the # normal PREFERRED_VERSION settings. BBCLASSEXTEND = "devupstream:target" -SRCREV_machine:class-devupstream ?= "8a1d809b05454b2e08fb3d801787917975fdb037" +SRCREV_machine:class-devupstream ?= "9b91d36ba301db86bbf9e783169f7f6abf2585d8" PN:class-devupstream = "linux-yocto-upstream" KBRANCH:class-devupstream = "v5.15/base" @@ -39,7 +39,7 @@ SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;name=machine;branch=${KBRA git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-5.15;destsuffix=${KMETA}" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" -LINUX_VERSION ?= "5.15.142" +LINUX_VERSION ?= "5.15.141" DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}" DEPENDS += "openssl-native util-linux-native" From patchwork Thu Mar 7 23:37:21 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 40687 X-Patchwork-Delegate: steve@sakoman.com Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 47287C54798 for ; Thu, 7 Mar 2024 23:37:53 +0000 (UTC) Received: from mail-pl1-f182.google.com (mail-pl1-f182.google.com [209.85.214.182]) by mx.groups.io with SMTP id smtpd.web11.8654.1709854667098357192 for ; Thu, 07 Mar 2024 15:37:47 -0800 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20230601.gappssmtp.com header.s=20230601 header.b=CDNUfWBG; spf=softfail (domain: sakoman.com, ip: 209.85.214.182, mailfrom: steve@sakoman.com) Received: by mail-pl1-f182.google.com with SMTP id d9443c01a7336-1dc3b4b9b62so11000035ad.1 for ; Thu, 07 Mar 2024 15:37:47 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20230601.gappssmtp.com; s=20230601; t=1709854666; x=1710459466; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=mfAgc9kbKrx8Cb1DrqZyRSG0+exmwkGyW9JRzZjJz8E=; b=CDNUfWBGCdqEVhDwHcM9DXH3zDZ88HlkA6k8jXljTp3RjepsMPgBRDO/IhfOS00mkV l3LTFW6Wems+/f79/VWXzEvPB7xfTp1qlhuiD8FDMXHMY/GnPUUtXxvnkH/OGXNpRSMY L5uBZZknHI9pCYz28TNwyNM5eQ0NvBHkAm0RBPjncc3lg7Zu3C/AFknPe4FQ1X3zOhkS HBkbMAN+1/w8OMJcuk/YC8is6kPopxV/AIQGJGyeN6DvWtwLl6z1T52SX/hGpSuY7n7n C7Ynf7kvMoRnTrAOddFdsRRoYOijlq5XtV/QCyFdsyrhWqhiCIPOCyJQFEYs76R6abib 8+3g== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1709854666; x=1710459466; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=mfAgc9kbKrx8Cb1DrqZyRSG0+exmwkGyW9JRzZjJz8E=; b=etledHtenURN2SGBiYnyK68LW4FDQXAns0BUm5lxSVw6uEfCuJhISj4EyyI7sWZDWb lDm7u7G1CLHZ+vhvCTfxX7oGYVUUIcrV1EaWWVrIEJUpbSG0QqQV3yrgBMeeTC/u7qEs 5AWGXPofit34cKzVLxsNbYkq3eWszzQn2Mq+0kvePMWHdGGP+ZDRrAdXTkVmwDa9Wmsg GGWA+rocPgmHZYfchUWIvBgr0b7r9kffW3TvCeSDLs6zpBHSlR2RX/HtVTpLGp8zlriS p2xVgTVlvkh4L+PumospI8jjaRlbRIK95bL7U+prn9qK1S9PcPOKIxGcHu7fN6Tf+z6k Hbew== X-Gm-Message-State: AOJu0YyiX6x+eDcKmPPw+rLh+cT/ilbfHnLvVwuFSR2gxQff4Wv64znt iBzZ6AL0uwHkSdAx/SrRaqxdLHMz8JJ7r9fodCzXUewCcVTthV6lEp5yhLqe4Jm0cE2KR4Hw1vs 8UHY= X-Google-Smtp-Source: AGHT+IErNZdocFYbkFePY1Sy9YdhU/bebeGBdw7A34KTzX4RK9VgZVmXeYMaj5YEpozEO6TycLU+ww== X-Received: by 2002:a17:903:24d:b0:1dc:6073:a3a4 with SMTP id j13-20020a170903024d00b001dc6073a3a4mr4067767plh.3.1709854666338; Thu, 07 Mar 2024 15:37:46 -0800 (PST) Received: from hexa.lan (dhcp-72-234-108-41.hawaiiantel.net. [72.234.108.41]) by smtp.gmail.com with ESMTPSA id h18-20020a170902f7d200b001dd526ff7d2sm1933243plw.308.2024.03.07.15.37.45 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 07 Mar 2024 15:37:46 -0800 (PST) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][kirkstone 9/9] Revert "linux-yocto/5.15: update to v5.15.141" Date: Thu, 7 Mar 2024 13:37:21 -1000 Message-Id: X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 07 Mar 2024 23:37:53 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/196836 This series is causing issues with adding and resizing partitions. This reverts commit 5832eebee3c150a30bd489699ca693240d11beda. --- .../linux/linux-yocto-rt_5.15.bb | 6 ++--- .../linux/linux-yocto-tiny_5.15.bb | 6 ++--- meta/recipes-kernel/linux/linux-yocto_5.15.bb | 26 +++++++++---------- 3 files changed, 19 insertions(+), 19 deletions(-) diff --git a/meta/recipes-kernel/linux/linux-yocto-rt_5.15.bb b/meta/recipes-kernel/linux/linux-yocto-rt_5.15.bb index f7286759a9..6ac3118f81 100644 --- a/meta/recipes-kernel/linux/linux-yocto-rt_5.15.bb +++ b/meta/recipes-kernel/linux/linux-yocto-rt_5.15.bb @@ -11,13 +11,13 @@ python () { raise bb.parse.SkipRecipe("Set PREFERRED_PROVIDER_virtual/kernel to linux-yocto-rt to enable it") } -SRCREV_machine ?= "423b5d5cb3f45a272285fa4157d1964086fabc2e" -SRCREV_meta ?= "92bd0a656f0f9db955fb53c52be71cce9296bdb2" +SRCREV_machine ?= "0ac91942af8fec31671ffe62e9518aaf15f110b3" +SRCREV_meta ?= "f484a7f175b4f3c4f7d2b553cde232bd41f757d8" SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;branch=${KBRANCH};name=machine \ git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-5.15;destsuffix=${KMETA}" -LINUX_VERSION ?= "5.15.141" +LINUX_VERSION ?= "5.15.124" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" diff --git a/meta/recipes-kernel/linux/linux-yocto-tiny_5.15.bb b/meta/recipes-kernel/linux/linux-yocto-tiny_5.15.bb index 7461087299..9c06ddf200 100644 --- a/meta/recipes-kernel/linux/linux-yocto-tiny_5.15.bb +++ b/meta/recipes-kernel/linux/linux-yocto-tiny_5.15.bb @@ -5,7 +5,7 @@ KCONFIG_MODE = "--allnoconfig" require recipes-kernel/linux/linux-yocto.inc -LINUX_VERSION ?= "5.15.141" +LINUX_VERSION ?= "5.15.124" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}" @@ -14,8 +14,8 @@ DEPENDS += "openssl-native util-linux-native" KMETA = "kernel-meta" KCONF_BSP_AUDIT_LEVEL = "2" -SRCREV_machine ?= "ddf2eeeb31d1edaa5a80e9aabc8b2674ae95f865" -SRCREV_meta ?= "92bd0a656f0f9db955fb53c52be71cce9296bdb2" +SRCREV_machine ?= "cdb289c798fe1fc9f259a08c32e2dd9516ccb7a4" +SRCREV_meta ?= "f484a7f175b4f3c4f7d2b553cde232bd41f757d8" PV = "${LINUX_VERSION}+git${SRCPV}" diff --git a/meta/recipes-kernel/linux/linux-yocto_5.15.bb b/meta/recipes-kernel/linux/linux-yocto_5.15.bb index c7b07dee62..439479022b 100644 --- a/meta/recipes-kernel/linux/linux-yocto_5.15.bb +++ b/meta/recipes-kernel/linux/linux-yocto_5.15.bb @@ -14,24 +14,24 @@ KBRANCH:qemux86 ?= "v5.15/standard/base" KBRANCH:qemux86-64 ?= "v5.15/standard/base" KBRANCH:qemumips64 ?= "v5.15/standard/mti-malta64" -SRCREV_machine:qemuarm ?= "0bd882ff2a47566033965928ab468491f7e1ffd6" -SRCREV_machine:qemuarm64 ?= "d353330a9ba30300be32f1d732723ae3678da684" -SRCREV_machine:qemumips ?= "7f8fbffda634dc22a70f69ff2b762a1f3ff9c842" -SRCREV_machine:qemuppc ?= "fb2191ca96824c7451fbca4eef129660d25711af" -SRCREV_machine:qemuriscv64 ?= "54a3472506956ed41289ae423ca9b7ad4cbb3ab5" -SRCREV_machine:qemuriscv32 ?= "54a3472506956ed41289ae423ca9b7ad4cbb3ab5" -SRCREV_machine:qemux86 ?= "54a3472506956ed41289ae423ca9b7ad4cbb3ab5" -SRCREV_machine:qemux86-64 ?= "54a3472506956ed41289ae423ca9b7ad4cbb3ab5" -SRCREV_machine:qemumips64 ?= "35895af6b529915f9c09a720592554feaca9a2c7" -SRCREV_machine ?= "54a3472506956ed41289ae423ca9b7ad4cbb3ab5" -SRCREV_meta ?= "92bd0a656f0f9db955fb53c52be71cce9296bdb2" +SRCREV_machine:qemuarm ?= "676a22c65ec0f8bb5dc7e13d130f6e3764959d75" +SRCREV_machine:qemuarm64 ?= "f0e7afd5948f71be062cd9194b56cd03de94b7cb" +SRCREV_machine:qemumips ?= "0f1ceb9008f182cd7f21420bbec6f21a67da8397" +SRCREV_machine:qemuppc ?= "4ec9fc13283ce01627ef8c32617a1eb71e127c62" +SRCREV_machine:qemuriscv64 ?= "1c09be01f4b87f60ea64136459167d73502a118f" +SRCREV_machine:qemuriscv32 ?= "1c09be01f4b87f60ea64136459167d73502a118f" +SRCREV_machine:qemux86 ?= "1c09be01f4b87f60ea64136459167d73502a118f" +SRCREV_machine:qemux86-64 ?= "1c09be01f4b87f60ea64136459167d73502a118f" +SRCREV_machine:qemumips64 ?= "fad09cc6acf2175aa6b5979ef48cd5f05afc3da0" +SRCREV_machine ?= "1c09be01f4b87f60ea64136459167d73502a118f" +SRCREV_meta ?= "f484a7f175b4f3c4f7d2b553cde232bd41f757d8" # set your preferred provider of linux-yocto to 'linux-yocto-upstream', and you'll # get the /base branch, which is pure upstream -stable, and the same # meta SRCREV as the linux-yocto-standard builds. Select your version using the # normal PREFERRED_VERSION settings. BBCLASSEXTEND = "devupstream:target" -SRCREV_machine:class-devupstream ?= "9b91d36ba301db86bbf9e783169f7f6abf2585d8" +SRCREV_machine:class-devupstream ?= "38d4ca22a5288c4bae7e6d62a1728b0718d51866" PN:class-devupstream = "linux-yocto-upstream" KBRANCH:class-devupstream = "v5.15/base" @@ -39,7 +39,7 @@ SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;name=machine;branch=${KBRA git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-5.15;destsuffix=${KMETA}" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" -LINUX_VERSION ?= "5.15.141" +LINUX_VERSION ?= "5.15.124" DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}" DEPENDS += "openssl-native util-linux-native"