Initial commit
This commit is contained in:
@@ -0,0 +1,605 @@
|
||||
CVE_STATUS[CVE-2018-6559] = "not-applicable-platform: Issue only affects Ubuntu"
|
||||
|
||||
# https://www.linuxkernelcves.com/cves/CVE-2019-3016
|
||||
# Fixed with 5.6
|
||||
CVE_STATUS[CVE-2019-3016] = "fixed-version: Fixed in version v5.6"
|
||||
|
||||
# https://www.linuxkernelcves.com/cves/CVE-2019-3819
|
||||
# Fixed with 5.1
|
||||
CVE_STATUS[CVE-2019-3819] = "fixed-version: Fixed in version v5.1"
|
||||
|
||||
# https://www.linuxkernelcves.com/cves/CVE-2019-3887
|
||||
# Fixed with 5.2
|
||||
CVE_STATUS[CVE-2019-3887] = "fixed-version: Fixed in version v5.2"
|
||||
|
||||
CVE_STATUS[CVE-2020-11935] = "not-applicable-config: Issue only affects aufs, which is not in linux-yocto"
|
||||
|
||||
# https://nvd.nist.gov/vuln/detail/CVE-2020-27784
|
||||
# Introduced in version v4.1 b26394bd567e5ebe57ec4dee7fe6cd14023c96e9
|
||||
# Patched in kernel since v5.10 e8d5f92b8d30bb4ade76494490c3c065e12411b1
|
||||
# Backported in version v5.4.73 e9e791f5c39ab30e374a3b1a9c25ca7ff24988f3
|
||||
CVE_STATUS[CVE-2020-27784] = "cpe-stable-backport: Backported in version v5.4.73"
|
||||
|
||||
|
||||
# 2021
|
||||
|
||||
# https://nvd.nist.gov/vuln/detail/CVE-2021-3669
|
||||
# Introduced in version v2.6.12 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
|
||||
# Patched in kernel since v5.15 20401d1058f3f841f35a594ac2fc1293710e55b9
|
||||
CVE_STATUS[CVE-2021-3669] = "fixed-version: Fixed in version v5.15"
|
||||
|
||||
# https://nvd.nist.gov/vuln/detail/CVE-2021-3759
|
||||
# Introduced in version v4.5 a9bb7e620efdfd29b6d1c238041173e411670996
|
||||
# Patched in kernel since v5.15 18319498fdd4cdf8c1c2c48cd432863b1f915d6f
|
||||
# Backported in version v5.4.224 bad83d55134e647a739ebef2082541963f2cbc92
|
||||
# Backported in version v5.10.154 836686e1a01d7e2fda6a5a18252243ff30a6e196
|
||||
CVE_STATUS[CVE-2021-3759] = "cpe-stable-backport: Backported in versions v5.4.224 and v6.1.11"
|
||||
|
||||
# https://nvd.nist.gov/vuln/detail/CVE-2021-4218
|
||||
# Introduced in version v2.6.12 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
|
||||
# Patched in kernel since v5.8 32927393dc1ccd60fb2bdc05b9e8e88753761469
|
||||
CVE_STATUS[CVE-2021-4218] = "fixed-version: Fixed in version v5.8"
|
||||
|
||||
|
||||
# 2022
|
||||
|
||||
# https://nvd.nist.gov/vuln/detail/CVE-2022-0480
|
||||
# Introduced in version v2.6.12 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
|
||||
# Patched in kernel since v5.15 0f12156dff2862ac54235fc72703f18770769042
|
||||
CVE_STATUS[CVE-2022-0480] = "fixed-version: Fixed in version v5.15"
|
||||
|
||||
# https://nvd.nist.gov/vuln/detail/CVE-2022-1184
|
||||
# Introduced in version v2.6.12 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
|
||||
# Patched in kernel since v5.19 46c116b920ebec58031f0a78c5ea9599b0d2a371
|
||||
# Backported in version v5.4.198 17034d45ec443fb0e3c0e7297f9cd10f70446064
|
||||
# Backported in version v5.10.121 da2f05919238c7bdc6e28c79539f55c8355408bb
|
||||
# Backported in version v5.15.46 ca17db384762be0ec38373a12460081d22a8b42d
|
||||
CVE_STATUS[CVE-2022-1184] = "cpe-stable-backport: Backported in versions v5.4.198, v5.10.121 and v5.15.46"
|
||||
|
||||
# https://nvd.nist.gov/vuln/detail/CVE-2022-1462
|
||||
# Introduced in version v2.6.12 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
|
||||
# Patched in kernel since v5.19 a501ab75e7624d133a5a3c7ec010687c8b961d23
|
||||
# Backported in version v5.4.208 f7785092cb7f022f59ebdaa181651f7c877df132
|
||||
# Backported in version v5.10.134 08afa87f58d83dfe040572ed591b47e8cb9e225c
|
||||
# Backported in version v5.15.58 b2d1e4cd558cffec6bfe318f5d74e6cffc374d29
|
||||
CVE_STATUS[CVE-2022-1462] = "cpe-stable-backport: Backported in versions v5.4.208, v5.10.134 and v5.15.58"
|
||||
|
||||
# https://nvd.nist.gov/vuln/detail/CVE-2022-2196
|
||||
# Introduced in version v5.8 5c911beff20aa8639e7a1f28988736c13e03ed54
|
||||
# Breaking commit backported in v5.4.47 64b8f33b2e1e687d465b5cb382e7bec495f1e026
|
||||
# Patched in kernel since v6.2 2e7eab81425ad6c875f2ed47c0ce01e78afc38a5
|
||||
# Backported in version v5.4.233 f93a1a5bdcdd122aae0a3eab7a52c15b71fb725b
|
||||
# Backported in version v5.10.170 1b0cafaae8884726c597caded50af185ffc13349
|
||||
# Backported in version v5.15.96 6b539a7dbb49250f92515c2ba60aea239efc9e35
|
||||
# Backported in version v6.1.14 63fada296062e91ad9f871970d4e7f19e21a6a15
|
||||
CVE_STATUS[CVE-2022-2196] = "cpe-stable-backport: Backported in versions v5.4.1233, v5.10.170, v5.15.46 and v6.1.14"
|
||||
|
||||
# https://nvd.nist.gov/vuln/detail/CVE-2022-2308
|
||||
# Introduced in version v5.15 c8a6153b6c59d95c0e091f053f6f180952ade91e
|
||||
# Patched in kernel since v6.0 46f8a29272e51b6df7393d58fc5cb8967397ef2b
|
||||
# Backported in version v5.15.72 dc248ddf41eab4566e95b1ee2433c8a5134ad94a
|
||||
# Backported in version v5.19.14 38d854c4a11c3bbf6a96ea46f14b282670c784ac
|
||||
CVE_STATUS[CVE-2022-2308] = "cpe-stable-backport: Backported in versions v5.15.72 and v5.19.14"
|
||||
|
||||
# https://nvd.nist.gov/vuln/detail/CVE-2022-2327
|
||||
# Introduced in version v2.6.12 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
|
||||
# Patched in kernel since v5.10.125 df3f3bb5059d20ef094d6b2f0256c4bf4127a859
|
||||
CVE_STATUS[CVE-2022-2327] = "fixed-version: Fixed in version v5.10.125"
|
||||
|
||||
# https://nvd.nist.gov/vuln/detail/CVE-2022-2663
|
||||
# Introduced in version v2.6.20 869f37d8e48f3911eb70f38a994feaa8f8380008
|
||||
# Patched in kernel since v6.0 0efe125cfb99e6773a7434f3463f7c2fa28f3a43
|
||||
# Backported in version v5.4.213 36f7b71f8ad8e4d224b45f7d6ecfeff63b091547
|
||||
# Backported in version v5.10.143 e12ce30fe593dd438c5b392290ad7316befc11ca
|
||||
# Backported in version v5.15.68 451c9ce1e2fc9b9e40303bef8e5a0dca1a923cc4
|
||||
# Backported in version v5.19.9 6cf0609154b2ce8d3ae160e7506ab316400a8d3d
|
||||
CVE_STATUS[CVE-2022-2663] = "cpe-stable-backport: Backported in versions v5.4.213, v5.10.143, v5.15.68 and v5.19.9"
|
||||
|
||||
# https://nvd.nist.gov/vuln/detail/CVE-2022-2785
|
||||
# Introduced in version v5.18 b1d18a7574d0df5eb4117c14742baf8bc2b9bb74
|
||||
# Patched in kernel since v6.0 86f44fcec22ce2979507742bc53db8400e454f46
|
||||
# Backported in version v5.19.4 b429d0b9a7a0f3dddb1f782b72629e6353f292fd
|
||||
CVE_STATUS[CVE-2022-2785] = "cpe-stable-backport: Backported in version v5.19.4"
|
||||
|
||||
# https://nvd.nist.gov/vuln/detail/CVE-2022-3176
|
||||
# Introduced in version v5.1 221c5eb2338232f7340386de1c43decc32682e58
|
||||
# Patched in kernel since v5.17 791f3465c4afde02d7f16cf7424ca87070b69396
|
||||
# Backported in version v5.15.65 e9d7ca0c4640cbebe6840ee3bac66a25a9bacaf5
|
||||
CVE_STATUS[CVE-2022-3176] = "cpe-stable-backport: Backported in version v5.15.65"
|
||||
|
||||
# https://nvd.nist.gov/vuln/detail/CVE-2022-3424
|
||||
# Introduced in version v2.6.33 55484c45dbeca2eec7642932ec3f60f8a2d4bdbf
|
||||
# Patched in kernel since v6.2 643a16a0eb1d6ac23744bb6e90a00fc21148a9dc
|
||||
# Backported in version v5.4.229 0078dd8758561540ed30b2c5daa1cb647e758977
|
||||
# Backported in version v5.10.163 0f67ed565f20ea2fdd98e3b0b0169d9e580bb83c
|
||||
# Backported in version v5.15.86 d5c8f9003a289ee2a9b564d109e021fc4d05d106
|
||||
# Backported in version v6.1.2 4e947fc71bec7c7da791f8562d5da233b235ba5e
|
||||
CVE_STATUS[CVE-2022-3424] = "cpe-stable-backport: Backported in versions v5.4.229, v5.10.163, v5.15.86 and v 6.1.2"
|
||||
|
||||
# https://nvd.nist.gov/vuln/detail/CVE-2022-3435
|
||||
# Introduced in version v5.18 6bf92d70e690b7ff12b24f4bfff5e5434d019b82
|
||||
# Breaking commit backported in v5.4.189 f5064531c23ad646da7be8b938292b00a7e61438
|
||||
# Breaking commit backported in v5.10.111 63ea57478aaa3e06a597081a0f537318fc04e49f
|
||||
# Breaking commit backported in v5.15.34 907c97986d6fa77318d17659dd76c94b65dd27c5
|
||||
# Patched in kernel since v6.1 61b91eb33a69c3be11b259c5ea484505cd79f883
|
||||
# Backported in version v5.4.226 cc3cd130ecfb8b0ae52e235e487bae3f16a24a32
|
||||
# Backported in version v5.10.158 0b5394229ebae09afc07aabccb5ffd705ffd250e
|
||||
# Backported in version v5.15.82 25174d91e4a32a24204060d283bd5fa6d0ddf133
|
||||
CVE_STATUS[CVE-2022-3435] = "cpe-stable-backport: Backported in versions v5.4.226, v5.10.158 and v5.15.82"
|
||||
|
||||
# https://nvd.nist.gov/vuln/detail/CVE-2022-3523
|
||||
# Introduced in version v2.6.12 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
|
||||
# Patched in kernel since v6.1 16ce101db85db694a91380aa4c89b25530871d33
|
||||
CVE_STATUS[CVE-2022-3523] = "fixed-version: Fixed in version v6.1"
|
||||
|
||||
# https://nvd.nist.gov/vuln/detail/CVE-2022-3526
|
||||
# Introduced in version v5.13 427f0c8c194b22edcafef1b0a42995ddc5c2227d
|
||||
# Patched in kernel since v5.18 e16b859872b87650bb55b12cca5a5fcdc49c1442
|
||||
# Backported in version v5.15.35 8f79ce226ad2e9b2ec598de2b9560863b7549d1b
|
||||
CVE_STATUS[CVE-2022-3526] = "cpe-stable-backport: Backported in version v5.15.35"
|
||||
|
||||
# https://nvd.nist.gov/vuln/detail/CVE-2022-3534
|
||||
# Introduced in version v5.10 919d2b1dbb074d438027135ba644411931179a59
|
||||
# Patched in kernel since v6.2 93c660ca40b5d2f7c1b1626e955a8e9fa30e0749
|
||||
# Backported in version v5.10.163 c61650b869e0b6fb0c0a28ed42d928eea969afc8
|
||||
# Backported in version v5.15.86 a733bf10198eb5bb927890940de8ab457491ed3b
|
||||
# Backported in version v6.1.2 fbe08093fb2334549859829ef81d42570812597d
|
||||
CVE_STATUS[CVE-2022-3534] = "cpe-stable-backport: Backported in versions v5.10.163, v5.15.86 and v6.1.2"
|
||||
|
||||
# https://nvd.nist.gov/vuln/detail/CVE-2022-3564
|
||||
# Introduced in version v3.6 4b51dae96731c9d82f5634e75ac7ffd3b9c1b060
|
||||
# Patched in kernel since v6.1 3aff8aaca4e36dc8b17eaa011684881a80238966
|
||||
# Backported in version v5.10.154 cb1c012099ef5904cd468bdb8d6fcdfdd9bcb569
|
||||
# Backported in version v5.15.78 8278a87bb1eeea94350d675ef961ee5a03341fde
|
||||
CVE_STATUS[CVE-2022-3564] = "cpe-stable-backport: Backported in versions v5.10.154 and v5.15.78"
|
||||
|
||||
# https://nvd.nist.gov/vuln/detail/CVE-2022-3566
|
||||
# Introduced in version v2.6.12 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
|
||||
# Patched in kernel since v6.1 f49cd2f4d6170d27a2c61f1fecb03d8a70c91f57
|
||||
CVE_STATUS[CVE-2022-3566] = "fixed-version: Fixed in version v6.1"
|
||||
|
||||
# https://nvd.nist.gov/vuln/detail/CVE-2022-3567
|
||||
# Introduced in version v2.6.12 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
|
||||
# Patched in kernel since v6.1 364f997b5cfe1db0d63a390fe7c801fa2b3115f6
|
||||
CVE_STATUS[CVE-2022-3567] = "fixed-version: Fixed in version v6.1"
|
||||
|
||||
# https://nvd.nist.gov/vuln/detail/CVE-2022-3619
|
||||
# Introduced in version v5.12 4d7ea8ee90e42fc75995f6fb24032d3233314528
|
||||
# Patched in kernel since v6.1 7c9524d929648935bac2bbb4c20437df8f9c3f42
|
||||
# Backported in version v5.15.78 aa16cac06b752e5f609c106735bd7838f444784c
|
||||
CVE_STATUS[CVE-2022-3619] = "cpe-stable-backport: Backported in version v5.15.78"
|
||||
|
||||
# https://nvd.nist.gov/vuln/detail/CVE-2022-3621
|
||||
# Introduced in version v2.60.30 05fe58fdc10df9ebea04c0eaed57adc47af5c184
|
||||
# Patched in kernel since v6.1 21a87d88c2253350e115029f14fe2a10a7e6c856
|
||||
# Backported in version v5.4.218 792211333ad77fcea50a44bb7f695783159fc63c
|
||||
# Backported in version v5.10.148 3f840480e31495ce674db4a69912882b5ac083f2
|
||||
# Backported in version v5.15.74 1e512c65b4adcdbdf7aead052f2162b079cc7f55
|
||||
# Backported in version v5.19.16 caf2c6b580433b3d3e413a3d54b8414a94725dcd
|
||||
CVE_STATUS[CVE-2022-3621] = "cpe-stable-backport: Backported in versions v5.4.218, v5.10.148, v5.15.74 and v5.19.16"
|
||||
|
||||
# https://nvd.nist.gov/vuln/detail/CVE-2022-3623
|
||||
# Introduced in version v5.1 5480280d3f2d11d47f9be59d49b20a8d7d1b33e8
|
||||
# Patched in kernel since v6.1 fac35ba763ed07ba93154c95ffc0c4a55023707f
|
||||
# Backported in version v5.4.228 176ba4c19d1bb153aa6baaa61d586e785b7d736c
|
||||
# Backported in version v5.10.159 fccee93eb20d72f5390432ecea7f8c16af88c850
|
||||
# Backported in version v5.15.78 3a44ae4afaa5318baed3c6e2959f24454e0ae4ff
|
||||
# Backported in version v5.19.17 86a913d55c89dd13ba070a87f61a493563e94b54
|
||||
CVE_STATUS[CVE-2022-3623] = "cpe-stable-backport: Backported in versions v5.4.228, v5.10.159, v5.15.78 and v 5.19.17"
|
||||
|
||||
# https://nvd.nist.gov/vuln/detail/CVE-2022-3624
|
||||
# Introduced in version v6.0 d5410ac7b0baeca91cf73ff5241d35998ecc8c9e
|
||||
# Patched in kernel since v6.0 4f5d33f4f798b1c6d92b613f0087f639d9836971
|
||||
CVE_STATUS[CVE-2022-3624] = "fixed-version: Fixed in version v6.0"
|
||||
|
||||
# https://nvd.nist.gov/vuln/detail/CVE-2022-3625
|
||||
# Introduced in version v4.19 45f05def5c44c806f094709f1c9b03dcecdd54f0
|
||||
# Patched in kernel since v6.0 6b4db2e528f650c7fb712961aac36455468d5902
|
||||
# Backported in version v5.4.211 1ad4ba9341f15412cf86dc6addbb73871a10212f
|
||||
# Backported in version v5.10.138 0e28678a770df7989108327cfe86f835d8760c33
|
||||
# Backported in version v5.15.63 c4d09fd1e18bac11c2f7cf736048112568687301
|
||||
# Backported in version v5.19.4 26bef5616255066268c0e40e1da10cc9b78b82e9
|
||||
CVE_STATUS[CVE-2022-3625] = "cpe-stable-backport: Backported in versions v5.4.211, v5.10.138, v5.15.63 and v5.19.4"
|
||||
|
||||
# https://nvd.nist.gov/vuln/detail/CVE-2022-3629
|
||||
# Introduced in version v3.9 d021c344051af91f42c5ba9fdedc176740cbd238
|
||||
# Patched in kernel since v6.0 7e97cfed9929eaabc41829c395eb0d1350fccb9d
|
||||
# Backported in version v5.4.211 f82f1e2042b397277cd39f16349950f5abade58d
|
||||
# Backported in version v5.10.138 38ddccbda5e8b762c8ee06670bb1f64f1be5ee50
|
||||
# Backported in version v5.15.63 e4c0428f8a6fc8c218d7fd72bddd163f05b29795
|
||||
# Backported in version v5.19.4 8ff5db3c1b3d6797eda5cd326dcd31b9cd1c5f72
|
||||
CVE_STATUS[CVE-2022-3629] = "cpe-stable-backport: Backported in versions v5.4.211, v5.10.138, v5.15.63 and v5.19.4"
|
||||
|
||||
# https://nvd.nist.gov/vuln/detail/CVE-2022-3630
|
||||
# Introduced in version v5.19 85e4ea1049c70fb99de5c6057e835d151fb647da
|
||||
# Patched in kernel since v6.0 fb24771faf72a2fd62b3b6287af3c610c3ec9cf1
|
||||
# Backported in version v5.19.4 7a369dc87b66acc85d0cffcf39984344a203e20b
|
||||
CVE_STATUS[CVE-2022-3630] = "cpe-stable-backport: Backported in version v5.19.4"
|
||||
|
||||
# https://nvd.nist.gov/vuln/detail/CVE-2022-3633
|
||||
# Introduced in version v5.4 9d71dd0c70099914fcd063135da3c580865e924c
|
||||
# Patched in kernel since v6.0 8c21c54a53ab21842f5050fa090f26b03c0313d6
|
||||
# Backported in version v5.4.211 04e41b6bacf474f5431491f92e981096e8cc8e93
|
||||
# Backported in version v5.10.138 a220ff343396bae8d3b6abee72ab51f1f34b3027
|
||||
# Backported in version v5.15.63 98dc8fb08299ab49e0b9c08daedadd2f4de1a2f2
|
||||
# Backported in version v5.19.4 a0278dbeaaf7ca60346c62a9add65ae7d62564de
|
||||
CVE_STATUS[CVE-2022-3633] = "cpe-stable-backport: Backported in versions v5.4.211, v5.10.138, v5.15.63 and v5.19.4"
|
||||
|
||||
# https://nvd.nist.gov/vuln/detail/CVE-2022-3635
|
||||
# Introduced in version v2.6.12 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
|
||||
# Patched in kernel since v6.0 3f4093e2bf4673f218c0bf17d8362337c400e77b
|
||||
# Backported in version v5.4.211 9a6cbaa50f263b12df18a051b37f3f42f9fb5253
|
||||
# Backported in version v5.10.138 a0ae122e9aeccbff75014c4d36d11a9d32e7fb5e
|
||||
# Backported in version v5.15.63 a5d7ce086fe942c5ab422fd2c034968a152be4c4
|
||||
# Backported in version v5.19.4 af412b252550f9ac36d9add7b013c2a2c3463835
|
||||
CVE_STATUS[CVE-2022-3635] = "cpe-stable-backport: Backported in versions v5.4.211, v5.10.138, v5.15.63 and v5.19.4"
|
||||
|
||||
# https://nvd.nist.gov/vuln/detail/CVE-2022-3636
|
||||
# Introduced in version v5.19 33fc42de33278b2b3ec6f3390512987bc29a62b7
|
||||
# Patched in kernel since v5.19 17a5f6a78dc7b8db385de346092d7d9f9dc24df6
|
||||
CVE_STATUS[CVE-2022-3636] = "cpe-stable-backport: Backported in version v5.19"
|
||||
|
||||
# https://nvd.nist.gov/vuln/detail/CVE-2022-3640
|
||||
# Introduced in version v5.19 d0be8347c623e0ac4202a1d4e0373882821f56b0
|
||||
# Breaking commit backported in v5.4.209 098e07ef0059296e710a801cdbd74b59016e6624
|
||||
# Breaking commit backported in v5.10.135 de5d4654ac6c22b1be756fdf7db18471e7df01ea
|
||||
# Breaking commit backported in v5.15.59 f32d5615a78a1256c4f557ccc6543866e75d03f4
|
||||
# Patched in kernel since v6.1 0d0e2d032811280b927650ff3c15fe5020e82533
|
||||
# Backported in version v5.4.224 c1f594dddd9ffd747c39f49cc5b67a9b7677d2ab
|
||||
# Backported in version v5.10.154 d9ec6e2fbd4a565b2345d4852f586b7ae3ab41fd
|
||||
# Backported in version v5.15.78 a3a7b2ac64de232edb67279e804932cb42f0b52a
|
||||
CVE_STATUS[CVE-2022-3640] = "cpe-stable-backport: Backported in versions v5.4.224, v5.10.154 and v5.15.78"
|
||||
|
||||
# https://nvd.nist.gov/vuln/detail/CVE-2022-3646
|
||||
# Introduced in version v2.6.30 9ff05123e3bfbb1d2b68ba1d9bf1f7d1dffc1453
|
||||
# Patched in kernel since v6.1 d0d51a97063db4704a5ef6bc978dddab1636a306
|
||||
# Backported in version v5.4.218 b7e409d11db9ce9f8bc05fcdfa24d143f60cd393
|
||||
# Backported in version v5.10.148 aad4c997857f1d4b6c1e296c07e4729d3f8058ee
|
||||
# Backported in version v5.15.74 44b1ee304bac03f1b879be5afe920e3a844e40fc
|
||||
# Backported in version v5.19.16 4755fcd844240857b525f6e8d8b65ee140fe9570
|
||||
CVE_STATUS[CVE-2022-3646] = "cpe-stable-backport: Backported in versions v5.4.218, v5.10.148, v5.15.74 and v5.19.16"
|
||||
|
||||
# https://nvd.nist.gov/vuln/detail/CVE-2022-3649
|
||||
# Introduced in version v2.6.12 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
|
||||
# Patched in kernel since v6.1 d325dc6eb763c10f591c239550b8c7e5466a5d09
|
||||
# Backported in version v5.4.220 d1c2d820a2cd73867b7d352e89e92fb3ac29e926
|
||||
# Backported in version v5.10.148 21ee3cffed8fbabb669435facfd576ba18ac8652
|
||||
# Backported in version v5.15.74 cb602c2b654e26763226d8bd27a702f79cff4006
|
||||
# Backported in version v5.19.16 394b2571e9a74ddaed55aa9c4d0f5772f81c21e4
|
||||
CVE_STATUS[CVE-2022-3649] = "cpe-stable-backport: Backported in versions v5.4.220, v5.10.148, v5.15.74 and v5.19.16"
|
||||
|
||||
# https://nvd.nist.gov/vuln/detail/CVE-2022-4382
|
||||
# Introduced in version v5.3 e5d82a7360d124ae1a38c2a5eac92ba49b125191
|
||||
# Patched in kernel since v6.2-rc5 d18dcfe9860e842f394e37ba01ca9440ab2178f4
|
||||
# Backported in version v5.4.230 9a39f4626b361ee7aa10fd990401c37ec3b466ae
|
||||
# Backported in version v5.10.165 856e4b5e53f21edbd15d275dde62228dd94fb2b4
|
||||
# Backported in version v5.15.90 a2e075f40122d8daf587db126c562a67abd69cf9
|
||||
# Backported in version v6.1.8 616fd34d017000ecf9097368b13d8a266f4920b3
|
||||
CVE_STATUS[CVE-2022-4382] = "cpe-stable-backport: Backported in versions v5.4.230, v5.10.165, v5.15.90 and v6.1.8"
|
||||
|
||||
# https://nvd.nist.gov/vuln/detail/CVE-2022-26365
|
||||
# Introduced in version v2.6.12 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
|
||||
# Patched in kernel since v5.19 2f446ffe9d737e9a844b97887919c4fda18246e7
|
||||
# Backported in version v5.4.204 42112e8f94617d83943f8f3b8de2b66041905506
|
||||
# Backported in version v5.10.129 cfea428030be836d79a7690968232bb7fa4410f1
|
||||
# Backported in version v5.15.53 7ed65a4ad8fa9f40bc3979b32c54243d6a684ec9
|
||||
CVE_STATUS[CVE-2022-26365] = "cpe-stable-backport: Backported in versions v5.4.204, v5.10.129 and v5.15.53"
|
||||
|
||||
# https://nvd.nist.gov/vuln/detail/CVE-2022-33740
|
||||
# Introduced in version v2.6.12 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
|
||||
# Patched in kernel since v5.19 307c8de2b02344805ebead3440d8feed28f2f010
|
||||
# Backported in version v5.4.204 04945b5beb73019145ac17a2565526afa7293c14
|
||||
# Backported in version v5.10.129 728d68bfe68d92eae1407b8a9edc7817d6227404
|
||||
# Backported in version v5.15.53 5dd0993c36832d33820238fc8dc741ba801b7961
|
||||
CVE_STATUS[CVE-2022-33740] = "cpe-stable-backport: Backported in versions v5.4.204, v5.10.129 and v5.15.53"
|
||||
|
||||
# https://nvd.nist.gov/vuln/detail/CVE-2022-33741
|
||||
# Introduced in version v2.6.12 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
|
||||
# Patched in kernel since v5.19 4491001c2e0fa69efbb748c96ec96b100a5cdb7e
|
||||
# Backported in version v5.4.204 ede57be88a5fff42cd00e6bcd071503194d398dd
|
||||
# Backported in version v5.10.129 4923217af5742a796821272ee03f8d6de15c0cca
|
||||
# Backported in version v5.15.53 ed3cfc690675d852c3416aedb271e0e7d179bf49
|
||||
CVE_STATUS[CVE-2022-33741] = "cpe-stable-backport: Backported in versions v5.4.204, v5.10.129 and v5.15.53"
|
||||
|
||||
# https://nvd.nist.gov/vuln/detail/CVE-2022-33742
|
||||
# Introduced in version v2.6.12 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
|
||||
# Patched in kernel since v5.19 2400617da7eebf9167d71a46122828bc479d64c9
|
||||
# Backported in version v5.4.204 60ac50daad36ef3fe9d70d89cfe3b95d381db997
|
||||
# Backported in version v5.10.129 cbbd2d2531539212ff090aecbea9877c996e6ce6
|
||||
# Backported in version v5.15.53 6d0a9127279a4533815202e30ad1b3a39f560ba3
|
||||
CVE_STATUS[CVE-2022-33742] = "cpe-stable-backport: Backported in versions v5.4.204, v5.10.129 and v5.15.53"
|
||||
|
||||
# https://nvd.nist.gov/vuln/detail/CVE-2022-42895
|
||||
# Introduced in version v2.6.12 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
|
||||
# Patched in kernel since v6.1 b1a2cd50c0357f243b7435a732b4e62ba3157a2e
|
||||
# Backported in version v5.4.224 6949400ec9feca7f88c0f6ca5cb5fdbcef419c89
|
||||
# Backported in version v5.10.154 26ca2ac091b49281d73df86111d16e5a76e43bd7
|
||||
# Backported in version v5.15.78 3e4697ffdfbb38a2755012c4e571546c89ab6422
|
||||
CVE_STATUS[CVE-2022-42895] = "cpe-stable-backport: Backported in versions v5.4.224, v5.10.154 and v5.15.78"
|
||||
|
||||
# https://nvd.nist.gov/vuln/detail/CVE-2022-42896
|
||||
# Introduced in version v2.6.12 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
|
||||
# Patched in kernel since v6.1 711f8c3fb3db61897080468586b970c87c61d9e4
|
||||
# Backported in version v5.4.226 0d87bb6070361e5d1d9cb391ba7ee73413bc109b
|
||||
# Backported in version v5.10.154 6b6f94fb9a74dd2891f11de4e638c6202bc89476
|
||||
# Backported in version v5.15.78 81035e1201e26d57d9733ac59140a3e29befbc5a
|
||||
CVE_STATUS[CVE-2022-42896] = "cpe-stable-backport: Backported in versions v5.4.226, v5.10.154 and v5.15.78"
|
||||
|
||||
# https://nvd.nist.gov/vuln/detail/CVE-2022-38457
|
||||
# https://nvd.nist.gov/vuln/detail/CVE-2022-40133
|
||||
# Both CVE-2022-38457 & CVE-2022-40133 are fixed by the same commit:
|
||||
# Introduced in version v4.20 e14c02e6b6990e9f6ee18a214a22ac26bae1b25e
|
||||
# Patched in kernel since v6.2 a309c7194e8a2f8bd4539b9449917913f6c2cd50
|
||||
# Backported in version v6.1.7 7ac9578e45b20e3f3c0c8eb71f5417a499a7226a
|
||||
# See:
|
||||
# * https://www.linuxkernelcves.com/cves/CVE-2022-38457
|
||||
# * https://www.linuxkernelcves.com/cves/CVE-2022-40133
|
||||
# * https://lore.kernel.org/all/CAODzB9q3OBD0k6W2bcWrSZo2jC3EvV0PrLyWmO07rxR4nQgkJA@mail.gmail.com/T/
|
||||
CVE_STATUS[CVE-2022-38457] = "cpe-stable-backport: Backported in version v6.1.7"
|
||||
CVE_STATUS[CVE-2022-40133] = "cpe-stable-backport: Backported in version v6.1.7"
|
||||
|
||||
# Backported to 6.1.33
|
||||
CVE_STATUS[CVE-2022-48425] = "cpe-stable-backport: Backported in version v6.1.33"
|
||||
|
||||
# 2023
|
||||
|
||||
# https://nvd.nist.gov/vuln/detail/CVE-2023-0179
|
||||
# Patched in kernel since v6.2 696e1a48b1a1b01edad542a1ef293665864a4dd0
|
||||
# Backported in version v5.10.164 550efeff989b041f3746118c0ddd863c39ddc1aa
|
||||
# Backported in version v5.15.89 a8acfe2c6fb99f9375a9325807a179cd8c32e6e3
|
||||
# Backported in version v6.1.7 76ef74d4a379faa451003621a84e3498044e7aa3
|
||||
CVE_STATUS[CVE-2023-0179] = "cpe-stable-backport: Backported in versions v5.10.164, v5.15.89 and v6.1.7"
|
||||
|
||||
# https://nvd.nist.gov/vuln/detail/CVE-2023-0266
|
||||
# Introduced in version v2.6.12 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
|
||||
# Patched in kernel since v6.2 56b88b50565cd8b946a2d00b0c83927b7ebb055e
|
||||
# Backported in version v5.15.88 26350c21bc5e97a805af878e092eb8125843fe2c
|
||||
# Backported in version v6.1.6 d6ad4bd1d896ae1daffd7628cd50f124280fb8b1
|
||||
CVE_STATUS[CVE-2023-0266] = "cpe-stable-backport: Backported in versions v5.15.88 and v6.1.6"
|
||||
|
||||
# https://nvd.nist.gov/vuln/detail/CVE-2023-0394
|
||||
# Introduced in version 2.6.12 357b40a18b04c699da1d45608436e9b76b50e251
|
||||
# Patched in kernel since v6.2 cb3e9864cdbe35ff6378966660edbcbac955fe17
|
||||
# Backported in version v5.4.229 3998dba0f78a59922b0ef333ccfeb58d9410cd3d
|
||||
# Backported in version v5.10.164 6c9e2c11c33c35563d34d12b343d43b5c12200b5
|
||||
# Backported in version v5.15.89 456e3794e08a0b59b259da666e31d0884b376bcf
|
||||
# Backported in version v6.1.7 0afa5f0736584411771299074bbeca8c1f9706d4
|
||||
CVE_STATUS[CVE-2023-0394] = "cpe-stable-backport: Backported in versions v5.4.229, v5.10.164, v5.15.89 and v6.1.7"
|
||||
|
||||
# https://nvd.nist.gov/vuln/detail/CVE-2023-0386
|
||||
# Introduced in 5.11 459c7c565ac36ba09ffbf24231147f408fde4203
|
||||
# Patched in kernel v6.2 4f11ada10d0ad3fd53e2bd67806351de63a4f9c3
|
||||
# Backported in version 5.15.91 e91308e63710574c4b6a0cadda3e042a3699666e
|
||||
# Backported in version 6.1.9 42fea1c35254c49cce07c600d026cbc00c6d3c81
|
||||
CVE_STATUS[CVE-2023-0386] = "cpe-stable-backport: Backported in versions v5.15.91 and v6.1.9"
|
||||
|
||||
# https://nvd.nist.gov/vuln/detail/CVE-2023-0461
|
||||
# Introduced in version v4.13 734942cc4ea6478eed125af258da1bdbb4afe578
|
||||
# Patched in kernel since v6.2 2c02d41d71f90a5168391b6a5f2954112ba2307c
|
||||
# Backported in version v5.4.229 c6d29a5ffdbc362314853462a0e24e63330a654d
|
||||
# Backported in version v5.10.163 f8ed0a93b5d576bbaf01639ad816473bdfd1dcb0
|
||||
# Backported in version v5.15.88 dadd0dcaa67d27f550131de95c8e182643d2c9d6
|
||||
# Backported in version v6.1.5 7d242f4a0c8319821548c7176c09a6e0e71f223c
|
||||
CVE_STATUS[CVE-2023-0461] = "cpe-stable-backport: Backported in versions v5.4.229, v5.10.163, v5.15.88 and v6.1.5"
|
||||
|
||||
# https://nvd.nist.gov/vuln/detail/CVE-2023-1073
|
||||
# Introduced in v3.16 1b15d2e5b8077670b1e6a33250a0d9577efff4a5
|
||||
# Patched in kernel v6.2 b12fece4c64857e5fab4290bf01b2e0317a88456
|
||||
# Backported in version 5.10.166 5dc3469a1170dd1344d262a332b26994214eeb58
|
||||
# Backported in version 5.15.91 2b49568254365c9c247beb0eabbaa15d0e279d64
|
||||
# Backported in version 6.1.9 cdcdc0531a51659527fea4b4d064af343452062d
|
||||
CVE_STATUS[CVE-2023-1073] = "cpe-stable-backport: Backported in versions v5.10.166, v5.15.91 and v6.1.9"
|
||||
|
||||
# https://nvd.nist.gov/vuln/detail/CVE-2023-1074
|
||||
# Patched in kernel v6.2 458e279f861d3f61796894cd158b780765a1569f
|
||||
# Backported in version 5.15.91 3391bd42351be0beb14f438c7556912b9f96cb32
|
||||
# Backported in version 6.1.9 9f08bb650078dca24a13fea1c375358ed6292df3
|
||||
CVE_STATUS[CVE-2023-1074] = "cpe-stable-backport: Backported in versions v5.15.91 andv6.1.9"
|
||||
|
||||
# https://nvd.nist.gov/vuln/detail/CVE-2023-1075
|
||||
# Introduced in v4.20 a42055e8d2c30d4decfc13ce943d09c7b9dad221
|
||||
# Patched in kernel v6.2 ffe2a22562444720b05bdfeb999c03e810d84cbb
|
||||
# Backported in version 6.1.11 37c0cdf7e4919e5f76381ac60817b67bcbdacb50
|
||||
# 5.15 still has issue, include/net/tls.h:is_tx_ready() would need patch
|
||||
CVE_STATUS[CVE-2023-1075] = "cpe-stable-backport: Backported in version v6.1.11"
|
||||
|
||||
# https://nvd.nist.gov/vuln/detail/CVE-2023-1076
|
||||
# Patched in kernel v6.3 a096ccca6e503a5c575717ff8a36ace27510ab0a
|
||||
# Backported in version v5.4.235 d92d87000eda9884d49f1acec1c1fccd63cd9b11
|
||||
# Backported in version v5.10.173 9a31af61f397500ccae49d56d809b2217d1e2178
|
||||
# Backported in version v5.15.99 67f9f02928a34aad0a2c11dab5eea269f5ecf427
|
||||
# Backported in version v6.1.16 b4ada752eaf1341f47bfa3d8ada377eca75a8d44
|
||||
# Backported in version v6.2.3 4aa4b4b3b3e9551c4de2bf2987247c28805fb8f6
|
||||
CVE_STATUS[CVE-2023-1076] = "cpe-stable-backport: Backported in versions v5.4.235, v5.10.173, v5.15.99, v6.1.16 and v6.2.3"
|
||||
|
||||
# https://nvd.nist.gov/vuln/detail/CVE-2023-1077
|
||||
# Patched in kernel 6.3rc1 7c4a5b89a0b5a57a64b601775b296abf77a9fe97
|
||||
# Backported in version 5.15.99 2c36c390a74981d03f04f01fe7ee9c3ac3ea11f7
|
||||
# Backported in version 6.1.16 6b4fcc4e8a3016e85766c161daf0732fca16c3a3
|
||||
CVE_STATUS[CVE-2023-1077] = "cpe-stable-backport: Backported in versions v5.15.99 and v6.1.16"
|
||||
|
||||
# https://nvd.nist.gov/vuln/detail/CVE-2023-1078
|
||||
# Patched in kernel 6.2 f753a68980cf4b59a80fe677619da2b1804f526d
|
||||
# Backported in version 5.15.94 528e3f3a4b53df36dafd10cdf6b8c0fe2aa1c4ba
|
||||
# Backported in version 6.1.12 1d52bbfd469af69fbcae88c67f160ce1b968e7f3
|
||||
CVE_STATUS[CVE-2023-1078] = "cpe-stable-backport: Backported in versions v5.15.94 and v6.1.12"
|
||||
|
||||
# https://nvd.nist.gov/vuln/detail/CVE-2023-1079
|
||||
# Patched in kernel since v6.3-rc1 4ab3a086d10eeec1424f2e8a968827a6336203df
|
||||
# Backported in version v5.4.235 dd08e68d04d08d2f42b09162c939a0b0841216cc
|
||||
# Backported in version v5.10.173 21a2eec4a440060a6eb294dc890eaf553101ba09
|
||||
# Backported in version v5.15.99 3959316f8ceb17866646abc6be4a332655407138
|
||||
# Backported in version v6.1.16 ee907829b36949c452c6f89485cb2a58e97c048e
|
||||
# Backported in version v6.2.3 b08bcfb4c97d7bd41b362cff44b2c537ce9e8540
|
||||
CVE_STATUS[CVE-2023-1079] = "cpe-stable-backport: Backported in versions v5.4.235, v5.10.173, v5.15.99, v6.1.16 and v6.2.3"
|
||||
|
||||
# https://nvd.nist.gov/vuln/detail/CVE-2023-1118
|
||||
# Introduced in version v2.6.36 9ea53b74df9c4681f5bb2da6b2e10e37d87ea6d6
|
||||
# Patched in kernel since v6.3-rc1 29b0589a865b6f66d141d79b2dd1373e4e50fe17
|
||||
# Backported in version v5.4.235 d120334278b370b6a1623a75ebe53b0c76cb247c
|
||||
# Backported in version v5.10.173 78da5a378bdacd5bf68c3a6389bdc1dd0c0f5b3c
|
||||
# Backported in version v5.15.99 29962c478e8b2e6a6154d8d84b8806dbe36f9c28
|
||||
# Backported in version v6.1.16 029c1410e345ce579db5c007276340d072aac54a
|
||||
# Backported in version v6.2.3 182ea492aae5b64067277e60a4ea5995c4628555
|
||||
CVE_STATUS[CVE-2023-1118] = "cpe-stable-backport: Backported in versions v5.4.235, v5.10.173, v5.15.99, v6.1.16 and v6.2.3"
|
||||
|
||||
# https://nvd.nist.gov/vuln/detail/CVE-2023-1281
|
||||
# Introduced in version v4.14 9b0d4446b56904b59ae3809913b0ac760fa941a6
|
||||
# Patched in kernel since v6.2 ee059170b1f7e94e55fa6cadee544e176a6e59c2
|
||||
# Backported in version v5.10.169 eb8e9d8572d1d9df17272783ad8a84843ce559d4
|
||||
# Backported in version v5.15.95 becf55394f6acb60dd60634a1c797e73c747f9da
|
||||
# Backported in version v6.1.13 bd662ba56187b5ef8a62a3511371cd38299a507f
|
||||
CVE_STATUS[CVE-2023-1281] = "cpe-stable-backport: Backported in versions v5.10.169, v5.15.95 and v6.1.13"
|
||||
|
||||
# https://nvd.nist.gov/vuln/detail/CVE-2023-1513
|
||||
# Patched in kernel since v6.2 2c10b61421a28e95a46ab489fd56c0f442ff6952
|
||||
# Backported in version v5.4.232 9f95a161a7deef62d6d2f57b1a69f94e0546d8d8
|
||||
# Backported in version v5.10.169 6416c2108ba54d569e4c98d3b62ac78cb12e7107
|
||||
# Backported in version v5.15.95 35351e3060d67eed8af1575d74b71347a87425d8
|
||||
# Backported in version v6.1.13 747ca7c8a0c7bce004709143d1cd6596b79b1deb
|
||||
CVE_STATUS[CVE-2023-1513] = "cpe-stable-backport: Backported in versions v5.4.232, v5.10.169, v5.15.95 and v6.1.13"
|
||||
|
||||
# https://nvd.nist.gov/vuln/detail/CVE-2023-1652
|
||||
# Patched in kernel since v6.2 e6cf91b7b47ff82b624bdfe2fdcde32bb52e71dd
|
||||
# Backported in version v5.15.91 0a27dcd5343026ac0cb168ee63304255372b7a36
|
||||
# Backported in version v6.1.9 32d5eb95f8f0e362e37c393310b13b9e95404560
|
||||
# Ref: https://www.linuxkernelcves.com/cves/CVE-2023-1652
|
||||
# Ref: Debian kernel-sec team: https://salsa.debian.org/kernel-team/kernel-sec/-/blob/1fa77554d4721da54e2df06fa1908a83ba6b1045/retired/CVE-2023-1652
|
||||
CVE_STATUS[CVE-2023-1652] = "cpe-stable-backport: Backported in versions v5.15.91 and v6.1.9"
|
||||
|
||||
# https://nvd.nist.gov/vuln/detail/CVE-2023-1829
|
||||
# Patched in kernel since v6.3-rc1 8c710f75256bb3cf05ac7b1672c82b92c43f3d28
|
||||
# Backported in version v5.4.235 7a6fb69bbcb21e9ce13bdf18c008c268874f0480
|
||||
# Backported in version v5.10.173 18c3fa7a7fdbb4d21dafc8a7710ae2c1680930f6
|
||||
# Backported in version v5.15.100 7c183dc0af472dec33d2c0786a5e356baa8cad19
|
||||
# Backported in version v6.1.18 3abebc503a5148072052c229c6b04b329a420ecd
|
||||
# Backported in version v6.2.5 372ae77cf11d11fb118cbe2d37def9dd5f826abd
|
||||
# Ref: https://www.linuxkernelcves.com/cves/CVE-2023-1829
|
||||
# Ref: Debian kernel-sec team : https://salsa.debian.org/kernel-team/kernel-sec/-/blob/1fa77554d4721da54e2df06fa1908a83ba6b1045/active/CVE-2023-1829
|
||||
CVE_STATUS[CVE-2023-1829] = "cpe-stable-backport: Backported in versions v5.4.235, v5.10.173, v5.15.100, v6.1.18 and v6.2.5"
|
||||
|
||||
# https://nvd.nist.gov/vuln/detail/CVE-2023-28466
|
||||
# Introduced in version v4.13 3c4d7559159bfe1e3b94df3a657b2cda3a34e218
|
||||
# Patched in kernel since v6.3-rc2 49c47cc21b5b7a3d8deb18fc57b0aa2ab1286962
|
||||
# Backported in version v5.15.105 0b54d75aa43a1edebc8a3770901f5c3557ee0daa
|
||||
# Backported in version v6.1.20 14c17c673e1bba08032d245d5fb025d1cbfee123
|
||||
# Backported in version v6.2.7 5231fa057bb0e52095591b303cf95ebd17bc62ce
|
||||
CVE_STATUS[CVE-2023-28466] = "cpe-stable-backport: Backported in versions v5.15.05, v6.1.20 and v6.2.7"
|
||||
|
||||
|
||||
# https://www.linuxkernelcves.com/cves/CVE-2023-0615
|
||||
# Fixed in 6.1 onwards
|
||||
CVE_STATUS[CVE-2023-0615] = "fixed-version: Fixed in version v6.1 onwards"
|
||||
|
||||
# https://www.linuxkernelcves.com/cves/CVE-2023-28328
|
||||
# Fixed with 6.1.2
|
||||
CVE_STATUS[CVE-2023-28328] = "fixed-version: Fixed in version v6.1.2"
|
||||
|
||||
# https://www.linuxkernelcves.com/cves/CVE-2023-2162
|
||||
# Fixed in 6.1.11
|
||||
CVE_STATUS[CVE-2023-2162] = "fixed-version: Fixed in version v6.1.11"
|
||||
|
||||
# https://www.linuxkernelcves.com/cves/CVE-2023-0459
|
||||
# Fixed in 6.1.14 onwards
|
||||
CVE_STATUS[CVE-2023-0459] = "fixed-version: Fixed in version v6.1.14"
|
||||
|
||||
# https://www.linuxkernelcves.com/cves/CVE-2023-1999
|
||||
# https://www.linuxkernelcves.com/cves/CVE-2023-2985
|
||||
# Fixed in 6.1.16
|
||||
CVE_STATUS[CVE-2023-1998] = "fixed-version: Fixed in version v6.1.16"
|
||||
CVE_STATUS[CVE-2023-2985] = "fixed-version: Fixed in version v6.1.16"
|
||||
|
||||
# https://www.linuxkernelcves.com/cves/CVE-2023-1855
|
||||
# https://www.linuxkernelcves.com/cves/CVE-2023-1990
|
||||
# https://www.linuxkernelcves.com/cves/CVE-2023-2235
|
||||
# https://www.linuxkernelcves.com/cves/CVE-2023-30456
|
||||
# Fixed in 6.1.21
|
||||
CVE_STATUS_GROUPS += "CVE_STATUS_KERNEL_6121"
|
||||
CVE_STATUS_KERNEL_6121 = "CVE-2023-1855 CVE-2023-1990 CVE-2023-2235 CVE-2023-30456"
|
||||
CVE_STATUS_KERNEL_6121[status] = "fixed-version: Fixed in version v6.1.21"
|
||||
|
||||
# https://www.linuxkernelcves.com/cves/CVE-2023-1989
|
||||
# https://www.linuxkernelcves.com/cves/CVE-2023-2194
|
||||
# https://www.linuxkernelcves.com/cves/CVE-2023-28866
|
||||
# https://www.linuxkernelcves.com/cves/CVE-2023-30772
|
||||
# https://www.linuxkernelcves.com/cves/CVE-2023-33203
|
||||
# https://www.linuxkernelcves.com/cves/CVE-2023-33288
|
||||
# Fixed with 6.1.22
|
||||
CVE_STATUS_GROUPS += "CVE_STATUS_KERNEL_6122"
|
||||
CVE_STATUS_KERNEL_6122 = "CVE-2023-2194 CVE-2023-1989 CVE-2023-28866 CVE-2023-30772 CVE-2023-33203 CVE-2023-33288"
|
||||
CVE_STATUS_KERNEL_6122[status] = "fixed-version: Fixed in version v6.1.22"
|
||||
|
||||
# https://www.linuxkernelcves.com/cves/CVE-2023-1611
|
||||
# Fixed in 6.1.23
|
||||
CVE_STATUS[CVE-2023-1611] = "fixed-version: Fixed in version v6.1.23"
|
||||
|
||||
# https://www.linuxkernelcves.com/cves/CVE-2023-1859
|
||||
# Fixed in 6.1.25
|
||||
CVE_STATUS[CVE-2023-1859] = "fixed-version: Fixed in version v6.1.25"
|
||||
|
||||
# https://www.linuxkernelcves.com/cves/CVE-2023-2156
|
||||
# https://www.linuxkernelcves.com/cves/CVE-2023-31436
|
||||
# Fixed in 6.1.26
|
||||
CVE_STATUS[CVE-2023-2156] = "fixed-version: Fixed in version v6.1.26"
|
||||
CVE_STATUS[CVE-2023-31436] = "fixed-version: Fixed in version v6.1.26"
|
||||
|
||||
# https://www.linuxkernelcves.com/cves/CVE-2023-1380
|
||||
# https://www.linuxkernelcves.com/cves/CVE-2023-2002
|
||||
# Fixed in 6.1.27
|
||||
CVE_STATUS[CVE-2023-1380] = "fixed-version: Fixed in version v6.1.27"
|
||||
CVE_STATUS[CVE-2023-2002] = "fixed-version: Fixed in version v6.1.27"
|
||||
|
||||
# https://www.linuxkernelcves.com/cves/CVE-2023-32233
|
||||
# Fixed with 6.1.28
|
||||
CVE_STATUS[CVE-2023-32233] = "fixed-version: Fixed in version v6.1.28"
|
||||
|
||||
# https://www.linuxkernelcves.com/cves/CVE-2023-34256
|
||||
# Fixed in 6.1.29
|
||||
CVE_STATUS[CVE-2023-34256] = "fixed-version: Fixed in version v6.1.29"
|
||||
|
||||
|
||||
# Backported to 6.1.9
|
||||
CVE_STATUS[CVE-2023-3358] = "cpe-stable-backport: Backported in version v6.1.9"
|
||||
|
||||
# Backported to 6.1.11
|
||||
CVE_STATUS[CVE-2023-3359] = "cpe-stable-backport: Backported in version v6.1.11"
|
||||
CVE_STATUS[CVE-2023-3161] = "cpe-stable-backport: Backported in version v6.1.11"
|
||||
|
||||
# Backported to 6.1.16
|
||||
CVE_STATUS[CVE-2023-3220] = "cpe-stable-backport: Backported in version v6.1.16"
|
||||
|
||||
# Backported to 6.1.28
|
||||
CVE_STATUS_GROUPS += "CVE_STATUS_KERNEL_6128"
|
||||
CVE_STATUS_KERNEL_6128 = "CVE-2023-3268 CVE-2023-35823 CVE-2023-35824 CVE-2023-35826 CVE-2023-35828 CVE-2023-35829"
|
||||
CVE_STATUS_KERNEL_6122[status] = "cpe-stable-backport: Backported in version v6.1.28"
|
||||
|
||||
# Backported to 6.1.30
|
||||
# Backported to 6.1.30 as 9a342d4
|
||||
CVE_STATUS[CVE-2023-3090] = "cpe-stable-backport: Backported in version v6.1.30"
|
||||
CVE_STATUS[CVE-2023-3141] = "cpe-stable-backport: Backported in version v6.1.30 as 9a342d4"
|
||||
|
||||
# Backported to 6.1.33
|
||||
CVE_STATUS_GROUPS += "CVE_STATUS_KERNEL_6133"
|
||||
CVE_STATUS_KERNEL_6133 = "CVE-2023-2124 CVE-2023-3212 CVE-2023-35788"
|
||||
CVE_STATUS_KERNEL_6133[status] = "cpe-stable-backport: Backported in version v6.1.33"
|
||||
|
||||
# Backported to 6.1.35
|
||||
CVE_STATUS[CVE-2023-3117] = "cpe-stable-backport: Backported in version v6.1.35"
|
||||
CVE_STATUS[CVE-2023-3390] = "cpe-stable-backport: Backported in version v6.1.35"
|
||||
|
||||
# Backported to 6.1.36
|
||||
CVE_STATUS[CVE-2023-3389] = "cpe-stable-backport: Backported in version v6.1.36"
|
||||
|
||||
# Only in 6.2.0 to 6.2.14, and 6.3.0 to 6.3.1
|
||||
CVE_STATUS[CVE-2023-3312] = "not-applicable-config: Only in versions v6.2.0 to v6.2.4 and v6.3.0 to v6.3.1"
|
||||
|
||||
|
||||
# https://nvd.nist.gov/vuln/detail/CVE-2023-23005
|
||||
# Introduced in version v6.1 7b88bda3761b95856cf97822efe8281c8100067b
|
||||
# Patched in kernel since v6.2 4a625ceee8a0ab0273534cb6b432ce6b331db5ee
|
||||
# But, the CVE is disputed:
|
||||
CVE_STATUS[CVE-2023-23005] = "disputed: There are no realistic cases \
|
||||
in which a user can cause the alloc_memory_type error case to be reached. \
|
||||
See: https://bugzilla.suse.com/show_bug.cgi?id=1208844#c2"
|
||||
|
||||
CVE_STATUS[CVE-2023-28464] = "not-applicable-config: Only in 6.3-rc"
|
||||
+69
@@ -0,0 +1,69 @@
|
||||
From d14450f9e0f05ea7177c5404a7a9289352caab77 Mon Sep 17 00:00:00 2001
|
||||
From: Khem Raj <raj.khem@gmail.com>
|
||||
Date: Mon, 23 Jan 2023 13:04:10 -0800
|
||||
Subject: [PATCH] perf cpumap: Make counter as unsigned ints
|
||||
|
||||
These are loop counters which is inherently unsigned. Therefore make
|
||||
them unsigned. Moreover it also fixes alloc-size-larger-than
|
||||
error with gcc-13, where malloc can be called with (-1) due to tmp_len
|
||||
being an int type.
|
||||
|
||||
Fixes
|
||||
| cpumap.c:366:20: error: argument 1 range [18446744065119617024, 18446744073709551612] exceeds maximum object size 9223372036854775807 [-Werror=alloc-size-larger-than=]
|
||||
| 366 | tmp_cpus = malloc(tmp_len * sizeof(struct perf_cpu));
|
||||
| | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||
|
||||
Signed-off-by: Khem Raj <raj.khem@gmail.com>
|
||||
Cc: Peter Zijlstra <peterz@infradead.org>
|
||||
Cc: Ingo Molnar <mingo@redhat.com>
|
||||
Cc: Arnaldo Carvalho de Melo <acme@kernel.org>
|
||||
Cc: Mark Rutland <mark.rutland@arm.com>
|
||||
Cc: Alexander Shishkin <alexander.shishkin@linux.intel.com>
|
||||
Cc: Jiri Olsa <jolsa@kernel.org>
|
||||
Cc: Namhyung Kim <namhyung@kernel.org>
|
||||
|
||||
Upstream-Status: Submitted [https://lore.kernel.org/linux-perf-users/20230123211310.127532-1-raj.khem@gmail.com/T/#u]
|
||||
---
|
||||
tools/lib/perf/cpumap.c | 10 +++++-----
|
||||
1 file changed, 5 insertions(+), 5 deletions(-)
|
||||
|
||||
diff --git a/tools/lib/perf/cpumap.c b/tools/lib/perf/cpumap.c
|
||||
index 6cd0be7c1bb4..d960880dd903 100644
|
||||
--- a/tools/lib/perf/cpumap.c
|
||||
+++ b/tools/lib/perf/cpumap.c
|
||||
@@ -351,8 +351,8 @@ struct perf_cpu_map *perf_cpu_map__merge(struct perf_cpu_map *orig,
|
||||
struct perf_cpu_map *other)
|
||||
{
|
||||
struct perf_cpu *tmp_cpus;
|
||||
- int tmp_len;
|
||||
- int i, j, k;
|
||||
+ unsigned int tmp_len;
|
||||
+ unsigned int i, j, k;
|
||||
struct perf_cpu_map *merged;
|
||||
|
||||
if (perf_cpu_map__is_subset(orig, other))
|
||||
@@ -369,7 +369,7 @@ struct perf_cpu_map *perf_cpu_map__merge(struct perf_cpu_map *orig,
|
||||
|
||||
/* Standard merge algorithm from wikipedia */
|
||||
i = j = k = 0;
|
||||
- while (i < orig->nr && j < other->nr) {
|
||||
+ while (i < (unsigned int)orig->nr && j < (unsigned int)other->nr) {
|
||||
if (orig->map[i].cpu <= other->map[j].cpu) {
|
||||
if (orig->map[i].cpu == other->map[j].cpu)
|
||||
j++;
|
||||
@@ -378,10 +378,10 @@ struct perf_cpu_map *perf_cpu_map__merge(struct perf_cpu_map *orig,
|
||||
tmp_cpus[k++] = other->map[j++];
|
||||
}
|
||||
|
||||
- while (i < orig->nr)
|
||||
+ while (i < (unsigned int)orig->nr)
|
||||
tmp_cpus[k++] = orig->map[i++];
|
||||
|
||||
- while (j < other->nr)
|
||||
+ while (j < (unsigned int)other->nr)
|
||||
tmp_cpus[k++] = other->map[j++];
|
||||
assert(k <= tmp_len);
|
||||
|
||||
--
|
||||
2.39.1
|
||||
|
||||
@@ -0,0 +1,392 @@
|
||||
SUMMARY = "Linux kernel Development Source"
|
||||
DESCRIPTION = "Development source linux kernel. When built, this recipe packages the \
|
||||
source of the preferred virtual/kernel provider and makes it available for full kernel \
|
||||
development or external module builds"
|
||||
|
||||
SECTION = "kernel"
|
||||
|
||||
LICENSE = "GPL-2.0-only"
|
||||
|
||||
inherit linux-kernel-base
|
||||
|
||||
# Whilst not a module, this ensures we don't get multilib extended (which would make no sense)
|
||||
inherit module-base
|
||||
|
||||
# We need the kernel to be staged (unpacked, patched and configured) before
|
||||
# we can grab the source and make the source package. We also need the bits from
|
||||
# ${B} not to change while we install, so virtual/kernel must finish do_compile.
|
||||
do_install[depends] += "virtual/kernel:do_shared_workdir"
|
||||
# Need the source, not just the output of populate_sysroot
|
||||
do_install[depends] += "virtual/kernel:do_install"
|
||||
|
||||
# There's nothing to do here, except install the source where we can package it
|
||||
do_fetch[noexec] = "1"
|
||||
do_unpack[noexec] = "1"
|
||||
do_patch[noexec] = "1"
|
||||
do_configure[noexec] = "1"
|
||||
do_compile[noexec] = "1"
|
||||
deltask do_populate_sysroot
|
||||
|
||||
S = "${STAGING_KERNEL_DIR}"
|
||||
B = "${STAGING_KERNEL_BUILDDIR}"
|
||||
|
||||
PACKAGE_ARCH = "${MACHINE_ARCH}"
|
||||
|
||||
KERNEL_BUILD_ROOT="${nonarch_base_libdir}/modules/"
|
||||
|
||||
do_install() {
|
||||
kerneldir=${D}${KERNEL_BUILD_ROOT}${KERNEL_VERSION}
|
||||
install -d $kerneldir
|
||||
|
||||
# create the directory structure
|
||||
rm -f $kerneldir/build
|
||||
rm -f $kerneldir/source
|
||||
mkdir -p $kerneldir/build
|
||||
|
||||
# for compatibility with some older variants of this package, we
|
||||
# create a /usr/src/kernel symlink to /lib/modules/<version>/source
|
||||
mkdir -p ${D}/usr/src
|
||||
(
|
||||
cd ${D}/usr/src
|
||||
ln -rs ${D}${KERNEL_BUILD_ROOT}${KERNEL_VERSION}/source kernel
|
||||
)
|
||||
|
||||
# for on target purposes, we unify build and source
|
||||
(
|
||||
cd $kerneldir
|
||||
ln -s build source
|
||||
)
|
||||
|
||||
# first copy everything
|
||||
(
|
||||
cd ${S}
|
||||
cp --parents $(find -type f -name "Makefile*" -o -name "Kconfig*") $kerneldir/build
|
||||
cp --parents $(find -type f -name "Build" -o -name "Build.include") $kerneldir/build
|
||||
)
|
||||
|
||||
# then drop all but the needed Makefiles/Kconfig files
|
||||
rm -rf $kerneldir/build/scripts
|
||||
rm -rf $kerneldir/build/include
|
||||
|
||||
# now copy in parts from the build that we'll need later
|
||||
(
|
||||
cd ${B}
|
||||
|
||||
if [ -s Module.symvers ]; then
|
||||
cp Module.symvers $kerneldir/build
|
||||
fi
|
||||
cp System.map* $kerneldir/build
|
||||
if [ -s Module.markers ]; then
|
||||
cp Module.markers $kerneldir/build
|
||||
fi
|
||||
|
||||
cp -a .config $kerneldir/build
|
||||
|
||||
# This scripts copy blow up QA, so for now, we require a more
|
||||
# complex 'make scripts' to restore these, versus copying them
|
||||
# here. Left as a reference to indicate that we know the scripts must
|
||||
# be dealt with.
|
||||
# cp -a scripts $kerneldir/build
|
||||
|
||||
# although module.lds can be regenerated on target via 'make modules_prepare'
|
||||
# there are several places where 'makes scripts prepare' is done, and that won't
|
||||
# regenerate the file. So we copy it onto the target as a migration to using
|
||||
# modules_prepare
|
||||
cp -a --parents scripts/module.lds $kerneldir/build/ 2>/dev/null || :
|
||||
|
||||
if [ -d arch/${ARCH}/scripts ]; then
|
||||
cp -a arch/${ARCH}/scripts $kerneldir/build/arch/${ARCH}
|
||||
fi
|
||||
if [ -f arch/${ARCH}/*lds ]; then
|
||||
cp -a arch/${ARCH}/*lds $kerneldir/build/arch/${ARCH}
|
||||
fi
|
||||
|
||||
rm -f $kerneldir/build/scripts/*.o
|
||||
rm -f $kerneldir/build/scripts/*/*.o
|
||||
|
||||
if [ "${ARCH}" = "powerpc" ]; then
|
||||
if [ -e arch/powerpc/lib/crtsavres.S ] ||
|
||||
[ -e arch/powerpc/lib/crtsavres.o ]; then
|
||||
cp -a --parents arch/powerpc/lib/crtsavres.[So] $kerneldir/build/
|
||||
fi
|
||||
fi
|
||||
|
||||
if [ "${ARCH}" = "arm64" -o "${ARCH}" = "riscv" ]; then
|
||||
if [ -e arch/${ARCH}/kernel/vdso/vdso.lds ]; then
|
||||
cp -a --parents arch/${ARCH}/kernel/vdso/vdso.lds $kerneldir/build/
|
||||
fi
|
||||
fi
|
||||
if [ "${ARCH}" = "powerpc" ]; then
|
||||
cp -a --parents arch/powerpc/kernel/vdso32/vdso32.lds $kerneldir/build 2>/dev/null || :
|
||||
cp -a --parents arch/powerpc/kernel/vdso64/vdso64.lds $kerneldir/build 2>/dev/null || :
|
||||
# v5.19+
|
||||
cp -a --parents arch/powerpc/kernel/vdso/vdso*.lds $kerneldir/build 2>/dev/null || :
|
||||
fi
|
||||
|
||||
cp -a include $kerneldir/build/include
|
||||
|
||||
# we don't usually copy generated files, since they can be rebuilt on the target,
|
||||
# but without this file, we get a forced syncconfig run in v5.8+, which prompts and
|
||||
# breaks workflows.
|
||||
cp -a --parents include/generated/autoconf.h $kerneldir/build 2>/dev/null || :
|
||||
|
||||
if [ -e $kerneldir/include/generated/.vdso-offsets.h.cmd ] ||
|
||||
[ -e $kerneldir/build/include/generated/.vdso-offsets.h.cmd ] ||
|
||||
[ -e $kerneldir/build/include/generated/.vdso32-offsets.h.cmd ] ; then
|
||||
rm -f $kerneldir/include/generated/.vdso-offsets.h.cmd
|
||||
rm -f $kerneldir/build/include/generated/.vdso-offsets.h.cmd
|
||||
rm -f $kerneldir/build/include/generated/.vdso32-offsets.h.cmd
|
||||
fi
|
||||
)
|
||||
|
||||
# now grab the chunks from the source tree that we need
|
||||
(
|
||||
cd ${S}
|
||||
|
||||
cp -a scripts $kerneldir/build
|
||||
|
||||
# for v6.1+ (otherwise we are missing multiple default targets)
|
||||
cp -a --parents Kbuild $kerneldir/build 2>/dev/null || :
|
||||
|
||||
# if our build dir had objtool, it will also be rebuilt on target, so
|
||||
# we copy what is required for that build
|
||||
if [ -f ${B}/tools/objtool/objtool ]; then
|
||||
# these are a few files associated with objtool, since we'll need to
|
||||
# rebuild it
|
||||
cp -a --parents tools/build/Build.include $kerneldir/build/
|
||||
cp -a --parents tools/build/Build $kerneldir/build/
|
||||
cp -a --parents tools/build/fixdep.c $kerneldir/build/
|
||||
cp -a --parents tools/scripts/utilities.mak $kerneldir/build/
|
||||
|
||||
# extra files, just in case
|
||||
cp -a --parents tools/objtool/* $kerneldir/build/
|
||||
cp -a --parents tools/lib/* $kerneldir/build/
|
||||
cp -a --parents tools/lib/subcmd/* $kerneldir/build/
|
||||
|
||||
cp -a --parents tools/include/* $kerneldir/build/
|
||||
|
||||
cp -a --parents $(find tools/arch/${ARCH}/ -type f) $kerneldir/build/
|
||||
fi
|
||||
|
||||
if [ "${ARCH}" = "arm64" ]; then
|
||||
# arch/arm64/include/asm/xen references arch/arm
|
||||
cp -a --parents arch/arm/include/asm/xen $kerneldir/build/
|
||||
# arch/arm64/include/asm/opcodes.h references arch/arm
|
||||
cp -a --parents arch/arm/include/asm/opcodes.h $kerneldir/build/
|
||||
|
||||
# v6.1+
|
||||
cp -a --parents arch/arm64/kernel/asm-offsets.c $kerneldir/build/
|
||||
|
||||
cp -a --parents arch/arm64/kernel/vdso/*gettimeofday.* $kerneldir/build/
|
||||
cp -a --parents arch/arm64/kernel/vdso/sigreturn.S $kerneldir/build/
|
||||
cp -a --parents arch/arm64/kernel/vdso/note.S $kerneldir/build/
|
||||
cp -a --parents arch/arm64/kernel/vdso/gen_vdso_offsets.sh $kerneldir/build/
|
||||
|
||||
cp -a --parents arch/arm64/kernel/module.lds $kerneldir/build/ 2>/dev/null || :
|
||||
|
||||
# 5.13+ needs these tools
|
||||
cp -a --parents arch/arm64/tools/gen-cpucaps.awk $kerneldir/build/ 2>/dev/null || :
|
||||
cp -a --parents arch/arm64/tools/cpucaps $kerneldir/build/ 2>/dev/null || :
|
||||
|
||||
# 5.19+
|
||||
cp -a --parents arch/arm64/tools/gen-sysreg.awk $kerneldir/build/ 2>/dev/null || :
|
||||
cp -a --parents arch/arm64/tools/sysreg $kerneldir/build/ 2>/dev/null || :
|
||||
|
||||
if [ -e $kerneldir/build/arch/arm64/tools/gen-cpucaps.awk ]; then
|
||||
sed -i -e "s,#!.*awk.*,#!${USRBINPATH}/env awk," $kerneldir/build/arch/arm64/tools/gen-cpucaps.awk
|
||||
fi
|
||||
if [ -e $kerneldir/build/arch/arm64/tools/gen-sysreg.awk ]; then
|
||||
sed -i -e "s,#!.*awk.*,#!${USRBINPATH}/env awk," $kerneldir/build/arch/arm64/tools/gen-sysreg.awk
|
||||
fi
|
||||
fi
|
||||
|
||||
if [ "${ARCH}" = "powerpc" ]; then
|
||||
# 5.0 needs these files, but don't error if they aren't present in the source
|
||||
cp -a --parents arch/${ARCH}/kernel/syscalls/syscall.tbl $kerneldir/build/ 2>/dev/null || :
|
||||
cp -a --parents arch/${ARCH}/kernel/syscalls/syscalltbl.sh $kerneldir/build/ 2>/dev/null || :
|
||||
cp -a --parents arch/${ARCH}/kernel/syscalls/syscallhdr.sh $kerneldir/build/ 2>/dev/null || :
|
||||
cp -a --parents arch/${ARCH}/kernel/vdso32/* $kerneldir/build/ 2>/dev/null || :
|
||||
cp -a --parents arch/${ARCH}/kernel/vdso64/* $kerneldir/build/ 2>/dev/null || :
|
||||
|
||||
# v5.19+
|
||||
cp -a --parents arch/powerpc/kernel/vdso/*.S $kerneldir/build 2>/dev/null || :
|
||||
cp -a --parents arch/powerpc/kernel/vdso/*gettimeofday.* $kerneldir/build 2>/dev/null || :
|
||||
cp -a --parents arch/powerpc/kernel/vdso/gen_vdso*_offsets.sh $kerneldir/build/ 2>/dev/null || :
|
||||
|
||||
# v6,1+
|
||||
cp -a --parents arch/powerpc/kernel/asm-offsets.c $kerneldir/build/ 2>/dev/null || :
|
||||
cp -a --parents arch/powerpc/kernel/head_booke.h $kerneldir/build/ 2>/dev/null || :
|
||||
fi
|
||||
if [ "${ARCH}" = "riscv" ]; then
|
||||
cp -a --parents arch/riscv/kernel/vdso/*gettimeofday.* $kerneldir/build/
|
||||
cp -a --parents arch/riscv/kernel/vdso/note.S $kerneldir/build/
|
||||
if [ -e arch/riscv/kernel/vdso/gen_vdso_offsets.sh ]; then
|
||||
cp -a --parents arch/riscv/kernel/vdso/gen_vdso_offsets.sh $kerneldir/build/
|
||||
fi
|
||||
cp -a --parents arch/riscv/kernel/vdso/* $kerneldir/build/ 2>/dev/null || :
|
||||
fi
|
||||
|
||||
# include the machine specific headers for ARM variants, if available.
|
||||
if [ "${ARCH}" = "arm" ]; then
|
||||
cp -a --parents arch/${ARCH}/mach-*/include $kerneldir/build/
|
||||
|
||||
# include a few files for 'make prepare'
|
||||
cp -a --parents arch/arm/tools/gen-mach-types $kerneldir/build/
|
||||
cp -a --parents arch/arm/tools/mach-types $kerneldir/build/
|
||||
|
||||
# 5.19+
|
||||
cp -a --parents arch/arm/tools/gen-sysreg.awk $kerneldir/build/ 2>/dev/null || :
|
||||
|
||||
# ARM syscall table tools only exist for kernels v4.10 or later
|
||||
SYSCALL_TOOLS=$(find arch/arm/tools -name "syscall*")
|
||||
if [ -n "$SYSCALL_TOOLS" ] ; then
|
||||
cp -a --parents $SYSCALL_TOOLS $kerneldir/build/
|
||||
fi
|
||||
|
||||
cp -a --parents arch/arm/kernel/module.lds $kerneldir/build/ 2>/dev/null || :
|
||||
# v6.1+
|
||||
cp -a --parents arch/arm/kernel/asm-offsets.c $kerneldir/build/ 2>/dev/null || :
|
||||
cp -a --parents arch/arm/kernel/signal.h $kerneldir/build/ 2>/dev/null || :
|
||||
fi
|
||||
|
||||
if [ -d arch/${ARCH}/include ]; then
|
||||
cp -a --parents arch/${ARCH}/include $kerneldir/build/
|
||||
fi
|
||||
|
||||
cp -a include $kerneldir/build
|
||||
|
||||
cp -a --parents lib/vdso/* $kerneldir/build/ 2>/dev/null || :
|
||||
|
||||
cp -a --parents tools/include/tools/le_byteshift.h $kerneldir/build/
|
||||
cp -a --parents tools/include/tools/be_byteshift.h $kerneldir/build/
|
||||
|
||||
# required for generate missing syscalls prepare phase
|
||||
cp -a --parents $(find arch/x86 -type f -name "syscall_32.tbl") $kerneldir/build
|
||||
cp -a --parents $(find arch/arm -type f -name "*.tbl") $kerneldir/build 2>/dev/null || :
|
||||
|
||||
if [ "${ARCH}" = "x86" ]; then
|
||||
# files for 'make prepare' to succeed with kernel-devel
|
||||
cp -a --parents $(find arch/x86 -type f -name "syscall_32.tbl") $kerneldir/build/ 2>/dev/null || :
|
||||
cp -a --parents $(find arch/x86 -type f -name "syscalltbl.sh") $kerneldir/build/ 2>/dev/null || :
|
||||
cp -a --parents $(find arch/x86 -type f -name "syscallhdr.sh") $kerneldir/build/ 2>/dev/null || :
|
||||
cp -a --parents $(find arch/x86 -type f -name "syscall_64.tbl") $kerneldir/build/ 2>/dev/null || :
|
||||
cp -a --parents arch/x86/tools/relocs_32.c $kerneldir/build/
|
||||
cp -a --parents arch/x86/tools/relocs_64.c $kerneldir/build/
|
||||
cp -a --parents arch/x86/tools/relocs.c $kerneldir/build/
|
||||
cp -a --parents arch/x86/tools/relocs_common.c $kerneldir/build/
|
||||
cp -a --parents arch/x86/tools/relocs.h $kerneldir/build/
|
||||
cp -a --parents arch/x86/tools/gen-insn-attr-x86.awk $kerneldir/build/ 2>/dev/null || :
|
||||
cp -a --parents arch/x86/purgatory/purgatory.c $kerneldir/build/
|
||||
|
||||
# 4.18 + have unified the purgatory files, so we ignore any errors if
|
||||
# these files are not present
|
||||
cp -a --parents arch/x86/purgatory/sha256.h $kerneldir/build/ 2>/dev/null || :
|
||||
cp -a --parents arch/x86/purgatory/sha256.c $kerneldir/build/ 2>/dev/null || :
|
||||
|
||||
cp -a --parents arch/x86/purgatory/stack.S $kerneldir/build/
|
||||
cp -a --parents arch/x86/purgatory/string.c $kerneldir/build/ 2>/dev/null || :
|
||||
cp -a --parents arch/x86/purgatory/setup-x86_64.S $kerneldir/build/
|
||||
cp -a --parents arch/x86/purgatory/entry64.S $kerneldir/build/
|
||||
cp -a --parents arch/x86/boot/string.h $kerneldir/build/
|
||||
cp -a --parents arch/x86/boot/string.c $kerneldir/build/
|
||||
cp -a --parents arch/x86/boot/compressed/string.c $kerneldir/build/ 2>/dev/null || :
|
||||
cp -a --parents arch/x86/boot/ctype.h $kerneldir/build/
|
||||
|
||||
# objtool requires these files
|
||||
cp -a --parents arch/x86/lib/inat.c $kerneldir/build/ 2>/dev/null || :
|
||||
cp -a --parents arch/x86/lib/insn.c $kerneldir/build/ 2>/dev/null || :
|
||||
|
||||
# v6.1+
|
||||
cp -a --parents arch/x86/kernel/asm-offsets* $kerneldir/build || :
|
||||
# for capabilities.h, vmx.h
|
||||
cp -a --parents arch/x86/kvm/vmx/*.h $kerneldir/build || :
|
||||
# for lapic.h, hyperv.h ....
|
||||
cp -a --parents arch/x86/kvm/*.h $kerneldir/build || :
|
||||
fi
|
||||
|
||||
# moved from arch/mips to all arches for v6.1+
|
||||
cp -a --parents kernel/time/timeconst.bc $kerneldir/build 2>/dev/null || :
|
||||
cp -a --parents kernel/bounds.c $kerneldir/build 2>/dev/null || :
|
||||
|
||||
if [ "${ARCH}" = "mips" ]; then
|
||||
cp -a --parents arch/mips/Kbuild.platforms $kerneldir/build/
|
||||
cp --parents $(find -type f -name "Platform") $kerneldir/build
|
||||
cp --parents arch/mips/boot/tools/relocs* $kerneldir/build
|
||||
cp -a --parents arch/mips/kernel/asm-offsets.c $kerneldir/build
|
||||
cp -a --parents Kbuild $kerneldir/build
|
||||
cp -a --parents arch/mips/kernel/syscalls/*.sh $kerneldir/build 2>/dev/null || :
|
||||
cp -a --parents arch/mips/kernel/syscalls/*.tbl $kerneldir/build 2>/dev/null || :
|
||||
cp -a --parents arch/mips/tools/elf-entry.c $kerneldir/build 2>/dev/null || :
|
||||
fi
|
||||
|
||||
# required to build scripts/selinux/genheaders/genheaders
|
||||
cp -a --parents security/selinux/include/* $kerneldir/build/
|
||||
|
||||
# copy any localversion files
|
||||
cp -a localversion* $kerneldir/build/ 2>/dev/null || :
|
||||
)
|
||||
|
||||
# Make sure the Makefile and version.h have a matching timestamp so that
|
||||
# external modules can be built
|
||||
touch -r $kerneldir/build/Makefile $kerneldir/build/include/generated/uapi/linux/version.h
|
||||
|
||||
# This fixes a warning that the compilers don't match when building a module
|
||||
# Change: CONFIG_CC_VERSION_TEXT="x86_64-poky-linux-gcc (GCC) 12.2.0" to "gcc (GCC) 12.2.0"
|
||||
# #define CONFIG_CC_VERSION_TEXT "x86_64-poky-linux-gcc (GCC) 12.2.0" to "gcc (GCC) 12.2.0"
|
||||
sed -i 's/CONFIG_CC_VERSION_TEXT=".*\(gcc.*\)"/CONFIG_CC_VERSION_TEXT="\1"/' "$kerneldir/build/.config"
|
||||
sed -i 's/#define CONFIG_CC_VERSION_TEXT ".*\(gcc.*\)"/#define CONFIG_CC_VERSION_TEXT "\1"/' $kerneldir/build/include/generated/autoconf.h
|
||||
sed -i 's/CONFIG_CC_VERSION_TEXT=".*\(gcc.*\)"/CONFIG_CC_VERSION_TEXT="\1"/' $kerneldir/build/include/config/auto.conf
|
||||
|
||||
# make sure these are at least as old as the .config, or rebuilds will trigger
|
||||
touch -r $kerneldir/build/.config $kerneldir/build/include/generated/autoconf.h 2>/dev/null || :
|
||||
touch -r $kerneldir/build/.config $kerneldir/build/include/config/auto.conf* 2>/dev/null || :
|
||||
|
||||
if [ -e "$kerneldir/build/include/config/auto.conf.cmd" ]; then
|
||||
sed -i 's/ifneq "$(CC)" ".*-linux-.*gcc.*$/ifneq "$(CC)" "gcc"/' "$kerneldir/build/include/config/auto.conf.cmd"
|
||||
sed -i 's/ifneq "$(LD)" ".*-linux-.*ld.bfd.*$/ifneq "$(LD)" "ld"/' "$kerneldir/build/include/config/auto.conf.cmd"
|
||||
sed -i 's/ifneq "$(AR)" ".*-linux-.*ar.*$/ifneq "$(AR)" "ar"/' "$kerneldir/build/include/config/auto.conf.cmd"
|
||||
sed -i 's/ifneq "$(OBJCOPY)" ".*-linux-.*objcopy.*$/ifneq "$(OBJCOPY)" "objcopy"/' "$kerneldir/build/include/config/auto.conf.cmd"
|
||||
if [ "${ARCH}" = "powerpc" ]; then
|
||||
sed -i 's/ifneq "$(NM)" ".*-linux-.*nm.*$/ifneq "$(NM)" "nm --synthetic"/' "$kerneldir/build/include/config/auto.conf.cmd"
|
||||
else
|
||||
sed -i 's/ifneq "$(NM)" ".*-linux-.*nm.*$/ifneq "$(NM)" "nm"/' "$kerneldir/build/include/config/auto.conf.cmd"
|
||||
fi
|
||||
sed -i 's/ifneq "$(HOSTCXX)" ".*$/ifneq "$(HOSTCXX)" "g++"/' "$kerneldir/build/include/config/auto.conf.cmd"
|
||||
sed -i 's/ifneq "$(HOSTCC)" ".*$/ifneq "$(HOSTCC)" "gcc"/' "$kerneldir/build/include/config/auto.conf.cmd"
|
||||
sed -i 's/ifneq "$(CC_VERSION_TEXT)".*\(gcc.*\)"/ifneq "$(CC_VERSION_TEXT)" "\1"/' "$kerneldir/build/include/config/auto.conf.cmd"
|
||||
sed -i 's/ifneq "$(srctree)" ".*"/ifneq "$(srctree)" "."/' "$kerneldir/build/include/config/auto.conf.cmd"
|
||||
# we don't build against the defconfig, so make sure it isn't the trigger for syncconfig
|
||||
sed -i 's/ifneq "$(KBUILD_DEFCONFIG)".*"\(.*\)"/ifneq "\1" "\1"/' "$kerneldir/build/include/config/auto.conf.cmd"
|
||||
fi
|
||||
|
||||
# make the scripts python3 safe. We won't be running these, and if they are
|
||||
# left as /usr/bin/python rootfs assembly will fail, since we only have python3
|
||||
# in the RDEPENDS (and the python3 package does not include /usr/bin/python)
|
||||
for ss in $(find $kerneldir/build/scripts -type f -name '*'); do
|
||||
sed -i 's,/usr/bin/python2,/usr/bin/env python3,' "$ss"
|
||||
sed -i 's,/usr/bin/env python2,/usr/bin/env python3,' "$ss"
|
||||
sed -i 's,/usr/bin/python,/usr/bin/env python3,' "$ss"
|
||||
done
|
||||
|
||||
chown -R root:root ${D}
|
||||
}
|
||||
|
||||
# Ensure we don't race against "make scripts" during cpio
|
||||
do_install[lockfiles] = "${TMPDIR}/kernel-scripts.lock"
|
||||
|
||||
FILES:${PN} = "${KERNEL_BUILD_ROOT} ${KERNEL_SRC_PATH}"
|
||||
FILES:${PN}-dbg += "${KERNEL_BUILD_ROOT}*/build/scripts/*/.debug/*"
|
||||
|
||||
RDEPENDS:${PN} = "bc python3-core flex bison ${TCLIBC}-utils"
|
||||
# 4.15+ needs these next two RDEPENDS
|
||||
RDEPENDS:${PN} += "openssl-dev util-linux"
|
||||
# and x86 needs a bit more for 4.15+
|
||||
RDEPENDS:${PN} += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-dev', '', d)}"
|
||||
# powerpc needs elfutils on 6.3+
|
||||
RDEPENDS:${PN} += "${@bb.utils.contains('ARCH', 'powerpc', 'elfutils-dev', '', d)}"
|
||||
# 5.8+ needs gcc-plugins libmpc-dev
|
||||
RDEPENDS:${PN} += "gcc-plugins libmpc-dev"
|
||||
# 5.13+ needs awk for arm64
|
||||
RDEPENDS:${PN}:append:aarch64 = " gawk"
|
||||
# 5.13+ needs grep for powerpc
|
||||
RDEPENDS:${PN}:append:powerpc = " grep"
|
||||
@@ -0,0 +1,67 @@
|
||||
SUMMARY = "Dummy Linux kernel"
|
||||
DESCRIPTION = "Dummy Linux kernel, to be selected as the preferred \
|
||||
provider for virtual/kernel to satisfy dependencies for situations \
|
||||
where you wish to build the kernel externally from the build system."
|
||||
SECTION = "kernel"
|
||||
|
||||
LICENSE = "GPL-2.0-only"
|
||||
LIC_FILES_CHKSUM = "file://COPYING.GPL;md5=751419260aa954499f7abaabaa882bbe"
|
||||
|
||||
PROVIDES += "virtual/kernel"
|
||||
|
||||
inherit deploy linux-dummy
|
||||
|
||||
PACKAGES_DYNAMIC += "^kernel-module-.*"
|
||||
PACKAGES_DYNAMIC += "^kernel-image-.*"
|
||||
PACKAGES_DYNAMIC += "^kernel-firmware-.*"
|
||||
|
||||
PACKAGES += "kernel-modules kernel-vmlinux"
|
||||
FILES:kernel-modules = ""
|
||||
ALLOW_EMPTY:kernel-modules = "1"
|
||||
DESCRIPTION:kernel-modules = "Kernel modules meta package"
|
||||
FILES:kernel-vmlinux = ""
|
||||
ALLOW_EMPTY:kernel-vmlinux = "1"
|
||||
DESCRIPTION:kernel-vmlinux = "Kernel vmlinux meta package"
|
||||
|
||||
|
||||
INHIBIT_DEFAULT_DEPS = "1"
|
||||
|
||||
COMPATIBLE_HOST = ".*-linux"
|
||||
|
||||
PR = "r1"
|
||||
|
||||
SRC_URI = "file://COPYING.GPL"
|
||||
S = "${WORKDIR}"
|
||||
|
||||
do_configure() {
|
||||
:
|
||||
}
|
||||
|
||||
do_compile () {
|
||||
:
|
||||
}
|
||||
|
||||
do_compile_kernelmodules() {
|
||||
:
|
||||
}
|
||||
|
||||
do_shared_workdir () {
|
||||
:
|
||||
}
|
||||
|
||||
do_install() {
|
||||
:
|
||||
}
|
||||
|
||||
do_bundle_initramfs() {
|
||||
:
|
||||
}
|
||||
|
||||
do_deploy() {
|
||||
:
|
||||
}
|
||||
|
||||
addtask bundle_initramfs after do_install before do_deploy
|
||||
addtask deploy after do_install
|
||||
addtask shared_workdir after do_compile before do_install
|
||||
addtask compile_kernelmodules
|
||||
@@ -0,0 +1,339 @@
|
||||
GNU GENERAL PUBLIC LICENSE
|
||||
Version 2, June 1991
|
||||
|
||||
Copyright (C) 1989, 1991 Free Software Foundation, Inc.,
|
||||
51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
|
||||
Everyone is permitted to copy and distribute verbatim copies
|
||||
of this license document, but changing it is not allowed.
|
||||
|
||||
Preamble
|
||||
|
||||
The licenses for most software are designed to take away your
|
||||
freedom to share and change it. By contrast, the GNU General Public
|
||||
License is intended to guarantee your freedom to share and change free
|
||||
software--to make sure the software is free for all its users. This
|
||||
General Public License applies to most of the Free Software
|
||||
Foundation's software and to any other program whose authors commit to
|
||||
using it. (Some other Free Software Foundation software is covered by
|
||||
the GNU Lesser General Public License instead.) You can apply it to
|
||||
your programs, too.
|
||||
|
||||
When we speak of free software, we are referring to freedom, not
|
||||
price. Our General Public Licenses are designed to make sure that you
|
||||
have the freedom to distribute copies of free software (and charge for
|
||||
this service if you wish), that you receive source code or can get it
|
||||
if you want it, that you can change the software or use pieces of it
|
||||
in new free programs; and that you know you can do these things.
|
||||
|
||||
To protect your rights, we need to make restrictions that forbid
|
||||
anyone to deny you these rights or to ask you to surrender the rights.
|
||||
These restrictions translate to certain responsibilities for you if you
|
||||
distribute copies of the software, or if you modify it.
|
||||
|
||||
For example, if you distribute copies of such a program, whether
|
||||
gratis or for a fee, you must give the recipients all the rights that
|
||||
you have. You must make sure that they, too, receive or can get the
|
||||
source code. And you must show them these terms so they know their
|
||||
rights.
|
||||
|
||||
We protect your rights with two steps: (1) copyright the software, and
|
||||
(2) offer you this license which gives you legal permission to copy,
|
||||
distribute and/or modify the software.
|
||||
|
||||
Also, for each author's protection and ours, we want to make certain
|
||||
that everyone understands that there is no warranty for this free
|
||||
software. If the software is modified by someone else and passed on, we
|
||||
want its recipients to know that what they have is not the original, so
|
||||
that any problems introduced by others will not reflect on the original
|
||||
authors' reputations.
|
||||
|
||||
Finally, any free program is threatened constantly by software
|
||||
patents. We wish to avoid the danger that redistributors of a free
|
||||
program will individually obtain patent licenses, in effect making the
|
||||
program proprietary. To prevent this, we have made it clear that any
|
||||
patent must be licensed for everyone's free use or not licensed at all.
|
||||
|
||||
The precise terms and conditions for copying, distribution and
|
||||
modification follow.
|
||||
|
||||
GNU GENERAL PUBLIC LICENSE
|
||||
TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION
|
||||
|
||||
0. This License applies to any program or other work which contains
|
||||
a notice placed by the copyright holder saying it may be distributed
|
||||
under the terms of this General Public License. The "Program", below,
|
||||
refers to any such program or work, and a "work based on the Program"
|
||||
means either the Program or any derivative work under copyright law:
|
||||
that is to say, a work containing the Program or a portion of it,
|
||||
either verbatim or with modifications and/or translated into another
|
||||
language. (Hereinafter, translation is included without limitation in
|
||||
the term "modification".) Each licensee is addressed as "you".
|
||||
|
||||
Activities other than copying, distribution and modification are not
|
||||
covered by this License; they are outside its scope. The act of
|
||||
running the Program is not restricted, and the output from the Program
|
||||
is covered only if its contents constitute a work based on the
|
||||
Program (independent of having been made by running the Program).
|
||||
Whether that is true depends on what the Program does.
|
||||
|
||||
1. You may copy and distribute verbatim copies of the Program's
|
||||
source code as you receive it, in any medium, provided that you
|
||||
conspicuously and appropriately publish on each copy an appropriate
|
||||
copyright notice and disclaimer of warranty; keep intact all the
|
||||
notices that refer to this License and to the absence of any warranty;
|
||||
and give any other recipients of the Program a copy of this License
|
||||
along with the Program.
|
||||
|
||||
You may charge a fee for the physical act of transferring a copy, and
|
||||
you may at your option offer warranty protection in exchange for a fee.
|
||||
|
||||
2. You may modify your copy or copies of the Program or any portion
|
||||
of it, thus forming a work based on the Program, and copy and
|
||||
distribute such modifications or work under the terms of Section 1
|
||||
above, provided that you also meet all of these conditions:
|
||||
|
||||
a) You must cause the modified files to carry prominent notices
|
||||
stating that you changed the files and the date of any change.
|
||||
|
||||
b) You must cause any work that you distribute or publish, that in
|
||||
whole or in part contains or is derived from the Program or any
|
||||
part thereof, to be licensed as a whole at no charge to all third
|
||||
parties under the terms of this License.
|
||||
|
||||
c) If the modified program normally reads commands interactively
|
||||
when run, you must cause it, when started running for such
|
||||
interactive use in the most ordinary way, to print or display an
|
||||
announcement including an appropriate copyright notice and a
|
||||
notice that there is no warranty (or else, saying that you provide
|
||||
a warranty) and that users may redistribute the program under
|
||||
these conditions, and telling the user how to view a copy of this
|
||||
License. (Exception: if the Program itself is interactive but
|
||||
does not normally print such an announcement, your work based on
|
||||
the Program is not required to print an announcement.)
|
||||
|
||||
These requirements apply to the modified work as a whole. If
|
||||
identifiable sections of that work are not derived from the Program,
|
||||
and can be reasonably considered independent and separate works in
|
||||
themselves, then this License, and its terms, do not apply to those
|
||||
sections when you distribute them as separate works. But when you
|
||||
distribute the same sections as part of a whole which is a work based
|
||||
on the Program, the distribution of the whole must be on the terms of
|
||||
this License, whose permissions for other licensees extend to the
|
||||
entire whole, and thus to each and every part regardless of who wrote it.
|
||||
|
||||
Thus, it is not the intent of this section to claim rights or contest
|
||||
your rights to work written entirely by you; rather, the intent is to
|
||||
exercise the right to control the distribution of derivative or
|
||||
collective works based on the Program.
|
||||
|
||||
In addition, mere aggregation of another work not based on the Program
|
||||
with the Program (or with a work based on the Program) on a volume of
|
||||
a storage or distribution medium does not bring the other work under
|
||||
the scope of this License.
|
||||
|
||||
3. You may copy and distribute the Program (or a work based on it,
|
||||
under Section 2) in object code or executable form under the terms of
|
||||
Sections 1 and 2 above provided that you also do one of the following:
|
||||
|
||||
a) Accompany it with the complete corresponding machine-readable
|
||||
source code, which must be distributed under the terms of Sections
|
||||
1 and 2 above on a medium customarily used for software interchange; or,
|
||||
|
||||
b) Accompany it with a written offer, valid for at least three
|
||||
years, to give any third party, for a charge no more than your
|
||||
cost of physically performing source distribution, a complete
|
||||
machine-readable copy of the corresponding source code, to be
|
||||
distributed under the terms of Sections 1 and 2 above on a medium
|
||||
customarily used for software interchange; or,
|
||||
|
||||
c) Accompany it with the information you received as to the offer
|
||||
to distribute corresponding source code. (This alternative is
|
||||
allowed only for noncommercial distribution and only if you
|
||||
received the program in object code or executable form with such
|
||||
an offer, in accord with Subsection b above.)
|
||||
|
||||
The source code for a work means the preferred form of the work for
|
||||
making modifications to it. For an executable work, complete source
|
||||
code means all the source code for all modules it contains, plus any
|
||||
associated interface definition files, plus the scripts used to
|
||||
control compilation and installation of the executable. However, as a
|
||||
special exception, the source code distributed need not include
|
||||
anything that is normally distributed (in either source or binary
|
||||
form) with the major components (compiler, kernel, and so on) of the
|
||||
operating system on which the executable runs, unless that component
|
||||
itself accompanies the executable.
|
||||
|
||||
If distribution of executable or object code is made by offering
|
||||
access to copy from a designated place, then offering equivalent
|
||||
access to copy the source code from the same place counts as
|
||||
distribution of the source code, even though third parties are not
|
||||
compelled to copy the source along with the object code.
|
||||
|
||||
4. You may not copy, modify, sublicense, or distribute the Program
|
||||
except as expressly provided under this License. Any attempt
|
||||
otherwise to copy, modify, sublicense or distribute the Program is
|
||||
void, and will automatically terminate your rights under this License.
|
||||
However, parties who have received copies, or rights, from you under
|
||||
this License will not have their licenses terminated so long as such
|
||||
parties remain in full compliance.
|
||||
|
||||
5. You are not required to accept this License, since you have not
|
||||
signed it. However, nothing else grants you permission to modify or
|
||||
distribute the Program or its derivative works. These actions are
|
||||
prohibited by law if you do not accept this License. Therefore, by
|
||||
modifying or distributing the Program (or any work based on the
|
||||
Program), you indicate your acceptance of this License to do so, and
|
||||
all its terms and conditions for copying, distributing or modifying
|
||||
the Program or works based on it.
|
||||
|
||||
6. Each time you redistribute the Program (or any work based on the
|
||||
Program), the recipient automatically receives a license from the
|
||||
original licensor to copy, distribute or modify the Program subject to
|
||||
these terms and conditions. You may not impose any further
|
||||
restrictions on the recipients' exercise of the rights granted herein.
|
||||
You are not responsible for enforcing compliance by third parties to
|
||||
this License.
|
||||
|
||||
7. If, as a consequence of a court judgment or allegation of patent
|
||||
infringement or for any other reason (not limited to patent issues),
|
||||
conditions are imposed on you (whether by court order, agreement or
|
||||
otherwise) that contradict the conditions of this License, they do not
|
||||
excuse you from the conditions of this License. If you cannot
|
||||
distribute so as to satisfy simultaneously your obligations under this
|
||||
License and any other pertinent obligations, then as a consequence you
|
||||
may not distribute the Program at all. For example, if a patent
|
||||
license would not permit royalty-free redistribution of the Program by
|
||||
all those who receive copies directly or indirectly through you, then
|
||||
the only way you could satisfy both it and this License would be to
|
||||
refrain entirely from distribution of the Program.
|
||||
|
||||
If any portion of this section is held invalid or unenforceable under
|
||||
any particular circumstance, the balance of the section is intended to
|
||||
apply and the section as a whole is intended to apply in other
|
||||
circumstances.
|
||||
|
||||
It is not the purpose of this section to induce you to infringe any
|
||||
patents or other property right claims or to contest validity of any
|
||||
such claims; this section has the sole purpose of protecting the
|
||||
integrity of the free software distribution system, which is
|
||||
implemented by public license practices. Many people have made
|
||||
generous contributions to the wide range of software distributed
|
||||
through that system in reliance on consistent application of that
|
||||
system; it is up to the author/donor to decide if he or she is willing
|
||||
to distribute software through any other system and a licensee cannot
|
||||
impose that choice.
|
||||
|
||||
This section is intended to make thoroughly clear what is believed to
|
||||
be a consequence of the rest of this License.
|
||||
|
||||
8. If the distribution and/or use of the Program is restricted in
|
||||
certain countries either by patents or by copyrighted interfaces, the
|
||||
original copyright holder who places the Program under this License
|
||||
may add an explicit geographical distribution limitation excluding
|
||||
those countries, so that distribution is permitted only in or among
|
||||
countries not thus excluded. In such case, this License incorporates
|
||||
the limitation as if written in the body of this License.
|
||||
|
||||
9. The Free Software Foundation may publish revised and/or new versions
|
||||
of the General Public License from time to time. Such new versions will
|
||||
be similar in spirit to the present version, but may differ in detail to
|
||||
address new problems or concerns.
|
||||
|
||||
Each version is given a distinguishing version number. If the Program
|
||||
specifies a version number of this License which applies to it and "any
|
||||
later version", you have the option of following the terms and conditions
|
||||
either of that version or of any later version published by the Free
|
||||
Software Foundation. If the Program does not specify a version number of
|
||||
this License, you may choose any version ever published by the Free Software
|
||||
Foundation.
|
||||
|
||||
10. If you wish to incorporate parts of the Program into other free
|
||||
programs whose distribution conditions are different, write to the author
|
||||
to ask for permission. For software which is copyrighted by the Free
|
||||
Software Foundation, write to the Free Software Foundation; we sometimes
|
||||
make exceptions for this. Our decision will be guided by the two goals
|
||||
of preserving the free status of all derivatives of our free software and
|
||||
of promoting the sharing and reuse of software generally.
|
||||
|
||||
NO WARRANTY
|
||||
|
||||
11. BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY
|
||||
FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN
|
||||
OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES
|
||||
PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED
|
||||
OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
|
||||
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS
|
||||
TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE
|
||||
PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING,
|
||||
REPAIR OR CORRECTION.
|
||||
|
||||
12. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING
|
||||
WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR
|
||||
REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES,
|
||||
INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING
|
||||
OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED
|
||||
TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY
|
||||
YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER
|
||||
PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE
|
||||
POSSIBILITY OF SUCH DAMAGES.
|
||||
|
||||
END OF TERMS AND CONDITIONS
|
||||
|
||||
How to Apply These Terms to Your New Programs
|
||||
|
||||
If you develop a new program, and you want it to be of the greatest
|
||||
possible use to the public, the best way to achieve this is to make it
|
||||
free software which everyone can redistribute and change under these terms.
|
||||
|
||||
To do so, attach the following notices to the program. It is safest
|
||||
to attach them to the start of each source file to most effectively
|
||||
convey the exclusion of warranty; and each file should have at least
|
||||
the "copyright" line and a pointer to where the full notice is found.
|
||||
|
||||
<one line to give the program's name and a brief idea of what it does.>
|
||||
Copyright (C) <year> <name of author>
|
||||
|
||||
This program is free software; you can redistribute it and/or modify
|
||||
it under the terms of the GNU General Public License as published by
|
||||
the Free Software Foundation; either version 2 of the License, or
|
||||
(at your option) any later version.
|
||||
|
||||
This program is distributed in the hope that it will be useful,
|
||||
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
GNU General Public License for more details.
|
||||
|
||||
You should have received a copy of the GNU General Public License along
|
||||
with this program; if not, write to the Free Software Foundation, Inc.,
|
||||
51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
|
||||
|
||||
Also add information on how to contact you by electronic and paper mail.
|
||||
|
||||
If the program is interactive, make it output a short notice like this
|
||||
when it starts in an interactive mode:
|
||||
|
||||
Gnomovision version 69, Copyright (C) year name of author
|
||||
Gnomovision comes with ABSOLUTELY NO WARRANTY; for details type `show w'.
|
||||
This is free software, and you are welcome to redistribute it
|
||||
under certain conditions; type `show c' for details.
|
||||
|
||||
The hypothetical commands `show w' and `show c' should show the appropriate
|
||||
parts of the General Public License. Of course, the commands you use may
|
||||
be called something other than `show w' and `show c'; they could even be
|
||||
mouse-clicks or menu items--whatever suits your program.
|
||||
|
||||
You should also get your employer (if you work as a programmer) or your
|
||||
school, if any, to sign a "copyright disclaimer" for the program, if
|
||||
necessary. Here is a sample; alter the names:
|
||||
|
||||
Yoyodyne, Inc., hereby disclaims all copyright interest in the program
|
||||
`Gnomovision' (which makes passes at compilers) written by James Hacker.
|
||||
|
||||
<signature of Ty Coon>, 1 April 1989
|
||||
Ty Coon, President of Vice
|
||||
|
||||
This General Public License does not permit incorporating your program into
|
||||
proprietary programs. If your program is a subroutine library, you may
|
||||
consider it more useful to permit linking proprietary applications with the
|
||||
library. If this is what you want to do, use the GNU Lesser General
|
||||
Public License instead of this License.
|
||||
@@ -0,0 +1,66 @@
|
||||
# This recipe tracks the linux-yocto-dev repository as its upstream source.
|
||||
# Since this tree is frequently updated, and periodically rebuilt, AUTOREV is
|
||||
# used to track its contents.
|
||||
#
|
||||
# This recipe is just like other linux-yocto variants, with the only difference
|
||||
# being that to avoid network access during initial parsing, static SRCREVs are
|
||||
# provided and overridden if the preferred kernel provider is linux-yocto-dev.
|
||||
#
|
||||
# To enable this recipe, set PREFERRED_PROVIDER_virtual/kernel = "linux-yocto-dev"
|
||||
|
||||
inherit kernel
|
||||
require recipes-kernel/linux/linux-yocto.inc
|
||||
|
||||
# provide this .inc to set specific revisions
|
||||
include recipes-kernel/linux/linux-yocto-dev-revisions.inc
|
||||
|
||||
KBRANCH = "v6.4/standard/base"
|
||||
KMETA = "kernel-meta"
|
||||
|
||||
SRC_URI = "git://git.yoctoproject.org/linux-yocto-dev.git;branch=${KBRANCH};name=machine;protocol=https \
|
||||
git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=master;destsuffix=${KMETA};protocol=https"
|
||||
|
||||
# Set default SRCREVs. Both the machine and meta SRCREVs are statically set
|
||||
# to the korg v3.7 tag, and hence prevent network access during parsing. If
|
||||
# linux-yocto-dev is the preferred provider, they will be overridden to
|
||||
# AUTOREV in following anonymous python routine and resolved when the
|
||||
# variables are finalized.
|
||||
SRCREV_machine ?= '${@oe.utils.conditional("PREFERRED_PROVIDER_virtual/kernel", "linux-yocto-dev", "${AUTOREV}", "29594404d7fe73cd80eaa4ee8c43dcc53970c60e", d)}'
|
||||
SRCREV_meta ?= '${@oe.utils.conditional("PREFERRED_PROVIDER_virtual/kernel", "linux-yocto-dev", "${AUTOREV}", "29594404d7fe73cd80eaa4ee8c43dcc53970c60e", d)}'
|
||||
|
||||
LINUX_VERSION ?= "6.4"
|
||||
LINUX_VERSION_EXTENSION ?= "-yoctodev-${LINUX_KERNEL_TYPE}"
|
||||
PV = "${LINUX_VERSION}+git${SRCPV}"
|
||||
|
||||
LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46"
|
||||
|
||||
DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}"
|
||||
DEPENDS += "${@bb.utils.contains('ARCH', 'powerpc', 'elfutils-native', '', d)}"
|
||||
DEPENDS += "openssl-native util-linux-native"
|
||||
DEPENDS += "gmp-native libmpc-native"
|
||||
|
||||
# yaml and dtschema are required for 5.16+ device tree validation, libyaml is checked
|
||||
# via pkgconfig, so must always be present, but we can wrap the others to make them
|
||||
# conditional
|
||||
DEPENDS += "libyaml-native"
|
||||
|
||||
PACKAGECONFIG ??= ""
|
||||
PACKAGECONFIG[dt-validation] = ",,python3-dtschema-native"
|
||||
# we need the wrappers if validation isn't in the packageconfig
|
||||
DEPENDS += "${@bb.utils.contains('PACKAGECONFIG', 'dt-validation', '', 'python3-dtschema-wrapper-native', d)}"
|
||||
|
||||
COMPATIBLE_MACHINE = "^(qemuarmv5|qemuarm|qemuarm64|qemux86|qemuppc|qemumips|qemumips64|qemux86-64|qemuriscv32|qemuriscv64|qemuloongarch64)$"
|
||||
|
||||
KERNEL_DEVICETREE:qemuarmv5 = "versatile-pb.dtb"
|
||||
|
||||
# Functionality flags
|
||||
KERNEL_EXTRA_FEATURES ?= "features/netfilter/netfilter.scc features/taskstats/taskstats.scc"
|
||||
KERNEL_FEATURES:append = " ${KERNEL_EXTRA_FEATURES}"
|
||||
KERNEL_FEATURES:append:qemuall=" cfg/virtio.scc features/drm-bochs/drm-bochs.scc"
|
||||
KERNEL_FEATURES:append:qemux86=" cfg/sound.scc cfg/paravirt_kvm.scc"
|
||||
KERNEL_FEATURES:append:qemux86-64=" cfg/sound.scc cfg/paravirt_kvm.scc"
|
||||
KERNEL_FEATURES:append = " ${@bb.utils.contains("TUNE_FEATURES", "mx32", " cfg/x32.scc", "", d)}"
|
||||
KERNEL_FEATURES:append = " ${@bb.utils.contains("DISTRO_FEATURES", "ptest", " features/scsi/scsi-debug.scc", "", d)}"
|
||||
KERNEL_FEATURES:append = " ${@bb.utils.contains("DISTRO_FEATURES", "ptest", " features/gpio/mockup.scc", "", d)}"
|
||||
|
||||
KERNEL_VERSION_SANITY_SKIP = "1"
|
||||
@@ -0,0 +1,48 @@
|
||||
KBRANCH ?= "v6.1/standard/preempt-rt/base"
|
||||
|
||||
require recipes-kernel/linux/linux-yocto.inc
|
||||
|
||||
# CVE exclusions
|
||||
include recipes-kernel/linux/cve-exclusion_6.1.inc
|
||||
|
||||
# Skip processing of this recipe if it is not explicitly specified as the
|
||||
# PREFERRED_PROVIDER for virtual/kernel. This avoids errors when trying
|
||||
# to build multiple virtual/kernel providers, e.g. as dependency of
|
||||
# core-image-rt-sdk, core-image-rt.
|
||||
python () {
|
||||
if d.getVar("KERNEL_PACKAGE_NAME") == "kernel" and d.getVar("PREFERRED_PROVIDER_virtual/kernel") != "linux-yocto-rt":
|
||||
raise bb.parse.SkipRecipe("Set PREFERRED_PROVIDER_virtual/kernel to linux-yocto-rt to enable it")
|
||||
}
|
||||
|
||||
SRCREV_machine ?= "efb2c857761e865cd7947aab42eaa5ba77ef6ee7"
|
||||
SRCREV_meta ?= "cba89f406c6e07a16018cb77b51950cbae8ec654"
|
||||
|
||||
SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;branch=${KBRANCH};name=machine;protocol=https \
|
||||
git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.1;destsuffix=${KMETA};protocol=https"
|
||||
|
||||
LINUX_VERSION ?= "6.1.38"
|
||||
|
||||
LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46"
|
||||
|
||||
DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}"
|
||||
DEPENDS += "openssl-native util-linux-native"
|
||||
|
||||
PV = "${LINUX_VERSION}+git${SRCPV}"
|
||||
|
||||
KMETA = "kernel-meta"
|
||||
KCONF_BSP_AUDIT_LEVEL = "1"
|
||||
|
||||
LINUX_KERNEL_TYPE = "preempt-rt"
|
||||
|
||||
COMPATIBLE_MACHINE = "^(qemux86|qemux86-64|qemuarm|qemuarmv5|qemuarm64|qemuppc|qemumips)$"
|
||||
|
||||
KERNEL_DEVICETREE:qemuarmv5 = "versatile-pb.dtb"
|
||||
|
||||
# Functionality flags
|
||||
KERNEL_EXTRA_FEATURES ?= "features/netfilter/netfilter.scc features/taskstats/taskstats.scc"
|
||||
KERNEL_FEATURES:append = " ${KERNEL_EXTRA_FEATURES}"
|
||||
KERNEL_FEATURES:append:qemuall=" cfg/virtio.scc features/drm-bochs/drm-bochs.scc"
|
||||
KERNEL_FEATURES:append:qemux86=" cfg/sound.scc cfg/paravirt_kvm.scc"
|
||||
KERNEL_FEATURES:append:qemux86-64=" cfg/sound.scc cfg/paravirt_kvm.scc"
|
||||
KERNEL_FEATURES:append = "${@bb.utils.contains("DISTRO_FEATURES", "ptest", " features/scsi/scsi-debug.scc", "", d)}"
|
||||
KERNEL_FEATURES:append = "${@bb.utils.contains("DISTRO_FEATURES", "ptest", " features/gpio/mockup.scc", "", d)}"
|
||||
@@ -0,0 +1,48 @@
|
||||
KBRANCH ?= "v6.4/standard/preempt-rt/base"
|
||||
|
||||
require recipes-kernel/linux/linux-yocto.inc
|
||||
|
||||
# CVE exclusions
|
||||
include recipes-kernel/linux/cve-exclusion_6.4.inc
|
||||
|
||||
# Skip processing of this recipe if it is not explicitly specified as the
|
||||
# PREFERRED_PROVIDER for virtual/kernel. This avoids errors when trying
|
||||
# to build multiple virtual/kernel providers, e.g. as dependency of
|
||||
# core-image-rt-sdk, core-image-rt.
|
||||
python () {
|
||||
if d.getVar("KERNEL_PACKAGE_NAME") == "kernel" and d.getVar("PREFERRED_PROVIDER_virtual/kernel") != "linux-yocto-rt":
|
||||
raise bb.parse.SkipRecipe("Set PREFERRED_PROVIDER_virtual/kernel to linux-yocto-rt to enable it")
|
||||
}
|
||||
|
||||
SRCREV_machine ?= "917d160a84f61aada28d09f5afc04d6451fa52a0"
|
||||
SRCREV_meta ?= "dab56f52aa33b5cea1513b36b98e50a6c7c31f47"
|
||||
|
||||
SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;branch=${KBRANCH};name=machine;protocol=https \
|
||||
git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.4;destsuffix=${KMETA};protocol=https"
|
||||
|
||||
LINUX_VERSION ?= "6.4.3"
|
||||
|
||||
LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46"
|
||||
|
||||
DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}"
|
||||
DEPENDS += "openssl-native util-linux-native"
|
||||
|
||||
PV = "${LINUX_VERSION}+git${SRCPV}"
|
||||
|
||||
KMETA = "kernel-meta"
|
||||
KCONF_BSP_AUDIT_LEVEL = "1"
|
||||
|
||||
LINUX_KERNEL_TYPE = "preempt-rt"
|
||||
|
||||
COMPATIBLE_MACHINE = "^(qemux86|qemux86-64|qemuarm|qemuarmv5|qemuarm64|qemuppc|qemumips)$"
|
||||
|
||||
KERNEL_DEVICETREE:qemuarmv5 = "versatile-pb.dtb"
|
||||
|
||||
# Functionality flags
|
||||
KERNEL_EXTRA_FEATURES ?= "features/netfilter/netfilter.scc features/taskstats/taskstats.scc"
|
||||
KERNEL_FEATURES:append = " ${KERNEL_EXTRA_FEATURES}"
|
||||
KERNEL_FEATURES:append:qemuall=" cfg/virtio.scc features/drm-bochs/drm-bochs.scc"
|
||||
KERNEL_FEATURES:append:qemux86=" cfg/sound.scc cfg/paravirt_kvm.scc"
|
||||
KERNEL_FEATURES:append:qemux86-64=" cfg/sound.scc cfg/paravirt_kvm.scc"
|
||||
KERNEL_FEATURES:append = "${@bb.utils.contains("DISTRO_FEATURES", "ptest", " features/scsi/scsi-debug.scc", "", d)}"
|
||||
KERNEL_FEATURES:append = "${@bb.utils.contains("DISTRO_FEATURES", "ptest", " features/gpio/mockup.scc", "", d)}"
|
||||
@@ -0,0 +1,33 @@
|
||||
KBRANCH ?= "v6.1/standard/tiny/base"
|
||||
|
||||
LINUX_KERNEL_TYPE = "tiny"
|
||||
KCONFIG_MODE = "--allnoconfig"
|
||||
|
||||
require recipes-kernel/linux/linux-yocto.inc
|
||||
|
||||
# CVE exclusions
|
||||
include recipes-kernel/linux/cve-exclusion_6.1.inc
|
||||
|
||||
LINUX_VERSION ?= "6.1.38"
|
||||
LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46"
|
||||
|
||||
DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}"
|
||||
DEPENDS += "openssl-native util-linux-native"
|
||||
|
||||
KMETA = "kernel-meta"
|
||||
KCONF_BSP_AUDIT_LEVEL = "2"
|
||||
|
||||
SRCREV_machine ?= "b110cf9bbc395fe757956839d8110e72368699f4"
|
||||
SRCREV_meta ?= "cba89f406c6e07a16018cb77b51950cbae8ec654"
|
||||
|
||||
PV = "${LINUX_VERSION}+git${SRCPV}"
|
||||
|
||||
SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;branch=${KBRANCH};name=machine;protocol=https \
|
||||
git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.1;destsuffix=${KMETA};protocol=https"
|
||||
|
||||
COMPATIBLE_MACHINE = "^(qemux86|qemux86-64|qemuarm64|qemuarm|qemuarmv5)$"
|
||||
|
||||
# Functionality flags
|
||||
KERNEL_FEATURES = ""
|
||||
|
||||
KERNEL_DEVICETREE:qemuarmv5 = "versatile-pb.dtb"
|
||||
@@ -0,0 +1,33 @@
|
||||
KBRANCH ?= "v6.4/standard/tiny/base"
|
||||
|
||||
LINUX_KERNEL_TYPE = "tiny"
|
||||
KCONFIG_MODE = "--allnoconfig"
|
||||
|
||||
require recipes-kernel/linux/linux-yocto.inc
|
||||
|
||||
# CVE exclusions
|
||||
include recipes-kernel/linux/cve-exclusion_6.4.inc
|
||||
|
||||
LINUX_VERSION ?= "6.4.3"
|
||||
LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46"
|
||||
|
||||
DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}"
|
||||
DEPENDS += "openssl-native util-linux-native"
|
||||
|
||||
KMETA = "kernel-meta"
|
||||
KCONF_BSP_AUDIT_LEVEL = "2"
|
||||
|
||||
SRCREV_machine ?= "dee78ad1963cff9c063fba486d43fc9670285883"
|
||||
SRCREV_meta ?= "dab56f52aa33b5cea1513b36b98e50a6c7c31f47"
|
||||
|
||||
PV = "${LINUX_VERSION}+git${SRCPV}"
|
||||
|
||||
SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;branch=${KBRANCH};name=machine;protocol=https \
|
||||
git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.4;destsuffix=${KMETA};protocol=https"
|
||||
|
||||
COMPATIBLE_MACHINE = "^(qemux86|qemux86-64|qemuarm64|qemuarm|qemuarmv5)$"
|
||||
|
||||
# Functionality flags
|
||||
KERNEL_FEATURES = ""
|
||||
|
||||
KERNEL_DEVICETREE:qemuarmv5 = "versatile-pb.dtb"
|
||||
@@ -0,0 +1,78 @@
|
||||
SUMMARY = "Linux kernel"
|
||||
SECTION = "kernel"
|
||||
LICENSE = "GPL-2.0-only"
|
||||
HOMEPAGE = "https://www.yoctoproject.org/"
|
||||
|
||||
LIC_FILES_CHKSUM ?= "file://COPYING;md5=d7810fab7487fb0aad327b76f1be7cd7"
|
||||
|
||||
UPSTREAM_CHECK_GITTAGREGEX = "(?P<pver>\d+\.\d+(\.\d+)*)"
|
||||
|
||||
RECIPE_NO_UPDATE_REASON = "Recipe is updated through a separate process"
|
||||
|
||||
# Skip processing of this recipe if it is not explicitly specified as the
|
||||
# PREFERRED_PROVIDER for virtual/kernel. This avoids network access required
|
||||
# by the use of AUTOREV SRCREVs, which are the default for this recipe.
|
||||
python () {
|
||||
if d.getVar("KERNEL_PACKAGE_NAME") == "kernel" and d.getVar("PREFERRED_PROVIDER_virtual/kernel") != d.getVar("PN"):
|
||||
d.delVar("BB_DONT_CACHE")
|
||||
raise bb.parse.SkipRecipe("Set PREFERRED_PROVIDER_virtual/kernel to %s to enable it" % (d.getVar("PN")))
|
||||
}
|
||||
|
||||
DEPENDS += "xz-native bc-native"
|
||||
DEPENDS:append:aarch64 = " libgcc"
|
||||
KERNEL_CC:append:aarch64 = " ${TOOLCHAIN_OPTIONS}"
|
||||
KERNEL_LD:append:aarch64 = " ${TOOLCHAIN_OPTIONS}"
|
||||
|
||||
DEPENDS:append:nios2 = " libgcc"
|
||||
KERNEL_CC:append:nios2 = " ${TOOLCHAIN_OPTIONS}"
|
||||
KERNEL_LD:append:nios2 = " ${TOOLCHAIN_OPTIONS}"
|
||||
|
||||
DEPENDS:append:arc = " libgcc"
|
||||
KERNEL_CC:append:arc = " ${TOOLCHAIN_OPTIONS}"
|
||||
KERNEL_LD:append:arc = " ${TOOLCHAIN_OPTIONS}"
|
||||
|
||||
KERNEL_FEATURES:append:qemuall=" features/debug/printk.scc features/taskstats/taskstats.scc"
|
||||
|
||||
KERNEL_FEATURES:append = " ${@bb.utils.contains('MACHINE_FEATURES', 'efi', 'cfg/efi.scc', '', d)}"
|
||||
KERNEL_FEATURES:append = " ${@bb.utils.contains('MACHINE_FEATURES', 'numa', 'features/numa/numa.scc', '', d)}"
|
||||
KERNEL_FEATURES:append = " ${@bb.utils.contains('MACHINE_FEATURES', 'vfat', 'cfg/fs/vfat.scc', '', d)}"
|
||||
|
||||
# A KMACHINE is the mapping of a yocto $MACHINE to what is built
|
||||
# by the kernel. This is typically the branch that should be built,
|
||||
# and it can be specific to the machine or shared
|
||||
# KMACHINE = "UNDEFINED"
|
||||
|
||||
LINUX_VERSION_EXTENSION ??= "-yocto-${LINUX_KERNEL_TYPE}"
|
||||
|
||||
# Pick up shared functions
|
||||
inherit kernel
|
||||
inherit kernel-yocto
|
||||
|
||||
B = "${WORKDIR}/linux-${PACKAGE_ARCH}-${LINUX_KERNEL_TYPE}-build"
|
||||
|
||||
do_install:append(){
|
||||
if [ -n "${KMETA}" ]; then
|
||||
rm -rf ${STAGING_KERNEL_DIR}/${KMETA}
|
||||
fi
|
||||
}
|
||||
|
||||
# enable kernel-sample for oeqa/runtime/cases's ksample.py test
|
||||
KERNEL_FEATURES:append:qemuall=" features/kernel-sample/kernel-sample.scc"
|
||||
|
||||
KERNEL_DEBUG ?= ""
|
||||
# These used to be version specific, but are now common dependencies. New
|
||||
# tools / dependencies will continue to be added in version specific recipes.
|
||||
DEPENDS += '${@bb.utils.contains_any("ARCH", [ "x86", "arm64", "powerpc" ], "elfutils-native", "", d)}'
|
||||
DEPENDS += "openssl-native util-linux-native"
|
||||
DEPENDS += "gmp-native libmpc-native"
|
||||
DEPENDS += '${@bb.utils.contains("KERNEL_DEBUG", "True", "pahole-native", "", d)}'
|
||||
EXTRA_OEMAKE += '${@bb.utils.contains("KERNEL_DEBUG", "True", "", "PAHOLE=false", d)}'
|
||||
|
||||
do_devshell:prepend() {
|
||||
# setup native pkg-config variables (kconfig scripts call pkg-config directly, cannot generically be overriden to pkg-config-native)
|
||||
d.setVar("PKG_CONFIG_DIR", "${STAGING_DIR_NATIVE}${libdir_native}/pkgconfig")
|
||||
d.setVar("PKG_CONFIG_PATH", "${PKG_CONFIG_DIR}:${STAGING_DATADIR_NATIVE}/pkgconfig")
|
||||
d.setVar("PKG_CONFIG_LIBDIR", "${PKG_CONFIG_DIR}")
|
||||
d.setVarFlag("PKG_CONFIG_SYSROOT_DIR", "unexport", "1")
|
||||
d.appendVar("OE_TERMINAL_EXPORTS", " PKG_CONFIG_DIR PKG_CONFIG_PATH PKG_CONFIG_LIBDIR PKG_CONFIG_SYSROOT_DIR")
|
||||
}
|
||||
@@ -0,0 +1,72 @@
|
||||
KBRANCH ?= "v6.1/standard/base"
|
||||
|
||||
require recipes-kernel/linux/linux-yocto.inc
|
||||
|
||||
# CVE exclusions
|
||||
include recipes-kernel/linux/cve-exclusion_6.1.inc
|
||||
|
||||
# board specific branches
|
||||
KBRANCH:qemuarm ?= "v6.1/standard/arm-versatile-926ejs"
|
||||
KBRANCH:qemuarm64 ?= "v6.1/standard/qemuarm64"
|
||||
KBRANCH:qemumips ?= "v6.1/standard/mti-malta32"
|
||||
KBRANCH:qemuppc ?= "v6.1/standard/qemuppc"
|
||||
KBRANCH:qemuriscv64 ?= "v6.1/standard/base"
|
||||
KBRANCH:qemuriscv32 ?= "v6.1/standard/base"
|
||||
KBRANCH:qemux86 ?= "v6.1/standard/base"
|
||||
KBRANCH:qemux86-64 ?= "v6.1/standard/base"
|
||||
KBRANCH:qemuloongarch64 ?= "v6.1/standard/base"
|
||||
KBRANCH:qemumips64 ?= "v6.1/standard/mti-malta64"
|
||||
|
||||
SRCREV_machine:qemuarm ?= "a74344429a095a5941cd8dfac532160349344c92"
|
||||
SRCREV_machine:qemuarm64 ?= "b110cf9bbc395fe757956839d8110e72368699f4"
|
||||
SRCREV_machine:qemuloongarch64 ?= "b110cf9bbc395fe757956839d8110e72368699f4"
|
||||
SRCREV_machine:qemumips ?= "78c81e178f8e2ffbb7c03cd324cf50ee0c5c4cf2"
|
||||
SRCREV_machine:qemuppc ?= "b110cf9bbc395fe757956839d8110e72368699f4"
|
||||
SRCREV_machine:qemuriscv64 ?= "b110cf9bbc395fe757956839d8110e72368699f4"
|
||||
SRCREV_machine:qemuriscv32 ?= "b110cf9bbc395fe757956839d8110e72368699f4"
|
||||
SRCREV_machine:qemux86 ?= "b110cf9bbc395fe757956839d8110e72368699f4"
|
||||
SRCREV_machine:qemux86-64 ?= "b110cf9bbc395fe757956839d8110e72368699f4"
|
||||
SRCREV_machine:qemumips64 ?= "6c6b1170464e1f64f78a45cf7e78d5c678f38f48"
|
||||
SRCREV_machine ?= "b110cf9bbc395fe757956839d8110e72368699f4"
|
||||
SRCREV_meta ?= "cba89f406c6e07a16018cb77b51950cbae8ec654"
|
||||
|
||||
# set your preferred provider of linux-yocto to 'linux-yocto-upstream', and you'll
|
||||
# get the <version>/base branch, which is pure upstream -stable, and the same
|
||||
# meta SRCREV as the linux-yocto-standard builds. Select your version using the
|
||||
# normal PREFERRED_VERSION settings.
|
||||
BBCLASSEXTEND = "devupstream:target"
|
||||
SRCREV_machine:class-devupstream ?= "61fd484b2cf6bc8022e8e5ea6f693a9991740ac2"
|
||||
PN:class-devupstream = "linux-yocto-upstream"
|
||||
KBRANCH:class-devupstream = "v6.1/base"
|
||||
|
||||
SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;name=machine;branch=${KBRANCH};protocol=https \
|
||||
git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.1;destsuffix=${KMETA};protocol=https"
|
||||
SRC_URI += "file://0001-perf-cpumap-Make-counter-as-unsigned-ints.patch"
|
||||
|
||||
LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46"
|
||||
LINUX_VERSION ?= "6.1.38"
|
||||
|
||||
PV = "${LINUX_VERSION}+git${SRCPV}"
|
||||
|
||||
KMETA = "kernel-meta"
|
||||
KCONF_BSP_AUDIT_LEVEL = "1"
|
||||
|
||||
KERNEL_DEVICETREE:qemuarmv5 = "versatile-pb.dtb"
|
||||
|
||||
COMPATIBLE_MACHINE = "^(qemuarm|qemuarmv5|qemuarm64|qemux86|qemuppc|qemuppc64|qemumips|qemumips64|qemux86-64|qemuriscv64|qemuriscv32|qemuloongarch64)$"
|
||||
|
||||
# Functionality flags
|
||||
KERNEL_EXTRA_FEATURES ?= "features/netfilter/netfilter.scc"
|
||||
KERNEL_FEATURES:append = " ${KERNEL_EXTRA_FEATURES}"
|
||||
KERNEL_FEATURES:append:qemuall=" cfg/virtio.scc features/drm-bochs/drm-bochs.scc cfg/net/mdio.scc"
|
||||
KERNEL_FEATURES:append:qemux86=" cfg/sound.scc cfg/paravirt_kvm.scc"
|
||||
KERNEL_FEATURES:append:qemux86-64=" cfg/sound.scc cfg/paravirt_kvm.scc"
|
||||
KERNEL_FEATURES:append = " ${@bb.utils.contains("TUNE_FEATURES", "mx32", " cfg/x32.scc", "", d)}"
|
||||
KERNEL_FEATURES:append = " ${@bb.utils.contains("DISTRO_FEATURES", "ptest", " features/scsi/scsi-debug.scc", "", d)}"
|
||||
KERNEL_FEATURES:append = " ${@bb.utils.contains("DISTRO_FEATURES", "ptest", " features/gpio/mockup.scc", "", d)}"
|
||||
KERNEL_FEATURES:append:powerpc =" arch/powerpc/powerpc-debug.scc"
|
||||
KERNEL_FEATURES:append:powerpc64 =" arch/powerpc/powerpc-debug.scc"
|
||||
KERNEL_FEATURES:append:powerpc64le =" arch/powerpc/powerpc-debug.scc"
|
||||
|
||||
INSANE_SKIP:kernel-vmlinux:qemuppc64 = "textrel"
|
||||
|
||||
@@ -0,0 +1,71 @@
|
||||
KBRANCH ?= "v6.4/standard/base"
|
||||
|
||||
require recipes-kernel/linux/linux-yocto.inc
|
||||
|
||||
# CVE exclusions
|
||||
include recipes-kernel/linux/cve-exclusion_6.4.inc
|
||||
|
||||
# board specific branches
|
||||
KBRANCH:qemuarm ?= "v6.4/standard/arm-versatile-926ejs"
|
||||
KBRANCH:qemuarm64 ?= "v6.4/standard/qemuarm64"
|
||||
KBRANCH:qemumips ?= "v6.4/standard/mti-malta32"
|
||||
KBRANCH:qemuppc ?= "v6.4/standard/qemuppc"
|
||||
KBRANCH:qemuriscv64 ?= "v6.4/standard/base"
|
||||
KBRANCH:qemuriscv32 ?= "v6.4/standard/base"
|
||||
KBRANCH:qemux86 ?= "v6.4/standard/base"
|
||||
KBRANCH:qemux86-64 ?= "v6.4/standard/base"
|
||||
KBRANCH:qemuloongarch64 ?= "v6.4/standard/base"
|
||||
KBRANCH:qemumips64 ?= "v6.4/standard/mti-malta64"
|
||||
|
||||
SRCREV_machine:qemuarm ?= "aa7642358697dc9be32c4563a3d950f257a3f2ed"
|
||||
SRCREV_machine:qemuarm64 ?= "dee78ad1963cff9c063fba486d43fc9670285883"
|
||||
SRCREV_machine:qemuloongarch64 ?= "dee78ad1963cff9c063fba486d43fc9670285883"
|
||||
SRCREV_machine:qemumips ?= "8a3ac37b45e7dcc98d28ab3920309340202272d9"
|
||||
SRCREV_machine:qemuppc ?= "dee78ad1963cff9c063fba486d43fc9670285883"
|
||||
SRCREV_machine:qemuriscv64 ?= "dee78ad1963cff9c063fba486d43fc9670285883"
|
||||
SRCREV_machine:qemuriscv32 ?= "dee78ad1963cff9c063fba486d43fc9670285883"
|
||||
SRCREV_machine:qemux86 ?= "dee78ad1963cff9c063fba486d43fc9670285883"
|
||||
SRCREV_machine:qemux86-64 ?= "dee78ad1963cff9c063fba486d43fc9670285883"
|
||||
SRCREV_machine:qemumips64 ?= "144ff37fee7f0499574d5b508e4db82234f38fec"
|
||||
SRCREV_machine ?= "dee78ad1963cff9c063fba486d43fc9670285883"
|
||||
SRCREV_meta ?= "dab56f52aa33b5cea1513b36b98e50a6c7c31f47"
|
||||
|
||||
# set your preferred provider of linux-yocto to 'linux-yocto-upstream', and you'll
|
||||
# get the <version>/base branch, which is pure upstream -stable, and the same
|
||||
# meta SRCREV as the linux-yocto-standard builds. Select your version using the
|
||||
# normal PREFERRED_VERSION settings.
|
||||
BBCLASSEXTEND = "devupstream:target"
|
||||
SRCREV_machine:class-devupstream ?= "160f4124ea8b4cd6c86867e111fa55e266345a16"
|
||||
PN:class-devupstream = "linux-yocto-upstream"
|
||||
KBRANCH:class-devupstream = "v6.4/base"
|
||||
|
||||
SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;name=machine;branch=${KBRANCH};protocol=https \
|
||||
git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.4;destsuffix=${KMETA};protocol=https"
|
||||
|
||||
LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46"
|
||||
LINUX_VERSION ?= "6.4.3"
|
||||
|
||||
PV = "${LINUX_VERSION}+git${SRCPV}"
|
||||
|
||||
KMETA = "kernel-meta"
|
||||
KCONF_BSP_AUDIT_LEVEL = "1"
|
||||
|
||||
KERNEL_DEVICETREE:qemuarmv5 = "versatile-pb.dtb"
|
||||
|
||||
COMPATIBLE_MACHINE = "^(qemuarm|qemuarmv5|qemuarm64|qemux86|qemuppc|qemuppc64|qemumips|qemumips64|qemux86-64|qemuriscv64|qemuriscv32|qemuloongarch64)$"
|
||||
|
||||
# Functionality flags
|
||||
KERNEL_EXTRA_FEATURES ?= "features/netfilter/netfilter.scc"
|
||||
KERNEL_FEATURES:append = " ${KERNEL_EXTRA_FEATURES}"
|
||||
KERNEL_FEATURES:append:qemuall=" cfg/virtio.scc features/drm-bochs/drm-bochs.scc cfg/net/mdio.scc"
|
||||
KERNEL_FEATURES:append:qemux86=" cfg/sound.scc cfg/paravirt_kvm.scc"
|
||||
KERNEL_FEATURES:append:qemux86-64=" cfg/sound.scc cfg/paravirt_kvm.scc"
|
||||
KERNEL_FEATURES:append = " ${@bb.utils.contains("TUNE_FEATURES", "mx32", " cfg/x32.scc", "", d)}"
|
||||
KERNEL_FEATURES:append = " ${@bb.utils.contains("DISTRO_FEATURES", "ptest", " features/scsi/scsi-debug.scc", "", d)}"
|
||||
KERNEL_FEATURES:append = " ${@bb.utils.contains("DISTRO_FEATURES", "ptest", " features/gpio/mockup.scc", "", d)}"
|
||||
KERNEL_FEATURES:append:powerpc =" arch/powerpc/powerpc-debug.scc"
|
||||
KERNEL_FEATURES:append:powerpc64 =" arch/powerpc/powerpc-debug.scc"
|
||||
KERNEL_FEATURES:append:powerpc64le =" arch/powerpc/powerpc-debug.scc"
|
||||
|
||||
INSANE_SKIP:kernel-vmlinux:qemuppc64 = "textrel"
|
||||
|
||||
Reference in New Issue
Block a user