diff options
Diffstat (limited to 'meta/recipes-kernel')
117 files changed, 19246 insertions, 3330 deletions
diff --git a/meta/recipes-kernel/blktrace/blktrace/0001-bno_plot.py-btt_plot.py-Ask-for-python3-specifically.patch b/meta/recipes-kernel/blktrace/blktrace/0001-bno_plot.py-btt_plot.py-Ask-for-python3-specifically.patch new file mode 100644 index 0000000000..e2305a1111 --- /dev/null +++ b/meta/recipes-kernel/blktrace/blktrace/0001-bno_plot.py-btt_plot.py-Ask-for-python3-specifically.patch | |||
@@ -0,0 +1,35 @@ | |||
1 | From 6f4769e6e2c5cdc1262891470995e6dead937c7a Mon Sep 17 00:00:00 2001 | ||
2 | From: Sakib Sajal <sakib.sajal@windriver.com> | ||
3 | Date: Mon, 26 Jun 2023 17:57:36 -0400 | ||
4 | Subject: [PATCH] bno_plot.py, btt_plot.py: Ask for python3 specifically | ||
5 | |||
6 | python2 is deprecated, use python3. | ||
7 | |||
8 | Upstream-Status: Denied [https://www.spinics.net/lists/linux-btrace/msg01364.html] | ||
9 | |||
10 | Signed-off-by: Sakib Sajal <sakib.sajal@windriver.com> | ||
11 | --- | ||
12 | btt/bno_plot.py | 2 +- | ||
13 | btt/btt_plot.py | 2 +- | ||
14 | 2 files changed, 2 insertions(+), 2 deletions(-) | ||
15 | |||
16 | diff --git a/btt/bno_plot.py b/btt/bno_plot.py | ||
17 | index 3aa4e19..d7d7159 100644 | ||
18 | --- a/btt/bno_plot.py | ||
19 | +++ b/btt/bno_plot.py | ||
20 | @@ -1,4 +1,4 @@ | ||
21 | -#! /usr/bin/env python | ||
22 | +#! /usr/bin/env python3 | ||
23 | # | ||
24 | # btt blkno plotting interface | ||
25 | # | ||
26 | diff --git a/btt/btt_plot.py b/btt/btt_plot.py | ||
27 | index 40bc71f..8620d31 100755 | ||
28 | --- a/btt/btt_plot.py | ||
29 | +++ b/btt/btt_plot.py | ||
30 | @@ -1,4 +1,4 @@ | ||
31 | -#! /usr/bin/env python | ||
32 | +#! /usr/bin/env python3 | ||
33 | # | ||
34 | # btt_plot.py: Generate matplotlib plots for BTT generate data files | ||
35 | # | ||
diff --git a/meta/recipes-kernel/blktrace/blktrace/CVE-2018-10689.patch b/meta/recipes-kernel/blktrace/blktrace/CVE-2018-10689.patch deleted file mode 100644 index 7b58568d59..0000000000 --- a/meta/recipes-kernel/blktrace/blktrace/CVE-2018-10689.patch +++ /dev/null | |||
@@ -1,150 +0,0 @@ | |||
1 | From d61ff409cb4dda31386373d706ea0cfb1aaac5b7 Mon Sep 17 00:00:00 2001 | ||
2 | From: Jens Axboe <axboe@kernel.dk> | ||
3 | Date: Wed, 2 May 2018 10:24:17 -0600 | ||
4 | Subject: [PATCH] btt: make device/devno use PATH_MAX to avoid overflow | ||
5 | |||
6 | Herbo Zhang reports: | ||
7 | |||
8 | I found a bug in blktrace/btt/devmap.c. The code is just as follows: | ||
9 | |||
10 | https://git.kernel.org/pub/scm/linux/kernel/git/axboe/blktrace.git/tree/btt/devmap.c?id=8349ad2f2d19422a6241f94ea84d696b21de4757 | ||
11 | |||
12 | struct devmap { | ||
13 | |||
14 | struct list_head head; | ||
15 | char device[32], devno[32]; // #1 | ||
16 | }; | ||
17 | |||
18 | LIST_HEAD(all_devmaps); | ||
19 | |||
20 | static int dev_map_add(char *line) | ||
21 | { | ||
22 | struct devmap *dmp; | ||
23 | |||
24 | if (strstr(line, "Device") != NULL) | ||
25 | return 1; | ||
26 | |||
27 | dmp = malloc(sizeof(struct devmap)); | ||
28 | if (sscanf(line, "%s %s", dmp->device, dmp->devno) != 2) { //#2 | ||
29 | free(dmp); | ||
30 | return 1; | ||
31 | } | ||
32 | |||
33 | list_add_tail(&dmp->head, &all_devmaps); | ||
34 | return 0; | ||
35 | } | ||
36 | |||
37 | int dev_map_read(char *fname) | ||
38 | { | ||
39 | char line[256]; // #3 | ||
40 | FILE *fp = my_fopen(fname, "r"); | ||
41 | |||
42 | if (!fp) { | ||
43 | perror(fname); | ||
44 | return 1; | ||
45 | } | ||
46 | |||
47 | while (fscanf(fp, "%255[a-zA-Z0-9 :.,/_-]\n", line) == 1) { | ||
48 | if (dev_map_add(line)) | ||
49 | break; | ||
50 | } | ||
51 | |||
52 | fclose(fp); | ||
53 | return 0; | ||
54 | } | ||
55 | |||
56 | The line length is 256, but the dmp->device, dmp->devno max length | ||
57 | is only 32. We can put strings longer than 32 into dmp->device and | ||
58 | dmp->devno , and then they will be overflowed. | ||
59 | |||
60 | we can trigger this bug just as follows: | ||
61 | |||
62 | $ python -c "print 'A'*256" > ./test | ||
63 | $ btt -M ./test | ||
64 | |||
65 | *** Error in btt': free(): invalid next size (fast): 0x000055ad7349b250 *** | ||
66 | ======= Backtrace: ========= | ||
67 | /lib/x86_64-linux-gnu/libc.so.6(+0x777e5)[0x7f7f158ce7e5] | ||
68 | /lib/x86_64-linux-gnu/libc.so.6(+0x7fe0a)[0x7f7f158d6e0a] | ||
69 | /lib/x86_64-linux-gnu/libc.so.6(cfree+0x4c)[0x7f7f158da98c] | ||
70 | btt(+0x32e0)[0x55ad7306f2e0] | ||
71 | btt(+0x2c5f)[0x55ad7306ec5f] | ||
72 | btt(+0x251f)[0x55ad7306e51f] | ||
73 | /lib/x86_64-linux-gnu/libc.so.6(__libc_start_main+0xf0)[0x7f7f15877830] | ||
74 | btt(+0x26b9)[0x55ad7306e6b9] | ||
75 | ======= Memory map: ======== | ||
76 | 55ad7306c000-55ad7307f000 r-xp 00000000 08:14 3698139 | ||
77 | /usr/bin/btt | ||
78 | 55ad7327e000-55ad7327f000 r--p 00012000 08:14 3698139 | ||
79 | /usr/bin/btt | ||
80 | 55ad7327f000-55ad73280000 rw-p 00013000 08:14 3698139 | ||
81 | /usr/bin/btt | ||
82 | 55ad73280000-55ad73285000 rw-p 00000000 00:00 0 | ||
83 | 55ad7349a000-55ad734bb000 rw-p 00000000 00:00 0 | ||
84 | [heap] | ||
85 | 7f7f10000000-7f7f10021000 rw-p 00000000 00:00 0 | ||
86 | 7f7f10021000-7f7f14000000 ---p 00000000 00:00 0 | ||
87 | 7f7f15640000-7f7f15656000 r-xp 00000000 08:14 14942237 | ||
88 | /lib/x86_64-linux-gnu/libgcc_s.so.1 | ||
89 | 7f7f15656000-7f7f15855000 ---p 00016000 08:14 14942237 | ||
90 | /lib/x86_64-linux-gnu/libgcc_s.so.1 | ||
91 | 7f7f15855000-7f7f15856000 r--p 00015000 08:14 14942237 | ||
92 | /lib/x86_64-linux-gnu/libgcc_s.so.1 | ||
93 | 7f7f15856000-7f7f15857000 rw-p 00016000 08:14 14942237 | ||
94 | /lib/x86_64-linux-gnu/libgcc_s.so.1 | ||
95 | 7f7f15857000-7f7f15a16000 r-xp 00000000 08:14 14948477 | ||
96 | /lib/x86_64-linux-gnu/libc-2.23.so | ||
97 | 7f7f15a16000-7f7f15c16000 ---p 001bf000 08:14 14948477 | ||
98 | /lib/x86_64-linux-gnu/libc-2.23.so | ||
99 | 7f7f15c16000-7f7f15c1a000 r--p 001bf000 08:14 14948477 | ||
100 | /lib/x86_64-linux-gnu/libc-2.23.so | ||
101 | 7f7f15c1a000-7f7f15c1c000 rw-p 001c3000 08:14 14948477 | ||
102 | /lib/x86_64-linux-gnu/libc-2.23.so | ||
103 | 7f7f15c1c000-7f7f15c20000 rw-p 00000000 00:00 0 | ||
104 | 7f7f15c20000-7f7f15c46000 r-xp 00000000 08:14 14948478 | ||
105 | /lib/x86_64-linux-gnu/ld-2.23.so | ||
106 | 7f7f15e16000-7f7f15e19000 rw-p 00000000 00:00 0 | ||
107 | 7f7f15e42000-7f7f15e45000 rw-p 00000000 00:00 0 | ||
108 | 7f7f15e45000-7f7f15e46000 r--p 00025000 08:14 14948478 | ||
109 | /lib/x86_64-linux-gnu/ld-2.23.so | ||
110 | 7f7f15e46000-7f7f15e47000 rw-p 00026000 08:14 14948478 | ||
111 | /lib/x86_64-linux-gnu/ld-2.23.so | ||
112 | 7f7f15e47000-7f7f15e48000 rw-p 00000000 00:00 0 | ||
113 | 7ffdebe5c000-7ffdebe7d000 rw-p 00000000 00:00 0 | ||
114 | [stack] | ||
115 | 7ffdebebc000-7ffdebebe000 r--p 00000000 00:00 0 | ||
116 | [vvar] | ||
117 | 7ffdebebe000-7ffdebec0000 r-xp 00000000 00:00 0 | ||
118 | [vdso] | ||
119 | ffffffffff600000-ffffffffff601000 r-xp 00000000 00:00 0 | ||
120 | [vsyscall] | ||
121 | [1] 6272 abort btt -M test | ||
122 | |||
123 | Signed-off-by: Jens Axboe <axboe@kernel.dk> | ||
124 | |||
125 | Upstream-Status: Backport | ||
126 | [https://git.kernel.org/pub/scm/linux/kernel/git/axboe/blktrace.git/commit/?id=d61ff409cb4dda31386373d706ea0cfb1aaac5b7] | ||
127 | |||
128 | CVE: CVE-2018-10689 | ||
129 | |||
130 | Signed-off-by: Yi Zhao <yi.zhao@windriver.com> | ||
131 | --- | ||
132 | btt/devmap.c | 2 +- | ||
133 | 1 file changed, 1 insertion(+), 1 deletion(-) | ||
134 | |||
135 | diff --git a/btt/devmap.c b/btt/devmap.c | ||
136 | index 0553a9e..5fc1cb2 100644 | ||
137 | --- a/btt/devmap.c | ||
138 | +++ b/btt/devmap.c | ||
139 | @@ -23,7 +23,7 @@ | ||
140 | |||
141 | struct devmap { | ||
142 | struct list_head head; | ||
143 | - char device[32], devno[32]; | ||
144 | + char device[PATH_MAX], devno[PATH_MAX]; | ||
145 | }; | ||
146 | |||
147 | LIST_HEAD(all_devmaps); | ||
148 | -- | ||
149 | 2.7.4 | ||
150 | |||
diff --git a/meta/recipes-kernel/blktrace/blktrace/ldflags.patch b/meta/recipes-kernel/blktrace/blktrace/ldflags.patch deleted file mode 100644 index ab905cf0da..0000000000 --- a/meta/recipes-kernel/blktrace/blktrace/ldflags.patch +++ /dev/null | |||
@@ -1,114 +0,0 @@ | |||
1 | blktrace: obey LDFLAGS | ||
2 | |||
3 | Upstream-Status: Pending | ||
4 | |||
5 | Signed-off-by: Christopher Larson <chris_larson@mentor.com> | ||
6 | |||
7 | the patch was imported from meta-mentor layer on yoctoproject git server | ||
8 | http://git.yoctoproject.org/cgit/cgit.cgi/meta-mentor as of commit id | ||
9 | aed463414e2e2bf8ca44ba54ee5973e7ed599e57 | ||
10 | |||
11 | Signed-off-by: Fahad Usman <fahad_usman@mentor.com> | ||
12 | |||
13 | Index: git/Makefile | ||
14 | =================================================================== | ||
15 | --- git.orig/Makefile | ||
16 | +++ git/Makefile | ||
17 | @@ -1,5 +1,6 @@ | ||
18 | CC = gcc | ||
19 | CFLAGS = -Wall -O2 -g -W | ||
20 | +LDFLAGS = | ||
21 | ALL_CFLAGS = $(CFLAGS) -D_GNU_SOURCE -D_LARGEFILE_SOURCE -D_FILE_OFFSET_BITS=64 | ||
22 | PROGS = blkparse blktrace verify_blkparse blkrawverify blkiomon | ||
23 | LIBS = -lpthread | ||
24 | @@ -26,19 +27,19 @@ btreplay/btreplay: | ||
25 | $(CC) -o $*.o -c $(ALL_CFLAGS) $< | ||
26 | |||
27 | blkparse: blkparse.o blkparse_fmt.o rbtree.o act_mask.o | ||
28 | - $(CC) $(ALL_CFLAGS) -o $@ $(filter %.o,$^) | ||
29 | + $(CC) $(ALL_CFLAGS) -o $@ $(filter %.o,$^) $(LDFLAGS) | ||
30 | |||
31 | blktrace: blktrace.o act_mask.o | ||
32 | - $(CC) $(ALL_CFLAGS) -o $@ $(filter %.o,$^) $(LIBS) | ||
33 | + $(CC) $(ALL_CFLAGS) -o $@ $(filter %.o,$^) $(LIBS) $(LDFLAGS) | ||
34 | |||
35 | verify_blkparse: verify_blkparse.o | ||
36 | - $(CC) $(ALL_CFLAGS) -o $@ $(filter %.o,$^) | ||
37 | + $(CC) $(ALL_CFLAGS) -o $@ $(filter %.o,$^) $(LDFLAGS) | ||
38 | |||
39 | blkrawverify: blkrawverify.o | ||
40 | - $(CC) $(ALL_CFLAGS) -o $@ $(filter %.o,$^) | ||
41 | + $(CC) $(ALL_CFLAGS) -o $@ $(filter %.o,$^) $(LDFLAGS) | ||
42 | |||
43 | blkiomon: blkiomon.o rbtree.o | ||
44 | - $(CC) $(ALL_CFLAGS) -o $@ $(filter %.o,$^) $(LIBS) -lrt | ||
45 | + $(CC) $(ALL_CFLAGS) -o $@ $(filter %.o,$^) $(LIBS) -lrt $(LDFLAGS) | ||
46 | |||
47 | $(PROGS): | depend | ||
48 | |||
49 | Index: git/btreplay/Makefile | ||
50 | =================================================================== | ||
51 | --- git.orig/btreplay/Makefile | ||
52 | +++ git/btreplay/Makefile | ||
53 | @@ -7,6 +7,7 @@ | ||
54 | |||
55 | CC = gcc | ||
56 | CFLAGS = -Wall -W -O2 -g | ||
57 | +LDFLAGS = | ||
58 | INCS = -I. -I.. -I../btt | ||
59 | OCFLAGS = -UCOUNT_IOS -UDEBUG -DNDEBUG | ||
60 | XCFLAGS = -D_GNU_SOURCE -D_LARGEFILE_SOURCE -D_FILE_OFFSET_BITS=64 | ||
61 | @@ -32,10 +33,10 @@ clean: docsclean | ||
62 | $(CC) $(CFLAGS) -c -o $*.o $< | ||
63 | |||
64 | btrecord: btrecord.o | ||
65 | - $(CC) $(CFLAGS) -o $@ $(filter %.o,$^) | ||
66 | + $(CC) $(CFLAGS) -o $@ $(filter %.o,$^) $(LDFLAGS) | ||
67 | |||
68 | btreplay: btreplay.o | ||
69 | - $(CC) $(CFLAGS) -o $@ $(filter %.o,$^) $(LIBS) | ||
70 | + $(CC) $(CFLAGS) -o $@ $(filter %.o,$^) $(LIBS) $(LDFLAGS) | ||
71 | |||
72 | depend: | ||
73 | @$(CC) -MM $(CFLAGS) *.c 1> .depend | ||
74 | Index: git/btt/Makefile | ||
75 | =================================================================== | ||
76 | --- git.orig/btt/Makefile | ||
77 | +++ git/btt/Makefile | ||
78 | @@ -7,6 +7,7 @@ | ||
79 | |||
80 | CC = gcc | ||
81 | CFLAGS = -Wall -W -O2 -g | ||
82 | +LDFLAGS = | ||
83 | INCS = -I. -I.. | ||
84 | XCFLAGS = -D_GNU_SOURCE -D_LARGEFILE_SOURCE -D_FILE_OFFSET_BITS=64 | ||
85 | override CFLAGS += $(INCS) $(XCFLAGS) | ||
86 | @@ -38,7 +39,7 @@ clean: docsclean | ||
87 | $(CC) $(CFLAGS) -c -o $*.o $< | ||
88 | |||
89 | btt: $(OBJS) | ||
90 | - $(CC) $(CFLAGS) -o $@ $(filter %.o,$^) $(LIBS) | ||
91 | + $(CC) $(CFLAGS) -o $@ $(filter %.o,$^) $(LIBS) $(LDFLAGS) | ||
92 | |||
93 | ifneq ($(wildcard .depend),) | ||
94 | include .depend | ||
95 | Index: git/iowatcher/Makefile | ||
96 | =================================================================== | ||
97 | --- git.orig/iowatcher/Makefile | ||
98 | +++ git/iowatcher/Makefile | ||
99 | @@ -1,5 +1,6 @@ | ||
100 | CC = gcc | ||
101 | CFLAGS = -Wall -O2 -g -W -Wunused-result | ||
102 | +LDFLAGS = | ||
103 | ALL_CFLAGS = $(CFLAGS) -D_GNU_SOURCE -D_LARGEFILE_SOURCE -D_FILE_OFFSET_BITS=64 | ||
104 | |||
105 | PROGS = iowatcher | ||
106 | @@ -19,7 +20,7 @@ all: $(ALL) | ||
107 | $(CC) -o $*.o -c $(ALL_CFLAGS) $< | ||
108 | |||
109 | iowatcher: blkparse.o plot.o main.o tracers.o mpstat.o fio.o | ||
110 | - $(CC) $(ALL_CFLAGS) -o $@ $(filter %.o,$^) -lm -lrt | ||
111 | + $(CC) $(ALL_CFLAGS) -o $@ $(filter %.o,$^) -lm $(LDFLAGS) -lrt | ||
112 | |||
113 | depend: | ||
114 | @$(CC) -MM $(ALL_CFLAGS) *.c 1> .depend | ||
diff --git a/meta/recipes-kernel/blktrace/blktrace/make-btt-scripts-python3-ready.patch b/meta/recipes-kernel/blktrace/blktrace/make-btt-scripts-python3-ready.patch deleted file mode 100644 index 3b0c1c692c..0000000000 --- a/meta/recipes-kernel/blktrace/blktrace/make-btt-scripts-python3-ready.patch +++ /dev/null | |||
@@ -1,197 +0,0 @@ | |||
1 | From 70d5ca2d5f3d6b97c11c641b7e0c5836983219a0 Mon Sep 17 00:00:00 2001 | ||
2 | From: Eric Sandeen <sandeen@redhat.com> | ||
3 | Date: Wed, 28 Mar 2018 15:26:36 -0500 | ||
4 | Subject: [oe-core][PATCH 1/1] make btt scripts python3-ready | ||
5 | |||
6 | Many distributions are moving to python3 by default. Here's | ||
7 | an attempt to make the python scripts in blktrace python3-ready. | ||
8 | |||
9 | Most of this was done with automated tools. I hand fixed some | ||
10 | space-vs tab issues, and cast an array index to integer. It | ||
11 | passes rudimentary testing when run under python2.7 as well | ||
12 | as python3. | ||
13 | |||
14 | This doesn't do anything with the shebangs, it leaves them both | ||
15 | invoking whatever "env python" coughs up on the system. | ||
16 | |||
17 | Signed-off-by: Eric Sandeen <sandeen@redhat.com> | ||
18 | Signed-off-by: Jens Axboe <axboe@kernel.dk> | ||
19 | |||
20 | Unchanged except to modify shebangs to use python3 since | ||
21 | oe-core does not support python2 anymore. | ||
22 | |||
23 | Upstream-Status: Backport [git://git.kernel.dk/blktrace.git commit 70d5ca2d5...] | ||
24 | |||
25 | Signed-off-by: Joe Slater <joe.slater@windriver.com> | ||
26 | |||
27 | --- | ||
28 | btt/bno_plot.py | 28 +++++++++++++++------------- | ||
29 | btt/btt_plot.py | 22 +++++++++++++--------- | ||
30 | 2 files changed, 28 insertions(+), 22 deletions(-) | ||
31 | |||
32 | --- git.orig/btt/bno_plot.py | ||
33 | +++ git/btt/bno_plot.py | ||
34 | @@ -1,4 +1,4 @@ | ||
35 | -#! /usr/bin/env python | ||
36 | +#! /usr/bin/env python3 | ||
37 | # | ||
38 | # btt blkno plotting interface | ||
39 | # | ||
40 | @@ -38,6 +38,8 @@ automatically push the keys under the gr | ||
41 | To exit the plotter, enter 'quit' or ^D at the 'gnuplot> ' prompt. | ||
42 | """ | ||
43 | |||
44 | +from __future__ import absolute_import | ||
45 | +from __future__ import print_function | ||
46 | import getopt, glob, os, sys, tempfile | ||
47 | |||
48 | verbose = 0 | ||
49 | @@ -60,14 +62,14 @@ def parse_args(in_args): | ||
50 | |||
51 | try: | ||
52 | (opts, args) = getopt.getopt(in_args, s_opts, l_opts) | ||
53 | - except getopt.error, msg: | ||
54 | - print >>sys.stderr, msg | ||
55 | - print >>sys.stderr, __doc__ | ||
56 | + except getopt.error as msg: | ||
57 | + print(msg, file=sys.stderr) | ||
58 | + print(__doc__, file=sys.stderr) | ||
59 | sys.exit(1) | ||
60 | |||
61 | for (o, a) in opts: | ||
62 | if o in ('-h', '--help'): | ||
63 | - print __doc__ | ||
64 | + print(__doc__) | ||
65 | sys.exit(0) | ||
66 | elif o in ('-v', '--verbose'): | ||
67 | verbose += 1 | ||
68 | @@ -84,10 +86,10 @@ if __name__ == '__main__': | ||
69 | (bnos, keys_below) = parse_args(sys.argv[1:]) | ||
70 | |||
71 | if verbose: | ||
72 | - print 'Using files:', | ||
73 | - for bno in bnos: print bno, | ||
74 | - if keys_below: print '\nKeys are to be placed below graph' | ||
75 | - else: print '' | ||
76 | + print('Using files:', end=' ') | ||
77 | + for bno in bnos: print(bno, end=' ') | ||
78 | + if keys_below: print('\nKeys are to be placed below graph') | ||
79 | + else: print('') | ||
80 | |||
81 | tmpdir = tempfile.mktemp() | ||
82 | os.mkdir(tmpdir) | ||
83 | @@ -99,7 +101,7 @@ if __name__ == '__main__': | ||
84 | fo = open(t, 'w') | ||
85 | for line in open(f, 'r'): | ||
86 | fld = line.split(None) | ||
87 | - print >>fo, fld[0], fld[1], int(fld[2])-int(fld[1]) | ||
88 | + print(fld[0], fld[1], int(fld[2])-int(fld[1]), file=fo) | ||
89 | fo.close() | ||
90 | |||
91 | t = t[t.rfind('/')+1:] | ||
92 | @@ -107,16 +109,16 @@ if __name__ == '__main__': | ||
93 | else: plot_cmd = "%s,'%s'" % (plot_cmd, t) | ||
94 | |||
95 | fo = open('%s/plot.cmds' % tmpdir, 'w') | ||
96 | - print >>fo, cmds | ||
97 | - if len(bnos) > 10 or keys_below: print >>fo, 'set key below' | ||
98 | - print >>fo, plot_cmd | ||
99 | + print(cmds, file=fo) | ||
100 | + if len(bnos) > 10 or keys_below: print('set key below', file=fo) | ||
101 | + print(plot_cmd, file=fo) | ||
102 | fo.close() | ||
103 | |||
104 | pid = os.fork() | ||
105 | if pid == 0: | ||
106 | cmd = 'gnuplot %s/plot.cmds -' % tmpdir | ||
107 | |||
108 | - if verbose: print 'Executing %s' % cmd | ||
109 | + if verbose: print('Executing %s' % cmd) | ||
110 | |||
111 | os.chdir(tmpdir) | ||
112 | os.system(cmd) | ||
113 | --- git.orig/btt/btt_plot.py | ||
114 | +++ git/btt/btt_plot.py | ||
115 | @@ -1,4 +1,4 @@ | ||
116 | -#! /usr/bin/env python | ||
117 | +#! /usr/bin/env python3 | ||
118 | # | ||
119 | # btt_plot.py: Generate matplotlib plots for BTT generate data files | ||
120 | # | ||
121 | @@ -55,6 +55,10 @@ Arguments: | ||
122 | but the -o (--output) and -T (--title) options will be ignored. | ||
123 | """ | ||
124 | |||
125 | +from __future__ import absolute_import | ||
126 | +from __future__ import print_function | ||
127 | +import six | ||
128 | +from six.moves import range | ||
129 | __author__ = 'Alan D. Brunelle <alan.brunelle@hp.com>' | ||
130 | |||
131 | #------------------------------------------------------------------------------ | ||
132 | @@ -82,7 +86,7 @@ get_base = lambda file: file[file.find( | ||
133 | def fatal(msg): | ||
134 | """Generate fatal error message and exit""" | ||
135 | |||
136 | - print >>sys.stderr, 'FATAL: %s' % msg | ||
137 | + print('FATAL: %s' % msg, file=sys.stderr) | ||
138 | sys.exit(1) | ||
139 | |||
140 | #------------------------------------------------------------------------------ | ||
141 | @@ -163,7 +167,7 @@ def get_data(files): | ||
142 | if not os.path.exists(file): | ||
143 | fatal('%s not found' % file) | ||
144 | elif verbose: | ||
145 | - print 'Processing %s' % file | ||
146 | + print('Processing %s' % file) | ||
147 | |||
148 | xs = [] | ||
149 | ys = [] | ||
150 | @@ -214,8 +218,8 @@ def parse_args(args): | ||
151 | |||
152 | try: | ||
153 | (opts, args) = getopt.getopt(args[1:], s_opts, l_opts) | ||
154 | - except getopt.error, msg: | ||
155 | - print >>sys.stderr, msg | ||
156 | + except getopt.error as msg: | ||
157 | + print(msg, file=sys.stderr) | ||
158 | fatal(__doc__) | ||
159 | |||
160 | for (o, a) in opts: | ||
161 | @@ -293,15 +297,15 @@ def generate_output(type, db): | ||
162 | def color(idx, style): | ||
163 | """Returns a color/symbol type based upon the index passed.""" | ||
164 | |||
165 | - colors = [ 'b', 'g', 'r', 'c', 'm', 'y', 'k' ] | ||
166 | + colors = [ 'b', 'g', 'r', 'c', 'm', 'y', 'k' ] | ||
167 | l_styles = [ '-', ':', '--', '-.' ] | ||
168 | m_styles = [ 'o', '+', '.', ',', 's', 'v', 'x', '<', '>' ] | ||
169 | |||
170 | color = colors[idx % len(colors)] | ||
171 | if style == 'line': | ||
172 | - style = l_styles[(idx / len(l_styles)) % len(l_styles)] | ||
173 | + style = l_styles[int((idx / len(l_styles)) % len(l_styles))] | ||
174 | elif style == 'marker': | ||
175 | - style = m_styles[(idx / len(m_styles)) % len(m_styles)] | ||
176 | + style = m_styles[int((idx / len(m_styles)) % len(m_styles))] | ||
177 | |||
178 | return '%s%s' % (color, style) | ||
179 | |||
180 | @@ -314,7 +318,7 @@ def generate_output(type, db): | ||
181 | ofile = '%s.png' % type | ||
182 | |||
183 | if verbose: | ||
184 | - print 'Generating plot into %s' % ofile | ||
185 | + print('Generating plot into %s' % ofile) | ||
186 | |||
187 | fig = plt.figure(figsize=plot_size) | ||
188 | ax = fig.add_subplot(111) | ||
189 | @@ -329,7 +333,7 @@ def generate_output(type, db): | ||
190 | legends = None | ||
191 | |||
192 | keys = [] | ||
193 | - for file in db.iterkeys(): | ||
194 | + for file in six.iterkeys(db): | ||
195 | if not file in ['min_x', 'max_x', 'min_y', 'max_y']: | ||
196 | keys.append(file) | ||
197 | |||
diff --git a/meta/recipes-kernel/blktrace/blktrace_git.bb b/meta/recipes-kernel/blktrace/blktrace_1.3.0.bb index 7ccc022b93..f053490409 100644 --- a/meta/recipes-kernel/blktrace/blktrace_git.bb +++ b/meta/recipes-kernel/blktrace/blktrace_1.3.0.bb | |||
@@ -5,22 +5,16 @@ are three major components: a kernel component, a utility to record the i/o \ | |||
5 | trace information for the kernel to user space, and utilities to analyse and \ | 5 | trace information for the kernel to user space, and utilities to analyse and \ |
6 | view the trace information." | 6 | view the trace information." |
7 | HOMEPAGE = "http://brick.kernel.dk/snaps/" | 7 | HOMEPAGE = "http://brick.kernel.dk/snaps/" |
8 | LICENSE = "GPLv2" | 8 | LICENSE = "GPL-2.0-only" |
9 | LIC_FILES_CHKSUM = "file://COPYING;md5=393a5ca445f6965873eca0259a17f833" | 9 | LIC_FILES_CHKSUM = "file://COPYING;md5=393a5ca445f6965873eca0259a17f833" |
10 | 10 | ||
11 | DEPENDS = "libaio" | 11 | DEPENDS = "libaio" |
12 | 12 | ||
13 | SRCREV = "cca113f2fe0759b91fd6a0e10fdcda2c28f18a7e" | 13 | SRC_URI = "git://git.kernel.dk/blktrace.git;protocol=https;branch=master \ |
14 | file://0001-bno_plot.py-btt_plot.py-Ask-for-python3-specifically.patch \ | ||
15 | " | ||
14 | 16 | ||
15 | PV = "1.2.0+git${SRCPV}" | 17 | SRCREV = "366d30b9cdb20345c5d064af850d686da79b89eb" |
16 | |||
17 | SRC_URI = "git://git.kernel.dk/blktrace.git \ | ||
18 | file://ldflags.patch \ | ||
19 | file://CVE-2018-10689.patch \ | ||
20 | file://make-btt-scripts-python3-ready.patch \ | ||
21 | " | ||
22 | |||
23 | S = "${WORKDIR}/git" | ||
24 | 18 | ||
25 | EXTRA_OEMAKE = "\ | 19 | EXTRA_OEMAKE = "\ |
26 | 'CC=${CC}' \ | 20 | 'CC=${CC}' \ |
diff --git a/meta/recipes-kernel/cryptodev/cryptodev-linux_1.12.bb b/meta/recipes-kernel/cryptodev/cryptodev-linux_1.12.bb deleted file mode 100644 index c55577c661..0000000000 --- a/meta/recipes-kernel/cryptodev/cryptodev-linux_1.12.bb +++ /dev/null | |||
@@ -1,13 +0,0 @@ | |||
1 | require cryptodev.inc | ||
2 | |||
3 | SUMMARY = "A /dev/crypto device driver header file" | ||
4 | |||
5 | do_compile[noexec] = "1" | ||
6 | |||
7 | # Just install cryptodev.h which is the only header file needed to be exported | ||
8 | do_install() { | ||
9 | install -D ${S}/crypto/cryptodev.h ${D}${includedir}/crypto/cryptodev.h | ||
10 | } | ||
11 | |||
12 | ALLOW_EMPTY_${PN} = "1" | ||
13 | BBCLASSEXTEND = "native nativesdk" | ||
diff --git a/meta/recipes-kernel/cryptodev/cryptodev-linux_1.14.bb b/meta/recipes-kernel/cryptodev/cryptodev-linux_1.14.bb new file mode 100644 index 0000000000..451a8d7ef8 --- /dev/null +++ b/meta/recipes-kernel/cryptodev/cryptodev-linux_1.14.bb | |||
@@ -0,0 +1,12 @@ | |||
1 | require cryptodev.inc | ||
2 | |||
3 | SUMMARY = "A /dev/crypto device driver header file" | ||
4 | |||
5 | do_compile[noexec] = "1" | ||
6 | |||
7 | do_install() { | ||
8 | oe_runmake headers_install DESTDIR="${D}" | ||
9 | } | ||
10 | |||
11 | ALLOW_EMPTY:${PN} = "1" | ||
12 | BBCLASSEXTEND = "native nativesdk" | ||
diff --git a/meta/recipes-kernel/cryptodev/cryptodev-module_1.12.bb b/meta/recipes-kernel/cryptodev/cryptodev-module_1.12.bb deleted file mode 100644 index b3b554c7d3..0000000000 --- a/meta/recipes-kernel/cryptodev/cryptodev-module_1.12.bb +++ /dev/null | |||
@@ -1,16 +0,0 @@ | |||
1 | require cryptodev.inc | ||
2 | |||
3 | SUMMARY = "A /dev/crypto device driver kernel module" | ||
4 | |||
5 | inherit module | ||
6 | |||
7 | # Header file provided by a separate package | ||
8 | DEPENDS += "cryptodev-linux" | ||
9 | |||
10 | SRC_URI += "file://0001-Disable-installing-header-file-provided-by-another-p.patch \ | ||
11 | " | ||
12 | |||
13 | EXTRA_OEMAKE='KERNEL_DIR="${STAGING_KERNEL_DIR}" PREFIX="${D}"' | ||
14 | |||
15 | RCONFLICTS_${PN} = "ocf-linux" | ||
16 | RREPLACES_${PN} = "ocf-linux" | ||
diff --git a/meta/recipes-kernel/cryptodev/cryptodev-module_1.14.bb b/meta/recipes-kernel/cryptodev/cryptodev-module_1.14.bb new file mode 100644 index 0000000000..88d76c9d23 --- /dev/null +++ b/meta/recipes-kernel/cryptodev/cryptodev-module_1.14.bb | |||
@@ -0,0 +1,13 @@ | |||
1 | require cryptodev.inc | ||
2 | |||
3 | SUMMARY = "A /dev/crypto device driver kernel module" | ||
4 | |||
5 | inherit module | ||
6 | |||
7 | # Header file provided by a separate package | ||
8 | DEPENDS += "cryptodev-linux" | ||
9 | |||
10 | EXTRA_OEMAKE = 'KERNEL_DIR="${STAGING_KERNEL_DIR}" PREFIX="${D}"' | ||
11 | |||
12 | RCONFLICTS:${PN} = "ocf-linux" | ||
13 | RREPLACES:${PN} = "ocf-linux" | ||
diff --git a/meta/recipes-kernel/cryptodev/cryptodev-tests_1.12.bb b/meta/recipes-kernel/cryptodev/cryptodev-tests_1.12.bb deleted file mode 100644 index 9cb5dcb94f..0000000000 --- a/meta/recipes-kernel/cryptodev/cryptodev-tests_1.12.bb +++ /dev/null | |||
@@ -1,21 +0,0 @@ | |||
1 | require cryptodev.inc | ||
2 | |||
3 | SUMMARY = "A test suite for /dev/crypto device driver" | ||
4 | |||
5 | DEPENDS += "openssl" | ||
6 | |||
7 | SRC_URI += " \ | ||
8 | file://0001-Add-the-compile-and-install-rules-for-cryptodev-test.patch \ | ||
9 | " | ||
10 | |||
11 | EXTRA_OEMAKE='KERNEL_DIR="${STAGING_EXECPREFIXDIR}" PREFIX="${D}"' | ||
12 | |||
13 | do_compile() { | ||
14 | oe_runmake testprogs | ||
15 | } | ||
16 | |||
17 | do_install() { | ||
18 | oe_runmake install_tests | ||
19 | } | ||
20 | |||
21 | FILES_${PN} = "${bindir}/*" | ||
diff --git a/meta/recipes-kernel/cryptodev/cryptodev-tests_1.14.bb b/meta/recipes-kernel/cryptodev/cryptodev-tests_1.14.bb new file mode 100644 index 0000000000..2cbee8a348 --- /dev/null +++ b/meta/recipes-kernel/cryptodev/cryptodev-tests_1.14.bb | |||
@@ -0,0 +1,17 @@ | |||
1 | require cryptodev.inc | ||
2 | |||
3 | SUMMARY = "A test suite for /dev/crypto device driver" | ||
4 | |||
5 | DEPENDS += "openssl" | ||
6 | |||
7 | EXTRA_OEMAKE = 'KERNEL_DIR="${STAGING_EXECPREFIXDIR}" PREFIX="${D}"' | ||
8 | |||
9 | do_compile() { | ||
10 | oe_runmake tests | ||
11 | } | ||
12 | |||
13 | do_install() { | ||
14 | oe_runmake install_tests | ||
15 | } | ||
16 | |||
17 | FILES:${PN} = "${bindir}/*" | ||
diff --git a/meta/recipes-kernel/cryptodev/cryptodev.inc b/meta/recipes-kernel/cryptodev/cryptodev.inc index ae2c308911..16a8eb610a 100644 --- a/meta/recipes-kernel/cryptodev/cryptodev.inc +++ b/meta/recipes-kernel/cryptodev/cryptodev.inc | |||
@@ -5,13 +5,12 @@ of hardware accelerators. Cryptodev-linux is implemented as a standalone \ | |||
5 | module that requires no dependencies other than a stock linux kernel. Its \ | 5 | module that requires no dependencies other than a stock linux kernel. Its \ |
6 | API is compatible with OpenBSD's cryptodev userspace API (/dev/crypto)." | 6 | API is compatible with OpenBSD's cryptodev userspace API (/dev/crypto)." |
7 | 7 | ||
8 | LICENSE = "GPLv2" | 8 | LICENSE = "GPL-2.0-only" |
9 | LIC_FILES_CHKSUM = "file://COPYING;md5=b234ee4d69f5fce4486a80fdaf4a4263" | 9 | LIC_FILES_CHKSUM = "file://COPYING;md5=b234ee4d69f5fce4486a80fdaf4a4263" |
10 | 10 | ||
11 | SRC_URI = "git://github.com/cryptodev-linux/cryptodev-linux \ | 11 | SRC_URI = "git://github.com/cryptodev-linux/cryptodev-linux;branch=master;protocol=https \ |
12 | " | 12 | " |
13 | SRCREV = "e0c25e289d6baf1d83c2b9cb523d3bc237d0c0c9" | 13 | SRCREV = "135cbff90af2ba97d88f1472be595ce78721972c" |
14 | 14 | PV = "1.14" | |
15 | S = "${WORKDIR}/git" | ||
16 | 15 | ||
17 | CLEANBROKEN = "1" | 16 | CLEANBROKEN = "1" |
diff --git a/meta/recipes-kernel/cryptodev/files/0001-Add-the-compile-and-install-rules-for-cryptodev-test.patch b/meta/recipes-kernel/cryptodev/files/0001-Add-the-compile-and-install-rules-for-cryptodev-test.patch deleted file mode 100644 index 84fd27e681..0000000000 --- a/meta/recipes-kernel/cryptodev/files/0001-Add-the-compile-and-install-rules-for-cryptodev-test.patch +++ /dev/null | |||
@@ -1,66 +0,0 @@ | |||
1 | From 1980a8f4779a955e73285e7a0d86549b69bea5c8 Mon Sep 17 00:00:00 2001 | ||
2 | From: Yu Zongchun <b40527@freescale.com> | ||
3 | Date: Sun, 28 Apr 2013 14:39:22 +0800 | ||
4 | Subject: [PATCH] Add the compile and install rules for cryptodev tests folder | ||
5 | |||
6 | This is required to install the cryptodev tests folder to rootfs | ||
7 | |||
8 | Signed-off-by: Yu Zongchun <b40527@freescale.com> | ||
9 | |||
10 | Upstream-Status: Pending | ||
11 | |||
12 | --- | ||
13 | Makefile | 6 ++++++ | ||
14 | tests/Makefile | 8 ++++++++ | ||
15 | 2 files changed, 14 insertions(+), 0 deletions(-) | ||
16 | |||
17 | Index: git/Makefile | ||
18 | =================================================================== | ||
19 | --- git.orig/Makefile | ||
20 | +++ git/Makefile | ||
21 | @@ -35,6 +35,9 @@ modules_install: | ||
22 | $(MAKE) $(KERNEL_MAKE_OPTS) modules_install | ||
23 | install -m 644 -D crypto/cryptodev.h $(DESTDIR)/$(includedir)/crypto/cryptodev.h | ||
24 | |||
25 | +install_tests: | ||
26 | + make -C tests install DESTDIR=$(PREFIX) | ||
27 | + | ||
28 | clean: | ||
29 | $(MAKE) $(KERNEL_MAKE_OPTS) clean | ||
30 | rm -f $(hostprogs) *~ | ||
31 | @@ -43,6 +46,9 @@ clean: | ||
32 | check: | ||
33 | CFLAGS=$(CRYPTODEV_CFLAGS) KERNEL_DIR=$(KERNEL_DIR) $(MAKE) -C tests check | ||
34 | |||
35 | +testprogs: | ||
36 | + KERNEL_DIR=$(KERNEL_DIR) make -C tests testprogs | ||
37 | + | ||
38 | CPOPTS = | ||
39 | ifneq ($(SHOW_TYPES),) | ||
40 | CPOPTS += --show-types | ||
41 | Index: git/tests/Makefile | ||
42 | =================================================================== | ||
43 | --- git.orig/tests/Makefile | ||
44 | +++ git/tests/Makefile | ||
45 | @@ -23,6 +23,12 @@ bindir = $(execprefix)/bin | ||
46 | |||
47 | all: $(hostprogs) | ||
48 | |||
49 | +install: | ||
50 | + install -d $(DESTDIR)/usr/bin/tests_cryptodev | ||
51 | + for bin in $(hostprogs); do \ | ||
52 | + install -m 755 $${bin} $(DESTDIR)/usr/bin/tests_cryptodev/; \ | ||
53 | + done | ||
54 | + | ||
55 | check: $(hostprogs) | ||
56 | ./cipher | ||
57 | ./hmac | ||
58 | @@ -38,6 +44,8 @@ install: | ||
59 | install -m 755 $$prog $(DESTDIR)/$(bindir); \ | ||
60 | done | ||
61 | |||
62 | +testprogs: $(hostprogs) | ||
63 | + | ||
64 | clean: | ||
65 | rm -f *.o *~ $(hostprogs) | ||
66 | |||
diff --git a/meta/recipes-kernel/cryptodev/files/0001-Disable-installing-header-file-provided-by-another-p.patch b/meta/recipes-kernel/cryptodev/files/0001-Disable-installing-header-file-provided-by-another-p.patch deleted file mode 100644 index 885b5823e4..0000000000 --- a/meta/recipes-kernel/cryptodev/files/0001-Disable-installing-header-file-provided-by-another-p.patch +++ /dev/null | |||
@@ -1,24 +0,0 @@ | |||
1 | From 8a884f55bd1527baa82fab68c186ba546273860c Mon Sep 17 00:00:00 2001 | ||
2 | From: Denys Dmytriyenko <denys@ti.com> | ||
3 | Date: Sun, 6 Apr 2014 19:51:39 -0400 | ||
4 | Subject: [PATCH] Disable installing header file provided by another package | ||
5 | |||
6 | Signed-off-by: Denys Dmytriyenko <denys@ti.com> | ||
7 | |||
8 | Upstream-Status: Inappropriate [ OE specific ] | ||
9 | --- | ||
10 | Makefile | 1 - | ||
11 | 1 file changed, 1 deletion(-) | ||
12 | |||
13 | diff --git a/Makefile b/Makefile | ||
14 | index 5a080e0..bf02396 100644 | ||
15 | --- a/Makefile | ||
16 | +++ b/Makefile | ||
17 | @@ -33,7 +33,6 @@ install: modules_install | ||
18 | |||
19 | modules_install: | ||
20 | $(MAKE) $(KERNEL_MAKE_OPTS) modules_install | ||
21 | - install -m 644 -D crypto/cryptodev.h $(DESTDIR)/$(includedir)/crypto/cryptodev.h | ||
22 | |||
23 | clean: | ||
24 | $(MAKE) $(KERNEL_MAKE_OPTS) clean | ||
diff --git a/meta/recipes-kernel/dtc/dtc.inc b/meta/recipes-kernel/dtc/dtc.inc deleted file mode 100644 index 5da6c24fbf..0000000000 --- a/meta/recipes-kernel/dtc/dtc.inc +++ /dev/null | |||
@@ -1,28 +0,0 @@ | |||
1 | SUMMARY = "Device Tree Compiler" | ||
2 | HOMEPAGE = "https://devicetree.org/" | ||
3 | DESCRIPTION = "The Device Tree Compiler is a tool used to manipulate the Open-Firmware-like device tree used by PowerPC kernels." | ||
4 | SECTION = "bootloader" | ||
5 | LICENSE = "GPLv2 | BSD" | ||
6 | DEPENDS = "flex-native bison-native" | ||
7 | |||
8 | SRC_URI = "git://git.kernel.org/pub/scm/utils/dtc/dtc.git \ | ||
9 | file://make_install.patch \ | ||
10 | file://0001-dtc-Fix-Makefile-to-add-CFLAGS-not-override.patch \ | ||
11 | " | ||
12 | |||
13 | UPSTREAM_CHECK_GITTAGREGEX = "v(?P<pver>\d+(\.\d+)+)" | ||
14 | |||
15 | EXTRA_OEMAKE='NO_PYTHON=1 PREFIX="${prefix}" LIBDIR="${libdir}" DESTDIR="${D}"' | ||
16 | |||
17 | inherit pkgconfig | ||
18 | |||
19 | S = "${WORKDIR}/git" | ||
20 | |||
21 | do_install () { | ||
22 | oe_runmake install | ||
23 | } | ||
24 | |||
25 | PACKAGES =+ "${PN}-misc" | ||
26 | FILES_${PN}-misc = "${bindir}/convert-dtsv0 ${bindir}/ftdump ${bindir}/dtdiff" | ||
27 | |||
28 | RDEPENDS_${PN}-misc += "bash diffutils" | ||
diff --git a/meta/recipes-kernel/dtc/dtc/0001-dtc-Fix-Makefile-to-add-CFLAGS-not-override.patch b/meta/recipes-kernel/dtc/dtc/0001-dtc-Fix-Makefile-to-add-CFLAGS-not-override.patch deleted file mode 100644 index a2deb12d4b..0000000000 --- a/meta/recipes-kernel/dtc/dtc/0001-dtc-Fix-Makefile-to-add-CFLAGS-not-override.patch +++ /dev/null | |||
@@ -1,36 +0,0 @@ | |||
1 | From f0119060ef1b9bd80e2cae487df1e4aedffb0e9b Mon Sep 17 00:00:00 2001 | ||
2 | From: Oleksiy Obitotskyy <oobitots@cisco.com> | ||
3 | Date: Fri, 22 Jan 2021 09:12:48 +0200 | ||
4 | Subject: [PATCH] dtc: Fix Makefile to add CFLAGS not override | ||
5 | |||
6 | Makefile override CFLAGS not extend them, so some of them | ||
7 | missing. Sources builds out of kernel tree and probably not all | ||
8 | options could be used (?). We need at least -fmacro-prefix-map/ | ||
9 | debug-prefix-map to eliminate absolute path in binaries. | ||
10 | |||
11 | Upstream-Status: Pending | ||
12 | Signed-off-by: Oleksiy Obitotskyy <oobitots@cisco.com> | ||
13 | --- | ||
14 | Makefile | 4 ++-- | ||
15 | 1 file changed, 2 insertions(+), 2 deletions(-) | ||
16 | |||
17 | diff --git a/Makefile b/Makefile | ||
18 | index 35d936f..b5b13cf 100644 | ||
19 | --- a/Makefile | ||
20 | +++ b/Makefile | ||
21 | @@ -20,10 +20,10 @@ CONFIG_LOCALVERSION = | ||
22 | # See libfdt_internal.h for details | ||
23 | ASSUME_MASK ?= 0 | ||
24 | |||
25 | -CPPFLAGS = -I libfdt -I . -DFDT_ASSUME_MASK=$(ASSUME_MASK) | ||
26 | +CPPFLAGS += -I libfdt -I . -DFDT_ASSUME_MASK=$(ASSUME_MASK) | ||
27 | WARNINGS = -Wall -Wpointer-arith -Wcast-qual -Wnested-externs \ | ||
28 | -Wstrict-prototypes -Wmissing-prototypes -Wredundant-decls -Wshadow | ||
29 | -CFLAGS = -g -Os $(SHAREDLIB_CFLAGS) -Werror $(WARNINGS) $(EXTRA_CFLAGS) | ||
30 | +CFLAGS += -g -Os $(SHAREDLIB_CFLAGS) -Werror $(WARNINGS) $(EXTRA_CFLAGS) | ||
31 | |||
32 | BISON = bison | ||
33 | LEX = flex | ||
34 | -- | ||
35 | 2.25.1 | ||
36 | |||
diff --git a/meta/recipes-kernel/dtc/dtc/0001-fdtdump-Fix-gcc11-warning.patch b/meta/recipes-kernel/dtc/dtc/0001-fdtdump-Fix-gcc11-warning.patch deleted file mode 100644 index ec825cbf7b..0000000000 --- a/meta/recipes-kernel/dtc/dtc/0001-fdtdump-Fix-gcc11-warning.patch +++ /dev/null | |||
@@ -1,35 +0,0 @@ | |||
1 | From 4827e0db6c4f7dea7f4094f49d3bb48ef6dfdc2d Mon Sep 17 00:00:00 2001 | ||
2 | From: David Gibson <david@gibson.dropbear.id.au> | ||
3 | Date: Wed, 6 Jan 2021 14:52:26 +1100 | ||
4 | Subject: [PATCH] fdtdump: Fix gcc11 warning | ||
5 | |||
6 | In one place, fdtdump abuses fdt_set_magic(), passing it just a small char | ||
7 | array instead of the full fdt header it expects. That's relying on the | ||
8 | fact that in fact fdt_set_magic() will only actually access the first 4 | ||
9 | bytes of the buffer. | ||
10 | |||
11 | This trips a new warning in GCC 11 - and it's entirely possible it was | ||
12 | always UB. So, don't do that. | ||
13 | |||
14 | Upstream-Status: Backport [https://git.kernel.org/pub/scm/utils/dtc/dtc.git/patch/?id=ca16a723fa9dde9c5da80dba567f48715000e77c] | ||
15 | Signed-off-by: David Gibson <david@gibson.dropbear.id.au> | ||
16 | --- | ||
17 | fdtdump.c | 2 +- | ||
18 | 1 file changed, 1 insertion(+), 1 deletion(-) | ||
19 | |||
20 | diff --git a/fdtdump.c b/fdtdump.c | ||
21 | index 9613bef..d9fb374 100644 | ||
22 | --- a/fdtdump.c | ||
23 | +++ b/fdtdump.c | ||
24 | @@ -217,7 +217,7 @@ int main(int argc, char *argv[]) | ||
25 | char *p = buf; | ||
26 | char *endp = buf + len; | ||
27 | |||
28 | - fdt_set_magic(smagic, FDT_MAGIC); | ||
29 | + fdt32_st(smagic, FDT_MAGIC); | ||
30 | |||
31 | /* poor man's memmem */ | ||
32 | while ((endp - p) >= FDT_MAGIC_SIZE) { | ||
33 | -- | ||
34 | 2.30.1 | ||
35 | |||
diff --git a/meta/recipes-kernel/dtc/dtc/make_install.patch b/meta/recipes-kernel/dtc/dtc/make_install.patch deleted file mode 100644 index ea9359e815..0000000000 --- a/meta/recipes-kernel/dtc/dtc/make_install.patch +++ /dev/null | |||
@@ -1,26 +0,0 @@ | |||
1 | From e9852b9d206df1e42aa4c8afec55a0f5e099b533 Mon Sep 17 00:00:00 2001 | ||
2 | From: Saul Wold <sgw@linux.intel.com> | ||
3 | Date: Thu, 3 Nov 2011 08:35:47 -0700 | ||
4 | Subject: [PATCH] dtc: Add patch to correctly install shared libraries and | ||
5 | |||
6 | Upstream-Status: Inappropriate [configuration] | ||
7 | |||
8 | --- | ||
9 | Makefile | 4 ++-- | ||
10 | 1 file changed, 2 insertions(+), 2 deletions(-) | ||
11 | |||
12 | diff --git a/Makefile b/Makefile | ||
13 | index d8ebc4f..f5e01be 100644 | ||
14 | --- a/Makefile | ||
15 | +++ b/Makefile | ||
16 | @@ -205,8 +205,8 @@ install-bin: all $(SCRIPTS) | ||
17 | install-lib: all | ||
18 | @$(VECHO) INSTALL-LIB | ||
19 | $(INSTALL) -d $(DESTDIR)$(LIBDIR) | ||
20 | - $(INSTALL_LIB) $(LIBFDT_lib) $(DESTDIR)$(LIBDIR) | ||
21 | - ln -sf $(notdir $(LIBFDT_lib)) $(DESTDIR)$(LIBDIR)/$(LIBFDT_soname) | ||
22 | + $(INSTALL) $(LIBFDT_lib) $(DESTDIR)$(LIBDIR)/$(LIBFDT_soname) | ||
23 | + ln -sf $(LIBFDT_soname) $(DESTDIR)$(LIBDIR)/$(notdir $(LIBFDT_lib)) | ||
24 | ln -sf $(LIBFDT_soname) $(DESTDIR)$(LIBDIR)/libfdt.$(SHAREDLIB_EXT) | ||
25 | $(INSTALL_DATA) $(LIBFDT_archive) $(DESTDIR)$(LIBDIR) | ||
26 | |||
diff --git a/meta/recipes-kernel/dtc/dtc_1.6.0.bb b/meta/recipes-kernel/dtc/dtc_1.6.0.bb deleted file mode 100644 index a407137859..0000000000 --- a/meta/recipes-kernel/dtc/dtc_1.6.0.bb +++ /dev/null | |||
@@ -1,12 +0,0 @@ | |||
1 | require dtc.inc | ||
2 | |||
3 | LIC_FILES_CHKSUM = "file://GPL;md5=b234ee4d69f5fce4486a80fdaf4a4263 \ | ||
4 | file://libfdt/libfdt.h;beginline=4;endline=7;md5=05bb357cfb75cae7d2b01d2ee8d76407" | ||
5 | |||
6 | SRCREV = "2525da3dba9beceb96651dc2986581871dbeca30" | ||
7 | |||
8 | SRC_URI += "file://0001-fdtdump-Fix-gcc11-warning.patch" | ||
9 | |||
10 | S = "${WORKDIR}/git" | ||
11 | |||
12 | BBCLASSEXTEND = "native nativesdk" | ||
diff --git a/meta/recipes-kernel/dtc/dtc_1.7.2.bb b/meta/recipes-kernel/dtc/dtc_1.7.2.bb new file mode 100644 index 0000000000..92e83a9404 --- /dev/null +++ b/meta/recipes-kernel/dtc/dtc_1.7.2.bb | |||
@@ -0,0 +1,31 @@ | |||
1 | SUMMARY = "Device Tree Compiler" | ||
2 | HOMEPAGE = "https://devicetree.org/" | ||
3 | DESCRIPTION = "The Device Tree Compiler is a toolchain for working with device tree source and binary files." | ||
4 | SECTION = "bootloader" | ||
5 | LICENSE = "GPL-2.0-only | BSD-2-Clause" | ||
6 | |||
7 | LIC_FILES_CHKSUM = "file://GPL;md5=b234ee4d69f5fce4486a80fdaf4a4263 \ | ||
8 | file://BSD-2-Clause;md5=5d6306d1b08f8df623178dfd81880927 \ | ||
9 | file://README.license;md5=a1eb22e37f09df5b5511b8a278992d0e" | ||
10 | |||
11 | SRC_URI = " \ | ||
12 | git://git.kernel.org/pub/scm/utils/dtc/dtc.git;branch=main;protocol=https \ | ||
13 | " | ||
14 | SRCREV = "2d10aa2afe35527728db30b35ec491ecb6959e5c" | ||
15 | |||
16 | UPSTREAM_CHECK_GITTAGREGEX = "v(?P<pver>\d+(\.\d+)+)" | ||
17 | |||
18 | inherit meson pkgconfig | ||
19 | |||
20 | EXTRA_OEMESON = "-Dpython=disabled -Dvalgrind=disabled" | ||
21 | |||
22 | PACKAGECONFIG ??= "tools" | ||
23 | PACKAGECONFIG[tests] = "-Dtests=true,-Dtests=false," | ||
24 | PACKAGECONFIG[tools] = "-Dtools=true,-Dtools=false,flex-native bison-native" | ||
25 | PACKAGECONFIG[yaml] = "-Dyaml=enabled,-Dyaml=disabled,libyaml" | ||
26 | |||
27 | PACKAGES =+ "${PN}-misc" | ||
28 | FILES:${PN}-misc = "${bindir}/convert-dtsv0 ${bindir}/ftdump ${bindir}/dtdiff" | ||
29 | RDEPENDS:${PN}-misc += "${@bb.utils.contains('PACKAGECONFIG', 'tools', 'bash diffutils', '', d)}" | ||
30 | |||
31 | BBCLASSEXTEND = "native nativesdk" | ||
diff --git a/meta/recipes-kernel/dtc/python3-dtschema-wrapper/dt-doc-validate b/meta/recipes-kernel/dtc/python3-dtschema-wrapper/dt-doc-validate new file mode 100644 index 0000000000..2aa57851c7 --- /dev/null +++ b/meta/recipes-kernel/dtc/python3-dtschema-wrapper/dt-doc-validate | |||
@@ -0,0 +1,20 @@ | |||
1 | #!/bin/sh | ||
2 | # dt-doc-validate wrapper to allow kernel dt-validation to pass | ||
3 | # | ||
4 | # Copyright (C) 2021 Bruce Ashfield <bruce.ashfield@gmail.com> | ||
5 | # License: MIT (see COPYING.MIT at the root of the repository for terms) | ||
6 | |||
7 | for arg; do | ||
8 | case "$arg" in | ||
9 | --version) | ||
10 | echo "v2021.10" | ||
11 | ;; | ||
12 | esac | ||
13 | done | ||
14 | |||
15 | # TBD: left for future consideration | ||
16 | # exec dt-doc-validate.real "$@" | ||
17 | |||
18 | # we always succeed | ||
19 | exit 0 | ||
20 | |||
diff --git a/meta/recipes-kernel/dtc/python3-dtschema-wrapper/dt-mk-schema b/meta/recipes-kernel/dtc/python3-dtschema-wrapper/dt-mk-schema new file mode 100644 index 0000000000..24b89d8619 --- /dev/null +++ b/meta/recipes-kernel/dtc/python3-dtschema-wrapper/dt-mk-schema | |||
@@ -0,0 +1,20 @@ | |||
1 | #!/bin/sh | ||
2 | # dt-mk-schema wrapper to allow kernel dt-validation to pass | ||
3 | # | ||
4 | # Copyright (C) 2021 Bruce Ashfield <bruce.ashfield@gmail.com> | ||
5 | # License: MIT (see COPYING.MIT at the root of the repository for terms) | ||
6 | |||
7 | for arg; do | ||
8 | case "$arg" in | ||
9 | --version) | ||
10 | echo "v2021.10" | ||
11 | ;; | ||
12 | esac | ||
13 | done | ||
14 | |||
15 | # TBD: left for future consideration | ||
16 | # exec dt-mk-schema.real "$@" | ||
17 | |||
18 | # we always succeed | ||
19 | exit 0 | ||
20 | |||
diff --git a/meta/recipes-kernel/dtc/python3-dtschema-wrapper/dt-validate b/meta/recipes-kernel/dtc/python3-dtschema-wrapper/dt-validate new file mode 100644 index 0000000000..8a4710a7ed --- /dev/null +++ b/meta/recipes-kernel/dtc/python3-dtschema-wrapper/dt-validate | |||
@@ -0,0 +1,20 @@ | |||
1 | #!/bin/sh | ||
2 | # dt-validate wrapper to allow kernel dt-validation to pass | ||
3 | # | ||
4 | # Copyright (C) 2021 Bruce Ashfield <bruce.ashfield@gmail.com> | ||
5 | # License: MIT (see COPYING.MIT at the root of the repository for terms) | ||
6 | |||
7 | for arg; do | ||
8 | case "$arg" in | ||
9 | --version) | ||
10 | echo "v2021.10" | ||
11 | ;; | ||
12 | esac | ||
13 | done | ||
14 | |||
15 | # TBD: left for future consideration | ||
16 | # exec dt-validate.real "$@" | ||
17 | |||
18 | # we always succeed | ||
19 | exit 0 | ||
20 | |||
diff --git a/meta/recipes-kernel/dtc/python3-dtschema-wrapper_2021.10.bb b/meta/recipes-kernel/dtc/python3-dtschema-wrapper_2021.10.bb new file mode 100644 index 0000000000..b19f53e20d --- /dev/null +++ b/meta/recipes-kernel/dtc/python3-dtschema-wrapper_2021.10.bb | |||
@@ -0,0 +1,19 @@ | |||
1 | SUMMARY = "Wrapper for tooling for devicetree validation using YAML and jsonschema" | ||
2 | HOMEPAGE = "https://yoctoproject.org" | ||
3 | LICENSE = "MIT" | ||
4 | LIC_FILES_CHKSUM = "file://${COREBASE}/meta/COPYING.MIT;md5=3da9cfbcb788c80a0384361b4de20420" | ||
5 | |||
6 | SRC_URI = "file://dt-doc-validate \ | ||
7 | file://dt-mk-schema \ | ||
8 | file://dt-validate" | ||
9 | |||
10 | S = "${UNPACKDIR}" | ||
11 | |||
12 | do_install() { | ||
13 | install -d ${D}${bindir}/ | ||
14 | install -m 755 ${UNPACKDIR}/dt-doc-validate ${D}${bindir}/ | ||
15 | install -m 755 ${UNPACKDIR}/dt-mk-schema ${D}${bindir}/ | ||
16 | install -m 755 ${UNPACKDIR}/dt-validate ${D}${bindir}/ | ||
17 | } | ||
18 | |||
19 | BBCLASSEXTEND = "native nativesdk" | ||
diff --git a/meta/recipes-kernel/kern-tools/kern-tools-native_git.bb b/meta/recipes-kernel/kern-tools/kern-tools-native_git.bb index 70b2908fd4..84b8b10a26 100644 --- a/meta/recipes-kernel/kern-tools/kern-tools-native_git.bb +++ b/meta/recipes-kernel/kern-tools/kern-tools-native_git.bb | |||
@@ -3,20 +3,20 @@ DESCRIPTION = "Powerful set of tools or managing Yocto Linux kernel sources \ | |||
3 | and configuration data. You can use these tools to make a single configuration \ | 3 | and configuration data. You can use these tools to make a single configuration \ |
4 | change, apply multiple patches, or work with your own kernel sources." | 4 | change, apply multiple patches, or work with your own kernel sources." |
5 | HOMEPAGE = "https://www.yoctoproject.org/" | 5 | HOMEPAGE = "https://www.yoctoproject.org/" |
6 | LICENSE = "GPLv2" | 6 | LICENSE = "GPL-2.0-only & MIT" |
7 | LIC_FILES_CHKSUM = "file://tools/kgit;beginline=5;endline=9;md5=9c30e971d435e249624278c3e343e501" | 7 | LIC_FILES_CHKSUM = "\ |
8 | file://tools/kgit;beginline=5;endline=9;md5=9c30e971d435e249624278c3e343e501 \ | ||
9 | file://Kconfiglib/LICENSE.txt;md5=712177a72a3937909543eda3ad1bfb7c \ | ||
10 | " | ||
8 | 11 | ||
9 | DEPENDS = "git-native" | 12 | DEPENDS += "git-replacement-native" |
10 | 13 | ||
11 | SRCREV = "73f813024d33432116a122524fd2ae48afc910c7" | 14 | SRCREV = "fe67c98d2e9b74af44d0c4b660fa18e3a95e7edd" |
12 | PR = "r12" | 15 | PV = "0.3+git" |
13 | PV = "0.2+git${SRCPV}" | ||
14 | 16 | ||
15 | inherit native | 17 | inherit native |
16 | 18 | ||
17 | SRC_URI = "git://git.yoctoproject.org/yocto-kernel-tools.git" | 19 | SRC_URI = "git://git.yoctoproject.org/yocto-kernel-tools.git;branch=master;protocol=https" |
18 | S = "${WORKDIR}/git" | ||
19 | UPSTREAM_CHECK_COMMITS = "1" | ||
20 | 20 | ||
21 | do_configure() { | 21 | do_configure() { |
22 | : | 22 | : |
diff --git a/meta/recipes-kernel/kernel-signing-keys/kernel-signing-keys-native.bb b/meta/recipes-kernel/kernel-signing-keys/kernel-signing-keys-native.bb new file mode 100644 index 0000000000..f346f1648a --- /dev/null +++ b/meta/recipes-kernel/kernel-signing-keys/kernel-signing-keys-native.bb | |||
@@ -0,0 +1,73 @@ | |||
1 | # Automatically generate key pairs in UBOOT_SIGN_KEYDIR if they do not exist. | ||
2 | # The key pair is generated by the kernel-signing-keys-native recipe and is not | ||
3 | # stored in the sstate cache. This can be beneficial from a security standpoint, | ||
4 | # as it avoids unintentionally caching and distributing private keys. | ||
5 | # However, this behavior can lead to non-reproducible builds. For example, if | ||
6 | # the keys are deleted, they must be manually restored, or you must run: | ||
7 | # bitbake -c cleanall kernel-signing-keys-native | ||
8 | # before new key pairs are generated. | ||
9 | # | ||
10 | # However, this approach is only suitable for simple or local development use | ||
11 | # cases. For more advanced or production-grade scenarios, a more robust solution | ||
12 | # is usually required—such as external signing or re-signing using e.g a HSM. | ||
13 | |||
14 | SUMMARY = "Signing keys for the kernel FIT image" | ||
15 | LICENSE = "MIT" | ||
16 | LIC_FILES_CHKSUM = "file://${COREBASE}/meta/COPYING.MIT;md5=3da9cfbcb788c80a0384361b4de20420" | ||
17 | |||
18 | require conf/image-fitimage.conf | ||
19 | |||
20 | DEPENDS += "openssl-native" | ||
21 | |||
22 | inherit native | ||
23 | |||
24 | do_fetch[noexec] = "1" | ||
25 | do_unpack[noexec] = "1" | ||
26 | do_patch[noexec] = "1" | ||
27 | do_configure[noexec] = "1" | ||
28 | do_install[noexec] = "1" | ||
29 | |||
30 | do_compile() { | ||
31 | if [ "${UBOOT_SIGN_ENABLE}" = "0" ] && [ "${FIT_GENERATE_KEYS}" = "1" ]; then | ||
32 | bbwarn "FIT_GENERATE_KEYS is set to 1 even though UBOOT_SIGN_ENABLE is set to 0. The keys will not be generated as they won't be used." | ||
33 | fi | ||
34 | |||
35 | if [ "${UBOOT_SIGN_ENABLE}" = "1" ] && [ "${FIT_GENERATE_KEYS}" = "1" ]; then | ||
36 | |||
37 | # Generate keys to sign configuration nodes, only if they don't already exist | ||
38 | if [ ! -f "${UBOOT_SIGN_KEYDIR}/${UBOOT_SIGN_KEYNAME}".key ] || \ | ||
39 | [ ! -f "${UBOOT_SIGN_KEYDIR}/${UBOOT_SIGN_KEYNAME}".crt ]; then | ||
40 | |||
41 | # make directory if it does not already exist | ||
42 | mkdir -p "${UBOOT_SIGN_KEYDIR}" | ||
43 | |||
44 | bbnote "Generating RSA private key for signing fitImage" | ||
45 | openssl genrsa ${FIT_KEY_GENRSA_ARGS} -out \ | ||
46 | "${UBOOT_SIGN_KEYDIR}/${UBOOT_SIGN_KEYNAME}".key \ | ||
47 | "${FIT_SIGN_NUMBITS}" | ||
48 | |||
49 | bbnote "Generating certificate for signing fitImage" | ||
50 | openssl req ${FIT_KEY_REQ_ARGS} "${FIT_KEY_SIGN_PKCS}" \ | ||
51 | -key "${UBOOT_SIGN_KEYDIR}/${UBOOT_SIGN_KEYNAME}".key \ | ||
52 | -out "${UBOOT_SIGN_KEYDIR}/${UBOOT_SIGN_KEYNAME}".crt | ||
53 | fi | ||
54 | |||
55 | # Generate keys to sign image nodes, only if they don't already exist | ||
56 | if [ ! -f "${UBOOT_SIGN_KEYDIR}/${UBOOT_SIGN_IMG_KEYNAME}".key ] || \ | ||
57 | [ ! -f "${UBOOT_SIGN_KEYDIR}/${UBOOT_SIGN_IMG_KEYNAME}".crt ]; then | ||
58 | |||
59 | # make directory if it does not already exist | ||
60 | mkdir -p "${UBOOT_SIGN_KEYDIR}" | ||
61 | |||
62 | bbnote "Generating RSA private key for signing fitImage" | ||
63 | openssl genrsa ${FIT_KEY_GENRSA_ARGS} -out \ | ||
64 | "${UBOOT_SIGN_KEYDIR}/${UBOOT_SIGN_IMG_KEYNAME}".key \ | ||
65 | "${FIT_SIGN_NUMBITS}" | ||
66 | |||
67 | bbnote "Generating certificate for signing fitImage" | ||
68 | openssl req ${FIT_KEY_REQ_ARGS} "${FIT_KEY_SIGN_PKCS}" \ | ||
69 | -key "${UBOOT_SIGN_KEYDIR}/${UBOOT_SIGN_IMG_KEYNAME}".key \ | ||
70 | -out "${UBOOT_SIGN_KEYDIR}/${UBOOT_SIGN_IMG_KEYNAME}".crt | ||
71 | fi | ||
72 | fi | ||
73 | } | ||
diff --git a/meta/recipes-kernel/kexec/kexec-tools/0001-arm64-kexec-disabled-check-if-kaslr-seed-dtb-propert.patch b/meta/recipes-kernel/kexec/kexec-tools/0001-arm64-kexec-disabled-check-if-kaslr-seed-dtb-propert.patch index c2301e711d..ee731cea4b 100644 --- a/meta/recipes-kernel/kexec/kexec-tools/0001-arm64-kexec-disabled-check-if-kaslr-seed-dtb-propert.patch +++ b/meta/recipes-kernel/kexec/kexec-tools/0001-arm64-kexec-disabled-check-if-kaslr-seed-dtb-propert.patch | |||
@@ -1,4 +1,4 @@ | |||
1 | From d48ec5e1a5fb7907520dee71b1d94045486a0c29 Mon Sep 17 00:00:00 2001 | 1 | From 9e95f8933bded10fdd664fc95492825347ec59a7 Mon Sep 17 00:00:00 2001 |
2 | From: Alexander Kamensky <alexander.kamensky42@gmail.com> | 2 | From: Alexander Kamensky <alexander.kamensky42@gmail.com> |
3 | Date: Thu, 12 Nov 2020 12:56:46 -0800 | 3 | Date: Thu, 12 Nov 2020 12:56:46 -0800 |
4 | Subject: [PATCH] arm64: kexec: disabled check if kaslr-seed dtb property was | 4 | Subject: [PATCH] arm64: kexec: disabled check if kaslr-seed dtb property was |
@@ -33,20 +33,20 @@ Upstream-Status: Submitted [http://lists.infradead.org/pipermail/kexec/2020-Nove | |||
33 | kexec/arch/arm64/kexec-arm64.c | 14 +------------- | 33 | kexec/arch/arm64/kexec-arm64.c | 14 +------------- |
34 | 1 file changed, 1 insertion(+), 13 deletions(-) | 34 | 1 file changed, 1 insertion(+), 13 deletions(-) |
35 | 35 | ||
36 | Index: kexec-tools-2.0.20/kexec/arch/arm64/kexec-arm64.c | 36 | diff --git a/kexec/arch/arm64/kexec-arm64.c b/kexec/arch/arm64/kexec-arm64.c |
37 | =================================================================== | 37 | index 9091f40..ea304f9 100644 |
38 | --- kexec-tools-2.0.20.orig/kexec/arch/arm64/kexec-arm64.c | 38 | --- a/kexec/arch/arm64/kexec-arm64.c |
39 | +++ kexec-tools-2.0.20/kexec/arch/arm64/kexec-arm64.c | 39 | +++ b/kexec/arch/arm64/kexec-arm64.c |
40 | @@ -428,7 +428,7 @@ static int setup_2nd_dtb(struct dtb *dtb | 40 | @@ -504,7 +504,7 @@ static int setup_2nd_dtb(struct dtb *dtb, char *command_line, int on_crash) |
41 | int len, range_len; | 41 | int len, range_len; |
42 | int nodeoffset; | 42 | int nodeoffset; |
43 | int new_size; | 43 | int new_size; |
44 | - int result, kaslr_seed; | 44 | - int i, result, kaslr_seed; |
45 | + int result; | 45 | + int i, result; |
46 | 46 | ||
47 | result = fdt_check_header(dtb->buf); | 47 | result = fdt_check_header(dtb->buf); |
48 | 48 | ||
49 | @@ -499,18 +499,6 @@ static int setup_2nd_dtb(struct dtb *dtb | 49 | @@ -577,18 +577,6 @@ static int setup_2nd_dtb(struct dtb *dtb, char *command_line, int on_crash) |
50 | return result; | 50 | return result; |
51 | } | 51 | } |
52 | } else { | 52 | } else { |
diff --git a/meta/recipes-kernel/kexec/kexec-tools/0001-kexec-arch-ppc-kexec-ppc.c-correct-double-definition.patch b/meta/recipes-kernel/kexec/kexec-tools/0001-kexec-arch-ppc-kexec-ppc.c-correct-double-definition.patch deleted file mode 100644 index 6aeebc3939..0000000000 --- a/meta/recipes-kernel/kexec/kexec-tools/0001-kexec-arch-ppc-kexec-ppc.c-correct-double-definition.patch +++ /dev/null | |||
@@ -1,23 +0,0 @@ | |||
1 | From ba2fb5baf6b0a8c882ac32301dd7a8d16de0dcf6 Mon Sep 17 00:00:00 2001 | ||
2 | From: Alexander Kanavin <alex.kanavin@gmail.com> | ||
3 | Date: Sun, 27 Dec 2020 23:39:29 +0100 | ||
4 | Subject: [PATCH] kexec/arch/ppc/kexec-ppc.c: correct double definition error | ||
5 | |||
6 | Upstream-Status: Pending | ||
7 | Signed-off-by: Alexander Kanavin <alex.kanavin@gmail.com> | ||
8 | --- | ||
9 | kexec/arch/ppc/kexec-ppc.c | 1 - | ||
10 | 1 file changed, 1 deletion(-) | ||
11 | |||
12 | diff --git a/kexec/arch/ppc/kexec-ppc.c b/kexec/arch/ppc/kexec-ppc.c | ||
13 | index 03bec36..5b3e244 100644 | ||
14 | --- a/kexec/arch/ppc/kexec-ppc.c | ||
15 | +++ b/kexec/arch/ppc/kexec-ppc.c | ||
16 | @@ -35,7 +35,6 @@ unsigned long long initrd_base = 0, initrd_size = 0; | ||
17 | unsigned long long ramdisk_base = 0, ramdisk_size = 0; | ||
18 | unsigned int rtas_base, rtas_size; | ||
19 | int max_memory_ranges; | ||
20 | -const char *ramdisk; | ||
21 | |||
22 | /* | ||
23 | * Reads the #address-cells and #size-cells on this platform. | ||
diff --git a/meta/recipes-kernel/kexec/kexec-tools/0001-kexec.c-add-MFD_NOEXEC_SEAL-flag-explicitly.patch b/meta/recipes-kernel/kexec/kexec-tools/0001-kexec.c-add-MFD_NOEXEC_SEAL-flag-explicitly.patch new file mode 100644 index 0000000000..5d994d9ffb --- /dev/null +++ b/meta/recipes-kernel/kexec/kexec-tools/0001-kexec.c-add-MFD_NOEXEC_SEAL-flag-explicitly.patch | |||
@@ -0,0 +1,43 @@ | |||
1 | From 0b176595ca1610037d1175e1786d1a8aff1fb43f Mon Sep 17 00:00:00 2001 | ||
2 | From: Chen Qi <Qi.Chen@windriver.com> | ||
3 | Date: Tue, 6 Aug 2024 21:42:43 -0700 | ||
4 | Subject: [PATCH] kexec.c: add MFD_NOEXEC_SEAL flag explicitly | ||
5 | |||
6 | Add MFD_NOEXEC_SEAL to avoid kernel warning like below: | ||
7 | |||
8 | kexec[970]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set | ||
9 | |||
10 | For old kernels, there will be no MFD_NOEXEC_SEAL definition, so fallback | ||
11 | to define it to 0. | ||
12 | |||
13 | Upstream-Status: Submitted [https://github.com/horms/kexec-tools/pull/7] | ||
14 | |||
15 | Signed-off-by: Chen Qi <Qi.Chen@windriver.com> | ||
16 | --- | ||
17 | kexec/kexec.c | 6 +++++- | ||
18 | 1 file changed, 5 insertions(+), 1 deletion(-) | ||
19 | |||
20 | diff --git a/kexec/kexec.c b/kexec/kexec.c | ||
21 | index 6bf12d7..2f8e7cc 100644 | ||
22 | --- a/kexec/kexec.c | ||
23 | +++ b/kexec/kexec.c | ||
24 | @@ -61,6 +61,10 @@ | ||
25 | #define KEXEC_LOADED_PATH "/sys/kernel/kexec_loaded" | ||
26 | #define KEXEC_CRASH_LOADED_PATH "/sys/kernel/kexec_crash_loaded" | ||
27 | |||
28 | +#ifndef MFD_NOEXEC_SEAL | ||
29 | +#define MFD_NOEXEC_SEAL 0 | ||
30 | +#endif | ||
31 | + | ||
32 | unsigned long long mem_min = 0; | ||
33 | unsigned long long mem_max = ULONG_MAX; | ||
34 | unsigned long elfcorehdrsz = 0; | ||
35 | @@ -661,7 +665,7 @@ static int copybuf_memfd(const char *kernel_buf, size_t size) | ||
36 | { | ||
37 | int fd, count; | ||
38 | |||
39 | - fd = memfd_create("kernel", MFD_ALLOW_SEALING); | ||
40 | + fd = memfd_create("kernel", MFD_ALLOW_SEALING | MFD_NOEXEC_SEAL); | ||
41 | if (fd == -1) | ||
42 | return fd; | ||
43 | |||
diff --git a/meta/recipes-kernel/kexec/kexec-tools/0001-ppc-fs2dt-Match-function-signatures.patch b/meta/recipes-kernel/kexec/kexec-tools/0001-ppc-fs2dt-Match-function-signatures.patch new file mode 100644 index 0000000000..483e5195a9 --- /dev/null +++ b/meta/recipes-kernel/kexec/kexec-tools/0001-ppc-fs2dt-Match-function-signatures.patch | |||
@@ -0,0 +1,31 @@ | |||
1 | From 4a07e8f22b4f224dca79767e5cb86a0de91498dc Mon Sep 17 00:00:00 2001 | ||
2 | From: Khem Raj <raj.khem@gmail.com> | ||
3 | Date: Sat, 17 May 2025 07:48:50 -0700 | ||
4 | Subject: [PATCH] ppc/fs2dt: Match function signatures | ||
5 | |||
6 | The prototypes of function pointers is analysed and | ||
7 | compiler finds the signature mismatches and complain about it. | ||
8 | |||
9 | ../kexec-tools-2.0.31/kexec/arch/ppc/fs2dt.c:338:44: error: incompatible function pointer types passing 'int (const void *, const void *)' to parameter of type 'int (*)(const struct dirent **, const struct dirent **)' [-Wincompatible-function-pointer-types] | ||
10 | 338 | numlist = scandir(pathname, &namelist, 0, comparefunc); | ||
11 | | ^~~~~~~~~~~ | ||
12 | |||
13 | Upstream-Status: Submitted [https://lore.kernel.org/kexec/20250517145852.2488183-1-raj.khem@gmail.com/T/#u] | ||
14 | Signed-off-by: Khem Raj <raj.khem@gmail.com> | ||
15 | --- | ||
16 | kexec/arch/ppc/fs2dt.c | 2 +- | ||
17 | 1 file changed, 1 insertion(+), 1 deletion(-) | ||
18 | |||
19 | diff --git a/kexec/arch/ppc/fs2dt.c b/kexec/arch/ppc/fs2dt.c | ||
20 | index fed499b..4952bfc 100644 | ||
21 | --- a/kexec/arch/ppc/fs2dt.c | ||
22 | +++ b/kexec/arch/ppc/fs2dt.c | ||
23 | @@ -292,7 +292,7 @@ static void putprops(char *fn, struct dirent **nlist, int numlist) | ||
24 | * Compare function used to sort the device-tree directories | ||
25 | * This function will be passed to scandir. | ||
26 | */ | ||
27 | -static int comparefunc(const void *dentry1, const void *dentry2) | ||
28 | +static int comparefunc(const struct dirent ** dentry1, const struct dirent **dentry2) | ||
29 | { | ||
30 | char *str1 = (*(struct dirent **)dentry1)->d_name; | ||
31 | char *str2 = (*(struct dirent **)dentry2)->d_name; | ||
diff --git a/meta/recipes-kernel/kexec/kexec-tools/0002-purgatory-Pass-r-directly-to-linker.patch b/meta/recipes-kernel/kexec/kexec-tools/0002-purgatory-Pass-r-directly-to-linker.patch index 363d5da4ae..a537ac2f0b 100644 --- a/meta/recipes-kernel/kexec/kexec-tools/0002-purgatory-Pass-r-directly-to-linker.patch +++ b/meta/recipes-kernel/kexec/kexec-tools/0002-purgatory-Pass-r-directly-to-linker.patch | |||
@@ -1,4 +1,4 @@ | |||
1 | From a04bcf8f683c1a5a7d015920124457ad56fb7cf0 Mon Sep 17 00:00:00 2001 | 1 | From e5bc9fbd6029057a4e3815a5326af5bd83a450e6 Mon Sep 17 00:00:00 2001 |
2 | From: Khem Raj <raj.khem@gmail.com> | 2 | From: Khem Raj <raj.khem@gmail.com> |
3 | Date: Mon, 7 Sep 2015 07:59:45 +0000 | 3 | Date: Mon, 7 Sep 2015 07:59:45 +0000 |
4 | Subject: [PATCH] purgatory: Pass -r directly to linker | 4 | Subject: [PATCH] purgatory: Pass -r directly to linker |
@@ -10,15 +10,16 @@ unfiltered | |||
10 | Signed-off-by: Khem Raj <raj.khem@gmail.com> | 10 | Signed-off-by: Khem Raj <raj.khem@gmail.com> |
11 | 11 | ||
12 | Upstream-Status: Pending | 12 | Upstream-Status: Pending |
13 | |||
13 | --- | 14 | --- |
14 | purgatory/Makefile | 2 +- | 15 | purgatory/Makefile | 2 +- |
15 | 1 file changed, 1 insertion(+), 1 deletion(-) | 16 | 1 file changed, 1 insertion(+), 1 deletion(-) |
16 | 17 | ||
17 | diff --git a/purgatory/Makefile b/purgatory/Makefile | 18 | diff --git a/purgatory/Makefile b/purgatory/Makefile |
18 | index 2dd6c47..416e6b9 100644 | 19 | index 4d2d071..6673423 100644 |
19 | --- a/purgatory/Makefile | 20 | --- a/purgatory/Makefile |
20 | +++ b/purgatory/Makefile | 21 | +++ b/purgatory/Makefile |
21 | @@ -60,7 +60,7 @@ $(PURGATORY): CPPFLAGS=$($(ARCH)_PURGATORY_EXTRA_CFLAGS) \ | 22 | @@ -61,7 +61,7 @@ $(PURGATORY): CPPFLAGS=$($(ARCH)_PURGATORY_EXTRA_CFLAGS) \ |
22 | -I$(shell $(CC) -print-file-name=include) | 23 | -I$(shell $(CC) -print-file-name=include) |
23 | $(PURGATORY): LDFLAGS=$($(ARCH)_PURGATORY_EXTRA_CFLAGS)\ | 24 | $(PURGATORY): LDFLAGS=$($(ARCH)_PURGATORY_EXTRA_CFLAGS)\ |
24 | -Wl,--no-undefined -nostartfiles -nostdlib \ | 25 | -Wl,--no-undefined -nostartfiles -nostdlib \ |
diff --git a/meta/recipes-kernel/kexec/kexec-tools/0003-kexec-ARM-Fix-add_buffer_phys_virt-align-issue.patch b/meta/recipes-kernel/kexec/kexec-tools/0003-kexec-ARM-Fix-add_buffer_phys_virt-align-issue.patch deleted file mode 100644 index 832fe67716..0000000000 --- a/meta/recipes-kernel/kexec/kexec-tools/0003-kexec-ARM-Fix-add_buffer_phys_virt-align-issue.patch +++ /dev/null | |||
@@ -1,49 +0,0 @@ | |||
1 | From 55e583d20651e829afbbc8dba0f8ec3017cda2d5 Mon Sep 17 00:00:00 2001 | ||
2 | From: Haiqing Bai <Haiqing.Bai@windriver.com> | ||
3 | Date: Mon, 9 Jan 2017 15:26:29 +0800 | ||
4 | Subject: [PATCH] kexec: ARM: Fix add_buffer_phys_virt() align issue | ||
5 | |||
6 | When "CONFIG_ARM_LPAE" is enabled,3 level page table | ||
7 | is used by MMU, the "SECTION_SIZE" is defined with | ||
8 | (1 << 21), but 'add_buffer_phys_virt()' hardcode this | ||
9 | to (1 << 20). | ||
10 | |||
11 | Upstream-Status: Pending | ||
12 | |||
13 | Suggested-By:fredrik.markstrom@gmail.com | ||
14 | Signed-off-by: Haiqing Bai <Haiqing.Bai@windriver.com> | ||
15 | --- | ||
16 | kexec/arch/arm/crashdump-arm.c | 5 ++++- | ||
17 | 1 file changed, 4 insertions(+), 1 deletion(-) | ||
18 | |||
19 | diff --git a/kexec/arch/arm/crashdump-arm.c b/kexec/arch/arm/crashdump-arm.c | ||
20 | index daa4788..3f72b38 100644 | ||
21 | --- a/kexec/arch/arm/crashdump-arm.c | ||
22 | +++ b/kexec/arch/arm/crashdump-arm.c | ||
23 | @@ -240,6 +240,7 @@ int load_crashdump_segments(struct kexec_info *info, char *mod_cmdline) | ||
24 | void *buf; | ||
25 | int err; | ||
26 | int last_ranges; | ||
27 | + unsigned short align_bit_shift = 20; | ||
28 | |||
29 | /* | ||
30 | * First fetch all the memory (RAM) ranges that we are going to pass to | ||
31 | @@ -281,6 +282,7 @@ int load_crashdump_segments(struct kexec_info *info, char *mod_cmdline) | ||
32 | |||
33 | /* for support LPAE enabled kernel*/ | ||
34 | elf_info.class = ELFCLASS64; | ||
35 | + align_bit_shift = 21; | ||
36 | |||
37 | err = crash_create_elf64_headers(info, &elf_info, | ||
38 | usablemem_rgns.ranges, | ||
39 | @@ -302,8 +304,9 @@ int load_crashdump_segments(struct kexec_info *info, char *mod_cmdline) | ||
40 | * 1MB) so that available memory passed in kernel command line will be | ||
41 | * aligned to 1MB. This is because kernel create_mapping() wants memory | ||
42 | * regions to be aligned to SECTION_SIZE. | ||
43 | + * The SECTION_SIZE of LPAE kernel is '1UL << 21' defined in pgtable-3level.h | ||
44 | */ | ||
45 | - elfcorehdr = add_buffer_phys_virt(info, buf, bufsz, bufsz, 1 << 20, | ||
46 | + elfcorehdr = add_buffer_phys_virt(info, buf, bufsz, bufsz, 1 << align_bit_shift, | ||
47 | crash_kernel_mem.start, | ||
48 | crash_kernel_mem.end, -1, 0); | ||
49 | |||
diff --git a/meta/recipes-kernel/kexec/kexec-tools/0005-Disable-PIE-during-link.patch b/meta/recipes-kernel/kexec/kexec-tools/0005-Disable-PIE-during-link.patch index 7a4b8548ca..6a21744ac1 100644 --- a/meta/recipes-kernel/kexec/kexec-tools/0005-Disable-PIE-during-link.patch +++ b/meta/recipes-kernel/kexec/kexec-tools/0005-Disable-PIE-during-link.patch | |||
@@ -1,4 +1,4 @@ | |||
1 | From c54488ad5fd657e0f154d76d7456d9080be24836 Mon Sep 17 00:00:00 2001 | 1 | From 494888bcc3bbf070dfce1b2686ee34c8619aa33d Mon Sep 17 00:00:00 2001 |
2 | From: Khem Raj <raj.khem@gmail.com> | 2 | From: Khem Raj <raj.khem@gmail.com> |
3 | Date: Sat, 10 Jun 2017 11:18:49 -0700 | 3 | Date: Sat, 10 Jun 2017 11:18:49 -0700 |
4 | Subject: [PATCH] Disable PIE during link | 4 | Subject: [PATCH] Disable PIE during link |
@@ -9,15 +9,16 @@ just need to match it with linker flags | |||
9 | Upstream-Status: Pending | 9 | Upstream-Status: Pending |
10 | 10 | ||
11 | Signed-off-by: Khem Raj <raj.khem@gmail.com> | 11 | Signed-off-by: Khem Raj <raj.khem@gmail.com> |
12 | |||
12 | --- | 13 | --- |
13 | purgatory/Makefile | 2 +- | 14 | purgatory/Makefile | 2 +- |
14 | 1 file changed, 1 insertion(+), 1 deletion(-) | 15 | 1 file changed, 1 insertion(+), 1 deletion(-) |
15 | 16 | ||
16 | diff --git a/purgatory/Makefile b/purgatory/Makefile | 17 | diff --git a/purgatory/Makefile b/purgatory/Makefile |
17 | index 416e6b9..f00edb4 100644 | 18 | index 6673423..a7405ea 100644 |
18 | --- a/purgatory/Makefile | 19 | --- a/purgatory/Makefile |
19 | +++ b/purgatory/Makefile | 20 | +++ b/purgatory/Makefile |
20 | @@ -59,7 +59,7 @@ $(PURGATORY): CPPFLAGS=$($(ARCH)_PURGATORY_EXTRA_CFLAGS) \ | 21 | @@ -60,7 +60,7 @@ $(PURGATORY): CPPFLAGS=$($(ARCH)_PURGATORY_EXTRA_CFLAGS) \ |
21 | -Iinclude \ | 22 | -Iinclude \ |
22 | -I$(shell $(CC) -print-file-name=include) | 23 | -I$(shell $(CC) -print-file-name=include) |
23 | $(PURGATORY): LDFLAGS=$($(ARCH)_PURGATORY_EXTRA_CFLAGS)\ | 24 | $(PURGATORY): LDFLAGS=$($(ARCH)_PURGATORY_EXTRA_CFLAGS)\ |
diff --git a/meta/recipes-kernel/kexec/kexec-tools/0007-kexec-un-break-the-build-on-32-bit-x86.patch b/meta/recipes-kernel/kexec/kexec-tools/0007-kexec-un-break-the-build-on-32-bit-x86.patch deleted file mode 100644 index 36b0845f4a..0000000000 --- a/meta/recipes-kernel/kexec/kexec-tools/0007-kexec-un-break-the-build-on-32-bit-x86.patch +++ /dev/null | |||
@@ -1,43 +0,0 @@ | |||
1 | From bb6a26371d15473b380459ac4404bf330634b585 Mon Sep 17 00:00:00 2001 | ||
2 | From: Alexander Kanavin <alex.kanavin@gmail.com> | ||
3 | Date: Fri, 20 Dec 2019 17:21:08 +0100 | ||
4 | Subject: [PATCH] kexec: un-break the build on 32 bit x86 | ||
5 | |||
6 | Upstream-Status: Pending | ||
7 | Signed-off-by: Alexander Kanavin <alex.kanavin@gmail.com> | ||
8 | |||
9 | --- | ||
10 | kexec/arch/i386/Makefile | 1 + | ||
11 | kexec/arch/i386/kexec-x86.h | 4 ++++ | ||
12 | 2 files changed, 5 insertions(+) | ||
13 | |||
14 | diff --git a/kexec/arch/i386/Makefile b/kexec/arch/i386/Makefile | ||
15 | index f486103..5d560be 100644 | ||
16 | --- a/kexec/arch/i386/Makefile | ||
17 | +++ b/kexec/arch/i386/Makefile | ||
18 | @@ -12,6 +12,7 @@ i386_KEXEC_SRCS += kexec/arch/i386/kexec-beoboot-x86.c | ||
19 | i386_KEXEC_SRCS += kexec/arch/i386/kexec-nbi.c | ||
20 | i386_KEXEC_SRCS += kexec/arch/i386/x86-linux-setup.c | ||
21 | i386_KEXEC_SRCS += kexec/arch/i386/crashdump-x86.c | ||
22 | +i386_KEXEC_SRCS += kexec/arch/i386/kexec-mb2-x86.c | ||
23 | |||
24 | dist += kexec/arch/i386/Makefile $(i386_KEXEC_SRCS) \ | ||
25 | kexec/arch/i386/crashdump-x86.h \ | ||
26 | diff --git a/kexec/arch/i386/kexec-x86.h b/kexec/arch/i386/kexec-x86.h | ||
27 | index 0f941df..c423171 100644 | ||
28 | --- a/kexec/arch/i386/kexec-x86.h | ||
29 | +++ b/kexec/arch/i386/kexec-x86.h | ||
30 | @@ -56,9 +56,13 @@ struct arch_options_t { | ||
31 | }; | ||
32 | |||
33 | int multiboot_x86_probe(const char *buf, off_t len); | ||
34 | +int multiboot2_x86_probe(const char *buf, off_t len); | ||
35 | int multiboot_x86_load(int argc, char **argv, const char *buf, off_t len, | ||
36 | struct kexec_info *info); | ||
37 | +int multiboot2_x86_load(int argc, char **argv, const char *buf, off_t len, | ||
38 | + struct kexec_info *info); | ||
39 | void multiboot_x86_usage(void); | ||
40 | +void multiboot2_x86_usage(void); | ||
41 | |||
42 | int multiboot2_x86_load(int argc, char **argv, const char *buf, off_t len, | ||
43 | struct kexec_info *info); | ||
diff --git a/meta/recipes-kernel/kexec/kexec-tools_2.0.21.bb b/meta/recipes-kernel/kexec/kexec-tools_2.0.31.bb index 069e8f4d05..7333aa73c1 100644 --- a/meta/recipes-kernel/kexec/kexec-tools_2.0.21.bb +++ b/meta/recipes-kernel/kexec/kexec-tools_2.0.31.bb | |||
@@ -1,13 +1,13 @@ | |||
1 | |||
2 | SUMMARY = "Kexec fast reboot tools" | 1 | SUMMARY = "Kexec fast reboot tools" |
3 | DESCRIPTION = "Kexec is a fast reboot feature that lets you reboot to a new Linux kernel" | 2 | DESCRIPTION = "Kexec is a fast reboot feature that lets you reboot to a new Linux kernel" |
4 | AUTHOR = "Eric Biederman" | ||
5 | HOMEPAGE = "http://kernel.org/pub/linux/utils/kernel/kexec/" | 3 | HOMEPAGE = "http://kernel.org/pub/linux/utils/kernel/kexec/" |
6 | SECTION = "kernel/userland" | 4 | SECTION = "kernel/userland" |
7 | LICENSE = "GPLv2" | 5 | LICENSE = "GPL-2.0-only" |
8 | LIC_FILES_CHKSUM = "file://COPYING;md5=ea5bed2f60d357618ca161ad539f7c0a \ | 6 | LIC_FILES_CHKSUM = "file://COPYING;md5=b234ee4d69f5fce4486a80fdaf4a4263 \ |
9 | file://kexec/kexec.c;beginline=1;endline=20;md5=af10f6ae4a8715965e648aa687ad3e09" | 7 | file://kexec/kexec.c;beginline=1;endline=20;md5=af10f6ae4a8715965e648aa687ad3e09 \ |
8 | " | ||
10 | DEPENDS = "zlib xz" | 9 | DEPENDS = "zlib xz" |
10 | RDEPENDS:${PN} = "makedumpfile" | ||
11 | 11 | ||
12 | SRC_URI = "${KERNELORG_MIRROR}/linux/utils/kernel/kexec/kexec-tools-${PV}.tar.gz \ | 12 | SRC_URI = "${KERNELORG_MIRROR}/linux/utils/kernel/kexec/kexec-tools-${PV}.tar.gz \ |
13 | file://kdump \ | 13 | file://kdump \ |
@@ -15,21 +15,23 @@ SRC_URI = "${KERNELORG_MIRROR}/linux/utils/kernel/kexec/kexec-tools-${PV}.tar.gz | |||
15 | file://kdump.service \ | 15 | file://kdump.service \ |
16 | file://0001-powerpc-change-the-memory-size-limit.patch \ | 16 | file://0001-powerpc-change-the-memory-size-limit.patch \ |
17 | file://0002-purgatory-Pass-r-directly-to-linker.patch \ | 17 | file://0002-purgatory-Pass-r-directly-to-linker.patch \ |
18 | file://0003-kexec-ARM-Fix-add_buffer_phys_virt-align-issue.patch \ | ||
19 | file://0005-Disable-PIE-during-link.patch \ | 18 | file://0005-Disable-PIE-during-link.patch \ |
20 | file://0007-kexec-un-break-the-build-on-32-bit-x86.patch \ | ||
21 | file://0001-arm64-kexec-disabled-check-if-kaslr-seed-dtb-propert.patch \ | 19 | file://0001-arm64-kexec-disabled-check-if-kaslr-seed-dtb-propert.patch \ |
22 | file://0001-kexec-arch-ppc-kexec-ppc.c-correct-double-definition.patch \ | 20 | file://0001-kexec.c-add-MFD_NOEXEC_SEAL-flag-explicitly.patch \ |
21 | file://0001-ppc-fs2dt-Match-function-signatures.patch \ | ||
23 | " | 22 | " |
24 | 23 | ||
25 | SRC_URI[sha256sum] = "b3d4cfd2ba10d68ce341ea3b8ca414d00a0b6183b95686172154f94bce834f94" | 24 | SRC_URI[sha256sum] = "ddaaa65b02b4f8aa9222586b1f26565b93a4baeffd35bcbd523f15fae7aa4897" |
26 | 25 | ||
27 | inherit autotools update-rc.d systemd | 26 | inherit autotools update-rc.d systemd |
28 | 27 | ||
29 | export LDFLAGS = "-L${STAGING_LIBDIR}" | 28 | export LDFLAGS = "-L${STAGING_LIBDIR}" |
30 | EXTRA_OECONF = " --with-zlib=yes" | 29 | EXTRA_OECONF = " --with-zlib=yes" |
31 | 30 | ||
32 | do_compile_prepend() { | 31 | # purgatory uses -msoft-float for ppc32/ppc64, it does not go with -maltivec |
32 | TUNE_CCARGS:remove:powerpc = "-maltivec" | ||
33 | |||
34 | do_compile:prepend() { | ||
33 | # Remove the prepackaged config.h from the source tree as it overrides | 35 | # Remove the prepackaged config.h from the source tree as it overrides |
34 | # the same file generated by configure and placed in the build tree | 36 | # the same file generated by configure and placed in the build tree |
35 | rm -f ${S}/include/config.h | 37 | rm -f ${S}/include/config.h |
@@ -44,45 +46,48 @@ do_compile_prepend() { | |||
44 | done | 46 | done |
45 | } | 47 | } |
46 | 48 | ||
47 | do_install_append () { | 49 | do_install:append () { |
48 | install -d ${D}${sysconfdir}/sysconfig | 50 | install -d ${D}${sysconfdir}/sysconfig |
49 | install -m 0644 ${WORKDIR}/kdump.conf ${D}${sysconfdir}/sysconfig | 51 | install -m 0644 ${UNPACKDIR}/kdump.conf ${D}${sysconfdir}/sysconfig |
50 | 52 | ||
51 | if ${@bb.utils.contains('DISTRO_FEATURES', 'sysvinit', 'true', 'false', d)}; then | 53 | if ${@bb.utils.contains('DISTRO_FEATURES', 'sysvinit', 'true', 'false', d)}; then |
52 | install -D -m 0755 ${WORKDIR}/kdump ${D}${sysconfdir}/init.d/kdump | 54 | install -D -m 0755 ${UNPACKDIR}/kdump ${D}${sysconfdir}/init.d/kdump |
53 | fi | 55 | fi |
54 | 56 | ||
55 | if ${@bb.utils.contains('DISTRO_FEATURES', 'systemd', 'true', 'false', d)}; then | 57 | if ${@bb.utils.contains('DISTRO_FEATURES', 'systemd', 'true', 'false', d)}; then |
56 | install -D -m 0755 ${WORKDIR}/kdump ${D}${libexecdir}/kdump-helper | 58 | install -D -m 0755 ${UNPACKDIR}/kdump ${D}${libexecdir}/kdump-helper |
57 | install -D -m 0644 ${WORKDIR}/kdump.service ${D}${systemd_unitdir}/system/kdump.service | 59 | install -D -m 0644 ${UNPACKDIR}/kdump.service ${D}${systemd_system_unitdir}/kdump.service |
58 | sed -i -e 's,@LIBEXECDIR@,${libexecdir},g' ${D}${systemd_unitdir}/system/kdump.service | 60 | sed -i -e 's,@LIBEXECDIR@,${libexecdir},g' ${D}${systemd_system_unitdir}/kdump.service |
59 | fi | 61 | fi |
60 | } | 62 | } |
61 | 63 | ||
62 | PACKAGES =+ "kexec kdump vmcore-dmesg" | 64 | PACKAGES =+ "kexec kdump vmcore-dmesg" |
63 | 65 | ||
64 | ALLOW_EMPTY_${PN} = "1" | 66 | ALLOW_EMPTY:${PN} = "1" |
65 | RRECOMMENDS_${PN} = "kexec kdump vmcore-dmesg" | 67 | RRECOMMENDS:${PN} = "kexec kdump vmcore-dmesg" |
66 | 68 | ||
67 | FILES_kexec = "${sbindir}/kexec" | 69 | FILES:kexec = "${sbindir}/kexec" |
68 | FILES_kdump = "${sbindir}/kdump \ | 70 | FILES:kdump = "${sbindir}/kdump \ |
69 | ${sysconfdir}/sysconfig/kdump.conf \ | 71 | ${sysconfdir}/sysconfig/kdump.conf \ |
70 | ${sysconfdir}/init.d/kdump \ | 72 | ${sysconfdir}/init.d/kdump \ |
71 | ${libexecdir}/kdump-helper \ | 73 | ${libexecdir}/kdump-helper \ |
72 | ${systemd_unitdir}/system/kdump.service \ | 74 | ${systemd_system_unitdir}/kdump.service \ |
73 | " | 75 | " |
74 | 76 | ||
75 | FILES_vmcore-dmesg = "${sbindir}/vmcore-dmesg" | 77 | FILES:vmcore-dmesg = "${sbindir}/vmcore-dmesg" |
76 | 78 | ||
77 | INITSCRIPT_PACKAGES = "kdump" | 79 | INITSCRIPT_PACKAGES = "kdump" |
78 | INITSCRIPT_NAME_kdump = "kdump" | 80 | INITSCRIPT_NAME:kdump = "kdump" |
79 | INITSCRIPT_PARAMS_kdump = "start 56 2 3 4 5 . stop 56 0 1 6 ." | 81 | INITSCRIPT_PARAMS:kdump = "start 56 2 3 4 5 . stop 56 0 1 6 ." |
80 | 82 | ||
81 | SYSTEMD_PACKAGES = "kdump" | 83 | SYSTEMD_PACKAGES = "kdump" |
82 | SYSTEMD_SERVICE_kdump = "kdump.service" | 84 | SYSTEMD_SERVICE:kdump = "kdump.service" |
83 | 85 | ||
84 | SECURITY_PIE_CFLAGS_remove = "-fPIE -pie" | 86 | SECURITY_PIE_CFLAGS:remove = "-fPIE -pie" |
85 | 87 | ||
86 | COMPATIBLE_HOST = '(x86_64.*|i.86.*|arm.*|aarch64.*|powerpc.*|mips.*)-(linux|freebsd.*)' | 88 | COMPATIBLE_HOST = '(x86_64.*|i.86.*|arm.*|aarch64.*|powerpc.*|mips.*)-(linux|freebsd.*)' |
89 | # makedumpfile would not compile on mips/rv32 | ||
90 | COMPATIBLE_HOST:mipsarcho32 = "null" | ||
91 | COMPATIBLE_HOST:riscv32 = "null" | ||
87 | 92 | ||
88 | INSANE_SKIP_${PN} = "arch" | 93 | INSANE_SKIP:${PN} = "arch" |
diff --git a/meta/recipes-kernel/kmod/depmodwrapper-cross_1.0.bb b/meta/recipes-kernel/kmod/depmodwrapper-cross_1.0.bb index 9a172675af..5e70e01102 100644 --- a/meta/recipes-kernel/kmod/depmodwrapper-cross_1.0.bb +++ b/meta/recipes-kernel/kmod/depmodwrapper-cross_1.0.bb | |||
@@ -1,7 +1,7 @@ | |||
1 | SUMMARY = "Wrapper script for the Linux kernel module dependency indexer" | 1 | SUMMARY = "Wrapper script for the Linux kernel module dependency indexer" |
2 | LICENSE = "MIT" | 2 | LICENSE = "MIT" |
3 | 3 | ||
4 | S = "${WORKDIR}" | 4 | S = "${UNPACKDIR}" |
5 | 5 | ||
6 | INHIBIT_DEFAULT_DEPS = "1" | 6 | INHIBIT_DEFAULT_DEPS = "1" |
7 | # The kernel and the staging dir for it is machine specific | 7 | # The kernel and the staging dir for it is machine specific |
@@ -21,20 +21,29 @@ do_install() { | |||
21 | #!/bin/sh | 21 | #!/bin/sh |
22 | # Expected to be called as: depmodwrapper -a KERNEL_VERSION | 22 | # Expected to be called as: depmodwrapper -a KERNEL_VERSION |
23 | if [ "\$1" != "-a" -o "\$2" != "-b" ]; then | 23 | if [ "\$1" != "-a" -o "\$2" != "-b" ]; then |
24 | echo "Usage: depmodwrapper -a -b rootfs KERNEL_VERSION" >&2 | 24 | echo "Usage: depmodwrapper -a -b rootfs KERNEL_VERSION [KERNEL_PACKAGE_NAME]" >&2 |
25 | exit 1 | 25 | exit 1 |
26 | fi | 26 | fi |
27 | 27 | ||
28 | kernelpkgname="kernel" | ||
29 | # If no KERNEL_PACKAGE_NAME, assume "kernel". | ||
30 | [ -z "\$5" ] || kernelpkgname="\$5" | ||
31 | |||
28 | kernelabi="" | 32 | kernelabi="" |
29 | if [ -r "${PKGDATA_DIR}/kernel-depmod/kernel-abiversion" ]; then | 33 | if [ -r "${PKGDATA_DIR}/\${kernelpkgname}-depmod/\${kernelpkgname}-abiversion" ]; then |
30 | kernelabi=\$(cat "${PKGDATA_DIR}/kernel-depmod/kernel-abiversion") | 34 | kernelabi=\$(cat "${PKGDATA_DIR}/\${kernelpkgname}-depmod/\${kernelpkgname}-abiversion") |
35 | fi | ||
36 | |||
37 | if [ ! -e "\$3${nonarch_base_libdir}/depmod.d/exclude.conf" ]; then | ||
38 | mkdir -p "\$3${nonarch_base_libdir}/depmod.d" | ||
39 | echo "exclude .debug" > "\$3${nonarch_base_libdir}/depmod.d/exclude.conf" | ||
31 | fi | 40 | fi |
32 | 41 | ||
33 | if [ ! -r ${PKGDATA_DIR}/kernel-depmod/System.map-\$4 ] || [ "\$kernelabi" != "\$4" ]; then | 42 | if [ ! -r ${PKGDATA_DIR}/\${kernelpkgname}-depmod/System.map-\$4 ] || [ "\$kernelabi" != "\$4" ]; then |
34 | echo "Unable to read: ${PKGDATA_DIR}/kernel-depmod/System.map-\$4" >&2 | 43 | echo "Unable to read: ${PKGDATA_DIR}/\${kernelpkgname}-depmod/System.map-\$4" >&2 |
35 | exec env depmod "\$1" "\$2" "\$3" "\$4" | 44 | exec env depmod -C "\$3${nonarch_base_libdir}/depmod.d" "\$1" "\$2" "\$3" "\$4" |
36 | else | 45 | else |
37 | exec env depmod "\$1" "\$2" "\$3" -F "${PKGDATA_DIR}/kernel-depmod/System.map-\$4" "\$4" | 46 | exec env depmod -C "\$3${nonarch_base_libdir}/depmod.d" "\$1" "\$2" "\$3" -F "${PKGDATA_DIR}/\${kernelpkgname}-depmod/System.map-\$4" "\$4" |
38 | fi | 47 | fi |
39 | EOF | 48 | EOF |
40 | chmod +x ${D}${bindir_crossscripts}/depmodwrapper | 49 | chmod +x ${D}${bindir_crossscripts}/depmodwrapper |
diff --git a/meta/recipes-kernel/kmod/kmod-native_git.bb b/meta/recipes-kernel/kmod/kmod-native_git.bb deleted file mode 100644 index f61134bbaf..0000000000 --- a/meta/recipes-kernel/kmod/kmod-native_git.bb +++ /dev/null | |||
@@ -1,15 +0,0 @@ | |||
1 | # Copyright (C) 2012 Khem Raj <raj.khem@gmail.com> | ||
2 | # Released under the MIT license (see COPYING.MIT for the terms) | ||
3 | |||
4 | require kmod.inc | ||
5 | |||
6 | DEPENDS += "zlib-native" | ||
7 | |||
8 | inherit native | ||
9 | |||
10 | do_install_append (){ | ||
11 | for tool in depmod insmod lsmod modinfo modprobe rmmod | ||
12 | do | ||
13 | ln -s kmod ${D}${bindir}/$tool | ||
14 | done | ||
15 | } | ||
diff --git a/meta/recipes-kernel/kmod/kmod.inc b/meta/recipes-kernel/kmod/kmod.inc deleted file mode 100644 index ccda9f2b73..0000000000 --- a/meta/recipes-kernel/kmod/kmod.inc +++ /dev/null | |||
@@ -1,38 +0,0 @@ | |||
1 | # Copyright (C) 2012 Khem Raj <raj.khem@gmail.com> | ||
2 | # Released under the MIT license (see COPYING.MIT for the terms) | ||
3 | |||
4 | SUMMARY = "Tools for managing Linux kernel modules" | ||
5 | DESCRIPTION = "kmod is a set of tools to handle common tasks with Linux kernel modules like \ | ||
6 | insert, remove, list, check properties, resolve dependencies and aliases." | ||
7 | HOMEPAGE = "http://kernel.org/pub/linux/utils/kernel/kmod/" | ||
8 | LICENSE = "GPL-2.0+ & LGPL-2.1+" | ||
9 | LICENSE_libkmod = "LGPL-2.1+" | ||
10 | SECTION = "base" | ||
11 | |||
12 | LIC_FILES_CHKSUM = "file://COPYING;md5=a6f89e2100d9b6cdffcea4f398e37343 \ | ||
13 | file://libkmod/COPYING;md5=a6f89e2100d9b6cdffcea4f398e37343 \ | ||
14 | file://tools/COPYING;md5=751419260aa954499f7abaabaa882bbe \ | ||
15 | " | ||
16 | inherit autotools gtk-doc pkgconfig manpages | ||
17 | |||
18 | SRCREV = "1ccfe994287119cc6cef37a7ca4c529d89de4b95" | ||
19 | # Lookout for PV bump too when SRCREV is changed | ||
20 | PV = "28" | ||
21 | |||
22 | SRC_URI = "git://git.kernel.org/pub/scm/utils/kernel/kmod/kmod.git \ | ||
23 | file://depmod-search.conf \ | ||
24 | file://avoid_parallel_tests.patch \ | ||
25 | " | ||
26 | |||
27 | S = "${WORKDIR}/git" | ||
28 | |||
29 | EXTRA_AUTORECONF += "--install --symlink" | ||
30 | EXTRA_OECONF +=" --enable-tools --with-zlib" | ||
31 | |||
32 | PACKAGECONFIG[debug] = "--enable-debug,--disable-debug" | ||
33 | PACKAGECONFIG[logging] = " --enable-logging,--disable-logging" | ||
34 | PACKAGECONFIG[manpages] = "--enable-manpages, --disable-manpages, libxslt-native xmlto-native" | ||
35 | PACKAGECONFIG[xz] = "--with-xz,--without-xz,xz" | ||
36 | PACKAGECONFIG[openssl] = "--with-openssl,--without-openssl,openssl" | ||
37 | |||
38 | GTKDOC_DOCDIR = "${S}/libkmod/docs" | ||
diff --git a/meta/recipes-kernel/kmod/kmod/avoid_parallel_tests.patch b/meta/recipes-kernel/kmod/kmod/avoid_parallel_tests.patch deleted file mode 100644 index 04a8204815..0000000000 --- a/meta/recipes-kernel/kmod/kmod/avoid_parallel_tests.patch +++ /dev/null | |||
@@ -1,32 +0,0 @@ | |||
1 | From be6f82c54f694617c646ca1f8b5bcf93694e20ad Mon Sep 17 00:00:00 2001 | ||
2 | From: Tudor Florea <tudor.florea@enea.com> | ||
3 | Date: Fri, 6 Sep 2013 21:11:57 +0000 | ||
4 | Subject: [PATCH] kmod: avoid parallel-tests | ||
5 | |||
6 | Avoid parallel-tests as it remove | ||
7 | buildtest-TESTS and runtest-TESTS targets required by ptest. | ||
8 | In automake 1.13.4 parallel-tests is assumed by defauls. | ||
9 | In order to have buildtest-TESTS and runtest-TESTS targets | ||
10 | serial-tests is now required | ||
11 | |||
12 | Signed-off-by: Tudor Florea <tudor.florea@enea.com> | ||
13 | Upstream-Status: Inappropriate (disable feature incompatible with ptest) | ||
14 | |||
15 | --- | ||
16 | configure.ac | 2 +- | ||
17 | 1 file changed, 1 insertion(+), 1 deletion(-) | ||
18 | |||
19 | diff --git a/configure.ac b/configure.ac | ||
20 | index ee72283..60980c0 100644 | ||
21 | --- a/configure.ac | ||
22 | +++ b/configure.ac | ||
23 | @@ -14,8 +14,8 @@ AC_USE_SYSTEM_EXTENSIONS | ||
24 | AC_SYS_LARGEFILE | ||
25 | AC_PREFIX_DEFAULT([/usr]) | ||
26 | AM_MAINTAINER_MODE([enable]) | ||
27 | -AM_INIT_AUTOMAKE([check-news foreign 1.11 silent-rules tar-pax no-dist-gzip dist-xz subdir-objects color-tests parallel-tests]) | ||
28 | +AM_INIT_AUTOMAKE([check-news foreign 1.11 silent-rules tar-pax no-dist-gzip dist-xz subdir-objects color-tests serial-tests]) | ||
29 | AM_SILENT_RULES([yes]) | ||
30 | LT_INIT([disable-static pic-only]) | ||
31 | |||
32 | AS_IF([test "x$enable_static" = "xyes"], [AC_MSG_ERROR([--enable-static is not supported by kmod])]) | ||
diff --git a/meta/recipes-kernel/kmod/kmod/ptest.patch b/meta/recipes-kernel/kmod/kmod/ptest.patch deleted file mode 100644 index 831dbcb909..0000000000 --- a/meta/recipes-kernel/kmod/kmod/ptest.patch +++ /dev/null | |||
@@ -1,25 +0,0 @@ | |||
1 | Add 'install-ptest' rule. | ||
2 | |||
3 | Signed-off-by: Tudor Florea <tudor.florea@enea.com> | ||
4 | Upstream-Status: Pending | ||
5 | |||
6 | diff -ruN a/Makefile.am b/Makefile.am | ||
7 | --- a/Makefile.am 2013-07-12 17:11:05.278331557 +0200 | ||
8 | +++ b/Makefile.am 2013-07-12 17:14:27.033788016 +0200 | ||
9 | @@ -204,6 +204,16 @@ | ||
10 | |||
11 | distclean-local: $(DISTCLEAN_LOCAL_HOOKS) | ||
12 | |||
13 | +install-ptest: | ||
14 | + @$(MKDIR_P) $(DESTDIR)/testsuite | ||
15 | + @for file in $(TESTSUITE); do \ | ||
16 | + install $$file $(DESTDIR)/testsuite; \ | ||
17 | + done; | ||
18 | + @sed -e 's/^Makefile/_Makefile/' < Makefile > $(DESTDIR)/Makefile | ||
19 | + @$(MKDIR_P) $(DESTDIR)/tools | ||
20 | + @cp $(noinst_SCRIPTS) $(noinst_PROGRAMS) $(DESTDIR)/tools | ||
21 | + @cp -r testsuite/rootfs testsuite/.libs $(DESTDIR)/testsuite | ||
22 | + | ||
23 | # ------------------------------------------------------------------------------ | ||
24 | # custom release helpers | ||
25 | # ------------------------------------------------------------------------------ | ||
diff --git a/meta/recipes-kernel/kmod/kmod/run-ptest b/meta/recipes-kernel/kmod/kmod/run-ptest deleted file mode 100755 index 598dd2cb5f..0000000000 --- a/meta/recipes-kernel/kmod/kmod/run-ptest +++ /dev/null | |||
@@ -1,5 +0,0 @@ | |||
1 | #!/bin/sh | ||
2 | touch testsuite/stamp-rootfs | ||
3 | tar xf testmodule.tar | ||
4 | make -k runtest-TESTS 2>/dev/null| grep -e ^PASS -e ^FAIL | ||
5 | find testsuite -name *.ko -exec rm -f {} \; | ||
diff --git a/meta/recipes-kernel/kmod/kmod_34.2.bb b/meta/recipes-kernel/kmod/kmod_34.2.bb new file mode 100644 index 0000000000..e5923a64cf --- /dev/null +++ b/meta/recipes-kernel/kmod/kmod_34.2.bb | |||
@@ -0,0 +1,77 @@ | |||
1 | # Copyright (C) 2012 Khem Raj <raj.khem@gmail.com> | ||
2 | # Released under the MIT license (see COPYING.MIT for the terms) | ||
3 | |||
4 | SUMMARY = "Tools for managing Linux kernel modules" | ||
5 | DESCRIPTION = "kmod is a set of tools to handle common tasks with Linux kernel modules like \ | ||
6 | insert, remove, list, check properties, resolve dependencies and aliases." | ||
7 | HOMEPAGE = "http://kernel.org/pub/linux/utils/kernel/kmod/" | ||
8 | LICENSE = "GPL-2.0-or-later & LGPL-2.1-or-later" | ||
9 | LICENSE:libkmod = "LGPL-2.1-or-later" | ||
10 | SECTION = "base" | ||
11 | |||
12 | LIC_FILES_CHKSUM = "file://COPYING;md5=a6f89e2100d9b6cdffcea4f398e37343 \ | ||
13 | file://libkmod/COPYING;md5=a6f89e2100d9b6cdffcea4f398e37343 \ | ||
14 | file://tools/COPYING;md5=751419260aa954499f7abaabaa882bbe \ | ||
15 | " | ||
16 | inherit bash-completion gtk-doc manpages meson pkgconfig update-alternatives | ||
17 | |||
18 | SRC_URI = "https://www.kernel.org/pub/linux/utils/kernel/${BPN}/${BP}.tar.xz \ | ||
19 | file://depmod-search.conf \ | ||
20 | " | ||
21 | SRC_URI[sha256sum] = "5a5d5073070cc7e0c7a7a3c6ec2a0e1780850c8b47b3e3892226b93ffcb9cb54" | ||
22 | |||
23 | EXTRA_OEMESON += "\ | ||
24 | -Ddistconfdir=${nonarch_base_libdir} \ | ||
25 | --bindir=${base_bindir} \ | ||
26 | --sbindir=${base_sbindir} \ | ||
27 | -Dtools=true \ | ||
28 | " | ||
29 | |||
30 | PACKAGECONFIG ??= "zlib xz openssl" | ||
31 | PACKAGECONFIG[debug] = "-Ddebug-messages=true,-Ddebug-messages=false" | ||
32 | PACKAGECONFIG[logging] = " -Dlogging=true,-Dlogging=false" | ||
33 | PACKAGECONFIG[manpages] = "-Dmanpages=true,-Dmanpages=false,scdoc-native" | ||
34 | PACKAGECONFIG[openssl] = "-Dopenssl=enabled,-Dopenssl=disabled,openssl" | ||
35 | PACKAGECONFIG[xz] = "-Dxz=enabled,-Dxz=disabled,xz" | ||
36 | PACKAGECONFIG[zlib] = "-Dzlib=enabled,-Dzlib=disabled,zlib" | ||
37 | PACKAGECONFIG[zstd] = "-Dzstd=enabled,-Dzstd=disabled,zstd" | ||
38 | |||
39 | PROVIDES += "module-init-tools-insmod-static module-init-tools-depmod module-init-tools" | ||
40 | RPROVIDES:${PN} += "module-init-tools-insmod-static module-init-tools-depmod module-init-tools" | ||
41 | RCONFLICTS:${PN} += "module-init-tools-insmod-static module-init-tools-depmod module-init-tools" | ||
42 | RREPLACES:${PN} += "module-init-tools-insmod-static module-init-tools-depmod module-init-tools" | ||
43 | |||
44 | # to force user to remove old module-init-tools and replace them with kmod variants | ||
45 | RCONFLICTS:libkmod2 += "module-init-tools-insmod-static module-init-tools-depmod module-init-tools" | ||
46 | |||
47 | do_install:append () { | ||
48 | # install depmod.d file for search/ dir | ||
49 | install -Dm644 "${UNPACKDIR}/depmod-search.conf" "${D}${nonarch_base_libdir}/depmod.d/search.conf" | ||
50 | |||
51 | # Add .debug to the exclude path for depmod | ||
52 | echo "exclude .debug" > ${D}${nonarch_base_libdir}/depmod.d/exclude.conf | ||
53 | } | ||
54 | |||
55 | PACKAGES += "${PN}-fish-completion ${PN}-zsh-completion" | ||
56 | |||
57 | FILES:${PN}-fish-completion = "${datadir}/fish" | ||
58 | FILES:${PN}-zsh-completion = "${datadir}/zsh" | ||
59 | |||
60 | ALTERNATIVE_PRIORITY = "70" | ||
61 | |||
62 | ALTERNATIVE:kmod = "insmod modprobe rmmod modinfo bin-lsmod lsmod depmod" | ||
63 | |||
64 | ALTERNATIVE_LINK_NAME[depmod] = "${base_sbindir}/depmod" | ||
65 | ALTERNATIVE_LINK_NAME[insmod] = "${base_sbindir}/insmod" | ||
66 | ALTERNATIVE_LINK_NAME[modprobe] = "${base_sbindir}/modprobe" | ||
67 | ALTERNATIVE_LINK_NAME[rmmod] = "${base_sbindir}/rmmod" | ||
68 | ALTERNATIVE_LINK_NAME[modinfo] = "${base_sbindir}/modinfo" | ||
69 | ALTERNATIVE_LINK_NAME[bin-lsmod] = "${base_sbindir}/lsmod" | ||
70 | ALTERNATIVE_LINK_NAME[lsmod] = "${base_sbindir}/lsmod" | ||
71 | ALTERNATIVE_TARGET[lsmod] = "${base_sbindir}/lsmod.${BPN}" | ||
72 | |||
73 | PACKAGES =+ "libkmod" | ||
74 | FILES:libkmod = "${base_libdir}/libkmod*${SOLIBS} ${libdir}/libkmod*${SOLIBS}" | ||
75 | FILES:${PN} += "${nonarch_base_libdir}/depmod.d ${nonarch_base_libdir}/modprobe.d" | ||
76 | |||
77 | BBCLASSEXTEND = "native nativesdk" | ||
diff --git a/meta/recipes-kernel/kmod/kmod_git.bb b/meta/recipes-kernel/kmod/kmod_git.bb deleted file mode 100644 index 4f2b037f2f..0000000000 --- a/meta/recipes-kernel/kmod/kmod_git.bb +++ /dev/null | |||
@@ -1,62 +0,0 @@ | |||
1 | # Copyright (C) 2012 Khem Raj <raj.khem@gmail.com> | ||
2 | # Released under the MIT license (see COPYING.MIT for the terms) | ||
3 | |||
4 | require kmod.inc | ||
5 | |||
6 | DEPENDS += "zlib" | ||
7 | PROVIDES += "module-init-tools-insmod-static module-init-tools-depmod module-init-tools" | ||
8 | RPROVIDES_${PN} += "module-init-tools-insmod-static module-init-tools-depmod module-init-tools" | ||
9 | RCONFLICTS_${PN} += "module-init-tools-insmod-static module-init-tools-depmod module-init-tools" | ||
10 | RREPLACES_${PN} += "module-init-tools-insmod-static module-init-tools-depmod module-init-tools" | ||
11 | |||
12 | # to force user to remove old module-init-tools and replace them with kmod variants | ||
13 | RCONFLICTS_libkmod2 += "module-init-tools-insmod-static module-init-tools-depmod module-init-tools" | ||
14 | |||
15 | # autotools set prefix to /usr, however we want them in /bin and /sbin | ||
16 | EXTRA_OECONF += " --bindir=${base_bindir} --sbindir=${base_sbindir}" | ||
17 | |||
18 | do_install_append () { | ||
19 | install -dm755 ${D}${base_bindir} | ||
20 | install -dm755 ${D}${base_sbindir} | ||
21 | # add symlinks to kmod | ||
22 | lnr ${D}${base_bindir}/kmod ${D}${base_bindir}/lsmod | ||
23 | for tool in insmod rmmod depmod modinfo modprobe; do | ||
24 | lnr ${D}${base_bindir}/kmod ${D}${base_sbindir}/${tool} | ||
25 | done | ||
26 | # configuration directories | ||
27 | install -dm755 ${D}${base_libdir}/depmod.d | ||
28 | install -dm755 ${D}${base_libdir}/modprobe.d | ||
29 | install -dm755 ${D}${sysconfdir}/depmod.d | ||
30 | install -dm755 ${D}${sysconfdir}/modprobe.d | ||
31 | |||
32 | # install depmod.d file for search/ dir | ||
33 | install -Dm644 "${WORKDIR}/depmod-search.conf" "${D}${base_libdir}/depmod.d/search.conf" | ||
34 | } | ||
35 | |||
36 | do_compile_prepend() { | ||
37 | sed -i 's/ac_pwd=/#ac_pwd=/' config.status ; sed -i "/#ac_pwd=/a\ac_pwd='.'" config.status | ||
38 | } | ||
39 | |||
40 | inherit update-alternatives bash-completion | ||
41 | |||
42 | ALTERNATIVE_PRIORITY = "70" | ||
43 | |||
44 | ALTERNATIVE_kmod = "insmod modprobe rmmod modinfo bin-lsmod lsmod depmod" | ||
45 | |||
46 | ALTERNATIVE_LINK_NAME[insmod] = "${base_sbindir}/insmod" | ||
47 | ALTERNATIVE_LINK_NAME[modprobe] = "${base_sbindir}/modprobe" | ||
48 | ALTERNATIVE_LINK_NAME[rmmod] = "${base_sbindir}/rmmod" | ||
49 | ALTERNATIVE_LINK_NAME[modinfo] = "${base_sbindir}/modinfo" | ||
50 | ALTERNATIVE_LINK_NAME[bin-lsmod] = "${base_bindir}/lsmod" | ||
51 | |||
52 | ALTERNATIVE_LINK_NAME[lsmod] = "${base_sbindir}/lsmod" | ||
53 | ALTERNATIVE_TARGET[lsmod] = "${base_bindir}/lsmod.${BPN}" | ||
54 | |||
55 | ALTERNATIVE_LINK_NAME[depmod] = "${base_sbindir}/depmod" | ||
56 | |||
57 | PACKAGES =+ "libkmod" | ||
58 | |||
59 | FILES_libkmod = "${base_libdir}/libkmod*${SOLIBS} ${libdir}/libkmod*${SOLIBS}" | ||
60 | FILES_${PN} += "${base_libdir}/depmod.d ${base_libdir}/modprobe.d" | ||
61 | |||
62 | BBCLASSEXTEND = "nativesdk" | ||
diff --git a/meta/recipes-kernel/libtraceevent/libtraceevent_1.8.4.bb b/meta/recipes-kernel/libtraceevent/libtraceevent_1.8.4.bb new file mode 100644 index 0000000000..75762e4def --- /dev/null +++ b/meta/recipes-kernel/libtraceevent/libtraceevent_1.8.4.bb | |||
@@ -0,0 +1,21 @@ | |||
1 | # Copyright (C) 2022 Khem Raj <raj.khem@gmail.com> | ||
2 | # Released under the MIT license (see COPYING.MIT for the terms) | ||
3 | |||
4 | SUMMARY = "API to access the kernel tracefs directory" | ||
5 | HOMEPAGE = "https://git.kernel.org/pub/scm/libs/libtrace/libtracefs.git/" | ||
6 | LICENSE = "GPL-2.0-or-later & LGPL-2.1-or-later" | ||
7 | LIC_FILES_CHKSUM = "file://LICENSES/GPL-2.0;md5=e6a75371ba4d16749254a51215d13f97 \ | ||
8 | file://LICENSES/LGPL-2.1;md5=b370887980db5dd40659b50909238dbd" | ||
9 | SECTION = "libs" | ||
10 | |||
11 | SRCREV = "bd47bd544c9ebc9f44bd88c2b2f2049230741058" | ||
12 | SRC_URI = "git://git.kernel.org/pub/scm/libs/libtrace/libtraceevent.git;branch=${BPN};protocol=https \ | ||
13 | " | ||
14 | |||
15 | inherit meson pkgconfig | ||
16 | |||
17 | EXTRA_OEMESON = "-Ddoc=false" | ||
18 | |||
19 | PACKAGES += "${PN}-plugins" | ||
20 | |||
21 | FILES:${PN}-plugins += "${libdir}/traceevent/plugins" | ||
diff --git a/meta/recipes-kernel/linux-firmware/linux-firmware_20210208.bb b/meta/recipes-kernel/linux-firmware/linux-firmware_20210208.bb deleted file mode 100644 index 0013e24580..0000000000 --- a/meta/recipes-kernel/linux-firmware/linux-firmware_20210208.bb +++ /dev/null | |||
@@ -1,1017 +0,0 @@ | |||
1 | SUMMARY = "Firmware files for use with Linux kernel" | ||
2 | DESCRIPTION = "Linux firmware is a package distributed alongside the Linux kernel \ | ||
3 | that contains firmware binary blobs necessary for partial or full functionality \ | ||
4 | of certain hardware devices." | ||
5 | SECTION = "kernel" | ||
6 | |||
7 | LICENSE = "\ | ||
8 | Firmware-Abilis \ | ||
9 | & Firmware-adsp_sst \ | ||
10 | & Firmware-agere \ | ||
11 | & Firmware-amdgpu \ | ||
12 | & Firmware-amd-ucode \ | ||
13 | & Firmware-amlogic_vdec \ | ||
14 | & Firmware-atheros_firmware \ | ||
15 | & Firmware-atmel \ | ||
16 | & Firmware-broadcom_bcm43xx \ | ||
17 | & Firmware-ca0132 \ | ||
18 | & Firmware-cavium \ | ||
19 | & Firmware-chelsio_firmware \ | ||
20 | & Firmware-cw1200 \ | ||
21 | & Firmware-cypress \ | ||
22 | & Firmware-dib0700 \ | ||
23 | & Firmware-e100 \ | ||
24 | & Firmware-ene_firmware \ | ||
25 | & Firmware-fw_sst_0f28 \ | ||
26 | & Firmware-go7007 \ | ||
27 | & Firmware-GPLv2 \ | ||
28 | & Firmware-hfi1_firmware \ | ||
29 | & Firmware-i2400m \ | ||
30 | & Firmware-i915 \ | ||
31 | & Firmware-ibt_firmware \ | ||
32 | & Firmware-ice \ | ||
33 | & Firmware-it913x \ | ||
34 | & Firmware-iwlwifi_firmware \ | ||
35 | & Firmware-IntcSST2 \ | ||
36 | & Firmware-kaweth \ | ||
37 | & Firmware-Lontium \ | ||
38 | & Firmware-Marvell \ | ||
39 | & Firmware-moxa \ | ||
40 | & Firmware-myri10ge_firmware \ | ||
41 | & Firmware-netronome \ | ||
42 | & Firmware-nvidia \ | ||
43 | & Firmware-OLPC \ | ||
44 | & Firmware-ath9k-htc \ | ||
45 | & Firmware-phanfw \ | ||
46 | & Firmware-qat \ | ||
47 | & Firmware-qcom \ | ||
48 | & Firmware-qla1280 \ | ||
49 | & Firmware-qla2xxx \ | ||
50 | & Firmware-qualcommAthos_ar3k \ | ||
51 | & Firmware-qualcommAthos_ath10k \ | ||
52 | & Firmware-r8a779x_usb3 \ | ||
53 | & Firmware-radeon \ | ||
54 | & Firmware-ralink_a_mediatek_company_firmware \ | ||
55 | & Firmware-ralink-firmware \ | ||
56 | & Firmware-rtlwifi_firmware \ | ||
57 | & Firmware-imx-sdma_firmware \ | ||
58 | & Firmware-siano \ | ||
59 | & Firmware-tda7706-firmware \ | ||
60 | & Firmware-ti-connectivity \ | ||
61 | & Firmware-ti-keystone \ | ||
62 | & Firmware-ueagle-atm4-firmware \ | ||
63 | & Firmware-via_vt6656 \ | ||
64 | & Firmware-wl1251 \ | ||
65 | & Firmware-xc4000 \ | ||
66 | & Firmware-xc5000 \ | ||
67 | & Firmware-xc5000c \ | ||
68 | & WHENCE \ | ||
69 | " | ||
70 | |||
71 | LIC_FILES_CHKSUM = "file://LICENCE.Abilis;md5=b5ee3f410780e56711ad48eadc22b8bc \ | ||
72 | file://LICENCE.adsp_sst;md5=615c45b91a5a4a9fe046d6ab9a2df728 \ | ||
73 | file://LICENCE.agere;md5=af0133de6b4a9b2522defd5f188afd31 \ | ||
74 | file://LICENSE.amdgpu;md5=d357524f5099e2a3db3c1838921c593f \ | ||
75 | file://LICENSE.amd-ucode;md5=3c5399dc9148d7f0e1f41e34b69cf14f \ | ||
76 | file://LICENSE.amlogic_vdec;md5=dc44f59bf64a81643e500ad3f39a468a \ | ||
77 | file://LICENCE.atheros_firmware;md5=30a14c7823beedac9fa39c64fdd01a13 \ | ||
78 | file://LICENSE.atmel;md5=aa74ac0c60595dee4d4e239107ea77a3 \ | ||
79 | file://LICENCE.broadcom_bcm43xx;md5=3160c14df7228891b868060e1951dfbc \ | ||
80 | file://LICENCE.ca0132;md5=209b33e66ee5be0461f13d31da392198 \ | ||
81 | file://LICENCE.cadence;md5=009f46816f6956cfb75ede13d3e1cee0 \ | ||
82 | file://LICENCE.cavium;md5=c37aaffb1ebe5939b2580d073a95daea \ | ||
83 | file://LICENCE.chelsio_firmware;md5=819aa8c3fa453f1b258ed8d168a9d903 \ | ||
84 | file://LICENCE.cw1200;md5=f0f770864e7a8444a5c5aa9d12a3a7ed \ | ||
85 | file://LICENCE.cypress;md5=48cd9436c763bf873961f9ed7b5c147b \ | ||
86 | file://LICENSE.dib0700;md5=f7411825c8a555a1a3e5eab9ca773431 \ | ||
87 | file://LICENCE.e100;md5=ec0f84136766df159a3ae6d02acdf5a8 \ | ||
88 | file://LICENCE.ene_firmware;md5=ed67f0f62f8f798130c296720b7d3921 \ | ||
89 | file://LICENCE.fw_sst_0f28;md5=6353931c988ad52818ae733ac61cd293 \ | ||
90 | file://LICENCE.go7007;md5=c0bb9f6aaaba55b0529ee9b30aa66beb \ | ||
91 | file://GPL-2;md5=b234ee4d69f5fce4486a80fdaf4a4263 \ | ||
92 | file://LICENSE.hfi1_firmware;md5=5e7b6e586ce7339d12689e49931ad444 \ | ||
93 | file://LICENCE.i2400m;md5=14b901969e23c41881327c0d9e4b7d36 \ | ||
94 | file://LICENSE.i915;md5=2b0b2e0d20984affd4490ba2cba02570 \ | ||
95 | file://LICENCE.ibt_firmware;md5=fdbee1ddfe0fb7ab0b2fcd6b454a366b \ | ||
96 | file://LICENSE.ice;md5=742ab4850f2670792940e6d15c974b2f \ | ||
97 | file://LICENCE.IntcSST2;md5=9e7d8bea77612d7cc7d9e9b54b623062 \ | ||
98 | file://LICENCE.it913x;md5=1fbf727bfb6a949810c4dbfa7e6ce4f8 \ | ||
99 | file://LICENCE.iwlwifi_firmware;md5=3fd842911ea93c29cd32679aa23e1c88 \ | ||
100 | file://LICENCE.kaweth;md5=b1d876e562f4b3b8d391ad8395dfe03f \ | ||
101 | file://LICENSE.Lontium;md5=4ec8dc582ff7295f39e2ca6a7b0be2b6 \ | ||
102 | file://LICENCE.Marvell;md5=28b6ed8bd04ba105af6e4dcd6e997772 \ | ||
103 | file://LICENCE.mediatek;md5=7c1976b63217d76ce47d0a11d8a79cf2 \ | ||
104 | file://LICENCE.moxa;md5=1086614767d8ccf744a923289d3d4261 \ | ||
105 | file://LICENCE.myri10ge_firmware;md5=42e32fb89f6b959ca222e25ac8df8fed \ | ||
106 | file://LICENCE.Netronome;md5=4add08f2577086d44447996503cddf5f \ | ||
107 | file://LICENCE.nvidia;md5=4428a922ed3ba2ceec95f076a488ce07 \ | ||
108 | file://LICENCE.NXP;md5=58bb8ba632cd729b9ba6183bc6aed36f \ | ||
109 | file://LICENCE.OLPC;md5=5b917f9d8c061991be4f6f5f108719cd \ | ||
110 | file://LICENCE.open-ath9k-htc-firmware;md5=1b33c9f4d17bc4d457bdb23727046837 \ | ||
111 | file://LICENCE.phanfw;md5=954dcec0e051f9409812b561ea743bfa \ | ||
112 | file://LICENCE.qat_firmware;md5=9e7d8bea77612d7cc7d9e9b54b623062 \ | ||
113 | file://LICENSE.qcom;md5=164e3362a538eb11d3ac51e8e134294b \ | ||
114 | file://LICENCE.qla1280;md5=d6895732e622d950609093223a2c4f5d \ | ||
115 | file://LICENCE.qla2xxx;md5=505855e921b75f1be4a437ad9b79dff0 \ | ||
116 | file://LICENSE.QualcommAtheros_ar3k;md5=b5fe244fb2b532311de1472a3bc06da5 \ | ||
117 | file://LICENSE.QualcommAtheros_ath10k;md5=cb42b686ee5f5cb890275e4321db60a8 \ | ||
118 | file://LICENCE.r8a779x_usb3;md5=4c1671656153025d7076105a5da7e498 \ | ||
119 | file://LICENSE.radeon;md5=68ec28bacb3613200bca44f404c69b16 \ | ||
120 | file://LICENCE.ralink_a_mediatek_company_firmware;md5=728f1a85fd53fd67fa8d7afb080bc435 \ | ||
121 | file://LICENCE.ralink-firmware.txt;md5=ab2c269277c45476fb449673911a2dfd \ | ||
122 | file://LICENCE.rtlwifi_firmware.txt;md5=00d06cfd3eddd5a2698948ead2ad54a5 \ | ||
123 | file://LICENSE.sdma_firmware;md5=51e8c19ecc2270f4b8ea30341ad63ce9 \ | ||
124 | file://LICENCE.siano;md5=4556c1bf830067f12ca151ad953ec2a5 \ | ||
125 | file://LICENCE.tda7706-firmware.txt;md5=835997cf5e3c131d0dddd695c7d9103e \ | ||
126 | file://LICENCE.ti-connectivity;md5=c5e02be633f1499c109d1652514d85ec \ | ||
127 | file://LICENCE.ti-keystone;md5=3a86335d32864b0bef996bee26cc0f2c \ | ||
128 | file://LICENCE.ueagle-atm4-firmware;md5=4ed7ea6b507ccc583b9d594417714118 \ | ||
129 | file://LICENCE.via_vt6656;md5=e4159694cba42d4377a912e78a6e850f \ | ||
130 | file://LICENCE.wl1251;md5=ad3f81922bb9e197014bb187289d3b5b \ | ||
131 | file://LICENCE.xc4000;md5=0ff51d2dc49fce04814c9155081092f0 \ | ||
132 | file://LICENCE.xc5000;md5=1e170c13175323c32c7f4d0998d53f66 \ | ||
133 | file://LICENCE.xc5000c;md5=12b02efa3049db65d524aeb418dd87ca \ | ||
134 | file://WHENCE;md5=ef0565762eac313c409567b59dff00b2 \ | ||
135 | " | ||
136 | |||
137 | # These are not common licenses, set NO_GENERIC_LICENSE for them | ||
138 | # so that the license files will be copied from fetched source | ||
139 | NO_GENERIC_LICENSE[Firmware-Abilis] = "LICENCE.Abilis" | ||
140 | NO_GENERIC_LICENSE[Firmware-adsp_sst] = "LICENCE.adsp_sst" | ||
141 | NO_GENERIC_LICENSE[Firmware-agere] = "LICENCE.agere" | ||
142 | NO_GENERIC_LICENSE[Firmware-amdgpu] = "LICENSE.amdgpu" | ||
143 | NO_GENERIC_LICENSE[Firmware-amd-ucode] = "LICENSE.amd-ucode" | ||
144 | NO_GENERIC_LICENSE[Firmware-amlogic_vdec] = "LICENSE.amlogic_vdec" | ||
145 | NO_GENERIC_LICENSE[Firmware-atheros_firmware] = "LICENCE.atheros_firmware" | ||
146 | NO_GENERIC_LICENSE[Firmware-atmel] = "LICENSE.atmel" | ||
147 | NO_GENERIC_LICENSE[Firmware-broadcom_bcm43xx] = "LICENCE.broadcom_bcm43xx" | ||
148 | NO_GENERIC_LICENSE[Firmware-ca0132] = "LICENCE.ca0132" | ||
149 | NO_GENERIC_LICENSE[Firmware-cadence] = "LICENCE.cadence" | ||
150 | NO_GENERIC_LICENSE[Firmware-cavium] = "LICENCE.cavium" | ||
151 | NO_GENERIC_LICENSE[Firmware-chelsio_firmware] = "LICENCE.chelsio_firmware" | ||
152 | NO_GENERIC_LICENSE[Firmware-cw1200] = "LICENCE.cw1200" | ||
153 | NO_GENERIC_LICENSE[Firmware-cypress] = "LICENCE.cypress" | ||
154 | NO_GENERIC_LICENSE[Firmware-dib0700] = "LICENSE.dib0700" | ||
155 | NO_GENERIC_LICENSE[Firmware-e100] = "LICENCE.e100" | ||
156 | NO_GENERIC_LICENSE[Firmware-ene_firmware] = "LICENCE.ene_firmware" | ||
157 | NO_GENERIC_LICENSE[Firmware-fw_sst_0f28] = "LICENCE.fw_sst_0f28" | ||
158 | NO_GENERIC_LICENSE[Firmware-go7007] = "LICENCE.go7007" | ||
159 | NO_GENERIC_LICENSE[Firmware-GPLv2] = "GPL-2" | ||
160 | NO_GENERIC_LICENSE[Firmware-hfi1_firmware] = "LICENSE.hfi1_firmware" | ||
161 | NO_GENERIC_LICENSE[Firmware-i2400m] = "LICENCE.i2400m" | ||
162 | NO_GENERIC_LICENSE[Firmware-i915] = "LICENSE.i915" | ||
163 | NO_GENERIC_LICENSE[Firmware-ibt_firmware] = "LICENCE.ibt_firmware" | ||
164 | NO_GENERIC_LICENSE[Firmware-ice] = "LICENSE.ice" | ||
165 | NO_GENERIC_LICENSE[Firmware-IntcSST2] = "LICENCE.IntcSST2" | ||
166 | NO_GENERIC_LICENSE[Firmware-it913x] = "LICENCE.it913x" | ||
167 | NO_GENERIC_LICENSE[Firmware-iwlwifi_firmware] = "LICENCE.iwlwifi_firmware" | ||
168 | NO_GENERIC_LICENSE[Firmware-kaweth] = "LICENCE.kaweth" | ||
169 | NO_GENERIC_LICENSE[Firmware-Lontium] = "LICENSE.Lontium" | ||
170 | NO_GENERIC_LICENSE[Firmware-Marvell] = "LICENCE.Marvell" | ||
171 | NO_GENERIC_LICENSE[Firmware-mediatek] = "LICENCE.mediatek" | ||
172 | NO_GENERIC_LICENSE[Firmware-moxa] = "LICENCE.moxa" | ||
173 | NO_GENERIC_LICENSE[Firmware-myri10ge_firmware] = "LICENCE.myri10ge_firmware" | ||
174 | NO_GENERIC_LICENSE[Firmware-netronome] = "LICENCE.Netronome" | ||
175 | NO_GENERIC_LICENSE[Firmware-nvidia] = "LICENCE.nvidia" | ||
176 | NO_GENERIC_LICENSE[Firmware-OLPC] = "LICENCE.OLPC" | ||
177 | NO_GENERIC_LICENSE[Firmware-ath9k-htc] = "LICENCE.open-ath9k-htc-firmware" | ||
178 | NO_GENERIC_LICENSE[Firmware-phanfw] = "LICENCE.phanfw" | ||
179 | NO_GENERIC_LICENSE[Firmware-qat] = "LICENCE.qat_firmware" | ||
180 | NO_GENERIC_LICENSE[Firmware-qcom] = "LICENSE.qcom" | ||
181 | NO_GENERIC_LICENSE[Firmware-qla1280] = "LICENCE.qla1280" | ||
182 | NO_GENERIC_LICENSE[Firmware-qla2xxx] = "LICENCE.qla2xxx" | ||
183 | NO_GENERIC_LICENSE[Firmware-qualcommAthos_ar3k] = "LICENSE.QualcommAtheros_ar3k" | ||
184 | NO_GENERIC_LICENSE[Firmware-qualcommAthos_ath10k] = "LICENSE.QualcommAtheros_ath10k" | ||
185 | NO_GENERIC_LICENSE[Firmware-r8a779x_usb3] = "LICENCE.r8a779x_usb3" | ||
186 | NO_GENERIC_LICENSE[Firmware-radeon] = "LICENSE.radeon" | ||
187 | NO_GENERIC_LICENSE[Firmware-ralink_a_mediatek_company_firmware] = "LICENCE.ralink_a_mediatek_company_firmware" | ||
188 | NO_GENERIC_LICENSE[Firmware-ralink-firmware] = "LICENCE.ralink-firmware.txt" | ||
189 | NO_GENERIC_LICENSE[Firmware-rtlwifi_firmware] = "LICENCE.rtlwifi_firmware.txt" | ||
190 | NO_GENERIC_LICENSE[Firmware-siano] = "LICENCE.siano" | ||
191 | NO_GENERIC_LICENSE[Firmware-imx-sdma_firmware] = "LICENSE.sdma_firmware" | ||
192 | NO_GENERIC_LICENSE[Firmware-tda7706-firmware] = "LICENCE.tda7706-firmware.txt" | ||
193 | NO_GENERIC_LICENSE[Firmware-ti-connectivity] = "LICENCE.ti-connectivity" | ||
194 | NO_GENERIC_LICENSE[Firmware-ti-keystone] = "LICENCE.ti-keystone" | ||
195 | NO_GENERIC_LICENSE[Firmware-ueagle-atm4-firmware] = "LICENCE.ueagle-atm4-firmware" | ||
196 | NO_GENERIC_LICENSE[Firmware-via_vt6656] = "LICENCE.via_vt6656" | ||
197 | NO_GENERIC_LICENSE[Firmware-wl1251] = "LICENCE.wl1251" | ||
198 | NO_GENERIC_LICENSE[Firmware-xc4000] = "LICENCE.xc4000" | ||
199 | NO_GENERIC_LICENSE[Firmware-xc5000] = "LICENCE.xc5000" | ||
200 | NO_GENERIC_LICENSE[Firmware-xc5000c] = "LICENCE.xc5000c" | ||
201 | NO_GENERIC_LICENSE[WHENCE] = "WHENCE" | ||
202 | |||
203 | PE = "1" | ||
204 | |||
205 | SRC_URI = "${KERNELORG_MIRROR}/linux/kernel/firmware/${BPN}-${PV}.tar.xz" | ||
206 | |||
207 | SRC_URI[sha256sum] = "1bcb1a3944c361507754a7d26ccff40ffc28d1fb93bce711d67da26b33e785b7" | ||
208 | |||
209 | inherit allarch | ||
210 | |||
211 | CLEANBROKEN = "1" | ||
212 | |||
213 | do_compile() { | ||
214 | : | ||
215 | } | ||
216 | |||
217 | do_install() { | ||
218 | oe_runmake 'DESTDIR=${D}' 'FIRMWAREDIR=${nonarch_base_libdir}/firmware' install | ||
219 | cp GPL-2 LICEN[CS]E.* WHENCE ${D}${nonarch_base_libdir}/firmware/ | ||
220 | } | ||
221 | |||
222 | |||
223 | PACKAGES =+ "${PN}-ralink-license ${PN}-ralink \ | ||
224 | ${PN}-mt7601u-license ${PN}-mt7601u \ | ||
225 | ${PN}-radeon-license ${PN}-radeon \ | ||
226 | ${PN}-marvell-license ${PN}-pcie8897 ${PN}-pcie8997 \ | ||
227 | ${PN}-sd8686 ${PN}-sd8688 ${PN}-sd8787 ${PN}-sd8797 ${PN}-sd8801 \ | ||
228 | ${PN}-sd8887 ${PN}-sd8897 ${PN}-sd8997 ${PN}-usb8997 \ | ||
229 | ${PN}-ti-connectivity-license ${PN}-wlcommon ${PN}-wl12xx ${PN}-wl18xx \ | ||
230 | ${PN}-vt6656-license ${PN}-vt6656 \ | ||
231 | ${PN}-rtl-license ${PN}-rtl8188 ${PN}-rtl8192cu ${PN}-rtl8192ce ${PN}-rtl8192su ${PN}-rtl8723 ${PN}-rtl8821 \ | ||
232 | ${PN}-rtl8168 \ | ||
233 | ${PN}-cypress-license \ | ||
234 | ${PN}-broadcom-license \ | ||
235 | ${PN}-bcm-0bb4-0306 \ | ||
236 | ${PN}-bcm43143 \ | ||
237 | ${PN}-bcm43236b \ | ||
238 | ${PN}-bcm43241b0 \ | ||
239 | ${PN}-bcm43241b4 \ | ||
240 | ${PN}-bcm43241b5 \ | ||
241 | ${PN}-bcm43242a \ | ||
242 | ${PN}-bcm4329 \ | ||
243 | ${PN}-bcm4329-fullmac \ | ||
244 | ${PN}-bcm4330 \ | ||
245 | ${PN}-bcm4334 \ | ||
246 | ${PN}-bcm43340 \ | ||
247 | ${PN}-bcm4335 \ | ||
248 | ${PN}-bcm43362 \ | ||
249 | ${PN}-bcm4339 \ | ||
250 | ${PN}-bcm43430 \ | ||
251 | ${PN}-bcm43430a0 \ | ||
252 | ${PN}-bcm43455 \ | ||
253 | ${PN}-bcm4350 \ | ||
254 | ${PN}-bcm4350c2 \ | ||
255 | ${PN}-bcm4354 \ | ||
256 | ${PN}-bcm4356 \ | ||
257 | ${PN}-bcm4356-pcie \ | ||
258 | ${PN}-bcm43569 \ | ||
259 | ${PN}-bcm43570 \ | ||
260 | ${PN}-bcm4358 \ | ||
261 | ${PN}-bcm43602 \ | ||
262 | ${PN}-bcm4366b \ | ||
263 | ${PN}-bcm4366c \ | ||
264 | ${PN}-bcm4371 \ | ||
265 | ${PN}-bcm4373 \ | ||
266 | ${PN}-bcm43xx \ | ||
267 | ${PN}-bcm43xx-hdr \ | ||
268 | ${PN}-atheros-license ${PN}-ar9170 ${PN}-ath6k ${PN}-ath9k \ | ||
269 | ${PN}-gplv2-license ${PN}-carl9170 \ | ||
270 | ${PN}-ar3k-license ${PN}-ar3k ${PN}-ath10k-license ${PN}-ath10k ${PN}-ath11k ${PN}-qca \ | ||
271 | \ | ||
272 | ${PN}-imx-sdma-license ${PN}-imx-sdma-imx6q ${PN}-imx-sdma-imx7d \ | ||
273 | \ | ||
274 | ${PN}-iwlwifi-license ${PN}-iwlwifi \ | ||
275 | ${PN}-iwlwifi-135-6 \ | ||
276 | ${PN}-iwlwifi-3160-7 ${PN}-iwlwifi-3160-8 ${PN}-iwlwifi-3160-9 \ | ||
277 | ${PN}-iwlwifi-3160-10 ${PN}-iwlwifi-3160-12 ${PN}-iwlwifi-3160-13 \ | ||
278 | ${PN}-iwlwifi-3160-16 ${PN}-iwlwifi-3160-17 \ | ||
279 | ${PN}-iwlwifi-6000-4 ${PN}-iwlwifi-6000g2a-5 ${PN}-iwlwifi-6000g2a-6 \ | ||
280 | ${PN}-iwlwifi-6000g2b-5 ${PN}-iwlwifi-6000g2b-6 \ | ||
281 | ${PN}-iwlwifi-6050-4 ${PN}-iwlwifi-6050-5 \ | ||
282 | ${PN}-iwlwifi-7260 \ | ||
283 | ${PN}-iwlwifi-7265 \ | ||
284 | ${PN}-iwlwifi-7265d ${PN}-iwlwifi-8000c ${PN}-iwlwifi-8265 \ | ||
285 | ${PN}-iwlwifi-9000 \ | ||
286 | ${PN}-iwlwifi-misc \ | ||
287 | ${PN}-ibt-license ${PN}-ibt \ | ||
288 | ${PN}-ibt-11-5 ${PN}-ibt-12-16 ${PN}-ibt-hw-37-7 ${PN}-ibt-hw-37-8 \ | ||
289 | ${PN}-ibt-17 \ | ||
290 | ${PN}-ibt-20 \ | ||
291 | ${PN}-ibt-misc \ | ||
292 | ${PN}-i915-license ${PN}-i915 \ | ||
293 | ${PN}-ice-license ${PN}-ice \ | ||
294 | ${PN}-adsp-sst-license ${PN}-adsp-sst \ | ||
295 | ${PN}-bnx2-mips \ | ||
296 | ${PN}-liquidio \ | ||
297 | ${PN}-nvidia-license \ | ||
298 | ${PN}-nvidia-tegra-k1 ${PN}-nvidia-tegra \ | ||
299 | ${PN}-nvidia-gpu \ | ||
300 | ${PN}-netronome-license ${PN}-netronome \ | ||
301 | ${PN}-qat ${PN}-qat-license \ | ||
302 | ${PN}-qcom-license \ | ||
303 | ${PN}-qcom-venus-1.8 ${PN}-qcom-venus-4.2 ${PN}-qcom-venus-5.2 ${PN}-qcom-venus-5.4 \ | ||
304 | ${PN}-qcom-adreno-a3xx ${PN}-qcom-adreno-a530 ${PN}-qcom-adreno-a630 \ | ||
305 | ${PN}-qcom-sdm845-audio ${PN}-qcom-sdm845-compute ${PN}-qcom-sdm845-modem \ | ||
306 | ${PN}-amlogic-vdec-license ${PN}-amlogic-vdec \ | ||
307 | ${PN}-lt9611uxc ${PN}-lontium-license \ | ||
308 | ${PN}-whence-license \ | ||
309 | ${PN}-license \ | ||
310 | " | ||
311 | |||
312 | # For atheros | ||
313 | LICENSE_${PN}-ar9170 = "Firmware-atheros_firmware" | ||
314 | LICENSE_${PN}-ath6k = "Firmware-atheros_firmware" | ||
315 | LICENSE_${PN}-ath9k = "Firmware-atheros_firmware" | ||
316 | LICENSE_${PN}-atheros-license = "Firmware-atheros_firmware" | ||
317 | |||
318 | FILES_${PN}-atheros-license = "${nonarch_base_libdir}/firmware/LICENCE.atheros_firmware" | ||
319 | FILES_${PN}-ar9170 = " \ | ||
320 | ${nonarch_base_libdir}/firmware/ar9170*.fw \ | ||
321 | " | ||
322 | FILES_${PN}-ath6k = " \ | ||
323 | ${nonarch_base_libdir}/firmware/ath6k \ | ||
324 | " | ||
325 | FILES_${PN}-ath9k = " \ | ||
326 | ${nonarch_base_libdir}/firmware/ar9271.fw \ | ||
327 | ${nonarch_base_libdir}/firmware/ar7010*.fw \ | ||
328 | ${nonarch_base_libdir}/firmware/htc_9271.fw \ | ||
329 | ${nonarch_base_libdir}/firmware/htc_7010.fw \ | ||
330 | ${nonarch_base_libdir}/firmware/ath9k_htc/htc_7010-1.4.0.fw \ | ||
331 | ${nonarch_base_libdir}/firmware/ath9k_htc/htc_9271-1.4.0.fw \ | ||
332 | " | ||
333 | |||
334 | RDEPENDS_${PN}-ar9170 += "${PN}-atheros-license" | ||
335 | RDEPENDS_${PN}-ath6k += "${PN}-atheros-license" | ||
336 | RDEPENDS_${PN}-ath9k += "${PN}-atheros-license" | ||
337 | |||
338 | # For carl9170 | ||
339 | LICENSE_${PN}-carl9170 = "Firmware-GPLv2" | ||
340 | LICENSE_${PN}-gplv2-license = "Firmware-GPLv2" | ||
341 | |||
342 | FILES_${PN}-gplv2-license = "${nonarch_base_libdir}/firmware/GPL-2" | ||
343 | FILES_${PN}-carl9170 = " \ | ||
344 | ${nonarch_base_libdir}/firmware/carl9170*.fw \ | ||
345 | " | ||
346 | |||
347 | RDEPENDS_${PN}-carl9170 += "${PN}-gplv2-license" | ||
348 | |||
349 | # For QualCommAthos | ||
350 | LICENSE_${PN}-ar3k = "Firmware-qualcommAthos_ar3k" | ||
351 | LICENSE_${PN}-ar3k-license = "Firmware-qualcommAthos_ar3k" | ||
352 | LICENSE_${PN}-ath10k = "Firmware-qualcommAthos_ath10k" | ||
353 | LICENSE_${PN}-ath10k-license = "Firmware-qualcommAthos_ath10k" | ||
354 | LICENSE_${PN}-qca = "Firmware-qualcommAthos_ath10k" | ||
355 | |||
356 | FILES_${PN}-ar3k-license = "${nonarch_base_libdir}/firmware/LICENSE.QualcommAtheros_ar3k" | ||
357 | FILES_${PN}-ar3k = " \ | ||
358 | ${nonarch_base_libdir}/firmware/ar3k \ | ||
359 | " | ||
360 | |||
361 | FILES_${PN}-ath10k-license = "${nonarch_base_libdir}/firmware/LICENSE.QualcommAtheros_ath10k" | ||
362 | FILES_${PN}-ath10k = " \ | ||
363 | ${nonarch_base_libdir}/firmware/ath10k \ | ||
364 | " | ||
365 | |||
366 | FILES_${PN}-ath11k = " \ | ||
367 | ${nonarch_base_libdir}/firmware/ath11k \ | ||
368 | " | ||
369 | |||
370 | FILES_${PN}-qca = " \ | ||
371 | ${nonarch_base_libdir}/firmware/qca \ | ||
372 | " | ||
373 | |||
374 | RDEPENDS_${PN}-ar3k += "${PN}-ar3k-license" | ||
375 | RDEPENDS_${PN}-ath10k += "${PN}-ath10k-license" | ||
376 | RDEPENDS_${PN}-ath11k += "${PN}-ath10k-license" | ||
377 | RDEPENDS_${PN}-qca += "${PN}-ath10k-license" | ||
378 | |||
379 | # For ralink | ||
380 | LICENSE_${PN}-ralink = "Firmware-ralink-firmware" | ||
381 | LICENSE_${PN}-ralink-license = "Firmware-ralink-firmware" | ||
382 | |||
383 | FILES_${PN}-ralink-license = "${nonarch_base_libdir}/firmware/LICENCE.ralink-firmware.txt" | ||
384 | FILES_${PN}-ralink = " \ | ||
385 | ${nonarch_base_libdir}/firmware/rt*.bin \ | ||
386 | " | ||
387 | |||
388 | RDEPENDS_${PN}-ralink += "${PN}-ralink-license" | ||
389 | |||
390 | # For mediatek MT7601U | ||
391 | LICENSE_${PN}-mt7601u = "Firmware-ralink_a_mediatek_company_firmware" | ||
392 | LICENSE_${PN}-mt7601u-license = "Firmware-ralink_a_mediatek_company_firmware" | ||
393 | |||
394 | FILES_${PN}-mt7601u-license = "${nonarch_base_libdir}/firmware/LICENCE.ralink_a_mediatek_company_firmware" | ||
395 | FILES_${PN}-mt7601u = " \ | ||
396 | ${nonarch_base_libdir}/firmware/mt7601u.bin \ | ||
397 | " | ||
398 | |||
399 | RDEPENDS_${PN}-mt7601u += "${PN}-mt7601u-license" | ||
400 | |||
401 | # For radeon | ||
402 | LICENSE_${PN}-radeon = "Firmware-radeon" | ||
403 | LICENSE_${PN}-radeon-license = "Firmware-radeon" | ||
404 | |||
405 | FILES_${PN}-radeon-license = "${nonarch_base_libdir}/firmware/LICENSE.radeon" | ||
406 | FILES_${PN}-radeon = " \ | ||
407 | ${nonarch_base_libdir}/firmware/radeon \ | ||
408 | " | ||
409 | |||
410 | RDEPENDS_${PN}-radeon += "${PN}-radeon-license" | ||
411 | |||
412 | # For lontium | ||
413 | LICENSE_${PN}-lt9611uxc = "Firmware-Lontium" | ||
414 | |||
415 | FILES_${PN}-lontium-license = "${nonarch_base_libdir}/firmware/LICENSE.Lontium" | ||
416 | FILES_${PN}-lt9611uxc = "${nonarch_base_libdir}/firmware/lt9611uxc_fw.bin" | ||
417 | |||
418 | # For marvell | ||
419 | LICENSE_${PN}-pcie8897 = "Firmware-Marvell" | ||
420 | LICENSE_${PN}-pcie8997 = "Firmware-Marvell" | ||
421 | LICENSE_${PN}-sd8686 = "Firmware-Marvell" | ||
422 | LICENSE_${PN}-sd8688 = "Firmware-Marvell" | ||
423 | LICENSE_${PN}-sd8787 = "Firmware-Marvell" | ||
424 | LICENSE_${PN}-sd8797 = "Firmware-Marvell" | ||
425 | LICENSE_${PN}-sd8801 = "Firmware-Marvell" | ||
426 | LICENSE_${PN}-sd8887 = "Firmware-Marvell" | ||
427 | LICENSE_${PN}-sd8897 = "Firmware-Marvell" | ||
428 | LICENSE_${PN}-sd8997 = "Firmware-Marvell" | ||
429 | LICENSE_${PN}-usb8997 = "Firmware-Marvell" | ||
430 | LICENSE_${PN}-marvell-license = "Firmware-Marvell" | ||
431 | |||
432 | FILES_${PN}-marvell-license = "${nonarch_base_libdir}/firmware/LICENCE.Marvell" | ||
433 | FILES_${PN}-pcie8897 = " \ | ||
434 | ${nonarch_base_libdir}/firmware/mrvl/pcie8897_uapsta.bin \ | ||
435 | " | ||
436 | FILES_${PN}-pcie8997 = " \ | ||
437 | ${nonarch_base_libdir}/firmware/mrvl/pcie8997_wlan_v4.bin \ | ||
438 | ${nonarch_base_libdir}/firmware/mrvl/pcieuart8997_combo_v4.bin \ | ||
439 | ${nonarch_base_libdir}/firmware/mrvl/pcieusb8997_combo_v4.bin \ | ||
440 | " | ||
441 | FILES_${PN}-sd8686 = " \ | ||
442 | ${nonarch_base_libdir}/firmware/libertas/sd8686_v9* \ | ||
443 | ${nonarch_base_libdir}/firmware/sd8686* \ | ||
444 | " | ||
445 | FILES_${PN}-sd8688 = " \ | ||
446 | ${nonarch_base_libdir}/firmware/libertas/sd8688* \ | ||
447 | ${nonarch_base_libdir}/firmware/mrvl/sd8688* \ | ||
448 | " | ||
449 | FILES_${PN}-sd8787 = " \ | ||
450 | ${nonarch_base_libdir}/firmware/mrvl/sd8787_uapsta.bin \ | ||
451 | " | ||
452 | FILES_${PN}-sd8797 = " \ | ||
453 | ${nonarch_base_libdir}/firmware/mrvl/sd8797_uapsta.bin \ | ||
454 | " | ||
455 | FILES_${PN}-sd8801 = " \ | ||
456 | ${nonarch_base_libdir}/firmware/mrvl/sd8801_uapsta.bin \ | ||
457 | " | ||
458 | FILES_${PN}-sd8887 = " \ | ||
459 | ${nonarch_base_libdir}/firmware/mrvl/sd8887_uapsta.bin \ | ||
460 | " | ||
461 | FILES_${PN}-sd8897 = " \ | ||
462 | ${nonarch_base_libdir}/firmware/mrvl/sd8897_uapsta.bin \ | ||
463 | " | ||
464 | do_install_append() { | ||
465 | # The kernel 5.6.x driver still uses the old name, provide a symlink for | ||
466 | # older kernels | ||
467 | ln -fs sdsd8997_combo_v4.bin ${D}${nonarch_base_libdir}/firmware/mrvl/sd8997_uapsta.bin | ||
468 | } | ||
469 | FILES_${PN}-sd8997 = " \ | ||
470 | ${nonarch_base_libdir}/firmware/mrvl/sd8997_uapsta.bin \ | ||
471 | ${nonarch_base_libdir}/firmware/mrvl/sdsd8997_combo_v4.bin \ | ||
472 | " | ||
473 | FILES_${PN}-usb8997 = " \ | ||
474 | ${nonarch_base_libdir}/firmware/mrvl/usbusb8997_combo_v4.bin \ | ||
475 | " | ||
476 | |||
477 | RDEPENDS_${PN}-sd8686 += "${PN}-marvell-license" | ||
478 | RDEPENDS_${PN}-sd8688 += "${PN}-marvell-license" | ||
479 | RDEPENDS_${PN}-sd8787 += "${PN}-marvell-license" | ||
480 | RDEPENDS_${PN}-sd8797 += "${PN}-marvell-license" | ||
481 | RDEPENDS_${PN}-sd8801 += "${PN}-marvell-license" | ||
482 | RDEPENDS_${PN}-sd8887 += "${PN}-marvell-license" | ||
483 | RDEPENDS_${PN}-sd8897 += "${PN}-marvell-license" | ||
484 | RDEPENDS_${PN}-sd8997 += "${PN}-marvell-license" | ||
485 | RDEPENDS_${PN}-usb8997 += "${PN}-marvell-license" | ||
486 | |||
487 | # For netronome | ||
488 | LICENSE_${PN}-netronome = "Firmware-netronome" | ||
489 | |||
490 | FILES_${PN}-netronome-license = " \ | ||
491 | ${nonarch_base_libdir}/firmware/LICENCE.Netronome \ | ||
492 | " | ||
493 | FILES_${PN}-netronome = " \ | ||
494 | ${nonarch_base_libdir}/firmware/netronome/nic_AMDA0081*.nffw \ | ||
495 | ${nonarch_base_libdir}/firmware/netronome/nic_AMDA0096*.nffw \ | ||
496 | ${nonarch_base_libdir}/firmware/netronome/nic_AMDA0097*.nffw \ | ||
497 | ${nonarch_base_libdir}/firmware/netronome/nic_AMDA0099*.nffw \ | ||
498 | " | ||
499 | |||
500 | RDEPENDS_${PN}-netronome += "${PN}-netronome-license" | ||
501 | |||
502 | # For Nvidia | ||
503 | LICENSE_${PN}-nvidia-gpu = "Firmware-nvidia" | ||
504 | LICENSE_${PN}-nvidia-tegra = "Firmware-nvidia" | ||
505 | LICENSE_${PN}-nvidia-tegra-k1 = "Firmware-nvidia" | ||
506 | LICENSE_${PN}-nvidia-license = "Firmware-nvidia" | ||
507 | |||
508 | FILES_${PN}-nvidia-gpu = "${nonarch_base_libdir}/firmware/nvidia" | ||
509 | FILES_${PN}-nvidia-tegra = " \ | ||
510 | ${nonarch_base_libdir}/firmware/nvidia/tegra* \ | ||
511 | ${nonarch_base_libdir}/firmware/nvidia/gm20b \ | ||
512 | ${nonarch_base_libdir}/firmware/nvidia/gp10b \ | ||
513 | " | ||
514 | FILES_${PN}-nvidia-tegra-k1 = " \ | ||
515 | ${nonarch_base_libdir}/firmware/nvidia/tegra124 \ | ||
516 | ${nonarch_base_libdir}/firmware/nvidia/gk20a \ | ||
517 | " | ||
518 | FILES_${PN}-nvidia-license = "${nonarch_base_libdir}/firmware/LICENCE.nvidia" | ||
519 | |||
520 | RDEPENDS_${PN}-nvidia-gpu += "${PN}-nvidia-license" | ||
521 | RDEPENDS_${PN}-nvidia-tegra += "${PN}-nvidia-license" | ||
522 | RDEPENDS_${PN}-nvidia-tegra-k1 += "${PN}-nvidia-license" | ||
523 | |||
524 | # For rtl | ||
525 | LICENSE_${PN}-rtl8188 = "Firmware-rtlwifi_firmware" | ||
526 | LICENSE_${PN}-rtl8192cu = "Firmware-rtlwifi_firmware" | ||
527 | LICENSE_${PN}-rtl8192ce = "Firmware-rtlwifi_firmware" | ||
528 | LICENSE_${PN}-rtl8192su = "Firmware-rtlwifi_firmware" | ||
529 | LICENSE_${PN}-rtl8723 = "Firmware-rtlwifi_firmware" | ||
530 | LICENSE_${PN}-rtl8821 = "Firmware-rtlwifi_firmware" | ||
531 | LICENSE_${PN}-rtl-license = "Firmware-rtlwifi_firmware" | ||
532 | LICENSE_${PN}-rtl8168 = "WHENCE" | ||
533 | |||
534 | FILES_${PN}-rtl-license = " \ | ||
535 | ${nonarch_base_libdir}/firmware/LICENCE.rtlwifi_firmware.txt \ | ||
536 | " | ||
537 | FILES_${PN}-rtl8188 = " \ | ||
538 | ${nonarch_base_libdir}/firmware/rtlwifi/rtl8188*.bin \ | ||
539 | " | ||
540 | FILES_${PN}-rtl8192cu = " \ | ||
541 | ${nonarch_base_libdir}/firmware/rtlwifi/rtl8192cufw*.bin \ | ||
542 | " | ||
543 | FILES_${PN}-rtl8192ce = " \ | ||
544 | ${nonarch_base_libdir}/firmware/rtlwifi/rtl8192cfw*.bin \ | ||
545 | " | ||
546 | FILES_${PN}-rtl8192su = " \ | ||
547 | ${nonarch_base_libdir}/firmware/rtlwifi/rtl8712u.bin \ | ||
548 | " | ||
549 | FILES_${PN}-rtl8723 = " \ | ||
550 | ${nonarch_base_libdir}/firmware/rtlwifi/rtl8723*.bin \ | ||
551 | " | ||
552 | FILES_${PN}-rtl8821 = " \ | ||
553 | ${nonarch_base_libdir}/firmware/rtlwifi/rtl8821*.bin \ | ||
554 | " | ||
555 | FILES_${PN}-rtl8168 = " \ | ||
556 | ${nonarch_base_libdir}/firmware/rtl_nic/rtl8168*.fw \ | ||
557 | " | ||
558 | |||
559 | RDEPENDS_${PN}-rtl8188 += "${PN}-rtl-license" | ||
560 | RDEPENDS_${PN}-rtl8192ce += "${PN}-rtl-license" | ||
561 | RDEPENDS_${PN}-rtl8192cu += "${PN}-rtl-license" | ||
562 | RDEPENDS_${PN}-rtl8192su = "${PN}-rtl-license" | ||
563 | RDEPENDS_${PN}-rtl8723 += "${PN}-rtl-license" | ||
564 | RDEPENDS_${PN}-rtl8821 += "${PN}-rtl-license" | ||
565 | RDEPENDS_${PN}-rtl8168 += "${PN}-whence-license" | ||
566 | |||
567 | # For ti-connectivity | ||
568 | LICENSE_${PN}-wlcommon = "Firmware-ti-connectivity" | ||
569 | LICENSE_${PN}-wl12xx = "Firmware-ti-connectivity" | ||
570 | LICENSE_${PN}-wl18xx = "Firmware-ti-connectivity" | ||
571 | LICENSE_${PN}-ti-connectivity-license = "Firmware-ti-connectivity" | ||
572 | |||
573 | FILES_${PN}-ti-connectivity-license = "${nonarch_base_libdir}/firmware/LICENCE.ti-connectivity" | ||
574 | # wl18xx optionally needs wl1271-nvs.bin (which itself is a symlink to | ||
575 | # wl127x-nvs.bin) - see linux/drivers/net/wireless/ti/wlcore/sdio.c | ||
576 | # and drivers/net/wireless/ti/wlcore/spi.c. | ||
577 | # While they're optional and actually only used to override the MAC | ||
578 | # address on wl18xx, driver loading will delay (by udev timout - 60s) | ||
579 | # if not there. So let's make it available always. Because it's a | ||
580 | # symlink, both need to go to wlcommon. | ||
581 | FILES_${PN}-wlcommon = " \ | ||
582 | ${nonarch_base_libdir}/firmware/ti-connectivity/TI* \ | ||
583 | ${nonarch_base_libdir}/firmware/ti-connectivity/wl127x-nvs.bin \ | ||
584 | ${nonarch_base_libdir}/firmware/ti-connectivity/wl1271-nvs.bin \ | ||
585 | " | ||
586 | FILES_${PN}-wl12xx = " \ | ||
587 | ${nonarch_base_libdir}/firmware/ti-connectivity/wl12* \ | ||
588 | " | ||
589 | FILES_${PN}-wl18xx = " \ | ||
590 | ${nonarch_base_libdir}/firmware/ti-connectivity/wl18* \ | ||
591 | " | ||
592 | |||
593 | RDEPENDS_${PN}-wl12xx = "${PN}-ti-connectivity-license ${PN}-wlcommon" | ||
594 | RDEPENDS_${PN}-wl18xx = "${PN}-ti-connectivity-license ${PN}-wlcommon" | ||
595 | |||
596 | # For vt6656 | ||
597 | LICENSE_${PN}-vt6656 = "Firmware-via_vt6656" | ||
598 | LICENSE_${PN}-vt6656-license = "Firmware-via_vt6656" | ||
599 | |||
600 | FILES_${PN}-vt6656-license = "${nonarch_base_libdir}/firmware/LICENCE.via_vt6656" | ||
601 | FILES_${PN}-vt6656 = " \ | ||
602 | ${nonarch_base_libdir}/firmware/vntwusb.fw \ | ||
603 | " | ||
604 | |||
605 | RDEPENDS_${PN}-vt6656 = "${PN}-vt6656-license" | ||
606 | |||
607 | # For broadcom | ||
608 | |||
609 | # for i in `grep brcm WHENCE | grep ^File | sed 's/File: brcm.//g'`; do pkg=`echo $i | sed 's/-[sp40].*//g; s/\.bin//g; s/brcmfmac/bcm/g; s/_hdr/-hdr/g; s/BCM/bcm-0bb4-0306/g'`; echo -e " \${PN}-$pkg \\"; done | sort -u | ||
610 | |||
611 | LICENSE_${PN}-broadcom-license = "Firmware-broadcom_bcm43xx" | ||
612 | FILES_${PN}-broadcom-license = "${nonarch_base_libdir}/firmware/LICENCE.broadcom_bcm43xx" | ||
613 | |||
614 | # for i in `grep brcm WHENCE | grep ^File | sed 's/File: brcm.//g'`; do pkg=`echo $i | sed 's/-[sp40].*//g; s/\.bin//g; s/brcmfmac/bcm/g; s/_hdr/-hdr/g; s/BCM/bcm-0bb4-0306/g'`; echo "$i - $pkg"; echo -e "FILES_\${PN}-$pkg = \"\${nonarch_base_libdir}/firmware/brcm/$i\""; done | grep ^FILES | ||
615 | |||
616 | FILES_${PN}-bcm43xx = "${nonarch_base_libdir}/firmware/brcm/bcm43xx-0.fw" | ||
617 | FILES_${PN}-bcm43xx-hdr = "${nonarch_base_libdir}/firmware/brcm/bcm43xx_hdr-0.fw" | ||
618 | FILES_${PN}-bcm4329-fullmac = "${nonarch_base_libdir}/firmware/brcm/bcm4329-fullmac-4.bin" | ||
619 | FILES_${PN}-bcm43236b = "${nonarch_base_libdir}/firmware/brcm/brcmfmac43236b.bin" | ||
620 | FILES_${PN}-bcm4329 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac4329-sdio.bin" | ||
621 | FILES_${PN}-bcm4330 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac4330-sdio.*" | ||
622 | FILES_${PN}-bcm4334 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac4334-sdio.bin" | ||
623 | FILES_${PN}-bcm4335 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac4335-sdio.bin" | ||
624 | FILES_${PN}-bcm4339 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac4339-sdio.bin" | ||
625 | FILES_${PN}-bcm43241b0 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac43241b0-sdio.bin" | ||
626 | FILES_${PN}-bcm43241b4 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac43241b4-sdio.bin" | ||
627 | FILES_${PN}-bcm43241b5 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac43241b5-sdio.bin" | ||
628 | FILES_${PN}-bcm43242a = "${nonarch_base_libdir}/firmware/brcm/brcmfmac43242a.bin" | ||
629 | FILES_${PN}-bcm43143 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac43143.bin \ | ||
630 | ${nonarch_base_libdir}/firmware/brcm/brcmfmac43143-sdio.bin \ | ||
631 | " | ||
632 | FILES_${PN}-bcm43430a0 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac43430a0-sdio.*" | ||
633 | FILES_${PN}-bcm43455 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac43455-sdio.*" | ||
634 | FILES_${PN}-bcm4350c2 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac4350c2-pcie.bin" | ||
635 | FILES_${PN}-bcm4350 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac4350-pcie.bin" | ||
636 | FILES_${PN}-bcm4356 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac4356-sdio.bin" | ||
637 | FILES_${PN}-bcm43569 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac43569.bin" | ||
638 | FILES_${PN}-bcm43570 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac43570-pcie.bin" | ||
639 | FILES_${PN}-bcm4358 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac4358-pcie.bin" | ||
640 | FILES_${PN}-bcm43602 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac43602-pcie.bin \ | ||
641 | ${nonarch_base_libdir}/firmware/brcm/brcmfmac43602-pcie.ap.bin \ | ||
642 | " | ||
643 | FILES_${PN}-bcm4366b = "${nonarch_base_libdir}/firmware/brcm/brcmfmac4366b-pcie.bin" | ||
644 | FILES_${PN}-bcm4366c = "${nonarch_base_libdir}/firmware/brcm/brcmfmac4366c-pcie.bin" | ||
645 | FILES_${PN}-bcm4371 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac4371-pcie.bin" | ||
646 | |||
647 | # for i in `grep brcm WHENCE | grep ^File | sed 's/File: brcm.//g'`; do pkg=`echo $i | sed 's/-[sp40].*//g; s/\.bin//g; s/brcmfmac/bcm/g; s/_hdr/-hdr/g; s/BCM/bcm-0bb4-0306/g'`; echo -e "LICENSE_\${PN}-$pkg = \"Firmware-broadcom_bcm43xx\"\nRDEPENDS_\${PN}-$pkg += \"\${PN}-broadcom-license\""; done | ||
648 | # Currently 1st one and last 6 have cypress LICENSE | ||
649 | |||
650 | LICENSE_${PN}-bcm43xx = "Firmware-broadcom_bcm43xx" | ||
651 | RDEPENDS_${PN}-bcm43xx += "${PN}-broadcom-license" | ||
652 | LICENSE_${PN}-bcm43xx-hdr = "Firmware-broadcom_bcm43xx" | ||
653 | RDEPENDS_${PN}-bcm43xx-hdr += "${PN}-broadcom-license" | ||
654 | LICENSE_${PN}-bcm4329-fullmac = "Firmware-broadcom_bcm43xx" | ||
655 | RDEPENDS_${PN}-bcm4329-fullmac += "${PN}-broadcom-license" | ||
656 | LICENSE_${PN}-bcm43236b = "Firmware-broadcom_bcm43xx" | ||
657 | RDEPENDS_${PN}-bcm43236b += "${PN}-broadcom-license" | ||
658 | LICENSE_${PN}-bcm4329 = "Firmware-broadcom_bcm43xx" | ||
659 | RDEPENDS_${PN}-bcm4329 += "${PN}-broadcom-license" | ||
660 | LICENSE_${PN}-bcm4330 = "Firmware-broadcom_bcm43xx" | ||
661 | RDEPENDS_${PN}-bcm4330 += "${PN}-broadcom-license" | ||
662 | LICENSE_${PN}-bcm4334 = "Firmware-broadcom_bcm43xx" | ||
663 | RDEPENDS_${PN}-bcm4334 += "${PN}-broadcom-license" | ||
664 | LICENSE_${PN}-bcm4335 = "Firmware-broadcom_bcm43xx" | ||
665 | RDEPENDS_${PN}-bcm4335 += "${PN}-broadcom-license" | ||
666 | LICENSE_${PN}-bcm4339 = "Firmware-broadcom_bcm43xx" | ||
667 | RDEPENDS_${PN}-bcm4339 += "${PN}-broadcom-license" | ||
668 | LICENSE_${PN}-bcm43241b0 = "Firmware-broadcom_bcm43xx" | ||
669 | RDEPENDS_${PN}-bcm43241b0 += "${PN}-broadcom-license" | ||
670 | LICENSE_${PN}-bcm43241b4 = "Firmware-broadcom_bcm43xx" | ||
671 | RDEPENDS_${PN}-bcm43241b4 += "${PN}-broadcom-license" | ||
672 | LICENSE_${PN}-bcm43241b5 = "Firmware-broadcom_bcm43xx" | ||
673 | RDEPENDS_${PN}-bcm43241b5 += "${PN}-broadcom-license" | ||
674 | LICENSE_${PN}-bcm43242a = "Firmware-broadcom_bcm43xx" | ||
675 | RDEPENDS_${PN}-bcm43242a += "${PN}-broadcom-license" | ||
676 | LICENSE_${PN}-bcm43143 = "Firmware-broadcom_bcm43xx" | ||
677 | RDEPENDS_${PN}-bcm43143 += "${PN}-broadcom-license" | ||
678 | LICENSE_${PN}-bcm43430a0 = "Firmware-broadcom_bcm43xx" | ||
679 | RDEPENDS_${PN}-bcm43430a0 += "${PN}-broadcom-license" | ||
680 | LICENSE_${PN}-bcm43455 = "Firmware-broadcom_bcm43xx" | ||
681 | RDEPENDS_${PN}-bcm43455 += "${PN}-broadcom-license" | ||
682 | LICENSE_${PN}-bcm4350c2 = "Firmware-broadcom_bcm43xx" | ||
683 | RDEPENDS_${PN}-bcm4350c2 += "${PN}-broadcom-license" | ||
684 | LICENSE_${PN}-bcm4350 = "Firmware-broadcom_bcm43xx" | ||
685 | RDEPENDS_${PN}-bcm4350 += "${PN}-broadcom-license" | ||
686 | LICENSE_${PN}-bcm4356 = "Firmware-broadcom_bcm43xx" | ||
687 | RDEPENDS_${PN}-bcm4356 += "${PN}-broadcom-license" | ||
688 | LICENSE_${PN}-bcm43569 = "Firmware-broadcom_bcm43xx" | ||
689 | RDEPENDS_${PN}-bcm43569 += "${PN}-broadcom-license" | ||
690 | LICENSE_${PN}-bcm43570 = "Firmware-broadcom_bcm43xx" | ||
691 | RDEPENDS_${PN}-bcm43570 += "${PN}-broadcom-license" | ||
692 | LICENSE_${PN}-bcm4358 = "Firmware-broadcom_bcm43xx" | ||
693 | RDEPENDS_${PN}-bcm4358 += "${PN}-broadcom-license" | ||
694 | LICENSE_${PN}-bcm43602 = "Firmware-broadcom_bcm43xx" | ||
695 | RDEPENDS_${PN}-bcm43602 += "${PN}-broadcom-license" | ||
696 | LICENSE_${PN}-bcm4366b = "Firmware-broadcom_bcm43xx" | ||
697 | RDEPENDS_${PN}-bcm4366b += "${PN}-broadcom-license" | ||
698 | LICENSE_${PN}-bcm4366c = "Firmware-broadcom_bcm43xx" | ||
699 | RDEPENDS_${PN}-bcm4366c += "${PN}-broadcom-license" | ||
700 | LICENSE_${PN}-bcm4371 = "Firmware-broadcom_bcm43xx" | ||
701 | RDEPENDS_${PN}-bcm4371 += "${PN}-broadcom-license" | ||
702 | |||
703 | # For broadcom cypress | ||
704 | |||
705 | LICENSE_${PN}-cypress-license = "Firmware-cypress" | ||
706 | FILES_${PN}-cypress-license = "${nonarch_base_libdir}/firmware/LICENCE.cypress" | ||
707 | |||
708 | FILES_${PN}-bcm-0bb4-0306 = "${nonarch_base_libdir}/firmware/brcm/BCM-0bb4-0306.hcd" | ||
709 | FILES_${PN}-bcm43340 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac43340-sdio.*" | ||
710 | FILES_${PN}-bcm43362 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac43362-sdio.*" | ||
711 | FILES_${PN}-bcm43430 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac43430-sdio.*" | ||
712 | FILES_${PN}-bcm4354 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac4354-sdio.bin" | ||
713 | FILES_${PN}-bcm4356-pcie = "${nonarch_base_libdir}/firmware/brcm/brcmfmac4356-pcie.*" | ||
714 | FILES_${PN}-bcm4373 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac4373-sdio.bin \ | ||
715 | ${nonarch_base_libdir}/firmware/brcm/brcmfmac4373.bin \ | ||
716 | " | ||
717 | |||
718 | LICENSE_${PN}-bcm-0bb4-0306 = "Firmware-cypress" | ||
719 | RDEPENDS_${PN}-bcm-0bb4-0306 += "${PN}-cypress-license" | ||
720 | LICENSE_${PN}-bcm43340 = "Firmware-cypress" | ||
721 | RDEPENDS_${PN}-bcm43340 += "${PN}-cypress-license" | ||
722 | LICENSE_${PN}-bcm43362 = "Firmware-cypress" | ||
723 | RDEPENDS_${PN}-bcm43362 += "${PN}-cypress-license" | ||
724 | LICENSE_${PN}-bcm43430 = "Firmware-cypress" | ||
725 | RDEPENDS_${PN}-bcm43430 += "${PN}-cypress-license" | ||
726 | LICENSE_${PN}-bcm4354 = "Firmware-cypress" | ||
727 | RDEPENDS_${PN}-bcm4354 += "${PN}-cypress-license" | ||
728 | LICENSE_${PN}-bcm4356-pcie = "Firmware-cypress" | ||
729 | RDEPENDS_${PN}-bcm4356-pcie += "${PN}-cypress-license" | ||
730 | LICENSE_${PN}-bcm4373 = "Firmware-cypress" | ||
731 | RDEPENDS_${PN}-bcm4373 += "${PN}-cypress-license" | ||
732 | |||
733 | # For Broadcom bnx2-mips | ||
734 | # | ||
735 | # which is a separate case to the other Broadcom firmwares since its | ||
736 | # license is contained in the shared WHENCE file. | ||
737 | |||
738 | LICENSE_${PN}-bnx2-mips = "WHENCE" | ||
739 | LICENSE_${PN}-whence-license = "WHENCE" | ||
740 | |||
741 | FILES_${PN}-bnx2-mips = "${nonarch_base_libdir}/firmware/bnx2/bnx2-mips-09-6.2.1b.fw" | ||
742 | FILES_${PN}-whence-license = "${nonarch_base_libdir}/firmware/WHENCE" | ||
743 | |||
744 | RDEPENDS_${PN}-bnx2-mips += "${PN}-whence-license" | ||
745 | |||
746 | # For imx-sdma | ||
747 | LICENSE_${PN}-imx-sdma-imx6q = "Firmware-imx-sdma_firmware" | ||
748 | LICENSE_${PN}-imx-sdma-imx7d = "Firmware-imx-sdma_firmware" | ||
749 | LICENSE_${PN}-imx-sdma-license = "Firmware-imx-sdma_firmware" | ||
750 | |||
751 | FILES_${PN}-imx-sdma-imx6q = "${nonarch_base_libdir}/firmware/imx/sdma/sdma-imx6q.bin" | ||
752 | |||
753 | RPROVIDES_${PN}-imx-sdma-imx6q = "firmware-imx-sdma-imx6q" | ||
754 | RREPLACES_${PN}-imx-sdma-imx6q = "firmware-imx-sdma-imx6q" | ||
755 | RCONFLICTS_${PN}-imx-sdma-imx6q = "firmware-imx-sdma-imx6q" | ||
756 | |||
757 | FILES_${PN}-imx-sdma-imx7d = "${nonarch_base_libdir}/firmware/imx/sdma/sdma-imx7d.bin" | ||
758 | |||
759 | FILES_${PN}-imx-sdma-license = "${nonarch_base_libdir}/firmware/LICENSE.sdma_firmware" | ||
760 | |||
761 | RDEPENDS_${PN}-imx-sdma-imx6q += "${PN}-imx-sdma-license" | ||
762 | RDEPENDS_${PN}-imx-sdma-imx7d += "${PN}-imx-sdma-license" | ||
763 | |||
764 | # For iwlwifi | ||
765 | LICENSE_${PN}-iwlwifi = "Firmware-iwlwifi_firmware" | ||
766 | LICENSE_${PN}-iwlwifi-135-6 = "Firmware-iwlwifi_firmware" | ||
767 | LICENSE_${PN}-iwlwifi-3160-7 = "Firmware-iwlwifi_firmware" | ||
768 | LICENSE_${PN}-iwlwifi-3160-8 = "Firmware-iwlwifi_firmware" | ||
769 | LICENSE_${PN}-iwlwifi-3160-9 = "Firmware-iwlwifi_firmware" | ||
770 | LICENSE_${PN}-iwlwifi-3160-10 = "Firmware-iwlwifi_firmware" | ||
771 | LICENSE_${PN}-iwlwifi-3160-12 = "Firmware-iwlwifi_firmware" | ||
772 | LICENSE_${PN}-iwlwifi-3160-13 = "Firmware-iwlwifi_firmware" | ||
773 | LICENSE_${PN}-iwlwifi-3160-16 = "Firmware-iwlwifi_firmware" | ||
774 | LICENSE_${PN}-iwlwifi-3160-17 = "Firmware-iwlwifi_firmware" | ||
775 | LICENSE_${PN}-iwlwifi-6000-4 = "Firmware-iwlwifi_firmware" | ||
776 | LICENSE_${PN}-iwlwifi-6000g2a-5 = "Firmware-iwlwifi_firmware" | ||
777 | LICENSE_${PN}-iwlwifi-6000g2a-6 = "Firmware-iwlwifi_firmware" | ||
778 | LICENSE_${PN}-iwlwifi-6000g2b-5 = "Firmware-iwlwifi_firmware" | ||
779 | LICENSE_${PN}-iwlwifi-6000g2b-6 = "Firmware-iwlwifi_firmware" | ||
780 | LICENSE_${PN}-iwlwifi-6050-4 = "Firmware-iwlwifi_firmware" | ||
781 | LICENSE_${PN}-iwlwifi-6050-5 = "Firmware-iwlwifi_firmware" | ||
782 | LICENSE_${PN}-iwlwifi-7260 = "Firmware-iwlwifi_firmware" | ||
783 | LICENSE_${PN}-iwlwifi-7265 = "Firmware-iwlwifi_firmware" | ||
784 | LICENSE_${PN}-iwlwifi-7265d = "Firmware-iwlwifi_firmware" | ||
785 | LICENSE_${PN}-iwlwifi-8000c = "Firmware-iwlwifi_firmware" | ||
786 | LICENSE_${PN}-iwlwifi-8265 = "Firmware-iwlwifi_firmware" | ||
787 | LICENSE_${PN}-iwlwifi-9000 = "Firmware-iwlwifi_firmware" | ||
788 | LICENSE_${PN}-iwlwifi-misc = "Firmware-iwlwifi_firmware" | ||
789 | LICENSE_${PN}-iwlwifi-license = "Firmware-iwlwifi_firmware" | ||
790 | |||
791 | |||
792 | FILES_${PN}-iwlwifi-license = "${nonarch_base_libdir}/firmware/LICENCE.iwlwifi_firmware" | ||
793 | FILES_${PN}-iwlwifi-135-6 = "${nonarch_base_libdir}/firmware/iwlwifi-135-6.ucode" | ||
794 | FILES_${PN}-iwlwifi-3160-7 = "${nonarch_base_libdir}/firmware/iwlwifi-3160-7.ucode" | ||
795 | FILES_${PN}-iwlwifi-3160-8 = "${nonarch_base_libdir}/firmware/iwlwifi-3160-8.ucode" | ||
796 | FILES_${PN}-iwlwifi-3160-9 = "${nonarch_base_libdir}/firmware/iwlwifi-3160-9.ucode" | ||
797 | FILES_${PN}-iwlwifi-3160-10 = "${nonarch_base_libdir}/firmware/iwlwifi-3160-10.ucode" | ||
798 | FILES_${PN}-iwlwifi-3160-12 = "${nonarch_base_libdir}/firmware/iwlwifi-3160-12.ucode" | ||
799 | FILES_${PN}-iwlwifi-3160-13 = "${nonarch_base_libdir}/firmware/iwlwifi-3160-13.ucode" | ||
800 | FILES_${PN}-iwlwifi-3160-16 = "${nonarch_base_libdir}/firmware/iwlwifi-3160-16.ucode" | ||
801 | FILES_${PN}-iwlwifi-3160-17 = "${nonarch_base_libdir}/firmware/iwlwifi-3160-17.ucode" | ||
802 | FILES_${PN}-iwlwifi-6000-4 = "${nonarch_base_libdir}/firmware/iwlwifi-6000-4.ucode" | ||
803 | FILES_${PN}-iwlwifi-6000g2a-5 = "${nonarch_base_libdir}/firmware/iwlwifi-6000g2a-5.ucode" | ||
804 | FILES_${PN}-iwlwifi-6000g2a-6 = "${nonarch_base_libdir}/firmware/iwlwifi-6000g2a-6.ucode" | ||
805 | FILES_${PN}-iwlwifi-6000g2b-5 = "${nonarch_base_libdir}/firmware/iwlwifi-6000g2b-5.ucode" | ||
806 | FILES_${PN}-iwlwifi-6000g2b-6 = "${nonarch_base_libdir}/firmware/iwlwifi-6000g2b-6.ucode" | ||
807 | FILES_${PN}-iwlwifi-6050-4 = "${nonarch_base_libdir}/firmware/iwlwifi-6050-4.ucode" | ||
808 | FILES_${PN}-iwlwifi-6050-5 = "${nonarch_base_libdir}/firmware/iwlwifi-6050-5.ucode" | ||
809 | FILES_${PN}-iwlwifi-7260 = "${nonarch_base_libdir}/firmware/iwlwifi-7260-*.ucode" | ||
810 | FILES_${PN}-iwlwifi-7265 = "${nonarch_base_libdir}/firmware/iwlwifi-7265-*.ucode" | ||
811 | FILES_${PN}-iwlwifi-7265d = "${nonarch_base_libdir}/firmware/iwlwifi-7265D-*.ucode" | ||
812 | FILES_${PN}-iwlwifi-8000c = "${nonarch_base_libdir}/firmware/iwlwifi-8000C-*.ucode" | ||
813 | FILES_${PN}-iwlwifi-8265 = "${nonarch_base_libdir}/firmware/iwlwifi-8265-*.ucode" | ||
814 | FILES_${PN}-iwlwifi-9000 = "${nonarch_base_libdir}/firmware/iwlwifi-9000-*.ucode" | ||
815 | FILES_${PN}-iwlwifi-misc = "${nonarch_base_libdir}/firmware/iwlwifi-*.ucode" | ||
816 | |||
817 | RDEPENDS_${PN}-iwlwifi-135-6 = "${PN}-iwlwifi-license" | ||
818 | RDEPENDS_${PN}-iwlwifi-3160-7 = "${PN}-iwlwifi-license" | ||
819 | RDEPENDS_${PN}-iwlwifi-3160-8 = "${PN}-iwlwifi-license" | ||
820 | RDEPENDS_${PN}-iwlwifi-3160-9 = "${PN}-iwlwifi-license" | ||
821 | RDEPENDS_${PN}-iwlwifi-3160-10 = "${PN}-iwlwifi-license" | ||
822 | RDEPENDS_${PN}-iwlwifi-3160-12 = "${PN}-iwlwifi-license" | ||
823 | RDEPENDS_${PN}-iwlwifi-3160-13 = "${PN}-iwlwifi-license" | ||
824 | RDEPENDS_${PN}-iwlwifi-3160-16 = "${PN}-iwlwifi-license" | ||
825 | RDEPENDS_${PN}-iwlwifi-3160-17 = "${PN}-iwlwifi-license" | ||
826 | RDEPENDS_${PN}-iwlwifi-6000-4 = "${PN}-iwlwifi-license" | ||
827 | RDEPENDS_${PN}-iwlwifi-6000g2a-5 = "${PN}-iwlwifi-license" | ||
828 | RDEPENDS_${PN}-iwlwifi-6000g2a-6 = "${PN}-iwlwifi-license" | ||
829 | RDEPENDS_${PN}-iwlwifi-6000g2b-5 = "${PN}-iwlwifi-license" | ||
830 | RDEPENDS_${PN}-iwlwifi-6000g2b-6 = "${PN}-iwlwifi-license" | ||
831 | RDEPENDS_${PN}-iwlwifi-6050-4 = "${PN}-iwlwifi-license" | ||
832 | RDEPENDS_${PN}-iwlwifi-6050-5 = "${PN}-iwlwifi-license" | ||
833 | RDEPENDS_${PN}-iwlwifi-7260 = "${PN}-iwlwifi-license" | ||
834 | RDEPENDS_${PN}-iwlwifi-7265 = "${PN}-iwlwifi-license" | ||
835 | RDEPENDS_${PN}-iwlwifi-7265d = "${PN}-iwlwifi-license" | ||
836 | RDEPENDS_${PN}-iwlwifi-8000c = "${PN}-iwlwifi-license" | ||
837 | RDEPENDS_${PN}-iwlwifi-8265 = "${PN}-iwlwifi-license" | ||
838 | RDEPENDS_${PN}-iwlwifi-9000 = "${PN}-iwlwifi-license" | ||
839 | RDEPENDS_${PN}-iwlwifi-misc = "${PN}-iwlwifi-license" | ||
840 | |||
841 | # -iwlwifi-misc is a "catch all" package that includes all the iwlwifi | ||
842 | # firmwares that are not already included in other -iwlwifi- packages. | ||
843 | # -iwlwifi is a virtual package that depends upon all iwlwifi packages. | ||
844 | # These are distinct in order to allow the -misc firmwares to be installed | ||
845 | # without pulling in every other iwlwifi package. | ||
846 | ALLOW_EMPTY_${PN}-iwlwifi = "1" | ||
847 | ALLOW_EMPTY_${PN}-iwlwifi-misc = "1" | ||
848 | |||
849 | # Handle package updating for the newly merged iwlwifi groupings | ||
850 | RPROVIDES_${PN}-iwlwifi-7265 = "${PN}-iwlwifi-7265-8 ${PN}-iwlwifi-7265-9" | ||
851 | RREPLACES_${PN}-iwlwifi-7265 = "${PN}-iwlwifi-7265-8 ${PN}-iwlwifi-7265-9" | ||
852 | RCONFLICTS_${PN}-iwlwifi-7265 = "${PN}-iwlwifi-7265-8 ${PN}-iwlwifi-7265-9" | ||
853 | |||
854 | RPROVIDES_${PN}-iwlwifi-7260 = "${PN}-iwlwifi-7260-7 ${PN}-iwlwifi-7260-8 ${PN}-iwlwifi-7260-9" | ||
855 | RREPLACES_${PN}-iwlwifi-7260 = "${PN}-iwlwifi-7260-7 ${PN}-iwlwifi-7260-8 ${PN}-iwlwifi-7260-9" | ||
856 | RCONFLICTS_${PN}-iwlwifi-7260 = "${PN}-iwlwifi-7260-7 ${PN}-iwlwifi-7260-8 ${PN}-iwlwifi-7260-9" | ||
857 | |||
858 | # For ibt | ||
859 | LICENSE_${PN}-ibt-license = "Firmware-ibt_firmware" | ||
860 | LICENSE_${PN}-ibt-hw-37-7 = "Firmware-ibt_firmware" | ||
861 | LICENSE_${PN}-ibt-hw-37-8 = "Firmware-ibt_firmware" | ||
862 | LICENSE_${PN}-ibt-11-5 = "Firmware-ibt_firmware" | ||
863 | LICENSE_${PN}-ibt-12-16 = "Firmware-ibt_firmware" | ||
864 | LICENSE_${PN}-ibt-17 = "Firmware-ibt_firmware" | ||
865 | LICENSE_${PN}-ibt-20 = "Firmware-ibt_firmware" | ||
866 | LICENSE_${PN}-ibt-misc = "Firmware-ibt_firmware" | ||
867 | |||
868 | FILES_${PN}-ibt-license = "${nonarch_base_libdir}/firmware/LICENCE.ibt_firmware" | ||
869 | FILES_${PN}-ibt-hw-37-7 = "${nonarch_base_libdir}/firmware/intel/ibt-hw-37.7*.bseq" | ||
870 | FILES_${PN}-ibt-hw-37-8 = "${nonarch_base_libdir}/firmware/intel/ibt-hw-37.8*.bseq" | ||
871 | FILES_${PN}-ibt-11-5 = "${nonarch_base_libdir}/firmware/intel/ibt-11-5.sfi ${nonarch_base_libdir}/firmware/intel/ibt-11-5.ddc" | ||
872 | FILES_${PN}-ibt-12-16 = "${nonarch_base_libdir}/firmware/intel/ibt-12-16.sfi ${nonarch_base_libdir}/firmware/intel/ibt-12-16.ddc" | ||
873 | FILES_${PN}-ibt-17 = "${nonarch_base_libdir}/firmware/intel/ibt-17-*.sfi ${nonarch_base_libdir}/firmware/intel/ibt-17-*.ddc" | ||
874 | FILES_${PN}-ibt-20 = "${nonarch_base_libdir}/firmware/intel/ibt-20-*.sfi ${nonarch_base_libdir}/firmware/intel/ibt-20-*.ddc" | ||
875 | FILES_${PN}-ibt-misc = "${nonarch_base_libdir}/firmware/intel/ibt-*" | ||
876 | |||
877 | RDEPENDS_${PN}-ibt-hw-37-7 = "${PN}-ibt-license" | ||
878 | RDEPENDS_${PN}-ibt-hw-37.8 = "${PN}-ibt-license" | ||
879 | RDEPENDS_${PN}-ibt-11-5 = "${PN}-ibt-license" | ||
880 | RDEPENDS_${PN}-ibt-12-16 = "${PN}-ibt-license" | ||
881 | RDEPENDS_${PN}-ibt-17 = "${PN}-ibt-license" | ||
882 | RDEPENDS_${PN}-ibt-20 = "${PN}-ibt-license" | ||
883 | RDEPENDS_${PN}-ibt-misc = "${PN}-ibt-license" | ||
884 | |||
885 | ALLOW_EMPTY_${PN}-ibt= "1" | ||
886 | ALLOW_EMPTY_${PN}-ibt-misc = "1" | ||
887 | |||
888 | LICENSE_${PN}-i915 = "Firmware-i915" | ||
889 | LICENSE_${PN}-i915-license = "Firmware-i915" | ||
890 | FILES_${PN}-i915-license = "${nonarch_base_libdir}/firmware/LICENSE.i915" | ||
891 | FILES_${PN}-i915 = "${nonarch_base_libdir}/firmware/i915" | ||
892 | RDEPENDS_${PN}-i915 = "${PN}-i915-license" | ||
893 | |||
894 | LICENSE_${PN}-ice = "Firmware-ice" | ||
895 | LICENSE_${PN}-ice-license = "Firmware-ice" | ||
896 | FILES_${PN}-ice-license = "${nonarch_base_libdir}/firmware/LICENSE.ice" | ||
897 | FILES_${PN}-ice = "${nonarch_base_libdir}/firmware/intel/ice" | ||
898 | RDEPENDS_${PN}-ice = "${PN}-ice-license" | ||
899 | |||
900 | FILES_${PN}-adsp-sst-license = "${nonarch_base_libdir}/firmware/LICENCE.adsp_sst" | ||
901 | LICENSE_${PN}-adsp-sst = "Firmware-adsp_sst" | ||
902 | LICENSE_${PN}-adsp-sst-license = "Firmware-adsp_sst" | ||
903 | FILES_${PN}-adsp-sst = "${nonarch_base_libdir}/firmware/intel/dsp_fw*" | ||
904 | RDEPENDS_${PN}-adsp-sst = "${PN}-adsp-sst-license" | ||
905 | |||
906 | # For QAT | ||
907 | LICENSE_${PN}-qat = "Firmware-qat" | ||
908 | LICENSE_${PN}-qat-license = "Firmware-qat" | ||
909 | FILES_${PN}-qat-license = "${nonarch_base_libdir}/firmware/LICENCE.qat_firmware" | ||
910 | FILES_${PN}-qat = "${nonarch_base_libdir}/firmware/qat*.bin" | ||
911 | RDEPENDS_${PN}-qat = "${PN}-qat-license" | ||
912 | |||
913 | # For QCOM VPU/GPU and SDM845 | ||
914 | LICENSE_${PN}-qcom-license = "Firmware-qcom" | ||
915 | FILES_${PN}-qcom-license = "${nonarch_base_libdir}/firmware/LICENSE.qcom ${nonarch_base_libdir}/firmware/qcom/NOTICE.txt" | ||
916 | FILES_${PN}-qcom-venus-1.8 = "${nonarch_base_libdir}/firmware/qcom/venus-1.8/*" | ||
917 | FILES_${PN}-qcom-venus-4.2 = "${nonarch_base_libdir}/firmware/qcom/venus-4.2/*" | ||
918 | FILES_${PN}-qcom-venus-5.2 = "${nonarch_base_libdir}/firmware/qcom/venus-5.2/*" | ||
919 | FILES_${PN}-qcom-venus-5.4 = "${nonarch_base_libdir}/firmware/qcom/venus-5.4/*" | ||
920 | FILES_${PN}-qcom-adreno-a3xx = "${nonarch_base_libdir}/firmware/qcom/a300_*.fw ${nonarch_base_libdir}/firmware/a300_*.fw" | ||
921 | FILES_${PN}-qcom-adreno-a530 = "${nonarch_base_libdir}/firmware/qcom/a530*.*" | ||
922 | FILES_${PN}-qcom-adreno-a630 = "${nonarch_base_libdir}/firmware/qcom/a630*.* ${nonarch_base_libdir}/firmware/qcom/sdm845/a630*.*" | ||
923 | FILES_${PN}-qcom-sdm845-audio = "${nonarch_base_libdir}/firmware/qcom/sdm845/adsp*.*" | ||
924 | FILES_${PN}-qcom-sdm845-compute = "${nonarch_base_libdir}/firmware/qcom/sdm845/cdsp*.*" | ||
925 | FILES_${PN}-qcom-sdm845-modem = "${nonarch_base_libdir}/firmware/qcom/sdm845/mba.mbn ${nonarch_base_libdir}/firmware/qcom/sdm845/modem*.* ${nonarch_base_libdir}/firmware/qcom/sdm845/wlanmdsp.mbn" | ||
926 | RDEPENDS_${PN}-qcom-venus-1.8 = "${PN}-qcom-license" | ||
927 | RDEPENDS_${PN}-qcom-venus-4.2 = "${PN}-qcom-license" | ||
928 | RDEPENDS_${PN}-qcom-venus-5.2 = "${PN}-qcom-license" | ||
929 | RDEPENDS_${PN}-qcom-venus-5.4 = "${PN}-qcom-license" | ||
930 | RDEPENDS_${PN}-qcom-adreno-a3xx = "${PN}-qcom-license" | ||
931 | RDEPENDS_${PN}-qcom-adreno-a530 = "${PN}-qcom-license" | ||
932 | RDEPENDS_${PN}-qcom-adreno-a630 = "${PN}-qcom-license" | ||
933 | RDEPENDS_${PN}-qcom-sdm845-audio = "${PN}-qcom-license" | ||
934 | RDEPENDS_${PN}-qcom-sdm845-compute = "${PN}-qcom-license" | ||
935 | RDEPENDS_${PN}-qcom-sdm845-modem = "${PN}-qcom-license" | ||
936 | |||
937 | FILES_${PN}-liquidio = "${nonarch_base_libdir}/firmware/liquidio" | ||
938 | |||
939 | # For Amlogic VDEC | ||
940 | LICENSE_${PN}-amlogic-vdec = "Firmware-amlogic_vdec" | ||
941 | FILES_${PN}-amlogic-vdec-license = "${nonarch_base_libdir}/firmware/LICENSE.amlogic_vdec" | ||
942 | FILES_${PN}-amlogic-vdec = "${nonarch_base_libdir}/firmware/meson/vdec/*" | ||
943 | RDEPENDS_${PN}-amlogic-vdec = "${PN}-amlogic-vdec-license" | ||
944 | |||
945 | # For other firmwares | ||
946 | # Maybe split out to separate packages when needed. | ||
947 | LICENSE_${PN} = "\ | ||
948 | Firmware-Abilis \ | ||
949 | & Firmware-agere \ | ||
950 | & Firmware-amdgpu \ | ||
951 | & Firmware-amd-ucode \ | ||
952 | & Firmware-amlogic_vdec \ | ||
953 | & Firmware-atmel \ | ||
954 | & Firmware-ca0132 \ | ||
955 | & Firmware-cavium \ | ||
956 | & Firmware-chelsio_firmware \ | ||
957 | & Firmware-cw1200 \ | ||
958 | & Firmware-dib0700 \ | ||
959 | & Firmware-e100 \ | ||
960 | & Firmware-ene_firmware \ | ||
961 | & Firmware-fw_sst_0f28 \ | ||
962 | & Firmware-go7007 \ | ||
963 | & Firmware-hfi1_firmware \ | ||
964 | & Firmware-i2400m \ | ||
965 | & Firmware-ibt_firmware \ | ||
966 | & Firmware-it913x \ | ||
967 | & Firmware-IntcSST2 \ | ||
968 | & Firmware-kaweth \ | ||
969 | & Firmware-moxa \ | ||
970 | & Firmware-myri10ge_firmware \ | ||
971 | & Firmware-nvidia \ | ||
972 | & Firmware-OLPC \ | ||
973 | & Firmware-ath9k-htc \ | ||
974 | & Firmware-phanfw \ | ||
975 | & Firmware-qat \ | ||
976 | & Firmware-qcom \ | ||
977 | & Firmware-qla1280 \ | ||
978 | & Firmware-qla2xxx \ | ||
979 | & Firmware-r8a779x_usb3 \ | ||
980 | & Firmware-radeon \ | ||
981 | & Firmware-ralink_a_mediatek_company_firmware \ | ||
982 | & Firmware-ralink-firmware \ | ||
983 | & Firmware-imx-sdma_firmware \ | ||
984 | & Firmware-siano \ | ||
985 | & Firmware-tda7706-firmware \ | ||
986 | & Firmware-ti-connectivity \ | ||
987 | & Firmware-ti-keystone \ | ||
988 | & Firmware-ueagle-atm4-firmware \ | ||
989 | & Firmware-wl1251 \ | ||
990 | & Firmware-xc4000 \ | ||
991 | & Firmware-xc5000 \ | ||
992 | & Firmware-xc5000c \ | ||
993 | & WHENCE \ | ||
994 | " | ||
995 | |||
996 | FILES_${PN}-license += "${nonarch_base_libdir}/firmware/LICEN*" | ||
997 | FILES_${PN} += "${nonarch_base_libdir}/firmware/*" | ||
998 | RDEPENDS_${PN} += "${PN}-license" | ||
999 | RDEPENDS_${PN} += "${PN}-whence-license" | ||
1000 | |||
1001 | # Make linux-firmware depend on all of the split-out packages. | ||
1002 | # Make linux-firmware-iwlwifi depend on all of the split-out iwlwifi packages. | ||
1003 | # Make linux-firmware-ibt depend on all of the split-out ibt packages. | ||
1004 | python populate_packages_prepend () { | ||
1005 | firmware_pkgs = oe.utils.packages_filter_out_system(d) | ||
1006 | d.appendVar('RRECOMMENDS_linux-firmware', ' ' + ' '.join(firmware_pkgs)) | ||
1007 | |||
1008 | iwlwifi_pkgs = filter(lambda x: x.find('-iwlwifi-') != -1, firmware_pkgs) | ||
1009 | d.appendVar('RRECOMMENDS_linux-firmware-iwlwifi', ' ' + ' '.join(iwlwifi_pkgs)) | ||
1010 | |||
1011 | ibt_pkgs = filter(lambda x: x.find('-ibt-') != -1, firmware_pkgs) | ||
1012 | d.appendVar('RRECOMMENDS_linux-firmware-ibt', ' ' + ' '.join(ibt_pkgs)) | ||
1013 | } | ||
1014 | |||
1015 | # Firmware files are generally not ran on the CPU, so they can be | ||
1016 | # allarch despite being architecture specific | ||
1017 | INSANE_SKIP = "arch" | ||
diff --git a/meta/recipes-kernel/linux-firmware/linux-firmware_20250509.bb b/meta/recipes-kernel/linux-firmware/linux-firmware_20250509.bb new file mode 100644 index 0000000000..ea75271af8 --- /dev/null +++ b/meta/recipes-kernel/linux-firmware/linux-firmware_20250509.bb | |||
@@ -0,0 +1,2151 @@ | |||
1 | SUMMARY = "Firmware files for use with Linux kernel" | ||
2 | HOMEPAGE = "https://www.kernel.org/" | ||
3 | DESCRIPTION = "Linux firmware is a package distributed alongside the Linux kernel \ | ||
4 | that contains firmware binary blobs necessary for partial or full functionality \ | ||
5 | of certain hardware devices." | ||
6 | SECTION = "kernel" | ||
7 | |||
8 | LICENSE = "\ | ||
9 | Firmware-Abilis \ | ||
10 | & Firmware-adsp_sst \ | ||
11 | & Firmware-agere \ | ||
12 | & Firmware-amdgpu \ | ||
13 | & Firmware-amd-ucode \ | ||
14 | & Firmware-amlogic_vdec \ | ||
15 | & Firmware-amphion_vpu \ | ||
16 | & Firmware-atheros_firmware \ | ||
17 | & Firmware-atmel \ | ||
18 | & Firmware-broadcom_bcm43xx \ | ||
19 | & Firmware-ca0132 \ | ||
20 | & Firmware-cavium \ | ||
21 | & Firmware-chelsio_firmware \ | ||
22 | & Firmware-cirrus \ | ||
23 | & Firmware-cnm \ | ||
24 | & Firmware-cw1200 \ | ||
25 | & Firmware-cypress \ | ||
26 | & Firmware-dib0700 \ | ||
27 | & Firmware-e100 \ | ||
28 | & Firmware-ene_firmware \ | ||
29 | & Firmware-fw_sst_0f28 \ | ||
30 | & Firmware-go7007 \ | ||
31 | & Firmware-hfi1_firmware \ | ||
32 | & Firmware-i915 \ | ||
33 | & Firmware-ibt_firmware \ | ||
34 | & Firmware-ice \ | ||
35 | & Firmware-ice_enhanced \ | ||
36 | & Firmware-it913x \ | ||
37 | & Firmware-iwlwifi_firmware \ | ||
38 | & Firmware-IntcSST2 \ | ||
39 | & Firmware-kaweth \ | ||
40 | & Firmware-linaro \ | ||
41 | & Firmware-Lontium \ | ||
42 | & Firmware-mali_csffw \ | ||
43 | & Firmware-Marvell \ | ||
44 | & Firmware-mediatek \ | ||
45 | & Firmware-microchip \ | ||
46 | & Firmware-moxa \ | ||
47 | & Firmware-myri10ge_firmware \ | ||
48 | & Firmware-netronome \ | ||
49 | & Firmware-nvidia \ | ||
50 | & Firmware-nxp \ | ||
51 | & Firmware-nxp_mc_firmware \ | ||
52 | & Firmware-OLPC \ | ||
53 | & Firmware-ath9k-htc \ | ||
54 | & Firmware-phanfw \ | ||
55 | & Firmware-powervr \ | ||
56 | & Firmware-qat \ | ||
57 | & Firmware-qcom \ | ||
58 | & Firmware-qcom-2 \ | ||
59 | & Firmware-qcom-yamato \ | ||
60 | & Firmware-qla1280 \ | ||
61 | & Firmware-qla2xxx \ | ||
62 | & Firmware-qualcommAthos_ar3k \ | ||
63 | & Firmware-qualcommAthos_ath10k \ | ||
64 | & Firmware-r8a779x_usb3 \ | ||
65 | & Firmware-radeon \ | ||
66 | & Firmware-ralink_a_mediatek_company_firmware \ | ||
67 | & Firmware-ralink-firmware \ | ||
68 | & Firmware-rockchip \ | ||
69 | & Firmware-rtlwifi_firmware \ | ||
70 | & Firmware-imx-sdma_firmware \ | ||
71 | & Firmware-siano \ | ||
72 | & Firmware-ti-connectivity \ | ||
73 | & Firmware-ti-keystone \ | ||
74 | & Firmware-ueagle-atm4-firmware \ | ||
75 | & Firmware-via_vt6656 \ | ||
76 | & Firmware-wfx \ | ||
77 | & Firmware-wl1251 \ | ||
78 | & Firmware-xc4000 \ | ||
79 | & Firmware-xc5000 \ | ||
80 | & Firmware-xc5000c \ | ||
81 | & WHENCE \ | ||
82 | & GPL-2.0-or-later \ | ||
83 | " | ||
84 | |||
85 | LIC_FILES_CHKSUM = "file://LICENCE.Abilis;md5=b5ee3f410780e56711ad48eadc22b8bc \ | ||
86 | file://LICENCE.adsp_sst;md5=615c45b91a5a4a9fe046d6ab9a2df728 \ | ||
87 | file://LICENCE.agere;md5=af0133de6b4a9b2522defd5f188afd31 \ | ||
88 | file://LICENSE.amdgpu;md5=1433dfea38c97a2e563a248a863dcb94 \ | ||
89 | file://LICENSE.amd-ucode;md5=6ca90c57f7b248de1e25c7f68ffc4698 \ | ||
90 | file://LICENSE.amlogic_vdec;md5=dc44f59bf64a81643e500ad3f39a468a \ | ||
91 | file://LICENSE.amphion_vpu;md5=2bcdc00527b2d0542bd92b52aaec2b60 \ | ||
92 | file://LICENCE.atheros_firmware;md5=30a14c7823beedac9fa39c64fdd01a13 \ | ||
93 | file://LICENSE.atmel;md5=aa74ac0c60595dee4d4e239107ea77a3 \ | ||
94 | file://LICENCE.broadcom_bcm43xx;md5=3160c14df7228891b868060e1951dfbc \ | ||
95 | file://LICENCE.ca0132;md5=209b33e66ee5be0461f13d31da392198 \ | ||
96 | file://LICENCE.cadence;md5=009f46816f6956cfb75ede13d3e1cee0 \ | ||
97 | file://LICENCE.cavium;md5=c37aaffb1ebe5939b2580d073a95daea \ | ||
98 | file://LICENCE.chelsio_firmware;md5=819aa8c3fa453f1b258ed8d168a9d903 \ | ||
99 | file://LICENSE.cirrus;md5=662ea2c1a8888f7d79ed7f27c27472e1 \ | ||
100 | file://LICENCE.cnm;md5=93b67e6bac7f8fec22b96b8ad0a1a9d0 \ | ||
101 | file://LICENCE.cw1200;md5=f0f770864e7a8444a5c5aa9d12a3a7ed \ | ||
102 | file://LICENCE.cypress;md5=48cd9436c763bf873961f9ed7b5c147b \ | ||
103 | file://LICENSE.dib0700;md5=f7411825c8a555a1a3e5eab9ca773431 \ | ||
104 | file://LICENCE.e100;md5=ec0f84136766df159a3ae6d02acdf5a8 \ | ||
105 | file://LICENCE.ene_firmware;md5=ed67f0f62f8f798130c296720b7d3921 \ | ||
106 | file://LICENCE.fw_sst_0f28;md5=6353931c988ad52818ae733ac61cd293 \ | ||
107 | file://LICENCE.go7007;md5=c0bb9f6aaaba55b0529ee9b30aa66beb \ | ||
108 | file://LICENSE.hfi1_firmware;md5=5e7b6e586ce7339d12689e49931ad444 \ | ||
109 | file://LICENSE.i915;md5=2b0b2e0d20984affd4490ba2cba02570 \ | ||
110 | file://LICENCE.ibt_firmware;md5=fdbee1ddfe0fb7ab0b2fcd6b454a366b \ | ||
111 | file://LICENSE.ice;md5=742ab4850f2670792940e6d15c974b2f \ | ||
112 | file://LICENSE.ice_enhanced;md5=f305cfc31b64f95f774f9edd9df0224d \ | ||
113 | file://LICENCE.IntcSST2;md5=9e7d8bea77612d7cc7d9e9b54b623062 \ | ||
114 | file://LICENCE.it913x;md5=1fbf727bfb6a949810c4dbfa7e6ce4f8 \ | ||
115 | file://LICENCE.iwlwifi_firmware;md5=2ce6786e0fc11ac6e36b54bb9b799f1b \ | ||
116 | file://LICENCE.kaweth;md5=b1d876e562f4b3b8d391ad8395dfe03f \ | ||
117 | file://LICENCE.linaro;md5=936d91e71cf9cd30e733db4bf11661cc \ | ||
118 | file://LICENSE.Lontium;md5=4ec8dc582ff7295f39e2ca6a7b0be2b6 \ | ||
119 | file://LICENCE.mali_csffw;md5=e064aaec4d21ef856e1b76a6f5dc435f \ | ||
120 | file://LICENCE.Marvell;md5=28b6ed8bd04ba105af6e4dcd6e997772 \ | ||
121 | file://LICENCE.mediatek;md5=7c1976b63217d76ce47d0a11d8a79cf2 \ | ||
122 | file://LICENCE.microchip;md5=db753b00305675dfbf120e3f24a47277 \ | ||
123 | file://LICENCE.moxa;md5=1086614767d8ccf744a923289d3d4261 \ | ||
124 | file://LICENCE.myri10ge_firmware;md5=42e32fb89f6b959ca222e25ac8df8fed \ | ||
125 | file://LICENCE.Netronome;md5=4add08f2577086d44447996503cddf5f \ | ||
126 | file://LICENCE.nvidia;md5=4428a922ed3ba2ceec95f076a488ce07 \ | ||
127 | file://LICENCE.NXP;md5=58bb8ba632cd729b9ba6183bc6aed36f \ | ||
128 | file://LICENSE.nxp;md5=cca321ca1524d6a1e4fed87486cd82dc \ | ||
129 | file://LICENSE.nxp_mc_firmware;md5=9dc97e4b279b3858cae8879ae2fe5dd7 \ | ||
130 | file://LICENCE.OLPC;md5=5b917f9d8c061991be4f6f5f108719cd \ | ||
131 | file://LICENCE.open-ath9k-htc-firmware;md5=1b33c9f4d17bc4d457bdb23727046837 \ | ||
132 | file://LICENCE.phanfw;md5=954dcec0e051f9409812b561ea743bfa \ | ||
133 | file://LICENSE.powervr;md5=83045ed2a2cda15b4eaff682c98c9533 \ | ||
134 | file://LICENCE.qat_firmware;md5=72de83dfd9b87be7685ed099a39fbea4 \ | ||
135 | file://LICENSE.qcom;md5=164e3362a538eb11d3ac51e8e134294b \ | ||
136 | file://LICENSE.qcom-2;md5=165287851294f2fb8ac8cbc5e24b02b0 \ | ||
137 | file://LICENSE.qcom_yamato;md5=d0de0eeccaf1843a850bf7a6777eec5c \ | ||
138 | file://LICENCE.qla1280;md5=d6895732e622d950609093223a2c4f5d \ | ||
139 | file://LICENCE.qla2xxx;md5=505855e921b75f1be4a437ad9b79dff0 \ | ||
140 | file://LICENSE.QualcommAtheros_ar3k;md5=b5fe244fb2b532311de1472a3bc06da5 \ | ||
141 | file://LICENSE.QualcommAtheros_ath10k;md5=cb42b686ee5f5cb890275e4321db60a8 \ | ||
142 | file://LICENCE.r8a779x_usb3;md5=4c1671656153025d7076105a5da7e498 \ | ||
143 | file://LICENSE.radeon;md5=68ec28bacb3613200bca44f404c69b16 \ | ||
144 | file://LICENCE.ralink_a_mediatek_company_firmware;md5=728f1a85fd53fd67fa8d7afb080bc435 \ | ||
145 | file://LICENCE.ralink-firmware.txt;md5=ab2c269277c45476fb449673911a2dfd \ | ||
146 | file://LICENCE.rockchip;md5=5fd70190c5ed39734baceada8ecced26 \ | ||
147 | file://LICENCE.rtlwifi_firmware.txt;md5=00d06cfd3eddd5a2698948ead2ad54a5 \ | ||
148 | file://LICENSE.sdma_firmware;md5=51e8c19ecc2270f4b8ea30341ad63ce9 \ | ||
149 | file://LICENCE.siano;md5=4556c1bf830067f12ca151ad953ec2a5 \ | ||
150 | file://LICENCE.ti-connectivity;md5=3b1e9cf54aba8146dad4b735777d406f \ | ||
151 | file://LICENCE.ti-keystone;md5=3a86335d32864b0bef996bee26cc0f2c \ | ||
152 | file://LICENCE.ueagle-atm4-firmware;md5=4ed7ea6b507ccc583b9d594417714118 \ | ||
153 | file://LICENCE.via_vt6656;md5=e4159694cba42d4377a912e78a6e850f \ | ||
154 | file://LICENCE.wl1251;md5=ad3f81922bb9e197014bb187289d3b5b \ | ||
155 | file://LICENCE.xc4000;md5=0ff51d2dc49fce04814c9155081092f0 \ | ||
156 | file://LICENCE.xc5000;md5=1e170c13175323c32c7f4d0998d53f66 \ | ||
157 | file://LICENCE.xc5000c;md5=12b02efa3049db65d524aeb418dd87ca \ | ||
158 | file://wfx/LICENCE.wf200;md5=4d1beff00d902c05c9c7e95a5d8eb52d \ | ||
159 | file://WHENCE;md5=${WHENCE_CHKSUM} \ | ||
160 | " | ||
161 | # WHENCE checksum is defined separately to ease overriding it if | ||
162 | # class-devupstream is selected. | ||
163 | WHENCE_CHKSUM = "d85e2f182f489a235400712cbfdb017a" | ||
164 | |||
165 | # These are not common licenses, set NO_GENERIC_LICENSE for them | ||
166 | # so that the license files will be copied from fetched source | ||
167 | NO_GENERIC_LICENSE[Firmware-Abilis] = "LICENCE.Abilis" | ||
168 | NO_GENERIC_LICENSE[Firmware-adsp_sst] = "LICENCE.adsp_sst" | ||
169 | NO_GENERIC_LICENSE[Firmware-agere] = "LICENCE.agere" | ||
170 | NO_GENERIC_LICENSE[Firmware-amdgpu] = "LICENSE.amdgpu" | ||
171 | NO_GENERIC_LICENSE[Firmware-amd-ucode] = "LICENSE.amd-ucode" | ||
172 | NO_GENERIC_LICENSE[Firmware-amlogic_vdec] = "LICENSE.amlogic_vdec" | ||
173 | NO_GENERIC_LICENSE[Firmware-amphion_vpu] = "LICENSE.amphion_vpu" | ||
174 | NO_GENERIC_LICENSE[Firmware-atheros_firmware] = "LICENCE.atheros_firmware" | ||
175 | NO_GENERIC_LICENSE[Firmware-atmel] = "LICENSE.atmel" | ||
176 | NO_GENERIC_LICENSE[Firmware-broadcom_bcm43xx] = "LICENCE.broadcom_bcm43xx" | ||
177 | NO_GENERIC_LICENSE[Firmware-ca0132] = "LICENCE.ca0132" | ||
178 | NO_GENERIC_LICENSE[Firmware-cadence] = "LICENCE.cadence" | ||
179 | NO_GENERIC_LICENSE[Firmware-cavium] = "LICENCE.cavium" | ||
180 | NO_GENERIC_LICENSE[Firmware-chelsio_firmware] = "LICENCE.chelsio_firmware" | ||
181 | NO_GENERIC_LICENSE[Firmware-cirrus] = "LICENSE.cirrus" | ||
182 | NO_GENERIC_LICENSE[Firmware-cnm] = "LICENCE.cnm" | ||
183 | NO_GENERIC_LICENSE[Firmware-cw1200] = "LICENCE.cw1200" | ||
184 | NO_GENERIC_LICENSE[Firmware-cypress] = "LICENCE.cypress" | ||
185 | NO_GENERIC_LICENSE[Firmware-dib0700] = "LICENSE.dib0700" | ||
186 | NO_GENERIC_LICENSE[Firmware-e100] = "LICENCE.e100" | ||
187 | NO_GENERIC_LICENSE[Firmware-ene_firmware] = "LICENCE.ene_firmware" | ||
188 | NO_GENERIC_LICENSE[Firmware-fw_sst_0f28] = "LICENCE.fw_sst_0f28" | ||
189 | NO_GENERIC_LICENSE[Firmware-go7007] = "LICENCE.go7007" | ||
190 | NO_GENERIC_LICENSE[Firmware-hfi1_firmware] = "LICENSE.hfi1_firmware" | ||
191 | NO_GENERIC_LICENSE[Firmware-i915] = "LICENSE.i915" | ||
192 | NO_GENERIC_LICENSE[Firmware-ibt_firmware] = "LICENCE.ibt_firmware" | ||
193 | NO_GENERIC_LICENSE[Firmware-ice] = "LICENSE.ice" | ||
194 | NO_GENERIC_LICENSE[Firmware-ice_enhanced] = "LICENSE.ice_enhanced" | ||
195 | NO_GENERIC_LICENSE[Firmware-IntcSST2] = "LICENCE.IntcSST2" | ||
196 | NO_GENERIC_LICENSE[Firmware-it913x] = "LICENCE.it913x" | ||
197 | NO_GENERIC_LICENSE[Firmware-iwlwifi_firmware] = "LICENCE.iwlwifi_firmware" | ||
198 | NO_GENERIC_LICENSE[Firmware-kaweth] = "LICENCE.kaweth" | ||
199 | NO_GENERIC_LICENSE[Firmware-linaro] = "LICENCE.linaro" | ||
200 | NO_GENERIC_LICENSE[Firmware-Lontium] = "LICENSE.Lontium" | ||
201 | NO_GENERIC_LICENSE[Firmware-mali_csffw] = "LICENCE.mali_csffw" | ||
202 | NO_GENERIC_LICENSE[Firmware-Marvell] = "LICENCE.Marvell" | ||
203 | NO_GENERIC_LICENSE[Firmware-mediatek] = "LICENCE.mediatek" | ||
204 | NO_GENERIC_LICENSE[Firmware-microchip] = "LICENCE.microchip" | ||
205 | NO_GENERIC_LICENSE[Firmware-moxa] = "LICENCE.moxa" | ||
206 | NO_GENERIC_LICENSE[Firmware-myri10ge_firmware] = "LICENCE.myri10ge_firmware" | ||
207 | NO_GENERIC_LICENSE[Firmware-netronome] = "LICENCE.Netronome" | ||
208 | NO_GENERIC_LICENSE[Firmware-nvidia] = "LICENCE.nvidia" | ||
209 | NO_GENERIC_LICENSE[Firmware-nxp] = "LICENSE.nxp" | ||
210 | NO_GENERIC_LICENSE[Firmware-nxp_mc_firmware] = "LICENSE.nxp_mc_firmware" | ||
211 | NO_GENERIC_LICENSE[Firmware-OLPC] = "LICENCE.OLPC" | ||
212 | NO_GENERIC_LICENSE[Firmware-ath9k-htc] = "LICENCE.open-ath9k-htc-firmware" | ||
213 | NO_GENERIC_LICENSE[Firmware-phanfw] = "LICENCE.phanfw" | ||
214 | NO_GENERIC_LICENSE[Firmware-powervr] = "LICENSE.powervr" | ||
215 | NO_GENERIC_LICENSE[Firmware-qat] = "LICENCE.qat_firmware" | ||
216 | NO_GENERIC_LICENSE[Firmware-qcom] = "LICENSE.qcom" | ||
217 | NO_GENERIC_LICENSE[Firmware-qcom-2] = "LICENSE.qcom-2" | ||
218 | NO_GENERIC_LICENSE[Firmware-qcom-yamato] = "LICENSE.qcom_yamato" | ||
219 | NO_GENERIC_LICENSE[Firmware-qla1280] = "LICENCE.qla1280" | ||
220 | NO_GENERIC_LICENSE[Firmware-qla2xxx] = "LICENCE.qla2xxx" | ||
221 | NO_GENERIC_LICENSE[Firmware-qualcommAthos_ar3k] = "LICENSE.QualcommAtheros_ar3k" | ||
222 | NO_GENERIC_LICENSE[Firmware-qualcommAthos_ath10k] = "LICENSE.QualcommAtheros_ath10k" | ||
223 | NO_GENERIC_LICENSE[Firmware-r8a779x_usb3] = "LICENCE.r8a779x_usb3" | ||
224 | NO_GENERIC_LICENSE[Firmware-radeon] = "LICENSE.radeon" | ||
225 | NO_GENERIC_LICENSE[Firmware-ralink_a_mediatek_company_firmware] = "LICENCE.ralink_a_mediatek_company_firmware" | ||
226 | NO_GENERIC_LICENSE[Firmware-ralink-firmware] = "LICENCE.ralink-firmware.txt" | ||
227 | NO_GENERIC_LICENSE[Firmware-rockchip] = "LICENCE.rockchip" | ||
228 | NO_GENERIC_LICENSE[Firmware-rtlwifi_firmware] = "LICENCE.rtlwifi_firmware.txt" | ||
229 | NO_GENERIC_LICENSE[Firmware-siano] = "LICENCE.siano" | ||
230 | NO_GENERIC_LICENSE[Firmware-imx-sdma_firmware] = "LICENSE.sdma_firmware" | ||
231 | NO_GENERIC_LICENSE[Firmware-ti-connectivity] = "LICENCE.ti-connectivity" | ||
232 | NO_GENERIC_LICENSE[Firmware-ti-keystone] = "LICENCE.ti-keystone" | ||
233 | NO_GENERIC_LICENSE[Firmware-ueagle-atm4-firmware] = "LICENCE.ueagle-atm4-firmware" | ||
234 | NO_GENERIC_LICENSE[Firmware-via_vt6656] = "LICENCE.via_vt6656" | ||
235 | NO_GENERIC_LICENSE[Firmware-wfx] = "wfx/LICENCE.wf200" | ||
236 | NO_GENERIC_LICENSE[Firmware-wl1251] = "LICENCE.wl1251" | ||
237 | NO_GENERIC_LICENSE[Firmware-xc4000] = "LICENCE.xc4000" | ||
238 | NO_GENERIC_LICENSE[Firmware-xc5000] = "LICENCE.xc5000" | ||
239 | NO_GENERIC_LICENSE[Firmware-xc5000c] = "LICENCE.xc5000c" | ||
240 | NO_GENERIC_LICENSE[WHENCE] = "WHENCE" | ||
241 | |||
242 | PE = "1" | ||
243 | |||
244 | SRC_URI = "\ | ||
245 | ${KERNELORG_MIRROR}/linux/kernel/firmware/${BPN}-${PV}.tar.xz \ | ||
246 | " | ||
247 | |||
248 | BBCLASSEXTEND = "devupstream:target" | ||
249 | SRC_URI:class-devupstream = "git://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git;protocol=https;branch=main" | ||
250 | # Pin this to the 20220509 release, override this in local.conf | ||
251 | SRCREV:class-devupstream ?= "b19cbdca78ab2adfd210c91be15a22568e8b8cae" | ||
252 | |||
253 | SRC_URI[sha256sum] = "f2c60d66f226a28130cb5643e6e544d3229673460e127c91ba03f1080cbd703e" | ||
254 | |||
255 | inherit allarch | ||
256 | |||
257 | CLEANBROKEN = "1" | ||
258 | |||
259 | PACKAGECONFIG ??= "" | ||
260 | PACKAGECONFIG[deduplicate] = ",,rdfind-native" | ||
261 | |||
262 | # Possible values are "xz" and "zst". | ||
263 | FIRMWARE_COMPRESSION ?= "" | ||
264 | |||
265 | # Specifying -j requires GNU parallel, which is a part of meta-oe | ||
266 | PARALLEL_MAKE = "" | ||
267 | |||
268 | def fw_compr_suffix(d): | ||
269 | compr = d.getVar('FIRMWARE_COMPRESSION') | ||
270 | if compr == '': | ||
271 | return '' | ||
272 | if compr == 'zstd': | ||
273 | compr = 'zst' | ||
274 | return '-' + compr | ||
275 | |||
276 | do_compile() { | ||
277 | : | ||
278 | } | ||
279 | |||
280 | do_install() { | ||
281 | sed -i 's:^./check_whence.py:#./check_whence.py:' ${S}/copy-firmware.sh | ||
282 | |||
283 | oe_runmake 'DESTDIR=${D}' 'FIRMWAREDIR=${nonarch_base_libdir}/firmware' install${@fw_compr_suffix(d)} | ||
284 | if [ "${@bb.utils.contains('PACKAGECONFIG', 'deduplicate', '1', '0', d)}" = "1" ]; then | ||
285 | oe_runmake 'DESTDIR=${D}' 'FIRMWAREDIR=${nonarch_base_libdir}/firmware' dedup | ||
286 | fi | ||
287 | cp LICEN[CS]E.* WHENCE ${D}${nonarch_base_libdir}/firmware/ | ||
288 | cp wfx/LICEN[CS]E.* ${D}${nonarch_base_libdir}/firmware/wfx/ | ||
289 | } | ||
290 | |||
291 | PACKAGES =+ "${PN}-amphion-vpu-license ${PN}-amphion-vpu \ | ||
292 | ${PN}-cw1200-license ${PN}-cw1200 \ | ||
293 | ${PN}-ralink-license ${PN}-ralink \ | ||
294 | ${PN}-mt76x-license ${PN}-mt7601u ${PN}-mt7650 ${PN}-mt76x2 \ | ||
295 | ${PN}-radeon-license ${PN}-radeon \ | ||
296 | ${PN}-amdgpu-license ${PN}-amdgpu \ | ||
297 | ${PN}-amdgpu-aldebaran \ | ||
298 | ${PN}-amdgpu-carrizo \ | ||
299 | ${PN}-amdgpu-cezanne \ | ||
300 | ${PN}-amdgpu-fiji \ | ||
301 | ${PN}-amdgpu-hawaii \ | ||
302 | ${PN}-amdgpu-navi10 \ | ||
303 | ${PN}-amdgpu-navi14 \ | ||
304 | ${PN}-amdgpu-navi21 \ | ||
305 | ${PN}-amdgpu-navi22 \ | ||
306 | ${PN}-amdgpu-navi23 \ | ||
307 | ${PN}-amdgpu-navi24 \ | ||
308 | ${PN}-amdgpu-navi31 \ | ||
309 | ${PN}-amdgpu-navi32 \ | ||
310 | ${PN}-amdgpu-oland \ | ||
311 | ${PN}-amdgpu-polaris10 \ | ||
312 | ${PN}-amdgpu-polaris11 \ | ||
313 | ${PN}-amdgpu-polaris12 \ | ||
314 | ${PN}-amdgpu-raven \ | ||
315 | ${PN}-amdgpu-rembrandt \ | ||
316 | ${PN}-amdgpu-renoir \ | ||
317 | ${PN}-amdgpu-stoney \ | ||
318 | ${PN}-amdgpu-tonga \ | ||
319 | ${PN}-amdgpu-topaz \ | ||
320 | ${PN}-amdgpu-vega10 \ | ||
321 | ${PN}-amdgpu-vega12 \ | ||
322 | ${PN}-amdgpu-misc \ | ||
323 | ${PN}-marvell-license ${PN}-pcie8897 ${PN}-pcie8997 \ | ||
324 | ${PN}-mediatek-license ${PN}-mediatek \ | ||
325 | ${PN}-microchip-license ${PN}-microchip \ | ||
326 | ${PN}-moxa-license ${PN}-moxa \ | ||
327 | ${PN}-sd8686 ${PN}-sd8688 ${PN}-sd8787 ${PN}-sd8797 ${PN}-sd8801 \ | ||
328 | ${PN}-sd8887 ${PN}-sd8897 ${PN}-sd8997 ${PN}-usb8997 \ | ||
329 | ${PN}-ti-connectivity-license ${PN}-wlcommon ${PN}-wl12xx ${PN}-wl18xx ${PN}-cc33xx \ | ||
330 | ${PN}-ti-keystone-license ${PN}-ti-keystone \ | ||
331 | ${PN}-vt6656-license ${PN}-vt6656 \ | ||
332 | ${PN}-rs9113 ${PN}-rs9116 \ | ||
333 | ${PN}-rtl-license ${PN}-rtl8188 ${PN}-rtl8192cu ${PN}-rtl8192ce ${PN}-rtl8192su ${PN}-rtl8723 ${PN}-rtl8821 \ | ||
334 | ${PN}-rtl8761 \ | ||
335 | ${PN}-rtl8168 \ | ||
336 | ${PN}-rtl8822 \ | ||
337 | ${PN}-rtl-nic \ | ||
338 | ${PN}-cypress-license \ | ||
339 | ${PN}-broadcom-license \ | ||
340 | ${PN}-bcm-0bb4-0306 \ | ||
341 | ${PN}-bcm43143 \ | ||
342 | ${PN}-bcm43236b \ | ||
343 | ${PN}-bcm43241b0 \ | ||
344 | ${PN}-bcm43241b4 \ | ||
345 | ${PN}-bcm43241b5 \ | ||
346 | ${PN}-bcm43242a \ | ||
347 | ${PN}-bcm4329 \ | ||
348 | ${PN}-bcm4329-fullmac \ | ||
349 | ${PN}-bcm4330 \ | ||
350 | ${PN}-bcm4334 \ | ||
351 | ${PN}-bcm43340 \ | ||
352 | ${PN}-bcm4335 \ | ||
353 | ${PN}-bcm43362 \ | ||
354 | ${PN}-bcm4339 \ | ||
355 | ${PN}-bcm43430 \ | ||
356 | ${PN}-bcm43430a0 \ | ||
357 | ${PN}-bcm43455 \ | ||
358 | ${PN}-bcm4350 \ | ||
359 | ${PN}-bcm4350c2 \ | ||
360 | ${PN}-bcm4354 \ | ||
361 | ${PN}-bcm4356 \ | ||
362 | ${PN}-bcm4356-pcie \ | ||
363 | ${PN}-bcm43569 \ | ||
364 | ${PN}-bcm43570 \ | ||
365 | ${PN}-bcm4358 \ | ||
366 | ${PN}-bcm43602 \ | ||
367 | ${PN}-bcm4366b \ | ||
368 | ${PN}-bcm4366c \ | ||
369 | ${PN}-bcm4371 \ | ||
370 | ${PN}-bcm4373 \ | ||
371 | ${PN}-bcm43xx \ | ||
372 | ${PN}-bcm43xx-hdr \ | ||
373 | ${PN}-cirrus-license ${PN}-cirrus \ | ||
374 | ${PN}-cnm-license ${PN}-cnm \ | ||
375 | ${PN}-atheros-license ${PN}-ar5523 ${PN}-ar9170 ${PN}-ath6k ${PN}-ath9k ${PN}-ath3k \ | ||
376 | ${PN}-carl9170 \ | ||
377 | ${PN}-qcom-qcm2290-wifi ${PN}-qcom-qrb4210-wifi ${PN}-qcom-sdm845-modem \ | ||
378 | ${PN}-ar3k-license ${PN}-ar3k \ | ||
379 | ${PN}-ath10k-license ${PN}-ath10k \ | ||
380 | ${PN}-ath10k-qca4019 \ | ||
381 | ${PN}-ath10k-qca6174 \ | ||
382 | ${PN}-ath10k-qca9377 \ | ||
383 | ${PN}-ath10k-qca9887 \ | ||
384 | ${PN}-ath10k-qca9888 \ | ||
385 | ${PN}-ath10k-qca988x \ | ||
386 | ${PN}-ath10k-qca9984 \ | ||
387 | ${PN}-ath10k-qca99x0 \ | ||
388 | ${PN}-ath10k-wcn3990 \ | ||
389 | ${PN}-ath10k-misc \ | ||
390 | ${PN}-ath11k \ | ||
391 | ${PN}-ath11k-ipq5018 \ | ||
392 | ${PN}-ath11k-ipq6018 \ | ||
393 | ${PN}-ath11k-ipq8074 \ | ||
394 | ${PN}-ath11k-qca2066 \ | ||
395 | ${PN}-ath11k-qca6390 \ | ||
396 | ${PN}-ath11k-qca6698aq \ | ||
397 | ${PN}-ath11k-qcn9074 \ | ||
398 | ${PN}-ath11k-wcn6750 \ | ||
399 | ${PN}-ath11k-wcn6855 \ | ||
400 | ${PN}-ath11k-misc \ | ||
401 | ${PN}-ath12k \ | ||
402 | ${PN}-ath12k-qcn9274 \ | ||
403 | ${PN}-ath12k-wcn7850 \ | ||
404 | ${PN}-ath12k-misc \ | ||
405 | ${PN}-qca \ | ||
406 | ${PN}-qca-qca61x4-serial \ | ||
407 | ${PN}-qca-qca61x4-usb \ | ||
408 | ${PN}-qca-qca6390 \ | ||
409 | ${PN}-qca-qca6698 \ | ||
410 | ${PN}-qca-wcn3950 \ | ||
411 | ${PN}-qca-wcn3988 \ | ||
412 | ${PN}-qca-wcn399x \ | ||
413 | ${PN}-qca-wcn6750 \ | ||
414 | ${PN}-qca-qca2066 \ | ||
415 | ${PN}-qca-wcn7850 \ | ||
416 | ${PN}-qca-misc \ | ||
417 | \ | ||
418 | ${PN}-imx-sdma-license ${PN}-imx-sdma-imx6q ${PN}-imx-sdma-imx7d \ | ||
419 | \ | ||
420 | ${PN}-iwlwifi-license ${PN}-iwlwifi \ | ||
421 | ${PN}-iwlwifi-135-6 \ | ||
422 | ${PN}-iwlwifi-3160-7 ${PN}-iwlwifi-3160-8 ${PN}-iwlwifi-3160-9 \ | ||
423 | ${PN}-iwlwifi-3160-10 ${PN}-iwlwifi-3160-12 ${PN}-iwlwifi-3160-13 \ | ||
424 | ${PN}-iwlwifi-3160-16 ${PN}-iwlwifi-3160-17 \ | ||
425 | ${PN}-iwlwifi-6000-4 ${PN}-iwlwifi-6000g2a-5 ${PN}-iwlwifi-6000g2a-6 \ | ||
426 | ${PN}-iwlwifi-6000g2b-5 ${PN}-iwlwifi-6000g2b-6 \ | ||
427 | ${PN}-iwlwifi-6050-4 ${PN}-iwlwifi-6050-5 \ | ||
428 | ${PN}-iwlwifi-7260 \ | ||
429 | ${PN}-iwlwifi-7265 \ | ||
430 | ${PN}-iwlwifi-7265d ${PN}-iwlwifi-8000c ${PN}-iwlwifi-8265 \ | ||
431 | ${PN}-iwlwifi-9000 \ | ||
432 | ${PN}-iwlwifi-9260 \ | ||
433 | ${PN}-iwlwifi-misc \ | ||
434 | ${PN}-ibt-license ${PN}-ibt \ | ||
435 | ${PN}-ibt-11-5 ${PN}-ibt-12-16 ${PN}-ibt-hw-37-7 ${PN}-ibt-hw-37-8 \ | ||
436 | ${PN}-ibt-17 \ | ||
437 | ${PN}-ibt-18 \ | ||
438 | ${PN}-ibt-20 \ | ||
439 | ${PN}-ibt-misc \ | ||
440 | ${PN}-i915-license ${PN}-i915 \ | ||
441 | ${PN}-ice-license ${PN}-ice \ | ||
442 | ${PN}-ice-enhanced-license ${PN}-ice-enhanced \ | ||
443 | ${PN}-adsp-sst-license ${PN}-adsp-sst \ | ||
444 | ${PN}-bnx2 \ | ||
445 | ${PN}-bnx2x \ | ||
446 | ${PN}-liquidio \ | ||
447 | ${PN}-linaro-license \ | ||
448 | ${PN}-mali-csffw-arch108 ${PN}-mali-csffw-license \ | ||
449 | ${PN}-mellanox \ | ||
450 | ${PN}-nvidia-license \ | ||
451 | ${PN}-nvidia-tegra-k1 ${PN}-nvidia-tegra \ | ||
452 | ${PN}-nvidia-gpu \ | ||
453 | ${PN}-nxp-license \ | ||
454 | ${PN}-nxp8987-sdio \ | ||
455 | ${PN}-nxp8997-common \ | ||
456 | ${PN}-nxp8997-pcie \ | ||
457 | ${PN}-nxp8997-sdio \ | ||
458 | ${PN}-nxp9098-common \ | ||
459 | ${PN}-nxp9098-pcie \ | ||
460 | ${PN}-nxp9098-sdio \ | ||
461 | ${PN}-nxpiw416-sdio \ | ||
462 | ${PN}-nxpiw612-sdio \ | ||
463 | ${PN}-nxp-mc-license ${PN}-nxp-mc \ | ||
464 | ${PN}-netronome-license ${PN}-netronome \ | ||
465 | ${PN}-olpc-license ${PN}-olpc \ | ||
466 | ${PN}-phanfw-license ${PN}-phanfw \ | ||
467 | ${PN}-powervr-license ${PN}-powervr \ | ||
468 | ${PN}-prestera \ | ||
469 | ${PN}-qat ${PN}-qat-license \ | ||
470 | ${PN}-qed \ | ||
471 | ${PN}-qcom-license ${PN}-qcom-2-license ${PN}-qcom-yamato-license \ | ||
472 | ${PN}-qcom-aic100 ${PN}-qcom-qdu100 \ | ||
473 | ${PN}-qcom-venus-1.8 ${PN}-qcom-venus-4.2 ${PN}-qcom-venus-5.2 ${PN}-qcom-venus-5.4 ${PN}-qcom-venus-6.0 \ | ||
474 | ${PN}-qcom-vpu \ | ||
475 | ${PN}-qcom-adreno-a2xx ${PN}-qcom-adreno-a3xx ${PN}-qcom-adreno-a4xx ${PN}-qcom-adreno-a530 \ | ||
476 | ${PN}-qcom-adreno-a623 ${PN}-qcom-adreno-a630 ${PN}-qcom-adreno-a650 ${PN}-qcom-adreno-a660 \ | ||
477 | ${PN}-qcom-adreno-a663 ${PN}-qcom-adreno-a702 ${PN}-qcom-adreno-g750 \ | ||
478 | ${PN}-qcom-apq8016-modem ${PN}-qcom-apq8016-wifi \ | ||
479 | ${PN}-qcom-apq8096-adreno ${PN}-qcom-apq8096-audio ${PN}-qcom-apq8096-modem \ | ||
480 | ${PN}-qcom-qcm2290-adreno ${PN}-qcom-qcm2290-audio ${PN}-qcom-qcm2290-modem \ | ||
481 | ${PN}-qcom-qcm6490-adreno \ | ||
482 | ${PN}-qcom-qcm6490-audio ${PN}-qcom-qcm6490-compute ${PN}-qcom-qcm6490-ipa ${PN}-qcom-qcm6490-wifi \ | ||
483 | ${PN}-qcom-qcs615-adreno \ | ||
484 | ${PN}-qcom-qcs8300-adreno ${PN}-qcom-qcs8300-audio ${PN}-qcom-qcs8300-compute \ | ||
485 | ${PN}-qcom-qcs8300-generalpurpose \ | ||
486 | ${PN}-qcom-qrb4210-adreno \ | ||
487 | ${PN}-qcom-qrb4210-audio ${PN}-qcom-qrb4210-compute ${PN}-qcom-qrb4210-modem \ | ||
488 | ${PN}-qcom-sa8775p-adreno ${PN}-qcom-sa8775p-audio ${PN}-qcom-sa8775p-compute \ | ||
489 | ${PN}-qcom-sa8775p-generalpurpose ${PN}-qcom-sa8775p-qupv3fw \ | ||
490 | ${PN}-qcom-sc8280xp-lenovo-x13s-compat \ | ||
491 | ${PN}-qcom-sc8280xp-lenovo-x13s-audio \ | ||
492 | ${PN}-qcom-sc8280xp-lenovo-x13s-adreno \ | ||
493 | ${PN}-qcom-sc8280xp-lenovo-x13s-compute \ | ||
494 | ${PN}-qcom-sc8280xp-lenovo-x13s-sensors \ | ||
495 | ${PN}-qcom-sdm845-adreno ${PN}-qcom-sdm845-audio ${PN}-qcom-sdm845-compute \ | ||
496 | ${PN}-qcom-sdm845-thundercomm-db845c-sensors \ | ||
497 | ${PN}-qcom-sm8250-adreno ${PN}-qcom-sm8250-audio ${PN}-qcom-sm8250-compute \ | ||
498 | ${PN}-qcom-sm8250-thundercomm-rb5-sensors \ | ||
499 | ${PN}-qcom-sm8550-audio-tplg \ | ||
500 | ${PN}-qcom-sm8650-audio-tplg \ | ||
501 | ${PN}-qcom-x1e80100-adreno ${PN}-qcom-x1e80100-audio \ | ||
502 | ${PN}-qcom-x1e80100-lenovo-t14s-g6-adreno ${PN}-qcom-x1e80100-lenovo-t14s-g6-audio \ | ||
503 | ${PN}-qcom-x1e80100-lenovo-t14s-g6-compute ${PN}-qcom-x1e80100-lenovo-t14s-g6-vpu \ | ||
504 | ${PN}-qcom-x1e80100-lenovo-yoga-slim7x-adreno ${PN}-qcom-x1e80100-lenovo-yoga-slim7x-audio \ | ||
505 | ${PN}-qcom-x1e80100-lenovo-yoga-slim7x-compute ${PN}-qcom-x1e80100-lenovo-yoga-slim7x-vpu \ | ||
506 | ${PN}-qla2xxx ${PN}-qla2xxx-license \ | ||
507 | ${PN}-rockchip-license ${PN}-rockchip-dptx \ | ||
508 | ${PN}-amlogic-vdec-license ${PN}-amlogic-vdec \ | ||
509 | ${PN}-lt9611uxc ${PN}-lontium-license \ | ||
510 | ${PN}-wfx-license ${PN}-wfx \ | ||
511 | ${PN}-whence-license \ | ||
512 | ${PN}-wl1251-license ${PN}-wl1251 \ | ||
513 | ${PN}-xc4000-license ${PN}-xc4000 \ | ||
514 | ${PN}-xc5000-license ${PN}-xc5000 \ | ||
515 | ${PN}-xc5000c-license ${PN}-xc5000c \ | ||
516 | ${PN}-license \ | ||
517 | " | ||
518 | |||
519 | # For Amphion VPU | ||
520 | LICENSE:${PN}-amphion-vpu = "Firmware-amphion_vpu" | ||
521 | LICENSE:${PN}-amphion-vpu-license = "Firmware-amphion_vpu" | ||
522 | |||
523 | FILES:${PN}-amphion-vpu = "${nonarch_base_libdir}/firmware/amphion/*" | ||
524 | FILES:${PN}-amphion-vpu-license = " \ | ||
525 | ${nonarch_base_libdir}/firmware/LICENSE.amphion_vpu \ | ||
526 | " | ||
527 | RDEPENDS:${PN}-amphion-vpu += "${PN}-amphion-vpu-license" | ||
528 | |||
529 | # For cw1200 | ||
530 | LICENSE:${PN}-cw1200 = "Firmware-cw1200" | ||
531 | LICENSE:${PN}-cw1200-license = "Firmware-cw1200" | ||
532 | |||
533 | FILES:${PN}-cw1200 = "${nonarch_base_libdir}/firmware/wsm_22.bin*" | ||
534 | FILES:${PN}-cw1200-license = "${nonarch_base_libdir}/firmware/LICENCE.cw1200" | ||
535 | |||
536 | RDEPENDS:${PN}-cw1200 += "${PN}-cw1200-license" | ||
537 | |||
538 | # For atheros | ||
539 | LICENSE:${PN}-ar5523 = "Firmware-atheros_firmware" | ||
540 | LICENSE:${PN}-ar9170 = "Firmware-atheros_firmware" | ||
541 | LICENSE:${PN}-ath3k = "Firmware-atheros_firmware" | ||
542 | LICENSE:${PN}-ath6k = "Firmware-atheros_firmware" | ||
543 | LICENSE:${PN}-ath9k = "Firmware-atheros_firmware" | ||
544 | LICENSE:${PN}-atheros-license = "Firmware-atheros_firmware" | ||
545 | |||
546 | FILES:${PN}-atheros-license = "${nonarch_base_libdir}/firmware/LICENCE.atheros_firmware" | ||
547 | FILES:${PN}-ar5523 = " \ | ||
548 | ${nonarch_base_libdir}/firmware/ar5523.bin* \ | ||
549 | " | ||
550 | FILES:${PN}-ar9170 = " \ | ||
551 | ${nonarch_base_libdir}/firmware/ar9170*.fw* \ | ||
552 | " | ||
553 | FILES:${PN}-ath3k = " \ | ||
554 | ${nonarch_base_libdir}/firmware/ath3k*fw* \ | ||
555 | " | ||
556 | FILES:${PN}-ath6k = " \ | ||
557 | ${nonarch_base_libdir}/firmware/ath6k \ | ||
558 | " | ||
559 | FILES:${PN}-ath9k = " \ | ||
560 | ${nonarch_base_libdir}/firmware/ar9271.fw* \ | ||
561 | ${nonarch_base_libdir}/firmware/ar7010*.fw* \ | ||
562 | ${nonarch_base_libdir}/firmware/htc_9271.fw* \ | ||
563 | ${nonarch_base_libdir}/firmware/htc_7010.fw* \ | ||
564 | ${nonarch_base_libdir}/firmware/ath9k_htc/htc_7010-1.4.0.fw* \ | ||
565 | ${nonarch_base_libdir}/firmware/ath9k_htc/htc_9271-1.4.0.fw* \ | ||
566 | " | ||
567 | |||
568 | RDEPENDS:${PN}-ar5523 += "${PN}-atheros-license" | ||
569 | RDEPENDS:${PN}-ar9170 += "${PN}-atheros-license" | ||
570 | RDEPENDS:${PN}-ath6k += "${PN}-atheros-license" | ||
571 | RDEPENDS:${PN}-ath9k += "${PN}-atheros-license" | ||
572 | |||
573 | # For carl9170 | ||
574 | |||
575 | FILES:${PN}-carl9170 = " \ | ||
576 | ${nonarch_base_libdir}/firmware/carl9170*.fw* \ | ||
577 | " | ||
578 | LICENSE:${PN}-carl9170 = "GPL-2.0-or-later" | ||
579 | |||
580 | # For QualCommAthos | ||
581 | LICENSE:${PN}-ar3k = "Firmware-qualcommAthos_ar3k & Firmware-atheros_firmware" | ||
582 | LICENSE:${PN}-ar3k-license = "Firmware-qualcommAthos_ar3k" | ||
583 | LICENSE:${PN}-ath10k = "Firmware-qualcommAthos_ath10k" | ||
584 | LICENSE:${PN}-ath10k-qca4019 = "Firmware-qualcommAthos_ath10k" | ||
585 | LICENSE:${PN}-ath10k-qca6174 = "Firmware-qualcommAthos_ath10k" | ||
586 | LICENSE:${PN}-ath10k-qca9377 = "Firmware-qualcommAthos_ath10k" | ||
587 | LICENSE:${PN}-ath10k-qca9887 = "Firmware-qualcommAthos_ath10k" | ||
588 | LICENSE:${PN}-ath10k-qca9888 = "Firmware-qualcommAthos_ath10k" | ||
589 | LICENSE:${PN}-ath10k-qca988x = "Firmware-qualcommAthos_ath10k" | ||
590 | LICENSE:${PN}-ath10k-qca9984 = "Firmware-qualcommAthos_ath10k" | ||
591 | LICENSE:${PN}-ath10k-qca99x0 = "Firmware-qualcommAthos_ath10k" | ||
592 | LICENSE:${PN}-ath10k-wcn3990 = "Firmware-qualcommAthos_ath10k" | ||
593 | LICENSE:${PN}-ath10k-misc = "Firmware-qualcommAthos_ath10k" | ||
594 | LICENSE:${PN}-ath10k-license = "Firmware-qualcommAthos_ath10k" | ||
595 | LICENSE:${PN}-ath11k = "Firmware-qualcommAthos_ath10k" | ||
596 | LICENSE:${PN}-ath11k-ipq5018 = "Firmware-qualcommAthos_ath10k" | ||
597 | LICENSE:${PN}-ath11k-ipq6018 = "Firmware-qualcommAthos_ath10k" | ||
598 | LICENSE:${PN}-ath11k-ipq8074 = "Firmware-qualcommAthos_ath10k" | ||
599 | LICENSE:${PN}-ath11k-qca2066 = "Firmware-qualcommAthos_ath10k" | ||
600 | LICENSE:${PN}-ath11k-qca6390 = "Firmware-qualcommAthos_ath10k" | ||
601 | LICENSE:${PN}-ath11k-qca6698aq = "Firmware-qualcommAthos_ath10k" | ||
602 | LICENSE:${PN}-ath11k-qcn9074 = "Firmware-qualcommAthos_ath10k" | ||
603 | LICENSE:${PN}-ath11k-wcn6750 = "Firmware-qualcommAthos_ath10k" | ||
604 | LICENSE:${PN}-ath11k-wcn6855 = "Firmware-qualcommAthos_ath10k" | ||
605 | LICENSE:${PN}-ath11k-misc = "Firmware-qualcommAthos_ath10k" | ||
606 | LICENSE:${PN}-ath12k = "Firmware-qualcommAthos_ath10k" | ||
607 | LICENSE:${PN}-ath12k-qcn9274 = "Firmware-qualcommAthos_ath10k" | ||
608 | LICENSE:${PN}-ath12k-wcn7850 = "Firmware-qualcommAthos_ath10k" | ||
609 | LICENSE:${PN}-ath12k-misc = "Firmware-qualcommAthos_ath10k" | ||
610 | LICENSE:${PN}-qca-qca61x4-serial = "Firmware-qualcommAthos_ath10k" | ||
611 | LICENSE:${PN}-qca-qca61x4-usb = "Firmware-qualcommAthos_ath10k" | ||
612 | LICENSE:${PN}-qca-qca6390 = "Firmware-qualcommAthos_ath10k" | ||
613 | LICENSE:${PN}-qca-qca6698 = "Firmware-qualcommAthos_ath10k" | ||
614 | LICENSE:${PN}-qca-wcn3950 = "Firmware-qcom" | ||
615 | LICENSE:${PN}-qca-wcn3988 = "Firmware-qcom" | ||
616 | LICENSE:${PN}-qca-wcn399x = "Firmware-qualcommAthos_ath10k" | ||
617 | LICENSE:${PN}-qca-wcn6750 = "Firmware-qualcommAthos_ath10k" | ||
618 | LICENSE:${PN}-qca-qca2066 = "Firmware-qualcommAthos_ath10k" | ||
619 | LICENSE:${PN}-qca-wcn7850 = "Firmware-qcom" | ||
620 | LICENSE:${PN}-qca-misc = "Firmware-qualcommAthos_ath10k & Firmware-qcom" | ||
621 | |||
622 | FILES:${PN}-ar3k-license = "${nonarch_base_libdir}/firmware/LICENSE.QualcommAtheros_ar3k" | ||
623 | FILES:${PN}-ar3k = " \ | ||
624 | ${nonarch_base_libdir}/firmware/ar3k \ | ||
625 | " | ||
626 | |||
627 | FILES:${PN}-ath10k-license = "${nonarch_base_libdir}/firmware/LICENSE.QualcommAtheros_ath10k" | ||
628 | FILES:${PN}-ath10k-qca4019 = "${nonarch_base_libdir}/firmware/ath10k/QCA4019" | ||
629 | FILES:${PN}-ath10k-qca6174 = "${nonarch_base_libdir}/firmware/ath10k/QCA6174" | ||
630 | FILES:${PN}-ath10k-qca9377 = "${nonarch_base_libdir}/firmware/ath10k/QCA9377" | ||
631 | FILES:${PN}-ath10k-qca9887 = "${nonarch_base_libdir}/firmware/ath10k/QCA9887" | ||
632 | FILES:${PN}-ath10k-qca9888 = "${nonarch_base_libdir}/firmware/ath10k/QCA9888" | ||
633 | FILES:${PN}-ath10k-qca988x = "${nonarch_base_libdir}/firmware/ath10k/QCA988X" | ||
634 | FILES:${PN}-ath10k-qca9984 = "${nonarch_base_libdir}/firmware/ath10k/QCA9984" | ||
635 | FILES:${PN}-ath10k-qca99x0 = "${nonarch_base_libdir}/firmware/ath10k/QCA99X0" | ||
636 | FILES:${PN}-ath10k-wcn3990 = "${nonarch_base_libdir}/firmware/ath10k/WCN3990" | ||
637 | FILES:${PN}-ath10k-misc = "${nonarch_base_libdir}/firmware/ath10k/*" | ||
638 | # -ath10k is a virtual package that depends upon all ath10k packages. | ||
639 | ALLOW_EMPTY:${PN}-ath10k = "1" | ||
640 | # -ath10k-misc is a catch all package that includes all the ath10k | ||
641 | # firmwares that are not already included in other -ath10k- packages. | ||
642 | ALLOW_EMPTY:${PN}-ath10k-misc = "1" | ||
643 | |||
644 | FILES:${PN}-ath11k-ipq5018 = "${nonarch_base_libdir}/firmware/ath11k/IPQ5018" | ||
645 | FILES:${PN}-ath11k-ipq6018 = "${nonarch_base_libdir}/firmware/ath11k/IPQ6018" | ||
646 | FILES:${PN}-ath11k-ipq8074 = "${nonarch_base_libdir}/firmware/ath11k/IPQ8074" | ||
647 | FILES:${PN}-ath11k-qca2066 = "${nonarch_base_libdir}/firmware/ath11k/QCA2066" | ||
648 | FILES:${PN}-ath11k-qca6390 = "${nonarch_base_libdir}/firmware/ath11k/QCA6390" | ||
649 | FILES:${PN}-ath11k-qca6698aq = "${nonarch_base_libdir}/firmware/ath11k/QCA6698AQ" | ||
650 | FILES:${PN}-ath11k-qcn9074 = "${nonarch_base_libdir}/firmware/ath11k/QCN9074" | ||
651 | FILES:${PN}-ath11k-wcn6750 = "${nonarch_base_libdir}/firmware/ath11k/WCN6750" | ||
652 | FILES:${PN}-ath11k-wcn6855 = "${nonarch_base_libdir}/firmware/ath11k/WCN6855" | ||
653 | FILES:${PN}-ath11k-misc = "${nonarch_base_libdir}/firmware/ath11k/*" | ||
654 | # -ath11k is a virtual package that depends upon all ath11k packages. | ||
655 | ALLOW_EMPTY:${PN}-ath11k = "1" | ||
656 | # -ath11k-misc is a catch all package that includes all the ath11k | ||
657 | # firmwares that are not already included in other -ath11k- packages. | ||
658 | ALLOW_EMPTY:${PN}-ath11k-misc = "1" | ||
659 | |||
660 | FILES:${PN}-ath12k-qcn9274 = "${nonarch_base_libdir}/firmware/ath12k/QCN9274" | ||
661 | FILES:${PN}-ath12k-wcn7850 = "${nonarch_base_libdir}/firmware/ath12k/WCN7850" | ||
662 | FILES:${PN}-ath12k-misc = "${nonarch_base_libdir}/firmware/ath12k/*" | ||
663 | # -ath12k is a virtual package that depends upon all ath12k packages. | ||
664 | ALLOW_EMPTY:${PN}-ath12k = "1" | ||
665 | # -ath12k-misc is a catch all package that includes all the ath12k | ||
666 | # firmwares that are not already included in other -ath12k- packages. | ||
667 | ALLOW_EMPTY:${PN}-ath12k-misc = "1" | ||
668 | |||
669 | FILES:${PN}-qca-qca61x4-serial = " \ | ||
670 | ${nonarch_base_libdir}/firmware/qca/nvm_0*.bin* \ | ||
671 | ${nonarch_base_libdir}/firmware/qca/rampatch_0*.bin* \ | ||
672 | " | ||
673 | FILES:${PN}-qca-qca61x4-usb = " \ | ||
674 | ${nonarch_base_libdir}/firmware/qca/nvm_usb_*.bin* \ | ||
675 | ${nonarch_base_libdir}/firmware/qca/rampatch_usb_*.bin* \ | ||
676 | ${nonarch_base_libdir}/firmware/qca/QCA2066/nvm_usb_00130201_030a.bin* \ | ||
677 | ${nonarch_base_libdir}/firmware/qca/QCA2066/nvm_usb_00130201_gf_030a.bin* \ | ||
678 | ${nonarch_base_libdir}/firmware/qca/QCA2066/rampatch_usb_00130201.bin* \ | ||
679 | " | ||
680 | FILES:${PN}-qca-qca6390 = " \ | ||
681 | ${nonarch_base_libdir}/firmware/qca/htbtfw20.tlv* \ | ||
682 | ${nonarch_base_libdir}/firmware/qca/htnv20.bin* \ | ||
683 | " | ||
684 | FILES:${PN}-qca-qca6698 = " \ | ||
685 | ${nonarch_base_libdir}/firmware/qca/QCA6698/hpbtfw21.tlv* \ | ||
686 | ${nonarch_base_libdir}/firmware/qca/QCA6698/hpnv21.b206* \ | ||
687 | ${nonarch_base_libdir}/firmware/qca/QCA6698/hpnv21.b207* \ | ||
688 | ${nonarch_base_libdir}/firmware/qca/QCA6698/hpnv21.bin* \ | ||
689 | " | ||
690 | FILES:${PN}-qca-wcn3950 = " \ | ||
691 | ${nonarch_base_libdir}/firmware/qca/cmbtfw12.tlv* \ | ||
692 | ${nonarch_base_libdir}/firmware/qca/cmbtfw13.tlv* \ | ||
693 | ${nonarch_base_libdir}/firmware/qca/cmnv12.bin* \ | ||
694 | ${nonarch_base_libdir}/firmware/qca/cmnv13.bin* \ | ||
695 | ${nonarch_base_libdir}/firmware/qca/cmnv13s.bin* \ | ||
696 | ${nonarch_base_libdir}/firmware/qca/cmnv13t.bin* \ | ||
697 | " | ||
698 | FILES:${PN}-qca-wcn3988 = " \ | ||
699 | ${nonarch_base_libdir}/firmware/qca/apbtfw10.tlv* \ | ||
700 | ${nonarch_base_libdir}/firmware/qca/apbtfw11.tlv* \ | ||
701 | ${nonarch_base_libdir}/firmware/qca/apnv10.bin* \ | ||
702 | ${nonarch_base_libdir}/firmware/qca/apnv11.bin* \ | ||
703 | " | ||
704 | FILES:${PN}-qca-wcn399x = " \ | ||
705 | ${nonarch_base_libdir}/firmware/qca/crbtfw21.tlv* \ | ||
706 | ${nonarch_base_libdir}/firmware/qca/crnv21.bin* \ | ||
707 | ${nonarch_base_libdir}/firmware/qca/crbtfw32.tlv* \ | ||
708 | ${nonarch_base_libdir}/firmware/qca/crnv32.bin* \ | ||
709 | ${nonarch_base_libdir}/firmware/qca/crnv32u.bin* \ | ||
710 | " | ||
711 | FILES:${PN}-qca-wcn6750 = " \ | ||
712 | ${nonarch_base_libdir}/firmware/qca/msbtfw11.mbn* \ | ||
713 | ${nonarch_base_libdir}/firmware/qca/msbtfw11.tlv* \ | ||
714 | ${nonarch_base_libdir}/firmware/qca/msnv11.bin* \ | ||
715 | ${nonarch_base_libdir}/firmware/qca/msnv11.b0a* \ | ||
716 | ${nonarch_base_libdir}/firmware/qca/msnv11.b09* \ | ||
717 | " | ||
718 | FILES:${PN}-qca-qca2066 = " \ | ||
719 | ${nonarch_base_libdir}/firmware/qca/hpbtfw21.tlv* \ | ||
720 | ${nonarch_base_libdir}/firmware/qca/hpnv21.bin* \ | ||
721 | ${nonarch_base_libdir}/firmware/qca/hpnv21g.bin* \ | ||
722 | ${nonarch_base_libdir}/firmware/qca/hpnv21.301* \ | ||
723 | ${nonarch_base_libdir}/firmware/qca/hpnv21.302* \ | ||
724 | ${nonarch_base_libdir}/firmware/qca/hpnv21g.301* \ | ||
725 | ${nonarch_base_libdir}/firmware/qca/hpnv21g.302* \ | ||
726 | ${nonarch_base_libdir}/firmware/qca/hpnv21.309* \ | ||
727 | ${nonarch_base_libdir}/firmware/qca/hpnv21g.309* \ | ||
728 | ${nonarch_base_libdir}/firmware/qca/hpnv21.30a* \ | ||
729 | ${nonarch_base_libdir}/firmware/qca/hpnv21g.30a* \ | ||
730 | ${nonarch_base_libdir}/firmware/qca/hpnv21.b8c* \ | ||
731 | ${nonarch_base_libdir}/firmware/qca/hpnv21.b9f* \ | ||
732 | ${nonarch_base_libdir}/firmware/qca/hpnv21.ba0* \ | ||
733 | ${nonarch_base_libdir}/firmware/qca/hpnv21.ba1* \ | ||
734 | ${nonarch_base_libdir}/firmware/qca/hpnv21.ba2* \ | ||
735 | ${nonarch_base_libdir}/firmware/qca/hpnv21.ba3* \ | ||
736 | ${nonarch_base_libdir}/firmware/qca/hpnv21.ba4* \ | ||
737 | ${nonarch_base_libdir}/firmware/qca/hpnv21.baa* \ | ||
738 | ${nonarch_base_libdir}/firmware/qca/hpnv21.bb8* \ | ||
739 | ${nonarch_base_libdir}/firmware/qca/hpnv21.b10c* \ | ||
740 | ${nonarch_base_libdir}/firmware/qca/hpnv21.b111* \ | ||
741 | ${nonarch_base_libdir}/firmware/qca/hpnv21g.b8c* \ | ||
742 | ${nonarch_base_libdir}/firmware/qca/hpnv21g.b9f* \ | ||
743 | ${nonarch_base_libdir}/firmware/qca/hpnv21g.ba0* \ | ||
744 | ${nonarch_base_libdir}/firmware/qca/hpnv21g.ba1* \ | ||
745 | ${nonarch_base_libdir}/firmware/qca/hpnv21g.ba2* \ | ||
746 | ${nonarch_base_libdir}/firmware/qca/hpnv21g.ba3* \ | ||
747 | ${nonarch_base_libdir}/firmware/qca/hpnv21g.ba4* \ | ||
748 | ${nonarch_base_libdir}/firmware/qca/hpnv21g.baa* \ | ||
749 | ${nonarch_base_libdir}/firmware/qca/hpnv21g.bb8* \ | ||
750 | ${nonarch_base_libdir}/firmware/qca/hpnv21g.b10c* \ | ||
751 | ${nonarch_base_libdir}/firmware/qca/hpnv21g.b111* \ | ||
752 | " | ||
753 | FILES:${PN}-qca-wcn7850 = " \ | ||
754 | ${nonarch_base_libdir}/firmware/qca/hmtbtfw20.tlv* \ | ||
755 | ${nonarch_base_libdir}/firmware/qca/hmtnv20.b10f* \ | ||
756 | ${nonarch_base_libdir}/firmware/qca/hmtnv20.b112* \ | ||
757 | ${nonarch_base_libdir}/firmware/qca/hmtnv20.bin* \ | ||
758 | " | ||
759 | FILES:${PN}-qca-misc = "${nonarch_base_libdir}/firmware/qca/*" | ||
760 | # -qca is a virtual package that depends upon all qca packages. | ||
761 | ALLOW_EMPTY:${PN}-qca = "1" | ||
762 | # -qca-misc is a catch all package that includes all the qca | ||
763 | # firmwares that are not already included in other -qca- packages. | ||
764 | ALLOW_EMPTY:${PN}-qca-misc = "1" | ||
765 | |||
766 | RDEPENDS:${PN}-ar3k += "${PN}-ar3k-license ${PN}-atheros-license" | ||
767 | RDEPENDS:${PN}-ath10k += "${PN}-ath10k-license" | ||
768 | RDEPENDS:${PN}-ath10k-qca4019 += "${PN}-ath10k-license" | ||
769 | RDEPENDS:${PN}-ath10k-qca6174 += "${PN}-ath10k-license" | ||
770 | RDEPENDS:${PN}-ath10k-qca9377 += "${PN}-ath10k-license" | ||
771 | RDEPENDS:${PN}-ath10k-qca9887 += "${PN}-ath10k-license" | ||
772 | RDEPENDS:${PN}-ath10k-qca9888 += "${PN}-ath10k-license" | ||
773 | RDEPENDS:${PN}-ath10k-qca988x += "${PN}-ath10k-license" | ||
774 | RDEPENDS:${PN}-ath10k-qca9984 += "${PN}-ath10k-license" | ||
775 | RDEPENDS:${PN}-ath10k-qca99x0 += "${PN}-ath10k-license" | ||
776 | RDEPENDS:${PN}-ath10k-wcn3990 += "${PN}-ath10k-license" | ||
777 | RDEPENDS:${PN}-ath10k-misc += "${PN}-ath10k-license" | ||
778 | RDEPENDS:${PN}-ath11k += "${PN}-ath10k-license" | ||
779 | RDEPENDS:${PN}-ath11k-ipq5018 += "${PN}-ath10k-license" | ||
780 | RDEPENDS:${PN}-ath11k-ipq6018 += "${PN}-ath10k-license" | ||
781 | RDEPENDS:${PN}-ath11k-ipq8074 += "${PN}-ath10k-license" | ||
782 | RDEPENDS:${PN}-ath11k-qca2066 += "${PN}-ath10k-license" | ||
783 | RDEPENDS:${PN}-ath11k-qca6390 += "${PN}-ath10k-license" | ||
784 | RDEPENDS:${PN}-ath11k-qca6698aq += "${PN}-ath10k-license" | ||
785 | RDEPENDS:${PN}-ath11k-qcn9074 += "${PN}-ath10k-license" | ||
786 | RDEPENDS:${PN}-ath11k-wcn6750 += "${PN}-ath10k-license" | ||
787 | RDEPENDS:${PN}-ath11k-wcn6855 += "${PN}-ath10k-license" | ||
788 | RDEPENDS:${PN}-ath11k-misc += "${PN}-ath10k-license" | ||
789 | RDEPENDS:${PN}-ath12k += "${PN}-ath10k-license" | ||
790 | RDEPENDS:${PN}-ath12k-qcn9274 += "${PN}-ath10k-license" | ||
791 | RDEPENDS:${PN}-ath12k-wcn7850 += "${PN}-ath10k-license" | ||
792 | RDEPENDS:${PN}-ath12k-misc += "${PN}-ath10k-license" | ||
793 | RDEPENDS:${PN}-qca += "${PN}-ath10k-license ${PN}-qcom-license" | ||
794 | RDEPENDS:${PN}-qca-qca61x4-serial += "${PN}-ath10k-license" | ||
795 | RDEPENDS:${PN}-qca-qca61x4-usb += "${PN}-ath10k-license" | ||
796 | RDEPENDS:${PN}-qca-qca6390 += "${PN}-ath10k-license" | ||
797 | RDEPENDS:${PN}-qca-qca6698 += "${PN}-ath10k-license" | ||
798 | RDEPENDS:${PN}-qca-wcn3950 += "${PN}-qcom-license" | ||
799 | RDEPENDS:${PN}-qca-wcn3988 += "${PN}-qcom-license" | ||
800 | RDEPENDS:${PN}-qca-wcn399x += "${PN}-ath10k-license" | ||
801 | RDEPENDS:${PN}-qca-wcn6750 += "${PN}-ath10k-license" | ||
802 | RDEPENDS:${PN}-qca-qca2066 += "${PN}-ath10k-license" | ||
803 | RDEPENDS:${PN}-qca-wcn7850 += "${PN}-qcom-license" | ||
804 | RDEPENDS:${PN}-qca-misc += "${PN}-ath10k-license ${PN}-qcom-license" | ||
805 | # For ralink | ||
806 | LICENSE:${PN}-ralink = "Firmware-ralink-firmware" | ||
807 | LICENSE:${PN}-ralink-license = "Firmware-ralink-firmware" | ||
808 | |||
809 | FILES:${PN}-ralink-license = "${nonarch_base_libdir}/firmware/LICENCE.ralink-firmware.txt" | ||
810 | FILES:${PN}-ralink = " \ | ||
811 | ${nonarch_base_libdir}/firmware/rt*.bin* \ | ||
812 | " | ||
813 | |||
814 | RDEPENDS:${PN}-ralink += "${PN}-ralink-license" | ||
815 | |||
816 | # For mediatek MT7601U | ||
817 | LICENSE:${PN}-mt76x-license = "Firmware-ralink_a_mediatek_company_firmware" | ||
818 | FILES:${PN}-mt76x-license = "${nonarch_base_libdir}/firmware/LICENCE.ralink_a_mediatek_company_firmware" | ||
819 | |||
820 | LICENSE:${PN}-mt7601u = "Firmware-ralink_a_mediatek_company_firmware" | ||
821 | |||
822 | FILES:${PN}-mt7601u = " \ | ||
823 | ${nonarch_base_libdir}/firmware/mediatek/mt7601u.bin* \ | ||
824 | ${nonarch_base_libdir}/firmware/mt7601u.bin* \ | ||
825 | " | ||
826 | RDEPENDS:${PN}-mt7601u += "${PN}-mt76x-license" | ||
827 | |||
828 | # For MediaTek Bluetooth USB driver 7650 | ||
829 | LICENSE:${PN}-mt7650 = "Firmware-ralink_a_mediatek_company_firmware" | ||
830 | |||
831 | FILES:${PN}-mt7650 = " \ | ||
832 | ${nonarch_base_libdir}/firmware/mediatek/mt7650.bin* \ | ||
833 | ${nonarch_base_libdir}/firmware/mt7650.bin* \ | ||
834 | " | ||
835 | RDEPENDS:${PN}-mt7650 += "${PN}-mt76x-license" | ||
836 | |||
837 | # For MediaTek MT76x2 Wireless MACs | ||
838 | LICENSE:${PN}-mt76x2 = "Firmware-ralink_a_mediatek_company_firmware" | ||
839 | |||
840 | FILES:${PN}-mt76x2 = " \ | ||
841 | ${nonarch_base_libdir}/firmware/mediatek/mt7662.bin* \ | ||
842 | ${nonarch_base_libdir}/firmware/mt7662.bin* \ | ||
843 | ${nonarch_base_libdir}/firmware/mediatek/mt7662_rom_patch.bin* \ | ||
844 | ${nonarch_base_libdir}/firmware/mt7662_rom_patch.bin* \ | ||
845 | " | ||
846 | RDEPENDS:${PN}-mt76x2 += "${PN}-mt76x-license" | ||
847 | |||
848 | # For MediaTek | ||
849 | LICENSE:${PN}-mediatek = "Firmware-mediatek" | ||
850 | LICENSE:${PN}-mediatek-license = "Firmware-mediatek" | ||
851 | |||
852 | FILES:${PN}-mediatek = " \ | ||
853 | ${nonarch_base_libdir}/firmware/mediatek/* \ | ||
854 | ${nonarch_base_libdir}/firmware/vpu_d.bin* \ | ||
855 | ${nonarch_base_libdir}/firmware/vpu_p.bin* \ | ||
856 | " | ||
857 | FILES:${PN}-mediatek-license = " \ | ||
858 | ${nonarch_base_libdir}/firmware/LICENCE.mediatek \ | ||
859 | " | ||
860 | RDEPENDS:${PN}-mediatek += "${PN}-mediatek-license" | ||
861 | |||
862 | # For Microchip | ||
863 | LICENSE:${PN}-microchip = "Firmware-microchip" | ||
864 | LICENSE:${PN}-microchip-license = "Firmware-microchip" | ||
865 | |||
866 | FILES:${PN}-microchip = "${nonarch_base_libdir}/firmware/microchip/*" | ||
867 | FILES:${PN}-microchip-license = " \ | ||
868 | ${nonarch_base_libdir}/firmware/LICENCE.microchip \ | ||
869 | " | ||
870 | RDEPENDS:${PN}-microchip += "${PN}-microchip-license" | ||
871 | |||
872 | # For MOXA | ||
873 | LICENSE:${PN}-moxa = "Firmware-moxa" | ||
874 | LICENSE:${PN}-moxa-license = "Firmware-moxa" | ||
875 | |||
876 | FILES:${PN}-moxa = "${nonarch_base_libdir}/firmware/moxa" | ||
877 | FILES:${PN}-moxa-license = "${nonarch_base_libdir}/firmware/LICENCE.moxa" | ||
878 | |||
879 | RDEPENDS:${PN}-moxa += "${PN}-moxa-license" | ||
880 | |||
881 | # For radeon | ||
882 | |||
883 | LICENSE:${PN}-radeon = "Firmware-radeon" | ||
884 | LICENSE:${PN}-radeon-license = "Firmware-radeon" | ||
885 | |||
886 | FILES:${PN}-radeon-license = "${nonarch_base_libdir}/firmware/LICENSE.radeon" | ||
887 | FILES:${PN}-radeon = " \ | ||
888 | ${nonarch_base_libdir}/firmware/radeon \ | ||
889 | " | ||
890 | |||
891 | RDEPENDS:${PN}-radeon += "${PN}-radeon-license" | ||
892 | |||
893 | # For amdgpu | ||
894 | LICENSE:${PN}-amdgpu = "Firmware-amdgpu" | ||
895 | LICENSE:${PN}-amdgpu-license = "Firmware-amdgpu" | ||
896 | LICENSE:${PN}-amdgpu-aldebaran = "Firmware-amdgpu" | ||
897 | LICENSE:${PN}-amdgpu-carrizo = "Firmware-amdgpu" | ||
898 | LICENSE:${PN}-amdgpu-cezanne = "Firmware-amdgpu" | ||
899 | LICENSE:${PN}-amdgpu-fiji = "Firmware-amdgpu" | ||
900 | LICENSE:${PN}-amdgpu-hawaii = "Firmware-amdgpu" | ||
901 | LICENSE:${PN}-amdgpu-navi10 = "Firmware-amdgpu" | ||
902 | LICENSE:${PN}-amdgpu-navi14 = "Firmware-amdgpu" | ||
903 | LICENSE:${PN}-amdgpu-navi21 = "Firmware-amdgpu" | ||
904 | LICENSE:${PN}-amdgpu-navi22 = "Firmware-amdgpu" | ||
905 | LICENSE:${PN}-amdgpu-navi23 = "Firmware-amdgpu" | ||
906 | LICENSE:${PN}-amdgpu-navi24 = "Firmware-amdgpu" | ||
907 | LICENSE:${PN}-amdgpu-navi31 = "Firmware-amdgpu" | ||
908 | LICENSE:${PN}-amdgpu-navi32 = "Firmware-amdgpu" | ||
909 | LICENSE:${PN}-amdgpu-oland = "Firmware-amdgpu" | ||
910 | LICENSE:${PN}-amdgpu-polaris10 = "Firmware-amdgpu" | ||
911 | LICENSE:${PN}-amdgpu-polaris11 = "Firmware-amdgpu" | ||
912 | LICENSE:${PN}-amdgpu-polaris12 = "Firmware-amdgpu" | ||
913 | LICENSE:${PN}-amdgpu-raven = "Firmware-amdgpu" | ||
914 | LICENSE:${PN}-amdgpu-rembrandt = "Firmware-amdgpu" | ||
915 | LICENSE:${PN}-amdgpu-renoir = "Firmware-amdgpu" | ||
916 | LICENSE:${PN}-amdgpu-stoney = "Firmware-amdgpu" | ||
917 | LICENSE:${PN}-amdgpu-tonga = "Firmware-amdgpu" | ||
918 | LICENSE:${PN}-amdgpu-topaz = "Firmware-amdgpu" | ||
919 | LICENSE:${PN}-amdgpu-vega10 = "Firmware-amdgpu" | ||
920 | LICENSE:${PN}-amdgpu-vega12 = "Firmware-amdgpu" | ||
921 | LICENSE:${PN}-amdgpu-misc = "Firmware-amdgpu" | ||
922 | |||
923 | FILES:${PN}-amdgpu-license = "${nonarch_base_libdir}/firmware/LICENSE.amdgpu" | ||
924 | FILES:${PN}-amdgpu-aldebaran = "${nonarch_base_libdir}/firmware/amdgpu/aldebaran_*.bin*" | ||
925 | FILES:${PN}-amdgpu-carrizo = "${nonarch_base_libdir}/firmware/amdgpu/carrizo_*.bin*" | ||
926 | FILES:${PN}-amdgpu-cezanne = "${nonarch_base_libdir}/firmware/amdgpu/green_sardine_*.bin*" | ||
927 | FILES:${PN}-amdgpu-fiji = "${nonarch_base_libdir}/firmware/amdgpu/fiji_*.bin*" | ||
928 | FILES:${PN}-amdgpu-hawaii = "${nonarch_base_libdir}/firmware/amdgpu/hawaii_*.bin*" | ||
929 | FILES:${PN}-amdgpu-navi10 = "${nonarch_base_libdir}/firmware/amdgpu/navi10_*.bin*" | ||
930 | FILES:${PN}-amdgpu-navi14 = "${nonarch_base_libdir}/firmware/amdgpu/navi14_*.bin*" | ||
931 | FILES:${PN}-amdgpu-navi21 = "${nonarch_base_libdir}/firmware/amdgpu/sienna_cichlid_*.bin*" | ||
932 | FILES:${PN}-amdgpu-navi22 = "${nonarch_base_libdir}/firmware/amdgpu/navy_flounder_*.bin*" | ||
933 | FILES:${PN}-amdgpu-navi23 = "${nonarch_base_libdir}/firmware/amdgpu/dimgrey_cavefish_*.bin*" | ||
934 | FILES:${PN}-amdgpu-navi24 = "${nonarch_base_libdir}/firmware/amdgpu/beige_goby_*.bin*" | ||
935 | FILES:${PN}-amdgpu-navi31 = "${nonarch_base_libdir}/firmware/amdgpu/gc_11_0_0_*.bin* \ | ||
936 | ${nonarch_base_libdir}/firmware/amdgpu/psp_13_0_0_sos.bin* \ | ||
937 | ${nonarch_base_libdir}/firmware/amdgpu/psp_13_0_0_ta.bin* \ | ||
938 | ${nonarch_base_libdir}/firmware/amdgpu/smu_13_0_0.bin* \ | ||
939 | ${nonarch_base_libdir}/firmware/amdgpu/dcn_3_2_0_dmcub.bin* \ | ||
940 | ${nonarch_base_libdir}/firmware/amdgpu/sdma_6_0_0.bin* \ | ||
941 | ${nonarch_base_libdir}/firmware/amdgpu/vcn_4_0_0.bin* \ | ||
942 | " | ||
943 | FILES:${PN}-amdgpu-navi32 = "${nonarch_base_libdir}/firmware/amdgpu/dcn_3_2_0_dmcub.bin* \ | ||
944 | ${nonarch_base_libdir}/firmware/amdgpu/gc_11_0_3_*.bin* \ | ||
945 | ${nonarch_base_libdir}/firmware/amdgpu/psp_13_0_10_sos.bin* \ | ||
946 | ${nonarch_base_libdir}/firmware/amdgpu/psp_13_0_10_ta.bin* \ | ||
947 | ${nonarch_base_libdir}/firmware/amdgpu/sdma_6_0_3.bin* \ | ||
948 | ${nonarch_base_libdir}/firmware/amdgpu/smu_13_0_10.bin* \ | ||
949 | ${nonarch_base_libdir}/firmware/amdgpu/vcn_4_0_0.bin* \ | ||
950 | " | ||
951 | FILES:${PN}-amdgpu-oland = "${nonarch_base_libdir}/firmware/amdgpu/oland_*.bin*" | ||
952 | FILES:${PN}-amdgpu-polaris10 = "${nonarch_base_libdir}/firmware/amdgpu/polaris10_*.bin*" | ||
953 | FILES:${PN}-amdgpu-polaris11 = "${nonarch_base_libdir}/firmware/amdgpu/polaris11_*.bin*" | ||
954 | FILES:${PN}-amdgpu-polaris12 = "${nonarch_base_libdir}/firmware/amdgpu/polaris12_*.bin*" | ||
955 | FILES:${PN}-amdgpu-raven = "${nonarch_base_libdir}/firmware/amdgpu/raven_*.bin*" | ||
956 | FILES:${PN}-amdgpu-rembrandt = "${nonarch_base_libdir}/firmware/amdgpu/yellow_carp_*.bin*" | ||
957 | FILES:${PN}-amdgpu-renoir = "${nonarch_base_libdir}/firmware/amdgpu/renoir_*.bin*" | ||
958 | FILES:${PN}-amdgpu-stoney = "${nonarch_base_libdir}/firmware/amdgpu/stoney_*.bin*" | ||
959 | FILES:${PN}-amdgpu-tonga = "${nonarch_base_libdir}/firmware/amdgpu/tonga_*.bin*" | ||
960 | FILES:${PN}-amdgpu-topaz = "${nonarch_base_libdir}/firmware/amdgpu/topaz_*.bin*" | ||
961 | FILES:${PN}-amdgpu-vega10 = "${nonarch_base_libdir}/firmware/amdgpu/vega10_*.bin*" | ||
962 | FILES:${PN}-amdgpu-vega12 = "${nonarch_base_libdir}/firmware/amdgpu/vega12_*.bin*" | ||
963 | FILES:${PN}-amdgpu-misc = "${nonarch_base_libdir}/firmware/amdgpu/*" | ||
964 | # -amdgpu is a virtual package that depends upon all amdgpu packages. | ||
965 | ALLOW_EMPTY:${PN}-amdgpu = "1" | ||
966 | # -amdgpu-misc is a catch all package that includes all the amdgpu | ||
967 | # firmwares that are not already included in other -amdgpu- packages. | ||
968 | ALLOW_EMPTY:${PN}-amdgpu-misc = "1" | ||
969 | |||
970 | RDEPENDS:${PN}-amdgpu += "${PN}-amdgpu-license" | ||
971 | RDEPENDS:${PN}-amdgpu-aldebaran += "${PN}-amdgpu-license" | ||
972 | RDEPENDS:${PN}-amdgpu-carrizo += "${PN}-amdgpu-license" | ||
973 | RDEPENDS:${PN}-amdgpu-cezanne += "${PN}-amdgpu-license" | ||
974 | RDEPENDS:${PN}-amdgpu-fiji += "${PN}-amdgpu-license" | ||
975 | RDEPENDS:${PN}-amdgpu-hawaii += "${PN}-amdgpu-license" | ||
976 | RDEPENDS:${PN}-amdgpu-navi10 += "${PN}-amdgpu-license" | ||
977 | RDEPENDS:${PN}-amdgpu-navi14 += "${PN}-amdgpu-license" | ||
978 | RDEPENDS:${PN}-amdgpu-navi21 += "${PN}-amdgpu-license" | ||
979 | RDEPENDS:${PN}-amdgpu-navi22 += "${PN}-amdgpu-license" | ||
980 | RDEPENDS:${PN}-amdgpu-navi23 += "${PN}-amdgpu-license" | ||
981 | RDEPENDS:${PN}-amdgpu-navi24 += "${PN}-amdgpu-license" | ||
982 | RDEPENDS:${PN}-amdgpu-navi31 += "${PN}-amdgpu-license" | ||
983 | RDEPENDS:${PN}-amdgpu-navi32 += "${PN}-amdgpu-license" | ||
984 | RDEPENDS:${PN}-amdgpu-oland += "${PN}-amdgpu-license" | ||
985 | RDEPENDS:${PN}-amdgpu-polaris10 += "${PN}-amdgpu-license" | ||
986 | RDEPENDS:${PN}-amdgpu-polaris11 += "${PN}-amdgpu-license" | ||
987 | RDEPENDS:${PN}-amdgpu-polaris12 += "${PN}-amdgpu-license" | ||
988 | RDEPENDS:${PN}-amdgpu-raven += "${PN}-amdgpu-license" | ||
989 | RDEPENDS:${PN}-amdgpu-rembrandt += "${PN}-amdgpu-license" | ||
990 | RDEPENDS:${PN}-amdgpu-renoir += "${PN}-amdgpu-license" | ||
991 | RDEPENDS:${PN}-amdgpu-stoney += "${PN}-amdgpu-license" | ||
992 | RDEPENDS:${PN}-amdgpu-tonga += "${PN}-amdgpu-license" | ||
993 | RDEPENDS:${PN}-amdgpu-topaz += "${PN}-amdgpu-license" | ||
994 | RDEPENDS:${PN}-amdgpu-vega10 += "${PN}-amdgpu-license" | ||
995 | RDEPENDS:${PN}-amdgpu-vega12 += "${PN}-amdgpu-license" | ||
996 | RDEPENDS:${PN}-amdgpu-misc += "${PN}-amdgpu-license" | ||
997 | |||
998 | # For lontium | ||
999 | LICENSE:${PN}-lt9611uxc = "Firmware-Lontium" | ||
1000 | |||
1001 | FILES:${PN}-lontium-license = "${nonarch_base_libdir}/firmware/LICENSE.Lontium" | ||
1002 | FILES:${PN}-lt9611uxc = "${nonarch_base_libdir}/firmware/lt9611uxc_fw.bin*" | ||
1003 | |||
1004 | # For Arm Mali | ||
1005 | LICENSE:${PN}-mali-csffw-arch108 = "Firmware-mali_csffw" | ||
1006 | FILES:${PN}-mali-csffw-license = "${nonarch_base_libdir}/firmware/LICENCE.mali_csffw" | ||
1007 | FILES:${PN}-mali-csffw-arch108 = "${nonarch_base_libdir}/firmware/arm/mali/arch10.8/mali_csffw.bin*" | ||
1008 | |||
1009 | RDEPENDS:${PN}-mali-csffw-arch108 += "${PN}-mali-csffw-license" | ||
1010 | |||
1011 | # For marvell | ||
1012 | LICENSE:${PN}-pcie8897 = "Firmware-Marvell" | ||
1013 | LICENSE:${PN}-pcie8997 = "Firmware-Marvell" | ||
1014 | LICENSE:${PN}-sd8686 = "Firmware-Marvell" | ||
1015 | LICENSE:${PN}-sd8688 = "Firmware-Marvell" | ||
1016 | LICENSE:${PN}-sd8787 = "Firmware-Marvell" | ||
1017 | LICENSE:${PN}-sd8797 = "Firmware-Marvell" | ||
1018 | LICENSE:${PN}-sd8801 = "Firmware-Marvell" | ||
1019 | LICENSE:${PN}-sd8887 = "Firmware-Marvell" | ||
1020 | LICENSE:${PN}-sd8897 = "Firmware-Marvell" | ||
1021 | LICENSE:${PN}-sd8997 = "Firmware-Marvell" | ||
1022 | LICENSE:${PN}-usb8997 = "Firmware-Marvell" | ||
1023 | LICENSE:${PN}-marvell-license = "Firmware-Marvell" | ||
1024 | |||
1025 | FILES:${PN}-marvell-license = "${nonarch_base_libdir}/firmware/LICENCE.Marvell" | ||
1026 | FILES:${PN}-pcie8897 = " \ | ||
1027 | ${nonarch_base_libdir}/firmware/mrvl/pcie8897_uapsta.bin* \ | ||
1028 | " | ||
1029 | FILES:${PN}-pcie8997 = " \ | ||
1030 | ${nonarch_base_libdir}/firmware/mrvl/pcie8997_wlan_v4.bin* \ | ||
1031 | ${nonarch_base_libdir}/firmware/mrvl/pcieuart8997_combo_v4.bin* \ | ||
1032 | ${nonarch_base_libdir}/firmware/mrvl/pcieusb8997_combo_v4.bin* \ | ||
1033 | " | ||
1034 | FILES:${PN}-sd8686 = " \ | ||
1035 | ${nonarch_base_libdir}/firmware/libertas/sd8686_v9* \ | ||
1036 | ${nonarch_base_libdir}/firmware/sd8686* \ | ||
1037 | " | ||
1038 | FILES:${PN}-sd8688 = " \ | ||
1039 | ${nonarch_base_libdir}/firmware/libertas/sd8688* \ | ||
1040 | ${nonarch_base_libdir}/firmware/mrvl/sd8688* \ | ||
1041 | " | ||
1042 | FILES:${PN}-sd8787 = " \ | ||
1043 | ${nonarch_base_libdir}/firmware/mrvl/sd8787_uapsta.bin* \ | ||
1044 | " | ||
1045 | FILES:${PN}-sd8797 = " \ | ||
1046 | ${nonarch_base_libdir}/firmware/mrvl/sd8797_uapsta.bin* \ | ||
1047 | " | ||
1048 | FILES:${PN}-sd8801 = " \ | ||
1049 | ${nonarch_base_libdir}/firmware/mrvl/sd8801_uapsta.bin* \ | ||
1050 | " | ||
1051 | FILES:${PN}-sd8887 = " \ | ||
1052 | ${nonarch_base_libdir}/firmware/mrvl/sd8887_uapsta.bin* \ | ||
1053 | " | ||
1054 | FILES:${PN}-sd8897 = " \ | ||
1055 | ${nonarch_base_libdir}/firmware/mrvl/sd8897_uapsta.bin* \ | ||
1056 | " | ||
1057 | do_install:append() { | ||
1058 | # The kernel 5.6.x driver still uses the old name, provide a symlink for | ||
1059 | # older kernels | ||
1060 | COMPR=$(echo ${@fw_compr_suffix(d)} | tr -d '-') | ||
1061 | if [ -n "$COMPR" ]; then | ||
1062 | COMPR=".$COMPR" | ||
1063 | fi | ||
1064 | ln -fs sdsd8997_combo_v4.bin$COMPR ${D}${nonarch_base_libdir}/firmware/mrvl/sd8997_uapsta.bin$COMPR | ||
1065 | } | ||
1066 | FILES:${PN}-sd8997 = " \ | ||
1067 | ${nonarch_base_libdir}/firmware/mrvl/sd8997_uapsta.bin* \ | ||
1068 | ${nonarch_base_libdir}/firmware/mrvl/sdsd8997_combo_v4.bin* \ | ||
1069 | " | ||
1070 | FILES:${PN}-usb8997 = " \ | ||
1071 | ${nonarch_base_libdir}/firmware/mrvl/usbusb8997_combo_v4.bin* \ | ||
1072 | " | ||
1073 | |||
1074 | RDEPENDS:${PN}-sd8686 += "${PN}-marvell-license" | ||
1075 | RDEPENDS:${PN}-sd8688 += "${PN}-marvell-license" | ||
1076 | RDEPENDS:${PN}-sd8787 += "${PN}-marvell-license" | ||
1077 | RDEPENDS:${PN}-sd8797 += "${PN}-marvell-license" | ||
1078 | RDEPENDS:${PN}-sd8801 += "${PN}-marvell-license" | ||
1079 | RDEPENDS:${PN}-sd8887 += "${PN}-marvell-license" | ||
1080 | RDEPENDS:${PN}-sd8897 += "${PN}-marvell-license" | ||
1081 | RDEPENDS:${PN}-sd8997 += "${PN}-marvell-license" | ||
1082 | RDEPENDS:${PN}-usb8997 += "${PN}-marvell-license" | ||
1083 | |||
1084 | # For netronome | ||
1085 | LICENSE:${PN}-netronome = "Firmware-netronome" | ||
1086 | |||
1087 | FILES:${PN}-netronome-license = " \ | ||
1088 | ${nonarch_base_libdir}/firmware/LICENCE.Netronome \ | ||
1089 | " | ||
1090 | FILES:${PN}-netronome = " \ | ||
1091 | ${nonarch_base_libdir}/firmware/netronome/nic_AMDA0081*.nffw* \ | ||
1092 | ${nonarch_base_libdir}/firmware/netronome/nic_AMDA0096*.nffw* \ | ||
1093 | ${nonarch_base_libdir}/firmware/netronome/nic_AMDA0097*.nffw* \ | ||
1094 | ${nonarch_base_libdir}/firmware/netronome/nic_AMDA0099*.nffw* \ | ||
1095 | ${nonarch_base_libdir}/firmware/netronome/nic_AMDA0058-0011_2x40.nffw* \ | ||
1096 | ${nonarch_base_libdir}/firmware/netronome/nic_AMDA0058-0012_2x40.nffw* \ | ||
1097 | ${nonarch_base_libdir}/firmware/netronome/nic_AMDA0078-0011_1x100.nffw* \ | ||
1098 | ${nonarch_base_libdir}/firmware/netronome/bpf \ | ||
1099 | ${nonarch_base_libdir}/firmware/netronome/flower \ | ||
1100 | ${nonarch_base_libdir}/firmware/netronome/nic \ | ||
1101 | ${nonarch_base_libdir}/firmware/netronome/nic-sriov \ | ||
1102 | " | ||
1103 | |||
1104 | RDEPENDS:${PN}-netronome += "${PN}-netronome-license" | ||
1105 | |||
1106 | # For NXP | ||
1107 | LICENSE:${PN}-nxp8987-sdio = "Firmware-nxp" | ||
1108 | LICENSE:${PN}-nxp8997-common = "Firmware-nxp" | ||
1109 | LICENSE:${PN}-nxp8997-pcie = "Firmware-nxp" | ||
1110 | LICENSE:${PN}-nxp8997-sdio = "Firmware-nxp" | ||
1111 | LICENSE:${PN}-nxp9098-common = "Firmware-nxp" | ||
1112 | LICENSE:${PN}-nxp9098-pcie = "Firmware-nxp" | ||
1113 | LICENSE:${PN}-nxp9098-sdio = "Firmware-nxp" | ||
1114 | LICENSE:${PN}-nxpiw416-sdio = "Firmware-nxp" | ||
1115 | LICENSE:${PN}-nxpiw612-sdio = "Firmware-nxp" | ||
1116 | LICENSE:${PN}-nxp-license = "Firmware-nxp" | ||
1117 | |||
1118 | FILES:${PN}-nxp8987-sdio = "${nonarch_base_libdir}/firmware/nxp/*8987*" | ||
1119 | FILES:${PN}-nxp8997-common = " \ | ||
1120 | ${nonarch_base_libdir}/firmware/nxp/uartuart8997_bt_v4.bin* \ | ||
1121 | ${nonarch_base_libdir}/firmware/nxp/helper_uart_3000000.bin* \ | ||
1122 | " | ||
1123 | ALLOW_EMPTY:${PN}-nxp8997-pcie = "1" | ||
1124 | ALLOW_EMPTY:${PN}-nxp8997-sdio = "1" | ||
1125 | FILES:${PN}-nxp9098-common = "${nonarch_base_libdir}/firmware/nxp/uartuart9098_bt_v1.bin*" | ||
1126 | ALLOW_EMPTY:${PN}-nxp9098-pcie = "1" | ||
1127 | ALLOW_EMPTY:${PN}-nxp9098-sdio = "1" | ||
1128 | FILES:${PN}-nxpiw416-sdio = "${nonarch_base_libdir}/firmware/nxp/*iw416*" | ||
1129 | FILES:${PN}-nxpiw612-sdio = "${nonarch_base_libdir}/firmware/nxp/uartspi_n61x_v1.bin.se*" | ||
1130 | FILES:${PN}-nxp-license = "${nonarch_base_libdir}/firmware/LICENSE.nxp" | ||
1131 | |||
1132 | RDEPENDS:${PN}-nxp8987-sdio += "${PN}-nxp-license" | ||
1133 | RDEPENDS:${PN}-nxp8997-common += "${PN}-nxp-license" | ||
1134 | RDEPENDS:${PN}-nxp8997-pcie += "${PN}-nxp8997-common" | ||
1135 | RDEPENDS:${PN}-nxp8997-sdio += "${PN}-nxp8997-common" | ||
1136 | RDEPENDS:${PN}-nxp9098-common += "${PN}-nxp-license" | ||
1137 | RDEPENDS:${PN}-nxp9098-pcie += "${PN}-nxp9098-common" | ||
1138 | RDEPENDS:${PN}-nxp9098-sdio += "${PN}-nxp9098-common" | ||
1139 | RDEPENDS:${PN}-nxpiw416-sdio += "${PN}-nxp-license" | ||
1140 | RDEPENDS:${PN}-nxpiw612-sdio += "${PN}-nxp-license" | ||
1141 | |||
1142 | # For nxp-mc | ||
1143 | LICENSE:${PN}-nxp-mc = "Firmware-nxp_mc_firmware" | ||
1144 | LICENSE:${PN}-nxp-mc-license = "Firmware-nxp_mc_firmware" | ||
1145 | |||
1146 | FILES:${PN}-nxp-mc = "${nonarch_base_libdir}/firmware/dpaa2/mc/*" | ||
1147 | FILES:${PN}-nxp-mc-license = " \ | ||
1148 | ${nonarch_base_libdir}/firmware/LICENSE.nxp_mc_firmware \ | ||
1149 | " | ||
1150 | RDEPENDS:${PN}-nxp-mc += "${PN}-nxp-mc-license" | ||
1151 | |||
1152 | # For Nvidia | ||
1153 | LICENSE:${PN}-nvidia-gpu = "Firmware-nvidia" | ||
1154 | LICENSE:${PN}-nvidia-tegra = "Firmware-nvidia" | ||
1155 | LICENSE:${PN}-nvidia-tegra-k1 = "Firmware-nvidia" | ||
1156 | LICENSE:${PN}-nvidia-license = "Firmware-nvidia" | ||
1157 | |||
1158 | FILES:${PN}-nvidia-gpu = "${nonarch_base_libdir}/firmware/nvidia" | ||
1159 | FILES:${PN}-nvidia-tegra = " \ | ||
1160 | ${nonarch_base_libdir}/firmware/nvidia/tegra* \ | ||
1161 | ${nonarch_base_libdir}/firmware/nvidia/gm20b \ | ||
1162 | ${nonarch_base_libdir}/firmware/nvidia/gp10b \ | ||
1163 | " | ||
1164 | FILES:${PN}-nvidia-tegra-k1 = " \ | ||
1165 | ${nonarch_base_libdir}/firmware/nvidia/tegra124 \ | ||
1166 | ${nonarch_base_libdir}/firmware/nvidia/gk20a \ | ||
1167 | " | ||
1168 | FILES:${PN}-nvidia-license = "${nonarch_base_libdir}/firmware/LICENCE.nvidia" | ||
1169 | |||
1170 | RDEPENDS:${PN}-nvidia-gpu += "${PN}-nvidia-license" | ||
1171 | RDEPENDS:${PN}-nvidia-tegra += "${PN}-nvidia-license" | ||
1172 | RDEPENDS:${PN}-nvidia-tegra-k1 += "${PN}-nvidia-license" | ||
1173 | |||
1174 | # For OLPC | ||
1175 | LICENSE:${PN}-olpc = "Firmware-OLPC" | ||
1176 | LICENSE:${PN}-olpc-license = "Firmware-OLPC" | ||
1177 | |||
1178 | FILES:${PN}-olpc = " \ | ||
1179 | ${nonarch_base_libdir}/firmware/libertas/lbtf_sdio.bin* \ | ||
1180 | ${nonarch_base_libdir}/firmware/lbtf_usb.bin* \ | ||
1181 | ${nonarch_base_libdir}/firmware/libertas/usb8388_olpc.bin* \ | ||
1182 | " | ||
1183 | FILES:${PN}-olpc-license = "${nonarch_base_libdir}/firmware/LICENCE.OLPC" | ||
1184 | |||
1185 | RDEPENDS:${PN}-olpc += "${PN}-olpc-license" | ||
1186 | |||
1187 | # For phanfw | ||
1188 | LICENSE:${PN}-phanfw = "Firmware-phanfw" | ||
1189 | LICENSE:${PN}-phanfw-license = "Firmware-phanfw" | ||
1190 | |||
1191 | FILES:${PN}-phanfw = "${nonarch_base_libdir}/firmware/phanfw.bin*" | ||
1192 | FILES:${PN}-phanfw-license = "${nonarch_base_libdir}/firmware/LICENCE.phanfw" | ||
1193 | |||
1194 | RDEPENDS:${PN}-phanfw += "${PN}-phanfw-license" | ||
1195 | |||
1196 | # For PowerVR | ||
1197 | LICENSE:${PN}-powervr = "Firmware-powervr" | ||
1198 | LICENSE:${PN}-powervr-license = "Firmware-powervr" | ||
1199 | |||
1200 | FILES:${PN}-powervr = "${nonarch_base_libdir}/firmware/powervr" | ||
1201 | FILES:${PN}-powervr-license = "${nonarch_base_libdir}/firmware/LICENSE.powervr" | ||
1202 | |||
1203 | RDEPENDS:${PN}-powervr += "${PN}-powervr-license" | ||
1204 | |||
1205 | # For qla2xxx | ||
1206 | LICENSE:${PN}-qla2xxx = "Firmware-qla2xxx" | ||
1207 | LICENSE:${PN}-qla2xxx-license = "Firmware-qla2xxx" | ||
1208 | |||
1209 | FILES:${PN}-qla2xxx = "${nonarch_base_libdir}/firmware/ql2*" | ||
1210 | FILES:${PN}-qla2xxx-license = "${nonarch_base_libdir}/firmware/LICENCE.qla2xxx" | ||
1211 | |||
1212 | RDEPENDS:${PN}-qla2xxx += "${PN}-qla2xxx-license" | ||
1213 | |||
1214 | # For RSI RS911x WiFi | ||
1215 | LICENSE:${PN}-rs9113 = "WHENCE" | ||
1216 | LICENSE:${PN}-rs9116 = "WHENCE" | ||
1217 | |||
1218 | FILES:${PN}-rs9113 = " ${nonarch_base_libdir}/firmware/rsi/rs9113*.rps* " | ||
1219 | FILES:${PN}-rs9116 = " ${nonarch_base_libdir}/firmware/rsi/rs9116*.rps* " | ||
1220 | |||
1221 | RDEPENDS:${PN}-rs9113 += "${PN}-whence-license" | ||
1222 | RDEPENDS:${PN}-rs9116 += "${PN}-whence-license" | ||
1223 | |||
1224 | # For rtl | ||
1225 | LICENSE:${PN}-rtl8188 = "Firmware-rtlwifi_firmware" | ||
1226 | LICENSE:${PN}-rtl8192cu = "Firmware-rtlwifi_firmware" | ||
1227 | LICENSE:${PN}-rtl8192ce = "Firmware-rtlwifi_firmware" | ||
1228 | LICENSE:${PN}-rtl8192su = "Firmware-rtlwifi_firmware" | ||
1229 | LICENSE:${PN}-rtl8723 = "Firmware-rtlwifi_firmware" | ||
1230 | LICENSE:${PN}-rtl8761 = "Firmware-rtlwifi_firmware" | ||
1231 | LICENSE:${PN}-rtl8821 = "Firmware-rtlwifi_firmware" | ||
1232 | LICENSE:${PN}-rtl8822 = "Firmware-rtlwifi_firmware" | ||
1233 | LICENSE:${PN}-rtl-license = "Firmware-rtlwifi_firmware" | ||
1234 | LICENSE:${PN}-rtl-nic = "WHENCE" | ||
1235 | LICENSE:${PN}-rtl8168 = "WHENCE" | ||
1236 | |||
1237 | FILES:${PN}-rtl-license = " \ | ||
1238 | ${nonarch_base_libdir}/firmware/LICENCE.rtlwifi_firmware.txt \ | ||
1239 | " | ||
1240 | FILES:${PN}-rtl8188 = " \ | ||
1241 | ${nonarch_base_libdir}/firmware/rtlwifi/rtl8188*.bin* \ | ||
1242 | " | ||
1243 | FILES:${PN}-rtl8192cu = " \ | ||
1244 | ${nonarch_base_libdir}/firmware/rtlwifi/rtl8192cufw*.bin* \ | ||
1245 | " | ||
1246 | FILES:${PN}-rtl8192ce = " \ | ||
1247 | ${nonarch_base_libdir}/firmware/rtlwifi/rtl8192cfw*.bin* \ | ||
1248 | " | ||
1249 | FILES:${PN}-rtl8192su = " \ | ||
1250 | ${nonarch_base_libdir}/firmware/rtlwifi/rtl8712u.bin* \ | ||
1251 | " | ||
1252 | FILES:${PN}-rtl8723 = " \ | ||
1253 | ${nonarch_base_libdir}/firmware/rtlwifi/rtl8723*.bin* \ | ||
1254 | ${nonarch_base_libdir}/firmware/rtw88/rtw8723*.bin* \ | ||
1255 | ${nonarch_base_libdir}/firmware/rtl_bt/rtl8723*.bin* \ | ||
1256 | " | ||
1257 | FILES:${PN}-rtl8821 = " \ | ||
1258 | ${nonarch_base_libdir}/firmware/rtlwifi/rtl8821*.bin* \ | ||
1259 | ${nonarch_base_libdir}/firmware/rtw88/rtw8821*.bin* \ | ||
1260 | ${nonarch_base_libdir}/firmware/rtl_bt/rtl8821*.bin \ | ||
1261 | " | ||
1262 | FILES:${PN}-rtl8761 = " \ | ||
1263 | ${nonarch_base_libdir}/firmware/rtl_bt/rtl8761*.bin* \ | ||
1264 | " | ||
1265 | FILES:${PN}-rtl8168 = " \ | ||
1266 | ${nonarch_base_libdir}/firmware/rtl_nic/rtl8168*.fw* \ | ||
1267 | " | ||
1268 | FILES:${PN}-rtl8822 = " \ | ||
1269 | ${nonarch_base_libdir}/firmware/rtl_bt/rtl8822*.bin* \ | ||
1270 | ${nonarch_base_libdir}/firmware/rtw88/rtw8822*.bin* \ | ||
1271 | ${nonarch_base_libdir}/firmware/rtlwifi/rtl8822*.bin* \ | ||
1272 | " | ||
1273 | FILES:${PN}-rtl-nic = " \ | ||
1274 | ${nonarch_base_libdir}/firmware/rtl_nic/*.fw* \ | ||
1275 | " | ||
1276 | |||
1277 | RDEPENDS:${PN}-rtl8188 += "${PN}-rtl-license" | ||
1278 | RDEPENDS:${PN}-rtl8192ce += "${PN}-rtl-license" | ||
1279 | RDEPENDS:${PN}-rtl8192cu += "${PN}-rtl-license" | ||
1280 | RDEPENDS:${PN}-rtl8192su = "${PN}-rtl-license" | ||
1281 | RDEPENDS:${PN}-rtl8723 += "${PN}-rtl-license" | ||
1282 | RDEPENDS:${PN}-rtl8821 += "${PN}-rtl-license" | ||
1283 | RDEPENDS:${PN}-rtl8761 += "${PN}-rtl-license" | ||
1284 | RDEPENDS:${PN}-rtl8822 += "${PN}-rtl-license" | ||
1285 | RDEPENDS:${PN}-rtl8168 += "${PN}-whence-license" | ||
1286 | RDEPENDS:${PN}-rtl-nic += "${PN}-whence-license" | ||
1287 | |||
1288 | # For Silabs | ||
1289 | LICENSE:${PN}-wfx = "Firmware-wfx" | ||
1290 | LICENSE:${PN}-wfx-license = "Firmware-wfx" | ||
1291 | |||
1292 | FILES:${PN}-wfx = " \ | ||
1293 | ${nonarch_base_libdir}/firmware/wfx/*.pds* \ | ||
1294 | ${nonarch_base_libdir}/firmware/wfx/*.sec* \ | ||
1295 | " | ||
1296 | FILES:${PN}-wfx-license = "${nonarch_base_libdir}/firmware/wfx/LICENCE.wf200" | ||
1297 | |||
1298 | RDEPENDS:${PN}-wfx += "${PN}-wfx-license" | ||
1299 | |||
1300 | # For TI wl1251 | ||
1301 | LICENSE:${PN}-wl1251 = "Firmware-wl1251" | ||
1302 | LICENSE:${PN}-wl1251-license = "Firmware-wl1251" | ||
1303 | |||
1304 | FILES:${PN}-wl1251 = " \ | ||
1305 | ${nonarch_base_libdir}/firmware/ti-connectivity/wl1251-fw.bin* \ | ||
1306 | ${nonarch_base_libdir}/firmware/ti-connectivity/wl1251-nvs.bin* \ | ||
1307 | " | ||
1308 | FILES:${PN}-wl1251-license = "${nonarch_base_libdir}/firmware/LICENCE.wl1251" | ||
1309 | |||
1310 | RDEPENDS:${PN}-wl1251 += "${PN}-wl1251-license" | ||
1311 | |||
1312 | # For ti-connectivity | ||
1313 | LICENSE:${PN}-wlcommon = "Firmware-ti-connectivity" | ||
1314 | LICENSE:${PN}-wl12xx = "Firmware-ti-connectivity" | ||
1315 | LICENSE:${PN}-wl18xx = "Firmware-ti-connectivity" | ||
1316 | LICENSE:${PN}-cc33xx = "Firmware-ti-connectivity" | ||
1317 | LICENSE:${PN}-ti-connectivity-license = "Firmware-ti-connectivity" | ||
1318 | |||
1319 | FILES:${PN}-ti-connectivity-license = "${nonarch_base_libdir}/firmware/LICENCE.ti-connectivity" | ||
1320 | # wl18xx optionally needs wl1271-nvs.bin (which itself is a symlink to | ||
1321 | # wl127x-nvs.bin) - see linux/drivers/net/wireless/ti/wlcore/sdio.c | ||
1322 | # and drivers/net/wireless/ti/wlcore/spi.c. | ||
1323 | # While they're optional and actually only used to override the MAC | ||
1324 | # address on wl18xx, driver loading will delay (by udev timout - 60s) | ||
1325 | # if not there. So let's make it available always. Because it's a | ||
1326 | # symlink, both need to go to wlcommon. | ||
1327 | FILES:${PN}-wlcommon = " \ | ||
1328 | ${nonarch_base_libdir}/firmware/ti-connectivity/TI* \ | ||
1329 | ${nonarch_base_libdir}/firmware/ti-connectivity/wl127x-nvs.bin* \ | ||
1330 | ${nonarch_base_libdir}/firmware/ti-connectivity/wl1271-nvs.bin* \ | ||
1331 | " | ||
1332 | FILES:${PN}-wl12xx = " \ | ||
1333 | ${nonarch_base_libdir}/firmware/ti-connectivity/wl12* \ | ||
1334 | " | ||
1335 | FILES:${PN}-wl18xx = " \ | ||
1336 | ${nonarch_base_libdir}/firmware/ti-connectivity/wl18* \ | ||
1337 | " | ||
1338 | |||
1339 | FILES:${PN}-cc33xx = " \ | ||
1340 | ${nonarch_base_libdir}/firmware/ti-connectivity/cc33* \ | ||
1341 | " | ||
1342 | |||
1343 | RDEPENDS:${PN}-wl12xx = "${PN}-ti-connectivity-license ${PN}-wlcommon" | ||
1344 | RDEPENDS:${PN}-wl18xx = "${PN}-ti-connectivity-license ${PN}-wlcommon" | ||
1345 | RDEPENDS:${PN}-cc33xx = "${PN}-ti-connectivity-license" | ||
1346 | |||
1347 | # For ti-keystone | ||
1348 | LICENSE:${PN}-ti-keystone = "Firmware-ti-keystone" | ||
1349 | LICENSE:${PN}-ti-keystone-license = "Firmware-ti-keystone" | ||
1350 | |||
1351 | FILES:${PN}-ti-keystone = "${nonarch_base_libdir}/firmware/ti-keystone/*" | ||
1352 | FILES:${PN}-ti-keystone-license = " \ | ||
1353 | ${nonarch_base_libdir}/firmware/LICENCE.ti-keystone \ | ||
1354 | " | ||
1355 | RDEPENDS:${PN}-ti-keystone += "${PN}-ti-keystone-license" | ||
1356 | |||
1357 | # For vt6656 | ||
1358 | LICENSE:${PN}-vt6656 = "Firmware-via_vt6656" | ||
1359 | LICENSE:${PN}-vt6656-license = "Firmware-via_vt6656" | ||
1360 | |||
1361 | FILES:${PN}-vt6656-license = "${nonarch_base_libdir}/firmware/LICENCE.via_vt6656" | ||
1362 | FILES:${PN}-vt6656 = " \ | ||
1363 | ${nonarch_base_libdir}/firmware/vntwusb.fw* \ | ||
1364 | " | ||
1365 | |||
1366 | RDEPENDS:${PN}-vt6656 = "${PN}-vt6656-license" | ||
1367 | |||
1368 | # For xc4000 | ||
1369 | LICENSE:${PN}-xc4000 = "Firmware-xc4000" | ||
1370 | LICENSE:${PN}-xc4000-license = "Firmware-xc4000" | ||
1371 | |||
1372 | FILES:${PN}-xc4000 = "${nonarch_base_libdir}/firmware/dvb-fe-xc4000-1.4.1.fw*" | ||
1373 | FILES:${PN}-xc4000-license = "${nonarch_base_libdir}/firmware/LICENCE.xc4000" | ||
1374 | |||
1375 | RDEPENDS:${PN}-xc4000 += "${PN}-xc4000-license" | ||
1376 | |||
1377 | # For xc5000 | ||
1378 | LICENSE:${PN}-xc5000 = "Firmware-xc5000" | ||
1379 | LICENSE:${PN}-xc5000-license = "Firmware-xc5000" | ||
1380 | |||
1381 | FILES:${PN}-xc5000 = "${nonarch_base_libdir}/firmware/dvb-fe-xc5000-1.6.114.fw*" | ||
1382 | FILES:${PN}-xc5000-license = "${nonarch_base_libdir}/firmware/LICENCE.xc5000" | ||
1383 | |||
1384 | RDEPENDS:${PN}-xc5000 += "${PN}-xc5000-license" | ||
1385 | |||
1386 | # For xc5000c | ||
1387 | LICENSE:${PN}-xc5000c = "Firmware-xc5000c" | ||
1388 | LICENSE:${PN}-xc5000c-license = "Firmware-xc5000c" | ||
1389 | |||
1390 | FILES:${PN}-xc5000c = " \ | ||
1391 | ${nonarch_base_libdir}/firmware/dvb-fe-xc5000c-4.1.30.7.fw* \ | ||
1392 | " | ||
1393 | FILES:${PN}-xc5000c-license = "${nonarch_base_libdir}/firmware/LICENCE.xc5000c" | ||
1394 | |||
1395 | RDEPENDS:${PN}-xc5000c += "${PN}-xc5000c-license" | ||
1396 | |||
1397 | # For broadcom | ||
1398 | |||
1399 | # for i in `grep brcm WHENCE | grep ^File | sed 's/File: brcm.//g'`; do pkg=`echo $i | sed 's/-[sp40].*//g; s/\.bin//g; s/brcmfmac/bcm/g; s/_hdr/-hdr/g; s/BCM/bcm-0bb4-0306/g'`; echo -e " \${PN}-$pkg \\"; done | sort -u | ||
1400 | |||
1401 | LICENSE:${PN}-broadcom-license = "Firmware-broadcom_bcm43xx" | ||
1402 | FILES:${PN}-broadcom-license = "${nonarch_base_libdir}/firmware/LICENCE.broadcom_bcm43xx" | ||
1403 | |||
1404 | # for i in `grep brcm WHENCE | grep ^File | sed 's/File: brcm.//g'`; do pkg=`echo $i | sed 's/-[sp40].*//g; s/\.bin//g; s/brcmfmac/bcm/g; s/_hdr/-hdr/g; s/BCM/bcm-0bb4-0306/g'`; echo "$i - $pkg"; echo -e "FILES:\${PN}-$pkg = \"\${nonarch_base_libdir}/firmware/brcm/$i\""; done | grep ^FILES | ||
1405 | |||
1406 | FILES:${PN}-bcm43xx = "${nonarch_base_libdir}/firmware/brcm/bcm43xx-0.fw*" | ||
1407 | FILES:${PN}-bcm43xx-hdr = "${nonarch_base_libdir}/firmware/brcm/bcm43xx_hdr-0.fw*" | ||
1408 | FILES:${PN}-bcm4329-fullmac = "${nonarch_base_libdir}/firmware/brcm/bcm4329-fullmac-4.bin*" | ||
1409 | FILES:${PN}-bcm43236b = "${nonarch_base_libdir}/firmware/brcm/brcmfmac43236b.bin*" | ||
1410 | FILES:${PN}-bcm4329 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac4329-sdio.bin*" | ||
1411 | FILES:${PN}-bcm4330 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac4330-sdio.*" | ||
1412 | FILES:${PN}-bcm4334 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac4334-sdio.bin*" | ||
1413 | FILES:${PN}-bcm4335 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac4335-sdio.bin*" | ||
1414 | FILES:${PN}-bcm4339 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac4339-sdio.bin* \ | ||
1415 | ${nonarch_base_libdir}/firmware/cypress/cyfmac4339-sdio.bin* \ | ||
1416 | " | ||
1417 | FILES:${PN}-bcm43241b0 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac43241b0-sdio.bin*" | ||
1418 | FILES:${PN}-bcm43241b4 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac43241b4-sdio.bin*" | ||
1419 | FILES:${PN}-bcm43241b5 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac43241b5-sdio.bin*" | ||
1420 | FILES:${PN}-bcm43242a = "${nonarch_base_libdir}/firmware/brcm/brcmfmac43242a.bin*" | ||
1421 | FILES:${PN}-bcm43143 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac43143.bin* \ | ||
1422 | ${nonarch_base_libdir}/firmware/brcm/brcmfmac43143-sdio.bin* \ | ||
1423 | " | ||
1424 | FILES:${PN}-bcm43430a0 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac43430a0-sdio.*" | ||
1425 | FILES:${PN}-bcm43455 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac43455-sdio.* \ | ||
1426 | ${nonarch_base_libdir}/firmware/cypress/cyfmac43455-sdio.* \ | ||
1427 | " | ||
1428 | FILES:${PN}-bcm4350c2 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac4350c2-pcie.bin*" | ||
1429 | FILES:${PN}-bcm4350 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac4350-pcie.bin*" | ||
1430 | FILES:${PN}-bcm4356 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac4356-sdio.* \ | ||
1431 | ${nonarch_base_libdir}/firmware/cypress/cyfmac4356-sdio.* \ | ||
1432 | " | ||
1433 | FILES:${PN}-bcm43569 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac43569.bin*" | ||
1434 | FILES:${PN}-bcm43570 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac43570-pcie.bin* \ | ||
1435 | ${nonarch_base_libdir}/firmware/cypress/cyfmac43570-pcie.bin* \ | ||
1436 | " | ||
1437 | FILES:${PN}-bcm4358 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac4358-pcie.bin*" | ||
1438 | FILES:${PN}-bcm43602 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac43602-pcie.bin* \ | ||
1439 | ${nonarch_base_libdir}/firmware/brcm/brcmfmac43602-pcie.ap.bin* \ | ||
1440 | " | ||
1441 | FILES:${PN}-bcm4366b = "${nonarch_base_libdir}/firmware/brcm/brcmfmac4366b-pcie.bin*" | ||
1442 | FILES:${PN}-bcm4366c = "${nonarch_base_libdir}/firmware/brcm/brcmfmac4366c-pcie.bin*" | ||
1443 | FILES:${PN}-bcm4371 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac4371-pcie.bin*" | ||
1444 | |||
1445 | # for i in `grep brcm WHENCE | grep ^File | sed 's/File: brcm.//g'`; do pkg=`echo $i | sed 's/-[sp40].*//g; s/\.bin//g; s/brcmfmac/bcm/g; s/_hdr/-hdr/g; s/BCM/bcm-0bb4-0306/g'`; echo -e "LICENSE:\${PN}-$pkg = \"Firmware-broadcom_bcm43xx\"\nRDEPENDS_\${PN}-$pkg += \"\${PN}-broadcom-license\""; done | ||
1446 | # Currently 1st one and last 6 have cypress LICENSE | ||
1447 | |||
1448 | LICENSE:${PN}-bcm43xx = "Firmware-broadcom_bcm43xx" | ||
1449 | RDEPENDS:${PN}-bcm43xx += "${PN}-broadcom-license" | ||
1450 | LICENSE:${PN}-bcm43xx-hdr = "Firmware-broadcom_bcm43xx" | ||
1451 | RDEPENDS:${PN}-bcm43xx-hdr += "${PN}-broadcom-license" | ||
1452 | LICENSE:${PN}-bcm4329-fullmac = "Firmware-broadcom_bcm43xx" | ||
1453 | RDEPENDS:${PN}-bcm4329-fullmac += "${PN}-broadcom-license" | ||
1454 | LICENSE:${PN}-bcm43236b = "Firmware-broadcom_bcm43xx" | ||
1455 | RDEPENDS:${PN}-bcm43236b += "${PN}-broadcom-license" | ||
1456 | LICENSE:${PN}-bcm4329 = "Firmware-broadcom_bcm43xx" | ||
1457 | RDEPENDS:${PN}-bcm4329 += "${PN}-broadcom-license" | ||
1458 | LICENSE:${PN}-bcm4330 = "Firmware-broadcom_bcm43xx" | ||
1459 | RDEPENDS:${PN}-bcm4330 += "${PN}-broadcom-license" | ||
1460 | LICENSE:${PN}-bcm4334 = "Firmware-broadcom_bcm43xx" | ||
1461 | RDEPENDS:${PN}-bcm4334 += "${PN}-broadcom-license" | ||
1462 | LICENSE:${PN}-bcm4335 = "Firmware-broadcom_bcm43xx" | ||
1463 | RDEPENDS:${PN}-bcm4335 += "${PN}-broadcom-license" | ||
1464 | LICENSE:${PN}-bcm4339 = "Firmware-broadcom_bcm43xx" | ||
1465 | RDEPENDS:${PN}-bcm4339 += "${PN}-broadcom-license" | ||
1466 | LICENSE:${PN}-bcm43241b0 = "Firmware-broadcom_bcm43xx" | ||
1467 | RDEPENDS:${PN}-bcm43241b0 += "${PN}-broadcom-license" | ||
1468 | LICENSE:${PN}-bcm43241b4 = "Firmware-broadcom_bcm43xx" | ||
1469 | RDEPENDS:${PN}-bcm43241b4 += "${PN}-broadcom-license" | ||
1470 | LICENSE:${PN}-bcm43241b5 = "Firmware-broadcom_bcm43xx" | ||
1471 | RDEPENDS:${PN}-bcm43241b5 += "${PN}-broadcom-license" | ||
1472 | LICENSE:${PN}-bcm43242a = "Firmware-broadcom_bcm43xx" | ||
1473 | RDEPENDS:${PN}-bcm43242a += "${PN}-broadcom-license" | ||
1474 | LICENSE:${PN}-bcm43143 = "Firmware-broadcom_bcm43xx" | ||
1475 | RDEPENDS:${PN}-bcm43143 += "${PN}-broadcom-license" | ||
1476 | LICENSE:${PN}-bcm43430a0 = "Firmware-broadcom_bcm43xx" | ||
1477 | RDEPENDS:${PN}-bcm43430a0 += "${PN}-broadcom-license" | ||
1478 | LICENSE:${PN}-bcm43455 = "Firmware-broadcom_bcm43xx" | ||
1479 | RDEPENDS:${PN}-bcm43455 += "${PN}-broadcom-license" | ||
1480 | LICENSE:${PN}-bcm4350c2 = "Firmware-broadcom_bcm43xx" | ||
1481 | RDEPENDS:${PN}-bcm4350c2 += "${PN}-broadcom-license" | ||
1482 | LICENSE:${PN}-bcm4350 = "Firmware-broadcom_bcm43xx" | ||
1483 | RDEPENDS:${PN}-bcm4350 += "${PN}-broadcom-license" | ||
1484 | LICENSE:${PN}-bcm4356 = "Firmware-broadcom_bcm43xx" | ||
1485 | RDEPENDS:${PN}-bcm4356 += "${PN}-broadcom-license" | ||
1486 | LICENSE:${PN}-bcm43569 = "Firmware-broadcom_bcm43xx" | ||
1487 | RDEPENDS:${PN}-bcm43569 += "${PN}-broadcom-license" | ||
1488 | LICENSE:${PN}-bcm43570 = "Firmware-broadcom_bcm43xx" | ||
1489 | RDEPENDS:${PN}-bcm43570 += "${PN}-broadcom-license" | ||
1490 | LICENSE:${PN}-bcm4358 = "Firmware-broadcom_bcm43xx" | ||
1491 | RDEPENDS:${PN}-bcm4358 += "${PN}-broadcom-license" | ||
1492 | LICENSE:${PN}-bcm43602 = "Firmware-broadcom_bcm43xx" | ||
1493 | RDEPENDS:${PN}-bcm43602 += "${PN}-broadcom-license" | ||
1494 | LICENSE:${PN}-bcm4366b = "Firmware-broadcom_bcm43xx" | ||
1495 | RDEPENDS:${PN}-bcm4366b += "${PN}-broadcom-license" | ||
1496 | LICENSE:${PN}-bcm4366c = "Firmware-broadcom_bcm43xx" | ||
1497 | RDEPENDS:${PN}-bcm4366c += "${PN}-broadcom-license" | ||
1498 | LICENSE:${PN}-bcm4371 = "Firmware-broadcom_bcm43xx" | ||
1499 | RDEPENDS:${PN}-bcm4371 += "${PN}-broadcom-license" | ||
1500 | |||
1501 | # For broadcom cypress | ||
1502 | |||
1503 | LICENSE:${PN}-cypress-license = "Firmware-cypress" | ||
1504 | FILES:${PN}-cypress-license = "${nonarch_base_libdir}/firmware/LICENCE.cypress" | ||
1505 | |||
1506 | FILES:${PN}-bcm-0bb4-0306 = "${nonarch_base_libdir}/firmware/brcm/BCM-0bb4-0306.hcd*" | ||
1507 | FILES:${PN}-bcm43340 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac43340-sdio.* \ | ||
1508 | ${nonarch_base_libdir}/firmware/cypress/cyfmac43340-sdio.*" | ||
1509 | FILES:${PN}-bcm43362 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac43362-sdio.* \ | ||
1510 | ${nonarch_base_libdir}/firmware/cypress/cyfmac43362-sdio.*" | ||
1511 | FILES:${PN}-bcm43430 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac43430-sdio.* \ | ||
1512 | ${nonarch_base_libdir}/firmware/cypress/cyfmac43430-sdio.*" | ||
1513 | FILES:${PN}-bcm4354 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac4354-sdio.bin* \ | ||
1514 | ${nonarch_base_libdir}/firmware/cypress/cyfmac4354-sdio.bin* \ | ||
1515 | " | ||
1516 | FILES:${PN}-bcm4356-pcie = "${nonarch_base_libdir}/firmware/brcm/brcmfmac4356-pcie.* \ | ||
1517 | ${nonarch_base_libdir}/firmware/cypress/cyfmac4356-pcie.* \ | ||
1518 | " | ||
1519 | FILES:${PN}-bcm4373 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac4373-sdio.bin* \ | ||
1520 | ${nonarch_base_libdir}/firmware/brcm/brcmfmac4373.bin* \ | ||
1521 | ${nonarch_base_libdir}/firmware/cypress/cyfmac4373-sdio.bin* \ | ||
1522 | ${nonarch_base_libdir}/firmware/brcm/brcmfmac4373-sdio.clm_blob* \ | ||
1523 | ${nonarch_base_libdir}/firmware/cypress/cyfmac4373-sdio.clm_blob* \ | ||
1524 | " | ||
1525 | |||
1526 | LICENSE:${PN}-bcm-0bb4-0306 = "Firmware-cypress" | ||
1527 | RDEPENDS:${PN}-bcm-0bb4-0306 += "${PN}-cypress-license" | ||
1528 | LICENSE:${PN}-bcm43340 = "Firmware-cypress" | ||
1529 | RDEPENDS:${PN}-bcm43340 += "${PN}-cypress-license" | ||
1530 | LICENSE:${PN}-bcm43362 = "Firmware-cypress" | ||
1531 | RDEPENDS:${PN}-bcm43362 += "${PN}-cypress-license" | ||
1532 | LICENSE:${PN}-bcm43430 = "Firmware-cypress" | ||
1533 | RDEPENDS:${PN}-bcm43430 += "${PN}-cypress-license" | ||
1534 | LICENSE:${PN}-bcm4354 = "Firmware-cypress" | ||
1535 | RDEPENDS:${PN}-bcm4354 += "${PN}-cypress-license" | ||
1536 | LICENSE:${PN}-bcm4356-pcie = "Firmware-cypress" | ||
1537 | RDEPENDS:${PN}-bcm4356-pcie += "${PN}-cypress-license" | ||
1538 | LICENSE:${PN}-bcm4373 = "Firmware-cypress" | ||
1539 | RDEPENDS:${PN}-bcm4373 += "${PN}-cypress-license" | ||
1540 | |||
1541 | # For Broadcom bnx2 | ||
1542 | # | ||
1543 | # which is a separate case to the other Broadcom firmwares since its | ||
1544 | # license is contained in the shared WHENCE file. | ||
1545 | |||
1546 | LICENSE:${PN}-bnx2 = "WHENCE" | ||
1547 | LICENSE:${PN}-whence-license = "WHENCE" | ||
1548 | |||
1549 | FILES:${PN}-bnx2 = " \ | ||
1550 | ${nonarch_base_libdir}/firmware/bnx2/bnx2-mips*.fw* \ | ||
1551 | ${nonarch_base_libdir}/firmware/bnx2/bnx2-rv2p*.fw* \ | ||
1552 | " | ||
1553 | FILES:${PN}-whence-license = "${nonarch_base_libdir}/firmware/WHENCE" | ||
1554 | |||
1555 | RDEPENDS:${PN}-bnx2 += "${PN}-whence-license" | ||
1556 | RPROVIDES:${PN}-bnx2 = "${PN}-bnx2-mips" | ||
1557 | |||
1558 | LICENSE:${PN}-bnx2x = "WHENCE" | ||
1559 | |||
1560 | FILES:${PN}-bnx2x = "${nonarch_base_libdir}/firmware/bnx2x/bnx2x*.fw*" | ||
1561 | |||
1562 | RDEPENDS:${PN}-bnx2x += "${PN}-whence-license" | ||
1563 | |||
1564 | # For cirrus | ||
1565 | LICENSE:${PN}-cirrus = "Firmware-cirrus" | ||
1566 | LICENSE:${PN}-cirrus-license = "Firmware-cirrus" | ||
1567 | |||
1568 | FILES:${PN}-cirrus = "${nonarch_base_libdir}/firmware/cirrus/*" | ||
1569 | FILES:${PN}-cirrus-license = "${nonarch_base_libdir}/firmware/LICENSE.cirrus" | ||
1570 | |||
1571 | RDEPENDS:${PN}-cirrus += "${PN}-cirrus-license" | ||
1572 | |||
1573 | # For cnm | ||
1574 | LICENSE:${PN}-cnm = "Firmware-cnm" | ||
1575 | LICENSE:${PN}-cnm-license = "Firmware-cnm" | ||
1576 | |||
1577 | FILES:${PN}-cnm = "${nonarch_base_libdir}/firmware/cnm/wave521c_k3_codec_fw.bin*" | ||
1578 | FILES:${PN}-cnm-license = "${nonarch_base_libdir}/firmware/LICENCE.cnm" | ||
1579 | |||
1580 | RDEPENDS:${PN}-cnm += "${PN}-cnm-license" | ||
1581 | |||
1582 | # For imx-sdma | ||
1583 | LICENSE:${PN}-imx-sdma-imx6q = "Firmware-imx-sdma_firmware" | ||
1584 | LICENSE:${PN}-imx-sdma-imx7d = "Firmware-imx-sdma_firmware" | ||
1585 | LICENSE:${PN}-imx-sdma-license = "Firmware-imx-sdma_firmware" | ||
1586 | |||
1587 | FILES:${PN}-imx-sdma-imx6q = "${nonarch_base_libdir}/firmware/imx/sdma/sdma-imx6q.bin*" | ||
1588 | |||
1589 | RPROVIDES:${PN}-imx-sdma-imx6q = "firmware-imx-sdma-imx6q" | ||
1590 | RREPLACES:${PN}-imx-sdma-imx6q = "firmware-imx-sdma-imx6q" | ||
1591 | RCONFLICTS:${PN}-imx-sdma-imx6q = "firmware-imx-sdma-imx6q" | ||
1592 | |||
1593 | FILES:${PN}-imx-sdma-imx7d = "${nonarch_base_libdir}/firmware/imx/sdma/sdma-imx7d.bin*" | ||
1594 | |||
1595 | FILES:${PN}-imx-sdma-license = "${nonarch_base_libdir}/firmware/LICENSE.sdma_firmware" | ||
1596 | |||
1597 | RDEPENDS:${PN}-imx-sdma-imx6q += "${PN}-imx-sdma-license" | ||
1598 | RDEPENDS:${PN}-imx-sdma-imx7d += "${PN}-imx-sdma-license" | ||
1599 | |||
1600 | # For iwlwifi | ||
1601 | LICENSE:${PN}-iwlwifi = "Firmware-iwlwifi_firmware" | ||
1602 | LICENSE:${PN}-iwlwifi-135-6 = "Firmware-iwlwifi_firmware" | ||
1603 | LICENSE:${PN}-iwlwifi-3160-7 = "Firmware-iwlwifi_firmware" | ||
1604 | LICENSE:${PN}-iwlwifi-3160-8 = "Firmware-iwlwifi_firmware" | ||
1605 | LICENSE:${PN}-iwlwifi-3160-9 = "Firmware-iwlwifi_firmware" | ||
1606 | LICENSE:${PN}-iwlwifi-3160-10 = "Firmware-iwlwifi_firmware" | ||
1607 | LICENSE:${PN}-iwlwifi-3160-12 = "Firmware-iwlwifi_firmware" | ||
1608 | LICENSE:${PN}-iwlwifi-3160-13 = "Firmware-iwlwifi_firmware" | ||
1609 | LICENSE:${PN}-iwlwifi-3160-16 = "Firmware-iwlwifi_firmware" | ||
1610 | LICENSE:${PN}-iwlwifi-3160-17 = "Firmware-iwlwifi_firmware" | ||
1611 | LICENSE:${PN}-iwlwifi-6000-4 = "Firmware-iwlwifi_firmware" | ||
1612 | LICENSE:${PN}-iwlwifi-6000g2a-5 = "Firmware-iwlwifi_firmware" | ||
1613 | LICENSE:${PN}-iwlwifi-6000g2a-6 = "Firmware-iwlwifi_firmware" | ||
1614 | LICENSE:${PN}-iwlwifi-6000g2b-5 = "Firmware-iwlwifi_firmware" | ||
1615 | LICENSE:${PN}-iwlwifi-6000g2b-6 = "Firmware-iwlwifi_firmware" | ||
1616 | LICENSE:${PN}-iwlwifi-6050-4 = "Firmware-iwlwifi_firmware" | ||
1617 | LICENSE:${PN}-iwlwifi-6050-5 = "Firmware-iwlwifi_firmware" | ||
1618 | LICENSE:${PN}-iwlwifi-7260 = "Firmware-iwlwifi_firmware" | ||
1619 | LICENSE:${PN}-iwlwifi-7265 = "Firmware-iwlwifi_firmware" | ||
1620 | LICENSE:${PN}-iwlwifi-7265d = "Firmware-iwlwifi_firmware" | ||
1621 | LICENSE:${PN}-iwlwifi-8000c = "Firmware-iwlwifi_firmware" | ||
1622 | LICENSE:${PN}-iwlwifi-8265 = "Firmware-iwlwifi_firmware" | ||
1623 | LICENSE:${PN}-iwlwifi-9000 = "Firmware-iwlwifi_firmware" | ||
1624 | LICENSE:${PN}-iwlwifi-9260 = "Firmware-iwlwifi_firmware" | ||
1625 | LICENSE:${PN}-iwlwifi-misc = "Firmware-iwlwifi_firmware" | ||
1626 | LICENSE:${PN}-iwlwifi-license = "Firmware-iwlwifi_firmware" | ||
1627 | |||
1628 | FILES:${PN}-iwlwifi-license = "${nonarch_base_libdir}/firmware/LICENCE.iwlwifi_firmware" | ||
1629 | FILES:${PN}-iwlwifi-135-6 = "${nonarch_base_libdir}/firmware/iwlwifi-135-6.ucode*" | ||
1630 | FILES:${PN}-iwlwifi-3160-7 = "${nonarch_base_libdir}/firmware/iwlwifi-3160-7.ucode*" | ||
1631 | FILES:${PN}-iwlwifi-3160-8 = "${nonarch_base_libdir}/firmware/iwlwifi-3160-8.ucode*" | ||
1632 | FILES:${PN}-iwlwifi-3160-9 = "${nonarch_base_libdir}/firmware/iwlwifi-3160-9.ucode*" | ||
1633 | FILES:${PN}-iwlwifi-3160-10 = "${nonarch_base_libdir}/firmware/iwlwifi-3160-10.ucode*" | ||
1634 | FILES:${PN}-iwlwifi-3160-12 = "${nonarch_base_libdir}/firmware/iwlwifi-3160-12.ucode*" | ||
1635 | FILES:${PN}-iwlwifi-3160-13 = "${nonarch_base_libdir}/firmware/iwlwifi-3160-13.ucode*" | ||
1636 | FILES:${PN}-iwlwifi-3160-16 = "${nonarch_base_libdir}/firmware/iwlwifi-3160-16.ucode*" | ||
1637 | FILES:${PN}-iwlwifi-3160-17 = "${nonarch_base_libdir}/firmware/iwlwifi-3160-17.ucode*" | ||
1638 | FILES:${PN}-iwlwifi-6000-4 = "${nonarch_base_libdir}/firmware/iwlwifi-6000-4.ucode*" | ||
1639 | FILES:${PN}-iwlwifi-6000g2a-5 = "${nonarch_base_libdir}/firmware/iwlwifi-6000g2a-5.ucode*" | ||
1640 | FILES:${PN}-iwlwifi-6000g2a-6 = "${nonarch_base_libdir}/firmware/iwlwifi-6000g2a-6.ucode*" | ||
1641 | FILES:${PN}-iwlwifi-6000g2b-5 = "${nonarch_base_libdir}/firmware/iwlwifi-6000g2b-5.ucode*" | ||
1642 | FILES:${PN}-iwlwifi-6000g2b-6 = "${nonarch_base_libdir}/firmware/iwlwifi-6000g2b-6.ucode*" | ||
1643 | FILES:${PN}-iwlwifi-6050-4 = "${nonarch_base_libdir}/firmware/iwlwifi-6050-4.ucode*" | ||
1644 | FILES:${PN}-iwlwifi-6050-5 = "${nonarch_base_libdir}/firmware/iwlwifi-6050-5.ucode*" | ||
1645 | FILES:${PN}-iwlwifi-7260 = "${nonarch_base_libdir}/firmware/iwlwifi-7260-*.ucode*" | ||
1646 | FILES:${PN}-iwlwifi-7265 = "${nonarch_base_libdir}/firmware/iwlwifi-7265-*.ucode*" | ||
1647 | FILES:${PN}-iwlwifi-7265d = "${nonarch_base_libdir}/firmware/iwlwifi-7265D-*.ucode*" | ||
1648 | FILES:${PN}-iwlwifi-8000c = "${nonarch_base_libdir}/firmware/iwlwifi-8000C-*.ucode*" | ||
1649 | FILES:${PN}-iwlwifi-8265 = "${nonarch_base_libdir}/firmware/iwlwifi-8265-*.ucode*" | ||
1650 | FILES:${PN}-iwlwifi-9000 = "${nonarch_base_libdir}/firmware/iwlwifi-9000-*.ucode*" | ||
1651 | FILES:${PN}-iwlwifi-9260 = "${nonarch_base_libdir}/firmware/iwlwifi-9260-*.ucode*" | ||
1652 | FILES:${PN}-iwlwifi-misc = " \ | ||
1653 | ${nonarch_base_libdir}/firmware/iwlwifi-*.ucode* \ | ||
1654 | ${nonarch_base_libdir}/firmware/iwlwifi-*.pnvm* \ | ||
1655 | " | ||
1656 | |||
1657 | RDEPENDS:${PN}-iwlwifi-135-6 = "${PN}-iwlwifi-license" | ||
1658 | RDEPENDS:${PN}-iwlwifi-3160-7 = "${PN}-iwlwifi-license" | ||
1659 | RDEPENDS:${PN}-iwlwifi-3160-8 = "${PN}-iwlwifi-license" | ||
1660 | RDEPENDS:${PN}-iwlwifi-3160-9 = "${PN}-iwlwifi-license" | ||
1661 | RDEPENDS:${PN}-iwlwifi-3160-10 = "${PN}-iwlwifi-license" | ||
1662 | RDEPENDS:${PN}-iwlwifi-3160-12 = "${PN}-iwlwifi-license" | ||
1663 | RDEPENDS:${PN}-iwlwifi-3160-13 = "${PN}-iwlwifi-license" | ||
1664 | RDEPENDS:${PN}-iwlwifi-3160-16 = "${PN}-iwlwifi-license" | ||
1665 | RDEPENDS:${PN}-iwlwifi-3160-17 = "${PN}-iwlwifi-license" | ||
1666 | RDEPENDS:${PN}-iwlwifi-6000-4 = "${PN}-iwlwifi-license" | ||
1667 | RDEPENDS:${PN}-iwlwifi-6000g2a-5 = "${PN}-iwlwifi-license" | ||
1668 | RDEPENDS:${PN}-iwlwifi-6000g2a-6 = "${PN}-iwlwifi-license" | ||
1669 | RDEPENDS:${PN}-iwlwifi-6000g2b-5 = "${PN}-iwlwifi-license" | ||
1670 | RDEPENDS:${PN}-iwlwifi-6000g2b-6 = "${PN}-iwlwifi-license" | ||
1671 | RDEPENDS:${PN}-iwlwifi-6050-4 = "${PN}-iwlwifi-license" | ||
1672 | RDEPENDS:${PN}-iwlwifi-6050-5 = "${PN}-iwlwifi-license" | ||
1673 | RDEPENDS:${PN}-iwlwifi-7260 = "${PN}-iwlwifi-license" | ||
1674 | RDEPENDS:${PN}-iwlwifi-7265 = "${PN}-iwlwifi-license" | ||
1675 | RDEPENDS:${PN}-iwlwifi-7265d = "${PN}-iwlwifi-license" | ||
1676 | RDEPENDS:${PN}-iwlwifi-8000c = "${PN}-iwlwifi-license" | ||
1677 | RDEPENDS:${PN}-iwlwifi-8265 = "${PN}-iwlwifi-license" | ||
1678 | RDEPENDS:${PN}-iwlwifi-9000 = "${PN}-iwlwifi-license" | ||
1679 | RDEPENDS:${PN}-iwlwifi-9260 = "${PN}-iwlwifi-license" | ||
1680 | RDEPENDS:${PN}-iwlwifi-misc = "${PN}-iwlwifi-license" | ||
1681 | |||
1682 | # -iwlwifi-misc is a "catch all" package that includes all the iwlwifi | ||
1683 | # firmwares that are not already included in other -iwlwifi- packages. | ||
1684 | # -iwlwifi is a virtual package that depends upon all iwlwifi packages. | ||
1685 | # These are distinct in order to allow the -misc firmwares to be installed | ||
1686 | # without pulling in every other iwlwifi package. | ||
1687 | ALLOW_EMPTY:${PN}-iwlwifi = "1" | ||
1688 | ALLOW_EMPTY:${PN}-iwlwifi-misc = "1" | ||
1689 | |||
1690 | # Handle package updating for the newly merged iwlwifi groupings | ||
1691 | RPROVIDES:${PN}-iwlwifi-7265 = "${PN}-iwlwifi-7265-8 ${PN}-iwlwifi-7265-9" | ||
1692 | RREPLACES:${PN}-iwlwifi-7265 = "${PN}-iwlwifi-7265-8 ${PN}-iwlwifi-7265-9" | ||
1693 | RCONFLICTS:${PN}-iwlwifi-7265 = "${PN}-iwlwifi-7265-8 ${PN}-iwlwifi-7265-9" | ||
1694 | |||
1695 | RPROVIDES:${PN}-iwlwifi-7260 = "${PN}-iwlwifi-7260-7 ${PN}-iwlwifi-7260-8 ${PN}-iwlwifi-7260-9" | ||
1696 | RREPLACES:${PN}-iwlwifi-7260 = "${PN}-iwlwifi-7260-7 ${PN}-iwlwifi-7260-8 ${PN}-iwlwifi-7260-9" | ||
1697 | RCONFLICTS:${PN}-iwlwifi-7260 = "${PN}-iwlwifi-7260-7 ${PN}-iwlwifi-7260-8 ${PN}-iwlwifi-7260-9" | ||
1698 | |||
1699 | # For ibt | ||
1700 | LICENSE:${PN}-ibt-license = "Firmware-ibt_firmware" | ||
1701 | LICENSE:${PN}-ibt-hw-37-7 = "Firmware-ibt_firmware" | ||
1702 | LICENSE:${PN}-ibt-hw-37-8 = "Firmware-ibt_firmware" | ||
1703 | LICENSE:${PN}-ibt-11-5 = "Firmware-ibt_firmware" | ||
1704 | LICENSE:${PN}-ibt-12-16 = "Firmware-ibt_firmware" | ||
1705 | LICENSE:${PN}-ibt-17 = "Firmware-ibt_firmware" | ||
1706 | LICENSE:${PN}-ibt-18 = "Firmware-ibt_firmware" | ||
1707 | LICENSE:${PN}-ibt-20 = "Firmware-ibt_firmware" | ||
1708 | LICENSE:${PN}-ibt-misc = "Firmware-ibt_firmware" | ||
1709 | |||
1710 | FILES:${PN}-ibt-license = "${nonarch_base_libdir}/firmware/LICENCE.ibt_firmware" | ||
1711 | FILES:${PN}-ibt-hw-37-7 = "${nonarch_base_libdir}/firmware/intel/ibt-hw-37.7*.bseq*" | ||
1712 | FILES:${PN}-ibt-hw-37-8 = "${nonarch_base_libdir}/firmware/intel/ibt-hw-37.8*.bseq*" | ||
1713 | FILES:${PN}-ibt-11-5 = "${nonarch_base_libdir}/firmware/intel/ibt-11-5.sfi* ${nonarch_base_libdir}/firmware/intel/ibt-11-5.ddc*" | ||
1714 | FILES:${PN}-ibt-12-16 = "${nonarch_base_libdir}/firmware/intel/ibt-12-16.sfi* ${nonarch_base_libdir}/firmware/intel/ibt-12-16.ddc*" | ||
1715 | FILES:${PN}-ibt-17 = "${nonarch_base_libdir}/firmware/intel/ibt-17-*.sfi* ${nonarch_base_libdir}/firmware/intel/ibt-17-*.ddc*" | ||
1716 | FILES:${PN}-ibt-18 = "${nonarch_base_libdir}/firmware/intel/ibt-18-*.sfi* ${nonarch_base_libdir}/firmware/intel/ibt-18-*.ddc*" | ||
1717 | FILES:${PN}-ibt-20 = "${nonarch_base_libdir}/firmware/intel/ibt-20-*.sfi* ${nonarch_base_libdir}/firmware/intel/ibt-20-*.ddc*" | ||
1718 | FILES:${PN}-ibt-misc = "${nonarch_base_libdir}/firmware/intel/ibt-*" | ||
1719 | |||
1720 | RDEPENDS:${PN}-ibt-hw-37-7 = "${PN}-ibt-license" | ||
1721 | RDEPENDS:${PN}-ibt-hw-37.8 = "${PN}-ibt-license" | ||
1722 | RDEPENDS:${PN}-ibt-11-5 = "${PN}-ibt-license" | ||
1723 | RDEPENDS:${PN}-ibt-12-16 = "${PN}-ibt-license" | ||
1724 | RDEPENDS:${PN}-ibt-17 = "${PN}-ibt-license" | ||
1725 | RDEPENDS:${PN}-ibt-18 = "${PN}-ibt-license" | ||
1726 | RDEPENDS:${PN}-ibt-20 = "${PN}-ibt-license" | ||
1727 | RDEPENDS:${PN}-ibt-misc = "${PN}-ibt-license" | ||
1728 | |||
1729 | ALLOW_EMPTY:${PN}-ibt = "1" | ||
1730 | ALLOW_EMPTY:${PN}-ibt-misc = "1" | ||
1731 | |||
1732 | LICENSE:${PN}-i915 = "Firmware-i915" | ||
1733 | LICENSE:${PN}-i915-license = "Firmware-i915" | ||
1734 | FILES:${PN}-i915-license = "${nonarch_base_libdir}/firmware/LICENSE.i915" | ||
1735 | FILES:${PN}-i915 = "${nonarch_base_libdir}/firmware/i915" | ||
1736 | RDEPENDS:${PN}-i915 = "${PN}-i915-license" | ||
1737 | |||
1738 | # For ice-enhanced | ||
1739 | LICENSE:${PN}-ice-enhanced = "Firmware-ice_enhanced" | ||
1740 | LICENSE:${PN}-ice-enhanced-license = "Firmware-ice_enhanced" | ||
1741 | |||
1742 | FILES:${PN}-ice-enhanced = " \ | ||
1743 | ${nonarch_base_libdir}/firmware/intel/ice/ddp-comms/* \ | ||
1744 | ${nonarch_base_libdir}/firmware/intel/ice/ddp-wireless_edge/* \ | ||
1745 | " | ||
1746 | FILES:${PN}-ice-enhanced-license = " \ | ||
1747 | ${nonarch_base_libdir}/firmware/LICENSE.ice_enhanced \ | ||
1748 | " | ||
1749 | RDEPENDS:${PN}-ice-enhanced = "${PN}-ice-enhanced-license" | ||
1750 | |||
1751 | LICENSE:${PN}-ice = "Firmware-ice" | ||
1752 | LICENSE:${PN}-ice-license = "Firmware-ice" | ||
1753 | FILES:${PN}-ice-license = "${nonarch_base_libdir}/firmware/LICENSE.ice" | ||
1754 | FILES:${PN}-ice = " \ | ||
1755 | ${nonarch_base_libdir}/firmware/intel/ice/ddp/* \ | ||
1756 | ${nonarch_base_libdir}/firmware/intel/ice/ddp-lag/* \ | ||
1757 | " | ||
1758 | RDEPENDS:${PN}-ice = "${PN}-ice-license" | ||
1759 | |||
1760 | FILES:${PN}-adsp-sst-license = "${nonarch_base_libdir}/firmware/LICENCE.adsp_sst" | ||
1761 | LICENSE:${PN}-adsp-sst = "Firmware-adsp_sst" | ||
1762 | LICENSE:${PN}-adsp-sst-license = "Firmware-adsp_sst" | ||
1763 | FILES:${PN}-adsp-sst = "\ | ||
1764 | ${nonarch_base_libdir}/firmware/intel/dsp_fw* \ | ||
1765 | ${nonarch_base_libdir}/firmware/intel/avs/*/dsp_basefw.bin \ | ||
1766 | " | ||
1767 | RDEPENDS:${PN}-adsp-sst = "${PN}-adsp-sst-license" | ||
1768 | |||
1769 | # For QAT | ||
1770 | LICENSE:${PN}-qat = "Firmware-qat" | ||
1771 | LICENSE:${PN}-qat-license = "Firmware-qat" | ||
1772 | FILES:${PN}-qat-license = "${nonarch_base_libdir}/firmware/LICENCE.qat_firmware" | ||
1773 | FILES:${PN}-qat = "${nonarch_base_libdir}/firmware/qat*.bin*" | ||
1774 | RDEPENDS:${PN}-qat = "${PN}-qat-license" | ||
1775 | |||
1776 | LICENSE:${PN}-qed = "WHENCE" | ||
1777 | FILES:${PN}-qed = "${nonarch_base_libdir}/firmware/qed/*" | ||
1778 | |||
1779 | LICENSE:${PN}-linaro-license = "Firmware-linaro" | ||
1780 | FILES:${PN}-linaro-license = "${nonarch_base_libdir}/firmware/LICENCE.linaro" | ||
1781 | |||
1782 | # For QCOM VPU/GPU and SDM845 | ||
1783 | LICENSE:${PN}-qcom-license = "Firmware-qcom" | ||
1784 | LICENSE:${PN}-qcom-2-license = "Firmware-qcom-2" | ||
1785 | LICENSE:${PN}-qcom-yamato-license = "Firmware-qcom-yamato" | ||
1786 | LICENSE:${PN}-qcom-aic100 = "Firmware-qcom" | ||
1787 | LICENSE:${PN}-qcom-qdu100 = "Firmware-qcom" | ||
1788 | LICENSE:${PN}-qcom-venus-1.8 = "Firmware-qcom" | ||
1789 | LICENSE:${PN}-qcom-venus-4.2 = "Firmware-qcom" | ||
1790 | LICENSE:${PN}-qcom-venus-5.2 = "Firmware-qcom" | ||
1791 | LICENSE:${PN}-qcom-venus-5.4 = "Firmware-qcom" | ||
1792 | LICENSE:${PN}-qcom-venus-6.0 = "Firmware-qcom" | ||
1793 | LICENSE:${PN}-qcom-vpu = "Firmware-qcom" | ||
1794 | LICENSE:${PN}-qcom-adreno-a2xx = "Firmware-qcom Firmware-qcom-yamato" | ||
1795 | LICENSE:${PN}-qcom-adreno-a3xx = "Firmware-qcom" | ||
1796 | LICENSE:${PN}-qcom-adreno-a4xx = "Firmware-qcom" | ||
1797 | LICENSE:${PN}-qcom-adreno-a530 = "Firmware-qcom" | ||
1798 | LICENSE:${PN}-qcom-adreno-a623 = "Firmware-qcom" | ||
1799 | LICENSE:${PN}-qcom-adreno-a630 = "Firmware-qcom" | ||
1800 | LICENSE:${PN}-qcom-adreno-a650 = "Firmware-qcom" | ||
1801 | LICENSE:${PN}-qcom-adreno-a660 = "Firmware-qcom" | ||
1802 | LICENSE:${PN}-qcom-adreno-a663 = "Firmware-qcom" | ||
1803 | LICENSE:${PN}-qcom-adreno-a702 = "Firmware-qcom" | ||
1804 | LICENSE:${PN}-qcom-adreno-g750 = "Firmware-qcom" | ||
1805 | LICENSE:${PN}-qcom-apq8016-modem = "Firmware-qcom" | ||
1806 | LICENSE:${PN}-qcom-apq8016-wifi = "Firmware-qcom" | ||
1807 | LICENSE:${PN}-qcom-apq8096-audio = "Firmware-qcom" | ||
1808 | LICENSE:${PN}-qcom-apq8096-adreno = "Firmware-qcom" | ||
1809 | LICENSE:${PN}-qcom-apq8096-modem = "Firmware-qcom" | ||
1810 | LICENSE:${PN}-qcom-qcm2290-adreno = "Firmware-qcom" | ||
1811 | LICENSE:${PN}-qcom-qcm2290-audio = "Firmware-qcom" | ||
1812 | LICENSE:${PN}-qcom-qcm2290-modem = "Firmware-qcom" | ||
1813 | LICENSE:${PN}-qcom-qcm2290-wifi = "Firmware-qcom" | ||
1814 | LICENSE:${PN}-qcom-qcm6490-adreno = "Firmware-qcom" | ||
1815 | LICENSE:${PN}-qcom-qcm6490-audio = "Firmware-qcom" | ||
1816 | LICENSE:${PN}-qcom-qcm6490-compute = "Firmware-qcom" | ||
1817 | LICENSE:${PN}-qcom-qcm6490-ipa = "Firmware-qcom" | ||
1818 | LICENSE:${PN}-qcom-qcm6490-wifi = "Firmware-qcom" | ||
1819 | LICENSE:${PN}-qcom-qcs615-adreno = "Firmware-qcom" | ||
1820 | LICENSE:${PN}-qcom-qcs8300-adreno = "Firmware-qcom" | ||
1821 | LICENSE:${PN}-qcom-qcs8300-audio = "Firmware-qcom-2" | ||
1822 | LICENSE:${PN}-qcom-qcs8300-compute = "Firmware-qcom-2" | ||
1823 | LICENSE:${PN}-qcom-qcs8300-generalpurpose = "Firmware-qcom-2" | ||
1824 | LICENSE:${PN}-qcom-qrb4210-adreno = "Firmware-qcom" | ||
1825 | LICENSE:${PN}-qcom-qrb4210-audio = "Firmware-qcom" | ||
1826 | LICENSE:${PN}-qcom-qrb4210-compute = "Firmware-qcom" | ||
1827 | LICENSE:${PN}-qcom-qrb4210-modem = "Firmware-qcom" | ||
1828 | LICENSE:${PN}-qcom-qrb4210-wifi = "Firmware-qcom" | ||
1829 | LICENSE:${PN}-qcom-sa8775p-adreno = "Firmware-qcom" | ||
1830 | LICENSE:${PN}-qcom-sa8775p-audio = "Firmware-qcom-2" | ||
1831 | LICENSE:${PN}-qcom-sa8775p-compute = "Firmware-qcom-2" | ||
1832 | LICENSE:${PN}-qcom-sa8775p-generalpurpose = "Firmware-qcom-2" | ||
1833 | LICENSE:${PN}-qcom-sa8775p-qupv3fw = "Firmware-qcom-2" | ||
1834 | LICENSE:${PN}-qcom-sc8280xp-lenovo-x13s-audio = "Firmware-qcom & Firmware-linaro" | ||
1835 | LICENSE:${PN}-qcom-sc8280xp-lenovo-x13s-adreno = "Firmware-qcom" | ||
1836 | LICENSE:${PN}-qcom-sc8280xp-lenovo-x13s-compute = "Firmware-qcom" | ||
1837 | LICENSE:${PN}-qcom-sc8280xp-lenovo-x13s-sensors = "Firmware-qcom" | ||
1838 | LICENSE:${PN}-qcom-sdm845-audio = "Firmware-qcom" | ||
1839 | LICENSE:${PN}-qcom-sdm845-adreno = "Firmware-qcom" | ||
1840 | LICENSE:${PN}-qcom-sdm845-compute = "Firmware-qcom" | ||
1841 | LICENSE:${PN}-qcom-sdm845-modem = "Firmware-qcom" | ||
1842 | LICENSE:${PN}-qcom-sdm845-thundercomm-db845c-sensors = "Firmware-qcom" | ||
1843 | LICENSE:${PN}-qcom-sm8250-audio = "Firmware-qcom" | ||
1844 | LICENSE:${PN}-qcom-sm8250-adreno = "Firmware-qcom" | ||
1845 | LICENSE:${PN}-qcom-sm8250-compute = "Firmware-qcom" | ||
1846 | LICENSE:${PN}-qcom-sm8250-thundercomm-rb5-sensors = "Firmware-qcom" | ||
1847 | LICENSE:${PN}-qcom-sm8550-audio-tplg = "Firmware-linaro" | ||
1848 | LICENSE:${PN}-qcom-sm8650-audio-tplg = "Firmware-linaro" | ||
1849 | LICENSE:${PN}-qcom-x1e80100-adreno = "Firmware-qcom" | ||
1850 | LICENSE:${PN}-qcom-x1e80100-audio = "Firmware-qcom" | ||
1851 | LICENSE:${PN}-qcom-x1e80100-lenovo-t14s-g6-adreno = "Firmware-qcom" | ||
1852 | LICENSE:${PN}-qcom-x1e80100-lenovo-t14s-g6-audio = "Firmware-qcom & Firmware-linaro" | ||
1853 | LICENSE:${PN}-qcom-x1e80100-lenovo-t14s-g6-compute = "Firmware-qcom" | ||
1854 | LICENSE:${PN}-qcom-x1e80100-lenovo-t14s-g6-vpu = "Firmware-qcom" | ||
1855 | LICENSE:${PN}-qcom-x1e80100-lenovo-yoga-slim7x-adreno = "Firmware-qcom" | ||
1856 | LICENSE:${PN}-qcom-x1e80100-lenovo-yoga-slim7x-audio = "Firmware-qcom & Firmware-linaro" | ||
1857 | LICENSE:${PN}-qcom-x1e80100-lenovo-yoga-slim7x-compute = "Firmware-qcom" | ||
1858 | LICENSE:${PN}-qcom-x1e80100-lenovo-yoga-slim7x-vpu = "Firmware-qcom" | ||
1859 | |||
1860 | FILES:${PN}-qcom-license = "${nonarch_base_libdir}/firmware/LICENSE.qcom ${nonarch_base_libdir}/firmware/qcom/NOTICE.txt" | ||
1861 | FILES:${PN}-qcom-2-license = "${nonarch_base_libdir}/firmware/LICENSE.qcom-2" | ||
1862 | FILES:${PN}-qcom-yamato-license = "${nonarch_base_libdir}/firmware/LICENSE.qcom_yamato" | ||
1863 | |||
1864 | FILES:${PN}-qcom-aic100 = "${nonarch_base_libdir}/firmware/qcom/aic100/*" | ||
1865 | FILES:${PN}-qcom-qdu100 = "${nonarch_base_libdir}/firmware/qcom/qdu100/*" | ||
1866 | |||
1867 | FILES:${PN}-qcom-venus-1.8 = "${nonarch_base_libdir}/firmware/qcom/venus-1.8/*" | ||
1868 | FILES:${PN}-qcom-venus-4.2 = "${nonarch_base_libdir}/firmware/qcom/venus-4.2/*" | ||
1869 | FILES:${PN}-qcom-venus-5.2 = "${nonarch_base_libdir}/firmware/qcom/venus-5.2/*" | ||
1870 | FILES:${PN}-qcom-venus-5.4 = "${nonarch_base_libdir}/firmware/qcom/venus-5.4/*" | ||
1871 | FILES:${PN}-qcom-venus-6.0 = "${nonarch_base_libdir}/firmware/qcom/venus-6.0/*" | ||
1872 | FILES:${PN}-qcom-vpu = " \ | ||
1873 | ${nonarch_base_libdir}/firmware/qcom/vpu/* \ | ||
1874 | ${nonarch_base_libdir}/firmware/qcom/vpu-1.0/* \ | ||
1875 | ${nonarch_base_libdir}/firmware/qcom/vpu-2.0/* \ | ||
1876 | " | ||
1877 | FILES:${PN}-qcom-adreno-a2xx = "${nonarch_base_libdir}/firmware/qcom/leia_*.fw* ${nonarch_base_libdir}/firmware/qcom/yamato_*.fw* ${nonarch_base_libdir}/firmware/qcom/a2*_*.fw*" | ||
1878 | FILES:${PN}-qcom-adreno-a3xx = "${nonarch_base_libdir}/firmware/qcom/a3*_*.fw* ${nonarch_base_libdir}/firmware/a300_*.fw*" | ||
1879 | FILES:${PN}-qcom-adreno-a4xx = "${nonarch_base_libdir}/firmware/qcom/a4*_*.fw*" | ||
1880 | FILES:${PN}-qcom-adreno-a530 = "${nonarch_base_libdir}/firmware/qcom/a530*.fw*" | ||
1881 | FILES:${PN}-qcom-adreno-a623 = "${nonarch_base_libdir}/firmware/qcom/a623*.*" | ||
1882 | FILES:${PN}-qcom-adreno-a630 = "${nonarch_base_libdir}/firmware/qcom/a630*.*" | ||
1883 | FILES:${PN}-qcom-adreno-a650 = "${nonarch_base_libdir}/firmware/qcom/a650*.*" | ||
1884 | FILES:${PN}-qcom-adreno-a660 = "${nonarch_base_libdir}/firmware/qcom/a660*.*" | ||
1885 | FILES:${PN}-qcom-adreno-a663 = "${nonarch_base_libdir}/firmware/qcom/a663*.*" | ||
1886 | FILES:${PN}-qcom-adreno-a702 = "${nonarch_base_libdir}/firmware/qcom/a702*.*" | ||
1887 | FILES:${PN}-qcom-adreno-g750 = "${nonarch_base_libdir}/firmware/qcom/gen70500_*.*" | ||
1888 | FILES:${PN}-qcom-apq8016-modem = "${nonarch_base_libdir}/firmware/qcom/apq8016/mba.mbn* ${nonarch_base_libdir}/firmware/qcom/apq8016/modem.mbn*" | ||
1889 | FILES:${PN}-qcom-apq8016-wifi = "${nonarch_base_libdir}/firmware/qcom/apq8016/wcnss.mbn* ${nonarch_base_libdir}/firmware/qcom/apq8016/WCNSS*" | ||
1890 | FILES:${PN}-qcom-apq8096-adreno = "${nonarch_base_libdir}/firmware/qcom/apq8096/a530_zap.mbn* ${nonarch_base_libdir}/firmware/qcom/a530_zap.mdt*" | ||
1891 | FILES:${PN}-qcom-apq8096-audio = "${nonarch_base_libdir}/firmware/qcom/apq8096/adsp*.*" | ||
1892 | FILES:${PN}-qcom-apq8096-modem = "${nonarch_base_libdir}/firmware/qcom/apq8096/mba.mbn* ${nonarch_base_libdir}/firmware/qcom/apq8096/modem*.* ${nonarch_base_libdir}/firmware/qcom/apq8096/wlanmdsp.mbn*" | ||
1893 | FILES:${PN}-qcom-qcm2290-adreno = "${nonarch_base_libdir}/firmware/qcom/qcm2290/a702_zap.mbn*" | ||
1894 | FILES:${PN}-qcom-qcm2290-audio = "${nonarch_base_libdir}/firmware/qcom/qcm2290/adsp*.*" | ||
1895 | FILES:${PN}-qcom-qcm2290-modem = "${nonarch_base_libdir}/firmware/qcom/qcm2290/modem*.*" | ||
1896 | FILES:${PN}-qcom-qcm2290-wifi = "${nonarch_base_libdir}/firmware/qcom/qcm2290/wlanmdsp.mbn* ${nonarch_base_libdir}/firmware/ath10k/WCN3990/hw1.0/qcm2290/*" | ||
1897 | FILES:${PN}-qcom-qcm6490-adreno = "${nonarch_base_libdir}/firmware/qcom/qc[ms]6490/a660_zap.mbn*" | ||
1898 | FILES:${PN}-qcom-qcm6490-audio = "${nonarch_base_libdir}/firmware/qcom/qc[ms]6490/adsp*.* ${nonarch_base_libdir}/firmware/qcom/qc[ms]6490/battmgr.jsn" | ||
1899 | FILES:${PN}-qcom-qcm6490-compute = "${nonarch_base_libdir}/firmware/qcom/qc[ms]6490/cdsp*.*" | ||
1900 | FILES:${PN}-qcom-qcm6490-ipa = "${nonarch_base_libdir}/firmware/qcom/qcm6490/ipa_fws.mbn" | ||
1901 | FILES:${PN}-qcom-qcm6490-wifi = "${nonarch_base_libdir}/firmware/qcom/qc[ms]6490/wpss.mbn*" | ||
1902 | FILES:${PN}-qcom-qcs615-adreno = "${nonarch_base_libdir}/firmware/qcom/qcs615/a612_zap.mbn*" | ||
1903 | FILES:${PN}-qcom-qcs8300-adreno = "${nonarch_base_libdir}/firmware/qcom/qcs8300/a623_zap.mbn*" | ||
1904 | FILES:${PN}-qcom-qcs8300-audio = "${nonarch_base_libdir}/firmware/qcom/qcs8300/adsp*.*" | ||
1905 | FILES:${PN}-qcom-qcs8300-compute = "${nonarch_base_libdir}/firmware/qcom/qcs8300/cdsp*.*" | ||
1906 | FILES:${PN}-qcom-qcs8300-generalpurpose = "${nonarch_base_libdir}/firmware/qcom/qcs8300/gpdsp*.*" | ||
1907 | FILES:${PN}-qcom-qrb4210-adreno = "${nonarch_base_libdir}/firmware/qcom/qrb4210/a610_zap.mbn*" | ||
1908 | FILES:${PN}-qcom-qrb4210-audio = "${nonarch_base_libdir}/firmware/qcom/qrb4210/adsp*.*" | ||
1909 | FILES:${PN}-qcom-qrb4210-compute = "${nonarch_base_libdir}/firmware/qcom/qrb4210/cdsp*.*" | ||
1910 | FILES:${PN}-qcom-qrb4210-modem = "${nonarch_base_libdir}/firmware/qcom/qrb4210/modem*.*" | ||
1911 | FILES:${PN}-qcom-qrb4210-wifi = "${nonarch_base_libdir}/firmware/qcom/qrb4210/wlanmdsp.mbn* ${nonarch_base_libdir}/firmware/ath10k/WCN3990/hw1.0/qrb4210/*" | ||
1912 | FILES:${PN}-qcom-sa8775p-adreno = "${nonarch_base_libdir}/firmware/qcom/sa8775p/a663_zap.mbn*" | ||
1913 | FILES:${PN}-qcom-sa8775p-audio = "${nonarch_base_libdir}/firmware/qcom/sa8775p/adsp*.*" | ||
1914 | FILES:${PN}-qcom-sa8775p-compute = "${nonarch_base_libdir}/firmware/qcom/sa8775p/cdsp*.*" | ||
1915 | FILES:${PN}-qcom-sa8775p-generalpurpose = "${nonarch_base_libdir}/firmware/qcom/sa8775p/gpdsp*.*" | ||
1916 | FILES:${PN}-qcom-sa8775p-qupv3fw = "${nonarch_base_libdir}/firmware/qcom/sa8775p/qupv3fw.elf*" | ||
1917 | FILES:${PN}-qcom-sc8280xp-lenovo-x13s-compat = "${nonarch_base_libdir}/firmware/qcom/LENOVO/21BX" | ||
1918 | FILES:${PN}-qcom-sc8280xp-lenovo-x13s-audio = "${nonarch_base_libdir}/firmware/qcom/sc8280xp/LENOVO/21BX/*adsp*.* ${nonarch_base_libdir}/firmware/qcom/sc8280xp/LENOVO/21BX/battmgr.jsn* ${nonarch_base_libdir}/firmware/qcom/sc8280xp/LENOVO/21BX/audioreach-tplg.bin* ${nonarch_base_libdir}/firmware/qcom/sc8280xp/SC8280XP-LENOVO-X13S-tplg.bin*" | ||
1919 | FILES:${PN}-qcom-sc8280xp-lenovo-x13s-adreno = "${nonarch_base_libdir}/firmware/qcom/sc8280xp/LENOVO/21BX/qcdxkmsuc8280.mbn*" | ||
1920 | FILES:${PN}-qcom-sc8280xp-lenovo-x13s-compute = "${nonarch_base_libdir}/firmware/qcom/sc8280xp/LENOVO/21BX/*cdsp*.*" | ||
1921 | FILES:${PN}-qcom-sc8280xp-lenovo-x13s-sensors = "${nonarch_base_libdir}/firmware/qcom/sc8280xp/LENOVO/21BX/*slpi*.*" | ||
1922 | FILES:${PN}-qcom-sdm845-adreno = "${nonarch_base_libdir}/firmware/qcom/sdm845/a630*.*" | ||
1923 | FILES:${PN}-qcom-sdm845-audio = "${nonarch_base_libdir}/firmware/qcom/sdm845/adsp*.*" | ||
1924 | FILES:${PN}-qcom-sdm845-compute = "${nonarch_base_libdir}/firmware/qcom/sdm845/cdsp*.*" | ||
1925 | FILES:${PN}-qcom-sdm845-modem = "${nonarch_base_libdir}/firmware/qcom/sdm845/mba.mbn* ${nonarch_base_libdir}/firmware/qcom/sdm845/modem*.* ${nonarch_base_libdir}/firmware/qcom/sdm845/wlanmdsp.mbn* ${nonarch_base_libdir}/firmware/qcom/sdm845/notice.txt_wlanmdsp* \ | ||
1926 | ${nonarch_base_libdir}/firmware/ath10k/WCN3990/hw1.0/wlanmdsp.mbn* ${nonarch_base_libdir}/firmware/ath10k/WCN3990/hw1.0/notice.txt_wlanmdsp" | ||
1927 | FILES:${PN}-qcom-sdm845-thundercomm-db845c-sensors = "${nonarch_base_libdir}/firmware/qcom/sdm845/Thundercomm/db845c/slpi*.*" | ||
1928 | FILES:${PN}-qcom-sm8250-adreno = "${nonarch_base_libdir}/firmware/qcom/sm8250/a650*.*" | ||
1929 | FILES:${PN}-qcom-sm8250-audio = "${nonarch_base_libdir}/firmware/qcom/sm8250/adsp*.*" | ||
1930 | FILES:${PN}-qcom-sm8250-compute = "${nonarch_base_libdir}/firmware/qcom/sm8250/cdsp*.*" | ||
1931 | FILES:${PN}-qcom-sm8250-thundercomm-rb5-sensors = "${nonarch_base_libdir}/firmware/qcom/sm8250/Thundercomm/RB5/slpi*.*" | ||
1932 | FILES:${PN}-qcom-sm8550-audio-tplg = "${nonarch_base_libdir}/firmware/qcom/sm8550/*tplg.bin*" | ||
1933 | FILES:${PN}-qcom-sm8650-audio-tplg = "${nonarch_base_libdir}/firmware/qcom/sm8650/*tplg.bin*" | ||
1934 | FILES:${PN}-qcom-x1e80100-adreno = "${nonarch_base_libdir}/firmware/qcom/x1e80100/gen70500_zap.mbn*" | ||
1935 | FILES:${PN}-qcom-x1e80100-audio = "${nonarch_base_libdir}/firmware/qcom/x1e80100/adsp*.* ${nonarch_base_libdir}/firmware/qcom/x1e80100/battmgr.jsn" | ||
1936 | FILES:${PN}-qcom-x1e80100-lenovo-t14s-g6-adreno = "${nonarch_base_libdir}/firmware/qcom/x1e80100/LENOVO/21N1/qcdxkmsuc8380.mbn*" | ||
1937 | FILES:${PN}-qcom-x1e80100-lenovo-t14s-g6-audio = "${nonarch_base_libdir}/firmware/qcom/x1e80100/LENOVO/21N1/*adsp*.* ${nonarch_base_libdir}/firmware/qcom/x1e80100/LENOVO/21N1/battmgr.jsn* ${nonarch_base_libdir}/firmware/qcom/x1e80100/LENOVO/21N1/X1E80100-LENOVO-Thinkpad-T14s-tplg.bin* ${nonarch_base_libdir}/firmware/qcom/x1e80100/X1E80100-LENOVO-Thinkpad-T14s-tplg.bin*" | ||
1938 | FILES:${PN}-qcom-x1e80100-lenovo-t14s-g6-compute = "${nonarch_base_libdir}/firmware/qcom/x1e80100/LENOVO/21N1/*cdsp*.*" | ||
1939 | FILES:${PN}-qcom-x1e80100-lenovo-t14s-g6-vpu = "${nonarch_base_libdir}/firmware/qcom/x1e80100/LENOVO/21N1/qcvss8380.mbn*" | ||
1940 | FILES:${PN}-qcom-x1e80100-lenovo-yoga-slim7x-adreno = "${nonarch_base_libdir}/firmware/qcom/x1e80100/LENOVO/83ED/qcdxkmsuc8380.mbn*" | ||
1941 | FILES:${PN}-qcom-x1e80100-lenovo-yoga-slim7x-audio = "${nonarch_base_libdir}/firmware/qcom/x1e80100/LENOVO/83ED/*adsp*.* ${nonarch_base_libdir}/firmware/qcom/x1e80100/LENOVO/83ED/battmgr.jsn* ${nonarch_base_libdir}/firmware/qcom/x1e80100/LENOVO/83ED/X1E80100-LENOVO-Yoga-Slim7x-tplg.bin* ${nonarch_base_libdir}/firmware/qcom/x1e80100/X1E80100-LENOVO-Yoga-Slim7x-tplg.bin*" | ||
1942 | FILES:${PN}-qcom-x1e80100-lenovo-yoga-slim7x-compute = "${nonarch_base_libdir}/firmware/qcom/x1e80100/LENOVO/83ED/*cdsp*.*" | ||
1943 | FILES:${PN}-qcom-x1e80100-lenovo-yoga-slim7x-vpu = "${nonarch_base_libdir}/firmware/qcom/x1e80100/LENOVO/83ED/qcvss8380.mbn* ${nonarch_base_libdir}/firmware/qcom/x1e80100/LENOVO/83ED/qcav1e8380.mbn*" | ||
1944 | |||
1945 | RDEPENDS:${PN}-qcom-aic100 = "${PN}-qcom-license" | ||
1946 | RDEPENDS:${PN}-qcom-qdu100 = "${PN}-qcom-license" | ||
1947 | |||
1948 | RDEPENDS:${PN}-qcom-venus-1.8 = "${PN}-qcom-license" | ||
1949 | RDEPENDS:${PN}-qcom-venus-4.2 = "${PN}-qcom-license" | ||
1950 | RDEPENDS:${PN}-qcom-venus-5.2 = "${PN}-qcom-license" | ||
1951 | RDEPENDS:${PN}-qcom-venus-5.4 = "${PN}-qcom-license" | ||
1952 | RDEPENDS:${PN}-qcom-venus-6.0 = "${PN}-qcom-license" | ||
1953 | RDEPENDS:${PN}-qcom-vpu = "${PN}-qcom-license" | ||
1954 | RDEPENDS:${PN}-qcom-adreno-a2xx = "${PN}-qcom-license ${PN}-qcom-yamato-license" | ||
1955 | RDEPENDS:${PN}-qcom-adreno-a3xx = "${PN}-qcom-license" | ||
1956 | RDEPENDS:${PN}-qcom-adreno-a4xx = "${PN}-qcom-license" | ||
1957 | RDEPENDS:${PN}-qcom-adreno-a530 = "${PN}-qcom-license" | ||
1958 | RDEPENDS:${PN}-qcom-adreno-a623 = "${PN}-qcom-license" | ||
1959 | RDEPENDS:${PN}-qcom-adreno-a630 = "${PN}-qcom-license" | ||
1960 | RDEPENDS:${PN}-qcom-adreno-a650 = "${PN}-qcom-license" | ||
1961 | RDEPENDS:${PN}-qcom-adreno-a660 = "${PN}-qcom-license" | ||
1962 | RDEPENDS:${PN}-qcom-adreno-a663 = "${PN}-qcom-license ${PN}-qcom-adreno-a660" | ||
1963 | RDEPENDS:${PN}-qcom-adreno-a702 = "${PN}-qcom-license" | ||
1964 | RDEPENDS:${PN}-qcom-adreno-g750 = "${PN}-qcom-license" | ||
1965 | RDEPENDS:${PN}-qcom-apq8016-modem = "${PN}-qcom-license" | ||
1966 | RDEPENDS:${PN}-qcom-apq8016-wifi = "${PN}-qcom-license" | ||
1967 | RDEPENDS:${PN}-qcom-apq8096-adreno = "${PN}-qcom-license" | ||
1968 | RDEPENDS:${PN}-qcom-apq8096-audio = "${PN}-qcom-license" | ||
1969 | RDEPENDS:${PN}-qcom-apq8096-modem = "${PN}-qcom-license" | ||
1970 | RDEPENDS:${PN}-qcom-qcm2290-adreno = "${PN}-qcom-license" | ||
1971 | RDEPENDS:${PN}-qcom-qcm2290-audio = "${PN}-qcom-license" | ||
1972 | RDEPENDS:${PN}-qcom-qcm2290-modem = "${PN}-qcom-license" | ||
1973 | RDEPENDS:${PN}-qcom-qcm2290-wifi = "${PN}-qcom-license" | ||
1974 | RDEPENDS:${PN}-qcom-qcm6490-adreno = "${PN}-qcom-license" | ||
1975 | RPROVIDES:${PN}-qcom-qcm6490-adreno = "${PN}-qcom-qcs6490-adreno" | ||
1976 | RDEPENDS:${PN}-qcom-qcm6490-audio = "${PN}-qcom-license" | ||
1977 | RPROVIDES:${PN}-qcom-qcm6490-audio = "${PN}-qcom-qcs6490-audio" | ||
1978 | RDEPENDS:${PN}-qcom-qcm6490-compute = "${PN}-qcom-license" | ||
1979 | RPROVIDES:${PN}-qcom-qcm6490-compute = "${PN}-qcom-qcs6490-compute" | ||
1980 | RDEPENDS:${PN}-qcom-qcm6490-ipa = "${PN}-qcom-license" | ||
1981 | RDEPENDS:${PN}-qcom-qcm6490-wifi = "${PN}-qcom-license" | ||
1982 | RPROVIDES:${PN}-qcom-qcm6490-wifi = "${PN}-qcom-qcs6490-wifi" | ||
1983 | RDEPENDS:${PN}-qcom-qcs615-adreno = "${PN}-qcom-license" | ||
1984 | RDEPENDS:${PN}-qcom-qcs8300-adreno = "${PN}-qcom-license" | ||
1985 | RDEPENDS:${PN}-qcom-qcs8300-audio = "${PN}-qcom-2-license" | ||
1986 | RDEPENDS:${PN}-qcom-qcs8300-compute = "${PN}-qcom-2-license" | ||
1987 | RDEPENDS:${PN}-qcom-qcs8300-generalpurpose = "${PN}-qcom-2-license" | ||
1988 | RDEPENDS:${PN}-qcom-qrb4210-adreno = "${PN}-qcom-license" | ||
1989 | RDEPENDS:${PN}-qcom-qrb4210-audio = "${PN}-qcom-license" | ||
1990 | RDEPENDS:${PN}-qcom-qrb4210-compute = "${PN}-qcom-license" | ||
1991 | RDEPENDS:${PN}-qcom-qrb4210-modem = "${PN}-qcom-license" | ||
1992 | # Only symlinks in qcom-qrb4210-wifi, firmware is in qcom-qcm2290-wifi | ||
1993 | # c.f. https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/commit/?id=650e88378e76d5fad3997a5398f1ade47a74d924 | ||
1994 | RDEPENDS:${PN}-qcom-qrb4210-wifi = "${PN}-qcom-license ${PN}-qcom-qcm2290-wifi" | ||
1995 | RDEPENDS:${PN}-qcom-sa8775p-adreno = "${PN}-qcom-license" | ||
1996 | RDEPENDS:${PN}-qcom-sa8775p-audio = "${PN}-qcom-2-license" | ||
1997 | RDEPENDS:${PN}-qcom-sa8775p-compute = "${PN}-qcom-2-license" | ||
1998 | RDEPENDS:${PN}-qcom-sa8775p-generalpurpose = "${PN}-qcom-2-license" | ||
1999 | RDEPENDS:${PN}-qcom-sa8775p-qupv3fw = "${PN}-qcom-2-license" | ||
2000 | RDEPENDS:${PN}-qcom-sc8280xp-lenovo-x13s-audio = "${PN}-qcom-license ${PN}-linaro-license" | ||
2001 | RDEPENDS:${PN}-qcom-sc8280xp-lenovo-x13s-adreno = "${PN}-qcom-license" | ||
2002 | RDEPENDS:${PN}-qcom-sc8280xp-lenovo-x13s-compute = "${PN}-qcom-license" | ||
2003 | RDEPENDS:${PN}-qcom-sc8280xp-lenovo-x13s-sensors = "${PN}-qcom-license" | ||
2004 | RDEPENDS:${PN}-qcom-sdm845-adreno = "${PN}-qcom-license" | ||
2005 | RDEPENDS:${PN}-qcom-sdm845-audio = "${PN}-qcom-license" | ||
2006 | RDEPENDS:${PN}-qcom-sdm845-compute = "${PN}-qcom-license" | ||
2007 | RDEPENDS:${PN}-qcom-sdm845-modem = "${PN}-qcom-license" | ||
2008 | RDEPENDS:${PN}-qcom-sdm845-thundercomm-db845c-sensors = "${PN}-qcom-license" | ||
2009 | RDEPENDS:${PN}-qcom-sm8250-adreno = "${PN}-qcom-license" | ||
2010 | RDEPENDS:${PN}-qcom-sm8250-audio = "${PN}-qcom-license" | ||
2011 | RDEPENDS:${PN}-qcom-sm8250-compute = "${PN}-qcom-license" | ||
2012 | RDEPENDS:${PN}-qcom-sm8250-thundercomm-rb5-sensors = "${PN}-qcom-license" | ||
2013 | RDEPENDS:${PN}-qcom-sm8550-audio-tplg = "${PN}-linaro-license" | ||
2014 | RDEPENDS:${PN}-qcom-sm8650-audio-tplg = "${PN}-linaro-license" | ||
2015 | RDEPENDS:${PN}-qcom-x1e80100-adreno = "${PN}-qcom-license" | ||
2016 | RDEPENDS:${PN}-qcom-x1e80100-audio = "${PN}-qcom-license" | ||
2017 | RDEPENDS:${PN}-qcom-x1e80100-lenovo-t14s-g6-adreno = "${PN}-qcom-license" | ||
2018 | RDEPENDS:${PN}-qcom-x1e80100-lenovo-t14s-g6-audio = "${PN}-qcom-license ${PN}-linaro-license" | ||
2019 | RDEPENDS:${PN}-qcom-x1e80100-lenovo-t14s-g6-compute = "${PN}-qcom-license" | ||
2020 | RDEPENDS:${PN}-qcom-x1e80100-lenovo-yoga-slim7x-adreno = "${PN}-qcom-license" | ||
2021 | RDEPENDS:${PN}-qcom-x1e80100-lenovo-yoga-slim7x-audio = "${PN}-qcom-license ${PN}-linaro-license" | ||
2022 | RDEPENDS:${PN}-qcom-x1e80100-lenovo-yoga-slim7x-compute = "${PN}-qcom-license" | ||
2023 | RDEPENDS:${PN}-qcom-x1e80100-lenovo-yoga-slim7x-vpu = "${PN}-qcom-license" | ||
2024 | |||
2025 | RRECOMMENDS:${PN}-qcom-sc8280xp-lenovo-x13s-audio = "${PN}-qcom-sc8280xp-lenovo-x13s-compat" | ||
2026 | RRECOMMENDS:${PN}-qcom-sc8280xp-lenovo-x13s-adreno = "${PN}-qcom-sc8280xp-lenovo-x13s-compat" | ||
2027 | RRECOMMENDS:${PN}-qcom-sc8280xp-lenovo-x13s-compute = "${PN}-qcom-sc8280xp-lenovo-x13s-compat" | ||
2028 | RRECOMMENDS:${PN}-qcom-sc8280xp-lenovo-x13s-sensors = "${PN}-qcom-sc8280xp-lenovo-x13s-compat" | ||
2029 | |||
2030 | LICENSE:${PN}-liquidui = "Firmware-cavium_liquidio" | ||
2031 | FILES:${PN}-liquidio = "${nonarch_base_libdir}/firmware/liquidio" | ||
2032 | |||
2033 | LICENSE:${PN}-mellanox = "WHENCE" | ||
2034 | FILES:${PN}-mellanox = "${nonarch_base_libdir}/firmware/mellanox" | ||
2035 | |||
2036 | LICENSE:${PN}-prestera = "Firmware-Marvell" | ||
2037 | FILES:${PN}-prestera = "${nonarch_base_libdir}/firmware/mrvl/prestera" | ||
2038 | RDEPENDS:${PN}-prestera = "${PN}-marvell-license" | ||
2039 | |||
2040 | # For Rockchip | ||
2041 | LICENSE:${PN}-rockchip-dptx = "Firmware-rockchip" | ||
2042 | FILES:${PN}-rockchip-license = "${nonarch_base_libdir}/firmware/LICENCE.rockchip" | ||
2043 | FILES:${PN}-rockchip-dptx = "${nonarch_base_libdir}/firmware/rockchip/dptx.bin*" | ||
2044 | RDEPENDS:${PN}-rockchip-dptx = "${PN}-rockchip-license" | ||
2045 | |||
2046 | # For Amlogic VDEC | ||
2047 | LICENSE:${PN}-amlogic-vdec = "Firmware-amlogic_vdec" | ||
2048 | FILES:${PN}-amlogic-vdec-license = "${nonarch_base_libdir}/firmware/LICENSE.amlogic_vdec" | ||
2049 | FILES:${PN}-amlogic-vdec = "${nonarch_base_libdir}/firmware/meson/vdec/*" | ||
2050 | RDEPENDS:${PN}-amlogic-vdec = "${PN}-amlogic-vdec-license" | ||
2051 | |||
2052 | # For other firmwares | ||
2053 | # Maybe split out to separate packages when needed. | ||
2054 | LICENSE:${PN} = "\ | ||
2055 | Firmware-Abilis \ | ||
2056 | & Firmware-agere \ | ||
2057 | & Firmware-amdgpu \ | ||
2058 | & Firmware-amd-ucode \ | ||
2059 | & Firmware-amlogic_vdec \ | ||
2060 | & Firmware-atmel \ | ||
2061 | & Firmware-ca0132 \ | ||
2062 | & Firmware-cavium \ | ||
2063 | & Firmware-chelsio_firmware \ | ||
2064 | & Firmware-cirrus \ | ||
2065 | & Firmware-cnm \ | ||
2066 | & Firmware-cw1200 \ | ||
2067 | & Firmware-dib0700 \ | ||
2068 | & Firmware-e100 \ | ||
2069 | & Firmware-ene_firmware \ | ||
2070 | & Firmware-fw_sst_0f28 \ | ||
2071 | & Firmware-go7007 \ | ||
2072 | & Firmware-hfi1_firmware \ | ||
2073 | & Firmware-ibt_firmware \ | ||
2074 | & Firmware-it913x \ | ||
2075 | & Firmware-IntcSST2 \ | ||
2076 | & Firmware-kaweth \ | ||
2077 | & Firmware-moxa \ | ||
2078 | & Firmware-myri10ge_firmware \ | ||
2079 | & Firmware-nvidia \ | ||
2080 | & Firmware-nxp \ | ||
2081 | & Firmware-OLPC \ | ||
2082 | & Firmware-ath9k-htc \ | ||
2083 | & Firmware-phanfw \ | ||
2084 | & Firmware-qat \ | ||
2085 | & Firmware-qcom \ | ||
2086 | & Firmware-qla1280 \ | ||
2087 | & Firmware-qla2xxx \ | ||
2088 | & Firmware-r8a779x_usb3 \ | ||
2089 | & Firmware-radeon \ | ||
2090 | & Firmware-ralink_a_mediatek_company_firmware \ | ||
2091 | & Firmware-ralink-firmware \ | ||
2092 | & Firmware-imx-sdma_firmware \ | ||
2093 | & Firmware-siano \ | ||
2094 | & Firmware-ti-connectivity \ | ||
2095 | & Firmware-ti-keystone \ | ||
2096 | & Firmware-ueagle-atm4-firmware \ | ||
2097 | & Firmware-wl1251 \ | ||
2098 | & Firmware-xc4000 \ | ||
2099 | & Firmware-xc5000 \ | ||
2100 | & Firmware-xc5000c \ | ||
2101 | & WHENCE \ | ||
2102 | " | ||
2103 | |||
2104 | FILES:${PN}-license += "${nonarch_base_libdir}/firmware/LICEN*" | ||
2105 | FILES:${PN} += "${nonarch_base_libdir}/firmware/*" | ||
2106 | RDEPENDS:${PN} += "${PN}-license" | ||
2107 | RDEPENDS:${PN} += "${PN}-whence-license" | ||
2108 | |||
2109 | # Make linux-firmware depend on all of the split-out packages. | ||
2110 | # Make linux-firmware-iwlwifi depend on all of the split-out iwlwifi packages. | ||
2111 | # Make linux-firmware-ibt depend on all of the split-out ibt packages. | ||
2112 | # Make linux-firmware-ath10k depend on all of the split-out ath10k packages. | ||
2113 | # Make linux-firmware-ath11k depend on all of the split-out ath11k packages. | ||
2114 | # Make linux-firmware-ath12k depend on all of the split-out ath12k packages. | ||
2115 | # Make linux-firmware-qca depend on all of the split-out qca packages. | ||
2116 | # Make linux-firmware-amdgpu depend on all of the split-out amdgpu packages. | ||
2117 | python populate_packages:prepend () { | ||
2118 | firmware_pkgs = oe.utils.packages_filter_out_system(d) | ||
2119 | d.appendVar('RRECOMMENDS:linux-firmware', ' ' + ' '.join(firmware_pkgs)) | ||
2120 | |||
2121 | iwlwifi_pkgs = filter(lambda x: x.find('-iwlwifi-') != -1, firmware_pkgs) | ||
2122 | d.appendVar('RRECOMMENDS:linux-firmware-iwlwifi', ' ' + ' '.join(iwlwifi_pkgs)) | ||
2123 | |||
2124 | ibt_pkgs = filter(lambda x: x.find('-ibt-') != -1, firmware_pkgs) | ||
2125 | d.appendVar('RRECOMMENDS:linux-firmware-ibt', ' ' + ' '.join(ibt_pkgs)) | ||
2126 | |||
2127 | ath10k_pkgs = filter(lambda x: x.find('-ath10k-') != -1, firmware_pkgs) | ||
2128 | d.appendVar('RRECOMMENDS:linux-firmware-ath10k', ' ' + ' '.join(ath10k_pkgs)) | ||
2129 | |||
2130 | ath11k_pkgs = filter(lambda x: x.find('-ath11k-') != -1, firmware_pkgs) | ||
2131 | d.appendVar('RRECOMMENDS:linux-firmware-ath11k', ' ' + ' '.join(ath11k_pkgs)) | ||
2132 | |||
2133 | ath12k_pkgs = filter(lambda x: x.find('-ath12k-') != -1, firmware_pkgs) | ||
2134 | d.appendVar('RRECOMMENDS:linux-firmware-ath12k', ' ' + ' '.join(ath12k_pkgs)) | ||
2135 | |||
2136 | qca_pkgs = filter(lambda x: x.find('-qca-') != -1, firmware_pkgs) | ||
2137 | d.appendVar('RRECOMMENDS:linux-firmware-qca', ' ' + ' '.join(qca_pkgs)) | ||
2138 | |||
2139 | amdgpu_pkgs = filter(lambda x: x.find('-amdgpu-') != -1, firmware_pkgs) | ||
2140 | d.appendVar('RRECOMMENDS:linux-firmware-amdgpu', ' ' + ' '.join(amdgpu_pkgs)) | ||
2141 | } | ||
2142 | |||
2143 | # Firmware files are generally not ran on the CPU, so they can be | ||
2144 | # allarch despite being architecture specific | ||
2145 | INSANE_SKIP = "arch" | ||
2146 | |||
2147 | # Don't warn about already stripped files | ||
2148 | INSANE_SKIP:${PN} = "already-stripped" | ||
2149 | |||
2150 | # No need to put firmware into the sysroot | ||
2151 | SYSROOT_DIRS_IGNORE += "${nonarch_base_libdir}/firmware" | ||
diff --git a/meta/recipes-kernel/linux-libc-headers/linux-libc-headers.inc b/meta/recipes-kernel/linux-libc-headers/linux-libc-headers.inc index 7ec94024c3..1f5c47f453 100644 --- a/meta/recipes-kernel/linux-libc-headers/linux-libc-headers.inc +++ b/meta/recipes-kernel/linux-libc-headers/linux-libc-headers.inc | |||
@@ -1,7 +1,8 @@ | |||
1 | SUMMARY = "Sanitized set of kernel headers for the C library's use" | 1 | SUMMARY = "Sanitized set of kernel headers for the C library's use" |
2 | HOMEPAGE = "https://www.kernel.org/" | ||
2 | DESCRIPTION = "Designed to maintain an Application Programming Interface (API) stable version of the Linux headers" | 3 | DESCRIPTION = "Designed to maintain an Application Programming Interface (API) stable version of the Linux headers" |
3 | SECTION = "devel" | 4 | SECTION = "devel" |
4 | LICENSE = "GPLv2" | 5 | LICENSE = "GPL-2.0-only" |
5 | 6 | ||
6 | ######################################################################### | 7 | ######################################################################### |
7 | #### PLEASE READ | 8 | #### PLEASE READ |
@@ -43,6 +44,8 @@ python __anonymous () { | |||
43 | d.setVar("HEADER_FETCH_VER", "4.x") | 44 | d.setVar("HEADER_FETCH_VER", "4.x") |
44 | elif major == "5": | 45 | elif major == "5": |
45 | d.setVar("HEADER_FETCH_VER", "5.x") | 46 | d.setVar("HEADER_FETCH_VER", "5.x") |
47 | elif major == "6": | ||
48 | d.setVar("HEADER_FETCH_VER", "6.x") | ||
46 | else: | 49 | else: |
47 | d.setVar("HEADER_FETCH_VER", "2.6") | 50 | d.setVar("HEADER_FETCH_VER", "2.6") |
48 | } | 51 | } |
@@ -57,7 +60,7 @@ KORG_ARCHIVE_COMPRESSION ?= "xz" | |||
57 | SRC_URI = "${KERNELORG_MIRROR}/linux/kernel/v${HEADER_FETCH_VER}/linux-${PV}.tar.${KORG_ARCHIVE_COMPRESSION}" | 60 | SRC_URI = "${KERNELORG_MIRROR}/linux/kernel/v${HEADER_FETCH_VER}/linux-${PV}.tar.${KORG_ARCHIVE_COMPRESSION}" |
58 | UPSTREAM_CHECK_URI = "https://www.kernel.org/" | 61 | UPSTREAM_CHECK_URI = "https://www.kernel.org/" |
59 | 62 | ||
60 | S = "${WORKDIR}/linux-${PV}" | 63 | S = "${UNPACKDIR}/linux-${PV}" |
61 | 64 | ||
62 | EXTRA_OEMAKE = " HOSTCC="${BUILD_CC}" HOSTCPP="${BUILD_CPP}"" | 65 | EXTRA_OEMAKE = " HOSTCC="${BUILD_CC}" HOSTCPP="${BUILD_CPP}"" |
63 | 66 | ||
@@ -74,15 +77,15 @@ do_install() { | |||
74 | find ${D}${includedir} -name ..install.cmd | xargs rm -f | 77 | find ${D}${includedir} -name ..install.cmd | xargs rm -f |
75 | } | 78 | } |
76 | 79 | ||
77 | do_install_append_aarch64 () { | 80 | do_install:append:aarch64 () { |
78 | do_install_armmultilib | 81 | do_install_armmultilib |
79 | } | 82 | } |
80 | 83 | ||
81 | do_install_append_arm () { | 84 | do_install:append:arm () { |
82 | do_install_armmultilib | 85 | do_install_armmultilib |
83 | } | 86 | } |
84 | 87 | ||
85 | do_install_append_armeb () { | 88 | do_install:append:armeb () { |
86 | do_install_armmultilib | 89 | do_install_armmultilib |
87 | } | 90 | } |
88 | 91 | ||
@@ -102,8 +105,8 @@ do_install_armmultilib () { | |||
102 | 105 | ||
103 | BBCLASSEXTEND = "nativesdk" | 106 | BBCLASSEXTEND = "nativesdk" |
104 | 107 | ||
105 | RDEPENDS_${PN}-dev = "" | 108 | DEV_PKG_DEPENDENCY = "" |
106 | RRECOMMENDS_${PN}-dbg = "${PN}-dev (= ${EXTENDPKGV})" | 109 | RRECOMMENDS:${PN}-dbg = "${PN}-dev (= ${EXTENDPKGV})" |
107 | 110 | ||
108 | INHIBIT_DEFAULT_DEPS = "1" | 111 | INHIBIT_DEFAULT_DEPS = "1" |
109 | DEPENDS += "unifdef-native bison-native rsync-native" | 112 | DEPENDS += "unifdef-native bison-native rsync-native" |
diff --git a/meta/recipes-kernel/linux-libc-headers/linux-libc-headers/0001-include-linux-stddef.h-in-swab.h-uapi-header.patch b/meta/recipes-kernel/linux-libc-headers/linux-libc-headers/0001-include-linux-stddef.h-in-swab.h-uapi-header.patch deleted file mode 100644 index 5b7c1b6e21..0000000000 --- a/meta/recipes-kernel/linux-libc-headers/linux-libc-headers/0001-include-linux-stddef.h-in-swab.h-uapi-header.patch +++ /dev/null | |||
@@ -1,42 +0,0 @@ | |||
1 | From dc221138c809125dc1bbff8506c70cb7bd846368 Mon Sep 17 00:00:00 2001 | ||
2 | From: Khem Raj <raj.khem@gmail.com> | ||
3 | Date: Wed, 12 Sep 2018 17:08:58 -0700 | ||
4 | Subject: [PATCH] include linux/stddef.h in swab.h uapi header | ||
5 | |||
6 | swab.h uses __always_inline without including the header where it is | ||
7 | defined, this is exposed by musl based distributions where this macro is | ||
8 | not defined by system C library headers unlike glibc where it is defined | ||
9 | in sys/cdefs.h and that header gets pulled in indirectly via | ||
10 | |||
11 | features.h -> sys/cdefs.h | ||
12 | |||
13 | and features.h gets pulled in a lot of headers. Therefore it may work in | ||
14 | cases where features.h is includes but not otherwise. | ||
15 | |||
16 | Adding linux/stddef.h here ensures that __always_inline is always | ||
17 | defined independent of which C library is used in userspace | ||
18 | |||
19 | Upstream-Status: Submitted [https://lkml.org/lkml/2018/9/13/78] | ||
20 | |||
21 | Signed-off-by: Khem Raj <raj.khem@gmail.com> | ||
22 | Cc: Philippe Ombredanne <pombredanne@nexb.com> | ||
23 | Cc: Kate Stewart <kstewart@linuxfoundation.org> | ||
24 | Cc: Greg Kroah-Hartman <gregkh@linuxfoundation.org> | ||
25 | Cc: Thomas Gleixner <tglx@linutronix.de> | ||
26 | |||
27 | --- | ||
28 | include/uapi/linux/swab.h | 1 + | ||
29 | 1 file changed, 1 insertion(+) | ||
30 | |||
31 | diff --git a/include/uapi/linux/swab.h b/include/uapi/linux/swab.h | ||
32 | index 7272f85d6..2912fe463 100644 | ||
33 | --- a/include/uapi/linux/swab.h | ||
34 | +++ b/include/uapi/linux/swab.h | ||
35 | @@ -3,6 +3,7 @@ | ||
36 | #define _UAPI_LINUX_SWAB_H | ||
37 | |||
38 | #include <linux/types.h> | ||
39 | +#include <linux/stddef.h> | ||
40 | #include <linux/compiler.h> | ||
41 | #include <asm/bitsperlong.h> | ||
42 | #include <asm/swab.h> | ||
diff --git a/meta/recipes-kernel/linux-libc-headers/linux-libc-headers/0001-kbuild-install_headers.sh-Strip-_UAPI-from-if-define.patch b/meta/recipes-kernel/linux-libc-headers/linux-libc-headers/0001-kbuild-install_headers.sh-Strip-_UAPI-from-if-define.patch deleted file mode 100644 index 54528b6e6a..0000000000 --- a/meta/recipes-kernel/linux-libc-headers/linux-libc-headers/0001-kbuild-install_headers.sh-Strip-_UAPI-from-if-define.patch +++ /dev/null | |||
@@ -1,38 +0,0 @@ | |||
1 | From 9ca6c6a510bda90954aa2532711200b89dd1df89 Mon Sep 17 00:00:00 2001 | ||
2 | From: Dave Martin <Dave.Martin@arm.com> | ||
3 | Date: Tue, 11 Dec 2018 19:26:45 +0000 | ||
4 | Subject: [PATCH 1/3] kbuild: install_headers.sh: Strip _UAPI from | ||
5 | #if-defined() guards | ||
6 | |||
7 | install_headers.sh knows how to strip the _UAPI prefix from #ifdef/ | ||
8 | ifndef and #define directives used to guard headers against multiple | ||
9 | or inappropriate inclusion. Currently this does not work for guards | ||
10 | in the "#if defined()" style, which may be needed for non-trivial | ||
11 | cases. | ||
12 | |||
13 | This patch adds similar logic so that the _UAPI prefix is also | ||
14 | stripped from guard directives written using "#if defined()" etc. | ||
15 | |||
16 | This is not completely foolproof, but will work for simple cases of | ||
17 | using #if defined() to guard against inappropriate header inclusion. | ||
18 | |||
19 | Signed-off-by: Dave Martin <Dave.Martin@arm.com> | ||
20 | Signed-off-by: Bruce Ashfield <bruce.ashfield@windriver.com> | ||
21 | |||
22 | Upstream-Status: Submitted [https://www.spinics.net/lists/arm-kernel/msg694800.html] | ||
23 | --- | ||
24 | scripts/headers_install.sh | 1 + | ||
25 | 1 file changed, 1 insertion(+) | ||
26 | |||
27 | Index: linux-5.4/scripts/headers_install.sh | ||
28 | =================================================================== | ||
29 | --- linux-5.4.orig/scripts/headers_install.sh | ||
30 | +++ linux-5.4/scripts/headers_install.sh | ||
31 | @@ -36,6 +36,7 @@ | ||
32 | s/(^|[^a-zA-Z0-9])__packed([^a-zA-Z0-9_]|$)/\1__attribute__((packed))\2/g | ||
33 | s/(^|[[:space:](])(inline|asm|volatile)([[:space:](]|$)/\1__\2__\3/g | ||
34 | s@#(ifndef|define|endif[[:space:]]*/[*])[[:space:]]*_UAPI@#\1 @ | ||
35 | + :1;s/(#(if|elif)(.*[^A-Za-z0-9_])defined\([[:space:]]*)_UAPI/\1/;t1 | ||
36 | ' $INFILE > $TMPFILE || exit 1 | ||
37 | |||
38 | scripts/unifdef -U__KERNEL__ -D__EXPORTED_HEADERS__ $TMPFILE > $OUTFILE | ||
diff --git a/meta/recipes-kernel/linux-libc-headers/linux-libc-headers/0001-scripts-Use-fixed-input-and-output-files-instead-of-.patch b/meta/recipes-kernel/linux-libc-headers/linux-libc-headers/0001-scripts-Use-fixed-input-and-output-files-instead-of-.patch deleted file mode 100644 index a5ded602e5..0000000000 --- a/meta/recipes-kernel/linux-libc-headers/linux-libc-headers/0001-scripts-Use-fixed-input-and-output-files-instead-of-.patch +++ /dev/null | |||
@@ -1,67 +0,0 @@ | |||
1 | From 694eba7bb974f6b8bd308804cb24350150108b2b Mon Sep 17 00:00:00 2001 | ||
2 | From: He Zhe <zhe.he@windriver.com> | ||
3 | Date: Wed, 21 Nov 2018 15:12:43 +0800 | ||
4 | Subject: [PATCH] scripts: Use fixed input and output files instead of pipe for here-doc | ||
5 | |||
6 | There was a bug of "as" in binutils that when it checks if the input file and | ||
7 | output file are the same one, it would not check if they are on the same block | ||
8 | device. The check is introduced by the following commit in v2.31. | ||
9 | |||
10 | https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;a=commit;h= | ||
11 | 67f846b59b32f3d704c601669409c2584383fea9 | ||
12 | |||
13 | The here-doc usage in this script creates temporary file in /tmp. When we run in | ||
14 | an environment where /tmp has rarely been used, the newly created temporary file | ||
15 | may have a very low inode number. If the inode number was 6 which is the same as | ||
16 | /dev/null, the as would wrongly think the input file and the output file are the | ||
17 | same and report the following error. | ||
18 | |||
19 | *** Compiler lacks asm-goto support.. Stop. | ||
20 | |||
21 | One observed case happened in docker where the /tmp could be so rarely used that | ||
22 | very low number inode may be allocated and triggers the error. | ||
23 | |||
24 | The fix below for the bug only exists on the master branch of binutils so far | ||
25 | and has not been released from upstream. As the convict is introduced since | ||
26 | v2.31, only v2.31 is affected. | ||
27 | |||
28 | https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;a=commit;h= | ||
29 | 2a50366ded329bfb39d387253450c9d5302c3503 | ||
30 | |||
31 | When building linux-libc-headers we need to use "as" in binutils which does not | ||
32 | contain the fix for the moment. To work around the error, we create a fixed | ||
33 | temporary file to contain the program being tested. | ||
34 | |||
35 | This patch also removes ">/dev/null 2>&1" so we will have more direct error | ||
36 | information in case something else wrong happened. | ||
37 | |||
38 | Upstream-Status: Inappropriate [A work around for binutils v2.31] | ||
39 | |||
40 | Signed-off-by: He Zhe <zhe.he@windriver.com> | ||
41 | --- | ||
42 | scripts/gcc-goto.sh | 5 ++++- | ||
43 | 1 file changed, 4 insertions(+), 1 deletion(-) | ||
44 | |||
45 | diff --git a/scripts/gcc-goto.sh b/scripts/gcc-goto.sh | ||
46 | index 8b980fb22..d256a9438 100755 | ||
47 | --- a/scripts/gcc-goto.sh | ||
48 | +++ b/scripts/gcc-goto.sh | ||
49 | @@ -3,7 +3,7 @@ | ||
50 | # Test for gcc 'asm goto' support | ||
51 | # Copyright (C) 2010, Jason Baron <jbaron@redhat.com> | ||
52 | |||
53 | -cat << "END" | $@ -x c - -fno-PIE -c -o /dev/null | ||
54 | +cat << "END" > ./input | ||
55 | int main(void) | ||
56 | { | ||
57 | #if defined(__arm__) || defined(__aarch64__) | ||
58 | @@ -20,3 +20,6 @@ entry: | ||
59 | return 0; | ||
60 | } | ||
61 | END | ||
62 | + | ||
63 | +$@ -x c ./input -fno-PIE -c -o ./output | ||
64 | +rm ./input ./output | ||
65 | -- | ||
66 | 2.19.1 | ||
67 | |||
diff --git a/meta/recipes-kernel/linux-libc-headers/linux-libc-headers/0003-remove-inclusion-of-sysinfo.h-in-kernel.h.patch b/meta/recipes-kernel/linux-libc-headers/linux-libc-headers/0003-remove-inclusion-of-sysinfo.h-in-kernel.h.patch index b5c4e1750e..b0e7014138 100644 --- a/meta/recipes-kernel/linux-libc-headers/linux-libc-headers/0003-remove-inclusion-of-sysinfo.h-in-kernel.h.patch +++ b/meta/recipes-kernel/linux-libc-headers/linux-libc-headers/0003-remove-inclusion-of-sysinfo.h-in-kernel.h.patch | |||
@@ -13,17 +13,17 @@ Upstream-Status: Submitted | |||
13 | include/uapi/linux/kernel.h | 2 ++ | 13 | include/uapi/linux/kernel.h | 2 ++ |
14 | 1 file changed, 2 insertions(+) | 14 | 1 file changed, 2 insertions(+) |
15 | 15 | ||
16 | Index: linux-4.8-rc4/include/uapi/linux/kernel.h | 16 | Index: linux-5.12.11/include/uapi/linux/kernel.h |
17 | =================================================================== | 17 | =================================================================== |
18 | --- linux-4.8-rc4.orig/include/uapi/linux/kernel.h | 18 | --- linux-5.12.11.orig/include/uapi/linux/kernel.h |
19 | +++ linux-4.8-rc4/include/uapi/linux/kernel.h | 19 | +++ linux-5.12.11/include/uapi/linux/kernel.h |
20 | @@ -1,7 +1,9 @@ | 20 | @@ -2,7 +2,9 @@ |
21 | #ifndef _UAPI_LINUX_KERNEL_H | 21 | #ifndef _UAPI_LINUX_KERNEL_H |
22 | #define _UAPI_LINUX_KERNEL_H | 22 | #define _UAPI_LINUX_KERNEL_H |
23 | 23 | ||
24 | +#ifdef __GLIBC__ | 24 | +#ifdef __GLIBC__ |
25 | #include <linux/sysinfo.h> | 25 | #include <linux/sysinfo.h> |
26 | #include <linux/const.h> | ||
26 | +#endif | 27 | +#endif |
27 | 28 | ||
28 | /* | 29 | #endif /* _UAPI_LINUX_KERNEL_H */ |
29 | * 'kernel.h' contains some often-used function prototypes etc | ||
diff --git a/meta/recipes-kernel/linux-libc-headers/linux-libc-headers_5.10.bb b/meta/recipes-kernel/linux-libc-headers/linux-libc-headers_5.10.bb deleted file mode 100644 index d6a4d5aa61..0000000000 --- a/meta/recipes-kernel/linux-libc-headers/linux-libc-headers_5.10.bb +++ /dev/null | |||
@@ -1,19 +0,0 @@ | |||
1 | require linux-libc-headers.inc | ||
2 | |||
3 | SRC_URI_append_libc-musl = "\ | ||
4 | file://0001-libc-compat.h-fix-some-issues-arising-from-in6.h.patch \ | ||
5 | file://0003-remove-inclusion-of-sysinfo.h-in-kernel.h.patch \ | ||
6 | file://0001-libc-compat.h-musl-_does_-define-IFF_LOWER_UP-DORMAN.patch \ | ||
7 | file://0001-include-linux-stddef.h-in-swab.h-uapi-header.patch \ | ||
8 | " | ||
9 | |||
10 | SRC_URI_append = "\ | ||
11 | file://0001-scripts-Use-fixed-input-and-output-files-instead-of-.patch \ | ||
12 | file://0001-kbuild-install_headers.sh-Strip-_UAPI-from-if-define.patch \ | ||
13 | " | ||
14 | |||
15 | LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" | ||
16 | |||
17 | SRC_URI[md5sum] = "753adc474bf799d569dec4f165ed92c3" | ||
18 | SRC_URI[sha256sum] = "dcdf99e43e98330d925016985bfbc7b83c66d367b714b2de0cbbfcbf83d8ca43" | ||
19 | |||
diff --git a/meta/recipes-kernel/linux-libc-headers/linux-libc-headers_6.12.bb b/meta/recipes-kernel/linux-libc-headers/linux-libc-headers_6.12.bb new file mode 100644 index 0000000000..dd6add38de --- /dev/null +++ b/meta/recipes-kernel/linux-libc-headers/linux-libc-headers_6.12.bb | |||
@@ -0,0 +1,12 @@ | |||
1 | require linux-libc-headers.inc | ||
2 | |||
3 | SRC_URI:append:libc-musl = "\ | ||
4 | file://0001-libc-compat.h-fix-some-issues-arising-from-in6.h.patch \ | ||
5 | file://0003-remove-inclusion-of-sysinfo.h-in-kernel.h.patch \ | ||
6 | file://0001-libc-compat.h-musl-_does_-define-IFF_LOWER_UP-DORMAN.patch \ | ||
7 | " | ||
8 | |||
9 | LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" | ||
10 | |||
11 | SRC_URI[sha256sum] = "b1a2562be56e42afb3f8489d4c2a7ac472ac23098f1ef1c1e40da601f54625eb" | ||
12 | |||
diff --git a/meta/recipes-kernel/linux/cve-exclusion.inc b/meta/recipes-kernel/linux/cve-exclusion.inc new file mode 100644 index 0000000000..80c76433ef --- /dev/null +++ b/meta/recipes-kernel/linux/cve-exclusion.inc | |||
@@ -0,0 +1,159 @@ | |||
1 | CVE_STATUS[CVE-1999-0656] = "not-applicable-config: specific to ugidd, part of the old user-mode NFS server" | ||
2 | |||
3 | CVE_STATUS[CVE-2006-2932] = "not-applicable-platform: specific to RHEL" | ||
4 | |||
5 | CVE_STATUS[CVE-2007-2764] = "not-applicable-platform: specific to Sun/Brocade SilkWorm switches" | ||
6 | |||
7 | CVE_STATUS[CVE-2007-4998] = "cpe-incorrect: a historic cp bug, no longer an issue as per https://bugzilla.redhat.com/show_bug.cgi?id=356471#c5" | ||
8 | |||
9 | CVE_STATUS[CVE-2008-2544] = "disputed: not an issue as per https://bugzilla.redhat.com/show_bug.cgi?id=449089#c22" | ||
10 | |||
11 | CVE_STATUS[CVE-2010-0298] = "fixed-version: 2.6.34 (1871c6)" | ||
12 | |||
13 | CVE_STATUS[CVE-2014-2648] = "cpe-incorrect: not Linux" | ||
14 | |||
15 | CVE_STATUS[CVE-2016-0774] = "ignored: result of incomplete backport" | ||
16 | |||
17 | CVE_STATUS[CVE-2016-3695] = "not-applicable-platform: specific to RHEL with securelevel patches" | ||
18 | |||
19 | CVE_STATUS[CVE-2016-3699] = "not-applicable-platform: specific to RHEL with securelevel patches" | ||
20 | |||
21 | CVE_STATUS[CVE-2017-6264] = "not-applicable-platform: Android specific" | ||
22 | |||
23 | CVE_STATUS[CVE-2017-1000377] = "not-applicable-platform: GRSecurity specific" | ||
24 | |||
25 | CVE_STATUS[CVE-2018-6559] = "not-applicable-platform: Issue only affects Ubuntu" | ||
26 | |||
27 | CVE_STATUS[CVE-2020-11935] = "not-applicable-config: Issue only affects aufs, which is not in linux-yocto" | ||
28 | |||
29 | # Introduced in version v6.1 7b88bda3761b95856cf97822efe8281c8100067b | ||
30 | # Patched in kernel since v6.2 4a625ceee8a0ab0273534cb6b432ce6b331db5ee | ||
31 | # But, the CVE is disputed: | ||
32 | CVE_STATUS[CVE-2023-23005] = "disputed: There are no realistic cases \ | ||
33 | in which a user can cause the alloc_memory_type error case to be reached. \ | ||
34 | See: https://bugzilla.suse.com/show_bug.cgi?id=1208844#c2" | ||
35 | |||
36 | # Old CVES taken before using new data from kernel CNA | ||
37 | |||
38 | CVE_STATUS[CVE-2014-8171] = "fixed-version: Fixed from version 3.12rc1" | ||
39 | |||
40 | CVE_STATUS[CVE-2017-1000255] = "fixed-version: Fixed from version 4.14rc5" | ||
41 | |||
42 | CVE_STATUS[CVE-2018-10840] = "fixed-version: Fixed from version 4.18rc1" | ||
43 | |||
44 | CVE_STATUS[CVE-2018-10876] = "fixed-version: Fixed from version 4.18rc4" | ||
45 | |||
46 | CVE_STATUS[CVE-2018-10882] = "fixed-version: Fixed from version 4.18rc4" | ||
47 | |||
48 | CVE_STATUS[CVE-2018-10902] = "fixed-version: Fixed from version 4.18rc6" | ||
49 | |||
50 | CVE_STATUS[CVE-2018-14625] = "fixed-version: Fixed from version 4.20rc6" | ||
51 | |||
52 | CVE_STATUS[CVE-2019-3016] = "fixed-version: Fixed from version 5.6rc1" | ||
53 | |||
54 | CVE_STATUS[CVE-2019-3819] = "fixed-version: Fixed from version 5.0rc6" | ||
55 | |||
56 | CVE_STATUS[CVE-2019-3887] = "fixed-version: Fixed from version 5.1rc4" | ||
57 | |||
58 | CVE_STATUS[CVE-2020-10742] = "fixed-version: Fixed from version 3.16rc1" | ||
59 | |||
60 | CVE_STATUS[CVE-2020-16119] = "fixed-version: Fixed from version 5.15rc2" | ||
61 | |||
62 | CVE_STATUS[CVE-2020-1749] = "fixed-version: Fixed from version 5.5rc1" | ||
63 | |||
64 | CVE_STATUS[CVE-2020-25672] = "fixed-version: Fixed from version 5.12rc7" | ||
65 | |||
66 | CVE_STATUS[CVE-2020-27815] = "fixed-version: Fixed from version 5.11rc1" | ||
67 | |||
68 | CVE_STATUS[CVE-2020-8834] = "fixed-version: Fixed from version 4.18rc1" | ||
69 | |||
70 | CVE_STATUS[CVE-2021-20194] = "fixed-version: Fixed from version 5.10rc1" | ||
71 | |||
72 | CVE_STATUS[CVE-2021-20265] = "fixed-version: Fixed from version 4.5rc3" | ||
73 | |||
74 | CVE_STATUS[CVE-2021-3564] = "fixed-version: Fixed from version 5.13rc5" | ||
75 | |||
76 | CVE_STATUS[CVE-2021-3669] = "fixed-version: Fixed from version 5.15rc1" | ||
77 | |||
78 | CVE_STATUS[CVE-2021-3759] = "fixed-version: Fixed from version 5.15rc1" | ||
79 | |||
80 | CVE_STATUS[CVE-2021-4218] = "fixed-version: Fixed from version 5.8rc1" | ||
81 | |||
82 | CVE_STATUS[CVE-2022-0286] = "fixed-version: Fixed from version 5.14rc2" | ||
83 | |||
84 | CVE_STATUS[CVE-2022-1462] = "fixed-version: Fixed from version 5.19rc7" | ||
85 | |||
86 | CVE_STATUS[CVE-2022-2308] = "fixed-version: Fixed from version 6.0" | ||
87 | |||
88 | CVE_STATUS[CVE-2022-2327] = "fixed-version: Fixed from version 5.12rc1" | ||
89 | |||
90 | CVE_STATUS[CVE-2022-2663] = "fixed-version: Fixed from version 6.0rc5" | ||
91 | |||
92 | CVE_STATUS[CVE-2022-2785] = "fixed-version: Fixed from version 6.0rc1" | ||
93 | |||
94 | CVE_STATUS[CVE-2022-3435] = "fixed-version: Fixed from version 6.1rc1" | ||
95 | |||
96 | CVE_STATUS[CVE-2022-3523] = "fixed-version: Fixed from version 6.1rc1" | ||
97 | |||
98 | CVE_STATUS[CVE-2022-3534] = "fixed-version: Fixed from version 6.2rc1" | ||
99 | |||
100 | CVE_STATUS[CVE-2022-3566] = "fixed-version: Fixed from version 6.1rc1" | ||
101 | |||
102 | CVE_STATUS[CVE-2022-3567] = "fixed-version: Fixed from version 6.1rc1" | ||
103 | |||
104 | CVE_STATUS[CVE-2022-3619] = "fixed-version: Fixed from version 6.1rc4" | ||
105 | |||
106 | CVE_STATUS[CVE-2022-3621] = "fixed-version: Fixed from version 6.1rc1" | ||
107 | |||
108 | CVE_STATUS[CVE-2022-3624] = "fixed-version: Fixed from version 6.0rc1" | ||
109 | |||
110 | CVE_STATUS[CVE-2022-3629] = "fixed-version: Fixed from version 6.0rc1" | ||
111 | |||
112 | CVE_STATUS[CVE-2022-3630] = "fixed-version: Fixed from version 6.0rc1" | ||
113 | |||
114 | CVE_STATUS[CVE-2022-3633] = "fixed-version: Fixed from version 6.0rc1" | ||
115 | |||
116 | CVE_STATUS[CVE-2022-3636] = "fixed-version: Fixed from version 5.19rc1" | ||
117 | |||
118 | CVE_STATUS[CVE-2022-36402] = "fixed-version: Fixed from version 6.5" | ||
119 | |||
120 | CVE_STATUS[CVE-2022-3646] = "fixed-version: Fixed from version 6.1rc1" | ||
121 | |||
122 | CVE_STATUS[CVE-2022-42895] = "fixed-version: Fixed from version 6.1rc4" | ||
123 | |||
124 | CVE_STATUS[CVE-2022-4382] = "fixed-version: Fixed from version 6.2rc5" | ||
125 | |||
126 | CVE_STATUS[CVE-2023-1073] = "fixed-version: Fixed from version 6.2rc5" | ||
127 | |||
128 | CVE_STATUS[CVE-2023-1074] = "fixed-version: Fixed from version 6.2rc6" | ||
129 | |||
130 | CVE_STATUS[CVE-2023-1075] = "fixed-version: Fixed from version 6.2rc7" | ||
131 | |||
132 | CVE_STATUS[CVE-2023-1076] = "fixed-version: Fixed from version 6.3rc1" | ||
133 | |||
134 | CVE_STATUS[CVE-2023-2898] = "fixed-version: Fixed from version 6.5rc1" | ||
135 | |||
136 | CVE_STATUS[CVE-2023-3079] = "not-applicable-config: Issue only affects chromium, which is not in linux-yocto" | ||
137 | |||
138 | CVE_STATUS[CVE-2023-3772] = "fixed-version: Fixed from version 6.5rc7" | ||
139 | |||
140 | CVE_STATUS[CVE-2023-3773] = "fixed-version: Fixed from version 6.5rc7" | ||
141 | |||
142 | CVE_STATUS[CVE-2023-4155] = "fixed-version: Fixed from version 6.5rc6" | ||
143 | |||
144 | CVE_STATUS[CVE-2023-6176] = "fixed-version: Fixed from version 6.6rc2" | ||
145 | |||
146 | # Fix https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=f98364e926626c678fb4b9004b75cacf92ff0662 | ||
147 | CVE_STATUS[CVE-2023-6270] = "fixed-version: Fixed from 6.9" | ||
148 | |||
149 | # Fix https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=567320c46a60a3c39b69aa1df802d753817a3f86 | ||
150 | CVE_STATUS[CVE-2023-6610] = "fixed-version: Fixed from 6.7rc7" | ||
151 | |||
152 | #Fix https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=65c95f78917ea6fa7ff189a2c19879c4fe161873 | ||
153 | CVE_STATUS[CVE-2023-6679] = "fixed-version: Fixed from 6.7rc6" | ||
154 | |||
155 | #Fix https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=ad25ee36f00172f7d53242dc77c69fff7ced0755 | ||
156 | CVE_STATUS[CVE-2023-7042] = "fixed-version: Fixed from 6.9rc1" | ||
157 | |||
158 | #Fix https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=7315dc1e122c85ffdfc8defffbb8f8b616c2eb1a | ||
159 | CVE_STATUS[CVE-2024-0193] = "fixed-version: Fixed from 6.7" | ||
diff --git a/meta/recipes-kernel/linux/cve-exclusion_6.12.inc b/meta/recipes-kernel/linux/cve-exclusion_6.12.inc new file mode 100644 index 0000000000..b6082edf5c --- /dev/null +++ b/meta/recipes-kernel/linux/cve-exclusion_6.12.inc | |||
@@ -0,0 +1,13023 @@ | |||
1 | |||
2 | # Auto-generated CVE metadata, DO NOT EDIT BY HAND. | ||
3 | # Generated at 2025-06-05 16:29:20.725105+00:00 for kernel version 6.12.31 | ||
4 | # From cvelistV5 cve_2025-06-05_1600Z | ||
5 | |||
6 | python check_kernel_cve_status_version() { | ||
7 | this_version = "6.12.31" | ||
8 | kernel_version = d.getVar("LINUX_VERSION") | ||
9 | if kernel_version != this_version: | ||
10 | bb.warn("Kernel CVE status needs updating: generated for %s but kernel is %s" % (this_version, kernel_version)) | ||
11 | } | ||
12 | do_cve_check[prefuncs] += "check_kernel_cve_status_version" | ||
13 | |||
14 | CVE_STATUS[CVE-2019-25160] = "fixed-version: Fixed from version 5.0" | ||
15 | |||
16 | CVE_STATUS[CVE-2019-25162] = "fixed-version: Fixed from version 6.0" | ||
17 | |||
18 | # CVE-2019-3459 has no known resolution | ||
19 | |||
20 | # CVE-2019-3460 has no known resolution | ||
21 | |||
22 | CVE_STATUS[CVE-2020-36775] = "fixed-version: Fixed from version 5.7" | ||
23 | |||
24 | CVE_STATUS[CVE-2020-36776] = "fixed-version: Fixed from version 5.13" | ||
25 | |||
26 | CVE_STATUS[CVE-2020-36777] = "fixed-version: Fixed from version 5.13" | ||
27 | |||
28 | CVE_STATUS[CVE-2020-36778] = "fixed-version: Fixed from version 5.13" | ||
29 | |||
30 | CVE_STATUS[CVE-2020-36779] = "fixed-version: Fixed from version 5.13" | ||
31 | |||
32 | CVE_STATUS[CVE-2020-36780] = "fixed-version: Fixed from version 5.13" | ||
33 | |||
34 | CVE_STATUS[CVE-2020-36781] = "fixed-version: Fixed from version 5.13" | ||
35 | |||
36 | CVE_STATUS[CVE-2020-36782] = "fixed-version: Fixed from version 5.13" | ||
37 | |||
38 | CVE_STATUS[CVE-2020-36783] = "fixed-version: Fixed from version 5.13" | ||
39 | |||
40 | CVE_STATUS[CVE-2020-36784] = "fixed-version: Fixed from version 5.13" | ||
41 | |||
42 | CVE_STATUS[CVE-2020-36785] = "fixed-version: Fixed from version 5.13" | ||
43 | |||
44 | CVE_STATUS[CVE-2020-36786] = "fixed-version: Fixed from version 5.13" | ||
45 | |||
46 | CVE_STATUS[CVE-2020-36787] = "fixed-version: Fixed from version 5.13" | ||
47 | |||
48 | CVE_STATUS[CVE-2020-36788] = "fixed-version: Fixed from version 5.15" | ||
49 | |||
50 | CVE_STATUS[CVE-2020-36789] = "fixed-version: Fixed from version 5.10" | ||
51 | |||
52 | CVE_STATUS[CVE-2020-36790] = "fixed-version: Fixed from version 5.9" | ||
53 | |||
54 | CVE_STATUS[CVE-2020-36791] = "fixed-version: Fixed from version 5.5.14" | ||
55 | |||
56 | # CVE-2021-28688 has no known resolution | ||
57 | |||
58 | # CVE-2021-28691 has no known resolution | ||
59 | |||
60 | # CVE-2021-28711 has no known resolution | ||
61 | |||
62 | # CVE-2021-28712 has no known resolution | ||
63 | |||
64 | # CVE-2021-28713 has no known resolution | ||
65 | |||
66 | # CVE-2021-28714 has no known resolution | ||
67 | |||
68 | # CVE-2021-28715 has no known resolution | ||
69 | |||
70 | CVE_STATUS[CVE-2021-46904] = "fixed-version: Fixed from version 5.12" | ||
71 | |||
72 | CVE_STATUS[CVE-2021-46905] = "fixed-version: Fixed from version 5.13" | ||
73 | |||
74 | CVE_STATUS[CVE-2021-46906] = "fixed-version: Fixed from version 5.13" | ||
75 | |||
76 | CVE_STATUS[CVE-2021-46908] = "fixed-version: Fixed from version 5.12" | ||
77 | |||
78 | CVE_STATUS[CVE-2021-46909] = "fixed-version: Fixed from version 5.12" | ||
79 | |||
80 | CVE_STATUS[CVE-2021-46910] = "fixed-version: Fixed from version 5.12" | ||
81 | |||
82 | CVE_STATUS[CVE-2021-46911] = "fixed-version: Fixed from version 5.12" | ||
83 | |||
84 | CVE_STATUS[CVE-2021-46912] = "fixed-version: Fixed from version 5.12" | ||
85 | |||
86 | CVE_STATUS[CVE-2021-46913] = "fixed-version: Fixed from version 5.12" | ||
87 | |||
88 | CVE_STATUS[CVE-2021-46914] = "fixed-version: Fixed from version 5.12" | ||
89 | |||
90 | CVE_STATUS[CVE-2021-46915] = "fixed-version: Fixed from version 5.12" | ||
91 | |||
92 | CVE_STATUS[CVE-2021-46916] = "fixed-version: Fixed from version 5.12" | ||
93 | |||
94 | CVE_STATUS[CVE-2021-46917] = "fixed-version: Fixed from version 5.12" | ||
95 | |||
96 | CVE_STATUS[CVE-2021-46918] = "fixed-version: Fixed from version 5.12" | ||
97 | |||
98 | CVE_STATUS[CVE-2021-46919] = "fixed-version: Fixed from version 5.12" | ||
99 | |||
100 | CVE_STATUS[CVE-2021-46920] = "fixed-version: Fixed from version 5.12" | ||
101 | |||
102 | CVE_STATUS[CVE-2021-46921] = "fixed-version: Fixed from version 5.12" | ||
103 | |||
104 | CVE_STATUS[CVE-2021-46922] = "fixed-version: Fixed from version 5.11.17" | ||
105 | |||
106 | CVE_STATUS[CVE-2021-46923] = "fixed-version: Fixed from version 5.16" | ||
107 | |||
108 | CVE_STATUS[CVE-2021-46924] = "fixed-version: Fixed from version 5.16" | ||
109 | |||
110 | CVE_STATUS[CVE-2021-46925] = "fixed-version: Fixed from version 5.16" | ||
111 | |||
112 | CVE_STATUS[CVE-2021-46926] = "fixed-version: Fixed from version 5.16" | ||
113 | |||
114 | CVE_STATUS[CVE-2021-46927] = "fixed-version: Fixed from version 5.16" | ||
115 | |||
116 | CVE_STATUS[CVE-2021-46928] = "fixed-version: Fixed from version 5.16" | ||
117 | |||
118 | CVE_STATUS[CVE-2021-46929] = "fixed-version: Fixed from version 5.16" | ||
119 | |||
120 | CVE_STATUS[CVE-2021-46930] = "fixed-version: Fixed from version 5.16" | ||
121 | |||
122 | CVE_STATUS[CVE-2021-46931] = "fixed-version: Fixed from version 5.16" | ||
123 | |||
124 | CVE_STATUS[CVE-2021-46932] = "fixed-version: Fixed from version 5.16" | ||
125 | |||
126 | CVE_STATUS[CVE-2021-46933] = "fixed-version: Fixed from version 5.16" | ||
127 | |||
128 | CVE_STATUS[CVE-2021-46934] = "fixed-version: Fixed from version 5.16" | ||
129 | |||
130 | CVE_STATUS[CVE-2021-46935] = "fixed-version: Fixed from version 5.16" | ||
131 | |||
132 | CVE_STATUS[CVE-2021-46936] = "fixed-version: Fixed from version 5.16" | ||
133 | |||
134 | CVE_STATUS[CVE-2021-46937] = "fixed-version: Fixed from version 5.16" | ||
135 | |||
136 | CVE_STATUS[CVE-2021-46938] = "fixed-version: Fixed from version 5.13" | ||
137 | |||
138 | CVE_STATUS[CVE-2021-46939] = "fixed-version: Fixed from version 5.13" | ||
139 | |||
140 | CVE_STATUS[CVE-2021-46940] = "fixed-version: Fixed from version 5.13" | ||
141 | |||
142 | CVE_STATUS[CVE-2021-46941] = "fixed-version: Fixed from version 5.13" | ||
143 | |||
144 | CVE_STATUS[CVE-2021-46942] = "fixed-version: Fixed from version 5.13" | ||
145 | |||
146 | CVE_STATUS[CVE-2021-46943] = "fixed-version: Fixed from version 5.13" | ||
147 | |||
148 | CVE_STATUS[CVE-2021-46944] = "fixed-version: Fixed from version 5.13" | ||
149 | |||
150 | CVE_STATUS[CVE-2021-46945] = "fixed-version: Fixed from version 5.13" | ||
151 | |||
152 | CVE_STATUS[CVE-2021-46947] = "fixed-version: Fixed from version 5.13" | ||
153 | |||
154 | CVE_STATUS[CVE-2021-46948] = "fixed-version: Fixed from version 5.13" | ||
155 | |||
156 | CVE_STATUS[CVE-2021-46949] = "fixed-version: Fixed from version 5.13" | ||
157 | |||
158 | CVE_STATUS[CVE-2021-46950] = "fixed-version: Fixed from version 5.13" | ||
159 | |||
160 | CVE_STATUS[CVE-2021-46951] = "fixed-version: Fixed from version 5.13" | ||
161 | |||
162 | CVE_STATUS[CVE-2021-46952] = "fixed-version: Fixed from version 5.13" | ||
163 | |||
164 | CVE_STATUS[CVE-2021-46953] = "fixed-version: Fixed from version 5.13" | ||
165 | |||
166 | CVE_STATUS[CVE-2021-46954] = "fixed-version: Fixed from version 5.13" | ||
167 | |||
168 | CVE_STATUS[CVE-2021-46955] = "fixed-version: Fixed from version 5.13" | ||
169 | |||
170 | CVE_STATUS[CVE-2021-46956] = "fixed-version: Fixed from version 5.13" | ||
171 | |||
172 | CVE_STATUS[CVE-2021-46957] = "fixed-version: Fixed from version 5.13" | ||
173 | |||
174 | CVE_STATUS[CVE-2021-46958] = "fixed-version: Fixed from version 5.13" | ||
175 | |||
176 | CVE_STATUS[CVE-2021-46959] = "fixed-version: Fixed from version 5.13" | ||
177 | |||
178 | CVE_STATUS[CVE-2021-46960] = "fixed-version: Fixed from version 5.13" | ||
179 | |||
180 | CVE_STATUS[CVE-2021-46961] = "fixed-version: Fixed from version 5.13" | ||
181 | |||
182 | CVE_STATUS[CVE-2021-46962] = "fixed-version: Fixed from version 5.13" | ||
183 | |||
184 | CVE_STATUS[CVE-2021-46963] = "fixed-version: Fixed from version 5.13" | ||
185 | |||
186 | CVE_STATUS[CVE-2021-46964] = "fixed-version: Fixed from version 5.13" | ||
187 | |||
188 | CVE_STATUS[CVE-2021-46965] = "fixed-version: Fixed from version 5.13" | ||
189 | |||
190 | CVE_STATUS[CVE-2021-46966] = "fixed-version: Fixed from version 5.13" | ||
191 | |||
192 | CVE_STATUS[CVE-2021-46967] = "fixed-version: Fixed from version 5.13" | ||
193 | |||
194 | CVE_STATUS[CVE-2021-46968] = "fixed-version: Fixed from version 5.13" | ||
195 | |||
196 | CVE_STATUS[CVE-2021-46969] = "fixed-version: Fixed from version 5.13" | ||
197 | |||
198 | CVE_STATUS[CVE-2021-46970] = "fixed-version: Fixed from version 5.13" | ||
199 | |||
200 | CVE_STATUS[CVE-2021-46971] = "fixed-version: Fixed from version 5.13" | ||
201 | |||
202 | CVE_STATUS[CVE-2021-46972] = "fixed-version: Fixed from version 5.13" | ||
203 | |||
204 | CVE_STATUS[CVE-2021-46973] = "fixed-version: Fixed from version 5.13" | ||
205 | |||
206 | CVE_STATUS[CVE-2021-46974] = "fixed-version: Fixed from version 5.13" | ||
207 | |||
208 | CVE_STATUS[CVE-2021-46976] = "fixed-version: Fixed from version 5.13" | ||
209 | |||
210 | CVE_STATUS[CVE-2021-46977] = "fixed-version: Fixed from version 5.13" | ||
211 | |||
212 | CVE_STATUS[CVE-2021-46978] = "fixed-version: Fixed from version 5.13" | ||
213 | |||
214 | CVE_STATUS[CVE-2021-46979] = "fixed-version: Fixed from version 5.13" | ||
215 | |||
216 | CVE_STATUS[CVE-2021-46980] = "fixed-version: Fixed from version 5.13" | ||
217 | |||
218 | CVE_STATUS[CVE-2021-46981] = "fixed-version: Fixed from version 5.13" | ||
219 | |||
220 | CVE_STATUS[CVE-2021-46982] = "fixed-version: Fixed from version 5.13" | ||
221 | |||
222 | CVE_STATUS[CVE-2021-46983] = "fixed-version: Fixed from version 5.13" | ||
223 | |||
224 | CVE_STATUS[CVE-2021-46984] = "fixed-version: Fixed from version 5.13" | ||
225 | |||
226 | CVE_STATUS[CVE-2021-46985] = "fixed-version: Fixed from version 5.13" | ||
227 | |||
228 | CVE_STATUS[CVE-2021-46986] = "fixed-version: Fixed from version 5.13" | ||
229 | |||
230 | CVE_STATUS[CVE-2021-46987] = "fixed-version: Fixed from version 5.13" | ||
231 | |||
232 | CVE_STATUS[CVE-2021-46988] = "fixed-version: Fixed from version 5.13" | ||
233 | |||
234 | CVE_STATUS[CVE-2021-46989] = "fixed-version: Fixed from version 5.13" | ||
235 | |||
236 | CVE_STATUS[CVE-2021-46990] = "fixed-version: Fixed from version 5.13" | ||
237 | |||
238 | CVE_STATUS[CVE-2021-46991] = "fixed-version: Fixed from version 5.13" | ||
239 | |||
240 | CVE_STATUS[CVE-2021-46992] = "fixed-version: Fixed from version 5.13" | ||
241 | |||
242 | CVE_STATUS[CVE-2021-46993] = "fixed-version: Fixed from version 5.13" | ||
243 | |||
244 | CVE_STATUS[CVE-2021-46994] = "fixed-version: Fixed from version 5.13" | ||
245 | |||
246 | CVE_STATUS[CVE-2021-46995] = "fixed-version: Fixed from version 5.13" | ||
247 | |||
248 | CVE_STATUS[CVE-2021-46996] = "fixed-version: Fixed from version 5.13" | ||
249 | |||
250 | CVE_STATUS[CVE-2021-46997] = "fixed-version: Fixed from version 5.13" | ||
251 | |||
252 | CVE_STATUS[CVE-2021-46998] = "fixed-version: Fixed from version 5.13" | ||
253 | |||
254 | CVE_STATUS[CVE-2021-46999] = "fixed-version: Fixed from version 5.13" | ||
255 | |||
256 | CVE_STATUS[CVE-2021-47000] = "fixed-version: Fixed from version 5.13" | ||
257 | |||
258 | CVE_STATUS[CVE-2021-47001] = "fixed-version: Fixed from version 5.13" | ||
259 | |||
260 | CVE_STATUS[CVE-2021-47002] = "fixed-version: Fixed from version 5.13" | ||
261 | |||
262 | CVE_STATUS[CVE-2021-47003] = "fixed-version: Fixed from version 5.13" | ||
263 | |||
264 | CVE_STATUS[CVE-2021-47004] = "fixed-version: Fixed from version 5.13" | ||
265 | |||
266 | CVE_STATUS[CVE-2021-47005] = "fixed-version: Fixed from version 5.13" | ||
267 | |||
268 | CVE_STATUS[CVE-2021-47006] = "fixed-version: Fixed from version 5.13" | ||
269 | |||
270 | CVE_STATUS[CVE-2021-47007] = "fixed-version: Fixed from version 5.13" | ||
271 | |||
272 | CVE_STATUS[CVE-2021-47008] = "fixed-version: Fixed from version 5.13" | ||
273 | |||
274 | CVE_STATUS[CVE-2021-47009] = "fixed-version: Fixed from version 5.13" | ||
275 | |||
276 | CVE_STATUS[CVE-2021-47010] = "fixed-version: Fixed from version 5.13" | ||
277 | |||
278 | CVE_STATUS[CVE-2021-47011] = "fixed-version: Fixed from version 5.13" | ||
279 | |||
280 | CVE_STATUS[CVE-2021-47012] = "fixed-version: Fixed from version 5.13" | ||
281 | |||
282 | CVE_STATUS[CVE-2021-47013] = "fixed-version: Fixed from version 5.13" | ||
283 | |||
284 | CVE_STATUS[CVE-2021-47014] = "fixed-version: Fixed from version 5.13" | ||
285 | |||
286 | CVE_STATUS[CVE-2021-47015] = "fixed-version: Fixed from version 5.13" | ||
287 | |||
288 | CVE_STATUS[CVE-2021-47016] = "fixed-version: Fixed from version 5.13" | ||
289 | |||
290 | CVE_STATUS[CVE-2021-47017] = "fixed-version: Fixed from version 5.13" | ||
291 | |||
292 | CVE_STATUS[CVE-2021-47018] = "fixed-version: Fixed from version 5.13" | ||
293 | |||
294 | CVE_STATUS[CVE-2021-47019] = "fixed-version: Fixed from version 5.13" | ||
295 | |||
296 | CVE_STATUS[CVE-2021-47020] = "fixed-version: Fixed from version 5.13" | ||
297 | |||
298 | CVE_STATUS[CVE-2021-47021] = "fixed-version: Fixed from version 5.13" | ||
299 | |||
300 | CVE_STATUS[CVE-2021-47022] = "fixed-version: Fixed from version 5.13" | ||
301 | |||
302 | CVE_STATUS[CVE-2021-47023] = "fixed-version: Fixed from version 5.13" | ||
303 | |||
304 | CVE_STATUS[CVE-2021-47024] = "fixed-version: Fixed from version 5.13" | ||
305 | |||
306 | CVE_STATUS[CVE-2021-47025] = "fixed-version: Fixed from version 5.13" | ||
307 | |||
308 | CVE_STATUS[CVE-2021-47026] = "fixed-version: Fixed from version 5.13" | ||
309 | |||
310 | CVE_STATUS[CVE-2021-47027] = "fixed-version: Fixed from version 5.13" | ||
311 | |||
312 | CVE_STATUS[CVE-2021-47028] = "fixed-version: Fixed from version 5.13" | ||
313 | |||
314 | CVE_STATUS[CVE-2021-47029] = "fixed-version: Fixed from version 5.13" | ||
315 | |||
316 | CVE_STATUS[CVE-2021-47030] = "fixed-version: Fixed from version 5.13" | ||
317 | |||
318 | CVE_STATUS[CVE-2021-47031] = "fixed-version: Fixed from version 5.13" | ||
319 | |||
320 | CVE_STATUS[CVE-2021-47032] = "fixed-version: Fixed from version 5.13" | ||
321 | |||
322 | CVE_STATUS[CVE-2021-47033] = "fixed-version: Fixed from version 5.13" | ||
323 | |||
324 | CVE_STATUS[CVE-2021-47034] = "fixed-version: Fixed from version 5.13" | ||
325 | |||
326 | CVE_STATUS[CVE-2021-47035] = "fixed-version: Fixed from version 5.13" | ||
327 | |||
328 | CVE_STATUS[CVE-2021-47036] = "fixed-version: Fixed from version 5.13" | ||
329 | |||
330 | CVE_STATUS[CVE-2021-47037] = "fixed-version: Fixed from version 5.13" | ||
331 | |||
332 | CVE_STATUS[CVE-2021-47038] = "fixed-version: Fixed from version 5.13" | ||
333 | |||
334 | CVE_STATUS[CVE-2021-47039] = "fixed-version: Fixed from version 5.13" | ||
335 | |||
336 | CVE_STATUS[CVE-2021-47040] = "fixed-version: Fixed from version 5.13" | ||
337 | |||
338 | CVE_STATUS[CVE-2021-47041] = "fixed-version: Fixed from version 5.13" | ||
339 | |||
340 | CVE_STATUS[CVE-2021-47042] = "fixed-version: Fixed from version 5.13" | ||
341 | |||
342 | CVE_STATUS[CVE-2021-47043] = "fixed-version: Fixed from version 5.13" | ||
343 | |||
344 | CVE_STATUS[CVE-2021-47044] = "fixed-version: Fixed from version 5.13" | ||
345 | |||
346 | CVE_STATUS[CVE-2021-47045] = "fixed-version: Fixed from version 5.13" | ||
347 | |||
348 | CVE_STATUS[CVE-2021-47046] = "fixed-version: Fixed from version 5.13" | ||
349 | |||
350 | CVE_STATUS[CVE-2021-47047] = "fixed-version: Fixed from version 5.13" | ||
351 | |||
352 | CVE_STATUS[CVE-2021-47048] = "fixed-version: Fixed from version 5.13" | ||
353 | |||
354 | CVE_STATUS[CVE-2021-47049] = "fixed-version: Fixed from version 5.13" | ||
355 | |||
356 | CVE_STATUS[CVE-2021-47050] = "fixed-version: Fixed from version 5.13" | ||
357 | |||
358 | CVE_STATUS[CVE-2021-47051] = "fixed-version: Fixed from version 5.13" | ||
359 | |||
360 | CVE_STATUS[CVE-2021-47052] = "fixed-version: Fixed from version 5.13" | ||
361 | |||
362 | CVE_STATUS[CVE-2021-47053] = "fixed-version: Fixed from version 5.13" | ||
363 | |||
364 | CVE_STATUS[CVE-2021-47054] = "fixed-version: Fixed from version 5.13" | ||
365 | |||
366 | CVE_STATUS[CVE-2021-47055] = "fixed-version: Fixed from version 5.13" | ||
367 | |||
368 | CVE_STATUS[CVE-2021-47056] = "fixed-version: Fixed from version 5.13" | ||
369 | |||
370 | CVE_STATUS[CVE-2021-47057] = "fixed-version: Fixed from version 5.13" | ||
371 | |||
372 | CVE_STATUS[CVE-2021-47058] = "fixed-version: Fixed from version 5.13" | ||
373 | |||
374 | CVE_STATUS[CVE-2021-47059] = "fixed-version: Fixed from version 5.13" | ||
375 | |||
376 | CVE_STATUS[CVE-2021-47060] = "fixed-version: Fixed from version 5.13" | ||
377 | |||
378 | CVE_STATUS[CVE-2021-47061] = "fixed-version: Fixed from version 5.13" | ||
379 | |||
380 | CVE_STATUS[CVE-2021-47062] = "fixed-version: Fixed from version 5.13" | ||
381 | |||
382 | CVE_STATUS[CVE-2021-47063] = "fixed-version: Fixed from version 5.13" | ||
383 | |||
384 | CVE_STATUS[CVE-2021-47064] = "fixed-version: Fixed from version 5.13" | ||
385 | |||
386 | CVE_STATUS[CVE-2021-47065] = "fixed-version: Fixed from version 5.13" | ||
387 | |||
388 | CVE_STATUS[CVE-2021-47066] = "fixed-version: Fixed from version 5.13" | ||
389 | |||
390 | CVE_STATUS[CVE-2021-47067] = "fixed-version: Fixed from version 5.13" | ||
391 | |||
392 | CVE_STATUS[CVE-2021-47068] = "fixed-version: Fixed from version 5.13" | ||
393 | |||
394 | CVE_STATUS[CVE-2021-47069] = "fixed-version: Fixed from version 5.13" | ||
395 | |||
396 | CVE_STATUS[CVE-2021-47070] = "fixed-version: Fixed from version 5.13" | ||
397 | |||
398 | CVE_STATUS[CVE-2021-47071] = "fixed-version: Fixed from version 5.13" | ||
399 | |||
400 | CVE_STATUS[CVE-2021-47072] = "fixed-version: Fixed from version 5.13" | ||
401 | |||
402 | CVE_STATUS[CVE-2021-47073] = "fixed-version: Fixed from version 5.13" | ||
403 | |||
404 | CVE_STATUS[CVE-2021-47074] = "fixed-version: Fixed from version 5.13" | ||
405 | |||
406 | CVE_STATUS[CVE-2021-47075] = "fixed-version: Fixed from version 5.13" | ||
407 | |||
408 | CVE_STATUS[CVE-2021-47076] = "fixed-version: Fixed from version 5.13" | ||
409 | |||
410 | CVE_STATUS[CVE-2021-47077] = "fixed-version: Fixed from version 5.13" | ||
411 | |||
412 | CVE_STATUS[CVE-2021-47078] = "fixed-version: Fixed from version 5.13" | ||
413 | |||
414 | CVE_STATUS[CVE-2021-47079] = "fixed-version: Fixed from version 5.13" | ||
415 | |||
416 | CVE_STATUS[CVE-2021-47080] = "fixed-version: Fixed from version 5.13" | ||
417 | |||
418 | CVE_STATUS[CVE-2021-47081] = "fixed-version: Fixed from version 5.13" | ||
419 | |||
420 | CVE_STATUS[CVE-2021-47082] = "fixed-version: Fixed from version 5.16" | ||
421 | |||
422 | CVE_STATUS[CVE-2021-47083] = "fixed-version: Fixed from version 5.16" | ||
423 | |||
424 | CVE_STATUS[CVE-2021-47086] = "fixed-version: Fixed from version 5.16" | ||
425 | |||
426 | CVE_STATUS[CVE-2021-47087] = "fixed-version: Fixed from version 5.16" | ||
427 | |||
428 | CVE_STATUS[CVE-2021-47088] = "fixed-version: Fixed from version 5.16" | ||
429 | |||
430 | CVE_STATUS[CVE-2021-47089] = "fixed-version: Fixed from version 5.16" | ||
431 | |||
432 | CVE_STATUS[CVE-2021-47090] = "fixed-version: Fixed from version 5.16" | ||
433 | |||
434 | CVE_STATUS[CVE-2021-47091] = "fixed-version: Fixed from version 5.16" | ||
435 | |||
436 | CVE_STATUS[CVE-2021-47092] = "fixed-version: Fixed from version 5.16" | ||
437 | |||
438 | CVE_STATUS[CVE-2021-47093] = "fixed-version: Fixed from version 5.16" | ||
439 | |||
440 | CVE_STATUS[CVE-2021-47094] = "fixed-version: Fixed from version 5.16" | ||
441 | |||
442 | CVE_STATUS[CVE-2021-47095] = "fixed-version: Fixed from version 5.16" | ||
443 | |||
444 | CVE_STATUS[CVE-2021-47096] = "fixed-version: Fixed from version 5.16" | ||
445 | |||
446 | CVE_STATUS[CVE-2021-47097] = "fixed-version: Fixed from version 5.16" | ||
447 | |||
448 | CVE_STATUS[CVE-2021-47098] = "fixed-version: Fixed from version 5.16" | ||
449 | |||
450 | CVE_STATUS[CVE-2021-47099] = "fixed-version: Fixed from version 5.16" | ||
451 | |||
452 | CVE_STATUS[CVE-2021-47100] = "fixed-version: Fixed from version 5.16" | ||
453 | |||
454 | CVE_STATUS[CVE-2021-47101] = "fixed-version: Fixed from version 5.16" | ||
455 | |||
456 | CVE_STATUS[CVE-2021-47102] = "fixed-version: Fixed from version 5.16" | ||
457 | |||
458 | CVE_STATUS[CVE-2021-47103] = "fixed-version: Fixed from version 5.16" | ||
459 | |||
460 | CVE_STATUS[CVE-2021-47104] = "fixed-version: Fixed from version 5.16" | ||
461 | |||
462 | CVE_STATUS[CVE-2021-47105] = "fixed-version: Fixed from version 5.16" | ||
463 | |||
464 | CVE_STATUS[CVE-2021-47106] = "fixed-version: Fixed from version 5.16" | ||
465 | |||
466 | CVE_STATUS[CVE-2021-47107] = "fixed-version: Fixed from version 5.16" | ||
467 | |||
468 | CVE_STATUS[CVE-2021-47108] = "fixed-version: Fixed from version 5.16" | ||
469 | |||
470 | CVE_STATUS[CVE-2021-47109] = "fixed-version: Fixed from version 5.13" | ||
471 | |||
472 | CVE_STATUS[CVE-2021-47110] = "fixed-version: Fixed from version 5.13" | ||
473 | |||
474 | CVE_STATUS[CVE-2021-47111] = "fixed-version: Fixed from version 5.13" | ||
475 | |||
476 | CVE_STATUS[CVE-2021-47112] = "fixed-version: Fixed from version 5.13" | ||
477 | |||
478 | CVE_STATUS[CVE-2021-47113] = "fixed-version: Fixed from version 5.13" | ||
479 | |||
480 | CVE_STATUS[CVE-2021-47114] = "fixed-version: Fixed from version 5.13" | ||
481 | |||
482 | CVE_STATUS[CVE-2021-47116] = "fixed-version: Fixed from version 5.13" | ||
483 | |||
484 | CVE_STATUS[CVE-2021-47117] = "fixed-version: Fixed from version 5.13" | ||
485 | |||
486 | CVE_STATUS[CVE-2021-47118] = "fixed-version: Fixed from version 5.13" | ||
487 | |||
488 | CVE_STATUS[CVE-2021-47119] = "fixed-version: Fixed from version 5.13" | ||
489 | |||
490 | CVE_STATUS[CVE-2021-47120] = "fixed-version: Fixed from version 5.13" | ||
491 | |||
492 | CVE_STATUS[CVE-2021-47121] = "fixed-version: Fixed from version 5.13" | ||
493 | |||
494 | CVE_STATUS[CVE-2021-47122] = "fixed-version: Fixed from version 5.13" | ||
495 | |||
496 | CVE_STATUS[CVE-2021-47123] = "fixed-version: Fixed from version 5.13" | ||
497 | |||
498 | CVE_STATUS[CVE-2021-47124] = "fixed-version: Fixed from version 5.13" | ||
499 | |||
500 | CVE_STATUS[CVE-2021-47125] = "fixed-version: Fixed from version 5.13" | ||
501 | |||
502 | CVE_STATUS[CVE-2021-47126] = "fixed-version: Fixed from version 5.13" | ||
503 | |||
504 | CVE_STATUS[CVE-2021-47127] = "fixed-version: Fixed from version 5.13" | ||
505 | |||
506 | CVE_STATUS[CVE-2021-47128] = "fixed-version: Fixed from version 5.13" | ||
507 | |||
508 | CVE_STATUS[CVE-2021-47129] = "fixed-version: Fixed from version 5.13" | ||
509 | |||
510 | CVE_STATUS[CVE-2021-47130] = "fixed-version: Fixed from version 5.13" | ||
511 | |||
512 | CVE_STATUS[CVE-2021-47131] = "fixed-version: Fixed from version 5.13" | ||
513 | |||
514 | CVE_STATUS[CVE-2021-47132] = "fixed-version: Fixed from version 5.13" | ||
515 | |||
516 | CVE_STATUS[CVE-2021-47133] = "fixed-version: Fixed from version 5.13" | ||
517 | |||
518 | CVE_STATUS[CVE-2021-47134] = "fixed-version: Fixed from version 5.13" | ||
519 | |||
520 | CVE_STATUS[CVE-2021-47135] = "fixed-version: Fixed from version 5.13" | ||
521 | |||
522 | CVE_STATUS[CVE-2021-47136] = "fixed-version: Fixed from version 5.13" | ||
523 | |||
524 | CVE_STATUS[CVE-2021-47137] = "fixed-version: Fixed from version 5.13" | ||
525 | |||
526 | CVE_STATUS[CVE-2021-47138] = "fixed-version: Fixed from version 5.13" | ||
527 | |||
528 | CVE_STATUS[CVE-2021-47139] = "fixed-version: Fixed from version 5.13" | ||
529 | |||
530 | CVE_STATUS[CVE-2021-47140] = "fixed-version: Fixed from version 5.13" | ||
531 | |||
532 | CVE_STATUS[CVE-2021-47141] = "fixed-version: Fixed from version 5.13" | ||
533 | |||
534 | CVE_STATUS[CVE-2021-47142] = "fixed-version: Fixed from version 5.13" | ||
535 | |||
536 | CVE_STATUS[CVE-2021-47143] = "fixed-version: Fixed from version 5.13" | ||
537 | |||
538 | CVE_STATUS[CVE-2021-47144] = "fixed-version: Fixed from version 5.13" | ||
539 | |||
540 | CVE_STATUS[CVE-2021-47145] = "fixed-version: Fixed from version 5.13" | ||
541 | |||
542 | CVE_STATUS[CVE-2021-47146] = "fixed-version: Fixed from version 5.13" | ||
543 | |||
544 | CVE_STATUS[CVE-2021-47147] = "fixed-version: Fixed from version 5.13" | ||
545 | |||
546 | CVE_STATUS[CVE-2021-47148] = "fixed-version: Fixed from version 5.13" | ||
547 | |||
548 | CVE_STATUS[CVE-2021-47149] = "fixed-version: Fixed from version 5.13" | ||
549 | |||
550 | CVE_STATUS[CVE-2021-47150] = "fixed-version: Fixed from version 5.13" | ||
551 | |||
552 | CVE_STATUS[CVE-2021-47151] = "fixed-version: Fixed from version 5.13" | ||
553 | |||
554 | CVE_STATUS[CVE-2021-47152] = "fixed-version: Fixed from version 5.13" | ||
555 | |||
556 | CVE_STATUS[CVE-2021-47153] = "fixed-version: Fixed from version 5.13" | ||
557 | |||
558 | CVE_STATUS[CVE-2021-47158] = "fixed-version: Fixed from version 5.13" | ||
559 | |||
560 | CVE_STATUS[CVE-2021-47159] = "fixed-version: Fixed from version 5.13" | ||
561 | |||
562 | CVE_STATUS[CVE-2021-47160] = "fixed-version: Fixed from version 5.13" | ||
563 | |||
564 | CVE_STATUS[CVE-2021-47161] = "fixed-version: Fixed from version 5.13" | ||
565 | |||
566 | CVE_STATUS[CVE-2021-47162] = "fixed-version: Fixed from version 5.13" | ||
567 | |||
568 | CVE_STATUS[CVE-2021-47163] = "fixed-version: Fixed from version 5.13" | ||
569 | |||
570 | CVE_STATUS[CVE-2021-47164] = "fixed-version: Fixed from version 5.13" | ||
571 | |||
572 | CVE_STATUS[CVE-2021-47165] = "fixed-version: Fixed from version 5.13" | ||
573 | |||
574 | CVE_STATUS[CVE-2021-47166] = "fixed-version: Fixed from version 5.13" | ||
575 | |||
576 | CVE_STATUS[CVE-2021-47167] = "fixed-version: Fixed from version 5.13" | ||
577 | |||
578 | CVE_STATUS[CVE-2021-47168] = "fixed-version: Fixed from version 5.13" | ||
579 | |||
580 | CVE_STATUS[CVE-2021-47169] = "fixed-version: Fixed from version 5.13" | ||
581 | |||
582 | CVE_STATUS[CVE-2021-47170] = "fixed-version: Fixed from version 5.13" | ||
583 | |||
584 | CVE_STATUS[CVE-2021-47171] = "fixed-version: Fixed from version 5.13" | ||
585 | |||
586 | CVE_STATUS[CVE-2021-47172] = "fixed-version: Fixed from version 5.13" | ||
587 | |||
588 | CVE_STATUS[CVE-2021-47173] = "fixed-version: Fixed from version 5.13" | ||
589 | |||
590 | CVE_STATUS[CVE-2021-47174] = "fixed-version: Fixed from version 5.13" | ||
591 | |||
592 | CVE_STATUS[CVE-2021-47175] = "fixed-version: Fixed from version 5.13" | ||
593 | |||
594 | CVE_STATUS[CVE-2021-47176] = "fixed-version: Fixed from version 5.13" | ||
595 | |||
596 | CVE_STATUS[CVE-2021-47177] = "fixed-version: Fixed from version 5.13" | ||
597 | |||
598 | CVE_STATUS[CVE-2021-47178] = "fixed-version: Fixed from version 5.13" | ||
599 | |||
600 | CVE_STATUS[CVE-2021-47179] = "fixed-version: Fixed from version 5.12.9" | ||
601 | |||
602 | CVE_STATUS[CVE-2021-47180] = "fixed-version: Fixed from version 5.13" | ||
603 | |||
604 | CVE_STATUS[CVE-2021-47181] = "fixed-version: Fixed from version 5.16" | ||
605 | |||
606 | CVE_STATUS[CVE-2021-47182] = "fixed-version: Fixed from version 5.16" | ||
607 | |||
608 | CVE_STATUS[CVE-2021-47183] = "fixed-version: Fixed from version 5.16" | ||
609 | |||
610 | CVE_STATUS[CVE-2021-47184] = "fixed-version: Fixed from version 5.16" | ||
611 | |||
612 | CVE_STATUS[CVE-2021-47185] = "fixed-version: Fixed from version 5.16" | ||
613 | |||
614 | CVE_STATUS[CVE-2021-47186] = "fixed-version: Fixed from version 5.16" | ||
615 | |||
616 | CVE_STATUS[CVE-2021-47187] = "fixed-version: Fixed from version 5.16" | ||
617 | |||
618 | CVE_STATUS[CVE-2021-47188] = "fixed-version: Fixed from version 5.16" | ||
619 | |||
620 | CVE_STATUS[CVE-2021-47189] = "fixed-version: Fixed from version 5.16" | ||
621 | |||
622 | CVE_STATUS[CVE-2021-47190] = "fixed-version: Fixed from version 5.16" | ||
623 | |||
624 | CVE_STATUS[CVE-2021-47191] = "fixed-version: Fixed from version 5.16" | ||
625 | |||
626 | CVE_STATUS[CVE-2021-47192] = "fixed-version: Fixed from version 5.16" | ||
627 | |||
628 | CVE_STATUS[CVE-2021-47193] = "fixed-version: Fixed from version 5.16" | ||
629 | |||
630 | CVE_STATUS[CVE-2021-47194] = "fixed-version: Fixed from version 5.16" | ||
631 | |||
632 | CVE_STATUS[CVE-2021-47195] = "fixed-version: Fixed from version 5.16" | ||
633 | |||
634 | CVE_STATUS[CVE-2021-47196] = "fixed-version: Fixed from version 5.16" | ||
635 | |||
636 | CVE_STATUS[CVE-2021-47197] = "fixed-version: Fixed from version 5.16" | ||
637 | |||
638 | CVE_STATUS[CVE-2021-47198] = "fixed-version: Fixed from version 5.16" | ||
639 | |||
640 | CVE_STATUS[CVE-2021-47199] = "fixed-version: Fixed from version 5.16" | ||
641 | |||
642 | CVE_STATUS[CVE-2021-47200] = "fixed-version: Fixed from version 5.16" | ||
643 | |||
644 | CVE_STATUS[CVE-2021-47201] = "fixed-version: Fixed from version 5.16" | ||
645 | |||
646 | CVE_STATUS[CVE-2021-47202] = "fixed-version: Fixed from version 5.16" | ||
647 | |||
648 | CVE_STATUS[CVE-2021-47203] = "fixed-version: Fixed from version 5.16" | ||
649 | |||
650 | CVE_STATUS[CVE-2021-47204] = "fixed-version: Fixed from version 5.16" | ||
651 | |||
652 | CVE_STATUS[CVE-2021-47205] = "fixed-version: Fixed from version 5.16" | ||
653 | |||
654 | CVE_STATUS[CVE-2021-47206] = "fixed-version: Fixed from version 5.16" | ||
655 | |||
656 | CVE_STATUS[CVE-2021-47207] = "fixed-version: Fixed from version 5.16" | ||
657 | |||
658 | CVE_STATUS[CVE-2021-47209] = "fixed-version: Fixed from version 5.16" | ||
659 | |||
660 | CVE_STATUS[CVE-2021-47210] = "fixed-version: Fixed from version 5.16" | ||
661 | |||
662 | CVE_STATUS[CVE-2021-47211] = "fixed-version: Fixed from version 5.16" | ||
663 | |||
664 | CVE_STATUS[CVE-2021-47212] = "fixed-version: Fixed from version 5.16" | ||
665 | |||
666 | CVE_STATUS[CVE-2021-47214] = "fixed-version: Fixed from version 5.16" | ||
667 | |||
668 | CVE_STATUS[CVE-2021-47215] = "fixed-version: Fixed from version 5.16" | ||
669 | |||
670 | CVE_STATUS[CVE-2021-47216] = "fixed-version: Fixed from version 5.16" | ||
671 | |||
672 | CVE_STATUS[CVE-2021-47217] = "fixed-version: Fixed from version 5.16" | ||
673 | |||
674 | CVE_STATUS[CVE-2021-47218] = "fixed-version: Fixed from version 5.16" | ||
675 | |||
676 | CVE_STATUS[CVE-2021-47219] = "fixed-version: Fixed from version 5.16" | ||
677 | |||
678 | CVE_STATUS[CVE-2021-47221] = "fixed-version: Fixed from version 5.13" | ||
679 | |||
680 | CVE_STATUS[CVE-2021-47222] = "fixed-version: Fixed from version 5.13" | ||
681 | |||
682 | CVE_STATUS[CVE-2021-47223] = "fixed-version: Fixed from version 5.13" | ||
683 | |||
684 | CVE_STATUS[CVE-2021-47224] = "fixed-version: Fixed from version 5.13" | ||
685 | |||
686 | CVE_STATUS[CVE-2021-47225] = "fixed-version: Fixed from version 5.13" | ||
687 | |||
688 | CVE_STATUS[CVE-2021-47226] = "fixed-version: Fixed from version 5.13" | ||
689 | |||
690 | CVE_STATUS[CVE-2021-47227] = "fixed-version: Fixed from version 5.13" | ||
691 | |||
692 | CVE_STATUS[CVE-2021-47228] = "fixed-version: Fixed from version 5.13" | ||
693 | |||
694 | CVE_STATUS[CVE-2021-47229] = "fixed-version: Fixed from version 5.13" | ||
695 | |||
696 | CVE_STATUS[CVE-2021-47230] = "fixed-version: Fixed from version 5.13" | ||
697 | |||
698 | CVE_STATUS[CVE-2021-47231] = "fixed-version: Fixed from version 5.13" | ||
699 | |||
700 | CVE_STATUS[CVE-2021-47232] = "fixed-version: Fixed from version 5.13" | ||
701 | |||
702 | CVE_STATUS[CVE-2021-47233] = "fixed-version: Fixed from version 5.13" | ||
703 | |||
704 | CVE_STATUS[CVE-2021-47234] = "fixed-version: Fixed from version 5.13" | ||
705 | |||
706 | CVE_STATUS[CVE-2021-47235] = "fixed-version: Fixed from version 5.13" | ||
707 | |||
708 | CVE_STATUS[CVE-2021-47236] = "fixed-version: Fixed from version 5.13" | ||
709 | |||
710 | CVE_STATUS[CVE-2021-47237] = "fixed-version: Fixed from version 5.13" | ||
711 | |||
712 | CVE_STATUS[CVE-2021-47238] = "fixed-version: Fixed from version 5.13" | ||
713 | |||
714 | CVE_STATUS[CVE-2021-47239] = "fixed-version: Fixed from version 5.12.13" | ||
715 | |||
716 | CVE_STATUS[CVE-2021-47240] = "fixed-version: Fixed from version 5.13" | ||
717 | |||
718 | CVE_STATUS[CVE-2021-47241] = "fixed-version: Fixed from version 5.13" | ||
719 | |||
720 | CVE_STATUS[CVE-2021-47242] = "fixed-version: Fixed from version 5.13" | ||
721 | |||
722 | CVE_STATUS[CVE-2021-47243] = "fixed-version: Fixed from version 5.13" | ||
723 | |||
724 | CVE_STATUS[CVE-2021-47244] = "fixed-version: Fixed from version 5.13" | ||
725 | |||
726 | CVE_STATUS[CVE-2021-47245] = "fixed-version: Fixed from version 5.13" | ||
727 | |||
728 | CVE_STATUS[CVE-2021-47246] = "fixed-version: Fixed from version 5.13" | ||
729 | |||
730 | CVE_STATUS[CVE-2021-47247] = "fixed-version: Fixed from version 5.13" | ||
731 | |||
732 | CVE_STATUS[CVE-2021-47248] = "fixed-version: Fixed from version 5.13" | ||
733 | |||
734 | CVE_STATUS[CVE-2021-47249] = "fixed-version: Fixed from version 5.13" | ||
735 | |||
736 | CVE_STATUS[CVE-2021-47250] = "fixed-version: Fixed from version 5.13" | ||
737 | |||
738 | CVE_STATUS[CVE-2021-47251] = "fixed-version: Fixed from version 5.13" | ||
739 | |||
740 | CVE_STATUS[CVE-2021-47252] = "fixed-version: Fixed from version 5.13" | ||
741 | |||
742 | CVE_STATUS[CVE-2021-47253] = "fixed-version: Fixed from version 5.13" | ||
743 | |||
744 | CVE_STATUS[CVE-2021-47254] = "fixed-version: Fixed from version 5.13" | ||
745 | |||
746 | CVE_STATUS[CVE-2021-47255] = "fixed-version: Fixed from version 5.13" | ||
747 | |||
748 | CVE_STATUS[CVE-2021-47256] = "fixed-version: Fixed from version 5.13" | ||
749 | |||
750 | CVE_STATUS[CVE-2021-47257] = "fixed-version: Fixed from version 5.13" | ||
751 | |||
752 | CVE_STATUS[CVE-2021-47258] = "fixed-version: Fixed from version 5.13" | ||
753 | |||
754 | CVE_STATUS[CVE-2021-47259] = "fixed-version: Fixed from version 5.13" | ||
755 | |||
756 | CVE_STATUS[CVE-2021-47260] = "fixed-version: Fixed from version 5.13" | ||
757 | |||
758 | CVE_STATUS[CVE-2021-47261] = "fixed-version: Fixed from version 5.13" | ||
759 | |||
760 | CVE_STATUS[CVE-2021-47262] = "fixed-version: Fixed from version 5.13" | ||
761 | |||
762 | CVE_STATUS[CVE-2021-47263] = "fixed-version: Fixed from version 5.13" | ||
763 | |||
764 | CVE_STATUS[CVE-2021-47264] = "fixed-version: Fixed from version 5.13" | ||
765 | |||
766 | CVE_STATUS[CVE-2021-47265] = "fixed-version: Fixed from version 5.13" | ||
767 | |||
768 | CVE_STATUS[CVE-2021-47266] = "fixed-version: Fixed from version 5.13" | ||
769 | |||
770 | CVE_STATUS[CVE-2021-47267] = "fixed-version: Fixed from version 5.13" | ||
771 | |||
772 | CVE_STATUS[CVE-2021-47268] = "fixed-version: Fixed from version 5.13" | ||
773 | |||
774 | CVE_STATUS[CVE-2021-47269] = "fixed-version: Fixed from version 5.13" | ||
775 | |||
776 | CVE_STATUS[CVE-2021-47270] = "fixed-version: Fixed from version 5.13" | ||
777 | |||
778 | CVE_STATUS[CVE-2021-47271] = "fixed-version: Fixed from version 5.13" | ||
779 | |||
780 | CVE_STATUS[CVE-2021-47272] = "fixed-version: Fixed from version 5.13" | ||
781 | |||
782 | CVE_STATUS[CVE-2021-47273] = "fixed-version: Fixed from version 5.13" | ||
783 | |||
784 | CVE_STATUS[CVE-2021-47274] = "fixed-version: Fixed from version 5.13" | ||
785 | |||
786 | CVE_STATUS[CVE-2021-47275] = "fixed-version: Fixed from version 5.13" | ||
787 | |||
788 | CVE_STATUS[CVE-2021-47276] = "fixed-version: Fixed from version 5.13" | ||
789 | |||
790 | CVE_STATUS[CVE-2021-47277] = "fixed-version: Fixed from version 5.13" | ||
791 | |||
792 | CVE_STATUS[CVE-2021-47278] = "fixed-version: Fixed from version 5.13" | ||
793 | |||
794 | CVE_STATUS[CVE-2021-47279] = "fixed-version: Fixed from version 5.13" | ||
795 | |||
796 | CVE_STATUS[CVE-2021-47280] = "fixed-version: Fixed from version 5.13" | ||
797 | |||
798 | CVE_STATUS[CVE-2021-47281] = "fixed-version: Fixed from version 5.13" | ||
799 | |||
800 | CVE_STATUS[CVE-2021-47282] = "fixed-version: Fixed from version 5.13" | ||
801 | |||
802 | CVE_STATUS[CVE-2021-47283] = "fixed-version: Fixed from version 5.13" | ||
803 | |||
804 | CVE_STATUS[CVE-2021-47284] = "fixed-version: Fixed from version 5.13" | ||
805 | |||
806 | CVE_STATUS[CVE-2021-47286] = "fixed-version: Fixed from version 5.14" | ||
807 | |||
808 | CVE_STATUS[CVE-2021-47287] = "fixed-version: Fixed from version 5.14" | ||
809 | |||
810 | CVE_STATUS[CVE-2021-47288] = "fixed-version: Fixed from version 5.14" | ||
811 | |||
812 | CVE_STATUS[CVE-2021-47289] = "fixed-version: Fixed from version 5.14" | ||
813 | |||
814 | CVE_STATUS[CVE-2021-47290] = "fixed-version: Fixed from version 5.14" | ||
815 | |||
816 | CVE_STATUS[CVE-2021-47291] = "fixed-version: Fixed from version 5.14" | ||
817 | |||
818 | CVE_STATUS[CVE-2021-47292] = "fixed-version: Fixed from version 5.14" | ||
819 | |||
820 | CVE_STATUS[CVE-2021-47293] = "fixed-version: Fixed from version 5.14" | ||
821 | |||
822 | CVE_STATUS[CVE-2021-47294] = "fixed-version: Fixed from version 5.14" | ||
823 | |||
824 | CVE_STATUS[CVE-2021-47295] = "fixed-version: Fixed from version 5.14" | ||
825 | |||
826 | CVE_STATUS[CVE-2021-47296] = "fixed-version: Fixed from version 5.14" | ||
827 | |||
828 | CVE_STATUS[CVE-2021-47297] = "fixed-version: Fixed from version 5.14" | ||
829 | |||
830 | CVE_STATUS[CVE-2021-47298] = "fixed-version: Fixed from version 5.14" | ||
831 | |||
832 | CVE_STATUS[CVE-2021-47299] = "fixed-version: Fixed from version 5.14" | ||
833 | |||
834 | CVE_STATUS[CVE-2021-47300] = "fixed-version: Fixed from version 5.14" | ||
835 | |||
836 | CVE_STATUS[CVE-2021-47301] = "fixed-version: Fixed from version 5.14" | ||
837 | |||
838 | CVE_STATUS[CVE-2021-47302] = "fixed-version: Fixed from version 5.14" | ||
839 | |||
840 | CVE_STATUS[CVE-2021-47303] = "fixed-version: Fixed from version 5.14" | ||
841 | |||
842 | CVE_STATUS[CVE-2021-47304] = "fixed-version: Fixed from version 5.14" | ||
843 | |||
844 | CVE_STATUS[CVE-2021-47305] = "fixed-version: Fixed from version 5.14" | ||
845 | |||
846 | CVE_STATUS[CVE-2021-47306] = "fixed-version: Fixed from version 5.14" | ||
847 | |||
848 | CVE_STATUS[CVE-2021-47307] = "fixed-version: Fixed from version 5.14" | ||
849 | |||
850 | CVE_STATUS[CVE-2021-47308] = "fixed-version: Fixed from version 5.14" | ||
851 | |||
852 | CVE_STATUS[CVE-2021-47309] = "fixed-version: Fixed from version 5.14" | ||
853 | |||
854 | CVE_STATUS[CVE-2021-47310] = "fixed-version: Fixed from version 5.14" | ||
855 | |||
856 | CVE_STATUS[CVE-2021-47311] = "fixed-version: Fixed from version 5.14" | ||
857 | |||
858 | CVE_STATUS[CVE-2021-47312] = "fixed-version: Fixed from version 5.13.5" | ||
859 | |||
860 | CVE_STATUS[CVE-2021-47313] = "fixed-version: Fixed from version 5.14" | ||
861 | |||
862 | CVE_STATUS[CVE-2021-47314] = "fixed-version: Fixed from version 5.14" | ||
863 | |||
864 | CVE_STATUS[CVE-2021-47315] = "fixed-version: Fixed from version 5.14" | ||
865 | |||
866 | CVE_STATUS[CVE-2021-47316] = "fixed-version: Fixed from version 5.14" | ||
867 | |||
868 | CVE_STATUS[CVE-2021-47317] = "fixed-version: Fixed from version 5.14" | ||
869 | |||
870 | CVE_STATUS[CVE-2021-47318] = "fixed-version: Fixed from version 5.14" | ||
871 | |||
872 | CVE_STATUS[CVE-2021-47319] = "fixed-version: Fixed from version 5.14" | ||
873 | |||
874 | CVE_STATUS[CVE-2021-47320] = "fixed-version: Fixed from version 5.14" | ||
875 | |||
876 | CVE_STATUS[CVE-2021-47321] = "fixed-version: Fixed from version 5.14" | ||
877 | |||
878 | CVE_STATUS[CVE-2021-47322] = "fixed-version: Fixed from version 5.14" | ||
879 | |||
880 | CVE_STATUS[CVE-2021-47323] = "fixed-version: Fixed from version 5.14" | ||
881 | |||
882 | CVE_STATUS[CVE-2021-47324] = "fixed-version: Fixed from version 5.14" | ||
883 | |||
884 | CVE_STATUS[CVE-2021-47325] = "fixed-version: Fixed from version 5.14" | ||
885 | |||
886 | CVE_STATUS[CVE-2021-47327] = "fixed-version: Fixed from version 5.14" | ||
887 | |||
888 | CVE_STATUS[CVE-2021-47328] = "fixed-version: Fixed from version 5.14" | ||
889 | |||
890 | CVE_STATUS[CVE-2021-47329] = "fixed-version: Fixed from version 5.14" | ||
891 | |||
892 | CVE_STATUS[CVE-2021-47330] = "fixed-version: Fixed from version 5.14" | ||
893 | |||
894 | CVE_STATUS[CVE-2021-47331] = "fixed-version: Fixed from version 5.14" | ||
895 | |||
896 | CVE_STATUS[CVE-2021-47332] = "fixed-version: Fixed from version 5.14" | ||
897 | |||
898 | CVE_STATUS[CVE-2021-47333] = "fixed-version: Fixed from version 5.14" | ||
899 | |||
900 | CVE_STATUS[CVE-2021-47334] = "fixed-version: Fixed from version 5.14" | ||
901 | |||
902 | CVE_STATUS[CVE-2021-47335] = "fixed-version: Fixed from version 5.14" | ||
903 | |||
904 | CVE_STATUS[CVE-2021-47336] = "fixed-version: Fixed from version 5.14" | ||
905 | |||
906 | CVE_STATUS[CVE-2021-47337] = "fixed-version: Fixed from version 5.14" | ||
907 | |||
908 | CVE_STATUS[CVE-2021-47338] = "fixed-version: Fixed from version 5.14" | ||
909 | |||
910 | CVE_STATUS[CVE-2021-47339] = "fixed-version: Fixed from version 5.14" | ||
911 | |||
912 | CVE_STATUS[CVE-2021-47340] = "fixed-version: Fixed from version 5.14" | ||
913 | |||
914 | CVE_STATUS[CVE-2021-47341] = "fixed-version: Fixed from version 5.14" | ||
915 | |||
916 | CVE_STATUS[CVE-2021-47342] = "fixed-version: Fixed from version 5.14" | ||
917 | |||
918 | CVE_STATUS[CVE-2021-47343] = "fixed-version: Fixed from version 5.14" | ||
919 | |||
920 | CVE_STATUS[CVE-2021-47344] = "fixed-version: Fixed from version 5.14" | ||
921 | |||
922 | CVE_STATUS[CVE-2021-47345] = "fixed-version: Fixed from version 5.14" | ||
923 | |||
924 | CVE_STATUS[CVE-2021-47346] = "fixed-version: Fixed from version 5.14" | ||
925 | |||
926 | CVE_STATUS[CVE-2021-47347] = "fixed-version: Fixed from version 5.14" | ||
927 | |||
928 | CVE_STATUS[CVE-2021-47348] = "fixed-version: Fixed from version 5.14" | ||
929 | |||
930 | CVE_STATUS[CVE-2021-47349] = "fixed-version: Fixed from version 5.14" | ||
931 | |||
932 | CVE_STATUS[CVE-2021-47350] = "fixed-version: Fixed from version 5.14" | ||
933 | |||
934 | CVE_STATUS[CVE-2021-47351] = "fixed-version: Fixed from version 5.14" | ||
935 | |||
936 | CVE_STATUS[CVE-2021-47352] = "fixed-version: Fixed from version 5.14" | ||
937 | |||
938 | CVE_STATUS[CVE-2021-47353] = "fixed-version: Fixed from version 5.14" | ||
939 | |||
940 | CVE_STATUS[CVE-2021-47354] = "fixed-version: Fixed from version 5.14" | ||
941 | |||
942 | CVE_STATUS[CVE-2021-47355] = "fixed-version: Fixed from version 5.14" | ||
943 | |||
944 | CVE_STATUS[CVE-2021-47356] = "fixed-version: Fixed from version 5.14" | ||
945 | |||
946 | CVE_STATUS[CVE-2021-47357] = "fixed-version: Fixed from version 5.14" | ||
947 | |||
948 | CVE_STATUS[CVE-2021-47358] = "fixed-version: Fixed from version 5.15" | ||
949 | |||
950 | CVE_STATUS[CVE-2021-47359] = "fixed-version: Fixed from version 5.15" | ||
951 | |||
952 | CVE_STATUS[CVE-2021-47360] = "fixed-version: Fixed from version 5.15" | ||
953 | |||
954 | CVE_STATUS[CVE-2021-47361] = "fixed-version: Fixed from version 5.15" | ||
955 | |||
956 | CVE_STATUS[CVE-2021-47362] = "fixed-version: Fixed from version 5.15" | ||
957 | |||
958 | CVE_STATUS[CVE-2021-47363] = "fixed-version: Fixed from version 5.15" | ||
959 | |||
960 | CVE_STATUS[CVE-2021-47364] = "fixed-version: Fixed from version 5.15" | ||
961 | |||
962 | CVE_STATUS[CVE-2021-47365] = "fixed-version: Fixed from version 5.15" | ||
963 | |||
964 | CVE_STATUS[CVE-2021-47366] = "fixed-version: Fixed from version 5.15" | ||
965 | |||
966 | CVE_STATUS[CVE-2021-47367] = "fixed-version: Fixed from version 5.15" | ||
967 | |||
968 | CVE_STATUS[CVE-2021-47368] = "fixed-version: Fixed from version 5.15" | ||
969 | |||
970 | CVE_STATUS[CVE-2021-47369] = "fixed-version: Fixed from version 5.15" | ||
971 | |||
972 | CVE_STATUS[CVE-2021-47370] = "fixed-version: Fixed from version 5.14.9" | ||
973 | |||
974 | CVE_STATUS[CVE-2021-47371] = "fixed-version: Fixed from version 5.15" | ||
975 | |||
976 | CVE_STATUS[CVE-2021-47372] = "fixed-version: Fixed from version 5.15" | ||
977 | |||
978 | CVE_STATUS[CVE-2021-47373] = "fixed-version: Fixed from version 5.15" | ||
979 | |||
980 | CVE_STATUS[CVE-2021-47374] = "fixed-version: Fixed from version 5.15" | ||
981 | |||
982 | CVE_STATUS[CVE-2021-47375] = "fixed-version: Fixed from version 5.15" | ||
983 | |||
984 | CVE_STATUS[CVE-2021-47376] = "fixed-version: Fixed from version 5.15" | ||
985 | |||
986 | CVE_STATUS[CVE-2021-47378] = "fixed-version: Fixed from version 5.15" | ||
987 | |||
988 | CVE_STATUS[CVE-2021-47379] = "fixed-version: Fixed from version 5.15" | ||
989 | |||
990 | CVE_STATUS[CVE-2021-47380] = "fixed-version: Fixed from version 5.15" | ||
991 | |||
992 | CVE_STATUS[CVE-2021-47381] = "fixed-version: Fixed from version 5.15" | ||
993 | |||
994 | CVE_STATUS[CVE-2021-47382] = "fixed-version: Fixed from version 5.15" | ||
995 | |||
996 | CVE_STATUS[CVE-2021-47383] = "fixed-version: Fixed from version 5.15" | ||
997 | |||
998 | CVE_STATUS[CVE-2021-47384] = "fixed-version: Fixed from version 5.15" | ||
999 | |||
1000 | CVE_STATUS[CVE-2021-47385] = "fixed-version: Fixed from version 5.15" | ||
1001 | |||
1002 | CVE_STATUS[CVE-2021-47386] = "fixed-version: Fixed from version 5.15" | ||
1003 | |||
1004 | CVE_STATUS[CVE-2021-47387] = "fixed-version: Fixed from version 5.15" | ||
1005 | |||
1006 | CVE_STATUS[CVE-2021-47388] = "fixed-version: Fixed from version 5.15" | ||
1007 | |||
1008 | CVE_STATUS[CVE-2021-47389] = "fixed-version: Fixed from version 5.15" | ||
1009 | |||
1010 | CVE_STATUS[CVE-2021-47390] = "fixed-version: Fixed from version 5.15" | ||
1011 | |||
1012 | CVE_STATUS[CVE-2021-47391] = "fixed-version: Fixed from version 5.15" | ||
1013 | |||
1014 | CVE_STATUS[CVE-2021-47392] = "fixed-version: Fixed from version 5.15" | ||
1015 | |||
1016 | CVE_STATUS[CVE-2021-47393] = "fixed-version: Fixed from version 5.15" | ||
1017 | |||
1018 | CVE_STATUS[CVE-2021-47394] = "fixed-version: Fixed from version 5.15" | ||
1019 | |||
1020 | CVE_STATUS[CVE-2021-47395] = "fixed-version: Fixed from version 5.15" | ||
1021 | |||
1022 | CVE_STATUS[CVE-2021-47396] = "fixed-version: Fixed from version 5.15" | ||
1023 | |||
1024 | CVE_STATUS[CVE-2021-47397] = "fixed-version: Fixed from version 5.15" | ||
1025 | |||
1026 | CVE_STATUS[CVE-2021-47398] = "fixed-version: Fixed from version 5.15" | ||
1027 | |||
1028 | CVE_STATUS[CVE-2021-47399] = "fixed-version: Fixed from version 5.15" | ||
1029 | |||
1030 | CVE_STATUS[CVE-2021-47400] = "fixed-version: Fixed from version 5.15" | ||
1031 | |||
1032 | CVE_STATUS[CVE-2021-47401] = "fixed-version: Fixed from version 5.15" | ||
1033 | |||
1034 | CVE_STATUS[CVE-2021-47402] = "fixed-version: Fixed from version 5.15" | ||
1035 | |||
1036 | CVE_STATUS[CVE-2021-47403] = "fixed-version: Fixed from version 5.15" | ||
1037 | |||
1038 | CVE_STATUS[CVE-2021-47404] = "fixed-version: Fixed from version 5.15" | ||
1039 | |||
1040 | CVE_STATUS[CVE-2021-47405] = "fixed-version: Fixed from version 5.15" | ||
1041 | |||
1042 | CVE_STATUS[CVE-2021-47406] = "fixed-version: Fixed from version 5.15" | ||
1043 | |||
1044 | CVE_STATUS[CVE-2021-47407] = "fixed-version: Fixed from version 5.15" | ||
1045 | |||
1046 | CVE_STATUS[CVE-2021-47408] = "fixed-version: Fixed from version 5.15" | ||
1047 | |||
1048 | CVE_STATUS[CVE-2021-47409] = "fixed-version: Fixed from version 5.15" | ||
1049 | |||
1050 | CVE_STATUS[CVE-2021-47410] = "fixed-version: Fixed from version 5.15" | ||
1051 | |||
1052 | CVE_STATUS[CVE-2021-47412] = "fixed-version: Fixed from version 5.15" | ||
1053 | |||
1054 | CVE_STATUS[CVE-2021-47413] = "fixed-version: Fixed from version 5.15" | ||
1055 | |||
1056 | CVE_STATUS[CVE-2021-47414] = "fixed-version: Fixed from version 5.15" | ||
1057 | |||
1058 | CVE_STATUS[CVE-2021-47415] = "fixed-version: Fixed from version 5.15" | ||
1059 | |||
1060 | CVE_STATUS[CVE-2021-47416] = "fixed-version: Fixed from version 5.15" | ||
1061 | |||
1062 | CVE_STATUS[CVE-2021-47417] = "fixed-version: Fixed from version 5.15" | ||
1063 | |||
1064 | CVE_STATUS[CVE-2021-47418] = "fixed-version: Fixed from version 5.15" | ||
1065 | |||
1066 | CVE_STATUS[CVE-2021-47419] = "fixed-version: Fixed from version 5.15" | ||
1067 | |||
1068 | CVE_STATUS[CVE-2021-47420] = "fixed-version: Fixed from version 5.15" | ||
1069 | |||
1070 | CVE_STATUS[CVE-2021-47421] = "fixed-version: Fixed from version 5.15" | ||
1071 | |||
1072 | CVE_STATUS[CVE-2021-47422] = "fixed-version: Fixed from version 5.15" | ||
1073 | |||
1074 | CVE_STATUS[CVE-2021-47423] = "fixed-version: Fixed from version 5.15" | ||
1075 | |||
1076 | CVE_STATUS[CVE-2021-47424] = "fixed-version: Fixed from version 5.15" | ||
1077 | |||
1078 | CVE_STATUS[CVE-2021-47425] = "fixed-version: Fixed from version 5.15" | ||
1079 | |||
1080 | CVE_STATUS[CVE-2021-47426] = "fixed-version: Fixed from version 5.15" | ||
1081 | |||
1082 | CVE_STATUS[CVE-2021-47427] = "fixed-version: Fixed from version 5.15" | ||
1083 | |||
1084 | CVE_STATUS[CVE-2021-47428] = "fixed-version: Fixed from version 5.15" | ||
1085 | |||
1086 | CVE_STATUS[CVE-2021-47429] = "fixed-version: Fixed from version 5.15" | ||
1087 | |||
1088 | CVE_STATUS[CVE-2021-47430] = "fixed-version: Fixed from version 5.15" | ||
1089 | |||
1090 | CVE_STATUS[CVE-2021-47431] = "fixed-version: Fixed from version 5.15" | ||
1091 | |||
1092 | CVE_STATUS[CVE-2021-47432] = "fixed-version: Fixed from version 6.7" | ||
1093 | |||
1094 | CVE_STATUS[CVE-2021-47433] = "fixed-version: Fixed from version 5.15" | ||
1095 | |||
1096 | CVE_STATUS[CVE-2021-47434] = "fixed-version: Fixed from version 5.15" | ||
1097 | |||
1098 | CVE_STATUS[CVE-2021-47435] = "fixed-version: Fixed from version 5.15" | ||
1099 | |||
1100 | CVE_STATUS[CVE-2021-47436] = "fixed-version: Fixed from version 5.14.14" | ||
1101 | |||
1102 | CVE_STATUS[CVE-2021-47437] = "fixed-version: Fixed from version 5.15" | ||
1103 | |||
1104 | CVE_STATUS[CVE-2021-47438] = "fixed-version: Fixed from version 5.15" | ||
1105 | |||
1106 | CVE_STATUS[CVE-2021-47439] = "fixed-version: Fixed from version 5.15" | ||
1107 | |||
1108 | CVE_STATUS[CVE-2021-47440] = "fixed-version: Fixed from version 5.15" | ||
1109 | |||
1110 | CVE_STATUS[CVE-2021-47441] = "fixed-version: Fixed from version 5.15" | ||
1111 | |||
1112 | CVE_STATUS[CVE-2021-47442] = "fixed-version: Fixed from version 5.15" | ||
1113 | |||
1114 | CVE_STATUS[CVE-2021-47443] = "fixed-version: Fixed from version 5.15" | ||
1115 | |||
1116 | CVE_STATUS[CVE-2021-47444] = "fixed-version: Fixed from version 5.15" | ||
1117 | |||
1118 | CVE_STATUS[CVE-2021-47445] = "fixed-version: Fixed from version 5.15" | ||
1119 | |||
1120 | CVE_STATUS[CVE-2021-47446] = "fixed-version: Fixed from version 5.15" | ||
1121 | |||
1122 | CVE_STATUS[CVE-2021-47447] = "fixed-version: Fixed from version 5.15" | ||
1123 | |||
1124 | CVE_STATUS[CVE-2021-47448] = "fixed-version: Fixed from version 5.15" | ||
1125 | |||
1126 | CVE_STATUS[CVE-2021-47449] = "fixed-version: Fixed from version 5.14.14" | ||
1127 | |||
1128 | CVE_STATUS[CVE-2021-47450] = "fixed-version: Fixed from version 5.15" | ||
1129 | |||
1130 | CVE_STATUS[CVE-2021-47451] = "fixed-version: Fixed from version 5.15" | ||
1131 | |||
1132 | CVE_STATUS[CVE-2021-47452] = "fixed-version: Fixed from version 5.15" | ||
1133 | |||
1134 | CVE_STATUS[CVE-2021-47453] = "fixed-version: Fixed from version 5.15" | ||
1135 | |||
1136 | CVE_STATUS[CVE-2021-47454] = "fixed-version: Fixed from version 5.15" | ||
1137 | |||
1138 | CVE_STATUS[CVE-2021-47455] = "fixed-version: Fixed from version 5.15" | ||
1139 | |||
1140 | CVE_STATUS[CVE-2021-47456] = "fixed-version: Fixed from version 5.15" | ||
1141 | |||
1142 | CVE_STATUS[CVE-2021-47457] = "fixed-version: Fixed from version 5.15" | ||
1143 | |||
1144 | CVE_STATUS[CVE-2021-47458] = "fixed-version: Fixed from version 5.15" | ||
1145 | |||
1146 | CVE_STATUS[CVE-2021-47459] = "fixed-version: Fixed from version 5.15" | ||
1147 | |||
1148 | CVE_STATUS[CVE-2021-47460] = "fixed-version: Fixed from version 5.15" | ||
1149 | |||
1150 | CVE_STATUS[CVE-2021-47461] = "fixed-version: Fixed from version 5.15" | ||
1151 | |||
1152 | CVE_STATUS[CVE-2021-47462] = "fixed-version: Fixed from version 5.15" | ||
1153 | |||
1154 | CVE_STATUS[CVE-2021-47463] = "fixed-version: Fixed from version 5.15" | ||
1155 | |||
1156 | CVE_STATUS[CVE-2021-47464] = "fixed-version: Fixed from version 5.15" | ||
1157 | |||
1158 | CVE_STATUS[CVE-2021-47465] = "fixed-version: Fixed from version 5.15" | ||
1159 | |||
1160 | CVE_STATUS[CVE-2021-47466] = "fixed-version: Fixed from version 5.15" | ||
1161 | |||
1162 | CVE_STATUS[CVE-2021-47467] = "fixed-version: Fixed from version 5.15" | ||
1163 | |||
1164 | CVE_STATUS[CVE-2021-47468] = "fixed-version: Fixed from version 5.15" | ||
1165 | |||
1166 | CVE_STATUS[CVE-2021-47470] = "fixed-version: Fixed from version 5.15" | ||
1167 | |||
1168 | CVE_STATUS[CVE-2021-47471] = "fixed-version: Fixed from version 5.15" | ||
1169 | |||
1170 | CVE_STATUS[CVE-2021-47473] = "fixed-version: Fixed from version 5.15" | ||
1171 | |||
1172 | CVE_STATUS[CVE-2021-47474] = "fixed-version: Fixed from version 5.16" | ||
1173 | |||
1174 | CVE_STATUS[CVE-2021-47475] = "fixed-version: Fixed from version 5.16" | ||
1175 | |||
1176 | CVE_STATUS[CVE-2021-47476] = "fixed-version: Fixed from version 5.16" | ||
1177 | |||
1178 | CVE_STATUS[CVE-2021-47477] = "fixed-version: Fixed from version 5.16" | ||
1179 | |||
1180 | CVE_STATUS[CVE-2021-47478] = "fixed-version: Fixed from version 5.16" | ||
1181 | |||
1182 | CVE_STATUS[CVE-2021-47479] = "fixed-version: Fixed from version 5.16" | ||
1183 | |||
1184 | CVE_STATUS[CVE-2021-47480] = "fixed-version: Fixed from version 5.15" | ||
1185 | |||
1186 | CVE_STATUS[CVE-2021-47481] = "fixed-version: Fixed from version 5.15" | ||
1187 | |||
1188 | CVE_STATUS[CVE-2021-47482] = "fixed-version: Fixed from version 5.15" | ||
1189 | |||
1190 | CVE_STATUS[CVE-2021-47483] = "fixed-version: Fixed from version 5.15" | ||
1191 | |||
1192 | CVE_STATUS[CVE-2021-47484] = "fixed-version: Fixed from version 5.15" | ||
1193 | |||
1194 | CVE_STATUS[CVE-2021-47485] = "fixed-version: Fixed from version 5.15" | ||
1195 | |||
1196 | CVE_STATUS[CVE-2021-47486] = "fixed-version: Fixed from version 5.15" | ||
1197 | |||
1198 | CVE_STATUS[CVE-2021-47489] = "fixed-version: Fixed from version 5.15" | ||
1199 | |||
1200 | CVE_STATUS[CVE-2021-47490] = "fixed-version: Fixed from version 5.15" | ||
1201 | |||
1202 | CVE_STATUS[CVE-2021-47491] = "fixed-version: Fixed from version 5.15" | ||
1203 | |||
1204 | CVE_STATUS[CVE-2021-47492] = "fixed-version: Fixed from version 5.15" | ||
1205 | |||
1206 | CVE_STATUS[CVE-2021-47493] = "fixed-version: Fixed from version 5.15" | ||
1207 | |||
1208 | CVE_STATUS[CVE-2021-47494] = "fixed-version: Fixed from version 5.15" | ||
1209 | |||
1210 | CVE_STATUS[CVE-2021-47495] = "fixed-version: Fixed from version 5.15" | ||
1211 | |||
1212 | CVE_STATUS[CVE-2021-47496] = "fixed-version: Fixed from version 5.15" | ||
1213 | |||
1214 | CVE_STATUS[CVE-2021-47497] = "fixed-version: Fixed from version 5.15" | ||
1215 | |||
1216 | CVE_STATUS[CVE-2021-47498] = "fixed-version: Fixed from version 5.15" | ||
1217 | |||
1218 | CVE_STATUS[CVE-2021-47499] = "fixed-version: Fixed from version 5.16" | ||
1219 | |||
1220 | CVE_STATUS[CVE-2021-47500] = "fixed-version: Fixed from version 5.16" | ||
1221 | |||
1222 | CVE_STATUS[CVE-2021-47501] = "fixed-version: Fixed from version 5.16" | ||
1223 | |||
1224 | CVE_STATUS[CVE-2021-47502] = "fixed-version: Fixed from version 5.16" | ||
1225 | |||
1226 | CVE_STATUS[CVE-2021-47503] = "fixed-version: Fixed from version 5.16" | ||
1227 | |||
1228 | CVE_STATUS[CVE-2021-47504] = "fixed-version: Fixed from version 5.16" | ||
1229 | |||
1230 | CVE_STATUS[CVE-2021-47505] = "fixed-version: Fixed from version 5.16" | ||
1231 | |||
1232 | CVE_STATUS[CVE-2021-47506] = "fixed-version: Fixed from version 5.16" | ||
1233 | |||
1234 | CVE_STATUS[CVE-2021-47507] = "fixed-version: Fixed from version 5.16" | ||
1235 | |||
1236 | CVE_STATUS[CVE-2021-47508] = "fixed-version: Fixed from version 5.16" | ||
1237 | |||
1238 | CVE_STATUS[CVE-2021-47509] = "fixed-version: Fixed from version 5.16" | ||
1239 | |||
1240 | CVE_STATUS[CVE-2021-47510] = "fixed-version: Fixed from version 5.16" | ||
1241 | |||
1242 | CVE_STATUS[CVE-2021-47511] = "fixed-version: Fixed from version 5.16" | ||
1243 | |||
1244 | CVE_STATUS[CVE-2021-47512] = "fixed-version: Fixed from version 5.16" | ||
1245 | |||
1246 | CVE_STATUS[CVE-2021-47513] = "fixed-version: Fixed from version 5.16" | ||
1247 | |||
1248 | CVE_STATUS[CVE-2021-47514] = "fixed-version: Fixed from version 5.16" | ||
1249 | |||
1250 | CVE_STATUS[CVE-2021-47515] = "fixed-version: Fixed from version 5.16" | ||
1251 | |||
1252 | CVE_STATUS[CVE-2021-47516] = "fixed-version: Fixed from version 5.16" | ||
1253 | |||
1254 | CVE_STATUS[CVE-2021-47517] = "fixed-version: Fixed from version 5.16" | ||
1255 | |||
1256 | CVE_STATUS[CVE-2021-47518] = "fixed-version: Fixed from version 5.16" | ||
1257 | |||
1258 | CVE_STATUS[CVE-2021-47519] = "fixed-version: Fixed from version 5.16" | ||
1259 | |||
1260 | CVE_STATUS[CVE-2021-47520] = "fixed-version: Fixed from version 5.16" | ||
1261 | |||
1262 | CVE_STATUS[CVE-2021-47521] = "fixed-version: Fixed from version 5.16" | ||
1263 | |||
1264 | CVE_STATUS[CVE-2021-47522] = "fixed-version: Fixed from version 5.16" | ||
1265 | |||
1266 | CVE_STATUS[CVE-2021-47523] = "fixed-version: Fixed from version 5.16" | ||
1267 | |||
1268 | CVE_STATUS[CVE-2021-47524] = "fixed-version: Fixed from version 5.16" | ||
1269 | |||
1270 | CVE_STATUS[CVE-2021-47525] = "fixed-version: Fixed from version 5.16" | ||
1271 | |||
1272 | CVE_STATUS[CVE-2021-47526] = "fixed-version: Fixed from version 5.16" | ||
1273 | |||
1274 | CVE_STATUS[CVE-2021-47527] = "fixed-version: Fixed from version 5.16" | ||
1275 | |||
1276 | CVE_STATUS[CVE-2021-47528] = "fixed-version: Fixed from version 5.16" | ||
1277 | |||
1278 | CVE_STATUS[CVE-2021-47529] = "fixed-version: Fixed from version 5.16" | ||
1279 | |||
1280 | CVE_STATUS[CVE-2021-47530] = "fixed-version: Fixed from version 5.16" | ||
1281 | |||
1282 | CVE_STATUS[CVE-2021-47531] = "fixed-version: Fixed from version 5.16" | ||
1283 | |||
1284 | CVE_STATUS[CVE-2021-47532] = "fixed-version: Fixed from version 5.16" | ||
1285 | |||
1286 | CVE_STATUS[CVE-2021-47533] = "fixed-version: Fixed from version 5.16" | ||
1287 | |||
1288 | CVE_STATUS[CVE-2021-47534] = "fixed-version: Fixed from version 5.16" | ||
1289 | |||
1290 | CVE_STATUS[CVE-2021-47535] = "fixed-version: Fixed from version 5.16" | ||
1291 | |||
1292 | CVE_STATUS[CVE-2021-47536] = "fixed-version: Fixed from version 5.16" | ||
1293 | |||
1294 | CVE_STATUS[CVE-2021-47537] = "fixed-version: Fixed from version 5.16" | ||
1295 | |||
1296 | CVE_STATUS[CVE-2021-47538] = "fixed-version: Fixed from version 5.16" | ||
1297 | |||
1298 | CVE_STATUS[CVE-2021-47539] = "fixed-version: Fixed from version 5.16" | ||
1299 | |||
1300 | CVE_STATUS[CVE-2021-47540] = "fixed-version: Fixed from version 5.16" | ||
1301 | |||
1302 | CVE_STATUS[CVE-2021-47541] = "fixed-version: Fixed from version 5.16" | ||
1303 | |||
1304 | CVE_STATUS[CVE-2021-47542] = "fixed-version: Fixed from version 5.16" | ||
1305 | |||
1306 | CVE_STATUS[CVE-2021-47544] = "fixed-version: Fixed from version 5.16" | ||
1307 | |||
1308 | CVE_STATUS[CVE-2021-47546] = "fixed-version: Fixed from version 5.16" | ||
1309 | |||
1310 | CVE_STATUS[CVE-2021-47547] = "fixed-version: Fixed from version 5.16" | ||
1311 | |||
1312 | CVE_STATUS[CVE-2021-47548] = "fixed-version: Fixed from version 5.16" | ||
1313 | |||
1314 | CVE_STATUS[CVE-2021-47549] = "fixed-version: Fixed from version 5.16" | ||
1315 | |||
1316 | CVE_STATUS[CVE-2021-47550] = "fixed-version: Fixed from version 5.16" | ||
1317 | |||
1318 | CVE_STATUS[CVE-2021-47551] = "fixed-version: Fixed from version 5.16" | ||
1319 | |||
1320 | CVE_STATUS[CVE-2021-47552] = "fixed-version: Fixed from version 5.16" | ||
1321 | |||
1322 | CVE_STATUS[CVE-2021-47553] = "fixed-version: Fixed from version 5.16" | ||
1323 | |||
1324 | CVE_STATUS[CVE-2021-47554] = "fixed-version: Fixed from version 5.16" | ||
1325 | |||
1326 | CVE_STATUS[CVE-2021-47555] = "fixed-version: Fixed from version 5.15.6" | ||
1327 | |||
1328 | CVE_STATUS[CVE-2021-47556] = "fixed-version: Fixed from version 5.16" | ||
1329 | |||
1330 | CVE_STATUS[CVE-2021-47557] = "fixed-version: Fixed from version 5.16" | ||
1331 | |||
1332 | CVE_STATUS[CVE-2021-47558] = "fixed-version: Fixed from version 5.16" | ||
1333 | |||
1334 | CVE_STATUS[CVE-2021-47559] = "fixed-version: Fixed from version 5.16" | ||
1335 | |||
1336 | CVE_STATUS[CVE-2021-47560] = "fixed-version: Fixed from version 5.16" | ||
1337 | |||
1338 | CVE_STATUS[CVE-2021-47561] = "fixed-version: Fixed from version 5.16" | ||
1339 | |||
1340 | CVE_STATUS[CVE-2021-47562] = "fixed-version: Fixed from version 5.16" | ||
1341 | |||
1342 | CVE_STATUS[CVE-2021-47563] = "fixed-version: Fixed from version 5.16" | ||
1343 | |||
1344 | CVE_STATUS[CVE-2021-47564] = "fixed-version: Fixed from version 5.16" | ||
1345 | |||
1346 | CVE_STATUS[CVE-2021-47565] = "fixed-version: Fixed from version 5.16" | ||
1347 | |||
1348 | CVE_STATUS[CVE-2021-47566] = "fixed-version: Fixed from version 5.16" | ||
1349 | |||
1350 | CVE_STATUS[CVE-2021-47567] = "fixed-version: Fixed from version 5.16" | ||
1351 | |||
1352 | CVE_STATUS[CVE-2021-47568] = "fixed-version: Fixed from version 5.16" | ||
1353 | |||
1354 | CVE_STATUS[CVE-2021-47569] = "fixed-version: Fixed from version 5.16" | ||
1355 | |||
1356 | CVE_STATUS[CVE-2021-47570] = "fixed-version: Fixed from version 5.16" | ||
1357 | |||
1358 | CVE_STATUS[CVE-2021-47571] = "fixed-version: Fixed from version 5.16" | ||
1359 | |||
1360 | CVE_STATUS[CVE-2021-47572] = "fixed-version: Fixed from version 5.16" | ||
1361 | |||
1362 | CVE_STATUS[CVE-2021-47576] = "fixed-version: Fixed from version 5.16" | ||
1363 | |||
1364 | CVE_STATUS[CVE-2021-47577] = "fixed-version: Fixed from version 5.16" | ||
1365 | |||
1366 | CVE_STATUS[CVE-2021-47578] = "fixed-version: Fixed from version 5.16" | ||
1367 | |||
1368 | CVE_STATUS[CVE-2021-47579] = "fixed-version: Fixed from version 5.16" | ||
1369 | |||
1370 | CVE_STATUS[CVE-2021-47580] = "fixed-version: Fixed from version 5.16" | ||
1371 | |||
1372 | CVE_STATUS[CVE-2021-47582] = "fixed-version: Fixed from version 5.16" | ||
1373 | |||
1374 | CVE_STATUS[CVE-2021-47583] = "fixed-version: Fixed from version 5.16" | ||
1375 | |||
1376 | CVE_STATUS[CVE-2021-47584] = "fixed-version: Fixed from version 5.16" | ||
1377 | |||
1378 | CVE_STATUS[CVE-2021-47585] = "fixed-version: Fixed from version 5.16" | ||
1379 | |||
1380 | CVE_STATUS[CVE-2021-47586] = "fixed-version: Fixed from version 5.16" | ||
1381 | |||
1382 | CVE_STATUS[CVE-2021-47587] = "fixed-version: Fixed from version 5.16" | ||
1383 | |||
1384 | CVE_STATUS[CVE-2021-47588] = "fixed-version: Fixed from version 5.16" | ||
1385 | |||
1386 | CVE_STATUS[CVE-2021-47589] = "fixed-version: Fixed from version 5.16" | ||
1387 | |||
1388 | CVE_STATUS[CVE-2021-47590] = "fixed-version: Fixed from version 5.16" | ||
1389 | |||
1390 | CVE_STATUS[CVE-2021-47591] = "fixed-version: Fixed from version 5.16" | ||
1391 | |||
1392 | CVE_STATUS[CVE-2021-47592] = "fixed-version: Fixed from version 5.16" | ||
1393 | |||
1394 | CVE_STATUS[CVE-2021-47593] = "fixed-version: Fixed from version 5.16" | ||
1395 | |||
1396 | CVE_STATUS[CVE-2021-47594] = "fixed-version: Fixed from version 5.16" | ||
1397 | |||
1398 | CVE_STATUS[CVE-2021-47595] = "fixed-version: Fixed from version 5.15.11" | ||
1399 | |||
1400 | CVE_STATUS[CVE-2021-47596] = "fixed-version: Fixed from version 5.16" | ||
1401 | |||
1402 | CVE_STATUS[CVE-2021-47597] = "fixed-version: Fixed from version 5.16" | ||
1403 | |||
1404 | CVE_STATUS[CVE-2021-47598] = "fixed-version: Fixed from version 5.16" | ||
1405 | |||
1406 | CVE_STATUS[CVE-2021-47599] = "fixed-version: Fixed from version 5.16" | ||
1407 | |||
1408 | CVE_STATUS[CVE-2021-47600] = "fixed-version: Fixed from version 5.16" | ||
1409 | |||
1410 | CVE_STATUS[CVE-2021-47601] = "fixed-version: Fixed from version 5.16" | ||
1411 | |||
1412 | CVE_STATUS[CVE-2021-47602] = "fixed-version: Fixed from version 5.16" | ||
1413 | |||
1414 | CVE_STATUS[CVE-2021-47603] = "fixed-version: Fixed from version 5.16" | ||
1415 | |||
1416 | CVE_STATUS[CVE-2021-47604] = "fixed-version: Fixed from version 5.16" | ||
1417 | |||
1418 | CVE_STATUS[CVE-2021-47605] = "fixed-version: Fixed from version 5.16" | ||
1419 | |||
1420 | CVE_STATUS[CVE-2021-47606] = "fixed-version: Fixed from version 5.16" | ||
1421 | |||
1422 | CVE_STATUS[CVE-2021-47607] = "fixed-version: Fixed from version 5.16" | ||
1423 | |||
1424 | CVE_STATUS[CVE-2021-47608] = "fixed-version: Fixed from version 5.16" | ||
1425 | |||
1426 | CVE_STATUS[CVE-2021-47609] = "fixed-version: Fixed from version 5.16" | ||
1427 | |||
1428 | CVE_STATUS[CVE-2021-47610] = "fixed-version: Fixed from version 5.16" | ||
1429 | |||
1430 | CVE_STATUS[CVE-2021-47611] = "fixed-version: Fixed from version 5.16" | ||
1431 | |||
1432 | CVE_STATUS[CVE-2021-47612] = "fixed-version: Fixed from version 5.16" | ||
1433 | |||
1434 | CVE_STATUS[CVE-2021-47613] = "fixed-version: Fixed from version 5.16" | ||
1435 | |||
1436 | CVE_STATUS[CVE-2021-47614] = "fixed-version: Fixed from version 5.16" | ||
1437 | |||
1438 | CVE_STATUS[CVE-2021-47616] = "fixed-version: Fixed from version 5.16" | ||
1439 | |||
1440 | CVE_STATUS[CVE-2021-47617] = "fixed-version: Fixed from version 5.17" | ||
1441 | |||
1442 | CVE_STATUS[CVE-2021-47618] = "fixed-version: Fixed from version 5.17" | ||
1443 | |||
1444 | CVE_STATUS[CVE-2021-47619] = "fixed-version: Fixed from version 5.17" | ||
1445 | |||
1446 | CVE_STATUS[CVE-2021-47620] = "fixed-version: Fixed from version 5.17" | ||
1447 | |||
1448 | CVE_STATUS[CVE-2021-47622] = "fixed-version: Fixed from version 5.17" | ||
1449 | |||
1450 | CVE_STATUS[CVE-2021-47623] = "fixed-version: Fixed from version 5.17" | ||
1451 | |||
1452 | CVE_STATUS[CVE-2021-47624] = "fixed-version: Fixed from version 5.17" | ||
1453 | |||
1454 | CVE_STATUS[CVE-2021-47631] = "fixed-version: Fixed from version 5.18" | ||
1455 | |||
1456 | CVE_STATUS[CVE-2021-47632] = "fixed-version: Fixed from version 5.18" | ||
1457 | |||
1458 | CVE_STATUS[CVE-2021-47633] = "fixed-version: Fixed from version 5.18" | ||
1459 | |||
1460 | CVE_STATUS[CVE-2021-47634] = "fixed-version: Fixed from version 5.18" | ||
1461 | |||
1462 | CVE_STATUS[CVE-2021-47635] = "fixed-version: Fixed from version 5.18" | ||
1463 | |||
1464 | CVE_STATUS[CVE-2021-47636] = "fixed-version: Fixed from version 5.18" | ||
1465 | |||
1466 | CVE_STATUS[CVE-2021-47637] = "fixed-version: Fixed from version 5.18" | ||
1467 | |||
1468 | CVE_STATUS[CVE-2021-47638] = "fixed-version: Fixed from version 5.18" | ||
1469 | |||
1470 | CVE_STATUS[CVE-2021-47639] = "fixed-version: Fixed from version 5.18" | ||
1471 | |||
1472 | CVE_STATUS[CVE-2021-47640] = "fixed-version: Fixed from version 5.18" | ||
1473 | |||
1474 | CVE_STATUS[CVE-2021-47641] = "fixed-version: Fixed from version 5.18" | ||
1475 | |||
1476 | CVE_STATUS[CVE-2021-47642] = "fixed-version: Fixed from version 5.18" | ||
1477 | |||
1478 | CVE_STATUS[CVE-2021-47643] = "fixed-version: Fixed from version 5.18" | ||
1479 | |||
1480 | CVE_STATUS[CVE-2021-47644] = "fixed-version: Fixed from version 5.18" | ||
1481 | |||
1482 | CVE_STATUS[CVE-2021-47645] = "fixed-version: Fixed from version 5.18" | ||
1483 | |||
1484 | CVE_STATUS[CVE-2021-47646] = "fixed-version: Fixed from version 5.18" | ||
1485 | |||
1486 | CVE_STATUS[CVE-2021-47647] = "fixed-version: Fixed from version 5.18" | ||
1487 | |||
1488 | CVE_STATUS[CVE-2021-47648] = "fixed-version: Fixed from version 5.18" | ||
1489 | |||
1490 | CVE_STATUS[CVE-2021-47649] = "fixed-version: Fixed from version 5.18" | ||
1491 | |||
1492 | CVE_STATUS[CVE-2021-47650] = "fixed-version: Fixed from version 5.18" | ||
1493 | |||
1494 | CVE_STATUS[CVE-2021-47651] = "fixed-version: Fixed from version 5.18" | ||
1495 | |||
1496 | CVE_STATUS[CVE-2021-47652] = "fixed-version: Fixed from version 5.18" | ||
1497 | |||
1498 | CVE_STATUS[CVE-2021-47653] = "fixed-version: Fixed from version 5.18" | ||
1499 | |||
1500 | CVE_STATUS[CVE-2021-47654] = "fixed-version: Fixed from version 5.18" | ||
1501 | |||
1502 | CVE_STATUS[CVE-2021-47655] = "fixed-version: Fixed from version 5.18" | ||
1503 | |||
1504 | CVE_STATUS[CVE-2021-47656] = "fixed-version: Fixed from version 5.18" | ||
1505 | |||
1506 | CVE_STATUS[CVE-2021-47657] = "fixed-version: Fixed from version 5.18" | ||
1507 | |||
1508 | CVE_STATUS[CVE-2021-47658] = "fixed-version: Fixed from version 5.17" | ||
1509 | |||
1510 | CVE_STATUS[CVE-2021-47659] = "fixed-version: Fixed from version 5.19" | ||
1511 | |||
1512 | CVE_STATUS[CVE-2021-47660] = "fixed-version: Fixed from version 5.19" | ||
1513 | |||
1514 | CVE_STATUS[CVE-2021-47668] = "fixed-version: Fixed from version 5.11" | ||
1515 | |||
1516 | CVE_STATUS[CVE-2021-47669] = "fixed-version: Fixed from version 5.11" | ||
1517 | |||
1518 | CVE_STATUS[CVE-2021-47670] = "fixed-version: Fixed from version 5.11" | ||
1519 | |||
1520 | CVE_STATUS[CVE-2021-47671] = "fixed-version: Fixed from version 5.16" | ||
1521 | |||
1522 | CVE_STATUS[CVE-2021-4439] = "fixed-version: Fixed from version 5.15" | ||
1523 | |||
1524 | CVE_STATUS[CVE-2021-4440] = "fixed-version: Fixed from version 5.10.218" | ||
1525 | |||
1526 | CVE_STATUS[CVE-2021-4441] = "fixed-version: Fixed from version 5.17" | ||
1527 | |||
1528 | CVE_STATUS[CVE-2021-4442] = "fixed-version: Fixed from version 5.12" | ||
1529 | |||
1530 | CVE_STATUS[CVE-2021-4453] = "fixed-version: Fixed from version 5.16" | ||
1531 | |||
1532 | CVE_STATUS[CVE-2021-4454] = "fixed-version: Fixed from version 6.2" | ||
1533 | |||
1534 | CVE_STATUS[CVE-2022-21546] = "fixed-version: Fixed from version 5.19" | ||
1535 | |||
1536 | # CVE-2022-26365 has no known resolution | ||
1537 | |||
1538 | # CVE-2022-33740 has no known resolution | ||
1539 | |||
1540 | # CVE-2022-33741 has no known resolution | ||
1541 | |||
1542 | # CVE-2022-33742 has no known resolution | ||
1543 | |||
1544 | # CVE-2022-33743 has no known resolution | ||
1545 | |||
1546 | # CVE-2022-33744 has no known resolution | ||
1547 | |||
1548 | # CVE-2022-3643 has no known resolution | ||
1549 | |||
1550 | # CVE-2022-42328 has no known resolution | ||
1551 | |||
1552 | # CVE-2022-42329 has no known resolution | ||
1553 | |||
1554 | CVE_STATUS[CVE-2022-48626] = "fixed-version: Fixed from version 5.17" | ||
1555 | |||
1556 | CVE_STATUS[CVE-2022-48627] = "fixed-version: Fixed from version 5.19" | ||
1557 | |||
1558 | CVE_STATUS[CVE-2022-48628] = "fixed-version: Fixed from version 6.6" | ||
1559 | |||
1560 | CVE_STATUS[CVE-2022-48629] = "fixed-version: Fixed from version 5.17" | ||
1561 | |||
1562 | CVE_STATUS[CVE-2022-48630] = "fixed-version: Fixed from version 5.18" | ||
1563 | |||
1564 | CVE_STATUS[CVE-2022-48631] = "fixed-version: Fixed from version 6.0" | ||
1565 | |||
1566 | CVE_STATUS[CVE-2022-48632] = "fixed-version: Fixed from version 6.0" | ||
1567 | |||
1568 | CVE_STATUS[CVE-2022-48633] = "fixed-version: Fixed from version 6.0" | ||
1569 | |||
1570 | CVE_STATUS[CVE-2022-48634] = "fixed-version: Fixed from version 6.0" | ||
1571 | |||
1572 | CVE_STATUS[CVE-2022-48635] = "fixed-version: Fixed from version 6.0" | ||
1573 | |||
1574 | CVE_STATUS[CVE-2022-48636] = "fixed-version: Fixed from version 6.0" | ||
1575 | |||
1576 | CVE_STATUS[CVE-2022-48637] = "fixed-version: Fixed from version 6.0" | ||
1577 | |||
1578 | CVE_STATUS[CVE-2022-48638] = "fixed-version: Fixed from version 6.0" | ||
1579 | |||
1580 | CVE_STATUS[CVE-2022-48639] = "fixed-version: Fixed from version 6.0" | ||
1581 | |||
1582 | CVE_STATUS[CVE-2022-48640] = "fixed-version: Fixed from version 6.0" | ||
1583 | |||
1584 | CVE_STATUS[CVE-2022-48641] = "fixed-version: Fixed from version 5.19.12" | ||
1585 | |||
1586 | CVE_STATUS[CVE-2022-48642] = "fixed-version: Fixed from version 6.0" | ||
1587 | |||
1588 | CVE_STATUS[CVE-2022-48643] = "fixed-version: Fixed from version 5.19.12" | ||
1589 | |||
1590 | CVE_STATUS[CVE-2022-48644] = "fixed-version: Fixed from version 6.0" | ||
1591 | |||
1592 | CVE_STATUS[CVE-2022-48645] = "fixed-version: Fixed from version 6.0" | ||
1593 | |||
1594 | CVE_STATUS[CVE-2022-48646] = "fixed-version: Fixed from version 6.0" | ||
1595 | |||
1596 | CVE_STATUS[CVE-2022-48647] = "fixed-version: Fixed from version 6.0" | ||
1597 | |||
1598 | CVE_STATUS[CVE-2022-48648] = "fixed-version: Fixed from version 6.0" | ||
1599 | |||
1600 | CVE_STATUS[CVE-2022-48649] = "fixed-version: Fixed from version 5.19.12" | ||
1601 | |||
1602 | CVE_STATUS[CVE-2022-48650] = "fixed-version: Fixed from version 6.0" | ||
1603 | |||
1604 | CVE_STATUS[CVE-2022-48651] = "fixed-version: Fixed from version 6.0" | ||
1605 | |||
1606 | CVE_STATUS[CVE-2022-48652] = "fixed-version: Fixed from version 6.0" | ||
1607 | |||
1608 | CVE_STATUS[CVE-2022-48653] = "fixed-version: Fixed from version 6.0" | ||
1609 | |||
1610 | CVE_STATUS[CVE-2022-48654] = "fixed-version: Fixed from version 6.0" | ||
1611 | |||
1612 | CVE_STATUS[CVE-2022-48655] = "fixed-version: Fixed from version 6.0" | ||
1613 | |||
1614 | CVE_STATUS[CVE-2022-48656] = "fixed-version: Fixed from version 6.0" | ||
1615 | |||
1616 | CVE_STATUS[CVE-2022-48657] = "fixed-version: Fixed from version 6.0" | ||
1617 | |||
1618 | CVE_STATUS[CVE-2022-48658] = "fixed-version: Fixed from version 6.0" | ||
1619 | |||
1620 | CVE_STATUS[CVE-2022-48659] = "fixed-version: Fixed from version 6.0" | ||
1621 | |||
1622 | CVE_STATUS[CVE-2022-48660] = "fixed-version: Fixed from version 6.0" | ||
1623 | |||
1624 | CVE_STATUS[CVE-2022-48661] = "fixed-version: Fixed from version 6.0" | ||
1625 | |||
1626 | CVE_STATUS[CVE-2022-48662] = "fixed-version: Fixed from version 6.0" | ||
1627 | |||
1628 | CVE_STATUS[CVE-2022-48663] = "fixed-version: Fixed from version 5.19.12" | ||
1629 | |||
1630 | CVE_STATUS[CVE-2022-48664] = "fixed-version: Fixed from version 6.0" | ||
1631 | |||
1632 | CVE_STATUS[CVE-2022-48665] = "fixed-version: Fixed from version 6.0" | ||
1633 | |||
1634 | CVE_STATUS[CVE-2022-48666] = "fixed-version: Fixed from version 6.0" | ||
1635 | |||
1636 | CVE_STATUS[CVE-2022-48667] = "fixed-version: Fixed from version 6.0" | ||
1637 | |||
1638 | CVE_STATUS[CVE-2022-48668] = "fixed-version: Fixed from version 6.0" | ||
1639 | |||
1640 | CVE_STATUS[CVE-2022-48669] = "fixed-version: Fixed from version 6.9" | ||
1641 | |||
1642 | CVE_STATUS[CVE-2022-48670] = "fixed-version: Fixed from version 6.0" | ||
1643 | |||
1644 | CVE_STATUS[CVE-2022-48671] = "fixed-version: Fixed from version 5.19.11" | ||
1645 | |||
1646 | CVE_STATUS[CVE-2022-48672] = "fixed-version: Fixed from version 6.0" | ||
1647 | |||
1648 | CVE_STATUS[CVE-2022-48673] = "fixed-version: Fixed from version 6.0" | ||
1649 | |||
1650 | CVE_STATUS[CVE-2022-48674] = "fixed-version: Fixed from version 6.0" | ||
1651 | |||
1652 | CVE_STATUS[CVE-2022-48675] = "fixed-version: Fixed from version 6.0" | ||
1653 | |||
1654 | CVE_STATUS[CVE-2022-48686] = "fixed-version: Fixed from version 6.0" | ||
1655 | |||
1656 | CVE_STATUS[CVE-2022-48687] = "fixed-version: Fixed from version 6.0" | ||
1657 | |||
1658 | CVE_STATUS[CVE-2022-48688] = "fixed-version: Fixed from version 6.0" | ||
1659 | |||
1660 | CVE_STATUS[CVE-2022-48689] = "fixed-version: Fixed from version 6.0" | ||
1661 | |||
1662 | CVE_STATUS[CVE-2022-48690] = "fixed-version: Fixed from version 6.0" | ||
1663 | |||
1664 | CVE_STATUS[CVE-2022-48691] = "fixed-version: Fixed from version 6.0" | ||
1665 | |||
1666 | CVE_STATUS[CVE-2022-48692] = "fixed-version: Fixed from version 6.0" | ||
1667 | |||
1668 | CVE_STATUS[CVE-2022-48693] = "fixed-version: Fixed from version 6.0" | ||
1669 | |||
1670 | CVE_STATUS[CVE-2022-48694] = "fixed-version: Fixed from version 6.0" | ||
1671 | |||
1672 | CVE_STATUS[CVE-2022-48695] = "fixed-version: Fixed from version 6.0" | ||
1673 | |||
1674 | CVE_STATUS[CVE-2022-48696] = "fixed-version: Fixed from version 6.0" | ||
1675 | |||
1676 | CVE_STATUS[CVE-2022-48697] = "fixed-version: Fixed from version 6.0" | ||
1677 | |||
1678 | CVE_STATUS[CVE-2022-48698] = "fixed-version: Fixed from version 6.0" | ||
1679 | |||
1680 | CVE_STATUS[CVE-2022-48699] = "fixed-version: Fixed from version 6.0" | ||
1681 | |||
1682 | CVE_STATUS[CVE-2022-48701] = "fixed-version: Fixed from version 6.0" | ||
1683 | |||
1684 | CVE_STATUS[CVE-2022-48702] = "fixed-version: Fixed from version 6.0" | ||
1685 | |||
1686 | CVE_STATUS[CVE-2022-48703] = "fixed-version: Fixed from version 6.0" | ||
1687 | |||
1688 | CVE_STATUS[CVE-2022-48704] = "fixed-version: Fixed from version 6.0" | ||
1689 | |||
1690 | CVE_STATUS[CVE-2022-48705] = "fixed-version: Fixed from version 6.0" | ||
1691 | |||
1692 | CVE_STATUS[CVE-2022-48706] = "fixed-version: Fixed from version 6.2" | ||
1693 | |||
1694 | CVE_STATUS[CVE-2022-48707] = "fixed-version: Fixed from version 6.2" | ||
1695 | |||
1696 | CVE_STATUS[CVE-2022-48708] = "fixed-version: Fixed from version 6.2" | ||
1697 | |||
1698 | CVE_STATUS[CVE-2022-48709] = "fixed-version: Fixed from version 6.2" | ||
1699 | |||
1700 | CVE_STATUS[CVE-2022-48710] = "fixed-version: Fixed from version 5.19" | ||
1701 | |||
1702 | CVE_STATUS[CVE-2022-48711] = "fixed-version: Fixed from version 5.17" | ||
1703 | |||
1704 | CVE_STATUS[CVE-2022-48712] = "fixed-version: Fixed from version 5.17" | ||
1705 | |||
1706 | CVE_STATUS[CVE-2022-48713] = "fixed-version: Fixed from version 5.17" | ||
1707 | |||
1708 | CVE_STATUS[CVE-2022-48714] = "fixed-version: Fixed from version 5.17" | ||
1709 | |||
1710 | CVE_STATUS[CVE-2022-48715] = "fixed-version: Fixed from version 5.17" | ||
1711 | |||
1712 | CVE_STATUS[CVE-2022-48716] = "fixed-version: Fixed from version 5.17" | ||
1713 | |||
1714 | CVE_STATUS[CVE-2022-48717] = "fixed-version: Fixed from version 5.17" | ||
1715 | |||
1716 | CVE_STATUS[CVE-2022-48718] = "fixed-version: Fixed from version 5.17" | ||
1717 | |||
1718 | CVE_STATUS[CVE-2022-48719] = "fixed-version: Fixed from version 5.17" | ||
1719 | |||
1720 | CVE_STATUS[CVE-2022-48720] = "fixed-version: Fixed from version 5.17" | ||
1721 | |||
1722 | CVE_STATUS[CVE-2022-48721] = "fixed-version: Fixed from version 5.17" | ||
1723 | |||
1724 | CVE_STATUS[CVE-2022-48722] = "fixed-version: Fixed from version 5.17" | ||
1725 | |||
1726 | CVE_STATUS[CVE-2022-48723] = "fixed-version: Fixed from version 5.17" | ||
1727 | |||
1728 | CVE_STATUS[CVE-2022-48724] = "fixed-version: Fixed from version 5.17" | ||
1729 | |||
1730 | CVE_STATUS[CVE-2022-48725] = "fixed-version: Fixed from version 5.17" | ||
1731 | |||
1732 | CVE_STATUS[CVE-2022-48726] = "fixed-version: Fixed from version 5.17" | ||
1733 | |||
1734 | CVE_STATUS[CVE-2022-48727] = "fixed-version: Fixed from version 5.17" | ||
1735 | |||
1736 | CVE_STATUS[CVE-2022-48728] = "fixed-version: Fixed from version 5.17" | ||
1737 | |||
1738 | CVE_STATUS[CVE-2022-48729] = "fixed-version: Fixed from version 5.17" | ||
1739 | |||
1740 | CVE_STATUS[CVE-2022-48730] = "fixed-version: Fixed from version 5.17" | ||
1741 | |||
1742 | CVE_STATUS[CVE-2022-48731] = "fixed-version: Fixed from version 5.17" | ||
1743 | |||
1744 | CVE_STATUS[CVE-2022-48732] = "fixed-version: Fixed from version 5.17" | ||
1745 | |||
1746 | CVE_STATUS[CVE-2022-48733] = "fixed-version: Fixed from version 5.17" | ||
1747 | |||
1748 | CVE_STATUS[CVE-2022-48734] = "fixed-version: Fixed from version 5.17" | ||
1749 | |||
1750 | CVE_STATUS[CVE-2022-48735] = "fixed-version: Fixed from version 5.17" | ||
1751 | |||
1752 | CVE_STATUS[CVE-2022-48738] = "fixed-version: Fixed from version 5.17" | ||
1753 | |||
1754 | CVE_STATUS[CVE-2022-48739] = "fixed-version: Fixed from version 5.17" | ||
1755 | |||
1756 | CVE_STATUS[CVE-2022-48740] = "fixed-version: Fixed from version 5.17" | ||
1757 | |||
1758 | CVE_STATUS[CVE-2022-48741] = "fixed-version: Fixed from version 5.17" | ||
1759 | |||
1760 | CVE_STATUS[CVE-2022-48742] = "fixed-version: Fixed from version 5.17" | ||
1761 | |||
1762 | CVE_STATUS[CVE-2022-48743] = "fixed-version: Fixed from version 5.17" | ||
1763 | |||
1764 | CVE_STATUS[CVE-2022-48744] = "fixed-version: Fixed from version 5.17" | ||
1765 | |||
1766 | CVE_STATUS[CVE-2022-48745] = "fixed-version: Fixed from version 5.17" | ||
1767 | |||
1768 | CVE_STATUS[CVE-2022-48746] = "fixed-version: Fixed from version 5.17" | ||
1769 | |||
1770 | CVE_STATUS[CVE-2022-48747] = "fixed-version: Fixed from version 5.17" | ||
1771 | |||
1772 | CVE_STATUS[CVE-2022-48748] = "fixed-version: Fixed from version 5.17" | ||
1773 | |||
1774 | CVE_STATUS[CVE-2022-48749] = "fixed-version: Fixed from version 5.17" | ||
1775 | |||
1776 | CVE_STATUS[CVE-2022-48750] = "fixed-version: Fixed from version 5.17" | ||
1777 | |||
1778 | CVE_STATUS[CVE-2022-48751] = "fixed-version: Fixed from version 5.17" | ||
1779 | |||
1780 | CVE_STATUS[CVE-2022-48752] = "fixed-version: Fixed from version 5.16.5" | ||
1781 | |||
1782 | CVE_STATUS[CVE-2022-48753] = "fixed-version: Fixed from version 5.17" | ||
1783 | |||
1784 | CVE_STATUS[CVE-2022-48754] = "fixed-version: Fixed from version 5.17" | ||
1785 | |||
1786 | CVE_STATUS[CVE-2022-48755] = "fixed-version: Fixed from version 5.17" | ||
1787 | |||
1788 | CVE_STATUS[CVE-2022-48756] = "fixed-version: Fixed from version 5.17" | ||
1789 | |||
1790 | CVE_STATUS[CVE-2022-48757] = "fixed-version: Fixed from version 5.17" | ||
1791 | |||
1792 | CVE_STATUS[CVE-2022-48758] = "fixed-version: Fixed from version 5.17" | ||
1793 | |||
1794 | CVE_STATUS[CVE-2022-48759] = "fixed-version: Fixed from version 5.17" | ||
1795 | |||
1796 | CVE_STATUS[CVE-2022-48760] = "fixed-version: Fixed from version 5.17" | ||
1797 | |||
1798 | CVE_STATUS[CVE-2022-48761] = "fixed-version: Fixed from version 5.17" | ||
1799 | |||
1800 | CVE_STATUS[CVE-2022-48762] = "fixed-version: Fixed from version 5.17" | ||
1801 | |||
1802 | CVE_STATUS[CVE-2022-48763] = "fixed-version: Fixed from version 5.17" | ||
1803 | |||
1804 | CVE_STATUS[CVE-2022-48764] = "fixed-version: Fixed from version 5.16.5" | ||
1805 | |||
1806 | CVE_STATUS[CVE-2022-48765] = "fixed-version: Fixed from version 5.17" | ||
1807 | |||
1808 | CVE_STATUS[CVE-2022-48766] = "fixed-version: Fixed from version 5.17" | ||
1809 | |||
1810 | CVE_STATUS[CVE-2022-48767] = "fixed-version: Fixed from version 5.17" | ||
1811 | |||
1812 | CVE_STATUS[CVE-2022-48768] = "fixed-version: Fixed from version 5.17" | ||
1813 | |||
1814 | CVE_STATUS[CVE-2022-48769] = "fixed-version: Fixed from version 5.17" | ||
1815 | |||
1816 | CVE_STATUS[CVE-2022-48770] = "fixed-version: Fixed from version 5.17" | ||
1817 | |||
1818 | CVE_STATUS[CVE-2022-48771] = "fixed-version: Fixed from version 5.17" | ||
1819 | |||
1820 | CVE_STATUS[CVE-2022-48772] = "fixed-version: Fixed from version 6.10" | ||
1821 | |||
1822 | CVE_STATUS[CVE-2022-48773] = "fixed-version: Fixed from version 5.17" | ||
1823 | |||
1824 | CVE_STATUS[CVE-2022-48774] = "fixed-version: Fixed from version 5.17" | ||
1825 | |||
1826 | CVE_STATUS[CVE-2022-48775] = "fixed-version: Fixed from version 5.17" | ||
1827 | |||
1828 | CVE_STATUS[CVE-2022-48776] = "fixed-version: Fixed from version 5.17" | ||
1829 | |||
1830 | CVE_STATUS[CVE-2022-48777] = "fixed-version: Fixed from version 5.17" | ||
1831 | |||
1832 | CVE_STATUS[CVE-2022-48778] = "fixed-version: Fixed from version 5.16.11" | ||
1833 | |||
1834 | CVE_STATUS[CVE-2022-48779] = "fixed-version: Fixed from version 5.17" | ||
1835 | |||
1836 | CVE_STATUS[CVE-2022-48780] = "fixed-version: Fixed from version 5.16.11" | ||
1837 | |||
1838 | CVE_STATUS[CVE-2022-48781] = "fixed-version: Fixed from version 5.17" | ||
1839 | |||
1840 | CVE_STATUS[CVE-2022-48782] = "fixed-version: Fixed from version 5.17" | ||
1841 | |||
1842 | CVE_STATUS[CVE-2022-48783] = "fixed-version: Fixed from version 5.16.11" | ||
1843 | |||
1844 | CVE_STATUS[CVE-2022-48784] = "fixed-version: Fixed from version 5.17" | ||
1845 | |||
1846 | CVE_STATUS[CVE-2022-48785] = "fixed-version: Fixed from version 5.17" | ||
1847 | |||
1848 | CVE_STATUS[CVE-2022-48786] = "fixed-version: Fixed from version 5.17" | ||
1849 | |||
1850 | CVE_STATUS[CVE-2022-48787] = "fixed-version: Fixed from version 5.16.11" | ||
1851 | |||
1852 | CVE_STATUS[CVE-2022-48788] = "fixed-version: Fixed from version 5.17" | ||
1853 | |||
1854 | CVE_STATUS[CVE-2022-48789] = "fixed-version: Fixed from version 5.17" | ||
1855 | |||
1856 | CVE_STATUS[CVE-2022-48790] = "fixed-version: Fixed from version 5.17" | ||
1857 | |||
1858 | CVE_STATUS[CVE-2022-48791] = "fixed-version: Fixed from version 5.17" | ||
1859 | |||
1860 | CVE_STATUS[CVE-2022-48792] = "fixed-version: Fixed from version 5.17" | ||
1861 | |||
1862 | CVE_STATUS[CVE-2022-48793] = "fixed-version: Fixed from version 5.17" | ||
1863 | |||
1864 | CVE_STATUS[CVE-2022-48794] = "fixed-version: Fixed from version 5.17" | ||
1865 | |||
1866 | CVE_STATUS[CVE-2022-48795] = "fixed-version: Fixed from version 5.17" | ||
1867 | |||
1868 | CVE_STATUS[CVE-2022-48796] = "fixed-version: Fixed from version 5.17" | ||
1869 | |||
1870 | CVE_STATUS[CVE-2022-48797] = "fixed-version: Fixed from version 5.17" | ||
1871 | |||
1872 | CVE_STATUS[CVE-2022-48798] = "fixed-version: Fixed from version 5.17" | ||
1873 | |||
1874 | CVE_STATUS[CVE-2022-48799] = "fixed-version: Fixed from version 5.17" | ||
1875 | |||
1876 | CVE_STATUS[CVE-2022-48800] = "fixed-version: Fixed from version 5.17" | ||
1877 | |||
1878 | CVE_STATUS[CVE-2022-48801] = "fixed-version: Fixed from version 5.17" | ||
1879 | |||
1880 | CVE_STATUS[CVE-2022-48802] = "fixed-version: Fixed from version 5.17" | ||
1881 | |||
1882 | CVE_STATUS[CVE-2022-48803] = "fixed-version: Fixed from version 5.17" | ||
1883 | |||
1884 | CVE_STATUS[CVE-2022-48804] = "fixed-version: Fixed from version 5.17" | ||
1885 | |||
1886 | CVE_STATUS[CVE-2022-48805] = "fixed-version: Fixed from version 5.17" | ||
1887 | |||
1888 | CVE_STATUS[CVE-2022-48806] = "fixed-version: Fixed from version 5.16.10" | ||
1889 | |||
1890 | CVE_STATUS[CVE-2022-48807] = "fixed-version: Fixed from version 5.17" | ||
1891 | |||
1892 | CVE_STATUS[CVE-2022-48808] = "fixed-version: Fixed from version 5.17" | ||
1893 | |||
1894 | CVE_STATUS[CVE-2022-48809] = "fixed-version: Fixed from version 5.17" | ||
1895 | |||
1896 | CVE_STATUS[CVE-2022-48810] = "fixed-version: Fixed from version 5.17" | ||
1897 | |||
1898 | CVE_STATUS[CVE-2022-48811] = "fixed-version: Fixed from version 5.17" | ||
1899 | |||
1900 | CVE_STATUS[CVE-2022-48812] = "fixed-version: Fixed from version 5.17" | ||
1901 | |||
1902 | CVE_STATUS[CVE-2022-48813] = "fixed-version: Fixed from version 5.17" | ||
1903 | |||
1904 | CVE_STATUS[CVE-2022-48814] = "fixed-version: Fixed from version 5.17" | ||
1905 | |||
1906 | CVE_STATUS[CVE-2022-48815] = "fixed-version: Fixed from version 5.17" | ||
1907 | |||
1908 | CVE_STATUS[CVE-2022-48816] = "fixed-version: Fixed from version 5.17" | ||
1909 | |||
1910 | CVE_STATUS[CVE-2022-48817] = "fixed-version: Fixed from version 5.17" | ||
1911 | |||
1912 | CVE_STATUS[CVE-2022-48818] = "fixed-version: Fixed from version 5.17" | ||
1913 | |||
1914 | CVE_STATUS[CVE-2022-48819] = "fixed-version: Fixed from version 5.17" | ||
1915 | |||
1916 | CVE_STATUS[CVE-2022-48820] = "fixed-version: Fixed from version 5.17" | ||
1917 | |||
1918 | CVE_STATUS[CVE-2022-48821] = "fixed-version: Fixed from version 5.17" | ||
1919 | |||
1920 | CVE_STATUS[CVE-2022-48822] = "fixed-version: Fixed from version 5.17" | ||
1921 | |||
1922 | CVE_STATUS[CVE-2022-48823] = "fixed-version: Fixed from version 5.17" | ||
1923 | |||
1924 | CVE_STATUS[CVE-2022-48824] = "fixed-version: Fixed from version 5.17" | ||
1925 | |||
1926 | CVE_STATUS[CVE-2022-48825] = "fixed-version: Fixed from version 5.17" | ||
1927 | |||
1928 | CVE_STATUS[CVE-2022-48826] = "fixed-version: Fixed from version 5.17" | ||
1929 | |||
1930 | CVE_STATUS[CVE-2022-48827] = "fixed-version: Fixed from version 5.17" | ||
1931 | |||
1932 | CVE_STATUS[CVE-2022-48828] = "fixed-version: Fixed from version 5.17" | ||
1933 | |||
1934 | CVE_STATUS[CVE-2022-48829] = "fixed-version: Fixed from version 5.17" | ||
1935 | |||
1936 | CVE_STATUS[CVE-2022-48830] = "fixed-version: Fixed from version 5.17" | ||
1937 | |||
1938 | CVE_STATUS[CVE-2022-48831] = "fixed-version: Fixed from version 5.17" | ||
1939 | |||
1940 | CVE_STATUS[CVE-2022-48832] = "fixed-version: Fixed from version 5.17" | ||
1941 | |||
1942 | CVE_STATUS[CVE-2022-48833] = "fixed-version: Fixed from version 5.17" | ||
1943 | |||
1944 | CVE_STATUS[CVE-2022-48834] = "fixed-version: Fixed from version 5.17" | ||
1945 | |||
1946 | CVE_STATUS[CVE-2022-48835] = "fixed-version: Fixed from version 5.17" | ||
1947 | |||
1948 | CVE_STATUS[CVE-2022-48836] = "fixed-version: Fixed from version 5.17" | ||
1949 | |||
1950 | CVE_STATUS[CVE-2022-48837] = "fixed-version: Fixed from version 5.16.17" | ||
1951 | |||
1952 | CVE_STATUS[CVE-2022-48838] = "fixed-version: Fixed from version 5.17" | ||
1953 | |||
1954 | CVE_STATUS[CVE-2022-48839] = "fixed-version: Fixed from version 5.17" | ||
1955 | |||
1956 | CVE_STATUS[CVE-2022-48840] = "fixed-version: Fixed from version 5.16.17" | ||
1957 | |||
1958 | CVE_STATUS[CVE-2022-48841] = "fixed-version: Fixed from version 5.17" | ||
1959 | |||
1960 | CVE_STATUS[CVE-2022-48842] = "fixed-version: Fixed from version 5.16.16" | ||
1961 | |||
1962 | CVE_STATUS[CVE-2022-48843] = "fixed-version: Fixed from version 5.17" | ||
1963 | |||
1964 | CVE_STATUS[CVE-2022-48844] = "fixed-version: Fixed from version 5.17" | ||
1965 | |||
1966 | CVE_STATUS[CVE-2022-48845] = "fixed-version: Fixed from version 5.17" | ||
1967 | |||
1968 | CVE_STATUS[CVE-2022-48846] = "fixed-version: Fixed from version 5.17" | ||
1969 | |||
1970 | CVE_STATUS[CVE-2022-48847] = "fixed-version: Fixed from version 5.17" | ||
1971 | |||
1972 | CVE_STATUS[CVE-2022-48848] = "fixed-version: Fixed from version 5.17" | ||
1973 | |||
1974 | CVE_STATUS[CVE-2022-48849] = "fixed-version: Fixed from version 5.17" | ||
1975 | |||
1976 | CVE_STATUS[CVE-2022-48850] = "fixed-version: Fixed from version 5.17" | ||
1977 | |||
1978 | CVE_STATUS[CVE-2022-48851] = "fixed-version: Fixed from version 5.17" | ||
1979 | |||
1980 | CVE_STATUS[CVE-2022-48852] = "fixed-version: Fixed from version 5.17" | ||
1981 | |||
1982 | CVE_STATUS[CVE-2022-48853] = "fixed-version: Fixed from version 5.17" | ||
1983 | |||
1984 | CVE_STATUS[CVE-2022-48854] = "fixed-version: Fixed from version 5.17" | ||
1985 | |||
1986 | CVE_STATUS[CVE-2022-48855] = "fixed-version: Fixed from version 5.17" | ||
1987 | |||
1988 | CVE_STATUS[CVE-2022-48856] = "fixed-version: Fixed from version 5.17" | ||
1989 | |||
1990 | CVE_STATUS[CVE-2022-48857] = "fixed-version: Fixed from version 5.17" | ||
1991 | |||
1992 | CVE_STATUS[CVE-2022-48858] = "fixed-version: Fixed from version 5.17" | ||
1993 | |||
1994 | CVE_STATUS[CVE-2022-48859] = "fixed-version: Fixed from version 5.17" | ||
1995 | |||
1996 | CVE_STATUS[CVE-2022-48860] = "fixed-version: Fixed from version 5.17" | ||
1997 | |||
1998 | CVE_STATUS[CVE-2022-48861] = "fixed-version: Fixed from version 5.17" | ||
1999 | |||
2000 | CVE_STATUS[CVE-2022-48862] = "fixed-version: Fixed from version 5.17" | ||
2001 | |||
2002 | CVE_STATUS[CVE-2022-48863] = "fixed-version: Fixed from version 5.17" | ||
2003 | |||
2004 | CVE_STATUS[CVE-2022-48864] = "fixed-version: Fixed from version 5.17" | ||
2005 | |||
2006 | CVE_STATUS[CVE-2022-48865] = "fixed-version: Fixed from version 5.17" | ||
2007 | |||
2008 | CVE_STATUS[CVE-2022-48866] = "fixed-version: Fixed from version 5.17" | ||
2009 | |||
2010 | CVE_STATUS[CVE-2022-48867] = "fixed-version: Fixed from version 6.2" | ||
2011 | |||
2012 | CVE_STATUS[CVE-2022-48868] = "fixed-version: Fixed from version 6.2" | ||
2013 | |||
2014 | CVE_STATUS[CVE-2022-48869] = "fixed-version: Fixed from version 6.2" | ||
2015 | |||
2016 | CVE_STATUS[CVE-2022-48870] = "fixed-version: Fixed from version 6.2" | ||
2017 | |||
2018 | CVE_STATUS[CVE-2022-48871] = "fixed-version: Fixed from version 6.2" | ||
2019 | |||
2020 | CVE_STATUS[CVE-2022-48872] = "fixed-version: Fixed from version 6.2" | ||
2021 | |||
2022 | CVE_STATUS[CVE-2022-48873] = "fixed-version: Fixed from version 6.2" | ||
2023 | |||
2024 | CVE_STATUS[CVE-2022-48874] = "fixed-version: Fixed from version 6.2" | ||
2025 | |||
2026 | CVE_STATUS[CVE-2022-48875] = "fixed-version: Fixed from version 6.2" | ||
2027 | |||
2028 | CVE_STATUS[CVE-2022-48876] = "fixed-version: Fixed from version 6.2" | ||
2029 | |||
2030 | CVE_STATUS[CVE-2022-48877] = "fixed-version: Fixed from version 6.2" | ||
2031 | |||
2032 | CVE_STATUS[CVE-2022-48878] = "fixed-version: Fixed from version 6.2" | ||
2033 | |||
2034 | CVE_STATUS[CVE-2022-48879] = "fixed-version: Fixed from version 6.2" | ||
2035 | |||
2036 | CVE_STATUS[CVE-2022-48880] = "fixed-version: Fixed from version 6.2" | ||
2037 | |||
2038 | CVE_STATUS[CVE-2022-48881] = "fixed-version: Fixed from version 6.2" | ||
2039 | |||
2040 | CVE_STATUS[CVE-2022-48882] = "fixed-version: Fixed from version 6.2" | ||
2041 | |||
2042 | CVE_STATUS[CVE-2022-48883] = "fixed-version: Fixed from version 6.2" | ||
2043 | |||
2044 | CVE_STATUS[CVE-2022-48884] = "fixed-version: Fixed from version 6.2" | ||
2045 | |||
2046 | CVE_STATUS[CVE-2022-48885] = "fixed-version: Fixed from version 6.2" | ||
2047 | |||
2048 | CVE_STATUS[CVE-2022-48886] = "fixed-version: Fixed from version 6.2" | ||
2049 | |||
2050 | CVE_STATUS[CVE-2022-48887] = "fixed-version: Fixed from version 6.2" | ||
2051 | |||
2052 | CVE_STATUS[CVE-2022-48888] = "fixed-version: Fixed from version 6.2" | ||
2053 | |||
2054 | CVE_STATUS[CVE-2022-48889] = "fixed-version: Fixed from version 6.2" | ||
2055 | |||
2056 | CVE_STATUS[CVE-2022-48890] = "fixed-version: Fixed from version 6.2" | ||
2057 | |||
2058 | CVE_STATUS[CVE-2022-48891] = "fixed-version: Fixed from version 6.2" | ||
2059 | |||
2060 | CVE_STATUS[CVE-2022-48892] = "fixed-version: Fixed from version 6.2" | ||
2061 | |||
2062 | CVE_STATUS[CVE-2022-48893] = "fixed-version: Fixed from version 6.2" | ||
2063 | |||
2064 | CVE_STATUS[CVE-2022-48894] = "fixed-version: Fixed from version 6.2" | ||
2065 | |||
2066 | CVE_STATUS[CVE-2022-48895] = "fixed-version: Fixed from version 6.2" | ||
2067 | |||
2068 | CVE_STATUS[CVE-2022-48896] = "fixed-version: Fixed from version 6.2" | ||
2069 | |||
2070 | CVE_STATUS[CVE-2022-48897] = "fixed-version: Fixed from version 6.2" | ||
2071 | |||
2072 | CVE_STATUS[CVE-2022-48898] = "fixed-version: Fixed from version 6.2" | ||
2073 | |||
2074 | CVE_STATUS[CVE-2022-48899] = "fixed-version: Fixed from version 6.2" | ||
2075 | |||
2076 | CVE_STATUS[CVE-2022-48901] = "fixed-version: Fixed from version 5.17" | ||
2077 | |||
2078 | CVE_STATUS[CVE-2022-48902] = "fixed-version: Fixed from version 5.17" | ||
2079 | |||
2080 | CVE_STATUS[CVE-2022-48903] = "fixed-version: Fixed from version 5.17" | ||
2081 | |||
2082 | CVE_STATUS[CVE-2022-48904] = "fixed-version: Fixed from version 5.17" | ||
2083 | |||
2084 | CVE_STATUS[CVE-2022-48905] = "fixed-version: Fixed from version 5.17" | ||
2085 | |||
2086 | CVE_STATUS[CVE-2022-48906] = "fixed-version: Fixed from version 5.17" | ||
2087 | |||
2088 | CVE_STATUS[CVE-2022-48907] = "fixed-version: Fixed from version 5.17" | ||
2089 | |||
2090 | CVE_STATUS[CVE-2022-48908] = "fixed-version: Fixed from version 5.17" | ||
2091 | |||
2092 | CVE_STATUS[CVE-2022-48909] = "fixed-version: Fixed from version 5.17" | ||
2093 | |||
2094 | CVE_STATUS[CVE-2022-48910] = "fixed-version: Fixed from version 5.17" | ||
2095 | |||
2096 | CVE_STATUS[CVE-2022-48911] = "fixed-version: Fixed from version 5.17" | ||
2097 | |||
2098 | CVE_STATUS[CVE-2022-48912] = "fixed-version: Fixed from version 5.17" | ||
2099 | |||
2100 | CVE_STATUS[CVE-2022-48913] = "fixed-version: Fixed from version 5.17" | ||
2101 | |||
2102 | CVE_STATUS[CVE-2022-48914] = "fixed-version: Fixed from version 5.16.13" | ||
2103 | |||
2104 | CVE_STATUS[CVE-2022-48915] = "fixed-version: Fixed from version 5.17" | ||
2105 | |||
2106 | CVE_STATUS[CVE-2022-48916] = "fixed-version: Fixed from version 5.17" | ||
2107 | |||
2108 | CVE_STATUS[CVE-2022-48918] = "fixed-version: Fixed from version 5.17" | ||
2109 | |||
2110 | CVE_STATUS[CVE-2022-48919] = "fixed-version: Fixed from version 5.17" | ||
2111 | |||
2112 | CVE_STATUS[CVE-2022-48920] = "fixed-version: Fixed from version 5.17" | ||
2113 | |||
2114 | CVE_STATUS[CVE-2022-48921] = "fixed-version: Fixed from version 5.17" | ||
2115 | |||
2116 | CVE_STATUS[CVE-2022-48922] = "fixed-version: Fixed from version 5.17" | ||
2117 | |||
2118 | CVE_STATUS[CVE-2022-48923] = "fixed-version: Fixed from version 5.17" | ||
2119 | |||
2120 | CVE_STATUS[CVE-2022-48924] = "fixed-version: Fixed from version 5.17" | ||
2121 | |||
2122 | CVE_STATUS[CVE-2022-48925] = "fixed-version: Fixed from version 5.17" | ||
2123 | |||
2124 | CVE_STATUS[CVE-2022-48926] = "fixed-version: Fixed from version 5.17" | ||
2125 | |||
2126 | CVE_STATUS[CVE-2022-48927] = "fixed-version: Fixed from version 5.17" | ||
2127 | |||
2128 | CVE_STATUS[CVE-2022-48928] = "fixed-version: Fixed from version 5.17" | ||
2129 | |||
2130 | CVE_STATUS[CVE-2022-48929] = "fixed-version: Fixed from version 5.16.12" | ||
2131 | |||
2132 | CVE_STATUS[CVE-2022-48930] = "fixed-version: Fixed from version 5.17" | ||
2133 | |||
2134 | CVE_STATUS[CVE-2022-48931] = "fixed-version: Fixed from version 5.17" | ||
2135 | |||
2136 | CVE_STATUS[CVE-2022-48932] = "fixed-version: Fixed from version 5.17" | ||
2137 | |||
2138 | CVE_STATUS[CVE-2022-48933] = "fixed-version: Fixed from version 5.17" | ||
2139 | |||
2140 | CVE_STATUS[CVE-2022-48934] = "fixed-version: Fixed from version 5.17" | ||
2141 | |||
2142 | CVE_STATUS[CVE-2022-48935] = "fixed-version: Fixed from version 5.17" | ||
2143 | |||
2144 | CVE_STATUS[CVE-2022-48937] = "fixed-version: Fixed from version 5.17" | ||
2145 | |||
2146 | CVE_STATUS[CVE-2022-48938] = "fixed-version: Fixed from version 5.17" | ||
2147 | |||
2148 | CVE_STATUS[CVE-2022-48939] = "fixed-version: Fixed from version 5.17" | ||
2149 | |||
2150 | CVE_STATUS[CVE-2022-48940] = "fixed-version: Fixed from version 5.17" | ||
2151 | |||
2152 | CVE_STATUS[CVE-2022-48941] = "fixed-version: Fixed from version 5.17" | ||
2153 | |||
2154 | CVE_STATUS[CVE-2022-48942] = "fixed-version: Fixed from version 5.17" | ||
2155 | |||
2156 | CVE_STATUS[CVE-2022-48943] = "fixed-version: Fixed from version 5.17" | ||
2157 | |||
2158 | CVE_STATUS[CVE-2022-48944] = "fixed-version: Fixed from version 5.17" | ||
2159 | |||
2160 | CVE_STATUS[CVE-2022-48945] = "fixed-version: Fixed from version 6.2" | ||
2161 | |||
2162 | CVE_STATUS[CVE-2022-48946] = "fixed-version: Fixed from version 6.2" | ||
2163 | |||
2164 | CVE_STATUS[CVE-2022-48947] = "fixed-version: Fixed from version 6.1" | ||
2165 | |||
2166 | CVE_STATUS[CVE-2022-48948] = "fixed-version: Fixed from version 6.2" | ||
2167 | |||
2168 | CVE_STATUS[CVE-2022-48949] = "fixed-version: Fixed from version 6.2" | ||
2169 | |||
2170 | CVE_STATUS[CVE-2022-48950] = "fixed-version: Fixed from version 6.1" | ||
2171 | |||
2172 | CVE_STATUS[CVE-2022-48951] = "fixed-version: Fixed from version 6.1" | ||
2173 | |||
2174 | CVE_STATUS[CVE-2022-48952] = "fixed-version: Fixed from version 6.2" | ||
2175 | |||
2176 | CVE_STATUS[CVE-2022-48953] = "fixed-version: Fixed from version 6.1" | ||
2177 | |||
2178 | CVE_STATUS[CVE-2022-48954] = "fixed-version: Fixed from version 6.1" | ||
2179 | |||
2180 | CVE_STATUS[CVE-2022-48955] = "fixed-version: Fixed from version 6.1" | ||
2181 | |||
2182 | CVE_STATUS[CVE-2022-48956] = "fixed-version: Fixed from version 6.1" | ||
2183 | |||
2184 | CVE_STATUS[CVE-2022-48957] = "fixed-version: Fixed from version 6.1" | ||
2185 | |||
2186 | CVE_STATUS[CVE-2022-48958] = "fixed-version: Fixed from version 6.1" | ||
2187 | |||
2188 | CVE_STATUS[CVE-2022-48959] = "fixed-version: Fixed from version 6.1" | ||
2189 | |||
2190 | CVE_STATUS[CVE-2022-48960] = "fixed-version: Fixed from version 6.1" | ||
2191 | |||
2192 | CVE_STATUS[CVE-2022-48961] = "fixed-version: Fixed from version 6.1" | ||
2193 | |||
2194 | CVE_STATUS[CVE-2022-48962] = "fixed-version: Fixed from version 6.1" | ||
2195 | |||
2196 | CVE_STATUS[CVE-2022-48963] = "fixed-version: Fixed from version 6.1" | ||
2197 | |||
2198 | CVE_STATUS[CVE-2022-48964] = "fixed-version: Fixed from version 6.1" | ||
2199 | |||
2200 | CVE_STATUS[CVE-2022-48965] = "fixed-version: Fixed from version 6.1" | ||
2201 | |||
2202 | CVE_STATUS[CVE-2022-48966] = "fixed-version: Fixed from version 6.1" | ||
2203 | |||
2204 | CVE_STATUS[CVE-2022-48967] = "fixed-version: Fixed from version 6.1" | ||
2205 | |||
2206 | CVE_STATUS[CVE-2022-48968] = "fixed-version: Fixed from version 6.1" | ||
2207 | |||
2208 | CVE_STATUS[CVE-2022-48969] = "fixed-version: Fixed from version 6.1" | ||
2209 | |||
2210 | CVE_STATUS[CVE-2022-48970] = "fixed-version: Fixed from version 6.1" | ||
2211 | |||
2212 | CVE_STATUS[CVE-2022-48971] = "fixed-version: Fixed from version 6.1" | ||
2213 | |||
2214 | CVE_STATUS[CVE-2022-48972] = "fixed-version: Fixed from version 6.1" | ||
2215 | |||
2216 | CVE_STATUS[CVE-2022-48973] = "fixed-version: Fixed from version 6.1" | ||
2217 | |||
2218 | CVE_STATUS[CVE-2022-48974] = "fixed-version: Fixed from version 6.1" | ||
2219 | |||
2220 | CVE_STATUS[CVE-2022-48975] = "fixed-version: Fixed from version 6.1" | ||
2221 | |||
2222 | CVE_STATUS[CVE-2022-48976] = "fixed-version: Fixed from version 6.1" | ||
2223 | |||
2224 | CVE_STATUS[CVE-2022-48977] = "fixed-version: Fixed from version 6.1" | ||
2225 | |||
2226 | CVE_STATUS[CVE-2022-48978] = "fixed-version: Fixed from version 6.1" | ||
2227 | |||
2228 | CVE_STATUS[CVE-2022-48979] = "fixed-version: Fixed from version 6.1" | ||
2229 | |||
2230 | CVE_STATUS[CVE-2022-48980] = "fixed-version: Fixed from version 6.1" | ||
2231 | |||
2232 | CVE_STATUS[CVE-2022-48981] = "fixed-version: Fixed from version 6.1" | ||
2233 | |||
2234 | CVE_STATUS[CVE-2022-48982] = "fixed-version: Fixed from version 6.1" | ||
2235 | |||
2236 | CVE_STATUS[CVE-2022-48983] = "fixed-version: Fixed from version 6.1" | ||
2237 | |||
2238 | CVE_STATUS[CVE-2022-48984] = "fixed-version: Fixed from version 6.1" | ||
2239 | |||
2240 | CVE_STATUS[CVE-2022-48985] = "fixed-version: Fixed from version 6.1" | ||
2241 | |||
2242 | CVE_STATUS[CVE-2022-48986] = "fixed-version: Fixed from version 6.1" | ||
2243 | |||
2244 | CVE_STATUS[CVE-2022-48987] = "fixed-version: Fixed from version 6.0.13" | ||
2245 | |||
2246 | CVE_STATUS[CVE-2022-48988] = "fixed-version: Fixed from version 6.1" | ||
2247 | |||
2248 | CVE_STATUS[CVE-2022-48989] = "fixed-version: Fixed from version 6.1" | ||
2249 | |||
2250 | CVE_STATUS[CVE-2022-48990] = "fixed-version: Fixed from version 6.1" | ||
2251 | |||
2252 | CVE_STATUS[CVE-2022-48991] = "fixed-version: Fixed from version 6.1" | ||
2253 | |||
2254 | CVE_STATUS[CVE-2022-48992] = "fixed-version: Fixed from version 6.1" | ||
2255 | |||
2256 | CVE_STATUS[CVE-2022-48994] = "fixed-version: Fixed from version 6.1" | ||
2257 | |||
2258 | CVE_STATUS[CVE-2022-48995] = "fixed-version: Fixed from version 6.1" | ||
2259 | |||
2260 | CVE_STATUS[CVE-2022-48996] = "fixed-version: Fixed from version 6.1" | ||
2261 | |||
2262 | CVE_STATUS[CVE-2022-48997] = "fixed-version: Fixed from version 6.1" | ||
2263 | |||
2264 | CVE_STATUS[CVE-2022-48998] = "fixed-version: Fixed from version 6.1" | ||
2265 | |||
2266 | CVE_STATUS[CVE-2022-48999] = "fixed-version: Fixed from version 6.1" | ||
2267 | |||
2268 | CVE_STATUS[CVE-2022-49000] = "fixed-version: Fixed from version 6.1" | ||
2269 | |||
2270 | CVE_STATUS[CVE-2022-49001] = "fixed-version: Fixed from version 6.1" | ||
2271 | |||
2272 | CVE_STATUS[CVE-2022-49002] = "fixed-version: Fixed from version 6.1" | ||
2273 | |||
2274 | CVE_STATUS[CVE-2022-49003] = "fixed-version: Fixed from version 6.1" | ||
2275 | |||
2276 | CVE_STATUS[CVE-2022-49004] = "fixed-version: Fixed from version 6.1" | ||
2277 | |||
2278 | CVE_STATUS[CVE-2022-49005] = "fixed-version: Fixed from version 6.1" | ||
2279 | |||
2280 | CVE_STATUS[CVE-2022-49006] = "fixed-version: Fixed from version 6.1" | ||
2281 | |||
2282 | CVE_STATUS[CVE-2022-49007] = "fixed-version: Fixed from version 6.1" | ||
2283 | |||
2284 | CVE_STATUS[CVE-2022-49008] = "fixed-version: Fixed from version 6.1" | ||
2285 | |||
2286 | CVE_STATUS[CVE-2022-49009] = "fixed-version: Fixed from version 6.1" | ||
2287 | |||
2288 | CVE_STATUS[CVE-2022-49010] = "fixed-version: Fixed from version 6.1" | ||
2289 | |||
2290 | CVE_STATUS[CVE-2022-49011] = "fixed-version: Fixed from version 6.1" | ||
2291 | |||
2292 | CVE_STATUS[CVE-2022-49012] = "fixed-version: Fixed from version 6.1" | ||
2293 | |||
2294 | CVE_STATUS[CVE-2022-49013] = "fixed-version: Fixed from version 6.1" | ||
2295 | |||
2296 | CVE_STATUS[CVE-2022-49014] = "fixed-version: Fixed from version 6.1" | ||
2297 | |||
2298 | CVE_STATUS[CVE-2022-49015] = "fixed-version: Fixed from version 6.1" | ||
2299 | |||
2300 | CVE_STATUS[CVE-2022-49016] = "fixed-version: Fixed from version 6.1" | ||
2301 | |||
2302 | CVE_STATUS[CVE-2022-49017] = "fixed-version: Fixed from version 6.1" | ||
2303 | |||
2304 | CVE_STATUS[CVE-2022-49018] = "fixed-version: Fixed from version 6.1" | ||
2305 | |||
2306 | CVE_STATUS[CVE-2022-49019] = "fixed-version: Fixed from version 6.1" | ||
2307 | |||
2308 | CVE_STATUS[CVE-2022-49020] = "fixed-version: Fixed from version 6.1" | ||
2309 | |||
2310 | CVE_STATUS[CVE-2022-49021] = "fixed-version: Fixed from version 6.1" | ||
2311 | |||
2312 | CVE_STATUS[CVE-2022-49022] = "fixed-version: Fixed from version 6.1" | ||
2313 | |||
2314 | CVE_STATUS[CVE-2022-49023] = "fixed-version: Fixed from version 6.1" | ||
2315 | |||
2316 | CVE_STATUS[CVE-2022-49024] = "fixed-version: Fixed from version 6.1" | ||
2317 | |||
2318 | CVE_STATUS[CVE-2022-49025] = "fixed-version: Fixed from version 6.1" | ||
2319 | |||
2320 | CVE_STATUS[CVE-2022-49026] = "fixed-version: Fixed from version 6.1" | ||
2321 | |||
2322 | CVE_STATUS[CVE-2022-49027] = "fixed-version: Fixed from version 6.1" | ||
2323 | |||
2324 | CVE_STATUS[CVE-2022-49028] = "fixed-version: Fixed from version 6.1" | ||
2325 | |||
2326 | CVE_STATUS[CVE-2022-49029] = "fixed-version: Fixed from version 6.1" | ||
2327 | |||
2328 | CVE_STATUS[CVE-2022-49030] = "fixed-version: Fixed from version 6.1" | ||
2329 | |||
2330 | CVE_STATUS[CVE-2022-49031] = "fixed-version: Fixed from version 6.1" | ||
2331 | |||
2332 | CVE_STATUS[CVE-2022-49032] = "fixed-version: Fixed from version 6.1" | ||
2333 | |||
2334 | CVE_STATUS[CVE-2022-49033] = "fixed-version: Fixed from version 6.1" | ||
2335 | |||
2336 | CVE_STATUS[CVE-2022-49034] = "cpe-stable-backport: Backported in 6.12.2" | ||
2337 | |||
2338 | CVE_STATUS[CVE-2022-49035] = "fixed-version: Fixed from version 6.1" | ||
2339 | |||
2340 | CVE_STATUS[CVE-2022-49044] = "fixed-version: Fixed from version 5.18" | ||
2341 | |||
2342 | CVE_STATUS[CVE-2022-49046] = "fixed-version: Fixed from version 5.18" | ||
2343 | |||
2344 | CVE_STATUS[CVE-2022-49047] = "fixed-version: Fixed from version 5.18" | ||
2345 | |||
2346 | CVE_STATUS[CVE-2022-49048] = "fixed-version: Fixed from version 5.18" | ||
2347 | |||
2348 | CVE_STATUS[CVE-2022-49049] = "fixed-version: Fixed from version 5.18" | ||
2349 | |||
2350 | CVE_STATUS[CVE-2022-49050] = "fixed-version: Fixed from version 5.18" | ||
2351 | |||
2352 | CVE_STATUS[CVE-2022-49051] = "fixed-version: Fixed from version 5.18" | ||
2353 | |||
2354 | CVE_STATUS[CVE-2022-49052] = "fixed-version: Fixed from version 5.18" | ||
2355 | |||
2356 | CVE_STATUS[CVE-2022-49053] = "fixed-version: Fixed from version 5.18" | ||
2357 | |||
2358 | CVE_STATUS[CVE-2022-49054] = "fixed-version: Fixed from version 5.18" | ||
2359 | |||
2360 | CVE_STATUS[CVE-2022-49055] = "fixed-version: Fixed from version 5.18" | ||
2361 | |||
2362 | CVE_STATUS[CVE-2022-49057] = "fixed-version: Fixed from version 5.18" | ||
2363 | |||
2364 | CVE_STATUS[CVE-2022-49058] = "fixed-version: Fixed from version 5.18" | ||
2365 | |||
2366 | CVE_STATUS[CVE-2022-49059] = "fixed-version: Fixed from version 5.18" | ||
2367 | |||
2368 | CVE_STATUS[CVE-2022-49060] = "fixed-version: Fixed from version 5.18" | ||
2369 | |||
2370 | CVE_STATUS[CVE-2022-49061] = "fixed-version: Fixed from version 5.18" | ||
2371 | |||
2372 | CVE_STATUS[CVE-2022-49062] = "fixed-version: Fixed from version 5.18" | ||
2373 | |||
2374 | CVE_STATUS[CVE-2022-49063] = "fixed-version: Fixed from version 5.18" | ||
2375 | |||
2376 | CVE_STATUS[CVE-2022-49064] = "fixed-version: Fixed from version 5.18" | ||
2377 | |||
2378 | CVE_STATUS[CVE-2022-49065] = "fixed-version: Fixed from version 5.18" | ||
2379 | |||
2380 | CVE_STATUS[CVE-2022-49066] = "fixed-version: Fixed from version 5.18" | ||
2381 | |||
2382 | CVE_STATUS[CVE-2022-49067] = "fixed-version: Fixed from version 5.18" | ||
2383 | |||
2384 | CVE_STATUS[CVE-2022-49068] = "fixed-version: Fixed from version 5.18" | ||
2385 | |||
2386 | CVE_STATUS[CVE-2022-49069] = "fixed-version: Fixed from version 5.18" | ||
2387 | |||
2388 | CVE_STATUS[CVE-2022-49070] = "fixed-version: Fixed from version 5.17.3" | ||
2389 | |||
2390 | CVE_STATUS[CVE-2022-49071] = "fixed-version: Fixed from version 5.18" | ||
2391 | |||
2392 | CVE_STATUS[CVE-2022-49072] = "fixed-version: Fixed from version 5.18" | ||
2393 | |||
2394 | CVE_STATUS[CVE-2022-49073] = "fixed-version: Fixed from version 5.18" | ||
2395 | |||
2396 | CVE_STATUS[CVE-2022-49074] = "fixed-version: Fixed from version 5.18" | ||
2397 | |||
2398 | CVE_STATUS[CVE-2022-49075] = "fixed-version: Fixed from version 5.18" | ||
2399 | |||
2400 | CVE_STATUS[CVE-2022-49076] = "fixed-version: Fixed from version 5.18" | ||
2401 | |||
2402 | CVE_STATUS[CVE-2022-49077] = "fixed-version: Fixed from version 5.18" | ||
2403 | |||
2404 | CVE_STATUS[CVE-2022-49078] = "fixed-version: Fixed from version 5.18" | ||
2405 | |||
2406 | CVE_STATUS[CVE-2022-49079] = "fixed-version: Fixed from version 5.18" | ||
2407 | |||
2408 | CVE_STATUS[CVE-2022-49080] = "fixed-version: Fixed from version 5.18" | ||
2409 | |||
2410 | CVE_STATUS[CVE-2022-49081] = "fixed-version: Fixed from version 5.18" | ||
2411 | |||
2412 | CVE_STATUS[CVE-2022-49082] = "fixed-version: Fixed from version 5.18" | ||
2413 | |||
2414 | CVE_STATUS[CVE-2022-49083] = "fixed-version: Fixed from version 5.18" | ||
2415 | |||
2416 | CVE_STATUS[CVE-2022-49084] = "fixed-version: Fixed from version 5.18" | ||
2417 | |||
2418 | CVE_STATUS[CVE-2022-49085] = "fixed-version: Fixed from version 5.18" | ||
2419 | |||
2420 | CVE_STATUS[CVE-2022-49086] = "fixed-version: Fixed from version 5.18" | ||
2421 | |||
2422 | CVE_STATUS[CVE-2022-49087] = "fixed-version: Fixed from version 5.18" | ||
2423 | |||
2424 | CVE_STATUS[CVE-2022-49088] = "fixed-version: Fixed from version 5.18" | ||
2425 | |||
2426 | CVE_STATUS[CVE-2022-49089] = "fixed-version: Fixed from version 5.18" | ||
2427 | |||
2428 | CVE_STATUS[CVE-2022-49090] = "fixed-version: Fixed from version 5.18" | ||
2429 | |||
2430 | CVE_STATUS[CVE-2022-49091] = "fixed-version: Fixed from version 5.18" | ||
2431 | |||
2432 | CVE_STATUS[CVE-2022-49092] = "fixed-version: Fixed from version 5.18" | ||
2433 | |||
2434 | CVE_STATUS[CVE-2022-49093] = "fixed-version: Fixed from version 5.18" | ||
2435 | |||
2436 | CVE_STATUS[CVE-2022-49094] = "fixed-version: Fixed from version 5.18" | ||
2437 | |||
2438 | CVE_STATUS[CVE-2022-49095] = "fixed-version: Fixed from version 5.18" | ||
2439 | |||
2440 | CVE_STATUS[CVE-2022-49096] = "fixed-version: Fixed from version 5.18" | ||
2441 | |||
2442 | CVE_STATUS[CVE-2022-49097] = "fixed-version: Fixed from version 5.18" | ||
2443 | |||
2444 | CVE_STATUS[CVE-2022-49098] = "fixed-version: Fixed from version 5.18" | ||
2445 | |||
2446 | CVE_STATUS[CVE-2022-49099] = "fixed-version: Fixed from version 5.18" | ||
2447 | |||
2448 | CVE_STATUS[CVE-2022-49100] = "fixed-version: Fixed from version 5.18" | ||
2449 | |||
2450 | CVE_STATUS[CVE-2022-49102] = "fixed-version: Fixed from version 5.18" | ||
2451 | |||
2452 | CVE_STATUS[CVE-2022-49103] = "fixed-version: Fixed from version 5.18" | ||
2453 | |||
2454 | CVE_STATUS[CVE-2022-49104] = "fixed-version: Fixed from version 5.18" | ||
2455 | |||
2456 | CVE_STATUS[CVE-2022-49105] = "fixed-version: Fixed from version 5.18" | ||
2457 | |||
2458 | CVE_STATUS[CVE-2022-49106] = "fixed-version: Fixed from version 5.18" | ||
2459 | |||
2460 | CVE_STATUS[CVE-2022-49107] = "fixed-version: Fixed from version 5.18" | ||
2461 | |||
2462 | CVE_STATUS[CVE-2022-49108] = "fixed-version: Fixed from version 5.18" | ||
2463 | |||
2464 | CVE_STATUS[CVE-2022-49109] = "fixed-version: Fixed from version 5.18" | ||
2465 | |||
2466 | CVE_STATUS[CVE-2022-49110] = "fixed-version: Fixed from version 5.18" | ||
2467 | |||
2468 | CVE_STATUS[CVE-2022-49111] = "fixed-version: Fixed from version 5.18" | ||
2469 | |||
2470 | CVE_STATUS[CVE-2022-49112] = "fixed-version: Fixed from version 5.18" | ||
2471 | |||
2472 | CVE_STATUS[CVE-2022-49113] = "fixed-version: Fixed from version 5.18" | ||
2473 | |||
2474 | CVE_STATUS[CVE-2022-49114] = "fixed-version: Fixed from version 5.18" | ||
2475 | |||
2476 | CVE_STATUS[CVE-2022-49115] = "fixed-version: Fixed from version 5.18" | ||
2477 | |||
2478 | CVE_STATUS[CVE-2022-49116] = "fixed-version: Fixed from version 5.18" | ||
2479 | |||
2480 | CVE_STATUS[CVE-2022-49117] = "fixed-version: Fixed from version 5.18" | ||
2481 | |||
2482 | CVE_STATUS[CVE-2022-49118] = "fixed-version: Fixed from version 5.18" | ||
2483 | |||
2484 | CVE_STATUS[CVE-2022-49119] = "fixed-version: Fixed from version 5.18" | ||
2485 | |||
2486 | CVE_STATUS[CVE-2022-49120] = "fixed-version: Fixed from version 5.18" | ||
2487 | |||
2488 | CVE_STATUS[CVE-2022-49121] = "fixed-version: Fixed from version 5.18" | ||
2489 | |||
2490 | CVE_STATUS[CVE-2022-49122] = "fixed-version: Fixed from version 5.18" | ||
2491 | |||
2492 | CVE_STATUS[CVE-2022-49123] = "fixed-version: Fixed from version 5.18" | ||
2493 | |||
2494 | CVE_STATUS[CVE-2022-49124] = "fixed-version: Fixed from version 5.18" | ||
2495 | |||
2496 | CVE_STATUS[CVE-2022-49125] = "fixed-version: Fixed from version 5.18" | ||
2497 | |||
2498 | CVE_STATUS[CVE-2022-49126] = "fixed-version: Fixed from version 5.18" | ||
2499 | |||
2500 | CVE_STATUS[CVE-2022-49127] = "fixed-version: Fixed from version 5.18" | ||
2501 | |||
2502 | CVE_STATUS[CVE-2022-49128] = "fixed-version: Fixed from version 5.18" | ||
2503 | |||
2504 | CVE_STATUS[CVE-2022-49129] = "fixed-version: Fixed from version 5.18" | ||
2505 | |||
2506 | CVE_STATUS[CVE-2022-49130] = "fixed-version: Fixed from version 5.18" | ||
2507 | |||
2508 | CVE_STATUS[CVE-2022-49131] = "fixed-version: Fixed from version 5.18" | ||
2509 | |||
2510 | CVE_STATUS[CVE-2022-49132] = "fixed-version: Fixed from version 5.18" | ||
2511 | |||
2512 | CVE_STATUS[CVE-2022-49133] = "fixed-version: Fixed from version 5.18" | ||
2513 | |||
2514 | CVE_STATUS[CVE-2022-49134] = "fixed-version: Fixed from version 5.18" | ||
2515 | |||
2516 | CVE_STATUS[CVE-2022-49135] = "fixed-version: Fixed from version 5.18" | ||
2517 | |||
2518 | CVE_STATUS[CVE-2022-49136] = "fixed-version: Fixed from version 5.18" | ||
2519 | |||
2520 | CVE_STATUS[CVE-2022-49137] = "fixed-version: Fixed from version 5.18" | ||
2521 | |||
2522 | CVE_STATUS[CVE-2022-49138] = "fixed-version: Fixed from version 5.18" | ||
2523 | |||
2524 | CVE_STATUS[CVE-2022-49139] = "fixed-version: Fixed from version 5.18" | ||
2525 | |||
2526 | CVE_STATUS[CVE-2022-49141] = "fixed-version: Fixed from version 5.18" | ||
2527 | |||
2528 | CVE_STATUS[CVE-2022-49142] = "fixed-version: Fixed from version 5.18" | ||
2529 | |||
2530 | CVE_STATUS[CVE-2022-49144] = "fixed-version: Fixed from version 5.18" | ||
2531 | |||
2532 | CVE_STATUS[CVE-2022-49145] = "fixed-version: Fixed from version 5.18" | ||
2533 | |||
2534 | CVE_STATUS[CVE-2022-49146] = "fixed-version: Fixed from version 5.18" | ||
2535 | |||
2536 | CVE_STATUS[CVE-2022-49147] = "fixed-version: Fixed from version 5.18" | ||
2537 | |||
2538 | CVE_STATUS[CVE-2022-49148] = "fixed-version: Fixed from version 5.18" | ||
2539 | |||
2540 | CVE_STATUS[CVE-2022-49149] = "fixed-version: Fixed from version 5.18" | ||
2541 | |||
2542 | CVE_STATUS[CVE-2022-49150] = "fixed-version: Fixed from version 5.18" | ||
2543 | |||
2544 | CVE_STATUS[CVE-2022-49151] = "fixed-version: Fixed from version 5.18" | ||
2545 | |||
2546 | CVE_STATUS[CVE-2022-49152] = "fixed-version: Fixed from version 5.18" | ||
2547 | |||
2548 | CVE_STATUS[CVE-2022-49153] = "fixed-version: Fixed from version 5.18" | ||
2549 | |||
2550 | CVE_STATUS[CVE-2022-49154] = "fixed-version: Fixed from version 5.18" | ||
2551 | |||
2552 | CVE_STATUS[CVE-2022-49155] = "fixed-version: Fixed from version 5.18" | ||
2553 | |||
2554 | CVE_STATUS[CVE-2022-49156] = "fixed-version: Fixed from version 5.18" | ||
2555 | |||
2556 | CVE_STATUS[CVE-2022-49157] = "fixed-version: Fixed from version 5.18" | ||
2557 | |||
2558 | CVE_STATUS[CVE-2022-49158] = "fixed-version: Fixed from version 5.18" | ||
2559 | |||
2560 | CVE_STATUS[CVE-2022-49159] = "fixed-version: Fixed from version 5.18" | ||
2561 | |||
2562 | CVE_STATUS[CVE-2022-49160] = "fixed-version: Fixed from version 5.18" | ||
2563 | |||
2564 | CVE_STATUS[CVE-2022-49161] = "fixed-version: Fixed from version 5.18" | ||
2565 | |||
2566 | CVE_STATUS[CVE-2022-49162] = "fixed-version: Fixed from version 5.18" | ||
2567 | |||
2568 | CVE_STATUS[CVE-2022-49163] = "fixed-version: Fixed from version 5.18" | ||
2569 | |||
2570 | CVE_STATUS[CVE-2022-49164] = "fixed-version: Fixed from version 5.18" | ||
2571 | |||
2572 | CVE_STATUS[CVE-2022-49165] = "fixed-version: Fixed from version 5.18" | ||
2573 | |||
2574 | CVE_STATUS[CVE-2022-49166] = "fixed-version: Fixed from version 5.18" | ||
2575 | |||
2576 | CVE_STATUS[CVE-2022-49167] = "fixed-version: Fixed from version 5.18" | ||
2577 | |||
2578 | CVE_STATUS[CVE-2022-49168] = "fixed-version: Fixed from version 5.18" | ||
2579 | |||
2580 | CVE_STATUS[CVE-2022-49169] = "fixed-version: Fixed from version 5.18" | ||
2581 | |||
2582 | CVE_STATUS[CVE-2022-49170] = "fixed-version: Fixed from version 5.18" | ||
2583 | |||
2584 | CVE_STATUS[CVE-2022-49171] = "fixed-version: Fixed from version 5.18" | ||
2585 | |||
2586 | CVE_STATUS[CVE-2022-49172] = "fixed-version: Fixed from version 5.18" | ||
2587 | |||
2588 | CVE_STATUS[CVE-2022-49173] = "fixed-version: Fixed from version 5.18" | ||
2589 | |||
2590 | CVE_STATUS[CVE-2022-49174] = "fixed-version: Fixed from version 5.18" | ||
2591 | |||
2592 | CVE_STATUS[CVE-2022-49175] = "fixed-version: Fixed from version 5.18" | ||
2593 | |||
2594 | CVE_STATUS[CVE-2022-49176] = "fixed-version: Fixed from version 5.18" | ||
2595 | |||
2596 | CVE_STATUS[CVE-2022-49177] = "fixed-version: Fixed from version 5.18" | ||
2597 | |||
2598 | CVE_STATUS[CVE-2022-49178] = "fixed-version: Fixed from version 5.18" | ||
2599 | |||
2600 | CVE_STATUS[CVE-2022-49179] = "fixed-version: Fixed from version 5.18" | ||
2601 | |||
2602 | CVE_STATUS[CVE-2022-49180] = "fixed-version: Fixed from version 5.18" | ||
2603 | |||
2604 | CVE_STATUS[CVE-2022-49182] = "fixed-version: Fixed from version 5.18" | ||
2605 | |||
2606 | CVE_STATUS[CVE-2022-49183] = "fixed-version: Fixed from version 5.18" | ||
2607 | |||
2608 | CVE_STATUS[CVE-2022-49184] = "fixed-version: Fixed from version 5.18" | ||
2609 | |||
2610 | CVE_STATUS[CVE-2022-49185] = "fixed-version: Fixed from version 5.18" | ||
2611 | |||
2612 | CVE_STATUS[CVE-2022-49186] = "fixed-version: Fixed from version 5.18" | ||
2613 | |||
2614 | CVE_STATUS[CVE-2022-49187] = "fixed-version: Fixed from version 5.18" | ||
2615 | |||
2616 | CVE_STATUS[CVE-2022-49188] = "fixed-version: Fixed from version 5.18" | ||
2617 | |||
2618 | CVE_STATUS[CVE-2022-49189] = "fixed-version: Fixed from version 5.18" | ||
2619 | |||
2620 | CVE_STATUS[CVE-2022-49190] = "fixed-version: Fixed from version 5.18" | ||
2621 | |||
2622 | CVE_STATUS[CVE-2022-49191] = "fixed-version: Fixed from version 5.18" | ||
2623 | |||
2624 | CVE_STATUS[CVE-2022-49192] = "fixed-version: Fixed from version 5.18" | ||
2625 | |||
2626 | CVE_STATUS[CVE-2022-49193] = "fixed-version: Fixed from version 5.18" | ||
2627 | |||
2628 | CVE_STATUS[CVE-2022-49194] = "fixed-version: Fixed from version 5.18" | ||
2629 | |||
2630 | CVE_STATUS[CVE-2022-49195] = "fixed-version: Fixed from version 5.18" | ||
2631 | |||
2632 | CVE_STATUS[CVE-2022-49196] = "fixed-version: Fixed from version 5.18" | ||
2633 | |||
2634 | CVE_STATUS[CVE-2022-49197] = "fixed-version: Fixed from version 5.18" | ||
2635 | |||
2636 | CVE_STATUS[CVE-2022-49198] = "fixed-version: Fixed from version 5.18" | ||
2637 | |||
2638 | CVE_STATUS[CVE-2022-49199] = "fixed-version: Fixed from version 5.18" | ||
2639 | |||
2640 | CVE_STATUS[CVE-2022-49200] = "fixed-version: Fixed from version 5.18" | ||
2641 | |||
2642 | CVE_STATUS[CVE-2022-49201] = "fixed-version: Fixed from version 5.18" | ||
2643 | |||
2644 | CVE_STATUS[CVE-2022-49202] = "fixed-version: Fixed from version 5.18" | ||
2645 | |||
2646 | CVE_STATUS[CVE-2022-49203] = "fixed-version: Fixed from version 5.18" | ||
2647 | |||
2648 | CVE_STATUS[CVE-2022-49204] = "fixed-version: Fixed from version 5.18" | ||
2649 | |||
2650 | CVE_STATUS[CVE-2022-49205] = "fixed-version: Fixed from version 5.18" | ||
2651 | |||
2652 | CVE_STATUS[CVE-2022-49206] = "fixed-version: Fixed from version 5.18" | ||
2653 | |||
2654 | CVE_STATUS[CVE-2022-49207] = "fixed-version: Fixed from version 5.18" | ||
2655 | |||
2656 | CVE_STATUS[CVE-2022-49208] = "fixed-version: Fixed from version 5.18" | ||
2657 | |||
2658 | CVE_STATUS[CVE-2022-49209] = "fixed-version: Fixed from version 5.18" | ||
2659 | |||
2660 | CVE_STATUS[CVE-2022-49210] = "fixed-version: Fixed from version 5.18" | ||
2661 | |||
2662 | CVE_STATUS[CVE-2022-49211] = "fixed-version: Fixed from version 5.18" | ||
2663 | |||
2664 | CVE_STATUS[CVE-2022-49212] = "fixed-version: Fixed from version 5.18" | ||
2665 | |||
2666 | CVE_STATUS[CVE-2022-49213] = "fixed-version: Fixed from version 5.18" | ||
2667 | |||
2668 | CVE_STATUS[CVE-2022-49214] = "fixed-version: Fixed from version 5.18" | ||
2669 | |||
2670 | CVE_STATUS[CVE-2022-49215] = "fixed-version: Fixed from version 5.18" | ||
2671 | |||
2672 | CVE_STATUS[CVE-2022-49216] = "fixed-version: Fixed from version 5.18" | ||
2673 | |||
2674 | CVE_STATUS[CVE-2022-49217] = "fixed-version: Fixed from version 5.18" | ||
2675 | |||
2676 | CVE_STATUS[CVE-2022-49218] = "fixed-version: Fixed from version 5.18" | ||
2677 | |||
2678 | CVE_STATUS[CVE-2022-49219] = "fixed-version: Fixed from version 5.18" | ||
2679 | |||
2680 | CVE_STATUS[CVE-2022-49220] = "fixed-version: Fixed from version 5.18" | ||
2681 | |||
2682 | CVE_STATUS[CVE-2022-49221] = "fixed-version: Fixed from version 5.18" | ||
2683 | |||
2684 | CVE_STATUS[CVE-2022-49222] = "fixed-version: Fixed from version 5.18" | ||
2685 | |||
2686 | CVE_STATUS[CVE-2022-49223] = "fixed-version: Fixed from version 5.18" | ||
2687 | |||
2688 | CVE_STATUS[CVE-2022-49224] = "fixed-version: Fixed from version 5.18" | ||
2689 | |||
2690 | CVE_STATUS[CVE-2022-49225] = "fixed-version: Fixed from version 5.18" | ||
2691 | |||
2692 | CVE_STATUS[CVE-2022-49226] = "fixed-version: Fixed from version 5.18" | ||
2693 | |||
2694 | CVE_STATUS[CVE-2022-49227] = "fixed-version: Fixed from version 5.18" | ||
2695 | |||
2696 | CVE_STATUS[CVE-2022-49228] = "fixed-version: Fixed from version 5.18" | ||
2697 | |||
2698 | CVE_STATUS[CVE-2022-49229] = "fixed-version: Fixed from version 5.18" | ||
2699 | |||
2700 | CVE_STATUS[CVE-2022-49230] = "fixed-version: Fixed from version 5.18" | ||
2701 | |||
2702 | CVE_STATUS[CVE-2022-49231] = "fixed-version: Fixed from version 5.18" | ||
2703 | |||
2704 | CVE_STATUS[CVE-2022-49232] = "fixed-version: Fixed from version 5.18" | ||
2705 | |||
2706 | CVE_STATUS[CVE-2022-49233] = "fixed-version: Fixed from version 5.18" | ||
2707 | |||
2708 | CVE_STATUS[CVE-2022-49234] = "fixed-version: Fixed from version 5.18" | ||
2709 | |||
2710 | CVE_STATUS[CVE-2022-49235] = "fixed-version: Fixed from version 5.18" | ||
2711 | |||
2712 | CVE_STATUS[CVE-2022-49236] = "fixed-version: Fixed from version 5.18" | ||
2713 | |||
2714 | CVE_STATUS[CVE-2022-49237] = "fixed-version: Fixed from version 5.18" | ||
2715 | |||
2716 | CVE_STATUS[CVE-2022-49238] = "fixed-version: Fixed from version 5.18" | ||
2717 | |||
2718 | CVE_STATUS[CVE-2022-49239] = "fixed-version: Fixed from version 5.18" | ||
2719 | |||
2720 | CVE_STATUS[CVE-2022-49240] = "fixed-version: Fixed from version 5.18" | ||
2721 | |||
2722 | CVE_STATUS[CVE-2022-49241] = "fixed-version: Fixed from version 5.18" | ||
2723 | |||
2724 | CVE_STATUS[CVE-2022-49242] = "fixed-version: Fixed from version 5.18" | ||
2725 | |||
2726 | CVE_STATUS[CVE-2022-49243] = "fixed-version: Fixed from version 5.18" | ||
2727 | |||
2728 | CVE_STATUS[CVE-2022-49244] = "fixed-version: Fixed from version 5.18" | ||
2729 | |||
2730 | CVE_STATUS[CVE-2022-49245] = "fixed-version: Fixed from version 5.18" | ||
2731 | |||
2732 | CVE_STATUS[CVE-2022-49246] = "fixed-version: Fixed from version 5.18" | ||
2733 | |||
2734 | CVE_STATUS[CVE-2022-49247] = "fixed-version: Fixed from version 5.18" | ||
2735 | |||
2736 | CVE_STATUS[CVE-2022-49248] = "fixed-version: Fixed from version 5.18" | ||
2737 | |||
2738 | CVE_STATUS[CVE-2022-49249] = "fixed-version: Fixed from version 5.18" | ||
2739 | |||
2740 | CVE_STATUS[CVE-2022-49250] = "fixed-version: Fixed from version 5.18" | ||
2741 | |||
2742 | CVE_STATUS[CVE-2022-49251] = "fixed-version: Fixed from version 5.18" | ||
2743 | |||
2744 | CVE_STATUS[CVE-2022-49252] = "fixed-version: Fixed from version 5.18" | ||
2745 | |||
2746 | CVE_STATUS[CVE-2022-49253] = "fixed-version: Fixed from version 5.18" | ||
2747 | |||
2748 | CVE_STATUS[CVE-2022-49254] = "fixed-version: Fixed from version 5.18" | ||
2749 | |||
2750 | CVE_STATUS[CVE-2022-49255] = "fixed-version: Fixed from version 5.18" | ||
2751 | |||
2752 | CVE_STATUS[CVE-2022-49256] = "fixed-version: Fixed from version 5.18" | ||
2753 | |||
2754 | CVE_STATUS[CVE-2022-49257] = "fixed-version: Fixed from version 5.18" | ||
2755 | |||
2756 | CVE_STATUS[CVE-2022-49258] = "fixed-version: Fixed from version 5.18" | ||
2757 | |||
2758 | CVE_STATUS[CVE-2022-49259] = "fixed-version: Fixed from version 5.18" | ||
2759 | |||
2760 | CVE_STATUS[CVE-2022-49260] = "fixed-version: Fixed from version 5.18" | ||
2761 | |||
2762 | CVE_STATUS[CVE-2022-49261] = "fixed-version: Fixed from version 5.18" | ||
2763 | |||
2764 | CVE_STATUS[CVE-2022-49262] = "fixed-version: Fixed from version 5.18" | ||
2765 | |||
2766 | CVE_STATUS[CVE-2022-49263] = "fixed-version: Fixed from version 5.18" | ||
2767 | |||
2768 | CVE_STATUS[CVE-2022-49264] = "fixed-version: Fixed from version 5.18" | ||
2769 | |||
2770 | CVE_STATUS[CVE-2022-49265] = "fixed-version: Fixed from version 5.18" | ||
2771 | |||
2772 | CVE_STATUS[CVE-2022-49266] = "fixed-version: Fixed from version 5.18" | ||
2773 | |||
2774 | CVE_STATUS[CVE-2022-49267] = "fixed-version: Fixed from version 5.18" | ||
2775 | |||
2776 | CVE_STATUS[CVE-2022-49268] = "fixed-version: Fixed from version 5.18" | ||
2777 | |||
2778 | CVE_STATUS[CVE-2022-49269] = "fixed-version: Fixed from version 5.18" | ||
2779 | |||
2780 | CVE_STATUS[CVE-2022-49270] = "fixed-version: Fixed from version 5.18" | ||
2781 | |||
2782 | CVE_STATUS[CVE-2022-49271] = "fixed-version: Fixed from version 5.18" | ||
2783 | |||
2784 | CVE_STATUS[CVE-2022-49272] = "fixed-version: Fixed from version 5.17.2" | ||
2785 | |||
2786 | CVE_STATUS[CVE-2022-49273] = "fixed-version: Fixed from version 5.18" | ||
2787 | |||
2788 | CVE_STATUS[CVE-2022-49274] = "fixed-version: Fixed from version 5.18" | ||
2789 | |||
2790 | CVE_STATUS[CVE-2022-49275] = "fixed-version: Fixed from version 5.18" | ||
2791 | |||
2792 | CVE_STATUS[CVE-2022-49276] = "fixed-version: Fixed from version 5.18" | ||
2793 | |||
2794 | CVE_STATUS[CVE-2022-49277] = "fixed-version: Fixed from version 5.18" | ||
2795 | |||
2796 | CVE_STATUS[CVE-2022-49278] = "fixed-version: Fixed from version 5.18" | ||
2797 | |||
2798 | CVE_STATUS[CVE-2022-49279] = "fixed-version: Fixed from version 5.18" | ||
2799 | |||
2800 | CVE_STATUS[CVE-2022-49280] = "fixed-version: Fixed from version 5.18" | ||
2801 | |||
2802 | CVE_STATUS[CVE-2022-49281] = "fixed-version: Fixed from version 5.18" | ||
2803 | |||
2804 | CVE_STATUS[CVE-2022-49282] = "fixed-version: Fixed from version 5.18" | ||
2805 | |||
2806 | CVE_STATUS[CVE-2022-49283] = "fixed-version: Fixed from version 5.18" | ||
2807 | |||
2808 | CVE_STATUS[CVE-2022-49284] = "fixed-version: Fixed from version 5.18" | ||
2809 | |||
2810 | CVE_STATUS[CVE-2022-49285] = "fixed-version: Fixed from version 5.18" | ||
2811 | |||
2812 | CVE_STATUS[CVE-2022-49286] = "fixed-version: Fixed from version 5.18" | ||
2813 | |||
2814 | CVE_STATUS[CVE-2022-49287] = "fixed-version: Fixed from version 5.18" | ||
2815 | |||
2816 | CVE_STATUS[CVE-2022-49288] = "fixed-version: Fixed from version 5.18" | ||
2817 | |||
2818 | CVE_STATUS[CVE-2022-49289] = "fixed-version: Fixed from version 5.18" | ||
2819 | |||
2820 | CVE_STATUS[CVE-2022-49290] = "fixed-version: Fixed from version 5.18" | ||
2821 | |||
2822 | CVE_STATUS[CVE-2022-49291] = "fixed-version: Fixed from version 5.18" | ||
2823 | |||
2824 | CVE_STATUS[CVE-2022-49292] = "fixed-version: Fixed from version 5.18" | ||
2825 | |||
2826 | CVE_STATUS[CVE-2022-49293] = "fixed-version: Fixed from version 5.18" | ||
2827 | |||
2828 | CVE_STATUS[CVE-2022-49294] = "fixed-version: Fixed from version 5.19" | ||
2829 | |||
2830 | CVE_STATUS[CVE-2022-49295] = "fixed-version: Fixed from version 5.19" | ||
2831 | |||
2832 | CVE_STATUS[CVE-2022-49296] = "fixed-version: Fixed from version 5.19" | ||
2833 | |||
2834 | CVE_STATUS[CVE-2022-49297] = "fixed-version: Fixed from version 5.19" | ||
2835 | |||
2836 | CVE_STATUS[CVE-2022-49298] = "fixed-version: Fixed from version 5.19" | ||
2837 | |||
2838 | CVE_STATUS[CVE-2022-49299] = "fixed-version: Fixed from version 5.19" | ||
2839 | |||
2840 | CVE_STATUS[CVE-2022-49300] = "fixed-version: Fixed from version 5.19" | ||
2841 | |||
2842 | CVE_STATUS[CVE-2022-49301] = "fixed-version: Fixed from version 5.19" | ||
2843 | |||
2844 | CVE_STATUS[CVE-2022-49302] = "fixed-version: Fixed from version 5.19" | ||
2845 | |||
2846 | CVE_STATUS[CVE-2022-49303] = "fixed-version: Fixed from version 5.19" | ||
2847 | |||
2848 | CVE_STATUS[CVE-2022-49304] = "fixed-version: Fixed from version 5.19" | ||
2849 | |||
2850 | CVE_STATUS[CVE-2022-49305] = "fixed-version: Fixed from version 5.19" | ||
2851 | |||
2852 | CVE_STATUS[CVE-2022-49306] = "fixed-version: Fixed from version 5.19" | ||
2853 | |||
2854 | CVE_STATUS[CVE-2022-49307] = "fixed-version: Fixed from version 5.19" | ||
2855 | |||
2856 | CVE_STATUS[CVE-2022-49308] = "fixed-version: Fixed from version 5.19" | ||
2857 | |||
2858 | CVE_STATUS[CVE-2022-49309] = "fixed-version: Fixed from version 5.19" | ||
2859 | |||
2860 | CVE_STATUS[CVE-2022-49310] = "fixed-version: Fixed from version 5.19" | ||
2861 | |||
2862 | CVE_STATUS[CVE-2022-49311] = "fixed-version: Fixed from version 5.19" | ||
2863 | |||
2864 | CVE_STATUS[CVE-2022-49312] = "fixed-version: Fixed from version 5.19" | ||
2865 | |||
2866 | CVE_STATUS[CVE-2022-49313] = "fixed-version: Fixed from version 5.19" | ||
2867 | |||
2868 | CVE_STATUS[CVE-2022-49314] = "fixed-version: Fixed from version 5.19" | ||
2869 | |||
2870 | CVE_STATUS[CVE-2022-49315] = "fixed-version: Fixed from version 5.19" | ||
2871 | |||
2872 | CVE_STATUS[CVE-2022-49316] = "fixed-version: Fixed from version 5.19" | ||
2873 | |||
2874 | CVE_STATUS[CVE-2022-49317] = "fixed-version: Fixed from version 5.19" | ||
2875 | |||
2876 | CVE_STATUS[CVE-2022-49318] = "fixed-version: Fixed from version 5.19" | ||
2877 | |||
2878 | CVE_STATUS[CVE-2022-49319] = "fixed-version: Fixed from version 5.19" | ||
2879 | |||
2880 | CVE_STATUS[CVE-2022-49320] = "fixed-version: Fixed from version 5.19" | ||
2881 | |||
2882 | CVE_STATUS[CVE-2022-49321] = "fixed-version: Fixed from version 5.19" | ||
2883 | |||
2884 | CVE_STATUS[CVE-2022-49322] = "fixed-version: Fixed from version 5.19" | ||
2885 | |||
2886 | CVE_STATUS[CVE-2022-49323] = "fixed-version: Fixed from version 5.19" | ||
2887 | |||
2888 | CVE_STATUS[CVE-2022-49324] = "fixed-version: Fixed from version 5.19" | ||
2889 | |||
2890 | CVE_STATUS[CVE-2022-49325] = "fixed-version: Fixed from version 5.19" | ||
2891 | |||
2892 | CVE_STATUS[CVE-2022-49326] = "fixed-version: Fixed from version 5.19" | ||
2893 | |||
2894 | CVE_STATUS[CVE-2022-49327] = "fixed-version: Fixed from version 5.19" | ||
2895 | |||
2896 | CVE_STATUS[CVE-2022-49328] = "fixed-version: Fixed from version 5.19" | ||
2897 | |||
2898 | CVE_STATUS[CVE-2022-49329] = "fixed-version: Fixed from version 5.19" | ||
2899 | |||
2900 | CVE_STATUS[CVE-2022-49330] = "fixed-version: Fixed from version 5.19" | ||
2901 | |||
2902 | CVE_STATUS[CVE-2022-49331] = "fixed-version: Fixed from version 5.19" | ||
2903 | |||
2904 | CVE_STATUS[CVE-2022-49332] = "fixed-version: Fixed from version 5.19" | ||
2905 | |||
2906 | CVE_STATUS[CVE-2022-49333] = "fixed-version: Fixed from version 5.19" | ||
2907 | |||
2908 | CVE_STATUS[CVE-2022-49334] = "fixed-version: Fixed from version 5.19" | ||
2909 | |||
2910 | CVE_STATUS[CVE-2022-49335] = "fixed-version: Fixed from version 5.19" | ||
2911 | |||
2912 | CVE_STATUS[CVE-2022-49336] = "fixed-version: Fixed from version 5.19" | ||
2913 | |||
2914 | CVE_STATUS[CVE-2022-49337] = "fixed-version: Fixed from version 5.19" | ||
2915 | |||
2916 | CVE_STATUS[CVE-2022-49338] = "fixed-version: Fixed from version 5.19" | ||
2917 | |||
2918 | CVE_STATUS[CVE-2022-49339] = "fixed-version: Fixed from version 5.19" | ||
2919 | |||
2920 | CVE_STATUS[CVE-2022-49340] = "fixed-version: Fixed from version 5.19" | ||
2921 | |||
2922 | CVE_STATUS[CVE-2022-49341] = "fixed-version: Fixed from version 5.19" | ||
2923 | |||
2924 | CVE_STATUS[CVE-2022-49342] = "fixed-version: Fixed from version 5.19" | ||
2925 | |||
2926 | CVE_STATUS[CVE-2022-49343] = "fixed-version: Fixed from version 5.19" | ||
2927 | |||
2928 | CVE_STATUS[CVE-2022-49344] = "fixed-version: Fixed from version 5.19" | ||
2929 | |||
2930 | CVE_STATUS[CVE-2022-49345] = "fixed-version: Fixed from version 5.19" | ||
2931 | |||
2932 | CVE_STATUS[CVE-2022-49346] = "fixed-version: Fixed from version 5.19" | ||
2933 | |||
2934 | CVE_STATUS[CVE-2022-49347] = "fixed-version: Fixed from version 5.19" | ||
2935 | |||
2936 | CVE_STATUS[CVE-2022-49348] = "fixed-version: Fixed from version 5.19" | ||
2937 | |||
2938 | CVE_STATUS[CVE-2022-49349] = "fixed-version: Fixed from version 5.19" | ||
2939 | |||
2940 | CVE_STATUS[CVE-2022-49350] = "fixed-version: Fixed from version 5.19" | ||
2941 | |||
2942 | CVE_STATUS[CVE-2022-49351] = "fixed-version: Fixed from version 5.19" | ||
2943 | |||
2944 | CVE_STATUS[CVE-2022-49352] = "fixed-version: Fixed from version 5.19" | ||
2945 | |||
2946 | CVE_STATUS[CVE-2022-49353] = "fixed-version: Fixed from version 5.18.4" | ||
2947 | |||
2948 | CVE_STATUS[CVE-2022-49354] = "fixed-version: Fixed from version 5.19" | ||
2949 | |||
2950 | CVE_STATUS[CVE-2022-49356] = "fixed-version: Fixed from version 5.19" | ||
2951 | |||
2952 | CVE_STATUS[CVE-2022-49357] = "fixed-version: Fixed from version 5.19" | ||
2953 | |||
2954 | CVE_STATUS[CVE-2022-49358] = "fixed-version: Fixed from version 5.19" | ||
2955 | |||
2956 | CVE_STATUS[CVE-2022-49359] = "fixed-version: Fixed from version 5.19" | ||
2957 | |||
2958 | CVE_STATUS[CVE-2022-49360] = "fixed-version: Fixed from version 5.19" | ||
2959 | |||
2960 | CVE_STATUS[CVE-2022-49361] = "fixed-version: Fixed from version 5.19" | ||
2961 | |||
2962 | CVE_STATUS[CVE-2022-49362] = "fixed-version: Fixed from version 5.19" | ||
2963 | |||
2964 | CVE_STATUS[CVE-2022-49363] = "fixed-version: Fixed from version 5.19" | ||
2965 | |||
2966 | CVE_STATUS[CVE-2022-49364] = "fixed-version: Fixed from version 5.19" | ||
2967 | |||
2968 | CVE_STATUS[CVE-2022-49365] = "fixed-version: Fixed from version 5.19" | ||
2969 | |||
2970 | CVE_STATUS[CVE-2022-49366] = "fixed-version: Fixed from version 5.19" | ||
2971 | |||
2972 | CVE_STATUS[CVE-2022-49367] = "fixed-version: Fixed from version 5.19" | ||
2973 | |||
2974 | CVE_STATUS[CVE-2022-49368] = "fixed-version: Fixed from version 5.19" | ||
2975 | |||
2976 | CVE_STATUS[CVE-2022-49369] = "fixed-version: Fixed from version 5.19" | ||
2977 | |||
2978 | CVE_STATUS[CVE-2022-49370] = "fixed-version: Fixed from version 5.19" | ||
2979 | |||
2980 | CVE_STATUS[CVE-2022-49371] = "fixed-version: Fixed from version 5.19" | ||
2981 | |||
2982 | CVE_STATUS[CVE-2022-49372] = "fixed-version: Fixed from version 5.19" | ||
2983 | |||
2984 | CVE_STATUS[CVE-2022-49373] = "fixed-version: Fixed from version 5.19" | ||
2985 | |||
2986 | CVE_STATUS[CVE-2022-49374] = "fixed-version: Fixed from version 5.19" | ||
2987 | |||
2988 | CVE_STATUS[CVE-2022-49375] = "fixed-version: Fixed from version 5.19" | ||
2989 | |||
2990 | CVE_STATUS[CVE-2022-49376] = "fixed-version: Fixed from version 5.19" | ||
2991 | |||
2992 | CVE_STATUS[CVE-2022-49377] = "fixed-version: Fixed from version 5.19" | ||
2993 | |||
2994 | CVE_STATUS[CVE-2022-49378] = "fixed-version: Fixed from version 5.19" | ||
2995 | |||
2996 | CVE_STATUS[CVE-2022-49379] = "fixed-version: Fixed from version 5.19" | ||
2997 | |||
2998 | CVE_STATUS[CVE-2022-49380] = "fixed-version: Fixed from version 5.19" | ||
2999 | |||
3000 | CVE_STATUS[CVE-2022-49381] = "fixed-version: Fixed from version 5.19" | ||
3001 | |||
3002 | CVE_STATUS[CVE-2022-49382] = "fixed-version: Fixed from version 5.19" | ||
3003 | |||
3004 | CVE_STATUS[CVE-2022-49383] = "fixed-version: Fixed from version 5.19" | ||
3005 | |||
3006 | CVE_STATUS[CVE-2022-49384] = "fixed-version: Fixed from version 5.19" | ||
3007 | |||
3008 | CVE_STATUS[CVE-2022-49385] = "fixed-version: Fixed from version 5.19" | ||
3009 | |||
3010 | CVE_STATUS[CVE-2022-49386] = "fixed-version: Fixed from version 5.19" | ||
3011 | |||
3012 | CVE_STATUS[CVE-2022-49387] = "fixed-version: Fixed from version 5.19" | ||
3013 | |||
3014 | CVE_STATUS[CVE-2022-49388] = "fixed-version: Fixed from version 5.19" | ||
3015 | |||
3016 | CVE_STATUS[CVE-2022-49389] = "fixed-version: Fixed from version 5.19" | ||
3017 | |||
3018 | CVE_STATUS[CVE-2022-49390] = "fixed-version: Fixed from version 5.19" | ||
3019 | |||
3020 | CVE_STATUS[CVE-2022-49391] = "fixed-version: Fixed from version 5.19" | ||
3021 | |||
3022 | CVE_STATUS[CVE-2022-49392] = "fixed-version: Fixed from version 5.19" | ||
3023 | |||
3024 | CVE_STATUS[CVE-2022-49393] = "fixed-version: Fixed from version 5.19" | ||
3025 | |||
3026 | CVE_STATUS[CVE-2022-49394] = "fixed-version: Fixed from version 5.19" | ||
3027 | |||
3028 | CVE_STATUS[CVE-2022-49395] = "fixed-version: Fixed from version 5.19" | ||
3029 | |||
3030 | CVE_STATUS[CVE-2022-49396] = "fixed-version: Fixed from version 5.19" | ||
3031 | |||
3032 | CVE_STATUS[CVE-2022-49397] = "fixed-version: Fixed from version 5.19" | ||
3033 | |||
3034 | CVE_STATUS[CVE-2022-49398] = "fixed-version: Fixed from version 5.19" | ||
3035 | |||
3036 | CVE_STATUS[CVE-2022-49399] = "fixed-version: Fixed from version 5.19" | ||
3037 | |||
3038 | CVE_STATUS[CVE-2022-49400] = "fixed-version: Fixed from version 5.19" | ||
3039 | |||
3040 | CVE_STATUS[CVE-2022-49401] = "fixed-version: Fixed from version 5.19" | ||
3041 | |||
3042 | CVE_STATUS[CVE-2022-49402] = "fixed-version: Fixed from version 5.19" | ||
3043 | |||
3044 | CVE_STATUS[CVE-2022-49403] = "fixed-version: Fixed from version 5.19" | ||
3045 | |||
3046 | CVE_STATUS[CVE-2022-49404] = "fixed-version: Fixed from version 5.19" | ||
3047 | |||
3048 | CVE_STATUS[CVE-2022-49405] = "fixed-version: Fixed from version 5.19" | ||
3049 | |||
3050 | CVE_STATUS[CVE-2022-49406] = "fixed-version: Fixed from version 5.19" | ||
3051 | |||
3052 | CVE_STATUS[CVE-2022-49407] = "fixed-version: Fixed from version 5.19" | ||
3053 | |||
3054 | CVE_STATUS[CVE-2022-49408] = "fixed-version: Fixed from version 5.19" | ||
3055 | |||
3056 | CVE_STATUS[CVE-2022-49409] = "fixed-version: Fixed from version 5.19" | ||
3057 | |||
3058 | CVE_STATUS[CVE-2022-49410] = "fixed-version: Fixed from version 5.19" | ||
3059 | |||
3060 | CVE_STATUS[CVE-2022-49411] = "fixed-version: Fixed from version 5.19" | ||
3061 | |||
3062 | CVE_STATUS[CVE-2022-49412] = "fixed-version: Fixed from version 5.19" | ||
3063 | |||
3064 | CVE_STATUS[CVE-2022-49413] = "fixed-version: Fixed from version 5.19" | ||
3065 | |||
3066 | CVE_STATUS[CVE-2022-49414] = "fixed-version: Fixed from version 5.19" | ||
3067 | |||
3068 | CVE_STATUS[CVE-2022-49415] = "fixed-version: Fixed from version 5.19" | ||
3069 | |||
3070 | CVE_STATUS[CVE-2022-49416] = "fixed-version: Fixed from version 5.19" | ||
3071 | |||
3072 | CVE_STATUS[CVE-2022-49417] = "fixed-version: Fixed from version 5.19" | ||
3073 | |||
3074 | CVE_STATUS[CVE-2022-49418] = "fixed-version: Fixed from version 5.19" | ||
3075 | |||
3076 | CVE_STATUS[CVE-2022-49419] = "fixed-version: Fixed from version 5.19" | ||
3077 | |||
3078 | CVE_STATUS[CVE-2022-49420] = "fixed-version: Fixed from version 5.19" | ||
3079 | |||
3080 | CVE_STATUS[CVE-2022-49421] = "fixed-version: Fixed from version 5.19" | ||
3081 | |||
3082 | CVE_STATUS[CVE-2022-49422] = "fixed-version: Fixed from version 5.19" | ||
3083 | |||
3084 | CVE_STATUS[CVE-2022-49423] = "fixed-version: Fixed from version 5.19" | ||
3085 | |||
3086 | CVE_STATUS[CVE-2022-49424] = "fixed-version: Fixed from version 5.19" | ||
3087 | |||
3088 | CVE_STATUS[CVE-2022-49425] = "fixed-version: Fixed from version 5.19" | ||
3089 | |||
3090 | CVE_STATUS[CVE-2022-49426] = "fixed-version: Fixed from version 5.19" | ||
3091 | |||
3092 | CVE_STATUS[CVE-2022-49427] = "fixed-version: Fixed from version 5.19" | ||
3093 | |||
3094 | CVE_STATUS[CVE-2022-49428] = "fixed-version: Fixed from version 5.19" | ||
3095 | |||
3096 | CVE_STATUS[CVE-2022-49429] = "fixed-version: Fixed from version 5.19" | ||
3097 | |||
3098 | CVE_STATUS[CVE-2022-49430] = "fixed-version: Fixed from version 5.19" | ||
3099 | |||
3100 | CVE_STATUS[CVE-2022-49431] = "fixed-version: Fixed from version 5.19" | ||
3101 | |||
3102 | CVE_STATUS[CVE-2022-49432] = "fixed-version: Fixed from version 5.19" | ||
3103 | |||
3104 | CVE_STATUS[CVE-2022-49433] = "fixed-version: Fixed from version 5.19" | ||
3105 | |||
3106 | CVE_STATUS[CVE-2022-49434] = "fixed-version: Fixed from version 5.19" | ||
3107 | |||
3108 | CVE_STATUS[CVE-2022-49435] = "fixed-version: Fixed from version 5.19" | ||
3109 | |||
3110 | CVE_STATUS[CVE-2022-49436] = "fixed-version: Fixed from version 5.19" | ||
3111 | |||
3112 | CVE_STATUS[CVE-2022-49437] = "fixed-version: Fixed from version 5.19" | ||
3113 | |||
3114 | CVE_STATUS[CVE-2022-49438] = "fixed-version: Fixed from version 5.19" | ||
3115 | |||
3116 | CVE_STATUS[CVE-2022-49439] = "fixed-version: Fixed from version 5.19" | ||
3117 | |||
3118 | CVE_STATUS[CVE-2022-49440] = "fixed-version: Fixed from version 5.19" | ||
3119 | |||
3120 | CVE_STATUS[CVE-2022-49441] = "fixed-version: Fixed from version 5.19" | ||
3121 | |||
3122 | CVE_STATUS[CVE-2022-49442] = "fixed-version: Fixed from version 5.19" | ||
3123 | |||
3124 | CVE_STATUS[CVE-2022-49443] = "fixed-version: Fixed from version 5.19" | ||
3125 | |||
3126 | CVE_STATUS[CVE-2022-49444] = "fixed-version: Fixed from version 5.19" | ||
3127 | |||
3128 | CVE_STATUS[CVE-2022-49445] = "fixed-version: Fixed from version 5.19" | ||
3129 | |||
3130 | CVE_STATUS[CVE-2022-49446] = "fixed-version: Fixed from version 5.19" | ||
3131 | |||
3132 | CVE_STATUS[CVE-2022-49447] = "fixed-version: Fixed from version 5.19" | ||
3133 | |||
3134 | CVE_STATUS[CVE-2022-49448] = "fixed-version: Fixed from version 5.19" | ||
3135 | |||
3136 | CVE_STATUS[CVE-2022-49449] = "fixed-version: Fixed from version 5.19" | ||
3137 | |||
3138 | CVE_STATUS[CVE-2022-49450] = "fixed-version: Fixed from version 5.19" | ||
3139 | |||
3140 | CVE_STATUS[CVE-2022-49451] = "fixed-version: Fixed from version 5.19" | ||
3141 | |||
3142 | CVE_STATUS[CVE-2022-49452] = "fixed-version: Fixed from version 5.19" | ||
3143 | |||
3144 | CVE_STATUS[CVE-2022-49453] = "fixed-version: Fixed from version 5.19" | ||
3145 | |||
3146 | CVE_STATUS[CVE-2022-49454] = "fixed-version: Fixed from version 5.19" | ||
3147 | |||
3148 | CVE_STATUS[CVE-2022-49455] = "fixed-version: Fixed from version 5.19" | ||
3149 | |||
3150 | CVE_STATUS[CVE-2022-49456] = "fixed-version: Fixed from version 5.19" | ||
3151 | |||
3152 | CVE_STATUS[CVE-2022-49457] = "fixed-version: Fixed from version 5.19" | ||
3153 | |||
3154 | CVE_STATUS[CVE-2022-49458] = "fixed-version: Fixed from version 5.19" | ||
3155 | |||
3156 | CVE_STATUS[CVE-2022-49459] = "fixed-version: Fixed from version 5.19" | ||
3157 | |||
3158 | CVE_STATUS[CVE-2022-49460] = "fixed-version: Fixed from version 5.19" | ||
3159 | |||
3160 | CVE_STATUS[CVE-2022-49461] = "fixed-version: Fixed from version 5.19" | ||
3161 | |||
3162 | CVE_STATUS[CVE-2022-49462] = "fixed-version: Fixed from version 5.19" | ||
3163 | |||
3164 | CVE_STATUS[CVE-2022-49463] = "fixed-version: Fixed from version 5.19" | ||
3165 | |||
3166 | CVE_STATUS[CVE-2022-49464] = "fixed-version: Fixed from version 5.19" | ||
3167 | |||
3168 | CVE_STATUS[CVE-2022-49465] = "fixed-version: Fixed from version 5.19" | ||
3169 | |||
3170 | CVE_STATUS[CVE-2022-49466] = "fixed-version: Fixed from version 5.19" | ||
3171 | |||
3172 | CVE_STATUS[CVE-2022-49467] = "fixed-version: Fixed from version 5.19" | ||
3173 | |||
3174 | CVE_STATUS[CVE-2022-49468] = "fixed-version: Fixed from version 5.19" | ||
3175 | |||
3176 | CVE_STATUS[CVE-2022-49469] = "fixed-version: Fixed from version 5.19" | ||
3177 | |||
3178 | CVE_STATUS[CVE-2022-49470] = "fixed-version: Fixed from version 5.19" | ||
3179 | |||
3180 | CVE_STATUS[CVE-2022-49471] = "fixed-version: Fixed from version 5.19" | ||
3181 | |||
3182 | CVE_STATUS[CVE-2022-49472] = "fixed-version: Fixed from version 5.19" | ||
3183 | |||
3184 | CVE_STATUS[CVE-2022-49473] = "fixed-version: Fixed from version 5.19" | ||
3185 | |||
3186 | CVE_STATUS[CVE-2022-49474] = "fixed-version: Fixed from version 5.19" | ||
3187 | |||
3188 | CVE_STATUS[CVE-2022-49475] = "fixed-version: Fixed from version 5.19" | ||
3189 | |||
3190 | CVE_STATUS[CVE-2022-49476] = "fixed-version: Fixed from version 5.19" | ||
3191 | |||
3192 | CVE_STATUS[CVE-2022-49477] = "fixed-version: Fixed from version 5.19" | ||
3193 | |||
3194 | CVE_STATUS[CVE-2022-49478] = "fixed-version: Fixed from version 5.19" | ||
3195 | |||
3196 | CVE_STATUS[CVE-2022-49479] = "fixed-version: Fixed from version 5.19" | ||
3197 | |||
3198 | CVE_STATUS[CVE-2022-49480] = "fixed-version: Fixed from version 5.19" | ||
3199 | |||
3200 | CVE_STATUS[CVE-2022-49481] = "fixed-version: Fixed from version 5.19" | ||
3201 | |||
3202 | CVE_STATUS[CVE-2022-49482] = "fixed-version: Fixed from version 5.19" | ||
3203 | |||
3204 | CVE_STATUS[CVE-2022-49483] = "fixed-version: Fixed from version 5.19" | ||
3205 | |||
3206 | CVE_STATUS[CVE-2022-49484] = "fixed-version: Fixed from version 5.19" | ||
3207 | |||
3208 | CVE_STATUS[CVE-2022-49485] = "fixed-version: Fixed from version 5.19" | ||
3209 | |||
3210 | CVE_STATUS[CVE-2022-49486] = "fixed-version: Fixed from version 5.19" | ||
3211 | |||
3212 | CVE_STATUS[CVE-2022-49487] = "fixed-version: Fixed from version 5.19" | ||
3213 | |||
3214 | CVE_STATUS[CVE-2022-49488] = "fixed-version: Fixed from version 5.19" | ||
3215 | |||
3216 | CVE_STATUS[CVE-2022-49489] = "fixed-version: Fixed from version 5.19" | ||
3217 | |||
3218 | CVE_STATUS[CVE-2022-49490] = "fixed-version: Fixed from version 5.19" | ||
3219 | |||
3220 | CVE_STATUS[CVE-2022-49491] = "fixed-version: Fixed from version 5.19" | ||
3221 | |||
3222 | CVE_STATUS[CVE-2022-49492] = "fixed-version: Fixed from version 5.19" | ||
3223 | |||
3224 | CVE_STATUS[CVE-2022-49493] = "fixed-version: Fixed from version 5.19" | ||
3225 | |||
3226 | CVE_STATUS[CVE-2022-49494] = "fixed-version: Fixed from version 5.19" | ||
3227 | |||
3228 | CVE_STATUS[CVE-2022-49495] = "fixed-version: Fixed from version 5.19" | ||
3229 | |||
3230 | CVE_STATUS[CVE-2022-49496] = "fixed-version: Fixed from version 5.19" | ||
3231 | |||
3232 | CVE_STATUS[CVE-2022-49497] = "fixed-version: Fixed from version 5.19" | ||
3233 | |||
3234 | CVE_STATUS[CVE-2022-49498] = "fixed-version: Fixed from version 5.19" | ||
3235 | |||
3236 | CVE_STATUS[CVE-2022-49499] = "fixed-version: Fixed from version 5.19" | ||
3237 | |||
3238 | CVE_STATUS[CVE-2022-49500] = "fixed-version: Fixed from version 5.19" | ||
3239 | |||
3240 | CVE_STATUS[CVE-2022-49501] = "fixed-version: Fixed from version 5.19" | ||
3241 | |||
3242 | CVE_STATUS[CVE-2022-49502] = "fixed-version: Fixed from version 5.19" | ||
3243 | |||
3244 | CVE_STATUS[CVE-2022-49503] = "fixed-version: Fixed from version 5.19" | ||
3245 | |||
3246 | CVE_STATUS[CVE-2022-49504] = "fixed-version: Fixed from version 5.19" | ||
3247 | |||
3248 | CVE_STATUS[CVE-2022-49505] = "fixed-version: Fixed from version 5.19" | ||
3249 | |||
3250 | CVE_STATUS[CVE-2022-49506] = "fixed-version: Fixed from version 5.19" | ||
3251 | |||
3252 | CVE_STATUS[CVE-2022-49507] = "fixed-version: Fixed from version 5.19" | ||
3253 | |||
3254 | CVE_STATUS[CVE-2022-49508] = "fixed-version: Fixed from version 5.19" | ||
3255 | |||
3256 | CVE_STATUS[CVE-2022-49509] = "fixed-version: Fixed from version 5.19" | ||
3257 | |||
3258 | CVE_STATUS[CVE-2022-49510] = "fixed-version: Fixed from version 5.19" | ||
3259 | |||
3260 | CVE_STATUS[CVE-2022-49511] = "fixed-version: Fixed from version 5.19" | ||
3261 | |||
3262 | CVE_STATUS[CVE-2022-49512] = "fixed-version: Fixed from version 5.19" | ||
3263 | |||
3264 | CVE_STATUS[CVE-2022-49513] = "fixed-version: Fixed from version 5.19" | ||
3265 | |||
3266 | CVE_STATUS[CVE-2022-49514] = "fixed-version: Fixed from version 5.19" | ||
3267 | |||
3268 | CVE_STATUS[CVE-2022-49515] = "fixed-version: Fixed from version 5.19" | ||
3269 | |||
3270 | CVE_STATUS[CVE-2022-49516] = "fixed-version: Fixed from version 5.19" | ||
3271 | |||
3272 | CVE_STATUS[CVE-2022-49517] = "fixed-version: Fixed from version 5.19" | ||
3273 | |||
3274 | CVE_STATUS[CVE-2022-49518] = "fixed-version: Fixed from version 5.19" | ||
3275 | |||
3276 | CVE_STATUS[CVE-2022-49519] = "fixed-version: Fixed from version 5.19" | ||
3277 | |||
3278 | CVE_STATUS[CVE-2022-49520] = "fixed-version: Fixed from version 5.19" | ||
3279 | |||
3280 | CVE_STATUS[CVE-2022-49521] = "fixed-version: Fixed from version 5.19" | ||
3281 | |||
3282 | CVE_STATUS[CVE-2022-49522] = "fixed-version: Fixed from version 5.19" | ||
3283 | |||
3284 | CVE_STATUS[CVE-2022-49523] = "fixed-version: Fixed from version 5.19" | ||
3285 | |||
3286 | CVE_STATUS[CVE-2022-49524] = "fixed-version: Fixed from version 5.19" | ||
3287 | |||
3288 | CVE_STATUS[CVE-2022-49525] = "fixed-version: Fixed from version 5.19" | ||
3289 | |||
3290 | CVE_STATUS[CVE-2022-49526] = "fixed-version: Fixed from version 5.19" | ||
3291 | |||
3292 | CVE_STATUS[CVE-2022-49527] = "fixed-version: Fixed from version 5.19" | ||
3293 | |||
3294 | CVE_STATUS[CVE-2022-49528] = "fixed-version: Fixed from version 5.19" | ||
3295 | |||
3296 | CVE_STATUS[CVE-2022-49529] = "fixed-version: Fixed from version 5.19" | ||
3297 | |||
3298 | CVE_STATUS[CVE-2022-49530] = "fixed-version: Fixed from version 5.19" | ||
3299 | |||
3300 | CVE_STATUS[CVE-2022-49531] = "fixed-version: Fixed from version 5.19" | ||
3301 | |||
3302 | CVE_STATUS[CVE-2022-49532] = "fixed-version: Fixed from version 5.19" | ||
3303 | |||
3304 | CVE_STATUS[CVE-2022-49533] = "fixed-version: Fixed from version 5.19" | ||
3305 | |||
3306 | CVE_STATUS[CVE-2022-49534] = "fixed-version: Fixed from version 5.19" | ||
3307 | |||
3308 | CVE_STATUS[CVE-2022-49535] = "fixed-version: Fixed from version 5.19" | ||
3309 | |||
3310 | CVE_STATUS[CVE-2022-49536] = "fixed-version: Fixed from version 5.19" | ||
3311 | |||
3312 | CVE_STATUS[CVE-2022-49537] = "fixed-version: Fixed from version 5.19" | ||
3313 | |||
3314 | CVE_STATUS[CVE-2022-49538] = "fixed-version: Fixed from version 5.19" | ||
3315 | |||
3316 | CVE_STATUS[CVE-2022-49539] = "fixed-version: Fixed from version 5.19" | ||
3317 | |||
3318 | CVE_STATUS[CVE-2022-49540] = "fixed-version: Fixed from version 5.19" | ||
3319 | |||
3320 | CVE_STATUS[CVE-2022-49541] = "fixed-version: Fixed from version 5.19" | ||
3321 | |||
3322 | CVE_STATUS[CVE-2022-49542] = "fixed-version: Fixed from version 5.19" | ||
3323 | |||
3324 | CVE_STATUS[CVE-2022-49543] = "fixed-version: Fixed from version 5.19" | ||
3325 | |||
3326 | CVE_STATUS[CVE-2022-49544] = "fixed-version: Fixed from version 5.19" | ||
3327 | |||
3328 | CVE_STATUS[CVE-2022-49545] = "fixed-version: Fixed from version 5.19" | ||
3329 | |||
3330 | CVE_STATUS[CVE-2022-49546] = "fixed-version: Fixed from version 5.19" | ||
3331 | |||
3332 | CVE_STATUS[CVE-2022-49547] = "fixed-version: Fixed from version 5.19" | ||
3333 | |||
3334 | CVE_STATUS[CVE-2022-49548] = "fixed-version: Fixed from version 5.19" | ||
3335 | |||
3336 | CVE_STATUS[CVE-2022-49549] = "fixed-version: Fixed from version 5.19" | ||
3337 | |||
3338 | CVE_STATUS[CVE-2022-49550] = "fixed-version: Fixed from version 5.19" | ||
3339 | |||
3340 | CVE_STATUS[CVE-2022-49551] = "fixed-version: Fixed from version 5.19" | ||
3341 | |||
3342 | CVE_STATUS[CVE-2022-49552] = "fixed-version: Fixed from version 5.19" | ||
3343 | |||
3344 | CVE_STATUS[CVE-2022-49553] = "fixed-version: Fixed from version 5.19" | ||
3345 | |||
3346 | CVE_STATUS[CVE-2022-49554] = "fixed-version: Fixed from version 5.19" | ||
3347 | |||
3348 | CVE_STATUS[CVE-2022-49555] = "fixed-version: Fixed from version 5.19" | ||
3349 | |||
3350 | CVE_STATUS[CVE-2022-49556] = "fixed-version: Fixed from version 5.19" | ||
3351 | |||
3352 | CVE_STATUS[CVE-2022-49557] = "fixed-version: Fixed from version 5.19" | ||
3353 | |||
3354 | CVE_STATUS[CVE-2022-49558] = "fixed-version: Fixed from version 5.19" | ||
3355 | |||
3356 | CVE_STATUS[CVE-2022-49559] = "fixed-version: Fixed from version 5.19" | ||
3357 | |||
3358 | CVE_STATUS[CVE-2022-49560] = "fixed-version: Fixed from version 5.19" | ||
3359 | |||
3360 | CVE_STATUS[CVE-2022-49561] = "fixed-version: Fixed from version 5.19" | ||
3361 | |||
3362 | CVE_STATUS[CVE-2022-49562] = "fixed-version: Fixed from version 5.19" | ||
3363 | |||
3364 | CVE_STATUS[CVE-2022-49563] = "fixed-version: Fixed from version 5.19" | ||
3365 | |||
3366 | CVE_STATUS[CVE-2022-49564] = "fixed-version: Fixed from version 5.19" | ||
3367 | |||
3368 | CVE_STATUS[CVE-2022-49565] = "fixed-version: Fixed from version 5.19" | ||
3369 | |||
3370 | CVE_STATUS[CVE-2022-49566] = "fixed-version: Fixed from version 5.19" | ||
3371 | |||
3372 | CVE_STATUS[CVE-2022-49567] = "fixed-version: Fixed from version 5.19" | ||
3373 | |||
3374 | CVE_STATUS[CVE-2022-49568] = "fixed-version: Fixed from version 5.19" | ||
3375 | |||
3376 | CVE_STATUS[CVE-2022-49569] = "fixed-version: Fixed from version 5.19" | ||
3377 | |||
3378 | CVE_STATUS[CVE-2022-49570] = "fixed-version: Fixed from version 5.19" | ||
3379 | |||
3380 | CVE_STATUS[CVE-2022-49571] = "fixed-version: Fixed from version 5.19" | ||
3381 | |||
3382 | CVE_STATUS[CVE-2022-49572] = "fixed-version: Fixed from version 5.19" | ||
3383 | |||
3384 | CVE_STATUS[CVE-2022-49573] = "fixed-version: Fixed from version 5.19" | ||
3385 | |||
3386 | CVE_STATUS[CVE-2022-49574] = "fixed-version: Fixed from version 5.19" | ||
3387 | |||
3388 | CVE_STATUS[CVE-2022-49575] = "fixed-version: Fixed from version 5.19" | ||
3389 | |||
3390 | CVE_STATUS[CVE-2022-49576] = "fixed-version: Fixed from version 5.19" | ||
3391 | |||
3392 | CVE_STATUS[CVE-2022-49577] = "fixed-version: Fixed from version 5.19" | ||
3393 | |||
3394 | CVE_STATUS[CVE-2022-49578] = "fixed-version: Fixed from version 5.19" | ||
3395 | |||
3396 | CVE_STATUS[CVE-2022-49579] = "fixed-version: Fixed from version 5.19" | ||
3397 | |||
3398 | CVE_STATUS[CVE-2022-49580] = "fixed-version: Fixed from version 5.19" | ||
3399 | |||
3400 | CVE_STATUS[CVE-2022-49581] = "fixed-version: Fixed from version 5.19" | ||
3401 | |||
3402 | CVE_STATUS[CVE-2022-49582] = "fixed-version: Fixed from version 5.19" | ||
3403 | |||
3404 | CVE_STATUS[CVE-2022-49583] = "fixed-version: Fixed from version 5.19" | ||
3405 | |||
3406 | CVE_STATUS[CVE-2022-49584] = "fixed-version: Fixed from version 5.19" | ||
3407 | |||
3408 | CVE_STATUS[CVE-2022-49585] = "fixed-version: Fixed from version 5.19" | ||
3409 | |||
3410 | CVE_STATUS[CVE-2022-49586] = "fixed-version: Fixed from version 5.19" | ||
3411 | |||
3412 | CVE_STATUS[CVE-2022-49587] = "fixed-version: Fixed from version 5.19" | ||
3413 | |||
3414 | CVE_STATUS[CVE-2022-49588] = "fixed-version: Fixed from version 5.19" | ||
3415 | |||
3416 | CVE_STATUS[CVE-2022-49589] = "fixed-version: Fixed from version 5.19" | ||
3417 | |||
3418 | CVE_STATUS[CVE-2022-49590] = "fixed-version: Fixed from version 5.19" | ||
3419 | |||
3420 | CVE_STATUS[CVE-2022-49591] = "fixed-version: Fixed from version 5.19" | ||
3421 | |||
3422 | CVE_STATUS[CVE-2022-49592] = "fixed-version: Fixed from version 5.19" | ||
3423 | |||
3424 | CVE_STATUS[CVE-2022-49593] = "fixed-version: Fixed from version 5.19" | ||
3425 | |||
3426 | CVE_STATUS[CVE-2022-49594] = "fixed-version: Fixed from version 5.19" | ||
3427 | |||
3428 | CVE_STATUS[CVE-2022-49595] = "fixed-version: Fixed from version 5.19" | ||
3429 | |||
3430 | CVE_STATUS[CVE-2022-49596] = "fixed-version: Fixed from version 5.19" | ||
3431 | |||
3432 | CVE_STATUS[CVE-2022-49597] = "fixed-version: Fixed from version 5.19" | ||
3433 | |||
3434 | CVE_STATUS[CVE-2022-49598] = "fixed-version: Fixed from version 5.19" | ||
3435 | |||
3436 | CVE_STATUS[CVE-2022-49599] = "fixed-version: Fixed from version 5.19" | ||
3437 | |||
3438 | CVE_STATUS[CVE-2022-49600] = "fixed-version: Fixed from version 5.19" | ||
3439 | |||
3440 | CVE_STATUS[CVE-2022-49601] = "fixed-version: Fixed from version 5.19" | ||
3441 | |||
3442 | CVE_STATUS[CVE-2022-49602] = "fixed-version: Fixed from version 5.19" | ||
3443 | |||
3444 | CVE_STATUS[CVE-2022-49603] = "fixed-version: Fixed from version 5.19" | ||
3445 | |||
3446 | CVE_STATUS[CVE-2022-49604] = "fixed-version: Fixed from version 5.19" | ||
3447 | |||
3448 | CVE_STATUS[CVE-2022-49605] = "fixed-version: Fixed from version 5.19" | ||
3449 | |||
3450 | CVE_STATUS[CVE-2022-49606] = "fixed-version: Fixed from version 5.19" | ||
3451 | |||
3452 | CVE_STATUS[CVE-2022-49607] = "fixed-version: Fixed from version 5.19" | ||
3453 | |||
3454 | CVE_STATUS[CVE-2022-49608] = "fixed-version: Fixed from version 5.19" | ||
3455 | |||
3456 | CVE_STATUS[CVE-2022-49609] = "fixed-version: Fixed from version 5.19" | ||
3457 | |||
3458 | CVE_STATUS[CVE-2022-49610] = "fixed-version: Fixed from version 5.19" | ||
3459 | |||
3460 | CVE_STATUS[CVE-2022-49611] = "fixed-version: Fixed from version 5.19" | ||
3461 | |||
3462 | CVE_STATUS[CVE-2022-49612] = "fixed-version: Fixed from version 5.19" | ||
3463 | |||
3464 | CVE_STATUS[CVE-2022-49613] = "fixed-version: Fixed from version 5.19" | ||
3465 | |||
3466 | CVE_STATUS[CVE-2022-49615] = "fixed-version: Fixed from version 5.19" | ||
3467 | |||
3468 | CVE_STATUS[CVE-2022-49616] = "fixed-version: Fixed from version 5.19" | ||
3469 | |||
3470 | CVE_STATUS[CVE-2022-49617] = "fixed-version: Fixed from version 5.19" | ||
3471 | |||
3472 | CVE_STATUS[CVE-2022-49618] = "fixed-version: Fixed from version 5.19" | ||
3473 | |||
3474 | CVE_STATUS[CVE-2022-49619] = "fixed-version: Fixed from version 5.19" | ||
3475 | |||
3476 | CVE_STATUS[CVE-2022-49620] = "fixed-version: Fixed from version 5.19" | ||
3477 | |||
3478 | CVE_STATUS[CVE-2022-49621] = "fixed-version: Fixed from version 5.19" | ||
3479 | |||
3480 | CVE_STATUS[CVE-2022-49622] = "fixed-version: Fixed from version 5.19" | ||
3481 | |||
3482 | CVE_STATUS[CVE-2022-49623] = "fixed-version: Fixed from version 5.19" | ||
3483 | |||
3484 | CVE_STATUS[CVE-2022-49624] = "fixed-version: Fixed from version 5.19" | ||
3485 | |||
3486 | CVE_STATUS[CVE-2022-49625] = "fixed-version: Fixed from version 5.19" | ||
3487 | |||
3488 | CVE_STATUS[CVE-2022-49626] = "fixed-version: Fixed from version 5.19" | ||
3489 | |||
3490 | CVE_STATUS[CVE-2022-49627] = "fixed-version: Fixed from version 5.19" | ||
3491 | |||
3492 | CVE_STATUS[CVE-2022-49628] = "fixed-version: Fixed from version 5.19" | ||
3493 | |||
3494 | CVE_STATUS[CVE-2022-49629] = "fixed-version: Fixed from version 5.19" | ||
3495 | |||
3496 | CVE_STATUS[CVE-2022-49630] = "fixed-version: Fixed from version 5.19" | ||
3497 | |||
3498 | CVE_STATUS[CVE-2022-49631] = "fixed-version: Fixed from version 5.19" | ||
3499 | |||
3500 | CVE_STATUS[CVE-2022-49632] = "fixed-version: Fixed from version 5.19" | ||
3501 | |||
3502 | CVE_STATUS[CVE-2022-49633] = "fixed-version: Fixed from version 5.19" | ||
3503 | |||
3504 | CVE_STATUS[CVE-2022-49634] = "fixed-version: Fixed from version 5.19" | ||
3505 | |||
3506 | CVE_STATUS[CVE-2022-49635] = "fixed-version: Fixed from version 5.19" | ||
3507 | |||
3508 | CVE_STATUS[CVE-2022-49636] = "fixed-version: Fixed from version 5.19" | ||
3509 | |||
3510 | CVE_STATUS[CVE-2022-49637] = "fixed-version: Fixed from version 5.19" | ||
3511 | |||
3512 | CVE_STATUS[CVE-2022-49638] = "fixed-version: Fixed from version 5.19" | ||
3513 | |||
3514 | CVE_STATUS[CVE-2022-49639] = "fixed-version: Fixed from version 5.19" | ||
3515 | |||
3516 | CVE_STATUS[CVE-2022-49640] = "fixed-version: Fixed from version 5.19" | ||
3517 | |||
3518 | CVE_STATUS[CVE-2022-49641] = "fixed-version: Fixed from version 5.19" | ||
3519 | |||
3520 | CVE_STATUS[CVE-2022-49642] = "fixed-version: Fixed from version 5.19" | ||
3521 | |||
3522 | CVE_STATUS[CVE-2022-49643] = "fixed-version: Fixed from version 5.19" | ||
3523 | |||
3524 | CVE_STATUS[CVE-2022-49644] = "fixed-version: Fixed from version 5.19" | ||
3525 | |||
3526 | CVE_STATUS[CVE-2022-49645] = "fixed-version: Fixed from version 5.19" | ||
3527 | |||
3528 | CVE_STATUS[CVE-2022-49646] = "fixed-version: Fixed from version 5.19" | ||
3529 | |||
3530 | CVE_STATUS[CVE-2022-49647] = "fixed-version: Fixed from version 5.19" | ||
3531 | |||
3532 | CVE_STATUS[CVE-2022-49648] = "fixed-version: Fixed from version 5.19" | ||
3533 | |||
3534 | CVE_STATUS[CVE-2022-49649] = "fixed-version: Fixed from version 5.19" | ||
3535 | |||
3536 | CVE_STATUS[CVE-2022-49650] = "fixed-version: Fixed from version 5.19" | ||
3537 | |||
3538 | CVE_STATUS[CVE-2022-49651] = "fixed-version: Fixed from version 5.19" | ||
3539 | |||
3540 | CVE_STATUS[CVE-2022-49652] = "fixed-version: Fixed from version 5.19" | ||
3541 | |||
3542 | CVE_STATUS[CVE-2022-49653] = "fixed-version: Fixed from version 5.19" | ||
3543 | |||
3544 | CVE_STATUS[CVE-2022-49654] = "fixed-version: Fixed from version 5.19" | ||
3545 | |||
3546 | CVE_STATUS[CVE-2022-49655] = "fixed-version: Fixed from version 5.19" | ||
3547 | |||
3548 | CVE_STATUS[CVE-2022-49656] = "fixed-version: Fixed from version 5.19" | ||
3549 | |||
3550 | CVE_STATUS[CVE-2022-49657] = "fixed-version: Fixed from version 5.19" | ||
3551 | |||
3552 | CVE_STATUS[CVE-2022-49658] = "fixed-version: Fixed from version 5.19" | ||
3553 | |||
3554 | CVE_STATUS[CVE-2022-49659] = "fixed-version: Fixed from version 5.19" | ||
3555 | |||
3556 | CVE_STATUS[CVE-2022-49661] = "fixed-version: Fixed from version 5.19" | ||
3557 | |||
3558 | CVE_STATUS[CVE-2022-49662] = "fixed-version: Fixed from version 5.19" | ||
3559 | |||
3560 | CVE_STATUS[CVE-2022-49663] = "fixed-version: Fixed from version 5.19" | ||
3561 | |||
3562 | CVE_STATUS[CVE-2022-49664] = "fixed-version: Fixed from version 5.19" | ||
3563 | |||
3564 | CVE_STATUS[CVE-2022-49665] = "fixed-version: Fixed from version 5.19" | ||
3565 | |||
3566 | CVE_STATUS[CVE-2022-49666] = "fixed-version: Fixed from version 5.19" | ||
3567 | |||
3568 | CVE_STATUS[CVE-2022-49667] = "fixed-version: Fixed from version 5.19" | ||
3569 | |||
3570 | CVE_STATUS[CVE-2022-49668] = "fixed-version: Fixed from version 5.19" | ||
3571 | |||
3572 | CVE_STATUS[CVE-2022-49669] = "fixed-version: Fixed from version 5.19" | ||
3573 | |||
3574 | CVE_STATUS[CVE-2022-49670] = "fixed-version: Fixed from version 5.19" | ||
3575 | |||
3576 | CVE_STATUS[CVE-2022-49671] = "fixed-version: Fixed from version 5.19" | ||
3577 | |||
3578 | CVE_STATUS[CVE-2022-49672] = "fixed-version: Fixed from version 5.19" | ||
3579 | |||
3580 | CVE_STATUS[CVE-2022-49673] = "fixed-version: Fixed from version 5.19" | ||
3581 | |||
3582 | CVE_STATUS[CVE-2022-49674] = "fixed-version: Fixed from version 5.19" | ||
3583 | |||
3584 | CVE_STATUS[CVE-2022-49675] = "fixed-version: Fixed from version 5.19" | ||
3585 | |||
3586 | CVE_STATUS[CVE-2022-49676] = "fixed-version: Fixed from version 5.19" | ||
3587 | |||
3588 | CVE_STATUS[CVE-2022-49677] = "fixed-version: Fixed from version 5.19" | ||
3589 | |||
3590 | CVE_STATUS[CVE-2022-49678] = "fixed-version: Fixed from version 5.19" | ||
3591 | |||
3592 | CVE_STATUS[CVE-2022-49679] = "fixed-version: Fixed from version 5.19" | ||
3593 | |||
3594 | CVE_STATUS[CVE-2022-49680] = "fixed-version: Fixed from version 5.19" | ||
3595 | |||
3596 | CVE_STATUS[CVE-2022-49681] = "fixed-version: Fixed from version 5.19" | ||
3597 | |||
3598 | CVE_STATUS[CVE-2022-49682] = "fixed-version: Fixed from version 5.19" | ||
3599 | |||
3600 | CVE_STATUS[CVE-2022-49683] = "fixed-version: Fixed from version 5.19" | ||
3601 | |||
3602 | CVE_STATUS[CVE-2022-49684] = "fixed-version: Fixed from version 5.19" | ||
3603 | |||
3604 | CVE_STATUS[CVE-2022-49685] = "fixed-version: Fixed from version 5.19" | ||
3605 | |||
3606 | CVE_STATUS[CVE-2022-49686] = "fixed-version: Fixed from version 5.19" | ||
3607 | |||
3608 | CVE_STATUS[CVE-2022-49687] = "fixed-version: Fixed from version 5.19" | ||
3609 | |||
3610 | CVE_STATUS[CVE-2022-49688] = "fixed-version: Fixed from version 5.19" | ||
3611 | |||
3612 | CVE_STATUS[CVE-2022-49691] = "fixed-version: Fixed from version 5.19" | ||
3613 | |||
3614 | CVE_STATUS[CVE-2022-49692] = "fixed-version: Fixed from version 5.19" | ||
3615 | |||
3616 | CVE_STATUS[CVE-2022-49693] = "fixed-version: Fixed from version 5.19" | ||
3617 | |||
3618 | CVE_STATUS[CVE-2022-49694] = "fixed-version: Fixed from version 5.19" | ||
3619 | |||
3620 | CVE_STATUS[CVE-2022-49695] = "fixed-version: Fixed from version 5.19" | ||
3621 | |||
3622 | CVE_STATUS[CVE-2022-49696] = "fixed-version: Fixed from version 5.19" | ||
3623 | |||
3624 | CVE_STATUS[CVE-2022-49697] = "fixed-version: Fixed from version 5.19" | ||
3625 | |||
3626 | CVE_STATUS[CVE-2022-49698] = "fixed-version: Fixed from version 5.19" | ||
3627 | |||
3628 | CVE_STATUS[CVE-2022-49699] = "fixed-version: Fixed from version 5.19" | ||
3629 | |||
3630 | CVE_STATUS[CVE-2022-49700] = "fixed-version: Fixed from version 5.19" | ||
3631 | |||
3632 | CVE_STATUS[CVE-2022-49701] = "fixed-version: Fixed from version 5.19" | ||
3633 | |||
3634 | CVE_STATUS[CVE-2022-49702] = "fixed-version: Fixed from version 5.19" | ||
3635 | |||
3636 | CVE_STATUS[CVE-2022-49703] = "fixed-version: Fixed from version 5.19" | ||
3637 | |||
3638 | CVE_STATUS[CVE-2022-49704] = "fixed-version: Fixed from version 5.19" | ||
3639 | |||
3640 | CVE_STATUS[CVE-2022-49705] = "fixed-version: Fixed from version 5.19" | ||
3641 | |||
3642 | CVE_STATUS[CVE-2022-49706] = "fixed-version: Fixed from version 5.19" | ||
3643 | |||
3644 | CVE_STATUS[CVE-2022-49707] = "fixed-version: Fixed from version 5.19" | ||
3645 | |||
3646 | CVE_STATUS[CVE-2022-49708] = "fixed-version: Fixed from version 5.19" | ||
3647 | |||
3648 | CVE_STATUS[CVE-2022-49709] = "fixed-version: Fixed from version 5.19" | ||
3649 | |||
3650 | CVE_STATUS[CVE-2022-49710] = "fixed-version: Fixed from version 5.19" | ||
3651 | |||
3652 | CVE_STATUS[CVE-2022-49711] = "fixed-version: Fixed from version 5.19" | ||
3653 | |||
3654 | CVE_STATUS[CVE-2022-49712] = "fixed-version: Fixed from version 5.19" | ||
3655 | |||
3656 | CVE_STATUS[CVE-2022-49713] = "fixed-version: Fixed from version 5.19" | ||
3657 | |||
3658 | CVE_STATUS[CVE-2022-49714] = "fixed-version: Fixed from version 5.19" | ||
3659 | |||
3660 | CVE_STATUS[CVE-2022-49715] = "fixed-version: Fixed from version 5.19" | ||
3661 | |||
3662 | CVE_STATUS[CVE-2022-49716] = "fixed-version: Fixed from version 5.19" | ||
3663 | |||
3664 | CVE_STATUS[CVE-2022-49717] = "fixed-version: Fixed from version 5.19" | ||
3665 | |||
3666 | CVE_STATUS[CVE-2022-49718] = "fixed-version: Fixed from version 5.19" | ||
3667 | |||
3668 | CVE_STATUS[CVE-2022-49719] = "fixed-version: Fixed from version 5.19" | ||
3669 | |||
3670 | CVE_STATUS[CVE-2022-49720] = "fixed-version: Fixed from version 5.19" | ||
3671 | |||
3672 | CVE_STATUS[CVE-2022-49721] = "fixed-version: Fixed from version 5.19" | ||
3673 | |||
3674 | CVE_STATUS[CVE-2022-49722] = "fixed-version: Fixed from version 5.19" | ||
3675 | |||
3676 | CVE_STATUS[CVE-2022-49723] = "fixed-version: Fixed from version 5.19" | ||
3677 | |||
3678 | CVE_STATUS[CVE-2022-49724] = "fixed-version: Fixed from version 5.19" | ||
3679 | |||
3680 | CVE_STATUS[CVE-2022-49725] = "fixed-version: Fixed from version 5.19" | ||
3681 | |||
3682 | CVE_STATUS[CVE-2022-49726] = "fixed-version: Fixed from version 5.19" | ||
3683 | |||
3684 | CVE_STATUS[CVE-2022-49727] = "fixed-version: Fixed from version 5.19" | ||
3685 | |||
3686 | CVE_STATUS[CVE-2022-49728] = "fixed-version: Fixed from version 5.19" | ||
3687 | |||
3688 | CVE_STATUS[CVE-2022-49729] = "fixed-version: Fixed from version 5.19" | ||
3689 | |||
3690 | CVE_STATUS[CVE-2022-49730] = "fixed-version: Fixed from version 5.19" | ||
3691 | |||
3692 | CVE_STATUS[CVE-2022-49731] = "fixed-version: Fixed from version 5.19" | ||
3693 | |||
3694 | CVE_STATUS[CVE-2022-49732] = "fixed-version: Fixed from version 5.19" | ||
3695 | |||
3696 | CVE_STATUS[CVE-2022-49733] = "fixed-version: Fixed from version 6.0" | ||
3697 | |||
3698 | CVE_STATUS[CVE-2022-49738] = "fixed-version: Fixed from version 6.2" | ||
3699 | |||
3700 | CVE_STATUS[CVE-2022-49739] = "fixed-version: Fixed from version 6.2" | ||
3701 | |||
3702 | CVE_STATUS[CVE-2022-49740] = "fixed-version: Fixed from version 6.2" | ||
3703 | |||
3704 | CVE_STATUS[CVE-2022-49741] = "fixed-version: Fixed from version 6.2" | ||
3705 | |||
3706 | CVE_STATUS[CVE-2022-49742] = "fixed-version: Fixed from version 6.2" | ||
3707 | |||
3708 | CVE_STATUS[CVE-2022-49743] = "fixed-version: Fixed from version 6.2" | ||
3709 | |||
3710 | CVE_STATUS[CVE-2022-49744] = "fixed-version: Fixed from version 6.2" | ||
3711 | |||
3712 | CVE_STATUS[CVE-2022-49745] = "fixed-version: Fixed from version 6.2" | ||
3713 | |||
3714 | CVE_STATUS[CVE-2022-49746] = "fixed-version: Fixed from version 6.2" | ||
3715 | |||
3716 | CVE_STATUS[CVE-2022-49747] = "fixed-version: Fixed from version 6.2" | ||
3717 | |||
3718 | CVE_STATUS[CVE-2022-49748] = "fixed-version: Fixed from version 6.2" | ||
3719 | |||
3720 | CVE_STATUS[CVE-2022-49749] = "fixed-version: Fixed from version 6.2" | ||
3721 | |||
3722 | CVE_STATUS[CVE-2022-49750] = "fixed-version: Fixed from version 6.2" | ||
3723 | |||
3724 | CVE_STATUS[CVE-2022-49751] = "fixed-version: Fixed from version 6.2" | ||
3725 | |||
3726 | CVE_STATUS[CVE-2022-49752] = "fixed-version: Fixed from version 6.2" | ||
3727 | |||
3728 | CVE_STATUS[CVE-2022-49753] = "fixed-version: Fixed from version 6.2" | ||
3729 | |||
3730 | CVE_STATUS[CVE-2022-49754] = "fixed-version: Fixed from version 6.2" | ||
3731 | |||
3732 | CVE_STATUS[CVE-2022-49755] = "fixed-version: Fixed from version 6.2" | ||
3733 | |||
3734 | CVE_STATUS[CVE-2022-49756] = "fixed-version: Fixed from version 6.2" | ||
3735 | |||
3736 | CVE_STATUS[CVE-2022-49757] = "fixed-version: Fixed from version 6.2" | ||
3737 | |||
3738 | CVE_STATUS[CVE-2022-49758] = "fixed-version: Fixed from version 6.2" | ||
3739 | |||
3740 | CVE_STATUS[CVE-2022-49759] = "fixed-version: Fixed from version 6.2" | ||
3741 | |||
3742 | CVE_STATUS[CVE-2022-49760] = "fixed-version: Fixed from version 6.2" | ||
3743 | |||
3744 | CVE_STATUS[CVE-2022-49761] = "fixed-version: Fixed from version 6.2" | ||
3745 | |||
3746 | CVE_STATUS[CVE-2022-49762] = "fixed-version: Fixed from version 6.1" | ||
3747 | |||
3748 | CVE_STATUS[CVE-2022-49763] = "fixed-version: Fixed from version 6.1" | ||
3749 | |||
3750 | CVE_STATUS[CVE-2022-49764] = "fixed-version: Fixed from version 6.1" | ||
3751 | |||
3752 | CVE_STATUS[CVE-2022-49765] = "fixed-version: Fixed from version 6.1" | ||
3753 | |||
3754 | CVE_STATUS[CVE-2022-49766] = "fixed-version: Fixed from version 6.1" | ||
3755 | |||
3756 | CVE_STATUS[CVE-2022-49767] = "fixed-version: Fixed from version 6.1" | ||
3757 | |||
3758 | CVE_STATUS[CVE-2022-49768] = "fixed-version: Fixed from version 6.1" | ||
3759 | |||
3760 | CVE_STATUS[CVE-2022-49769] = "fixed-version: Fixed from version 6.1" | ||
3761 | |||
3762 | CVE_STATUS[CVE-2022-49770] = "fixed-version: Fixed from version 6.1" | ||
3763 | |||
3764 | CVE_STATUS[CVE-2022-49771] = "fixed-version: Fixed from version 6.1" | ||
3765 | |||
3766 | CVE_STATUS[CVE-2022-49772] = "fixed-version: Fixed from version 6.1" | ||
3767 | |||
3768 | CVE_STATUS[CVE-2022-49773] = "fixed-version: Fixed from version 6.1" | ||
3769 | |||
3770 | CVE_STATUS[CVE-2022-49774] = "fixed-version: Fixed from version 6.1" | ||
3771 | |||
3772 | CVE_STATUS[CVE-2022-49775] = "fixed-version: Fixed from version 6.1" | ||
3773 | |||
3774 | CVE_STATUS[CVE-2022-49776] = "fixed-version: Fixed from version 6.1" | ||
3775 | |||
3776 | CVE_STATUS[CVE-2022-49777] = "fixed-version: Fixed from version 6.1" | ||
3777 | |||
3778 | CVE_STATUS[CVE-2022-49778] = "fixed-version: Fixed from version 6.1" | ||
3779 | |||
3780 | CVE_STATUS[CVE-2022-49779] = "fixed-version: Fixed from version 6.1" | ||
3781 | |||
3782 | CVE_STATUS[CVE-2022-49780] = "fixed-version: Fixed from version 6.1" | ||
3783 | |||
3784 | CVE_STATUS[CVE-2022-49781] = "fixed-version: Fixed from version 6.1" | ||
3785 | |||
3786 | CVE_STATUS[CVE-2022-49782] = "fixed-version: Fixed from version 6.0.10" | ||
3787 | |||
3788 | CVE_STATUS[CVE-2022-49783] = "fixed-version: Fixed from version 6.1" | ||
3789 | |||
3790 | CVE_STATUS[CVE-2022-49784] = "fixed-version: Fixed from version 6.1" | ||
3791 | |||
3792 | CVE_STATUS[CVE-2022-49785] = "fixed-version: Fixed from version 6.1" | ||
3793 | |||
3794 | CVE_STATUS[CVE-2022-49786] = "fixed-version: Fixed from version 6.1" | ||
3795 | |||
3796 | CVE_STATUS[CVE-2022-49787] = "fixed-version: Fixed from version 6.1" | ||
3797 | |||
3798 | CVE_STATUS[CVE-2022-49788] = "fixed-version: Fixed from version 6.1" | ||
3799 | |||
3800 | CVE_STATUS[CVE-2022-49789] = "fixed-version: Fixed from version 6.1" | ||
3801 | |||
3802 | CVE_STATUS[CVE-2022-49790] = "fixed-version: Fixed from version 6.1" | ||
3803 | |||
3804 | CVE_STATUS[CVE-2022-49791] = "fixed-version: Fixed from version 6.1" | ||
3805 | |||
3806 | CVE_STATUS[CVE-2022-49792] = "fixed-version: Fixed from version 6.1" | ||
3807 | |||
3808 | CVE_STATUS[CVE-2022-49793] = "fixed-version: Fixed from version 6.1" | ||
3809 | |||
3810 | CVE_STATUS[CVE-2022-49794] = "fixed-version: Fixed from version 6.1" | ||
3811 | |||
3812 | CVE_STATUS[CVE-2022-49795] = "fixed-version: Fixed from version 6.1" | ||
3813 | |||
3814 | CVE_STATUS[CVE-2022-49796] = "fixed-version: Fixed from version 6.1" | ||
3815 | |||
3816 | CVE_STATUS[CVE-2022-49797] = "fixed-version: Fixed from version 6.1" | ||
3817 | |||
3818 | CVE_STATUS[CVE-2022-49798] = "fixed-version: Fixed from version 6.1" | ||
3819 | |||
3820 | CVE_STATUS[CVE-2022-49799] = "fixed-version: Fixed from version 6.1" | ||
3821 | |||
3822 | CVE_STATUS[CVE-2022-49800] = "fixed-version: Fixed from version 6.1" | ||
3823 | |||
3824 | CVE_STATUS[CVE-2022-49801] = "fixed-version: Fixed from version 6.1" | ||
3825 | |||
3826 | CVE_STATUS[CVE-2022-49802] = "fixed-version: Fixed from version 6.1" | ||
3827 | |||
3828 | CVE_STATUS[CVE-2022-49803] = "fixed-version: Fixed from version 6.1" | ||
3829 | |||
3830 | CVE_STATUS[CVE-2022-49804] = "fixed-version: Fixed from version 6.1" | ||
3831 | |||
3832 | CVE_STATUS[CVE-2022-49805] = "fixed-version: Fixed from version 6.1" | ||
3833 | |||
3834 | CVE_STATUS[CVE-2022-49806] = "fixed-version: Fixed from version 6.1" | ||
3835 | |||
3836 | CVE_STATUS[CVE-2022-49807] = "fixed-version: Fixed from version 6.1" | ||
3837 | |||
3838 | CVE_STATUS[CVE-2022-49808] = "fixed-version: Fixed from version 6.1" | ||
3839 | |||
3840 | CVE_STATUS[CVE-2022-49809] = "fixed-version: Fixed from version 6.1" | ||
3841 | |||
3842 | CVE_STATUS[CVE-2022-49810] = "fixed-version: Fixed from version 6.1" | ||
3843 | |||
3844 | CVE_STATUS[CVE-2022-49811] = "fixed-version: Fixed from version 6.1" | ||
3845 | |||
3846 | CVE_STATUS[CVE-2022-49812] = "fixed-version: Fixed from version 6.1" | ||
3847 | |||
3848 | CVE_STATUS[CVE-2022-49813] = "fixed-version: Fixed from version 6.1" | ||
3849 | |||
3850 | CVE_STATUS[CVE-2022-49814] = "fixed-version: Fixed from version 6.1" | ||
3851 | |||
3852 | CVE_STATUS[CVE-2022-49815] = "fixed-version: Fixed from version 6.1" | ||
3853 | |||
3854 | CVE_STATUS[CVE-2022-49817] = "fixed-version: Fixed from version 6.1" | ||
3855 | |||
3856 | CVE_STATUS[CVE-2022-49818] = "fixed-version: Fixed from version 6.0.10" | ||
3857 | |||
3858 | CVE_STATUS[CVE-2022-49819] = "fixed-version: Fixed from version 6.1" | ||
3859 | |||
3860 | CVE_STATUS[CVE-2022-49820] = "fixed-version: Fixed from version 6.1" | ||
3861 | |||
3862 | CVE_STATUS[CVE-2022-49821] = "fixed-version: Fixed from version 6.1" | ||
3863 | |||
3864 | CVE_STATUS[CVE-2022-49822] = "fixed-version: Fixed from version 6.1" | ||
3865 | |||
3866 | CVE_STATUS[CVE-2022-49823] = "fixed-version: Fixed from version 6.1" | ||
3867 | |||
3868 | CVE_STATUS[CVE-2022-49824] = "fixed-version: Fixed from version 6.1" | ||
3869 | |||
3870 | CVE_STATUS[CVE-2022-49825] = "fixed-version: Fixed from version 6.1" | ||
3871 | |||
3872 | CVE_STATUS[CVE-2022-49826] = "fixed-version: Fixed from version 6.1" | ||
3873 | |||
3874 | CVE_STATUS[CVE-2022-49827] = "fixed-version: Fixed from version 6.1" | ||
3875 | |||
3876 | CVE_STATUS[CVE-2022-49828] = "fixed-version: Fixed from version 6.1" | ||
3877 | |||
3878 | CVE_STATUS[CVE-2022-49829] = "fixed-version: Fixed from version 6.1" | ||
3879 | |||
3880 | CVE_STATUS[CVE-2022-49830] = "fixed-version: Fixed from version 6.1" | ||
3881 | |||
3882 | CVE_STATUS[CVE-2022-49831] = "fixed-version: Fixed from version 6.1" | ||
3883 | |||
3884 | CVE_STATUS[CVE-2022-49832] = "fixed-version: Fixed from version 6.1" | ||
3885 | |||
3886 | CVE_STATUS[CVE-2022-49833] = "fixed-version: Fixed from version 6.1" | ||
3887 | |||
3888 | CVE_STATUS[CVE-2022-49834] = "fixed-version: Fixed from version 6.1" | ||
3889 | |||
3890 | CVE_STATUS[CVE-2022-49835] = "fixed-version: Fixed from version 6.1" | ||
3891 | |||
3892 | CVE_STATUS[CVE-2022-49836] = "fixed-version: Fixed from version 6.1" | ||
3893 | |||
3894 | CVE_STATUS[CVE-2022-49837] = "fixed-version: Fixed from version 6.1" | ||
3895 | |||
3896 | CVE_STATUS[CVE-2022-49838] = "fixed-version: Fixed from version 6.1" | ||
3897 | |||
3898 | CVE_STATUS[CVE-2022-49839] = "fixed-version: Fixed from version 6.1" | ||
3899 | |||
3900 | CVE_STATUS[CVE-2022-49840] = "fixed-version: Fixed from version 6.1" | ||
3901 | |||
3902 | CVE_STATUS[CVE-2022-49841] = "fixed-version: Fixed from version 6.1" | ||
3903 | |||
3904 | CVE_STATUS[CVE-2022-49842] = "fixed-version: Fixed from version 6.1" | ||
3905 | |||
3906 | CVE_STATUS[CVE-2022-49844] = "fixed-version: Fixed from version 6.1" | ||
3907 | |||
3908 | CVE_STATUS[CVE-2022-49845] = "fixed-version: Fixed from version 6.1" | ||
3909 | |||
3910 | CVE_STATUS[CVE-2022-49846] = "fixed-version: Fixed from version 6.1" | ||
3911 | |||
3912 | CVE_STATUS[CVE-2022-49847] = "fixed-version: Fixed from version 6.1" | ||
3913 | |||
3914 | CVE_STATUS[CVE-2022-49848] = "fixed-version: Fixed from version 6.1" | ||
3915 | |||
3916 | CVE_STATUS[CVE-2022-49849] = "fixed-version: Fixed from version 6.1" | ||
3917 | |||
3918 | CVE_STATUS[CVE-2022-49850] = "fixed-version: Fixed from version 6.1" | ||
3919 | |||
3920 | CVE_STATUS[CVE-2022-49851] = "fixed-version: Fixed from version 6.1" | ||
3921 | |||
3922 | CVE_STATUS[CVE-2022-49852] = "fixed-version: Fixed from version 6.1" | ||
3923 | |||
3924 | CVE_STATUS[CVE-2022-49853] = "fixed-version: Fixed from version 6.1" | ||
3925 | |||
3926 | CVE_STATUS[CVE-2022-49854] = "fixed-version: Fixed from version 6.1" | ||
3927 | |||
3928 | CVE_STATUS[CVE-2022-49855] = "fixed-version: Fixed from version 6.1" | ||
3929 | |||
3930 | CVE_STATUS[CVE-2022-49857] = "fixed-version: Fixed from version 6.1" | ||
3931 | |||
3932 | CVE_STATUS[CVE-2022-49858] = "fixed-version: Fixed from version 6.1" | ||
3933 | |||
3934 | CVE_STATUS[CVE-2022-49859] = "fixed-version: Fixed from version 6.1" | ||
3935 | |||
3936 | CVE_STATUS[CVE-2022-49860] = "fixed-version: Fixed from version 6.1" | ||
3937 | |||
3938 | CVE_STATUS[CVE-2022-49861] = "fixed-version: Fixed from version 6.1" | ||
3939 | |||
3940 | CVE_STATUS[CVE-2022-49862] = "fixed-version: Fixed from version 6.1" | ||
3941 | |||
3942 | CVE_STATUS[CVE-2022-49863] = "fixed-version: Fixed from version 6.1" | ||
3943 | |||
3944 | CVE_STATUS[CVE-2022-49864] = "fixed-version: Fixed from version 6.1" | ||
3945 | |||
3946 | CVE_STATUS[CVE-2022-49865] = "fixed-version: Fixed from version 6.1" | ||
3947 | |||
3948 | CVE_STATUS[CVE-2022-49866] = "fixed-version: Fixed from version 6.1" | ||
3949 | |||
3950 | CVE_STATUS[CVE-2022-49867] = "fixed-version: Fixed from version 6.1" | ||
3951 | |||
3952 | CVE_STATUS[CVE-2022-49868] = "fixed-version: Fixed from version 6.1" | ||
3953 | |||
3954 | CVE_STATUS[CVE-2022-49869] = "fixed-version: Fixed from version 6.1" | ||
3955 | |||
3956 | CVE_STATUS[CVE-2022-49870] = "fixed-version: Fixed from version 6.1" | ||
3957 | |||
3958 | CVE_STATUS[CVE-2022-49871] = "fixed-version: Fixed from version 6.1" | ||
3959 | |||
3960 | CVE_STATUS[CVE-2022-49872] = "fixed-version: Fixed from version 6.1" | ||
3961 | |||
3962 | CVE_STATUS[CVE-2022-49873] = "fixed-version: Fixed from version 6.1" | ||
3963 | |||
3964 | CVE_STATUS[CVE-2022-49874] = "fixed-version: Fixed from version 6.1" | ||
3965 | |||
3966 | CVE_STATUS[CVE-2022-49875] = "fixed-version: Fixed from version 6.1" | ||
3967 | |||
3968 | CVE_STATUS[CVE-2022-49876] = "fixed-version: Fixed from version 6.1" | ||
3969 | |||
3970 | CVE_STATUS[CVE-2022-49877] = "fixed-version: Fixed from version 6.1" | ||
3971 | |||
3972 | CVE_STATUS[CVE-2022-49878] = "fixed-version: Fixed from version 6.1" | ||
3973 | |||
3974 | CVE_STATUS[CVE-2022-49879] = "fixed-version: Fixed from version 6.1" | ||
3975 | |||
3976 | CVE_STATUS[CVE-2022-49880] = "fixed-version: Fixed from version 6.1" | ||
3977 | |||
3978 | CVE_STATUS[CVE-2022-49881] = "fixed-version: Fixed from version 6.1" | ||
3979 | |||
3980 | CVE_STATUS[CVE-2022-49882] = "fixed-version: Fixed from version 6.1" | ||
3981 | |||
3982 | CVE_STATUS[CVE-2022-49883] = "fixed-version: Fixed from version 6.1" | ||
3983 | |||
3984 | CVE_STATUS[CVE-2022-49884] = "fixed-version: Fixed from version 6.1" | ||
3985 | |||
3986 | CVE_STATUS[CVE-2022-49885] = "fixed-version: Fixed from version 6.1" | ||
3987 | |||
3988 | CVE_STATUS[CVE-2022-49886] = "fixed-version: Fixed from version 6.1" | ||
3989 | |||
3990 | CVE_STATUS[CVE-2022-49887] = "fixed-version: Fixed from version 6.1" | ||
3991 | |||
3992 | CVE_STATUS[CVE-2022-49888] = "fixed-version: Fixed from version 6.1" | ||
3993 | |||
3994 | CVE_STATUS[CVE-2022-49889] = "fixed-version: Fixed from version 6.0.8" | ||
3995 | |||
3996 | CVE_STATUS[CVE-2022-49890] = "fixed-version: Fixed from version 6.1" | ||
3997 | |||
3998 | CVE_STATUS[CVE-2022-49891] = "fixed-version: Fixed from version 6.1" | ||
3999 | |||
4000 | CVE_STATUS[CVE-2022-49892] = "fixed-version: Fixed from version 6.1" | ||
4001 | |||
4002 | CVE_STATUS[CVE-2022-49893] = "fixed-version: Fixed from version 6.1" | ||
4003 | |||
4004 | CVE_STATUS[CVE-2022-49894] = "fixed-version: Fixed from version 6.1" | ||
4005 | |||
4006 | CVE_STATUS[CVE-2022-49895] = "fixed-version: Fixed from version 6.1" | ||
4007 | |||
4008 | CVE_STATUS[CVE-2022-49896] = "fixed-version: Fixed from version 6.1" | ||
4009 | |||
4010 | CVE_STATUS[CVE-2022-49898] = "fixed-version: Fixed from version 6.1" | ||
4011 | |||
4012 | CVE_STATUS[CVE-2022-49899] = "fixed-version: Fixed from version 6.1" | ||
4013 | |||
4014 | CVE_STATUS[CVE-2022-49900] = "fixed-version: Fixed from version 6.1" | ||
4015 | |||
4016 | CVE_STATUS[CVE-2022-49901] = "fixed-version: Fixed from version 6.1" | ||
4017 | |||
4018 | CVE_STATUS[CVE-2022-49902] = "fixed-version: Fixed from version 6.1" | ||
4019 | |||
4020 | CVE_STATUS[CVE-2022-49903] = "fixed-version: Fixed from version 6.1" | ||
4021 | |||
4022 | CVE_STATUS[CVE-2022-49904] = "fixed-version: Fixed from version 6.1" | ||
4023 | |||
4024 | CVE_STATUS[CVE-2022-49905] = "fixed-version: Fixed from version 6.1" | ||
4025 | |||
4026 | CVE_STATUS[CVE-2022-49906] = "fixed-version: Fixed from version 6.1" | ||
4027 | |||
4028 | CVE_STATUS[CVE-2022-49907] = "fixed-version: Fixed from version 6.1" | ||
4029 | |||
4030 | CVE_STATUS[CVE-2022-49908] = "fixed-version: Fixed from version 6.1" | ||
4031 | |||
4032 | CVE_STATUS[CVE-2022-49909] = "fixed-version: Fixed from version 6.1" | ||
4033 | |||
4034 | CVE_STATUS[CVE-2022-49910] = "fixed-version: Fixed from version 6.1" | ||
4035 | |||
4036 | CVE_STATUS[CVE-2022-49911] = "fixed-version: Fixed from version 6.1" | ||
4037 | |||
4038 | CVE_STATUS[CVE-2022-49912] = "fixed-version: Fixed from version 6.1" | ||
4039 | |||
4040 | CVE_STATUS[CVE-2022-49913] = "fixed-version: Fixed from version 6.1" | ||
4041 | |||
4042 | CVE_STATUS[CVE-2022-49914] = "fixed-version: Fixed from version 6.1" | ||
4043 | |||
4044 | CVE_STATUS[CVE-2022-49915] = "fixed-version: Fixed from version 6.1" | ||
4045 | |||
4046 | CVE_STATUS[CVE-2022-49916] = "fixed-version: Fixed from version 6.1" | ||
4047 | |||
4048 | CVE_STATUS[CVE-2022-49917] = "fixed-version: Fixed from version 6.1" | ||
4049 | |||
4050 | CVE_STATUS[CVE-2022-49918] = "fixed-version: Fixed from version 6.1" | ||
4051 | |||
4052 | CVE_STATUS[CVE-2022-49919] = "fixed-version: Fixed from version 6.1" | ||
4053 | |||
4054 | CVE_STATUS[CVE-2022-49920] = "fixed-version: Fixed from version 6.1" | ||
4055 | |||
4056 | CVE_STATUS[CVE-2022-49921] = "fixed-version: Fixed from version 6.1" | ||
4057 | |||
4058 | CVE_STATUS[CVE-2022-49922] = "fixed-version: Fixed from version 6.1" | ||
4059 | |||
4060 | CVE_STATUS[CVE-2022-49923] = "fixed-version: Fixed from version 6.1" | ||
4061 | |||
4062 | CVE_STATUS[CVE-2022-49924] = "fixed-version: Fixed from version 6.1" | ||
4063 | |||
4064 | CVE_STATUS[CVE-2022-49925] = "fixed-version: Fixed from version 6.1" | ||
4065 | |||
4066 | CVE_STATUS[CVE-2022-49926] = "fixed-version: Fixed from version 6.1" | ||
4067 | |||
4068 | CVE_STATUS[CVE-2022-49927] = "fixed-version: Fixed from version 6.1" | ||
4069 | |||
4070 | CVE_STATUS[CVE-2022-49928] = "fixed-version: Fixed from version 6.1" | ||
4071 | |||
4072 | CVE_STATUS[CVE-2022-49929] = "fixed-version: Fixed from version 6.1" | ||
4073 | |||
4074 | CVE_STATUS[CVE-2022-49930] = "fixed-version: Fixed from version 6.1" | ||
4075 | |||
4076 | CVE_STATUS[CVE-2022-49931] = "fixed-version: Fixed from version 6.1" | ||
4077 | |||
4078 | CVE_STATUS[CVE-2022-49932] = "fixed-version: Fixed from version 6.3" | ||
4079 | |||
4080 | # CVE-2023-34319 has no known resolution | ||
4081 | |||
4082 | # CVE-2023-34324 has no known resolution | ||
4083 | |||
4084 | # CVE-2023-46838 has no known resolution | ||
4085 | |||
4086 | CVE_STATUS[CVE-2023-52433] = "fixed-version: Fixed from version 6.6" | ||
4087 | |||
4088 | CVE_STATUS[CVE-2023-52434] = "fixed-version: Fixed from version 6.7" | ||
4089 | |||
4090 | CVE_STATUS[CVE-2023-52435] = "fixed-version: Fixed from version 6.7" | ||
4091 | |||
4092 | CVE_STATUS[CVE-2023-52436] = "fixed-version: Fixed from version 6.8" | ||
4093 | |||
4094 | CVE_STATUS[CVE-2023-52438] = "fixed-version: Fixed from version 6.8" | ||
4095 | |||
4096 | CVE_STATUS[CVE-2023-52439] = "fixed-version: Fixed from version 6.8" | ||
4097 | |||
4098 | CVE_STATUS[CVE-2023-52440] = "fixed-version: Fixed from version 6.6" | ||
4099 | |||
4100 | CVE_STATUS[CVE-2023-52441] = "fixed-version: Fixed from version 6.5" | ||
4101 | |||
4102 | CVE_STATUS[CVE-2023-52442] = "fixed-version: Fixed from version 6.5" | ||
4103 | |||
4104 | CVE_STATUS[CVE-2023-52443] = "fixed-version: Fixed from version 6.8" | ||
4105 | |||
4106 | CVE_STATUS[CVE-2023-52444] = "fixed-version: Fixed from version 6.8" | ||
4107 | |||
4108 | CVE_STATUS[CVE-2023-52445] = "fixed-version: Fixed from version 6.8" | ||
4109 | |||
4110 | CVE_STATUS[CVE-2023-52446] = "fixed-version: Fixed from version 6.8" | ||
4111 | |||
4112 | CVE_STATUS[CVE-2023-52447] = "fixed-version: Fixed from version 6.8" | ||
4113 | |||
4114 | CVE_STATUS[CVE-2023-52448] = "fixed-version: Fixed from version 6.8" | ||
4115 | |||
4116 | CVE_STATUS[CVE-2023-52449] = "fixed-version: Fixed from version 6.8" | ||
4117 | |||
4118 | CVE_STATUS[CVE-2023-52450] = "fixed-version: Fixed from version 6.8" | ||
4119 | |||
4120 | CVE_STATUS[CVE-2023-52451] = "fixed-version: Fixed from version 6.8" | ||
4121 | |||
4122 | CVE_STATUS[CVE-2023-52452] = "fixed-version: Fixed from version 6.8" | ||
4123 | |||
4124 | CVE_STATUS[CVE-2023-52453] = "fixed-version: Fixed from version 6.8" | ||
4125 | |||
4126 | CVE_STATUS[CVE-2023-52454] = "fixed-version: Fixed from version 6.8" | ||
4127 | |||
4128 | CVE_STATUS[CVE-2023-52455] = "fixed-version: Fixed from version 6.8" | ||
4129 | |||
4130 | CVE_STATUS[CVE-2023-52456] = "fixed-version: Fixed from version 6.8" | ||
4131 | |||
4132 | CVE_STATUS[CVE-2023-52457] = "fixed-version: Fixed from version 6.8" | ||
4133 | |||
4134 | CVE_STATUS[CVE-2023-52458] = "fixed-version: Fixed from version 6.8" | ||
4135 | |||
4136 | CVE_STATUS[CVE-2023-52459] = "fixed-version: Fixed from version 6.8" | ||
4137 | |||
4138 | CVE_STATUS[CVE-2023-52460] = "fixed-version: Fixed from version 6.8" | ||
4139 | |||
4140 | CVE_STATUS[CVE-2023-52461] = "fixed-version: Fixed from version 6.8" | ||
4141 | |||
4142 | CVE_STATUS[CVE-2023-52462] = "fixed-version: Fixed from version 6.8" | ||
4143 | |||
4144 | CVE_STATUS[CVE-2023-52463] = "fixed-version: Fixed from version 6.8" | ||
4145 | |||
4146 | CVE_STATUS[CVE-2023-52464] = "fixed-version: Fixed from version 6.8" | ||
4147 | |||
4148 | CVE_STATUS[CVE-2023-52465] = "fixed-version: Fixed from version 6.8" | ||
4149 | |||
4150 | CVE_STATUS[CVE-2023-52467] = "fixed-version: Fixed from version 6.8" | ||
4151 | |||
4152 | CVE_STATUS[CVE-2023-52468] = "fixed-version: Fixed from version 6.8" | ||
4153 | |||
4154 | CVE_STATUS[CVE-2023-52469] = "fixed-version: Fixed from version 6.8" | ||
4155 | |||
4156 | CVE_STATUS[CVE-2023-52470] = "fixed-version: Fixed from version 6.8" | ||
4157 | |||
4158 | CVE_STATUS[CVE-2023-52471] = "fixed-version: Fixed from version 6.8" | ||
4159 | |||
4160 | CVE_STATUS[CVE-2023-52472] = "fixed-version: Fixed from version 6.8" | ||
4161 | |||
4162 | CVE_STATUS[CVE-2023-52473] = "fixed-version: Fixed from version 6.8" | ||
4163 | |||
4164 | CVE_STATUS[CVE-2023-52474] = "fixed-version: Fixed from version 6.4" | ||
4165 | |||
4166 | CVE_STATUS[CVE-2023-52475] = "fixed-version: Fixed from version 6.6" | ||
4167 | |||
4168 | CVE_STATUS[CVE-2023-52476] = "fixed-version: Fixed from version 6.6" | ||
4169 | |||
4170 | CVE_STATUS[CVE-2023-52477] = "fixed-version: Fixed from version 6.6" | ||
4171 | |||
4172 | CVE_STATUS[CVE-2023-52478] = "fixed-version: Fixed from version 6.6" | ||
4173 | |||
4174 | CVE_STATUS[CVE-2023-52479] = "fixed-version: Fixed from version 6.6" | ||
4175 | |||
4176 | CVE_STATUS[CVE-2023-52480] = "fixed-version: Fixed from version 6.6" | ||
4177 | |||
4178 | CVE_STATUS[CVE-2023-52481] = "fixed-version: Fixed from version 6.6" | ||
4179 | |||
4180 | CVE_STATUS[CVE-2023-52482] = "fixed-version: Fixed from version 6.6" | ||
4181 | |||
4182 | CVE_STATUS[CVE-2023-52483] = "fixed-version: Fixed from version 6.6" | ||
4183 | |||
4184 | CVE_STATUS[CVE-2023-52484] = "fixed-version: Fixed from version 6.6" | ||
4185 | |||
4186 | CVE_STATUS[CVE-2023-52485] = "fixed-version: Fixed from version 6.8" | ||
4187 | |||
4188 | CVE_STATUS[CVE-2023-52486] = "fixed-version: Fixed from version 6.8" | ||
4189 | |||
4190 | CVE_STATUS[CVE-2023-52487] = "fixed-version: Fixed from version 6.8" | ||
4191 | |||
4192 | CVE_STATUS[CVE-2023-52488] = "fixed-version: Fixed from version 6.8" | ||
4193 | |||
4194 | CVE_STATUS[CVE-2023-52489] = "fixed-version: Fixed from version 6.8" | ||
4195 | |||
4196 | CVE_STATUS[CVE-2023-52490] = "fixed-version: Fixed from version 6.8" | ||
4197 | |||
4198 | CVE_STATUS[CVE-2023-52491] = "fixed-version: Fixed from version 6.8" | ||
4199 | |||
4200 | CVE_STATUS[CVE-2023-52492] = "fixed-version: Fixed from version 6.8" | ||
4201 | |||
4202 | CVE_STATUS[CVE-2023-52493] = "fixed-version: Fixed from version 6.8" | ||
4203 | |||
4204 | CVE_STATUS[CVE-2023-52494] = "fixed-version: Fixed from version 6.8" | ||
4205 | |||
4206 | CVE_STATUS[CVE-2023-52495] = "fixed-version: Fixed from version 6.8" | ||
4207 | |||
4208 | CVE_STATUS[CVE-2023-52497] = "fixed-version: Fixed from version 6.8" | ||
4209 | |||
4210 | CVE_STATUS[CVE-2023-52498] = "fixed-version: Fixed from version 6.8" | ||
4211 | |||
4212 | CVE_STATUS[CVE-2023-52499] = "fixed-version: Fixed from version 6.6" | ||
4213 | |||
4214 | CVE_STATUS[CVE-2023-52500] = "fixed-version: Fixed from version 6.6" | ||
4215 | |||
4216 | CVE_STATUS[CVE-2023-52501] = "fixed-version: Fixed from version 6.6" | ||
4217 | |||
4218 | CVE_STATUS[CVE-2023-52502] = "fixed-version: Fixed from version 6.6" | ||
4219 | |||
4220 | CVE_STATUS[CVE-2023-52503] = "fixed-version: Fixed from version 6.6" | ||
4221 | |||
4222 | CVE_STATUS[CVE-2023-52504] = "fixed-version: Fixed from version 6.6" | ||
4223 | |||
4224 | CVE_STATUS[CVE-2023-52505] = "fixed-version: Fixed from version 6.6" | ||
4225 | |||
4226 | CVE_STATUS[CVE-2023-52506] = "fixed-version: Fixed from version 6.6" | ||
4227 | |||
4228 | CVE_STATUS[CVE-2023-52507] = "fixed-version: Fixed from version 6.6" | ||
4229 | |||
4230 | CVE_STATUS[CVE-2023-52508] = "fixed-version: Fixed from version 6.6" | ||
4231 | |||
4232 | CVE_STATUS[CVE-2023-52509] = "fixed-version: Fixed from version 6.6" | ||
4233 | |||
4234 | CVE_STATUS[CVE-2023-52510] = "fixed-version: Fixed from version 6.6" | ||
4235 | |||
4236 | CVE_STATUS[CVE-2023-52511] = "fixed-version: Fixed from version 6.6" | ||
4237 | |||
4238 | CVE_STATUS[CVE-2023-52512] = "fixed-version: Fixed from version 6.6" | ||
4239 | |||
4240 | CVE_STATUS[CVE-2023-52513] = "fixed-version: Fixed from version 6.6" | ||
4241 | |||
4242 | CVE_STATUS[CVE-2023-52515] = "fixed-version: Fixed from version 6.6" | ||
4243 | |||
4244 | CVE_STATUS[CVE-2023-52516] = "fixed-version: Fixed from version 6.6" | ||
4245 | |||
4246 | CVE_STATUS[CVE-2023-52517] = "fixed-version: Fixed from version 6.6" | ||
4247 | |||
4248 | CVE_STATUS[CVE-2023-52518] = "fixed-version: Fixed from version 6.6" | ||
4249 | |||
4250 | CVE_STATUS[CVE-2023-52519] = "fixed-version: Fixed from version 6.6" | ||
4251 | |||
4252 | CVE_STATUS[CVE-2023-52520] = "fixed-version: Fixed from version 6.6" | ||
4253 | |||
4254 | CVE_STATUS[CVE-2023-52522] = "fixed-version: Fixed from version 6.6" | ||
4255 | |||
4256 | CVE_STATUS[CVE-2023-52523] = "fixed-version: Fixed from version 6.6" | ||
4257 | |||
4258 | CVE_STATUS[CVE-2023-52524] = "fixed-version: Fixed from version 6.6" | ||
4259 | |||
4260 | CVE_STATUS[CVE-2023-52525] = "fixed-version: Fixed from version 6.5.7" | ||
4261 | |||
4262 | CVE_STATUS[CVE-2023-52526] = "fixed-version: Fixed from version 6.6" | ||
4263 | |||
4264 | CVE_STATUS[CVE-2023-52527] = "fixed-version: Fixed from version 6.6" | ||
4265 | |||
4266 | CVE_STATUS[CVE-2023-52528] = "fixed-version: Fixed from version 6.6" | ||
4267 | |||
4268 | CVE_STATUS[CVE-2023-52529] = "fixed-version: Fixed from version 6.6" | ||
4269 | |||
4270 | CVE_STATUS[CVE-2023-52530] = "fixed-version: Fixed from version 6.6" | ||
4271 | |||
4272 | CVE_STATUS[CVE-2023-52531] = "fixed-version: Fixed from version 6.6" | ||
4273 | |||
4274 | CVE_STATUS[CVE-2023-52532] = "fixed-version: Fixed from version 6.6" | ||
4275 | |||
4276 | CVE_STATUS[CVE-2023-52559] = "fixed-version: Fixed from version 6.6" | ||
4277 | |||
4278 | CVE_STATUS[CVE-2023-52560] = "fixed-version: Fixed from version 6.6" | ||
4279 | |||
4280 | CVE_STATUS[CVE-2023-52561] = "fixed-version: Fixed from version 6.6" | ||
4281 | |||
4282 | CVE_STATUS[CVE-2023-52562] = "fixed-version: Fixed from version 6.6" | ||
4283 | |||
4284 | CVE_STATUS[CVE-2023-52563] = "fixed-version: Fixed from version 6.6" | ||
4285 | |||
4286 | CVE_STATUS[CVE-2023-52564] = "fixed-version: Fixed from version 6.6" | ||
4287 | |||
4288 | CVE_STATUS[CVE-2023-52565] = "fixed-version: Fixed from version 6.6" | ||
4289 | |||
4290 | CVE_STATUS[CVE-2023-52566] = "fixed-version: Fixed from version 6.6" | ||
4291 | |||
4292 | CVE_STATUS[CVE-2023-52567] = "fixed-version: Fixed from version 6.6" | ||
4293 | |||
4294 | CVE_STATUS[CVE-2023-52568] = "fixed-version: Fixed from version 6.6" | ||
4295 | |||
4296 | CVE_STATUS[CVE-2023-52569] = "fixed-version: Fixed from version 6.6" | ||
4297 | |||
4298 | CVE_STATUS[CVE-2023-52570] = "fixed-version: Fixed from version 6.6" | ||
4299 | |||
4300 | CVE_STATUS[CVE-2023-52571] = "fixed-version: Fixed from version 6.6" | ||
4301 | |||
4302 | CVE_STATUS[CVE-2023-52572] = "fixed-version: Fixed from version 6.6" | ||
4303 | |||
4304 | CVE_STATUS[CVE-2023-52573] = "fixed-version: Fixed from version 6.6" | ||
4305 | |||
4306 | CVE_STATUS[CVE-2023-52574] = "fixed-version: Fixed from version 6.6" | ||
4307 | |||
4308 | CVE_STATUS[CVE-2023-52576] = "fixed-version: Fixed from version 6.6" | ||
4309 | |||
4310 | CVE_STATUS[CVE-2023-52577] = "fixed-version: Fixed from version 6.5.6" | ||
4311 | |||
4312 | CVE_STATUS[CVE-2023-52578] = "fixed-version: Fixed from version 6.6" | ||
4313 | |||
4314 | CVE_STATUS[CVE-2023-52580] = "fixed-version: Fixed from version 6.6" | ||
4315 | |||
4316 | CVE_STATUS[CVE-2023-52581] = "fixed-version: Fixed from version 6.6" | ||
4317 | |||
4318 | CVE_STATUS[CVE-2023-52582] = "fixed-version: Fixed from version 6.6" | ||
4319 | |||
4320 | CVE_STATUS[CVE-2023-52583] = "fixed-version: Fixed from version 6.8" | ||
4321 | |||
4322 | CVE_STATUS[CVE-2023-52584] = "fixed-version: Fixed from version 6.8" | ||
4323 | |||
4324 | CVE_STATUS[CVE-2023-52585] = "fixed-version: Fixed from version 6.8" | ||
4325 | |||
4326 | CVE_STATUS[CVE-2023-52586] = "fixed-version: Fixed from version 6.8" | ||
4327 | |||
4328 | CVE_STATUS[CVE-2023-52587] = "fixed-version: Fixed from version 6.8" | ||
4329 | |||
4330 | CVE_STATUS[CVE-2023-52588] = "fixed-version: Fixed from version 6.8" | ||
4331 | |||
4332 | CVE_STATUS[CVE-2023-52589] = "fixed-version: Fixed from version 6.8" | ||
4333 | |||
4334 | CVE_STATUS[CVE-2023-52590] = "fixed-version: Fixed from version 6.8" | ||
4335 | |||
4336 | CVE_STATUS[CVE-2023-52591] = "fixed-version: Fixed from version 6.8" | ||
4337 | |||
4338 | CVE_STATUS[CVE-2023-52593] = "fixed-version: Fixed from version 6.8" | ||
4339 | |||
4340 | CVE_STATUS[CVE-2023-52594] = "fixed-version: Fixed from version 6.8" | ||
4341 | |||
4342 | CVE_STATUS[CVE-2023-52595] = "fixed-version: Fixed from version 6.8" | ||
4343 | |||
4344 | CVE_STATUS[CVE-2023-52596] = "fixed-version: Fixed from version 6.8" | ||
4345 | |||
4346 | CVE_STATUS[CVE-2023-52597] = "fixed-version: Fixed from version 6.8" | ||
4347 | |||
4348 | CVE_STATUS[CVE-2023-52598] = "fixed-version: Fixed from version 6.8" | ||
4349 | |||
4350 | CVE_STATUS[CVE-2023-52599] = "fixed-version: Fixed from version 6.8" | ||
4351 | |||
4352 | CVE_STATUS[CVE-2023-52600] = "fixed-version: Fixed from version 6.8" | ||
4353 | |||
4354 | CVE_STATUS[CVE-2023-52601] = "fixed-version: Fixed from version 6.8" | ||
4355 | |||
4356 | CVE_STATUS[CVE-2023-52602] = "fixed-version: Fixed from version 6.8" | ||
4357 | |||
4358 | CVE_STATUS[CVE-2023-52603] = "fixed-version: Fixed from version 6.8" | ||
4359 | |||
4360 | CVE_STATUS[CVE-2023-52604] = "fixed-version: Fixed from version 6.8" | ||
4361 | |||
4362 | CVE_STATUS[CVE-2023-52606] = "fixed-version: Fixed from version 6.8" | ||
4363 | |||
4364 | CVE_STATUS[CVE-2023-52607] = "fixed-version: Fixed from version 6.8" | ||
4365 | |||
4366 | CVE_STATUS[CVE-2023-52608] = "fixed-version: Fixed from version 6.8" | ||
4367 | |||
4368 | CVE_STATUS[CVE-2023-52609] = "fixed-version: Fixed from version 6.8" | ||
4369 | |||
4370 | CVE_STATUS[CVE-2023-52610] = "fixed-version: Fixed from version 6.8" | ||
4371 | |||
4372 | CVE_STATUS[CVE-2023-52611] = "fixed-version: Fixed from version 6.8" | ||
4373 | |||
4374 | CVE_STATUS[CVE-2023-52612] = "fixed-version: Fixed from version 6.8" | ||
4375 | |||
4376 | CVE_STATUS[CVE-2023-52613] = "fixed-version: Fixed from version 6.8" | ||
4377 | |||
4378 | CVE_STATUS[CVE-2023-52614] = "fixed-version: Fixed from version 6.8" | ||
4379 | |||
4380 | CVE_STATUS[CVE-2023-52615] = "fixed-version: Fixed from version 6.8" | ||
4381 | |||
4382 | CVE_STATUS[CVE-2023-52616] = "fixed-version: Fixed from version 6.8" | ||
4383 | |||
4384 | CVE_STATUS[CVE-2023-52617] = "fixed-version: Fixed from version 6.8" | ||
4385 | |||
4386 | CVE_STATUS[CVE-2023-52618] = "fixed-version: Fixed from version 6.8" | ||
4387 | |||
4388 | CVE_STATUS[CVE-2023-52619] = "fixed-version: Fixed from version 6.8" | ||
4389 | |||
4390 | CVE_STATUS[CVE-2023-52620] = "fixed-version: Fixed from version 6.4" | ||
4391 | |||
4392 | CVE_STATUS[CVE-2023-52621] = "fixed-version: Fixed from version 6.8" | ||
4393 | |||
4394 | CVE_STATUS[CVE-2023-52622] = "fixed-version: Fixed from version 6.8" | ||
4395 | |||
4396 | CVE_STATUS[CVE-2023-52623] = "fixed-version: Fixed from version 6.8" | ||
4397 | |||
4398 | CVE_STATUS[CVE-2023-52624] = "fixed-version: Fixed from version 6.8" | ||
4399 | |||
4400 | CVE_STATUS[CVE-2023-52625] = "fixed-version: Fixed from version 6.8" | ||
4401 | |||
4402 | CVE_STATUS[CVE-2023-52626] = "fixed-version: Fixed from version 6.8" | ||
4403 | |||
4404 | CVE_STATUS[CVE-2023-52627] = "fixed-version: Fixed from version 6.8" | ||
4405 | |||
4406 | CVE_STATUS[CVE-2023-52628] = "fixed-version: Fixed from version 6.6" | ||
4407 | |||
4408 | CVE_STATUS[CVE-2023-52629] = "fixed-version: Fixed from version 6.6" | ||
4409 | |||
4410 | CVE_STATUS[CVE-2023-52631] = "fixed-version: Fixed from version 6.8" | ||
4411 | |||
4412 | CVE_STATUS[CVE-2023-52632] = "fixed-version: Fixed from version 6.8" | ||
4413 | |||
4414 | CVE_STATUS[CVE-2023-52633] = "fixed-version: Fixed from version 6.8" | ||
4415 | |||
4416 | CVE_STATUS[CVE-2023-52634] = "fixed-version: Fixed from version 6.8" | ||
4417 | |||
4418 | CVE_STATUS[CVE-2023-52635] = "fixed-version: Fixed from version 6.8" | ||
4419 | |||
4420 | CVE_STATUS[CVE-2023-52636] = "fixed-version: Fixed from version 6.8" | ||
4421 | |||
4422 | CVE_STATUS[CVE-2023-52637] = "fixed-version: Fixed from version 6.8" | ||
4423 | |||
4424 | CVE_STATUS[CVE-2023-52638] = "fixed-version: Fixed from version 6.8" | ||
4425 | |||
4426 | CVE_STATUS[CVE-2023-52639] = "fixed-version: Fixed from version 6.8" | ||
4427 | |||
4428 | CVE_STATUS[CVE-2023-52640] = "fixed-version: Fixed from version 6.8" | ||
4429 | |||
4430 | CVE_STATUS[CVE-2023-52641] = "fixed-version: Fixed from version 6.8" | ||
4431 | |||
4432 | CVE_STATUS[CVE-2023-52642] = "fixed-version: Fixed from version 6.8" | ||
4433 | |||
4434 | CVE_STATUS[CVE-2023-52643] = "fixed-version: Fixed from version 6.8" | ||
4435 | |||
4436 | CVE_STATUS[CVE-2023-52644] = "fixed-version: Fixed from version 6.9" | ||
4437 | |||
4438 | CVE_STATUS[CVE-2023-52645] = "fixed-version: Fixed from version 6.8" | ||
4439 | |||
4440 | CVE_STATUS[CVE-2023-52646] = "fixed-version: Fixed from version 6.2" | ||
4441 | |||
4442 | CVE_STATUS[CVE-2023-52647] = "fixed-version: Fixed from version 6.9" | ||
4443 | |||
4444 | CVE_STATUS[CVE-2023-52648] = "fixed-version: Fixed from version 6.9" | ||
4445 | |||
4446 | CVE_STATUS[CVE-2023-52649] = "fixed-version: Fixed from version 6.9" | ||
4447 | |||
4448 | CVE_STATUS[CVE-2023-52650] = "fixed-version: Fixed from version 6.9" | ||
4449 | |||
4450 | CVE_STATUS[CVE-2023-52652] = "fixed-version: Fixed from version 6.9" | ||
4451 | |||
4452 | CVE_STATUS[CVE-2023-52653] = "fixed-version: Fixed from version 6.9" | ||
4453 | |||
4454 | CVE_STATUS[CVE-2023-52654] = "fixed-version: Fixed from version 6.7" | ||
4455 | |||
4456 | CVE_STATUS[CVE-2023-52655] = "fixed-version: Fixed from version 6.7" | ||
4457 | |||
4458 | CVE_STATUS[CVE-2023-52656] = "fixed-version: Fixed from version 6.8" | ||
4459 | |||
4460 | CVE_STATUS[CVE-2023-52657] = "fixed-version: Fixed from version 6.8" | ||
4461 | |||
4462 | CVE_STATUS[CVE-2023-52658] = "fixed-version: Fixed from version 6.8" | ||
4463 | |||
4464 | CVE_STATUS[CVE-2023-52659] = "fixed-version: Fixed from version 6.9" | ||
4465 | |||
4466 | CVE_STATUS[CVE-2023-52660] = "fixed-version: Fixed from version 6.8" | ||
4467 | |||
4468 | CVE_STATUS[CVE-2023-52661] = "fixed-version: Fixed from version 6.9" | ||
4469 | |||
4470 | CVE_STATUS[CVE-2023-52662] = "fixed-version: Fixed from version 6.9" | ||
4471 | |||
4472 | CVE_STATUS[CVE-2023-52663] = "fixed-version: Fixed from version 6.9" | ||
4473 | |||
4474 | CVE_STATUS[CVE-2023-52664] = "fixed-version: Fixed from version 6.8" | ||
4475 | |||
4476 | CVE_STATUS[CVE-2023-52667] = "fixed-version: Fixed from version 6.8" | ||
4477 | |||
4478 | CVE_STATUS[CVE-2023-52668] = "fixed-version: Fixed from version 6.8" | ||
4479 | |||
4480 | CVE_STATUS[CVE-2023-52669] = "fixed-version: Fixed from version 6.8" | ||
4481 | |||
4482 | CVE_STATUS[CVE-2023-52670] = "fixed-version: Fixed from version 6.8" | ||
4483 | |||
4484 | CVE_STATUS[CVE-2023-52671] = "fixed-version: Fixed from version 6.8" | ||
4485 | |||
4486 | CVE_STATUS[CVE-2023-52672] = "fixed-version: Fixed from version 6.8" | ||
4487 | |||
4488 | CVE_STATUS[CVE-2023-52673] = "fixed-version: Fixed from version 6.8" | ||
4489 | |||
4490 | CVE_STATUS[CVE-2023-52674] = "fixed-version: Fixed from version 6.8" | ||
4491 | |||
4492 | CVE_STATUS[CVE-2023-52675] = "fixed-version: Fixed from version 6.8" | ||
4493 | |||
4494 | CVE_STATUS[CVE-2023-52676] = "fixed-version: Fixed from version 6.8" | ||
4495 | |||
4496 | CVE_STATUS[CVE-2023-52677] = "fixed-version: Fixed from version 6.8" | ||
4497 | |||
4498 | CVE_STATUS[CVE-2023-52678] = "fixed-version: Fixed from version 6.8" | ||
4499 | |||
4500 | CVE_STATUS[CVE-2023-52679] = "fixed-version: Fixed from version 6.8" | ||
4501 | |||
4502 | CVE_STATUS[CVE-2023-52680] = "fixed-version: Fixed from version 6.8" | ||
4503 | |||
4504 | CVE_STATUS[CVE-2023-52681] = "fixed-version: Fixed from version 6.8" | ||
4505 | |||
4506 | CVE_STATUS[CVE-2023-52682] = "fixed-version: Fixed from version 6.8" | ||
4507 | |||
4508 | CVE_STATUS[CVE-2023-52683] = "fixed-version: Fixed from version 6.8" | ||
4509 | |||
4510 | CVE_STATUS[CVE-2023-52684] = "fixed-version: Fixed from version 6.8" | ||
4511 | |||
4512 | CVE_STATUS[CVE-2023-52686] = "fixed-version: Fixed from version 6.8" | ||
4513 | |||
4514 | CVE_STATUS[CVE-2023-52687] = "fixed-version: Fixed from version 6.8" | ||
4515 | |||
4516 | CVE_STATUS[CVE-2023-52688] = "fixed-version: Fixed from version 6.8" | ||
4517 | |||
4518 | CVE_STATUS[CVE-2023-52689] = "fixed-version: Fixed from version 6.8" | ||
4519 | |||
4520 | CVE_STATUS[CVE-2023-52690] = "fixed-version: Fixed from version 6.8" | ||
4521 | |||
4522 | CVE_STATUS[CVE-2023-52691] = "fixed-version: Fixed from version 6.8" | ||
4523 | |||
4524 | CVE_STATUS[CVE-2023-52692] = "fixed-version: Fixed from version 6.8" | ||
4525 | |||
4526 | CVE_STATUS[CVE-2023-52693] = "fixed-version: Fixed from version 6.8" | ||
4527 | |||
4528 | CVE_STATUS[CVE-2023-52694] = "fixed-version: Fixed from version 6.8" | ||
4529 | |||
4530 | CVE_STATUS[CVE-2023-52695] = "fixed-version: Fixed from version 6.8" | ||
4531 | |||
4532 | CVE_STATUS[CVE-2023-52696] = "fixed-version: Fixed from version 6.8" | ||
4533 | |||
4534 | CVE_STATUS[CVE-2023-52697] = "fixed-version: Fixed from version 6.8" | ||
4535 | |||
4536 | CVE_STATUS[CVE-2023-52698] = "fixed-version: Fixed from version 6.8" | ||
4537 | |||
4538 | CVE_STATUS[CVE-2023-52699] = "fixed-version: Fixed from version 6.9" | ||
4539 | |||
4540 | CVE_STATUS[CVE-2023-52700] = "fixed-version: Fixed from version 6.2" | ||
4541 | |||
4542 | CVE_STATUS[CVE-2023-52701] = "fixed-version: Fixed from version 6.2" | ||
4543 | |||
4544 | CVE_STATUS[CVE-2023-52702] = "fixed-version: Fixed from version 6.2" | ||
4545 | |||
4546 | CVE_STATUS[CVE-2023-52703] = "fixed-version: Fixed from version 6.2" | ||
4547 | |||
4548 | CVE_STATUS[CVE-2023-52704] = "fixed-version: Fixed from version 6.2" | ||
4549 | |||
4550 | CVE_STATUS[CVE-2023-52705] = "fixed-version: Fixed from version 6.2" | ||
4551 | |||
4552 | CVE_STATUS[CVE-2023-52706] = "fixed-version: Fixed from version 6.2" | ||
4553 | |||
4554 | CVE_STATUS[CVE-2023-52707] = "fixed-version: Fixed from version 6.2" | ||
4555 | |||
4556 | CVE_STATUS[CVE-2023-52708] = "fixed-version: Fixed from version 6.2" | ||
4557 | |||
4558 | CVE_STATUS[CVE-2023-52730] = "fixed-version: Fixed from version 6.2" | ||
4559 | |||
4560 | CVE_STATUS[CVE-2023-52731] = "fixed-version: Fixed from version 6.2" | ||
4561 | |||
4562 | CVE_STATUS[CVE-2023-52732] = "fixed-version: Fixed from version 6.2" | ||
4563 | |||
4564 | # CVE-2023-52733 has no known resolution | ||
4565 | |||
4566 | CVE_STATUS[CVE-2023-52735] = "fixed-version: Fixed from version 6.2" | ||
4567 | |||
4568 | CVE_STATUS[CVE-2023-52736] = "fixed-version: Fixed from version 6.2" | ||
4569 | |||
4570 | CVE_STATUS[CVE-2023-52737] = "fixed-version: Fixed from version 6.2" | ||
4571 | |||
4572 | CVE_STATUS[CVE-2023-52738] = "fixed-version: Fixed from version 6.2" | ||
4573 | |||
4574 | CVE_STATUS[CVE-2023-52739] = "fixed-version: Fixed from version 6.2" | ||
4575 | |||
4576 | CVE_STATUS[CVE-2023-52740] = "fixed-version: Fixed from version 6.2" | ||
4577 | |||
4578 | CVE_STATUS[CVE-2023-52741] = "fixed-version: Fixed from version 6.2" | ||
4579 | |||
4580 | CVE_STATUS[CVE-2023-52742] = "fixed-version: Fixed from version 6.2" | ||
4581 | |||
4582 | CVE_STATUS[CVE-2023-52743] = "fixed-version: Fixed from version 6.2" | ||
4583 | |||
4584 | CVE_STATUS[CVE-2023-52744] = "fixed-version: Fixed from version 6.2" | ||
4585 | |||
4586 | CVE_STATUS[CVE-2023-52745] = "fixed-version: Fixed from version 6.1.12" | ||
4587 | |||
4588 | CVE_STATUS[CVE-2023-52746] = "fixed-version: Fixed from version 6.2" | ||
4589 | |||
4590 | CVE_STATUS[CVE-2023-52747] = "fixed-version: Fixed from version 6.2" | ||
4591 | |||
4592 | CVE_STATUS[CVE-2023-52748] = "fixed-version: Fixed from version 6.7" | ||
4593 | |||
4594 | CVE_STATUS[CVE-2023-52749] = "fixed-version: Fixed from version 6.7" | ||
4595 | |||
4596 | CVE_STATUS[CVE-2023-52750] = "fixed-version: Fixed from version 6.7" | ||
4597 | |||
4598 | CVE_STATUS[CVE-2023-52751] = "fixed-version: Fixed from version 6.7" | ||
4599 | |||
4600 | CVE_STATUS[CVE-2023-52752] = "fixed-version: Fixed from version 6.7" | ||
4601 | |||
4602 | CVE_STATUS[CVE-2023-52753] = "fixed-version: Fixed from version 6.7" | ||
4603 | |||
4604 | CVE_STATUS[CVE-2023-52754] = "fixed-version: Fixed from version 6.7" | ||
4605 | |||
4606 | CVE_STATUS[CVE-2023-52755] = "fixed-version: Fixed from version 6.7" | ||
4607 | |||
4608 | CVE_STATUS[CVE-2023-52757] = "fixed-version: Fixed from version 6.7" | ||
4609 | |||
4610 | CVE_STATUS[CVE-2023-52760] = "fixed-version: Fixed from version 6.7" | ||
4611 | |||
4612 | CVE_STATUS[CVE-2023-52761] = "fixed-version: Fixed from version 6.7" | ||
4613 | |||
4614 | CVE_STATUS[CVE-2023-52762] = "fixed-version: Fixed from version 6.7" | ||
4615 | |||
4616 | CVE_STATUS[CVE-2023-52763] = "fixed-version: Fixed from version 6.7" | ||
4617 | |||
4618 | CVE_STATUS[CVE-2023-52764] = "fixed-version: Fixed from version 6.7" | ||
4619 | |||
4620 | CVE_STATUS[CVE-2023-52765] = "fixed-version: Fixed from version 6.7" | ||
4621 | |||
4622 | CVE_STATUS[CVE-2023-52766] = "fixed-version: Fixed from version 6.7" | ||
4623 | |||
4624 | CVE_STATUS[CVE-2023-52767] = "fixed-version: Fixed from version 6.7" | ||
4625 | |||
4626 | CVE_STATUS[CVE-2023-52768] = "fixed-version: Fixed from version 6.7" | ||
4627 | |||
4628 | CVE_STATUS[CVE-2023-52769] = "fixed-version: Fixed from version 6.7" | ||
4629 | |||
4630 | CVE_STATUS[CVE-2023-52770] = "fixed-version: Fixed from version 6.7" | ||
4631 | |||
4632 | CVE_STATUS[CVE-2023-52771] = "fixed-version: Fixed from version 6.7" | ||
4633 | |||
4634 | CVE_STATUS[CVE-2023-52772] = "fixed-version: Fixed from version 6.7" | ||
4635 | |||
4636 | CVE_STATUS[CVE-2023-52773] = "fixed-version: Fixed from version 6.7" | ||
4637 | |||
4638 | CVE_STATUS[CVE-2023-52774] = "fixed-version: Fixed from version 6.7" | ||
4639 | |||
4640 | CVE_STATUS[CVE-2023-52775] = "fixed-version: Fixed from version 6.7" | ||
4641 | |||
4642 | CVE_STATUS[CVE-2023-52776] = "fixed-version: Fixed from version 6.7" | ||
4643 | |||
4644 | CVE_STATUS[CVE-2023-52777] = "fixed-version: Fixed from version 6.7" | ||
4645 | |||
4646 | CVE_STATUS[CVE-2023-52778] = "fixed-version: Fixed from version 6.7" | ||
4647 | |||
4648 | CVE_STATUS[CVE-2023-52779] = "fixed-version: Fixed from version 6.7" | ||
4649 | |||
4650 | CVE_STATUS[CVE-2023-52780] = "fixed-version: Fixed from version 6.7" | ||
4651 | |||
4652 | CVE_STATUS[CVE-2023-52781] = "fixed-version: Fixed from version 6.7" | ||
4653 | |||
4654 | CVE_STATUS[CVE-2023-52782] = "fixed-version: Fixed from version 6.7" | ||
4655 | |||
4656 | CVE_STATUS[CVE-2023-52783] = "fixed-version: Fixed from version 6.7" | ||
4657 | |||
4658 | CVE_STATUS[CVE-2023-52784] = "fixed-version: Fixed from version 6.7" | ||
4659 | |||
4660 | CVE_STATUS[CVE-2023-52785] = "fixed-version: Fixed from version 6.7" | ||
4661 | |||
4662 | CVE_STATUS[CVE-2023-52786] = "fixed-version: Fixed from version 6.7" | ||
4663 | |||
4664 | CVE_STATUS[CVE-2023-52787] = "fixed-version: Fixed from version 6.7" | ||
4665 | |||
4666 | CVE_STATUS[CVE-2023-52788] = "fixed-version: Fixed from version 6.7" | ||
4667 | |||
4668 | CVE_STATUS[CVE-2023-52789] = "fixed-version: Fixed from version 6.7" | ||
4669 | |||
4670 | CVE_STATUS[CVE-2023-52790] = "fixed-version: Fixed from version 6.7" | ||
4671 | |||
4672 | CVE_STATUS[CVE-2023-52791] = "fixed-version: Fixed from version 6.7" | ||
4673 | |||
4674 | CVE_STATUS[CVE-2023-52792] = "fixed-version: Fixed from version 6.7" | ||
4675 | |||
4676 | CVE_STATUS[CVE-2023-52794] = "fixed-version: Fixed from version 6.7" | ||
4677 | |||
4678 | CVE_STATUS[CVE-2023-52795] = "fixed-version: Fixed from version 6.7" | ||
4679 | |||
4680 | CVE_STATUS[CVE-2023-52796] = "fixed-version: Fixed from version 6.7" | ||
4681 | |||
4682 | CVE_STATUS[CVE-2023-52797] = "fixed-version: Fixed from version 6.7" | ||
4683 | |||
4684 | CVE_STATUS[CVE-2023-52798] = "fixed-version: Fixed from version 6.7" | ||
4685 | |||
4686 | CVE_STATUS[CVE-2023-52799] = "fixed-version: Fixed from version 6.7" | ||
4687 | |||
4688 | CVE_STATUS[CVE-2023-52800] = "fixed-version: Fixed from version 6.7" | ||
4689 | |||
4690 | CVE_STATUS[CVE-2023-52801] = "fixed-version: Fixed from version 6.7" | ||
4691 | |||
4692 | CVE_STATUS[CVE-2023-52803] = "fixed-version: Fixed from version 6.7" | ||
4693 | |||
4694 | CVE_STATUS[CVE-2023-52804] = "fixed-version: Fixed from version 6.7" | ||
4695 | |||
4696 | CVE_STATUS[CVE-2023-52805] = "fixed-version: Fixed from version 6.7" | ||
4697 | |||
4698 | CVE_STATUS[CVE-2023-52806] = "fixed-version: Fixed from version 6.7" | ||
4699 | |||
4700 | CVE_STATUS[CVE-2023-52807] = "fixed-version: Fixed from version 6.7" | ||
4701 | |||
4702 | CVE_STATUS[CVE-2023-52808] = "fixed-version: Fixed from version 6.7" | ||
4703 | |||
4704 | CVE_STATUS[CVE-2023-52809] = "fixed-version: Fixed from version 6.7" | ||
4705 | |||
4706 | CVE_STATUS[CVE-2023-52810] = "fixed-version: Fixed from version 6.7" | ||
4707 | |||
4708 | CVE_STATUS[CVE-2023-52811] = "fixed-version: Fixed from version 6.7" | ||
4709 | |||
4710 | CVE_STATUS[CVE-2023-52812] = "fixed-version: Fixed from version 6.7" | ||
4711 | |||
4712 | CVE_STATUS[CVE-2023-52813] = "fixed-version: Fixed from version 6.7" | ||
4713 | |||
4714 | CVE_STATUS[CVE-2023-52814] = "fixed-version: Fixed from version 6.7" | ||
4715 | |||
4716 | CVE_STATUS[CVE-2023-52815] = "fixed-version: Fixed from version 6.7" | ||
4717 | |||
4718 | CVE_STATUS[CVE-2023-52816] = "fixed-version: Fixed from version 6.7" | ||
4719 | |||
4720 | CVE_STATUS[CVE-2023-52817] = "fixed-version: Fixed from version 6.7" | ||
4721 | |||
4722 | CVE_STATUS[CVE-2023-52818] = "fixed-version: Fixed from version 6.7" | ||
4723 | |||
4724 | CVE_STATUS[CVE-2023-52819] = "fixed-version: Fixed from version 6.7" | ||
4725 | |||
4726 | CVE_STATUS[CVE-2023-52821] = "fixed-version: Fixed from version 6.7" | ||
4727 | |||
4728 | CVE_STATUS[CVE-2023-52825] = "fixed-version: Fixed from version 6.7" | ||
4729 | |||
4730 | CVE_STATUS[CVE-2023-52826] = "fixed-version: Fixed from version 6.7" | ||
4731 | |||
4732 | CVE_STATUS[CVE-2023-52827] = "fixed-version: Fixed from version 6.7" | ||
4733 | |||
4734 | CVE_STATUS[CVE-2023-52828] = "fixed-version: Fixed from version 6.7" | ||
4735 | |||
4736 | CVE_STATUS[CVE-2023-52829] = "fixed-version: Fixed from version 6.7" | ||
4737 | |||
4738 | CVE_STATUS[CVE-2023-52831] = "fixed-version: Fixed from version 6.7" | ||
4739 | |||
4740 | CVE_STATUS[CVE-2023-52832] = "fixed-version: Fixed from version 6.7" | ||
4741 | |||
4742 | CVE_STATUS[CVE-2023-52833] = "fixed-version: Fixed from version 6.7" | ||
4743 | |||
4744 | CVE_STATUS[CVE-2023-52834] = "fixed-version: Fixed from version 6.7" | ||
4745 | |||
4746 | CVE_STATUS[CVE-2023-52835] = "fixed-version: Fixed from version 6.7" | ||
4747 | |||
4748 | CVE_STATUS[CVE-2023-52836] = "fixed-version: Fixed from version 6.7" | ||
4749 | |||
4750 | CVE_STATUS[CVE-2023-52837] = "fixed-version: Fixed from version 6.7" | ||
4751 | |||
4752 | CVE_STATUS[CVE-2023-52838] = "fixed-version: Fixed from version 6.7" | ||
4753 | |||
4754 | CVE_STATUS[CVE-2023-52839] = "fixed-version: Fixed from version 6.7" | ||
4755 | |||
4756 | CVE_STATUS[CVE-2023-52840] = "fixed-version: Fixed from version 6.7" | ||
4757 | |||
4758 | CVE_STATUS[CVE-2023-52841] = "fixed-version: Fixed from version 6.7" | ||
4759 | |||
4760 | CVE_STATUS[CVE-2023-52842] = "fixed-version: Fixed from version 6.7" | ||
4761 | |||
4762 | CVE_STATUS[CVE-2023-52843] = "fixed-version: Fixed from version 6.7" | ||
4763 | |||
4764 | CVE_STATUS[CVE-2023-52844] = "fixed-version: Fixed from version 6.7" | ||
4765 | |||
4766 | CVE_STATUS[CVE-2023-52845] = "fixed-version: Fixed from version 6.7" | ||
4767 | |||
4768 | CVE_STATUS[CVE-2023-52846] = "fixed-version: Fixed from version 6.7" | ||
4769 | |||
4770 | CVE_STATUS[CVE-2023-52847] = "fixed-version: Fixed from version 6.7" | ||
4771 | |||
4772 | CVE_STATUS[CVE-2023-52848] = "fixed-version: Fixed from version 6.7" | ||
4773 | |||
4774 | CVE_STATUS[CVE-2023-52849] = "fixed-version: Fixed from version 6.7" | ||
4775 | |||
4776 | CVE_STATUS[CVE-2023-52850] = "fixed-version: Fixed from version 6.7" | ||
4777 | |||
4778 | CVE_STATUS[CVE-2023-52851] = "fixed-version: Fixed from version 6.7" | ||
4779 | |||
4780 | CVE_STATUS[CVE-2023-52852] = "fixed-version: Fixed from version 6.7" | ||
4781 | |||
4782 | CVE_STATUS[CVE-2023-52853] = "fixed-version: Fixed from version 6.7" | ||
4783 | |||
4784 | CVE_STATUS[CVE-2023-52854] = "fixed-version: Fixed from version 6.7" | ||
4785 | |||
4786 | CVE_STATUS[CVE-2023-52855] = "fixed-version: Fixed from version 6.7" | ||
4787 | |||
4788 | CVE_STATUS[CVE-2023-52856] = "fixed-version: Fixed from version 6.7" | ||
4789 | |||
4790 | CVE_STATUS[CVE-2023-52857] = "fixed-version: Fixed from version 6.7" | ||
4791 | |||
4792 | CVE_STATUS[CVE-2023-52858] = "fixed-version: Fixed from version 6.7" | ||
4793 | |||
4794 | CVE_STATUS[CVE-2023-52859] = "fixed-version: Fixed from version 6.7" | ||
4795 | |||
4796 | CVE_STATUS[CVE-2023-52860] = "fixed-version: Fixed from version 6.7" | ||
4797 | |||
4798 | CVE_STATUS[CVE-2023-52861] = "fixed-version: Fixed from version 6.7" | ||
4799 | |||
4800 | CVE_STATUS[CVE-2023-52862] = "fixed-version: Fixed from version 6.7" | ||
4801 | |||
4802 | CVE_STATUS[CVE-2023-52863] = "fixed-version: Fixed from version 6.7" | ||
4803 | |||
4804 | CVE_STATUS[CVE-2023-52864] = "fixed-version: Fixed from version 6.7" | ||
4805 | |||
4806 | CVE_STATUS[CVE-2023-52865] = "fixed-version: Fixed from version 6.7" | ||
4807 | |||
4808 | CVE_STATUS[CVE-2023-52866] = "fixed-version: Fixed from version 6.7" | ||
4809 | |||
4810 | CVE_STATUS[CVE-2023-52867] = "fixed-version: Fixed from version 6.7" | ||
4811 | |||
4812 | CVE_STATUS[CVE-2023-52868] = "fixed-version: Fixed from version 6.7" | ||
4813 | |||
4814 | CVE_STATUS[CVE-2023-52869] = "fixed-version: Fixed from version 6.7" | ||
4815 | |||
4816 | CVE_STATUS[CVE-2023-52870] = "fixed-version: Fixed from version 6.7" | ||
4817 | |||
4818 | CVE_STATUS[CVE-2023-52871] = "fixed-version: Fixed from version 6.7" | ||
4819 | |||
4820 | CVE_STATUS[CVE-2023-52872] = "fixed-version: Fixed from version 6.7" | ||
4821 | |||
4822 | CVE_STATUS[CVE-2023-52873] = "fixed-version: Fixed from version 6.7" | ||
4823 | |||
4824 | CVE_STATUS[CVE-2023-52874] = "fixed-version: Fixed from version 6.7" | ||
4825 | |||
4826 | CVE_STATUS[CVE-2023-52875] = "fixed-version: Fixed from version 6.7" | ||
4827 | |||
4828 | CVE_STATUS[CVE-2023-52876] = "fixed-version: Fixed from version 6.7" | ||
4829 | |||
4830 | CVE_STATUS[CVE-2023-52877] = "fixed-version: Fixed from version 6.7" | ||
4831 | |||
4832 | CVE_STATUS[CVE-2023-52878] = "fixed-version: Fixed from version 6.7" | ||
4833 | |||
4834 | CVE_STATUS[CVE-2023-52879] = "fixed-version: Fixed from version 6.7" | ||
4835 | |||
4836 | CVE_STATUS[CVE-2023-52880] = "fixed-version: Fixed from version 6.6" | ||
4837 | |||
4838 | CVE_STATUS[CVE-2023-52881] = "fixed-version: Fixed from version 6.7" | ||
4839 | |||
4840 | CVE_STATUS[CVE-2023-52882] = "fixed-version: Fixed from version 6.9" | ||
4841 | |||
4842 | CVE_STATUS[CVE-2023-52883] = "fixed-version: Fixed from version 6.6" | ||
4843 | |||
4844 | CVE_STATUS[CVE-2023-52884] = "fixed-version: Fixed from version 6.10" | ||
4845 | |||
4846 | CVE_STATUS[CVE-2023-52885] = "fixed-version: Fixed from version 6.5" | ||
4847 | |||
4848 | CVE_STATUS[CVE-2023-52886] = "fixed-version: Fixed from version 6.6" | ||
4849 | |||
4850 | CVE_STATUS[CVE-2023-52887] = "fixed-version: Fixed from version 6.10" | ||
4851 | |||
4852 | CVE_STATUS[CVE-2023-52888] = "fixed-version: Fixed from version 6.10" | ||
4853 | |||
4854 | CVE_STATUS[CVE-2023-52889] = "fixed-version: Fixed from version 6.11" | ||
4855 | |||
4856 | CVE_STATUS[CVE-2023-52893] = "fixed-version: Fixed from version 6.2" | ||
4857 | |||
4858 | CVE_STATUS[CVE-2023-52894] = "fixed-version: Fixed from version 6.2" | ||
4859 | |||
4860 | CVE_STATUS[CVE-2023-52895] = "fixed-version: Fixed from version 6.1.8" | ||
4861 | |||
4862 | CVE_STATUS[CVE-2023-52896] = "fixed-version: Fixed from version 6.2" | ||
4863 | |||
4864 | CVE_STATUS[CVE-2023-52897] = "fixed-version: Fixed from version 6.2" | ||
4865 | |||
4866 | CVE_STATUS[CVE-2023-52898] = "fixed-version: Fixed from version 6.2" | ||
4867 | |||
4868 | CVE_STATUS[CVE-2023-52899] = "fixed-version: Fixed from version 6.2" | ||
4869 | |||
4870 | CVE_STATUS[CVE-2023-52900] = "fixed-version: Fixed from version 6.2" | ||
4871 | |||
4872 | CVE_STATUS[CVE-2023-52901] = "fixed-version: Fixed from version 6.2" | ||
4873 | |||
4874 | CVE_STATUS[CVE-2023-52902] = "fixed-version: Fixed from version 6.2" | ||
4875 | |||
4876 | CVE_STATUS[CVE-2023-52903] = "fixed-version: Fixed from version 6.2" | ||
4877 | |||
4878 | CVE_STATUS[CVE-2023-52904] = "fixed-version: Fixed from version 5.15.168" | ||
4879 | |||
4880 | CVE_STATUS[CVE-2023-52905] = "fixed-version: Fixed from version 6.2" | ||
4881 | |||
4882 | CVE_STATUS[CVE-2023-52906] = "fixed-version: Fixed from version 6.2" | ||
4883 | |||
4884 | CVE_STATUS[CVE-2023-52907] = "fixed-version: Fixed from version 6.2" | ||
4885 | |||
4886 | CVE_STATUS[CVE-2023-52908] = "fixed-version: Fixed from version 6.1.7" | ||
4887 | |||
4888 | CVE_STATUS[CVE-2023-52909] = "fixed-version: Fixed from version 6.2" | ||
4889 | |||
4890 | CVE_STATUS[CVE-2023-52910] = "fixed-version: Fixed from version 6.2" | ||
4891 | |||
4892 | CVE_STATUS[CVE-2023-52911] = "fixed-version: Fixed from version 6.2" | ||
4893 | |||
4894 | CVE_STATUS[CVE-2023-52912] = "fixed-version: Fixed from version 6.2" | ||
4895 | |||
4896 | CVE_STATUS[CVE-2023-52913] = "fixed-version: Fixed from version 6.2" | ||
4897 | |||
4898 | CVE_STATUS[CVE-2023-52914] = "fixed-version: Fixed from version 6.2" | ||
4899 | |||
4900 | CVE_STATUS[CVE-2023-52915] = "fixed-version: Fixed from version 6.6" | ||
4901 | |||
4902 | CVE_STATUS[CVE-2023-52916] = "fixed-version: Fixed from version 6.6" | ||
4903 | |||
4904 | CVE_STATUS[CVE-2023-52918] = "fixed-version: Fixed from version 6.9" | ||
4905 | |||
4906 | CVE_STATUS[CVE-2023-52919] = "fixed-version: Fixed from version 6.6" | ||
4907 | |||
4908 | CVE_STATUS[CVE-2023-52920] = "fixed-version: Fixed from version 6.8" | ||
4909 | |||
4910 | CVE_STATUS[CVE-2023-52921] = "fixed-version: Fixed from version 6.5" | ||
4911 | |||
4912 | CVE_STATUS[CVE-2023-52922] = "fixed-version: Fixed from version 6.5" | ||
4913 | |||
4914 | CVE_STATUS[CVE-2023-52923] = "fixed-version: Fixed from version 6.5" | ||
4915 | |||
4916 | CVE_STATUS[CVE-2023-52924] = "fixed-version: Fixed from version 6.5" | ||
4917 | |||
4918 | CVE_STATUS[CVE-2023-52925] = "fixed-version: Fixed from version 6.4.12" | ||
4919 | |||
4920 | CVE_STATUS[CVE-2023-52926] = "fixed-version: Fixed from version 6.7" | ||
4921 | |||
4922 | CVE_STATUS[CVE-2023-52927] = "fixed-version: Fixed from version 6.6" | ||
4923 | |||
4924 | CVE_STATUS[CVE-2023-52928] = "fixed-version: Fixed from version 6.2" | ||
4925 | |||
4926 | CVE_STATUS[CVE-2023-52929] = "fixed-version: Fixed from version 6.2" | ||
4927 | |||
4928 | CVE_STATUS[CVE-2023-52930] = "fixed-version: Fixed from version 6.2" | ||
4929 | |||
4930 | CVE_STATUS[CVE-2023-52931] = "fixed-version: Fixed from version 6.2" | ||
4931 | |||
4932 | CVE_STATUS[CVE-2023-52932] = "fixed-version: Fixed from version 6.2" | ||
4933 | |||
4934 | CVE_STATUS[CVE-2023-52933] = "fixed-version: Fixed from version 6.2" | ||
4935 | |||
4936 | CVE_STATUS[CVE-2023-52934] = "fixed-version: Fixed from version 6.2" | ||
4937 | |||
4938 | CVE_STATUS[CVE-2023-52935] = "fixed-version: Fixed from version 6.2" | ||
4939 | |||
4940 | CVE_STATUS[CVE-2023-52936] = "fixed-version: Fixed from version 6.2" | ||
4941 | |||
4942 | CVE_STATUS[CVE-2023-52937] = "fixed-version: Fixed from version 6.2" | ||
4943 | |||
4944 | CVE_STATUS[CVE-2023-52938] = "fixed-version: Fixed from version 6.1.11" | ||
4945 | |||
4946 | CVE_STATUS[CVE-2023-52939] = "fixed-version: Fixed from version 6.2" | ||
4947 | |||
4948 | CVE_STATUS[CVE-2023-52940] = "fixed-version: Fixed from version 6.2" | ||
4949 | |||
4950 | CVE_STATUS[CVE-2023-52941] = "fixed-version: Fixed from version 6.2" | ||
4951 | |||
4952 | CVE_STATUS[CVE-2023-52942] = "fixed-version: Fixed from version 6.2" | ||
4953 | |||
4954 | CVE_STATUS[CVE-2023-52973] = "fixed-version: Fixed from version 6.2" | ||
4955 | |||
4956 | CVE_STATUS[CVE-2023-52974] = "fixed-version: Fixed from version 6.2" | ||
4957 | |||
4958 | CVE_STATUS[CVE-2023-52975] = "fixed-version: Fixed from version 6.2" | ||
4959 | |||
4960 | CVE_STATUS[CVE-2023-52976] = "fixed-version: Fixed from version 6.2" | ||
4961 | |||
4962 | CVE_STATUS[CVE-2023-52977] = "fixed-version: Fixed from version 6.1.11" | ||
4963 | |||
4964 | CVE_STATUS[CVE-2023-52978] = "fixed-version: Fixed from version 6.2" | ||
4965 | |||
4966 | CVE_STATUS[CVE-2023-52979] = "fixed-version: Fixed from version 6.2" | ||
4967 | |||
4968 | CVE_STATUS[CVE-2023-52980] = "fixed-version: Fixed from version 6.2" | ||
4969 | |||
4970 | CVE_STATUS[CVE-2023-52981] = "fixed-version: Fixed from version 6.2" | ||
4971 | |||
4972 | CVE_STATUS[CVE-2023-52982] = "fixed-version: Fixed from version 6.2" | ||
4973 | |||
4974 | CVE_STATUS[CVE-2023-52983] = "fixed-version: Fixed from version 6.1.11" | ||
4975 | |||
4976 | CVE_STATUS[CVE-2023-52984] = "fixed-version: Fixed from version 6.2" | ||
4977 | |||
4978 | CVE_STATUS[CVE-2023-52985] = "fixed-version: Fixed from version 6.2" | ||
4979 | |||
4980 | CVE_STATUS[CVE-2023-52986] = "fixed-version: Fixed from version 6.2" | ||
4981 | |||
4982 | CVE_STATUS[CVE-2023-52987] = "fixed-version: Fixed from version 6.2" | ||
4983 | |||
4984 | CVE_STATUS[CVE-2023-52988] = "fixed-version: Fixed from version 6.2" | ||
4985 | |||
4986 | CVE_STATUS[CVE-2023-52989] = "fixed-version: Fixed from version 6.2" | ||
4987 | |||
4988 | CVE_STATUS[CVE-2023-52991] = "fixed-version: Fixed from version 6.2" | ||
4989 | |||
4990 | CVE_STATUS[CVE-2023-52992] = "fixed-version: Fixed from version 6.2" | ||
4991 | |||
4992 | CVE_STATUS[CVE-2023-52993] = "fixed-version: Fixed from version 6.2" | ||
4993 | |||
4994 | CVE_STATUS[CVE-2023-52994] = "fixed-version: Fixed from version 6.1.9" | ||
4995 | |||
4996 | CVE_STATUS[CVE-2023-52995] = "fixed-version: Fixed from version 6.2" | ||
4997 | |||
4998 | CVE_STATUS[CVE-2023-52996] = "fixed-version: Fixed from version 6.2" | ||
4999 | |||
5000 | CVE_STATUS[CVE-2023-52997] = "fixed-version: Fixed from version 6.2" | ||
5001 | |||
5002 | CVE_STATUS[CVE-2023-52998] = "fixed-version: Fixed from version 6.2" | ||
5003 | |||
5004 | CVE_STATUS[CVE-2023-52999] = "fixed-version: Fixed from version 6.2" | ||
5005 | |||
5006 | CVE_STATUS[CVE-2023-53000] = "fixed-version: Fixed from version 6.2" | ||
5007 | |||
5008 | CVE_STATUS[CVE-2023-53001] = "fixed-version: Fixed from version 6.2" | ||
5009 | |||
5010 | CVE_STATUS[CVE-2023-53002] = "fixed-version: Fixed from version 6.2" | ||
5011 | |||
5012 | CVE_STATUS[CVE-2023-53003] = "fixed-version: Fixed from version 6.2" | ||
5013 | |||
5014 | CVE_STATUS[CVE-2023-53004] = "fixed-version: Fixed from version 6.2" | ||
5015 | |||
5016 | CVE_STATUS[CVE-2023-53005] = "fixed-version: Fixed from version 6.2" | ||
5017 | |||
5018 | CVE_STATUS[CVE-2023-53006] = "fixed-version: Fixed from version 6.2" | ||
5019 | |||
5020 | CVE_STATUS[CVE-2023-53007] = "fixed-version: Fixed from version 6.2" | ||
5021 | |||
5022 | CVE_STATUS[CVE-2023-53008] = "fixed-version: Fixed from version 6.2" | ||
5023 | |||
5024 | CVE_STATUS[CVE-2023-53009] = "fixed-version: Fixed from version 6.2" | ||
5025 | |||
5026 | CVE_STATUS[CVE-2023-53010] = "fixed-version: Fixed from version 6.2" | ||
5027 | |||
5028 | CVE_STATUS[CVE-2023-53011] = "fixed-version: Fixed from version 6.2" | ||
5029 | |||
5030 | # CVE-2023-53012 has no known resolution | ||
5031 | |||
5032 | CVE_STATUS[CVE-2023-53013] = "fixed-version: Fixed from version 6.2" | ||
5033 | |||
5034 | CVE_STATUS[CVE-2023-53014] = "fixed-version: Fixed from version 6.2" | ||
5035 | |||
5036 | CVE_STATUS[CVE-2023-53015] = "fixed-version: Fixed from version 6.2" | ||
5037 | |||
5038 | CVE_STATUS[CVE-2023-53016] = "fixed-version: Fixed from version 6.2" | ||
5039 | |||
5040 | CVE_STATUS[CVE-2023-53017] = "fixed-version: Fixed from version 6.2" | ||
5041 | |||
5042 | CVE_STATUS[CVE-2023-53018] = "fixed-version: Fixed from version 6.2" | ||
5043 | |||
5044 | CVE_STATUS[CVE-2023-53019] = "fixed-version: Fixed from version 6.2" | ||
5045 | |||
5046 | CVE_STATUS[CVE-2023-53020] = "fixed-version: Fixed from version 6.2" | ||
5047 | |||
5048 | CVE_STATUS[CVE-2023-53021] = "fixed-version: Fixed from version 6.2" | ||
5049 | |||
5050 | CVE_STATUS[CVE-2023-53022] = "fixed-version: Fixed from version 6.2" | ||
5051 | |||
5052 | CVE_STATUS[CVE-2023-53023] = "fixed-version: Fixed from version 6.2" | ||
5053 | |||
5054 | CVE_STATUS[CVE-2023-53024] = "fixed-version: Fixed from version 6.2" | ||
5055 | |||
5056 | CVE_STATUS[CVE-2023-53026] = "fixed-version: Fixed from version 6.2" | ||
5057 | |||
5058 | CVE_STATUS[CVE-2023-53028] = "fixed-version: Fixed from version 6.1.8" | ||
5059 | |||
5060 | CVE_STATUS[CVE-2023-53029] = "fixed-version: Fixed from version 6.1.8" | ||
5061 | |||
5062 | CVE_STATUS[CVE-2023-53030] = "fixed-version: Fixed from version 6.1.8" | ||
5063 | |||
5064 | CVE_STATUS[CVE-2023-53031] = "fixed-version: Fixed from version 6.2" | ||
5065 | |||
5066 | CVE_STATUS[CVE-2023-53032] = "fixed-version: Fixed from version 6.2" | ||
5067 | |||
5068 | CVE_STATUS[CVE-2023-53033] = "fixed-version: Fixed from version 6.2" | ||
5069 | |||
5070 | CVE_STATUS[CVE-2023-53034] = "cpe-stable-backport: Backported in 6.12.23" | ||
5071 | |||
5072 | CVE_STATUS[CVE-2023-53035] = "fixed-version: Fixed from version 6.3" | ||
5073 | |||
5074 | CVE_STATUS[CVE-2023-53036] = "fixed-version: Fixed from version 6.3" | ||
5075 | |||
5076 | CVE_STATUS[CVE-2023-53037] = "fixed-version: Fixed from version 6.3" | ||
5077 | |||
5078 | CVE_STATUS[CVE-2023-53038] = "fixed-version: Fixed from version 6.3" | ||
5079 | |||
5080 | CVE_STATUS[CVE-2023-53039] = "fixed-version: Fixed from version 6.3" | ||
5081 | |||
5082 | CVE_STATUS[CVE-2023-53040] = "fixed-version: Fixed from version 6.3" | ||
5083 | |||
5084 | CVE_STATUS[CVE-2023-53041] = "fixed-version: Fixed from version 6.3" | ||
5085 | |||
5086 | CVE_STATUS[CVE-2023-53042] = "fixed-version: Fixed from version 6.3" | ||
5087 | |||
5088 | CVE_STATUS[CVE-2023-53043] = "fixed-version: Fixed from version 6.3" | ||
5089 | |||
5090 | CVE_STATUS[CVE-2023-53044] = "fixed-version: Fixed from version 6.3" | ||
5091 | |||
5092 | CVE_STATUS[CVE-2023-53045] = "fixed-version: Fixed from version 6.3" | ||
5093 | |||
5094 | CVE_STATUS[CVE-2023-53046] = "fixed-version: Fixed from version 6.3" | ||
5095 | |||
5096 | CVE_STATUS[CVE-2023-53047] = "fixed-version: Fixed from version 6.3" | ||
5097 | |||
5098 | CVE_STATUS[CVE-2023-53048] = "fixed-version: Fixed from version 6.3" | ||
5099 | |||
5100 | CVE_STATUS[CVE-2023-53049] = "fixed-version: Fixed from version 6.3" | ||
5101 | |||
5102 | CVE_STATUS[CVE-2023-53050] = "fixed-version: Fixed from version 6.3" | ||
5103 | |||
5104 | CVE_STATUS[CVE-2023-53051] = "fixed-version: Fixed from version 6.3" | ||
5105 | |||
5106 | CVE_STATUS[CVE-2023-53052] = "fixed-version: Fixed from version 6.3" | ||
5107 | |||
5108 | CVE_STATUS[CVE-2023-53053] = "fixed-version: Fixed from version 6.3" | ||
5109 | |||
5110 | CVE_STATUS[CVE-2023-53054] = "fixed-version: Fixed from version 6.3" | ||
5111 | |||
5112 | CVE_STATUS[CVE-2023-53055] = "fixed-version: Fixed from version 6.3" | ||
5113 | |||
5114 | CVE_STATUS[CVE-2023-53056] = "fixed-version: Fixed from version 6.2.9" | ||
5115 | |||
5116 | CVE_STATUS[CVE-2023-53057] = "fixed-version: Fixed from version 6.3" | ||
5117 | |||
5118 | CVE_STATUS[CVE-2023-53058] = "fixed-version: Fixed from version 6.3" | ||
5119 | |||
5120 | CVE_STATUS[CVE-2023-53059] = "fixed-version: Fixed from version 6.3" | ||
5121 | |||
5122 | CVE_STATUS[CVE-2023-53060] = "fixed-version: Fixed from version 6.3" | ||
5123 | |||
5124 | CVE_STATUS[CVE-2023-53061] = "fixed-version: Fixed from version 6.3" | ||
5125 | |||
5126 | CVE_STATUS[CVE-2023-53062] = "fixed-version: Fixed from version 6.3" | ||
5127 | |||
5128 | CVE_STATUS[CVE-2023-53064] = "fixed-version: Fixed from version 6.3" | ||
5129 | |||
5130 | CVE_STATUS[CVE-2023-53065] = "fixed-version: Fixed from version 6.3" | ||
5131 | |||
5132 | CVE_STATUS[CVE-2023-53066] = "fixed-version: Fixed from version 6.3" | ||
5133 | |||
5134 | CVE_STATUS[CVE-2023-53067] = "fixed-version: Fixed from version 6.3" | ||
5135 | |||
5136 | CVE_STATUS[CVE-2023-53068] = "fixed-version: Fixed from version 6.3" | ||
5137 | |||
5138 | CVE_STATUS[CVE-2023-53069] = "fixed-version: Fixed from version 6.3" | ||
5139 | |||
5140 | CVE_STATUS[CVE-2023-53070] = "fixed-version: Fixed from version 6.3" | ||
5141 | |||
5142 | CVE_STATUS[CVE-2023-53071] = "fixed-version: Fixed from version 6.3" | ||
5143 | |||
5144 | CVE_STATUS[CVE-2023-53072] = "fixed-version: Fixed from version 6.3" | ||
5145 | |||
5146 | CVE_STATUS[CVE-2023-53073] = "fixed-version: Fixed from version 6.3" | ||
5147 | |||
5148 | CVE_STATUS[CVE-2023-53074] = "fixed-version: Fixed from version 6.3" | ||
5149 | |||
5150 | CVE_STATUS[CVE-2023-53075] = "fixed-version: Fixed from version 6.3" | ||
5151 | |||
5152 | CVE_STATUS[CVE-2023-53077] = "fixed-version: Fixed from version 6.3" | ||
5153 | |||
5154 | CVE_STATUS[CVE-2023-53078] = "fixed-version: Fixed from version 6.3" | ||
5155 | |||
5156 | CVE_STATUS[CVE-2023-53079] = "fixed-version: Fixed from version 6.3" | ||
5157 | |||
5158 | CVE_STATUS[CVE-2023-53080] = "fixed-version: Fixed from version 6.3" | ||
5159 | |||
5160 | CVE_STATUS[CVE-2023-53081] = "fixed-version: Fixed from version 6.3" | ||
5161 | |||
5162 | CVE_STATUS[CVE-2023-53082] = "fixed-version: Fixed from version 6.3" | ||
5163 | |||
5164 | CVE_STATUS[CVE-2023-53083] = "fixed-version: Fixed from version 6.3" | ||
5165 | |||
5166 | CVE_STATUS[CVE-2023-53084] = "fixed-version: Fixed from version 6.3" | ||
5167 | |||
5168 | CVE_STATUS[CVE-2023-53085] = "fixed-version: Fixed from version 6.3" | ||
5169 | |||
5170 | CVE_STATUS[CVE-2023-53086] = "fixed-version: Fixed from version 6.3" | ||
5171 | |||
5172 | CVE_STATUS[CVE-2023-53087] = "fixed-version: Fixed from version 6.3" | ||
5173 | |||
5174 | CVE_STATUS[CVE-2023-53088] = "fixed-version: Fixed from version 6.3" | ||
5175 | |||
5176 | CVE_STATUS[CVE-2023-53089] = "fixed-version: Fixed from version 6.3" | ||
5177 | |||
5178 | CVE_STATUS[CVE-2023-53090] = "fixed-version: Fixed from version 6.3" | ||
5179 | |||
5180 | CVE_STATUS[CVE-2023-53091] = "fixed-version: Fixed from version 6.3" | ||
5181 | |||
5182 | CVE_STATUS[CVE-2023-53092] = "fixed-version: Fixed from version 6.3" | ||
5183 | |||
5184 | CVE_STATUS[CVE-2023-53093] = "fixed-version: Fixed from version 6.3" | ||
5185 | |||
5186 | CVE_STATUS[CVE-2023-53094] = "fixed-version: Fixed from version 6.3" | ||
5187 | |||
5188 | CVE_STATUS[CVE-2023-53095] = "fixed-version: Fixed from version 6.3" | ||
5189 | |||
5190 | CVE_STATUS[CVE-2023-53096] = "fixed-version: Fixed from version 6.3" | ||
5191 | |||
5192 | CVE_STATUS[CVE-2023-53097] = "fixed-version: Fixed from version 6.3" | ||
5193 | |||
5194 | CVE_STATUS[CVE-2023-53098] = "fixed-version: Fixed from version 6.3" | ||
5195 | |||
5196 | CVE_STATUS[CVE-2023-53099] = "fixed-version: Fixed from version 6.3" | ||
5197 | |||
5198 | CVE_STATUS[CVE-2023-53100] = "fixed-version: Fixed from version 6.3" | ||
5199 | |||
5200 | CVE_STATUS[CVE-2023-53101] = "fixed-version: Fixed from version 6.3" | ||
5201 | |||
5202 | CVE_STATUS[CVE-2023-53102] = "fixed-version: Fixed from version 6.3" | ||
5203 | |||
5204 | CVE_STATUS[CVE-2023-53103] = "fixed-version: Fixed from version 6.3" | ||
5205 | |||
5206 | CVE_STATUS[CVE-2023-53105] = "fixed-version: Fixed from version 6.3" | ||
5207 | |||
5208 | CVE_STATUS[CVE-2023-53106] = "fixed-version: Fixed from version 6.3" | ||
5209 | |||
5210 | CVE_STATUS[CVE-2023-53107] = "fixed-version: Fixed from version 6.3" | ||
5211 | |||
5212 | CVE_STATUS[CVE-2023-53108] = "fixed-version: Fixed from version 6.3" | ||
5213 | |||
5214 | CVE_STATUS[CVE-2023-53109] = "fixed-version: Fixed from version 6.3" | ||
5215 | |||
5216 | CVE_STATUS[CVE-2023-53110] = "fixed-version: Fixed from version 6.3" | ||
5217 | |||
5218 | CVE_STATUS[CVE-2023-53111] = "fixed-version: Fixed from version 6.3" | ||
5219 | |||
5220 | CVE_STATUS[CVE-2023-53112] = "fixed-version: Fixed from version 6.3" | ||
5221 | |||
5222 | CVE_STATUS[CVE-2023-53113] = "fixed-version: Fixed from version 6.3" | ||
5223 | |||
5224 | CVE_STATUS[CVE-2023-53114] = "fixed-version: Fixed from version 6.3" | ||
5225 | |||
5226 | CVE_STATUS[CVE-2023-53115] = "fixed-version: Fixed from version 6.3" | ||
5227 | |||
5228 | CVE_STATUS[CVE-2023-53116] = "fixed-version: Fixed from version 6.3" | ||
5229 | |||
5230 | CVE_STATUS[CVE-2023-53117] = "fixed-version: Fixed from version 6.3" | ||
5231 | |||
5232 | CVE_STATUS[CVE-2023-53118] = "fixed-version: Fixed from version 6.2.8" | ||
5233 | |||
5234 | CVE_STATUS[CVE-2023-53119] = "fixed-version: Fixed from version 6.3" | ||
5235 | |||
5236 | CVE_STATUS[CVE-2023-53120] = "fixed-version: Fixed from version 6.3" | ||
5237 | |||
5238 | CVE_STATUS[CVE-2023-53121] = "fixed-version: Fixed from version 6.3" | ||
5239 | |||
5240 | CVE_STATUS[CVE-2023-53123] = "fixed-version: Fixed from version 6.3" | ||
5241 | |||
5242 | CVE_STATUS[CVE-2023-53124] = "fixed-version: Fixed from version 6.3" | ||
5243 | |||
5244 | CVE_STATUS[CVE-2023-53125] = "fixed-version: Fixed from version 6.3" | ||
5245 | |||
5246 | CVE_STATUS[CVE-2023-53126] = "fixed-version: Fixed from version 6.3" | ||
5247 | |||
5248 | CVE_STATUS[CVE-2023-53127] = "fixed-version: Fixed from version 6.3" | ||
5249 | |||
5250 | CVE_STATUS[CVE-2023-53128] = "fixed-version: Fixed from version 6.3" | ||
5251 | |||
5252 | CVE_STATUS[CVE-2023-53131] = "fixed-version: Fixed from version 6.3" | ||
5253 | |||
5254 | CVE_STATUS[CVE-2023-53132] = "fixed-version: Fixed from version 6.3" | ||
5255 | |||
5256 | CVE_STATUS[CVE-2023-53133] = "fixed-version: Fixed from version 6.3" | ||
5257 | |||
5258 | CVE_STATUS[CVE-2023-53134] = "fixed-version: Fixed from version 6.3" | ||
5259 | |||
5260 | CVE_STATUS[CVE-2023-53135] = "fixed-version: Fixed from version 6.3" | ||
5261 | |||
5262 | CVE_STATUS[CVE-2023-53136] = "fixed-version: Fixed from version 6.3" | ||
5263 | |||
5264 | CVE_STATUS[CVE-2023-53137] = "fixed-version: Fixed from version 6.3" | ||
5265 | |||
5266 | CVE_STATUS[CVE-2023-53138] = "fixed-version: Fixed from version 6.3" | ||
5267 | |||
5268 | CVE_STATUS[CVE-2023-53139] = "fixed-version: Fixed from version 6.3" | ||
5269 | |||
5270 | CVE_STATUS[CVE-2023-53140] = "fixed-version: Fixed from version 6.3" | ||
5271 | |||
5272 | CVE_STATUS[CVE-2023-53141] = "fixed-version: Fixed from version 6.3" | ||
5273 | |||
5274 | CVE_STATUS[CVE-2023-53142] = "fixed-version: Fixed from version 6.3" | ||
5275 | |||
5276 | CVE_STATUS[CVE-2023-53143] = "fixed-version: Fixed from version 6.3" | ||
5277 | |||
5278 | CVE_STATUS[CVE-2023-53144] = "fixed-version: Fixed from version 6.3" | ||
5279 | |||
5280 | CVE_STATUS[CVE-2023-53145] = "fixed-version: Fixed from version 6.3" | ||
5281 | |||
5282 | CVE_STATUS[CVE-2023-53146] = "fixed-version: Fixed from version 6.6" | ||
5283 | |||
5284 | CVE_STATUS[CVE-2024-26581] = "fixed-version: Fixed from version 6.8" | ||
5285 | |||
5286 | CVE_STATUS[CVE-2024-26582] = "fixed-version: Fixed from version 6.8" | ||
5287 | |||
5288 | CVE_STATUS[CVE-2024-26583] = "fixed-version: Fixed from version 6.8" | ||
5289 | |||
5290 | CVE_STATUS[CVE-2024-26584] = "fixed-version: Fixed from version 6.8" | ||
5291 | |||
5292 | CVE_STATUS[CVE-2024-26585] = "fixed-version: Fixed from version 6.8" | ||
5293 | |||
5294 | CVE_STATUS[CVE-2024-26586] = "fixed-version: Fixed from version 6.8" | ||
5295 | |||
5296 | CVE_STATUS[CVE-2024-26587] = "fixed-version: Fixed from version 6.8" | ||
5297 | |||
5298 | CVE_STATUS[CVE-2024-26588] = "fixed-version: Fixed from version 6.8" | ||
5299 | |||
5300 | CVE_STATUS[CVE-2024-26589] = "fixed-version: Fixed from version 6.8" | ||
5301 | |||
5302 | CVE_STATUS[CVE-2024-26590] = "fixed-version: Fixed from version 6.8" | ||
5303 | |||
5304 | CVE_STATUS[CVE-2024-26591] = "fixed-version: Fixed from version 6.8" | ||
5305 | |||
5306 | CVE_STATUS[CVE-2024-26592] = "fixed-version: Fixed from version 6.8" | ||
5307 | |||
5308 | CVE_STATUS[CVE-2024-26593] = "fixed-version: Fixed from version 6.8" | ||
5309 | |||
5310 | CVE_STATUS[CVE-2024-26594] = "fixed-version: Fixed from version 6.8" | ||
5311 | |||
5312 | CVE_STATUS[CVE-2024-26595] = "fixed-version: Fixed from version 6.8" | ||
5313 | |||
5314 | CVE_STATUS[CVE-2024-26596] = "fixed-version: Fixed from version 6.8" | ||
5315 | |||
5316 | CVE_STATUS[CVE-2024-26597] = "fixed-version: Fixed from version 6.8" | ||
5317 | |||
5318 | CVE_STATUS[CVE-2024-26598] = "fixed-version: Fixed from version 6.8" | ||
5319 | |||
5320 | CVE_STATUS[CVE-2024-26599] = "fixed-version: Fixed from version 6.8" | ||
5321 | |||
5322 | CVE_STATUS[CVE-2024-26600] = "fixed-version: Fixed from version 6.8" | ||
5323 | |||
5324 | CVE_STATUS[CVE-2024-26601] = "fixed-version: Fixed from version 6.8" | ||
5325 | |||
5326 | CVE_STATUS[CVE-2024-26602] = "fixed-version: Fixed from version 6.8" | ||
5327 | |||
5328 | CVE_STATUS[CVE-2024-26603] = "fixed-version: Fixed from version 6.8" | ||
5329 | |||
5330 | CVE_STATUS[CVE-2024-26604] = "fixed-version: Fixed from version 6.8" | ||
5331 | |||
5332 | CVE_STATUS[CVE-2024-26605] = "fixed-version: Fixed from version 6.8" | ||
5333 | |||
5334 | CVE_STATUS[CVE-2024-26606] = "fixed-version: Fixed from version 6.8" | ||
5335 | |||
5336 | CVE_STATUS[CVE-2024-26607] = "fixed-version: Fixed from version 6.8" | ||
5337 | |||
5338 | CVE_STATUS[CVE-2024-26608] = "fixed-version: Fixed from version 6.8" | ||
5339 | |||
5340 | CVE_STATUS[CVE-2024-26610] = "fixed-version: Fixed from version 6.8" | ||
5341 | |||
5342 | CVE_STATUS[CVE-2024-26611] = "fixed-version: Fixed from version 6.8" | ||
5343 | |||
5344 | CVE_STATUS[CVE-2024-26612] = "fixed-version: Fixed from version 6.8" | ||
5345 | |||
5346 | CVE_STATUS[CVE-2024-26614] = "fixed-version: Fixed from version 6.8" | ||
5347 | |||
5348 | CVE_STATUS[CVE-2024-26615] = "fixed-version: Fixed from version 6.8" | ||
5349 | |||
5350 | CVE_STATUS[CVE-2024-26616] = "fixed-version: Fixed from version 6.8" | ||
5351 | |||
5352 | CVE_STATUS[CVE-2024-26617] = "fixed-version: Fixed from version 6.8" | ||
5353 | |||
5354 | CVE_STATUS[CVE-2024-26618] = "fixed-version: Fixed from version 6.8" | ||
5355 | |||
5356 | CVE_STATUS[CVE-2024-26619] = "fixed-version: Fixed from version 6.8" | ||
5357 | |||
5358 | CVE_STATUS[CVE-2024-26620] = "fixed-version: Fixed from version 6.8" | ||
5359 | |||
5360 | CVE_STATUS[CVE-2024-26621] = "fixed-version: Fixed from version 6.8" | ||
5361 | |||
5362 | CVE_STATUS[CVE-2024-26622] = "fixed-version: Fixed from version 6.8" | ||
5363 | |||
5364 | CVE_STATUS[CVE-2024-26623] = "fixed-version: Fixed from version 6.8" | ||
5365 | |||
5366 | CVE_STATUS[CVE-2024-26625] = "fixed-version: Fixed from version 6.8" | ||
5367 | |||
5368 | CVE_STATUS[CVE-2024-26626] = "fixed-version: Fixed from version 6.7.4" | ||
5369 | |||
5370 | CVE_STATUS[CVE-2024-26627] = "fixed-version: Fixed from version 6.8" | ||
5371 | |||
5372 | CVE_STATUS[CVE-2024-26629] = "fixed-version: Fixed from version 6.8" | ||
5373 | |||
5374 | CVE_STATUS[CVE-2024-26630] = "fixed-version: Fixed from version 6.8" | ||
5375 | |||
5376 | CVE_STATUS[CVE-2024-26631] = "fixed-version: Fixed from version 6.8" | ||
5377 | |||
5378 | CVE_STATUS[CVE-2024-26632] = "fixed-version: Fixed from version 6.8" | ||
5379 | |||
5380 | CVE_STATUS[CVE-2024-26633] = "fixed-version: Fixed from version 6.8" | ||
5381 | |||
5382 | CVE_STATUS[CVE-2024-26634] = "fixed-version: Fixed from version 6.8" | ||
5383 | |||
5384 | CVE_STATUS[CVE-2024-26635] = "fixed-version: Fixed from version 6.8" | ||
5385 | |||
5386 | CVE_STATUS[CVE-2024-26636] = "fixed-version: Fixed from version 6.8" | ||
5387 | |||
5388 | CVE_STATUS[CVE-2024-26637] = "fixed-version: Fixed from version 6.8" | ||
5389 | |||
5390 | CVE_STATUS[CVE-2024-26638] = "fixed-version: Fixed from version 6.8" | ||
5391 | |||
5392 | CVE_STATUS[CVE-2024-26640] = "fixed-version: Fixed from version 6.8" | ||
5393 | |||
5394 | CVE_STATUS[CVE-2024-26641] = "fixed-version: Fixed from version 6.8" | ||
5395 | |||
5396 | CVE_STATUS[CVE-2024-26642] = "fixed-version: Fixed from version 6.8" | ||
5397 | |||
5398 | CVE_STATUS[CVE-2024-26643] = "fixed-version: Fixed from version 6.8" | ||
5399 | |||
5400 | CVE_STATUS[CVE-2024-26644] = "fixed-version: Fixed from version 6.8" | ||
5401 | |||
5402 | CVE_STATUS[CVE-2024-26645] = "fixed-version: Fixed from version 6.8" | ||
5403 | |||
5404 | CVE_STATUS[CVE-2024-26646] = "fixed-version: Fixed from version 6.8" | ||
5405 | |||
5406 | CVE_STATUS[CVE-2024-26647] = "fixed-version: Fixed from version 6.8" | ||
5407 | |||
5408 | CVE_STATUS[CVE-2024-26648] = "fixed-version: Fixed from version 6.8" | ||
5409 | |||
5410 | CVE_STATUS[CVE-2024-26649] = "fixed-version: Fixed from version 6.8" | ||
5411 | |||
5412 | CVE_STATUS[CVE-2024-26651] = "fixed-version: Fixed from version 6.9" | ||
5413 | |||
5414 | CVE_STATUS[CVE-2024-26652] = "fixed-version: Fixed from version 6.8" | ||
5415 | |||
5416 | CVE_STATUS[CVE-2024-26653] = "fixed-version: Fixed from version 6.9" | ||
5417 | |||
5418 | CVE_STATUS[CVE-2024-26654] = "fixed-version: Fixed from version 6.9" | ||
5419 | |||
5420 | CVE_STATUS[CVE-2024-26655] = "fixed-version: Fixed from version 6.9" | ||
5421 | |||
5422 | CVE_STATUS[CVE-2024-26656] = "fixed-version: Fixed from version 6.9" | ||
5423 | |||
5424 | CVE_STATUS[CVE-2024-26657] = "fixed-version: Fixed from version 6.9" | ||
5425 | |||
5426 | CVE_STATUS[CVE-2024-26658] = "fixed-version: Fixed from version 6.8" | ||
5427 | |||
5428 | CVE_STATUS[CVE-2024-26659] = "fixed-version: Fixed from version 6.8" | ||
5429 | |||
5430 | CVE_STATUS[CVE-2024-26660] = "fixed-version: Fixed from version 6.8" | ||
5431 | |||
5432 | CVE_STATUS[CVE-2024-26661] = "fixed-version: Fixed from version 6.8" | ||
5433 | |||
5434 | CVE_STATUS[CVE-2024-26662] = "fixed-version: Fixed from version 6.8" | ||
5435 | |||
5436 | CVE_STATUS[CVE-2024-26663] = "fixed-version: Fixed from version 6.8" | ||
5437 | |||
5438 | CVE_STATUS[CVE-2024-26664] = "fixed-version: Fixed from version 6.8" | ||
5439 | |||
5440 | CVE_STATUS[CVE-2024-26665] = "fixed-version: Fixed from version 6.8" | ||
5441 | |||
5442 | CVE_STATUS[CVE-2024-26666] = "fixed-version: Fixed from version 6.8" | ||
5443 | |||
5444 | CVE_STATUS[CVE-2024-26667] = "fixed-version: Fixed from version 6.8" | ||
5445 | |||
5446 | CVE_STATUS[CVE-2024-26668] = "fixed-version: Fixed from version 6.8" | ||
5447 | |||
5448 | CVE_STATUS[CVE-2024-26669] = "fixed-version: Fixed from version 6.8" | ||
5449 | |||
5450 | CVE_STATUS[CVE-2024-26670] = "fixed-version: Fixed from version 6.8" | ||
5451 | |||
5452 | CVE_STATUS[CVE-2024-26671] = "fixed-version: Fixed from version 6.8" | ||
5453 | |||
5454 | CVE_STATUS[CVE-2024-26672] = "fixed-version: Fixed from version 6.8" | ||
5455 | |||
5456 | CVE_STATUS[CVE-2024-26673] = "fixed-version: Fixed from version 6.8" | ||
5457 | |||
5458 | CVE_STATUS[CVE-2024-26674] = "fixed-version: Fixed from version 6.8" | ||
5459 | |||
5460 | CVE_STATUS[CVE-2024-26675] = "fixed-version: Fixed from version 6.8" | ||
5461 | |||
5462 | CVE_STATUS[CVE-2024-26676] = "fixed-version: Fixed from version 6.8" | ||
5463 | |||
5464 | CVE_STATUS[CVE-2024-26677] = "fixed-version: Fixed from version 6.8" | ||
5465 | |||
5466 | CVE_STATUS[CVE-2024-26678] = "fixed-version: Fixed from version 6.8" | ||
5467 | |||
5468 | CVE_STATUS[CVE-2024-26679] = "fixed-version: Fixed from version 6.8" | ||
5469 | |||
5470 | CVE_STATUS[CVE-2024-26680] = "fixed-version: Fixed from version 6.8" | ||
5471 | |||
5472 | CVE_STATUS[CVE-2024-26681] = "fixed-version: Fixed from version 6.8" | ||
5473 | |||
5474 | CVE_STATUS[CVE-2024-26682] = "fixed-version: Fixed from version 6.8" | ||
5475 | |||
5476 | CVE_STATUS[CVE-2024-26683] = "fixed-version: Fixed from version 6.8" | ||
5477 | |||
5478 | CVE_STATUS[CVE-2024-26684] = "fixed-version: Fixed from version 6.8" | ||
5479 | |||
5480 | CVE_STATUS[CVE-2024-26685] = "fixed-version: Fixed from version 6.8" | ||
5481 | |||
5482 | CVE_STATUS[CVE-2024-26686] = "fixed-version: Fixed from version 6.8" | ||
5483 | |||
5484 | CVE_STATUS[CVE-2024-26687] = "fixed-version: Fixed from version 6.8" | ||
5485 | |||
5486 | CVE_STATUS[CVE-2024-26688] = "fixed-version: Fixed from version 6.8" | ||
5487 | |||
5488 | CVE_STATUS[CVE-2024-26689] = "fixed-version: Fixed from version 6.8" | ||
5489 | |||
5490 | CVE_STATUS[CVE-2024-26690] = "fixed-version: Fixed from version 6.8" | ||
5491 | |||
5492 | CVE_STATUS[CVE-2024-26691] = "fixed-version: Fixed from version 6.8" | ||
5493 | |||
5494 | CVE_STATUS[CVE-2024-26692] = "fixed-version: Fixed from version 6.8" | ||
5495 | |||
5496 | CVE_STATUS[CVE-2024-26693] = "fixed-version: Fixed from version 6.8" | ||
5497 | |||
5498 | CVE_STATUS[CVE-2024-26694] = "fixed-version: Fixed from version 6.8" | ||
5499 | |||
5500 | CVE_STATUS[CVE-2024-26695] = "fixed-version: Fixed from version 6.8" | ||
5501 | |||
5502 | CVE_STATUS[CVE-2024-26696] = "fixed-version: Fixed from version 6.8" | ||
5503 | |||
5504 | CVE_STATUS[CVE-2024-26697] = "fixed-version: Fixed from version 6.8" | ||
5505 | |||
5506 | CVE_STATUS[CVE-2024-26698] = "fixed-version: Fixed from version 6.8" | ||
5507 | |||
5508 | CVE_STATUS[CVE-2024-26699] = "fixed-version: Fixed from version 6.8" | ||
5509 | |||
5510 | CVE_STATUS[CVE-2024-26700] = "fixed-version: Fixed from version 6.8" | ||
5511 | |||
5512 | CVE_STATUS[CVE-2024-26702] = "fixed-version: Fixed from version 6.8" | ||
5513 | |||
5514 | CVE_STATUS[CVE-2024-26703] = "fixed-version: Fixed from version 6.8" | ||
5515 | |||
5516 | CVE_STATUS[CVE-2024-26704] = "fixed-version: Fixed from version 6.8" | ||
5517 | |||
5518 | CVE_STATUS[CVE-2024-26705] = "fixed-version: Fixed from version 6.8" | ||
5519 | |||
5520 | CVE_STATUS[CVE-2024-26706] = "fixed-version: Fixed from version 6.8" | ||
5521 | |||
5522 | CVE_STATUS[CVE-2024-26707] = "fixed-version: Fixed from version 6.8" | ||
5523 | |||
5524 | CVE_STATUS[CVE-2024-26708] = "fixed-version: Fixed from version 6.8" | ||
5525 | |||
5526 | CVE_STATUS[CVE-2024-26709] = "fixed-version: Fixed from version 6.8" | ||
5527 | |||
5528 | # CVE-2024-26710 has no known resolution | ||
5529 | |||
5530 | CVE_STATUS[CVE-2024-26711] = "fixed-version: Fixed from version 6.8" | ||
5531 | |||
5532 | CVE_STATUS[CVE-2024-26712] = "fixed-version: Fixed from version 6.8" | ||
5533 | |||
5534 | CVE_STATUS[CVE-2024-26714] = "fixed-version: Fixed from version 6.8" | ||
5535 | |||
5536 | CVE_STATUS[CVE-2024-26715] = "fixed-version: Fixed from version 6.8" | ||
5537 | |||
5538 | CVE_STATUS[CVE-2024-26716] = "fixed-version: Fixed from version 6.8" | ||
5539 | |||
5540 | CVE_STATUS[CVE-2024-26717] = "fixed-version: Fixed from version 6.8" | ||
5541 | |||
5542 | CVE_STATUS[CVE-2024-26718] = "fixed-version: Fixed from version 6.8" | ||
5543 | |||
5544 | CVE_STATUS[CVE-2024-26719] = "fixed-version: Fixed from version 6.8" | ||
5545 | |||
5546 | CVE_STATUS[CVE-2024-26721] = "fixed-version: Fixed from version 6.8" | ||
5547 | |||
5548 | CVE_STATUS[CVE-2024-26722] = "fixed-version: Fixed from version 6.8" | ||
5549 | |||
5550 | CVE_STATUS[CVE-2024-26723] = "fixed-version: Fixed from version 6.8" | ||
5551 | |||
5552 | CVE_STATUS[CVE-2024-26724] = "fixed-version: Fixed from version 6.8" | ||
5553 | |||
5554 | CVE_STATUS[CVE-2024-26725] = "fixed-version: Fixed from version 6.8" | ||
5555 | |||
5556 | CVE_STATUS[CVE-2024-26726] = "fixed-version: Fixed from version 6.8" | ||
5557 | |||
5558 | CVE_STATUS[CVE-2024-26727] = "fixed-version: Fixed from version 6.8" | ||
5559 | |||
5560 | CVE_STATUS[CVE-2024-26728] = "fixed-version: Fixed from version 6.8" | ||
5561 | |||
5562 | CVE_STATUS[CVE-2024-26729] = "fixed-version: Fixed from version 6.8" | ||
5563 | |||
5564 | CVE_STATUS[CVE-2024-26730] = "fixed-version: Fixed from version 6.8" | ||
5565 | |||
5566 | CVE_STATUS[CVE-2024-26731] = "fixed-version: Fixed from version 6.8" | ||
5567 | |||
5568 | CVE_STATUS[CVE-2024-26732] = "fixed-version: Fixed from version 6.8" | ||
5569 | |||
5570 | CVE_STATUS[CVE-2024-26733] = "fixed-version: Fixed from version 6.8" | ||
5571 | |||
5572 | CVE_STATUS[CVE-2024-26734] = "fixed-version: Fixed from version 6.8" | ||
5573 | |||
5574 | CVE_STATUS[CVE-2024-26735] = "fixed-version: Fixed from version 6.8" | ||
5575 | |||
5576 | CVE_STATUS[CVE-2024-26736] = "fixed-version: Fixed from version 6.8" | ||
5577 | |||
5578 | CVE_STATUS[CVE-2024-26737] = "fixed-version: Fixed from version 6.8" | ||
5579 | |||
5580 | CVE_STATUS[CVE-2024-26738] = "fixed-version: Fixed from version 6.8" | ||
5581 | |||
5582 | CVE_STATUS[CVE-2024-26739] = "fixed-version: Fixed from version 6.8" | ||
5583 | |||
5584 | CVE_STATUS[CVE-2024-26740] = "fixed-version: Fixed from version 6.8" | ||
5585 | |||
5586 | CVE_STATUS[CVE-2024-26741] = "fixed-version: Fixed from version 6.8" | ||
5587 | |||
5588 | CVE_STATUS[CVE-2024-26742] = "fixed-version: Fixed from version 6.8" | ||
5589 | |||
5590 | CVE_STATUS[CVE-2024-26743] = "fixed-version: Fixed from version 6.8" | ||
5591 | |||
5592 | CVE_STATUS[CVE-2024-26744] = "fixed-version: Fixed from version 6.8" | ||
5593 | |||
5594 | CVE_STATUS[CVE-2024-26745] = "fixed-version: Fixed from version 6.8" | ||
5595 | |||
5596 | CVE_STATUS[CVE-2024-26746] = "fixed-version: Fixed from version 6.8" | ||
5597 | |||
5598 | CVE_STATUS[CVE-2024-26747] = "fixed-version: Fixed from version 6.8" | ||
5599 | |||
5600 | CVE_STATUS[CVE-2024-26748] = "fixed-version: Fixed from version 6.8" | ||
5601 | |||
5602 | CVE_STATUS[CVE-2024-26749] = "fixed-version: Fixed from version 6.8" | ||
5603 | |||
5604 | CVE_STATUS[CVE-2024-26750] = "fixed-version: Fixed from version 5.15.151" | ||
5605 | |||
5606 | CVE_STATUS[CVE-2024-26751] = "fixed-version: Fixed from version 6.8" | ||
5607 | |||
5608 | CVE_STATUS[CVE-2024-26752] = "fixed-version: Fixed from version 6.8" | ||
5609 | |||
5610 | CVE_STATUS[CVE-2024-26753] = "fixed-version: Fixed from version 6.8" | ||
5611 | |||
5612 | CVE_STATUS[CVE-2024-26754] = "fixed-version: Fixed from version 6.8" | ||
5613 | |||
5614 | CVE_STATUS[CVE-2024-26755] = "fixed-version: Fixed from version 6.8" | ||
5615 | |||
5616 | CVE_STATUS[CVE-2024-26756] = "fixed-version: Fixed from version 6.8" | ||
5617 | |||
5618 | CVE_STATUS[CVE-2024-26757] = "fixed-version: Fixed from version 6.8" | ||
5619 | |||
5620 | CVE_STATUS[CVE-2024-26758] = "fixed-version: Fixed from version 6.8" | ||
5621 | |||
5622 | CVE_STATUS[CVE-2024-26759] = "fixed-version: Fixed from version 6.8" | ||
5623 | |||
5624 | CVE_STATUS[CVE-2024-26760] = "fixed-version: Fixed from version 6.8" | ||
5625 | |||
5626 | CVE_STATUS[CVE-2024-26761] = "fixed-version: Fixed from version 6.8" | ||
5627 | |||
5628 | CVE_STATUS[CVE-2024-26762] = "fixed-version: Fixed from version 6.8" | ||
5629 | |||
5630 | CVE_STATUS[CVE-2024-26763] = "fixed-version: Fixed from version 6.8" | ||
5631 | |||
5632 | CVE_STATUS[CVE-2024-26764] = "fixed-version: Fixed from version 6.8" | ||
5633 | |||
5634 | CVE_STATUS[CVE-2024-26765] = "fixed-version: Fixed from version 6.8" | ||
5635 | |||
5636 | CVE_STATUS[CVE-2024-26766] = "fixed-version: Fixed from version 6.8" | ||
5637 | |||
5638 | CVE_STATUS[CVE-2024-26767] = "fixed-version: Fixed from version 6.8" | ||
5639 | |||
5640 | CVE_STATUS[CVE-2024-26768] = "fixed-version: Fixed from version 6.8" | ||
5641 | |||
5642 | CVE_STATUS[CVE-2024-26769] = "fixed-version: Fixed from version 6.8" | ||
5643 | |||
5644 | CVE_STATUS[CVE-2024-26770] = "fixed-version: Fixed from version 6.8" | ||
5645 | |||
5646 | CVE_STATUS[CVE-2024-26771] = "fixed-version: Fixed from version 6.8" | ||
5647 | |||
5648 | CVE_STATUS[CVE-2024-26772] = "fixed-version: Fixed from version 6.8" | ||
5649 | |||
5650 | CVE_STATUS[CVE-2024-26773] = "fixed-version: Fixed from version 6.8" | ||
5651 | |||
5652 | CVE_STATUS[CVE-2024-26774] = "fixed-version: Fixed from version 6.8" | ||
5653 | |||
5654 | CVE_STATUS[CVE-2024-26775] = "fixed-version: Fixed from version 6.8" | ||
5655 | |||
5656 | CVE_STATUS[CVE-2024-26776] = "fixed-version: Fixed from version 6.8" | ||
5657 | |||
5658 | CVE_STATUS[CVE-2024-26777] = "fixed-version: Fixed from version 6.8" | ||
5659 | |||
5660 | CVE_STATUS[CVE-2024-26778] = "fixed-version: Fixed from version 6.8" | ||
5661 | |||
5662 | CVE_STATUS[CVE-2024-26779] = "fixed-version: Fixed from version 6.8" | ||
5663 | |||
5664 | CVE_STATUS[CVE-2024-26780] = "fixed-version: Fixed from version 6.7.9" | ||
5665 | |||
5666 | CVE_STATUS[CVE-2024-26781] = "fixed-version: Fixed from version 6.7.9" | ||
5667 | |||
5668 | CVE_STATUS[CVE-2024-26782] = "fixed-version: Fixed from version 6.8" | ||
5669 | |||
5670 | CVE_STATUS[CVE-2024-26783] = "fixed-version: Fixed from version 6.8" | ||
5671 | |||
5672 | CVE_STATUS[CVE-2024-26784] = "fixed-version: Fixed from version 6.8" | ||
5673 | |||
5674 | CVE_STATUS[CVE-2024-26785] = "fixed-version: Fixed from version 6.8" | ||
5675 | |||
5676 | CVE_STATUS[CVE-2024-26786] = "fixed-version: Fixed from version 6.8" | ||
5677 | |||
5678 | CVE_STATUS[CVE-2024-26787] = "fixed-version: Fixed from version 6.8" | ||
5679 | |||
5680 | CVE_STATUS[CVE-2024-26788] = "fixed-version: Fixed from version 6.8" | ||
5681 | |||
5682 | CVE_STATUS[CVE-2024-26789] = "fixed-version: Fixed from version 6.8" | ||
5683 | |||
5684 | CVE_STATUS[CVE-2024-26790] = "fixed-version: Fixed from version 6.8" | ||
5685 | |||
5686 | CVE_STATUS[CVE-2024-26791] = "fixed-version: Fixed from version 6.8" | ||
5687 | |||
5688 | CVE_STATUS[CVE-2024-26792] = "fixed-version: Fixed from version 6.7.9" | ||
5689 | |||
5690 | CVE_STATUS[CVE-2024-26793] = "fixed-version: Fixed from version 6.8" | ||
5691 | |||
5692 | CVE_STATUS[CVE-2024-26794] = "fixed-version: Fixed from version 6.7.9" | ||
5693 | |||
5694 | CVE_STATUS[CVE-2024-26795] = "fixed-version: Fixed from version 6.8" | ||
5695 | |||
5696 | CVE_STATUS[CVE-2024-26796] = "fixed-version: Fixed from version 6.8" | ||
5697 | |||
5698 | CVE_STATUS[CVE-2024-26797] = "fixed-version: Fixed from version 6.8" | ||
5699 | |||
5700 | CVE_STATUS[CVE-2024-26798] = "fixed-version: Fixed from version 6.8" | ||
5701 | |||
5702 | CVE_STATUS[CVE-2024-26799] = "fixed-version: Fixed from version 6.8" | ||
5703 | |||
5704 | CVE_STATUS[CVE-2024-26800] = "fixed-version: Fixed from version 6.7.9" | ||
5705 | |||
5706 | CVE_STATUS[CVE-2024-26801] = "fixed-version: Fixed from version 6.8" | ||
5707 | |||
5708 | CVE_STATUS[CVE-2024-26802] = "fixed-version: Fixed from version 6.8" | ||
5709 | |||
5710 | CVE_STATUS[CVE-2024-26803] = "fixed-version: Fixed from version 6.8" | ||
5711 | |||
5712 | CVE_STATUS[CVE-2024-26804] = "fixed-version: Fixed from version 6.8" | ||
5713 | |||
5714 | CVE_STATUS[CVE-2024-26805] = "fixed-version: Fixed from version 6.8" | ||
5715 | |||
5716 | CVE_STATUS[CVE-2024-26806] = "fixed-version: Fixed from version 6.8" | ||
5717 | |||
5718 | CVE_STATUS[CVE-2024-26807] = "fixed-version: Fixed from version 6.8" | ||
5719 | |||
5720 | CVE_STATUS[CVE-2024-26808] = "fixed-version: Fixed from version 6.8" | ||
5721 | |||
5722 | CVE_STATUS[CVE-2024-26809] = "fixed-version: Fixed from version 6.9" | ||
5723 | |||
5724 | CVE_STATUS[CVE-2024-26810] = "fixed-version: Fixed from version 6.9" | ||
5725 | |||
5726 | CVE_STATUS[CVE-2024-26811] = "fixed-version: Fixed from version 6.9" | ||
5727 | |||
5728 | CVE_STATUS[CVE-2024-26812] = "fixed-version: Fixed from version 6.9" | ||
5729 | |||
5730 | CVE_STATUS[CVE-2024-26813] = "fixed-version: Fixed from version 6.9" | ||
5731 | |||
5732 | CVE_STATUS[CVE-2024-26814] = "fixed-version: Fixed from version 6.9" | ||
5733 | |||
5734 | CVE_STATUS[CVE-2024-26815] = "fixed-version: Fixed from version 6.9" | ||
5735 | |||
5736 | CVE_STATUS[CVE-2024-26816] = "fixed-version: Fixed from version 6.9" | ||
5737 | |||
5738 | CVE_STATUS[CVE-2024-26817] = "fixed-version: Fixed from version 6.9" | ||
5739 | |||
5740 | CVE_STATUS[CVE-2024-26818] = "fixed-version: Fixed from version 6.8" | ||
5741 | |||
5742 | CVE_STATUS[CVE-2024-26820] = "fixed-version: Fixed from version 6.8" | ||
5743 | |||
5744 | CVE_STATUS[CVE-2024-26822] = "fixed-version: Fixed from version 6.8" | ||
5745 | |||
5746 | CVE_STATUS[CVE-2024-26823] = "fixed-version: Fixed from version 6.8" | ||
5747 | |||
5748 | CVE_STATUS[CVE-2024-26824] = "fixed-version: Fixed from version 6.8" | ||
5749 | |||
5750 | CVE_STATUS[CVE-2024-26825] = "fixed-version: Fixed from version 6.8" | ||
5751 | |||
5752 | CVE_STATUS[CVE-2024-26826] = "fixed-version: Fixed from version 6.8" | ||
5753 | |||
5754 | CVE_STATUS[CVE-2024-26828] = "fixed-version: Fixed from version 6.8" | ||
5755 | |||
5756 | CVE_STATUS[CVE-2024-26829] = "fixed-version: Fixed from version 6.8" | ||
5757 | |||
5758 | CVE_STATUS[CVE-2024-26830] = "fixed-version: Fixed from version 6.8" | ||
5759 | |||
5760 | CVE_STATUS[CVE-2024-26831] = "fixed-version: Fixed from version 6.8" | ||
5761 | |||
5762 | CVE_STATUS[CVE-2024-26832] = "fixed-version: Fixed from version 6.8" | ||
5763 | |||
5764 | CVE_STATUS[CVE-2024-26833] = "fixed-version: Fixed from version 6.8" | ||
5765 | |||
5766 | CVE_STATUS[CVE-2024-26834] = "fixed-version: Fixed from version 6.8" | ||
5767 | |||
5768 | CVE_STATUS[CVE-2024-26835] = "fixed-version: Fixed from version 6.8" | ||
5769 | |||
5770 | CVE_STATUS[CVE-2024-26836] = "fixed-version: Fixed from version 6.8" | ||
5771 | |||
5772 | CVE_STATUS[CVE-2024-26837] = "fixed-version: Fixed from version 6.8" | ||
5773 | |||
5774 | CVE_STATUS[CVE-2024-26838] = "fixed-version: Fixed from version 6.8" | ||
5775 | |||
5776 | CVE_STATUS[CVE-2024-26839] = "fixed-version: Fixed from version 6.8" | ||
5777 | |||
5778 | CVE_STATUS[CVE-2024-26840] = "fixed-version: Fixed from version 6.8" | ||
5779 | |||
5780 | CVE_STATUS[CVE-2024-26841] = "fixed-version: Fixed from version 6.8" | ||
5781 | |||
5782 | CVE_STATUS[CVE-2024-26842] = "fixed-version: Fixed from version 6.8" | ||
5783 | |||
5784 | CVE_STATUS[CVE-2024-26843] = "fixed-version: Fixed from version 6.8" | ||
5785 | |||
5786 | CVE_STATUS[CVE-2024-26844] = "fixed-version: Fixed from version 6.8" | ||
5787 | |||
5788 | CVE_STATUS[CVE-2024-26845] = "fixed-version: Fixed from version 6.8" | ||
5789 | |||
5790 | CVE_STATUS[CVE-2024-26846] = "fixed-version: Fixed from version 6.8" | ||
5791 | |||
5792 | CVE_STATUS[CVE-2024-26847] = "fixed-version: Fixed from version 6.8" | ||
5793 | |||
5794 | CVE_STATUS[CVE-2024-26849] = "fixed-version: Fixed from version 6.8" | ||
5795 | |||
5796 | CVE_STATUS[CVE-2024-26850] = "fixed-version: Fixed from version 6.8" | ||
5797 | |||
5798 | CVE_STATUS[CVE-2024-26851] = "fixed-version: Fixed from version 6.8" | ||
5799 | |||
5800 | CVE_STATUS[CVE-2024-26852] = "fixed-version: Fixed from version 6.8" | ||
5801 | |||
5802 | CVE_STATUS[CVE-2024-26853] = "fixed-version: Fixed from version 6.8" | ||
5803 | |||
5804 | CVE_STATUS[CVE-2024-26854] = "fixed-version: Fixed from version 6.8" | ||
5805 | |||
5806 | CVE_STATUS[CVE-2024-26855] = "fixed-version: Fixed from version 6.8" | ||
5807 | |||
5808 | CVE_STATUS[CVE-2024-26856] = "fixed-version: Fixed from version 6.8" | ||
5809 | |||
5810 | CVE_STATUS[CVE-2024-26857] = "fixed-version: Fixed from version 6.8" | ||
5811 | |||
5812 | CVE_STATUS[CVE-2024-26858] = "fixed-version: Fixed from version 6.8" | ||
5813 | |||
5814 | CVE_STATUS[CVE-2024-26859] = "fixed-version: Fixed from version 6.9" | ||
5815 | |||
5816 | CVE_STATUS[CVE-2024-26860] = "fixed-version: Fixed from version 6.9" | ||
5817 | |||
5818 | CVE_STATUS[CVE-2024-26861] = "fixed-version: Fixed from version 6.9" | ||
5819 | |||
5820 | CVE_STATUS[CVE-2024-26862] = "fixed-version: Fixed from version 6.9" | ||
5821 | |||
5822 | CVE_STATUS[CVE-2024-26863] = "fixed-version: Fixed from version 6.9" | ||
5823 | |||
5824 | CVE_STATUS[CVE-2024-26864] = "fixed-version: Fixed from version 6.9" | ||
5825 | |||
5826 | CVE_STATUS[CVE-2024-26865] = "fixed-version: Fixed from version 6.9" | ||
5827 | |||
5828 | CVE_STATUS[CVE-2024-26866] = "fixed-version: Fixed from version 6.9" | ||
5829 | |||
5830 | CVE_STATUS[CVE-2024-26867] = "fixed-version: Fixed from version 6.8" | ||
5831 | |||
5832 | CVE_STATUS[CVE-2024-26868] = "fixed-version: Fixed from version 6.9" | ||
5833 | |||
5834 | CVE_STATUS[CVE-2024-26869] = "fixed-version: Fixed from version 6.9" | ||
5835 | |||
5836 | CVE_STATUS[CVE-2024-26870] = "fixed-version: Fixed from version 6.9" | ||
5837 | |||
5838 | CVE_STATUS[CVE-2024-26871] = "fixed-version: Fixed from version 6.9" | ||
5839 | |||
5840 | CVE_STATUS[CVE-2024-26872] = "fixed-version: Fixed from version 6.9" | ||
5841 | |||
5842 | CVE_STATUS[CVE-2024-26873] = "fixed-version: Fixed from version 6.9" | ||
5843 | |||
5844 | CVE_STATUS[CVE-2024-26874] = "fixed-version: Fixed from version 6.9" | ||
5845 | |||
5846 | CVE_STATUS[CVE-2024-26875] = "fixed-version: Fixed from version 6.9" | ||
5847 | |||
5848 | CVE_STATUS[CVE-2024-26876] = "fixed-version: Fixed from version 6.9" | ||
5849 | |||
5850 | CVE_STATUS[CVE-2024-26877] = "fixed-version: Fixed from version 6.9" | ||
5851 | |||
5852 | CVE_STATUS[CVE-2024-26878] = "fixed-version: Fixed from version 6.9" | ||
5853 | |||
5854 | CVE_STATUS[CVE-2024-26879] = "fixed-version: Fixed from version 6.9" | ||
5855 | |||
5856 | CVE_STATUS[CVE-2024-26880] = "fixed-version: Fixed from version 6.9" | ||
5857 | |||
5858 | CVE_STATUS[CVE-2024-26881] = "fixed-version: Fixed from version 6.9" | ||
5859 | |||
5860 | CVE_STATUS[CVE-2024-26882] = "fixed-version: Fixed from version 6.9" | ||
5861 | |||
5862 | CVE_STATUS[CVE-2024-26883] = "fixed-version: Fixed from version 6.9" | ||
5863 | |||
5864 | CVE_STATUS[CVE-2024-26884] = "fixed-version: Fixed from version 6.9" | ||
5865 | |||
5866 | CVE_STATUS[CVE-2024-26885] = "fixed-version: Fixed from version 6.9" | ||
5867 | |||
5868 | CVE_STATUS[CVE-2024-26886] = "fixed-version: Fixed from version 6.9" | ||
5869 | |||
5870 | CVE_STATUS[CVE-2024-26887] = "fixed-version: Fixed from version 6.9" | ||
5871 | |||
5872 | CVE_STATUS[CVE-2024-26888] = "fixed-version: Fixed from version 6.9" | ||
5873 | |||
5874 | CVE_STATUS[CVE-2024-26889] = "fixed-version: Fixed from version 6.9" | ||
5875 | |||
5876 | CVE_STATUS[CVE-2024-26890] = "fixed-version: Fixed from version 6.9" | ||
5877 | |||
5878 | CVE_STATUS[CVE-2024-26891] = "fixed-version: Fixed from version 6.9" | ||
5879 | |||
5880 | CVE_STATUS[CVE-2024-26892] = "fixed-version: Fixed from version 6.9" | ||
5881 | |||
5882 | CVE_STATUS[CVE-2024-26893] = "fixed-version: Fixed from version 6.9" | ||
5883 | |||
5884 | CVE_STATUS[CVE-2024-26894] = "fixed-version: Fixed from version 6.9" | ||
5885 | |||
5886 | CVE_STATUS[CVE-2024-26895] = "fixed-version: Fixed from version 6.9" | ||
5887 | |||
5888 | CVE_STATUS[CVE-2024-26896] = "fixed-version: Fixed from version 6.9" | ||
5889 | |||
5890 | CVE_STATUS[CVE-2024-26897] = "fixed-version: Fixed from version 6.9" | ||
5891 | |||
5892 | CVE_STATUS[CVE-2024-26898] = "fixed-version: Fixed from version 6.9" | ||
5893 | |||
5894 | CVE_STATUS[CVE-2024-26899] = "fixed-version: Fixed from version 6.9" | ||
5895 | |||
5896 | CVE_STATUS[CVE-2024-26900] = "fixed-version: Fixed from version 6.9" | ||
5897 | |||
5898 | CVE_STATUS[CVE-2024-26901] = "fixed-version: Fixed from version 6.9" | ||
5899 | |||
5900 | CVE_STATUS[CVE-2024-26902] = "fixed-version: Fixed from version 6.8" | ||
5901 | |||
5902 | CVE_STATUS[CVE-2024-26903] = "fixed-version: Fixed from version 6.8" | ||
5903 | |||
5904 | CVE_STATUS[CVE-2024-26906] = "fixed-version: Fixed from version 6.8" | ||
5905 | |||
5906 | CVE_STATUS[CVE-2024-26907] = "fixed-version: Fixed from version 6.8" | ||
5907 | |||
5908 | CVE_STATUS[CVE-2024-26909] = "fixed-version: Fixed from version 6.8" | ||
5909 | |||
5910 | CVE_STATUS[CVE-2024-26910] = "fixed-version: Fixed from version 6.8" | ||
5911 | |||
5912 | CVE_STATUS[CVE-2024-26911] = "fixed-version: Fixed from version 6.8" | ||
5913 | |||
5914 | CVE_STATUS[CVE-2024-26912] = "fixed-version: Fixed from version 6.8" | ||
5915 | |||
5916 | CVE_STATUS[CVE-2024-26913] = "fixed-version: Fixed from version 6.8" | ||
5917 | |||
5918 | CVE_STATUS[CVE-2024-26914] = "fixed-version: Fixed from version 6.8" | ||
5919 | |||
5920 | CVE_STATUS[CVE-2024-26915] = "fixed-version: Fixed from version 6.8" | ||
5921 | |||
5922 | CVE_STATUS[CVE-2024-26916] = "fixed-version: Fixed from version 6.8" | ||
5923 | |||
5924 | CVE_STATUS[CVE-2024-26917] = "fixed-version: Fixed from version 6.8" | ||
5925 | |||
5926 | CVE_STATUS[CVE-2024-26918] = "fixed-version: Fixed from version 6.8" | ||
5927 | |||
5928 | CVE_STATUS[CVE-2024-26919] = "fixed-version: Fixed from version 6.8" | ||
5929 | |||
5930 | CVE_STATUS[CVE-2024-26920] = "fixed-version: Fixed from version 6.8" | ||
5931 | |||
5932 | CVE_STATUS[CVE-2024-26921] = "fixed-version: Fixed from version 6.9" | ||
5933 | |||
5934 | CVE_STATUS[CVE-2024-26922] = "fixed-version: Fixed from version 6.9" | ||
5935 | |||
5936 | CVE_STATUS[CVE-2024-26923] = "fixed-version: Fixed from version 6.9" | ||
5937 | |||
5938 | CVE_STATUS[CVE-2024-26924] = "fixed-version: Fixed from version 6.9" | ||
5939 | |||
5940 | CVE_STATUS[CVE-2024-26925] = "fixed-version: Fixed from version 6.9" | ||
5941 | |||
5942 | CVE_STATUS[CVE-2024-26926] = "fixed-version: Fixed from version 6.9" | ||
5943 | |||
5944 | CVE_STATUS[CVE-2024-26927] = "fixed-version: Fixed from version 6.9" | ||
5945 | |||
5946 | CVE_STATUS[CVE-2024-26928] = "fixed-version: Fixed from version 6.9" | ||
5947 | |||
5948 | CVE_STATUS[CVE-2024-26930] = "fixed-version: Fixed from version 6.9" | ||
5949 | |||
5950 | CVE_STATUS[CVE-2024-26931] = "fixed-version: Fixed from version 6.9" | ||
5951 | |||
5952 | CVE_STATUS[CVE-2024-26932] = "fixed-version: Fixed from version 6.9" | ||
5953 | |||
5954 | CVE_STATUS[CVE-2024-26933] = "fixed-version: Fixed from version 6.9" | ||
5955 | |||
5956 | CVE_STATUS[CVE-2024-26934] = "fixed-version: Fixed from version 6.9" | ||
5957 | |||
5958 | CVE_STATUS[CVE-2024-26935] = "fixed-version: Fixed from version 6.9" | ||
5959 | |||
5960 | CVE_STATUS[CVE-2024-26936] = "fixed-version: Fixed from version 6.9" | ||
5961 | |||
5962 | CVE_STATUS[CVE-2024-26937] = "fixed-version: Fixed from version 6.9" | ||
5963 | |||
5964 | CVE_STATUS[CVE-2024-26938] = "fixed-version: Fixed from version 6.9" | ||
5965 | |||
5966 | CVE_STATUS[CVE-2024-26939] = "fixed-version: Fixed from version 6.9" | ||
5967 | |||
5968 | CVE_STATUS[CVE-2024-26940] = "fixed-version: Fixed from version 6.9" | ||
5969 | |||
5970 | CVE_STATUS[CVE-2024-26941] = "fixed-version: Fixed from version 6.9" | ||
5971 | |||
5972 | CVE_STATUS[CVE-2024-26942] = "fixed-version: Fixed from version 6.9" | ||
5973 | |||
5974 | CVE_STATUS[CVE-2024-26943] = "fixed-version: Fixed from version 6.9" | ||
5975 | |||
5976 | CVE_STATUS[CVE-2024-26944] = "fixed-version: Fixed from version 6.9" | ||
5977 | |||
5978 | CVE_STATUS[CVE-2024-26945] = "fixed-version: Fixed from version 6.9" | ||
5979 | |||
5980 | CVE_STATUS[CVE-2024-26946] = "fixed-version: Fixed from version 6.9" | ||
5981 | |||
5982 | CVE_STATUS[CVE-2024-26947] = "fixed-version: Fixed from version 6.9" | ||
5983 | |||
5984 | CVE_STATUS[CVE-2024-26948] = "fixed-version: Fixed from version 6.9" | ||
5985 | |||
5986 | CVE_STATUS[CVE-2024-26949] = "fixed-version: Fixed from version 6.9" | ||
5987 | |||
5988 | CVE_STATUS[CVE-2024-26950] = "fixed-version: Fixed from version 6.9" | ||
5989 | |||
5990 | CVE_STATUS[CVE-2024-26951] = "fixed-version: Fixed from version 6.9" | ||
5991 | |||
5992 | CVE_STATUS[CVE-2024-26952] = "fixed-version: Fixed from version 6.9" | ||
5993 | |||
5994 | CVE_STATUS[CVE-2024-26953] = "fixed-version: Fixed from version 6.9" | ||
5995 | |||
5996 | CVE_STATUS[CVE-2024-26954] = "fixed-version: Fixed from version 6.9" | ||
5997 | |||
5998 | CVE_STATUS[CVE-2024-26955] = "fixed-version: Fixed from version 6.9" | ||
5999 | |||
6000 | CVE_STATUS[CVE-2024-26956] = "fixed-version: Fixed from version 6.9" | ||
6001 | |||
6002 | CVE_STATUS[CVE-2024-26957] = "fixed-version: Fixed from version 6.9" | ||
6003 | |||
6004 | CVE_STATUS[CVE-2024-26958] = "fixed-version: Fixed from version 6.9" | ||
6005 | |||
6006 | CVE_STATUS[CVE-2024-26959] = "fixed-version: Fixed from version 6.9" | ||
6007 | |||
6008 | CVE_STATUS[CVE-2024-26960] = "fixed-version: Fixed from version 6.9" | ||
6009 | |||
6010 | CVE_STATUS[CVE-2024-26961] = "fixed-version: Fixed from version 6.9" | ||
6011 | |||
6012 | CVE_STATUS[CVE-2024-26962] = "fixed-version: Fixed from version 6.9" | ||
6013 | |||
6014 | CVE_STATUS[CVE-2024-26963] = "fixed-version: Fixed from version 6.9" | ||
6015 | |||
6016 | CVE_STATUS[CVE-2024-26964] = "fixed-version: Fixed from version 6.9" | ||
6017 | |||
6018 | CVE_STATUS[CVE-2024-26965] = "fixed-version: Fixed from version 6.9" | ||
6019 | |||
6020 | CVE_STATUS[CVE-2024-26966] = "fixed-version: Fixed from version 6.9" | ||
6021 | |||
6022 | CVE_STATUS[CVE-2024-26967] = "fixed-version: Fixed from version 6.9" | ||
6023 | |||
6024 | CVE_STATUS[CVE-2024-26968] = "fixed-version: Fixed from version 6.9" | ||
6025 | |||
6026 | CVE_STATUS[CVE-2024-26969] = "fixed-version: Fixed from version 6.9" | ||
6027 | |||
6028 | CVE_STATUS[CVE-2024-26970] = "fixed-version: Fixed from version 6.9" | ||
6029 | |||
6030 | CVE_STATUS[CVE-2024-26971] = "fixed-version: Fixed from version 6.9" | ||
6031 | |||
6032 | CVE_STATUS[CVE-2024-26973] = "fixed-version: Fixed from version 6.9" | ||
6033 | |||
6034 | CVE_STATUS[CVE-2024-26974] = "fixed-version: Fixed from version 6.9" | ||
6035 | |||
6036 | CVE_STATUS[CVE-2024-26975] = "fixed-version: Fixed from version 6.9" | ||
6037 | |||
6038 | CVE_STATUS[CVE-2024-26976] = "fixed-version: Fixed from version 6.9" | ||
6039 | |||
6040 | CVE_STATUS[CVE-2024-26977] = "fixed-version: Fixed from version 6.9" | ||
6041 | |||
6042 | CVE_STATUS[CVE-2024-26978] = "fixed-version: Fixed from version 6.9" | ||
6043 | |||
6044 | CVE_STATUS[CVE-2024-26980] = "fixed-version: Fixed from version 6.9" | ||
6045 | |||
6046 | CVE_STATUS[CVE-2024-26981] = "fixed-version: Fixed from version 6.9" | ||
6047 | |||
6048 | CVE_STATUS[CVE-2024-26982] = "fixed-version: Fixed from version 6.9" | ||
6049 | |||
6050 | CVE_STATUS[CVE-2024-26983] = "fixed-version: Fixed from version 6.9" | ||
6051 | |||
6052 | CVE_STATUS[CVE-2024-26984] = "fixed-version: Fixed from version 6.9" | ||
6053 | |||
6054 | CVE_STATUS[CVE-2024-26985] = "fixed-version: Fixed from version 6.9" | ||
6055 | |||
6056 | CVE_STATUS[CVE-2024-26986] = "fixed-version: Fixed from version 6.9" | ||
6057 | |||
6058 | CVE_STATUS[CVE-2024-26987] = "fixed-version: Fixed from version 6.9" | ||
6059 | |||
6060 | CVE_STATUS[CVE-2024-26988] = "fixed-version: Fixed from version 6.9" | ||
6061 | |||
6062 | CVE_STATUS[CVE-2024-26989] = "fixed-version: Fixed from version 6.9" | ||
6063 | |||
6064 | CVE_STATUS[CVE-2024-26990] = "fixed-version: Fixed from version 6.9" | ||
6065 | |||
6066 | CVE_STATUS[CVE-2024-26991] = "fixed-version: Fixed from version 6.9" | ||
6067 | |||
6068 | CVE_STATUS[CVE-2024-26992] = "fixed-version: Fixed from version 6.9" | ||
6069 | |||
6070 | CVE_STATUS[CVE-2024-26993] = "fixed-version: Fixed from version 6.9" | ||
6071 | |||
6072 | CVE_STATUS[CVE-2024-26994] = "fixed-version: Fixed from version 6.9" | ||
6073 | |||
6074 | CVE_STATUS[CVE-2024-26995] = "fixed-version: Fixed from version 6.9" | ||
6075 | |||
6076 | CVE_STATUS[CVE-2024-26996] = "fixed-version: Fixed from version 6.9" | ||
6077 | |||
6078 | CVE_STATUS[CVE-2024-26997] = "fixed-version: Fixed from version 6.8.8" | ||
6079 | |||
6080 | CVE_STATUS[CVE-2024-26998] = "fixed-version: Fixed from version 6.9" | ||
6081 | |||
6082 | CVE_STATUS[CVE-2024-26999] = "fixed-version: Fixed from version 6.9" | ||
6083 | |||
6084 | CVE_STATUS[CVE-2024-27000] = "fixed-version: Fixed from version 6.9" | ||
6085 | |||
6086 | CVE_STATUS[CVE-2024-27001] = "fixed-version: Fixed from version 6.9" | ||
6087 | |||
6088 | CVE_STATUS[CVE-2024-27002] = "fixed-version: Fixed from version 6.9" | ||
6089 | |||
6090 | CVE_STATUS[CVE-2024-27003] = "fixed-version: Fixed from version 6.9" | ||
6091 | |||
6092 | CVE_STATUS[CVE-2024-27004] = "fixed-version: Fixed from version 6.9" | ||
6093 | |||
6094 | CVE_STATUS[CVE-2024-27005] = "fixed-version: Fixed from version 6.9" | ||
6095 | |||
6096 | CVE_STATUS[CVE-2024-27006] = "fixed-version: Fixed from version 6.9" | ||
6097 | |||
6098 | CVE_STATUS[CVE-2024-27007] = "fixed-version: Fixed from version 6.9" | ||
6099 | |||
6100 | CVE_STATUS[CVE-2024-27008] = "fixed-version: Fixed from version 6.9" | ||
6101 | |||
6102 | CVE_STATUS[CVE-2024-27009] = "fixed-version: Fixed from version 6.9" | ||
6103 | |||
6104 | CVE_STATUS[CVE-2024-27010] = "fixed-version: Fixed from version 6.9" | ||
6105 | |||
6106 | CVE_STATUS[CVE-2024-27011] = "fixed-version: Fixed from version 6.9" | ||
6107 | |||
6108 | CVE_STATUS[CVE-2024-27012] = "fixed-version: Fixed from version 6.9" | ||
6109 | |||
6110 | CVE_STATUS[CVE-2024-27013] = "fixed-version: Fixed from version 6.9" | ||
6111 | |||
6112 | CVE_STATUS[CVE-2024-27014] = "fixed-version: Fixed from version 6.9" | ||
6113 | |||
6114 | CVE_STATUS[CVE-2024-27015] = "fixed-version: Fixed from version 6.9" | ||
6115 | |||
6116 | CVE_STATUS[CVE-2024-27016] = "fixed-version: Fixed from version 6.9" | ||
6117 | |||
6118 | CVE_STATUS[CVE-2024-27017] = "fixed-version: Fixed from version 6.9" | ||
6119 | |||
6120 | CVE_STATUS[CVE-2024-27018] = "fixed-version: Fixed from version 6.9" | ||
6121 | |||
6122 | CVE_STATUS[CVE-2024-27019] = "fixed-version: Fixed from version 6.9" | ||
6123 | |||
6124 | CVE_STATUS[CVE-2024-27020] = "fixed-version: Fixed from version 6.9" | ||
6125 | |||
6126 | CVE_STATUS[CVE-2024-27021] = "fixed-version: Fixed from version 6.9" | ||
6127 | |||
6128 | CVE_STATUS[CVE-2024-27022] = "fixed-version: Fixed from version 6.9" | ||
6129 | |||
6130 | CVE_STATUS[CVE-2024-27023] = "fixed-version: Fixed from version 6.7.7" | ||
6131 | |||
6132 | CVE_STATUS[CVE-2024-27024] = "fixed-version: Fixed from version 6.8" | ||
6133 | |||
6134 | CVE_STATUS[CVE-2024-27025] = "fixed-version: Fixed from version 6.9" | ||
6135 | |||
6136 | CVE_STATUS[CVE-2024-27026] = "fixed-version: Fixed from version 6.9" | ||
6137 | |||
6138 | CVE_STATUS[CVE-2024-27027] = "fixed-version: Fixed from version 6.9" | ||
6139 | |||
6140 | CVE_STATUS[CVE-2024-27028] = "fixed-version: Fixed from version 6.9" | ||
6141 | |||
6142 | CVE_STATUS[CVE-2024-27029] = "fixed-version: Fixed from version 6.9" | ||
6143 | |||
6144 | CVE_STATUS[CVE-2024-27030] = "fixed-version: Fixed from version 6.9" | ||
6145 | |||
6146 | CVE_STATUS[CVE-2024-27031] = "fixed-version: Fixed from version 6.9" | ||
6147 | |||
6148 | CVE_STATUS[CVE-2024-27032] = "fixed-version: Fixed from version 6.9" | ||
6149 | |||
6150 | CVE_STATUS[CVE-2024-27033] = "fixed-version: Fixed from version 6.9" | ||
6151 | |||
6152 | CVE_STATUS[CVE-2024-27034] = "fixed-version: Fixed from version 6.9" | ||
6153 | |||
6154 | CVE_STATUS[CVE-2024-27035] = "fixed-version: Fixed from version 6.9" | ||
6155 | |||
6156 | CVE_STATUS[CVE-2024-27036] = "fixed-version: Fixed from version 6.9" | ||
6157 | |||
6158 | CVE_STATUS[CVE-2024-27037] = "fixed-version: Fixed from version 6.9" | ||
6159 | |||
6160 | CVE_STATUS[CVE-2024-27038] = "fixed-version: Fixed from version 6.9" | ||
6161 | |||
6162 | CVE_STATUS[CVE-2024-27039] = "fixed-version: Fixed from version 6.9" | ||
6163 | |||
6164 | CVE_STATUS[CVE-2024-27040] = "fixed-version: Fixed from version 6.9" | ||
6165 | |||
6166 | CVE_STATUS[CVE-2024-27041] = "fixed-version: Fixed from version 6.9" | ||
6167 | |||
6168 | CVE_STATUS[CVE-2024-27042] = "fixed-version: Fixed from version 6.9" | ||
6169 | |||
6170 | CVE_STATUS[CVE-2024-27043] = "fixed-version: Fixed from version 6.9" | ||
6171 | |||
6172 | CVE_STATUS[CVE-2024-27044] = "fixed-version: Fixed from version 6.9" | ||
6173 | |||
6174 | CVE_STATUS[CVE-2024-27045] = "fixed-version: Fixed from version 6.9" | ||
6175 | |||
6176 | CVE_STATUS[CVE-2024-27046] = "fixed-version: Fixed from version 6.9" | ||
6177 | |||
6178 | CVE_STATUS[CVE-2024-27047] = "fixed-version: Fixed from version 6.9" | ||
6179 | |||
6180 | CVE_STATUS[CVE-2024-27048] = "fixed-version: Fixed from version 6.9" | ||
6181 | |||
6182 | CVE_STATUS[CVE-2024-27049] = "fixed-version: Fixed from version 6.9" | ||
6183 | |||
6184 | CVE_STATUS[CVE-2024-27050] = "fixed-version: Fixed from version 6.9" | ||
6185 | |||
6186 | CVE_STATUS[CVE-2024-27051] = "fixed-version: Fixed from version 6.9" | ||
6187 | |||
6188 | CVE_STATUS[CVE-2024-27052] = "fixed-version: Fixed from version 6.9" | ||
6189 | |||
6190 | CVE_STATUS[CVE-2024-27053] = "fixed-version: Fixed from version 6.9" | ||
6191 | |||
6192 | CVE_STATUS[CVE-2024-27054] = "fixed-version: Fixed from version 6.9" | ||
6193 | |||
6194 | CVE_STATUS[CVE-2024-27056] = "fixed-version: Fixed from version 6.8" | ||
6195 | |||
6196 | CVE_STATUS[CVE-2024-27057] = "fixed-version: Fixed from version 6.8" | ||
6197 | |||
6198 | CVE_STATUS[CVE-2024-27058] = "fixed-version: Fixed from version 6.9" | ||
6199 | |||
6200 | CVE_STATUS[CVE-2024-27059] = "fixed-version: Fixed from version 6.8" | ||
6201 | |||
6202 | CVE_STATUS[CVE-2024-27060] = "fixed-version: Fixed from version 6.8" | ||
6203 | |||
6204 | CVE_STATUS[CVE-2024-27061] = "fixed-version: Fixed from version 6.8" | ||
6205 | |||
6206 | CVE_STATUS[CVE-2024-27062] = "fixed-version: Fixed from version 6.8" | ||
6207 | |||
6208 | CVE_STATUS[CVE-2024-27063] = "fixed-version: Fixed from version 6.9" | ||
6209 | |||
6210 | CVE_STATUS[CVE-2024-27064] = "fixed-version: Fixed from version 6.9" | ||
6211 | |||
6212 | CVE_STATUS[CVE-2024-27065] = "fixed-version: Fixed from version 6.9" | ||
6213 | |||
6214 | CVE_STATUS[CVE-2024-27066] = "fixed-version: Fixed from version 6.9" | ||
6215 | |||
6216 | CVE_STATUS[CVE-2024-27067] = "fixed-version: Fixed from version 6.9" | ||
6217 | |||
6218 | CVE_STATUS[CVE-2024-27068] = "fixed-version: Fixed from version 6.9" | ||
6219 | |||
6220 | CVE_STATUS[CVE-2024-27069] = "fixed-version: Fixed from version 6.9" | ||
6221 | |||
6222 | CVE_STATUS[CVE-2024-27070] = "fixed-version: Fixed from version 6.9" | ||
6223 | |||
6224 | CVE_STATUS[CVE-2024-27071] = "fixed-version: Fixed from version 6.9" | ||
6225 | |||
6226 | CVE_STATUS[CVE-2024-27072] = "fixed-version: Fixed from version 6.9" | ||
6227 | |||
6228 | CVE_STATUS[CVE-2024-27073] = "fixed-version: Fixed from version 6.9" | ||
6229 | |||
6230 | CVE_STATUS[CVE-2024-27074] = "fixed-version: Fixed from version 6.9" | ||
6231 | |||
6232 | CVE_STATUS[CVE-2024-27075] = "fixed-version: Fixed from version 6.9" | ||
6233 | |||
6234 | CVE_STATUS[CVE-2024-27076] = "fixed-version: Fixed from version 6.9" | ||
6235 | |||
6236 | CVE_STATUS[CVE-2024-27077] = "fixed-version: Fixed from version 6.9" | ||
6237 | |||
6238 | CVE_STATUS[CVE-2024-27078] = "fixed-version: Fixed from version 6.9" | ||
6239 | |||
6240 | CVE_STATUS[CVE-2024-27079] = "fixed-version: Fixed from version 6.9" | ||
6241 | |||
6242 | CVE_STATUS[CVE-2024-27080] = "fixed-version: Fixed from version 6.9" | ||
6243 | |||
6244 | CVE_STATUS[CVE-2024-27388] = "fixed-version: Fixed from version 6.9" | ||
6245 | |||
6246 | CVE_STATUS[CVE-2024-27389] = "fixed-version: Fixed from version 6.9" | ||
6247 | |||
6248 | CVE_STATUS[CVE-2024-27390] = "fixed-version: Fixed from version 6.9" | ||
6249 | |||
6250 | CVE_STATUS[CVE-2024-27391] = "fixed-version: Fixed from version 6.9" | ||
6251 | |||
6252 | CVE_STATUS[CVE-2024-27392] = "fixed-version: Fixed from version 6.9" | ||
6253 | |||
6254 | CVE_STATUS[CVE-2024-27393] = "fixed-version: Fixed from version 6.9" | ||
6255 | |||
6256 | CVE_STATUS[CVE-2024-27394] = "fixed-version: Fixed from version 6.9" | ||
6257 | |||
6258 | CVE_STATUS[CVE-2024-27395] = "fixed-version: Fixed from version 6.9" | ||
6259 | |||
6260 | CVE_STATUS[CVE-2024-27396] = "fixed-version: Fixed from version 6.9" | ||
6261 | |||
6262 | CVE_STATUS[CVE-2024-27397] = "fixed-version: Fixed from version 6.8" | ||
6263 | |||
6264 | CVE_STATUS[CVE-2024-27398] = "fixed-version: Fixed from version 6.9" | ||
6265 | |||
6266 | CVE_STATUS[CVE-2024-27399] = "fixed-version: Fixed from version 6.9" | ||
6267 | |||
6268 | CVE_STATUS[CVE-2024-27400] = "fixed-version: Fixed from version 6.9" | ||
6269 | |||
6270 | CVE_STATUS[CVE-2024-27401] = "fixed-version: Fixed from version 6.9" | ||
6271 | |||
6272 | CVE_STATUS[CVE-2024-27402] = "fixed-version: Fixed from version 6.8" | ||
6273 | |||
6274 | CVE_STATUS[CVE-2024-27403] = "fixed-version: Fixed from version 6.8" | ||
6275 | |||
6276 | CVE_STATUS[CVE-2024-27404] = "fixed-version: Fixed from version 6.8" | ||
6277 | |||
6278 | CVE_STATUS[CVE-2024-27405] = "fixed-version: Fixed from version 6.8" | ||
6279 | |||
6280 | CVE_STATUS[CVE-2024-27406] = "fixed-version: Fixed from version 6.8" | ||
6281 | |||
6282 | CVE_STATUS[CVE-2024-27407] = "fixed-version: Fixed from version 6.8" | ||
6283 | |||
6284 | CVE_STATUS[CVE-2024-27408] = "fixed-version: Fixed from version 6.8" | ||
6285 | |||
6286 | CVE_STATUS[CVE-2024-27409] = "fixed-version: Fixed from version 6.8" | ||
6287 | |||
6288 | CVE_STATUS[CVE-2024-27410] = "fixed-version: Fixed from version 6.8" | ||
6289 | |||
6290 | CVE_STATUS[CVE-2024-27411] = "fixed-version: Fixed from version 6.7.9" | ||
6291 | |||
6292 | CVE_STATUS[CVE-2024-27412] = "fixed-version: Fixed from version 6.8" | ||
6293 | |||
6294 | CVE_STATUS[CVE-2024-27413] = "fixed-version: Fixed from version 6.8" | ||
6295 | |||
6296 | CVE_STATUS[CVE-2024-27414] = "fixed-version: Fixed from version 6.8" | ||
6297 | |||
6298 | CVE_STATUS[CVE-2024-27415] = "fixed-version: Fixed from version 6.8" | ||
6299 | |||
6300 | CVE_STATUS[CVE-2024-27416] = "fixed-version: Fixed from version 6.8" | ||
6301 | |||
6302 | CVE_STATUS[CVE-2024-27417] = "fixed-version: Fixed from version 6.8" | ||
6303 | |||
6304 | CVE_STATUS[CVE-2024-27418] = "fixed-version: Fixed from version 6.8" | ||
6305 | |||
6306 | CVE_STATUS[CVE-2024-27419] = "fixed-version: Fixed from version 6.8" | ||
6307 | |||
6308 | CVE_STATUS[CVE-2024-27431] = "fixed-version: Fixed from version 6.8" | ||
6309 | |||
6310 | CVE_STATUS[CVE-2024-27432] = "fixed-version: Fixed from version 6.9" | ||
6311 | |||
6312 | CVE_STATUS[CVE-2024-27433] = "fixed-version: Fixed from version 6.9" | ||
6313 | |||
6314 | CVE_STATUS[CVE-2024-27434] = "fixed-version: Fixed from version 6.9" | ||
6315 | |||
6316 | CVE_STATUS[CVE-2024-27435] = "fixed-version: Fixed from version 6.9" | ||
6317 | |||
6318 | CVE_STATUS[CVE-2024-27436] = "fixed-version: Fixed from version 6.9" | ||
6319 | |||
6320 | CVE_STATUS[CVE-2024-27437] = "fixed-version: Fixed from version 6.9" | ||
6321 | |||
6322 | CVE_STATUS[CVE-2024-31076] = "fixed-version: Fixed from version 6.10" | ||
6323 | |||
6324 | CVE_STATUS[CVE-2024-32936] = "fixed-version: Fixed from version 6.10" | ||
6325 | |||
6326 | CVE_STATUS[CVE-2024-33619] = "fixed-version: Fixed from version 6.10" | ||
6327 | |||
6328 | CVE_STATUS[CVE-2024-33621] = "fixed-version: Fixed from version 6.10" | ||
6329 | |||
6330 | CVE_STATUS[CVE-2024-33847] = "fixed-version: Fixed from version 6.10" | ||
6331 | |||
6332 | CVE_STATUS[CVE-2024-34027] = "fixed-version: Fixed from version 6.10" | ||
6333 | |||
6334 | CVE_STATUS[CVE-2024-34030] = "fixed-version: Fixed from version 6.10" | ||
6335 | |||
6336 | CVE_STATUS[CVE-2024-34777] = "fixed-version: Fixed from version 6.10" | ||
6337 | |||
6338 | CVE_STATUS[CVE-2024-35247] = "fixed-version: Fixed from version 6.10" | ||
6339 | |||
6340 | CVE_STATUS[CVE-2024-35784] = "fixed-version: Fixed from version 6.8" | ||
6341 | |||
6342 | CVE_STATUS[CVE-2024-35785] = "fixed-version: Fixed from version 6.8" | ||
6343 | |||
6344 | CVE_STATUS[CVE-2024-35786] = "fixed-version: Fixed from version 6.8" | ||
6345 | |||
6346 | CVE_STATUS[CVE-2024-35787] = "fixed-version: Fixed from version 6.9" | ||
6347 | |||
6348 | # CVE-2024-35788 has no known resolution | ||
6349 | |||
6350 | CVE_STATUS[CVE-2024-35789] = "fixed-version: Fixed from version 6.9" | ||
6351 | |||
6352 | CVE_STATUS[CVE-2024-35790] = "fixed-version: Fixed from version 6.8" | ||
6353 | |||
6354 | CVE_STATUS[CVE-2024-35791] = "fixed-version: Fixed from version 6.8" | ||
6355 | |||
6356 | CVE_STATUS[CVE-2024-35792] = "fixed-version: Fixed from version 6.8" | ||
6357 | |||
6358 | CVE_STATUS[CVE-2024-35793] = "fixed-version: Fixed from version 6.9" | ||
6359 | |||
6360 | CVE_STATUS[CVE-2024-35794] = "fixed-version: Fixed from version 6.9" | ||
6361 | |||
6362 | CVE_STATUS[CVE-2024-35795] = "fixed-version: Fixed from version 6.9" | ||
6363 | |||
6364 | CVE_STATUS[CVE-2024-35796] = "fixed-version: Fixed from version 6.9" | ||
6365 | |||
6366 | CVE_STATUS[CVE-2024-35797] = "fixed-version: Fixed from version 6.9" | ||
6367 | |||
6368 | CVE_STATUS[CVE-2024-35798] = "fixed-version: Fixed from version 6.9" | ||
6369 | |||
6370 | CVE_STATUS[CVE-2024-35799] = "fixed-version: Fixed from version 6.9" | ||
6371 | |||
6372 | CVE_STATUS[CVE-2024-35800] = "fixed-version: Fixed from version 6.9" | ||
6373 | |||
6374 | CVE_STATUS[CVE-2024-35801] = "fixed-version: Fixed from version 6.9" | ||
6375 | |||
6376 | CVE_STATUS[CVE-2024-35803] = "fixed-version: Fixed from version 6.9" | ||
6377 | |||
6378 | CVE_STATUS[CVE-2024-35804] = "fixed-version: Fixed from version 6.8" | ||
6379 | |||
6380 | CVE_STATUS[CVE-2024-35805] = "fixed-version: Fixed from version 6.9" | ||
6381 | |||
6382 | CVE_STATUS[CVE-2024-35806] = "fixed-version: Fixed from version 6.9" | ||
6383 | |||
6384 | CVE_STATUS[CVE-2024-35807] = "fixed-version: Fixed from version 6.9" | ||
6385 | |||
6386 | CVE_STATUS[CVE-2024-35808] = "fixed-version: Fixed from version 6.9" | ||
6387 | |||
6388 | CVE_STATUS[CVE-2024-35809] = "fixed-version: Fixed from version 6.9" | ||
6389 | |||
6390 | CVE_STATUS[CVE-2024-35810] = "fixed-version: Fixed from version 6.9" | ||
6391 | |||
6392 | CVE_STATUS[CVE-2024-35811] = "fixed-version: Fixed from version 6.9" | ||
6393 | |||
6394 | CVE_STATUS[CVE-2024-35813] = "fixed-version: Fixed from version 6.9" | ||
6395 | |||
6396 | CVE_STATUS[CVE-2024-35814] = "fixed-version: Fixed from version 6.9" | ||
6397 | |||
6398 | CVE_STATUS[CVE-2024-35815] = "fixed-version: Fixed from version 6.7.12" | ||
6399 | |||
6400 | CVE_STATUS[CVE-2024-35816] = "fixed-version: Fixed from version 6.8" | ||
6401 | |||
6402 | CVE_STATUS[CVE-2024-35817] = "fixed-version: Fixed from version 6.9" | ||
6403 | |||
6404 | CVE_STATUS[CVE-2024-35818] = "fixed-version: Fixed from version 6.9" | ||
6405 | |||
6406 | CVE_STATUS[CVE-2024-35819] = "fixed-version: Fixed from version 6.9" | ||
6407 | |||
6408 | CVE_STATUS[CVE-2024-35821] = "fixed-version: Fixed from version 6.9" | ||
6409 | |||
6410 | CVE_STATUS[CVE-2024-35822] = "fixed-version: Fixed from version 6.9" | ||
6411 | |||
6412 | CVE_STATUS[CVE-2024-35823] = "fixed-version: Fixed from version 6.8" | ||
6413 | |||
6414 | CVE_STATUS[CVE-2024-35824] = "fixed-version: Fixed from version 6.7.12" | ||
6415 | |||
6416 | CVE_STATUS[CVE-2024-35825] = "fixed-version: Fixed from version 6.8" | ||
6417 | |||
6418 | CVE_STATUS[CVE-2024-35826] = "fixed-version: Fixed from version 6.9" | ||
6419 | |||
6420 | CVE_STATUS[CVE-2024-35827] = "fixed-version: Fixed from version 6.9" | ||
6421 | |||
6422 | CVE_STATUS[CVE-2024-35828] = "fixed-version: Fixed from version 6.9" | ||
6423 | |||
6424 | CVE_STATUS[CVE-2024-35829] = "fixed-version: Fixed from version 6.9" | ||
6425 | |||
6426 | CVE_STATUS[CVE-2024-35830] = "fixed-version: Fixed from version 6.9" | ||
6427 | |||
6428 | CVE_STATUS[CVE-2024-35831] = "fixed-version: Fixed from version 6.9" | ||
6429 | |||
6430 | CVE_STATUS[CVE-2024-35832] = "fixed-version: Fixed from version 6.8" | ||
6431 | |||
6432 | CVE_STATUS[CVE-2024-35833] = "fixed-version: Fixed from version 6.8" | ||
6433 | |||
6434 | CVE_STATUS[CVE-2024-35834] = "fixed-version: Fixed from version 6.8" | ||
6435 | |||
6436 | CVE_STATUS[CVE-2024-35835] = "fixed-version: Fixed from version 6.8" | ||
6437 | |||
6438 | CVE_STATUS[CVE-2024-35836] = "fixed-version: Fixed from version 6.8" | ||
6439 | |||
6440 | CVE_STATUS[CVE-2024-35837] = "fixed-version: Fixed from version 6.8" | ||
6441 | |||
6442 | CVE_STATUS[CVE-2024-35838] = "fixed-version: Fixed from version 6.8" | ||
6443 | |||
6444 | CVE_STATUS[CVE-2024-35839] = "fixed-version: Fixed from version 6.8" | ||
6445 | |||
6446 | CVE_STATUS[CVE-2024-35840] = "fixed-version: Fixed from version 6.8" | ||
6447 | |||
6448 | CVE_STATUS[CVE-2024-35841] = "fixed-version: Fixed from version 6.8" | ||
6449 | |||
6450 | CVE_STATUS[CVE-2024-35842] = "fixed-version: Fixed from version 6.8" | ||
6451 | |||
6452 | CVE_STATUS[CVE-2024-35843] = "fixed-version: Fixed from version 6.9" | ||
6453 | |||
6454 | CVE_STATUS[CVE-2024-35844] = "fixed-version: Fixed from version 6.9" | ||
6455 | |||
6456 | CVE_STATUS[CVE-2024-35845] = "fixed-version: Fixed from version 6.9" | ||
6457 | |||
6458 | CVE_STATUS[CVE-2024-35846] = "fixed-version: Fixed from version 6.9" | ||
6459 | |||
6460 | CVE_STATUS[CVE-2024-35847] = "fixed-version: Fixed from version 6.9" | ||
6461 | |||
6462 | CVE_STATUS[CVE-2024-35848] = "fixed-version: Fixed from version 6.9" | ||
6463 | |||
6464 | CVE_STATUS[CVE-2024-35849] = "fixed-version: Fixed from version 6.9" | ||
6465 | |||
6466 | CVE_STATUS[CVE-2024-35850] = "fixed-version: Fixed from version 6.9" | ||
6467 | |||
6468 | CVE_STATUS[CVE-2024-35851] = "fixed-version: Fixed from version 6.9" | ||
6469 | |||
6470 | CVE_STATUS[CVE-2024-35852] = "fixed-version: Fixed from version 6.9" | ||
6471 | |||
6472 | CVE_STATUS[CVE-2024-35853] = "fixed-version: Fixed from version 6.9" | ||
6473 | |||
6474 | CVE_STATUS[CVE-2024-35854] = "fixed-version: Fixed from version 6.9" | ||
6475 | |||
6476 | CVE_STATUS[CVE-2024-35855] = "fixed-version: Fixed from version 6.9" | ||
6477 | |||
6478 | CVE_STATUS[CVE-2024-35856] = "fixed-version: Fixed from version 6.9" | ||
6479 | |||
6480 | CVE_STATUS[CVE-2024-35857] = "fixed-version: Fixed from version 6.9" | ||
6481 | |||
6482 | CVE_STATUS[CVE-2024-35858] = "fixed-version: Fixed from version 6.9" | ||
6483 | |||
6484 | CVE_STATUS[CVE-2024-35859] = "fixed-version: Fixed from version 6.9" | ||
6485 | |||
6486 | CVE_STATUS[CVE-2024-35860] = "fixed-version: Fixed from version 6.9" | ||
6487 | |||
6488 | CVE_STATUS[CVE-2024-35861] = "fixed-version: Fixed from version 6.9" | ||
6489 | |||
6490 | CVE_STATUS[CVE-2024-35862] = "fixed-version: Fixed from version 6.9" | ||
6491 | |||
6492 | CVE_STATUS[CVE-2024-35863] = "fixed-version: Fixed from version 6.9" | ||
6493 | |||
6494 | CVE_STATUS[CVE-2024-35864] = "fixed-version: Fixed from version 6.9" | ||
6495 | |||
6496 | CVE_STATUS[CVE-2024-35865] = "fixed-version: Fixed from version 6.9" | ||
6497 | |||
6498 | CVE_STATUS[CVE-2024-35866] = "fixed-version: Fixed from version 6.9" | ||
6499 | |||
6500 | CVE_STATUS[CVE-2024-35867] = "fixed-version: Fixed from version 6.9" | ||
6501 | |||
6502 | CVE_STATUS[CVE-2024-35868] = "fixed-version: Fixed from version 6.9" | ||
6503 | |||
6504 | CVE_STATUS[CVE-2024-35869] = "fixed-version: Fixed from version 6.9" | ||
6505 | |||
6506 | CVE_STATUS[CVE-2024-35870] = "fixed-version: Fixed from version 6.9" | ||
6507 | |||
6508 | CVE_STATUS[CVE-2024-35871] = "fixed-version: Fixed from version 6.9" | ||
6509 | |||
6510 | CVE_STATUS[CVE-2024-35872] = "fixed-version: Fixed from version 6.9" | ||
6511 | |||
6512 | CVE_STATUS[CVE-2024-35873] = "fixed-version: Fixed from version 6.9" | ||
6513 | |||
6514 | CVE_STATUS[CVE-2024-35874] = "fixed-version: Fixed from version 6.9" | ||
6515 | |||
6516 | CVE_STATUS[CVE-2024-35875] = "fixed-version: Fixed from version 6.9" | ||
6517 | |||
6518 | CVE_STATUS[CVE-2024-35877] = "fixed-version: Fixed from version 6.9" | ||
6519 | |||
6520 | CVE_STATUS[CVE-2024-35878] = "fixed-version: Fixed from version 6.9" | ||
6521 | |||
6522 | CVE_STATUS[CVE-2024-35879] = "fixed-version: Fixed from version 6.9" | ||
6523 | |||
6524 | CVE_STATUS[CVE-2024-35880] = "fixed-version: Fixed from version 6.9" | ||
6525 | |||
6526 | CVE_STATUS[CVE-2024-35882] = "fixed-version: Fixed from version 6.9" | ||
6527 | |||
6528 | CVE_STATUS[CVE-2024-35883] = "fixed-version: Fixed from version 6.9" | ||
6529 | |||
6530 | CVE_STATUS[CVE-2024-35884] = "fixed-version: Fixed from version 6.9" | ||
6531 | |||
6532 | CVE_STATUS[CVE-2024-35885] = "fixed-version: Fixed from version 6.9" | ||
6533 | |||
6534 | CVE_STATUS[CVE-2024-35886] = "fixed-version: Fixed from version 6.9" | ||
6535 | |||
6536 | CVE_STATUS[CVE-2024-35887] = "fixed-version: Fixed from version 6.9" | ||
6537 | |||
6538 | CVE_STATUS[CVE-2024-35888] = "fixed-version: Fixed from version 6.9" | ||
6539 | |||
6540 | CVE_STATUS[CVE-2024-35889] = "fixed-version: Fixed from version 6.9" | ||
6541 | |||
6542 | CVE_STATUS[CVE-2024-35890] = "fixed-version: Fixed from version 6.9" | ||
6543 | |||
6544 | CVE_STATUS[CVE-2024-35891] = "fixed-version: Fixed from version 6.9" | ||
6545 | |||
6546 | CVE_STATUS[CVE-2024-35892] = "fixed-version: Fixed from version 6.9" | ||
6547 | |||
6548 | CVE_STATUS[CVE-2024-35893] = "fixed-version: Fixed from version 6.9" | ||
6549 | |||
6550 | CVE_STATUS[CVE-2024-35894] = "fixed-version: Fixed from version 6.9" | ||
6551 | |||
6552 | CVE_STATUS[CVE-2024-35895] = "fixed-version: Fixed from version 6.9" | ||
6553 | |||
6554 | CVE_STATUS[CVE-2024-35896] = "fixed-version: Fixed from version 6.9" | ||
6555 | |||
6556 | CVE_STATUS[CVE-2024-35897] = "fixed-version: Fixed from version 6.9" | ||
6557 | |||
6558 | CVE_STATUS[CVE-2024-35898] = "fixed-version: Fixed from version 6.9" | ||
6559 | |||
6560 | CVE_STATUS[CVE-2024-35899] = "fixed-version: Fixed from version 6.9" | ||
6561 | |||
6562 | CVE_STATUS[CVE-2024-35900] = "fixed-version: Fixed from version 6.9" | ||
6563 | |||
6564 | CVE_STATUS[CVE-2024-35901] = "fixed-version: Fixed from version 6.9" | ||
6565 | |||
6566 | CVE_STATUS[CVE-2024-35902] = "fixed-version: Fixed from version 6.9" | ||
6567 | |||
6568 | CVE_STATUS[CVE-2024-35903] = "fixed-version: Fixed from version 6.9" | ||
6569 | |||
6570 | CVE_STATUS[CVE-2024-35904] = "fixed-version: Fixed from version 6.9" | ||
6571 | |||
6572 | CVE_STATUS[CVE-2024-35905] = "fixed-version: Fixed from version 6.9" | ||
6573 | |||
6574 | CVE_STATUS[CVE-2024-35907] = "fixed-version: Fixed from version 6.9" | ||
6575 | |||
6576 | CVE_STATUS[CVE-2024-35908] = "fixed-version: Fixed from version 6.9" | ||
6577 | |||
6578 | CVE_STATUS[CVE-2024-35909] = "fixed-version: Fixed from version 6.9" | ||
6579 | |||
6580 | CVE_STATUS[CVE-2024-35910] = "fixed-version: Fixed from version 6.9" | ||
6581 | |||
6582 | CVE_STATUS[CVE-2024-35911] = "fixed-version: Fixed from version 6.9" | ||
6583 | |||
6584 | CVE_STATUS[CVE-2024-35912] = "fixed-version: Fixed from version 6.9" | ||
6585 | |||
6586 | CVE_STATUS[CVE-2024-35913] = "fixed-version: Fixed from version 6.9" | ||
6587 | |||
6588 | CVE_STATUS[CVE-2024-35914] = "fixed-version: Fixed from version 6.9" | ||
6589 | |||
6590 | CVE_STATUS[CVE-2024-35915] = "fixed-version: Fixed from version 6.9" | ||
6591 | |||
6592 | CVE_STATUS[CVE-2024-35916] = "fixed-version: Fixed from version 6.9" | ||
6593 | |||
6594 | CVE_STATUS[CVE-2024-35917] = "fixed-version: Fixed from version 6.9" | ||
6595 | |||
6596 | CVE_STATUS[CVE-2024-35919] = "fixed-version: Fixed from version 6.9" | ||
6597 | |||
6598 | CVE_STATUS[CVE-2024-35920] = "fixed-version: Fixed from version 6.9" | ||
6599 | |||
6600 | CVE_STATUS[CVE-2024-35921] = "fixed-version: Fixed from version 6.9" | ||
6601 | |||
6602 | CVE_STATUS[CVE-2024-35922] = "fixed-version: Fixed from version 6.9" | ||
6603 | |||
6604 | CVE_STATUS[CVE-2024-35924] = "fixed-version: Fixed from version 6.9" | ||
6605 | |||
6606 | CVE_STATUS[CVE-2024-35925] = "fixed-version: Fixed from version 6.9" | ||
6607 | |||
6608 | CVE_STATUS[CVE-2024-35926] = "fixed-version: Fixed from version 6.9" | ||
6609 | |||
6610 | CVE_STATUS[CVE-2024-35927] = "fixed-version: Fixed from version 6.9" | ||
6611 | |||
6612 | CVE_STATUS[CVE-2024-35929] = "fixed-version: Fixed from version 6.9" | ||
6613 | |||
6614 | CVE_STATUS[CVE-2024-35930] = "fixed-version: Fixed from version 6.9" | ||
6615 | |||
6616 | CVE_STATUS[CVE-2024-35931] = "fixed-version: Fixed from version 6.9" | ||
6617 | |||
6618 | CVE_STATUS[CVE-2024-35932] = "fixed-version: Fixed from version 6.9" | ||
6619 | |||
6620 | CVE_STATUS[CVE-2024-35933] = "fixed-version: Fixed from version 6.9" | ||
6621 | |||
6622 | CVE_STATUS[CVE-2024-35934] = "fixed-version: Fixed from version 6.9" | ||
6623 | |||
6624 | CVE_STATUS[CVE-2024-35935] = "fixed-version: Fixed from version 6.9" | ||
6625 | |||
6626 | CVE_STATUS[CVE-2024-35936] = "fixed-version: Fixed from version 6.9" | ||
6627 | |||
6628 | CVE_STATUS[CVE-2024-35937] = "fixed-version: Fixed from version 6.9" | ||
6629 | |||
6630 | CVE_STATUS[CVE-2024-35938] = "fixed-version: Fixed from version 6.9" | ||
6631 | |||
6632 | CVE_STATUS[CVE-2024-35939] = "fixed-version: Fixed from version 6.9" | ||
6633 | |||
6634 | CVE_STATUS[CVE-2024-35940] = "fixed-version: Fixed from version 6.9" | ||
6635 | |||
6636 | CVE_STATUS[CVE-2024-35942] = "fixed-version: Fixed from version 6.9" | ||
6637 | |||
6638 | CVE_STATUS[CVE-2024-35943] = "fixed-version: Fixed from version 6.9" | ||
6639 | |||
6640 | CVE_STATUS[CVE-2024-35944] = "fixed-version: Fixed from version 6.9" | ||
6641 | |||
6642 | CVE_STATUS[CVE-2024-35945] = "fixed-version: Fixed from version 6.9" | ||
6643 | |||
6644 | CVE_STATUS[CVE-2024-35946] = "fixed-version: Fixed from version 6.9" | ||
6645 | |||
6646 | CVE_STATUS[CVE-2024-35947] = "fixed-version: Fixed from version 6.9" | ||
6647 | |||
6648 | CVE_STATUS[CVE-2024-35948] = "fixed-version: Fixed from version 6.9" | ||
6649 | |||
6650 | CVE_STATUS[CVE-2024-35949] = "fixed-version: Fixed from version 6.9" | ||
6651 | |||
6652 | CVE_STATUS[CVE-2024-35950] = "fixed-version: Fixed from version 6.9" | ||
6653 | |||
6654 | CVE_STATUS[CVE-2024-35951] = "fixed-version: Fixed from version 6.9" | ||
6655 | |||
6656 | CVE_STATUS[CVE-2024-35952] = "fixed-version: Fixed from version 6.9" | ||
6657 | |||
6658 | CVE_STATUS[CVE-2024-35953] = "fixed-version: Fixed from version 6.9" | ||
6659 | |||
6660 | CVE_STATUS[CVE-2024-35954] = "fixed-version: Fixed from version 6.9" | ||
6661 | |||
6662 | CVE_STATUS[CVE-2024-35955] = "fixed-version: Fixed from version 6.9" | ||
6663 | |||
6664 | CVE_STATUS[CVE-2024-35956] = "fixed-version: Fixed from version 6.9" | ||
6665 | |||
6666 | CVE_STATUS[CVE-2024-35957] = "fixed-version: Fixed from version 6.8.7" | ||
6667 | |||
6668 | CVE_STATUS[CVE-2024-35958] = "fixed-version: Fixed from version 6.9" | ||
6669 | |||
6670 | CVE_STATUS[CVE-2024-35959] = "fixed-version: Fixed from version 6.9" | ||
6671 | |||
6672 | CVE_STATUS[CVE-2024-35960] = "fixed-version: Fixed from version 6.9" | ||
6673 | |||
6674 | CVE_STATUS[CVE-2024-35961] = "fixed-version: Fixed from version 6.9" | ||
6675 | |||
6676 | CVE_STATUS[CVE-2024-35962] = "fixed-version: Fixed from version 6.8.7" | ||
6677 | |||
6678 | CVE_STATUS[CVE-2024-35963] = "fixed-version: Fixed from version 6.9" | ||
6679 | |||
6680 | CVE_STATUS[CVE-2024-35964] = "fixed-version: Fixed from version 6.9" | ||
6681 | |||
6682 | CVE_STATUS[CVE-2024-35965] = "fixed-version: Fixed from version 6.9" | ||
6683 | |||
6684 | CVE_STATUS[CVE-2024-35966] = "fixed-version: Fixed from version 6.9" | ||
6685 | |||
6686 | CVE_STATUS[CVE-2024-35967] = "fixed-version: Fixed from version 6.9" | ||
6687 | |||
6688 | CVE_STATUS[CVE-2024-35968] = "fixed-version: Fixed from version 6.9" | ||
6689 | |||
6690 | CVE_STATUS[CVE-2024-35969] = "fixed-version: Fixed from version 6.9" | ||
6691 | |||
6692 | CVE_STATUS[CVE-2024-35970] = "fixed-version: Fixed from version 6.9" | ||
6693 | |||
6694 | CVE_STATUS[CVE-2024-35971] = "fixed-version: Fixed from version 6.9" | ||
6695 | |||
6696 | CVE_STATUS[CVE-2024-35972] = "fixed-version: Fixed from version 6.9" | ||
6697 | |||
6698 | CVE_STATUS[CVE-2024-35973] = "fixed-version: Fixed from version 6.9" | ||
6699 | |||
6700 | CVE_STATUS[CVE-2024-35974] = "fixed-version: Fixed from version 6.9" | ||
6701 | |||
6702 | CVE_STATUS[CVE-2024-35975] = "fixed-version: Fixed from version 6.9" | ||
6703 | |||
6704 | CVE_STATUS[CVE-2024-35976] = "fixed-version: Fixed from version 6.9" | ||
6705 | |||
6706 | CVE_STATUS[CVE-2024-35977] = "fixed-version: Fixed from version 6.9" | ||
6707 | |||
6708 | CVE_STATUS[CVE-2024-35978] = "fixed-version: Fixed from version 6.9" | ||
6709 | |||
6710 | CVE_STATUS[CVE-2024-35979] = "fixed-version: Fixed from version 6.9" | ||
6711 | |||
6712 | CVE_STATUS[CVE-2024-35980] = "fixed-version: Fixed from version 6.9" | ||
6713 | |||
6714 | CVE_STATUS[CVE-2024-35981] = "fixed-version: Fixed from version 6.9" | ||
6715 | |||
6716 | CVE_STATUS[CVE-2024-35982] = "fixed-version: Fixed from version 6.9" | ||
6717 | |||
6718 | CVE_STATUS[CVE-2024-35983] = "fixed-version: Fixed from version 6.8.9" | ||
6719 | |||
6720 | CVE_STATUS[CVE-2024-35984] = "fixed-version: Fixed from version 6.9" | ||
6721 | |||
6722 | CVE_STATUS[CVE-2024-35985] = "fixed-version: Fixed from version 6.9" | ||
6723 | |||
6724 | CVE_STATUS[CVE-2024-35986] = "fixed-version: Fixed from version 6.9" | ||
6725 | |||
6726 | CVE_STATUS[CVE-2024-35987] = "fixed-version: Fixed from version 6.9" | ||
6727 | |||
6728 | CVE_STATUS[CVE-2024-35988] = "fixed-version: Fixed from version 6.9" | ||
6729 | |||
6730 | CVE_STATUS[CVE-2024-35989] = "fixed-version: Fixed from version 6.9" | ||
6731 | |||
6732 | CVE_STATUS[CVE-2024-35990] = "fixed-version: Fixed from version 6.9" | ||
6733 | |||
6734 | CVE_STATUS[CVE-2024-35991] = "fixed-version: Fixed from version 6.9" | ||
6735 | |||
6736 | CVE_STATUS[CVE-2024-35992] = "fixed-version: Fixed from version 6.9" | ||
6737 | |||
6738 | CVE_STATUS[CVE-2024-35993] = "fixed-version: Fixed from version 6.9" | ||
6739 | |||
6740 | CVE_STATUS[CVE-2024-35994] = "fixed-version: Fixed from version 6.9" | ||
6741 | |||
6742 | CVE_STATUS[CVE-2024-35995] = "fixed-version: Fixed from version 6.9" | ||
6743 | |||
6744 | CVE_STATUS[CVE-2024-35996] = "fixed-version: Fixed from version 6.8.9" | ||
6745 | |||
6746 | CVE_STATUS[CVE-2024-35997] = "fixed-version: Fixed from version 6.9" | ||
6747 | |||
6748 | CVE_STATUS[CVE-2024-35998] = "fixed-version: Fixed from version 6.9" | ||
6749 | |||
6750 | CVE_STATUS[CVE-2024-35999] = "fixed-version: Fixed from version 6.9" | ||
6751 | |||
6752 | CVE_STATUS[CVE-2024-36000] = "fixed-version: Fixed from version 6.9" | ||
6753 | |||
6754 | CVE_STATUS[CVE-2024-36001] = "fixed-version: Fixed from version 6.9" | ||
6755 | |||
6756 | CVE_STATUS[CVE-2024-36002] = "fixed-version: Fixed from version 6.8.9" | ||
6757 | |||
6758 | CVE_STATUS[CVE-2024-36003] = "fixed-version: Fixed from version 6.9" | ||
6759 | |||
6760 | CVE_STATUS[CVE-2024-36004] = "fixed-version: Fixed from version 6.9" | ||
6761 | |||
6762 | CVE_STATUS[CVE-2024-36005] = "fixed-version: Fixed from version 6.9" | ||
6763 | |||
6764 | CVE_STATUS[CVE-2024-36006] = "fixed-version: Fixed from version 6.9" | ||
6765 | |||
6766 | CVE_STATUS[CVE-2024-36007] = "fixed-version: Fixed from version 6.9" | ||
6767 | |||
6768 | CVE_STATUS[CVE-2024-36008] = "fixed-version: Fixed from version 6.9" | ||
6769 | |||
6770 | CVE_STATUS[CVE-2024-36009] = "fixed-version: Fixed from version 6.9" | ||
6771 | |||
6772 | CVE_STATUS[CVE-2024-36010] = "fixed-version: Fixed from version 6.8" | ||
6773 | |||
6774 | CVE_STATUS[CVE-2024-36011] = "fixed-version: Fixed from version 6.9" | ||
6775 | |||
6776 | CVE_STATUS[CVE-2024-36012] = "fixed-version: Fixed from version 6.9" | ||
6777 | |||
6778 | CVE_STATUS[CVE-2024-36013] = "fixed-version: Fixed from version 6.9" | ||
6779 | |||
6780 | CVE_STATUS[CVE-2024-36014] = "fixed-version: Fixed from version 6.10" | ||
6781 | |||
6782 | CVE_STATUS[CVE-2024-36015] = "fixed-version: Fixed from version 6.10" | ||
6783 | |||
6784 | CVE_STATUS[CVE-2024-36016] = "fixed-version: Fixed from version 6.10" | ||
6785 | |||
6786 | CVE_STATUS[CVE-2024-36017] = "fixed-version: Fixed from version 6.9" | ||
6787 | |||
6788 | CVE_STATUS[CVE-2024-36018] = "fixed-version: Fixed from version 6.9" | ||
6789 | |||
6790 | CVE_STATUS[CVE-2024-36019] = "fixed-version: Fixed from version 6.9" | ||
6791 | |||
6792 | CVE_STATUS[CVE-2024-36020] = "fixed-version: Fixed from version 6.9" | ||
6793 | |||
6794 | CVE_STATUS[CVE-2024-36021] = "fixed-version: Fixed from version 6.9" | ||
6795 | |||
6796 | CVE_STATUS[CVE-2024-36022] = "fixed-version: Fixed from version 6.9" | ||
6797 | |||
6798 | CVE_STATUS[CVE-2024-36023] = "fixed-version: Fixed from version 6.9" | ||
6799 | |||
6800 | CVE_STATUS[CVE-2024-36024] = "fixed-version: Fixed from version 6.9" | ||
6801 | |||
6802 | CVE_STATUS[CVE-2024-36025] = "fixed-version: Fixed from version 6.9" | ||
6803 | |||
6804 | CVE_STATUS[CVE-2024-36026] = "fixed-version: Fixed from version 6.9" | ||
6805 | |||
6806 | CVE_STATUS[CVE-2024-36027] = "fixed-version: Fixed from version 6.9" | ||
6807 | |||
6808 | CVE_STATUS[CVE-2024-36028] = "fixed-version: Fixed from version 6.9" | ||
6809 | |||
6810 | CVE_STATUS[CVE-2024-36029] = "fixed-version: Fixed from version 6.9" | ||
6811 | |||
6812 | CVE_STATUS[CVE-2024-36030] = "fixed-version: Fixed from version 6.9" | ||
6813 | |||
6814 | CVE_STATUS[CVE-2024-36031] = "fixed-version: Fixed from version 6.10" | ||
6815 | |||
6816 | CVE_STATUS[CVE-2024-36032] = "fixed-version: Fixed from version 6.9" | ||
6817 | |||
6818 | CVE_STATUS[CVE-2024-36033] = "fixed-version: Fixed from version 6.9" | ||
6819 | |||
6820 | CVE_STATUS[CVE-2024-36244] = "fixed-version: Fixed from version 6.10" | ||
6821 | |||
6822 | CVE_STATUS[CVE-2024-36270] = "fixed-version: Fixed from version 6.10" | ||
6823 | |||
6824 | CVE_STATUS[CVE-2024-36281] = "fixed-version: Fixed from version 6.10" | ||
6825 | |||
6826 | CVE_STATUS[CVE-2024-36286] = "fixed-version: Fixed from version 6.10" | ||
6827 | |||
6828 | CVE_STATUS[CVE-2024-36288] = "fixed-version: Fixed from version 6.9.4" | ||
6829 | |||
6830 | CVE_STATUS[CVE-2024-36476] = "cpe-stable-backport: Backported in 6.12.9" | ||
6831 | |||
6832 | CVE_STATUS[CVE-2024-36477] = "fixed-version: Fixed from version 6.10" | ||
6833 | |||
6834 | CVE_STATUS[CVE-2024-36478] = "fixed-version: Fixed from version 6.10" | ||
6835 | |||
6836 | CVE_STATUS[CVE-2024-36479] = "fixed-version: Fixed from version 6.10" | ||
6837 | |||
6838 | CVE_STATUS[CVE-2024-36481] = "fixed-version: Fixed from version 6.10" | ||
6839 | |||
6840 | CVE_STATUS[CVE-2024-36484] = "fixed-version: Fixed from version 6.10" | ||
6841 | |||
6842 | CVE_STATUS[CVE-2024-36489] = "fixed-version: Fixed from version 6.10" | ||
6843 | |||
6844 | CVE_STATUS[CVE-2024-36880] = "fixed-version: Fixed from version 6.9" | ||
6845 | |||
6846 | CVE_STATUS[CVE-2024-36881] = "fixed-version: Fixed from version 6.9" | ||
6847 | |||
6848 | CVE_STATUS[CVE-2024-36882] = "fixed-version: Fixed from version 6.9" | ||
6849 | |||
6850 | CVE_STATUS[CVE-2024-36883] = "fixed-version: Fixed from version 6.9" | ||
6851 | |||
6852 | CVE_STATUS[CVE-2024-36884] = "fixed-version: Fixed from version 6.9" | ||
6853 | |||
6854 | CVE_STATUS[CVE-2024-36886] = "fixed-version: Fixed from version 6.9" | ||
6855 | |||
6856 | CVE_STATUS[CVE-2024-36887] = "fixed-version: Fixed from version 6.8.10" | ||
6857 | |||
6858 | CVE_STATUS[CVE-2024-36888] = "fixed-version: Fixed from version 6.9" | ||
6859 | |||
6860 | CVE_STATUS[CVE-2024-36889] = "fixed-version: Fixed from version 6.9" | ||
6861 | |||
6862 | CVE_STATUS[CVE-2024-36890] = "fixed-version: Fixed from version 6.9" | ||
6863 | |||
6864 | CVE_STATUS[CVE-2024-36891] = "fixed-version: Fixed from version 6.9" | ||
6865 | |||
6866 | CVE_STATUS[CVE-2024-36892] = "fixed-version: Fixed from version 6.9" | ||
6867 | |||
6868 | CVE_STATUS[CVE-2024-36893] = "fixed-version: Fixed from version 6.9" | ||
6869 | |||
6870 | CVE_STATUS[CVE-2024-36894] = "fixed-version: Fixed from version 6.9" | ||
6871 | |||
6872 | CVE_STATUS[CVE-2024-36895] = "fixed-version: Fixed from version 6.9" | ||
6873 | |||
6874 | CVE_STATUS[CVE-2024-36896] = "fixed-version: Fixed from version 6.9" | ||
6875 | |||
6876 | CVE_STATUS[CVE-2024-36897] = "fixed-version: Fixed from version 6.9" | ||
6877 | |||
6878 | CVE_STATUS[CVE-2024-36898] = "fixed-version: Fixed from version 6.9" | ||
6879 | |||
6880 | CVE_STATUS[CVE-2024-36899] = "fixed-version: Fixed from version 6.9" | ||
6881 | |||
6882 | CVE_STATUS[CVE-2024-36900] = "fixed-version: Fixed from version 6.9" | ||
6883 | |||
6884 | CVE_STATUS[CVE-2024-36901] = "fixed-version: Fixed from version 6.9" | ||
6885 | |||
6886 | CVE_STATUS[CVE-2024-36902] = "fixed-version: Fixed from version 6.9" | ||
6887 | |||
6888 | CVE_STATUS[CVE-2024-36903] = "fixed-version: Fixed from version 6.9" | ||
6889 | |||
6890 | CVE_STATUS[CVE-2024-36904] = "fixed-version: Fixed from version 6.9" | ||
6891 | |||
6892 | CVE_STATUS[CVE-2024-36905] = "fixed-version: Fixed from version 6.9" | ||
6893 | |||
6894 | CVE_STATUS[CVE-2024-36906] = "fixed-version: Fixed from version 6.9" | ||
6895 | |||
6896 | CVE_STATUS[CVE-2024-36908] = "fixed-version: Fixed from version 6.9" | ||
6897 | |||
6898 | CVE_STATUS[CVE-2024-36909] = "fixed-version: Fixed from version 6.9" | ||
6899 | |||
6900 | CVE_STATUS[CVE-2024-36910] = "fixed-version: Fixed from version 6.9" | ||
6901 | |||
6902 | CVE_STATUS[CVE-2024-36911] = "fixed-version: Fixed from version 6.9" | ||
6903 | |||
6904 | CVE_STATUS[CVE-2024-36912] = "fixed-version: Fixed from version 6.9" | ||
6905 | |||
6906 | CVE_STATUS[CVE-2024-36913] = "fixed-version: Fixed from version 6.9" | ||
6907 | |||
6908 | CVE_STATUS[CVE-2024-36914] = "fixed-version: Fixed from version 6.9" | ||
6909 | |||
6910 | CVE_STATUS[CVE-2024-36915] = "fixed-version: Fixed from version 6.9" | ||
6911 | |||
6912 | CVE_STATUS[CVE-2024-36916] = "fixed-version: Fixed from version 6.9" | ||
6913 | |||
6914 | CVE_STATUS[CVE-2024-36917] = "fixed-version: Fixed from version 6.9" | ||
6915 | |||
6916 | CVE_STATUS[CVE-2024-36918] = "fixed-version: Fixed from version 6.9" | ||
6917 | |||
6918 | CVE_STATUS[CVE-2024-36919] = "fixed-version: Fixed from version 6.9" | ||
6919 | |||
6920 | CVE_STATUS[CVE-2024-36920] = "fixed-version: Fixed from version 6.9" | ||
6921 | |||
6922 | CVE_STATUS[CVE-2024-36921] = "fixed-version: Fixed from version 6.9" | ||
6923 | |||
6924 | CVE_STATUS[CVE-2024-36922] = "fixed-version: Fixed from version 6.9" | ||
6925 | |||
6926 | CVE_STATUS[CVE-2024-36923] = "fixed-version: Fixed from version 6.9" | ||
6927 | |||
6928 | CVE_STATUS[CVE-2024-36924] = "fixed-version: Fixed from version 6.9" | ||
6929 | |||
6930 | CVE_STATUS[CVE-2024-36925] = "fixed-version: Fixed from version 6.9" | ||
6931 | |||
6932 | CVE_STATUS[CVE-2024-36926] = "fixed-version: Fixed from version 6.9" | ||
6933 | |||
6934 | CVE_STATUS[CVE-2024-36927] = "fixed-version: Fixed from version 6.9" | ||
6935 | |||
6936 | CVE_STATUS[CVE-2024-36928] = "fixed-version: Fixed from version 6.9" | ||
6937 | |||
6938 | CVE_STATUS[CVE-2024-36929] = "fixed-version: Fixed from version 6.9" | ||
6939 | |||
6940 | CVE_STATUS[CVE-2024-36930] = "fixed-version: Fixed from version 6.9" | ||
6941 | |||
6942 | CVE_STATUS[CVE-2024-36931] = "fixed-version: Fixed from version 6.9" | ||
6943 | |||
6944 | CVE_STATUS[CVE-2024-36932] = "fixed-version: Fixed from version 6.9" | ||
6945 | |||
6946 | CVE_STATUS[CVE-2024-36933] = "fixed-version: Fixed from version 6.9" | ||
6947 | |||
6948 | CVE_STATUS[CVE-2024-36934] = "fixed-version: Fixed from version 6.9" | ||
6949 | |||
6950 | CVE_STATUS[CVE-2024-36935] = "fixed-version: Fixed from version 6.9" | ||
6951 | |||
6952 | CVE_STATUS[CVE-2024-36936] = "fixed-version: Fixed from version 6.9" | ||
6953 | |||
6954 | CVE_STATUS[CVE-2024-36937] = "fixed-version: Fixed from version 6.9" | ||
6955 | |||
6956 | CVE_STATUS[CVE-2024-36938] = "fixed-version: Fixed from version 6.9" | ||
6957 | |||
6958 | CVE_STATUS[CVE-2024-36939] = "fixed-version: Fixed from version 6.9" | ||
6959 | |||
6960 | CVE_STATUS[CVE-2024-36940] = "fixed-version: Fixed from version 6.9" | ||
6961 | |||
6962 | CVE_STATUS[CVE-2024-36941] = "fixed-version: Fixed from version 6.9" | ||
6963 | |||
6964 | CVE_STATUS[CVE-2024-36943] = "fixed-version: Fixed from version 6.9" | ||
6965 | |||
6966 | CVE_STATUS[CVE-2024-36944] = "fixed-version: Fixed from version 6.8.10" | ||
6967 | |||
6968 | CVE_STATUS[CVE-2024-36945] = "fixed-version: Fixed from version 6.9" | ||
6969 | |||
6970 | CVE_STATUS[CVE-2024-36946] = "fixed-version: Fixed from version 6.9" | ||
6971 | |||
6972 | CVE_STATUS[CVE-2024-36947] = "fixed-version: Fixed from version 6.9" | ||
6973 | |||
6974 | CVE_STATUS[CVE-2024-36948] = "fixed-version: Fixed from version 6.9" | ||
6975 | |||
6976 | CVE_STATUS[CVE-2024-36949] = "fixed-version: Fixed from version 6.9" | ||
6977 | |||
6978 | CVE_STATUS[CVE-2024-36950] = "fixed-version: Fixed from version 6.9" | ||
6979 | |||
6980 | CVE_STATUS[CVE-2024-36951] = "fixed-version: Fixed from version 6.9" | ||
6981 | |||
6982 | CVE_STATUS[CVE-2024-36952] = "fixed-version: Fixed from version 6.9" | ||
6983 | |||
6984 | CVE_STATUS[CVE-2024-36953] = "fixed-version: Fixed from version 6.9" | ||
6985 | |||
6986 | CVE_STATUS[CVE-2024-36954] = "fixed-version: Fixed from version 6.9" | ||
6987 | |||
6988 | CVE_STATUS[CVE-2024-36955] = "fixed-version: Fixed from version 6.9" | ||
6989 | |||
6990 | CVE_STATUS[CVE-2024-36956] = "fixed-version: Fixed from version 6.9" | ||
6991 | |||
6992 | CVE_STATUS[CVE-2024-36957] = "fixed-version: Fixed from version 6.9" | ||
6993 | |||
6994 | CVE_STATUS[CVE-2024-36958] = "fixed-version: Fixed from version 6.9" | ||
6995 | |||
6996 | CVE_STATUS[CVE-2024-36959] = "fixed-version: Fixed from version 6.9" | ||
6997 | |||
6998 | CVE_STATUS[CVE-2024-36960] = "fixed-version: Fixed from version 6.9" | ||
6999 | |||
7000 | CVE_STATUS[CVE-2024-36961] = "fixed-version: Fixed from version 6.9" | ||
7001 | |||
7002 | CVE_STATUS[CVE-2024-36962] = "fixed-version: Fixed from version 6.8.10" | ||
7003 | |||
7004 | CVE_STATUS[CVE-2024-36963] = "fixed-version: Fixed from version 6.9" | ||
7005 | |||
7006 | CVE_STATUS[CVE-2024-36964] = "fixed-version: Fixed from version 6.9" | ||
7007 | |||
7008 | CVE_STATUS[CVE-2024-36965] = "fixed-version: Fixed from version 6.10" | ||
7009 | |||
7010 | CVE_STATUS[CVE-2024-36966] = "fixed-version: Fixed from version 6.9" | ||
7011 | |||
7012 | CVE_STATUS[CVE-2024-36967] = "fixed-version: Fixed from version 6.10" | ||
7013 | |||
7014 | CVE_STATUS[CVE-2024-36968] = "fixed-version: Fixed from version 6.10" | ||
7015 | |||
7016 | CVE_STATUS[CVE-2024-36969] = "fixed-version: Fixed from version 6.10" | ||
7017 | |||
7018 | CVE_STATUS[CVE-2024-36970] = "fixed-version: Fixed from version 6.10" | ||
7019 | |||
7020 | CVE_STATUS[CVE-2024-36971] = "fixed-version: Fixed from version 6.10" | ||
7021 | |||
7022 | CVE_STATUS[CVE-2024-36972] = "fixed-version: Fixed from version 6.10" | ||
7023 | |||
7024 | CVE_STATUS[CVE-2024-36973] = "fixed-version: Fixed from version 6.10" | ||
7025 | |||
7026 | CVE_STATUS[CVE-2024-36974] = "fixed-version: Fixed from version 6.10" | ||
7027 | |||
7028 | CVE_STATUS[CVE-2024-36975] = "fixed-version: Fixed from version 6.10" | ||
7029 | |||
7030 | CVE_STATUS[CVE-2024-36976] = "fixed-version: Fixed from version 6.10" | ||
7031 | |||
7032 | CVE_STATUS[CVE-2024-36977] = "fixed-version: Fixed from version 6.10" | ||
7033 | |||
7034 | CVE_STATUS[CVE-2024-36978] = "fixed-version: Fixed from version 6.10" | ||
7035 | |||
7036 | CVE_STATUS[CVE-2024-36979] = "fixed-version: Fixed from version 6.10" | ||
7037 | |||
7038 | CVE_STATUS[CVE-2024-37021] = "fixed-version: Fixed from version 6.10" | ||
7039 | |||
7040 | CVE_STATUS[CVE-2024-37026] = "fixed-version: Fixed from version 6.10" | ||
7041 | |||
7042 | CVE_STATUS[CVE-2024-37078] = "fixed-version: Fixed from version 6.10" | ||
7043 | |||
7044 | CVE_STATUS[CVE-2024-37354] = "fixed-version: Fixed from version 6.10" | ||
7045 | |||
7046 | CVE_STATUS[CVE-2024-37356] = "fixed-version: Fixed from version 6.10" | ||
7047 | |||
7048 | CVE_STATUS[CVE-2024-38306] = "fixed-version: Fixed from version 6.10" | ||
7049 | |||
7050 | CVE_STATUS[CVE-2024-38381] = "fixed-version: Fixed from version 6.10" | ||
7051 | |||
7052 | CVE_STATUS[CVE-2024-38384] = "fixed-version: Fixed from version 6.10" | ||
7053 | |||
7054 | CVE_STATUS[CVE-2024-38385] = "fixed-version: Fixed from version 6.10" | ||
7055 | |||
7056 | CVE_STATUS[CVE-2024-38388] = "fixed-version: Fixed from version 6.10" | ||
7057 | |||
7058 | CVE_STATUS[CVE-2024-38390] = "fixed-version: Fixed from version 6.10" | ||
7059 | |||
7060 | CVE_STATUS[CVE-2024-38538] = "fixed-version: Fixed from version 6.10" | ||
7061 | |||
7062 | CVE_STATUS[CVE-2024-38539] = "fixed-version: Fixed from version 6.10" | ||
7063 | |||
7064 | CVE_STATUS[CVE-2024-38540] = "fixed-version: Fixed from version 6.10" | ||
7065 | |||
7066 | CVE_STATUS[CVE-2024-38541] = "fixed-version: Fixed from version 6.10" | ||
7067 | |||
7068 | CVE_STATUS[CVE-2024-38542] = "fixed-version: Fixed from version 6.10" | ||
7069 | |||
7070 | CVE_STATUS[CVE-2024-38543] = "fixed-version: Fixed from version 6.10" | ||
7071 | |||
7072 | CVE_STATUS[CVE-2024-38544] = "fixed-version: Fixed from version 6.10" | ||
7073 | |||
7074 | CVE_STATUS[CVE-2024-38545] = "fixed-version: Fixed from version 6.10" | ||
7075 | |||
7076 | CVE_STATUS[CVE-2024-38546] = "fixed-version: Fixed from version 6.10" | ||
7077 | |||
7078 | CVE_STATUS[CVE-2024-38547] = "fixed-version: Fixed from version 6.10" | ||
7079 | |||
7080 | CVE_STATUS[CVE-2024-38548] = "fixed-version: Fixed from version 6.10" | ||
7081 | |||
7082 | CVE_STATUS[CVE-2024-38549] = "fixed-version: Fixed from version 6.10" | ||
7083 | |||
7084 | CVE_STATUS[CVE-2024-38550] = "fixed-version: Fixed from version 6.10" | ||
7085 | |||
7086 | CVE_STATUS[CVE-2024-38551] = "fixed-version: Fixed from version 6.10" | ||
7087 | |||
7088 | CVE_STATUS[CVE-2024-38552] = "fixed-version: Fixed from version 6.10" | ||
7089 | |||
7090 | CVE_STATUS[CVE-2024-38553] = "fixed-version: Fixed from version 6.10" | ||
7091 | |||
7092 | CVE_STATUS[CVE-2024-38554] = "fixed-version: Fixed from version 6.10" | ||
7093 | |||
7094 | CVE_STATUS[CVE-2024-38555] = "fixed-version: Fixed from version 6.10" | ||
7095 | |||
7096 | CVE_STATUS[CVE-2024-38556] = "fixed-version: Fixed from version 6.10" | ||
7097 | |||
7098 | CVE_STATUS[CVE-2024-38557] = "fixed-version: Fixed from version 6.10" | ||
7099 | |||
7100 | CVE_STATUS[CVE-2024-38558] = "fixed-version: Fixed from version 6.10" | ||
7101 | |||
7102 | CVE_STATUS[CVE-2024-38559] = "fixed-version: Fixed from version 6.10" | ||
7103 | |||
7104 | CVE_STATUS[CVE-2024-38560] = "fixed-version: Fixed from version 6.10" | ||
7105 | |||
7106 | CVE_STATUS[CVE-2024-38561] = "fixed-version: Fixed from version 6.10" | ||
7107 | |||
7108 | CVE_STATUS[CVE-2024-38562] = "fixed-version: Fixed from version 6.10" | ||
7109 | |||
7110 | CVE_STATUS[CVE-2024-38563] = "fixed-version: Fixed from version 6.10" | ||
7111 | |||
7112 | CVE_STATUS[CVE-2024-38564] = "fixed-version: Fixed from version 6.10" | ||
7113 | |||
7114 | CVE_STATUS[CVE-2024-38565] = "fixed-version: Fixed from version 6.10" | ||
7115 | |||
7116 | CVE_STATUS[CVE-2024-38566] = "fixed-version: Fixed from version 6.10" | ||
7117 | |||
7118 | CVE_STATUS[CVE-2024-38567] = "fixed-version: Fixed from version 6.10" | ||
7119 | |||
7120 | CVE_STATUS[CVE-2024-38568] = "fixed-version: Fixed from version 6.10" | ||
7121 | |||
7122 | CVE_STATUS[CVE-2024-38569] = "fixed-version: Fixed from version 6.10" | ||
7123 | |||
7124 | CVE_STATUS[CVE-2024-38570] = "fixed-version: Fixed from version 6.10" | ||
7125 | |||
7126 | CVE_STATUS[CVE-2024-38571] = "fixed-version: Fixed from version 6.10" | ||
7127 | |||
7128 | CVE_STATUS[CVE-2024-38572] = "fixed-version: Fixed from version 6.10" | ||
7129 | |||
7130 | CVE_STATUS[CVE-2024-38573] = "fixed-version: Fixed from version 6.10" | ||
7131 | |||
7132 | CVE_STATUS[CVE-2024-38574] = "fixed-version: Fixed from version 6.10" | ||
7133 | |||
7134 | CVE_STATUS[CVE-2024-38575] = "fixed-version: Fixed from version 6.10" | ||
7135 | |||
7136 | CVE_STATUS[CVE-2024-38576] = "fixed-version: Fixed from version 6.10" | ||
7137 | |||
7138 | CVE_STATUS[CVE-2024-38577] = "fixed-version: Fixed from version 6.10" | ||
7139 | |||
7140 | CVE_STATUS[CVE-2024-38578] = "fixed-version: Fixed from version 6.10" | ||
7141 | |||
7142 | CVE_STATUS[CVE-2024-38579] = "fixed-version: Fixed from version 6.10" | ||
7143 | |||
7144 | CVE_STATUS[CVE-2024-38580] = "fixed-version: Fixed from version 6.9" | ||
7145 | |||
7146 | CVE_STATUS[CVE-2024-38581] = "fixed-version: Fixed from version 6.9" | ||
7147 | |||
7148 | CVE_STATUS[CVE-2024-38582] = "fixed-version: Fixed from version 6.10" | ||
7149 | |||
7150 | CVE_STATUS[CVE-2024-38583] = "fixed-version: Fixed from version 6.10" | ||
7151 | |||
7152 | CVE_STATUS[CVE-2024-38584] = "fixed-version: Fixed from version 6.10" | ||
7153 | |||
7154 | CVE_STATUS[CVE-2024-38585] = "fixed-version: Fixed from version 6.10" | ||
7155 | |||
7156 | CVE_STATUS[CVE-2024-38586] = "fixed-version: Fixed from version 6.10" | ||
7157 | |||
7158 | CVE_STATUS[CVE-2024-38587] = "fixed-version: Fixed from version 6.10" | ||
7159 | |||
7160 | CVE_STATUS[CVE-2024-38588] = "fixed-version: Fixed from version 6.10" | ||
7161 | |||
7162 | CVE_STATUS[CVE-2024-38589] = "fixed-version: Fixed from version 6.10" | ||
7163 | |||
7164 | CVE_STATUS[CVE-2024-38590] = "fixed-version: Fixed from version 6.10" | ||
7165 | |||
7166 | CVE_STATUS[CVE-2024-38591] = "fixed-version: Fixed from version 6.10" | ||
7167 | |||
7168 | CVE_STATUS[CVE-2024-38592] = "fixed-version: Fixed from version 6.10" | ||
7169 | |||
7170 | CVE_STATUS[CVE-2024-38593] = "fixed-version: Fixed from version 6.10" | ||
7171 | |||
7172 | CVE_STATUS[CVE-2024-38594] = "fixed-version: Fixed from version 6.10" | ||
7173 | |||
7174 | CVE_STATUS[CVE-2024-38595] = "fixed-version: Fixed from version 6.10" | ||
7175 | |||
7176 | CVE_STATUS[CVE-2024-38596] = "fixed-version: Fixed from version 6.10" | ||
7177 | |||
7178 | CVE_STATUS[CVE-2024-38597] = "fixed-version: Fixed from version 6.10" | ||
7179 | |||
7180 | CVE_STATUS[CVE-2024-38598] = "fixed-version: Fixed from version 6.10" | ||
7181 | |||
7182 | CVE_STATUS[CVE-2024-38599] = "fixed-version: Fixed from version 6.10" | ||
7183 | |||
7184 | CVE_STATUS[CVE-2024-38600] = "fixed-version: Fixed from version 6.10" | ||
7185 | |||
7186 | CVE_STATUS[CVE-2024-38601] = "fixed-version: Fixed from version 6.10" | ||
7187 | |||
7188 | CVE_STATUS[CVE-2024-38602] = "fixed-version: Fixed from version 6.10" | ||
7189 | |||
7190 | CVE_STATUS[CVE-2024-38603] = "fixed-version: Fixed from version 6.10" | ||
7191 | |||
7192 | CVE_STATUS[CVE-2024-38604] = "fixed-version: Fixed from version 6.10" | ||
7193 | |||
7194 | CVE_STATUS[CVE-2024-38605] = "fixed-version: Fixed from version 6.10" | ||
7195 | |||
7196 | CVE_STATUS[CVE-2024-38606] = "fixed-version: Fixed from version 6.10" | ||
7197 | |||
7198 | CVE_STATUS[CVE-2024-38607] = "fixed-version: Fixed from version 6.10" | ||
7199 | |||
7200 | CVE_STATUS[CVE-2024-38608] = "fixed-version: Fixed from version 6.10" | ||
7201 | |||
7202 | CVE_STATUS[CVE-2024-38609] = "fixed-version: Fixed from version 6.10" | ||
7203 | |||
7204 | CVE_STATUS[CVE-2024-38610] = "fixed-version: Fixed from version 6.10" | ||
7205 | |||
7206 | CVE_STATUS[CVE-2024-38611] = "fixed-version: Fixed from version 6.10" | ||
7207 | |||
7208 | CVE_STATUS[CVE-2024-38612] = "fixed-version: Fixed from version 6.10" | ||
7209 | |||
7210 | CVE_STATUS[CVE-2024-38613] = "fixed-version: Fixed from version 6.10" | ||
7211 | |||
7212 | CVE_STATUS[CVE-2024-38614] = "fixed-version: Fixed from version 6.10" | ||
7213 | |||
7214 | CVE_STATUS[CVE-2024-38615] = "fixed-version: Fixed from version 6.10" | ||
7215 | |||
7216 | CVE_STATUS[CVE-2024-38616] = "fixed-version: Fixed from version 6.10" | ||
7217 | |||
7218 | CVE_STATUS[CVE-2024-38617] = "fixed-version: Fixed from version 6.10" | ||
7219 | |||
7220 | CVE_STATUS[CVE-2024-38618] = "fixed-version: Fixed from version 6.10" | ||
7221 | |||
7222 | CVE_STATUS[CVE-2024-38619] = "fixed-version: Fixed from version 6.10" | ||
7223 | |||
7224 | CVE_STATUS[CVE-2024-38620] = "fixed-version: Fixed from version 6.10" | ||
7225 | |||
7226 | CVE_STATUS[CVE-2024-38621] = "fixed-version: Fixed from version 6.10" | ||
7227 | |||
7228 | CVE_STATUS[CVE-2024-38622] = "fixed-version: Fixed from version 6.10" | ||
7229 | |||
7230 | CVE_STATUS[CVE-2024-38623] = "fixed-version: Fixed from version 6.10" | ||
7231 | |||
7232 | CVE_STATUS[CVE-2024-38624] = "fixed-version: Fixed from version 6.10" | ||
7233 | |||
7234 | CVE_STATUS[CVE-2024-38625] = "fixed-version: Fixed from version 6.10" | ||
7235 | |||
7236 | CVE_STATUS[CVE-2024-38626] = "fixed-version: Fixed from version 6.10" | ||
7237 | |||
7238 | CVE_STATUS[CVE-2024-38627] = "fixed-version: Fixed from version 6.10" | ||
7239 | |||
7240 | CVE_STATUS[CVE-2024-38628] = "fixed-version: Fixed from version 6.10" | ||
7241 | |||
7242 | CVE_STATUS[CVE-2024-38629] = "fixed-version: Fixed from version 6.10" | ||
7243 | |||
7244 | CVE_STATUS[CVE-2024-38630] = "fixed-version: Fixed from version 6.10" | ||
7245 | |||
7246 | CVE_STATUS[CVE-2024-38631] = "fixed-version: Fixed from version 6.10" | ||
7247 | |||
7248 | CVE_STATUS[CVE-2024-38632] = "fixed-version: Fixed from version 6.10" | ||
7249 | |||
7250 | CVE_STATUS[CVE-2024-38633] = "fixed-version: Fixed from version 6.10" | ||
7251 | |||
7252 | CVE_STATUS[CVE-2024-38634] = "fixed-version: Fixed from version 6.10" | ||
7253 | |||
7254 | CVE_STATUS[CVE-2024-38635] = "fixed-version: Fixed from version 6.10" | ||
7255 | |||
7256 | CVE_STATUS[CVE-2024-38636] = "fixed-version: Fixed from version 6.10" | ||
7257 | |||
7258 | CVE_STATUS[CVE-2024-38637] = "fixed-version: Fixed from version 6.10" | ||
7259 | |||
7260 | CVE_STATUS[CVE-2024-38659] = "fixed-version: Fixed from version 6.10" | ||
7261 | |||
7262 | CVE_STATUS[CVE-2024-38661] = "fixed-version: Fixed from version 6.10" | ||
7263 | |||
7264 | CVE_STATUS[CVE-2024-38662] = "fixed-version: Fixed from version 6.10" | ||
7265 | |||
7266 | CVE_STATUS[CVE-2024-38663] = "fixed-version: Fixed from version 6.10" | ||
7267 | |||
7268 | CVE_STATUS[CVE-2024-38664] = "fixed-version: Fixed from version 6.10" | ||
7269 | |||
7270 | CVE_STATUS[CVE-2024-38667] = "fixed-version: Fixed from version 6.10" | ||
7271 | |||
7272 | CVE_STATUS[CVE-2024-38780] = "fixed-version: Fixed from version 6.10" | ||
7273 | |||
7274 | CVE_STATUS[CVE-2024-39276] = "fixed-version: Fixed from version 6.10" | ||
7275 | |||
7276 | CVE_STATUS[CVE-2024-39277] = "fixed-version: Fixed from version 6.10" | ||
7277 | |||
7278 | CVE_STATUS[CVE-2024-39282] = "cpe-stable-backport: Backported in 6.12.9" | ||
7279 | |||
7280 | CVE_STATUS[CVE-2024-39291] = "fixed-version: Fixed from version 6.10" | ||
7281 | |||
7282 | CVE_STATUS[CVE-2024-39292] = "fixed-version: Fixed from version 6.10" | ||
7283 | |||
7284 | CVE_STATUS[CVE-2024-39293] = "fixed-version: Fixed from version 6.10" | ||
7285 | |||
7286 | CVE_STATUS[CVE-2024-39296] = "fixed-version: Fixed from version 6.10" | ||
7287 | |||
7288 | CVE_STATUS[CVE-2024-39298] = "fixed-version: Fixed from version 6.10" | ||
7289 | |||
7290 | CVE_STATUS[CVE-2024-39301] = "fixed-version: Fixed from version 6.10" | ||
7291 | |||
7292 | CVE_STATUS[CVE-2024-39371] = "fixed-version: Fixed from version 6.10" | ||
7293 | |||
7294 | CVE_STATUS[CVE-2024-39461] = "fixed-version: Fixed from version 6.10" | ||
7295 | |||
7296 | CVE_STATUS[CVE-2024-39462] = "fixed-version: Fixed from version 6.10" | ||
7297 | |||
7298 | CVE_STATUS[CVE-2024-39463] = "fixed-version: Fixed from version 6.10" | ||
7299 | |||
7300 | CVE_STATUS[CVE-2024-39464] = "fixed-version: Fixed from version 6.10" | ||
7301 | |||
7302 | CVE_STATUS[CVE-2024-39465] = "fixed-version: Fixed from version 6.10" | ||
7303 | |||
7304 | CVE_STATUS[CVE-2024-39466] = "fixed-version: Fixed from version 6.10" | ||
7305 | |||
7306 | CVE_STATUS[CVE-2024-39467] = "fixed-version: Fixed from version 6.10" | ||
7307 | |||
7308 | CVE_STATUS[CVE-2024-39468] = "fixed-version: Fixed from version 6.10" | ||
7309 | |||
7310 | CVE_STATUS[CVE-2024-39469] = "fixed-version: Fixed from version 6.10" | ||
7311 | |||
7312 | CVE_STATUS[CVE-2024-39470] = "fixed-version: Fixed from version 6.10" | ||
7313 | |||
7314 | CVE_STATUS[CVE-2024-39471] = "fixed-version: Fixed from version 6.10" | ||
7315 | |||
7316 | CVE_STATUS[CVE-2024-39472] = "fixed-version: Fixed from version 6.10" | ||
7317 | |||
7318 | CVE_STATUS[CVE-2024-39473] = "fixed-version: Fixed from version 6.10" | ||
7319 | |||
7320 | CVE_STATUS[CVE-2024-39474] = "fixed-version: Fixed from version 6.10" | ||
7321 | |||
7322 | CVE_STATUS[CVE-2024-39475] = "fixed-version: Fixed from version 6.10" | ||
7323 | |||
7324 | CVE_STATUS[CVE-2024-39476] = "fixed-version: Fixed from version 6.10" | ||
7325 | |||
7326 | CVE_STATUS[CVE-2024-39477] = "fixed-version: Fixed from version 6.10" | ||
7327 | |||
7328 | CVE_STATUS[CVE-2024-39478] = "fixed-version: Fixed from version 6.10" | ||
7329 | |||
7330 | CVE_STATUS[CVE-2024-39479] = "fixed-version: Fixed from version 6.10" | ||
7331 | |||
7332 | CVE_STATUS[CVE-2024-39480] = "fixed-version: Fixed from version 6.10" | ||
7333 | |||
7334 | CVE_STATUS[CVE-2024-39481] = "fixed-version: Fixed from version 6.10" | ||
7335 | |||
7336 | CVE_STATUS[CVE-2024-39482] = "fixed-version: Fixed from version 6.10" | ||
7337 | |||
7338 | CVE_STATUS[CVE-2024-39483] = "fixed-version: Fixed from version 6.10" | ||
7339 | |||
7340 | CVE_STATUS[CVE-2024-39484] = "fixed-version: Fixed from version 6.10" | ||
7341 | |||
7342 | CVE_STATUS[CVE-2024-39485] = "fixed-version: Fixed from version 6.10" | ||
7343 | |||
7344 | CVE_STATUS[CVE-2024-39486] = "fixed-version: Fixed from version 6.10" | ||
7345 | |||
7346 | CVE_STATUS[CVE-2024-39487] = "fixed-version: Fixed from version 6.10" | ||
7347 | |||
7348 | CVE_STATUS[CVE-2024-39488] = "fixed-version: Fixed from version 6.10" | ||
7349 | |||
7350 | CVE_STATUS[CVE-2024-39489] = "fixed-version: Fixed from version 6.10" | ||
7351 | |||
7352 | CVE_STATUS[CVE-2024-39490] = "fixed-version: Fixed from version 6.10" | ||
7353 | |||
7354 | CVE_STATUS[CVE-2024-39491] = "fixed-version: Fixed from version 6.10" | ||
7355 | |||
7356 | CVE_STATUS[CVE-2024-39492] = "fixed-version: Fixed from version 6.10" | ||
7357 | |||
7358 | CVE_STATUS[CVE-2024-39493] = "fixed-version: Fixed from version 6.10" | ||
7359 | |||
7360 | CVE_STATUS[CVE-2024-39494] = "fixed-version: Fixed from version 6.10" | ||
7361 | |||
7362 | CVE_STATUS[CVE-2024-39495] = "fixed-version: Fixed from version 6.10" | ||
7363 | |||
7364 | CVE_STATUS[CVE-2024-39496] = "fixed-version: Fixed from version 6.10" | ||
7365 | |||
7366 | CVE_STATUS[CVE-2024-39497] = "fixed-version: Fixed from version 6.10" | ||
7367 | |||
7368 | CVE_STATUS[CVE-2024-39498] = "fixed-version: Fixed from version 6.10" | ||
7369 | |||
7370 | CVE_STATUS[CVE-2024-39499] = "fixed-version: Fixed from version 6.10" | ||
7371 | |||
7372 | CVE_STATUS[CVE-2024-39500] = "fixed-version: Fixed from version 6.10" | ||
7373 | |||
7374 | CVE_STATUS[CVE-2024-39502] = "fixed-version: Fixed from version 6.10" | ||
7375 | |||
7376 | CVE_STATUS[CVE-2024-39503] = "fixed-version: Fixed from version 6.10" | ||
7377 | |||
7378 | CVE_STATUS[CVE-2024-39504] = "fixed-version: Fixed from version 6.10" | ||
7379 | |||
7380 | CVE_STATUS[CVE-2024-39505] = "fixed-version: Fixed from version 6.10" | ||
7381 | |||
7382 | CVE_STATUS[CVE-2024-39506] = "fixed-version: Fixed from version 6.10" | ||
7383 | |||
7384 | CVE_STATUS[CVE-2024-39507] = "fixed-version: Fixed from version 6.10" | ||
7385 | |||
7386 | CVE_STATUS[CVE-2024-39508] = "fixed-version: Fixed from version 6.10" | ||
7387 | |||
7388 | CVE_STATUS[CVE-2024-39509] = "fixed-version: Fixed from version 6.10" | ||
7389 | |||
7390 | CVE_STATUS[CVE-2024-39510] = "fixed-version: Fixed from version 6.10" | ||
7391 | |||
7392 | CVE_STATUS[CVE-2024-40899] = "fixed-version: Fixed from version 6.10" | ||
7393 | |||
7394 | CVE_STATUS[CVE-2024-40900] = "fixed-version: Fixed from version 6.10" | ||
7395 | |||
7396 | CVE_STATUS[CVE-2024-40901] = "fixed-version: Fixed from version 6.10" | ||
7397 | |||
7398 | CVE_STATUS[CVE-2024-40902] = "fixed-version: Fixed from version 6.10" | ||
7399 | |||
7400 | CVE_STATUS[CVE-2024-40903] = "fixed-version: Fixed from version 6.10" | ||
7401 | |||
7402 | CVE_STATUS[CVE-2024-40904] = "fixed-version: Fixed from version 6.10" | ||
7403 | |||
7404 | CVE_STATUS[CVE-2024-40905] = "fixed-version: Fixed from version 6.10" | ||
7405 | |||
7406 | CVE_STATUS[CVE-2024-40906] = "fixed-version: Fixed from version 6.10" | ||
7407 | |||
7408 | CVE_STATUS[CVE-2024-40907] = "fixed-version: Fixed from version 6.10" | ||
7409 | |||
7410 | CVE_STATUS[CVE-2024-40908] = "fixed-version: Fixed from version 6.10" | ||
7411 | |||
7412 | CVE_STATUS[CVE-2024-40909] = "fixed-version: Fixed from version 6.10" | ||
7413 | |||
7414 | CVE_STATUS[CVE-2024-40910] = "fixed-version: Fixed from version 6.10" | ||
7415 | |||
7416 | CVE_STATUS[CVE-2024-40911] = "fixed-version: Fixed from version 6.10" | ||
7417 | |||
7418 | CVE_STATUS[CVE-2024-40912] = "fixed-version: Fixed from version 6.10" | ||
7419 | |||
7420 | CVE_STATUS[CVE-2024-40913] = "fixed-version: Fixed from version 6.10" | ||
7421 | |||
7422 | CVE_STATUS[CVE-2024-40914] = "fixed-version: Fixed from version 6.10" | ||
7423 | |||
7424 | CVE_STATUS[CVE-2024-40915] = "fixed-version: Fixed from version 6.10" | ||
7425 | |||
7426 | CVE_STATUS[CVE-2024-40916] = "fixed-version: Fixed from version 6.10" | ||
7427 | |||
7428 | CVE_STATUS[CVE-2024-40917] = "fixed-version: Fixed from version 6.10" | ||
7429 | |||
7430 | CVE_STATUS[CVE-2024-40918] = "fixed-version: Fixed from version 6.10" | ||
7431 | |||
7432 | CVE_STATUS[CVE-2024-40919] = "fixed-version: Fixed from version 6.10" | ||
7433 | |||
7434 | CVE_STATUS[CVE-2024-40920] = "fixed-version: Fixed from version 6.9.6" | ||
7435 | |||
7436 | CVE_STATUS[CVE-2024-40921] = "fixed-version: Fixed from version 6.9.6" | ||
7437 | |||
7438 | CVE_STATUS[CVE-2024-40922] = "fixed-version: Fixed from version 6.10" | ||
7439 | |||
7440 | CVE_STATUS[CVE-2024-40923] = "fixed-version: Fixed from version 6.10" | ||
7441 | |||
7442 | CVE_STATUS[CVE-2024-40924] = "fixed-version: Fixed from version 6.10" | ||
7443 | |||
7444 | CVE_STATUS[CVE-2024-40925] = "fixed-version: Fixed from version 6.10" | ||
7445 | |||
7446 | CVE_STATUS[CVE-2024-40926] = "fixed-version: Fixed from version 6.10" | ||
7447 | |||
7448 | CVE_STATUS[CVE-2024-40927] = "fixed-version: Fixed from version 6.10" | ||
7449 | |||
7450 | CVE_STATUS[CVE-2024-40928] = "fixed-version: Fixed from version 6.10" | ||
7451 | |||
7452 | CVE_STATUS[CVE-2024-40929] = "fixed-version: Fixed from version 6.10" | ||
7453 | |||
7454 | CVE_STATUS[CVE-2024-40930] = "fixed-version: Fixed from version 6.10" | ||
7455 | |||
7456 | CVE_STATUS[CVE-2024-40931] = "fixed-version: Fixed from version 6.10" | ||
7457 | |||
7458 | CVE_STATUS[CVE-2024-40932] = "fixed-version: Fixed from version 6.10" | ||
7459 | |||
7460 | CVE_STATUS[CVE-2024-40933] = "fixed-version: Fixed from version 6.10" | ||
7461 | |||
7462 | CVE_STATUS[CVE-2024-40934] = "fixed-version: Fixed from version 6.10" | ||
7463 | |||
7464 | CVE_STATUS[CVE-2024-40935] = "fixed-version: Fixed from version 6.10" | ||
7465 | |||
7466 | CVE_STATUS[CVE-2024-40936] = "fixed-version: Fixed from version 6.10" | ||
7467 | |||
7468 | CVE_STATUS[CVE-2024-40937] = "fixed-version: Fixed from version 6.10" | ||
7469 | |||
7470 | CVE_STATUS[CVE-2024-40938] = "fixed-version: Fixed from version 6.10" | ||
7471 | |||
7472 | CVE_STATUS[CVE-2024-40939] = "fixed-version: Fixed from version 6.10" | ||
7473 | |||
7474 | CVE_STATUS[CVE-2024-40940] = "fixed-version: Fixed from version 6.10" | ||
7475 | |||
7476 | CVE_STATUS[CVE-2024-40941] = "fixed-version: Fixed from version 6.10" | ||
7477 | |||
7478 | CVE_STATUS[CVE-2024-40942] = "fixed-version: Fixed from version 6.10" | ||
7479 | |||
7480 | CVE_STATUS[CVE-2024-40943] = "fixed-version: Fixed from version 6.10" | ||
7481 | |||
7482 | CVE_STATUS[CVE-2024-40944] = "fixed-version: Fixed from version 6.10" | ||
7483 | |||
7484 | CVE_STATUS[CVE-2024-40945] = "fixed-version: Fixed from version 6.10" | ||
7485 | |||
7486 | CVE_STATUS[CVE-2024-40947] = "fixed-version: Fixed from version 6.10" | ||
7487 | |||
7488 | CVE_STATUS[CVE-2024-40948] = "fixed-version: Fixed from version 6.10" | ||
7489 | |||
7490 | CVE_STATUS[CVE-2024-40949] = "fixed-version: Fixed from version 6.10" | ||
7491 | |||
7492 | CVE_STATUS[CVE-2024-40950] = "fixed-version: Fixed from version 6.10" | ||
7493 | |||
7494 | CVE_STATUS[CVE-2024-40951] = "fixed-version: Fixed from version 6.10" | ||
7495 | |||
7496 | CVE_STATUS[CVE-2024-40952] = "fixed-version: Fixed from version 6.10" | ||
7497 | |||
7498 | CVE_STATUS[CVE-2024-40953] = "fixed-version: Fixed from version 6.10" | ||
7499 | |||
7500 | CVE_STATUS[CVE-2024-40954] = "fixed-version: Fixed from version 6.10" | ||
7501 | |||
7502 | CVE_STATUS[CVE-2024-40955] = "fixed-version: Fixed from version 6.10" | ||
7503 | |||
7504 | CVE_STATUS[CVE-2024-40956] = "fixed-version: Fixed from version 6.10" | ||
7505 | |||
7506 | CVE_STATUS[CVE-2024-40957] = "fixed-version: Fixed from version 6.10" | ||
7507 | |||
7508 | CVE_STATUS[CVE-2024-40958] = "fixed-version: Fixed from version 6.10" | ||
7509 | |||
7510 | CVE_STATUS[CVE-2024-40959] = "fixed-version: Fixed from version 6.10" | ||
7511 | |||
7512 | CVE_STATUS[CVE-2024-40960] = "fixed-version: Fixed from version 6.10" | ||
7513 | |||
7514 | CVE_STATUS[CVE-2024-40961] = "fixed-version: Fixed from version 6.10" | ||
7515 | |||
7516 | CVE_STATUS[CVE-2024-40962] = "fixed-version: Fixed from version 6.10" | ||
7517 | |||
7518 | CVE_STATUS[CVE-2024-40963] = "fixed-version: Fixed from version 6.10" | ||
7519 | |||
7520 | CVE_STATUS[CVE-2024-40964] = "fixed-version: Fixed from version 6.10" | ||
7521 | |||
7522 | CVE_STATUS[CVE-2024-40965] = "fixed-version: Fixed from version 6.10" | ||
7523 | |||
7524 | CVE_STATUS[CVE-2024-40966] = "fixed-version: Fixed from version 6.10" | ||
7525 | |||
7526 | CVE_STATUS[CVE-2024-40967] = "fixed-version: Fixed from version 6.10" | ||
7527 | |||
7528 | CVE_STATUS[CVE-2024-40968] = "fixed-version: Fixed from version 6.10" | ||
7529 | |||
7530 | CVE_STATUS[CVE-2024-40969] = "fixed-version: Fixed from version 6.10" | ||
7531 | |||
7532 | CVE_STATUS[CVE-2024-40970] = "fixed-version: Fixed from version 6.10" | ||
7533 | |||
7534 | CVE_STATUS[CVE-2024-40971] = "fixed-version: Fixed from version 6.10" | ||
7535 | |||
7536 | CVE_STATUS[CVE-2024-40972] = "fixed-version: Fixed from version 6.10" | ||
7537 | |||
7538 | CVE_STATUS[CVE-2024-40973] = "fixed-version: Fixed from version 6.10" | ||
7539 | |||
7540 | CVE_STATUS[CVE-2024-40974] = "fixed-version: Fixed from version 6.10" | ||
7541 | |||
7542 | CVE_STATUS[CVE-2024-40975] = "fixed-version: Fixed from version 6.10" | ||
7543 | |||
7544 | CVE_STATUS[CVE-2024-40976] = "fixed-version: Fixed from version 6.10" | ||
7545 | |||
7546 | CVE_STATUS[CVE-2024-40977] = "fixed-version: Fixed from version 6.10" | ||
7547 | |||
7548 | CVE_STATUS[CVE-2024-40978] = "fixed-version: Fixed from version 6.10" | ||
7549 | |||
7550 | CVE_STATUS[CVE-2024-40979] = "fixed-version: Fixed from version 6.10" | ||
7551 | |||
7552 | CVE_STATUS[CVE-2024-40980] = "fixed-version: Fixed from version 6.10" | ||
7553 | |||
7554 | CVE_STATUS[CVE-2024-40981] = "fixed-version: Fixed from version 6.10" | ||
7555 | |||
7556 | CVE_STATUS[CVE-2024-40983] = "fixed-version: Fixed from version 6.10" | ||
7557 | |||
7558 | CVE_STATUS[CVE-2024-40984] = "fixed-version: Fixed from version 6.10" | ||
7559 | |||
7560 | CVE_STATUS[CVE-2024-40985] = "fixed-version: Fixed from version 6.10" | ||
7561 | |||
7562 | CVE_STATUS[CVE-2024-40986] = "fixed-version: Fixed from version 6.10" | ||
7563 | |||
7564 | CVE_STATUS[CVE-2024-40987] = "fixed-version: Fixed from version 6.10" | ||
7565 | |||
7566 | CVE_STATUS[CVE-2024-40988] = "fixed-version: Fixed from version 6.10" | ||
7567 | |||
7568 | CVE_STATUS[CVE-2024-40989] = "fixed-version: Fixed from version 6.10" | ||
7569 | |||
7570 | CVE_STATUS[CVE-2024-40990] = "fixed-version: Fixed from version 6.10" | ||
7571 | |||
7572 | CVE_STATUS[CVE-2024-40991] = "fixed-version: Fixed from version 6.10" | ||
7573 | |||
7574 | CVE_STATUS[CVE-2024-40992] = "fixed-version: Fixed from version 6.10" | ||
7575 | |||
7576 | CVE_STATUS[CVE-2024-40993] = "fixed-version: Fixed from version 6.9.7" | ||
7577 | |||
7578 | CVE_STATUS[CVE-2024-40994] = "fixed-version: Fixed from version 6.10" | ||
7579 | |||
7580 | CVE_STATUS[CVE-2024-40995] = "fixed-version: Fixed from version 6.10" | ||
7581 | |||
7582 | CVE_STATUS[CVE-2024-40996] = "fixed-version: Fixed from version 6.10" | ||
7583 | |||
7584 | CVE_STATUS[CVE-2024-40997] = "fixed-version: Fixed from version 6.10" | ||
7585 | |||
7586 | CVE_STATUS[CVE-2024-40998] = "fixed-version: Fixed from version 6.10" | ||
7587 | |||
7588 | CVE_STATUS[CVE-2024-40999] = "fixed-version: Fixed from version 6.10" | ||
7589 | |||
7590 | CVE_STATUS[CVE-2024-41000] = "fixed-version: Fixed from version 6.10" | ||
7591 | |||
7592 | CVE_STATUS[CVE-2024-41001] = "fixed-version: Fixed from version 6.10" | ||
7593 | |||
7594 | CVE_STATUS[CVE-2024-41002] = "fixed-version: Fixed from version 6.10" | ||
7595 | |||
7596 | CVE_STATUS[CVE-2024-41003] = "fixed-version: Fixed from version 6.10" | ||
7597 | |||
7598 | CVE_STATUS[CVE-2024-41004] = "fixed-version: Fixed from version 6.10" | ||
7599 | |||
7600 | CVE_STATUS[CVE-2024-41005] = "fixed-version: Fixed from version 6.10" | ||
7601 | |||
7602 | CVE_STATUS[CVE-2024-41006] = "fixed-version: Fixed from version 6.10" | ||
7603 | |||
7604 | CVE_STATUS[CVE-2024-41007] = "fixed-version: Fixed from version 6.10" | ||
7605 | |||
7606 | CVE_STATUS[CVE-2024-41008] = "fixed-version: Fixed from version 6.9" | ||
7607 | |||
7608 | CVE_STATUS[CVE-2024-41009] = "fixed-version: Fixed from version 6.10" | ||
7609 | |||
7610 | CVE_STATUS[CVE-2024-41010] = "fixed-version: Fixed from version 6.10" | ||
7611 | |||
7612 | CVE_STATUS[CVE-2024-41011] = "fixed-version: Fixed from version 6.9" | ||
7613 | |||
7614 | CVE_STATUS[CVE-2024-41012] = "fixed-version: Fixed from version 6.10" | ||
7615 | |||
7616 | CVE_STATUS[CVE-2024-41013] = "fixed-version: Fixed from version 6.11" | ||
7617 | |||
7618 | CVE_STATUS[CVE-2024-41014] = "fixed-version: Fixed from version 6.11" | ||
7619 | |||
7620 | CVE_STATUS[CVE-2024-41015] = "fixed-version: Fixed from version 6.11" | ||
7621 | |||
7622 | CVE_STATUS[CVE-2024-41016] = "fixed-version: Fixed from version 6.11" | ||
7623 | |||
7624 | CVE_STATUS[CVE-2024-41017] = "fixed-version: Fixed from version 6.11" | ||
7625 | |||
7626 | CVE_STATUS[CVE-2024-41018] = "fixed-version: Fixed from version 6.11" | ||
7627 | |||
7628 | CVE_STATUS[CVE-2024-41019] = "fixed-version: Fixed from version 6.11" | ||
7629 | |||
7630 | CVE_STATUS[CVE-2024-41020] = "fixed-version: Fixed from version 6.11" | ||
7631 | |||
7632 | CVE_STATUS[CVE-2024-41021] = "fixed-version: Fixed from version 6.11" | ||
7633 | |||
7634 | CVE_STATUS[CVE-2024-41022] = "fixed-version: Fixed from version 6.11" | ||
7635 | |||
7636 | CVE_STATUS[CVE-2024-41023] = "fixed-version: Fixed from version 6.10" | ||
7637 | |||
7638 | CVE_STATUS[CVE-2024-41025] = "fixed-version: Fixed from version 6.10" | ||
7639 | |||
7640 | CVE_STATUS[CVE-2024-41026] = "fixed-version: Fixed from version 6.10" | ||
7641 | |||
7642 | CVE_STATUS[CVE-2024-41027] = "fixed-version: Fixed from version 6.10" | ||
7643 | |||
7644 | CVE_STATUS[CVE-2024-41028] = "fixed-version: Fixed from version 6.10" | ||
7645 | |||
7646 | CVE_STATUS[CVE-2024-41029] = "fixed-version: Fixed from version 6.10" | ||
7647 | |||
7648 | CVE_STATUS[CVE-2024-41030] = "fixed-version: Fixed from version 6.10" | ||
7649 | |||
7650 | CVE_STATUS[CVE-2024-41031] = "fixed-version: Fixed from version 6.10" | ||
7651 | |||
7652 | CVE_STATUS[CVE-2024-41032] = "fixed-version: Fixed from version 6.10" | ||
7653 | |||
7654 | CVE_STATUS[CVE-2024-41033] = "fixed-version: Fixed from version 6.10" | ||
7655 | |||
7656 | CVE_STATUS[CVE-2024-41034] = "fixed-version: Fixed from version 6.10" | ||
7657 | |||
7658 | CVE_STATUS[CVE-2024-41035] = "fixed-version: Fixed from version 6.10" | ||
7659 | |||
7660 | CVE_STATUS[CVE-2024-41036] = "fixed-version: Fixed from version 6.10" | ||
7661 | |||
7662 | CVE_STATUS[CVE-2024-41037] = "fixed-version: Fixed from version 6.10" | ||
7663 | |||
7664 | CVE_STATUS[CVE-2024-41038] = "fixed-version: Fixed from version 6.10" | ||
7665 | |||
7666 | CVE_STATUS[CVE-2024-41039] = "fixed-version: Fixed from version 6.10" | ||
7667 | |||
7668 | CVE_STATUS[CVE-2024-41040] = "fixed-version: Fixed from version 6.10" | ||
7669 | |||
7670 | CVE_STATUS[CVE-2024-41041] = "fixed-version: Fixed from version 6.10" | ||
7671 | |||
7672 | CVE_STATUS[CVE-2024-41042] = "fixed-version: Fixed from version 6.10" | ||
7673 | |||
7674 | CVE_STATUS[CVE-2024-41043] = "fixed-version: Fixed from version 6.10" | ||
7675 | |||
7676 | CVE_STATUS[CVE-2024-41044] = "fixed-version: Fixed from version 6.10" | ||
7677 | |||
7678 | CVE_STATUS[CVE-2024-41045] = "fixed-version: Fixed from version 6.10" | ||
7679 | |||
7680 | CVE_STATUS[CVE-2024-41046] = "fixed-version: Fixed from version 6.10" | ||
7681 | |||
7682 | CVE_STATUS[CVE-2024-41047] = "fixed-version: Fixed from version 6.10" | ||
7683 | |||
7684 | CVE_STATUS[CVE-2024-41048] = "fixed-version: Fixed from version 6.10" | ||
7685 | |||
7686 | CVE_STATUS[CVE-2024-41049] = "fixed-version: Fixed from version 6.10" | ||
7687 | |||
7688 | CVE_STATUS[CVE-2024-41050] = "fixed-version: Fixed from version 6.10" | ||
7689 | |||
7690 | CVE_STATUS[CVE-2024-41051] = "fixed-version: Fixed from version 6.10" | ||
7691 | |||
7692 | CVE_STATUS[CVE-2024-41052] = "fixed-version: Fixed from version 6.9.10" | ||
7693 | |||
7694 | CVE_STATUS[CVE-2024-41053] = "fixed-version: Fixed from version 6.10" | ||
7695 | |||
7696 | CVE_STATUS[CVE-2024-41054] = "fixed-version: Fixed from version 6.10" | ||
7697 | |||
7698 | CVE_STATUS[CVE-2024-41055] = "fixed-version: Fixed from version 6.10" | ||
7699 | |||
7700 | CVE_STATUS[CVE-2024-41056] = "fixed-version: Fixed from version 6.10" | ||
7701 | |||
7702 | CVE_STATUS[CVE-2024-41057] = "fixed-version: Fixed from version 6.10" | ||
7703 | |||
7704 | CVE_STATUS[CVE-2024-41058] = "fixed-version: Fixed from version 6.10" | ||
7705 | |||
7706 | CVE_STATUS[CVE-2024-41059] = "fixed-version: Fixed from version 6.10" | ||
7707 | |||
7708 | CVE_STATUS[CVE-2024-41060] = "fixed-version: Fixed from version 6.10" | ||
7709 | |||
7710 | CVE_STATUS[CVE-2024-41061] = "fixed-version: Fixed from version 6.10" | ||
7711 | |||
7712 | CVE_STATUS[CVE-2024-41062] = "fixed-version: Fixed from version 6.10" | ||
7713 | |||
7714 | CVE_STATUS[CVE-2024-41063] = "fixed-version: Fixed from version 6.10" | ||
7715 | |||
7716 | CVE_STATUS[CVE-2024-41064] = "fixed-version: Fixed from version 6.10" | ||
7717 | |||
7718 | CVE_STATUS[CVE-2024-41065] = "fixed-version: Fixed from version 6.10" | ||
7719 | |||
7720 | CVE_STATUS[CVE-2024-41066] = "fixed-version: Fixed from version 6.10" | ||
7721 | |||
7722 | CVE_STATUS[CVE-2024-41067] = "fixed-version: Fixed from version 6.10" | ||
7723 | |||
7724 | CVE_STATUS[CVE-2024-41068] = "fixed-version: Fixed from version 6.10" | ||
7725 | |||
7726 | CVE_STATUS[CVE-2024-41069] = "fixed-version: Fixed from version 6.10" | ||
7727 | |||
7728 | CVE_STATUS[CVE-2024-41070] = "fixed-version: Fixed from version 6.10" | ||
7729 | |||
7730 | CVE_STATUS[CVE-2024-41072] = "fixed-version: Fixed from version 6.10" | ||
7731 | |||
7732 | CVE_STATUS[CVE-2024-41073] = "fixed-version: Fixed from version 6.10" | ||
7733 | |||
7734 | CVE_STATUS[CVE-2024-41074] = "fixed-version: Fixed from version 6.10" | ||
7735 | |||
7736 | CVE_STATUS[CVE-2024-41075] = "fixed-version: Fixed from version 6.10" | ||
7737 | |||
7738 | CVE_STATUS[CVE-2024-41076] = "fixed-version: Fixed from version 6.10" | ||
7739 | |||
7740 | CVE_STATUS[CVE-2024-41077] = "fixed-version: Fixed from version 6.10" | ||
7741 | |||
7742 | CVE_STATUS[CVE-2024-41078] = "fixed-version: Fixed from version 6.10" | ||
7743 | |||
7744 | CVE_STATUS[CVE-2024-41079] = "fixed-version: Fixed from version 6.10" | ||
7745 | |||
7746 | CVE_STATUS[CVE-2024-41080] = "fixed-version: Fixed from version 6.10" | ||
7747 | |||
7748 | CVE_STATUS[CVE-2024-41081] = "fixed-version: Fixed from version 6.10" | ||
7749 | |||
7750 | CVE_STATUS[CVE-2024-41082] = "fixed-version: Fixed from version 6.10" | ||
7751 | |||
7752 | CVE_STATUS[CVE-2024-41083] = "fixed-version: Fixed from version 6.10" | ||
7753 | |||
7754 | CVE_STATUS[CVE-2024-41084] = "fixed-version: Fixed from version 6.10" | ||
7755 | |||
7756 | CVE_STATUS[CVE-2024-41085] = "fixed-version: Fixed from version 6.10" | ||
7757 | |||
7758 | CVE_STATUS[CVE-2024-41086] = "fixed-version: Fixed from version 6.10" | ||
7759 | |||
7760 | CVE_STATUS[CVE-2024-41087] = "fixed-version: Fixed from version 6.10" | ||
7761 | |||
7762 | CVE_STATUS[CVE-2024-41088] = "fixed-version: Fixed from version 6.10" | ||
7763 | |||
7764 | CVE_STATUS[CVE-2024-41089] = "fixed-version: Fixed from version 6.10" | ||
7765 | |||
7766 | CVE_STATUS[CVE-2024-41090] = "fixed-version: Fixed from version 6.11" | ||
7767 | |||
7768 | CVE_STATUS[CVE-2024-41091] = "fixed-version: Fixed from version 6.11" | ||
7769 | |||
7770 | CVE_STATUS[CVE-2024-41092] = "fixed-version: Fixed from version 6.10" | ||
7771 | |||
7772 | CVE_STATUS[CVE-2024-41093] = "fixed-version: Fixed from version 6.10" | ||
7773 | |||
7774 | CVE_STATUS[CVE-2024-41094] = "fixed-version: Fixed from version 6.10" | ||
7775 | |||
7776 | CVE_STATUS[CVE-2024-41095] = "fixed-version: Fixed from version 6.10" | ||
7777 | |||
7778 | CVE_STATUS[CVE-2024-41096] = "fixed-version: Fixed from version 6.10" | ||
7779 | |||
7780 | CVE_STATUS[CVE-2024-41097] = "fixed-version: Fixed from version 6.10" | ||
7781 | |||
7782 | CVE_STATUS[CVE-2024-41098] = "fixed-version: Fixed from version 6.10" | ||
7783 | |||
7784 | CVE_STATUS[CVE-2024-41149] = "fixed-version: Fixed from version 6.12.7" | ||
7785 | |||
7786 | CVE_STATUS[CVE-2024-41932] = "cpe-stable-backport: Backported in 6.12.5" | ||
7787 | |||
7788 | CVE_STATUS[CVE-2024-41935] = "cpe-stable-backport: Backported in 6.12.5" | ||
7789 | |||
7790 | CVE_STATUS[CVE-2024-42063] = "fixed-version: Fixed from version 6.10" | ||
7791 | |||
7792 | CVE_STATUS[CVE-2024-42064] = "fixed-version: Fixed from version 6.10" | ||
7793 | |||
7794 | CVE_STATUS[CVE-2024-42065] = "fixed-version: Fixed from version 6.10" | ||
7795 | |||
7796 | CVE_STATUS[CVE-2024-42066] = "fixed-version: Fixed from version 6.10" | ||
7797 | |||
7798 | CVE_STATUS[CVE-2024-42067] = "fixed-version: Fixed from version 6.10" | ||
7799 | |||
7800 | CVE_STATUS[CVE-2024-42068] = "fixed-version: Fixed from version 6.10" | ||
7801 | |||
7802 | CVE_STATUS[CVE-2024-42069] = "fixed-version: Fixed from version 6.10" | ||
7803 | |||
7804 | CVE_STATUS[CVE-2024-42070] = "fixed-version: Fixed from version 6.10" | ||
7805 | |||
7806 | CVE_STATUS[CVE-2024-42071] = "fixed-version: Fixed from version 6.10" | ||
7807 | |||
7808 | CVE_STATUS[CVE-2024-42072] = "fixed-version: Fixed from version 6.10" | ||
7809 | |||
7810 | CVE_STATUS[CVE-2024-42073] = "fixed-version: Fixed from version 6.10" | ||
7811 | |||
7812 | CVE_STATUS[CVE-2024-42074] = "fixed-version: Fixed from version 6.10" | ||
7813 | |||
7814 | CVE_STATUS[CVE-2024-42075] = "fixed-version: Fixed from version 6.10" | ||
7815 | |||
7816 | CVE_STATUS[CVE-2024-42076] = "fixed-version: Fixed from version 6.10" | ||
7817 | |||
7818 | CVE_STATUS[CVE-2024-42077] = "fixed-version: Fixed from version 6.10" | ||
7819 | |||
7820 | CVE_STATUS[CVE-2024-42078] = "fixed-version: Fixed from version 6.10" | ||
7821 | |||
7822 | CVE_STATUS[CVE-2024-42079] = "fixed-version: Fixed from version 6.10" | ||
7823 | |||
7824 | CVE_STATUS[CVE-2024-42080] = "fixed-version: Fixed from version 6.10" | ||
7825 | |||
7826 | CVE_STATUS[CVE-2024-42081] = "fixed-version: Fixed from version 6.10" | ||
7827 | |||
7828 | CVE_STATUS[CVE-2024-42082] = "fixed-version: Fixed from version 6.10" | ||
7829 | |||
7830 | CVE_STATUS[CVE-2024-42083] = "fixed-version: Fixed from version 6.10" | ||
7831 | |||
7832 | CVE_STATUS[CVE-2024-42084] = "fixed-version: Fixed from version 6.10" | ||
7833 | |||
7834 | CVE_STATUS[CVE-2024-42085] = "fixed-version: Fixed from version 6.10" | ||
7835 | |||
7836 | CVE_STATUS[CVE-2024-42086] = "fixed-version: Fixed from version 6.10" | ||
7837 | |||
7838 | CVE_STATUS[CVE-2024-42087] = "fixed-version: Fixed from version 6.10" | ||
7839 | |||
7840 | CVE_STATUS[CVE-2024-42088] = "fixed-version: Fixed from version 6.10" | ||
7841 | |||
7842 | CVE_STATUS[CVE-2024-42089] = "fixed-version: Fixed from version 6.10" | ||
7843 | |||
7844 | CVE_STATUS[CVE-2024-42090] = "fixed-version: Fixed from version 6.10" | ||
7845 | |||
7846 | CVE_STATUS[CVE-2024-42091] = "fixed-version: Fixed from version 6.10" | ||
7847 | |||
7848 | CVE_STATUS[CVE-2024-42092] = "fixed-version: Fixed from version 6.10" | ||
7849 | |||
7850 | CVE_STATUS[CVE-2024-42093] = "fixed-version: Fixed from version 6.10" | ||
7851 | |||
7852 | CVE_STATUS[CVE-2024-42094] = "fixed-version: Fixed from version 6.10" | ||
7853 | |||
7854 | CVE_STATUS[CVE-2024-42095] = "fixed-version: Fixed from version 6.10" | ||
7855 | |||
7856 | CVE_STATUS[CVE-2024-42096] = "fixed-version: Fixed from version 6.10" | ||
7857 | |||
7858 | CVE_STATUS[CVE-2024-42097] = "fixed-version: Fixed from version 6.10" | ||
7859 | |||
7860 | CVE_STATUS[CVE-2024-42098] = "fixed-version: Fixed from version 6.10" | ||
7861 | |||
7862 | CVE_STATUS[CVE-2024-42099] = "fixed-version: Fixed from version 6.10" | ||
7863 | |||
7864 | CVE_STATUS[CVE-2024-42100] = "fixed-version: Fixed from version 6.10" | ||
7865 | |||
7866 | CVE_STATUS[CVE-2024-42101] = "fixed-version: Fixed from version 6.10" | ||
7867 | |||
7868 | CVE_STATUS[CVE-2024-42102] = "fixed-version: Fixed from version 6.10" | ||
7869 | |||
7870 | CVE_STATUS[CVE-2024-42103] = "fixed-version: Fixed from version 6.9.9" | ||
7871 | |||
7872 | CVE_STATUS[CVE-2024-42104] = "fixed-version: Fixed from version 6.10" | ||
7873 | |||
7874 | CVE_STATUS[CVE-2024-42105] = "fixed-version: Fixed from version 6.10" | ||
7875 | |||
7876 | CVE_STATUS[CVE-2024-42106] = "fixed-version: Fixed from version 6.10" | ||
7877 | |||
7878 | CVE_STATUS[CVE-2024-42107] = "fixed-version: Fixed from version 6.10" | ||
7879 | |||
7880 | CVE_STATUS[CVE-2024-42108] = "fixed-version: Fixed from version 6.10" | ||
7881 | |||
7882 | CVE_STATUS[CVE-2024-42109] = "fixed-version: Fixed from version 6.10" | ||
7883 | |||
7884 | CVE_STATUS[CVE-2024-42110] = "fixed-version: Fixed from version 6.10" | ||
7885 | |||
7886 | CVE_STATUS[CVE-2024-42111] = "fixed-version: Fixed from version 6.10" | ||
7887 | |||
7888 | CVE_STATUS[CVE-2024-42112] = "fixed-version: Fixed from version 6.10" | ||
7889 | |||
7890 | CVE_STATUS[CVE-2024-42113] = "fixed-version: Fixed from version 6.10" | ||
7891 | |||
7892 | CVE_STATUS[CVE-2024-42114] = "fixed-version: Fixed from version 6.10" | ||
7893 | |||
7894 | CVE_STATUS[CVE-2024-42115] = "fixed-version: Fixed from version 6.10" | ||
7895 | |||
7896 | CVE_STATUS[CVE-2024-42117] = "fixed-version: Fixed from version 6.10" | ||
7897 | |||
7898 | CVE_STATUS[CVE-2024-42118] = "fixed-version: Fixed from version 6.10" | ||
7899 | |||
7900 | CVE_STATUS[CVE-2024-42119] = "fixed-version: Fixed from version 6.10" | ||
7901 | |||
7902 | CVE_STATUS[CVE-2024-42120] = "fixed-version: Fixed from version 6.10" | ||
7903 | |||
7904 | CVE_STATUS[CVE-2024-42121] = "fixed-version: Fixed from version 6.10" | ||
7905 | |||
7906 | CVE_STATUS[CVE-2024-42122] = "fixed-version: Fixed from version 6.10" | ||
7907 | |||
7908 | CVE_STATUS[CVE-2024-42123] = "fixed-version: Fixed from version 6.10" | ||
7909 | |||
7910 | CVE_STATUS[CVE-2024-42124] = "fixed-version: Fixed from version 6.10" | ||
7911 | |||
7912 | CVE_STATUS[CVE-2024-42125] = "fixed-version: Fixed from version 6.10" | ||
7913 | |||
7914 | CVE_STATUS[CVE-2024-42126] = "fixed-version: Fixed from version 6.10" | ||
7915 | |||
7916 | CVE_STATUS[CVE-2024-42127] = "fixed-version: Fixed from version 6.10" | ||
7917 | |||
7918 | CVE_STATUS[CVE-2024-42128] = "fixed-version: Fixed from version 6.10" | ||
7919 | |||
7920 | CVE_STATUS[CVE-2024-42129] = "fixed-version: Fixed from version 6.10" | ||
7921 | |||
7922 | CVE_STATUS[CVE-2024-42130] = "fixed-version: Fixed from version 6.10" | ||
7923 | |||
7924 | CVE_STATUS[CVE-2024-42131] = "fixed-version: Fixed from version 6.10" | ||
7925 | |||
7926 | CVE_STATUS[CVE-2024-42132] = "fixed-version: Fixed from version 6.10" | ||
7927 | |||
7928 | CVE_STATUS[CVE-2024-42133] = "fixed-version: Fixed from version 6.10" | ||
7929 | |||
7930 | CVE_STATUS[CVE-2024-42134] = "fixed-version: Fixed from version 6.10" | ||
7931 | |||
7932 | CVE_STATUS[CVE-2024-42135] = "fixed-version: Fixed from version 6.10" | ||
7933 | |||
7934 | CVE_STATUS[CVE-2024-42136] = "fixed-version: Fixed from version 6.10" | ||
7935 | |||
7936 | CVE_STATUS[CVE-2024-42137] = "fixed-version: Fixed from version 6.10" | ||
7937 | |||
7938 | CVE_STATUS[CVE-2024-42138] = "fixed-version: Fixed from version 6.10" | ||
7939 | |||
7940 | CVE_STATUS[CVE-2024-42139] = "fixed-version: Fixed from version 6.10" | ||
7941 | |||
7942 | CVE_STATUS[CVE-2024-42140] = "fixed-version: Fixed from version 6.10" | ||
7943 | |||
7944 | CVE_STATUS[CVE-2024-42141] = "fixed-version: Fixed from version 6.10" | ||
7945 | |||
7946 | CVE_STATUS[CVE-2024-42142] = "fixed-version: Fixed from version 6.10" | ||
7947 | |||
7948 | CVE_STATUS[CVE-2024-42144] = "fixed-version: Fixed from version 6.10" | ||
7949 | |||
7950 | CVE_STATUS[CVE-2024-42145] = "fixed-version: Fixed from version 6.10" | ||
7951 | |||
7952 | CVE_STATUS[CVE-2024-42146] = "fixed-version: Fixed from version 6.10" | ||
7953 | |||
7954 | CVE_STATUS[CVE-2024-42147] = "fixed-version: Fixed from version 6.10" | ||
7955 | |||
7956 | CVE_STATUS[CVE-2024-42148] = "fixed-version: Fixed from version 6.10" | ||
7957 | |||
7958 | CVE_STATUS[CVE-2024-42149] = "fixed-version: Fixed from version 6.10" | ||
7959 | |||
7960 | CVE_STATUS[CVE-2024-42150] = "fixed-version: Fixed from version 6.10" | ||
7961 | |||
7962 | CVE_STATUS[CVE-2024-42151] = "fixed-version: Fixed from version 6.10" | ||
7963 | |||
7964 | CVE_STATUS[CVE-2024-42152] = "fixed-version: Fixed from version 6.10" | ||
7965 | |||
7966 | CVE_STATUS[CVE-2024-42153] = "fixed-version: Fixed from version 6.10" | ||
7967 | |||
7968 | CVE_STATUS[CVE-2024-42154] = "fixed-version: Fixed from version 6.10" | ||
7969 | |||
7970 | CVE_STATUS[CVE-2024-42155] = "fixed-version: Fixed from version 6.10" | ||
7971 | |||
7972 | CVE_STATUS[CVE-2024-42156] = "fixed-version: Fixed from version 6.10" | ||
7973 | |||
7974 | CVE_STATUS[CVE-2024-42157] = "fixed-version: Fixed from version 6.10" | ||
7975 | |||
7976 | CVE_STATUS[CVE-2024-42158] = "fixed-version: Fixed from version 6.10" | ||
7977 | |||
7978 | CVE_STATUS[CVE-2024-42159] = "fixed-version: Fixed from version 6.10" | ||
7979 | |||
7980 | CVE_STATUS[CVE-2024-42160] = "fixed-version: Fixed from version 6.10" | ||
7981 | |||
7982 | CVE_STATUS[CVE-2024-42161] = "fixed-version: Fixed from version 6.10" | ||
7983 | |||
7984 | CVE_STATUS[CVE-2024-42162] = "fixed-version: Fixed from version 6.10" | ||
7985 | |||
7986 | CVE_STATUS[CVE-2024-42223] = "fixed-version: Fixed from version 6.10" | ||
7987 | |||
7988 | CVE_STATUS[CVE-2024-42224] = "fixed-version: Fixed from version 6.10" | ||
7989 | |||
7990 | CVE_STATUS[CVE-2024-42225] = "fixed-version: Fixed from version 6.10" | ||
7991 | |||
7992 | CVE_STATUS[CVE-2024-42227] = "fixed-version: Fixed from version 6.10" | ||
7993 | |||
7994 | CVE_STATUS[CVE-2024-42228] = "fixed-version: Fixed from version 6.10" | ||
7995 | |||
7996 | CVE_STATUS[CVE-2024-42229] = "fixed-version: Fixed from version 6.10" | ||
7997 | |||
7998 | CVE_STATUS[CVE-2024-42230] = "fixed-version: Fixed from version 6.10" | ||
7999 | |||
8000 | CVE_STATUS[CVE-2024-42231] = "fixed-version: Fixed from version 6.10" | ||
8001 | |||
8002 | CVE_STATUS[CVE-2024-42232] = "fixed-version: Fixed from version 6.10" | ||
8003 | |||
8004 | CVE_STATUS[CVE-2024-42233] = "fixed-version: Fixed from version 6.10" | ||
8005 | |||
8006 | CVE_STATUS[CVE-2024-42234] = "fixed-version: Fixed from version 6.10" | ||
8007 | |||
8008 | CVE_STATUS[CVE-2024-42235] = "fixed-version: Fixed from version 6.10" | ||
8009 | |||
8010 | CVE_STATUS[CVE-2024-42236] = "fixed-version: Fixed from version 6.10" | ||
8011 | |||
8012 | CVE_STATUS[CVE-2024-42237] = "fixed-version: Fixed from version 6.10" | ||
8013 | |||
8014 | CVE_STATUS[CVE-2024-42238] = "fixed-version: Fixed from version 6.10" | ||
8015 | |||
8016 | CVE_STATUS[CVE-2024-42239] = "fixed-version: Fixed from version 6.10" | ||
8017 | |||
8018 | CVE_STATUS[CVE-2024-42240] = "fixed-version: Fixed from version 6.10" | ||
8019 | |||
8020 | CVE_STATUS[CVE-2024-42241] = "fixed-version: Fixed from version 6.10" | ||
8021 | |||
8022 | CVE_STATUS[CVE-2024-42242] = "fixed-version: Fixed from version 6.10" | ||
8023 | |||
8024 | CVE_STATUS[CVE-2024-42243] = "fixed-version: Fixed from version 6.10" | ||
8025 | |||
8026 | CVE_STATUS[CVE-2024-42244] = "fixed-version: Fixed from version 6.10" | ||
8027 | |||
8028 | CVE_STATUS[CVE-2024-42245] = "fixed-version: Fixed from version 6.10" | ||
8029 | |||
8030 | CVE_STATUS[CVE-2024-42246] = "fixed-version: Fixed from version 6.10" | ||
8031 | |||
8032 | CVE_STATUS[CVE-2024-42247] = "fixed-version: Fixed from version 6.10" | ||
8033 | |||
8034 | CVE_STATUS[CVE-2024-42248] = "fixed-version: Fixed from version 6.10" | ||
8035 | |||
8036 | CVE_STATUS[CVE-2024-42249] = "fixed-version: Fixed from version 6.10" | ||
8037 | |||
8038 | CVE_STATUS[CVE-2024-42250] = "fixed-version: Fixed from version 6.10" | ||
8039 | |||
8040 | CVE_STATUS[CVE-2024-42251] = "fixed-version: Fixed from version 6.10" | ||
8041 | |||
8042 | CVE_STATUS[CVE-2024-42252] = "fixed-version: Fixed from version 6.10" | ||
8043 | |||
8044 | CVE_STATUS[CVE-2024-42253] = "fixed-version: Fixed from version 6.10" | ||
8045 | |||
8046 | CVE_STATUS[CVE-2024-42254] = "fixed-version: Fixed from version 6.11" | ||
8047 | |||
8048 | CVE_STATUS[CVE-2024-42255] = "fixed-version: Fixed from version 6.11" | ||
8049 | |||
8050 | CVE_STATUS[CVE-2024-42256] = "fixed-version: Fixed from version 6.11" | ||
8051 | |||
8052 | CVE_STATUS[CVE-2024-42257] = "fixed-version: Fixed from version 6.11" | ||
8053 | |||
8054 | CVE_STATUS[CVE-2024-42258] = "fixed-version: Fixed from version 6.11" | ||
8055 | |||
8056 | CVE_STATUS[CVE-2024-42259] = "fixed-version: Fixed from version 6.11" | ||
8057 | |||
8058 | CVE_STATUS[CVE-2024-42260] = "fixed-version: Fixed from version 6.11" | ||
8059 | |||
8060 | CVE_STATUS[CVE-2024-42261] = "fixed-version: Fixed from version 6.11" | ||
8061 | |||
8062 | CVE_STATUS[CVE-2024-42262] = "fixed-version: Fixed from version 6.11" | ||
8063 | |||
8064 | CVE_STATUS[CVE-2024-42263] = "fixed-version: Fixed from version 6.11" | ||
8065 | |||
8066 | CVE_STATUS[CVE-2024-42264] = "fixed-version: Fixed from version 6.11" | ||
8067 | |||
8068 | CVE_STATUS[CVE-2024-42265] = "fixed-version: Fixed from version 6.11" | ||
8069 | |||
8070 | CVE_STATUS[CVE-2024-42266] = "fixed-version: Fixed from version 6.11" | ||
8071 | |||
8072 | CVE_STATUS[CVE-2024-42267] = "fixed-version: Fixed from version 6.11" | ||
8073 | |||
8074 | CVE_STATUS[CVE-2024-42268] = "fixed-version: Fixed from version 6.11" | ||
8075 | |||
8076 | CVE_STATUS[CVE-2024-42269] = "fixed-version: Fixed from version 6.11" | ||
8077 | |||
8078 | CVE_STATUS[CVE-2024-42270] = "fixed-version: Fixed from version 6.11" | ||
8079 | |||
8080 | CVE_STATUS[CVE-2024-42271] = "fixed-version: Fixed from version 6.11" | ||
8081 | |||
8082 | CVE_STATUS[CVE-2024-42272] = "fixed-version: Fixed from version 6.11" | ||
8083 | |||
8084 | CVE_STATUS[CVE-2024-42273] = "fixed-version: Fixed from version 6.11" | ||
8085 | |||
8086 | CVE_STATUS[CVE-2024-42274] = "fixed-version: Fixed from version 6.11" | ||
8087 | |||
8088 | CVE_STATUS[CVE-2024-42275] = "fixed-version: Fixed from version 6.11" | ||
8089 | |||
8090 | CVE_STATUS[CVE-2024-42276] = "fixed-version: Fixed from version 6.11" | ||
8091 | |||
8092 | CVE_STATUS[CVE-2024-42277] = "fixed-version: Fixed from version 6.11" | ||
8093 | |||
8094 | CVE_STATUS[CVE-2024-42278] = "fixed-version: Fixed from version 6.11" | ||
8095 | |||
8096 | CVE_STATUS[CVE-2024-42279] = "fixed-version: Fixed from version 6.11" | ||
8097 | |||
8098 | CVE_STATUS[CVE-2024-42280] = "fixed-version: Fixed from version 6.11" | ||
8099 | |||
8100 | CVE_STATUS[CVE-2024-42281] = "fixed-version: Fixed from version 6.11" | ||
8101 | |||
8102 | CVE_STATUS[CVE-2024-42282] = "fixed-version: Fixed from version 6.11" | ||
8103 | |||
8104 | CVE_STATUS[CVE-2024-42283] = "fixed-version: Fixed from version 6.11" | ||
8105 | |||
8106 | CVE_STATUS[CVE-2024-42284] = "fixed-version: Fixed from version 6.11" | ||
8107 | |||
8108 | CVE_STATUS[CVE-2024-42285] = "fixed-version: Fixed from version 6.11" | ||
8109 | |||
8110 | CVE_STATUS[CVE-2024-42286] = "fixed-version: Fixed from version 6.11" | ||
8111 | |||
8112 | CVE_STATUS[CVE-2024-42287] = "fixed-version: Fixed from version 6.11" | ||
8113 | |||
8114 | CVE_STATUS[CVE-2024-42288] = "fixed-version: Fixed from version 6.11" | ||
8115 | |||
8116 | CVE_STATUS[CVE-2024-42289] = "fixed-version: Fixed from version 6.11" | ||
8117 | |||
8118 | CVE_STATUS[CVE-2024-42290] = "fixed-version: Fixed from version 6.11" | ||
8119 | |||
8120 | CVE_STATUS[CVE-2024-42291] = "fixed-version: Fixed from version 6.11" | ||
8121 | |||
8122 | CVE_STATUS[CVE-2024-42292] = "fixed-version: Fixed from version 6.11" | ||
8123 | |||
8124 | CVE_STATUS[CVE-2024-42293] = "fixed-version: Fixed from version 6.11" | ||
8125 | |||
8126 | CVE_STATUS[CVE-2024-42294] = "fixed-version: Fixed from version 6.11" | ||
8127 | |||
8128 | CVE_STATUS[CVE-2024-42295] = "fixed-version: Fixed from version 6.11" | ||
8129 | |||
8130 | CVE_STATUS[CVE-2024-42296] = "fixed-version: Fixed from version 6.11" | ||
8131 | |||
8132 | CVE_STATUS[CVE-2024-42297] = "fixed-version: Fixed from version 6.11" | ||
8133 | |||
8134 | CVE_STATUS[CVE-2024-42298] = "fixed-version: Fixed from version 6.11" | ||
8135 | |||
8136 | CVE_STATUS[CVE-2024-42299] = "fixed-version: Fixed from version 6.11" | ||
8137 | |||
8138 | CVE_STATUS[CVE-2024-42300] = "fixed-version: Fixed from version 6.11" | ||
8139 | |||
8140 | CVE_STATUS[CVE-2024-42301] = "fixed-version: Fixed from version 6.11" | ||
8141 | |||
8142 | CVE_STATUS[CVE-2024-42302] = "fixed-version: Fixed from version 6.11" | ||
8143 | |||
8144 | CVE_STATUS[CVE-2024-42303] = "fixed-version: Fixed from version 6.11" | ||
8145 | |||
8146 | CVE_STATUS[CVE-2024-42304] = "fixed-version: Fixed from version 6.11" | ||
8147 | |||
8148 | CVE_STATUS[CVE-2024-42305] = "fixed-version: Fixed from version 6.11" | ||
8149 | |||
8150 | CVE_STATUS[CVE-2024-42306] = "fixed-version: Fixed from version 6.11" | ||
8151 | |||
8152 | CVE_STATUS[CVE-2024-42307] = "fixed-version: Fixed from version 6.11" | ||
8153 | |||
8154 | CVE_STATUS[CVE-2024-42309] = "fixed-version: Fixed from version 6.11" | ||
8155 | |||
8156 | CVE_STATUS[CVE-2024-42310] = "fixed-version: Fixed from version 6.11" | ||
8157 | |||
8158 | CVE_STATUS[CVE-2024-42311] = "fixed-version: Fixed from version 6.11" | ||
8159 | |||
8160 | CVE_STATUS[CVE-2024-42312] = "fixed-version: Fixed from version 6.11" | ||
8161 | |||
8162 | CVE_STATUS[CVE-2024-42313] = "fixed-version: Fixed from version 6.11" | ||
8163 | |||
8164 | CVE_STATUS[CVE-2024-42314] = "fixed-version: Fixed from version 6.11" | ||
8165 | |||
8166 | CVE_STATUS[CVE-2024-42315] = "fixed-version: Fixed from version 6.11" | ||
8167 | |||
8168 | CVE_STATUS[CVE-2024-42316] = "fixed-version: Fixed from version 6.11" | ||
8169 | |||
8170 | CVE_STATUS[CVE-2024-42317] = "fixed-version: Fixed from version 6.11" | ||
8171 | |||
8172 | CVE_STATUS[CVE-2024-42318] = "fixed-version: Fixed from version 6.11" | ||
8173 | |||
8174 | CVE_STATUS[CVE-2024-42319] = "fixed-version: Fixed from version 6.11" | ||
8175 | |||
8176 | CVE_STATUS[CVE-2024-42320] = "fixed-version: Fixed from version 6.11" | ||
8177 | |||
8178 | CVE_STATUS[CVE-2024-42321] = "fixed-version: Fixed from version 6.11" | ||
8179 | |||
8180 | CVE_STATUS[CVE-2024-42322] = "fixed-version: Fixed from version 6.11" | ||
8181 | |||
8182 | CVE_STATUS[CVE-2024-43098] = "cpe-stable-backport: Backported in 6.12.5" | ||
8183 | |||
8184 | CVE_STATUS[CVE-2024-43815] = "fixed-version: Fixed from version 6.11" | ||
8185 | |||
8186 | CVE_STATUS[CVE-2024-43816] = "fixed-version: Fixed from version 6.11" | ||
8187 | |||
8188 | CVE_STATUS[CVE-2024-43817] = "fixed-version: Fixed from version 6.11" | ||
8189 | |||
8190 | CVE_STATUS[CVE-2024-43818] = "fixed-version: Fixed from version 6.11" | ||
8191 | |||
8192 | CVE_STATUS[CVE-2024-43819] = "fixed-version: Fixed from version 6.11" | ||
8193 | |||
8194 | CVE_STATUS[CVE-2024-43820] = "fixed-version: Fixed from version 6.11" | ||
8195 | |||
8196 | CVE_STATUS[CVE-2024-43821] = "fixed-version: Fixed from version 6.11" | ||
8197 | |||
8198 | CVE_STATUS[CVE-2024-43822] = "fixed-version: Fixed from version 6.11" | ||
8199 | |||
8200 | CVE_STATUS[CVE-2024-43823] = "fixed-version: Fixed from version 6.11" | ||
8201 | |||
8202 | CVE_STATUS[CVE-2024-43824] = "fixed-version: Fixed from version 6.11" | ||
8203 | |||
8204 | CVE_STATUS[CVE-2024-43825] = "fixed-version: Fixed from version 6.11" | ||
8205 | |||
8206 | CVE_STATUS[CVE-2024-43826] = "fixed-version: Fixed from version 6.11" | ||
8207 | |||
8208 | CVE_STATUS[CVE-2024-43827] = "fixed-version: Fixed from version 6.11" | ||
8209 | |||
8210 | CVE_STATUS[CVE-2024-43828] = "fixed-version: Fixed from version 6.11" | ||
8211 | |||
8212 | CVE_STATUS[CVE-2024-43829] = "fixed-version: Fixed from version 6.11" | ||
8213 | |||
8214 | CVE_STATUS[CVE-2024-43830] = "fixed-version: Fixed from version 6.11" | ||
8215 | |||
8216 | CVE_STATUS[CVE-2024-43831] = "fixed-version: Fixed from version 6.11" | ||
8217 | |||
8218 | CVE_STATUS[CVE-2024-43832] = "fixed-version: Fixed from version 6.11" | ||
8219 | |||
8220 | CVE_STATUS[CVE-2024-43833] = "fixed-version: Fixed from version 6.11" | ||
8221 | |||
8222 | CVE_STATUS[CVE-2024-43834] = "fixed-version: Fixed from version 6.11" | ||
8223 | |||
8224 | CVE_STATUS[CVE-2024-43835] = "fixed-version: Fixed from version 6.11" | ||
8225 | |||
8226 | CVE_STATUS[CVE-2024-43836] = "fixed-version: Fixed from version 6.11" | ||
8227 | |||
8228 | CVE_STATUS[CVE-2024-43837] = "fixed-version: Fixed from version 6.11" | ||
8229 | |||
8230 | CVE_STATUS[CVE-2024-43838] = "fixed-version: Fixed from version 6.11" | ||
8231 | |||
8232 | CVE_STATUS[CVE-2024-43839] = "fixed-version: Fixed from version 6.11" | ||
8233 | |||
8234 | CVE_STATUS[CVE-2024-43840] = "fixed-version: Fixed from version 6.11" | ||
8235 | |||
8236 | CVE_STATUS[CVE-2024-43841] = "fixed-version: Fixed from version 6.11" | ||
8237 | |||
8238 | CVE_STATUS[CVE-2024-43842] = "fixed-version: Fixed from version 6.11" | ||
8239 | |||
8240 | CVE_STATUS[CVE-2024-43843] = "fixed-version: Fixed from version 6.11" | ||
8241 | |||
8242 | CVE_STATUS[CVE-2024-43844] = "fixed-version: Fixed from version 6.11" | ||
8243 | |||
8244 | CVE_STATUS[CVE-2024-43845] = "fixed-version: Fixed from version 6.11" | ||
8245 | |||
8246 | CVE_STATUS[CVE-2024-43846] = "fixed-version: Fixed from version 6.11" | ||
8247 | |||
8248 | CVE_STATUS[CVE-2024-43847] = "fixed-version: Fixed from version 6.11" | ||
8249 | |||
8250 | CVE_STATUS[CVE-2024-43848] = "fixed-version: Fixed from version 6.11" | ||
8251 | |||
8252 | CVE_STATUS[CVE-2024-43849] = "fixed-version: Fixed from version 6.11" | ||
8253 | |||
8254 | CVE_STATUS[CVE-2024-43850] = "fixed-version: Fixed from version 6.11" | ||
8255 | |||
8256 | CVE_STATUS[CVE-2024-43851] = "fixed-version: Fixed from version 6.11" | ||
8257 | |||
8258 | CVE_STATUS[CVE-2024-43852] = "fixed-version: Fixed from version 6.11" | ||
8259 | |||
8260 | CVE_STATUS[CVE-2024-43853] = "fixed-version: Fixed from version 6.11" | ||
8261 | |||
8262 | CVE_STATUS[CVE-2024-43854] = "fixed-version: Fixed from version 6.11" | ||
8263 | |||
8264 | CVE_STATUS[CVE-2024-43855] = "fixed-version: Fixed from version 6.11" | ||
8265 | |||
8266 | CVE_STATUS[CVE-2024-43856] = "fixed-version: Fixed from version 6.11" | ||
8267 | |||
8268 | CVE_STATUS[CVE-2024-43857] = "fixed-version: Fixed from version 6.11" | ||
8269 | |||
8270 | CVE_STATUS[CVE-2024-43858] = "fixed-version: Fixed from version 6.11" | ||
8271 | |||
8272 | CVE_STATUS[CVE-2024-43859] = "fixed-version: Fixed from version 6.11" | ||
8273 | |||
8274 | CVE_STATUS[CVE-2024-43860] = "fixed-version: Fixed from version 6.11" | ||
8275 | |||
8276 | CVE_STATUS[CVE-2024-43861] = "fixed-version: Fixed from version 6.11" | ||
8277 | |||
8278 | CVE_STATUS[CVE-2024-43862] = "fixed-version: Fixed from version 6.11" | ||
8279 | |||
8280 | CVE_STATUS[CVE-2024-43863] = "fixed-version: Fixed from version 6.11" | ||
8281 | |||
8282 | CVE_STATUS[CVE-2024-43864] = "fixed-version: Fixed from version 6.11" | ||
8283 | |||
8284 | CVE_STATUS[CVE-2024-43865] = "fixed-version: Fixed from version 6.11" | ||
8285 | |||
8286 | CVE_STATUS[CVE-2024-43866] = "fixed-version: Fixed from version 6.11" | ||
8287 | |||
8288 | CVE_STATUS[CVE-2024-43867] = "fixed-version: Fixed from version 6.11" | ||
8289 | |||
8290 | CVE_STATUS[CVE-2024-43868] = "fixed-version: Fixed from version 6.11" | ||
8291 | |||
8292 | CVE_STATUS[CVE-2024-43869] = "fixed-version: Fixed from version 6.11" | ||
8293 | |||
8294 | CVE_STATUS[CVE-2024-43870] = "fixed-version: Fixed from version 6.11" | ||
8295 | |||
8296 | CVE_STATUS[CVE-2024-43871] = "fixed-version: Fixed from version 6.11" | ||
8297 | |||
8298 | CVE_STATUS[CVE-2024-43872] = "fixed-version: Fixed from version 6.11" | ||
8299 | |||
8300 | CVE_STATUS[CVE-2024-43873] = "fixed-version: Fixed from version 6.11" | ||
8301 | |||
8302 | CVE_STATUS[CVE-2024-43874] = "fixed-version: Fixed from version 6.11" | ||
8303 | |||
8304 | CVE_STATUS[CVE-2024-43875] = "fixed-version: Fixed from version 6.11" | ||
8305 | |||
8306 | CVE_STATUS[CVE-2024-43876] = "fixed-version: Fixed from version 6.11" | ||
8307 | |||
8308 | CVE_STATUS[CVE-2024-43877] = "fixed-version: Fixed from version 6.11" | ||
8309 | |||
8310 | CVE_STATUS[CVE-2024-43878] = "fixed-version: Fixed from version 6.11" | ||
8311 | |||
8312 | CVE_STATUS[CVE-2024-43879] = "fixed-version: Fixed from version 6.11" | ||
8313 | |||
8314 | CVE_STATUS[CVE-2024-43880] = "fixed-version: Fixed from version 6.11" | ||
8315 | |||
8316 | CVE_STATUS[CVE-2024-43881] = "fixed-version: Fixed from version 6.11" | ||
8317 | |||
8318 | CVE_STATUS[CVE-2024-43882] = "fixed-version: Fixed from version 6.11" | ||
8319 | |||
8320 | CVE_STATUS[CVE-2024-43883] = "fixed-version: Fixed from version 6.11" | ||
8321 | |||
8322 | CVE_STATUS[CVE-2024-43884] = "fixed-version: Fixed from version 6.11" | ||
8323 | |||
8324 | CVE_STATUS[CVE-2024-43886] = "fixed-version: Fixed from version 6.11" | ||
8325 | |||
8326 | CVE_STATUS[CVE-2024-43887] = "fixed-version: Fixed from version 6.11" | ||
8327 | |||
8328 | CVE_STATUS[CVE-2024-43888] = "fixed-version: Fixed from version 6.11" | ||
8329 | |||
8330 | CVE_STATUS[CVE-2024-43889] = "fixed-version: Fixed from version 6.11" | ||
8331 | |||
8332 | CVE_STATUS[CVE-2024-43890] = "fixed-version: Fixed from version 6.11" | ||
8333 | |||
8334 | CVE_STATUS[CVE-2024-43891] = "fixed-version: Fixed from version 6.11" | ||
8335 | |||
8336 | CVE_STATUS[CVE-2024-43892] = "fixed-version: Fixed from version 6.11" | ||
8337 | |||
8338 | CVE_STATUS[CVE-2024-43893] = "fixed-version: Fixed from version 6.11" | ||
8339 | |||
8340 | CVE_STATUS[CVE-2024-43894] = "fixed-version: Fixed from version 6.11" | ||
8341 | |||
8342 | CVE_STATUS[CVE-2024-43895] = "fixed-version: Fixed from version 6.11" | ||
8343 | |||
8344 | CVE_STATUS[CVE-2024-43896] = "fixed-version: Fixed from version 6.11" | ||
8345 | |||
8346 | CVE_STATUS[CVE-2024-43897] = "fixed-version: Fixed from version 6.10.5" | ||
8347 | |||
8348 | CVE_STATUS[CVE-2024-43899] = "fixed-version: Fixed from version 6.11" | ||
8349 | |||
8350 | CVE_STATUS[CVE-2024-43900] = "fixed-version: Fixed from version 6.11" | ||
8351 | |||
8352 | CVE_STATUS[CVE-2024-43901] = "fixed-version: Fixed from version 6.11" | ||
8353 | |||
8354 | CVE_STATUS[CVE-2024-43902] = "fixed-version: Fixed from version 6.11" | ||
8355 | |||
8356 | CVE_STATUS[CVE-2024-43904] = "fixed-version: Fixed from version 6.11" | ||
8357 | |||
8358 | CVE_STATUS[CVE-2024-43905] = "fixed-version: Fixed from version 6.11" | ||
8359 | |||
8360 | CVE_STATUS[CVE-2024-43906] = "fixed-version: Fixed from version 6.11" | ||
8361 | |||
8362 | CVE_STATUS[CVE-2024-43907] = "fixed-version: Fixed from version 6.11" | ||
8363 | |||
8364 | CVE_STATUS[CVE-2024-43908] = "fixed-version: Fixed from version 6.11" | ||
8365 | |||
8366 | CVE_STATUS[CVE-2024-43909] = "fixed-version: Fixed from version 6.11" | ||
8367 | |||
8368 | CVE_STATUS[CVE-2024-43910] = "fixed-version: Fixed from version 6.11" | ||
8369 | |||
8370 | CVE_STATUS[CVE-2024-43911] = "fixed-version: Fixed from version 6.11" | ||
8371 | |||
8372 | CVE_STATUS[CVE-2024-43912] = "fixed-version: Fixed from version 6.11" | ||
8373 | |||
8374 | CVE_STATUS[CVE-2024-43913] = "fixed-version: Fixed from version 6.11" | ||
8375 | |||
8376 | CVE_STATUS[CVE-2024-43914] = "fixed-version: Fixed from version 6.11" | ||
8377 | |||
8378 | CVE_STATUS[CVE-2024-44931] = "fixed-version: Fixed from version 6.11" | ||
8379 | |||
8380 | CVE_STATUS[CVE-2024-44932] = "fixed-version: Fixed from version 6.11" | ||
8381 | |||
8382 | CVE_STATUS[CVE-2024-44933] = "fixed-version: Fixed from version 6.10.5" | ||
8383 | |||
8384 | CVE_STATUS[CVE-2024-44934] = "fixed-version: Fixed from version 6.11" | ||
8385 | |||
8386 | CVE_STATUS[CVE-2024-44935] = "fixed-version: Fixed from version 6.11" | ||
8387 | |||
8388 | CVE_STATUS[CVE-2024-44936] = "fixed-version: Fixed from version 6.11" | ||
8389 | |||
8390 | CVE_STATUS[CVE-2024-44937] = "fixed-version: Fixed from version 6.11" | ||
8391 | |||
8392 | CVE_STATUS[CVE-2024-44938] = "fixed-version: Fixed from version 6.11" | ||
8393 | |||
8394 | CVE_STATUS[CVE-2024-44939] = "fixed-version: Fixed from version 6.11" | ||
8395 | |||
8396 | CVE_STATUS[CVE-2024-44940] = "fixed-version: Fixed from version 6.11" | ||
8397 | |||
8398 | CVE_STATUS[CVE-2024-44941] = "fixed-version: Fixed from version 6.11" | ||
8399 | |||
8400 | CVE_STATUS[CVE-2024-44942] = "fixed-version: Fixed from version 6.11" | ||
8401 | |||
8402 | CVE_STATUS[CVE-2024-44943] = "fixed-version: Fixed from version 6.10" | ||
8403 | |||
8404 | CVE_STATUS[CVE-2024-44944] = "fixed-version: Fixed from version 6.11" | ||
8405 | |||
8406 | CVE_STATUS[CVE-2024-44945] = "fixed-version: Fixed from version 6.11" | ||
8407 | |||
8408 | CVE_STATUS[CVE-2024-44946] = "fixed-version: Fixed from version 6.11" | ||
8409 | |||
8410 | CVE_STATUS[CVE-2024-44947] = "fixed-version: Fixed from version 6.11" | ||
8411 | |||
8412 | CVE_STATUS[CVE-2024-44948] = "fixed-version: Fixed from version 6.11" | ||
8413 | |||
8414 | CVE_STATUS[CVE-2024-44949] = "fixed-version: Fixed from version 6.11" | ||
8415 | |||
8416 | CVE_STATUS[CVE-2024-44950] = "fixed-version: Fixed from version 6.11" | ||
8417 | |||
8418 | CVE_STATUS[CVE-2024-44951] = "fixed-version: Fixed from version 6.11" | ||
8419 | |||
8420 | CVE_STATUS[CVE-2024-44953] = "fixed-version: Fixed from version 6.11" | ||
8421 | |||
8422 | CVE_STATUS[CVE-2024-44954] = "fixed-version: Fixed from version 6.11" | ||
8423 | |||
8424 | CVE_STATUS[CVE-2024-44955] = "fixed-version: Fixed from version 6.11" | ||
8425 | |||
8426 | CVE_STATUS[CVE-2024-44956] = "fixed-version: Fixed from version 6.11" | ||
8427 | |||
8428 | CVE_STATUS[CVE-2024-44957] = "fixed-version: Fixed from version 6.11" | ||
8429 | |||
8430 | CVE_STATUS[CVE-2024-44958] = "fixed-version: Fixed from version 6.11" | ||
8431 | |||
8432 | CVE_STATUS[CVE-2024-44959] = "fixed-version: Fixed from version 6.11" | ||
8433 | |||
8434 | CVE_STATUS[CVE-2024-44960] = "fixed-version: Fixed from version 6.11" | ||
8435 | |||
8436 | CVE_STATUS[CVE-2024-44961] = "fixed-version: Fixed from version 6.11" | ||
8437 | |||
8438 | CVE_STATUS[CVE-2024-44962] = "fixed-version: Fixed from version 6.11" | ||
8439 | |||
8440 | CVE_STATUS[CVE-2024-44963] = "fixed-version: Fixed from version 6.11" | ||
8441 | |||
8442 | CVE_STATUS[CVE-2024-44964] = "fixed-version: Fixed from version 6.11" | ||
8443 | |||
8444 | CVE_STATUS[CVE-2024-44965] = "fixed-version: Fixed from version 6.11" | ||
8445 | |||
8446 | CVE_STATUS[CVE-2024-44966] = "fixed-version: Fixed from version 6.11" | ||
8447 | |||
8448 | CVE_STATUS[CVE-2024-44967] = "fixed-version: Fixed from version 6.11" | ||
8449 | |||
8450 | CVE_STATUS[CVE-2024-44968] = "fixed-version: Fixed from version 6.10.5" | ||
8451 | |||
8452 | CVE_STATUS[CVE-2024-44969] = "fixed-version: Fixed from version 6.11" | ||
8453 | |||
8454 | CVE_STATUS[CVE-2024-44970] = "fixed-version: Fixed from version 6.11" | ||
8455 | |||
8456 | CVE_STATUS[CVE-2024-44971] = "fixed-version: Fixed from version 6.11" | ||
8457 | |||
8458 | CVE_STATUS[CVE-2024-44972] = "fixed-version: Fixed from version 6.11" | ||
8459 | |||
8460 | CVE_STATUS[CVE-2024-44973] = "fixed-version: Fixed from version 6.11" | ||
8461 | |||
8462 | CVE_STATUS[CVE-2024-44974] = "fixed-version: Fixed from version 6.11" | ||
8463 | |||
8464 | CVE_STATUS[CVE-2024-44975] = "fixed-version: Fixed from version 6.11" | ||
8465 | |||
8466 | CVE_STATUS[CVE-2024-44976] = "fixed-version: Fixed from version 6.11" | ||
8467 | |||
8468 | CVE_STATUS[CVE-2024-44977] = "fixed-version: Fixed from version 6.11" | ||
8469 | |||
8470 | CVE_STATUS[CVE-2024-44978] = "fixed-version: Fixed from version 6.11" | ||
8471 | |||
8472 | CVE_STATUS[CVE-2024-44979] = "fixed-version: Fixed from version 6.11" | ||
8473 | |||
8474 | CVE_STATUS[CVE-2024-44980] = "fixed-version: Fixed from version 6.11" | ||
8475 | |||
8476 | CVE_STATUS[CVE-2024-44981] = "fixed-version: Fixed from version 6.11" | ||
8477 | |||
8478 | CVE_STATUS[CVE-2024-44982] = "fixed-version: Fixed from version 6.11" | ||
8479 | |||
8480 | CVE_STATUS[CVE-2024-44983] = "fixed-version: Fixed from version 6.11" | ||
8481 | |||
8482 | CVE_STATUS[CVE-2024-44984] = "fixed-version: Fixed from version 6.11" | ||
8483 | |||
8484 | CVE_STATUS[CVE-2024-44985] = "fixed-version: Fixed from version 6.11" | ||
8485 | |||
8486 | CVE_STATUS[CVE-2024-44986] = "fixed-version: Fixed from version 6.11" | ||
8487 | |||
8488 | CVE_STATUS[CVE-2024-44987] = "fixed-version: Fixed from version 6.11" | ||
8489 | |||
8490 | CVE_STATUS[CVE-2024-44988] = "fixed-version: Fixed from version 6.11" | ||
8491 | |||
8492 | CVE_STATUS[CVE-2024-44989] = "fixed-version: Fixed from version 6.11" | ||
8493 | |||
8494 | CVE_STATUS[CVE-2024-44990] = "fixed-version: Fixed from version 6.11" | ||
8495 | |||
8496 | CVE_STATUS[CVE-2024-44991] = "fixed-version: Fixed from version 6.11" | ||
8497 | |||
8498 | CVE_STATUS[CVE-2024-44992] = "fixed-version: Fixed from version 6.11" | ||
8499 | |||
8500 | CVE_STATUS[CVE-2024-44993] = "fixed-version: Fixed from version 6.11" | ||
8501 | |||
8502 | CVE_STATUS[CVE-2024-44994] = "fixed-version: Fixed from version 6.11" | ||
8503 | |||
8504 | CVE_STATUS[CVE-2024-44995] = "fixed-version: Fixed from version 6.11" | ||
8505 | |||
8506 | CVE_STATUS[CVE-2024-44996] = "fixed-version: Fixed from version 6.11" | ||
8507 | |||
8508 | CVE_STATUS[CVE-2024-44997] = "fixed-version: Fixed from version 6.11" | ||
8509 | |||
8510 | CVE_STATUS[CVE-2024-44998] = "fixed-version: Fixed from version 6.11" | ||
8511 | |||
8512 | CVE_STATUS[CVE-2024-44999] = "fixed-version: Fixed from version 6.11" | ||
8513 | |||
8514 | CVE_STATUS[CVE-2024-45000] = "fixed-version: Fixed from version 6.11" | ||
8515 | |||
8516 | CVE_STATUS[CVE-2024-45001] = "fixed-version: Fixed from version 6.11" | ||
8517 | |||
8518 | CVE_STATUS[CVE-2024-45002] = "fixed-version: Fixed from version 6.11" | ||
8519 | |||
8520 | CVE_STATUS[CVE-2024-45003] = "fixed-version: Fixed from version 6.11" | ||
8521 | |||
8522 | CVE_STATUS[CVE-2024-45004] = "fixed-version: Fixed from version 6.11" | ||
8523 | |||
8524 | CVE_STATUS[CVE-2024-45005] = "fixed-version: Fixed from version 6.11" | ||
8525 | |||
8526 | CVE_STATUS[CVE-2024-45006] = "fixed-version: Fixed from version 6.11" | ||
8527 | |||
8528 | CVE_STATUS[CVE-2024-45007] = "fixed-version: Fixed from version 6.11" | ||
8529 | |||
8530 | CVE_STATUS[CVE-2024-45008] = "fixed-version: Fixed from version 6.11" | ||
8531 | |||
8532 | CVE_STATUS[CVE-2024-45009] = "fixed-version: Fixed from version 6.11" | ||
8533 | |||
8534 | CVE_STATUS[CVE-2024-45010] = "fixed-version: Fixed from version 6.11" | ||
8535 | |||
8536 | CVE_STATUS[CVE-2024-45011] = "fixed-version: Fixed from version 6.11" | ||
8537 | |||
8538 | CVE_STATUS[CVE-2024-45012] = "fixed-version: Fixed from version 6.11" | ||
8539 | |||
8540 | CVE_STATUS[CVE-2024-45013] = "fixed-version: Fixed from version 6.11" | ||
8541 | |||
8542 | CVE_STATUS[CVE-2024-45014] = "fixed-version: Fixed from version 6.11" | ||
8543 | |||
8544 | CVE_STATUS[CVE-2024-45015] = "fixed-version: Fixed from version 6.11" | ||
8545 | |||
8546 | CVE_STATUS[CVE-2024-45016] = "fixed-version: Fixed from version 6.11" | ||
8547 | |||
8548 | CVE_STATUS[CVE-2024-45017] = "fixed-version: Fixed from version 6.11" | ||
8549 | |||
8550 | CVE_STATUS[CVE-2024-45018] = "fixed-version: Fixed from version 6.11" | ||
8551 | |||
8552 | CVE_STATUS[CVE-2024-45019] = "fixed-version: Fixed from version 6.11" | ||
8553 | |||
8554 | CVE_STATUS[CVE-2024-45020] = "fixed-version: Fixed from version 6.11" | ||
8555 | |||
8556 | CVE_STATUS[CVE-2024-45021] = "fixed-version: Fixed from version 6.11" | ||
8557 | |||
8558 | CVE_STATUS[CVE-2024-45022] = "fixed-version: Fixed from version 6.11" | ||
8559 | |||
8560 | CVE_STATUS[CVE-2024-45023] = "fixed-version: Fixed from version 6.11" | ||
8561 | |||
8562 | CVE_STATUS[CVE-2024-45024] = "fixed-version: Fixed from version 6.11" | ||
8563 | |||
8564 | CVE_STATUS[CVE-2024-45025] = "fixed-version: Fixed from version 6.11" | ||
8565 | |||
8566 | CVE_STATUS[CVE-2024-45026] = "fixed-version: Fixed from version 6.11" | ||
8567 | |||
8568 | CVE_STATUS[CVE-2024-45027] = "fixed-version: Fixed from version 6.11" | ||
8569 | |||
8570 | CVE_STATUS[CVE-2024-45028] = "fixed-version: Fixed from version 6.11" | ||
8571 | |||
8572 | CVE_STATUS[CVE-2024-45029] = "fixed-version: Fixed from version 6.11" | ||
8573 | |||
8574 | CVE_STATUS[CVE-2024-45030] = "fixed-version: Fixed from version 6.11" | ||
8575 | |||
8576 | CVE_STATUS[CVE-2024-45828] = "cpe-stable-backport: Backported in 6.12.5" | ||
8577 | |||
8578 | CVE_STATUS[CVE-2024-46672] = "fixed-version: Fixed from version 6.11" | ||
8579 | |||
8580 | CVE_STATUS[CVE-2024-46673] = "fixed-version: Fixed from version 6.11" | ||
8581 | |||
8582 | CVE_STATUS[CVE-2024-46674] = "fixed-version: Fixed from version 6.11" | ||
8583 | |||
8584 | CVE_STATUS[CVE-2024-46675] = "fixed-version: Fixed from version 6.11" | ||
8585 | |||
8586 | CVE_STATUS[CVE-2024-46676] = "fixed-version: Fixed from version 6.11" | ||
8587 | |||
8588 | CVE_STATUS[CVE-2024-46677] = "fixed-version: Fixed from version 6.11" | ||
8589 | |||
8590 | CVE_STATUS[CVE-2024-46678] = "fixed-version: Fixed from version 6.11" | ||
8591 | |||
8592 | CVE_STATUS[CVE-2024-46679] = "fixed-version: Fixed from version 6.11" | ||
8593 | |||
8594 | CVE_STATUS[CVE-2024-46680] = "fixed-version: Fixed from version 6.11" | ||
8595 | |||
8596 | CVE_STATUS[CVE-2024-46681] = "fixed-version: Fixed from version 6.11" | ||
8597 | |||
8598 | CVE_STATUS[CVE-2024-46682] = "fixed-version: Fixed from version 6.11" | ||
8599 | |||
8600 | CVE_STATUS[CVE-2024-46683] = "fixed-version: Fixed from version 6.11" | ||
8601 | |||
8602 | CVE_STATUS[CVE-2024-46684] = "fixed-version: Fixed from version 6.11" | ||
8603 | |||
8604 | CVE_STATUS[CVE-2024-46685] = "fixed-version: Fixed from version 6.11" | ||
8605 | |||
8606 | CVE_STATUS[CVE-2024-46686] = "fixed-version: Fixed from version 6.11" | ||
8607 | |||
8608 | CVE_STATUS[CVE-2024-46687] = "fixed-version: Fixed from version 6.11" | ||
8609 | |||
8610 | CVE_STATUS[CVE-2024-46688] = "fixed-version: Fixed from version 6.11" | ||
8611 | |||
8612 | CVE_STATUS[CVE-2024-46689] = "fixed-version: Fixed from version 6.11" | ||
8613 | |||
8614 | CVE_STATUS[CVE-2024-46690] = "fixed-version: Fixed from version 6.11" | ||
8615 | |||
8616 | CVE_STATUS[CVE-2024-46691] = "fixed-version: Fixed from version 6.11" | ||
8617 | |||
8618 | CVE_STATUS[CVE-2024-46692] = "fixed-version: Fixed from version 6.11" | ||
8619 | |||
8620 | CVE_STATUS[CVE-2024-46693] = "fixed-version: Fixed from version 6.11" | ||
8621 | |||
8622 | CVE_STATUS[CVE-2024-46694] = "fixed-version: Fixed from version 6.11" | ||
8623 | |||
8624 | CVE_STATUS[CVE-2024-46695] = "fixed-version: Fixed from version 6.11" | ||
8625 | |||
8626 | CVE_STATUS[CVE-2024-46696] = "fixed-version: Fixed from version 6.11" | ||
8627 | |||
8628 | CVE_STATUS[CVE-2024-46697] = "fixed-version: Fixed from version 6.11" | ||
8629 | |||
8630 | CVE_STATUS[CVE-2024-46698] = "fixed-version: Fixed from version 6.11" | ||
8631 | |||
8632 | CVE_STATUS[CVE-2024-46699] = "fixed-version: Fixed from version 6.11" | ||
8633 | |||
8634 | # CVE-2024-46700 has no known resolution | ||
8635 | |||
8636 | CVE_STATUS[CVE-2024-46701] = "fixed-version: Fixed from version 6.11" | ||
8637 | |||
8638 | CVE_STATUS[CVE-2024-46702] = "fixed-version: Fixed from version 6.11" | ||
8639 | |||
8640 | CVE_STATUS[CVE-2024-46703] = "fixed-version: Fixed from version 6.11" | ||
8641 | |||
8642 | CVE_STATUS[CVE-2024-46704] = "fixed-version: Fixed from version 6.11" | ||
8643 | |||
8644 | CVE_STATUS[CVE-2024-46705] = "fixed-version: Fixed from version 6.11" | ||
8645 | |||
8646 | CVE_STATUS[CVE-2024-46706] = "fixed-version: Fixed from version 6.11" | ||
8647 | |||
8648 | CVE_STATUS[CVE-2024-46707] = "fixed-version: Fixed from version 6.11" | ||
8649 | |||
8650 | CVE_STATUS[CVE-2024-46708] = "fixed-version: Fixed from version 6.11" | ||
8651 | |||
8652 | CVE_STATUS[CVE-2024-46709] = "fixed-version: Fixed from version 6.11" | ||
8653 | |||
8654 | CVE_STATUS[CVE-2024-46710] = "fixed-version: Fixed from version 6.11" | ||
8655 | |||
8656 | CVE_STATUS[CVE-2024-46711] = "fixed-version: Fixed from version 6.11" | ||
8657 | |||
8658 | CVE_STATUS[CVE-2024-46712] = "fixed-version: Fixed from version 6.10.8" | ||
8659 | |||
8660 | CVE_STATUS[CVE-2024-46713] = "fixed-version: Fixed from version 6.11" | ||
8661 | |||
8662 | CVE_STATUS[CVE-2024-46714] = "fixed-version: Fixed from version 6.11" | ||
8663 | |||
8664 | CVE_STATUS[CVE-2024-46715] = "fixed-version: Fixed from version 6.11" | ||
8665 | |||
8666 | CVE_STATUS[CVE-2024-46716] = "fixed-version: Fixed from version 6.11" | ||
8667 | |||
8668 | CVE_STATUS[CVE-2024-46717] = "fixed-version: Fixed from version 6.11" | ||
8669 | |||
8670 | CVE_STATUS[CVE-2024-46718] = "fixed-version: Fixed from version 6.11" | ||
8671 | |||
8672 | CVE_STATUS[CVE-2024-46719] = "fixed-version: Fixed from version 6.11" | ||
8673 | |||
8674 | CVE_STATUS[CVE-2024-46720] = "fixed-version: Fixed from version 6.11" | ||
8675 | |||
8676 | CVE_STATUS[CVE-2024-46721] = "fixed-version: Fixed from version 6.11" | ||
8677 | |||
8678 | CVE_STATUS[CVE-2024-46722] = "fixed-version: Fixed from version 6.11" | ||
8679 | |||
8680 | CVE_STATUS[CVE-2024-46723] = "fixed-version: Fixed from version 6.11" | ||
8681 | |||
8682 | CVE_STATUS[CVE-2024-46724] = "fixed-version: Fixed from version 6.11" | ||
8683 | |||
8684 | CVE_STATUS[CVE-2024-46725] = "fixed-version: Fixed from version 6.11" | ||
8685 | |||
8686 | CVE_STATUS[CVE-2024-46726] = "fixed-version: Fixed from version 6.11" | ||
8687 | |||
8688 | CVE_STATUS[CVE-2024-46727] = "fixed-version: Fixed from version 6.11" | ||
8689 | |||
8690 | CVE_STATUS[CVE-2024-46728] = "fixed-version: Fixed from version 6.11" | ||
8691 | |||
8692 | CVE_STATUS[CVE-2024-46729] = "fixed-version: Fixed from version 6.11" | ||
8693 | |||
8694 | CVE_STATUS[CVE-2024-46730] = "fixed-version: Fixed from version 6.11" | ||
8695 | |||
8696 | CVE_STATUS[CVE-2024-46731] = "fixed-version: Fixed from version 6.11" | ||
8697 | |||
8698 | CVE_STATUS[CVE-2024-46732] = "fixed-version: Fixed from version 6.11" | ||
8699 | |||
8700 | CVE_STATUS[CVE-2024-46733] = "fixed-version: Fixed from version 6.11" | ||
8701 | |||
8702 | CVE_STATUS[CVE-2024-46734] = "fixed-version: Fixed from version 6.10.10" | ||
8703 | |||
8704 | CVE_STATUS[CVE-2024-46735] = "fixed-version: Fixed from version 6.11" | ||
8705 | |||
8706 | CVE_STATUS[CVE-2024-46736] = "fixed-version: Fixed from version 6.11" | ||
8707 | |||
8708 | CVE_STATUS[CVE-2024-46737] = "fixed-version: Fixed from version 6.11" | ||
8709 | |||
8710 | CVE_STATUS[CVE-2024-46738] = "fixed-version: Fixed from version 6.11" | ||
8711 | |||
8712 | CVE_STATUS[CVE-2024-46739] = "fixed-version: Fixed from version 6.11" | ||
8713 | |||
8714 | CVE_STATUS[CVE-2024-46740] = "fixed-version: Fixed from version 6.11" | ||
8715 | |||
8716 | CVE_STATUS[CVE-2024-46741] = "fixed-version: Fixed from version 6.11" | ||
8717 | |||
8718 | CVE_STATUS[CVE-2024-46742] = "fixed-version: Fixed from version 6.11" | ||
8719 | |||
8720 | CVE_STATUS[CVE-2024-46743] = "fixed-version: Fixed from version 6.11" | ||
8721 | |||
8722 | CVE_STATUS[CVE-2024-46744] = "fixed-version: Fixed from version 6.11" | ||
8723 | |||
8724 | CVE_STATUS[CVE-2024-46745] = "fixed-version: Fixed from version 6.11" | ||
8725 | |||
8726 | CVE_STATUS[CVE-2024-46746] = "fixed-version: Fixed from version 6.11" | ||
8727 | |||
8728 | CVE_STATUS[CVE-2024-46747] = "fixed-version: Fixed from version 6.11" | ||
8729 | |||
8730 | CVE_STATUS[CVE-2024-46748] = "fixed-version: Fixed from version 6.11" | ||
8731 | |||
8732 | CVE_STATUS[CVE-2024-46749] = "fixed-version: Fixed from version 6.11" | ||
8733 | |||
8734 | CVE_STATUS[CVE-2024-46750] = "fixed-version: Fixed from version 6.11" | ||
8735 | |||
8736 | CVE_STATUS[CVE-2024-46751] = "fixed-version: Fixed from version 6.11" | ||
8737 | |||
8738 | CVE_STATUS[CVE-2024-46752] = "fixed-version: Fixed from version 6.11" | ||
8739 | |||
8740 | CVE_STATUS[CVE-2024-46753] = "fixed-version: Fixed from version 6.11" | ||
8741 | |||
8742 | CVE_STATUS[CVE-2024-46754] = "fixed-version: Fixed from version 6.11" | ||
8743 | |||
8744 | CVE_STATUS[CVE-2024-46755] = "fixed-version: Fixed from version 6.11" | ||
8745 | |||
8746 | CVE_STATUS[CVE-2024-46759] = "fixed-version: Fixed from version 6.11" | ||
8747 | |||
8748 | CVE_STATUS[CVE-2024-46760] = "fixed-version: Fixed from version 6.11" | ||
8749 | |||
8750 | CVE_STATUS[CVE-2024-46761] = "fixed-version: Fixed from version 6.11" | ||
8751 | |||
8752 | CVE_STATUS[CVE-2024-46762] = "fixed-version: Fixed from version 6.11" | ||
8753 | |||
8754 | CVE_STATUS[CVE-2024-46763] = "fixed-version: Fixed from version 6.11" | ||
8755 | |||
8756 | CVE_STATUS[CVE-2024-46764] = "fixed-version: Fixed from version 6.11" | ||
8757 | |||
8758 | CVE_STATUS[CVE-2024-46765] = "fixed-version: Fixed from version 6.11" | ||
8759 | |||
8760 | CVE_STATUS[CVE-2024-46766] = "fixed-version: Fixed from version 6.11" | ||
8761 | |||
8762 | CVE_STATUS[CVE-2024-46767] = "fixed-version: Fixed from version 6.11" | ||
8763 | |||
8764 | CVE_STATUS[CVE-2024-46768] = "fixed-version: Fixed from version 6.11" | ||
8765 | |||
8766 | CVE_STATUS[CVE-2024-46769] = "fixed-version: Fixed from version 6.11" | ||
8767 | |||
8768 | CVE_STATUS[CVE-2024-46770] = "fixed-version: Fixed from version 6.11" | ||
8769 | |||
8770 | CVE_STATUS[CVE-2024-46771] = "fixed-version: Fixed from version 6.11" | ||
8771 | |||
8772 | CVE_STATUS[CVE-2024-46772] = "fixed-version: Fixed from version 6.11" | ||
8773 | |||
8774 | CVE_STATUS[CVE-2024-46773] = "fixed-version: Fixed from version 6.11" | ||
8775 | |||
8776 | CVE_STATUS[CVE-2024-46774] = "fixed-version: Fixed from version 6.11" | ||
8777 | |||
8778 | CVE_STATUS[CVE-2024-46775] = "fixed-version: Fixed from version 6.11" | ||
8779 | |||
8780 | CVE_STATUS[CVE-2024-46776] = "fixed-version: Fixed from version 6.11" | ||
8781 | |||
8782 | CVE_STATUS[CVE-2024-46777] = "fixed-version: Fixed from version 6.11" | ||
8783 | |||
8784 | CVE_STATUS[CVE-2024-46778] = "fixed-version: Fixed from version 6.11" | ||
8785 | |||
8786 | CVE_STATUS[CVE-2024-46779] = "fixed-version: Fixed from version 6.11" | ||
8787 | |||
8788 | CVE_STATUS[CVE-2024-46780] = "fixed-version: Fixed from version 6.11" | ||
8789 | |||
8790 | CVE_STATUS[CVE-2024-46781] = "fixed-version: Fixed from version 6.11" | ||
8791 | |||
8792 | CVE_STATUS[CVE-2024-46782] = "fixed-version: Fixed from version 6.11" | ||
8793 | |||
8794 | CVE_STATUS[CVE-2024-46783] = "fixed-version: Fixed from version 6.11" | ||
8795 | |||
8796 | CVE_STATUS[CVE-2024-46784] = "fixed-version: Fixed from version 6.11" | ||
8797 | |||
8798 | CVE_STATUS[CVE-2024-46785] = "fixed-version: Fixed from version 6.11" | ||
8799 | |||
8800 | CVE_STATUS[CVE-2024-46786] = "fixed-version: Fixed from version 6.11" | ||
8801 | |||
8802 | CVE_STATUS[CVE-2024-46787] = "fixed-version: Fixed from version 6.11" | ||
8803 | |||
8804 | CVE_STATUS[CVE-2024-46788] = "fixed-version: Fixed from version 6.11" | ||
8805 | |||
8806 | CVE_STATUS[CVE-2024-46789] = "fixed-version: Fixed from version 6.11" | ||
8807 | |||
8808 | CVE_STATUS[CVE-2024-46790] = "fixed-version: Fixed from version 6.11" | ||
8809 | |||
8810 | CVE_STATUS[CVE-2024-46791] = "fixed-version: Fixed from version 6.11" | ||
8811 | |||
8812 | CVE_STATUS[CVE-2024-46792] = "fixed-version: Fixed from version 6.11" | ||
8813 | |||
8814 | CVE_STATUS[CVE-2024-46793] = "fixed-version: Fixed from version 6.11" | ||
8815 | |||
8816 | CVE_STATUS[CVE-2024-46794] = "fixed-version: Fixed from version 6.11" | ||
8817 | |||
8818 | CVE_STATUS[CVE-2024-46795] = "fixed-version: Fixed from version 6.11" | ||
8819 | |||
8820 | CVE_STATUS[CVE-2024-46796] = "fixed-version: Fixed from version 6.11" | ||
8821 | |||
8822 | CVE_STATUS[CVE-2024-46797] = "fixed-version: Fixed from version 6.11" | ||
8823 | |||
8824 | CVE_STATUS[CVE-2024-46798] = "fixed-version: Fixed from version 6.11" | ||
8825 | |||
8826 | CVE_STATUS[CVE-2024-46799] = "fixed-version: Fixed from version 6.11" | ||
8827 | |||
8828 | CVE_STATUS[CVE-2024-46800] = "fixed-version: Fixed from version 6.11" | ||
8829 | |||
8830 | CVE_STATUS[CVE-2024-46801] = "fixed-version: Fixed from version 6.11" | ||
8831 | |||
8832 | CVE_STATUS[CVE-2024-46802] = "fixed-version: Fixed from version 6.11" | ||
8833 | |||
8834 | CVE_STATUS[CVE-2024-46803] = "fixed-version: Fixed from version 6.11" | ||
8835 | |||
8836 | CVE_STATUS[CVE-2024-46804] = "fixed-version: Fixed from version 6.11" | ||
8837 | |||
8838 | CVE_STATUS[CVE-2024-46805] = "fixed-version: Fixed from version 6.11" | ||
8839 | |||
8840 | CVE_STATUS[CVE-2024-46806] = "fixed-version: Fixed from version 6.11" | ||
8841 | |||
8842 | CVE_STATUS[CVE-2024-46807] = "fixed-version: Fixed from version 6.11" | ||
8843 | |||
8844 | CVE_STATUS[CVE-2024-46808] = "fixed-version: Fixed from version 6.11" | ||
8845 | |||
8846 | CVE_STATUS[CVE-2024-46809] = "fixed-version: Fixed from version 6.11" | ||
8847 | |||
8848 | CVE_STATUS[CVE-2024-46810] = "fixed-version: Fixed from version 6.11" | ||
8849 | |||
8850 | CVE_STATUS[CVE-2024-46811] = "fixed-version: Fixed from version 6.11" | ||
8851 | |||
8852 | CVE_STATUS[CVE-2024-46812] = "fixed-version: Fixed from version 6.11" | ||
8853 | |||
8854 | CVE_STATUS[CVE-2024-46813] = "fixed-version: Fixed from version 6.11" | ||
8855 | |||
8856 | CVE_STATUS[CVE-2024-46814] = "fixed-version: Fixed from version 6.11" | ||
8857 | |||
8858 | CVE_STATUS[CVE-2024-46815] = "fixed-version: Fixed from version 6.11" | ||
8859 | |||
8860 | CVE_STATUS[CVE-2024-46816] = "fixed-version: Fixed from version 6.11" | ||
8861 | |||
8862 | CVE_STATUS[CVE-2024-46817] = "fixed-version: Fixed from version 6.11" | ||
8863 | |||
8864 | CVE_STATUS[CVE-2024-46818] = "fixed-version: Fixed from version 6.11" | ||
8865 | |||
8866 | CVE_STATUS[CVE-2024-46819] = "fixed-version: Fixed from version 6.11" | ||
8867 | |||
8868 | CVE_STATUS[CVE-2024-46820] = "fixed-version: Fixed from version 6.11" | ||
8869 | |||
8870 | CVE_STATUS[CVE-2024-46821] = "fixed-version: Fixed from version 6.11" | ||
8871 | |||
8872 | CVE_STATUS[CVE-2024-46822] = "fixed-version: Fixed from version 6.11" | ||
8873 | |||
8874 | CVE_STATUS[CVE-2024-46823] = "fixed-version: Fixed from version 6.11" | ||
8875 | |||
8876 | CVE_STATUS[CVE-2024-46824] = "fixed-version: Fixed from version 6.11" | ||
8877 | |||
8878 | CVE_STATUS[CVE-2024-46825] = "fixed-version: Fixed from version 6.11" | ||
8879 | |||
8880 | CVE_STATUS[CVE-2024-46826] = "fixed-version: Fixed from version 6.11" | ||
8881 | |||
8882 | CVE_STATUS[CVE-2024-46827] = "fixed-version: Fixed from version 6.11" | ||
8883 | |||
8884 | CVE_STATUS[CVE-2024-46828] = "fixed-version: Fixed from version 6.11" | ||
8885 | |||
8886 | CVE_STATUS[CVE-2024-46829] = "fixed-version: Fixed from version 6.11" | ||
8887 | |||
8888 | CVE_STATUS[CVE-2024-46830] = "fixed-version: Fixed from version 6.11" | ||
8889 | |||
8890 | CVE_STATUS[CVE-2024-46831] = "fixed-version: Fixed from version 6.11" | ||
8891 | |||
8892 | CVE_STATUS[CVE-2024-46832] = "fixed-version: Fixed from version 6.11" | ||
8893 | |||
8894 | CVE_STATUS[CVE-2024-46833] = "fixed-version: Fixed from version 6.11" | ||
8895 | |||
8896 | CVE_STATUS[CVE-2024-46834] = "fixed-version: Fixed from version 6.11" | ||
8897 | |||
8898 | CVE_STATUS[CVE-2024-46835] = "fixed-version: Fixed from version 6.11" | ||
8899 | |||
8900 | CVE_STATUS[CVE-2024-46836] = "fixed-version: Fixed from version 6.11" | ||
8901 | |||
8902 | CVE_STATUS[CVE-2024-46837] = "fixed-version: Fixed from version 6.11" | ||
8903 | |||
8904 | CVE_STATUS[CVE-2024-46838] = "fixed-version: Fixed from version 6.11" | ||
8905 | |||
8906 | CVE_STATUS[CVE-2024-46840] = "fixed-version: Fixed from version 6.11" | ||
8907 | |||
8908 | CVE_STATUS[CVE-2024-46841] = "fixed-version: Fixed from version 6.11" | ||
8909 | |||
8910 | CVE_STATUS[CVE-2024-46842] = "fixed-version: Fixed from version 6.11" | ||
8911 | |||
8912 | CVE_STATUS[CVE-2024-46843] = "fixed-version: Fixed from version 6.11" | ||
8913 | |||
8914 | CVE_STATUS[CVE-2024-46844] = "fixed-version: Fixed from version 6.11" | ||
8915 | |||
8916 | CVE_STATUS[CVE-2024-46845] = "fixed-version: Fixed from version 6.11" | ||
8917 | |||
8918 | CVE_STATUS[CVE-2024-46846] = "fixed-version: Fixed from version 6.11" | ||
8919 | |||
8920 | CVE_STATUS[CVE-2024-46847] = "fixed-version: Fixed from version 6.11" | ||
8921 | |||
8922 | CVE_STATUS[CVE-2024-46848] = "fixed-version: Fixed from version 6.11" | ||
8923 | |||
8924 | CVE_STATUS[CVE-2024-46849] = "fixed-version: Fixed from version 6.11" | ||
8925 | |||
8926 | CVE_STATUS[CVE-2024-46850] = "fixed-version: Fixed from version 6.11" | ||
8927 | |||
8928 | CVE_STATUS[CVE-2024-46851] = "fixed-version: Fixed from version 6.11" | ||
8929 | |||
8930 | CVE_STATUS[CVE-2024-46852] = "fixed-version: Fixed from version 6.11" | ||
8931 | |||
8932 | CVE_STATUS[CVE-2024-46853] = "fixed-version: Fixed from version 6.11" | ||
8933 | |||
8934 | CVE_STATUS[CVE-2024-46854] = "fixed-version: Fixed from version 6.11" | ||
8935 | |||
8936 | CVE_STATUS[CVE-2024-46855] = "fixed-version: Fixed from version 6.11" | ||
8937 | |||
8938 | CVE_STATUS[CVE-2024-46856] = "fixed-version: Fixed from version 6.11" | ||
8939 | |||
8940 | CVE_STATUS[CVE-2024-46857] = "fixed-version: Fixed from version 6.11" | ||
8941 | |||
8942 | CVE_STATUS[CVE-2024-46858] = "fixed-version: Fixed from version 6.11" | ||
8943 | |||
8944 | CVE_STATUS[CVE-2024-46859] = "fixed-version: Fixed from version 6.11" | ||
8945 | |||
8946 | CVE_STATUS[CVE-2024-46860] = "fixed-version: Fixed from version 6.11" | ||
8947 | |||
8948 | CVE_STATUS[CVE-2024-46861] = "fixed-version: Fixed from version 6.11" | ||
8949 | |||
8950 | CVE_STATUS[CVE-2024-46862] = "fixed-version: Fixed from version 6.11" | ||
8951 | |||
8952 | CVE_STATUS[CVE-2024-46863] = "fixed-version: Fixed from version 6.11" | ||
8953 | |||
8954 | CVE_STATUS[CVE-2024-46864] = "fixed-version: Fixed from version 6.11" | ||
8955 | |||
8956 | CVE_STATUS[CVE-2024-46865] = "fixed-version: Fixed from version 6.10.11" | ||
8957 | |||
8958 | CVE_STATUS[CVE-2024-46866] = "fixed-version: Fixed from version 6.11" | ||
8959 | |||
8960 | CVE_STATUS[CVE-2024-46867] = "fixed-version: Fixed from version 6.11" | ||
8961 | |||
8962 | CVE_STATUS[CVE-2024-46868] = "fixed-version: Fixed from version 6.11" | ||
8963 | |||
8964 | CVE_STATUS[CVE-2024-46869] = "fixed-version: Fixed from version 6.12" | ||
8965 | |||
8966 | CVE_STATUS[CVE-2024-46870] = "fixed-version: Fixed from version 6.11" | ||
8967 | |||
8968 | CVE_STATUS[CVE-2024-46871] = "fixed-version: Fixed from version 6.11" | ||
8969 | |||
8970 | CVE_STATUS[CVE-2024-46896] = "fixed-version: Fixed from version 6.12.7" | ||
8971 | |||
8972 | CVE_STATUS[CVE-2024-47141] = "cpe-stable-backport: Backported in 6.12.5" | ||
8973 | |||
8974 | CVE_STATUS[CVE-2024-47143] = "cpe-stable-backport: Backported in 6.12.5" | ||
8975 | |||
8976 | CVE_STATUS[CVE-2024-47408] = "cpe-stable-backport: Backported in 6.12.7" | ||
8977 | |||
8978 | CVE_STATUS[CVE-2024-47658] = "fixed-version: Fixed from version 6.11" | ||
8979 | |||
8980 | CVE_STATUS[CVE-2024-47659] = "fixed-version: Fixed from version 6.11" | ||
8981 | |||
8982 | CVE_STATUS[CVE-2024-47660] = "fixed-version: Fixed from version 6.11" | ||
8983 | |||
8984 | CVE_STATUS[CVE-2024-47661] = "fixed-version: Fixed from version 6.11" | ||
8985 | |||
8986 | CVE_STATUS[CVE-2024-47662] = "fixed-version: Fixed from version 6.11" | ||
8987 | |||
8988 | CVE_STATUS[CVE-2024-47663] = "fixed-version: Fixed from version 6.11" | ||
8989 | |||
8990 | CVE_STATUS[CVE-2024-47664] = "fixed-version: Fixed from version 6.11" | ||
8991 | |||
8992 | CVE_STATUS[CVE-2024-47665] = "fixed-version: Fixed from version 6.11" | ||
8993 | |||
8994 | CVE_STATUS[CVE-2024-47666] = "fixed-version: Fixed from version 6.11" | ||
8995 | |||
8996 | CVE_STATUS[CVE-2024-47667] = "fixed-version: Fixed from version 6.11" | ||
8997 | |||
8998 | CVE_STATUS[CVE-2024-47668] = "fixed-version: Fixed from version 6.11" | ||
8999 | |||
9000 | CVE_STATUS[CVE-2024-47669] = "fixed-version: Fixed from version 6.11" | ||
9001 | |||
9002 | CVE_STATUS[CVE-2024-47670] = "fixed-version: Fixed from version 6.11" | ||
9003 | |||
9004 | CVE_STATUS[CVE-2024-47671] = "fixed-version: Fixed from version 6.12" | ||
9005 | |||
9006 | CVE_STATUS[CVE-2024-47672] = "fixed-version: Fixed from version 6.11" | ||
9007 | |||
9008 | CVE_STATUS[CVE-2024-47673] = "fixed-version: Fixed from version 6.11" | ||
9009 | |||
9010 | CVE_STATUS[CVE-2024-47674] = "fixed-version: Fixed from version 6.11" | ||
9011 | |||
9012 | CVE_STATUS[CVE-2024-47675] = "fixed-version: Fixed from version 6.12" | ||
9013 | |||
9014 | CVE_STATUS[CVE-2024-47676] = "fixed-version: Fixed from version 6.12" | ||
9015 | |||
9016 | CVE_STATUS[CVE-2024-47677] = "fixed-version: Fixed from version 6.12" | ||
9017 | |||
9018 | CVE_STATUS[CVE-2024-47678] = "fixed-version: Fixed from version 6.12" | ||
9019 | |||
9020 | CVE_STATUS[CVE-2024-47679] = "fixed-version: Fixed from version 6.12" | ||
9021 | |||
9022 | CVE_STATUS[CVE-2024-47680] = "fixed-version: Fixed from version 6.12" | ||
9023 | |||
9024 | CVE_STATUS[CVE-2024-47681] = "fixed-version: Fixed from version 6.12" | ||
9025 | |||
9026 | CVE_STATUS[CVE-2024-47682] = "fixed-version: Fixed from version 6.12" | ||
9027 | |||
9028 | CVE_STATUS[CVE-2024-47683] = "fixed-version: Fixed from version 6.12" | ||
9029 | |||
9030 | CVE_STATUS[CVE-2024-47684] = "fixed-version: Fixed from version 6.12" | ||
9031 | |||
9032 | CVE_STATUS[CVE-2024-47685] = "fixed-version: Fixed from version 6.12" | ||
9033 | |||
9034 | CVE_STATUS[CVE-2024-47686] = "fixed-version: Fixed from version 6.12" | ||
9035 | |||
9036 | CVE_STATUS[CVE-2024-47687] = "fixed-version: Fixed from version 6.12" | ||
9037 | |||
9038 | CVE_STATUS[CVE-2024-47688] = "fixed-version: Fixed from version 6.12" | ||
9039 | |||
9040 | CVE_STATUS[CVE-2024-47689] = "fixed-version: Fixed from version 6.12" | ||
9041 | |||
9042 | CVE_STATUS[CVE-2024-47690] = "fixed-version: Fixed from version 6.12" | ||
9043 | |||
9044 | CVE_STATUS[CVE-2024-47691] = "fixed-version: Fixed from version 6.12" | ||
9045 | |||
9046 | CVE_STATUS[CVE-2024-47692] = "fixed-version: Fixed from version 6.12" | ||
9047 | |||
9048 | CVE_STATUS[CVE-2024-47693] = "fixed-version: Fixed from version 6.12" | ||
9049 | |||
9050 | CVE_STATUS[CVE-2024-47694] = "fixed-version: Fixed from version 6.12" | ||
9051 | |||
9052 | CVE_STATUS[CVE-2024-47695] = "fixed-version: Fixed from version 6.12" | ||
9053 | |||
9054 | CVE_STATUS[CVE-2024-47696] = "fixed-version: Fixed from version 6.12" | ||
9055 | |||
9056 | CVE_STATUS[CVE-2024-47697] = "fixed-version: Fixed from version 6.12" | ||
9057 | |||
9058 | CVE_STATUS[CVE-2024-47698] = "fixed-version: Fixed from version 6.12" | ||
9059 | |||
9060 | CVE_STATUS[CVE-2024-47699] = "fixed-version: Fixed from version 6.12" | ||
9061 | |||
9062 | CVE_STATUS[CVE-2024-47700] = "fixed-version: Fixed from version 6.12" | ||
9063 | |||
9064 | CVE_STATUS[CVE-2024-47701] = "fixed-version: Fixed from version 6.12" | ||
9065 | |||
9066 | CVE_STATUS[CVE-2024-47702] = "fixed-version: Fixed from version 6.12" | ||
9067 | |||
9068 | CVE_STATUS[CVE-2024-47703] = "fixed-version: Fixed from version 6.12" | ||
9069 | |||
9070 | CVE_STATUS[CVE-2024-47704] = "fixed-version: Fixed from version 6.12" | ||
9071 | |||
9072 | CVE_STATUS[CVE-2024-47705] = "fixed-version: Fixed from version 6.12" | ||
9073 | |||
9074 | CVE_STATUS[CVE-2024-47706] = "fixed-version: Fixed from version 6.12" | ||
9075 | |||
9076 | CVE_STATUS[CVE-2024-47707] = "fixed-version: Fixed from version 6.12" | ||
9077 | |||
9078 | CVE_STATUS[CVE-2024-47708] = "fixed-version: Fixed from version 6.12" | ||
9079 | |||
9080 | CVE_STATUS[CVE-2024-47709] = "fixed-version: Fixed from version 6.12" | ||
9081 | |||
9082 | CVE_STATUS[CVE-2024-47710] = "fixed-version: Fixed from version 6.12" | ||
9083 | |||
9084 | CVE_STATUS[CVE-2024-47711] = "fixed-version: Fixed from version 6.12" | ||
9085 | |||
9086 | CVE_STATUS[CVE-2024-47712] = "fixed-version: Fixed from version 6.12" | ||
9087 | |||
9088 | CVE_STATUS[CVE-2024-47713] = "fixed-version: Fixed from version 6.12" | ||
9089 | |||
9090 | CVE_STATUS[CVE-2024-47714] = "fixed-version: Fixed from version 6.12" | ||
9091 | |||
9092 | CVE_STATUS[CVE-2024-47715] = "fixed-version: Fixed from version 6.12" | ||
9093 | |||
9094 | CVE_STATUS[CVE-2024-47716] = "fixed-version: Fixed from version 6.12" | ||
9095 | |||
9096 | CVE_STATUS[CVE-2024-47717] = "fixed-version: Fixed from version 6.12" | ||
9097 | |||
9098 | CVE_STATUS[CVE-2024-47718] = "fixed-version: Fixed from version 6.12" | ||
9099 | |||
9100 | CVE_STATUS[CVE-2024-47719] = "fixed-version: Fixed from version 6.12" | ||
9101 | |||
9102 | CVE_STATUS[CVE-2024-47720] = "fixed-version: Fixed from version 6.12" | ||
9103 | |||
9104 | CVE_STATUS[CVE-2024-47721] = "fixed-version: Fixed from version 6.12" | ||
9105 | |||
9106 | CVE_STATUS[CVE-2024-47723] = "fixed-version: Fixed from version 6.12" | ||
9107 | |||
9108 | CVE_STATUS[CVE-2024-47724] = "fixed-version: Fixed from version 6.12" | ||
9109 | |||
9110 | CVE_STATUS[CVE-2024-47726] = "fixed-version: Fixed from version 6.12" | ||
9111 | |||
9112 | CVE_STATUS[CVE-2024-47727] = "fixed-version: Fixed from version 6.12" | ||
9113 | |||
9114 | CVE_STATUS[CVE-2024-47728] = "fixed-version: Fixed from version 6.12" | ||
9115 | |||
9116 | CVE_STATUS[CVE-2024-47729] = "fixed-version: Fixed from version 6.12" | ||
9117 | |||
9118 | CVE_STATUS[CVE-2024-47730] = "fixed-version: Fixed from version 6.12" | ||
9119 | |||
9120 | CVE_STATUS[CVE-2024-47731] = "fixed-version: Fixed from version 6.12" | ||
9121 | |||
9122 | CVE_STATUS[CVE-2024-47732] = "fixed-version: Fixed from version 6.12" | ||
9123 | |||
9124 | CVE_STATUS[CVE-2024-47733] = "fixed-version: Fixed from version 6.12" | ||
9125 | |||
9126 | CVE_STATUS[CVE-2024-47734] = "fixed-version: Fixed from version 6.12" | ||
9127 | |||
9128 | CVE_STATUS[CVE-2024-47735] = "fixed-version: Fixed from version 6.12" | ||
9129 | |||
9130 | CVE_STATUS[CVE-2024-47736] = "fixed-version: Fixed from version 6.12" | ||
9131 | |||
9132 | CVE_STATUS[CVE-2024-47737] = "fixed-version: Fixed from version 6.12" | ||
9133 | |||
9134 | CVE_STATUS[CVE-2024-47738] = "fixed-version: Fixed from version 6.12" | ||
9135 | |||
9136 | CVE_STATUS[CVE-2024-47739] = "fixed-version: Fixed from version 6.12" | ||
9137 | |||
9138 | CVE_STATUS[CVE-2024-47740] = "fixed-version: Fixed from version 6.12" | ||
9139 | |||
9140 | CVE_STATUS[CVE-2024-47741] = "fixed-version: Fixed from version 6.12" | ||
9141 | |||
9142 | CVE_STATUS[CVE-2024-47742] = "fixed-version: Fixed from version 6.12" | ||
9143 | |||
9144 | CVE_STATUS[CVE-2024-47743] = "fixed-version: Fixed from version 6.12" | ||
9145 | |||
9146 | CVE_STATUS[CVE-2024-47744] = "fixed-version: Fixed from version 6.12" | ||
9147 | |||
9148 | CVE_STATUS[CVE-2024-47745] = "fixed-version: Fixed from version 6.12" | ||
9149 | |||
9150 | CVE_STATUS[CVE-2024-47746] = "fixed-version: Fixed from version 6.12" | ||
9151 | |||
9152 | CVE_STATUS[CVE-2024-47747] = "fixed-version: Fixed from version 6.12" | ||
9153 | |||
9154 | CVE_STATUS[CVE-2024-47748] = "fixed-version: Fixed from version 6.12" | ||
9155 | |||
9156 | CVE_STATUS[CVE-2024-47749] = "fixed-version: Fixed from version 6.12" | ||
9157 | |||
9158 | CVE_STATUS[CVE-2024-47750] = "fixed-version: Fixed from version 6.12" | ||
9159 | |||
9160 | CVE_STATUS[CVE-2024-47751] = "fixed-version: Fixed from version 6.12" | ||
9161 | |||
9162 | CVE_STATUS[CVE-2024-47752] = "fixed-version: Fixed from version 6.12" | ||
9163 | |||
9164 | CVE_STATUS[CVE-2024-47753] = "fixed-version: Fixed from version 6.12" | ||
9165 | |||
9166 | CVE_STATUS[CVE-2024-47754] = "fixed-version: Fixed from version 6.12" | ||
9167 | |||
9168 | CVE_STATUS[CVE-2024-47756] = "fixed-version: Fixed from version 6.12" | ||
9169 | |||
9170 | CVE_STATUS[CVE-2024-47757] = "fixed-version: Fixed from version 6.12" | ||
9171 | |||
9172 | CVE_STATUS[CVE-2024-47794] = "cpe-stable-backport: Backported in 6.12.5" | ||
9173 | |||
9174 | CVE_STATUS[CVE-2024-47809] = "cpe-stable-backport: Backported in 6.12.5" | ||
9175 | |||
9176 | CVE_STATUS[CVE-2024-48873] = "cpe-stable-backport: Backported in 6.12.5" | ||
9177 | |||
9178 | CVE_STATUS[CVE-2024-48875] = "cpe-stable-backport: Backported in 6.12.5" | ||
9179 | |||
9180 | CVE_STATUS[CVE-2024-48876] = "cpe-stable-backport: Backported in 6.12.5" | ||
9181 | |||
9182 | CVE_STATUS[CVE-2024-48881] = "cpe-stable-backport: Backported in 6.12.5" | ||
9183 | |||
9184 | CVE_STATUS[CVE-2024-49568] = "cpe-stable-backport: Backported in 6.12.7" | ||
9185 | |||
9186 | CVE_STATUS[CVE-2024-49569] = "cpe-stable-backport: Backported in 6.12.5" | ||
9187 | |||
9188 | CVE_STATUS[CVE-2024-49570] = "cpe-stable-backport: Backported in 6.12.16" | ||
9189 | |||
9190 | CVE_STATUS[CVE-2024-49571] = "cpe-stable-backport: Backported in 6.12.7" | ||
9191 | |||
9192 | CVE_STATUS[CVE-2024-49573] = "cpe-stable-backport: Backported in 6.12.7" | ||
9193 | |||
9194 | CVE_STATUS[CVE-2024-49850] = "fixed-version: Fixed from version 6.12" | ||
9195 | |||
9196 | CVE_STATUS[CVE-2024-49851] = "fixed-version: Fixed from version 6.12" | ||
9197 | |||
9198 | CVE_STATUS[CVE-2024-49852] = "fixed-version: Fixed from version 6.12" | ||
9199 | |||
9200 | CVE_STATUS[CVE-2024-49853] = "fixed-version: Fixed from version 6.12" | ||
9201 | |||
9202 | # CVE-2024-49854 has no known resolution | ||
9203 | |||
9204 | CVE_STATUS[CVE-2024-49855] = "fixed-version: Fixed from version 6.12" | ||
9205 | |||
9206 | CVE_STATUS[CVE-2024-49856] = "fixed-version: Fixed from version 6.12" | ||
9207 | |||
9208 | CVE_STATUS[CVE-2024-49857] = "fixed-version: Fixed from version 6.12" | ||
9209 | |||
9210 | CVE_STATUS[CVE-2024-49858] = "fixed-version: Fixed from version 6.12" | ||
9211 | |||
9212 | CVE_STATUS[CVE-2024-49859] = "fixed-version: Fixed from version 6.12" | ||
9213 | |||
9214 | CVE_STATUS[CVE-2024-49860] = "fixed-version: Fixed from version 6.12" | ||
9215 | |||
9216 | CVE_STATUS[CVE-2024-49861] = "fixed-version: Fixed from version 6.12" | ||
9217 | |||
9218 | CVE_STATUS[CVE-2024-49862] = "fixed-version: Fixed from version 6.12" | ||
9219 | |||
9220 | CVE_STATUS[CVE-2024-49863] = "fixed-version: Fixed from version 6.12" | ||
9221 | |||
9222 | CVE_STATUS[CVE-2024-49864] = "fixed-version: Fixed from version 6.12" | ||
9223 | |||
9224 | CVE_STATUS[CVE-2024-49865] = "fixed-version: Fixed from version 6.12" | ||
9225 | |||
9226 | CVE_STATUS[CVE-2024-49866] = "fixed-version: Fixed from version 6.12" | ||
9227 | |||
9228 | CVE_STATUS[CVE-2024-49867] = "fixed-version: Fixed from version 6.12" | ||
9229 | |||
9230 | CVE_STATUS[CVE-2024-49868] = "fixed-version: Fixed from version 6.12" | ||
9231 | |||
9232 | CVE_STATUS[CVE-2024-49869] = "fixed-version: Fixed from version 6.12" | ||
9233 | |||
9234 | CVE_STATUS[CVE-2024-49870] = "fixed-version: Fixed from version 6.12" | ||
9235 | |||
9236 | CVE_STATUS[CVE-2024-49871] = "fixed-version: Fixed from version 6.12" | ||
9237 | |||
9238 | CVE_STATUS[CVE-2024-49872] = "fixed-version: Fixed from version 6.12" | ||
9239 | |||
9240 | CVE_STATUS[CVE-2024-49873] = "fixed-version: Fixed from version 6.12" | ||
9241 | |||
9242 | CVE_STATUS[CVE-2024-49874] = "fixed-version: Fixed from version 6.12" | ||
9243 | |||
9244 | CVE_STATUS[CVE-2024-49875] = "fixed-version: Fixed from version 6.12" | ||
9245 | |||
9246 | CVE_STATUS[CVE-2024-49876] = "fixed-version: Fixed from version 6.12" | ||
9247 | |||
9248 | CVE_STATUS[CVE-2024-49877] = "fixed-version: Fixed from version 6.12" | ||
9249 | |||
9250 | CVE_STATUS[CVE-2024-49878] = "fixed-version: Fixed from version 6.12" | ||
9251 | |||
9252 | CVE_STATUS[CVE-2024-49879] = "fixed-version: Fixed from version 6.12" | ||
9253 | |||
9254 | CVE_STATUS[CVE-2024-49880] = "fixed-version: Fixed from version 6.12" | ||
9255 | |||
9256 | CVE_STATUS[CVE-2024-49881] = "fixed-version: Fixed from version 6.12" | ||
9257 | |||
9258 | CVE_STATUS[CVE-2024-49882] = "fixed-version: Fixed from version 6.12" | ||
9259 | |||
9260 | CVE_STATUS[CVE-2024-49883] = "fixed-version: Fixed from version 6.12" | ||
9261 | |||
9262 | CVE_STATUS[CVE-2024-49884] = "fixed-version: Fixed from version 6.12" | ||
9263 | |||
9264 | CVE_STATUS[CVE-2024-49885] = "fixed-version: Fixed from version 6.12" | ||
9265 | |||
9266 | CVE_STATUS[CVE-2024-49886] = "fixed-version: Fixed from version 6.12" | ||
9267 | |||
9268 | CVE_STATUS[CVE-2024-49887] = "fixed-version: Fixed from version 6.12" | ||
9269 | |||
9270 | CVE_STATUS[CVE-2024-49888] = "fixed-version: Fixed from version 6.12" | ||
9271 | |||
9272 | CVE_STATUS[CVE-2024-49889] = "fixed-version: Fixed from version 6.12" | ||
9273 | |||
9274 | CVE_STATUS[CVE-2024-49890] = "fixed-version: Fixed from version 6.12" | ||
9275 | |||
9276 | CVE_STATUS[CVE-2024-49891] = "fixed-version: Fixed from version 6.12" | ||
9277 | |||
9278 | CVE_STATUS[CVE-2024-49892] = "fixed-version: Fixed from version 6.12" | ||
9279 | |||
9280 | CVE_STATUS[CVE-2024-49893] = "fixed-version: Fixed from version 6.12" | ||
9281 | |||
9282 | CVE_STATUS[CVE-2024-49894] = "fixed-version: Fixed from version 6.12" | ||
9283 | |||
9284 | CVE_STATUS[CVE-2024-49895] = "fixed-version: Fixed from version 6.12" | ||
9285 | |||
9286 | CVE_STATUS[CVE-2024-49896] = "fixed-version: Fixed from version 6.12" | ||
9287 | |||
9288 | CVE_STATUS[CVE-2024-49897] = "fixed-version: Fixed from version 6.12" | ||
9289 | |||
9290 | CVE_STATUS[CVE-2024-49898] = "fixed-version: Fixed from version 6.12" | ||
9291 | |||
9292 | CVE_STATUS[CVE-2024-49899] = "fixed-version: Fixed from version 6.12" | ||
9293 | |||
9294 | CVE_STATUS[CVE-2024-49900] = "fixed-version: Fixed from version 6.12" | ||
9295 | |||
9296 | CVE_STATUS[CVE-2024-49901] = "fixed-version: Fixed from version 6.12" | ||
9297 | |||
9298 | CVE_STATUS[CVE-2024-49902] = "fixed-version: Fixed from version 6.12" | ||
9299 | |||
9300 | CVE_STATUS[CVE-2024-49903] = "fixed-version: Fixed from version 6.12" | ||
9301 | |||
9302 | CVE_STATUS[CVE-2024-49904] = "fixed-version: Fixed from version 6.12" | ||
9303 | |||
9304 | CVE_STATUS[CVE-2024-49905] = "fixed-version: Fixed from version 6.12" | ||
9305 | |||
9306 | CVE_STATUS[CVE-2024-49906] = "fixed-version: Fixed from version 6.12" | ||
9307 | |||
9308 | CVE_STATUS[CVE-2024-49907] = "fixed-version: Fixed from version 6.12" | ||
9309 | |||
9310 | CVE_STATUS[CVE-2024-49908] = "fixed-version: Fixed from version 6.12" | ||
9311 | |||
9312 | CVE_STATUS[CVE-2024-49909] = "fixed-version: Fixed from version 6.12" | ||
9313 | |||
9314 | CVE_STATUS[CVE-2024-49910] = "fixed-version: Fixed from version 6.12" | ||
9315 | |||
9316 | CVE_STATUS[CVE-2024-49911] = "fixed-version: Fixed from version 6.12" | ||
9317 | |||
9318 | CVE_STATUS[CVE-2024-49912] = "fixed-version: Fixed from version 6.12" | ||
9319 | |||
9320 | CVE_STATUS[CVE-2024-49913] = "fixed-version: Fixed from version 6.12" | ||
9321 | |||
9322 | CVE_STATUS[CVE-2024-49914] = "fixed-version: Fixed from version 6.12" | ||
9323 | |||
9324 | CVE_STATUS[CVE-2024-49915] = "fixed-version: Fixed from version 6.12" | ||
9325 | |||
9326 | CVE_STATUS[CVE-2024-49916] = "fixed-version: Fixed from version 6.12" | ||
9327 | |||
9328 | CVE_STATUS[CVE-2024-49917] = "fixed-version: Fixed from version 6.12" | ||
9329 | |||
9330 | CVE_STATUS[CVE-2024-49918] = "fixed-version: Fixed from version 6.12" | ||
9331 | |||
9332 | CVE_STATUS[CVE-2024-49919] = "fixed-version: Fixed from version 6.12" | ||
9333 | |||
9334 | CVE_STATUS[CVE-2024-49920] = "fixed-version: Fixed from version 6.12" | ||
9335 | |||
9336 | CVE_STATUS[CVE-2024-49921] = "fixed-version: Fixed from version 6.12" | ||
9337 | |||
9338 | CVE_STATUS[CVE-2024-49922] = "fixed-version: Fixed from version 6.12" | ||
9339 | |||
9340 | CVE_STATUS[CVE-2024-49923] = "fixed-version: Fixed from version 6.12" | ||
9341 | |||
9342 | CVE_STATUS[CVE-2024-49924] = "fixed-version: Fixed from version 6.12" | ||
9343 | |||
9344 | CVE_STATUS[CVE-2024-49925] = "fixed-version: Fixed from version 6.12" | ||
9345 | |||
9346 | CVE_STATUS[CVE-2024-49926] = "fixed-version: Fixed from version 6.12" | ||
9347 | |||
9348 | CVE_STATUS[CVE-2024-49927] = "fixed-version: Fixed from version 6.12" | ||
9349 | |||
9350 | CVE_STATUS[CVE-2024-49928] = "fixed-version: Fixed from version 6.12" | ||
9351 | |||
9352 | CVE_STATUS[CVE-2024-49929] = "fixed-version: Fixed from version 6.12" | ||
9353 | |||
9354 | CVE_STATUS[CVE-2024-49930] = "fixed-version: Fixed from version 6.12" | ||
9355 | |||
9356 | CVE_STATUS[CVE-2024-49931] = "fixed-version: Fixed from version 6.12" | ||
9357 | |||
9358 | CVE_STATUS[CVE-2024-49932] = "fixed-version: Fixed from version 6.12" | ||
9359 | |||
9360 | CVE_STATUS[CVE-2024-49933] = "fixed-version: Fixed from version 6.12" | ||
9361 | |||
9362 | CVE_STATUS[CVE-2024-49934] = "fixed-version: Fixed from version 6.12" | ||
9363 | |||
9364 | CVE_STATUS[CVE-2024-49935] = "fixed-version: Fixed from version 6.12" | ||
9365 | |||
9366 | CVE_STATUS[CVE-2024-49936] = "fixed-version: Fixed from version 6.12" | ||
9367 | |||
9368 | CVE_STATUS[CVE-2024-49937] = "fixed-version: Fixed from version 6.12" | ||
9369 | |||
9370 | CVE_STATUS[CVE-2024-49938] = "fixed-version: Fixed from version 6.12" | ||
9371 | |||
9372 | CVE_STATUS[CVE-2024-49939] = "fixed-version: Fixed from version 6.12" | ||
9373 | |||
9374 | CVE_STATUS[CVE-2024-49940] = "fixed-version: Fixed from version 6.12" | ||
9375 | |||
9376 | CVE_STATUS[CVE-2024-49941] = "fixed-version: Fixed from version 6.12" | ||
9377 | |||
9378 | CVE_STATUS[CVE-2024-49942] = "fixed-version: Fixed from version 6.12" | ||
9379 | |||
9380 | CVE_STATUS[CVE-2024-49943] = "fixed-version: Fixed from version 6.12" | ||
9381 | |||
9382 | CVE_STATUS[CVE-2024-49944] = "fixed-version: Fixed from version 6.12" | ||
9383 | |||
9384 | CVE_STATUS[CVE-2024-49945] = "fixed-version: Fixed from version 6.12" | ||
9385 | |||
9386 | CVE_STATUS[CVE-2024-49946] = "fixed-version: Fixed from version 6.12" | ||
9387 | |||
9388 | CVE_STATUS[CVE-2024-49947] = "fixed-version: Fixed from version 6.12" | ||
9389 | |||
9390 | CVE_STATUS[CVE-2024-49948] = "fixed-version: Fixed from version 6.12" | ||
9391 | |||
9392 | CVE_STATUS[CVE-2024-49949] = "fixed-version: Fixed from version 6.12" | ||
9393 | |||
9394 | CVE_STATUS[CVE-2024-49950] = "fixed-version: Fixed from version 6.12" | ||
9395 | |||
9396 | CVE_STATUS[CVE-2024-49951] = "fixed-version: Fixed from version 6.12" | ||
9397 | |||
9398 | CVE_STATUS[CVE-2024-49952] = "fixed-version: Fixed from version 6.12" | ||
9399 | |||
9400 | CVE_STATUS[CVE-2024-49953] = "fixed-version: Fixed from version 6.12" | ||
9401 | |||
9402 | CVE_STATUS[CVE-2024-49954] = "fixed-version: Fixed from version 6.12" | ||
9403 | |||
9404 | CVE_STATUS[CVE-2024-49955] = "fixed-version: Fixed from version 6.12" | ||
9405 | |||
9406 | CVE_STATUS[CVE-2024-49956] = "fixed-version: Fixed from version 6.12" | ||
9407 | |||
9408 | CVE_STATUS[CVE-2024-49957] = "fixed-version: Fixed from version 6.12" | ||
9409 | |||
9410 | CVE_STATUS[CVE-2024-49958] = "fixed-version: Fixed from version 6.12" | ||
9411 | |||
9412 | CVE_STATUS[CVE-2024-49959] = "fixed-version: Fixed from version 6.12" | ||
9413 | |||
9414 | CVE_STATUS[CVE-2024-49960] = "fixed-version: Fixed from version 6.12" | ||
9415 | |||
9416 | CVE_STATUS[CVE-2024-49961] = "fixed-version: Fixed from version 6.12" | ||
9417 | |||
9418 | CVE_STATUS[CVE-2024-49962] = "fixed-version: Fixed from version 6.12" | ||
9419 | |||
9420 | CVE_STATUS[CVE-2024-49963] = "fixed-version: Fixed from version 6.12" | ||
9421 | |||
9422 | CVE_STATUS[CVE-2024-49964] = "fixed-version: Fixed from version 6.12" | ||
9423 | |||
9424 | CVE_STATUS[CVE-2024-49965] = "fixed-version: Fixed from version 6.12" | ||
9425 | |||
9426 | CVE_STATUS[CVE-2024-49966] = "fixed-version: Fixed from version 6.12" | ||
9427 | |||
9428 | CVE_STATUS[CVE-2024-49968] = "fixed-version: Fixed from version 6.12" | ||
9429 | |||
9430 | CVE_STATUS[CVE-2024-49969] = "fixed-version: Fixed from version 6.12" | ||
9431 | |||
9432 | CVE_STATUS[CVE-2024-49970] = "fixed-version: Fixed from version 6.12" | ||
9433 | |||
9434 | CVE_STATUS[CVE-2024-49971] = "fixed-version: Fixed from version 6.12" | ||
9435 | |||
9436 | CVE_STATUS[CVE-2024-49972] = "fixed-version: Fixed from version 6.12" | ||
9437 | |||
9438 | CVE_STATUS[CVE-2024-49973] = "fixed-version: Fixed from version 6.12" | ||
9439 | |||
9440 | CVE_STATUS[CVE-2024-49974] = "fixed-version: Fixed from version 6.12" | ||
9441 | |||
9442 | CVE_STATUS[CVE-2024-49975] = "fixed-version: Fixed from version 6.12" | ||
9443 | |||
9444 | CVE_STATUS[CVE-2024-49976] = "fixed-version: Fixed from version 6.12" | ||
9445 | |||
9446 | CVE_STATUS[CVE-2024-49977] = "fixed-version: Fixed from version 6.12" | ||
9447 | |||
9448 | CVE_STATUS[CVE-2024-49978] = "fixed-version: Fixed from version 6.12" | ||
9449 | |||
9450 | CVE_STATUS[CVE-2024-49979] = "fixed-version: Fixed from version 6.12" | ||
9451 | |||
9452 | CVE_STATUS[CVE-2024-49980] = "fixed-version: Fixed from version 6.12" | ||
9453 | |||
9454 | CVE_STATUS[CVE-2024-49981] = "fixed-version: Fixed from version 6.12" | ||
9455 | |||
9456 | CVE_STATUS[CVE-2024-49982] = "fixed-version: Fixed from version 6.12" | ||
9457 | |||
9458 | CVE_STATUS[CVE-2024-49983] = "fixed-version: Fixed from version 6.12" | ||
9459 | |||
9460 | CVE_STATUS[CVE-2024-49984] = "fixed-version: Fixed from version 6.12" | ||
9461 | |||
9462 | CVE_STATUS[CVE-2024-49985] = "fixed-version: Fixed from version 6.12" | ||
9463 | |||
9464 | CVE_STATUS[CVE-2024-49986] = "fixed-version: Fixed from version 6.12" | ||
9465 | |||
9466 | CVE_STATUS[CVE-2024-49987] = "fixed-version: Fixed from version 6.12" | ||
9467 | |||
9468 | CVE_STATUS[CVE-2024-49988] = "fixed-version: Fixed from version 6.12" | ||
9469 | |||
9470 | CVE_STATUS[CVE-2024-49989] = "fixed-version: Fixed from version 6.12" | ||
9471 | |||
9472 | CVE_STATUS[CVE-2024-49990] = "fixed-version: Fixed from version 6.12" | ||
9473 | |||
9474 | CVE_STATUS[CVE-2024-49991] = "fixed-version: Fixed from version 6.12" | ||
9475 | |||
9476 | CVE_STATUS[CVE-2024-49992] = "fixed-version: Fixed from version 6.12" | ||
9477 | |||
9478 | CVE_STATUS[CVE-2024-49994] = "fixed-version: Fixed from version 6.12" | ||
9479 | |||
9480 | CVE_STATUS[CVE-2024-49996] = "fixed-version: Fixed from version 6.12" | ||
9481 | |||
9482 | CVE_STATUS[CVE-2024-49997] = "fixed-version: Fixed from version 6.12" | ||
9483 | |||
9484 | CVE_STATUS[CVE-2024-49998] = "fixed-version: Fixed from version 6.12" | ||
9485 | |||
9486 | CVE_STATUS[CVE-2024-49999] = "fixed-version: Fixed from version 6.12" | ||
9487 | |||
9488 | CVE_STATUS[CVE-2024-50000] = "fixed-version: Fixed from version 6.12" | ||
9489 | |||
9490 | CVE_STATUS[CVE-2024-50001] = "fixed-version: Fixed from version 6.12" | ||
9491 | |||
9492 | CVE_STATUS[CVE-2024-50002] = "fixed-version: Fixed from version 6.12" | ||
9493 | |||
9494 | CVE_STATUS[CVE-2024-50003] = "fixed-version: Fixed from version 6.12" | ||
9495 | |||
9496 | CVE_STATUS[CVE-2024-50004] = "fixed-version: Fixed from version 6.12" | ||
9497 | |||
9498 | CVE_STATUS[CVE-2024-50005] = "fixed-version: Fixed from version 6.12" | ||
9499 | |||
9500 | CVE_STATUS[CVE-2024-50006] = "fixed-version: Fixed from version 6.12" | ||
9501 | |||
9502 | CVE_STATUS[CVE-2024-50007] = "fixed-version: Fixed from version 6.12" | ||
9503 | |||
9504 | CVE_STATUS[CVE-2024-50008] = "fixed-version: Fixed from version 6.12" | ||
9505 | |||
9506 | CVE_STATUS[CVE-2024-50009] = "fixed-version: Fixed from version 6.12" | ||
9507 | |||
9508 | CVE_STATUS[CVE-2024-50010] = "fixed-version: Fixed from version 6.12" | ||
9509 | |||
9510 | CVE_STATUS[CVE-2024-50011] = "fixed-version: Fixed from version 6.12" | ||
9511 | |||
9512 | CVE_STATUS[CVE-2024-50012] = "fixed-version: Fixed from version 6.12" | ||
9513 | |||
9514 | CVE_STATUS[CVE-2024-50013] = "fixed-version: Fixed from version 6.12" | ||
9515 | |||
9516 | CVE_STATUS[CVE-2024-50014] = "fixed-version: Fixed from version 6.12" | ||
9517 | |||
9518 | CVE_STATUS[CVE-2024-50015] = "fixed-version: Fixed from version 6.12" | ||
9519 | |||
9520 | CVE_STATUS[CVE-2024-50017] = "fixed-version: Fixed from version 6.12" | ||
9521 | |||
9522 | CVE_STATUS[CVE-2024-50019] = "fixed-version: Fixed from version 6.12" | ||
9523 | |||
9524 | CVE_STATUS[CVE-2024-50020] = "fixed-version: Fixed from version 6.12" | ||
9525 | |||
9526 | CVE_STATUS[CVE-2024-50021] = "fixed-version: Fixed from version 6.12" | ||
9527 | |||
9528 | CVE_STATUS[CVE-2024-50022] = "fixed-version: Fixed from version 6.12" | ||
9529 | |||
9530 | CVE_STATUS[CVE-2024-50023] = "fixed-version: Fixed from version 6.12" | ||
9531 | |||
9532 | CVE_STATUS[CVE-2024-50024] = "fixed-version: Fixed from version 6.12" | ||
9533 | |||
9534 | CVE_STATUS[CVE-2024-50025] = "fixed-version: Fixed from version 6.12" | ||
9535 | |||
9536 | CVE_STATUS[CVE-2024-50026] = "fixed-version: Fixed from version 6.12" | ||
9537 | |||
9538 | CVE_STATUS[CVE-2024-50027] = "fixed-version: Fixed from version 6.12" | ||
9539 | |||
9540 | CVE_STATUS[CVE-2024-50028] = "fixed-version: Fixed from version 6.12" | ||
9541 | |||
9542 | CVE_STATUS[CVE-2024-50029] = "fixed-version: Fixed from version 6.12" | ||
9543 | |||
9544 | CVE_STATUS[CVE-2024-50030] = "fixed-version: Fixed from version 6.12" | ||
9545 | |||
9546 | CVE_STATUS[CVE-2024-50031] = "fixed-version: Fixed from version 6.12" | ||
9547 | |||
9548 | CVE_STATUS[CVE-2024-50032] = "fixed-version: Fixed from version 6.11.4" | ||
9549 | |||
9550 | CVE_STATUS[CVE-2024-50033] = "fixed-version: Fixed from version 6.12" | ||
9551 | |||
9552 | CVE_STATUS[CVE-2024-50034] = "fixed-version: Fixed from version 6.12" | ||
9553 | |||
9554 | CVE_STATUS[CVE-2024-50035] = "fixed-version: Fixed from version 6.12" | ||
9555 | |||
9556 | CVE_STATUS[CVE-2024-50036] = "fixed-version: Fixed from version 6.12" | ||
9557 | |||
9558 | CVE_STATUS[CVE-2024-50037] = "fixed-version: Fixed from version 6.12" | ||
9559 | |||
9560 | CVE_STATUS[CVE-2024-50038] = "fixed-version: Fixed from version 6.12" | ||
9561 | |||
9562 | CVE_STATUS[CVE-2024-50039] = "fixed-version: Fixed from version 6.12" | ||
9563 | |||
9564 | CVE_STATUS[CVE-2024-50040] = "fixed-version: Fixed from version 6.12" | ||
9565 | |||
9566 | CVE_STATUS[CVE-2024-50041] = "fixed-version: Fixed from version 6.12" | ||
9567 | |||
9568 | CVE_STATUS[CVE-2024-50042] = "fixed-version: Fixed from version 6.12" | ||
9569 | |||
9570 | CVE_STATUS[CVE-2024-50043] = "fixed-version: Fixed from version 6.12" | ||
9571 | |||
9572 | CVE_STATUS[CVE-2024-50044] = "fixed-version: Fixed from version 6.12" | ||
9573 | |||
9574 | CVE_STATUS[CVE-2024-50045] = "fixed-version: Fixed from version 6.12" | ||
9575 | |||
9576 | CVE_STATUS[CVE-2024-50046] = "fixed-version: Fixed from version 6.12" | ||
9577 | |||
9578 | CVE_STATUS[CVE-2024-50047] = "fixed-version: Fixed from version 6.12" | ||
9579 | |||
9580 | CVE_STATUS[CVE-2024-50048] = "fixed-version: Fixed from version 6.12" | ||
9581 | |||
9582 | CVE_STATUS[CVE-2024-50049] = "fixed-version: Fixed from version 6.12" | ||
9583 | |||
9584 | CVE_STATUS[CVE-2024-50051] = "cpe-stable-backport: Backported in 6.12.5" | ||
9585 | |||
9586 | CVE_STATUS[CVE-2024-50055] = "fixed-version: Fixed from version 6.12" | ||
9587 | |||
9588 | CVE_STATUS[CVE-2024-50056] = "fixed-version: Fixed from version 6.12" | ||
9589 | |||
9590 | CVE_STATUS[CVE-2024-50057] = "fixed-version: Fixed from version 6.12" | ||
9591 | |||
9592 | CVE_STATUS[CVE-2024-50058] = "fixed-version: Fixed from version 6.12" | ||
9593 | |||
9594 | CVE_STATUS[CVE-2024-50059] = "fixed-version: Fixed from version 6.12" | ||
9595 | |||
9596 | CVE_STATUS[CVE-2024-50060] = "fixed-version: Fixed from version 6.12" | ||
9597 | |||
9598 | CVE_STATUS[CVE-2024-50061] = "fixed-version: Fixed from version 6.12" | ||
9599 | |||
9600 | CVE_STATUS[CVE-2024-50062] = "fixed-version: Fixed from version 6.12" | ||
9601 | |||
9602 | CVE_STATUS[CVE-2024-50063] = "fixed-version: Fixed from version 6.12" | ||
9603 | |||
9604 | CVE_STATUS[CVE-2024-50064] = "fixed-version: Fixed from version 6.12" | ||
9605 | |||
9606 | CVE_STATUS[CVE-2024-50065] = "fixed-version: Fixed from version 6.12" | ||
9607 | |||
9608 | CVE_STATUS[CVE-2024-50066] = "fixed-version: Fixed from version 6.12" | ||
9609 | |||
9610 | CVE_STATUS[CVE-2024-50067] = "fixed-version: Fixed from version 6.12" | ||
9611 | |||
9612 | CVE_STATUS[CVE-2024-50068] = "fixed-version: Fixed from version 6.12" | ||
9613 | |||
9614 | CVE_STATUS[CVE-2024-50069] = "fixed-version: Fixed from version 6.12" | ||
9615 | |||
9616 | CVE_STATUS[CVE-2024-50070] = "fixed-version: Fixed from version 6.12" | ||
9617 | |||
9618 | CVE_STATUS[CVE-2024-50071] = "fixed-version: Fixed from version 6.12" | ||
9619 | |||
9620 | CVE_STATUS[CVE-2024-50072] = "fixed-version: Fixed from version 6.12" | ||
9621 | |||
9622 | CVE_STATUS[CVE-2024-50073] = "fixed-version: Fixed from version 6.12" | ||
9623 | |||
9624 | CVE_STATUS[CVE-2024-50074] = "fixed-version: Fixed from version 6.12" | ||
9625 | |||
9626 | CVE_STATUS[CVE-2024-50075] = "fixed-version: Fixed from version 6.12" | ||
9627 | |||
9628 | CVE_STATUS[CVE-2024-50076] = "fixed-version: Fixed from version 6.12" | ||
9629 | |||
9630 | CVE_STATUS[CVE-2024-50077] = "fixed-version: Fixed from version 6.12" | ||
9631 | |||
9632 | CVE_STATUS[CVE-2024-50078] = "fixed-version: Fixed from version 6.12" | ||
9633 | |||
9634 | CVE_STATUS[CVE-2024-50079] = "fixed-version: Fixed from version 6.12" | ||
9635 | |||
9636 | CVE_STATUS[CVE-2024-50080] = "fixed-version: Fixed from version 6.12" | ||
9637 | |||
9638 | CVE_STATUS[CVE-2024-50081] = "fixed-version: Fixed from version 6.12" | ||
9639 | |||
9640 | CVE_STATUS[CVE-2024-50082] = "fixed-version: Fixed from version 6.12" | ||
9641 | |||
9642 | CVE_STATUS[CVE-2024-50083] = "fixed-version: Fixed from version 6.12" | ||
9643 | |||
9644 | CVE_STATUS[CVE-2024-50084] = "fixed-version: Fixed from version 6.12" | ||
9645 | |||
9646 | CVE_STATUS[CVE-2024-50085] = "fixed-version: Fixed from version 6.12" | ||
9647 | |||
9648 | CVE_STATUS[CVE-2024-50086] = "fixed-version: Fixed from version 6.12" | ||
9649 | |||
9650 | CVE_STATUS[CVE-2024-50087] = "fixed-version: Fixed from version 6.12" | ||
9651 | |||
9652 | CVE_STATUS[CVE-2024-50088] = "fixed-version: Fixed from version 6.12" | ||
9653 | |||
9654 | CVE_STATUS[CVE-2024-50090] = "fixed-version: Fixed from version 6.12" | ||
9655 | |||
9656 | CVE_STATUS[CVE-2024-50091] = "fixed-version: Fixed from version 6.12" | ||
9657 | |||
9658 | CVE_STATUS[CVE-2024-50092] = "fixed-version: Fixed from version 6.12" | ||
9659 | |||
9660 | CVE_STATUS[CVE-2024-50093] = "fixed-version: Fixed from version 6.12" | ||
9661 | |||
9662 | CVE_STATUS[CVE-2024-50094] = "fixed-version: Fixed from version 6.12" | ||
9663 | |||
9664 | CVE_STATUS[CVE-2024-50095] = "fixed-version: Fixed from version 6.12" | ||
9665 | |||
9666 | CVE_STATUS[CVE-2024-50096] = "fixed-version: Fixed from version 6.12" | ||
9667 | |||
9668 | CVE_STATUS[CVE-2024-50097] = "fixed-version: Fixed from version 6.11.4" | ||
9669 | |||
9670 | CVE_STATUS[CVE-2024-50098] = "fixed-version: Fixed from version 6.12" | ||
9671 | |||
9672 | CVE_STATUS[CVE-2024-50099] = "fixed-version: Fixed from version 6.12" | ||
9673 | |||
9674 | CVE_STATUS[CVE-2024-50100] = "fixed-version: Fixed from version 6.12" | ||
9675 | |||
9676 | CVE_STATUS[CVE-2024-50101] = "fixed-version: Fixed from version 6.12" | ||
9677 | |||
9678 | CVE_STATUS[CVE-2024-50102] = "fixed-version: Fixed from version 6.12" | ||
9679 | |||
9680 | CVE_STATUS[CVE-2024-50103] = "fixed-version: Fixed from version 6.12" | ||
9681 | |||
9682 | CVE_STATUS[CVE-2024-50104] = "fixed-version: Fixed from version 6.12" | ||
9683 | |||
9684 | CVE_STATUS[CVE-2024-50105] = "fixed-version: Fixed from version 6.12" | ||
9685 | |||
9686 | CVE_STATUS[CVE-2024-50106] = "fixed-version: Fixed from version 6.12" | ||
9687 | |||
9688 | CVE_STATUS[CVE-2024-50107] = "fixed-version: Fixed from version 6.12" | ||
9689 | |||
9690 | CVE_STATUS[CVE-2024-50108] = "fixed-version: Fixed from version 6.12" | ||
9691 | |||
9692 | CVE_STATUS[CVE-2024-50109] = "fixed-version: Fixed from version 6.12" | ||
9693 | |||
9694 | CVE_STATUS[CVE-2024-50110] = "fixed-version: Fixed from version 6.12" | ||
9695 | |||
9696 | CVE_STATUS[CVE-2024-50111] = "fixed-version: Fixed from version 6.12" | ||
9697 | |||
9698 | CVE_STATUS[CVE-2024-50112] = "fixed-version: Fixed from version 6.12" | ||
9699 | |||
9700 | CVE_STATUS[CVE-2024-50113] = "fixed-version: Fixed from version 6.12" | ||
9701 | |||
9702 | CVE_STATUS[CVE-2024-50114] = "fixed-version: Fixed from version 6.12" | ||
9703 | |||
9704 | CVE_STATUS[CVE-2024-50115] = "fixed-version: Fixed from version 6.12" | ||
9705 | |||
9706 | CVE_STATUS[CVE-2024-50116] = "fixed-version: Fixed from version 6.12" | ||
9707 | |||
9708 | CVE_STATUS[CVE-2024-50117] = "fixed-version: Fixed from version 6.12" | ||
9709 | |||
9710 | CVE_STATUS[CVE-2024-50118] = "fixed-version: Fixed from version 6.12" | ||
9711 | |||
9712 | CVE_STATUS[CVE-2024-50119] = "fixed-version: Fixed from version 6.12" | ||
9713 | |||
9714 | CVE_STATUS[CVE-2024-50120] = "fixed-version: Fixed from version 6.12" | ||
9715 | |||
9716 | CVE_STATUS[CVE-2024-50121] = "fixed-version: Fixed from version 6.12" | ||
9717 | |||
9718 | CVE_STATUS[CVE-2024-50122] = "fixed-version: Fixed from version 6.12" | ||
9719 | |||
9720 | CVE_STATUS[CVE-2024-50123] = "fixed-version: Fixed from version 6.12" | ||
9721 | |||
9722 | CVE_STATUS[CVE-2024-50124] = "fixed-version: Fixed from version 6.12" | ||
9723 | |||
9724 | CVE_STATUS[CVE-2024-50125] = "fixed-version: Fixed from version 6.12" | ||
9725 | |||
9726 | CVE_STATUS[CVE-2024-50126] = "fixed-version: Fixed from version 6.12" | ||
9727 | |||
9728 | CVE_STATUS[CVE-2024-50127] = "fixed-version: Fixed from version 6.12" | ||
9729 | |||
9730 | CVE_STATUS[CVE-2024-50128] = "fixed-version: Fixed from version 6.12" | ||
9731 | |||
9732 | CVE_STATUS[CVE-2024-50129] = "fixed-version: Fixed from version 6.12" | ||
9733 | |||
9734 | CVE_STATUS[CVE-2024-50130] = "fixed-version: Fixed from version 6.12" | ||
9735 | |||
9736 | CVE_STATUS[CVE-2024-50131] = "fixed-version: Fixed from version 6.12" | ||
9737 | |||
9738 | CVE_STATUS[CVE-2024-50132] = "fixed-version: Fixed from version 6.12" | ||
9739 | |||
9740 | CVE_STATUS[CVE-2024-50133] = "fixed-version: Fixed from version 6.12" | ||
9741 | |||
9742 | CVE_STATUS[CVE-2024-50134] = "fixed-version: Fixed from version 6.12" | ||
9743 | |||
9744 | CVE_STATUS[CVE-2024-50135] = "fixed-version: Fixed from version 6.12" | ||
9745 | |||
9746 | CVE_STATUS[CVE-2024-50136] = "fixed-version: Fixed from version 6.12" | ||
9747 | |||
9748 | CVE_STATUS[CVE-2024-50137] = "fixed-version: Fixed from version 6.12" | ||
9749 | |||
9750 | CVE_STATUS[CVE-2024-50138] = "fixed-version: Fixed from version 6.12" | ||
9751 | |||
9752 | CVE_STATUS[CVE-2024-50139] = "fixed-version: Fixed from version 6.12" | ||
9753 | |||
9754 | CVE_STATUS[CVE-2024-50140] = "fixed-version: Fixed from version 6.12" | ||
9755 | |||
9756 | CVE_STATUS[CVE-2024-50141] = "fixed-version: Fixed from version 6.12" | ||
9757 | |||
9758 | CVE_STATUS[CVE-2024-50142] = "fixed-version: Fixed from version 6.12" | ||
9759 | |||
9760 | CVE_STATUS[CVE-2024-50143] = "fixed-version: Fixed from version 6.12" | ||
9761 | |||
9762 | CVE_STATUS[CVE-2024-50144] = "fixed-version: Fixed from version 6.12" | ||
9763 | |||
9764 | CVE_STATUS[CVE-2024-50145] = "fixed-version: Fixed from version 6.12" | ||
9765 | |||
9766 | CVE_STATUS[CVE-2024-50146] = "fixed-version: Fixed from version 6.12" | ||
9767 | |||
9768 | CVE_STATUS[CVE-2024-50147] = "fixed-version: Fixed from version 6.12" | ||
9769 | |||
9770 | CVE_STATUS[CVE-2024-50148] = "fixed-version: Fixed from version 6.12" | ||
9771 | |||
9772 | CVE_STATUS[CVE-2024-50149] = "fixed-version: Fixed from version 6.12" | ||
9773 | |||
9774 | CVE_STATUS[CVE-2024-50150] = "fixed-version: Fixed from version 6.12" | ||
9775 | |||
9776 | CVE_STATUS[CVE-2024-50151] = "fixed-version: Fixed from version 6.12" | ||
9777 | |||
9778 | CVE_STATUS[CVE-2024-50152] = "fixed-version: Fixed from version 6.12" | ||
9779 | |||
9780 | CVE_STATUS[CVE-2024-50153] = "fixed-version: Fixed from version 6.12" | ||
9781 | |||
9782 | CVE_STATUS[CVE-2024-50154] = "fixed-version: Fixed from version 6.12" | ||
9783 | |||
9784 | CVE_STATUS[CVE-2024-50155] = "fixed-version: Fixed from version 6.12" | ||
9785 | |||
9786 | CVE_STATUS[CVE-2024-50156] = "fixed-version: Fixed from version 6.12" | ||
9787 | |||
9788 | CVE_STATUS[CVE-2024-50157] = "fixed-version: Fixed from version 6.12" | ||
9789 | |||
9790 | CVE_STATUS[CVE-2024-50158] = "fixed-version: Fixed from version 6.12" | ||
9791 | |||
9792 | CVE_STATUS[CVE-2024-50159] = "fixed-version: Fixed from version 6.12" | ||
9793 | |||
9794 | CVE_STATUS[CVE-2024-50160] = "fixed-version: Fixed from version 6.12" | ||
9795 | |||
9796 | CVE_STATUS[CVE-2024-50161] = "fixed-version: Fixed from version 6.12" | ||
9797 | |||
9798 | CVE_STATUS[CVE-2024-50162] = "fixed-version: Fixed from version 6.12" | ||
9799 | |||
9800 | CVE_STATUS[CVE-2024-50163] = "fixed-version: Fixed from version 6.12" | ||
9801 | |||
9802 | CVE_STATUS[CVE-2024-50164] = "fixed-version: Fixed from version 6.12" | ||
9803 | |||
9804 | CVE_STATUS[CVE-2024-50165] = "fixed-version: Fixed from version 6.12" | ||
9805 | |||
9806 | CVE_STATUS[CVE-2024-50166] = "fixed-version: Fixed from version 6.12" | ||
9807 | |||
9808 | CVE_STATUS[CVE-2024-50167] = "fixed-version: Fixed from version 6.12" | ||
9809 | |||
9810 | CVE_STATUS[CVE-2024-50168] = "fixed-version: Fixed from version 6.12" | ||
9811 | |||
9812 | CVE_STATUS[CVE-2024-50169] = "fixed-version: Fixed from version 6.12" | ||
9813 | |||
9814 | CVE_STATUS[CVE-2024-50170] = "fixed-version: Fixed from version 6.12" | ||
9815 | |||
9816 | CVE_STATUS[CVE-2024-50171] = "fixed-version: Fixed from version 6.12" | ||
9817 | |||
9818 | CVE_STATUS[CVE-2024-50172] = "fixed-version: Fixed from version 6.12" | ||
9819 | |||
9820 | CVE_STATUS[CVE-2024-50173] = "fixed-version: Fixed from version 6.12" | ||
9821 | |||
9822 | CVE_STATUS[CVE-2024-50174] = "fixed-version: Fixed from version 6.12" | ||
9823 | |||
9824 | CVE_STATUS[CVE-2024-50175] = "fixed-version: Fixed from version 6.12" | ||
9825 | |||
9826 | CVE_STATUS[CVE-2024-50176] = "fixed-version: Fixed from version 6.12" | ||
9827 | |||
9828 | CVE_STATUS[CVE-2024-50177] = "fixed-version: Fixed from version 6.12" | ||
9829 | |||
9830 | CVE_STATUS[CVE-2024-50178] = "fixed-version: Fixed from version 6.12" | ||
9831 | |||
9832 | CVE_STATUS[CVE-2024-50179] = "fixed-version: Fixed from version 6.12" | ||
9833 | |||
9834 | CVE_STATUS[CVE-2024-50180] = "fixed-version: Fixed from version 6.12" | ||
9835 | |||
9836 | CVE_STATUS[CVE-2024-50182] = "fixed-version: Fixed from version 6.12" | ||
9837 | |||
9838 | CVE_STATUS[CVE-2024-50183] = "fixed-version: Fixed from version 6.12" | ||
9839 | |||
9840 | CVE_STATUS[CVE-2024-50184] = "fixed-version: Fixed from version 6.12" | ||
9841 | |||
9842 | CVE_STATUS[CVE-2024-50185] = "fixed-version: Fixed from version 6.12" | ||
9843 | |||
9844 | CVE_STATUS[CVE-2024-50186] = "fixed-version: Fixed from version 6.12" | ||
9845 | |||
9846 | CVE_STATUS[CVE-2024-50187] = "fixed-version: Fixed from version 6.12" | ||
9847 | |||
9848 | CVE_STATUS[CVE-2024-50188] = "fixed-version: Fixed from version 6.12" | ||
9849 | |||
9850 | CVE_STATUS[CVE-2024-50189] = "fixed-version: Fixed from version 6.12" | ||
9851 | |||
9852 | CVE_STATUS[CVE-2024-50190] = "fixed-version: Fixed from version 6.12" | ||
9853 | |||
9854 | CVE_STATUS[CVE-2024-50191] = "fixed-version: Fixed from version 6.12" | ||
9855 | |||
9856 | CVE_STATUS[CVE-2024-50192] = "fixed-version: Fixed from version 6.12" | ||
9857 | |||
9858 | CVE_STATUS[CVE-2024-50193] = "fixed-version: Fixed from version 6.12" | ||
9859 | |||
9860 | CVE_STATUS[CVE-2024-50194] = "fixed-version: Fixed from version 6.12" | ||
9861 | |||
9862 | CVE_STATUS[CVE-2024-50195] = "fixed-version: Fixed from version 6.12" | ||
9863 | |||
9864 | CVE_STATUS[CVE-2024-50196] = "fixed-version: Fixed from version 6.12" | ||
9865 | |||
9866 | CVE_STATUS[CVE-2024-50197] = "fixed-version: Fixed from version 6.12" | ||
9867 | |||
9868 | CVE_STATUS[CVE-2024-50198] = "fixed-version: Fixed from version 6.12" | ||
9869 | |||
9870 | CVE_STATUS[CVE-2024-50199] = "fixed-version: Fixed from version 6.12" | ||
9871 | |||
9872 | CVE_STATUS[CVE-2024-50200] = "fixed-version: Fixed from version 6.12" | ||
9873 | |||
9874 | CVE_STATUS[CVE-2024-50201] = "fixed-version: Fixed from version 6.12" | ||
9875 | |||
9876 | CVE_STATUS[CVE-2024-50202] = "fixed-version: Fixed from version 6.12" | ||
9877 | |||
9878 | CVE_STATUS[CVE-2024-50203] = "fixed-version: Fixed from version 6.12" | ||
9879 | |||
9880 | CVE_STATUS[CVE-2024-50204] = "fixed-version: Fixed from version 6.12" | ||
9881 | |||
9882 | CVE_STATUS[CVE-2024-50205] = "fixed-version: Fixed from version 6.12" | ||
9883 | |||
9884 | CVE_STATUS[CVE-2024-50206] = "fixed-version: Fixed from version 6.12" | ||
9885 | |||
9886 | CVE_STATUS[CVE-2024-50207] = "fixed-version: Fixed from version 6.12" | ||
9887 | |||
9888 | CVE_STATUS[CVE-2024-50208] = "fixed-version: Fixed from version 6.12" | ||
9889 | |||
9890 | CVE_STATUS[CVE-2024-50209] = "fixed-version: Fixed from version 6.12" | ||
9891 | |||
9892 | CVE_STATUS[CVE-2024-50210] = "fixed-version: Fixed from version 6.11.6" | ||
9893 | |||
9894 | CVE_STATUS[CVE-2024-50211] = "fixed-version: Fixed from version 6.12" | ||
9895 | |||
9896 | CVE_STATUS[CVE-2024-50212] = "fixed-version: Fixed from version 6.12" | ||
9897 | |||
9898 | CVE_STATUS[CVE-2024-50213] = "fixed-version: Fixed from version 6.12" | ||
9899 | |||
9900 | CVE_STATUS[CVE-2024-50214] = "fixed-version: Fixed from version 6.12" | ||
9901 | |||
9902 | CVE_STATUS[CVE-2024-50215] = "fixed-version: Fixed from version 6.12" | ||
9903 | |||
9904 | CVE_STATUS[CVE-2024-50216] = "fixed-version: Fixed from version 6.12" | ||
9905 | |||
9906 | CVE_STATUS[CVE-2024-50217] = "fixed-version: Fixed from version 6.12" | ||
9907 | |||
9908 | CVE_STATUS[CVE-2024-50218] = "fixed-version: Fixed from version 6.12" | ||
9909 | |||
9910 | CVE_STATUS[CVE-2024-50220] = "fixed-version: Fixed from version 6.12" | ||
9911 | |||
9912 | CVE_STATUS[CVE-2024-50221] = "fixed-version: Fixed from version 6.12" | ||
9913 | |||
9914 | CVE_STATUS[CVE-2024-50222] = "fixed-version: Fixed from version 6.12" | ||
9915 | |||
9916 | CVE_STATUS[CVE-2024-50223] = "fixed-version: Fixed from version 6.12" | ||
9917 | |||
9918 | CVE_STATUS[CVE-2024-50224] = "fixed-version: Fixed from version 6.12" | ||
9919 | |||
9920 | CVE_STATUS[CVE-2024-50225] = "fixed-version: Fixed from version 6.12" | ||
9921 | |||
9922 | CVE_STATUS[CVE-2024-50226] = "fixed-version: Fixed from version 6.12" | ||
9923 | |||
9924 | CVE_STATUS[CVE-2024-50227] = "fixed-version: Fixed from version 6.12" | ||
9925 | |||
9926 | CVE_STATUS[CVE-2024-50229] = "fixed-version: Fixed from version 6.12" | ||
9927 | |||
9928 | CVE_STATUS[CVE-2024-50230] = "fixed-version: Fixed from version 6.12" | ||
9929 | |||
9930 | CVE_STATUS[CVE-2024-50231] = "fixed-version: Fixed from version 6.12" | ||
9931 | |||
9932 | CVE_STATUS[CVE-2024-50232] = "fixed-version: Fixed from version 6.12" | ||
9933 | |||
9934 | CVE_STATUS[CVE-2024-50233] = "fixed-version: Fixed from version 6.12" | ||
9935 | |||
9936 | CVE_STATUS[CVE-2024-50234] = "fixed-version: Fixed from version 6.12" | ||
9937 | |||
9938 | CVE_STATUS[CVE-2024-50235] = "fixed-version: Fixed from version 6.12" | ||
9939 | |||
9940 | CVE_STATUS[CVE-2024-50236] = "fixed-version: Fixed from version 6.12" | ||
9941 | |||
9942 | CVE_STATUS[CVE-2024-50237] = "fixed-version: Fixed from version 6.12" | ||
9943 | |||
9944 | CVE_STATUS[CVE-2024-50238] = "fixed-version: Fixed from version 6.12" | ||
9945 | |||
9946 | CVE_STATUS[CVE-2024-50239] = "fixed-version: Fixed from version 6.12" | ||
9947 | |||
9948 | CVE_STATUS[CVE-2024-50240] = "fixed-version: Fixed from version 6.12" | ||
9949 | |||
9950 | CVE_STATUS[CVE-2024-50241] = "fixed-version: Fixed from version 6.11.7" | ||
9951 | |||
9952 | CVE_STATUS[CVE-2024-50242] = "fixed-version: Fixed from version 6.12" | ||
9953 | |||
9954 | CVE_STATUS[CVE-2024-50243] = "fixed-version: Fixed from version 6.12" | ||
9955 | |||
9956 | CVE_STATUS[CVE-2024-50244] = "fixed-version: Fixed from version 6.12" | ||
9957 | |||
9958 | CVE_STATUS[CVE-2024-50245] = "fixed-version: Fixed from version 6.12" | ||
9959 | |||
9960 | CVE_STATUS[CVE-2024-50246] = "fixed-version: Fixed from version 6.12" | ||
9961 | |||
9962 | CVE_STATUS[CVE-2024-50247] = "fixed-version: Fixed from version 6.12" | ||
9963 | |||
9964 | CVE_STATUS[CVE-2024-50248] = "fixed-version: Fixed from version 6.12" | ||
9965 | |||
9966 | CVE_STATUS[CVE-2024-50249] = "fixed-version: Fixed from version 6.11.7" | ||
9967 | |||
9968 | CVE_STATUS[CVE-2024-50250] = "fixed-version: Fixed from version 6.12" | ||
9969 | |||
9970 | CVE_STATUS[CVE-2024-50251] = "fixed-version: Fixed from version 6.12" | ||
9971 | |||
9972 | CVE_STATUS[CVE-2024-50252] = "fixed-version: Fixed from version 6.12" | ||
9973 | |||
9974 | CVE_STATUS[CVE-2024-50253] = "fixed-version: Fixed from version 6.12" | ||
9975 | |||
9976 | CVE_STATUS[CVE-2024-50254] = "fixed-version: Fixed from version 6.12" | ||
9977 | |||
9978 | CVE_STATUS[CVE-2024-50255] = "fixed-version: Fixed from version 6.12" | ||
9979 | |||
9980 | CVE_STATUS[CVE-2024-50256] = "fixed-version: Fixed from version 6.12" | ||
9981 | |||
9982 | CVE_STATUS[CVE-2024-50257] = "fixed-version: Fixed from version 6.12" | ||
9983 | |||
9984 | CVE_STATUS[CVE-2024-50258] = "fixed-version: Fixed from version 6.12" | ||
9985 | |||
9986 | CVE_STATUS[CVE-2024-50259] = "fixed-version: Fixed from version 6.12" | ||
9987 | |||
9988 | CVE_STATUS[CVE-2024-50260] = "fixed-version: Fixed from version 6.12" | ||
9989 | |||
9990 | CVE_STATUS[CVE-2024-50261] = "fixed-version: Fixed from version 6.12" | ||
9991 | |||
9992 | CVE_STATUS[CVE-2024-50262] = "fixed-version: Fixed from version 6.12" | ||
9993 | |||
9994 | CVE_STATUS[CVE-2024-50263] = "fixed-version: Fixed from version 6.12" | ||
9995 | |||
9996 | CVE_STATUS[CVE-2024-50264] = "fixed-version: Fixed from version 6.12" | ||
9997 | |||
9998 | CVE_STATUS[CVE-2024-50265] = "fixed-version: Fixed from version 6.12" | ||
9999 | |||
10000 | CVE_STATUS[CVE-2024-50266] = "fixed-version: Fixed from version 6.12" | ||
10001 | |||
10002 | CVE_STATUS[CVE-2024-50267] = "fixed-version: Fixed from version 6.12" | ||
10003 | |||
10004 | CVE_STATUS[CVE-2024-50268] = "fixed-version: Fixed from version 6.12" | ||
10005 | |||
10006 | CVE_STATUS[CVE-2024-50269] = "fixed-version: Fixed from version 6.12" | ||
10007 | |||
10008 | CVE_STATUS[CVE-2024-50270] = "fixed-version: Fixed from version 6.12" | ||
10009 | |||
10010 | CVE_STATUS[CVE-2024-50271] = "fixed-version: Fixed from version 6.12" | ||
10011 | |||
10012 | CVE_STATUS[CVE-2024-50272] = "fixed-version: Fixed from version 6.12" | ||
10013 | |||
10014 | CVE_STATUS[CVE-2024-50273] = "fixed-version: Fixed from version 6.12" | ||
10015 | |||
10016 | CVE_STATUS[CVE-2024-50274] = "fixed-version: Fixed from version 6.12" | ||
10017 | |||
10018 | CVE_STATUS[CVE-2024-50275] = "fixed-version: Fixed from version 6.12" | ||
10019 | |||
10020 | CVE_STATUS[CVE-2024-50276] = "fixed-version: Fixed from version 6.12" | ||
10021 | |||
10022 | CVE_STATUS[CVE-2024-50277] = "fixed-version: Fixed from version 6.12" | ||
10023 | |||
10024 | CVE_STATUS[CVE-2024-50278] = "fixed-version: Fixed from version 6.12" | ||
10025 | |||
10026 | CVE_STATUS[CVE-2024-50279] = "fixed-version: Fixed from version 6.12" | ||
10027 | |||
10028 | CVE_STATUS[CVE-2024-50280] = "fixed-version: Fixed from version 6.12" | ||
10029 | |||
10030 | CVE_STATUS[CVE-2024-50281] = "fixed-version: Fixed from version 6.12" | ||
10031 | |||
10032 | CVE_STATUS[CVE-2024-50282] = "fixed-version: Fixed from version 6.12" | ||
10033 | |||
10034 | CVE_STATUS[CVE-2024-50283] = "fixed-version: Fixed from version 6.12" | ||
10035 | |||
10036 | CVE_STATUS[CVE-2024-50284] = "fixed-version: Fixed from version 6.12" | ||
10037 | |||
10038 | CVE_STATUS[CVE-2024-50285] = "fixed-version: Fixed from version 6.12" | ||
10039 | |||
10040 | CVE_STATUS[CVE-2024-50286] = "fixed-version: Fixed from version 6.12" | ||
10041 | |||
10042 | CVE_STATUS[CVE-2024-50287] = "fixed-version: Fixed from version 6.12" | ||
10043 | |||
10044 | CVE_STATUS[CVE-2024-50288] = "fixed-version: Fixed from version 6.12" | ||
10045 | |||
10046 | CVE_STATUS[CVE-2024-50289] = "fixed-version: Fixed from version 6.12" | ||
10047 | |||
10048 | CVE_STATUS[CVE-2024-50290] = "fixed-version: Fixed from version 6.12" | ||
10049 | |||
10050 | CVE_STATUS[CVE-2024-50291] = "fixed-version: Fixed from version 6.12" | ||
10051 | |||
10052 | CVE_STATUS[CVE-2024-50292] = "fixed-version: Fixed from version 6.12" | ||
10053 | |||
10054 | CVE_STATUS[CVE-2024-50293] = "fixed-version: Fixed from version 6.12" | ||
10055 | |||
10056 | CVE_STATUS[CVE-2024-50294] = "fixed-version: Fixed from version 6.12" | ||
10057 | |||
10058 | CVE_STATUS[CVE-2024-50295] = "fixed-version: Fixed from version 6.12" | ||
10059 | |||
10060 | CVE_STATUS[CVE-2024-50296] = "fixed-version: Fixed from version 6.12" | ||
10061 | |||
10062 | CVE_STATUS[CVE-2024-50297] = "fixed-version: Fixed from version 6.12" | ||
10063 | |||
10064 | CVE_STATUS[CVE-2024-50298] = "fixed-version: Fixed from version 6.12" | ||
10065 | |||
10066 | CVE_STATUS[CVE-2024-50299] = "fixed-version: Fixed from version 6.12" | ||
10067 | |||
10068 | CVE_STATUS[CVE-2024-50300] = "fixed-version: Fixed from version 6.12" | ||
10069 | |||
10070 | CVE_STATUS[CVE-2024-50301] = "fixed-version: Fixed from version 6.12" | ||
10071 | |||
10072 | CVE_STATUS[CVE-2024-50302] = "fixed-version: Fixed from version 6.12" | ||
10073 | |||
10074 | CVE_STATUS[CVE-2024-50303] = "fixed-version: Fixed from version 6.12" | ||
10075 | |||
10076 | CVE_STATUS[CVE-2024-50304] = "fixed-version: Fixed from version 6.12" | ||
10077 | |||
10078 | CVE_STATUS[CVE-2024-51729] = "cpe-stable-backport: Backported in 6.12.7" | ||
10079 | |||
10080 | CVE_STATUS[CVE-2024-52319] = "cpe-stable-backport: Backported in 6.12.7" | ||
10081 | |||
10082 | CVE_STATUS[CVE-2024-52332] = "cpe-stable-backport: Backported in 6.12.5" | ||
10083 | |||
10084 | CVE_STATUS[CVE-2024-52557] = "fixed-version: only affects 6.13 onwards" | ||
10085 | |||
10086 | CVE_STATUS[CVE-2024-52559] = "cpe-stable-backport: Backported in 6.12.16" | ||
10087 | |||
10088 | # CVE-2024-52560 needs backporting (fixed from 6.14) | ||
10089 | |||
10090 | CVE_STATUS[CVE-2024-53042] = "fixed-version: Fixed from version 6.12" | ||
10091 | |||
10092 | CVE_STATUS[CVE-2024-53043] = "fixed-version: Fixed from version 6.12" | ||
10093 | |||
10094 | CVE_STATUS[CVE-2024-53044] = "fixed-version: Fixed from version 6.12" | ||
10095 | |||
10096 | CVE_STATUS[CVE-2024-53045] = "fixed-version: Fixed from version 6.12" | ||
10097 | |||
10098 | CVE_STATUS[CVE-2024-53046] = "fixed-version: Fixed from version 6.12" | ||
10099 | |||
10100 | CVE_STATUS[CVE-2024-53047] = "fixed-version: Fixed from version 6.12" | ||
10101 | |||
10102 | CVE_STATUS[CVE-2024-53048] = "fixed-version: Fixed from version 6.12" | ||
10103 | |||
10104 | CVE_STATUS[CVE-2024-53049] = "fixed-version: Fixed from version 6.12" | ||
10105 | |||
10106 | CVE_STATUS[CVE-2024-53050] = "fixed-version: Fixed from version 6.12" | ||
10107 | |||
10108 | CVE_STATUS[CVE-2024-53051] = "fixed-version: Fixed from version 6.12" | ||
10109 | |||
10110 | CVE_STATUS[CVE-2024-53052] = "fixed-version: Fixed from version 6.12" | ||
10111 | |||
10112 | CVE_STATUS[CVE-2024-53053] = "fixed-version: Fixed from version 6.12" | ||
10113 | |||
10114 | CVE_STATUS[CVE-2024-53055] = "fixed-version: Fixed from version 6.12" | ||
10115 | |||
10116 | CVE_STATUS[CVE-2024-53056] = "fixed-version: Fixed from version 6.12" | ||
10117 | |||
10118 | CVE_STATUS[CVE-2024-53057] = "fixed-version: Fixed from version 6.12" | ||
10119 | |||
10120 | CVE_STATUS[CVE-2024-53058] = "fixed-version: Fixed from version 6.12" | ||
10121 | |||
10122 | CVE_STATUS[CVE-2024-53059] = "fixed-version: Fixed from version 6.12" | ||
10123 | |||
10124 | CVE_STATUS[CVE-2024-53060] = "fixed-version: Fixed from version 6.11.8" | ||
10125 | |||
10126 | CVE_STATUS[CVE-2024-53061] = "fixed-version: Fixed from version 6.12" | ||
10127 | |||
10128 | CVE_STATUS[CVE-2024-53062] = "fixed-version: Fixed from version 6.12" | ||
10129 | |||
10130 | CVE_STATUS[CVE-2024-53063] = "fixed-version: Fixed from version 6.12" | ||
10131 | |||
10132 | CVE_STATUS[CVE-2024-53064] = "fixed-version: Fixed from version 6.12" | ||
10133 | |||
10134 | CVE_STATUS[CVE-2024-53065] = "fixed-version: Fixed from version 6.12" | ||
10135 | |||
10136 | CVE_STATUS[CVE-2024-53066] = "fixed-version: Fixed from version 6.12" | ||
10137 | |||
10138 | CVE_STATUS[CVE-2024-53067] = "fixed-version: Fixed from version 6.12" | ||
10139 | |||
10140 | CVE_STATUS[CVE-2024-53068] = "fixed-version: Fixed from version 6.12" | ||
10141 | |||
10142 | CVE_STATUS[CVE-2024-53069] = "fixed-version: Fixed from version 6.12" | ||
10143 | |||
10144 | CVE_STATUS[CVE-2024-53070] = "fixed-version: Fixed from version 6.11.8" | ||
10145 | |||
10146 | CVE_STATUS[CVE-2024-53071] = "fixed-version: Fixed from version 6.12" | ||
10147 | |||
10148 | CVE_STATUS[CVE-2024-53072] = "fixed-version: Fixed from version 6.12" | ||
10149 | |||
10150 | CVE_STATUS[CVE-2024-53073] = "fixed-version: Fixed from version 6.11.7" | ||
10151 | |||
10152 | CVE_STATUS[CVE-2024-53074] = "fixed-version: Fixed from version 6.12" | ||
10153 | |||
10154 | CVE_STATUS[CVE-2024-53075] = "fixed-version: Fixed from version 6.12" | ||
10155 | |||
10156 | CVE_STATUS[CVE-2024-53076] = "fixed-version: Fixed from version 6.12" | ||
10157 | |||
10158 | CVE_STATUS[CVE-2024-53077] = "fixed-version: Fixed from version 6.12" | ||
10159 | |||
10160 | CVE_STATUS[CVE-2024-53078] = "fixed-version: Fixed from version 6.12" | ||
10161 | |||
10162 | CVE_STATUS[CVE-2024-53079] = "fixed-version: Fixed from version 6.12" | ||
10163 | |||
10164 | CVE_STATUS[CVE-2024-53080] = "fixed-version: Fixed from version 6.12" | ||
10165 | |||
10166 | CVE_STATUS[CVE-2024-53081] = "fixed-version: Fixed from version 6.12" | ||
10167 | |||
10168 | CVE_STATUS[CVE-2024-53082] = "fixed-version: Fixed from version 6.12" | ||
10169 | |||
10170 | CVE_STATUS[CVE-2024-53083] = "fixed-version: Fixed from version 6.12" | ||
10171 | |||
10172 | CVE_STATUS[CVE-2024-53084] = "fixed-version: Fixed from version 6.12" | ||
10173 | |||
10174 | CVE_STATUS[CVE-2024-53085] = "fixed-version: Fixed from version 6.12" | ||
10175 | |||
10176 | CVE_STATUS[CVE-2024-53086] = "fixed-version: Fixed from version 6.12" | ||
10177 | |||
10178 | CVE_STATUS[CVE-2024-53087] = "fixed-version: Fixed from version 6.12" | ||
10179 | |||
10180 | CVE_STATUS[CVE-2024-53088] = "fixed-version: Fixed from version 6.12" | ||
10181 | |||
10182 | CVE_STATUS[CVE-2024-53089] = "fixed-version: Fixed from version 6.12" | ||
10183 | |||
10184 | CVE_STATUS[CVE-2024-53090] = "fixed-version: Fixed from version 6.12" | ||
10185 | |||
10186 | CVE_STATUS[CVE-2024-53091] = "fixed-version: Fixed from version 6.12" | ||
10187 | |||
10188 | CVE_STATUS[CVE-2024-53092] = "fixed-version: Fixed from version 6.12" | ||
10189 | |||
10190 | CVE_STATUS[CVE-2024-53093] = "fixed-version: Fixed from version 6.12" | ||
10191 | |||
10192 | CVE_STATUS[CVE-2024-53094] = "fixed-version: Fixed from version 6.12" | ||
10193 | |||
10194 | CVE_STATUS[CVE-2024-53095] = "fixed-version: Fixed from version 6.12" | ||
10195 | |||
10196 | CVE_STATUS[CVE-2024-53096] = "fixed-version: Fixed from version 6.12" | ||
10197 | |||
10198 | CVE_STATUS[CVE-2024-53097] = "fixed-version: Fixed from version 6.11.9" | ||
10199 | |||
10200 | CVE_STATUS[CVE-2024-53098] = "fixed-version: Fixed from version 6.12" | ||
10201 | |||
10202 | CVE_STATUS[CVE-2024-53099] = "fixed-version: Fixed from version 6.12" | ||
10203 | |||
10204 | CVE_STATUS[CVE-2024-53100] = "fixed-version: Fixed from version 6.12" | ||
10205 | |||
10206 | CVE_STATUS[CVE-2024-53101] = "fixed-version: Fixed from version 6.12" | ||
10207 | |||
10208 | CVE_STATUS[CVE-2024-53103] = "cpe-stable-backport: Backported in 6.12.1" | ||
10209 | |||
10210 | CVE_STATUS[CVE-2024-53104] = "cpe-stable-backport: Backported in 6.12.1" | ||
10211 | |||
10212 | CVE_STATUS[CVE-2024-53105] = "fixed-version: Fixed from version 6.12" | ||
10213 | |||
10214 | CVE_STATUS[CVE-2024-53106] = "fixed-version: Fixed from version 6.12" | ||
10215 | |||
10216 | CVE_STATUS[CVE-2024-53107] = "fixed-version: Fixed from version 6.12" | ||
10217 | |||
10218 | CVE_STATUS[CVE-2024-53108] = "fixed-version: Fixed from version 6.12" | ||
10219 | |||
10220 | CVE_STATUS[CVE-2024-53109] = "fixed-version: Fixed from version 6.12" | ||
10221 | |||
10222 | CVE_STATUS[CVE-2024-53110] = "fixed-version: Fixed from version 6.12" | ||
10223 | |||
10224 | CVE_STATUS[CVE-2024-53111] = "fixed-version: Fixed from version 6.12" | ||
10225 | |||
10226 | CVE_STATUS[CVE-2024-53112] = "fixed-version: Fixed from version 6.12" | ||
10227 | |||
10228 | CVE_STATUS[CVE-2024-53113] = "fixed-version: Fixed from version 6.12" | ||
10229 | |||
10230 | CVE_STATUS[CVE-2024-53114] = "fixed-version: Fixed from version 6.12" | ||
10231 | |||
10232 | CVE_STATUS[CVE-2024-53115] = "fixed-version: Fixed from version 6.12" | ||
10233 | |||
10234 | CVE_STATUS[CVE-2024-53116] = "fixed-version: Fixed from version 6.12" | ||
10235 | |||
10236 | CVE_STATUS[CVE-2024-53117] = "fixed-version: Fixed from version 6.12" | ||
10237 | |||
10238 | CVE_STATUS[CVE-2024-53118] = "fixed-version: Fixed from version 6.12" | ||
10239 | |||
10240 | CVE_STATUS[CVE-2024-53119] = "fixed-version: Fixed from version 6.12" | ||
10241 | |||
10242 | CVE_STATUS[CVE-2024-53120] = "fixed-version: Fixed from version 6.12" | ||
10243 | |||
10244 | CVE_STATUS[CVE-2024-53121] = "fixed-version: Fixed from version 6.12" | ||
10245 | |||
10246 | CVE_STATUS[CVE-2024-53122] = "fixed-version: Fixed from version 6.12" | ||
10247 | |||
10248 | CVE_STATUS[CVE-2024-53123] = "fixed-version: Fixed from version 6.12" | ||
10249 | |||
10250 | CVE_STATUS[CVE-2024-53124] = "fixed-version: Fixed from version 6.12" | ||
10251 | |||
10252 | CVE_STATUS[CVE-2024-53125] = "fixed-version: Fixed from version 6.12" | ||
10253 | |||
10254 | CVE_STATUS[CVE-2024-53126] = "fixed-version: Fixed from version 6.12" | ||
10255 | |||
10256 | CVE_STATUS[CVE-2024-53127] = "fixed-version: Fixed from version 6.12" | ||
10257 | |||
10258 | CVE_STATUS[CVE-2024-53128] = "fixed-version: Fixed from version 6.12" | ||
10259 | |||
10260 | CVE_STATUS[CVE-2024-53129] = "fixed-version: Fixed from version 6.12" | ||
10261 | |||
10262 | CVE_STATUS[CVE-2024-53130] = "fixed-version: Fixed from version 6.12" | ||
10263 | |||
10264 | CVE_STATUS[CVE-2024-53131] = "fixed-version: Fixed from version 6.12" | ||
10265 | |||
10266 | CVE_STATUS[CVE-2024-53132] = "fixed-version: Fixed from version 6.12" | ||
10267 | |||
10268 | CVE_STATUS[CVE-2024-53133] = "fixed-version: Fixed from version 6.12" | ||
10269 | |||
10270 | CVE_STATUS[CVE-2024-53134] = "fixed-version: Fixed from version 6.12" | ||
10271 | |||
10272 | CVE_STATUS[CVE-2024-53135] = "fixed-version: Fixed from version 6.12" | ||
10273 | |||
10274 | CVE_STATUS[CVE-2024-53136] = "fixed-version: Fixed from version 6.11.10" | ||
10275 | |||
10276 | CVE_STATUS[CVE-2024-53137] = "fixed-version: Fixed from version 6.12" | ||
10277 | |||
10278 | CVE_STATUS[CVE-2024-53138] = "fixed-version: Fixed from version 6.12" | ||
10279 | |||
10280 | CVE_STATUS[CVE-2024-53139] = "fixed-version: Fixed from version 6.12" | ||
10281 | |||
10282 | CVE_STATUS[CVE-2024-53140] = "fixed-version: Fixed from version 6.12" | ||
10283 | |||
10284 | CVE_STATUS[CVE-2024-53141] = "cpe-stable-backport: Backported in 6.12.2" | ||
10285 | |||
10286 | CVE_STATUS[CVE-2024-53142] = "cpe-stable-backport: Backported in 6.12.2" | ||
10287 | |||
10288 | CVE_STATUS[CVE-2024-53143] = "cpe-stable-backport: Backported in 6.12.2" | ||
10289 | |||
10290 | CVE_STATUS[CVE-2024-53144] = "fixed-version: Fixed from version 6.12" | ||
10291 | |||
10292 | CVE_STATUS[CVE-2024-53145] = "cpe-stable-backport: Backported in 6.12.2" | ||
10293 | |||
10294 | CVE_STATUS[CVE-2024-53146] = "cpe-stable-backport: Backported in 6.12.2" | ||
10295 | |||
10296 | CVE_STATUS[CVE-2024-53147] = "cpe-stable-backport: Backported in 6.12.2" | ||
10297 | |||
10298 | CVE_STATUS[CVE-2024-53148] = "cpe-stable-backport: Backported in 6.12.2" | ||
10299 | |||
10300 | CVE_STATUS[CVE-2024-53149] = "cpe-stable-backport: Backported in 6.12.2" | ||
10301 | |||
10302 | CVE_STATUS[CVE-2024-53150] = "cpe-stable-backport: Backported in 6.12.2" | ||
10303 | |||
10304 | CVE_STATUS[CVE-2024-53151] = "cpe-stable-backport: Backported in 6.12.2" | ||
10305 | |||
10306 | CVE_STATUS[CVE-2024-53152] = "cpe-stable-backport: Backported in 6.12.2" | ||
10307 | |||
10308 | CVE_STATUS[CVE-2024-53153] = "cpe-stable-backport: Backported in 6.12.2" | ||
10309 | |||
10310 | CVE_STATUS[CVE-2024-53154] = "cpe-stable-backport: Backported in 6.12.2" | ||
10311 | |||
10312 | CVE_STATUS[CVE-2024-53155] = "cpe-stable-backport: Backported in 6.12.2" | ||
10313 | |||
10314 | CVE_STATUS[CVE-2024-53156] = "cpe-stable-backport: Backported in 6.12.2" | ||
10315 | |||
10316 | CVE_STATUS[CVE-2024-53157] = "cpe-stable-backport: Backported in 6.12.2" | ||
10317 | |||
10318 | CVE_STATUS[CVE-2024-53158] = "cpe-stable-backport: Backported in 6.12.2" | ||
10319 | |||
10320 | CVE_STATUS[CVE-2024-53160] = "cpe-stable-backport: Backported in 6.12.2" | ||
10321 | |||
10322 | CVE_STATUS[CVE-2024-53161] = "cpe-stable-backport: Backported in 6.12.2" | ||
10323 | |||
10324 | CVE_STATUS[CVE-2024-53162] = "cpe-stable-backport: Backported in 6.12.2" | ||
10325 | |||
10326 | CVE_STATUS[CVE-2024-53163] = "cpe-stable-backport: Backported in 6.12.2" | ||
10327 | |||
10328 | CVE_STATUS[CVE-2024-53164] = "cpe-stable-backport: Backported in 6.12.7" | ||
10329 | |||
10330 | CVE_STATUS[CVE-2024-53165] = "cpe-stable-backport: Backported in 6.12.2" | ||
10331 | |||
10332 | CVE_STATUS[CVE-2024-53166] = "cpe-stable-backport: Backported in 6.12.2" | ||
10333 | |||
10334 | CVE_STATUS[CVE-2024-53167] = "cpe-stable-backport: Backported in 6.12.2" | ||
10335 | |||
10336 | CVE_STATUS[CVE-2024-53168] = "cpe-stable-backport: Backported in 6.12.2" | ||
10337 | |||
10338 | CVE_STATUS[CVE-2024-53169] = "cpe-stable-backport: Backported in 6.12.2" | ||
10339 | |||
10340 | CVE_STATUS[CVE-2024-53170] = "cpe-stable-backport: Backported in 6.12.2" | ||
10341 | |||
10342 | CVE_STATUS[CVE-2024-53171] = "cpe-stable-backport: Backported in 6.12.2" | ||
10343 | |||
10344 | CVE_STATUS[CVE-2024-53172] = "cpe-stable-backport: Backported in 6.12.2" | ||
10345 | |||
10346 | CVE_STATUS[CVE-2024-53173] = "cpe-stable-backport: Backported in 6.12.2" | ||
10347 | |||
10348 | CVE_STATUS[CVE-2024-53174] = "cpe-stable-backport: Backported in 6.12.2" | ||
10349 | |||
10350 | CVE_STATUS[CVE-2024-53175] = "cpe-stable-backport: Backported in 6.12.2" | ||
10351 | |||
10352 | CVE_STATUS[CVE-2024-53176] = "cpe-stable-backport: Backported in 6.12.2" | ||
10353 | |||
10354 | CVE_STATUS[CVE-2024-53177] = "cpe-stable-backport: Backported in 6.12.2" | ||
10355 | |||
10356 | CVE_STATUS[CVE-2024-53178] = "cpe-stable-backport: Backported in 6.12.2" | ||
10357 | |||
10358 | CVE_STATUS[CVE-2024-53179] = "cpe-stable-backport: Backported in 6.12.2" | ||
10359 | |||
10360 | CVE_STATUS[CVE-2024-53180] = "cpe-stable-backport: Backported in 6.12.2" | ||
10361 | |||
10362 | CVE_STATUS[CVE-2024-53181] = "cpe-stable-backport: Backported in 6.12.2" | ||
10363 | |||
10364 | CVE_STATUS[CVE-2024-53182] = "cpe-stable-backport: Backported in 6.12.2" | ||
10365 | |||
10366 | CVE_STATUS[CVE-2024-53183] = "cpe-stable-backport: Backported in 6.12.2" | ||
10367 | |||
10368 | CVE_STATUS[CVE-2024-53184] = "cpe-stable-backport: Backported in 6.12.2" | ||
10369 | |||
10370 | CVE_STATUS[CVE-2024-53185] = "cpe-stable-backport: Backported in 6.12.2" | ||
10371 | |||
10372 | CVE_STATUS[CVE-2024-53186] = "cpe-stable-backport: Backported in 6.12.2" | ||
10373 | |||
10374 | CVE_STATUS[CVE-2024-53187] = "cpe-stable-backport: Backported in 6.12.2" | ||
10375 | |||
10376 | CVE_STATUS[CVE-2024-53188] = "cpe-stable-backport: Backported in 6.12.2" | ||
10377 | |||
10378 | CVE_STATUS[CVE-2024-53189] = "cpe-stable-backport: Backported in 6.12.2" | ||
10379 | |||
10380 | CVE_STATUS[CVE-2024-53190] = "cpe-stable-backport: Backported in 6.12.2" | ||
10381 | |||
10382 | CVE_STATUS[CVE-2024-53191] = "cpe-stable-backport: Backported in 6.12.2" | ||
10383 | |||
10384 | CVE_STATUS[CVE-2024-53192] = "cpe-stable-backport: Backported in 6.12.2" | ||
10385 | |||
10386 | CVE_STATUS[CVE-2024-53193] = "cpe-stable-backport: Backported in 6.12.2" | ||
10387 | |||
10388 | CVE_STATUS[CVE-2024-53194] = "cpe-stable-backport: Backported in 6.12.2" | ||
10389 | |||
10390 | CVE_STATUS[CVE-2024-53195] = "cpe-stable-backport: Backported in 6.12.2" | ||
10391 | |||
10392 | CVE_STATUS[CVE-2024-53196] = "cpe-stable-backport: Backported in 6.12.2" | ||
10393 | |||
10394 | CVE_STATUS[CVE-2024-53197] = "cpe-stable-backport: Backported in 6.12.2" | ||
10395 | |||
10396 | CVE_STATUS[CVE-2024-53198] = "cpe-stable-backport: Backported in 6.12.2" | ||
10397 | |||
10398 | CVE_STATUS[CVE-2024-53199] = "cpe-stable-backport: Backported in 6.12.2" | ||
10399 | |||
10400 | CVE_STATUS[CVE-2024-53200] = "cpe-stable-backport: Backported in 6.12.2" | ||
10401 | |||
10402 | CVE_STATUS[CVE-2024-53201] = "cpe-stable-backport: Backported in 6.12.2" | ||
10403 | |||
10404 | CVE_STATUS[CVE-2024-53202] = "cpe-stable-backport: Backported in 6.12.2" | ||
10405 | |||
10406 | CVE_STATUS[CVE-2024-53203] = "cpe-stable-backport: Backported in 6.12.2" | ||
10407 | |||
10408 | CVE_STATUS[CVE-2024-53204] = "cpe-stable-backport: Backported in 6.12.2" | ||
10409 | |||
10410 | CVE_STATUS[CVE-2024-53205] = "cpe-stable-backport: Backported in 6.12.2" | ||
10411 | |||
10412 | CVE_STATUS[CVE-2024-53206] = "cpe-stable-backport: Backported in 6.12.2" | ||
10413 | |||
10414 | CVE_STATUS[CVE-2024-53207] = "cpe-stable-backport: Backported in 6.12.2" | ||
10415 | |||
10416 | CVE_STATUS[CVE-2024-53208] = "cpe-stable-backport: Backported in 6.12.2" | ||
10417 | |||
10418 | CVE_STATUS[CVE-2024-53209] = "cpe-stable-backport: Backported in 6.12.2" | ||
10419 | |||
10420 | CVE_STATUS[CVE-2024-53210] = "cpe-stable-backport: Backported in 6.12.2" | ||
10421 | |||
10422 | CVE_STATUS[CVE-2024-53211] = "cpe-stable-backport: Backported in 6.12.2" | ||
10423 | |||
10424 | CVE_STATUS[CVE-2024-53212] = "cpe-stable-backport: Backported in 6.12.2" | ||
10425 | |||
10426 | CVE_STATUS[CVE-2024-53213] = "cpe-stable-backport: Backported in 6.12.2" | ||
10427 | |||
10428 | CVE_STATUS[CVE-2024-53214] = "cpe-stable-backport: Backported in 6.12.2" | ||
10429 | |||
10430 | CVE_STATUS[CVE-2024-53215] = "cpe-stable-backport: Backported in 6.12.2" | ||
10431 | |||
10432 | CVE_STATUS[CVE-2024-53216] = "cpe-stable-backport: Backported in 6.12.2" | ||
10433 | |||
10434 | CVE_STATUS[CVE-2024-53217] = "cpe-stable-backport: Backported in 6.12.2" | ||
10435 | |||
10436 | CVE_STATUS[CVE-2024-53218] = "cpe-stable-backport: Backported in 6.12.2" | ||
10437 | |||
10438 | CVE_STATUS[CVE-2024-53219] = "cpe-stable-backport: Backported in 6.12.2" | ||
10439 | |||
10440 | CVE_STATUS[CVE-2024-53220] = "cpe-stable-backport: Backported in 6.12.2" | ||
10441 | |||
10442 | CVE_STATUS[CVE-2024-53221] = "cpe-stable-backport: Backported in 6.12.2" | ||
10443 | |||
10444 | CVE_STATUS[CVE-2024-53222] = "cpe-stable-backport: Backported in 6.12.2" | ||
10445 | |||
10446 | CVE_STATUS[CVE-2024-53223] = "cpe-stable-backport: Backported in 6.12.2" | ||
10447 | |||
10448 | CVE_STATUS[CVE-2024-53224] = "cpe-stable-backport: Backported in 6.12.2" | ||
10449 | |||
10450 | CVE_STATUS[CVE-2024-53225] = "cpe-stable-backport: Backported in 6.12.2" | ||
10451 | |||
10452 | CVE_STATUS[CVE-2024-53226] = "cpe-stable-backport: Backported in 6.12.2" | ||
10453 | |||
10454 | CVE_STATUS[CVE-2024-53227] = "cpe-stable-backport: Backported in 6.12.2" | ||
10455 | |||
10456 | CVE_STATUS[CVE-2024-53228] = "cpe-stable-backport: Backported in 6.12.2" | ||
10457 | |||
10458 | CVE_STATUS[CVE-2024-53229] = "cpe-stable-backport: Backported in 6.12.2" | ||
10459 | |||
10460 | CVE_STATUS[CVE-2024-53230] = "cpe-stable-backport: Backported in 6.12.2" | ||
10461 | |||
10462 | CVE_STATUS[CVE-2024-53231] = "cpe-stable-backport: Backported in 6.12.2" | ||
10463 | |||
10464 | CVE_STATUS[CVE-2024-53232] = "cpe-stable-backport: Backported in 6.12.2" | ||
10465 | |||
10466 | CVE_STATUS[CVE-2024-53233] = "cpe-stable-backport: Backported in 6.12.2" | ||
10467 | |||
10468 | CVE_STATUS[CVE-2024-53234] = "cpe-stable-backport: Backported in 6.12.2" | ||
10469 | |||
10470 | CVE_STATUS[CVE-2024-53235] = "cpe-stable-backport: Backported in 6.12.2" | ||
10471 | |||
10472 | CVE_STATUS[CVE-2024-53236] = "cpe-stable-backport: Backported in 6.12.2" | ||
10473 | |||
10474 | CVE_STATUS[CVE-2024-53237] = "cpe-stable-backport: Backported in 6.12.2" | ||
10475 | |||
10476 | CVE_STATUS[CVE-2024-53238] = "cpe-stable-backport: Backported in 6.12.2" | ||
10477 | |||
10478 | CVE_STATUS[CVE-2024-53239] = "cpe-stable-backport: Backported in 6.12.2" | ||
10479 | |||
10480 | CVE_STATUS[CVE-2024-53240] = "cpe-stable-backport: Backported in 6.12.6" | ||
10481 | |||
10482 | CVE_STATUS[CVE-2024-53241] = "cpe-stable-backport: Backported in 6.12.6" | ||
10483 | |||
10484 | CVE_STATUS[CVE-2024-53680] = "cpe-stable-backport: Backported in 6.12.5" | ||
10485 | |||
10486 | CVE_STATUS[CVE-2024-53681] = "cpe-stable-backport: Backported in 6.12.9" | ||
10487 | |||
10488 | CVE_STATUS[CVE-2024-53682] = "cpe-stable-backport: Backported in 6.12.6" | ||
10489 | |||
10490 | CVE_STATUS[CVE-2024-53685] = "cpe-stable-backport: Backported in 6.12.7" | ||
10491 | |||
10492 | CVE_STATUS[CVE-2024-53687] = "cpe-stable-backport: Backported in 6.12.6" | ||
10493 | |||
10494 | CVE_STATUS[CVE-2024-53690] = "cpe-stable-backport: Backported in 6.12.7" | ||
10495 | |||
10496 | CVE_STATUS[CVE-2024-54031] = "fixed-version: Fixed from version 6.12.9" | ||
10497 | |||
10498 | CVE_STATUS[CVE-2024-54191] = "fixed-version: Fixed from version 6.12.6" | ||
10499 | |||
10500 | CVE_STATUS[CVE-2024-54193] = "cpe-stable-backport: Backported in 6.12.7" | ||
10501 | |||
10502 | CVE_STATUS[CVE-2024-54455] = "cpe-stable-backport: Backported in 6.12.7" | ||
10503 | |||
10504 | CVE_STATUS[CVE-2024-54456] = "cpe-stable-backport: Backported in 6.12.16" | ||
10505 | |||
10506 | CVE_STATUS[CVE-2024-54458] = "cpe-stable-backport: Backported in 6.12.16" | ||
10507 | |||
10508 | CVE_STATUS[CVE-2024-54460] = "cpe-stable-backport: Backported in 6.12.6" | ||
10509 | |||
10510 | CVE_STATUS[CVE-2024-54683] = "cpe-stable-backport: Backported in 6.12.6" | ||
10511 | |||
10512 | CVE_STATUS[CVE-2024-55639] = "cpe-stable-backport: Backported in 6.12.6" | ||
10513 | |||
10514 | CVE_STATUS[CVE-2024-55641] = "cpe-stable-backport: Backported in 6.12.6" | ||
10515 | |||
10516 | CVE_STATUS[CVE-2024-55642] = "cpe-stable-backport: Backported in 6.12.6" | ||
10517 | |||
10518 | CVE_STATUS[CVE-2024-55881] = "cpe-stable-backport: Backported in 6.12.7" | ||
10519 | |||
10520 | CVE_STATUS[CVE-2024-55916] = "cpe-stable-backport: Backported in 6.12.7" | ||
10521 | |||
10522 | CVE_STATUS[CVE-2024-56368] = "cpe-stable-backport: Backported in 6.12.7" | ||
10523 | |||
10524 | CVE_STATUS[CVE-2024-56369] = "cpe-stable-backport: Backported in 6.12.7" | ||
10525 | |||
10526 | CVE_STATUS[CVE-2024-56372] = "cpe-stable-backport: Backported in 6.12.7" | ||
10527 | |||
10528 | CVE_STATUS[CVE-2024-56531] = "cpe-stable-backport: Backported in 6.12.2" | ||
10529 | |||
10530 | CVE_STATUS[CVE-2024-56532] = "cpe-stable-backport: Backported in 6.12.2" | ||
10531 | |||
10532 | CVE_STATUS[CVE-2024-56533] = "cpe-stable-backport: Backported in 6.12.2" | ||
10533 | |||
10534 | CVE_STATUS[CVE-2024-56534] = "cpe-stable-backport: Backported in 6.12.2" | ||
10535 | |||
10536 | CVE_STATUS[CVE-2024-56535] = "cpe-stable-backport: Backported in 6.12.2" | ||
10537 | |||
10538 | CVE_STATUS[CVE-2024-56536] = "cpe-stable-backport: Backported in 6.12.2" | ||
10539 | |||
10540 | CVE_STATUS[CVE-2024-56537] = "cpe-stable-backport: Backported in 6.12.2" | ||
10541 | |||
10542 | CVE_STATUS[CVE-2024-56538] = "cpe-stable-backport: Backported in 6.12.2" | ||
10543 | |||
10544 | CVE_STATUS[CVE-2024-56539] = "cpe-stable-backport: Backported in 6.12.2" | ||
10545 | |||
10546 | CVE_STATUS[CVE-2024-56540] = "cpe-stable-backport: Backported in 6.12.2" | ||
10547 | |||
10548 | CVE_STATUS[CVE-2024-56541] = "cpe-stable-backport: Backported in 6.12.2" | ||
10549 | |||
10550 | CVE_STATUS[CVE-2024-56542] = "cpe-stable-backport: Backported in 6.12.2" | ||
10551 | |||
10552 | CVE_STATUS[CVE-2024-56543] = "cpe-stable-backport: Backported in 6.12.2" | ||
10553 | |||
10554 | CVE_STATUS[CVE-2024-56544] = "cpe-stable-backport: Backported in 6.12.2" | ||
10555 | |||
10556 | CVE_STATUS[CVE-2024-56545] = "cpe-stable-backport: Backported in 6.12.2" | ||
10557 | |||
10558 | CVE_STATUS[CVE-2024-56546] = "cpe-stable-backport: Backported in 6.12.2" | ||
10559 | |||
10560 | CVE_STATUS[CVE-2024-56547] = "cpe-stable-backport: Backported in 6.12.2" | ||
10561 | |||
10562 | CVE_STATUS[CVE-2024-56548] = "cpe-stable-backport: Backported in 6.12.2" | ||
10563 | |||
10564 | CVE_STATUS[CVE-2024-56549] = "cpe-stable-backport: Backported in 6.12.2" | ||
10565 | |||
10566 | CVE_STATUS[CVE-2024-56550] = "cpe-stable-backport: Backported in 6.12.4" | ||
10567 | |||
10568 | CVE_STATUS[CVE-2024-56551] = "cpe-stable-backport: Backported in 6.12.4" | ||
10569 | |||
10570 | CVE_STATUS[CVE-2024-56552] = "cpe-stable-backport: Backported in 6.12.4" | ||
10571 | |||
10572 | CVE_STATUS[CVE-2024-56553] = "cpe-stable-backport: Backported in 6.12.4" | ||
10573 | |||
10574 | CVE_STATUS[CVE-2024-56554] = "cpe-stable-backport: Backported in 6.12.4" | ||
10575 | |||
10576 | CVE_STATUS[CVE-2024-56555] = "cpe-stable-backport: Backported in 6.12.4" | ||
10577 | |||
10578 | CVE_STATUS[CVE-2024-56556] = "cpe-stable-backport: Backported in 6.12.4" | ||
10579 | |||
10580 | CVE_STATUS[CVE-2024-56557] = "cpe-stable-backport: Backported in 6.12.4" | ||
10581 | |||
10582 | CVE_STATUS[CVE-2024-56558] = "cpe-stable-backport: Backported in 6.12.4" | ||
10583 | |||
10584 | CVE_STATUS[CVE-2024-56559] = "cpe-stable-backport: Backported in 6.12.4" | ||
10585 | |||
10586 | CVE_STATUS[CVE-2024-56560] = "cpe-stable-backport: Backported in 6.12.4" | ||
10587 | |||
10588 | CVE_STATUS[CVE-2024-56561] = "cpe-stable-backport: Backported in 6.12.4" | ||
10589 | |||
10590 | CVE_STATUS[CVE-2024-56562] = "cpe-stable-backport: Backported in 6.12.4" | ||
10591 | |||
10592 | CVE_STATUS[CVE-2024-56563] = "cpe-stable-backport: Backported in 6.12.4" | ||
10593 | |||
10594 | CVE_STATUS[CVE-2024-56564] = "cpe-stable-backport: Backported in 6.12.4" | ||
10595 | |||
10596 | CVE_STATUS[CVE-2024-56565] = "cpe-stable-backport: Backported in 6.12.4" | ||
10597 | |||
10598 | CVE_STATUS[CVE-2024-56566] = "cpe-stable-backport: Backported in 6.12.4" | ||
10599 | |||
10600 | CVE_STATUS[CVE-2024-56567] = "cpe-stable-backport: Backported in 6.12.4" | ||
10601 | |||
10602 | CVE_STATUS[CVE-2024-56568] = "cpe-stable-backport: Backported in 6.12.4" | ||
10603 | |||
10604 | CVE_STATUS[CVE-2024-56569] = "cpe-stable-backport: Backported in 6.12.4" | ||
10605 | |||
10606 | CVE_STATUS[CVE-2024-56570] = "cpe-stable-backport: Backported in 6.12.4" | ||
10607 | |||
10608 | CVE_STATUS[CVE-2024-56572] = "cpe-stable-backport: Backported in 6.12.4" | ||
10609 | |||
10610 | CVE_STATUS[CVE-2024-56573] = "cpe-stable-backport: Backported in 6.12.4" | ||
10611 | |||
10612 | CVE_STATUS[CVE-2024-56574] = "cpe-stable-backport: Backported in 6.12.4" | ||
10613 | |||
10614 | CVE_STATUS[CVE-2024-56575] = "cpe-stable-backport: Backported in 6.12.4" | ||
10615 | |||
10616 | CVE_STATUS[CVE-2024-56576] = "cpe-stable-backport: Backported in 6.12.4" | ||
10617 | |||
10618 | CVE_STATUS[CVE-2024-56577] = "cpe-stable-backport: Backported in 6.12.4" | ||
10619 | |||
10620 | CVE_STATUS[CVE-2024-56578] = "cpe-stable-backport: Backported in 6.12.4" | ||
10621 | |||
10622 | CVE_STATUS[CVE-2024-56579] = "cpe-stable-backport: Backported in 6.12.4" | ||
10623 | |||
10624 | CVE_STATUS[CVE-2024-56580] = "cpe-stable-backport: Backported in 6.12.4" | ||
10625 | |||
10626 | CVE_STATUS[CVE-2024-56581] = "cpe-stable-backport: Backported in 6.12.4" | ||
10627 | |||
10628 | CVE_STATUS[CVE-2024-56582] = "cpe-stable-backport: Backported in 6.12.4" | ||
10629 | |||
10630 | CVE_STATUS[CVE-2024-56583] = "cpe-stable-backport: Backported in 6.12.5" | ||
10631 | |||
10632 | CVE_STATUS[CVE-2024-56584] = "cpe-stable-backport: Backported in 6.12.5" | ||
10633 | |||
10634 | CVE_STATUS[CVE-2024-56585] = "cpe-stable-backport: Backported in 6.12.5" | ||
10635 | |||
10636 | CVE_STATUS[CVE-2024-56586] = "cpe-stable-backport: Backported in 6.12.5" | ||
10637 | |||
10638 | CVE_STATUS[CVE-2024-56587] = "cpe-stable-backport: Backported in 6.12.5" | ||
10639 | |||
10640 | CVE_STATUS[CVE-2024-56588] = "cpe-stable-backport: Backported in 6.12.5" | ||
10641 | |||
10642 | CVE_STATUS[CVE-2024-56589] = "cpe-stable-backport: Backported in 6.12.5" | ||
10643 | |||
10644 | CVE_STATUS[CVE-2024-56590] = "cpe-stable-backport: Backported in 6.12.5" | ||
10645 | |||
10646 | CVE_STATUS[CVE-2024-56591] = "cpe-stable-backport: Backported in 6.12.5" | ||
10647 | |||
10648 | CVE_STATUS[CVE-2024-56592] = "cpe-stable-backport: Backported in 6.12.5" | ||
10649 | |||
10650 | CVE_STATUS[CVE-2024-56593] = "cpe-stable-backport: Backported in 6.12.5" | ||
10651 | |||
10652 | CVE_STATUS[CVE-2024-56594] = "cpe-stable-backport: Backported in 6.12.5" | ||
10653 | |||
10654 | CVE_STATUS[CVE-2024-56595] = "cpe-stable-backport: Backported in 6.12.5" | ||
10655 | |||
10656 | CVE_STATUS[CVE-2024-56596] = "cpe-stable-backport: Backported in 6.12.5" | ||
10657 | |||
10658 | CVE_STATUS[CVE-2024-56597] = "cpe-stable-backport: Backported in 6.12.5" | ||
10659 | |||
10660 | CVE_STATUS[CVE-2024-56598] = "cpe-stable-backport: Backported in 6.12.5" | ||
10661 | |||
10662 | CVE_STATUS[CVE-2024-56599] = "cpe-stable-backport: Backported in 6.12.5" | ||
10663 | |||
10664 | CVE_STATUS[CVE-2024-56600] = "cpe-stable-backport: Backported in 6.12.5" | ||
10665 | |||
10666 | CVE_STATUS[CVE-2024-56601] = "cpe-stable-backport: Backported in 6.12.5" | ||
10667 | |||
10668 | CVE_STATUS[CVE-2024-56602] = "cpe-stable-backport: Backported in 6.12.5" | ||
10669 | |||
10670 | CVE_STATUS[CVE-2024-56603] = "cpe-stable-backport: Backported in 6.12.5" | ||
10671 | |||
10672 | CVE_STATUS[CVE-2024-56604] = "cpe-stable-backport: Backported in 6.12.5" | ||
10673 | |||
10674 | CVE_STATUS[CVE-2024-56605] = "cpe-stable-backport: Backported in 6.12.5" | ||
10675 | |||
10676 | CVE_STATUS[CVE-2024-56606] = "cpe-stable-backport: Backported in 6.12.5" | ||
10677 | |||
10678 | CVE_STATUS[CVE-2024-56607] = "cpe-stable-backport: Backported in 6.12.5" | ||
10679 | |||
10680 | CVE_STATUS[CVE-2024-56608] = "cpe-stable-backport: Backported in 6.12.5" | ||
10681 | |||
10682 | CVE_STATUS[CVE-2024-56609] = "cpe-stable-backport: Backported in 6.12.5" | ||
10683 | |||
10684 | CVE_STATUS[CVE-2024-56610] = "cpe-stable-backport: Backported in 6.12.5" | ||
10685 | |||
10686 | CVE_STATUS[CVE-2024-56611] = "cpe-stable-backport: Backported in 6.12.5" | ||
10687 | |||
10688 | CVE_STATUS[CVE-2024-56612] = "cpe-stable-backport: Backported in 6.12.5" | ||
10689 | |||
10690 | CVE_STATUS[CVE-2024-56613] = "cpe-stable-backport: Backported in 6.12.5" | ||
10691 | |||
10692 | CVE_STATUS[CVE-2024-56614] = "cpe-stable-backport: Backported in 6.12.5" | ||
10693 | |||
10694 | CVE_STATUS[CVE-2024-56615] = "cpe-stable-backport: Backported in 6.12.5" | ||
10695 | |||
10696 | CVE_STATUS[CVE-2024-56616] = "cpe-stable-backport: Backported in 6.12.5" | ||
10697 | |||
10698 | CVE_STATUS[CVE-2024-56617] = "cpe-stable-backport: Backported in 6.12.5" | ||
10699 | |||
10700 | CVE_STATUS[CVE-2024-56618] = "cpe-stable-backport: Backported in 6.12.5" | ||
10701 | |||
10702 | CVE_STATUS[CVE-2024-56619] = "cpe-stable-backport: Backported in 6.12.5" | ||
10703 | |||
10704 | CVE_STATUS[CVE-2024-56620] = "cpe-stable-backport: Backported in 6.12.5" | ||
10705 | |||
10706 | CVE_STATUS[CVE-2024-56621] = "cpe-stable-backport: Backported in 6.12.5" | ||
10707 | |||
10708 | CVE_STATUS[CVE-2024-56622] = "cpe-stable-backport: Backported in 6.12.5" | ||
10709 | |||
10710 | CVE_STATUS[CVE-2024-56623] = "cpe-stable-backport: Backported in 6.12.5" | ||
10711 | |||
10712 | CVE_STATUS[CVE-2024-56624] = "cpe-stable-backport: Backported in 6.12.5" | ||
10713 | |||
10714 | CVE_STATUS[CVE-2024-56625] = "cpe-stable-backport: Backported in 6.12.5" | ||
10715 | |||
10716 | CVE_STATUS[CVE-2024-56626] = "cpe-stable-backport: Backported in 6.12.5" | ||
10717 | |||
10718 | CVE_STATUS[CVE-2024-56627] = "cpe-stable-backport: Backported in 6.12.5" | ||
10719 | |||
10720 | CVE_STATUS[CVE-2024-56628] = "cpe-stable-backport: Backported in 6.12.5" | ||
10721 | |||
10722 | CVE_STATUS[CVE-2024-56629] = "cpe-stable-backport: Backported in 6.12.5" | ||
10723 | |||
10724 | CVE_STATUS[CVE-2024-56630] = "cpe-stable-backport: Backported in 6.12.5" | ||
10725 | |||
10726 | CVE_STATUS[CVE-2024-56631] = "cpe-stable-backport: Backported in 6.12.5" | ||
10727 | |||
10728 | CVE_STATUS[CVE-2024-56632] = "cpe-stable-backport: Backported in 6.12.5" | ||
10729 | |||
10730 | CVE_STATUS[CVE-2024-56633] = "cpe-stable-backport: Backported in 6.12.5" | ||
10731 | |||
10732 | CVE_STATUS[CVE-2024-56634] = "cpe-stable-backport: Backported in 6.12.5" | ||
10733 | |||
10734 | CVE_STATUS[CVE-2024-56635] = "cpe-stable-backport: Backported in 6.12.5" | ||
10735 | |||
10736 | CVE_STATUS[CVE-2024-56636] = "cpe-stable-backport: Backported in 6.12.5" | ||
10737 | |||
10738 | CVE_STATUS[CVE-2024-56637] = "cpe-stable-backport: Backported in 6.12.5" | ||
10739 | |||
10740 | CVE_STATUS[CVE-2024-56638] = "cpe-stable-backport: Backported in 6.12.5" | ||
10741 | |||
10742 | CVE_STATUS[CVE-2024-56639] = "cpe-stable-backport: Backported in 6.12.5" | ||
10743 | |||
10744 | CVE_STATUS[CVE-2024-56640] = "cpe-stable-backport: Backported in 6.12.5" | ||
10745 | |||
10746 | CVE_STATUS[CVE-2024-56641] = "cpe-stable-backport: Backported in 6.12.5" | ||
10747 | |||
10748 | CVE_STATUS[CVE-2024-56642] = "cpe-stable-backport: Backported in 6.12.5" | ||
10749 | |||
10750 | CVE_STATUS[CVE-2024-56643] = "cpe-stable-backport: Backported in 6.12.5" | ||
10751 | |||
10752 | CVE_STATUS[CVE-2024-56644] = "cpe-stable-backport: Backported in 6.12.5" | ||
10753 | |||
10754 | CVE_STATUS[CVE-2024-56645] = "cpe-stable-backport: Backported in 6.12.5" | ||
10755 | |||
10756 | CVE_STATUS[CVE-2024-56646] = "cpe-stable-backport: Backported in 6.12.5" | ||
10757 | |||
10758 | CVE_STATUS[CVE-2024-56647] = "cpe-stable-backport: Backported in 6.12.5" | ||
10759 | |||
10760 | CVE_STATUS[CVE-2024-56648] = "cpe-stable-backport: Backported in 6.12.5" | ||
10761 | |||
10762 | CVE_STATUS[CVE-2024-56649] = "cpe-stable-backport: Backported in 6.12.5" | ||
10763 | |||
10764 | CVE_STATUS[CVE-2024-56650] = "cpe-stable-backport: Backported in 6.12.5" | ||
10765 | |||
10766 | CVE_STATUS[CVE-2024-56651] = "cpe-stable-backport: Backported in 6.12.5" | ||
10767 | |||
10768 | CVE_STATUS[CVE-2024-56652] = "cpe-stable-backport: Backported in 6.12.6" | ||
10769 | |||
10770 | CVE_STATUS[CVE-2024-56653] = "cpe-stable-backport: Backported in 6.12.6" | ||
10771 | |||
10772 | CVE_STATUS[CVE-2024-56654] = "cpe-stable-backport: Backported in 6.12.6" | ||
10773 | |||
10774 | CVE_STATUS[CVE-2024-56655] = "cpe-stable-backport: Backported in 6.12.6" | ||
10775 | |||
10776 | CVE_STATUS[CVE-2024-56656] = "cpe-stable-backport: Backported in 6.12.6" | ||
10777 | |||
10778 | CVE_STATUS[CVE-2024-56657] = "cpe-stable-backport: Backported in 6.12.6" | ||
10779 | |||
10780 | CVE_STATUS[CVE-2024-56658] = "cpe-stable-backport: Backported in 6.12.6" | ||
10781 | |||
10782 | CVE_STATUS[CVE-2024-56659] = "cpe-stable-backport: Backported in 6.12.6" | ||
10783 | |||
10784 | CVE_STATUS[CVE-2024-56660] = "cpe-stable-backport: Backported in 6.12.6" | ||
10785 | |||
10786 | CVE_STATUS[CVE-2024-56661] = "fixed-version: Fixed from version 6.12.6" | ||
10787 | |||
10788 | CVE_STATUS[CVE-2024-56662] = "cpe-stable-backport: Backported in 6.12.6" | ||
10789 | |||
10790 | CVE_STATUS[CVE-2024-56663] = "cpe-stable-backport: Backported in 6.12.6" | ||
10791 | |||
10792 | CVE_STATUS[CVE-2024-56664] = "cpe-stable-backport: Backported in 6.12.6" | ||
10793 | |||
10794 | CVE_STATUS[CVE-2024-56665] = "cpe-stable-backport: Backported in 6.12.6" | ||
10795 | |||
10796 | CVE_STATUS[CVE-2024-56666] = "cpe-stable-backport: Backported in 6.12.6" | ||
10797 | |||
10798 | CVE_STATUS[CVE-2024-56667] = "cpe-stable-backport: Backported in 6.12.6" | ||
10799 | |||
10800 | CVE_STATUS[CVE-2024-56668] = "cpe-stable-backport: Backported in 6.12.6" | ||
10801 | |||
10802 | CVE_STATUS[CVE-2024-56669] = "cpe-stable-backport: Backported in 6.12.6" | ||
10803 | |||
10804 | CVE_STATUS[CVE-2024-56670] = "cpe-stable-backport: Backported in 6.12.6" | ||
10805 | |||
10806 | CVE_STATUS[CVE-2024-56671] = "cpe-stable-backport: Backported in 6.12.6" | ||
10807 | |||
10808 | CVE_STATUS[CVE-2024-56672] = "cpe-stable-backport: Backported in 6.12.6" | ||
10809 | |||
10810 | CVE_STATUS[CVE-2024-56673] = "cpe-stable-backport: Backported in 6.12.6" | ||
10811 | |||
10812 | CVE_STATUS[CVE-2024-56674] = "cpe-stable-backport: Backported in 6.12.6" | ||
10813 | |||
10814 | CVE_STATUS[CVE-2024-56675] = "cpe-stable-backport: Backported in 6.12.6" | ||
10815 | |||
10816 | CVE_STATUS[CVE-2024-56676] = "cpe-stable-backport: Backported in 6.12.2" | ||
10817 | |||
10818 | CVE_STATUS[CVE-2024-56677] = "cpe-stable-backport: Backported in 6.12.2" | ||
10819 | |||
10820 | CVE_STATUS[CVE-2024-56678] = "cpe-stable-backport: Backported in 6.12.2" | ||
10821 | |||
10822 | CVE_STATUS[CVE-2024-56679] = "cpe-stable-backport: Backported in 6.12.2" | ||
10823 | |||
10824 | CVE_STATUS[CVE-2024-56680] = "cpe-stable-backport: Backported in 6.12.2" | ||
10825 | |||
10826 | CVE_STATUS[CVE-2024-56681] = "cpe-stable-backport: Backported in 6.12.2" | ||
10827 | |||
10828 | CVE_STATUS[CVE-2024-56682] = "cpe-stable-backport: Backported in 6.12.2" | ||
10829 | |||
10830 | CVE_STATUS[CVE-2024-56683] = "cpe-stable-backport: Backported in 6.12.2" | ||
10831 | |||
10832 | CVE_STATUS[CVE-2024-56684] = "cpe-stable-backport: Backported in 6.12.2" | ||
10833 | |||
10834 | CVE_STATUS[CVE-2024-56685] = "cpe-stable-backport: Backported in 6.12.2" | ||
10835 | |||
10836 | CVE_STATUS[CVE-2024-56687] = "cpe-stable-backport: Backported in 6.12.2" | ||
10837 | |||
10838 | CVE_STATUS[CVE-2024-56688] = "cpe-stable-backport: Backported in 6.12.2" | ||
10839 | |||
10840 | CVE_STATUS[CVE-2024-56689] = "cpe-stable-backport: Backported in 6.12.2" | ||
10841 | |||
10842 | CVE_STATUS[CVE-2024-56690] = "cpe-stable-backport: Backported in 6.12.2" | ||
10843 | |||
10844 | CVE_STATUS[CVE-2024-56691] = "cpe-stable-backport: Backported in 6.12.2" | ||
10845 | |||
10846 | CVE_STATUS[CVE-2024-56692] = "cpe-stable-backport: Backported in 6.12.2" | ||
10847 | |||
10848 | CVE_STATUS[CVE-2024-56693] = "cpe-stable-backport: Backported in 6.12.2" | ||
10849 | |||
10850 | CVE_STATUS[CVE-2024-56694] = "cpe-stable-backport: Backported in 6.12.2" | ||
10851 | |||
10852 | CVE_STATUS[CVE-2024-56695] = "cpe-stable-backport: Backported in 6.12.2" | ||
10853 | |||
10854 | CVE_STATUS[CVE-2024-56696] = "cpe-stable-backport: Backported in 6.12.2" | ||
10855 | |||
10856 | CVE_STATUS[CVE-2024-56697] = "cpe-stable-backport: Backported in 6.12.2" | ||
10857 | |||
10858 | CVE_STATUS[CVE-2024-56698] = "cpe-stable-backport: Backported in 6.12.2" | ||
10859 | |||
10860 | CVE_STATUS[CVE-2024-56699] = "cpe-stable-backport: Backported in 6.12.2" | ||
10861 | |||
10862 | CVE_STATUS[CVE-2024-56700] = "cpe-stable-backport: Backported in 6.12.2" | ||
10863 | |||
10864 | CVE_STATUS[CVE-2024-56701] = "cpe-stable-backport: Backported in 6.12.2" | ||
10865 | |||
10866 | CVE_STATUS[CVE-2024-56702] = "cpe-stable-backport: Backported in 6.12.2" | ||
10867 | |||
10868 | CVE_STATUS[CVE-2024-56703] = "cpe-stable-backport: Backported in 6.12.2" | ||
10869 | |||
10870 | CVE_STATUS[CVE-2024-56704] = "cpe-stable-backport: Backported in 6.12.2" | ||
10871 | |||
10872 | CVE_STATUS[CVE-2024-56705] = "cpe-stable-backport: Backported in 6.12.2" | ||
10873 | |||
10874 | CVE_STATUS[CVE-2024-56706] = "cpe-stable-backport: Backported in 6.12.2" | ||
10875 | |||
10876 | CVE_STATUS[CVE-2024-56707] = "cpe-stable-backport: Backported in 6.12.2" | ||
10877 | |||
10878 | CVE_STATUS[CVE-2024-56708] = "cpe-stable-backport: Backported in 6.12.2" | ||
10879 | |||
10880 | CVE_STATUS[CVE-2024-56709] = "cpe-stable-backport: Backported in 6.12.7" | ||
10881 | |||
10882 | CVE_STATUS[CVE-2024-56710] = "cpe-stable-backport: Backported in 6.12.7" | ||
10883 | |||
10884 | CVE_STATUS[CVE-2024-56711] = "cpe-stable-backport: Backported in 6.12.7" | ||
10885 | |||
10886 | CVE_STATUS[CVE-2024-56712] = "cpe-stable-backport: Backported in 6.12.7" | ||
10887 | |||
10888 | CVE_STATUS[CVE-2024-56713] = "cpe-stable-backport: Backported in 6.12.7" | ||
10889 | |||
10890 | CVE_STATUS[CVE-2024-56714] = "cpe-stable-backport: Backported in 6.12.7" | ||
10891 | |||
10892 | CVE_STATUS[CVE-2024-56715] = "cpe-stable-backport: Backported in 6.12.7" | ||
10893 | |||
10894 | CVE_STATUS[CVE-2024-56716] = "cpe-stable-backport: Backported in 6.12.7" | ||
10895 | |||
10896 | CVE_STATUS[CVE-2024-56717] = "cpe-stable-backport: Backported in 6.12.7" | ||
10897 | |||
10898 | CVE_STATUS[CVE-2024-56718] = "cpe-stable-backport: Backported in 6.12.7" | ||
10899 | |||
10900 | CVE_STATUS[CVE-2024-56719] = "cpe-stable-backport: Backported in 6.12.7" | ||
10901 | |||
10902 | CVE_STATUS[CVE-2024-56720] = "cpe-stable-backport: Backported in 6.12.2" | ||
10903 | |||
10904 | CVE_STATUS[CVE-2024-56721] = "cpe-stable-backport: Backported in 6.12.2" | ||
10905 | |||
10906 | CVE_STATUS[CVE-2024-56722] = "cpe-stable-backport: Backported in 6.12.2" | ||
10907 | |||
10908 | CVE_STATUS[CVE-2024-56723] = "cpe-stable-backport: Backported in 6.12.2" | ||
10909 | |||
10910 | CVE_STATUS[CVE-2024-56724] = "cpe-stable-backport: Backported in 6.12.2" | ||
10911 | |||
10912 | CVE_STATUS[CVE-2024-56725] = "cpe-stable-backport: Backported in 6.12.2" | ||
10913 | |||
10914 | CVE_STATUS[CVE-2024-56726] = "cpe-stable-backport: Backported in 6.12.2" | ||
10915 | |||
10916 | CVE_STATUS[CVE-2024-56727] = "cpe-stable-backport: Backported in 6.12.2" | ||
10917 | |||
10918 | CVE_STATUS[CVE-2024-56728] = "cpe-stable-backport: Backported in 6.12.2" | ||
10919 | |||
10920 | CVE_STATUS[CVE-2024-56729] = "cpe-stable-backport: Backported in 6.12.2" | ||
10921 | |||
10922 | CVE_STATUS[CVE-2024-56730] = "cpe-stable-backport: Backported in 6.12.2" | ||
10923 | |||
10924 | CVE_STATUS[CVE-2024-56739] = "cpe-stable-backport: Backported in 6.12.2" | ||
10925 | |||
10926 | CVE_STATUS[CVE-2024-56740] = "cpe-stable-backport: Backported in 6.12.2" | ||
10927 | |||
10928 | CVE_STATUS[CVE-2024-56742] = "cpe-stable-backport: Backported in 6.12.2" | ||
10929 | |||
10930 | CVE_STATUS[CVE-2024-56743] = "cpe-stable-backport: Backported in 6.12.2" | ||
10931 | |||
10932 | CVE_STATUS[CVE-2024-56744] = "cpe-stable-backport: Backported in 6.12.2" | ||
10933 | |||
10934 | CVE_STATUS[CVE-2024-56745] = "cpe-stable-backport: Backported in 6.12.2" | ||
10935 | |||
10936 | CVE_STATUS[CVE-2024-56746] = "cpe-stable-backport: Backported in 6.12.2" | ||
10937 | |||
10938 | CVE_STATUS[CVE-2024-56747] = "cpe-stable-backport: Backported in 6.12.2" | ||
10939 | |||
10940 | CVE_STATUS[CVE-2024-56748] = "cpe-stable-backport: Backported in 6.12.2" | ||
10941 | |||
10942 | CVE_STATUS[CVE-2024-56749] = "cpe-stable-backport: Backported in 6.12.2" | ||
10943 | |||
10944 | CVE_STATUS[CVE-2024-56750] = "cpe-stable-backport: Backported in 6.12.2" | ||
10945 | |||
10946 | CVE_STATUS[CVE-2024-56751] = "cpe-stable-backport: Backported in 6.12.2" | ||
10947 | |||
10948 | CVE_STATUS[CVE-2024-56752] = "cpe-stable-backport: Backported in 6.12.2" | ||
10949 | |||
10950 | CVE_STATUS[CVE-2024-56753] = "cpe-stable-backport: Backported in 6.12.2" | ||
10951 | |||
10952 | CVE_STATUS[CVE-2024-56754] = "cpe-stable-backport: Backported in 6.12.2" | ||
10953 | |||
10954 | CVE_STATUS[CVE-2024-56755] = "cpe-stable-backport: Backported in 6.12.2" | ||
10955 | |||
10956 | CVE_STATUS[CVE-2024-56756] = "cpe-stable-backport: Backported in 6.12.2" | ||
10957 | |||
10958 | CVE_STATUS[CVE-2024-56757] = "cpe-stable-backport: Backported in 6.12.8" | ||
10959 | |||
10960 | CVE_STATUS[CVE-2024-56758] = "cpe-stable-backport: Backported in 6.12.8" | ||
10961 | |||
10962 | CVE_STATUS[CVE-2024-56759] = "cpe-stable-backport: Backported in 6.12.8" | ||
10963 | |||
10964 | CVE_STATUS[CVE-2024-56760] = "cpe-stable-backport: Backported in 6.12.8" | ||
10965 | |||
10966 | CVE_STATUS[CVE-2024-56761] = "cpe-stable-backport: Backported in 6.12.8" | ||
10967 | |||
10968 | CVE_STATUS[CVE-2024-56763] = "cpe-stable-backport: Backported in 6.12.8" | ||
10969 | |||
10970 | CVE_STATUS[CVE-2024-56764] = "cpe-stable-backport: Backported in 6.12.8" | ||
10971 | |||
10972 | CVE_STATUS[CVE-2024-56765] = "cpe-stable-backport: Backported in 6.12.8" | ||
10973 | |||
10974 | CVE_STATUS[CVE-2024-56766] = "fixed-version: Fixed from version 6.12.8" | ||
10975 | |||
10976 | CVE_STATUS[CVE-2024-56767] = "cpe-stable-backport: Backported in 6.12.8" | ||
10977 | |||
10978 | CVE_STATUS[CVE-2024-56768] = "cpe-stable-backport: Backported in 6.12.8" | ||
10979 | |||
10980 | CVE_STATUS[CVE-2024-56769] = "cpe-stable-backport: Backported in 6.12.8" | ||
10981 | |||
10982 | CVE_STATUS[CVE-2024-56770] = "cpe-stable-backport: Backported in 6.12.6" | ||
10983 | |||
10984 | CVE_STATUS[CVE-2024-56771] = "cpe-stable-backport: Backported in 6.12.4" | ||
10985 | |||
10986 | CVE_STATUS[CVE-2024-56772] = "cpe-stable-backport: Backported in 6.12.4" | ||
10987 | |||
10988 | CVE_STATUS[CVE-2024-56773] = "cpe-stable-backport: Backported in 6.12.4" | ||
10989 | |||
10990 | CVE_STATUS[CVE-2024-56774] = "cpe-stable-backport: Backported in 6.12.4" | ||
10991 | |||
10992 | CVE_STATUS[CVE-2024-56775] = "cpe-stable-backport: Backported in 6.12.4" | ||
10993 | |||
10994 | CVE_STATUS[CVE-2024-56776] = "cpe-stable-backport: Backported in 6.12.4" | ||
10995 | |||
10996 | CVE_STATUS[CVE-2024-56777] = "cpe-stable-backport: Backported in 6.12.4" | ||
10997 | |||
10998 | CVE_STATUS[CVE-2024-56778] = "cpe-stable-backport: Backported in 6.12.4" | ||
10999 | |||
11000 | CVE_STATUS[CVE-2024-56779] = "cpe-stable-backport: Backported in 6.12.4" | ||
11001 | |||
11002 | CVE_STATUS[CVE-2024-56780] = "cpe-stable-backport: Backported in 6.12.4" | ||
11003 | |||
11004 | CVE_STATUS[CVE-2024-56781] = "cpe-stable-backport: Backported in 6.12.5" | ||
11005 | |||
11006 | CVE_STATUS[CVE-2024-56782] = "cpe-stable-backport: Backported in 6.12.5" | ||
11007 | |||
11008 | CVE_STATUS[CVE-2024-56783] = "cpe-stable-backport: Backported in 6.12.5" | ||
11009 | |||
11010 | CVE_STATUS[CVE-2024-56784] = "cpe-stable-backport: Backported in 6.12.5" | ||
11011 | |||
11012 | CVE_STATUS[CVE-2024-56785] = "cpe-stable-backport: Backported in 6.12.5" | ||
11013 | |||
11014 | CVE_STATUS[CVE-2024-56786] = "cpe-stable-backport: Backported in 6.12.5" | ||
11015 | |||
11016 | CVE_STATUS[CVE-2024-56787] = "cpe-stable-backport: Backported in 6.12.5" | ||
11017 | |||
11018 | CVE_STATUS[CVE-2024-56788] = "cpe-stable-backport: Backported in 6.12.7" | ||
11019 | |||
11020 | CVE_STATUS[CVE-2024-57791] = "cpe-stable-backport: Backported in 6.12.7" | ||
11021 | |||
11022 | CVE_STATUS[CVE-2024-57792] = "cpe-stable-backport: Backported in 6.12.8" | ||
11023 | |||
11024 | CVE_STATUS[CVE-2024-57793] = "cpe-stable-backport: Backported in 6.12.8" | ||
11025 | |||
11026 | CVE_STATUS[CVE-2024-57795] = "cpe-stable-backport: Backported in 6.12.9" | ||
11027 | |||
11028 | CVE_STATUS[CVE-2024-57798] = "cpe-stable-backport: Backported in 6.12.8" | ||
11029 | |||
11030 | CVE_STATUS[CVE-2024-57799] = "cpe-stable-backport: Backported in 6.12.8" | ||
11031 | |||
11032 | CVE_STATUS[CVE-2024-57800] = "cpe-stable-backport: Backported in 6.12.8" | ||
11033 | |||
11034 | CVE_STATUS[CVE-2024-57801] = "cpe-stable-backport: Backported in 6.12.9" | ||
11035 | |||
11036 | CVE_STATUS[CVE-2024-57802] = "cpe-stable-backport: Backported in 6.12.9" | ||
11037 | |||
11038 | CVE_STATUS[CVE-2024-57804] = "cpe-stable-backport: Backported in 6.12.8" | ||
11039 | |||
11040 | CVE_STATUS[CVE-2024-57805] = "cpe-stable-backport: Backported in 6.12.8" | ||
11041 | |||
11042 | CVE_STATUS[CVE-2024-57806] = "cpe-stable-backport: Backported in 6.12.8" | ||
11043 | |||
11044 | CVE_STATUS[CVE-2024-57807] = "cpe-stable-backport: Backported in 6.12.8" | ||
11045 | |||
11046 | CVE_STATUS[CVE-2024-57809] = "cpe-stable-backport: Backported in 6.12.4" | ||
11047 | |||
11048 | CVE_STATUS[CVE-2024-57834] = "cpe-stable-backport: Backported in 6.12.16" | ||
11049 | |||
11050 | CVE_STATUS[CVE-2024-57838] = "cpe-stable-backport: Backported in 6.12.4" | ||
11051 | |||
11052 | CVE_STATUS[CVE-2024-57839] = "cpe-stable-backport: Backported in 6.12.5" | ||
11053 | |||
11054 | CVE_STATUS[CVE-2024-57841] = "cpe-stable-backport: Backported in 6.12.9" | ||
11055 | |||
11056 | CVE_STATUS[CVE-2024-57843] = "cpe-stable-backport: Backported in 6.12.5" | ||
11057 | |||
11058 | CVE_STATUS[CVE-2024-57844] = "cpe-stable-backport: Backported in 6.12.9" | ||
11059 | |||
11060 | CVE_STATUS[CVE-2024-57849] = "cpe-stable-backport: Backported in 6.12.5" | ||
11061 | |||
11062 | CVE_STATUS[CVE-2024-57850] = "cpe-stable-backport: Backported in 6.12.5" | ||
11063 | |||
11064 | CVE_STATUS[CVE-2024-57852] = "cpe-stable-backport: Backported in 6.12.16" | ||
11065 | |||
11066 | CVE_STATUS[CVE-2024-57857] = "cpe-stable-backport: Backported in 6.12.9" | ||
11067 | |||
11068 | CVE_STATUS[CVE-2024-57872] = "cpe-stable-backport: Backported in 6.12.5" | ||
11069 | |||
11070 | CVE_STATUS[CVE-2024-57874] = "cpe-stable-backport: Backported in 6.12.5" | ||
11071 | |||
11072 | CVE_STATUS[CVE-2024-57875] = "cpe-stable-backport: Backported in 6.12.5" | ||
11073 | |||
11074 | CVE_STATUS[CVE-2024-57876] = "cpe-stable-backport: Backported in 6.12.5" | ||
11075 | |||
11076 | CVE_STATUS[CVE-2024-57877] = "cpe-stable-backport: Backported in 6.12.5" | ||
11077 | |||
11078 | CVE_STATUS[CVE-2024-57878] = "cpe-stable-backport: Backported in 6.12.5" | ||
11079 | |||
11080 | CVE_STATUS[CVE-2024-57879] = "cpe-stable-backport: Backported in 6.12.6" | ||
11081 | |||
11082 | CVE_STATUS[CVE-2024-57880] = "cpe-stable-backport: Backported in 6.12.6" | ||
11083 | |||
11084 | CVE_STATUS[CVE-2024-57881] = "cpe-stable-backport: Backported in 6.12.7" | ||
11085 | |||
11086 | CVE_STATUS[CVE-2024-57882] = "cpe-stable-backport: Backported in 6.12.9" | ||
11087 | |||
11088 | CVE_STATUS[CVE-2024-57883] = "cpe-stable-backport: Backported in 6.12.9" | ||
11089 | |||
11090 | CVE_STATUS[CVE-2024-57884] = "cpe-stable-backport: Backported in 6.12.9" | ||
11091 | |||
11092 | CVE_STATUS[CVE-2024-57885] = "cpe-stable-backport: Backported in 6.12.9" | ||
11093 | |||
11094 | CVE_STATUS[CVE-2024-57886] = "cpe-stable-backport: Backported in 6.12.9" | ||
11095 | |||
11096 | CVE_STATUS[CVE-2024-57887] = "cpe-stable-backport: Backported in 6.12.9" | ||
11097 | |||
11098 | CVE_STATUS[CVE-2024-57888] = "cpe-stable-backport: Backported in 6.12.9" | ||
11099 | |||
11100 | CVE_STATUS[CVE-2024-57889] = "cpe-stable-backport: Backported in 6.12.9" | ||
11101 | |||
11102 | CVE_STATUS[CVE-2024-57890] = "cpe-stable-backport: Backported in 6.12.9" | ||
11103 | |||
11104 | CVE_STATUS[CVE-2024-57891] = "cpe-stable-backport: Backported in 6.12.9" | ||
11105 | |||
11106 | CVE_STATUS[CVE-2024-57892] = "cpe-stable-backport: Backported in 6.12.9" | ||
11107 | |||
11108 | CVE_STATUS[CVE-2024-57893] = "cpe-stable-backport: Backported in 6.12.9" | ||
11109 | |||
11110 | CVE_STATUS[CVE-2024-57895] = "cpe-stable-backport: Backported in 6.12.9" | ||
11111 | |||
11112 | CVE_STATUS[CVE-2024-57896] = "cpe-stable-backport: Backported in 6.12.9" | ||
11113 | |||
11114 | CVE_STATUS[CVE-2024-57897] = "cpe-stable-backport: Backported in 6.12.9" | ||
11115 | |||
11116 | CVE_STATUS[CVE-2024-57898] = "cpe-stable-backport: Backported in 6.12.9" | ||
11117 | |||
11118 | CVE_STATUS[CVE-2024-57899] = "cpe-stable-backport: Backported in 6.12.9" | ||
11119 | |||
11120 | CVE_STATUS[CVE-2024-57900] = "cpe-stable-backport: Backported in 6.12.9" | ||
11121 | |||
11122 | CVE_STATUS[CVE-2024-57901] = "cpe-stable-backport: Backported in 6.12.9" | ||
11123 | |||
11124 | CVE_STATUS[CVE-2024-57902] = "cpe-stable-backport: Backported in 6.12.9" | ||
11125 | |||
11126 | CVE_STATUS[CVE-2024-57903] = "cpe-stable-backport: Backported in 6.12.9" | ||
11127 | |||
11128 | CVE_STATUS[CVE-2024-57904] = "cpe-stable-backport: Backported in 6.12.10" | ||
11129 | |||
11130 | CVE_STATUS[CVE-2024-57905] = "cpe-stable-backport: Backported in 6.12.10" | ||
11131 | |||
11132 | CVE_STATUS[CVE-2024-57906] = "cpe-stable-backport: Backported in 6.12.10" | ||
11133 | |||
11134 | CVE_STATUS[CVE-2024-57907] = "cpe-stable-backport: Backported in 6.12.10" | ||
11135 | |||
11136 | CVE_STATUS[CVE-2024-57908] = "cpe-stable-backport: Backported in 6.12.10" | ||
11137 | |||
11138 | CVE_STATUS[CVE-2024-57909] = "cpe-stable-backport: Backported in 6.12.10" | ||
11139 | |||
11140 | CVE_STATUS[CVE-2024-57910] = "cpe-stable-backport: Backported in 6.12.10" | ||
11141 | |||
11142 | CVE_STATUS[CVE-2024-57911] = "cpe-stable-backport: Backported in 6.12.10" | ||
11143 | |||
11144 | CVE_STATUS[CVE-2024-57912] = "cpe-stable-backport: Backported in 6.12.10" | ||
11145 | |||
11146 | CVE_STATUS[CVE-2024-57913] = "cpe-stable-backport: Backported in 6.12.10" | ||
11147 | |||
11148 | CVE_STATUS[CVE-2024-57914] = "cpe-stable-backport: Backported in 6.12.10" | ||
11149 | |||
11150 | CVE_STATUS[CVE-2024-57916] = "cpe-stable-backport: Backported in 6.12.10" | ||
11151 | |||
11152 | CVE_STATUS[CVE-2024-57917] = "cpe-stable-backport: Backported in 6.12.10" | ||
11153 | |||
11154 | CVE_STATUS[CVE-2024-57918] = "cpe-stable-backport: Backported in 6.12.10" | ||
11155 | |||
11156 | CVE_STATUS[CVE-2024-57919] = "cpe-stable-backport: Backported in 6.12.10" | ||
11157 | |||
11158 | # CVE-2024-57920 has no known resolution | ||
11159 | |||
11160 | CVE_STATUS[CVE-2024-57921] = "cpe-stable-backport: Backported in 6.12.10" | ||
11161 | |||
11162 | CVE_STATUS[CVE-2024-57922] = "cpe-stable-backport: Backported in 6.12.10" | ||
11163 | |||
11164 | CVE_STATUS[CVE-2024-57923] = "cpe-stable-backport: Backported in 6.12.10" | ||
11165 | |||
11166 | CVE_STATUS[CVE-2024-57924] = "cpe-stable-backport: Backported in 6.12.10" | ||
11167 | |||
11168 | CVE_STATUS[CVE-2024-57925] = "cpe-stable-backport: Backported in 6.12.10" | ||
11169 | |||
11170 | CVE_STATUS[CVE-2024-57926] = "cpe-stable-backport: Backported in 6.12.10" | ||
11171 | |||
11172 | CVE_STATUS[CVE-2024-57927] = "cpe-stable-backport: Backported in 6.12.10" | ||
11173 | |||
11174 | CVE_STATUS[CVE-2024-57928] = "cpe-stable-backport: Backported in 6.12.10" | ||
11175 | |||
11176 | CVE_STATUS[CVE-2024-57929] = "cpe-stable-backport: Backported in 6.12.10" | ||
11177 | |||
11178 | CVE_STATUS[CVE-2024-57930] = "fixed-version: Fixed from version 6.12.9" | ||
11179 | |||
11180 | CVE_STATUS[CVE-2024-57931] = "cpe-stable-backport: Backported in 6.12.9" | ||
11181 | |||
11182 | CVE_STATUS[CVE-2024-57932] = "cpe-stable-backport: Backported in 6.12.9" | ||
11183 | |||
11184 | CVE_STATUS[CVE-2024-57933] = "cpe-stable-backport: Backported in 6.12.9" | ||
11185 | |||
11186 | CVE_STATUS[CVE-2024-57934] = "cpe-stable-backport: Backported in 6.12.9" | ||
11187 | |||
11188 | CVE_STATUS[CVE-2024-57935] = "fixed-version: Fixed from version 6.12.9" | ||
11189 | |||
11190 | CVE_STATUS[CVE-2024-57936] = "cpe-stable-backport: Backported in 6.12.9" | ||
11191 | |||
11192 | CVE_STATUS[CVE-2024-57938] = "cpe-stable-backport: Backported in 6.12.9" | ||
11193 | |||
11194 | CVE_STATUS[CVE-2024-57939] = "cpe-stable-backport: Backported in 6.12.10" | ||
11195 | |||
11196 | CVE_STATUS[CVE-2024-57940] = "cpe-stable-backport: Backported in 6.12.10" | ||
11197 | |||
11198 | CVE_STATUS[CVE-2024-57941] = "cpe-stable-backport: Backported in 6.12.10" | ||
11199 | |||
11200 | CVE_STATUS[CVE-2024-57942] = "cpe-stable-backport: Backported in 6.12.10" | ||
11201 | |||
11202 | CVE_STATUS[CVE-2024-57943] = "cpe-stable-backport: Backported in 6.12.10" | ||
11203 | |||
11204 | CVE_STATUS[CVE-2024-57944] = "cpe-stable-backport: Backported in 6.12.10" | ||
11205 | |||
11206 | CVE_STATUS[CVE-2024-57945] = "cpe-stable-backport: Backported in 6.12.10" | ||
11207 | |||
11208 | CVE_STATUS[CVE-2024-57946] = "cpe-stable-backport: Backported in 6.12.8" | ||
11209 | |||
11210 | CVE_STATUS[CVE-2024-57947] = "fixed-version: Fixed from version 6.11" | ||
11211 | |||
11212 | CVE_STATUS[CVE-2024-57948] = "cpe-stable-backport: Backported in 6.12.11" | ||
11213 | |||
11214 | CVE_STATUS[CVE-2024-57949] = "cpe-stable-backport: Backported in 6.12.11" | ||
11215 | |||
11216 | CVE_STATUS[CVE-2024-57950] = "cpe-stable-backport: Backported in 6.12.12" | ||
11217 | |||
11218 | CVE_STATUS[CVE-2024-57951] = "cpe-stable-backport: Backported in 6.12.11" | ||
11219 | |||
11220 | CVE_STATUS[CVE-2024-57952] = "cpe-stable-backport: Backported in 6.12.12" | ||
11221 | |||
11222 | CVE_STATUS[CVE-2024-57953] = "cpe-stable-backport: Backported in 6.12.13" | ||
11223 | |||
11224 | CVE_STATUS[CVE-2024-57973] = "cpe-stable-backport: Backported in 6.12.13" | ||
11225 | |||
11226 | CVE_STATUS[CVE-2024-57974] = "cpe-stable-backport: Backported in 6.12.13" | ||
11227 | |||
11228 | CVE_STATUS[CVE-2024-57975] = "cpe-stable-backport: Backported in 6.12.13" | ||
11229 | |||
11230 | # CVE-2024-57976 needs backporting (fixed from 6.14) | ||
11231 | |||
11232 | CVE_STATUS[CVE-2024-57977] = "cpe-stable-backport: Backported in 6.12.13" | ||
11233 | |||
11234 | CVE_STATUS[CVE-2024-57978] = "cpe-stable-backport: Backported in 6.12.13" | ||
11235 | |||
11236 | CVE_STATUS[CVE-2024-57979] = "cpe-stable-backport: Backported in 6.12.13" | ||
11237 | |||
11238 | CVE_STATUS[CVE-2024-57980] = "cpe-stable-backport: Backported in 6.12.13" | ||
11239 | |||
11240 | CVE_STATUS[CVE-2024-57981] = "cpe-stable-backport: Backported in 6.12.13" | ||
11241 | |||
11242 | CVE_STATUS[CVE-2024-57982] = "cpe-stable-backport: Backported in 6.12.13" | ||
11243 | |||
11244 | CVE_STATUS[CVE-2024-57983] = "fixed-version: only affects 6.13 onwards" | ||
11245 | |||
11246 | CVE_STATUS[CVE-2024-57984] = "cpe-stable-backport: Backported in 6.12.13" | ||
11247 | |||
11248 | CVE_STATUS[CVE-2024-57985] = "cpe-stable-backport: Backported in 6.12.13" | ||
11249 | |||
11250 | CVE_STATUS[CVE-2024-57986] = "cpe-stable-backport: Backported in 6.12.13" | ||
11251 | |||
11252 | CVE_STATUS[CVE-2024-57987] = "cpe-stable-backport: Backported in 6.12.13" | ||
11253 | |||
11254 | CVE_STATUS[CVE-2024-57988] = "cpe-stable-backport: Backported in 6.12.13" | ||
11255 | |||
11256 | CVE_STATUS[CVE-2024-57989] = "cpe-stable-backport: Backported in 6.12.13" | ||
11257 | |||
11258 | CVE_STATUS[CVE-2024-57990] = "cpe-stable-backport: Backported in 6.12.13" | ||
11259 | |||
11260 | CVE_STATUS[CVE-2024-57991] = "fixed-version: only affects 6.13 onwards" | ||
11261 | |||
11262 | CVE_STATUS[CVE-2024-57992] = "fixed-version: only affects 6.13 onwards" | ||
11263 | |||
11264 | CVE_STATUS[CVE-2024-57993] = "cpe-stable-backport: Backported in 6.12.13" | ||
11265 | |||
11266 | CVE_STATUS[CVE-2024-57994] = "cpe-stable-backport: Backported in 6.12.13" | ||
11267 | |||
11268 | # CVE-2024-57995 needs backporting (fixed from 6.14) | ||
11269 | |||
11270 | CVE_STATUS[CVE-2024-57996] = "cpe-stable-backport: Backported in 6.12.13" | ||
11271 | |||
11272 | CVE_STATUS[CVE-2024-57997] = "cpe-stable-backport: Backported in 6.12.13" | ||
11273 | |||
11274 | CVE_STATUS[CVE-2024-57998] = "cpe-stable-backport: Backported in 6.12.13" | ||
11275 | |||
11276 | CVE_STATUS[CVE-2024-57999] = "cpe-stable-backport: Backported in 6.12.13" | ||
11277 | |||
11278 | CVE_STATUS[CVE-2024-58000] = "fixed-version: only affects 6.13 onwards" | ||
11279 | |||
11280 | CVE_STATUS[CVE-2024-58001] = "cpe-stable-backport: Backported in 6.12.14" | ||
11281 | |||
11282 | CVE_STATUS[CVE-2024-58002] = "cpe-stable-backport: Backported in 6.12.14" | ||
11283 | |||
11284 | CVE_STATUS[CVE-2024-58003] = "cpe-stable-backport: Backported in 6.12.14" | ||
11285 | |||
11286 | CVE_STATUS[CVE-2024-58004] = "cpe-stable-backport: Backported in 6.12.14" | ||
11287 | |||
11288 | CVE_STATUS[CVE-2024-58005] = "cpe-stable-backport: Backported in 6.12.14" | ||
11289 | |||
11290 | CVE_STATUS[CVE-2024-58006] = "cpe-stable-backport: Backported in 6.12.14" | ||
11291 | |||
11292 | CVE_STATUS[CVE-2024-58007] = "cpe-stable-backport: Backported in 6.12.14" | ||
11293 | |||
11294 | CVE_STATUS[CVE-2024-58008] = "cpe-stable-backport: Backported in 6.12.14" | ||
11295 | |||
11296 | CVE_STATUS[CVE-2024-58009] = "cpe-stable-backport: Backported in 6.12.14" | ||
11297 | |||
11298 | CVE_STATUS[CVE-2024-58010] = "cpe-stable-backport: Backported in 6.12.14" | ||
11299 | |||
11300 | CVE_STATUS[CVE-2024-58011] = "cpe-stable-backport: Backported in 6.12.14" | ||
11301 | |||
11302 | CVE_STATUS[CVE-2024-58012] = "cpe-stable-backport: Backported in 6.12.14" | ||
11303 | |||
11304 | CVE_STATUS[CVE-2024-58013] = "cpe-stable-backport: Backported in 6.12.14" | ||
11305 | |||
11306 | CVE_STATUS[CVE-2024-58014] = "cpe-stable-backport: Backported in 6.12.14" | ||
11307 | |||
11308 | # CVE-2024-58015 needs backporting (fixed from 6.14) | ||
11309 | |||
11310 | CVE_STATUS[CVE-2024-58016] = "cpe-stable-backport: Backported in 6.12.14" | ||
11311 | |||
11312 | CVE_STATUS[CVE-2024-58017] = "cpe-stable-backport: Backported in 6.12.14" | ||
11313 | |||
11314 | CVE_STATUS[CVE-2024-58018] = "cpe-stable-backport: Backported in 6.12.14" | ||
11315 | |||
11316 | CVE_STATUS[CVE-2024-58019] = "cpe-stable-backport: Backported in 6.12.14" | ||
11317 | |||
11318 | CVE_STATUS[CVE-2024-58020] = "cpe-stable-backport: Backported in 6.12.16" | ||
11319 | |||
11320 | CVE_STATUS[CVE-2024-58021] = "cpe-stable-backport: Backported in 6.12.16" | ||
11321 | |||
11322 | CVE_STATUS[CVE-2024-58022] = "fixed-version: only affects 6.13 onwards" | ||
11323 | |||
11324 | CVE_STATUS[CVE-2024-58034] = "cpe-stable-backport: Backported in 6.12.13" | ||
11325 | |||
11326 | CVE_STATUS[CVE-2024-58042] = "cpe-stable-backport: Backported in 6.12.13" | ||
11327 | |||
11328 | CVE_STATUS[CVE-2024-58051] = "cpe-stable-backport: Backported in 6.12.13" | ||
11329 | |||
11330 | CVE_STATUS[CVE-2024-58052] = "cpe-stable-backport: Backported in 6.12.13" | ||
11331 | |||
11332 | CVE_STATUS[CVE-2024-58053] = "cpe-stable-backport: Backported in 6.12.13" | ||
11333 | |||
11334 | CVE_STATUS[CVE-2024-58054] = "cpe-stable-backport: Backported in 6.12.13" | ||
11335 | |||
11336 | CVE_STATUS[CVE-2024-58055] = "cpe-stable-backport: Backported in 6.12.13" | ||
11337 | |||
11338 | CVE_STATUS[CVE-2024-58056] = "cpe-stable-backport: Backported in 6.12.13" | ||
11339 | |||
11340 | CVE_STATUS[CVE-2024-58057] = "cpe-stable-backport: Backported in 6.12.13" | ||
11341 | |||
11342 | CVE_STATUS[CVE-2024-58058] = "cpe-stable-backport: Backported in 6.12.13" | ||
11343 | |||
11344 | CVE_STATUS[CVE-2024-58059] = "fixed-version: only affects 6.13 onwards" | ||
11345 | |||
11346 | CVE_STATUS[CVE-2024-58060] = "cpe-stable-backport: Backported in 6.12.13" | ||
11347 | |||
11348 | CVE_STATUS[CVE-2024-58061] = "cpe-stable-backport: Backported in 6.12.13" | ||
11349 | |||
11350 | CVE_STATUS[CVE-2024-58062] = "cpe-stable-backport: Backported in 6.12.13" | ||
11351 | |||
11352 | CVE_STATUS[CVE-2024-58063] = "cpe-stable-backport: Backported in 6.12.13" | ||
11353 | |||
11354 | CVE_STATUS[CVE-2024-58064] = "cpe-stable-backport: Backported in 6.12.13" | ||
11355 | |||
11356 | CVE_STATUS[CVE-2024-58065] = "fixed-version: only affects 6.13 onwards" | ||
11357 | |||
11358 | CVE_STATUS[CVE-2024-58066] = "fixed-version: only affects 6.13 onwards" | ||
11359 | |||
11360 | CVE_STATUS[CVE-2024-58067] = "fixed-version: only affects 6.13 onwards" | ||
11361 | |||
11362 | CVE_STATUS[CVE-2024-58068] = "cpe-stable-backport: Backported in 6.12.13" | ||
11363 | |||
11364 | CVE_STATUS[CVE-2024-58069] = "cpe-stable-backport: Backported in 6.12.13" | ||
11365 | |||
11366 | CVE_STATUS[CVE-2024-58070] = "cpe-stable-backport: Backported in 6.12.13" | ||
11367 | |||
11368 | CVE_STATUS[CVE-2024-58071] = "cpe-stable-backport: Backported in 6.12.13" | ||
11369 | |||
11370 | CVE_STATUS[CVE-2024-58072] = "cpe-stable-backport: Backported in 6.12.13" | ||
11371 | |||
11372 | CVE_STATUS[CVE-2024-58073] = "fixed-version: only affects 6.13 onwards" | ||
11373 | |||
11374 | # CVE-2024-58074 needs backporting (fixed from 6.14) | ||
11375 | |||
11376 | CVE_STATUS[CVE-2024-58075] = "cpe-stable-backport: Backported in 6.12.13" | ||
11377 | |||
11378 | CVE_STATUS[CVE-2024-58076] = "cpe-stable-backport: Backported in 6.12.14" | ||
11379 | |||
11380 | CVE_STATUS[CVE-2024-58077] = "cpe-stable-backport: Backported in 6.12.14" | ||
11381 | |||
11382 | CVE_STATUS[CVE-2024-58078] = "cpe-stable-backport: Backported in 6.12.14" | ||
11383 | |||
11384 | CVE_STATUS[CVE-2024-58079] = "cpe-stable-backport: Backported in 6.12.14" | ||
11385 | |||
11386 | CVE_STATUS[CVE-2024-58080] = "cpe-stable-backport: Backported in 6.12.14" | ||
11387 | |||
11388 | CVE_STATUS[CVE-2024-58081] = "cpe-stable-backport: Backported in 6.12.14" | ||
11389 | |||
11390 | CVE_STATUS[CVE-2024-58082] = "cpe-stable-backport: Backported in 6.12.14" | ||
11391 | |||
11392 | CVE_STATUS[CVE-2024-58083] = "cpe-stable-backport: Backported in 6.12.14" | ||
11393 | |||
11394 | CVE_STATUS[CVE-2024-58084] = "cpe-stable-backport: Backported in 6.12.14" | ||
11395 | |||
11396 | CVE_STATUS[CVE-2024-58085] = "cpe-stable-backport: Backported in 6.12.14" | ||
11397 | |||
11398 | CVE_STATUS[CVE-2024-58086] = "cpe-stable-backport: Backported in 6.12.16" | ||
11399 | |||
11400 | CVE_STATUS[CVE-2024-58087] = "cpe-stable-backport: Backported in 6.12.6" | ||
11401 | |||
11402 | CVE_STATUS[CVE-2024-58088] = "cpe-stable-backport: Backported in 6.12.17" | ||
11403 | |||
11404 | CVE_STATUS[CVE-2024-58089] = "cpe-stable-backport: Backported in 6.12.17" | ||
11405 | |||
11406 | CVE_STATUS[CVE-2024-58090] = "cpe-stable-backport: Backported in 6.12.18" | ||
11407 | |||
11408 | # CVE-2024-58091 needs backporting (fixed from 6.14) | ||
11409 | |||
11410 | CVE_STATUS[CVE-2024-58092] = "cpe-stable-backport: Backported in 6.12.22" | ||
11411 | |||
11412 | # CVE-2024-58093 needs backporting (fixed from 6.15) | ||
11413 | |||
11414 | # CVE-2024-58094 needs backporting (fixed from 6.15) | ||
11415 | |||
11416 | # CVE-2024-58095 needs backporting (fixed from 6.15) | ||
11417 | |||
11418 | # CVE-2024-58096 needs backporting (fixed from 6.15) | ||
11419 | |||
11420 | # CVE-2024-58097 needs backporting (fixed from 6.15) | ||
11421 | |||
11422 | CVE_STATUS[CVE-2024-58098] = "cpe-stable-backport: Backported in 6.12.25" | ||
11423 | |||
11424 | CVE_STATUS[CVE-2024-58099] = "fixed-version: Fixed from version 6.12" | ||
11425 | |||
11426 | CVE_STATUS[CVE-2024-58100] = "cpe-stable-backport: Backported in 6.12.25" | ||
11427 | |||
11428 | CVE_STATUS[CVE-2024-58237] = "cpe-stable-backport: Backported in 6.12.9" | ||
11429 | |||
11430 | CVE_STATUS[CVE-2025-21629] = "cpe-stable-backport: Backported in 6.12.9" | ||
11431 | |||
11432 | CVE_STATUS[CVE-2025-21631] = "cpe-stable-backport: Backported in 6.12.10" | ||
11433 | |||
11434 | CVE_STATUS[CVE-2025-21632] = "cpe-stable-backport: Backported in 6.12.10" | ||
11435 | |||
11436 | CVE_STATUS[CVE-2025-21634] = "cpe-stable-backport: Backported in 6.12.10" | ||
11437 | |||
11438 | CVE_STATUS[CVE-2025-21635] = "cpe-stable-backport: Backported in 6.12.10" | ||
11439 | |||
11440 | CVE_STATUS[CVE-2025-21636] = "cpe-stable-backport: Backported in 6.12.10" | ||
11441 | |||
11442 | CVE_STATUS[CVE-2025-21637] = "cpe-stable-backport: Backported in 6.12.10" | ||
11443 | |||
11444 | CVE_STATUS[CVE-2025-21638] = "cpe-stable-backport: Backported in 6.12.10" | ||
11445 | |||
11446 | CVE_STATUS[CVE-2025-21639] = "cpe-stable-backport: Backported in 6.12.10" | ||
11447 | |||
11448 | CVE_STATUS[CVE-2025-21640] = "cpe-stable-backport: Backported in 6.12.10" | ||
11449 | |||
11450 | CVE_STATUS[CVE-2025-21641] = "cpe-stable-backport: Backported in 6.12.10" | ||
11451 | |||
11452 | CVE_STATUS[CVE-2025-21642] = "cpe-stable-backport: Backported in 6.12.10" | ||
11453 | |||
11454 | CVE_STATUS[CVE-2025-21643] = "cpe-stable-backport: Backported in 6.12.10" | ||
11455 | |||
11456 | CVE_STATUS[CVE-2025-21644] = "cpe-stable-backport: Backported in 6.12.10" | ||
11457 | |||
11458 | CVE_STATUS[CVE-2025-21645] = "cpe-stable-backport: Backported in 6.12.10" | ||
11459 | |||
11460 | CVE_STATUS[CVE-2025-21646] = "cpe-stable-backport: Backported in 6.12.10" | ||
11461 | |||
11462 | CVE_STATUS[CVE-2025-21647] = "cpe-stable-backport: Backported in 6.12.10" | ||
11463 | |||
11464 | CVE_STATUS[CVE-2025-21648] = "cpe-stable-backport: Backported in 6.12.10" | ||
11465 | |||
11466 | CVE_STATUS[CVE-2025-21649] = "cpe-stable-backport: Backported in 6.12.10" | ||
11467 | |||
11468 | CVE_STATUS[CVE-2025-21650] = "cpe-stable-backport: Backported in 6.12.10" | ||
11469 | |||
11470 | CVE_STATUS[CVE-2025-21651] = "cpe-stable-backport: Backported in 6.12.10" | ||
11471 | |||
11472 | CVE_STATUS[CVE-2025-21652] = "cpe-stable-backport: Backported in 6.12.10" | ||
11473 | |||
11474 | CVE_STATUS[CVE-2025-21653] = "cpe-stable-backport: Backported in 6.12.10" | ||
11475 | |||
11476 | CVE_STATUS[CVE-2025-21654] = "cpe-stable-backport: Backported in 6.12.10" | ||
11477 | |||
11478 | CVE_STATUS[CVE-2025-21655] = "cpe-stable-backport: Backported in 6.12.10" | ||
11479 | |||
11480 | CVE_STATUS[CVE-2025-21656] = "cpe-stable-backport: Backported in 6.12.10" | ||
11481 | |||
11482 | CVE_STATUS[CVE-2025-21657] = "cpe-stable-backport: Backported in 6.12.10" | ||
11483 | |||
11484 | CVE_STATUS[CVE-2025-21658] = "cpe-stable-backport: Backported in 6.12.10" | ||
11485 | |||
11486 | CVE_STATUS[CVE-2025-21659] = "cpe-stable-backport: Backported in 6.12.10" | ||
11487 | |||
11488 | CVE_STATUS[CVE-2025-21660] = "cpe-stable-backport: Backported in 6.12.10" | ||
11489 | |||
11490 | CVE_STATUS[CVE-2025-21661] = "cpe-stable-backport: Backported in 6.12.10" | ||
11491 | |||
11492 | CVE_STATUS[CVE-2025-21662] = "cpe-stable-backport: Backported in 6.12.10" | ||
11493 | |||
11494 | CVE_STATUS[CVE-2025-21663] = "cpe-stable-backport: Backported in 6.12.10" | ||
11495 | |||
11496 | CVE_STATUS[CVE-2025-21664] = "cpe-stable-backport: Backported in 6.12.10" | ||
11497 | |||
11498 | CVE_STATUS[CVE-2025-21665] = "cpe-stable-backport: Backported in 6.12.11" | ||
11499 | |||
11500 | CVE_STATUS[CVE-2025-21666] = "cpe-stable-backport: Backported in 6.12.11" | ||
11501 | |||
11502 | CVE_STATUS[CVE-2025-21667] = "cpe-stable-backport: Backported in 6.12.11" | ||
11503 | |||
11504 | CVE_STATUS[CVE-2025-21668] = "cpe-stable-backport: Backported in 6.12.11" | ||
11505 | |||
11506 | CVE_STATUS[CVE-2025-21669] = "cpe-stable-backport: Backported in 6.12.11" | ||
11507 | |||
11508 | CVE_STATUS[CVE-2025-21670] = "cpe-stable-backport: Backported in 6.12.11" | ||
11509 | |||
11510 | CVE_STATUS[CVE-2025-21671] = "fixed-version: Fixed from version 6.12.11" | ||
11511 | |||
11512 | CVE_STATUS[CVE-2025-21672] = "cpe-stable-backport: Backported in 6.12.11" | ||
11513 | |||
11514 | CVE_STATUS[CVE-2025-21673] = "cpe-stable-backport: Backported in 6.12.11" | ||
11515 | |||
11516 | CVE_STATUS[CVE-2025-21674] = "cpe-stable-backport: Backported in 6.12.11" | ||
11517 | |||
11518 | CVE_STATUS[CVE-2025-21675] = "cpe-stable-backport: Backported in 6.12.11" | ||
11519 | |||
11520 | CVE_STATUS[CVE-2025-21676] = "cpe-stable-backport: Backported in 6.12.11" | ||
11521 | |||
11522 | CVE_STATUS[CVE-2025-21677] = "cpe-stable-backport: Backported in 6.12.11" | ||
11523 | |||
11524 | CVE_STATUS[CVE-2025-21678] = "cpe-stable-backport: Backported in 6.12.11" | ||
11525 | |||
11526 | CVE_STATUS[CVE-2025-21679] = "fixed-version: Fixed from version 6.12.11" | ||
11527 | |||
11528 | CVE_STATUS[CVE-2025-21680] = "cpe-stable-backport: Backported in 6.12.11" | ||
11529 | |||
11530 | CVE_STATUS[CVE-2025-21681] = "cpe-stable-backport: Backported in 6.12.11" | ||
11531 | |||
11532 | CVE_STATUS[CVE-2025-21682] = "cpe-stable-backport: Backported in 6.12.11" | ||
11533 | |||
11534 | CVE_STATUS[CVE-2025-21683] = "cpe-stable-backport: Backported in 6.12.11" | ||
11535 | |||
11536 | CVE_STATUS[CVE-2025-21684] = "cpe-stable-backport: Backported in 6.12.11" | ||
11537 | |||
11538 | CVE_STATUS[CVE-2025-21685] = "cpe-stable-backport: Backported in 6.12.11" | ||
11539 | |||
11540 | CVE_STATUS[CVE-2025-21687] = "cpe-stable-backport: Backported in 6.12.12" | ||
11541 | |||
11542 | CVE_STATUS[CVE-2025-21688] = "cpe-stable-backport: Backported in 6.12.12" | ||
11543 | |||
11544 | CVE_STATUS[CVE-2025-21689] = "cpe-stable-backport: Backported in 6.12.12" | ||
11545 | |||
11546 | CVE_STATUS[CVE-2025-21690] = "cpe-stable-backport: Backported in 6.12.12" | ||
11547 | |||
11548 | CVE_STATUS[CVE-2025-21691] = "cpe-stable-backport: Backported in 6.12.12" | ||
11549 | |||
11550 | CVE_STATUS[CVE-2025-21692] = "cpe-stable-backport: Backported in 6.12.12" | ||
11551 | |||
11552 | CVE_STATUS[CVE-2025-21693] = "cpe-stable-backport: Backported in 6.12.12" | ||
11553 | |||
11554 | CVE_STATUS[CVE-2025-21694] = "cpe-stable-backport: Backported in 6.12.11" | ||
11555 | |||
11556 | CVE_STATUS[CVE-2025-21695] = "cpe-stable-backport: Backported in 6.12.11" | ||
11557 | |||
11558 | CVE_STATUS[CVE-2025-21696] = "cpe-stable-backport: Backported in 6.12.11" | ||
11559 | |||
11560 | CVE_STATUS[CVE-2025-21697] = "cpe-stable-backport: Backported in 6.12.11" | ||
11561 | |||
11562 | CVE_STATUS[CVE-2025-21699] = "cpe-stable-backport: Backported in 6.12.12" | ||
11563 | |||
11564 | CVE_STATUS[CVE-2025-21700] = "cpe-stable-backport: Backported in 6.12.13" | ||
11565 | |||
11566 | CVE_STATUS[CVE-2025-21701] = "cpe-stable-backport: Backported in 6.12.13" | ||
11567 | |||
11568 | CVE_STATUS[CVE-2025-21702] = "cpe-stable-backport: Backported in 6.12.14" | ||
11569 | |||
11570 | CVE_STATUS[CVE-2025-21703] = "cpe-stable-backport: Backported in 6.12.14" | ||
11571 | |||
11572 | CVE_STATUS[CVE-2025-21704] = "cpe-stable-backport: Backported in 6.12.16" | ||
11573 | |||
11574 | CVE_STATUS[CVE-2025-21705] = "cpe-stable-backport: Backported in 6.12.13" | ||
11575 | |||
11576 | CVE_STATUS[CVE-2025-21706] = "cpe-stable-backport: Backported in 6.12.13" | ||
11577 | |||
11578 | CVE_STATUS[CVE-2025-21707] = "cpe-stable-backport: Backported in 6.12.13" | ||
11579 | |||
11580 | CVE_STATUS[CVE-2025-21708] = "cpe-stable-backport: Backported in 6.12.13" | ||
11581 | |||
11582 | # CVE-2025-21709 needs backporting (fixed from 6.14) | ||
11583 | |||
11584 | CVE_STATUS[CVE-2025-21710] = "cpe-stable-backport: Backported in 6.12.13" | ||
11585 | |||
11586 | CVE_STATUS[CVE-2025-21711] = "cpe-stable-backport: Backported in 6.12.13" | ||
11587 | |||
11588 | CVE_STATUS[CVE-2025-21712] = "cpe-stable-backport: Backported in 6.12.13" | ||
11589 | |||
11590 | CVE_STATUS[CVE-2025-21713] = "cpe-stable-backport: Backported in 6.12.13" | ||
11591 | |||
11592 | CVE_STATUS[CVE-2025-21714] = "cpe-stable-backport: Backported in 6.12.13" | ||
11593 | |||
11594 | CVE_STATUS[CVE-2025-21715] = "cpe-stable-backport: Backported in 6.12.13" | ||
11595 | |||
11596 | CVE_STATUS[CVE-2025-21716] = "cpe-stable-backport: Backported in 6.12.13" | ||
11597 | |||
11598 | CVE_STATUS[CVE-2025-21717] = "fixed-version: only affects 6.13 onwards" | ||
11599 | |||
11600 | CVE_STATUS[CVE-2025-21718] = "cpe-stable-backport: Backported in 6.12.13" | ||
11601 | |||
11602 | CVE_STATUS[CVE-2025-21719] = "cpe-stable-backport: Backported in 6.12.13" | ||
11603 | |||
11604 | CVE_STATUS[CVE-2025-21720] = "cpe-stable-backport: Backported in 6.12.13" | ||
11605 | |||
11606 | CVE_STATUS[CVE-2025-21721] = "cpe-stable-backport: Backported in 6.12.13" | ||
11607 | |||
11608 | CVE_STATUS[CVE-2025-21722] = "cpe-stable-backport: Backported in 6.12.13" | ||
11609 | |||
11610 | CVE_STATUS[CVE-2025-21723] = "cpe-stable-backport: Backported in 6.12.13" | ||
11611 | |||
11612 | CVE_STATUS[CVE-2025-21724] = "cpe-stable-backport: Backported in 6.12.13" | ||
11613 | |||
11614 | CVE_STATUS[CVE-2025-21725] = "cpe-stable-backport: Backported in 6.12.13" | ||
11615 | |||
11616 | CVE_STATUS[CVE-2025-21726] = "cpe-stable-backport: Backported in 6.12.13" | ||
11617 | |||
11618 | CVE_STATUS[CVE-2025-21727] = "cpe-stable-backport: Backported in 6.12.13" | ||
11619 | |||
11620 | CVE_STATUS[CVE-2025-21728] = "cpe-stable-backport: Backported in 6.12.13" | ||
11621 | |||
11622 | CVE_STATUS[CVE-2025-21729] = "cpe-stable-backport: Backported in 6.12.13" | ||
11623 | |||
11624 | CVE_STATUS[CVE-2025-21730] = "fixed-version: only affects 6.13 onwards" | ||
11625 | |||
11626 | CVE_STATUS[CVE-2025-21731] = "cpe-stable-backport: Backported in 6.12.13" | ||
11627 | |||
11628 | CVE_STATUS[CVE-2025-21732] = "cpe-stable-backport: Backported in 6.12.14" | ||
11629 | |||
11630 | CVE_STATUS[CVE-2025-21733] = "cpe-stable-backport: Backported in 6.12.14" | ||
11631 | |||
11632 | CVE_STATUS[CVE-2025-21734] = "cpe-stable-backport: Backported in 6.12.14" | ||
11633 | |||
11634 | CVE_STATUS[CVE-2025-21735] = "cpe-stable-backport: Backported in 6.12.14" | ||
11635 | |||
11636 | CVE_STATUS[CVE-2025-21736] = "cpe-stable-backport: Backported in 6.12.14" | ||
11637 | |||
11638 | CVE_STATUS[CVE-2025-21737] = "cpe-stable-backport: Backported in 6.12.14" | ||
11639 | |||
11640 | CVE_STATUS[CVE-2025-21738] = "cpe-stable-backport: Backported in 6.12.14" | ||
11641 | |||
11642 | CVE_STATUS[CVE-2025-21739] = "cpe-stable-backport: Backported in 6.12.14" | ||
11643 | |||
11644 | CVE_STATUS[CVE-2025-21741] = "cpe-stable-backport: Backported in 6.12.14" | ||
11645 | |||
11646 | CVE_STATUS[CVE-2025-21742] = "cpe-stable-backport: Backported in 6.12.14" | ||
11647 | |||
11648 | CVE_STATUS[CVE-2025-21743] = "cpe-stable-backport: Backported in 6.12.14" | ||
11649 | |||
11650 | CVE_STATUS[CVE-2025-21744] = "cpe-stable-backport: Backported in 6.12.14" | ||
11651 | |||
11652 | CVE_STATUS[CVE-2025-21745] = "cpe-stable-backport: Backported in 6.12.14" | ||
11653 | |||
11654 | CVE_STATUS[CVE-2025-21746] = "cpe-stable-backport: Backported in 6.12.17" | ||
11655 | |||
11656 | CVE_STATUS[CVE-2025-21747] = "fixed-version: only affects 6.13 onwards" | ||
11657 | |||
11658 | CVE_STATUS[CVE-2025-21748] = "cpe-stable-backport: Backported in 6.12.14" | ||
11659 | |||
11660 | CVE_STATUS[CVE-2025-21749] = "cpe-stable-backport: Backported in 6.12.14" | ||
11661 | |||
11662 | CVE_STATUS[CVE-2025-21750] = "cpe-stable-backport: Backported in 6.12.14" | ||
11663 | |||
11664 | # CVE-2025-21751 needs backporting (fixed from 6.14) | ||
11665 | |||
11666 | # CVE-2025-21752 needs backporting (fixed from 6.14) | ||
11667 | |||
11668 | CVE_STATUS[CVE-2025-21753] = "cpe-stable-backport: Backported in 6.12.14" | ||
11669 | |||
11670 | CVE_STATUS[CVE-2025-21754] = "cpe-stable-backport: Backported in 6.12.14" | ||
11671 | |||
11672 | CVE_STATUS[CVE-2025-21756] = "cpe-stable-backport: Backported in 6.12.16" | ||
11673 | |||
11674 | CVE_STATUS[CVE-2025-21758] = "cpe-stable-backport: Backported in 6.12.16" | ||
11675 | |||
11676 | CVE_STATUS[CVE-2025-21759] = "cpe-stable-backport: Backported in 6.12.16" | ||
11677 | |||
11678 | CVE_STATUS[CVE-2025-21760] = "cpe-stable-backport: Backported in 6.12.16" | ||
11679 | |||
11680 | CVE_STATUS[CVE-2025-21761] = "cpe-stable-backport: Backported in 6.12.16" | ||
11681 | |||
11682 | CVE_STATUS[CVE-2025-21762] = "cpe-stable-backport: Backported in 6.12.16" | ||
11683 | |||
11684 | CVE_STATUS[CVE-2025-21763] = "cpe-stable-backport: Backported in 6.12.16" | ||
11685 | |||
11686 | CVE_STATUS[CVE-2025-21764] = "cpe-stable-backport: Backported in 6.12.16" | ||
11687 | |||
11688 | CVE_STATUS[CVE-2025-21765] = "cpe-stable-backport: Backported in 6.12.16" | ||
11689 | |||
11690 | CVE_STATUS[CVE-2025-21766] = "cpe-stable-backport: Backported in 6.12.16" | ||
11691 | |||
11692 | CVE_STATUS[CVE-2025-21767] = "cpe-stable-backport: Backported in 6.12.16" | ||
11693 | |||
11694 | CVE_STATUS[CVE-2025-21768] = "cpe-stable-backport: Backported in 6.12.16" | ||
11695 | |||
11696 | CVE_STATUS[CVE-2025-21769] = "fixed-version: only affects 6.13 onwards" | ||
11697 | |||
11698 | CVE_STATUS[CVE-2025-21770] = "cpe-stable-backport: Backported in 6.12.16" | ||
11699 | |||
11700 | CVE_STATUS[CVE-2025-21771] = "cpe-stable-backport: Backported in 6.12.16" | ||
11701 | |||
11702 | CVE_STATUS[CVE-2025-21772] = "cpe-stable-backport: Backported in 6.12.16" | ||
11703 | |||
11704 | CVE_STATUS[CVE-2025-21773] = "cpe-stable-backport: Backported in 6.12.16" | ||
11705 | |||
11706 | CVE_STATUS[CVE-2025-21774] = "cpe-stable-backport: Backported in 6.12.16" | ||
11707 | |||
11708 | CVE_STATUS[CVE-2025-21775] = "cpe-stable-backport: Backported in 6.12.16" | ||
11709 | |||
11710 | CVE_STATUS[CVE-2025-21776] = "cpe-stable-backport: Backported in 6.12.16" | ||
11711 | |||
11712 | CVE_STATUS[CVE-2025-21777] = "cpe-stable-backport: Backported in 6.12.16" | ||
11713 | |||
11714 | CVE_STATUS[CVE-2025-21778] = "cpe-stable-backport: Backported in 6.12.16" | ||
11715 | |||
11716 | CVE_STATUS[CVE-2025-21779] = "cpe-stable-backport: Backported in 6.12.16" | ||
11717 | |||
11718 | CVE_STATUS[CVE-2025-21780] = "cpe-stable-backport: Backported in 6.12.16" | ||
11719 | |||
11720 | CVE_STATUS[CVE-2025-21781] = "cpe-stable-backport: Backported in 6.12.16" | ||
11721 | |||
11722 | CVE_STATUS[CVE-2025-21782] = "cpe-stable-backport: Backported in 6.12.16" | ||
11723 | |||
11724 | CVE_STATUS[CVE-2025-21783] = "cpe-stable-backport: Backported in 6.12.16" | ||
11725 | |||
11726 | CVE_STATUS[CVE-2025-21784] = "cpe-stable-backport: Backported in 6.12.16" | ||
11727 | |||
11728 | CVE_STATUS[CVE-2025-21785] = "cpe-stable-backport: Backported in 6.12.16" | ||
11729 | |||
11730 | CVE_STATUS[CVE-2025-21786] = "cpe-stable-backport: Backported in 6.12.16" | ||
11731 | |||
11732 | CVE_STATUS[CVE-2025-21787] = "cpe-stable-backport: Backported in 6.12.16" | ||
11733 | |||
11734 | CVE_STATUS[CVE-2025-21788] = "cpe-stable-backport: Backported in 6.12.16" | ||
11735 | |||
11736 | CVE_STATUS[CVE-2025-21789] = "cpe-stable-backport: Backported in 6.12.16" | ||
11737 | |||
11738 | CVE_STATUS[CVE-2025-21790] = "cpe-stable-backport: Backported in 6.12.16" | ||
11739 | |||
11740 | CVE_STATUS[CVE-2025-21791] = "cpe-stable-backport: Backported in 6.12.16" | ||
11741 | |||
11742 | CVE_STATUS[CVE-2025-21792] = "cpe-stable-backport: Backported in 6.12.16" | ||
11743 | |||
11744 | CVE_STATUS[CVE-2025-21793] = "cpe-stable-backport: Backported in 6.12.16" | ||
11745 | |||
11746 | CVE_STATUS[CVE-2025-21794] = "cpe-stable-backport: Backported in 6.12.16" | ||
11747 | |||
11748 | CVE_STATUS[CVE-2025-21795] = "cpe-stable-backport: Backported in 6.12.16" | ||
11749 | |||
11750 | CVE_STATUS[CVE-2025-21796] = "cpe-stable-backport: Backported in 6.12.16" | ||
11751 | |||
11752 | CVE_STATUS[CVE-2025-21797] = "fixed-version: only affects 6.13 onwards" | ||
11753 | |||
11754 | CVE_STATUS[CVE-2025-21798] = "cpe-stable-backport: Backported in 6.12.13" | ||
11755 | |||
11756 | CVE_STATUS[CVE-2025-21799] = "cpe-stable-backport: Backported in 6.12.13" | ||
11757 | |||
11758 | CVE_STATUS[CVE-2025-21800] = "cpe-stable-backport: Backported in 6.12.13" | ||
11759 | |||
11760 | CVE_STATUS[CVE-2025-21801] = "cpe-stable-backport: Backported in 6.12.13" | ||
11761 | |||
11762 | CVE_STATUS[CVE-2025-21802] = "cpe-stable-backport: Backported in 6.12.13" | ||
11763 | |||
11764 | CVE_STATUS[CVE-2025-21803] = "cpe-stable-backport: Backported in 6.12.13" | ||
11765 | |||
11766 | CVE_STATUS[CVE-2025-21804] = "cpe-stable-backport: Backported in 6.12.13" | ||
11767 | |||
11768 | CVE_STATUS[CVE-2025-21805] = "cpe-stable-backport: Backported in 6.12.13" | ||
11769 | |||
11770 | CVE_STATUS[CVE-2025-21806] = "cpe-stable-backport: Backported in 6.12.13" | ||
11771 | |||
11772 | # CVE-2025-21807 needs backporting (fixed from 6.14) | ||
11773 | |||
11774 | CVE_STATUS[CVE-2025-21808] = "cpe-stable-backport: Backported in 6.12.13" | ||
11775 | |||
11776 | CVE_STATUS[CVE-2025-21809] = "cpe-stable-backport: Backported in 6.12.13" | ||
11777 | |||
11778 | CVE_STATUS[CVE-2025-21810] = "cpe-stable-backport: Backported in 6.12.13" | ||
11779 | |||
11780 | CVE_STATUS[CVE-2025-21811] = "cpe-stable-backport: Backported in 6.12.13" | ||
11781 | |||
11782 | CVE_STATUS[CVE-2025-21812] = "cpe-stable-backport: Backported in 6.12.13" | ||
11783 | |||
11784 | CVE_STATUS[CVE-2025-21813] = "cpe-stable-backport: Backported in 6.12.14" | ||
11785 | |||
11786 | CVE_STATUS[CVE-2025-21814] = "cpe-stable-backport: Backported in 6.12.14" | ||
11787 | |||
11788 | CVE_STATUS[CVE-2025-21815] = "cpe-stable-backport: Backported in 6.12.14" | ||
11789 | |||
11790 | CVE_STATUS[CVE-2025-21816] = "cpe-stable-backport: Backported in 6.12.14" | ||
11791 | |||
11792 | # CVE-2025-21817 needs backporting (fixed from 6.14) | ||
11793 | |||
11794 | CVE_STATUS[CVE-2025-21819] = "cpe-stable-backport: Backported in 6.12.14" | ||
11795 | |||
11796 | CVE_STATUS[CVE-2025-21820] = "cpe-stable-backport: Backported in 6.12.14" | ||
11797 | |||
11798 | CVE_STATUS[CVE-2025-21821] = "cpe-stable-backport: Backported in 6.12.16" | ||
11799 | |||
11800 | CVE_STATUS[CVE-2025-21822] = "fixed-version: only affects 6.13 onwards" | ||
11801 | |||
11802 | CVE_STATUS[CVE-2025-21823] = "cpe-stable-backport: Backported in 6.12.16" | ||
11803 | |||
11804 | CVE_STATUS[CVE-2025-21824] = "cpe-stable-backport: Backported in 6.12.16" | ||
11805 | |||
11806 | CVE_STATUS[CVE-2025-21825] = "cpe-stable-backport: Backported in 6.12.13" | ||
11807 | |||
11808 | CVE_STATUS[CVE-2025-21826] = "cpe-stable-backport: Backported in 6.12.13" | ||
11809 | |||
11810 | CVE_STATUS[CVE-2025-21827] = "cpe-stable-backport: Backported in 6.12.13" | ||
11811 | |||
11812 | CVE_STATUS[CVE-2025-21828] = "cpe-stable-backport: Backported in 6.12.13" | ||
11813 | |||
11814 | CVE_STATUS[CVE-2025-21829] = "cpe-stable-backport: Backported in 6.12.13" | ||
11815 | |||
11816 | CVE_STATUS[CVE-2025-21830] = "cpe-stable-backport: Backported in 6.12.13" | ||
11817 | |||
11818 | CVE_STATUS[CVE-2025-21831] = "cpe-stable-backport: Backported in 6.12.14" | ||
11819 | |||
11820 | CVE_STATUS[CVE-2025-21832] = "cpe-stable-backport: Backported in 6.12.14" | ||
11821 | |||
11822 | # CVE-2025-21833 needs backporting (fixed from 6.14) | ||
11823 | |||
11824 | CVE_STATUS[CVE-2025-21834] = "cpe-stable-backport: Backported in 6.12.14" | ||
11825 | |||
11826 | CVE_STATUS[CVE-2025-21835] = "cpe-stable-backport: Backported in 6.12.16" | ||
11827 | |||
11828 | CVE_STATUS[CVE-2025-21836] = "cpe-stable-backport: Backported in 6.12.16" | ||
11829 | |||
11830 | CVE_STATUS[CVE-2025-21838] = "cpe-stable-backport: Backported in 6.12.16" | ||
11831 | |||
11832 | CVE_STATUS[CVE-2025-21839] = "cpe-stable-backport: Backported in 6.12.16" | ||
11833 | |||
11834 | CVE_STATUS[CVE-2025-21840] = "fixed-version: only affects 6.13 onwards" | ||
11835 | |||
11836 | CVE_STATUS[CVE-2025-21841] = "cpe-stable-backport: Backported in 6.12.16" | ||
11837 | |||
11838 | CVE_STATUS[CVE-2025-21842] = "cpe-stable-backport: Backported in 6.12.16" | ||
11839 | |||
11840 | CVE_STATUS[CVE-2025-21843] = "fixed-version: only affects 6.13 onwards" | ||
11841 | |||
11842 | CVE_STATUS[CVE-2025-21844] = "cpe-stable-backport: Backported in 6.12.17" | ||
11843 | |||
11844 | CVE_STATUS[CVE-2025-21845] = "cpe-stable-backport: Backported in 6.12.17" | ||
11845 | |||
11846 | CVE_STATUS[CVE-2025-21846] = "cpe-stable-backport: Backported in 6.12.17" | ||
11847 | |||
11848 | CVE_STATUS[CVE-2025-21847] = "cpe-stable-backport: Backported in 6.12.17" | ||
11849 | |||
11850 | CVE_STATUS[CVE-2025-21848] = "cpe-stable-backport: Backported in 6.12.17" | ||
11851 | |||
11852 | CVE_STATUS[CVE-2025-21849] = "cpe-stable-backport: Backported in 6.12.17" | ||
11853 | |||
11854 | CVE_STATUS[CVE-2025-21850] = "fixed-version: only affects 6.13 onwards" | ||
11855 | |||
11856 | CVE_STATUS[CVE-2025-21851] = "cpe-stable-backport: Backported in 6.12.17" | ||
11857 | |||
11858 | CVE_STATUS[CVE-2025-21852] = "cpe-stable-backport: Backported in 6.12.17" | ||
11859 | |||
11860 | CVE_STATUS[CVE-2025-21853] = "cpe-stable-backport: Backported in 6.12.17" | ||
11861 | |||
11862 | CVE_STATUS[CVE-2025-21854] = "cpe-stable-backport: Backported in 6.12.17" | ||
11863 | |||
11864 | CVE_STATUS[CVE-2025-21855] = "cpe-stable-backport: Backported in 6.12.17" | ||
11865 | |||
11866 | CVE_STATUS[CVE-2025-21856] = "cpe-stable-backport: Backported in 6.12.17" | ||
11867 | |||
11868 | CVE_STATUS[CVE-2025-21857] = "cpe-stable-backport: Backported in 6.12.17" | ||
11869 | |||
11870 | CVE_STATUS[CVE-2025-21858] = "cpe-stable-backport: Backported in 6.12.17" | ||
11871 | |||
11872 | CVE_STATUS[CVE-2025-21859] = "cpe-stable-backport: Backported in 6.12.17" | ||
11873 | |||
11874 | CVE_STATUS[CVE-2025-21860] = "fixed-version: only affects 6.13 onwards" | ||
11875 | |||
11876 | CVE_STATUS[CVE-2025-21861] = "cpe-stable-backport: Backported in 6.12.17" | ||
11877 | |||
11878 | CVE_STATUS[CVE-2025-21862] = "cpe-stable-backport: Backported in 6.12.17" | ||
11879 | |||
11880 | CVE_STATUS[CVE-2025-21863] = "cpe-stable-backport: Backported in 6.12.17" | ||
11881 | |||
11882 | CVE_STATUS[CVE-2025-21864] = "cpe-stable-backport: Backported in 6.12.17" | ||
11883 | |||
11884 | CVE_STATUS[CVE-2025-21865] = "cpe-stable-backport: Backported in 6.12.17" | ||
11885 | |||
11886 | CVE_STATUS[CVE-2025-21866] = "cpe-stable-backport: Backported in 6.12.17" | ||
11887 | |||
11888 | CVE_STATUS[CVE-2025-21867] = "cpe-stable-backport: Backported in 6.12.17" | ||
11889 | |||
11890 | CVE_STATUS[CVE-2025-21868] = "cpe-stable-backport: Backported in 6.12.17" | ||
11891 | |||
11892 | CVE_STATUS[CVE-2025-21869] = "cpe-stable-backport: Backported in 6.12.17" | ||
11893 | |||
11894 | CVE_STATUS[CVE-2025-21870] = "cpe-stable-backport: Backported in 6.12.17" | ||
11895 | |||
11896 | CVE_STATUS[CVE-2025-21871] = "cpe-stable-backport: Backported in 6.12.17" | ||
11897 | |||
11898 | CVE_STATUS[CVE-2025-21872] = "cpe-stable-backport: Backported in 6.12.18" | ||
11899 | |||
11900 | CVE_STATUS[CVE-2025-21873] = "cpe-stable-backport: Backported in 6.12.18" | ||
11901 | |||
11902 | CVE_STATUS[CVE-2025-21874] = "cpe-stable-backport: Backported in 6.12.18" | ||
11903 | |||
11904 | CVE_STATUS[CVE-2025-21875] = "cpe-stable-backport: Backported in 6.12.18" | ||
11905 | |||
11906 | CVE_STATUS[CVE-2025-21876] = "cpe-stable-backport: Backported in 6.12.18" | ||
11907 | |||
11908 | CVE_STATUS[CVE-2025-21877] = "cpe-stable-backport: Backported in 6.12.18" | ||
11909 | |||
11910 | CVE_STATUS[CVE-2025-21878] = "cpe-stable-backport: Backported in 6.12.18" | ||
11911 | |||
11912 | CVE_STATUS[CVE-2025-21879] = "fixed-version: only affects 6.13 onwards" | ||
11913 | |||
11914 | CVE_STATUS[CVE-2025-21880] = "cpe-stable-backport: Backported in 6.12.18" | ||
11915 | |||
11916 | CVE_STATUS[CVE-2025-21881] = "cpe-stable-backport: Backported in 6.12.18" | ||
11917 | |||
11918 | CVE_STATUS[CVE-2025-21882] = "fixed-version: only affects 6.13 onwards" | ||
11919 | |||
11920 | CVE_STATUS[CVE-2025-21883] = "cpe-stable-backport: Backported in 6.12.18" | ||
11921 | |||
11922 | # CVE-2025-21884 needs backporting (fixed from 6.14) | ||
11923 | |||
11924 | CVE_STATUS[CVE-2025-21885] = "cpe-stable-backport: Backported in 6.12.18" | ||
11925 | |||
11926 | CVE_STATUS[CVE-2025-21886] = "cpe-stable-backport: Backported in 6.12.18" | ||
11927 | |||
11928 | CVE_STATUS[CVE-2025-21887] = "cpe-stable-backport: Backported in 6.12.18" | ||
11929 | |||
11930 | CVE_STATUS[CVE-2025-21888] = "cpe-stable-backport: Backported in 6.12.18" | ||
11931 | |||
11932 | CVE_STATUS[CVE-2025-21889] = "cpe-stable-backport: Backported in 6.12.18" | ||
11933 | |||
11934 | CVE_STATUS[CVE-2025-21890] = "cpe-stable-backport: Backported in 6.12.18" | ||
11935 | |||
11936 | CVE_STATUS[CVE-2025-21891] = "cpe-stable-backport: Backported in 6.12.18" | ||
11937 | |||
11938 | CVE_STATUS[CVE-2025-21892] = "cpe-stable-backport: Backported in 6.12.18" | ||
11939 | |||
11940 | CVE_STATUS[CVE-2025-21893] = "cpe-stable-backport: Backported in 6.12.21" | ||
11941 | |||
11942 | CVE_STATUS[CVE-2025-21894] = "cpe-stable-backport: Backported in 6.12.18" | ||
11943 | |||
11944 | CVE_STATUS[CVE-2025-21895] = "cpe-stable-backport: Backported in 6.12.18" | ||
11945 | |||
11946 | CVE_STATUS[CVE-2025-21896] = "fixed-version: only affects 6.13 onwards" | ||
11947 | |||
11948 | CVE_STATUS[CVE-2025-21897] = "cpe-stable-backport: Backported in 6.12.18" | ||
11949 | |||
11950 | CVE_STATUS[CVE-2025-21898] = "cpe-stable-backport: Backported in 6.12.18" | ||
11951 | |||
11952 | CVE_STATUS[CVE-2025-21899] = "cpe-stable-backport: Backported in 6.12.18" | ||
11953 | |||
11954 | CVE_STATUS[CVE-2025-21900] = "cpe-stable-backport: Backported in 6.12.18" | ||
11955 | |||
11956 | CVE_STATUS[CVE-2025-21901] = "cpe-stable-backport: Backported in 6.12.18" | ||
11957 | |||
11958 | CVE_STATUS[CVE-2025-21902] = "cpe-stable-backport: Backported in 6.12.19" | ||
11959 | |||
11960 | CVE_STATUS[CVE-2025-21903] = "cpe-stable-backport: Backported in 6.12.19" | ||
11961 | |||
11962 | CVE_STATUS[CVE-2025-21904] = "cpe-stable-backport: Backported in 6.12.19" | ||
11963 | |||
11964 | CVE_STATUS[CVE-2025-21905] = "cpe-stable-backport: Backported in 6.12.19" | ||
11965 | |||
11966 | CVE_STATUS[CVE-2025-21906] = "cpe-stable-backport: Backported in 6.12.19" | ||
11967 | |||
11968 | CVE_STATUS[CVE-2025-21907] = "cpe-stable-backport: Backported in 6.12.19" | ||
11969 | |||
11970 | CVE_STATUS[CVE-2025-21908] = "cpe-stable-backport: Backported in 6.12.19" | ||
11971 | |||
11972 | CVE_STATUS[CVE-2025-21909] = "cpe-stable-backport: Backported in 6.12.19" | ||
11973 | |||
11974 | CVE_STATUS[CVE-2025-21910] = "cpe-stable-backport: Backported in 6.12.19" | ||
11975 | |||
11976 | CVE_STATUS[CVE-2025-21911] = "cpe-stable-backport: Backported in 6.12.19" | ||
11977 | |||
11978 | CVE_STATUS[CVE-2025-21912] = "cpe-stable-backport: Backported in 6.12.19" | ||
11979 | |||
11980 | CVE_STATUS[CVE-2025-21913] = "cpe-stable-backport: Backported in 6.12.19" | ||
11981 | |||
11982 | CVE_STATUS[CVE-2025-21914] = "cpe-stable-backport: Backported in 6.12.19" | ||
11983 | |||
11984 | CVE_STATUS[CVE-2025-21915] = "cpe-stable-backport: Backported in 6.12.19" | ||
11985 | |||
11986 | CVE_STATUS[CVE-2025-21916] = "cpe-stable-backport: Backported in 6.12.19" | ||
11987 | |||
11988 | CVE_STATUS[CVE-2025-21917] = "cpe-stable-backport: Backported in 6.12.19" | ||
11989 | |||
11990 | CVE_STATUS[CVE-2025-21918] = "cpe-stable-backport: Backported in 6.12.19" | ||
11991 | |||
11992 | CVE_STATUS[CVE-2025-21919] = "cpe-stable-backport: Backported in 6.12.19" | ||
11993 | |||
11994 | CVE_STATUS[CVE-2025-21920] = "cpe-stable-backport: Backported in 6.12.19" | ||
11995 | |||
11996 | CVE_STATUS[CVE-2025-21921] = "cpe-stable-backport: Backported in 6.12.19" | ||
11997 | |||
11998 | CVE_STATUS[CVE-2025-21922] = "cpe-stable-backport: Backported in 6.12.19" | ||
11999 | |||
12000 | CVE_STATUS[CVE-2025-21923] = "cpe-stable-backport: Backported in 6.12.19" | ||
12001 | |||
12002 | CVE_STATUS[CVE-2025-21924] = "cpe-stable-backport: Backported in 6.12.19" | ||
12003 | |||
12004 | CVE_STATUS[CVE-2025-21925] = "cpe-stable-backport: Backported in 6.12.19" | ||
12005 | |||
12006 | CVE_STATUS[CVE-2025-21926] = "cpe-stable-backport: Backported in 6.12.19" | ||
12007 | |||
12008 | CVE_STATUS[CVE-2025-21927] = "cpe-stable-backport: Backported in 6.12.19" | ||
12009 | |||
12010 | CVE_STATUS[CVE-2025-21928] = "cpe-stable-backport: Backported in 6.12.19" | ||
12011 | |||
12012 | CVE_STATUS[CVE-2025-21929] = "cpe-stable-backport: Backported in 6.12.19" | ||
12013 | |||
12014 | CVE_STATUS[CVE-2025-21930] = "cpe-stable-backport: Backported in 6.12.19" | ||
12015 | |||
12016 | CVE_STATUS[CVE-2025-21931] = "cpe-stable-backport: Backported in 6.12.19" | ||
12017 | |||
12018 | CVE_STATUS[CVE-2025-21932] = "cpe-stable-backport: Backported in 6.12.19" | ||
12019 | |||
12020 | CVE_STATUS[CVE-2025-21933] = "fixed-version: only affects 6.13 onwards" | ||
12021 | |||
12022 | CVE_STATUS[CVE-2025-21934] = "cpe-stable-backport: Backported in 6.12.19" | ||
12023 | |||
12024 | CVE_STATUS[CVE-2025-21935] = "cpe-stable-backport: Backported in 6.12.19" | ||
12025 | |||
12026 | CVE_STATUS[CVE-2025-21936] = "cpe-stable-backport: Backported in 6.12.19" | ||
12027 | |||
12028 | CVE_STATUS[CVE-2025-21937] = "cpe-stable-backport: Backported in 6.12.19" | ||
12029 | |||
12030 | CVE_STATUS[CVE-2025-21938] = "cpe-stable-backport: Backported in 6.12.19" | ||
12031 | |||
12032 | CVE_STATUS[CVE-2025-21939] = "cpe-stable-backport: Backported in 6.12.19" | ||
12033 | |||
12034 | CVE_STATUS[CVE-2025-21940] = "cpe-stable-backport: Backported in 6.12.19" | ||
12035 | |||
12036 | CVE_STATUS[CVE-2025-21941] = "cpe-stable-backport: Backported in 6.12.19" | ||
12037 | |||
12038 | CVE_STATUS[CVE-2025-21942] = "fixed-version: only affects 6.13.2 onwards" | ||
12039 | |||
12040 | CVE_STATUS[CVE-2025-21943] = "cpe-stable-backport: Backported in 6.12.19" | ||
12041 | |||
12042 | CVE_STATUS[CVE-2025-21944] = "cpe-stable-backport: Backported in 6.12.19" | ||
12043 | |||
12044 | CVE_STATUS[CVE-2025-21945] = "cpe-stable-backport: Backported in 6.12.19" | ||
12045 | |||
12046 | CVE_STATUS[CVE-2025-21946] = "cpe-stable-backport: Backported in 6.12.19" | ||
12047 | |||
12048 | CVE_STATUS[CVE-2025-21947] = "cpe-stable-backport: Backported in 6.12.19" | ||
12049 | |||
12050 | CVE_STATUS[CVE-2025-21948] = "cpe-stable-backport: Backported in 6.12.19" | ||
12051 | |||
12052 | # CVE-2025-21949 needs backporting (fixed from 6.14) | ||
12053 | |||
12054 | CVE_STATUS[CVE-2025-21950] = "cpe-stable-backport: Backported in 6.12.19" | ||
12055 | |||
12056 | CVE_STATUS[CVE-2025-21951] = "cpe-stable-backport: Backported in 6.12.19" | ||
12057 | |||
12058 | CVE_STATUS[CVE-2025-21952] = "fixed-version: only affects 6.13 onwards" | ||
12059 | |||
12060 | CVE_STATUS[CVE-2025-21953] = "fixed-version: only affects 6.13 onwards" | ||
12061 | |||
12062 | CVE_STATUS[CVE-2025-21954] = "cpe-stable-backport: Backported in 6.12.20" | ||
12063 | |||
12064 | CVE_STATUS[CVE-2025-21955] = "cpe-stable-backport: Backported in 6.12.20" | ||
12065 | |||
12066 | CVE_STATUS[CVE-2025-21956] = "cpe-stable-backport: Backported in 6.12.20" | ||
12067 | |||
12068 | CVE_STATUS[CVE-2025-21957] = "cpe-stable-backport: Backported in 6.12.20" | ||
12069 | |||
12070 | CVE_STATUS[CVE-2025-21958] = "cpe-stable-backport: Backported in 6.12.20" | ||
12071 | |||
12072 | CVE_STATUS[CVE-2025-21959] = "cpe-stable-backport: Backported in 6.12.20" | ||
12073 | |||
12074 | CVE_STATUS[CVE-2025-21960] = "cpe-stable-backport: Backported in 6.12.20" | ||
12075 | |||
12076 | CVE_STATUS[CVE-2025-21961] = "cpe-stable-backport: Backported in 6.12.20" | ||
12077 | |||
12078 | CVE_STATUS[CVE-2025-21962] = "cpe-stable-backport: Backported in 6.12.20" | ||
12079 | |||
12080 | CVE_STATUS[CVE-2025-21963] = "cpe-stable-backport: Backported in 6.12.20" | ||
12081 | |||
12082 | CVE_STATUS[CVE-2025-21964] = "cpe-stable-backport: Backported in 6.12.20" | ||
12083 | |||
12084 | CVE_STATUS[CVE-2025-21965] = "cpe-stable-backport: Backported in 6.12.20" | ||
12085 | |||
12086 | CVE_STATUS[CVE-2025-21966] = "cpe-stable-backport: Backported in 6.12.20" | ||
12087 | |||
12088 | CVE_STATUS[CVE-2025-21967] = "cpe-stable-backport: Backported in 6.12.20" | ||
12089 | |||
12090 | CVE_STATUS[CVE-2025-21968] = "cpe-stable-backport: Backported in 6.12.20" | ||
12091 | |||
12092 | CVE_STATUS[CVE-2025-21969] = "cpe-stable-backport: Backported in 6.12.20" | ||
12093 | |||
12094 | CVE_STATUS[CVE-2025-21970] = "cpe-stable-backport: Backported in 6.12.20" | ||
12095 | |||
12096 | CVE_STATUS[CVE-2025-21971] = "cpe-stable-backport: Backported in 6.12.20" | ||
12097 | |||
12098 | CVE_STATUS[CVE-2025-21972] = "cpe-stable-backport: Backported in 6.12.20" | ||
12099 | |||
12100 | CVE_STATUS[CVE-2025-21973] = "cpe-stable-backport: Backported in 6.12.20" | ||
12101 | |||
12102 | CVE_STATUS[CVE-2025-21974] = "cpe-stable-backport: Backported in 6.12.20" | ||
12103 | |||
12104 | CVE_STATUS[CVE-2025-21975] = "cpe-stable-backport: Backported in 6.12.20" | ||
12105 | |||
12106 | CVE_STATUS[CVE-2025-21976] = "cpe-stable-backport: Backported in 6.12.20" | ||
12107 | |||
12108 | CVE_STATUS[CVE-2025-21977] = "cpe-stable-backport: Backported in 6.12.20" | ||
12109 | |||
12110 | CVE_STATUS[CVE-2025-21978] = "cpe-stable-backport: Backported in 6.12.20" | ||
12111 | |||
12112 | CVE_STATUS[CVE-2025-21979] = "cpe-stable-backport: Backported in 6.12.20" | ||
12113 | |||
12114 | CVE_STATUS[CVE-2025-21980] = "cpe-stable-backport: Backported in 6.12.20" | ||
12115 | |||
12116 | CVE_STATUS[CVE-2025-21981] = "cpe-stable-backport: Backported in 6.12.20" | ||
12117 | |||
12118 | CVE_STATUS[CVE-2025-21982] = "cpe-stable-backport: Backported in 6.12.20" | ||
12119 | |||
12120 | CVE_STATUS[CVE-2025-21983] = "cpe-stable-backport: Backported in 6.12.20" | ||
12121 | |||
12122 | CVE_STATUS[CVE-2025-21984] = "cpe-stable-backport: Backported in 6.12.20" | ||
12123 | |||
12124 | CVE_STATUS[CVE-2025-21985] = "cpe-stable-backport: Backported in 6.12.20" | ||
12125 | |||
12126 | CVE_STATUS[CVE-2025-21986] = "cpe-stable-backport: Backported in 6.12.20" | ||
12127 | |||
12128 | CVE_STATUS[CVE-2025-21987] = "cpe-stable-backport: Backported in 6.12.18" | ||
12129 | |||
12130 | # CVE-2025-21988 has no known resolution | ||
12131 | |||
12132 | CVE_STATUS[CVE-2025-21989] = "cpe-stable-backport: Backported in 6.12.20" | ||
12133 | |||
12134 | CVE_STATUS[CVE-2025-21990] = "cpe-stable-backport: Backported in 6.12.20" | ||
12135 | |||
12136 | CVE_STATUS[CVE-2025-21991] = "cpe-stable-backport: Backported in 6.12.20" | ||
12137 | |||
12138 | CVE_STATUS[CVE-2025-21992] = "cpe-stable-backport: Backported in 6.12.20" | ||
12139 | |||
12140 | CVE_STATUS[CVE-2025-21993] = "cpe-stable-backport: Backported in 6.12.20" | ||
12141 | |||
12142 | CVE_STATUS[CVE-2025-21994] = "cpe-stable-backport: Backported in 6.12.21" | ||
12143 | |||
12144 | CVE_STATUS[CVE-2025-21995] = "cpe-stable-backport: Backported in 6.12.21" | ||
12145 | |||
12146 | CVE_STATUS[CVE-2025-21996] = "cpe-stable-backport: Backported in 6.12.21" | ||
12147 | |||
12148 | CVE_STATUS[CVE-2025-21997] = "cpe-stable-backport: Backported in 6.12.21" | ||
12149 | |||
12150 | CVE_STATUS[CVE-2025-21998] = "cpe-stable-backport: Backported in 6.12.21" | ||
12151 | |||
12152 | CVE_STATUS[CVE-2025-21999] = "cpe-stable-backport: Backported in 6.12.21" | ||
12153 | |||
12154 | CVE_STATUS[CVE-2025-22000] = "cpe-stable-backport: Backported in 6.12.21" | ||
12155 | |||
12156 | CVE_STATUS[CVE-2025-22001] = "cpe-stable-backport: Backported in 6.12.21" | ||
12157 | |||
12158 | CVE_STATUS[CVE-2025-22002] = "cpe-stable-backport: Backported in 6.12.21" | ||
12159 | |||
12160 | CVE_STATUS[CVE-2025-22003] = "cpe-stable-backport: Backported in 6.12.21" | ||
12161 | |||
12162 | CVE_STATUS[CVE-2025-22004] = "cpe-stable-backport: Backported in 6.12.21" | ||
12163 | |||
12164 | CVE_STATUS[CVE-2025-22005] = "cpe-stable-backport: Backported in 6.12.21" | ||
12165 | |||
12166 | CVE_STATUS[CVE-2025-22006] = "cpe-stable-backport: Backported in 6.12.21" | ||
12167 | |||
12168 | CVE_STATUS[CVE-2025-22007] = "cpe-stable-backport: Backported in 6.12.21" | ||
12169 | |||
12170 | CVE_STATUS[CVE-2025-22008] = "cpe-stable-backport: Backported in 6.12.21" | ||
12171 | |||
12172 | CVE_STATUS[CVE-2025-22009] = "cpe-stable-backport: Backported in 6.12.21" | ||
12173 | |||
12174 | CVE_STATUS[CVE-2025-22010] = "cpe-stable-backport: Backported in 6.12.21" | ||
12175 | |||
12176 | CVE_STATUS[CVE-2025-22011] = "cpe-stable-backport: Backported in 6.12.21" | ||
12177 | |||
12178 | CVE_STATUS[CVE-2025-22012] = "fixed-version: only affects 6.13 onwards" | ||
12179 | |||
12180 | CVE_STATUS[CVE-2025-22013] = "cpe-stable-backport: Backported in 6.12.21" | ||
12181 | |||
12182 | CVE_STATUS[CVE-2025-22014] = "cpe-stable-backport: Backported in 6.12.21" | ||
12183 | |||
12184 | CVE_STATUS[CVE-2025-22015] = "cpe-stable-backport: Backported in 6.12.21" | ||
12185 | |||
12186 | CVE_STATUS[CVE-2025-22016] = "cpe-stable-backport: Backported in 6.12.21" | ||
12187 | |||
12188 | CVE_STATUS[CVE-2025-22017] = "cpe-stable-backport: Backported in 6.12.21" | ||
12189 | |||
12190 | CVE_STATUS[CVE-2025-22018] = "cpe-stable-backport: Backported in 6.12.22" | ||
12191 | |||
12192 | CVE_STATUS[CVE-2025-22019] = "cpe-stable-backport: Backported in 6.12.22" | ||
12193 | |||
12194 | CVE_STATUS[CVE-2025-22020] = "cpe-stable-backport: Backported in 6.12.22" | ||
12195 | |||
12196 | CVE_STATUS[CVE-2025-22021] = "cpe-stable-backport: Backported in 6.12.22" | ||
12197 | |||
12198 | CVE_STATUS[CVE-2025-22022] = "cpe-stable-backport: Backported in 6.12.22" | ||
12199 | |||
12200 | CVE_STATUS[CVE-2025-22023] = "cpe-stable-backport: Backported in 6.12.22" | ||
12201 | |||
12202 | CVE_STATUS[CVE-2025-22024] = "cpe-stable-backport: Backported in 6.12.23" | ||
12203 | |||
12204 | CVE_STATUS[CVE-2025-22025] = "cpe-stable-backport: Backported in 6.12.23" | ||
12205 | |||
12206 | CVE_STATUS[CVE-2025-22026] = "cpe-stable-backport: Backported in 6.12.24" | ||
12207 | |||
12208 | CVE_STATUS[CVE-2025-22027] = "cpe-stable-backport: Backported in 6.12.23" | ||
12209 | |||
12210 | CVE_STATUS[CVE-2025-22028] = "cpe-stable-backport: Backported in 6.12.23" | ||
12211 | |||
12212 | CVE_STATUS[CVE-2025-22030] = "cpe-stable-backport: Backported in 6.12.23" | ||
12213 | |||
12214 | CVE_STATUS[CVE-2025-22031] = "fixed-version: only affects 6.13 onwards" | ||
12215 | |||
12216 | CVE_STATUS[CVE-2025-22032] = "cpe-stable-backport: Backported in 6.12.23" | ||
12217 | |||
12218 | CVE_STATUS[CVE-2025-22033] = "cpe-stable-backport: Backported in 6.12.23" | ||
12219 | |||
12220 | CVE_STATUS[CVE-2025-22034] = "cpe-stable-backport: Backported in 6.12.23" | ||
12221 | |||
12222 | CVE_STATUS[CVE-2025-22035] = "cpe-stable-backport: Backported in 6.12.23" | ||
12223 | |||
12224 | CVE_STATUS[CVE-2025-22036] = "cpe-stable-backport: Backported in 6.12.23" | ||
12225 | |||
12226 | CVE_STATUS[CVE-2025-22037] = "cpe-stable-backport: Backported in 6.12.23" | ||
12227 | |||
12228 | CVE_STATUS[CVE-2025-22038] = "cpe-stable-backport: Backported in 6.12.23" | ||
12229 | |||
12230 | CVE_STATUS[CVE-2025-22039] = "cpe-stable-backport: Backported in 6.12.23" | ||
12231 | |||
12232 | CVE_STATUS[CVE-2025-22040] = "cpe-stable-backport: Backported in 6.12.23" | ||
12233 | |||
12234 | CVE_STATUS[CVE-2025-22041] = "cpe-stable-backport: Backported in 6.12.23" | ||
12235 | |||
12236 | CVE_STATUS[CVE-2025-22042] = "cpe-stable-backport: Backported in 6.12.23" | ||
12237 | |||
12238 | CVE_STATUS[CVE-2025-22043] = "cpe-stable-backport: Backported in 6.12.23" | ||
12239 | |||
12240 | CVE_STATUS[CVE-2025-22044] = "cpe-stable-backport: Backported in 6.12.23" | ||
12241 | |||
12242 | CVE_STATUS[CVE-2025-22045] = "cpe-stable-backport: Backported in 6.12.23" | ||
12243 | |||
12244 | CVE_STATUS[CVE-2025-22046] = "cpe-stable-backport: Backported in 6.12.23" | ||
12245 | |||
12246 | CVE_STATUS[CVE-2025-22047] = "cpe-stable-backport: Backported in 6.12.23" | ||
12247 | |||
12248 | CVE_STATUS[CVE-2025-22048] = "cpe-stable-backport: Backported in 6.12.23" | ||
12249 | |||
12250 | CVE_STATUS[CVE-2025-22049] = "cpe-stable-backport: Backported in 6.12.23" | ||
12251 | |||
12252 | CVE_STATUS[CVE-2025-22050] = "cpe-stable-backport: Backported in 6.12.23" | ||
12253 | |||
12254 | CVE_STATUS[CVE-2025-22051] = "fixed-version: only affects 6.13 onwards" | ||
12255 | |||
12256 | CVE_STATUS[CVE-2025-22052] = "fixed-version: only affects 6.13 onwards" | ||
12257 | |||
12258 | CVE_STATUS[CVE-2025-22053] = "cpe-stable-backport: Backported in 6.12.23" | ||
12259 | |||
12260 | CVE_STATUS[CVE-2025-22054] = "cpe-stable-backport: Backported in 6.12.23" | ||
12261 | |||
12262 | CVE_STATUS[CVE-2025-22055] = "cpe-stable-backport: Backported in 6.12.23" | ||
12263 | |||
12264 | CVE_STATUS[CVE-2025-22056] = "cpe-stable-backport: Backported in 6.12.23" | ||
12265 | |||
12266 | CVE_STATUS[CVE-2025-22057] = "cpe-stable-backport: Backported in 6.12.23" | ||
12267 | |||
12268 | CVE_STATUS[CVE-2025-22058] = "cpe-stable-backport: Backported in 6.12.23" | ||
12269 | |||
12270 | CVE_STATUS[CVE-2025-22059] = "cpe-stable-backport: Backported in 6.12.23" | ||
12271 | |||
12272 | CVE_STATUS[CVE-2025-22060] = "cpe-stable-backport: Backported in 6.12.23" | ||
12273 | |||
12274 | CVE_STATUS[CVE-2025-22061] = "fixed-version: only affects 6.14 onwards" | ||
12275 | |||
12276 | CVE_STATUS[CVE-2025-22062] = "cpe-stable-backport: Backported in 6.12.23" | ||
12277 | |||
12278 | CVE_STATUS[CVE-2025-22063] = "cpe-stable-backport: Backported in 6.12.23" | ||
12279 | |||
12280 | CVE_STATUS[CVE-2025-22064] = "cpe-stable-backport: Backported in 6.12.23" | ||
12281 | |||
12282 | CVE_STATUS[CVE-2025-22065] = "cpe-stable-backport: Backported in 6.12.23" | ||
12283 | |||
12284 | CVE_STATUS[CVE-2025-22066] = "cpe-stable-backport: Backported in 6.12.23" | ||
12285 | |||
12286 | CVE_STATUS[CVE-2025-22067] = "cpe-stable-backport: Backported in 6.12.23" | ||
12287 | |||
12288 | CVE_STATUS[CVE-2025-22068] = "cpe-stable-backport: Backported in 6.12.23" | ||
12289 | |||
12290 | CVE_STATUS[CVE-2025-22069] = "fixed-version: only affects 6.14 onwards" | ||
12291 | |||
12292 | CVE_STATUS[CVE-2025-22070] = "cpe-stable-backport: Backported in 6.12.23" | ||
12293 | |||
12294 | CVE_STATUS[CVE-2025-22071] = "cpe-stable-backport: Backported in 6.12.23" | ||
12295 | |||
12296 | CVE_STATUS[CVE-2025-22072] = "cpe-stable-backport: Backported in 6.12.23" | ||
12297 | |||
12298 | CVE_STATUS[CVE-2025-22073] = "cpe-stable-backport: Backported in 6.12.23" | ||
12299 | |||
12300 | CVE_STATUS[CVE-2025-22074] = "cpe-stable-backport: Backported in 6.12.23" | ||
12301 | |||
12302 | CVE_STATUS[CVE-2025-22075] = "cpe-stable-backport: Backported in 6.12.23" | ||
12303 | |||
12304 | CVE_STATUS[CVE-2025-22076] = "cpe-stable-backport: Backported in 6.12.23" | ||
12305 | |||
12306 | CVE_STATUS[CVE-2025-22077] = "cpe-stable-backport: Backported in 6.12.25" | ||
12307 | |||
12308 | CVE_STATUS[CVE-2025-22078] = "cpe-stable-backport: Backported in 6.12.23" | ||
12309 | |||
12310 | CVE_STATUS[CVE-2025-22079] = "cpe-stable-backport: Backported in 6.12.23" | ||
12311 | |||
12312 | CVE_STATUS[CVE-2025-22080] = "cpe-stable-backport: Backported in 6.12.23" | ||
12313 | |||
12314 | CVE_STATUS[CVE-2025-22081] = "cpe-stable-backport: Backported in 6.12.23" | ||
12315 | |||
12316 | CVE_STATUS[CVE-2025-22082] = "cpe-stable-backport: Backported in 6.12.23" | ||
12317 | |||
12318 | CVE_STATUS[CVE-2025-22083] = "cpe-stable-backport: Backported in 6.12.23" | ||
12319 | |||
12320 | CVE_STATUS[CVE-2025-22084] = "cpe-stable-backport: Backported in 6.12.23" | ||
12321 | |||
12322 | CVE_STATUS[CVE-2025-22085] = "cpe-stable-backport: Backported in 6.12.23" | ||
12323 | |||
12324 | CVE_STATUS[CVE-2025-22086] = "cpe-stable-backport: Backported in 6.12.23" | ||
12325 | |||
12326 | CVE_STATUS[CVE-2025-22087] = "cpe-stable-backport: Backported in 6.12.23" | ||
12327 | |||
12328 | CVE_STATUS[CVE-2025-22088] = "cpe-stable-backport: Backported in 6.12.23" | ||
12329 | |||
12330 | CVE_STATUS[CVE-2025-22089] = "cpe-stable-backport: Backported in 6.12.23" | ||
12331 | |||
12332 | CVE_STATUS[CVE-2025-22090] = "cpe-stable-backport: Backported in 6.12.23" | ||
12333 | |||
12334 | CVE_STATUS[CVE-2025-22091] = "cpe-stable-backport: Backported in 6.12.23" | ||
12335 | |||
12336 | CVE_STATUS[CVE-2025-22092] = "fixed-version: only affects 6.13 onwards" | ||
12337 | |||
12338 | CVE_STATUS[CVE-2025-22093] = "cpe-stable-backport: Backported in 6.12.23" | ||
12339 | |||
12340 | CVE_STATUS[CVE-2025-22094] = "fixed-version: only affects 6.13 onwards" | ||
12341 | |||
12342 | CVE_STATUS[CVE-2025-22095] = "cpe-stable-backport: Backported in 6.12.23" | ||
12343 | |||
12344 | CVE_STATUS[CVE-2025-22096] = "fixed-version: only affects 6.14 onwards" | ||
12345 | |||
12346 | CVE_STATUS[CVE-2025-22097] = "cpe-stable-backport: Backported in 6.12.23" | ||
12347 | |||
12348 | CVE_STATUS[CVE-2025-22098] = "fixed-version: only affects 6.13 onwards" | ||
12349 | |||
12350 | CVE_STATUS[CVE-2025-22099] = "fixed-version: only affects 6.14 onwards" | ||
12351 | |||
12352 | CVE_STATUS[CVE-2025-22100] = "fixed-version: only affects 6.13 onwards" | ||
12353 | |||
12354 | # CVE-2025-22101 needs backporting (fixed from 6.15) | ||
12355 | |||
12356 | CVE_STATUS[CVE-2025-22102] = "cpe-stable-backport: Backported in 6.12.30" | ||
12357 | |||
12358 | # CVE-2025-22103 needs backporting (fixed from 6.15) | ||
12359 | |||
12360 | # CVE-2025-22104 needs backporting (fixed from 6.15) | ||
12361 | |||
12362 | # CVE-2025-22105 needs backporting (fixed from 6.15) | ||
12363 | |||
12364 | # CVE-2025-22106 needs backporting (fixed from 6.15) | ||
12365 | |||
12366 | # CVE-2025-22107 needs backporting (fixed from 6.15) | ||
12367 | |||
12368 | # CVE-2025-22108 needs backporting (fixed from 6.15) | ||
12369 | |||
12370 | # CVE-2025-22109 needs backporting (fixed from 6.15) | ||
12371 | |||
12372 | CVE_STATUS[CVE-2025-22110] = "fixed-version: only affects 6.14 onwards" | ||
12373 | |||
12374 | # CVE-2025-22111 needs backporting (fixed from 6.15) | ||
12375 | |||
12376 | CVE_STATUS[CVE-2025-22112] = "fixed-version: only affects 6.14 onwards" | ||
12377 | |||
12378 | # CVE-2025-22113 needs backporting (fixed from 6.15) | ||
12379 | |||
12380 | CVE_STATUS[CVE-2025-22114] = "fixed-version: only affects 6.14 onwards" | ||
12381 | |||
12382 | # CVE-2025-22115 needs backporting (fixed from 6.15) | ||
12383 | |||
12384 | # CVE-2025-22116 needs backporting (fixed from 6.15) | ||
12385 | |||
12386 | # CVE-2025-22117 needs backporting (fixed from 6.15) | ||
12387 | |||
12388 | CVE_STATUS[CVE-2025-22118] = "fixed-version: only affects 6.13 onwards" | ||
12389 | |||
12390 | CVE_STATUS[CVE-2025-22119] = "fixed-version: only affects 6.14 onwards" | ||
12391 | |||
12392 | CVE_STATUS[CVE-2025-22120] = "cpe-stable-backport: Backported in 6.12.26" | ||
12393 | |||
12394 | # CVE-2025-22121 needs backporting (fixed from 6.15) | ||
12395 | |||
12396 | # CVE-2025-22122 needs backporting (fixed from 6.15) | ||
12397 | |||
12398 | # CVE-2025-22123 needs backporting (fixed from 6.15) | ||
12399 | |||
12400 | # CVE-2025-22124 needs backporting (fixed from 6.15) | ||
12401 | |||
12402 | # CVE-2025-22125 needs backporting (fixed from 6.15) | ||
12403 | |||
12404 | CVE_STATUS[CVE-2025-22126] = "cpe-stable-backport: Backported in 6.12.25" | ||
12405 | |||
12406 | # CVE-2025-22127 needs backporting (fixed from 6.15) | ||
12407 | |||
12408 | # CVE-2025-22128 needs backporting (fixed from 6.15) | ||
12409 | |||
12410 | # CVE-2025-23129 needs backporting (fixed from 6.15) | ||
12411 | |||
12412 | # CVE-2025-23130 needs backporting (fixed from 6.15) | ||
12413 | |||
12414 | # CVE-2025-23131 needs backporting (fixed from 6.15) | ||
12415 | |||
12416 | # CVE-2025-23132 needs backporting (fixed from 6.15) | ||
12417 | |||
12418 | # CVE-2025-23133 needs backporting (fixed from 6.15) | ||
12419 | |||
12420 | CVE_STATUS[CVE-2025-23134] = "cpe-stable-backport: Backported in 6.12.23" | ||
12421 | |||
12422 | # CVE-2025-23135 needs backporting (fixed from 6.15) | ||
12423 | |||
12424 | CVE_STATUS[CVE-2025-23136] = "cpe-stable-backport: Backported in 6.12.23" | ||
12425 | |||
12426 | # CVE-2025-23137 needs backporting (fixed from 6.15) | ||
12427 | |||
12428 | CVE_STATUS[CVE-2025-23138] = "cpe-stable-backport: Backported in 6.12.23" | ||
12429 | |||
12430 | CVE_STATUS[CVE-2025-23140] = "cpe-stable-backport: Backported in 6.12.25" | ||
12431 | |||
12432 | CVE_STATUS[CVE-2025-23141] = "cpe-stable-backport: Backported in 6.12.24" | ||
12433 | |||
12434 | CVE_STATUS[CVE-2025-23142] = "cpe-stable-backport: Backported in 6.12.24" | ||
12435 | |||
12436 | CVE_STATUS[CVE-2025-23143] = "cpe-stable-backport: Backported in 6.12.24" | ||
12437 | |||
12438 | CVE_STATUS[CVE-2025-23144] = "cpe-stable-backport: Backported in 6.12.24" | ||
12439 | |||
12440 | CVE_STATUS[CVE-2025-23145] = "cpe-stable-backport: Backported in 6.12.24" | ||
12441 | |||
12442 | CVE_STATUS[CVE-2025-23146] = "cpe-stable-backport: Backported in 6.12.24" | ||
12443 | |||
12444 | CVE_STATUS[CVE-2025-23147] = "cpe-stable-backport: Backported in 6.12.24" | ||
12445 | |||
12446 | CVE_STATUS[CVE-2025-23148] = "cpe-stable-backport: Backported in 6.12.24" | ||
12447 | |||
12448 | CVE_STATUS[CVE-2025-23149] = "cpe-stable-backport: Backported in 6.12.24" | ||
12449 | |||
12450 | CVE_STATUS[CVE-2025-23150] = "cpe-stable-backport: Backported in 6.12.24" | ||
12451 | |||
12452 | CVE_STATUS[CVE-2025-23151] = "cpe-stable-backport: Backported in 6.12.24" | ||
12453 | |||
12454 | CVE_STATUS[CVE-2025-23152] = "fixed-version: only affects 6.14 onwards" | ||
12455 | |||
12456 | CVE_STATUS[CVE-2025-23153] = "fixed-version: only affects 6.14 onwards" | ||
12457 | |||
12458 | CVE_STATUS[CVE-2025-23154] = "cpe-stable-backport: Backported in 6.12.24" | ||
12459 | |||
12460 | # CVE-2025-23155 needs backporting (fixed from 6.15) | ||
12461 | |||
12462 | CVE_STATUS[CVE-2025-23156] = "cpe-stable-backport: Backported in 6.12.24" | ||
12463 | |||
12464 | CVE_STATUS[CVE-2025-23157] = "cpe-stable-backport: Backported in 6.12.24" | ||
12465 | |||
12466 | CVE_STATUS[CVE-2025-23158] = "cpe-stable-backport: Backported in 6.12.24" | ||
12467 | |||
12468 | CVE_STATUS[CVE-2025-23159] = "cpe-stable-backport: Backported in 6.12.24" | ||
12469 | |||
12470 | CVE_STATUS[CVE-2025-23160] = "cpe-stable-backport: Backported in 6.12.24" | ||
12471 | |||
12472 | CVE_STATUS[CVE-2025-23161] = "cpe-stable-backport: Backported in 6.12.24" | ||
12473 | |||
12474 | CVE_STATUS[CVE-2025-23162] = "cpe-stable-backport: Backported in 6.12.24" | ||
12475 | |||
12476 | CVE_STATUS[CVE-2025-23163] = "cpe-stable-backport: Backported in 6.12.24" | ||
12477 | |||
12478 | CVE_STATUS[CVE-2025-37738] = "cpe-stable-backport: Backported in 6.12.24" | ||
12479 | |||
12480 | CVE_STATUS[CVE-2025-37739] = "cpe-stable-backport: Backported in 6.12.24" | ||
12481 | |||
12482 | CVE_STATUS[CVE-2025-37740] = "cpe-stable-backport: Backported in 6.12.24" | ||
12483 | |||
12484 | CVE_STATUS[CVE-2025-37741] = "cpe-stable-backport: Backported in 6.12.24" | ||
12485 | |||
12486 | CVE_STATUS[CVE-2025-37742] = "cpe-stable-backport: Backported in 6.12.24" | ||
12487 | |||
12488 | # CVE-2025-37743 needs backporting (fixed from 6.15) | ||
12489 | |||
12490 | CVE_STATUS[CVE-2025-37744] = "cpe-stable-backport: Backported in 6.12.24" | ||
12491 | |||
12492 | CVE_STATUS[CVE-2025-37745] = "cpe-stable-backport: Backported in 6.12.24" | ||
12493 | |||
12494 | # CVE-2025-37746 needs backporting (fixed from 6.15) | ||
12495 | |||
12496 | CVE_STATUS[CVE-2025-37747] = "cpe-stable-backport: Backported in 6.12.24" | ||
12497 | |||
12498 | CVE_STATUS[CVE-2025-37748] = "cpe-stable-backport: Backported in 6.12.24" | ||
12499 | |||
12500 | CVE_STATUS[CVE-2025-37749] = "cpe-stable-backport: Backported in 6.12.24" | ||
12501 | |||
12502 | CVE_STATUS[CVE-2025-37750] = "cpe-stable-backport: Backported in 6.12.24" | ||
12503 | |||
12504 | CVE_STATUS[CVE-2025-37751] = "fixed-version: only affects 6.14 onwards" | ||
12505 | |||
12506 | CVE_STATUS[CVE-2025-37752] = "cpe-stable-backport: Backported in 6.12.24" | ||
12507 | |||
12508 | CVE_STATUS[CVE-2025-37754] = "cpe-stable-backport: Backported in 6.12.24" | ||
12509 | |||
12510 | CVE_STATUS[CVE-2025-37755] = "cpe-stable-backport: Backported in 6.12.24" | ||
12511 | |||
12512 | CVE_STATUS[CVE-2025-37756] = "cpe-stable-backport: Backported in 6.12.24" | ||
12513 | |||
12514 | CVE_STATUS[CVE-2025-37757] = "cpe-stable-backport: Backported in 6.12.24" | ||
12515 | |||
12516 | CVE_STATUS[CVE-2025-37758] = "cpe-stable-backport: Backported in 6.12.24" | ||
12517 | |||
12518 | CVE_STATUS[CVE-2025-37759] = "cpe-stable-backport: Backported in 6.12.24" | ||
12519 | |||
12520 | CVE_STATUS[CVE-2025-37760] = "cpe-stable-backport: Backported in 6.12.25" | ||
12521 | |||
12522 | CVE_STATUS[CVE-2025-37761] = "cpe-stable-backport: Backported in 6.12.25" | ||
12523 | |||
12524 | CVE_STATUS[CVE-2025-37762] = "fixed-version: only affects 6.14 onwards" | ||
12525 | |||
12526 | CVE_STATUS[CVE-2025-37763] = "cpe-stable-backport: Backported in 6.12.25" | ||
12527 | |||
12528 | CVE_STATUS[CVE-2025-37764] = "cpe-stable-backport: Backported in 6.12.25" | ||
12529 | |||
12530 | CVE_STATUS[CVE-2025-37765] = "cpe-stable-backport: Backported in 6.12.25" | ||
12531 | |||
12532 | CVE_STATUS[CVE-2025-37766] = "cpe-stable-backport: Backported in 6.12.25" | ||
12533 | |||
12534 | CVE_STATUS[CVE-2025-37767] = "cpe-stable-backport: Backported in 6.12.25" | ||
12535 | |||
12536 | CVE_STATUS[CVE-2025-37768] = "cpe-stable-backport: Backported in 6.12.25" | ||
12537 | |||
12538 | CVE_STATUS[CVE-2025-37769] = "cpe-stable-backport: Backported in 6.12.25" | ||
12539 | |||
12540 | CVE_STATUS[CVE-2025-37770] = "cpe-stable-backport: Backported in 6.12.25" | ||
12541 | |||
12542 | CVE_STATUS[CVE-2025-37771] = "cpe-stable-backport: Backported in 6.12.25" | ||
12543 | |||
12544 | CVE_STATUS[CVE-2025-37772] = "cpe-stable-backport: Backported in 6.12.25" | ||
12545 | |||
12546 | CVE_STATUS[CVE-2025-37773] = "cpe-stable-backport: Backported in 6.12.25" | ||
12547 | |||
12548 | CVE_STATUS[CVE-2025-37774] = "cpe-stable-backport: Backported in 6.12.25" | ||
12549 | |||
12550 | CVE_STATUS[CVE-2025-37775] = "cpe-stable-backport: Backported in 6.12.25" | ||
12551 | |||
12552 | CVE_STATUS[CVE-2025-37776] = "cpe-stable-backport: Backported in 6.12.25" | ||
12553 | |||
12554 | CVE_STATUS[CVE-2025-37777] = "cpe-stable-backport: Backported in 6.12.26" | ||
12555 | |||
12556 | CVE_STATUS[CVE-2025-37778] = "cpe-stable-backport: Backported in 6.12.25" | ||
12557 | |||
12558 | CVE_STATUS[CVE-2025-37779] = "fixed-version: only affects 6.14 onwards" | ||
12559 | |||
12560 | CVE_STATUS[CVE-2025-37780] = "cpe-stable-backport: Backported in 6.12.25" | ||
12561 | |||
12562 | CVE_STATUS[CVE-2025-37781] = "cpe-stable-backport: Backported in 6.12.25" | ||
12563 | |||
12564 | CVE_STATUS[CVE-2025-37783] = "fixed-version: only affects 6.14 onwards" | ||
12565 | |||
12566 | CVE_STATUS[CVE-2025-37784] = "cpe-stable-backport: Backported in 6.12.25" | ||
12567 | |||
12568 | CVE_STATUS[CVE-2025-37785] = "cpe-stable-backport: Backported in 6.12.23" | ||
12569 | |||
12570 | CVE_STATUS[CVE-2025-37786] = "cpe-stable-backport: Backported in 6.12.25" | ||
12571 | |||
12572 | CVE_STATUS[CVE-2025-37787] = "cpe-stable-backport: Backported in 6.12.25" | ||
12573 | |||
12574 | CVE_STATUS[CVE-2025-37788] = "cpe-stable-backport: Backported in 6.12.25" | ||
12575 | |||
12576 | CVE_STATUS[CVE-2025-37789] = "cpe-stable-backport: Backported in 6.12.25" | ||
12577 | |||
12578 | CVE_STATUS[CVE-2025-37790] = "cpe-stable-backport: Backported in 6.12.25" | ||
12579 | |||
12580 | CVE_STATUS[CVE-2025-37791] = "cpe-stable-backport: Backported in 6.12.25" | ||
12581 | |||
12582 | CVE_STATUS[CVE-2025-37792] = "cpe-stable-backport: Backported in 6.12.25" | ||
12583 | |||
12584 | CVE_STATUS[CVE-2025-37793] = "cpe-stable-backport: Backported in 6.12.25" | ||
12585 | |||
12586 | CVE_STATUS[CVE-2025-37794] = "cpe-stable-backport: Backported in 6.12.25" | ||
12587 | |||
12588 | CVE_STATUS[CVE-2025-37796] = "cpe-stable-backport: Backported in 6.12.25" | ||
12589 | |||
12590 | CVE_STATUS[CVE-2025-37797] = "cpe-stable-backport: Backported in 6.12.26" | ||
12591 | |||
12592 | CVE_STATUS[CVE-2025-37798] = "cpe-stable-backport: Backported in 6.12.24" | ||
12593 | |||
12594 | CVE_STATUS[CVE-2025-37799] = "cpe-stable-backport: Backported in 6.12.26" | ||
12595 | |||
12596 | CVE_STATUS[CVE-2025-37800] = "cpe-stable-backport: Backported in 6.12.26" | ||
12597 | |||
12598 | CVE_STATUS[CVE-2025-37801] = "cpe-stable-backport: Backported in 6.12.26" | ||
12599 | |||
12600 | CVE_STATUS[CVE-2025-37802] = "cpe-stable-backport: Backported in 6.12.26" | ||
12601 | |||
12602 | # CVE-2025-37803 needs backporting (fixed from 6.15) | ||
12603 | |||
12604 | CVE_STATUS[CVE-2025-37805] = "cpe-stable-backport: Backported in 6.12.26" | ||
12605 | |||
12606 | CVE_STATUS[CVE-2025-37806] = "cpe-stable-backport: Backported in 6.12.26" | ||
12607 | |||
12608 | CVE_STATUS[CVE-2025-37807] = "cpe-stable-backport: Backported in 6.12.26" | ||
12609 | |||
12610 | CVE_STATUS[CVE-2025-37808] = "cpe-stable-backport: Backported in 6.12.26" | ||
12611 | |||
12612 | CVE_STATUS[CVE-2025-37809] = "cpe-stable-backport: Backported in 6.12.26" | ||
12613 | |||
12614 | CVE_STATUS[CVE-2025-37810] = "cpe-stable-backport: Backported in 6.12.26" | ||
12615 | |||
12616 | CVE_STATUS[CVE-2025-37811] = "cpe-stable-backport: Backported in 6.12.26" | ||
12617 | |||
12618 | CVE_STATUS[CVE-2025-37812] = "cpe-stable-backport: Backported in 6.12.26" | ||
12619 | |||
12620 | CVE_STATUS[CVE-2025-37813] = "cpe-stable-backport: Backported in 6.12.26" | ||
12621 | |||
12622 | CVE_STATUS[CVE-2025-37814] = "cpe-stable-backport: Backported in 6.12.26" | ||
12623 | |||
12624 | CVE_STATUS[CVE-2025-37815] = "cpe-stable-backport: Backported in 6.12.26" | ||
12625 | |||
12626 | CVE_STATUS[CVE-2025-37816] = "cpe-stable-backport: Backported in 6.12.26" | ||
12627 | |||
12628 | CVE_STATUS[CVE-2025-37817] = "cpe-stable-backport: Backported in 6.12.26" | ||
12629 | |||
12630 | CVE_STATUS[CVE-2025-37818] = "cpe-stable-backport: Backported in 6.12.26" | ||
12631 | |||
12632 | CVE_STATUS[CVE-2025-37819] = "cpe-stable-backport: Backported in 6.12.26" | ||
12633 | |||
12634 | CVE_STATUS[CVE-2025-37820] = "cpe-stable-backport: Backported in 6.12.26" | ||
12635 | |||
12636 | CVE_STATUS[CVE-2025-37821] = "cpe-stable-backport: Backported in 6.12.29" | ||
12637 | |||
12638 | CVE_STATUS[CVE-2025-37822] = "cpe-stable-backport: Backported in 6.12.26" | ||
12639 | |||
12640 | CVE_STATUS[CVE-2025-37823] = "cpe-stable-backport: Backported in 6.12.26" | ||
12641 | |||
12642 | CVE_STATUS[CVE-2025-37824] = "cpe-stable-backport: Backported in 6.12.26" | ||
12643 | |||
12644 | CVE_STATUS[CVE-2025-37825] = "fixed-version: only affects 6.14 onwards" | ||
12645 | |||
12646 | CVE_STATUS[CVE-2025-37826] = "cpe-stable-backport: Backported in 6.12.26" | ||
12647 | |||
12648 | CVE_STATUS[CVE-2025-37827] = "cpe-stable-backport: Backported in 6.12.26" | ||
12649 | |||
12650 | CVE_STATUS[CVE-2025-37828] = "cpe-stable-backport: Backported in 6.12.26" | ||
12651 | |||
12652 | CVE_STATUS[CVE-2025-37829] = "cpe-stable-backport: Backported in 6.12.26" | ||
12653 | |||
12654 | CVE_STATUS[CVE-2025-37830] = "cpe-stable-backport: Backported in 6.12.26" | ||
12655 | |||
12656 | CVE_STATUS[CVE-2025-37831] = "cpe-stable-backport: Backported in 6.12.26" | ||
12657 | |||
12658 | CVE_STATUS[CVE-2025-37833] = "cpe-stable-backport: Backported in 6.12.26" | ||
12659 | |||
12660 | CVE_STATUS[CVE-2025-37834] = "cpe-stable-backport: Backported in 6.12.26" | ||
12661 | |||
12662 | CVE_STATUS[CVE-2025-37836] = "cpe-stable-backport: Backported in 6.12.24" | ||
12663 | |||
12664 | CVE_STATUS[CVE-2025-37837] = "cpe-stable-backport: Backported in 6.12.24" | ||
12665 | |||
12666 | CVE_STATUS[CVE-2025-37838] = "cpe-stable-backport: Backported in 6.12.24" | ||
12667 | |||
12668 | CVE_STATUS[CVE-2025-37839] = "cpe-stable-backport: Backported in 6.12.24" | ||
12669 | |||
12670 | CVE_STATUS[CVE-2025-37840] = "cpe-stable-backport: Backported in 6.12.24" | ||
12671 | |||
12672 | CVE_STATUS[CVE-2025-37841] = "cpe-stable-backport: Backported in 6.12.24" | ||
12673 | |||
12674 | # CVE-2025-37842 needs backporting (fixed from 6.15) | ||
12675 | |||
12676 | CVE_STATUS[CVE-2025-37843] = "cpe-stable-backport: Backported in 6.12.24" | ||
12677 | |||
12678 | CVE_STATUS[CVE-2025-37844] = "cpe-stable-backport: Backported in 6.12.24" | ||
12679 | |||
12680 | CVE_STATUS[CVE-2025-37845] = "cpe-stable-backport: Backported in 6.12.24" | ||
12681 | |||
12682 | CVE_STATUS[CVE-2025-37846] = "cpe-stable-backport: Backported in 6.12.24" | ||
12683 | |||
12684 | CVE_STATUS[CVE-2025-37847] = "cpe-stable-backport: Backported in 6.12.24" | ||
12685 | |||
12686 | CVE_STATUS[CVE-2025-37848] = "cpe-stable-backport: Backported in 6.12.24" | ||
12687 | |||
12688 | CVE_STATUS[CVE-2025-37849] = "cpe-stable-backport: Backported in 6.12.24" | ||
12689 | |||
12690 | CVE_STATUS[CVE-2025-37850] = "cpe-stable-backport: Backported in 6.12.24" | ||
12691 | |||
12692 | CVE_STATUS[CVE-2025-37851] = "cpe-stable-backport: Backported in 6.12.24" | ||
12693 | |||
12694 | CVE_STATUS[CVE-2025-37852] = "cpe-stable-backport: Backported in 6.12.24" | ||
12695 | |||
12696 | CVE_STATUS[CVE-2025-37853] = "cpe-stable-backport: Backported in 6.12.24" | ||
12697 | |||
12698 | CVE_STATUS[CVE-2025-37854] = "cpe-stable-backport: Backported in 6.12.24" | ||
12699 | |||
12700 | # CVE-2025-37855 needs backporting (fixed from 6.15) | ||
12701 | |||
12702 | CVE_STATUS[CVE-2025-37856] = "cpe-stable-backport: Backported in 6.12.24" | ||
12703 | |||
12704 | CVE_STATUS[CVE-2025-37857] = "cpe-stable-backport: Backported in 6.12.24" | ||
12705 | |||
12706 | CVE_STATUS[CVE-2025-37858] = "cpe-stable-backport: Backported in 6.12.24" | ||
12707 | |||
12708 | CVE_STATUS[CVE-2025-37859] = "cpe-stable-backport: Backported in 6.12.24" | ||
12709 | |||
12710 | # CVE-2025-37860 needs backporting (fixed from 6.15) | ||
12711 | |||
12712 | CVE_STATUS[CVE-2025-37861] = "cpe-stable-backport: Backported in 6.12.24" | ||
12713 | |||
12714 | CVE_STATUS[CVE-2025-37862] = "cpe-stable-backport: Backported in 6.12.24" | ||
12715 | |||
12716 | CVE_STATUS[CVE-2025-37863] = "cpe-stable-backport: Backported in 6.12.25" | ||
12717 | |||
12718 | CVE_STATUS[CVE-2025-37864] = "cpe-stable-backport: Backported in 6.12.25" | ||
12719 | |||
12720 | CVE_STATUS[CVE-2025-37865] = "cpe-stable-backport: Backported in 6.12.25" | ||
12721 | |||
12722 | CVE_STATUS[CVE-2025-37866] = "fixed-version: only affects 6.14 onwards" | ||
12723 | |||
12724 | CVE_STATUS[CVE-2025-37867] = "cpe-stable-backport: Backported in 6.12.25" | ||
12725 | |||
12726 | CVE_STATUS[CVE-2025-37868] = "cpe-stable-backport: Backported in 6.12.25" | ||
12727 | |||
12728 | CVE_STATUS[CVE-2025-37869] = "cpe-stable-backport: Backported in 6.12.25" | ||
12729 | |||
12730 | CVE_STATUS[CVE-2025-37870] = "cpe-stable-backport: Backported in 6.12.25" | ||
12731 | |||
12732 | CVE_STATUS[CVE-2025-37871] = "cpe-stable-backport: Backported in 6.12.25" | ||
12733 | |||
12734 | CVE_STATUS[CVE-2025-37872] = "cpe-stable-backport: Backported in 6.12.25" | ||
12735 | |||
12736 | CVE_STATUS[CVE-2025-37873] = "cpe-stable-backport: Backported in 6.12.25" | ||
12737 | |||
12738 | CVE_STATUS[CVE-2025-37874] = "cpe-stable-backport: Backported in 6.12.25" | ||
12739 | |||
12740 | CVE_STATUS[CVE-2025-37875] = "cpe-stable-backport: Backported in 6.12.25" | ||
12741 | |||
12742 | CVE_STATUS[CVE-2025-37876] = "cpe-stable-backport: Backported in 6.12.26" | ||
12743 | |||
12744 | CVE_STATUS[CVE-2025-37877] = "cpe-stable-backport: Backported in 6.12.26" | ||
12745 | |||
12746 | CVE_STATUS[CVE-2025-37878] = "cpe-stable-backport: Backported in 6.12.26" | ||
12747 | |||
12748 | CVE_STATUS[CVE-2025-37879] = "cpe-stable-backport: Backported in 6.12.26" | ||
12749 | |||
12750 | # CVE-2025-37880 needs backporting (fixed from 6.15) | ||
12751 | |||
12752 | CVE_STATUS[CVE-2025-37881] = "cpe-stable-backport: Backported in 6.12.26" | ||
12753 | |||
12754 | CVE_STATUS[CVE-2025-37882] = "cpe-stable-backport: Backported in 6.12.26" | ||
12755 | |||
12756 | CVE_STATUS[CVE-2025-37883] = "cpe-stable-backport: Backported in 6.12.26" | ||
12757 | |||
12758 | CVE_STATUS[CVE-2025-37884] = "cpe-stable-backport: Backported in 6.12.26" | ||
12759 | |||
12760 | CVE_STATUS[CVE-2025-37885] = "cpe-stable-backport: Backported in 6.12.26" | ||
12761 | |||
12762 | CVE_STATUS[CVE-2025-37886] = "cpe-stable-backport: Backported in 6.12.26" | ||
12763 | |||
12764 | CVE_STATUS[CVE-2025-37887] = "cpe-stable-backport: Backported in 6.12.26" | ||
12765 | |||
12766 | CVE_STATUS[CVE-2025-37888] = "cpe-stable-backport: Backported in 6.12.26" | ||
12767 | |||
12768 | CVE_STATUS[CVE-2025-37889] = "cpe-stable-backport: Backported in 6.12.20" | ||
12769 | |||
12770 | CVE_STATUS[CVE-2025-37890] = "cpe-stable-backport: Backported in 6.12.28" | ||
12771 | |||
12772 | CVE_STATUS[CVE-2025-37891] = "cpe-stable-backport: Backported in 6.12.28" | ||
12773 | |||
12774 | CVE_STATUS[CVE-2025-37892] = "cpe-stable-backport: Backported in 6.12.24" | ||
12775 | |||
12776 | CVE_STATUS[CVE-2025-37893] = "cpe-stable-backport: Backported in 6.12.23" | ||
12777 | |||
12778 | CVE_STATUS[CVE-2025-37894] = "cpe-stable-backport: Backported in 6.12.28" | ||
12779 | |||
12780 | CVE_STATUS[CVE-2025-37895] = "cpe-stable-backport: Backported in 6.12.28" | ||
12781 | |||
12782 | CVE_STATUS[CVE-2025-37896] = "fixed-version: only affects 6.14 onwards" | ||
12783 | |||
12784 | CVE_STATUS[CVE-2025-37897] = "cpe-stable-backport: Backported in 6.12.28" | ||
12785 | |||
12786 | CVE_STATUS[CVE-2025-37898] = "fixed-version: only affects 6.13 onwards" | ||
12787 | |||
12788 | CVE_STATUS[CVE-2025-37899] = "cpe-stable-backport: Backported in 6.12.28" | ||
12789 | |||
12790 | CVE_STATUS[CVE-2025-37900] = "cpe-stable-backport: Backported in 6.12.28" | ||
12791 | |||
12792 | CVE_STATUS[CVE-2025-37901] = "cpe-stable-backport: Backported in 6.12.28" | ||
12793 | |||
12794 | CVE_STATUS[CVE-2025-37903] = "cpe-stable-backport: Backported in 6.12.28" | ||
12795 | |||
12796 | CVE_STATUS[CVE-2025-37904] = "fixed-version: only affects 6.13 onwards" | ||
12797 | |||
12798 | CVE_STATUS[CVE-2025-37905] = "cpe-stable-backport: Backported in 6.12.28" | ||
12799 | |||
12800 | # CVE-2025-37906 needs backporting (fixed from 6.15) | ||
12801 | |||
12802 | CVE_STATUS[CVE-2025-37907] = "cpe-stable-backport: Backported in 6.12.28" | ||
12803 | |||
12804 | CVE_STATUS[CVE-2025-37908] = "cpe-stable-backport: Backported in 6.12.28" | ||
12805 | |||
12806 | CVE_STATUS[CVE-2025-37909] = "cpe-stable-backport: Backported in 6.12.28" | ||
12807 | |||
12808 | CVE_STATUS[CVE-2025-37910] = "cpe-stable-backport: Backported in 6.12.28" | ||
12809 | |||
12810 | CVE_STATUS[CVE-2025-37911] = "cpe-stable-backport: Backported in 6.12.28" | ||
12811 | |||
12812 | CVE_STATUS[CVE-2025-37912] = "cpe-stable-backport: Backported in 6.12.28" | ||
12813 | |||
12814 | CVE_STATUS[CVE-2025-37913] = "cpe-stable-backport: Backported in 6.12.28" | ||
12815 | |||
12816 | CVE_STATUS[CVE-2025-37914] = "cpe-stable-backport: Backported in 6.12.28" | ||
12817 | |||
12818 | CVE_STATUS[CVE-2025-37915] = "cpe-stable-backport: Backported in 6.12.28" | ||
12819 | |||
12820 | CVE_STATUS[CVE-2025-37916] = "cpe-stable-backport: Backported in 6.12.28" | ||
12821 | |||
12822 | CVE_STATUS[CVE-2025-37917] = "cpe-stable-backport: Backported in 6.12.28" | ||
12823 | |||
12824 | CVE_STATUS[CVE-2025-37918] = "cpe-stable-backport: Backported in 6.12.28" | ||
12825 | |||
12826 | CVE_STATUS[CVE-2025-37919] = "cpe-stable-backport: Backported in 6.12.28" | ||
12827 | |||
12828 | CVE_STATUS[CVE-2025-37920] = "cpe-stable-backport: Backported in 6.12.28" | ||
12829 | |||
12830 | CVE_STATUS[CVE-2025-37921] = "cpe-stable-backport: Backported in 6.12.28" | ||
12831 | |||
12832 | CVE_STATUS[CVE-2025-37922] = "cpe-stable-backport: Backported in 6.12.28" | ||
12833 | |||
12834 | CVE_STATUS[CVE-2025-37923] = "cpe-stable-backport: Backported in 6.12.28" | ||
12835 | |||
12836 | CVE_STATUS[CVE-2025-37924] = "cpe-stable-backport: Backported in 6.12.28" | ||
12837 | |||
12838 | # CVE-2025-37925 needs backporting (fixed from 6.15) | ||
12839 | |||
12840 | CVE_STATUS[CVE-2025-37926] = "cpe-stable-backport: Backported in 6.12.28" | ||
12841 | |||
12842 | CVE_STATUS[CVE-2025-37927] = "cpe-stable-backport: Backported in 6.12.28" | ||
12843 | |||
12844 | CVE_STATUS[CVE-2025-37928] = "cpe-stable-backport: Backported in 6.12.28" | ||
12845 | |||
12846 | CVE_STATUS[CVE-2025-37929] = "cpe-stable-backport: Backported in 6.12.28" | ||
12847 | |||
12848 | CVE_STATUS[CVE-2025-37930] = "cpe-stable-backport: Backported in 6.12.28" | ||
12849 | |||
12850 | CVE_STATUS[CVE-2025-37931] = "cpe-stable-backport: Backported in 6.12.28" | ||
12851 | |||
12852 | CVE_STATUS[CVE-2025-37932] = "cpe-stable-backport: Backported in 6.12.28" | ||
12853 | |||
12854 | CVE_STATUS[CVE-2025-37933] = "cpe-stable-backport: Backported in 6.12.28" | ||
12855 | |||
12856 | CVE_STATUS[CVE-2025-37934] = "cpe-stable-backport: Backported in 6.12.28" | ||
12857 | |||
12858 | CVE_STATUS[CVE-2025-37935] = "cpe-stable-backport: Backported in 6.12.28" | ||
12859 | |||
12860 | CVE_STATUS[CVE-2025-37936] = "cpe-stable-backport: Backported in 6.12.28" | ||
12861 | |||
12862 | CVE_STATUS[CVE-2025-37937] = "cpe-stable-backport: Backported in 6.12.23" | ||
12863 | |||
12864 | CVE_STATUS[CVE-2025-37938] = "cpe-stable-backport: Backported in 6.12.26" | ||
12865 | |||
12866 | CVE_STATUS[CVE-2025-37939] = "fixed-version: only affects 6.13 onwards" | ||
12867 | |||
12868 | CVE_STATUS[CVE-2025-37940] = "cpe-stable-backport: Backported in 6.12.24" | ||
12869 | |||
12870 | CVE_STATUS[CVE-2025-37941] = "cpe-stable-backport: Backported in 6.12.24" | ||
12871 | |||
12872 | CVE_STATUS[CVE-2025-37942] = "cpe-stable-backport: Backported in 6.12.24" | ||
12873 | |||
12874 | CVE_STATUS[CVE-2025-37943] = "cpe-stable-backport: Backported in 6.12.24" | ||
12875 | |||
12876 | CVE_STATUS[CVE-2025-37944] = "cpe-stable-backport: Backported in 6.12.25" | ||
12877 | |||
12878 | CVE_STATUS[CVE-2025-37945] = "cpe-stable-backport: Backported in 6.12.24" | ||
12879 | |||
12880 | CVE_STATUS[CVE-2025-37946] = "cpe-stable-backport: Backported in 6.12.29" | ||
12881 | |||
12882 | CVE_STATUS[CVE-2025-37947] = "cpe-stable-backport: Backported in 6.12.29" | ||
12883 | |||
12884 | CVE_STATUS[CVE-2025-37948] = "cpe-stable-backport: Backported in 6.12.29" | ||
12885 | |||
12886 | CVE_STATUS[CVE-2025-37949] = "cpe-stable-backport: Backported in 6.12.29" | ||
12887 | |||
12888 | CVE_STATUS[CVE-2025-37950] = "fixed-version: only affects 6.14 onwards" | ||
12889 | |||
12890 | CVE_STATUS[CVE-2025-37951] = "cpe-stable-backport: Backported in 6.12.29" | ||
12891 | |||
12892 | CVE_STATUS[CVE-2025-37952] = "cpe-stable-backport: Backported in 6.12.29" | ||
12893 | |||
12894 | CVE_STATUS[CVE-2025-37953] = "cpe-stable-backport: Backported in 6.12.29" | ||
12895 | |||
12896 | CVE_STATUS[CVE-2025-37954] = "cpe-stable-backport: Backported in 6.12.29" | ||
12897 | |||
12898 | CVE_STATUS[CVE-2025-37955] = "cpe-stable-backport: Backported in 6.12.29" | ||
12899 | |||
12900 | CVE_STATUS[CVE-2025-37956] = "cpe-stable-backport: Backported in 6.12.29" | ||
12901 | |||
12902 | CVE_STATUS[CVE-2025-37957] = "cpe-stable-backport: Backported in 6.12.29" | ||
12903 | |||
12904 | CVE_STATUS[CVE-2025-37958] = "cpe-stable-backport: Backported in 6.12.29" | ||
12905 | |||
12906 | CVE_STATUS[CVE-2025-37959] = "cpe-stable-backport: Backported in 6.12.29" | ||
12907 | |||
12908 | CVE_STATUS[CVE-2025-37960] = "cpe-stable-backport: Backported in 6.12.29" | ||
12909 | |||
12910 | CVE_STATUS[CVE-2025-37961] = "cpe-stable-backport: Backported in 6.12.29" | ||
12911 | |||
12912 | CVE_STATUS[CVE-2025-37962] = "cpe-stable-backport: Backported in 6.12.29" | ||
12913 | |||
12914 | CVE_STATUS[CVE-2025-37963] = "cpe-stable-backport: Backported in 6.12.29" | ||
12915 | |||
12916 | CVE_STATUS[CVE-2025-37964] = "cpe-stable-backport: Backported in 6.12.29" | ||
12917 | |||
12918 | CVE_STATUS[CVE-2025-37965] = "cpe-stable-backport: Backported in 6.12.29" | ||
12919 | |||
12920 | CVE_STATUS[CVE-2025-37966] = "fixed-version: only affects 6.13 onwards" | ||
12921 | |||
12922 | CVE_STATUS[CVE-2025-37967] = "cpe-stable-backport: Backported in 6.12.30" | ||
12923 | |||
12924 | CVE_STATUS[CVE-2025-37968] = "cpe-stable-backport: Backported in 6.12.30" | ||
12925 | |||
12926 | CVE_STATUS[CVE-2025-37969] = "cpe-stable-backport: Backported in 6.12.29" | ||
12927 | |||
12928 | CVE_STATUS[CVE-2025-37970] = "cpe-stable-backport: Backported in 6.12.29" | ||
12929 | |||
12930 | CVE_STATUS[CVE-2025-37971] = "cpe-stable-backport: Backported in 6.12.29" | ||
12931 | |||
12932 | CVE_STATUS[CVE-2025-37972] = "cpe-stable-backport: Backported in 6.12.29" | ||
12933 | |||
12934 | CVE_STATUS[CVE-2025-37973] = "cpe-stable-backport: Backported in 6.12.29" | ||
12935 | |||
12936 | CVE_STATUS[CVE-2025-37974] = "cpe-stable-backport: Backported in 6.12.29" | ||
12937 | |||
12938 | CVE_STATUS[CVE-2025-37975] = "cpe-stable-backport: Backported in 6.12.25" | ||
12939 | |||
12940 | # CVE-2025-37976 has no known resolution | ||
12941 | |||
12942 | CVE_STATUS[CVE-2025-37977] = "cpe-stable-backport: Backported in 6.12.26" | ||
12943 | |||
12944 | CVE_STATUS[CVE-2025-37978] = "cpe-stable-backport: Backported in 6.12.25" | ||
12945 | |||
12946 | CVE_STATUS[CVE-2025-37979] = "cpe-stable-backport: Backported in 6.12.25" | ||
12947 | |||
12948 | CVE_STATUS[CVE-2025-37980] = "cpe-stable-backport: Backported in 6.12.25" | ||
12949 | |||
12950 | CVE_STATUS[CVE-2025-37981] = "cpe-stable-backport: Backported in 6.12.25" | ||
12951 | |||
12952 | CVE_STATUS[CVE-2025-37982] = "cpe-stable-backport: Backported in 6.12.25" | ||
12953 | |||
12954 | CVE_STATUS[CVE-2025-37983] = "cpe-stable-backport: Backported in 6.12.26" | ||
12955 | |||
12956 | # CVE-2025-37984 needs backporting (fixed from 6.15) | ||
12957 | |||
12958 | CVE_STATUS[CVE-2025-37985] = "cpe-stable-backport: Backported in 6.12.26" | ||
12959 | |||
12960 | CVE_STATUS[CVE-2025-37986] = "cpe-stable-backport: Backported in 6.12.26" | ||
12961 | |||
12962 | CVE_STATUS[CVE-2025-37987] = "cpe-stable-backport: Backported in 6.12.26" | ||
12963 | |||
12964 | CVE_STATUS[CVE-2025-37988] = "cpe-stable-backport: Backported in 6.12.26" | ||
12965 | |||
12966 | CVE_STATUS[CVE-2025-37989] = "cpe-stable-backport: Backported in 6.12.26" | ||
12967 | |||
12968 | CVE_STATUS[CVE-2025-37990] = "cpe-stable-backport: Backported in 6.12.28" | ||
12969 | |||
12970 | CVE_STATUS[CVE-2025-37991] = "cpe-stable-backport: Backported in 6.12.28" | ||
12971 | |||
12972 | CVE_STATUS[CVE-2025-37992] = "cpe-stable-backport: Backported in 6.12.30" | ||
12973 | |||
12974 | CVE_STATUS[CVE-2025-37993] = "cpe-stable-backport: Backported in 6.12.29" | ||
12975 | |||
12976 | CVE_STATUS[CVE-2025-37994] = "cpe-stable-backport: Backported in 6.12.29" | ||
12977 | |||
12978 | CVE_STATUS[CVE-2025-37995] = "cpe-stable-backport: Backported in 6.12.29" | ||
12979 | |||
12980 | CVE_STATUS[CVE-2025-37996] = "fixed-version: only affects 6.14 onwards" | ||
12981 | |||
12982 | CVE_STATUS[CVE-2025-37997] = "cpe-stable-backport: Backported in 6.12.29" | ||
12983 | |||
12984 | CVE_STATUS[CVE-2025-37998] = "cpe-stable-backport: Backported in 6.12.29" | ||
12985 | |||
12986 | CVE_STATUS[CVE-2025-37999] = "cpe-stable-backport: Backported in 6.12.29" | ||
12987 | |||
12988 | CVE_STATUS[CVE-2025-38049] = "cpe-stable-backport: Backported in 6.12.23" | ||
12989 | |||
12990 | # CVE-2025-38104 needs backporting (fixed from 6.15) | ||
12991 | |||
12992 | CVE_STATUS[CVE-2025-38152] = "cpe-stable-backport: Backported in 6.12.23" | ||
12993 | |||
12994 | CVE_STATUS[CVE-2025-38240] = "cpe-stable-backport: Backported in 6.12.23" | ||
12995 | |||
12996 | CVE_STATUS[CVE-2025-38479] = "cpe-stable-backport: Backported in 6.12.23" | ||
12997 | |||
12998 | CVE_STATUS[CVE-2025-38575] = "cpe-stable-backport: Backported in 6.12.23" | ||
12999 | |||
13000 | CVE_STATUS[CVE-2025-38637] = "cpe-stable-backport: Backported in 6.12.23" | ||
13001 | |||
13002 | CVE_STATUS[CVE-2025-39688] = "cpe-stable-backport: Backported in 6.12.23" | ||
13003 | |||
13004 | CVE_STATUS[CVE-2025-39728] = "cpe-stable-backport: Backported in 6.12.23" | ||
13005 | |||
13006 | CVE_STATUS[CVE-2025-39735] = "cpe-stable-backport: Backported in 6.12.23" | ||
13007 | |||
13008 | CVE_STATUS[CVE-2025-39755] = "fixed-version: only affects 6.13 onwards" | ||
13009 | |||
13010 | CVE_STATUS[CVE-2025-39778] = "cpe-stable-backport: Backported in 6.12.23" | ||
13011 | |||
13012 | CVE_STATUS[CVE-2025-39930] = "fixed-version: only affects 6.14 onwards" | ||
13013 | |||
13014 | CVE_STATUS[CVE-2025-39989] = "cpe-stable-backport: Backported in 6.12.23" | ||
13015 | |||
13016 | # CVE-2025-40014 needs backporting (fixed from 6.15) | ||
13017 | |||
13018 | CVE_STATUS[CVE-2025-40114] = "cpe-stable-backport: Backported in 6.12.23" | ||
13019 | |||
13020 | # CVE-2025-40325 needs backporting (fixed from 6.15) | ||
13021 | |||
13022 | # CVE-2025-40364 has no known resolution | ||
13023 | |||
diff --git a/meta/recipes-kernel/linux/generate-cve-exclusions.py b/meta/recipes-kernel/linux/generate-cve-exclusions.py new file mode 100755 index 0000000000..dfc16663a5 --- /dev/null +++ b/meta/recipes-kernel/linux/generate-cve-exclusions.py | |||
@@ -0,0 +1,156 @@ | |||
1 | #! /usr/bin/env python3 | ||
2 | |||
3 | # Generate granular CVE status metadata for a specific version of the kernel | ||
4 | # using json data from cvelistV5 or vulns repository | ||
5 | # | ||
6 | # SPDX-License-Identifier: GPL-2.0-only | ||
7 | |||
8 | import argparse | ||
9 | import datetime | ||
10 | import json | ||
11 | import pathlib | ||
12 | import os | ||
13 | import glob | ||
14 | import subprocess | ||
15 | |||
16 | from packaging.version import Version | ||
17 | |||
18 | |||
19 | def parse_version(s): | ||
20 | """ | ||
21 | Parse the version string and either return a packaging.version.Version, or | ||
22 | None if the string was unset or "unk". | ||
23 | """ | ||
24 | if s and s != "unk": | ||
25 | # packaging.version.Version doesn't approve of versions like v5.12-rc1-dontuse | ||
26 | s = s.replace("-dontuse", "") | ||
27 | return Version(s) | ||
28 | return None | ||
29 | |||
30 | def get_fixed_versions(cve_info, base_version): | ||
31 | ''' | ||
32 | Get fixed versionss | ||
33 | ''' | ||
34 | first_affected = None | ||
35 | fixed = None | ||
36 | fixed_backport = None | ||
37 | next_version = Version(str(base_version) + ".5000") | ||
38 | for affected in cve_info["containers"]["cna"]["affected"]: | ||
39 | # In case the CVE info is not complete, it might not have default status and therefore | ||
40 | # we don't know the status of this CVE. | ||
41 | if not "defaultStatus" in affected: | ||
42 | return first_affected, fixed, fixed_backport | ||
43 | if affected["defaultStatus"] == "affected": | ||
44 | for version in affected["versions"]: | ||
45 | v = Version(version["version"]) | ||
46 | if v == Version('0'): | ||
47 | #Skiping non-affected | ||
48 | continue | ||
49 | if version["status"] == "unaffected" and first_affected and v < first_affected: | ||
50 | first_affected = Version(f"{v.major}.{v.minor}") | ||
51 | if version["status"] == "affected" and not first_affected: | ||
52 | first_affected = v | ||
53 | elif (version["status"] == "unaffected" and | ||
54 | version['versionType'] == "original_commit_for_fix"): | ||
55 | fixed = v | ||
56 | elif base_version < v and v < next_version: | ||
57 | fixed_backport = v | ||
58 | elif affected["defaultStatus"] == "unaffected": | ||
59 | # Only specific versions are affected. We care only about our base version | ||
60 | if "versions" not in affected: | ||
61 | continue | ||
62 | for version in affected["versions"]: | ||
63 | if "versionType" not in version: | ||
64 | continue | ||
65 | if version["versionType"] == "git": | ||
66 | continue | ||
67 | v = Version(version["version"]) | ||
68 | # in case it is not in our base version | ||
69 | less_than = Version(version["lessThan"]) | ||
70 | |||
71 | if not first_affected: | ||
72 | first_affected = v | ||
73 | fixed = less_than | ||
74 | if base_version < v and v < next_version: | ||
75 | fixed_backport = less_than | ||
76 | |||
77 | return first_affected, fixed, fixed_backport | ||
78 | |||
79 | def is_linux_cve(cve_info): | ||
80 | '''Return true is the CVE belongs to Linux''' | ||
81 | if not "affected" in cve_info["containers"]["cna"]: | ||
82 | return False | ||
83 | for affected in cve_info["containers"]["cna"]["affected"]: | ||
84 | if not "product" in affected: | ||
85 | return False | ||
86 | if affected["product"] == "Linux" and affected["vendor"] == "Linux": | ||
87 | return True | ||
88 | return False | ||
89 | |||
90 | def main(argp=None): | ||
91 | parser = argparse.ArgumentParser() | ||
92 | parser.add_argument("datadir", type=pathlib.Path, help="Path to a clone of https://github.com/CVEProject/cvelistV5 or https://git.kernel.org/pub/scm/linux/security/vulns.git") | ||
93 | parser.add_argument("version", type=Version, help="Kernel version number to generate data for, such as 6.1.38") | ||
94 | |||
95 | args = parser.parse_args(argp) | ||
96 | datadir = args.datadir.resolve() | ||
97 | version = args.version | ||
98 | base_version = Version(f"{version.major}.{version.minor}") | ||
99 | |||
100 | data_version = subprocess.check_output(("git", "describe", "--tags", "HEAD"), cwd=datadir, text=True) | ||
101 | |||
102 | print(f""" | ||
103 | # Auto-generated CVE metadata, DO NOT EDIT BY HAND. | ||
104 | # Generated at {datetime.datetime.now(datetime.timezone.utc)} for kernel version {version} | ||
105 | # From {datadir.name} {data_version} | ||
106 | |||
107 | python check_kernel_cve_status_version() {{ | ||
108 | this_version = "{version}" | ||
109 | kernel_version = d.getVar("LINUX_VERSION") | ||
110 | if kernel_version != this_version: | ||
111 | bb.warn("Kernel CVE status needs updating: generated for %s but kernel is %s" % (this_version, kernel_version)) | ||
112 | }} | ||
113 | do_cve_check[prefuncs] += "check_kernel_cve_status_version" | ||
114 | """) | ||
115 | |||
116 | # Loop though all CVES and check if they are kernel related, newer than 2015 | ||
117 | pattern = os.path.join(datadir, '**', "CVE-20*.json") | ||
118 | |||
119 | files = glob.glob(pattern, recursive=True) | ||
120 | for cve_file in sorted(files): | ||
121 | # Get CVE Id | ||
122 | cve = cve_file[cve_file.rfind("/")+1:cve_file.rfind(".json")] | ||
123 | # We process from 2015 data, old request are not properly formated | ||
124 | year = cve.split("-")[1] | ||
125 | if int(year) < 2015: | ||
126 | continue | ||
127 | with open(cve_file, 'r', encoding='utf-8') as json_file: | ||
128 | cve_info = json.load(json_file) | ||
129 | |||
130 | if not is_linux_cve(cve_info): | ||
131 | continue | ||
132 | first_affected, fixed, backport_ver = get_fixed_versions(cve_info, base_version) | ||
133 | if not fixed: | ||
134 | print(f"# {cve} has no known resolution") | ||
135 | elif first_affected and version < first_affected: | ||
136 | print(f'CVE_STATUS[{cve}] = "fixed-version: only affects {first_affected} onwards"') | ||
137 | elif fixed <= version: | ||
138 | print( | ||
139 | f'CVE_STATUS[{cve}] = "fixed-version: Fixed from version {fixed}"' | ||
140 | ) | ||
141 | else: | ||
142 | if backport_ver: | ||
143 | if backport_ver <= version: | ||
144 | print( | ||
145 | f'CVE_STATUS[{cve}] = "cpe-stable-backport: Backported in {backport_ver}"' | ||
146 | ) | ||
147 | else: | ||
148 | print(f"# {cve} may need backporting (fixed from {backport_ver})") | ||
149 | else: | ||
150 | print(f"# {cve} needs backporting (fixed from {fixed})") | ||
151 | |||
152 | print() | ||
153 | |||
154 | |||
155 | if __name__ == "__main__": | ||
156 | main() | ||
diff --git a/meta/recipes-kernel/linux/kernel-devsrc.bb b/meta/recipes-kernel/linux/kernel-devsrc.bb index dadeade3aa..3d2eb3929e 100644 --- a/meta/recipes-kernel/linux/kernel-devsrc.bb +++ b/meta/recipes-kernel/linux/kernel-devsrc.bb | |||
@@ -5,9 +5,9 @@ development or external module builds" | |||
5 | 5 | ||
6 | SECTION = "kernel" | 6 | SECTION = "kernel" |
7 | 7 | ||
8 | LICENSE = "GPLv2" | 8 | LICENSE = "GPL-2.0-only" |
9 | 9 | ||
10 | inherit linux-kernel-base | 10 | inherit kernelsrc |
11 | 11 | ||
12 | # Whilst not a module, this ensures we don't get multilib extended (which would make no sense) | 12 | # Whilst not a module, this ensures we don't get multilib extended (which would make no sense) |
13 | inherit module-base | 13 | inherit module-base |
@@ -20,19 +20,15 @@ do_install[depends] += "virtual/kernel:do_shared_workdir" | |||
20 | do_install[depends] += "virtual/kernel:do_install" | 20 | do_install[depends] += "virtual/kernel:do_install" |
21 | 21 | ||
22 | # There's nothing to do here, except install the source where we can package it | 22 | # There's nothing to do here, except install the source where we can package it |
23 | do_fetch[noexec] = "1" | ||
24 | do_unpack[noexec] = "1" | ||
25 | do_patch[noexec] = "1" | ||
26 | do_configure[noexec] = "1" | 23 | do_configure[noexec] = "1" |
27 | do_compile[noexec] = "1" | 24 | do_compile[noexec] = "1" |
28 | deltask do_populate_sysroot | 25 | deltask do_populate_sysroot |
29 | 26 | ||
30 | S = "${STAGING_KERNEL_DIR}" | ||
31 | B = "${STAGING_KERNEL_BUILDDIR}" | 27 | B = "${STAGING_KERNEL_BUILDDIR}" |
32 | 28 | ||
33 | PACKAGE_ARCH = "${MACHINE_ARCH}" | 29 | PACKAGE_ARCH = "${MACHINE_ARCH}" |
34 | 30 | ||
35 | KERNEL_BUILD_ROOT="${nonarch_base_libdir}/modules/" | 31 | KERNEL_BUILD_ROOT = "${nonarch_base_libdir}/modules/" |
36 | 32 | ||
37 | do_install() { | 33 | do_install() { |
38 | kerneldir=${D}${KERNEL_BUILD_ROOT}${KERNEL_VERSION} | 34 | kerneldir=${D}${KERNEL_BUILD_ROOT}${KERNEL_VERSION} |
@@ -47,21 +43,21 @@ do_install() { | |||
47 | # create a /usr/src/kernel symlink to /lib/modules/<version>/source | 43 | # create a /usr/src/kernel symlink to /lib/modules/<version>/source |
48 | mkdir -p ${D}/usr/src | 44 | mkdir -p ${D}/usr/src |
49 | ( | 45 | ( |
50 | cd ${D}/usr/src | 46 | cd ${D}/usr/src |
51 | lnr ${D}${KERNEL_BUILD_ROOT}${KERNEL_VERSION}/source kernel | 47 | ln -rs ${D}${KERNEL_BUILD_ROOT}${KERNEL_VERSION}/source kernel |
52 | ) | 48 | ) |
53 | 49 | ||
54 | # for on target purposes, we unify build and source | 50 | # for on target purposes, we unify build and source |
55 | ( | 51 | ( |
56 | cd $kerneldir | 52 | cd $kerneldir |
57 | ln -s build source | 53 | ln -s build source |
58 | ) | 54 | ) |
59 | 55 | ||
60 | # first copy everything | 56 | # first copy everything |
61 | ( | 57 | ( |
62 | cd ${S} | 58 | cd ${S} |
63 | cp --parents $(find -type f -name "Makefile*" -o -name "Kconfig*") $kerneldir/build | 59 | cp --parents $(find -type f -name "Makefile*" -o -name "Kconfig*") $kerneldir/build |
64 | cp --parents $(find -type f -name "Build" -o -name "Build.include") $kerneldir/build | 60 | cp --parents $(find -type f -name "Build" -o -name "Build.include") $kerneldir/build |
65 | ) | 61 | ) |
66 | 62 | ||
67 | # then drop all but the needed Makefiles/Kconfig files | 63 | # then drop all but the needed Makefiles/Kconfig files |
@@ -70,199 +66,303 @@ do_install() { | |||
70 | 66 | ||
71 | # now copy in parts from the build that we'll need later | 67 | # now copy in parts from the build that we'll need later |
72 | ( | 68 | ( |
73 | cd ${B} | 69 | cd ${B} |
74 | 70 | ||
75 | cp Module.symvers $kerneldir/build | 71 | if [ -s Module.symvers ]; then |
76 | cp System.map* $kerneldir/build | 72 | cp Module.symvers $kerneldir/build |
77 | if [ -s Module.markers ]; then | 73 | fi |
78 | cp Module.markers $kerneldir/build | 74 | cp System.map-* $kerneldir/build |
79 | fi | 75 | ln -s System.map-* $kerneldir/build/System.map |
80 | 76 | if [ -s Module.markers ]; then | |
81 | cp -a .config $kerneldir/build | 77 | cp Module.markers $kerneldir/build |
82 | 78 | fi | |
83 | # This scripts copy blow up QA, so for now, we require a more | 79 | |
84 | # complex 'make scripts' to restore these, versus copying them | 80 | cp -a .config $kerneldir/build |
85 | # here. Left as a reference to indicate that we know the scripts must | 81 | |
86 | # be dealt with. | 82 | # This scripts copy blow up QA, so for now, we require a more |
87 | # cp -a scripts $kerneldir/build | 83 | # complex 'make scripts' to restore these, versus copying them |
88 | 84 | # here. Left as a reference to indicate that we know the scripts must | |
89 | # although module.lds can be regenerated on target via 'make modules_prepare' | 85 | # be dealt with. |
90 | # there are several places where 'makes scripts prepare' is done, and that won't | 86 | # cp -a scripts $kerneldir/build |
91 | # regenerate the file. So we copy it onto the target as a migration to using | 87 | |
92 | # modules_prepare | 88 | # although module.lds can be regenerated on target via 'make modules_prepare' |
93 | cp -a --parents scripts/module.lds $kerneldir/build/ 2>/dev/null || : | 89 | # there are several places where 'makes scripts prepare' is done, and that won't |
90 | # regenerate the file. So we copy it onto the target as a migration to using | ||
91 | # modules_prepare | ||
92 | cp -a --parents scripts/module.lds $kerneldir/build/ 2>/dev/null || : | ||
94 | 93 | ||
95 | if [ -d arch/${ARCH}/scripts ]; then | 94 | if [ -d arch/${ARCH}/scripts ]; then |
96 | cp -a arch/${ARCH}/scripts $kerneldir/build/arch/${ARCH} | 95 | cp -a arch/${ARCH}/scripts $kerneldir/build/arch/${ARCH} |
97 | fi | 96 | fi |
98 | if [ -f arch/${ARCH}/*lds ]; then | 97 | if [ -f arch/${ARCH}/*lds ]; then |
99 | cp -a arch/${ARCH}/*lds $kerneldir/build/arch/${ARCH} | 98 | cp -a arch/${ARCH}/*lds $kerneldir/build/arch/${ARCH} |
100 | fi | 99 | fi |
101 | 100 | ||
102 | rm -f $kerneldir/build/scripts/*.o | 101 | rm -f $kerneldir/build/scripts/*.o |
103 | rm -f $kerneldir/build/scripts/*/*.o | 102 | rm -f $kerneldir/build/scripts/*/*.o |
104 | 103 | ||
105 | if [ "${ARCH}" = "powerpc" ]; then | 104 | if [ "${ARCH}" = "powerpc" ]; then |
106 | if [ -e arch/powerpc/lib/crtsavres.S ] || | 105 | if [ -e arch/powerpc/lib/crtsavres.S ] || |
107 | [ -e arch/powerpc/lib/crtsavres.o ]; then | 106 | [ -e arch/powerpc/lib/crtsavres.o ]; then |
108 | cp -a --parents arch/powerpc/lib/crtsavres.[So] $kerneldir/build/ | 107 | cp -a --parents arch/powerpc/lib/crtsavres.[So] $kerneldir/build/ |
109 | fi | 108 | fi |
110 | fi | 109 | fi |
111 | 110 | ||
112 | if [ "${ARCH}" = "arm64" ]; then | 111 | if [ "${ARCH}" = "arm64" -o "${ARCH}" = "riscv" ]; then |
113 | cp -a --parents arch/arm64/kernel/vdso/vdso.lds $kerneldir/build/ | 112 | if [ -e arch/${ARCH}/kernel/vdso/vdso.lds ]; then |
114 | fi | 113 | cp -a --parents arch/${ARCH}/kernel/vdso/vdso.lds $kerneldir/build/ |
115 | 114 | fi | |
116 | cp -a include $kerneldir/build/include | 115 | fi |
117 | 116 | if [ "${ARCH}" = "powerpc" ]; then | |
118 | # we don't usually copy generated files, since they can be rebuilt on the target, | 117 | cp -a --parents arch/powerpc/kernel/vdso32/vdso32.lds $kerneldir/build 2>/dev/null || : |
119 | # but without this file, we get a forced syncconfig run in v5.8+, which prompts and | 118 | cp -a --parents arch/powerpc/kernel/vdso64/vdso64.lds $kerneldir/build 2>/dev/null || : |
120 | # breaks workflows. | 119 | # v5.19+ |
121 | cp -a --parents include/generated/autoconf.h $kerneldir/build 2>/dev/null || : | 120 | cp -a --parents arch/powerpc/kernel/vdso/vdso*.lds $kerneldir/build 2>/dev/null || : |
122 | 121 | fi | |
123 | if [ -e $kerneldir/include/generated/.vdso-offsets.h.cmd ]; then | 122 | |
124 | rm $kerneldir/include/generated/.vdso-offsets.h.cmd | 123 | cp -a include $kerneldir/build/include |
125 | fi | 124 | |
125 | # we don't usually copy generated files, since they can be rebuilt on the target, | ||
126 | # but without this file, we get a forced syncconfig run in v5.8+, which prompts and | ||
127 | # breaks workflows. | ||
128 | cp -a --parents include/generated/autoconf.h $kerneldir/build 2>/dev/null || : | ||
129 | |||
130 | rm -f $kerneldir/include/generated/.vdso-offsets.h.cmd | ||
131 | rm -f $kerneldir/build/include/generated/.vdso-offsets.h.cmd | ||
132 | rm -f $kerneldir/build/include/generated/.compat_vdso-offsets.h.cmd | ||
133 | rm -f $kerneldir/build/include/generated/.vdso32-offsets.h.cmd | ||
134 | rm -f $kerneldir/build/include/generated/.vdso64-offsets.h.cmd | ||
126 | ) | 135 | ) |
127 | 136 | ||
128 | # now grab the chunks from the source tree that we need | 137 | # now grab the chunks from the source tree that we need |
129 | ( | 138 | ( |
130 | cd ${S} | 139 | cd ${S} |
140 | |||
141 | cp -a scripts $kerneldir/build | ||
142 | |||
143 | # for v6.1+ (otherwise we are missing multiple default targets) | ||
144 | cp -a --parents Kbuild $kerneldir/build 2>/dev/null || : | ||
145 | |||
146 | # For v6.6+ the debian packing is moved out to seperate rules file | ||
147 | # Remove as we else would ned to RDEPEND on make | ||
148 | rm $kerneldir/build/scripts/package/debian/rules 2>/dev/null || : | ||
131 | 149 | ||
132 | cp -a scripts $kerneldir/build | 150 | # if our build dir had objtool, it will also be rebuilt on target, so |
151 | # we copy what is required for that build | ||
152 | if [ -f ${B}/tools/objtool/objtool ]; then | ||
153 | # these are a few files associated with objtool, since we'll need to | ||
154 | # rebuild it | ||
155 | cp -a --parents tools/build/Build.include $kerneldir/build/ | ||
156 | cp -a --parents tools/build/Build $kerneldir/build/ 2>/dev/null || : | ||
157 | cp -a --parents tools/build/fixdep.c $kerneldir/build/ | ||
158 | cp -a --parents tools/scripts/utilities.mak $kerneldir/build/ | ||
133 | 159 | ||
134 | # if our build dir had objtool, it will also be rebuilt on target, so | 160 | # extra files, just in case |
135 | # we copy what is required for that build | 161 | cp -a --parents tools/objtool/* $kerneldir/build/ |
136 | if [ -f ${B}/tools/objtool/objtool ]; then | 162 | cp -a --parents tools/lib/* $kerneldir/build/ |
137 | # these are a few files associated with objtool, since we'll need to | 163 | cp -a --parents tools/lib/subcmd/* $kerneldir/build/ |
138 | # rebuild it | ||
139 | cp -a --parents tools/build/Build.include $kerneldir/build/ | ||
140 | cp -a --parents tools/build/Build $kerneldir/build/ | ||
141 | cp -a --parents tools/build/fixdep.c $kerneldir/build/ | ||
142 | cp -a --parents tools/scripts/utilities.mak $kerneldir/build/ | ||
143 | 164 | ||
144 | # extra files, just in case | 165 | cp -a --parents tools/include/* $kerneldir/build/ |
145 | cp -a --parents tools/objtool/* $kerneldir/build/ | ||
146 | cp -a --parents tools/lib/* $kerneldir/build/ | ||
147 | cp -a --parents tools/lib/subcmd/* $kerneldir/build/ | ||
148 | 166 | ||
149 | cp -a --parents tools/include/* $kerneldir/build/ | 167 | cp -a --parents $(find tools/arch/${ARCH}/ -type f) $kerneldir/build/ |
168 | fi | ||
150 | 169 | ||
151 | cp -a --parents $(find tools/arch/${ARCH}/ -type f) $kerneldir/build/ | 170 | if [ "${ARCH}" = "arm64" ]; then |
152 | fi | 171 | # arch/arm64/include/asm/xen references arch/arm |
172 | cp -a --parents arch/arm/include/asm/xen $kerneldir/build/ | ||
173 | # arch/arm64/include/asm/opcodes.h references arch/arm | ||
174 | cp -a --parents arch/arm/include/asm/opcodes.h $kerneldir/build/ | ||
153 | 175 | ||
154 | if [ "${ARCH}" = "arm64" ]; then | 176 | # v6.1+ |
155 | # arch/arm64/include/asm/xen references arch/arm | 177 | cp -a --parents arch/arm64/kernel/asm-offsets.c $kerneldir/build/ |
156 | cp -a --parents arch/arm/include/asm/xen $kerneldir/build/ | ||
157 | # arch/arm64/include/asm/opcodes.h references arch/arm | ||
158 | cp -a --parents arch/arm/include/asm/opcodes.h $kerneldir/build/ | ||
159 | 178 | ||
160 | cp -a --parents arch/arm64/kernel/vdso/*gettimeofday.* $kerneldir/build/ | 179 | cp -a --parents arch/arm64/kernel/vdso/*gettimeofday.* $kerneldir/build/ |
161 | cp -a --parents arch/arm64/kernel/vdso/sigreturn.S $kerneldir/build/ | 180 | cp -a --parents arch/arm64/kernel/vdso/sigreturn.S $kerneldir/build/ |
162 | cp -a --parents arch/arm64/kernel/vdso/note.S $kerneldir/build/ | 181 | cp -a --parents arch/arm64/kernel/vdso/note.S $kerneldir/build/ |
163 | cp -a --parents arch/arm64/kernel/vdso/gen_vdso_offsets.sh $kerneldir/build/ | 182 | cp -a --parents arch/arm64/kernel/vdso/gen_vdso_offsets.sh $kerneldir/build/ |
164 | 183 | ||
184 | # 6.12+ | ||
185 | cp -a --parents arch/arm64/kernel/vdso/vgetrandom.c $kerneldir/build/ 2>/dev/null || : | ||
186 | cp -a --parents arch/arm64/kernel/vdso/vgetrandom-chacha.S $kerneldir/build/ 2>/dev/null || : | ||
187 | |||
165 | cp -a --parents arch/arm64/kernel/module.lds $kerneldir/build/ 2>/dev/null || : | 188 | cp -a --parents arch/arm64/kernel/module.lds $kerneldir/build/ 2>/dev/null || : |
166 | fi | ||
167 | 189 | ||
168 | if [ "${ARCH}" = "powerpc" ]; then | 190 | # 5.13+ needs these tools |
169 | # 5.0 needs these files, but don't error if they aren't present in the source | 191 | cp -a --parents arch/arm64/tools/gen-cpucaps.awk $kerneldir/build/ 2>/dev/null || : |
170 | cp -a --parents arch/${ARCH}/kernel/syscalls/syscall.tbl $kerneldir/build/ 2>/dev/null || : | 192 | cp -a --parents arch/arm64/tools/cpucaps $kerneldir/build/ 2>/dev/null || : |
171 | cp -a --parents arch/${ARCH}/kernel/syscalls/syscalltbl.sh $kerneldir/build/ 2>/dev/null || : | 193 | |
172 | cp -a --parents arch/${ARCH}/kernel/syscalls/syscallhdr.sh $kerneldir/build/ 2>/dev/null || : | 194 | # 5.19+ |
173 | fi | 195 | cp -a --parents arch/arm64/tools/gen-sysreg.awk $kerneldir/build/ 2>/dev/null || : |
196 | cp -a --parents arch/arm64/tools/sysreg $kerneldir/build/ 2>/dev/null || : | ||
197 | |||
198 | # 6.12+ | ||
199 | cp -a --parents arch/arm64/tools/syscall_64.tbl $kerneldir/build/ 2>/dev/null || : | ||
200 | cp -a --parents arch/arm64/tools/syscall_32.tbl $kerneldir/build/ 2>/dev/null || : | ||
201 | |||
202 | if [ -e $kerneldir/build/arch/arm64/tools/gen-cpucaps.awk ]; then | ||
203 | sed -i -e "s,#!.*awk.*,#!${USRBINPATH}/env awk," $kerneldir/build/arch/arm64/tools/gen-cpucaps.awk | ||
204 | fi | ||
205 | if [ -e $kerneldir/build/arch/arm64/tools/gen-sysreg.awk ]; then | ||
206 | sed -i -e "s,#!.*awk.*,#!${USRBINPATH}/env awk," $kerneldir/build/arch/arm64/tools/gen-sysreg.awk | ||
207 | fi | ||
208 | fi | ||
209 | |||
210 | if [ "${ARCH}" = "powerpc" ]; then | ||
211 | # 5.0 needs these files, but don't error if they aren't present in the source | ||
212 | cp -a --parents arch/${ARCH}/kernel/syscalls/syscall.tbl $kerneldir/build/ 2>/dev/null || : | ||
213 | cp -a --parents arch/${ARCH}/kernel/syscalls/syscalltbl.sh $kerneldir/build/ 2>/dev/null || : | ||
214 | cp -a --parents arch/${ARCH}/kernel/syscalls/syscallhdr.sh $kerneldir/build/ 2>/dev/null || : | ||
215 | cp -a --parents arch/${ARCH}/kernel/vdso32/* $kerneldir/build/ 2>/dev/null || : | ||
216 | cp -a --parents arch/${ARCH}/kernel/vdso64/* $kerneldir/build/ 2>/dev/null || : | ||
217 | |||
218 | # v5.19+ | ||
219 | cp -a --parents arch/powerpc/kernel/vdso/*.S $kerneldir/build 2>/dev/null || : | ||
220 | cp -a --parents arch/powerpc/kernel/vdso/*gettimeofday.* $kerneldir/build 2>/dev/null || : | ||
221 | cp -a --parents arch/powerpc/kernel/vdso/gen_vdso*_offsets.sh $kerneldir/build/ 2>/dev/null || : | ||
222 | |||
223 | # v6,1+ | ||
224 | cp -a --parents arch/powerpc/kernel/asm-offsets.c $kerneldir/build/ 2>/dev/null || : | ||
225 | cp -a --parents arch/powerpc/kernel/head_booke.h $kerneldir/build/ 2>/dev/null || : | ||
226 | |||
227 | # 6.12+ | ||
228 | cp -a --parents arch/powerpc/kernel/vdso/vgetrandom.c $kerneldir/build/ 2>/dev/null || : | ||
229 | cp -a --parents arch/powerpc/kernel/vdso/vgetrandom-chacha.S $kerneldir/build/ 2>/dev/null || : | ||
230 | cp -a --parents arch/powerpc/lib/crtsavres.S $kerneldir/build/ 2>/dev/null || : | ||
231 | fi | ||
232 | if [ "${ARCH}" = "riscv" ]; then | ||
233 | cp -a --parents arch/riscv/kernel/vdso/*gettimeofday.* $kerneldir/build/ | ||
234 | cp -a --parents arch/riscv/kernel/vdso/note.S $kerneldir/build/ | ||
235 | # v6.1+ | ||
236 | cp -a --parents arch/riscv/kernel/asm-offsets.c $kerneldir/build/ | ||
237 | if [ -e arch/riscv/kernel/vdso/gen_vdso_offsets.sh ]; then | ||
238 | cp -a --parents arch/riscv/kernel/vdso/gen_vdso_offsets.sh $kerneldir/build/ | ||
239 | fi | ||
240 | cp -a --parents arch/riscv/kernel/vdso/* $kerneldir/build/ 2>/dev/null || : | ||
241 | if [ -e arch/riscv/kernel/compat_vdso/gen_compat_vdso_offsets.sh ]; then | ||
242 | cp -a --parents arch/riscv/kernel/compat_vdso/gen_compat_vdso_offsets.sh $kerneldir/build/ | ||
243 | fi | ||
244 | cp -a --parents arch/riscv/kernel/compat_vdso/* $kerneldir/build/ 2>/dev/null || : | ||
245 | fi | ||
246 | |||
247 | # include the machine specific headers for ARM variants, if available. | ||
248 | if [ "${ARCH}" = "arm" ]; then | ||
249 | cp -a --parents arch/${ARCH}/mach-*/include $kerneldir/build/ | ||
174 | 250 | ||
175 | # include the machine specific headers for ARM variants, if available. | 251 | # include a few files for 'make prepare' |
176 | if [ "${ARCH}" = "arm" ]; then | 252 | cp -a --parents arch/arm/tools/gen-mach-types $kerneldir/build/ |
177 | cp -a --parents arch/${ARCH}/mach-*/include $kerneldir/build/ | 253 | cp -a --parents arch/arm/tools/mach-types $kerneldir/build/ |
178 | 254 | ||
179 | # include a few files for 'make prepare' | 255 | # 5.19+ |
180 | cp -a --parents arch/arm/tools/gen-mach-types $kerneldir/build/ | 256 | cp -a --parents arch/arm/tools/gen-sysreg.awk $kerneldir/build/ 2>/dev/null || : |
181 | cp -a --parents arch/arm/tools/mach-types $kerneldir/build/ | ||
182 | 257 | ||
183 | # ARM syscall table tools only exist for kernels v4.10 or later | 258 | # ARM syscall table tools only exist for kernels v4.10 or later |
184 | SYSCALL_TOOLS=$(find arch/arm/tools -name "syscall*") | 259 | SYSCALL_TOOLS=$(find arch/arm/tools -name "syscall*") |
185 | if [ -n "$SYSCALL_TOOLS" ] ; then | 260 | if [ -n "$SYSCALL_TOOLS" ] ; then |
186 | cp -a --parents $SYSCALL_TOOLS $kerneldir/build/ | 261 | cp -a --parents $SYSCALL_TOOLS $kerneldir/build/ |
187 | fi | 262 | fi |
188 | 263 | ||
189 | cp -a --parents arch/arm/kernel/module.lds $kerneldir/build/ 2>/dev/null || : | 264 | cp -a --parents arch/arm/kernel/module.lds $kerneldir/build/ 2>/dev/null || : |
190 | fi | 265 | # v6.1+ |
191 | 266 | cp -a --parents arch/arm/kernel/asm-offsets.c $kerneldir/build/ 2>/dev/null || : | |
192 | if [ -d arch/${ARCH}/include ]; then | 267 | cp -a --parents arch/arm/kernel/signal.h $kerneldir/build/ 2>/dev/null || : |
193 | cp -a --parents arch/${ARCH}/include $kerneldir/build/ | 268 | fi |
194 | fi | 269 | |
195 | 270 | if [ -d arch/${ARCH}/include ]; then | |
196 | cp -a include $kerneldir/build | 271 | cp -a --parents arch/${ARCH}/include $kerneldir/build/ |
197 | 272 | fi | |
198 | cp -a --parents lib/vdso/* $kerneldir/build/ 2>/dev/null || : | 273 | |
199 | 274 | cp -a include $kerneldir/build | |
200 | cp -a --parents tools/include/tools/le_byteshift.h $kerneldir/build/ | 275 | |
201 | cp -a --parents tools/include/tools/be_byteshift.h $kerneldir/build/ | 276 | cp -a --parents lib/vdso/* $kerneldir/build/ 2>/dev/null || : |
202 | 277 | ||
203 | # required for generate missing syscalls prepare phase | 278 | cp -a --parents tools/include/tools/le_byteshift.h $kerneldir/build/ |
204 | cp -a --parents $(find arch/x86 -type f -name "syscall_32.tbl") $kerneldir/build | 279 | cp -a --parents tools/include/tools/be_byteshift.h $kerneldir/build/ |
205 | cp -a --parents $(find arch/arm -type f -name "*.tbl") $kerneldir/build 2>/dev/null || : | 280 | |
206 | 281 | # required for generate missing syscalls prepare phase | |
207 | if [ "${ARCH}" = "x86" ]; then | 282 | cp -a --parents $(find arch/x86 -type f -name "syscall_32.tbl") $kerneldir/build |
208 | # files for 'make prepare' to succeed with kernel-devel | 283 | cp -a --parents $(find arch/arm -type f -name "*.tbl") $kerneldir/build 2>/dev/null || : |
209 | cp -a --parents $(find arch/x86 -type f -name "syscall_32.tbl") $kerneldir/build/ | 284 | |
210 | cp -a --parents $(find arch/x86 -type f -name "syscalltbl.sh") $kerneldir/build/ | 285 | if [ "${ARCH}" = "x86" ]; then |
211 | cp -a --parents $(find arch/x86 -type f -name "syscallhdr.sh") $kerneldir/build/ | 286 | # files for 'make prepare' to succeed with kernel-devel |
212 | cp -a --parents $(find arch/x86 -type f -name "syscall_64.tbl") $kerneldir/build/ | 287 | cp -a --parents $(find arch/x86 -type f -name "syscall_32.tbl") $kerneldir/build/ 2>/dev/null || : |
213 | cp -a --parents arch/x86/tools/relocs_32.c $kerneldir/build/ | 288 | cp -a --parents $(find arch/x86 -type f -name "syscalltbl.sh") $kerneldir/build/ 2>/dev/null || : |
214 | cp -a --parents arch/x86/tools/relocs_64.c $kerneldir/build/ | 289 | cp -a --parents $(find arch/x86 -type f -name "syscallhdr.sh") $kerneldir/build/ 2>/dev/null || : |
215 | cp -a --parents arch/x86/tools/relocs.c $kerneldir/build/ | 290 | cp -a --parents $(find arch/x86 -type f -name "syscall_64.tbl") $kerneldir/build/ 2>/dev/null || : |
216 | cp -a --parents arch/x86/tools/relocs_common.c $kerneldir/build/ | 291 | cp -a --parents arch/x86/tools/relocs_32.c $kerneldir/build/ |
217 | cp -a --parents arch/x86/tools/relocs.h $kerneldir/build/ | 292 | cp -a --parents arch/x86/tools/relocs_64.c $kerneldir/build/ |
218 | cp -a --parents arch/x86/tools/gen-insn-attr-x86.awk $kerneldir/build/ 2>/dev/null || : | 293 | cp -a --parents arch/x86/tools/relocs.c $kerneldir/build/ |
219 | cp -a --parents arch/x86/purgatory/purgatory.c $kerneldir/build/ | 294 | cp -a --parents arch/x86/tools/relocs_common.c $kerneldir/build/ |
220 | 295 | cp -a --parents arch/x86/tools/relocs.h $kerneldir/build/ | |
221 | # 4.18 + have unified the purgatory files, so we ignore any errors if | 296 | cp -a --parents arch/x86/tools/gen-insn-attr-x86.awk $kerneldir/build/ 2>/dev/null || : |
222 | # these files are not present | 297 | cp -a --parents arch/x86/purgatory/purgatory.c $kerneldir/build/ |
223 | cp -a --parents arch/x86/purgatory/sha256.h $kerneldir/build/ 2>/dev/null || : | 298 | |
224 | cp -a --parents arch/x86/purgatory/sha256.c $kerneldir/build/ 2>/dev/null || : | 299 | # 4.18 + have unified the purgatory files, so we ignore any errors if |
225 | 300 | # these files are not present | |
226 | cp -a --parents arch/x86/purgatory/stack.S $kerneldir/build/ | 301 | cp -a --parents arch/x86/purgatory/sha256.h $kerneldir/build/ 2>/dev/null || : |
227 | cp -a --parents arch/x86/purgatory/string.c $kerneldir/build/ 2>/dev/null || : | 302 | cp -a --parents arch/x86/purgatory/sha256.c $kerneldir/build/ 2>/dev/null || : |
228 | cp -a --parents arch/x86/purgatory/setup-x86_64.S $kerneldir/build/ | 303 | |
229 | cp -a --parents arch/x86/purgatory/entry64.S $kerneldir/build/ | 304 | cp -a --parents arch/x86/purgatory/stack.S $kerneldir/build/ |
230 | cp -a --parents arch/x86/boot/string.h $kerneldir/build/ | 305 | cp -a --parents arch/x86/purgatory/string.c $kerneldir/build/ 2>/dev/null || : |
231 | cp -a --parents arch/x86/boot/string.c $kerneldir/build/ | 306 | cp -a --parents arch/x86/purgatory/setup-x86_64.S $kerneldir/build/ |
232 | cp -a --parents arch/x86/boot/compressed/string.c $kerneldir/build/ 2>/dev/null || : | 307 | cp -a --parents arch/x86/purgatory/entry64.S $kerneldir/build/ |
233 | cp -a --parents arch/x86/boot/ctype.h $kerneldir/build/ | 308 | cp -a --parents arch/x86/boot/string.h $kerneldir/build/ |
234 | 309 | cp -a --parents arch/x86/boot/string.c $kerneldir/build/ | |
235 | # objtool requires these files | 310 | cp -a --parents arch/x86/boot/compressed/string.c $kerneldir/build/ 2>/dev/null || : |
236 | cp -a --parents arch/x86/lib/inat.c $kerneldir/build/ 2>/dev/null || : | 311 | cp -a --parents arch/x86/boot/ctype.h $kerneldir/build/ |
237 | cp -a --parents arch/x86/lib/insn.c $kerneldir/build/ 2>/dev/null || : | 312 | |
238 | fi | 313 | # objtool requires these files |
239 | 314 | cp -a --parents arch/x86/lib/inat.c $kerneldir/build/ 2>/dev/null || : | |
240 | if [ "${ARCH}" = "mips" ]; then | 315 | cp -a --parents arch/x86/lib/insn.c $kerneldir/build/ 2>/dev/null || : |
241 | cp -a --parents arch/mips/Kbuild.platforms $kerneldir/build/ | 316 | |
242 | cp --parents $(find -type f -name "Platform") $kerneldir/build | 317 | # v6.1+ |
243 | cp --parents arch/mips/boot/tools/relocs* $kerneldir/build | 318 | cp -a --parents arch/x86/kernel/asm-offsets* $kerneldir/build || : |
244 | cp -a --parents arch/mips/kernel/asm-offsets.c $kerneldir/build | 319 | # for capabilities.h, vmx.h |
245 | cp -a --parents kernel/time/timeconst.bc $kerneldir/build | 320 | cp -a --parents arch/x86/kvm/vmx/*.h $kerneldir/build || : |
246 | cp -a --parents kernel/bounds.c $kerneldir/build | 321 | # for lapic.h, hyperv.h .... |
247 | cp -a --parents Kbuild $kerneldir/build | 322 | cp -a --parents arch/x86/kvm/*.h $kerneldir/build || : |
248 | cp -a --parents arch/mips/kernel/syscalls/*.sh $kerneldir/build 2>/dev/null || : | 323 | fi |
249 | cp -a --parents arch/mips/kernel/syscalls/*.tbl $kerneldir/build 2>/dev/null || : | 324 | |
250 | cp -a --parents arch/mips/tools/elf-entry.c $kerneldir/build 2>/dev/null || : | 325 | # moved from arch/mips to all arches for v6.1+ |
251 | fi | 326 | cp -a --parents kernel/time/timeconst.bc $kerneldir/build 2>/dev/null || : |
327 | cp -a --parents kernel/bounds.c $kerneldir/build 2>/dev/null || : | ||
328 | |||
329 | if [ "${ARCH}" = "mips" ]; then | ||
330 | cp -a --parents arch/mips/Kbuild.platforms $kerneldir/build/ | ||
331 | cp --parents $(find -type f -name "Platform") $kerneldir/build | ||
332 | cp --parents arch/mips/boot/tools/relocs* $kerneldir/build | ||
333 | cp -a --parents arch/mips/kernel/asm-offsets.c $kerneldir/build | ||
334 | cp -a --parents Kbuild $kerneldir/build | ||
335 | cp -a --parents arch/mips/kernel/syscalls/*.sh $kerneldir/build 2>/dev/null || : | ||
336 | cp -a --parents arch/mips/kernel/syscalls/*.tbl $kerneldir/build 2>/dev/null || : | ||
337 | cp -a --parents arch/mips/tools/elf-entry.c $kerneldir/build 2>/dev/null || : | ||
338 | fi | ||
339 | |||
340 | if [ "${ARCH}" = "loongarch" ]; then | ||
341 | cp -a --parents arch/loongarch/kernel/asm-offsets.c $kerneldir/build | ||
342 | cp -a --parents Kbuild $kerneldir/build | ||
343 | cp -a --parents arch/loongarch/vdso/*.S $kerneldir/build 2>/dev/null || : | ||
344 | cp -a --parents arch/loongarch/vdso/*gettimeofday.* $kerneldir/build 2>/dev/null || : | ||
345 | cp -a --parents arch/loongarch/vdso/*getcpu.* $kerneldir/build 2>/dev/null || : | ||
346 | cp -a --parents arch/loongarch/vdso/gen_vdso*_offsets.sh $kerneldir/build/ 2>/dev/null || : | ||
347 | fi | ||
252 | 348 | ||
253 | # required to build scripts/selinux/genheaders/genheaders | 349 | # required to build scripts/selinux/genheaders/genheaders |
254 | cp -a --parents security/selinux/include/* $kerneldir/build/ | 350 | cp -a --parents security/selinux/include/* $kerneldir/build/ |
255 | 351 | ||
256 | # copy any localversion files | 352 | # copy any localversion files |
257 | cp -a localversion* $kerneldir/build/ 2>/dev/null || : | 353 | cp -a localversion* $kerneldir/build/ 2>/dev/null || : |
258 | ) | 354 | ) |
259 | 355 | ||
260 | # Make sure the Makefile and version.h have a matching timestamp so that | 356 | # Make sure the Makefile and version.h have a matching timestamp so that |
261 | # external modules can be built | 357 | # external modules can be built |
262 | touch -r $kerneldir/build/Makefile $kerneldir/build/include/generated/uapi/linux/version.h | 358 | touch -r $kerneldir/build/Makefile $kerneldir/build/include/generated/uapi/linux/version.h |
263 | 359 | ||
264 | # Copy .config to include/config/auto.conf so "make prepare" is unnecessary. | 360 | # This fixes a warning that the compilers don't match when building a module |
265 | cp $kerneldir/build/.config $kerneldir/build/include/config/auto.conf | 361 | # Change: CONFIG_CC_VERSION_TEXT="x86_64-poky-linux-gcc (GCC) 12.2.0" to "gcc (GCC) 12.2.0" |
362 | # #define CONFIG_CC_VERSION_TEXT "x86_64-poky-linux-gcc (GCC) 12.2.0" to "gcc (GCC) 12.2.0" | ||
363 | sed -i 's/CONFIG_CC_VERSION_TEXT=".*\(gcc.*\)"/CONFIG_CC_VERSION_TEXT="\1"/' "$kerneldir/build/.config" | ||
364 | sed -i 's/#define CONFIG_CC_VERSION_TEXT ".*\(gcc.*\)"/#define CONFIG_CC_VERSION_TEXT "\1"/' $kerneldir/build/include/generated/autoconf.h | ||
365 | sed -i 's/CONFIG_CC_VERSION_TEXT=".*\(gcc.*\)"/CONFIG_CC_VERSION_TEXT="\1"/' $kerneldir/build/include/config/auto.conf | ||
266 | 366 | ||
267 | # make sure these are at least as old as the .config, or rebuilds will trigger | 367 | # make sure these are at least as old as the .config, or rebuilds will trigger |
268 | touch -r $kerneldir/build/.config $kerneldir/build/include/generated/autoconf.h 2>/dev/null || : | 368 | touch -r $kerneldir/build/.config $kerneldir/build/include/generated/autoconf.h 2>/dev/null || : |
@@ -271,6 +371,13 @@ do_install() { | |||
271 | if [ -e "$kerneldir/build/include/config/auto.conf.cmd" ]; then | 371 | if [ -e "$kerneldir/build/include/config/auto.conf.cmd" ]; then |
272 | sed -i 's/ifneq "$(CC)" ".*-linux-.*gcc.*$/ifneq "$(CC)" "gcc"/' "$kerneldir/build/include/config/auto.conf.cmd" | 372 | sed -i 's/ifneq "$(CC)" ".*-linux-.*gcc.*$/ifneq "$(CC)" "gcc"/' "$kerneldir/build/include/config/auto.conf.cmd" |
273 | sed -i 's/ifneq "$(LD)" ".*-linux-.*ld.bfd.*$/ifneq "$(LD)" "ld"/' "$kerneldir/build/include/config/auto.conf.cmd" | 373 | sed -i 's/ifneq "$(LD)" ".*-linux-.*ld.bfd.*$/ifneq "$(LD)" "ld"/' "$kerneldir/build/include/config/auto.conf.cmd" |
374 | sed -i 's/ifneq "$(AR)" ".*-linux-.*ar.*$/ifneq "$(AR)" "ar"/' "$kerneldir/build/include/config/auto.conf.cmd" | ||
375 | sed -i 's/ifneq "$(OBJCOPY)" ".*-linux-.*objcopy.*$/ifneq "$(OBJCOPY)" "objcopy"/' "$kerneldir/build/include/config/auto.conf.cmd" | ||
376 | if [ "${ARCH}" = "powerpc" ]; then | ||
377 | sed -i 's/ifneq "$(NM)" ".*-linux-.*nm.*$/ifneq "$(NM)" "nm --synthetic"/' "$kerneldir/build/include/config/auto.conf.cmd" | ||
378 | else | ||
379 | sed -i 's/ifneq "$(NM)" ".*-linux-.*nm.*$/ifneq "$(NM)" "nm"/' "$kerneldir/build/include/config/auto.conf.cmd" | ||
380 | fi | ||
274 | sed -i 's/ifneq "$(HOSTCXX)" ".*$/ifneq "$(HOSTCXX)" "g++"/' "$kerneldir/build/include/config/auto.conf.cmd" | 381 | sed -i 's/ifneq "$(HOSTCXX)" ".*$/ifneq "$(HOSTCXX)" "g++"/' "$kerneldir/build/include/config/auto.conf.cmd" |
275 | sed -i 's/ifneq "$(HOSTCC)" ".*$/ifneq "$(HOSTCC)" "gcc"/' "$kerneldir/build/include/config/auto.conf.cmd" | 382 | sed -i 's/ifneq "$(HOSTCC)" ".*$/ifneq "$(HOSTCC)" "gcc"/' "$kerneldir/build/include/config/auto.conf.cmd" |
276 | sed -i 's/ifneq "$(CC_VERSION_TEXT)".*\(gcc.*\)"/ifneq "$(CC_VERSION_TEXT)" "\1"/' "$kerneldir/build/include/config/auto.conf.cmd" | 383 | sed -i 's/ifneq "$(CC_VERSION_TEXT)".*\(gcc.*\)"/ifneq "$(CC_VERSION_TEXT)" "\1"/' "$kerneldir/build/include/config/auto.conf.cmd" |
@@ -283,9 +390,9 @@ do_install() { | |||
283 | # left as /usr/bin/python rootfs assembly will fail, since we only have python3 | 390 | # left as /usr/bin/python rootfs assembly will fail, since we only have python3 |
284 | # in the RDEPENDS (and the python3 package does not include /usr/bin/python) | 391 | # in the RDEPENDS (and the python3 package does not include /usr/bin/python) |
285 | for ss in $(find $kerneldir/build/scripts -type f -name '*'); do | 392 | for ss in $(find $kerneldir/build/scripts -type f -name '*'); do |
286 | sed -i 's,/usr/bin/python2,/usr/bin/env python3,' "$ss" | 393 | sed -i 's,/usr/bin/python2,/usr/bin/env python3,' "$ss" |
287 | sed -i 's,/usr/bin/env python2,/usr/bin/env python3,' "$ss" | 394 | sed -i 's,/usr/bin/env python2,/usr/bin/env python3,' "$ss" |
288 | sed -i 's,/usr/bin/python,/usr/bin/env python3,' "$ss" | 395 | sed -i 's,/usr/bin/python,/usr/bin/env python3,' "$ss" |
289 | done | 396 | done |
290 | 397 | ||
291 | chown -R root:root ${D} | 398 | chown -R root:root ${D} |
@@ -294,13 +401,17 @@ do_install() { | |||
294 | # Ensure we don't race against "make scripts" during cpio | 401 | # Ensure we don't race against "make scripts" during cpio |
295 | do_install[lockfiles] = "${TMPDIR}/kernel-scripts.lock" | 402 | do_install[lockfiles] = "${TMPDIR}/kernel-scripts.lock" |
296 | 403 | ||
297 | FILES_${PN} = "${KERNEL_BUILD_ROOT} ${KERNEL_SRC_PATH}" | 404 | FILES:${PN} = "${KERNEL_BUILD_ROOT} ${KERNEL_SRC_PATH}" |
298 | FILES_${PN}-dbg += "${KERNEL_BUILD_ROOT}*/build/scripts/*/.debug/*" | 405 | FILES:${PN}-dbg += "${KERNEL_BUILD_ROOT}*/build/scripts/*/.debug/*" |
299 | 406 | ||
300 | RDEPENDS_${PN} = "bc python3 flex bison ${TCLIBC}-utils" | 407 | RDEPENDS:${PN} = "bc python3-core flex bison ${TCLIBC}-utils gawk" |
301 | # 4.15+ needs these next two RDEPENDS | 408 | # 4.15+ needs these next two RDEPENDS |
302 | RDEPENDS_${PN} += "openssl-dev util-linux" | 409 | RDEPENDS:${PN} += "openssl-dev util-linux" |
303 | # and x86 needs a bit more for 4.15+ | 410 | # and x86 needs a bit more for 4.15+ |
304 | RDEPENDS_${PN} += "${@bb.utils.contains('ARCH', 'x86', 'elfutils', '', d)}" | 411 | RDEPENDS:${PN} += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-dev', '', d)}" |
412 | # powerpc needs elfutils on 6.3+ | ||
413 | RDEPENDS:${PN} += "${@bb.utils.contains('ARCH', 'powerpc', 'elfutils-dev', '', d)}" | ||
305 | # 5.8+ needs gcc-plugins libmpc-dev | 414 | # 5.8+ needs gcc-plugins libmpc-dev |
306 | RDEPENDS_${PN} += "gcc-plugins libmpc-dev" | 415 | RDEPENDS:${PN} += "gcc-plugins libmpc-dev" |
416 | # 5.13+ needs grep for powerpc | ||
417 | RDEPENDS:${PN}:append:powerpc = " grep" | ||
diff --git a/meta/recipes-kernel/linux/linux-dummy.bb b/meta/recipes-kernel/linux/linux-dummy.bb index 95dc85ff2f..d7f39a452d 100644 --- a/meta/recipes-kernel/linux/linux-dummy.bb +++ b/meta/recipes-kernel/linux/linux-dummy.bb | |||
@@ -4,34 +4,32 @@ provider for virtual/kernel to satisfy dependencies for situations \ | |||
4 | where you wish to build the kernel externally from the build system." | 4 | where you wish to build the kernel externally from the build system." |
5 | SECTION = "kernel" | 5 | SECTION = "kernel" |
6 | 6 | ||
7 | LICENSE = "GPLv2" | 7 | LICENSE = "GPL-2.0-only" |
8 | LIC_FILES_CHKSUM = "file://COPYING.GPL;md5=751419260aa954499f7abaabaa882bbe" | 8 | LIC_FILES_CHKSUM = "file://COPYING.GPL;md5=751419260aa954499f7abaabaa882bbe" |
9 | 9 | ||
10 | PROVIDES += "virtual/kernel" | 10 | PROVIDES += "virtual/kernel" |
11 | 11 | ||
12 | inherit deploy | 12 | inherit deploy linux-dummy |
13 | 13 | ||
14 | PACKAGES_DYNAMIC += "^kernel-module-.*" | 14 | PACKAGES_DYNAMIC += "^kernel-module-.*" |
15 | PACKAGES_DYNAMIC += "^kernel-image-.*" | 15 | PACKAGES_DYNAMIC += "^kernel-image-.*" |
16 | PACKAGES_DYNAMIC += "^kernel-firmware-.*" | 16 | PACKAGES_DYNAMIC += "^kernel-firmware-.*" |
17 | 17 | ||
18 | PACKAGES += "kernel-modules kernel-vmlinux" | 18 | PACKAGES += "kernel-modules kernel-vmlinux" |
19 | FILES_kernel-modules = "" | 19 | FILES:kernel-modules = "" |
20 | ALLOW_EMPTY_kernel-modules = "1" | 20 | ALLOW_EMPTY:kernel-modules = "1" |
21 | DESCRIPTION_kernel-modules = "Kernel modules meta package" | 21 | DESCRIPTION:kernel-modules = "Kernel modules meta package" |
22 | FILES_kernel-vmlinux = "" | 22 | FILES:kernel-vmlinux = "" |
23 | ALLOW_EMPTY_kernel-vmlinux = "1" | 23 | ALLOW_EMPTY:kernel-vmlinux = "1" |
24 | DESCRIPTION_kernel-vmlinux = "Kernel vmlinux meta package" | 24 | DESCRIPTION:kernel-vmlinux = "Kernel vmlinux meta package" |
25 | |||
26 | 25 | ||
27 | INHIBIT_DEFAULT_DEPS = "1" | 26 | INHIBIT_DEFAULT_DEPS = "1" |
28 | 27 | ||
29 | COMPATIBLE_HOST = ".*-linux" | 28 | COMPATIBLE_HOST = ".*-linux" |
30 | 29 | ||
31 | PR = "r1" | ||
32 | |||
33 | SRC_URI = "file://COPYING.GPL" | 30 | SRC_URI = "file://COPYING.GPL" |
34 | S = "${WORKDIR}" | 31 | |
32 | S = "${UNPACKDIR}" | ||
35 | 33 | ||
36 | do_configure() { | 34 | do_configure() { |
37 | : | 35 | : |
diff --git a/meta/recipes-kernel/linux/linux-yocto-dev.bb b/meta/recipes-kernel/linux/linux-yocto-dev.bb index 2ccc0ee875..4b1f93a692 100644 --- a/meta/recipes-kernel/linux/linux-yocto-dev.bb +++ b/meta/recipes-kernel/linux/linux-yocto-dev.bb | |||
@@ -10,17 +10,15 @@ | |||
10 | 10 | ||
11 | inherit kernel | 11 | inherit kernel |
12 | require recipes-kernel/linux/linux-yocto.inc | 12 | require recipes-kernel/linux/linux-yocto.inc |
13 | # for ncurses tests | ||
14 | inherit pkgconfig | ||
15 | 13 | ||
16 | # provide this .inc to set specific revisions | 14 | # provide this .inc to set specific revisions |
17 | include recipes-kernel/linux/linux-yocto-dev-revisions.inc | 15 | include recipes-kernel/linux/linux-yocto-dev-revisions.inc |
18 | 16 | ||
19 | KBRANCH = "standard/base" | 17 | KBRANCH = "v6.15/standard/base" |
20 | KMETA = "kernel-meta" | 18 | KMETA = "kernel-meta" |
21 | 19 | ||
22 | SRC_URI = "git://git.yoctoproject.org/linux-yocto-dev.git;branch=${KBRANCH};name=machine \ | 20 | SRC_URI = "git://git.yoctoproject.org/linux-yocto-dev.git;branch=${KBRANCH};name=machine;protocol=https \ |
23 | git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=master;destsuffix=${KMETA}" | 21 | git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=master;destsuffix=${KMETA};protocol=https" |
24 | 22 | ||
25 | # Set default SRCREVs. Both the machine and meta SRCREVs are statically set | 23 | # Set default SRCREVs. Both the machine and meta SRCREVs are statically set |
26 | # to the korg v3.7 tag, and hence prevent network access during parsing. If | 24 | # to the korg v3.7 tag, and hence prevent network access during parsing. If |
@@ -30,25 +28,34 @@ SRC_URI = "git://git.yoctoproject.org/linux-yocto-dev.git;branch=${KBRANCH};name | |||
30 | SRCREV_machine ?= '${@oe.utils.conditional("PREFERRED_PROVIDER_virtual/kernel", "linux-yocto-dev", "${AUTOREV}", "29594404d7fe73cd80eaa4ee8c43dcc53970c60e", d)}' | 28 | SRCREV_machine ?= '${@oe.utils.conditional("PREFERRED_PROVIDER_virtual/kernel", "linux-yocto-dev", "${AUTOREV}", "29594404d7fe73cd80eaa4ee8c43dcc53970c60e", d)}' |
31 | SRCREV_meta ?= '${@oe.utils.conditional("PREFERRED_PROVIDER_virtual/kernel", "linux-yocto-dev", "${AUTOREV}", "29594404d7fe73cd80eaa4ee8c43dcc53970c60e", d)}' | 29 | SRCREV_meta ?= '${@oe.utils.conditional("PREFERRED_PROVIDER_virtual/kernel", "linux-yocto-dev", "${AUTOREV}", "29594404d7fe73cd80eaa4ee8c43dcc53970c60e", d)}' |
32 | 30 | ||
33 | LINUX_VERSION ?= "5.11+" | 31 | LINUX_VERSION ?= "6.15" |
34 | LINUX_VERSION_EXTENSION ?= "-yoctodev-${LINUX_KERNEL_TYPE}" | 32 | LINUX_VERSION_EXTENSION ?= "-yoctodev-${LINUX_KERNEL_TYPE}" |
35 | PV = "${LINUX_VERSION}+git${SRCPV}" | 33 | PV = "${LINUX_VERSION}+git" |
36 | 34 | ||
37 | LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" | 35 | LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" |
38 | 36 | ||
39 | DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}" | 37 | # yaml and dtschema are required for 5.16+ device tree validation, libyaml is checked |
40 | DEPENDS += "openssl-native util-linux-native" | 38 | # via pkgconfig, so must always be present, but we can wrap the others to make them |
39 | # conditional | ||
40 | DEPENDS += "libyaml-native" | ||
41 | 41 | ||
42 | COMPATIBLE_MACHINE = "(qemuarm|qemux86|qemuppc|qemumips|qemumips64|qemux86-64|qemuriscv64)" | 42 | PACKAGECONFIG ??= "" |
43 | PACKAGECONFIG[dt-validation] = ",,python3-dtschema-native" | ||
44 | # we need the wrappers if validation isn't in the packageconfig | ||
45 | DEPENDS += "${@bb.utils.contains('PACKAGECONFIG', 'dt-validation', '', 'python3-dtschema-wrapper-native', d)}" | ||
43 | 46 | ||
44 | KERNEL_DEVICETREE_qemuarmv5 = "versatile-pb.dtb" | 47 | COMPATIBLE_MACHINE = "^(qemuarmv5|qemuarm|qemuarm64|qemux86|qemuppc|qemumips|qemumips64|qemux86-64|qemuriscv32|qemuriscv64|qemuloongarch64)$" |
48 | |||
49 | KERNEL_DEVICETREE:qemuarmv5 = "arm/versatile-pb.dtb" | ||
45 | 50 | ||
46 | # Functionality flags | 51 | # Functionality flags |
47 | KERNEL_EXTRA_FEATURES ?= "features/netfilter/netfilter.scc features/taskstats/taskstats.scc" | 52 | KERNEL_EXTRA_FEATURES ?= "features/netfilter/netfilter.scc features/taskstats/taskstats.scc" |
48 | KERNEL_FEATURES_append = " ${KERNEL_EXTRA_FEATURES}" | 53 | KERNEL_FEATURES:append = " ${KERNEL_EXTRA_FEATURES}" |
49 | KERNEL_FEATURES_append_qemuall=" cfg/virtio.scc features/drm-bochs/drm-bochs.scc" | 54 | KERNEL_FEATURES:append:qemuall = " cfg/virtio.scc features/drm-bochs/drm-bochs.scc" |
50 | KERNEL_FEATURES_append_qemux86=" cfg/sound.scc cfg/paravirt_kvm.scc" | 55 | KERNEL_FEATURES:append:qemux86 = " cfg/sound.scc cfg/paravirt_kvm.scc" |
51 | KERNEL_FEATURES_append_qemux86-64=" cfg/sound.scc cfg/paravirt_kvm.scc" | 56 | KERNEL_FEATURES:append:qemux86-64 = " cfg/sound.scc cfg/paravirt_kvm.scc" |
52 | KERNEL_FEATURES_append = " ${@bb.utils.contains("TUNE_FEATURES", "mx32", " cfg/x32.scc", "", d)}" | 57 | KERNEL_FEATURES:append = " ${@bb.utils.contains("TUNE_FEATURES", "mx32", " cfg/x32.scc", "", d)}" |
58 | KERNEL_FEATURES:append = " ${@bb.utils.contains("DISTRO_FEATURES", "ptest", " features/scsi/scsi-debug.scc", "", d)}" | ||
59 | KERNEL_FEATURES:append = " ${@bb.utils.contains("DISTRO_FEATURES", "ptest", " features/gpio/mockup.scc features/gpio/sim.scc", "", d)}" | ||
53 | 60 | ||
54 | KERNEL_VERSION_SANITY_SKIP = "1" | 61 | KERNEL_VERSION_SANITY_SKIP = "1" |
diff --git a/meta/recipes-kernel/linux/linux-yocto-fitimage.bb b/meta/recipes-kernel/linux/linux-yocto-fitimage.bb new file mode 100644 index 0000000000..6ce1960a87 --- /dev/null +++ b/meta/recipes-kernel/linux/linux-yocto-fitimage.bb | |||
@@ -0,0 +1,13 @@ | |||
1 | SUMMARY = "The Linux kernel as a FIT image (optionally with initramfs)" | ||
2 | SECTION = "kernel" | ||
3 | |||
4 | # If an initramfs is included in the FIT image more licenses apply. | ||
5 | # But also the kernel uses more than one license (see Documentation/process/license-rules.rst) | ||
6 | LICENSE = "GPL-2.0-with-Linux-syscall-note" | ||
7 | LIC_FILES_CHKSUM = "file://${COREBASE}/meta/files/common-licenses/GPL-2.0-with-Linux-syscall-note;md5=0bad96c422c41c3a94009dcfe1bff992" | ||
8 | |||
9 | inherit linux-kernel-base kernel-fit-image | ||
10 | |||
11 | # Set the version of this recipe to the version of the included kernel | ||
12 | # (without taking the long way around via PV) | ||
13 | PKGV = "${@get_kernelversion_file("${STAGING_KERNEL_BUILDDIR}")}" | ||
diff --git a/meta/recipes-kernel/linux/linux-yocto-rt_5.4.bb b/meta/recipes-kernel/linux/linux-yocto-rt_5.4.bb deleted file mode 100644 index 2508b9ba07..0000000000 --- a/meta/recipes-kernel/linux/linux-yocto-rt_5.4.bb +++ /dev/null | |||
@@ -1,45 +0,0 @@ | |||
1 | KBRANCH ?= "v5.4/standard/preempt-rt/base" | ||
2 | |||
3 | require recipes-kernel/linux/linux-yocto.inc | ||
4 | |||
5 | # Skip processing of this recipe if it is not explicitly specified as the | ||
6 | # PREFERRED_PROVIDER for virtual/kernel. This avoids errors when trying | ||
7 | # to build multiple virtual/kernel providers, e.g. as dependency of | ||
8 | # core-image-rt-sdk, core-image-rt. | ||
9 | python () { | ||
10 | if d.getVar("KERNEL_PACKAGE_NAME") == "kernel" and d.getVar("PREFERRED_PROVIDER_virtual/kernel") != "linux-yocto-rt": | ||
11 | raise bb.parse.SkipRecipe("Set PREFERRED_PROVIDER_virtual/kernel to linux-yocto-rt to enable it") | ||
12 | } | ||
13 | |||
14 | SRCREV_machine ?= "0406e600800a40015d02b16ee6a4a46c6673c66f" | ||
15 | SRCREV_meta ?= "4f6d6c23cc8ca5d9c39b1efc2619b1dfec1ef2bc" | ||
16 | |||
17 | SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;branch=${KBRANCH};name=machine \ | ||
18 | git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-5.4;destsuffix=${KMETA}" | ||
19 | |||
20 | LINUX_VERSION ?= "5.4.98" | ||
21 | |||
22 | LIC_FILES_CHKSUM = "file://COPYING;md5=bbea815ee2795b2f4230826c0c6b8814" | ||
23 | |||
24 | DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}" | ||
25 | DEPENDS += "openssl-native util-linux-native" | ||
26 | |||
27 | PV = "${LINUX_VERSION}+git${SRCPV}" | ||
28 | |||
29 | KMETA = "kernel-meta" | ||
30 | KCONF_BSP_AUDIT_LEVEL = "2" | ||
31 | |||
32 | LINUX_KERNEL_TYPE = "preempt-rt" | ||
33 | |||
34 | COMPATIBLE_MACHINE = "(qemux86|qemux86-64|qemuarm|qemuarmv5|qemuarm64|qemuppc|qemumips)" | ||
35 | |||
36 | KERNEL_DEVICETREE_qemuarmv5 = "versatile-pb.dtb" | ||
37 | |||
38 | # Functionality flags | ||
39 | KERNEL_EXTRA_FEATURES ?= "features/netfilter/netfilter.scc features/taskstats/taskstats.scc" | ||
40 | KERNEL_FEATURES_append = " ${KERNEL_EXTRA_FEATURES}" | ||
41 | KERNEL_FEATURES_append_qemuall=" cfg/virtio.scc features/drm-bochs/drm-bochs.scc" | ||
42 | KERNEL_FEATURES_append_qemux86=" cfg/sound.scc cfg/paravirt_kvm.scc" | ||
43 | KERNEL_FEATURES_append_qemux86-64=" cfg/sound.scc cfg/paravirt_kvm.scc" | ||
44 | KERNEL_FEATURES_append = "${@bb.utils.contains("DISTRO_FEATURES", "ptest", " features/scsi/scsi-debug.scc", "", d)}" | ||
45 | KERNEL_FEATURES_append = "${@bb.utils.contains("DISTRO_FEATURES", "ptest", " features/gpio/mockup.scc", "", d)}" | ||
diff --git a/meta/recipes-kernel/linux/linux-yocto-rt_5.10.bb b/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb index 54996a8aee..5a7bad9017 100644 --- a/meta/recipes-kernel/linux/linux-yocto-rt_5.10.bb +++ b/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb | |||
@@ -1,7 +1,10 @@ | |||
1 | KBRANCH ?= "v5.10/standard/preempt-rt/base" | 1 | KBRANCH ?= "v6.12/standard/preempt-rt/base" |
2 | 2 | ||
3 | require recipes-kernel/linux/linux-yocto.inc | 3 | require recipes-kernel/linux/linux-yocto.inc |
4 | 4 | ||
5 | # CVE exclusions | ||
6 | include recipes-kernel/linux/cve-exclusion_6.12.inc | ||
7 | |||
5 | # Skip processing of this recipe if it is not explicitly specified as the | 8 | # Skip processing of this recipe if it is not explicitly specified as the |
6 | # PREFERRED_PROVIDER for virtual/kernel. This avoids errors when trying | 9 | # PREFERRED_PROVIDER for virtual/kernel. This avoids errors when trying |
7 | # to build multiple virtual/kernel providers, e.g. as dependency of | 10 | # to build multiple virtual/kernel providers, e.g. as dependency of |
@@ -11,35 +14,35 @@ python () { | |||
11 | raise bb.parse.SkipRecipe("Set PREFERRED_PROVIDER_virtual/kernel to linux-yocto-rt to enable it") | 14 | raise bb.parse.SkipRecipe("Set PREFERRED_PROVIDER_virtual/kernel to linux-yocto-rt to enable it") |
12 | } | 15 | } |
13 | 16 | ||
14 | SRCREV_machine ?= "142456428adbf16db56572889232220afb201974" | 17 | SRCREV_machine ?= "7cb6d42c40de351ecab0a083aef260f84407de0d" |
15 | SRCREV_meta ?= "8f72218572b1d4a5f053ced2bbf0558d0557072d" | 18 | SRCREV_meta ?= "60b8562e9989f268ad5d241989f56b71cfa1f648" |
16 | 19 | ||
17 | SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;branch=${KBRANCH};name=machine \ | 20 | SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;branch=${KBRANCH};name=machine;protocol=https \ |
18 | git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-5.10;destsuffix=${KMETA}" | 21 | git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.12;destsuffix=${KMETA};protocol=https" |
19 | 22 | ||
20 | LINUX_VERSION ?= "5.10.16" | 23 | LINUX_VERSION ?= "6.12.31" |
21 | 24 | ||
22 | LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" | 25 | LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" |
23 | 26 | ||
24 | DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}" | 27 | DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}" |
25 | DEPENDS += "openssl-native util-linux-native" | 28 | DEPENDS += "openssl-native util-linux-native" |
26 | 29 | ||
27 | PV = "${LINUX_VERSION}+git${SRCPV}" | 30 | PV = "${LINUX_VERSION}+git" |
28 | 31 | ||
29 | KMETA = "kernel-meta" | 32 | KMETA = "kernel-meta" |
30 | KCONF_BSP_AUDIT_LEVEL = "1" | 33 | KCONF_BSP_AUDIT_LEVEL = "1" |
31 | 34 | ||
32 | LINUX_KERNEL_TYPE = "preempt-rt" | 35 | LINUX_KERNEL_TYPE = "preempt-rt" |
33 | 36 | ||
34 | COMPATIBLE_MACHINE = "(qemux86|qemux86-64|qemuarm|qemuarmv5|qemuarm64|qemuppc|qemumips)" | 37 | COMPATIBLE_MACHINE = "^(qemux86|qemux86-64|qemuarm|qemuarmv5|qemuarm64|qemuppc|qemumips)$" |
35 | 38 | ||
36 | KERNEL_DEVICETREE_qemuarmv5 = "versatile-pb.dtb" | 39 | KERNEL_DEVICETREE:qemuarmv5 = "arm/versatile-pb.dtb" |
37 | 40 | ||
38 | # Functionality flags | 41 | # Functionality flags |
39 | KERNEL_EXTRA_FEATURES ?= "features/netfilter/netfilter.scc features/taskstats/taskstats.scc" | 42 | KERNEL_EXTRA_FEATURES ?= "features/netfilter/netfilter.scc features/taskstats/taskstats.scc" |
40 | KERNEL_FEATURES_append = " ${KERNEL_EXTRA_FEATURES}" | 43 | KERNEL_FEATURES:append = " ${KERNEL_EXTRA_FEATURES}" |
41 | KERNEL_FEATURES_append_qemuall=" cfg/virtio.scc features/drm-bochs/drm-bochs.scc" | 44 | KERNEL_FEATURES:append:qemuall = " cfg/virtio.scc features/drm-bochs/drm-bochs.scc" |
42 | KERNEL_FEATURES_append_qemux86=" cfg/sound.scc cfg/paravirt_kvm.scc" | 45 | KERNEL_FEATURES:append:qemux86 = " cfg/sound.scc cfg/paravirt_kvm.scc" |
43 | KERNEL_FEATURES_append_qemux86-64=" cfg/sound.scc cfg/paravirt_kvm.scc" | 46 | KERNEL_FEATURES:append:qemux86-64 = " cfg/sound.scc cfg/paravirt_kvm.scc" |
44 | KERNEL_FEATURES_append = "${@bb.utils.contains("DISTRO_FEATURES", "ptest", " features/scsi/scsi-debug.scc", "", d)}" | 47 | KERNEL_FEATURES:append = "${@bb.utils.contains("DISTRO_FEATURES", "ptest", " features/scsi/scsi-debug.scc", "", d)}" |
45 | KERNEL_FEATURES_append = "${@bb.utils.contains("DISTRO_FEATURES", "ptest", " features/gpio/mockup.scc", "", d)}" | 48 | KERNEL_FEATURES:append = "${@bb.utils.contains("DISTRO_FEATURES", "ptest", " features/gpio/mockup.scc features/gpio/sim.scc", "", d)}" |
diff --git a/meta/recipes-kernel/linux/linux-yocto-tiny_5.10.bb b/meta/recipes-kernel/linux/linux-yocto-tiny_5.10.bb deleted file mode 100644 index 8ecd10716a..0000000000 --- a/meta/recipes-kernel/linux/linux-yocto-tiny_5.10.bb +++ /dev/null | |||
@@ -1,32 +0,0 @@ | |||
1 | KBRANCH ?= "v5.10/standard/tiny/base" | ||
2 | KBRANCH_qemuarm ?= "v5.10/standard/tiny/arm-versatile-926ejs" | ||
3 | |||
4 | LINUX_KERNEL_TYPE = "tiny" | ||
5 | KCONFIG_MODE = "--allnoconfig" | ||
6 | |||
7 | require recipes-kernel/linux/linux-yocto.inc | ||
8 | |||
9 | LINUX_VERSION ?= "5.10.16" | ||
10 | LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" | ||
11 | |||
12 | DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}" | ||
13 | DEPENDS += "openssl-native util-linux-native" | ||
14 | |||
15 | KMETA = "kernel-meta" | ||
16 | KCONF_BSP_AUDIT_LEVEL = "2" | ||
17 | |||
18 | SRCREV_machine_qemuarm ?= "be720c1ce6d1cba2bb3815ad04773355339380ab" | ||
19 | SRCREV_machine ?= "98eda36c9616b598b3586c7cc532e8e0ba8b3953" | ||
20 | SRCREV_meta ?= "8f72218572b1d4a5f053ced2bbf0558d0557072d" | ||
21 | |||
22 | PV = "${LINUX_VERSION}+git${SRCPV}" | ||
23 | |||
24 | SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;branch=${KBRANCH};name=machine \ | ||
25 | git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-5.10;destsuffix=${KMETA}" | ||
26 | |||
27 | COMPATIBLE_MACHINE = "qemux86|qemux86-64|qemuarm|qemuarmv5" | ||
28 | |||
29 | # Functionality flags | ||
30 | KERNEL_FEATURES = "" | ||
31 | |||
32 | KERNEL_DEVICETREE_qemuarmv5 = "versatile-pb.dtb" | ||
diff --git a/meta/recipes-kernel/linux/linux-yocto-tiny_5.4.bb b/meta/recipes-kernel/linux/linux-yocto-tiny_5.4.bb deleted file mode 100644 index ff03fd4197..0000000000 --- a/meta/recipes-kernel/linux/linux-yocto-tiny_5.4.bb +++ /dev/null | |||
@@ -1,32 +0,0 @@ | |||
1 | KBRANCH ?= "v5.4/standard/tiny/base" | ||
2 | KBRANCH_qemuarm ?= "v5.4/standard/tiny/arm-versatile-926ejs" | ||
3 | |||
4 | LINUX_KERNEL_TYPE = "tiny" | ||
5 | KCONFIG_MODE = "--allnoconfig" | ||
6 | |||
7 | require recipes-kernel/linux/linux-yocto.inc | ||
8 | |||
9 | LINUX_VERSION ?= "5.4.98" | ||
10 | LIC_FILES_CHKSUM = "file://COPYING;md5=bbea815ee2795b2f4230826c0c6b8814" | ||
11 | |||
12 | DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}" | ||
13 | DEPENDS += "openssl-native util-linux-native" | ||
14 | |||
15 | KMETA = "kernel-meta" | ||
16 | KCONF_BSP_AUDIT_LEVEL = "2" | ||
17 | |||
18 | SRCREV_machine_qemuarm ?= "fc95a485415d22eb772359b8d350c03b85c0cd1b" | ||
19 | SRCREV_machine ?= "2d0a4ea86fe97f13a4bc2a92a097e4edb51d737d" | ||
20 | SRCREV_meta ?= "4f6d6c23cc8ca5d9c39b1efc2619b1dfec1ef2bc" | ||
21 | |||
22 | PV = "${LINUX_VERSION}+git${SRCPV}" | ||
23 | |||
24 | SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;branch=${KBRANCH};name=machine \ | ||
25 | git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-5.4;destsuffix=${KMETA}" | ||
26 | |||
27 | COMPATIBLE_MACHINE = "qemux86|qemux86-64|qemuarm|qemuarmv5" | ||
28 | |||
29 | # Functionality flags | ||
30 | KERNEL_FEATURES = "" | ||
31 | |||
32 | KERNEL_DEVICETREE_qemuarmv5 = "versatile-pb.dtb" | ||
diff --git a/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb b/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb new file mode 100644 index 0000000000..0fad73dddd --- /dev/null +++ b/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb | |||
@@ -0,0 +1,33 @@ | |||
1 | KBRANCH ?= "v6.12/standard/tiny/base" | ||
2 | |||
3 | LINUX_KERNEL_TYPE = "tiny" | ||
4 | KCONFIG_MODE = "--allnoconfig" | ||
5 | |||
6 | require recipes-kernel/linux/linux-yocto.inc | ||
7 | |||
8 | # CVE exclusions | ||
9 | include recipes-kernel/linux/cve-exclusion_6.12.inc | ||
10 | |||
11 | LINUX_VERSION ?= "6.12.31" | ||
12 | LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" | ||
13 | |||
14 | DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}" | ||
15 | DEPENDS += "openssl-native util-linux-native" | ||
16 | |||
17 | KMETA = "kernel-meta" | ||
18 | KCONF_BSP_AUDIT_LEVEL = "2" | ||
19 | |||
20 | SRCREV_machine ?= "298aefdf4112e7c0a84522e4acf2c722e433c8a0" | ||
21 | SRCREV_meta ?= "60b8562e9989f268ad5d241989f56b71cfa1f648" | ||
22 | |||
23 | PV = "${LINUX_VERSION}+git" | ||
24 | |||
25 | SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;branch=${KBRANCH};name=machine;protocol=https \ | ||
26 | git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.12;destsuffix=${KMETA};protocol=https" | ||
27 | |||
28 | COMPATIBLE_MACHINE = "^(qemux86|qemux86-64|qemuarm64|qemuarm|qemuarmv5)$" | ||
29 | |||
30 | # Functionality flags | ||
31 | KERNEL_FEATURES:append:qemuall = " cfg/virtio.scc cfg/fs/ext4.scc" | ||
32 | |||
33 | KERNEL_DEVICETREE:qemuarmv5 = "arm/versatile-pb.dtb" | ||
diff --git a/meta/recipes-kernel/linux/linux-yocto.inc b/meta/recipes-kernel/linux/linux-yocto.inc index a85280990b..389329030d 100644 --- a/meta/recipes-kernel/linux/linux-yocto.inc +++ b/meta/recipes-kernel/linux/linux-yocto.inc | |||
@@ -1,6 +1,6 @@ | |||
1 | SUMMARY = "Linux kernel" | 1 | SUMMARY = "Linux kernel" |
2 | SECTION = "kernel" | 2 | SECTION = "kernel" |
3 | LICENSE = "GPLv2" | 3 | LICENSE = "GPL-2.0-with-Linux-syscall-note" |
4 | HOMEPAGE = "https://www.yoctoproject.org/" | 4 | HOMEPAGE = "https://www.yoctoproject.org/" |
5 | 5 | ||
6 | LIC_FILES_CHKSUM ?= "file://COPYING;md5=d7810fab7487fb0aad327b76f1be7cd7" | 6 | LIC_FILES_CHKSUM ?= "file://COPYING;md5=d7810fab7487fb0aad327b76f1be7cd7" |
@@ -19,21 +19,23 @@ python () { | |||
19 | } | 19 | } |
20 | 20 | ||
21 | DEPENDS += "xz-native bc-native" | 21 | DEPENDS += "xz-native bc-native" |
22 | DEPENDS_append_aarch64 = " libgcc" | 22 | DEPENDS:append:aarch64 = " libgcc" |
23 | KERNEL_CC_append_aarch64 = " ${TOOLCHAIN_OPTIONS}" | 23 | KERNEL_CC:append:aarch64 = " ${TOOLCHAIN_OPTIONS}" |
24 | KERNEL_LD_append_aarch64 = " ${TOOLCHAIN_OPTIONS}" | 24 | KERNEL_LD:append:aarch64 = " ${TOOLCHAIN_OPTIONS}" |
25 | 25 | ||
26 | DEPENDS_append_nios2 = " libgcc" | 26 | DEPENDS:append:nios2 = " libgcc" |
27 | KERNEL_CC_append_nios2 = " ${TOOLCHAIN_OPTIONS}" | 27 | KERNEL_CC:append:nios2 = " ${TOOLCHAIN_OPTIONS}" |
28 | KERNEL_LD_append_nios2 = " ${TOOLCHAIN_OPTIONS}" | 28 | KERNEL_LD:append:nios2 = " ${TOOLCHAIN_OPTIONS}" |
29 | 29 | ||
30 | DEPENDS_append_arc = " libgcc" | 30 | DEPENDS:append:arc = " libgcc" |
31 | KERNEL_CC_append_arc = " ${TOOLCHAIN_OPTIONS}" | 31 | KERNEL_CC:append:arc = " ${TOOLCHAIN_OPTIONS}" |
32 | KERNEL_LD_append_arc = " ${TOOLCHAIN_OPTIONS}" | 32 | KERNEL_LD:append:arc = " ${TOOLCHAIN_OPTIONS}" |
33 | 33 | ||
34 | KERNEL_FEATURES_append_qemuall=" features/debug/printk.scc" | 34 | KERNEL_FEATURES:append:qemuall = " features/debug/printk.scc features/taskstats/taskstats.scc" |
35 | 35 | ||
36 | KERNEL_FEATURES_append = " ${@bb.utils.contains('MACHINE_FEATURES', 'numa', 'features/numa/numa.scc', '', d)}" | 36 | KERNEL_FEATURES:append = " ${@bb.utils.contains('MACHINE_FEATURES', 'efi', 'cfg/efi.scc', '', d)}" |
37 | KERNEL_FEATURES:append = " ${@bb.utils.contains('MACHINE_FEATURES', 'numa', 'features/numa/numa.scc', '', d)}" | ||
38 | KERNEL_FEATURES:append = " ${@bb.utils.contains('MACHINE_FEATURES', 'vfat', 'cfg/fs/vfat.scc', '', d)}" | ||
37 | 39 | ||
38 | # A KMACHINE is the mapping of a yocto $MACHINE to what is built | 40 | # A KMACHINE is the mapping of a yocto $MACHINE to what is built |
39 | # by the kernel. This is typically the branch that should be built, | 41 | # by the kernel. This is typically the branch that should be built, |
@@ -48,11 +50,32 @@ inherit kernel-yocto | |||
48 | 50 | ||
49 | B = "${WORKDIR}/linux-${PACKAGE_ARCH}-${LINUX_KERNEL_TYPE}-build" | 51 | B = "${WORKDIR}/linux-${PACKAGE_ARCH}-${LINUX_KERNEL_TYPE}-build" |
50 | 52 | ||
51 | do_install_append(){ | 53 | do_install:append(){ |
52 | if [ -n "${KMETA}" ]; then | 54 | if [ -n "${KMETA}" ]; then |
53 | rm -rf ${STAGING_KERNEL_DIR}/${KMETA} | 55 | rm -rf ${STAGING_KERNEL_DIR}/${KMETA} |
54 | fi | 56 | fi |
55 | } | 57 | } |
56 | 58 | ||
57 | # enable kernel-sample for oeqa/runtime/cases's ksample.py test | 59 | # enable kernel-sample for oeqa/runtime/cases's ksample.py test |
58 | KERNEL_FEATURES_append_qemuall=" features/kernel-sample/kernel-sample.scc" | 60 | KERNEL_FEATURES:append:qemuall = " features/kernel-sample/kernel-sample.scc" |
61 | |||
62 | KERNEL_DEBUG ?= "" | ||
63 | # These used to be version specific, but are now common dependencies. New | ||
64 | # tools / dependencies will continue to be added in version specific recipes. | ||
65 | DEPENDS += '${@bb.utils.contains_any("ARCH", [ "x86", "arm64", "powerpc" ], "elfutils-native", "", d)}' | ||
66 | DEPENDS += "openssl-native util-linux-native" | ||
67 | DEPENDS += "gmp-native libmpc-native" | ||
68 | |||
69 | # Some options depend on CONFIG_PAHOLE_VERSION, so need to make pahole-native available before do_kernel_configme | ||
70 | do_kernel_configme[depends] += '${@bb.utils.contains("KERNEL_DEBUG", "True", "pahole-native:do_populate_sysroot", "", d)}' | ||
71 | |||
72 | EXTRA_OEMAKE += '${@bb.utils.contains("KERNEL_DEBUG", "True", "", "PAHOLE=false", d)}' | ||
73 | |||
74 | do_devshell:prepend() { | ||
75 | # setup native pkg-config variables (kconfig scripts call pkg-config directly, cannot generically be overriden to pkg-config-native) | ||
76 | d.setVar("PKG_CONFIG_DIR", "${STAGING_DIR_NATIVE}${libdir_native}/pkgconfig") | ||
77 | d.setVar("PKG_CONFIG_PATH", "${PKG_CONFIG_DIR}:${STAGING_DATADIR_NATIVE}/pkgconfig") | ||
78 | d.setVar("PKG_CONFIG_LIBDIR", "${PKG_CONFIG_DIR}") | ||
79 | d.setVarFlag("PKG_CONFIG_SYSROOT_DIR", "unexport", "1") | ||
80 | d.appendVar("OE_TERMINAL_EXPORTS", " PKG_CONFIG_DIR PKG_CONFIG_PATH PKG_CONFIG_LIBDIR PKG_CONFIG_SYSROOT_DIR") | ||
81 | } | ||
diff --git a/meta/recipes-kernel/linux/linux-yocto_5.10.bb b/meta/recipes-kernel/linux/linux-yocto_5.10.bb deleted file mode 100644 index 38b56c17bf..0000000000 --- a/meta/recipes-kernel/linux/linux-yocto_5.10.bb +++ /dev/null | |||
@@ -1,56 +0,0 @@ | |||
1 | KBRANCH ?= "v5.10/standard/base" | ||
2 | |||
3 | require recipes-kernel/linux/linux-yocto.inc | ||
4 | |||
5 | # board specific branches | ||
6 | KBRANCH_qemuarm ?= "v5.10/standard/arm-versatile-926ejs" | ||
7 | KBRANCH_qemuarm64 ?= "v5.10/standard/qemuarm64" | ||
8 | KBRANCH_qemumips ?= "v5.10/standard/mti-malta32" | ||
9 | KBRANCH_qemuppc ?= "v5.10/standard/qemuppc" | ||
10 | KBRANCH_qemuriscv64 ?= "v5.10/standard/base" | ||
11 | KBRANCH_qemux86 ?= "v5.10/standard/base" | ||
12 | KBRANCH_qemux86-64 ?= "v5.10/standard/base" | ||
13 | KBRANCH_qemumips64 ?= "v5.10/standard/mti-malta64" | ||
14 | |||
15 | SRCREV_machine_qemuarm ?= "57a6fbd33df5c7f057f301387b03a70cdc582282" | ||
16 | SRCREV_machine_qemuarm64 ?= "98eda36c9616b598b3586c7cc532e8e0ba8b3953" | ||
17 | SRCREV_machine_qemumips ?= "79bd439bff3c9f95cac6fb81c76b559a404a32dc" | ||
18 | SRCREV_machine_qemuppc ?= "98eda36c9616b598b3586c7cc532e8e0ba8b3953" | ||
19 | SRCREV_machine_qemuriscv64 ?= "98eda36c9616b598b3586c7cc532e8e0ba8b3953" | ||
20 | SRCREV_machine_qemux86 ?= "98eda36c9616b598b3586c7cc532e8e0ba8b3953" | ||
21 | SRCREV_machine_qemux86-64 ?= "98eda36c9616b598b3586c7cc532e8e0ba8b3953" | ||
22 | SRCREV_machine_qemumips64 ?= "07bda345fe202b1d2ce233ffc20b7570f78c9c7f" | ||
23 | SRCREV_machine ?= "98eda36c9616b598b3586c7cc532e8e0ba8b3953" | ||
24 | SRCREV_meta ?= "8f72218572b1d4a5f053ced2bbf0558d0557072d" | ||
25 | |||
26 | # remap qemuarm to qemuarma15 for the 5.8 kernel | ||
27 | # KMACHINE_qemuarm ?= "qemuarma15" | ||
28 | |||
29 | SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;name=machine;branch=${KBRANCH}; \ | ||
30 | git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-5.10;destsuffix=${KMETA}" | ||
31 | |||
32 | LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" | ||
33 | LINUX_VERSION ?= "5.10.16" | ||
34 | |||
35 | DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}" | ||
36 | DEPENDS += "openssl-native util-linux-native" | ||
37 | DEPENDS += "gmp-native" | ||
38 | |||
39 | PV = "${LINUX_VERSION}+git${SRCPV}" | ||
40 | |||
41 | KMETA = "kernel-meta" | ||
42 | KCONF_BSP_AUDIT_LEVEL = "1" | ||
43 | |||
44 | KERNEL_DEVICETREE_qemuarmv5 = "versatile-pb.dtb" | ||
45 | |||
46 | COMPATIBLE_MACHINE = "qemuarm|qemuarmv5|qemuarm64|qemux86|qemuppc|qemumips|qemumips64|qemux86-64|qemuriscv64" | ||
47 | |||
48 | # Functionality flags | ||
49 | KERNEL_EXTRA_FEATURES ?= "features/netfilter/netfilter.scc" | ||
50 | KERNEL_FEATURES_append = " ${KERNEL_EXTRA_FEATURES}" | ||
51 | KERNEL_FEATURES_append_qemuall=" cfg/virtio.scc features/drm-bochs/drm-bochs.scc" | ||
52 | KERNEL_FEATURES_append_qemux86=" cfg/sound.scc cfg/paravirt_kvm.scc" | ||
53 | KERNEL_FEATURES_append_qemux86-64=" cfg/sound.scc cfg/paravirt_kvm.scc" | ||
54 | KERNEL_FEATURES_append = " ${@bb.utils.contains("TUNE_FEATURES", "mx32", " cfg/x32.scc", "", d)}" | ||
55 | KERNEL_FEATURES_append = " ${@bb.utils.contains("DISTRO_FEATURES", "ptest", " features/scsi/scsi-debug.scc", "", d)}" | ||
56 | KERNEL_FEATURES_append = " ${@bb.utils.contains("DISTRO_FEATURES", "ptest", " features/gpio/mockup.scc", "", d)}" | ||
diff --git a/meta/recipes-kernel/linux/linux-yocto_5.4.bb b/meta/recipes-kernel/linux/linux-yocto_5.4.bb deleted file mode 100644 index 8d0f4b82c0..0000000000 --- a/meta/recipes-kernel/linux/linux-yocto_5.4.bb +++ /dev/null | |||
@@ -1,55 +0,0 @@ | |||
1 | KBRANCH ?= "v5.4/standard/base" | ||
2 | |||
3 | require recipes-kernel/linux/linux-yocto.inc | ||
4 | |||
5 | # board specific branches | ||
6 | KBRANCH_qemuarm ?= "v5.4/standard/arm-versatile-926ejs" | ||
7 | KBRANCH_qemuarm64 ?= "v5.4/standard/qemuarm64" | ||
8 | KBRANCH_qemumips ?= "v5.4/standard/mti-malta32" | ||
9 | KBRANCH_qemuppc ?= "v5.4/standard/qemuppc" | ||
10 | KBRANCH_qemuriscv64 ?= "v5.4/standard/base" | ||
11 | KBRANCH_qemux86 ?= "v5.4/standard/base" | ||
12 | KBRANCH_qemux86-64 ?= "v5.4/standard/base" | ||
13 | KBRANCH_qemumips64 ?= "v5.4/standard/mti-malta64" | ||
14 | |||
15 | SRCREV_machine_qemuarm ?= "28bc6b294bb1e49da671b2848234f9011efcad88" | ||
16 | SRCREV_machine_qemuarm64 ?= "2d0a4ea86fe97f13a4bc2a92a097e4edb51d737d" | ||
17 | SRCREV_machine_qemumips ?= "105568d1696f86625cf7bc30d8c5c921732de2f4" | ||
18 | SRCREV_machine_qemuppc ?= "2d0a4ea86fe97f13a4bc2a92a097e4edb51d737d" | ||
19 | SRCREV_machine_qemuriscv64 ?= "2d0a4ea86fe97f13a4bc2a92a097e4edb51d737d" | ||
20 | SRCREV_machine_qemux86 ?= "2d0a4ea86fe97f13a4bc2a92a097e4edb51d737d" | ||
21 | SRCREV_machine_qemux86-64 ?= "2d0a4ea86fe97f13a4bc2a92a097e4edb51d737d" | ||
22 | SRCREV_machine_qemumips64 ?= "c76ba20ee1b1de859736f85f0210459c2104b8df" | ||
23 | SRCREV_machine ?= "2d0a4ea86fe97f13a4bc2a92a097e4edb51d737d" | ||
24 | SRCREV_meta ?= "4f6d6c23cc8ca5d9c39b1efc2619b1dfec1ef2bc" | ||
25 | |||
26 | # remap qemuarm to qemuarma15 for the 5.4 kernel | ||
27 | # KMACHINE_qemuarm ?= "qemuarma15" | ||
28 | |||
29 | SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;name=machine;branch=${KBRANCH}; \ | ||
30 | git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-5.4;destsuffix=${KMETA}" | ||
31 | |||
32 | LIC_FILES_CHKSUM = "file://COPYING;md5=bbea815ee2795b2f4230826c0c6b8814" | ||
33 | LINUX_VERSION ?= "5.4.98" | ||
34 | |||
35 | DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}" | ||
36 | DEPENDS += "openssl-native util-linux-native" | ||
37 | |||
38 | PV = "${LINUX_VERSION}+git${SRCPV}" | ||
39 | |||
40 | KMETA = "kernel-meta" | ||
41 | KCONF_BSP_AUDIT_LEVEL = "1" | ||
42 | |||
43 | KERNEL_DEVICETREE_qemuarmv5 = "versatile-pb.dtb" | ||
44 | |||
45 | COMPATIBLE_MACHINE = "qemuarm|qemuarmv5|qemuarm64|qemux86|qemuppc|qemumips|qemumips64|qemux86-64|qemuriscv64" | ||
46 | |||
47 | # Functionality flags | ||
48 | KERNEL_EXTRA_FEATURES ?= "features/netfilter/netfilter.scc" | ||
49 | KERNEL_FEATURES_append = " ${KERNEL_EXTRA_FEATURES}" | ||
50 | KERNEL_FEATURES_append_qemuall=" cfg/virtio.scc features/drm-bochs/drm-bochs.scc" | ||
51 | KERNEL_FEATURES_append_qemux86=" cfg/sound.scc cfg/paravirt_kvm.scc" | ||
52 | KERNEL_FEATURES_append_qemux86-64=" cfg/sound.scc cfg/paravirt_kvm.scc" | ||
53 | KERNEL_FEATURES_append = " ${@bb.utils.contains("TUNE_FEATURES", "mx32", " cfg/x32.scc", "", d)}" | ||
54 | KERNEL_FEATURES_append = " ${@bb.utils.contains("DISTRO_FEATURES", "ptest", " features/scsi/scsi-debug.scc", "", d)}" | ||
55 | KERNEL_FEATURES_append = " ${@bb.utils.contains("DISTRO_FEATURES", "ptest", " features/gpio/mockup.scc", "", d)}" | ||
diff --git a/meta/recipes-kernel/linux/linux-yocto_6.12.bb b/meta/recipes-kernel/linux/linux-yocto_6.12.bb new file mode 100644 index 0000000000..262ae35704 --- /dev/null +++ b/meta/recipes-kernel/linux/linux-yocto_6.12.bb | |||
@@ -0,0 +1,79 @@ | |||
1 | KBRANCH ?= "v6.12/standard/base" | ||
2 | |||
3 | require recipes-kernel/linux/linux-yocto.inc | ||
4 | |||
5 | # CVE exclusions | ||
6 | include recipes-kernel/linux/cve-exclusion.inc | ||
7 | include recipes-kernel/linux/cve-exclusion_6.12.inc | ||
8 | |||
9 | # board specific branches | ||
10 | KBRANCH:qemuarm ?= "v6.12/standard/arm-versatile-926ejs" | ||
11 | KBRANCH:qemuarm64 ?= "v6.12/standard/base" | ||
12 | KBRANCH:qemumips ?= "v6.12/standard/mti-malta32" | ||
13 | KBRANCH:qemuppc ?= "v6.12/standard/qemuppc" | ||
14 | KBRANCH:qemuriscv64 ?= "v6.12/standard/base" | ||
15 | KBRANCH:qemuriscv32 ?= "v6.12/standard/base" | ||
16 | KBRANCH:qemux86 ?= "v6.12/standard/base" | ||
17 | KBRANCH:qemux86.104 ?= "v6.12/standard/base" | ||
18 | KBRANCH:qemuloongarch64 ?= "v6.12/standard/base" | ||
19 | KBRANCH:qemumips64 ?= "v6.12/standard/mti-malta64" | ||
20 | |||
21 | SRCREV_machine:qemuarm ?= "37a1fd13ca538e7785daf01434495a614bc55ead" | ||
22 | SRCREV_machine:qemuarm64 ?= "298aefdf4112e7c0a84522e4acf2c722e433c8a0" | ||
23 | SRCREV_machine:qemuloongarch64 ?= "298aefdf4112e7c0a84522e4acf2c722e433c8a0" | ||
24 | SRCREV_machine:qemumips ?= "2bcf58ea5aa19d54c436e63c59ab09b307e9ee8e" | ||
25 | SRCREV_machine:qemuppc ?= "298aefdf4112e7c0a84522e4acf2c722e433c8a0" | ||
26 | SRCREV_machine:qemuriscv64 ?= "298aefdf4112e7c0a84522e4acf2c722e433c8a0" | ||
27 | SRCREV_machine:qemuriscv32 ?= "298aefdf4112e7c0a84522e4acf2c722e433c8a0" | ||
28 | SRCREV_machine:qemux86 ?= "298aefdf4112e7c0a84522e4acf2c722e433c8a0" | ||
29 | SRCREV_machine:qemux86-64 ?= "298aefdf4112e7c0a84522e4acf2c722e433c8a0" | ||
30 | SRCREV_machine:qemumips64 ?= "6470f58a8f04951f202cf85afb4421d2e7ec9995" | ||
31 | SRCREV_machine ?= "298aefdf4112e7c0a84522e4acf2c722e433c8a0" | ||
32 | SRCREV_meta ?= "60b8562e9989f268ad5d241989f56b71cfa1f648" | ||
33 | |||
34 | # set your preferred provider of linux-yocto to 'linux-yocto-upstream', and you'll | ||
35 | # get the <version>/base branch, which is pure upstream -stable, and the same | ||
36 | # meta SRCREV as the linux-yocto-standard builds. Select your version using the | ||
37 | # normal PREFERRED_VERSION settings. | ||
38 | BBCLASSEXTEND = "devupstream:target" | ||
39 | SRCREV_machine:class-devupstream ?= "df3f6d10f353de274cc7c87f52dba5d26f185393" | ||
40 | PN:class-devupstream = "linux-yocto-upstream" | ||
41 | KBRANCH:class-devupstream = "v6.12/base" | ||
42 | |||
43 | SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;name=machine;branch=${KBRANCH};protocol=https \ | ||
44 | git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.12;destsuffix=${KMETA};protocol=https" | ||
45 | |||
46 | LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" | ||
47 | LINUX_VERSION ?= "6.12.31" | ||
48 | |||
49 | PV = "${LINUX_VERSION}+git" | ||
50 | |||
51 | KMETA = "kernel-meta" | ||
52 | KCONF_BSP_AUDIT_LEVEL = "1" | ||
53 | |||
54 | KERNEL_DEVICETREE:qemuarmv5 = "arm/versatile-pb.dtb" | ||
55 | |||
56 | COMPATIBLE_MACHINE = "^(qemuarm|qemuarmv5|qemuarm64|qemux86|qemuppc|qemuppc64|qemumips|qemumips64|qemux86-64|qemuriscv64|qemuriscv32|qemuloongarch64)$" | ||
57 | |||
58 | # Functionality flags | ||
59 | KERNEL_EXTRA_FEATURES ?= "features/netfilter/netfilter.scc" | ||
60 | KERNEL_FEATURES:append = " ${KERNEL_EXTRA_FEATURES}" | ||
61 | KERNEL_FEATURES:append:qemuall = " cfg/virtio.scc features/drm-bochs/drm-bochs.scc cfg/net/mdio.scc" | ||
62 | KERNEL_FEATURES:append:qemux86 = " cfg/sound.scc cfg/paravirt_kvm.scc" | ||
63 | KERNEL_FEATURES:append:qemux86-64 = " cfg/sound.scc cfg/paravirt_kvm.scc" | ||
64 | KERNEL_FEATURES:append = " ${@bb.utils.contains("TUNE_FEATURES", "mx32", " cfg/x32.scc", "", d)}" | ||
65 | KERNEL_FEATURES:append = " ${@bb.utils.contains("DISTRO_FEATURES", "ptest", " features/scsi/scsi-debug.scc features/nf_tables/nft_test.scc", "", d)}" | ||
66 | KERNEL_FEATURES:append = " ${@bb.utils.contains("DISTRO_FEATURES", "ptest", " features/gpio/mockup.scc features/gpio/sim.scc", "", d)}" | ||
67 | KERNEL_FEATURES:append = " ${@bb.utils.contains("KERNEL_DEBUG", "True", " features/reproducibility/reproducibility.scc features/debug/debug-btf.scc", "", d)}" | ||
68 | # libteam ptests from meta-oe needs it | ||
69 | KERNEL_FEATURES:append = " ${@bb.utils.contains("DISTRO_FEATURES", "ptest", " features/net/team/team.scc", "", d)}" | ||
70 | # openl2tp tests from meta-networking needs it | ||
71 | KERNEL_FEATURES:append = " ${@bb.utils.contains("DISTRO_FEATURES", "ptest", " cgl/cfg/net/l2tp.scc", "", d)}" | ||
72 | KERNEL_FEATURES:append:powerpc = " arch/powerpc/powerpc-debug.scc" | ||
73 | KERNEL_FEATURES:append:powerpc64 = " arch/powerpc/powerpc-debug.scc" | ||
74 | KERNEL_FEATURES:append:powerpc64le = " arch/powerpc/powerpc-debug.scc" | ||
75 | # Do not add debug info for riscv32, it fails during depmod | ||
76 | # ERROR: modpost: __ex_table+0x17a4 references non-executable section '.debug_loclists' | ||
77 | # Check again during next major version upgrade | ||
78 | KERNEL_FEATURES:remove:riscv32 = "features/debug/debug-kernel.scc" | ||
79 | INSANE_SKIP:kernel-vmlinux:qemuppc64 = "textrel" | ||
diff --git a/meta/recipes-kernel/lttng/babeltrace2/0001-Make-bt_field_blob_get_length-return-size_t-instead-.patch b/meta/recipes-kernel/lttng/babeltrace2/0001-Make-bt_field_blob_get_length-return-size_t-instead-.patch new file mode 100644 index 0000000000..4dffa7bfa5 --- /dev/null +++ b/meta/recipes-kernel/lttng/babeltrace2/0001-Make-bt_field_blob_get_length-return-size_t-instead-.patch | |||
@@ -0,0 +1,38 @@ | |||
1 | From a73cef80a0d4129f74ab2e160a15693235aad4d1 Mon Sep 17 00:00:00 2001 | ||
2 | From: Khem Raj <raj.khem@gmail.com> | ||
3 | Date: Thu, 20 Mar 2025 18:10:08 -0700 | ||
4 | Subject: [PATCH] Cast result of bt_field_blob_get_length to size_t in | ||
5 | constructor of bt2s::span | ||
6 | |||
7 | Fixes errors e.g. | ||
8 | | ../../git/src/cpp-common/bt2/field.hpp:1139:82: error: non-constant-expression cannot be narrowed from type 'std::uint64_t' (aka 'unsigned long long') to 'size_type' (aka 'unsigned int') in initializer list [-Wc++11-narrowing] | ||
9 | | 1139 | return {internal::CommonBlobFieldSpec<LibObjT>::data(this->libObjPtr()), this->length()}; | ||
10 | | | ^~~~~~~~~~~~~~ | ||
11 | | ../../git/src/plugins/ctf/common/src/msg-iter.cpp:744:56: note: in instantiation of member function 'bt2::CommonBlobField<bt_field>::data' requested here | ||
12 | | 744 | std::memcpy(&this->_stackTopCurSubField().asBlob().data()[_mCurBlobFieldDataOffset], | ||
13 | | | ^ | ||
14 | | ../../git/src/cpp-common/bt2/field.hpp:1139:82: note: insert an explicit cast to silence this issue | ||
15 | | 1139 | return {internal::CommonBlobFieldSpec<LibObjT>::data(this->libObjPtr()), this->length()}; | ||
16 | | | ^~~~~~~~~~~~~~ | ||
17 | | | static_cast<size_type>( ) | ||
18 | |||
19 | Upstream-Status: Backport [https://github.com/efficios/babeltrace/commit/1e6b34e411c61135ad256047a985a9bad927eae0] | ||
20 | |||
21 | Signed-off-by: Khem Raj <raj.khem@gmail.com> | ||
22 | --- | ||
23 | src/cpp-common/bt2/field.hpp | 2 +- | ||
24 | 1 file changed, 1 insertion(+), 1 deletion(-) | ||
25 | |||
26 | diff --git a/src/cpp-common/bt2/field.hpp b/src/cpp-common/bt2/field.hpp | ||
27 | index 8b291f7a..3a7d30a4 100644 | ||
28 | --- a/src/cpp-common/bt2/field.hpp | ||
29 | +++ b/src/cpp-common/bt2/field.hpp | ||
30 | @@ -1136,7 +1136,7 @@ public: | ||
31 | |||
32 | bt2s::span<typename internal::CommonBlobFieldSpec<LibObjT>::Data> data() const noexcept | ||
33 | { | ||
34 | - return {internal::CommonBlobFieldSpec<LibObjT>::data(this->libObjPtr()), this->length()}; | ||
35 | + return {internal::CommonBlobFieldSpec<LibObjT>::data(this->libObjPtr()), static_cast<std::size_t>(this->length())}; | ||
36 | } | ||
37 | |||
38 | std::uint64_t length() const noexcept | ||
diff --git a/meta/recipes-kernel/lttng/babeltrace2/0001-Make-manpages-multilib-identical.patch b/meta/recipes-kernel/lttng/babeltrace2/0001-Make-manpages-multilib-identical.patch index 2401b176e6..c2b76b1ed5 100644 --- a/meta/recipes-kernel/lttng/babeltrace2/0001-Make-manpages-multilib-identical.patch +++ b/meta/recipes-kernel/lttng/babeltrace2/0001-Make-manpages-multilib-identical.patch | |||
@@ -3,17 +3,20 @@ From: Jeremy Puhlman <jpuhlman@mvista.com> | |||
3 | Date: Mon, 9 Mar 2020 21:10:35 +0000 | 3 | Date: Mon, 9 Mar 2020 21:10:35 +0000 |
4 | Subject: [PATCH] Make manpages multilib identical | 4 | Subject: [PATCH] Make manpages multilib identical |
5 | 5 | ||
6 | Upstream-Status: Pending | 6 | Upstream-Status: Submitted [https://review.lttng.org/c/babeltrace/+/14222] |
7 | |||
7 | Signed-off-by: Jeremy Puhlman <jpuhlman@mvista.com> | 8 | Signed-off-by: Jeremy Puhlman <jpuhlman@mvista.com> |
9 | Signed-off-by: Bin Lan <bin.lan.cn@windriver.com> | ||
8 | --- | 10 | --- |
9 | doc/man/asciidoc-attrs.conf.in | 4 ++-- | 11 | doc/man/asciidoc-attrs.conf.in | 4 ++-- |
10 | 1 file changed, 2 insertions(+), 2 deletions(-) | 12 | 1 file changed, 2 insertions(+), 2 deletions(-) |
11 | 13 | ||
12 | diff --git a/doc/man/asciidoc-attrs.conf.in b/doc/man/asciidoc-attrs.conf.in | 14 | diff --git a/doc/man/asciidoc-attrs.conf.in b/doc/man/asciidoc-attrs.conf.in |
13 | index ad1183f1..e11c7031 100644 | 15 | index 88fb13ce2..27858b720 100644 |
14 | --- a/doc/man/asciidoc-attrs.conf.in | 16 | --- a/doc/man/asciidoc-attrs.conf.in |
15 | +++ b/doc/man/asciidoc-attrs.conf.in | 17 | +++ b/doc/man/asciidoc-attrs.conf.in |
16 | @@ -1,7 +1,7 @@ | 18 | @@ -4,8 +4,8 @@ |
19 | |||
17 | [attributes] | 20 | [attributes] |
18 | # default values | 21 | # default values |
19 | -system_plugin_path="@LIBDIR@/babeltrace2/plugins" | 22 | -system_plugin_path="@LIBDIR@/babeltrace2/plugins" |
@@ -24,5 +27,4 @@ index ad1183f1..e11c7031 100644 | |||
24 | enable_debug_info="@ENABLE_DEBUG_INFO_VAL@" | 27 | enable_debug_info="@ENABLE_DEBUG_INFO_VAL@" |
25 | defrdport=5344 | 28 | defrdport=5344 |
26 | -- | 29 | -- |
27 | 2.24.1 | 30 | 2.34.1 |
28 | |||
diff --git a/meta/recipes-kernel/lttng/babeltrace2/0001-tests-do-not-run-test-applications-from-.libs.patch b/meta/recipes-kernel/lttng/babeltrace2/0001-tests-do-not-run-test-applications-from-.libs.patch deleted file mode 100644 index 805dde8064..0000000000 --- a/meta/recipes-kernel/lttng/babeltrace2/0001-tests-do-not-run-test-applications-from-.libs.patch +++ /dev/null | |||
@@ -1,28 +0,0 @@ | |||
1 | From 582713cc9a013481eeef253195d644020f637ec4 Mon Sep 17 00:00:00 2001 | ||
2 | Message-Id: <582713cc9a013481eeef253195d644020f637ec4.1583403622.git.wallinux@gmail.com> | ||
3 | From: Anders Wallin <wallinux@gmail.com> | ||
4 | Date: Thu, 5 Mar 2020 11:20:04 +0100 | ||
5 | Subject: [PATCH] tests: do not run test applications from .libs | ||
6 | |||
7 | Cross compile specific change | ||
8 | |||
9 | Upstream-Status: Inappropriate [oe-core specific] | ||
10 | |||
11 | Signed-off-by: Anders Wallin <wallinux@gmail.com> | ||
12 | --- | ||
13 | tests/lib/test_plugin | 2 +- | ||
14 | 1 file changed, 1 insertion(+), 1 deletion(-) | ||
15 | |||
16 | diff --git a/tests/lib/test_plugin b/tests/lib/test_plugin | ||
17 | index 652c90cc..1f817c50 100755 | ||
18 | --- a/tests/lib/test_plugin | ||
19 | +++ b/tests/lib/test_plugin | ||
20 | @@ -26,4 +26,4 @@ fi | ||
21 | # shellcheck source=../utils/utils.sh | ||
22 | source "$UTILSSH" | ||
23 | |||
24 | -"${BT_TESTS_BUILDDIR}/lib/plugin" "${BT_TESTS_BUILDDIR}/lib/test-plugin-plugins/.libs" | ||
25 | +"${BT_TESTS_BUILDDIR}/lib/plugin" "${BT_TESTS_BUILDDIR}/lib/test-plugin-plugins" | ||
26 | -- | ||
27 | 2.25.1 | ||
28 | |||
diff --git a/meta/recipes-kernel/lttng/babeltrace2/0001-tests-fix-test-applications-in-cpp-common.patch b/meta/recipes-kernel/lttng/babeltrace2/0001-tests-fix-test-applications-in-cpp-common.patch new file mode 100644 index 0000000000..87f94fb087 --- /dev/null +++ b/meta/recipes-kernel/lttng/babeltrace2/0001-tests-fix-test-applications-in-cpp-common.patch | |||
@@ -0,0 +1,129 @@ | |||
1 | From 1dc81f272855d94e6a78f7d10ea952745d991aa9 Mon Sep 17 00:00:00 2001 | ||
2 | From: Bin Lan <bin.lan.cn@windriver.com> | ||
3 | Date: Tue, 11 Mar 2025 17:19:11 +0800 | ||
4 | Subject: [PATCH] Tests: fix test applications in cpp-common are needed to | ||
5 | re-build | ||
6 | |||
7 | Test applications in cpp-common directory are needed to re-build when | ||
8 | calling make check in embedded system. The following error is shown | ||
9 | when running test applications: | ||
10 | make[3]: *** No rule to make target 'cpp-common/test-c-string-view.cpp', | ||
11 | needed by 'cpp-common/test-c-string-view.o'. | ||
12 | make[3]: *** No rule to make target '../tests/utils/tap/libtap.la', | ||
13 | needed by 'cpp-common/test-c-string-view'. | ||
14 | make[3]: *** No rule to make target '../src/common/libcommon.la', | ||
15 | needed by 'cpp-common/test-c-string-view'. | ||
16 | make[3]: *** No rule to make target '../src/logging/liblogging.la', | ||
17 | needed by 'cpp-common/test-c-string-view'. | ||
18 | ... | ||
19 | make[2]: *** [Makefile:1274: check-TESTS] Error 2 | ||
20 | make[1]: *** [Makefile:1805: check-am] Error 2 | ||
21 | make: *** [Makefile:1033: check-recursive] Error 1 | ||
22 | make: Target 'check' not remade because of errors. | ||
23 | |||
24 | Create some new shell scripts which are used to call test applications | ||
25 | in cpp-common directory. Then these test applications can run without | ||
26 | actually examining the source code. | ||
27 | |||
28 | Upstream-Status: Submitted [https://review.lttng.org/c/babeltrace/+/14213] | ||
29 | |||
30 | Signed-off-by: Bin Lan <bin.lan.cn@windriver.com> | ||
31 | --- | ||
32 | tests/Makefile.am | 6 +++--- | ||
33 | tests/cpp-common/test-c-string-view.sh | 17 +++++++++++++++++ | ||
34 | tests/cpp-common/test-unicode-conv.sh | 17 +++++++++++++++++ | ||
35 | tests/cpp-common/test-uuid.sh | 17 +++++++++++++++++ | ||
36 | 4 files changed, 54 insertions(+), 3 deletions(-) | ||
37 | create mode 100755 tests/cpp-common/test-c-string-view.sh | ||
38 | create mode 100755 tests/cpp-common/test-unicode-conv.sh | ||
39 | create mode 100755 tests/cpp-common/test-uuid.sh | ||
40 | |||
41 | diff --git a/tests/Makefile.am b/tests/Makefile.am | ||
42 | index 2a4022bc4..c79b77b32 100644 | ||
43 | --- a/tests/Makefile.am | ||
44 | +++ b/tests/Makefile.am | ||
45 | @@ -129,9 +129,9 @@ cpp_common_test_unicode_conv_LDADD = \ | ||
46 | $(COMMON_TEST_LDADD) | ||
47 | |||
48 | TESTS_CPP_COMMON = \ | ||
49 | - cpp-common/test-c-string-view \ | ||
50 | - cpp-common/test-uuid \ | ||
51 | - cpp-common/test-unicode-conv | ||
52 | + cpp-common/test-c-string-view.sh \ | ||
53 | + cpp-common/test-uuid.sh \ | ||
54 | + cpp-common/test-unicode-conv.sh | ||
55 | |||
56 | TESTS_LIB = \ | ||
57 | lib/test-bt-uuid \ | ||
58 | diff --git a/tests/cpp-common/test-c-string-view.sh b/tests/cpp-common/test-c-string-view.sh | ||
59 | new file mode 100755 | ||
60 | index 000000000..9c2ca5818 | ||
61 | --- /dev/null | ||
62 | +++ b/tests/cpp-common/test-c-string-view.sh | ||
63 | @@ -0,0 +1,17 @@ | ||
64 | +#!/bin/bash | ||
65 | +# | ||
66 | +# SPDX-License-Identifier: GPL-2.0-only | ||
67 | +# | ||
68 | +# Copyright (C) 2025 Bin Lan <bin.lan.cn@windriver.com> | ||
69 | +# | ||
70 | + | ||
71 | +if [ -n "${BT_TESTS_SRCDIR:-}" ]; then | ||
72 | + UTILSSH="$BT_TESTS_SRCDIR/utils/utils.sh" | ||
73 | +else | ||
74 | + UTILSSH="$(dirname "$0")/../utils/utils.sh" | ||
75 | +fi | ||
76 | + | ||
77 | +# shellcheck source=../utils/utils.sh | ||
78 | +source "$UTILSSH" | ||
79 | + | ||
80 | +"${BT_TESTS_BUILDDIR}/cpp-common/test-c-string-view" "$BT_TESTS_BT2_BIN" | ||
81 | diff --git a/tests/cpp-common/test-unicode-conv.sh b/tests/cpp-common/test-unicode-conv.sh | ||
82 | new file mode 100755 | ||
83 | index 000000000..df490b2eb | ||
84 | --- /dev/null | ||
85 | +++ b/tests/cpp-common/test-unicode-conv.sh | ||
86 | @@ -0,0 +1,17 @@ | ||
87 | +#!/bin/bash | ||
88 | +# | ||
89 | +# SPDX-License-Identifier: GPL-2.0-only | ||
90 | +# | ||
91 | +# Copyright (C) 2025 Bin Lan <bin.lan.cn@windriver.com> | ||
92 | +# | ||
93 | + | ||
94 | +if [ -n "${BT_TESTS_SRCDIR:-}" ]; then | ||
95 | + UTILSSH="$BT_TESTS_SRCDIR/utils/utils.sh" | ||
96 | +else | ||
97 | + UTILSSH="$(dirname "$0")/../utils/utils.sh" | ||
98 | +fi | ||
99 | + | ||
100 | +# shellcheck source=../utils/utils.sh | ||
101 | +source "$UTILSSH" | ||
102 | + | ||
103 | +"${BT_TESTS_BUILDDIR}/cpp-common/test-unicode-conv" "$BT_TESTS_BT2_BIN" | ||
104 | diff --git a/tests/cpp-common/test-uuid.sh b/tests/cpp-common/test-uuid.sh | ||
105 | new file mode 100755 | ||
106 | index 000000000..8c65daa94 | ||
107 | --- /dev/null | ||
108 | +++ b/tests/cpp-common/test-uuid.sh | ||
109 | @@ -0,0 +1,17 @@ | ||
110 | +#!/bin/bash | ||
111 | +# | ||
112 | +# SPDX-License-Identifier: GPL-2.0-only | ||
113 | +# | ||
114 | +# Copyright (C) 2025 Bin Lan <bin.lan.cn@windriver.com> | ||
115 | +# | ||
116 | + | ||
117 | +if [ -n "${BT_TESTS_SRCDIR:-}" ]; then | ||
118 | + UTILSSH="$BT_TESTS_SRCDIR/utils/utils.sh" | ||
119 | +else | ||
120 | + UTILSSH="$(dirname "$0")/../utils/utils.sh" | ||
121 | +fi | ||
122 | + | ||
123 | +# shellcheck source=../utils/utils.sh | ||
124 | +source "$UTILSSH" | ||
125 | + | ||
126 | +"${BT_TESTS_BUILDDIR}/cpp-common/test-uuid" "$BT_TESTS_BT2_BIN" | ||
127 | -- | ||
128 | 2.34.1 | ||
129 | |||
diff --git a/meta/recipes-kernel/lttng/babeltrace2/0001-tests-set-the-correct-plugin-directory.patch b/meta/recipes-kernel/lttng/babeltrace2/0001-tests-set-the-correct-plugin-directory.patch new file mode 100644 index 0000000000..7ac7582ad7 --- /dev/null +++ b/meta/recipes-kernel/lttng/babeltrace2/0001-tests-set-the-correct-plugin-directory.patch | |||
@@ -0,0 +1,30 @@ | |||
1 | From 32494b1726a881883cb6d317ab76d1ec3f1fa740 Mon Sep 17 00:00:00 2001 | ||
2 | From: Bin Lan <bin.lan.cn@windriver.com> | ||
3 | Date: Wed, 5 Mar 2025 10:51:11 +0800 | ||
4 | Subject: [PATCH] tests: set the correct directory of plugin shared library | ||
5 | |||
6 | The plugin shared libraries are put in test-plugins-plugins/.libs when | ||
7 | building in a host. test-plugins-plugins/.libs is not exist when cross | ||
8 | build. The plugin shared libraries are put in test-plugins-plugins | ||
9 | directory when cross build. | ||
10 | |||
11 | Upstream-Status: Inappropriate [oe specific] | ||
12 | |||
13 | Signed-off-by: Bin Lan <bin.lan.cn@windriver.com> | ||
14 | --- | ||
15 | tests/lib/test-plugins.sh | 2 +- | ||
16 | 1 file changed, 1 insertion(+), 1 deletion(-) | ||
17 | |||
18 | diff --git a/tests/lib/test-plugins.sh b/tests/lib/test-plugins.sh | ||
19 | index f83e42baa..939236393 100755 | ||
20 | --- a/tests/lib/test-plugins.sh | ||
21 | +++ b/tests/lib/test-plugins.sh | ||
22 | @@ -14,4 +14,4 @@ fi | ||
23 | # shellcheck source=../utils/utils.sh | ||
24 | source "$UTILSSH" | ||
25 | |||
26 | -"${BT_TESTS_BUILDDIR}/lib/test-plugins" "${BT_TESTS_BUILDDIR}/lib/test-plugins-plugins/.libs" | ||
27 | +"${BT_TESTS_BUILDDIR}/lib/test-plugins" "${BT_TESTS_BUILDDIR}/lib/test-plugins-plugins" | ||
28 | -- | ||
29 | 2.34.1 | ||
30 | |||
diff --git a/meta/recipes-kernel/lttng/babeltrace2/run-ptest b/meta/recipes-kernel/lttng/babeltrace2/run-ptest index 72fe223436..a0bf33b75d 100755 --- a/meta/recipes-kernel/lttng/babeltrace2/run-ptest +++ b/meta/recipes-kernel/lttng/babeltrace2/run-ptest | |||
@@ -4,6 +4,16 @@ | |||
4 | 4 | ||
5 | # Without --ignore-exit, the tap harness causes any FAILs within a | 5 | # Without --ignore-exit, the tap harness causes any FAILs within a |
6 | # test plan to raise ERRORs; this is just noise. | 6 | # test plan to raise ERRORs; this is just noise. |
7 | makeargs="LOG_DRIVER_FLAGS=--ignore-exit abs_top_srcdir=$PWD abs_top_builddir=$PWD GREP=grep SED=sed PYTHON=python3" | 7 | makeargs="LOG_DRIVER_FLAGS=--ignore-exit abs_top_srcdir=$PWD abs_top_builddir=$PWD" |
8 | 8 | ||
9 | exec make -C tests -k -s $makeargs $target 2>/dev/null | 9 | exec 2> error.log |
10 | make -C tests -k -s $makeargs $target | ||
11 | exitcode=$? | ||
12 | if [ -e error.log ]; then | ||
13 | cat error.log | ||
14 | fi | ||
15 | if [ -e tests/test-suite.log ]; then | ||
16 | cat tests/test-suite.log | ||
17 | fi | ||
18 | |||
19 | exit $exitcode | ||
diff --git a/meta/recipes-kernel/lttng/babeltrace2_2.0.3.bb b/meta/recipes-kernel/lttng/babeltrace2_2.1.1.bb index 32ba75bf36..8bab7f677a 100644 --- a/meta/recipes-kernel/lttng/babeltrace2_2.0.3.bb +++ b/meta/recipes-kernel/lttng/babeltrace2_2.1.1.bb | |||
@@ -2,34 +2,45 @@ SUMMARY = "Babeltrace2 - Trace Format Babel Tower" | |||
2 | DESCRIPTION = "Babeltrace provides trace read and write libraries in host side, as well as a trace converter, which used to convert LTTng 2.0 traces into human-readable log." | 2 | DESCRIPTION = "Babeltrace provides trace read and write libraries in host side, as well as a trace converter, which used to convert LTTng 2.0 traces into human-readable log." |
3 | HOMEPAGE = "http://babeltrace.org/" | 3 | HOMEPAGE = "http://babeltrace.org/" |
4 | BUGTRACKER = "https://bugs.lttng.org/projects/babeltrace" | 4 | BUGTRACKER = "https://bugs.lttng.org/projects/babeltrace" |
5 | LICENSE = "MIT & GPLv2 & LGPLv2.1 & BSD-2-Clause" | 5 | LICENSE = "MIT & GPL-2.0-only & LGPL-2.1-only & BSD-2-Clause & BSD-4-Clause & GPL-3.0-or-later & CC-BY-SA-4.0 & PSF-2.0" |
6 | LIC_FILES_CHKSUM = "file://LICENSE;md5=a6a458c13f18385b7bc5069a6d7b176e" | 6 | LIC_FILES_CHKSUM = "file://LICENSE;md5=f6b015e4f388d6e78adb1b1f9a887d06" |
7 | 7 | ||
8 | DEPENDS = "glib-2.0 util-linux popt bison-native flex-native" | 8 | DEPENDS = "glib-2.0 util-linux popt bison-native flex-native virtual/libiconv" |
9 | 9 | ||
10 | SRC_URI = "git://git.efficios.com/babeltrace.git;branch=stable-2.0 \ | 10 | SRC_URI = "git://git.efficios.com/babeltrace.git;branch=stable-2.1;protocol=https;tag=v${PV} \ |
11 | file://run-ptest \ | 11 | file://run-ptest \ |
12 | file://0001-tests-do-not-run-test-applications-from-.libs.patch \ | ||
13 | file://0001-Make-manpages-multilib-identical.patch \ | 12 | file://0001-Make-manpages-multilib-identical.patch \ |
13 | file://0001-tests-fix-test-applications-in-cpp-common.patch \ | ||
14 | file://0001-tests-set-the-correct-plugin-directory.patch \ | ||
15 | file://0001-Make-bt_field_blob_get_length-return-size_t-instead-.patch \ | ||
14 | " | 16 | " |
15 | SRCREV = "91d154476e66735d705adda9ca5cbf5b5eea5940" | 17 | SRCREV = "7f2f8cd6dac497cbb466efb31219b531c62013f5" |
16 | UPSTREAM_CHECK_GITTAGREGEX = "v(?P<pver>2(\.\d+)+)$" | 18 | UPSTREAM_CHECK_GITTAGREGEX = "v(?P<pver>2(\.\d+)+)$" |
17 | 19 | ||
18 | S = "${WORKDIR}/git" | ||
19 | |||
20 | inherit autotools pkgconfig ptest python3targetconfig | 20 | inherit autotools pkgconfig ptest python3targetconfig |
21 | 21 | ||
22 | EXTRA_OECONF = "--disable-debug-info" | 22 | EXTRA_OECONF = "--disable-debug-info --disable-Werror" |
23 | 23 | ||
24 | PACKAGECONFIG ??= "manpages" | 24 | PACKAGECONFIG ??= "manpages" |
25 | PACKAGECONFIG[manpages] = ", --disable-man-pages, asciidoc-native xmlto-native" | 25 | PACKAGECONFIG[manpages] = ", --disable-man-pages, asciidoc-native xmlto-native" |
26 | 26 | ||
27 | FILES_${PN}-staticdev += "${libdir}/babeltrace2/plugins/*.a" | 27 | FILES:${PN}-staticdev += "${libdir}/babeltrace2/plugins/*.a" |
28 | FILES_${PN} += "${libdir}/babeltrace2/plugins/*.so" | 28 | FILES:${PN} += "${libdir}/babeltrace2/plugins/*.so" |
29 | 29 | ||
30 | ASNEEDED = "" | 30 | ASNEEDED = "" |
31 | 31 | LDFLAGS += "${@bb.utils.contains('DISTRO_FEATURES', 'ld-is-lld ptest', '-fuse-ld=bfd ', '', d)}" | |
32 | RDEPENDS_${PN}-ptest += "bash gawk python3" | 32 | |
33 | # coreutils since we need full mktemp | ||
34 | RDEPENDS:${PN}-ptest += "bash gawk python3 make grep coreutils findutils" | ||
35 | RDEPENDS:${PN}-ptest:append:libc-glibc = " glibc-gconv-utf-16 glibc-gconv-utf-32" | ||
36 | |||
37 | do_configure:append() { | ||
38 | # when doing cross compile, the path ${B}/src/plugins/ctf/common/src/metadata/tsdl | ||
39 | # is not created by the babeltrace2 build system. It is need when generating | ||
40 | # parser.cpp by executing /bin/bash ../../git/config/ylwrap. | ||
41 | # So make this directory after configuration. | ||
42 | mkdir -p ${B}/src/plugins/ctf/common/src/metadata/tsdl | ||
43 | } | ||
33 | 44 | ||
34 | do_compile_ptest () { | 45 | do_compile_ptest () { |
35 | make -C tests all | 46 | make -C tests all |
@@ -49,6 +60,12 @@ do_install_ptest () { | |||
49 | -exec install -t "${D}${PTEST_PATH}/tests/$d" {} \; | 60 | -exec install -t "${D}${PTEST_PATH}/tests/$d" {} \; |
50 | find "${S}/tests/$d" -maxdepth 1 -name *.expect \ | 61 | find "${S}/tests/$d" -maxdepth 1 -name *.expect \ |
51 | -exec install -t "${D}${PTEST_PATH}/tests/$d" {} \; | 62 | -exec install -t "${D}${PTEST_PATH}/tests/$d" {} \; |
63 | find "${S}/tests/$d" -maxdepth 1 -name *.ref \ | ||
64 | -exec install -t "${D}${PTEST_PATH}/tests/$d" {} \; | ||
65 | find "${S}/tests/$d" -maxdepth 1 -name *.mctf \ | ||
66 | -exec install -t "${D}${PTEST_PATH}/tests/$d" {} \; | ||
67 | find "${S}/tests/$d" -maxdepth 1 -name *.json \ | ||
68 | -exec install -t "${D}${PTEST_PATH}/tests/$d" {} \; | ||
52 | done | 69 | done |
53 | install -d "${D}${PTEST_PATH}/tests/data/ctf-traces/" | 70 | install -d "${D}${PTEST_PATH}/tests/data/ctf-traces/" |
54 | cp -a ${S}/tests/data/ctf-traces/* ${D}${PTEST_PATH}/tests/data/ctf-traces/ | 71 | cp -a ${S}/tests/data/ctf-traces/* ${D}${PTEST_PATH}/tests/data/ctf-traces/ |
@@ -90,4 +107,26 @@ do_install_ptest () { | |||
90 | 107 | ||
91 | # Remove architechture specific testfiles | 108 | # Remove architechture specific testfiles |
92 | rm -rf ${D}${PTEST_PATH}/tests/data/plugins/flt.lttng-utils.debug-info/* | 109 | rm -rf ${D}${PTEST_PATH}/tests/data/plugins/flt.lttng-utils.debug-info/* |
110 | |||
111 | # Set the correct environment variables when running embedded environment | ||
112 | envsh=${D}${PTEST_PATH}/tests/utils/env.sh | ||
113 | sed -i "/BT_TESTS_SRCDIR/c\_set_var_def BT_TESTS_SRCDIR '${PTEST_PATH}/tests'" $envsh | ||
114 | sed -i "/BT_TESTS_BUILDDIR/c\_set_var_def BT_TESTS_BUILDDIR '${PTEST_PATH}/tests'" $envsh | ||
115 | sed -i "/BT_TESTS_AWK_BIN/c\_set_var_def BT_TESTS_AWK_BIN 'gawk'" $envsh | ||
116 | sed -i "/BT_TESTS_GREP_BIN/c\_set_var_def BT_TESTS_GREP_BIN 'grep'" $envsh | ||
117 | sed -i "/BT_TESTS_PYTHON_BIN/c\_set_var_def BT_TESTS_PYTHON_BIN 'python3'" $envsh | ||
118 | sed -i "/BT_TESTS_SED_BIN/c\_set_var_def BT_TESTS_SED_BIN 'sed'" $envsh | ||
119 | sed -i "/BT_TESTS_CC_BIN/c\_set_var_def BT_TESTS_CC_BIN ''" $envsh | ||
120 | } | ||
121 | |||
122 | do_install:append:class-nativesdk() { | ||
123 | mkdir -p ${D}${SDKPATHNATIVE}/environment-setup.d | ||
124 | cat <<- EOF > ${D}${SDKPATHNATIVE}/environment-setup.d/babeltrace2.sh | ||
125 | export BABELTRACE_PLUGIN_PATH="${libdir}/babeltrace2/plugins" | ||
126 | export LIBBABELTRACE2_PLUGIN_PROVIDER_DIR="${libdir}/babeltrace2/plugin-providers" | ||
127 | EOF | ||
93 | } | 128 | } |
129 | |||
130 | FILES:${PN}:append:class-nativesdk = " ${SDKPATHNATIVE}/environment-setup.d/babeltrace2.sh" | ||
131 | |||
132 | BBCLASSEXTEND = "nativesdk" | ||
diff --git a/meta/recipes-kernel/lttng/babeltrace_1.5.8.bb b/meta/recipes-kernel/lttng/babeltrace_1.5.11.bb index 9e5d3a7a97..8ec80167a0 100644 --- a/meta/recipes-kernel/lttng/babeltrace_1.5.8.bb +++ b/meta/recipes-kernel/lttng/babeltrace_1.5.11.bb | |||
@@ -2,26 +2,24 @@ SUMMARY = "Babeltrace - Trace Format Babel Tower" | |||
2 | DESCRIPTION = "Babeltrace provides trace read and write libraries in host side, as well as a trace converter, which used to convert LTTng 2.0 traces into human-readable log." | 2 | DESCRIPTION = "Babeltrace provides trace read and write libraries in host side, as well as a trace converter, which used to convert LTTng 2.0 traces into human-readable log." |
3 | HOMEPAGE = "http://babeltrace.org/" | 3 | HOMEPAGE = "http://babeltrace.org/" |
4 | BUGTRACKER = "https://bugs.lttng.org/projects/babeltrace" | 4 | BUGTRACKER = "https://bugs.lttng.org/projects/babeltrace" |
5 | LICENSE = "MIT & GPLv2 & LGPLv2.1" | 5 | LICENSE = "MIT & GPL-2.0-only & LGPL-2.1-only" |
6 | LIC_FILES_CHKSUM = "file://LICENSE;md5=76ba15dd76a248e1dd526bca0e2125fa" | 6 | LIC_FILES_CHKSUM = "file://LICENSE;md5=76ba15dd76a248e1dd526bca0e2125fa" |
7 | 7 | ||
8 | DEPENDS = "glib-2.0 util-linux popt bison-native flex-native" | 8 | DEPENDS = "glib-2.0 util-linux popt bison-native flex-native" |
9 | 9 | ||
10 | SRC_URI = "git://git.efficios.com/babeltrace.git;branch=stable-1.5 \ | 10 | SRC_URI = "git://git.efficios.com/babeltrace.git;branch=stable-1.5;protocol=https \ |
11 | file://run-ptest \ | 11 | file://run-ptest \ |
12 | " | 12 | " |
13 | SRCREV = "054a54ae10b01a271afc4f19496c041b10fb414c" | 13 | SRCREV = "91c00f70884887ff5c4849a8e3d47e311a22ba9d" |
14 | UPSTREAM_CHECK_GITTAGREGEX = "v(?P<pver>1(\.\d+)+)$" | 14 | UPSTREAM_CHECK_GITTAGREGEX = "v(?P<pver>1(\.\d+)+)$" |
15 | 15 | ||
16 | S = "${WORKDIR}/git" | ||
17 | |||
18 | inherit autotools pkgconfig ptest | 16 | inherit autotools pkgconfig ptest |
19 | 17 | ||
20 | EXTRA_OECONF = "--disable-debug-info" | 18 | EXTRA_OECONF = "--disable-debug-info" |
21 | 19 | ||
22 | ASNEEDED = "" | 20 | ASNEEDED = "" |
23 | 21 | ||
24 | RDEPENDS_${PN}-ptest += "bash gawk" | 22 | RDEPENDS:${PN}-ptest += "bash gawk make" |
25 | 23 | ||
26 | addtask do_patch_ptest_path after do_patch before do_configure | 24 | addtask do_patch_ptest_path after do_patch before do_configure |
27 | do_patch_ptest_path () { | 25 | do_patch_ptest_path () { |
@@ -96,3 +94,5 @@ do_install_ptest () { | |||
96 | sed -i 's:^BTBIN.*:BTBIN=/usr/bin/babeltrace:' ${f} | 94 | sed -i 's:^BTBIN.*:BTBIN=/usr/bin/babeltrace:' ${f} |
97 | done | 95 | done |
98 | } | 96 | } |
97 | |||
98 | BBCLASSEXTEND = "nativesdk" | ||
diff --git a/meta/recipes-kernel/lttng/lttng-modules/0001-lttng-modules-fix-sigaction-build-without-CONFIG_COM.patch b/meta/recipes-kernel/lttng/lttng-modules/0001-lttng-modules-fix-sigaction-build-without-CONFIG_COM.patch new file mode 100644 index 0000000000..eb43abbae2 --- /dev/null +++ b/meta/recipes-kernel/lttng/lttng-modules/0001-lttng-modules-fix-sigaction-build-without-CONFIG_COM.patch | |||
@@ -0,0 +1,35 @@ | |||
1 | From 0e2095bcc50e7a07d3478f8d3c0ae5ad46575594 Mon Sep 17 00:00:00 2001 | ||
2 | From: Mikko Rapeli <mikko.rapeli@linaro.org> | ||
3 | Date: Mon, 28 Apr 2025 12:07:24 +0000 | ||
4 | Subject: [PATCH] lttng-modules: fix sigaction build without | ||
5 | CONFIG_COMPAT_OLD_SIGACTION | ||
6 | |||
7 | Workaround build failure when CONFIG_COMPAT_OLD_SIGACTION is not enabled | ||
8 | in kernel config. | ||
9 | |||
10 | Upstream-Status: Submitted [https://bugs.lttng.org/issues/1426] | ||
11 | |||
12 | Signed-off-by: Mikko Rapeli <mikko.rapeli@linaro.org> | ||
13 | --- | ||
14 | .../instrumentation/syscalls/headers/arm-32-syscalls_pointers.h | 2 ++ | ||
15 | 1 file changed, 2 insertions(+) | ||
16 | |||
17 | diff --git a/include/instrumentation/syscalls/headers/arm-32-syscalls_pointers.h b/include/instrumentation/syscalls/headers/arm-32-syscalls_pointers.h | ||
18 | index 5f4ca5b..1514cae 100644 | ||
19 | --- a/include/instrumentation/syscalls/headers/arm-32-syscalls_pointers.h | ||
20 | +++ b/include/instrumentation/syscalls/headers/arm-32-syscalls_pointers.h | ||
21 | @@ -1890,9 +1890,11 @@ TRACE_SYSCALL_TABLE(chroot, chroot, 61, 1) | ||
22 | #ifndef OVERRIDE_TABLE_32_ustat | ||
23 | TRACE_SYSCALL_TABLE(ustat, ustat, 62, 2) | ||
24 | #endif | ||
25 | +#ifdef CONFIG_COMPAT_OLD_SIGACTION | ||
26 | #ifndef OVERRIDE_TABLE_32_sigaction | ||
27 | TRACE_SYSCALL_TABLE(sigaction, sigaction, 67, 3) | ||
28 | #endif | ||
29 | +#endif /* CONFIG_COMPAT_OLD_SIGACTION */ | ||
30 | #ifndef OVERRIDE_TABLE_32_sigpending | ||
31 | TRACE_SYSCALL_TABLE(sigpending, sigpending, 73, 1) | ||
32 | #endif | ||
33 | -- | ||
34 | 2.49.0 | ||
35 | |||
diff --git a/meta/recipes-kernel/lttng/lttng-modules/0001-src-Kbuild-change-missing-CONFIG_TRACEPOINTS-to-warn.patch b/meta/recipes-kernel/lttng/lttng-modules/0001-src-Kbuild-change-missing-CONFIG_TRACEPOINTS-to-warn.patch new file mode 100644 index 0000000000..4911982461 --- /dev/null +++ b/meta/recipes-kernel/lttng/lttng-modules/0001-src-Kbuild-change-missing-CONFIG_TRACEPOINTS-to-warn.patch | |||
@@ -0,0 +1,46 @@ | |||
1 | From 60d423945bd4f4c4b7bfc6f29da9231152d05690 Mon Sep 17 00:00:00 2001 | ||
2 | From: Bruce Ashfield <bruce.ashfield@gmail.com> | ||
3 | Date: Sat, 15 May 2021 10:26:38 -0400 | ||
4 | Subject: [PATCH] src/Kbuild: change missing CONFIG_TRACEPOINTS to warning | ||
5 | |||
6 | Taken from a previous patch to the main lttng-modules Makefile, by | ||
7 | Otavio Salvador: | ||
8 | |||
9 | The lttng-modules are being pulled by the tools-profile image feature, | ||
10 | however, not every kernel has the CONFIG_TRACEPOINTS feature enabled. | ||
11 | |||
12 | This change makes the build do not fail when CONFIG_TRACEPOINTS is not | ||
13 | available, allowing it to be kept being pulled by default. | ||
14 | |||
15 | Upstream-Status: Inappropriate [embedded specific] | ||
16 | |||
17 | Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com> | ||
18 | --- | ||
19 | src/Kbuild | 7 ++++++- | ||
20 | 1 file changed, 6 insertions(+), 1 deletion(-) | ||
21 | |||
22 | diff --git a/src/Kbuild b/src/Kbuild | ||
23 | index 7137874..04eb5c9 100644 | ||
24 | --- a/src/Kbuild | ||
25 | +++ b/src/Kbuild | ||
26 | @@ -2,10 +2,13 @@ | ||
27 | |||
28 | ifdef CONFIG_LOCALVERSION # Check if dot-config is included. | ||
29 | ifeq ($(CONFIG_TRACEPOINTS),) | ||
30 | - $(error The option CONFIG_TRACEPOINTS needs to be enabled in your kernel configuration) | ||
31 | + $(warning The option CONFIG_TRACEPOINTS needs to be enabled in your kernel configuration) | ||
32 | + DISABLE_MODULE = y | ||
33 | endif # CONFIG_TRACEPOINTS | ||
34 | endif # ifdef CONFIG_LOCALVERSION | ||
35 | |||
36 | +ifneq ($(DISABLE_MODULE),y) | ||
37 | + | ||
38 | TOP_LTTNG_MODULES_DIR := $(shell dirname $(lastword $(MAKEFILE_LIST)))/.. | ||
39 | |||
40 | lttng_check_linux_version = $(shell pwd)/include/linux/version.h | ||
41 | @@ -150,3 +153,5 @@ lttng-statedump-objs := lttng-statedump-impl.o | ||
42 | obj-$(CONFIG_LTTNG) += probes/ | ||
43 | obj-$(CONFIG_LTTNG) += lib/ | ||
44 | obj-$(CONFIG_LTTNG) += tests/ | ||
45 | + | ||
46 | +endif # DISABLE_MODULE | ||
diff --git a/meta/recipes-kernel/lttng/lttng-modules/Makefile-Do-not-fail-if-CONFIG_TRACEPOINTS-is-not-en.patch b/meta/recipes-kernel/lttng/lttng-modules/Makefile-Do-not-fail-if-CONFIG_TRACEPOINTS-is-not-en.patch deleted file mode 100644 index e411242272..0000000000 --- a/meta/recipes-kernel/lttng/lttng-modules/Makefile-Do-not-fail-if-CONFIG_TRACEPOINTS-is-not-en.patch +++ /dev/null | |||
@@ -1,49 +0,0 @@ | |||
1 | From 1b0e574d680101105a6c1e8931c78824f5a97a42 Mon Sep 17 00:00:00 2001 | ||
2 | From: Otavio Salvador <otavio@ossystems.com.br> | ||
3 | Date: Mon, 5 Sep 2016 17:08:56 +0000 | ||
4 | Subject: [PATCH] Makefile: Do not fail if CONFIG_TRACEPOINTS is not enabled | ||
5 | Organization: O.S. Systems Software LTDA. | ||
6 | |||
7 | The lttng-modules are being pulled by the tools-profile image feature, | ||
8 | however, not every kernel has the CONFIG_TRACEPOINTS feature enabled. | ||
9 | |||
10 | This change makes the build do not fail when CONFIG_TRACEPOINTS is not | ||
11 | available, allowing it to be kept being pulled by default. | ||
12 | |||
13 | Upstream-Status: Inappropriate [embedded specific] | ||
14 | |||
15 | Signed-off-by: Otavio Salvador <otavio@ossystems.com.br> | ||
16 | --- | ||
17 | Makefile | 9 +++++---- | ||
18 | 1 file changed, 5 insertions(+), 4 deletions(-) | ||
19 | |||
20 | diff --git a/Makefile b/Makefile | ||
21 | index 8602649..75550cc 100644 | ||
22 | --- a/Makefile | ||
23 | +++ b/Makefile | ||
24 | @@ -8,10 +8,7 @@ ifneq ($(KERNELRELEASE),) | ||
25 | # and defines the modules to be built. | ||
26 | |||
27 | ifdef CONFIG_LOCALVERSION # Check if dot-config is included. | ||
28 | - ifeq ($(CONFIG_TRACEPOINTS),) | ||
29 | - $(error The option CONFIG_TRACEPOINTS needs to be enabled in your kernel configuration) | ||
30 | - endif # CONFIG_TRACEPOINTS | ||
31 | - endif # ifdef CONFIG_LOCALVERSION | ||
32 | + ifneq ($(CONFIG_TRACEPOINTS),) | ||
33 | |||
34 | TOP_LTTNG_MODULES_DIR := $(shell dirname $(lastword $(MAKEFILE_LIST))) | ||
35 | |||
36 | @@ -94,6 +91,10 @@ ifneq ($(KERNELRELEASE),) | ||
37 | obj-$(CONFIG_LTTNG) += lib/ | ||
38 | obj-$(CONFIG_LTTNG) += tests/ | ||
39 | |||
40 | + else | ||
41 | + $(warning The option CONFIG_TRACEPOINTS needs to be enabled in your kernel configuration) | ||
42 | + endif # CONFIG_TRACEPOINTS | ||
43 | + endif # ifdef CONFIG_LOCALVERSION | ||
44 | else # KERNELRELEASE | ||
45 | |||
46 | # This part of the Makefile is used when the 'make' command is runned in the | ||
47 | -- | ||
48 | 2.1.4 | ||
49 | |||
diff --git a/meta/recipes-kernel/lttng/lttng-modules_2.12.4.bb b/meta/recipes-kernel/lttng/lttng-modules_2.12.4.bb deleted file mode 100644 index 3ca59f789a..0000000000 --- a/meta/recipes-kernel/lttng/lttng-modules_2.12.4.bb +++ /dev/null | |||
@@ -1,41 +0,0 @@ | |||
1 | SECTION = "devel" | ||
2 | SUMMARY = "Linux Trace Toolkit KERNEL MODULE" | ||
3 | DESCRIPTION = "The lttng-modules 2.0 package contains the kernel tracer modules" | ||
4 | HOMEPAGE = "https://lttng.org/" | ||
5 | LICENSE = "LGPLv2.1 & GPLv2 & MIT" | ||
6 | LIC_FILES_CHKSUM = "file://LICENSE;md5=3f882d431dc0f32f1f44c0707aa41128" | ||
7 | |||
8 | inherit module | ||
9 | |||
10 | include lttng-platforms.inc | ||
11 | |||
12 | SRC_URI = "https://lttng.org/files/${BPN}/${BPN}-${PV}.tar.bz2 \ | ||
13 | file://Makefile-Do-not-fail-if-CONFIG_TRACEPOINTS-is-not-en.patch \ | ||
14 | " | ||
15 | |||
16 | SRC_URI[sha256sum] = "fe66400fa1b85bff1b9ae24419c74e3bb7d358d643eade0594d81b48bd190688" | ||
17 | |||
18 | export INSTALL_MOD_DIR="kernel/lttng-modules" | ||
19 | |||
20 | EXTRA_OEMAKE += "KERNELDIR='${STAGING_KERNEL_DIR}'" | ||
21 | |||
22 | do_install_append() { | ||
23 | # Delete empty directories to avoid QA failures if no modules were built | ||
24 | find ${D}/${nonarch_base_libdir} -depth -type d -empty -exec rmdir {} \; | ||
25 | } | ||
26 | |||
27 | python do_package_prepend() { | ||
28 | if not os.path.exists(os.path.join(d.getVar('D'), d.getVar('nonarch_base_libdir')[1:], 'modules')): | ||
29 | bb.warn("%s: no modules were created; this may be due to CONFIG_TRACEPOINTS not being enabled in your kernel." % d.getVar('PN')) | ||
30 | } | ||
31 | |||
32 | BBCLASSEXTEND = "devupstream:target" | ||
33 | LIC_FILES_CHKSUM_class-devupstream = "file://LICENSE;md5=3f882d431dc0f32f1f44c0707aa41128" | ||
34 | DEFAULT_PREFERENCE_class-devupstream = "-1" | ||
35 | SRC_URI_class-devupstream = "git://git.lttng.org/lttng-modules;branch=stable-2.12 \ | ||
36 | file://Makefile-Do-not-fail-if-CONFIG_TRACEPOINTS-is-not-en.patch \ | ||
37 | " | ||
38 | SRCREV_class-devupstream = "be71b60a327d7ad2588abc5cad2861177119972b" | ||
39 | PV_class-devupstream = "2.12.3+git${SRCPV}" | ||
40 | S_class-devupstream = "${WORKDIR}/git" | ||
41 | SRCREV_FORMAT ?= "lttng_git" | ||
diff --git a/meta/recipes-kernel/lttng/lttng-modules_2.13.19.bb b/meta/recipes-kernel/lttng/lttng-modules_2.13.19.bb new file mode 100644 index 0000000000..63ba488515 --- /dev/null +++ b/meta/recipes-kernel/lttng/lttng-modules_2.13.19.bb | |||
@@ -0,0 +1,43 @@ | |||
1 | SECTION = "devel" | ||
2 | SUMMARY = "Linux Trace Toolkit KERNEL MODULE" | ||
3 | DESCRIPTION = "The lttng-modules 2.0 package contains the kernel tracer modules" | ||
4 | HOMEPAGE = "https://lttng.org/" | ||
5 | LICENSE = "LGPL-2.1-only & GPL-2.0-only & MIT" | ||
6 | LIC_FILES_CHKSUM = "file://LICENSE;md5=8d0d9f08888046474772a5d745d89d6a" | ||
7 | |||
8 | inherit module | ||
9 | |||
10 | include lttng-platforms.inc | ||
11 | |||
12 | SRC_URI = "https://lttng.org/files/${BPN}/${BPN}-${PV}.tar.bz2 \ | ||
13 | file://0001-lttng-modules-fix-sigaction-build-without-CONFIG_COM.patch \ | ||
14 | " | ||
15 | |||
16 | # Use :append here so that the patch is applied also when using devupstream | ||
17 | SRC_URI:append = " file://0001-src-Kbuild-change-missing-CONFIG_TRACEPOINTS-to-warn.patch \ | ||
18 | " | ||
19 | |||
20 | SRC_URI[sha256sum] = "06d704633749039f8fa72a954bec6486058386e2a0c3557b22c484698f9b34d5" | ||
21 | |||
22 | export INSTALL_MOD_DIR = "kernel/lttng-modules" | ||
23 | |||
24 | EXTRA_OEMAKE += "KERNELDIR='${STAGING_KERNEL_DIR}'" | ||
25 | |||
26 | MODULES_MODULE_SYMVERS_LOCATION = "src" | ||
27 | |||
28 | do_install:append() { | ||
29 | # Delete empty directories to avoid QA failures if no modules were built | ||
30 | if [ -d ${D}/${nonarch_base_libdir} ]; then | ||
31 | find ${D}/${nonarch_base_libdir} -depth -type d -empty -exec rmdir {} \; | ||
32 | fi | ||
33 | } | ||
34 | |||
35 | python do_package:prepend() { | ||
36 | if not os.path.exists(os.path.join(d.getVar('D'), d.getVar('nonarch_base_libdir')[1:], 'modules')): | ||
37 | bb.warn("%s: no modules were created; this may be due to CONFIG_TRACEPOINTS not being enabled in your kernel." % d.getVar('PN')) | ||
38 | } | ||
39 | |||
40 | BBCLASSEXTEND = "devupstream:target" | ||
41 | SRC_URI:class-devupstream = "git://git.lttng.org/lttng-modules;branch=stable-2.13;protocol=https" | ||
42 | SRCREV:class-devupstream = "7584cfc04914cb0842a986e9808686858b9c8630" | ||
43 | SRCREV_FORMAT ?= "lttng_git" | ||
diff --git a/meta/recipes-kernel/lttng/lttng-platforms.inc b/meta/recipes-kernel/lttng/lttng-platforms.inc index aa8220bbb4..900e36df82 100644 --- a/meta/recipes-kernel/lttng/lttng-platforms.inc +++ b/meta/recipes-kernel/lttng/lttng-platforms.inc | |||
@@ -2,16 +2,20 @@ | |||
2 | # Whether the platform supports kernel tracing | 2 | # Whether the platform supports kernel tracing |
3 | # | 3 | # |
4 | LTTNGMODULES = "lttng-modules" | 4 | LTTNGMODULES = "lttng-modules" |
5 | LTTNGMODULES_arc = "" | 5 | LTTNGMODULES:arc = "" |
6 | LTTNGMODULES_riscv64 = "" | 6 | LTTNGMODULES:riscv64 = "" |
7 | 7 | ||
8 | COMPATIBLE_HOST_riscv64_pn-lttng-modules = "null" | 8 | COMPATIBLE_HOST:riscv64:pn-lttng-modules = "null" |
9 | COMPATIBLE_HOST_arc_pn-lttng-modules = "null" | 9 | COMPATIBLE_HOST:arc:pn-lttng-modules = "null" |
10 | 10 | ||
11 | # Whether the platform supports userspace tracing | 11 | # Whether the platform supports userspace tracing |
12 | # lttng-ust uses sched_getcpu() which is not there on for some platforms. | 12 | # lttng-ust uses sched_getcpu() which is not there on for some platforms. |
13 | LTTNGUST = "lttng-ust" | 13 | LTTNGUST = "lttng-ust" |
14 | LTTNGUST_arc = "" | 14 | LTTNGUST:arc = "" |
15 | 15 | ||
16 | COMPATIBLE_HOST_arc_pn-lttng-ust = "null" | 16 | COMPATIBLE_HOST:arc:pn-lttng-ust = "null" |
17 | 17 | ||
18 | # Whether the platform supports lttng-tools | ||
19 | # lttng-tools requires SYS_ppoll and SYS_pselect6 which are not supported on riscv32. | ||
20 | # It's also turned off for riscv32 in meta-riscv. See https://github.com/riscv/meta-riscv/blob/master/conf/layer.conf | ||
21 | COMPATIBLE_HOST:riscv32:pn-lttng-tools = "null" | ||
diff --git a/meta/recipes-kernel/lttng/lttng-tools/0001-Fix-rotation-destroy-flush-fix-session-daemon-abort-.patch b/meta/recipes-kernel/lttng/lttng-tools/0001-Fix-rotation-destroy-flush-fix-session-daemon-abort-.patch new file mode 100644 index 0000000000..e5c9677073 --- /dev/null +++ b/meta/recipes-kernel/lttng/lttng-tools/0001-Fix-rotation-destroy-flush-fix-session-daemon-abort-.patch | |||
@@ -0,0 +1,53 @@ | |||
1 | From ea47622987d0947af3e8f75d16d52e27ebd60166 Mon Sep 17 00:00:00 2001 | ||
2 | From: Xiangyu Chen <xiangyu.chen@windriver.com> | ||
3 | Date: Mon, 25 Mar 2024 18:20:14 +0800 | ||
4 | Subject: [PATCH] Fix: rotation-destroy-flush: fix session daemon abort if no | ||
5 | kernel module present | ||
6 | |||
7 | Testing rotation-destroy-flush when no lttng kernel modules present, it would | ||
8 | be failed with error message: | ||
9 | |||
10 | Error: Unable to load required module lttng-ring-buffer-client-discard | ||
11 | not ok 1 - Start session daemon | ||
12 | Failed test 'Start session daemon' | ||
13 | not ok 2 - Create session rotation_destroy_flush in -o /tmp/tmp.test_rot ... | ||
14 | ... | ||
15 | |||
16 | This because test script that sets the LTTNG_ABORT_ON_ERROR environment | ||
17 | variable. It's this environment variable that causes the sessiond to handle the | ||
18 | kernel module loading failure as an abort rather than a warning. | ||
19 | |||
20 | Using "check_skip_kernel_test" to detect whether the kernel module fails to | ||
21 | load is expected or not. If the failure is expected, the script won't set that | ||
22 | environment variable any more. | ||
23 | |||
24 | Fixes: 3a174400 | ||
25 | ("tests:add check_skip_kernel_test to check root user and lttng kernel modules") | ||
26 | |||
27 | Submitted [https://review.lttng.org/c/lttng-tools/+/12155] | ||
28 | Upstream-Status: Backport [https://github.com/lttng/lttng-tools/commit/78f5b22de60c114c5c83410015a08bdd212edc0b] | ||
29 | Change-Id: I371e9ba717613e2940186f710cf3cccd35baed6c | ||
30 | Signed-off-by: Xiangyu Chen <xiangyu.chen@windriver.com> | ||
31 | --- | ||
32 | .../ust/rotation-destroy-flush/test_rotation_destroy_flush | 6 +++--- | ||
33 | 1 file changed, 3 insertions(+), 3 deletions(-) | ||
34 | |||
35 | diff --git a/tests/regression/ust/rotation-destroy-flush/test_rotation_destroy_flush b/tests/regression/ust/rotation-destroy-flush/test_rotation_destroy_flush | ||
36 | index 8ef4f0d..e506b53 100755 | ||
37 | --- a/tests/regression/ust/rotation-destroy-flush/test_rotation_destroy_flush | ||
38 | +++ b/tests/regression/ust/rotation-destroy-flush/test_rotation_destroy_flush | ||
39 | @@ -23,11 +23,11 @@ SIZE_LIMIT=$PAGE_SIZE | ||
40 | NR_ITER=10 | ||
41 | NUM_TESTS=$((15*$NR_ITER)) | ||
42 | |||
43 | -# Ensure the daemons invoke abort on error. | ||
44 | -export LTTNG_ABORT_ON_ERROR=1 | ||
45 | - | ||
46 | source $TESTDIR/utils/utils.sh | ||
47 | |||
48 | +# Ensure the daemons invoke abort on error. | ||
49 | +check_skip_kernel_test || export LTTNG_ABORT_ON_ERROR=1 | ||
50 | + | ||
51 | # MUST set TESTDIR before calling those functions | ||
52 | function run_app() | ||
53 | { | ||
diff --git a/meta/recipes-kernel/lttng/lttng-tools/0001-compat-Define-off64_t-as-off_t-on-linux.patch b/meta/recipes-kernel/lttng/lttng-tools/0001-compat-Define-off64_t-as-off_t-on-linux.patch new file mode 100644 index 0000000000..e68feb2753 --- /dev/null +++ b/meta/recipes-kernel/lttng/lttng-tools/0001-compat-Define-off64_t-as-off_t-on-linux.patch | |||
@@ -0,0 +1,86 @@ | |||
1 | From e5b2615aaad44a1c0d52da1469b28f99cfb12b5f Mon Sep 17 00:00:00 2001 | ||
2 | From: =?UTF-8?q?J=C3=A9r=C3=A9mie=20Galarneau?= | ||
3 | <jeremie.galarneau@efficios.com> | ||
4 | Date: Tue, 17 Jan 2023 16:57:35 -0500 | ||
5 | Subject: [PATCH] compat: off64_t is not defined by musl | ||
6 | MIME-Version: 1.0 | ||
7 | Content-Type: text/plain; charset=UTF-8 | ||
8 | Content-Transfer-Encoding: 8bit | ||
9 | |||
10 | This helps compile with latest musl, where off64_t is not defined unless | ||
11 | _LARGEFILE64_SOURCE is defined. On glibc, _LARGEFILE64_SOURCE is defined | ||
12 | if _GNU_SOURCE is defined, so the problem is only seen with musl. | ||
13 | |||
14 | Since the project uses AC_SYS_LARGEFILE, which from the autoconf doc: | ||
15 | "arrange for 64-bit file offsets, known as large-file support." | ||
16 | |||
17 | As such, it is safe to assume off_t is 64-bit wide. This is checked by a | ||
18 | static_assert to catch any platform where autoconf would let a 32-bit | ||
19 | off_t slip. | ||
20 | |||
21 | Submitted [https://review.lttng.org/c/lttng-tools/+/9268] | ||
22 | Upstream-Status: Backport [https://github.com/lttng/lttng-tools/commit/57fd993799a2b081c826f6fc8def32d28d526bfb] | ||
23 | Reported-by: Khem Raj <raj.khem@gmail.com> | ||
24 | Signed-off-by: Jérémie Galarneau <jeremie.galarneau@efficios.com> | ||
25 | Change-Id: If2c6007a8c85bc3f3065002af8a7538b882fb4a8 | ||
26 | --- | ||
27 | src/common/compat/compat-fcntl.c | 5 ++++- | ||
28 | src/common/compat/fcntl.h | 10 +++------- | ||
29 | 2 files changed, 7 insertions(+), 8 deletions(-) | ||
30 | |||
31 | diff --git a/src/common/compat/compat-fcntl.c b/src/common/compat/compat-fcntl.c | ||
32 | index 5c0bdc9..18bab0a 100644 | ||
33 | --- a/src/common/compat/compat-fcntl.c | ||
34 | +++ b/src/common/compat/compat-fcntl.c | ||
35 | @@ -8,14 +8,17 @@ | ||
36 | #define _LGPL_SOURCE | ||
37 | #include <common/compat/fcntl.h> | ||
38 | #include <common/macros.h> | ||
39 | +#include <common/bug.h> | ||
40 | +#include <stdint.h> | ||
41 | #include <unistd.h> | ||
42 | |||
43 | #ifdef __linux__ | ||
44 | |||
45 | LTTNG_HIDDEN | ||
46 | -int compat_sync_file_range(int fd, off64_t offset, off64_t nbytes, | ||
47 | +int compat_sync_file_range(int fd, off_t offset, off_t nbytes, | ||
48 | unsigned int flags) | ||
49 | { | ||
50 | + LTTNG_BUILD_BUG_ON(sizeof(off_t) != sizeof(int64_t)); | ||
51 | #ifdef HAVE_SYNC_FILE_RANGE | ||
52 | return sync_file_range(fd, offset, nbytes, flags); | ||
53 | #else | ||
54 | diff --git a/src/common/compat/fcntl.h b/src/common/compat/fcntl.h | ||
55 | index 5e566e5..93b22b7 100644 | ||
56 | --- a/src/common/compat/fcntl.h | ||
57 | +++ b/src/common/compat/fcntl.h | ||
58 | @@ -13,16 +13,12 @@ | ||
59 | |||
60 | #include <common/compat/errno.h> | ||
61 | |||
62 | -#if (defined(__CYGWIN__)) | ||
63 | -typedef long long off64_t; | ||
64 | -#endif | ||
65 | - | ||
66 | #if (defined(__FreeBSD__) || defined(__sun__)) | ||
67 | typedef off64_t loff_t; | ||
68 | #endif | ||
69 | |||
70 | #ifdef __linux__ | ||
71 | -extern int compat_sync_file_range(int fd, off64_t offset, off64_t nbytes, | ||
72 | +extern int compat_sync_file_range(int fd, off_t offset, off_t nbytes, | ||
73 | unsigned int flags); | ||
74 | #define lttng_sync_file_range(fd, offset, nbytes, flags) \ | ||
75 | compat_sync_file_range(fd, offset, nbytes, flags) | ||
76 | @@ -37,8 +33,8 @@ extern int compat_sync_file_range(int fd, off64_t offset, off64_t nbytes, | ||
77 | #define SYNC_FILE_RANGE_WAIT_BEFORE 0 | ||
78 | #define SYNC_FILE_RANGE_WRITE 0 | ||
79 | |||
80 | -static inline int lttng_sync_file_range(int fd, off64_t offset, | ||
81 | - off64_t nbytes, unsigned int flags) | ||
82 | +static inline int lttng_sync_file_range(int fd, off_t offset, | ||
83 | + off_t nbytes, unsigned int flags) | ||
84 | { | ||
85 | return -ENOSYS; | ||
86 | } | ||
diff --git a/meta/recipes-kernel/lttng/lttng-tools/0001-fix-lttng-tools-fails-to-compile-with-libxml2-2.14.0.patch b/meta/recipes-kernel/lttng/lttng-tools/0001-fix-lttng-tools-fails-to-compile-with-libxml2-2.14.0.patch new file mode 100644 index 0000000000..7c2b893731 --- /dev/null +++ b/meta/recipes-kernel/lttng/lttng-tools/0001-fix-lttng-tools-fails-to-compile-with-libxml2-2.14.0.patch | |||
@@ -0,0 +1,55 @@ | |||
1 | From 0b19e10a8a52fab0bfadbac5ce70f1b2d185a1d1 Mon Sep 17 00:00:00 2001 | ||
2 | From: Hongxu Jia <hongxu.jia@windriver.com> | ||
3 | Date: Wed, 21 May 2025 13:09:25 +0800 | ||
4 | Subject: [PATCH] fix lttng-tools fails to compile with libxml2 2.14.0+ | ||
5 | |||
6 | Description: | ||
7 | | In file included from /srv/pokybuild/yocto-worker/qemux86-alt/build/build/tmp/work/core2-32-poky-linux/lttng-tools/2.13.15/recipe-sysroot/usr/include/libxml2/libxml/parser.h:25, | ||
8 | | from ../../../../lttng-tools-2.13.15/src/common/config/session-config.c:29: | ||
9 | | /srv/pokybuild/yocto-worker/qemux86-alt/build/build/tmp/work/core2-32-poky-linux/lttng-tools/2.13.15/recipe-sysroot/usr/include/libxml2/libxml/encoding.h:173:7: note: declared here | ||
10 | | 173 | } input XML_DEPRECATED_MEMBER; | ||
11 | | | ^~~~~ | ||
12 | | ../../../../lttng-tools-2.13.15/src/common/config/session-config.c:432:15: error: called object is not a function or function pointer | ||
13 | | 432 | ret = handler->input(out_str, &out_len, (const xmlChar *) in_str, &in_len); | ||
14 | | | ^~~~~~~ | ||
15 | | At top level: | ||
16 | | cc1: note: unrecognized command-line option '-Wno-incomplete-setjmp-declaration' may have been intended to silence earlier diagnostics | ||
17 | |||
18 | |||
19 | According to [1][2], the UTF-8 handler is | ||
20 | ``` | ||
21 | static xmlCharEncError | ||
22 | UTF8ToUTF8(void *vctxt ATTRIBUTE_UNUSED, | ||
23 | unsigned char* out, int *outlen, | ||
24 | const unsigned char* in, int *inlen, | ||
25 | int flush ATTRIBUTE_UNUSED) | ||
26 | ``` | ||
27 | |||
28 | Update input.func with setting ATTRIBUTE_UNUSED params with NULL and 0 | ||
29 | |||
30 | [1] https://gitlab.gnome.org/GNOME/libxml2/-/commit/38f475072aefe032fff1dc058df3e56c1e7062fa | ||
31 | [2] https://gitlab.gnome.org/GNOME/libxml2/-/commit/69b83bb68e2a8ed0013f80c51b9a358714b00c9a#478024cc18a2cc8dbaed34076e9775f6827f413d_2188_2201 | ||
32 | |||
33 | Upstream-Status: Submitted [https://github.com/lttng/lttng-tools/pull/170] | ||
34 | Signed-off-by: Marko, Peter <Peter.Marko@siemens.com> | ||
35 | Signed-off-by: Hongxu Jia <hongxu.jia@windriver.com> | ||
36 | --- | ||
37 | src/common/config/session-config.c | 2 +- | ||
38 | 1 file changed, 1 insertion(+), 1 deletion(-) | ||
39 | |||
40 | diff --git a/src/common/config/session-config.c b/src/common/config/session-config.c | ||
41 | index bb4e9fe..4042d34 100644 | ||
42 | --- a/src/common/config/session-config.c | ||
43 | +++ b/src/common/config/session-config.c | ||
44 | @@ -429,7 +429,7 @@ static xmlChar *encode_string(const char *in_str) | ||
45 | goto end; | ||
46 | } | ||
47 | |||
48 | - ret = handler->input(out_str, &out_len, (const xmlChar *) in_str, &in_len); | ||
49 | + ret = handler->input.func(NULL, out_str, &out_len, (const xmlChar *) in_str, &in_len, 0); | ||
50 | if (ret < 0) { | ||
51 | xmlFree(out_str); | ||
52 | out_str = NULL; | ||
53 | -- | ||
54 | 2.34.1 | ||
55 | |||
diff --git a/meta/recipes-kernel/lttng/lttng-tools/0001-tests-add-check_skip_kernel_test-to-check-root-user-.patch b/meta/recipes-kernel/lttng/lttng-tools/0001-tests-add-check_skip_kernel_test-to-check-root-user-.patch new file mode 100644 index 0000000000..cb2c763b51 --- /dev/null +++ b/meta/recipes-kernel/lttng/lttng-tools/0001-tests-add-check_skip_kernel_test-to-check-root-user-.patch | |||
@@ -0,0 +1,1243 @@ | |||
1 | From 76976da4e01ce90923f61ba734e066faefb76beb Mon Sep 17 00:00:00 2001 | ||
2 | From: Xiangyu Chen <xiangyu.chen@windriver.com> | ||
3 | Date: Mon, 12 Feb 2024 09:23:54 -0500 | ||
4 | Subject: [PATCH] tests: add check_skip_kernel_test to check root user and | ||
5 | lttng kernel modules | ||
6 | MIME-Version: 1.0 | ||
7 | Content-Type: text/plain; charset=UTF-8 | ||
8 | Content-Transfer-Encoding: 8bit | ||
9 | |||
10 | The current tests will run both userspace and kernel testing. Some of | ||
11 | use cases only use lttng for one kind of tracing on an embedded | ||
12 | device (e.g. userspace), so in this scenario, the kernel modules might | ||
13 | not install to target rootfs, the test cases would be fail and exit. | ||
14 | |||
15 | Add LTTNG_TOOLS_DISABLE_KERNEL_TESTS to skip the lttng kernel features | ||
16 | test, this flag can be set via "make": | ||
17 | |||
18 | make check LTTNG_TOOLS_DISABLE_KERNEL_TESTS=1 | ||
19 | |||
20 | When this flag was set, all kernel related testcases would be marked as | ||
21 | SKIP in result. | ||
22 | |||
23 | Since the the LTTNG_TOOLS_DISABLE_KERNEL_TESTS was checked in function | ||
24 | check_skip_kernel_test, lots of testcases also need to check root | ||
25 | permission, so merging the root permission checking into | ||
26 | check_skip_kernel_test. | ||
27 | |||
28 | Upstream-Status: Backport from | ||
29 | [https://git.lttng.org/?p=lttng-tools.git;a=commit;h=3a1744008331a0604479d3d7461f77056fad3a64] | ||
30 | |||
31 | Change-Id: I49a1f642a9869c21a69e0186c296fd917bd7b525 | ||
32 | Signed-off-by: Xiangyu Chen <xiangyu.chen@windriver.com> | ||
33 | Signed-off-by: Michael Jeanson <mjeanson@efficios.com> | ||
34 | Signed-off-by: Jérémie Galarneau <jeremie.galarneau@efficios.com> | ||
35 | --- | ||
36 | tests/destructive/metadata-regeneration | 8 +---- | ||
37 | tests/perf/test_perf_raw.in | 8 +---- | ||
38 | tests/regression/kernel/test_all_events | 8 +---- | ||
39 | tests/regression/kernel/test_callstack | 8 +---- | ||
40 | tests/regression/kernel/test_channel | 8 +---- | ||
41 | tests/regression/kernel/test_clock_override | 8 +---- | ||
42 | tests/regression/kernel/test_event_basic | 8 +---- | ||
43 | tests/regression/kernel/test_kernel_function | 8 +---- | ||
44 | tests/regression/kernel/test_lttng_logger | 8 +---- | ||
45 | tests/regression/kernel/test_ns_contexts | 8 +---- | ||
46 | .../regression/kernel/test_ns_contexts_change | 9 +---- | ||
47 | .../kernel/test_rotation_destroy_flush | 8 +---- | ||
48 | .../regression/kernel/test_select_poll_epoll | 8 +---- | ||
49 | tests/regression/kernel/test_syscall | 8 +---- | ||
50 | tests/regression/kernel/test_userspace_probe | 8 +---- | ||
51 | tests/regression/tools/clear/test_kernel | 8 +---- | ||
52 | .../tools/filtering/test_invalid_filter | 8 +---- | ||
53 | .../tools/filtering/test_unsupported_op | 8 +---- | ||
54 | .../tools/filtering/test_valid_filter | 8 +---- | ||
55 | tests/regression/tools/health/test_health.sh | 10 ++---- | ||
56 | tests/regression/tools/health/test_thread_ok | 9 +---- | ||
57 | tests/regression/tools/live/test_kernel | 10 +++--- | ||
58 | tests/regression/tools/live/test_lttng_kernel | 8 +---- | ||
59 | tests/regression/tools/metadata/test_kernel | 8 +---- | ||
60 | .../test_notification_kernel_buffer_usage | 36 +++++++++---------- | ||
61 | .../test_notification_kernel_capture | 23 ++++++------ | ||
62 | .../test_notification_kernel_error | 23 ++++++------ | ||
63 | .../test_notification_kernel_instrumentation | 23 ++++++------ | ||
64 | .../test_notification_kernel_syscall | 19 +++++----- | ||
65 | .../test_notification_kernel_userspace_probe | 20 +++++------ | ||
66 | .../notification/test_notification_multi_app | 14 +++----- | ||
67 | ...test_notification_notifier_discarded_count | 9 +++-- | ||
68 | .../tools/regen-metadata/test_kernel | 8 +---- | ||
69 | .../tools/regen-statedump/test_kernel | 8 +---- | ||
70 | tests/regression/tools/rotation/test_kernel | 8 +---- | ||
71 | tests/regression/tools/snapshots/test_kernel | 8 +---- | ||
72 | .../tools/snapshots/test_kernel_streaming | 8 +---- | ||
73 | .../streaming/test_high_throughput_limits | 8 +---- | ||
74 | tests/regression/tools/streaming/test_kernel | 8 +---- | ||
75 | .../tools/tracker/test_event_tracker | 8 +---- | ||
76 | .../tools/trigger/test_add_trigger_cli | 12 ++----- | ||
77 | .../tools/trigger/test_list_triggers_cli | 26 +++++--------- | ||
78 | .../tools/wildcard/test_event_wildcard | 8 +---- | ||
79 | .../test_relayd_working_directory | 4 +-- | ||
80 | .../ust/namespaces/test_ns_contexts_change | 7 +--- | ||
81 | tests/regression/ust/test_event_perf | 8 +---- | ||
82 | tests/utils/utils.sh | 35 ++++++++++++++++++ | ||
83 | 47 files changed, 166 insertions(+), 363 deletions(-) | ||
84 | |||
85 | diff --git a/tests/destructive/metadata-regeneration b/tests/destructive/metadata-regeneration | ||
86 | index b81e7af..36b130d 100755 | ||
87 | --- a/tests/destructive/metadata-regeneration | ||
88 | +++ b/tests/destructive/metadata-regeneration | ||
89 | @@ -185,19 +185,13 @@ function test_ust_streaming () | ||
90 | rm -f ${file_sync_before_last} | ||
91 | } | ||
92 | |||
93 | -if [ "$(id -u)" == "0" ]; then | ||
94 | - isroot=1 | ||
95 | -else | ||
96 | - isroot=0 | ||
97 | -fi | ||
98 | - | ||
99 | if ! destructive_tests_enabled ; then | ||
100 | echo 'You need to set the LTTNG_ENABLE_DESTRUCTIVE_TESTS to "will-break-my-system" as argument to run this test' | ||
101 | echo 'Moreover, please make sure that ntp is not running while executing this test' | ||
102 | exit 0 | ||
103 | fi | ||
104 | |||
105 | -skip $isroot "Root access is needed. Skipping all tests." $NUM_TESTS || | ||
106 | +check_skip_kernel_test $NUM_TESTS "Skipping all tests." || | ||
107 | { | ||
108 | start_lttng_relayd "-o $TRACE_PATH" | ||
109 | start_lttng_sessiond | ||
110 | diff --git a/tests/perf/test_perf_raw.in b/tests/perf/test_perf_raw.in | ||
111 | index f293ccd..d35529a 100644 | ||
112 | --- a/tests/perf/test_perf_raw.in | ||
113 | +++ b/tests/perf/test_perf_raw.in | ||
114 | @@ -137,12 +137,6 @@ function test_kernel_raw() | ||
115 | rm -rf $TRACE_PATH | ||
116 | } | ||
117 | |||
118 | -if [ "$(id -u)" == "0" ]; then | ||
119 | - isroot=1 | ||
120 | -else | ||
121 | - isroot=0 | ||
122 | -fi | ||
123 | - | ||
124 | # MUST set TESTDIR before calling those functions | ||
125 | plan_tests $NUM_TESTS | ||
126 | |||
127 | @@ -154,7 +148,7 @@ have_libpfm | ||
128 | |||
129 | test_ust_raw | ||
130 | |||
131 | -skip $isroot "Root access is needed for kernel testing, skipping." 9 || | ||
132 | +check_skip_kernel_test 9 || | ||
133 | { | ||
134 | modprobe lttng-test | ||
135 | test_kernel_raw | ||
136 | diff --git a/tests/regression/kernel/test_all_events b/tests/regression/kernel/test_all_events | ||
137 | index 2e20888..044f9b6 100755 | ||
138 | --- a/tests/regression/kernel/test_all_events | ||
139 | +++ b/tests/regression/kernel/test_all_events | ||
140 | @@ -43,13 +43,7 @@ plan_tests $NUM_TESTS | ||
141 | |||
142 | print_test_banner "$TEST_DESC" | ||
143 | |||
144 | -if [ "$(id -u)" == "0" ]; then | ||
145 | - isroot=1 | ||
146 | -else | ||
147 | - isroot=0 | ||
148 | -fi | ||
149 | - | ||
150 | -skip $isroot "Root access is needed. Skipping all tests." $NUM_TESTS || | ||
151 | +check_skip_kernel_test "$NUM_TESTS" "Skipping all tests." || | ||
152 | { | ||
153 | validate_lttng_modules_present | ||
154 | start_lttng_sessiond | ||
155 | diff --git a/tests/regression/kernel/test_callstack b/tests/regression/kernel/test_callstack | ||
156 | index a4477fd..d8d6b5e 100755 | ||
157 | --- a/tests/regression/kernel/test_callstack | ||
158 | +++ b/tests/regression/kernel/test_callstack | ||
159 | @@ -134,13 +134,7 @@ plan_tests $NUM_TESTS | ||
160 | |||
161 | print_test_banner "$TEST_DESC" | ||
162 | |||
163 | -if [ "$(id -u)" == "0" ]; then | ||
164 | - isroot=1 | ||
165 | -else | ||
166 | - isroot=0 | ||
167 | -fi | ||
168 | - | ||
169 | -skip $isroot "Root access is needed. Skipping all tests." "$NUM_TESTS" || | ||
170 | +check_skip_kernel_test "$NUM_TESTS" "Skipping all tests." || | ||
171 | { | ||
172 | validate_lttng_modules_present | ||
173 | start_lttng_sessiond | ||
174 | diff --git a/tests/regression/kernel/test_channel b/tests/regression/kernel/test_channel | ||
175 | index 9cc74c4..4c377bd 100755 | ||
176 | --- a/tests/regression/kernel/test_channel | ||
177 | +++ b/tests/regression/kernel/test_channel | ||
178 | @@ -47,13 +47,7 @@ function test_channel_buffer_too_large() | ||
179 | plan_tests $NUM_TESTS | ||
180 | print_test_banner "$TEST_DESC" | ||
181 | |||
182 | -if [ "$(id -u)" == "0" ]; then | ||
183 | - isroot=1 | ||
184 | -else | ||
185 | - isroot=0 | ||
186 | -fi | ||
187 | - | ||
188 | -skip $isroot "Root access is needed. Skipping all tests." $NUM_TESTS || | ||
189 | +check_skip_kernel_test "$NUM_TESTS" "Skipping all tests." || | ||
190 | { | ||
191 | start_lttng_sessiond | ||
192 | |||
193 | diff --git a/tests/regression/kernel/test_clock_override b/tests/regression/kernel/test_clock_override | ||
194 | index 7289289..48a3f92 100755 | ||
195 | --- a/tests/regression/kernel/test_clock_override | ||
196 | +++ b/tests/regression/kernel/test_clock_override | ||
197 | @@ -172,13 +172,7 @@ TESTS=( | ||
198 | TEST_COUNT=${#TESTS[@]} | ||
199 | i=0 | ||
200 | |||
201 | -if [ "$(id -u)" == "0" ]; then | ||
202 | - isroot=1 | ||
203 | -else | ||
204 | - isroot=0 | ||
205 | -fi | ||
206 | - | ||
207 | -skip $isroot "Root access is needed. Skipping all tests." $NUM_TESTS || | ||
208 | +check_skip_kernel_test "$NUM_TESTS" "Skipping all tests." || | ||
209 | { | ||
210 | validate_lttng_modules_present | ||
211 | trap signal_cleanup SIGTERM SIGINT | ||
212 | diff --git a/tests/regression/kernel/test_event_basic b/tests/regression/kernel/test_event_basic | ||
213 | index ac9ec05..387e2f7 100755 | ||
214 | --- a/tests/regression/kernel/test_event_basic | ||
215 | +++ b/tests/regression/kernel/test_event_basic | ||
216 | @@ -73,13 +73,7 @@ plan_tests $NUM_TESTS | ||
217 | |||
218 | print_test_banner "$TEST_DESC" | ||
219 | |||
220 | -if [ "$(id -u)" == "0" ]; then | ||
221 | - isroot=1 | ||
222 | -else | ||
223 | - isroot=0 | ||
224 | -fi | ||
225 | - | ||
226 | -skip $isroot "Root access is needed. Skipping all tests." $NUM_TESTS || | ||
227 | +check_skip_kernel_test $NUM_TESTS "Skipping all tests." || | ||
228 | { | ||
229 | validate_lttng_modules_present | ||
230 | start_lttng_sessiond | ||
231 | diff --git a/tests/regression/kernel/test_kernel_function b/tests/regression/kernel/test_kernel_function | ||
232 | index b1d5491..ea16cde 100755 | ||
233 | --- a/tests/regression/kernel/test_kernel_function | ||
234 | +++ b/tests/regression/kernel/test_kernel_function | ||
235 | @@ -43,13 +43,7 @@ plan_tests $NUM_TESTS | ||
236 | |||
237 | print_test_banner "$TEST_DESC" | ||
238 | |||
239 | -if [ "$(id -u)" == "0" ]; then | ||
240 | - isroot=1 | ||
241 | -else | ||
242 | - isroot=0 | ||
243 | -fi | ||
244 | - | ||
245 | -skip $isroot "Root access is needed. Skipping all tests." $NUM_TESTS || | ||
246 | +check_skip_kernel_test "$NUM_TESTS" "Skipping all tests." || | ||
247 | { | ||
248 | start_lttng_sessiond_notap | ||
249 | validate_lttng_modules_present | ||
250 | diff --git a/tests/regression/kernel/test_lttng_logger b/tests/regression/kernel/test_lttng_logger | ||
251 | index b8f7ded..00eaae8 100755 | ||
252 | --- a/tests/regression/kernel/test_lttng_logger | ||
253 | +++ b/tests/regression/kernel/test_lttng_logger | ||
254 | @@ -110,13 +110,7 @@ plan_tests $NUM_TESTS | ||
255 | |||
256 | print_test_banner "$TEST_DESC" | ||
257 | |||
258 | -if [ "$(id -u)" == "0" ]; then | ||
259 | - isroot=1 | ||
260 | -else | ||
261 | - isroot=0 | ||
262 | -fi | ||
263 | - | ||
264 | -skip $isroot "Root access is needed. Skipping all tests." $NUM_TESTS || | ||
265 | +check_skip_kernel_test "$NUM_TESTS" "Skipping all tests." || | ||
266 | { | ||
267 | validate_lttng_modules_present | ||
268 | start_lttng_sessiond | ||
269 | diff --git a/tests/regression/kernel/test_ns_contexts b/tests/regression/kernel/test_ns_contexts | ||
270 | index 7d447bc..1c71ea5 100755 | ||
271 | --- a/tests/regression/kernel/test_ns_contexts | ||
272 | +++ b/tests/regression/kernel/test_ns_contexts | ||
273 | @@ -108,13 +108,7 @@ plan_tests $NUM_TESTS | ||
274 | print_test_banner "$TEST_DESC" | ||
275 | |||
276 | |||
277 | -isroot=0 | ||
278 | -if [ "$(id -u)" == "0" ]; then | ||
279 | - isroot=1 | ||
280 | -fi | ||
281 | - | ||
282 | -skip $isroot "Root access is needed. Skipping all tests." "$NUM_TESTS" && exit 0 | ||
283 | - | ||
284 | +check_skip_kernel_test "$NUM_TESTS" "Skipping all tests." && exit 0 | ||
285 | |||
286 | system_has_ns=0 | ||
287 | if [ -d "/proc/$$/ns" ]; then | ||
288 | diff --git a/tests/regression/kernel/test_ns_contexts_change b/tests/regression/kernel/test_ns_contexts_change | ||
289 | index 42a6127..3f5e4ee 100755 | ||
290 | --- a/tests/regression/kernel/test_ns_contexts_change | ||
291 | +++ b/tests/regression/kernel/test_ns_contexts_change | ||
292 | @@ -162,14 +162,7 @@ plan_tests $NUM_TESTS | ||
293 | |||
294 | print_test_banner "$TEST_DESC" | ||
295 | |||
296 | - | ||
297 | -isroot=0 | ||
298 | -if [ "$(id -u)" == "0" ]; then | ||
299 | - isroot=1 | ||
300 | -fi | ||
301 | - | ||
302 | -skip $isroot "Root access is needed. Skipping all tests." "$NUM_TESTS" && exit 0 | ||
303 | - | ||
304 | +check_skip_kernel_test "$NUM_TESTS" "Skipping all tests." && exit 0 | ||
305 | |||
306 | system_has_ns=0 | ||
307 | if [ -d "/proc/$$/ns" ]; then | ||
308 | diff --git a/tests/regression/kernel/test_rotation_destroy_flush b/tests/regression/kernel/test_rotation_destroy_flush | ||
309 | index cb773d7..0af514b 100755 | ||
310 | --- a/tests/regression/kernel/test_rotation_destroy_flush | ||
311 | +++ b/tests/regression/kernel/test_rotation_destroy_flush | ||
312 | @@ -120,13 +120,7 @@ TESTS=( | ||
313 | TEST_COUNT=${#TESTS[@]} | ||
314 | i=0 | ||
315 | |||
316 | -if [ "$(id -u)" == "0" ]; then | ||
317 | - isroot=1 | ||
318 | -else | ||
319 | - isroot=0 | ||
320 | -fi | ||
321 | - | ||
322 | -skip $isroot "Root access is needed. Skipping all tests." $NUM_TESTS || | ||
323 | +check_skip_kernel_test "$NUM_TESTS" "Skipping all tests." || | ||
324 | { | ||
325 | validate_lttng_modules_present | ||
326 | trap signal_cleanup SIGTERM SIGINT | ||
327 | diff --git a/tests/regression/kernel/test_select_poll_epoll b/tests/regression/kernel/test_select_poll_epoll | ||
328 | index d8245a0..20f0ef0 100755 | ||
329 | --- a/tests/regression/kernel/test_select_poll_epoll | ||
330 | +++ b/tests/regression/kernel/test_select_poll_epoll | ||
331 | @@ -374,13 +374,7 @@ if test $? != 0; then | ||
332 | exit 0 | ||
333 | fi | ||
334 | |||
335 | -if [ "$(id -u)" == "0" ]; then | ||
336 | - isroot=1 | ||
337 | -else | ||
338 | - isroot=0 | ||
339 | -fi | ||
340 | - | ||
341 | -skip $isroot "Root access is needed. Skipping all tests." $NUM_TESTS || | ||
342 | +check_skip_kernel_test "$NUM_TESTS" "Skipping all tests." || | ||
343 | { | ||
344 | validate_lttng_modules_present | ||
345 | |||
346 | diff --git a/tests/regression/kernel/test_syscall b/tests/regression/kernel/test_syscall | ||
347 | index 401a18a..219d947 100755 | ||
348 | --- a/tests/regression/kernel/test_syscall | ||
349 | +++ b/tests/regression/kernel/test_syscall | ||
350 | @@ -664,13 +664,7 @@ plan_tests $NUM_TESTS | ||
351 | |||
352 | print_test_banner "$TEST_DESC" | ||
353 | |||
354 | -if [ "$(id -u)" == "0" ]; then | ||
355 | - isroot=1 | ||
356 | -else | ||
357 | - isroot=0 | ||
358 | -fi | ||
359 | - | ||
360 | -skip $isroot "Root access is needed. Skipping all tests." $NUM_TESTS || | ||
361 | +check_skip_kernel_test "$NUM_TESTS" "Skipping all tests." || | ||
362 | { | ||
363 | validate_lttng_modules_present | ||
364 | start_lttng_sessiond | ||
365 | diff --git a/tests/regression/kernel/test_userspace_probe b/tests/regression/kernel/test_userspace_probe | ||
366 | index 1091ee6..5d984d6 100755 | ||
367 | --- a/tests/regression/kernel/test_userspace_probe | ||
368 | +++ b/tests/regression/kernel/test_userspace_probe | ||
369 | @@ -815,13 +815,7 @@ fi | ||
370 | plan_tests $NUM_TESTS | ||
371 | print_test_banner "$TEST_DESC" | ||
372 | |||
373 | -if [ "$(id -u)" == "0" ]; then | ||
374 | - isroot=1 | ||
375 | -else | ||
376 | - isroot=0 | ||
377 | -fi | ||
378 | - | ||
379 | -skip $isroot "Root access is needed. Skipping all tests." $NUM_TESTS || | ||
380 | +check_skip_kernel_test "$NUM_TESTS" "Skipping all tests." || | ||
381 | { | ||
382 | validate_lttng_modules_present | ||
383 | start_lttng_sessiond | ||
384 | diff --git a/tests/regression/tools/clear/test_kernel b/tests/regression/tools/clear/test_kernel | ||
385 | index 06fb1c3..48250a7 100755 | ||
386 | --- a/tests/regression/tools/clear/test_kernel | ||
387 | +++ b/tests/regression/tools/clear/test_kernel | ||
388 | @@ -536,12 +536,6 @@ plan_tests $NUM_TESTS | ||
389 | |||
390 | print_test_banner "$TEST_DESC" | ||
391 | |||
392 | -if [ "$(id -u)" == "0" ]; then | ||
393 | - isroot=1 | ||
394 | -else | ||
395 | - isroot=0 | ||
396 | -fi | ||
397 | - | ||
398 | streaming_tests=(test_kernel_streaming | ||
399 | test_kernel_streaming_rotate_clear | ||
400 | test_kernel_streaming_clear_rotate | ||
401 | @@ -563,7 +557,7 @@ snapshot_tests=(test_kernel_streaming_snapshot | ||
402 | test_kernel_local_snapshot | ||
403 | ) | ||
404 | |||
405 | -skip $isroot "Root access is needed. Skipping all kernel streaming tests." $NUM_TESTS || | ||
406 | +check_skip_kernel_test "$NUM_TESTS" "Skipping kernel streaming tests." || | ||
407 | { | ||
408 | trap signal_cleanup SIGTERM SIGINT | ||
409 | |||
410 | diff --git a/tests/regression/tools/filtering/test_invalid_filter b/tests/regression/tools/filtering/test_invalid_filter | ||
411 | index 7d9e524..8435e55 100755 | ||
412 | --- a/tests/regression/tools/filtering/test_invalid_filter | ||
413 | +++ b/tests/regression/tools/filtering/test_invalid_filter | ||
414 | @@ -168,13 +168,7 @@ done | ||
415 | |||
416 | test_bytecode_limit -u | ||
417 | |||
418 | -if [ "$(id -u)" == "0" ]; then | ||
419 | - isroot=1 | ||
420 | -else | ||
421 | - isroot=0 | ||
422 | -fi | ||
423 | - | ||
424 | -skip $isroot "Root access is needed. Skipping all kernel invalid filter tests." $NUM_KERNEL_TESTS || | ||
425 | +check_skip_kernel_test "$NUM_KERNEL_TESTS" "Skipping kernel invalid filter tests." || | ||
426 | { | ||
427 | diag "Test kernel filters" | ||
428 | i=0 | ||
429 | diff --git a/tests/regression/tools/filtering/test_unsupported_op b/tests/regression/tools/filtering/test_unsupported_op | ||
430 | index 299247a..91eb86d 100755 | ||
431 | --- a/tests/regression/tools/filtering/test_unsupported_op | ||
432 | +++ b/tests/regression/tools/filtering/test_unsupported_op | ||
433 | @@ -103,13 +103,7 @@ while [ "$i" -lt "$OP_COUNT" ]; do | ||
434 | let "i++" | ||
435 | done | ||
436 | |||
437 | -if [ "$(id -u)" == "0" ]; then | ||
438 | - isroot=1 | ||
439 | -else | ||
440 | - isroot=0 | ||
441 | -fi | ||
442 | - | ||
443 | -skip $isroot "Root access is needed. Skipping all kernel unsupported filter operations tests." $NUM_KERNEL_TESTS || | ||
444 | +check_skip_kernel_test $NUM_KERNEL_TESTS "Skipping kernel unsupported filter operations tests." || | ||
445 | { | ||
446 | diag "Test kernel unsupported filter operations" | ||
447 | |||
448 | diff --git a/tests/regression/tools/filtering/test_valid_filter b/tests/regression/tools/filtering/test_valid_filter | ||
449 | index e76ffa2..1ba7c79 100755 | ||
450 | --- a/tests/regression/tools/filtering/test_valid_filter | ||
451 | +++ b/tests/regression/tools/filtering/test_valid_filter | ||
452 | @@ -1452,13 +1452,7 @@ KERNEL_FILTERS=( | ||
453 | |||
454 | IFS=$OLDIFS | ||
455 | |||
456 | -if [ "$(id -u)" == "0" ]; then | ||
457 | - isroot=1 | ||
458 | -else | ||
459 | - isroot=0 | ||
460 | -fi | ||
461 | - | ||
462 | -skip $isroot "Root access is needed. Skipping all kernel valid filter tests." $NUM_KERNEL_TESTS || | ||
463 | +check_skip_kernel_test "$NUM_KERNEL_TESTS" "Skipping kernel valid filter tests." || | ||
464 | { | ||
465 | diag "Test kernel valid filters" | ||
466 | |||
467 | diff --git a/tests/regression/tools/health/test_health.sh b/tests/regression/tools/health/test_health.sh | ||
468 | index b3d6419..68716e6 100644 | ||
469 | --- a/tests/regression/tools/health/test_health.sh | ||
470 | +++ b/tests/regression/tools/health/test_health.sh | ||
471 | @@ -82,7 +82,7 @@ function test_health | ||
472 | diag "With UST consumer daemons" | ||
473 | enable_ust_lttng_event_ok $SESSION_NAME $UST_EVENT_NAME $CHANNEL_NAME | ||
474 | |||
475 | - skip $isroot "Root access is needed. Skipping kernel consumer health check test." "1" || | ||
476 | + check_skip_kernel_test "1" "Skipping kernel consumer health check test." || | ||
477 | { | ||
478 | diag "With kernel consumer daemon" | ||
479 | lttng_enable_kernel_event $SESSION_NAME $KERNEL_EVENT_NAME $CHANNEL_NAME | ||
480 | @@ -113,7 +113,7 @@ function test_health | ||
481 | |||
482 | |||
483 | if [ ${test_needs_root} -eq 1 ]; then | ||
484 | - skip ${isroot} "Root access needed for test \"${test_thread_name}\"." "1" || | ||
485 | + check_skip_kernel_test "1" "Skipping \"${test_thread_name}\"." || | ||
486 | { | ||
487 | report_errors "${test_thread_error_string}" "${test_relayd}" | ||
488 | } | ||
489 | @@ -276,12 +276,6 @@ STDERR_PATH=$(mktemp --tmpdir tmp.test_health_stderr_path.XXXXXX) | ||
490 | TRACE_PATH=$(mktemp --tmpdir -d tmp.test_health_trace_path.XXXXXX) | ||
491 | HEALTH_PATH=$(mktemp --tmpdir -d tmp.test_health_trace_path.XXXXXX) | ||
492 | |||
493 | -if [ "$(id -u)" == "0" ]; then | ||
494 | - isroot=1 | ||
495 | -else | ||
496 | - isroot=0 | ||
497 | -fi | ||
498 | - | ||
499 | THREAD_COUNT=${#THREAD[@]} | ||
500 | i=0 | ||
501 | while [ "$i" -lt "$THREAD_COUNT" ]; do | ||
502 | diff --git a/tests/regression/tools/health/test_thread_ok b/tests/regression/tools/health/test_thread_ok | ||
503 | index e84adb6..e5e2354 100755 | ||
504 | --- a/tests/regression/tools/health/test_thread_ok | ||
505 | +++ b/tests/regression/tools/health/test_thread_ok | ||
506 | @@ -67,7 +67,7 @@ function test_thread_ok | ||
507 | $CURDIR/$HEALTH_CHECK_BIN > ${STDOUT_PATH} 2> ${STDERR_PATH} | ||
508 | report_errors | ||
509 | |||
510 | - skip $isroot "Root access is needed. Skipping kernel consumer health check test." "5" || | ||
511 | + check_skip_kernel_test "5" "Skipping kernel consumer health check test." || | ||
512 | { | ||
513 | diag "With kernel consumer daemon" | ||
514 | create_lttng_session_no_output $SESSION_NAME | ||
515 | @@ -115,13 +115,6 @@ STDERR_PATH=$(mktemp --tmpdir tmp.test_thread_ok_stderr_path.XXXXXX) | ||
516 | TRACE_PATH=$(mktemp --tmpdir -d tmp.test_thread_ok_trace_path.XXXXXX) | ||
517 | HEALTH_PATH=$(mktemp --tmpdir -d tmp.test_thread_ok_trace_path.XXXXXX) | ||
518 | |||
519 | -# The manage kernel thread is only spawned if we are root | ||
520 | -if [ "$(id -u)" == "0" ]; then | ||
521 | - isroot=1 | ||
522 | -else | ||
523 | - isroot=0 | ||
524 | -fi | ||
525 | - | ||
526 | test_thread_ok | ||
527 | |||
528 | rm -rf ${HEALTH_PATH} | ||
529 | diff --git a/tests/regression/tools/live/test_kernel b/tests/regression/tools/live/test_kernel | ||
530 | index b622b52..fdaa09f 100755 | ||
531 | --- a/tests/regression/tools/live/test_kernel | ||
532 | +++ b/tests/regression/tools/live/test_kernel | ||
533 | @@ -39,13 +39,11 @@ function clean_live_tracing() | ||
534 | rm -rf $TRACE_PATH | ||
535 | } | ||
536 | |||
537 | -# Need root access for kernel tracing. | ||
538 | -if [ "$(id -u)" == "0" ]; then | ||
539 | - isroot=1 | ||
540 | -else | ||
541 | - plan_skip_all "Root access is needed. Skipping all tests." | ||
542 | +check_skip_kernel_test && | ||
543 | +{ | ||
544 | + plan_skip_all "Skipping all tests." | ||
545 | exit 0 | ||
546 | -fi | ||
547 | +} | ||
548 | |||
549 | modprobe lttng-test | ||
550 | |||
551 | diff --git a/tests/regression/tools/live/test_lttng_kernel b/tests/regression/tools/live/test_lttng_kernel | ||
552 | index a23d937..1b93364 100755 | ||
553 | --- a/tests/regression/tools/live/test_lttng_kernel | ||
554 | +++ b/tests/regression/tools/live/test_lttng_kernel | ||
555 | @@ -45,13 +45,7 @@ function clean_live_tracing() | ||
556 | } | ||
557 | |||
558 | # Need root access for kernel tracing. | ||
559 | -if [ "$(id -u)" == "0" ]; then | ||
560 | - isroot=1 | ||
561 | -else | ||
562 | - isroot=0 | ||
563 | -fi | ||
564 | - | ||
565 | -skip $isroot "Root access is needed. Skipping all tests." $NUM_TESTS || | ||
566 | +check_skip_kernel_test "$NUM_TESTS" "Skipping all tests." || | ||
567 | { | ||
568 | modprobe lttng-test | ||
569 | |||
570 | diff --git a/tests/regression/tools/metadata/test_kernel b/tests/regression/tools/metadata/test_kernel | ||
571 | index 57cace6..26e95d9 100755 | ||
572 | --- a/tests/regression/tools/metadata/test_kernel | ||
573 | +++ b/tests/regression/tools/metadata/test_kernel | ||
574 | @@ -91,13 +91,7 @@ plan_tests $NUM_TESTS | ||
575 | print_test_banner "$TEST_DESC" | ||
576 | |||
577 | |||
578 | -if [ "$(id -u)" == "0" ]; then | ||
579 | - isroot=1 | ||
580 | -else | ||
581 | - isroot=0 | ||
582 | -fi | ||
583 | - | ||
584 | -skip $isroot "Root access is needed. Skipping all kernel metadata tests." $NUM_TESTS || | ||
585 | +check_skip_kernel_test "$NUM_TESTS" "Skipping kernel metadata tests." || | ||
586 | { | ||
587 | validate_lttng_modules_present | ||
588 | modprobe lttng-test | ||
589 | diff --git a/tests/regression/tools/notification/test_notification_kernel_buffer_usage b/tests/regression/tools/notification/test_notification_kernel_buffer_usage | ||
590 | index 76e69a7..8fdaabb 100755 | ||
591 | --- a/tests/regression/tools/notification/test_notification_kernel_buffer_usage | ||
592 | +++ b/tests/regression/tools/notification/test_notification_kernel_buffer_usage | ||
593 | @@ -60,29 +60,27 @@ function test_buffer_usage_notification | ||
594 | wait $APP_PID 2> /dev/null | ||
595 | } | ||
596 | |||
597 | -if [ "$(id -u)" == "0" ]; then | ||
598 | - | ||
599 | - validate_lttng_modules_present | ||
600 | - | ||
601 | +check_skip_kernel_test && | ||
602 | +{ | ||
603 | + plan_skip_all "Skipping all tests." | ||
604 | + rm -rf "$TEST_TMPDIR" | ||
605 | + exit 0 | ||
606 | +} | ||
607 | |||
608 | - modprobe lttng-test | ||
609 | +validate_lttng_modules_present | ||
610 | |||
611 | - # Used on sessiond launch. | ||
612 | - LTTNG_SESSIOND_ENV_VARS="LTTNG_TESTPOINT_ENABLE=1 \ | ||
613 | - CONSUMER_PAUSE_PIPE_PATH=${TESTPOINT_PIPE_PATH} \ | ||
614 | - LD_PRELOAD=${TESTPOINT}" | ||
615 | - start_lttng_sessiond_notap | ||
616 | +modprobe lttng-test | ||
617 | |||
618 | - test_buffer_usage_notification | ||
619 | +# Used on sessiond launch. | ||
620 | +LTTNG_SESSIOND_ENV_VARS="LTTNG_TESTPOINT_ENABLE=1 \ | ||
621 | + CONSUMER_PAUSE_PIPE_PATH=${TESTPOINT_PIPE_PATH} \ | ||
622 | + LD_PRELOAD=${TESTPOINT}" | ||
623 | +start_lttng_sessiond_notap | ||
624 | |||
625 | - stop_lttng_sessiond_notap | ||
626 | - rmmod lttng-test | ||
627 | +test_buffer_usage_notification | ||
628 | |||
629 | - rm -rf "${consumerd_pipe[@]}" 2> /dev/null | ||
630 | -else | ||
631 | - # Kernel tests are skipped. | ||
632 | - plan_tests $NUM_TESTS | ||
633 | - skip 0 "Root access is needed. Skipping all kernel notification tests." $NUM_TESTS | ||
634 | -fi | ||
635 | +stop_lttng_sessiond_notap | ||
636 | +rmmod lttng-test | ||
637 | |||
638 | +rm -rf "${consumerd_pipe[@]}" 2> /dev/null | ||
639 | rm -rf "$TEST_TMPDIR" | ||
640 | diff --git a/tests/regression/tools/notification/test_notification_kernel_capture b/tests/regression/tools/notification/test_notification_kernel_capture | ||
641 | index 88f123d..0f8a2bc 100755 | ||
642 | --- a/tests/regression/tools/notification/test_notification_kernel_capture | ||
643 | +++ b/tests/regression/tools/notification/test_notification_kernel_capture | ||
644 | @@ -31,22 +31,21 @@ function test_basic_error_path | ||
645 | } | ||
646 | |||
647 | |||
648 | -if [ "$(id -u)" == "0" ]; then | ||
649 | - validate_lttng_modules_present | ||
650 | +check_skip_kernel_test && | ||
651 | +{ | ||
652 | + plan_skip_all "Skipping all tests." | ||
653 | + exit 0 | ||
654 | +} | ||
655 | |||
656 | - modprobe lttng-test | ||
657 | +validate_lttng_modules_present | ||
658 | |||
659 | - start_lttng_sessiond_notap | ||
660 | +modprobe lttng-test | ||
661 | |||
662 | - test_basic_error_path | ||
663 | +start_lttng_sessiond_notap | ||
664 | |||
665 | - stop_lttng_sessiond_notap | ||
666 | - rmmod lttng-test | ||
667 | +test_basic_error_path | ||
668 | |||
669 | -else | ||
670 | - # Kernel tests are skipped. | ||
671 | - plan_tests $NUM_TESTS | ||
672 | - skip 0 "Root access is needed. Skipping all kernel notification tests." $NUM_TESTS | ||
673 | -fi | ||
674 | +stop_lttng_sessiond_notap | ||
675 | +rmmod lttng-test | ||
676 | |||
677 | rm -f "$TESTAPP_STATE_PATH" | ||
678 | diff --git a/tests/regression/tools/notification/test_notification_kernel_error b/tests/regression/tools/notification/test_notification_kernel_error | ||
679 | index 80fe6e5..b757ec2 100755 | ||
680 | --- a/tests/regression/tools/notification/test_notification_kernel_error | ||
681 | +++ b/tests/regression/tools/notification/test_notification_kernel_error | ||
682 | @@ -30,23 +30,22 @@ function test_basic_error_path | ||
683 | wait $APP_PID 2> /dev/null | ||
684 | } | ||
685 | |||
686 | +check_skip_kernel_test && | ||
687 | +{ | ||
688 | + plan_skip_all "Skipping all tests." | ||
689 | + exit 0 | ||
690 | +} | ||
691 | |||
692 | -if [ "$(id -u)" == "0" ]; then | ||
693 | - validate_lttng_modules_present | ||
694 | +validate_lttng_modules_present | ||
695 | |||
696 | - modprobe lttng-test | ||
697 | +modprobe lttng-test | ||
698 | |||
699 | - start_lttng_sessiond_notap | ||
700 | +start_lttng_sessiond_notap | ||
701 | |||
702 | - test_basic_error_path | ||
703 | +test_basic_error_path | ||
704 | |||
705 | - stop_lttng_sessiond_notap | ||
706 | - rmmod lttng-test | ||
707 | +stop_lttng_sessiond_notap | ||
708 | +rmmod lttng-test | ||
709 | |||
710 | -else | ||
711 | - # Kernel tests are skipped. | ||
712 | - plan_tests $NUM_TESTS | ||
713 | - skip 0 "Root access is needed. Skipping all kernel notification tests." $NUM_TESTS | ||
714 | -fi | ||
715 | |||
716 | rm -f "$TESTAPP_STATE_PATH" | ||
717 | diff --git a/tests/regression/tools/notification/test_notification_kernel_instrumentation b/tests/regression/tools/notification/test_notification_kernel_instrumentation | ||
718 | index 90545a5..705f770 100755 | ||
719 | --- a/tests/regression/tools/notification/test_notification_kernel_instrumentation | ||
720 | +++ b/tests/regression/tools/notification/test_notification_kernel_instrumentation | ||
721 | @@ -28,22 +28,21 @@ function test_kernel_instrumentation_notification | ||
722 | wait $APP_PID 2> /dev/null | ||
723 | } | ||
724 | |||
725 | -if [ "$(id -u)" == "0" ]; then | ||
726 | - validate_lttng_modules_present | ||
727 | +check_skip_kernel_test && | ||
728 | +{ | ||
729 | + plan_skip_all "Skipping all tests." | ||
730 | + exit 0 | ||
731 | +} | ||
732 | |||
733 | - modprobe lttng-test | ||
734 | +validate_lttng_modules_present | ||
735 | |||
736 | - start_lttng_sessiond_notap | ||
737 | +modprobe lttng-test | ||
738 | |||
739 | - test_kernel_instrumentation_notification | ||
740 | +start_lttng_sessiond_notap | ||
741 | |||
742 | - stop_lttng_sessiond_notap | ||
743 | - rmmod lttng-test | ||
744 | +test_kernel_instrumentation_notification | ||
745 | |||
746 | -else | ||
747 | - # Kernel tests are skipped. | ||
748 | - plan_tests $NUM_TESTS | ||
749 | - skip 0 "Root access is needed. Skipping all kernel notification tests." $NUM_TESTS | ||
750 | -fi | ||
751 | +stop_lttng_sessiond_notap | ||
752 | +rmmod lttng-test | ||
753 | |||
754 | rm -f "$TESTAPP_STATE_PATH" | ||
755 | diff --git a/tests/regression/tools/notification/test_notification_kernel_syscall b/tests/regression/tools/notification/test_notification_kernel_syscall | ||
756 | index d273cb5..7fa2353 100755 | ||
757 | --- a/tests/regression/tools/notification/test_notification_kernel_syscall | ||
758 | +++ b/tests/regression/tools/notification/test_notification_kernel_syscall | ||
759 | @@ -31,19 +31,18 @@ function test_kernel_syscall_notification | ||
760 | wait $APP_PID 2> /dev/null | ||
761 | } | ||
762 | |||
763 | -if [ "$(id -u)" == "0" ]; then | ||
764 | - validate_lttng_modules_present | ||
765 | +check_skip_kernel_test && | ||
766 | +{ | ||
767 | + plan_skip_all "Skipping all tests." | ||
768 | + exit 0 | ||
769 | +} | ||
770 | |||
771 | - start_lttng_sessiond_notap | ||
772 | +validate_lttng_modules_present | ||
773 | |||
774 | - test_kernel_syscall_notification | ||
775 | +start_lttng_sessiond_notap | ||
776 | |||
777 | - stop_lttng_sessiond_notap | ||
778 | +test_kernel_syscall_notification | ||
779 | |||
780 | -else | ||
781 | - # Kernel tests are skipped. | ||
782 | - plan_tests $NUM_TESTS | ||
783 | - skip 0 "Root access is needed. Skipping all kernel notification tests." $NUM_TESTS | ||
784 | -fi | ||
785 | +stop_lttng_sessiond_notap | ||
786 | |||
787 | rm -f "$TESTAPP_STATE_PATH" | ||
788 | diff --git a/tests/regression/tools/notification/test_notification_kernel_userspace_probe b/tests/regression/tools/notification/test_notification_kernel_userspace_probe | ||
789 | index 8ef8d70..abddd9b 100755 | ||
790 | --- a/tests/regression/tools/notification/test_notification_kernel_userspace_probe | ||
791 | +++ b/tests/regression/tools/notification/test_notification_kernel_userspace_probe | ||
792 | @@ -29,18 +29,18 @@ function test_kernel_userspace_probe_notification | ||
793 | wait $APP_PID 2> /dev/null | ||
794 | } | ||
795 | |||
796 | -if [ "$(id -u)" == "0" ]; then | ||
797 | - validate_lttng_modules_present | ||
798 | +check_skip_kernel_test && | ||
799 | +{ | ||
800 | + plan_skip_all "Skipping all tests." | ||
801 | + exit 0 | ||
802 | +} | ||
803 | + | ||
804 | +validate_lttng_modules_present | ||
805 | |||
806 | - start_lttng_sessiond_notap | ||
807 | +start_lttng_sessiond_notap | ||
808 | |||
809 | - test_kernel_userspace_probe_notification | ||
810 | +test_kernel_userspace_probe_notification | ||
811 | |||
812 | - stop_lttng_sessiond_notap | ||
813 | -else | ||
814 | - # Kernel tests are skipped. | ||
815 | - plan_tests $NUM_TESTS | ||
816 | - skip 0 "Root access is needed. Skipping all kernel notification tests." $NUM_TESTS | ||
817 | -fi | ||
818 | +stop_lttng_sessiond_notap | ||
819 | |||
820 | rm -f "$TESTAPP_STATE_PATH" | ||
821 | diff --git a/tests/regression/tools/notification/test_notification_multi_app b/tests/regression/tools/notification/test_notification_multi_app | ||
822 | index d8b6392..61891b5 100755 | ||
823 | --- a/tests/regression/tools/notification/test_notification_multi_app | ||
824 | +++ b/tests/regression/tools/notification/test_notification_multi_app | ||
825 | @@ -411,22 +411,18 @@ function test_on_register_evaluation () | ||
826 | rm -rf "$output_dir" | ||
827 | } | ||
828 | |||
829 | - | ||
830 | TESTS=( | ||
831 | test_multi_app_ust | ||
832 | test_on_register_evaluation_ust | ||
833 | ) | ||
834 | |||
835 | -if [ "$(id -u)" == "0" ]; then | ||
836 | +check_skip_kernel_test "$NUM_TEST_KERNEL" "Skipping kernel multi-app notification tests." || { | ||
837 | validate_lttng_modules_present | ||
838 | TESTS+=( | ||
839 | - test_multi_app_kernel | ||
840 | - test_on_register_evaluation_kernel | ||
841 | -) | ||
842 | -else | ||
843 | - skip 0 "Root access is needed. Skipping all kernel multi-app notification tests." $NUM_TEST_KERNEL | ||
844 | -fi | ||
845 | - | ||
846 | + test_multi_app_kernel | ||
847 | + test_on_register_evaluation_kernel | ||
848 | + ) | ||
849 | +} | ||
850 | |||
851 | for fct_test in ${TESTS[@]}; | ||
852 | do | ||
853 | diff --git a/tests/regression/tools/notification/test_notification_notifier_discarded_count b/tests/regression/tools/notification/test_notification_notifier_discarded_count | ||
854 | index 9850b49..778d37d 100755 | ||
855 | --- a/tests/regression/tools/notification/test_notification_notifier_discarded_count | ||
856 | +++ b/tests/regression/tools/notification/test_notification_notifier_discarded_count | ||
857 | @@ -376,7 +376,8 @@ function test_ust_notifier_discarded_regardless_trigger_owner | ||
858 | test_ust_notifier_discarded_count | ||
859 | test_ust_notifier_discarded_count_max_bucket | ||
860 | |||
861 | -if [ "$(id -u)" == "0" ]; then | ||
862 | +check_skip_kernel_test "$KERNEL_NUM_TESTS" "Skipping kernel notification tests." || | ||
863 | +{ | ||
864 | |||
865 | validate_lttng_modules_present | ||
866 | |||
867 | @@ -398,9 +399,7 @@ if [ "$(id -u)" == "0" ]; then | ||
868 | modprobe --remove lttng-test | ||
869 | |||
870 | rm -rf "${sessiond_pipe[@]}" 2> /dev/null | ||
871 | -else | ||
872 | - # Kernel tests are skipped. | ||
873 | - skip 0 "Root access is needed. Skipping all kernel notification tests." $KERNEL_NUM_TESTS | ||
874 | -fi | ||
875 | + | ||
876 | +} | ||
877 | |||
878 | rm -rf "$TEST_TMPDIR" | ||
879 | diff --git a/tests/regression/tools/regen-metadata/test_kernel b/tests/regression/tools/regen-metadata/test_kernel | ||
880 | index 49eea32..555a4e2 100755 | ||
881 | --- a/tests/regression/tools/regen-metadata/test_kernel | ||
882 | +++ b/tests/regression/tools/regen-metadata/test_kernel | ||
883 | @@ -99,13 +99,7 @@ plan_tests $NUM_TESTS | ||
884 | |||
885 | print_test_banner "$TEST_DESC" | ||
886 | |||
887 | -if [ "$(id -u)" == "0" ]; then | ||
888 | - isroot=1 | ||
889 | -else | ||
890 | - isroot=0 | ||
891 | -fi | ||
892 | - | ||
893 | -skip $isroot "Root access is needed. Skipping all kernel streaming tests." $NUM_TESTS || | ||
894 | +check_skip_kernel_test "$NUM_TESTS" "Skipping all tests." || | ||
895 | { | ||
896 | validate_lttng_modules_present | ||
897 | |||
898 | diff --git a/tests/regression/tools/regen-statedump/test_kernel b/tests/regression/tools/regen-statedump/test_kernel | ||
899 | index 8a26135..bbbac39 100755 | ||
900 | --- a/tests/regression/tools/regen-statedump/test_kernel | ||
901 | +++ b/tests/regression/tools/regen-statedump/test_kernel | ||
902 | @@ -39,13 +39,7 @@ plan_tests $NUM_TESTS | ||
903 | |||
904 | print_test_banner "$TEST_DESC" | ||
905 | |||
906 | -if [ "$(id -u)" == "0" ]; then | ||
907 | - isroot=1 | ||
908 | -else | ||
909 | - isroot=0 | ||
910 | -fi | ||
911 | - | ||
912 | -skip $isroot "Root access is needed. Skipping all kernel streaming tests." $NUM_TESTS || | ||
913 | +check_skip_kernel_test "$NUM_TESTS" "Skipping all tests." || | ||
914 | { | ||
915 | validate_lttng_modules_present | ||
916 | start_lttng_sessiond | ||
917 | diff --git a/tests/regression/tools/rotation/test_kernel b/tests/regression/tools/rotation/test_kernel | ||
918 | index f5f1f55..efe3fd3 100755 | ||
919 | --- a/tests/regression/tools/rotation/test_kernel | ||
920 | +++ b/tests/regression/tools/rotation/test_kernel | ||
921 | @@ -82,13 +82,7 @@ plan_tests $NUM_TESTS | ||
922 | |||
923 | print_test_banner "$TEST_DESC" | ||
924 | |||
925 | -if [ "$(id -u)" == "0" ]; then | ||
926 | - isroot=1 | ||
927 | -else | ||
928 | - isroot=0 | ||
929 | -fi | ||
930 | - | ||
931 | -skip $isroot "Root access is needed. Skipping all kernel streaming tests." $NUM_TESTS || | ||
932 | +check_skip_kernel_test "$NUM_TESTS" "Skipping all tests." || | ||
933 | { | ||
934 | validate_lttng_modules_present | ||
935 | |||
936 | diff --git a/tests/regression/tools/snapshots/test_kernel b/tests/regression/tools/snapshots/test_kernel | ||
937 | index abb2435..d918768 100755 | ||
938 | --- a/tests/regression/tools/snapshots/test_kernel | ||
939 | +++ b/tests/regression/tools/snapshots/test_kernel | ||
940 | @@ -217,13 +217,7 @@ plan_tests $NUM_TESTS | ||
941 | |||
942 | print_test_banner "$TEST_DESC" | ||
943 | |||
944 | -if [ "$(id -u)" == "0" ]; then | ||
945 | - isroot=1 | ||
946 | -else | ||
947 | - isroot=0 | ||
948 | -fi | ||
949 | - | ||
950 | -skip $isroot "Root access is needed. Skipping all kernel snapshot tests" $NUM_TESTS || | ||
951 | +check_skip_kernel_test "$NUM_TESTS" "Skipping all tests." || | ||
952 | { | ||
953 | |||
954 | validate_lttng_modules_present | ||
955 | diff --git a/tests/regression/tools/snapshots/test_kernel_streaming b/tests/regression/tools/snapshots/test_kernel_streaming | ||
956 | index 0c92dc7..dd965af 100755 | ||
957 | --- a/tests/regression/tools/snapshots/test_kernel_streaming | ||
958 | +++ b/tests/regression/tools/snapshots/test_kernel_streaming | ||
959 | @@ -145,13 +145,7 @@ plan_tests $NUM_TESTS | ||
960 | |||
961 | print_test_banner "$TEST_DESC" | ||
962 | |||
963 | -if [ "$(id -u)" == "0" ]; then | ||
964 | - isroot=1 | ||
965 | -else | ||
966 | - isroot=0 | ||
967 | -fi | ||
968 | - | ||
969 | -skip $isroot "Root access is needed. Skipping all kernel streaming tests" $NUM_TESTS || | ||
970 | +check_skip_kernel_test $NUM_TESTS "Skipping all tests." || | ||
971 | { | ||
972 | validate_lttng_modules_present | ||
973 | |||
974 | diff --git a/tests/regression/tools/streaming/test_high_throughput_limits b/tests/regression/tools/streaming/test_high_throughput_limits | ||
975 | index 2b9e3ad..c55d510 100755 | ||
976 | --- a/tests/regression/tools/streaming/test_high_throughput_limits | ||
977 | +++ b/tests/regression/tools/streaming/test_high_throughput_limits | ||
978 | @@ -170,13 +170,7 @@ plan_tests $NUM_TESTS | ||
979 | |||
980 | print_test_banner "$TEST_DESC" | ||
981 | |||
982 | -if [ "$(id -u)" == "0" ]; then | ||
983 | - isroot=1 | ||
984 | -else | ||
985 | - isroot=0 | ||
986 | -fi | ||
987 | - | ||
988 | -skip $isroot "Root access is needed to set bandwith limits. Skipping all tests." $NUM_TESTS || | ||
989 | +check_skip_kernel_test "$NUM_TESTS" "Skipping all tests." || | ||
990 | { | ||
991 | |||
992 | # Catch sigint and try to cleanup limits | ||
993 | diff --git a/tests/regression/tools/streaming/test_kernel b/tests/regression/tools/streaming/test_kernel | ||
994 | index 3333422..113eea7 100755 | ||
995 | --- a/tests/regression/tools/streaming/test_kernel | ||
996 | +++ b/tests/regression/tools/streaming/test_kernel | ||
997 | @@ -47,13 +47,7 @@ plan_tests $NUM_TESTS | ||
998 | |||
999 | print_test_banner "$TEST_DESC" | ||
1000 | |||
1001 | -if [ "$(id -u)" == "0" ]; then | ||
1002 | - isroot=1 | ||
1003 | -else | ||
1004 | - isroot=0 | ||
1005 | -fi | ||
1006 | - | ||
1007 | -skip $isroot "Root access is needed. Skipping all kernel streaming tests." $NUM_TESTS || | ||
1008 | +check_skip_kernel_test "$NUM_TESTS" "Skipping all tests." || | ||
1009 | { | ||
1010 | validate_lttng_modules_present | ||
1011 | |||
1012 | diff --git a/tests/regression/tools/tracker/test_event_tracker b/tests/regression/tools/tracker/test_event_tracker | ||
1013 | index cc0f698..de0c79d 100755 | ||
1014 | --- a/tests/regression/tools/tracker/test_event_tracker | ||
1015 | +++ b/tests/regression/tools/tracker/test_event_tracker | ||
1016 | @@ -466,13 +466,7 @@ test_event_track_untrack ust 0 "${EVENT_NAME}" "--pid --all" # backward compat | ||
1017 | test_event_tracker ust 1 "${EVENT_NAME}" "--pid --all" # backward compat | ||
1018 | test_event_pid_tracker ust 1 "${EVENT_NAME}" | ||
1019 | |||
1020 | -if [ "$(id -u)" == "0" ]; then | ||
1021 | - isroot=1 | ||
1022 | -else | ||
1023 | - isroot=0 | ||
1024 | -fi | ||
1025 | - | ||
1026 | -skip $isroot "Root access is needed. Skipping all kernel tracker tests." $NUM_KERNEL_TESTS || | ||
1027 | +check_skip_kernel_test "$NUM_KERNEL_TESTS" "Skipping kernel tracker tests." || | ||
1028 | { | ||
1029 | diag "Test kernel tracker" | ||
1030 | |||
1031 | diff --git a/tests/regression/tools/trigger/test_add_trigger_cli b/tests/regression/tools/trigger/test_add_trigger_cli | ||
1032 | index 98ecf62..d1763aa 100755 | ||
1033 | --- a/tests/regression/tools/trigger/test_add_trigger_cli | ||
1034 | +++ b/tests/regression/tools/trigger/test_add_trigger_cli | ||
1035 | @@ -34,12 +34,6 @@ tmp_stdout=$(mktemp --tmpdir -t test_parse_cli_trigger_stdout.XXXXXX) | ||
1036 | tmp_stderr=$(mktemp --tmpdir -t test_parse_cli_trigger_stderr.XXXXXX) | ||
1037 | uprobe_elf_binary="${TESTDIR}/utils/testapp/userspace-probe-elf-binary/.libs/userspace-probe-elf-binary" | ||
1038 | |||
1039 | -if [ "$(id -u)" == "0" ]; then | ||
1040 | - ist_root=1 | ||
1041 | -else | ||
1042 | - ist_root=0 | ||
1043 | -fi | ||
1044 | - | ||
1045 | function test_success () | ||
1046 | { | ||
1047 | local test_name="$1" | ||
1048 | @@ -223,7 +217,7 @@ test_success "--exclude-name two" "trigger5" \ | ||
1049 | --condition event-rule-matches --type=user --name='jean-*' --exclude-name jean-chretien -x jean-charest \ | ||
1050 | --action notify | ||
1051 | |||
1052 | -skip $ist_root "non-root user: skipping kprobe tests" 18 || { | ||
1053 | +check_skip_kernel_test 18 "Skipping kprobe tests." || { | ||
1054 | i=0 | ||
1055 | |||
1056 | for type in kprobe kernel:kprobe; do | ||
1057 | @@ -262,7 +256,7 @@ skip $ist_root "non-root user: skipping kprobe tests" 18 || { | ||
1058 | done | ||
1059 | } | ||
1060 | |||
1061 | -skip $ist_root "non-root user: skipping uprobe tests" 6 || { | ||
1062 | +check_skip_kernel_test 6 "Skipping uprobe tests." || { | ||
1063 | test_success "--condition event-rule-matches uprobe" "uprobe-trigger-0" \ | ||
1064 | --name="uprobe-trigger-0" \ | ||
1065 | --condition event-rule-matches --type=kernel:uprobe --location=${uprobe_elf_binary}:test_function --event-name=ma-probe \ | ||
1066 | @@ -274,7 +268,7 @@ skip $ist_root "non-root user: skipping uprobe tests" 6 || { | ||
1067 | --action notify | ||
1068 | } | ||
1069 | |||
1070 | -skip $ist_root "non-root user: skipping syscall tests" 30 || { | ||
1071 | +check_skip_kernel_test 30 "Skipping syscall tests." || { | ||
1072 | test_success "--condition event-rule-matches one syscall" "syscall-trigger-0" \ | ||
1073 | --name="syscall-trigger-0" \ | ||
1074 | --condition event-rule-matches --type=syscall --name=open \ | ||
1075 | diff --git a/tests/regression/tools/trigger/test_list_triggers_cli b/tests/regression/tools/trigger/test_list_triggers_cli | ||
1076 | index 2574e15..652a08c 100755 | ||
1077 | --- a/tests/regression/tools/trigger/test_list_triggers_cli | ||
1078 | +++ b/tests/regression/tools/trigger/test_list_triggers_cli | ||
1079 | @@ -36,22 +36,12 @@ uprobe_sdt_binary=$(realpath "${TESTDIR}/utils/testapp/userspace-probe-sdt-binar | ||
1080 | register_some_triggers_bin=$(realpath "${CURDIR}/utils/register-some-triggers") | ||
1081 | |||
1082 | uid=$(id --user) | ||
1083 | -gid=$(id --group) | ||
1084 | |||
1085 | -if [ "$uid" == "0" ]; then | ||
1086 | - ist_root=1 | ||
1087 | - ls "$uprobe_sdt_binary" >/dev/null 2>&1 | ||
1088 | - if test $? == 0; then | ||
1089 | - hast_sdt_binary=1 | ||
1090 | - else | ||
1091 | - hast_sdt_binary=0 | ||
1092 | - fi | ||
1093 | -else | ||
1094 | - ist_root=0 | ||
1095 | - hast_sdt_binary=0 | ||
1096 | +sdt_binary_present=0 | ||
1097 | +if [ -f "$uprobe_sdt_binary" ]; then | ||
1098 | + sdt_binary_present=1 | ||
1099 | fi | ||
1100 | |||
1101 | - | ||
1102 | test_top_level_options () | ||
1103 | { | ||
1104 | diag "Listing top level options" | ||
1105 | @@ -2695,10 +2685,12 @@ start_lttng_sessiond_notap | ||
1106 | |||
1107 | test_top_level_options | ||
1108 | test_event_rule_matches_tracepoint | ||
1109 | -skip $ist_root "non-root user: skipping kprobe tests" 13 || test_event_rule_matches_probe | ||
1110 | -skip $ist_root "non-root user: skipping uprobe tests" 9 || test_event_rule_matches_userspace_probe_elf | ||
1111 | -skip $(($ist_root && $hast_sdt_binary)) "skipping userspace probe SDT tests" 9 || test_event_rule_matches_userspace_probe_sdt | ||
1112 | -skip $ist_root "non-root user: skipping syscall tests" 17 || test_event_rule_matches_syscall | ||
1113 | +check_skip_kernel_test 48 "Skipping kprobe, uprobe, SDT and syscall tests." || { | ||
1114 | + test_event_rule_matches_probe | ||
1115 | + test_event_rule_matches_userspace_probe_elf | ||
1116 | + skip $sdt_binary_present "No SDT binary. Skipping userspace probe SDT tests" 9 || test_event_rule_matches_userspace_probe_sdt | ||
1117 | + test_event_rule_matches_syscall | ||
1118 | +} | ||
1119 | test_session_consumed_size_condition | ||
1120 | test_buffer_usage_conditions | ||
1121 | test_session_rotation_conditions | ||
1122 | diff --git a/tests/regression/tools/wildcard/test_event_wildcard b/tests/regression/tools/wildcard/test_event_wildcard | ||
1123 | index f69baff..14d9bb8 100755 | ||
1124 | --- a/tests/regression/tools/wildcard/test_event_wildcard | ||
1125 | +++ b/tests/regression/tools/wildcard/test_event_wildcard | ||
1126 | @@ -124,13 +124,7 @@ test_event_wildcard ust 1 'tp*tptest' | ||
1127 | test_event_wildcard ust 1 'tp**tptest' | ||
1128 | test_event_wildcard ust 1 'tp*test' | ||
1129 | |||
1130 | -if [ "$(id -u)" == "0" ]; then | ||
1131 | - isroot=1 | ||
1132 | -else | ||
1133 | - isroot=0 | ||
1134 | -fi | ||
1135 | - | ||
1136 | -skip $isroot "Root access is needed. Skipping all kernel wildcard tests." $NUM_KERNEL_TESTS || | ||
1137 | +check_skip_kernel_test "$NUM_KERNEL_TESTS" "Skipping kernel wildcard tests." || | ||
1138 | { | ||
1139 | diag "Test kernel wildcards" | ||
1140 | |||
1141 | diff --git a/tests/regression/tools/working-directory/test_relayd_working_directory b/tests/regression/tools/working-directory/test_relayd_working_directory | ||
1142 | index c7e784c..6bd1e50 100755 | ||
1143 | --- a/tests/regression/tools/working-directory/test_relayd_working_directory | ||
1144 | +++ b/tests/regression/tools/working-directory/test_relayd_working_directory | ||
1145 | @@ -145,9 +145,9 @@ function test_relayd_debug_permission() | ||
1146 | diag "Test lttng-relayd change working directory on non writable directory" | ||
1147 | |||
1148 | if [ "$(id -u)" == "0" ]; then | ||
1149 | - is_user=0 | ||
1150 | + is_user=0 | ||
1151 | else | ||
1152 | - is_user=1 | ||
1153 | + is_user=1 | ||
1154 | fi | ||
1155 | |||
1156 | skip $is_user "Skipping permission debug output test; operation can't fail as root" 6 || | ||
1157 | diff --git a/tests/regression/ust/namespaces/test_ns_contexts_change b/tests/regression/ust/namespaces/test_ns_contexts_change | ||
1158 | index 8a4b62c..622241f 100755 | ||
1159 | --- a/tests/regression/ust/namespaces/test_ns_contexts_change | ||
1160 | +++ b/tests/regression/ust/namespaces/test_ns_contexts_change | ||
1161 | @@ -101,12 +101,7 @@ plan_tests $NUM_TESTS | ||
1162 | |||
1163 | print_test_banner "$TEST_DESC" | ||
1164 | |||
1165 | -isroot=0 | ||
1166 | -if [ "$(id -u)" == "0" ]; then | ||
1167 | - isroot=1 | ||
1168 | -fi | ||
1169 | - | ||
1170 | -skip $isroot "Root access is needed. Skipping all tests." "$NUM_TESTS" && exit 0 | ||
1171 | +check_skip_kernel_test "$NUM_TESTS" "Skipping all tests." && exit 0 | ||
1172 | |||
1173 | system_has_ns=0 | ||
1174 | if [ -d "/proc/$$/ns" ]; then | ||
1175 | diff --git a/tests/regression/ust/test_event_perf b/tests/regression/ust/test_event_perf | ||
1176 | index 33aab29..178959a 100755 | ||
1177 | --- a/tests/regression/ust/test_event_perf | ||
1178 | +++ b/tests/regression/ust/test_event_perf | ||
1179 | @@ -119,17 +119,11 @@ plan_tests $NUM_TESTS | ||
1180 | |||
1181 | print_test_banner "$TEST_DESC" | ||
1182 | |||
1183 | -if [ "$(id -u)" == "0" ]; then | ||
1184 | - isroot=1 | ||
1185 | -else | ||
1186 | - isroot=0 | ||
1187 | -fi | ||
1188 | - | ||
1189 | start_lttng_sessiond | ||
1190 | |||
1191 | test_parsing_raw | ||
1192 | |||
1193 | -skip $isroot "Root access is needed. Skipping UST perf tests." 8 || | ||
1194 | +check_skip_kernel_test 8 "Skipping UST perf tests." || | ||
1195 | { | ||
1196 | test_event_basic | ||
1197 | } | ||
1198 | diff --git a/tests/utils/utils.sh b/tests/utils/utils.sh | ||
1199 | index 35633fa..b6783ef 100644 | ||
1200 | --- a/tests/utils/utils.sh | ||
1201 | +++ b/tests/utils/utils.sh | ||
1202 | @@ -329,6 +329,41 @@ function conf_proc_count() | ||
1203 | echo | ||
1204 | } | ||
1205 | |||
1206 | +# Usage: | ||
1207 | +# check_skip_kernel_test [NB_TESTS] [SKIP_MESSAGE] | ||
1208 | +# Return 0 if LTTNG_TOOLS_DISABLE_KERNEL_TESTS was set or the current user is not a root user | ||
1209 | +# If NB_TESTS is set, call skip() to skip number of tests. | ||
1210 | +# If NB_TESTS is empty, just output a reason with diag. | ||
1211 | +# An optional message can be added. | ||
1212 | + | ||
1213 | +function check_skip_kernel_test () | ||
1214 | +{ | ||
1215 | + local num_tests="$1" | ||
1216 | + local skip_message="$2" | ||
1217 | + | ||
1218 | + # Check for skip test kernel flag | ||
1219 | + if [ "$LTTNG_TOOLS_DISABLE_KERNEL_TESTS" == "1" ]; then | ||
1220 | + if ! test -z "$num_tests"; then | ||
1221 | + skip 0 "LTTNG_TOOLS_DISABLE_KERNEL_TESTS was set.${skip_message+ }${skip_message}" "$num_tests" | ||
1222 | + else | ||
1223 | + diag "LTTNG_TOOLS_DISABLE_KERNEL_TESTS was set.${skip_message+ }${skip_message}" | ||
1224 | + fi | ||
1225 | + return 0 | ||
1226 | + fi | ||
1227 | + | ||
1228 | + # Check if we are running as root | ||
1229 | + if [ "$(id -u)" != "0" ]; then | ||
1230 | + if ! test -z "$num_tests"; then | ||
1231 | + skip 0 "Root access is needed for kernel testing.${skip_message+ }${skip_message}" "$num_tests" | ||
1232 | + else | ||
1233 | + diag "Root access is needed for kernel testing.${skip_message+ }${skip_message}" | ||
1234 | + fi | ||
1235 | + return 0 | ||
1236 | + fi | ||
1237 | + | ||
1238 | + return 1 | ||
1239 | +} | ||
1240 | + | ||
1241 | # Check if base lttng-modules are present. | ||
1242 | # Bail out on failure | ||
1243 | function validate_lttng_modules_present () | ||
diff --git a/meta/recipes-kernel/lttng/lttng-tools/0001-tests-do-not-strip-a-helper-library.patch b/meta/recipes-kernel/lttng/lttng-tools/0001-tests-do-not-strip-a-helper-library.patch index 2d08b08879..84c02a02cf 100644 --- a/meta/recipes-kernel/lttng/lttng-tools/0001-tests-do-not-strip-a-helper-library.patch +++ b/meta/recipes-kernel/lttng/lttng-tools/0001-tests-do-not-strip-a-helper-library.patch | |||
@@ -1,4 +1,4 @@ | |||
1 | From ab238c213fac190972f55e73cf3e0bb1c7846eb8 Mon Sep 17 00:00:00 2001 | 1 | From 3f1f1dc868accca37d2f276ed741884698b38538 Mon Sep 17 00:00:00 2001 |
2 | From: Alexander Kanavin <alex.kanavin@gmail.com> | 2 | From: Alexander Kanavin <alex.kanavin@gmail.com> |
3 | Date: Thu, 12 Dec 2019 16:52:07 +0100 | 3 | Date: Thu, 12 Dec 2019 16:52:07 +0100 |
4 | Subject: [PATCH] tests: do not strip a helper library | 4 | Subject: [PATCH] tests: do not strip a helper library |
@@ -10,10 +10,10 @@ Signed-off-by: Alexander Kanavin <alex.kanavin@gmail.com> | |||
10 | 1 file changed, 1 insertion(+), 1 deletion(-) | 10 | 1 file changed, 1 insertion(+), 1 deletion(-) |
11 | 11 | ||
12 | diff --git a/tests/utils/testapp/userspace-probe-elf-binary/Makefile.am b/tests/utils/testapp/userspace-probe-elf-binary/Makefile.am | 12 | diff --git a/tests/utils/testapp/userspace-probe-elf-binary/Makefile.am b/tests/utils/testapp/userspace-probe-elf-binary/Makefile.am |
13 | index 03f5d5a..d12c343 100644 | 13 | index 836f13e..e19a554 100644 |
14 | --- a/tests/utils/testapp/userspace-probe-elf-binary/Makefile.am | 14 | --- a/tests/utils/testapp/userspace-probe-elf-binary/Makefile.am |
15 | +++ b/tests/utils/testapp/userspace-probe-elf-binary/Makefile.am | 15 | +++ b/tests/utils/testapp/userspace-probe-elf-binary/Makefile.am |
16 | @@ -12,7 +12,7 @@ userspace_probe_elf_binary_LDADD = libfoo.la | 16 | @@ -14,7 +14,7 @@ userspace_probe_elf_binary_LDADD = libfoo.la |
17 | libfoo.strip: libfoo.la | 17 | libfoo.strip: libfoo.la |
18 | $(OBJCOPY) --strip-all .libs/libfoo.so | 18 | $(OBJCOPY) --strip-all .libs/libfoo.so |
19 | 19 | ||
@@ -22,6 +22,3 @@ index 03f5d5a..d12c343 100644 | |||
22 | @if [ x"$(srcdir)" != x"$(builddir)" ]; then \ | 22 | @if [ x"$(srcdir)" != x"$(builddir)" ]; then \ |
23 | for script in $(EXTRA_DIST); do \ | 23 | for script in $(EXTRA_DIST); do \ |
24 | cp -f $(srcdir)/$$script $(builddir); \ | 24 | cp -f $(srcdir)/$$script $(builddir); \ |
25 | -- | ||
26 | 2.17.1 | ||
27 | |||
diff --git a/meta/recipes-kernel/lttng/lttng-tools/0001-tests-regression-disable-the-tools-live-tests.patch b/meta/recipes-kernel/lttng/lttng-tools/0001-tests-regression-disable-the-tools-live-tests.patch deleted file mode 100644 index 08c1423310..0000000000 --- a/meta/recipes-kernel/lttng/lttng-tools/0001-tests-regression-disable-the-tools-live-tests.patch +++ /dev/null | |||
@@ -1,55 +0,0 @@ | |||
1 | From de9fc501e775cae05f1f87534b4237cd78e8d9a8 Mon Sep 17 00:00:00 2001 | ||
2 | From: Alexander Kanavin <alex.kanavin@gmail.com> | ||
3 | Date: Fri, 24 Jan 2020 18:03:25 +0100 | ||
4 | Subject: [PATCH] tests/regression: disable the tools/live tests | ||
5 | |||
6 | They have been found to sporadically fail; the issue has been | ||
7 | reported upstream and they will work to investigate and fix: | ||
8 | https://bugs.lttng.org/issues/1217 | ||
9 | |||
10 | Upstream-Status: Inappropriate [upstream is working on a real fix] | ||
11 | Signed-off-by: Alexander Kanavin <alex.kanavin@gmail.com> | ||
12 | |||
13 | --- | ||
14 | tests/regression/Makefile.am | 10 +--------- | ||
15 | 1 file changed, 1 insertion(+), 9 deletions(-) | ||
16 | |||
17 | diff --git a/tests/regression/Makefile.am b/tests/regression/Makefile.am | ||
18 | index cbac90d..d467886 100644 | ||
19 | --- a/tests/regression/Makefile.am | ||
20 | +++ b/tests/regression/Makefile.am | ||
21 | @@ -11,16 +11,10 @@ TESTS = tools/filtering/test_invalid_filter \ | ||
22 | tools/filtering/test_valid_filter \ | ||
23 | tools/streaming/test_ust \ | ||
24 | tools/health/test_thread_ok \ | ||
25 | - tools/live/test_ust \ | ||
26 | - tools/live/test_ust_tracefile_count \ | ||
27 | - tools/live/test_lttng_ust \ | ||
28 | tools/tracefile-limits/test_tracefile_count \ | ||
29 | tools/tracefile-limits/test_tracefile_size \ | ||
30 | - tools/exclusion/test_exclusion \ | ||
31 | tools/snapshots/test_ust_fast \ | ||
32 | - tools/snapshots/test_ust_streaming \ | ||
33 | tools/save-load/test_save \ | ||
34 | - tools/save-load/test_load \ | ||
35 | tools/save-load/test_autoload \ | ||
36 | tools/mi/test_mi \ | ||
37 | tools/wildcard/test_event_wildcard \ | ||
38 | @@ -38,8 +32,7 @@ TESTS = tools/filtering/test_invalid_filter \ | ||
39 | tools/working-directory/test_relayd_working_directory \ | ||
40 | tools/notification/test_notification_multi_app \ | ||
41 | tools/clear/test_ust \ | ||
42 | - tools/clear/test_kernel \ | ||
43 | - tools/tracker/test_event_tracker | ||
44 | + tools/clear/test_kernel | ||
45 | |||
46 | if HAVE_LIBLTTNG_UST_CTL | ||
47 | SUBDIRS += ust | ||
48 | @@ -60,7 +53,6 @@ TESTS += ust/before-after/test_before_after \ | ||
49 | ust/multi-lib/test_multi_lib \ | ||
50 | ust/rotation-destroy-flush/test_rotation_destroy_flush \ | ||
51 | ust/namespaces/test_ns_contexts \ | ||
52 | - ust/namespaces/test_ns_contexts_change \ | ||
53 | tools/metadata/test_ust \ | ||
54 | tools/relayd-grouping/test_ust | ||
55 | endif # HAVE_LIBLTTNG_UST_CTL | ||
diff --git a/meta/recipes-kernel/lttng/lttng-tools/determinism.patch b/meta/recipes-kernel/lttng/lttng-tools/determinism.patch deleted file mode 100644 index b2ab880bd6..0000000000 --- a/meta/recipes-kernel/lttng/lttng-tools/determinism.patch +++ /dev/null | |||
@@ -1,64 +0,0 @@ | |||
1 | This is a bit ugly. Specifing abs_builddir as an RPATH is plain wrong when | ||
2 | cross compiling. Sadly, removing the rpath makes libtool/automake do | ||
3 | weird things and breaks the build as shared libs are no longer generated. | ||
4 | |||
5 | We already try and delete the RPATH at do_install with chrpath however | ||
6 | that does leave the path in the string table so it doesn't help us | ||
7 | with reproducibility. | ||
8 | |||
9 | Instead, hack in a bogus but harmless path, then delete it later in | ||
10 | our do_install. Ultimately we may want to pass a specific path to use | ||
11 | to configure if we really do need to set an RPATH at all. It is unclear | ||
12 | to me whether the tests need that or not. | ||
13 | |||
14 | Fixes reproducibility issues for lttng-tools. | ||
15 | |||
16 | Upstream-Status: Pending [needs discussion with upstream about the correct solution] | ||
17 | RP 2021/3/1 | ||
18 | |||
19 | Index: lttng-tools-2.12.2/tests/regression/ust/ust-dl/Makefile.am | ||
20 | =================================================================== | ||
21 | --- lttng-tools-2.12.2.orig/tests/regression/ust/ust-dl/Makefile.am | ||
22 | +++ lttng-tools-2.12.2/tests/regression/ust/ust-dl/Makefile.am | ||
23 | @@ -27,16 +27,16 @@ noinst_LTLIBRARIES = libzzz.la libbar.la | ||
24 | |||
25 | libzzz_la_SOURCES = libzzz.c libzzz.h | ||
26 | libzzz_la_LDFLAGS = -module -shared -avoid-version \ | ||
27 | - -rpath $(abs_builddir) | ||
28 | + -rpath /usr/lib | ||
29 | |||
30 | libbar_la_SOURCES = libbar.c libbar.h | ||
31 | libbar_la_LDFLAGS = -module -shared -avoid-version \ | ||
32 | - -rpath $(abs_builddir) | ||
33 | + -rpath /usr/lib | ||
34 | libbar_la_LIBADD = libzzz.la | ||
35 | |||
36 | libfoo_la_SOURCES = libfoo.c libfoo.h | ||
37 | libfoo_la_LDFLAGS = -module -shared -avoid-version \ | ||
38 | - -rpath $(abs_builddir) | ||
39 | + -rpath /usr/lib | ||
40 | libfoo_la_LIBADD = libbar.la | ||
41 | |||
42 | CLEANFILES = libfoo.so libfoo.so.debug libbar.so libbar.so.debug \ | ||
43 | @@ -44,7 +44,7 @@ CLEANFILES = libfoo.so libfoo.so.debug l | ||
44 | |||
45 | libtp_la_SOURCES = libbar-tp.h libbar-tp.c libfoo-tp.h libfoo-tp.c \ | ||
46 | libzzz-tp.h libzzz-tp.c | ||
47 | -libtp_la_LDFLAGS = -module -shared -rpath $(abs_builddir) | ||
48 | +libtp_la_LDFLAGS = -module -shared -rpath /usr/lib | ||
49 | |||
50 | # Extract debug symbols | ||
51 | libfoo.so.debug: libfoo.la | ||
52 | Index: lttng-tools-2.12.2/tests/utils/testapp/userspace-probe-elf-binary/Makefile.am | ||
53 | =================================================================== | ||
54 | --- lttng-tools-2.12.2.orig/tests/utils/testapp/userspace-probe-elf-binary/Makefile.am | ||
55 | +++ lttng-tools-2.12.2/tests/utils/testapp/userspace-probe-elf-binary/Makefile.am | ||
56 | @@ -5,7 +5,7 @@ AM_CFLAGS += -O0 | ||
57 | noinst_LTLIBRARIES = libfoo.la | ||
58 | |||
59 | libfoo_la_SOURCES = foo.c foo.h | ||
60 | -libfoo_la_LDFLAGS = -shared -module -avoid-version -rpath $(abs_builddir)/.libs/ | ||
61 | +libfoo_la_LDFLAGS = -shared -module -avoid-version -rpath /usr/lib | ||
62 | |||
63 | noinst_PROGRAMS = userspace-probe-elf-binary | ||
64 | userspace_probe_elf_binary_SOURCES = userspace-probe-elf-binary.c | ||
diff --git a/meta/recipes-kernel/lttng/lttng-tools/disable-tests.patch b/meta/recipes-kernel/lttng/lttng-tools/disable-tests.patch new file mode 100644 index 0000000000..b8971a69de --- /dev/null +++ b/meta/recipes-kernel/lttng/lttng-tools/disable-tests.patch | |||
@@ -0,0 +1,42 @@ | |||
1 | From 1fbd24512e8fce64b92efa846c301e45a7371ed2 Mon Sep 17 00:00:00 2001 | ||
2 | From: Richard Purdie <richard.purdie@linuxfoundation.org> | ||
3 | Date: Tue, 14 Dec 2021 12:34:04 +0000 | ||
4 | Subject: [PATCH] lttng-tools: Disable problem tests | ||
5 | |||
6 | Upstream-Status: Inappropriate [need to root cause the test hangs] | ||
7 | |||
8 | We keep seeing hangs in the tools/notifications tests on x86 and arm for | ||
9 | a variety of distros. Exclude them for now to work out if this is the | ||
10 | only place we see them and give SWAT/triage a break from the stream | ||
11 | of them. | ||
12 | |||
13 | https://bugzilla.yoctoproject.org/show_bug.cgi?id=14263 | ||
14 | |||
15 | Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org> | ||
16 | --- | ||
17 | tests/regression/Makefile.am | 12 ------------ | ||
18 | 1 file changed, 12 deletions(-) | ||
19 | |||
20 | diff --git a/tests/regression/Makefile.am b/tests/regression/Makefile.am | ||
21 | index e556223..756fb98 100644 | ||
22 | --- a/tests/regression/Makefile.am | ||
23 | +++ b/tests/regression/Makefile.am | ||
24 | @@ -29,18 +29,6 @@ TESTS = tools/base-path/test_ust \ | ||
25 | tools/crash/test_crash \ | ||
26 | tools/regen-metadata/test_ust \ | ||
27 | tools/regen-statedump/test_ust \ | ||
28 | - tools/notification/test_notification_ust_error \ | ||
29 | - tools/notification/test_notification_ust_buffer_usage \ | ||
30 | - tools/notification/test_notification_ust_capture \ | ||
31 | - tools/notification/test_notification_ust_event_rule_condition_exclusion \ | ||
32 | - tools/notification/test_notification_kernel_error \ | ||
33 | - tools/notification/test_notification_kernel_buffer_usage \ | ||
34 | - tools/notification/test_notification_kernel_capture \ | ||
35 | - tools/notification/test_notification_kernel_instrumentation \ | ||
36 | - tools/notification/test_notification_kernel_syscall \ | ||
37 | - tools/notification/test_notification_notifier_discarded_count \ | ||
38 | - tools/notification/test_notification_kernel_userspace_probe \ | ||
39 | - tools/notification/test_notification_multi_app \ | ||
40 | tools/rotation/test_ust \ | ||
41 | tools/rotation/test_kernel \ | ||
42 | tools/rotation/test_save_load_mi \ | ||
diff --git a/meta/recipes-kernel/lttng/lttng-tools/run-ptest b/meta/recipes-kernel/lttng/lttng-tools/run-ptest index eaa2e7b29d..39d93e2bbf 100755 --- a/meta/recipes-kernel/lttng/lttng-tools/run-ptest +++ b/meta/recipes-kernel/lttng/lttng-tools/run-ptest | |||
@@ -1,6 +1,45 @@ | |||
1 | #!/bin/sh | 1 | #!/bin/sh |
2 | # Without --ignore-exit, the tap harness causes any FAILs within a | 2 | # Without --ignore-exit, the tap harness causes any FAILs within a |
3 | # test plan to raise ERRORs; this is just noise. | 3 | # test plan to raise ERRORs; this is just noise. |
4 | makeargs="LOG_DRIVER_FLAGS=--ignore-exit top_srcdir=$PWD top_builddir=$PWD" | 4 | |
5 | make -k -t all >/dev/null 2>&1 | 5 | #Detecting whether current system has lttng kernel modules |
6 | exec make -k -s $makeargs check 2>/dev/null | sed -e 's#/tmp/tmp\...........#/tmp/tmp.XXXXXXXXXX#g' | 6 | LTTNG_KMOD_PATH=/lib/modules/$(uname -r)/kernel/lttng-modules/lttng-tracer.ko |
7 | function validate_lttng_modules_present() | ||
8 | { | ||
9 | # Check for loadable modules. | ||
10 | if [ -f "$LTTNG_KMOD_PATH" ]; then | ||
11 | return 0 | ||
12 | fi | ||
13 | |||
14 | # Check for builtin modules. | ||
15 | ls /proc/lttng > /dev/null 2>&1 | ||
16 | if [ $? -eq 0 ]; then | ||
17 | return 0 | ||
18 | fi | ||
19 | |||
20 | return 1 | ||
21 | } | ||
22 | |||
23 | export LD_LIBRARY_PATH=FIXMEPTESTPATH/tests/utils/testapp/userspace-probe-elf-binary/.libs | ||
24 | makeargs="LOG_DRIVER_FLAGS=--ignore-exit top_srcdir=FIXMEPTESTPATH top_builddir=FIXMEPTESTPATH" | ||
25 | |||
26 | #If current system doesn't have lttng kernel modules, disable lttng kernel related tests. | ||
27 | validate_lttng_modules_present || { | ||
28 | makeargs="$makeargs LTTNG_TOOLS_DISABLE_KERNEL_TESTS=1" | ||
29 | } | ||
30 | |||
31 | make -k -t all >error.log 2>&1 | ||
32 | # Can specify a test e.g.: | ||
33 | # -C tests/regression/ check TESTS='kernel/test_callstack' | ||
34 | make -k -s $makeargs check 2>error.log | sed -e 's#/tmp/tmp\...........#/tmp/tmp.XXXXXXXXXX#g' | ||
35 | exitcode=$? | ||
36 | if [ -e error.log ]; then | ||
37 | cat error.log | ||
38 | fi | ||
39 | if [ -e tests/unit/test-suite.log ]; then | ||
40 | cat tests/unit/test-suite.log | ||
41 | fi | ||
42 | if [ -e tests/regression/test-suite.log ]; then | ||
43 | cat tests/regression/test-suite.log | ||
44 | fi | ||
45 | exit $exitcode | ||
diff --git a/meta/recipes-kernel/lttng/lttng-tools_2.12.2.bb b/meta/recipes-kernel/lttng/lttng-tools_2.13.15.bb index 52bfd36370..f39404afa0 100644 --- a/meta/recipes-kernel/lttng/lttng-tools_2.12.2.bb +++ b/meta/recipes-kernel/lttng/lttng-tools_2.13.15.bb | |||
@@ -5,27 +5,27 @@ to extract program execution details from the Linux operating system \ | |||
5 | and interpret them." | 5 | and interpret them." |
6 | HOMEPAGE = "https://github.com/lttng/lttng-tools" | 6 | HOMEPAGE = "https://github.com/lttng/lttng-tools" |
7 | 7 | ||
8 | LICENSE = "GPLv2 & LGPLv2.1" | 8 | LICENSE = "GPL-2.0-only & LGPL-2.1-only" |
9 | LIC_FILES_CHKSUM = "file://LICENSE;md5=40ef17463fbd6f377db3c47b1cbaded8 \ | 9 | LIC_FILES_CHKSUM = "file://LICENSE;md5=40ef17463fbd6f377db3c47b1cbaded8 \ |
10 | file://LICENSES/GPL-2.0;md5=e68f69a54b44ba526ad7cb963e18fbce \ | 10 | file://LICENSES/GPL-2.0;md5=e68f69a54b44ba526ad7cb963e18fbce \ |
11 | file://LICENSES/LGPL-2.1;md5=9920968d0f2ff585ce61fae30344dd95" | 11 | file://LICENSES/LGPL-2.1;md5=9920968d0f2ff585ce61fae30344dd95" |
12 | 12 | ||
13 | include lttng-platforms.inc | 13 | include lttng-platforms.inc |
14 | 14 | ||
15 | DEPENDS = "liburcu popt libxml2 util-linux" | 15 | DEPENDS = "liburcu popt libxml2 util-linux bison-native" |
16 | RDEPENDS_${PN} = "libgcc" | 16 | RDEPENDS:${PN} = "libgcc" |
17 | RRECOMMENDS_${PN} += "${LTTNGMODULES}" | 17 | RRECOMMENDS:${PN} += "${LTTNGMODULES}" |
18 | RDEPENDS_${PN}-ptest += "make perl bash gawk babeltrace procps perl-module-overloading coreutils util-linux kmod ${LTTNGMODULES} sed python3-core" | 18 | RDEPENDS:${PN}-ptest += "make perl bash gawk babeltrace procps perl-module-overloading coreutils util-linux kmod ${LTTNGMODULES} sed python3-core grep binutils" |
19 | RDEPENDS_${PN}-ptest_append_libc-glibc = " glibc-utils" | 19 | RDEPENDS:${PN}-ptest:append:libc-glibc = " glibc-utils" |
20 | RDEPENDS_${PN}-ptest_append_libc-musl = " musl-utils" | 20 | RDEPENDS:${PN}-ptest:append:libc-musl = " musl-utils" |
21 | # babelstats.pl wants getopt-long | 21 | # babelstats.pl wants getopt-long |
22 | RDEPENDS_${PN}-ptest += "perl-module-getopt-long" | 22 | RDEPENDS:${PN}-ptest += "perl-module-getopt-long" |
23 | 23 | ||
24 | PYTHON_OPTION = "am_cv_python_pyexecdir='${PYTHON_SITEPACKAGES_DIR}' \ | 24 | PYTHON_OPTION = "am_cv_python_pyexecdir='${PYTHON_SITEPACKAGES_DIR}' \ |
25 | am_cv_python_pythondir='${PYTHON_SITEPACKAGES_DIR}' \ | 25 | am_cv_python_pythondir='${PYTHON_SITEPACKAGES_DIR}' \ |
26 | PYTHON_INCLUDE='-I${STAGING_INCDIR}/python${PYTHON_BASEVERSION}${PYTHON_ABI}' \ | 26 | PYTHON_INCLUDE='-I${STAGING_INCDIR}/python${PYTHON_BASEVERSION}${PYTHON_ABI}' \ |
27 | " | 27 | " |
28 | PACKAGECONFIG ??= "${LTTNGUST}" | 28 | PACKAGECONFIG ??= "${LTTNGUST} kmod" |
29 | PACKAGECONFIG[python] = "--enable-python-bindings ${PYTHON_OPTION},,python3 swig-native" | 29 | PACKAGECONFIG[python] = "--enable-python-bindings ${PYTHON_OPTION},,python3 swig-native" |
30 | PACKAGECONFIG[lttng-ust] = "--with-lttng-ust, --without-lttng-ust, lttng-ust" | 30 | PACKAGECONFIG[lttng-ust] = "--with-lttng-ust, --without-lttng-ust, lttng-ust" |
31 | PACKAGECONFIG[kmod] = "--with-kmod, --without-kmod, kmod" | 31 | PACKAGECONFIG[kmod] = "--with-kmod, --without-kmod, kmod" |
@@ -35,48 +35,62 @@ SRC_URI = "https://lttng.org/files/lttng-tools/lttng-tools-${PV}.tar.bz2 \ | |||
35 | file://0001-tests-do-not-strip-a-helper-library.patch \ | 35 | file://0001-tests-do-not-strip-a-helper-library.patch \ |
36 | file://run-ptest \ | 36 | file://run-ptest \ |
37 | file://lttng-sessiond.service \ | 37 | file://lttng-sessiond.service \ |
38 | file://0001-tests-regression-disable-the-tools-live-tests.patch \ | 38 | file://disable-tests.patch \ |
39 | file://determinism.patch \ | 39 | file://0001-compat-Define-off64_t-as-off_t-on-linux.patch \ |
40 | file://0001-tests-add-check_skip_kernel_test-to-check-root-user-.patch \ | ||
41 | file://0001-Fix-rotation-destroy-flush-fix-session-daemon-abort-.patch \ | ||
42 | file://0001-fix-lttng-tools-fails-to-compile-with-libxml2-2.14.0.patch \ | ||
40 | " | 43 | " |
41 | 44 | ||
42 | SRC_URI[sha256sum] = "9ed9161795ff023b076f9f95afaa4f1f822ec42495c0fa04c586ab8fa74e84f1" | 45 | SRC_URI[sha256sum] = "96ea42351ee112c19dad9fdc7aae93b583d9f1722b2175664a381d2d337703c4" |
43 | 46 | ||
44 | inherit autotools ptest pkgconfig useradd python3-dir manpages systemd | 47 | inherit autotools ptest pkgconfig useradd python3-dir manpages systemd |
45 | 48 | ||
46 | SYSTEMD_SERVICE_${PN} = "lttng-sessiond.service" | 49 | CACHED_CONFIGUREVARS = "PGREP=/usr/bin/pgrep" |
50 | |||
51 | EXTRA_OECONF += "--disable-libtool-linkdep-fixup" | ||
52 | |||
53 | SYSTEMD_SERVICE:${PN} = "lttng-sessiond.service" | ||
47 | SYSTEMD_AUTO_ENABLE = "disable" | 54 | SYSTEMD_AUTO_ENABLE = "disable" |
48 | 55 | ||
49 | USERADD_PACKAGES = "${PN}" | 56 | USERADD_PACKAGES = "${PN}" |
50 | GROUPADD_PARAM_${PN} = "tracing" | 57 | GROUPADD_PARAM:${PN} = "tracing" |
51 | 58 | ||
52 | FILES_${PN} += "${libdir}/lttng/libexec/* ${datadir}/xml/lttng \ | 59 | FILES:${PN} += "${libdir}/lttng/libexec/* ${datadir}/xml/lttng \ |
53 | ${PYTHON_SITEPACKAGES_DIR}/*" | 60 | ${PYTHON_SITEPACKAGES_DIR}/*" |
54 | FILES_${PN}-staticdev += "${PYTHON_SITEPACKAGES_DIR}/*.a" | 61 | FILES:${PN}-staticdev += "${PYTHON_SITEPACKAGES_DIR}/*.a" |
55 | FILES_${PN}-dev += "${PYTHON_SITEPACKAGES_DIR}/*.la" | 62 | FILES:${PN}-dev += "${PYTHON_SITEPACKAGES_DIR}/*.la" |
56 | 63 | ||
57 | # Since files are installed into ${libdir}/lttng/libexec we match | 64 | # Since files are installed into ${libdir}/lttng/libexec we match |
58 | # the libexec insane test so skip it. | 65 | # the libexec insane test so skip it. |
59 | # Python module needs to keep _lttng.so | 66 | # Python module needs to keep _lttng.so |
60 | INSANE_SKIP_${PN} = "libexec dev-so" | 67 | INSANE_SKIP:${PN} = "libexec dev-so" |
61 | INSANE_SKIP_${PN}-dbg = "libexec" | 68 | INSANE_SKIP:${PN}-dbg = "libexec" |
62 | 69 | ||
63 | PRIVATE_LIBS_${PN}-ptest = "libfoo.so" | 70 | PRIVATE_LIBS:${PN}-ptest = "libfoo.so" |
64 | 71 | ||
65 | do_install_append () { | 72 | do_install:append () { |
66 | # install systemd unit file | 73 | # install systemd unit file |
67 | install -d ${D}${systemd_unitdir}/system | 74 | install -d ${D}${systemd_system_unitdir} |
68 | install -m 0644 ${WORKDIR}/lttng-sessiond.service ${D}${systemd_unitdir}/system | 75 | install -m 0644 ${UNPACKDIR}/lttng-sessiond.service ${D}${systemd_system_unitdir} |
69 | } | 76 | } |
70 | 77 | ||
71 | do_install_ptest () { | 78 | do_install_ptest () { |
72 | for f in Makefile tests/Makefile tests/utils/utils.sh tests/regression/tools/save-load/load-42*.lttng tests/regression/tools/save-load/configuration/load-42*.lttng tests/regression/tools/health/test_health.sh tests/regression/tools/metadata/utils.sh tests/regression/tools/rotation/rotate_utils.sh; do | 79 | for f in Makefile tests/Makefile tests/utils/utils.sh tests/regression/tools/save-load/*.lttng \ |
80 | tests/regression/tools/save-load/configuration/load-42*.lttng tests/regression/tools/health/test_health.sh \ | ||
81 | tests/regression/tools/metadata/utils.sh tests/regression/tools/rotation/rotate_utils.sh \ | ||
82 | tests/regression/tools/notification/util_event_generator.sh \ | ||
83 | tests/regression/tools/base-path/*.lttng; do | ||
73 | install -D "${B}/$f" "${D}${PTEST_PATH}/$f" | 84 | install -D "${B}/$f" "${D}${PTEST_PATH}/$f" |
74 | done | 85 | done |
75 | 86 | ||
76 | for f in config/tap-driver.sh config/test-driver src/common/config/session.xsd src/common/mi-lttng-4.0.xsd; do | 87 | for f in tests/utils/tap-driver.sh config/test-driver src/common/config/session.xsd src/common/mi-lttng-4.1.xsd; do |
77 | install -D "${S}/$f" "${D}${PTEST_PATH}/$f" | 88 | install -D "${S}/$f" "${D}${PTEST_PATH}/$f" |
78 | done | 89 | done |
79 | 90 | ||
91 | # Patch in the correct path for the custom libraries a helper executable needs | ||
92 | sed -i -e 's!FIXMEPTESTPATH!${PTEST_PATH}!g' "${D}${PTEST_PATH}/run-ptest" | ||
93 | |||
80 | # Prevent 'make check' from recursing into non-test subdirectories. | 94 | # Prevent 'make check' from recursing into non-test subdirectories. |
81 | sed -i -e 's!^SUBDIRS = .*!SUBDIRS = tests!' "${D}${PTEST_PATH}/Makefile" | 95 | sed -i -e 's!^SUBDIRS = .*!SUBDIRS = tests!' "${D}${PTEST_PATH}/Makefile" |
82 | 96 | ||
@@ -104,7 +118,7 @@ do_install_ptest () { | |||
104 | for f in $(find "${B}/tests/$d" -maxdepth 1 -executable -type f -printf '%P ') ; do | 118 | for f in $(find "${B}/tests/$d" -maxdepth 1 -executable -type f -printf '%P ') ; do |
105 | cp ${B}/tests/$d/$f ${D}${PTEST_PATH}/tests/`dirname $d`/$f | 119 | cp ${B}/tests/$d/$f ${D}${PTEST_PATH}/tests/`dirname $d`/$f |
106 | case $f in | 120 | case $f in |
107 | *.so) | 121 | *.so|userspace-probe-elf-*) |
108 | install -d ${D}${PTEST_PATH}/tests/$d/ | 122 | install -d ${D}${PTEST_PATH}/tests/$d/ |
109 | ln -s ../$f ${D}${PTEST_PATH}/tests/$d/$f | 123 | ln -s ../$f ${D}${PTEST_PATH}/tests/$d/$f |
110 | # Remove any rpath/runpath to pass QA check. | 124 | # Remove any rpath/runpath to pass QA check. |
@@ -115,6 +129,7 @@ do_install_ptest () { | |||
115 | done | 129 | done |
116 | 130 | ||
117 | chrpath --delete ${D}${PTEST_PATH}/tests/utils/testapp/userspace-probe-elf-binary/userspace-probe-elf-binary | 131 | chrpath --delete ${D}${PTEST_PATH}/tests/utils/testapp/userspace-probe-elf-binary/userspace-probe-elf-binary |
132 | chrpath --delete ${D}${PTEST_PATH}/tests/utils/testapp/userspace-probe-elf-cxx-binary/userspace-probe-elf-cxx-binary | ||
118 | chrpath --delete ${D}${PTEST_PATH}/tests/regression/ust/ust-dl/libbar.so | 133 | chrpath --delete ${D}${PTEST_PATH}/tests/regression/ust/ust-dl/libbar.so |
119 | chrpath --delete ${D}${PTEST_PATH}/tests/regression/ust/ust-dl/libfoo.so | 134 | chrpath --delete ${D}${PTEST_PATH}/tests/regression/ust/ust-dl/libfoo.so |
120 | 135 | ||
@@ -155,7 +170,7 @@ do_install_ptest () { | |||
155 | -i ${D}${PTEST_PATH}/tests/unit/Makefile | 170 | -i ${D}${PTEST_PATH}/tests/unit/Makefile |
156 | 171 | ||
157 | # Fix hardcoded build path | 172 | # Fix hardcoded build path |
158 | sed -e 's#TESTAPP_PATH=.*/tests/regression/#TESTAPP_PATH=${PTEST_PATH}/tests/regression/#' \ | 173 | sed -e 's#TESTAPP_PATH=.*/tests/regression/#TESTAPP_PATH="${PTEST_PATH}/tests/regression/#' \ |
159 | -i ${D}${PTEST_PATH}/tests/regression/ust/python-logging/test_python_logging | 174 | -i ${D}${PTEST_PATH}/tests/regression/ust/python-logging/test_python_logging |
160 | 175 | ||
161 | # Substitute links to installed binaries. | 176 | # Substitute links to installed binaries. |
@@ -172,3 +187,14 @@ do_install_ptest () { | |||
172 | esac | 187 | esac |
173 | done | 188 | done |
174 | } | 189 | } |
190 | |||
191 | INHIBIT_PACKAGE_STRIP_FILES = "\ | ||
192 | ${PKGD}${PTEST_PATH}/tests/utils/testapp/userspace-probe-elf-binary/userspace-probe-elf-binary \ | ||
193 | ${PKGD}${PTEST_PATH}/tests/utils/testapp/userspace-probe-elf-binary/.libs/userspace-probe-elf-binary \ | ||
194 | ${PKGD}${PTEST_PATH}/tests/utils/testapp/userspace-probe-elf-cxx-binary/userspace-probe-elf-cxx-binary \ | ||
195 | ${PKGD}${PTEST_PATH}/tests/utils/testapp/userspace-probe-elf-cxx-binary/.libs/userspace-probe-elf-cxx-binary \ | ||
196 | ${PKGD}${PTEST_PATH}/tests/utils/testapp/gen-syscall-events/gen-syscall-events \ | ||
197 | ${PKGD}${PTEST_PATH}/tests/utils/testapp/gen-syscall-events/.libs/gen-syscall-events \ | ||
198 | ${PKGD}${PTEST_PATH}/tests/utils/testapp/gen-syscall-events-callstack/gen-syscall-events-callstack \ | ||
199 | ${PKGD}${PTEST_PATH}/tests/utils/testapp/gen-syscall-events-callstack/.libs/gen-syscall-events-callstack \ | ||
200 | " | ||
diff --git a/meta/recipes-kernel/lttng/lttng-ust/0001-lttng-ust-common-link-with-liburcu-explicitly.patch b/meta/recipes-kernel/lttng/lttng-ust/0001-lttng-ust-common-link-with-liburcu-explicitly.patch new file mode 100644 index 0000000000..ceb240680b --- /dev/null +++ b/meta/recipes-kernel/lttng/lttng-ust/0001-lttng-ust-common-link-with-liburcu-explicitly.patch | |||
@@ -0,0 +1,25 @@ | |||
1 | From 1b6bbf14de8fdfe60e446c93969e29bc2cf5f2dc Mon Sep 17 00:00:00 2001 | ||
2 | From: Alexander Kanavin <alex@linutronix.de> | ||
3 | Date: Sun, 5 Sep 2021 10:44:19 +0200 | ||
4 | Subject: [PATCH] lttng-ust-common: link with liburcu explicitly | ||
5 | |||
6 | Otherwise linking errors are seen on x86-32. | ||
7 | |||
8 | Upstream-Status: Submitted [by email to lttng-dev, Francis, Jonathan] | ||
9 | Signed-off-by: Alexander Kanavin <alex@linutronix.de> | ||
10 | --- | ||
11 | src/lib/lttng-ust-common/Makefile.am | 1 + | ||
12 | 1 file changed, 1 insertion(+) | ||
13 | |||
14 | diff --git a/src/lib/lttng-ust-common/Makefile.am b/src/lib/lttng-ust-common/Makefile.am | ||
15 | index 1ccc290..6531fa0 100644 | ||
16 | --- a/src/lib/lttng-ust-common/Makefile.am | ||
17 | +++ b/src/lib/lttng-ust-common/Makefile.am | ||
18 | @@ -16,6 +16,7 @@ liblttng_ust_common_la_SOURCES = \ | ||
19 | |||
20 | liblttng_ust_common_la_LIBADD = \ | ||
21 | $(top_builddir)/src/common/libcommon.la \ | ||
22 | + $(URCU_LIBS) \ | ||
23 | $(DL_LIBS) | ||
24 | |||
25 | liblttng_ust_common_la_LDFLAGS = -no-undefined -version-info $(LTTNG_UST_LIBRARY_VERSION) | ||
diff --git a/meta/recipes-kernel/lttng/lttng-ust/0001-python-lttngust-Makefile.am-Add-install-lib-to-setup.patch b/meta/recipes-kernel/lttng/lttng-ust/0001-python-lttngust-Makefile.am-Add-install-lib-to-setup.patch index c2028d0e1a..7bbe5c216e 100644 --- a/meta/recipes-kernel/lttng/lttng-ust/0001-python-lttngust-Makefile.am-Add-install-lib-to-setup.patch +++ b/meta/recipes-kernel/lttng/lttng-ust/0001-python-lttngust-Makefile.am-Add-install-lib-to-setup.patch | |||
@@ -1,6 +1,6 @@ | |||
1 | From f79dac30af9adda12996da7f6aa6667d3b580537 Mon Sep 17 00:00:00 2001 | 1 | From 30660997d220602202d8dc7264e49095a1581947 Mon Sep 17 00:00:00 2001 |
2 | From: Robert Yang <liezhi.yang@windriver.com> | 2 | From: Richard Purdie <richard.purdie@linuxfoundation.org> |
3 | Date: Thu, 26 Sep 2019 17:54:00 +0800 | 3 | Date: Tue, 20 Feb 2024 12:19:06 +0000 |
4 | Subject: [PATCH] python-lttngust/Makefile.am: Add --install-lib to setup.py | 4 | Subject: [PATCH] python-lttngust/Makefile.am: Add --install-lib to setup.py |
5 | 5 | ||
6 | Otherwise it may install to /usr/lib, but should be /usr/lib64 when cross | 6 | Otherwise it may install to /usr/lib, but should be /usr/lib64 when cross |
@@ -10,22 +10,19 @@ Upstream-Status: Submitted [https://github.com/lttng/lttng-ust/pull/59] | |||
10 | 10 | ||
11 | Signed-off-by: Robert Yang <liezhi.yang@windriver.com> | 11 | Signed-off-by: Robert Yang <liezhi.yang@windriver.com> |
12 | --- | 12 | --- |
13 | python-lttngust/Makefile.am | 2 +- | 13 | src/python-lttngust/Makefile.am | 2 +- |
14 | 1 file changed, 1 insertion(+), 1 deletion(-) | 14 | 1 file changed, 1 insertion(+), 1 deletion(-) |
15 | 15 | ||
16 | diff --git a/python-lttngust/Makefile.am b/python-lttngust/Makefile.am | 16 | diff --git a/src/python-lttngust/Makefile.am b/src/python-lttngust/Makefile.am |
17 | index 6c0d20d..38b51b8 100644 | 17 | index d53e21d..283901e 100644 |
18 | --- a/python-lttngust/Makefile.am | 18 | --- a/src/python-lttngust/Makefile.am |
19 | +++ b/python-lttngust/Makefile.am | 19 | +++ b/src/python-lttngust/Makefile.am |
20 | @@ -9,7 +9,7 @@ install-exec-local: | 20 | @@ -45,7 +45,7 @@ install-exec-local: build-python-bindings.stamp |
21 | if [ "$(DESTDIR)" != "" ]; then \ | 21 | if [ "$(DESTDIR)" != "" ]; then \ |
22 | opts="$$opts --root=$(DESTDIR)"; \ | 22 | opts="$$opts --root=$(DESTDIR)"; \ |
23 | fi; \ | 23 | fi; \ |
24 | - $(PYTHON) setup.py install $$opts; | 24 | - $(PYTHON) $(builddir)/setup.py install $(PY_INSTALL_OPTS) $$opts; |
25 | + $(PYTHON) setup.py install $$opts --install-lib=$(pythondir); | 25 | + $(PYTHON) $(builddir)/setup.py install $(PY_INSTALL_OPTS) $$opts --install-lib=$(pythondir); |
26 | 26 | ||
27 | clean-local: | 27 | clean-local: |
28 | rm -rf $(builddir)/build | 28 | rm -rf $(builddir)/build |
29 | -- | ||
30 | 2.7.4 | ||
31 | |||
diff --git a/meta/recipes-kernel/lttng/lttng-ust_2.12.1.bb b/meta/recipes-kernel/lttng/lttng-ust_2.13.9.bb index 67b53cbbba..dd7657e0cc 100644 --- a/meta/recipes-kernel/lttng/lttng-ust_2.12.1.bb +++ b/meta/recipes-kernel/lttng/lttng-ust_2.13.9.bb | |||
@@ -3,38 +3,37 @@ DESCRIPTION = "The LTTng UST 2.x package contains the userspace tracer library t | |||
3 | HOMEPAGE = "http://lttng.org/ust" | 3 | HOMEPAGE = "http://lttng.org/ust" |
4 | BUGTRACKER = "https://bugs.lttng.org/projects/lttng-ust" | 4 | BUGTRACKER = "https://bugs.lttng.org/projects/lttng-ust" |
5 | 5 | ||
6 | LICENSE = "LGPLv2.1+ & MIT & GPLv2" | 6 | LICENSE = "LGPL-2.1-or-later & MIT & GPL-2.0-only" |
7 | LIC_FILES_CHKSUM = "file://COPYING;md5=c963eb366b781252b0bf0fdf1624d9e9 \ | 7 | LIC_FILES_CHKSUM = "file://LICENSE;md5=a46577a38ad0c36ff6ff43ccf40c480f" |
8 | file://snprintf/snprintf.c;endline=32;md5=d3d544959d8a3782b2e07451be0a903c \ | ||
9 | file://snprintf/various.h;endline=31;md5=89f2509b6b4682c4fc95255eec4abe44" | ||
10 | 8 | ||
11 | PYTHON_OPTION = "am_cv_python_pyexecdir='${PYTHON_SITEPACKAGES_DIR}' \ | 9 | PYTHON_OPTION = "am_cv_python_pyexecdir='${PYTHON_SITEPACKAGES_DIR}' \ |
12 | am_cv_python_pythondir='${PYTHON_SITEPACKAGES_DIR}' \ | 10 | am_cv_python_pythondir='${PYTHON_SITEPACKAGES_DIR}' \ |
13 | PYTHON_INCLUDE='-I${STAGING_INCDIR}/python${PYTHON_BASEVERSION}${PYTHON_ABI}' \ | 11 | PYTHON_INCLUDE='-I${STAGING_INCDIR}/python${PYTHON_BASEVERSION}${PYTHON_ABI}' \ |
14 | " | 12 | " |
15 | 13 | ||
16 | inherit autotools lib_package manpages python3native | 14 | inherit autotools lib_package manpages python3native pkgconfig |
17 | 15 | ||
18 | include lttng-platforms.inc | 16 | include lttng-platforms.inc |
19 | 17 | ||
20 | EXTRA_OECONF = "--disable-numa" | 18 | EXTRA_OECONF = "--disable-numa" |
19 | CPPFLAGS:append:arm = "${@oe.utils.vartrue('DEBUG_BUILD', '-DUATOMIC_NO_LINK_ERROR', '', d)}" | ||
21 | 20 | ||
22 | DEPENDS = "liburcu util-linux" | 21 | DEPENDS = "liburcu util-linux" |
23 | RDEPENDS_${PN}-bin = "python3-core" | 22 | RDEPENDS:${PN}-bin = "python3-core" |
24 | 23 | ||
25 | # For backwards compatibility after rename | 24 | # For backwards compatibility after rename |
26 | RPROVIDES_${PN} = "lttng2-ust" | 25 | RPROVIDES:${PN} = "lttng2-ust" |
27 | RREPLACES_${PN} = "lttng2-ust" | 26 | RREPLACES:${PN} = "lttng2-ust" |
28 | RCONFLICTS_${PN} = "lttng2-ust" | 27 | RCONFLICTS:${PN} = "lttng2-ust" |
29 | 28 | ||
30 | PE = "2" | 29 | PE = "2" |
31 | 30 | ||
32 | SRC_URI = "https://lttng.org/files/lttng-ust/lttng-ust-${PV}.tar.bz2 \ | 31 | SRC_URI = "https://lttng.org/files/lttng-ust/lttng-ust-${PV}.tar.bz2 \ |
33 | file://0001-python-lttngust-Makefile.am-Add-install-lib-to-setup.patch \ | 32 | file://0001-python-lttngust-Makefile.am-Add-install-lib-to-setup.patch \ |
33 | file://0001-lttng-ust-common-link-with-liburcu-explicitly.patch \ | ||
34 | " | 34 | " |
35 | 35 | ||
36 | SRC_URI[md5sum] = "11787d1df69b04dd7431614ab43b2e12" | 36 | SRC_URI[sha256sum] = "2ad6d69a54a1d924c18a4aa7a233db104e3cc332bcdd240e196bf7adbed3f712" |
37 | SRC_URI[sha256sum] = "48a3948b168195123a749d22818809bd25127bb5f1a66458c3c012b210d2a051" | ||
38 | 37 | ||
39 | CVE_PRODUCT = "ust" | 38 | CVE_PRODUCT = "ust" |
40 | 39 | ||
@@ -42,11 +41,11 @@ PACKAGECONFIG[examples] = "--enable-examples, --disable-examples," | |||
42 | PACKAGECONFIG[manpages] = "--enable-man-pages, --disable-man-pages, asciidoc-native xmlto-native libxslt-native" | 41 | PACKAGECONFIG[manpages] = "--enable-man-pages, --disable-man-pages, asciidoc-native xmlto-native libxslt-native" |
43 | PACKAGECONFIG[python3-agent] = "--enable-python-agent ${PYTHON_OPTION}, --disable-python-agent, python3, python3" | 42 | PACKAGECONFIG[python3-agent] = "--enable-python-agent ${PYTHON_OPTION}, --disable-python-agent, python3, python3" |
44 | 43 | ||
45 | FILES_${PN} += " ${PYTHON_SITEPACKAGES_DIR}/*" | 44 | FILES:${PN} += " ${PYTHON_SITEPACKAGES_DIR}/*" |
46 | FILES_${PN}-staticdev += " ${PYTHON_SITEPACKAGES_DIR}/*.a" | 45 | FILES:${PN}-staticdev += " ${PYTHON_SITEPACKAGES_DIR}/*.a" |
47 | FILES_${PN}-dev += " ${PYTHON_SITEPACKAGES_DIR}/*.la" | 46 | FILES:${PN}-dev += " ${PYTHON_SITEPACKAGES_DIR}/*.la" |
48 | 47 | ||
49 | do_install_append() { | 48 | do_install:append() { |
50 | # Patch python tools to use Python 3; they should be source compatible, but | 49 | # Patch python tools to use Python 3; they should be source compatible, but |
51 | # still refer to Python 2 in the shebang | 50 | # still refer to Python 2 in the shebang |
52 | sed -i -e '1s,#!.*python.*,#!${bindir}/python3,' ${D}${bindir}/lttng-gen-tp | 51 | sed -i -e '1s,#!.*python.*,#!${bindir}/python3,' ${D}${bindir}/lttng-gen-tp |
diff --git a/meta/recipes-kernel/make-mod-scripts/make-mod-scripts_1.0.bb b/meta/recipes-kernel/make-mod-scripts/make-mod-scripts_1.0.bb index 92ffa4720e..8fcb5e6eb3 100644 --- a/meta/recipes-kernel/make-mod-scripts/make-mod-scripts_1.0.bb +++ b/meta/recipes-kernel/make-mod-scripts/make-mod-scripts_1.0.bb | |||
@@ -1,25 +1,28 @@ | |||
1 | SUMMARY = "Build tools needed by external modules" | 1 | SUMMARY = "Build tools needed by external modules" |
2 | HOMEPAGE = "https://www.yoctoproject.org/" | 2 | HOMEPAGE = "https://www.yoctoproject.org/" |
3 | LICENSE = "GPLv2" | 3 | LICENSE = "GPL-2.0-only" |
4 | LIC_FILES_CHKSUM = "file://${COREBASE}/meta/files/common-licenses/GPL-2.0-only;md5=801f80980d171dd6425610833a22dbe6" | 4 | LIC_FILES_CHKSUM = "file://${COREBASE}/meta/files/common-licenses/GPL-2.0-only;md5=801f80980d171dd6425610833a22dbe6" |
5 | 5 | ||
6 | inherit kernel-arch | 6 | inherit kernel-arch linux-kernel-base |
7 | inherit pkgconfig | 7 | inherit pkgconfig |
8 | 8 | ||
9 | PACKAGE_ARCH = "${MACHINE_ARCH}" | 9 | PACKAGE_ARCH = "${MACHINE_ARCH}" |
10 | 10 | ||
11 | S = "${WORKDIR}" | 11 | S = "${UNPACKDIR}" |
12 | 12 | ||
13 | do_configure[depends] += "virtual/kernel:do_shared_workdir openssl-native:do_populate_sysroot" | 13 | do_configure[depends] += "virtual/kernel:do_shared_workdir openssl-native:do_populate_sysroot" |
14 | do_compile[depends] += "virtual/kernel:do_compile_kernelmodules" | 14 | do_compile[depends] += "virtual/kernel:do_compile_kernelmodules" |
15 | 15 | ||
16 | RDEPENDS_${PN}-dev = "" | 16 | DEV_PKG_DEPENDENCY = "" |
17 | 17 | ||
18 | DEPENDS += "bc-native bison-native" | 18 | DEPENDS += "bc-native bison-native" |
19 | DEPENDS += "gmp-native" | 19 | DEPENDS += "gmp-native" |
20 | 20 | ||
21 | EXTRA_OEMAKE = " HOSTCC="${BUILD_CC} ${BUILD_CFLAGS} ${BUILD_LDFLAGS}" HOSTCPP="${BUILD_CPP}"" | 21 | EXTRA_OEMAKE = " HOSTCC="${BUILD_CC} ${BUILD_CFLAGS} ${BUILD_LDFLAGS}" HOSTCPP="${BUILD_CPP}"" |
22 | EXTRA_OEMAKE += " HOSTCXX="${BUILD_CXX} ${BUILD_CXXFLAGS} ${BUILD_LDFLAGS}"" | 22 | EXTRA_OEMAKE += " HOSTCXX="${BUILD_CXX} ${BUILD_CXXFLAGS} ${BUILD_LDFLAGS}" CROSS_COMPILE=${TARGET_PREFIX}" |
23 | |||
24 | KERNEL_LOCALVERSION = "${@get_kernellocalversion_file("${STAGING_KERNEL_BUILDDIR}")}" | ||
25 | export LOCALVERSION = "${KERNEL_LOCALVERSION}" | ||
23 | 26 | ||
24 | # Build some host tools under work-shared. CC, LD, and AR are probably | 27 | # Build some host tools under work-shared. CC, LD, and AR are probably |
25 | # not used, but this is the historical way of invoking "make scripts". | 28 | # not used, but this is the historical way of invoking "make scripts". |
@@ -27,7 +30,9 @@ EXTRA_OEMAKE += " HOSTCXX="${BUILD_CXX} ${BUILD_CXXFLAGS} ${BUILD_LDFLAGS}"" | |||
27 | do_configure() { | 30 | do_configure() { |
28 | unset CFLAGS CPPFLAGS CXXFLAGS LDFLAGS | 31 | unset CFLAGS CPPFLAGS CXXFLAGS LDFLAGS |
29 | for t in prepare scripts_basic scripts; do | 32 | for t in prepare scripts_basic scripts; do |
30 | oe_runmake CC="${KERNEL_CC}" LD="${KERNEL_LD}" AR="${KERNEL_AR}" \ | 33 | oe_runmake CC="${KERNEL_CC}" LD="${KERNEL_LD}" \ |
34 | AR="${KERNEL_AR}" OBJCOPY="${KERNEL_OBJCOPY}" \ | ||
35 | STRIP="${KERNEL_STRIP}" \ | ||
31 | -C ${STAGING_KERNEL_DIR} O=${STAGING_KERNEL_BUILDDIR} $t | 36 | -C ${STAGING_KERNEL_DIR} O=${STAGING_KERNEL_BUILDDIR} $t |
32 | done | 37 | done |
33 | } | 38 | } |
diff --git a/meta/recipes-kernel/makedumpfile/makedumpfile/0001-makedumpfile-replace-hardcode-CFLAGS.patch b/meta/recipes-kernel/makedumpfile/makedumpfile/0001-makedumpfile-replace-hardcode-CFLAGS.patch new file mode 100644 index 0000000000..796e036ab8 --- /dev/null +++ b/meta/recipes-kernel/makedumpfile/makedumpfile/0001-makedumpfile-replace-hardcode-CFLAGS.patch | |||
@@ -0,0 +1,139 @@ | |||
1 | From 59b8d59504c1bafff52a8794e67c6025fcd418a4 Mon Sep 17 00:00:00 2001 | ||
2 | From: Mingli Yu <mingli.yu@windriver.com> | ||
3 | Date: Sun, 24 Apr 2022 17:25:33 +0800 | ||
4 | Subject: [PATCH] makedumpfile: replace hardcode CFLAGS | ||
5 | |||
6 | * Create alias for target such as powerpc as powerpc32 | ||
7 | * Remove hardcode CFLAGS | ||
8 | * Add CFLAGS_COMMON to instead of CFLAGS so can flexibly | ||
9 | customize CFLAGS and not hardcode the CFLAGS as previously | ||
10 | * Forcibly to link dynamic library as the poky build | ||
11 | system doesn't build static library by default | ||
12 | |||
13 | Upstream-Status: Inappropriate [oe specific] | ||
14 | |||
15 | Signed-off-by: Mingli Yu <mingli.yu@windriver.com> | ||
16 | |||
17 | [2021-11-18] Patch updated to use CFLAGS_COMMON for zstd | ||
18 | Signed-off-by: Fathi Boudra <fathi.boudra@linaro.org> | ||
19 | |||
20 | Rebase to 1.7.1 | ||
21 | Signed-off-by: Mingli Yu <mingli.yu@windriver.com> | ||
22 | --- | ||
23 | Makefile | 40 +++++++++++++++++++++------------------- | ||
24 | 1 file changed, 21 insertions(+), 19 deletions(-) | ||
25 | |||
26 | diff --git a/Makefile b/Makefile | ||
27 | index aa73252..76fcafd 100644 | ||
28 | --- a/Makefile | ||
29 | +++ b/Makefile | ||
30 | @@ -8,12 +8,6 @@ ifeq ($(strip $CC),) | ||
31 | CC = gcc | ||
32 | endif | ||
33 | |||
34 | -CFLAGS_BASE := $(CFLAGS) -g -O2 -Wall -D_FILE_OFFSET_BITS=64 \ | ||
35 | - -D_LARGEFILE_SOURCE -D_LARGEFILE64_SOURCE | ||
36 | -CFLAGS := $(CFLAGS_BASE) -DVERSION='"$(VERSION)"' -DRELEASE_DATE='"$(DATE)"' | ||
37 | -CFLAGS_ARCH := $(CFLAGS_BASE) | ||
38 | -# LDFLAGS = -L/usr/local/lib -I/usr/local/include | ||
39 | - | ||
40 | HOST_ARCH := $(shell uname -m) | ||
41 | # Use TARGET as the target architecture if specified. | ||
42 | # Defaults to uname -m | ||
43 | @@ -24,26 +18,34 @@ endif | ||
44 | ARCH := $(shell echo ${TARGET} | sed -e s/i.86/x86/ -e s/sun4u/sparc64/ \ | ||
45 | -e s/arm.*/arm/ -e s/sa110/arm/ \ | ||
46 | -e s/s390x/s390/ -e s/parisc64/parisc/ \ | ||
47 | - -e s/ppc64/powerpc64/ -e s/ppc/powerpc32/) | ||
48 | + -e s/ppc64/powerpc64/ -e s/ppc/powerpc32/ \ | ||
49 | + -e s/_powerpc_/_powerpc32_/) | ||
50 | |||
51 | CROSS := | ||
52 | ifneq ($(TARGET), $(HOST_ARCH)) | ||
53 | CROSS := -U__$(HOST_ARCH)__ | ||
54 | endif | ||
55 | |||
56 | -CFLAGS += -D__$(ARCH)__ $(CROSS) | ||
57 | CFLAGS_ARCH += -D__$(ARCH)__ $(CROSS) | ||
58 | |||
59 | -ifeq ($(ARCH), powerpc64) | ||
60 | -CFLAGS += -m64 | ||
61 | +ifeq ($(ARCH), __powerpc64__) | ||
62 | CFLAGS_ARCH += -m64 | ||
63 | endif | ||
64 | |||
65 | -ifeq ($(ARCH), powerpc32) | ||
66 | -CFLAGS += -m32 | ||
67 | +ifeq ($(ARCH), __powerpc32__) | ||
68 | CFLAGS_ARCH += -m32 | ||
69 | endif | ||
70 | |||
71 | +CFLAGS_ARCH += $(CFLAGS) \ | ||
72 | + -D_FILE_OFFSET_BITS=64 \ | ||
73 | + -D_LARGEFILE_SOURCE \ | ||
74 | + -D_LARGEFILE64_SOURCE | ||
75 | + | ||
76 | +CFLAGS_COMMON = $(CFLAGS_ARCH) \ | ||
77 | + -DVERSION='"$(VERSION)"' \ | ||
78 | + -DRELEASE_DATE='"$(DATE)"' | ||
79 | + | ||
80 | + | ||
81 | SRC_BASE = makedumpfile.c makedumpfile.h diskdump_mod.h sadump_mod.h sadump_info.h | ||
82 | SRC_PART = print_info.c dwarf_info.c elf_info.c erase_info.c sadump_info.c cache.c tools.c printk.c detect_cycle.c | ||
83 | OBJ_PART=$(patsubst %.c,%.o,$(SRC_PART)) | ||
84 | @@ -52,12 +54,12 @@ OBJ_ARCH=$(patsubst %.c,%.o,$(SRC_ARCH)) | ||
85 | |||
86 | LIBS = -ldw -lbz2 -ldl -lelf -lz | ||
87 | ifneq ($(LINKTYPE), dynamic) | ||
88 | -LIBS := -static $(LIBS) -llzma | ||
89 | +LIBS := $(LIBS) -llzma | ||
90 | endif | ||
91 | |||
92 | ifeq ($(USELZO), on) | ||
93 | LIBS := -llzo2 $(LIBS) | ||
94 | -CFLAGS += -DUSELZO | ||
95 | +CFLAGS_COMMON += -DUSELZO | ||
96 | endif | ||
97 | |||
98 | ifeq ($(USESNAPPY), on) | ||
99 | @@ -65,12 +67,12 @@ LIBS := -lsnappy $(LIBS) | ||
100 | ifneq ($(LINKTYPE), dynamic) | ||
101 | LIBS := $(LIBS) -lstdc++ | ||
102 | endif | ||
103 | -CFLAGS += -DUSESNAPPY | ||
104 | +CFLAGS_COMMON += -DUSESNAPPY | ||
105 | endif | ||
106 | |||
107 | ifeq ($(USEZSTD), on) | ||
108 | LIBS := -lzstd $(LIBS) | ||
109 | -CFLAGS += -DUSEZSTD | ||
110 | +CFLAGS_COMMON += -DUSEZSTD | ||
111 | endif | ||
112 | |||
113 | ifeq ($(DEBUG), on) | ||
114 | @@ -106,14 +108,14 @@ SBINDIR ?= /usr/sbin | ||
115 | all: makedumpfile | ||
116 | |||
117 | $(OBJ_PART): $(SRC_PART) | ||
118 | - $(CC) $(CFLAGS) -c -o ./$@ $(VPATH)$(@:.o=.c) | ||
119 | + $(CC) $(CFLAGS_COMMON) -c -o ./$@ $(VPATH)$(@:.o=.c) | ||
120 | |||
121 | $(OBJ_ARCH): $(SRC_ARCH) | ||
122 | @mkdir -p $(@D) | ||
123 | $(CC) $(CFLAGS_ARCH) -c -o ./$@ $(VPATH)$(@:.o=.c) | ||
124 | |||
125 | makedumpfile: $(SRC_BASE) $(OBJ_PART) $(OBJ_ARCH) | ||
126 | - $(CC) $(CFLAGS) $(LDFLAGS) $(OBJ_PART) $(OBJ_ARCH) -rdynamic -o $@ $< $(LIBS) | ||
127 | + $(CC) $(CFLAGS_COMMON) $(LDFLAGS) $(OBJ_PART) $(OBJ_ARCH) -rdynamic -o $@ $< $(LIBS) | ||
128 | @sed -e "s/@DATE@/$(DATE)/" \ | ||
129 | -e "s/@VERSION@/$(VERSION)/" \ | ||
130 | $(VPATH)makedumpfile.8.in > $(VPATH)makedumpfile.8 | ||
131 | @@ -122,7 +124,7 @@ makedumpfile: $(SRC_BASE) $(OBJ_PART) $(OBJ_ARCH) | ||
132 | $(VPATH)makedumpfile.conf.5.in > $(VPATH)makedumpfile.conf.5 | ||
133 | |||
134 | eppic_makedumpfile.so: extension_eppic.c | ||
135 | - $(CC) $(CFLAGS) $(LDFLAGS) -shared -rdynamic -o $@ extension_eppic.c -fPIC -leppic -ltinfo | ||
136 | + $(CC) $(CFLAGS_COMMON) $(LDFLAGS) -shared -rdynamic -o $@ extension_eppic.c -fPIC -leppic -ltinfo | ||
137 | |||
138 | clean: | ||
139 | rm -f $(OBJ) $(OBJ_PART) $(OBJ_ARCH) makedumpfile makedumpfile.8 makedumpfile.conf.5 | ||
diff --git a/meta/recipes-kernel/makedumpfile/makedumpfile_1.7.7.bb b/meta/recipes-kernel/makedumpfile/makedumpfile_1.7.7.bb new file mode 100644 index 0000000000..99393e0984 --- /dev/null +++ b/meta/recipes-kernel/makedumpfile/makedumpfile_1.7.7.bb | |||
@@ -0,0 +1,60 @@ | |||
1 | SUMMARY = "VMcore extraction tool" | ||
2 | DESCRIPTION = "\ | ||
3 | This program is used to extract a subset of the memory available either \ | ||
4 | via /dev/mem or /proc/vmcore (for crashdumps). It is used to get memory \ | ||
5 | images without extra uneeded information (zero pages, userspace programs, \ | ||
6 | etc). \ | ||
7 | " | ||
8 | HOMEPAGE = "https://github.com/makedumpfile/makedumpfile" | ||
9 | |||
10 | LIC_FILES_CHKSUM = "file://COPYING;md5=751419260aa954499f7abaabaa882bbe" | ||
11 | LICENSE = "GPL-2.0-only" | ||
12 | |||
13 | SRCBRANCH ?= "master" | ||
14 | SRCREV = "e4ae6b5ee04edeeb03db89bee372904157e3378d" | ||
15 | |||
16 | DEPENDS = "bzip2 zlib elfutils xz" | ||
17 | RDEPENDS:${PN}-tools = "perl ${PN}" | ||
18 | |||
19 | # mips/rv32 would not compile. | ||
20 | COMPATIBLE_HOST:mipsarcho32 = "null" | ||
21 | COMPATIBLE_HOST:riscv32 = "null" | ||
22 | |||
23 | PACKAGES =+ "${PN}-tools" | ||
24 | FILES:${PN}-tools = "${bindir}/*.pl" | ||
25 | |||
26 | SRC_URI = "\ | ||
27 | git://github.com/makedumpfile/makedumpfile;branch=${SRCBRANCH};protocol=https \ | ||
28 | file://0001-makedumpfile-replace-hardcode-CFLAGS.patch \ | ||
29 | " | ||
30 | |||
31 | UPSTREAM_CHECK_GITTAGREGEX = "(?P<pver>\d+(\.\d+)+)" | ||
32 | |||
33 | SECTION = "base" | ||
34 | |||
35 | # If we do not specify TARGET, makedumpfile will build for the host but use the | ||
36 | # target gcc. | ||
37 | # | ||
38 | |||
39 | MAKEDUMPFILE_TARGET ?= "${TARGET_ARCH}" | ||
40 | MAKEDUMPFILE_TARGET:powerpc = "ppc" | ||
41 | |||
42 | EXTRA_OEMAKE = "\ | ||
43 | LINKTYPE=static \ | ||
44 | TARGET=${MAKEDUMPFILE_TARGET} \ | ||
45 | ${PACKAGECONFIG_CONFARGS} \ | ||
46 | " | ||
47 | |||
48 | PACKAGECONFIG ??= "" | ||
49 | PACKAGECONFIG[lzo] = "USELZO=on,USELZO=off,lzo" | ||
50 | PACKAGECONFIG[snappy] = "USESNAPPY=on,USESNAPPY=off,snappy" | ||
51 | PACKAGECONFIG[zstd] = "USEZSTD=on,USEZSTD=off,zstd" | ||
52 | |||
53 | do_install () { | ||
54 | mkdir -p ${D}/usr/bin | ||
55 | install -m 755 ${S}/makedumpfile ${D}/usr/bin | ||
56 | install -m 755 ${S}/makedumpfile-R.pl ${D}/usr/bin | ||
57 | |||
58 | mkdir -p ${D}/etc/ | ||
59 | install -m 644 ${S}/makedumpfile.conf ${D}/etc/makedumpfile.conf.sample | ||
60 | } | ||
diff --git a/meta/recipes-kernel/modutils-initscripts/files/PD.patch b/meta/recipes-kernel/modutils-initscripts/files/PD.patch deleted file mode 100644 index 21ac49cbd8..0000000000 --- a/meta/recipes-kernel/modutils-initscripts/files/PD.patch +++ /dev/null | |||
@@ -1,8 +0,0 @@ | |||
1 | Upstream-Status: Inappropriate [licensing] | ||
2 | |||
3 | Index: modutils-initscripts-1.0/LICENSE | ||
4 | =================================================================== | ||
5 | --- /dev/null 1970-01-01 00:00:00.000000000 +0000 | ||
6 | +++ modutils-initscripts-1.0/LICENSE 2010-12-06 14:26:03.570339002 -0800 | ||
7 | @@ -0,0 +1 @@ | ||
8 | +Public Domain | ||
diff --git a/meta/recipes-kernel/modutils-initscripts/files/modutils.sh b/meta/recipes-kernel/modutils-initscripts/files/modutils.sh index 28fe6f92d7..e9aaa66cb7 100755 --- a/meta/recipes-kernel/modutils-initscripts/files/modutils.sh +++ b/meta/recipes-kernel/modutils-initscripts/files/modutils.sh | |||
@@ -1,4 +1,8 @@ | |||
1 | #!/bin/sh | 1 | #!/bin/sh |
2 | # | ||
3 | # SPDX-License-Identifier: MIT | ||
4 | # | ||
5 | |||
2 | ### BEGIN INIT INFO | 6 | ### BEGIN INIT INFO |
3 | # Provides: module-init-tools | 7 | # Provides: module-init-tools |
4 | # Required-Start: | 8 | # Required-Start: |
@@ -13,6 +17,7 @@ | |||
13 | 17 | ||
14 | LOAD_MODULE=modprobe | 18 | LOAD_MODULE=modprobe |
15 | [ -f /proc/modules ] || exit 0 | 19 | [ -f /proc/modules ] || exit 0 |
20 | [ -d /lib/modules/`uname -r` ] || exit 0 | ||
16 | 21 | ||
17 | # Test if modules.dep exists and has a size greater than zero | 22 | # Test if modules.dep exists and has a size greater than zero |
18 | if [ ! -s /lib/modules/`uname -r`/modules.dep ]; then | 23 | if [ ! -s /lib/modules/`uname -r`/modules.dep ]; then |
diff --git a/meta/recipes-kernel/modutils-initscripts/modutils-initscripts.bb b/meta/recipes-kernel/modutils-initscripts/modutils-initscripts.bb index 97b4ddb88b..fb7b09393a 100644 --- a/meta/recipes-kernel/modutils-initscripts/modutils-initscripts.bb +++ b/meta/recipes-kernel/modutils-initscripts/modutils-initscripts.bb | |||
@@ -1,13 +1,10 @@ | |||
1 | SUMMARY = "Initscript for auto-loading kernel modules on boot" | 1 | SUMMARY = "Initscript for auto-loading kernel modules on boot" |
2 | SECTION = "base" | 2 | SECTION = "base" |
3 | LICENSE = "PD" | 3 | LICENSE = "MIT" |
4 | LIC_FILES_CHKSUM = "file://LICENSE;md5=7bf87fc37976e93ec66ad84fac58c098" | 4 | LIC_FILES_CHKSUM = "file://modutils.sh;beginline=3;endline=3;md5=b2dccaa94b3629a08bfb4f983cad6f89" |
5 | SRC_URI = "file://modutils.sh \ | 5 | SRC_URI = "file://modutils.sh" |
6 | file://PD.patch" | ||
7 | 6 | ||
8 | PR = "r7" | 7 | S = "${UNPACKDIR}" |
9 | |||
10 | S = "${WORKDIR}" | ||
11 | 8 | ||
12 | INITSCRIPT_NAME = "modutils.sh" | 9 | INITSCRIPT_NAME = "modutils.sh" |
13 | INITSCRIPT_PARAMS = "start 06 S ." | 10 | INITSCRIPT_PARAMS = "start 06 S ." |
@@ -19,11 +16,11 @@ do_compile () { | |||
19 | 16 | ||
20 | do_install () { | 17 | do_install () { |
21 | install -d ${D}${sysconfdir}/init.d/ | 18 | install -d ${D}${sysconfdir}/init.d/ |
22 | install -m 0755 ${WORKDIR}/modutils.sh ${D}${sysconfdir}/init.d/ | 19 | install -m 0755 ${S}/modutils.sh ${D}${sysconfdir}/init.d/ |
23 | } | 20 | } |
24 | 21 | ||
25 | PACKAGE_WRITE_DEPS_append = " ${@bb.utils.contains('DISTRO_FEATURES','systemd','systemd-systemctl-native','',d)}" | 22 | PACKAGE_WRITE_DEPS:append = " ${@bb.utils.contains('DISTRO_FEATURES','systemd','systemd-systemctl-native','',d)}" |
26 | pkg_postinst_${PN} () { | 23 | pkg_postinst:${PN} () { |
27 | if type systemctl >/dev/null 2>/dev/null; then | 24 | if type systemctl >/dev/null 2>/dev/null; then |
28 | if [ -n "$D" ]; then | 25 | if [ -n "$D" ]; then |
29 | OPTS="--root=$D" | 26 | OPTS="--root=$D" |
diff --git a/meta/recipes-kernel/perf/perf-perl.inc b/meta/recipes-kernel/perf/perf-perl.inc index ae77319b20..f3eef75a90 100644 --- a/meta/recipes-kernel/perf/perf-perl.inc +++ b/meta/recipes-kernel/perf/perf-perl.inc | |||
@@ -2,6 +2,6 @@ inherit perlnative cpan-base | |||
2 | 2 | ||
3 | # Env var which tells perl if it should use host (no) or target (yes) settings | 3 | # Env var which tells perl if it should use host (no) or target (yes) settings |
4 | export PERLCONFIGTARGET = "${@is_target(d)}" | 4 | export PERLCONFIGTARGET = "${@is_target(d)}" |
5 | export PERL_INC = "${STAGING_LIBDIR}${PERL_OWN_DIR}/perl/${@get_perl_version(d)}/CORE" | 5 | export PERL_INC = "${STAGING_LIBDIR}${PERL_OWN_DIR}/perl5/${@get_perl_version(d)}/${@get_perl_arch(d)}/CORE" |
6 | export PERL_LIB = "${STAGING_LIBDIR}${PERL_OWN_DIR}/perl/${@get_perl_version(d)}" | 6 | export PERL_LIB = "${STAGING_LIBDIR}${PERL_OWN_DIR}/perl5/${@get_perl_version(d)}" |
7 | export PERL_ARCHLIB = "${STAGING_LIBDIR}${PERL_OWN_DIR}/perl/${@get_perl_version(d)}" | 7 | export PERL_ARCHLIB = "${STAGING_LIBDIR}${PERL_OWN_DIR}/perl5/${@get_perl_version(d)}/${@get_perl_arch(d)}" |
diff --git a/meta/recipes-kernel/perf/perf.bb b/meta/recipes-kernel/perf/perf.bb index 868cde7353..4f29bd5bbc 100644 --- a/meta/recipes-kernel/perf/perf.bb +++ b/meta/recipes-kernel/perf/perf.bb | |||
@@ -7,31 +7,36 @@ and software features (software counters, tracepoints) \ | |||
7 | as well." | 7 | as well." |
8 | HOMEPAGE = "https://perf.wiki.kernel.org/index.php/Main_Page" | 8 | HOMEPAGE = "https://perf.wiki.kernel.org/index.php/Main_Page" |
9 | 9 | ||
10 | LICENSE = "GPLv2" | 10 | LICENSE = "GPL-2.0-only" |
11 | 11 | ||
12 | PR = "r9" | 12 | # zstd is required for kernels 6.14+ when libelf-zstd is detected |
13 | 13 | PACKAGECONFIG ??= "python tui libunwind libtraceevent zstd" | |
14 | PACKAGECONFIG ??= "scripting tui libunwind" | ||
15 | PACKAGECONFIG[dwarf] = ",NO_DWARF=1" | 14 | PACKAGECONFIG[dwarf] = ",NO_DWARF=1" |
16 | PACKAGECONFIG[scripting] = ",NO_LIBPERL=1 NO_LIBPYTHON=1,perl python3" | 15 | PACKAGECONFIG[perl] = ",NO_LIBPERL=1,perl" |
17 | # gui support was added with kernel 3.6.35 | 16 | PACKAGECONFIG[python] = ",NO_LIBPYTHON=1,python3 python3-setuptools-native" |
18 | # since 3.10 libnewt was replaced by slang | 17 | PACKAGECONFIG[tui] = ",NO_SLANG=1,slang" |
19 | # to cover a wide range of kernel we add both dependencies | ||
20 | PACKAGECONFIG[tui] = ",NO_NEWT=1,libnewt slang" | ||
21 | PACKAGECONFIG[libunwind] = ",NO_LIBUNWIND=1 NO_LIBDW_DWARF_UNWIND=1,libunwind" | 18 | PACKAGECONFIG[libunwind] = ",NO_LIBUNWIND=1 NO_LIBDW_DWARF_UNWIND=1,libunwind" |
22 | PACKAGECONFIG[libnuma] = ",NO_LIBNUMA=1" | 19 | PACKAGECONFIG[libnuma] = ",NO_LIBNUMA=1" |
20 | PACKAGECONFIG[bfd] = ",NO_LIBBFD=1" | ||
23 | PACKAGECONFIG[systemtap] = ",NO_SDT=1,systemtap" | 21 | PACKAGECONFIG[systemtap] = ",NO_SDT=1,systemtap" |
24 | PACKAGECONFIG[jvmti] = ",NO_JVMTI=1" | 22 | PACKAGECONFIG[jvmti] = ",NO_JVMTI=1" |
25 | # libaudit support would need scripting to be enabled | 23 | # libaudit support would need scripting to be enabled |
26 | PACKAGECONFIG[audit] = ",NO_LIBAUDIT=1,audit" | 24 | PACKAGECONFIG[audit] = ",NO_LIBAUDIT=1,audit" |
27 | PACKAGECONFIG[manpages] = ",,xmlto-native asciidoc-native" | 25 | PACKAGECONFIG[manpages] = ",,xmlto-native asciidoc-native" |
28 | PACKAGECONFIG[cap] = ",,libcap" | 26 | PACKAGECONFIG[cap] = ",,libcap" |
27 | PACKAGECONFIG[libtraceevent] = ",NO_LIBTRACEEVENT=1,libtraceevent" | ||
28 | # jevents requires host python for generating a .c file, but is | ||
29 | # unrelated to the python item. | ||
30 | PACKAGECONFIG[jevents] = ",NO_JEVENTS=1,python3-native" | ||
29 | # Arm CoreSight | 31 | # Arm CoreSight |
30 | PACKAGECONFIG[coresight] = "CORESIGHT=1,,opencsd" | 32 | PACKAGECONFIG[coresight] = "CORESIGHT=1,,opencsd" |
33 | PACKAGECONFIG[pfm4] = ",NO_LIBPFM4=1,libpfm4" | ||
34 | PACKAGECONFIG[babeltrace] = ",NO_LIBBABELTRACE=1,babeltrace" | ||
35 | PACKAGECONFIG[zstd] = ",NO_LIBZSTD=1,zstd" | ||
31 | 36 | ||
32 | # libunwind is not yet ported for some architectures | 37 | # libunwind is not yet ported for some architectures |
33 | PACKAGECONFIG_remove_arc = "libunwind" | 38 | PACKAGECONFIG:remove:arc = "libunwind" |
34 | PACKAGECONFIG_remove_riscv64 = "libunwind" | 39 | PACKAGECONFIG:remove:riscv32 = "libunwind" |
35 | 40 | ||
36 | DEPENDS = " \ | 41 | DEPENDS = " \ |
37 | virtual/${MLPREFIX}libc \ | 42 | virtual/${MLPREFIX}libc \ |
@@ -47,7 +52,7 @@ PROVIDES = "virtual/perf" | |||
47 | inherit linux-kernel-base kernel-arch manpages | 52 | inherit linux-kernel-base kernel-arch manpages |
48 | 53 | ||
49 | # needed for building the tools/perf Python bindings | 54 | # needed for building the tools/perf Python bindings |
50 | inherit ${@bb.utils.contains('PACKAGECONFIG', 'scripting', 'python3native', '', d)} | 55 | inherit_defer ${@bb.utils.contains('PACKAGECONFIG', 'python', 'python3targetconfig', '', d)} |
51 | inherit python3-dir | 56 | inherit python3-dir |
52 | export PYTHON_SITEPACKAGES_DIR | 57 | export PYTHON_SITEPACKAGES_DIR |
53 | 58 | ||
@@ -57,20 +62,38 @@ export WERROR = "0" | |||
57 | do_populate_lic[depends] += "virtual/kernel:do_shared_workdir" | 62 | do_populate_lic[depends] += "virtual/kernel:do_shared_workdir" |
58 | 63 | ||
59 | # needed for building the tools/perf Perl binding | 64 | # needed for building the tools/perf Perl binding |
60 | include ${@bb.utils.contains('PACKAGECONFIG', 'scripting', 'perf-perl.inc', '', d)} | 65 | include ${@bb.utils.contains('PACKAGECONFIG', 'perl', 'perf-perl.inc', '', d)} |
61 | 66 | ||
62 | inherit kernelsrc | 67 | inherit kernelsrc |
63 | 68 | ||
64 | S = "${WORKDIR}/${BP}" | 69 | S = "${UNPACKDIR}/${BP}" |
65 | SPDX_S = "${S}/tools/perf" | ||
66 | 70 | ||
67 | # The LDFLAGS is required or some old kernels fails due missing | 71 | # The LDFLAGS is required or some old kernels fails due missing |
68 | # symbols and this is preferred than requiring patches to every old | 72 | # symbols and this is preferred than requiring patches to every old |
69 | # supported kernel. | 73 | # supported kernel. |
70 | LDFLAGS="-ldl -lutil" | 74 | LDFLAGS = "-ldl -lutil" |
75 | |||
76 | # Perf's build system adds its own optimization flags for most TUs, | ||
77 | # overriding the flags included here. But for some, perf does not add | ||
78 | # any -O option, so ensure the distro's chosen optimization gets used | ||
79 | # for those. Also include ${DEBUG_PREFIX_MAP} which ensures perf is | ||
80 | # built with appropriate -f*-prefix-map options, | ||
81 | # avoiding the 'buildpaths' QA warning. | ||
82 | TARGET_CC_ARCH += "${SELECTED_OPTIMIZATION} ${DEBUG_PREFIX_MAP}" | ||
83 | |||
84 | #| libbpf.c: In function 'find_kernel_btf_id.constprop': | ||
85 | #| libbpf.c:10009:33: error: 'mod_len' may be used uninitialized [-Werror=maybe-uninitialized] | ||
86 | #| 10009 | if (mod_name && strncmp(mod->name, mod_name, mod_len) != 0) | ||
87 | #| | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | ||
88 | #| libbpf.c:9979:21: note: 'mod_len' was declared here | ||
89 | #| 9979 | int ret, i, mod_len; | ||
90 | #| | ^~~~~~~ | ||
91 | #| cc1: all warnings being treated as errors | ||
92 | TARGET_CC_ARCH:append:toolchain-clang:arm = " -fno-error=maybe-uninitialized" | ||
71 | 93 | ||
72 | EXTRA_OEMAKE = '\ | 94 | EXTRA_OEMAKE = '\ |
73 | V=1 \ | 95 | V=1 \ |
96 | VF=1 \ | ||
74 | -C ${S}/tools/perf \ | 97 | -C ${S}/tools/perf \ |
75 | O=${B} \ | 98 | O=${B} \ |
76 | CROSS_COMPILE=${TARGET_PREFIX} \ | 99 | CROSS_COMPILE=${TARGET_PREFIX} \ |
@@ -80,11 +103,13 @@ EXTRA_OEMAKE = '\ | |||
80 | LDSHARED="${CC} -shared" \ | 103 | LDSHARED="${CC} -shared" \ |
81 | AR="${AR}" \ | 104 | AR="${AR}" \ |
82 | LD="${LD}" \ | 105 | LD="${LD}" \ |
83 | EXTRA_CFLAGS="-ldw" \ | 106 | EXTRA_CFLAGS="-ldw -I${S}" \ |
107 | YFLAGS='-y --file-prefix-map=${WORKDIR}=${TARGET_DBGSRC_DIR}' \ | ||
84 | EXTRA_LDFLAGS="${PERF_EXTRA_LDFLAGS}" \ | 108 | EXTRA_LDFLAGS="${PERF_EXTRA_LDFLAGS}" \ |
85 | perfexecdir=${libexecdir} \ | 109 | perfexecdir=${libexecdir} \ |
86 | NO_GTK2=1 \ | 110 | NO_GTK2=1 \ |
87 | ${PACKAGECONFIG_CONFARGS} \ | 111 | ${PACKAGECONFIG_CONFARGS} \ |
112 | PKG_CONFIG=pkg-config \ | ||
88 | TMPDIR="${B}" \ | 113 | TMPDIR="${B}" \ |
89 | LIBUNWIND_DIR=${STAGING_EXECPREFIXDIR} \ | 114 | LIBUNWIND_DIR=${STAGING_EXECPREFIXDIR} \ |
90 | ' | 115 | ' |
@@ -100,7 +125,7 @@ EXTRA_OEMAKE += "\ | |||
100 | 'sharedir=${@os.path.relpath(datadir, prefix)}' \ | 125 | 'sharedir=${@os.path.relpath(datadir, prefix)}' \ |
101 | 'mandir=${@os.path.relpath(mandir, prefix)}' \ | 126 | 'mandir=${@os.path.relpath(mandir, prefix)}' \ |
102 | 'infodir=${@os.path.relpath(infodir, prefix)}' \ | 127 | 'infodir=${@os.path.relpath(infodir, prefix)}' \ |
103 | ${@bb.utils.contains('PACKAGECONFIG', 'scripting', 'PYTHON=python3 PYTHON_CONFIG=python3-config', '', d)} \ | 128 | ${@bb.utils.contains('PACKAGECONFIG', 'python', 'PYTHON=python3 PYTHON_CONFIG=python3-config', '', d)} \ |
104 | " | 129 | " |
105 | 130 | ||
106 | # During do_configure, we might run a 'make clean'. That often breaks | 131 | # During do_configure, we might run a 'make clean'. That often breaks |
@@ -108,8 +133,12 @@ EXTRA_OEMAKE += "\ | |||
108 | # that it has to be done this way rather than by passing -j1, since | 133 | # that it has to be done this way rather than by passing -j1, since |
109 | # perf's build system by default ignores any -j argument, but does | 134 | # perf's build system by default ignores any -j argument, but does |
110 | # honour a JOBS variable. | 135 | # honour a JOBS variable. |
111 | EXTRA_OEMAKE_append_task-configure = " JOBS=1" | 136 | EXTRA_OEMAKE:append:task-configure = " JOBS=1" |
112 | 137 | ||
138 | # the architectures that need this file can be found in | ||
139 | # tools/include/uapi/asm/bpf_perf_event.h | ||
140 | # We are only listing supported arches at the moment | ||
141 | PERF_BPF_EVENT_SRC ?= '${@bb.utils.contains_any("ARCH", [ "riscv", "arm64" ], "arch/${ARCH}/include/uapi/asm/bpf_perf_event.h", "", d)}' | ||
113 | PERF_SRC ?= "Makefile \ | 142 | PERF_SRC ?= "Makefile \ |
114 | tools/arch \ | 143 | tools/arch \ |
115 | tools/build \ | 144 | tools/build \ |
@@ -119,18 +148,27 @@ PERF_SRC ?= "Makefile \ | |||
119 | tools/perf \ | 148 | tools/perf \ |
120 | tools/scripts \ | 149 | tools/scripts \ |
121 | scripts/ \ | 150 | scripts/ \ |
151 | arch/arm64/tools \ | ||
152 | ${PERF_BPF_EVENT_SRC} \ | ||
122 | arch/${ARCH}/Makefile \ | 153 | arch/${ARCH}/Makefile \ |
154 | include/uapi/asm-generic/Kbuild \ | ||
123 | " | 155 | " |
124 | 156 | ||
125 | PERF_EXTRA_LDFLAGS = "" | 157 | PERF_EXTRA_LDFLAGS = "" |
126 | 158 | ||
127 | # MIPS N32 | 159 | # MIPS N32/N64 |
128 | PERF_EXTRA_LDFLAGS_mipsarchn32eb = "-m elf32btsmipn32" | 160 | PERF_EXTRA_LDFLAGS:mipsarchn32eb = "-m elf32btsmipn32" |
129 | PERF_EXTRA_LDFLAGS_mipsarchn32el = "-m elf32ltsmipn32" | 161 | PERF_EXTRA_LDFLAGS:mipsarchn32el = "-m elf32ltsmipn32" |
162 | PERF_EXTRA_LDFLAGS:mipsarchn64eb = "-m elf64btsmip" | ||
163 | PERF_EXTRA_LDFLAGS:mipsarchn64el = "-m elf64ltsmip" | ||
130 | 164 | ||
131 | do_compile() { | 165 | do_compile() { |
132 | # Linux kernel build system is expected to do the right thing | 166 | # Linux kernel build system is expected to do the right thing |
133 | unset CFLAGS | 167 | unset CFLAGS |
168 | test -e ${S}/tools/lib/traceevent/plugins/Makefile && \ | ||
169 | sed -i -e 's|\$(libdir)/traceevent/plugins|\$(libdir)/traceevent_${KERNEL_VERSION}/plugins|g' ${S}/tools/lib/traceevent/plugins/Makefile | ||
170 | test -e ${S}/tools/perf/Makefile.config && \ | ||
171 | sed -i -e 's|\$(libdir)/traceevent/plugins|\$(libdir)/traceevent_${KERNEL_VERSION}/plugins|g' ${S}/tools/perf/Makefile.config | ||
134 | oe_runmake all | 172 | oe_runmake all |
135 | } | 173 | } |
136 | 174 | ||
@@ -139,8 +177,11 @@ do_install() { | |||
139 | unset CFLAGS | 177 | unset CFLAGS |
140 | oe_runmake install | 178 | oe_runmake install |
141 | # we are checking for this make target to be compatible with older perf versions | 179 | # we are checking for this make target to be compatible with older perf versions |
142 | if ${@bb.utils.contains('PACKAGECONFIG', 'scripting', 'true', 'false', d)} && grep -q install-python_ext ${S}/tools/perf/Makefile*; then | 180 | if ${@bb.utils.contains('PACKAGECONFIG', 'python', 'true', 'false', d)} && grep -q install-python_ext ${S}/tools/perf/Makefile*; then |
143 | oe_runmake DESTDIR=${D} install-python_ext | 181 | oe_runmake DESTDIR=${D} install-python_ext |
182 | if [ -e ${D}${libdir}/python*/site-packages/perf-*/SOURCES.txt ]; then | ||
183 | sed -i -e 's#${WORKDIR}##g' ${D}${libdir}/python*/site-packages/perf-*/SOURCES.txt | ||
184 | fi | ||
144 | fi | 185 | fi |
145 | } | 186 | } |
146 | 187 | ||
@@ -155,7 +196,8 @@ python copy_perf_source_from_kernel() { | |||
155 | src = oe.path.join(src_dir, s) | 196 | src = oe.path.join(src_dir, s) |
156 | dest = oe.path.join(dest_dir, s) | 197 | dest = oe.path.join(dest_dir, s) |
157 | if not os.path.exists(src): | 198 | if not os.path.exists(src): |
158 | bb.fatal("Path does not exist: %s. Maybe PERF_SRC does not match the kernel version." % src) | 199 | bb.warn("Path does not exist: %s. Maybe PERF_SRC lists more files than what your kernel version provides and needs." % src) |
200 | continue | ||
159 | if os.path.isdir(src): | 201 | if os.path.isdir(src): |
160 | oe.path.copyhardlinktree(src, dest) | 202 | oe.path.copyhardlinktree(src, dest) |
161 | else: | 203 | else: |
@@ -164,10 +206,10 @@ python copy_perf_source_from_kernel() { | |||
164 | bb.utils.copyfile(src, dest) | 206 | bb.utils.copyfile(src, dest) |
165 | } | 207 | } |
166 | 208 | ||
167 | do_configure_prepend () { | 209 | do_configure:prepend () { |
168 | # If building a multlib based perf, the incorrect library path will be | 210 | # If building a multlib based perf, the incorrect library path will be |
169 | # detected by perf, since it triggers via: ifeq ($(ARCH),x86_64). In a 32 bit | 211 | # detected by perf, since it triggers via: ifeq ($(ARCH),x86_64). In a 32 bit |
170 | # build, with a 64 bit multilib, the arch won't match and the detection of a | 212 | # build, with a 64 bit multilib, the arch won't match and the detection of a |
171 | # 64 bit build (and library) are not exected. To ensure that libraries are | 213 | # 64 bit build (and library) are not exected. To ensure that libraries are |
172 | # installed to the correct location, we can use the weak assignment in the | 214 | # installed to the correct location, we can use the weak assignment in the |
173 | # config/Makefile. | 215 | # config/Makefile. |
@@ -200,25 +242,101 @@ do_configure_prepend () { | |||
200 | if [ -e "${S}/tools/perf/Makefile.perf" ]; then | 242 | if [ -e "${S}/tools/perf/Makefile.perf" ]; then |
201 | sed -i -e 's,\ .config-detected, $(OUTPUT)/config-detected,g' \ | 243 | sed -i -e 's,\ .config-detected, $(OUTPUT)/config-detected,g' \ |
202 | ${S}/tools/perf/Makefile.perf | 244 | ${S}/tools/perf/Makefile.perf |
203 | sed -i -e "s,prefix='\$(DESTDIR_SQ)/usr'$,prefix='\$(DESTDIR_SQ)/usr' --install-lib='\$(DESTDIR)\$(PYTHON_SITEPACKAGES_DIR)',g" \ | 245 | # Variant with linux-yocto-specific patch |
246 | sed -i -e "s,prefix='\$(DESTDIR_SQ)/usr'$,prefix='\$(DESTDIR_SQ)/usr' --install-lib='\$(PYTHON_SITEPACKAGES_DIR)' --root='\$(DESTDIR)',g" \ | ||
247 | ${S}/tools/perf/Makefile.perf | ||
248 | # Variant for mainline Linux | ||
249 | sed -i -e "s,root='/\$(DESTDIR_SQ)',prefix='\$(DESTDIR_SQ)/usr' --install-lib='\$(PYTHON_SITEPACKAGES_DIR)' --root='/\$(DESTDIR_SQ)',g" \ | ||
204 | ${S}/tools/perf/Makefile.perf | 250 | ${S}/tools/perf/Makefile.perf |
205 | # backport https://github.com/torvalds/linux/commit/e4ffd066ff440a57097e9140fa9e16ceef905de8 | 251 | # backport https://github.com/torvalds/linux/commit/e4ffd066ff440a57097e9140fa9e16ceef905de8 |
206 | sed -i -e 's,\($(Q)$(SHELL) .$(arch_errno_tbl).\) $(CC) $(arch_errno_hdr_dir),\1 $(firstword $(CC)) $(arch_errno_hdr_dir),g' \ | 252 | sed -i -e 's,\($(Q)$(SHELL) .$(arch_errno_tbl).\) $(CC) $(arch_errno_hdr_dir),\1 $(firstword $(CC)) $(arch_errno_hdr_dir),g' \ |
207 | ${S}/tools/perf/Makefile.perf | 253 | ${S}/tools/perf/Makefile.perf |
208 | fi | 254 | fi |
209 | sed -i -e "s,--root='/\$(DESTDIR_SQ)',--prefix='\$(DESTDIR_SQ)/usr' --install-lib='\$(DESTDIR)\$(PYTHON_SITEPACKAGES_DIR)',g" \ | 255 | sed -i -e "s,--root='/\$(DESTDIR_SQ)',--prefix='\$(DESTDIR_SQ)/usr' --install-lib='\$(DESTDIR)\$(PYTHON_SITEPACKAGES_DIR)',g" \ |
210 | ${S}/tools/perf/Makefile* | 256 | ${S}/tools/perf/Makefile |
211 | 257 | ||
212 | if [ -e "${S}/tools/build/Makefile.build" ]; then | 258 | if [ -e "${S}/tools/build/Makefile.build" ]; then |
213 | sed -i -e 's,\ .config-detected, $(OUTPUT)/config-detected,g' \ | 259 | sed -i -e 's,\ .config-detected, $(OUTPUT)/config-detected,g' \ |
214 | ${S}/tools/build/Makefile.build | 260 | ${S}/tools/build/Makefile.build |
215 | fi | 261 | fi |
216 | 262 | ||
263 | # start reproducibility substitutions | ||
264 | if [ -e "${S}/tools/perf/Makefile.config" ]; then | ||
265 | # The following line in the Makefle: | ||
266 | # override PYTHON := $(call get-executable-or-default,PYTHON,$(PYTHON_AUTO)) | ||
267 | # "PYTHON" / "PYTHON_AUTO" have the full path as part of the variable. We've | ||
268 | # ensure that the environment is setup and we do not need the full path to be | ||
269 | # captured, since the symbol gets built into the executable, making it not | ||
270 | # reproducible. | ||
271 | sed -i -e 's,$(call get-executable-or-default\,PYTHON\,$(PYTHON_AUTO)),$(notdir $(call get-executable-or-default\,PYTHON\,$(PYTHON_AUTO))),g' \ | ||
272 | ${S}/tools/perf/Makefile.config | ||
273 | # The same line is in older releases, but looking explicitly for Python 2 | ||
274 | sed -i -e 's,$(call get-executable-or-default\,PYTHON\,$(PYTHON2)),$(notdir $(call get-executable-or-default\,PYTHON\,$(PYTHON2))),g' \ | ||
275 | ${S}/tools/perf/Makefile.config | ||
276 | |||
277 | # likewise with this substitution. Kernels with commit 18f2967418d031a39 | ||
278 | # [perf tools: Use Python devtools for version autodetection rather than runtime] | ||
279 | # need this substitution for reproducibility. | ||
280 | sed -i -e 's,$(call get-executable-or-default\,PYTHON\,$(subst -config\,\,$(PYTHON_AUTO))),$(notdir $(call get-executable-or-default\,PYTHON\,$(subst -config\,\,$(PYTHON_AUTO)))),g' \ | ||
281 | ${S}/tools/perf/Makefile.config | ||
282 | |||
283 | # The following line: | ||
284 | # srcdir_SQ = $(patsubst %tools/perf,tools/perf,$(subst ','\'',$(srcdir))), | ||
285 | # Captures the full src path of perf, which of course makes it not | ||
286 | # reproducible. We really only need the relative location 'tools/perf', so we | ||
287 | # change the Makefile line to remove everything before 'tools/perf' | ||
288 | sed -i -e "s%srcdir_SQ = \$(subst ','\\\'',\$(srcdir))%srcdir_SQ = \$(patsubst \%tools/perf,tools/perf,\$(subst ','\\\'',\$(srcdir)))%g" \ | ||
289 | ${S}/tools/perf/Makefile.config | ||
290 | # Avoid hardcoded path to python-native | ||
291 | sed -i -e 's#\(PYTHON_WORD := \)$(call shell-wordify,$(PYTHON))#\1 python3#g' \ | ||
292 | ${S}/tools/perf/Makefile.config | ||
293 | fi | ||
294 | if [ -e "${S}/tools/perf/tests/Build" ]; then | ||
295 | # OUTPUT is the full path, we have python on the path so we remove it from the | ||
296 | # definition. This is captured in the perf binary, so breaks reproducibility | ||
297 | sed -i -e 's,PYTHONPATH="BUILD_STR($(OUTPUT)python)",PYTHONPATH="BUILD_STR(python)",g' \ | ||
298 | ${S}/tools/perf/tests/Build | ||
299 | fi | ||
300 | if [ -e "${S}/tools/perf/util/Build" ]; then | ||
301 | # To avoid bison generating #ifdefs that have captured paths, we make sure | ||
302 | # all the calls have YFLAGS, which contains prefix mapping information. | ||
303 | sed -i -e 's,$(BISON),$(BISON) $(YFLAGS),g' ${S}/tools/perf/util/Build | ||
304 | fi | ||
305 | if [ -e "${S}/scripts/Makefile.host" ]; then | ||
306 | # To avoid yacc (bison) generating #ifdefs that have captured paths, we make sure | ||
307 | # all the calls have YFLAGS, which contains prefix mapping information. | ||
308 | sed -i -e 's,$(YACC),$(YACC) $(YFLAGS),g' ${S}/scripts/Makefile.host | ||
309 | fi | ||
310 | if [ -e "${S}/tools/perf/pmu-events/Build" ]; then | ||
311 | target='$(OUTPUT)pmu-events/pmu-events.c $(V)' | ||
312 | replacement1='$(OUTPUT)pmu-events/pmu-events.c $(V)\n' | ||
313 | replacement2='\t$(srctree)/sort-pmuevents.py $(OUTPUT)pmu-events/pmu-events.c $(OUTPUT)pmu-events/pmu-events.c.new\n' | ||
314 | replacement3='\tcp $(OUTPUT)pmu-events/pmu-events.c.new $(OUTPUT)pmu-events/pmu-events.c' | ||
315 | sed -i -e "s,$target,$replacement1$replacement2$replacement3,g" \ | ||
316 | "${S}/tools/perf/pmu-events/Build" | ||
317 | fi | ||
318 | if [ -e "${S}/tools/perf/pmu-events/jevents.py" ]; then | ||
319 | sed -i -e "s#os.scandir(path)#sorted(os.scandir(path), key=lambda e: e.name)#g" \ | ||
320 | "${S}/tools/perf/pmu-events/jevents.py" | ||
321 | fi | ||
322 | if [ -e "${S}/tools/perf/arch/arm64/Makefile" ]; then | ||
323 | sed -i 's,sysdef := $(srctree)/,sysdef := ,' ${S}/tools/perf/arch/arm64/Makefile | ||
324 | sed -i 's,$(incpath) $(sysdef),$(incpath) $(srctree)/$(sysdef) $(sysdef),' ${S}/tools/perf/arch/arm64/Makefile | ||
325 | fi | ||
326 | if [ -e "${S}/tools/perf/arch/arm64/entry/syscalls/mksyscalltbl" ]; then | ||
327 | if ! grep -q input_rel ${S}/tools/perf/arch/arm64/entry/syscalls/mksyscalltbl; then | ||
328 | sed -i 's,input=$4,input=$4\ninput_rel=$5,' ${S}/tools/perf/arch/arm64/entry/syscalls/mksyscalltbl | ||
329 | fi | ||
330 | sed -i 's,#include \\"\$input\\",#include \\"\$input_rel\\",' ${S}/tools/perf/arch/arm64/entry/syscalls/mksyscalltbl | ||
331 | fi | ||
332 | # end reproducibility substitutions | ||
333 | |||
217 | # We need to ensure the --sysroot option in CC is preserved | 334 | # We need to ensure the --sysroot option in CC is preserved |
218 | if [ -e "${S}/tools/perf/Makefile.perf" ]; then | 335 | if [ -e "${S}/tools/perf/Makefile.perf" ]; then |
219 | sed -i 's,CC = $(CROSS_COMPILE)gcc,#CC,' ${S}/tools/perf/Makefile.perf | 336 | sed -i 's,CC = $(CROSS_COMPILE)gcc,#CC,' ${S}/tools/perf/Makefile.perf |
220 | sed -i 's,AR = $(CROSS_COMPILE)ar,#AR,' ${S}/tools/perf/Makefile.perf | 337 | sed -i 's,AR = $(CROSS_COMPILE)ar,#AR,' ${S}/tools/perf/Makefile.perf |
221 | sed -i 's,LD = $(CROSS_COMPILE)ld,#LD,' ${S}/tools/perf/Makefile.perf | 338 | sed -i 's,LD = $(CROSS_COMPILE)ld,#LD,' ${S}/tools/perf/Makefile.perf |
339 | sed -i 's,PKG_CONFIG = $(CROSS_COMPILE)pkg-config,#PKG_CONFIG,' ${S}/tools/perf/Makefile.perf | ||
222 | fi | 340 | fi |
223 | if [ -e "${S}/tools/lib/api/Makefile" ]; then | 341 | if [ -e "${S}/tools/lib/api/Makefile" ]; then |
224 | sed -i 's,CC = $(CROSS_COMPILE)gcc,#CC,' ${S}/tools/lib/api/Makefile | 342 | sed -i 's,CC = $(CROSS_COMPILE)gcc,#CC,' ${S}/tools/lib/api/Makefile |
@@ -235,6 +353,9 @@ do_configure_prepend () { | |||
235 | if [ -e "${S}/tools/build/Makefile.feature" ]; then | 353 | if [ -e "${S}/tools/build/Makefile.feature" ]; then |
236 | sed -i 's,CFLAGS=,CC="\$(CC)" CFLAGS=,' ${S}/tools/build/Makefile.feature | 354 | sed -i 's,CFLAGS=,CC="\$(CC)" CFLAGS=,' ${S}/tools/build/Makefile.feature |
237 | fi | 355 | fi |
356 | # The libperl feature check produces fatal warnings due to -Werror being | ||
357 | # used, silence enough errors that the check passes. | ||
358 | sed -i 's/\(FLAGS_PERL_EMBED=.*\)/\1 -Wno-error=unused-function -Wno-error=attributes/' ${S}/tools/build/feature/Makefile | ||
238 | 359 | ||
239 | # 3.17-rc1+ has a include issue for arm/powerpc. Temporarily sed in the appropriate include | 360 | # 3.17-rc1+ has a include issue for arm/powerpc. Temporarily sed in the appropriate include |
240 | if [ -e "${S}/tools/perf/arch/$ARCH/util/skip-callchain-idx.c" ]; then | 361 | if [ -e "${S}/tools/perf/arch/$ARCH/util/skip-callchain-idx.c" ]; then |
@@ -254,36 +375,50 @@ do_configure_prepend () { | |||
254 | # so we copy it from the sysroot unistd.h to the perf unistd.h | 375 | # so we copy it from the sysroot unistd.h to the perf unistd.h |
255 | install -D -m0644 ${STAGING_INCDIR}/asm-generic/unistd.h ${S}/tools/include/uapi/asm-generic/unistd.h | 376 | install -D -m0644 ${STAGING_INCDIR}/asm-generic/unistd.h ${S}/tools/include/uapi/asm-generic/unistd.h |
256 | install -D -m0644 ${STAGING_INCDIR}/asm-generic/unistd.h ${S}/include/uapi/asm-generic/unistd.h | 377 | install -D -m0644 ${STAGING_INCDIR}/asm-generic/unistd.h ${S}/include/uapi/asm-generic/unistd.h |
257 | } | ||
258 | 378 | ||
259 | python do_package_prepend() { | 379 | # the fetcher is inhibited by the 'inherit kernelsrc', so we do a quick check and |
260 | d.setVar('PKGV', d.getVar("KERNEL_VERSION").split("-")[0]) | 380 | # copy for a helper script we need |
381 | for p in $(echo ${FILESPATH} | tr ':' '\n'); do | ||
382 | if [ -e $p/sort-pmuevents.py ]; then | ||
383 | cp $p/sort-pmuevents.py ${S} | ||
384 | fi | ||
385 | done | ||
261 | } | 386 | } |
262 | 387 | ||
263 | PACKAGE_ARCH = "${MACHINE_ARCH}" | 388 | PACKAGE_ARCH = "${MACHINE_ARCH}" |
264 | 389 | ||
265 | |||
266 | PACKAGES =+ "${PN}-archive ${PN}-tests ${PN}-perl ${PN}-python" | 390 | PACKAGES =+ "${PN}-archive ${PN}-tests ${PN}-perl ${PN}-python" |
267 | 391 | ||
268 | RDEPENDS_${PN} += "elfutils bash" | 392 | RDEPENDS:${PN} += "elfutils bash" |
269 | RDEPENDS_${PN}-archive =+ "bash" | 393 | RDEPENDS:${PN}-archive =+ "bash" |
270 | RDEPENDS_${PN}-python =+ "bash python3 python3-modules ${@bb.utils.contains('PACKAGECONFIG', 'audit', 'audit-python3', '', d)}" | 394 | RDEPENDS:${PN}-python =+ "bash python3 python3-modules ${@bb.utils.contains('PACKAGECONFIG', 'audit', 'audit-python', '', d)}" |
271 | RDEPENDS_${PN}-perl =+ "bash perl perl-modules" | 395 | RDEPENDS:${PN}-perl =+ "bash perl perl-modules" |
272 | RDEPENDS_${PN}-tests =+ "python3" | 396 | RDEPENDS:${PN}-tests =+ "python3 bash perl" |
273 | |||
274 | RSUGGESTS_SCRIPTING = "${@bb.utils.contains('PACKAGECONFIG', 'scripting', '${PN}-perl ${PN}-python', '',d)}" | ||
275 | RSUGGESTS_${PN} += "${PN}-archive ${PN}-tests ${RSUGGESTS_SCRIPTING}" | ||
276 | 397 | ||
398 | RSUGGESTS:${PN} += "${PN}-archive ${PN}-tests \ | ||
399 | ${@bb.utils.contains('PACKAGECONFIG', 'perl', '${PN}-perl', '', d)} \ | ||
400 | ${@bb.utils.contains('PACKAGECONFIG', 'python', '${PN}-python', '', d)} \ | ||
401 | " | ||
277 | FILES_SOLIBSDEV = "" | 402 | FILES_SOLIBSDEV = "" |
278 | FILES_${PN} += "${libexecdir}/perf-core ${exec_prefix}/libexec/perf-core ${libdir}/traceevent ${libdir}/libperf-jvmti.so" | 403 | FILES:${PN} += "${libexecdir}/perf-core ${exec_prefix}/libexec/perf-core ${libdir}/traceevent* ${libdir}/libperf-jvmti.so" |
279 | FILES_${PN}-archive = "${libdir}/perf/perf-core/perf-archive" | 404 | FILES:${PN}-archive = "${libdir}/perf/perf-core/perf-archive" |
280 | FILES_${PN}-tests = "${libdir}/perf/perf-core/tests ${libexecdir}/perf-core/tests" | 405 | FILES:${PN}-tests = "${libdir}/perf/perf-core/tests ${libexecdir}/perf-core/tests" |
281 | FILES_${PN}-python = " \ | 406 | FILES:${PN}-python = " \ |
282 | ${PYTHON_SITEPACKAGES_DIR} \ | 407 | ${PYTHON_SITEPACKAGES_DIR} \ |
283 | ${libexecdir}/perf-core/scripts/python \ | 408 | ${libexecdir}/perf-core/scripts/python \ |
284 | " | 409 | " |
285 | FILES_${PN}-perl = "${libexecdir}/perf-core/scripts/perl" | 410 | FILES:${PN}-perl = "${libexecdir}/perf-core/scripts/perl" |
286 | 411 | ||
412 | DEBUG_OPTIMIZATION:append = " -Wno-error=maybe-uninitialized" | ||
287 | 413 | ||
288 | INHIBIT_PACKAGE_DEBUG_SPLIT="1" | 414 | PACKAGESPLITFUNCS =+ "perf_fix_sources" |
289 | DEBUG_OPTIMIZATION_append = " -Wno-error=maybe-uninitialized" | 415 | |
416 | perf_fix_sources () { | ||
417 | for f in util/parse-events-flex.h util/parse-events-flex.c util/pmu-flex.c \ | ||
418 | util/pmu-flex.h util/expr-flex.h util/expr-flex.c; do | ||
419 | f=${PKGD}${TARGET_DBGSRC_DIR}/$f | ||
420 | if [ -e $f ]; then | ||
421 | sed -i -e 's#${S}/##g' $f | ||
422 | fi | ||
423 | done | ||
424 | } | ||
diff --git a/meta/recipes-kernel/perf/perf/sort-pmuevents.py b/meta/recipes-kernel/perf/perf/sort-pmuevents.py new file mode 100755 index 0000000000..0a87e553ab --- /dev/null +++ b/meta/recipes-kernel/perf/perf/sort-pmuevents.py | |||
@@ -0,0 +1,100 @@ | |||
1 | #!/usr/bin/env python3 | ||
2 | |||
3 | # perf pmu-events sorting tool | ||
4 | # | ||
5 | # Copyright (C) 2021 Bruce Ashfield | ||
6 | # | ||
7 | # SPDX-License-Identifier: MIT | ||
8 | # | ||
9 | |||
10 | import sys | ||
11 | import os | ||
12 | import re | ||
13 | from collections import OrderedDict | ||
14 | |||
15 | if len(sys.argv) < 2: | ||
16 | print( "[ERROR]: input and output pmu files missing" ) | ||
17 | sys.exit(1) | ||
18 | |||
19 | if len(sys.argv) < 3: | ||
20 | print( "[ERROR]: output pmu file missing" ) | ||
21 | sys.exit(1) | ||
22 | |||
23 | infile = sys.argv[1] | ||
24 | outfile = sys.argv[2] | ||
25 | |||
26 | if not os.path.exists(infile): | ||
27 | print( "ERROR. input file does not exist: %s" % infile ) | ||
28 | sys.exit(1) | ||
29 | |||
30 | if os.path.exists(outfile): | ||
31 | print( "WARNING. output file will be overwritten: %s" % infile ) | ||
32 | |||
33 | with open(infile, 'r') as file: | ||
34 | data = file.read() | ||
35 | |||
36 | preamble_regex = re.compile( '^(.*?)^(struct|const struct|static struct|static const struct)', re.MULTILINE | re.DOTALL ) | ||
37 | |||
38 | preamble = re.search( preamble_regex, data ) | ||
39 | struct_block_regex = re.compile(r'^(struct|const struct|static struct|static const struct).*?(\w+) (.*?)\[\] = {(.*?)^};', re.MULTILINE | re.DOTALL ) | ||
40 | field_regex = re.compile(r'{.*?},', re.MULTILINE | re.DOTALL ) | ||
41 | cpuid_regex = re.compile(r'\.cpuid = (.*?),', re.MULTILINE | re.DOTALL ) | ||
42 | name_regex = re.compile(r'\.name = (.*?),', re.MULTILINE | re.DOTALL ) | ||
43 | |||
44 | # create a dictionary structure to store all the structs, their | ||
45 | # types and then their fields. | ||
46 | entry_dict = {} | ||
47 | for struct in re.findall( struct_block_regex, data ): | ||
48 | # print( "struct: %s %s %s" % (struct[0],struct[1],struct[2]) ) | ||
49 | entry_dict[struct[2]] = {} | ||
50 | entry_dict[struct[2]]['type_prefix'] = struct[0] | ||
51 | entry_dict[struct[2]]['type'] = struct[1] | ||
52 | entry_dict[struct[2]]['fields'] = {} | ||
53 | for entry in re.findall( field_regex, struct[3] ): | ||
54 | #print( " entry: %s" % entry ) | ||
55 | cpuid = re.search( cpuid_regex, entry ) | ||
56 | if cpuid: | ||
57 | #print( " cpuid found: %s" % cpuid.group(1) ) | ||
58 | entry_dict[struct[2]]['fields'][cpuid.group(1)] = entry | ||
59 | |||
60 | name = re.search( name_regex, entry ) | ||
61 | if name: | ||
62 | #print( " name found: %s" % name.group(1) ) | ||
63 | entry_dict[struct[2]]['fields'][name.group(1)] = entry | ||
64 | |||
65 | # unmatched entries are most likely array terminators and | ||
66 | # should end up as the last element in the sorted list, which | ||
67 | # is achieved by using '0' as the key | ||
68 | if not cpuid and not name: | ||
69 | entry_dict[struct[2]]['fields']['0'] = entry | ||
70 | |||
71 | # created ordered dictionaries from the captured values. These are ordered by | ||
72 | # a sorted() iteration of the keys. We don't care about the order we read | ||
73 | # things, just the sorted order. Hency why we couldn't create these during | ||
74 | # reading. | ||
75 | # | ||
76 | # yes, there's a more concise way to do this, but our nested dictionaries of | ||
77 | # fields make it complex enough that it becomes unreadable. | ||
78 | entry_dict_sorted = OrderedDict() | ||
79 | for i in sorted(entry_dict.keys()): | ||
80 | entry_dict_sorted[i] = {} | ||
81 | entry_dict_sorted[i]['type_prefix'] = entry_dict[i]['type_prefix'] | ||
82 | entry_dict_sorted[i]['type'] = entry_dict[i]['type'] | ||
83 | entry_dict_sorted[i]['fields'] = {} | ||
84 | for f in sorted(entry_dict[i]['fields'].keys()): | ||
85 | entry_dict_sorted[i]['fields'][f] = entry_dict[i]['fields'][f] | ||
86 | |||
87 | # dump the sorted elements to the outfile | ||
88 | outf = open( outfile, 'w' ) | ||
89 | |||
90 | print( preamble.group(1) ) | ||
91 | outf.write( preamble.group(1) ) | ||
92 | for d in entry_dict_sorted: | ||
93 | outf.write( "%s %s %s[] = {\n" % (entry_dict_sorted[d]['type_prefix'], entry_dict_sorted[d]['type'],d) ) | ||
94 | for f in entry_dict_sorted[d]['fields']: | ||
95 | outf.write( entry_dict_sorted[d]['fields'][f] + '\n' ) | ||
96 | |||
97 | outf.write( "};\n" ) | ||
98 | |||
99 | outf.close() | ||
100 | |||
diff --git a/meta/recipes-kernel/powertop/powertop_2.13.bb b/meta/recipes-kernel/powertop/powertop_2.13.bb deleted file mode 100644 index 8c7e78fd94..0000000000 --- a/meta/recipes-kernel/powertop/powertop_2.13.bb +++ /dev/null | |||
@@ -1,32 +0,0 @@ | |||
1 | SUMMARY = "Power usage tool" | ||
2 | DESCRIPTION = "Linux tool to diagnose issues with power consumption and power management." | ||
3 | HOMEPAGE = "https://01.org/powertop/" | ||
4 | BUGTRACKER = "https://app.devzing.com/powertopbugs/bugzilla" | ||
5 | DEPENDS = "ncurses libnl pciutils autoconf-archive" | ||
6 | LICENSE = "GPLv2" | ||
7 | LIC_FILES_CHKSUM = "file://COPYING;md5=12f884d2ae1ff87c09e5b7ccc2c4ca7e" | ||
8 | |||
9 | SRC_URI = "git://github.com/fenrus75/powertop;protocol=https \ | ||
10 | file://0001-wakeup_xxx.h-include-limits.h.patch \ | ||
11 | " | ||
12 | SRCREV = "184cee06b2d64679bae5f806fe0a218827fdde99" | ||
13 | |||
14 | S = "${WORKDIR}/git" | ||
15 | |||
16 | inherit autotools gettext pkgconfig bash-completion | ||
17 | |||
18 | # we do not want libncursesw if we can | ||
19 | do_configure_prepend() { | ||
20 | # configure.ac checks for delwin() in "ncursesw ncurses" so let's drop first one | ||
21 | sed -i -e "s/ncursesw//g" ${S}/configure.ac | ||
22 | mkdir -p ${B}/src/tuning/ | ||
23 | echo "${PV}" > ${S}/version-long | ||
24 | echo "${PV}" > ${S}/version-short | ||
25 | cp ${STAGING_DATADIR}/aclocal/ax_require_defined.m4 ${S}/m4/ | ||
26 | } | ||
27 | |||
28 | inherit update-alternatives | ||
29 | ALTERNATIVE_${PN} = "powertop" | ||
30 | ALTERNATIVE_TARGET[powertop] = "${sbindir}/powertop" | ||
31 | ALTERNATIVE_LINK_NAME[powertop] = "${sbindir}/powertop" | ||
32 | ALTERNATIVE_PRIORITY = "100" | ||
diff --git a/meta/recipes-kernel/powertop/powertop_2.15.bb b/meta/recipes-kernel/powertop/powertop_2.15.bb new file mode 100644 index 0000000000..a9008b4074 --- /dev/null +++ b/meta/recipes-kernel/powertop/powertop_2.15.bb | |||
@@ -0,0 +1,22 @@ | |||
1 | SUMMARY = "Power usage tool" | ||
2 | DESCRIPTION = "Linux tool to diagnose issues with power consumption and power management." | ||
3 | HOMEPAGE = "https://01.org/powertop/" | ||
4 | BUGTRACKER = "https://app.devzing.com/powertopbugs/bugzilla" | ||
5 | DEPENDS = "ncurses libnl pciutils autoconf-archive-native" | ||
6 | LICENSE = "GPL-2.0-only" | ||
7 | LIC_FILES_CHKSUM = "file://COPYING;md5=12f884d2ae1ff87c09e5b7ccc2c4ca7e" | ||
8 | |||
9 | SRC_URI = "git://github.com/fenrus75/powertop;protocol=https;branch=master \ | ||
10 | file://0001-wakeup_xxx.h-include-limits.h.patch \ | ||
11 | " | ||
12 | SRCREV = "d51ad395436d4d1dcc3ca46e1519ffeb475bf651" | ||
13 | |||
14 | LDFLAGS += "-pthread" | ||
15 | |||
16 | inherit autotools gettext pkgconfig bash-completion | ||
17 | |||
18 | inherit update-alternatives | ||
19 | ALTERNATIVE:${PN} = "powertop" | ||
20 | ALTERNATIVE_TARGET[powertop] = "${sbindir}/powertop" | ||
21 | ALTERNATIVE_LINK_NAME[powertop] = "${sbindir}/powertop" | ||
22 | ALTERNATIVE_PRIORITY = "100" | ||
diff --git a/meta/recipes-kernel/systemtap/systemtap-native_git.bb b/meta/recipes-kernel/systemtap/systemtap-native_5.3.bb index 19cc1cf0f0..8befa7a7ea 100644 --- a/meta/recipes-kernel/systemtap/systemtap-native_git.bb +++ b/meta/recipes-kernel/systemtap/systemtap-native_5.3.bb | |||
@@ -1,6 +1,5 @@ | |||
1 | require systemtap_${PV}.bb | ||
1 | 2 | ||
2 | require systemtap_git.bb | 3 | inherit_defer native |
3 | |||
4 | inherit native | ||
5 | 4 | ||
6 | addtask addto_recipe_sysroot after do_populate_sysroot before do_build | 5 | addtask addto_recipe_sysroot after do_populate_sysroot before do_build |
diff --git a/meta/recipes-kernel/systemtap/systemtap-uprobes_git.bb b/meta/recipes-kernel/systemtap/systemtap-uprobes_git.bb deleted file mode 100644 index 46820ef489..0000000000 --- a/meta/recipes-kernel/systemtap/systemtap-uprobes_git.bb +++ /dev/null | |||
@@ -1,40 +0,0 @@ | |||
1 | SUMMARY = "UProbes kernel module for SystemTap" | ||
2 | |||
3 | require systemtap_git.inc | ||
4 | |||
5 | DEPENDS = "systemtap virtual/kernel" | ||
6 | |||
7 | # On systems without CONFIG_UTRACE, this package is empty. | ||
8 | ALLOW_EMPTY_${PN} = "1" | ||
9 | |||
10 | inherit module-base gettext | ||
11 | |||
12 | FILESEXTRAPATHS =. "${FILE_DIRNAME}/systemtap:" | ||
13 | |||
14 | FILES_${PN} += "${datadir}/systemtap/runtime/uprobes" | ||
15 | |||
16 | # Compile and install the uprobes kernel module on machines with utrace | ||
17 | # support. Note that staprun expects it in the systemtap/runtime directory, | ||
18 | # not in /lib/modules. | ||
19 | do_compile() { | ||
20 | if grep -q "CONFIG_UTRACE=y" ${STAGING_KERNEL_BUILDDIR}/.config | ||
21 | then | ||
22 | unset CFLAGS CPPFLAGS CXXFLAGS LDFLAGS CC LD CPP | ||
23 | oe_runmake CC="${KERNEL_CC}" LD="${KERNEL_LD}" \ | ||
24 | AR="${KERNEL_AR}" \ | ||
25 | -C ${STAGING_KERNEL_DIR} scripts | ||
26 | oe_runmake KDIR=${STAGING_KERNEL_DIR} \ | ||
27 | M="${S}/runtime/uprobes/" \ | ||
28 | CC="${KERNEL_CC}" LD="${KERNEL_LD}" \ | ||
29 | AR="${KERNEL_AR}" \ | ||
30 | -C "${S}/runtime/uprobes/" | ||
31 | fi | ||
32 | } | ||
33 | |||
34 | do_install() { | ||
35 | if [ -e "${S}/runtime/uprobes/uprobes.ko" ] | ||
36 | then | ||
37 | install -d ${D}${datadir}/systemtap/runtime/uprobes/ | ||
38 | install -m 0644 ${S}/runtime/uprobes/uprobes.ko ${D}${datadir}/systemtap/runtime/uprobes/ | ||
39 | fi | ||
40 | } | ||
diff --git a/meta/recipes-kernel/systemtap/systemtap/0001-Install-python-modules-to-correct-library-dir.patch b/meta/recipes-kernel/systemtap/systemtap/0001-Install-python-modules-to-correct-library-dir.patch index 48cf4aee85..ee9baedcda 100644 --- a/meta/recipes-kernel/systemtap/systemtap/0001-Install-python-modules-to-correct-library-dir.patch +++ b/meta/recipes-kernel/systemtap/systemtap/0001-Install-python-modules-to-correct-library-dir.patch | |||
@@ -1,4 +1,4 @@ | |||
1 | From 2ada22f05460223924efe54080cb4419e2b4c276 Mon Sep 17 00:00:00 2001 | 1 | From 18d088d10c1a0885fa25ac40591e38c8aa545c81 Mon Sep 17 00:00:00 2001 |
2 | From: Alexander Kanavin <alex.kanavin@gmail.com> | 2 | From: Alexander Kanavin <alex.kanavin@gmail.com> |
3 | Date: Fri, 24 Feb 2017 17:53:02 +0200 | 3 | Date: Fri, 24 Feb 2017 17:53:02 +0200 |
4 | Subject: [PATCH] Install python modules to correct library dir. | 4 | Subject: [PATCH] Install python modules to correct library dir. |
@@ -19,7 +19,7 @@ Signed-off-by: Hongxu Jia <hongxu.jia@windriver.com> | |||
19 | 1 file changed, 6 insertions(+), 2 deletions(-) | 19 | 1 file changed, 6 insertions(+), 2 deletions(-) |
20 | 20 | ||
21 | diff --git a/python/Makefile.am b/python/Makefile.am | 21 | diff --git a/python/Makefile.am b/python/Makefile.am |
22 | index a254480..578602f 100644 | 22 | index 13618dc2f..9d5cb7bcb 100644 |
23 | --- a/python/Makefile.am | 23 | --- a/python/Makefile.am |
24 | +++ b/python/Makefile.am | 24 | +++ b/python/Makefile.am |
25 | @@ -8,6 +8,10 @@ AUTOMAKE_OPTIONS = subdir-objects | 25 | @@ -8,6 +8,10 @@ AUTOMAKE_OPTIONS = subdir-objects |
@@ -35,7 +35,7 @@ index a254480..578602f 100644 | |||
35 | pkglibexecpython_PYTHON = | 35 | pkglibexecpython_PYTHON = |
36 | @@ -47,7 +51,7 @@ install-exec-local: | 36 | @@ -47,7 +51,7 @@ install-exec-local: |
37 | if HAVE_PYTHON2_PROBES | 37 | if HAVE_PYTHON2_PROBES |
38 | (cd $(srcdir); CFLAGS="$(AM_CPPFLAGS)" $(PYTHON) setup.py build \ | 38 | (cd $(srcdir); CFLAGS="$(CFLAGS) $(AM_CPPFLAGS)" $(PYTHON) setup.py build \ |
39 | --build-base $(shell readlink -f $(builddir))/py2build \ | 39 | --build-base $(shell readlink -f $(builddir))/py2build \ |
40 | - install --prefix $(DESTDIR)$(prefix) \ | 40 | - install --prefix $(DESTDIR)$(prefix) \ |
41 | + install --root $(DESTDIR) --prefix $(prefix) --prefix $(prefix) --install-lib=${pythondir} \ | 41 | + install --root $(DESTDIR) --prefix $(prefix) --prefix $(prefix) --install-lib=${pythondir} \ |
@@ -44,13 +44,10 @@ index a254480..578602f 100644 | |||
44 | --verbose) | 44 | --verbose) |
45 | @@ -55,7 +59,7 @@ endif | 45 | @@ -55,7 +59,7 @@ endif |
46 | if HAVE_PYTHON3_PROBES | 46 | if HAVE_PYTHON3_PROBES |
47 | (cd $(srcdir); CFLAGS="$(AM_CPPFLAGS)" $(PYTHON3) setup.py build \ | 47 | (cd $(srcdir); CFLAGS="$(CFLAGS) $(AM_CPPFLAGS)" $(PYTHON3) setup.py build \ |
48 | --build-base $(shell readlink -f $(builddir))/py3build \ | 48 | --build-base $(shell readlink -f $(builddir))/py3build \ |
49 | - install --prefix $(DESTDIR)$(prefix) \ | 49 | - install --prefix $(DESTDIR)$(prefix) \ |
50 | + install --root $(DESTDIR) --prefix $(prefix) --install-lib=${python3dir} \ | 50 | + install --root $(DESTDIR) --prefix $(prefix) --install-lib=${python3dir} \ |
51 | --single-version-externally-managed \ | 51 | --single-version-externally-managed \ |
52 | --record $(shell readlink -f $(builddir))/py3build/install_files.txt \ | 52 | --record $(shell readlink -f $(builddir))/py3build/install_files.txt \ |
53 | --verbose) | 53 | --verbose) |
54 | -- | ||
55 | 2.7.4 | ||
56 | |||
diff --git a/meta/recipes-kernel/systemtap/systemtap/0001-improve-reproducibility-for-c-compiling.patch b/meta/recipes-kernel/systemtap/systemtap/0001-improve-reproducibility-for-c-compiling.patch index 15a6f2a9a5..7d35f76b29 100644 --- a/meta/recipes-kernel/systemtap/systemtap/0001-improve-reproducibility-for-c-compiling.patch +++ b/meta/recipes-kernel/systemtap/systemtap/0001-improve-reproducibility-for-c-compiling.patch | |||
@@ -13,19 +13,16 @@ Signed-off-by: Hongxu Jia <hongxu.jia@windriver.com> | |||
13 | stringtable.h | 2 +- | 13 | stringtable.h | 2 +- |
14 | 1 file changed, 1 insertion(+), 1 deletion(-) | 14 | 1 file changed, 1 insertion(+), 1 deletion(-) |
15 | 15 | ||
16 | diff --git a/stringtable.h b/stringtable.h | 16 | Index: git/stringtable.h |
17 | index 5fc42e7..6fd8a1e 100644 | 17 | =================================================================== |
18 | --- a/stringtable.h | 18 | --- git.orig/stringtable.h |
19 | +++ b/stringtable.h | 19 | +++ git/stringtable.h |
20 | @@ -19,7 +19,7 @@ | 20 | @@ -23,7 +23,7 @@ |
21 | 21 | ||
22 | #if defined(HAVE_BOOST_UTILITY_STRING_REF_HPP) | 22 | #if 0 && defined(HAVE_BOOST_UTILITY_STRING_REF_HPP) |
23 | #include <boost/version.hpp> | 23 | #include <boost/version.hpp> |
24 | -#include <boost/utility/string_ref.hpp> //header with string_ref | 24 | -#include <boost/utility/string_ref.hpp> //header with string_ref |
25 | +#include "@RELATIVE_STAGING_INCDIR@/boost/utility/string_ref.hpp" //header with string_ref | 25 | +#include "@RELATIVE_STAGING_INCDIR@/boost/utility/string_ref.hpp" //header with string_ref |
26 | 26 | ||
27 | // XXX: experimental tunables | 27 | // XXX: experimental tunables |
28 | #define INTERNED_STRING_FIND_MEMMEM 1 /* perf stat indicates a very slight benefit */ | 28 | #define INTERNED_STRING_FIND_MEMMEM 1 /* perf stat indicates a very slight benefit */ |
29 | -- | ||
30 | 2.7.4 | ||
31 | |||
diff --git a/meta/recipes-kernel/systemtap/systemtap/0001-python-Makefile.am-use-absolute-path-for-source-dire.patch b/meta/recipes-kernel/systemtap/systemtap/0001-python-Makefile.am-use-absolute-path-for-source-dire.patch new file mode 100644 index 0000000000..dacd19edd1 --- /dev/null +++ b/meta/recipes-kernel/systemtap/systemtap/0001-python-Makefile.am-use-absolute-path-for-source-dire.patch | |||
@@ -0,0 +1,36 @@ | |||
1 | From 71e4ffd46dbbb7de1d06edb66f3e1fe0de423586 Mon Sep 17 00:00:00 2001 | ||
2 | From: Alexander Kanavin <alex@linutronix.de> | ||
3 | Date: Wed, 21 May 2025 13:25:46 +0200 | ||
4 | Subject: [PATCH] python/Makefile.am: use absolute path for source directory | ||
5 | includes as well | ||
6 | |||
7 | Otherwise it would be relative to the build directory, | ||
8 | which works only if the build and source directory are in the | ||
9 | same parent directory, and breaks if they're on different levels. | ||
10 | |||
11 | Upstream-Status: Submitted [by email to fche@redhat.com,wcohen@redhat.com,systemtap@sourceware.org] | ||
12 | Signed-off-by: Alexander Kanavin <alex@linutronix.de> | ||
13 | --- | ||
14 | python/Makefile.am | 4 ++-- | ||
15 | 1 file changed, 2 insertions(+), 2 deletions(-) | ||
16 | |||
17 | diff --git a/python/Makefile.am b/python/Makefile.am | ||
18 | index 9d5cb7bcb..130e90b24 100644 | ||
19 | --- a/python/Makefile.am | ||
20 | +++ b/python/Makefile.am | ||
21 | @@ -2,10 +2,10 @@ | ||
22 | |||
23 | AUTOMAKE_OPTIONS = subdir-objects | ||
24 | |||
25 | -# Note that we have to use 'abs_builddir' here since we change | ||
26 | +# Note that we have to use absolute directores here since we change | ||
27 | # directories back to the source directory when building the python | ||
28 | # extension. | ||
29 | -AM_CPPFLAGS = -I$(srcdir)/../includes | ||
30 | +AM_CPPFLAGS = -I$(abs_srcdir)/../includes | ||
31 | AM_CPPFLAGS += -I$(abs_builddir)/../includes/sys | ||
32 | |||
33 | # Add OE's CFLAGS which contains `-fdebug-prefix-map' options to | ||
34 | -- | ||
35 | 2.39.5 | ||
36 | |||
diff --git a/meta/recipes-kernel/systemtap/systemtap/0001-staprun-address-ncurses-6.3-failures.patch b/meta/recipes-kernel/systemtap/systemtap/0001-staprun-address-ncurses-6.3-failures.patch new file mode 100644 index 0000000000..1decf21593 --- /dev/null +++ b/meta/recipes-kernel/systemtap/systemtap/0001-staprun-address-ncurses-6.3-failures.patch | |||
@@ -0,0 +1,61 @@ | |||
1 | From 191f528da19193d713d94ee252e2485efd9af4d3 Mon Sep 17 00:00:00 2001 | ||
2 | From: Alexander Kanavin <alex@linutronix.de> | ||
3 | Date: Mon, 25 Oct 2021 17:59:24 +0200 | ||
4 | Subject: [PATCH] staprun: address ncurses 6.3 failures | ||
5 | |||
6 | Upstream-Status: Submitted [by email to smakarov@redhat.com,systemtap@sourceware.org] | ||
7 | Signed-off-by: Alexander Kanavin <alex@linutronix.de> | ||
8 | --- | ||
9 | staprun/monitor.c | 24 ++++++++++++------------ | ||
10 | 1 file changed, 12 insertions(+), 12 deletions(-) | ||
11 | |||
12 | diff --git a/staprun/monitor.c b/staprun/monitor.c | ||
13 | index 478634c09..f4fbfd686 100644 | ||
14 | --- a/staprun/monitor.c | ||
15 | +++ b/staprun/monitor.c | ||
16 | @@ -448,12 +448,12 @@ void monitor_render(void) | ||
17 | if (active_window == 0) | ||
18 | wattron(status, A_BOLD); | ||
19 | wprintw(status, "\n%*s\t%*s\t%*s\t%*s\t%*s\t%*s\t%s\n", | ||
20 | - width[p_index], HIGHLIGHT("index", p_index, comp_fn_index), | ||
21 | - width[p_state], HIGHLIGHT("state", p_state, comp_fn_index), | ||
22 | - width[p_hits], HIGHLIGHT("hits", p_hits, comp_fn_index), | ||
23 | - width[p_min], HIGHLIGHT("min", p_min, comp_fn_index), | ||
24 | - width[p_avg], HIGHLIGHT("avg", p_avg, comp_fn_index), | ||
25 | - width[p_max], HIGHLIGHT("max", p_max, comp_fn_index), | ||
26 | + (int)width[p_index], HIGHLIGHT("index", p_index, comp_fn_index), | ||
27 | + (int)width[p_state], HIGHLIGHT("state", p_state, comp_fn_index), | ||
28 | + (int)width[p_hits], HIGHLIGHT("hits", p_hits, comp_fn_index), | ||
29 | + (int)width[p_min], HIGHLIGHT("min", p_min, comp_fn_index), | ||
30 | + (int)width[p_avg], HIGHLIGHT("avg", p_avg, comp_fn_index), | ||
31 | + (int)width[p_max], HIGHLIGHT("max", p_max, comp_fn_index), | ||
32 | HIGHLIGHT("name", p_name, comp_fn_index)); | ||
33 | if (active_window == 0) | ||
34 | wattroff(status, A_BOLD); | ||
35 | @@ -466,17 +466,17 @@ void monitor_render(void) | ||
36 | json_object *probe, *field; | ||
37 | probe = json_object_array_get_idx(jso_probe_list, i); | ||
38 | json_object_object_get_ex(probe, "index", &field); | ||
39 | - wprintw(status, "%*s\t", width[p_index], json_object_get_string(field)); | ||
40 | + wprintw(status, "%*s\t", (int)width[p_index], json_object_get_string(field)); | ||
41 | json_object_object_get_ex(probe, "state", &field); | ||
42 | - wprintw(status, "%*s\t", width[p_state], json_object_get_string(field)); | ||
43 | + wprintw(status, "%*s\t", (int)width[p_state], json_object_get_string(field)); | ||
44 | json_object_object_get_ex(probe, "hits", &field); | ||
45 | - wprintw(status, "%*s\t", width[p_hits], json_object_get_string(field)); | ||
46 | + wprintw(status, "%*s\t", (int)width[p_hits], json_object_get_string(field)); | ||
47 | json_object_object_get_ex(probe, "min", &field); | ||
48 | - wprintw(status, "%*s\t", width[p_min], json_object_get_string(field)); | ||
49 | + wprintw(status, "%*s\t", (int)width[p_min], json_object_get_string(field)); | ||
50 | json_object_object_get_ex(probe, "avg", &field); | ||
51 | - wprintw(status, "%*s\t", width[p_avg], json_object_get_string(field)); | ||
52 | + wprintw(status, "%*s\t", (int)width[p_avg], json_object_get_string(field)); | ||
53 | json_object_object_get_ex(probe, "max", &field); | ||
54 | - wprintw(status, "%*s\t", width[p_max], json_object_get_string(field)); | ||
55 | + wprintw(status, "%*s\t", (int)width[p_max], json_object_get_string(field)); | ||
56 | getyx(status, discard, cur_x); | ||
57 | json_object_object_get_ex(probe, "name", &field); | ||
58 | wprintw(status, "%.*s", max_cols-cur_x-1, json_object_get_string(field)); | ||
59 | -- | ||
60 | 2.20.1 | ||
61 | |||
diff --git a/meta/recipes-kernel/systemtap/systemtap/0001-transport-protect-include-and-callsite-with-same-con.patch b/meta/recipes-kernel/systemtap/systemtap/0001-transport-protect-include-and-callsite-with-same-con.patch deleted file mode 100644 index efc79f6c0f..0000000000 --- a/meta/recipes-kernel/systemtap/systemtap/0001-transport-protect-include-and-callsite-with-same-con.patch +++ /dev/null | |||
@@ -1,44 +0,0 @@ | |||
1 | From cbf27cd54071f788231e69d96dbaad563f1010d4 Mon Sep 17 00:00:00 2001 | ||
2 | From: Bruce Ashfield <bruce.ashfield@gmail.com> | ||
3 | Date: Fri, 18 Dec 2020 13:15:08 -0500 | ||
4 | Subject: [PATCH] transport: protect include and callsite with same conditional | ||
5 | |||
6 | transport.c has the following code block: | ||
7 | |||
8 | if (!debugfs_p && security_locked_down (LOCKDOWN_DEBUGFS)) | ||
9 | |||
10 | Which is protected by the conditional STAPCONF_LOCKDOWN_DEBUGFS. | ||
11 | |||
12 | linux/security.h provides the definition of LOCKDOWN_DEBUGFS, and | ||
13 | must be included or we have a compilation issue. | ||
14 | |||
15 | The include of security.h is protected by #ifdef CONFIG_SECURITY_LOCKDOWN_LSM, | ||
16 | which means that in some configurations we can get out of sync with | ||
17 | the include and the callsite. | ||
18 | |||
19 | If we protect the include and the callsite with the same #ifdef, we can | ||
20 | be sure that they will be consistent. | ||
21 | |||
22 | Upstream-status: Inappropriate (kernel-devsrc specific) | ||
23 | |||
24 | Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com> | ||
25 | --- | ||
26 | runtime/transport/transport.c | 2 +- | ||
27 | 1 file changed, 1 insertion(+), 1 deletion(-) | ||
28 | |||
29 | diff --git a/runtime/transport/transport.c b/runtime/transport/transport.c | ||
30 | index bb4a98bd3..88e20ea28 100644 | ||
31 | --- a/runtime/transport/transport.c | ||
32 | +++ b/runtime/transport/transport.c | ||
33 | @@ -21,7 +21,7 @@ | ||
34 | #include <linux/namei.h> | ||
35 | #include <linux/delay.h> | ||
36 | #include <linux/mutex.h> | ||
37 | -#ifdef CONFIG_SECURITY_LOCKDOWN_LSM | ||
38 | +#ifdef STAPCONF_LOCKDOWN_DEBUGFS | ||
39 | #include <linux/security.h> | ||
40 | #endif | ||
41 | #include "../uidgid_compatibility.h" | ||
42 | -- | ||
43 | 2.19.1 | ||
44 | |||
diff --git a/meta/recipes-kernel/systemtap/systemtap_git.bb b/meta/recipes-kernel/systemtap/systemtap_5.3.bb index c4a6eef59a..588b3b8d36 100644 --- a/meta/recipes-kernel/systemtap/systemtap_git.bb +++ b/meta/recipes-kernel/systemtap/systemtap_5.3.bb | |||
@@ -6,7 +6,11 @@ HOMEPAGE = "https://sourceware.org/systemtap/" | |||
6 | 6 | ||
7 | require systemtap_git.inc | 7 | require systemtap_git.inc |
8 | 8 | ||
9 | SRC_URI += "file://0001-improve-reproducibility-for-c-compiling.patch" | 9 | SRC_URI += " \ |
10 | file://0001-improve-reproducibility-for-c-compiling.patch \ | ||
11 | file://0001-staprun-address-ncurses-6.3-failures.patch \ | ||
12 | file://0001-python-Makefile.am-use-absolute-path-for-source-dire.patch \ | ||
13 | " | ||
10 | 14 | ||
11 | DEPENDS = "elfutils" | 15 | DEPENDS = "elfutils" |
12 | 16 | ||
@@ -14,6 +18,7 @@ EXTRA_OECONF += "--with-libelf=${STAGING_DIR_TARGET} --without-rpm \ | |||
14 | --without-nss --without-avahi --without-dyninst \ | 18 | --without-nss --without-avahi --without-dyninst \ |
15 | --disable-server --disable-grapher --enable-prologues \ | 19 | --disable-server --disable-grapher --enable-prologues \ |
16 | --with-python3 --without-python2-probes \ | 20 | --with-python3 --without-python2-probes \ |
21 | --with-extra-version="oe" \ | ||
17 | ac_cv_prog_have_javac=no \ | 22 | ac_cv_prog_have_javac=no \ |
18 | ac_cv_prog_have_jar=no " | 23 | ac_cv_prog_have_jar=no " |
19 | 24 | ||
@@ -21,58 +26,59 @@ STAP_DOCS ?= "--disable-docs --disable-publican --disable-refdocs" | |||
21 | 26 | ||
22 | EXTRA_OECONF += "${STAP_DOCS} " | 27 | EXTRA_OECONF += "${STAP_DOCS} " |
23 | 28 | ||
24 | PACKAGECONFIG ??= "translator sqlite monitor python3-probes" | 29 | PACKAGECONFIG ??= "translator sqlite monitor python3-probes ${@bb.utils.filter('DISTRO_FEATURES', 'debuginfod', d)}" |
25 | PACKAGECONFIG[translator] = "--enable-translator,--disable-translator,boost,bash" | 30 | PACKAGECONFIG[translator] = "--enable-translator,--disable-translator,boost,bash" |
26 | PACKAGECONFIG[libvirt] = "--enable-libvirt,--disable-libvirt,libvirt" | 31 | PACKAGECONFIG[libvirt] = "--enable-libvirt,--disable-libvirt,libvirt" |
27 | PACKAGECONFIG[sqlite] = "--enable-sqlite,--disable-sqlite,sqlite3" | 32 | PACKAGECONFIG[sqlite] = "--enable-sqlite,--disable-sqlite,sqlite3" |
28 | PACKAGECONFIG[monitor] = "--enable-monitor,--disable-monitor,ncurses json-c" | 33 | PACKAGECONFIG[monitor] = "--enable-monitor,--disable-monitor,ncurses json-c" |
29 | PACKAGECONFIG[python3-probes] = "--with-python3-probes,--without-python3-probes,python3-setuptools-native" | 34 | PACKAGECONFIG[python3-probes] = "--with-python3-probes,--without-python3-probes,python3-setuptools-native" |
35 | PACKAGECONFIG[debuginfod] = "--with-debuginfod, --without-debuginfod" | ||
30 | 36 | ||
31 | inherit autotools gettext pkgconfig systemd | 37 | inherit autotools gettext pkgconfig systemd |
32 | inherit ${@bb.utils.contains('PACKAGECONFIG', 'python3-probes', 'distutils3-base', '', d)} | 38 | inherit_defer ${@bb.utils.contains('PACKAGECONFIG', 'python3-probes', 'setuptools3-base', '', d)} |
33 | 39 | ||
34 | # exporter comes with python3-probes | 40 | # exporter comes with python3-probes |
35 | PACKAGES =+ "${PN}-exporter" | 41 | PACKAGES =+ "${PN}-exporter" |
36 | FILES_${PN}-exporter = "${sysconfdir}/stap-exporter/* \ | 42 | FILES:${PN}-exporter = "${sysconfdir}/stap-exporter/* \ |
37 | ${sysconfdir}/sysconfig/stap-exporter \ | 43 | ${sysconfdir}/sysconfig/stap-exporter \ |
38 | ${systemd_unitdir}/system/stap-exporter.service \ | 44 | ${systemd_system_unitdir}/stap-exporter.service \ |
39 | ${sbindir}/stap-exporter" | 45 | ${sbindir}/stap-exporter" |
40 | RDEPENDS_${PN}-exporter = "${PN} python3-core python3-netclient" | 46 | RDEPENDS:${PN}-exporter = "${PN} python3-core python3-netclient" |
41 | SYSTEMD_SERVICE_${PN}-exporter = "stap-exporter.service" | 47 | SYSTEMD_SERVICE:${PN}-exporter = "stap-exporter.service" |
42 | 48 | ||
43 | PACKAGES =+ "${PN}-runtime" | 49 | PACKAGES =+ "${PN}-runtime" |
44 | FILES_${PN}-runtime = "\ | 50 | FILES:${PN}-runtime = "\ |
45 | ${bindir}/staprun \ | 51 | ${bindir}/staprun \ |
46 | ${bindir}/stap-merge \ | 52 | ${bindir}/stap-merge \ |
47 | ${bindir}/stapsh \ | 53 | ${bindir}/stapsh \ |
48 | ${libexecdir}/${BPN}/stapio \ | 54 | ${libexecdir}/${BPN}/stapio \ |
49 | " | 55 | " |
50 | RDEPENDS_${PN}_class-target += "${PN}-runtime" | 56 | RDEPENDS:${PN}:class-target += "${PN}-runtime" |
51 | 57 | ||
52 | PACKAGES =+ "${PN}-examples" | 58 | PACKAGES =+ "${PN}-examples" |
53 | FILES_${PN}-examples = "${datadir}/${BPN}/examples/" | 59 | FILES:${PN}-examples = "${datadir}/${BPN}/examples/" |
54 | RDEPENDS_${PN}-examples += "${PN}" | 60 | RDEPENDS:${PN}-examples += "${PN}" |
55 | 61 | ||
56 | # don't complain that some examples involve bash, perl, php... | 62 | # don't complain that some examples involve bash, perl, php... |
57 | INSANE_SKIP_${PN}-examples += "file-rdeps" | 63 | INSANE_SKIP:${PN}-examples += "file-rdeps" |
58 | 64 | ||
59 | PACKAGES =+ "${PN}-python" | 65 | PACKAGES =+ "${PN}-python" |
60 | FILES_${PN}-python += "\ | 66 | FILES:${PN}-python += "\ |
61 | ${bindir}/dtrace \ | 67 | ${bindir}/dtrace \ |
62 | ${libdir}/python*/ \ | 68 | ${libdir}/python*/ \ |
63 | ${libexecdir}/${BPN}/python/ \ | 69 | ${libexecdir}/${BPN}/python/ \ |
64 | " | 70 | " |
65 | # python material requires sdt headers | 71 | # python material requires sdt headers |
66 | RDEPENDS_${PN}-python += "${PN}-dev python3-core" | 72 | RDEPENDS:${PN}-python += "${PN}-dev python3-core" |
67 | INSANE_SKIP_${PN}-python += "dev-deps" | 73 | INSANE_SKIP:${PN}-python += "dev-deps" |
68 | 74 | ||
69 | do_configure_prepend () { | 75 | do_configure:prepend () { |
70 | # Improve reproducibility for c++ object files | 76 | # Improve reproducibility for c++ object files |
71 | reltivepath="${@os.path.relpath(d.getVar('STAGING_INCDIR'), d.getVar('S'))}" | 77 | reltivepath="${@os.path.relpath(d.getVar('STAGING_INCDIR'), d.getVar('S'))}" |
72 | sed -i "s:@RELATIVE_STAGING_INCDIR@:$reltivepath:g" ${S}/stringtable.h | 78 | sed -i "s:@RELATIVE_STAGING_INCDIR@:$reltivepath:g" ${S}/stringtable.h |
73 | } | 79 | } |
74 | 80 | ||
75 | do_install_append () { | 81 | do_install:append () { |
76 | if [ ! -f ${D}${bindir}/stap ]; then | 82 | if [ ! -f ${D}${bindir}/stap ]; then |
77 | # translator disabled case, need to leave only minimal runtime | 83 | # translator disabled case, need to leave only minimal runtime |
78 | rm -rf ${D}${datadir}/${PN} | 84 | rm -rf ${D}${datadir}/${PN} |
@@ -94,3 +100,7 @@ do_install_append () { | |||
94 | } | 100 | } |
95 | 101 | ||
96 | BBCLASSEXTEND = "nativesdk" | 102 | BBCLASSEXTEND = "nativesdk" |
103 | |||
104 | # Emits lot of warning which are treated as errors | ||
105 | # They must be looked into before disabling | ||
106 | TOOLCHAIN = "gcc" | ||
diff --git a/meta/recipes-kernel/systemtap/systemtap_git.inc b/meta/recipes-kernel/systemtap/systemtap_git.inc index 016b423847..86336b0779 100644 --- a/meta/recipes-kernel/systemtap/systemtap_git.inc +++ b/meta/recipes-kernel/systemtap/systemtap_git.inc | |||
@@ -1,19 +1,16 @@ | |||
1 | LICENSE = "GPLv2" | 1 | LICENSE = "GPL-2.0-only" |
2 | LIC_FILES_CHKSUM = "file://COPYING;md5=b234ee4d69f5fce4486a80fdaf4a4263" | 2 | LIC_FILES_CHKSUM = "file://COPYING;md5=b234ee4d69f5fce4486a80fdaf4a4263" |
3 | SRCREV = "988f439af39a359b4387963ca4633649866d8275" | ||
4 | PV = "4.4" | ||
5 | 3 | ||
6 | SRC_URI = "git://sourceware.org/git/systemtap.git \ | 4 | SRC_URI = "git://sourceware.org/git/systemtap.git;protocol=https;branch=master;tag=release-${PV} \ |
7 | file://0001-Do-not-let-configure-write-a-python-location-into-th.patch \ | 5 | file://0001-Do-not-let-configure-write-a-python-location-into-th.patch \ |
8 | file://0001-Install-python-modules-to-correct-library-dir.patch \ | 6 | file://0001-Install-python-modules-to-correct-library-dir.patch \ |
9 | file://0001-staprun-stapbpf-don-t-support-installing-a-non-root.patch \ | 7 | file://0001-staprun-stapbpf-don-t-support-installing-a-non-root.patch \ |
10 | file://0001-transport-protect-include-and-callsite-with-same-con.patch \ | ||
11 | " | 8 | " |
12 | 9 | ||
13 | COMPATIBLE_HOST = '(x86_64|i.86|powerpc|arm|aarch64|microblazeel|mips).*-linux' | 10 | SRCREV = "c4fc655170b534478a6b131292b987630c7c0865" |
14 | COMPATIBLE_HOST_libc-musl = 'null' | ||
15 | 11 | ||
16 | S = "${WORKDIR}/git" | 12 | COMPATIBLE_HOST = '(x86_64|i.86|powerpc|arm|aarch64|microblazeel|mips|riscv64).*-linux' |
13 | COMPATIBLE_HOST:libc-musl = 'null' | ||
17 | 14 | ||
18 | # systemtap can't be built without optimization, if someone tries to compile an | 15 | # systemtap can't be built without optimization, if someone tries to compile an |
19 | # entire image as -O0, break with fatal. | 16 | # entire image as -O0, break with fatal. |
diff --git a/meta/recipes-kernel/wireless-regdb/wireless-regdb_2020.11.20.bb b/meta/recipes-kernel/wireless-regdb/wireless-regdb_2025.02.20.bb index b3567bca95..09fff768c4 100644 --- a/meta/recipes-kernel/wireless-regdb/wireless-regdb_2020.11.20.bb +++ b/meta/recipes-kernel/wireless-regdb/wireless-regdb_2025.02.20.bb | |||
@@ -5,7 +5,7 @@ LICENSE = "ISC" | |||
5 | LIC_FILES_CHKSUM = "file://LICENSE;md5=07c4f6dea3845b02a18dc00c8c87699c" | 5 | LIC_FILES_CHKSUM = "file://LICENSE;md5=07c4f6dea3845b02a18dc00c8c87699c" |
6 | 6 | ||
7 | SRC_URI = "https://www.kernel.org/pub/software/network/${BPN}/${BP}.tar.xz" | 7 | SRC_URI = "https://www.kernel.org/pub/software/network/${BPN}/${BP}.tar.xz" |
8 | SRC_URI[sha256sum] = "b4164490d82ff7b0086e812ac42ab27baf57be24324d4c0ee1c5dd6ba27f2a52" | 8 | SRC_URI[sha256sum] = "57f8e7721cf5a880c13ae0c202edbb21092a060d45f9e9c59bcd2a8272bfa456" |
9 | 9 | ||
10 | inherit bin_package allarch | 10 | inherit bin_package allarch |
11 | 11 | ||
@@ -13,7 +13,7 @@ do_install() { | |||
13 | install -d -m0755 ${D}${nonarch_libdir}/crda | 13 | install -d -m0755 ${D}${nonarch_libdir}/crda |
14 | install -d -m0755 ${D}${sysconfdir}/wireless-regdb/pubkeys | 14 | install -d -m0755 ${D}${sysconfdir}/wireless-regdb/pubkeys |
15 | install -m 0644 regulatory.bin ${D}${nonarch_libdir}/crda/regulatory.bin | 15 | install -m 0644 regulatory.bin ${D}${nonarch_libdir}/crda/regulatory.bin |
16 | install -m 0644 sforshee.key.pub.pem ${D}${sysconfdir}/wireless-regdb/pubkeys/sforshee.key.pub.pem | 16 | install -m 0644 wens.key.pub.pem ${D}${sysconfdir}/wireless-regdb/pubkeys/wens.key.pub.pem |
17 | 17 | ||
18 | install -m 0644 -D regulatory.db ${D}${nonarch_base_libdir}/firmware/regulatory.db | 18 | install -m 0644 -D regulatory.db ${D}${nonarch_base_libdir}/firmware/regulatory.db |
19 | install -m 0644 regulatory.db.p7s ${D}${nonarch_base_libdir}/firmware/regulatory.db.p7s | 19 | install -m 0644 regulatory.db.p7s ${D}${nonarch_base_libdir}/firmware/regulatory.db.p7s |
@@ -24,9 +24,9 @@ do_install() { | |||
24 | # For kernel <= v4.14, inherit the kernel_wireless_regdb.bbclass | 24 | # For kernel <= v4.14, inherit the kernel_wireless_regdb.bbclass |
25 | # (in meta-networking) in kernel's recipe. | 25 | # (in meta-networking) in kernel's recipe. |
26 | PACKAGES = "${PN}-static ${PN}" | 26 | PACKAGES = "${PN}-static ${PN}" |
27 | RCONFLICTS_${PN} = "${PN}-static" | 27 | RCONFLICTS:${PN} = "${PN}-static" |
28 | 28 | ||
29 | FILES_${PN}-static = " \ | 29 | FILES:${PN}-static = " \ |
30 | ${nonarch_base_libdir}/firmware/regulatory.db \ | 30 | ${nonarch_base_libdir}/firmware/regulatory.db \ |
31 | ${nonarch_base_libdir}/firmware/regulatory.db.p7s \ | 31 | ${nonarch_base_libdir}/firmware/regulatory.db.p7s \ |
32 | " | 32 | " |
@@ -34,10 +34,10 @@ FILES_${PN}-static = " \ | |||
34 | # Native users might want to use the source of regulatory DB. | 34 | # Native users might want to use the source of regulatory DB. |
35 | # This is for example used by Linux kernel <= v4.14 and | 35 | # This is for example used by Linux kernel <= v4.14 and |
36 | # kernel_wireless_regdb.bbclass in meta-networking. | 36 | # kernel_wireless_regdb.bbclass in meta-networking. |
37 | do_install_append_class-native() { | 37 | do_install:append:class-native() { |
38 | install -m 0644 -D db.txt ${D}${libdir}/crda/db.txt | 38 | install -m 0644 -D db.txt ${D}${libdir}/crda/db.txt |
39 | } | 39 | } |
40 | 40 | ||
41 | RSUGGESTS_${PN} = "crda" | 41 | RSUGGESTS:${PN} = "crda" |
42 | 42 | ||
43 | BBCLASSEXTEND = "native" | 43 | BBCLASSEXTEND = "native" |